2018-05-30 23:36:49 +03:00
|
|
|
// Copyright (C) 2018 G.J.R. Timmer <gjr.timmer@gmail.com>.
|
|
|
|
//
|
|
|
|
// Use of this source code is governed by an MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2024-01-25 16:36:27 +03:00
|
|
|
//go:build sqlite_userauth
|
2018-05-30 23:36:49 +03:00
|
|
|
// +build sqlite_userauth
|
|
|
|
|
|
|
|
package sqlite3
|
|
|
|
|
|
|
|
/*
|
|
|
|
#cgo CFLAGS: -DSQLITE_USER_AUTHENTICATION
|
|
|
|
#cgo LDFLAGS: -lm
|
|
|
|
#ifndef USE_LIBSQLITE3
|
2021-10-25 18:23:19 +03:00
|
|
|
#include "sqlite3-binding.h"
|
2018-05-30 23:36:49 +03:00
|
|
|
#else
|
|
|
|
#include <sqlite3.h>
|
|
|
|
#endif
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
|
|
|
static int
|
|
|
|
_sqlite3_user_authenticate(sqlite3* db, const char* zUsername, const char* aPW, int nPW)
|
|
|
|
{
|
|
|
|
return sqlite3_user_authenticate(db, zUsername, aPW, nPW);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
_sqlite3_user_add(sqlite3* db, const char* zUsername, const char* aPW, int nPW, int isAdmin)
|
|
|
|
{
|
|
|
|
return sqlite3_user_add(db, zUsername, aPW, nPW, isAdmin);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
_sqlite3_user_change(sqlite3* db, const char* zUsername, const char* aPW, int nPW, int isAdmin)
|
|
|
|
{
|
|
|
|
return sqlite3_user_change(db, zUsername, aPW, nPW, isAdmin);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
_sqlite3_user_delete(sqlite3* db, const char* zUsername)
|
|
|
|
{
|
|
|
|
return sqlite3_user_delete(db, zUsername);
|
|
|
|
}
|
2018-05-31 15:55:22 +03:00
|
|
|
|
|
|
|
static int
|
2018-06-01 12:28:04 +03:00
|
|
|
_sqlite3_auth_enabled(sqlite3* db)
|
2018-05-31 15:55:22 +03:00
|
|
|
{
|
|
|
|
int exists = -1;
|
|
|
|
|
|
|
|
sqlite3_stmt *stmt;
|
|
|
|
sqlite3_prepare_v2(db, "select count(type) from sqlite_master WHERE type='table' and name='sqlite_user';", -1, &stmt, NULL);
|
|
|
|
|
|
|
|
while ( sqlite3_step(stmt) == SQLITE_ROW) {
|
|
|
|
exists = sqlite3_column_int(stmt, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
sqlite3_finalize(stmt);
|
|
|
|
|
|
|
|
return exists;
|
|
|
|
}
|
2018-05-30 23:36:49 +03:00
|
|
|
*/
|
|
|
|
import "C"
|
2018-05-31 10:46:38 +03:00
|
|
|
import (
|
2018-05-31 17:42:03 +03:00
|
|
|
"errors"
|
2018-05-31 10:46:38 +03:00
|
|
|
"unsafe"
|
|
|
|
)
|
2018-05-30 23:36:49 +03:00
|
|
|
|
|
|
|
const (
|
|
|
|
SQLITE_AUTH = C.SQLITE_AUTH
|
|
|
|
)
|
|
|
|
|
2018-05-31 17:42:03 +03:00
|
|
|
var (
|
|
|
|
ErrUnauthorized = errors.New("SQLITE_AUTH: Unauthorized")
|
|
|
|
ErrAdminRequired = errors.New("SQLITE_AUTH: Unauthorized; Admin Privileges Required")
|
|
|
|
)
|
|
|
|
|
2018-05-30 23:36:49 +03:00
|
|
|
// Authenticate will perform an authentication of the provided username
|
|
|
|
// and password against the database.
|
|
|
|
//
|
|
|
|
// If a database contains the SQLITE_USER table, then the
|
|
|
|
// call to Authenticate must be invoked with an
|
|
|
|
// appropriate username and password prior to enable read and write
|
2024-01-25 16:36:27 +03:00
|
|
|
// access to the database.
|
2018-05-30 23:36:49 +03:00
|
|
|
//
|
|
|
|
// Return SQLITE_OK on success or SQLITE_ERROR if the username/password
|
|
|
|
// combination is incorrect or unknown.
|
|
|
|
//
|
|
|
|
// If the SQLITE_USER table is not present in the database file, then
|
|
|
|
// this interface is a harmless no-op returnning SQLITE_OK.
|
|
|
|
func (c *SQLiteConn) Authenticate(username, password string) error {
|
2018-06-01 12:28:04 +03:00
|
|
|
rv := c.authenticate(username, password)
|
|
|
|
switch rv {
|
|
|
|
case C.SQLITE_ERROR, C.SQLITE_AUTH:
|
|
|
|
return ErrUnauthorized
|
|
|
|
case C.SQLITE_OK:
|
|
|
|
return nil
|
|
|
|
default:
|
|
|
|
return c.lastError()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// authenticate provides the actual authentication to SQLite.
|
|
|
|
// This is not exported for usage in Go.
|
|
|
|
// It is however exported for usage within SQL by the user.
|
|
|
|
//
|
|
|
|
// Returns:
|
2024-01-25 16:36:27 +03:00
|
|
|
//
|
|
|
|
// C.SQLITE_OK (0)
|
|
|
|
// C.SQLITE_ERROR (1)
|
|
|
|
// C.SQLITE_AUTH (23)
|
2018-06-01 12:28:04 +03:00
|
|
|
func (c *SQLiteConn) authenticate(username, password string) int {
|
2018-05-31 10:46:38 +03:00
|
|
|
// Allocate C Variables
|
|
|
|
cuser := C.CString(username)
|
|
|
|
cpass := C.CString(password)
|
|
|
|
|
|
|
|
// Free C Variables
|
|
|
|
defer func() {
|
|
|
|
C.free(unsafe.Pointer(cuser))
|
|
|
|
C.free(unsafe.Pointer(cpass))
|
|
|
|
}()
|
|
|
|
|
2018-06-01 12:28:04 +03:00
|
|
|
return int(C._sqlite3_user_authenticate(c.db, cuser, cpass, C.int(len(password))))
|
2018-05-30 23:36:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// AuthUserAdd can be used (by an admin user only)
|
|
|
|
// to create a new user. When called on a no-authentication-required
|
|
|
|
// database, this routine converts the database into an authentication-
|
|
|
|
// required database, automatically makes the added user an
|
|
|
|
// administrator, and logs in the current connection as that user.
|
|
|
|
// The AuthUserAdd only works for the "main" database, not
|
|
|
|
// for any ATTACH-ed databases. Any call to AuthUserAdd by a
|
|
|
|
// non-admin user results in an error.
|
|
|
|
func (c *SQLiteConn) AuthUserAdd(username, password string, admin bool) error {
|
|
|
|
isAdmin := 0
|
|
|
|
if admin {
|
|
|
|
isAdmin = 1
|
|
|
|
}
|
|
|
|
|
2018-05-31 17:42:03 +03:00
|
|
|
rv := c.authUserAdd(username, password, isAdmin)
|
|
|
|
switch rv {
|
2018-06-01 12:28:04 +03:00
|
|
|
case C.SQLITE_ERROR, C.SQLITE_AUTH:
|
2018-05-31 17:42:03 +03:00
|
|
|
return ErrAdminRequired
|
|
|
|
case C.SQLITE_OK:
|
|
|
|
return nil
|
|
|
|
default:
|
|
|
|
return c.lastError()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-01 12:28:04 +03:00
|
|
|
// authUserAdd enables the User Authentication if not enabled.
|
|
|
|
// Otherwise it will add a user.
|
|
|
|
//
|
|
|
|
// When user authentication is already enabled then this function
|
|
|
|
// can only be called by an admin.
|
|
|
|
//
|
|
|
|
// This is not exported for usage in Go.
|
|
|
|
// It is however exported for usage within SQL by the user.
|
|
|
|
//
|
|
|
|
// Returns:
|
2024-01-25 16:36:27 +03:00
|
|
|
//
|
|
|
|
// C.SQLITE_OK (0)
|
|
|
|
// C.SQLITE_ERROR (1)
|
|
|
|
// C.SQLITE_AUTH (23)
|
2018-05-31 17:42:03 +03:00
|
|
|
func (c *SQLiteConn) authUserAdd(username, password string, admin int) int {
|
2018-05-31 10:46:38 +03:00
|
|
|
// Allocate C Variables
|
|
|
|
cuser := C.CString(username)
|
|
|
|
cpass := C.CString(password)
|
|
|
|
|
|
|
|
// Free C Variables
|
|
|
|
defer func() {
|
|
|
|
C.free(unsafe.Pointer(cuser))
|
|
|
|
C.free(unsafe.Pointer(cpass))
|
|
|
|
}()
|
|
|
|
|
2018-05-31 17:42:03 +03:00
|
|
|
return int(C._sqlite3_user_add(c.db, cuser, cpass, C.int(len(password)), C.int(admin)))
|
2018-05-30 23:36:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// AuthUserChange can be used to change a users
|
|
|
|
// login credentials or admin privilege. Any user can change their own
|
|
|
|
// login credentials. Only an admin user can change another users login
|
|
|
|
// credentials or admin privilege setting. No user may change their own
|
|
|
|
// admin privilege setting.
|
|
|
|
func (c *SQLiteConn) AuthUserChange(username, password string, admin bool) error {
|
|
|
|
isAdmin := 0
|
|
|
|
if admin {
|
|
|
|
isAdmin = 1
|
|
|
|
}
|
|
|
|
|
2018-06-01 12:28:04 +03:00
|
|
|
rv := c.authUserChange(username, password, isAdmin)
|
|
|
|
switch rv {
|
|
|
|
case C.SQLITE_ERROR, C.SQLITE_AUTH:
|
|
|
|
return ErrAdminRequired
|
|
|
|
case C.SQLITE_OK:
|
|
|
|
return nil
|
|
|
|
default:
|
|
|
|
return c.lastError()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// authUserChange allows to modify a user.
|
|
|
|
// Users can change their own password.
|
|
|
|
//
|
|
|
|
// Only admins can change passwords for other users
|
|
|
|
// and modify the admin flag.
|
|
|
|
//
|
|
|
|
// The admin flag of the current logged in user cannot be changed.
|
|
|
|
// THis ensures that their is always an admin.
|
|
|
|
//
|
|
|
|
// This is not exported for usage in Go.
|
|
|
|
// It is however exported for usage within SQL by the user.
|
|
|
|
//
|
|
|
|
// Returns:
|
2024-01-25 16:36:27 +03:00
|
|
|
//
|
|
|
|
// C.SQLITE_OK (0)
|
|
|
|
// C.SQLITE_ERROR (1)
|
|
|
|
// C.SQLITE_AUTH (23)
|
2018-06-01 12:28:04 +03:00
|
|
|
func (c *SQLiteConn) authUserChange(username, password string, admin int) int {
|
2018-05-31 10:46:38 +03:00
|
|
|
// Allocate C Variables
|
|
|
|
cuser := C.CString(username)
|
|
|
|
cpass := C.CString(password)
|
|
|
|
|
|
|
|
// Free C Variables
|
|
|
|
defer func() {
|
|
|
|
C.free(unsafe.Pointer(cuser))
|
|
|
|
C.free(unsafe.Pointer(cpass))
|
|
|
|
}()
|
|
|
|
|
2018-06-01 12:28:04 +03:00
|
|
|
return int(C._sqlite3_user_change(c.db, cuser, cpass, C.int(len(password)), C.int(admin)))
|
2018-05-30 23:36:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// AuthUserDelete can be used (by an admin user only)
|
|
|
|
// to delete a user. The currently logged-in user cannot be deleted,
|
|
|
|
// which guarantees that there is always an admin user and hence that
|
|
|
|
// the database cannot be converted into a no-authentication-required
|
|
|
|
// database.
|
|
|
|
func (c *SQLiteConn) AuthUserDelete(username string) error {
|
2018-06-01 12:28:04 +03:00
|
|
|
rv := c.authUserDelete(username)
|
|
|
|
switch rv {
|
|
|
|
case C.SQLITE_ERROR, C.SQLITE_AUTH:
|
|
|
|
return ErrAdminRequired
|
|
|
|
case C.SQLITE_OK:
|
|
|
|
return nil
|
|
|
|
default:
|
|
|
|
return c.lastError()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// authUserDelete can be used to delete a user.
|
|
|
|
//
|
|
|
|
// This function can only be executed by an admin.
|
|
|
|
//
|
|
|
|
// This is not exported for usage in Go.
|
|
|
|
// It is however exported for usage within SQL by the user.
|
|
|
|
//
|
|
|
|
// Returns:
|
2024-01-25 16:36:27 +03:00
|
|
|
//
|
|
|
|
// C.SQLITE_OK (0)
|
|
|
|
// C.SQLITE_ERROR (1)
|
|
|
|
// C.SQLITE_AUTH (23)
|
2018-06-01 12:28:04 +03:00
|
|
|
func (c *SQLiteConn) authUserDelete(username string) int {
|
2018-05-31 10:46:38 +03:00
|
|
|
// Allocate C Variables
|
|
|
|
cuser := C.CString(username)
|
|
|
|
|
|
|
|
// Free C Variables
|
|
|
|
defer func() {
|
|
|
|
C.free(unsafe.Pointer(cuser))
|
|
|
|
}()
|
|
|
|
|
2018-06-01 12:28:04 +03:00
|
|
|
return int(C._sqlite3_user_delete(c.db, cuser))
|
2018-05-30 23:36:49 +03:00
|
|
|
}
|
|
|
|
|
2018-06-01 12:28:04 +03:00
|
|
|
// AuthEnabled checks if the database is protected by user authentication
|
|
|
|
func (c *SQLiteConn) AuthEnabled() (exists bool) {
|
|
|
|
rv := c.authEnabled()
|
2018-05-31 15:55:22 +03:00
|
|
|
if rv == 1 {
|
|
|
|
exists = true
|
|
|
|
}
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-06-01 12:28:04 +03:00
|
|
|
// authEnabled perform the actual check for user authentication.
|
|
|
|
//
|
|
|
|
// This is not exported for usage in Go.
|
|
|
|
// It is however exported for usage within SQL by the user.
|
|
|
|
//
|
|
|
|
// Returns:
|
2024-01-25 16:36:27 +03:00
|
|
|
//
|
|
|
|
// 0 - Disabled
|
|
|
|
// 1 - Enabled
|
2018-06-01 12:28:04 +03:00
|
|
|
func (c *SQLiteConn) authEnabled() int {
|
|
|
|
return int(C._sqlite3_auth_enabled(c.db))
|
|
|
|
}
|
|
|
|
|
2018-05-30 23:36:49 +03:00
|
|
|
// EOF
|