diff options
Diffstat (limited to 'OpenSim/Services/HypergridService')
-rw-r--r-- | OpenSim/Services/HypergridService/GatekeeperService.cs | 322 | ||||
-rw-r--r-- | OpenSim/Services/HypergridService/UserAgentService.cs | 250 |
2 files changed, 572 insertions, 0 deletions
diff --git a/OpenSim/Services/HypergridService/GatekeeperService.cs b/OpenSim/Services/HypergridService/GatekeeperService.cs new file mode 100644 index 0000000..c5cfe75 --- /dev/null +++ b/OpenSim/Services/HypergridService/GatekeeperService.cs | |||
@@ -0,0 +1,322 @@ | |||
1 | /* | ||
2 | * Copyright (c) Contributors, http://opensimulator.org/ | ||
3 | * See CONTRIBUTORS.TXT for a full list of copyright holders. | ||
4 | * | ||
5 | * Redistribution and use in source and binary forms, with or without | ||
6 | * modification, are permitted provided that the following conditions are met: | ||
7 | * * Redistributions of source code must retain the above copyright | ||
8 | * notice, this list of conditions and the following disclaimer. | ||
9 | * * Redistributions in binary form must reproduce the above copyright | ||
10 | * notice, this list of conditions and the following disclaimer in the | ||
11 | * documentation and/or other materials provided with the distribution. | ||
12 | * * Neither the name of the OpenSimulator Project nor the | ||
13 | * names of its contributors may be used to endorse or promote products | ||
14 | * derived from this software without specific prior written permission. | ||
15 | * | ||
16 | * THIS SOFTWARE IS PROVIDED BY THE DEVELOPERS ``AS IS'' AND ANY | ||
17 | * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED | ||
18 | * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE | ||
19 | * DISCLAIMED. IN NO EVENT SHALL THE CONTRIBUTORS BE LIABLE FOR ANY | ||
20 | * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES | ||
21 | * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
22 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND | ||
23 | * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | ||
24 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS | ||
25 | * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | ||
26 | */ | ||
27 | |||
28 | using System; | ||
29 | using System.Collections.Generic; | ||
30 | using System.Net; | ||
31 | using System.Reflection; | ||
32 | |||
33 | using OpenSim.Framework; | ||
34 | using OpenSim.Services.Interfaces; | ||
35 | using GridRegion = OpenSim.Services.Interfaces.GridRegion; | ||
36 | using OpenSim.Server.Base; | ||
37 | using OpenSim.Services.Connectors.Hypergrid; | ||
38 | |||
39 | using OpenMetaverse; | ||
40 | |||
41 | using Nini.Config; | ||
42 | using log4net; | ||
43 | |||
44 | namespace OpenSim.Services.HypergridService | ||
45 | { | ||
46 | public class GatekeeperService : IGatekeeperService | ||
47 | { | ||
48 | private static readonly ILog m_log = | ||
49 | LogManager.GetLogger( | ||
50 | MethodBase.GetCurrentMethod().DeclaringType); | ||
51 | |||
52 | IGridService m_GridService; | ||
53 | IPresenceService m_PresenceService; | ||
54 | IUserAccountService m_UserAccountService; | ||
55 | IUserAgentService m_UserAgentService; | ||
56 | ISimulationService m_SimulationService; | ||
57 | |||
58 | string m_AuthDll; | ||
59 | |||
60 | UUID m_ScopeID; | ||
61 | bool m_AllowTeleportsToAnyRegion; | ||
62 | string m_ExternalName; | ||
63 | GridRegion m_DefaultGatewayRegion; | ||
64 | |||
65 | public GatekeeperService(IConfigSource config, ISimulationService simService) | ||
66 | { | ||
67 | IConfig serverConfig = config.Configs["GatekeeperService"]; | ||
68 | if (serverConfig == null) | ||
69 | throw new Exception(String.Format("No section GatekeeperService in config file")); | ||
70 | |||
71 | string accountService = serverConfig.GetString("UserAccountService", String.Empty); | ||
72 | string homeUsersService = serverConfig.GetString("HomeUsersSecurityService", string.Empty); | ||
73 | string gridService = serverConfig.GetString("GridService", String.Empty); | ||
74 | string presenceService = serverConfig.GetString("PresenceService", String.Empty); | ||
75 | string simulationService = serverConfig.GetString("SimulationService", String.Empty); | ||
76 | |||
77 | //m_AuthDll = serverConfig.GetString("AuthenticationService", String.Empty); | ||
78 | |||
79 | // These 3 are mandatory, the others aren't | ||
80 | if (gridService == string.Empty || presenceService == string.Empty || m_AuthDll == string.Empty) | ||
81 | throw new Exception("Incomplete specifications, Gatekeeper Service cannot function."); | ||
82 | |||
83 | string scope = serverConfig.GetString("ScopeID", UUID.Zero.ToString()); | ||
84 | UUID.TryParse(scope, out m_ScopeID); | ||
85 | //m_WelcomeMessage = serverConfig.GetString("WelcomeMessage", "Welcome to OpenSim!"); | ||
86 | m_AllowTeleportsToAnyRegion = serverConfig.GetBoolean("AllowTeleportsToAnyRegion", true); | ||
87 | m_ExternalName = serverConfig.GetString("ExternalName", string.Empty); | ||
88 | |||
89 | Object[] args = new Object[] { config }; | ||
90 | m_GridService = ServerUtils.LoadPlugin<IGridService>(gridService, args); | ||
91 | m_PresenceService = ServerUtils.LoadPlugin<IPresenceService>(presenceService, args); | ||
92 | |||
93 | if (accountService != string.Empty) | ||
94 | m_UserAccountService = ServerUtils.LoadPlugin<IUserAccountService>(accountService, args); | ||
95 | if (homeUsersService != string.Empty) | ||
96 | m_UserAgentService = ServerUtils.LoadPlugin<IUserAgentService>(homeUsersService, args); | ||
97 | |||
98 | if (simService != null) | ||
99 | m_SimulationService = simService; | ||
100 | else if (simulationService != string.Empty) | ||
101 | m_SimulationService = ServerUtils.LoadPlugin<ISimulationService>(simulationService, args); | ||
102 | |||
103 | if (m_GridService == null || m_PresenceService == null || m_SimulationService == null) | ||
104 | throw new Exception("Unable to load a required plugin, Gatekeeper Service cannot function."); | ||
105 | |||
106 | m_log.Debug("[GATEKEEPER SERVICE]: Starting..."); | ||
107 | } | ||
108 | |||
109 | public GatekeeperService(IConfigSource config) | ||
110 | : this(config, null) | ||
111 | { | ||
112 | } | ||
113 | |||
114 | public bool LinkRegion(string regionName, out UUID regionID, out ulong regionHandle, out string externalName, out string imageURL, out string reason) | ||
115 | { | ||
116 | regionID = UUID.Zero; | ||
117 | regionHandle = 0; | ||
118 | externalName = m_ExternalName; | ||
119 | imageURL = string.Empty; | ||
120 | reason = string.Empty; | ||
121 | |||
122 | |||
123 | m_log.DebugFormat("[GATEKEEPER SERVICE]: Request to link to {0}", (regionName == string.Empty)? "default region" : regionName); | ||
124 | if (!m_AllowTeleportsToAnyRegion || regionName == string.Empty) | ||
125 | { | ||
126 | List<GridRegion> defs = m_GridService.GetDefaultRegions(m_ScopeID); | ||
127 | if (defs != null && defs.Count > 0) | ||
128 | m_DefaultGatewayRegion = defs[0]; | ||
129 | |||
130 | try | ||
131 | { | ||
132 | regionID = m_DefaultGatewayRegion.RegionID; | ||
133 | regionHandle = m_DefaultGatewayRegion.RegionHandle; | ||
134 | } | ||
135 | catch | ||
136 | { | ||
137 | reason = "Grid setup problem. Try specifying a particular region here."; | ||
138 | m_log.DebugFormat("[GATEKEEPER SERVICE]: Unable to send information. Please specify a default region for this grid!"); | ||
139 | return false; | ||
140 | } | ||
141 | |||
142 | return true; | ||
143 | } | ||
144 | |||
145 | GridRegion region = m_GridService.GetRegionByName(m_ScopeID, regionName); | ||
146 | if (region == null) | ||
147 | { | ||
148 | reason = "Region not found"; | ||
149 | return false; | ||
150 | } | ||
151 | |||
152 | regionID = region.RegionID; | ||
153 | regionHandle = region.RegionHandle; | ||
154 | string regionimage = "regionImage" + region.RegionID.ToString(); | ||
155 | regionimage = regionimage.Replace("-", ""); | ||
156 | |||
157 | imageURL = "http://" + region.ExternalHostName + ":" + region.HttpPort + "/index.php?method=" + regionimage; | ||
158 | |||
159 | return true; | ||
160 | } | ||
161 | |||
162 | public GridRegion GetHyperlinkRegion(UUID regionID) | ||
163 | { | ||
164 | m_log.DebugFormat("[GATEKEEPER SERVICE]: Request to get hyperlink region {0}", regionID); | ||
165 | |||
166 | if (!m_AllowTeleportsToAnyRegion) | ||
167 | // Don't even check the given regionID | ||
168 | return m_DefaultGatewayRegion; | ||
169 | |||
170 | GridRegion region = m_GridService.GetRegionByUUID(m_ScopeID, regionID); | ||
171 | return region; | ||
172 | } | ||
173 | |||
174 | #region Login Agent | ||
175 | public bool LoginAgent(AgentCircuitData aCircuit, GridRegion destination, out string reason) | ||
176 | { | ||
177 | reason = string.Empty; | ||
178 | |||
179 | string authURL = string.Empty; | ||
180 | if (aCircuit.ServiceURLs.ContainsKey("HomeURI")) | ||
181 | authURL = aCircuit.ServiceURLs["HomeURI"].ToString(); | ||
182 | m_log.DebugFormat("[GATEKEEPER SERVICE]: Request to login foreign agent {0} {1} @ {2} ({3}) at destination {4}", | ||
183 | aCircuit.firstname, aCircuit.lastname, authURL, aCircuit.AgentID, destination.RegionName); | ||
184 | |||
185 | // | ||
186 | // Authenticate the user | ||
187 | // | ||
188 | if (!Authenticate(aCircuit)) | ||
189 | { | ||
190 | reason = "Unable to verify identity"; | ||
191 | m_log.InfoFormat("[GATEKEEPER SERVICE]: Unable to verify identity of agent {0} {1}. Refusing service.", aCircuit.firstname, aCircuit.lastname); | ||
192 | return false; | ||
193 | } | ||
194 | m_log.DebugFormat("[GATEKEEPER SERVICE]: Identity verified for {0} {1} @ {2}", aCircuit.firstname, aCircuit.lastname, authURL); | ||
195 | |||
196 | // | ||
197 | // Check for impersonations | ||
198 | // | ||
199 | UserAccount account = null; | ||
200 | if (m_UserAccountService != null) | ||
201 | { | ||
202 | // Check to see if we have a local user with that UUID | ||
203 | account = m_UserAccountService.GetUserAccount(m_ScopeID, aCircuit.AgentID); | ||
204 | if (account != null) | ||
205 | { | ||
206 | // Make sure this is the user coming home, and not a foreign user with same UUID as a local user | ||
207 | if (m_UserAgentService != null) | ||
208 | { | ||
209 | if (!m_UserAgentService.AgentIsComingHome(aCircuit.SessionID, m_ExternalName)) | ||
210 | { | ||
211 | // Can't do, sorry | ||
212 | reason = "Unauthorized"; | ||
213 | m_log.InfoFormat("[GATEKEEPER SERVICE]: Foreign agent {0} {1} has same ID as local user. Refusing service.", | ||
214 | aCircuit.firstname, aCircuit.lastname); | ||
215 | return false; | ||
216 | |||
217 | } | ||
218 | } | ||
219 | } | ||
220 | } | ||
221 | m_log.DebugFormat("[GATEKEEPER SERVICE]: User is ok"); | ||
222 | |||
223 | // May want to authorize | ||
224 | |||
225 | // | ||
226 | // Login the presence | ||
227 | // | ||
228 | if (!m_PresenceService.LoginAgent(aCircuit.AgentID.ToString(), aCircuit.SessionID, aCircuit.SecureSessionID)) | ||
229 | { | ||
230 | reason = "Unable to login presence"; | ||
231 | m_log.InfoFormat("[GATEKEEPER SERVICE]: Presence login failed for foreign agent {0} {1}. Refusing service.", | ||
232 | aCircuit.firstname, aCircuit.lastname); | ||
233 | return false; | ||
234 | } | ||
235 | m_log.DebugFormat("[GATEKEEPER SERVICE]: Login presence ok"); | ||
236 | |||
237 | // | ||
238 | // Get the region | ||
239 | // | ||
240 | destination = m_GridService.GetRegionByUUID(m_ScopeID, destination.RegionID); | ||
241 | if (destination == null) | ||
242 | { | ||
243 | reason = "Destination region not found"; | ||
244 | return false; | ||
245 | } | ||
246 | m_log.DebugFormat("[GATEKEEPER SERVICE]: destination ok: {0}", destination.RegionName); | ||
247 | |||
248 | // | ||
249 | // Adjust the visible name | ||
250 | // | ||
251 | if (account != null) | ||
252 | { | ||
253 | aCircuit.firstname = account.FirstName; | ||
254 | aCircuit.lastname = account.LastName; | ||
255 | } | ||
256 | if (account == null && !aCircuit.lastname.StartsWith("@")) | ||
257 | { | ||
258 | aCircuit.firstname = aCircuit.firstname + "." + aCircuit.lastname; | ||
259 | aCircuit.lastname = "@" + aCircuit.ServiceURLs["HomeURI"].ToString(); | ||
260 | } | ||
261 | |||
262 | // | ||
263 | // Finally launch the agent at the destination | ||
264 | // | ||
265 | return m_SimulationService.CreateAgent(destination, aCircuit, (uint)Constants.TeleportFlags.ViaLogin, out reason); | ||
266 | } | ||
267 | |||
268 | protected bool Authenticate(AgentCircuitData aCircuit) | ||
269 | { | ||
270 | if (!CheckAddress(aCircuit.ServiceSessionID)) | ||
271 | return false; | ||
272 | |||
273 | string userURL = string.Empty; | ||
274 | if (aCircuit.ServiceURLs.ContainsKey("HomeURI")) | ||
275 | userURL = aCircuit.ServiceURLs["HomeURI"].ToString(); | ||
276 | |||
277 | if (userURL == string.Empty) | ||
278 | { | ||
279 | m_log.DebugFormat("[GATEKEEPER SERVICE]: Agent did not provide an authentication server URL"); | ||
280 | return false; | ||
281 | } | ||
282 | |||
283 | Object[] args = new Object[] { userURL }; | ||
284 | IUserAgentService userAgentService = new UserAgentServiceConnector(userURL); //ServerUtils.LoadPlugin<IUserAgentService>(m_AuthDll, args); | ||
285 | if (userAgentService != null) | ||
286 | { | ||
287 | try | ||
288 | { | ||
289 | return userAgentService.VerifyAgent(aCircuit.SessionID, aCircuit.ServiceSessionID); | ||
290 | } | ||
291 | catch | ||
292 | { | ||
293 | m_log.DebugFormat("[GATEKEEPER SERVICE]: Unable to contact authentication service at {0}", userURL); | ||
294 | return false; | ||
295 | } | ||
296 | } | ||
297 | |||
298 | return false; | ||
299 | } | ||
300 | |||
301 | // Check that the service token was generated for *this* grid. | ||
302 | // If it wasn't then that's a fake agent. | ||
303 | protected bool CheckAddress(string serviceToken) | ||
304 | { | ||
305 | string[] parts = serviceToken.Split(new char[] { ';' }); | ||
306 | if (parts.Length < 2) | ||
307 | return false; | ||
308 | |||
309 | string addressee = parts[0]; | ||
310 | m_log.DebugFormat("[GATEKEEPER SERVICE]: Verifying {0} against {1}", addressee, m_ExternalName); | ||
311 | return (addressee == m_ExternalName); | ||
312 | } | ||
313 | |||
314 | #endregion | ||
315 | |||
316 | |||
317 | #region Misc | ||
318 | |||
319 | |||
320 | #endregion | ||
321 | } | ||
322 | } | ||
diff --git a/OpenSim/Services/HypergridService/UserAgentService.cs b/OpenSim/Services/HypergridService/UserAgentService.cs new file mode 100644 index 0000000..2f1fed4 --- /dev/null +++ b/OpenSim/Services/HypergridService/UserAgentService.cs | |||
@@ -0,0 +1,250 @@ | |||
1 | /* | ||
2 | * Copyright (c) Contributors, http://opensimulator.org/ | ||
3 | * See CONTRIBUTORS.TXT for a full list of copyright holders. | ||
4 | * | ||
5 | * Redistribution and use in source and binary forms, with or without | ||
6 | * modification, are permitted provided that the following conditions are met: | ||
7 | * * Redistributions of source code must retain the above copyright | ||
8 | * notice, this list of conditions and the following disclaimer. | ||
9 | * * Redistributions in binary form must reproduce the above copyright | ||
10 | * notice, this list of conditions and the following disclaimer in the | ||
11 | * documentation and/or other materials provided with the distribution. | ||
12 | * * Neither the name of the OpenSimulator Project nor the | ||
13 | * names of its contributors may be used to endorse or promote products | ||
14 | * derived from this software without specific prior written permission. | ||
15 | * | ||
16 | * THIS SOFTWARE IS PROVIDED BY THE DEVELOPERS ``AS IS'' AND ANY | ||
17 | * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED | ||
18 | * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE | ||
19 | * DISCLAIMED. IN NO EVENT SHALL THE CONTRIBUTORS BE LIABLE FOR ANY | ||
20 | * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES | ||
21 | * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
22 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND | ||
23 | * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | ||
24 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS | ||
25 | * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | ||
26 | */ | ||
27 | |||
28 | using System; | ||
29 | using System.Collections.Generic; | ||
30 | using System.Net; | ||
31 | using System.Reflection; | ||
32 | |||
33 | using OpenSim.Framework; | ||
34 | using OpenSim.Services.Connectors.Hypergrid; | ||
35 | using OpenSim.Services.Interfaces; | ||
36 | using GridRegion = OpenSim.Services.Interfaces.GridRegion; | ||
37 | using OpenSim.Server.Base; | ||
38 | |||
39 | using OpenMetaverse; | ||
40 | using log4net; | ||
41 | using Nini.Config; | ||
42 | |||
43 | namespace OpenSim.Services.HypergridService | ||
44 | { | ||
45 | /// <summary> | ||
46 | /// This service is for HG1.5 only, to make up for the fact that clients don't | ||
47 | /// keep any private information in themselves, and that their 'home service' | ||
48 | /// needs to do it for them. | ||
49 | /// Once we have better clients, this shouldn't be needed. | ||
50 | /// </summary> | ||
51 | public class UserAgentService : IUserAgentService | ||
52 | { | ||
53 | private static readonly ILog m_log = | ||
54 | LogManager.GetLogger( | ||
55 | MethodBase.GetCurrentMethod().DeclaringType); | ||
56 | |||
57 | // This will need to go into a DB table | ||
58 | static Dictionary<UUID, TravelingAgentInfo> m_TravelingAgents = new Dictionary<UUID, TravelingAgentInfo>(); | ||
59 | |||
60 | static bool m_Initialized = false; | ||
61 | |||
62 | protected static IGridUserService m_GridUserService; | ||
63 | protected static IGridService m_GridService; | ||
64 | protected static GatekeeperServiceConnector m_GatekeeperConnector; | ||
65 | |||
66 | public UserAgentService(IConfigSource config) | ||
67 | { | ||
68 | if (!m_Initialized) | ||
69 | { | ||
70 | m_log.DebugFormat("[HOME USERS SECURITY]: Starting..."); | ||
71 | |||
72 | IConfig serverConfig = config.Configs["UserAgentService"]; | ||
73 | if (serverConfig == null) | ||
74 | throw new Exception(String.Format("No section UserAgentService in config file")); | ||
75 | |||
76 | string gridService = serverConfig.GetString("GridService", String.Empty); | ||
77 | string gridUserService = serverConfig.GetString("GridUserService", String.Empty); | ||
78 | |||
79 | if (gridService == string.Empty || gridUserService == string.Empty) | ||
80 | throw new Exception(String.Format("Incomplete specifications, UserAgent Service cannot function.")); | ||
81 | |||
82 | Object[] args = new Object[] { config }; | ||
83 | m_GridService = ServerUtils.LoadPlugin<IGridService>(gridService, args); | ||
84 | m_GridUserService = ServerUtils.LoadPlugin<IGridUserService>(gridUserService, args); | ||
85 | m_GatekeeperConnector = new GatekeeperServiceConnector(); | ||
86 | |||
87 | m_Initialized = true; | ||
88 | } | ||
89 | } | ||
90 | |||
91 | public GridRegion GetHomeRegion(UUID userID, out Vector3 position, out Vector3 lookAt) | ||
92 | { | ||
93 | position = new Vector3(128, 128, 0); lookAt = Vector3.UnitY; | ||
94 | |||
95 | m_log.DebugFormat("[USER AGENT SERVICE]: Request to get home region of user {0}", userID); | ||
96 | |||
97 | GridRegion home = null; | ||
98 | GridUserInfo uinfo = m_GridUserService.GetGridUserInfo(userID.ToString()); | ||
99 | if (uinfo != null) | ||
100 | { | ||
101 | if (uinfo.HomeRegionID != UUID.Zero) | ||
102 | { | ||
103 | home = m_GridService.GetRegionByUUID(UUID.Zero, uinfo.HomeRegionID); | ||
104 | position = uinfo.HomePosition; | ||
105 | lookAt = uinfo.HomeLookAt; | ||
106 | } | ||
107 | if (home == null) | ||
108 | { | ||
109 | List<GridRegion> defs = m_GridService.GetDefaultRegions(UUID.Zero); | ||
110 | if (defs != null && defs.Count > 0) | ||
111 | home = defs[0]; | ||
112 | } | ||
113 | } | ||
114 | |||
115 | return home; | ||
116 | } | ||
117 | |||
118 | public bool LoginAgentToGrid(AgentCircuitData agentCircuit, GridRegion gatekeeper, GridRegion finalDestination, out string reason) | ||
119 | { | ||
120 | m_log.DebugFormat("[USER AGENT SERVICE]: Request to login user {0} {1} to grid {2}", | ||
121 | agentCircuit.firstname, agentCircuit.lastname, gatekeeper.ExternalHostName +":"+ gatekeeper.HttpPort); | ||
122 | |||
123 | // Take the IP address + port of the gatekeeper (reg) plus the info of finalDestination | ||
124 | GridRegion region = new GridRegion(gatekeeper); | ||
125 | region.RegionName = finalDestination.RegionName; | ||
126 | region.RegionID = finalDestination.RegionID; | ||
127 | region.RegionLocX = finalDestination.RegionLocX; | ||
128 | region.RegionLocY = finalDestination.RegionLocY; | ||
129 | |||
130 | // Generate a new service session | ||
131 | agentCircuit.ServiceSessionID = "http://" + region.ExternalHostName + ":" + region.HttpPort + ";" + UUID.Random(); | ||
132 | TravelingAgentInfo old = UpdateTravelInfo(agentCircuit, region); | ||
133 | |||
134 | bool success = m_GatekeeperConnector.CreateAgent(region, agentCircuit, (uint)Constants.TeleportFlags.ViaLogin, out reason); | ||
135 | |||
136 | if (!success) | ||
137 | { | ||
138 | m_log.DebugFormat("[USER AGENT SERVICE]: Unable to login user {0} {1} to grid {2}, reason: {3}", | ||
139 | agentCircuit.firstname, agentCircuit.lastname, region.ExternalHostName + ":" + region.HttpPort, reason); | ||
140 | |||
141 | // restore the old travel info | ||
142 | lock (m_TravelingAgents) | ||
143 | m_TravelingAgents[agentCircuit.SessionID] = old; | ||
144 | |||
145 | return false; | ||
146 | } | ||
147 | |||
148 | return true; | ||
149 | } | ||
150 | |||
151 | public void SetClientToken(UUID sessionID, string token) | ||
152 | { | ||
153 | if (m_TravelingAgents.ContainsKey(sessionID)) | ||
154 | { | ||
155 | m_log.DebugFormat("[USER AGENT SERVICE]: Setting token {0} for session {1}", token, sessionID); | ||
156 | m_TravelingAgents[sessionID].ClientToken = token; | ||
157 | } | ||
158 | } | ||
159 | |||
160 | TravelingAgentInfo UpdateTravelInfo(AgentCircuitData agentCircuit, GridRegion region) | ||
161 | { | ||
162 | TravelingAgentInfo travel = new TravelingAgentInfo(); | ||
163 | TravelingAgentInfo old = null; | ||
164 | lock (m_TravelingAgents) | ||
165 | { | ||
166 | if (m_TravelingAgents.ContainsKey(agentCircuit.SessionID)) | ||
167 | { | ||
168 | old = m_TravelingAgents[agentCircuit.SessionID]; | ||
169 | } | ||
170 | |||
171 | m_TravelingAgents[agentCircuit.SessionID] = travel; | ||
172 | } | ||
173 | travel.UserID = agentCircuit.AgentID; | ||
174 | travel.GridExternalName = region.ExternalHostName + ":" + region.HttpPort; | ||
175 | travel.ServiceToken = agentCircuit.ServiceSessionID; | ||
176 | if (old != null) | ||
177 | travel.ClientToken = old.ClientToken; | ||
178 | |||
179 | return old; | ||
180 | } | ||
181 | |||
182 | public void LogoutAgent(UUID userID, UUID sessionID) | ||
183 | { | ||
184 | m_log.DebugFormat("[USER AGENT SERVICE]: User {0} logged out", userID); | ||
185 | |||
186 | lock (m_TravelingAgents) | ||
187 | { | ||
188 | List<UUID> travels = new List<UUID>(); | ||
189 | foreach (KeyValuePair<UUID, TravelingAgentInfo> kvp in m_TravelingAgents) | ||
190 | if (kvp.Value == null) // do some clean up | ||
191 | travels.Add(kvp.Key); | ||
192 | else if (kvp.Value.UserID == userID) | ||
193 | travels.Add(kvp.Key); | ||
194 | foreach (UUID session in travels) | ||
195 | m_TravelingAgents.Remove(session); | ||
196 | } | ||
197 | |||
198 | GridUserInfo guinfo = m_GridUserService.GetGridUserInfo(userID.ToString()); | ||
199 | if (guinfo != null) | ||
200 | m_GridUserService.LoggedOut(userID.ToString(), guinfo.LastRegionID, guinfo.LastPosition, guinfo.LastLookAt); | ||
201 | } | ||
202 | |||
203 | // We need to prevent foreign users with the same UUID as a local user | ||
204 | public bool AgentIsComingHome(UUID sessionID, string thisGridExternalName) | ||
205 | { | ||
206 | if (!m_TravelingAgents.ContainsKey(sessionID)) | ||
207 | return false; | ||
208 | |||
209 | TravelingAgentInfo travel = m_TravelingAgents[sessionID]; | ||
210 | return travel.GridExternalName == thisGridExternalName; | ||
211 | } | ||
212 | |||
213 | public bool VerifyClient(UUID sessionID, string token) | ||
214 | { | ||
215 | m_log.DebugFormat("[USER AGENT SERVICE]: Verifying Client session {0} with token {1}", sessionID, token); | ||
216 | //return true; | ||
217 | |||
218 | // Commenting this for now until I understand better what part of a sender's | ||
219 | // info stays unchanged throughout a session | ||
220 | |||
221 | if (m_TravelingAgents.ContainsKey(sessionID)) | ||
222 | return m_TravelingAgents[sessionID].ClientToken == token; | ||
223 | |||
224 | return false; | ||
225 | } | ||
226 | |||
227 | public bool VerifyAgent(UUID sessionID, string token) | ||
228 | { | ||
229 | if (m_TravelingAgents.ContainsKey(sessionID)) | ||
230 | { | ||
231 | m_log.DebugFormat("[USER AGENT SERVICE]: Verifying agent token {0} against {1}", token, m_TravelingAgents[sessionID].ServiceToken); | ||
232 | return m_TravelingAgents[sessionID].ServiceToken == token; | ||
233 | } | ||
234 | |||
235 | m_log.DebugFormat("[USER AGENT SERVICE]: Token verification for session {0}: no such session", sessionID); | ||
236 | |||
237 | return false; | ||
238 | } | ||
239 | |||
240 | } | ||
241 | |||
242 | class TravelingAgentInfo | ||
243 | { | ||
244 | public UUID UserID; | ||
245 | public string GridExternalName = string.Empty; | ||
246 | public string ServiceToken = string.Empty; | ||
247 | public string ClientToken = string.Empty; | ||
248 | } | ||
249 | |||
250 | } | ||