303 lines
12 KiB
C#
303 lines
12 KiB
C#
using System.Reflection;
|
|
using Microsoft.AspNetCore.Components.Authorization;
|
|
using Microsoft.AspNetCore.Components.Server;
|
|
using Microsoft.AspNetCore.DataProtection;
|
|
using Microsoft.AspNetCore.DataProtection.AuthenticatedEncryption;
|
|
using Microsoft.AspNetCore.DataProtection.AuthenticatedEncryption.ConfigurationModel;
|
|
using Microsoft.AspNetCore.Identity;
|
|
using Microsoft.AspNetCore.StaticFiles;
|
|
using Microsoft.EntityFrameworkCore;
|
|
using Microsoft.Extensions.Caching.Distributed;
|
|
using Microsoft.Extensions.Options;
|
|
using StackExchange.Redis;
|
|
using System.Text;
|
|
using AspNetCore.Authentication.ApiKey;
|
|
using Tomlyn.Extensions.Configuration;
|
|
using Wave.Components;
|
|
using Wave.Components.Account;
|
|
using Wave.Data;
|
|
using Wave.Services;
|
|
using Wave.Utilities;
|
|
using Microsoft.IdentityModel.Protocols.OpenIdConnect;
|
|
|
|
string humanReadableVersion = Assembly.GetEntryAssembly()?
|
|
.GetCustomAttribute<AssemblyInformationalVersionAttribute>()?
|
|
.InformationalVersion.Split("+", 2)[0] ?? "unknown";
|
|
Console.WriteLine(@"Starting Wave " + humanReadableVersion);
|
|
|
|
var logMessages = new List<string>();
|
|
|
|
var builder = WebApplication.CreateBuilder(args);
|
|
builder.Configuration
|
|
.AddJsonFile(Path.Combine(FileSystemService.ConfigurationDirectory, "config.json"), true, false)
|
|
.AddYamlFile(Path.Combine(FileSystemService.ConfigurationDirectory, "config.yml"), true, false)
|
|
.AddTomlFile(Path.Combine(FileSystemService.ConfigurationDirectory, "config.toml"), true, false)
|
|
.AddIniFile( Path.Combine(FileSystemService.ConfigurationDirectory, "config.ini"), true, false)
|
|
.AddXmlFile( Path.Combine(FileSystemService.ConfigurationDirectory, "config.xml"), true, false)
|
|
.AddEnvironmentVariables("WAVE_");
|
|
builder.Services.AddCascadingValue("Version", _ => humanReadableVersion);
|
|
|
|
builder.Services.AddRazorComponents().AddInteractiveServerComponents();
|
|
builder.Services.AddControllers(options => {
|
|
options.OutputFormatters.Add(new SyndicationFeedFormatter());
|
|
});
|
|
builder.Services.AddOutputCache();
|
|
|
|
#region Data Protection & Redis
|
|
|
|
if (builder.Configuration.GetConnectionString("Redis") is { } redisUri) {
|
|
var redis = ConnectionMultiplexer.Connect(redisUri);
|
|
builder.Services.AddDataProtection()
|
|
.PersistKeysToStackExchangeRedis(redis)
|
|
.UseCryptographicAlgorithms(new AuthenticatedEncryptorConfiguration() {
|
|
EncryptionAlgorithm = EncryptionAlgorithm.AES_256_CBC,
|
|
ValidationAlgorithm = ValidationAlgorithm.HMACSHA256
|
|
});
|
|
builder.Services.AddStackExchangeRedisCache(options => {
|
|
options.Configuration = redisUri;
|
|
options.InstanceName = "WaveDistributedCache";
|
|
});
|
|
builder.Services.AddStackExchangeRedisOutputCache(options => {
|
|
options.Configuration = redisUri;
|
|
options.InstanceName = "WaveOutputCache";
|
|
});
|
|
} else {
|
|
builder.Services.AddDataProtection()
|
|
.UseCryptographicAlgorithms(new AuthenticatedEncryptorConfiguration() {
|
|
EncryptionAlgorithm = EncryptionAlgorithm.AES_256_CBC,
|
|
ValidationAlgorithm = ValidationAlgorithm.HMACSHA256
|
|
});
|
|
builder.Services.AddDistributedMemoryCache();
|
|
logMessages.Add("No Redis connection string found.");
|
|
}
|
|
|
|
#endregion
|
|
|
|
#region Authentication & Authorization
|
|
|
|
builder.Services.AddCascadingAuthenticationState();
|
|
builder.Services.AddScoped<IdentityUserAccessor>();
|
|
builder.Services.AddScoped<IdentityRedirectManager>();
|
|
builder.Services.AddScoped<AuthenticationStateProvider, ServerAuthenticationStateProvider>();
|
|
|
|
// Authors: Can create Articles, require them to be reviewed
|
|
// Reviewers: Can review Articles, but cannot create them themselves
|
|
// Moderators: Can delete Articles / take them Offline
|
|
// Admins: Can do anything, and assign roles to other users
|
|
builder.Services.AddAuthorizationBuilder()
|
|
.AddPolicy("ArticleEditPermissions", p => p.RequireRole("Author", "Admin"))
|
|
.AddPolicy("ArticleReviewPermissions", p => p.RequireRole("Reviewer", "Admin"))
|
|
.AddPolicy("ArticleDeletePermissions", p => p.RequireRole("Moderator", "Admin"))
|
|
.AddPolicy("CategoryManagePermissions", p => p.RequireRole("Admin"))
|
|
.AddPolicy("RoleAssignPermissions", p => p.RequireRole("Admin"))
|
|
|
|
.AddPolicy("ArticleEditOrReviewPermissions", p => p.RequireRole("Author", "Reviewer", "Admin"))
|
|
|
|
.AddPolicy("EmailApi", p => p.RequireClaim("EmailApi")
|
|
.AddAuthenticationSchemes(ApiKeyDefaults.AuthenticationScheme));
|
|
builder.Services.AddAuthentication(options => {
|
|
options.DefaultScheme = IdentityConstants.ApplicationScheme;
|
|
options.DefaultSignInScheme = IdentityConstants.ExternalScheme;
|
|
}).AddApiKeyInHeader<ApiKeyProvider>(ApiKeyDefaults.AuthenticationScheme, options => {
|
|
options.KeyName = "X-API-KEY";
|
|
options.Realm = "Wave API";
|
|
}).AddApiKeyInRouteValues<ApiKeyProvider>("ApiKeyInRoute", options => {
|
|
options.KeyName = "apiKey";
|
|
options.Realm = "Wave API";
|
|
})
|
|
.AddIdentityCookies();
|
|
if (builder.Configuration.GetSection("Oidc").Get<OidcConfiguration>() is {} oidc && !string.IsNullOrWhiteSpace(oidc.Authority)) {
|
|
builder.Services.AddAuthentication(options => {
|
|
options.DefaultScheme = IdentityConstants.ApplicationScheme;
|
|
options.DefaultSignInScheme = IdentityConstants.ExternalScheme;
|
|
}).AddOpenIdConnect(options => {
|
|
options.SignInScheme = IdentityConstants.ExternalScheme;
|
|
|
|
options.Scope.Add(OpenIdConnectScope.OpenIdProfile);
|
|
options.Scope.Add(OpenIdConnectScope.OfflineAccess);
|
|
options.Authority = oidc.Authority;
|
|
|
|
options.ClientId = oidc.ClientId;
|
|
options.ClientSecret = oidc.ClientSecret;
|
|
options.ResponseType = OpenIdConnectResponseType.Code;
|
|
|
|
options.MapInboundClaims = false;
|
|
options.TokenValidationParameters.NameClaimType = "name";
|
|
options.TokenValidationParameters.RoleClaimType = "role";
|
|
|
|
options.CallbackPath = new PathString("/signin-oidc");
|
|
options.SignedOutCallbackPath = new PathString("/signout-callback-oidc");
|
|
options.RemoteSignOutPath = new PathString("/signout-oidc");
|
|
|
|
options.Events.OnRedirectToIdentityProvider = context => {
|
|
var uri = new UriBuilder(context.ProtocolMessage.RedirectUri) {
|
|
Scheme = "https",
|
|
Port = -1
|
|
};
|
|
context.ProtocolMessage.RedirectUri = uri.ToString();
|
|
return Task.FromResult(0);
|
|
};
|
|
});
|
|
}
|
|
|
|
#endregion
|
|
|
|
#region Identity
|
|
|
|
string connectionString = builder.Configuration.GetConnectionString("DefaultConnection")
|
|
?? throw new InvalidOperationException("Connection string 'DefaultConnection' not found.");
|
|
builder.Services.AddDbContextFactory<ApplicationDbContext>(options =>
|
|
options.UseNpgsql(connectionString));
|
|
builder.Services.AddDatabaseDeveloperPageExceptionFilter();
|
|
|
|
builder.Services.AddIdentityCore<ApplicationUser>(options => {
|
|
options.SignIn.RequireConfirmedAccount = true;
|
|
options.ClaimsIdentity.UserIdClaimType = "Id";
|
|
})
|
|
.AddRoles<IdentityRole>()
|
|
.AddEntityFrameworkStores<ApplicationDbContext>()
|
|
.AddSignInManager()
|
|
.AddDefaultTokenProviders()
|
|
.AddClaimsPrincipalFactory<UserClaimsFactory>();
|
|
|
|
#endregion
|
|
|
|
#region Services
|
|
|
|
builder.Services.AddHealthChecks();
|
|
builder.Services.AddLocalization(options => {
|
|
options.ResourcesPath = "Resources";
|
|
});
|
|
builder.Services.AddScoped<ImageService>();
|
|
builder.Services.AddHttpClient();
|
|
|
|
builder.Services.Configure<Features>(builder.Configuration.GetSection(nameof(Features)));
|
|
builder.Services.Configure<Customization>(builder.Configuration.GetSection(nameof(Customization)));
|
|
builder.Services.AddCascadingValue("TitlePrefix",
|
|
sf => (sf.GetService<IOptions<Customization>>()?.Value.AppName ?? "Wave") + " - ");
|
|
|
|
var emailConfig = builder.Configuration.GetSection("Email").Get<EmailConfiguration>();
|
|
builder.Services.Configure<EmailConfiguration>(builder.Configuration.GetSection("Email"));
|
|
if (emailConfig?.Smtp.Count > 0) {
|
|
if (string.IsNullOrWhiteSpace(emailConfig.SenderEmail)) {
|
|
throw new ApplicationException(
|
|
"Email providers have been configured, but no SenderEmail. " +
|
|
"Please provider the sender email address used for email distribution.");
|
|
}
|
|
builder.Services.AddSingleton<EmailTemplateService>();
|
|
builder.Services.AddScoped<EmailFactory>();
|
|
|
|
foreach (var smtp in emailConfig.Smtp) {
|
|
builder.Services.AddKeyedScoped<IEmailService, LiveEmailService>(smtp.Key.ToLower(), (provider, key) =>
|
|
ActivatorUtilities.CreateInstance<LiveEmailService>(provider,
|
|
provider.GetRequiredService<IOptions<EmailConfiguration>>().Value.Smtp[(string)key]));
|
|
}
|
|
|
|
if (emailConfig.Smtp.Keys.Any(k => k.Equals("live", StringComparison.CurrentCultureIgnoreCase))) {
|
|
builder.Services.AddScoped(sp => sp.GetKeyedService<IEmailService>("live")!);
|
|
builder.Services.AddScoped<IEmailSender<ApplicationUser>, SmtpEmailSender>();
|
|
} else {
|
|
builder.Services.AddSingleton<IEmailSender<ApplicationUser>, IdentityNoOpEmailSender>();
|
|
logMessages.Add("No 'live' email provider configured.");
|
|
}
|
|
|
|
if (emailConfig.Smtp.Keys.Any(k => k.Equals("bulk", StringComparison.CurrentCultureIgnoreCase))) {
|
|
builder.Services.AddScoped<NewsletterBackgroundService>();
|
|
builder.Services.AddHostedService<EmailBackgroundWorker>();
|
|
} else if (builder.Configuration.GetSection(nameof(Features)).Get<Features>()?.EmailSubscriptions is true) {
|
|
throw new ApplicationException(
|
|
"Email subscriptions have been enabled, but no 'bulk' email provider was configured. " +
|
|
"Disable email subscriptions or provide the mail provider for bulk sending");
|
|
}
|
|
} else {
|
|
builder.Services.AddSingleton<IEmailSender<ApplicationUser>, IdentityNoOpEmailSender>();
|
|
logMessages.Add("No email provider configured.");
|
|
}
|
|
|
|
builder.Services.AddSingleton<IMessageDisplay, MessageService>();
|
|
builder.Services.AddSingleton<FileSystemService>();
|
|
|
|
#endregion
|
|
|
|
var customization = builder.Configuration.GetSection(nameof(Customization)).Get<Customization>();
|
|
string[] cultures = ["en-US", "en-GB", "de-DE"];
|
|
|
|
string defaultLanguage = string.IsNullOrWhiteSpace(customization?.DefaultLanguage) ? cultures[0] : customization.DefaultLanguage;
|
|
builder.Services.Configure<RequestLocalizationOptions>(options => {
|
|
options.ApplyCurrentCultureToResponseHeaders = true;
|
|
options.FallBackToParentCultures = true;
|
|
options.FallBackToParentUICultures = true;
|
|
options.SetDefaultCulture(defaultLanguage)
|
|
.AddSupportedCultures(cultures)
|
|
.AddSupportedUICultures(cultures);
|
|
});
|
|
|
|
var app = builder.Build();
|
|
|
|
// Configure the HTTP request pipeline.
|
|
if (app.Environment.IsDevelopment()) {
|
|
app.UseMigrationsEndPoint();
|
|
} else {
|
|
app.UseExceptionHandler("/Error", createScopeForErrors: true);
|
|
}
|
|
|
|
|
|
app.UseStaticFiles(new StaticFileOptions {
|
|
ContentTypeProvider = new FileExtensionContentTypeProvider {
|
|
Mappings = {
|
|
[".jxl"] = "image/jxl"
|
|
}
|
|
}
|
|
});
|
|
app.UseAntiforgery();
|
|
|
|
app.MapRazorComponents<App>().AddInteractiveServerRenderMode();
|
|
|
|
// Add additional endpoints required by the Identity /Account Razor components.
|
|
app.MapAdditionalIdentityEndpoints();
|
|
|
|
app.MapHealthChecks("/health");
|
|
|
|
app.MapControllers();
|
|
app.UseOutputCache();
|
|
|
|
app.UseRequestLocalization();
|
|
|
|
foreach (string message in logMessages) {
|
|
app.Logger.LogInformation("{message}", message);
|
|
}
|
|
|
|
{
|
|
using var scope = app.Services.CreateScope();
|
|
await using var context = scope.ServiceProvider.GetRequiredService<ApplicationDbContext>();
|
|
context.Database.Migrate();
|
|
|
|
var userManager = scope.ServiceProvider.GetRequiredService<UserManager<ApplicationUser>>();
|
|
if (userManager.GetUsersInRoleAsync("Admin").Result.Any() is false) {
|
|
var cache = app.Services.GetRequiredService<IDistributedCache>();
|
|
|
|
// Check first wheter the password exists already
|
|
string? admin = await cache.GetStringAsync("admin_promote_key");
|
|
|
|
// If it does not exist, create a new one and save it to redis
|
|
if (string.IsNullOrWhiteSpace(admin)){
|
|
admin = Guid.NewGuid().ToString("N")[..16];
|
|
await cache.SetAsync("admin_promote_key", Encoding.UTF8.GetBytes(admin), new DistributedCacheEntryOptions{});
|
|
}
|
|
|
|
app.Logger.LogWarning("There is currently no user in your installation with the admin role, " +
|
|
"go to /Admin and use the following password to self promote your account: {admin}", admin);
|
|
}
|
|
|
|
// Generate plain text for Articles created before 1.0.0-alpha.3
|
|
var oldArticles = await context.Set<Article>().IgnoreQueryFilters().IgnoreAutoIncludes()
|
|
.Where(a => a.BodyPlain.Length < 1).AsNoTracking().ToListAsync();
|
|
if (oldArticles.Count > 0) {
|
|
oldArticles.ForEach(a => a.BodyPlain = HtmlUtilities.GetPlainText(a.BodyHtml));
|
|
context.UpdateRange(oldArticles);
|
|
await context.SaveChangesAsync();
|
|
}
|
|
}
|
|
|
|
app.Run();
|