* Removed and Reordered the using statements * Removed and Reordered the usings inside Web Project * Removed and Reordered the usings inside PublicApi project * Removed Unused usings and reorganized usings inside Infrastructure project
51 lines
1.6 KiB
C#
51 lines
1.6 KiB
C#
using Microsoft.eShopWeb.ApplicationCore.Constants;
|
|
using Microsoft.IdentityModel.Tokens;
|
|
using System;
|
|
using System.Collections.Generic;
|
|
using System.IdentityModel.Tokens.Jwt;
|
|
using System.Security.Claims;
|
|
using System.Text;
|
|
|
|
namespace Microsoft.eShopWeb.FunctionalTests.Web.Api
|
|
{
|
|
public class ApiTokenHelper
|
|
{
|
|
public static string GetAdminUserToken()
|
|
{
|
|
string userName = "admin@microsoft.com";
|
|
string[] roles = { "Administrators" };
|
|
|
|
return CreateToken(userName, roles);
|
|
}
|
|
|
|
public static string GetNormalUserToken()
|
|
{
|
|
string userName = "demouser@microsoft.com";
|
|
string[] roles = { };
|
|
|
|
return CreateToken(userName, roles);
|
|
}
|
|
|
|
private static string CreateToken(string userName, string[] roles)
|
|
{
|
|
var claims = new List<Claim> { new Claim(ClaimTypes.Name, userName) };
|
|
|
|
foreach (var role in roles)
|
|
{
|
|
claims.Add(new Claim(ClaimTypes.Role, role));
|
|
}
|
|
|
|
var key = Encoding.ASCII.GetBytes(AuthorizationConstants.JWT_SECRET_KEY);
|
|
var tokenDescriptor = new SecurityTokenDescriptor
|
|
{
|
|
Subject = new ClaimsIdentity(claims.ToArray()),
|
|
Expires = DateTime.UtcNow.AddHours(1),
|
|
SigningCredentials = new SigningCredentials(new SymmetricSecurityKey(key), SecurityAlgorithms.HmacSha256Signature)
|
|
};
|
|
var tokenHandler = new JwtSecurityTokenHandler();
|
|
var token = tokenHandler.CreateToken(tokenDescriptor);
|
|
return tokenHandler.WriteToken(token);
|
|
}
|
|
}
|
|
}
|