Angular2 ASP.NET Core AntiForgeryToken

后端 未结 4 2012
礼貌的吻别
礼貌的吻别 2020-12-13 16:19

I have an Angular2 app. It is running within ASP.NET 5 (Core).
It makes Http calls to the controller which is working fine.

Bu

相关标签:
4条回答
  • 2020-12-13 16:50

    A custom action filter is not necessary. It can all be wired up in Startup.cs.

    using Microsoft.AspNetCore.Antiforgery;
    
    (...)
    
    public void ConfigureServices(IServiceCollection services)
    {
      services.AddAntiforgery(options => options.HeaderName = "X-XSRF-TOKEN");
    
      (...)
    }
    
    public void Configure(IApplicationBuilder app, IAntiforgery antiforgery)
    {
      app.Use(next => context =>
      {
        if (context.Request.Path == "/")
        {
          //send the request token as a JavaScript-readable cookie, and Angular will use it by default
          var tokens = antiforgery.GetAndStoreTokens(context);
          context.Response.Cookies.Append("XSRF-TOKEN", tokens.RequestToken, new CookieOptions { HttpOnly = false });
        }
        return next(context);
      });
    
      (...)
    }
    

    Then all you need in your controllers is the [ValidateAntiForgeryToken] decorator wherever you want to enforce that a token is provided.

    For reference, I found this solution here - AspNet AntiForgery Github Issue 29.

    0 讨论(0)
  • 2020-12-13 17:09

    To validate the token from a header you can use something like this:

    [AttributeUsage(AttributeTargets.Method | AttributeTargets.Class, AllowMultiple = false, Inherited = true)]
        public sealed class ValidateHeaderAntiForgeryTokenAttribute : FilterAttribute, IAuthorizationFilter
        {
            public void OnAuthorization(AuthorizationContext filterContext)
            {
                if (filterContext == null)
                {
                    throw new ArgumentNullException(nameof(filterContext));
                }
    
                var httpContext = filterContext.HttpContext;
                if (httpContext.Request.Headers["__RequestVerificationToken"] == null)
                {
                    httpContext.Response.StatusCode = (int)HttpStatusCode.Forbidden;
                    httpContext.Response.StatusDescription = "RequestVerificationToken missing.";
    
                    filterContext.Result = new JsonResult
                    {
                        Data = new { ErrorMessage = httpContext.Response.StatusDescription },
                        JsonRequestBehavior = JsonRequestBehavior.AllowGet
                    };
                    return;
                }
                var cookie = httpContext.Request.Cookies[System.Web.Helpers.AntiForgeryConfig.CookieName];
                System.Web.Helpers.AntiForgery.Validate(cookie != null ? cookie.Value : null, httpContext.Request.Headers["__RequestVerificationToken"]);
            }
        }
    

    Then you just add [ValidateHeaderAntiForgeryToken] on the methods in your controller. Note though, this is from a MVC 5, ASP.NET 4.5.2 project, so you may have to alter it slightly to adjust to .NET Core. Also I modified this to return a JSON result if the token is missing, you can remove that part if you don't handle the error response and output it to the user. Credits for the core part of this attribute goes to: https://nozzlegear.com/blog/send-and-validate-an-asp-net-antiforgerytoken-as-a-request-header

    The hard part is how to generate the AntiForgeryToken without using @Html.AntiForgeryToken() in pure Angular 2 application (without access to .cshtml files). I'm looking for an answer to that as well.

    0 讨论(0)
  • 2020-12-13 17:14

    I am using a action filter to send the request tokens. Simply apply it to the actions you want a new antiforgery token, e.g. Angular2 SPA, WebAPI action, etc.

    [AttributeUsage(AttributeTargets.Method | AttributeTargets.Class, AllowMultiple = false, Inherited = true)]
    public class AngularAntiForgeryTokenAttribute : ActionFilterAttribute
    {
        private const string CookieName = "XSRF-TOKEN";
        private readonly IAntiforgery antiforgery;
    
        public AngularAntiForgeryTokenAttribute(IAntiforgery antiforgery)
        {
            this.antiforgery = antiforgery;
        }
    
        public override void OnResultExecuting(ResultExecutingContext context)
        {
            base.OnResultExecuting(context);
    
            if (!context.Cancel)
            {
                var tokens = antiforgery.GetAndStoreTokens(context.HttpContext);
    
                context.HttpContext.Response.Cookies.Append(
                    CookieName,
                    tokens.RequestToken,
                    new CookieOptions { HttpOnly = false });
            }
        }
    }
    
    /* HomeController */
    
    [ServiceFilter(typeof(AngularAntiForgeryTokenAttribute), IsReusable = true)]
    public IActionResult Index()
    {
        return View();
    }
    
    /* AccountController */
    
    [HttpPost()]
    [AllowAnonymous]
    [ValidateAntiForgeryToken]
    // Send new antiforgery token
    [ServiceFilter(typeof(AngularAntiForgeryTokenAttribute), IsReusable = true)]
    public async Task<IActionResult> Register([FromBody] RegisterViewModel model)
    {
        //...
        return Json(new { }); 
    }
    

    Register the attribute in Startup, and configure Antiforgery service to read the request token form "X-XSRF-TOKEN" header.

    public class Startup
    {
        // ...
    
        public void ConfigureServices(IServiceCollection services)
        {
            // ...
    
            services.AddScoped<AngularAntiForgeryTokenAttribute>();
            services.AddAntiforgery(options =>
            {
                options.HeaderName = "X-XSRF-TOKEN";
            });
        }
    }
    
    0 讨论(0)
  • 2020-12-13 17:15

    I think you need to make custom AntiForgeryValidationToken attribute that supports sending token via header instead of form values. Then add token to header of every request from your Angular2 app to your api. Example here How do you set global custom headers in Angular2?

    0 讨论(0)
提交回复
热议问题