mirror of
				https://github.com/Kareadita/Kavita.git
				synced 2025-10-31 10:37:04 -04:00 
			
		
		
		
	* Moved the Server Settings out into a button on nav header * Refactored Mange Users page to the new design (skeleton). Implemented skeleton code for Invite User. * Hashed out more of the code, but need to move all the email code to a Kavita controlled API server due to password credentials. * Cleaned up some warnings * When no user exists for an api key in Plugin controller, throw 401. * Hooked in the ability to check if the Kavita instance can be accessed externally so we can determine if the user can invite or not. * Hooked up some logic if the user's server isn't accessible, then default to old flow * Basic flow is working for confirm email. Needs validation, error handling, etc. * Refactored Password validation to account service * Cleaned up the code in confirm-email to work much better. * Refactored the login page to have a container functionality, so we can reuse the styles on multiple pages (registration pages). Hooked up the code for confirm email. * Messy code, but making progress. Refactored Register to be used only for first time user registration. Added a new register component to handle first time flow only. * Invite works much better, still needs a bit of work for non-accessible server setup. Started work on underlying manage users page to meet new design. * Changed (you) to a star to indicate who you're logged in as. * Inviting a user is now working and tested fully. * Removed the register member component as we now have invite and confirm components. * Editing a user is now working. Username change and Role/Library access from within one screen. Email changing is on hold. * Cleaned up code for edit user and disabled email field for now. * Cleaned up the code to indicate changing a user's email is not possible. * Implemented a migration for existing accounts so they can validate their emails and still login. * Change url for email server * Implemented the ability to resend an email confirmation code (or regenerate for non accessible servers). Fixed an overflow on the confirm dialog. * Took care of some code cleanup * Removed 3 db calls from cover refresh and some misc cleanup * Fixed a broken test
		
			
				
	
	
		
			76 lines
		
	
	
		
			3.1 KiB
		
	
	
	
		
			C#
		
	
	
	
	
	
			
		
		
	
	
			76 lines
		
	
	
		
			3.1 KiB
		
	
	
	
		
			C#
		
	
	
	
	
	
| using System.Text;
 | |
| using System.Threading.Tasks;
 | |
| using API.Constants;
 | |
| using API.Data;
 | |
| using API.Entities;
 | |
| using Microsoft.AspNetCore.Authentication.JwtBearer;
 | |
| using Microsoft.AspNetCore.Identity;
 | |
| using Microsoft.Extensions.Configuration;
 | |
| using Microsoft.Extensions.DependencyInjection;
 | |
| using Microsoft.IdentityModel.Tokens;
 | |
| 
 | |
| namespace API.Extensions
 | |
| {
 | |
|     public static class IdentityServiceExtensions
 | |
|     {
 | |
|         public static IServiceCollection AddIdentityServices(this IServiceCollection services, IConfiguration config)
 | |
|         {
 | |
|             services.AddIdentityCore<AppUser>(opt =>
 | |
|                 {
 | |
|                     opt.Password.RequireNonAlphanumeric = false;
 | |
|                     opt.Password.RequireDigit = false;
 | |
|                     opt.Password.RequireDigit = false;
 | |
|                     opt.Password.RequireLowercase = false;
 | |
|                     opt.Password.RequireUppercase = false;
 | |
|                     opt.Password.RequireNonAlphanumeric = false;
 | |
|                     opt.Password.RequiredLength = 6;
 | |
| 
 | |
|                     opt.SignIn.RequireConfirmedEmail = true;
 | |
|                 })
 | |
|                 .AddTokenProvider<DataProtectorTokenProvider<AppUser>>(TokenOptions.DefaultProvider)
 | |
|                 .AddRoles<AppRole>()
 | |
|                 .AddRoleManager<RoleManager<AppRole>>()
 | |
|                 .AddSignInManager<SignInManager<AppUser>>()
 | |
|                 .AddRoleValidator<RoleValidator<AppRole>>()
 | |
|                 .AddEntityFrameworkStores<DataContext>();
 | |
| 
 | |
| 
 | |
|             services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
 | |
|                 .AddJwtBearer(options =>
 | |
|                 {
 | |
|                     options.TokenValidationParameters = new TokenValidationParameters()
 | |
|                     {
 | |
|                         ValidateIssuerSigningKey = true,
 | |
|                         IssuerSigningKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(config["TokenKey"])),
 | |
|                         ValidateIssuer = false,
 | |
|                         ValidateAudience = false,
 | |
|                         ValidIssuer = "Kavita"
 | |
|                     };
 | |
| 
 | |
|                     options.Events = new JwtBearerEvents()
 | |
|                     {
 | |
|                         OnMessageReceived = context =>
 | |
|                         {
 | |
|                             var accessToken = context.Request.Query["access_token"];
 | |
|                             var path = context.HttpContext.Request.Path;
 | |
|                             // Only use query string based token on SignalR hubs
 | |
|                             if (!string.IsNullOrEmpty(accessToken) && path.StartsWithSegments("/hubs"))
 | |
|                             {
 | |
|                                 context.Token = accessToken;
 | |
|                             }
 | |
| 
 | |
|                             return Task.CompletedTask;
 | |
|                         }
 | |
|                     };
 | |
|                 });
 | |
|             services.AddAuthorization(opt =>
 | |
|             {
 | |
|                 opt.AddPolicy("RequireAdminRole", policy => policy.RequireRole(PolicyConstants.AdminRole));
 | |
|                 opt.AddPolicy("RequireDownloadRole", policy => policy.RequireRole(PolicyConstants.DownloadRole, PolicyConstants.AdminRole));
 | |
|             });
 | |
| 
 | |
|             return services;
 | |
|         }
 | |
|     }
 | |
| }
 |