-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
0 parents
commit fe84e34
Showing
5 changed files
with
267 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
# Plex Authentication (in Go!) | ||
|
||
[](https://pkg.go.dev/github.com/BrenekH/logange) | ||
|
||
## Installation | ||
|
||
As a Go library: `go get github.com/BrenekH/go-plexauth` | ||
|
||
As a CLI: `go install github.com/BrenekH/go-plexauth/cli@latest` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,60 @@ | ||
package main | ||
|
||
import ( | ||
"bufio" | ||
"context" | ||
"fmt" | ||
"math/rand" | ||
"os" | ||
|
||
"github.com/BrenekH/go-plexauth" | ||
) | ||
|
||
var letters = []rune("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890") | ||
|
||
func randSeq(n int) string { | ||
b := make([]rune, n) | ||
for i := range b { | ||
b[i] = letters[rand.Intn(len(letters))] | ||
} | ||
return string(b) | ||
} | ||
|
||
const appName string = "Go PlexAuth CLI" | ||
const version string = "0.0.1" | ||
|
||
func main() { | ||
deviceName := input("Please enter a device name: ") | ||
|
||
clientID := fmt.Sprintf("go-plexauth-%s", randSeq(10)) | ||
|
||
pinID, pinCode, err := plexauth.GetPlexPIN(appName, clientID) | ||
if err != nil { | ||
panic(err) | ||
} | ||
|
||
authUrl, err := plexauth.GenerateAuthURL(appName, clientID, pinCode, plexauth.ExtraAuthURLOptions{DeviceName: deviceName, AppVersion: version}) | ||
if err != nil { | ||
panic(err) | ||
} | ||
|
||
fmt.Printf("Please visit %s to authenticate.\n", authUrl) | ||
|
||
authToken, err := plexauth.PollForAuthToken(context.Background(), pinID, pinCode, clientID) | ||
if err != nil { | ||
panic(err) | ||
} | ||
|
||
fmt.Printf("Your authentication token is \"%s\"\n", authToken) | ||
} | ||
|
||
// input mimics Python's input function, which outputs a prompt and | ||
// takes bytes from stdin until a newline and returns a string. | ||
func input(prompt string) string { | ||
fmt.Print(prompt) | ||
scanner := bufio.NewScanner(os.Stdin) | ||
if ok := scanner.Scan(); ok { | ||
return scanner.Text() | ||
} | ||
return "" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
module github.com/BrenekH/go-plexauth | ||
|
||
go 1.17 | ||
|
||
require github.com/google/go-querystring v1.1.0 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
github.com/google/go-cmp v0.5.2 h1:X2ev0eStA3AbceY54o37/0PQ/UWqKEiiO2dKL5OPaFM= | ||
github.com/google/go-cmp v0.5.2/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= | ||
github.com/google/go-querystring v1.1.0 h1:AnCroh3fv4ZBgVIf1Iwtovgjaw/GiKJo8M8yD/fhyJ8= | ||
github.com/google/go-querystring v1.1.0/go.mod h1:Kcdr2DB4koayq7X8pmAG4sNG59So17icRSOU623lUBU= | ||
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,188 @@ | ||
package plexauth | ||
|
||
import ( | ||
"context" | ||
"encoding/json" | ||
"fmt" | ||
"io/ioutil" | ||
"net/http" | ||
"strings" | ||
"time" | ||
|
||
"github.com/google/go-querystring/query" | ||
) | ||
|
||
// IsTokenValid checks if a Plex token is valid using the Plex API. | ||
func IsTokenValid(appName, clientID, token string) (bool, error) { | ||
return IsTokenValidContext(context.Background(), appName, clientID, token) | ||
} | ||
|
||
// IsTokenValidContext checks if a Plex token is valid using the Plex API and a custom request context. | ||
func IsTokenValidContext(ctx context.Context, appName, clientID, token string) (bool, error) { | ||
data := strings.NewReader(fmt.Sprintf(`X-Plex-Product=%s&X-Plex-Client-Identifier=%s&X-Plex-Token=%s`, appName, clientID, token)) | ||
|
||
req, err := http.NewRequestWithContext(ctx, "GET", "https://plex.tv/api/v2/user", data) | ||
if err != nil { | ||
return false, fmt.Errorf("IsTokenValid: %w", err) | ||
} | ||
|
||
req.Header.Set("Accept", "application/json") | ||
req.Header.Set("Content-Type", "application/x-www-form-urlencoded") | ||
|
||
resp, err := http.DefaultClient.Do(req) | ||
if err != nil { | ||
return false, fmt.Errorf("IsTokenValid: %w", err) | ||
} | ||
resp.Body.Close() | ||
|
||
switch resp.StatusCode { | ||
case 200: | ||
return true, nil | ||
case 401: | ||
return false, nil | ||
default: | ||
return false, fmt.Errorf("IsTokenValid: unable to determine token validity, received status code %v", resp.StatusCode) | ||
} | ||
} | ||
|
||
// GetPlexPIN requests a new claimable pin from the Plex API which can be used to authenticate a user. | ||
func GetPlexPIN(appName, clientID string) (pinID int, pinCode string, err error) { | ||
return GetPlexPINContext(context.Background(), appName, clientID) | ||
} | ||
|
||
// GetPlexPINContext requests a new claimable pin from the Plex API which can be used to authenticate a user. | ||
func GetPlexPINContext(ctx context.Context, appName, clientID string) (pinID int, pinCode string, err error) { | ||
data := strings.NewReader(fmt.Sprintf(`strong=true&X-Plex-Product=%s&X-Plex-Client-Identifier=%s`, appName, clientID)) | ||
|
||
req, err := http.NewRequestWithContext(ctx, "POST", "https://plex.tv/api/v2/pins", data) | ||
if err != nil { | ||
return 0, "", fmt.Errorf("GetPlexPIN: %w", err) | ||
} | ||
|
||
req.Header.Set("Accept", "application/json") | ||
req.Header.Set("Content-Type", "application/x-www-form-urlencoded") | ||
|
||
resp, err := http.DefaultClient.Do(req) | ||
if err != nil { | ||
return 0, "", fmt.Errorf("GetPlexPIN: %w", err) | ||
} | ||
defer resp.Body.Close() | ||
|
||
b, err := ioutil.ReadAll(resp.Body) | ||
if err != nil { | ||
return 0, "", fmt.Errorf("GetPlexPIN: %w", err) | ||
} | ||
|
||
pinResp := plexPINResponse{} | ||
if err = json.Unmarshal(b, &pinResp); err != nil { | ||
return 0, "", fmt.Errorf("GetPlexPIN: %w", err) | ||
} | ||
|
||
return pinResp.ID, pinResp.Code, nil | ||
} | ||
|
||
// GenerateAuthURL creates an authorization link that a user can visit to authorize an application. | ||
// The application name, unique client id, and pin code are all required for the link to work. | ||
// | ||
// To send extra info that can be displayed on the Authorized Devices dashboard, the ExtraAuthURLOptions struct can be used. | ||
func GenerateAuthURL(appName, clientID, pinCode string, extraOpts ExtraAuthURLOptions) (string, error) { | ||
// Copy all parameters into a single encodeable struct | ||
queryOpts := authURLQueryOpts{ | ||
AppName: appName, | ||
ClientID: clientID, | ||
PinCode: pinCode, | ||
AppVersion: extraOpts.AppVersion, | ||
DeviceName: extraOpts.DeviceName, | ||
Device: extraOpts.Device, | ||
Platform: extraOpts.Platform, | ||
PlatformVersion: extraOpts.PlatformVersion, | ||
} | ||
|
||
v, err := query.Values(queryOpts) | ||
if err != nil { | ||
return "", fmt.Errorf("GenerateAuthURL: %w", err) | ||
} | ||
|
||
optsStr := v.Encode() | ||
|
||
return "https://app.plex.tv/auth#?" + optsStr, nil | ||
} | ||
|
||
// PollForAuthToken gets a new auth token by waiting for the user to authenticate the pin in a web browser. | ||
// | ||
// A custom context is required, but will be restricted to a 30 minute timeout. This is because Plex pins are | ||
// only valid for 30 minutes. | ||
func PollForAuthToken(inCtx context.Context, pinID int, pinCode, clientID string) (string, error) { | ||
// Set a maximum timeout to 30 minutes, since that's how long a pin is good for. | ||
ctx, cancel := context.WithTimeout(inCtx, 30*time.Minute) | ||
defer cancel() | ||
|
||
for { | ||
select { | ||
case <-time.After(time.Second): | ||
//? Should errors be cause for immediate termination, or should a simple warning be printed to the console? | ||
|
||
data := strings.NewReader(fmt.Sprintf(`code=%s&X-Plex-Client-Identifier=%s`, pinCode, clientID)) | ||
req, err := http.NewRequestWithContext(ctx, "GET", fmt.Sprintf("https://plex.tv/api/v2/pins/%v", pinID), data) | ||
if err != nil { | ||
return "", fmt.Errorf("PollForAuthToken: %w", err) | ||
} | ||
|
||
req.Header.Set("Accept", "application/json") | ||
req.Header.Set("Content-Type", "application/x-www-form-urlencoded") | ||
|
||
resp, err := http.DefaultClient.Do(req) | ||
if err != nil { | ||
return "", fmt.Errorf("PollForAuthToken: %w", err) | ||
} | ||
|
||
b, err := ioutil.ReadAll(resp.Body) | ||
resp.Body.Close() // To avoid accumulating 1800 response bodies using defer, just close the body as soon as it's done being used. | ||
if err != nil { | ||
return "", fmt.Errorf("PollForAuthToken: %w", err) | ||
} | ||
|
||
respStruct := authTokenResp{} | ||
if err = json.Unmarshal(b, &respStruct); err != nil { | ||
return "", fmt.Errorf("PollForAuthToken: %w", err) | ||
} | ||
|
||
if respStruct.AuthToken != nil { | ||
return *(respStruct.AuthToken), nil | ||
} | ||
|
||
case <-ctx.Done(): | ||
return "", fmt.Errorf("PollForAuthToken: could not retrieve auth token, exceeded context") | ||
} | ||
} | ||
} | ||
|
||
// ExtraAuthURLOptions provides a way to provide extra metadata about the device being authorized. | ||
// Any zero-value will be omitted from the final authentication url. | ||
type ExtraAuthURLOptions struct { | ||
AppVersion string | ||
DeviceName string | ||
Device string // Small descriptor of the device | ||
Platform string // Determines what icon is used in the authorized devices dashboard. | ||
PlatformVersion string | ||
} | ||
|
||
type authURLQueryOpts struct { | ||
ClientID string `url:"clientID"` | ||
PinCode string `url:"code"` | ||
AppName string `url:"context[device][product]"` | ||
AppVersion string `url:"context[device][version],omitempty"` | ||
DeviceName string `url:"context[device][deviceName],omitempty"` | ||
Device string `url:"context[device][device],omitempty"` | ||
Platform string `url:"context[device][platform],omitempty"` | ||
PlatformVersion string `url:"context[device][platformVersion],omitempty"` | ||
} | ||
|
||
type plexPINResponse struct { | ||
ID int `json:"id"` | ||
Code string `json:"code"` | ||
} | ||
|
||
type authTokenResp struct { | ||
AuthToken *string `json:"authToken"` | ||
} |