| | 1 | | using System; |
| | 2 | | using System.Collections.Generic; |
| | 3 | | using System.ComponentModel.DataAnnotations; |
| | 4 | | using System.Linq; |
| | 5 | | using System.Threading.Tasks; |
| | 6 | | using Jellyfin.Api.Constants; |
| | 7 | | using Jellyfin.Api.Extensions; |
| | 8 | | using Jellyfin.Api.Helpers; |
| | 9 | | using Jellyfin.Api.Models.UserDtos; |
| | 10 | | using Jellyfin.Data; |
| | 11 | | using Jellyfin.Database.Implementations.Enums; |
| | 12 | | using Jellyfin.Extensions; |
| | 13 | | using MediaBrowser.Common.Api; |
| | 14 | | using MediaBrowser.Common.Extensions; |
| | 15 | | using MediaBrowser.Common.Net; |
| | 16 | | using MediaBrowser.Controller.Authentication; |
| | 17 | | using MediaBrowser.Controller.Configuration; |
| | 18 | | using MediaBrowser.Controller.Devices; |
| | 19 | | using MediaBrowser.Controller.Library; |
| | 20 | | using MediaBrowser.Controller.Net; |
| | 21 | | using MediaBrowser.Controller.Playlists; |
| | 22 | | using MediaBrowser.Controller.QuickConnect; |
| | 23 | | using MediaBrowser.Controller.Session; |
| | 24 | | using MediaBrowser.Model.Configuration; |
| | 25 | | using MediaBrowser.Model.Dto; |
| | 26 | | using MediaBrowser.Model.Users; |
| | 27 | | using Microsoft.AspNetCore.Authorization; |
| | 28 | | using Microsoft.AspNetCore.Http; |
| | 29 | | using Microsoft.AspNetCore.Mvc; |
| | 30 | | using Microsoft.Extensions.Logging; |
| | 31 | |
|
| | 32 | | namespace Jellyfin.Api.Controllers; |
| | 33 | |
|
| | 34 | | /// <summary> |
| | 35 | | /// User controller. |
| | 36 | | /// </summary> |
| | 37 | | [Route("Users")] |
| | 38 | | public class UserController : BaseJellyfinApiController |
| | 39 | | { |
| | 40 | | private readonly IUserManager _userManager; |
| | 41 | | private readonly ISessionManager _sessionManager; |
| | 42 | | private readonly INetworkManager _networkManager; |
| | 43 | | private readonly IDeviceManager _deviceManager; |
| | 44 | | private readonly IAuthorizationContext _authContext; |
| | 45 | | private readonly IServerConfigurationManager _config; |
| | 46 | | private readonly ILogger _logger; |
| | 47 | | private readonly IQuickConnect _quickConnectManager; |
| | 48 | | private readonly IPlaylistManager _playlistManager; |
| | 49 | |
|
| | 50 | | /// <summary> |
| | 51 | | /// Initializes a new instance of the <see cref="UserController"/> class. |
| | 52 | | /// </summary> |
| | 53 | | /// <param name="userManager">Instance of the <see cref="IUserManager"/> interface.</param> |
| | 54 | | /// <param name="sessionManager">Instance of the <see cref="ISessionManager"/> interface.</param> |
| | 55 | | /// <param name="networkManager">Instance of the <see cref="INetworkManager"/> interface.</param> |
| | 56 | | /// <param name="deviceManager">Instance of the <see cref="IDeviceManager"/> interface.</param> |
| | 57 | | /// <param name="authContext">Instance of the <see cref="IAuthorizationContext"/> interface.</param> |
| | 58 | | /// <param name="config">Instance of the <see cref="IServerConfigurationManager"/> interface.</param> |
| | 59 | | /// <param name="logger">Instance of the <see cref="ILogger"/> interface.</param> |
| | 60 | | /// <param name="quickConnectManager">Instance of the <see cref="IQuickConnect"/> interface.</param> |
| | 61 | | /// <param name="playlistManager">Instance of the <see cref="IPlaylistManager"/> interface.</param> |
| 50 | 62 | | public UserController( |
| 50 | 63 | | IUserManager userManager, |
| 50 | 64 | | ISessionManager sessionManager, |
| 50 | 65 | | INetworkManager networkManager, |
| 50 | 66 | | IDeviceManager deviceManager, |
| 50 | 67 | | IAuthorizationContext authContext, |
| 50 | 68 | | IServerConfigurationManager config, |
| 50 | 69 | | ILogger<UserController> logger, |
| 50 | 70 | | IQuickConnect quickConnectManager, |
| 50 | 71 | | IPlaylistManager playlistManager) |
| | 72 | | { |
| 50 | 73 | | _userManager = userManager; |
| 50 | 74 | | _sessionManager = sessionManager; |
| 50 | 75 | | _networkManager = networkManager; |
| 50 | 76 | | _deviceManager = deviceManager; |
| 50 | 77 | | _authContext = authContext; |
| 50 | 78 | | _config = config; |
| 50 | 79 | | _logger = logger; |
| 50 | 80 | | _quickConnectManager = quickConnectManager; |
| 50 | 81 | | _playlistManager = playlistManager; |
| 50 | 82 | | } |
| | 83 | |
|
| | 84 | | /// <summary> |
| | 85 | | /// Gets a list of users. |
| | 86 | | /// </summary> |
| | 87 | | /// <param name="isHidden">Optional filter by IsHidden=true or false.</param> |
| | 88 | | /// <param name="isDisabled">Optional filter by IsDisabled=true or false.</param> |
| | 89 | | /// <response code="200">Users returned.</response> |
| | 90 | | /// <returns>An <see cref="IEnumerable{UserDto}"/> containing the users.</returns> |
| | 91 | | [HttpGet] |
| | 92 | | [Authorize] |
| | 93 | | [ProducesResponseType(StatusCodes.Status200OK)] |
| | 94 | | public ActionResult<IEnumerable<UserDto>> GetUsers( |
| | 95 | | [FromQuery] bool? isHidden, |
| | 96 | | [FromQuery] bool? isDisabled) |
| | 97 | | { |
| 3 | 98 | | var users = Get(isHidden, isDisabled, false, false); |
| 3 | 99 | | return Ok(users); |
| | 100 | | } |
| | 101 | |
|
| | 102 | | /// <summary> |
| | 103 | | /// Gets a list of publicly visible users for display on a login screen. |
| | 104 | | /// </summary> |
| | 105 | | /// <response code="200">Public users returned.</response> |
| | 106 | | /// <returns>An <see cref="IEnumerable{UserDto}"/> containing the public users.</returns> |
| | 107 | | [HttpGet("Public")] |
| | 108 | | [ProducesResponseType(StatusCodes.Status200OK)] |
| | 109 | | public ActionResult<IEnumerable<UserDto>> GetPublicUsers() |
| | 110 | | { |
| | 111 | | // If the startup wizard hasn't been completed then just return all users |
| 1 | 112 | | if (!_config.Configuration.IsStartupWizardCompleted) |
| | 113 | | { |
| 1 | 114 | | return Ok(Get(false, false, false, false)); |
| | 115 | | } |
| | 116 | |
|
| 0 | 117 | | return Ok(Get(false, false, true, true)); |
| | 118 | | } |
| | 119 | |
|
| | 120 | | /// <summary> |
| | 121 | | /// Gets a user by Id. |
| | 122 | | /// </summary> |
| | 123 | | /// <param name="userId">The user id.</param> |
| | 124 | | /// <response code="200">User returned.</response> |
| | 125 | | /// <response code="404">User not found.</response> |
| | 126 | | /// <returns>An <see cref="UserDto"/> with information about the user or a <see cref="NotFoundResult"/> if the user |
| | 127 | | [HttpGet("{userId}")] |
| | 128 | | [Authorize(Policy = Policies.IgnoreParentalControl)] |
| | 129 | | [ProducesResponseType(StatusCodes.Status200OK)] |
| | 130 | | [ProducesResponseType(StatusCodes.Status404NotFound)] |
| | 131 | | public ActionResult<UserDto> GetUserById([FromRoute, Required] Guid userId) |
| | 132 | | { |
| 0 | 133 | | var user = _userManager.GetUserById(userId); |
| | 134 | |
|
| 0 | 135 | | if (user is null) |
| | 136 | | { |
| 0 | 137 | | return NotFound("User not found"); |
| | 138 | | } |
| | 139 | |
|
| 0 | 140 | | var result = _userManager.GetUserDto(user, HttpContext.GetNormalizedRemoteIP().ToString()); |
| 0 | 141 | | return result; |
| | 142 | | } |
| | 143 | |
|
| | 144 | | /// <summary> |
| | 145 | | /// Deletes a user. |
| | 146 | | /// </summary> |
| | 147 | | /// <param name="userId">The user id.</param> |
| | 148 | | /// <response code="204">User deleted.</response> |
| | 149 | | /// <response code="404">User not found.</response> |
| | 150 | | /// <returns>A <see cref="NoContentResult"/> indicating success or a <see cref="NotFoundResult"/> if the user was no |
| | 151 | | [HttpDelete("{userId}")] |
| | 152 | | [Authorize(Policy = Policies.RequiresElevation)] |
| | 153 | | [ProducesResponseType(StatusCodes.Status204NoContent)] |
| | 154 | | [ProducesResponseType(StatusCodes.Status404NotFound)] |
| | 155 | | public async Task<ActionResult> DeleteUser([FromRoute, Required] Guid userId) |
| | 156 | | { |
| | 157 | | var user = _userManager.GetUserById(userId); |
| | 158 | | if (user is null) |
| | 159 | | { |
| | 160 | | return NotFound(); |
| | 161 | | } |
| | 162 | |
|
| | 163 | | await _sessionManager.RevokeUserTokens(user.Id, null).ConfigureAwait(false); |
| | 164 | | await _playlistManager.RemovePlaylistsAsync(userId).ConfigureAwait(false); |
| | 165 | | await _userManager.DeleteUserAsync(userId).ConfigureAwait(false); |
| | 166 | | return NoContent(); |
| | 167 | | } |
| | 168 | |
|
| | 169 | | /// <summary> |
| | 170 | | /// Authenticates a user. |
| | 171 | | /// </summary> |
| | 172 | | /// <param name="userId">The user id.</param> |
| | 173 | | /// <param name="pw">The password as plain text.</param> |
| | 174 | | /// <response code="200">User authenticated.</response> |
| | 175 | | /// <response code="403">Sha1-hashed password only is not allowed.</response> |
| | 176 | | /// <response code="404">User not found.</response> |
| | 177 | | /// <returns>A <see cref="Task"/> containing an <see cref="AuthenticationResult"/>.</returns> |
| | 178 | | [HttpPost("{userId}/Authenticate")] |
| | 179 | | [ProducesResponseType(StatusCodes.Status200OK)] |
| | 180 | | [ProducesResponseType(StatusCodes.Status403Forbidden)] |
| | 181 | | [ProducesResponseType(StatusCodes.Status404NotFound)] |
| | 182 | | [ApiExplorerSettings(IgnoreApi = true)] |
| | 183 | | [Obsolete("Authenticate with username instead")] |
| | 184 | | public async Task<ActionResult<AuthenticationResult>> AuthenticateUser( |
| | 185 | | [FromRoute, Required] Guid userId, |
| | 186 | | [FromQuery, Required] string pw) |
| | 187 | | { |
| | 188 | | var user = _userManager.GetUserById(userId); |
| | 189 | |
|
| | 190 | | if (user is null) |
| | 191 | | { |
| | 192 | | return NotFound("User not found"); |
| | 193 | | } |
| | 194 | |
|
| | 195 | | AuthenticateUserByName request = new AuthenticateUserByName |
| | 196 | | { |
| | 197 | | Username = user.Username, |
| | 198 | | Pw = pw |
| | 199 | | }; |
| | 200 | | return await AuthenticateUserByName(request).ConfigureAwait(false); |
| | 201 | | } |
| | 202 | |
|
| | 203 | | /// <summary> |
| | 204 | | /// Authenticates a user by name. |
| | 205 | | /// </summary> |
| | 206 | | /// <param name="request">The <see cref="AuthenticateUserByName"/> request.</param> |
| | 207 | | /// <response code="200">User authenticated.</response> |
| | 208 | | /// <returns>A <see cref="Task"/> containing an <see cref="AuthenticationRequest"/> with information about the new s |
| | 209 | | [HttpPost("AuthenticateByName")] |
| | 210 | | [ProducesResponseType(StatusCodes.Status200OK)] |
| | 211 | | public async Task<ActionResult<AuthenticationResult>> AuthenticateUserByName([FromBody, Required] AuthenticateUserBy |
| | 212 | | { |
| | 213 | | var auth = await _authContext.GetAuthorizationInfo(Request).ConfigureAwait(false); |
| | 214 | |
|
| | 215 | | try |
| | 216 | | { |
| | 217 | | var result = await _sessionManager.AuthenticateNewSession(new AuthenticationRequest |
| | 218 | | { |
| | 219 | | App = auth.Client, |
| | 220 | | AppVersion = auth.Version, |
| | 221 | | DeviceId = auth.DeviceId, |
| | 222 | | DeviceName = auth.Device, |
| | 223 | | Password = request.Pw, |
| | 224 | | RemoteEndPoint = HttpContext.GetNormalizedRemoteIP().ToString(), |
| | 225 | | Username = request.Username |
| | 226 | | }).ConfigureAwait(false); |
| | 227 | |
|
| | 228 | | return result; |
| | 229 | | } |
| | 230 | | catch (SecurityException e) |
| | 231 | | { |
| | 232 | | // rethrow adding IP address to message |
| | 233 | | throw new SecurityException($"[{HttpContext.GetNormalizedRemoteIP()}] {e.Message}", e); |
| | 234 | | } |
| | 235 | | } |
| | 236 | |
|
| | 237 | | /// <summary> |
| | 238 | | /// Authenticates a user with quick connect. |
| | 239 | | /// </summary> |
| | 240 | | /// <param name="request">The <see cref="QuickConnectDto"/> request.</param> |
| | 241 | | /// <response code="200">User authenticated.</response> |
| | 242 | | /// <response code="400">Missing token.</response> |
| | 243 | | /// <returns>A <see cref="Task"/> containing an <see cref="AuthenticationRequest"/> with information about the new s |
| | 244 | | [HttpPost("AuthenticateWithQuickConnect")] |
| | 245 | | [ProducesResponseType(StatusCodes.Status200OK)] |
| | 246 | | public ActionResult<AuthenticationResult> AuthenticateWithQuickConnect([FromBody, Required] QuickConnectDto request) |
| | 247 | | { |
| | 248 | | try |
| | 249 | | { |
| 0 | 250 | | return _quickConnectManager.GetAuthorizedRequest(request.Secret); |
| | 251 | | } |
| 0 | 252 | | catch (SecurityException e) |
| | 253 | | { |
| | 254 | | // rethrow adding IP address to message |
| 0 | 255 | | throw new SecurityException($"[{HttpContext.GetNormalizedRemoteIP()}] {e.Message}", e); |
| | 256 | | } |
| 0 | 257 | | } |
| | 258 | |
|
| | 259 | | /// <summary> |
| | 260 | | /// Updates a user's password. |
| | 261 | | /// </summary> |
| | 262 | | /// <param name="userId">The user id.</param> |
| | 263 | | /// <param name="request">The <see cref="UpdateUserPassword"/> request.</param> |
| | 264 | | /// <response code="204">Password successfully reset.</response> |
| | 265 | | /// <response code="403">User is not allowed to update the password.</response> |
| | 266 | | /// <response code="404">User not found.</response> |
| | 267 | | /// <returns>A <see cref="NoContentResult"/> indicating success or a <see cref="ForbidResult"/> or a <see cref="NotF |
| | 268 | | [HttpPost("Password")] |
| | 269 | | [Authorize] |
| | 270 | | [ProducesResponseType(StatusCodes.Status204NoContent)] |
| | 271 | | [ProducesResponseType(StatusCodes.Status403Forbidden)] |
| | 272 | | [ProducesResponseType(StatusCodes.Status404NotFound)] |
| | 273 | | public async Task<ActionResult> UpdateUserPassword( |
| | 274 | | [FromQuery] Guid? userId, |
| | 275 | | [FromBody, Required] UpdateUserPassword request) |
| | 276 | | { |
| | 277 | | var requestUserId = userId ?? User.GetUserId(); |
| | 278 | | var user = _userManager.GetUserById(requestUserId); |
| | 279 | | if (user is null) |
| | 280 | | { |
| | 281 | | return NotFound(); |
| | 282 | | } |
| | 283 | |
|
| | 284 | | if (!RequestHelpers.AssertCanUpdateUser(User, user, true)) |
| | 285 | | { |
| | 286 | | return StatusCode(StatusCodes.Status403Forbidden, "User is not allowed to update the password."); |
| | 287 | | } |
| | 288 | |
|
| | 289 | | if (request.ResetPassword) |
| | 290 | | { |
| | 291 | | await _userManager.ResetPassword(user).ConfigureAwait(false); |
| | 292 | | } |
| | 293 | | else |
| | 294 | | { |
| | 295 | | if (!User.IsInRole(UserRoles.Administrator) || (userId.HasValue && User.GetUserId().Equals(userId.Value))) |
| | 296 | | { |
| | 297 | | var success = await _userManager.AuthenticateUser( |
| | 298 | | user.Username, |
| | 299 | | request.CurrentPw ?? string.Empty, |
| | 300 | | HttpContext.GetNormalizedRemoteIP().ToString(), |
| | 301 | | false).ConfigureAwait(false); |
| | 302 | |
|
| | 303 | | if (success is null) |
| | 304 | | { |
| | 305 | | return StatusCode(StatusCodes.Status403Forbidden, "Invalid user or password entered."); |
| | 306 | | } |
| | 307 | | } |
| | 308 | |
|
| | 309 | | await _userManager.ChangePassword(user, request.NewPw ?? string.Empty).ConfigureAwait(false); |
| | 310 | |
|
| | 311 | | var currentToken = User.GetToken(); |
| | 312 | |
|
| | 313 | | await _sessionManager.RevokeUserTokens(user.Id, currentToken).ConfigureAwait(false); |
| | 314 | | } |
| | 315 | |
|
| | 316 | | return NoContent(); |
| | 317 | | } |
| | 318 | |
|
| | 319 | | /// <summary> |
| | 320 | | /// Updates a user's password. |
| | 321 | | /// </summary> |
| | 322 | | /// <param name="userId">The user id.</param> |
| | 323 | | /// <param name="request">The <see cref="UpdateUserPassword"/> request.</param> |
| | 324 | | /// <response code="204">Password successfully reset.</response> |
| | 325 | | /// <response code="403">User is not allowed to update the password.</response> |
| | 326 | | /// <response code="404">User not found.</response> |
| | 327 | | /// <returns>A <see cref="NoContentResult"/> indicating success or a <see cref="ForbidResult"/> or a <see cref="NotF |
| | 328 | | [HttpPost("{userId}/Password")] |
| | 329 | | [Authorize] |
| | 330 | | [ProducesResponseType(StatusCodes.Status204NoContent)] |
| | 331 | | [ProducesResponseType(StatusCodes.Status403Forbidden)] |
| | 332 | | [ProducesResponseType(StatusCodes.Status404NotFound)] |
| | 333 | | [Obsolete("Kept for backwards compatibility")] |
| | 334 | | [ApiExplorerSettings(IgnoreApi = true)] |
| | 335 | | public Task<ActionResult> UpdateUserPasswordLegacy( |
| | 336 | | [FromRoute, Required] Guid userId, |
| | 337 | | [FromBody, Required] UpdateUserPassword request) |
| | 338 | | => UpdateUserPassword(userId, request); |
| | 339 | |
|
| | 340 | | /// <summary> |
| | 341 | | /// Updates a user's easy password. |
| | 342 | | /// </summary> |
| | 343 | | /// <param name="userId">The user id.</param> |
| | 344 | | /// <param name="request">The <see cref="UpdateUserEasyPassword"/> request.</param> |
| | 345 | | /// <response code="204">Password successfully reset.</response> |
| | 346 | | /// <response code="403">User is not allowed to update the password.</response> |
| | 347 | | /// <response code="404">User not found.</response> |
| | 348 | | /// <returns>A <see cref="NoContentResult"/> indicating success or a <see cref="ForbidResult"/> or a <see cref="NotF |
| | 349 | | [HttpPost("{userId}/EasyPassword")] |
| | 350 | | [Obsolete("Use Quick Connect instead")] |
| | 351 | | [ApiExplorerSettings(IgnoreApi = true)] |
| | 352 | | [Authorize] |
| | 353 | | [ProducesResponseType(StatusCodes.Status204NoContent)] |
| | 354 | | [ProducesResponseType(StatusCodes.Status403Forbidden)] |
| | 355 | | [ProducesResponseType(StatusCodes.Status404NotFound)] |
| | 356 | | public ActionResult UpdateUserEasyPassword( |
| | 357 | | [FromRoute, Required] Guid userId, |
| | 358 | | [FromBody, Required] UpdateUserEasyPassword request) |
| | 359 | | { |
| | 360 | | return Forbid(); |
| | 361 | | } |
| | 362 | |
|
| | 363 | | /// <summary> |
| | 364 | | /// Updates a user. |
| | 365 | | /// </summary> |
| | 366 | | /// <param name="userId">The user id.</param> |
| | 367 | | /// <param name="updateUser">The updated user model.</param> |
| | 368 | | /// <response code="204">User updated.</response> |
| | 369 | | /// <response code="400">User information was not supplied.</response> |
| | 370 | | /// <response code="403">User update forbidden.</response> |
| | 371 | | /// <returns>A <see cref="NoContentResult"/> indicating success or a <see cref="BadRequestResult"/> or a <see cref=" |
| | 372 | | [HttpPost] |
| | 373 | | [Authorize] |
| | 374 | | [ProducesResponseType(StatusCodes.Status204NoContent)] |
| | 375 | | [ProducesResponseType(StatusCodes.Status400BadRequest)] |
| | 376 | | [ProducesResponseType(StatusCodes.Status403Forbidden)] |
| | 377 | | public async Task<ActionResult> UpdateUser( |
| | 378 | | [FromQuery] Guid? userId, |
| | 379 | | [FromBody, Required] UserDto updateUser) |
| | 380 | | { |
| | 381 | | var requestUserId = userId ?? User.GetUserId(); |
| | 382 | | var user = _userManager.GetUserById(requestUserId); |
| | 383 | | if (user is null) |
| | 384 | | { |
| | 385 | | return NotFound(); |
| | 386 | | } |
| | 387 | |
|
| | 388 | | if (!RequestHelpers.AssertCanUpdateUser(User, user, true)) |
| | 389 | | { |
| | 390 | | return StatusCode(StatusCodes.Status403Forbidden, "User update not allowed."); |
| | 391 | | } |
| | 392 | |
|
| | 393 | | if (!string.Equals(user.Username, updateUser.Name, StringComparison.Ordinal)) |
| | 394 | | { |
| | 395 | | await _userManager.RenameUser(user, updateUser.Name).ConfigureAwait(false); |
| | 396 | | } |
| | 397 | |
|
| | 398 | | await _userManager.UpdateConfigurationAsync(requestUserId, updateUser.Configuration).ConfigureAwait(false); |
| | 399 | |
|
| | 400 | | return NoContent(); |
| | 401 | | } |
| | 402 | |
|
| | 403 | | /// <summary> |
| | 404 | | /// Updates a user. |
| | 405 | | /// </summary> |
| | 406 | | /// <param name="userId">The user id.</param> |
| | 407 | | /// <param name="updateUser">The updated user model.</param> |
| | 408 | | /// <response code="204">User updated.</response> |
| | 409 | | /// <response code="400">User information was not supplied.</response> |
| | 410 | | /// <response code="403">User update forbidden.</response> |
| | 411 | | /// <returns>A <see cref="NoContentResult"/> indicating success or a <see cref="BadRequestResult"/> or a <see cref=" |
| | 412 | | [HttpPost("{userId}")] |
| | 413 | | [Authorize] |
| | 414 | | [ProducesResponseType(StatusCodes.Status204NoContent)] |
| | 415 | | [ProducesResponseType(StatusCodes.Status400BadRequest)] |
| | 416 | | [ProducesResponseType(StatusCodes.Status403Forbidden)] |
| | 417 | | [Obsolete("Kept for backwards compatibility")] |
| | 418 | | [ApiExplorerSettings(IgnoreApi = true)] |
| | 419 | | public Task<ActionResult> UpdateUserLegacy( |
| | 420 | | [FromRoute, Required] Guid userId, |
| | 421 | | [FromBody, Required] UserDto updateUser) |
| | 422 | | => UpdateUser(userId, updateUser); |
| | 423 | |
|
| | 424 | | /// <summary> |
| | 425 | | /// Updates a user policy. |
| | 426 | | /// </summary> |
| | 427 | | /// <param name="userId">The user id.</param> |
| | 428 | | /// <param name="newPolicy">The new user policy.</param> |
| | 429 | | /// <response code="204">User policy updated.</response> |
| | 430 | | /// <response code="400">User policy was not supplied.</response> |
| | 431 | | /// <response code="403">User policy update forbidden.</response> |
| | 432 | | /// <returns>A <see cref="NoContentResult"/> indicating success or a <see cref="BadRequestResult"/> or a <see cref=" |
| | 433 | | [HttpPost("{userId}/Policy")] |
| | 434 | | [Authorize(Policy = Policies.RequiresElevation)] |
| | 435 | | [ProducesResponseType(StatusCodes.Status204NoContent)] |
| | 436 | | [ProducesResponseType(StatusCodes.Status400BadRequest)] |
| | 437 | | [ProducesResponseType(StatusCodes.Status403Forbidden)] |
| | 438 | | public async Task<ActionResult> UpdateUserPolicy( |
| | 439 | | [FromRoute, Required] Guid userId, |
| | 440 | | [FromBody, Required] UserPolicy newPolicy) |
| | 441 | | { |
| | 442 | | var user = _userManager.GetUserById(userId); |
| | 443 | | if (user is null) |
| | 444 | | { |
| | 445 | | return NotFound(); |
| | 446 | | } |
| | 447 | |
|
| | 448 | | // If removing admin access |
| | 449 | | if (!newPolicy.IsAdministrator && user.HasPermission(PermissionKind.IsAdministrator)) |
| | 450 | | { |
| | 451 | | if (_userManager.Users.Count(i => i.HasPermission(PermissionKind.IsAdministrator)) == 1) |
| | 452 | | { |
| | 453 | | return StatusCode(StatusCodes.Status403Forbidden, "There must be at least one user in the system with ad |
| | 454 | | } |
| | 455 | | } |
| | 456 | |
|
| | 457 | | // If disabling |
| | 458 | | if (newPolicy.IsDisabled && user.HasPermission(PermissionKind.IsAdministrator)) |
| | 459 | | { |
| | 460 | | return StatusCode(StatusCodes.Status403Forbidden, "Administrators cannot be disabled."); |
| | 461 | | } |
| | 462 | |
|
| | 463 | | // If disabling |
| | 464 | | if (newPolicy.IsDisabled && !user.HasPermission(PermissionKind.IsDisabled)) |
| | 465 | | { |
| | 466 | | if (_userManager.Users.Count(i => !i.HasPermission(PermissionKind.IsDisabled)) == 1) |
| | 467 | | { |
| | 468 | | return StatusCode(StatusCodes.Status403Forbidden, "There must be at least one enabled user in the system |
| | 469 | | } |
| | 470 | |
|
| | 471 | | var currentToken = User.GetToken(); |
| | 472 | | await _sessionManager.RevokeUserTokens(user.Id, currentToken).ConfigureAwait(false); |
| | 473 | | } |
| | 474 | |
|
| | 475 | | await _userManager.UpdatePolicyAsync(userId, newPolicy).ConfigureAwait(false); |
| | 476 | |
|
| | 477 | | return NoContent(); |
| | 478 | | } |
| | 479 | |
|
| | 480 | | /// <summary> |
| | 481 | | /// Updates a user configuration. |
| | 482 | | /// </summary> |
| | 483 | | /// <param name="userId">The user id.</param> |
| | 484 | | /// <param name="userConfig">The new user configuration.</param> |
| | 485 | | /// <response code="204">User configuration updated.</response> |
| | 486 | | /// <response code="403">User configuration update forbidden.</response> |
| | 487 | | /// <returns>A <see cref="NoContentResult"/> indicating success.</returns> |
| | 488 | | [HttpPost("Configuration")] |
| | 489 | | [Authorize] |
| | 490 | | [ProducesResponseType(StatusCodes.Status204NoContent)] |
| | 491 | | [ProducesResponseType(StatusCodes.Status403Forbidden)] |
| | 492 | | public async Task<ActionResult> UpdateUserConfiguration( |
| | 493 | | [FromQuery] Guid? userId, |
| | 494 | | [FromBody, Required] UserConfiguration userConfig) |
| | 495 | | { |
| | 496 | | var requestUserId = userId ?? User.GetUserId(); |
| | 497 | | var user = _userManager.GetUserById(requestUserId); |
| | 498 | | if (user is null) |
| | 499 | | { |
| | 500 | | return NotFound(); |
| | 501 | | } |
| | 502 | |
|
| | 503 | | if (!RequestHelpers.AssertCanUpdateUser(User, user, true)) |
| | 504 | | { |
| | 505 | | return StatusCode(StatusCodes.Status403Forbidden, "User configuration update not allowed"); |
| | 506 | | } |
| | 507 | |
|
| | 508 | | await _userManager.UpdateConfigurationAsync(requestUserId, userConfig).ConfigureAwait(false); |
| | 509 | |
|
| | 510 | | return NoContent(); |
| | 511 | | } |
| | 512 | |
|
| | 513 | | /// <summary> |
| | 514 | | /// Updates a user configuration. |
| | 515 | | /// </summary> |
| | 516 | | /// <param name="userId">The user id.</param> |
| | 517 | | /// <param name="userConfig">The new user configuration.</param> |
| | 518 | | /// <response code="204">User configuration updated.</response> |
| | 519 | | /// <response code="403">User configuration update forbidden.</response> |
| | 520 | | /// <returns>A <see cref="NoContentResult"/> indicating success.</returns> |
| | 521 | | [HttpPost("{userId}/Configuration")] |
| | 522 | | [Authorize] |
| | 523 | | [Obsolete("Kept for backwards compatibility")] |
| | 524 | | [ApiExplorerSettings(IgnoreApi = true)] |
| | 525 | | [ProducesResponseType(StatusCodes.Status204NoContent)] |
| | 526 | | [ProducesResponseType(StatusCodes.Status403Forbidden)] |
| | 527 | | public Task<ActionResult> UpdateUserConfigurationLegacy( |
| | 528 | | [FromRoute, Required] Guid userId, |
| | 529 | | [FromBody, Required] UserConfiguration userConfig) |
| | 530 | | => UpdateUserConfiguration(userId, userConfig); |
| | 531 | |
|
| | 532 | | /// <summary> |
| | 533 | | /// Creates a user. |
| | 534 | | /// </summary> |
| | 535 | | /// <param name="request">The create user by name request body.</param> |
| | 536 | | /// <response code="200">User created.</response> |
| | 537 | | /// <returns>An <see cref="UserDto"/> of the new user.</returns> |
| | 538 | | [HttpPost("New")] |
| | 539 | | [Authorize(Policy = Policies.RequiresElevation)] |
| | 540 | | [ProducesResponseType(StatusCodes.Status200OK)] |
| | 541 | | public async Task<ActionResult<UserDto>> CreateUserByName([FromBody, Required] CreateUserByName request) |
| | 542 | | { |
| | 543 | | var newUser = await _userManager.CreateUserAsync(request.Name).ConfigureAwait(false); |
| | 544 | |
|
| | 545 | | // no need to authenticate password for new user |
| | 546 | | if (request.Password is not null) |
| | 547 | | { |
| | 548 | | await _userManager.ChangePassword(newUser, request.Password).ConfigureAwait(false); |
| | 549 | | } |
| | 550 | |
|
| | 551 | | var result = _userManager.GetUserDto(newUser, HttpContext.GetNormalizedRemoteIP().ToString()); |
| | 552 | |
|
| | 553 | | return result; |
| | 554 | | } |
| | 555 | |
|
| | 556 | | /// <summary> |
| | 557 | | /// Initiates the forgot password process for a local user. |
| | 558 | | /// </summary> |
| | 559 | | /// <param name="forgotPasswordRequest">The forgot password request containing the entered username.</param> |
| | 560 | | /// <response code="200">Password reset process started.</response> |
| | 561 | | /// <returns>A <see cref="Task"/> containing a <see cref="ForgotPasswordResult"/>.</returns> |
| | 562 | | [HttpPost("ForgotPassword")] |
| | 563 | | [ProducesResponseType(StatusCodes.Status200OK)] |
| | 564 | | public async Task<ActionResult<ForgotPasswordResult>> ForgotPassword([FromBody, Required] ForgotPasswordDto forgotPa |
| | 565 | | { |
| | 566 | | var ip = HttpContext.GetNormalizedRemoteIP(); |
| | 567 | | var isLocal = HttpContext.IsLocal() |
| | 568 | | || _networkManager.IsInLocalNetwork(ip); |
| | 569 | |
|
| | 570 | | if (!isLocal) |
| | 571 | | { |
| | 572 | | _logger.LogWarning("Password reset process initiated from outside the local network with IP: {IP}", ip); |
| | 573 | | } |
| | 574 | |
|
| | 575 | | var result = await _userManager.StartForgotPasswordProcess(forgotPasswordRequest.EnteredUsername, isLocal).Confi |
| | 576 | |
|
| | 577 | | return result; |
| | 578 | | } |
| | 579 | |
|
| | 580 | | /// <summary> |
| | 581 | | /// Redeems a forgot password pin. |
| | 582 | | /// </summary> |
| | 583 | | /// <param name="forgotPasswordPinRequest">The forgot password pin request containing the entered pin.</param> |
| | 584 | | /// <response code="200">Pin reset process started.</response> |
| | 585 | | /// <returns>A <see cref="Task"/> containing a <see cref="PinRedeemResult"/>.</returns> |
| | 586 | | [HttpPost("ForgotPassword/Pin")] |
| | 587 | | [ProducesResponseType(StatusCodes.Status200OK)] |
| | 588 | | public async Task<ActionResult<PinRedeemResult>> ForgotPasswordPin([FromBody, Required] ForgotPasswordPinDto forgotP |
| | 589 | | { |
| | 590 | | var result = await _userManager.RedeemPasswordResetPin(forgotPasswordPinRequest.Pin).ConfigureAwait(false); |
| | 591 | | return result; |
| | 592 | | } |
| | 593 | |
|
| | 594 | | /// <summary> |
| | 595 | | /// Gets the user based on auth token. |
| | 596 | | /// </summary> |
| | 597 | | /// <response code="200">User returned.</response> |
| | 598 | | /// <response code="400">Token is not owned by a user.</response> |
| | 599 | | /// <returns>A <see cref="UserDto"/> for the authenticated user.</returns> |
| | 600 | | [HttpGet("Me")] |
| | 601 | | [Authorize] |
| | 602 | | [ProducesResponseType(StatusCodes.Status200OK)] |
| | 603 | | [ProducesResponseType(StatusCodes.Status400BadRequest)] |
| | 604 | | public ActionResult<UserDto> GetCurrentUser() |
| | 605 | | { |
| 17 | 606 | | var userId = User.GetUserId(); |
| 17 | 607 | | if (userId.IsEmpty()) |
| | 608 | | { |
| 0 | 609 | | return BadRequest(); |
| | 610 | | } |
| | 611 | |
|
| 17 | 612 | | var user = _userManager.GetUserById(userId); |
| 17 | 613 | | if (user is null) |
| | 614 | | { |
| 0 | 615 | | return BadRequest(); |
| | 616 | | } |
| | 617 | |
|
| 17 | 618 | | return _userManager.GetUserDto(user); |
| | 619 | | } |
| | 620 | |
|
| | 621 | | private IEnumerable<UserDto> Get(bool? isHidden, bool? isDisabled, bool filterByDevice, bool filterByNetwork) |
| | 622 | | { |
| 4 | 623 | | var users = _userManager.Users; |
| | 624 | |
|
| 4 | 625 | | if (isDisabled.HasValue) |
| | 626 | | { |
| 1 | 627 | | users = users.Where(i => i.HasPermission(PermissionKind.IsDisabled) == isDisabled.Value); |
| | 628 | | } |
| | 629 | |
|
| 4 | 630 | | if (isHidden.HasValue) |
| | 631 | | { |
| 1 | 632 | | users = users.Where(i => i.HasPermission(PermissionKind.IsHidden) == isHidden.Value); |
| | 633 | | } |
| | 634 | |
|
| 4 | 635 | | if (filterByDevice) |
| | 636 | | { |
| 0 | 637 | | var deviceId = User.GetDeviceId(); |
| | 638 | |
|
| 0 | 639 | | if (!string.IsNullOrWhiteSpace(deviceId)) |
| | 640 | | { |
| 0 | 641 | | users = users.Where(i => _deviceManager.CanAccessDevice(i, deviceId)); |
| | 642 | | } |
| | 643 | | } |
| | 644 | |
|
| 4 | 645 | | if (filterByNetwork) |
| | 646 | | { |
| 0 | 647 | | if (!_networkManager.IsInLocalNetwork(HttpContext.GetNormalizedRemoteIP())) |
| | 648 | | { |
| 0 | 649 | | users = users.Where(i => i.HasPermission(PermissionKind.EnableRemoteAccess)); |
| | 650 | | } |
| | 651 | | } |
| | 652 | |
|
| 4 | 653 | | var result = users |
| 4 | 654 | | .OrderBy(u => u.Username) |
| 4 | 655 | | .Select(i => _userManager.GetUserDto(i, HttpContext.GetNormalizedRemoteIP().ToString())); |
| | 656 | |
|
| 4 | 657 | | return result; |
| | 658 | | } |
| | 659 | | } |