You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

UserService.cs 17KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464
  1. using Microsoft.AspNetCore.WebUtilities;
  2. using Microsoft.Extensions.Logging;
  3. using System.Net;
  4. namespace Diligent.WebAPI.Business.Services
  5. {
  6. public class UserService : IUserService
  7. {
  8. private readonly AuthorizationSettings _authSettings;
  9. private readonly FrontEndSettings _frontEndSettings;
  10. private readonly UserManager<User> _userManager;
  11. private readonly IMapper _mapper;
  12. private readonly DatabaseContext _databaseContext;
  13. private readonly IEmailer _emailer;
  14. private readonly ILogger<UserService> _logger;
  15. private const string GoogleApiTokenInfoUrl = "https://www.googleapis.com/oauth2/v3/tokeninfo?id_token={0}";
  16. private string[] SupportedClientsIds = { "" };
  17. public UserService(IOptions<AuthorizationSettings> authSettings, IOptions<FrontEndSettings> frontEndSettings, UserManager<User> userManager, IMapper mapper, DatabaseContext databaseContext, IEmailer emailer, ILogger<UserService> logger)
  18. {
  19. _authSettings = authSettings.Value;
  20. _frontEndSettings = frontEndSettings.Value;
  21. _userManager = userManager;
  22. _mapper = mapper;
  23. _databaseContext = databaseContext;
  24. _emailer = emailer;
  25. _logger = logger;
  26. }
  27. public async Task<IEnumerable<User?>> GetAll() =>
  28. await _userManager.Users.ToListAsync();
  29. public async Task<User?> GetById(int id) =>
  30. await _userManager.FindByIdAsync(id.ToString());
  31. public async Task CreateUser(CreateUserRequestDto model)
  32. {
  33. var user = _mapper.Map<User>(model);
  34. await _userManager.CreateAsync(user, model.Password);
  35. }
  36. private bool IsTokenValid(string providerToken)
  37. {
  38. var httpClient = new HttpClient();
  39. var requestUri = new Uri(string.Format(GoogleApiTokenInfoUrl, providerToken));
  40. HttpResponseMessage httpResponseMessage;
  41. try
  42. {
  43. httpResponseMessage = httpClient.GetAsync(requestUri).Result;
  44. }
  45. catch (Exception ex)
  46. {
  47. return false;
  48. }
  49. if (httpResponseMessage.StatusCode != HttpStatusCode.OK)
  50. {
  51. return false;
  52. }
  53. var response = httpResponseMessage.Content.ReadAsStringAsync().Result;
  54. var googleApiTokenInfo = JsonConvert.DeserializeObject<GoogleApiTokenInfo>(response);
  55. //if (!SupportedClientsIds.Contains(googleApiTokenInfo.aud))
  56. if(googleApiTokenInfo.aud != _authSettings.GoogleClientId)
  57. {
  58. return false;
  59. }
  60. return true;
  61. }
  62. public async Task<ServiceResponseDTO<AuthenticateResponseDto>> Authenticate(AuthenticateRequestDto model)
  63. {
  64. var user = await _userManager.FindByNameAsync(model.Username);
  65. // return null if user not found
  66. if (user == null)
  67. {
  68. return new ServiceResponseDTO<AuthenticateResponseDto>
  69. {
  70. IsError = true,
  71. ErrorMessage = "Username is not valid"
  72. };
  73. }
  74. var result = await _userManager.CheckPasswordAsync(user, model.Password);
  75. // password is not correct
  76. if (!result)
  77. {
  78. await _userManager.AccessFailedAsync(user);
  79. return new ServiceResponseDTO<AuthenticateResponseDto>
  80. {
  81. IsError = true,
  82. ErrorMessage = "Password is not correct"
  83. };
  84. }
  85. return await GenerateToken(user);
  86. }
  87. public async Task<ServiceResponseDTO<AuthenticateResponseDto>> Authenticate(GoogleApiModel model)
  88. {
  89. if (!IsTokenValid(model.Token))
  90. {
  91. return new ServiceResponseDTO<AuthenticateResponseDto>
  92. {
  93. IsError = true,
  94. ErrorMessage = "Invalid Google Api Token"
  95. };
  96. }
  97. var user = await _userManager.FindByEmailAsync(model.User.email);
  98. // return null if user not found
  99. if (user == null)
  100. {
  101. return new ServiceResponseDTO<AuthenticateResponseDto>
  102. {
  103. IsError = true,
  104. ErrorMessage = $"User with email {model.User.email} does not exist in database"
  105. };
  106. }
  107. return await GenerateToken(user);
  108. }
  109. private async Task<ServiceResponseDTO<AuthenticateResponseDto>> GenerateToken(User user)
  110. {
  111. var isLocked = await _userManager.IsLockedOutAsync(user);
  112. if (isLocked)
  113. return new ServiceResponseDTO<AuthenticateResponseDto>
  114. {
  115. IsError = true,
  116. ErrorMessage = "The account is locked out"
  117. };
  118. // authentication successful so generate jwt token
  119. var token = await GenerateJwtToken(user, true);
  120. var data = new AuthenticateResponseDto
  121. {
  122. Id = user.Id,
  123. Username = user.UserName,
  124. FirstName = user.FirstName,
  125. LastName = user.LastName,
  126. Token = token,
  127. RefreshToken = token
  128. };
  129. return new ServiceResponseDTO<AuthenticateResponseDto>
  130. {
  131. Data = data
  132. };
  133. }
  134. private async Task<string> GenerateJwtToken(User user, bool authenticate = false)
  135. {
  136. // generate token that is valid for 7 days
  137. var tokenHandler = new JwtSecurityTokenHandler();
  138. var key = Encoding.ASCII.GetBytes(_authSettings.Secret);
  139. var tokenDescriptor = new SecurityTokenDescriptor
  140. {
  141. Subject = new ClaimsIdentity(new[] {
  142. new Claim(JwtRegisteredClaimNames.Jti, user.Id.ToString()),
  143. new Claim("id", user.Id.ToString())
  144. }),
  145. Expires = DateTime.UtcNow.AddMinutes(_authSettings.JwtExpiredTime),
  146. SigningCredentials = new SigningCredentials(new SymmetricSecurityKey(key), SecurityAlgorithms.HmacSha256Signature)
  147. };
  148. var token = tokenHandler.CreateToken(tokenDescriptor);
  149. var writedToken = tokenHandler.WriteToken(token);
  150. var refreshToken = new RefreshToken
  151. {
  152. Token = writedToken,
  153. JwtId = user.Id.ToString(),
  154. UserId = user.Id,
  155. User = user,
  156. CreationDate = DateTime.UtcNow,
  157. ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime)
  158. };
  159. var existRefreshToken = await _databaseContext.RefreshTokens.Where(x => x.UserId == user.Id).FirstOrDefaultAsync();
  160. if (existRefreshToken != null)
  161. {
  162. existRefreshToken.Token = writedToken;
  163. existRefreshToken.JwtId = token.Id;
  164. existRefreshToken.CreationDate = DateTime.UtcNow;
  165. existRefreshToken.ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime);
  166. if (authenticate)
  167. {
  168. existRefreshToken.Used = false;
  169. existRefreshToken.Invalidated = false;
  170. }
  171. _databaseContext.RefreshTokens.Update(existRefreshToken);
  172. await UpdateRefreshToken(existRefreshToken);
  173. }
  174. else
  175. {
  176. await _databaseContext.RefreshTokens.AddAsync(refreshToken);
  177. }
  178. await _databaseContext.SaveChangesAsync();
  179. return writedToken;
  180. }
  181. public async Task<RefreshTokenResultDto> RefreshTokenAsync(RefreshTokenRequestDto model)
  182. {
  183. var validatedToken = GetPrincipalFromToken(model.Token, false);
  184. if (validatedToken == null)
  185. {
  186. return new RefreshTokenResultDto { Error = "Invalid token" };
  187. }
  188. var jti = validatedToken.Claims.Single(x => x.Type == JwtRegisteredClaimNames.Jti).Value;
  189. var storedRefreshToken = await _databaseContext.RefreshTokens.SingleOrDefaultAsync(x => x.JwtId == jti);
  190. if (storedRefreshToken == null)
  191. {
  192. return new RefreshTokenResultDto { Error = "This refresh token does not exist" };
  193. }
  194. var userk = await _databaseContext.Users.Where(u => u.Id == storedRefreshToken.UserId).FirstOrDefaultAsync();
  195. if (userk == null)
  196. {
  197. return new RefreshTokenResultDto { Error = "There is no user which is associated with refresh token" };
  198. }
  199. var expiryDateUnix = long.Parse(validatedToken.Claims.Single(x => x.Type == JwtRegisteredClaimNames.Exp).Value);
  200. var expiryDateTimeUtc = new DateTime(1970, 1, 1, 0, 0, 0, DateTimeKind.Utc)
  201. .AddMinutes(expiryDateUnix);
  202. if (expiryDateTimeUtc < DateTime.UtcNow)
  203. {
  204. return new RefreshTokenResultDto
  205. {
  206. Data = new AuthenticateResponseDto
  207. {
  208. Id = userk.Id,
  209. FirstName = userk.FirstName,
  210. LastName = userk.LastName,
  211. Username = userk.UserName,
  212. Token = model.Token,
  213. RefreshToken = model.RefreshToken
  214. }
  215. };
  216. }
  217. if (DateTime.UtcNow > storedRefreshToken.ExpiryDate)
  218. {
  219. return new RefreshTokenResultDto { Error = "This refresh token has expired" };
  220. }
  221. if (storedRefreshToken.Invalidated)
  222. {
  223. return new RefreshTokenResultDto { Error = "This refresh token has been invalidated" };
  224. }
  225. if (storedRefreshToken.JwtId != jti)
  226. {
  227. return new RefreshTokenResultDto { Error = "This refresh token does not match this JWT" };
  228. }
  229. storedRefreshToken.ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime);
  230. await _databaseContext.SaveChangesAsync();
  231. var user = await _userManager.FindByIdAsync(validatedToken.Claims.Single(x => x.Type == "id").Value);
  232. var token = await GenerateJwtToken(user);
  233. return new RefreshTokenResultDto
  234. {
  235. Data = new AuthenticateResponseDto
  236. {
  237. Id = userk.Id,
  238. FirstName = userk.FirstName,
  239. LastName = userk.LastName,
  240. Username = userk.UserName,
  241. Token = model.Token,
  242. RefreshToken = model.RefreshToken
  243. }
  244. };
  245. }
  246. public async Task<ServiceResponseDTO<string>> DeleteRefreshToken(int userId)
  247. {
  248. var refreshToken = await _databaseContext.RefreshTokens.Where(r => r.UserId == userId).FirstOrDefaultAsync();
  249. if (refreshToken is null)
  250. return new ServiceResponseDTO<string>
  251. {
  252. IsError = true,
  253. ErrorMessage = "There is no refresh token for user"
  254. };
  255. _databaseContext.RefreshTokens.Remove(refreshToken);
  256. var result = await _databaseContext.SaveChangesAsync() > 0;
  257. if (!result)
  258. return new ServiceResponseDTO<string>
  259. {
  260. IsError = true,
  261. ErrorMessage = "Problem with saving changes into database"
  262. };
  263. return new ServiceResponseDTO<string>
  264. {
  265. Data = null
  266. };
  267. }
  268. private ClaimsPrincipal? GetPrincipalFromToken(string token, bool validateLifetime)
  269. {
  270. var tokenHandler = new JwtSecurityTokenHandler();
  271. var key = Encoding.ASCII.GetBytes(_authSettings.Secret);
  272. var tokenValidationParameters = new TokenValidationParameters
  273. {
  274. ValidateIssuerSigningKey = true,
  275. IssuerSigningKey = new SymmetricSecurityKey(key),
  276. ValidateIssuer = false,
  277. ValidateAudience = false,
  278. RequireExpirationTime = false,
  279. ValidateLifetime = validateLifetime,
  280. // set clockskew to zero so tokens expire exactly at token expiration time (instead of 5 minutes later)
  281. //ClockSkew = TimeSpan.Zero
  282. };
  283. try
  284. {
  285. var principal = tokenHandler.ValidateToken(token, tokenValidationParameters, out var validatedToken);
  286. if (!IsJwtWithValidSecurityAlgorithm(validatedToken))
  287. {
  288. return null;
  289. }
  290. return principal;
  291. }
  292. catch (Exception)
  293. {
  294. return null;
  295. }
  296. }
  297. private static bool IsJwtWithValidSecurityAlgorithm(SecurityToken validatedToken)
  298. {
  299. return (validatedToken is JwtSecurityToken jwtSecurityToken) &&
  300. jwtSecurityToken.Header.Alg.Equals(SecurityAlgorithms.HmacSha256,
  301. StringComparison.InvariantCultureIgnoreCase);
  302. }
  303. public async Task<RefreshToken?> GetRefreshTokenByUserId(int userId)
  304. {
  305. return await _databaseContext.RefreshTokens.Where(x => x.UserId == userId).FirstOrDefaultAsync();
  306. }
  307. public async Task UpdateRefreshToken(RefreshToken refreshToken)
  308. {
  309. _databaseContext.RefreshTokens.Update(refreshToken);
  310. await _databaseContext.SaveChangesAsync();
  311. }
  312. public async Task<ServiceResponseDTO<object>> GetEmailConfirmationUrlAsync(string email)
  313. {
  314. var user = await _userManager.FindByEmailAsync(email);
  315. if (user == null)
  316. {
  317. return new ServiceResponseDTO<object>
  318. {
  319. IsError = true,
  320. ErrorMessage = "Email did not find."
  321. };
  322. }
  323. var token = await _userManager.GenerateEmailConfirmationTokenAsync(user);
  324. token = WebEncoders.Base64UrlEncode(Encoding.UTF8.GetBytes(token));
  325. await _emailer.SendEmailAndWriteToDbAsync(email, "Reset password", renderHTMLtoString($"{_frontEndSettings.BaseUrl}/reset-password?token={token}&email={email}"), isHtml: true);
  326. user.PasswordResetToken = token;
  327. await _databaseContext.SaveChangesAsync();
  328. return new ServiceResponseDTO<object>
  329. {
  330. Data = new { code = token, email = email }
  331. };
  332. }
  333. private string renderHTMLtoString(string url)
  334. {
  335. return "<div style=\"font-family: sans-serif\">" +
  336. "<div style=\"font-family: sans-serif;text-align: center;\">" +
  337. "<h2 style=\"color: #017397;\">HR Center Password Reset</h2>" +
  338. "<p style=\"font-size: 20px\">" +
  339. "To reset your HR Center password, please click on the button below." +
  340. "</p>" +
  341. "<a style = \"color: white;text-decoration:none;background-color: #017397;cursor: pointer;font-size: 20px;width: 220px;text-align: center;border-radius: 5px;padding: 5px 15px;height: 25px;\" " +
  342. $"href=\"{url}\">" +
  343. " RESET PASSWORD" +
  344. "</a>" +
  345. "<p style = \"font-size: 12px; margin-top: 25px;\" >" +
  346. "Please do not reply to this email.This message was sent from a notification-only address that is not monitored." +
  347. "</p>" +
  348. "</div>" +
  349. "</div>";
  350. }
  351. public async Task<ServiceResponseDTO<object>> PasswordResetAsync(string email, string code, string password)
  352. {
  353. var user = await _userManager.FindByEmailAsync(email);
  354. if (user == null)
  355. {
  356. return new ServiceResponseDTO<object>
  357. {
  358. IsError = true,
  359. ErrorMessage = "Email did not find."
  360. };
  361. }
  362. // FOR SOME REASON USERMANAGER.RESETPASSWORDASYNC returns InvalidToken. In future change this
  363. //var passwordResetToken = Encoding.UTF8.GetString(WebEncoders.Base64UrlDecode(code));
  364. //IdentityResult resetResult = await _userManager.ResetPasswordAsync(user, passwordResetToken, password);
  365. //if (resetResult.Succeeded)
  366. await _userManager.RemovePasswordAsync(user);
  367. await _userManager.AddPasswordAsync(user, password);
  368. if(user.PasswordResetToken == code)
  369. {
  370. if (await _userManager.IsLockedOutAsync(user))
  371. {
  372. await _userManager.SetLockoutEndDateAsync(user, DateTimeOffset.UtcNow);
  373. }
  374. return new ServiceResponseDTO<object> { Data = true };
  375. }
  376. //var errors = resetResult.Errors.Select(x => x.Description);
  377. return new ServiceResponseDTO<object>
  378. {
  379. IsError = true,
  380. ErrorMessage = "Invalid reset password token"
  381. };
  382. }
  383. }
  384. }