summaryrefslogtreecommitdiff
path: root/Controllers/UsersController.cs
blob: 52c91058ba47daf3cba257210ecc18b3afebcd87 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
using Microsoft.AspNetCore.Authentication.JwtBearer;
using Microsoft.AspNetCore.Authorization;
using Microsoft.IdentityModel.Tokens;
using System.IdentityModel.Tokens.Jwt;
using Microsoft.AspNetCore.Identity;
using Microsoft.AspNetCore.Mvc;
using Microsoft.EntityFrameworkCore;
using System.Text;
using System.Security.Claims;
using IdentityAPI.Models;
using IdentityAPI.DTO;

namespace IdentityAPI.Controllers {
    [Route("api/users")]
    [ApiController]
    public class UsersController : ControllerBase {
        private readonly ApplicationDbContext _context;
        private readonly IConfiguration _configuration;
        private readonly UserManager<IdentityUser> _manager;

        public UsersController(ApplicationDbContext context, IConfiguration configuration, UserManager<IdentityUser> manager) {
            _context = context;
            _configuration = configuration;
            _manager = manager;
        }

	[HttpPost("signup")]
	public async Task<IActionResult> PostUser(UserDTO data) {
	    var user = new IdentityUser { UserName = data.UserName, Email = data.Email };
	    var result = await _manager.CreateAsync(user, data.Password);
	    
	    if(result.Succeeded)
		return Ok(new { Token = GenerateToken(user) });

            return StatusCode(422, new { error = "The provided user is invalid" });
        }

	private string GenerateToken(IdentityUser user) {
            var key = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(_configuration["Jwt:Key"]));
	    var creds = new SigningCredentials(key, SecurityAlgorithms.HmacSha256);
            var expiration = DateTime.UtcNow.AddMinutes(30);
            var issuer = _configuration["Jwt:Issuer"];
            var claims = new List<Claim> {
		new Claim("sid", user.Id),
		new Claim("username", user.UserName),
		new Claim("email", user.Email)
	    };
            var descriptor = new JwtSecurityToken(issuer: null, audience: null, claims: claims, expires: expiration, signingCredentials: creds);

            return new JwtSecurityTokenHandler().WriteToken(descriptor);
        }
    }
}