Project/Project.Web/Controllers/AuthController.cs

150 lines
5.1 KiB
C#

using Microsoft.AspNetCore.Authentication;
using Microsoft.AspNetCore.Authentication.Cookies;
using Microsoft.AspNetCore.Authorization;
using Microsoft.AspNetCore.Mvc;
using Project.Application.DTOs.Auth;
using Project.Application.DTOs.TwoFactorAuth;
using Project.Application.Interfaces;
using System.Security.Claims;
namespace Project.Web.Controllers
{
[ApiController]
[Route("api/[controller]")]
public class AuthController : ControllerBase
{
// FIELDS FOR CTOR
private readonly IUserService _userService;
private readonly IAuthService _authService;
private readonly ITwoFactorAuthService _twoFactorAuthService;
// CTOR
public AuthController(IUserService userService, IAuthService authService, ITwoFactorAuthService twoFactorAuthService)
{
_userService = userService;
_authService = authService;
_twoFactorAuthService = twoFactorAuthService;
}
// LOGIN
[AllowAnonymous]
[HttpPost("login")]
public async Task<IActionResult> Login([FromBody] LoginDto loginDto)
{
// Validate login credentials
bool isValid = await _authService.ValidateAsync(loginDto.Email, loginDto.Password);
if (!isValid)
{
return Unauthorized();
}
// Validate user
var user = await _userService.GetByEmailAsync(loginDto.Email);
if (user == null)
{
return Unauthorized(user);
}
// Check if 2FA is required
var secretKey = await _twoFactorAuthService.GetSecretKeyAsync(loginDto.Email);
if (!string.IsNullOrEmpty(secretKey))
{
// Promt for 2FA
return Ok(new { RequiresTwoFactor = true });
}
// Create claims based on the user information
var claims = new List<Claim>
{
new Claim(ClaimTypes.NameIdentifier, user.Id.ToString()),
new Claim(ClaimTypes.Name, user.Email),
new Claim(ClaimTypes.Surname, user.LastName ?? ""),
new Claim(ClaimTypes.GivenName, user.FirstName ?? ""),
new Claim(ClaimTypes.Role, user?.Role?.Name.ToString() ?? "") // role is important for authorization
};
// Create a ClaimsIdentity based on the created claims
var claimsIdentity = new ClaimsIdentity(claims, CookieAuthenticationDefaults.AuthenticationScheme);
// Set the authentication properties
var authProperties = new AuthenticationProperties
{
IsPersistent = true,
AllowRefresh = true,
ExpiresUtc = DateTime.UtcNow.AddMinutes(60)
};
// Sign in user using cookie-based authentication
await HttpContext.SignInAsync(
CookieAuthenticationDefaults.AuthenticationScheme,
new ClaimsPrincipal(claimsIdentity),
authProperties
);
return Ok();
}
[AllowAnonymous]
[HttpPost("verify2fa")]
public async Task<IActionResult> Verify2Fa([FromBody] TwoFactorVerificationDto verifyDto)
{
var isValid = await _twoFactorAuthService.ValidateCodeAsync(verifyDto.Email, verifyDto.Code);
if (!isValid)
{
return Unauthorized();
}
var user = await _userService.GetByEmailAsync(verifyDto.Email);
if (user == null)
{
return Unauthorized();
}
var claims = new List<Claim>
{
new Claim(ClaimTypes.NameIdentifier, user.Id.ToString()),
new Claim(ClaimTypes.Email, user.Email),
new Claim(ClaimTypes.Surname, user.LastName ?? ""),
new Claim(ClaimTypes.GivenName, user.FirstName ?? ""),
new Claim(ClaimTypes.Role, user?.Role?.Name ?? "")
};
var claimsIdentity = new ClaimsIdentity(claims, CookieAuthenticationDefaults.AuthenticationScheme);
var authProperties = new AuthenticationProperties
{
IsPersistent = true,
AllowRefresh = true,
ExpiresUtc = DateTime.UtcNow.AddMinutes(60)
};
await HttpContext.SignInAsync(
CookieAuthenticationDefaults.AuthenticationScheme,
new ClaimsPrincipal(claimsIdentity),
authProperties
);
return Ok();
}
// LOGOUT
[HttpPost("logout")]
public async Task<IActionResult> Logout()
{
await HttpContext.SignOutAsync(CookieAuthenticationDefaults.AuthenticationScheme);
return Ok();
}
//// SETUP 2FA
//[AllowAnonymous]
//[HttpPost("setup-2fa")]
//public async Task<IActionResult> SetupTwoFactorAuth([FromBody] SetupTwoFactorDto setupDto)
//{
// var result = await _twoFactorAuthService.GenerateSetupCodeAsync(setupDto.Email);
// return Ok(result);
//}
}
}