Вы не можете выбрать более 25 тем Темы должны начинаться с буквы или цифры, могут содержать дефисы(-) и должны содержать не более 35 символов.

UserService.cs 12KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332
  1. namespace Diligent.WebAPI.Business.Services
  2. {
  3. public class UserService : IUserService
  4. {
  5. private readonly AuthorizationSettings _authSettings;
  6. private readonly UserManager<User> _userManager;
  7. private readonly IMapper _mapper;
  8. private readonly DatabaseContext _databaseContext;
  9. public UserService(IOptions<AuthorizationSettings> authSettings, UserManager<User> userManager, IMapper mapper, DatabaseContext databaseContext)
  10. {
  11. _authSettings = authSettings.Value;
  12. _userManager = userManager;
  13. _mapper = mapper;
  14. _databaseContext = databaseContext;
  15. }
  16. public async Task<IEnumerable<User?>> GetAll() =>
  17. await _userManager.Users.ToListAsync();
  18. public async Task<User?> GetById(int id) =>
  19. await _userManager.FindByIdAsync(id.ToString());
  20. public async Task CreateUser(CreateUserRequestDto model)
  21. {
  22. var user = _mapper.Map<User>(model);
  23. await _userManager.CreateAsync(user, model.Password);
  24. }
  25. public async Task<ServiceResponseDTO<AuthenticateResponseDto>> Authenticate(AuthenticateRequestDto model)
  26. {
  27. var user = await _userManager.FindByNameAsync(model.Username);
  28. // return null if user not found
  29. if (user == null)
  30. {
  31. return new ServiceResponseDTO<AuthenticateResponseDto>
  32. {
  33. IsError = true,
  34. ErrorMessage = "Username is not valid"
  35. };
  36. }
  37. var result = await _userManager.CheckPasswordAsync(user, model.Password);
  38. // password is not correct
  39. if (!result)
  40. {
  41. await _userManager.AccessFailedAsync(user);
  42. return new ServiceResponseDTO<AuthenticateResponseDto>
  43. {
  44. IsError = true,
  45. ErrorMessage = "Password is not correct"
  46. };
  47. }
  48. return await GenerateToken(user);
  49. }
  50. public async Task<ServiceResponseDTO<AuthenticateResponseDto>> Authenticate(string email)
  51. {
  52. var user = await _userManager.FindByEmailAsync(email);
  53. // return null if user not found
  54. if (user == null)
  55. {
  56. return new ServiceResponseDTO<AuthenticateResponseDto>
  57. {
  58. IsError = true,
  59. ErrorMessage = $"User with email {email} does not exist in database"
  60. };
  61. }
  62. return await GenerateToken(user);
  63. }
  64. private async Task<ServiceResponseDTO<AuthenticateResponseDto>> GenerateToken(User user)
  65. {
  66. var isLocked = await _userManager.IsLockedOutAsync(user);
  67. if (isLocked)
  68. return new ServiceResponseDTO<AuthenticateResponseDto>
  69. {
  70. IsError = true,
  71. ErrorMessage = "The account is locked out"
  72. };
  73. // authentication successful so generate jwt token
  74. var token = await GenerateJwtToken(user, true);
  75. var data = new AuthenticateResponseDto
  76. {
  77. Id = user.Id,
  78. Username = user.UserName,
  79. FirstName = user.FirstName,
  80. LastName = user.LastName,
  81. Token = token,
  82. RefreshToken = token
  83. };
  84. return new ServiceResponseDTO<AuthenticateResponseDto>
  85. {
  86. Data = data
  87. };
  88. }
  89. private async Task<string> GenerateJwtToken(User user, bool authenticate = false)
  90. {
  91. // generate token that is valid for 7 days
  92. var tokenHandler = new JwtSecurityTokenHandler();
  93. var key = Encoding.ASCII.GetBytes(_authSettings.Secret);
  94. var tokenDescriptor = new SecurityTokenDescriptor
  95. {
  96. Subject = new ClaimsIdentity(new[] {
  97. new Claim(JwtRegisteredClaimNames.Jti, user.Id.ToString()),
  98. new Claim("id", user.Id.ToString())
  99. }),
  100. Expires = DateTime.UtcNow.AddMinutes(_authSettings.JwtExpiredTime),
  101. SigningCredentials = new SigningCredentials(new SymmetricSecurityKey(key), SecurityAlgorithms.HmacSha256Signature)
  102. };
  103. var token = tokenHandler.CreateToken(tokenDescriptor);
  104. var writedToken = tokenHandler.WriteToken(token);
  105. var refreshToken = new RefreshToken
  106. {
  107. Token = writedToken,
  108. JwtId = user.Id.ToString(),
  109. UserId = user.Id,
  110. User = user,
  111. CreationDate = DateTime.UtcNow,
  112. ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime)
  113. };
  114. var existRefreshToken = await _databaseContext.RefreshTokens.Where(x => x.UserId == user.Id).FirstOrDefaultAsync();
  115. if(existRefreshToken != null)
  116. {
  117. existRefreshToken.Token = writedToken;
  118. existRefreshToken.JwtId = token.Id;
  119. existRefreshToken.CreationDate = DateTime.UtcNow;
  120. existRefreshToken.ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime);
  121. if (authenticate)
  122. {
  123. existRefreshToken.Used = false;
  124. existRefreshToken.Invalidated = false;
  125. }
  126. _databaseContext.RefreshTokens.Update(existRefreshToken);
  127. await UpdateRefreshToken(existRefreshToken);
  128. }
  129. else
  130. {
  131. await _databaseContext.RefreshTokens.AddAsync(refreshToken);
  132. }
  133. await _databaseContext.SaveChangesAsync();
  134. return writedToken;
  135. }
  136. public async Task<RefreshTokenResultDto> RefreshTokenAsync(RefreshTokenRequestDto model)
  137. {
  138. var validatedToken = GetPrincipalFromToken(model.Token);
  139. if (validatedToken == null)
  140. {
  141. return new RefreshTokenResultDto { Error = "Invalid token" };
  142. }
  143. var jti = validatedToken.Claims.Single(x => x.Type == JwtRegisteredClaimNames.Jti).Value;
  144. var storedRefreshToken = await _databaseContext.RefreshTokens.SingleOrDefaultAsync(x => x.JwtId == jti);
  145. if (storedRefreshToken == null)
  146. {
  147. return new RefreshTokenResultDto { Error = "This refresh token does not exist" };
  148. }
  149. var userk = await _databaseContext.Users.Where(u => u.Id == storedRefreshToken.UserId).FirstOrDefaultAsync();
  150. if(userk == null)
  151. {
  152. return new RefreshTokenResultDto { Error = "There is no user which is associated with refresh token" };
  153. }
  154. var expiryDateUnix = long.Parse(validatedToken.Claims.Single(x => x.Type == JwtRegisteredClaimNames.Exp).Value);
  155. var expiryDateTimeUtc = new DateTime(1970, 1, 1, 0, 0, 0, DateTimeKind.Utc)
  156. .AddMinutes(expiryDateUnix);
  157. if (expiryDateTimeUtc < DateTime.UtcNow)
  158. {
  159. return new RefreshTokenResultDto
  160. {
  161. Data = new AuthenticateResponseDto
  162. {
  163. Id = userk.Id,
  164. FirstName = userk.FirstName,
  165. LastName = userk.LastName,
  166. Username = userk.UserName,
  167. Token = model.Token,
  168. RefreshToken = model.RefreshToken
  169. }
  170. };
  171. }
  172. if (DateTime.UtcNow > storedRefreshToken.ExpiryDate)
  173. {
  174. return new RefreshTokenResultDto { Error = "This refresh token has expired" };
  175. }
  176. if (storedRefreshToken.Invalidated)
  177. {
  178. return new RefreshTokenResultDto { Error = "This refresh token has been invalidated" };
  179. }
  180. if (storedRefreshToken.JwtId != jti)
  181. {
  182. return new RefreshTokenResultDto { Error = "This refresh token does not match this JWT" };
  183. }
  184. storedRefreshToken.ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime);
  185. await _databaseContext.SaveChangesAsync();
  186. var user = await _userManager.FindByIdAsync(validatedToken.Claims.Single(x => x.Type == "id").Value);
  187. var token = await GenerateJwtToken(user);
  188. return new RefreshTokenResultDto
  189. {
  190. Data = new AuthenticateResponseDto
  191. {
  192. Id = userk.Id,
  193. FirstName = userk.FirstName,
  194. LastName = userk.LastName,
  195. Username = userk.UserName,
  196. Token = model.Token,
  197. RefreshToken = model.RefreshToken
  198. }
  199. };
  200. }
  201. public async Task<ServiceResponseDTO<string>> DeleteRefreshToken(int userId)
  202. {
  203. var refreshToken = await _databaseContext.RefreshTokens.Where(r => r.UserId == userId).FirstOrDefaultAsync();
  204. if (refreshToken is null)
  205. return new ServiceResponseDTO<string>
  206. {
  207. IsError = true,
  208. ErrorMessage = "There is no refresh token for user"
  209. };
  210. _databaseContext.RefreshTokens.Remove(refreshToken);
  211. var result = await _databaseContext.SaveChangesAsync() > 0;
  212. if (!result)
  213. return new ServiceResponseDTO<string>
  214. {
  215. IsError = true,
  216. ErrorMessage = "Problem with saving changes into database"
  217. };
  218. return new ServiceResponseDTO<string>
  219. {
  220. Data = null
  221. };
  222. }
  223. private ClaimsPrincipal? GetPrincipalFromToken(string token)
  224. {
  225. var tokenHandler = new JwtSecurityTokenHandler();
  226. var key = Encoding.ASCII.GetBytes(_authSettings.Secret);
  227. var tokenValidationParameters = new TokenValidationParameters
  228. {
  229. ValidateIssuerSigningKey = true,
  230. IssuerSigningKey = new SymmetricSecurityKey(key),
  231. ValidateIssuer = false,
  232. ValidateAudience = false,
  233. RequireExpirationTime = false,
  234. ValidateLifetime = true,
  235. // set clockskew to zero so tokens expire exactly at token expiration time (instead of 5 minutes later)
  236. //ClockSkew = TimeSpan.Zero
  237. };
  238. try
  239. {
  240. var principal = tokenHandler.ValidateToken(token, tokenValidationParameters, out var validatedToken);
  241. if (!IsJwtWithValidSecurityAlgorithm(validatedToken))
  242. {
  243. return null;
  244. }
  245. return principal;
  246. }
  247. catch (Exception)
  248. {
  249. return null;
  250. }
  251. }
  252. private static bool IsJwtWithValidSecurityAlgorithm(SecurityToken validatedToken)
  253. {
  254. return (validatedToken is JwtSecurityToken jwtSecurityToken) &&
  255. jwtSecurityToken.Header.Alg.Equals(SecurityAlgorithms.HmacSha256,
  256. StringComparison.InvariantCultureIgnoreCase);
  257. }
  258. public async Task<RefreshToken?> GetRefreshTokenByUserId(int userId)
  259. {
  260. return await _databaseContext.RefreshTokens.Where(x => x.UserId == userId).FirstOrDefaultAsync();
  261. }
  262. public async Task UpdateRefreshToken(RefreshToken refreshToken)
  263. {
  264. _databaseContext.RefreshTokens.Update(refreshToken);
  265. await _databaseContext.SaveChangesAsync();
  266. }
  267. }
  268. }