基于这个WebAPI,我编写了两个非常受支持的本教程。现在的问题是,我还没有对IoC/DI的需求,但我正在编写一个Web,并试图从根本上整合它。
我对存储库/服务/工作单元模式有很好的处理能力,但是在移植标识部分时会出现错误。特别是使用OAuthConfiguration类启动时,如下所示:
误差
None of the constructors found with 'Autofac.Core.Activators.Reflection.DefaultConstructorFinder' on type 'Vender.Providers.AuthorizationServerProvider' can be invoked with the available services and parameters:
Cannot resolve parameter 'Vender.Services.ApplicationClientService appClientsService' of constructor 'Void .ctor(Vender.Services.ApplicationClientService, Vender.Data.Context.ApplicationUserManager)'.
带有异常的方法(当它试图解决这两个提供程序时,会给出上述错误)
public static void ConfigTokenGeneration(IAppBuilder app, IContainer container)
{
app.CreatePerOwinContext(ApplicationDbContext.Create);
var oAuthServerOptions = new OAuthAuthorizationServerOptions()
{
AllowInsecureHttp = ApiSettings.AllowInsecureHttp,
TokenEndpointPath = new PathString("/token"),
AccessTokenExpireTimeSpan = TimeSpan.FromMinutes(ApiSettings.AccessTokenValidTime),
Provider = container.Resolve<IOAuthAuthorizationServerProvider>(),
AccessTokenFormat = new JwtFormatProvider(ApiSettings.ApiAddress),
RefreshTokenProvider = container.Resolve<IAuthenticationTokenProvider>()
};
app.UseOAuthAuthorizationServer(oAuthServerOptions);
}
类(除外)
public class AuthorizationServerProvider : OAuthAuthorizationServerProvider
{
private readonly ApplicationClientService _appClientsService;
private readonly ApplicationUserManager _userManager;
public AuthorizationServerProvider(ApplicationClientService appClientsService,
ApplicationUserManager userManager)
{
_appClientsService = appClientsService;
_userManager = userManager;
}
public override Task ValidateClientAuthentication(OAuthValidateClientAuthenticationContext context)
{
string clientId;
string clientSecret;
if (!context.TryGetBasicCredentials(out clientId, out clientSecret))
{
context.TryGetFormCredentials(out clientId, out clientSecret);
}
if (context.ClientId == null)
{
//Remove the comments from the below line context.SetError, and invalidate context
//if you want to force sending clientId/secrets once obtain access tokens.
context.Validated();
context.SetError("invalid_clientId", "ClientId should be sent.");
return Task.FromResult<object>(null);
}
var client = _appClientsService.FindApplicationClient(context.ClientId);
if (client == null)
{
context.SetError("invalid_clientId", $"Client '{context.ClientId}' is not registered in the system.");
return Task.FromResult<object>(null);
}
if (client.ApplicationType == ApplicationTypes.NativeConfidential)
{
if (string.IsNullOrWhiteSpace(clientSecret))
{
context.SetError("invalid_clientId", "Client secret should be sent.");
return Task.FromResult<object>(null);
}
else
{
if (client.Secret != Hash.FromString(clientSecret))
{
context.SetError("invalid_clientId", "Client secret is invalid.");
return Task.FromResult<object>(null);
}
}
}
if (!client.Active)
{
context.SetError("invalid_clientId", "Client is inactive.");
return Task.FromResult<object>(null);
}
context.OwinContext.Set<string>("as:clientAllowedOrigin", client.AllowedOrigin);
context.OwinContext.Set<string>("as:clientRefreshTokenLifeTime", client.RefreshTokenLifeTime.ToString());
context.Validated();
return Task.FromResult<object>(null);
}
public override async Task GrantResourceOwnerCredentials(OAuthGrantResourceOwnerCredentialsContext context)
{
var allowedOrigin = context.OwinContext.Get<string>("as:clientAllowedOrigin") ?? "*";
context.OwinContext.Response.Headers.Add("Access-Control-Allow-Origin", new[] { allowedOrigin });
IDictionary<string, string> userData = new Dictionary<string, string>();
var user = await _userManager.FindAsync(context.UserName, context.Password);
if (user == null)
{
context.SetError("invalid_grant", "apiError.invalidUsernameOrPassword");
return;
}
var oAuthIdentity = await user.GenerateUserIdentityAsync(_userManager, "JWT");
var userProps = new AuthenticationProperties(userData);
var ticket = new AuthenticationTicket(oAuthIdentity, userProps);
context.Validated(ticket);
/*
// Get userManager to test credentials against
//
var userManager = context.OwinContext.GetUserManager<ApplicationUserManager>();
// find user by username first
ApplicationUser user = await userManager.FindByEmailAsync(context.UserName);
if (user != null)
{
var validCredentials = await userManager.FindAsync(context.UserName, context.Password);
if (await userManager.IsLockedOutAsync(user.Id))
{
context.SetError("invalid_grant", "This account has been locked out. Please come back later.");
return;
}
else if (await userManager.GetLockoutEnabledAsync(user.Id) && validCredentials == null)
{
// Record the failure which also may cause the user to be locked out
await userManager.AccessFailedAsync(user.Id);
string message;
if (await userManager.IsLockedOutAsync(user.Id))
{
message = "apiError.accountLockout";
}
else
{
int accessFailedCount = await userManager.GetAccessFailedCountAsync(user.Id);
int attemptsLeft = Convert.ToInt32(ConfigurationManager.AppSettings["MaxFailedAccessAttemptsBeforeLockout"].ToString()) - accessFailedCount;
message = string.Format("apiError.lockoutAttempts{0}", attemptsLeft);
}
context.SetError("invalid_grant", message);
return;
}
else if (validCredentials == null)
{
context.SetError("invalid_grant", "Invalid username or password, please try again.");
return;
}
else
{
if (!user.EmailConfirmed)
{
context.SetError("invalid_grant", "Email has not yet been confirmed.");
return;
}
user.LastLoginDateUtc = System.DateTime.UtcNow;
user.SuccessLoginCount++;
var loginInfo = new LoginTracker();
loginInfo.ApplicationUser = user;
loginInfo.LoginTimeUtc = DateTime.UtcNow;
}
}
else
{
context.SetError("invalid_grant", "Invalid username or password, please try again.");
return;
}
*/
}
public override Task TokenEndpoint(OAuthTokenEndpointContext context)
{
foreach (KeyValuePair<string, string> property in context.Properties.Dictionary)
{
context.AdditionalResponseParameters.Add(property.Key, property.Value);
}
return Task.FromResult<object>(null);
}
}
AutoFac Builder
private static IContainer RegisterServices(ContainerBuilder builder)
{
builder.RegisterApiControllers(Assembly.GetExecutingAssembly());
// EF HomeCinemaContext
builder.RegisterType < ApplicationDbContext>()
.As<DbContext>()
.InstancePerRequest();
builder.RegisterType<DbFactory>()
.As<IDbFactory>()
.InstancePerRequest();
builder.RegisterType<UnitOfWork>()
.As<IUnitOfWork>()
.InstancePerRequest();
builder.RegisterGeneric(typeof(EntityBaseRepository<>))
.As(typeof(IEntityBaseRepository<>))
.InstancePerRequest();
builder.RegisterType<ApplicationUserManager>()
.SingleInstance();
builder.RegisterType<AddressService>()
.As<IAddressService>()
.InstancePerRequest();
builder.RegisterType<ApplicationClientService>()
.As<IApplicationClientService>()
.InstancePerRequest();
builder.RegisterType<RefreshTokenService>()
.As<IRefreshTokenService>()
.InstancePerRequest();
builder.RegisterType<AuthorizationServerProvider>()
.AsImplementedInterfaces<IOAuthAuthorizationServerProvider, ConcreteReflectionActivatorData>().SingleInstance();
builder.RegisterType<RefreshTokenProvider>()
.AsImplementedInterfaces<IAuthenticationTokenProvider, ConcreteReflectionActivatorData>().SingleInstance();
Container = builder.Build();
return Container;
}
应用程序管理器类
public class ApplicationUserManager : UserManager<ApplicationUser>
{
public ApplicationUserManager(ApplicationDbContext identityContext)
: base(new UserStore<ApplicationUser>(identityContext))
{
}
public ApplicationUserManager(IUserStore<ApplicationUser> store, IDataProtectionProvider dataProtectionProvider)
: base(store)
{
UserValidator = new UserValidator<ApplicationUser>(this)
{
AllowOnlyAlphanumericUserNames = false,
RequireUniqueEmail = true
};
// Configure validation logic for passwords
PasswordValidator = new PasswordValidator
{
RequiredLength = 6,
RequireNonLetterOrDigit = false,
RequireDigit = true,
RequireLowercase = true,
RequireUppercase = true,
};
// Configure user lockout defaults
UserLockoutEnabledByDefault = false;
//DefaultAccountLockoutTimeSpan = TimeSpan.FromMinutes(5);
//MaxFailedAccessAttemptsBeforeLockout = 5;
// Register two factor authentication providers. This application uses Phone and Emails as a step of receiving a code for verifying the user
// You can write your own provider and plug it in here.
RegisterTwoFactorProvider("Phone Code", new PhoneNumberTokenProvider<ApplicationUser>
{
MessageFormat = "Your security code is {0}"
});
RegisterTwoFactorProvider("Email Code", new EmailTokenProvider<ApplicationUser>
{
Subject = "Security Code",
BodyFormat = "Your security code is {0}"
});
UserTokenProvider = new DataProtectorTokenProvider<ApplicationUser>(dataProtectionProvider.Create("ASP.NET Identity"));
}
}
应用程序客户端服务类
public class ApplicationClientService : IApplicationClientService
{
private readonly IEntityBaseRepository<ApplicationClient> _appClientRepository;
private readonly IUnitOfWork _unitOfWork;
public ApplicationClientService(IEntityBaseRepository<ApplicationClient> appClientRepository,
IUnitOfWork unitOfWork)
{
_appClientRepository = appClientRepository;
_unitOfWork = unitOfWork;
}
public async Task<bool> CreateApplicationClientAsync(ApplicationClient newToken)
{
_appClientRepository.Add(newToken);
return await _unitOfWork.CommitAsync() > 0;
}
public Task<ApplicationClient> FindApplicationClientAsync(string clientId)
{
var refreshToken = _appClientRepository.GetAll().FirstOrDefault(x => x.ClientId == clientId);
return Task.FromResult(refreshToken);
}
public ApplicationClient FindApplicationClient(string clientId)
{
var refreshToken = _appClientRepository.GetAll().FirstOrDefault(x => x.ClientId == clientId);
return refreshToken;
}
}
应用客户端服务接口
public interface IApplicationClientService
{
Task<bool> CreateApplicationClientAsync(ApplicationClient newToken);
ApplicationClient FindApplicationClient(string clientId);
}
现在我已经在googled上搜索了我的智慧结束,没有发现任何特别有用的东西,我想知道在这里我需要做些什么来修复我的接口/类,以便当oAuthServerOptions被实例化时它们可以被解析。
发布于 2016-02-16 09:33:04
我解决了这个问题,使用这个实现,对于AutoFac生成器,您应该创建所有的单个实例,因为预请求依赖错误。
var builder = new ContainerBuilder();
var config = GlobalConfiguration.Configuration;
builder.RegisterApiControllers(Assembly.GetExecutingAssembly());
builder.RegisterType<UnitOfWork>().As<IUnitOfWork>().SingleInstance();
builder.RegisterType<DbFactory>().As<IDbFactory>().SingleInstance();
builder.RegisterType<ApplicationDbContext>().AsSelf().SingleInstance();
// rest of code as singleInstance
builder.Register<IdentityFactoryOptions<ApplicationUserManager>>(c => new IdentityFactoryOptions<ApplicationUserManager>() { DataProtectionProvider = new DpapiDataProtectionProvider("Elhag.WebAPI") });
builder.RegisterType<ApplicationUserManager>().AsSelf().SingleInstance();
builder.Register(c=>new AuthorizationServerProvider(c.Resolve<ApplicationUserManager>())).AsImplementedInterfaces().SingleInstance();
builder.Register(c => new UserStore<ApplictionUser>(c.Resolve<ApplicationDbContext>())).AsImplementedInterfaces().SingleInstance();
builder.Register(c => HttpContext.Current.GetOwinContext().Authentication).As<IAuthenticationManager>();
IContainer container = builder.Build();
config.DependencyResolver = new AutofacWebApiDependencyResolver(container);
return container;
你可以解决所有你需要的依赖,但不要直接使用容器,根据autofac网站,你应该使用容器lifeTimeScope,所以我将使用container.BeginLifetimeScope().Resolve<,您的类型>();
var oAuthServerOptions = new OAuthAuthorizationServerOptions()
{
AllowInsecureHttp = ApiSettings.AllowInsecureHttp,
TokenEndpointPath = new PathString("/token"),
AccessTokenExpireTimeSpan = TimeSpan.FromMinutes(ApiSettings.AccessTokenValidTime),
Provider = container.BeginLifetimeScope().Resolve<IOAuthAuthorizationServerProvider>(),
AccessTokenFormat = new JwtFormatProvider(ApiSettings.ApiAddress),
RefreshTokenProvider = container.BeginLifetimeScope().Resolve<IAuthenticationTokenProvider>()
};
我测试和工作很好..。希望能帮上忙
https://stackoverflow.com/questions/35185159
复制相似问题