]>
jfr.im git - irc/unrealircd/unrealircd-webpanel.git/blob - plugins/sql_auth/sql_auth.php
3 require_once "SQL/sql.php";
4 require_once "SQL/settings.php";
8 public $name = "SQLAuth";
9 public $author = "Valware";
10 public $version = "1.0";
11 public $description = "Provides a User Auth and Management Panel with an SQL backend";
13 function __construct()
15 self
::create_tables();
16 Hook
::func(HOOKTYPE_PRE_HEADER
, 'sql_auth::session_start');
17 Hook
::func(HOOKTYPE_FOOTER
, 'sql_auth::add_footer_info');
18 Hook
::func(HOOKTYPE_USER_LOOKUP
, 'sql_auth::get_user');
19 Hook
::func(HOOKTYPE_USERMETA_ADD
, 'sql_auth::add_usermeta');
20 Hook
::func(HOOKTYPE_USERMETA_DEL
, 'sql_auth::del_usermeta');
21 Hook
::func(HOOKTYPE_USERMETA_GET
, 'sql_auth::get_usermeta');
22 Hook
::func(HOOKTYPE_USER_CREATE
, 'sql_auth::user_create');
23 Hook
::func(HOOKTYPE_GET_USER_LIST
, 'sql_auth::get_user_list');
24 Hook
::func(HOOKTYPE_USER_DELETE
, 'sql_auth::user_delete');
26 if (defined('SQL_DEFAULT_USER')) // we've got a default account
28 $lkup = new PanelUser(SQL_DEFAULT_USER
['username']);
30 if (!$lkup->id
) // doesn't exist, add it with full privileges
33 $user['user_name'] = SQL_DEFAULT_USER
['username'];
34 $user['user_pass'] = SQL_DEFAULT_USER
['password'];
36 create_new_user($user);
42 public static function add_footer_info($empty)
44 if (!($user = unreal_get_current_user()))
48 echo "<code>Admin Panel v" . WEBPANEL_VERSION
. "</code>";
53 public static function session_start($n)
55 if (!isset($_SESSION))
57 session_set_cookie_params(3600);
61 if (!isset($_SESSION['id']) || empty($_SESSION))
63 $secure = ($_SERVER['HTTPS'] == 'on') ? "https://" : "http://";
64 $current_url = "$secure$_SERVER[HTTP_HOST]$_SERVER[REQUEST_URI]";
65 $tok = split($_SERVER['SCRIPT_FILENAME'], "/");
66 if ($check = security_check() && $tok[count($tok) - 1] !== "error.php") {
67 header("Location: " . BASE_URL
. "plugins/sql_auth/error.php");
70 header("Location: ".BASE_URL
."login/?redirect=".urlencode($current_url));
75 if (!unreal_get_current_user()->id
) // user no longer exists
78 header("Location: ".BASE_URL
."login");
81 // you'll be automatically logged out after one hour of inactivity
86 * Create the tables we'll be using in the SQLdb
89 public static function create_tables()
92 $conn->query("CREATE TABLE IF NOT EXISTS " . SQL_PREFIX
. "users (
93 user_id int AUTO_INCREMENT NOT NULL,
94 user_name VARCHAR(255) NOT NULL,
95 user_pass VARCHAR(255) NOT NULL,
97 user_fname VARCHAR(255),
98 user_lname VARCHAR(255),
99 user_bio VARCHAR(255),
100 created VARCHAR(255),
101 PRIMARY KEY (user_id)
103 $conn->query("CREATE TABLE IF NOT EXISTS " . SQL_PREFIX
. "user_meta (
104 meta_id int AUTO_INCREMENT NOT NULL,
105 user_id int NOT NULL,
106 meta_key VARCHAR(255) NOT NULL,
107 meta_value VARCHAR(255),
108 PRIMARY KEY (meta_id)
110 $conn->query("CREATE TABLE IF NOT EXISTS " . SQL_PREFIX
. "auth_settings (
111 id int AUTO_INCREMENT NOT NULL,
112 setting_key VARCHAR(255) NOT NULL,
113 setting_value VARCHAR(255),
116 $conn->query("CREATE TABLE IF NOT EXISTS " . SQL_PREFIX
. "fail2ban (
117 id int AUTO_INCREMENT NOT NULL,
118 ip VARCHAR(255) NOT NULL,
125 /* We convert $u with a full user as an object ;D*/
126 public static function get_user(&$u)
134 $prep = $conn->prepare("SELECT * FROM " . SQL_PREFIX
. "users WHERE user_id = :id LIMIT 1");
135 $prep->execute(["id" => strtolower($id)]);
139 $prep = $conn->prepare("SELECT * FROM " . SQL_PREFIX
. "users WHERE LOWER(user_name) = :name LIMIT 1");
140 $prep->execute(["name" => strtolower($name)]);
145 $data = $prep->fetchAll();
146 if (isset($data[0]) && $data = $data[0])
148 $obj->id
= $data['user_id'];
149 $obj->username
= $data['user_name'];
150 $obj->passhash
= $data['user_pass'];
151 $obj->first_name
= $data['user_fname'] ?? NULL;
152 $obj->last_name
= $data['user_lname'] ?? NULL;
153 $obj->created
= $data['created'];
154 $obj->bio
= $data['user_bio'];
155 $obj->user_meta
= (new PanelUser_Meta($obj->id
))->list;
160 public static function get_usermeta(&$u)
168 $prep = $conn->prepare("SELECT * FROM " . SQL_PREFIX
. "user_meta WHERE user_id = :id");
169 $prep->execute(["id" => $id]);
171 foreach ($prep->fetchAll() as $row)
173 $list[$row['meta_key']] = $row['meta_value'];
177 public static function add_usermeta(&$meta)
179 $meta = $meta['meta'];
181 /* check if it exists first, update it if it does */
182 $query = "SELECT * FROM " . SQL_PREFIX
. "user_meta WHERE user_id = :id AND meta_key = :key";
183 $stmt = $conn->prepare($query);
184 $stmt->execute(["id" => $meta['id'], "key" => $meta['key']]);
185 if ($stmt->rowCount()) // it exists, update instead of insert
187 $query = "UPDATE " . SQL_PREFIX
. "user_meta SET meta_value = :value WHERE user_id = :id AND meta_key = :key";
188 $stmt = $conn->prepare($query);
189 $stmt->execute($meta);
190 if ($stmt->rowCount())
197 $query = "INSERT INTO " . SQL_PREFIX
. "user_meta (user_id, meta_key, meta_value) VALUES (:id, :key, :value)";
198 $stmt = $conn->prepare($query);
199 $stmt->execute($meta);
200 if ($stmt->rowCount())
205 public static function del_usermeta(&$u)
208 $query = "DELETE FROM " . SQL_PREFIX
. "user_meta WHERE user_id = :id AND meta_key = :key";
209 $stmt = $conn->prepare($query);
210 $stmt->execute($u['meta']);
211 if ($stmt->rowCount())
215 public static function user_create(&$u)
217 $username = $u['user_name'];
218 $first_name = $u['fname'];
219 $last_name = $u['lname'];
220 $password = $u['user_pass'];
221 $user_bio = $u['user_bio'];
223 $prep = $conn->prepare("INSERT INTO " . SQL_PREFIX
. "users (user_name, user_pass, user_fname, user_lname, user_bio, created) VALUES (:name, :pass, :fname, :lname, :user_bio, :created)");
224 $prep->execute(["name" => $username, "pass" => $password, "fname" => $first_name, "lname" => $last_name, "user_bio" => $user_bio, "created" => date("Y-m-d H:i:s")]);
225 if ($prep->rowCount())
226 $u['success'] = true;
228 $u['errmsg'][] = "Could not add user";
231 public static function get_user_list(&$list)
234 $result = $conn->query("SELECT user_id FROM " . SQL_PREFIX
. "users");
235 if (!$result) // impossible
237 die("Something went wrong.");
240 while($row = $result->fetch())
242 $userlist[] = new PanelUser(NULL, $row['user_id']);
244 if (!empty($userlist))
248 public static function user_delete(&$u)
251 $query = "DELETE FROM " . SQL_PREFIX
. "users WHERE user_id = :id";
253 $stmt = $conn->prepare($query);
254 $stmt->execute(["id" => $user->id
]);
255 $deleted = $stmt->rowCount();
258 $u['info'][] = "Successfully deleted user \"$user->username\"";
261 $u['info'][] = "Unknown error";
268 function security_check()
270 $ip = $_SERVER['REMOTE_ADDR'];
271 if (dnsbl_check($ip))
274 else if (fail2ban_check($ip))
280 function dnsbl_check($ip)
282 $dnsbl_lookup = DNSBL
;
284 // clear variable just in case
287 // if the IP was not given because you're an idiot, stop processing
288 if (!$ip) { return; }
290 // get the first two segments of the IPv4
291 $because = split($ip, "."); // why you
292 $you = $because[1]; // gotta play
293 $want = $because[2]; // that song
294 $to = $you.".".$want."."; // so loud?
296 // exempt local connections because sometimes they get a false positive
297 if ($to == "192.168." || $to == "127.0.") { return NULL; }
299 // you spin my IP right round, right round, to check the records baby, right round-round-round
300 $reverse_ip = glue(array_reverse(split($ip, ".")), ".");
303 foreach ($dnsbl_lookup as $host) {
306 if (checkdnsrr($reverse_ip . "." . $host . ".", "A")) {
313 // if it was safe, return NOTHING
318 // else, you guessed it, return where it was listed
324 function fail2ban_check($ip)