From 401a5b74696c471e5168e421e3de0db1e5f946a8 Mon Sep 17 00:00:00 2001 From: crupest Date: Fri, 12 Apr 2019 23:34:40 +0800 Subject: Add database connection. --- Timeline/Services/JwtService.cs | 53 +++++++++++------------------------------ 1 file changed, 14 insertions(+), 39 deletions(-) (limited to 'Timeline/Services/JwtService.cs') diff --git a/Timeline/Services/JwtService.cs b/Timeline/Services/JwtService.cs index abdde908..91e7f879 100644 --- a/Timeline/Services/JwtService.cs +++ b/Timeline/Services/JwtService.cs @@ -7,34 +7,25 @@ using System.Linq; using System.Security.Claims; using System.Text; using Timeline.Configs; -using Timeline.Entities; namespace Timeline.Services { public interface IJwtService { /// - /// Create a JWT token for a given user. - /// Return null if is null. + /// Create a JWT token for a given user id. /// - /// The user to generate token. - /// The generated token or null if is null. - string GenerateJwtToken(User user); + /// The user id used to generate token. + /// Return the generated token. + string GenerateJwtToken(long userId, string[] roles); /// - /// Validate a JWT token. + /// Verify a JWT token. /// Return null is is null. - /// If token is invalid, return a with - /// set to false and - /// set to null. - /// If token is valid, return a with - /// set to true and - /// filled with the user info - /// in the token. /// - /// The token string to validate. - /// Null if is null. Or the result. - TokenValidationResponse ValidateJwtToken(string token); + /// The token string to verify. + /// Return null if is null or token is invalid. Return the saved user id otherwise. + long? VerifyJwtToken(string token); } @@ -50,17 +41,13 @@ namespace Timeline.Services _logger = logger; } - public string GenerateJwtToken(User user) + public string GenerateJwtToken(long id, string[] roles) { - if (user == null) - return null; - var jwtConfig = _jwtConfig.CurrentValue; var identity = new ClaimsIdentity(); - identity.AddClaim(new Claim(ClaimTypes.NameIdentifier, user.Id.ToString())); - identity.AddClaim(new Claim(identity.NameClaimType, user.Username)); - identity.AddClaims(user.Roles.Select(role => new Claim(identity.RoleClaimType, role))); + identity.AddClaim(new Claim(ClaimTypes.NameIdentifier, id.ToString())); + identity.AddClaims(roles.Select(role => new Claim(identity.RoleClaimType, role))); var tokenDescriptor = new SecurityTokenDescriptor() { @@ -80,7 +67,7 @@ namespace Timeline.Services } - public TokenValidationResponse ValidateJwtToken(string token) + public long? VerifyJwtToken(string token) { if (token == null) return null; @@ -100,24 +87,12 @@ namespace Timeline.Services IssuerSigningKey = new SymmetricSecurityKey(Encoding.ASCII.GetBytes(config.SigningKey)) }, out SecurityToken validatedToken); - var identity = principal.Identity as ClaimsIdentity; - - var userInfo = new UserInfo - { - Username = identity.FindAll(identity.NameClaimType).Select(claim => claim.Value).Single(), - Roles = identity.FindAll(identity.RoleClaimType).Select(claim => claim.Value).ToArray() - }; - - return new TokenValidationResponse - { - IsValid = true, - UserInfo = userInfo - }; + return long.Parse(principal.FindAll(ClaimTypes.NameIdentifier).Single().Value); } catch (Exception e) { _logger.LogInformation(e, "Token validation failed! Token is {} .", token); - return new TokenValidationResponse { IsValid = false }; + return null; } } } -- cgit v1.2.3