18 Commits

Author SHA1 Message Date
dffd31cd0f Use typesafe options
All checks were successful
Build Backend and Frontend / Build & Test .NET Backend (push) Successful in 33s
Build Backend and Frontend / Build Frontend (push) Successful in 12s
2025-05-27 12:20:23 +02:00
f4737f4dcf Don't create self signed cert in production build pipeline
All checks were successful
Build Backend and Frontend / Build & Test .NET Backend (push) Successful in 32s
Build Backend and Frontend / Build Frontend (push) Successful in 12s
2025-05-23 16:33:23 +02:00
1d68f177de Fixed a small stupid mistake
Some checks failed
Build Backend and Frontend / Build & Test .NET Backend (push) Successful in 31s
Build Backend and Frontend / Build Frontend (push) Failing after 11s
2025-05-23 16:18:14 +02:00
ae5096bacd Installed zod, because I somehow didin't have to do that locally
Some checks failed
Build Backend and Frontend / Build & Test .NET Backend (push) Successful in 41s
Build Backend and Frontend / Build Frontend (push) Failing after 10s
- Also use v4
2025-05-23 16:05:08 +02:00
a2608eac5b Rebuild package-lock.json
Some checks failed
Build Backend and Frontend / Build & Test .NET Backend (push) Successful in 36s
Build Backend and Frontend / Build Frontend (push) Failing after 10s
2025-05-23 15:58:26 +02:00
189069361f Merge branch 'feature/login_and_auth' into feature/ci-cd-pipeline
Some checks failed
Build Backend and Frontend / Build & Test .NET Backend (push) Successful in 33s
Build Backend and Frontend / Build Frontend (push) Failing after 12s
2025-05-23 15:41:13 +02:00
bd7759cbcb hotfix die zweite
Some checks failed
Build Backend and Frontend / Build & Test .NET Backend (push) Successful in 31s
Build Backend and Frontend / Build Frontend (push) Failing after 11s
2025-05-22 17:50:46 +02:00
af0c49db77 hotfix
Some checks failed
Build Backend and Frontend / Build & Test .NET Backend (push) Successful in 32s
Build Backend and Frontend / Build Frontend (push) Has been cancelled
2025-05-22 17:50:07 +02:00
a0c994bc44 demo gelöscht und on push start der pipeline
Some checks failed
Build Backend and Frontend / Build & Test .NET Backend (push) Successful in 32s
Build Backend and Frontend / Build Frontend (push) Failing after 16s
2025-05-22 17:48:54 +02:00
9758cba025 zwei manuelle workflows hinzugefügt für frontend und backend 2025-05-22 17:47:46 +02:00
fcd81969a8 .NET SDK version auf 9 angehoben 2025-05-22 17:39:13 +02:00
0d4046d56c fix einrückung 2025-05-22 17:36:35 +02:00
94d17a1266 first try von einer backend - frontend pipeline 2025-05-22 17:34:01 +02:00
326f3531b1 wer brauch schon apt-get 2025-05-22 15:52:51 +02:00
6eb6c09a4d sudo weg 2025-05-22 15:51:38 +02:00
1339a22ab8 nodejs dem workflow hinzugefügt 2025-05-22 15:50:01 +02:00
465c4ca0c1 manueller workflow 2025-05-22 15:33:13 +02:00
d874c948e8 initial commit für die CI/CD pipeline
Some checks failed
Gitea Actions Demo / Explore-Gitea-Actions (push) Failing after 8s
2025-05-22 15:25:16 +02:00
13 changed files with 1021 additions and 1104 deletions

View File

@ -0,0 +1,27 @@
name: Build Backend
run-name: ${{ gitea.actor }} is testing out building the Backend
on:
workflow_dispatch:
jobs:
backend:
name: Build & Test .NET Backend
runs-on: ubuntu-latest
steps:
- name: Clone the repository
uses: actions/checkout@v4
- name: Setup .NET SDK
uses: actions/setup-dotnet@v4
with:
dotnet-version: '9.0.x'
- name: Restore dependencies
run: dotnet restore
- name: Build the project
run: dotnet build USEntryCoach.sln --no-restore --configuration Release
- name: Run tests
run: dotnet test USEntryCoach.sln --no-build --verbosity normal

View File

@ -0,0 +1,26 @@
name: Build Frontend
run-name: ${{ gitea.actor }} is testing out building the Frontend
on:
workflow_dispatch:
jobs:
frontend:
name: Build Frontend
runs-on: ubuntu-latest
steps:
- name: Clone the repository
uses: actions/checkout@v4
- name: Setup Node.js
uses: actions/setup-node@v4
with:
node-version: '22'
- name: Install dependencies
run: npm install
working-directory: ./usentrycoach.client
- name: Build frontend
run: NODE_ENV=production npm run build
working-directory: ./usentrycoach.client

View File

@ -0,0 +1,47 @@
name: Build Backend and Frontend
run-name: ${{ gitea.actor }} is testing out Building Website
on: [push]
jobs:
backend:
name: Build & Test .NET Backend
runs-on: ubuntu-latest
steps:
- name: Clone the repository
uses: actions/checkout@v4
- name: Setup .NET SDK
uses: actions/setup-dotnet@v4
with:
dotnet-version: '9.0.x'
- name: Restore dependencies
run: dotnet restore
- name: Build the project
run: dotnet build USEntryCoach.sln --no-restore --configuration Release
- name: Run tests
run: dotnet test USEntryCoach.sln --no-build --verbosity normal
frontend:
name: Build Frontend
runs-on: ubuntu-latest
needs: backend
steps:
- name: Clone the repository
uses: actions/checkout@v4
- name: Setup Node.js
uses: actions/setup-node@v4
with:
node-version: '22'
- name: Install dependencies
run: npm install
working-directory: ./usentrycoach.client
- name: Build frontend
run: npm run build
working-directory: ./usentrycoach.client

View File

@ -6,12 +6,21 @@ using Microsoft.AspNetCore.Http.HttpResults;
using Microsoft.IdentityModel.Tokens; using Microsoft.IdentityModel.Tokens;
using USEntryCoach.Server.Data; using USEntryCoach.Server.Data;
using USEntryCoach.Server.Services; using USEntryCoach.Server.Services;
using USEntryCoach.Server.Settings;
var builder = WebApplication.CreateBuilder(args); var builder = WebApplication.CreateBuilder(args);
// Add services to the container.
// Learn more about configuring OpenAPI at https://aka.ms/aspnet/openapi
builder.Services.AddOpenApi(); builder.Services.AddOpenApi();
var apiSettingsSection = builder.Configuration.GetSection(ApiSettings.SectionName);
var authSettingsSection = builder.Configuration.GetSection(AuthenticationSettings.SectionName);
builder.Services.AddOptionsWithValidateOnStart<ApiSettings>().Bind(apiSettingsSection).ValidateDataAnnotations();
builder.Services.AddOptionsWithValidateOnStart<AuthenticationSettings>().Bind(authSettingsSection).ValidateDataAnnotations();
ApiSettings? apiSettings = apiSettingsSection.Get<ApiSettings>();
AuthenticationSettings? authSettings = authSettingsSection.Get<AuthenticationSettings>();
builder.Services.AddSingleton<TokenService>(); builder.Services.AddSingleton<TokenService>();
// Configure JWT token generation. // Configure JWT token generation.
@ -21,28 +30,14 @@ builder.Services.AddAuthentication(config =>
config.DefaultChallengeScheme = JwtBearerDefaults.AuthenticationScheme; config.DefaultChallengeScheme = JwtBearerDefaults.AuthenticationScheme;
}).AddJwtBearer(config => }).AddJwtBearer(config =>
{ {
// TODO: Use Microsoft.Extensions.Options?
// var myOptions = new MyOptions(); // Your settings class
// builder.Configuration.GetSection("MySection").Bind(myOptions);
// myOptions now has the values
//
// TODO: This is identical in TokenService
string? secretToken = builder.Configuration.GetValue<string>("Authentication:Secret");
if (secretToken == null)
{
throw new Exception("No Authentication Secret Token set! Please define a value for \"Authentication:SecretToken\" in appsettings.json.");
}
byte[] secretKey = Encoding.ASCII.GetBytes(secretToken);
// TODO: Only for debug! // TODO: Only for debug!
config.RequireHttpsMetadata = false; config.RequireHttpsMetadata = false;
config.SaveToken = true; config.SaveToken = true;
config.TokenValidationParameters = new TokenValidationParameters() config.TokenValidationParameters = new TokenValidationParameters()
{ {
ValidateIssuerSigningKey = true, ValidateIssuerSigningKey = true,
IssuerSigningKey = new SymmetricSecurityKey(secretKey), IssuerSigningKey = new SymmetricSecurityKey(authSettings!.JwtGenerationSecretBytes),
ValidateIssuer = false, ValidateIssuer = false,
ValidateAudience = false ValidateAudience = false
}; };
@ -75,9 +70,9 @@ if (app.Environment.IsDevelopment())
app.UseHttpsRedirection(); app.UseHttpsRedirection();
HttpClient client = new(); HttpClient client = new();
string? apiKey = app.Configuration.GetValue<string>("API:OpenAI"); //string? apiKey = app.Configuration.GetValue<string>("API:OpenAI");
client.DefaultRequestHeaders.Clear(); client.DefaultRequestHeaders.Clear();
client.DefaultRequestHeaders.Add("Authorization", $"Bearer {apiKey}"); client.DefaultRequestHeaders.Add("Authorization", $"Bearer {apiSettings.OpenAiToken}");
app.MapPost("/login", Login); app.MapPost("/login", Login);
@ -131,8 +126,8 @@ app.MapGet("/user", (ClaimsPrincipal user) =>
app.MapGet("/ephemeral_token", async () => app.MapGet("/ephemeral_token", async () =>
{ {
if (apiKey == null) //if (apiKey == null)
throw new Exception("API key not set"); // throw new Exception("API key not set");
var options = new var options = new
{ {

View File

@ -1,39 +1,15 @@
using System.IdentityModel.Tokens.Jwt; using System.IdentityModel.Tokens.Jwt;
using System.Security.Claims; using System.Security.Claims;
using System.Text; using System.Text;
using Microsoft.Extensions.Options;
using Microsoft.IdentityModel.Tokens; using Microsoft.IdentityModel.Tokens;
using USEntryCoach.Server.Data; using USEntryCoach.Server.Data;
using USEntryCoach.Server.Settings;
namespace USEntryCoach.Server.Services; namespace USEntryCoach.Server.Services;
public class TokenService public class TokenService(IOptions<AuthenticationSettings> authenticationSettings)
{ {
private byte[] _secretToken;
private double _jwtExpiryMinutes;
private const double DefaultJwtExpiryMinutes = 15;
public TokenService(IConfiguration configuration)
{
string? secretToken = configuration.GetValue<string>("Authentication:Secret");
if (secretToken == null)
{
throw new Exception("No Authentication Secret Token set! Please define a value for \"Authentication:SecretToken\" in appsettings.json.");
}
_secretToken = Encoding.ASCII.GetBytes(secretToken);
double? jwtExpiryMinutes = configuration.GetValue<double?>("Authentication:JwtExpiryMinutes");
if (jwtExpiryMinutes == null)
{
// TODO: Use logger
Console.WriteLine($"Warning: No expiry time for jwt session tokens defined. Using {DefaultJwtExpiryMinutes} minutes.");
}
_jwtExpiryMinutes = jwtExpiryMinutes ?? DefaultJwtExpiryMinutes;
}
public string GenerateToken(User user) public string GenerateToken(User user)
{ {
JwtSecurityTokenHandler tokenHandler = new(); JwtSecurityTokenHandler tokenHandler = new();
@ -42,11 +18,12 @@ public class TokenService
{ {
Subject = new ClaimsIdentity([ Subject = new ClaimsIdentity([
new Claim(ClaimTypes.Name, user.Username), new Claim(ClaimTypes.Name, user.Username),
//new Claim(ClaimTypes.NameIdentifier, user.Id.ToString()),
new Claim(ClaimTypes.Role, user.Role.ToString()) new Claim(ClaimTypes.Role, user.Role.ToString())
]), ]),
Expires = DateTime.UtcNow.AddMinutes(_jwtExpiryMinutes), Expires = DateTime.UtcNow.Add(authenticationSettings.Value.JwtExpiryTime),
SigningCredentials = new SigningCredentials(new SymmetricSecurityKey(_secretToken), SecurityAlgorithms.HmacSha256Signature) SigningCredentials = new SigningCredentials(
new SymmetricSecurityKey(authenticationSettings.Value.JwtGenerationSecretBytes),
SecurityAlgorithms.HmacSha256Signature)
}; };
SecurityToken token = tokenHandler.CreateToken(tokenDescriptor); SecurityToken token = tokenHandler.CreateToken(tokenDescriptor);

View File

@ -0,0 +1,42 @@
using System.ComponentModel.DataAnnotations;
using System.Diagnostics.CodeAnalysis;
using System.Text;
using Microsoft.Extensions.Options;
namespace USEntryCoach.Server.Settings;
public sealed class ApiSettings
{
public const string SectionName = "API";
[Required(ErrorMessage = "OpenAI API token is required!", AllowEmptyStrings = false)]
public required string OpenAiToken { get; set; }
}
public sealed class AuthenticationSettings
{
public const string SectionName = "Authentication";
private string _jwtGenerationSecret = null!;
[Required(ErrorMessage = "JWT generation secret token is required!", AllowEmptyStrings = false)]
public required string JwtGenerationSecret
{
get => _jwtGenerationSecret;
set
{
_jwtGenerationSecret = value;
JwtGenerationSecretBytes = Encoding.UTF8.GetBytes(value);
}
}
public byte[] JwtGenerationSecretBytes { get; private set; }
const string JwtExpiryTimeMin = "00:00:30";
const string JwtExpiryTimeMax = "24:00:00";
[Range(typeof(TimeSpan), JwtExpiryTimeMin, JwtExpiryTimeMax,
ErrorMessage = $"JWT expiry time must be in the range from {JwtExpiryTimeMin} to {JwtExpiryTimeMax}.")]
public TimeSpan JwtExpiryTime { get; set; } = TimeSpan.FromMinutes(5);
}

View File

@ -6,9 +6,9 @@
} }
}, },
"API": { "API": {
"OpenAI": "Please set the key in secrets.json! NEVER HERE!!!" "OpenAiToken": "Please set the key in secrets.json! NEVER HERE!!!"
}, },
"Authentication": { "Authentication": {
"Secret": "Please provide a GUID (without dashes) as secret." "JwtGenerationSecret": "Please provide a GUID (without dashes) as secret."
} }
} }

View File

@ -7,6 +7,10 @@
}, },
"AllowedHosts": "*", "AllowedHosts": "*",
"API": { "API": {
"OpenAI": "[NO_API_KEY]" "OpenAiToken": "[NO_API_KEY]"
},
"Authentication": {
"JwtGenerationSecret": "Please provide a GUID (without dashes) as secret.",
"JwtExpiryTime": "00:15:00"
} }
} }

File diff suppressed because it is too large Load Diff

View File

@ -11,7 +11,8 @@
}, },
"dependencies": { "dependencies": {
"react": "^19.1.0", "react": "^19.1.0",
"react-dom": "^19.1.0" "react-dom": "^19.1.0",
"zod": "^3.25.23"
}, },
"devDependencies": { "devDependencies": {
"@eslint/js": "^9.25.0", "@eslint/js": "^9.25.0",

View File

@ -1,6 +1,6 @@
import {useState, useRef, useEffect} from 'react'; import {useState, useRef, useEffect} from 'react';
import useLoginToken from "../Hooks/useLoginToken.tsx"; import useLoginToken from "../Hooks/useLoginToken.tsx";
import { z } from 'zod'; import { z } from 'zod/v4';
function SessionActive({stopSession} : {stopSession: () => void}) function SessionActive({stopSession} : {stopSession: () => void})
{ {

View File

@ -1,5 +1,5 @@
import { useState, type FormEvent } from 'react'; import { useState, type FormEvent } from 'react';
import { z } from 'zod'; import { z } from 'zod/v4';
export default function Login({ setToken } : {setToken: (token: string) => void}) export default function Login({ setToken } : {setToken: (token: string) => void})
{ {

View File

@ -7,6 +7,8 @@ import path from 'path';
import child_process from 'child_process'; import child_process from 'child_process';
import { env } from 'process'; import { env } from 'process';
const isDevelopment = env.NODE_ENV !== 'production';
const baseFolder = const baseFolder =
env.APPDATA !== undefined && env.APPDATA !== '' env.APPDATA !== undefined && env.APPDATA !== ''
? `${env.APPDATA}/ASP.NET/https` ? `${env.APPDATA}/ASP.NET/https`
@ -21,7 +23,8 @@ if (!fs.existsSync(baseFolder))
fs.mkdirSync(baseFolder, { recursive: true }); fs.mkdirSync(baseFolder, { recursive: true });
} }
if (!fs.existsSync(certFilePath) || !fs.existsSync(keyFilePath)) // Generate dev certificate, if we are in development mode, and it doesn't exist yet.
if (isDevelopment && (!fs.existsSync(certFilePath) || !fs.existsSync(keyFilePath)))
{ {
if (0 !== child_process.spawnSync('dotnet', [ if (0 !== child_process.spawnSync('dotnet', [
'dev-certs', 'dev-certs',
@ -32,7 +35,7 @@ if (!fs.existsSync(certFilePath) || !fs.existsSync(keyFilePath))
'Pem', 'Pem',
'--no-password', '--no-password',
], { stdio: 'inherit', }).status) ], { stdio: 'inherit', }).status)
{ {
throw new Error("Could not create certificate."); throw new Error("Could not create certificate.");
} }
} }
@ -68,9 +71,10 @@ export default defineConfig({
server: { server: {
proxy: proxyConfig, proxy: proxyConfig,
port: parseInt(env.DEV_SERVER_PORT ?? '54044'), port: parseInt(env.DEV_SERVER_PORT ?? '54044'),
https: { // This is only relevant for development anyway.
https: isDevelopment ? {
key: fs.readFileSync(keyFilePath), key: fs.readFileSync(keyFilePath),
cert: fs.readFileSync(certFilePath), cert: fs.readFileSync(certFilePath),
} } : undefined
} }
}) })