Launcher/LaunchServer/src/main/java/pro/gravit/launchserver/manangers/AuthManager.java

440 lines
19 KiB
Java
Raw Normal View History

2021-05-16 16:07:44 +03:00
package pro.gravit.launchserver.manangers;
import org.apache.logging.log4j.LogManager;
import org.apache.logging.log4j.Logger;
import pro.gravit.launcher.ClientPermissions;
import pro.gravit.launcher.events.request.AuthRequestEvent;
2021-05-28 15:13:16 +03:00
import pro.gravit.launcher.profiles.ClientProfile;
import pro.gravit.launcher.profiles.PlayerProfile;
import pro.gravit.launcher.profiles.Texture;
2021-05-16 16:07:44 +03:00
import pro.gravit.launcher.request.auth.AuthRequest;
import pro.gravit.launcher.request.auth.password.*;
import pro.gravit.launchserver.LaunchServer;
import pro.gravit.launchserver.auth.AuthException;
import pro.gravit.launchserver.auth.AuthProviderPair;
import pro.gravit.launchserver.auth.core.AuthCoreProvider;
2021-05-28 15:13:16 +03:00
import pro.gravit.launchserver.auth.core.AuthSocialProvider;
2021-05-16 16:07:44 +03:00
import pro.gravit.launchserver.auth.core.User;
import pro.gravit.launchserver.auth.core.UserSession;
2021-05-28 15:13:16 +03:00
import pro.gravit.launchserver.auth.core.interfaces.user.UserSupportTextures;
2021-05-16 16:07:44 +03:00
import pro.gravit.launchserver.auth.provider.AuthProvider;
import pro.gravit.launchserver.auth.provider.AuthProviderDAOResult;
import pro.gravit.launchserver.auth.provider.AuthProviderResult;
2021-05-28 15:13:16 +03:00
import pro.gravit.launchserver.auth.texture.TextureProvider;
2021-05-16 16:07:44 +03:00
import pro.gravit.launchserver.socket.Client;
import pro.gravit.launchserver.socket.response.auth.AuthResponse;
import pro.gravit.utils.helper.IOHelper;
import pro.gravit.utils.helper.SecurityHelper;
import javax.crypto.Cipher;
import java.io.IOException;
import java.util.ArrayList;
import java.util.List;
import java.util.Objects;
import java.util.UUID;
import java.util.stream.Collectors;
public class AuthManager {
private transient final LaunchServer server;
private transient final Logger logger = LogManager.getLogger();
public AuthManager(LaunchServer server) {
this.server = server;
}
/**
* Create AuthContext
2021-05-25 12:17:29 +03:00
*
2021-05-16 16:07:44 +03:00
* @return AuthContext instance
*/
public AuthResponse.AuthContext makeAuthContext(Client client, AuthResponse.ConnectTypes authType, AuthProviderPair pair, String login, String profileName, String ip) {
Objects.requireNonNull(client, "Client must be not null");
Objects.requireNonNull(authType, "authType must be not null");
Objects.requireNonNull(pair, "AuthProviderPair must be not null");
return new AuthResponse.AuthContext(client, login, profileName, ip, authType, pair);
}
/**
* Validate auth params ans state
2021-05-25 12:17:29 +03:00
*
2021-05-16 16:07:44 +03:00
* @param context Auth context
* @throws AuthException auth not possible
*/
public void check(AuthResponse.AuthContext context) throws AuthException {
if (context.authType == AuthResponse.ConnectTypes.CLIENT && !context.client.checkSign) {
AuthProvider.authError("Don't skip Launcher Update");
return;
}
if (context.client.isAuth) {
AuthProvider.authError("You are already logged in");
return;
}
}
/**
* Full client authorization with password verification
2021-05-25 12:17:29 +03:00
*
* @param context AuthContext
2021-05-16 16:07:44 +03:00
* @param password User password
* @return Access token
*/
public AuthReport auth(AuthResponse.AuthContext context, AuthRequest.AuthPasswordInterface password) throws AuthException {
2021-05-16 16:07:44 +03:00
AuthProviderPair pair = context.pair;
AuthReport report;
2021-05-25 12:17:29 +03:00
if (pair.core == null) {
2021-05-16 16:07:44 +03:00
try {
report = AuthReport.ofMinecraftAccessToken(authWithProviderAndHandler(context, password));
2021-05-16 16:07:44 +03:00
} catch (Exception e) {
2021-05-25 12:17:29 +03:00
if (e instanceof AuthException) throw (AuthException) e;
2021-05-16 16:07:44 +03:00
throw new AuthException("Internal Auth Error. Please contact administrator");
}
} else {
report = authWithCore(context, password);
2021-05-16 16:07:44 +03:00
}
return report;
2021-05-16 16:07:44 +03:00
}
@SuppressWarnings("deprecation")
private String authWithProviderAndHandler(AuthResponse.AuthContext context, AuthRequest.AuthPasswordInterface password) throws Exception {
String accessToken;
context.pair.provider.preAuth(context.login, password, context.ip);
AuthProviderResult aresult = context.pair.provider.auth(context.login, password, context.ip);
UUID uuid;
String username = aresult.username != null ? aresult.username : context.login;
if (aresult instanceof AuthProviderDAOResult) {
context.client.daoObject = ((AuthProviderDAOResult) aresult).daoObject;
}
2021-05-25 12:17:29 +03:00
if (context.authType == AuthResponse.ConnectTypes.CLIENT && server.config.protectHandler.allowGetAccessToken(context)) {
2021-05-16 16:07:44 +03:00
uuid = context.pair.handler.auth(aresult);
accessToken = aresult.accessToken;
} else {
uuid = context.pair.handler.usernameToUUID(aresult.username);
accessToken = null;
}
internalAuth(context.client, context.authType, context.pair, username, uuid, aresult.permissions, false);
2021-05-16 16:07:44 +03:00
return accessToken;
}
private AuthReport authWithCore(AuthResponse.AuthContext context, AuthRequest.AuthPasswordInterface password) throws AuthException {
2021-05-16 16:07:44 +03:00
AuthCoreProvider provider = context.pair.core;
provider.verifyAuth(context);
2021-05-25 12:17:29 +03:00
if (password instanceof AuthOAuthPassword) {
AuthOAuthPassword password1 = (AuthOAuthPassword) password;
UserSession session;
try {
session = provider.getUserSessionByOAuthAccessToken(password1.accessToken);
} catch (AuthCoreProvider.OAuthAccessTokenExpired oAuthAccessTokenExpired) {
throw new AuthException(AuthRequestEvent.OAUTH_TOKEN_EXPIRE);
}
2021-05-25 12:17:29 +03:00
if (session == null) {
throw new AuthException(AuthRequestEvent.OAUTH_TOKEN_INVALID);
}
User user = session.getUser();
context.client.coreObject = user;
context.client.sessionObject = session;
internalAuth(context.client, context.authType, context.pair, user.getUsername(), user.getUUID(), user.getPermissions(), true);
2021-05-25 12:17:29 +03:00
if (context.authType == AuthResponse.ConnectTypes.CLIENT && server.config.protectHandler.allowGetAccessToken(context)) {
return AuthReport.ofMinecraftAccessToken(user.getAccessToken());
}
return AuthReport.ofMinecraftAccessToken(null);
}
2021-05-25 17:44:25 +03:00
User user = null;
2021-05-28 15:13:16 +03:00
boolean skipPasswordCheck = false;
String login = context.login;
if (context.pair.social != null) {
AuthSocialProvider.SocialResult result = context.pair.social.preAuth(context, password);
if (result != null) {
if (result.user != null) user = result.user;
if (result.login != null) login = result.login;
if (result.password != null) password = result.password;
if (result.user != null && result.password == null) skipPasswordCheck = true;
}
}
if (user == null && login != null) {
2021-05-25 17:44:25 +03:00
user = provider.getUserByLogin(context.login);
if (user == null) {
throw new AuthException(AuthRequestEvent.USER_NOT_FOUND_ERROR_MESSAGE);
}
2021-05-16 16:07:44 +03:00
}
2021-05-28 15:13:16 +03:00
AuthCoreProvider.PasswordVerifyReport report = null;
if (!skipPasswordCheck) {
report = provider.verifyPassword(user, password);
}
if (skipPasswordCheck || report.success) {
AuthReport result;
try {
result = provider.createOAuthSession(user, context, report, context.authType == AuthResponse.ConnectTypes.CLIENT && server.config.protectHandler.allowGetAccessToken(context));
} catch (IOException e) {
2021-05-25 17:44:25 +03:00
if (e instanceof AuthException) throw (AuthException) e;
logger.error(e);
throw new AuthException("Internal Auth Error");
2021-05-16 16:07:44 +03:00
}
2021-05-25 17:44:25 +03:00
if (user == null) {
if (result.session != null) {
user = result.session.getUser();
} else {
logger.error("AuthCoreProvider {} method createOAuthSession returns null session with login null", context.pair.name);
throw new AuthException("Internal Auth Error");
}
}
2021-05-16 16:07:44 +03:00
context.client.coreObject = user;
2021-05-25 17:44:25 +03:00
internalAuth(context.client, context.authType, context.pair, user.getUsername(), user.getUUID(), user.getPermissions(), result.isUsingOAuth());
return result;
2021-05-25 12:17:29 +03:00
} else {
if (report.needMoreFactor) {
if (report.factors.size() == 1 && report.factors.get(0) == -1) {
2021-05-16 16:07:44 +03:00
throw new AuthException(AuthRequestEvent.TWO_FACTOR_NEED_ERROR_MESSAGE);
}
String message = AuthRequestEvent.ONE_FACTOR_NEED_ERROR_MESSAGE_PREFIX
.concat(report.factors.stream().map(String::valueOf).collect(Collectors.joining(".")));
throw new AuthException(message);
}
throw new AuthException(AuthRequestEvent.WRONG_PASSWORD_ERROR_MESSAGE);
}
}
/**
* Writing authorization information to the Client object
*/
public void internalAuth(Client client, AuthResponse.ConnectTypes authType, AuthProviderPair pair, String username, UUID uuid, ClientPermissions permissions, boolean oauth) {
2021-05-16 16:07:44 +03:00
client.isAuth = true;
client.permissions = permissions;
client.auth_id = pair.name;
client.auth = pair;
client.username = username;
client.type = authType;
client.uuid = uuid;
client.useOAuth = oauth;
2021-05-25 12:17:29 +03:00
if (pair.isUseCore() && client.coreObject == null) {
2021-05-16 16:07:44 +03:00
client.coreObject = pair.core.getUserByUUID(uuid);
}
}
2021-05-31 04:25:33 +03:00
public static class CheckServerReport {
public UUID uuid;
public User user;
public PlayerProfile playerProfile;
public CheckServerReport(UUID uuid, User user, PlayerProfile playerProfile) {
this.uuid = uuid;
this.user = user;
this.playerProfile = playerProfile;
}
public static CheckServerReport ofUser(User user, PlayerProfile playerProfile) {
return new CheckServerReport(user.getUUID(), user, playerProfile);
}
public static CheckServerReport ofUUID(UUID uuid, PlayerProfile playerProfile) {
return new CheckServerReport(uuid, null, playerProfile);
}
}
public CheckServerReport checkServer(Client client, String username, String serverID) throws IOException {
2021-05-25 12:17:29 +03:00
if (client.auth == null) return null;
if (client.auth.isUseCore()) {
2021-05-31 04:25:33 +03:00
User user = client.auth.core.checkServer(client, username, serverID);
if (user == null) return null;
else return CheckServerReport.ofUser(user, getPlayerProfile(client.auth, user));
2021-05-25 12:17:29 +03:00
} else {
2021-05-31 04:25:33 +03:00
UUID uuid = client.auth.handler.checkServer(username, serverID);
return uuid == null ? null : CheckServerReport.ofUUID(uuid, getPlayerProfile(client.auth, uuid));
2021-05-16 16:07:44 +03:00
}
}
public boolean joinServer(Client client, String username, String accessToken, String serverID) throws IOException {
2021-05-25 12:17:29 +03:00
if (client.auth == null) return false;
if (client.auth.isUseCore()) {
2021-05-16 16:07:44 +03:00
return client.auth.core.joinServer(client, username, accessToken, serverID);
} else {
return client.auth.handler.joinServer(username, accessToken, serverID);
}
}
2021-05-28 15:13:16 +03:00
public PlayerProfile getPlayerProfile(Client client) {
if (client.auth == null) return null;
PlayerProfile playerProfile;
if (client.useOAuth) {
User user = client.getUser();
playerProfile = getPlayerProfile(client.auth, user);
2021-05-28 15:13:16 +03:00
if (playerProfile != null) return playerProfile;
}
if (client.auth.textureProvider != null) {
return getPlayerProfile(client.uuid, client.username, client.profile == null ? null : client.profile.getTitle(), client.auth.textureProvider);
}
// Return combined profile
return new PlayerProfile(client.uuid, client.username, null, null);
}
public PlayerProfile getPlayerProfile(AuthProviderPair pair, String username) {
return getPlayerProfile(pair, username, null);
}
public PlayerProfile getPlayerProfile(AuthProviderPair pair, String username, ClientProfile profile) {
UUID uuid = null;
if (pair.isUseCore()) {
User user = pair.core.getUserByUsername(username);
PlayerProfile playerProfile = getPlayerProfile(pair, user);
2021-05-28 15:13:16 +03:00
uuid = user.getUUID();
if (playerProfile != null) return playerProfile;
} else {
try {
uuid = pair.handler.usernameToUUID(username);
} catch (IOException e) {
logger.error("UsernameToUUID failed", e);
}
}
if (uuid == null) {
return null;
}
if (pair.textureProvider != null) {
return getPlayerProfile(uuid, username, profile == null ? null : profile.getTitle(), pair.textureProvider);
}
return new PlayerProfile(uuid, username, null, null);
}
public PlayerProfile getPlayerProfile(AuthProviderPair pair, UUID uuid) {
return getPlayerProfile(pair, uuid, null);
}
public PlayerProfile getPlayerProfile(AuthProviderPair pair, UUID uuid, ClientProfile profile) {
String username = null;
if (pair.isUseCore()) {
User user = pair.core.getUserByUUID(uuid);
PlayerProfile playerProfile = getPlayerProfile(pair, user);
2021-05-28 15:13:16 +03:00
username = user.getUsername();
if (playerProfile != null) return playerProfile;
} else {
try {
username = pair.handler.uuidToUsername(uuid);
} catch (IOException e) {
logger.error("UUIDToUsername failed", e);
}
}
if (username == null) {
return null;
}
if (pair.textureProvider != null) {
return getPlayerProfile(uuid, username, profile == null ? null : profile.getTitle(), pair.textureProvider);
}
return new PlayerProfile(uuid, username, null, null);
}
public PlayerProfile getPlayerProfile(AuthProviderPair pair, User user) {
2021-05-28 15:13:16 +03:00
if (user instanceof UserSupportTextures) {
return new PlayerProfile(user.getUUID(), user.getUsername(), ((UserSupportTextures) user).getSkinTexture(), ((UserSupportTextures) user).getCloakTexture());
}
return getPlayerProfile(user.getUUID(), user.getUsername(), "", pair.textureProvider);
2021-05-28 15:13:16 +03:00
}
private PlayerProfile getPlayerProfile(UUID uuid, String username, String client, TextureProvider textureProvider) {
// Get skin texture
Texture skin;
try {
skin = textureProvider.getSkinTexture(uuid, username, client);
} catch (IOException e) {
skin = null;
}
// Get cloak texture
Texture cloak;
try {
cloak = textureProvider.getCloakTexture(uuid, username, client);
} catch (IOException e) {
cloak = null;
}
// Return combined profile
return new PlayerProfile(uuid, username, skin, cloak);
}
2021-05-16 16:07:44 +03:00
public AuthRequest.AuthPasswordInterface decryptPassword(AuthRequest.AuthPasswordInterface password) throws AuthException {
2021-05-25 12:17:29 +03:00
if (password instanceof Auth2FAPassword) {
2021-05-16 16:07:44 +03:00
Auth2FAPassword auth2FAPassword = (Auth2FAPassword) password;
auth2FAPassword.firstPassword = tryDecryptPasswordPlain(auth2FAPassword.firstPassword);
auth2FAPassword.secondPassword = tryDecryptPasswordPlain(auth2FAPassword.secondPassword);
2021-05-25 12:17:29 +03:00
} else if (password instanceof AuthMultiPassword) {
2021-05-16 16:07:44 +03:00
AuthMultiPassword multiPassword = (AuthMultiPassword) password;
List<AuthRequest.AuthPasswordInterface> list = new ArrayList<>(multiPassword.list.size());
2021-05-25 12:17:29 +03:00
for (AuthRequest.AuthPasswordInterface p : multiPassword.list) {
2021-05-16 16:07:44 +03:00
list.add(tryDecryptPasswordPlain(p));
}
multiPassword.list = list;
2021-05-25 12:17:29 +03:00
} else {
2021-05-16 16:07:44 +03:00
password = tryDecryptPasswordPlain(password);
}
return password;
}
@SuppressWarnings("deprecation")
private AuthRequest.AuthPasswordInterface tryDecryptPasswordPlain(AuthRequest.AuthPasswordInterface password) throws AuthException {
if (password instanceof AuthECPassword) {
try {
return new AuthPlainPassword(IOHelper.decode(SecurityHelper.decrypt(server.runtime.passwordEncryptKey
, ((AuthECPassword) password).password)));
} catch (Exception ignored) {
throw new AuthException("Password decryption error");
}
}
if (password instanceof AuthAESPassword) {
try {
return new AuthPlainPassword(IOHelper.decode(SecurityHelper.decrypt(server.runtime.passwordEncryptKey
, ((AuthAESPassword) password).password)));
} catch (Exception ignored) {
throw new AuthException("Password decryption error");
}
}
2021-05-25 12:17:29 +03:00
if (password instanceof AuthRSAPassword) {
2021-05-16 16:07:44 +03:00
try {
Cipher cipher = SecurityHelper.newRSADecryptCipher(server.keyAgreementManager.rsaPrivateKey);
return new AuthPlainPassword(
IOHelper.decode(cipher.doFinal(((AuthRSAPassword) password).password))
);
} catch (Exception ignored) {
throw new AuthException("Password decryption error");
}
}
return password;
}
2021-05-25 12:17:29 +03:00
public static class AuthReport {
public final String minecraftAccessToken;
public final String oauthAccessToken;
public final String oauthRefreshToken;
public final long oauthExpire;
2021-05-25 13:38:20 +03:00
public final UserSession session;
2021-05-25 12:17:29 +03:00
2021-05-25 13:38:20 +03:00
public AuthReport(String minecraftAccessToken, String oauthAccessToken, String oauthRefreshToken, long oauthExpire, UserSession session) {
2021-05-25 12:17:29 +03:00
this.minecraftAccessToken = minecraftAccessToken;
this.oauthAccessToken = oauthAccessToken;
this.oauthRefreshToken = oauthRefreshToken;
this.oauthExpire = oauthExpire;
2021-05-25 13:38:20 +03:00
this.session = session;
2021-05-25 12:17:29 +03:00
}
public static AuthReport ofOAuth(String oauthAccessToken, String oauthRefreshToken, long oauthExpire) {
2021-05-25 13:38:20 +03:00
return new AuthReport(null, oauthAccessToken, oauthRefreshToken, oauthExpire, null);
}
public static AuthReport ofOAuth(String oauthAccessToken, String oauthRefreshToken, long oauthExpire, UserSession session) {
return new AuthReport(null, oauthAccessToken, oauthRefreshToken, oauthExpire, session);
2021-05-25 12:17:29 +03:00
}
public static AuthReport ofOAuthWithMinecraft(String minecraftAccessToken, String oauthAccessToken, String oauthRefreshToken, long oauthExpire) {
2021-05-25 13:38:20 +03:00
return new AuthReport(minecraftAccessToken, oauthAccessToken, oauthRefreshToken, oauthExpire, null);
}
public static AuthReport ofOAuthWithMinecraft(String minecraftAccessToken, String oauthAccessToken, String oauthRefreshToken, long oauthExpire, UserSession session) {
return new AuthReport(minecraftAccessToken, oauthAccessToken, oauthRefreshToken, oauthExpire, session);
2021-05-25 12:17:29 +03:00
}
public static AuthReport ofMinecraftAccessToken(String minecraftAccessToken) {
2021-05-25 13:38:20 +03:00
return new AuthReport(minecraftAccessToken, null, null, 0, null);
2021-05-25 12:17:29 +03:00
}
public boolean isUsingOAuth() {
return oauthAccessToken != null || oauthRefreshToken != null;
}
}
2021-05-16 16:07:44 +03:00
}