Changeset d23bf72 for Farmatiko/Startup.cs
- Timestamp:
- 11/05/20 06:57:35 (4 years ago)
- Branches:
- master
- Children:
- afc9a9a
- Parents:
- 1f4846d
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
Farmatiko/Startup.cs
r1f4846d rd23bf72 7 7 using FarmatikoData; 8 8 using Microsoft.EntityFrameworkCore; 9 using FarmatikoServices;10 9 using FarmatikoData.FarmatikoRepoInterfaces; 11 10 using FarmatikoData.FarmatikoRepo; … … 13 12 using FarmatikoServices.Services; 14 13 using Microsoft.Extensions.Logging; 14 using Microsoft.AspNetCore.Authentication.JwtBearer; 15 using Microsoft.IdentityModel.Tokens; 16 using System.Text; 17 using FarmatikoServices.Auth; 18 using FarmatikoServices.Infrastructure; 19 using System; 15 20 16 21 namespace Farmatiko … … 59 64 60 65 services.AddTransient<ILogger, Logger<ProcessJSONService>>(); 66 67 // services.AddTransient<ISystemService, SystemService>(); 68 69 70 var jwtTokenConfig = Configuration.GetSection("jwtTokenConfig").Get<JwtTokenConfig>(); 71 services.AddSingleton(jwtTokenConfig); 72 73 services.AddAuthentication(o => 74 { 75 o.DefaultAuthenticateScheme = JwtBearerDefaults.AuthenticationScheme; 76 o.DefaultChallengeScheme = JwtBearerDefaults.AuthenticationScheme; 77 o.DefaultSignInScheme = JwtBearerDefaults.AuthenticationScheme; 78 }).AddJwtBearer(x => 79 { 80 x.RequireHttpsMetadata = true; 81 x.SaveToken = true; 82 x.TokenValidationParameters = new TokenValidationParameters 83 { 84 ValidateIssuer = true, 85 ValidIssuer = jwtTokenConfig.Issuer, 86 ValidateIssuerSigningKey = true, 87 IssuerSigningKey = new SymmetricSecurityKey(Encoding.ASCII.GetBytes(jwtTokenConfig.Secret)), 88 ValidAudience = jwtTokenConfig.Audience, 89 ValidateAudience = true, 90 ValidateLifetime = true, 91 ClockSkew = TimeSpan.FromMinutes(1) 92 }; 93 }); 94 95 /*.AddJwtBearer(cfg => 96 { 97 cfg.RequireHttpsMetadata = false; 98 cfg.SaveToken = true; 99 cfg.IncludeErrorDetails = true; 100 cfg.TokenValidationParameters = new TokenValidationParameters() 101 { 102 ValidIssuer = Configuration.GetSection("TokenIssuer").Value, 103 ValidAudience = Configuration.GetSection("TokenIssuer").Value, 104 IssuerSigningKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(Configuration.GetSection("SecretKey").Value)) 105 }; 106 107 }); 108 */ 109 services.AddSingleton<IJwtAuthManager, JwtAuthManager>(); 110 services.AddHostedService<JwtRefreshTokenCache>(); 111 services.AddScoped<IAuthService, AuthService>(); 112 //If we add imgs 113 /*services.Configure<FormOptions>(o => { 114 o.ValueLengthLimit = int.MaxValue; 115 o.MultipartBodyLengthLimit = int.MaxValue; 116 o.MemoryBufferThreshold = int.MaxValue; 117 });*/ 118 61 119 } 62 120 … … 74 132 app.UseHsts(); 75 133 } 76 134 app.UseExceptionHandler("/Error"); 77 135 app.UseHttpsRedirection(); 78 136 app.UseStaticFiles(); 137 138 // if we add imgs 139 /*app.UseStaticFiles(new StaticFileOptions() 140 { 141 FileProvider = new PhysicalFileProvider(Path.Combine(Directory.GetCurrentDirectory(), @"wwwroot")), 142 RequestPath = new PathString("/wwwroot") 143 });*/ 144 79 145 if (!env.IsDevelopment()) 80 146 { … … 84 150 app.UseRouting(); 85 151 152 app.UseAuthentication(); 153 app.UseAuthorization(); 154 86 155 app.UseCors(MyAllowSpecificOrigins); 87 156 … … 90 159 endpoints.MapControllerRoute( 91 160 name: "default", 92 pattern: " {controller}/{action=Index}/{id?}");161 pattern: "api/{controller}/{action=Index}/{id?}"); 93 162 }); 94 163
Note:
See TracChangeset
for help on using the changeset viewer.