Autofac into ASP.NET WEPAPI 2.2 with Asp.Identity Tables

本文关键字:with Asp Identity Tables WEPAPI into ASP NET Autofac | 更新日期: 2023-09-27 18:33:02

我基于本教程编写了两个非常受支持的 WebAPI。 现在的问题是,我还没有需要 IoC/DI,但我正在编写一个 Web API 并尝试从头开始合并它。

我对存储库/服务/工作单元模式有一个很好的处理,但是在移植所有标识部分时出现错误。 具体而言,使用 OAuthConfiguration 类启动时,如下所示:

错误

None of the constructors found with 'Autofac.Core.Activators.Reflection.DefaultConstructorFinder' on type 'Vender.Providers.AuthorizationServerProvider' can be invoked with the available services and parameters:
Cannot resolve parameter 'Vender.Services.ApplicationClientService appClientsService' of constructor 'Void .ctor(Vender.Services.ApplicationClientService, Vender.Data.Context.ApplicationUserManager)'.

异常方法(当它尝试解析两个提供程序时,它会给出上述错误(

    public static void ConfigTokenGeneration(IAppBuilder app, IContainer container)
    {
        app.CreatePerOwinContext(ApplicationDbContext.Create);

        var oAuthServerOptions = new OAuthAuthorizationServerOptions()
        {
            AllowInsecureHttp = ApiSettings.AllowInsecureHttp,
            TokenEndpointPath = new PathString("/token"),
            AccessTokenExpireTimeSpan = TimeSpan.FromMinutes(ApiSettings.AccessTokenValidTime),
            Provider = container.Resolve<IOAuthAuthorizationServerProvider>(),
            AccessTokenFormat = new JwtFormatProvider(ApiSettings.ApiAddress),
            RefreshTokenProvider = container.Resolve<IAuthenticationTokenProvider>()
        };
        app.UseOAuthAuthorizationServer(oAuthServerOptions);
    }

类例外

public class AuthorizationServerProvider : OAuthAuthorizationServerProvider
{
    private readonly ApplicationClientService _appClientsService;
    private readonly ApplicationUserManager _userManager;
    public AuthorizationServerProvider(ApplicationClientService appClientsService,
                                       ApplicationUserManager userManager)
    {
        _appClientsService = appClientsService;
        _userManager = userManager;
    }
    public override Task ValidateClientAuthentication(OAuthValidateClientAuthenticationContext context)
    {
        string clientId;
        string clientSecret;
        if (!context.TryGetBasicCredentials(out clientId, out clientSecret))
        {
            context.TryGetFormCredentials(out clientId, out clientSecret);
        }
        if (context.ClientId == null)
        {
            //Remove the comments from the below line context.SetError, and invalidate context 
            //if you want to force sending clientId/secrets once obtain access tokens. 
            context.Validated();
            context.SetError("invalid_clientId", "ClientId should be sent.");
            return Task.FromResult<object>(null);
        }
        var client = _appClientsService.FindApplicationClient(context.ClientId);

        if (client == null)
        {
            context.SetError("invalid_clientId", $"Client '{context.ClientId}' is not registered in the system.");
            return Task.FromResult<object>(null);
        }
        if (client.ApplicationType == ApplicationTypes.NativeConfidential)
        {
            if (string.IsNullOrWhiteSpace(clientSecret))
            {
                context.SetError("invalid_clientId", "Client secret should be sent.");
                return Task.FromResult<object>(null);
            }
            else
            {
                if (client.Secret != Hash.FromString(clientSecret))
                {
                    context.SetError("invalid_clientId", "Client secret is invalid.");
                    return Task.FromResult<object>(null);
                }
            }
        }
        if (!client.Active)
        {
            context.SetError("invalid_clientId", "Client is inactive.");
            return Task.FromResult<object>(null);
        }
        context.OwinContext.Set<string>("as:clientAllowedOrigin", client.AllowedOrigin);
        context.OwinContext.Set<string>("as:clientRefreshTokenLifeTime", client.RefreshTokenLifeTime.ToString());
        context.Validated();
        return Task.FromResult<object>(null);
    }
    public override async Task GrantResourceOwnerCredentials(OAuthGrantResourceOwnerCredentialsContext context)
    {
        var allowedOrigin = context.OwinContext.Get<string>("as:clientAllowedOrigin") ?? "*";
        context.OwinContext.Response.Headers.Add("Access-Control-Allow-Origin", new[] { allowedOrigin });
        IDictionary<string, string> userData = new Dictionary<string, string>();
        var user = await _userManager.FindAsync(context.UserName, context.Password);
        if (user == null)
        {
            context.SetError("invalid_grant", "apiError.invalidUsernameOrPassword");
            return;
        }

        var oAuthIdentity = await user.GenerateUserIdentityAsync(_userManager, "JWT");
        var userProps = new AuthenticationProperties(userData);
        var ticket = new AuthenticationTicket(oAuthIdentity, userProps);
        context.Validated(ticket);
        /*
        //  Get userManager to test credentials against
        //
        var userManager = context.OwinContext.GetUserManager<ApplicationUserManager>();
        // find user by username first            
        ApplicationUser user = await userManager.FindByEmailAsync(context.UserName);
        if (user != null)
        {
            var validCredentials = await userManager.FindAsync(context.UserName, context.Password);
            if (await userManager.IsLockedOutAsync(user.Id))
            {
                context.SetError("invalid_grant", "This account has been locked out.  Please come back later.");
                return;
            }
            else if (await userManager.GetLockoutEnabledAsync(user.Id) && validCredentials == null)
            {
                // Record the failure which also may cause the user to be locked out
                await userManager.AccessFailedAsync(user.Id);
                string message;
                if (await userManager.IsLockedOutAsync(user.Id))
                {
                    message = "apiError.accountLockout";
                }
                else
                {
                    int accessFailedCount = await userManager.GetAccessFailedCountAsync(user.Id);
                    int attemptsLeft = Convert.ToInt32(ConfigurationManager.AppSettings["MaxFailedAccessAttemptsBeforeLockout"].ToString()) - accessFailedCount;
                    message = string.Format("apiError.lockoutAttempts{0}", attemptsLeft);
                }
                context.SetError("invalid_grant", message);
                return;
            }
            else if (validCredentials == null)
            {
                context.SetError("invalid_grant", "Invalid username or password, please try again.");
                return;
            }
            else
            {
                if (!user.EmailConfirmed)
                {
                    context.SetError("invalid_grant", "Email has not yet been confirmed.");
                    return;
                }
                user.LastLoginDateUtc = System.DateTime.UtcNow;
                user.SuccessLoginCount++;
                var loginInfo = new LoginTracker();
                loginInfo.ApplicationUser = user;
                loginInfo.LoginTimeUtc = DateTime.UtcNow;

            }
        }
        else
        {
            context.SetError("invalid_grant", "Invalid username or password, please try again.");
            return;
        }
        */
    }
    public override Task TokenEndpoint(OAuthTokenEndpointContext context)
    {
        foreach (KeyValuePair<string, string> property in context.Properties.Dictionary)
        {
            context.AdditionalResponseParameters.Add(property.Key, property.Value);
        }
        return Task.FromResult<object>(null);
    }
}

AutoFac Builder

    private static IContainer RegisterServices(ContainerBuilder builder)
    {
        builder.RegisterApiControllers(Assembly.GetExecutingAssembly());
        // EF HomeCinemaContext
        builder.RegisterType < ApplicationDbContext>()
               .As<DbContext>()
               .InstancePerRequest();
        builder.RegisterType<DbFactory>()
            .As<IDbFactory>()
            .InstancePerRequest();
        builder.RegisterType<UnitOfWork>()
            .As<IUnitOfWork>()
            .InstancePerRequest();
        builder.RegisterGeneric(typeof(EntityBaseRepository<>))
               .As(typeof(IEntityBaseRepository<>))
               .InstancePerRequest();
        builder.RegisterType<ApplicationUserManager>()
           .SingleInstance();

        builder.RegisterType<AddressService>()
            .As<IAddressService>()
            .InstancePerRequest();
        builder.RegisterType<ApplicationClientService>()
            .As<IApplicationClientService>()
            .InstancePerRequest();
        builder.RegisterType<RefreshTokenService>()
            .As<IRefreshTokenService>()
            .InstancePerRequest();
        builder.RegisterType<AuthorizationServerProvider>()
            .AsImplementedInterfaces<IOAuthAuthorizationServerProvider, ConcreteReflectionActivatorData>().SingleInstance();
        builder.RegisterType<RefreshTokenProvider>()
            .AsImplementedInterfaces<IAuthenticationTokenProvider, ConcreteReflectionActivatorData>().SingleInstance();


        Container = builder.Build();
        return Container;
    }

应用管理器类

public class ApplicationUserManager : UserManager<ApplicationUser>
{
    public ApplicationUserManager(ApplicationDbContext identityContext)
        : base(new UserStore<ApplicationUser>(identityContext))
    {
    }
    public ApplicationUserManager(IUserStore<ApplicationUser> store, IDataProtectionProvider dataProtectionProvider)
        : base(store)
    {
        UserValidator = new UserValidator<ApplicationUser>(this)
        {
            AllowOnlyAlphanumericUserNames = false,
            RequireUniqueEmail = true
        };
        // Configure validation logic for passwords
        PasswordValidator = new PasswordValidator
        {
            RequiredLength = 6,
            RequireNonLetterOrDigit = false,
            RequireDigit = true,
            RequireLowercase = true,
            RequireUppercase = true,
        };
        // Configure user lockout defaults
        UserLockoutEnabledByDefault = false;
        //DefaultAccountLockoutTimeSpan = TimeSpan.FromMinutes(5);
        //MaxFailedAccessAttemptsBeforeLockout = 5;
        // Register two factor authentication providers. This application uses Phone and Emails as a step of receiving a code for verifying the user
        // You can write your own provider and plug it in here.
        RegisterTwoFactorProvider("Phone Code", new PhoneNumberTokenProvider<ApplicationUser>
        {
            MessageFormat = "Your security code is {0}"
        });
        RegisterTwoFactorProvider("Email Code", new EmailTokenProvider<ApplicationUser>
        {
            Subject = "Security Code",
            BodyFormat = "Your security code is {0}"
        });

        UserTokenProvider = new DataProtectorTokenProvider<ApplicationUser>(dataProtectionProvider.Create("ASP.NET Identity"));
    }
}

应用程序客户端服务类

public class ApplicationClientService : IApplicationClientService
{
    private readonly IEntityBaseRepository<ApplicationClient> _appClientRepository;
    private readonly IUnitOfWork _unitOfWork;
    public ApplicationClientService(IEntityBaseRepository<ApplicationClient> appClientRepository,
                          IUnitOfWork unitOfWork)
    {
        _appClientRepository = appClientRepository;
        _unitOfWork = unitOfWork;
    }
    public async Task<bool> CreateApplicationClientAsync(ApplicationClient newToken)
    {
        _appClientRepository.Add(newToken);
        return await _unitOfWork.CommitAsync() > 0;
    }
    public Task<ApplicationClient> FindApplicationClientAsync(string clientId)
    {
        var refreshToken = _appClientRepository.GetAll().FirstOrDefault(x => x.ClientId == clientId);
        return Task.FromResult(refreshToken);
    }
    public ApplicationClient FindApplicationClient(string clientId)
    {
        var refreshToken = _appClientRepository.GetAll().FirstOrDefault(x => x.ClientId == clientId);
        return refreshToken;
    }
}

应用程序客户端服务接口

public interface IApplicationClientService
{
    Task<bool> CreateApplicationClientAsync(ApplicationClient newToken);
    ApplicationClient FindApplicationClient(string clientId);
}

现在我已经用谷歌搜索到我的智慧结束了,没有找到任何特别有用的东西,我想知道我需要在这里做什么来修复我的接口/类,以便在 oAuthServerOptions 实例化时可以解决它们。

Autofac into ASP.NET WEPAPI 2.2 with Asp.Identity Tables

我解决了问题将此实现用于 AutoFac 生成器,您应该创建所有单个实例,因为请求前依赖项错误

        var builder = new ContainerBuilder();
        var config = GlobalConfiguration.Configuration;
        builder.RegisterApiControllers(Assembly.GetExecutingAssembly());
        builder.RegisterType<UnitOfWork>().As<IUnitOfWork>().SingleInstance();
        builder.RegisterType<DbFactory>().As<IDbFactory>().SingleInstance();
        builder.RegisterType<ApplicationDbContext>().AsSelf().SingleInstance();
       // rest of code as singleInstance 
        builder.Register<IdentityFactoryOptions<ApplicationUserManager>>(c => new IdentityFactoryOptions<ApplicationUserManager>() { DataProtectionProvider = new DpapiDataProtectionProvider("Elhag.WebAPI") });
        builder.RegisterType<ApplicationUserManager>().AsSelf().SingleInstance();
        builder.Register(c=>new AuthorizationServerProvider(c.Resolve<ApplicationUserManager>())).AsImplementedInterfaces().SingleInstance();
        builder.Register(c => new UserStore<ApplictionUser>(c.Resolve<ApplicationDbContext>())).AsImplementedInterfaces().SingleInstance();
        builder.Register(c => HttpContext.Current.GetOwinContext().Authentication).As<IAuthenticationManager>();
        IContainer container = builder.Build();
        config.DependencyResolver = new AutofacWebApiDependencyResolver(container);
       return container;

你可以解决你需要的所有依赖关系,但不要直接根据Autofac网站使用容器,你应该使用容器lifeTimeScope,所以我将使用容器。BeginLifetimeScope((.解决<您的类型>((;

var oAuthServerOptions = new OAuthAuthorizationServerOptions()
    {
        AllowInsecureHttp = ApiSettings.AllowInsecureHttp,
        TokenEndpointPath = new PathString("/token"),
        AccessTokenExpireTimeSpan = TimeSpan.FromMinutes(ApiSettings.AccessTokenValidTime),
        Provider = container.BeginLifetimeScope().Resolve<IOAuthAuthorizationServerProvider>(),
        AccessTokenFormat = new JwtFormatProvider(ApiSettings.ApiAddress),
        RefreshTokenProvider = container.BeginLifetimeScope().Resolve<IAuthenticationTokenProvider>()
    };

我测试并工作正常...希望对你有帮助