forked from shawndube/dot-net-st-pete-api
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathStartup.cs
133 lines (112 loc) · 5.19 KB
/
Startup.cs
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
using System;
using System.Text;
using dot_net_st_pete_api.Jwt;
using dot_net_st_pete_api.Models;
using dot_net_st_pete_api.Repository;
using Microsoft.AspNetCore.Authentication.JwtBearer;
using Microsoft.AspNetCore.Authorization;
using Microsoft.AspNetCore.Builder;
using Microsoft.AspNetCore.Hosting;
using Microsoft.AspNetCore.Mvc.Authorization;
using Microsoft.Extensions.Configuration;
using Microsoft.Extensions.DependencyInjection;
using Microsoft.Extensions.Logging;
using Microsoft.IdentityModel.Tokens;
namespace dot_net_st_pete_api
{
public class Startup
{
// secret key used to generate jwt - normally stored in environment vars
private const string SECRET_KEY = "N8P2b9z??jI'y8rNxLA8e3lzGU37dF";
private readonly SymmetricSecurityKey securityKey = new SymmetricSecurityKey(Encoding.ASCII.GetBytes(SECRET_KEY));
public Startup(IHostingEnvironment env)
{
var builder = new ConfigurationBuilder()
.SetBasePath(env.ContentRootPath)
.AddJsonFile("appsettings.json", optional: true, reloadOnChange: true)
.AddJsonFile($"appsettings.{env.EnvironmentName}.json", optional: true)
.AddEnvironmentVariables();
Configuration = builder.Build();
}
public IConfigurationRoot Configuration { get; }
// This method gets called by the runtime. Use this method to add services to the container.
public void ConfigureServices(IServiceCollection services)
{
// add cors
services.AddCors();
// Add framework services.
services.AddOptions();
// access Repository using DI Model
services.AddTransient<IJournalRepository, JournalRepository>();
services.AddTransient<IUserRepository, UserRepository>();
// lock down all routes
services.AddMvc(config =>
{
var policy = new AuthorizationPolicyBuilder()
.RequireAuthenticatedUser()
.Build();
config.Filters.Add(new AuthorizeFilter(policy));
});
services.Configure<MongoSettings>(options =>
{
options.ConnectionString = Configuration.GetSection("MongoConnection:ConnectionString").Value;
options.Database = Configuration.GetSection("MongoConnection:Database").Value;
});
var jwtAppSettingOptions = Configuration.GetSection(nameof(JwtIssuerOptions));
// Configure jwt issuer options
services.Configure<JwtIssuerOptions>(options =>
{
options.Issuer = jwtAppSettingOptions[nameof(JwtIssuerOptions.Issuer)];
options.Audience = jwtAppSettingOptions[nameof(JwtIssuerOptions.Audience)];
options.SigningCredentials = new SigningCredentials(securityKey, SecurityAlgorithms.HmacSha256);
});
}
// This method gets called by the runtime. Use this method to configure the HTTP request pipeline.
public void Configure(IApplicationBuilder app, IHostingEnvironment env, ILoggerFactory loggerFactory)
{
loggerFactory.AddConsole(Configuration.GetSection("Logging"));
loggerFactory.AddDebug();
// Shows UseCors with CorsPolicyBuilder.
app.UseCors(builder =>
builder.AllowAnyOrigin().AllowAnyMethod().AllowAnyHeader());
// todo: explore middleware approach
// app.UseSimpleTokenProvider(new JwtIssuer
// {
// Path = "/login",
// Audience = "ExampleAudience",
// Issuer = "ExampleIssuer",
// SigningCredentials = "signingCredentials",
// IdentityResolver = GetIdentity
// });
app.UseJwtBearerAuthentication(new JwtBearerOptions
{
AutomaticAuthenticate = true,
AutomaticChallenge = true,
TokenValidationParameters = buildTokenValidationParameters(),
// AuthenticationScheme = JwtBearerDefaults.AuthenticationScheme,
});
app.UseMvc();
}
private TokenValidationParameters buildTokenValidationParameters()
{
var jwtAppSettingOptions = Configuration.GetSection(nameof(JwtIssuerOptions));
return new TokenValidationParameters
{
// validate the keys
ValidateIssuerSigningKey = true,
IssuerSigningKey = securityKey,
// validate the token issuer (iss)
ValidateIssuer = true,
ValidIssuer = jwtAppSettingOptions[nameof(JwtIssuerOptions.Issuer)],
// validate the token audience (aud)
ValidateAudience = true,
ValidAudience = jwtAppSettingOptions[nameof(JwtIssuerOptions.Audience)],
// validate the token is not expired (exp)
RequireExpirationTime = true,
ValidateLifetime = true,
// specify any clock drift allowance - we set to zero
ClockSkew = TimeSpan.Zero
};
}
}
}