DefaultAuthorizationHandler.cs 3.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687
  1. using System.Threading.Tasks;
  2. using Jellyfin.Api.Constants;
  3. using Jellyfin.Api.Extensions;
  4. using Jellyfin.Data.Enums;
  5. using MediaBrowser.Common.Extensions;
  6. using MediaBrowser.Common.Net;
  7. using MediaBrowser.Controller.Library;
  8. using Microsoft.AspNetCore.Authorization;
  9. using Microsoft.AspNetCore.Http;
  10. namespace Jellyfin.Api.Auth.DefaultAuthorizationPolicy
  11. {
  12. /// <summary>
  13. /// Default authorization handler.
  14. /// </summary>
  15. public class DefaultAuthorizationHandler : AuthorizationHandler<DefaultAuthorizationRequirement>
  16. {
  17. private readonly IUserManager _userManager;
  18. private readonly INetworkManager _networkManager;
  19. private readonly IHttpContextAccessor _httpContextAccessor;
  20. /// <summary>
  21. /// Initializes a new instance of the <see cref="DefaultAuthorizationHandler"/> class.
  22. /// </summary>
  23. /// <param name="userManager">Instance of the <see cref="IUserManager"/> interface.</param>
  24. /// <param name="networkManager">Instance of the <see cref="INetworkManager"/> interface.</param>
  25. /// <param name="httpContextAccessor">Instance of the <see cref="IHttpContextAccessor"/> interface.</param>
  26. public DefaultAuthorizationHandler(
  27. IUserManager userManager,
  28. INetworkManager networkManager,
  29. IHttpContextAccessor httpContextAccessor)
  30. {
  31. _userManager = userManager;
  32. _networkManager = networkManager;
  33. _httpContextAccessor = httpContextAccessor;
  34. }
  35. /// <inheritdoc />
  36. protected override Task HandleRequirementAsync(AuthorizationHandlerContext context, DefaultAuthorizationRequirement requirement)
  37. {
  38. var isApiKey = context.User.GetIsApiKey();
  39. var userId = context.User.GetUserId();
  40. // This likely only happens during the wizard, so skip the default checks and let any other handlers do it
  41. if (!isApiKey && userId.Equals(default))
  42. {
  43. return Task.CompletedTask;
  44. }
  45. var isInLocalNetwork = _httpContextAccessor.HttpContext is not null
  46. && _networkManager.IsInLocalNetwork(_httpContextAccessor.HttpContext.GetNormalizedRemoteIp());
  47. var user = _userManager.GetUserById(userId);
  48. if (user is null)
  49. {
  50. throw new ResourceNotFoundException();
  51. }
  52. // User cannot access remotely and user is remote
  53. if (!isInLocalNetwork && !user.HasPermission(PermissionKind.EnableRemoteAccess))
  54. {
  55. context.Fail();
  56. return Task.CompletedTask;
  57. }
  58. // Admins can do everything
  59. if (isApiKey || context.User.IsInRole(UserRoles.Administrator))
  60. {
  61. context.Succeed(requirement);
  62. return Task.CompletedTask;
  63. }
  64. // It's not great to have this check, but parental schedule must usually be honored except in a few rare cases
  65. if (requirement.ValidateParentalSchedule && !user.IsParentalScheduleAllowed())
  66. {
  67. context.Fail();
  68. return Task.CompletedTask;
  69. }
  70. // Only succeed if the requirement isn't a subclass as any subclassed requirement will handle success in its own handler
  71. if (requirement.GetType() == typeof(DefaultAuthorizationRequirement))
  72. {
  73. context.Succeed(requirement);
  74. }
  75. return Task.CompletedTask;
  76. }
  77. }
  78. }