comments galore
This commit is contained in:
@@ -1,4 +1,5 @@
|
||||
|
||||
// system usings
|
||||
using Microsoft.AspNetCore.HttpOverrides;
|
||||
using Microsoft.EntityFrameworkCore;
|
||||
using Microsoft.AspNetCore.Authentication.JwtBearer;
|
||||
@@ -7,23 +8,27 @@ using Microsoft.AspNetCore.Identity;
|
||||
using Microsoft.AspNetCore.Identity.EntityFrameworkCore;
|
||||
using System.Text;
|
||||
|
||||
// homeburger usings
|
||||
using agologumApi.Models;
|
||||
using agologumApi.Services;
|
||||
|
||||
var builder = WebApplication.CreateBuilder(args);
|
||||
|
||||
// make sure the jwt key exists or else abort, security issue
|
||||
var key = builder.Configuration["Jwt:Key"];
|
||||
if(key == null) return;
|
||||
|
||||
// connect to the sql database
|
||||
builder.Services.AddDbContext<AppDbContext>(options =>
|
||||
options.UseNpgsql(builder.Configuration.GetConnectionString("DefaultConnection")));
|
||||
|
||||
builder.Services.AddControllers();
|
||||
|
||||
// services
|
||||
// add our services
|
||||
builder.Services.AddScoped<UserService>();
|
||||
builder.Services.AddScoped<ItemService>();
|
||||
builder.Services.AddScoped<JwtService>();
|
||||
// if this grows sufficiently large we can put elsewhere
|
||||
|
||||
// configuration for jwt authentication
|
||||
builder.Services.AddIdentity<User, IdentityRole>()
|
||||
@@ -46,6 +51,8 @@ builder.Services.AddAuthentication(options => {
|
||||
};
|
||||
});
|
||||
|
||||
// authorization configurations; here's where we register our permissions to policies
|
||||
// TODO: this suspiciously looks able to be automated through a for loop, only if we can have a static dictionary maybe though?
|
||||
builder.Services.AddAuthorization(options => {
|
||||
|
||||
options.AddPolicy(Permission.SensitiveData_Read, policy =>
|
||||
@@ -70,6 +77,7 @@ builder.Services.Configure<ForwardedHeadersOptions>(options =>
|
||||
// Learn more about configuring OpenAPI at https://aka.ms/aspnet/openapi
|
||||
builder.Services.AddOpenApi();
|
||||
|
||||
// cors; scary needs to be fixed
|
||||
builder.Services.AddCors(options =>
|
||||
{
|
||||
options.AddPolicy("dev",
|
||||
@@ -78,17 +86,14 @@ builder.Services.AddCors(options =>
|
||||
policy.AllowAnyOrigin()
|
||||
.AllowAnyHeader()
|
||||
.AllowAnyMethod();
|
||||
});
|
||||
}); // TODO: scary please fix this
|
||||
});
|
||||
|
||||
// more middleware; probably uncessary at this stage
|
||||
builder.Services.AddEndpointsApiExplorer();
|
||||
builder.Services.AddSwaggerGen();
|
||||
|
||||
// https://www.reddit.com/r/dotnet/comments/1h7vzbs/how_do_you_guys_handle_authorization_on_a_web_api/
|
||||
// add authorization here
|
||||
// controllers will have endpoints based on authorization
|
||||
// frontend is a different story
|
||||
|
||||
// build app
|
||||
var app = builder.Build();
|
||||
|
||||
app.UseForwardedHeaders();
|
||||
@@ -121,17 +126,6 @@ using (var scope = app.Services.CreateScope()) {
|
||||
}
|
||||
}
|
||||
|
||||
// TODO: abstract this away
|
||||
// auto seed Identity roles
|
||||
var roleManager = scope.ServiceProvider.GetRequiredService<RoleManager<IdentityRole>>();
|
||||
string[] roles = { "guest", "user", "dev", "mod", "admin", "superuser", "role1", "role2" };
|
||||
foreach(string role in roles) {
|
||||
if(!await roleManager.RoleExistsAsync(role)) {
|
||||
await roleManager.CreateAsync(new IdentityRole(role));
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
}
|
||||
|
||||
app.Run();
|
||||
|
||||
Reference in New Issue
Block a user