2021-04-02 17:28:07 +05:00
|
|
|
|
using AsbCloudApp.Data;
|
|
|
|
|
using AsbCloudApp.Services;
|
|
|
|
|
using AsbCloudDb.Model;
|
2021-08-24 10:59:10 +05:00
|
|
|
|
using Microsoft.EntityFrameworkCore;
|
2021-04-02 17:28:07 +05:00
|
|
|
|
using Microsoft.IdentityModel.Tokens;
|
|
|
|
|
using System;
|
|
|
|
|
using System.Collections.Generic;
|
|
|
|
|
using System.IdentityModel.Tokens.Jwt;
|
|
|
|
|
using System.Linq;
|
|
|
|
|
using System.Security.Claims;
|
|
|
|
|
using System.Security.Cryptography;
|
|
|
|
|
using System.Text;
|
2021-08-11 16:54:42 +05:00
|
|
|
|
using System.Threading;
|
|
|
|
|
using System.Threading.Tasks;
|
2021-04-02 17:28:07 +05:00
|
|
|
|
|
|
|
|
|
namespace AsbCloudInfrastructure.Services
|
|
|
|
|
{
|
|
|
|
|
public class AuthService : IAuthService
|
|
|
|
|
{
|
|
|
|
|
private readonly IAsbCloudDbContext db;
|
|
|
|
|
|
|
|
|
|
public const string issuer = "a";
|
|
|
|
|
public const string audience = "a";
|
|
|
|
|
public static readonly SymmetricSecurityKey securityKey = new SymmetricSecurityKey(Encoding.ASCII.GetBytes("супер секретный ключ для шифрования"));
|
|
|
|
|
public const string algorithms = SecurityAlgorithms.HmacSha256;
|
|
|
|
|
|
|
|
|
|
private static readonly TimeSpan expiresTimespan = TimeSpan.FromDays(365.25);
|
|
|
|
|
private static readonly Encoding encoding = Encoding.UTF8;
|
|
|
|
|
private const int PasswordSaltLength = 5;
|
2021-08-17 13:03:17 +05:00
|
|
|
|
private const string claimIdUser = "id";
|
2021-07-21 12:30:51 +05:00
|
|
|
|
private const string claimNameidCompany = "idCompany";
|
2021-04-02 17:28:07 +05:00
|
|
|
|
private readonly HashAlgorithm hashAlgoritm;
|
|
|
|
|
private readonly Random rnd;
|
|
|
|
|
|
|
|
|
|
public AuthService(IAsbCloudDbContext db)
|
|
|
|
|
{
|
|
|
|
|
this.db = db;
|
|
|
|
|
hashAlgoritm = SHA384.Create();
|
|
|
|
|
rnd = new Random((int)(DateTime.Now.Ticks % 2147480161));
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-11 16:54:42 +05:00
|
|
|
|
public async Task<UserTokenDto> LoginAsync(string login, string password,
|
|
|
|
|
CancellationToken token = default)
|
2021-04-02 17:28:07 +05:00
|
|
|
|
{
|
2021-08-11 17:26:02 +05:00
|
|
|
|
var identity = await GetClaimsUserAsync(login, password, token)
|
|
|
|
|
.ConfigureAwait(false);
|
|
|
|
|
|
2021-10-21 17:24:25 +05:00
|
|
|
|
if (identity == default || identity.User.State == 0)
|
2021-04-02 17:28:07 +05:00
|
|
|
|
return null;
|
|
|
|
|
|
|
|
|
|
return new UserTokenDto
|
|
|
|
|
{
|
|
|
|
|
Id = identity.User.Id,
|
|
|
|
|
Name = identity.User.Name,
|
2021-07-21 15:22:58 +05:00
|
|
|
|
CompanyName = identity.User.Company.Caption,
|
2021-04-02 17:28:07 +05:00
|
|
|
|
Level = identity.User.Level,
|
|
|
|
|
Login = identity.User.Login,
|
|
|
|
|
Patronymic = identity.User.Patronymic,
|
|
|
|
|
RoleName = identity.User.Role.Caption,
|
|
|
|
|
Surname = identity.User.Surname,
|
|
|
|
|
Token = MakeToken(identity.Identity.Claims),
|
2021-04-23 10:21:25 +05:00
|
|
|
|
};
|
2021-04-02 17:28:07 +05:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public string Refresh(ClaimsPrincipal user)
|
|
|
|
|
{
|
|
|
|
|
return MakeToken(user.Claims);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public int Register(UserDto userDto)
|
|
|
|
|
{
|
2021-10-22 17:41:00 +05:00
|
|
|
|
if (userDto.Login is null || userDto.Login.Length is < 3 or > 50)
|
2021-04-02 17:28:07 +05:00
|
|
|
|
return -1;
|
|
|
|
|
|
2021-10-22 17:41:00 +05:00
|
|
|
|
if (userDto.Password is null || userDto.Password.Length is < 3 or > 50)
|
2021-04-02 17:28:07 +05:00
|
|
|
|
return -2;
|
2021-10-19 15:22:18 +05:00
|
|
|
|
|
2021-10-22 17:41:00 +05:00
|
|
|
|
if (userDto.Email?.Length > 255)
|
2021-10-19 15:22:18 +05:00
|
|
|
|
return -3;
|
|
|
|
|
|
2021-10-22 17:41:00 +05:00
|
|
|
|
if (userDto.Phone?.Length > 50)
|
2021-10-19 15:22:18 +05:00
|
|
|
|
return -4;
|
|
|
|
|
|
2021-10-22 17:41:00 +05:00
|
|
|
|
if (userDto.Position?.Length > 255)
|
2021-10-19 15:22:18 +05:00
|
|
|
|
return -5;
|
2021-04-02 17:28:07 +05:00
|
|
|
|
|
|
|
|
|
var salt = GenerateSalt();
|
|
|
|
|
|
|
|
|
|
var user = new User
|
|
|
|
|
{
|
2021-07-21 12:30:51 +05:00
|
|
|
|
IdCompany = userDto.IdCompany,
|
2021-10-21 17:24:25 +05:00
|
|
|
|
IdRole = 2, // simple user
|
|
|
|
|
State = 0,
|
2021-04-02 17:28:07 +05:00
|
|
|
|
Name = userDto.Name,
|
|
|
|
|
Surname = userDto.Surname,
|
|
|
|
|
Patronymic = userDto.Patronymic,
|
2021-10-19 15:22:18 +05:00
|
|
|
|
Email = userDto.Email,
|
|
|
|
|
Phone = userDto.Phone,
|
|
|
|
|
Position = userDto.Position,
|
2021-04-02 17:28:07 +05:00
|
|
|
|
Level = userDto.Level,
|
|
|
|
|
Login = userDto.Login,
|
2021-10-21 17:24:25 +05:00
|
|
|
|
PasswordHash = salt + ComputeHash(salt, userDto.Password),
|
2021-04-02 17:28:07 +05:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
db.Users.Add(user);
|
|
|
|
|
try
|
|
|
|
|
{
|
|
|
|
|
db.SaveChanges();
|
|
|
|
|
}
|
|
|
|
|
catch //(Exception ex)
|
|
|
|
|
{
|
|
|
|
|
return -6;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public int ChangePassword(string userLogin, string newPassword)
|
|
|
|
|
{
|
2021-08-11 10:16:01 +05:00
|
|
|
|
var user = db.Users.AsNoTracking().FirstOrDefault(u => u.Login == userLogin);
|
2021-04-02 17:28:07 +05:00
|
|
|
|
if (user == null)
|
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
|
|
var salt = GenerateSalt();
|
|
|
|
|
user.PasswordHash = salt + ComputeHash(salt, newPassword);
|
|
|
|
|
db.SaveChanges();
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public int ChangePassword(int idUser, string newPassword)
|
|
|
|
|
{
|
|
|
|
|
var user = db.Users.FirstOrDefault(u => u.Id == idUser);
|
|
|
|
|
if (user == null)
|
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
|
|
var salt = GenerateSalt();
|
|
|
|
|
user.PasswordHash = salt + ComputeHash(salt, newPassword);
|
|
|
|
|
db.SaveChanges();
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2021-05-19 15:21:19 +05:00
|
|
|
|
private static string MakeToken(IEnumerable<Claim> claims)
|
2021-04-02 17:28:07 +05:00
|
|
|
|
{
|
|
|
|
|
var now = DateTime.Now;
|
|
|
|
|
|
|
|
|
|
var jwt = new JwtSecurityToken(
|
|
|
|
|
issuer: issuer,
|
|
|
|
|
audience: audience,
|
|
|
|
|
notBefore: now,
|
|
|
|
|
claims: claims,
|
|
|
|
|
expires: now.Add(expiresTimespan),
|
|
|
|
|
signingCredentials: new SigningCredentials(securityKey, algorithms));
|
|
|
|
|
|
|
|
|
|
return new JwtSecurityTokenHandler().WriteToken(jwt);
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-24 10:59:10 +05:00
|
|
|
|
private async Task<(ClaimsIdentity Identity, User User)> GetClaimsUserAsync(string login,
|
2021-08-11 16:54:42 +05:00
|
|
|
|
string password, CancellationToken token = default)
|
2021-04-02 17:28:07 +05:00
|
|
|
|
{
|
2021-08-11 16:54:42 +05:00
|
|
|
|
var user = await db
|
2021-04-02 17:28:07 +05:00
|
|
|
|
.GetUsersByLogin(login)
|
2021-08-11 10:16:01 +05:00
|
|
|
|
.AsNoTracking()
|
2021-08-11 17:26:02 +05:00
|
|
|
|
.FirstOrDefaultAsync(token)
|
|
|
|
|
.ConfigureAwait(false);
|
2021-04-02 17:28:07 +05:00
|
|
|
|
|
|
|
|
|
if (user is null)
|
|
|
|
|
return default;
|
|
|
|
|
|
|
|
|
|
if (!CheckPassword(user.PasswordHash, password))
|
|
|
|
|
return default;
|
|
|
|
|
|
|
|
|
|
var claims = new List<Claim>
|
|
|
|
|
{
|
2021-08-17 13:03:17 +05:00
|
|
|
|
new Claim(claimIdUser, user.Id.ToString()),
|
2021-04-02 17:28:07 +05:00
|
|
|
|
new Claim(ClaimsIdentity.DefaultNameClaimType, user.Login),
|
|
|
|
|
new Claim(ClaimsIdentity.DefaultRoleClaimType, user.Role?.Caption??"GUEST"),
|
2021-07-21 12:30:51 +05:00
|
|
|
|
new Claim(claimNameidCompany, user.IdCompany.ToString()),
|
2021-04-02 17:28:07 +05:00
|
|
|
|
};
|
|
|
|
|
var claimsIdentity = new ClaimsIdentity(claims, "Token", ClaimsIdentity.DefaultNameClaimType, ClaimsIdentity.DefaultRoleClaimType);
|
|
|
|
|
return (claimsIdentity, user);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private bool CheckPassword(string passwordHash, string password)
|
|
|
|
|
{
|
|
|
|
|
if (passwordHash.Length == 0 && password.Length == 0)
|
|
|
|
|
return true;
|
|
|
|
|
|
|
|
|
|
if (passwordHash.Length < PasswordSaltLength)
|
|
|
|
|
return false;
|
|
|
|
|
|
|
|
|
|
var salt = passwordHash[0..PasswordSaltLength];
|
|
|
|
|
var hashDb = passwordHash[PasswordSaltLength..];
|
|
|
|
|
|
|
|
|
|
return hashDb == ComputeHash(salt, password);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private string ComputeHash(string salt, string password)
|
|
|
|
|
{
|
|
|
|
|
var hashBytes = hashAlgoritm.ComputeHash(encoding.GetBytes(salt + password));
|
|
|
|
|
var hashString = BitConverter.ToString(hashBytes)
|
|
|
|
|
.Replace("-", "")
|
|
|
|
|
.ToLower();
|
|
|
|
|
return hashString;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public string GenerateSalt()
|
|
|
|
|
{
|
|
|
|
|
const string saltChars = "sHwiaX7kZT1QRp0cPILGUuK2Sz=9q8lmejDNfoYCE3B_WtgyVv6M5OxAJ4Frbhnd";
|
|
|
|
|
string salt = "";
|
|
|
|
|
for (int i = 0; i < PasswordSaltLength - 1; i++)
|
|
|
|
|
salt += saltChars[rnd.Next(0, saltChars.Length)];
|
|
|
|
|
salt += "|";
|
|
|
|
|
return salt;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|