summaryrefslogtreecommitdiff
path: root/Controllers/UsersController.cs
blob: 9e66fcea33272fc273e165571aa0633bc5984f4d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
using Microsoft.AspNetCore.Authentication.JwtBearer;
using Microsoft.AspNetCore.Authorization;
using Microsoft.IdentityModel.Tokens;
using System.IdentityModel.Tokens.Jwt;
using Microsoft.AspNetCore.Identity;
using Microsoft.AspNetCore.Mvc;
using Microsoft.EntityFrameworkCore;
using System.Text;
using System.Security.Claims;
using IdentityAPI.Models;
using IdentityAPI.DTOs;

namespace IdentityAPI.Controllers {
    [Route("api/users")]
    [ApiController]
    public class UsersController : ControllerBase {
        private readonly ApplicationDbContext _context;
        private readonly IConfiguration _configuration;
        private readonly UserManager<IdentityUser> _manager;

        public UsersController(ApplicationDbContext context, IConfiguration configuration, UserManager<IdentityUser> manager) {
            _context = context;
            _configuration = configuration;
            _manager = manager;
        }

	    [HttpPost("signup")]
	    public async Task<IActionResult> SignUp(UserDTO data) {
            if(data.Email != null && data.Password != null) {
	            var user = new IdentityUser { UserName = data.UserName, Email = data.Email };
	            var result = await _manager.CreateAsync(user, data.Password);
	    
	            if(result.Succeeded)
		            return Ok(new { Token = GenerateToken(user) });
            }

            return StatusCode(422, new { error = "The provided user is invalid" });
        }

        [HttpPost("login")]
        public async Task<IActionResult> Login(LoginRequest data) {
            if(data != null && data.Email != null && data.Password != null) {
                var user = await _manager.FindByEmailAsync(data.Email);
            
                if(user == null)
                    return StatusCode(404, new { error = "Nonexistent user" });

                var result = await _manager.CheckPasswordAsync(user, data.Password);

                if(result)
                    return Ok(new { Token = GenerateToken(user)} );

                return StatusCode(401, new { error = "Wrong credentials" });
            }

            return StatusCode(400, new { error = "Invalid request body" });
        }

        [HttpGet("refresh")]
        [Authorize(AuthenticationSchemes = JwtBearerDefaults.AuthenticationScheme)]
        public async Task<IActionResult> Refresh() {
            var user = await _manager.FindByEmailAsync(HttpContext.User.Claims.Where(c => c.Type.Contains("email")).FirstOrDefault().Value);

            return Ok(new { Token = GenerateToken(user) });
        }

	    private string GenerateToken(IdentityUser user) {
            var key = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(_configuration["Jwt:Key"]));
	        var creds = new SigningCredentials(key, SecurityAlgorithms.HmacSha256);
            var expiration = DateTime.UtcNow.AddMinutes(30);
            //var issuer = _configuration["Jwt:Issuer"];
            var claims = new List<Claim> {
		        new Claim("sid", user.Id),
		        new Claim("username", user.UserName),
		        new Claim("email", user.Email)
	        };
            var descriptor = new JwtSecurityToken(issuer: null, audience: null, claims: claims, expires: expiration, signingCredentials: creds);

            return new JwtSecurityTokenHandler().WriteToken(descriptor);
        }
    }
}