您最多选择25个主题 主题必须以字母或数字开头,可以包含连字符 (-),并且长度不得超过35个字符

AuthenticationService.cs 15KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410
  1. using Microsoft.AspNetCore.WebUtilities;
  2. using Microsoft.Extensions.Logging;
  3. using System.Net;
  4. using System.Web;
  5. namespace Diligent.WebAPI.Business.Services
  6. {
  7. public class AuthenticationService : IAuthenticationService
  8. {
  9. private readonly AuthorizationSettings _authSettings;
  10. private readonly FrontEndSettings _frontEndSettings;
  11. private readonly UserManager<User> _userManager;
  12. private readonly DatabaseContext _databaseContext;
  13. private readonly IEmailer _emailer;
  14. private readonly ILogger<AuthenticationService> _logger;
  15. private readonly IHttpClientService _httpClient;
  16. public AuthenticationService(IOptions<AuthorizationSettings> authSettings,
  17. IOptions<FrontEndSettings> frontEndSettings,
  18. UserManager<User> userManager,
  19. DatabaseContext databaseContext,
  20. IEmailer emailer,
  21. ILogger<AuthenticationService> logger,
  22. IHttpClientService httpClient)
  23. {
  24. _authSettings = authSettings.Value;
  25. _frontEndSettings = frontEndSettings.Value;
  26. _userManager = userManager;
  27. _databaseContext = databaseContext;
  28. _httpClient = httpClient;
  29. _emailer = emailer;
  30. _logger = logger;
  31. }
  32. public async Task<ServiceResponseDTO<AuthenticateResponseDto>> Authenticate(AuthenticateRequestDto model)
  33. {
  34. var user = await _userManager.FindByNameAsync(model.Username);
  35. // return null if user not found
  36. if (user == null)
  37. {
  38. return new ServiceResponseDTO<AuthenticateResponseDto>
  39. {
  40. IsError = true,
  41. ErrorMessage = "Username is not valid"
  42. };
  43. }
  44. var result = await _userManager.CheckPasswordAsync(user, model.Password);
  45. // return null if user is disabled
  46. if (user.IsEnabled == false)
  47. {
  48. return new ServiceResponseDTO<AuthenticateResponseDto>
  49. {
  50. IsError = true,
  51. ErrorMessage = $"User with email {model.Username} has no permission to log in."
  52. };
  53. }
  54. // password is not correct
  55. if (!result)
  56. {
  57. await _userManager.AccessFailedAsync(user);
  58. return new ServiceResponseDTO<AuthenticateResponseDto>
  59. {
  60. IsError = true,
  61. ErrorMessage = "Password is not correct"
  62. };
  63. }
  64. return await GenerateToken(user);
  65. }
  66. public async Task<ServiceResponseDTO<AuthenticateResponseDto>> Authenticate(GoogleApiModel model)
  67. {
  68. if (!(await _httpClient.IsTokenValid(model.Token)))
  69. {
  70. return new ServiceResponseDTO<AuthenticateResponseDto>
  71. {
  72. IsError = true,
  73. ErrorMessage = "Invalid Google Api Token"
  74. };
  75. }
  76. var user = await _userManager.FindByEmailAsync(model.User.email);
  77. // return null if user not found
  78. if (user == null)
  79. {
  80. return new ServiceResponseDTO<AuthenticateResponseDto>
  81. {
  82. IsError = true,
  83. ErrorMessage = $"User with email {model.User.email} does not exist in database"
  84. };
  85. }
  86. if (user.IsEnabled == false)
  87. {
  88. return new ServiceResponseDTO<AuthenticateResponseDto>
  89. {
  90. IsError = true,
  91. ErrorMessage = $"User with email {model.User.email} has no permission to log in."
  92. };
  93. }
  94. return await GenerateToken(user);
  95. }
  96. private async Task<ServiceResponseDTO<AuthenticateResponseDto>> GenerateToken(User user)
  97. {
  98. var isLocked = await _userManager.IsLockedOutAsync(user);
  99. if (isLocked)
  100. return new ServiceResponseDTO<AuthenticateResponseDto>
  101. {
  102. IsError = true,
  103. ErrorMessage = "The account is locked out"
  104. };
  105. // authentication successful so generate jwt token
  106. var token = await GenerateJwtToken(user, true);
  107. var data = new AuthenticateResponseDto
  108. {
  109. Id = user.Id,
  110. Username = user.UserName,
  111. FirstName = user.FirstName,
  112. LastName = user.LastName,
  113. Token = token,
  114. RefreshToken = token
  115. };
  116. return new ServiceResponseDTO<AuthenticateResponseDto>
  117. {
  118. Data = data
  119. };
  120. }
  121. private async Task<string> GenerateJwtToken(User user, bool authenticate = false)
  122. {
  123. // generate token that is valid for 7 days
  124. var tokenHandler = new JwtSecurityTokenHandler();
  125. var key = Encoding.ASCII.GetBytes(_authSettings.Secret);
  126. var tokenDescriptor = new SecurityTokenDescriptor
  127. {
  128. Subject = new ClaimsIdentity(new[] {
  129. new Claim(JwtRegisteredClaimNames.Jti, user.Id.ToString()),
  130. new Claim("id", user.Id.ToString())
  131. }),
  132. Expires = DateTime.UtcNow.AddMinutes(_authSettings.JwtExpiredTime),
  133. SigningCredentials = new SigningCredentials(new SymmetricSecurityKey(key), SecurityAlgorithms.HmacSha256Signature)
  134. };
  135. var token = tokenHandler.CreateToken(tokenDescriptor);
  136. var writedToken = tokenHandler.WriteToken(token);
  137. var refreshToken = new RefreshToken
  138. {
  139. Token = writedToken,
  140. JwtId = user.Id.ToString(),
  141. UserId = user.Id,
  142. User = user,
  143. CreationDate = DateTime.UtcNow,
  144. ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime)
  145. };
  146. var existRefreshToken = await _databaseContext.RefreshTokens.Where(x => x.UserId == user.Id).FirstOrDefaultAsync();
  147. if (existRefreshToken != null)
  148. {
  149. existRefreshToken.Token = writedToken;
  150. existRefreshToken.JwtId = token.Id;
  151. existRefreshToken.CreationDate = DateTime.UtcNow;
  152. existRefreshToken.ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime);
  153. if (authenticate)
  154. {
  155. existRefreshToken.Used = false;
  156. existRefreshToken.Invalidated = false;
  157. }
  158. _databaseContext.RefreshTokens.Update(existRefreshToken);
  159. await UpdateRefreshToken(existRefreshToken);
  160. }
  161. else
  162. {
  163. await _databaseContext.RefreshTokens.AddAsync(refreshToken);
  164. }
  165. await _databaseContext.SaveChangesAsync();
  166. return writedToken;
  167. }
  168. public async Task<RefreshTokenResultDto> RefreshTokenAsync(RefreshTokenRequestDto model)
  169. {
  170. var validatedToken = GetPrincipalFromToken(model.Token, false);
  171. if (validatedToken == null)
  172. {
  173. return new RefreshTokenResultDto { Error = "Invalid token" };
  174. }
  175. var jti = validatedToken.Claims.Single(x => x.Type == JwtRegisteredClaimNames.Jti).Value;
  176. var storedRefreshToken = await _databaseContext.RefreshTokens.SingleOrDefaultAsync(x => x.JwtId == jti);
  177. if (storedRefreshToken == null)
  178. {
  179. return new RefreshTokenResultDto { Error = "This refresh token does not exist" };
  180. }
  181. var userk = await _databaseContext.Users.Where(u => u.Id == storedRefreshToken.UserId).FirstOrDefaultAsync();
  182. if (userk == null)
  183. {
  184. return new RefreshTokenResultDto { Error = "There is no user which is associated with refresh token" };
  185. }
  186. var expiryDateUnix = long.Parse(validatedToken.Claims.Single(x => x.Type == JwtRegisteredClaimNames.Exp).Value);
  187. var expiryDateTimeUtc = new DateTime(1970, 1, 1, 0, 0, 0, DateTimeKind.Utc)
  188. .AddMinutes(expiryDateUnix);
  189. if (expiryDateTimeUtc < DateTime.UtcNow)
  190. {
  191. return new RefreshTokenResultDto
  192. {
  193. Data = new AuthenticateResponseDto
  194. {
  195. Id = userk.Id,
  196. FirstName = userk.FirstName,
  197. LastName = userk.LastName,
  198. Username = userk.UserName,
  199. Token = model.Token,
  200. RefreshToken = model.RefreshToken
  201. }
  202. };
  203. }
  204. if (DateTime.UtcNow > storedRefreshToken.ExpiryDate)
  205. {
  206. return new RefreshTokenResultDto { Error = "This refresh token has expired" };
  207. }
  208. if (storedRefreshToken.Invalidated)
  209. {
  210. return new RefreshTokenResultDto { Error = "This refresh token has been invalidated" };
  211. }
  212. if (storedRefreshToken.JwtId != jti)
  213. {
  214. return new RefreshTokenResultDto { Error = "This refresh token does not match this JWT" };
  215. }
  216. storedRefreshToken.ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime);
  217. await _databaseContext.SaveChangesAsync();
  218. var user = await _userManager.FindByIdAsync(validatedToken.Claims.Single(x => x.Type == "id").Value);
  219. var token = await GenerateJwtToken(user);
  220. return new RefreshTokenResultDto
  221. {
  222. Data = new AuthenticateResponseDto
  223. {
  224. Id = userk.Id,
  225. FirstName = userk.FirstName,
  226. LastName = userk.LastName,
  227. Username = userk.UserName,
  228. Token = model.Token,
  229. RefreshToken = model.RefreshToken
  230. }
  231. };
  232. }
  233. public async Task<ServiceResponseDTO<string>> DeleteRefreshToken(int userId)
  234. {
  235. var refreshToken = await _databaseContext.RefreshTokens.Where(r => r.UserId == userId).FirstOrDefaultAsync();
  236. if (refreshToken is null)
  237. return new ServiceResponseDTO<string>
  238. {
  239. IsError = true,
  240. ErrorMessage = "There is no refresh token for user"
  241. };
  242. _databaseContext.RefreshTokens.Remove(refreshToken);
  243. var result = await _databaseContext.SaveChangesAsync() > 0;
  244. if (!result)
  245. return new ServiceResponseDTO<string>
  246. {
  247. IsError = true,
  248. ErrorMessage = "Problem with saving changes into database"
  249. };
  250. return new ServiceResponseDTO<string>
  251. {
  252. Data = null
  253. };
  254. }
  255. private ClaimsPrincipal? GetPrincipalFromToken(string token, bool validateLifetime)
  256. {
  257. var tokenHandler = new JwtSecurityTokenHandler();
  258. var key = Encoding.ASCII.GetBytes(_authSettings.Secret);
  259. var tokenValidationParameters = new TokenValidationParameters
  260. {
  261. ValidateIssuerSigningKey = true,
  262. IssuerSigningKey = new SymmetricSecurityKey(key),
  263. ValidateIssuer = false,
  264. ValidateAudience = false,
  265. RequireExpirationTime = false,
  266. ValidateLifetime = validateLifetime,
  267. // set clockskew to zero so tokens expire exactly at token expiration time (instead of 5 minutes later)
  268. //ClockSkew = TimeSpan.Zero
  269. };
  270. try
  271. {
  272. var principal = tokenHandler.ValidateToken(token, tokenValidationParameters, out var validatedToken);
  273. if (!IsJwtWithValidSecurityAlgorithm(validatedToken))
  274. {
  275. return null;
  276. }
  277. return principal;
  278. }
  279. catch (Exception)
  280. {
  281. return null;
  282. }
  283. }
  284. private static bool IsJwtWithValidSecurityAlgorithm(SecurityToken validatedToken)
  285. {
  286. return (validatedToken is JwtSecurityToken jwtSecurityToken) &&
  287. jwtSecurityToken.Header.Alg.Equals(SecurityAlgorithms.HmacSha256,
  288. StringComparison.InvariantCultureIgnoreCase);
  289. }
  290. public async Task<RefreshToken?> GetRefreshTokenByUserId(int userId)
  291. {
  292. return await _databaseContext.RefreshTokens.Where(x => x.UserId == userId).FirstOrDefaultAsync();
  293. }
  294. public async Task UpdateRefreshToken(RefreshToken refreshToken)
  295. {
  296. _databaseContext.RefreshTokens.Update(refreshToken);
  297. await _databaseContext.SaveChangesAsync();
  298. }
  299. public async Task<ServiceResponseDTO<object>> GetForgotPasswordUrlAsync(string email)
  300. {
  301. var user = await _userManager.FindByEmailAsync(email);
  302. if (user == null)
  303. {
  304. return new ServiceResponseDTO<object>
  305. {
  306. IsError = true,
  307. ErrorMessage = "Email did not find."
  308. };
  309. }
  310. var token = await _userManager.GeneratePasswordResetTokenAsync(user);
  311. token = WebEncoders.Base64UrlEncode(Encoding.UTF8.GetBytes(token));
  312. await _emailer.SendEmailAndWriteToDbAsync(email, "Reset password", HTMLHelper.RenderForgotPasswordPage($"{_frontEndSettings.BaseUrl}/reset-password?token={token}&email={email}"), isHtml: true);
  313. return new ServiceResponseDTO<object>
  314. {
  315. Data = new { code = token, email = email }
  316. };
  317. }
  318. public async Task<ServiceResponseDTO<object>> PasswordResetAsync(string email, string code, string password)
  319. {
  320. var user = await _userManager.FindByEmailAsync(email);
  321. if (user == null)
  322. {
  323. return new ServiceResponseDTO<object>
  324. {
  325. IsError = true,
  326. ErrorMessage = "Email did not find."
  327. };
  328. }
  329. var passwordResetToken = Encoding.UTF8.GetString(WebEncoders.Base64UrlDecode(code));
  330. IdentityResult resetResult = await _userManager.ResetPasswordAsync(user, passwordResetToken, password);
  331. if (resetResult.Succeeded)
  332. {
  333. return new ServiceResponseDTO<object> { Data = true };
  334. }
  335. var errors = resetResult.Errors.Select(x => x.Description);
  336. return new ServiceResponseDTO<object>
  337. {
  338. IsError = true,
  339. ErrorMessage = errors.First()
  340. };
  341. }
  342. }
  343. }