Vous ne pouvez pas sélectionner plus de 25 sujets Les noms de sujets doivent commencer par une lettre ou un nombre, peuvent contenir des tirets ('-') et peuvent comporter jusqu'à 35 caractères.

AuthenticationService.cs 18KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467
  1. using Microsoft.AspNetCore.WebUtilities;
  2. namespace Diligent.WebAPI.Business.Services
  3. {
  4. public class AuthenticationService : IAuthenticationService
  5. {
  6. private readonly AuthorizationSettings _authSettings;
  7. private readonly FrontEndSettings _frontEndSettings;
  8. private readonly UserManager<User> _userManager;
  9. private readonly DatabaseContext _databaseContext;
  10. private readonly IEmailer _emailer;
  11. private readonly IMapper _mapper;
  12. private readonly ILogger<AuthenticationService> _logger;
  13. private readonly IHttpClientService _httpClient;
  14. public AuthenticationService(IOptions<AuthorizationSettings> authSettings,
  15. IOptions<FrontEndSettings> frontEndSettings,
  16. UserManager<User> userManager,
  17. DatabaseContext databaseContext,
  18. IEmailer emailer,
  19. ILogger<AuthenticationService> logger,
  20. IHttpClientService httpClient,
  21. IMapper mapper)
  22. {
  23. _authSettings = authSettings.Value;
  24. _frontEndSettings = frontEndSettings.Value;
  25. _userManager = userManager;
  26. _databaseContext = databaseContext;
  27. _httpClient = httpClient;
  28. _emailer = emailer;
  29. _logger = logger;
  30. _mapper = mapper;
  31. }
  32. public async Task<ServiceResponseDTO<AuthenticateResponseDto>> Authenticate(AuthenticateRequestDto model)
  33. {
  34. _logger.LogInformation($"Checking credentials for user: {model.Username}");
  35. var user = await _userManager.FindByNameAsync(model.Username);
  36. // return null if user not found
  37. if (user == null)
  38. {
  39. _logger.LogError($"User with username = {model.Username} not found");
  40. return new ServiceResponseDTO<AuthenticateResponseDto>
  41. {
  42. IsError = true,
  43. ErrorMessage = "Username is not valid"
  44. };
  45. }
  46. var result = await _userManager.CheckPasswordAsync(user, model.Password);
  47. // return null if user is disabled
  48. if (user.IsEnabled == false)
  49. {
  50. _logger.LogError($"User: {model.Username} is not enabled");
  51. return new ServiceResponseDTO<AuthenticateResponseDto>
  52. {
  53. IsError = true,
  54. ErrorMessage = $"User with email {model.Username} has no permission to log in."
  55. };
  56. }
  57. // password is not correct
  58. if (!result)
  59. {
  60. _logger.LogError($"Password for user: {model.Username} is not correct");
  61. await _userManager.AccessFailedAsync(user);
  62. return new ServiceResponseDTO<AuthenticateResponseDto>
  63. {
  64. IsError = true,
  65. ErrorMessage = "Password is not correct"
  66. };
  67. }
  68. var token = await GenerateToken(user);
  69. _logger.LogInformation($"Successfull login token: {token}");
  70. return token;
  71. }
  72. public async Task<ServiceResponseDTO<AuthenticateResponseDto>> Authenticate(GoogleApiModel model)
  73. {
  74. _logger.LogInformation($"Checking token for google login {model.Token}");
  75. if (!(await _httpClient.IsTokenValid(model.Token)))
  76. {
  77. _logger.LogError($"Token is not valid");
  78. return new ServiceResponseDTO<AuthenticateResponseDto>
  79. {
  80. IsError = true,
  81. ErrorMessage = "Invalid Google Api Token"
  82. };
  83. }
  84. _logger.LogInformation($"Checking if user exists in Db with email : {model.User.email}");
  85. var user = await _userManager.FindByEmailAsync(model.User.email);
  86. // return null if user not found
  87. if (user == null)
  88. {
  89. _logger.LogError($"User does not exist in Db");
  90. return new ServiceResponseDTO<AuthenticateResponseDto>
  91. {
  92. IsError = true,
  93. ErrorMessage = $"User with email {model.User.email} does not exist in database"
  94. };
  95. }
  96. if (user.IsEnabled == false)
  97. {
  98. _logger.LogError($"User is not enabled");
  99. return new ServiceResponseDTO<AuthenticateResponseDto>
  100. {
  101. IsError = true,
  102. ErrorMessage = $"User with email {model.User.email} has no permission to log in."
  103. };
  104. }
  105. var token = await GenerateToken(user);
  106. _logger.LogInformation($"Successfull login. Token :{token}");
  107. return token;
  108. }
  109. private async Task<ServiceResponseDTO<AuthenticateResponseDto>> GenerateToken(User user)
  110. {
  111. var isLocked = await _userManager.IsLockedOutAsync(user);
  112. if (isLocked)
  113. return new ServiceResponseDTO<AuthenticateResponseDto>
  114. {
  115. IsError = true,
  116. ErrorMessage = "The account is locked out"
  117. };
  118. // authentication successful so generate jwt token
  119. var token = await GenerateJwtToken(user, true);
  120. var data = new AuthenticateResponseDto
  121. {
  122. Id = user.Id,
  123. Username = user.UserName,
  124. FirstName = user.FirstName,
  125. LastName = user.LastName,
  126. Token = token,
  127. RefreshToken = token,
  128. Role = (await _userManager.GetRolesAsync(user))[0]
  129. };
  130. return new ServiceResponseDTO<AuthenticateResponseDto>
  131. {
  132. Data = data
  133. };
  134. }
  135. private async Task<string> GenerateJwtToken(User user, bool authenticate = false)
  136. {
  137. // generate token that is valid for 7 days
  138. var tokenHandler = new JwtSecurityTokenHandler();
  139. var key = Encoding.ASCII.GetBytes(_authSettings.Secret);
  140. var tokenDescriptor = new SecurityTokenDescriptor
  141. {
  142. Subject = new ClaimsIdentity(new[] {
  143. new Claim(JwtRegisteredClaimNames.Jti, user.Id.ToString()),
  144. new Claim("id", user.Id.ToString())
  145. }),
  146. Expires = DateTime.Now.AddMinutes(_authSettings.JwtExpiredTime),
  147. SigningCredentials = new SigningCredentials(new SymmetricSecurityKey(key), SecurityAlgorithms.HmacSha256Signature)
  148. };
  149. var token = tokenHandler.CreateToken(tokenDescriptor);
  150. var writedToken = tokenHandler.WriteToken(token);
  151. var refreshToken = new RefreshToken
  152. {
  153. Token = writedToken,
  154. JwtId = user.Id.ToString(),
  155. UserId = user.Id,
  156. User = user,
  157. CreationDate = DateTime.Now,
  158. ExpiryDate = DateTime.Now.AddMinutes(_authSettings.JwtRefreshExpiredTime)
  159. };
  160. var existRefreshToken = await _databaseContext.RefreshTokens.Where(x => x.UserId == user.Id).FirstOrDefaultAsync();
  161. if (existRefreshToken != null)
  162. {
  163. existRefreshToken.Token = writedToken;
  164. existRefreshToken.JwtId = token.Id;
  165. existRefreshToken.CreationDate = DateTime.Now;
  166. existRefreshToken.ExpiryDate = DateTime.Now.AddMinutes(_authSettings.JwtRefreshExpiredTime);
  167. if (authenticate)
  168. {
  169. existRefreshToken.Used = false;
  170. existRefreshToken.Invalidated = false;
  171. }
  172. _databaseContext.RefreshTokens.Update(existRefreshToken);
  173. await UpdateRefreshToken(existRefreshToken);
  174. }
  175. else
  176. {
  177. await _databaseContext.RefreshTokens.AddAsync(refreshToken);
  178. }
  179. await _databaseContext.SaveChangesAsync();
  180. _logger.LogInformation($"JWTToken : {writedToken}");
  181. return writedToken;
  182. }
  183. public async Task<RefreshTokenResultDto> RefreshTokenAsync(RefreshTokenRequestDto model)
  184. {
  185. var validatedToken = GetPrincipalFromToken(model.Token, false);
  186. if (validatedToken == null)
  187. {
  188. return new RefreshTokenResultDto { Error = "Invalid token" };
  189. }
  190. var jti = validatedToken.Claims.Single(x => x.Type == JwtRegisteredClaimNames.Jti).Value;
  191. var storedRefreshToken = await _databaseContext.RefreshTokens.SingleOrDefaultAsync(x => x.JwtId == jti);
  192. if (storedRefreshToken == null)
  193. {
  194. return new RefreshTokenResultDto { Error = "This refresh token does not exist" };
  195. }
  196. var userk = await _databaseContext.Users.Where(u => u.Id == storedRefreshToken.UserId).FirstOrDefaultAsync();
  197. if (userk == null)
  198. {
  199. return new RefreshTokenResultDto { Error = "There is no user which is associated with refresh token" };
  200. }
  201. var expiryDateUnix = long.Parse(validatedToken.Claims.Single(x => x.Type == JwtRegisteredClaimNames.Exp).Value);
  202. var expiryDateTimeUtc = new DateTime(1970, 1, 1, 0, 0, 0, DateTimeKind.Utc)
  203. .AddSeconds(expiryDateUnix);
  204. if (expiryDateTimeUtc > DateTime.UtcNow)
  205. {
  206. return new RefreshTokenResultDto
  207. {
  208. Data = new AuthenticateResponseDto
  209. {
  210. Id = userk.Id,
  211. FirstName = userk.FirstName,
  212. LastName = userk.LastName,
  213. Username = userk.UserName,
  214. Token = model.Token,
  215. RefreshToken = model.RefreshToken,
  216. Role = (await _userManager.GetRolesAsync(userk))[0]
  217. }
  218. };
  219. }
  220. if (DateTime.Now > storedRefreshToken.ExpiryDate)
  221. {
  222. return new RefreshTokenResultDto { Error = "This refresh token has expired" };
  223. }
  224. if (storedRefreshToken.Invalidated)
  225. {
  226. return new RefreshTokenResultDto { Error = "This refresh token has been invalidated" };
  227. }
  228. if (storedRefreshToken.JwtId != jti)
  229. {
  230. return new RefreshTokenResultDto { Error = "This refresh token does not match this JWT" };
  231. }
  232. storedRefreshToken.ExpiryDate = DateTime.Now.AddMinutes(_authSettings.JwtRefreshExpiredTime);
  233. await _databaseContext.SaveChangesAsync();
  234. var user = await _userManager.FindByIdAsync(validatedToken.Claims.Single(x => x.Type == "id").Value);
  235. var token = await GenerateJwtToken(user);
  236. _logger.LogInformation($"Refresh token : {model.Token}");
  237. return new RefreshTokenResultDto
  238. {
  239. Data = new AuthenticateResponseDto
  240. {
  241. Id = userk.Id,
  242. FirstName = userk.FirstName,
  243. LastName = userk.LastName,
  244. Username = userk.UserName,
  245. Token = token,
  246. RefreshToken = token,
  247. Role = (await _userManager.GetRolesAsync(userk))[0]
  248. }
  249. };
  250. }
  251. public async Task<ServiceResponseDTO<string>> DeleteRefreshToken(int userId)
  252. {
  253. var refreshToken = await _databaseContext.RefreshTokens.Where(r => r.UserId == userId).FirstOrDefaultAsync();
  254. if (refreshToken is null)
  255. return new ServiceResponseDTO<string>
  256. {
  257. IsError = true,
  258. ErrorMessage = "There is no refresh token for user"
  259. };
  260. _databaseContext.RefreshTokens.Remove(refreshToken);
  261. var result = await _databaseContext.SaveChangesAsync() > 0;
  262. if (!result)
  263. return new ServiceResponseDTO<string>
  264. {
  265. IsError = true,
  266. ErrorMessage = "Problem with saving changes into database"
  267. };
  268. _logger.LogInformation($"Delted refresh token : {refreshToken}");
  269. return new ServiceResponseDTO<string>
  270. {
  271. Data = null
  272. };
  273. }
  274. private ClaimsPrincipal? GetPrincipalFromToken(string token, bool validateLifetime)
  275. {
  276. var tokenHandler = new JwtSecurityTokenHandler();
  277. var key = Encoding.ASCII.GetBytes(_authSettings.Secret);
  278. var tokenValidationParameters = new TokenValidationParameters
  279. {
  280. ValidateIssuerSigningKey = true,
  281. IssuerSigningKey = new SymmetricSecurityKey(key),
  282. ValidateIssuer = false,
  283. ValidateAudience = false,
  284. RequireExpirationTime = false,
  285. ValidateLifetime = validateLifetime,
  286. // set clockskew to zero so tokens expire exactly at token expiration time (instead of 5 minutes later)
  287. //ClockSkew = TimeSpan.Zero
  288. };
  289. try
  290. {
  291. var principal = tokenHandler.ValidateToken(token, tokenValidationParameters, out var validatedToken);
  292. if (!IsJwtWithValidSecurityAlgorithm(validatedToken))
  293. {
  294. return null;
  295. }
  296. return principal;
  297. }
  298. catch (Exception)
  299. {
  300. return null;
  301. }
  302. }
  303. private static bool IsJwtWithValidSecurityAlgorithm(SecurityToken validatedToken)
  304. {
  305. return (validatedToken is JwtSecurityToken jwtSecurityToken) &&
  306. jwtSecurityToken.Header.Alg.Equals(SecurityAlgorithms.HmacSha256,
  307. StringComparison.InvariantCultureIgnoreCase);
  308. }
  309. public async Task<RefreshToken?> GetRefreshTokenByUserId(int userId)
  310. {
  311. return await _databaseContext.RefreshTokens.Where(x => x.UserId == userId).FirstOrDefaultAsync();
  312. }
  313. public async Task UpdateRefreshToken(RefreshToken refreshToken)
  314. {
  315. _databaseContext.RefreshTokens.Update(refreshToken);
  316. await _databaseContext.SaveChangesAsync();
  317. }
  318. public async Task<ServiceResponseDTO<object>> GetForgotPasswordUrlAsync(string email)
  319. {
  320. _logger.LogInformation($"Sending forgot password email for : {email}");
  321. var user = await _userManager.FindByEmailAsync(email);
  322. if (user == null)
  323. {
  324. return new ServiceResponseDTO<object>
  325. {
  326. IsError = true,
  327. ErrorMessage = "Email did not find."
  328. };
  329. }
  330. var token = await _userManager.GeneratePasswordResetTokenAsync(user);
  331. token = WebEncoders.Base64UrlEncode(Encoding.UTF8.GetBytes(token));
  332. await _emailer.SendEmailAndWriteToDbAsync(email, "Reset password", HTMLHelper.RenderForgotPasswordPage($"{_frontEndSettings.BaseUrl}/reset-password?token={token}&email={email}"), isHtml: true);
  333. _logger.LogInformation($"Reset password email is sent");
  334. return new ServiceResponseDTO<object>
  335. {
  336. Data = new { code = token, email = email }
  337. };
  338. }
  339. public async Task<ServiceResponseDTO<object>> PasswordResetAsync(string email, string code, string password)
  340. {
  341. _logger.LogInformation($"User with email : {email} changes password");
  342. var user = await _userManager.FindByEmailAsync(email);
  343. if (user == null)
  344. {
  345. return new ServiceResponseDTO<object>
  346. {
  347. IsError = true,
  348. ErrorMessage = "Email did not find."
  349. };
  350. }
  351. var passwordResetToken = Encoding.UTF8.GetString(WebEncoders.Base64UrlDecode(code));
  352. IdentityResult resetResult = await _userManager.ResetPasswordAsync(user, passwordResetToken, password);
  353. if (resetResult.Succeeded)
  354. {
  355. _logger.LogInformation($"Password for user : {email} changed successfully");
  356. return new ServiceResponseDTO<object> { Data = true };
  357. }
  358. var errors = resetResult.Errors.Select(x => x.Description);
  359. return new ServiceResponseDTO<object>
  360. {
  361. IsError = true,
  362. ErrorMessage = errors.First()
  363. };
  364. }
  365. public async Task<ServiceResponseDTO<object>> Register(RegisterDTO model)
  366. {
  367. _logger.LogInformation($"User with email: {model.Email} is going to register.");
  368. var user = await _userManager.FindByEmailAsync(model.Email);
  369. if (user == null)
  370. {
  371. _logger.LogInformation($"User with email: {model.Email} not found.");
  372. return new ServiceResponseDTO<object>
  373. {
  374. IsError = true,
  375. ErrorMessage = "User not invited."
  376. };
  377. }
  378. _logger.LogInformation($"Found user: {user.FirstName} {user.LastName}");
  379. _mapper.Map<RegisterDTO, User>(model, user);
  380. _logger.LogInformation($"Enabled login for user: {user.FirstName} {user.LastName}");
  381. user.IsEnabled = true;
  382. IdentityResult resetResult = await _userManager.ResetPasswordAsync(user, HttpUtility.UrlDecode(model.Token), model.Password);
  383. if (resetResult.Succeeded)
  384. {
  385. _logger.LogInformation($"Succesfuly registered user: {user.FirstName} {user.LastName}");
  386. await _databaseContext.SaveChangesAsync();
  387. //_logger.LogInformation($"Password for user : {model.Email} changed successfully");
  388. return new ServiceResponseDTO<object> { Data = true };
  389. }
  390. var errors = resetResult.Errors.Select(x => x.Description);
  391. return new ServiceResponseDTO<object>
  392. {
  393. IsError = true,
  394. ErrorMessage = errors.First()
  395. };
  396. }
  397. }
  398. }