Encrypt realm data with dek which is encrypted with kek. The signing keys are also encrypted with the kek.
This commit is contained in:
parent
644b005f2a
commit
650fe99990
36 changed files with 399 additions and 129 deletions
|
|
@ -125,7 +125,7 @@ public class RealmApisTests : IClassFixture<ApplicationFactory>
|
||||||
public async Task GetJwks()
|
public async Task GetJwks()
|
||||||
{
|
{
|
||||||
// setup
|
// setup
|
||||||
IEncryptionService encryptionService = _factory.Services.GetRequiredService<IEncryptionService>();
|
IDekEncryptionService dekEncryptionService = _factory.Services.GetRequiredService<IDekEncryptionService>();
|
||||||
|
|
||||||
using var rsa = RSA.Create(2048);
|
using var rsa = RSA.Create(2048);
|
||||||
RSAParameters parameters = rsa.ExportParameters(includePrivateParameters: false);
|
RSAParameters parameters = rsa.ExportParameters(includePrivateParameters: false);
|
||||||
|
|
@ -134,7 +134,7 @@ public class RealmApisTests : IClassFixture<ApplicationFactory>
|
||||||
{
|
{
|
||||||
Id = Guid.NewGuid(),
|
Id = Guid.NewGuid(),
|
||||||
KeyType = "RSA",
|
KeyType = "RSA",
|
||||||
Key = encryptionService.Encrypt(rsa.ExportPkcs8PrivateKey()),
|
Key = dekEncryptionService.Encrypt(rsa.ExportPkcs8PrivateKey()),
|
||||||
CreatedAt = DateTime.UtcNow,
|
CreatedAt = DateTime.UtcNow,
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -28,7 +28,7 @@ public class ApplicationFactory : WebApplicationFactory<Program>, IAsyncLifetime
|
||||||
new Dictionary<string, string?>
|
new Dictionary<string, string?>
|
||||||
{
|
{
|
||||||
["Db:ConnectionString"] = _postgresqlServer.GetConnectionString(),
|
["Db:ConnectionString"] = _postgresqlServer.GetConnectionString(),
|
||||||
["secrets:master:0:Id"] = "key1",
|
["secrets:master:0:Id"] = "94970f27-3d88-4223-9940-7dd57548f5b5",
|
||||||
["secrets:master:0:Active"] = "true",
|
["secrets:master:0:Active"] = "true",
|
||||||
["secrets:master:0:Algorithm"] = "AES",
|
["secrets:master:0:Algorithm"] = "AES",
|
||||||
["secrets:master:0:Key"] = "GVd07qW0frRX9quPX/X62L88BeRR7+IzgRJHtG7ZzHw=",
|
["secrets:master:0:Key"] = "GVd07qW0frRX9quPX/X62L88BeRR7+IzgRJHtG7ZzHw=",
|
||||||
|
|
|
||||||
|
|
@ -2,6 +2,7 @@ using System.Buffers.Text;
|
||||||
using System.Security.Cryptography;
|
using System.Security.Cryptography;
|
||||||
using IdentityShroud.Core.Contracts;
|
using IdentityShroud.Core.Contracts;
|
||||||
using IdentityShroud.Core.Model;
|
using IdentityShroud.Core.Model;
|
||||||
|
using IdentityShroud.Core.Security;
|
||||||
using IdentityShroud.Core.Security.Keys;
|
using IdentityShroud.Core.Security.Keys;
|
||||||
using IdentityShroud.Core.Services;
|
using IdentityShroud.Core.Services;
|
||||||
using IdentityShroud.TestUtils.Substitutes;
|
using IdentityShroud.TestUtils.Substitutes;
|
||||||
|
|
@ -10,7 +11,9 @@ namespace IdentityShroud.Api.Tests.Mappers;
|
||||||
|
|
||||||
public class KeyServiceTests
|
public class KeyServiceTests
|
||||||
{
|
{
|
||||||
private readonly IEncryptionService _encryptionService = EncryptionServiceSubstitute.CreatePassthrough();
|
private readonly IDekEncryptionService _dekEncryptionService = EncryptionServiceSubstitute.CreatePassthrough();
|
||||||
|
|
||||||
|
//private readonly IDataEncryptionService _dataEncryptionService = Substitute.For<IDataEncryptionService>();
|
||||||
//private readonly IKeyProviderFactory _keyProviderFactory = Substitute.For<IKeyProviderFactory>();
|
//private readonly IKeyProviderFactory _keyProviderFactory = Substitute.For<IKeyProviderFactory>();
|
||||||
|
|
||||||
[Fact]
|
[Fact]
|
||||||
|
|
@ -21,17 +24,19 @@ public class KeyServiceTests
|
||||||
|
|
||||||
RSAParameters parameters = rsa.ExportParameters(includePrivateParameters: false);
|
RSAParameters parameters = rsa.ExportParameters(includePrivateParameters: false);
|
||||||
|
|
||||||
|
DekId kid = DekId.NewId();
|
||||||
|
|
||||||
RealmKey realmKey = new()
|
RealmKey realmKey = new()
|
||||||
{
|
{
|
||||||
Id = new("60bb79cf-4bac-4521-87f2-ac87cc15541f"),
|
Id = new("60bb79cf-4bac-4521-87f2-ac87cc15541f"),
|
||||||
KeyType = "RSA",
|
KeyType = "RSA",
|
||||||
Key = new("", rsa.ExportPkcs8PrivateKey()),
|
Key = new(EncryptionServiceSubstitute.KeyId, rsa.ExportPkcs8PrivateKey()),
|
||||||
CreatedAt = DateTime.UtcNow,
|
CreatedAt = DateTime.UtcNow,
|
||||||
Priority = 10,
|
Priority = 10,
|
||||||
};
|
};
|
||||||
|
|
||||||
// Act
|
// Act
|
||||||
KeyService sut = new(_encryptionService, new KeyProviderFactory(), new ClockService());
|
KeyService sut = new(_dekEncryptionService, new KeyProviderFactory(), new ClockService());
|
||||||
var jwk = sut.CreateJsonWebKey(realmKey);
|
var jwk = sut.CreateJsonWebKey(realmKey);
|
||||||
|
|
||||||
Assert.NotNull(jwk);
|
Assert.NotNull(jwk);
|
||||||
|
|
|
||||||
|
|
@ -38,15 +38,19 @@ void ConfigureBuilder(WebApplicationBuilder builder)
|
||||||
services.AddScoped<Db>();
|
services.AddScoped<Db>();
|
||||||
services.AddScoped<IClientService, ClientService>();
|
services.AddScoped<IClientService, ClientService>();
|
||||||
services.AddSingleton<IClock, ClockService>();
|
services.AddSingleton<IClock, ClockService>();
|
||||||
services.AddSingleton<IEncryptionService, EncryptionService>();
|
services.AddSingleton<IDekEncryptionService, DekEncryptionService>();
|
||||||
|
services.AddScoped<IDataEncryptionService, DataEncryptionService>();
|
||||||
|
services.AddScoped<IRealmContext, RealmContext>();
|
||||||
services.AddScoped<IKeyProviderFactory, KeyProviderFactory>();
|
services.AddScoped<IKeyProviderFactory, KeyProviderFactory>();
|
||||||
services.AddScoped<IKeyService, KeyService>();
|
services.AddScoped<IKeyService, KeyService>();
|
||||||
services.AddScoped<IRealmService, RealmService>();
|
services.AddScoped<IRealmService, RealmService>();
|
||||||
services.AddOptions<DbConfiguration>().Bind(configuration.GetSection("db"));
|
services.AddOptions<DbConfiguration>().Bind(configuration.GetSection("db"));
|
||||||
services.AddSingleton<ISecretProvider, ConfigurationSecretProvider>();
|
services.AddSingleton<ISecretProvider, ConfigurationSecretProvider>();
|
||||||
services.AddScoped<KeyMapper>();
|
services.AddScoped<KeyMapper>();
|
||||||
|
services.AddScoped<IRealmContext, RealmContext>();
|
||||||
|
|
||||||
services.AddValidatorsFromAssemblyContaining<RealmCreateRequestValidator>();
|
services.AddValidatorsFromAssemblyContaining<RealmCreateRequestValidator>();
|
||||||
|
services.AddHttpContextAccessor();
|
||||||
|
|
||||||
builder.Host.UseSerilog((context, services, configuration) => configuration
|
builder.Host.UseSerilog((context, services, configuration) => configuration
|
||||||
.Enrich.FromLogContext()
|
.Enrich.FromLogContext()
|
||||||
|
|
|
||||||
|
|
@ -28,13 +28,13 @@ public class ConfigurationSecretProviderTests
|
||||||
"secrets": {
|
"secrets": {
|
||||||
"master": [
|
"master": [
|
||||||
{
|
{
|
||||||
"Id": "first",
|
"Id": "5676d159-5495-4945-aa84-59ee694aa8a2",
|
||||||
"Active": true,
|
"Active": true,
|
||||||
"Algorithm": "AES",
|
"Algorithm": "AES",
|
||||||
"Key": "yoQ4W7EaNjo7s3FBYkWo5BLyX1BnLyWd7BlSaDIrkzo="
|
"Key": "yoQ4W7EaNjo7s3FBYkWo5BLyX1BnLyWd7BlSaDIrkzo="
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"Id": "second",
|
"Id": "b82489e7-a05a-4d64-b9a5-58d2f2c0dc39",
|
||||||
"Active": false,
|
"Active": false,
|
||||||
"Algorithm": "AES",
|
"Algorithm": "AES",
|
||||||
"Key": "YSWK6vTJXCJOGLpCo+TtZ6anKNzvA1VT2xXLHbmq4M0="
|
"Key": "YSWK6vTJXCJOGLpCo+TtZ6anKNzvA1VT2xXLHbmq4M0="
|
||||||
|
|
@ -47,15 +47,17 @@ public class ConfigurationSecretProviderTests
|
||||||
|
|
||||||
ConfigurationSecretProvider sut = new(BuildConfigFromJson(jsonConfig));
|
ConfigurationSecretProvider sut = new(BuildConfigFromJson(jsonConfig));
|
||||||
|
|
||||||
|
// act
|
||||||
var keys = sut.GetKeys("master");
|
var keys = sut.GetKeys("master");
|
||||||
|
|
||||||
|
// verify
|
||||||
Assert.Equal(2, keys.Length);
|
Assert.Equal(2, keys.Length);
|
||||||
var active = keys.Single(k => k.Active);
|
var active = keys.Single(k => k.Active);
|
||||||
Assert.Equal("first", active.Id);
|
Assert.Equal(new Guid("5676d159-5495-4945-aa84-59ee694aa8a2"), active.Id.Id);
|
||||||
Assert.Equal("AES", active.Algorithm);
|
Assert.Equal("AES", active.Algorithm);
|
||||||
Assert.Equal(Convert.FromBase64String("yoQ4W7EaNjo7s3FBYkWo5BLyX1BnLyWd7BlSaDIrkzo="), active.Key);
|
Assert.Equal(Convert.FromBase64String("yoQ4W7EaNjo7s3FBYkWo5BLyX1BnLyWd7BlSaDIrkzo="), active.Key);
|
||||||
|
|
||||||
var inactive = keys.Single(k => !k.Active);
|
var inactive = keys.Single(k => !k.Active);
|
||||||
Assert.Equal("second", inactive.Id);
|
Assert.Equal(new Guid("b82489e7-a05a-4d64-b9a5-58d2f2c0dc39"), inactive.Id.Id);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
@ -1,5 +1,6 @@
|
||||||
using IdentityShroud.Core.Contracts;
|
using IdentityShroud.Core.Contracts;
|
||||||
using IdentityShroud.Core.Model;
|
using IdentityShroud.Core.Model;
|
||||||
|
using IdentityShroud.Core.Security;
|
||||||
using IdentityShroud.Core.Services;
|
using IdentityShroud.Core.Services;
|
||||||
using IdentityShroud.Core.Tests.Fixtures;
|
using IdentityShroud.Core.Tests.Fixtures;
|
||||||
using IdentityShroud.TestUtils.Substitutes;
|
using IdentityShroud.TestUtils.Substitutes;
|
||||||
|
|
@ -10,12 +11,17 @@ namespace IdentityShroud.Core.Tests.Services;
|
||||||
public class ClientServiceTests : IClassFixture<DbFixture>
|
public class ClientServiceTests : IClassFixture<DbFixture>
|
||||||
{
|
{
|
||||||
private readonly DbFixture _dbFixture;
|
private readonly DbFixture _dbFixture;
|
||||||
private readonly IEncryptionService _encryptionService = EncryptionServiceSubstitute.CreatePassthrough();
|
//private readonly IDekEncryptionService _dekEncryptionService = EncryptionServiceSubstitute.CreatePassthrough();
|
||||||
|
private readonly IDataEncryptionService _dataEncryptionService = Substitute.For<IDataEncryptionService>();
|
||||||
|
|
||||||
private readonly IClock _clock = Substitute.For<IClock>();
|
private readonly IClock _clock = Substitute.For<IClock>();
|
||||||
private readonly Guid _realmId = new("a1b2c3d4-0000-0000-0000-000000000001");
|
private readonly Guid _realmId = new("a1b2c3d4-0000-0000-0000-000000000001");
|
||||||
|
|
||||||
public ClientServiceTests(DbFixture dbFixture)
|
public ClientServiceTests(DbFixture dbFixture)
|
||||||
{
|
{
|
||||||
|
_dataEncryptionService.Encrypt(Arg.Any<ReadOnlyMemory<byte>>())
|
||||||
|
.Returns(x => new EncryptedValue(DekId.NewId(), x.ArgAt<ReadOnlyMemory<byte>>(0).ToArray()));
|
||||||
|
|
||||||
_dbFixture = dbFixture;
|
_dbFixture = dbFixture;
|
||||||
using Db db = dbFixture.CreateDbContext();
|
using Db db = dbFixture.CreateDbContext();
|
||||||
if (!db.Database.EnsureCreated())
|
if (!db.Database.EnsureCreated())
|
||||||
|
|
@ -51,7 +57,7 @@ public class ClientServiceTests : IClassFixture<DbFixture>
|
||||||
await using (var db = _dbFixture.CreateDbContext())
|
await using (var db = _dbFixture.CreateDbContext())
|
||||||
{
|
{
|
||||||
// Act
|
// Act
|
||||||
ClientService sut = new(db, _encryptionService, _clock);
|
ClientService sut = new(db, _dataEncryptionService, _clock);
|
||||||
var response = await sut.Create(
|
var response = await sut.Create(
|
||||||
_realmId,
|
_realmId,
|
||||||
new ClientCreateRequest
|
new ClientCreateRequest
|
||||||
|
|
@ -107,7 +113,7 @@ public class ClientServiceTests : IClassFixture<DbFixture>
|
||||||
|
|
||||||
await using var actContext = _dbFixture.CreateDbContext();
|
await using var actContext = _dbFixture.CreateDbContext();
|
||||||
// Act
|
// Act
|
||||||
ClientService sut = new(actContext, _encryptionService, _clock);
|
ClientService sut = new(actContext, _dataEncryptionService, _clock);
|
||||||
Client? result = await sut.GetByClientId(_realmId, clientId, TestContext.Current.CancellationToken);
|
Client? result = await sut.GetByClientId(_realmId, clientId, TestContext.Current.CancellationToken);
|
||||||
|
|
||||||
// Verify
|
// Verify
|
||||||
|
|
@ -142,7 +148,7 @@ public class ClientServiceTests : IClassFixture<DbFixture>
|
||||||
|
|
||||||
await using var actContext = _dbFixture.CreateDbContext();
|
await using var actContext = _dbFixture.CreateDbContext();
|
||||||
// Act
|
// Act
|
||||||
ClientService sut = new(actContext, _encryptionService, _clock);
|
ClientService sut = new(actContext, _dataEncryptionService, _clock);
|
||||||
Client? result = await sut.FindById(_realmId, searchId, TestContext.Current.CancellationToken);
|
Client? result = await sut.FindById(_realmId, searchId, TestContext.Current.CancellationToken);
|
||||||
|
|
||||||
// Verify
|
// Verify
|
||||||
|
|
|
||||||
|
|
@ -1,9 +1,10 @@
|
||||||
using IdentityShroud.Core.Contracts;
|
using IdentityShroud.Core.Contracts;
|
||||||
|
using IdentityShroud.Core.Security;
|
||||||
using IdentityShroud.Core.Services;
|
using IdentityShroud.Core.Services;
|
||||||
|
|
||||||
namespace IdentityShroud.Core.Tests.Services;
|
namespace IdentityShroud.Core.Tests.Services;
|
||||||
|
|
||||||
public class EncryptionServiceTests
|
public class DekEncryptionServiceTests
|
||||||
{
|
{
|
||||||
[Fact]
|
[Fact]
|
||||||
public void RoundtripWorks()
|
public void RoundtripWorks()
|
||||||
|
|
@ -13,9 +14,9 @@ public class EncryptionServiceTests
|
||||||
// setup
|
// setup
|
||||||
byte[] keyValue = Convert.FromBase64String("IGd9yUMusjNW0ezv8ink3QWlAHKFH45d21LyrbJTokw=");
|
byte[] keyValue = Convert.FromBase64String("IGd9yUMusjNW0ezv8ink3QWlAHKFH45d21LyrbJTokw=");
|
||||||
var secretProvider = Substitute.For<ISecretProvider>();
|
var secretProvider = Substitute.For<ISecretProvider>();
|
||||||
EncryptionKey[] keys =
|
KeyEncryptionKey[] keys =
|
||||||
[
|
[
|
||||||
new EncryptionKey("1", true, "AES", keyValue)
|
new KeyEncryptionKey(KekId.NewId(), true, "AES", keyValue)
|
||||||
];
|
];
|
||||||
secretProvider.GetKeys("master").Returns(keys);
|
secretProvider.GetKeys("master").Returns(keys);
|
||||||
|
|
||||||
|
|
@ -23,68 +24,38 @@ public class EncryptionServiceTests
|
||||||
ReadOnlySpan<byte> input = "Hello, World!"u8;
|
ReadOnlySpan<byte> input = "Hello, World!"u8;
|
||||||
|
|
||||||
// act
|
// act
|
||||||
EncryptionService sut = new(secretProvider);
|
DekEncryptionService sut = new(secretProvider);
|
||||||
EncryptedValue cipher = sut.Encrypt(input.ToArray());
|
EncryptedDek cipher = sut.Encrypt(input.ToArray());
|
||||||
byte[] result = sut.Decrypt(cipher);
|
byte[] result = sut.Decrypt(cipher);
|
||||||
|
|
||||||
// verify
|
// verify
|
||||||
Assert.Equal(input, result);
|
Assert.Equal(input, result);
|
||||||
}
|
}
|
||||||
|
|
||||||
[Fact]
|
|
||||||
public void DecodeV1_Success()
|
|
||||||
{
|
|
||||||
// When introducing a new version we need version specific tests to
|
|
||||||
// make sure decoding of legacy data still works.
|
|
||||||
|
|
||||||
// setup
|
|
||||||
byte[] cipher =
|
|
||||||
[
|
|
||||||
1, 198, 55, 58, 56, 110, 238, 59, 158, 214, 85, 241, 26, 44, 140, 229, 128, 111, 167, 154, 160, 177, 152,
|
|
||||||
193, 74, 4, 235, 82, 207, 87, 32, 10, 239, 4, 246, 25, 21, 249, 25, 59, 160, 101
|
|
||||||
];
|
|
||||||
EncryptedValue secret = new("kid", cipher);
|
|
||||||
|
|
||||||
byte[] keyValue = Convert.FromBase64String("IGd9yUMusjNW0ezv8ink3QWlAHKFH45d21LyrbJTokw=");
|
|
||||||
var secretProvider = Substitute.For<ISecretProvider>();
|
|
||||||
EncryptionKey[] keys =
|
|
||||||
[
|
|
||||||
new EncryptionKey("kid", true, "AES", keyValue)
|
|
||||||
];
|
|
||||||
secretProvider.GetKeys("master").Returns(keys);
|
|
||||||
|
|
||||||
// act
|
|
||||||
EncryptionService sut = new(secretProvider);
|
|
||||||
byte[] result = sut.Decrypt(secret);
|
|
||||||
|
|
||||||
// verify
|
|
||||||
Assert.Equal("Hello, World!"u8, result);
|
|
||||||
}
|
|
||||||
|
|
||||||
[Fact]
|
[Fact]
|
||||||
public void DetectsCorruptInput()
|
public void DetectsCorruptInput()
|
||||||
{
|
{
|
||||||
// When introducing a new version we need version specific tests to
|
// When introducing a new version we need version specific tests to
|
||||||
// make sure decoding of legacy data still works.
|
// make sure decoding of legacy data still works.
|
||||||
|
KekId kid = KekId.NewId();
|
||||||
// setup
|
// setup
|
||||||
byte[] cipher = // NOTE INCORRECT CIPHER DO NOT USE IN OTHER TESTS
|
byte[] cipher = // NOTE INCORRECT CIPHER DO NOT USE IN OTHER TESTS
|
||||||
[
|
[
|
||||||
1, 198, 55, 58, 56, 110, 238, 59, 158, 214, 85, 241, 26, 44, 140, 229, 128, 111, 167, 154, 160, 177, 152,
|
1, 198, 55, 58, 56, 110, 238, 59, 158, 214, 85, 241, 26, 44, 140, 229, 128, 111, 167, 154, 160, 177, 152,
|
||||||
193, 75, 4, 235, 82, 207, 87, 32, 10, 239, 4, 246, 25, 21, 249, 25, 59, 160, 101
|
193, 75, 4, 235, 82, 207, 87, 32, 10, 239, 4, 246, 25, 21, 249, 25, 59, 160, 101
|
||||||
];
|
];
|
||||||
EncryptedValue secret = new("kid", cipher);
|
EncryptedDek secret = new(kid, cipher);
|
||||||
|
|
||||||
byte[] keyValue = Convert.FromBase64String("IGd9yUMusjNW0ezv8ink3QWlAHKFH45d21LyrbJTokw=");
|
byte[] keyValue = Convert.FromBase64String("IGd9yUMusjNW0ezv8ink3QWlAHKFH45d21LyrbJTokw=");
|
||||||
var secretProvider = Substitute.For<ISecretProvider>();
|
var secretProvider = Substitute.For<ISecretProvider>();
|
||||||
EncryptionKey[] keys =
|
KeyEncryptionKey[] keys =
|
||||||
[
|
[
|
||||||
new EncryptionKey("kid", true, "AES", keyValue)
|
new KeyEncryptionKey(kid, true, "AES", keyValue)
|
||||||
];
|
];
|
||||||
secretProvider.GetKeys("master").Returns(keys);
|
secretProvider.GetKeys("master").Returns(keys);
|
||||||
|
|
||||||
// act
|
// act
|
||||||
EncryptionService sut = new(secretProvider);
|
DekEncryptionService sut = new(secretProvider);
|
||||||
Assert.Throws<InvalidOperationException>(
|
Assert.Throws<InvalidOperationException>(
|
||||||
() => sut.Decrypt(secret),
|
() => sut.Decrypt(secret),
|
||||||
ex => ex.Message.Contains("Decryption failed") ? null : "Expected Decryption failed in message");
|
ex => ex.Message.Contains("Decryption failed") ? null : "Expected Decryption failed in message");
|
||||||
|
|
@ -96,25 +67,28 @@ public class EncryptionServiceTests
|
||||||
// The key is marked inactive also it is the second key
|
// The key is marked inactive also it is the second key
|
||||||
|
|
||||||
// setup
|
// setup
|
||||||
|
KekId kid1 = KekId.NewId();
|
||||||
|
KekId kid2 = KekId.NewId();
|
||||||
|
|
||||||
byte[] cipher =
|
byte[] cipher =
|
||||||
[
|
[
|
||||||
1, 198, 55, 58, 56, 110, 238, 59, 158, 214, 85, 241, 26, 44, 140, 229, 128, 111, 167, 154, 160, 177, 152,
|
1, 198, 55, 58, 56, 110, 238, 59, 158, 214, 85, 241, 26, 44, 140, 229, 128, 111, 167, 154, 160, 177, 152,
|
||||||
193, 74, 4, 235, 82, 207, 87, 32, 10, 239, 4, 246, 25, 21, 249, 25, 59, 160, 101
|
193, 74, 4, 235, 82, 207, 87, 32, 10, 239, 4, 246, 25, 21, 249, 25, 59, 160, 101
|
||||||
];
|
];
|
||||||
EncryptedValue secret = new("1", cipher);
|
EncryptedDek secret = new(kid1, cipher);
|
||||||
|
|
||||||
byte[] keyValue1 = Convert.FromBase64String("IGd9yUMusjNW0ezv8ink3QWlAHKFH45d21LyrbJTokw=");
|
byte[] keyValue1 = Convert.FromBase64String("IGd9yUMusjNW0ezv8ink3QWlAHKFH45d21LyrbJTokw=");
|
||||||
byte[] keyValue2 = Convert.FromBase64String("Dat1RwRvuLX3wdKMMP4NwHdBl8tJJsKfp01qikyo8aw=");
|
byte[] keyValue2 = Convert.FromBase64String("Dat1RwRvuLX3wdKMMP4NwHdBl8tJJsKfp01qikyo8aw=");
|
||||||
var secretProvider = Substitute.For<ISecretProvider>();
|
var secretProvider = Substitute.For<ISecretProvider>();
|
||||||
EncryptionKey[] keys =
|
KeyEncryptionKey[] keys =
|
||||||
[
|
[
|
||||||
new EncryptionKey("2", true, "AES", keyValue2),
|
new KeyEncryptionKey(kid2, true, "AES", keyValue2),
|
||||||
new EncryptionKey("1", false, "AES", keyValue1),
|
new KeyEncryptionKey(kid1, false, "AES", keyValue1),
|
||||||
];
|
];
|
||||||
secretProvider.GetKeys("master").Returns(keys);
|
secretProvider.GetKeys("master").Returns(keys);
|
||||||
|
|
||||||
// act
|
// act
|
||||||
EncryptionService sut = new(secretProvider);
|
DekEncryptionService sut = new(secretProvider);
|
||||||
byte[] result = sut.Decrypt(secret);
|
byte[] result = sut.Decrypt(secret);
|
||||||
|
|
||||||
// verify
|
// verify
|
||||||
|
|
@ -125,22 +99,25 @@ public class EncryptionServiceTests
|
||||||
public void EncryptionUsesActiveKey()
|
public void EncryptionUsesActiveKey()
|
||||||
{
|
{
|
||||||
// setup
|
// setup
|
||||||
|
KekId kid1 = KekId.NewId();
|
||||||
|
KekId kid2 = KekId.NewId();
|
||||||
|
|
||||||
byte[] keyValue1 = Convert.FromBase64String("IGd9yUMusjNW0ezv8ink3QWlAHKFH45d21LyrbJTokw=");
|
byte[] keyValue1 = Convert.FromBase64String("IGd9yUMusjNW0ezv8ink3QWlAHKFH45d21LyrbJTokw=");
|
||||||
byte[] keyValue2 = Convert.FromBase64String("Dat1RwRvuLX3wdKMMP4NwHdBl8tJJsKfp01qikyo8aw=");
|
byte[] keyValue2 = Convert.FromBase64String("Dat1RwRvuLX3wdKMMP4NwHdBl8tJJsKfp01qikyo8aw=");
|
||||||
var secretProvider = Substitute.For<ISecretProvider>();
|
var secretProvider = Substitute.For<ISecretProvider>();
|
||||||
EncryptionKey[] keys =
|
KeyEncryptionKey[] keys =
|
||||||
[
|
[
|
||||||
new EncryptionKey("1", false, "AES", keyValue1),
|
new KeyEncryptionKey(kid1, false, "AES", keyValue1),
|
||||||
new EncryptionKey("2", true, "AES", keyValue2),
|
new KeyEncryptionKey(kid2, true, "AES", keyValue2),
|
||||||
];
|
];
|
||||||
secretProvider.GetKeys("master").Returns(keys);
|
secretProvider.GetKeys("master").Returns(keys);
|
||||||
|
|
||||||
ReadOnlySpan<byte> input = "Hello, World!"u8;
|
ReadOnlySpan<byte> input = "Hello, World!"u8;
|
||||||
// act
|
// act
|
||||||
EncryptionService sut = new(secretProvider);
|
DekEncryptionService sut = new(secretProvider);
|
||||||
EncryptedValue cipher = sut.Encrypt(input.ToArray());
|
EncryptedDek cipher = sut.Encrypt(input.ToArray());
|
||||||
|
|
||||||
// Verify
|
// Verify
|
||||||
Assert.Equal("2", cipher.KeyId);
|
Assert.Equal(kid2, cipher.KekId);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
30
IdentityShroud.Core.Tests/Services/EncryptionTests.cs
Normal file
30
IdentityShroud.Core.Tests/Services/EncryptionTests.cs
Normal file
|
|
@ -0,0 +1,30 @@
|
||||||
|
using IdentityShroud.Core.Security;
|
||||||
|
using IdentityShroud.Core.Services;
|
||||||
|
|
||||||
|
namespace IdentityShroud.Core.Tests.Services;
|
||||||
|
|
||||||
|
public class EncryptionTests
|
||||||
|
{
|
||||||
|
[Fact]
|
||||||
|
public void DecodeV1_Success()
|
||||||
|
{
|
||||||
|
// When introducing a new version we need version specific tests to
|
||||||
|
// make sure decoding of legacy data still works.
|
||||||
|
|
||||||
|
// setup
|
||||||
|
byte[] cipher =
|
||||||
|
[
|
||||||
|
1, 198, 55, 58, 56, 110, 238, 59, 158, 214, 85, 241, 26, 44, 140, 229, 128, 111, 167, 154, 160, 177, 152,
|
||||||
|
193, 74, 4, 235, 82, 207, 87, 32, 10, 239, 4, 246, 25, 21, 249, 25, 59, 160, 101
|
||||||
|
];
|
||||||
|
byte[] keyValue = Convert.FromBase64String("IGd9yUMusjNW0ezv8ink3QWlAHKFH45d21LyrbJTokw=");
|
||||||
|
|
||||||
|
// act
|
||||||
|
byte[] result = Encryption.Decrypt(cipher, keyValue);
|
||||||
|
|
||||||
|
// verify
|
||||||
|
Assert.Equal("Hello, World!"u8, result);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
|
|
@ -1,5 +1,6 @@
|
||||||
using IdentityShroud.Core.Contracts;
|
using IdentityShroud.Core.Contracts;
|
||||||
using IdentityShroud.Core.Model;
|
using IdentityShroud.Core.Model;
|
||||||
|
using IdentityShroud.Core.Security;
|
||||||
using IdentityShroud.Core.Security.Keys;
|
using IdentityShroud.Core.Security.Keys;
|
||||||
using IdentityShroud.Core.Services;
|
using IdentityShroud.Core.Services;
|
||||||
using IdentityShroud.Core.Tests.Fixtures;
|
using IdentityShroud.Core.Tests.Fixtures;
|
||||||
|
|
@ -43,7 +44,7 @@ public class RealmServiceTests : IClassFixture<DbFixture>
|
||||||
{
|
{
|
||||||
Id = Guid.NewGuid(),
|
Id = Guid.NewGuid(),
|
||||||
KeyType = "TST",
|
KeyType = "TST",
|
||||||
Key = new("kid", [21]),
|
Key = new(KekId.NewId(), [21]),
|
||||||
CreatedAt = DateTime.UtcNow
|
CreatedAt = DateTime.UtcNow
|
||||||
});
|
});
|
||||||
// Act
|
// Act
|
||||||
|
|
|
||||||
|
|
@ -35,7 +35,6 @@ public class UnitTest1
|
||||||
|
|
||||||
// Option 3: Generate a new key for testing
|
// Option 3: Generate a new key for testing
|
||||||
rsa.KeySize = 2048;
|
rsa.KeySize = 2048;
|
||||||
|
|
||||||
// Your already encoded header and payload
|
// Your already encoded header and payload
|
||||||
string header = "eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJybVZ3TU5rM0o1WHlmMWhyS3NVbEVYN1BNUm42dlZKY0h3U3FYMUVQRnFJIn0";
|
string header = "eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJybVZ3TU5rM0o1WHlmMWhyS3NVbEVYN1BNUm42dlZKY0h3U3FYMUVQRnFJIn0";
|
||||||
string payload = "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";
|
string payload = "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";
|
||||||
|
|
@ -51,6 +50,15 @@ public class UnitTest1
|
||||||
// Or generate complete JWT
|
// Or generate complete JWT
|
||||||
// string completeJwt = JwtSignatureGenerator.GenerateCompleteJwt(header, payload, rsa);
|
// string completeJwt = JwtSignatureGenerator.GenerateCompleteJwt(header, payload, rsa);
|
||||||
// Console.WriteLine($"Complete JWT: {completeJwt}");
|
// Console.WriteLine($"Complete JWT: {completeJwt}");
|
||||||
|
|
||||||
|
rsa.ExportRSAPublicKey(); // PKCS#1
|
||||||
|
}
|
||||||
|
|
||||||
|
using (ECDsa dsa = ECDsa.Create())
|
||||||
|
{
|
||||||
|
dsa.ExportPkcs8PrivateKey();
|
||||||
|
|
||||||
|
dsa.ExportSubjectPublicKeyInfo(); // x509
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,8 @@
|
||||||
|
using IdentityShroud.Core.Security;
|
||||||
|
|
||||||
namespace IdentityShroud.Core.Contracts;
|
namespace IdentityShroud.Core.Contracts;
|
||||||
|
|
||||||
public interface IEncryptionService
|
public interface IDataEncryptionService
|
||||||
{
|
{
|
||||||
EncryptedValue Encrypt(ReadOnlyMemory<byte> plain);
|
EncryptedValue Encrypt(ReadOnlyMemory<byte> plain);
|
||||||
byte[] Decrypt(EncryptedValue input);
|
byte[] Decrypt(EncryptedValue input);
|
||||||
11
IdentityShroud.Core/Contracts/IDekEncryptionService.cs
Normal file
11
IdentityShroud.Core/Contracts/IDekEncryptionService.cs
Normal file
|
|
@ -0,0 +1,11 @@
|
||||||
|
using IdentityShroud.Core.Security;
|
||||||
|
|
||||||
|
namespace IdentityShroud.Core.Contracts;
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
public interface IDekEncryptionService
|
||||||
|
{
|
||||||
|
EncryptedDek Encrypt(ReadOnlyMemory<byte> plain);
|
||||||
|
byte[] Decrypt(EncryptedDek input);
|
||||||
|
}
|
||||||
9
IdentityShroud.Core/Contracts/IRealmContext.cs
Normal file
9
IdentityShroud.Core/Contracts/IRealmContext.cs
Normal file
|
|
@ -0,0 +1,9 @@
|
||||||
|
using IdentityShroud.Core.Model;
|
||||||
|
|
||||||
|
namespace IdentityShroud.Core.Contracts;
|
||||||
|
|
||||||
|
public interface IRealmContext
|
||||||
|
{
|
||||||
|
public Realm GetRealm();
|
||||||
|
Task<IList<RealmDek>> GetDeks(CancellationToken ct = default);
|
||||||
|
}
|
||||||
|
|
@ -11,4 +11,5 @@ public interface IRealmService
|
||||||
|
|
||||||
Task<Result<RealmCreateResponse>> Create(RealmCreateRequest request, CancellationToken ct = default);
|
Task<Result<RealmCreateResponse>> Create(RealmCreateRequest request, CancellationToken ct = default);
|
||||||
Task LoadActiveKeys(Realm realm);
|
Task LoadActiveKeys(Realm realm);
|
||||||
|
Task LoadDeks(Realm realm);
|
||||||
}
|
}
|
||||||
|
|
@ -1,3 +1,5 @@
|
||||||
|
using IdentityShroud.Core.Security;
|
||||||
|
|
||||||
namespace IdentityShroud.Core.Contracts;
|
namespace IdentityShroud.Core.Contracts;
|
||||||
|
|
||||||
public interface ISecretProvider
|
public interface ISecretProvider
|
||||||
|
|
@ -8,5 +10,5 @@ public interface ISecretProvider
|
||||||
/// Should return one active key, might return inactive keys.
|
/// Should return one active key, might return inactive keys.
|
||||||
/// </summary>
|
/// </summary>
|
||||||
/// <returns></returns>
|
/// <returns></returns>
|
||||||
EncryptionKey[] GetKeys(string name);
|
KeyEncryptionKey[] GetKeys(string name);
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,5 +1,7 @@
|
||||||
using IdentityShroud.Core.Model;
|
using IdentityShroud.Core.Model;
|
||||||
|
using IdentityShroud.Core.Security;
|
||||||
using Microsoft.EntityFrameworkCore;
|
using Microsoft.EntityFrameworkCore;
|
||||||
|
using Microsoft.EntityFrameworkCore.Storage.ValueConversion;
|
||||||
using Microsoft.Extensions.Logging;
|
using Microsoft.Extensions.Logging;
|
||||||
using Microsoft.Extensions.Options;
|
using Microsoft.Extensions.Options;
|
||||||
|
|
||||||
|
|
@ -19,6 +21,40 @@ public class Db(
|
||||||
public virtual DbSet<Client> Clients { get; set; }
|
public virtual DbSet<Client> Clients { get; set; }
|
||||||
public virtual DbSet<Realm> Realms { get; set; }
|
public virtual DbSet<Realm> Realms { get; set; }
|
||||||
public virtual DbSet<RealmKey> Keys { get; set; }
|
public virtual DbSet<RealmKey> Keys { get; set; }
|
||||||
|
public virtual DbSet<RealmDek> Deks { get; set; }
|
||||||
|
|
||||||
|
protected override void OnModelCreating(ModelBuilder modelBuilder)
|
||||||
|
{
|
||||||
|
var dekIdConverter = new ValueConverter<DekId, Guid>(
|
||||||
|
id => id.Id,
|
||||||
|
guid => new DekId(guid));
|
||||||
|
|
||||||
|
var kekIdConverter = new ValueConverter<KekId, Guid>(
|
||||||
|
id => id.Id,
|
||||||
|
guid => new KekId(guid));
|
||||||
|
|
||||||
|
modelBuilder.Entity<RealmDek>()
|
||||||
|
.Property(d => d.Id)
|
||||||
|
.HasConversion(dekIdConverter);
|
||||||
|
|
||||||
|
modelBuilder.Entity<RealmDek>()
|
||||||
|
.OwnsOne(d => d.KeyData, keyData =>
|
||||||
|
{
|
||||||
|
keyData.Property(k => k.KekId).HasConversion(kekIdConverter);
|
||||||
|
});
|
||||||
|
|
||||||
|
modelBuilder.Entity<RealmKey>()
|
||||||
|
.OwnsOne(k => k.Key, key =>
|
||||||
|
{
|
||||||
|
key.Property(k => k.KekId).HasConversion(kekIdConverter);
|
||||||
|
});
|
||||||
|
|
||||||
|
modelBuilder.Entity<ClientSecret>()
|
||||||
|
.OwnsOne(c => c.Secret, secret =>
|
||||||
|
{
|
||||||
|
secret.Property(s => s.DekId).HasConversion(dekIdConverter);
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
protected override void OnConfiguring(DbContextOptionsBuilder optionsBuilder)
|
protected override void OnConfiguring(DbContextOptionsBuilder optionsBuilder)
|
||||||
{
|
{
|
||||||
|
|
|
||||||
|
|
@ -12,6 +12,7 @@
|
||||||
<PackageReference Include="FluentValidation" Version="12.1.1" />
|
<PackageReference Include="FluentValidation" Version="12.1.1" />
|
||||||
<PackageReference Include="jose-jwt" Version="5.2.0" />
|
<PackageReference Include="jose-jwt" Version="5.2.0" />
|
||||||
<PackageReference Include="LanguageExt.Core" Version="4.4.9" />
|
<PackageReference Include="LanguageExt.Core" Version="4.4.9" />
|
||||||
|
<PackageReference Include="Microsoft.AspNetCore.Http.Abstractions" Version="2.3.9" />
|
||||||
<PackageReference Include="Microsoft.Extensions.Configuration.Binder" Version="10.0.2" />
|
<PackageReference Include="Microsoft.Extensions.Configuration.Binder" Version="10.0.2" />
|
||||||
<PackageReference Include="Microsoft.AspNetCore.WebUtilities" Version="10.0.2" />
|
<PackageReference Include="Microsoft.AspNetCore.WebUtilities" Version="10.0.2" />
|
||||||
<PackageReference Include="Npgsql.EntityFrameworkCore.PostgreSQL" Version="10.0.0" />
|
<PackageReference Include="Npgsql.EntityFrameworkCore.PostgreSQL" Version="10.0.0" />
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,7 @@
|
||||||
using System.ComponentModel.DataAnnotations;
|
using System.ComponentModel.DataAnnotations;
|
||||||
using System.ComponentModel.DataAnnotations.Schema;
|
using System.ComponentModel.DataAnnotations.Schema;
|
||||||
using IdentityShroud.Core.Contracts;
|
using IdentityShroud.Core.Contracts;
|
||||||
|
using IdentityShroud.Core.Security;
|
||||||
|
|
||||||
namespace IdentityShroud.Core.Model;
|
namespace IdentityShroud.Core.Model;
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -21,9 +21,20 @@ public class Realm
|
||||||
|
|
||||||
public List<RealmKey> Keys { get; init; } = [];
|
public List<RealmKey> Keys { get; init; } = [];
|
||||||
|
|
||||||
|
public List<RealmDek> Deks { get; init; } = [];
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
/// Can be overriden per client
|
/// Can be overriden per client
|
||||||
/// </summary>
|
/// </summary>
|
||||||
public string DefaultSignatureAlgorithm { get; set; } = JsonWebAlgorithm.RS256;
|
public string DefaultSignatureAlgorithm { get; set; } = JsonWebAlgorithm.RS256;
|
||||||
|
}
|
||||||
|
|
||||||
|
[Table("realm_dek")]
|
||||||
|
public record RealmDek
|
||||||
|
{
|
||||||
|
public required DekId Id { get; init; }
|
||||||
|
public required bool Active { get; init; }
|
||||||
|
public required string Algorithm { get; init; }
|
||||||
|
public required EncryptedDek KeyData { get; init; }
|
||||||
|
public required Guid RealmId { get; init; }
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,5 +1,6 @@
|
||||||
using System.ComponentModel.DataAnnotations.Schema;
|
using System.ComponentModel.DataAnnotations.Schema;
|
||||||
using IdentityShroud.Core.Contracts;
|
using IdentityShroud.Core.Contracts;
|
||||||
|
using IdentityShroud.Core.Security;
|
||||||
using Microsoft.EntityFrameworkCore;
|
using Microsoft.EntityFrameworkCore;
|
||||||
|
|
||||||
namespace IdentityShroud.Core.Model;
|
namespace IdentityShroud.Core.Model;
|
||||||
|
|
@ -12,7 +13,7 @@ public record RealmKey
|
||||||
public required string KeyType { get; init; }
|
public required string KeyType { get; init; }
|
||||||
|
|
||||||
|
|
||||||
public required EncryptedValue Key { get; init; }
|
public required EncryptedDek Key { get; init; }
|
||||||
public required DateTime CreatedAt { get; init; }
|
public required DateTime CreatedAt { get; init; }
|
||||||
public DateTime? RevokedAt { get; set; }
|
public DateTime? RevokedAt { get; set; }
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -15,8 +15,8 @@ public class ConfigurationSecretProvider(IConfiguration configuration) : ISecret
|
||||||
return secrets.GetValue<string>(name) ?? "";
|
return secrets.GetValue<string>(name) ?? "";
|
||||||
}
|
}
|
||||||
|
|
||||||
public EncryptionKey[] GetKeys(string name)
|
public KeyEncryptionKey[] GetKeys(string name)
|
||||||
{
|
{
|
||||||
return secrets.GetSection(name).Get<EncryptionKey[]>() ?? [];
|
return secrets.GetSection(name).Get<KeyEncryptionKey[]>() ?? [];
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
6
IdentityShroud.Core/Security/DekId.cs
Normal file
6
IdentityShroud.Core/Security/DekId.cs
Normal file
|
|
@ -0,0 +1,6 @@
|
||||||
|
namespace IdentityShroud.Core.Security;
|
||||||
|
|
||||||
|
public record struct DekId(Guid Id)
|
||||||
|
{
|
||||||
|
public static DekId NewId() => new(Guid.NewGuid());
|
||||||
|
}
|
||||||
6
IdentityShroud.Core/Security/EncryptedDek.cs
Normal file
6
IdentityShroud.Core/Security/EncryptedDek.cs
Normal file
|
|
@ -0,0 +1,6 @@
|
||||||
|
using Microsoft.EntityFrameworkCore;
|
||||||
|
|
||||||
|
namespace IdentityShroud.Core.Security;
|
||||||
|
|
||||||
|
[Owned]
|
||||||
|
public record EncryptedDek(KekId KekId, byte[] Value);
|
||||||
|
|
@ -1,6 +1,8 @@
|
||||||
using Microsoft.EntityFrameworkCore;
|
using Microsoft.EntityFrameworkCore;
|
||||||
|
|
||||||
namespace IdentityShroud.Core.Contracts;
|
namespace IdentityShroud.Core.Security;
|
||||||
|
|
||||||
[Owned]
|
[Owned]
|
||||||
public record EncryptedValue(string KeyId, byte[] Value);
|
public record EncryptedValue(DekId DekId, byte[] Value);
|
||||||
|
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,36 +1,18 @@
|
||||||
using System.Security.Cryptography;
|
using System.Security.Cryptography;
|
||||||
using IdentityShroud.Core.Contracts;
|
|
||||||
|
|
||||||
namespace IdentityShroud.Core.Services;
|
namespace IdentityShroud.Core.Security;
|
||||||
|
|
||||||
/// <summary>
|
public static class Encryption
|
||||||
///
|
|
||||||
/// </summary>
|
|
||||||
public class EncryptionService : IEncryptionService
|
|
||||||
{
|
{
|
||||||
private record struct AlgVersion(int NonceSize, int TagSize);
|
private record struct AlgVersion(int Version, int NonceSize, int TagSize);
|
||||||
|
|
||||||
private AlgVersion[] _versions =
|
private static AlgVersion[] _versions =
|
||||||
[
|
[
|
||||||
new(0, 0), // version 0 does not realy exist
|
new(0, 0, 0), // version 0 does not realy exist
|
||||||
new (12, 16), // version 1
|
new(1, 12, 16), // version 1
|
||||||
];
|
];
|
||||||
|
|
||||||
// Note this array is expected to have one item in it most of the during key rotation it will have two
|
public static byte[] Encrypt(ReadOnlyMemory<byte> plaintext, ReadOnlySpan<byte> key)
|
||||||
// until it is ensured the old key can safely be removed. More then two will work but is not really expected.
|
|
||||||
private readonly EncryptionKey[] _encryptionKeys;
|
|
||||||
|
|
||||||
private EncryptionKey ActiveKey => _encryptionKeys.Single(k => k.Active);
|
|
||||||
private EncryptionKey GetKey(string keyId) => _encryptionKeys.Single(k => k.Id == keyId);
|
|
||||||
|
|
||||||
public EncryptionService(ISecretProvider secretProvider)
|
|
||||||
{
|
|
||||||
_encryptionKeys = secretProvider.GetKeys("master");
|
|
||||||
// if (_encryptionKey.Length != 32) // 256‑bit key
|
|
||||||
// throw new Exception("Key must be 256 bits (32 bytes) for AES‑256‑GCM.");
|
|
||||||
}
|
|
||||||
|
|
||||||
public EncryptedValue Encrypt(ReadOnlyMemory<byte> plaintext)
|
|
||||||
{
|
{
|
||||||
const int versionNumber = 1;
|
const int versionNumber = 1;
|
||||||
AlgVersion versionParams = _versions[versionNumber];
|
AlgVersion versionParams = _versions[versionNumber];
|
||||||
|
|
@ -39,7 +21,7 @@ public class EncryptionService : IEncryptionService
|
||||||
// allocate buffer for complete response
|
// allocate buffer for complete response
|
||||||
var result = new byte[resultSize];
|
var result = new byte[resultSize];
|
||||||
|
|
||||||
result[0] = (byte)versionNumber;
|
result[0] = (byte)versionParams.Version;
|
||||||
|
|
||||||
// make the spans that point to the parts of the result where their data is located
|
// make the spans that point to the parts of the result where their data is located
|
||||||
var nonce = result.AsSpan(1, versionParams.NonceSize);
|
var nonce = result.AsSpan(1, versionParams.NonceSize);
|
||||||
|
|
@ -48,18 +30,14 @@ public class EncryptionService : IEncryptionService
|
||||||
|
|
||||||
// use the spans to place the data directly in its place
|
// use the spans to place the data directly in its place
|
||||||
RandomNumberGenerator.Fill(nonce);
|
RandomNumberGenerator.Fill(nonce);
|
||||||
var encryptionKey = ActiveKey;
|
using var aes = new AesGcm(key, versionParams.TagSize);
|
||||||
using var aes = new AesGcm(encryptionKey.Key, versionParams.TagSize);
|
|
||||||
aes.Encrypt(nonce, plaintext.Span, cipher, tag);
|
aes.Encrypt(nonce, plaintext.Span, cipher, tag);
|
||||||
|
return result;
|
||||||
return new (encryptionKey.Id, result);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public byte[] Decrypt(EncryptedValue input)
|
public static byte[] Decrypt(ReadOnlyMemory<byte> input, ReadOnlySpan<byte> key)
|
||||||
{
|
{
|
||||||
var encryptionKey = GetKey(input.KeyId);
|
var payload = input.Span;
|
||||||
|
|
||||||
var payload = input.Value.AsSpan();
|
|
||||||
int versionNumber = (int)payload[0];
|
int versionNumber = (int)payload[0];
|
||||||
if (versionNumber != 1)
|
if (versionNumber != 1)
|
||||||
throw new ArgumentException("Invalid payload");
|
throw new ArgumentException("Invalid payload");
|
||||||
|
|
@ -76,7 +54,7 @@ public class EncryptionService : IEncryptionService
|
||||||
|
|
||||||
byte[] plaintext = new byte[cipher.Length];
|
byte[] plaintext = new byte[cipher.Length];
|
||||||
|
|
||||||
using var aes = new AesGcm(encryptionKey.Key, versionParams.TagSize);
|
using var aes = new AesGcm(key, versionParams.TagSize);
|
||||||
try
|
try
|
||||||
{
|
{
|
||||||
aes.Decrypt(nonce, cipher, tag, plaintext);
|
aes.Decrypt(nonce, cipher, tag, plaintext);
|
||||||
|
|
@ -1,4 +0,0 @@
|
||||||
namespace IdentityShroud.Core.Contracts;
|
|
||||||
|
|
||||||
// Contains an encryption key and associated relevant data
|
|
||||||
public record EncryptionKey(string Id, bool Active, string Algorithm, byte[] Key);
|
|
||||||
41
IdentityShroud.Core/Security/KekId.cs
Normal file
41
IdentityShroud.Core/Security/KekId.cs
Normal file
|
|
@ -0,0 +1,41 @@
|
||||||
|
using System.ComponentModel;
|
||||||
|
using System.Globalization;
|
||||||
|
using System.Text.Json;
|
||||||
|
using System.Text.Json.Serialization;
|
||||||
|
|
||||||
|
namespace IdentityShroud.Core.Security;
|
||||||
|
|
||||||
|
[JsonConverter(typeof(KekIdJsonConverter))]
|
||||||
|
[TypeConverter(typeof(KekIdTypeConverter))]
|
||||||
|
public readonly record struct KekId
|
||||||
|
{
|
||||||
|
public Guid Id { get; }
|
||||||
|
|
||||||
|
public KekId(Guid id)
|
||||||
|
{
|
||||||
|
Id = id;
|
||||||
|
}
|
||||||
|
|
||||||
|
public static KekId NewId()
|
||||||
|
{
|
||||||
|
return new KekId(Guid.NewGuid());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public class KekIdJsonConverter : JsonConverter<KekId>
|
||||||
|
{
|
||||||
|
public override KekId Read(ref Utf8JsonReader reader, Type typeToConvert, JsonSerializerOptions options)
|
||||||
|
=> new KekId(reader.GetGuid());
|
||||||
|
|
||||||
|
public override void Write(Utf8JsonWriter writer, KekId value, JsonSerializerOptions options)
|
||||||
|
=> writer.WriteStringValue(value.Id);
|
||||||
|
}
|
||||||
|
|
||||||
|
public class KekIdTypeConverter : TypeConverter
|
||||||
|
{
|
||||||
|
public override bool CanConvertFrom(ITypeDescriptorContext? context, Type sourceType)
|
||||||
|
=> sourceType == typeof(string) || base.CanConvertFrom(context, sourceType);
|
||||||
|
|
||||||
|
public override object? ConvertFrom(ITypeDescriptorContext? context, CultureInfo? culture, object value)
|
||||||
|
=> value is string s ? new KekId(Guid.Parse(s)) : base.ConvertFrom(context, culture, value);
|
||||||
|
}
|
||||||
10
IdentityShroud.Core/Security/KeyEncryptionKey.cs
Normal file
10
IdentityShroud.Core/Security/KeyEncryptionKey.cs
Normal file
|
|
@ -0,0 +1,10 @@
|
||||||
|
namespace IdentityShroud.Core.Security;
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Contains a KEK and associated relevant data. This structure
|
||||||
|
/// </summary>
|
||||||
|
/// <param name="Id"></param>
|
||||||
|
/// <param name="Active"></param>
|
||||||
|
/// <param name="Algorithm"></param>
|
||||||
|
/// <param name="Key"></param>
|
||||||
|
public record KeyEncryptionKey(KekId Id, bool Active, string Algorithm, byte[] Key);
|
||||||
|
|
@ -7,7 +7,7 @@ namespace IdentityShroud.Core.Services;
|
||||||
|
|
||||||
public class ClientService(
|
public class ClientService(
|
||||||
Db db,
|
Db db,
|
||||||
IEncryptionService cryptor,
|
IDataEncryptionService cryptor,
|
||||||
IClock clock) : IClientService
|
IClock clock) : IClientService
|
||||||
{
|
{
|
||||||
public async Task<Result<Client>> Create(Guid realmId, ClientCreateRequest request, CancellationToken ct = default)
|
public async Task<Result<Client>> Create(Guid realmId, ClientCreateRequest request, CancellationToken ct = default)
|
||||||
|
|
@ -52,12 +52,13 @@ public class ClientService(
|
||||||
|
|
||||||
private ClientSecret CreateSecret()
|
private ClientSecret CreateSecret()
|
||||||
{
|
{
|
||||||
byte[] secret = RandomNumberGenerator.GetBytes(24);
|
Span<byte> secret = stackalloc byte[24];
|
||||||
|
RandomNumberGenerator.Fill(secret);
|
||||||
|
|
||||||
return new ClientSecret()
|
return new ClientSecret()
|
||||||
{
|
{
|
||||||
CreatedAt = clock.UtcNow(),
|
CreatedAt = clock.UtcNow(),
|
||||||
Secret = cryptor.Encrypt(secret),
|
Secret = cryptor.Encrypt(secret.ToArray()),
|
||||||
};
|
};
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
||||||
41
IdentityShroud.Core/Services/DataEncryptionService.cs
Normal file
41
IdentityShroud.Core/Services/DataEncryptionService.cs
Normal file
|
|
@ -0,0 +1,41 @@
|
||||||
|
using IdentityShroud.Core.Contracts;
|
||||||
|
using IdentityShroud.Core.Model;
|
||||||
|
using IdentityShroud.Core.Security;
|
||||||
|
|
||||||
|
namespace IdentityShroud.Core.Services;
|
||||||
|
|
||||||
|
public class DataEncryptionService(
|
||||||
|
IRealmContext realmContext,
|
||||||
|
IDekEncryptionService dekCryptor) : IDataEncryptionService
|
||||||
|
{
|
||||||
|
|
||||||
|
// Note this array is expected to have one item in it most of the during key rotation it will have two
|
||||||
|
// until it is ensured the old key can safely be removed. More then two will work but is not really expected.
|
||||||
|
private IList<RealmDek>? _deks = null;
|
||||||
|
|
||||||
|
private IList<RealmDek> GetDeks()
|
||||||
|
{
|
||||||
|
if (_deks is null)
|
||||||
|
_deks = realmContext.GetDeks().Result;
|
||||||
|
|
||||||
|
return _deks;
|
||||||
|
}
|
||||||
|
|
||||||
|
private RealmDek GetActiveDek() => GetDeks().Single(d => d.Active);
|
||||||
|
private RealmDek GetKey(DekId id) => GetDeks().Single(d => d.Id == id);
|
||||||
|
|
||||||
|
public byte[] Decrypt(EncryptedValue input)
|
||||||
|
{
|
||||||
|
var dek = GetKey(input.DekId);
|
||||||
|
var key = dekCryptor.Decrypt(dek.KeyData);
|
||||||
|
return Encryption.Decrypt(input.Value, key);
|
||||||
|
}
|
||||||
|
|
||||||
|
public EncryptedValue Encrypt(ReadOnlyMemory<byte> plain)
|
||||||
|
{
|
||||||
|
var dek = GetActiveDek();
|
||||||
|
var key = dekCryptor.Decrypt(dek.KeyData);
|
||||||
|
byte[] cipher = Encryption.Encrypt(plain, key);
|
||||||
|
return new (dek.Id, cipher);
|
||||||
|
}
|
||||||
|
}
|
||||||
38
IdentityShroud.Core/Services/DekEncryptionService.cs
Normal file
38
IdentityShroud.Core/Services/DekEncryptionService.cs
Normal file
|
|
@ -0,0 +1,38 @@
|
||||||
|
using IdentityShroud.Core.Contracts;
|
||||||
|
using IdentityShroud.Core.Security;
|
||||||
|
|
||||||
|
namespace IdentityShroud.Core.Services;
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
///
|
||||||
|
/// </summary>
|
||||||
|
public class DekEncryptionService : IDekEncryptionService
|
||||||
|
{
|
||||||
|
// Note this array is expected to have one item in it most of the during key rotation it will have two
|
||||||
|
// until it is ensured the old key can safely be removed. More then two will work but is not really expected.
|
||||||
|
private readonly KeyEncryptionKey[] _encryptionKeys;
|
||||||
|
|
||||||
|
private KeyEncryptionKey ActiveKey => _encryptionKeys.Single(k => k.Active);
|
||||||
|
private KeyEncryptionKey GetKey(KekId keyId) => _encryptionKeys.Single(k => k.Id == keyId);
|
||||||
|
|
||||||
|
public DekEncryptionService(ISecretProvider secretProvider)
|
||||||
|
{
|
||||||
|
_encryptionKeys = secretProvider.GetKeys("master");
|
||||||
|
// if (_encryptionKey.Length != 32) // 256‑bit key
|
||||||
|
// throw new Exception("Key must be 256 bits (32 bytes) for AES‑256‑GCM.");
|
||||||
|
}
|
||||||
|
|
||||||
|
public EncryptedDek Encrypt(ReadOnlyMemory<byte> plaintext)
|
||||||
|
{
|
||||||
|
var encryptionKey = ActiveKey;
|
||||||
|
byte[] cipher = Encryption.Encrypt(plaintext, encryptionKey.Key);
|
||||||
|
return new (encryptionKey.Id, cipher);
|
||||||
|
}
|
||||||
|
|
||||||
|
public byte[] Decrypt(EncryptedDek input)
|
||||||
|
{
|
||||||
|
var encryptionKey = GetKey(input.KekId);
|
||||||
|
|
||||||
|
return Encryption.Decrypt(input.Value, encryptionKey.Key);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
@ -6,7 +6,7 @@ using IdentityShroud.Core.Security.Keys;
|
||||||
namespace IdentityShroud.Core.Services;
|
namespace IdentityShroud.Core.Services;
|
||||||
|
|
||||||
public class KeyService(
|
public class KeyService(
|
||||||
IEncryptionService cryptor,
|
IDekEncryptionService cryptor,
|
||||||
IKeyProviderFactory keyProviderFactory,
|
IKeyProviderFactory keyProviderFactory,
|
||||||
IClock clock) : IKeyService
|
IClock clock) : IKeyService
|
||||||
{
|
{
|
||||||
|
|
|
||||||
26
IdentityShroud.Core/Services/RealmContext.cs
Normal file
26
IdentityShroud.Core/Services/RealmContext.cs
Normal file
|
|
@ -0,0 +1,26 @@
|
||||||
|
using IdentityShroud.Core.Contracts;
|
||||||
|
using IdentityShroud.Core.Model;
|
||||||
|
using Microsoft.AspNetCore.Http;
|
||||||
|
|
||||||
|
namespace IdentityShroud.Core.Services;
|
||||||
|
|
||||||
|
public class RealmContext(
|
||||||
|
IHttpContextAccessor accessor,
|
||||||
|
IRealmService realmService) : IRealmContext
|
||||||
|
{
|
||||||
|
public Realm GetRealm()
|
||||||
|
{
|
||||||
|
return (Realm)accessor.HttpContext.Items["RealmEntity"];
|
||||||
|
}
|
||||||
|
|
||||||
|
public async Task<IList<RealmDek>> GetDeks(CancellationToken ct = default)
|
||||||
|
{
|
||||||
|
Realm realm = GetRealm();
|
||||||
|
if (realm.Deks.Count == 0)
|
||||||
|
{
|
||||||
|
await realmService.LoadDeks(realm);
|
||||||
|
}
|
||||||
|
|
||||||
|
return realm.Deks;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
@ -58,6 +58,12 @@ public class RealmService(
|
||||||
.Query()
|
.Query()
|
||||||
.Where(k => k.RevokedAt == null)
|
.Where(k => k.RevokedAt == null)
|
||||||
.LoadAsync();
|
.LoadAsync();
|
||||||
|
}
|
||||||
|
|
||||||
|
public async Task LoadDeks(Realm realm)
|
||||||
|
{
|
||||||
|
await db.Entry(realm).Collection(r => r.Deks)
|
||||||
|
.Query()
|
||||||
|
.LoadAsync();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
@ -1,18 +1,21 @@
|
||||||
using IdentityShroud.Core.Contracts;
|
using IdentityShroud.Core.Contracts;
|
||||||
|
using IdentityShroud.Core.Security;
|
||||||
|
|
||||||
namespace IdentityShroud.TestUtils.Substitutes;
|
namespace IdentityShroud.TestUtils.Substitutes;
|
||||||
|
|
||||||
public static class EncryptionServiceSubstitute
|
public static class EncryptionServiceSubstitute
|
||||||
{
|
{
|
||||||
public static IEncryptionService CreatePassthrough()
|
public static KekId KeyId { get; } = KekId.NewId();
|
||||||
|
|
||||||
|
public static IDekEncryptionService CreatePassthrough()
|
||||||
{
|
{
|
||||||
var encryptionService = Substitute.For<IEncryptionService>();
|
var encryptionService = Substitute.For<IDekEncryptionService>();
|
||||||
encryptionService
|
encryptionService
|
||||||
.Encrypt(Arg.Any<ReadOnlyMemory<byte>>())
|
.Encrypt(Arg.Any<ReadOnlyMemory<byte>>())
|
||||||
.Returns(x => new EncryptedValue("kid", x.ArgAt<ReadOnlyMemory<byte>>(0).ToArray()));
|
.Returns(x => new EncryptedDek(KeyId, x.ArgAt<ReadOnlyMemory<byte>>(0).ToArray()));
|
||||||
encryptionService
|
encryptionService
|
||||||
.Decrypt(Arg.Any<EncryptedValue>())
|
.Decrypt(Arg.Any<EncryptedDek>())
|
||||||
.Returns(x => x.ArgAt<EncryptedValue>(0).Value);
|
.Returns(x => x.ArgAt<EncryptedDek>(0).Value);
|
||||||
return encryptionService;
|
return encryptionService;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
@ -2,8 +2,10 @@
|
||||||
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003AAesGcm_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003F26fbd7ed219da834e9eaf78ad486d552132eb3c92bbfccff8c27249cdf5f6722_003FAesGcm_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003AAesGcm_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003F26fbd7ed219da834e9eaf78ad486d552132eb3c92bbfccff8c27249cdf5f6722_003FAesGcm_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
||||||
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003AAesGcm_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003F2baadb96535b9acc4cb6c54e5379b87513f15ea119f8b153ed795a99ea3d340_003FAesGcm_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003AAesGcm_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003F2baadb96535b9acc4cb6c54e5379b87513f15ea119f8b153ed795a99ea3d340_003FAesGcm_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
||||||
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003ACallInfo_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FDecompilerCache_003Fdecompiler_003F402b2077f38742cb9b381ab9e79e493229c00_003F81_003F75c3679f_003FCallInfo_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003ACallInfo_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FDecompilerCache_003Fdecompiler_003F402b2077f38742cb9b381ab9e79e493229c00_003F81_003F75c3679f_003FCallInfo_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
||||||
|
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003AConfigurationSection_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003F55e3307e9c416bdbce02cdd9eabe8ac72fe3b3d981f3b2220e31ff9c916653c_003FConfigurationSection_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
||||||
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003ADebugger_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003Ff9d2f95d72fa884d8b6ddefc717c56da3657fbb2d5fb683656c3589eb6587_003FDebugger_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003ADebugger_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003Ff9d2f95d72fa884d8b6ddefc717c56da3657fbb2d5fb683656c3589eb6587_003FDebugger_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
||||||
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003ADeveloperExceptionPageMiddlewareImpl_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003F2b5a64a615692cae2c8f378e99676581abe4bc355bb3844bfc6c6db3d576853_003FDeveloperExceptionPageMiddlewareImpl_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003ADeveloperExceptionPageMiddlewareImpl_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003F2b5a64a615692cae2c8f378e99676581abe4bc355bb3844bfc6c6db3d576853_003FDeveloperExceptionPageMiddlewareImpl_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
||||||
|
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003AECDsa_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003Fb69681dc22e362c8b157b358e58abc4b44cb12b573c82fa37c483ad8807c8f_003FECDsa_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
||||||
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003AGeneratedRouteBuilderExtensions_002Eg_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003F698a85dfa04f73158f8da37069798c22c467dfc_003FGeneratedRouteBuilderExtensions_002Eg_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003AGeneratedRouteBuilderExtensions_002Eg_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003F698a85dfa04f73158f8da37069798c22c467dfc_003FGeneratedRouteBuilderExtensions_002Eg_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
||||||
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003AGeneratedRouteBuilderExtensions_002Eg_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003F9f95c1d38311d5248a1d1324797b98c2e56789a_003FGeneratedRouteBuilderExtensions_002Eg_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003AGeneratedRouteBuilderExtensions_002Eg_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003F9f95c1d38311d5248a1d1324797b98c2e56789a_003FGeneratedRouteBuilderExtensions_002Eg_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
||||||
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003AHealthCheckEndpointRouteBuilderExtensions_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FDecompilerCache_003Fdecompiler_003F6d0f079e13da4e98881aa3e6e169c6d34f08_003F0e_003Fc2b30661_003FHealthCheckEndpointRouteBuilderExtensions_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003AHealthCheckEndpointRouteBuilderExtensions_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FDecompilerCache_003Fdecompiler_003F6d0f079e13da4e98881aa3e6e169c6d34f08_003F0e_003Fc2b30661_003FHealthCheckEndpointRouteBuilderExtensions_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
||||||
|
|
@ -20,10 +22,11 @@
|
||||||
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003AThrowHelper_002ESerialization_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003F8433b9271c0f176fb5ceb7b1c3d62e1318fe8e62b4e5d7e882952dc543fec_003FThrowHelper_002ESerialization_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003AThrowHelper_002ESerialization_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003F8433b9271c0f176fb5ceb7b1c3d62e1318fe8e62b4e5d7e882952dc543fec_003FThrowHelper_002ESerialization_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
||||||
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003ATypedResults_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003Fcea118513a410f660e578fe32bed95cf86457dd135e4b4632ca91eb4f7b_003FTypedResults_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003ATypedResults_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003Fcea118513a410f660e578fe32bed95cf86457dd135e4b4632ca91eb4f7b_003FTypedResults_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
||||||
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003AWebEncoders_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003Fce6b69dd397f614758bc5821136ec8af3fa22563dd657769e231f51be1fbbc_003FWebEncoders_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
<s:String x:Key="/Default/CodeInspection/ExcludedFiles/FilesAndFoldersToSkip2/=7020124F_002D9FFC_002D4AC3_002D8F3D_002DAAB8E0240759_002Ff_003AWebEncoders_002Ecs_002Fl_003A_002E_002E_003F_002E_002E_003F_002Econfig_003FJetBrains_003FRider2025_002E3_003Fresharper_002Dhost_003FSourcesCache_003Fce6b69dd397f614758bc5821136ec8af3fa22563dd657769e231f51be1fbbc_003FWebEncoders_002Ecs/@EntryIndexedValue">ForceIncluded</s:String>
|
||||||
|
<s:String x:Key="/Default/dotCover/Editor/HighlightingSourceSnapshotLocation/@EntryValue">/home/eelke/.cache/JetBrains/Rider2025.3/resharper-host/temp/Rider/vAny/CoverageData/_IdentityShroud.-1277985570/Snapshot/snapshot.utdcvr</s:String>
|
||||||
|
|
||||||
<s:String x:Key="/Default/Environment/Hierarchy/Build/BuildTool/DotNetCliExePath/@EntryValue">/home/eelke/.dotnet/dotnet</s:String>
|
<s:String x:Key="/Default/Environment/Hierarchy/Build/BuildTool/DotNetCliExePath/@EntryValue">/home/eelke/.dotnet/dotnet</s:String>
|
||||||
<s:String x:Key="/Default/Environment/Hierarchy/Build/BuildTool/CustomBuildToolPath/@EntryValue">/home/eelke/.dotnet/sdk/10.0.102/MSBuild.dll</s:String>
|
<s:String x:Key="/Default/Environment/Hierarchy/Build/BuildTool/CustomBuildToolPath/@EntryValue">/home/eelke/.dotnet/sdk/10.0.102/MSBuild.dll</s:String>
|
||||||
<s:String x:Key="/Default/Environment/UnitTesting/UnitTestSessionStore/Sessions/=b20a3316_002Db435_002D49e2_002Dbeaf_002De4cd62c44994/@EntryIndexedValue"><SessionState ContinuousTestingMode="0" IsActive="True" Name="All tests from Solution" xmlns="urn:schemas-jetbrains-com:jetbrains-ut-session">
|
<s:String x:Key="/Default/Environment/UnitTesting/UnitTestSessionStore/Sessions/=ead9ca22_002Dfc70_002D4ddf_002Db4c7_002D534498815537/@EntryIndexedValue"><SessionState ContinuousTestingMode="0" IsActive="True" Name="All tests from Solution" xmlns="urn:schemas-jetbrains-com:jetbrains-ut-session">
|
||||||
<Solution />
|
<Solution />
|
||||||
</SessionState></s:String>
|
</SessionState></s:String>
|
||||||
|
|
||||||
|
|
@ -37,4 +40,9 @@
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
</wpf:ResourceDictionary>
|
</wpf:ResourceDictionary>
|
||||||
Loading…
Add table
Add a link
Reference in a new issue