aboutsummaryrefslogtreecommitdiff
path: root/API
diff options
context:
space:
mode:
Diffstat (limited to 'API')
-rw-r--r--API/Controllers/UserController.cs11
-rw-r--r--API/Service/UserService.cs40
-rw-r--r--API/Startup.cs47
3 files changed, 92 insertions, 6 deletions
diff --git a/API/Controllers/UserController.cs b/API/Controllers/UserController.cs
index fdb1c44..8c7a3c3 100644
--- a/API/Controllers/UserController.cs
+++ b/API/Controllers/UserController.cs
@@ -4,6 +4,8 @@ using API.Service;
using AutoMapper;
using Microsoft.AspNetCore.Mvc;
using Data.Models.DTOs;
+using Microsoft.AspNetCore.Authorization;
+
namespace API.Controllers
{
@@ -18,6 +20,14 @@ namespace API.Controllers
this._service = new UserService(context, mapper);
}
+ [HttpPost]
+ [Route("login")]
+ public async Task<IActionResult> Login([FromBody] UserDTO userDTO)
+ {
+ return await this._service.LoginUser(userDTO);
+ }
+
+
//Create
[HttpPost]
public async Task<IActionResult> Create([FromBody] UserDTO userDTO)
@@ -26,6 +36,7 @@ namespace API.Controllers
}
//Read
+ [Authorize]
[HttpGet]
public async Task<IActionResult> GetById(int id)
{
diff --git a/API/Service/UserService.cs b/API/Service/UserService.cs
index 3c3b390..5d59f61 100644
--- a/API/Service/UserService.cs
+++ b/API/Service/UserService.cs
@@ -5,6 +5,12 @@ using Data.Models.Classes;
using Data.Models.DTOs;
using Microsoft.AspNetCore.Mvc;
+using System.IdentityModel.Tokens.Jwt;
+using Microsoft.IdentityModel.Tokens;
+using System.Security.Claims;
+using System;
+using System.Text;
+
namespace API.Service
{
public class UserService
@@ -12,12 +18,44 @@ namespace API.Service
private readonly UserDbRepository _userDbRepository;
private readonly IMapper _userMapper;
+ private static Random rnd = new Random(); // FOR TESTING PURPOSES ONLY
+
public UserService(DevHiveContext context, IMapper mapper)
{
this._userDbRepository = new UserDbRepository(context);
this._userMapper = mapper;
}
-
+
+ public async Task<IActionResult> LoginUser(UserDTO userDTO)
+ {
+ if (userDTO == null)
+ return new NotFoundObjectResult("User does not exist!");
+
+ User user = this._userMapper.Map<User>(userDTO);
+
+
+
+
+ // Key generation
+ var key = Encoding.ASCII.GetBytes(")H@McQfTB?E(H+Mb8x/A?D(Gr4u7x!A%WnZr4t7weThWmZq4KbPeShVm*G-KaPdSz%C*F-Ja6w9z$C&F"); //Startup.Configuration.GetSection("AppSettings").GetValue("Secret", "bruh"));
+
+ var tokenHandler = new JwtSecurityTokenHandler();
+ var tokenDescriptor = new SecurityTokenDescriptor
+ {
+ Subject = new ClaimsIdentity(new Claim[]
+ {
+ new Claim(ClaimTypes.Name, user.Id.ToString())
+ }),
+ Expires = DateTime.UtcNow.AddDays(7),
+ SigningCredentials = new SigningCredentials(new SymmetricSecurityKey(key), SecurityAlgorithms.HmacSha256Signature)
+ };
+ var token = tokenHandler.CreateToken(tokenDescriptor);
+ var tokenString = tokenHandler.WriteToken(token);
+
+ return new OkObjectResult(tokenString);
+ }
+
+
public async Task<IActionResult> CreateUser(UserDTO userDTO)
{
if (this._userDbRepository.DoesUsernameExist(userDTO.UserName))
diff --git a/API/Startup.cs b/API/Startup.cs
index f373f7a..f5aeaad 100644
--- a/API/Startup.cs
+++ b/API/Startup.cs
@@ -11,6 +11,11 @@ using Microsoft.Extensions.Hosting;
using Microsoft.OpenApi.Models;
using Data.Models.Classes;
+using Microsoft.IdentityModel.Tokens;
+using Microsoft.AspNetCore.Authentication.JwtBearer;
+using System.Text;
+using System.Threading.Tasks;
+
namespace API
{
public class Startup
@@ -28,13 +33,10 @@ namespace API
services.AddControllers();
services.AddDbContext<DevHiveContext>(options =>
- options.UseNpgsql(Configuration.GetConnectionString("DEV")))
- .AddAuthentication()
- .AddJwtBearer();
+ options.UseNpgsql(Configuration.GetConnectionString("DEV")));
services.AddIdentity<User, Roles>()
.AddEntityFrameworkStores<DevHiveContext>();
- services.AddAuthentication();
services.Configure<IdentityOptions>(options =>
{
@@ -43,7 +45,42 @@ namespace API
options.Password.RequiredLength = 5;
});
- services.AddSwaggerGen(c =>
+ // configure jwt authentication
+ var key = Encoding.ASCII.GetBytes(Configuration.GetSection("AppSettings").GetValue("Secret", ")H@McQfTB?E(H+Mb8x/A?D(Gr4u7x!A%WnZr4t7weThWmZq4KbPeShVm*G-KaPdSz%C*F-Ja6w9z$C&F"));
+ services.AddAuthentication(x =>
+ {
+ x.DefaultAuthenticateScheme = JwtBearerDefaults.AuthenticationScheme;
+ x.DefaultChallengeScheme = JwtBearerDefaults.AuthenticationScheme;
+ })
+ .AddJwtBearer(x =>
+ {
+ x.Events = new JwtBearerEvents
+ {
+ OnTokenValidated = context =>
+ {
+ // var userService = context.HttpContext.RequestServices.GetRequiredService<IUserService>();
+ // var userId = int.Parse(context.Principal.Identity.Name);
+ // var user = userService.GetById(userId);
+ // if (user == null)
+ // {
+ // // return unauthorized if user no longer exists
+ // context.Fail("Unauthorized");
+ // }
+ return Task.CompletedTask;
+ }
+ };
+ x.RequireHttpsMetadata = false;
+ x.SaveToken = true;
+ x.TokenValidationParameters = new TokenValidationParameters
+ {
+ ValidateIssuerSigningKey = true,
+ IssuerSigningKey = new SymmetricSecurityKey(key),
+ ValidateIssuer = false,
+ ValidateAudience = false
+ };
+ });
+
+ services.AddSwaggerGen(c =>
{
c.SwaggerDoc("v1", new OpenApiInfo { Title = "API", Version = "v1" });
});