mirror of
https://github.com/azaion/admin.git
synced 2026-04-22 10:56:34 +00:00
structure app by rest api standards
add getusers tidy up BusinessException
This commit is contained in:
+23
-13
@@ -9,8 +9,10 @@ using FluentValidation;
|
||||
using FluentValidation.AspNetCore;
|
||||
using Microsoft.AspNetCore.Authentication.JwtBearer;
|
||||
using Microsoft.AspNetCore.Authorization;
|
||||
using Microsoft.AspNetCore.Mvc;
|
||||
using Microsoft.IdentityModel.Tokens;
|
||||
using Microsoft.OpenApi.Models;
|
||||
using Swashbuckle.AspNetCore.Swagger;
|
||||
|
||||
var builder = WebApplication.CreateBuilder(args);
|
||||
builder.WebHost.ConfigureKestrel(o => o.Limits.MaxRequestBodySize = 209715200); //increase upload limit up to 200mb
|
||||
@@ -97,25 +99,28 @@ app.MapPost("/login",
|
||||
return Results.Ok(new { Token = authService.CreateToken(user)});
|
||||
});
|
||||
|
||||
app.MapPost("/register-user",
|
||||
app.MapPost("/users",
|
||||
async (RegisterUserRequest registerUserRequest, IUserService userService, CancellationToken cancellationToken)
|
||||
=> await userService.RegisterUser(registerUserRequest, cancellationToken))
|
||||
.RequireAuthorization(apiAdminPolicy);
|
||||
.RequireAuthorization(apiAdminPolicy)
|
||||
.WithDescription("Creates a new user");
|
||||
|
||||
app.MapGet("/users",
|
||||
async (string searchEmail, RoleEnum? searchRole, IUserService userService, CancellationToken cancellationToken)
|
||||
=> await userService.GetUsers(searchEmail, searchRole, cancellationToken))
|
||||
.RequireAuthorization(apiAdminPolicy)
|
||||
.WithDescription("Lists all users");
|
||||
|
||||
app.MapPost("/resources",
|
||||
async (ResourceEnum resourceEnum, IFormFile data, IResourcesService resourceService, CancellationToken cancellationToken)
|
||||
=> await resourceService.SaveResource(resourceEnum, data, cancellationToken))
|
||||
.Accepts<IFormFile>("multipart/form-data")
|
||||
.RequireAuthorization(apiAdminPolicy)
|
||||
.DisableAntiforgery();
|
||||
.DisableAntiforgery()
|
||||
.WithDescription("Uploads / Replace existing resource by type");
|
||||
|
||||
app.MapPost("/resources/reset-hardware",
|
||||
async (string email, IUserService userService, CancellationToken cancellationToken)
|
||||
=> await userService.UpdateHardwareId(email, null!, cancellationToken));
|
||||
|
||||
|
||||
app.MapPost("/resources/get",
|
||||
async (GetResourceRequest request, IAuthService authService, IUserService userService, IResourcesService resourcesService, CancellationToken cancellationToken) =>
|
||||
app.MapGet("/resources",
|
||||
async ([FromBody]GetResourceRequest request, IAuthService authService, IUserService userService, IResourcesService resourcesService, CancellationToken cancellationToken) =>
|
||||
{
|
||||
var user = authService.CurrentUser;
|
||||
if (user == null)
|
||||
@@ -128,13 +133,18 @@ app.MapPost("/resources/get",
|
||||
}
|
||||
|
||||
if (user.HardwareId != request.HardwareId)
|
||||
throw new BusinessException(ExceptionEnum.HardwareIdMismatch, "Hardware mismatch! You are not authorized to access this resource from this hardware.");
|
||||
throw new BusinessException(ExceptionEnum.HardwareIdMismatch);
|
||||
|
||||
var ms = new MemoryStream();
|
||||
var key = Security.MakeEncryptionKey(user.Email, request.Password);
|
||||
var key = Security.MakeEncryptionKey(user.Email, request.Password, request.HardwareId);
|
||||
var filename = await resourcesService.GetEncryptedResource(request.ResourceEnum, key, ms, cancellationToken);
|
||||
|
||||
return Results.File(ms, "application/octet-stream", filename);
|
||||
}).RequireAuthorization();
|
||||
}).RequireAuthorization()
|
||||
.WithDescription("Gets encrypted by users Password and HardwareId resources ");
|
||||
|
||||
app.MapPut("/resources/reset-hardware",
|
||||
async (string email, IUserService userService, CancellationToken cancellationToken)
|
||||
=> await userService.UpdateHardwareId(email, null!, cancellationToken));
|
||||
|
||||
app.Run();
|
||||
|
||||
Reference in New Issue
Block a user