318 lines
11 KiB
C#
318 lines
11 KiB
C#
using System;
|
|
using System.Collections.Generic;
|
|
using System.Globalization;
|
|
using System.Linq;
|
|
using System.Security.Cryptography;
|
|
using MediaBrowser.Common.Configuration;
|
|
using MediaBrowser.Controller;
|
|
using MediaBrowser.Controller.Configuration;
|
|
using MediaBrowser.Controller.Library;
|
|
using MediaBrowser.Controller.Net;
|
|
using MediaBrowser.Controller.QuickConnect;
|
|
using MediaBrowser.Controller.Security;
|
|
using MediaBrowser.Model.Globalization;
|
|
using MediaBrowser.Model.QuickConnect;
|
|
using MediaBrowser.Model.Serialization;
|
|
using MediaBrowser.Model.Services;
|
|
using MediaBrowser.Model.Tasks;
|
|
using Microsoft.Extensions.Logging;
|
|
|
|
namespace Emby.Server.Implementations.QuickConnect
|
|
{
|
|
/// <summary>
|
|
/// Quick connect implementation.
|
|
/// </summary>
|
|
public class QuickConnectManager : IQuickConnect
|
|
{
|
|
private readonly RNGCryptoServiceProvider _rng = new RNGCryptoServiceProvider();
|
|
private Dictionary<string, QuickConnectResult> _currentRequests = new Dictionary<string, QuickConnectResult>();
|
|
|
|
private IServerConfigurationManager _config;
|
|
private ILogger _logger;
|
|
private IUserManager _userManager;
|
|
private ILocalizationManager _localizationManager;
|
|
private IJsonSerializer _jsonSerializer;
|
|
private IAuthenticationRepository _authenticationRepository;
|
|
private IAuthorizationContext _authContext;
|
|
private IServerApplicationHost _appHost;
|
|
private ITaskManager _taskManager;
|
|
|
|
/// <summary>
|
|
/// Initializes a new instance of the <see cref="QuickConnectManager"/> class.
|
|
/// Should only be called at server startup when a singleton is created.
|
|
/// </summary>
|
|
/// <param name="config">Configuration.</param>
|
|
/// <param name="loggerFactory">Logger.</param>
|
|
/// <param name="userManager">User manager.</param>
|
|
/// <param name="localization">Localization.</param>
|
|
/// <param name="jsonSerializer">JSON serializer.</param>
|
|
/// <param name="appHost">Application host.</param>
|
|
/// <param name="authContext">Authentication context.</param>
|
|
/// <param name="authenticationRepository">Authentication repository.</param>
|
|
/// <param name="taskManager">Task scheduler.</param>
|
|
public QuickConnectManager(
|
|
IServerConfigurationManager config,
|
|
ILoggerFactory loggerFactory,
|
|
IUserManager userManager,
|
|
ILocalizationManager localization,
|
|
IJsonSerializer jsonSerializer,
|
|
IServerApplicationHost appHost,
|
|
IAuthorizationContext authContext,
|
|
IAuthenticationRepository authenticationRepository,
|
|
ITaskManager taskManager)
|
|
{
|
|
_config = config;
|
|
_logger = loggerFactory.CreateLogger(nameof(QuickConnectManager));
|
|
_userManager = userManager;
|
|
_localizationManager = localization;
|
|
_jsonSerializer = jsonSerializer;
|
|
_appHost = appHost;
|
|
_authContext = authContext;
|
|
_authenticationRepository = authenticationRepository;
|
|
_taskManager = taskManager;
|
|
|
|
ReloadConfiguration();
|
|
}
|
|
|
|
private void ReloadConfiguration()
|
|
{
|
|
var config = _config.GetQuickConnectConfiguration();
|
|
|
|
State = config.State;
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public int CodeLength { get; set; } = 6;
|
|
|
|
/// <inheritdoc/>
|
|
public string TokenNamePrefix { get; set; } = "QuickConnect-";
|
|
|
|
/// <inheritdoc/>
|
|
public QuickConnectState State { get; private set; } = QuickConnectState.Unavailable;
|
|
|
|
/// <inheritdoc/>
|
|
public int RequestExpiry { get; set; } = 30;
|
|
|
|
private bool TemporaryActivation { get; set; } = false;
|
|
|
|
private DateTime DateActivated { get; set; }
|
|
|
|
/// <inheritdoc/>
|
|
public void AssertActive()
|
|
{
|
|
if (State != QuickConnectState.Active)
|
|
{
|
|
throw new InvalidOperationException("Quick connect is not active on this server");
|
|
}
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public QuickConnectResult Activate()
|
|
{
|
|
// This should not call SetEnabled since that would persist the "temporary" activation to the configuration file
|
|
State = QuickConnectState.Active;
|
|
DateActivated = DateTime.Now;
|
|
TemporaryActivation = true;
|
|
|
|
return new QuickConnectResult();
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public void SetEnabled(QuickConnectState newState)
|
|
{
|
|
_logger.LogDebug("Changed quick connect state from {0} to {1}", State, newState);
|
|
|
|
State = newState;
|
|
|
|
_config.SaveConfiguration("quickconnect", new QuickConnectConfiguration()
|
|
{
|
|
State = State
|
|
});
|
|
|
|
_logger.LogDebug("Configuration saved");
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public QuickConnectResult TryConnect(string friendlyName)
|
|
{
|
|
ExpireRequests();
|
|
|
|
if (State != QuickConnectState.Active)
|
|
{
|
|
_logger.LogDebug("Refusing quick connect initiation request, current state is {0}", State);
|
|
|
|
return new QuickConnectResult()
|
|
{
|
|
Error = "Quick connect is not active on this server"
|
|
};
|
|
}
|
|
|
|
_logger.LogDebug("Got new quick connect request from {friendlyName}", friendlyName);
|
|
|
|
var lookup = GenerateSecureRandom();
|
|
var result = new QuickConnectResult()
|
|
{
|
|
Lookup = lookup,
|
|
Secret = GenerateSecureRandom(),
|
|
FriendlyName = friendlyName,
|
|
DateAdded = DateTime.Now,
|
|
Code = GenerateCode()
|
|
};
|
|
|
|
_currentRequests[lookup] = result;
|
|
return result;
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public QuickConnectResult CheckRequestStatus(string secret)
|
|
{
|
|
ExpireRequests();
|
|
AssertActive();
|
|
|
|
string lookup = _currentRequests.Where(x => x.Value.Secret == secret).Select(x => x.Value.Lookup).DefaultIfEmpty(string.Empty).First();
|
|
|
|
if (!_currentRequests.ContainsKey(lookup))
|
|
{
|
|
throw new KeyNotFoundException("Unable to find request with provided identifier");
|
|
}
|
|
|
|
return _currentRequests[lookup];
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public List<QuickConnectResultDto> GetCurrentRequests()
|
|
{
|
|
return GetCurrentRequestsInternal().Select(x => (QuickConnectResultDto)x).ToList();
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public List<QuickConnectResult> GetCurrentRequestsInternal()
|
|
{
|
|
ExpireRequests();
|
|
AssertActive();
|
|
return _currentRequests.Values.ToList();
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public string GenerateCode()
|
|
{
|
|
// TODO: output may be biased
|
|
|
|
int min = (int)Math.Pow(10, CodeLength - 1);
|
|
int max = (int)Math.Pow(10, CodeLength);
|
|
|
|
uint scale = uint.MaxValue;
|
|
while (scale == uint.MaxValue)
|
|
{
|
|
byte[] raw = new byte[4];
|
|
_rng.GetBytes(raw);
|
|
scale = BitConverter.ToUInt32(raw, 0);
|
|
}
|
|
|
|
int code = (int)(min + (max - min) * (scale / (double)uint.MaxValue));
|
|
return code.ToString(CultureInfo.InvariantCulture);
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public bool AuthorizeRequest(IRequest request, string lookup)
|
|
{
|
|
ExpireRequests();
|
|
AssertActive();
|
|
|
|
var auth = _authContext.GetAuthorizationInfo(request);
|
|
|
|
if (!_currentRequests.ContainsKey(lookup))
|
|
{
|
|
throw new KeyNotFoundException("Unable to find request");
|
|
}
|
|
|
|
QuickConnectResult result = _currentRequests[lookup];
|
|
|
|
if (result.Authenticated)
|
|
{
|
|
throw new InvalidOperationException("Request is already authorized");
|
|
}
|
|
|
|
result.Authentication = Guid.NewGuid().ToString("N", CultureInfo.InvariantCulture);
|
|
|
|
// Advance the time on the request so it expires sooner as the client will pick up the changes in a few seconds
|
|
result.DateAdded = result.DateAdded.Subtract(new TimeSpan(0, RequestExpiry - 1, 0));
|
|
|
|
_authenticationRepository.Create(new AuthenticationInfo
|
|
{
|
|
AppName = TokenNamePrefix + result.FriendlyName,
|
|
AccessToken = result.Authentication,
|
|
DateCreated = DateTime.UtcNow,
|
|
DeviceId = _appHost.SystemId,
|
|
DeviceName = _appHost.FriendlyName,
|
|
AppVersion = _appHost.ApplicationVersionString,
|
|
UserId = auth.UserId
|
|
});
|
|
|
|
_logger.LogInformation("Allowing device {0} to login as user {1} with quick connect code {2}", result.FriendlyName, auth.User.Name, result.Code);
|
|
|
|
return true;
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public int DeleteAllDevices(Guid user)
|
|
{
|
|
var raw = _authenticationRepository.Get(new AuthenticationInfoQuery()
|
|
{
|
|
DeviceId = _appHost.SystemId,
|
|
UserId = user
|
|
});
|
|
|
|
var tokens = raw.Items.Where(x => x.AppName.StartsWith(TokenNamePrefix, StringComparison.CurrentCulture));
|
|
|
|
foreach (var token in tokens)
|
|
{
|
|
_authenticationRepository.Delete(token);
|
|
_logger.LogDebug("Deleted token {0}", token.AccessToken);
|
|
}
|
|
|
|
return tokens.Count();
|
|
}
|
|
|
|
private string GenerateSecureRandom(int length = 32)
|
|
{
|
|
var bytes = new byte[length];
|
|
_rng.GetBytes(bytes);
|
|
|
|
return string.Join(string.Empty, bytes.Select(x => x.ToString("x2", CultureInfo.InvariantCulture)));
|
|
}
|
|
|
|
private void ExpireRequests()
|
|
{
|
|
bool expireAll = false;
|
|
|
|
// check if quick connect should be deactivated
|
|
if (TemporaryActivation && DateTime.Now > DateActivated.AddMinutes(10) && State == QuickConnectState.Active)
|
|
{
|
|
_logger.LogDebug("Quick connect time expired, deactivating");
|
|
SetEnabled(QuickConnectState.Available);
|
|
expireAll = true;
|
|
TemporaryActivation = false;
|
|
}
|
|
|
|
// expire stale connection requests
|
|
var delete = new List<string>();
|
|
var values = _currentRequests.Values.ToList();
|
|
|
|
for (int i = 0; i < _currentRequests.Count; i++)
|
|
{
|
|
if (DateTime.Now > values[i].DateAdded.AddMinutes(RequestExpiry) || expireAll)
|
|
{
|
|
delete.Add(values[i].Lookup);
|
|
}
|
|
}
|
|
|
|
foreach (var lookup in delete)
|
|
{
|
|
_logger.LogDebug("Removing expired request {0}", lookup);
|
|
_currentRequests.Remove(lookup);
|
|
}
|
|
}
|
|
}
|
|
}
|