Exemplo n.º 1
0
 public IActionResult DeleteProfession(Profession profession)
 {
     return(this.RunWithErrorHandling(() =>
     {
         databaseProvider.Execute("base.profession_delete", profession);
         return Ok(true);
     }));
 }
Exemplo n.º 2
0
 public IActionResult AssignWork(Work work)
 {
     return(this.RunWithErrorHandling(() =>
     {
         databaseProvider.Execute("work.work_assign", work);
         return Ok
         (
             databaseProvider.Query <Work>("work.works_select", new { id = work.Id }).FirstOrDefault()
         );
     }));
 }
Exemplo n.º 3
0
        protected override async Task <AuthenticateResult> HandleAuthenticateAsync()
        {
            var authorizationHeader = Context.Request.Headers["Authorization"];

            if (!authorizationHeader.Any())
            {
                return(AuthenticateResult.Fail("Missing authorization header"));
            }

            var sessionid = authorizationHeader.ToString();

            if (string.IsNullOrWhiteSpace(sessionid))
            {
                return(AuthenticateResult.Fail("Invalid authorization header"));
            }

            try
            {
                var result  = databaseProvider.Query <SessionModel, string>("authentication.userSelectBySessionId", new { sessionid });
                var session = result.Item1[0];
                var roles   = result.Item2;
                if (session != null && session.LastAccess.AddMinutes(sessionExpireTimeInMinute) >= DateTime.Now)
                {
                    databaseProvider.Execute("authentication.sessionUpdateLastAccess", new { sessionid });
                    var claims = new List <Claim>()
                    {
                        new Claim("AdLoginName", session.AdLoginName),
                    };

                    roles.ForEach(r => claims.Add(new Claim(ClaimTypes.Role, r)));

                    // create a new claims identity and return an AuthenticationTicket with the correct scheme
                    var claimsIdentity = new ClaimsIdentity(claims, Scheme.Name);

                    var ticket = new AuthenticationTicket(new ClaimsPrincipal(claimsIdentity), new AuthenticationProperties(), Scheme.Name);

                    Context.Response.Headers.Add("session", JsonConvert.SerializeObject(new
                    {
                        session.AdLoginName,
                        name       = session.UserName,
                        token      = sessionid,
                        lastAccess = session.LastAccess,
                        validTo    = session.LastAccess.AddMinutes(sessionExpireTimeInMinute),
                        roles
                    }));
                    Context.Response.Headers.Add("access-control-expose-headers", "session");

                    return(await Task.FromResult(AuthenticateResult.Success(ticket)));
                }
            }
            catch
            {
                return(AuthenticateResult.Fail("Sikertelen authentikáció"));
            }
            return(AuthenticateResult.Fail("Sikertelen authentikáció"));
        }