""" clientbot.py: Clientbot (regular IRC bot) protocol module for PyLink. """ # Here be dragons. There are lots of hacks and stubs in this module to recreate the same sort of state # that a regular server would have (e.g. spawning virtual users for things like Relay). Somehow it # works on most networks though! import time import threading import base64 from pylinkirc import utils, conf from pylinkirc.log import log from pylinkirc.protocols.ircs2s_common import * from pylinkirc.classes import * FALLBACK_REALNAME = 'PyLink Relay Mirror Client' # IRCv3 capabilities to request when available IRCV3_CAPABILITIES = {'multi-prefix', 'sasl', 'away-notify', 'userhost-in-names', 'chghost', 'account-notify', 'account-tag', 'extended-join'} class ClientbotWrapperProtocol(IRCCommonProtocol): def __init__(self, *args, **kwargs): super().__init__(*args, **kwargs) self.protocol_caps = {'visible-state-only', 'slash-in-nicks', 'slash-in-hosts', 'underscore-in-hosts'} self.has_eob = False # Remove conf key checks for those not needed for Clientbot. self.conf_keys -= {'recvpass', 'sendpass', 'sid', 'sidrange', 'hostname'} # This is just a fallback. Actual casemapping is fetched by handle_005() self.casemapping = 'ascii' self._caps = {} self.ircv3_caps = set() self.ircv3_caps_available = {} # Tracks the users sent in a list of /who replies, so that users can be bursted all at once # when ENDOFWHO is received. self.who_received = set() # This stores channel->Timer object mappings for users that we're waiting for a kick # acknowledgement for. The timer is set to send a NAMES request to the uplink to prevent # things like failed KICK attempts from desyncing plugins like relay. self.kick_queue = {} # Aliases: 463 (ERR_NOPERMFORHOST), 464 (ERR_PASSWDMISMATCH), and 465 (ERR_YOUREBANNEDCREEP) # are essentially all fatal errors for connections. self.handle_463 = self.handle_464 = self.handle_465 = self.handle_error self._use_builtin_005_handling = True self._nick_fails = 0 self.hook_map = {'ACCOUNT': 'CLIENT_SERVICES_LOGIN'} def post_connect(self): """Initializes a connection to a server.""" # (Re)initialize counter-based pseudo UID generators super().post_connect() self.uidgen = PUIDGenerator('PUID') self.sidgen = PUIDGenerator('ClientbotInternalSID') self.has_eob = False ts = self.start_ts f = lambda text: self.send(text, queue=False) # Enumerate our own server self.sid = self.sidgen.next_sid() # Clear states from last connect self.who_received.clear() self.kick_queue.clear() self._caps.clear() self.ircv3_caps.clear() self.ircv3_caps_available.clear() sendpass = self.serverdata.get("sendpass") if sendpass: f('PASS %s' % sendpass) f('CAP LS 302') # Start a timer to call CAP END if registration freezes (e.g. if AUTHENTICATE for SASL is # never replied to). def _do_cap_end_wrapper(): log.info('(%s) Skipping SASL due to timeout; are the IRCd and services configured ' 'properly?', self.name) self._do_cap_end() self._cap_timer = threading.Timer(self.serverdata.get('sasl_timeout') or 15, _do_cap_end_wrapper) self._cap_timer.start() # Log in to IRC and set our irc.pseudoclient object. sbot = world.services['pylink'] self._nick_fails = 0 nick = sbot.get_nick(self) ident = sbot.get_ident(self) realname = sbot.get_realname(self) f('NICK %s' % nick) f('USER %s 8 * :%s' % (ident, realname)) self.pseudoclient = User(self, nick, int(time.time()), self.uidgen.next_uid(prefix='@ClientbotInternal'), self.sid, ident=ident, realname=realname, host=self.hostname()) self.users[self.pseudoclient.uid] = self.pseudoclient # Note: clientbot clients are initialized with umode +i by default def spawn_client(self, nick, ident='unknown', host='unknown.host', realhost=None, modes={('i', None)}, server=None, ip='0.0.0.0', realname='', ts=None, opertype=None, manipulatable=False): """ STUB: Pretends to spawn a new client with a subset of the given options. """ server = server or self.sid uid = self.uidgen.next_uid(prefix=nick) ts = ts or int(time.time()) log.debug('(%s) spawn_client stub called, saving nick %s as PUID %s', self.name, nick, uid) u = self.users[uid] = User(self, nick, ts, uid, server, ident=ident, host=host, realname=realname, manipulatable=manipulatable, realhost=realhost, ip=ip) self.servers[server].users.add(uid) self.apply_modes(uid, modes) return u def spawn_server(self, name, sid=None, uplink=None, desc=None, internal=True): """ STUB: Pretends to spawn a new server with a subset of the given options. """ if internal: # Use a custom pseudo-SID format for internal servers to prevent any server name clashes sid = self.sidgen.next_sid(prefix=name) else: # For others servers, just use the server name as the SID. sid = name self.servers[sid] = Server(self, uplink, name, internal=internal) return sid def away(self, source, text): """STUB: sets away messages for clients internally.""" log.debug('(%s) away: target is %s, internal client? %s', self.name, source, self.is_internal_client(source)) if self.users[source].away != text: if not self.is_internal_client(source): log.debug('(%s) away: sending AWAY hook from %s with text %r', self.name, source, text) self.call_hooks([source, 'AWAY', {'text': text}]) self.users[source].away = text def invite(self, client, target, channel): """Invites a user to a channel.""" self.send('INVITE %s %s' % (self.get_friendly_name(target), channel)) def join(self, client, channel): """STUB: Joins a user to a channel.""" # Only joins for the main PyLink client are actually forwarded. Others are ignored. # Note: we do not automatically add our main client to the channel state, as we # rely on the /NAMES reply to sync it up properly. if self.pseudoclient and client == self.pseudoclient.uid: self.send('JOIN %s' % channel) else: self._channels[channel].users.add(client) self.users[client].channels.add(channel) log.debug('(%s) join: faking JOIN of client %s/%s to %s', self.name, client, self.get_friendly_name(client), channel) self.call_hooks([client, 'CLIENTBOT_JOIN', {'channel': channel}]) def kick(self, source, channel, target, reason=''): """Sends channel kicks.""" log.debug('(%s) kick: checking if target %s (nick: %s) is an internal client? %s', self.name, target, self.get_friendly_name(target), self.is_internal_client(target)) if self.is_internal_client(target): # Target was one of our virtual clients. Just remove them from the state. self.handle_part(target, 'KICK', [channel, reason]) # Send a KICK hook for message formatting. self.call_hooks([source, 'CLIENTBOT_KICK', {'channel': channel, 'target': target, 'text': reason}]) return self.send('KICK %s %s :<%s> %s' % (channel, self._expandPUID(target), self.get_friendly_name(source), reason)) # Don't update our state here: wait for the IRCd to send an acknowledgement instead. # There is essentially a 3 second wait to do this, as we send NAMES with a delay # to resync any users lost due to kicks being blocked, etc. if (channel not in self.kick_queue) or (not self.kick_queue[channel][1].is_alive()): # However, only do this if there isn't a NAMES request scheduled already. t = threading.Timer(3, lambda: self.send('NAMES %s' % channel)) log.debug('(%s) kick: setting NAMES timer for %s on %s', self.name, target, channel) # Store the channel, target UID, and timer object in the internal kick queue. self.kick_queue[channel] = ({target}, t) t.start() else: log.debug('(%s) kick: adding %s to kick queue for channel %s', self.name, target, channel) self.kick_queue[channel][0].add(target) def message(self, source, target, text, notice=False): """Sends messages to the target.""" command = 'NOTICE' if notice else 'PRIVMSG' if self.pseudoclient and self.pseudoclient.uid == source: self.send('%s %s :%s' % (command, self._expandPUID(target), text)) else: self.call_hooks([source, 'CLIENTBOT_MESSAGE', {'target': target, 'is_notice': notice, 'text': text}]) def mode(self, source, channel, modes, ts=None): """Sends channel MODE changes.""" if self.is_channel(channel): extmodes = [] # Re-parse all channel modes locally to eliminate anything invalid, such as unbanning # things that were never banned. This prevents the bot from getting caught in a loop # with IRCd MODE acknowledgements. # FIXME: More related safety checks should be added for this. log.debug('(%s) mode: re-parsing modes %s', self.name, modes) joined_modes = self.join_modes(modes) for modepair in self.parse_modes(channel, joined_modes): log.debug('(%s) mode: checking if %s a prefix mode: %s', self.name, modepair, self.prefixmodes) if modepair[0][-1] in self.prefixmodes: if self.is_internal_client(modepair[1]): # Ignore prefix modes for virtual internal clients. log.debug('(%s) mode: skipping virtual client prefixmode change %s', self.name, modepair) continue else: # For other clients, change the mode argument to nick instead of PUID. nick = self.get_friendly_name(modepair[1]) log.debug('(%s) mode: coersing mode %s argument to %s', self.name, modepair, nick) modepair = (modepair[0], nick) extmodes.append(modepair) log.debug('(%s) mode: filtered modes for %s: %s', self.name, channel, extmodes) if extmodes: bufsize = self.S2S_BUFSIZE - len(':%s MODE %s ' % (self.get_hostmask(self.pseudoclient.uid), channel)) for msg in self.wrap_modes(extmodes, bufsize, max_modes_per_msg=int(self._caps.get('MODES', 0))): self.send('MODE %s %s' % (channel, msg)) # Don't update the state here: the IRCd sill respond with a MODE reply if successful. def nick(self, source, newnick): """STUB: Sends NICK changes.""" if self.pseudoclient and source == self.pseudoclient.uid: self.send('NICK :%s' % newnick) # No state update here: the IRCd will respond with a NICK acknowledgement if the change succeeds. else: assert source, "No source given?" # Check that the new nick exists and isn't the same client as the sender # (for changing nick case) nick_uid = self.nick_to_uid(newnick) if nick_uid and nick_uid != source: log.warning('(%s) Blocking attempt from virtual client %s to change nick to %s (nick in use)', self.name, source, newnick) return self.call_hooks([source, 'CLIENTBOT_NICK', {'newnick': newnick}]) self.users[source].nick = newnick def notice(self, source, target, text): """Sends notices to the target.""" # Wrap around message(), which does all the text formatting for us. self.message(source, target, text, notice=True) def _ping_uplink(self): """ Sends a PING to the uplink. """ if self.uplink: self.send('PING %s' % self.get_friendly_name(self.uplink)) # Poll WHO periodically to figure out any ident/host/away status changes. for channel in self.pseudoclient.channels: self._send_who(channel) def part(self, source, channel, reason=''): """STUB: Parts a user from a channel.""" self._channels[channel].remove_user(source) self.users[source].channels.discard(channel) # Only parts for the main PyLink client are actually forwarded. Others are ignored. if self.pseudoclient and source == self.pseudoclient.uid: self.send('PART %s :%s' % (channel, reason)) else: self.call_hooks([source, 'CLIENTBOT_PART', {'channel': channel, 'text': reason}]) def quit(self, source, reason): """STUB: Quits a client.""" userdata = self.users[source] self._remove_client(source) self.call_hooks([source, 'CLIENTBOT_QUIT', {'text': reason, 'userdata': userdata}]) def sjoin(self, server, channel, users, ts=None, modes=set()): """STUB: bursts joins from a server.""" # This stub only updates the state internally with the users # given. modes and TS are currently ignored. puids = {u[-1] for u in users} for user in puids: if self.pseudoclient and self.pseudoclient.uid == user: # If the SJOIN affects our main client, forward it as a regular JOIN. self.join(user, channel) else: # Otherwise, track the state for our virtual clients. self.users[user].channels.add(channel) self._channels[channel].users |= puids nicks = {self.get_friendly_name(u) for u in puids} self.call_hooks([server, 'CLIENTBOT_SJOIN', {'channel': channel, 'nicks': nicks}]) def squit(self, source, target, text): """STUB: SQUITs a server.""" # What this actually does is just handle the SQUIT internally: i.e. # Removing pseudoclients and pseudoservers. squit_data = self._squit(source, 'CLIENTBOT_VIRTUAL_SQUIT', [target, text]) if squit_data and squit_data.get('nicks'): self.call_hooks([source, 'CLIENTBOT_SQUIT', squit_data]) def _stub(self, *args): """Stub outgoing command function (does nothing).""" return kill = topic = topic_burst = knock = numeric = _stub def update_client(self, target, field, text): """Updates the known ident, host, or realname of a client.""" if target not in self.users: log.warning("(%s) Unknown target %s for update_client()", self.name, target) return u = self.users[target] if field == 'IDENT' and u.ident != text: u.ident = text if not self.is_internal_client(target): # We're updating the host of an external client in our state, so send the appropriate # hook payloads. self.call_hooks([self.sid, 'CHGIDENT', {'target': target, 'newident': text}]) elif field == 'HOST' and u.host != text: u.host = text if not self.is_internal_client(target): self.call_hooks([self.sid, 'CHGHOST', {'target': target, 'newhost': text}]) elif field in ('REALNAME', 'GECOS') and u.realname != text: u.realname = text if not self.is_internal_client(target): self.call_hooks([self.sid, 'CHGNAME', {'target': target, 'newgecos': text}]) else: return # Nothing changed def _get_UID(self, nick, ident=None, host=None): """ Fetches the UID for the given nick, creating one if it does not already exist. Limited (internal) nick collision checking is done here to prevent Clientbot users from being confused with virtual clients, and vice versa.""" self._check_puid_collision(nick) idsource = self.nick_to_uid(nick) if self.is_internal_client(idsource) and self.pseudoclient and idsource != self.pseudoclient.uid: # We got a message from a client with the same nick as an internal client. # Fire a virtual nick collision to prevent mixing senders. log.debug('(%s) Nick-colliding virtual client %s/%s', self.name, idsource, nick) self.call_hooks([self.sid, 'SAVE', {'target': idsource}]) # Clear the UID for this nick and spawn a new client for the nick that was just freed. idsource = None if idsource is None: # If this sender doesn't already exist, spawn a new client. idsource = self.spawn_client(nick, ident or 'unknown', host or 'unknown', server=self.uplink, realname=FALLBACK_REALNAME).uid return idsource def parse_message_tags(self, data): """ Parses a message with IRC v3.2 message tags, as described at http://ircv3.net/specs/core/message-tags-3.2.html """ # Example query: # @aaa=bbb;ccc;example.com/ddd=eee :nick!ident@host.com PRIVMSG me :Hello if data[0].startswith('@'): tagdata = data[0].lstrip('@').split(';') for idx, tag in enumerate(tagdata): tag = tag.replace(r'\s', ' ') tag = tag.replace(r'\\', '\\') tag = tag.replace(r'\r', '\r') tag = tag.replace(r'\n', '\n') tag = tag.replace(r'\:', ';') tagdata[idx] = tag results = self.parse_isupport(tagdata, fallback=None) log.debug('(%s) parsed message tags %s', self.name, results) return results return {} def _set_account_name(self, uid, account): """ Updates the user's account metadata. """ if account is None: # Ignore when account=None return elif account in ('*', '0'): # No account account = '' if account != self.users[uid].services_account: self.call_hooks([uid, 'CLIENT_SERVICES_LOGIN', {'text': account}]) def handle_events(self, data): """Event handler for the RFC1459/2812 (clientbot) protocol.""" data = data.split(" ") tags = self.parse_message_tags(data) if tags: # If we have tags, split off the first argument. data = data[1:] try: args = self.parse_prefixed_args(data) sender = args[0] command = args[1] args = args[2:] except IndexError: # Raw command without an explicit sender; assume it's being sent by our uplink. args = self.parse_args(data) idsource = sender = self.uplink command = args[0] args = args[1:] else: # PyLink as a services framework expects UIDs and SIDs for everything. Since we connect # as a bot here, there's no explicit user introduction, so we're going to generate # pseudo-uids and pseudo-sids as we see prefixes. if ('!' not in sender) and '.' in sender: # Sender is a server name. XXX: make this check more foolproof assert '@' not in sender, "Incoming server name %r clashes with a PUID!" % sender if sender not in self.servers: self.spawn_server(sender, internal=False) idsource = sender else: # Sender is a either a nick or a nick!user@host prefix. Split it into its relevant parts. try: nick, ident, host = utils.splitHostmask(sender) except ValueError: ident = host = None # Set ident and host as null for now. nick = sender # Treat the sender prefix we received as a nick. idsource = self._get_UID(nick, ident, host) if idsource in self.users: # Handle IRCv3.2 account-tag. self._set_account_name(idsource, tags.get('account')) try: func = getattr(self, 'handle_'+command.lower()) except AttributeError: # unhandled command pass else: parsed_args = func(idsource, command, args) if parsed_args is not None: parsed_args['tags'] = tags # Add message tags to this dict. return [idsource, command, parsed_args] def _do_cap_end(self): """ Abort SASL login by sending CAP END. """ self.send('CAP END') log.debug("(%s) Stopping CAP END timer.", self.name) self._cap_timer.cancel() def _try_sasl_auth(self): """ Starts an authentication attempt via SASL. This returns True if SASL is enabled and correctly configured, and False otherwise. """ if 'sasl' not in self.ircv3_caps: log.info("(%s) Skipping SASL auth since the IRCd doesn't support it.", self.name) return sasl_mech = self.serverdata.get('sasl_mechanism') if sasl_mech: sasl_mech = sasl_mech.upper() sasl_user = self.serverdata.get('sasl_username') sasl_pass = self.serverdata.get('sasl_password') ssl_cert = self.serverdata.get('ssl_certfile') ssl_key = self.serverdata.get('ssl_keyfile') ssl = self.serverdata.get('ssl') if sasl_mech == 'PLAIN': if not (sasl_user and sasl_pass): log.warning("(%s) Not attempting PLAIN authentication; sasl_username and/or " "sasl_password aren't correctly set.", self.name) return False elif sasl_mech == 'EXTERNAL': if not ssl: log.warning("(%s) Not attempting EXTERNAL authentication; SASL external requires " "SSL, but it isn't enabled.", self.name) return False elif not (ssl_cert and ssl_key): log.warning("(%s) Not attempting EXTERNAL authentication; ssl_certfile and/or " "ssl_keyfile aren't correctly set.", self.name) return False else: log.warning('(%s) Unsupported SASL mechanism %s; aborting SASL.', self.name, sasl_mech) return False self.send('AUTHENTICATE %s' % sasl_mech, queue=False) return True return False def _send_auth_chunk(self, data): """Send Base64 encoded SASL authentication chunks.""" enc_data = base64.b64encode(data).decode() self.send('AUTHENTICATE %s' % enc_data, queue=False) def handle_authenticate(self, source, command, args): """ Handles AUTHENTICATE, or SASL authentication requests from the server. """ # Client: AUTHENTICATE PLAIN # Server: AUTHENTICATE + # Client: AUTHENTICATE ... if not args: return if args[0] == '+': sasl_mech = self.serverdata['sasl_mechanism'].upper() if sasl_mech == 'PLAIN': sasl_user = self.serverdata['sasl_username'] sasl_pass = self.serverdata['sasl_password'] authstring = '%s\0%s\0%s' % (sasl_user, sasl_user, sasl_pass) self._send_auth_chunk(authstring.encode('utf-8')) elif sasl_mech == 'EXTERNAL': self.send('AUTHENTICATE +') def handle_900(self, source, command, args): """ Handles SASL RPL_LOGGEDIN numerics. """ # <- :charybdis.midnight.vpn 900 ice ice!pylink@localhost ice :You are now logged in as ice # <- :server 900 !@ :You are now logged in as self.pseudoclient.services_account = args[2] log.info('(%s) SASL authentication successful: now logged in as %s', self.name, args[2]) # Note: we don't send a hook here yet; is doing so for the bot this early in login # really necessary? def handle_904(self, source, command, args): """ Handles SASL authentication status reports. """ # <- :charybdis.midnight.vpn 903 ice :SASL authentication successful logfunc = log.debug if command == '903' else log.warning logfunc('(%s) %s', self.name, args[-1]) if not self.has_eob: # End the pre-login CAP stuff regardless of whether SASL was successful. self._do_cap_end() handle_903 = handle_902 = handle_905 = handle_906 = handle_907 = handle_904 def _request_ircv3_caps(self): # Filter the capabilities we want by the ones actually supported by the server. available_caps = {cap for cap in IRCV3_CAPABILITIES if cap in self.ircv3_caps_available} # And by the ones we don't already have. caps_wanted = available_caps - self.ircv3_caps log.debug('(%s) Requesting IRCv3 capabilities %s (available: %s)', self.name, caps_wanted, available_caps) if caps_wanted: self.send('CAP REQ :%s' % ' '.join(caps_wanted), queue=False) def handle_cap(self, source, command, args): """ Handles IRCv3 capabilities transmission. """ subcmd = args[1] if subcmd == 'LS': # Server: CAP * LS * :multi-prefix extended-join account-notify batch invite-notify tls # Server: CAP * LS * :cap-notify server-time example.org/dummy-cap=dummyvalue example.org/second-dummy-cap # Server: CAP * LS :userhost-in-names sasl=EXTERNAL,DH-AES,DH-BLOWFISH,ECDSA-NIST256P-CHALLENGE,PLAIN log.debug('(%s) Got new capabilities %s', self.name, args[-1]) self.ircv3_caps_available.update(self.parse_isupport(args[-1], None)) if args[2] != '*': self._request_ircv3_caps() elif subcmd == 'ACK': # Server: CAP * ACK :multi-prefix sasl newcaps = set(args[-1].split()) log.debug('(%s) Received ACK for IRCv3 capabilities %s', self.name, newcaps) self.ircv3_caps |= newcaps # Only send CAP END immediately if SASL is disabled. Otherwise, wait for the 90x responses # to do so. if not self._try_sasl_auth(): if not self.has_eob: self._do_cap_end() elif subcmd == 'NAK': log.warning('(%s) Got NAK for IRCv3 capabilities %s, even though they were supposedly available', self.name, args[-1]) if not self.has_eob: self._do_cap_end() elif subcmd == 'NEW': # :irc.example.com CAP modernclient NEW :batch # :irc.example.com CAP tester NEW :away-notify extended-join # Note: CAP NEW allows capabilities with values (e.g. sasl=mech1,mech2), while CAP DEL # does not. log.debug('(%s) Got new capabilities %s', self.name, args[-1]) newcaps = self.parse_isupport(args[-1], None) self.ircv3_caps_available.update(newcaps) self._request_ircv3_caps() # Attempt SASL auth routines when sasl is added/removed, if doing so is enabled. if 'sasl' in newcaps and self.serverdata.get('sasl_reauth'): log.debug('(%s) Attempting SASL reauth due to CAP NEW', self.name) self._try_sasl_auth() elif subcmd == 'DEL': # :irc.example.com CAP modernclient DEL :userhost-in-names multi-prefix away-notify log.debug('(%s) Removing capabilities %s', self.name, args[-1]) for cap in args[-1].split(): # Remove the capabilities from the list available, and return None (ignore) if any fail self.ircv3_caps_available.pop(cap, None) self.ircv3_caps.discard(cap) def handle_001(self, source, command, args): """ Handles 001 / RPL_WELCOME. """ # enumerate our uplink self.uplink = source def handle_376(self, source, command, args): """ Handles end of MOTD numerics, used to start things like autoperform. """ # Run autoperform commands. for line in self.serverdata.get("autoperform", []): self.send(line) # Virtual endburst hook. self.connected.set() # Note, this should always be set before the actual ENDBURST hook self.servers[source].has_eob = True return {'parse_as': 'ENDBURST'} handle_422 = handle_376 def handle_353(self, source, command, args): """ Handles 353 / RPL_NAMREPLY. """ # <- :charybdis.midnight.vpn 353 ice = #test :ice @GL # Mark "@"-type channels as secret automatically, per RFC2812. channel = args[2] if args[1] == '@': self.apply_modes(channel, [('+s', None)]) names = set() modes = set() prefix_to_mode = {v:k for k, v in self.prefixmodes.items()} prefixes = ''.join(self.prefixmodes.values()) for name in args[-1].split(): nick = name.lstrip(prefixes) # Handle userhost-in-names where available. if 'userhost-in-names' in self.ircv3_caps: nick, ident, host = utils.splitHostmask(nick) else: ident = host = None # Get the PUID for the given nick. If one doesn't exist, spawn # a new virtual user. idsource = self._get_UID(nick, ident=ident, host=host) # Queue these virtual users to be joined if they're not already in the channel, # or we're waiting for a kick acknowledgment for them. if (idsource not in self._channels[channel].users) or (idsource in \ self.kick_queue.get(channel, ([],))[0]): names.add(idsource) self.users[idsource].channels.add(channel) if host: self.users[idsource]._clientbot_identhost_received = True # Process prefix modes for char in name: if char in self.prefixmodes.values(): modes.add(('+' + prefix_to_mode[char], idsource)) else: break # Statekeeping: make sure the channel's user list is updated! self._channels[channel].users |= names self.apply_modes(channel, modes) log.debug('(%s) handle_353: adding users %s to %s', self.name, names, channel) log.debug('(%s) handle_353: adding modes %s to %s', self.name, modes, channel) # Send JOIN hook payloads only for users that we know the ident@host of already. # We also use this to track whether kicks are successful, rejoining the target in the next /names lookup # if it wasn't. fully_synced_names = [uid for uid in names if hasattr(self.users[uid], '_clientbot_identhost_received')] if fully_synced_names: log.debug('(%s) handle_353: sending pre-WHO JOIN hook for %s: %s', self.name, channel, fully_synced_names) return {'channel': channel, 'users': fully_synced_names, 'modes': self._channels[channel].modes, 'parse_as': "JOIN"} def _check_puid_collision(self, nick): """ Checks to make sure a nick doesn't clash with a PUID. """ if nick in self.users or nick in self.servers: raise ProtocolError("Got bad nick %s from IRC which clashes with a PUID. Is someone trying to spoof users?" % nick) def _send_who(self, channel): """Sends /WHO to a channel, with WHOX args if that is supported.""" # Note: %% = escaped % # %cuhsnfdr is the default; adding 'a' to it sends the account name. # 'd' is omitted because we don't really care about hop count. if 'WHOX' in self._caps: self.send('WHO %s %%cuhsnfar' % channel) else: self.send('WHO %s' % channel) def handle_352(self, source, command, args): """ Handles 352 / RPL_WHOREPLY. """ # parameter count: 0 1 2 3 4 5 6 7(-1) # <- :charybdis.midnight.vpn 352 ice #test ~pylink 127.0.0.1 charybdis.midnight.vpn ice H+ :0 PyLink # <- :charybdis.midnight.vpn 352 ice #test ~gl 127.0.0.1 charybdis.midnight.vpn GL H*@ :0 realname # with WHO %cuhsnfar (WHOX) - note, hopcount and realname are separate! # 0 1 2 3 4 5 6 7 8(-1) # <- :charybdis.midnight.vpn 354 ice #test ~gl localhost charybdis.midnight.vpn GL H*@ GL :realname ident = args[2] host = args[3] nick = args[5] status = args[6] # Hopcount and realname field are together in regular WHO. We only care about the latter. realname = args[-1] if command == '352': realname = realname.split(' ', 1)[-1] self._check_puid_collision(nick) uid = self.nick_to_uid(nick) if uid is None: log.debug("(%s) Ignoring extraneous /WHO info for %s", self.name, nick) return self.update_client(uid, 'IDENT', ident) self.update_client(uid, 'HOST', host) self.update_client(uid, 'GECOS', realname) self.users[uid]._clientbot_identhost_received = True # The status given uses the following letters: [*][@|+] # H means here (not marked /away) # G means away is set (we'll have to fake a message because it's not given) # * means IRCop. # The rest are prefix modes. Multiple can be given by the IRCd if multiple are set log.debug('(%s) handle_352: status string on user %s: %s', self.name, nick, status) if status[0] == 'G': log.debug('(%s) handle_352: calling away() with argument', self.name) self.away(uid, 'Away') elif status[0] == 'H': log.debug('(%s) handle_352: calling away() without argument', self.name) self.away(uid, '') # Unmark away status else: log.warning('(%s) handle_352: got wrong string %s for away status', self.name, status[0]) if command == '354' and len(args) >= 9: # WHOX account account = args[7] log.debug('(%s) handle_354: got account %r for %s', self.name, account, uid) self._set_account_name(uid, account) if self.serverdata.get('track_oper_statuses'): if '*' in status: # Track IRCop status if not self.is_oper(uid, allowAuthed=False): # Don't send duplicate oper ups if the target is already oper. self.apply_modes(uid, [('+o', None)]) self.call_hooks([uid, 'MODE', {'target': uid, 'modes': {('+o', None)}}]) self.call_hooks([uid, 'CLIENT_OPERED', {'text': 'IRC Operator'}]) elif self.is_oper(uid, allowAuthed=False) and not self.is_internal_client(uid): # Track deopers self.apply_modes(uid, [('-o', None)]) self.call_hooks([uid, 'MODE', {'target': uid, 'modes': {('-o', None)}}]) self.who_received.add(uid) handle_354 = handle_352 # 354 = RPL_WHOSPCRPL, used by WHOX def handle_315(self, source, command, args): """ Handles 315 / RPL_ENDOFWHO. """ # <- :charybdis.midnight.vpn 315 ice #test :End of /WHO list. # Join all the users in which the last batch of /who requests were received. users = self.who_received.copy() self.who_received.clear() channel = args[1] c = self._channels[channel] modes = set(c.modes) for user in users.copy(): if user in c.users and 'userhost-in-names' in self.ircv3_caps: log.debug("(%s) handle_315: Skipping ENDOFWHO -> JOIN for %s on %s, they're already there", self.name, user, channel) users.remove(user) continue # Fill in prefix modes of everyone when doing mock SJOIN. try: for mode in c.get_prefix_modes(user): modechar = self.cmodes.get(mode) log.debug('(%s) handle_315: adding mode %s +%s %s', self.name, mode, modechar, user) if modechar: modes.add((modechar, user)) except KeyError as e: log.debug("(%s) Ignoring KeyError (%s) from WHO response; it's probably someone we " "don't share any channels with", self.name, e) if users: return {'channel': channel, 'users': users, 'modes': modes, 'parse_as': "JOIN"} def handle_433(self, source, command, args): # <- :millennium.overdrivenetworks.com 433 * ice :Nickname is already in use. self._nick_fails += 1 newnick = self.pseudoclient.nick = world.services['pylink'].get_nick(self, fails=self._nick_fails) log.debug('(%s) _nick_fails = %s, trying new nick %r', self.name, self._nick_fails, newnick) self.send('NICK %s' % newnick) handle_432 = handle_437 = handle_433 def handle_account(self, source, command, args): """ Handles IRCv3 account-notify messages. """ # <- :nick!user@host ACCOUNT accountname # <- :nick!user@host ACCOUNT * self._set_account_name(source, args[0]) def handle_join(self, source, command, args): """ Handles incoming JOINs, as well as JOIN acknowledgements for us. """ # Classic format: # <- :GL|!~GL@127.0.0.1 JOIN #whatever # With extended-join: # <- :GL|!~GL@127.0.0.1 JOIN #whatever accountname :realname channel = args[0] self._channels[channel].users.add(source) self.users[source].channels.add(channel) if len(args) >= 3: self._set_account_name(source, args[1]) # Hmm, because _get_UID only looks at the sender prefix, it doesn't # have a way to process the realname info from JOIN yet... self.update_client(source, 'GECOS', args[2]) # Only fetch modes, TS, and user hosts once we're actually in the channel. # The IRCd will send us a JOIN with our nick!user@host if our JOIN succeeded. if self.pseudoclient and source == self.pseudoclient.uid: self.send('MODE %s' % channel) self._send_who(channel) if self.serverdata.get('fetch_ban_lists', False): self.send('MODE %s +b' % channel) for m in ('banexception', 'invex'): if m in self.cmodes: self.send('MODE %s +%s' % (channel, self.cmodes[m])) else: self.call_hooks([source, 'CLIENTBOT_JOIN', {'channel': channel}]) return {'channel': channel, 'users': [source], 'modes': self._channels[channel].modes} def handle_kick(self, source, command, args): """ Handles incoming KICKs. """ # <- :GL!~gl@127.0.0.1 KICK #whatever GL| :xd channel = args[0] target = self.nick_to_uid(args[1]) try: reason = args[2] except IndexError: reason = '' if channel in self.kick_queue: # Remove this client from the kick queue if present there. log.debug('(%s) kick: removing %s from kick queue for channel %s', self.name, target, channel) self.kick_queue[channel][0].discard(target) if not self.kick_queue[channel][0]: log.debug('(%s) kick: cancelling kick timer for channel %s (all kicks accounted for)', self.name, channel) # There aren't any kicks that failed to be acknowledged. We can remove the timer now self.kick_queue[channel][1].cancel() del self.kick_queue[channel] # Statekeeping: remove the target from the channel they were previously in. self._channels[channel].remove_user(target) try: self.users[target].channels.remove(channel) except KeyError: pass if (not self.is_internal_client(source)) and not self.is_internal_server(source): # Don't repeat hooks if we're the kicker. return {'channel': channel, 'target': target, 'text': reason} def handle_mode(self, source, command, args): """Handles MODE changes.""" # <- :GL!~gl@127.0.0.1 MODE #dev +v ice # <- :ice MODE ice :+Zi target = args[0] if self.is_channel(target): oldobj = self._channels[target].deepcopy() else: target = self.nick_to_uid(target) oldobj = None modes = args[1:] changedmodes = self.parse_modes(target, modes) self.apply_modes(target, changedmodes) if self.is_internal_client(target): log.debug('(%s) Suppressing MODE change hook for internal client %s', self.name, target) return if changedmodes: # Prevent infinite loops: don't send MODE hooks if the sender is US. # Note: this is not the only check in Clientbot to prevent mode loops: if our nick # somehow gets desynced, this may not catch everything it's supposed to. if (self.pseudoclient and source != self.pseudoclient.uid) or not self.pseudoclient: return {'target': target, 'modes': changedmodes, 'channeldata': oldobj} def handle_324(self, source, command, args): """Handles MODE announcements via RPL_CHANNELMODEIS (i.e. the response to /mode #channel)""" # -> MODE #test # <- :midnight.vpn 324 GL #test +nt # <- :midnight.vpn 329 GL #test 1491773459 channel = args[1] modes = args[2:] log.debug('(%s) Got RPL_CHANNELMODEIS (324) modes %s for %s', self.name, modes, channel) changedmodes = self.parse_modes(channel, modes) self.apply_modes(channel, changedmodes) def handle_329(self, source, command, args): """Handles TS announcements via RPL_CREATIONTIME.""" channel = args[1] ts = int(args[2]) self._channels[channel].ts = ts def handle_chghost(self, source, command, args): """Handles the IRCv3 CHGHOST command.""" # <- :nick!user@host CHGHOST ident new.host ident = self.users[source].ident host = self.users[source].host self.users[source].ident = newident = args[0] self.users[source].host = newhost = args[1] if ident != newident: self.call_hooks([source, 'CHGIDENT', {'target': source, 'newident': newident}]) if host != newhost: self.call_hooks([source, 'CHGHOST', {'target': source, 'newhost': newhost}]) def handle_nick(self, source, command, args): """Handles NICK changes.""" # <- :GL|!~GL@127.0.0.1 NICK :GL_ newnick = args[0] if not self.connected.is_set(): # We haven't properly logged on yet, so any initial NICK should be treated as a forced # nick change for us. For example, this clause is used to handle forced nick changes # sent by ZNC, when the login nick and the actual IRC nick of the bouncer differ. self.pseudoclient.nick = newnick log.debug('(%s) Pre-auth FNC: Changing our nick to %s', self.name, args[0]) return elif source == self.pseudoclient.uid: self._nick_fails = 0 # Our last nick change succeeded. oldnick = self.users[source].nick # Check for any nick collisions with existing virtual clients. self._check_nick_collision(newnick) self.users[source].nick = newnick return {'newnick': newnick, 'oldnick': oldnick} def handle_part(self, source, command, args): """ Handles incoming PARTs. """ # <- :GL|!~GL@127.0.0.1 PART #whatever channels = args[0].split(',') try: reason = args[1] except IndexError: reason = '' for channel in channels: self._channels[channel].remove_user(source) self.users[source].channels -= set(channels) return {'channels': channels, 'text': reason} def handle_ping(self, source, command, args): """ Handles incoming PING requests. """ self.send('PONG :%s' % args[0], queue=False) def handle_privmsg(self, source, command, args): """Handles incoming PRIVMSG/NOTICE.""" # <- :sender PRIVMSG #dev :afasfsa # <- :sender NOTICE somenick :afasfsa target = args[0] if self.is_internal_client(source) or self.is_internal_server(source): log.warning('(%s) Received %s to %s being routed the wrong way!', self.name, command, target) return real_target = target.lstrip(''.join(self.prefixmodes.values())) if not self.is_channel(real_target): target = self.nick_to_uid(target) if target: return {'target': target, 'text': args[1]} handle_notice = handle_privmsg def handle_quit(self, source, command, args): """Handles incoming QUITs.""" if self.pseudoclient and source == self.pseudoclient.uid: # Someone faked a quit from us? We should abort. raise ProtocolError("Received QUIT from uplink (%s)" % args[0]) self.quit(source, args[0]) return {'text': args[0]} def handle_404(self, source, command, args): """ Handles ERR_CANNOTSENDTOCHAN and other similar numerics. """ # <- :some.server 404 james #test :Cannot send to channel if len(args) >= 2 and self.is_channel(args[1]): channel = args[1] f = log.warning if channel not in self.channels: return # Don't send the warning multiple times to prevent flood if the target # is a log chan. if hasattr(self.channels[channel], '_clientbot_cannot_send_warned'): f = log.debug f('(%s) Failed to send message to %s: %s', self.name, channel, args[-1]) self.channels[channel]._clientbot_cannot_send_warned = True # 408: ERR_NOCOLORSONCHAN on Bahamut, ERR_NOCTRLSONCHAN on Hybrid handle_408 = handle_404 # 492: ERR_NOCTCP on Hybrid handle_492 = handle_404 def handle_367(self, source, command, args, banmode='b'): """ Handles RPL_BANLIST, used to enumerate bans. """ # <- :irc3.lose-the-game.nat 367 james #test *!*@1.2.3.4 james 1504560159 channel = args[1] target = args[2] if channel not in self.channels: log.warning('(%s) got ban mode +%s %s on unknown channel %s?', self.name, banmode, target) else: # Just apply the mode; we send out a mode hook only when the corresponding ban list has finished sending. self.apply_modes(channel, [('+%s' % banmode, target)]) def handle_368(self, source, command, args, banmode='b'): """ Handles RPL_ENDOFBANLIST, used to end off ban lists. """ # <- :irc3.lose-the-game.nat 368 james #test :End of Channel Ban List channel = args[1] # Send out the hook. We don't worry about repeats since these modes don't need to be # enumerated more than once per JOIN anyways. modes = [('+%s' % banmode, m[1]) for m in self.channels[channel].modes if m[0] == banmode] if modes: return {'target': channel, 'parse_as': 'MODE', 'modes': modes} def handle_346(self, *args): """ Handles RPL_INVITELIST, used to enumerate invite exceptions. """ return self.handle_367(*args, banmode=self.cmodes.get('invex', 'I')) def handle_347(self, *args): """ Handles RPL_ENDOFINVITELIST, used to end off invite exception lists. """ if 'invex' not in self.cmodes: log.warning('(%s) Got 347 / RPL_ENDOFINVITELIST even though invex is not a registered mode?', self.name) return self.handle_368(*args, banmode=self.cmodes.get('invex', 'I')) def handle_348(self, *args): """ Handles RPL_EXCEPTLIST, used to enumerate ban exceptions. """ return self.handle_367(*args, banmode=self.cmodes.get('banexception', 'e')) def handle_349(self, *args): """ Handles RPL_ENDOFEXCEPTLIST, used to end off ban exception lists. """ if 'banexception' not in self.cmodes: log.warning('(%s) Got 349 / RPL_ENDOFEXCEPTLIST even though banexception is not a registered mode?', self.name) return self.handle_368(*args, banmode=self.cmodes.get('banexception', 'e')) def handle_471(self, source, command, args): """ Handles numerics commonly sent when a client fails to join a channel: * ERR_TOOMANYCHANNELS (405) * ERR_CHANNELISFULL (471) * ERR_INVITEONLYCHAN (473) * ERR_BANNEDFROMCHAN (474) * ERR_BADCHANNELKEY (475) * ERR_BADCHANMASK (476) * ERR_NEEDREGGEDNICK (477) * ERR_BADCHANNAME (479) * ERR_SECUREONLYCHAN / ERR_SSLONLYCHAN (489) * ERR_DELAYREJOIN (495) * ERR_OPERONLY (520) """ if len(args) >= 3 and self.is_channel(args[1]): log.warning('(%s) Failed to join channel %s: %s', self.name, args[1], args[-1]) handle_405 = handle_473 = handle_474 = handle_475 = handle_476 = handle_477 = \ handle_479 = handle_489 = handle_495 = handle_520 = handle_471 Class = ClientbotWrapperProtocol