Replace auth.txt with SQLite auth database (#7279)

* Replace auth.txt with SQLite auth database
This commit is contained in:
Ben Deutsch 2018-08-05 13:13:38 +02:00 committed by Nils Dagsson Moskopp
parent a96e24cb15
commit c5318d9e1a
Signed by: erle
GPG Key ID: A3BC671C35191080
1 changed files with 37 additions and 82 deletions

View File

@ -4,72 +4,22 @@
-- Builtin authentication handler -- Builtin authentication handler
-- --
local auth_file_path = core.get_worldpath().."/auth.txt" -- Make the auth object private, deny access to mods
local auth_table = {} local core_auth = core.auth
core.auth = nil
local function read_auth_file()
local newtable = {}
local file, errmsg = io.open(auth_file_path, 'rb')
if not file then
core.log("info", auth_file_path.." could not be opened for reading ("..errmsg.."); assuming new world")
return
end
for line in file:lines() do
if line ~= "" then
local fields = line:split(":", true)
local name, password, privilege_string, last_login = unpack(fields)
last_login = tonumber(last_login)
if not (name and password and privilege_string) then
error("Invalid line in auth.txt: "..dump(line))
end
local privileges = core.string_to_privs(privilege_string)
newtable[name] = {password=password, privileges=privileges, last_login=last_login}
end
end
io.close(file)
auth_table = newtable
core.notify_authentication_modified()
end
local function save_auth_file()
local newtable = {}
-- Check table for validness before attempting to save
for name, stuff in pairs(auth_table) do
assert(type(name) == "string")
assert(name ~= "")
assert(type(stuff) == "table")
assert(type(stuff.password) == "string")
assert(type(stuff.privileges) == "table")
assert(stuff.last_login == nil or type(stuff.last_login) == "number")
end
local content = {}
for name, stuff in pairs(auth_table) do
local priv_string = core.privs_to_string(stuff.privileges)
local parts = {name, stuff.password, priv_string, stuff.last_login or ""}
content[#content + 1] = table.concat(parts, ":")
end
if not core.safe_file_write(auth_file_path, table.concat(content, "\n")) then
error(auth_file_path.." could not be written to")
end
end
read_auth_file()
core.builtin_auth_handler = { core.builtin_auth_handler = {
get_auth = function(name) get_auth = function(name)
assert(type(name) == "string") assert(type(name) == "string")
-- Figure out what password to use for a new player (singleplayer local auth_entry = core_auth.read(name)
-- always has an empty password, otherwise use default, which is -- If no such auth found, return nil
-- usually empty too) if not auth_entry then
local new_password_hash = ""
-- If not in authentication table, return nil
if not auth_table[name] then
return nil return nil
end end
-- Figure out what privileges the player should have. -- Figure out what privileges the player should have.
-- Take a copy of the privilege table -- Take a copy of the privilege table
local privileges = {} local privileges = {}
for priv, _ in pairs(auth_table[name].privileges) do for priv, _ in pairs(auth_entry.privileges) do
privileges[priv] = true privileges[priv] = true
end end
-- If singleplayer, give all privileges except those marked as give_to_singleplayer = false -- If singleplayer, give all privileges except those marked as give_to_singleplayer = false
@ -89,85 +39,89 @@ core.builtin_auth_handler = {
end end
-- All done -- All done
return { return {
password = auth_table[name].password, password = auth_entry.password,
privileges = privileges, privileges = privileges,
-- Is set to nil if unknown -- Is set to nil if unknown
last_login = auth_table[name].last_login, last_login = auth_entry.last_login,
} }
end, end,
create_auth = function(name, password) create_auth = function(name, password)
assert(type(name) == "string") assert(type(name) == "string")
assert(type(password) == "string") assert(type(password) == "string")
core.log('info', "Built-in authentication handler adding player '"..name.."'") core.log('info', "Built-in authentication handler adding player '"..name.."'")
auth_table[name] = { return core_auth.create({
name = name,
password = password, password = password,
privileges = core.string_to_privs(core.settings:get("default_privs")), privileges = core.string_to_privs(core.settings:get("default_privs")),
last_login = os.time(), last_login = os.time(),
} })
save_auth_file()
end, end,
delete_auth = function(name) delete_auth = function(name)
assert(type(name) == "string") assert(type(name) == "string")
if not auth_table[name] then local auth_entry = core_auth.read(name)
if not auth_entry then
return false return false
end end
core.log('info', "Built-in authentication handler deleting player '"..name.."'") core.log('info', "Built-in authentication handler deleting player '"..name.."'")
auth_table[name] = nil return core_auth.delete(name)
save_auth_file()
return true
end, end,
set_password = function(name, password) set_password = function(name, password)
assert(type(name) == "string") assert(type(name) == "string")
assert(type(password) == "string") assert(type(password) == "string")
if not auth_table[name] then local auth_entry = core_auth.read(name)
if not auth_entry then
core.builtin_auth_handler.create_auth(name, password) core.builtin_auth_handler.create_auth(name, password)
else else
core.log('info', "Built-in authentication handler setting password of player '"..name.."'") core.log('info', "Built-in authentication handler setting password of player '"..name.."'")
auth_table[name].password = password auth_entry.password = password
save_auth_file() core_auth.save(auth_entry)
end end
return true return true
end, end,
set_privileges = function(name, privileges) set_privileges = function(name, privileges)
assert(type(name) == "string") assert(type(name) == "string")
assert(type(privileges) == "table") assert(type(privileges) == "table")
if not auth_table[name] then local auth_entry = core_auth.read(name)
core.builtin_auth_handler.create_auth(name, if not auth_entry then
auth_entry = core.builtin_auth_handler.create_auth(name,
core.get_password_hash(name, core.get_password_hash(name,
core.settings:get("default_password"))) core.settings:get("default_password")))
end end
-- Run grant callbacks -- Run grant callbacks
for priv, _ in pairs(privileges) do for priv, _ in pairs(privileges) do
if not auth_table[name].privileges[priv] then if not auth_entry.privileges[priv] then
core.run_priv_callbacks(name, priv, nil, "grant") core.run_priv_callbacks(name, priv, nil, "grant")
end end
end end
-- Run revoke callbacks -- Run revoke callbacks
for priv, _ in pairs(auth_table[name].privileges) do for priv, _ in pairs(auth_entry.privileges) do
if not privileges[priv] then if not privileges[priv] then
core.run_priv_callbacks(name, priv, nil, "revoke") core.run_priv_callbacks(name, priv, nil, "revoke")
end end
end end
auth_table[name].privileges = privileges auth_entry.privileges = privileges
core_auth.save(auth_entry)
core.notify_authentication_modified(name) core.notify_authentication_modified(name)
save_auth_file()
end, end,
reload = function() reload = function()
read_auth_file() core_auth.reload()
return true return true
end, end,
record_login = function(name) record_login = function(name)
assert(type(name) == "string") assert(type(name) == "string")
assert(auth_table[name]).last_login = os.time() local auth_entry = core_auth.read(name)
save_auth_file() assert(auth_entry)
auth_entry.last_login = os.time()
core_auth.save(auth_entry)
end, end,
iterate = function() iterate = function()
local names = {} local names = {}
for k in pairs(auth_table) do local nameslist = core_auth.list_names()
names[k] = true for k,v in pairs(nameslist) do
names[v] = true
end end
return pairs(names) return pairs(names)
end, end,
@ -177,12 +131,13 @@ core.register_on_prejoinplayer(function(name, ip)
if core.registered_auth_handler ~= nil then if core.registered_auth_handler ~= nil then
return -- Don't do anything if custom auth handler registered return -- Don't do anything if custom auth handler registered
end end
if auth_table[name] ~= nil then local auth_entry = core_auth.read(name)
if auth_entry ~= nil then
return return
end end
local name_lower = name:lower() local name_lower = name:lower()
for k in pairs(auth_table) do for k in core.builtin_auth_handler.iterate() do
if k:lower() == name_lower then if k:lower() == name_lower then
return string.format("\nCannot create new player called '%s'. ".. return string.format("\nCannot create new player called '%s'. "..
"Another account called '%s' is already registered. ".. "Another account called '%s' is already registered. "..