2016-10-01 08:33:27 +02:00
|
|
|
import time
|
|
|
|
|
2017-03-05 09:06:19 +01:00
|
|
|
from pylinkirc import utils, conf
|
2016-10-01 08:33:27 +02:00
|
|
|
from pylinkirc.log import log
|
|
|
|
from pylinkirc.classes import *
|
|
|
|
from pylinkirc.protocols.ts6 import *
|
|
|
|
|
|
|
|
class RatboxProtocol(TS6Protocol):
|
|
|
|
|
2017-06-25 10:12:22 +02:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
super().__init__(*args, **kwargs)
|
2016-10-01 08:33:27 +02:00
|
|
|
# Don't require EUID for Ratbox
|
|
|
|
self.required_caps.discard('EUID')
|
|
|
|
|
2016-10-01 21:39:25 +02:00
|
|
|
self.hook_map['LOGIN'] = 'CLIENT_SERVICES_LOGIN'
|
2017-03-24 08:24:06 +01:00
|
|
|
self.protocol_caps -= {'slash-in-hosts'}
|
2016-10-01 21:39:25 +02:00
|
|
|
|
2017-06-25 10:12:22 +02:00
|
|
|
def post_connect(self):
|
2016-10-01 08:33:27 +02:00
|
|
|
"""Initializes a connection to a server."""
|
|
|
|
|
2016-10-01 22:00:04 +02:00
|
|
|
# Note: +r, +e, and +I support will be negotiated on link
|
2017-06-25 11:03:12 +02:00
|
|
|
self.cmodes = {'op': 'o', 'secret': 's', 'private': 'p', 'noextmsg': 'n', 'moderated': 'm',
|
2016-10-01 22:00:04 +02:00
|
|
|
'inviteonly': 'i', 'topiclock': 't', 'limit': 'l', 'ban': 'b', 'voice': 'v',
|
|
|
|
'key': 'k', 'sslonly': 'S',
|
|
|
|
'*A': 'beI',
|
|
|
|
'*B': 'k',
|
|
|
|
'*C': 'l',
|
2017-03-25 21:45:02 +01:00
|
|
|
'*D': 'imnpstrS'}
|
2016-10-01 08:33:27 +02:00
|
|
|
|
2017-06-25 11:03:12 +02:00
|
|
|
self.umodes = {
|
2016-10-01 22:40:10 +02:00
|
|
|
'invisible': 'i', 'callerid': 'g', 'oper': 'o', 'admin': 'a', 'sno_botfloods': 'b',
|
2016-10-01 08:33:27 +02:00
|
|
|
'sno_clientconnections': 'c', 'sno_extclientconnections': 'C', 'sno_debug': 'd',
|
2016-10-01 22:40:10 +02:00
|
|
|
'sno_fullauthblock': 'f', 'sno_skill': 'k', 'locops': 'l',
|
2016-10-01 08:33:27 +02:00
|
|
|
'sno_rejectedclients': 'r', 'snomask': 's', 'sno_badclientconnections': 'u',
|
2016-10-01 22:41:11 +02:00
|
|
|
'wallops': 'w', 'sno_serverconnects': 'x', 'sno_stats': 'y',
|
2016-10-01 22:40:10 +02:00
|
|
|
'operwall': 'z', 'sno_operspy': 'Z', 'deaf': 'D', 'servprotect': 'S',
|
2016-10-01 08:33:27 +02:00
|
|
|
# Now, map all the ABCD type modes:
|
|
|
|
'*A': '', '*B': '', '*C': '', '*D': 'igoabcCdfklrsuwxyzZD'
|
|
|
|
}
|
|
|
|
|
|
|
|
def spawnClient(self, nick, ident='null', host='null', realhost=None, modes=set(),
|
|
|
|
server=None, ip='0.0.0.0', realname=None, ts=None, opertype=None,
|
|
|
|
manipulatable=False):
|
|
|
|
"""
|
|
|
|
Spawns a new client with the given options.
|
|
|
|
|
|
|
|
Note: No nick collision / valid nickname checks are done here; it is
|
|
|
|
up to plugins to make sure they don't introduce anything invalid.
|
|
|
|
"""
|
|
|
|
|
|
|
|
# parameters: nickname, hopcount, nickTS, umodes, username, visible hostname, IP address,
|
|
|
|
# UID, gecos
|
|
|
|
|
2017-06-25 11:03:12 +02:00
|
|
|
server = server or self.sid
|
|
|
|
if not self.isInternalServer(server):
|
2016-10-01 08:33:27 +02:00
|
|
|
raise ValueError('Server %r is not a PyLink server!' % server)
|
|
|
|
|
|
|
|
uid = self.uidgen[server].next_uid()
|
|
|
|
|
|
|
|
ts = ts or int(time.time())
|
2017-03-05 09:06:19 +01:00
|
|
|
realname = realname or conf.conf['bot']['realname']
|
2017-06-25 11:03:12 +02:00
|
|
|
raw_modes = self.joinModes(modes)
|
2016-10-01 08:45:30 +02:00
|
|
|
|
|
|
|
orig_realhost = realhost
|
|
|
|
realhost = realhost or host
|
|
|
|
|
2017-06-25 11:03:12 +02:00
|
|
|
u = self.users[uid] = IrcUser(nick, ts, uid, server, ident=ident, host=host, realname=realname,
|
2016-10-01 08:33:27 +02:00
|
|
|
realhost=realhost, ip=ip, manipulatable=manipulatable)
|
2017-06-25 11:03:12 +02:00
|
|
|
self.applyModes(uid, modes)
|
|
|
|
self.servers[server].users.add(uid)
|
2016-10-01 08:33:27 +02:00
|
|
|
self._send(server, "UID {nick} 1 {ts} {modes} {ident} {host} {ip} {uid} "
|
|
|
|
":{realname}".format(ts=ts, host=host,
|
|
|
|
nick=nick, ident=ident, uid=uid,
|
|
|
|
modes=raw_modes, ip=ip, realname=realname))
|
2016-10-01 08:45:30 +02:00
|
|
|
|
|
|
|
if orig_realhost:
|
|
|
|
# If real host is specified, send it using ENCAP REALHOST
|
2016-10-01 09:40:20 +02:00
|
|
|
self._send(uid, "ENCAP * REALHOST %s" % orig_realhost)
|
2016-10-01 08:45:30 +02:00
|
|
|
|
2016-10-01 08:33:27 +02:00
|
|
|
return u
|
|
|
|
|
2016-10-01 09:19:52 +02:00
|
|
|
def updateClient(self, target, field, text):
|
|
|
|
"""updateClient() stub for ratbox."""
|
2017-03-26 23:32:41 +02:00
|
|
|
raise NotImplementedError("User data changing is not supported on ircd-ratbox.")
|
2016-10-01 09:19:52 +02:00
|
|
|
|
2016-10-01 08:45:30 +02:00
|
|
|
def handle_realhost(self, uid, command, args):
|
|
|
|
"""Handles real host propagation."""
|
|
|
|
log.debug('(%s) Got REALHOST %s for %s', args[0], uid)
|
2017-06-25 11:03:12 +02:00
|
|
|
self.users[uid].realhost = args[0]
|
2016-10-01 08:45:30 +02:00
|
|
|
|
2016-10-01 21:39:25 +02:00
|
|
|
def handle_login(self, uid, command, args):
|
|
|
|
"""Handles login propagation on burst."""
|
2017-06-25 11:03:12 +02:00
|
|
|
self.users[uid].services_account = args[0]
|
2016-10-01 21:39:25 +02:00
|
|
|
return {'text': args[0]}
|
|
|
|
|
2016-10-01 08:33:27 +02:00
|
|
|
Class = RatboxProtocol
|