64 lines
2.4 KiB
C#
64 lines
2.4 KiB
C#
using System;
|
|
using System.IdentityModel.Tokens.Jwt;
|
|
using System.Linq;
|
|
using System.Text;
|
|
using System.Threading.Tasks;
|
|
using FlexitimeAPI.Interfaces;
|
|
using FlexitimeAPI.Models;
|
|
using FlexitimeAPI.Services;
|
|
using Microsoft.AspNetCore.Http;
|
|
using Microsoft.Extensions.Options;
|
|
using Microsoft.IdentityModel.Tokens;
|
|
|
|
namespace FlexitimeAPI.Helpers
|
|
{
|
|
public class JwtMiddleware
|
|
{
|
|
private readonly IApplicationSettings _appSettings;
|
|
private readonly RequestDelegate _next;
|
|
|
|
public JwtMiddleware(RequestDelegate next, IApplicationSettings appSettings)
|
|
{
|
|
_next = next;
|
|
_appSettings = appSettings;
|
|
}
|
|
|
|
public async Task Invoke(HttpContext context, IUserService userService)
|
|
{
|
|
var token = context.Request.Headers["Authorization"].FirstOrDefault()?.Split(" ").Last();
|
|
|
|
if (token != null)
|
|
await AttachUserToContext(context, userService, token);
|
|
|
|
await _next(context);
|
|
}
|
|
|
|
private async Task AttachUserToContext(HttpContext context, IUserService userService, string token)
|
|
{
|
|
try
|
|
{
|
|
var tokenHandler = new JwtSecurityTokenHandler();
|
|
var key = Encoding.ASCII.GetBytes(_appSettings.Secret);
|
|
tokenHandler.ValidateToken(token, new TokenValidationParameters
|
|
{
|
|
ValidateIssuerSigningKey = true,
|
|
IssuerSigningKey = new SymmetricSecurityKey(key),
|
|
ValidateIssuer = false,
|
|
ValidateAudience = false,
|
|
// set clockskew to zero so tokens expire exactly at token expiration time (instead of 5 minutes later)
|
|
ClockSkew = TimeSpan.Zero
|
|
}, out var validatedToken);
|
|
|
|
var jwtToken = (JwtSecurityToken) validatedToken;
|
|
var userId = Guid.Parse(jwtToken.Claims.First(x => x.Type == "id").Value);
|
|
// attach user to context on successful jwt validation
|
|
context.Items["User"] = await userService.GetById(userId);
|
|
}
|
|
catch(Exception ex)
|
|
{
|
|
// do nothing if jwt validation fails
|
|
// user is not attached to context so request won't have access to secure routes
|
|
}
|
|
}
|
|
}
|
|
} |