ConnectionManager.Whitelist.cs 8.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221
  1. using System.Linq;
  2. using System.Threading.Tasks;
  3. using Content.Server.Connection.Whitelist;
  4. using Content.Server.Connection.Whitelist.Conditions;
  5. using Content.Server.Database;
  6. using Content.Shared.CCVar;
  7. using Content.Shared.Database;
  8. using Content.Shared.Players.PlayTimeTracking;
  9. using Robust.Shared.Network;
  10. namespace Content.Server.Connection;
  11. /// <summary>
  12. /// Handles whitelist conditions for incoming connections.
  13. /// </summary>
  14. public sealed partial class ConnectionManager
  15. {
  16. private PlayerConnectionWhitelistPrototype[]? _whitelists;
  17. private void InitializeWhitelist()
  18. {
  19. _cfg.OnValueChanged(CCVars.WhitelistPrototypeList, UpdateWhitelists, true);
  20. }
  21. private void UpdateWhitelists(string s)
  22. {
  23. var list = new List<PlayerConnectionWhitelistPrototype>();
  24. foreach (var id in s.Split(','))
  25. {
  26. if (_prototypeManager.TryIndex(id, out PlayerConnectionWhitelistPrototype? prototype))
  27. {
  28. list.Add(prototype);
  29. }
  30. else
  31. {
  32. _sawmill.Fatal($"Whitelist prototype {id} does not exist. Denying all connections.");
  33. _whitelists = null; // Invalidate the list, causes deny on all connections.
  34. return;
  35. }
  36. }
  37. _whitelists = list.ToArray();
  38. }
  39. private bool IsValid(PlayerConnectionWhitelistPrototype whitelist, int playerCount)
  40. {
  41. return playerCount >= whitelist.MinimumPlayers && playerCount <= whitelist.MaximumPlayers;
  42. }
  43. public async Task<(bool isWhitelisted, string? denyMessage)> IsWhitelisted(PlayerConnectionWhitelistPrototype whitelist, NetUserData data, ISawmill sawmill)
  44. {
  45. var cacheRemarks = await _db.GetAllAdminRemarks(data.UserId);
  46. var cachePlaytime = await _db.GetPlayTimes(data.UserId);
  47. foreach (var condition in whitelist.Conditions)
  48. {
  49. bool matched;
  50. string denyMessage;
  51. switch (condition)
  52. {
  53. case ConditionAlwaysMatch:
  54. matched = true;
  55. denyMessage = Loc.GetString("whitelist-always-deny");
  56. break;
  57. case ConditionManualWhitelistMembership:
  58. matched = await CheckConditionManualWhitelist(data);
  59. denyMessage = Loc.GetString("whitelist-manual");
  60. break;
  61. case ConditionManualBlacklistMembership:
  62. matched = await CheckConditionManualBlacklist(data);
  63. denyMessage = Loc.GetString("whitelist-blacklisted");
  64. break;
  65. case ConditionNotesDateRange conditionNotes:
  66. matched = CheckConditionNotesDateRange(conditionNotes, cacheRemarks);
  67. denyMessage = Loc.GetString("whitelist-notes");
  68. break;
  69. case ConditionPlayerCount conditionPlayerCount:
  70. matched = CheckConditionPlayerCount(conditionPlayerCount);
  71. denyMessage = Loc.GetString("whitelist-player-count");
  72. break;
  73. case ConditionPlaytime conditionPlaytime:
  74. matched = CheckConditionPlaytime(conditionPlaytime, cachePlaytime);
  75. denyMessage = Loc.GetString("whitelist-playtime", ("minutes", conditionPlaytime.MinimumPlaytime));
  76. break;
  77. case ConditionNotesPlaytimeRange conditionNotesPlaytimeRange:
  78. matched = CheckConditionNotesPlaytimeRange(conditionNotesPlaytimeRange, cacheRemarks, cachePlaytime);
  79. denyMessage = Loc.GetString("whitelist-notes");
  80. break;
  81. default:
  82. throw new NotImplementedException($"Whitelist condition {condition.GetType().Name} not implemented");
  83. }
  84. sawmill.Verbose($"User {data.UserName} whitelist condition {condition.GetType().Name} result: {matched}");
  85. sawmill.Verbose($"Action: {condition.Action.ToString()}");
  86. switch (condition.Action)
  87. {
  88. case ConditionAction.Allow:
  89. if (matched)
  90. {
  91. sawmill.Verbose($"User {data.UserName} passed whitelist condition {condition.GetType().Name} and it's a breaking condition");
  92. return (true, denyMessage);
  93. }
  94. break;
  95. case ConditionAction.Deny:
  96. if (matched)
  97. {
  98. sawmill.Verbose($"User {data.UserName} failed whitelist condition {condition.GetType().Name}");
  99. return (false, denyMessage);
  100. }
  101. break;
  102. default:
  103. sawmill.Verbose($"User {data.UserName} failed whitelist condition {condition.GetType().Name} but it's not a breaking condition");
  104. break;
  105. }
  106. }
  107. sawmill.Verbose($"User {data.UserName} passed all whitelist conditions");
  108. return (true, null);
  109. }
  110. #region Condition Checking
  111. private async Task<bool> CheckConditionManualWhitelist(NetUserData data)
  112. {
  113. return await _db.GetWhitelistStatusAsync(data.UserId);
  114. }
  115. private async Task<bool> CheckConditionManualBlacklist(NetUserData data)
  116. {
  117. return await _db.GetBlacklistStatusAsync(data.UserId);
  118. }
  119. private bool CheckConditionNotesDateRange(ConditionNotesDateRange conditionNotes, List<IAdminRemarksRecord> remarks)
  120. {
  121. var range = DateTime.UtcNow.AddDays(-conditionNotes.Range);
  122. return CheckRemarks(remarks,
  123. conditionNotes.IncludeExpired,
  124. conditionNotes.IncludeSecret,
  125. conditionNotes.MinimumSeverity,
  126. conditionNotes.MinimumNotes,
  127. adminRemarksRecord => adminRemarksRecord.CreatedAt > range);
  128. }
  129. private bool CheckConditionPlayerCount(ConditionPlayerCount conditionPlayerCount)
  130. {
  131. var count = _plyMgr.PlayerCount;
  132. return count >= conditionPlayerCount.MinimumPlayers && count <= conditionPlayerCount.MaximumPlayers;
  133. }
  134. private bool CheckConditionPlaytime(ConditionPlaytime conditionPlaytime, List<PlayTime> playtime)
  135. {
  136. var tracker = playtime.Find(p => p.Tracker == PlayTimeTrackingShared.TrackerOverall);
  137. if (tracker is null)
  138. {
  139. return false;
  140. }
  141. return tracker.TimeSpent.TotalMinutes >= conditionPlaytime.MinimumPlaytime;
  142. }
  143. private bool CheckConditionNotesPlaytimeRange(
  144. ConditionNotesPlaytimeRange conditionNotesPlaytimeRange,
  145. List<IAdminRemarksRecord> remarks,
  146. List<PlayTime> playtime)
  147. {
  148. var overallTracker = playtime.Find(p => p.Tracker == PlayTimeTrackingShared.TrackerOverall);
  149. if (overallTracker is null)
  150. {
  151. return false;
  152. }
  153. return CheckRemarks(remarks,
  154. conditionNotesPlaytimeRange.IncludeExpired,
  155. conditionNotesPlaytimeRange.IncludeSecret,
  156. conditionNotesPlaytimeRange.MinimumSeverity,
  157. conditionNotesPlaytimeRange.MinimumNotes,
  158. adminRemarksRecord => adminRemarksRecord.PlaytimeAtNote >= overallTracker.TimeSpent - TimeSpan.FromMinutes(conditionNotesPlaytimeRange.Range));
  159. }
  160. private bool CheckRemarks(List<IAdminRemarksRecord> remarks, bool includeExpired, bool includeSecret, NoteSeverity minimumSeverity, int MinimumNotes, Func<IAdminRemarksRecord, bool> additionalCheck)
  161. {
  162. var utcNow = DateTime.UtcNow;
  163. var notes = remarks.Count(r => r is AdminNoteRecord note && note.Severity >= minimumSeverity && (includeSecret || !note.Secret) && (includeExpired || note.ExpirationTime == null || note.ExpirationTime > utcNow));
  164. if (notes < MinimumNotes)
  165. {
  166. return false;
  167. }
  168. foreach (var adminRemarksRecord in remarks)
  169. {
  170. // If we're not including expired notes, skip them
  171. if (!includeExpired && (adminRemarksRecord.ExpirationTime == null || adminRemarksRecord.ExpirationTime <= utcNow))
  172. continue;
  173. // In order to get the severity of the remark, we need to see if it's an AdminNoteRecord.
  174. if (adminRemarksRecord is not AdminNoteRecord adminNoteRecord)
  175. continue;
  176. // We want to filter out secret notes if we're not including them.
  177. if (!includeSecret && adminNoteRecord.Secret)
  178. continue;
  179. // At this point, we need to remove the note if it's not within the severity range.
  180. if (adminNoteRecord.Severity < minimumSeverity)
  181. continue;
  182. // Perform the additional check specific to each method
  183. if (!additionalCheck(adminRemarksRecord))
  184. continue;
  185. // If we've made it this far, we have a match
  186. return true;
  187. }
  188. // No matches
  189. return false;
  190. }
  191. #endregion
  192. }