UDT-001: Login (scaffolding + JWT RS256 end-to-end) #1
76
src/api/SIGCM2.Infrastructure/DependencyInjection.cs
Normal file
76
src/api/SIGCM2.Infrastructure/DependencyInjection.cs
Normal file
@@ -0,0 +1,76 @@
|
||||
using System.Security.Cryptography;
|
||||
using Microsoft.AspNetCore.Authentication.JwtBearer;
|
||||
using Microsoft.Extensions.Configuration;
|
||||
using Microsoft.Extensions.DependencyInjection;
|
||||
using Microsoft.Extensions.Options;
|
||||
using Microsoft.IdentityModel.Tokens;
|
||||
using SIGCM2.Application.Abstractions;
|
||||
using SIGCM2.Application.Abstractions.Persistence;
|
||||
using SIGCM2.Application.Abstractions.Security;
|
||||
using SIGCM2.Infrastructure.Messaging;
|
||||
using SIGCM2.Infrastructure.Persistence;
|
||||
using SIGCM2.Infrastructure.Security;
|
||||
|
||||
namespace SIGCM2.Infrastructure;
|
||||
|
||||
public static class DependencyInjection
|
||||
{
|
||||
public static IServiceCollection AddInfrastructure(
|
||||
this IServiceCollection services,
|
||||
IConfiguration configuration)
|
||||
{
|
||||
// Database
|
||||
var connectionString = configuration.GetConnectionString("SqlServer")
|
||||
?? throw new InvalidOperationException("Missing ConnectionStrings:SqlServer");
|
||||
services.AddSingleton(new SqlConnectionFactory(connectionString));
|
||||
services.AddScoped<IUsuarioRepository, UsuarioRepository>();
|
||||
|
||||
// JWT Options — bound lazily via IOptions so tests can override via ConfigureWebHost
|
||||
services.Configure<JwtOptions>(configuration.GetSection("Jwt"));
|
||||
// Also expose as JwtOptions directly for convenience (resolves via IOptions<JwtOptions>)
|
||||
services.AddSingleton<JwtOptions>(sp => sp.GetRequiredService<IOptions<JwtOptions>>().Value);
|
||||
|
||||
// RSA key pair — loaded lazily as singletons from the fully-resolved JwtOptions
|
||||
services.AddSingleton<RSA>(sp =>
|
||||
{
|
||||
var opts = sp.GetRequiredService<JwtOptions>();
|
||||
return RsaKeyLoader.LoadPrivateKey(opts);
|
||||
});
|
||||
|
||||
services.AddSingleton<RsaSecurityKey>(sp =>
|
||||
{
|
||||
var opts = sp.GetRequiredService<JwtOptions>();
|
||||
return new RsaSecurityKey(RsaKeyLoader.LoadPublicKey(opts));
|
||||
});
|
||||
|
||||
services.AddScoped<IJwtService>(sp =>
|
||||
new JwtService(sp.GetRequiredService<RSA>(), sp.GetRequiredService<JwtOptions>()));
|
||||
services.AddScoped<IPasswordHasher, BcryptPasswordHasher>();
|
||||
|
||||
// Dispatcher
|
||||
services.AddScoped<IDispatcher, Dispatcher>();
|
||||
|
||||
// JWT Bearer authentication
|
||||
services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
|
||||
.AddJwtBearer();
|
||||
|
||||
// Post-configure JWT Bearer — wire RSA public key + validation params from resolved options
|
||||
services.AddOptions<JwtBearerOptions>(JwtBearerDefaults.AuthenticationScheme)
|
||||
.PostConfigure<RsaSecurityKey, JwtOptions>((jwtBearerOpts, rsaKey, jwtOpts) =>
|
||||
{
|
||||
jwtBearerOpts.TokenValidationParameters = new TokenValidationParameters
|
||||
{
|
||||
ValidateIssuerSigningKey = true,
|
||||
IssuerSigningKey = rsaKey,
|
||||
ValidateIssuer = true,
|
||||
ValidIssuer = jwtOpts.Issuer,
|
||||
ValidateAudience = true,
|
||||
ValidAudience = jwtOpts.Audience,
|
||||
ValidateLifetime = true,
|
||||
ClockSkew = TimeSpan.Zero
|
||||
};
|
||||
});
|
||||
|
||||
return services;
|
||||
}
|
||||
}
|
||||
20
src/api/SIGCM2.Infrastructure/Messaging/Dispatcher.cs
Normal file
20
src/api/SIGCM2.Infrastructure/Messaging/Dispatcher.cs
Normal file
@@ -0,0 +1,20 @@
|
||||
using Microsoft.Extensions.DependencyInjection;
|
||||
using SIGCM2.Application.Abstractions;
|
||||
|
||||
namespace SIGCM2.Infrastructure.Messaging;
|
||||
|
||||
public sealed class Dispatcher : IDispatcher
|
||||
{
|
||||
private readonly IServiceProvider _serviceProvider;
|
||||
|
||||
public Dispatcher(IServiceProvider serviceProvider)
|
||||
{
|
||||
_serviceProvider = serviceProvider;
|
||||
}
|
||||
|
||||
public Task<TResult> Send<TCommand, TResult>(TCommand command)
|
||||
{
|
||||
var handler = _serviceProvider.GetRequiredService<ICommandHandler<TCommand, TResult>>();
|
||||
return handler.Handle(command!);
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,15 @@
|
||||
using Microsoft.Data.SqlClient;
|
||||
|
||||
namespace SIGCM2.Infrastructure.Persistence;
|
||||
|
||||
public sealed class SqlConnectionFactory
|
||||
{
|
||||
private readonly string _connectionString;
|
||||
|
||||
public SqlConnectionFactory(string connectionString)
|
||||
{
|
||||
_connectionString = connectionString;
|
||||
}
|
||||
|
||||
public SqlConnection CreateConnection() => new(_connectionString);
|
||||
}
|
||||
@@ -0,0 +1,60 @@
|
||||
using Dapper;
|
||||
using SIGCM2.Application.Abstractions.Persistence;
|
||||
using SIGCM2.Domain.Entities;
|
||||
|
||||
namespace SIGCM2.Infrastructure.Persistence;
|
||||
|
||||
public sealed class UsuarioRepository : IUsuarioRepository
|
||||
{
|
||||
private readonly SqlConnectionFactory _connectionFactory;
|
||||
|
||||
public UsuarioRepository(SqlConnectionFactory connectionFactory)
|
||||
{
|
||||
_connectionFactory = connectionFactory;
|
||||
}
|
||||
|
||||
public async Task<Usuario?> GetByUsernameAsync(string username)
|
||||
{
|
||||
const string sql = """
|
||||
SELECT
|
||||
Id, Username, PasswordHash,
|
||||
Nombre, Apellido, Email,
|
||||
Rol, PermisosJson, Activo
|
||||
FROM dbo.Usuario
|
||||
WHERE Username = @Username
|
||||
AND Activo = 1
|
||||
""";
|
||||
|
||||
await using var connection = _connectionFactory.CreateConnection();
|
||||
await connection.OpenAsync();
|
||||
|
||||
var row = await connection.QuerySingleOrDefaultAsync<UsuarioRow>(sql, new { Username = username });
|
||||
|
||||
if (row is null) return null;
|
||||
|
||||
return new Usuario(
|
||||
id: row.Id,
|
||||
username: row.Username,
|
||||
passwordHash: row.PasswordHash,
|
||||
nombre: row.Nombre,
|
||||
apellido: row.Apellido,
|
||||
email: row.Email,
|
||||
rol: row.Rol,
|
||||
permisosJson: row.PermisosJson,
|
||||
activo: row.Activo
|
||||
);
|
||||
}
|
||||
|
||||
// Flat DTO for Dapper mapping (avoids polluting domain entity with Dapper attributes)
|
||||
private sealed record UsuarioRow(
|
||||
int Id,
|
||||
string Username,
|
||||
string PasswordHash,
|
||||
string Nombre,
|
||||
string Apellido,
|
||||
string? Email,
|
||||
string Rol,
|
||||
string PermisosJson,
|
||||
bool Activo
|
||||
);
|
||||
}
|
||||
24
src/api/SIGCM2.Infrastructure/SIGCM2.Infrastructure.csproj
Normal file
24
src/api/SIGCM2.Infrastructure/SIGCM2.Infrastructure.csproj
Normal file
@@ -0,0 +1,24 @@
|
||||
<Project Sdk="Microsoft.NET.Sdk">
|
||||
|
||||
<PropertyGroup>
|
||||
<TargetFramework>net10.0</TargetFramework>
|
||||
<ImplicitUsings>enable</ImplicitUsings>
|
||||
<Nullable>enable</Nullable>
|
||||
<RootNamespace>SIGCM2.Infrastructure</RootNamespace>
|
||||
</PropertyGroup>
|
||||
|
||||
<ItemGroup>
|
||||
<PackageReference Include="Dapper" />
|
||||
<PackageReference Include="Microsoft.Data.SqlClient" />
|
||||
<PackageReference Include="BCrypt.Net-Next" />
|
||||
<PackageReference Include="System.IdentityModel.Tokens.Jwt" />
|
||||
<PackageReference Include="Microsoft.IdentityModel.Tokens" />
|
||||
<PackageReference Include="Microsoft.AspNetCore.Authentication.JwtBearer" />
|
||||
</ItemGroup>
|
||||
|
||||
<ItemGroup>
|
||||
<ProjectReference Include="..\SIGCM2.Application\SIGCM2.Application.csproj" />
|
||||
<ProjectReference Include="..\SIGCM2.Domain\SIGCM2.Domain.csproj" />
|
||||
</ItemGroup>
|
||||
|
||||
</Project>
|
||||
@@ -0,0 +1,15 @@
|
||||
using SIGCM2.Application.Abstractions.Security;
|
||||
using BCryptNet = BCrypt.Net.BCrypt;
|
||||
|
||||
namespace SIGCM2.Infrastructure.Security;
|
||||
|
||||
public sealed class BcryptPasswordHasher : IPasswordHasher
|
||||
{
|
||||
private const int WorkFactor = 12;
|
||||
|
||||
public bool Verify(string plainPassword, string hash)
|
||||
=> BCryptNet.Verify(plainPassword, hash);
|
||||
|
||||
public string Hash(string plainPassword)
|
||||
=> BCryptNet.HashPassword(plainPassword, WorkFactor);
|
||||
}
|
||||
20
src/api/SIGCM2.Infrastructure/Security/JwtOptions.cs
Normal file
20
src/api/SIGCM2.Infrastructure/Security/JwtOptions.cs
Normal file
@@ -0,0 +1,20 @@
|
||||
namespace SIGCM2.Infrastructure.Security;
|
||||
|
||||
public sealed class JwtOptions
|
||||
{
|
||||
public string Issuer { get; set; } = "sigcm2.api";
|
||||
public string Audience { get; set; } = "sigcm2.web";
|
||||
public int AccessTokenMinutes { get; set; } = 60;
|
||||
|
||||
/// <summary>Path to private.pem file (dev). Used if PrivateKey is null.</summary>
|
||||
public string? PrivateKeyPath { get; set; }
|
||||
|
||||
/// <summary>Path to public.pem file (dev). Used if PublicKey is null.</summary>
|
||||
public string? PublicKeyPath { get; set; }
|
||||
|
||||
/// <summary>PEM content from env var (production). Takes precedence over file.</summary>
|
||||
public string? PrivateKey { get; set; }
|
||||
|
||||
/// <summary>PEM content from env var (production). Takes precedence over file.</summary>
|
||||
public string? PublicKey { get; set; }
|
||||
}
|
||||
68
src/api/SIGCM2.Infrastructure/Security/JwtService.cs
Normal file
68
src/api/SIGCM2.Infrastructure/Security/JwtService.cs
Normal file
@@ -0,0 +1,68 @@
|
||||
using System.Security.Claims;
|
||||
using System.Security.Cryptography;
|
||||
using System.Text.Json;
|
||||
using Microsoft.IdentityModel.Tokens;
|
||||
using System.IdentityModel.Tokens.Jwt;
|
||||
using SIGCM2.Application.Abstractions.Security;
|
||||
using SIGCM2.Domain.Entities;
|
||||
|
||||
namespace SIGCM2.Infrastructure.Security;
|
||||
|
||||
public sealed class JwtService : IJwtService
|
||||
{
|
||||
private readonly RSA _rsa;
|
||||
private readonly JwtOptions _options;
|
||||
|
||||
public JwtService(RSA rsa, JwtOptions options)
|
||||
{
|
||||
_rsa = rsa;
|
||||
_options = options;
|
||||
}
|
||||
|
||||
public string GenerateAccessToken(Usuario usuario)
|
||||
{
|
||||
var signingKey = new RsaSecurityKey(_rsa);
|
||||
var credentials = new SigningCredentials(signingKey, SecurityAlgorithms.RsaSha256);
|
||||
|
||||
var permisos = DeserializePermisos(usuario.PermisosJson);
|
||||
|
||||
var claims = new List<Claim>
|
||||
{
|
||||
new(JwtRegisteredClaimNames.Sub, usuario.Id.ToString()),
|
||||
new(JwtRegisteredClaimNames.Jti, Guid.NewGuid().ToString()),
|
||||
new("name", usuario.Username),
|
||||
new("rol", usuario.Rol),
|
||||
};
|
||||
|
||||
// Add each permission as a separate claim
|
||||
foreach (var permiso in permisos)
|
||||
claims.Add(new Claim("permisos", permiso));
|
||||
|
||||
var now = DateTime.UtcNow;
|
||||
var descriptor = new SecurityTokenDescriptor
|
||||
{
|
||||
Subject = new ClaimsIdentity(claims),
|
||||
Issuer = _options.Issuer,
|
||||
Audience = _options.Audience,
|
||||
IssuedAt = now,
|
||||
Expires = now.AddMinutes(_options.AccessTokenMinutes),
|
||||
SigningCredentials = credentials
|
||||
};
|
||||
|
||||
var handler = new JwtSecurityTokenHandler();
|
||||
var token = handler.CreateToken(descriptor);
|
||||
return handler.WriteToken(token);
|
||||
}
|
||||
|
||||
private static string[] DeserializePermisos(string permisosJson)
|
||||
{
|
||||
try
|
||||
{
|
||||
return JsonSerializer.Deserialize<string[]>(permisosJson) ?? [];
|
||||
}
|
||||
catch
|
||||
{
|
||||
return [];
|
||||
}
|
||||
}
|
||||
}
|
||||
49
src/api/SIGCM2.Infrastructure/Security/RsaKeyLoader.cs
Normal file
49
src/api/SIGCM2.Infrastructure/Security/RsaKeyLoader.cs
Normal file
@@ -0,0 +1,49 @@
|
||||
using System.Security.Cryptography;
|
||||
|
||||
namespace SIGCM2.Infrastructure.Security;
|
||||
|
||||
public static class RsaKeyLoader
|
||||
{
|
||||
/// <summary>
|
||||
/// Loads the RSA private key from environment variable (production)
|
||||
/// or from the PEM file on disk (development).
|
||||
/// </summary>
|
||||
public static RSA LoadPrivateKey(JwtOptions options)
|
||||
{
|
||||
var pem = options.PrivateKey ?? ReadPemFile(options.PrivateKeyPath, "private.pem");
|
||||
var rsa = RSA.Create();
|
||||
rsa.ImportFromPem(pem);
|
||||
return rsa;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Loads the RSA public key from environment variable (production)
|
||||
/// or from the PEM file on disk (development).
|
||||
/// </summary>
|
||||
public static RSA LoadPublicKey(JwtOptions options)
|
||||
{
|
||||
var pem = options.PublicKey ?? ReadPemFile(options.PublicKeyPath, "public.pem");
|
||||
var rsa = RSA.Create();
|
||||
rsa.ImportFromPem(pem);
|
||||
return rsa;
|
||||
}
|
||||
|
||||
private static string ReadPemFile(string? path, string fallbackName)
|
||||
{
|
||||
if (string.IsNullOrWhiteSpace(path))
|
||||
{
|
||||
throw new InvalidOperationException(
|
||||
$"JWT key not configured. Set the env var or provide a path for {fallbackName}. " +
|
||||
$"Run: pwsh -File scripts/generate-keys.ps1");
|
||||
}
|
||||
|
||||
if (!File.Exists(path))
|
||||
{
|
||||
throw new FileNotFoundException(
|
||||
$"JWT key file not found at '{path}'. " +
|
||||
$"Run: pwsh -File scripts/generate-keys.ps1", path);
|
||||
}
|
||||
|
||||
return File.ReadAllText(path);
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user