You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
600 lines
25 KiB
600 lines
25 KiB
using System;
|
|
using System.Collections.Generic;
|
|
using System.ComponentModel.DataAnnotations;
|
|
using System.Linq;
|
|
using System.Threading.Tasks;
|
|
using Jellyfin.Api.Constants;
|
|
using Jellyfin.Api.Helpers;
|
|
using Jellyfin.Api.Models.UserDtos;
|
|
using Jellyfin.Data.Enums;
|
|
using MediaBrowser.Common.Extensions;
|
|
using MediaBrowser.Common.Net;
|
|
using MediaBrowser.Controller.Authentication;
|
|
using MediaBrowser.Controller.Configuration;
|
|
using MediaBrowser.Controller.Devices;
|
|
using MediaBrowser.Controller.Library;
|
|
using MediaBrowser.Controller.Net;
|
|
using MediaBrowser.Controller.Session;
|
|
using MediaBrowser.Model.Configuration;
|
|
using MediaBrowser.Model.Dto;
|
|
using MediaBrowser.Model.Users;
|
|
using Microsoft.AspNetCore.Authorization;
|
|
using Microsoft.AspNetCore.Http;
|
|
using Microsoft.AspNetCore.Mvc;
|
|
|
|
namespace Jellyfin.Api.Controllers
|
|
{
|
|
/// <summary>
|
|
/// User controller.
|
|
/// </summary>
|
|
[Route("Users")]
|
|
public class UserController : BaseJellyfinApiController
|
|
{
|
|
private readonly IUserManager _userManager;
|
|
private readonly ISessionManager _sessionManager;
|
|
private readonly INetworkManager _networkManager;
|
|
private readonly IDeviceManager _deviceManager;
|
|
private readonly IAuthorizationContext _authContext;
|
|
private readonly IServerConfigurationManager _config;
|
|
|
|
/// <summary>
|
|
/// Initializes a new instance of the <see cref="UserController"/> class.
|
|
/// </summary>
|
|
/// <param name="userManager">Instance of the <see cref="IUserManager"/> interface.</param>
|
|
/// <param name="sessionManager">Instance of the <see cref="ISessionManager"/> interface.</param>
|
|
/// <param name="networkManager">Instance of the <see cref="INetworkManager"/> interface.</param>
|
|
/// <param name="deviceManager">Instance of the <see cref="IDeviceManager"/> interface.</param>
|
|
/// <param name="authContext">Instance of the <see cref="IAuthorizationContext"/> interface.</param>
|
|
/// <param name="config">Instance of the <see cref="IServerConfigurationManager"/> interface.</param>
|
|
public UserController(
|
|
IUserManager userManager,
|
|
ISessionManager sessionManager,
|
|
INetworkManager networkManager,
|
|
IDeviceManager deviceManager,
|
|
IAuthorizationContext authContext,
|
|
IServerConfigurationManager config)
|
|
{
|
|
_userManager = userManager;
|
|
_sessionManager = sessionManager;
|
|
_networkManager = networkManager;
|
|
_deviceManager = deviceManager;
|
|
_authContext = authContext;
|
|
_config = config;
|
|
}
|
|
|
|
/// <summary>
|
|
/// Gets a list of users.
|
|
/// </summary>
|
|
/// <param name="isHidden">Optional filter by IsHidden=true or false.</param>
|
|
/// <param name="isDisabled">Optional filter by IsDisabled=true or false.</param>
|
|
/// <response code="200">Users returned.</response>
|
|
/// <returns>An <see cref="IEnumerable{UserDto}"/> containing the users.</returns>
|
|
[HttpGet]
|
|
[Authorize(Policy = Policies.DefaultAuthorization)]
|
|
[ProducesResponseType(StatusCodes.Status200OK)]
|
|
public ActionResult<IEnumerable<UserDto>> GetUsers(
|
|
[FromQuery] bool? isHidden,
|
|
[FromQuery] bool? isDisabled)
|
|
{
|
|
var users = Get(isHidden, isDisabled, false, false);
|
|
return Ok(users);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Gets a list of publicly visible users for display on a login screen.
|
|
/// </summary>
|
|
/// <response code="200">Public users returned.</response>
|
|
/// <returns>An <see cref="IEnumerable{UserDto}"/> containing the public users.</returns>
|
|
[HttpGet("Public")]
|
|
[ProducesResponseType(StatusCodes.Status200OK)]
|
|
public ActionResult<IEnumerable<UserDto>> GetPublicUsers()
|
|
{
|
|
// If the startup wizard hasn't been completed then just return all users
|
|
if (!_config.Configuration.IsStartupWizardCompleted)
|
|
{
|
|
return Ok(Get(false, false, false, false));
|
|
}
|
|
|
|
return Ok(Get(false, false, true, true));
|
|
}
|
|
|
|
/// <summary>
|
|
/// Gets a user by Id.
|
|
/// </summary>
|
|
/// <param name="userId">The user id.</param>
|
|
/// <response code="200">User returned.</response>
|
|
/// <response code="404">User not found.</response>
|
|
/// <returns>An <see cref="UserDto"/> with information about the user or a <see cref="NotFoundResult"/> if the user was not found.</returns>
|
|
[HttpGet("{userId}")]
|
|
[Authorize(Policy = Policies.IgnoreParentalControl)]
|
|
[ProducesResponseType(StatusCodes.Status200OK)]
|
|
[ProducesResponseType(StatusCodes.Status404NotFound)]
|
|
public ActionResult<UserDto> GetUserById([FromRoute, Required] Guid userId)
|
|
{
|
|
var user = _userManager.GetUserById(userId);
|
|
|
|
if (user == null)
|
|
{
|
|
return NotFound("User not found");
|
|
}
|
|
|
|
var result = _userManager.GetUserDto(user, HttpContext.GetNormalizedRemoteIp());
|
|
return result;
|
|
}
|
|
|
|
/// <summary>
|
|
/// Deletes a user.
|
|
/// </summary>
|
|
/// <param name="userId">The user id.</param>
|
|
/// <response code="204">User deleted.</response>
|
|
/// <response code="404">User not found.</response>
|
|
/// <returns>A <see cref="NoContentResult"/> indicating success or a <see cref="NotFoundResult"/> if the user was not found.</returns>
|
|
[HttpDelete("{userId}")]
|
|
[Authorize(Policy = Policies.RequiresElevation)]
|
|
[ProducesResponseType(StatusCodes.Status204NoContent)]
|
|
[ProducesResponseType(StatusCodes.Status404NotFound)]
|
|
public ActionResult DeleteUser([FromRoute, Required] Guid userId)
|
|
{
|
|
var user = _userManager.GetUserById(userId);
|
|
_sessionManager.RevokeUserTokens(user.Id, null);
|
|
_userManager.DeleteUser(userId);
|
|
return NoContent();
|
|
}
|
|
|
|
/// <summary>
|
|
/// Authenticates a user.
|
|
/// </summary>
|
|
/// <param name="userId">The user id.</param>
|
|
/// <param name="pw">The password as plain text.</param>
|
|
/// <param name="password">The password sha1-hash.</param>
|
|
/// <response code="200">User authenticated.</response>
|
|
/// <response code="403">Sha1-hashed password only is not allowed.</response>
|
|
/// <response code="404">User not found.</response>
|
|
/// <returns>A <see cref="Task"/> containing an <see cref="AuthenticationResult"/>.</returns>
|
|
[HttpPost("{userId}/Authenticate")]
|
|
[ProducesResponseType(StatusCodes.Status200OK)]
|
|
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
|
[ProducesResponseType(StatusCodes.Status404NotFound)]
|
|
public async Task<ActionResult<AuthenticationResult>> AuthenticateUser(
|
|
[FromRoute, Required] Guid userId,
|
|
[FromQuery, Required] string pw,
|
|
[FromQuery] string? password)
|
|
{
|
|
var user = _userManager.GetUserById(userId);
|
|
|
|
if (user == null)
|
|
{
|
|
return NotFound("User not found");
|
|
}
|
|
|
|
if (!string.IsNullOrEmpty(password) && string.IsNullOrEmpty(pw))
|
|
{
|
|
return Forbid("Only sha1 password is not allowed.");
|
|
}
|
|
|
|
// Password should always be null
|
|
AuthenticateUserByName request = new AuthenticateUserByName
|
|
{
|
|
Username = user.Username,
|
|
Password = null,
|
|
Pw = pw
|
|
};
|
|
return await AuthenticateUserByName(request).ConfigureAwait(false);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Authenticates a user by name.
|
|
/// </summary>
|
|
/// <param name="request">The <see cref="AuthenticateUserByName"/> request.</param>
|
|
/// <response code="200">User authenticated.</response>
|
|
/// <returns>A <see cref="Task"/> containing an <see cref="AuthenticationRequest"/> with information about the new session.</returns>
|
|
[HttpPost("AuthenticateByName")]
|
|
[ProducesResponseType(StatusCodes.Status200OK)]
|
|
public async Task<ActionResult<AuthenticationResult>> AuthenticateUserByName([FromBody, Required] AuthenticateUserByName request)
|
|
{
|
|
var auth = _authContext.GetAuthorizationInfo(Request);
|
|
|
|
try
|
|
{
|
|
var result = await _sessionManager.AuthenticateNewSession(new AuthenticationRequest
|
|
{
|
|
App = auth.Client,
|
|
AppVersion = auth.Version,
|
|
DeviceId = auth.DeviceId,
|
|
DeviceName = auth.Device,
|
|
Password = request.Pw,
|
|
PasswordSha1 = request.Password,
|
|
RemoteEndPoint = HttpContext.GetNormalizedRemoteIp(),
|
|
Username = request.Username
|
|
}).ConfigureAwait(false);
|
|
|
|
return result;
|
|
}
|
|
catch (SecurityException e)
|
|
{
|
|
// rethrow adding IP address to message
|
|
throw new SecurityException($"[{HttpContext.GetNormalizedRemoteIp()}] {e.Message}", e);
|
|
}
|
|
}
|
|
|
|
/// <summary>
|
|
/// Authenticates a user with quick connect.
|
|
/// </summary>
|
|
/// <param name="request">The <see cref="QuickConnectDto"/> request.</param>
|
|
/// <response code="200">User authenticated.</response>
|
|
/// <response code="400">Missing token.</response>
|
|
/// <returns>A <see cref="Task"/> containing an <see cref="AuthenticationRequest"/> with information about the new session.</returns>
|
|
[HttpPost("AuthenticateWithQuickConnect")]
|
|
[ProducesResponseType(StatusCodes.Status200OK)]
|
|
public async Task<ActionResult<AuthenticationResult>> AuthenticateWithQuickConnect([FromBody, Required] QuickConnectDto request)
|
|
{
|
|
var auth = _authContext.GetAuthorizationInfo(Request);
|
|
|
|
try
|
|
{
|
|
var authRequest = new AuthenticationRequest
|
|
{
|
|
App = auth.Client,
|
|
AppVersion = auth.Version,
|
|
DeviceId = auth.DeviceId,
|
|
DeviceName = auth.Device,
|
|
};
|
|
|
|
return await _sessionManager.AuthenticateQuickConnect(
|
|
authRequest,
|
|
request.Token).ConfigureAwait(false);
|
|
}
|
|
catch (SecurityException e)
|
|
{
|
|
// rethrow adding IP address to message
|
|
throw new SecurityException($"[{HttpContext.GetNormalizedRemoteIp()}] {e.Message}", e);
|
|
}
|
|
}
|
|
|
|
/// <summary>
|
|
/// Updates a user's password.
|
|
/// </summary>
|
|
/// <param name="userId">The user id.</param>
|
|
/// <param name="request">The <see cref="UpdateUserPassword"/> request.</param>
|
|
/// <response code="204">Password successfully reset.</response>
|
|
/// <response code="403">User is not allowed to update the password.</response>
|
|
/// <response code="404">User not found.</response>
|
|
/// <returns>A <see cref="NoContentResult"/> indicating success or a <see cref="ForbidResult"/> or a <see cref="NotFoundResult"/> on failure.</returns>
|
|
[HttpPost("{userId}/Password")]
|
|
[Authorize(Policy = Policies.DefaultAuthorization)]
|
|
[ProducesResponseType(StatusCodes.Status204NoContent)]
|
|
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
|
[ProducesResponseType(StatusCodes.Status404NotFound)]
|
|
public async Task<ActionResult> UpdateUserPassword(
|
|
[FromRoute, Required] Guid userId,
|
|
[FromBody] UpdateUserPassword request)
|
|
{
|
|
if (!RequestHelpers.AssertCanUpdateUser(_authContext, HttpContext.Request, userId, true))
|
|
{
|
|
return Forbid("User is not allowed to update the password.");
|
|
}
|
|
|
|
var user = _userManager.GetUserById(userId);
|
|
|
|
if (user == null)
|
|
{
|
|
return NotFound("User not found");
|
|
}
|
|
|
|
if (request.ResetPassword)
|
|
{
|
|
await _userManager.ResetPassword(user).ConfigureAwait(false);
|
|
}
|
|
else
|
|
{
|
|
var success = await _userManager.AuthenticateUser(
|
|
user.Username,
|
|
request.CurrentPw,
|
|
request.CurrentPw,
|
|
HttpContext.GetNormalizedRemoteIp(),
|
|
false).ConfigureAwait(false);
|
|
|
|
if (success == null)
|
|
{
|
|
return Forbid("Invalid user or password entered.");
|
|
}
|
|
|
|
await _userManager.ChangePassword(user, request.NewPw).ConfigureAwait(false);
|
|
|
|
var currentToken = _authContext.GetAuthorizationInfo(Request).Token;
|
|
|
|
_sessionManager.RevokeUserTokens(user.Id, currentToken);
|
|
}
|
|
|
|
return NoContent();
|
|
}
|
|
|
|
/// <summary>
|
|
/// Updates a user's easy password.
|
|
/// </summary>
|
|
/// <param name="userId">The user id.</param>
|
|
/// <param name="request">The <see cref="UpdateUserEasyPassword"/> request.</param>
|
|
/// <response code="204">Password successfully reset.</response>
|
|
/// <response code="403">User is not allowed to update the password.</response>
|
|
/// <response code="404">User not found.</response>
|
|
/// <returns>A <see cref="NoContentResult"/> indicating success or a <see cref="ForbidResult"/> or a <see cref="NotFoundResult"/> on failure.</returns>
|
|
[HttpPost("{userId}/EasyPassword")]
|
|
[Authorize(Policy = Policies.DefaultAuthorization)]
|
|
[ProducesResponseType(StatusCodes.Status204NoContent)]
|
|
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
|
[ProducesResponseType(StatusCodes.Status404NotFound)]
|
|
public ActionResult UpdateUserEasyPassword(
|
|
[FromRoute, Required] Guid userId,
|
|
[FromBody] UpdateUserEasyPassword request)
|
|
{
|
|
if (!RequestHelpers.AssertCanUpdateUser(_authContext, HttpContext.Request, userId, true))
|
|
{
|
|
return Forbid("User is not allowed to update the easy password.");
|
|
}
|
|
|
|
var user = _userManager.GetUserById(userId);
|
|
|
|
if (user == null)
|
|
{
|
|
return NotFound("User not found");
|
|
}
|
|
|
|
if (request.ResetPassword)
|
|
{
|
|
_userManager.ResetEasyPassword(user);
|
|
}
|
|
else
|
|
{
|
|
_userManager.ChangeEasyPassword(user, request.NewPw, request.NewPassword);
|
|
}
|
|
|
|
return NoContent();
|
|
}
|
|
|
|
/// <summary>
|
|
/// Updates a user.
|
|
/// </summary>
|
|
/// <param name="userId">The user id.</param>
|
|
/// <param name="updateUser">The updated user model.</param>
|
|
/// <response code="204">User updated.</response>
|
|
/// <response code="400">User information was not supplied.</response>
|
|
/// <response code="403">User update forbidden.</response>
|
|
/// <returns>A <see cref="NoContentResult"/> indicating success or a <see cref="BadRequestResult"/> or a <see cref="ForbidResult"/> on failure.</returns>
|
|
[HttpPost("{userId}")]
|
|
[Authorize(Policy = Policies.DefaultAuthorization)]
|
|
[ProducesResponseType(StatusCodes.Status204NoContent)]
|
|
[ProducesResponseType(StatusCodes.Status400BadRequest)]
|
|
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
|
public async Task<ActionResult> UpdateUser(
|
|
[FromRoute, Required] Guid userId,
|
|
[FromBody] UserDto updateUser)
|
|
{
|
|
if (updateUser == null)
|
|
{
|
|
return BadRequest();
|
|
}
|
|
|
|
if (!RequestHelpers.AssertCanUpdateUser(_authContext, HttpContext.Request, userId, false))
|
|
{
|
|
return Forbid("User update not allowed.");
|
|
}
|
|
|
|
var user = _userManager.GetUserById(userId);
|
|
|
|
if (!string.Equals(user.Username, updateUser.Name, StringComparison.Ordinal))
|
|
{
|
|
await _userManager.RenameUser(user, updateUser.Name).ConfigureAwait(false);
|
|
}
|
|
|
|
await _userManager.UpdateConfigurationAsync(user.Id, updateUser.Configuration).ConfigureAwait(false);
|
|
|
|
return NoContent();
|
|
}
|
|
|
|
/// <summary>
|
|
/// Updates a user policy.
|
|
/// </summary>
|
|
/// <param name="userId">The user id.</param>
|
|
/// <param name="newPolicy">The new user policy.</param>
|
|
/// <response code="204">User policy updated.</response>
|
|
/// <response code="400">User policy was not supplied.</response>
|
|
/// <response code="403">User policy update forbidden.</response>
|
|
/// <returns>A <see cref="NoContentResult"/> indicating success or a <see cref="BadRequestResult"/> or a <see cref="ForbidResult"/> on failure..</returns>
|
|
[HttpPost("{userId}/Policy")]
|
|
[Authorize(Policy = Policies.RequiresElevation)]
|
|
[ProducesResponseType(StatusCodes.Status204NoContent)]
|
|
[ProducesResponseType(StatusCodes.Status400BadRequest)]
|
|
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
|
public async Task<ActionResult> UpdateUserPolicy(
|
|
[FromRoute, Required] Guid userId,
|
|
[FromBody] UserPolicy newPolicy)
|
|
{
|
|
if (newPolicy == null)
|
|
{
|
|
return BadRequest();
|
|
}
|
|
|
|
var user = _userManager.GetUserById(userId);
|
|
|
|
// If removing admin access
|
|
if (!newPolicy.IsAdministrator && user.HasPermission(PermissionKind.IsAdministrator))
|
|
{
|
|
if (_userManager.Users.Count(i => i.HasPermission(PermissionKind.IsAdministrator)) == 1)
|
|
{
|
|
return Forbid("There must be at least one user in the system with administrative access.");
|
|
}
|
|
}
|
|
|
|
// If disabling
|
|
if (newPolicy.IsDisabled && user.HasPermission(PermissionKind.IsAdministrator))
|
|
{
|
|
return Forbid("Administrators cannot be disabled.");
|
|
}
|
|
|
|
// If disabling
|
|
if (newPolicy.IsDisabled && !user.HasPermission(PermissionKind.IsDisabled))
|
|
{
|
|
if (_userManager.Users.Count(i => !i.HasPermission(PermissionKind.IsDisabled)) == 1)
|
|
{
|
|
return Forbid("There must be at least one enabled user in the system.");
|
|
}
|
|
|
|
var currentToken = _authContext.GetAuthorizationInfo(Request).Token;
|
|
_sessionManager.RevokeUserTokens(user.Id, currentToken);
|
|
}
|
|
|
|
await _userManager.UpdatePolicyAsync(userId, newPolicy).ConfigureAwait(false);
|
|
|
|
return NoContent();
|
|
}
|
|
|
|
/// <summary>
|
|
/// Updates a user configuration.
|
|
/// </summary>
|
|
/// <param name="userId">The user id.</param>
|
|
/// <param name="userConfig">The new user configuration.</param>
|
|
/// <response code="204">User configuration updated.</response>
|
|
/// <response code="403">User configuration update forbidden.</response>
|
|
/// <returns>A <see cref="NoContentResult"/> indicating success.</returns>
|
|
[HttpPost("{userId}/Configuration")]
|
|
[Authorize(Policy = Policies.DefaultAuthorization)]
|
|
[ProducesResponseType(StatusCodes.Status204NoContent)]
|
|
[ProducesResponseType(StatusCodes.Status403Forbidden)]
|
|
public async Task<ActionResult> UpdateUserConfiguration(
|
|
[FromRoute, Required] Guid userId,
|
|
[FromBody] UserConfiguration userConfig)
|
|
{
|
|
if (!RequestHelpers.AssertCanUpdateUser(_authContext, HttpContext.Request, userId, false))
|
|
{
|
|
return Forbid("User configuration update not allowed");
|
|
}
|
|
|
|
await _userManager.UpdateConfigurationAsync(userId, userConfig).ConfigureAwait(false);
|
|
|
|
return NoContent();
|
|
}
|
|
|
|
/// <summary>
|
|
/// Creates a user.
|
|
/// </summary>
|
|
/// <param name="request">The create user by name request body.</param>
|
|
/// <response code="200">User created.</response>
|
|
/// <returns>An <see cref="UserDto"/> of the new user.</returns>
|
|
[HttpPost("New")]
|
|
[Authorize(Policy = Policies.RequiresElevation)]
|
|
[ProducesResponseType(StatusCodes.Status200OK)]
|
|
public async Task<ActionResult<UserDto>> CreateUserByName([FromBody] CreateUserByName request)
|
|
{
|
|
var newUser = await _userManager.CreateUserAsync(request.Name).ConfigureAwait(false);
|
|
|
|
// no need to authenticate password for new user
|
|
if (request.Password != null)
|
|
{
|
|
await _userManager.ChangePassword(newUser, request.Password).ConfigureAwait(false);
|
|
}
|
|
|
|
var result = _userManager.GetUserDto(newUser, HttpContext.GetNormalizedRemoteIp());
|
|
|
|
return result;
|
|
}
|
|
|
|
/// <summary>
|
|
/// Initiates the forgot password process for a local user.
|
|
/// </summary>
|
|
/// <param name="forgotPasswordRequest">The forgot password request containing the entered username.</param>
|
|
/// <response code="200">Password reset process started.</response>
|
|
/// <returns>A <see cref="Task"/> containing a <see cref="ForgotPasswordResult"/>.</returns>
|
|
[HttpPost("ForgotPassword")]
|
|
[ProducesResponseType(StatusCodes.Status200OK)]
|
|
public async Task<ActionResult<ForgotPasswordResult>> ForgotPassword([FromBody, Required] ForgotPasswordDto forgotPasswordRequest)
|
|
{
|
|
var isLocal = HttpContext.IsLocal()
|
|
|| _networkManager.IsInLocalNetwork(HttpContext.GetNormalizedRemoteIp());
|
|
|
|
var result = await _userManager.StartForgotPasswordProcess(forgotPasswordRequest.EnteredUsername, isLocal).ConfigureAwait(false);
|
|
|
|
return result;
|
|
}
|
|
|
|
/// <summary>
|
|
/// Redeems a forgot password pin.
|
|
/// </summary>
|
|
/// <param name="pin">The pin.</param>
|
|
/// <response code="200">Pin reset process started.</response>
|
|
/// <returns>A <see cref="Task"/> containing a <see cref="PinRedeemResult"/>.</returns>
|
|
[HttpPost("ForgotPassword/Pin")]
|
|
[ProducesResponseType(StatusCodes.Status200OK)]
|
|
public async Task<ActionResult<PinRedeemResult>> ForgotPasswordPin([FromBody] string? pin)
|
|
{
|
|
var result = await _userManager.RedeemPasswordResetPin(pin).ConfigureAwait(false);
|
|
return result;
|
|
}
|
|
|
|
/// <summary>
|
|
/// Gets the user based on auth token.
|
|
/// </summary>
|
|
/// <response code="200">User returned.</response>
|
|
/// <response code="400">Token is not owned by a user.</response>
|
|
/// <returns>A <see cref="UserDto"/> for the authenticated user.</returns>
|
|
[HttpGet("Me")]
|
|
[Authorize(Policy = Policies.DefaultAuthorization)]
|
|
[ProducesResponseType(StatusCodes.Status200OK)]
|
|
[ProducesResponseType(StatusCodes.Status400BadRequest)]
|
|
public ActionResult<UserDto> GetCurrentUser()
|
|
{
|
|
var userId = ClaimHelpers.GetUserId(Request.HttpContext.User);
|
|
if (userId == null)
|
|
{
|
|
return BadRequest();
|
|
}
|
|
|
|
var user = _userManager.GetUserById(userId.Value);
|
|
if (user == null)
|
|
{
|
|
return BadRequest();
|
|
}
|
|
|
|
return _userManager.GetUserDto(user);
|
|
}
|
|
|
|
private IEnumerable<UserDto> Get(bool? isHidden, bool? isDisabled, bool filterByDevice, bool filterByNetwork)
|
|
{
|
|
var users = _userManager.Users;
|
|
|
|
if (isDisabled.HasValue)
|
|
{
|
|
users = users.Where(i => i.HasPermission(PermissionKind.IsDisabled) == isDisabled.Value);
|
|
}
|
|
|
|
if (isHidden.HasValue)
|
|
{
|
|
users = users.Where(i => i.HasPermission(PermissionKind.IsHidden) == isHidden.Value);
|
|
}
|
|
|
|
if (filterByDevice)
|
|
{
|
|
var deviceId = _authContext.GetAuthorizationInfo(Request).DeviceId;
|
|
|
|
if (!string.IsNullOrWhiteSpace(deviceId))
|
|
{
|
|
users = users.Where(i => _deviceManager.CanAccessDevice(i, deviceId));
|
|
}
|
|
}
|
|
|
|
if (filterByNetwork)
|
|
{
|
|
if (!_networkManager.IsInLocalNetwork(HttpContext.GetNormalizedRemoteIp()))
|
|
{
|
|
users = users.Where(i => i.HasPermission(PermissionKind.EnableRemoteAccess));
|
|
}
|
|
}
|
|
|
|
var result = users
|
|
.OrderBy(u => u.Username)
|
|
.Select(i => _userManager.GetUserDto(i, HttpContext.GetNormalizedRemoteIp()));
|
|
|
|
return result;
|
|
}
|
|
}
|
|
}
|