You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

AuthenticationService.cs 16KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422
  1. using Microsoft.AspNetCore.WebUtilities;
  2. namespace Diligent.WebAPI.Business.Services
  3. {
  4. public class AuthenticationService : IAuthenticationService
  5. {
  6. private readonly AuthorizationSettings _authSettings;
  7. private readonly FrontEndSettings _frontEndSettings;
  8. private readonly UserManager<User> _userManager;
  9. private readonly DatabaseContext _databaseContext;
  10. private readonly IEmailer _emailer;
  11. private readonly ILogger<AuthenticationService> _logger;
  12. private readonly IHttpClientService _httpClient;
  13. public AuthenticationService(IOptions<AuthorizationSettings> authSettings,
  14. IOptions<FrontEndSettings> frontEndSettings,
  15. UserManager<User> userManager,
  16. DatabaseContext databaseContext,
  17. IEmailer emailer,
  18. ILogger<AuthenticationService> logger,
  19. IHttpClientService httpClient)
  20. {
  21. _authSettings = authSettings.Value;
  22. _frontEndSettings = frontEndSettings.Value;
  23. _userManager = userManager;
  24. _databaseContext = databaseContext;
  25. _httpClient = httpClient;
  26. _emailer = emailer;
  27. _logger = logger;
  28. }
  29. public async Task<ServiceResponseDTO<AuthenticateResponseDto>> Authenticate(AuthenticateRequestDto model)
  30. {
  31. _logger.LogError($"Checking credentials for user: {model.Username}");
  32. var user = await _userManager.FindByNameAsync(model.Username);
  33. // return null if user not found
  34. if (user == null)
  35. {
  36. _logger.LogError($"User with username = {model.Username} not found");
  37. return new ServiceResponseDTO<AuthenticateResponseDto>
  38. {
  39. IsError = true,
  40. ErrorMessage = "Username is not valid"
  41. };
  42. }
  43. var result = await _userManager.CheckPasswordAsync(user, model.Password);
  44. // return null if user is disabled
  45. if (user.IsEnabled == false)
  46. {
  47. _logger.LogError($"User: {model.Username} is not enabled");
  48. return new ServiceResponseDTO<AuthenticateResponseDto>
  49. {
  50. IsError = true,
  51. ErrorMessage = $"User with email {model.Username} has no permission to log in."
  52. };
  53. }
  54. // password is not correct
  55. if (!result)
  56. {
  57. _logger.LogError($"Password for user: {model.Username} is not correct");
  58. await _userManager.AccessFailedAsync(user);
  59. return new ServiceResponseDTO<AuthenticateResponseDto>
  60. {
  61. IsError = true,
  62. ErrorMessage = "Password is not correct"
  63. };
  64. }
  65. var token = await GenerateToken(user);
  66. _logger.LogError($"Successfull login token: {token}");
  67. return token;
  68. }
  69. public async Task<ServiceResponseDTO<AuthenticateResponseDto>> Authenticate(GoogleApiModel model)
  70. {
  71. _logger.LogError($"Checking token for google login {model.Token}");
  72. if (!(await _httpClient.IsTokenValid(model.Token)))
  73. {
  74. _logger.LogError($"Token is not valid");
  75. return new ServiceResponseDTO<AuthenticateResponseDto>
  76. {
  77. IsError = true,
  78. ErrorMessage = "Invalid Google Api Token"
  79. };
  80. }
  81. _logger.LogError($"Checking if user exists in Db with email : {model.User.email}");
  82. var user = await _userManager.FindByEmailAsync(model.User.email);
  83. // return null if user not found
  84. if (user == null)
  85. {
  86. _logger.LogError($"User does not exist in Db");
  87. return new ServiceResponseDTO<AuthenticateResponseDto>
  88. {
  89. IsError = true,
  90. ErrorMessage = $"User with email {model.User.email} does not exist in database"
  91. };
  92. }
  93. if (user.IsEnabled == false)
  94. {
  95. _logger.LogError($"User is not enabled");
  96. return new ServiceResponseDTO<AuthenticateResponseDto>
  97. {
  98. IsError = true,
  99. ErrorMessage = $"User with email {model.User.email} has no permission to log in."
  100. };
  101. }
  102. var token = await GenerateToken(user);
  103. _logger.LogInformation($"Successfull login. Token :{token}");
  104. return token;
  105. }
  106. private async Task<ServiceResponseDTO<AuthenticateResponseDto>> GenerateToken(User user)
  107. {
  108. var isLocked = await _userManager.IsLockedOutAsync(user);
  109. if (isLocked)
  110. return new ServiceResponseDTO<AuthenticateResponseDto>
  111. {
  112. IsError = true,
  113. ErrorMessage = "The account is locked out"
  114. };
  115. // authentication successful so generate jwt token
  116. var token = await GenerateJwtToken(user, true);
  117. var data = new AuthenticateResponseDto
  118. {
  119. Id = user.Id,
  120. Username = user.UserName,
  121. FirstName = user.FirstName,
  122. LastName = user.LastName,
  123. Token = token,
  124. RefreshToken = token
  125. };
  126. return new ServiceResponseDTO<AuthenticateResponseDto>
  127. {
  128. Data = data
  129. };
  130. }
  131. private async Task<string> GenerateJwtToken(User user, bool authenticate = false)
  132. {
  133. // generate token that is valid for 7 days
  134. var tokenHandler = new JwtSecurityTokenHandler();
  135. var key = Encoding.ASCII.GetBytes(_authSettings.Secret);
  136. var tokenDescriptor = new SecurityTokenDescriptor
  137. {
  138. Subject = new ClaimsIdentity(new[] {
  139. new Claim(JwtRegisteredClaimNames.Jti, user.Id.ToString()),
  140. new Claim("id", user.Id.ToString())
  141. }),
  142. Expires = DateTime.UtcNow.AddMinutes(_authSettings.JwtExpiredTime),
  143. SigningCredentials = new SigningCredentials(new SymmetricSecurityKey(key), SecurityAlgorithms.HmacSha256Signature)
  144. };
  145. var token = tokenHandler.CreateToken(tokenDescriptor);
  146. var writedToken = tokenHandler.WriteToken(token);
  147. var refreshToken = new RefreshToken
  148. {
  149. Token = writedToken,
  150. JwtId = user.Id.ToString(),
  151. UserId = user.Id,
  152. User = user,
  153. CreationDate = DateTime.UtcNow,
  154. ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime)
  155. };
  156. var existRefreshToken = await _databaseContext.RefreshTokens.Where(x => x.UserId == user.Id).FirstOrDefaultAsync();
  157. if (existRefreshToken != null)
  158. {
  159. existRefreshToken.Token = writedToken;
  160. existRefreshToken.JwtId = token.Id;
  161. existRefreshToken.CreationDate = DateTime.UtcNow;
  162. existRefreshToken.ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime);
  163. if (authenticate)
  164. {
  165. existRefreshToken.Used = false;
  166. existRefreshToken.Invalidated = false;
  167. }
  168. _databaseContext.RefreshTokens.Update(existRefreshToken);
  169. await UpdateRefreshToken(existRefreshToken);
  170. }
  171. else
  172. {
  173. await _databaseContext.RefreshTokens.AddAsync(refreshToken);
  174. }
  175. await _databaseContext.SaveChangesAsync();
  176. _logger.LogInformation($"JWTToken : {writedToken}");
  177. return writedToken;
  178. }
  179. public async Task<RefreshTokenResultDto> RefreshTokenAsync(RefreshTokenRequestDto model)
  180. {
  181. var validatedToken = GetPrincipalFromToken(model.Token, false);
  182. if (validatedToken == null)
  183. {
  184. return new RefreshTokenResultDto { Error = "Invalid token" };
  185. }
  186. var jti = validatedToken.Claims.Single(x => x.Type == JwtRegisteredClaimNames.Jti).Value;
  187. var storedRefreshToken = await _databaseContext.RefreshTokens.SingleOrDefaultAsync(x => x.JwtId == jti);
  188. if (storedRefreshToken == null)
  189. {
  190. return new RefreshTokenResultDto { Error = "This refresh token does not exist" };
  191. }
  192. var userk = await _databaseContext.Users.Where(u => u.Id == storedRefreshToken.UserId).FirstOrDefaultAsync();
  193. if (userk == null)
  194. {
  195. return new RefreshTokenResultDto { Error = "There is no user which is associated with refresh token" };
  196. }
  197. var expiryDateUnix = long.Parse(validatedToken.Claims.Single(x => x.Type == JwtRegisteredClaimNames.Exp).Value);
  198. var expiryDateTimeUtc = new DateTime(1970, 1, 1, 0, 0, 0, DateTimeKind.Utc)
  199. .AddMinutes(expiryDateUnix);
  200. if (expiryDateTimeUtc < DateTime.UtcNow)
  201. {
  202. return new RefreshTokenResultDto
  203. {
  204. Data = new AuthenticateResponseDto
  205. {
  206. Id = userk.Id,
  207. FirstName = userk.FirstName,
  208. LastName = userk.LastName,
  209. Username = userk.UserName,
  210. Token = model.Token,
  211. RefreshToken = model.RefreshToken
  212. }
  213. };
  214. }
  215. if (DateTime.UtcNow > storedRefreshToken.ExpiryDate)
  216. {
  217. return new RefreshTokenResultDto { Error = "This refresh token has expired" };
  218. }
  219. if (storedRefreshToken.Invalidated)
  220. {
  221. return new RefreshTokenResultDto { Error = "This refresh token has been invalidated" };
  222. }
  223. if (storedRefreshToken.JwtId != jti)
  224. {
  225. return new RefreshTokenResultDto { Error = "This refresh token does not match this JWT" };
  226. }
  227. storedRefreshToken.ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime);
  228. await _databaseContext.SaveChangesAsync();
  229. var user = await _userManager.FindByIdAsync(validatedToken.Claims.Single(x => x.Type == "id").Value);
  230. var token = await GenerateJwtToken(user);
  231. _logger.LogInformation($"Refresh token : {model.Token}");
  232. return new RefreshTokenResultDto
  233. {
  234. Data = new AuthenticateResponseDto
  235. {
  236. Id = userk.Id,
  237. FirstName = userk.FirstName,
  238. LastName = userk.LastName,
  239. Username = userk.UserName,
  240. Token = token,
  241. RefreshToken = token
  242. }
  243. };
  244. }
  245. public async Task<ServiceResponseDTO<string>> DeleteRefreshToken(int userId)
  246. {
  247. var refreshToken = await _databaseContext.RefreshTokens.Where(r => r.UserId == userId).FirstOrDefaultAsync();
  248. if (refreshToken is null)
  249. return new ServiceResponseDTO<string>
  250. {
  251. IsError = true,
  252. ErrorMessage = "There is no refresh token for user"
  253. };
  254. _databaseContext.RefreshTokens.Remove(refreshToken);
  255. var result = await _databaseContext.SaveChangesAsync() > 0;
  256. if (!result)
  257. return new ServiceResponseDTO<string>
  258. {
  259. IsError = true,
  260. ErrorMessage = "Problem with saving changes into database"
  261. };
  262. _logger.LogInformation($"Delted refresh token : {refreshToken}");
  263. return new ServiceResponseDTO<string>
  264. {
  265. Data = null
  266. };
  267. }
  268. private ClaimsPrincipal? GetPrincipalFromToken(string token, bool validateLifetime)
  269. {
  270. var tokenHandler = new JwtSecurityTokenHandler();
  271. var key = Encoding.ASCII.GetBytes(_authSettings.Secret);
  272. var tokenValidationParameters = new TokenValidationParameters
  273. {
  274. ValidateIssuerSigningKey = true,
  275. IssuerSigningKey = new SymmetricSecurityKey(key),
  276. ValidateIssuer = false,
  277. ValidateAudience = false,
  278. RequireExpirationTime = false,
  279. ValidateLifetime = validateLifetime,
  280. // set clockskew to zero so tokens expire exactly at token expiration time (instead of 5 minutes later)
  281. //ClockSkew = TimeSpan.Zero
  282. };
  283. try
  284. {
  285. var principal = tokenHandler.ValidateToken(token, tokenValidationParameters, out var validatedToken);
  286. if (!IsJwtWithValidSecurityAlgorithm(validatedToken))
  287. {
  288. return null;
  289. }
  290. return principal;
  291. }
  292. catch (Exception)
  293. {
  294. return null;
  295. }
  296. }
  297. private static bool IsJwtWithValidSecurityAlgorithm(SecurityToken validatedToken)
  298. {
  299. return (validatedToken is JwtSecurityToken jwtSecurityToken) &&
  300. jwtSecurityToken.Header.Alg.Equals(SecurityAlgorithms.HmacSha256,
  301. StringComparison.InvariantCultureIgnoreCase);
  302. }
  303. public async Task<RefreshToken?> GetRefreshTokenByUserId(int userId)
  304. {
  305. return await _databaseContext.RefreshTokens.Where(x => x.UserId == userId).FirstOrDefaultAsync();
  306. }
  307. public async Task UpdateRefreshToken(RefreshToken refreshToken)
  308. {
  309. _databaseContext.RefreshTokens.Update(refreshToken);
  310. await _databaseContext.SaveChangesAsync();
  311. }
  312. public async Task<ServiceResponseDTO<object>> GetForgotPasswordUrlAsync(string email)
  313. {
  314. _logger.LogInformation($"Sending forgot password email for : {email}");
  315. var user = await _userManager.FindByEmailAsync(email);
  316. if (user == null)
  317. {
  318. return new ServiceResponseDTO<object>
  319. {
  320. IsError = true,
  321. ErrorMessage = "Email did not find."
  322. };
  323. }
  324. var token = await _userManager.GeneratePasswordResetTokenAsync(user);
  325. token = WebEncoders.Base64UrlEncode(Encoding.UTF8.GetBytes(token));
  326. await _emailer.SendEmailAndWriteToDbAsync(email, "Reset password", HTMLHelper.RenderForgotPasswordPage($"{_frontEndSettings.BaseUrl}/reset-password?token={token}&email={email}"), isHtml: true);
  327. _logger.LogInformation($"Reset password email is sent");
  328. return new ServiceResponseDTO<object>
  329. {
  330. Data = new { code = token, email = email }
  331. };
  332. }
  333. public async Task<ServiceResponseDTO<object>> PasswordResetAsync(string email, string code, string password)
  334. {
  335. _logger.LogInformation($"User with email : {email} changes password");
  336. var user = await _userManager.FindByEmailAsync(email);
  337. if (user == null)
  338. {
  339. return new ServiceResponseDTO<object>
  340. {
  341. IsError = true,
  342. ErrorMessage = "Email did not find."
  343. };
  344. }
  345. var passwordResetToken = Encoding.UTF8.GetString(WebEncoders.Base64UrlDecode(code));
  346. IdentityResult resetResult = await _userManager.ResetPasswordAsync(user, passwordResetToken, password);
  347. if (resetResult.Succeeded)
  348. {
  349. _logger.LogInformation($"Password for user : {email} changed successfully");
  350. return new ServiceResponseDTO<object> { Data = true };
  351. }
  352. var errors = resetResult.Errors.Select(x => x.Description);
  353. return new ServiceResponseDTO<object>
  354. {
  355. IsError = true,
  356. ErrorMessage = errors.First()
  357. };
  358. }
  359. }
  360. }