1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
|
using System;
using System.Buffers.Text;
using System.Collections.Generic;
using System.IdentityModel.Tokens.Jwt;
using System.Linq;
using System.Security.Claims;
using System.Security.Principal;
using System.Text;
using DevHive.Common.Jwt.Interfaces;
using Microsoft.IdentityModel.Tokens;
namespace DevHive.Common.Jwt
{
public class JwtService : IJwtService
{
private readonly string _validationIssuer;
private readonly string _audience;
private readonly byte[] _signingKey;
public JwtService(byte[] signingKey, string validationIssuer, string audience)
{
this._signingKey = signingKey;
this._validationIssuer = validationIssuer;
this._audience = audience;
}
public string GenerateJwtToken(Guid userId, string username, List<string> roleNames)
{
var securityKey = new SymmetricSecurityKey(this._signingKey);
var credentials = new SigningCredentials(securityKey, SecurityAlgorithms.HmacSha256);
HashSet<Claim> claims = new()
{
new Claim("ID", $"{userId}"),
new Claim("Username", username)
};
foreach (var roleName in roleNames)
claims.Add(new Claim(ClaimTypes.Role, roleName));
SecurityTokenDescriptor securityTokenDescriptor = new()
{
Issuer = this._validationIssuer,
Audience = this._audience,
Subject = new ClaimsIdentity(claims),
Expires = DateTime.Today.AddDays(7),
SigningCredentials = credentials,
};
JwtSecurityTokenHandler tokenHandler = new();
SecurityToken token = tokenHandler.CreateToken(securityTokenDescriptor);
return tokenHandler.WriteToken(token);
}
public bool ValidateToken(Guid userId, string rawToken)
{
var tokenHandler = new JwtSecurityTokenHandler();
var validationParameters = GetValidationParameters();
string actualToken = rawToken.Remove(0, 7);
IPrincipal principal = tokenHandler.ValidateToken(actualToken, validationParameters, out SecurityToken validatedToken);
JwtSecurityToken jwtToken = tokenHandler.ReadJwtToken(actualToken);
if (!principal.Identity.IsAuthenticated)
return false;
else if (principal.IsInRole("Admin"))
return true;
else if (jwtToken.Claims.FirstOrDefault(x => x.Type == "ID").Value != userId.ToString())
return false;
else
return true;
}
private TokenValidationParameters GetValidationParameters()
{
return new TokenValidationParameters()
{
ValidateLifetime = true,
ValidateAudience = true,
ValidateIssuer = true,
ValidIssuer = this._validationIssuer,
ValidAudience = this._audience,
IssuerSigningKey = new SymmetricSecurityKey(this._signingKey)
};
}
}
}
|