|
17 | 17 |
|
18 | 18 | namespace AuthWebApplication.Controllers
|
19 | 19 | {
|
20 | | - [Authorize] |
| 20 | + //[Authorize] |
21 | 21 | [Route("api/[controller]")]
|
22 | 22 | [ApiController]
|
23 | 23 | public class AuthorizeTokenController : ControllerBase
|
24 | 24 | {
|
25 | 25 | private RedisService redisService;
|
26 | 26 | private readonly ILogger<AuthorizeTokenController> logger;
|
27 | 27 |
|
28 | | - public AuthorizeTokenController(ILogger<AuthorizeTokenController> logger,RedisService redisService) |
| 28 | + public AuthorizeTokenController(ILogger<AuthorizeTokenController> logger,RedisService redisService) |
29 | 29 | {
|
30 | 30 | this.logger = logger;
|
31 | 31 | this.redisService = redisService;
|
32 | 32 | }
|
33 | 33 |
|
34 | | - public async Task<IActionResult> Get(string resource) |
35 | | - { |
36 | | - var userName = this.User.Identity.Name; |
37 | | - var claimsIdentity = this.User.Identities.First() as ClaimsIdentity; |
38 | | - var claim = claimsIdentity.Claims.First(x => x.Type == JwtRegisteredClaimNames.Jti); |
39 | | - var jti = claim.Value; |
| 34 | + // public async Task<IActionResult> Get(string resource) |
| 35 | + // { |
| 36 | + // var userName = this.User.Identity.Name; |
| 37 | + // var claimsIdentity = this.User.Identities.First() as ClaimsIdentity; |
| 38 | + // var claim = claimsIdentity.Claims.First(x => x.Type == JwtRegisteredClaimNames.Jti); |
| 39 | + // var jti = claim.Value; |
| 40 | + |
| 41 | + // var inValid = string.IsNullOrWhiteSpace(userName) || string.IsNullOrWhiteSpace(jti) || string.IsNullOrWhiteSpace(resource); |
| 42 | + // if (inValid) |
| 43 | + // { |
| 44 | + // return Unauthorized("Invalid data"); |
| 45 | + // } |
| 46 | + |
| 47 | + // var redisValue = await redisService.Get(userName); |
| 48 | + // if (string.IsNullOrWhiteSpace(redisValue)) |
| 49 | + // { |
| 50 | + // return Unauthorized(userName); |
| 51 | + // } |
| 52 | + |
| 53 | + // var dbValue = (dynamic)JsonConvert.DeserializeObject(redisValue); |
| 54 | + // var jtiArray = ((dbValue as dynamic).jtis as dynamic) as JArray; |
| 55 | + // var list = jtiArray.ToObject<List<string>>(); |
| 56 | + // var validJti = list.Exists(x => x == jti); |
| 57 | + |
| 58 | + // if (!validJti) |
| 59 | + // { |
| 60 | + // return Unauthorized(jti); |
| 61 | + // } |
| 62 | + |
| 63 | + // var permissionViewModels = JsonConvert.DeserializeObject<List<ApplicationPermissionViewModel>>( |
| 64 | + // ((dbValue as dynamic).resources as JValue).ToString()); |
| 65 | + // var permitted = permissionViewModels.Exists(x => x.Name == resource && Convert.ToBoolean(x.IsAllowed)); |
40 | 66 |
|
41 | | - var inValid = string.IsNullOrWhiteSpace(userName) || string.IsNullOrWhiteSpace(jti) || string.IsNullOrWhiteSpace(resource); |
| 67 | + // if (!permitted) |
| 68 | + // { |
| 69 | + // return Forbid("Bearer"); |
| 70 | + // } |
| 71 | + |
| 72 | + // return Ok(); |
| 73 | + // } |
| 74 | + |
| 75 | + public async Task<IActionResult> Get(string user, string resource, string jti) |
| 76 | + { |
| 77 | + var inValid = string.IsNullOrWhiteSpace(user) || string.IsNullOrWhiteSpace(jti) || string.IsNullOrWhiteSpace(resource); |
42 | 78 | if (inValid)
|
43 | 79 | {
|
44 | | - return Unauthorized("Invalid data"); |
| 80 | + return Unauthorized("Invalid data. User or resource or jti cannot be empty"); |
45 | 81 | }
|
46 | 82 |
|
47 | | - var redisValue = await redisService.Get(userName); |
| 83 | + var redisValue = await redisService.Get(user); |
48 | 84 | if (string.IsNullOrWhiteSpace(redisValue))
|
49 | 85 | {
|
50 | | - return Unauthorized(userName); |
| 86 | + return Unauthorized(user); |
51 | 87 | }
|
52 | 88 |
|
53 | | - var dbValue = (dynamic)JsonConvert.DeserializeObject(redisValue); |
54 | | - var jtiArray = ((dbValue as dynamic).jtis as dynamic) as JArray; |
55 | | - var list = jtiArray.ToObject<List<string>>(); |
56 | | - var validJti = list.Exists(x => x == jti); |
| 89 | + var dbValue = JsonConvert.DeserializeObject<AuthorizationDataModel>(redisValue); |
57 | 90 |
|
58 | | - if (!validJti) |
| 91 | + if (dbValue==null) |
59 | 92 | {
|
60 | | - return Unauthorized(jti); |
| 93 | + return Unauthorized("Invalid cache. Please logout and do a fresh login"); |
61 | 94 | }
|
62 | 95 |
|
63 | | - var permissionViewModels = JsonConvert.DeserializeObject<List<ApplicationPermissionViewModel>>( |
64 | | - ((dbValue as dynamic).resources as JValue).ToString()); |
65 | | - var permitted = permissionViewModels.Exists(x => x.Name == resource && Convert.ToBoolean(x.IsAllowed)); |
| 96 | + var validJti = dbValue.jtis.Exists(x => x == jti); |
66 | 97 |
|
67 | | - if (!permitted) |
| 98 | + if (!validJti) |
68 | 99 | {
|
69 | | - return Forbid("Bearer"); |
| 100 | + return Unauthorized(jti); |
70 | 101 | }
|
71 | 102 |
|
| 103 | + // var permissionViewModels = JsonConvert.DeserializeObject<List<ApplicationPermissionViewModel>>( |
| 104 | + // ((dbValue as dynamic).resources as JValue).ToString()); |
| 105 | + // var permitted = permissionViewModels.Exists(x => x.Name == resource && Convert.ToBoolean(x.IsAllowed)); |
| 106 | + |
| 107 | + // if (!permitted) |
| 108 | + // { |
| 109 | + // return Forbid("Bearer"); |
| 110 | + // } |
| 111 | + |
72 | 112 | return Ok();
|
73 | 113 | }
|
| 114 | + |
| 115 | + private class AuthorizationDataModel |
| 116 | + { |
| 117 | + public List<string> jtis { get; set; } |
| 118 | + |
| 119 | + public List<AuthorizationResourceModel> resources { get; set; } |
| 120 | + } |
| 121 | + |
| 122 | + private class AuthorizationResourceModel |
| 123 | + { |
| 124 | + public string Name { get; set; } |
| 125 | + |
| 126 | + public string IsAllowed { get; set; } |
| 127 | + |
| 128 | + public string IsDisabled { get; set; } |
| 129 | + } |
74 | 130 | }
|
75 | 131 | }
|
0 commit comments