1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
|
module Irc
# globmask:: glob to test with
# netmask:: netmask to test against
# Compare a netmask with a standard IRC glob, e.g foo!bar@baz.com would
# match *!*@baz.com, foo!*@*, *!bar@*, etc.
def Irc.netmaskmatch( globmask, netmask )
regmask = Regexp.escape( globmask )
regmask.gsub!( /\\\*/, '.*' )
return true if(netmask =~ /#{regmask}/i)
return false
end
# check if a string is an actual IRC hostmask
def Irc.ismask?(mask)
mask =~ /^.+!.+@.+$/
end
Struct.new( 'UserData', :level, :password, :hostmasks )
# User-level authentication to allow/disallow access to bot commands based
# on hostmask and userlevel.
class IrcAuth
BotConfig.register BotConfigStringValue.new( 'auth.password',
:default => 'rbotauth', :wizard => true,
:desc => 'Your password for maxing your auth with the bot (used to associate new hostmasks with your owner-status etc)' )
BotConfig.register BotConfigIntegerValue.new( 'auth.default_level',
:default => 10, :wizard => true,
:desc => 'The default level for new/unknown users' )
# create a new IrcAuth instance.
# bot:: associated bot class
def initialize(bot)
@bot = bot
@users = Hash.new do
Struct::UserData.new(@bot.config['auth.default_level'], '', [])
end
@levels = Hash.new(0)
@currentUsers = Hash.new( nil )
if( File.exist?( "#{@bot.botclass}/users.yaml" ) )
File.open( "#{@bot.botclass}/users.yaml" ) { |file|
# work around YAML not maintaining the default proc
@loadedusers = YAML::parse(file).transform
@users.update(@loadedusers)
}
end
if(File.exist?("#{@bot.botclass}/levels.rbot"))
IO.foreach("#{@bot.botclass}/levels.rbot") do |line|
if(line =~ /\s*(\d+)\s*(\S+)/)
level = $1.to_i
command = $2
@levels[command] = level
end
end
end
end
# save current users and levels to files.
# levels are written to #{botclass}/levels.rbot
# users are written to #{botclass}/users.yaml
def save
Dir.mkdir("#{@bot.botclass}") if(!File.exist?("#{@bot.botclass}"))
File.open("#{@bot.botclass}/users.yaml", 'w') do |file|
file.puts @users.to_yaml
end
File.open("#{@bot.botclass}/levels.rbot", 'w') do |file|
@levels.each do |key, value|
file.puts "#{value} #{key}"
end
end
end
# command:: command user wishes to perform
# mask:: hostmask of user
# tell:: optional recipient for "insufficient auth" message
#
# returns true if user with hostmask +mask+ is permitted to perform
# +command+ optionally pass tell as the target for the "insufficient auth"
# message, if the user is not authorised
def allow?( command, mask, tell=nil )
auth = @users[matchingUser(mask)].level # Directly using @users[] is possible, because UserData has a default setting
if( auth >= @levels[command] )
return true
else
debug "#{mask} is not allowed to perform #{command}"
@bot.say tell, "insufficient \"#{command}\" auth (have #{auth}, need #{@levels[command]})" if tell
return false
end
end
# add user with hostmask matching +mask+ with initial auth level +level+
def useradd( username, level=@bot.config['auth.default_level'], password='', hostmask='*!*@*' )
@users[username] = Struct::UserData.new( level, password, [hostmask] ) if ! @users.has_key? username
end
# mask:: mask of user to remove
# remove user with mask +mask+
def userdel( username )
@users.delete( username ) if @users.has_key? username
end
def usermod( username, item, value=nil )
if @users.has_key?( username )
case item
when 'hostmask'
if Irc.ismask?( value )
@users[username].hostmasks = [ value ]
return true
end
when '+hostmask'
if Irc.ismask?( value )
@users[username].hostmasks += [ value ]
return true
end
when '-hostmask'
if Irc.ismask?( value )
@users[username].hostmasks -= [ value ]
return true
end
when 'password'
@users[username].password = value
return true
when 'level'
@users[username].level = value.to_i
return true
else
debug "usermod: Tried to modify unknown item #{item}"
# @bot.say tell, "Unknown item #{item}" if tell
end
end
return false
end
# command:: command to adjust
# level:: new auth level for the command
# set required auth level of +command+ to +level+
def setlevel(command, level)
@levels[command] = level
end
def matchingUser( mask )
currentUser = nil
currentLevel = 0
@users.each { |user, data| # TODO Will get easier if YPaths are used...
if data.level > currentLevel
data.hostmasks.each { |hostmask|
if Irc.netmaskmatch( hostmask, mask )
currentUser = user
currentLevel = data.level
end
}
end
}
currentUser
end
def identify( mask, username, password )
return false unless @users.has_key?(username) && @users[username].password == password
@bot.auth.usermod( username, '+hostmask', mask )
return true
end
# return all currently defined commands (for which auth is required) and
# their required authlevels
def showlevels
reply = 'Current levels are:'
@levels.sort.each { |key, value|
reply += " #{key}(#{value})"
}
reply
end
# return all currently defined users and their authlevels
def showusers
reply = 'Current users are:'
@users.sort.each { |key, value|
reply += " #{key}(#{value.level})"
}
reply
end
def showdetails( username )
if @users.has_key? username
reply = "#{username}(#{@users[username].level}):"
@users[username].hostmasks.each { |hostmask|
reply += " #{hostmask}"
}
end
reply
end
# module help
def help(topic='')
case topic
when 'setlevel'
return 'setlevel <command> <level> => Sets required level for <command> to <level> (private addressing only)'
when 'useradd'
return 'useradd <username> => Add user <mask>, you still need to set him up correctly (private addressing only)'
when 'userdel'
return 'userdel <username> => Remove user <username> (private addressing only)'
when 'usermod'
return 'usermod <username> <item> <value> => Modify <username>s settings. Valid <item>s are: hostmask, (+|-)hostmask, password, level (private addressing only)'
when 'auth'
return 'auth <masterpw> => Create a user with your hostmask and master password as bot master (private addressing only)'
when 'levels'
return 'levels => list commands and their required levels (private addressing only)'
when 'users'
return 'users [<username>]=> list users and their levels or details about <username> (private addressing only)'
when 'whoami'
return 'whoami => Show as whom you are recognized (private addressing only)'
when 'identify'
return 'identify <username> <password> => Identify your hostmask as belonging to <username> (private addressing only)'
else
return 'Auth module (User authentication) topics: setlevel, useradd, userdel, usermod, auth, levels, users, whoami, identify'
end
end
# privmsg handler
def privmsg(m)
if(m.address? && m.private?)
case m.message
when (/^setlevel\s+(\S+)\s+(\d+)$/)
if( @bot.auth.allow?( 'auth', m.source, m.replyto ) )
@bot.auth.setlevel( $1, $2.to_i )
m.reply "level for #$1 set to #$2"
end
when( /^useradd\s+(\S+)/ ) # FIXME Needs review!!! (\s+(\S+)(\s+(\S+)(\s+(\S+))?)?)? Should this part be added to make complete useradds possible?
if( @bot.auth.allow?( 'auth', m.source, m.replyto ) )
@bot.auth.useradd( $1 )
m.reply "added user #$1, please set him up correctly"
end
when( /^userdel\s+(\S+)/ )
if( @bot.auth.allow?( 'auth', m.source, m.replyto ) )
@bot.auth.userdel( $1 )
m.reply "user #$1 is gone"
end
when( /^usermod\s+(\S+)\s+(\S+)\s+(\S+)/ )
if( @bot.auth.allow?('auth', m.source, m.replyto ) )
if( @bot.auth.usermod( $1, $2, $3 ) )
m.reply "Set #$2 of #$1 to #$3"
else
m.reply "Failed to set #$2 of #$1 to #$3"
end
end
when( /^setpassword\s+(\S+)/ )
password = $1
user = @bot.auth.matchingUser( m.source )
if user
if @bot.auth.usermod(user, 'password', password)
m.reply "Your password has been set to #{password}"
else
m.reply "Couldn't set password"
end
else
m.reply 'You don\'t belong to any user.'
end
when (/^auth\s+(\S+)/)
if( $1 == @bot.config['auth.password'] )
if ! @users.has_key? 'master'
@bot.auth.useradd( 'master', 1000, @bot.config['auth.password'], m.source )
else
@bot.auth.usermod( 'master', '+hostmask', m.source )
end
m.reply 'Identified, security level maxed out'
else
m.reply 'Incorrect password'
end
when( /^identify\s+(\S+)\s+(\S+)/ )
if @bot.auth.identify( m.source, $1, $2 )
m.reply "Identified as #$1 (#{@users[$1].level})"
else
m.reply 'Incorrect username/password'
end
when( 'whoami' )
user = @bot.auth.matchingUser( m.source )
if user
m.reply "I recognize you as #{user} (#{@users[user].level})"
else
m.reply 'You don\'t belong to any user.'
end
when( /^users\s+(\S+)/ )
m.reply @bot.auth.showdetails( $1 ) if( @bot.auth.allow?( 'auth', m.source, m.replyto ) )
when ( 'levels' )
m.reply @bot.auth.showlevels if( @bot.auth.allow?( 'config', m.source, m.replyto ) )
when ( 'users' )
m.reply @bot.auth.showusers if( @bot.auth.allow?( 'users', m.source, m.replyto ) )
end
end
end
end
end
|