3
0
mirror of https://github.com/jlu5/PyLink.git synced 2024-11-01 01:09:22 +01:00

exec: add 'inject' and raw' commands (Closes #148)

This commit is contained in:
James Lu 2015-12-22 10:47:02 -08:00
parent fbf33e15a6
commit 4e7396b1ac

View File

@ -1,4 +1,7 @@
# exec.py: Provides an 'exec' command to execute raw code """
exec.py: Provides commands for executing raw code and debugging PyLink.
"""
import sys import sys
import os import os
sys.path.append(os.path.dirname(os.path.dirname(os.path.abspath(__file__)))) sys.path.append(os.path.dirname(os.path.dirname(os.path.abspath(__file__))))
@ -34,10 +37,49 @@ def _eval(irc, source, args):
Admin-only. Evaluates the given Python expression and returns the result. Admin-only. Evaluates the given Python expression and returns the result.
\x02**WARNING: THIS CAN BE DANGEROUS IF USED IMPROPERLY!**\x02""" \x02**WARNING: THIS CAN BE DANGEROUS IF USED IMPROPERLY!**\x02"""
utils.checkAuthenticated(irc, source, allowOper=False) utils.checkAuthenticated(irc, source, allowOper=False)
args = ' '.join(args) args = ' '.join(args)
if not args.strip(): if not args.strip():
irc.reply('No code entered!') irc.reply('No code entered!')
return return
log.info('(%s) Evaluating %r for %s', irc.name, args, utils.getHostmask(irc, source))
log.info('(%s) Evaluating %r for %s', irc.name, args,
utils.getHostmask(irc, source))
irc.reply(eval(args)) irc.reply(eval(args))
utils.add_cmd(_eval, 'eval') utils.add_cmd(_eval, 'eval')
@utils.add_cmd
def raw(irc, source, args):
"""<text>
Admin-only. Sends raw text to the uplink IRC server.
\x02**WARNING: THIS CAN BREAK YOUR NETWORK IF USED IMPROPERLY!**\x02"""
utils.checkAuthenticated(irc, source, allowOper=False)
args = ' '.join(args)
if not args.strip():
irc.reply('No text entered!')
return
log.info('(%s) Sending raw text %r to IRC for %s', irc.name, args,
utils.getHostmask(irc, source))
irc.send(args)
irc.reply("Done.")
@utils.add_cmd
def inject(irc, source, args):
"""<text>
Admin-only. Injects raw text into the running PyLink protocol module, replying with the hook data returned.
\x02**WARNING: THIS CAN BREAK YOUR NETWORK IF USED IMPROPERLY!**\x02"""
utils.checkAuthenticated(irc, source, allowOper=False)
args = ' '.join(args)
if not args.strip():
irc.reply('No text entered!')
return
log.info('(%s) Injecting raw text %r into protocol module for %s', irc.name,
args, utils.getHostmask(irc, source))
irc.reply(irc.runline(args))