2020-11-21 13:26:03 +00:00
using System ;
2020-06-17 19:08:58 +00:00
using System.Collections.Generic ;
using System.ComponentModel.DataAnnotations ;
using System.Linq ;
using System.Threading.Tasks ;
using Jellyfin.Api.Constants ;
2020-06-18 16:09:58 +00:00
using Jellyfin.Api.Helpers ;
using Jellyfin.Api.Models.UserDtos ;
2020-06-17 19:08:58 +00:00
using Jellyfin.Data.Enums ;
2020-09-10 12:16:41 +00:00
using MediaBrowser.Common.Extensions ;
2020-06-17 19:08:58 +00:00
using MediaBrowser.Common.Net ;
using MediaBrowser.Controller.Authentication ;
using MediaBrowser.Controller.Configuration ;
using MediaBrowser.Controller.Devices ;
using MediaBrowser.Controller.Library ;
using MediaBrowser.Controller.Net ;
using MediaBrowser.Controller.Session ;
2020-06-18 16:09:58 +00:00
using MediaBrowser.Model.Configuration ;
2020-06-17 19:08:58 +00:00
using MediaBrowser.Model.Dto ;
using MediaBrowser.Model.Users ;
using Microsoft.AspNetCore.Authorization ;
2020-06-18 16:09:58 +00:00
using Microsoft.AspNetCore.Http ;
2020-06-17 19:08:58 +00:00
using Microsoft.AspNetCore.Mvc ;
namespace Jellyfin.Api.Controllers
{
/// <summary>
/// User controller.
/// </summary>
2020-08-04 14:27:54 +00:00
[Route("Users")]
2020-06-17 19:08:58 +00:00
public class UserController : BaseJellyfinApiController
{
private readonly IUserManager _userManager ;
private readonly ISessionManager _sessionManager ;
private readonly INetworkManager _networkManager ;
private readonly IDeviceManager _deviceManager ;
private readonly IAuthorizationContext _authContext ;
private readonly IServerConfigurationManager _config ;
/// <summary>
/// Initializes a new instance of the <see cref="UserController"/> class.
/// </summary>
/// <param name="userManager">Instance of the <see cref="IUserManager"/> interface.</param>
/// <param name="sessionManager">Instance of the <see cref="ISessionManager"/> interface.</param>
/// <param name="networkManager">Instance of the <see cref="INetworkManager"/> interface.</param>
/// <param name="deviceManager">Instance of the <see cref="IDeviceManager"/> interface.</param>
/// <param name="authContext">Instance of the <see cref="IAuthorizationContext"/> interface.</param>
/// <param name="config">Instance of the <see cref="IServerConfigurationManager"/> interface.</param>
public UserController (
IUserManager userManager ,
ISessionManager sessionManager ,
INetworkManager networkManager ,
IDeviceManager deviceManager ,
IAuthorizationContext authContext ,
IServerConfigurationManager config )
{
_userManager = userManager ;
_sessionManager = sessionManager ;
_networkManager = networkManager ;
_deviceManager = deviceManager ;
_authContext = authContext ;
_config = config ;
}
/// <summary>
/// Gets a list of users.
/// </summary>
/// <param name="isHidden">Optional filter by IsHidden=true or false.</param>
/// <param name="isDisabled">Optional filter by IsDisabled=true or false.</param>
2020-06-18 16:09:58 +00:00
/// <response code="200">Users returned.</response>
/// <returns>An <see cref="IEnumerable{UserDto}"/> containing the users.</returns>
2020-06-17 19:08:58 +00:00
[HttpGet]
2020-06-22 13:44:11 +00:00
[Authorize(Policy = Policies.DefaultAuthorization)]
2020-06-18 16:09:58 +00:00
[ProducesResponseType(StatusCodes.Status200OK)]
2020-06-17 19:08:58 +00:00
public ActionResult < IEnumerable < UserDto > > GetUsers (
[FromQuery] bool? isHidden ,
2020-06-24 20:43:28 +00:00
[FromQuery] bool? isDisabled )
2020-06-17 19:08:58 +00:00
{
2020-06-18 16:09:58 +00:00
var users = Get ( isHidden , isDisabled , false , false ) ;
return Ok ( users ) ;
2020-06-17 19:08:58 +00:00
}
/// <summary>
/// Gets a list of publicly visible users for display on a login screen.
/// </summary>
2020-06-18 16:09:58 +00:00
/// <response code="200">Public users returned.</response>
/// <returns>An <see cref="IEnumerable{UserDto}"/> containing the public users.</returns>
2020-06-17 19:08:58 +00:00
[HttpGet("Public")]
2020-06-18 16:09:58 +00:00
[ProducesResponseType(StatusCodes.Status200OK)]
2020-06-17 19:08:58 +00:00
public ActionResult < IEnumerable < UserDto > > GetPublicUsers ( )
{
// If the startup wizard hasn't been completed then just return all users
if ( ! _config . Configuration . IsStartupWizardCompleted )
{
2020-06-19 16:11:46 +00:00
return Ok ( Get ( false , false , false , false ) ) ;
2020-06-17 19:08:58 +00:00
}
2020-06-18 16:09:58 +00:00
return Ok ( Get ( false , false , true , true ) ) ;
2020-06-17 19:08:58 +00:00
}
/// <summary>
/// Gets a user by Id.
/// </summary>
2020-06-21 00:02:07 +00:00
/// <param name="userId">The user id.</param>
2020-06-18 16:09:58 +00:00
/// <response code="200">User returned.</response>
/// <response code="404">User not found.</response>
/// <returns>An <see cref="UserDto"/> with information about the user or a <see cref="NotFoundResult"/> if the user was not found.</returns>
2020-06-21 00:02:07 +00:00
[HttpGet("{userId}")]
2020-08-06 14:17:45 +00:00
[Authorize(Policy = Policies.IgnoreParentalControl)]
2020-06-18 16:09:58 +00:00
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status404NotFound)]
2020-09-06 15:07:27 +00:00
public ActionResult < UserDto > GetUserById ( [ FromRoute , Required ] Guid userId )
2020-06-17 19:08:58 +00:00
{
2020-06-21 00:02:07 +00:00
var user = _userManager . GetUserById ( userId ) ;
2020-06-17 19:08:58 +00:00
if ( user = = null )
{
2020-06-18 16:09:58 +00:00
return NotFound ( "User not found" ) ;
2020-06-17 19:08:58 +00:00
}
2020-09-10 12:16:41 +00:00
var result = _userManager . GetUserDto ( user , HttpContext . GetNormalizedRemoteIp ( ) ) ;
2020-06-19 16:11:46 +00:00
return result ;
2020-06-17 19:08:58 +00:00
}
/// <summary>
/// Deletes a user.
/// </summary>
2020-06-21 00:02:07 +00:00
/// <param name="userId">The user id.</param>
2020-09-01 23:26:49 +00:00
/// <response code="204">User deleted.</response>
2020-06-18 16:09:58 +00:00
/// <response code="404">User not found.</response>
/// <returns>A <see cref="NoContentResult"/> indicating success or a <see cref="NotFoundResult"/> if the user was not found.</returns>
2020-06-21 00:02:07 +00:00
[HttpDelete("{userId}")]
2020-06-17 19:08:58 +00:00
[Authorize(Policy = Policies.RequiresElevation)]
2020-06-18 16:09:58 +00:00
[ProducesResponseType(StatusCodes.Status204NoContent)]
[ProducesResponseType(StatusCodes.Status404NotFound)]
2020-12-11 15:15:43 +00:00
public async Task < ActionResult > DeleteUser ( [ FromRoute , Required ] Guid userId )
2020-06-17 19:08:58 +00:00
{
2020-06-21 00:02:07 +00:00
var user = _userManager . GetUserById ( userId ) ;
2020-06-17 19:08:58 +00:00
_sessionManager . RevokeUserTokens ( user . Id , null ) ;
2020-12-11 15:15:43 +00:00
await _userManager . DeleteUserAsync ( userId ) . ConfigureAwait ( false ) ;
2020-06-17 19:08:58 +00:00
return NoContent ( ) ;
}
/// <summary>
/// Authenticates a user.
/// </summary>
2020-06-21 00:02:07 +00:00
/// <param name="userId">The user id.</param>
2020-06-18 16:09:58 +00:00
/// <param name="pw">The password as plain text.</param>
/// <param name="password">The password sha1-hash.</param>
/// <response code="200">User authenticated.</response>
/// <response code="403">Sha1-hashed password only is not allowed.</response>
/// <response code="404">User not found.</response>
/// <returns>A <see cref="Task"/> containing an <see cref="AuthenticationResult"/>.</returns>
2020-06-21 00:02:07 +00:00
[HttpPost("{userId}/Authenticate")]
2020-06-18 16:09:58 +00:00
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status403Forbidden)]
[ProducesResponseType(StatusCodes.Status404NotFound)]
2020-06-17 19:08:58 +00:00
public async Task < ActionResult < AuthenticationResult > > AuthenticateUser (
2020-06-21 00:02:07 +00:00
[FromRoute, Required] Guid userId ,
2020-09-09 20:28:30 +00:00
[FromQuery, Required] string pw ,
2020-08-06 14:17:45 +00:00
[FromQuery] string? password )
2020-06-17 19:08:58 +00:00
{
2020-06-21 00:02:07 +00:00
var user = _userManager . GetUserById ( userId ) ;
2020-06-17 19:08:58 +00:00
if ( user = = null )
{
return NotFound ( "User not found" ) ;
}
if ( ! string . IsNullOrEmpty ( password ) & & string . IsNullOrEmpty ( pw ) )
{
2020-12-07 15:55:42 +00:00
return StatusCode ( StatusCodes . Status403Forbidden , "Only sha1 password is not allowed." ) ;
2020-06-17 19:08:58 +00:00
}
// Password should always be null
2020-06-18 17:35:29 +00:00
AuthenticateUserByName request = new AuthenticateUserByName
{
Username = user . Username ,
Password = null ,
Pw = pw
} ;
return await AuthenticateUserByName ( request ) . ConfigureAwait ( false ) ;
2020-06-17 19:08:58 +00:00
}
/// <summary>
/// Authenticates a user by name.
/// </summary>
2020-06-18 16:09:58 +00:00
/// <param name="request">The <see cref="AuthenticateUserByName"/> request.</param>
/// <response code="200">User authenticated.</response>
/// <returns>A <see cref="Task"/> containing an <see cref="AuthenticationRequest"/> with information about the new session.</returns>
2020-06-17 19:08:58 +00:00
[HttpPost("AuthenticateByName")]
2020-06-18 16:09:58 +00:00
[ProducesResponseType(StatusCodes.Status200OK)]
2020-08-06 14:17:45 +00:00
public async Task < ActionResult < AuthenticationResult > > AuthenticateUserByName ( [ FromBody , Required ] AuthenticateUserByName request )
2020-06-17 19:08:58 +00:00
{
var auth = _authContext . GetAuthorizationInfo ( Request ) ;
try
{
var result = await _sessionManager . AuthenticateNewSession ( new AuthenticationRequest
{
App = auth . Client ,
AppVersion = auth . Version ,
DeviceId = auth . DeviceId ,
DeviceName = auth . Device ,
2020-06-18 16:09:58 +00:00
Password = request . Pw ,
PasswordSha1 = request . Password ,
2020-09-10 12:16:41 +00:00
RemoteEndPoint = HttpContext . GetNormalizedRemoteIp ( ) ,
2020-06-18 16:09:58 +00:00
Username = request . Username
2020-06-17 19:08:58 +00:00
} ) . ConfigureAwait ( false ) ;
2020-06-19 16:11:46 +00:00
return result ;
2020-06-17 19:08:58 +00:00
}
catch ( SecurityException e )
{
// rethrow adding IP address to message
2020-09-10 12:16:41 +00:00
throw new SecurityException ( $"[{HttpContext.GetNormalizedRemoteIp()}] {e.Message}" , e ) ;
2020-06-17 19:08:58 +00:00
}
}
2020-08-13 20:35:04 +00:00
/// <summary>
/// Authenticates a user with quick connect.
/// </summary>
/// <param name="request">The <see cref="QuickConnectDto"/> request.</param>
/// <response code="200">User authenticated.</response>
/// <response code="400">Missing token.</response>
/// <returns>A <see cref="Task"/> containing an <see cref="AuthenticationRequest"/> with information about the new session.</returns>
[HttpPost("AuthenticateWithQuickConnect")]
[ProducesResponseType(StatusCodes.Status200OK)]
public async Task < ActionResult < AuthenticationResult > > AuthenticateWithQuickConnect ( [ FromBody , Required ] QuickConnectDto request )
{
var auth = _authContext . GetAuthorizationInfo ( Request ) ;
try
{
var authRequest = new AuthenticationRequest
{
App = auth . Client ,
AppVersion = auth . Version ,
DeviceId = auth . DeviceId ,
DeviceName = auth . Device ,
} ;
2020-08-17 21:36:45 +00:00
return await _sessionManager . AuthenticateQuickConnect (
2020-08-13 20:35:04 +00:00
authRequest ,
request . Token ) . ConfigureAwait ( false ) ;
}
catch ( SecurityException e )
{
// rethrow adding IP address to message
2020-09-10 12:16:41 +00:00
throw new SecurityException ( $"[{HttpContext.GetNormalizedRemoteIp()}] {e.Message}" , e ) ;
2020-08-13 20:35:04 +00:00
}
}
2020-06-17 19:08:58 +00:00
/// <summary>
/// Updates a user's password.
/// </summary>
2020-06-21 00:02:07 +00:00
/// <param name="userId">The user id.</param>
2020-06-18 17:35:29 +00:00
/// <param name="request">The <see cref="UpdateUserPassword"/> request.</param>
2020-09-01 23:26:49 +00:00
/// <response code="204">Password successfully reset.</response>
2020-06-18 16:09:58 +00:00
/// <response code="403">User is not allowed to update the password.</response>
/// <response code="404">User not found.</response>
/// <returns>A <see cref="NoContentResult"/> indicating success or a <see cref="ForbidResult"/> or a <see cref="NotFoundResult"/> on failure.</returns>
2020-06-21 00:02:07 +00:00
[HttpPost("{userId}/Password")]
2020-06-22 13:44:11 +00:00
[Authorize(Policy = Policies.DefaultAuthorization)]
2020-06-18 16:09:58 +00:00
[ProducesResponseType(StatusCodes.Status204NoContent)]
[ProducesResponseType(StatusCodes.Status403Forbidden)]
[ProducesResponseType(StatusCodes.Status404NotFound)]
2020-06-17 19:08:58 +00:00
public async Task < ActionResult > UpdateUserPassword (
2020-09-06 15:07:27 +00:00
[FromRoute, Required] Guid userId ,
2020-12-07 01:05:55 +00:00
[FromBody, Required] UpdateUserPassword request )
2020-06-17 19:08:58 +00:00
{
2020-06-21 00:02:07 +00:00
if ( ! RequestHelpers . AssertCanUpdateUser ( _authContext , HttpContext . Request , userId , true ) )
2020-06-18 16:09:58 +00:00
{
2020-12-07 15:55:42 +00:00
return StatusCode ( StatusCodes . Status403Forbidden , "User is not allowed to update the password." ) ;
2020-06-18 16:09:58 +00:00
}
2020-06-17 19:08:58 +00:00
2020-06-21 00:02:07 +00:00
var user = _userManager . GetUserById ( userId ) ;
2020-06-17 19:08:58 +00:00
if ( user = = null )
{
return NotFound ( "User not found" ) ;
}
2020-06-18 17:35:29 +00:00
if ( request . ResetPassword )
2020-06-17 19:08:58 +00:00
{
await _userManager . ResetPassword ( user ) . ConfigureAwait ( false ) ;
}
else
{
var success = await _userManager . AuthenticateUser (
user . Username ,
2020-06-18 17:35:29 +00:00
request . CurrentPw ,
request . CurrentPw ,
2020-09-10 12:16:41 +00:00
HttpContext . GetNormalizedRemoteIp ( ) ,
2020-06-17 19:08:58 +00:00
false ) . ConfigureAwait ( false ) ;
if ( success = = null )
{
2020-12-07 15:55:42 +00:00
return StatusCode ( StatusCodes . Status403Forbidden , "Invalid user or password entered." ) ;
2020-06-17 19:08:58 +00:00
}
2020-06-18 17:35:29 +00:00
await _userManager . ChangePassword ( user , request . NewPw ) . ConfigureAwait ( false ) ;
2020-06-17 19:08:58 +00:00
var currentToken = _authContext . GetAuthorizationInfo ( Request ) . Token ;
_sessionManager . RevokeUserTokens ( user . Id , currentToken ) ;
}
return NoContent ( ) ;
}
/// <summary>
/// Updates a user's easy password.
/// </summary>
2020-06-21 00:02:07 +00:00
/// <param name="userId">The user id.</param>
2020-06-18 17:35:29 +00:00
/// <param name="request">The <see cref="UpdateUserEasyPassword"/> request.</param>
2020-09-01 23:26:49 +00:00
/// <response code="204">Password successfully reset.</response>
2020-06-18 16:09:58 +00:00
/// <response code="403">User is not allowed to update the password.</response>
/// <response code="404">User not found.</response>
/// <returns>A <see cref="NoContentResult"/> indicating success or a <see cref="ForbidResult"/> or a <see cref="NotFoundResult"/> on failure.</returns>
2020-06-21 00:02:07 +00:00
[HttpPost("{userId}/EasyPassword")]
2020-06-22 13:44:11 +00:00
[Authorize(Policy = Policies.DefaultAuthorization)]
2020-06-18 16:09:58 +00:00
[ProducesResponseType(StatusCodes.Status204NoContent)]
[ProducesResponseType(StatusCodes.Status403Forbidden)]
[ProducesResponseType(StatusCodes.Status404NotFound)]
2020-06-17 19:08:58 +00:00
public ActionResult UpdateUserEasyPassword (
2020-09-06 15:07:27 +00:00
[FromRoute, Required] Guid userId ,
2020-12-07 01:05:55 +00:00
[FromBody, Required] UpdateUserEasyPassword request )
2020-06-17 19:08:58 +00:00
{
2020-06-21 00:02:07 +00:00
if ( ! RequestHelpers . AssertCanUpdateUser ( _authContext , HttpContext . Request , userId , true ) )
2020-06-18 16:09:58 +00:00
{
2020-12-07 15:55:42 +00:00
return StatusCode ( StatusCodes . Status403Forbidden , "User is not allowed to update the easy password." ) ;
2020-06-18 16:09:58 +00:00
}
2020-06-17 19:08:58 +00:00
2020-06-21 00:02:07 +00:00
var user = _userManager . GetUserById ( userId ) ;
2020-06-17 19:08:58 +00:00
if ( user = = null )
{
return NotFound ( "User not found" ) ;
}
2020-06-18 17:35:29 +00:00
if ( request . ResetPassword )
2020-06-17 19:08:58 +00:00
{
_userManager . ResetEasyPassword ( user ) ;
}
else
{
2020-06-18 17:35:29 +00:00
_userManager . ChangeEasyPassword ( user , request . NewPw , request . NewPassword ) ;
2020-06-17 19:08:58 +00:00
}
return NoContent ( ) ;
}
/// <summary>
/// Updates a user.
/// </summary>
2020-06-21 00:02:07 +00:00
/// <param name="userId">The user id.</param>
2020-06-18 16:09:58 +00:00
/// <param name="updateUser">The updated user model.</param>
/// <response code="204">User updated.</response>
/// <response code="400">User information was not supplied.</response>
/// <response code="403">User update forbidden.</response>
/// <returns>A <see cref="NoContentResult"/> indicating success or a <see cref="BadRequestResult"/> or a <see cref="ForbidResult"/> on failure.</returns>
2020-06-21 00:02:07 +00:00
[HttpPost("{userId}")]
2020-06-22 13:44:11 +00:00
[Authorize(Policy = Policies.DefaultAuthorization)]
2020-06-18 16:09:58 +00:00
[ProducesResponseType(StatusCodes.Status204NoContent)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status403Forbidden)]
public async Task < ActionResult > UpdateUser (
2020-09-06 15:07:27 +00:00
[FromRoute, Required] Guid userId ,
2020-12-07 01:05:55 +00:00
[FromBody, Required] UserDto updateUser )
2020-06-17 19:08:58 +00:00
{
2020-06-21 00:02:07 +00:00
if ( ! RequestHelpers . AssertCanUpdateUser ( _authContext , HttpContext . Request , userId , false ) )
2020-06-18 16:09:58 +00:00
{
2020-12-07 15:55:42 +00:00
return StatusCode ( StatusCodes . Status403Forbidden , "User update not allowed." ) ;
2020-06-18 16:09:58 +00:00
}
2020-06-21 00:02:07 +00:00
var user = _userManager . GetUserById ( userId ) ;
2020-06-18 16:09:58 +00:00
2020-10-30 00:30:33 +00:00
if ( ! string . Equals ( user . Username , updateUser . Name , StringComparison . Ordinal ) )
2020-06-18 16:09:58 +00:00
{
await _userManager . RenameUser ( user , updateUser . Name ) . ConfigureAwait ( false ) ;
}
2020-10-30 00:30:33 +00:00
await _userManager . UpdateConfigurationAsync ( user . Id , updateUser . Configuration ) . ConfigureAwait ( false ) ;
2020-06-18 16:09:58 +00:00
return NoContent ( ) ;
2020-06-17 19:08:58 +00:00
}
/// <summary>
/// Updates a user policy.
/// </summary>
2020-06-21 00:02:07 +00:00
/// <param name="userId">The user id.</param>
2020-06-18 16:09:58 +00:00
/// <param name="newPolicy">The new user policy.</param>
/// <response code="204">User policy updated.</response>
/// <response code="400">User policy was not supplied.</response>
/// <response code="403">User policy update forbidden.</response>
/// <returns>A <see cref="NoContentResult"/> indicating success or a <see cref="BadRequestResult"/> or a <see cref="ForbidResult"/> on failure..</returns>
2020-06-21 00:02:07 +00:00
[HttpPost("{userId}/Policy")]
2020-08-06 14:17:45 +00:00
[Authorize(Policy = Policies.RequiresElevation)]
2020-06-18 16:09:58 +00:00
[ProducesResponseType(StatusCodes.Status204NoContent)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
[ProducesResponseType(StatusCodes.Status403Forbidden)]
2020-10-30 00:30:33 +00:00
public async Task < ActionResult > UpdateUserPolicy (
2020-09-06 15:07:27 +00:00
[FromRoute, Required] Guid userId ,
2020-12-07 01:05:55 +00:00
[FromBody, Required] UserPolicy newPolicy )
2020-06-17 19:08:58 +00:00
{
2020-06-21 00:02:07 +00:00
var user = _userManager . GetUserById ( userId ) ;
2020-06-18 16:09:58 +00:00
// If removing admin access
2020-08-10 15:31:01 +00:00
if ( ! newPolicy . IsAdministrator & & user . HasPermission ( PermissionKind . IsAdministrator ) )
2020-06-18 16:09:58 +00:00
{
if ( _userManager . Users . Count ( i = > i . HasPermission ( PermissionKind . IsAdministrator ) ) = = 1 )
{
2020-12-07 15:55:42 +00:00
return StatusCode ( StatusCodes . Status403Forbidden , "There must be at least one user in the system with administrative access." ) ;
2020-06-18 16:09:58 +00:00
}
}
// If disabling
if ( newPolicy . IsDisabled & & user . HasPermission ( PermissionKind . IsAdministrator ) )
{
2020-12-07 15:55:42 +00:00
return StatusCode ( StatusCodes . Status403Forbidden , "Administrators cannot be disabled." ) ;
2020-06-18 16:09:58 +00:00
}
// If disabling
if ( newPolicy . IsDisabled & & ! user . HasPermission ( PermissionKind . IsDisabled ) )
{
if ( _userManager . Users . Count ( i = > ! i . HasPermission ( PermissionKind . IsDisabled ) ) = = 1 )
{
2020-12-07 15:55:42 +00:00
return StatusCode ( StatusCodes . Status403Forbidden , "There must be at least one enabled user in the system." ) ;
2020-06-18 16:09:58 +00:00
}
var currentToken = _authContext . GetAuthorizationInfo ( Request ) . Token ;
_sessionManager . RevokeUserTokens ( user . Id , currentToken ) ;
}
2020-10-30 00:30:33 +00:00
await _userManager . UpdatePolicyAsync ( userId , newPolicy ) . ConfigureAwait ( false ) ;
2020-06-18 16:09:58 +00:00
return NoContent ( ) ;
2020-06-17 19:08:58 +00:00
}
/// <summary>
/// Updates a user configuration.
/// </summary>
2020-06-21 00:02:07 +00:00
/// <param name="userId">The user id.</param>
2020-06-18 16:09:58 +00:00
/// <param name="userConfig">The new user configuration.</param>
/// <response code="204">User configuration updated.</response>
/// <response code="403">User configuration update forbidden.</response>
2020-06-17 19:08:58 +00:00
/// <returns>A <see cref="NoContentResult"/> indicating success.</returns>
2020-06-21 00:02:07 +00:00
[HttpPost("{userId}/Configuration")]
2020-06-22 13:44:11 +00:00
[Authorize(Policy = Policies.DefaultAuthorization)]
2020-06-18 16:09:58 +00:00
[ProducesResponseType(StatusCodes.Status204NoContent)]
[ProducesResponseType(StatusCodes.Status403Forbidden)]
2020-10-30 00:30:33 +00:00
public async Task < ActionResult > UpdateUserConfiguration (
2020-09-06 15:07:27 +00:00
[FromRoute, Required] Guid userId ,
2020-12-07 01:05:55 +00:00
[FromBody, Required] UserConfiguration userConfig )
2020-06-17 19:08:58 +00:00
{
2020-06-21 00:02:07 +00:00
if ( ! RequestHelpers . AssertCanUpdateUser ( _authContext , HttpContext . Request , userId , false ) )
2020-06-18 16:09:58 +00:00
{
2020-12-07 15:55:42 +00:00
return StatusCode ( StatusCodes . Status403Forbidden , "User configuration update not allowed" ) ;
2020-06-18 16:09:58 +00:00
}
2020-10-30 00:30:33 +00:00
await _userManager . UpdateConfigurationAsync ( userId , userConfig ) . ConfigureAwait ( false ) ;
2020-06-18 16:09:58 +00:00
return NoContent ( ) ;
2020-06-17 19:08:58 +00:00
}
/// <summary>
/// Creates a user.
/// </summary>
2020-06-18 17:35:29 +00:00
/// <param name="request">The create user by name request body.</param>
2020-06-18 16:09:58 +00:00
/// <response code="200">User created.</response>
/// <returns>An <see cref="UserDto"/> of the new user.</returns>
2020-08-04 18:48:53 +00:00
[HttpPost("New")]
2020-06-17 19:08:58 +00:00
[Authorize(Policy = Policies.RequiresElevation)]
2020-06-18 16:09:58 +00:00
[ProducesResponseType(StatusCodes.Status200OK)]
2020-12-07 01:05:55 +00:00
public async Task < ActionResult < UserDto > > CreateUserByName ( [ FromBody , Required ] CreateUserByName request )
2020-06-17 19:08:58 +00:00
{
2020-08-03 18:01:24 +00:00
var newUser = await _userManager . CreateUserAsync ( request . Name ) . ConfigureAwait ( false ) ;
2020-06-17 19:08:58 +00:00
// no need to authenticate password for new user
2020-06-18 17:35:29 +00:00
if ( request . Password ! = null )
2020-06-17 19:08:58 +00:00
{
2020-06-18 17:35:29 +00:00
await _userManager . ChangePassword ( newUser , request . Password ) . ConfigureAwait ( false ) ;
2020-06-17 19:08:58 +00:00
}
2020-09-10 12:16:41 +00:00
var result = _userManager . GetUserDto ( newUser , HttpContext . GetNormalizedRemoteIp ( ) ) ;
2020-06-17 19:08:58 +00:00
2020-06-19 16:11:46 +00:00
return result ;
2020-06-17 19:08:58 +00:00
}
/// <summary>
/// Initiates the forgot password process for a local user.
/// </summary>
2020-09-10 09:05:46 +00:00
/// <param name="forgotPasswordRequest">The forgot password request containing the entered username.</param>
2020-06-18 16:09:58 +00:00
/// <response code="200">Password reset process started.</response>
/// <returns>A <see cref="Task"/> containing a <see cref="ForgotPasswordResult"/>.</returns>
2020-06-17 19:08:58 +00:00
[HttpPost("ForgotPassword")]
2020-06-18 16:09:58 +00:00
[ProducesResponseType(StatusCodes.Status200OK)]
2020-09-10 09:05:46 +00:00
public async Task < ActionResult < ForgotPasswordResult > > ForgotPassword ( [ FromBody , Required ] ForgotPasswordDto forgotPasswordRequest )
2020-06-17 19:08:58 +00:00
{
2020-09-10 12:16:41 +00:00
var isLocal = HttpContext . IsLocal ( )
| | _networkManager . IsInLocalNetwork ( HttpContext . GetNormalizedRemoteIp ( ) ) ;
2020-06-17 19:08:58 +00:00
2020-09-10 09:05:46 +00:00
var result = await _userManager . StartForgotPasswordProcess ( forgotPasswordRequest . EnteredUsername , isLocal ) . ConfigureAwait ( false ) ;
2020-06-17 19:08:58 +00:00
2020-06-19 16:11:46 +00:00
return result ;
2020-06-17 19:08:58 +00:00
}
/// <summary>
/// Redeems a forgot password pin.
/// </summary>
/// <param name="pin">The pin.</param>
2020-06-18 16:09:58 +00:00
/// <response code="200">Pin reset process started.</response>
/// <returns>A <see cref="Task"/> containing a <see cref="PinRedeemResult"/>.</returns>
2020-06-17 19:08:58 +00:00
[HttpPost("ForgotPassword/Pin")]
2020-06-18 16:09:58 +00:00
[ProducesResponseType(StatusCodes.Status200OK)]
2020-06-27 16:50:44 +00:00
public async Task < ActionResult < PinRedeemResult > > ForgotPasswordPin ( [ FromBody ] string? pin )
2020-06-17 19:08:58 +00:00
{
var result = await _userManager . RedeemPasswordResetPin ( pin ) . ConfigureAwait ( false ) ;
2020-06-19 16:11:46 +00:00
return result ;
2020-06-17 19:08:58 +00:00
}
2020-11-05 20:23:22 +00:00
/// <summary>
/// Gets the user based on auth token.
/// </summary>
/// <response code="200">User returned.</response>
/// <response code="400">Token is not owned by a user.</response>
/// <returns>A <see cref="UserDto"/> for the authenticated user.</returns>
[HttpGet("Me")]
[Authorize(Policy = Policies.DefaultAuthorization)]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesResponseType(StatusCodes.Status400BadRequest)]
public ActionResult < UserDto > GetCurrentUser ( )
{
var userId = ClaimHelpers . GetUserId ( Request . HttpContext . User ) ;
if ( userId = = null )
{
return BadRequest ( ) ;
}
var user = _userManager . GetUserById ( userId . Value ) ;
if ( user = = null )
{
return BadRequest ( ) ;
}
return _userManager . GetUserDto ( user ) ;
}
2020-06-18 16:09:58 +00:00
private IEnumerable < UserDto > Get ( bool? isHidden , bool? isDisabled , bool filterByDevice , bool filterByNetwork )
2020-06-17 19:08:58 +00:00
{
var users = _userManager . Users ;
if ( isDisabled . HasValue )
{
users = users . Where ( i = > i . HasPermission ( PermissionKind . IsDisabled ) = = isDisabled . Value ) ;
}
if ( isHidden . HasValue )
{
users = users . Where ( i = > i . HasPermission ( PermissionKind . IsHidden ) = = isHidden . Value ) ;
}
if ( filterByDevice )
{
var deviceId = _authContext . GetAuthorizationInfo ( Request ) . DeviceId ;
if ( ! string . IsNullOrWhiteSpace ( deviceId ) )
{
users = users . Where ( i = > _deviceManager . CanAccessDevice ( i , deviceId ) ) ;
}
}
if ( filterByNetwork )
{
2020-09-10 12:16:41 +00:00
if ( ! _networkManager . IsInLocalNetwork ( HttpContext . GetNormalizedRemoteIp ( ) ) )
2020-06-17 19:08:58 +00:00
{
users = users . Where ( i = > i . HasPermission ( PermissionKind . EnableRemoteAccess ) ) ;
}
}
var result = users
. OrderBy ( u = > u . Username )
2020-09-10 12:16:41 +00:00
. Select ( i = > _userManager . GetUserDto ( i , HttpContext . GetNormalizedRemoteIp ( ) ) ) ;
2020-06-17 19:08:58 +00:00
return result ;
}
}
}