Moved Auth logic to seperate service + endpoints can be disabled
This commit is contained in:
@@ -1,176 +1,38 @@
|
|||||||
using HopFrame.Api.Logic;
|
using HopFrame.Api.Logic;
|
||||||
using HopFrame.Api.Models;
|
using HopFrame.Api.Models;
|
||||||
using HopFrame.Database;
|
|
||||||
using HopFrame.Database.Models.Entries;
|
|
||||||
using HopFrame.Security.Authentication;
|
|
||||||
using HopFrame.Security.Authorization;
|
using HopFrame.Security.Authorization;
|
||||||
using HopFrame.Security.Claims;
|
|
||||||
using HopFrame.Security.Models;
|
using HopFrame.Security.Models;
|
||||||
using HopFrame.Security.Services;
|
|
||||||
using Microsoft.AspNetCore.Http;
|
|
||||||
using Microsoft.AspNetCore.Mvc;
|
using Microsoft.AspNetCore.Mvc;
|
||||||
using Microsoft.EntityFrameworkCore;
|
|
||||||
|
|
||||||
namespace HopFrame.Api.Controller;
|
namespace HopFrame.Api.Controller;
|
||||||
|
|
||||||
[ApiController]
|
[ApiController]
|
||||||
[Route("authentication")]
|
[Route("api/v1/authentication")]
|
||||||
public class SecurityController<TDbContext>(TDbContext context, IUserService users, ITokenContext tokenContext) : ControllerBase where TDbContext : HopDbContextBase {
|
public class SecurityController(IAuthLogic auth) : ControllerBase {
|
||||||
|
|
||||||
[HttpPut("login")]
|
[HttpPut("login")]
|
||||||
public async Task<ActionResult<SingleValueResult<string>>> Login([FromBody] UserLogin login) {
|
public async Task<ActionResult<SingleValueResult<string>>> Login([FromBody] UserLogin login) {
|
||||||
var user = await users.GetUserByEmail(login.Email);
|
return await auth.Login(login);
|
||||||
|
|
||||||
if (user is null)
|
|
||||||
return LogicResult<SingleValueResult<string>>.NotFound("The provided email address was not found");
|
|
||||||
|
|
||||||
if (!await users.CheckUserPassword(user, login.Password))
|
|
||||||
return LogicResult<SingleValueResult<string>>.Forbidden("The provided password is not correct");
|
|
||||||
|
|
||||||
var refreshToken = new TokenEntry {
|
|
||||||
CreatedAt = DateTime.Now,
|
|
||||||
Token = Guid.NewGuid().ToString(),
|
|
||||||
Type = TokenEntry.RefreshTokenType,
|
|
||||||
UserId = user.Id.ToString()
|
|
||||||
};
|
|
||||||
var accessToken = new TokenEntry {
|
|
||||||
CreatedAt = DateTime.Now,
|
|
||||||
Token = Guid.NewGuid().ToString(),
|
|
||||||
Type = TokenEntry.AccessTokenType,
|
|
||||||
UserId = user.Id.ToString()
|
|
||||||
};
|
|
||||||
|
|
||||||
HttpContext.Response.Cookies.Append(ITokenContext.RefreshTokenType, refreshToken.Token, new CookieOptions {
|
|
||||||
MaxAge = HopFrameAuthentication<TDbContext>.RefreshTokenTime,
|
|
||||||
HttpOnly = true,
|
|
||||||
Secure = true
|
|
||||||
});
|
|
||||||
HttpContext.Response.Cookies.Append(ITokenContext.AccessTokenType, accessToken.Token, new CookieOptions {
|
|
||||||
MaxAge = HopFrameAuthentication<TDbContext>.AccessTokenTime,
|
|
||||||
HttpOnly = true,
|
|
||||||
Secure = true
|
|
||||||
});
|
|
||||||
|
|
||||||
await context.Tokens.AddRangeAsync(refreshToken, accessToken);
|
|
||||||
await context.SaveChangesAsync();
|
|
||||||
|
|
||||||
return LogicResult<SingleValueResult<string>>.Ok(accessToken.Token);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpPost("register")]
|
[HttpPost("register")]
|
||||||
public async Task<ActionResult<SingleValueResult<string>>> Register([FromBody] UserRegister register) {
|
public async Task<ActionResult<SingleValueResult<string>>> Register([FromBody] UserRegister register) {
|
||||||
if (register.Password.Length < 8)
|
return await auth.Register(register);
|
||||||
return LogicResult<SingleValueResult<string>>.Conflict("Password needs to be at least 8 characters long");
|
|
||||||
|
|
||||||
var allUsers = await users.GetUsers();
|
|
||||||
if (allUsers.Any(user => user.Username == register.Username || user.Email == register.Email))
|
|
||||||
return LogicResult<SingleValueResult<string>>.Conflict("Username or Email is already registered");
|
|
||||||
|
|
||||||
var user = await users.AddUser(register);
|
|
||||||
|
|
||||||
var refreshToken = new TokenEntry {
|
|
||||||
CreatedAt = DateTime.Now,
|
|
||||||
Token = Guid.NewGuid().ToString(),
|
|
||||||
Type = TokenEntry.RefreshTokenType,
|
|
||||||
UserId = user.Id.ToString()
|
|
||||||
};
|
|
||||||
var accessToken = new TokenEntry {
|
|
||||||
CreatedAt = DateTime.Now,
|
|
||||||
Token = Guid.NewGuid().ToString(),
|
|
||||||
Type = TokenEntry.AccessTokenType,
|
|
||||||
UserId = user.Id.ToString()
|
|
||||||
};
|
|
||||||
|
|
||||||
await context.Tokens.AddRangeAsync(refreshToken, accessToken);
|
|
||||||
await context.SaveChangesAsync();
|
|
||||||
|
|
||||||
HttpContext.Response.Cookies.Append(ITokenContext.RefreshTokenType, refreshToken.Token, new CookieOptions {
|
|
||||||
MaxAge = HopFrameAuthentication<TDbContext>.RefreshTokenTime,
|
|
||||||
HttpOnly = true,
|
|
||||||
Secure = true
|
|
||||||
});
|
|
||||||
HttpContext.Response.Cookies.Append(ITokenContext.AccessTokenType, accessToken.Token, new CookieOptions {
|
|
||||||
MaxAge = HopFrameAuthentication<TDbContext>.AccessTokenTime,
|
|
||||||
HttpOnly = false,
|
|
||||||
Secure = true
|
|
||||||
});
|
|
||||||
|
|
||||||
return LogicResult<SingleValueResult<string>>.Ok(accessToken.Token);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpGet("authenticate")]
|
[HttpGet("authenticate")]
|
||||||
public async Task<ActionResult<SingleValueResult<string>>> Authenticate() {
|
public async Task<ActionResult<SingleValueResult<string>>> Authenticate() {
|
||||||
var refreshToken = HttpContext.Request.Cookies[ITokenContext.RefreshTokenType];
|
return await auth.Authenticate();
|
||||||
|
|
||||||
if (string.IsNullOrEmpty(refreshToken))
|
|
||||||
return LogicResult<SingleValueResult<string>>.Conflict("Refresh token not provided");
|
|
||||||
|
|
||||||
var token = await context.Tokens.SingleOrDefaultAsync(token => token.Token == refreshToken && token.Type == TokenEntry.RefreshTokenType);
|
|
||||||
|
|
||||||
if (token is null)
|
|
||||||
return LogicResult<SingleValueResult<string>>.NotFound("Refresh token not valid");
|
|
||||||
|
|
||||||
if (token.CreatedAt + HopFrameAuthentication<TDbContext>.RefreshTokenTime < DateTime.Now)
|
|
||||||
return LogicResult<SingleValueResult<string>>.Conflict("Refresh token is expired");
|
|
||||||
|
|
||||||
var accessToken = new TokenEntry {
|
|
||||||
CreatedAt = DateTime.Now,
|
|
||||||
Token = Guid.NewGuid().ToString(),
|
|
||||||
Type = TokenEntry.AccessTokenType,
|
|
||||||
UserId = token.UserId
|
|
||||||
};
|
|
||||||
|
|
||||||
await context.Tokens.AddAsync(accessToken);
|
|
||||||
await context.SaveChangesAsync();
|
|
||||||
|
|
||||||
HttpContext.Response.Cookies.Append(ITokenContext.AccessTokenType, accessToken.Token, new CookieOptions {
|
|
||||||
MaxAge = HopFrameAuthentication<TDbContext>.AccessTokenTime,
|
|
||||||
HttpOnly = false,
|
|
||||||
Secure = true
|
|
||||||
});
|
|
||||||
|
|
||||||
return LogicResult<SingleValueResult<string>>.Ok(accessToken.Token);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpDelete("logout"), Authorized]
|
[HttpDelete("logout"), Authorized]
|
||||||
public async Task<ActionResult> Logout() {
|
public async Task<ActionResult> Logout() {
|
||||||
var accessToken = HttpContext.User.GetAccessTokenId();
|
return await auth.Logout();
|
||||||
var refreshToken = HttpContext.Request.Cookies[ITokenContext.RefreshTokenType];
|
|
||||||
|
|
||||||
if (string.IsNullOrEmpty(accessToken) || string.IsNullOrEmpty(refreshToken))
|
|
||||||
return LogicResult.Conflict("access or refresh token not provided");
|
|
||||||
|
|
||||||
var tokenEntries = await context.Tokens.Where(token =>
|
|
||||||
(token.Token == accessToken && token.Type == TokenEntry.AccessTokenType) ||
|
|
||||||
(token.Token == refreshToken && token.Type == TokenEntry.RefreshTokenType))
|
|
||||||
.ToArrayAsync();
|
|
||||||
|
|
||||||
if (tokenEntries.Length != 2)
|
|
||||||
return LogicResult.NotFound("One or more of the provided tokens was not found");
|
|
||||||
|
|
||||||
context.Tokens.Remove(tokenEntries[0]);
|
|
||||||
context.Tokens.Remove(tokenEntries[1]);
|
|
||||||
await context.SaveChangesAsync();
|
|
||||||
|
|
||||||
HttpContext.Response.Cookies.Delete(ITokenContext.RefreshTokenType);
|
|
||||||
HttpContext.Response.Cookies.Delete(ITokenContext.AccessTokenType);
|
|
||||||
|
|
||||||
return LogicResult.Ok();
|
|
||||||
}
|
}
|
||||||
|
|
||||||
[HttpDelete("delete"), Authorized]
|
[HttpDelete("delete"), Authorized]
|
||||||
public async Task<ActionResult> Delete([FromBody] UserPasswordValidation validation) {
|
public async Task<ActionResult> Delete([FromBody] UserPasswordValidation validation) {
|
||||||
var user = tokenContext.User;
|
return await auth.Delete(validation);
|
||||||
|
|
||||||
if (!await users.CheckUserPassword(user, validation.Password))
|
|
||||||
return LogicResult.Forbidden("The provided password is not correct");
|
|
||||||
|
|
||||||
await users.DeleteUser(user);
|
|
||||||
|
|
||||||
HttpContext.Response.Cookies.Delete(ITokenContext.RefreshTokenType);
|
|
||||||
HttpContext.Response.Cookies.Delete(ITokenContext.AccessTokenType);
|
|
||||||
|
|
||||||
return LogicResult.Ok();
|
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
@@ -1,19 +1,35 @@
|
|||||||
using HopFrame.Api.Controller;
|
using HopFrame.Api.Controller;
|
||||||
|
using HopFrame.Api.Logic;
|
||||||
|
using HopFrame.Api.Logic.Implementation;
|
||||||
using HopFrame.Database;
|
using HopFrame.Database;
|
||||||
using HopFrame.Security.Authentication;
|
using HopFrame.Security.Authentication;
|
||||||
|
using Microsoft.AspNetCore.Http;
|
||||||
using Microsoft.Extensions.DependencyInjection;
|
using Microsoft.Extensions.DependencyInjection;
|
||||||
|
using Microsoft.Extensions.DependencyInjection.Extensions;
|
||||||
|
|
||||||
namespace HopFrame.Api.Extensions;
|
namespace HopFrame.Api.Extensions;
|
||||||
|
|
||||||
public static class ServiceCollectionExtensions {
|
public static class ServiceCollectionExtensions {
|
||||||
|
|
||||||
/// <summary>
|
/// <summary>
|
||||||
/// Adds all HopFrame endpoints and the HopFrame security layer to the WebApplication
|
/// Adds all HopFrame endpoints and services to the application
|
||||||
/// </summary>
|
/// </summary>
|
||||||
/// <param name="services">The service provider to add the services to</param>
|
/// <param name="services">The service provider to add the services to</param>
|
||||||
/// <typeparam name="TDbContext">The data source for all HopFrame entities</typeparam>
|
/// <typeparam name="TDbContext">The data source for all HopFrame entities</typeparam>
|
||||||
public static void AddHopFrame<TDbContext>(this IServiceCollection services) where TDbContext : HopDbContextBase {
|
public static void AddHopFrame<TDbContext>(this IServiceCollection services) where TDbContext : HopDbContextBase {
|
||||||
services.AddMvcCore().UseSpecificControllers(typeof(SecurityController<TDbContext>));
|
services.AddMvcCore().UseSpecificControllers(typeof(SecurityController));
|
||||||
|
AddHopFrameNoEndpoints<TDbContext>(services);
|
||||||
|
}
|
||||||
|
|
||||||
|
/// <summary>
|
||||||
|
/// Adds all HopFrame services to the application
|
||||||
|
/// </summary>
|
||||||
|
/// <param name="services">The service provider to add the services to</param>
|
||||||
|
/// <typeparam name="TDbContext">The data source for all HopFrame entities</typeparam>
|
||||||
|
public static void AddHopFrameNoEndpoints<TDbContext>(this IServiceCollection services) where TDbContext : HopDbContextBase {
|
||||||
|
services.TryAddSingleton<IHttpContextAccessor, HttpContextAccessor>();
|
||||||
|
services.AddScoped<IAuthLogic, AuthLogic<TDbContext>>();
|
||||||
|
|
||||||
services.AddHopFrameAuthentication<TDbContext>();
|
services.AddHopFrameAuthentication<TDbContext>();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
16
src/HopFrame.Api/Logic/IAuthLogic.cs
Normal file
16
src/HopFrame.Api/Logic/IAuthLogic.cs
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
using HopFrame.Api.Models;
|
||||||
|
using HopFrame.Security.Models;
|
||||||
|
|
||||||
|
namespace HopFrame.Api.Logic;
|
||||||
|
|
||||||
|
public interface IAuthLogic {
|
||||||
|
Task<LogicResult<SingleValueResult<string>>> Login(UserLogin login);
|
||||||
|
|
||||||
|
Task<LogicResult<SingleValueResult<string>>> Register(UserRegister register);
|
||||||
|
|
||||||
|
Task<LogicResult<SingleValueResult<string>>> Authenticate();
|
||||||
|
|
||||||
|
Task<LogicResult> Logout();
|
||||||
|
|
||||||
|
Task<LogicResult> Delete(UserPasswordValidation validation);
|
||||||
|
}
|
||||||
166
src/HopFrame.Api/Logic/Implementation/AuthLogic.cs
Normal file
166
src/HopFrame.Api/Logic/Implementation/AuthLogic.cs
Normal file
@@ -0,0 +1,166 @@
|
|||||||
|
using HopFrame.Api.Models;
|
||||||
|
using HopFrame.Database;
|
||||||
|
using HopFrame.Database.Models.Entries;
|
||||||
|
using HopFrame.Security.Authentication;
|
||||||
|
using HopFrame.Security.Claims;
|
||||||
|
using HopFrame.Security.Models;
|
||||||
|
using HopFrame.Security.Services;
|
||||||
|
using Microsoft.AspNetCore.Http;
|
||||||
|
using Microsoft.EntityFrameworkCore;
|
||||||
|
|
||||||
|
namespace HopFrame.Api.Logic.Implementation;
|
||||||
|
|
||||||
|
public class AuthLogic<TDbContext>(TDbContext context, IUserService users, ITokenContext tokenContext, IHttpContextAccessor accessor) : IAuthLogic where TDbContext : HopDbContextBase {
|
||||||
|
|
||||||
|
public async Task<LogicResult<SingleValueResult<string>>> Login(UserLogin login) {
|
||||||
|
var user = await users.GetUserByEmail(login.Email);
|
||||||
|
|
||||||
|
if (user is null)
|
||||||
|
return LogicResult<SingleValueResult<string>>.NotFound("The provided email address was not found");
|
||||||
|
|
||||||
|
if (!await users.CheckUserPassword(user, login.Password))
|
||||||
|
return LogicResult<SingleValueResult<string>>.Forbidden("The provided password is not correct");
|
||||||
|
|
||||||
|
var refreshToken = new TokenEntry {
|
||||||
|
CreatedAt = DateTime.Now,
|
||||||
|
Token = Guid.NewGuid().ToString(),
|
||||||
|
Type = TokenEntry.RefreshTokenType,
|
||||||
|
UserId = user.Id.ToString()
|
||||||
|
};
|
||||||
|
var accessToken = new TokenEntry {
|
||||||
|
CreatedAt = DateTime.Now,
|
||||||
|
Token = Guid.NewGuid().ToString(),
|
||||||
|
Type = TokenEntry.AccessTokenType,
|
||||||
|
UserId = user.Id.ToString()
|
||||||
|
};
|
||||||
|
|
||||||
|
accessor.HttpContext?.Response.Cookies.Append(ITokenContext.RefreshTokenType, refreshToken.Token, new CookieOptions {
|
||||||
|
MaxAge = HopFrameAuthentication<TDbContext>.RefreshTokenTime,
|
||||||
|
HttpOnly = true,
|
||||||
|
Secure = true
|
||||||
|
});
|
||||||
|
accessor.HttpContext?.Response.Cookies.Append(ITokenContext.AccessTokenType, accessToken.Token, new CookieOptions {
|
||||||
|
MaxAge = HopFrameAuthentication<TDbContext>.AccessTokenTime,
|
||||||
|
HttpOnly = true,
|
||||||
|
Secure = true
|
||||||
|
});
|
||||||
|
|
||||||
|
await context.Tokens.AddRangeAsync(refreshToken, accessToken);
|
||||||
|
await context.SaveChangesAsync();
|
||||||
|
|
||||||
|
return LogicResult<SingleValueResult<string>>.Ok(accessToken.Token);
|
||||||
|
}
|
||||||
|
|
||||||
|
public async Task<LogicResult<SingleValueResult<string>>> Register(UserRegister register) {
|
||||||
|
if (register.Password.Length < 8)
|
||||||
|
return LogicResult<SingleValueResult<string>>.Conflict("Password needs to be at least 8 characters long");
|
||||||
|
|
||||||
|
var allUsers = await users.GetUsers();
|
||||||
|
if (allUsers.Any(user => user.Username == register.Username || user.Email == register.Email))
|
||||||
|
return LogicResult<SingleValueResult<string>>.Conflict("Username or Email is already registered");
|
||||||
|
|
||||||
|
var user = await users.AddUser(register);
|
||||||
|
|
||||||
|
var refreshToken = new TokenEntry {
|
||||||
|
CreatedAt = DateTime.Now,
|
||||||
|
Token = Guid.NewGuid().ToString(),
|
||||||
|
Type = TokenEntry.RefreshTokenType,
|
||||||
|
UserId = user.Id.ToString()
|
||||||
|
};
|
||||||
|
var accessToken = new TokenEntry {
|
||||||
|
CreatedAt = DateTime.Now,
|
||||||
|
Token = Guid.NewGuid().ToString(),
|
||||||
|
Type = TokenEntry.AccessTokenType,
|
||||||
|
UserId = user.Id.ToString()
|
||||||
|
};
|
||||||
|
|
||||||
|
await context.Tokens.AddRangeAsync(refreshToken, accessToken);
|
||||||
|
await context.SaveChangesAsync();
|
||||||
|
|
||||||
|
accessor.HttpContext?.Response.Cookies.Append(ITokenContext.RefreshTokenType, refreshToken.Token, new CookieOptions {
|
||||||
|
MaxAge = HopFrameAuthentication<TDbContext>.RefreshTokenTime,
|
||||||
|
HttpOnly = true,
|
||||||
|
Secure = true
|
||||||
|
});
|
||||||
|
accessor.HttpContext?.Response.Cookies.Append(ITokenContext.AccessTokenType, accessToken.Token, new CookieOptions {
|
||||||
|
MaxAge = HopFrameAuthentication<TDbContext>.AccessTokenTime,
|
||||||
|
HttpOnly = false,
|
||||||
|
Secure = true
|
||||||
|
});
|
||||||
|
|
||||||
|
return LogicResult<SingleValueResult<string>>.Ok(accessToken.Token);
|
||||||
|
}
|
||||||
|
|
||||||
|
public async Task<LogicResult<SingleValueResult<string>>> Authenticate() {
|
||||||
|
var refreshToken = accessor.HttpContext?.Request.Cookies[ITokenContext.RefreshTokenType];
|
||||||
|
|
||||||
|
if (string.IsNullOrEmpty(refreshToken))
|
||||||
|
return LogicResult<SingleValueResult<string>>.Conflict("Refresh token not provided");
|
||||||
|
|
||||||
|
var token = await context.Tokens.SingleOrDefaultAsync(token => token.Token == refreshToken && token.Type == TokenEntry.RefreshTokenType);
|
||||||
|
|
||||||
|
if (token is null)
|
||||||
|
return LogicResult<SingleValueResult<string>>.NotFound("Refresh token not valid");
|
||||||
|
|
||||||
|
if (token.CreatedAt + HopFrameAuthentication<TDbContext>.RefreshTokenTime < DateTime.Now)
|
||||||
|
return LogicResult<SingleValueResult<string>>.Conflict("Refresh token is expired");
|
||||||
|
|
||||||
|
var accessToken = new TokenEntry {
|
||||||
|
CreatedAt = DateTime.Now,
|
||||||
|
Token = Guid.NewGuid().ToString(),
|
||||||
|
Type = TokenEntry.AccessTokenType,
|
||||||
|
UserId = token.UserId
|
||||||
|
};
|
||||||
|
|
||||||
|
await context.Tokens.AddAsync(accessToken);
|
||||||
|
await context.SaveChangesAsync();
|
||||||
|
|
||||||
|
accessor.HttpContext?.Response.Cookies.Append(ITokenContext.AccessTokenType, accessToken.Token, new CookieOptions {
|
||||||
|
MaxAge = HopFrameAuthentication<TDbContext>.AccessTokenTime,
|
||||||
|
HttpOnly = false,
|
||||||
|
Secure = true
|
||||||
|
});
|
||||||
|
|
||||||
|
return LogicResult<SingleValueResult<string>>.Ok(accessToken.Token);
|
||||||
|
}
|
||||||
|
|
||||||
|
public async Task<LogicResult> Logout() {
|
||||||
|
var accessToken = accessor.HttpContext?.User.GetAccessTokenId();
|
||||||
|
var refreshToken = accessor.HttpContext?.Request.Cookies[ITokenContext.RefreshTokenType];
|
||||||
|
|
||||||
|
if (string.IsNullOrEmpty(accessToken) || string.IsNullOrEmpty(refreshToken))
|
||||||
|
return LogicResult.Conflict("access or refresh token not provided");
|
||||||
|
|
||||||
|
var tokenEntries = await context.Tokens.Where(token =>
|
||||||
|
(token.Token == accessToken && token.Type == TokenEntry.AccessTokenType) ||
|
||||||
|
(token.Token == refreshToken && token.Type == TokenEntry.RefreshTokenType))
|
||||||
|
.ToArrayAsync();
|
||||||
|
|
||||||
|
if (tokenEntries.Length != 2)
|
||||||
|
return LogicResult.NotFound("One or more of the provided tokens was not found");
|
||||||
|
|
||||||
|
context.Tokens.Remove(tokenEntries[0]);
|
||||||
|
context.Tokens.Remove(tokenEntries[1]);
|
||||||
|
await context.SaveChangesAsync();
|
||||||
|
|
||||||
|
accessor.HttpContext?.Response.Cookies.Delete(ITokenContext.RefreshTokenType);
|
||||||
|
accessor.HttpContext?.Response.Cookies.Delete(ITokenContext.AccessTokenType);
|
||||||
|
|
||||||
|
return LogicResult.Ok();
|
||||||
|
}
|
||||||
|
|
||||||
|
public async Task<LogicResult> Delete(UserPasswordValidation validation) {
|
||||||
|
var user = tokenContext.User;
|
||||||
|
|
||||||
|
if (!await users.CheckUserPassword(user, validation.Password))
|
||||||
|
return LogicResult.Forbidden("The provided password is not correct");
|
||||||
|
|
||||||
|
await users.DeleteUser(user);
|
||||||
|
|
||||||
|
accessor.HttpContext?.Response.Cookies.Delete(ITokenContext.RefreshTokenType);
|
||||||
|
accessor.HttpContext?.Response.Cookies.Delete(ITokenContext.AccessTokenType);
|
||||||
|
|
||||||
|
return LogicResult.Ok();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -33,9 +33,68 @@ By default, the module provides a controller for handling authentication based r
|
|||||||
You can explore the contoller by the build in swagger site from ASP .NET.
|
You can explore the contoller by the build in swagger site from ASP .NET.
|
||||||
|
|
||||||
## Disable the Endpoints
|
## Disable the Endpoints
|
||||||
If you don't want to include these endpoints you need to comment out the AddHopFrame line and only add the Auth middleware:
|
|
||||||
```csharp
|
```csharp
|
||||||
builder.Services.AddDbContext<DatabaseContext>();
|
builder.Services.AddDbContext<DatabaseContext>();
|
||||||
//builder.Services.AddHopFrame<DatabaseContext>();
|
//builder.Services.AddHopFrame<DatabaseContext>();
|
||||||
services.AddHopFrameAuthentication<TDbContext>();
|
services.AddHopFrameNoEndpoints<TDbContext>();
|
||||||
|
```
|
||||||
|
|
||||||
|
# Services added in this module
|
||||||
|
You can use these services by specifying them as a dependency. All of them are scoped dependencies.
|
||||||
|
|
||||||
|
## LogicResult
|
||||||
|
Logic result is an extension of the ActionResult for an ApiController. It provides simple Http status results with either a message or data by specifying the generic type.
|
||||||
|
|
||||||
|
```csharp
|
||||||
|
public class LogicResult : ILogicResult {
|
||||||
|
public static LogicResult Ok();
|
||||||
|
|
||||||
|
public static LogicResult BadRequest();
|
||||||
|
|
||||||
|
public static LogicResult BadRequest(string message);
|
||||||
|
|
||||||
|
public static LogicResult Forbidden();
|
||||||
|
|
||||||
|
public static LogicResult Forbidden(string message);
|
||||||
|
|
||||||
|
public static LogicResult NotFound();
|
||||||
|
|
||||||
|
public static LogicResult NotFound(string message);
|
||||||
|
|
||||||
|
public static LogicResult Conflict();
|
||||||
|
|
||||||
|
public static LogicResult Conflict(string message);
|
||||||
|
|
||||||
|
public static LogicResult Forward(LogicResult result);
|
||||||
|
|
||||||
|
public static LogicResult Forward<T>(ILogicResult<T> result);
|
||||||
|
|
||||||
|
public static implicit operator ActionResult(LogicResult v);
|
||||||
|
}
|
||||||
|
|
||||||
|
public class LogicResult<T> : ILogicResult<T> {
|
||||||
|
public static LogicResult<T> Ok();
|
||||||
|
|
||||||
|
public static LogicResult<T> Ok(T result);
|
||||||
|
|
||||||
|
...
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
## IAuthLogic
|
||||||
|
This service handles all logic needed to provide the authentication endpoints by using the LogicResults.
|
||||||
|
|
||||||
|
```csharp
|
||||||
|
public interface IAuthLogic {
|
||||||
|
Task<LogicResult<SingleValueResult<string>>> Login(UserLogin login);
|
||||||
|
|
||||||
|
Task<LogicResult<SingleValueResult<string>>> Register(UserRegister register);
|
||||||
|
|
||||||
|
Task<LogicResult<SingleValueResult<string>>> Authenticate();
|
||||||
|
|
||||||
|
Task<LogicResult> Logout();
|
||||||
|
|
||||||
|
Task<LogicResult> Delete(UserPasswordValidation validation);
|
||||||
|
}
|
||||||
```
|
```
|
||||||
Reference in New Issue
Block a user