選択できるのは25トピックまでです。 トピックは、先頭が英数字で、英数字とダッシュ('-')を使用した35文字以内のものにしてください。

UserService.cs 11KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291
  1. namespace Diligent.WebAPI.Business.Services
  2. {
  3. public class UserService : IUserService
  4. {
  5. private readonly AuthorizationSettings _authSettings;
  6. private readonly UserManager<User> _userManager;
  7. private readonly IMapper _mapper;
  8. private readonly DatabaseContext _databaseContext;
  9. public UserService(IOptions<AuthorizationSettings> authSettings, UserManager<User> userManager, IMapper mapper, DatabaseContext databaseContext)
  10. {
  11. _authSettings = authSettings.Value;
  12. _userManager = userManager;
  13. _mapper = mapper;
  14. _databaseContext = databaseContext;
  15. }
  16. public async Task<IEnumerable<User?>> GetAll() =>
  17. await _userManager.Users.ToListAsync();
  18. public async Task<User?> GetById(int id) =>
  19. await _userManager.FindByIdAsync(id.ToString());
  20. public async Task CreateUser(CreateUserRequestDto model)
  21. {
  22. var user = _mapper.Map<User>(model);
  23. await _userManager.CreateAsync(user, model.Password);
  24. }
  25. public async Task<ServiceResponseDTO<AuthenticateResponseDto>> Authenticate(AuthenticateRequestDto model)
  26. {
  27. var user = await _userManager.FindByNameAsync(model.Username);
  28. // return null if user not found
  29. if (user == null)
  30. {
  31. return new ServiceResponseDTO<AuthenticateResponseDto>
  32. {
  33. IsError = true,
  34. ErrorMessage = "Username is not valid"
  35. };
  36. }
  37. var isLocked = await _userManager.IsLockedOutAsync(user);
  38. if (isLocked)
  39. return new ServiceResponseDTO<AuthenticateResponseDto>
  40. {
  41. IsError = true,
  42. ErrorMessage = "The account is locked out"
  43. };
  44. var result = await _userManager.CheckPasswordAsync(user, model.Password);
  45. // password is not correct
  46. if (!result)
  47. {
  48. await _userManager.AccessFailedAsync(user);
  49. isLocked = await _userManager.IsLockedOutAsync(user);
  50. if(isLocked)
  51. return new ServiceResponseDTO<AuthenticateResponseDto>
  52. {
  53. IsError = true,
  54. ErrorMessage = "The account is locked out"
  55. };
  56. return new ServiceResponseDTO<AuthenticateResponseDto>
  57. {
  58. IsError = true,
  59. ErrorMessage = "Password is not correct"
  60. };
  61. }
  62. // authentication successful so generate jwt token
  63. var token = await GenerateJwtToken(user, true);
  64. var data = new AuthenticateResponseDto
  65. {
  66. Id = user.Id,
  67. Username = user.UserName,
  68. FirstName = user.FirstName,
  69. LastName = user.LastName,
  70. Token = token,
  71. RefreshToken = token
  72. };
  73. return new ServiceResponseDTO<AuthenticateResponseDto>
  74. {
  75. Data = data
  76. };
  77. }
  78. private async Task<string> GenerateJwtToken(User user, bool authenticate = false)
  79. {
  80. // generate token that is valid for 7 days
  81. var tokenHandler = new JwtSecurityTokenHandler();
  82. var key = Encoding.ASCII.GetBytes(_authSettings.Secret);
  83. var tokenDescriptor = new SecurityTokenDescriptor
  84. {
  85. Subject = new ClaimsIdentity(new[] {
  86. new Claim(JwtRegisteredClaimNames.Jti, user.Id.ToString()),
  87. new Claim("id", user.Id.ToString())
  88. }),
  89. Expires = DateTime.UtcNow.AddSeconds(_authSettings.JwtExpiredTime),
  90. SigningCredentials = new SigningCredentials(new SymmetricSecurityKey(key), SecurityAlgorithms.HmacSha256Signature)
  91. };
  92. var token = tokenHandler.CreateToken(tokenDescriptor);
  93. var writedToken = tokenHandler.WriteToken(token);
  94. var refreshToken = new RefreshToken
  95. {
  96. Token = writedToken,
  97. JwtId = user.Id.ToString(),
  98. UserId = user.Id,
  99. User = user,
  100. CreationDate = DateTime.UtcNow,
  101. ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime)
  102. };
  103. var existRefreshToken = await _databaseContext.RefreshTokens.Where(x => x.Id == user.Id).FirstOrDefaultAsync();
  104. if(existRefreshToken != null)
  105. {
  106. existRefreshToken.Token = writedToken;
  107. existRefreshToken.JwtId = token.Id;
  108. existRefreshToken.CreationDate = DateTime.UtcNow;
  109. existRefreshToken.ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime);
  110. if (authenticate)
  111. {
  112. existRefreshToken.Used = false;
  113. existRefreshToken.Invalidated = false;
  114. }
  115. //_databaseContext.RefreshTokens.Update(existRefreshToken);
  116. await UpdateRefreshToken(existRefreshToken);
  117. }
  118. else
  119. {
  120. await _databaseContext.RefreshTokens.AddAsync(refreshToken);
  121. }
  122. await _databaseContext.SaveChangesAsync();
  123. return writedToken;
  124. }
  125. public async Task<RefreshTokenResultDto> RefreshTokenAsync(RefreshTokenRequestDto model)
  126. {
  127. var validatedToken = GetPrincipalFromToken(model.Token);
  128. if (validatedToken == null)
  129. {
  130. return new RefreshTokenResultDto { Error = "Invalid token" };
  131. }
  132. var jti = validatedToken.Claims.Single(x => x.Type == JwtRegisteredClaimNames.Jti).Value;
  133. var storedRefreshToken = await _databaseContext.RefreshTokens.SingleOrDefaultAsync(x => x.JwtId == jti);
  134. if (storedRefreshToken == null)
  135. {
  136. return new RefreshTokenResultDto { Error = "This refresh token does not exist" };
  137. }
  138. var userk = await _databaseContext.Users.Where(u => u.Id == storedRefreshToken.UserId).FirstOrDefaultAsync();
  139. if(userk == null)
  140. {
  141. return new RefreshTokenResultDto { Error = "There is no user which is associated with refresh token" };
  142. }
  143. var expiryDateUnix = long.Parse(validatedToken.Claims.Single(x => x.Type == JwtRegisteredClaimNames.Exp).Value);
  144. var expiryDateTimeUtc = new DateTime(1970, 1, 1, 0, 0, 0, DateTimeKind.Utc)
  145. .AddMinutes(expiryDateUnix);
  146. if (expiryDateTimeUtc < DateTime.UtcNow)
  147. {
  148. storedRefreshToken.ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime);
  149. await _databaseContext.SaveChangesAsync();
  150. return new RefreshTokenResultDto
  151. {
  152. Data = new AuthenticateResponseDto
  153. {
  154. Id = userk.Id,
  155. FirstName = userk.FirstName,
  156. LastName = userk.LastName,
  157. Username = userk.UserName,
  158. Token = model.Token,
  159. RefreshToken = model.RefreshToken
  160. }
  161. };
  162. }
  163. if (DateTime.UtcNow > storedRefreshToken.ExpiryDate)
  164. {
  165. return new RefreshTokenResultDto { Error = "This refresh token has expired" };
  166. }
  167. if (storedRefreshToken.Invalidated)
  168. {
  169. return new RefreshTokenResultDto { Error = "This refresh token has been invalidated" };
  170. }
  171. if (storedRefreshToken.JwtId != jti)
  172. {
  173. return new RefreshTokenResultDto { Error = "This refresh token does not match this JWT" };
  174. }
  175. storedRefreshToken.ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime);
  176. await _databaseContext.SaveChangesAsync();
  177. var user = await _userManager.FindByIdAsync(validatedToken.Claims.Single(x => x.Type == "id").Value);
  178. var token = await GenerateJwtToken(user);
  179. return new RefreshTokenResultDto
  180. {
  181. Data = new AuthenticateResponseDto
  182. {
  183. Id = userk.Id,
  184. FirstName = userk.FirstName,
  185. LastName = userk.LastName,
  186. Username = userk.UserName,
  187. Token = model.Token,
  188. RefreshToken = model.RefreshToken
  189. }
  190. };
  191. }
  192. private ClaimsPrincipal? GetPrincipalFromToken(string token)
  193. {
  194. var tokenHandler = new JwtSecurityTokenHandler();
  195. var key = Encoding.ASCII.GetBytes(_authSettings.Secret);
  196. var tokenValidationParameters = new TokenValidationParameters
  197. {
  198. ValidateIssuerSigningKey = true,
  199. IssuerSigningKey = new SymmetricSecurityKey(key),
  200. ValidateIssuer = false,
  201. ValidateAudience = false,
  202. RequireExpirationTime = false,
  203. ValidateLifetime = true,
  204. // set clockskew to zero so tokens expire exactly at token expiration time (instead of 5 minutes later)
  205. //ClockSkew = TimeSpan.Zero
  206. };
  207. try
  208. {
  209. var principal = tokenHandler.ValidateToken(token, tokenValidationParameters, out var validatedToken);
  210. if (!IsJwtWithValidSecurityAlgorithm(validatedToken))
  211. {
  212. return null;
  213. }
  214. return principal;
  215. }
  216. catch (Exception)
  217. {
  218. return null;
  219. }
  220. }
  221. private static bool IsJwtWithValidSecurityAlgorithm(SecurityToken validatedToken)
  222. {
  223. return (validatedToken is JwtSecurityToken jwtSecurityToken) &&
  224. jwtSecurityToken.Header.Alg.Equals(SecurityAlgorithms.HmacSha256,
  225. StringComparison.InvariantCultureIgnoreCase);
  226. }
  227. public async Task<RefreshToken?> GetRefreshTokenByUserId(int userId)
  228. {
  229. return await _databaseContext.RefreshTokens.Where(x => x.UserId == userId).FirstOrDefaultAsync();
  230. }
  231. public async Task UpdateRefreshToken(RefreshToken refreshToken)
  232. {
  233. _databaseContext.RefreshTokens.Update(refreshToken);
  234. await _databaseContext.SaveChangesAsync();
  235. }
  236. }
  237. }