250 lines
5.1 KiB
Go
250 lines
5.1 KiB
Go
package proxy
|
|
|
|
import (
|
|
"database/sql"
|
|
"errors"
|
|
"net"
|
|
"time"
|
|
|
|
_ "github.com/mattn/go-sqlite3"
|
|
)
|
|
|
|
type authSQLite3 struct {
|
|
db *sql.DB
|
|
}
|
|
|
|
// Exists reports whether a user is registered.
|
|
func (a authSQLite3) Exists(name string) bool {
|
|
if err := a.init(); err != nil {
|
|
return false
|
|
}
|
|
defer a.close()
|
|
|
|
var name2 string
|
|
err := a.db.QueryRow(`SELECT name FROM user WHERE name = ?;`, name).Scan(&name2)
|
|
return err == nil
|
|
}
|
|
|
|
// Passwd returns the SRP salt and verifier of a user or an error.
|
|
func (a authSQLite3) Passwd(name string) (salt, verifier []byte, err error) {
|
|
if err = a.init(); err != nil {
|
|
return
|
|
}
|
|
defer a.close()
|
|
|
|
a.db.QueryRow(`SELECT salt, verifier FROM user WHERE name = ?;`, name).Scan(&salt, &verifier)
|
|
a.updateTimestamp(name)
|
|
return
|
|
}
|
|
|
|
// SetPasswd creates a password entry if necessary
|
|
// and sets the password of a user.
|
|
func (a authSQLite3) SetPasswd(name string, salt, verifier []byte) error {
|
|
if err := a.init(); err != nil {
|
|
return err
|
|
}
|
|
defer a.close()
|
|
|
|
_, err := a.db.Exec(`REPLACE INTO user (name, salt, verifier) VALUES (?, ?, ?);`, name, salt, verifier)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
a.updateTimestamp(name)
|
|
return nil
|
|
}
|
|
|
|
// Timestamp returns the last time an authentication entry was accessed
|
|
// or an error.
|
|
func (a authSQLite3) Timestamp(name string) (time.Time, error) {
|
|
if err := a.init(); err != nil {
|
|
return time.Time{}, err
|
|
}
|
|
defer a.close()
|
|
|
|
var tstr string
|
|
err := a.db.QueryRow(`SELECT timestamp FROM user WHERE name = ?;`, name).Scan(&tstr)
|
|
if err != nil {
|
|
return time.Time{}, err
|
|
}
|
|
|
|
return time.Parse("2006-01-02 15:04:05", tstr)
|
|
}
|
|
|
|
// Import deletes all users and adds the passed users.
|
|
func (a authSQLite3) Import(in []user) {
|
|
if err := a.init(); err != nil {
|
|
return
|
|
}
|
|
defer a.close()
|
|
|
|
a.db.Exec(`DELETE FROM user;`)
|
|
for _, u := range in {
|
|
a.SetPasswd(u.name, u.salt, u.verifier)
|
|
a.db.Query(`UPDATE user SET timestamp = ? WHERE name = ?;`, u.timestamp.Format("2006-01-02 15:04:05"), u.name)
|
|
}
|
|
}
|
|
|
|
// Export returns data that can be processed by Import
|
|
// or an error.
|
|
func (a authSQLite3) Export() ([]user, error) {
|
|
if err := a.init(); err != nil {
|
|
return nil, err
|
|
}
|
|
defer a.close()
|
|
|
|
rows, err := a.db.Query(`SELECT * FROM user;`)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer rows.Close()
|
|
|
|
var names []string
|
|
for rows.Next() {
|
|
var name string
|
|
if err := rows.Scan(&name); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
names = append(names, name)
|
|
}
|
|
|
|
var out []user
|
|
for _, name := range names {
|
|
u := user{name: name}
|
|
|
|
u.timestamp, err = a.Timestamp(u.name)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
u.salt, u.verifier, err = a.Passwd(u.name)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
out = append(out, u)
|
|
}
|
|
|
|
return out, nil
|
|
}
|
|
|
|
// Ban adds a ban entry for a network address and an associated name.
|
|
func (a authSQLite3) Ban(addr, name string) error {
|
|
if err := a.init(); err != nil {
|
|
return err
|
|
}
|
|
defer a.close()
|
|
|
|
if _, err := a.db.Exec(`INSERT INTO ban (addr, name) VALUES (?, ?);`, addr, name); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Unban deletes a ban entry. It accepts both network addresses
|
|
// and player names.
|
|
func (a authSQLite3) Unban(id string) error {
|
|
if err := a.init(); err != nil {
|
|
return err
|
|
}
|
|
defer a.close()
|
|
|
|
if _, err := a.db.Exec(`DELETE FROM ban WHERE addr = ? OR name = ?;`, id, id); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Banned reports whether a network address is banned.
|
|
func (a authSQLite3) Banned(addr *net.UDPAddr) bool {
|
|
if err := a.init(); err != nil {
|
|
return true
|
|
}
|
|
defer a.close()
|
|
|
|
var name string
|
|
if err := a.db.QueryRow(`SELECT name FROM ban WHERE addr = ?;`, addr.IP.String()).Scan(&name); err != nil {
|
|
if errors.Is(err, sql.ErrNoRows) {
|
|
return false
|
|
}
|
|
|
|
return true
|
|
}
|
|
|
|
return true
|
|
}
|
|
|
|
// ImportBans deletes all ban entries and adds the passed entries.
|
|
func (a authSQLite3) ImportBans(in []ban) {
|
|
if err := a.init(); err != nil {
|
|
return
|
|
}
|
|
defer a.close()
|
|
|
|
a.db.Exec(`DELETE FROM ban;`)
|
|
for _, b := range in {
|
|
a.Ban(b.addr, b.name)
|
|
}
|
|
}
|
|
|
|
// ExportBans returns data that can be processed by ImportBans
|
|
// or an error.
|
|
func (a authSQLite3) ExportBans() ([]ban, error) {
|
|
if err := a.init(); err != nil {
|
|
return nil, err
|
|
}
|
|
defer a.close()
|
|
|
|
rows, err := a.db.Query(`SELECT * FROM ban;`)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer rows.Close()
|
|
|
|
var out []ban
|
|
for rows.Next() {
|
|
var b ban
|
|
if err := rows.Scan(&b.addr, &b.name); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
out = append(out, b)
|
|
}
|
|
|
|
return out, nil
|
|
}
|
|
|
|
func (a authSQLite3) updateTimestamp(name string) {
|
|
a.db.Exec(`UPDATE user SET timestamp = datetime("now") WHERE name = ?;`, name)
|
|
}
|
|
|
|
func (a *authSQLite3) init() error {
|
|
var err error
|
|
a.db, err = sql.Open("sqlite3", Path("auth.sqlite3"))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
init := `CREATE TABLE IF NOT EXISTS user (
|
|
name VARCHAR(20) PRIMARY KEY NOT NULL,
|
|
salt BLOB NOT NULL,
|
|
verifier BLOB NOT NULL,
|
|
timestamp DATETIME DEFAULT CURRENT_TIMESTAMP);
|
|
CREATE TABLE IF NOT EXISTS ban (
|
|
addr VARCHAR(39) PRIMARY KEY NOT NULL,
|
|
name VARCHAR(20));`
|
|
|
|
if _, err := a.db.Exec(init); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (a authSQLite3) close() error {
|
|
return a.db.Close()
|
|
}
|