DefaultAuthorizationHandler.cs 3.7 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394
  1. using System.Threading.Tasks;
  2. using Jellyfin.Api.Constants;
  3. using Jellyfin.Api.Extensions;
  4. using Jellyfin.Data.Enums;
  5. using MediaBrowser.Common.Extensions;
  6. using MediaBrowser.Common.Net;
  7. using MediaBrowser.Controller.Library;
  8. using Microsoft.AspNetCore.Authorization;
  9. using Microsoft.AspNetCore.Http;
  10. namespace Jellyfin.Api.Auth.DefaultAuthorizationPolicy
  11. {
  12. /// <summary>
  13. /// Default authorization handler.
  14. /// </summary>
  15. public class DefaultAuthorizationHandler : AuthorizationHandler<DefaultAuthorizationRequirement>
  16. {
  17. private readonly IUserManager _userManager;
  18. private readonly INetworkManager _networkManager;
  19. private readonly IHttpContextAccessor _httpContextAccessor;
  20. /// <summary>
  21. /// Initializes a new instance of the <see cref="DefaultAuthorizationHandler"/> class.
  22. /// </summary>
  23. /// <param name="userManager">Instance of the <see cref="IUserManager"/> interface.</param>
  24. /// <param name="networkManager">Instance of the <see cref="INetworkManager"/> interface.</param>
  25. /// <param name="httpContextAccessor">Instance of the <see cref="IHttpContextAccessor"/> interface.</param>
  26. public DefaultAuthorizationHandler(
  27. IUserManager userManager,
  28. INetworkManager networkManager,
  29. IHttpContextAccessor httpContextAccessor)
  30. {
  31. _userManager = userManager;
  32. _networkManager = networkManager;
  33. _httpContextAccessor = httpContextAccessor;
  34. }
  35. /// <inheritdoc />
  36. protected override Task HandleRequirementAsync(AuthorizationHandlerContext context, DefaultAuthorizationRequirement requirement)
  37. {
  38. var isApiKey = context.User.GetIsApiKey();
  39. var userId = context.User.GetUserId();
  40. // This likely only happens during the wizard, so skip the default checks and let any other handlers do it
  41. if (!isApiKey && userId.Equals(default))
  42. {
  43. return Task.CompletedTask;
  44. }
  45. if (isApiKey)
  46. {
  47. // Api keys are unrestricted.
  48. context.Succeed(requirement);
  49. return Task.CompletedTask;
  50. }
  51. var isInLocalNetwork = _httpContextAccessor.HttpContext is not null
  52. && _networkManager.IsInLocalNetwork(_httpContextAccessor.HttpContext.GetNormalizedRemoteIP());
  53. var user = _userManager.GetUserById(userId);
  54. if (user is null)
  55. {
  56. throw new ResourceNotFoundException();
  57. }
  58. // User cannot access remotely and user is remote
  59. if (!isInLocalNetwork && !user.HasPermission(PermissionKind.EnableRemoteAccess))
  60. {
  61. context.Fail();
  62. return Task.CompletedTask;
  63. }
  64. // Admins can do everything
  65. if (context.User.IsInRole(UserRoles.Administrator))
  66. {
  67. context.Succeed(requirement);
  68. return Task.CompletedTask;
  69. }
  70. // It's not great to have this check, but parental schedule must usually be honored except in a few rare cases
  71. if (requirement.ValidateParentalSchedule && !user.IsParentalScheduleAllowed())
  72. {
  73. context.Fail();
  74. return Task.CompletedTask;
  75. }
  76. // Only succeed if the requirement isn't a subclass as any subclassed requirement will handle success in its own handler
  77. if (requirement.GetType() == typeof(DefaultAuthorizationRequirement))
  78. {
  79. context.Succeed(requirement);
  80. }
  81. return Task.CompletedTask;
  82. }
  83. }
  84. }