summaryrefslogtreecommitdiff
path: root/lib/rbot/auth.rb
blob: 3fbf4b697b4dbf4a7dec3afad67b80c8eca1d5cb (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
module Irc

  # globmask:: glob to test with
  # netmask::  netmask to test against
  # Compare a netmask with a standard IRC glob, e.g foo!bar@baz.com would
  # match *!*@baz.com, foo!*@*, *!bar@*, etc.
  def Irc.netmaskmatch( globmask, netmask )
    regmask = Regexp.escape( globmask )
    regmask.gsub!( /\\\*/, '.*' )
    return true if(netmask =~ /#{regmask}/i)
    return false
  end

  # check if a string is an actual IRC hostmask
  def Irc.ismask?(mask)
    mask =~ /^.+!.+@.+$/
  end

  Struct.new( 'UserData', :level, :password, :hostmasks )

  # User-level authentication to allow/disallow access to bot commands based
  # on hostmask and userlevel.
  class IrcAuth
    BotConfig.register BotConfigStringValue.new( 'auth.password',
      :default => 'rbotauth', :wizard => true,
      :desc => 'Your password for maxing your auth with the bot (used to associate new hostmasks with your owner-status etc)' )
    BotConfig.register BotConfigIntegerValue.new( 'auth.default_level',
      :default => 10, :wizard => true,
      :desc => 'The default level for new/unknown users' )

    # create a new IrcAuth instance.
    # bot:: associated bot class
    def initialize(bot)
      @bot = bot
      @users = Hash.new do
        Struct::UserData.new(@bot.config['auth.default_level'], '', [])
      end
      @levels = Hash.new(0)
      @currentUsers = Hash.new( nil )
      if( File.exist?( "#{@bot.botclass}/users.yaml" ) )
        File.open( "#{@bot.botclass}/users.yaml" ) { |file|
          # work around YAML not maintaining the default proc
          @loadedusers = YAML::parse(file).transform
          @users.update(@loadedusers)
        }
      end
      if(File.exist?("#{@bot.botclass}/levels.rbot"))
        IO.foreach("#{@bot.botclass}/levels.rbot") do |line|
          if(line =~ /\s*(\d+)\s*(\S+)/)
            level = $1.to_i
            command = $2
            @levels[command] = level
          end
        end
      end
    end

    # save current users and levels to files.
    # levels are written to #{botclass}/levels.rbot
    # users are written to #{botclass}/users.yaml
    def save
      Dir.mkdir("#{@bot.botclass}") if(!File.exist?("#{@bot.botclass}"))
      File.open("#{@bot.botclass}/users.yaml", 'w') do |file|
        file.puts @users.to_yaml
      end
      File.open("#{@bot.botclass}/levels.rbot", 'w') do |file|
        @levels.each do |key, value|
          file.puts "#{value} #{key}"
        end
      end
    end

    # command:: command user wishes to perform
    # mask::    hostmask of user
    # tell::    optional recipient for "insufficient auth" message
    #
    # returns true if user with hostmask +mask+ is permitted to perform
    # +command+ optionally pass tell as the target for the "insufficient auth"
    # message, if the user is not authorised
    def allow?( command, mask, tell=nil )
      auth = @users[matchingUser(mask)].level # Directly using @users[] is possible, because UserData has a default setting
        if( auth >= @levels[command] )
          return true
        else
          debug "#{mask} is not allowed to perform #{command}"
          @bot.say tell, "insufficient \"#{command}\" auth (have #{auth}, need #{@levels[command]})" if tell
          return false
        end
    end

    # add user with hostmask matching +mask+ with initial auth level +level+
    def useradd( username, level=@bot.config['auth.default_level'], password='', hostmask='*!*@*' )
      @users[username] = Struct::UserData.new( level, password, [hostmask] ) if ! @users.has_key? username
    end

    # mask:: mask of user to remove
    # remove user with mask +mask+
    def userdel( username )
      @users.delete( username ) if @users.has_key? username
    end

    def usermod( username, item, value=nil )
      if @users.has_key?( username )
        case item
          when 'hostmask'
            if Irc.ismask?( value )
              @users[username].hostmasks = [ value ]
              return true
            end
          when '+hostmask'
            if Irc.ismask?( value )
              @users[username].hostmasks += [ value ]
              return true
            end
          when '-hostmask'
            if Irc.ismask?( value )
              @users[username].hostmasks -= [ value ]
              return true
            end
          when 'password'
              @users[username].password = value
              return true
          when 'level'
              @users[username].level = value.to_i
              return true
          else
            debug "usermod: Tried to modify unknown item #{item}"
	    # @bot.say tell, "Unknown item #{item}" if tell
        end
      end
      return false
    end

    # command:: command to adjust
    # level::   new auth level for the command
    # set required auth level of +command+ to +level+
    def setlevel(command, level)
      @levels[command] = level
    end

    def matchingUser( mask )
      currentUser = nil
      currentLevel = 0
      @users.each { |user, data| # TODO Will get easier if YPaths are used...
        if data.level > currentLevel
          data.hostmasks.each { |hostmask|
            if Irc.netmaskmatch( hostmask, mask )
              currentUser = user
              currentLevel = data.level
            end
          }
        end
      }
      currentUser
    end

    def identify( mask, username, password )
      return false unless @users.has_key?(username) && @users[username].password == password
      @bot.auth.usermod( username, '+hostmask', mask )
      return true
    end

    # return all currently defined commands (for which auth is required) and
    # their required authlevels
    def showlevels
      reply = 'Current levels are:'
      @levels.sort.each { |key, value|
        reply += " #{key}(#{value})"
      }
      reply
    end

    # return all currently defined users and their authlevels
    def showusers
      reply = 'Current users are:'
      @users.sort.each { |key, value|
        reply += " #{key}(#{value.level})"
      }
      reply
    end

    def showdetails( username )
      if @users.has_key? username
        reply = "#{username}(#{@users[username].level}):"
        @users[username].hostmasks.each { |hostmask|
          reply += " #{hostmask}"
        }
      end
      reply
    end

    # module help
    def help(topic='')
      case topic
        when 'setlevel'
          return 'setlevel <command> <level> => Sets required level for <command> to <level> (private addressing only)'
        when 'useradd'
          return 'useradd <username> => Add user <mask>, you still need to set him up correctly (private addressing only)'
        when 'userdel'
          return 'userdel <username> => Remove user <username> (private addressing only)'
        when 'usermod'
          return 'usermod <username> <item> <value> => Modify <username>s settings. Valid <item>s are: hostmask, (+|-)hostmask, password, level (private addressing only)'
        when 'auth'
          return 'auth <masterpw> => Create a user with your hostmask and master password as bot master (private addressing only)'
        when 'levels'
          return 'levels => list commands and their required levels (private addressing only)'
        when 'users'
          return 'users [<username>]=> list users and their levels or details about <username> (private addressing only)'
        when 'whoami'
          return 'whoami => Show as whom you are recognized (private addressing only)'
        when 'identify'
          return 'identify <username> <password> => Identify your hostmask as belonging to <username> (private addressing only)'
        else
          return 'Auth module (User authentication) topics: setlevel, useradd, userdel, usermod, auth, levels, users, whoami, identify'
      end
    end

    # privmsg handler
    def privmsg(m)
     if(m.address? && m.private?)
      case m.message
        when (/^setlevel\s+(\S+)\s+(\d+)$/)
          if( @bot.auth.allow?( 'auth', m.source, m.replyto ) )
            @bot.auth.setlevel( $1, $2.to_i )
            m.reply "level for #$1 set to #$2"
          end
        when( /^useradd\s+(\S+)/ ) # FIXME Needs review!!! (\s+(\S+)(\s+(\S+)(\s+(\S+))?)?)? Should this part be added to make complete useradds possible?
          if( @bot.auth.allow?( 'auth', m.source, m.replyto ) )
            @bot.auth.useradd( $1 )
            m.reply "added user #$1, please set him up correctly"
          end
        when( /^userdel\s+(\S+)/ )
          if( @bot.auth.allow?( 'auth', m.source, m.replyto ) )
            @bot.auth.userdel( $1 )
            m.reply "user #$1 is gone"
          end
        when( /^usermod\s+(\S+)\s+(\S+)\s+(\S+)/ )
          if( @bot.auth.allow?('auth', m.source, m.replyto ) )
            if( @bot.auth.usermod( $1, $2, $3 ) )
              m.reply "Set #$2 of #$1 to #$3"
            else
              m.reply "Failed to set #$2 of #$1 to #$3"
            end
          end
        when( /^setpassword\s+(\S+)/ )
	  password = $1
          user = @bot.auth.matchingUser( m.source )
          if user
	    if @bot.auth.usermod(user, 'password', password)
	      m.reply "Your password has been set to #{password}"
	    else
	      m.reply "Couldn't set password"
	    end
          else
            m.reply 'You don\'t belong to any user.'
          end
        when (/^auth\s+(\S+)/)
          if( $1 == @bot.config['auth.password'] )
            if ! @users.has_key? 'master'
              @bot.auth.useradd( 'master', 1000, @bot.config['auth.password'], m.source )
            else
              @bot.auth.usermod( 'master', '+hostmask', m.source )
            end
            m.reply 'Identified, security level maxed out'
          else
            m.reply 'Incorrect password'
          end
        when( /^identify\s+(\S+)\s+(\S+)/ )
          if @bot.auth.identify( m.source, $1, $2 )
            m.reply "Identified as #$1 (#{@users[$1].level})"
          else
            m.reply 'Incorrect username/password'
          end
        when( 'whoami' )
          user = @bot.auth.matchingUser( m.source )
          if user
            m.reply "I recognize you as #{user} (#{@users[user].level})"
          else
            m.reply 'You don\'t belong to any user.'
          end
        when( /^users\s+(\S+)/ )
          m.reply @bot.auth.showdetails( $1 ) if( @bot.auth.allow?( 'auth', m.source, m.replyto ) )
        when ( 'levels' )
          m.reply @bot.auth.showlevels if( @bot.auth.allow?( 'config', m.source, m.replyto ) )
        when ( 'users' )
          m.reply @bot.auth.showusers if( @bot.auth.allow?( 'users', m.source, m.replyto ) )
      end
     end
    end
  end
end