BaseAuthorizationHandler.cs 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112
  1. using System.Security.Claims;
  2. using Jellyfin.Api.Helpers;
  3. using Jellyfin.Data.Enums;
  4. using MediaBrowser.Common.Extensions;
  5. using MediaBrowser.Common.Net;
  6. using MediaBrowser.Controller.Library;
  7. using Microsoft.AspNetCore.Authorization;
  8. using Microsoft.AspNetCore.Http;
  9. namespace Jellyfin.Api.Auth
  10. {
  11. /// <summary>
  12. /// Base authorization handler.
  13. /// </summary>
  14. /// <typeparam name="T">Type of Authorization Requirement.</typeparam>
  15. public abstract class BaseAuthorizationHandler<T> : AuthorizationHandler<T>
  16. where T : IAuthorizationRequirement
  17. {
  18. private readonly IUserManager _userManager;
  19. private readonly INetworkManager _networkManager;
  20. private readonly IHttpContextAccessor _httpContextAccessor;
  21. /// <summary>
  22. /// Initializes a new instance of the <see cref="BaseAuthorizationHandler{T}"/> class.
  23. /// </summary>
  24. /// <param name="userManager">Instance of the <see cref="IUserManager"/> interface.</param>
  25. /// <param name="networkManager">Instance of the <see cref="INetworkManager"/> interface.</param>
  26. /// <param name="httpContextAccessor">Instance of the <see cref="IHttpContextAccessor"/> interface.</param>
  27. protected BaseAuthorizationHandler(
  28. IUserManager userManager,
  29. INetworkManager networkManager,
  30. IHttpContextAccessor httpContextAccessor)
  31. {
  32. _userManager = userManager;
  33. _networkManager = networkManager;
  34. _httpContextAccessor = httpContextAccessor;
  35. }
  36. /// <summary>
  37. /// Validate authenticated claims.
  38. /// </summary>
  39. /// <param name="claimsPrincipal">Request claims.</param>
  40. /// <param name="ignoreSchedule">Whether to ignore parental control.</param>
  41. /// <param name="localAccessOnly">Whether access is to be allowed locally only.</param>
  42. /// <param name="requiredDownloadPermission">Whether validation requires download permission.</param>
  43. /// <returns>Validated claim status.</returns>
  44. protected bool ValidateClaims(
  45. ClaimsPrincipal claimsPrincipal,
  46. bool ignoreSchedule = false,
  47. bool localAccessOnly = false,
  48. bool requiredDownloadPermission = false)
  49. {
  50. // ApiKey is currently global admin, always allow.
  51. var isApiKey = ClaimHelpers.GetIsApiKey(claimsPrincipal);
  52. if (isApiKey)
  53. {
  54. return true;
  55. }
  56. // Ensure claim has userId.
  57. var userId = ClaimHelpers.GetUserId(claimsPrincipal);
  58. if (!userId.HasValue)
  59. {
  60. return false;
  61. }
  62. // Ensure userId links to a valid user.
  63. var user = _userManager.GetUserById(userId.Value);
  64. if (user == null)
  65. {
  66. return false;
  67. }
  68. // Ensure user is not disabled.
  69. if (user.HasPermission(PermissionKind.IsDisabled))
  70. {
  71. return false;
  72. }
  73. var isInLocalNetwork = _httpContextAccessor.HttpContext != null
  74. && _networkManager.IsInLocalNetwork(_httpContextAccessor.HttpContext.GetNormalizedRemoteIp());
  75. // User cannot access remotely and user is remote
  76. if (!user.HasPermission(PermissionKind.EnableRemoteAccess) && !isInLocalNetwork)
  77. {
  78. return false;
  79. }
  80. if (localAccessOnly && !isInLocalNetwork)
  81. {
  82. return false;
  83. }
  84. // User attempting to access out of parental control hours.
  85. if (!ignoreSchedule
  86. && !user.HasPermission(PermissionKind.IsAdministrator)
  87. && !user.IsParentalScheduleAllowed())
  88. {
  89. return false;
  90. }
  91. // User attempting to download without permission.
  92. if (requiredDownloadPermission
  93. && !user.HasPermission(PermissionKind.EnableContentDownloading))
  94. {
  95. return false;
  96. }
  97. return true;
  98. }
  99. }
  100. }