| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246 | 
							- using System;
 
- using System.Collections.Concurrent;
 
- using System.Globalization;
 
- using System.Linq;
 
- using System.Security.Cryptography;
 
- using System.Threading.Tasks;
 
- using MediaBrowser.Common.Extensions;
 
- using MediaBrowser.Controller.Authentication;
 
- using MediaBrowser.Controller.Configuration;
 
- using MediaBrowser.Controller.Net;
 
- using MediaBrowser.Controller.QuickConnect;
 
- using MediaBrowser.Controller.Session;
 
- using MediaBrowser.Model.QuickConnect;
 
- using Microsoft.Extensions.Logging;
 
- namespace Emby.Server.Implementations.QuickConnect
 
- {
 
-     /// <summary>
 
-     /// Quick connect implementation.
 
-     /// </summary>
 
-     public class QuickConnectManager : IQuickConnect
 
-     {
 
-         /// <summary>
 
-         /// The length of user facing codes.
 
-         /// </summary>
 
-         private const int CodeLength = 6;
 
-         /// <summary>
 
-         /// The time (in minutes) that the quick connect token is valid.
 
-         /// </summary>
 
-         private const int Timeout = 10;
 
-         private readonly ConcurrentDictionary<string, QuickConnectResult> _currentRequests = new();
 
-         private readonly ConcurrentDictionary<string, (DateTime Timestamp, AuthenticationResult AuthenticationResult)> _authorizedSecrets = new();
 
-         private readonly IServerConfigurationManager _config;
 
-         private readonly ILogger<QuickConnectManager> _logger;
 
-         private readonly ISessionManager _sessionManager;
 
-         /// <summary>
 
-         /// Initializes a new instance of the <see cref="QuickConnectManager"/> class.
 
-         /// Should only be called at server startup when a singleton is created.
 
-         /// </summary>
 
-         /// <param name="config">Configuration.</param>
 
-         /// <param name="logger">Logger.</param>
 
-         /// <param name="sessionManager">Session Manager.</param>
 
-         public QuickConnectManager(
 
-             IServerConfigurationManager config,
 
-             ILogger<QuickConnectManager> logger,
 
-             ISessionManager sessionManager)
 
-         {
 
-             _config = config;
 
-             _logger = logger;
 
-             _sessionManager = sessionManager;
 
-         }
 
-         /// <inheritdoc />
 
-         public bool IsEnabled => _config.Configuration.QuickConnectAvailable;
 
-         /// <summary>
 
-         /// Assert that quick connect is currently active and throws an exception if it is not.
 
-         /// </summary>
 
-         private void AssertActive()
 
-         {
 
-             if (!IsEnabled)
 
-             {
 
-                 throw new AuthenticationException("Quick connect is not active on this server");
 
-             }
 
-         }
 
-         /// <inheritdoc/>
 
-         public QuickConnectResult TryConnect(AuthorizationInfo authorizationInfo)
 
-         {
 
-             if (string.IsNullOrEmpty(authorizationInfo.DeviceId))
 
-             {
 
-                 throw new ArgumentException(nameof(authorizationInfo.DeviceId) + " is required");
 
-             }
 
-             if (string.IsNullOrEmpty(authorizationInfo.Device))
 
-             {
 
-                 throw new ArgumentException(nameof(authorizationInfo.Device) + " is required");
 
-             }
 
-             if (string.IsNullOrEmpty(authorizationInfo.Client))
 
-             {
 
-                 throw new ArgumentException(nameof(authorizationInfo.Client) + " is required");
 
-             }
 
-             if (string.IsNullOrEmpty(authorizationInfo.Version))
 
-             {
 
-                 throw new ArgumentException(nameof(authorizationInfo.Version) + "is required");
 
-             }
 
-             AssertActive();
 
-             ExpireRequests();
 
-             var secret = GenerateSecureRandom();
 
-             var code = GenerateCode();
 
-             var result = new QuickConnectResult(
 
-                 secret,
 
-                 code,
 
-                 DateTime.UtcNow,
 
-                 authorizationInfo.DeviceId,
 
-                 authorizationInfo.Device,
 
-                 authorizationInfo.Client,
 
-                 authorizationInfo.Version);
 
-             _currentRequests[code] = result;
 
-             return result;
 
-         }
 
-         /// <inheritdoc/>
 
-         public QuickConnectResult CheckRequestStatus(string secret)
 
-         {
 
-             AssertActive();
 
-             ExpireRequests();
 
-             string code = _currentRequests.Where(x => x.Value.Secret == secret).Select(x => x.Value.Code).DefaultIfEmpty(string.Empty).First();
 
-             if (!_currentRequests.TryGetValue(code, out QuickConnectResult? result))
 
-             {
 
-                 throw new ResourceNotFoundException("Unable to find request with provided secret");
 
-             }
 
-             return result;
 
-         }
 
-         /// <summary>
 
-         /// Generates a short code to display to the user to uniquely identify this request.
 
-         /// </summary>
 
-         /// <returns>A short, unique alphanumeric string.</returns>
 
-         private string GenerateCode()
 
-         {
 
-             Span<byte> raw = stackalloc byte[4];
 
-             int min = (int)Math.Pow(10, CodeLength - 1);
 
-             int max = (int)Math.Pow(10, CodeLength);
 
-             uint scale = uint.MaxValue;
 
-             while (scale == uint.MaxValue)
 
-             {
 
-                 RandomNumberGenerator.Fill(raw);
 
-                 scale = BitConverter.ToUInt32(raw);
 
-             }
 
-             int code = (int)(min + ((max - min) * (scale / (double)uint.MaxValue)));
 
-             return code.ToString(CultureInfo.InvariantCulture);
 
-         }
 
-         /// <inheritdoc/>
 
-         public async Task<bool> AuthorizeRequest(Guid userId, string code)
 
-         {
 
-             AssertActive();
 
-             ExpireRequests();
 
-             if (!_currentRequests.TryGetValue(code, out QuickConnectResult? result))
 
-             {
 
-                 throw new ResourceNotFoundException("Unable to find request");
 
-             }
 
-             if (result.Authenticated)
 
-             {
 
-                 throw new InvalidOperationException("Request is already authorized");
 
-             }
 
-             // Change the time on the request so it expires one minute into the future. It can't expire immediately as otherwise some clients wouldn't ever see that they have been authenticated.
 
-             result.DateAdded = DateTime.UtcNow.Add(TimeSpan.FromMinutes(1));
 
-             var authenticationResult = await _sessionManager.AuthenticateDirect(new AuthenticationRequest
 
-             {
 
-                 UserId = userId,
 
-                 DeviceId = result.DeviceId,
 
-                 DeviceName = result.DeviceName,
 
-                 App = result.AppName,
 
-                 AppVersion = result.AppVersion
 
-             }).ConfigureAwait(false);
 
-             _authorizedSecrets[result.Secret] = (DateTime.UtcNow, authenticationResult);
 
-             result.Authenticated = true;
 
-             _currentRequests[code] = result;
 
-             _logger.LogDebug("Authorizing device with code {Code} to login as user {UserId}", code, userId);
 
-             return true;
 
-         }
 
-         /// <inheritdoc/>
 
-         public AuthenticationResult GetAuthorizedRequest(string secret)
 
-         {
 
-             AssertActive();
 
-             ExpireRequests();
 
-             if (!_authorizedSecrets.TryGetValue(secret, out var result))
 
-             {
 
-                 throw new ResourceNotFoundException("Unable to find request");
 
-             }
 
-             return result.AuthenticationResult;
 
-         }
 
-         private string GenerateSecureRandom(int length = 32)
 
-         {
 
-             Span<byte> bytes = stackalloc byte[length];
 
-             RandomNumberGenerator.Fill(bytes);
 
-             return Convert.ToHexString(bytes);
 
-         }
 
-         /// <summary>
 
-         /// Expire quick connect requests that are over the time limit. If <paramref name="expireAll"/> is true, all requests are unconditionally expired.
 
-         /// </summary>
 
-         /// <param name="expireAll">If true, all requests will be expired.</param>
 
-         private void ExpireRequests(bool expireAll = false)
 
-         {
 
-             // All requests before this timestamp have expired
 
-             var minTime = DateTime.UtcNow.AddMinutes(-Timeout);
 
-             // Expire stale connection requests
 
-             foreach (var (_, currentRequest) in _currentRequests)
 
-             {
 
-                 if (expireAll || currentRequest.DateAdded < minTime)
 
-                 {
 
-                     var code = currentRequest.Code;
 
-                     _logger.LogDebug("Removing expired request {Code}", code);
 
-                     if (!_currentRequests.TryRemove(code, out _))
 
-                     {
 
-                         _logger.LogWarning("Request {Code} already expired", code);
 
-                     }
 
-                 }
 
-             }
 
-             foreach (var (secret, (timestamp, _)) in _authorizedSecrets)
 
-             {
 
-                 if (expireAll || timestamp < minTime)
 
-                 {
 
-                     _logger.LogDebug("Removing expired secret {Secret}", secret);
 
-                     if (!_authorizedSecrets.TryRemove(secret, out _))
 
-                     {
 
-                         _logger.LogWarning("Secret {Secret} already expired", secret);
 
-                     }
 
-                 }
 
-             }
 
-         }
 
-     }
 
- }
 
 
  |