mirror of
https://github.com/LBPUnion/ProjectLighthouse.git
synced 2025-07-22 21:21:28 +00:00
* Reorganize tests into unit/integration pattern * Make DbSets virtual so they can be overridden by tests * Add MessageControllerTests * Implement DigestMiddlewareTests * Refactor SMTPHelper to follow DI pattern which allows for mocking in unit tests. * Fix MailQueueService service registration and shutdown * Implement tests for Status and StatisticsController and reorganize tests * Start working on UserControllerTests * Start refactoring tests to use In-Memory EF provider * Refactor integration tests to reset the database every time Change default unit testing database credentials * Update credentials to use default root with different passwords * Throw exception when integration db is not available instead of falling back to in-memory * Evaluate DbConnected every time * Remove default DbContext constructor * Setup DbContexts with options builder * Convert remaining Moq DbContexts to InMemory ones * Add more tests and use Assert.IsType for testing status code * Add collection attribute to LighthouseServerTest * Remove unused directives and calculate digest in tests * Fix digest calculation in tests * Add test database call * Clear rooms after each test * Fix CommentControllerTests.cs * Disable test parallelization for gameserver tests * Fix failing tests Fix SlotTests Make CreateUser actually add user to database Fix dbConnected Lazy and change expected status codes Properly Remove fragment from url for digest calculation Fix digest calculation for regular requests [skip ci] Remove unused directive Don't use Database CreateUser function Get rid of userId argument for generating random user Rewrite logic for generating random users Fix integration tests * Implement changes from self-code review * Fix registration tests * Replace MailQueueService usages with IMailService
150 lines
No EOL
6.4 KiB
C#
150 lines
No EOL
6.4 KiB
C#
using LBPUnion.ProjectLighthouse.Configuration;
|
|
using LBPUnion.ProjectLighthouse.Extensions;
|
|
using LBPUnion.ProjectLighthouse.Helpers;
|
|
using LBPUnion.ProjectLighthouse.Middlewares;
|
|
using Microsoft.Extensions.Primitives;
|
|
using Org.BouncyCastle.Utilities.Zlib;
|
|
|
|
namespace LBPUnion.ProjectLighthouse.Servers.GameServer.Middlewares;
|
|
|
|
public class DigestMiddleware : Middleware
|
|
{
|
|
private readonly bool computeDigests;
|
|
|
|
public DigestMiddleware(RequestDelegate next, bool computeDigests) : base(next)
|
|
{
|
|
this.computeDigests = computeDigests;
|
|
}
|
|
|
|
#if !DEBUG
|
|
private static readonly HashSet<string> exemptPathList = new()
|
|
{
|
|
"/login",
|
|
"/eula",
|
|
"/announce",
|
|
"/status",
|
|
"/farc_hashes",
|
|
"/t_conf",
|
|
"/network_settings.nws",
|
|
"/ChallengeConfig.xml",
|
|
};
|
|
#endif
|
|
|
|
public override async Task InvokeAsync(HttpContext context)
|
|
{
|
|
// Client digest check.
|
|
if (!context.Request.Cookies.TryGetValue("MM_AUTH", out string? authCookie))
|
|
authCookie = string.Empty;
|
|
string digestPath = context.Request.Path;
|
|
#if !DEBUG
|
|
const string url = "/LITTLEBIGPLANETPS3_XML";
|
|
string strippedPath = digestPath.Contains(url) ? digestPath[url.Length..] : "";
|
|
#endif
|
|
byte[] bodyBytes = await context.Request.BodyReader.ReadAllAsync();
|
|
|
|
bool usedAlternateDigestKey = false;
|
|
|
|
if (this.computeDigests && digestPath.StartsWith("/LITTLEBIGPLANETPS3_XML"))
|
|
{
|
|
// The game sets X-Digest-B on a resource upload instead of X-Digest-A
|
|
string digestHeaderKey = "X-Digest-A";
|
|
bool excludeBodyFromDigest = false;
|
|
if (digestPath.Contains("/upload/"))
|
|
{
|
|
digestHeaderKey = "X-Digest-B";
|
|
excludeBodyFromDigest = true;
|
|
}
|
|
|
|
string clientRequestDigest = CryptoHelper.ComputeDigest
|
|
(digestPath, authCookie, bodyBytes, ServerConfiguration.Instance.DigestKey.PrimaryDigestKey, excludeBodyFromDigest);
|
|
|
|
// Check the digest we've just calculated against the digest header if the game set the header. They should match.
|
|
if (context.Request.Headers.TryGetValue(digestHeaderKey, out StringValues sentDigest))
|
|
{
|
|
if (clientRequestDigest != sentDigest)
|
|
{
|
|
// If we got here, the normal ServerDigestKey failed to validate. Lets try again with the alternate digest key.
|
|
usedAlternateDigestKey = true;
|
|
|
|
clientRequestDigest = CryptoHelper.ComputeDigest
|
|
(digestPath, authCookie, bodyBytes, ServerConfiguration.Instance.DigestKey.AlternateDigestKey, excludeBodyFromDigest);
|
|
if (clientRequestDigest != sentDigest)
|
|
{
|
|
#if DEBUG
|
|
Console.WriteLine("Digest failed");
|
|
Console.WriteLine("digestKey: " + ServerConfiguration.Instance.DigestKey.PrimaryDigestKey);
|
|
Console.WriteLine("altDigestKey: " + ServerConfiguration.Instance.DigestKey.AlternateDigestKey);
|
|
Console.WriteLine("computed digest: " + clientRequestDigest);
|
|
#endif
|
|
// We still failed to validate. Abort the request.
|
|
context.Response.StatusCode = 403;
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
#if !DEBUG
|
|
// The game doesn't start sending digests until after the announcement so if it's not one of those requests
|
|
// and it doesn't include a digest we need to reject the request
|
|
else if (!exemptPathList.Contains(strippedPath))
|
|
{
|
|
context.Response.StatusCode = 403;
|
|
return;
|
|
}
|
|
#endif
|
|
|
|
context.Response.Headers.Add("X-Digest-B", clientRequestDigest);
|
|
context.Request.Body.Position = 0;
|
|
}
|
|
|
|
// This does the same as above, but for the response stream.
|
|
await using MemoryStream responseBuffer = new();
|
|
Stream oldResponseStream = context.Response.Body;
|
|
context.Response.Body = responseBuffer;
|
|
|
|
await this.next(context); // Handle the request so we can get the server digest hash
|
|
responseBuffer.Position = 0;
|
|
|
|
if (responseBuffer.Length > 1000 && context.Request.Headers.AcceptEncoding.Contains("deflate") && (context.Response.ContentType ?? string.Empty).Contains("text/xml"))
|
|
{
|
|
context.Response.Headers.Add("X-Original-Content-Length", responseBuffer.Length.ToString());
|
|
context.Response.Headers.Add("Vary", "Accept-Encoding");
|
|
MemoryStream resultStream = new();
|
|
const int defaultCompressionLevel = 6;
|
|
await using ZOutputStreamLeaveOpen stream = new(resultStream, defaultCompressionLevel);
|
|
await stream.WriteAsync(responseBuffer.ToArray());
|
|
stream.Finish();
|
|
|
|
resultStream.Position = 0;
|
|
context.Response.Headers.Add("Content-Length", resultStream.Length.ToString());
|
|
context.Response.Headers.Add("Content-Encoding", "deflate");
|
|
responseBuffer.SetLength(0);
|
|
await resultStream.CopyToAsync(responseBuffer);
|
|
}
|
|
else
|
|
{
|
|
string headerName = !context.Response.Headers.ContentLength.HasValue
|
|
? "Content-Length"
|
|
: "X-Original-Content-Length";
|
|
context.Response.Headers.Add(headerName, responseBuffer.Length.ToString());
|
|
}
|
|
|
|
// Compute the server digest hash.
|
|
if (this.computeDigests)
|
|
{
|
|
responseBuffer.Position = 0;
|
|
|
|
string digestKey = usedAlternateDigestKey
|
|
? ServerConfiguration.Instance.DigestKey.AlternateDigestKey
|
|
: ServerConfiguration.Instance.DigestKey.PrimaryDigestKey;
|
|
|
|
// Compute the digest for the response.
|
|
string serverDigest = CryptoHelper.ComputeDigest(context.Request.Path, authCookie, responseBuffer.ToArray(), digestKey);
|
|
context.Response.Headers.Add("X-Digest-A", serverDigest);
|
|
}
|
|
|
|
// Copy the buffered response to the actual response stream.
|
|
responseBuffer.Position = 0;
|
|
await responseBuffer.CopyToAsync(oldResponseStream);
|
|
context.Response.Body = oldResponseStream;
|
|
}
|
|
} |