jellyfin/Jellyfin.Server.Implementat.../Security/AuthorizationContext.cs

309 lines
11 KiB
C#
Raw Normal View History

2019-11-01 13:38:54 -04:00
#pragma warning disable CS1591
2014-11-14 21:31:03 -05:00
using System;
using System.Collections.Generic;
2017-08-30 14:52:29 -04:00
using System.Linq;
using System.Net;
2021-05-20 23:56:59 -04:00
using System.Threading.Tasks;
2018-09-12 13:26:21 -04:00
using MediaBrowser.Controller.Library;
using MediaBrowser.Controller.Net;
using Microsoft.AspNetCore.Http;
using Microsoft.Net.Http.Headers;
2021-05-20 23:56:59 -04:00
namespace Jellyfin.Server.Implementations.Security
{
public class AuthorizationContext : IAuthorizationContext
{
2021-06-18 17:06:38 -04:00
private readonly JellyfinDbProvider _jellyfinDbProvider;
2018-09-12 13:26:21 -04:00
private readonly IUserManager _userManager;
2014-11-14 21:31:03 -05:00
2021-06-18 17:06:38 -04:00
public AuthorizationContext(JellyfinDbProvider jellyfinDb, IUserManager userManager)
2014-11-14 21:31:03 -05:00
{
2021-06-18 17:06:38 -04:00
_jellyfinDbProvider = jellyfinDb;
2018-09-12 13:26:21 -04:00
_userManager = userManager;
2014-11-14 21:31:03 -05:00
}
2021-05-20 23:56:59 -04:00
public Task<AuthorizationInfo> GetAuthorizationInfo(HttpContext requestContext)
2014-11-14 21:31:03 -05:00
{
2021-05-20 23:56:59 -04:00
if (requestContext.Request.HttpContext.Items.TryGetValue("AuthorizationInfo", out var cached) && cached != null)
2014-11-14 21:31:03 -05:00
{
return Task.FromResult((AuthorizationInfo)cached!); // Cache should never contain null
2014-11-14 21:31:03 -05:00
}
return GetAuthorization(requestContext);
}
2021-05-20 23:56:59 -04:00
public async Task<AuthorizationInfo> GetAuthorizationInfo(HttpRequest requestContext)
{
var auth = GetAuthorizationDictionary(requestContext);
2021-05-20 23:56:59 -04:00
var authInfo = await GetAuthorizationInfoFromDictionary(auth, requestContext.Headers, requestContext.Query).ConfigureAwait(false);
return authInfo;
}
/// <summary>
/// Gets the authorization.
/// </summary>
/// <param name="httpReq">The HTTP req.</param>
/// <returns>Dictionary{System.StringSystem.String}.</returns>
2021-05-20 23:56:59 -04:00
private async Task<AuthorizationInfo> GetAuthorization(HttpContext httpReq)
{
var auth = GetAuthorizationDictionary(httpReq);
2021-05-20 23:56:59 -04:00
var authInfo = await GetAuthorizationInfoFromDictionary(auth, httpReq.Request.Headers, httpReq.Request.Query).ConfigureAwait(false);
2020-09-02 06:22:14 -04:00
httpReq.Request.HttpContext.Items["AuthorizationInfo"] = authInfo;
return authInfo;
}
2021-05-20 23:56:59 -04:00
private async Task<AuthorizationInfo> GetAuthorizationInfoFromDictionary(
IReadOnlyDictionary<string, string>? auth,
IHeaderDictionary headers,
IQueryCollection queryString)
{
string? deviceId = null;
2021-05-20 23:56:59 -04:00
string? deviceName = null;
string? client = null;
string? version = null;
string? token = null;
if (auth != null)
{
auth.TryGetValue("DeviceId", out deviceId);
2021-05-20 23:56:59 -04:00
auth.TryGetValue("Device", out deviceName);
auth.TryGetValue("Client", out client);
auth.TryGetValue("Version", out version);
2017-01-13 16:05:12 -05:00
auth.TryGetValue("Token", out token);
}
2021-08-28 18:32:50 -04:00
#pragma warning disable CA1508 // string.IsNullOrEmpty(token) is always false.
if (string.IsNullOrEmpty(token))
{
token = headers["X-Emby-Token"];
2017-01-13 16:05:12 -05:00
}
2018-09-12 13:26:21 -04:00
if (string.IsNullOrEmpty(token))
2015-10-04 18:04:56 -04:00
{
token = headers["X-MediaBrowser-Token"];
2015-10-04 18:04:56 -04:00
}
2018-09-12 13:26:21 -04:00
if (string.IsNullOrEmpty(token))
{
token = queryString["ApiKey"];
}
// TODO deprecate this query parameter.
if (string.IsNullOrEmpty(token))
{
token = queryString["api_key"];
}
var authInfo = new AuthorizationInfo
{
Client = client,
2021-05-20 23:56:59 -04:00
Device = deviceName,
DeviceId = deviceId,
2014-07-02 14:34:08 -04:00
Version = version,
Token = token,
IsAuthenticated = false,
HasToken = false
};
2014-11-14 21:31:03 -05:00
2020-10-14 19:58:33 -04:00
if (string.IsNullOrWhiteSpace(token))
2014-11-14 21:31:03 -05:00
{
2020-10-14 19:58:33 -04:00
// Request doesn't contain a token.
return authInfo;
2020-10-14 19:58:33 -04:00
}
2021-05-20 23:56:59 -04:00
#pragma warning restore CA1508
2014-11-14 21:31:03 -05:00
authInfo.HasToken = true;
2021-06-18 17:09:59 -04:00
await using var dbContext = _jellyfinDbProvider.CreateContext();
var device = await dbContext.Devices.FirstOrDefaultAsync(d => d.AccessToken == token).ConfigureAwait(false);
2014-11-14 21:31:03 -05:00
2021-05-20 23:56:59 -04:00
if (device != null)
{
authInfo.IsAuthenticated = true;
2020-10-14 19:58:33 -04:00
var updateToken = false;
2020-10-14 19:58:33 -04:00
// TODO: Remove these checks for IsNullOrWhiteSpace
if (string.IsNullOrWhiteSpace(authInfo.Client))
{
2021-05-20 23:56:59 -04:00
authInfo.Client = device.AppName;
2020-10-14 19:58:33 -04:00
}
2020-10-14 19:58:33 -04:00
if (string.IsNullOrWhiteSpace(authInfo.DeviceId))
{
2021-05-20 23:56:59 -04:00
authInfo.DeviceId = device.DeviceId;
2020-10-14 19:58:33 -04:00
}
2020-10-14 19:58:33 -04:00
// Temporary. TODO - allow clients to specify that the token has been shared with a casting device
2021-05-20 23:56:59 -04:00
var allowTokenInfoUpdate = !authInfo.Client.Contains("chromecast", StringComparison.OrdinalIgnoreCase);
2020-10-14 19:58:33 -04:00
if (string.IsNullOrWhiteSpace(authInfo.Device))
{
2021-05-20 23:56:59 -04:00
authInfo.Device = device.DeviceName;
2020-10-14 19:58:33 -04:00
}
2021-05-20 23:56:59 -04:00
else if (!string.Equals(authInfo.Device, device.DeviceName, StringComparison.OrdinalIgnoreCase))
2020-10-14 19:58:33 -04:00
{
if (allowTokenInfoUpdate)
{
2020-10-14 19:58:33 -04:00
updateToken = true;
2021-05-20 23:56:59 -04:00
device.DeviceName = authInfo.Device;
2018-09-12 13:26:21 -04:00
}
2020-10-14 19:58:33 -04:00
}
2018-09-12 13:26:21 -04:00
2020-10-14 19:58:33 -04:00
if (string.IsNullOrWhiteSpace(authInfo.Version))
{
2021-05-20 23:56:59 -04:00
authInfo.Version = device.AppVersion;
2020-10-14 19:58:33 -04:00
}
2021-05-20 23:56:59 -04:00
else if (!string.Equals(authInfo.Version, device.AppVersion, StringComparison.OrdinalIgnoreCase))
2020-10-14 19:58:33 -04:00
{
if (allowTokenInfoUpdate)
2018-09-12 13:26:21 -04:00
{
updateToken = true;
2021-05-20 23:56:59 -04:00
device.AppVersion = authInfo.Version;
2018-09-12 13:26:21 -04:00
}
2020-10-14 19:58:33 -04:00
}
2018-09-12 13:26:21 -04:00
2021-05-20 23:56:59 -04:00
if ((DateTime.UtcNow - device.DateLastActivity).TotalMinutes > 3)
2020-10-14 19:58:33 -04:00
{
2021-05-20 23:56:59 -04:00
device.DateLastActivity = DateTime.UtcNow;
2020-10-14 19:58:33 -04:00
updateToken = true;
}
2018-09-12 13:26:21 -04:00
2021-06-27 16:44:34 -04:00
authInfo.User = _userManager.GetUserById(device.UserId);
2020-10-14 19:58:33 -04:00
if (updateToken)
2020-10-28 10:40:11 -04:00
{
2021-06-18 17:09:59 -04:00
dbContext.Devices.Update(device);
await dbContext.SaveChangesAsync().ConfigureAwait(false);
2014-11-14 21:31:03 -05:00
}
}
2021-06-18 18:26:58 -04:00
else
{
var key = await dbContext.ApiKeys.FirstOrDefaultAsync(apiKey => apiKey.AccessToken == token).ConfigureAwait(false);
if (key != null)
2020-10-14 19:58:33 -04:00
{
2021-06-18 18:26:58 -04:00
authInfo.IsAuthenticated = true;
authInfo.Client = key.Name;
authInfo.Token = key.AccessToken;
authInfo.DeviceId = string.Empty;
authInfo.Device = string.Empty;
authInfo.Version = string.Empty;
2021-06-27 16:44:34 -04:00
authInfo.IsApiKey = true;
2014-11-14 21:31:03 -05:00
}
}
return authInfo;
}
/// <summary>
/// Gets the auth.
/// </summary>
/// <param name="httpReq">The HTTP req.</param>
/// <returns>Dictionary{System.StringSystem.String}.</returns>
private static Dictionary<string, string>? GetAuthorizationDictionary(HttpContext httpReq)
{
2020-09-02 06:22:14 -04:00
var auth = httpReq.Request.Headers["X-Emby-Authorization"];
if (string.IsNullOrEmpty(auth))
{
2020-09-02 06:22:14 -04:00
auth = httpReq.Request.Headers[HeaderNames.Authorization];
}
return auth.Count > 0 ? GetAuthorization(auth[0]) : null;
}
/// <summary>
/// Gets the auth.
/// </summary>
/// <param name="httpReq">The HTTP req.</param>
/// <returns>Dictionary{System.StringSystem.String}.</returns>
private static Dictionary<string, string>? GetAuthorizationDictionary(HttpRequest httpReq)
{
2020-06-17 08:52:15 -04:00
var auth = httpReq.Headers["X-Emby-Authorization"];
2015-07-03 07:51:45 -04:00
2018-09-12 13:26:21 -04:00
if (string.IsNullOrEmpty(auth))
2015-07-03 07:51:45 -04:00
{
auth = httpReq.Headers[HeaderNames.Authorization];
2015-07-03 07:51:45 -04:00
}
return auth.Count > 0 ? GetAuthorization(auth[0]) : null;
}
/// <summary>
/// Gets the authorization.
/// </summary>
/// <param name="authorizationHeader">The authorization header.</param>
/// <returns>Dictionary{System.StringSystem.String}.</returns>
private static Dictionary<string, string>? GetAuthorization(ReadOnlySpan<char> authorizationHeader)
{
2021-05-16 08:49:11 -04:00
var firstSpace = authorizationHeader.IndexOf(' ');
2021-05-16 08:49:11 -04:00
// There should be at least two parts
if (firstSpace == -1)
{
return null;
}
2021-05-16 08:49:11 -04:00
var name = authorizationHeader[..firstSpace];
2017-01-13 16:05:12 -05:00
2021-05-16 08:49:11 -04:00
if (!name.Equals("MediaBrowser", StringComparison.OrdinalIgnoreCase)
&& !name.Equals("Emby", StringComparison.OrdinalIgnoreCase))
{
return null;
}
2021-02-26 09:30:00 -05:00
// Remove up until the first space
authorizationHeader = authorizationHeader[(firstSpace + 1)..];
return GetParts(authorizationHeader);
2020-12-14 08:05:53 -05:00
}
2020-12-15 15:06:47 -05:00
/// <summary>
/// Get the authorization header components.
/// </summary>
/// <param name="authorizationHeader">The authorization header.</param>
/// <returns>Dictionary{System.StringSystem.String}.</returns>
public static Dictionary<string, string> GetParts(ReadOnlySpan<char> authorizationHeader)
{
2021-02-26 09:30:00 -05:00
var result = new Dictionary<string, string>();
var escaped = false;
int start = 0;
2021-02-26 09:30:00 -05:00
string key = string.Empty;
2021-06-03 11:10:19 -04:00
int i;
for (i = 0; i < authorizationHeader.Length; i++)
{
var token = authorizationHeader[i];
2021-06-03 11:10:19 -04:00
if (token == '"' || token == ',')
{
// Applying a XOR logic to evaluate whether it is opening or closing a value
escaped = (!escaped) == (token == '"');
if (token == ',' && !escaped)
{
// Meeting a comma after a closing escape char means the value is complete
if (start < i)
{
result[key] = WebUtility.UrlDecode(authorizationHeader[start..i].Trim('"').ToString());
2021-02-26 09:30:00 -05:00
key = string.Empty;
}
start = i + 1;
}
}
2021-02-26 09:30:00 -05:00
else if (!escaped && token == '=')
{
key = authorizationHeader[start.. i].Trim().ToString();
2021-02-26 09:30:00 -05:00
start = i + 1;
}
}
// Add last value
if (start < i)
{
result[key] = WebUtility.UrlDecode(authorizationHeader[start..i].Trim('"').ToString());
}
2021-02-26 09:30:00 -05:00
return result;
}
}
}