1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
|
using AutoMapper;
using DevHive.Data.Repositories;
using DevHive.Services.Options;
using DevHive.Services.Models.Identity.User;
using System.Threading.Tasks;
using DevHive.Data.Models;
using System;
using System.IdentityModel.Tokens.Jwt;
using System.Security.Claims;
using Microsoft.IdentityModel.Tokens;
using System.Security.Cryptography;
using System.Text;
using System.Collections.Generic;
using DevHive.Common.Models.Identity;
namespace DevHive.Services.Services
{
public class UserService
{
private readonly UserRepository _userRepository;
private readonly RoleRepository _roleRepository;
private readonly IMapper _userMapper;
private readonly JWTOptions _jwtOptions;
public UserService(DevHiveContext context, IMapper mapper, JWTOptions jwtOptions)
{
this._userRepository = new UserRepository(context);
this._roleRepository = new RoleRepository(context);
this._userMapper = mapper;
this._jwtOptions = jwtOptions;
}
public async Task<TokenModel> LoginUser(LoginServiceModel loginModel)
{
if (!await this._userRepository.DoesUsernameExist(loginModel.UserName))
throw new ArgumentException("Invalid username!");
User user = await this._userRepository.GetByUsername(loginModel.UserName);
if (user.PasswordHash != GeneratePasswordHash(loginModel.Password))
throw new ArgumentException("Incorrect password!");
return new TokenModel(WriteJWTSecurityToken(user.UserName, user.Roles));
}
public async Task<TokenModel> RegisterUser(RegisterServiceModel registerModel)
{
if (await this._userRepository.DoesUsernameExist(registerModel.UserName))
throw new ArgumentException("Username already exists!");
if (await this._userRepository.DoesEmailExist(registerModel.Email))
throw new ArgumentException("Email already exists!");
User user = this._userMapper.Map<User>(registerModel);
user.PasswordHash = GeneratePasswordHash(registerModel.Password);
// Make sure the default role exists
if (!await this._roleRepository.DoesNameExist(Role.DefaultRole))
await this._roleRepository.AddAsync(new Role { Name = Role.DefaultRole });
// Set the default role to the user
Role defaultRole = await this._roleRepository.GetByNameAsync(Role.DefaultRole);
user.Roles = new List<Role>() { defaultRole };
await this._userRepository.AddAsync(user);
return new TokenModel(WriteJWTSecurityToken(user.UserName, user.Roles));
}
public async Task<UserServiceModel> GetUserById(Guid id)
{
User user = await this._userRepository.GetByIdAsync(id)
?? throw new ArgumentException("User does not exist!");
return this._userMapper.Map<UserServiceModel>(user);
}
public async Task<UserServiceModel> UpdateUser(UpdateUserServiceModel updateModel)
{
if (!this._userRepository.DoesUserExist(updateModel.Id))
throw new ArgumentException("User does not exist!");
if (!this._userRepository.DoesUserHaveThisUsername(updateModel.Id, updateModel.UserName)
&& await this._userRepository.DoesUsernameExist(updateModel.UserName))
throw new ArgumentException("Username already exists!");
User user = this._userMapper.Map<User>(updateModel);
bool result = await this._userRepository.EditAsync(user);
if (!result)
throw new InvalidOperationException("Unable to edit user!");
return this._userMapper.Map<UserServiceModel>(user);;
}
public async Task DeleteUser(Guid id)
{
if (!this._userRepository.DoesUserExist(id))
throw new ArgumentException("User does not exist!");
User user = await this._userRepository.GetByIdAsync(id);
bool result = await this._userRepository.DeleteAsync(user);
if (!result)
throw new InvalidOperationException("Unable to delete user!");
}
private string GeneratePasswordHash(string password)
{
return string.Join(string.Empty, SHA512.HashData(Encoding.ASCII.GetBytes(password)));
}
private string WriteJWTSecurityToken(string userName, IList<Role> roles)
{
byte[] signingKey = Encoding.ASCII.GetBytes(_jwtOptions.Secret);
List<Claim> claims = new()
{
new Claim(ClaimTypes.Name, userName),
};
foreach(var role in roles)
{
claims.Add(new Claim(ClaimTypes.Role, role.Name));
}
SecurityTokenDescriptor tokenDescriptor = new()
{
Subject = new ClaimsIdentity(claims),
Expires = DateTime.Today.AddDays(7),
SigningCredentials = new SigningCredentials(
new SymmetricSecurityKey(signingKey),
SecurityAlgorithms.HmacSha512Signature)
};
JwtSecurityTokenHandler tokenHandler = new();
SecurityToken token = tokenHandler.CreateToken(tokenDescriptor);
return tokenHandler.WriteToken(token);
}
}
}
|