mirror of
				https://github.com/Kareadita/Kavita.git
				synced 2025-10-31 10:37:04 -04:00 
			
		
		
		
	* Implemented ability to see downloads users are performing on the events widget. * Fixed a bug where version update task was calling wrong code * Fixed a bug where when checking for updates, the event wouldn't be pushed to server with correct name. Added update check to the event widget rather than opening a modal on the user. * Relaxed password requirements to only be 6-32 characters and inform user on register form about the requirements * Removed a ton of duplicate logic for series cards where the logic was already defined in action service * Fixed OPDS total items giving a rounded number rather than total items. * Fixed off by one issue on OPDS pagination
		
			
				
	
	
		
			71 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			C#
		
	
	
	
	
	
			
		
		
	
	
			71 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			C#
		
	
	
	
	
	
| using System.Text;
 | |
| using System.Threading.Tasks;
 | |
| using API.Constants;
 | |
| using API.Data;
 | |
| using API.Entities;
 | |
| using Microsoft.AspNetCore.Authentication.JwtBearer;
 | |
| using Microsoft.AspNetCore.Identity;
 | |
| using Microsoft.Extensions.Configuration;
 | |
| using Microsoft.Extensions.DependencyInjection;
 | |
| using Microsoft.IdentityModel.Tokens;
 | |
| 
 | |
| namespace API.Extensions
 | |
| {
 | |
|     public static class IdentityServiceExtensions
 | |
|     {
 | |
|         public static IServiceCollection AddIdentityServices(this IServiceCollection services, IConfiguration config)
 | |
|         {
 | |
|             services.AddIdentityCore<AppUser>(opt =>
 | |
|                 {
 | |
|                     opt.Password.RequireNonAlphanumeric = false;
 | |
|                     opt.Password.RequireDigit = false;
 | |
|                     opt.Password.RequireDigit = false;
 | |
|                     opt.Password.RequireLowercase = false;
 | |
|                     opt.Password.RequireUppercase = false;
 | |
|                     opt.Password.RequireNonAlphanumeric = false;
 | |
|                     opt.Password.RequiredLength = 6;
 | |
|                 })
 | |
|                 .AddRoles<AppRole>()
 | |
|                 .AddRoleManager<RoleManager<AppRole>>()
 | |
|                 .AddSignInManager<SignInManager<AppUser>>()
 | |
|                 .AddRoleValidator<RoleValidator<AppRole>>()
 | |
|                 .AddEntityFrameworkStores<DataContext>();
 | |
| 
 | |
|             services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
 | |
|                 .AddJwtBearer(options =>
 | |
|                 {
 | |
|                     options.TokenValidationParameters = new TokenValidationParameters()
 | |
|                     {
 | |
|                         ValidateIssuerSigningKey = true,
 | |
|                         IssuerSigningKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(config["TokenKey"])),
 | |
|                         ValidateIssuer = false,
 | |
|                         ValidateAudience = false
 | |
|                     };
 | |
| 
 | |
|                     options.Events = new JwtBearerEvents()
 | |
|                     {
 | |
|                         OnMessageReceived = context =>
 | |
|                         {
 | |
|                             var accessToken = context.Request.Query["access_token"];
 | |
|                             var path = context.HttpContext.Request.Path;
 | |
|                             // Only use query string based token on SignalR hubs
 | |
|                             if (!string.IsNullOrEmpty(accessToken) && path.StartsWithSegments("/hubs"))
 | |
|                             {
 | |
|                                 context.Token = accessToken;
 | |
|                             }
 | |
| 
 | |
|                             return Task.CompletedTask;
 | |
|                         }
 | |
|                     };
 | |
|                 });
 | |
|             services.AddAuthorization(opt =>
 | |
|             {
 | |
|                 opt.AddPolicy("RequireAdminRole", policy => policy.RequireRole(PolicyConstants.AdminRole));
 | |
|                 opt.AddPolicy("RequireDownloadRole", policy => policy.RequireRole(PolicyConstants.DownloadRole, PolicyConstants.AdminRole));
 | |
|             });
 | |
| 
 | |
|             return services;
 | |
|         }
 | |
|     }
 | |
| }
 |