""" ircs2s_common.py: Common base protocol class with functions shared by TS6 and P10-based protocols. """ import time import re from collections import defaultdict from pylinkirc.classes import IRCNetwork from pylinkirc.log import log from pylinkirc import utils class IRCCommonProtocol(IRCNetwork): def validate_server_conf(self): """Validates that the server block given contains the required keys.""" for k in self.conf_keys: assert k in self.serverdata, "Missing option %r in server block for network %s." % (k, self.name) port = self.serverdata['port'] assert type(port) == int and 0 < port < 65535, "Invalid port %r for network %s" % (port, self.name) @staticmethod def parseArgs(args): """ Parses a string or list of of RFC1459-style arguments, where ":" may be used for multi-word arguments that last until the end of a line. """ if isinstance(args, str): args = args.split(' ') real_args = [] for idx, arg in enumerate(args): if arg.startswith(':') and idx != 0: # ":" is used to begin multi-word arguments that last until the end of the message. # Use list splicing here to join them into one argument, and then add it to our list of args. joined_arg = ' '.join(args[idx:])[1:] # Cut off the leading : as well real_args.append(joined_arg) break real_args.append(arg) return real_args @classmethod def parsePrefixedArgs(cls, args): """Similar to parseArgs(), but stripping leading colons from the first argument of a line (usually the sender field).""" args = cls.parseArgs(args) args[0] = args[0].split(':', 1)[1] return args def _squit(self, numeric, command, args): """Handles incoming SQUITs.""" split_server = self._get_SID(args[0]) # Normally we'd only need to check for our SID as the SQUIT target, but Nefarious # actually uses the uplink server as the SQUIT target. # <- ABAAE SQ nefarious.midnight.vpn 0 :test if split_server in (self.sid, self.uplink): raise ProtocolError('SQUIT received: (reason: %s)' % args[-1]) affected_users = [] affected_nicks = defaultdict(list) log.debug('(%s) Splitting server %s (reason: %s)', self.name, split_server, args[-1]) if split_server not in self.servers: log.warning("(%s) Tried to split a server (%s) that didn't exist!", self.name, split_server) return # Prevent RuntimeError: dictionary changed size during iteration old_servers = self.servers.copy() old_channels = self.channels.copy() # Cycle through our list of servers. If any server's uplink is the one that is being SQUIT, # remove them and all their users too. for sid, data in old_servers.items(): if data.uplink == split_server: log.debug('Server %s also hosts server %s, removing those users too...', split_server, sid) # Recursively run SQUIT on any other hubs this server may have been connected to. args = self._squit(sid, 'SQUIT', [sid, "0", "PyLink: Automatically splitting leaf servers of %s" % sid]) affected_users += args['users'] for user in self.servers[split_server].users.copy(): affected_users.append(user) nick = self.users[user].nick # Nicks affected is channel specific for SQUIT:. This makes Clientbot's SQUIT relaying # much easier to implement. for name, cdata in old_channels.items(): if user in cdata.users: affected_nicks[name].append(nick) log.debug('Removing client %s (%s)', user, nick) self.removeClient(user) serverdata = self.servers[split_server] sname = serverdata.name uplink = serverdata.uplink del self.servers[split_server] log.debug('(%s) Netsplit affected users: %s', self.name, affected_users) return {'target': split_server, 'users': affected_users, 'name': sname, 'uplink': uplink, 'nicks': affected_nicks, 'serverdata': serverdata, 'channeldata': old_channels} @staticmethod def parseCapabilities(args, fallback=''): """ Parses a string of capabilities in the 005 / RPL_ISUPPORT format. """ if type(args) == str: args = args.split(' ') caps = {} for cap in args: try: # Try to split it as a KEY=VALUE pair. key, value = cap.split('=', 1) except ValueError: key = cap value = fallback caps[key] = value return caps @staticmethod def parsePrefixes(args): """ Separates prefixes field like "(qaohv)~&@%+" into a dict mapping mode characters to mode prefixes. """ prefixsearch = re.search(r'\(([A-Za-z]+)\)(.*)', args) return dict(zip(prefixsearch.group(1), prefixsearch.group(2))) def handle_error(self, numeric, command, args): """Handles ERROR messages - these mean that our uplink has disconnected us!""" raise ProtocolError('Received an ERROR, disconnecting!') class IRCS2SProtocol(IRCCommonProtocol): COMMAND_TOKENS = {} def __init__(self, *args, **kwargs): super().__init__(*args, **kwargs) self.protocol_caps = {'can-spawn-clients', 'has-ts', 'can-host-relay', 'can-track-servers'} def handle_events(self, data): """Event handler for RFC1459-like protocols. This passes most commands to the various handle_ABCD() functions elsewhere defined protocol modules, coersing various sender prefixes from nicks and server names to UIDs and SIDs respectively, whenever possible. Commands sent without an explicit sender prefix will have them set to the SID of the uplink server. """ data = data.split(" ") args = self.parseArgs(data) sender = args[0] sender = sender.lstrip(':') # If the sender isn't in numeric format, try to convert it automatically. sender_sid = self._get_SID(sender) sender_uid = self._get_UID(sender) if sender_sid in self.servers: # Sender is a server (converting from name to SID gave a valid result). sender = sender_sid elif sender_uid in self.users: # Sender is a user (converting from name to UID gave a valid result). sender = sender_uid else: # No sender prefix; treat as coming from uplink IRCd. sender = self.uplink args.insert(0, sender) if self.isInternalClient(sender) or self.isInternalServer(sender): log.warning("(%s) Received command %s being routed the wrong way!", self.name, command) return raw_command = args[1].upper() args = args[2:] log.debug('(%s) Found message sender as %s', self.name, sender) # For P10, convert the command token into a regular command, if present. command = self.COMMAND_TOKENS.get(raw_command, raw_command) if command != raw_command: log.debug('(%s) Translating token %s to command %s', self.name, raw_command, command) if command == 'ENCAP': # Special case for TS6 encapsulated commands (ENCAP), in forms like this: # <- :00A ENCAP * SU 42XAAAAAC :GLolol command = args[1] args = args[2:] log.debug("(%s) Rewriting incoming ENCAP to command %s (args: %s)", self.name, command, args) try: func = getattr(self, 'handle_'+command.lower()) except AttributeError: # Unhandled command pass else: parsed_args = func(sender, command, args) if parsed_args is not None: return [sender, command, parsed_args] def handle_privmsg(self, source, command, args): """Handles incoming PRIVMSG/NOTICE.""" # TS6: # <- :70MAAAAAA PRIVMSG #dev :afasfsa # <- :70MAAAAAA NOTICE 0ALAAAAAA :afasfsa # P10: # <- ABAAA P AyAAA :privmsg text # <- ABAAA O AyAAA :notice text target = self._get_UID(args[0]) # Coerse =#channel from Charybdis op moderated +z to @#channel. if target.startswith('='): target = '@' + target[1:] # We use lowercase channels internally, but uppercase UIDs. # Strip the target of leading prefix modes (for targets like @#channel) # before checking whether it's actually a channel. split_channel = target.split('#', 1) if len(split_channel) >= 2 and utils.isChannel('#' + split_channel[1]): # Note: don't mess with the case of the channel prefix, or ~#channel # messages will break on RFC1459 casemapping networks (it becomes ^#channel # instead). target = '#'.join((split_channel[0], self.toLower(split_channel[1]))) log.debug('(%s) Normalizing channel target %s to %s', self.name, args[0], target) return {'target': target, 'text': args[1]} handle_notice = handle_privmsg def check_nick_collision(self, nick): """ Nick collision checker. """ uid = self.nickToUid(nick) # If there is a nick collision, we simply alert plugins. Relay will purposely try to # lose fights and tag nicks instead, while other plugins can choose how to handle this. if uid: log.info('(%s) Nick collision on %s/%s, forwarding this to plugins', self.name, uid, nick) self.callHooks([self.sid, 'SAVE', {'target': uid}]) def handle_kill(self, source, command, args): """Handles incoming KILLs.""" killed = args[0] # Depending on whether the IRCd sends explicit QUIT messages for # killed clients, the user may or may not have automatically been # removed from our user list. # If not, we have to assume that KILL = QUIT and remove them # ourselves. data = self.users.get(killed) if data: self.removeClient(killed) # TS6-style kills look something like this: # <- :GL KILL 38QAAAAAA :hidden-1C620195!GL (test) # What we actually want is to format a pretty kill message, in the form # "Killed (killername (reason))". try: # Get the nick or server name of the caller. killer = self.getFriendlyName(source) except KeyError: # Killer was... neither? We must have aliens or something. Fallback # to the given "UID". killer = source # Get the reason, which is enclosed in brackets. reason = ' '.join(args[1].split(" ")[1:]) killmsg = "Killed (%s %s)" % (killer, reason) return {'target': killed, 'text': killmsg, 'userdata': data} def handle_squit(self, numeric, command, args): """Handles incoming SQUITs.""" return self._squit(numeric, command, args) def handle_away(self, numeric, command, args): """Handles incoming AWAY messages.""" # TS6: # <- :6ELAAAAAB AWAY :Auto-away # P10: # <- ABAAA A :blah # <- ABAAA A try: self.users[numeric].away = text = args[0] except IndexError: # User is unsetting away status self.users[numeric].away = text = '' return {'text': text} def handle_version(self, numeric, command, args): """Handles requests for the PyLink server version.""" return {} # See coremods/handlers.py for how this hook is used def handle_whois(self, numeric, command, args): """Handles incoming WHOIS commands..""" # TS6: # <- :42XAAAAAB WHOIS 5PYAAAAAA :pylink-devel # P10: # <- ABAAA W Ay :PyLink-devel # First argument is the server that should reply to the WHOIS request # or the server hosting the UID given. We can safely assume that any # WHOIS commands received are for us, since we don't host any real servers # to route it to. return {'target': self._get_UID(args[-1])} def handle_quit(self, numeric, command, args): """Handles incoming QUIT commands.""" # TS6: # <- :1SRAAGB4T QUIT :Quit: quit message goes here # P10: # <- ABAAB Q :Killed (GL_ (bangbang)) self.removeClient(numeric) return {'text': args[0]} def handle_time(self, numeric, command, args): """Handles incoming /TIME requests.""" return {'target': args[0]} def handle_pong(self, source, command, args): """Handles incoming PONG commands.""" if source == self.uplink: self.lastping = time.time()