diff options
author | diva | 2009-03-21 20:16:35 +0000 |
---|---|---|
committer | diva | 2009-03-21 20:16:35 +0000 |
commit | 09732b4d5dfdb3a9e326e99c2e86d7492bc06e55 (patch) | |
tree | 2fcb55c9e341c7abf7225c5880a6984ab8544ff2 | |
parent | Minor changes in names inside. (diff) | |
download | opensim-SC_OLD-09732b4d5dfdb3a9e326e99c2e86d7492bc06e55.zip opensim-SC_OLD-09732b4d5dfdb3a9e326e99c2e86d7492bc06e55.tar.gz opensim-SC_OLD-09732b4d5dfdb3a9e326e99c2e86d7492bc06e55.tar.bz2 opensim-SC_OLD-09732b4d5dfdb3a9e326e99c2e86d7492bc06e55.tar.xz |
Initial support for authentication/authorization keys in UserManagerBase, and use of it in HGStandaloneLoginService (producer of initial key for user, and of subsequent keys) and HGStandaloneInventoryService (consumer of a key).
Keys are of the form http://<authority>/<random uuid>
and they are sent over http header "authorization".
5 files changed, 962 insertions, 7 deletions
diff --git a/OpenSim/Framework/Communications/IAuthentication.cs b/OpenSim/Framework/Communications/IAuthentication.cs new file mode 100644 index 0000000..5d6d5f2 --- /dev/null +++ b/OpenSim/Framework/Communications/IAuthentication.cs | |||
@@ -0,0 +1,13 @@ | |||
1 | using System; | ||
2 | |||
3 | using OpenMetaverse; | ||
4 | |||
5 | |||
6 | namespace OpenSim.Framework.Communications | ||
7 | { | ||
8 | public interface IAuthentication | ||
9 | { | ||
10 | string GetNewKey(string url, UUID userID, UUID authToken); | ||
11 | bool VerifyKey(UUID userID, string key); | ||
12 | } | ||
13 | } | ||
diff --git a/OpenSim/Framework/Communications/UserManagerBase.cs b/OpenSim/Framework/Communications/UserManagerBase.cs index 62c3f89..c177d4f 100644 --- a/OpenSim/Framework/Communications/UserManagerBase.cs +++ b/OpenSim/Framework/Communications/UserManagerBase.cs | |||
@@ -42,7 +42,7 @@ namespace OpenSim.Framework.Communications | |||
42 | /// <summary> | 42 | /// <summary> |
43 | /// Base class for user management (create, read, etc) | 43 | /// Base class for user management (create, read, etc) |
44 | /// </summary> | 44 | /// </summary> |
45 | public abstract class UserManagerBase : IUserService, IUserAdminService, IAvatarService, IMessagingService | 45 | public abstract class UserManagerBase : IUserService, IUserAdminService, IAvatarService, IMessagingService, IAuthentication |
46 | { | 46 | { |
47 | private static readonly ILog m_log | 47 | private static readonly ILog m_log |
48 | = LogManager.GetLogger(MethodBase.GetCurrentMethod().DeclaringType); | 48 | = LogManager.GetLogger(MethodBase.GetCurrentMethod().DeclaringType); |
@@ -750,5 +750,86 @@ namespace OpenSim.Framework.Communications | |||
750 | } | 750 | } |
751 | } | 751 | } |
752 | } | 752 | } |
753 | |||
754 | #region IAuthentication | ||
755 | |||
756 | protected Dictionary<UUID, List<string>> m_userKeys = new Dictionary<UUID, List<string>>(); | ||
757 | |||
758 | /// <summary> | ||
759 | /// This generates authorization keys in the form | ||
760 | /// http://userserver/uuid | ||
761 | /// after verifying that the caller is, indeed, authorized to request a key | ||
762 | /// </summary> | ||
763 | /// <param name="url">URL of the user server</param> | ||
764 | /// <param name="userID">The user ID requesting the new key</param> | ||
765 | /// <param name="authToken">The original authorization token for that user, obtained during login</param> | ||
766 | /// <returns></returns> | ||
767 | public string GetNewKey(string url, UUID userID, UUID authToken) | ||
768 | { | ||
769 | UserProfileData profile = GetUserProfile(userID); | ||
770 | string newKey = string.Empty; | ||
771 | if (!url.EndsWith("/")) | ||
772 | url = url + "/"; | ||
773 | |||
774 | if (profile != null) | ||
775 | { | ||
776 | // I'm overloading webloginkey for this, so that no changes are needed in the DB | ||
777 | // The uses of webloginkey are fairly mutually exclusive | ||
778 | if (profile.WebLoginKey.Equals(authToken)) | ||
779 | { | ||
780 | newKey = UUID.Random().ToString(); | ||
781 | List<string> keys; | ||
782 | lock (m_userKeys) | ||
783 | { | ||
784 | if (m_userKeys.ContainsKey(userID)) | ||
785 | { | ||
786 | keys = m_userKeys[userID]; | ||
787 | } | ||
788 | else | ||
789 | { | ||
790 | keys = new List<string>(); | ||
791 | m_userKeys.Add(userID, keys); | ||
792 | } | ||
793 | keys.Add(newKey); | ||
794 | } | ||
795 | m_log.InfoFormat("[USERAUTH]: Successfully generated new auth key for user {0}", userID); | ||
796 | } | ||
797 | else | ||
798 | m_log.Info("[USERAUTH]: Unauthorized key generation request. Denying new key."); | ||
799 | } | ||
800 | else | ||
801 | m_log.Info("[USERAUTH]: User not found."); | ||
802 | |||
803 | return url + newKey; | ||
804 | } | ||
805 | |||
806 | /// <summary> | ||
807 | /// This verifies the uuid portion of the key given out by GenerateKey | ||
808 | /// </summary> | ||
809 | /// <param name="userID"></param> | ||
810 | /// <param name="key"></param> | ||
811 | /// <returns></returns> | ||
812 | public bool VerifyKey(UUID userID, string key) | ||
813 | { | ||
814 | lock (m_userKeys) | ||
815 | { | ||
816 | if (m_userKeys.ContainsKey(userID)) | ||
817 | { | ||
818 | List<string> keys = m_userKeys[userID]; | ||
819 | if (keys.Contains(key)) | ||
820 | { | ||
821 | // Keys are one-time only, so remove it | ||
822 | keys.Remove(key); | ||
823 | return true; | ||
824 | } | ||
825 | return false; | ||
826 | } | ||
827 | else | ||
828 | return false; | ||
829 | } | ||
830 | } | ||
831 | |||
832 | #endregion | ||
833 | |||
753 | } | 834 | } |
754 | } | 835 | } |
diff --git a/OpenSim/Region/CoreModules/Hypergrid/HGStandaloneInventoryService.cs b/OpenSim/Region/CoreModules/Hypergrid/HGStandaloneInventoryService.cs index cff3611..35db298 100644 --- a/OpenSim/Region/CoreModules/Hypergrid/HGStandaloneInventoryService.cs +++ b/OpenSim/Region/CoreModules/Hypergrid/HGStandaloneInventoryService.cs | |||
@@ -27,6 +27,7 @@ | |||
27 | */ | 27 | */ |
28 | 28 | ||
29 | using System; | 29 | using System; |
30 | using System.Collections; | ||
30 | using System.Collections.Generic; | 31 | using System.Collections.Generic; |
31 | using System.Reflection; | 32 | using System.Reflection; |
32 | using log4net; | 33 | using log4net; |
@@ -38,6 +39,9 @@ using OpenSim.Framework.Servers; | |||
38 | using OpenSim.Framework.Servers.Interfaces; | 39 | using OpenSim.Framework.Servers.Interfaces; |
39 | using OpenSim.Region.Framework.Interfaces; | 40 | using OpenSim.Region.Framework.Interfaces; |
40 | using OpenSim.Region.Framework.Scenes; | 41 | using OpenSim.Region.Framework.Scenes; |
42 | using OpenSim.Region.CoreModules.Communications.REST; | ||
43 | |||
44 | using OpenMetaverse.StructuredData; | ||
41 | 45 | ||
42 | namespace OpenSim.Region.CoreModules.Hypergrid | 46 | namespace OpenSim.Region.CoreModules.Hypergrid |
43 | { | 47 | { |
@@ -97,8 +101,10 @@ namespace OpenSim.Region.CoreModules.Hypergrid | |||
97 | = LogManager.GetLogger(MethodBase.GetCurrentMethod().DeclaringType); | 101 | = LogManager.GetLogger(MethodBase.GetCurrentMethod().DeclaringType); |
98 | 102 | ||
99 | private InventoryServiceBase m_inventoryService; | 103 | private InventoryServiceBase m_inventoryService; |
100 | private IUserService m_userService; | 104 | private UserManagerBase m_userService; |
105 | private Scene m_scene; | ||
101 | private bool m_doLookup = false; | 106 | private bool m_doLookup = false; |
107 | private string m_thisInventoryUrl = "http://localhost:9000"; | ||
102 | 108 | ||
103 | public bool DoLookup | 109 | public bool DoLookup |
104 | { | 110 | { |
@@ -106,17 +112,24 @@ namespace OpenSim.Region.CoreModules.Hypergrid | |||
106 | set { m_doLookup = value; } | 112 | set { m_doLookup = value; } |
107 | } | 113 | } |
108 | 114 | ||
109 | public InventoryService(Scene m_scene) | 115 | public InventoryService(Scene _m_scene) |
110 | { | 116 | { |
117 | m_scene = _m_scene; | ||
111 | m_inventoryService = (InventoryServiceBase)m_scene.CommsManager.SecureInventoryService; | 118 | m_inventoryService = (InventoryServiceBase)m_scene.CommsManager.SecureInventoryService; |
112 | m_userService = m_scene.CommsManager.UserService; | 119 | m_userService = (UserManagerBase)m_scene.CommsManager.UserService; |
113 | AddHttpHandlers(m_scene); | 120 | m_thisInventoryUrl = m_scene.CommsManager.NetworkServersInfo.InventoryURL; |
121 | if (!m_thisInventoryUrl.EndsWith("/")) | ||
122 | m_thisInventoryUrl += "/"; | ||
123 | |||
124 | AddHttpHandlers(); | ||
114 | } | 125 | } |
115 | 126 | ||
116 | protected void AddHttpHandlers(Scene m_scene) | 127 | protected void AddHttpHandlers() |
117 | { | 128 | { |
118 | IHttpServer httpServer = m_scene.CommsManager.HttpServer; | 129 | IHttpServer httpServer = m_scene.CommsManager.HttpServer; |
119 | 130 | ||
131 | httpServer.AddHTTPHandler("/InvCap/", CapHandler); | ||
132 | |||
120 | httpServer.AddStreamHandler( | 133 | httpServer.AddStreamHandler( |
121 | new RestDeserialiseSecureHandler<Guid, InventoryCollection>( | 134 | new RestDeserialiseSecureHandler<Guid, InventoryCollection>( |
122 | "POST", "/GetInventory/", GetUserInventory, CheckAuthSession)); | 135 | "POST", "/GetInventory/", GetUserInventory, CheckAuthSession)); |
@@ -231,6 +244,17 @@ namespace OpenSim.Region.CoreModules.Hypergrid | |||
231 | } | 244 | } |
232 | } | 245 | } |
233 | 246 | ||
247 | // In truth, this is not called from the outside, for standalones. I'm just making it | ||
248 | // a handler already so that this can be reused for the InventoryServer. | ||
249 | public string CreateCapUrl(Guid _userid) | ||
250 | { | ||
251 | UUID userID = new UUID(_userid); | ||
252 | UUID random = UUID.Random(); | ||
253 | string url = m_thisInventoryUrl + random.ToString() + "/"; | ||
254 | m_log.InfoFormat("[HGStandaloneInvService] Creating Cap URL {0} for user {1}", url, userID.ToString()); | ||
255 | return url; | ||
256 | } | ||
257 | |||
234 | 258 | ||
235 | /// <summary> | 259 | /// <summary> |
236 | /// Return a user's entire inventory | 260 | /// Return a user's entire inventory |
@@ -290,6 +314,37 @@ namespace OpenSim.Region.CoreModules.Hypergrid | |||
290 | return invCollection; | 314 | return invCollection; |
291 | } | 315 | } |
292 | 316 | ||
317 | public InventoryCollection FetchDescendants(InventoryFolderBase fb) | ||
318 | { | ||
319 | m_log.Info("[HGStandaloneInvService]: Processing request for folder " + fb.ID); | ||
320 | |||
321 | // Uncomment me to simulate a slow responding inventory server | ||
322 | //Thread.Sleep(16000); | ||
323 | |||
324 | InventoryCollection invCollection = new InventoryCollection(); | ||
325 | |||
326 | List<InventoryItemBase> items = ((InventoryServiceBase)m_inventoryService).RequestFolderItems(fb.ID); | ||
327 | List<InventoryFolderBase> folders = ((InventoryServiceBase)m_inventoryService).RequestSubFolders(fb.ID); | ||
328 | |||
329 | invCollection.UserID = fb.Owner; | ||
330 | invCollection.Folders = folders; | ||
331 | invCollection.Items = items; | ||
332 | |||
333 | m_log.DebugFormat("[HGStandaloneInvService]: Found {0} items and {1} folders", items.Count, folders.Count); | ||
334 | |||
335 | return invCollection; | ||
336 | } | ||
337 | |||
338 | public InventoryItemBase GetInventoryItem(InventoryItemBase item) | ||
339 | { | ||
340 | m_log.Info("[HGStandaloneInvService]: Processing request for item " + item.ID); | ||
341 | |||
342 | item = ((InventoryServiceBase)m_inventoryService).GetInventoryItem(item.ID); | ||
343 | if (item == null) | ||
344 | m_log.Debug("[HGStandaloneInvService]: null item"); | ||
345 | return item; | ||
346 | } | ||
347 | |||
293 | /// <summary> | 348 | /// <summary> |
294 | /// Guid to UUID wrapper for same name IInventoryServices method | 349 | /// Guid to UUID wrapper for same name IInventoryServices method |
295 | /// </summary> | 350 | /// </summary> |
@@ -309,5 +364,210 @@ namespace OpenSim.Region.CoreModules.Hypergrid | |||
309 | 364 | ||
310 | return ((InventoryServiceBase)m_inventoryService).GetActiveGestures(userID); | 365 | return ((InventoryServiceBase)m_inventoryService).GetActiveGestures(userID); |
311 | } | 366 | } |
367 | |||
368 | |||
369 | #region Caps | ||
370 | |||
371 | Dictionary<UUID, List<string>> invCaps = new Dictionary<UUID, List<string>>(); | ||
372 | |||
373 | public Hashtable CapHandler(Hashtable request) | ||
374 | { | ||
375 | m_log.Debug("[CONNECTION DEBUGGING]: InvCapHandler Called"); | ||
376 | |||
377 | m_log.Debug("---------------------------"); | ||
378 | m_log.Debug(" >> uri=" + request["uri"]); | ||
379 | m_log.Debug(" >> content-type=" + request["content-type"]); | ||
380 | m_log.Debug(" >> http-method=" + request["http-method"]); | ||
381 | m_log.Debug("---------------------------\n"); | ||
382 | |||
383 | // these are requests if the type | ||
384 | // http://inventoryserver/InvCap/uuuuuuuu-uuuu-uuuu-uuuu-uuuuuuuuuuuu/kkkkkkkk-kkkk-kkkk-kkkk-kkkkkkkkkkkk/ | ||
385 | |||
386 | Hashtable responsedata = new Hashtable(); | ||
387 | responsedata["content_type"] = "text/plain"; | ||
388 | |||
389 | UUID userID; | ||
390 | string authToken = string.Empty; | ||
391 | string authority = string.Empty; | ||
392 | if (!GetParams(request, out userID, out authority, out authToken)) | ||
393 | { | ||
394 | m_log.InfoFormat("[HGStandaloneInvService]: Invalid parameters for InvCap message {0}", request["uri"]); | ||
395 | responsedata["int_response_code"] = 404; | ||
396 | responsedata["str_response_string"] = "Not found"; | ||
397 | |||
398 | return responsedata; | ||
399 | } | ||
400 | |||
401 | // Next, let's parse the verb | ||
402 | string method = (string)request["http-method"]; | ||
403 | if (method.Equals("GET")) | ||
404 | { | ||
405 | DoInvCapPost(request, responsedata, userID, authToken); | ||
406 | return responsedata; | ||
407 | } | ||
408 | //else if (method.Equals("DELETE")) | ||
409 | //{ | ||
410 | // DoAgentDelete(request, responsedata, agentID, action, regionHandle); | ||
411 | |||
412 | // return responsedata; | ||
413 | //} | ||
414 | else | ||
415 | { | ||
416 | m_log.InfoFormat("[HGStandaloneInvService]: method {0} not supported in agent message", method); | ||
417 | responsedata["int_response_code"] = 405; | ||
418 | responsedata["str_response_string"] = "Method not allowed"; | ||
419 | |||
420 | return responsedata; | ||
421 | } | ||
422 | |||
423 | } | ||
424 | |||
425 | public virtual void DoInvCapPost(Hashtable request, Hashtable responsedata, UUID userID, string authToken) | ||
426 | { | ||
427 | |||
428 | // This is the meaning of POST agent | ||
429 | |||
430 | // Check Auth Token | ||
431 | if (!(m_userService is IAuthentication)) | ||
432 | { | ||
433 | m_log.Debug("[HGStandaloneInvService]: UserService is not IAuthentication. Denying access to inventory."); | ||
434 | responsedata["int_response_code"] = 501; | ||
435 | responsedata["str_response_string"] = "Not implemented"; | ||
436 | return; | ||
437 | } | ||
438 | |||
439 | bool success = ((IAuthentication)m_userService).VerifyKey(userID, authToken); | ||
440 | |||
441 | if (success) | ||
442 | { | ||
443 | |||
444 | m_log.DebugFormat("[HGStandaloneInvService]: User has been authorized. Creating service handlers."); | ||
445 | |||
446 | // Then establish secret service handlers | ||
447 | |||
448 | RegisterCaps(userID, authToken); | ||
449 | |||
450 | responsedata["int_response_code"] = 200; | ||
451 | responsedata["str_response_string"] = "OK"; | ||
452 | } | ||
453 | else | ||
454 | { | ||
455 | m_log.DebugFormat("[HGStandaloneInvService]: User has is unauthorized. Denying service handlers."); | ||
456 | responsedata["int_response_code"] = 403; | ||
457 | responsedata["str_response_string"] = "Forbidden"; | ||
458 | } | ||
459 | } | ||
460 | |||
461 | |||
462 | /// <summary> | ||
463 | /// Extract the params from a request. | ||
464 | /// </summary> | ||
465 | public static bool GetParams(Hashtable request, out UUID uuid, out string authority, out string authKey) | ||
466 | { | ||
467 | uuid = UUID.Zero; | ||
468 | authority = string.Empty; | ||
469 | authKey = string.Empty; | ||
470 | |||
471 | string uri = (string)request["uri"]; | ||
472 | uri = uri.Trim(new char[] { '/' }); | ||
473 | string[] parts = uri.Split('/'); | ||
474 | if (parts.Length <= 1) | ||
475 | { | ||
476 | return false; | ||
477 | } | ||
478 | else | ||
479 | { | ||
480 | if (!UUID.TryParse(parts[1], out uuid)) | ||
481 | return false; | ||
482 | |||
483 | if (parts.Length >= 3) | ||
484 | { | ||
485 | authKey = parts[2]; | ||
486 | return true; | ||
487 | } | ||
488 | } | ||
489 | |||
490 | Uri authUri; | ||
491 | Hashtable headers = (Hashtable)request["headers"]; | ||
492 | |||
493 | // Authorization keys look like this: | ||
494 | // http://orgrid.org:8002/<uuid> | ||
495 | if (headers.ContainsKey("authorization")) | ||
496 | { | ||
497 | if (Uri.TryCreate((string)headers["authorization"], UriKind.Absolute, out authUri)) | ||
498 | { | ||
499 | authority = authUri.Authority; | ||
500 | authKey = authUri.PathAndQuery.Trim('/'); | ||
501 | m_log.DebugFormat("[HGStandaloneInvService]: Got authority {0} and key {1}", authority, authKey); | ||
502 | return true; | ||
503 | } | ||
504 | else | ||
505 | m_log.Debug("[HGStandaloneInvService]: Wrong format for Authorization header: " + (string)headers["authorization"]); | ||
506 | } | ||
507 | else | ||
508 | m_log.Debug("[HGStandaloneInvService]: Authorization header not found"); | ||
509 | |||
510 | return false; | ||
511 | } | ||
512 | |||
513 | void RegisterCaps(UUID userID, string authToken) | ||
514 | { | ||
515 | IHttpServer httpServer = m_scene.CommsManager.HttpServer; | ||
516 | |||
517 | lock (invCaps) | ||
518 | { | ||
519 | if (invCaps.ContainsKey(userID)) | ||
520 | { | ||
521 | // Remove the old ones | ||
522 | DeregisterCaps(httpServer, invCaps[userID]); | ||
523 | invCaps.Remove(userID); | ||
524 | } | ||
525 | } | ||
526 | |||
527 | List<string> caps = new List<string>(); | ||
528 | |||
529 | httpServer.AddStreamHandler(new RestDeserialiseSecureHandler<Guid, InventoryCollection>( | ||
530 | "POST", AddAndGetCapUrl(authToken, "/GetInventory/", caps), GetUserInventory, CheckAuthSession)); | ||
531 | |||
532 | httpServer.AddStreamHandler(new RestDeserialiseSecureHandler<InventoryFolderBase, InventoryCollection>( | ||
533 | "POST", AddAndGetCapUrl(authToken, "/FetchDescendants/", caps), FetchDescendants, CheckAuthSession)); | ||
534 | httpServer.AddStreamHandler(new RestDeserialiseSecureHandler<InventoryItemBase, InventoryItemBase>( | ||
535 | "POST", AddAndGetCapUrl(authToken, "/GetItem/", caps), GetInventoryItem, CheckAuthSession)); | ||
536 | httpServer.AddStreamHandler(new RestDeserialiseSecureHandler<InventoryFolderBase, bool>( | ||
537 | "POST", AddAndGetCapUrl(authToken, "/NewFolder/", caps), m_inventoryService.AddFolder, CheckAuthSession)); | ||
538 | httpServer.AddStreamHandler(new RestDeserialiseSecureHandler<InventoryFolderBase, bool>( | ||
539 | "POST", AddAndGetCapUrl(authToken, "/UpdateFolder/", caps), m_inventoryService.UpdateFolder, CheckAuthSession)); | ||
540 | httpServer.AddStreamHandler(new RestDeserialiseSecureHandler<InventoryFolderBase, bool>( | ||
541 | "POST", AddAndGetCapUrl(authToken, "/MoveFolder/", caps), m_inventoryService.MoveFolder, CheckAuthSession)); | ||
542 | httpServer.AddStreamHandler(new RestDeserialiseSecureHandler<InventoryFolderBase, bool>( | ||
543 | "POST", AddAndGetCapUrl(authToken, "/PurgeFolder/", caps), m_inventoryService.PurgeFolder, CheckAuthSession)); | ||
544 | httpServer.AddStreamHandler(new RestDeserialiseSecureHandler<InventoryItemBase, bool>( | ||
545 | "POST", AddAndGetCapUrl(authToken, "/NewItem/", caps), m_inventoryService.AddItem, CheckAuthSession)); | ||
546 | httpServer.AddStreamHandler(new RestDeserialiseSecureHandler<InventoryItemBase, bool>( | ||
547 | "POST", AddAndGetCapUrl(authToken, "/DeleteItem/", caps), m_inventoryService.DeleteItem, CheckAuthSession)); | ||
548 | |||
549 | lock (invCaps) | ||
550 | invCaps.Add(userID, caps); | ||
551 | } | ||
552 | |||
553 | string AddAndGetCapUrl(string authToken, string capType, List<string> caps) | ||
554 | { | ||
555 | string capUrl = "/" + authToken + capType; | ||
556 | |||
557 | m_log.Debug("[HGStandaloneInvService] Adding inventory cap " + capUrl); | ||
558 | caps.Add(capUrl); | ||
559 | return capUrl; | ||
560 | } | ||
561 | |||
562 | void DeregisterCaps(IHttpServer httpServer, List<string> caps) | ||
563 | { | ||
564 | foreach (string capUrl in caps) | ||
565 | { | ||
566 | m_log.Debug("[HGStandaloneInvService] Removing inventory cap " + capUrl); | ||
567 | httpServer.RemoveStreamHandler("POST", capUrl); | ||
568 | } | ||
569 | } | ||
570 | |||
571 | #endregion Caps | ||
312 | } | 572 | } |
313 | } | 573 | } |
diff --git a/OpenSim/Region/CoreModules/Hypergrid/Login/HGStandaloneLoginModule.cs b/OpenSim/Region/CoreModules/Hypergrid/Login/HGStandaloneLoginModule.cs new file mode 100644 index 0000000..4b74ed5 --- /dev/null +++ b/OpenSim/Region/CoreModules/Hypergrid/Login/HGStandaloneLoginModule.cs | |||
@@ -0,0 +1,252 @@ | |||
1 | /* | ||
2 | * Copyright (c) Contributors, http://opensimulator.org/ | ||
3 | * See CONTRIBUTORS.TXT for a full list of copyright holders. | ||
4 | * | ||
5 | * Redistribution and use in source and binary forms, with or without | ||
6 | * modification, are permitted provided that the following conditions are met: | ||
7 | * * Redistributions of source code must retain the above copyright | ||
8 | * notice, this list of conditions and the following disclaimer. | ||
9 | * * Redistributions in binary form must reproduce the above copyright | ||
10 | * notice, this list of conditions and the following disclaimer in the | ||
11 | * documentation and/or other materials provided with the distribution. | ||
12 | * * Neither the name of the OpenSimulator Project nor the | ||
13 | * names of its contributors may be used to endorse or promote products | ||
14 | * derived from this software without specific prior written permission. | ||
15 | * | ||
16 | * THIS SOFTWARE IS PROVIDED BY THE DEVELOPERS ``AS IS'' AND ANY | ||
17 | * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED | ||
18 | * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE | ||
19 | * DISCLAIMED. IN NO EVENT SHALL THE CONTRIBUTORS BE LIABLE FOR ANY | ||
20 | * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES | ||
21 | * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
22 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND | ||
23 | * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | ||
24 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS | ||
25 | * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | ||
26 | */ | ||
27 | |||
28 | using System; | ||
29 | using System.Collections; | ||
30 | using System.Collections.Generic; | ||
31 | using System.Net; | ||
32 | using System.Reflection; | ||
33 | using System.Text.RegularExpressions; | ||
34 | using log4net; | ||
35 | using Nini.Config; | ||
36 | using OpenMetaverse; | ||
37 | using OpenSim.Framework; | ||
38 | using OpenSim.Framework.Communications; | ||
39 | using OpenSim.Framework.Communications.Cache; | ||
40 | using OpenSim.Framework.Communications.Capabilities; | ||
41 | using OpenSim.Framework.Servers.Interfaces; | ||
42 | using OpenSim.Region.Framework.Scenes; | ||
43 | using OpenSim.Region.Framework.Interfaces; | ||
44 | |||
45 | namespace OpenSim.Region.CoreModules.Hypergrid | ||
46 | { | ||
47 | public class HGStandaloneLoginModule : IRegionModule, ILoginServiceToRegionsConnector | ||
48 | { | ||
49 | private static readonly ILog m_log = LogManager.GetLogger(MethodBase.GetCurrentMethod().DeclaringType); | ||
50 | |||
51 | protected List<Scene> m_scenes = new List<Scene>(); | ||
52 | protected Scene m_firstScene; | ||
53 | |||
54 | protected bool m_enabled = false; // Module is only enabled if running in standalone mode | ||
55 | |||
56 | |||
57 | public bool RegionLoginsEnabled | ||
58 | { | ||
59 | get | ||
60 | { | ||
61 | if (m_firstScene != null) | ||
62 | { | ||
63 | return m_firstScene.CommsManager.GridService.RegionLoginsEnabled; | ||
64 | } | ||
65 | else | ||
66 | { | ||
67 | return false; | ||
68 | } | ||
69 | } | ||
70 | } | ||
71 | |||
72 | protected HGStandaloneLoginService m_loginService; | ||
73 | |||
74 | #region IRegionModule Members | ||
75 | |||
76 | public void Initialise(Scene scene, IConfigSource source) | ||
77 | { | ||
78 | if (m_firstScene == null) | ||
79 | { | ||
80 | m_firstScene = scene; | ||
81 | |||
82 | IConfig startupConfig = source.Configs["Startup"]; | ||
83 | if (startupConfig != null) | ||
84 | { | ||
85 | m_enabled = !startupConfig.GetBoolean("gridmode", false); | ||
86 | } | ||
87 | |||
88 | if (m_enabled) | ||
89 | { | ||
90 | m_log.Debug("[HGLogin] HGlogin module enabled"); | ||
91 | bool authenticate = true; | ||
92 | string welcomeMessage = "Welcome to OpenSim"; | ||
93 | IConfig standaloneConfig = source.Configs["StandAlone"]; | ||
94 | if (standaloneConfig != null) | ||
95 | { | ||
96 | authenticate = standaloneConfig.GetBoolean("accounts_authenticate", true); | ||
97 | welcomeMessage = standaloneConfig.GetString("welcome_message"); | ||
98 | } | ||
99 | |||
100 | //TODO: fix casting. | ||
101 | LibraryRootFolder rootFolder = m_firstScene.CommsManager.UserProfileCacheService.LibraryRoot as LibraryRootFolder; | ||
102 | |||
103 | IHttpServer httpServer = m_firstScene.CommsManager.HttpServer; | ||
104 | |||
105 | //TODO: fix the casting of the user service, maybe by registering the userManagerBase with scenes, or refactoring so we just need a IUserService reference | ||
106 | m_loginService = new HGStandaloneLoginService((UserManagerBase)m_firstScene.CommsManager.UserService, welcomeMessage, m_firstScene.CommsManager.InterServiceInventoryService, m_firstScene.CommsManager.NetworkServersInfo, authenticate, rootFolder, this); | ||
107 | |||
108 | httpServer.AddXmlRPCHandler("hg_login", m_loginService.XmlRpcLoginMethod); | ||
109 | httpServer.AddXmlRPCHandler("hg_new_auth_key", m_loginService.XmlRpcGenerateKeyMethod); | ||
110 | httpServer.AddXmlRPCHandler("hg_verify_auth_key", m_loginService.XmlRpcVerifyKeyMethod); | ||
111 | |||
112 | } | ||
113 | } | ||
114 | |||
115 | if (m_enabled) | ||
116 | { | ||
117 | AddScene(scene); | ||
118 | } | ||
119 | } | ||
120 | |||
121 | public void PostInitialise() | ||
122 | { | ||
123 | |||
124 | } | ||
125 | |||
126 | public void Close() | ||
127 | { | ||
128 | |||
129 | } | ||
130 | |||
131 | public string Name | ||
132 | { | ||
133 | get { return "HGStandaloneLoginModule"; } | ||
134 | } | ||
135 | |||
136 | public bool IsSharedModule | ||
137 | { | ||
138 | get { return true; } | ||
139 | } | ||
140 | |||
141 | #endregion | ||
142 | |||
143 | protected void AddScene(Scene scene) | ||
144 | { | ||
145 | lock (m_scenes) | ||
146 | { | ||
147 | if (!m_scenes.Contains(scene)) | ||
148 | { | ||
149 | m_scenes.Add(scene); | ||
150 | } | ||
151 | } | ||
152 | } | ||
153 | |||
154 | public bool NewUserConnection(ulong regionHandle, AgentCircuitData agent) | ||
155 | { | ||
156 | return true; | ||
157 | } | ||
158 | |||
159 | public void LogOffUserFromGrid(ulong regionHandle, UUID AvatarID, UUID RegionSecret, string message) | ||
160 | { | ||
161 | Scene scene; | ||
162 | if (TryGetRegion(regionHandle, out scene)) | ||
163 | { | ||
164 | scene.HandleLogOffUserFromGrid(AvatarID, RegionSecret, message); | ||
165 | } | ||
166 | } | ||
167 | |||
168 | public RegionInfo RequestNeighbourInfo(ulong regionhandle) | ||
169 | { | ||
170 | Scene scene; | ||
171 | if (TryGetRegion(regionhandle, out scene)) | ||
172 | { | ||
173 | return scene.RegionInfo; | ||
174 | } | ||
175 | return null; | ||
176 | } | ||
177 | |||
178 | public RegionInfo RequestClosestRegion(string region) | ||
179 | { | ||
180 | Scene scene; | ||
181 | if (TryGetRegion(region, out scene)) | ||
182 | { | ||
183 | return scene.RegionInfo; | ||
184 | } | ||
185 | return null; | ||
186 | } | ||
187 | |||
188 | public RegionInfo RequestNeighbourInfo(UUID regionID) | ||
189 | { | ||
190 | Scene scene; | ||
191 | if (TryGetRegion(regionID, out scene)) | ||
192 | { | ||
193 | return scene.RegionInfo; | ||
194 | } | ||
195 | return null; | ||
196 | } | ||
197 | |||
198 | protected bool TryGetRegion(ulong regionHandle, out Scene scene) | ||
199 | { | ||
200 | lock (m_scenes) | ||
201 | { | ||
202 | foreach (Scene nextScene in m_scenes) | ||
203 | { | ||
204 | if (nextScene.RegionInfo.RegionHandle == regionHandle) | ||
205 | { | ||
206 | scene = nextScene; | ||
207 | return true; | ||
208 | } | ||
209 | } | ||
210 | } | ||
211 | |||
212 | scene = null; | ||
213 | return false; | ||
214 | } | ||
215 | |||
216 | protected bool TryGetRegion(UUID regionID, out Scene scene) | ||
217 | { | ||
218 | lock (m_scenes) | ||
219 | { | ||
220 | foreach (Scene nextScene in m_scenes) | ||
221 | { | ||
222 | if (nextScene.RegionInfo.RegionID == regionID) | ||
223 | { | ||
224 | scene = nextScene; | ||
225 | return true; | ||
226 | } | ||
227 | } | ||
228 | } | ||
229 | |||
230 | scene = null; | ||
231 | return false; | ||
232 | } | ||
233 | |||
234 | protected bool TryGetRegion(string regionName, out Scene scene) | ||
235 | { | ||
236 | lock (m_scenes) | ||
237 | { | ||
238 | foreach (Scene nextScene in m_scenes) | ||
239 | { | ||
240 | if (nextScene.RegionInfo.RegionName == regionName) | ||
241 | { | ||
242 | scene = nextScene; | ||
243 | return true; | ||
244 | } | ||
245 | } | ||
246 | } | ||
247 | |||
248 | scene = null; | ||
249 | return false; | ||
250 | } | ||
251 | } | ||
252 | } | ||
diff --git a/OpenSim/Region/CoreModules/Hypergrid/Login/HGStandaloneLoginService.cs b/OpenSim/Region/CoreModules/Hypergrid/Login/HGStandaloneLoginService.cs new file mode 100644 index 0000000..5ac50f1 --- /dev/null +++ b/OpenSim/Region/CoreModules/Hypergrid/Login/HGStandaloneLoginService.cs | |||
@@ -0,0 +1,349 @@ | |||
1 | /* | ||
2 | * Copyright (c) Contributors, http://opensimulator.org/ | ||
3 | * See CONTRIBUTORS.TXT for a full list of copyright holders. | ||
4 | * | ||
5 | * Redistribution and use in source and binary forms, with or without | ||
6 | * modification, are permitted provided that the following conditions are met: | ||
7 | * * Redistributions of source code must retain the above copyright | ||
8 | * notice, this list of conditions and the following disclaimer. | ||
9 | * * Redistributions in binary form must reproduce the above copyright | ||
10 | * notice, this list of conditions and the following disclaimer in the | ||
11 | * documentation and/or other materials provided with the distribution. | ||
12 | * * Neither the name of the OpenSimulator Project nor the | ||
13 | * names of its contributors may be used to endorse or promote products | ||
14 | * derived from this software without specific prior written permission. | ||
15 | * | ||
16 | * THIS SOFTWARE IS PROVIDED BY THE DEVELOPERS ``AS IS'' AND ANY | ||
17 | * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED | ||
18 | * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE | ||
19 | * DISCLAIMED. IN NO EVENT SHALL THE CONTRIBUTORS BE LIABLE FOR ANY | ||
20 | * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES | ||
21 | * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
22 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND | ||
23 | * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | ||
24 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS | ||
25 | * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | ||
26 | */ | ||
27 | |||
28 | using System; | ||
29 | using System.Collections; | ||
30 | using System.Collections.Generic; | ||
31 | using System.Net; | ||
32 | using System.Reflection; | ||
33 | using System.Text.RegularExpressions; | ||
34 | using OpenSim.Framework; | ||
35 | using OpenSim.Framework.Communications; | ||
36 | using OpenSim.Framework.Communications.Cache; | ||
37 | using OpenSim.Framework.Communications.Capabilities; | ||
38 | using OpenSim.Framework.Servers; | ||
39 | using OpenSim.Region.Framework.Scenes; | ||
40 | using OpenSim.Region.Framework.Interfaces; | ||
41 | |||
42 | using OpenMetaverse; | ||
43 | |||
44 | using log4net; | ||
45 | using Nini.Config; | ||
46 | using Nwc.XmlRpc; | ||
47 | |||
48 | namespace OpenSim.Region.CoreModules.Hypergrid | ||
49 | { | ||
50 | public class HGStandaloneLoginService : LoginService | ||
51 | { | ||
52 | private static readonly ILog m_log = LogManager.GetLogger(MethodBase.GetCurrentMethod().DeclaringType); | ||
53 | |||
54 | protected NetworkServersInfo m_serversInfo; | ||
55 | protected bool m_authUsers = false; | ||
56 | |||
57 | /// <summary> | ||
58 | /// Used by the login service to make requests to the inventory service. | ||
59 | /// </summary> | ||
60 | protected IInterServiceInventoryServices m_interServiceInventoryService; | ||
61 | |||
62 | /// <summary> | ||
63 | /// Used to make requests to the local regions. | ||
64 | /// </summary> | ||
65 | protected ILoginServiceToRegionsConnector m_regionsConnector; | ||
66 | |||
67 | |||
68 | public HGStandaloneLoginService( | ||
69 | UserManagerBase userManager, string welcomeMess, | ||
70 | IInterServiceInventoryServices interServiceInventoryService, | ||
71 | NetworkServersInfo serversInfo, | ||
72 | bool authenticate, LibraryRootFolder libraryRootFolder, ILoginServiceToRegionsConnector regionsConnector) | ||
73 | : base(userManager, libraryRootFolder, welcomeMess) | ||
74 | { | ||
75 | this.m_serversInfo = serversInfo; | ||
76 | m_defaultHomeX = this.m_serversInfo.DefaultHomeLocX; | ||
77 | m_defaultHomeY = this.m_serversInfo.DefaultHomeLocY; | ||
78 | m_authUsers = authenticate; | ||
79 | |||
80 | m_interServiceInventoryService = interServiceInventoryService; | ||
81 | m_regionsConnector = regionsConnector; | ||
82 | m_inventoryService = interServiceInventoryService; | ||
83 | } | ||
84 | |||
85 | public override XmlRpcResponse XmlRpcLoginMethod(XmlRpcRequest request) | ||
86 | { | ||
87 | m_log.Info("[HGLOGIN] HGLogin called " + request.MethodName); | ||
88 | XmlRpcResponse response = base.XmlRpcLoginMethod(request); | ||
89 | Hashtable responseData = (Hashtable)response.Value; | ||
90 | |||
91 | responseData["grid_service"] = m_serversInfo.GridURL; | ||
92 | responseData["grid_service_send_key"] = m_serversInfo.GridSendKey; | ||
93 | responseData["inventory_service"] = m_serversInfo.InventoryURL; | ||
94 | responseData["asset_service"] = m_serversInfo.AssetURL; | ||
95 | responseData["asset_service_send_key"] = m_serversInfo.AssetSendKey; | ||
96 | int x = (Int32)responseData["region_x"]; | ||
97 | int y = (Int32)responseData["region_y"]; | ||
98 | uint ux = (uint)(x / Constants.RegionSize); | ||
99 | uint uy = (uint)(y / Constants.RegionSize); | ||
100 | ulong regionHandle = Util.UIntsToLong(ux, uy); | ||
101 | responseData["region_handle"] = regionHandle.ToString(); | ||
102 | responseData["http_port"] = (UInt32)m_serversInfo.HttpListenerPort; | ||
103 | |||
104 | // Let's remove the seed cap from the login | ||
105 | //responseData.Remove("seed_capability"); | ||
106 | |||
107 | // Let's add the appearance | ||
108 | UUID userID = UUID.Zero; | ||
109 | UUID.TryParse((string)responseData["agent_id"], out userID); | ||
110 | AvatarAppearance appearance = m_userManager.GetUserAppearance(userID); | ||
111 | if (appearance == null) | ||
112 | { | ||
113 | m_log.WarnFormat("[INTER]: Appearance not found for {0}. Creating default.", userID); | ||
114 | appearance = new AvatarAppearance(); | ||
115 | } | ||
116 | |||
117 | responseData["appearance"] = appearance.ToHashTable(); | ||
118 | |||
119 | // Let's also send the auth token | ||
120 | UUID token = UUID.Random(); | ||
121 | responseData["auth_token"] = token.ToString(); | ||
122 | UserProfileData userProfile = m_userManager.GetUserProfile(userID); | ||
123 | if (userProfile != null) | ||
124 | { | ||
125 | userProfile.WebLoginKey = token; | ||
126 | m_userManager.CommitAgent(ref userProfile); | ||
127 | } | ||
128 | |||
129 | return response; | ||
130 | } | ||
131 | |||
132 | public XmlRpcResponse XmlRpcGenerateKeyMethod(XmlRpcRequest request) | ||
133 | { | ||
134 | |||
135 | // Verify the key of who's calling | ||
136 | UUID userID = UUID.Zero; | ||
137 | UUID authKey = UUID.Zero; | ||
138 | UUID.TryParse((string)request.Params[0], out userID); | ||
139 | UUID.TryParse((string)request.Params[1], out authKey); | ||
140 | |||
141 | m_log.InfoFormat("[HGLOGIN] HGGenerateKey called with authToken ", authKey); | ||
142 | string newKey = string.Empty; | ||
143 | |||
144 | if (!(m_userManager is IAuthentication)) | ||
145 | { | ||
146 | m_log.Debug("[HGLOGIN]: UserManager is not IAuthentication service. Returning empty key."); | ||
147 | } | ||
148 | else | ||
149 | { | ||
150 | newKey = ((IAuthentication)m_userManager).GetNewKey(m_serversInfo.UserURL, userID, authKey); | ||
151 | } | ||
152 | |||
153 | XmlRpcResponse response = new XmlRpcResponse(); | ||
154 | response.Value = (string) newKey; | ||
155 | return response; | ||
156 | } | ||
157 | |||
158 | public XmlRpcResponse XmlRpcVerifyKeyMethod(XmlRpcRequest request) | ||
159 | { | ||
160 | foreach (object o in request.Params) | ||
161 | { | ||
162 | if (o != null) | ||
163 | m_log.Debug(" >> Param " + o.ToString()); | ||
164 | else | ||
165 | m_log.Debug(" >> Null"); | ||
166 | } | ||
167 | |||
168 | // Verify the key of who's calling | ||
169 | UUID userID = UUID.Zero; | ||
170 | string authKey = string.Empty; | ||
171 | UUID.TryParse((string)request.Params[0], out userID); | ||
172 | authKey = (string)request.Params[1]; | ||
173 | |||
174 | m_log.InfoFormat("[HGLOGIN] HGVerifyKey called with key ", authKey); | ||
175 | bool success = false; | ||
176 | |||
177 | if (!(m_userManager is IAuthentication)) | ||
178 | { | ||
179 | m_log.Debug("[HGLOGIN]: UserManager is not IAuthentication service. Denying."); | ||
180 | } | ||
181 | else | ||
182 | { | ||
183 | success = ((IAuthentication)m_userManager).VerifyKey(userID, authKey); | ||
184 | } | ||
185 | |||
186 | XmlRpcResponse response = new XmlRpcResponse(); | ||
187 | response.Value = (string)success.ToString(); | ||
188 | return response; | ||
189 | } | ||
190 | |||
191 | public override UserProfileData GetTheUser(string firstname, string lastname) | ||
192 | { | ||
193 | UserProfileData profile = m_userManager.GetUserProfile(firstname, lastname); | ||
194 | if (profile != null) | ||
195 | { | ||
196 | return profile; | ||
197 | } | ||
198 | |||
199 | if (!m_authUsers) | ||
200 | { | ||
201 | //no current user account so make one | ||
202 | m_log.Info("[LOGIN]: No user account found so creating a new one."); | ||
203 | |||
204 | m_userManager.AddUser(firstname, lastname, "test", "", m_defaultHomeX, m_defaultHomeY); | ||
205 | |||
206 | return m_userManager.GetUserProfile(firstname, lastname); | ||
207 | } | ||
208 | |||
209 | return null; | ||
210 | } | ||
211 | |||
212 | public override bool AuthenticateUser(UserProfileData profile, string password) | ||
213 | { | ||
214 | if (!m_authUsers) | ||
215 | { | ||
216 | //for now we will accept any password in sandbox mode | ||
217 | m_log.Info("[LOGIN]: Authorising user (no actual password check)"); | ||
218 | |||
219 | return true; | ||
220 | } | ||
221 | else | ||
222 | { | ||
223 | m_log.Info( | ||
224 | "[LOGIN]: Authenticating " + profile.FirstName + " " + profile.SurName); | ||
225 | |||
226 | if (!password.StartsWith("$1$")) | ||
227 | password = "$1$" + Util.Md5Hash(password); | ||
228 | |||
229 | password = password.Remove(0, 3); //remove $1$ | ||
230 | |||
231 | string s = Util.Md5Hash(password + ":" + profile.PasswordSalt); | ||
232 | |||
233 | bool loginresult = (profile.PasswordHash.Equals(s.ToString(), StringComparison.InvariantCultureIgnoreCase) | ||
234 | || profile.PasswordHash.Equals(password, StringComparison.InvariantCultureIgnoreCase)); | ||
235 | return loginresult; | ||
236 | } | ||
237 | } | ||
238 | |||
239 | protected override RegionInfo RequestClosestRegion(string region) | ||
240 | { | ||
241 | return m_regionsConnector.RequestClosestRegion(region); | ||
242 | } | ||
243 | |||
244 | protected override RegionInfo GetRegionInfo(ulong homeRegionHandle) | ||
245 | { | ||
246 | return m_regionsConnector.RequestNeighbourInfo(homeRegionHandle); | ||
247 | } | ||
248 | |||
249 | protected override RegionInfo GetRegionInfo(UUID homeRegionId) | ||
250 | { | ||
251 | return m_regionsConnector.RequestNeighbourInfo(homeRegionId); | ||
252 | } | ||
253 | |||
254 | |||
255 | /// <summary> | ||
256 | /// Prepare a login to the given region. This involves both telling the region to expect a connection | ||
257 | /// and appropriately customising the response to the user. | ||
258 | /// </summary> | ||
259 | /// <param name="sim"></param> | ||
260 | /// <param name="user"></param> | ||
261 | /// <param name="response"></param> | ||
262 | /// <returns>true if the region was successfully contacted, false otherwise</returns> | ||
263 | protected override bool PrepareLoginToRegion(RegionInfo regionInfo, UserProfileData user, LoginResponse response) | ||
264 | { | ||
265 | IPEndPoint endPoint = regionInfo.ExternalEndPoint; | ||
266 | response.SimAddress = endPoint.Address.ToString(); | ||
267 | response.SimPort = (uint)endPoint.Port; | ||
268 | response.RegionX = regionInfo.RegionLocX; | ||
269 | response.RegionY = regionInfo.RegionLocY; | ||
270 | |||
271 | string capsPath = CapsUtil.GetRandomCapsObjectPath(); | ||
272 | string capsSeedPath = CapsUtil.GetCapsSeedPath(capsPath); | ||
273 | |||
274 | // Don't use the following! It Fails for logging into any region not on the same port as the http server! | ||
275 | // Kept here so it doesn't happen again! | ||
276 | // response.SeedCapability = regionInfo.ServerURI + capsSeedPath; | ||
277 | |||
278 | string seedcap = "http://"; | ||
279 | |||
280 | if (m_serversInfo.HttpUsesSSL) | ||
281 | { | ||
282 | seedcap = "https://" + m_serversInfo.HttpSSLCN + ":" + m_serversInfo.httpSSLPort + capsSeedPath; | ||
283 | } | ||
284 | else | ||
285 | { | ||
286 | seedcap = "http://" + regionInfo.ExternalHostName + ":" + m_serversInfo.HttpListenerPort + capsSeedPath; | ||
287 | } | ||
288 | |||
289 | response.SeedCapability = seedcap; | ||
290 | |||
291 | // Notify the target of an incoming user | ||
292 | m_log.InfoFormat( | ||
293 | "[LOGIN]: Telling {0} @ {1},{2} ({3}) to prepare for client connection", | ||
294 | regionInfo.RegionName, response.RegionX, response.RegionY, regionInfo.ServerURI); | ||
295 | |||
296 | // Update agent with target sim | ||
297 | user.CurrentAgent.Region = regionInfo.RegionID; | ||
298 | user.CurrentAgent.Handle = regionInfo.RegionHandle; | ||
299 | |||
300 | AgentCircuitData agent = new AgentCircuitData(); | ||
301 | agent.AgentID = user.ID; | ||
302 | agent.firstname = user.FirstName; | ||
303 | agent.lastname = user.SurName; | ||
304 | agent.SessionID = user.CurrentAgent.SessionID; | ||
305 | agent.SecureSessionID = user.CurrentAgent.SecureSessionID; | ||
306 | agent.circuitcode = Convert.ToUInt32(response.CircuitCode); | ||
307 | agent.BaseFolder = UUID.Zero; | ||
308 | agent.InventoryFolder = UUID.Zero; | ||
309 | agent.startpos = user.CurrentAgent.Position; | ||
310 | agent.CapsPath = capsPath; | ||
311 | agent.Appearance = m_userManager.GetUserAppearance(user.ID); | ||
312 | if (agent.Appearance == null) | ||
313 | { | ||
314 | m_log.WarnFormat("[INTER]: Appearance not found for {0} {1}. Creating default.", agent.firstname, agent.lastname); | ||
315 | agent.Appearance = new AvatarAppearance(); | ||
316 | } | ||
317 | |||
318 | if (m_regionsConnector.RegionLoginsEnabled) | ||
319 | { | ||
320 | // m_log.Info("[LLStandaloneLoginModule] Informing region about user"); | ||
321 | return m_regionsConnector.NewUserConnection(regionInfo.RegionHandle, agent); | ||
322 | } | ||
323 | |||
324 | return false; | ||
325 | } | ||
326 | |||
327 | public override void LogOffUser(UserProfileData theUser, string message) | ||
328 | { | ||
329 | RegionInfo SimInfo; | ||
330 | try | ||
331 | { | ||
332 | SimInfo = this.m_regionsConnector.RequestNeighbourInfo(theUser.CurrentAgent.Handle); | ||
333 | |||
334 | if (SimInfo == null) | ||
335 | { | ||
336 | m_log.Error("[LOCAL LOGIN]: Region user was in isn't currently logged in"); | ||
337 | return; | ||
338 | } | ||
339 | } | ||
340 | catch (Exception) | ||
341 | { | ||
342 | m_log.Error("[LOCAL LOGIN]: Unable to look up region to log user off"); | ||
343 | return; | ||
344 | } | ||
345 | |||
346 | m_regionsConnector.LogOffUserFromGrid(SimInfo.RegionHandle, theUser.ID, theUser.CurrentAgent.SecureSessionID, "Logging you off"); | ||
347 | } | ||
348 | } | ||
349 | } | ||