AuthService.cs 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101
  1. using Microsoft.AspNetCore.Identity;
  2. using Microsoft.Extensions.Options;
  3. using Microsoft.IdentityModel.Tokens;
  4. using MTWorkHR.Application.Exceptions;
  5. using MTWorkHR.Application.Identity;
  6. using MTWorkHR.Application.Models;
  7. using MTWorkHR.Core;
  8. using MTWorkHR.Identity.Models;
  9. using System.IdentityModel.Tokens.Jwt;
  10. using System.Security.Claims;
  11. using System.Text;
  12. namespace MTWorkHR.Identity.Services
  13. {
  14. public class AuthService : IAuthService
  15. {
  16. private readonly UserManager<ApplicationUser> _userManager;
  17. private readonly SignInManager<ApplicationUser> _signInManager;
  18. private readonly JwtSettings _jwtSettings;
  19. public AuthService(UserManager<ApplicationUser> userManager, SignInManager<ApplicationUser> signInManager, IOptions<JwtSettings>jwtSettings)
  20. {
  21. _userManager = userManager;
  22. _signInManager = signInManager;
  23. _jwtSettings = jwtSettings.Value;
  24. }
  25. public async Task<AuthResponse> Login(AuthRequest request)
  26. {
  27. var user = await _userManager.FindByEmailAsync(request.Email);
  28. if(user == null)
  29. {
  30. throw new NotFoundException($"User with {request.Email} not found", request.Email);
  31. }
  32. var result = await _signInManager.CheckPasswordSignInAsync(user, request.Password, false);
  33. if(!result.Succeeded)
  34. {
  35. throw new BadRequest($"Credentials for '{request.Email} are not valid'.");
  36. }
  37. JwtSecurityToken jwtToken = await GenerateToken(user);
  38. var response = new AuthResponse
  39. {
  40. Id = user.Id,
  41. Email = user.Email,
  42. UserName = user.UserName,
  43. Token = new JwtSecurityTokenHandler().WriteToken( jwtToken)
  44. };
  45. return response;
  46. }
  47. public async Task<RegistrationResponse> Register(RegistrationRequest request)
  48. {
  49. var user = new ApplicationUser {
  50. Email = request.Email ,
  51. UserName = request.UserName ,
  52. FirstName = request.FirstName ,
  53. LastName = request.LastName ,
  54. EmailConfirmed = true
  55. };
  56. var result = await _userManager.CreateAsync(user, request.Password);
  57. if (result.Succeeded)
  58. {
  59. await _userManager.AddToRoleAsync(user, request.RoleName);
  60. return new RegistrationResponse(){ UserId = user.Id };
  61. }
  62. else
  63. {
  64. StringBuilder str = new StringBuilder();
  65. foreach (var err in result.Errors)
  66. {
  67. str.AppendFormat(".{0}\n", err.Description);
  68. }
  69. throw new BadRequest($"{str}");
  70. }
  71. }
  72. private async Task<JwtSecurityToken> GenerateToken(ApplicationUser user)
  73. {
  74. var userCalims = await _userManager.GetClaimsAsync(user);
  75. var roles = await _userManager.GetRolesAsync(user);
  76. var roleClaims = roles.Select(r => new Claim(ClaimTypes.Role, r)).ToList();
  77. var claims = new[]
  78. {
  79. new Claim(JwtRegisteredClaimNames.Sub, user.UserName),
  80. new Claim(JwtRegisteredClaimNames.Email, user.Email),
  81. new Claim(JwtRegisteredClaimNames.Jti, Guid.NewGuid().ToString()),
  82. new Claim("uid", user.Id)
  83. }.Union(userCalims)
  84. .Union(roleClaims);
  85. var symmetricSecurityKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(_jwtSettings.SecretKey));
  86. var signingCredentials = new SigningCredentials(symmetricSecurityKey, SecurityAlgorithms.HmacSha256);
  87. var jwtSecurityToken = new JwtSecurityToken(
  88. issuer: _jwtSettings.Issuer,
  89. audience: _jwtSettings.Audience,
  90. claims: claims,
  91. expires: DateTime.Now.AddMinutes(_jwtSettings.DurationInMinutes),
  92. signingCredentials: signingCredentials
  93. );
  94. return jwtSecurityToken;
  95. }
  96. }
  97. }