Add CORS config and auth with JWT

This commit is contained in:
2026-03-02 22:26:50 +02:00
parent 154b9b66ce
commit 2beeadd42c
17 changed files with 307 additions and 23 deletions

View File

@@ -1,4 +1,5 @@
using System.Net; using System.Net;
using System.Net.Http.Headers;
using System.Net.Http.Json; using System.Net.Http.Json;
using System.Text.Json; using System.Text.Json;
using Microsoft.AspNetCore.Hosting; using Microsoft.AspNetCore.Hosting;
@@ -37,6 +38,32 @@ public class ApiEndpointsTests(ApiTestFactory factory) : IClassFixture<ApiTestFa
[Fact] [Fact]
public async Task OpenHours_Crud_Works() public async Task OpenHours_Crud_Works()
{ {
var unauthorizedCreateResponse = await _client.PostAsJsonAsync("/lok/open-hours", new
{
id = 0,
name = "unauthorized",
version = DateTime.UtcNow.ToString("O"),
paragraph1 = "p1",
paragraph2 = "p2",
paragraph3 = "p3",
paragraph4 = "p4",
kitchenNotice = "k1"
});
Assert.Equal(HttpStatusCode.Unauthorized, unauthorizedCreateResponse.StatusCode);
var tokenResponse = await _client.PostAsJsonAsync("/auth/token", new
{
email = "admin@klapi.local",
password = "changeme"
});
Assert.Equal(HttpStatusCode.OK, tokenResponse.StatusCode);
var auth = await tokenResponse.Content.ReadFromJsonAsync<AuthTokenDto>();
Assert.NotNull(auth);
Assert.False(string.IsNullOrWhiteSpace(auth.AccessToken));
_client.DefaultRequestHeaders.Authorization = new AuthenticationHeaderValue("Bearer", auth.AccessToken);
var createPayload = new var createPayload = new
{ {
id = 0, id = 0,
@@ -189,3 +216,14 @@ public class LokOpenHoursDto
public string KitchenNotice { get; set; } = string.Empty; public string KitchenNotice { get; set; } = string.Empty;
} }
public class AuthTokenDto
{
public string AccessToken { get; set; } = string.Empty;
public string Email { get; set; } = string.Empty;
public string TokenType { get; set; } = string.Empty;
public int ExpiresIn { get; set; }
}

View File

@@ -7,6 +7,7 @@
</PropertyGroup> </PropertyGroup>
<ItemGroup> <ItemGroup>
<PackageReference Include="Microsoft.AspNetCore.Authentication.JwtBearer" Version="10.0.0" />
<PackageReference Include="Microsoft.AspNetCore.OpenApi" Version="10.0.0" /> <PackageReference Include="Microsoft.AspNetCore.OpenApi" Version="10.0.0" />
<PackageReference Include="Microsoft.Data.Sqlite" Version="10.0.0" /> <PackageReference Include="Microsoft.Data.Sqlite" Version="10.0.0" />
</ItemGroup> </ItemGroup>

View File

@@ -0,0 +1,77 @@
using System.IdentityModel.Tokens.Jwt;
using System.Security.Claims;
using System.Text;
using Microsoft.Extensions.Options;
using Microsoft.IdentityModel.Tokens;
public record AuthTokenRequest(string Email, string Password);
public class AuthUser
{
public string Email { get; set; } = string.Empty;
public string Password { get; set; } = string.Empty;
}
public class AuthOptions
{
public string Issuer { get; set; } = "klapi-api";
public string Audience { get; set; } = "klapi-ui";
public string SigningKey { get; set; } = string.Empty;
public List<string> AllowedOrigins { get; set; } = [];
public List<AuthUser> Users { get; set; } = [];
}
public static class AuthEndpoints
{
public static void MapAuthEndpoints(WebApplication app)
{
app.MapPost("/auth/token", (
HttpContext httpContext,
IOptions<AuthOptions> authOptions,
AuthTokenRequest request) =>
{
if (string.IsNullOrWhiteSpace(request.Email) || string.IsNullOrWhiteSpace(request.Password))
{
return Results.BadRequest(new { Message = "Email and password are required." });
}
var options = authOptions.Value;
var user = options.Users.FirstOrDefault(item =>
string.Equals(item.Email, request.Email.Trim(), StringComparison.OrdinalIgnoreCase));
if (user is null || !string.Equals(user.Password, request.Password, StringComparison.Ordinal))
{
return Results.Unauthorized();
}
var key = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(options.SigningKey));
var credentials = new SigningCredentials(key, SecurityAlgorithms.HmacSha256);
var claims = new List<Claim>
{
new(JwtRegisteredClaimNames.Sub, user.Email),
new(JwtRegisteredClaimNames.Email, user.Email),
new(ClaimTypes.Name, user.Email),
new("scope", "openhours:write")
};
var token = new JwtSecurityToken(
issuer: options.Issuer,
audience: options.Audience,
claims: claims,
expires: DateTime.UtcNow.AddHours(12),
signingCredentials: credentials);
var tokenValue = new JwtSecurityTokenHandler().WriteToken(token);
return Results.Ok(new
{
AccessToken = tokenValue,
Email = user.Email,
TokenType = "Bearer",
ExpiresIn = 43200
});
})
.RequireCors("FrontendWriteCors")
.WithName("CreateAuthToken");
}
}

View File

@@ -32,6 +32,8 @@ public static class LokEndpoints
httpContext.Response.Headers.Location = "/lok/open-hours"; httpContext.Response.Headers.Location = "/lok/open-hours";
await httpContext.Response.WriteAsJsonAsync(createdOpenHours); await httpContext.Response.WriteAsJsonAsync(createdOpenHours);
}) })
.RequireAuthorization("OpenHoursWrite")
.RequireCors("FrontendWriteCors")
.WithName("CreateLokOpenHours"); .WithName("CreateLokOpenHours");
app.MapGet("/lok/open-hours", async (HttpContext httpContext) => app.MapGet("/lok/open-hours", async (HttpContext httpContext) =>
@@ -51,6 +53,7 @@ public static class LokEndpoints
await httpContext.Response.WriteAsJsonAsync(openHours); await httpContext.Response.WriteAsJsonAsync(openHours);
}) })
.RequireCors("PublicReadCors")
.WithName("GetLokOpenHours"); .WithName("GetLokOpenHours");
app.MapDelete("/lok/open-hours/{id:long}", async (HttpContext httpContext, long id) => app.MapDelete("/lok/open-hours/{id:long}", async (HttpContext httpContext, long id) =>
@@ -70,6 +73,8 @@ public static class LokEndpoints
httpContext.Response.StatusCode = StatusCodes.Status204NoContent; httpContext.Response.StatusCode = StatusCodes.Status204NoContent;
}) })
.RequireAuthorization("OpenHoursWrite")
.RequireCors("FrontendWriteCors")
.WithName("DeleteLokOpenHours"); .WithName("DeleteLokOpenHours");
app.MapPut("/lok/open-hours/{id:long}", async (HttpContext httpContext, long id) => app.MapPut("/lok/open-hours/{id:long}", async (HttpContext httpContext, long id) =>
@@ -111,6 +116,8 @@ public static class LokEndpoints
await httpContext.Response.WriteAsJsonAsync(updatedOpenHours); await httpContext.Response.WriteAsJsonAsync(updatedOpenHours);
}) })
.RequireAuthorization("OpenHoursWrite")
.RequireCors("FrontendWriteCors")
.WithName("UpdateLokOpenHours"); .WithName("UpdateLokOpenHours");
app.MapPut("/lok/open-hours/{id:long}/active", async (HttpContext httpContext, long id) => app.MapPut("/lok/open-hours/{id:long}/active", async (HttpContext httpContext, long id) =>
@@ -134,6 +141,8 @@ public static class LokEndpoints
IsActive = true IsActive = true
}); });
}) })
.RequireAuthorization("OpenHoursWrite")
.RequireCors("FrontendWriteCors")
.WithName("SetActiveLokOpenHours"); .WithName("SetActiveLokOpenHours");
} }
} }

View File

@@ -9,6 +9,7 @@ public static class SystemEndpoints
Version = "1.0.0" Version = "1.0.0"
}; };
}) })
.RequireCors("PublicReadCors")
.WithName("GetVersion"); .WithName("GetVersion");
app.MapGet("/health/db", async (Microsoft.Data.Sqlite.SqliteConnection connection) => app.MapGet("/health/db", async (Microsoft.Data.Sqlite.SqliteConnection connection) =>
@@ -24,6 +25,7 @@ public static class SystemEndpoints
Result = result Result = result
}; };
}) })
.RequireCors("PublicReadCors")
.WithName("GetDatabaseHealth"); .WithName("GetDatabaseHealth");
} }
} }

View File

@@ -1,4 +1,7 @@
using Microsoft.Data.Sqlite; using Microsoft.Data.Sqlite;
using System.Text;
using Microsoft.AspNetCore.Authentication.JwtBearer;
using Microsoft.IdentityModel.Tokens;
public class Program public class Program
{ {
@@ -19,21 +22,66 @@ public class Program
sqliteConnectionStringBuilder.DataSource = databasePath; sqliteConnectionStringBuilder.DataSource = databasePath;
var resolvedConnectionString = sqliteConnectionStringBuilder.ToString(); var resolvedConnectionString = sqliteConnectionStringBuilder.ToString();
var authOptions = builder.Configuration.GetSection("Auth").Get<AuthOptions>()
?? throw new InvalidOperationException("Auth configuration was not found.");
if (string.IsNullOrWhiteSpace(authOptions.SigningKey) || authOptions.SigningKey.Length < 32)
{
throw new InvalidOperationException("Auth:SigningKey must be at least 32 characters long.");
}
if (authOptions.Users.Count == 0)
{
throw new InvalidOperationException("At least one user must be configured under Auth:Users.");
}
builder.Services.Configure<AuthOptions>(builder.Configuration.GetSection("Auth"));
builder.Services.AddScoped(_ => new SqliteConnection(resolvedConnectionString)); builder.Services.AddScoped(_ => new SqliteConnection(resolvedConnectionString));
builder.Services.AddScoped<LokService>(); builder.Services.AddScoped<LokService>();
builder.Services.AddCors(options => builder.Services.AddCors(options =>
{ {
options.AddPolicy("UiCors", policy => options.AddPolicy("PublicReadCors", policy =>
{ {
policy policy
.WithOrigins( .AllowAnyOrigin()
"http://localhost:5173",
"http://127.0.0.1:5173",
"http://localhost:4173",
"http://127.0.0.1:4173")
.AllowAnyHeader() .AllowAnyHeader()
.AllowAnyMethod(); .AllowAnyMethod();
}); });
options.AddPolicy("FrontendWriteCors", policy =>
{
policy
.WithOrigins(authOptions.AllowedOrigins.ToArray())
.AllowAnyHeader()
.AllowAnyMethod();
});
});
builder.Services
.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
.AddJwtBearer(options =>
{
options.TokenValidationParameters = new TokenValidationParameters
{
ValidateIssuer = true,
ValidateAudience = true,
ValidateIssuerSigningKey = true,
ValidateLifetime = true,
ValidIssuer = authOptions.Issuer,
ValidAudience = authOptions.Audience,
IssuerSigningKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(authOptions.SigningKey)),
ClockSkew = TimeSpan.FromMinutes(1)
};
});
builder.Services.AddAuthorization(options =>
{
options.AddPolicy("OpenHoursWrite", policy =>
{
policy.RequireAuthenticatedUser();
policy.RequireClaim("scope", "openhours:write");
});
}); });
builder.Services.AddOpenApi(); builder.Services.AddOpenApi();
@@ -137,7 +185,10 @@ public class Program
app.MapOpenApi(); app.MapOpenApi();
} }
app.UseCors("UiCors"); app.UseCors();
app.UseAuthentication();
app.UseAuthorization();
if (!app.Environment.IsDevelopment()) if (!app.Environment.IsDevelopment())
{ {
@@ -145,6 +196,7 @@ public class Program
} }
SystemEndpoints.MapSystemEndpoints(app); SystemEndpoints.MapSystemEndpoints(app);
AuthEndpoints.MapAuthEndpoints(app);
LokEndpoints.MapLokEndpoints(app); LokEndpoints.MapLokEndpoints(app);
app.Run(); app.Run();

View File

@@ -7,5 +7,22 @@
"Default": "Information", "Default": "Information",
"Microsoft.AspNetCore": "Warning" "Microsoft.AspNetCore": "Warning"
} }
},
"Auth": {
"Issuer": "klapi-api",
"Audience": "klapi-ui",
"SigningKey": "change-this-to-a-long-random-32-char-minimum-key",
"AllowedOrigins": [
"http://localhost:5173",
"http://127.0.0.1:5173",
"http://localhost:4173",
"http://127.0.0.1:4173"
],
"Users": [
{
"Email": "admin@klapi.local",
"Password": "changeme"
}
]
} }
} }

View File

@@ -8,5 +8,22 @@
"Microsoft.AspNetCore": "Warning" "Microsoft.AspNetCore": "Warning"
} }
}, },
"Auth": {
"Issuer": "klapi-api",
"Audience": "klapi-ui",
"SigningKey": "change-this-to-a-long-random-32-char-minimum-key",
"AllowedOrigins": [
"http://localhost:5173",
"http://127.0.0.1:5173",
"http://localhost:4173",
"http://127.0.0.1:4173"
],
"Users": [
{
"Email": "admin@klapi.local",
"Password": "changeme"
}
]
},
"AllowedHosts": "*" "AllowedHosts": "*"
} }

Binary file not shown.

View File

@@ -1,5 +1,15 @@
@App_HostAddress = http://localhost:5013 @App_HostAddress = http://localhost:5013
### Request token for protected open-hours endpoints
POST {{App_HostAddress}}/auth/token
Content-Type: application/json
Accept: application/json
{
"email": "admin@klapi.local",
"password": "changeme"
}
### Get newest open hours (returns latest 5) ### Get newest open hours (returns latest 5)
GET {{App_HostAddress}}/lok/open-hours GET {{App_HostAddress}}/lok/open-hours
Accept: application/json Accept: application/json
@@ -10,6 +20,7 @@ Content-Type: application/json
Accept: application/json Accept: application/json
{ {
"name": "Version 1",
"paragraph1": "Version 1 paragraph 1", "paragraph1": "Version 1 paragraph 1",
"paragraph2": "Version 1 paragraph 2", "paragraph2": "Version 1 paragraph 2",
"paragraph3": "Version 1 paragraph 3", "paragraph3": "Version 1 paragraph 3",
@@ -23,6 +34,7 @@ Content-Type: application/json
Accept: application/json Accept: application/json
{ {
"name": "Version 2",
"paragraph1": "Version 2 paragraph 1", "paragraph1": "Version 2 paragraph 1",
"paragraph2": "Version 2 paragraph 2", "paragraph2": "Version 2 paragraph 2",
"paragraph3": "Version 2 paragraph 3", "paragraph3": "Version 2 paragraph 3",
@@ -36,6 +48,7 @@ Content-Type: application/json
Accept: application/json Accept: application/json
{ {
"name": "Version 3",
"paragraph1": "Version 3 paragraph 1", "paragraph1": "Version 3 paragraph 1",
"paragraph2": "Version 3 paragraph 2", "paragraph2": "Version 3 paragraph 2",
"paragraph3": "Version 3 paragraph 3", "paragraph3": "Version 3 paragraph 3",

View File

@@ -1,5 +1,12 @@
import { buildApiUrl } from "./url"; import { buildApiUrl } from "./url";
type AuthTokenResponse = {
accessToken: string;
email: string;
tokenType: string;
expiresIn: number;
};
async function fetchApi<T>(path: string, init?: RequestInit): Promise<T> { async function fetchApi<T>(path: string, init?: RequestInit): Promise<T> {
const response = await fetch(buildApiUrl(path), { const response = await fetch(buildApiUrl(path), {
...init, ...init,
@@ -21,6 +28,14 @@ async function fetchApi<T>(path: string, init?: RequestInit): Promise<T> {
return (await response.json()) as T; return (await response.json()) as T;
} }
function getAccessToken() {
if (typeof window === "undefined") {
return "";
}
return localStorage.getItem("session-token") ?? "";
}
export type LokOpenHours = { export type LokOpenHours = {
id: number; id: number;
name: string; name: string;
@@ -74,6 +89,9 @@ export async function createLokOpenHours(
return await fetchApi<LokOpenHours>("/lok/open-hours", { return await fetchApi<LokOpenHours>("/lok/open-hours", {
method: "POST", method: "POST",
headers: {
Authorization: `Bearer ${getAccessToken()}`,
},
body: JSON.stringify(payload), body: JSON.stringify(payload),
}); });
} }
@@ -106,6 +124,9 @@ export async function updateLokOpenHours(
return await fetchApi<LokOpenHours>(`/lok/open-hours/${id}`, { return await fetchApi<LokOpenHours>(`/lok/open-hours/${id}`, {
method: "PUT", method: "PUT",
headers: {
Authorization: `Bearer ${getAccessToken()}`,
},
body: JSON.stringify(payload), body: JSON.stringify(payload),
}); });
} }
@@ -117,6 +138,9 @@ export async function deleteLokOpenHours(id: number): Promise<void> {
await fetchApi<void>(`/lok/open-hours/${id}`, { await fetchApi<void>(`/lok/open-hours/${id}`, {
method: "DELETE", method: "DELETE",
headers: {
Authorization: `Bearer ${getAccessToken()}`,
},
}); });
} }
@@ -131,6 +155,22 @@ export async function setActiveLokOpenHours(
`/lok/open-hours/${id}/active`, `/lok/open-hours/${id}/active`,
{ {
method: "PUT", method: "PUT",
headers: {
Authorization: `Bearer ${getAccessToken()}`,
},
}, },
); );
} }
export async function requestAuthToken(
email: string,
password: string,
): Promise<AuthTokenResponse> {
return await fetchApi<AuthTokenResponse>("/auth/token", {
method: "POST",
body: JSON.stringify({
email,
password,
}),
});
}

View File

@@ -3,14 +3,10 @@ import { buildApiUrl } from "./url";
describe("buildApiUrl", () => { describe("buildApiUrl", () => {
it("joins base url and relative path without duplicate slashes", () => { it("joins base url and relative path without duplicate slashes", () => {
expect(buildApiUrl("/lok/open-hours")).toBe( expect(buildApiUrl("/lok/open-hours")).toBe("/api/lok/open-hours");
"http://localhost:5013/lok/open-hours",
);
}); });
it("accepts path without leading slash", () => { it("accepts path without leading slash", () => {
expect(buildApiUrl("lok/open-hours/1")).toBe( expect(buildApiUrl("lok/open-hours/1")).toBe("/api/lok/open-hours/1");
"http://localhost:5013/lok/open-hours/1",
);
}); });
}); });

View File

@@ -21,12 +21,16 @@ function AppShell() {
useEffect(() => { useEffect(() => {
const storedEmail = localStorage.getItem("session-email"); const storedEmail = localStorage.getItem("session-email");
if (!storedEmail) { const storedToken = localStorage.getItem("session-token");
if (!storedEmail || !storedToken) {
setSession(null); setSession(null);
return; return;
} }
setSession({ email: storedEmail }); setSession({
email: storedEmail,
token: storedToken,
});
}, [setSession]); }, [setSession]);
useEffect(() => { useEffect(() => {

View File

@@ -13,6 +13,7 @@ export default function Nav() {
const signOut = () => { const signOut = () => {
setSession(null); setSession(null);
localStorage.removeItem("session-email"); localStorage.removeItem("session-email");
localStorage.removeItem("session-token");
navigate("/login"); navigate("/login");
}; };

View File

@@ -55,6 +55,7 @@ const translations = {
"notFound.goHome": "Go Home", "notFound.goHome": "Go Home",
"error.title": "Error", "error.title": "Error",
"errors.requiredEmailPassword": "Email and password are required", "errors.requiredEmailPassword": "Email and password are required",
"errors.invalidEmailOrPassword": "Invalid email or password",
}, },
fi: { fi: {
"nav.home": "Etusivu", "nav.home": "Etusivu",
@@ -106,6 +107,7 @@ const translations = {
"notFound.goHome": "Takaisin etusivulle", "notFound.goHome": "Takaisin etusivulle",
"error.title": "Virhe", "error.title": "Virhe",
"errors.requiredEmailPassword": "Sähköposti ja salasana vaaditaan", "errors.requiredEmailPassword": "Sähköposti ja salasana vaaditaan",
"errors.invalidEmailOrPassword": "Virheellinen sähköposti tai salasana",
}, },
} as const; } as const;

View File

@@ -1,6 +1,7 @@
import { FormEvent, useEffect, useState } from "react"; import { FormEvent, useEffect, useState } from "react";
import { useNavigate } from "react-router-dom"; import { useNavigate } from "react-router-dom";
import { useRecoilState } from "recoil"; import { useRecoilState } from "recoil";
import { requestAuthToken } from "~/api";
import { useT } from "~/i18n"; import { useT } from "~/i18n";
import { sessionAtom } from "~/state/appState"; import { sessionAtom } from "~/state/appState";
@@ -21,7 +22,7 @@ export default function Login() {
navigate("/"); navigate("/");
}, [session, navigate]); }, [session, navigate]);
const submit = (event: FormEvent) => { const submit = async (event: FormEvent) => {
event.preventDefault(); event.preventDefault();
if (!email.trim() || !password.trim()) { if (!email.trim() || !password.trim()) {
@@ -30,9 +31,22 @@ export default function Login() {
} }
const normalizedEmail = email.trim().toLowerCase(); const normalizedEmail = email.trim().toLowerCase();
setSession({ email: normalizedEmail });
localStorage.setItem("session-email", normalizedEmail); try {
const auth = await requestAuthToken(normalizedEmail, password);
setSession({
email: auth.email,
token: auth.accessToken,
});
localStorage.setItem("session-email", auth.email);
localStorage.setItem("session-token", auth.accessToken);
setError("");
navigate("/"); navigate("/");
} catch {
setError(t("errors.invalidEmailOrPassword"));
}
}; };
return ( return (

View File

@@ -5,6 +5,7 @@ export type Language = "fi" | "en";
export type Session = { export type Session = {
email: string; email: string;
token: string;
}; };
export type Toast = { export type Toast = {