X-Git-Url: https://git.quassel-irc.org/?p=quassel.git;a=blobdiff_plain;f=src%2Fcore%2Fcoreauthhandler.cpp;h=ef24592f7ef6b0104d71c38c22253c7004120e5d;hp=e2b352194a2a5454d0defa431ed9ebb1e769f4f7;hb=8961f348947fc55cc4bc769563684af3f2ea7ccc;hpb=620cd1aa35e05099b3f84400dd33afc207c98244 diff --git a/src/core/coreauthhandler.cpp b/src/core/coreauthhandler.cpp index e2b35219..ef24592f 100644 --- a/src/core/coreauthhandler.cpp +++ b/src/core/coreauthhandler.cpp @@ -1,5 +1,5 @@ /*************************************************************************** - * Copyright (C) 2005-2016 by the Quassel Project * + * Copyright (C) 2005-2019 by the Quassel Project * * devel@quassel-irc.org * * * * This program is free software; you can redistribute it and/or modify * @@ -20,31 +20,29 @@ #include "coreauthhandler.h" +#include + #ifdef HAVE_SSL -# include +# include #endif #include "core.h" -#include "logger.h" - -using namespace Protocol; -CoreAuthHandler::CoreAuthHandler(QTcpSocket *socket, QObject *parent) - : AuthHandler(parent), - _peer(0), - _magicReceived(false), - _legacy(false), - _clientRegistered(false), - _connectionFeatures(0) +CoreAuthHandler::CoreAuthHandler(QTcpSocket* socket, QObject* parent) + : AuthHandler(parent) + , _peer(nullptr) + , _metricsServer(Core::instance()->metricsServer()) + , _magicReceived(false) + , _legacy(false) + , _clientRegistered(false) + , _connectionFeatures(0) { setSocket(socket); - connect(socket, SIGNAL(readyRead()), SLOT(onReadyRead())); + connect(socket, &QIODevice::readyRead, this, &CoreAuthHandler::onReadyRead); // TODO: Timeout for the handshake phase - } - void CoreAuthHandler::onReadyRead() { if (socket()->bytesAvailable() < 4) @@ -63,8 +61,12 @@ void CoreAuthHandler::onReadyRead() // no magic, assume legacy protocol qDebug() << "Legacy client detected, switching to compatibility mode"; _legacy = true; - RemotePeer *peer = PeerFactory::createPeer(PeerFactory::ProtoDescriptor(Protocol::LegacyProtocol, 0), this, socket(), Compressor::NoCompression, this); - connect(peer, SIGNAL(protocolVersionMismatch(int,int)), SLOT(onProtocolVersionMismatch(int,int))); + RemotePeer* peer = PeerFactory::createPeer(PeerFactory::ProtoDescriptor(Protocol::LegacyProtocol, 0), + this, + socket(), + Compressor::NoCompression, + this); + connect(peer, &RemotePeer::protocolVersionMismatch, this, &CoreAuthHandler::onProtocolVersionMismatch); setPeer(peer); return; } @@ -77,27 +79,27 @@ void CoreAuthHandler::onReadyRead() if (features & Protocol::Compression) _connectionFeatures |= Protocol::Compression; - socket()->read((char*)&magic, 4); // read the 4 bytes we've just peeked at + socket()->read((char*)&magic, 4); // read the 4 bytes we've just peeked at } // read the list of protocols supported by the client - while (socket()->bytesAvailable() >= 4 && _supportedProtos.size() < 16) { // sanity check + while (socket()->bytesAvailable() >= 4 && _supportedProtos.size() < 16) { // sanity check quint32 data; socket()->read((char*)&data, 4); data = qFromBigEndian(data); - Protocol::Type type = static_cast(data & 0xff); - quint16 protoFeatures = static_cast(data>>8 & 0xffff); + auto type = static_cast(data & 0xff); + auto protoFeatures = static_cast(data >> 8 & 0xffff); _supportedProtos.append(PeerFactory::ProtoDescriptor(type, protoFeatures)); - if (data >= 0x80000000) { // last protocol + if (data >= 0x80000000) { // last protocol Compressor::CompressionLevel level; if (_connectionFeatures & Protocol::Compression) level = Compressor::BestCompression; else level = Compressor::NoCompression; - RemotePeer *peer = PeerFactory::createPeer(_supportedProtos, this, socket(), level, this); + RemotePeer* peer = PeerFactory::createPeer(_supportedProtos, this, socket(), level, this); if (!peer) { qWarning() << "Received invalid handshake data from client" << socket()->peerAddress().toString(); close(); @@ -106,30 +108,29 @@ void CoreAuthHandler::onReadyRead() if (peer->protocol() == Protocol::LegacyProtocol) { _legacy = true; - connect(peer, SIGNAL(protocolVersionMismatch(int,int)), SLOT(onProtocolVersionMismatch(int,int))); + connect(peer, &RemotePeer::protocolVersionMismatch, this, &CoreAuthHandler::onProtocolVersionMismatch); } setPeer(peer); // inform the client - quint32 reply = peer->protocol() | peer->enabledFeatures()<<8 | _connectionFeatures<<24; + quint32 reply = peer->protocol() | peer->enabledFeatures() << 8 | _connectionFeatures << 24; reply = qToBigEndian(reply); socket()->write((char*)&reply, 4); socket()->flush(); if (!_legacy && (_connectionFeatures & Protocol::Encryption)) - startSsl(); // legacy peer enables it later + startSsl(); // legacy peer enables it later return; } } } - -void CoreAuthHandler::setPeer(RemotePeer *peer) +void CoreAuthHandler::setPeer(RemotePeer* peer) { qDebug().nospace() << "Using " << qPrintable(peer->protocolName()) << "..."; _peer = peer; - disconnect(socket(), SIGNAL(readyRead()), this, SLOT(onReadyRead())); + disconnect(socket(), &QIODevice::readyRead, this, &CoreAuthHandler::onReadyRead); } // only in compat mode @@ -138,25 +139,26 @@ void CoreAuthHandler::onProtocolVersionMismatch(int actual, int expected) qWarning() << qPrintable(tr("Client")) << _peer->description() << qPrintable(tr("too old, rejecting.")); QString errorString = tr("Your Quassel Client is too old!
" "This core needs at least client/core protocol version %1 (got: %2).
" - "Please consider upgrading your client.").arg(expected, actual); - _peer->dispatch(ClientDenied(errorString)); + "Please consider upgrading your client.") + .arg(expected, actual); + _peer->dispatch(Protocol::ClientDenied(errorString)); _peer->close(); } - bool CoreAuthHandler::checkClientRegistered() { if (!_clientRegistered) { - qWarning() << qPrintable(tr("Client")) << qPrintable(socket()->peerAddress().toString()) << qPrintable(tr("did not send a registration message before trying to login, rejecting.")); - _peer->dispatch(ClientDenied(tr("Client not initialized!
You need to send a registration message before trying to login."))); + qWarning() << qPrintable(tr("Client")) << qPrintable(socket()->peerAddress().toString()) + << qPrintable(tr("did not send a registration message before trying to login, rejecting.")); + _peer->dispatch( + Protocol::ClientDenied(tr("Client not initialized!
You need to send a registration message before trying to login."))); _peer->close(); return false; } return true; } - -void CoreAuthHandler::handle(const RegisterClient &msg) +void CoreAuthHandler::handle(const Protocol::RegisterClient& msg) { bool useSsl; if (_legacy) @@ -165,96 +167,143 @@ void CoreAuthHandler::handle(const RegisterClient &msg) useSsl = _connectionFeatures & Protocol::Encryption; if (Quassel::isOptionSet("require-ssl") && !useSsl && !_peer->isLocal()) { - quInfo() << qPrintable(tr("SSL required but non-SSL connection attempt from %1").arg(socket()->peerAddress().toString())); - _peer->dispatch(ClientDenied(tr("SSL is required!
You need to use SSL in order to connect to this core."))); + qInfo() << qPrintable(tr("SSL required but non-SSL connection attempt from %1").arg(socket()->peerAddress().toString())); + _peer->dispatch(Protocol::ClientDenied(tr("SSL is required!
You need to use SSL in order to connect to this core."))); _peer->close(); return; } + _peer->setFeatures(std::move(msg.features)); + _peer->setBuildDate(msg.buildDate); + _peer->setClientVersion(msg.clientVersion); + QVariantList backends; + QVariantList authenticators; bool configured = Core::isConfigured(); - if (!configured) + if (!configured) { backends = Core::backendInfo(); + if (_peer->hasFeature(Quassel::Feature::Authenticators)) { + authenticators = Core::authenticatorInfo(); + } + } - int uptime = Core::instance()->startTime().secsTo(QDateTime::currentDateTime().toUTC()); - int updays = uptime / 86400; uptime %= 86400; - int uphours = uptime / 3600; uptime %= 3600; - int upmins = uptime / 60; - QString coreInfo = tr("Quassel Core Version %1
" - "Version date: %2
" - "Up %3d%4h%5m (since %6)").arg(Quassel::buildInfo().fancyVersionString) - .arg(Quassel::buildInfo().commitDate) - .arg(updays).arg(uphours, 2, 10, QChar('0')).arg(upmins, 2, 10, QChar('0')).arg(Core::instance()->startTime().toString(Qt::TextDate)); - - // useSsl and coreInfo are only used for the legacy protocol - _peer->dispatch(ClientRegistered(Quassel::features(), configured, backends, useSsl, coreInfo)); + _peer->dispatch(Protocol::ClientRegistered(Quassel::Features{}, configured, backends, authenticators, useSsl)); + // useSsl is only used for the legacy protocol if (_legacy && useSsl) startSsl(); _clientRegistered = true; } - -void CoreAuthHandler::handle(const SetupData &msg) +void CoreAuthHandler::handle(const Protocol::SetupData& msg) { if (!checkClientRegistered()) return; - QString result = Core::setup(msg.adminUser, msg.adminPassword, msg.backend, msg.setupData); + // The default parameter to authenticator is Database. + // Maybe this should be hardcoded elsewhere, i.e. as a define. + QString authenticator = msg.authenticator; + qInfo() << "[" << authenticator << "]"; + if (authenticator.trimmed().isEmpty()) { + authenticator = QString("Database"); + } + + QString result = Core::setup(msg.adminUser, msg.adminPassword, msg.backend, msg.setupData, authenticator, msg.authSetupData); if (!result.isEmpty()) - _peer->dispatch(SetupFailed(result)); + _peer->dispatch(Protocol::SetupFailed(result)); else - _peer->dispatch(SetupDone()); + _peer->dispatch(Protocol::SetupDone()); } - -void CoreAuthHandler::handle(const Login &msg) +void CoreAuthHandler::handle(const Protocol::Login& msg) { if (!checkClientRegistered()) return; - UserId uid = Core::validateUser(msg.user, msg.password); + if (!Core::isConfigured()) { + qWarning() << qPrintable(tr("Client")) << qPrintable(socket()->peerAddress().toString()) + << qPrintable(tr("attempted to login before the core was configured, rejecting.")); + _peer->dispatch(Protocol::ClientDenied( + tr("Attempted to login before core was configured!
The core must be configured before attempting to login."))); + return; + } + + // First attempt local auth using the real username and password. + // If that fails, move onto the auth provider. + + // Check to see if the user has the "Database" authenticator configured. + UserId uid = 0; + if (Core::getUserAuthenticator(msg.user) == "Database") { + uid = Core::validateUser(msg.user, msg.password); + } + + // If they did not, *or* if the database login fails, try to use a different authenticator. + // TODO: this logic should likely be moved into Core::authenticateUser in the future. + // Right now a core can only have one authenticator configured; this might be something + // to change in the future. if (uid == 0) { - quInfo() << qPrintable(tr("Invalid login attempt from %1 as \"%2\"").arg(socket()->peerAddress().toString(), msg.user)); - _peer->dispatch(LoginFailed(tr("Invalid username or password!
The username/password combination you supplied could not be found in the database."))); + uid = Core::authenticateUser(msg.user, msg.password); + } + + if (uid == 0) { + qInfo() << qPrintable(tr("Invalid login attempt from %1 as \"%2\"").arg(socket()->peerAddress().toString(), msg.user)); + _peer->dispatch(Protocol::LoginFailed(tr( + "Invalid username or password!
The username/password combination you supplied could not be found in the database."))); + if (_metricsServer) { + _metricsServer->addLoginAttempt(msg.user, false); + } return; } - _peer->dispatch(LoginSuccess()); + _peer->dispatch(Protocol::LoginSuccess()); + if (_metricsServer) { + _metricsServer->addLoginAttempt(uid, true); + } - quInfo() << qPrintable(tr("Client %1 initialized and authenticated successfully as \"%2\" (UserId: %3).").arg(socket()->peerAddress().toString(), msg.user, QString::number(uid.toInt()))); + qInfo() << qPrintable(tr("Client %1 initialized and authenticated successfully as \"%2\" (UserId: %3).") + .arg(socket()->peerAddress().toString(), msg.user, QString::number(uid.toInt()))); - disconnect(socket(), 0, this, 0); - disconnect(_peer, 0, this, 0); - _peer->setParent(0); // Core needs to take care of this one now! + const auto& clientFeatures = _peer->features(); + auto unsupported = clientFeatures.toStringList(false); + if (!unsupported.isEmpty()) { + if (unsupported.contains("NoFeatures")) + qInfo() << qPrintable(tr("Client does not support extended features.")); + else + qInfo() << qPrintable(tr("Client does not support the following features: %1").arg(unsupported.join(", "))); + } + + if (!clientFeatures.unknownFeatures().isEmpty()) { + qInfo() << qPrintable(tr("Client supports unknown features: %1").arg(clientFeatures.unknownFeatures().join(", "))); + } + + disconnect(socket(), nullptr, this, nullptr); + disconnect(_peer, nullptr, this, nullptr); + _peer->setParent(nullptr); // Core needs to take care of this one now! - socket()->flush(); // Make sure all data is sent before handing over the peer (and socket) to the session thread (bug 682) + socket()->flush(); // Make sure all data is sent before handing over the peer (and socket) to the session thread (bug 682) emit handshakeComplete(_peer, uid); } - /*** SSL Stuff ***/ void CoreAuthHandler::startSsl() { - #ifdef HAVE_SSL - QSslSocket *sslSocket = qobject_cast(socket()); +#ifdef HAVE_SSL + auto* sslSocket = qobject_cast(socket()); Q_ASSERT(sslSocket); - qDebug() << qPrintable(tr("Starting encryption for Client:")) << _peer->description(); - connect(sslSocket, SIGNAL(sslErrors(const QList &)), SLOT(onSslErrors())); - sslSocket->flush(); // ensure that the write cache is flushed before we switch to ssl (bug 682) + qDebug() << qPrintable(tr("Starting encryption for Client:")) << _peer->description(); + connect(sslSocket, selectOverload&>(&QSslSocket::sslErrors), this, &CoreAuthHandler::onSslErrors); + sslSocket->flush(); // ensure that the write cache is flushed before we switch to ssl (bug 682) sslSocket->startServerEncryption(); - #endif /* HAVE_SSL */ +#endif /* HAVE_SSL */ } - #ifdef HAVE_SSL void CoreAuthHandler::onSslErrors() { - QSslSocket *sslSocket = qobject_cast(socket()); + auto* sslSocket = qobject_cast(socket()); Q_ASSERT(sslSocket); sslSocket->ignoreSslErrors(); } #endif -