FlexitimeTracker/FlexitimeUI/FlexitimeAPI/Helpers/JwtMiddleware.cs
2023-04-11 20:17:20 +01:00

64 lines
2.4 KiB
C#

using System;
using System.IdentityModel.Tokens.Jwt;
using System.Linq;
using System.Text;
using System.Threading.Tasks;
using FlexitimeAPI.Interfaces;
using FlexitimeAPI.Models;
using FlexitimeAPI.Services;
using Microsoft.AspNetCore.Http;
using Microsoft.Extensions.Options;
using Microsoft.IdentityModel.Tokens;
namespace FlexitimeAPI.Helpers
{
public class JwtMiddleware
{
private readonly IApplicationSettings _appSettings;
private readonly RequestDelegate _next;
public JwtMiddleware(RequestDelegate next, IApplicationSettings appSettings)
{
_next = next;
_appSettings = appSettings;
}
public async Task Invoke(HttpContext context, IUserService userService)
{
var token = context.Request.Headers["Authorization"].FirstOrDefault()?.Split(" ").Last();
if (token != null)
await AttachUserToContext(context, userService, token);
await _next(context);
}
private async Task AttachUserToContext(HttpContext context, IUserService userService, string token)
{
try
{
var tokenHandler = new JwtSecurityTokenHandler();
var key = Encoding.ASCII.GetBytes(_appSettings.Secret);
tokenHandler.ValidateToken(token, new TokenValidationParameters
{
ValidateIssuerSigningKey = true,
IssuerSigningKey = new SymmetricSecurityKey(key),
ValidateIssuer = false,
ValidateAudience = false,
// set clockskew to zero so tokens expire exactly at token expiration time (instead of 5 minutes later)
ClockSkew = TimeSpan.Zero
}, out var validatedToken);
var jwtToken = (JwtSecurityToken) validatedToken;
var userId = Guid.Parse(jwtToken.Claims.First(x => x.Type == "id").Value);
// attach user to context on successful jwt validation
context.Items["User"] = await userService.GetById(userId);
}
catch(Exception ex)
{
// do nothing if jwt validation fails
// user is not attached to context so request won't have access to secure routes
}
}
}
}