modulemanager: Reduce warning to debug level message about modules already being...
[prosody.git] / core / usermanager.lua
index 6e4d117ea262c13f6ba9086a71797c55450e7a5d..08343bee3c580233e45ab4ccb4eb87fd61f3e577 100644 (file)
 -- COPYING file in the source package for more information.
 --
 
-local datamanager = require "util.datamanager";
+local modulemanager = require "core.modulemanager";
 local log = require "util.logger".init("usermanager");
 local type = type;
-local error = error;
 local ipairs = ipairs;
-local hashes = require "util.hashes";
+local pairs = pairs;
 local jid_bare = require "util.jid".bare;
+local jid_prep = require "util.jid".prep;
 local config = require "core.configmanager";
 local hosts = hosts;
+local sasl_new = require "util.sasl".new;
+local storagemanager = require "core.storagemanager";
 
 local prosody = _G.prosody;
 
-module "usermanager"
+local setmetatable = setmetatable;
 
-local new_default_provider;
+local default_provider = "internal_plain";
 
-prosody.events.add_handler("host-activated", function (host)
-       local host_session = hosts[host];
-       host_session.events.add_handler("item-added/auth-provider", function (provider)
-               if config.get(host, "core", "authentication") == provider.name then
-                       host_session.users = provider;
-               end
-       end);
-       host_session.events.add_handler("item-removed/auth-provider", function (provider)
-               if host_session.users == provider then
-                       host_session.users = new_default_provider(host);
-               end
-       end);
-       host_session.users = new_default_provider(host); -- Start with the default usermanager provider
-end);
+module "usermanager"
 
-local function is_cyrus(host) return config.get(host, "core", "sasl_backend") == "cyrus"; end
+function new_null_provider()
+       local function dummy() return nil, "method not implemented"; end;
+       local function dummy_get_sasl_handler() return sasl_new(nil, {}); end
+       return setmetatable({name = "null", get_sasl_handler = dummy_get_sasl_handler}, {
+               __index = function(self, method) return dummy; end
+       });
+end
 
-function new_default_provider(host)
-       local provider = {};
-       
-       function provider.test_password(username, password)
-               if is_cyrus(host) then return nil, "Legacy auth not supported with Cyrus SASL."; end
-               local credentials = datamanager.load(username, host, "accounts") or {};
-       
-               if password == credentials.password then
-                       return true;
-               else
-                       return nil, "Auth failed. Invalid username or password.";
-               end
-       end
+local provider_mt = { __index = new_null_provider() };
 
-       function provider.get_password(username)
-               if is_cyrus(host) then return nil, "Passwords unavailable for Cyrus SASL."; end
-               return (datamanager.load(username, host, "accounts") or {}).password;
-       end
+function initialize_host(host)
+       local host_session = hosts[host];
+       if host_session.type ~= "local" then return; end
        
-       function provider.set_password(username, password)
-               if is_cyrus(host) then return nil, "Passwords unavailable for Cyrus SASL."; end
-               local account = datamanager.load(username, host, "accounts");
-               if account then
-                       account.password = password;
-                       return datamanager.store(username, host, "accounts", account);
+       host_session.events.add_handler("item-added/auth-provider", function (event)
+               local provider = event.item;
+               local auth_provider = config.get(host, "authentication") or default_provider;
+               if config.get(host, "anonymous_login") then
+                       log("error", "Deprecated config option 'anonymous_login'. Use authentication = 'anonymous' instead.");
+                       auth_provider = "anonymous";
+               end -- COMPAT 0.7
+               if provider.name == auth_provider then
+                       host_session.users = setmetatable(provider, provider_mt);
                end
-               return nil, "Account not available.";
-       end
-
-       function provider.user_exists(username)
-               if is_cyrus(host) then return true; end
-               return datamanager.load(username, host, "accounts") ~= nil; -- FIXME also check for empty credentials
-       end
-
-       function provider.create_user(username, password)
-               if is_cyrus(host) then return nil, "Account creation/modification not available with Cyrus SASL."; end
-               return datamanager.store(username, host, "accounts", {password = password});
-       end
-
-       function provider.get_supported_methods()
-               return {["PLAIN"] = true, ["DIGEST-MD5"] = true}; -- TODO this should be taken from the config
-       end
-
-       function provider.is_admin(jid)
-               host = host or "*";
-               local admins = config.get(host, "core", "admins");
-               if host ~= "*" and admins == config.get("*", "core", "admins") then
-                       return nil;
+               if host_session.users ~= nil and host_session.users.name ~= nil then
+                       log("debug", "host '%s' now set to use user provider '%s'", host, host_session.users.name);
                end
-               if type(admins) == "table" then
-                       jid = jid_bare(jid);
-                       for _,admin in ipairs(admins) do
-                               if admin == jid then return true; end
-                       end
-               elseif admins then
-                       log("warn", "Option 'admins' for host '%s' is not a table", host);
+       end);
+       host_session.events.add_handler("item-removed/auth-provider", function (event)
+               local provider = event.item;
+               if host_session.users == provider then
+                       host_session.users = new_null_provider();
                end
-               return nil;
+       end);
+       host_session.users = new_null_provider(); -- Start with the default usermanager provider
+       local auth_provider = config.get(host, "authentication") or default_provider;
+       if config.get(host, "anonymous_login") then auth_provider = "anonymous"; end -- COMPAT 0.7
+       if auth_provider ~= "null" then
+               modulemanager.load(host, "auth_"..auth_provider);
        end
-       return provider;
-end
+end;
+prosody.events.add_handler("host-activated", initialize_host, 100);
 
-function validate_credentials(host, username, password, method)
+function test_password(username, host, password)
        return hosts[host].users.test_password(username, password);
 end
 
@@ -109,7 +77,7 @@ function get_password(username, host)
        return hosts[host].users.get_password(username);
 end
 
-function set_password(username, host, password)
+function set_password(username, password, host)
        return hosts[host].users.set_password(username, password);
 end
 
@@ -121,12 +89,67 @@ function create_user(username, password, host)
        return hosts[host].users.create_user(username, password);
 end
 
-function get_supported_methods(host)
-       return hosts[host].users.get_supported_methods();
+function delete_user(username, host)
+       local ok, err = hosts[host].users.delete_user(username);
+       if not ok then return nil, err; end
+       prosody.events.fire_event("user-deleted", { username = username, host = host });
+       return storagemanager.purge(username, host);
+end
+
+function users(host)
+       return hosts[host].users.users();
+end
+
+function get_sasl_handler(host, session)
+       return hosts[host].users.get_sasl_handler(session);
+end
+
+function get_provider(host)
+       return hosts[host].users;
 end
 
 function is_admin(jid, host)
-       return hosts[host].users.is_admin(jid);
+       if host and not hosts[host] then return false; end
+       if type(jid) ~= "string" then return false; end
+
+       local is_admin;
+       jid = jid_bare(jid);
+       host = host or "*";
+       
+       local host_admins = config.get(host, "admins");
+       local global_admins = config.get("*", "admins");
+       
+       if host_admins and host_admins ~= global_admins then
+               if type(host_admins) == "table" then
+                       for _,admin in ipairs(host_admins) do
+                               if jid_prep(admin) == jid then
+                                       is_admin = true;
+                                       break;
+                               end
+                       end
+               elseif host_admins then
+                       log("error", "Option 'admins' for host '%s' is not a list", host);
+               end
+       end
+       
+       if not is_admin and global_admins then
+               if type(global_admins) == "table" then
+                       for _,admin in ipairs(global_admins) do
+                               if jid_prep(admin) == jid then
+                                       is_admin = true;
+                                       break;
+                               end
+                       end
+               elseif global_admins then
+                       log("error", "Global option 'admins' is not a list");
+               end
+       end
+       
+       -- Still not an admin, check with auth provider
+       if not is_admin and host ~= "*" and hosts[host].users and hosts[host].users.is_admin then
+               is_admin = hosts[host].users.is_admin(jid);
+       end
+       return is_admin or false;
 end
 
 return _M;