forked from ReiMerc/skantravels
Login with made user works
This commit is contained in:
parent
8d20f7d651
commit
1813458652
@ -12,6 +12,7 @@
|
||||
|
||||
<ItemGroup>
|
||||
<PackageReference Include="BCrypt.Net-Next" Version="4.0.3" />
|
||||
<PackageReference Include="Microsoft.AspNetCore.Authentication.JwtBearer" Version="8.0.8" />
|
||||
<PackageReference Include="Microsoft.EntityFrameworkCore" Version="8.0.7" />
|
||||
<PackageReference Include="Microsoft.EntityFrameworkCore.Design" Version="8.0.7">
|
||||
<PrivateAssets>all</PrivateAssets>
|
||||
|
61
API/Application/Users/Commands/LoginUser.cs
Normal file
61
API/Application/Users/Commands/LoginUser.cs
Normal file
@ -0,0 +1,61 @@
|
||||
using API.Models;
|
||||
using API.Persistence.Repositories;
|
||||
using Microsoft.AspNetCore.Mvc;
|
||||
using Microsoft.EntityFrameworkCore;
|
||||
using Microsoft.IdentityModel.Tokens;
|
||||
using Microsoft.VisualStudio.Web.CodeGenerators.Mvc.Templates.BlazorIdentity.Pages;
|
||||
using System.Configuration;
|
||||
using System.IdentityModel.Tokens.Jwt;
|
||||
using System.Security.Claims;
|
||||
using System.Text;
|
||||
|
||||
namespace API.Application.Users.Commands
|
||||
{
|
||||
public class LoginUser
|
||||
{
|
||||
private readonly IUserRepository _repository;
|
||||
private readonly IConfiguration _configuration;
|
||||
|
||||
public LoginUser(IUserRepository repository, IConfiguration configuration)
|
||||
{
|
||||
_repository = repository;
|
||||
_configuration = configuration;
|
||||
}
|
||||
|
||||
public async Task<IActionResult> Handle(LoginDTO loginDTO)
|
||||
{
|
||||
User user = await _repository.QueryUserByEmailAsync(loginDTO.Email);
|
||||
if (user == null || !BCrypt.Net.BCrypt.Verify(loginDTO.Password, user.HashedPassword))
|
||||
{
|
||||
return new UnauthorizedObjectResult(new { message = "Invalid email or password." });
|
||||
}
|
||||
var token = GenerateJwtToken(user);
|
||||
|
||||
return new OkObjectResult(token);
|
||||
|
||||
}
|
||||
|
||||
private string GenerateJwtToken(User user)
|
||||
{
|
||||
var claims = new[]
|
||||
{
|
||||
new Claim(JwtRegisteredClaimNames.Sub, user.Id),
|
||||
new Claim(JwtRegisteredClaimNames.Jti, Guid.NewGuid().ToString()),
|
||||
new Claim(ClaimTypes.Name, user.Username)
|
||||
};
|
||||
|
||||
var key = new SymmetricSecurityKey(Encoding.UTF8.GetBytes
|
||||
(_configuration["JwtSettings:Key"]));
|
||||
var creds = new SigningCredentials(key, SecurityAlgorithms.HmacSha256);
|
||||
|
||||
var token = new JwtSecurityToken(
|
||||
_configuration["JwtSettings:Issuer"],
|
||||
_configuration["JwtSettings:Audience"],
|
||||
claims,
|
||||
expires: DateTime.Now.AddMinutes(30),
|
||||
signingCredentials: creds);
|
||||
|
||||
return new JwtSecurityTokenHandler().WriteToken(token);
|
||||
}
|
||||
}
|
||||
}
|
@ -1,8 +1,13 @@
|
||||
using API.Application.Users.Commands;
|
||||
using API.Application.Users.Queries;
|
||||
using API.Models;
|
||||
using Microsoft.AspNetCore.Authorization;
|
||||
using Microsoft.AspNetCore.Mvc;
|
||||
using Microsoft.EntityFrameworkCore;
|
||||
using Microsoft.IdentityModel.Tokens;
|
||||
using System.IdentityModel.Tokens.Jwt;
|
||||
using System.Security.Claims;
|
||||
using System.Text;
|
||||
using System.Text.RegularExpressions;
|
||||
|
||||
namespace API.Controllers
|
||||
@ -16,20 +21,31 @@ namespace API.Controllers
|
||||
private readonly CreateUser _createUser;
|
||||
private readonly UpdateUser _updateUser;
|
||||
private readonly DeleteUser _deleteUser;
|
||||
private readonly LoginUser _loginUser;
|
||||
|
||||
public UsersController(
|
||||
QueryAllUsers queryAllUsers,
|
||||
QueryUserById queryUserById,
|
||||
CreateUser createUser,
|
||||
UpdateUser updateUser,
|
||||
DeleteUser deleteUser)
|
||||
DeleteUser deleteUser,
|
||||
LoginUser loginUser)
|
||||
{
|
||||
_queryAllUsers = queryAllUsers;
|
||||
_queryUserById = queryUserById;
|
||||
_createUser = createUser;
|
||||
_updateUser = updateUser;
|
||||
_deleteUser = deleteUser;
|
||||
_loginUser = loginUser;
|
||||
}
|
||||
|
||||
// POST: api/Users/login
|
||||
[HttpPost("login")]
|
||||
public async Task<IActionResult> Login(LoginDTO login)
|
||||
{
|
||||
return await _loginUser.Handle(login);
|
||||
}
|
||||
|
||||
// GET: api/Users
|
||||
[HttpGet]
|
||||
public async Task<ActionResult<List<UserDTO>>> GetUsers()
|
||||
|
@ -8,6 +8,7 @@ namespace API.Persistence.Repositories
|
||||
Task<bool> DeleteUserAsync(string id);
|
||||
Task<List<User>> QueryAllUsersAsync();
|
||||
Task<User> QueryUserByIdAsync(string id);
|
||||
Task<User> QueryUserByEmailAsync(string email);
|
||||
Task<bool> UpdateUserAsync(User user);
|
||||
}
|
||||
}
|
@ -1,5 +1,6 @@
|
||||
using API.Models;
|
||||
using Microsoft.EntityFrameworkCore;
|
||||
using Microsoft.VisualStudio.Web.CodeGenerators.Mvc.Templates.BlazorIdentity.Pages;
|
||||
|
||||
namespace API.Persistence.Repositories
|
||||
{
|
||||
@ -70,5 +71,10 @@ namespace API.Persistence.Repositories
|
||||
return true;
|
||||
}
|
||||
|
||||
public async Task<User> QueryUserByEmailAsync(string email)
|
||||
{
|
||||
return await _context.Users.SingleOrDefaultAsync(u => u.Email == email);
|
||||
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -1,7 +1,10 @@
|
||||
using API.Application.Users.Commands;
|
||||
using API.Application.Users.Queries;
|
||||
using API.Persistence.Repositories;
|
||||
using Microsoft.AspNetCore.Authentication.JwtBearer;
|
||||
using Microsoft.EntityFrameworkCore;
|
||||
using Microsoft.IdentityModel.Tokens;
|
||||
using System.Text;
|
||||
|
||||
namespace API
|
||||
{
|
||||
@ -33,10 +36,35 @@ namespace API
|
||||
builder.Services.AddScoped<CreateUser>();
|
||||
builder.Services.AddScoped<UpdateUser>();
|
||||
builder.Services.AddScoped<DeleteUser>();
|
||||
builder.Services.AddScoped<LoginUser>();
|
||||
builder.Services.AddScoped<IUserRepository, UserRepository>();
|
||||
|
||||
|
||||
IConfiguration Configuration = builder.Configuration;
|
||||
|
||||
// Configure JWT Authentication
|
||||
builder.Services.AddAuthentication(x =>
|
||||
{
|
||||
x.DefaultAuthenticateScheme = JwtBearerDefaults.AuthenticationScheme;
|
||||
x.DefaultChallengeScheme = JwtBearerDefaults.AuthenticationScheme;
|
||||
x.DefaultScheme = JwtBearerDefaults.AuthenticationScheme;
|
||||
}).AddJwtBearer(x =>
|
||||
{
|
||||
x.TokenValidationParameters = new TokenValidationParameters
|
||||
{
|
||||
ValidIssuer = Configuration["JwtSettings:Issuer"],
|
||||
ValidAudience = Configuration["JwtSettings:Audience"],
|
||||
IssuerSigningKey = new SymmetricSecurityKey
|
||||
(
|
||||
Encoding.UTF8.GetBytes(Configuration["JwtSettings:Key"])
|
||||
),
|
||||
ValidateIssuer = true,
|
||||
ValidateAudience = true,
|
||||
ValidateLifetime = true,
|
||||
ValidateIssuerSigningKey = true
|
||||
};
|
||||
});
|
||||
|
||||
var connectionString = Configuration.GetConnectionString("DefaultConnection") ?? Environment.GetEnvironmentVariable("DEFAULT_CONNECTION");
|
||||
builder.Services.AddDbContext<AppDBContext>(options => options.UseSqlite(connectionString));
|
||||
|
||||
|
@ -1,4 +1,9 @@
|
||||
{
|
||||
"JwtSettings": {
|
||||
"Issuer": "Flutter-SkanTravels",
|
||||
"Audience": "Mercantec-Elever",
|
||||
"Key": "DenHerMåAldrigVæreOffentligKunIDetteDemoProjekt"
|
||||
},
|
||||
"Logging": {
|
||||
"LogLevel": {
|
||||
"Default": "Information",
|
||||
|
Loading…
Reference in New Issue
Block a user