BaseAuthorizationHandler.cs 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111
  1. using System;
  2. using System.Security.Claims;
  3. using Jellyfin.Api.Helpers;
  4. using Jellyfin.Data.Enums;
  5. using MediaBrowser.Common.Extensions;
  6. using MediaBrowser.Common.Net;
  7. using MediaBrowser.Controller.Library;
  8. using Microsoft.AspNetCore.Authorization;
  9. using Microsoft.AspNetCore.Http;
  10. namespace Jellyfin.Api.Auth
  11. {
  12. /// <summary>
  13. /// Base authorization handler.
  14. /// </summary>
  15. /// <typeparam name="T">Type of Authorization Requirement.</typeparam>
  16. public abstract class BaseAuthorizationHandler<T> : AuthorizationHandler<T>
  17. where T : IAuthorizationRequirement
  18. {
  19. private readonly IUserManager _userManager;
  20. private readonly INetworkManager _networkManager;
  21. private readonly IHttpContextAccessor _httpContextAccessor;
  22. /// <summary>
  23. /// Initializes a new instance of the <see cref="BaseAuthorizationHandler{T}"/> class.
  24. /// </summary>
  25. /// <param name="userManager">Instance of the <see cref="IUserManager"/> interface.</param>
  26. /// <param name="networkManager">Instance of the <see cref="INetworkManager"/> interface.</param>
  27. /// <param name="httpContextAccessor">Instance of the <see cref="IHttpContextAccessor"/> interface.</param>
  28. protected BaseAuthorizationHandler(
  29. IUserManager userManager,
  30. INetworkManager networkManager,
  31. IHttpContextAccessor httpContextAccessor)
  32. {
  33. _userManager = userManager;
  34. _networkManager = networkManager;
  35. _httpContextAccessor = httpContextAccessor;
  36. }
  37. /// <summary>
  38. /// Validate authenticated claims.
  39. /// </summary>
  40. /// <param name="claimsPrincipal">Request claims.</param>
  41. /// <param name="ignoreSchedule">Whether to ignore parental control.</param>
  42. /// <param name="localAccessOnly">Whether access is to be allowed locally only.</param>
  43. /// <param name="requiredDownloadPermission">Whether validation requires download permission.</param>
  44. /// <returns>Validated claim status.</returns>
  45. protected bool ValidateClaims(
  46. ClaimsPrincipal claimsPrincipal,
  47. bool ignoreSchedule = false,
  48. bool localAccessOnly = false,
  49. bool requiredDownloadPermission = false)
  50. {
  51. // Ensure claim has userId.
  52. var userId = ClaimHelpers.GetUserId(claimsPrincipal);
  53. if (!userId.HasValue)
  54. {
  55. return false;
  56. }
  57. // UserId of Guid.Empty means token is an apikey.
  58. if (userId.Equals(Guid.Empty))
  59. {
  60. return true;
  61. }
  62. // Ensure userId links to a valid user.
  63. var user = _userManager.GetUserById(userId.Value);
  64. if (user == null)
  65. {
  66. return false;
  67. }
  68. // Ensure user is not disabled.
  69. if (user.HasPermission(PermissionKind.IsDisabled))
  70. {
  71. return false;
  72. }
  73. var ip = _httpContextAccessor.HttpContext.GetNormalizedRemoteIp();
  74. var isInLocalNetwork = _networkManager.IsInLocalNetwork(ip);
  75. // User cannot access remotely and user is remote
  76. if (!user.HasPermission(PermissionKind.EnableRemoteAccess) && !isInLocalNetwork)
  77. {
  78. return false;
  79. }
  80. if (localAccessOnly && !isInLocalNetwork)
  81. {
  82. return false;
  83. }
  84. // User attempting to access out of parental control hours.
  85. if (!ignoreSchedule
  86. && !user.HasPermission(PermissionKind.IsAdministrator)
  87. && !user.IsParentalScheduleAllowed())
  88. {
  89. return false;
  90. }
  91. // User attempting to download without permission.
  92. if (requiredDownloadPermission
  93. && !user.HasPermission(PermissionKind.EnableContentDownloading))
  94. {
  95. return false;
  96. }
  97. return true;
  98. }
  99. }
  100. }