2017-03-27 14:15:02 +02:00
|
|
|
// Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
|
2016-09-04 11:25:33 +02:00
|
|
|
// released under the MIT license
|
|
|
|
|
|
|
|
package irc
|
|
|
|
|
2016-09-06 08:31:59 +02:00
|
|
|
import (
|
2020-04-05 09:48:59 +02:00
|
|
|
"bytes"
|
2020-09-23 08:23:35 +02:00
|
|
|
"crypto/x509"
|
2016-09-07 12:46:01 +02:00
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
2020-05-04 04:14:55 +02:00
|
|
|
"sort"
|
2016-09-07 12:46:01 +02:00
|
|
|
"strconv"
|
2018-02-11 11:30:40 +01:00
|
|
|
"strings"
|
|
|
|
"sync"
|
2016-09-06 08:31:59 +02:00
|
|
|
"time"
|
2018-08-06 04:51:39 +02:00
|
|
|
"unicode"
|
2016-09-06 08:31:59 +02:00
|
|
|
|
2020-03-27 22:52:37 +01:00
|
|
|
"github.com/oragono/oragono/irc/connection_limits"
|
2020-04-05 09:48:59 +02:00
|
|
|
"github.com/oragono/oragono/irc/email"
|
2020-10-02 22:48:37 +02:00
|
|
|
"github.com/oragono/oragono/irc/migrations"
|
2020-05-19 20:38:56 +02:00
|
|
|
"github.com/oragono/oragono/irc/modes"
|
2018-02-11 11:30:40 +01:00
|
|
|
"github.com/oragono/oragono/irc/passwd"
|
2018-11-26 11:23:27 +01:00
|
|
|
"github.com/oragono/oragono/irc/utils"
|
2016-09-07 12:46:01 +02:00
|
|
|
"github.com/tidwall/buntdb"
|
2016-09-06 08:31:59 +02:00
|
|
|
)
|
2016-09-04 11:25:33 +02:00
|
|
|
|
2017-03-11 13:01:40 +01:00
|
|
|
const (
|
2018-02-20 10:20:30 +01:00
|
|
|
keyAccountExists = "account.exists %s"
|
|
|
|
keyAccountVerified = "account.verified %s"
|
2020-03-20 17:34:46 +01:00
|
|
|
keyAccountUnregistered = "account.unregistered %s"
|
2018-02-20 10:20:30 +01:00
|
|
|
keyAccountCallback = "account.callback %s"
|
|
|
|
keyAccountVerificationCode = "account.verificationcode %s"
|
|
|
|
keyAccountName = "account.name %s" // stores the 'preferred name' of the account, not casemapped
|
|
|
|
keyAccountRegTime = "account.registered.time %s"
|
|
|
|
keyAccountCredentials = "account.credentials %s"
|
2018-03-02 23:04:24 +01:00
|
|
|
keyAccountAdditionalNicks = "account.additionalnicks %s"
|
2019-05-19 10:27:44 +02:00
|
|
|
keyAccountSettings = "account.settings %s"
|
2018-04-19 08:48:19 +02:00
|
|
|
keyAccountVHost = "account.vhost %s"
|
2018-02-20 10:20:30 +01:00
|
|
|
keyCertToAccount = "account.creds.certfp %s"
|
2020-02-19 01:38:42 +01:00
|
|
|
keyAccountChannels = "account.channels %s" // channels registered to the account
|
|
|
|
keyAccountJoinedChannels = "account.joinedto %s" // channels a persistent client has joined
|
2020-02-27 08:13:31 +01:00
|
|
|
keyAccountLastSeen = "account.lastseen %s"
|
2020-10-27 16:24:17 +01:00
|
|
|
keyAccountModes = "account.modes %s" // user modes for the always-on client as a string
|
|
|
|
keyAccountRealname = "account.realname %s" // client realname stored as string
|
|
|
|
keyAccountSuspended = "account.suspended %s" // client realname stored as string
|
2018-04-19 08:48:19 +02:00
|
|
|
|
2019-12-29 17:59:49 +01:00
|
|
|
maxCertfpsPerAccount = 5
|
2017-03-11 13:01:40 +01:00
|
|
|
)
|
|
|
|
|
2018-02-11 11:30:40 +01:00
|
|
|
// everything about accounts is persistent; therefore, the database is the authoritative
|
|
|
|
// source of truth for all account information. anything on the heap is just a cache
|
|
|
|
type AccountManager struct {
|
|
|
|
sync.RWMutex // tier 2
|
|
|
|
serialCacheUpdateMutex sync.Mutex // tier 3
|
|
|
|
|
|
|
|
server *Server
|
|
|
|
// track clients logged in to accounts
|
2019-01-31 00:59:49 +01:00
|
|
|
accountToClients map[string][]*Client
|
|
|
|
nickToAccount map[string]string
|
|
|
|
skeletonToAccount map[string]string
|
2019-05-19 10:27:44 +02:00
|
|
|
accountToMethod map[string]NickEnforcementMethod
|
2020-03-27 22:52:37 +01:00
|
|
|
registerThrottle connection_limits.GenericThrottle
|
2018-02-11 11:30:40 +01:00
|
|
|
}
|
|
|
|
|
2019-03-12 00:24:45 +01:00
|
|
|
func (am *AccountManager) Initialize(server *Server) {
|
|
|
|
am.accountToClients = make(map[string][]*Client)
|
|
|
|
am.nickToAccount = make(map[string]string)
|
|
|
|
am.skeletonToAccount = make(map[string]string)
|
2019-05-19 10:27:44 +02:00
|
|
|
am.accountToMethod = make(map[string]NickEnforcementMethod)
|
2019-03-12 00:24:45 +01:00
|
|
|
am.server = server
|
2018-02-11 11:30:40 +01:00
|
|
|
|
2019-12-22 02:26:40 +01:00
|
|
|
config := server.Config()
|
|
|
|
am.buildNickToAccountIndex(config)
|
2020-02-19 01:38:42 +01:00
|
|
|
am.createAlwaysOnClients(config)
|
2020-03-27 22:52:37 +01:00
|
|
|
am.resetRegisterThrottle(config)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (am *AccountManager) resetRegisterThrottle(config *Config) {
|
|
|
|
am.Lock()
|
|
|
|
defer am.Unlock()
|
|
|
|
|
|
|
|
am.registerThrottle = connection_limits.GenericThrottle{
|
|
|
|
Duration: config.Accounts.Registration.Throttling.Duration,
|
|
|
|
Limit: config.Accounts.Registration.Throttling.MaxAttempts,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (am *AccountManager) touchRegisterThrottle() (throttled bool) {
|
|
|
|
am.Lock()
|
|
|
|
defer am.Unlock()
|
|
|
|
throttled, _ = am.registerThrottle.Touch()
|
|
|
|
return
|
2020-02-19 01:38:42 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func (am *AccountManager) createAlwaysOnClients(config *Config) {
|
2020-02-21 05:55:42 +01:00
|
|
|
if config.Accounts.Multiclient.AlwaysOn == PersistentDisabled {
|
2020-02-19 01:38:42 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
verifiedPrefix := fmt.Sprintf(keyAccountVerified, "")
|
|
|
|
|
|
|
|
am.serialCacheUpdateMutex.Lock()
|
|
|
|
defer am.serialCacheUpdateMutex.Unlock()
|
|
|
|
|
|
|
|
var accounts []string
|
|
|
|
|
|
|
|
am.server.store.View(func(tx *buntdb.Tx) error {
|
|
|
|
err := tx.AscendGreaterOrEqual("", verifiedPrefix, func(key, value string) bool {
|
|
|
|
if !strings.HasPrefix(key, verifiedPrefix) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
account := strings.TrimPrefix(key, verifiedPrefix)
|
|
|
|
accounts = append(accounts, account)
|
|
|
|
return true
|
|
|
|
})
|
|
|
|
return err
|
|
|
|
})
|
|
|
|
|
|
|
|
for _, accountName := range accounts {
|
|
|
|
account, err := am.LoadAccount(accountName)
|
2020-10-27 16:24:17 +01:00
|
|
|
if err == nil && (account.Verified && account.Suspended == nil) &&
|
2020-02-21 05:55:42 +01:00
|
|
|
persistenceEnabled(config.Accounts.Multiclient.AlwaysOn, account.Settings.AlwaysOn) {
|
2020-07-06 10:08:04 +02:00
|
|
|
am.server.AddAlwaysOnClient(
|
|
|
|
account,
|
|
|
|
am.loadChannels(accountName),
|
|
|
|
am.loadLastSeen(accountName),
|
|
|
|
am.loadModes(accountName),
|
|
|
|
am.loadRealname(accountName),
|
|
|
|
)
|
2020-02-19 01:38:42 +01:00
|
|
|
}
|
|
|
|
}
|
2018-02-11 11:30:40 +01:00
|
|
|
}
|
|
|
|
|
2019-12-22 02:19:19 +01:00
|
|
|
func (am *AccountManager) buildNickToAccountIndex(config *Config) {
|
|
|
|
if !config.Accounts.NickReservation.Enabled {
|
2018-02-11 11:30:40 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-01-02 16:08:44 +01:00
|
|
|
nickToAccount := make(map[string]string)
|
2019-01-31 00:59:49 +01:00
|
|
|
skeletonToAccount := make(map[string]string)
|
2019-05-19 10:27:44 +02:00
|
|
|
accountToMethod := make(map[string]NickEnforcementMethod)
|
2018-02-11 11:30:40 +01:00
|
|
|
existsPrefix := fmt.Sprintf(keyAccountExists, "")
|
|
|
|
|
|
|
|
am.serialCacheUpdateMutex.Lock()
|
|
|
|
defer am.serialCacheUpdateMutex.Unlock()
|
|
|
|
|
|
|
|
err := am.server.store.View(func(tx *buntdb.Tx) error {
|
|
|
|
err := tx.AscendGreaterOrEqual("", existsPrefix, func(key, value string) bool {
|
|
|
|
if !strings.HasPrefix(key, existsPrefix) {
|
|
|
|
return false
|
|
|
|
}
|
2019-01-02 16:08:44 +01:00
|
|
|
|
|
|
|
account := strings.TrimPrefix(key, existsPrefix)
|
|
|
|
if _, err := tx.Get(fmt.Sprintf(keyAccountVerified, account)); err == nil {
|
|
|
|
nickToAccount[account] = account
|
2019-01-31 00:59:49 +01:00
|
|
|
accountName, err := tx.Get(fmt.Sprintf(keyAccountName, account))
|
|
|
|
if err != nil {
|
|
|
|
am.server.logger.Error("internal", "missing account name for", account)
|
|
|
|
} else {
|
|
|
|
skeleton, _ := Skeleton(accountName)
|
|
|
|
skeletonToAccount[skeleton] = account
|
|
|
|
}
|
2018-02-11 11:30:40 +01:00
|
|
|
}
|
2019-01-02 16:08:44 +01:00
|
|
|
if rawNicks, err := tx.Get(fmt.Sprintf(keyAccountAdditionalNicks, account)); err == nil {
|
2018-03-02 23:04:24 +01:00
|
|
|
additionalNicks := unmarshalReservedNicks(rawNicks)
|
|
|
|
for _, nick := range additionalNicks {
|
2019-01-31 00:59:49 +01:00
|
|
|
cfnick, _ := CasefoldName(nick)
|
|
|
|
nickToAccount[cfnick] = account
|
|
|
|
skeleton, _ := Skeleton(nick)
|
|
|
|
skeletonToAccount[skeleton] = account
|
2019-01-02 16:08:44 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-19 10:27:44 +02:00
|
|
|
if rawPrefs, err := tx.Get(fmt.Sprintf(keyAccountSettings, account)); err == nil {
|
|
|
|
var prefs AccountSettings
|
|
|
|
err := json.Unmarshal([]byte(rawPrefs), &prefs)
|
|
|
|
if err == nil && prefs.NickEnforcement != NickEnforcementOptional {
|
|
|
|
accountToMethod[account] = prefs.NickEnforcement
|
2019-07-12 17:49:01 +02:00
|
|
|
} else if err != nil {
|
2019-05-19 10:27:44 +02:00
|
|
|
am.server.logger.Error("internal", "corrupt account creds", account)
|
2018-03-02 23:04:24 +01:00
|
|
|
}
|
|
|
|
}
|
2019-05-19 10:27:44 +02:00
|
|
|
|
2018-02-11 11:30:40 +01:00
|
|
|
return true
|
|
|
|
})
|
|
|
|
return err
|
|
|
|
})
|
|
|
|
|
2020-03-25 19:46:28 +01:00
|
|
|
if config.Accounts.NickReservation.Method == NickEnforcementStrict {
|
|
|
|
unregisteredPrefix := fmt.Sprintf(keyAccountUnregistered, "")
|
|
|
|
am.server.store.View(func(tx *buntdb.Tx) error {
|
|
|
|
tx.AscendGreaterOrEqual("", unregisteredPrefix, func(key, value string) bool {
|
|
|
|
if !strings.HasPrefix(key, unregisteredPrefix) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
account := strings.TrimPrefix(key, unregisteredPrefix)
|
|
|
|
accountName := value
|
|
|
|
nickToAccount[account] = account
|
|
|
|
skeleton, _ := Skeleton(accountName)
|
|
|
|
skeletonToAccount[skeleton] = account
|
|
|
|
return true
|
|
|
|
})
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2018-02-11 11:30:40 +01:00
|
|
|
if err != nil {
|
2018-12-31 17:33:42 +01:00
|
|
|
am.server.logger.Error("internal", "couldn't read reserved nicks", err.Error())
|
2018-02-11 11:30:40 +01:00
|
|
|
} else {
|
|
|
|
am.Lock()
|
2019-01-02 16:08:44 +01:00
|
|
|
am.nickToAccount = nickToAccount
|
2019-01-31 00:59:49 +01:00
|
|
|
am.skeletonToAccount = skeletonToAccount
|
2019-01-02 16:08:44 +01:00
|
|
|
am.accountToMethod = accountToMethod
|
2018-02-11 11:30:40 +01:00
|
|
|
am.Unlock()
|
|
|
|
}
|
2018-04-19 08:48:19 +02:00
|
|
|
}
|
2018-02-11 11:30:40 +01:00
|
|
|
|
2018-03-02 23:04:24 +01:00
|
|
|
func (am *AccountManager) NickToAccount(nick string) string {
|
|
|
|
cfnick, err := CasefoldName(nick)
|
|
|
|
if err != nil {
|
|
|
|
return ""
|
|
|
|
}
|
2020-10-16 22:50:02 +02:00
|
|
|
skel, err := Skeleton(nick)
|
|
|
|
if err != nil {
|
|
|
|
return ""
|
|
|
|
}
|
2018-03-02 23:04:24 +01:00
|
|
|
|
2018-02-11 11:30:40 +01:00
|
|
|
am.RLock()
|
|
|
|
defer am.RUnlock()
|
2020-10-16 22:50:02 +02:00
|
|
|
account := am.nickToAccount[cfnick]
|
|
|
|
if account != "" {
|
|
|
|
return account
|
|
|
|
}
|
|
|
|
return am.skeletonToAccount[skel]
|
2018-02-11 11:30:40 +01:00
|
|
|
}
|
|
|
|
|
2019-05-19 10:27:44 +02:00
|
|
|
// given an account, combine stored enforcement method with the config settings
|
|
|
|
// to compute the actual enforcement method
|
|
|
|
func configuredEnforcementMethod(config *Config, storedMethod NickEnforcementMethod) (result NickEnforcementMethod) {
|
|
|
|
if !config.Accounts.NickReservation.Enabled {
|
|
|
|
return NickEnforcementNone
|
|
|
|
}
|
|
|
|
result = storedMethod
|
|
|
|
// if they don't have a custom setting, or customization is disabled, use the default
|
|
|
|
if result == NickEnforcementOptional || !config.Accounts.NickReservation.AllowCustomEnforcement {
|
|
|
|
result = config.Accounts.NickReservation.Method
|
|
|
|
}
|
|
|
|
if result == NickEnforcementOptional {
|
|
|
|
// enforcement was explicitly enabled neither in the config or by the user
|
|
|
|
result = NickEnforcementNone
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-01-02 16:08:44 +01:00
|
|
|
// Given a nick, looks up the account that owns it and the method (none/timeout/strict)
|
|
|
|
// used to enforce ownership.
|
2019-05-19 10:27:44 +02:00
|
|
|
func (am *AccountManager) EnforcementStatus(cfnick, skeleton string) (account string, method NickEnforcementMethod) {
|
2019-01-02 16:08:44 +01:00
|
|
|
config := am.server.Config()
|
|
|
|
if !config.Accounts.NickReservation.Enabled {
|
2019-05-19 10:27:44 +02:00
|
|
|
return "", NickEnforcementNone
|
2019-01-02 16:08:44 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
am.RLock()
|
|
|
|
defer am.RUnlock()
|
|
|
|
|
2019-05-19 10:27:44 +02:00
|
|
|
finalEnforcementMethod := func(account_ string) (result NickEnforcementMethod) {
|
|
|
|
storedMethod := am.accountToMethod[account_]
|
|
|
|
return configuredEnforcementMethod(config, storedMethod)
|
2019-01-04 05:44:01 +01:00
|
|
|
}
|
2019-01-31 00:59:49 +01:00
|
|
|
|
|
|
|
nickAccount := am.nickToAccount[cfnick]
|
|
|
|
skelAccount := am.skeletonToAccount[skeleton]
|
|
|
|
if nickAccount == "" && skelAccount == "" {
|
2019-05-19 10:27:44 +02:00
|
|
|
return "", NickEnforcementNone
|
2019-01-31 23:34:06 +01:00
|
|
|
} else if nickAccount != "" && (skelAccount == nickAccount || skelAccount == "") {
|
|
|
|
return nickAccount, finalEnforcementMethod(nickAccount)
|
|
|
|
} else if skelAccount != "" && nickAccount == "" {
|
|
|
|
return skelAccount, finalEnforcementMethod(skelAccount)
|
|
|
|
} else {
|
|
|
|
// nickAccount != skelAccount and both are nonempty:
|
2019-01-31 00:59:49 +01:00
|
|
|
// two people have competing claims on (this casefolding of) this nick!
|
|
|
|
nickMethod := finalEnforcementMethod(nickAccount)
|
|
|
|
skelMethod := finalEnforcementMethod(skelAccount)
|
|
|
|
switch {
|
2019-05-19 10:27:44 +02:00
|
|
|
case skelMethod == NickEnforcementNone:
|
2019-01-31 00:59:49 +01:00
|
|
|
return nickAccount, nickMethod
|
2019-05-19 10:27:44 +02:00
|
|
|
case nickMethod == NickEnforcementNone:
|
2019-01-31 00:59:49 +01:00
|
|
|
return skelAccount, skelMethod
|
|
|
|
default:
|
|
|
|
// nobody can use this nick
|
2019-05-19 10:27:44 +02:00
|
|
|
return "!", NickEnforcementStrict
|
2019-01-31 00:59:49 +01:00
|
|
|
}
|
2019-01-02 16:08:44 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Sets a custom enforcement method for an account and stores it in the database.
|
2019-05-19 10:27:44 +02:00
|
|
|
func (am *AccountManager) SetEnforcementStatus(account string, method NickEnforcementMethod) (finalSettings AccountSettings, err error) {
|
2019-01-02 16:08:44 +01:00
|
|
|
config := am.server.Config()
|
|
|
|
if !(config.Accounts.NickReservation.Enabled && config.Accounts.NickReservation.AllowCustomEnforcement) {
|
2019-05-19 10:27:44 +02:00
|
|
|
err = errFeatureDisabled
|
|
|
|
return
|
2019-01-02 16:08:44 +01:00
|
|
|
}
|
|
|
|
|
2019-05-19 10:27:44 +02:00
|
|
|
setter := func(in AccountSettings) (out AccountSettings, err error) {
|
|
|
|
out = in
|
|
|
|
out.NickEnforcement = method
|
|
|
|
return out, nil
|
2019-01-02 16:08:44 +01:00
|
|
|
}
|
|
|
|
|
2019-05-19 10:27:44 +02:00
|
|
|
_, err = am.ModifyAccountSettings(account, setter)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
2019-01-02 16:08:44 +01:00
|
|
|
|
2019-05-19 10:27:44 +02:00
|
|
|
// this update of the data plane is racey, but it's probably fine
|
2019-01-02 16:08:44 +01:00
|
|
|
am.Lock()
|
|
|
|
defer am.Unlock()
|
|
|
|
|
2019-05-19 10:27:44 +02:00
|
|
|
if method == NickEnforcementOptional {
|
|
|
|
delete(am.accountToMethod, account)
|
|
|
|
} else {
|
|
|
|
am.accountToMethod[account] = method
|
2019-01-02 16:08:44 +01:00
|
|
|
}
|
|
|
|
|
2019-05-19 10:27:44 +02:00
|
|
|
return
|
2019-01-02 16:08:44 +01:00
|
|
|
}
|
|
|
|
|
2018-04-19 08:48:19 +02:00
|
|
|
func (am *AccountManager) AccountToClients(account string) (result []*Client) {
|
|
|
|
cfaccount, err := CasefoldName(account)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
am.RLock()
|
|
|
|
defer am.RUnlock()
|
|
|
|
return am.accountToClients[cfaccount]
|
|
|
|
}
|
|
|
|
|
2018-02-11 11:30:40 +01:00
|
|
|
func (am *AccountManager) Register(client *Client, account string, callbackNamespace string, callbackValue string, passphrase string, certfp string) error {
|
|
|
|
casefoldedAccount, err := CasefoldName(account)
|
2019-01-31 00:59:49 +01:00
|
|
|
skeleton, skerr := Skeleton(account)
|
|
|
|
if err != nil || skerr != nil || account == "" || account == "*" {
|
2018-02-11 11:30:40 +01:00
|
|
|
return errAccountCreation
|
|
|
|
}
|
|
|
|
|
2020-08-23 04:43:21 +02:00
|
|
|
if restrictedCasefoldedNicks.Has(casefoldedAccount) || restrictedSkeletons.Has(skeleton) {
|
2019-01-31 00:59:49 +01:00
|
|
|
return errAccountAlreadyRegistered
|
|
|
|
}
|
|
|
|
|
2020-03-16 12:54:50 +01:00
|
|
|
config := am.server.Config()
|
2019-02-15 01:51:55 +01:00
|
|
|
|
2020-07-08 11:32:14 +02:00
|
|
|
// final "is registration allowed" check:
|
|
|
|
if !(config.Accounts.Registration.Enabled || callbackNamespace == "admin") || am.server.Defcon() <= 4 {
|
2019-02-15 01:51:55 +01:00
|
|
|
return errFeatureDisabled
|
|
|
|
}
|
|
|
|
|
2020-03-27 22:52:37 +01:00
|
|
|
if client != nil && client.Account() != "" {
|
|
|
|
return errAccountAlreadyLoggedIn
|
|
|
|
}
|
|
|
|
|
|
|
|
if client != nil && am.touchRegisterThrottle() {
|
|
|
|
am.server.logger.Warning("accounts", "global registration throttle exceeded by client", client.Nick())
|
|
|
|
return errLimitExceeded
|
|
|
|
}
|
|
|
|
|
2020-10-07 14:54:46 +02:00
|
|
|
// if nick reservation is enabled, don't let people reserve nicknames
|
|
|
|
// that they would not be eligible to take, e.g.,
|
|
|
|
// 1. a nickname that someone else is currently holding
|
|
|
|
// 2. a nickname confusable with an existing reserved nickname
|
|
|
|
// this has a lot of weird edge cases because of force-guest-format
|
|
|
|
// and the possibility of registering a nickname on an "unregistered connection"
|
|
|
|
// (i.e., pre-handshake).
|
|
|
|
if client != nil && config.Accounts.NickReservation.Enabled {
|
|
|
|
_, nickAcquireError, _ := am.server.clients.SetNick(client, nil, account, true)
|
|
|
|
if !(nickAcquireError == nil || nickAcquireError == errNoop) {
|
|
|
|
return errAccountMustHoldNick
|
2020-10-07 00:04:29 +02:00
|
|
|
}
|
2019-02-06 01:03:42 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// can't register a guest nickname
|
2020-03-16 12:54:50 +01:00
|
|
|
if config.Accounts.NickReservation.guestRegexpFolded.MatchString(casefoldedAccount) {
|
2018-02-18 10:46:14 +01:00
|
|
|
return errAccountAlreadyRegistered
|
|
|
|
}
|
|
|
|
|
2018-02-11 11:30:40 +01:00
|
|
|
accountKey := fmt.Sprintf(keyAccountExists, casefoldedAccount)
|
2020-03-20 17:34:46 +01:00
|
|
|
unregisteredKey := fmt.Sprintf(keyAccountUnregistered, casefoldedAccount)
|
2018-02-11 11:30:40 +01:00
|
|
|
accountNameKey := fmt.Sprintf(keyAccountName, casefoldedAccount)
|
2018-02-20 10:20:30 +01:00
|
|
|
callbackKey := fmt.Sprintf(keyAccountCallback, casefoldedAccount)
|
2018-02-11 11:30:40 +01:00
|
|
|
registeredTimeKey := fmt.Sprintf(keyAccountRegTime, casefoldedAccount)
|
|
|
|
credentialsKey := fmt.Sprintf(keyAccountCredentials, casefoldedAccount)
|
2018-02-20 10:20:30 +01:00
|
|
|
verificationCodeKey := fmt.Sprintf(keyAccountVerificationCode, casefoldedAccount)
|
2018-02-11 11:30:40 +01:00
|
|
|
certFPKey := fmt.Sprintf(keyCertToAccount, certfp)
|
|
|
|
|
2019-12-29 17:59:49 +01:00
|
|
|
var creds AccountCredentials
|
|
|
|
creds.Version = 1
|
|
|
|
err = creds.SetPassphrase(passphrase, am.server.Config().Accounts.Registration.BcryptCost)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
creds.AddCertfp(certfp)
|
|
|
|
credStr, err := creds.Serialize()
|
2018-02-11 11:30:40 +01:00
|
|
|
if err != nil {
|
2018-08-06 04:51:39 +02:00
|
|
|
return err
|
2018-02-11 11:30:40 +01:00
|
|
|
}
|
|
|
|
|
2020-03-01 09:39:25 +01:00
|
|
|
registeredTimeStr := strconv.FormatInt(time.Now().UnixNano(), 10)
|
2018-02-20 10:20:30 +01:00
|
|
|
callbackSpec := fmt.Sprintf("%s:%s", callbackNamespace, callbackValue)
|
2018-02-11 11:30:40 +01:00
|
|
|
|
|
|
|
var setOptions *buntdb.SetOptions
|
2020-03-16 12:54:50 +01:00
|
|
|
ttl := time.Duration(config.Accounts.Registration.VerifyTimeout)
|
2018-02-11 11:30:40 +01:00
|
|
|
if ttl != 0 {
|
|
|
|
setOptions = &buntdb.SetOptions{Expires: true, TTL: ttl}
|
|
|
|
}
|
|
|
|
|
2018-03-11 18:59:02 +01:00
|
|
|
err = func() error {
|
|
|
|
am.serialCacheUpdateMutex.Lock()
|
|
|
|
defer am.serialCacheUpdateMutex.Unlock()
|
|
|
|
|
|
|
|
// can't register an account with the same name as a registered nick
|
2020-10-16 22:50:02 +02:00
|
|
|
if am.NickToAccount(account) != "" {
|
2018-02-11 11:30:40 +01:00
|
|
|
return errAccountAlreadyRegistered
|
|
|
|
}
|
|
|
|
|
2018-03-11 18:59:02 +01:00
|
|
|
return am.server.store.Update(func(tx *buntdb.Tx) error {
|
2020-03-20 17:34:46 +01:00
|
|
|
if _, err := tx.Get(unregisteredKey); err == nil {
|
|
|
|
return errAccountAlreadyUnregistered
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = am.loadRawAccount(tx, casefoldedAccount)
|
2018-03-11 18:59:02 +01:00
|
|
|
if err != errAccountDoesNotExist {
|
|
|
|
return errAccountAlreadyRegistered
|
2018-02-11 11:30:40 +01:00
|
|
|
}
|
|
|
|
|
2018-03-11 18:59:02 +01:00
|
|
|
if certfp != "" {
|
|
|
|
// make sure certfp doesn't already exist because that'd be silly
|
|
|
|
_, err := tx.Get(certFPKey)
|
|
|
|
if err != buntdb.ErrNotFound {
|
|
|
|
return errCertfpAlreadyExists
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
tx.Set(accountKey, "1", setOptions)
|
|
|
|
tx.Set(accountNameKey, account, setOptions)
|
|
|
|
tx.Set(registeredTimeKey, registeredTimeStr, setOptions)
|
|
|
|
tx.Set(credentialsKey, credStr, setOptions)
|
|
|
|
tx.Set(callbackKey, callbackSpec, setOptions)
|
2020-01-06 21:00:26 +01:00
|
|
|
if certfp != "" {
|
|
|
|
tx.Set(certFPKey, casefoldedAccount, setOptions)
|
|
|
|
}
|
2018-03-11 18:59:02 +01:00
|
|
|
return nil
|
|
|
|
})
|
|
|
|
}()
|
2018-02-11 11:30:40 +01:00
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-04-05 09:48:59 +02:00
|
|
|
code, err := am.dispatchCallback(client, account, callbackNamespace, callbackValue)
|
2018-02-20 10:20:30 +01:00
|
|
|
if err != nil {
|
2020-03-20 17:34:46 +01:00
|
|
|
am.Unregister(casefoldedAccount, true)
|
2018-02-20 10:20:30 +01:00
|
|
|
return errCallbackFailed
|
|
|
|
} else {
|
|
|
|
return am.server.store.Update(func(tx *buntdb.Tx) error {
|
|
|
|
_, _, err = tx.Set(verificationCodeKey, code, setOptions)
|
|
|
|
return err
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-08-06 04:51:39 +02:00
|
|
|
// validatePassphrase checks whether a passphrase is allowed by our rules
|
|
|
|
func validatePassphrase(passphrase string) error {
|
|
|
|
// sanity check the length
|
2020-02-23 06:11:57 +01:00
|
|
|
if len(passphrase) == 0 || len(passphrase) > 300 {
|
2018-08-06 04:51:39 +02:00
|
|
|
return errAccountBadPassphrase
|
2019-05-29 10:25:20 +02:00
|
|
|
}
|
|
|
|
// we use * as a placeholder in some places, if it's gotten this far then fail
|
|
|
|
if passphrase == "*" {
|
|
|
|
return errAccountBadPassphrase
|
2018-08-06 04:51:39 +02:00
|
|
|
}
|
|
|
|
// for now, just enforce that spaces are not allowed
|
|
|
|
for _, r := range passphrase {
|
|
|
|
if unicode.IsSpace(r) {
|
|
|
|
return errAccountBadPassphrase
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-12-29 17:59:49 +01:00
|
|
|
// changes the password for an account
|
|
|
|
func (am *AccountManager) setPassword(account string, password string, hasPrivs bool) (err error) {
|
|
|
|
cfAccount, err := CasefoldName(account)
|
|
|
|
if err != nil {
|
|
|
|
return errAccountDoesNotExist
|
|
|
|
}
|
|
|
|
|
|
|
|
credKey := fmt.Sprintf(keyAccountCredentials, cfAccount)
|
|
|
|
var credStr string
|
|
|
|
am.server.store.View(func(tx *buntdb.Tx) error {
|
|
|
|
// no need to check verification status here or below;
|
|
|
|
// you either need to be auth'ed to the account or be an oper to do this
|
|
|
|
credStr, err = tx.Get(credKey)
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return errAccountDoesNotExist
|
|
|
|
}
|
|
|
|
|
2018-08-06 04:51:39 +02:00
|
|
|
var creds AccountCredentials
|
2019-12-29 17:59:49 +01:00
|
|
|
err = json.Unmarshal([]byte(credStr), &creds)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2018-08-06 04:51:39 +02:00
|
|
|
}
|
|
|
|
|
2020-02-11 12:35:17 +01:00
|
|
|
if !hasPrivs && creds.Empty() {
|
|
|
|
return errCredsExternallyManaged
|
|
|
|
}
|
|
|
|
|
2019-12-29 17:59:49 +01:00
|
|
|
err = creds.SetPassphrase(password, am.server.Config().Accounts.Registration.BcryptCost)
|
2018-08-06 04:51:39 +02:00
|
|
|
if err != nil {
|
2019-12-29 17:59:49 +01:00
|
|
|
return err
|
2018-08-06 04:51:39 +02:00
|
|
|
}
|
2019-12-29 17:59:49 +01:00
|
|
|
|
|
|
|
if creds.Empty() && !hasPrivs {
|
|
|
|
return errEmptyCredentials
|
|
|
|
}
|
|
|
|
|
|
|
|
newCredStr, err := creds.Serialize()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = am.server.store.Update(func(tx *buntdb.Tx) error {
|
|
|
|
curCredStr, err := tx.Get(credKey)
|
|
|
|
if credStr != curCredStr {
|
|
|
|
return errCASFailed
|
|
|
|
}
|
|
|
|
_, _, err = tx.Set(credKey, newCredStr, nil)
|
|
|
|
return err
|
|
|
|
})
|
|
|
|
|
|
|
|
return err
|
2018-08-06 04:51:39 +02:00
|
|
|
}
|
|
|
|
|
2020-02-19 01:38:42 +01:00
|
|
|
func (am *AccountManager) saveChannels(account string, channels []string) {
|
|
|
|
channelsStr := strings.Join(channels, ",")
|
|
|
|
key := fmt.Sprintf(keyAccountJoinedChannels, account)
|
|
|
|
am.server.store.Update(func(tx *buntdb.Tx) error {
|
|
|
|
tx.Set(key, channelsStr, nil)
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func (am *AccountManager) loadChannels(account string) (channels []string) {
|
|
|
|
key := fmt.Sprintf(keyAccountJoinedChannels, account)
|
|
|
|
var channelsStr string
|
|
|
|
am.server.store.View(func(tx *buntdb.Tx) error {
|
|
|
|
channelsStr, _ = tx.Get(key)
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if channelsStr != "" {
|
|
|
|
return strings.Split(channelsStr, ",")
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-05-19 20:38:56 +02:00
|
|
|
func (am *AccountManager) saveModes(account string, uModes modes.Modes) {
|
|
|
|
modeStr := uModes.String()
|
|
|
|
key := fmt.Sprintf(keyAccountModes, account)
|
|
|
|
am.server.store.Update(func(tx *buntdb.Tx) error {
|
|
|
|
tx.Set(key, modeStr, nil)
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func (am *AccountManager) loadModes(account string) (uModes modes.Modes) {
|
|
|
|
key := fmt.Sprintf(keyAccountModes, account)
|
|
|
|
var modeStr string
|
|
|
|
am.server.store.View(func(tx *buntdb.Tx) error {
|
|
|
|
modeStr, _ = tx.Get(key)
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
for _, m := range modeStr {
|
|
|
|
uModes = append(uModes, modes.Mode(m))
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-06-12 21:51:48 +02:00
|
|
|
func (am *AccountManager) saveLastSeen(account string, lastSeen map[string]time.Time) {
|
2020-02-27 08:13:31 +01:00
|
|
|
key := fmt.Sprintf(keyAccountLastSeen, account)
|
2020-02-20 08:33:49 +01:00
|
|
|
var val string
|
2020-06-12 21:51:48 +02:00
|
|
|
if len(lastSeen) != 0 {
|
|
|
|
text, _ := json.Marshal(lastSeen)
|
|
|
|
val = string(text)
|
2020-02-20 08:33:49 +01:00
|
|
|
}
|
|
|
|
am.server.store.Update(func(tx *buntdb.Tx) error {
|
|
|
|
if val != "" {
|
|
|
|
tx.Set(key, val, nil)
|
|
|
|
} else {
|
|
|
|
tx.Delete(key)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-06-12 21:51:48 +02:00
|
|
|
func (am *AccountManager) loadLastSeen(account string) (lastSeen map[string]time.Time) {
|
2020-02-27 08:13:31 +01:00
|
|
|
key := fmt.Sprintf(keyAccountLastSeen, account)
|
2020-02-20 08:33:49 +01:00
|
|
|
var lsText string
|
2020-02-27 08:13:31 +01:00
|
|
|
am.server.store.Update(func(tx *buntdb.Tx) error {
|
2020-02-20 08:33:49 +01:00
|
|
|
lsText, _ = tx.Get(key)
|
|
|
|
return nil
|
|
|
|
})
|
2020-06-12 21:51:48 +02:00
|
|
|
if lsText == "" {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
err := json.Unmarshal([]byte(lsText), &lastSeen)
|
|
|
|
if err != nil {
|
|
|
|
return nil
|
2020-02-20 08:33:49 +01:00
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-07-06 10:08:04 +02:00
|
|
|
func (am *AccountManager) saveRealname(account string, realname string) {
|
|
|
|
key := fmt.Sprintf(keyAccountRealname, account)
|
|
|
|
am.server.store.Update(func(tx *buntdb.Tx) error {
|
|
|
|
if realname != "" {
|
|
|
|
tx.Set(key, realname, nil)
|
|
|
|
} else {
|
|
|
|
tx.Delete(key)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func (am *AccountManager) loadRealname(account string) (realname string) {
|
|
|
|
key := fmt.Sprintf(keyAccountRealname, account)
|
|
|
|
am.server.store.Update(func(tx *buntdb.Tx) error {
|
|
|
|
realname, _ = tx.Get(key)
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-12-29 17:59:49 +01:00
|
|
|
func (am *AccountManager) addRemoveCertfp(account, certfp string, add bool, hasPrivs bool) (err error) {
|
|
|
|
certfp, err = utils.NormalizeCertfp(certfp)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
cfAccount, err := CasefoldName(account)
|
|
|
|
if err != nil {
|
|
|
|
return errAccountDoesNotExist
|
|
|
|
}
|
|
|
|
|
|
|
|
credKey := fmt.Sprintf(keyAccountCredentials, cfAccount)
|
|
|
|
var credStr string
|
|
|
|
am.server.store.View(func(tx *buntdb.Tx) error {
|
|
|
|
credStr, err = tx.Get(credKey)
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return errAccountDoesNotExist
|
|
|
|
}
|
|
|
|
|
|
|
|
var creds AccountCredentials
|
|
|
|
err = json.Unmarshal([]byte(credStr), &creds)
|
2018-08-06 04:51:39 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-12-29 17:59:49 +01:00
|
|
|
|
2020-02-11 12:35:17 +01:00
|
|
|
if !hasPrivs && creds.Empty() {
|
|
|
|
return errCredsExternallyManaged
|
|
|
|
}
|
|
|
|
|
2019-12-29 17:59:49 +01:00
|
|
|
if add {
|
|
|
|
err = creds.AddCertfp(certfp)
|
|
|
|
} else {
|
|
|
|
err = creds.RemoveCertfp(certfp)
|
|
|
|
}
|
2018-08-06 04:51:39 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-12-29 17:59:49 +01:00
|
|
|
if creds.Empty() && !hasPrivs {
|
|
|
|
return errEmptyCredentials
|
|
|
|
}
|
|
|
|
|
|
|
|
newCredStr, err := creds.Serialize()
|
2018-08-06 04:51:39 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-12-29 17:59:49 +01:00
|
|
|
certfpKey := fmt.Sprintf(keyCertToAccount, certfp)
|
|
|
|
err = am.server.store.Update(func(tx *buntdb.Tx) error {
|
|
|
|
curCredStr, err := tx.Get(credKey)
|
|
|
|
if credStr != curCredStr {
|
|
|
|
return errCASFailed
|
|
|
|
}
|
|
|
|
if add {
|
|
|
|
_, err = tx.Get(certfpKey)
|
|
|
|
if err != buntdb.ErrNotFound {
|
|
|
|
return errCertfpAlreadyExists
|
|
|
|
}
|
|
|
|
tx.Set(certfpKey, cfAccount, nil)
|
|
|
|
} else {
|
|
|
|
tx.Delete(certfpKey)
|
|
|
|
}
|
|
|
|
_, _, err = tx.Set(credKey, newCredStr, nil)
|
2018-08-06 04:51:39 +02:00
|
|
|
return err
|
|
|
|
})
|
2019-12-29 17:59:49 +01:00
|
|
|
|
|
|
|
return err
|
2018-08-06 04:51:39 +02:00
|
|
|
}
|
|
|
|
|
2020-04-05 09:48:59 +02:00
|
|
|
func (am *AccountManager) dispatchCallback(client *Client, account string, callbackNamespace string, callbackValue string) (string, error) {
|
2019-02-05 06:19:03 +01:00
|
|
|
if callbackNamespace == "*" || callbackNamespace == "none" || callbackNamespace == "admin" {
|
2018-02-20 10:20:30 +01:00
|
|
|
return "", nil
|
|
|
|
} else if callbackNamespace == "mailto" {
|
2020-04-05 09:48:59 +02:00
|
|
|
return am.dispatchMailtoCallback(client, account, callbackValue)
|
2018-02-20 10:20:30 +01:00
|
|
|
} else {
|
2019-05-10 07:44:14 +02:00
|
|
|
return "", fmt.Errorf("Callback not implemented: %s", callbackNamespace)
|
2018-02-20 10:20:30 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-05 09:48:59 +02:00
|
|
|
func (am *AccountManager) dispatchMailtoCallback(client *Client, account string, callbackValue string) (code string, err error) {
|
2020-10-07 00:04:29 +02:00
|
|
|
config := am.server.Config().Accounts.Registration.EmailVerification
|
2018-11-26 11:23:27 +01:00
|
|
|
code = utils.GenerateSecretToken()
|
2018-02-20 10:20:30 +01:00
|
|
|
|
|
|
|
subject := config.VerifyMessageSubject
|
|
|
|
if subject == "" {
|
|
|
|
subject = fmt.Sprintf(client.t("Verify your account on %s"), am.server.name)
|
|
|
|
}
|
|
|
|
|
2020-04-05 09:48:59 +02:00
|
|
|
var message bytes.Buffer
|
|
|
|
fmt.Fprintf(&message, "From: %s\r\n", config.Sender)
|
|
|
|
fmt.Fprintf(&message, "To: %s\r\n", callbackValue)
|
|
|
|
if config.DKIM.Domain != "" {
|
|
|
|
fmt.Fprintf(&message, "Message-ID: <%s@%s>\r\n", utils.GenerateSecretKey(), config.DKIM.Domain)
|
|
|
|
}
|
2020-04-13 17:54:39 +02:00
|
|
|
fmt.Fprintf(&message, "Date: %s\r\n", time.Now().UTC().Format(time.RFC1123Z))
|
2020-04-05 09:48:59 +02:00
|
|
|
fmt.Fprintf(&message, "Subject: %s\r\n", subject)
|
|
|
|
message.WriteString("\r\n") // blank line: end headers, begin message body
|
|
|
|
fmt.Fprintf(&message, client.t("Account: %s"), account)
|
|
|
|
message.WriteString("\r\n")
|
|
|
|
fmt.Fprintf(&message, client.t("Verification code: %s"), code)
|
|
|
|
message.WriteString("\r\n")
|
|
|
|
message.WriteString("\r\n")
|
|
|
|
message.WriteString(client.t("To verify your account, issue the following command:"))
|
|
|
|
message.WriteString("\r\n")
|
|
|
|
fmt.Fprintf(&message, "/MSG NickServ VERIFY %s %s\r\n", account, code)
|
|
|
|
|
|
|
|
err = email.SendMail(config, callbackValue, message.Bytes())
|
2018-02-20 10:20:30 +01:00
|
|
|
if err != nil {
|
2020-04-05 09:48:59 +02:00
|
|
|
am.server.logger.Error("internal", "Failed to dispatch e-mail to", callbackValue, err.Error())
|
2018-02-20 10:20:30 +01:00
|
|
|
}
|
|
|
|
return
|
2018-02-11 11:30:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func (am *AccountManager) Verify(client *Client, account string, code string) error {
|
|
|
|
casefoldedAccount, err := CasefoldName(account)
|
2020-04-06 06:06:06 +02:00
|
|
|
var skeleton string
|
2018-02-11 11:30:40 +01:00
|
|
|
if err != nil || account == "" || account == "*" {
|
|
|
|
return errAccountVerificationFailed
|
|
|
|
}
|
|
|
|
|
2020-03-27 22:52:37 +01:00
|
|
|
if client != nil && client.Account() != "" {
|
|
|
|
return errAccountAlreadyLoggedIn
|
|
|
|
}
|
|
|
|
|
2018-02-11 11:30:40 +01:00
|
|
|
verifiedKey := fmt.Sprintf(keyAccountVerified, casefoldedAccount)
|
|
|
|
accountKey := fmt.Sprintf(keyAccountExists, casefoldedAccount)
|
|
|
|
accountNameKey := fmt.Sprintf(keyAccountName, casefoldedAccount)
|
|
|
|
registeredTimeKey := fmt.Sprintf(keyAccountRegTime, casefoldedAccount)
|
2018-02-20 10:20:30 +01:00
|
|
|
verificationCodeKey := fmt.Sprintf(keyAccountVerificationCode, casefoldedAccount)
|
|
|
|
callbackKey := fmt.Sprintf(keyAccountCallback, casefoldedAccount)
|
2018-02-11 11:30:40 +01:00
|
|
|
credentialsKey := fmt.Sprintf(keyAccountCredentials, casefoldedAccount)
|
|
|
|
|
|
|
|
var raw rawClientAccount
|
|
|
|
|
|
|
|
func() {
|
|
|
|
am.serialCacheUpdateMutex.Lock()
|
|
|
|
defer am.serialCacheUpdateMutex.Unlock()
|
|
|
|
|
2020-10-16 22:57:33 +02:00
|
|
|
// do a final check for confusability (in case someone already verified
|
|
|
|
// a confusable identifier):
|
|
|
|
var unfoldedName string
|
|
|
|
err = am.server.store.View(func(tx *buntdb.Tx) error {
|
|
|
|
unfoldedName, err = tx.Get(accountNameKey)
|
|
|
|
return err
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
err = errAccountDoesNotExist
|
|
|
|
return
|
|
|
|
}
|
|
|
|
skeleton, err = Skeleton(unfoldedName)
|
|
|
|
if err != nil {
|
|
|
|
err = errAccountDoesNotExist
|
|
|
|
return
|
|
|
|
}
|
|
|
|
err = func() error {
|
|
|
|
am.RLock()
|
|
|
|
defer am.RUnlock()
|
|
|
|
if _, ok := am.skeletonToAccount[skeleton]; ok {
|
|
|
|
return errConfusableIdentifier
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}()
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-02-20 10:20:30 +01:00
|
|
|
err = am.server.store.Update(func(tx *buntdb.Tx) error {
|
2018-02-11 11:30:40 +01:00
|
|
|
raw, err = am.loadRawAccount(tx, casefoldedAccount)
|
|
|
|
if err == errAccountDoesNotExist {
|
|
|
|
return errAccountDoesNotExist
|
|
|
|
} else if err != nil {
|
|
|
|
return errAccountVerificationFailed
|
|
|
|
} else if raw.Verified {
|
|
|
|
return errAccountAlreadyVerified
|
|
|
|
}
|
|
|
|
|
2018-02-20 10:20:30 +01:00
|
|
|
// actually verify the code
|
|
|
|
// a stored code of "" means a none callback / no code required
|
|
|
|
success := false
|
|
|
|
storedCode, err := tx.Get(verificationCodeKey)
|
|
|
|
if err == nil {
|
|
|
|
// this is probably unnecessary
|
2018-11-26 11:23:27 +01:00
|
|
|
if storedCode == "" || utils.SecretTokensMatch(storedCode, code) {
|
2018-02-20 10:20:30 +01:00
|
|
|
success = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !success {
|
|
|
|
return errAccountVerificationInvalidCode
|
|
|
|
}
|
2018-02-11 11:30:40 +01:00
|
|
|
|
|
|
|
// verify the account
|
|
|
|
tx.Set(verifiedKey, "1", nil)
|
2018-02-20 10:20:30 +01:00
|
|
|
// don't need the code anymore
|
|
|
|
tx.Delete(verificationCodeKey)
|
2018-02-11 11:30:40 +01:00
|
|
|
// re-set all other keys, removing the TTL
|
|
|
|
tx.Set(accountKey, "1", nil)
|
|
|
|
tx.Set(accountNameKey, raw.Name, nil)
|
|
|
|
tx.Set(registeredTimeKey, raw.RegisteredAt, nil)
|
2018-02-20 10:20:30 +01:00
|
|
|
tx.Set(callbackKey, raw.Callback, nil)
|
2018-02-11 11:30:40 +01:00
|
|
|
tx.Set(credentialsKey, raw.Credentials, nil)
|
|
|
|
|
|
|
|
var creds AccountCredentials
|
|
|
|
// XXX we shouldn't do (de)serialization inside the txn,
|
|
|
|
// but this is like 2 usec on my system
|
|
|
|
json.Unmarshal([]byte(raw.Credentials), &creds)
|
2019-12-29 17:59:49 +01:00
|
|
|
for _, cert := range creds.Certfps {
|
|
|
|
certFPKey := fmt.Sprintf(keyCertToAccount, cert)
|
2018-02-11 11:30:40 +01:00
|
|
|
tx.Set(certFPKey, casefoldedAccount, nil)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
|
|
|
if err == nil {
|
|
|
|
am.Lock()
|
|
|
|
am.nickToAccount[casefoldedAccount] = casefoldedAccount
|
2019-01-31 00:59:49 +01:00
|
|
|
am.skeletonToAccount[skeleton] = casefoldedAccount
|
2018-02-11 11:30:40 +01:00
|
|
|
am.Unlock()
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-02-13 08:42:35 +01:00
|
|
|
nick := "[server admin]"
|
|
|
|
if client != nil {
|
|
|
|
nick = client.Nick()
|
|
|
|
}
|
2020-10-16 22:11:43 +02:00
|
|
|
am.server.logger.Info("accounts", "client", nick, "registered account", account)
|
2018-04-19 08:48:19 +02:00
|
|
|
raw.Verified = true
|
2020-02-19 01:38:42 +01:00
|
|
|
clientAccount, err := am.deserializeRawAccount(raw, casefoldedAccount)
|
2018-04-19 08:48:19 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-02-05 06:19:03 +01:00
|
|
|
if client != nil {
|
|
|
|
am.Login(client, clientAccount)
|
2020-07-26 09:44:59 +02:00
|
|
|
if client.AlwaysOn() {
|
|
|
|
client.markDirty(IncludeRealname)
|
|
|
|
}
|
2019-02-05 06:19:03 +01:00
|
|
|
}
|
2020-07-26 09:44:59 +02:00
|
|
|
// we may need to do nick enforcement here:
|
2020-04-06 06:06:06 +02:00
|
|
|
_, method := am.EnforcementStatus(casefoldedAccount, skeleton)
|
2020-07-26 09:44:59 +02:00
|
|
|
if method == NickEnforcementStrict {
|
2020-04-06 06:06:06 +02:00
|
|
|
currentClient := am.server.clients.Get(casefoldedAccount)
|
2020-07-26 09:44:59 +02:00
|
|
|
if currentClient != nil && currentClient != client && currentClient.Account() != casefoldedAccount {
|
2020-04-06 06:06:06 +02:00
|
|
|
am.server.RandomlyRename(currentClient)
|
|
|
|
}
|
|
|
|
}
|
2018-02-11 11:30:40 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-02-11 12:35:17 +01:00
|
|
|
// register and verify an account, for internal use
|
|
|
|
func (am *AccountManager) SARegister(account, passphrase string) (err error) {
|
|
|
|
err = am.Register(nil, account, "admin", "", passphrase, "")
|
|
|
|
if err == nil {
|
|
|
|
err = am.Verify(nil, account, "")
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-03-02 23:04:24 +01:00
|
|
|
func marshalReservedNicks(nicks []string) string {
|
|
|
|
return strings.Join(nicks, ",")
|
|
|
|
}
|
|
|
|
|
|
|
|
func unmarshalReservedNicks(nicks string) (result []string) {
|
|
|
|
if nicks == "" {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
return strings.Split(nicks, ",")
|
|
|
|
}
|
|
|
|
|
2018-03-14 11:50:26 +01:00
|
|
|
func (am *AccountManager) SetNickReserved(client *Client, nick string, saUnreserve bool, reserve bool) error {
|
2018-03-02 23:04:24 +01:00
|
|
|
cfnick, err := CasefoldName(nick)
|
2019-01-31 00:59:49 +01:00
|
|
|
skeleton, skerr := Skeleton(nick)
|
2018-03-14 11:50:26 +01:00
|
|
|
// garbage nick, or garbage options, or disabled
|
2020-03-16 12:54:50 +01:00
|
|
|
nrconfig := am.server.Config().Accounts.NickReservation
|
2019-01-31 00:59:49 +01:00
|
|
|
if err != nil || skerr != nil || cfnick == "" || (reserve && saUnreserve) || !nrconfig.Enabled {
|
2018-03-02 23:04:24 +01:00
|
|
|
return errAccountNickReservationFailed
|
2018-02-11 11:30:40 +01:00
|
|
|
}
|
|
|
|
|
2018-03-14 11:50:26 +01:00
|
|
|
// the cache is in sync with the DB while we hold serialCacheUpdateMutex
|
2018-03-02 23:04:24 +01:00
|
|
|
am.serialCacheUpdateMutex.Lock()
|
|
|
|
defer am.serialCacheUpdateMutex.Unlock()
|
|
|
|
|
2018-03-14 11:50:26 +01:00
|
|
|
// find the affected account, which is usually the client's:
|
|
|
|
account := client.Account()
|
|
|
|
if saUnreserve {
|
|
|
|
// unless this is a sadrop:
|
2020-10-16 22:50:02 +02:00
|
|
|
account := func() string {
|
|
|
|
am.RLock()
|
|
|
|
defer am.RUnlock()
|
|
|
|
return am.nickToAccount[cfnick]
|
|
|
|
}()
|
2018-03-14 11:50:26 +01:00
|
|
|
if account == "" {
|
|
|
|
// nothing to do
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if account == "" {
|
|
|
|
return errAccountNotLoggedIn
|
|
|
|
}
|
|
|
|
|
2019-01-31 00:59:49 +01:00
|
|
|
am.Lock()
|
|
|
|
accountForNick := am.nickToAccount[cfnick]
|
|
|
|
var accountForSkeleton string
|
|
|
|
if reserve {
|
|
|
|
accountForSkeleton = am.skeletonToAccount[skeleton]
|
|
|
|
}
|
|
|
|
am.Unlock()
|
|
|
|
|
|
|
|
if reserve && (accountForNick != "" || accountForSkeleton != "") {
|
2018-03-02 23:04:24 +01:00
|
|
|
return errNicknameReserved
|
2018-03-14 11:50:26 +01:00
|
|
|
} else if !reserve && !saUnreserve && accountForNick != account {
|
|
|
|
return errNicknameReserved
|
2018-03-02 23:04:24 +01:00
|
|
|
} else if !reserve && cfnick == account {
|
|
|
|
return errAccountCantDropPrimaryNick
|
|
|
|
}
|
|
|
|
|
|
|
|
nicksKey := fmt.Sprintf(keyAccountAdditionalNicks, account)
|
2018-03-11 19:12:07 +01:00
|
|
|
unverifiedAccountKey := fmt.Sprintf(keyAccountExists, cfnick)
|
2018-03-02 23:04:24 +01:00
|
|
|
err = am.server.store.Update(func(tx *buntdb.Tx) error {
|
2018-03-11 19:12:07 +01:00
|
|
|
if reserve {
|
|
|
|
// unverified accounts don't show up in NickToAccount yet (which is intentional),
|
|
|
|
// however you shouldn't be able to reserve a nick out from under them
|
|
|
|
_, err := tx.Get(unverifiedAccountKey)
|
|
|
|
if err == nil {
|
|
|
|
return errNicknameReserved
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-02 23:04:24 +01:00
|
|
|
rawNicks, err := tx.Get(nicksKey)
|
|
|
|
if err != nil && err != buntdb.ErrNotFound {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
nicks := unmarshalReservedNicks(rawNicks)
|
|
|
|
|
|
|
|
if reserve {
|
2018-03-14 11:50:26 +01:00
|
|
|
if len(nicks) >= nrconfig.AdditionalNickLimit {
|
2018-03-02 23:04:24 +01:00
|
|
|
return errAccountTooManyNicks
|
|
|
|
}
|
2019-01-31 00:59:49 +01:00
|
|
|
nicks = append(nicks, nick)
|
2018-03-02 23:04:24 +01:00
|
|
|
} else {
|
2019-01-31 00:59:49 +01:00
|
|
|
// compute (original reserved nicks) minus cfnick
|
2018-03-02 23:04:24 +01:00
|
|
|
var newNicks []string
|
|
|
|
for _, reservedNick := range nicks {
|
2019-01-31 00:59:49 +01:00
|
|
|
cfreservednick, _ := CasefoldName(reservedNick)
|
|
|
|
if cfreservednick != cfnick {
|
2018-03-02 23:04:24 +01:00
|
|
|
newNicks = append(newNicks, reservedNick)
|
2019-01-31 00:59:49 +01:00
|
|
|
} else {
|
|
|
|
// found the original, unfolded version of the nick we're dropping;
|
|
|
|
// recompute the true skeleton from it
|
|
|
|
skeleton, _ = Skeleton(reservedNick)
|
2018-03-02 23:04:24 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
nicks = newNicks
|
|
|
|
}
|
|
|
|
|
|
|
|
marshaledNicks := marshalReservedNicks(nicks)
|
|
|
|
_, _, err = tx.Set(nicksKey, string(marshaledNicks), nil)
|
|
|
|
return err
|
|
|
|
})
|
|
|
|
|
2018-03-11 19:12:07 +01:00
|
|
|
if err == errAccountTooManyNicks || err == errNicknameReserved {
|
2018-03-02 23:04:24 +01:00
|
|
|
return err
|
|
|
|
} else if err != nil {
|
|
|
|
return errAccountNickReservationFailed
|
|
|
|
}
|
|
|
|
|
|
|
|
// success
|
|
|
|
am.Lock()
|
|
|
|
defer am.Unlock()
|
|
|
|
if reserve {
|
|
|
|
am.nickToAccount[cfnick] = account
|
2019-01-31 00:59:49 +01:00
|
|
|
am.skeletonToAccount[skeleton] = account
|
2018-03-02 23:04:24 +01:00
|
|
|
} else {
|
|
|
|
delete(am.nickToAccount, cfnick)
|
2019-01-31 00:59:49 +01:00
|
|
|
delete(am.skeletonToAccount, skeleton)
|
2018-03-02 23:04:24 +01:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-11-29 00:21:41 +01:00
|
|
|
func (am *AccountManager) checkPassphrase(accountName, passphrase string) (account ClientAccount, err error) {
|
|
|
|
account, err = am.LoadAccount(accountName)
|
2018-02-11 11:30:40 +01:00
|
|
|
if err != nil {
|
2018-11-29 00:21:41 +01:00
|
|
|
return
|
2018-02-11 11:30:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if !account.Verified {
|
2018-11-29 00:21:41 +01:00
|
|
|
err = errAccountUnverified
|
|
|
|
return
|
2020-10-27 16:24:17 +01:00
|
|
|
} else if account.Suspended != nil {
|
|
|
|
err = errAccountSuspended
|
|
|
|
return
|
2018-02-11 11:30:40 +01:00
|
|
|
}
|
|
|
|
|
2018-08-06 04:51:39 +02:00
|
|
|
switch account.Credentials.Version {
|
|
|
|
case 0:
|
2020-10-02 22:48:37 +02:00
|
|
|
err = am.checkLegacyPassphrase(migrations.CheckOragonoPassphraseV0, accountName, account.Credentials.PassphraseHash, passphrase)
|
2018-08-06 04:51:39 +02:00
|
|
|
case 1:
|
2019-01-02 16:29:42 +01:00
|
|
|
if passwd.CompareHashAndPassword(account.Credentials.PassphraseHash, []byte(passphrase)) != nil {
|
|
|
|
err = errAccountInvalidCredentials
|
|
|
|
}
|
2020-10-02 22:48:37 +02:00
|
|
|
case -1:
|
|
|
|
err = am.checkLegacyPassphrase(migrations.CheckAthemePassphrase, accountName, account.Credentials.PassphraseHash, passphrase)
|
2020-10-12 21:06:17 +02:00
|
|
|
case -2:
|
|
|
|
err = am.checkLegacyPassphrase(migrations.CheckAnopePassphrase, accountName, account.Credentials.PassphraseHash, passphrase)
|
2018-08-06 04:51:39 +02:00
|
|
|
default:
|
|
|
|
err = errAccountInvalidCredentials
|
2018-04-01 09:12:41 +02:00
|
|
|
}
|
2018-11-29 00:21:41 +01:00
|
|
|
return
|
|
|
|
}
|
2018-08-06 04:51:39 +02:00
|
|
|
|
2020-10-02 22:48:37 +02:00
|
|
|
func (am *AccountManager) checkLegacyPassphrase(check migrations.PassphraseCheck, account string, hash []byte, passphrase string) (err error) {
|
|
|
|
err = check(hash, []byte(passphrase))
|
|
|
|
if err != nil {
|
|
|
|
if err == migrations.ErrHashInvalid {
|
|
|
|
am.server.logger.Error("internal", "invalid legacy credentials for account", account)
|
|
|
|
}
|
|
|
|
return errAccountInvalidCredentials
|
|
|
|
}
|
|
|
|
// re-hash the passphrase with the latest algorithm
|
|
|
|
err = am.setPassword(account, passphrase, true)
|
|
|
|
if err != nil {
|
|
|
|
am.server.logger.Error("internal", "could not upgrade user password", err.Error())
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-06-04 07:18:24 +02:00
|
|
|
func (am *AccountManager) loadWithAutocreation(accountName string, autocreate bool) (account ClientAccount, err error) {
|
|
|
|
account, err = am.LoadAccount(accountName)
|
|
|
|
if err == errAccountDoesNotExist && autocreate {
|
|
|
|
err = am.SARegister(accountName, "")
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
account, err = am.LoadAccount(accountName)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-02-11 12:35:17 +01:00
|
|
|
func (am *AccountManager) AuthenticateByPassphrase(client *Client, accountName string, passphrase string) (err error) {
|
2020-03-17 04:37:52 +01:00
|
|
|
// XXX check this now, so we don't allow a redundant login for an always-on client
|
|
|
|
// even for a brief period. the other potential source of nick-account conflicts
|
|
|
|
// is from force-nick-equals-account, but those will be caught later by
|
|
|
|
// fixupNickEqualsAccount and if there is a conflict, they will be logged out.
|
2020-02-26 07:44:05 +01:00
|
|
|
if client.registered {
|
|
|
|
if clientAlready := am.server.clients.Get(accountName); clientAlready != nil && clientAlready.AlwaysOn() {
|
|
|
|
return errNickAccountMismatch
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-12 21:51:48 +02:00
|
|
|
if throttled, remainingTime := client.checkLoginThrottle(); throttled {
|
|
|
|
return &ThrottleError{remainingTime}
|
|
|
|
}
|
|
|
|
|
2020-02-09 09:17:10 +01:00
|
|
|
var account ClientAccount
|
|
|
|
|
2020-02-11 12:35:17 +01:00
|
|
|
defer func() {
|
2020-02-09 10:12:42 +01:00
|
|
|
if err == nil {
|
|
|
|
am.Login(client, account)
|
|
|
|
}
|
2020-02-11 12:35:17 +01:00
|
|
|
}()
|
2020-02-09 09:17:10 +01:00
|
|
|
|
2020-06-04 07:18:24 +02:00
|
|
|
config := am.server.Config()
|
|
|
|
if config.Accounts.AuthScript.Enabled {
|
|
|
|
var output AuthScriptOutput
|
2020-09-14 10:28:12 +02:00
|
|
|
output, err = CheckAuthScript(am.server.semaphores.AuthScript, config.Accounts.AuthScript.ScriptConfig,
|
2020-06-04 08:03:15 +02:00
|
|
|
AuthScriptInput{AccountName: accountName, Passphrase: passphrase, IP: client.IP().String()})
|
2020-06-04 07:18:24 +02:00
|
|
|
if err != nil {
|
|
|
|
am.server.logger.Error("internal", "failed shell auth invocation", err.Error())
|
2020-06-17 08:19:25 +02:00
|
|
|
} else if output.Success {
|
2020-06-04 07:18:24 +02:00
|
|
|
if output.AccountName != "" {
|
|
|
|
accountName = output.AccountName
|
2020-02-11 12:35:17 +01:00
|
|
|
}
|
2020-06-04 07:18:24 +02:00
|
|
|
account, err = am.loadWithAutocreation(accountName, config.Accounts.AuthScript.Autocreate)
|
2020-02-11 12:35:17 +01:00
|
|
|
return
|
|
|
|
}
|
2018-02-11 11:30:40 +01:00
|
|
|
}
|
|
|
|
|
2020-02-11 12:35:17 +01:00
|
|
|
account, err = am.checkPassphrase(accountName, passphrase)
|
|
|
|
return err
|
2018-02-11 11:30:40 +01:00
|
|
|
}
|
|
|
|
|
2020-05-04 04:14:55 +02:00
|
|
|
// AllNicks returns the uncasefolded nicknames for all accounts, including additional (grouped) nicks.
|
|
|
|
func (am *AccountManager) AllNicks() (result []string) {
|
|
|
|
accountNamePrefix := fmt.Sprintf(keyAccountName, "")
|
2020-05-04 04:20:28 +02:00
|
|
|
accountAdditionalNicksPrefix := fmt.Sprintf(keyAccountAdditionalNicks, "")
|
|
|
|
|
2020-05-04 04:14:55 +02:00
|
|
|
am.server.store.View(func(tx *buntdb.Tx) error {
|
2020-05-04 04:20:28 +02:00
|
|
|
// Account names
|
|
|
|
err := tx.AscendGreaterOrEqual("", accountNamePrefix, func(key, value string) bool {
|
2020-05-04 04:14:55 +02:00
|
|
|
if !strings.HasPrefix(key, accountNamePrefix) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
result = append(result, value)
|
|
|
|
return true
|
|
|
|
})
|
2020-05-04 04:20:28 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-05-04 02:51:39 +02:00
|
|
|
|
2020-05-04 04:20:28 +02:00
|
|
|
// Additional nicks
|
2020-05-04 04:14:55 +02:00
|
|
|
return tx.AscendGreaterOrEqual("", accountAdditionalNicksPrefix, func(key, value string) bool {
|
|
|
|
if !strings.HasPrefix(key, accountAdditionalNicksPrefix) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
additionalNicks := unmarshalReservedNicks(value)
|
|
|
|
for _, additionalNick := range additionalNicks {
|
|
|
|
result = append(result, additionalNick)
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
sort.Strings(result)
|
|
|
|
return
|
2020-05-04 02:51:39 +02:00
|
|
|
}
|
|
|
|
|
2018-03-02 23:04:24 +01:00
|
|
|
func (am *AccountManager) LoadAccount(accountName string) (result ClientAccount, err error) {
|
|
|
|
casefoldedAccount, err := CasefoldName(accountName)
|
|
|
|
if err != nil {
|
|
|
|
err = errAccountDoesNotExist
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-02-11 11:30:40 +01:00
|
|
|
var raw rawClientAccount
|
|
|
|
am.server.store.View(func(tx *buntdb.Tx) error {
|
|
|
|
raw, err = am.loadRawAccount(tx, casefoldedAccount)
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-02-19 01:38:42 +01:00
|
|
|
result, err = am.deserializeRawAccount(raw, casefoldedAccount)
|
2018-04-19 08:48:19 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-05-12 18:05:40 +02:00
|
|
|
// look up the unfolded version of an account name, possibly after deletion
|
|
|
|
func (am *AccountManager) AccountToAccountName(account string) (result string) {
|
|
|
|
casefoldedAccount, err := CasefoldName(account)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
unregisteredKey := fmt.Sprintf(keyAccountUnregistered, casefoldedAccount)
|
|
|
|
accountNameKey := fmt.Sprintf(keyAccountName, casefoldedAccount)
|
|
|
|
|
|
|
|
am.server.store.View(func(tx *buntdb.Tx) error {
|
|
|
|
if name, err := tx.Get(accountNameKey); err == nil {
|
|
|
|
result = name
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if name, err := tx.Get(unregisteredKey); err == nil {
|
|
|
|
result = name
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-02-19 01:38:42 +01:00
|
|
|
func (am *AccountManager) deserializeRawAccount(raw rawClientAccount, cfName string) (result ClientAccount, err error) {
|
2018-02-11 11:30:40 +01:00
|
|
|
result.Name = raw.Name
|
2020-02-19 01:38:42 +01:00
|
|
|
result.NameCasefolded = cfName
|
2018-02-11 11:30:40 +01:00
|
|
|
regTimeInt, _ := strconv.ParseInt(raw.RegisteredAt, 10, 64)
|
2020-03-01 09:39:25 +01:00
|
|
|
result.RegisteredAt = time.Unix(0, regTimeInt).UTC()
|
2018-02-11 11:30:40 +01:00
|
|
|
e := json.Unmarshal([]byte(raw.Credentials), &result.Credentials)
|
|
|
|
if e != nil {
|
2018-12-31 17:33:42 +01:00
|
|
|
am.server.logger.Error("internal", "could not unmarshal credentials", e.Error())
|
2018-02-11 11:30:40 +01:00
|
|
|
err = errAccountDoesNotExist
|
|
|
|
return
|
|
|
|
}
|
2018-03-02 23:04:24 +01:00
|
|
|
result.AdditionalNicks = unmarshalReservedNicks(raw.AdditionalNicks)
|
2018-02-11 11:30:40 +01:00
|
|
|
result.Verified = raw.Verified
|
2018-04-19 08:48:19 +02:00
|
|
|
if raw.VHost != "" {
|
|
|
|
e := json.Unmarshal([]byte(raw.VHost), &result.VHost)
|
|
|
|
if e != nil {
|
2018-12-31 17:33:42 +01:00
|
|
|
am.server.logger.Warning("internal", "could not unmarshal vhost for account", result.Name, e.Error())
|
2018-04-19 08:48:19 +02:00
|
|
|
// pretend they have no vhost and move on
|
|
|
|
}
|
|
|
|
}
|
2019-05-19 10:27:44 +02:00
|
|
|
if raw.Settings != "" {
|
|
|
|
e := json.Unmarshal([]byte(raw.Settings), &result.Settings)
|
|
|
|
if e != nil {
|
|
|
|
am.server.logger.Warning("internal", "could not unmarshal settings for account", result.Name, e.Error())
|
|
|
|
}
|
|
|
|
}
|
2020-10-27 16:24:17 +01:00
|
|
|
if raw.Suspended != "" {
|
|
|
|
sus := new(AccountSuspension)
|
|
|
|
e := json.Unmarshal([]byte(raw.Suspended), sus)
|
|
|
|
if e != nil {
|
|
|
|
am.server.logger.Error("internal", "corrupt suspension data", result.Name, e.Error())
|
|
|
|
} else {
|
|
|
|
result.Suspended = sus
|
|
|
|
}
|
|
|
|
}
|
2018-02-11 11:30:40 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func (am *AccountManager) loadRawAccount(tx *buntdb.Tx, casefoldedAccount string) (result rawClientAccount, err error) {
|
|
|
|
accountKey := fmt.Sprintf(keyAccountExists, casefoldedAccount)
|
|
|
|
accountNameKey := fmt.Sprintf(keyAccountName, casefoldedAccount)
|
|
|
|
registeredTimeKey := fmt.Sprintf(keyAccountRegTime, casefoldedAccount)
|
|
|
|
credentialsKey := fmt.Sprintf(keyAccountCredentials, casefoldedAccount)
|
|
|
|
verifiedKey := fmt.Sprintf(keyAccountVerified, casefoldedAccount)
|
2018-02-20 10:20:30 +01:00
|
|
|
callbackKey := fmt.Sprintf(keyAccountCallback, casefoldedAccount)
|
2018-03-02 23:04:24 +01:00
|
|
|
nicksKey := fmt.Sprintf(keyAccountAdditionalNicks, casefoldedAccount)
|
2018-04-19 08:48:19 +02:00
|
|
|
vhostKey := fmt.Sprintf(keyAccountVHost, casefoldedAccount)
|
2019-05-19 10:27:44 +02:00
|
|
|
settingsKey := fmt.Sprintf(keyAccountSettings, casefoldedAccount)
|
2020-10-27 16:24:17 +01:00
|
|
|
suspendedKey := fmt.Sprintf(keyAccountSuspended, casefoldedAccount)
|
2018-02-11 11:30:40 +01:00
|
|
|
|
|
|
|
_, e := tx.Get(accountKey)
|
|
|
|
if e == buntdb.ErrNotFound {
|
|
|
|
err = errAccountDoesNotExist
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-02-20 10:20:30 +01:00
|
|
|
result.Name, _ = tx.Get(accountNameKey)
|
|
|
|
result.RegisteredAt, _ = tx.Get(registeredTimeKey)
|
|
|
|
result.Credentials, _ = tx.Get(credentialsKey)
|
|
|
|
result.Callback, _ = tx.Get(callbackKey)
|
2018-03-02 23:04:24 +01:00
|
|
|
result.AdditionalNicks, _ = tx.Get(nicksKey)
|
2018-04-19 08:48:19 +02:00
|
|
|
result.VHost, _ = tx.Get(vhostKey)
|
2019-05-19 10:27:44 +02:00
|
|
|
result.Settings, _ = tx.Get(settingsKey)
|
2020-10-27 16:24:17 +01:00
|
|
|
result.Suspended, _ = tx.Get(suspendedKey)
|
2018-02-20 10:20:30 +01:00
|
|
|
|
2018-02-11 11:30:40 +01:00
|
|
|
if _, e = tx.Get(verifiedKey); e == nil {
|
|
|
|
result.Verified = true
|
|
|
|
}
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-10-27 16:24:17 +01:00
|
|
|
type AccountSuspension struct {
|
|
|
|
AccountName string `json:"AccountName,omitempty"`
|
|
|
|
TimeCreated time.Time
|
|
|
|
Duration time.Duration
|
|
|
|
OperName string
|
|
|
|
Reason string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (am *AccountManager) Suspend(accountName string, duration time.Duration, operName, reason string) (err error) {
|
2020-07-10 23:09:02 +02:00
|
|
|
account, err := CasefoldName(accountName)
|
|
|
|
if err != nil {
|
|
|
|
return errAccountDoesNotExist
|
|
|
|
}
|
|
|
|
|
2020-10-27 16:24:17 +01:00
|
|
|
suspension := AccountSuspension{
|
|
|
|
TimeCreated: time.Now().UTC(),
|
|
|
|
Duration: duration,
|
|
|
|
OperName: operName,
|
|
|
|
Reason: reason,
|
|
|
|
}
|
|
|
|
suspensionStr, err := json.Marshal(suspension)
|
|
|
|
if err != nil {
|
|
|
|
am.server.logger.Error("internal", "suspension json unserializable", err.Error())
|
|
|
|
return errAccountDoesNotExist
|
|
|
|
}
|
|
|
|
|
2020-07-10 23:09:02 +02:00
|
|
|
existsKey := fmt.Sprintf(keyAccountExists, account)
|
2020-10-27 16:24:17 +01:00
|
|
|
suspensionKey := fmt.Sprintf(keyAccountSuspended, account)
|
|
|
|
var setOptions *buntdb.SetOptions
|
|
|
|
if duration != time.Duration(0) {
|
|
|
|
setOptions = &buntdb.SetOptions{Expires: true, TTL: duration}
|
|
|
|
}
|
2020-07-10 23:09:02 +02:00
|
|
|
err = am.server.store.Update(func(tx *buntdb.Tx) error {
|
|
|
|
_, err := tx.Get(existsKey)
|
|
|
|
if err != nil {
|
|
|
|
return errAccountDoesNotExist
|
|
|
|
}
|
2020-10-27 16:24:17 +01:00
|
|
|
_, _, err = tx.Set(suspensionKey, string(suspensionStr), setOptions)
|
2020-07-10 23:09:02 +02:00
|
|
|
return err
|
|
|
|
})
|
|
|
|
|
|
|
|
if err == errAccountDoesNotExist {
|
|
|
|
return err
|
|
|
|
} else if err != nil {
|
|
|
|
am.server.logger.Error("internal", "couldn't persist suspension", account, err.Error())
|
|
|
|
} // keep going
|
|
|
|
|
|
|
|
am.Lock()
|
|
|
|
clients := am.accountToClients[account]
|
|
|
|
delete(am.accountToClients, account)
|
|
|
|
am.Unlock()
|
|
|
|
|
2020-10-27 16:24:17 +01:00
|
|
|
// kill clients, sending them the reason
|
|
|
|
suspension.AccountName = accountName
|
|
|
|
for _, client := range clients {
|
|
|
|
client.Logout()
|
|
|
|
client.Quit(suspensionToString(client, suspension), nil)
|
|
|
|
client.destroy(nil)
|
|
|
|
}
|
2020-07-10 23:09:02 +02:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (am *AccountManager) killClients(clients []*Client) {
|
|
|
|
for _, client := range clients {
|
|
|
|
client.Logout()
|
|
|
|
client.Quit(client.t("You are no longer authorized to be on this server"), nil)
|
|
|
|
client.destroy(nil)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (am *AccountManager) Unsuspend(account string) (err error) {
|
|
|
|
cfaccount, err := CasefoldName(account)
|
|
|
|
if err != nil {
|
|
|
|
return errAccountDoesNotExist
|
|
|
|
}
|
|
|
|
|
|
|
|
existsKey := fmt.Sprintf(keyAccountExists, cfaccount)
|
2020-10-27 16:24:17 +01:00
|
|
|
suspensionKey := fmt.Sprintf(keyAccountSuspended, account)
|
2020-07-10 23:09:02 +02:00
|
|
|
err = am.server.store.Update(func(tx *buntdb.Tx) error {
|
|
|
|
_, err := tx.Get(existsKey)
|
|
|
|
if err != nil {
|
|
|
|
return errAccountDoesNotExist
|
|
|
|
}
|
2020-10-27 16:24:17 +01:00
|
|
|
_, err = tx.Delete(suspensionKey)
|
|
|
|
if err != nil {
|
|
|
|
return errNoop
|
|
|
|
}
|
2020-07-10 23:09:02 +02:00
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
2020-10-27 16:24:17 +01:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
func (am *AccountManager) ListSuspended() (result []AccountSuspension) {
|
|
|
|
var names []string
|
|
|
|
var raw []string
|
|
|
|
|
|
|
|
prefix := fmt.Sprintf(keyAccountSuspended, "")
|
|
|
|
am.server.store.View(func(tx *buntdb.Tx) error {
|
|
|
|
err := tx.AscendGreaterOrEqual("", prefix, func(key, value string) bool {
|
|
|
|
if !strings.HasPrefix(key, prefix) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
raw = append(raw, value)
|
|
|
|
cfname := strings.TrimPrefix(key, prefix)
|
|
|
|
name, _ := tx.Get(fmt.Sprintf(keyAccountName, cfname))
|
|
|
|
names = append(names, name)
|
|
|
|
return true
|
|
|
|
})
|
|
|
|
return err
|
|
|
|
})
|
|
|
|
|
|
|
|
result = make([]AccountSuspension, 0, len(raw))
|
|
|
|
for i := 0; i < len(raw); i++ {
|
|
|
|
var sus AccountSuspension
|
|
|
|
err := json.Unmarshal([]byte(raw[i]), &sus)
|
|
|
|
if err != nil {
|
|
|
|
am.server.logger.Error("internal", "corrupt data for suspension", names[i], err.Error())
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
sus.AccountName = names[i]
|
|
|
|
result = append(result, sus)
|
2020-07-10 23:09:02 +02:00
|
|
|
}
|
2020-10-27 16:24:17 +01:00
|
|
|
return
|
2020-07-10 23:09:02 +02:00
|
|
|
}
|
|
|
|
|
2020-11-11 01:59:12 +01:00
|
|
|
// renames an account (within very restrictive limits); see #1380
|
|
|
|
func (am *AccountManager) Rename(oldName, newName string) (err error) {
|
|
|
|
accountData, err := am.LoadAccount(oldName)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
newCfName, err := CasefoldName(newName)
|
|
|
|
if err != nil {
|
|
|
|
return errNicknameInvalid
|
|
|
|
}
|
|
|
|
if newCfName != accountData.NameCasefolded {
|
|
|
|
return errInvalidAccountRename
|
|
|
|
}
|
|
|
|
key := fmt.Sprintf(keyAccountName, accountData.NameCasefolded)
|
|
|
|
err = am.server.store.Update(func(tx *buntdb.Tx) error {
|
|
|
|
tx.Set(key, newName, nil)
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
am.RLock()
|
|
|
|
defer am.RUnlock()
|
|
|
|
for _, client := range am.accountToClients[accountData.NameCasefolded] {
|
|
|
|
client.setAccountName(newName)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-03-20 17:34:46 +01:00
|
|
|
func (am *AccountManager) Unregister(account string, erase bool) error {
|
2019-02-14 20:00:54 +01:00
|
|
|
config := am.server.Config()
|
2018-02-11 11:30:40 +01:00
|
|
|
casefoldedAccount, err := CasefoldName(account)
|
|
|
|
if err != nil {
|
|
|
|
return errAccountDoesNotExist
|
|
|
|
}
|
|
|
|
|
|
|
|
accountKey := fmt.Sprintf(keyAccountExists, casefoldedAccount)
|
|
|
|
accountNameKey := fmt.Sprintf(keyAccountName, casefoldedAccount)
|
|
|
|
registeredTimeKey := fmt.Sprintf(keyAccountRegTime, casefoldedAccount)
|
|
|
|
credentialsKey := fmt.Sprintf(keyAccountCredentials, casefoldedAccount)
|
2018-02-20 10:20:30 +01:00
|
|
|
callbackKey := fmt.Sprintf(keyAccountCallback, casefoldedAccount)
|
|
|
|
verificationCodeKey := fmt.Sprintf(keyAccountVerificationCode, casefoldedAccount)
|
2018-02-11 11:30:40 +01:00
|
|
|
verifiedKey := fmt.Sprintf(keyAccountVerified, casefoldedAccount)
|
2018-03-02 23:04:24 +01:00
|
|
|
nicksKey := fmt.Sprintf(keyAccountAdditionalNicks, casefoldedAccount)
|
2019-05-19 10:27:44 +02:00
|
|
|
settingsKey := fmt.Sprintf(keyAccountSettings, casefoldedAccount)
|
2018-04-19 08:48:19 +02:00
|
|
|
vhostKey := fmt.Sprintf(keyAccountVHost, casefoldedAccount)
|
2019-02-06 10:32:04 +01:00
|
|
|
channelsKey := fmt.Sprintf(keyAccountChannels, casefoldedAccount)
|
2020-02-19 01:38:42 +01:00
|
|
|
joinedChannelsKey := fmt.Sprintf(keyAccountJoinedChannels, casefoldedAccount)
|
2020-02-27 08:13:31 +01:00
|
|
|
lastSeenKey := fmt.Sprintf(keyAccountLastSeen, casefoldedAccount)
|
2020-03-20 17:34:46 +01:00
|
|
|
unregisteredKey := fmt.Sprintf(keyAccountUnregistered, casefoldedAccount)
|
2020-06-27 00:23:33 +02:00
|
|
|
modesKey := fmt.Sprintf(keyAccountModes, casefoldedAccount)
|
2020-10-16 18:03:38 +02:00
|
|
|
realnameKey := fmt.Sprintf(keyAccountRealname, casefoldedAccount)
|
2020-10-27 16:24:17 +01:00
|
|
|
suspendedKey := fmt.Sprintf(keyAccountSuspended, casefoldedAccount)
|
2018-02-11 11:30:40 +01:00
|
|
|
|
|
|
|
var clients []*Client
|
2020-07-10 23:09:02 +02:00
|
|
|
defer func() {
|
|
|
|
am.killClients(clients)
|
|
|
|
}()
|
2018-02-11 11:30:40 +01:00
|
|
|
|
2019-02-06 10:32:04 +01:00
|
|
|
var registeredChannels []string
|
2019-02-12 05:30:49 +01:00
|
|
|
// on our way out, unregister all the account's channels and delete them from the db
|
2019-02-06 10:32:04 +01:00
|
|
|
defer func() {
|
2019-02-12 05:30:49 +01:00
|
|
|
for _, channelName := range registeredChannels {
|
2020-03-20 19:40:14 +01:00
|
|
|
err := am.server.channels.SetUnregistered(channelName, casefoldedAccount)
|
|
|
|
if err != nil {
|
|
|
|
am.server.logger.Error("internal", "couldn't unregister channel", channelName, err.Error())
|
|
|
|
}
|
2019-02-12 05:30:49 +01:00
|
|
|
}
|
2019-02-06 10:32:04 +01:00
|
|
|
}()
|
|
|
|
|
2018-03-02 23:04:24 +01:00
|
|
|
var credText string
|
|
|
|
var rawNicks string
|
2018-02-11 11:30:40 +01:00
|
|
|
|
2018-03-02 23:04:24 +01:00
|
|
|
am.serialCacheUpdateMutex.Lock()
|
|
|
|
defer am.serialCacheUpdateMutex.Unlock()
|
2018-02-11 11:30:40 +01:00
|
|
|
|
2019-01-31 00:59:49 +01:00
|
|
|
var accountName string
|
2019-02-06 10:32:04 +01:00
|
|
|
var channelsStr string
|
2020-03-25 19:46:28 +01:00
|
|
|
keepProtections := false
|
2018-03-02 23:04:24 +01:00
|
|
|
am.server.store.Update(func(tx *buntdb.Tx) error {
|
2020-04-24 21:39:39 +02:00
|
|
|
// get the unfolded account name; for an active account, this is
|
|
|
|
// stored under accountNameKey, for an unregistered account under unregisteredKey
|
2020-03-25 19:46:28 +01:00
|
|
|
accountName, _ = tx.Get(accountNameKey)
|
2020-04-24 21:39:39 +02:00
|
|
|
if accountName == "" {
|
|
|
|
accountName, _ = tx.Get(unregisteredKey)
|
|
|
|
}
|
2020-03-20 17:34:46 +01:00
|
|
|
if erase {
|
|
|
|
tx.Delete(unregisteredKey)
|
|
|
|
} else {
|
2020-03-25 19:07:43 +01:00
|
|
|
if _, err := tx.Get(verifiedKey); err == nil {
|
2020-03-25 19:46:28 +01:00
|
|
|
tx.Set(unregisteredKey, accountName, nil)
|
|
|
|
keepProtections = true
|
2020-03-20 17:34:46 +01:00
|
|
|
}
|
|
|
|
}
|
2018-03-02 23:04:24 +01:00
|
|
|
tx.Delete(accountKey)
|
|
|
|
tx.Delete(accountNameKey)
|
|
|
|
tx.Delete(verifiedKey)
|
|
|
|
tx.Delete(registeredTimeKey)
|
|
|
|
tx.Delete(callbackKey)
|
|
|
|
tx.Delete(verificationCodeKey)
|
2019-05-19 10:27:44 +02:00
|
|
|
tx.Delete(settingsKey)
|
2018-03-02 23:04:24 +01:00
|
|
|
rawNicks, _ = tx.Get(nicksKey)
|
|
|
|
tx.Delete(nicksKey)
|
|
|
|
credText, err = tx.Get(credentialsKey)
|
|
|
|
tx.Delete(credentialsKey)
|
2018-04-19 08:48:19 +02:00
|
|
|
tx.Delete(vhostKey)
|
2019-02-06 10:32:04 +01:00
|
|
|
channelsStr, _ = tx.Get(channelsKey)
|
|
|
|
tx.Delete(channelsKey)
|
2020-02-19 01:38:42 +01:00
|
|
|
tx.Delete(joinedChannelsKey)
|
2020-02-27 08:13:31 +01:00
|
|
|
tx.Delete(lastSeenKey)
|
2020-06-27 00:23:33 +02:00
|
|
|
tx.Delete(modesKey)
|
2020-10-16 18:03:38 +02:00
|
|
|
tx.Delete(realnameKey)
|
2020-10-27 16:24:17 +01:00
|
|
|
tx.Delete(suspendedKey)
|
2019-02-06 10:32:04 +01:00
|
|
|
|
2018-03-02 23:04:24 +01:00
|
|
|
return nil
|
|
|
|
})
|
2018-02-11 11:30:40 +01:00
|
|
|
|
2018-03-02 23:04:24 +01:00
|
|
|
if err == nil {
|
|
|
|
var creds AccountCredentials
|
2020-03-20 17:34:46 +01:00
|
|
|
if err := json.Unmarshal([]byte(credText), &creds); err == nil {
|
2019-12-29 17:59:49 +01:00
|
|
|
for _, cert := range creds.Certfps {
|
|
|
|
certFPKey := fmt.Sprintf(keyCertToAccount, cert)
|
|
|
|
am.server.store.Update(func(tx *buntdb.Tx) error {
|
|
|
|
if account, err := tx.Get(certFPKey); err == nil && account == casefoldedAccount {
|
|
|
|
tx.Delete(certFPKey)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
}
|
2018-02-11 11:30:40 +01:00
|
|
|
}
|
2018-03-02 23:04:24 +01:00
|
|
|
}
|
2018-02-11 11:30:40 +01:00
|
|
|
|
2019-01-31 00:59:49 +01:00
|
|
|
skeleton, _ := Skeleton(accountName)
|
2018-03-02 23:04:24 +01:00
|
|
|
additionalNicks := unmarshalReservedNicks(rawNicks)
|
2019-02-06 10:32:04 +01:00
|
|
|
registeredChannels = unmarshalRegisteredChannels(channelsStr)
|
2018-02-11 11:30:40 +01:00
|
|
|
|
2018-03-02 23:04:24 +01:00
|
|
|
am.Lock()
|
|
|
|
defer am.Unlock()
|
|
|
|
|
|
|
|
clients = am.accountToClients[casefoldedAccount]
|
|
|
|
delete(am.accountToClients, casefoldedAccount)
|
2020-03-25 19:46:28 +01:00
|
|
|
// protect the account name itself where applicable, but not any grouped nicks
|
|
|
|
if !(keepProtections && config.Accounts.NickReservation.Method == NickEnforcementStrict) {
|
|
|
|
delete(am.nickToAccount, casefoldedAccount)
|
|
|
|
delete(am.skeletonToAccount, skeleton)
|
|
|
|
}
|
2018-03-02 23:04:24 +01:00
|
|
|
for _, nick := range additionalNicks {
|
|
|
|
delete(am.nickToAccount, nick)
|
2019-01-31 00:59:49 +01:00
|
|
|
additionalSkel, _ := Skeleton(nick)
|
|
|
|
delete(am.skeletonToAccount, additionalSkel)
|
2018-03-02 23:04:24 +01:00
|
|
|
}
|
2018-02-11 11:30:40 +01:00
|
|
|
|
2020-03-20 17:34:46 +01:00
|
|
|
if err != nil && !erase {
|
2018-02-12 07:09:30 +01:00
|
|
|
return errAccountDoesNotExist
|
|
|
|
}
|
2019-02-06 10:32:04 +01:00
|
|
|
|
2018-02-11 11:30:40 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-02-06 10:32:04 +01:00
|
|
|
func unmarshalRegisteredChannels(channelsStr string) (result []string) {
|
|
|
|
if channelsStr != "" {
|
|
|
|
result = strings.Split(channelsStr, ",")
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func (am *AccountManager) ChannelsForAccount(account string) (channels []string) {
|
|
|
|
cfaccount, err := CasefoldName(account)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var channelStr string
|
|
|
|
key := fmt.Sprintf(keyAccountChannels, cfaccount)
|
|
|
|
am.server.store.View(func(tx *buntdb.Tx) error {
|
|
|
|
channelStr, _ = tx.Get(key)
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
return unmarshalRegisteredChannels(channelStr)
|
|
|
|
}
|
|
|
|
|
2020-09-23 08:23:35 +02:00
|
|
|
func (am *AccountManager) AuthenticateByCertificate(client *Client, certfp string, peerCerts []*x509.Certificate, authzid string) (err error) {
|
2020-02-19 03:42:27 +01:00
|
|
|
if certfp == "" {
|
2018-02-11 11:30:40 +01:00
|
|
|
return errAccountInvalidCredentials
|
|
|
|
}
|
|
|
|
|
2020-06-04 07:18:24 +02:00
|
|
|
var clientAccount ClientAccount
|
|
|
|
|
|
|
|
defer func() {
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
} else if !clientAccount.Verified {
|
|
|
|
err = errAccountUnverified
|
|
|
|
return
|
2020-10-27 16:24:17 +01:00
|
|
|
} else if clientAccount.Suspended != nil {
|
|
|
|
err = errAccountSuspended
|
|
|
|
return
|
2020-06-04 07:18:24 +02:00
|
|
|
}
|
|
|
|
// TODO(#1109) clean this check up?
|
|
|
|
if client.registered {
|
|
|
|
if clientAlready := am.server.clients.Get(clientAccount.Name); clientAlready != nil && clientAlready.AlwaysOn() {
|
|
|
|
err = errNickAccountMismatch
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
am.Login(client, clientAccount)
|
|
|
|
return
|
|
|
|
}()
|
|
|
|
|
|
|
|
config := am.server.Config()
|
|
|
|
if config.Accounts.AuthScript.Enabled {
|
|
|
|
var output AuthScriptOutput
|
2020-09-14 10:28:12 +02:00
|
|
|
output, err = CheckAuthScript(am.server.semaphores.AuthScript, config.Accounts.AuthScript.ScriptConfig,
|
2020-09-23 08:23:35 +02:00
|
|
|
AuthScriptInput{Certfp: certfp, IP: client.IP().String(), peerCerts: peerCerts})
|
2020-06-04 07:18:24 +02:00
|
|
|
if err != nil {
|
|
|
|
am.server.logger.Error("internal", "failed shell auth invocation", err.Error())
|
2020-06-17 09:08:38 +02:00
|
|
|
} else if output.Success && output.AccountName != "" {
|
2020-06-04 07:18:24 +02:00
|
|
|
clientAccount, err = am.loadWithAutocreation(output.AccountName, config.Accounts.AuthScript.Autocreate)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-11 11:30:40 +01:00
|
|
|
var account string
|
2020-02-19 03:42:27 +01:00
|
|
|
certFPKey := fmt.Sprintf(keyCertToAccount, certfp)
|
2018-02-11 11:30:40 +01:00
|
|
|
|
2020-06-04 07:18:24 +02:00
|
|
|
err = am.server.store.View(func(tx *buntdb.Tx) error {
|
2018-02-11 11:30:40 +01:00
|
|
|
account, _ = tx.Get(certFPKey)
|
|
|
|
if account == "" {
|
|
|
|
return errAccountInvalidCredentials
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-12-25 21:06:26 +01:00
|
|
|
if authzid != "" && authzid != account {
|
|
|
|
return errAuthzidAuthcidMismatch
|
|
|
|
}
|
|
|
|
|
2018-02-11 11:30:40 +01:00
|
|
|
// ok, we found an account corresponding to their certificate
|
2020-06-04 07:18:24 +02:00
|
|
|
clientAccount, err = am.LoadAccount(account)
|
|
|
|
return err
|
2018-04-19 08:48:19 +02:00
|
|
|
}
|
|
|
|
|
2019-05-19 10:27:44 +02:00
|
|
|
type settingsMunger func(input AccountSettings) (output AccountSettings, err error)
|
|
|
|
|
|
|
|
func (am *AccountManager) ModifyAccountSettings(account string, munger settingsMunger) (newSettings AccountSettings, err error) {
|
|
|
|
casefoldedAccount, err := CasefoldName(account)
|
|
|
|
if err != nil {
|
|
|
|
return newSettings, errAccountDoesNotExist
|
|
|
|
}
|
|
|
|
// TODO implement this in general via a compare-and-swap API
|
|
|
|
accountData, err := am.LoadAccount(casefoldedAccount)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
} else if !accountData.Verified {
|
|
|
|
return newSettings, errAccountUnverified
|
|
|
|
}
|
|
|
|
newSettings, err = munger(accountData.Settings)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
text, err := json.Marshal(newSettings)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
key := fmt.Sprintf(keyAccountSettings, casefoldedAccount)
|
|
|
|
serializedValue := string(text)
|
|
|
|
err = am.server.store.Update(func(tx *buntdb.Tx) (err error) {
|
|
|
|
_, _, err = tx.Set(key, serializedValue, nil)
|
|
|
|
return
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
err = errAccountUpdateFailed
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// success, push new settings into the client objects
|
|
|
|
am.Lock()
|
|
|
|
defer am.Unlock()
|
|
|
|
for _, client := range am.accountToClients[casefoldedAccount] {
|
|
|
|
client.SetAccountSettings(newSettings)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-04-19 08:48:19 +02:00
|
|
|
// represents someone's status in hostserv
|
|
|
|
type VHostInfo struct {
|
2020-10-22 18:19:19 +02:00
|
|
|
ApprovedVHost string
|
|
|
|
Enabled bool
|
2020-01-29 04:27:56 +01:00
|
|
|
}
|
|
|
|
|
2018-04-19 08:48:19 +02:00
|
|
|
// callback type implementing the actual business logic of vhost operations
|
|
|
|
type vhostMunger func(input VHostInfo) (output VHostInfo, err error)
|
|
|
|
|
2020-02-02 04:19:33 +01:00
|
|
|
func (am *AccountManager) VHostSet(account string, vhost string) (result VHostInfo, err error) {
|
2018-04-19 08:48:19 +02:00
|
|
|
munger := func(input VHostInfo) (output VHostInfo, err error) {
|
|
|
|
output = input
|
|
|
|
output.Enabled = true
|
|
|
|
output.ApprovedVHost = vhost
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
return am.performVHostChange(account, munger)
|
|
|
|
}
|
|
|
|
|
2018-04-23 08:38:35 +02:00
|
|
|
func (am *AccountManager) VHostSetEnabled(client *Client, enabled bool) (result VHostInfo, err error) {
|
2018-04-19 08:48:19 +02:00
|
|
|
munger := func(input VHostInfo) (output VHostInfo, err error) {
|
2019-05-22 05:55:04 +02:00
|
|
|
if input.ApprovedVHost == "" {
|
|
|
|
err = errNoVhost
|
|
|
|
return
|
|
|
|
}
|
2018-04-19 08:48:19 +02:00
|
|
|
output = input
|
|
|
|
output.Enabled = enabled
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
return am.performVHostChange(client.Account(), munger)
|
|
|
|
}
|
2018-02-11 11:30:40 +01:00
|
|
|
|
2018-04-23 08:38:35 +02:00
|
|
|
func (am *AccountManager) performVHostChange(account string, munger vhostMunger) (result VHostInfo, err error) {
|
2018-04-19 08:48:19 +02:00
|
|
|
account, err = CasefoldName(account)
|
|
|
|
if err != nil || account == "" {
|
2018-04-23 08:38:35 +02:00
|
|
|
err = errAccountDoesNotExist
|
|
|
|
return
|
2018-04-19 08:48:19 +02:00
|
|
|
}
|
|
|
|
|
2020-07-08 11:32:14 +02:00
|
|
|
if am.server.Defcon() <= 3 {
|
|
|
|
err = errFeatureDisabled
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-04-19 08:48:19 +02:00
|
|
|
clientAccount, err := am.LoadAccount(account)
|
|
|
|
if err != nil {
|
2018-04-23 08:38:35 +02:00
|
|
|
err = errAccountDoesNotExist
|
|
|
|
return
|
2018-04-19 08:48:19 +02:00
|
|
|
} else if !clientAccount.Verified {
|
2018-04-23 08:38:35 +02:00
|
|
|
err = errAccountUnverified
|
|
|
|
return
|
2018-04-19 08:48:19 +02:00
|
|
|
}
|
|
|
|
|
2018-04-23 08:38:35 +02:00
|
|
|
result, err = munger(clientAccount.VHost)
|
2018-04-19 08:48:19 +02:00
|
|
|
if err != nil {
|
2018-04-23 08:38:35 +02:00
|
|
|
return
|
2018-04-19 08:48:19 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
vhtext, err := json.Marshal(result)
|
|
|
|
if err != nil {
|
2018-04-23 08:38:35 +02:00
|
|
|
err = errAccountUpdateFailed
|
|
|
|
return
|
2018-04-19 08:48:19 +02:00
|
|
|
}
|
|
|
|
vhstr := string(vhtext)
|
|
|
|
|
|
|
|
key := fmt.Sprintf(keyAccountVHost, account)
|
|
|
|
err = am.server.store.Update(func(tx *buntdb.Tx) error {
|
2020-10-22 18:19:19 +02:00
|
|
|
_, _, err := tx.Set(key, vhstr, nil)
|
|
|
|
return err
|
2018-04-19 08:48:19 +02:00
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
2018-04-23 08:38:35 +02:00
|
|
|
err = errAccountUpdateFailed
|
|
|
|
return
|
2018-04-19 08:48:19 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
am.applyVhostToClients(account, result)
|
2018-04-23 08:38:35 +02:00
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
|
2018-04-19 08:48:19 +02:00
|
|
|
func (am *AccountManager) applyVHostInfo(client *Client, info VHostInfo) {
|
|
|
|
// if hostserv is disabled in config, then don't grant vhosts
|
|
|
|
// that were previously approved while it was enabled
|
2020-03-16 12:54:50 +01:00
|
|
|
if !am.server.Config().Accounts.VHosts.Enabled {
|
2018-04-19 08:48:19 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
vhost := ""
|
2020-07-17 10:19:33 +02:00
|
|
|
if info.Enabled {
|
2018-04-19 08:48:19 +02:00
|
|
|
vhost = info.ApprovedVHost
|
|
|
|
}
|
|
|
|
oldNickmask := client.NickMaskString()
|
|
|
|
updated := client.SetVHost(vhost)
|
2020-06-10 00:17:48 +02:00
|
|
|
if updated && client.Registered() {
|
2018-04-19 08:48:19 +02:00
|
|
|
// TODO: doing I/O here is kind of a kludge
|
2020-06-03 00:57:28 +02:00
|
|
|
client.sendChghost(oldNickmask, client.Hostname())
|
2018-04-19 08:48:19 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (am *AccountManager) applyVhostToClients(account string, result VHostInfo) {
|
|
|
|
am.RLock()
|
|
|
|
clients := am.accountToClients[account]
|
|
|
|
am.RUnlock()
|
|
|
|
|
|
|
|
for _, client := range clients {
|
|
|
|
am.applyVHostInfo(client, result)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (am *AccountManager) Login(client *Client, account ClientAccount) {
|
2020-02-19 01:38:42 +01:00
|
|
|
client.Login(account)
|
2018-04-19 08:48:19 +02:00
|
|
|
|
|
|
|
am.applyVHostInfo(client, account.VHost)
|
2018-03-02 23:04:24 +01:00
|
|
|
|
|
|
|
casefoldedAccount := client.Account()
|
2018-04-19 08:48:19 +02:00
|
|
|
am.Lock()
|
|
|
|
defer am.Unlock()
|
2018-02-11 11:30:40 +01:00
|
|
|
am.accountToClients[casefoldedAccount] = append(am.accountToClients[casefoldedAccount], client)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (am *AccountManager) Logout(client *Client) {
|
|
|
|
am.Lock()
|
|
|
|
defer am.Unlock()
|
|
|
|
|
2018-03-02 23:04:24 +01:00
|
|
|
casefoldedAccount := client.Account()
|
|
|
|
if casefoldedAccount == "" {
|
2018-02-11 11:30:40 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-06-01 17:54:38 +02:00
|
|
|
client.Logout()
|
2018-03-02 23:04:24 +01:00
|
|
|
|
2018-02-11 11:30:40 +01:00
|
|
|
clients := am.accountToClients[casefoldedAccount]
|
|
|
|
if len(clients) <= 1 {
|
|
|
|
delete(am.accountToClients, casefoldedAccount)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
remainingClients := make([]*Client, len(clients)-1)
|
|
|
|
remainingPos := 0
|
|
|
|
for currentPos := 0; currentPos < len(clients); currentPos++ {
|
|
|
|
if clients[currentPos] != client {
|
|
|
|
remainingClients[remainingPos] = clients[currentPos]
|
|
|
|
remainingPos++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
am.accountToClients[casefoldedAccount] = remainingClients
|
|
|
|
}
|
|
|
|
|
2016-09-05 14:35:13 +02:00
|
|
|
var (
|
2016-09-06 08:31:59 +02:00
|
|
|
// EnabledSaslMechanisms contains the SASL mechanisms that exist and that we support.
|
|
|
|
// This can be moved to some other data structure/place if we need to load/unload mechs later.
|
2018-02-05 15:21:08 +01:00
|
|
|
EnabledSaslMechanisms = map[string]func(*Server, *Client, string, []byte, *ResponseBuffer) bool{
|
2016-09-06 08:31:59 +02:00
|
|
|
"PLAIN": authPlainHandler,
|
|
|
|
"EXTERNAL": authExternalHandler,
|
|
|
|
}
|
2016-09-05 14:35:13 +02:00
|
|
|
)
|
|
|
|
|
2020-10-02 22:48:37 +02:00
|
|
|
type CredentialsVersion int
|
|
|
|
|
|
|
|
const (
|
|
|
|
CredentialsLegacy CredentialsVersion = 0
|
|
|
|
CredentialsSHA3Bcrypt CredentialsVersion = 1
|
|
|
|
// negative numbers for migration
|
|
|
|
CredentialsAtheme = -1
|
2020-10-12 21:06:17 +02:00
|
|
|
CredentialsAnope = -2
|
2020-10-02 22:48:37 +02:00
|
|
|
)
|
|
|
|
|
2018-02-11 11:30:40 +01:00
|
|
|
// AccountCredentials stores the various methods for verifying accounts.
|
|
|
|
type AccountCredentials struct {
|
2020-10-02 22:48:37 +02:00
|
|
|
Version CredentialsVersion
|
2018-02-11 11:30:40 +01:00
|
|
|
PassphraseHash []byte
|
2019-12-29 17:59:49 +01:00
|
|
|
Certfps []string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ac *AccountCredentials) Empty() bool {
|
|
|
|
return len(ac.PassphraseHash) == 0 && len(ac.Certfps) == 0
|
|
|
|
}
|
|
|
|
|
|
|
|
// helper to assemble the serialized JSON for an account's credentials
|
|
|
|
func (ac *AccountCredentials) Serialize() (result string, err error) {
|
|
|
|
ac.Version = 1
|
|
|
|
credText, err := json.Marshal(*ac)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
return string(credText), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ac *AccountCredentials) SetPassphrase(passphrase string, bcryptCost uint) (err error) {
|
|
|
|
if passphrase == "" {
|
|
|
|
ac.PassphraseHash = nil
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if validatePassphrase(passphrase) != nil {
|
|
|
|
return errAccountBadPassphrase
|
|
|
|
}
|
|
|
|
|
|
|
|
ac.PassphraseHash, err = passwd.GenerateFromPassword([]byte(passphrase), int(bcryptCost))
|
|
|
|
if err != nil {
|
|
|
|
return errAccountBadPassphrase
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ac *AccountCredentials) AddCertfp(certfp string) (err error) {
|
2020-01-06 18:21:52 +01:00
|
|
|
// XXX we require that certfp is already normalized (rather than normalize here
|
|
|
|
// and pass back the normalized version as an additional return parameter);
|
|
|
|
// this is just a final sanity check:
|
|
|
|
if len(certfp) != 64 {
|
|
|
|
return utils.ErrInvalidCertfp
|
|
|
|
}
|
|
|
|
|
2019-12-29 17:59:49 +01:00
|
|
|
for _, current := range ac.Certfps {
|
|
|
|
if certfp == current {
|
|
|
|
return errNoop
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if maxCertfpsPerAccount <= len(ac.Certfps) {
|
|
|
|
return errLimitExceeded
|
|
|
|
}
|
|
|
|
|
|
|
|
ac.Certfps = append(ac.Certfps, certfp)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ac *AccountCredentials) RemoveCertfp(certfp string) (err error) {
|
|
|
|
found := false
|
|
|
|
newList := make([]string, 0, len(ac.Certfps))
|
|
|
|
for _, current := range ac.Certfps {
|
|
|
|
if current == certfp {
|
|
|
|
found = true
|
|
|
|
} else {
|
|
|
|
newList = append(newList, current)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !found {
|
|
|
|
// this is important because it prevents you from deleting someone else's
|
|
|
|
// fingerprint record
|
|
|
|
return errNoop
|
|
|
|
}
|
|
|
|
ac.Certfps = newList
|
|
|
|
return nil
|
2018-02-11 11:30:40 +01:00
|
|
|
}
|
|
|
|
|
2020-02-21 05:55:42 +01:00
|
|
|
type MulticlientAllowedSetting int
|
2019-05-19 10:27:44 +02:00
|
|
|
|
|
|
|
const (
|
2020-02-21 05:55:42 +01:00
|
|
|
MulticlientAllowedServerDefault MulticlientAllowedSetting = iota
|
|
|
|
MulticlientDisallowedByUser
|
|
|
|
MulticlientAllowedByUser
|
2019-05-19 10:27:44 +02:00
|
|
|
)
|
|
|
|
|
2019-12-18 23:38:14 +01:00
|
|
|
// controls whether/when clients without event-playback support see fake
|
|
|
|
// PRIVMSGs for JOINs
|
|
|
|
type ReplayJoinsSetting uint
|
|
|
|
|
|
|
|
const (
|
|
|
|
ReplayJoinsCommandsOnly = iota // replay in HISTORY or CHATHISTORY output
|
|
|
|
ReplayJoinsAlways // replay in HISTORY, CHATHISTORY, or autoreplay
|
|
|
|
ReplayJoinsNever // never replay
|
|
|
|
)
|
|
|
|
|
|
|
|
func replayJoinsSettingFromString(str string) (result ReplayJoinsSetting, err error) {
|
|
|
|
switch strings.ToLower(str) {
|
|
|
|
case "commands-only":
|
|
|
|
result = ReplayJoinsCommandsOnly
|
|
|
|
case "always":
|
|
|
|
result = ReplayJoinsAlways
|
|
|
|
case "never":
|
|
|
|
result = ReplayJoinsNever
|
|
|
|
default:
|
|
|
|
err = errInvalidParams
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-02-21 05:55:42 +01:00
|
|
|
// XXX: AllowBouncer cannot be renamed AllowMulticlient because it is stored in
|
|
|
|
// persistent JSON blobs in the database
|
2019-05-19 10:27:44 +02:00
|
|
|
type AccountSettings struct {
|
2020-02-19 01:38:42 +01:00
|
|
|
AutoreplayLines *int
|
|
|
|
NickEnforcement NickEnforcementMethod
|
2020-02-21 05:55:42 +01:00
|
|
|
AllowBouncer MulticlientAllowedSetting
|
2020-02-19 01:38:42 +01:00
|
|
|
ReplayJoins ReplayJoinsSetting
|
|
|
|
AlwaysOn PersistentStatus
|
|
|
|
AutoreplayMissed bool
|
|
|
|
DMHistory HistoryStatus
|
2020-05-19 20:12:20 +02:00
|
|
|
AutoAway PersistentStatus
|
2019-05-19 10:27:44 +02:00
|
|
|
}
|
|
|
|
|
2016-09-05 14:35:13 +02:00
|
|
|
// ClientAccount represents a user account.
|
|
|
|
type ClientAccount struct {
|
2016-09-04 11:25:33 +02:00
|
|
|
// Name of the account.
|
2019-12-25 21:56:57 +01:00
|
|
|
Name string
|
|
|
|
NameCasefolded string
|
2018-03-02 23:04:24 +01:00
|
|
|
RegisteredAt time.Time
|
|
|
|
Credentials AccountCredentials
|
|
|
|
Verified bool
|
2020-10-27 16:24:17 +01:00
|
|
|
Suspended *AccountSuspension
|
2018-03-02 23:04:24 +01:00
|
|
|
AdditionalNicks []string
|
2018-04-19 08:48:19 +02:00
|
|
|
VHost VHostInfo
|
2019-05-19 10:27:44 +02:00
|
|
|
Settings AccountSettings
|
2016-09-04 11:25:33 +02:00
|
|
|
}
|
2016-09-06 08:31:59 +02:00
|
|
|
|
2018-02-11 11:30:40 +01:00
|
|
|
// convenience for passing around raw serialized account data
|
|
|
|
type rawClientAccount struct {
|
2018-03-02 23:04:24 +01:00
|
|
|
Name string
|
|
|
|
RegisteredAt string
|
|
|
|
Credentials string
|
|
|
|
Callback string
|
|
|
|
Verified bool
|
|
|
|
AdditionalNicks string
|
2018-04-19 08:48:19 +02:00
|
|
|
VHost string
|
2019-05-19 10:27:44 +02:00
|
|
|
Settings string
|
2020-10-27 16:24:17 +01:00
|
|
|
Suspended string
|
2017-09-11 01:16:13 +02:00
|
|
|
}
|