BaseAuthorizationHandler.cs 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102
  1. #nullable enable
  2. using System.Net;
  3. using System.Security.Claims;
  4. using Jellyfin.Api.Helpers;
  5. using Jellyfin.Data.Enums;
  6. using MediaBrowser.Common.Net;
  7. using MediaBrowser.Controller.Library;
  8. using Microsoft.AspNetCore.Authorization;
  9. using Microsoft.AspNetCore.Http;
  10. namespace Jellyfin.Api.Auth
  11. {
  12. /// <summary>
  13. /// Base authorization handler.
  14. /// </summary>
  15. /// <typeparam name="T">Type of Authorization Requirement.</typeparam>
  16. public abstract class BaseAuthorizationHandler<T> : AuthorizationHandler<T>
  17. where T : IAuthorizationRequirement
  18. {
  19. private readonly IUserManager _userManager;
  20. private readonly INetworkManager _networkManager;
  21. private readonly IHttpContextAccessor _httpContextAccessor;
  22. /// <summary>
  23. /// Initializes a new instance of the <see cref="BaseAuthorizationHandler{T}"/> class.
  24. /// </summary>
  25. /// <param name="userManager">Instance of the <see cref="IUserManager"/> interface.</param>
  26. /// <param name="networkManager">Instance of the <see cref="INetworkManager"/> interface.</param>
  27. /// <param name="httpContextAccessor">Instance of the <see cref="IHttpContextAccessor"/> interface.</param>
  28. protected BaseAuthorizationHandler(
  29. IUserManager userManager,
  30. INetworkManager networkManager,
  31. IHttpContextAccessor httpContextAccessor)
  32. {
  33. _userManager = userManager;
  34. _networkManager = networkManager;
  35. _httpContextAccessor = httpContextAccessor;
  36. }
  37. /// <summary>
  38. /// Validate authenticated claims.
  39. /// </summary>
  40. /// <param name="claimsPrincipal">Request claims.</param>
  41. /// <param name="ignoreSchedule">Whether to ignore parental control.</param>
  42. /// <param name="localAccessOnly">Whether access is to be allowed locally only.</param>
  43. /// <returns>Validated claim status.</returns>
  44. protected bool ValidateClaims(
  45. ClaimsPrincipal claimsPrincipal,
  46. bool ignoreSchedule = false,
  47. bool localAccessOnly = false)
  48. {
  49. // Ensure claim has userId.
  50. var userId = ClaimHelpers.GetUserId(claimsPrincipal);
  51. if (userId == null)
  52. {
  53. return false;
  54. }
  55. // Ensure userId links to a valid user.
  56. var user = _userManager.GetUserById(userId.Value);
  57. if (user == null)
  58. {
  59. return false;
  60. }
  61. // Ensure user is not disabled.
  62. if (user.HasPermission(PermissionKind.IsDisabled))
  63. {
  64. return false;
  65. }
  66. var ip = NormalizeIp(_httpContextAccessor.HttpContext.Connection.RemoteIpAddress).ToString();
  67. var isInLocalNetwork = _networkManager.IsInLocalNetwork(ip);
  68. // User cannot access remotely and user is remote
  69. if (!user.HasPermission(PermissionKind.EnableRemoteAccess) && !isInLocalNetwork)
  70. {
  71. return false;
  72. }
  73. if (localAccessOnly && !isInLocalNetwork)
  74. {
  75. return false;
  76. }
  77. // User attempting to access out of parental control hours.
  78. if (!ignoreSchedule
  79. && !user.HasPermission(PermissionKind.IsAdministrator)
  80. && !user.IsParentalScheduleAllowed())
  81. {
  82. return false;
  83. }
  84. return true;
  85. }
  86. private static IPAddress NormalizeIp(IPAddress ip)
  87. {
  88. return ip.IsIPv4MappedToIPv6 ? ip.MapToIPv4() : ip;
  89. }
  90. }
  91. }