Вы не можете выбрать более 25 тем Темы должны начинаться с буквы или цифры, могут содержать дефисы(-) и должны содержать не более 35 символов.

UserService.cs 13KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376
  1. using Newtonsoft.Json;
  2. using System.Net;
  3. namespace Diligent.WebAPI.Business.Services
  4. {
  5. public class UserService : IUserService
  6. {
  7. private readonly AuthorizationSettings _authSettings;
  8. private readonly UserManager<User> _userManager;
  9. private readonly IMapper _mapper;
  10. private readonly DatabaseContext _databaseContext;
  11. public UserService(IOptions<AuthorizationSettings> authSettings, UserManager<User> userManager, IMapper mapper, DatabaseContext databaseContext)
  12. {
  13. _authSettings = authSettings.Value;
  14. _userManager = userManager;
  15. _mapper = mapper;
  16. _databaseContext = databaseContext;
  17. }
  18. public async Task<IEnumerable<User?>> GetAll() =>
  19. await _userManager.Users.ToListAsync();
  20. public async Task<User?> GetById(int id) =>
  21. await _userManager.FindByIdAsync(id.ToString());
  22. public async Task CreateUser(CreateUserRequestDto model)
  23. {
  24. var user = _mapper.Map<User>(model);
  25. await _userManager.CreateAsync(user, model.Password);
  26. }
  27. private const string GoogleApiTokenInfoUrl = "https://www.googleapis.com/oauth2/v3/tokeninfo?id_token={0}";
  28. private string[] SupportedClientsIds = { "734219382849-nvnulsu7ibfl4bk3n164bgb7c1h5dgca.apps.googleusercontent.com" };
  29. private bool IsTokenValid(string providerToken)
  30. {
  31. var httpClient = new HttpClient();
  32. var requestUri = new Uri(string.Format(GoogleApiTokenInfoUrl, providerToken));
  33. HttpResponseMessage httpResponseMessage;
  34. try
  35. {
  36. httpResponseMessage = httpClient.GetAsync(requestUri).Result;
  37. }
  38. catch (Exception ex)
  39. {
  40. return false;
  41. }
  42. if (httpResponseMessage.StatusCode != HttpStatusCode.OK)
  43. {
  44. return false;
  45. }
  46. var response = httpResponseMessage.Content.ReadAsStringAsync().Result;
  47. var googleApiTokenInfo = JsonConvert.DeserializeObject<GoogleApiTokenInfo>(response);
  48. if (!SupportedClientsIds.Contains(googleApiTokenInfo.aud))
  49. {
  50. return false;
  51. }
  52. return true;
  53. }
  54. public async Task<ServiceResponseDTO<AuthenticateResponseDto>> Authenticate(AuthenticateRequestDto model)
  55. {
  56. var user = await _userManager.FindByNameAsync(model.Username);
  57. // return null if user not found
  58. if (user == null)
  59. {
  60. return new ServiceResponseDTO<AuthenticateResponseDto>
  61. {
  62. IsError = true,
  63. ErrorMessage = "Username is not valid"
  64. };
  65. }
  66. var result = await _userManager.CheckPasswordAsync(user, model.Password);
  67. // password is not correct
  68. if (!result)
  69. {
  70. await _userManager.AccessFailedAsync(user);
  71. return new ServiceResponseDTO<AuthenticateResponseDto>
  72. {
  73. IsError = true,
  74. ErrorMessage = "Password is not correct"
  75. };
  76. }
  77. return await GenerateToken(user);
  78. }
  79. public async Task<ServiceResponseDTO<AuthenticateResponseDto>> Authenticate(GoogleApiModel model)
  80. {
  81. if (!IsTokenValid(model.Token))
  82. {
  83. return new ServiceResponseDTO<AuthenticateResponseDto>
  84. {
  85. IsError = true,
  86. ErrorMessage = "Invalid Google Api Token"
  87. };
  88. }
  89. var user = await _userManager.FindByEmailAsync(model.User.email);
  90. // return null if user not found
  91. if (user == null)
  92. {
  93. return new ServiceResponseDTO<AuthenticateResponseDto>
  94. {
  95. IsError = true,
  96. ErrorMessage = $"User with email {model.User.email} does not exist in database"
  97. };
  98. }
  99. return await GenerateToken(user);
  100. }
  101. private async Task<ServiceResponseDTO<AuthenticateResponseDto>> GenerateToken(User user)
  102. {
  103. var isLocked = await _userManager.IsLockedOutAsync(user);
  104. if (isLocked)
  105. return new ServiceResponseDTO<AuthenticateResponseDto>
  106. {
  107. IsError = true,
  108. ErrorMessage = "The account is locked out"
  109. };
  110. // authentication successful so generate jwt token
  111. var token = await GenerateJwtToken(user, true);
  112. var data = new AuthenticateResponseDto
  113. {
  114. Id = user.Id,
  115. Username = user.UserName,
  116. FirstName = user.FirstName,
  117. LastName = user.LastName,
  118. Token = token,
  119. RefreshToken = token
  120. };
  121. return new ServiceResponseDTO<AuthenticateResponseDto>
  122. {
  123. Data = data
  124. };
  125. }
  126. private async Task<string> GenerateJwtToken(User user, bool authenticate = false)
  127. {
  128. // generate token that is valid for 7 days
  129. var tokenHandler = new JwtSecurityTokenHandler();
  130. var key = Encoding.ASCII.GetBytes(_authSettings.Secret);
  131. var tokenDescriptor = new SecurityTokenDescriptor
  132. {
  133. Subject = new ClaimsIdentity(new[] {
  134. new Claim(JwtRegisteredClaimNames.Jti, user.Id.ToString()),
  135. new Claim("id", user.Id.ToString())
  136. }),
  137. Expires = DateTime.UtcNow.AddMinutes(_authSettings.JwtExpiredTime),
  138. SigningCredentials = new SigningCredentials(new SymmetricSecurityKey(key), SecurityAlgorithms.HmacSha256Signature)
  139. };
  140. var token = tokenHandler.CreateToken(tokenDescriptor);
  141. var writedToken = tokenHandler.WriteToken(token);
  142. var refreshToken = new RefreshToken
  143. {
  144. Token = writedToken,
  145. JwtId = user.Id.ToString(),
  146. UserId = user.Id,
  147. User = user,
  148. CreationDate = DateTime.UtcNow,
  149. ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime)
  150. };
  151. var existRefreshToken = await _databaseContext.RefreshTokens.Where(x => x.UserId == user.Id).FirstOrDefaultAsync();
  152. if(existRefreshToken != null)
  153. {
  154. existRefreshToken.Token = writedToken;
  155. existRefreshToken.JwtId = token.Id;
  156. existRefreshToken.CreationDate = DateTime.UtcNow;
  157. existRefreshToken.ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime);
  158. if (authenticate)
  159. {
  160. existRefreshToken.Used = false;
  161. existRefreshToken.Invalidated = false;
  162. }
  163. _databaseContext.RefreshTokens.Update(existRefreshToken);
  164. await UpdateRefreshToken(existRefreshToken);
  165. }
  166. else
  167. {
  168. await _databaseContext.RefreshTokens.AddAsync(refreshToken);
  169. }
  170. await _databaseContext.SaveChangesAsync();
  171. return writedToken;
  172. }
  173. public async Task<RefreshTokenResultDto> RefreshTokenAsync(RefreshTokenRequestDto model)
  174. {
  175. var validatedToken = GetPrincipalFromToken(model.Token);
  176. if (validatedToken == null)
  177. {
  178. return new RefreshTokenResultDto { Error = "Invalid token" };
  179. }
  180. var jti = validatedToken.Claims.Single(x => x.Type == JwtRegisteredClaimNames.Jti).Value;
  181. var storedRefreshToken = await _databaseContext.RefreshTokens.SingleOrDefaultAsync(x => x.JwtId == jti);
  182. if (storedRefreshToken == null)
  183. {
  184. return new RefreshTokenResultDto { Error = "This refresh token does not exist" };
  185. }
  186. var userk = await _databaseContext.Users.Where(u => u.Id == storedRefreshToken.UserId).FirstOrDefaultAsync();
  187. if(userk == null)
  188. {
  189. return new RefreshTokenResultDto { Error = "There is no user which is associated with refresh token" };
  190. }
  191. var expiryDateUnix = long.Parse(validatedToken.Claims.Single(x => x.Type == JwtRegisteredClaimNames.Exp).Value);
  192. var expiryDateTimeUtc = new DateTime(1970, 1, 1, 0, 0, 0, DateTimeKind.Utc)
  193. .AddMinutes(expiryDateUnix);
  194. if (expiryDateTimeUtc < DateTime.UtcNow)
  195. {
  196. return new RefreshTokenResultDto
  197. {
  198. Data = new AuthenticateResponseDto
  199. {
  200. Id = userk.Id,
  201. FirstName = userk.FirstName,
  202. LastName = userk.LastName,
  203. Username = userk.UserName,
  204. Token = model.Token,
  205. RefreshToken = model.RefreshToken
  206. }
  207. };
  208. }
  209. if (DateTime.UtcNow > storedRefreshToken.ExpiryDate)
  210. {
  211. return new RefreshTokenResultDto { Error = "This refresh token has expired" };
  212. }
  213. if (storedRefreshToken.Invalidated)
  214. {
  215. return new RefreshTokenResultDto { Error = "This refresh token has been invalidated" };
  216. }
  217. if (storedRefreshToken.JwtId != jti)
  218. {
  219. return new RefreshTokenResultDto { Error = "This refresh token does not match this JWT" };
  220. }
  221. storedRefreshToken.ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime);
  222. await _databaseContext.SaveChangesAsync();
  223. var user = await _userManager.FindByIdAsync(validatedToken.Claims.Single(x => x.Type == "id").Value);
  224. var token = await GenerateJwtToken(user);
  225. return new RefreshTokenResultDto
  226. {
  227. Data = new AuthenticateResponseDto
  228. {
  229. Id = userk.Id,
  230. FirstName = userk.FirstName,
  231. LastName = userk.LastName,
  232. Username = userk.UserName,
  233. Token = model.Token,
  234. RefreshToken = model.RefreshToken
  235. }
  236. };
  237. }
  238. public async Task<ServiceResponseDTO<string>> DeleteRefreshToken(int userId)
  239. {
  240. var refreshToken = await _databaseContext.RefreshTokens.Where(r => r.UserId == userId).FirstOrDefaultAsync();
  241. if (refreshToken is null)
  242. return new ServiceResponseDTO<string>
  243. {
  244. IsError = true,
  245. ErrorMessage = "There is no refresh token for user"
  246. };
  247. _databaseContext.RefreshTokens.Remove(refreshToken);
  248. var result = await _databaseContext.SaveChangesAsync() > 0;
  249. if (!result)
  250. return new ServiceResponseDTO<string>
  251. {
  252. IsError = true,
  253. ErrorMessage = "Problem with saving changes into database"
  254. };
  255. return new ServiceResponseDTO<string>
  256. {
  257. Data = null
  258. };
  259. }
  260. private ClaimsPrincipal? GetPrincipalFromToken(string token)
  261. {
  262. var tokenHandler = new JwtSecurityTokenHandler();
  263. var key = Encoding.ASCII.GetBytes(_authSettings.Secret);
  264. var tokenValidationParameters = new TokenValidationParameters
  265. {
  266. ValidateIssuerSigningKey = true,
  267. IssuerSigningKey = new SymmetricSecurityKey(key),
  268. ValidateIssuer = false,
  269. ValidateAudience = false,
  270. RequireExpirationTime = false,
  271. ValidateLifetime = true,
  272. // set clockskew to zero so tokens expire exactly at token expiration time (instead of 5 minutes later)
  273. //ClockSkew = TimeSpan.Zero
  274. };
  275. try
  276. {
  277. var principal = tokenHandler.ValidateToken(token, tokenValidationParameters, out var validatedToken);
  278. if (!IsJwtWithValidSecurityAlgorithm(validatedToken))
  279. {
  280. return null;
  281. }
  282. return principal;
  283. }
  284. catch (Exception)
  285. {
  286. return null;
  287. }
  288. }
  289. private static bool IsJwtWithValidSecurityAlgorithm(SecurityToken validatedToken)
  290. {
  291. return (validatedToken is JwtSecurityToken jwtSecurityToken) &&
  292. jwtSecurityToken.Header.Alg.Equals(SecurityAlgorithms.HmacSha256,
  293. StringComparison.InvariantCultureIgnoreCase);
  294. }
  295. public async Task<RefreshToken?> GetRefreshTokenByUserId(int userId)
  296. {
  297. return await _databaseContext.RefreshTokens.Where(x => x.UserId == userId).FirstOrDefaultAsync();
  298. }
  299. public async Task UpdateRefreshToken(RefreshToken refreshToken)
  300. {
  301. _databaseContext.RefreshTokens.Update(refreshToken);
  302. await _databaseContext.SaveChangesAsync();
  303. }
  304. }
  305. }