1 /* +------------------------------------+
2 * | Inspire Internet Relay Chat Daemon |
3 * +------------------------------------+
5 * InspIRCd is copyright (C) 2002-2004 ChatSpike-Dev.
7 * <brain@chatspike.net>
8 * <Craig@chatspike.net>
11 * Written by Craig Edwards, Craig McLure, and others.
12 * This program is free but copyrighted software; see
13 * the file COPYING for details.
15 * ---------------------------------------------------
24 #include "helperfuncs.h"
26 #include "m_sqlutils.h"
28 /* $ModDesc: Allow/Deny connections based upon an arbitary SQL table */
30 class ModuleSQLAuth : public Module
35 std::string usertable;
36 std::string userfield;
37 std::string passfield;
38 std::string encryption;
39 std::string killreason;
40 std::string allowpattern;
41 std::string databaseid;
46 ModuleSQLAuth(Server* Me)
47 : Module::Module(Me), Srv(Me)
49 SQLutils = Srv->FindFeature("SQLutils");
53 log(DEBUG, "Successfully got SQLutils pointer");
57 log(DEFAULT, "ERROR: This module requires a module offering the 'SQLutils' feature (usually m_sqlutils.so). Please load it and try again.");
58 throw ModuleException("This module requires a module offering the 'SQLutils' feature (usually m_sqlutils.so). Please load it and try again.");
64 void Implements(char* List)
66 List[I_OnUserDisconnect] = List[I_OnCheckReady] = List[I_OnRequest] = List[I_OnRehash] = List[I_OnUserRegister] = 1;
69 virtual void OnRehash(const std::string ¶meter)
73 usertable = Conf.ReadValue("sqlauth", "usertable", 0); /* User table name */
74 databaseid = Conf.ReadValue("sqlauth", "dbid", 0); /* Database ID, given to the SQL service provider */
75 userfield = Conf.ReadValue("sqlauth", "userfield", 0); /* Field name where username can be found */
76 passfield = Conf.ReadValue("sqlauth", "passfield", 0); /* Field name where password can be found */
77 killreason = Conf.ReadValue("sqlauth", "killreason", 0); /* Reason to give when access is denied to a user (put your reg details here) */
78 allowpattern= Conf.ReadValue("sqlauth", "allowpattern",0 ); /* Allow nicks matching this pattern without requiring auth */
79 encryption = Conf.ReadValue("sqlauth", "encryption", 0); /* Name of sql function used to encrypt password, e.g. "md5" or "passwd".
80 * define, but leave blank if no encryption is to be used.
82 verbose = Conf.ReadFlag("sqlauth", "verbose", 0); /* Set to true if failed connects should be reported to operators */
84 if (encryption.find("(") == std::string::npos)
86 encryption.append("(");
90 virtual void OnUserRegister(userrec* user)
92 if ((allowpattern != "") && (Srv->MatchText(user->nick,allowpattern)))
95 if (!CheckCredentials(user))
97 Srv->QuitUser(user,killreason);
101 bool CheckCredentials(userrec* user)
105 target = Srv->FindFeature("SQL");
109 SQLrequest req = SQLreq(this, target, databaseid, "SELECT ? FROM ? WHERE ? = '?' AND ? = ?'?')", userfield, usertable, userfield, user->nick, passfield, encryption, user->password);
113 /* When we get the query response from the service provider we will be given an ID to play with,
114 * just an ID number which is unique to this query. We need a way of associating that ID with a userrec
115 * so we insert it into a map mapping the IDs to users.
116 * Thankfully m_sqlutils provides this, it will associate a ID with a user or channel, and if the user quits it removes the
117 * association. This means that if the user quits during a query we will just get a failed lookup from m_sqlutils - telling
118 * us to discard the query.
120 log(DEBUG, "Sent query, got given ID %lu", req.id);
122 AssociateUser(this, SQLutils, req.id, user).Send();
128 log(DEBUG, "SQLrequest failed: %s", req.error.Str());
131 WriteOpers("Forbidden connection from %s!%s@%s (SQL query failed: %s)", user->nick, user->ident, user->host, req.error.Str());
138 log(SPARSE, "WARNING: Couldn't find SQL provider module. NOBODY will be allowed to connect until it comes back unless they match an exception");
143 virtual char* OnRequest(Request* request)
145 if(strcmp(SQLRESID, request->GetData()) == 0)
149 res = static_cast<SQLresult*>(request);
151 log(DEBUG, "Got SQL result (%s) with ID %lu", res->GetData(), res->id);
153 userrec* user = GetAssocUser(this, SQLutils, res->id).S().user;
154 UnAssociate(this, SQLutils, res->id).S();
158 if(res->error.Id() == NO_ERROR)
160 log(DEBUG, "Associated query ID %lu with user %s", res->id, user->nick);
161 log(DEBUG, "Got result with %d rows and %d columns", res->Rows(), res->Cols());
165 /* We got a row in the result, this is enough really */
166 user->Extend("sqlauthed");
170 /* No rows in result, this means there was no record matching the user */
171 WriteOpers("Forbidden connection from %s!%s@%s (SQL query returned no matches)", user->nick, user->ident, user->host);
172 user->Extend("sqlauth_failed");
177 log(DEBUG, "Query failed: %s", res->error.Str());
178 WriteOpers("Forbidden connection from %s!%s@%s (SQL query failed: %s)", user->nick, user->ident, user->host, res->error.Str());
179 user->Extend("sqlauth_failed");
184 log(DEBUG, "Got query with unknown ID, this probably means the user quit while the query was in progress");
190 log(DEBUG, "Got unsupported API version string: %s", request->GetData());
195 virtual void OnUserDisconnect(userrec* user)
197 user->Shrink("sqlauthed");
198 user->Shrink("sqlauth_failed");
201 virtual bool OnCheckReady(userrec* user)
203 if(user->GetExt("sqlauth_failed"))
205 Srv->QuitUser(user,killreason);
209 return user->GetExt("sqlauthed");
212 virtual ~ModuleSQLAuth()
216 virtual Version GetVersion()
218 return Version(1,0,1,0,VF_VENDOR);
223 class ModuleSQLAuthFactory : public ModuleFactory
226 ModuleSQLAuthFactory()
230 ~ModuleSQLAuthFactory()
234 virtual Module * CreateModule(Server* Me)
236 return new ModuleSQLAuth(Me);
242 extern "C" void * init_module( void )
244 return new ModuleSQLAuthFactory;