aboutsummaryrefslogtreecommitdiffstats
path: root/core/usermanager.lua
blob: 4fef936ee9de5de04c28d49931de8d20de458b2b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
-- Prosody IM
-- Copyright (C) 2008-2010 Matthew Wild
-- Copyright (C) 2008-2010 Waqas Hussain
--
-- This project is MIT/X11 licensed. Please see the
-- COPYING file in the source package for more information.
--

local datamanager = require "util.datamanager";
local log = require "util.logger".init("usermanager");
local type = type;
local error = error;
local ipairs = ipairs;
local hashes = require "util.hashes";
local jid_bare = require "util.jid".bare;
local config = require "core.configmanager";
local hosts = hosts;

local require_provisioning = config.get("*", "core", "cyrus_require_provisioning") or false;

local prosody = _G.prosody;

module "usermanager"

local new_default_provider;

local function host_handler(host)
	local host_session = hosts[host];
	host_session.events.add_handler("item-added/auth-provider", function (provider)
		if config.get(host, "core", "authentication") == provider.name then
			host_session.users = provider;
		end
	end);
	host_session.events.add_handler("item-removed/auth-provider", function (provider)
		if host_session.users == provider then
			host_session.users = new_default_provider(host);
		end
	end);
	host_session.users = new_default_provider(host); -- Start with the default usermanager provider
end
prosody.events.add_handler("host-activated", host_handler);
prosody.events.add_handler("component-activated", host_handler);

local function is_cyrus(host) return config.get(host, "core", "sasl_backend") == "cyrus"; end

function new_default_provider(host)
	local provider = { name = "default" };
	
	function provider:test_password(username, password)
		if is_cyrus(host) then return nil, "Legacy auth not supported with Cyrus SASL."; end
		local credentials = datamanager.load(username, host, "accounts") or {};
	
		if password == credentials.password then
			return true;
		else
			return nil, "Auth failed. Invalid username or password.";
		end
	end

	function provider:get_password(username)
		if is_cyrus(host) then return nil, "Passwords unavailable for Cyrus SASL."; end
		return (datamanager.load(username, host, "accounts") or {}).password;
	end
	
	function provider:set_password(username, password)
		if is_cyrus(host) then return nil, "Passwords unavailable for Cyrus SASL."; end
		local account = datamanager.load(username, host, "accounts");
		if account then
			account.password = password;
			return datamanager.store(username, host, "accounts", account);
		end
		return nil, "Account not available.";
	end

	function provider:user_exists(username)
		if not(require_provisioning) and is_cyrus(host) then return true; end
		return datamanager.load(username, host, "accounts") ~= nil; -- FIXME also check for empty credentials
	end

	function provider:create_user(username, password)
		if not(require_provisioning) and is_cyrus(host) then return nil, "Account creation/modification not available with Cyrus SASL."; end
		return datamanager.store(username, host, "accounts", {password = password});
	end

	function provider:get_supported_methods()
		return {["PLAIN"] = true, ["DIGEST-MD5"] = true}; -- TODO this should be taken from the config
	end

	function provider:is_admin(jid)
		local admins = config.get(host, "core", "admins");
		if admins ~= config.get("*", "core", "admins") then
			if type(admins) == "table" then
				jid = jid_bare(jid);
				for _,admin in ipairs(admins) do
					if admin == jid then return true; end
				end
			elseif admins then
				log("error", "Option 'admins' for host '%s' is not a table", host);
			end
		end
		return is_admin(jid); -- Test whether it's a global admin instead
	end
	return provider;
end

function validate_credentials(host, username, password, method)
	return hosts[host].users:test_password(username, password);
end

function get_password(username, host)
	return hosts[host].users:get_password(username);
end

function set_password(username, host, password)
	return hosts[host].users:set_password(username, password);
end

function user_exists(username, host)
	return hosts[host].users:user_exists(username);
end

function create_user(username, password, host)
	return hosts[host].users:create_user(username, password);
end

function get_supported_methods(host)
	return hosts[host].users:get_supported_methods();
end

function is_admin(jid, host)
	if host and host ~= "*" then
		return hosts[host].users:is_admin(jid);
	else -- Test only whether this JID is a global admin
		local admins = config.get("*", "core", "admins");
		if type(admins) == "table" then
			jid = jid_bare(jid);
			for _,admin in ipairs(admins) do
				if admin == jid then return true; end
			end
		elseif admins then
			log("error", "Option 'admins' for host '%s' is not a table", host);
		end
		return nil;
	end
end

_M.new_default_provider = new_default_provider;

return _M;