3 require_once "SQL/sql.php";
4 require_once "SQL/settings.php";
8 public $name = "SQLAuth";
9 public $author = "Valware";
10 public $version = "1.0";
11 public $description = "Provides a User Auth and Management Panel with an SQL backend";
12 public $email = "v.a.pond@outlook.com";
14 function __construct()
16 self
::create_tables();
17 Hook
::func(HOOKTYPE_PRE_HEADER
, 'sql_auth::session_start');
18 Hook
::func(HOOKTYPE_FOOTER
, 'sql_auth::add_footer_info');
19 Hook
::func(HOOKTYPE_USER_LOOKUP
, 'sql_auth::get_user');
20 Hook
::func(HOOKTYPE_USERMETA_ADD
, 'sql_auth::add_usermeta');
21 Hook
::func(HOOKTYPE_USERMETA_DEL
, 'sql_auth::del_usermeta');
22 Hook
::func(HOOKTYPE_USERMETA_GET
, 'sql_auth::get_usermeta');
23 Hook
::func(HOOKTYPE_USER_CREATE
, 'sql_auth::user_create');
24 Hook
::func(HOOKTYPE_GET_USER_LIST
, 'sql_auth::get_user_list');
25 Hook
::func(HOOKTYPE_USER_DELETE
, 'sql_auth::user_delete');
26 Hook
::func(HOOKTYPE_EDIT_USER
, 'sql_auth::edit_core');
27 Hook
::func(HOOKTYPE_PRE_OVERVIEW_CARD
, 'sql_auth::add_pre_overview_card');
28 AuthModLoaded
::$status = 1;
30 if (defined('SQL_DEFAULT_USER')) // we've got a default account
32 $lkup = new PanelUser(SQL_DEFAULT_USER
['username']);
34 if (!$lkup->id
) // doesn't exist, add it with full privileges
37 $user['user_name'] = SQL_DEFAULT_USER
['username'];
38 $user['user_pass'] = SQL_DEFAULT_USER
['password'];
40 create_new_user($user);
42 $lkup = new PanelUser(SQL_DEFAULT_USER
['username']);
43 if (!user_can($lkup, PERMISSION_MANAGE_USERS
))
44 $lkup->add_permission(PERMISSION_MANAGE_USERS
);
49 public static function add_footer_info($empty)
51 if (!($user = unreal_get_current_user()))
55 echo "<code>Admin Panel v" . WEBPANEL_VERSION
. "</code>";
59 public static function add_pre_overview_card($empty)
61 if (defined('SQL_DEFAULT_USER'))
62 Message
::Fail("Warning: SQL_DEFAULT_USER is set in config.php. You should remove that item now, as it is only used during installation.");
66 public static function session_start($n)
68 if (!isset($_SESSION))
70 session_set_cookie_params(3600);
73 if (!isset($_SESSION['id']) || empty($_SESSION))
75 $current_page = $_SERVER['REQUEST_URI'];
76 $tok = split($_SERVER['SCRIPT_FILENAME'], "/");
77 if ($check = security_check() && $tok[count($tok) - 1] !== "error.php") {
78 header("Location: " . BASE_URL
. "plugins/sql_auth/error.php");
81 header("Location: ".BASE_URL
."login/?redirect=".urlencode($current_page));
86 if (!unreal_get_current_user()) // user no longer exists
89 header("Location: ".BASE_URL
."login");
92 // you'll be automatically logged out after one hour of inactivity
97 * Create the tables we'll be using in the SQLdb
100 public static function create_tables()
103 $conn->query("CREATE TABLE IF NOT EXISTS " . SQL_PREFIX
. "users (
104 user_id int AUTO_INCREMENT NOT NULL,
105 user_name VARCHAR(255) NOT NULL,
106 user_pass VARCHAR(255) NOT NULL,
107 user_email VARCHAR(255),
108 user_fname VARCHAR(255),
109 user_lname VARCHAR(255),
110 user_bio VARCHAR(255),
111 created VARCHAR(255),
112 PRIMARY KEY (user_id)
116 * Patch for beta users
117 * This adds the email column to existing tables without it
119 $columns = $conn->query("SHOW COLUMNS FROM " . SQL_PREFIX
. "users");
120 $column_names = array();
121 $c = $columns->fetchAll();
123 foreach($c as $column) {
124 $column_names[] = $column['Field'];
126 $column_exists = in_array("user_email", $column_names);
127 if (!$column_exists) {
128 $conn->query("ALTER TABLE " . SQL_PREFIX
. "users ADD COLUMN user_email varchar(255)");
132 * Another patch for beta users
133 * This changes the size of the meta_value so we can store more
136 $conn->query("CREATE TABLE IF NOT EXISTS " . SQL_PREFIX
. "user_meta (
137 meta_id int AUTO_INCREMENT NOT NULL,
138 user_id int NOT NULL,
139 meta_key VARCHAR(255) NOT NULL,
140 meta_value VARCHAR(255),
141 PRIMARY KEY (meta_id)
143 $conn->query("CREATE TABLE IF NOT EXISTS " . SQL_PREFIX
. "auth_settings (
144 id int AUTO_INCREMENT NOT NULL,
145 setting_key VARCHAR(255) NOT NULL,
146 setting_value VARCHAR(255),
149 $conn->query("CREATE TABLE IF NOT EXISTS " . SQL_PREFIX
. "fail2ban (
150 id int AUTO_INCREMENT NOT NULL,
151 ip VARCHAR(255) NOT NULL,
156 if (($columns = $conn->query("SHOW COLUMNS FROM ".SQL_PREFIX
."user_meta")));
157 $c = $columns->fetchAll();
159 $conn->query("ALTER TABLE `".SQL_PREFIX
."user_meta` CHANGE `meta_value` `meta_value` VARCHAR(5000) CHARACTER SET utf8mb3 COLLATE utf8mb3_bin NULL DEFAULT NULL");
165 /* We convert $u with a full user as an object ;D*/
166 public static function get_user(&$u)
174 $prep = $conn->prepare("SELECT * FROM " . SQL_PREFIX
. "users WHERE user_id = :id LIMIT 1");
175 $prep->execute(["id" => strtolower($id)]);
179 $prep = $conn->prepare("SELECT * FROM " . SQL_PREFIX
. "users WHERE LOWER(user_name) = :name LIMIT 1");
180 $prep->execute(["name" => strtolower($name)]);
185 $data = $prep->fetchAll();
186 if (isset($data[0]) && $data = $data[0])
188 $obj->id
= $data['user_id'];
189 $obj->username
= $data['user_name'];
190 $obj->passhash
= $data['user_pass'];
191 $obj->first_name
= $data['user_fname'] ?? NULL;
192 $obj->last_name
= $data['user_lname'] ?? NULL;
193 $obj->created
= $data['created'];
194 $obj->bio
= $data['user_bio'];
195 $obj->email
= $data['user_email'];
196 $obj->user_meta
= (new PanelUser_Meta($obj->id
))->list;
201 public static function get_usermeta(&$u)
208 $prep = $conn->prepare("SELECT * FROM " . SQL_PREFIX
. "user_meta WHERE user_id = :id");
209 $prep->execute(["id" => $id]);
211 foreach ($prep->fetchAll() as $row)
213 $list[$row['meta_key']] = $row['meta_value'];
217 public static function add_usermeta(&$meta)
219 $meta = $meta['meta'];
221 /* check if it exists first, update it if it does */
222 $query = "SELECT * FROM " . SQL_PREFIX
. "user_meta WHERE user_id = :id AND meta_key = :key";
223 $stmt = $conn->prepare($query);
224 $stmt->execute(["id" => $meta['id'], "key" => $meta['key']]);
225 if ($stmt->rowCount()) // it exists, update instead of insert
227 $query = "UPDATE " . SQL_PREFIX
. "user_meta SET meta_value = :value WHERE user_id = :id AND meta_key = :key";
228 $stmt = $conn->prepare($query);
229 $stmt->execute($meta);
230 if ($stmt->rowCount())
237 $query = "INSERT INTO " . SQL_PREFIX
. "user_meta (user_id, meta_key, meta_value) VALUES (:id, :key, :value)";
238 $stmt = $conn->prepare($query);
239 $stmt->execute($meta);
240 if ($stmt->rowCount())
245 public static function del_usermeta(&$u)
248 $query = "DELETE FROM " . SQL_PREFIX
. "user_meta WHERE user_id = :id AND meta_key = :key";
249 $stmt = $conn->prepare($query);
250 $stmt->execute($u['meta']);
251 if ($stmt->rowCount())
255 public static function user_create(&$u)
257 $username = $u['user_name'];
258 $first_name = $u['fname'] ?? NULL;
259 $last_name = $u['lname'] ?? NULL;
260 $password = $u['user_pass'] ?? NULL;
261 $user_bio = $u['user_bio'] ?? NULL;
262 $user_email = $u['user_email'] ?? NULL;
264 $prep = $conn->prepare("INSERT INTO " . SQL_PREFIX
. "users (user_name, user_pass, user_fname, user_lname, user_bio, user_email, created) VALUES (:name, :pass, :fname, :lname, :user_bio, :user_email, :created)");
265 $prep->execute(["name" => $username, "pass" => $password, "fname" => $first_name, "lname" => $last_name, "user_bio" => $user_bio, "user_email" => $user_email, "created" => date("Y-m-d H:i:s")]);
266 if ($prep->rowCount())
267 $u['success'] = true;
269 $u['errmsg'][] = "Could not add user";
272 public static function get_user_list(&$list)
275 $result = $conn->query("SELECT user_id FROM " . SQL_PREFIX
. "users");
276 if (!$result) // impossible
278 die("Something went wrong.");
281 while($row = $result->fetch())
283 $userlist[] = new PanelUser(NULL, $row['user_id']);
285 if (!empty($userlist))
289 public static function user_delete(&$u)
292 $query = "DELETE FROM " . SQL_PREFIX
. "users WHERE user_id = :id";
294 $stmt = $conn->prepare($query);
295 $stmt->execute(["id" => $user->id
]);
296 $deleted = $stmt->rowCount();
299 $u['info'][] = "Successfully deleted user \"$user->username\"";
302 $u['info'][] = "Unknown error";
307 public static function edit_core($arr)
310 $user = $arr['user'];
311 $info = $arr['info'];
312 foreach($info as $key => $val)
317 if (!strcmp($key,"update_fname") && $val != $user->first_name
)
319 $value = "user_fname";
320 $valuestr = "first name";
322 elseif (!strcmp($key,"update_lname") && $val != $user->last_name
)
324 $value = "user_lname";
325 $valuestr = "last name";
327 elseif (!strcmp($key,"update_bio") && $val != $user->bio
)
332 elseif (!strcmp($key,"update_pass") || !strcmp($key,"update_pass_conf"))
334 $value = "user_pass";
335 $valuestr = "password";
337 elseif(!strcmp($key,"update_email") && $val != $user->email
)
339 $value = "user_email";
340 $valuestr = "email address";
345 $query = "UPDATE " . SQL_PREFIX
. "users SET $value=:value WHERE user_id = :id";
346 $stmt = $conn->prepare($query);
347 $stmt->execute(["value" => $val, "id" => $user->id
]);
349 if (!$stmt->rowCount() && $stmt->errorInfo()[0] != "00000")
350 Message
::Fail("Could not update $valuestr for $user->username: ".$stmt->errorInfo()[0]." (CODE: ".$stmt->errorCode().")");
353 Message
::Success("Successfully updated the $valuestr for $user->username");
359 function security_check()
361 $ip = $_SERVER['REMOTE_ADDR'];
362 if (dnsbl_check($ip))
365 else if (fail2ban_check($ip))
371 function dnsbl_check($ip)
374 if (!defined('DNSBL'))
376 $dnsbl_lookup = DNSBL
;
378 // clear variable just in case
381 // if the IP was not given because you're an idiot, stop processing
382 if (!$ip) { return; }
384 // get the first two segments of the IPv4
385 $because = split($ip, "."); // why you
386 $you = $because[1]; // gotta play
387 $want = $because[2]; // that song
388 $to = $you.".".$want."."; // so loud?
390 // exempt local connections because sometimes they get a false positive
391 if ($to == "192.168." || $to == "127.0.") { return NULL; }
393 // you spin my IP right round, right round, to check the records baby, right round-round-round
394 $reverse_ip = glue(array_reverse(split($ip, ".")), ".");
397 foreach ($dnsbl_lookup as $host) {
400 if (checkdnsrr($reverse_ip . "." . $host . ".", "A")) {
407 // if it was safe, return NOTHING
412 // else, you guessed it, return where it was listed
418 function fail2ban_check($ip)