mirror of
https://github.com/btcpayserver/btcpayserver.git
synced 2024-11-20 10:40:29 +01:00
c07fcc171c
* Fix Plugin Local Client authorization when user is provided * 1337 hax
155 lines
6.6 KiB
C#
155 lines
6.6 KiB
C#
using System.Buffers;
|
|
using System.Collections.Generic;
|
|
using System.Globalization;
|
|
using System.Security.Claims;
|
|
using System.Text;
|
|
using System.Threading.Tasks;
|
|
using BTCPayServer.Client;
|
|
using BTCPayServer.Client.Models;
|
|
using BTCPayServer.Data;
|
|
using BTCPayServer.Services.Stores;
|
|
using Microsoft.AspNetCore.Authorization;
|
|
using Microsoft.AspNetCore.Http;
|
|
using Microsoft.AspNetCore.Identity;
|
|
using Newtonsoft.Json;
|
|
using StoreData = BTCPayServer.Data.StoreData;
|
|
|
|
namespace BTCPayServer.Security.Greenfield
|
|
{
|
|
public class LocalGreenfieldAuthorizationHandler : AuthorizationHandler<PolicyRequirement>
|
|
{
|
|
private readonly IHttpContextAccessor _httpContextAccessor;
|
|
private readonly UserManager<ApplicationUser> _userManager;
|
|
private readonly StoreRepository _storeRepository;
|
|
|
|
public LocalGreenfieldAuthorizationHandler(IHttpContextAccessor httpContextAccessor,
|
|
UserManager<ApplicationUser> userManager,
|
|
StoreRepository storeRepository)
|
|
{
|
|
_httpContextAccessor = httpContextAccessor;
|
|
_userManager = userManager;
|
|
_storeRepository = storeRepository;
|
|
}
|
|
protected override Task HandleRequirementAsync(AuthorizationHandlerContext context, PolicyRequirement requirement)
|
|
{
|
|
var withuser = context.User.Identity?.AuthenticationType == $"Local{GreenfieldConstants.AuthenticationType}WithUser";
|
|
if (withuser)
|
|
{
|
|
var newUser = new ClaimsPrincipal(new ClaimsIdentity(context.User.Claims,
|
|
$"{GreenfieldConstants.AuthenticationType}"));
|
|
var newContext = new AuthorizationHandlerContext(context.Requirements, newUser, null);
|
|
return new GreenfieldAuthorizationHandler(_httpContextAccessor, _userManager, _storeRepository).HandleAsync(newContext);
|
|
}
|
|
|
|
var succeed = context.User.Identity.AuthenticationType == $"Local{GreenfieldConstants.AuthenticationType}";
|
|
|
|
if (succeed)
|
|
{
|
|
context.Succeed(requirement);
|
|
}
|
|
return Task.CompletedTask;
|
|
}
|
|
}
|
|
|
|
public class GreenfieldAuthorizationHandler : AuthorizationHandler<PolicyRequirement>
|
|
|
|
{
|
|
private readonly HttpContext _HttpContext;
|
|
private readonly UserManager<ApplicationUser> _userManager;
|
|
private readonly StoreRepository _storeRepository;
|
|
|
|
public GreenfieldAuthorizationHandler(IHttpContextAccessor httpContextAccessor,
|
|
UserManager<ApplicationUser> userManager,
|
|
StoreRepository storeRepository)
|
|
{
|
|
_HttpContext = httpContextAccessor.HttpContext;
|
|
_userManager = userManager;
|
|
_storeRepository = storeRepository;
|
|
}
|
|
|
|
protected override async Task HandleRequirementAsync(AuthorizationHandlerContext context,
|
|
PolicyRequirement requirement)
|
|
{
|
|
if (context.User.Identity.AuthenticationType != GreenfieldConstants.AuthenticationType)
|
|
return;
|
|
var userid = _userManager.GetUserId(context.User);
|
|
bool success = false;
|
|
var policy = requirement.Policy;
|
|
var requiredUnscoped = false;
|
|
if (policy.EndsWith(':'))
|
|
{
|
|
policy = policy.Substring(0, policy.Length - 1);
|
|
requiredUnscoped = true;
|
|
}
|
|
|
|
switch (policy)
|
|
{
|
|
case { } when Policies.IsStorePolicy(policy):
|
|
var storeId = _HttpContext.GetImplicitStoreId();
|
|
// Specific store action
|
|
if (storeId != null)
|
|
{
|
|
if (context.HasPermission(Permission.Create(policy, storeId), requiredUnscoped))
|
|
{
|
|
if (string.IsNullOrEmpty(userid))
|
|
break;
|
|
var store = await _storeRepository.FindStore(storeId, userid);
|
|
if (store == null)
|
|
break;
|
|
if (Policies.IsStoreModifyPolicy(policy) || policy == Policies.CanUseLightningNodeInStore)
|
|
{
|
|
if (store.Role != StoreRoles.Owner)
|
|
break;
|
|
}
|
|
success = true;
|
|
_HttpContext.SetStoreData(store);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (requiredUnscoped && !context.HasPermission(Permission.Create(policy)))
|
|
break;
|
|
var stores = await _storeRepository.GetStoresByUserId(userid);
|
|
List<StoreData> permissionedStores = new List<StoreData>();
|
|
foreach (var store in stores)
|
|
{
|
|
if (context.HasPermission(Permission.Create(policy, store.Id), requiredUnscoped))
|
|
permissionedStores.Add(store);
|
|
}
|
|
if (!requiredUnscoped && permissionedStores.Count is 0)
|
|
break;
|
|
_HttpContext.SetStoresData(permissionedStores.ToArray());
|
|
success = true;
|
|
}
|
|
break;
|
|
case { } when Policies.IsServerPolicy(policy):
|
|
if (context.HasPermission(Permission.Create(policy)))
|
|
{
|
|
var user = await _userManager.GetUserAsync(context.User);
|
|
if (user == null)
|
|
break;
|
|
if (!await _userManager.IsInRoleAsync(user, Roles.ServerAdmin))
|
|
break;
|
|
success = true;
|
|
}
|
|
break;
|
|
case Policies.CanManageNotificationsForUser:
|
|
case Policies.CanViewNotificationsForUser:
|
|
case Policies.CanModifyProfile:
|
|
case Policies.CanViewProfile:
|
|
case Policies.CanDeleteUser:
|
|
case Policies.Unrestricted:
|
|
success = context.HasPermission(Permission.Create(policy), requiredUnscoped);
|
|
break;
|
|
}
|
|
|
|
if (success)
|
|
{
|
|
context.Succeed(requirement);
|
|
}
|
|
_HttpContext.Items[RequestedPermissionKey] = policy;
|
|
}
|
|
public const string RequestedPermissionKey = nameof(RequestedPermissionKey);
|
|
}
|
|
}
|