namespace backend.Services; using backend.Entities; using backend.Helpers; using backend.Models; using Microsoft.Extensions.Options; using Microsoft.IdentityModel.Tokens; using System.IdentityModel.Tokens.Jwt; using System.Security.Claims; using System.Text; public interface IUserService { AuthenticateResponse Authenticate(AuthenticateRequest model); User GetById(int id); } public class UserService : IUserService { // users hardcoded for simplicity, store in a db with hashed passwords in production applications private List _users = new List { new User { Id = 1, Username = "test", Password = "test" } }; private readonly AppSettings _appSettings; public UserService(IOptions appSettings) { _appSettings = appSettings.Value; } public AuthenticateResponse Authenticate(AuthenticateRequest model) { var user = _users.SingleOrDefault(x => x.Username == model.Username && x.Password == model.Password); // return null if user not found if (user == null) return null; // authentication successful so generate jwt token var token = generateJwtToken(user); return new AuthenticateResponse(user, token); } public User GetById(int id) { return _users.FirstOrDefault(x => x.Id == id); } private string generateJwtToken(User user) { // generate token that is valid for 7 days var tokenHandler = new JwtSecurityTokenHandler(); var key = Encoding.ASCII.GetBytes(_appSettings.Secret); var tokenDescriptor = new SecurityTokenDescriptor { Subject = new ClaimsIdentity(new[] { new Claim("id", user.Id.ToString()) }), Expires = DateTime.UtcNow.AddDays(7), SigningCredentials = new SigningCredentials(new SymmetricSecurityKey(key), SecurityAlgorithms.HmacSha256Signature) }; var token = tokenHandler.CreateToken(tokenDescriptor); return tokenHandler.WriteToken(token); } }