【问题标题】:JWT token error 401 Unauthorized in .net core 3.1JWT 令牌错误 401 Unauthorized in .net core 3.1
【发布时间】:2020-07-02 04:24:44
【问题描述】:

我正在学习 DDD 和 JWT,所以我考虑在我的应用程序中同时使用这两种方法。 问题是这样开始的。 当我使用用户名和密码进行请求时,api返回令牌,但是当我把它放在邮递员的标题状态401中时。

我试过把 http 和 https 放在一起。

LoginController.cs

using System;
using Microsoft.AspNetCore.Authorization;
using Microsoft.AspNetCore.Mvc;
using Grp.Domain.Entities;
using Grp.Service.Services;

namespace Grp.Api.Controllers
{
    [Route("api/[controller]")]
    [ApiController]
    public class LoginController : ControllerBase
    {
        private readonly LoginService _loginService;
        private readonly RepresentanteService _representanteService;
        public LoginController(LoginService loginService,
            RepresentanteService representanteService)
        {
            _loginService = loginService;
            _representanteService = representanteService;
        }

        // POST: api/Login
        [HttpPost]
        [AllowAnonymous]
        public ActionResult<dynamic> Authenticate([FromBody]Representante representante)
        {
            try
            {
                representante.Senha = _representanteService.CriptografarSenha(representante.Senha);
                var usuarioValido = _loginService.UsuarioValido(representante);

                if (!usuarioValido)
                    return BadRequest(new { message = "Usuário ou senha inválidos" });


                var token = TokenService.GenerateToken(representante);
                representante.Senha = "";

                return new
                {
                    representante,
                    token
                };
            }
            catch (Exception ex)
            {
                return BadRequest(ex);
            }
        }
    }
}

ClientesController.cs

using System;
using Microsoft.AspNetCore.Authorization;
using Microsoft.AspNetCore.Mvc;
using Grp.Domain.Entities;
using Grp.Service.Services;
using Grp.Service.Validators;

namespace OpersanEM.Api.Controllers
{
    [Authorize]
    [Route("api/[controller]")]
    [ApiController]
    public class ClientesController : ControllerBase
    {
        private readonly BaseService<Cliente> _service;
        public ClientesController(BaseService<Cliente> service)
        {
            _service = service;
        }
        // GET: api/Clientes
        [HttpGet]
        public IActionResult Get()
        {
            try
            {
                return new ObjectResult(_service.Get());
            }
            catch (Exception ex)
            {
                return BadRequest(ex.Message);
            }
        }

        // GET: api/Clientes/5
        [HttpGet("{id}")]
        public IActionResult Get(int id)
        {
            try
            {
                return new ObjectResult(_service.Get(id));
            }
            catch (ArgumentException ex)
            {
                return NotFound(ex);
            }
            catch (Exception ex)
            {
                return BadRequest(ex.Message);
            }
        }

        // POST: api/Clientes
        [HttpPost]
        public IActionResult Post([FromBody] Cliente item)
        {
            try
            {
                _service.Post<ClienteValidator>(item);

                return new ObjectResult(item.Id);
            }
            catch (ArgumentNullException ex)
            {
                return NotFound(ex);
            }
            catch (Exception ex)
            {
                return BadRequest(ex.Message);
            }
        }

        // PUT: api/Clientes/5
        [HttpPut("{id}")]
        public IActionResult Put([FromBody] Cliente item)
        {
            try
            {
                _service.Put<ClienteValidator>(item);

                return new ObjectResult(item);
            }
            catch (ArgumentNullException ex)
            {
                return NotFound(ex);
            }
            catch (Exception ex)
            {
                return BadRequest(ex.Message);
            }
        }

        // DELETE: api/ApiWithActions/5
        [HttpDelete("{id}")]
        public IActionResult Delete(int id)
        {
            try
            {
                _service.Delete(id);

                return new NoContentResult();
            }
            catch (ArgumentException ex)
            {
                return NotFound(ex);
            }
            catch (Exception ex)
            {
                return BadRequest(ex.Message);
            }
        }
    }
}

Startup.cs

using Microsoft.AspNetCore.Authentication.JwtBearer;
using Microsoft.AspNetCore.Builder;
using Microsoft.AspNetCore.Hosting;
using Microsoft.AspNetCore.Mvc;
using Microsoft.Extensions.Configuration;
using Microsoft.Extensions.DependencyInjection;
using Microsoft.Extensions.Hosting;
using Microsoft.IdentityModel.Tokens;
using Grp.Domain.Entities;
using Grp.Infra.CrossCutting;
using Grp.Infra.Data.Context;
using Grp.Infra.Data.Repository;
using Grp.Service.Services;
using System.Text;

namespace Grp.Api
{
    public class Startup
    {
        public Startup(IConfiguration configuration)
        {
            Configuration = configuration;
        }

        public IConfiguration Configuration { get; }

        // This method gets called by the runtime. Use this method to add services to the container.
        public void ConfigureServices(IServiceCollection services)
        {
            services.AddCors();
            services.AddControllers();

            var key = Encoding.ASCII.GetBytes(Settings.Secret);
            services.AddAuthentication(x =>
            {
                x.DefaultAuthenticateScheme = JwtBearerDefaults.AuthenticationScheme;
                x.DefaultChallengeScheme = JwtBearerDefaults.AuthenticationScheme;
            })
            .AddJwtBearer(x =>
            {
                x.RequireHttpsMetadata = false;
                x.SaveToken = true;
                x.TokenValidationParameters = new TokenValidationParameters
                {
                    ValidateIssuerSigningKey = true,
                    IssuerSigningKey = new SymmetricSecurityKey(key),
                    ValidateIssuer = false,
                    ValidateAudience = false
                };
            });

            services.AddMvc().SetCompatibilityVersion(CompatibilityVersion.Version_3_0);
            services.AddScoped<SqlContext, SqlContext>();

            services.AddScoped<BaseRepository<Cliente>>();
            services.AddScoped<BaseRepository<Representante>>();

            services.AddScoped<BaseService<Cliente>>();
            services.AddScoped<BaseService<Representante>>();
            services.AddScoped<RepresentanteService>();
            services.AddScoped<LoginService>();

            services.AddScoped<StringCipher>();


        }

        // This method gets called by the runtime. Use this method to configure the HTTP request pipeline.
        public void Configure(IApplicationBuilder app, IWebHostEnvironment env)
        {
            if (env.IsDevelopment())
            {
                app.UseDeveloperExceptionPage();
            }

            app.UseStaticFiles();
            app.UseRouting();

            app.UseCors(x => x
            .AllowAnyOrigin()
            .AllowAnyMethod()
            .AllowAnyHeader());

            app.UseAuthentication();
            app.UseAuthorization();


            app.UseEndpoints(endpoints =>
            {
                endpoints.MapControllerRoute("default", "{controller=Home}/{action=Index}");
            });
        }
    }
}

TokenService.cs

using Microsoft.IdentityModel.Tokens;
using Grp.Domain.Entities;
using System;
using System.IdentityModel.Tokens.Jwt;
using System.Security.Claims;
using System.Text;

namespace Grp.Service.Services
{
    public static class TokenService
    {
        public static string GenerateToken(Representante representante)
        {
            var tokenHandler = new JwtSecurityTokenHandler();
            var key = Encoding.ASCII.GetBytes(Settings.Secret);
            var tokenDescriptor = new SecurityTokenDescriptor
            {
                Subject = new ClaimsIdentity(new Claim[]
                {
                    new Claim(ClaimTypes.Name, representante.Nome)
                }),
                Expires = DateTime.UtcNow.AddDays(2),
                SigningCredentials = new SigningCredentials(new SymmetricSecurityKey(key), SecurityAlgorithms.HmacSha256Signature)
            };
            var token = tokenHandler.CreateToken(tokenDescriptor);
            return tokenHandler.WriteToken(token);
        }
    }
}

【问题讨论】:

  • 你找到解决办法了吗?

标签: c# jwt asp.net-core-3.1


【解决方案1】:

我遇到了401 响应的类似问题。我就是这样解决的:

检查Startup.cs 上的Configure 方法。您可能没有包含app.UseAuthentication(),或者您将app.UseAuthorization() 放在app.UseAuthentication() 之前。您的 configure 方法应该与以下类似:

        public void Configure(IApplicationBuilder app, IWebHostEnvironment env)
        {
            if (env.IsDevelopment())
            {
                app.UseDeveloperExceptionPage();
            }

            app.UseRouting();
            app.UseAuthentication();
            app.UseAuthorization();
            

            app.UseEndpoints(endpoints =>
            {
                endpoints.MapControllers();
            });
        }

【讨论】:

  • 感谢罗纳德...
【解决方案2】:

您找到解决方案了吗?我在同一问题上滚动了一段时间。最后我解决了它添加 [Authorize(AuthenticationSchemes=JwtBearerDefaults.AuthenticationScheme)] 在我的控制器的装饰器中。

编辑: 如果您不想在每个控制器中设置方案,请在 Startup.cs ConfigureServices() 中配置它

        services.AddAuthorization(options =>
        {
            var defaultAuthorizationPolicyBuilder = new AuthorizationPolicyBuilder(
                JwtBearerDefaults.AuthenticationScheme);

            defaultAuthorizationPolicyBuilder =
                defaultAuthorizationPolicyBuilder.RequireAuthenticatedUser();

            options.DefaultPolicy = defaultAuthorizationPolicyBuilder.Build();
        });

【讨论】:

  • 这个解决方案对我来说很好用,但你知道为什么即使提供的唯一身份验证方案是 JwtBearer,这不是默认设置吗?
  • 今天我已经失去了一整天,比较一个示例项目和我的项目是相同的。完全相同的。两者都使用了不带参数的 AddAuthorization()。示例有效,我的无效,401。我找到了这个,尝试了这个,它有效。有效。现在我要求知道原因。
猜你喜欢
  • 2020-05-05
  • 1970-01-01
  • 2021-06-17
  • 2020-11-16
  • 2021-10-11
  • 2019-01-21
  • 2019-01-04
  • 2019-06-20
  • 1970-01-01
相关资源
最近更新 更多