diff options
author | Wushin <pasekei@gmail.com> | 2014-11-16 22:27:32 -0600 |
---|---|---|
committer | Wushin <pasekei@gmail.com> | 2014-11-16 22:27:32 -0600 |
commit | 6f37a79665408c3531842851fc6c3efabfe50a07 (patch) | |
tree | 6e8dc2a26e61bfe6ba61af731208fc07a8b2536e /extensions/tmwa/backend/libs | |
parent | e41baa4c3aeb5f2b05fb928c1bf13e6a9bb130a7 (diff) | |
parent | 294e5d28e70d1709520c3fbb78464edb557f638b (diff) | |
download | website-6f37a79665408c3531842851fc6c3efabfe50a07.tar.gz website-6f37a79665408c3531842851fc6c3efabfe50a07.tar.bz2 website-6f37a79665408c3531842851fc6c3efabfe50a07.tar.xz website-6f37a79665408c3531842851fc6c3efabfe50a07.zip |
Merge pull request #9 from wushin/www-to-wiki
Www to wiki
Diffstat (limited to 'extensions/tmwa/backend/libs')
-rw-r--r-- | extensions/tmwa/backend/libs/libladmin-db.php | 34 | ||||
-rw-r--r-- | extensions/tmwa/backend/libs/libladmin.php | 139 | ||||
-rw-r--r-- | extensions/tmwa/backend/libs/libtmwauth.php | 300 |
3 files changed, 473 insertions, 0 deletions
diff --git a/extensions/tmwa/backend/libs/libladmin-db.php b/extensions/tmwa/backend/libs/libladmin-db.php new file mode 100644 index 0000000..2b1ba9b --- /dev/null +++ b/extensions/tmwa/backend/libs/libladmin-db.php @@ -0,0 +1,34 @@ +<?php +/* +dbLadmin by wushin AGPL +*/ + +class dbLadmin { + + public function __construct() { + $this->socket = True; + } + + public function account_exists($username) { + $dbr = wfGetDB(DB_SLAVE); + $res = $dbr->select('tmw_accounts', array('USERNAME'), 'USERNAME = "'.$username.'"', __METHOD__, array()); + foreach ($res as $row) { + return True; + } + return False; + } + + public function create_account($username, $userpass, $sex, $email) { + $dbw = wfGetDB(DB_MASTER); + $dbw->insert('tmw_accounts', array('USERNAME' => $username, 'PASSWORD' => $userpass, 'GENDER' => $sex, 'EMAIL' => $email), __METHOD__, 'IGNORE'); + if ( $dbw->affectedRows() ) { + return True; + } else { + return False; + } + } + + public function close() { + return True; + } +} diff --git a/extensions/tmwa/backend/libs/libladmin.php b/extensions/tmwa/backend/libs/libladmin.php new file mode 100644 index 0000000..698e898 --- /dev/null +++ b/extensions/tmwa/backend/libs/libladmin.php @@ -0,0 +1,139 @@ +<?php +/* +phpLadmin by wushin AGPL +*/ +ob_implicit_flush(); + +class phpLadmin { + + public function __construct() { + global $wgLadminHost,$wgLadminPort,$wgLadminPass; + $tmwa = new TMWA(); + $this->packets = $tmwa->packets; + + $address = gethostbyname($wgLadminHost); + $socket = socket_create(AF_INET, SOCK_STREAM, SOL_TCP); + socket_set_option($socket, SOL_SOCKET, SO_RCVTIMEO, array('sec' => 5, 'usec' => 0)); + socket_set_option($socket, SOL_SOCKET, SO_SNDTIMEO, array('sec' => 5, 'usec' => 0)); + if ($socket === False) { + $this->socket = False; + return False; + } + if(socket_connect($socket, $address, $wgLadminPort)) { + $this->socket = $socket; + if (self::admin_login()) { + return True; + } + } + $this->socket = False; + return False; + } + + private function ladmin_sendrecv($packet_data) { + $packet_send = ''; + foreach ($this->packets[$packet_data['packet']]['packet'] as $pack_name => $pack_item) { + $packet_send .= pack($pack_item, $packet_data[$pack_name]); + } + socket_write($this->socket, $packet_send); + $packet_send = ''; + socket_recv($this->socket, $packet_pack, 2, MSG_PEEK); + $packet_recv = unpack('vpacket/', $packet_pack); + socket_recv($this->socket, $packet_pack, $this->packets[$packet_recv['packet']]['len'], MSG_DONTWAIT); + $unpack_payload = ''; + foreach ($this->packets[$packet_recv['packet']]['packet'] as $pack_name => $pack_item) { + $unpack_payload .= $pack_item.$pack_name.'/'; + } + $payload_recv = unpack($unpack_payload, $packet_pack); + return $payload_recv; + } + + private function admin_login() { + // Admin Login + $login_response = self::ladmin_sendrecv(array('packet' => 0x7918, 'encryption_zero' => 0,'account_pass' => get_cfg_var("tmwa.cfg.LADMIN_PASS"))); + if($login_response['error'] != 0) { + return False; + } + return self::login_version(); + } + + private function login_version() { + // Login version + $packet_data['packet'] = 0x7530; + return self::ladmin_sendrecv($packet_data); + } + + private function add_account($args) { + // Add Account + $packet_data['packet'] = 0x7930; + $user_check = self::ladmin_sendrecv(array_merge($packet_data, $args)); + return ($user_check['account_id'] > 0 ? True : False); + } + + private function check_password($args) { + // Check Password + $packet_data['packet'] = 0x793a; + $user_check = self::ladmin_sendrecv(array_merge($packet_data, $args)); + return ($user_check['account_id'] > 0 ? True : False); + } + + private function who_account($args) { + // Who Account + $packet_data['packet'] = 0x7952; + return self::ladmin_sendrecv(array_merge($packet_data, $args)); + } + + private function change_password($args) { + // Change Password + $packet_data['packet'] = 0x7934; + $pass_result = self::ladmin_sendrecv(array_merge($packet_data, $args)); + return ($pass_result['account_id'] > 0 ? True : False); + } + + public function close() { + socket_close($this->socket); + } + + public function account_info($username) { + $args = array('account_name' => $username); + $account_info = self::who_account($args); + return $account_info; + } + + public function account_exists($username) { + $args = array('account_name' => $username); + $user_name_exists = self::who_account($args); + return ($user_name_exists['account_id'] > 0 ? True : False); + } + + public function check_auth($username, $userpass) { + $args = array('account_name' => $username, 'account_password' => $userpass); + return self::check_password($args); + } + + public function check_ban($username) { + $account_info = self::account_info($username); + if ($account_info['state'] > 0) { + return True; + } elseif ($account_info['ban_until'] > 0) { + return True; + } + return False; + } + + public function change_pass($username, $userpass) { + $args = array('account_name' => $username, 'account_password' => $userpass); + return self::change_password($args); + } + + public function reset_password($username, $userpass, $newuserpass) { + $args = array('account_name' => $username, 'account_password' => $userpass); + $user_check = self::check_password($args); + return ($user_check ? self::change_pass($username, $newuserpass) : False); + } + + public function create_account($username, $userpass, $sex, $email) { + $user_name_exists = self::account_exists($username); + $args = array('account_name' => $username, 'account_password' => $userpass, 'sex' => $sex, 'email' => $email); + return (!$user_name_exists ? self::add_account($args) : False); + } +} diff --git a/extensions/tmwa/backend/libs/libtmwauth.php b/extensions/tmwa/backend/libs/libtmwauth.php new file mode 100644 index 0000000..33a4331 --- /dev/null +++ b/extensions/tmwa/backend/libs/libtmwauth.php @@ -0,0 +1,300 @@ +<?php +/** + * Tmw Auth Interface (Requires Ladmin socket) by wushin + * Based on mediawiki AuthPlugin + * + * Copyright © 2004 Brion Vibber <brion@pobox.com> + * http://www.mediawiki.org/ + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License along + * with this program; if not, write to the Free Software Foundation, Inc., + * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. + * http://www.gnu.org/copyleft/gpl.html + * + * @file + */ + +/** + * Authentication plugin interface. Instantiate a subclass of AuthPlugin + * and set $wgAuth to it to authenticate against some external tool. + * + * The default behavior is not to do anything, and use the local user + * database for all authentication. A subclass can require that all + * accounts authenticate externally, or use it only as a fallback; also + * you can transparently create internal wiki accounts the first time + * someone logs in who can be authenticated externally. + */ +class TMWAuth extends AuthPlugin { + /** + * Check whether there exists a user account with the given name. + * The name will be normalized to MediaWiki's requirements, so + * you might need to munge it (for instance, for lowercase initial + * letters). + * + * @param $username String: username. + * @return bool + */ + public function userExists( $username ) { + global $wgTMWAccountLib; + $ladmin = New $wgTMWAccountLib(); + $user_exists = ($ladmin->check_ban($username, $password) ? False : $ladmin->check_auth($username, $password)); + $ladmin->close(); + return $user_exists; + } + + /** + * Check if a username+password pair is a valid login. + * The name will be normalized to MediaWiki's requirements, so + * you might need to munge it (for instance, for lowercase initial + * letters). + * + * @param $username String: username. + * @param $password String: user password. + * @return bool + */ + public function authenticate( $username, $password ) { + global $wgTMWAccountLib; + $ladmin = New $wgTMWAccountLib(); + $auth_result = $ladmin->check_auth($username, $password); + $ladmin->close(); + return $auth_result; + } + + /** + * Modify options in the login template. + * + * @param $template UserLoginTemplate object. + * @param $type String 'signup' or 'login'. Added in 1.16. + */ + public function modifyUITemplate( &$template, &$type ) { + $template->set( 'usedomain', False ); + } + + /** + * Set the domain this plugin is supposed to use when authenticating. + * + * @param $domain String: authentication domain. + */ + public function setDomain( $domain ) { + $this->domain = $domain; + } + + /** + * Check to see if the specific domain is a valid domain. + * + * @param $domain String: authentication domain. + * @return bool + */ + public function validDomain( $domain ) { + # Override this! + return True; + } + + /** + * When a user logs in, optionally fill in preferences and such. + * For instance, you might pull the email address or real name from the + * external user database. + * + * The User object is passed by reference so it can be modified; don't + * forget the & on your function declaration. + * + * @param $user User object + */ + public function updateUser( &$user ) { + # Override this and do something + return True; + } + + /** + * Return True if the wiki should create a new local account automatically + * when asked to login a user who doesn't exist locally but does in the + * external auth database. + * + * If you don't automatically create accounts, you must still create + * accounts in some way. It's not possible to authenticate without + * a local account. + * + * This is just a question, and shouldn't perform any actions. + * + * @return Boolean + */ + public function autoCreate() { + return True; + } + + /** + * Allow a property change? Properties are the same as preferences + * and use the same keys. 'Realname' 'Emailaddress' and 'Nickname' + * all reference this. + * + * @param $prop string + * + * @return Boolean + */ + public function allowPropChange( $prop = '' ) { + if ( $prop == 'realname' && is_callable( array( $this, 'allowRealNameChange' ) ) ) { + return $this->allowRealNameChange(); + } elseif ( $prop == 'emailaddress' && is_callable( array( $this, 'allowEmailChange' ) ) ) { + return $this->allowEmailChange(); + } elseif ( $prop == 'nickname' && is_callable( array( $this, 'allowNickChange' ) ) ) { + return $this->allowNickChange(); + } else { + return True; + } + } + + /** + * Can users change their passwords? + * + * @return bool + */ + public function allowPasswordChange() { + return True; + } + + /** + * Should MediaWiki store passwords in its local database? + * + * @return bool + */ + public function allowSetLocalPassword() { + return True; + } + + /** + * Set the given password in the authentication database. + * As a special case, the password may be set to null to request + * locking the password to an unusable value, with the expectation + * that it will be set later through a mail reset or other method. + * + * Return True if successful. + * + * @param $user User object. + * @param $password String: password. + * @return bool + */ + public function setPassword( $user, $password ) { + global $wgTMWAccountLib; + $ladmin = New $wgTMWAccountLib(); + $set_pass_res = $ladmin->change_pass($user, $password); + $ladmin->close(); + return $set_pass_res; + } + + /** + * Update user information in the external authentication database. + * Return True if successful. + * + * @param $user User object. + * @return Boolean + */ + public function updateExternalDB( $user ) { + return False; + } + + /** + * Check to see if external accounts can be created. + * Return True if external accounts can be created. + * @return Boolean + */ + public function canCreateAccounts() { + return True; + } + + /** + * Add a user to the external authentication database. + * Return True if successful. + * + * @param $user User: only the name should be assumed valid at this point + * @param $password String + * @param $email String + * @param $realname String + * @return Boolean + */ + public function addUser( $user, $password, $email = '', $realname = '' ) { + global $wgTMWAccountLib; + // Gender is currently hard set + $sex = 'M'; + $ladmin = New $wgTMWAccountLib(); + $add_user_res = $ladmin->create_account($user, $password, $sex, $email); + $ladmin->close(); + return $add_user_res; + } + + /** + * Return True to prevent logins that don't authenticate here from being + * checked against the local database's password fields. + * + * This is just a question, and shouldn't perform any actions. + * + * @return Boolean + */ + public function strict() { + return False; + } + + /** + * Check if a user should authenticate locally if the global authentication fails. + * If either this or strict() returns True, local authentication is not used. + * + * @param $username String: username. + * @return Boolean + */ + public function strictUserAuth( $username ) { + return False; + } + + /** + * When creating a user account, optionally fill in preferences and such. + * For instance, you might pull the email address or real name from the + * external user database. + * + * The User object is passed by reference so it can be modified; don't + * forget the & on your function declaration. + * + * @param $user User object. + * @param $autocreate Boolean: True if user is being autocreated on login + */ + public function initUser( &$user, $autocreate = False ) { + # Override this to do something. + } + + /** + * If you want to munge the case of an account name before the final + * check, now is your chance. + */ + public function getCanonicalName( $username ) { + return ucwords(strtolower($username)); + } + + /** + * Get an instance of a User object + * + * @param $user User + * + * @return AuthPluginUser + */ + public function getUserInstance( User &$user ) { + return new AuthPluginUser( $user ); + } + + /** + * Get a list of domains (in HTMLForm options format) used. + * + * @return array + */ + public function domainList() { + return array(); + } +} +?> |