aboutsummaryrefslogtreecommitdiff
path: root/sql/updates/auth
AgeCommit message (Collapse)Author
2013-06-02Merge pull request #9854 from Ascathor/masterSubv
Core/Command: Optimized .pinfo more
2013-06-02DB/Autobroadcast: Update correct db struktur and auth basejoschiwald
2013-05-26Core/Command: Optimized .pinfo moreAscathor
* Moved some checks around * Added RBAC Permission for Email, last login and last ip (group 3 and 4) -- If missing RBAC permission, then it displays "Unauthorized (RBAC)" * Changed totalmail output from uint64 to uint32 * Level either puts Max level, or a list of information necessary * Only queries guild if the current xp query also detects guild membership * Incorporated recent changes into code * Commander requires higher than target to get sensitive data beside RBAC permission.
2013-04-27SQL: Fix file format and rename for mergeVincent_Michael
2013-04-25Core/World: Improvements in Autobroadcast system (dropped from world ↵xjose93
database and moved to auth database, added realmid and weight columns)
2013-04-22[Ip2nationLock] Implement the ip2nation lock country.Bezo
2013-03-11DB/Auth/Schema: Change secId from int(10)u to tinyint(3)u in ↵Nay
rbac_security_level_groups Closes #9403
2013-03-08Typo fix... ¬¬Spp
2013-03-08Core/RBAC: Change default db permissions to behave like a server with ↵Spp
default config before RBAC conversion (Missing change from previous commit) To enable any of the removed config option you should now add the proper role to the proper groups IE: AllowTwoSide.Interaction.Mail = 1 --> Add role 19 to group 1 (Add it to players)
2013-02-26Core&SQL: Fix typos (RBAC and equips related)Nay
2013-02-26Core/RBAC: Correction to last sqls and update base/auth_database.sqlSpp
2013-02-25Core/RBAC: Create new permissions 'See two side who list', 'Add friends of ↵Spp
other faction', 'See all levels with who command' and 'Allows to add a gm to friend list'
2013-02-25Core/RBAC: Create new permissions related to character creationSpp
- 'Skips character creation team mask check' - 'Skips character creation class mask check' - 'Skips character creation race mask check' - 'Skips character creation reserved name check' - 'Skips character creation heroic min level check' - 'Creation of two side faction characters in same account' (Affected by global config option)
2013-02-25Core/RBAC: Create new permissions 'Allow channel chat between factions', ↵Spp
'Join channels without announce' (both need config option enabled and permission set) and 'Change channel settings without being channel moderator'
2013-02-25Core/RBAC: Create new permissions 'Skips needed requirements to use channel ↵Spp
check', 'Filter whispers', 'Allow say chat between factions'. Last one needs config option to be enabled and both sender and receiver to have the permission
2013-02-25Core/RBAC: Add new permissions 'Skip disable map check', 'Skip reset talents ↵Spp
when used more than allowed check', 'Skip spam chat check', 'Restore saved gm setting states', 'Use Config option START_GM_LEVEL to assign new character level'
2013-02-25Core/RBAC: Create new permissions 'Notify if a command was not found' and ↵Spp
'Enables lower security than target check'
2013-02-25Core/RBAC: Create new permission 'Two side mail interaction'. In order to ↵Spp
send/receive mails from other faction, config option should be enabled and both sender and receiver should have the permission
2013-02-25Core/RBAC: Create new permissions 'Allow to use CMSG_WORLD_TELEPORT opcode' ↵Spp
and 'Allow to use CMSG_WHOIS opcode'
2013-02-25Core/RBAC: Create new permission 'Skip over-speed ping check'Spp
2013-02-25Core/RBAC: Create new permission 'Receive global GM messages/texts'Spp
2013-02-25Core/RBAC: Create new permissions 'Use staff badge in chat' and 'Check if ↵Spp
should appear in .gm ingame command'
2013-02-25Corrections to recent sqlsSpp
2013-02-25Core/RBAC: Create new permissions 'Instant .save', 'Allow params with ↵Spp
.unstuck', 'Full HP after resurrect'
2013-02-25Core/RBAC: Create new permission 'Be assigned ticket'Spp
2013-02-25Core/RBAC: Create 'Skip instance required bosses check' permissionSpp
2013-02-25Core/RBAC: Add new Permission "Log gm trade". Config option still active, ↵Spp
but will affect only to users with that permission granted
2013-02-15TDB 335.51 - 2013/02/14TDB335.51Nay
Ref #8947 Closes #9077
2013-02-08Core/Auth: Reverted part of fb43a92cc2aaffab42efebf025b6a12c01af8fde - ↵Shauren
session key is still needed after logging in to be able to switch realms
2013-02-07Core/Accounts: sessionkey field in account table is only a temporary storage ↵Shauren
to pass data from authserver to worldserver and should only be used as such. Clearing sessionkey from database after a successful login to prevent possible exploits.
2013-02-05Core/SQL: Explicitly set the auth.account-table to use the INNODB-engine (to ↵click
allow foreign keys and transactions) If you have an OLD database (auth), and RBAC SQL-alterations, make SURE that it's InnoDB, otherwise run this (it can be run multiple times anyway) (The only change added is to alter the table to explicitly be an InnoDB-table)
2013-02-04Rename sql files of 760d62e934f8289cdd9950c04a4dbf588eddd742Gacko
2013-02-04Merge pull request #9099 from Bezo/mutenewAokromes
Add Mute reason and mute by to the db so you can get this info from the ...
2013-02-04Core/RBAC: Add SQL to remove bad data from account_access, otherwise other ↵Spp
sqls will fail due to use of FOREIGN KEYS - Also add missing files from previous commit
2013-02-04Core: Implement Role based Access ControlSpp
- This system will give more control of actions an account can perform. System defines: - Permissions to perform some action - Roles: a set of permissions that have some relation - Groups: a set of roles that have some relation Operations: - Grant: Assign and allow - Deny: Assign and do not allow - Revoke: Remove Precedence to know if something can be done: Grant, Deny. That means, if you are granted some action by a role but you have denied the permission, the action can not be done. Some Rules: - Groups can only have roles - Roles can only have permissions - An account can be assigned granted and denied roles. Permissions inherited from roles are granted if roles is granted and denied if roles is denied - An account can be assigned granted and denied permissions - An account can have multiple groups, roles and permissions - An account can not have same role granted and denied at same time - An acconnt can not have same permission granted and denied at same time - Id 0 can not be used to define a group, role or permission Added some permissions as a sample of use (Instant Logout, Skip Queue, Join BGs, Join DF) and some permissions as a workaround to commands till command system is modified to use RBAC
2013-01-31Remove \ No newline at end of fileBezo
2013-01-30Add Mute reason and mute by to the db so you can get this info from the db ↵Bezo
with the pinfo command when player get muted. old LOGIN_UPD_MUTE_TIME change to LOGIN_UPD_MUTE_TIME_LOGIN due the use of it when character login to world.
2013-01-27Core/Authserver: Added possibility to allow realm connections both from ↵Shauren
"world" and local networks.
2012-09-15TDB 335.49 - 2012/09/15TDB335.49Nay
2012-08-06Core/Logging: Implement logging to databaseSpp
2012-05-19TDB 335.11.47 - 2012/05/19TDB335.11.47Nay
2012-04-04SQL: Adjust rollup filename and change address length to 255 according to ↵leak
RFC 1035
2012-04-01DB/Auth: Increase realmlist.address size to 64 (varchar)Nay
You might want to verify if the previous size did not truncate your address (it was 15)
2012-03-28Core/DBLayer: Fix value list from recent changesleak
2012-03-28SQL: Proper prefixingleak
2012-03-28SQL: Auth db data type cleanup `logs`, `realmcharacters`, `realmlist`, ↵leak
`uptime` / Storage engine switched to InnoDB Note: As for the redundant `uptime`.`startstring` being removed, this page might be of interest how to generate time strings from unix timestamps http://dev.mysql.com/doc/refman/5.1/en/date-and-time-functions.html#function_from-unixtime
2012-03-28SQL: Auth db data type cleanup `account_access`, `account_banned`, ↵leak
`ip_banned` / Storage engine switched to InnoDB
2012-03-28SQL: Auth db data type cleanup `account` / Storage engine switched to InnoDBleak
2012-03-26Auth/Realmlist: Make use of RealmFlags and rename color to flag (core- and ↵kaelima
dbwise) Also fix connecting with realmflag & 4
2012-03-25Core/DBLayer: Restore pinfo ban info outputleak