btcpayserver/BTCPayServer/Security/GreenField/GreenFieldAuthorizationHandler.cs

157 lines
6.9 KiB
C#
Raw Normal View History

2020-03-27 12:58:45 +09:00
using System.Collections.Generic;
using System.Security.Claims;
2020-03-27 12:58:45 +09:00
using System.Threading.Tasks;
using BTCPayServer.Abstractions.Contracts;
2020-03-27 12:58:45 +09:00
using BTCPayServer.Client;
using BTCPayServer.Data;
using BTCPayServer.Services.Stores;
using Microsoft.AspNetCore.Authorization;
using Microsoft.AspNetCore.Http;
using Microsoft.AspNetCore.Identity;
using StoreData = BTCPayServer.Data.StoreData;
2020-03-27 12:58:45 +09:00
2022-01-14 13:05:23 +09:00
namespace BTCPayServer.Security.Greenfield
2020-03-27 12:58:45 +09:00
{
2022-01-14 13:05:23 +09:00
public class LocalGreenfieldAuthorizationHandler : AuthorizationHandler<PolicyRequirement>
{
private readonly IHttpContextAccessor _httpContextAccessor;
private readonly UserManager<ApplicationUser> _userManager;
private readonly StoreRepository _storeRepository;
private readonly IPluginHookService _pluginHookService;
public LocalGreenfieldAuthorizationHandler(IHttpContextAccessor httpContextAccessor,
UserManager<ApplicationUser> userManager,
StoreRepository storeRepository,
IPluginHookService pluginHookService)
{
_httpContextAccessor = httpContextAccessor;
_userManager = userManager;
_storeRepository = storeRepository;
_pluginHookService = pluginHookService;
}
protected override Task HandleRequirementAsync(AuthorizationHandlerContext context, PolicyRequirement requirement)
{
var withuser = context.User.Identity?.AuthenticationType == $"Local{GreenfieldConstants.AuthenticationType}WithUser";
if (withuser)
{
var newUser = new ClaimsPrincipal(new ClaimsIdentity(context.User.Claims,
$"{GreenfieldConstants.AuthenticationType}"));
var newContext = new AuthorizationHandlerContext(context.Requirements, newUser, null);
return new GreenfieldAuthorizationHandler(
_httpContextAccessor, _userManager, _storeRepository, _pluginHookService).HandleAsync(newContext);
}
2022-01-14 13:05:23 +09:00
var succeed = context.User.Identity.AuthenticationType == $"Local{GreenfieldConstants.AuthenticationType}";
if (succeed)
{
context.Succeed(requirement);
}
return Task.CompletedTask;
}
}
2022-01-14 13:05:23 +09:00
public class GreenfieldAuthorizationHandler : AuthorizationHandler<PolicyRequirement>
2020-03-27 12:58:45 +09:00
{
private readonly HttpContext _httpContext;
2020-03-27 12:58:45 +09:00
private readonly UserManager<ApplicationUser> _userManager;
private readonly StoreRepository _storeRepository;
private readonly IPluginHookService _pluginHookService;
2020-03-27 12:58:45 +09:00
2022-01-14 13:05:23 +09:00
public GreenfieldAuthorizationHandler(IHttpContextAccessor httpContextAccessor,
2020-03-27 12:58:45 +09:00
UserManager<ApplicationUser> userManager,
StoreRepository storeRepository,
IPluginHookService pluginHookService)
2020-03-27 12:58:45 +09:00
{
_httpContext = httpContextAccessor.HttpContext;
2020-03-27 12:58:45 +09:00
_userManager = userManager;
_storeRepository = storeRepository;
_pluginHookService = pluginHookService;
2020-03-27 12:58:45 +09:00
}
protected override async Task HandleRequirementAsync(AuthorizationHandlerContext context,
PolicyRequirement requirement)
{
2022-01-14 13:05:23 +09:00
if (context.User.Identity.AuthenticationType != GreenfieldConstants.AuthenticationType)
2020-03-27 12:58:45 +09:00
return;
2020-06-24 10:34:09 +09:00
var userid = _userManager.GetUserId(context.User);
2020-03-27 12:58:45 +09:00
bool success = false;
var policy = requirement.Policy;
var requiredUnscoped = false;
if (policy.EndsWith(':'))
2020-03-27 12:58:45 +09:00
{
policy = policy.Substring(0, policy.Length - 1);
requiredUnscoped = true;
}
switch (policy)
{
case { } when Policies.IsStorePolicy(policy):
var storeId = requiredUnscoped ? null : _httpContext.GetImplicitStoreId();
2020-03-27 12:58:45 +09:00
// Specific store action
if (storeId != null)
{
if (context.HasPermission(Permission.Create(policy, storeId)))
2020-03-27 12:58:45 +09:00
{
if (string.IsNullOrEmpty(userid))
break;
var store = await _storeRepository.FindStore(storeId, userid);
2020-03-27 12:58:45 +09:00
if (store == null)
break;
2023-05-26 16:49:32 +02:00
if (!store.HasPermission(userid, policy))
break;
2020-03-27 12:58:45 +09:00
success = true;
_httpContext.SetStoreData(store);
2020-03-27 12:58:45 +09:00
}
}
else
{
if (requiredUnscoped && !context.HasPermission(Permission.Create(policy)))
break;
2020-03-27 12:58:45 +09:00
var stores = await _storeRepository.GetStoresByUserId(userid);
List<StoreData> permissionedStores = new List<StoreData>();
foreach (var store in stores)
{
if (context.HasPermission(Permission.Create(policy, store.Id)))
2020-03-27 12:58:45 +09:00
permissionedStores.Add(store);
}
_httpContext.SetStoresData(permissionedStores.ToArray());
2020-03-27 12:58:45 +09:00
success = true;
}
break;
case { } when Policies.IsServerPolicy(policy):
if (context.HasPermission(Permission.Create(policy)))
2020-03-27 12:58:45 +09:00
{
var user = await _userManager.GetUserAsync(context.User);
if (user == null)
break;
if (!await _userManager.IsInRoleAsync(user, Roles.ServerAdmin))
break;
success = true;
}
break;
case { } when Policies.IsPluginPolicy(requirement.Policy):
var handle = (AuthorizationFilterHandle)await _pluginHookService.ApplyFilter("handle-authorization-requirement",
new AuthorizationFilterHandle(context, requirement, _httpContext));
success = handle.Success;
break;
case Policies.CanManageNotificationsForUser:
case Policies.CanViewNotificationsForUser:
case Policies.CanModifyProfile:
case Policies.CanViewProfile:
2021-04-07 20:40:57 -07:00
case Policies.CanDeleteUser:
case Policies.Unrestricted:
success = context.HasPermission(Permission.Create(policy));
break;
2020-03-27 12:58:45 +09:00
}
if (success)
{
context.Succeed(requirement);
}
_httpContext.Items[RequestedPermissionKey] = policy;
2020-03-27 12:58:45 +09:00
}
public const string RequestedPermissionKey = nameof(RequestedPermissionKey);
2020-03-27 12:58:45 +09:00
}
}