Sunshine/sunshine/httpcommon.cpp

192 lines
5.3 KiB
C++
Raw Normal View History

2021-06-08 20:23:39 +00:00
#define BOOST_BIND_GLOBAL_PLACEHOLDERS
#include "process.h"
#include <filesystem>
#include <boost/property_tree/json_parser.hpp>
#include <boost/property_tree/ptree.hpp>
#include <boost/property_tree/xml_parser.hpp>
#include <boost/asio/ssl/context.hpp>
#include <Simple-Web-Server/server_http.hpp>
#include <Simple-Web-Server/server_https.hpp>
#include <boost/asio/ssl/context_base.hpp>
#include "config.h"
#include "crypto.h"
#include "httpcommon.h"
#include "main.h"
#include "network.h"
#include "nvhttp.h"
#include "platform/common.h"
#include "rtsp.h"
#include "utility.h"
#include "uuid.h"
2021-05-29 20:29:10 +00:00
namespace http {
using namespace std::literals;
namespace fs = std::filesystem;
namespace pt = boost::property_tree;
int reload_user_creds(const std::string &file);
2021-06-09 17:12:00 +00:00
bool user_creds_exist(const std::string &file);
2021-05-29 20:29:10 +00:00
std::string unique_id;
net::net_e origin_pin_allowed;
net::net_e origin_web_ui_allowed;
2021-05-29 20:29:10 +00:00
int init() {
bool clean_slate = config::sunshine.flags[config::flag::FRESH_STATE];
origin_pin_allowed = net::from_enum_string(config::nvhttp.origin_pin_allowed);
origin_web_ui_allowed = net::from_enum_string(config::nvhttp.origin_web_ui_allowed);
2021-05-29 20:29:10 +00:00
if(clean_slate) {
unique_id = util::uuid_t::generate().string();
auto dir = std::filesystem::temp_directory_path() / "Sushine"sv;
config::nvhttp.cert = (dir / ("cert-"s + unique_id)).string();
config::nvhttp.pkey = (dir / ("pkey-"s + unique_id)).string();
}
2021-05-29 20:29:10 +00:00
if(!fs::exists(config::nvhttp.pkey) || !fs::exists(config::nvhttp.cert)) {
if(create_creds(config::nvhttp.pkey, config::nvhttp.cert)) {
return -1;
}
2021-05-29 20:29:10 +00:00
}
2021-06-09 17:12:00 +00:00
if(!user_creds_exist(config::sunshine.credentials_file)) {
if(save_user_creds(config::sunshine.credentials_file, "sunshine"s, crypto::rand_alphabet(16), true)) {
return -1;
}
}
2021-05-29 20:29:10 +00:00
if(reload_user_creds(config::sunshine.credentials_file)) {
return -1;
2021-05-29 20:29:10 +00:00
}
return 0;
2021-05-29 20:29:10 +00:00
}
int save_user_creds(const std::string &file, const std::string &username, const std::string &password, bool run_our_mouth) {
2021-05-29 20:29:10 +00:00
pt::ptree outputTree;
2021-06-09 17:12:00 +00:00
if(fs::exists(file)) {
try {
pt::read_json(file, outputTree);
}
catch(std::exception &e) {
BOOST_LOG(error) << "Couldn't read user credentials: "sv << e.what();
return -1;
}
}
auto salt = crypto::rand_alphabet(16);
outputTree.put("username", username);
2021-06-09 17:12:00 +00:00
outputTree.put("salt", salt);
outputTree.put("password", util::hex(crypto::hash(password + salt)).to_string());
2021-05-29 20:29:10 +00:00
try {
pt::write_json(file, outputTree);
}
catch(std::exception &e) {
2021-06-09 17:12:00 +00:00
BOOST_LOG(error) << "generating user credentials: "sv << e.what();
return -1;
2021-05-29 20:29:10 +00:00
}
2021-06-09 17:12:00 +00:00
BOOST_LOG(info) << "New credentials have been created"sv;
if(run_our_mouth) {
BOOST_LOG(info) << "Username: "sv << username;
BOOST_LOG(info) << "Password: "sv << password;
}
2021-06-09 17:12:00 +00:00
2021-05-29 20:29:10 +00:00
return 0;
}
2021-06-09 17:12:00 +00:00
bool user_creds_exist(const std::string &file) {
if(!fs::exists(file)) {
return false;
}
pt::ptree inputTree;
try {
pt::read_json(file, inputTree);
return inputTree.find("username") != inputTree.not_found() &&
inputTree.find("password") != inputTree.not_found() &&
inputTree.find("salt") != inputTree.not_found();
}
catch(std::exception &e) {
BOOST_LOG(error) << "validating user credentials: "sv << e.what();
}
return false;
}
2021-05-29 20:29:10 +00:00
int reload_user_creds(const std::string &file) {
pt::ptree inputTree;
try {
pt::read_json(file, inputTree);
config::sunshine.username = inputTree.get<std::string>("username");
config::sunshine.password = inputTree.get<std::string>("password");
config::sunshine.salt = inputTree.get<std::string>("salt");
}
catch(std::exception &e) {
2021-06-09 17:12:00 +00:00
BOOST_LOG(error) << "loading user credentials: "sv << e.what();
return -1;
2021-05-29 20:29:10 +00:00
}
return 0;
}
2021-05-29 20:29:10 +00:00
int create_creds(const std::string &pkey, const std::string &cert) {
fs::path pkey_path = pkey;
fs::path cert_path = cert;
2021-05-29 20:29:10 +00:00
auto creds = crypto::gen_creds("Sunshine Gamestream Host"sv, 2048);
2021-05-29 20:29:10 +00:00
auto pkey_dir = pkey_path;
auto cert_dir = cert_path;
pkey_dir.remove_filename();
cert_dir.remove_filename();
2021-05-29 20:29:10 +00:00
std::error_code err_code {};
fs::create_directories(pkey_dir, err_code);
if(err_code) {
2021-06-09 17:12:00 +00:00
BOOST_LOG(error) << "Couldn't create directory ["sv << pkey_dir << "] :"sv << err_code.message();
2021-05-29 20:29:10 +00:00
return -1;
}
2021-05-29 20:29:10 +00:00
fs::create_directories(cert_dir, err_code);
if(err_code) {
2021-06-09 17:12:00 +00:00
BOOST_LOG(error) << "Couldn't create directory ["sv << cert_dir << "] :"sv << err_code.message();
2021-05-29 20:29:10 +00:00
return -1;
}
2021-05-29 20:29:10 +00:00
if(write_file(pkey.c_str(), creds.pkey)) {
2021-06-09 17:12:00 +00:00
BOOST_LOG(error) << "Couldn't open ["sv << config::nvhttp.pkey << ']';
2021-05-29 20:29:10 +00:00
return -1;
}
2021-05-29 20:29:10 +00:00
if(write_file(cert.c_str(), creds.x509)) {
2021-06-09 17:12:00 +00:00
BOOST_LOG(error) << "Couldn't open ["sv << config::nvhttp.cert << ']';
2021-05-29 20:29:10 +00:00
return -1;
}
2021-05-29 20:29:10 +00:00
fs::permissions(pkey_path,
fs::perms::owner_read | fs::perms::owner_write,
fs::perm_options::replace, err_code);
2021-05-29 20:29:10 +00:00
if(err_code) {
2021-06-09 17:12:00 +00:00
BOOST_LOG(error) << "Couldn't change permissions of ["sv << config::nvhttp.pkey << "] :"sv << err_code.message();
2021-05-29 20:29:10 +00:00
return -1;
}
2021-05-29 20:29:10 +00:00
fs::permissions(cert_path,
fs::perms::owner_read | fs::perms::group_read | fs::perms::others_read | fs::perms::owner_write,
fs::perm_options::replace, err_code);
2021-05-29 20:29:10 +00:00
if(err_code) {
2021-06-09 17:12:00 +00:00
BOOST_LOG(error) << "Couldn't change permissions of ["sv << config::nvhttp.cert << "] :"sv << err_code.message();
2021-05-29 20:29:10 +00:00
return -1;
}
return 0;
}
} // namespace http