You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

UserService.cs 16KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448
  1. using Diligent.WebAPI.Business.Services.Interfaces;
  2. using Diligent.WebAPI.Data.Entities;
  3. using Microsoft.AspNetCore.Mvc;
  4. using Microsoft.AspNetCore.WebUtilities;
  5. using Microsoft.Extensions.Logging;
  6. using Newtonsoft.Json;
  7. using System;
  8. using System.Net;
  9. using System.Security.Policy;
  10. namespace Diligent.WebAPI.Business.Services
  11. {
  12. public class UserService : IUserService
  13. {
  14. private readonly AuthorizationSettings _authSettings;
  15. private readonly UserManager<User> _userManager;
  16. private readonly IMapper _mapper;
  17. private readonly DatabaseContext _databaseContext;
  18. private readonly IEmailer _emailer;
  19. private readonly ILogger<UserService> _logger;
  20. public UserService(IOptions<AuthorizationSettings> authSettings, UserManager<User> userManager, IMapper mapper, DatabaseContext databaseContext, IEmailer emailer, ILogger<UserService> logger)
  21. {
  22. _authSettings = authSettings.Value;
  23. _userManager = userManager;
  24. _mapper = mapper;
  25. _databaseContext = databaseContext;
  26. _emailer = emailer;
  27. _logger = logger;
  28. }
  29. public async Task<IEnumerable<User?>> GetAll() =>
  30. await _userManager.Users.ToListAsync();
  31. public async Task<User?> GetById(int id) =>
  32. await _userManager.FindByIdAsync(id.ToString());
  33. public async Task CreateUser(CreateUserRequestDto model)
  34. {
  35. var user = _mapper.Map<User>(model);
  36. await _userManager.CreateAsync(user, model.Password);
  37. }
  38. private const string GoogleApiTokenInfoUrl = "https://www.googleapis.com/oauth2/v3/tokeninfo?id_token={0}";
  39. private string[] SupportedClientsIds = { "734219382849-nvnulsu7ibfl4bk3n164bgb7c1h5dgca.apps.googleusercontent.com" };
  40. private bool IsTokenValid(string providerToken)
  41. {
  42. var httpClient = new HttpClient();
  43. var requestUri = new Uri(string.Format(GoogleApiTokenInfoUrl, providerToken));
  44. HttpResponseMessage httpResponseMessage;
  45. try
  46. {
  47. httpResponseMessage = httpClient.GetAsync(requestUri).Result;
  48. }
  49. catch (Exception ex)
  50. {
  51. return false;
  52. }
  53. if (httpResponseMessage.StatusCode != HttpStatusCode.OK)
  54. {
  55. return false;
  56. }
  57. var response = httpResponseMessage.Content.ReadAsStringAsync().Result;
  58. var googleApiTokenInfo = JsonConvert.DeserializeObject<GoogleApiTokenInfo>(response);
  59. if (!SupportedClientsIds.Contains(googleApiTokenInfo.aud))
  60. {
  61. return false;
  62. }
  63. return true;
  64. }
  65. public async Task<ServiceResponseDTO<AuthenticateResponseDto>> Authenticate(AuthenticateRequestDto model)
  66. {
  67. var user = await _userManager.FindByNameAsync(model.Username);
  68. // return null if user not found
  69. if (user == null)
  70. {
  71. return new ServiceResponseDTO<AuthenticateResponseDto>
  72. {
  73. IsError = true,
  74. ErrorMessage = "Username is not valid"
  75. };
  76. }
  77. var result = await _userManager.CheckPasswordAsync(user, model.Password);
  78. // password is not correct
  79. if (!result)
  80. {
  81. await _userManager.AccessFailedAsync(user);
  82. return new ServiceResponseDTO<AuthenticateResponseDto>
  83. {
  84. IsError = true,
  85. ErrorMessage = "Password is not correct"
  86. };
  87. }
  88. return await GenerateToken(user);
  89. }
  90. public async Task<ServiceResponseDTO<AuthenticateResponseDto>> Authenticate(GoogleApiModel model)
  91. {
  92. if (!IsTokenValid(model.Token))
  93. {
  94. return new ServiceResponseDTO<AuthenticateResponseDto>
  95. {
  96. IsError = true,
  97. ErrorMessage = "Invalid Google Api Token"
  98. };
  99. }
  100. var user = await _userManager.FindByEmailAsync(model.User.email);
  101. // return null if user not found
  102. if (user == null)
  103. {
  104. return new ServiceResponseDTO<AuthenticateResponseDto>
  105. {
  106. IsError = true,
  107. ErrorMessage = $"User with email {model.User.email} does not exist in database"
  108. };
  109. }
  110. return await GenerateToken(user);
  111. }
  112. private async Task<ServiceResponseDTO<AuthenticateResponseDto>> GenerateToken(User user)
  113. {
  114. var isLocked = await _userManager.IsLockedOutAsync(user);
  115. if (isLocked)
  116. return new ServiceResponseDTO<AuthenticateResponseDto>
  117. {
  118. IsError = true,
  119. ErrorMessage = "The account is locked out"
  120. };
  121. // authentication successful so generate jwt token
  122. var token = await GenerateJwtToken(user, true);
  123. var data = new AuthenticateResponseDto
  124. {
  125. Id = user.Id,
  126. Username = user.UserName,
  127. FirstName = user.FirstName,
  128. LastName = user.LastName,
  129. Token = token,
  130. RefreshToken = token
  131. };
  132. return new ServiceResponseDTO<AuthenticateResponseDto>
  133. {
  134. Data = data
  135. };
  136. }
  137. private async Task<string> GenerateJwtToken(User user, bool authenticate = false)
  138. {
  139. // generate token that is valid for 7 days
  140. var tokenHandler = new JwtSecurityTokenHandler();
  141. var key = Encoding.ASCII.GetBytes(_authSettings.Secret);
  142. var tokenDescriptor = new SecurityTokenDescriptor
  143. {
  144. Subject = new ClaimsIdentity(new[] {
  145. new Claim(JwtRegisteredClaimNames.Jti, user.Id.ToString()),
  146. new Claim("id", user.Id.ToString())
  147. }),
  148. Expires = DateTime.UtcNow.AddMinutes(_authSettings.JwtExpiredTime),
  149. SigningCredentials = new SigningCredentials(new SymmetricSecurityKey(key), SecurityAlgorithms.HmacSha256Signature)
  150. };
  151. var token = tokenHandler.CreateToken(tokenDescriptor);
  152. var writedToken = tokenHandler.WriteToken(token);
  153. var refreshToken = new RefreshToken
  154. {
  155. Token = writedToken,
  156. JwtId = user.Id.ToString(),
  157. UserId = user.Id,
  158. User = user,
  159. CreationDate = DateTime.UtcNow,
  160. ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime)
  161. };
  162. var existRefreshToken = await _databaseContext.RefreshTokens.Where(x => x.UserId == user.Id).FirstOrDefaultAsync();
  163. if (existRefreshToken != null)
  164. {
  165. existRefreshToken.Token = writedToken;
  166. existRefreshToken.JwtId = token.Id;
  167. existRefreshToken.CreationDate = DateTime.UtcNow;
  168. existRefreshToken.ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime);
  169. if (authenticate)
  170. {
  171. existRefreshToken.Used = false;
  172. existRefreshToken.Invalidated = false;
  173. }
  174. _databaseContext.RefreshTokens.Update(existRefreshToken);
  175. await UpdateRefreshToken(existRefreshToken);
  176. }
  177. else
  178. {
  179. await _databaseContext.RefreshTokens.AddAsync(refreshToken);
  180. }
  181. await _databaseContext.SaveChangesAsync();
  182. return writedToken;
  183. }
  184. public async Task<RefreshTokenResultDto> RefreshTokenAsync(RefreshTokenRequestDto model)
  185. {
  186. var validatedToken = GetPrincipalFromToken(model.Token);
  187. if (validatedToken == null)
  188. {
  189. return new RefreshTokenResultDto { Error = "Invalid token" };
  190. }
  191. var jti = validatedToken.Claims.Single(x => x.Type == JwtRegisteredClaimNames.Jti).Value;
  192. var storedRefreshToken = await _databaseContext.RefreshTokens.SingleOrDefaultAsync(x => x.JwtId == jti);
  193. if (storedRefreshToken == null)
  194. {
  195. return new RefreshTokenResultDto { Error = "This refresh token does not exist" };
  196. }
  197. var userk = await _databaseContext.Users.Where(u => u.Id == storedRefreshToken.UserId).FirstOrDefaultAsync();
  198. if (userk == null)
  199. {
  200. return new RefreshTokenResultDto { Error = "There is no user which is associated with refresh token" };
  201. }
  202. var expiryDateUnix = long.Parse(validatedToken.Claims.Single(x => x.Type == JwtRegisteredClaimNames.Exp).Value);
  203. var expiryDateTimeUtc = new DateTime(1970, 1, 1, 0, 0, 0, DateTimeKind.Utc)
  204. .AddMinutes(expiryDateUnix);
  205. if (expiryDateTimeUtc < DateTime.UtcNow)
  206. {
  207. return new RefreshTokenResultDto
  208. {
  209. Data = new AuthenticateResponseDto
  210. {
  211. Id = userk.Id,
  212. FirstName = userk.FirstName,
  213. LastName = userk.LastName,
  214. Username = userk.UserName,
  215. Token = model.Token,
  216. RefreshToken = model.RefreshToken
  217. }
  218. };
  219. }
  220. if (DateTime.UtcNow > storedRefreshToken.ExpiryDate)
  221. {
  222. return new RefreshTokenResultDto { Error = "This refresh token has expired" };
  223. }
  224. if (storedRefreshToken.Invalidated)
  225. {
  226. return new RefreshTokenResultDto { Error = "This refresh token has been invalidated" };
  227. }
  228. if (storedRefreshToken.JwtId != jti)
  229. {
  230. return new RefreshTokenResultDto { Error = "This refresh token does not match this JWT" };
  231. }
  232. storedRefreshToken.ExpiryDate = DateTime.UtcNow.AddMinutes(_authSettings.JwtRefreshExpiredTime);
  233. await _databaseContext.SaveChangesAsync();
  234. var user = await _userManager.FindByIdAsync(validatedToken.Claims.Single(x => x.Type == "id").Value);
  235. var token = await GenerateJwtToken(user);
  236. return new RefreshTokenResultDto
  237. {
  238. Data = new AuthenticateResponseDto
  239. {
  240. Id = userk.Id,
  241. FirstName = userk.FirstName,
  242. LastName = userk.LastName,
  243. Username = userk.UserName,
  244. Token = model.Token,
  245. RefreshToken = model.RefreshToken
  246. }
  247. };
  248. }
  249. public async Task<ServiceResponseDTO<string>> DeleteRefreshToken(int userId)
  250. {
  251. var refreshToken = await _databaseContext.RefreshTokens.Where(r => r.UserId == userId).FirstOrDefaultAsync();
  252. if (refreshToken is null)
  253. return new ServiceResponseDTO<string>
  254. {
  255. IsError = true,
  256. ErrorMessage = "There is no refresh token for user"
  257. };
  258. _databaseContext.RefreshTokens.Remove(refreshToken);
  259. var result = await _databaseContext.SaveChangesAsync() > 0;
  260. if (!result)
  261. return new ServiceResponseDTO<string>
  262. {
  263. IsError = true,
  264. ErrorMessage = "Problem with saving changes into database"
  265. };
  266. return new ServiceResponseDTO<string>
  267. {
  268. Data = null
  269. };
  270. }
  271. private ClaimsPrincipal? GetPrincipalFromToken(string token)
  272. {
  273. var tokenHandler = new JwtSecurityTokenHandler();
  274. var key = Encoding.ASCII.GetBytes(_authSettings.Secret);
  275. var tokenValidationParameters = new TokenValidationParameters
  276. {
  277. ValidateIssuerSigningKey = true,
  278. IssuerSigningKey = new SymmetricSecurityKey(key),
  279. ValidateIssuer = false,
  280. ValidateAudience = false,
  281. RequireExpirationTime = false,
  282. ValidateLifetime = true,
  283. // set clockskew to zero so tokens expire exactly at token expiration time (instead of 5 minutes later)
  284. //ClockSkew = TimeSpan.Zero
  285. };
  286. try
  287. {
  288. var principal = tokenHandler.ValidateToken(token, tokenValidationParameters, out var validatedToken);
  289. if (!IsJwtWithValidSecurityAlgorithm(validatedToken))
  290. {
  291. return null;
  292. }
  293. return principal;
  294. }
  295. catch (Exception)
  296. {
  297. return null;
  298. }
  299. }
  300. private static bool IsJwtWithValidSecurityAlgorithm(SecurityToken validatedToken)
  301. {
  302. return (validatedToken is JwtSecurityToken jwtSecurityToken) &&
  303. jwtSecurityToken.Header.Alg.Equals(SecurityAlgorithms.HmacSha256,
  304. StringComparison.InvariantCultureIgnoreCase);
  305. }
  306. public async Task<RefreshToken?> GetRefreshTokenByUserId(int userId)
  307. {
  308. return await _databaseContext.RefreshTokens.Where(x => x.UserId == userId).FirstOrDefaultAsync();
  309. }
  310. public async Task UpdateRefreshToken(RefreshToken refreshToken)
  311. {
  312. _databaseContext.RefreshTokens.Update(refreshToken);
  313. await _databaseContext.SaveChangesAsync();
  314. }
  315. public async Task<ServiceResponseDTO<object>> GetEmailConfirmationUrlAsync(string email)
  316. {
  317. var user = await _userManager.FindByEmailAsync(email);
  318. if (user == null)
  319. {
  320. return new ServiceResponseDTO<object>
  321. {
  322. IsError = true,
  323. ErrorMessage = "Email did not find."
  324. };
  325. }
  326. var token = await _userManager.GenerateEmailConfirmationTokenAsync(user);
  327. token = WebEncoders.Base64UrlEncode(Encoding.UTF8.GetBytes(token));
  328. await _emailer.SendEmailAndWriteToDbAsync(email, "Reset password", $"<a href='http://localhost:3000/reset-password?token={token}&email={email}'>RESET PASSWORD LINK</a>", isHtml: true);
  329. user.PasswordResetToken = token;
  330. await _databaseContext.SaveChangesAsync();
  331. return new ServiceResponseDTO<object>
  332. {
  333. Data = new { code = token, email = email }
  334. };
  335. }
  336. public async Task<ServiceResponseDTO<object>> PasswordResetAsync(string email, string code, string password)
  337. {
  338. var user = await _userManager.FindByEmailAsync(email);
  339. if (user == null)
  340. {
  341. return new ServiceResponseDTO<object>
  342. {
  343. IsError = true,
  344. ErrorMessage = "Email did not find."
  345. };
  346. }
  347. // FOR SOME REASON USERMANAGER.RESETPASSWORDASYNC returns InvalidToken. In future change this
  348. //var passwordResetToken = Encoding.UTF8.GetString(WebEncoders.Base64UrlDecode(code));
  349. //IdentityResult resetResult = await _userManager.ResetPasswordAsync(user, passwordResetToken, password);
  350. //if (resetResult.Succeeded)
  351. await _userManager.RemovePasswordAsync(user);
  352. await _userManager.AddPasswordAsync(user, password);
  353. if(user.PasswordResetToken == code)
  354. {
  355. if (await _userManager.IsLockedOutAsync(user))
  356. {
  357. await _userManager.SetLockoutEndDateAsync(user, DateTimeOffset.UtcNow);
  358. }
  359. return new ServiceResponseDTO<object> { Data = true };
  360. }
  361. //var errors = resetResult.Errors.Select(x => x.Description);
  362. return new ServiceResponseDTO<object>
  363. {
  364. IsError = true,
  365. ErrorMessage = "Invalid reset password token"
  366. };
  367. }
  368. }
  369. }