mirror of
				https://github.com/jellyfin/jellyfin.git
				synced 2025-11-03 19:17:24 -05:00 
			
		
		
		
	
		
			
				
	
	
		
			247 lines
		
	
	
		
			8.8 KiB
		
	
	
	
		
			C#
		
	
	
	
	
	
			
		
		
	
	
			247 lines
		
	
	
		
			8.8 KiB
		
	
	
	
		
			C#
		
	
	
	
	
	
using System;
 | 
						|
using System.Collections.Concurrent;
 | 
						|
using System.Globalization;
 | 
						|
using System.Linq;
 | 
						|
using System.Security.Cryptography;
 | 
						|
using System.Threading.Tasks;
 | 
						|
using MediaBrowser.Common.Extensions;
 | 
						|
using MediaBrowser.Controller.Authentication;
 | 
						|
using MediaBrowser.Controller.Configuration;
 | 
						|
using MediaBrowser.Controller.Net;
 | 
						|
using MediaBrowser.Controller.QuickConnect;
 | 
						|
using MediaBrowser.Controller.Session;
 | 
						|
using MediaBrowser.Model.QuickConnect;
 | 
						|
using Microsoft.Extensions.Logging;
 | 
						|
 | 
						|
namespace Emby.Server.Implementations.QuickConnect
 | 
						|
{
 | 
						|
    /// <summary>
 | 
						|
    /// Quick connect implementation.
 | 
						|
    /// </summary>
 | 
						|
    public class QuickConnectManager : IQuickConnect
 | 
						|
    {
 | 
						|
        /// <summary>
 | 
						|
        /// The length of user facing codes.
 | 
						|
        /// </summary>
 | 
						|
        private const int CodeLength = 6;
 | 
						|
 | 
						|
        /// <summary>
 | 
						|
        /// The time (in minutes) that the quick connect token is valid.
 | 
						|
        /// </summary>
 | 
						|
        private const int Timeout = 10;
 | 
						|
 | 
						|
        private readonly ConcurrentDictionary<string, QuickConnectResult> _currentRequests = new ();
 | 
						|
        private readonly ConcurrentDictionary<string, (DateTime Timestamp, AuthenticationResult AuthenticationResult)> _authorizedSecrets = new ();
 | 
						|
 | 
						|
        private readonly IServerConfigurationManager _config;
 | 
						|
        private readonly ILogger<QuickConnectManager> _logger;
 | 
						|
        private readonly ISessionManager _sessionManager;
 | 
						|
 | 
						|
        /// <summary>
 | 
						|
        /// Initializes a new instance of the <see cref="QuickConnectManager"/> class.
 | 
						|
        /// Should only be called at server startup when a singleton is created.
 | 
						|
        /// </summary>
 | 
						|
        /// <param name="config">Configuration.</param>
 | 
						|
        /// <param name="logger">Logger.</param>
 | 
						|
        /// <param name="sessionManager">Session Manager.</param>
 | 
						|
        public QuickConnectManager(
 | 
						|
            IServerConfigurationManager config,
 | 
						|
            ILogger<QuickConnectManager> logger,
 | 
						|
            ISessionManager sessionManager)
 | 
						|
        {
 | 
						|
            _config = config;
 | 
						|
            _logger = logger;
 | 
						|
            _sessionManager = sessionManager;
 | 
						|
        }
 | 
						|
 | 
						|
        /// <inheritdoc />
 | 
						|
        public bool IsEnabled => _config.Configuration.QuickConnectAvailable;
 | 
						|
 | 
						|
        /// <summary>
 | 
						|
        /// Assert that quick connect is currently active and throws an exception if it is not.
 | 
						|
        /// </summary>
 | 
						|
        private void AssertActive()
 | 
						|
        {
 | 
						|
            if (!IsEnabled)
 | 
						|
            {
 | 
						|
                throw new AuthenticationException("Quick connect is not active on this server");
 | 
						|
            }
 | 
						|
        }
 | 
						|
 | 
						|
        /// <inheritdoc/>
 | 
						|
        public QuickConnectResult TryConnect(AuthorizationInfo authorizationInfo)
 | 
						|
        {
 | 
						|
            if (string.IsNullOrEmpty(authorizationInfo.DeviceId))
 | 
						|
            {
 | 
						|
                throw new ArgumentException(nameof(authorizationInfo.DeviceId) + " is required");
 | 
						|
            }
 | 
						|
 | 
						|
            if (string.IsNullOrEmpty(authorizationInfo.Device))
 | 
						|
            {
 | 
						|
                throw new ArgumentException(nameof(authorizationInfo.Device) + " is required");
 | 
						|
            }
 | 
						|
 | 
						|
            if (string.IsNullOrEmpty(authorizationInfo.Client))
 | 
						|
            {
 | 
						|
                throw new ArgumentException(nameof(authorizationInfo.Client) + " is required");
 | 
						|
            }
 | 
						|
 | 
						|
            if (string.IsNullOrEmpty(authorizationInfo.Version))
 | 
						|
            {
 | 
						|
                throw new ArgumentException(nameof(authorizationInfo.Version) + "is required");
 | 
						|
            }
 | 
						|
 | 
						|
            AssertActive();
 | 
						|
            ExpireRequests();
 | 
						|
 | 
						|
            var secret = GenerateSecureRandom();
 | 
						|
            var code = GenerateCode();
 | 
						|
            var result = new QuickConnectResult(
 | 
						|
                secret,
 | 
						|
                code,
 | 
						|
                DateTime.UtcNow,
 | 
						|
                authorizationInfo.DeviceId,
 | 
						|
                authorizationInfo.Device,
 | 
						|
                authorizationInfo.Client,
 | 
						|
                authorizationInfo.Version);
 | 
						|
 | 
						|
            _currentRequests[code] = result;
 | 
						|
            return result;
 | 
						|
        }
 | 
						|
 | 
						|
        /// <inheritdoc/>
 | 
						|
        public QuickConnectResult CheckRequestStatus(string secret)
 | 
						|
        {
 | 
						|
            AssertActive();
 | 
						|
            ExpireRequests();
 | 
						|
 | 
						|
            string code = _currentRequests.Where(x => x.Value.Secret == secret).Select(x => x.Value.Code).DefaultIfEmpty(string.Empty).First();
 | 
						|
 | 
						|
            if (!_currentRequests.TryGetValue(code, out QuickConnectResult? result))
 | 
						|
            {
 | 
						|
                throw new ResourceNotFoundException("Unable to find request with provided secret");
 | 
						|
            }
 | 
						|
 | 
						|
            return result;
 | 
						|
        }
 | 
						|
 | 
						|
        /// <summary>
 | 
						|
        /// Generates a short code to display to the user to uniquely identify this request.
 | 
						|
        /// </summary>
 | 
						|
        /// <returns>A short, unique alphanumeric string.</returns>
 | 
						|
        private string GenerateCode()
 | 
						|
        {
 | 
						|
            Span<byte> raw = stackalloc byte[4];
 | 
						|
 | 
						|
            int min = (int)Math.Pow(10, CodeLength - 1);
 | 
						|
            int max = (int)Math.Pow(10, CodeLength);
 | 
						|
 | 
						|
            uint scale = uint.MaxValue;
 | 
						|
            while (scale == uint.MaxValue)
 | 
						|
            {
 | 
						|
                RandomNumberGenerator.Fill(raw);
 | 
						|
                scale = BitConverter.ToUInt32(raw);
 | 
						|
            }
 | 
						|
 | 
						|
            int code = (int)(min + ((max - min) * (scale / (double)uint.MaxValue)));
 | 
						|
            return code.ToString(CultureInfo.InvariantCulture);
 | 
						|
        }
 | 
						|
 | 
						|
        /// <inheritdoc/>
 | 
						|
        public async Task<bool> AuthorizeRequest(Guid userId, string code)
 | 
						|
        {
 | 
						|
            AssertActive();
 | 
						|
            ExpireRequests();
 | 
						|
 | 
						|
            if (!_currentRequests.TryGetValue(code, out QuickConnectResult? result))
 | 
						|
            {
 | 
						|
                throw new ResourceNotFoundException("Unable to find request");
 | 
						|
            }
 | 
						|
 | 
						|
            if (result.Authenticated)
 | 
						|
            {
 | 
						|
                throw new InvalidOperationException("Request is already authorized");
 | 
						|
            }
 | 
						|
 | 
						|
            // Change the time on the request so it expires one minute into the future. It can't expire immediately as otherwise some clients wouldn't ever see that they have been authenticated.
 | 
						|
            result.DateAdded = DateTime.UtcNow.Add(TimeSpan.FromMinutes(1));
 | 
						|
 | 
						|
            var authenticationResult = await _sessionManager.AuthenticateDirect(new AuthenticationRequest
 | 
						|
            {
 | 
						|
                UserId = userId,
 | 
						|
                DeviceId = result.DeviceId,
 | 
						|
                DeviceName = result.DeviceName,
 | 
						|
                App = result.AppName,
 | 
						|
                AppVersion = result.AppVersion
 | 
						|
            }).ConfigureAwait(false);
 | 
						|
 | 
						|
            _authorizedSecrets[result.Secret] = (DateTime.UtcNow, authenticationResult);
 | 
						|
            result.Authenticated = true;
 | 
						|
            _currentRequests[code] = result;
 | 
						|
 | 
						|
            _logger.LogDebug("Authorizing device with code {Code} to login as user {UserId}", code, userId);
 | 
						|
 | 
						|
            return true;
 | 
						|
        }
 | 
						|
 | 
						|
        /// <inheritdoc/>
 | 
						|
        public AuthenticationResult GetAuthorizedRequest(string secret)
 | 
						|
        {
 | 
						|
            AssertActive();
 | 
						|
            ExpireRequests();
 | 
						|
 | 
						|
            if (!_authorizedSecrets.TryGetValue(secret, out var result))
 | 
						|
            {
 | 
						|
                throw new ResourceNotFoundException("Unable to find request");
 | 
						|
            }
 | 
						|
 | 
						|
            return result.AuthenticationResult;
 | 
						|
        }
 | 
						|
 | 
						|
        private string GenerateSecureRandom(int length = 32)
 | 
						|
        {
 | 
						|
            Span<byte> bytes = stackalloc byte[length];
 | 
						|
            RandomNumberGenerator.Fill(bytes);
 | 
						|
 | 
						|
            return Convert.ToHexString(bytes);
 | 
						|
        }
 | 
						|
 | 
						|
        /// <summary>
 | 
						|
        /// Expire quick connect requests that are over the time limit. If <paramref name="expireAll"/> is true, all requests are unconditionally expired.
 | 
						|
        /// </summary>
 | 
						|
        /// <param name="expireAll">If true, all requests will be expired.</param>
 | 
						|
        private void ExpireRequests(bool expireAll = false)
 | 
						|
        {
 | 
						|
            // All requests before this timestamp have expired
 | 
						|
            var minTime = DateTime.UtcNow.AddMinutes(-Timeout);
 | 
						|
 | 
						|
            // Expire stale connection requests
 | 
						|
            foreach (var (_, currentRequest) in _currentRequests)
 | 
						|
            {
 | 
						|
                if (expireAll || currentRequest.DateAdded < minTime)
 | 
						|
                {
 | 
						|
                    var code = currentRequest.Code;
 | 
						|
                    _logger.LogDebug("Removing expired request {Code}", code);
 | 
						|
 | 
						|
                    if (!_currentRequests.TryRemove(code, out _))
 | 
						|
                    {
 | 
						|
                        _logger.LogWarning("Request {Code} already expired", code);
 | 
						|
                    }
 | 
						|
                }
 | 
						|
            }
 | 
						|
 | 
						|
            foreach (var (secret, (timestamp, _)) in _authorizedSecrets)
 | 
						|
            {
 | 
						|
                if (expireAll || timestamp < minTime)
 | 
						|
                {
 | 
						|
                    _logger.LogDebug("Removing expired secret {Secret}", secret);
 | 
						|
                    if (!_authorizedSecrets.TryRemove(secret, out _))
 | 
						|
                    {
 | 
						|
                        _logger.LogWarning("Secret {Secret} already expired", secret);
 | 
						|
                    }
 | 
						|
                }
 | 
						|
            }
 | 
						|
        }
 | 
						|
    }
 | 
						|
}
 |