mirror of
				https://github.com/Kareadita/Kavita.git
				synced 2025-11-04 03:27:05 -05:00 
			
		
		
		
	
		
			
				
	
	
		
			155 lines
		
	
	
		
			5.5 KiB
		
	
	
	
		
			C#
		
	
	
	
	
	
			
		
		
	
	
			155 lines
		
	
	
		
			5.5 KiB
		
	
	
	
		
			C#
		
	
	
	
	
	
using System;
 | 
						|
using System.Collections.Generic;
 | 
						|
using System.IdentityModel.Tokens.Jwt;
 | 
						|
using System.Linq;
 | 
						|
using System.Security.Claims;
 | 
						|
using System.Text;
 | 
						|
using System.Threading.Tasks;
 | 
						|
using API.Data;
 | 
						|
using API.DTOs.Account;
 | 
						|
using API.Entities;
 | 
						|
using Microsoft.AspNetCore.Identity;
 | 
						|
using Microsoft.Extensions.Configuration;
 | 
						|
using Microsoft.Extensions.Logging;
 | 
						|
using Microsoft.IdentityModel.Tokens;
 | 
						|
using static System.Security.Claims.ClaimTypes;
 | 
						|
using JwtRegisteredClaimNames = Microsoft.IdentityModel.JsonWebTokens.JwtRegisteredClaimNames;
 | 
						|
 | 
						|
 | 
						|
namespace API.Services;
 | 
						|
#nullable enable
 | 
						|
 | 
						|
public interface ITokenService
 | 
						|
{
 | 
						|
    Task<string> CreateToken(AppUser user);
 | 
						|
    Task<TokenRequestDto?> ValidateRefreshToken(TokenRequestDto request);
 | 
						|
    Task<string> CreateRefreshToken(AppUser user);
 | 
						|
    Task<string?> GetJwtFromUser(AppUser user);
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
public class TokenService : ITokenService
 | 
						|
{
 | 
						|
    private readonly UserManager<AppUser> _userManager;
 | 
						|
    private readonly ILogger<TokenService> _logger;
 | 
						|
    private readonly IUnitOfWork _unitOfWork;
 | 
						|
    private readonly SymmetricSecurityKey _key;
 | 
						|
    private const string RefreshTokenName = "RefreshToken";
 | 
						|
 | 
						|
    public TokenService(IConfiguration config, UserManager<AppUser> userManager, ILogger<TokenService> logger, IUnitOfWork unitOfWork)
 | 
						|
    {
 | 
						|
 | 
						|
        _userManager = userManager;
 | 
						|
        _logger = logger;
 | 
						|
        _unitOfWork = unitOfWork;
 | 
						|
        _key = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(config["TokenKey"] ?? string.Empty));
 | 
						|
    }
 | 
						|
 | 
						|
    public async Task<string> CreateToken(AppUser user)
 | 
						|
    {
 | 
						|
        var claims = new List<Claim>
 | 
						|
        {
 | 
						|
            new Claim(JwtRegisteredClaimNames.Name, user.UserName!),
 | 
						|
            new Claim(ClaimTypes.NameIdentifier, user.Id.ToString()),
 | 
						|
        };
 | 
						|
 | 
						|
        var roles = await _userManager.GetRolesAsync(user);
 | 
						|
        claims.AddRange(roles.Select(role => new Claim(Role, role)));
 | 
						|
 | 
						|
        var credentials = new SigningCredentials(_key, SecurityAlgorithms.HmacSha512Signature);
 | 
						|
        var tokenDescriptor = new SecurityTokenDescriptor()
 | 
						|
        {
 | 
						|
            Subject = new ClaimsIdentity(claims),
 | 
						|
            Expires = DateTime.UtcNow.AddDays(10),
 | 
						|
            SigningCredentials = credentials
 | 
						|
        };
 | 
						|
 | 
						|
        var tokenHandler = new JwtSecurityTokenHandler();
 | 
						|
        var token = tokenHandler.CreateToken(tokenDescriptor);
 | 
						|
 | 
						|
        return tokenHandler.WriteToken(token);
 | 
						|
    }
 | 
						|
 | 
						|
    public async Task<string> CreateRefreshToken(AppUser user)
 | 
						|
    {
 | 
						|
        await _userManager.RemoveAuthenticationTokenAsync(user, TokenOptions.DefaultProvider, RefreshTokenName);
 | 
						|
        var refreshToken = await _userManager.GenerateUserTokenAsync(user, TokenOptions.DefaultProvider, RefreshTokenName);
 | 
						|
        await _userManager.SetAuthenticationTokenAsync(user, TokenOptions.DefaultProvider, RefreshTokenName, refreshToken);
 | 
						|
        return refreshToken;
 | 
						|
    }
 | 
						|
 | 
						|
    public async Task<TokenRequestDto?> ValidateRefreshToken(TokenRequestDto request)
 | 
						|
    {
 | 
						|
        try
 | 
						|
        {
 | 
						|
            var tokenHandler = new JwtSecurityTokenHandler();
 | 
						|
            var tokenContent = tokenHandler.ReadJwtToken(request.Token);
 | 
						|
            var username = tokenContent.Claims.FirstOrDefault(q => q.Type == JwtRegisteredClaimNames.Name)?.Value;
 | 
						|
            if (string.IsNullOrEmpty(username))
 | 
						|
            {
 | 
						|
                _logger.LogDebug("[RefreshToken] failed to validate due to not finding user in RefreshToken");
 | 
						|
                return null;
 | 
						|
            }
 | 
						|
            var user = await _userManager.FindByNameAsync(username);
 | 
						|
            if (user == null)
 | 
						|
            {
 | 
						|
                _logger.LogDebug("[RefreshToken] failed to validate due to not finding user in DB");
 | 
						|
                return null;
 | 
						|
            }
 | 
						|
 | 
						|
            var validated = await _userManager.VerifyUserTokenAsync(user, TokenOptions.DefaultProvider, RefreshTokenName, request.RefreshToken);
 | 
						|
            if (!validated && tokenContent.ValidTo <= DateTime.UtcNow.Add(TimeSpan.FromHours(1)))
 | 
						|
            {
 | 
						|
                _logger.LogDebug("[RefreshToken] failed to validate due to invalid refresh token");
 | 
						|
                return null;
 | 
						|
            }
 | 
						|
 | 
						|
            try
 | 
						|
            {
 | 
						|
                user.UpdateLastActive();
 | 
						|
                _unitOfWork.UserRepository.Update(user);
 | 
						|
                await _unitOfWork.CommitAsync();
 | 
						|
            }
 | 
						|
            catch (Exception ex)
 | 
						|
            {
 | 
						|
                _logger.LogError(ex, "There was an error updating last active for the user");
 | 
						|
            }
 | 
						|
 | 
						|
            return new TokenRequestDto()
 | 
						|
            {
 | 
						|
                Token = await CreateToken(user),
 | 
						|
                RefreshToken = await CreateRefreshToken(user)
 | 
						|
            };
 | 
						|
        } catch (SecurityTokenExpiredException ex)
 | 
						|
        {
 | 
						|
            // Handle expired token
 | 
						|
            _logger.LogError(ex, "Failed to validate refresh token");
 | 
						|
            return null;
 | 
						|
        }
 | 
						|
        catch (Exception ex)
 | 
						|
        {
 | 
						|
            // Handle other exceptions
 | 
						|
            _logger.LogError(ex, "Failed to validate refresh token");
 | 
						|
            return null;
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    public async Task<string?> GetJwtFromUser(AppUser user)
 | 
						|
    {
 | 
						|
        var userClaims = await _userManager.GetClaimsAsync(user);
 | 
						|
        var jwtClaim = userClaims.FirstOrDefault(claim => claim.Type == "jwt");
 | 
						|
        return jwtClaim?.Value;
 | 
						|
    }
 | 
						|
 | 
						|
    public static bool HasTokenExpired(string? token)
 | 
						|
    {
 | 
						|
        if (string.IsNullOrEmpty(token)) return true;
 | 
						|
 | 
						|
        var tokenHandler = new JwtSecurityTokenHandler();
 | 
						|
        var tokenContent = tokenHandler.ReadJwtToken(token);
 | 
						|
        var validToUtc = tokenContent.ValidTo.ToUniversalTime();
 | 
						|
 | 
						|
        return validToUtc < DateTime.UtcNow;
 | 
						|
    }
 | 
						|
}
 |