DefaultAuthorizationHandler.cs 3.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. using System.Threading.Tasks;
  2. using Jellyfin.Api.Constants;
  3. using Jellyfin.Api.Extensions;
  4. using Jellyfin.Data;
  5. using Jellyfin.Database.Implementations.Enums;
  6. using Jellyfin.Extensions;
  7. using MediaBrowser.Common.Extensions;
  8. using MediaBrowser.Common.Net;
  9. using MediaBrowser.Controller.Library;
  10. using Microsoft.AspNetCore.Authorization;
  11. using Microsoft.AspNetCore.Http;
  12. namespace Jellyfin.Api.Auth.DefaultAuthorizationPolicy
  13. {
  14. /// <summary>
  15. /// Default authorization handler.
  16. /// </summary>
  17. public class DefaultAuthorizationHandler : AuthorizationHandler<DefaultAuthorizationRequirement>
  18. {
  19. private readonly IUserManager _userManager;
  20. private readonly INetworkManager _networkManager;
  21. private readonly IHttpContextAccessor _httpContextAccessor;
  22. /// <summary>
  23. /// Initializes a new instance of the <see cref="DefaultAuthorizationHandler"/> class.
  24. /// </summary>
  25. /// <param name="userManager">Instance of the <see cref="IUserManager"/> interface.</param>
  26. /// <param name="networkManager">Instance of the <see cref="INetworkManager"/> interface.</param>
  27. /// <param name="httpContextAccessor">Instance of the <see cref="IHttpContextAccessor"/> interface.</param>
  28. public DefaultAuthorizationHandler(
  29. IUserManager userManager,
  30. INetworkManager networkManager,
  31. IHttpContextAccessor httpContextAccessor)
  32. {
  33. _userManager = userManager;
  34. _networkManager = networkManager;
  35. _httpContextAccessor = httpContextAccessor;
  36. }
  37. /// <inheritdoc />
  38. protected override Task HandleRequirementAsync(AuthorizationHandlerContext context, DefaultAuthorizationRequirement requirement)
  39. {
  40. var isApiKey = context.User.GetIsApiKey();
  41. var userId = context.User.GetUserId();
  42. // This likely only happens during the wizard, so skip the default checks and let any other handlers do it
  43. if (!isApiKey && userId.IsEmpty())
  44. {
  45. return Task.CompletedTask;
  46. }
  47. if (isApiKey)
  48. {
  49. // Api keys are unrestricted.
  50. context.Succeed(requirement);
  51. return Task.CompletedTask;
  52. }
  53. var isInLocalNetwork = _httpContextAccessor.HttpContext is not null
  54. && _networkManager.IsInLocalNetwork(_httpContextAccessor.HttpContext.GetNormalizedRemoteIP());
  55. var user = _userManager.GetUserById(userId);
  56. if (user is null)
  57. {
  58. throw new ResourceNotFoundException();
  59. }
  60. // User cannot access remotely and user is remote
  61. if (!isInLocalNetwork && !user.HasPermission(PermissionKind.EnableRemoteAccess))
  62. {
  63. context.Fail();
  64. return Task.CompletedTask;
  65. }
  66. // Admins can do everything
  67. if (context.User.IsInRole(UserRoles.Administrator))
  68. {
  69. context.Succeed(requirement);
  70. return Task.CompletedTask;
  71. }
  72. // It's not great to have this check, but parental schedule must usually be honored except in a few rare cases
  73. if (requirement.ValidateParentalSchedule && !user.IsParentalScheduleAllowed())
  74. {
  75. context.Fail();
  76. return Task.CompletedTask;
  77. }
  78. // Only succeed if the requirement isn't a subclass as any subclassed requirement will handle success in its own handler
  79. if (requirement.GetType() == typeof(DefaultAuthorizationRequirement))
  80. {
  81. context.Succeed(requirement);
  82. }
  83. return Task.CompletedTask;
  84. }
  85. }
  86. }