gpt4 book ai didi

c# - JWT token 错误 401 在 .net core 3.1 中未经授权

转载 作者:行者123 更新时间:2023-12-03 22:46:34 27 4
gpt4 key购买 nike

我正在学习 DDD 和 JWT,所以我考虑在我的应用程序中使用两者。
问题是这样开始的。
当我使用用户名和密码进行请求时,api 返回 token ,但是当我将其放入 postman 的标题状态 401 时。

我试过把http和https。

登录 Controller .cs

using System;
using Microsoft.AspNetCore.Authorization;
using Microsoft.AspNetCore.Mvc;
using Grp.Domain.Entities;
using Grp.Service.Services;

namespace Grp.Api.Controllers
{
[Route("api/[controller]")]
[ApiController]
public class LoginController : ControllerBase
{
private readonly LoginService _loginService;
private readonly RepresentanteService _representanteService;
public LoginController(LoginService loginService,
RepresentanteService representanteService)
{
_loginService = loginService;
_representanteService = representanteService;
}

// POST: api/Login
[HttpPost]
[AllowAnonymous]
public ActionResult<dynamic> Authenticate([FromBody]Representante representante)
{
try
{
representante.Senha = _representanteService.CriptografarSenha(representante.Senha);
var usuarioValido = _loginService.UsuarioValido(representante);

if (!usuarioValido)
return BadRequest(new { message = "Usuário ou senha inválidos" });


var token = TokenService.GenerateToken(representante);
representante.Senha = "";

return new
{
representante,
token
};
}
catch (Exception ex)
{
return BadRequest(ex);
}
}
}
}

客户端 Controller .cs
using System;
using Microsoft.AspNetCore.Authorization;
using Microsoft.AspNetCore.Mvc;
using Grp.Domain.Entities;
using Grp.Service.Services;
using Grp.Service.Validators;

namespace OpersanEM.Api.Controllers
{
[Authorize]
[Route("api/[controller]")]
[ApiController]
public class ClientesController : ControllerBase
{
private readonly BaseService<Cliente> _service;
public ClientesController(BaseService<Cliente> service)
{
_service = service;
}
// GET: api/Clientes
[HttpGet]
public IActionResult Get()
{
try
{
return new ObjectResult(_service.Get());
}
catch (Exception ex)
{
return BadRequest(ex.Message);
}
}

// GET: api/Clientes/5
[HttpGet("{id}")]
public IActionResult Get(int id)
{
try
{
return new ObjectResult(_service.Get(id));
}
catch (ArgumentException ex)
{
return NotFound(ex);
}
catch (Exception ex)
{
return BadRequest(ex.Message);
}
}

// POST: api/Clientes
[HttpPost]
public IActionResult Post([FromBody] Cliente item)
{
try
{
_service.Post<ClienteValidator>(item);

return new ObjectResult(item.Id);
}
catch (ArgumentNullException ex)
{
return NotFound(ex);
}
catch (Exception ex)
{
return BadRequest(ex.Message);
}
}

// PUT: api/Clientes/5
[HttpPut("{id}")]
public IActionResult Put([FromBody] Cliente item)
{
try
{
_service.Put<ClienteValidator>(item);

return new ObjectResult(item);
}
catch (ArgumentNullException ex)
{
return NotFound(ex);
}
catch (Exception ex)
{
return BadRequest(ex.Message);
}
}

// DELETE: api/ApiWithActions/5
[HttpDelete("{id}")]
public IActionResult Delete(int id)
{
try
{
_service.Delete(id);

return new NoContentResult();
}
catch (ArgumentException ex)
{
return NotFound(ex);
}
catch (Exception ex)
{
return BadRequest(ex.Message);
}
}
}
}

启动文件
using Microsoft.AspNetCore.Authentication.JwtBearer;
using Microsoft.AspNetCore.Builder;
using Microsoft.AspNetCore.Hosting;
using Microsoft.AspNetCore.Mvc;
using Microsoft.Extensions.Configuration;
using Microsoft.Extensions.DependencyInjection;
using Microsoft.Extensions.Hosting;
using Microsoft.IdentityModel.Tokens;
using Grp.Domain.Entities;
using Grp.Infra.CrossCutting;
using Grp.Infra.Data.Context;
using Grp.Infra.Data.Repository;
using Grp.Service.Services;
using System.Text;

namespace Grp.Api
{
public class Startup
{
public Startup(IConfiguration configuration)
{
Configuration = configuration;
}

public IConfiguration Configuration { get; }

// This method gets called by the runtime. Use this method to add services to the container.
public void ConfigureServices(IServiceCollection services)
{
services.AddCors();
services.AddControllers();

var key = Encoding.ASCII.GetBytes(Settings.Secret);
services.AddAuthentication(x =>
{
x.DefaultAuthenticateScheme = JwtBearerDefaults.AuthenticationScheme;
x.DefaultChallengeScheme = JwtBearerDefaults.AuthenticationScheme;
})
.AddJwtBearer(x =>
{
x.RequireHttpsMetadata = false;
x.SaveToken = true;
x.TokenValidationParameters = new TokenValidationParameters
{
ValidateIssuerSigningKey = true,
IssuerSigningKey = new SymmetricSecurityKey(key),
ValidateIssuer = false,
ValidateAudience = false
};
});

services.AddMvc().SetCompatibilityVersion(CompatibilityVersion.Version_3_0);
services.AddScoped<SqlContext, SqlContext>();

services.AddScoped<BaseRepository<Cliente>>();
services.AddScoped<BaseRepository<Representante>>();

services.AddScoped<BaseService<Cliente>>();
services.AddScoped<BaseService<Representante>>();
services.AddScoped<RepresentanteService>();
services.AddScoped<LoginService>();

services.AddScoped<StringCipher>();


}

// This method gets called by the runtime. Use this method to configure the HTTP request pipeline.
public void Configure(IApplicationBuilder app, IWebHostEnvironment env)
{
if (env.IsDevelopment())
{
app.UseDeveloperExceptionPage();
}

app.UseStaticFiles();
app.UseRouting();

app.UseCors(x => x
.AllowAnyOrigin()
.AllowAnyMethod()
.AllowAnyHeader());

app.UseAuthentication();
app.UseAuthorization();


app.UseEndpoints(endpoints =>
{
endpoints.MapControllerRoute("default", "{controller=Home}/{action=Index}");
});
}
}
}

token 服务.cs
using Microsoft.IdentityModel.Tokens;
using Grp.Domain.Entities;
using System;
using System.IdentityModel.Tokens.Jwt;
using System.Security.Claims;
using System.Text;

namespace Grp.Service.Services
{
public static class TokenService
{
public static string GenerateToken(Representante representante)
{
var tokenHandler = new JwtSecurityTokenHandler();
var key = Encoding.ASCII.GetBytes(Settings.Secret);
var tokenDescriptor = new SecurityTokenDescriptor
{
Subject = new ClaimsIdentity(new Claim[]
{
new Claim(ClaimTypes.Name, representante.Nome)
}),
Expires = DateTime.UtcNow.AddDays(2),
SigningCredentials = new SigningCredentials(new SymmetricSecurityKey(key), SecurityAlgorithms.HmacSha256Signature)
};
var token = tokenHandler.CreateToken(tokenDescriptor);
return tokenHandler.WriteToken(token);
}
}
}

最佳答案

你找到解决办法了吗?我在同一个问题上滚动了一段时间。最后我解决了它添加[Authorize(AuthenticationSchemes=JwtBearerDefaults.AuthenticationScheme)]在我的 Controller 的装饰器中。
希望它会在某个时候帮助某人:)
编辑:
如果您不想在每个 Controller 中设置方案,请在 Startup.cs ConfigureServices 中进行配置

        services.AddAuthorization(options =>
{
var defaultAuthorizationPolicyBuilder = new AuthorizationPolicyBuilder(
JwtBearerDefaults.AuthenticationScheme);

defaultAuthorizationPolicyBuilder =
defaultAuthorizationPolicyBuilder.RequireAuthenticatedUser();

options.DefaultPolicy = defaultAuthorizationPolicyBuilder.Build();
});

关于c# - JWT token 错误 401 在 .net core 3.1 中未经授权,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/60784211/

27 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com