using System.Security.Cryptography; using Foxnouns.Backend.Database; using Foxnouns.Backend.Database.Models; using Foxnouns.Backend.Utils; using Microsoft.AspNetCore.Identity; using Microsoft.EntityFrameworkCore; using NodaTime; namespace Foxnouns.Backend.Services; public class AuthService(IClock clock, DatabaseContext db, ISnowflakeGenerator snowflakeGenerator) { private readonly PasswordHasher _passwordHasher = new(); /// /// Creates a new user with the given email address and password. /// This method does not save the resulting user, the caller must still call . /// public async Task CreateUserWithPasswordAsync( string username, string email, string password, CancellationToken ct = default ) { var user = new User { Id = snowflakeGenerator.GenerateSnowflake(), Username = username, AuthMethods = { new AuthMethod { Id = snowflakeGenerator.GenerateSnowflake(), AuthType = AuthType.Email, RemoteId = email, }, }, LastActive = clock.GetCurrentInstant(), }; db.Add(user); user.Password = await Task.Run(() => _passwordHasher.HashPassword(user, password), ct); return user; } /// /// Creates a new user with the given username and remote authentication method. /// To create a user with email authentication, use /// This method does not save the resulting user, the caller must still call . /// public async Task CreateUserWithRemoteAuthAsync( string username, AuthType authType, string remoteId, string remoteUsername, FediverseApplication? instance = null, CancellationToken ct = default ) { AssertValidAuthType(authType, instance); if (await db.Users.AnyAsync(u => u.Username == username, ct)) throw new ApiError.BadRequest("Username is already taken", "username", username); var user = new User { Id = snowflakeGenerator.GenerateSnowflake(), Username = username, AuthMethods = { new AuthMethod { Id = snowflakeGenerator.GenerateSnowflake(), AuthType = authType, RemoteId = remoteId, RemoteUsername = remoteUsername, FediverseApplication = instance, }, }, LastActive = clock.GetCurrentInstant(), }; db.Add(user); return user; } /// /// Authenticates a user with email and password. /// /// The user's email address /// The user's password, in plain text /// Cancellation token /// A tuple of the authenticated user and whether multi-factor authentication is required /// Thrown if the email address is not associated with any user /// or if the password is incorrect public async Task<(User, EmailAuthenticationResult)> AuthenticateUserAsync( string email, string password, CancellationToken ct = default ) { var user = await db.Users.FirstOrDefaultAsync( u => u.AuthMethods.Any(a => a.AuthType == AuthType.Email && a.RemoteId == email), ct ); if (user == null) throw new ApiError.NotFound( "No user with that email address found, or password is incorrect", ErrorCode.UserNotFound ); var pwResult = await Task.Run( () => _passwordHasher.VerifyHashedPassword(user, user.Password!, password), ct ); if (pwResult == PasswordVerificationResult.Failed) // TODO: this seems to fail on some valid passwords? throw new ApiError.NotFound( "No user with that email address found, or password is incorrect", ErrorCode.UserNotFound ); if (pwResult == PasswordVerificationResult.SuccessRehashNeeded) { user.Password = await Task.Run(() => _passwordHasher.HashPassword(user, password), ct); await db.SaveChangesAsync(ct); } return (user, EmailAuthenticationResult.AuthSuccessful); } public enum EmailAuthenticationResult { AuthSuccessful, MfaRequired, } /// /// Validates a user's password outside an authentication context, for when a password is required for changing /// a setting, such as adding a new email address or changing passwords. /// public async Task ValidatePasswordAsync( User user, string password, CancellationToken ct = default ) { if (user.Password == null) { throw new FoxnounsError("Password for user supplied to ValidatePasswordAsync was null"); } var pwResult = await Task.Run( () => _passwordHasher.VerifyHashedPassword(user, user.Password!, password), ct ); return pwResult is PasswordVerificationResult.SuccessRehashNeeded or PasswordVerificationResult.Success; } /// /// Sets or updates a password for the given user. This method does not save the updated password automatically. /// public async Task SetUserPasswordAsync( User user, string password, CancellationToken ct = default ) { user.Password = await Task.Run(() => _passwordHasher.HashPassword(user, password), ct); db.Update(user); } /// /// Authenticates a user with a remote authentication provider. /// /// The remote authentication provider type /// The remote user ID /// The Fediverse instance, if authType is Fediverse. /// Will throw an exception if passed with another authType. /// Cancellation token. /// A user object, or null if the remote account isn't linked to any user. /// Thrown if instance is passed when not required, /// or not passed when required public async Task AuthenticateUserAsync( AuthType authType, string remoteId, FediverseApplication? instance = null, CancellationToken ct = default ) { AssertValidAuthType(authType, instance); return await db.Users.FirstOrDefaultAsync( u => u.AuthMethods.Any(a => a.AuthType == authType && a.RemoteId == remoteId && a.FediverseApplication == instance ), ct ); } public async Task AddAuthMethodAsync( Snowflake userId, AuthType authType, string remoteId, string? remoteUsername = null, CancellationToken ct = default ) { AssertValidAuthType(authType, null); var authMethod = new AuthMethod { Id = snowflakeGenerator.GenerateSnowflake(), AuthType = authType, RemoteId = remoteId, RemoteUsername = remoteUsername, UserId = userId, }; db.Add(authMethod); await db.SaveChangesAsync(ct); return authMethod; } public (string, Token) GenerateToken( User user, Application application, string[] scopes, Instant expires ) { if (!AuthUtils.ValidateScopes(application, scopes)) throw new ApiError.BadRequest( "Invalid scopes requested for this token", "scopes", scopes ); var (token, hash) = GenerateToken(); return ( token, new Token { Id = snowflakeGenerator.GenerateSnowflake(), Hash = hash, Application = application, User = user, ExpiresAt = expires, Scopes = scopes, } ); } private static (string, byte[]) GenerateToken() { var token = AuthUtils.RandomToken(); var hash = SHA512.HashData(Convert.FromBase64String(token)); return (token, hash); } private static void AssertValidAuthType(AuthType authType, FediverseApplication? instance) { if (authType == AuthType.Fediverse && instance == null) throw new FoxnounsError("Fediverse authentication requires an instance."); if (authType != AuthType.Fediverse && instance != null) throw new FoxnounsError("Non-Fediverse authentication does not require an instance."); } }