1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
|
using Microsoft.AspNetCore.Authentication.JwtBearer;
using Microsoft.AspNetCore.Authorization;
using Microsoft.IdentityModel.Tokens;
using System.IdentityModel.Tokens.Jwt;
using Microsoft.AspNetCore.Identity;
using Microsoft.AspNetCore.Mvc;
using Microsoft.EntityFrameworkCore;
using System.Text;
using System.Security.Claims;
using IdentityAPI.Models;
using IdentityAPI.DTO;
namespace IdentityAPI.Controllers {
[Route("api/users")]
[ApiController]
public class UsersController : ControllerBase {
private readonly ApplicationDbContext _context;
private readonly IConfiguration _configuration;
private readonly UserManager<IdentityUser> _manager;
public UsersController(ApplicationDbContext context, IConfiguration configuration, UserManager<IdentityUser> manager) {
_context = context;
_configuration = configuration;
_manager = manager;
}
[HttpPost("signup")]
public async Task<IActionResult> PostUser(UserDTO data) {
var user = new IdentityUser { UserName = data.UserName, Email = data.Email };
var result = await _manager.CreateAsync(user, data.Password);
if(result.Succeeded)
return Ok(new { Token = GenerateToken(user) });
return StatusCode(422, new { error = "The provided user is invalid" });
}
private string GenerateToken(IdentityUser user) {
var key = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(_configuration["Jwt:Key"]));
var creds = new SigningCredentials(key, SecurityAlgorithms.HmacSha256);
var expiration = DateTime.UtcNow.AddMinutes(30);
var issuer = _configuration["Jwt:Issuer"];
var claims = new List<Claim> {
new Claim("sid", user.Id),
new Claim("username", user.UserName),
new Claim("email", user.Email)
};
var descriptor = new JwtSecurityToken(issuer: null, audience: null, claims: claims, expires: expiration, signingCredentials: creds);
return new JwtSecurityTokenHandler().WriteToken(descriptor);
}
}
}
|