|
|
|
|
|
|
|
|
|
|
|
|
|
|
using System;
|
|
|
|
|
using System.Linq;
|
|
|
|
|
using System.Security.Claims;
|
|
|
|
|
using System.Threading.Tasks;
|
|
|
|
|
using Microsoft.AspNet.Authorization;
|
|
|
|
|
using Microsoft.AspNet.Identity;
|
|
|
|
|
using Microsoft.AspNet.Mvc;
|
|
|
|
|
using Microsoft.AspNet.Mvc.Rendering;
|
|
|
|
|
using Microsoft.Extensions.Logging;
|
|
|
|
|
using Microsoft.Extensions.OptionsModel;
|
|
|
|
|
using Microsoft.AspNet.Http;
|
|
|
|
|
using Yavsc.Models;
|
|
|
|
|
using Yavsc.Services;
|
|
|
|
|
using Yavsc.ViewModels.Account;
|
|
|
|
|
using Yavsc.Helpers;
|
|
|
|
|
|
|
|
|
|
namespace Yavsc.Controllers
|
|
|
|
|
{
|
|
|
|
|
[ServiceFilter(typeof(LanguageActionFilter)), AllowAnonymous]
|
|
|
|
|
public class AccountController : Controller
|
|
|
|
|
{
|
|
|
|
|
private readonly UserManager<ApplicationUser> _userManager;
|
|
|
|
|
private readonly SignInManager<ApplicationUser> _signInManager;
|
|
|
|
|
private readonly IEmailSender _emailSender;
|
|
|
|
|
// private readonly ISmsSender _smsSender;
|
|
|
|
|
private readonly ILogger _logger;
|
|
|
|
|
SiteSettings _siteSettings;
|
|
|
|
|
SmtpSettings _smtpSettings;
|
|
|
|
|
TwilioSettings _twilioSettings;
|
|
|
|
|
|
|
|
|
|
// TwilioSettings _twilioSettings;
|
|
|
|
|
|
|
|
|
|
public AccountController(
|
|
|
|
|
UserManager<ApplicationUser> userManager,
|
|
|
|
|
SignInManager<ApplicationUser> signInManager,
|
|
|
|
|
IEmailSender emailSender,
|
|
|
|
|
IOptions<SiteSettings> siteSettings,
|
|
|
|
|
IOptions<SmtpSettings> smtpSettings,
|
|
|
|
|
ILoggerFactory loggerFactory, IOptions<TwilioSettings> twilioSettings)
|
|
|
|
|
{
|
|
|
|
|
_userManager = userManager;
|
|
|
|
|
_signInManager = signInManager;
|
|
|
|
|
// _userManager.RegisterTokenProvider("SMS",new UserTokenProvider());
|
|
|
|
|
// _userManager.RegisterTokenProvider("Phone", new UserTokenProvider());
|
|
|
|
|
_emailSender = emailSender;
|
|
|
|
|
_siteSettings = siteSettings.Value;
|
|
|
|
|
_smtpSettings = smtpSettings.Value;
|
|
|
|
|
_twilioSettings = twilioSettings.Value;
|
|
|
|
|
_logger = loggerFactory.CreateLogger<AccountController>();
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
[HttpGet(Constants.LoginPath)]
|
|
|
|
|
public ActionResult SignIn(string returnUrl = null)
|
|
|
|
|
{
|
|
|
|
|
// Note: the "returnUrl" parameter corresponds to the endpoint the user agent
|
|
|
|
|
// will be redirected to after a successful authentication and not
|
|
|
|
|
// the redirect_uri of the requesting client application against the third
|
|
|
|
|
// party identity provider.
|
|
|
|
|
return View(new SignInViewModel
|
|
|
|
|
{
|
|
|
|
|
ReturnUrl = returnUrl,
|
|
|
|
|
ExternalProviders = HttpContext.GetExternalProviders()
|
|
|
|
|
});
|
|
|
|
|
/* Note: When using an external login provider, redirect the query :
|
|
|
|
|
var properties = _signInManager.ConfigureExternalAuthenticationProperties(OpenIdConnectDefaults.AuthenticationScheme, returnUrl);
|
|
|
|
|
return new ChallengeResult(OpenIdConnectDefaults.AuthenticationScheme, properties);
|
|
|
|
|
*/
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
[HttpPost(Constants.LoginPath)]
|
|
|
|
|
public async Task<IActionResult> SignIn(SignInViewModel model)
|
|
|
|
|
{
|
|
|
|
|
if (Request.Method == "POST")
|
|
|
|
|
{
|
|
|
|
|
if (model.Provider == "LOCAL")
|
|
|
|
|
{
|
|
|
|
|
if (ModelState.IsValid)
|
|
|
|
|
{
|
|
|
|
|
// This doesn't count login failures towards account lockout
|
|
|
|
|
// To enable password failures to trigger account lockout, set lockoutOnFailure: true
|
|
|
|
|
var result = await _signInManager.PasswordSignInAsync(model.UserName, model.Password, model.RememberMe, lockoutOnFailure: false);
|
|
|
|
|
|
|
|
|
|
if (result.Succeeded)
|
|
|
|
|
{
|
|
|
|
|
return Redirect(model.ReturnUrl);
|
|
|
|
|
}
|
|
|
|
|
if (result.RequiresTwoFactor)
|
|
|
|
|
{
|
|
|
|
|
return RedirectToAction(nameof(SendCode), new { ReturnUrl = model.ReturnUrl, RememberMe = model.RememberMe });
|
|
|
|
|
}
|
|
|
|
|
if (result.IsLockedOut)
|
|
|
|
|
{
|
|
|
|
|
_logger.LogWarning(2, "User account locked out.");
|
|
|
|
|
return View("Lockout");
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
ModelState.AddModelError(string.Empty, "Invalid login attempt.");
|
|
|
|
|
model.ExternalProviders = HttpContext.GetExternalProviders();
|
|
|
|
|
return View(model);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// If we got this far, something failed, redisplay form
|
|
|
|
|
ModelState.AddModelError(string.Empty, "Unexpected behavior: something failed ... you could try again, or contact me ...");
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
|
|
|
|
|
// Note: the "provider" parameter corresponds to the external
|
|
|
|
|
// authentication provider choosen by the user agent.
|
|
|
|
|
if (string.IsNullOrEmpty(model.Provider))
|
|
|
|
|
{
|
|
|
|
|
_logger.LogWarning("Provider not specified");
|
|
|
|
|
return HttpBadRequest();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!_signInManager.GetExternalAuthenticationSchemes().Any(x => x.AuthenticationScheme == model.Provider))
|
|
|
|
|
{
|
|
|
|
|
_logger.LogWarning($"Provider not found : {model.Provider}");
|
|
|
|
|
return HttpBadRequest();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Instruct the middleware corresponding to the requested external identity
|
|
|
|
|
// provider to redirect the user agent to its own authorization endpoint.
|
|
|
|
|
// Note: the authenticationScheme parameter must match the value configured in Startup.cs
|
|
|
|
|
|
|
|
|
|
// Note: the "returnUrl" parameter corresponds to the endpoint the user agent
|
|
|
|
|
// will be redirected to after a successful authentication and not
|
|
|
|
|
// the redirect_uri of the requesting client application.
|
|
|
|
|
if (string.IsNullOrEmpty(model.ReturnUrl))
|
|
|
|
|
{
|
|
|
|
|
_logger.LogWarning("ReturnUrl not specified");
|
|
|
|
|
return HttpBadRequest();
|
|
|
|
|
}
|
|
|
|
|
// Note: this still is not the redirect uri given to the third party provider, at building the challenge.
|
|
|
|
|
var redirectUrl = Url.Action("ExternalLoginCallback", "Account", new { ReturnUrl = model.ReturnUrl });
|
|
|
|
|
var properties = _signInManager.ConfigureExternalAuthenticationProperties(model.Provider, redirectUrl);
|
|
|
|
|
// var properties = new AuthenticationProperties{RedirectUri=ReturnUrl};
|
|
|
|
|
return new ChallengeResult(model.Provider, properties);
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
model.ExternalProviders = HttpContext.GetExternalProviders();
|
|
|
|
|
return View(model);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
|
// GET: /Account/Register
|
|
|
|
|
[HttpGet]
|
|
|
|
|
public IActionResult Register()
|
|
|
|
|
{
|
|
|
|
|
return View();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
|
// POST: /Account/Register
|
|
|
|
|
[HttpPost]
|
|
|
|
|
[ValidateAntiForgeryToken]
|
|
|
|
|
public async Task<IActionResult> Register(RegisterViewModel model)
|
|
|
|
|
{
|
|
|
|
|
if (ModelState.IsValid)
|
|
|
|
|
{
|
|
|
|
|
var user = new ApplicationUser { UserName = model.Email, Email = model.Email };
|
|
|
|
|
var result = await _userManager.CreateAsync(user, model.Password);
|
|
|
|
|
if (result.Succeeded)
|
|
|
|
|
{
|
|
|
|
|
// For more information on how to enable account confirmation and password reset please visit http://go.microsoft.com/fwlink/?LinkID=532713
|
|
|
|
|
// Send an email with this link
|
|
|
|
|
var code = await _userManager.GenerateEmailConfirmationTokenAsync(user);
|
|
|
|
|
var callbackUrl = Url.Action("ConfirmEmail", "Account", new { userId = user.Id, code = code }, protocol: HttpContext.Request.Scheme);
|
|
|
|
|
await _emailSender.SendEmailAsync(_siteSettings, _smtpSettings, model.Email, "Confirm your account",
|
|
|
|
|
"Please confirm your account by clicking this link: <a href=\"" + callbackUrl + "\">link</a>");
|
|
|
|
|
// await _signInManager.SignInAsync(user, isPersistent: false);
|
|
|
|
|
_logger.LogInformation(3, "User created a new account with password.");
|
|
|
|
|
return RedirectToAction(nameof(HomeController.Index), "Home");
|
|
|
|
|
}
|
|
|
|
|
AddErrors(result);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// If we got this far, something failed, redisplay form
|
|
|
|
|
return View(model);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
|
// POST: /Account/LogOff
|
|
|
|
|
[HttpPost(Constants.LogoutPath)]
|
|
|
|
|
[ValidateAntiForgeryToken]
|
|
|
|
|
public async Task<IActionResult> LogOff(string returnUrl = null)
|
|
|
|
|
{
|
|
|
|
|
await _signInManager.SignOutAsync();
|
|
|
|
|
_logger.LogInformation(4, "User logged out.");
|
|
|
|
|
if (returnUrl == null) return RedirectToAction(nameof(HomeController.Index), "Home");
|
|
|
|
|
return Redirect(returnUrl);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
|
// GET: /Account/ExternalLoginCallback
|
|
|
|
|
[HttpGet]
|
|
|
|
|
public async Task<IActionResult> ExternalLoginCallback(string returnUrl = null)
|
|
|
|
|
{
|
|
|
|
|
var info = await _signInManager.GetExternalLoginInfoAsync();
|
|
|
|
|
if (info == null)
|
|
|
|
|
{
|
|
|
|
|
_logger.LogWarning("No external provider info found.");
|
|
|
|
|
return Redirect("~/signin"); // RedirectToAction(nameof(OAuthController.SignIn));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Sign in the user with this external login provider if the user already has a login.
|
|
|
|
|
var result = await _signInManager.ExternalLoginSignInAsync(info.LoginProvider, info.ProviderKey, isPersistent: false);
|
|
|
|
|
if (result.Succeeded)
|
|
|
|
|
{
|
|
|
|
|
_logger.LogInformation(5, "User logged in with {Name} provider.", info.LoginProvider);
|
|
|
|
|
|
|
|
|
|
return Redirect(returnUrl);
|
|
|
|
|
}
|
|
|
|
|
if (result.RequiresTwoFactor)
|
|
|
|
|
{
|
|
|
|
|
return RedirectToAction(nameof(SendCode), new { ReturnUrl = returnUrl });
|
|
|
|
|
}
|
|
|
|
|
if (result.IsLockedOut)
|
|
|
|
|
{
|
|
|
|
|
return View("Lockout");
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
// If the user does not have an account, then ask the user to create an account.
|
|
|
|
|
ViewData["ReturnUrl"] = returnUrl;
|
|
|
|
|
ViewData["LoginProvider"] = info.LoginProvider;
|
|
|
|
|
var email = info.ExternalPrincipal.FindFirstValue(ClaimTypes.Email);
|
|
|
|
|
var name = info.ExternalPrincipal.FindFirstValue(ClaimTypes.Name);
|
|
|
|
|
var avatar = info.ExternalPrincipal.FindFirstValue("urn:google:profile");
|
|
|
|
|
/* var phone = info.ExternalPrincipal.FindFirstValue(ClaimTypes.HomePhone);
|
|
|
|
|
var mobile = info.ExternalPrincipal.FindFirstValue(ClaimTypes.MobilePhone);
|
|
|
|
|
var postalcode = info.ExternalPrincipal.FindFirstValue(ClaimTypes.PostalCode);
|
|
|
|
|
var locality = info.ExternalPrincipal.FindFirstValue(ClaimTypes.Locality);
|
|
|
|
|
var country = info.ExternalPrincipal.FindFirstValue(ClaimTypes.Country);*/
|
|
|
|
|
foreach (var claim in info.ExternalPrincipal.Claims)
|
|
|
|
|
_logger.LogWarning("# {0} Claim: {1} {2}", info.LoginProvider, claim.Type, claim.Value);
|
|
|
|
|
|
|
|
|
|
var access_token = info.ExternalPrincipal.FindFirstValue("access_token");
|
|
|
|
|
var token_type = info.ExternalPrincipal.FindFirstValue("token_type");
|
|
|
|
|
var expires_in = info.ExternalPrincipal.FindFirstValue("expires_in");
|
|
|
|
|
|
|
|
|
|
return View("ExternalLoginConfirmation", new ExternalLoginConfirmationViewModel
|
|
|
|
|
{
|
|
|
|
|
Email = email,
|
|
|
|
|
Name = name
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
|
// POST: /Account/ExternalLoginConfirmation
|
|
|
|
|
[HttpPost]
|
|
|
|
|
[ValidateAntiForgeryToken]
|
|
|
|
|
public async Task<IActionResult> ExternalLoginConfirmation(ExternalLoginConfirmationViewModel model, string returnUrl = null)
|
|
|
|
|
{
|
|
|
|
|
if (User.IsSignedIn())
|
|
|
|
|
{
|
|
|
|
|
return RedirectToAction(nameof(ManageController.Index), "Manage");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (ModelState.IsValid)
|
|
|
|
|
{
|
|
|
|
|
// Get the information about the user from the external login provider
|
|
|
|
|
var info = await _signInManager.GetExternalLoginInfoAsync();
|
|
|
|
|
if (info == null)
|
|
|
|
|
{
|
|
|
|
|
return View("ExternalLoginFailure");
|
|
|
|
|
}
|
|
|
|
|
var user = new ApplicationUser { UserName = model.Name, Email = model.Email };
|
|
|
|
|
var result = await _userManager.CreateAsync(user);
|
|
|
|
|
if (result.Succeeded)
|
|
|
|
|
{
|
|
|
|
|
result = await _userManager.AddLoginAsync(user, info);
|
|
|
|
|
if (result.Succeeded)
|
|
|
|
|
{
|
|
|
|
|
await _signInManager.SignInAsync(user, isPersistent: false);
|
|
|
|
|
_logger.LogInformation(6, "User created an account using {Name} provider.", info.LoginProvider);
|
|
|
|
|
|
|
|
|
|
return Redirect(returnUrl);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
AddErrors(result);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ViewData["ReturnUrl"] = returnUrl;
|
|
|
|
|
return View(model);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// GET: /Account/ConfirmEmail
|
|
|
|
|
[HttpGet]
|
|
|
|
|
public async Task<IActionResult> ConfirmEmail(string userId, string code)
|
|
|
|
|
{
|
|
|
|
|
if (userId == null || code == null)
|
|
|
|
|
{
|
|
|
|
|
return View("Error");
|
|
|
|
|
}
|
|
|
|
|
var user = await _userManager.FindByIdAsync(userId);
|
|
|
|
|
if (user == null)
|
|
|
|
|
{
|
|
|
|
|
return View("Error");
|
|
|
|
|
}
|
|
|
|
|
var result = await _userManager.ConfirmEmailAsync(user, code);
|
|
|
|
|
return View(result.Succeeded ? "ConfirmEmail" : "Error");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
|
// GET: /Account/ForgotPassword
|
|
|
|
|
[HttpGet]
|
|
|
|
|
public IActionResult ForgotPassword()
|
|
|
|
|
{
|
|
|
|
|
return View();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
|
// POST: /Account/ForgotPassword
|
|
|
|
|
[HttpPost]
|
|
|
|
|
[ValidateAntiForgeryToken]
|
|
|
|
|
public async Task<IActionResult> ForgotPassword(ForgotPasswordViewModel model)
|
|
|
|
|
{
|
|
|
|
|
if (ModelState.IsValid)
|
|
|
|
|
{
|
|
|
|
|
var user = await _userManager.FindByNameAsync(model.Email);
|
|
|
|
|
if (user == null || !(await _userManager.IsEmailConfirmedAsync(user)))
|
|
|
|
|
{
|
|
|
|
|
// Don't reveal that the user does not exist or is not confirmed
|
|
|
|
|
return View("ForgotPasswordConfirmation");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// For more information on how to enable account confirmation and password reset please visit http://go.microsoft.com/fwlink/?LinkID=532713
|
|
|
|
|
// Send an email with this link
|
|
|
|
|
var code = await _userManager.GeneratePasswordResetTokenAsync(user);
|
|
|
|
|
var callbackUrl = Url.Action("ResetPassword", "Account", new { userId = user.Id, code = code }, protocol: HttpContext.Request.Scheme);
|
|
|
|
|
await _emailSender.SendEmailAsync(_siteSettings,_smtpSettings,model.Email, "Reset Password",
|
|
|
|
|
"Please reset your password by clicking here: <a href=\"" + callbackUrl + "\">link</a>");
|
|
|
|
|
return View("ForgotPasswordConfirmation");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// If we got this far, something failed, redisplay form
|
|
|
|
|
return View(model);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
|
// GET: /Account/ForgotPasswordConfirmation
|
|
|
|
|
[HttpGet]
|
|
|
|
|
public IActionResult ForgotPasswordConfirmation()
|
|
|
|
|
{
|
|
|
|
|
return View();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
|
// GET: /Account/ResetPassword
|
|
|
|
|
[HttpGet]
|
|
|
|
|
public IActionResult ResetPassword(string code = null)
|
|
|
|
|
{
|
|
|
|
|
return code == null ? View("Error") : View();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
|
// POST: /Account/ResetPassword
|
|
|
|
|
[HttpPost]
|
|
|
|
|
[ValidateAntiForgeryToken]
|
|
|
|
|
public async Task<IActionResult> ResetPassword(ResetPasswordViewModel model)
|
|
|
|
|
{
|
|
|
|
|
if (!ModelState.IsValid)
|
|
|
|
|
{
|
|
|
|
|
return View(model);
|
|
|
|
|
}
|
|
|
|
|
var user = await _userManager.FindByNameAsync(model.Email);
|
|
|
|
|
if (user == null)
|
|
|
|
|
{
|
|
|
|
|
// Don't reveal that the user does not exist
|
|
|
|
|
return RedirectToAction(nameof(AccountController.ResetPasswordConfirmation), "Account");
|
|
|
|
|
}
|
|
|
|
|
var result = await _userManager.ResetPasswordAsync(user, model.Code, model.Password);
|
|
|
|
|
if (result.Succeeded)
|
|
|
|
|
{
|
|
|
|
|
return RedirectToAction(nameof(AccountController.ResetPasswordConfirmation), "Account");
|
|
|
|
|
}
|
|
|
|
|
AddErrors(result);
|
|
|
|
|
return View();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
|
// GET: /Account/ResetPasswordConfirmation
|
|
|
|
|
[HttpGet]
|
|
|
|
|
public IActionResult ResetPasswordConfirmation()
|
|
|
|
|
{
|
|
|
|
|
return View();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
|
// GET: /Account/SendCode
|
|
|
|
|
[HttpGet, AllowAnonymous]
|
|
|
|
|
public async Task<ActionResult> SendCode(string returnUrl = null, bool rememberMe = false)
|
|
|
|
|
{
|
|
|
|
|
var user = await _signInManager.GetTwoFactorAuthenticationUserAsync();
|
|
|
|
|
if (user == null)
|
|
|
|
|
{
|
|
|
|
|
return View("Error", new Exception("No Two factor authentication user"));
|
|
|
|
|
}
|
|
|
|
|
var userFactors = await _userManager.GetValidTwoFactorProvidersAsync(user);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
var factorOptions = userFactors.Select(purpose => new SelectListItem { Text = purpose, Value = purpose }).ToList();
|
|
|
|
|
return View(new SendCodeViewModel { Providers = factorOptions, ReturnUrl = returnUrl, RememberMe = rememberMe });
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
|
// POST: /Account/SendCode
|
|
|
|
|
[HttpPost]
|
|
|
|
|
[ValidateAntiForgeryToken, AllowAnonymous]
|
|
|
|
|
public async Task<IActionResult> SendCode(SendCodeViewModel model)
|
|
|
|
|
{
|
|
|
|
|
if (!ModelState.IsValid)
|
|
|
|
|
{
|
|
|
|
|
return View();
|
|
|
|
|
}
|
|
|
|
|
var user = await _signInManager.GetTwoFactorAuthenticationUserAsync();
|
|
|
|
|
if (user == null)
|
|
|
|
|
{
|
|
|
|
|
return View("Error", new Exception("user is null"));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Generate the token and send it
|
|
|
|
|
var code = await _userManager.GenerateTwoFactorTokenAsync(user, model.SelectedProvider);
|
|
|
|
|
if (string.IsNullOrWhiteSpace(code))
|
|
|
|
|
{
|
|
|
|
|
return View("Error", new Exception("Code is empty"));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var message = "Your security code is: " + code;
|
|
|
|
|
if (model.SelectedProvider == Constants.MobileAppFactor)
|
|
|
|
|
{
|
|
|
|
|
return View("Error", new Exception("No SMS service was activated"));
|
|
|
|
|
}
|
|
|
|
|
else // if (model.SelectedProvider == Constants.EMailFactor || model.SelectedProvider == "Default" )
|
|
|
|
|
if (model.SelectedProvider == Constants.SMSFactor)
|
|
|
|
|
{
|
|
|
|
|
return View("Error", new Exception("No SMS service was activated"));
|
|
|
|
|
// await _smsSender.SendSmsAsync(_twilioSettings, await _userManager.GetPhoneNumberAsync(user), message);
|
|
|
|
|
}
|
|
|
|
|
else // if (model.SelectedProvider == Constants.EMailFactor || model.SelectedProvider == "Default" )
|
|
|
|
|
{
|
|
|
|
|
await _emailSender.SendEmailAsync(_siteSettings, _smtpSettings, await _userManager.GetEmailAsync(user), "Security Code", message);
|
|
|
|
|
}
|
|
|
|
|
return RedirectToAction(nameof(VerifyCode), new { Provider = model.SelectedProvider, ReturnUrl = model.ReturnUrl, RememberMe = model.RememberMe });
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
|
// GET: /Account/VerifyCode
|
|
|
|
|
[HttpGet]
|
|
|
|
|
public async Task<IActionResult> VerifyCode(string provider, bool rememberMe, string returnUrl = null)
|
|
|
|
|
{
|
|
|
|
|
// Require that the user has already logged in via username/password or external login
|
|
|
|
|
var user = await _signInManager.GetTwoFactorAuthenticationUserAsync();
|
|
|
|
|
if (user == null)
|
|
|
|
|
{
|
|
|
|
|
return View("Error", new Exception("user is null"));
|
|
|
|
|
}
|
|
|
|
|
return View(new VerifyCodeViewModel { Provider = provider, ReturnUrl = returnUrl, RememberMe = rememberMe });
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
|
// POST: /Account/VerifyCode
|
|
|
|
|
[HttpPost]
|
|
|
|
|
[ValidateAntiForgeryToken]
|
|
|
|
|
public async Task<IActionResult> VerifyCode(VerifyCodeViewModel model)
|
|
|
|
|
{
|
|
|
|
|
if (!ModelState.IsValid)
|
|
|
|
|
{
|
|
|
|
|
return View(model);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// The following code protects for brute force attacks against the two factor codes.
|
|
|
|
|
// If a user enters incorrect codes for a specified amount of time then the user account
|
|
|
|
|
// will be locked out for a specified amount of time.
|
|
|
|
|
_logger.LogWarning("Signin with code: {0} {1}", model.Provider, model.Code);
|
|
|
|
|
var result = await _signInManager.TwoFactorSignInAsync(model.Provider, model.Code, model.RememberMe, model.RememberBrowser);
|
|
|
|
|
if (result.Succeeded)
|
|
|
|
|
{
|
|
|
|
|
ViewData["StatusMessage"] = "Your code was verified";
|
|
|
|
|
_logger.LogInformation($"Signed in. returning to {model.ReturnUrl}");
|
|
|
|
|
return Redirect(model.ReturnUrl);
|
|
|
|
|
}
|
|
|
|
|
if (result.IsLockedOut)
|
|
|
|
|
{
|
|
|
|
|
_logger.LogWarning(7, "User account locked out.");
|
|
|
|
|
return View("Lockout");
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
ModelState.AddModelError("", "Code invalide ");
|
|
|
|
|
return View(model);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
[HttpGet, Authorize]
|
|
|
|
|
public IActionResult Delete()
|
|
|
|
|
{
|
|
|
|
|
return View();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
[HttpPost, Authorize]
|
|
|
|
|
public async Task<IActionResult> Delete(UnregisterViewModel model)
|
|
|
|
|
{
|
|
|
|
|
if (!ModelState.IsValid)
|
|
|
|
|
{
|
|
|
|
|
return View(model);
|
|
|
|
|
}
|
|
|
|
|
var user = await _userManager.FindByIdAsync(User.GetUserId());
|
|
|
|
|
var result = await _userManager.DeleteAsync(user);
|
|
|
|
|
if (!result.Succeeded)
|
|
|
|
|
{
|
|
|
|
|
AddErrors(result);
|
|
|
|
|
return new BadRequestObjectResult(ModelState);
|
|
|
|
|
}
|
|
|
|
|
await _signInManager.SignOutAsync();
|
|
|
|
|
|
|
|
|
|
return RedirectToAction("Index", "Home");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#region Helpers
|
|
|
|
|
|
|
|
|
|
private void AddErrors(IdentityResult result)
|
|
|
|
|
{
|
|
|
|
|
foreach (var error in result.Errors)
|
|
|
|
|
{
|
|
|
|
|
ModelState.AddModelError(string.Empty, error.Description);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private async Task<ApplicationUser> GetCurrentUserAsync()
|
|
|
|
|
{
|
|
|
|
|
return await _userManager.FindByIdAsync(HttpContext.User.GetUserId());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#endregion
|
|
|
|
|
}
|
|
|
|
|
}
|