multiserver/auth.go

186 lines
3.8 KiB
Go
Raw Normal View History

2021-01-24 05:00:26 -08:00
package main
import (
"crypto/rand"
2021-04-22 03:33:50 -07:00
"database/sql"
"encoding/base64"
2021-04-22 03:33:50 -07:00
"errors"
"log"
"strings"
_ "github.com/mattn/go-sqlite3"
)
2021-01-11 12:45:46 -08:00
const (
2021-04-01 01:28:28 -07:00
_ = 1 << iota
AuthMechSRP
AuthMechFirstSRP
2021-01-11 12:45:46 -08:00
)
var passPhrase []byte
2021-01-14 11:18:58 -08:00
func encodeVerifierAndSalt(s, v []byte) string {
return base64.StdEncoding.EncodeToString(s) + "#" + base64.StdEncoding.EncodeToString(v)
}
func decodeVerifierAndSalt(src string) ([]byte, []byte, error) {
sString := strings.Split(src, "#")[0]
vString := strings.Split(src, "#")[1]
s, err := base64.StdEncoding.DecodeString(sString)
if err != nil {
return nil, nil, err
}
v, err := base64.StdEncoding.DecodeString(vString)
if err != nil {
return nil, nil, err
}
return s, v, nil
}
2021-04-22 02:17:03 -07:00
func authDB() (*DB, error) {
sqlite3 := func() (*DB, error) {
return OpenSQLite3("auth.sqlite", `CREATE TABLE IF NOT EXISTS auth (
name VARCHAR(32) PRIMARY KEY NOT NULL,
password VARCHAR(512) NOT NULL
);
CREATE TABLE IF NOT EXISTS privileges (
name VARCHAR(32) PRIMARY KEY NOT NULL,
privileges VARCHAR(1024)
);
CREATE TABLE IF NOT EXISTS ban (
addr VARCHAR(39) PRIMARY KEY NOT NULL,
name VARCHAR(32) NOT NULL
);`)
}
2021-01-10 13:45:45 -08:00
2021-04-22 02:17:03 -07:00
psql := func(host, name, user, password string, port int) (*DB, error) {
return OpenPSQL(host, name, user, password, `CREATE TABLE IF NOT EXISTS auth (
name VARCHAR(32) PRIMARY KEY NOT NULL,
password VARCHAR(512) NOT NULL
);
CREATE TABLE IF NOT EXISTS privileges (
name VARCHAR(32) PRIMARY KEY NOT NULL,
privileges VARCHAR(1024)
);
CREATE TABLE IF NOT EXISTS ban (
addr VARCHAR(39) PRIMARY KEY NOT NULL,
name VARCHAR(32) NOT NULL
);`, port)
}
db, ok := ConfKey("psql_db").(string)
if !ok {
return sqlite3()
}
2021-04-22 02:17:03 -07:00
host, ok := ConfKey("psql_host").(string)
if !ok {
log.Print("PostgreSQL host not set or not a string")
return sqlite3()
}
2021-04-22 02:17:03 -07:00
port, ok := ConfKey("psql_port").(int)
if !ok {
log.Print("PostgreSQL port not set or not an integer")
return sqlite3()
}
user, ok := ConfKey("psql_user").(string)
if !ok {
log.Print("PostgreSQL user not set or not a string")
return sqlite3()
}
password, ok := ConfKey("psql_password").(string)
if !ok {
log.Print("PostgreSQL password not set or not a string")
return sqlite3()
}
return psql(host, db, user, password, port)
}
2021-04-22 02:17:03 -07:00
// CreateUser creates a new entry in the authentication database
func CreateUser(name string, verifier, salt []byte) error {
db, err := authDB()
if err != nil {
return err
}
defer db.Close()
pwd := encodeVerifierAndSalt(salt, verifier)
_, err = db.Exec(`INSERT INTO auth (
name,
password
) VALUES (
2021-04-22 04:40:56 -07:00
$1,
$2
2021-04-22 02:17:03 -07:00
);`, name, pwd)
2021-04-01 01:28:28 -07:00
return err
}
2021-04-22 02:17:03 -07:00
// Password returns the SRP tokens of a user
func Password(name string) ([]byte, []byte, error) {
db, err := authDB()
if err != nil {
return nil, nil, err
}
defer db.Close()
var pwd string
2021-04-22 04:40:56 -07:00
err = db.QueryRow(`SELECT password FROM auth WHERE name = $1;`, name).Scan(&pwd)
2021-04-22 03:33:50 -07:00
if err != nil && !errors.Is(err, sql.ErrNoRows) {
2021-04-22 02:17:03 -07:00
return nil, nil, err
}
2021-04-22 04:40:56 -07:00
if pwd == "" {
return nil, nil, nil
}
2021-04-22 02:17:03 -07:00
salt, verifier, err := decodeVerifierAndSalt(pwd)
return verifier, salt, err
}
2021-04-22 02:17:03 -07:00
// SetPassword changes the SRP tokens of a user
func SetPassword(name string, verifier, salt []byte) error {
db, err := authDB()
if err != nil {
return err
}
2021-04-22 02:17:03 -07:00
defer db.Close()
pwd := encodeVerifierAndSalt(salt, verifier)
2021-04-22 04:40:56 -07:00
_, err = db.Exec(`UPDATE auth SET password = $1 WHERE name = $2;`, pwd, name)
2021-04-22 02:17:03 -07:00
return err
}
func init() {
2021-03-09 13:23:41 -08:00
pwd, err := StorageKey("auth:passphrase")
if err != nil {
2021-03-02 07:57:19 -08:00
log.Fatal(err)
}
if pwd == "" {
passPhrase = make([]byte, 16)
_, err := rand.Read(passPhrase)
if err != nil {
2021-03-02 07:57:19 -08:00
log.Fatal(err)
}
// Save the passphrase for future use
2021-04-22 02:17:03 -07:00
// This passphrase should not be changed wihtout deleting
// the auth databases on the minetest servers
2021-01-17 12:43:23 -08:00
err = SetStorageKey("auth:passphrase", string(passPhrase))
if err != nil {
2021-03-02 07:57:19 -08:00
log.Fatal(err)
}
} else {
passPhrase = []byte(pwd)
}
}