basic player management
This commit is contained in:
parent
350a283b5e
commit
bab170552e
12 changed files with 244 additions and 91 deletions
|
@ -1,14 +1,10 @@
|
|||
using MediatR;
|
||||
using Microsoft.AspNetCore.Authorization;
|
||||
using AutoMapper;
|
||||
using Microsoft.AspNetCore.Identity;
|
||||
using Microsoft.AspNetCore.Mvc;
|
||||
using Microsoft.Extensions.Options;
|
||||
using Microsoft.IdentityModel.Tokens;
|
||||
using Sledgemapper.Api.Commands;
|
||||
using Sledgemapper.Api.Notifications;
|
||||
using Sledgemapper.Entities;
|
||||
using Sledgemapper.Models.Users;
|
||||
using Sledgemapper.Shared.Entities;
|
||||
using System;
|
||||
using System.Collections.Generic;
|
||||
using System.IdentityModel.Tokens.Jwt;
|
||||
|
@ -19,19 +15,21 @@ using System.Threading.Tasks;
|
|||
|
||||
namespace Sledgemapper.Api.Controllers
|
||||
{
|
||||
|
||||
[Route("[controller]")] // api/authmanagement
|
||||
[ApiController]
|
||||
public class AuthManagementController : ControllerBase
|
||||
{
|
||||
private readonly UserManager<User> _userManager;
|
||||
private readonly JwtConfig _jwtConfig;
|
||||
private readonly IMapper _mapper;
|
||||
|
||||
public AuthManagementController(UserManager<User> userManager,
|
||||
IOptionsMonitor<JwtConfig> optionsMonitor)
|
||||
IOptionsMonitor<JwtConfig> optionsMonitor,
|
||||
IMapper mapper)
|
||||
{
|
||||
_userManager = userManager;
|
||||
_jwtConfig = optionsMonitor.CurrentValue;
|
||||
_mapper = mapper;
|
||||
}
|
||||
|
||||
[HttpPost]
|
||||
|
@ -55,7 +53,8 @@ namespace Sledgemapper.Api.Controllers
|
|||
});
|
||||
}
|
||||
|
||||
var newUser = new User() { Email = user.Email, UserName = user.UserName };
|
||||
var newUser = _mapper.Map<User>(user);
|
||||
// var newUser = new User() { Email = user.Email, UserName = user.UserName };
|
||||
var isCreated = await _userManager.CreateAsync(newUser, user.Password);
|
||||
if (isCreated.Succeeded)
|
||||
{
|
||||
|
@ -86,43 +85,6 @@ namespace Sledgemapper.Api.Controllers
|
|||
});
|
||||
}
|
||||
|
||||
private string GenerateJwtToken(User user)
|
||||
{
|
||||
// Now its ime to define the jwt token which will be responsible of creating our tokens
|
||||
var jwtTokenHandler = new JwtSecurityTokenHandler();
|
||||
|
||||
// We get our secret from the appsettings
|
||||
var key = Encoding.ASCII.GetBytes(_jwtConfig.Secret);
|
||||
|
||||
// we define our token descriptor
|
||||
// We need to utilise claims which are properties in our token which gives information about the token
|
||||
// which belong to the specific user who it belongs to
|
||||
// so it could contain their id, name, email the good part is that these information
|
||||
// are generated by our server and identity framework which is valid and trusted
|
||||
var tokenDescriptor = new SecurityTokenDescriptor
|
||||
{
|
||||
Subject = new ClaimsIdentity(new[]
|
||||
{
|
||||
new Claim("Id", user.Id.ToString()),
|
||||
new Claim(JwtRegisteredClaimNames.Sub, user.Email),
|
||||
new Claim(JwtRegisteredClaimNames.Email, user.Email),
|
||||
// the JTI is used for our refresh token which we will be convering in the next video
|
||||
new Claim(JwtRegisteredClaimNames.Jti, Guid.NewGuid().ToString())
|
||||
}),
|
||||
// the life span of the token needs to be shorter and utilise refresh token to keep the user signedin
|
||||
// but since this is a demo app we can extend it to fit our current need
|
||||
Expires = DateTime.UtcNow.AddHours(6),
|
||||
// here we are adding the encryption alogorithim information which will be used to decrypt our token
|
||||
SigningCredentials = new SigningCredentials(new SymmetricSecurityKey(key), SecurityAlgorithms.HmacSha512Signature)
|
||||
};
|
||||
|
||||
var token = jwtTokenHandler.CreateToken(tokenDescriptor);
|
||||
|
||||
var jwtToken = jwtTokenHandler.WriteToken(token);
|
||||
|
||||
return jwtToken;
|
||||
}
|
||||
|
||||
[HttpPost]
|
||||
[Route("Login")]
|
||||
public async Task<IActionResult> Login([FromBody] UserLoginRequest user)
|
||||
|
@ -178,7 +140,43 @@ namespace Sledgemapper.Api.Controllers
|
|||
}
|
||||
});
|
||||
}
|
||||
|
||||
private string GenerateJwtToken(User user)
|
||||
{
|
||||
// Now its ime to define the jwt token which will be responsible of creating our tokens
|
||||
var jwtTokenHandler = new JwtSecurityTokenHandler();
|
||||
|
||||
// We get our secret from the appsettings
|
||||
var key = Encoding.ASCII.GetBytes(_jwtConfig.Secret);
|
||||
|
||||
// we define our token descriptor
|
||||
// We need to utilise claims which are properties in our token which gives information about the token
|
||||
// which belong to the specific user who it belongs to
|
||||
// so it could contain their id, name, email the good part is that these information
|
||||
// are generated by our server and identity framework which is valid and trusted
|
||||
var tokenDescriptor = new SecurityTokenDescriptor
|
||||
{
|
||||
|
||||
Subject = new ClaimsIdentity(new[]
|
||||
{
|
||||
new Claim("Id", user.Id.ToString()),
|
||||
new Claim(JwtRegisteredClaimNames.Sub, user.Email),
|
||||
new Claim(JwtRegisteredClaimNames.Email, user.Email),
|
||||
// the JTI is used for our refresh token which we will be convering in the next video
|
||||
new Claim(JwtRegisteredClaimNames.Jti, Guid.NewGuid().ToString())
|
||||
}),
|
||||
// the life span of the token needs to be shorter and utilise refresh token to keep the user signedin
|
||||
// but since this is a demo app we can extend it to fit our current need
|
||||
Expires = DateTime.UtcNow.AddHours(6),
|
||||
// here we are adding the encryption alogorithim information which will be used to decrypt our token
|
||||
SigningCredentials = new SigningCredentials(new SymmetricSecurityKey(key), SecurityAlgorithms.HmacSha512Signature)
|
||||
};
|
||||
|
||||
var token = jwtTokenHandler.CreateToken(tokenDescriptor);
|
||||
|
||||
var jwtToken = jwtTokenHandler.WriteToken(token);
|
||||
|
||||
return jwtToken;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue