mirror of
https://github.com/jlu5/PyLink.git
synced 2024-12-12 13:19:49 +01:00
1123 lines
48 KiB
Python
1123 lines
48 KiB
Python
"""
|
|
clientbot.py: Clientbot (regular IRC bot) protocol module for PyLink.
|
|
"""
|
|
|
|
# Here be dragons. There are lots of hacks and stubs in this module to recreate the same sort of state
|
|
# that a regular server would have (e.g. spawning virtual users for things like Relay). Somehow it
|
|
# works on most networks though!
|
|
|
|
import time
|
|
import threading
|
|
import base64
|
|
|
|
from pylinkirc import utils, conf
|
|
from pylinkirc.log import log
|
|
from pylinkirc.protocols.ircs2s_common import *
|
|
from pylinkirc.classes import *
|
|
|
|
FALLBACK_REALNAME = 'PyLink Relay Mirror Client'
|
|
|
|
# IRCv3 capabilities to request when available
|
|
IRCV3_CAPABILITIES = {'multi-prefix', 'sasl', 'away-notify', 'userhost-in-names', 'chghost', 'account-notify',
|
|
'account-tag', 'extended-join'}
|
|
|
|
class ClientbotWrapperProtocol(IRCCommonProtocol):
|
|
def __init__(self, *args, **kwargs):
|
|
super().__init__(*args, **kwargs)
|
|
|
|
self.protocol_caps = {'clear-channels-on-leave', 'slash-in-nicks', 'slash-in-hosts', 'underscore-in-hosts'}
|
|
|
|
self.has_eob = False
|
|
|
|
# Remove conf key checks for those not needed for Clientbot.
|
|
self.conf_keys -= {'recvpass', 'sendpass', 'sid', 'sidrange', 'hostname'}
|
|
|
|
# This is just a fallback. Actual casemapping is fetched by handle_005()
|
|
self.casemapping = 'ascii'
|
|
|
|
self._caps = {}
|
|
self.ircv3_caps = set()
|
|
self.ircv3_caps_available = {}
|
|
|
|
# Tracks the users sent in a list of /who replies, so that users can be bursted all at once
|
|
# when ENDOFWHO is received.
|
|
self.who_received = set()
|
|
|
|
# This stores channel->Timer object mappings for users that we're waiting for a kick
|
|
# acknowledgement for. The timer is set to send a NAMES request to the uplink to prevent
|
|
# things like failed KICK attempts from desyncing plugins like relay.
|
|
self.kick_queue = {}
|
|
|
|
# Aliases: 463 (ERR_NOPERMFORHOST), 464 (ERR_PASSWDMISMATCH), and 465 (ERR_YOUREBANNEDCREEP)
|
|
# are essentially all fatal errors for connections.
|
|
self.handle_463 = self.handle_464 = self.handle_465 = self.handle_error
|
|
|
|
self._use_builtin_005_handling = True
|
|
self._nick_fails = 0
|
|
|
|
self.hook_map = {'ACCOUNT': 'CLIENT_SERVICES_LOGIN'}
|
|
|
|
def post_connect(self):
|
|
"""Initializes a connection to a server."""
|
|
# (Re)initialize counter-based pseudo UID generators
|
|
super().post_connect()
|
|
self.uidgen = PUIDGenerator('PUID')
|
|
self.sidgen = PUIDGenerator('ClientbotInternalSID')
|
|
|
|
self.has_eob = False
|
|
ts = self.start_ts
|
|
f = lambda text: self.send(text, queue=False)
|
|
|
|
# Enumerate our own server
|
|
self.sid = self.sidgen.next_sid()
|
|
|
|
# Clear states from last connect
|
|
self.who_received.clear()
|
|
self.kick_queue.clear()
|
|
self._caps.clear()
|
|
self.ircv3_caps.clear()
|
|
self.ircv3_caps_available.clear()
|
|
|
|
sendpass = self.serverdata.get("sendpass")
|
|
if sendpass:
|
|
f('PASS %s' % sendpass)
|
|
|
|
f('CAP LS 302')
|
|
|
|
# Start a timer to call CAP END if registration freezes (e.g. if AUTHENTICATE for SASL is
|
|
# never replied to).
|
|
def _do_cap_end_wrapper():
|
|
log.info('(%s) Skipping SASL due to timeout; are the IRCd and services configured '
|
|
'properly?', self.name)
|
|
self._do_cap_end()
|
|
self._cap_timer = threading.Timer(self.serverdata.get('sasl_timeout') or 15, _do_cap_end_wrapper)
|
|
self._cap_timer.start()
|
|
|
|
# Log in to IRC and set our irc.pseudoclient object.
|
|
sbot = world.services['pylink']
|
|
self._nick_fails = 0
|
|
|
|
nick = sbot.get_nick(self)
|
|
ident = sbot.get_ident(self)
|
|
realname = sbot.get_realname(self)
|
|
|
|
f('NICK %s' % nick)
|
|
f('USER %s 8 * :%s' % (ident, realname))
|
|
self.pseudoclient = User(self, nick, int(time.time()), self.uidgen.next_uid(prefix='@ClientbotInternal'), self.sid,
|
|
ident=ident, realname=realname, host=self.hostname())
|
|
self.users[self.pseudoclient.uid] = self.pseudoclient
|
|
|
|
# Note: clientbot clients are initialized with umode +i by default
|
|
def spawn_client(self, nick, ident='unknown', host='unknown.host', realhost=None, modes={('i', None)},
|
|
server=None, ip='0.0.0.0', realname='', ts=None, opertype=None,
|
|
manipulatable=False):
|
|
"""
|
|
STUB: Pretends to spawn a new client with a subset of the given options.
|
|
"""
|
|
|
|
server = server or self.sid
|
|
uid = self.uidgen.next_uid(prefix=nick)
|
|
|
|
ts = ts or int(time.time())
|
|
|
|
log.debug('(%s) spawn_client stub called, saving nick %s as PUID %s', self.name, nick, uid)
|
|
u = self.users[uid] = User(self, nick, ts, uid, server, ident=ident, host=host, realname=realname,
|
|
manipulatable=manipulatable, realhost=realhost, ip=ip)
|
|
self.servers[server].users.add(uid)
|
|
|
|
self.apply_modes(uid, modes)
|
|
|
|
return u
|
|
|
|
def spawn_server(self, name, sid=None, uplink=None, desc=None, endburst_delay=0, internal=True):
|
|
"""
|
|
STUB: Pretends to spawn a new server with a subset of the given options.
|
|
"""
|
|
name = name.lower()
|
|
if internal:
|
|
# Use a custom pseudo-SID format for internal servers to prevent any server name clashes
|
|
sid = self.sidgen.next_sid(prefix=name)
|
|
else:
|
|
# For others servers, just use the server name as the SID.
|
|
sid = name
|
|
|
|
self.servers[sid] = Server(self, uplink, name, internal=internal)
|
|
return sid
|
|
|
|
def away(self, source, text):
|
|
"""STUB: sets away messages for clients internally."""
|
|
log.debug('(%s) away: target is %s, internal client? %s', self.name, source, self.is_internal_client(source))
|
|
|
|
if self.users[source].away != text:
|
|
if not self.is_internal_client(source):
|
|
log.debug('(%s) away: sending AWAY hook from %s with text %r', self.name, source, text)
|
|
self.call_hooks([source, 'AWAY', {'text': text}])
|
|
|
|
self.users[source].away = text
|
|
|
|
def invite(self, client, target, channel):
|
|
"""Invites a user to a channel."""
|
|
self.send('INVITE %s %s' % (self.get_friendly_name(target), channel))
|
|
|
|
def join(self, client, channel):
|
|
"""STUB: Joins a user to a channel."""
|
|
|
|
# Only joins for the main PyLink client are actually forwarded. Others are ignored.
|
|
# Note: we do not automatically add our main client to the channel state, as we
|
|
# rely on the /NAMES reply to sync it up properly.
|
|
if self.pseudoclient and client == self.pseudoclient.uid:
|
|
self.send('JOIN %s' % channel)
|
|
else:
|
|
self._channels[channel].users.add(client)
|
|
self.users[client].channels.add(channel)
|
|
|
|
log.debug('(%s) join: faking JOIN of client %s/%s to %s', self.name, client,
|
|
self.get_friendly_name(client), channel)
|
|
self.call_hooks([client, 'CLIENTBOT_JOIN', {'channel': channel}])
|
|
|
|
def kick(self, source, channel, target, reason=''):
|
|
"""Sends channel kicks."""
|
|
|
|
log.debug('(%s) kick: checking if target %s (nick: %s) is an internal client? %s',
|
|
self.name, target, self.get_friendly_name(target),
|
|
self.is_internal_client(target))
|
|
if self.is_internal_client(target):
|
|
# Target was one of our virtual clients. Just remove them from the state.
|
|
self.handle_part(target, 'KICK', [channel, reason])
|
|
|
|
# Send a KICK hook for message formatting.
|
|
self.call_hooks([source, 'CLIENTBOT_KICK', {'channel': channel, 'target': target, 'text': reason}])
|
|
return
|
|
|
|
self.send('KICK %s %s :<%s> %s' % (channel, self._expandPUID(target),
|
|
self.get_friendly_name(source), reason))
|
|
|
|
# Don't update our state here: wait for the IRCd to send an acknowledgement instead.
|
|
# There is essentially a 3 second wait to do this, as we send NAMES with a delay
|
|
# to resync any users lost due to kicks being blocked, etc.
|
|
if (channel not in self.kick_queue) or (not self.kick_queue[channel][1].is_alive()):
|
|
# However, only do this if there isn't a NAMES request scheduled already.
|
|
t = threading.Timer(3, lambda: self.send('NAMES %s' % channel))
|
|
log.debug('(%s) kick: setting NAMES timer for %s on %s', self.name, target, channel)
|
|
|
|
# Store the channel, target UID, and timer object in the internal kick queue.
|
|
self.kick_queue[channel] = ({target}, t)
|
|
t.start()
|
|
else:
|
|
log.debug('(%s) kick: adding %s to kick queue for channel %s', self.name, target, channel)
|
|
self.kick_queue[channel][0].add(target)
|
|
|
|
def message(self, source, target, text, notice=False):
|
|
"""Sends messages to the target."""
|
|
command = 'NOTICE' if notice else 'PRIVMSG'
|
|
|
|
if self.pseudoclient and self.pseudoclient.uid == source:
|
|
self.send('%s %s :%s' % (command, self._expandPUID(target), text))
|
|
else:
|
|
self.call_hooks([source, 'CLIENTBOT_MESSAGE', {'target': target, 'is_notice': notice, 'text': text}])
|
|
|
|
def mode(self, source, channel, modes, ts=None):
|
|
"""Sends channel MODE changes."""
|
|
if self.is_channel(channel):
|
|
extmodes = []
|
|
# Re-parse all channel modes locally to eliminate anything invalid, such as unbanning
|
|
# things that were never banned. This prevents the bot from getting caught in a loop
|
|
# with IRCd MODE acknowledgements.
|
|
# FIXME: More related safety checks should be added for this.
|
|
log.debug('(%s) mode: re-parsing modes %s', self.name, modes)
|
|
joined_modes = self.join_modes(modes)
|
|
for modepair in self.parse_modes(channel, joined_modes):
|
|
log.debug('(%s) mode: checking if %s a prefix mode: %s', self.name, modepair, self.prefixmodes)
|
|
if modepair[0][-1] in self.prefixmodes:
|
|
if self.is_internal_client(modepair[1]):
|
|
# Ignore prefix modes for virtual internal clients.
|
|
log.debug('(%s) mode: skipping virtual client prefixmode change %s', self.name, modepair)
|
|
continue
|
|
else:
|
|
# For other clients, change the mode argument to nick instead of PUID.
|
|
nick = self.get_friendly_name(modepair[1])
|
|
log.debug('(%s) mode: coersing mode %s argument to %s', self.name, modepair, nick)
|
|
modepair = (modepair[0], nick)
|
|
extmodes.append(modepair)
|
|
|
|
log.debug('(%s) mode: filtered modes for %s: %s', self.name, channel, extmodes)
|
|
if extmodes:
|
|
bufsize = self.S2S_BUFSIZE - len(':%s MODE %s ' % (self.get_hostmask(self.pseudoclient.uid), channel))
|
|
for msg in self.wrap_modes(extmodes, bufsize, max_modes_per_msg=int(self._caps.get('MODES', 0))):
|
|
self.send('MODE %s %s' % (channel, msg))
|
|
# Don't update the state here: the IRCd sill respond with a MODE reply if successful.
|
|
|
|
def nick(self, source, newnick):
|
|
"""STUB: Sends NICK changes."""
|
|
if self.pseudoclient and source == self.pseudoclient.uid:
|
|
self.send('NICK :%s' % newnick)
|
|
# No state update here: the IRCd will respond with a NICK acknowledgement if the change succeeds.
|
|
else:
|
|
self.call_hooks([source, 'CLIENTBOT_NICK', {'newnick': newnick}])
|
|
self.users[source].nick = newnick
|
|
|
|
def notice(self, source, target, text):
|
|
"""Sends notices to the target."""
|
|
# Wrap around message(), which does all the text formatting for us.
|
|
self.message(source, target, text, notice=True)
|
|
|
|
def _ping_uplink(self):
|
|
"""
|
|
Sends a PING to the uplink.
|
|
"""
|
|
if self.uplink:
|
|
self.send('PING %s' % self.get_friendly_name(self.uplink))
|
|
|
|
# Poll WHO periodically to figure out any ident/host/away status changes.
|
|
for channel in self.pseudoclient.channels:
|
|
self._send_who(channel)
|
|
|
|
def part(self, source, channel, reason=''):
|
|
"""STUB: Parts a user from a channel."""
|
|
self._channels[channel].remove_user(source)
|
|
self.users[source].channels.discard(channel)
|
|
|
|
# Only parts for the main PyLink client are actually forwarded. Others are ignored.
|
|
if self.pseudoclient and source == self.pseudoclient.uid:
|
|
self.send('PART %s :%s' % (channel, reason))
|
|
else:
|
|
self.call_hooks([source, 'CLIENTBOT_PART', {'channel': channel, 'text': reason}])
|
|
|
|
def quit(self, source, reason):
|
|
"""STUB: Quits a client."""
|
|
userdata = self.users[source]
|
|
self._remove_client(source)
|
|
self.call_hooks([source, 'CLIENTBOT_QUIT', {'text': reason, 'userdata': userdata}])
|
|
|
|
def sjoin(self, server, channel, users, ts=None, modes=set()):
|
|
"""STUB: bursts joins from a server."""
|
|
# This stub only updates the state internally with the users
|
|
# given. modes and TS are currently ignored.
|
|
puids = {u[-1] for u in users}
|
|
for user in puids:
|
|
if self.pseudoclient and self.pseudoclient.uid == user:
|
|
# If the SJOIN affects our main client, forward it as a regular JOIN.
|
|
self.join(user, channel)
|
|
else:
|
|
# Otherwise, track the state for our virtual clients.
|
|
self.users[user].channels.add(channel)
|
|
|
|
self._channels[channel].users |= puids
|
|
nicks = {self.get_friendly_name(u) for u in puids}
|
|
self.call_hooks([server, 'CLIENTBOT_SJOIN', {'channel': channel, 'nicks': nicks}])
|
|
|
|
def squit(self, source, target, text):
|
|
"""STUB: SQUITs a server."""
|
|
# What this actually does is just handle the SQUIT internally: i.e.
|
|
# Removing pseudoclients and pseudoservers.
|
|
squit_data = self._squit(source, 'CLIENTBOT_VIRTUAL_SQUIT', [target, text])
|
|
|
|
if squit_data and squit_data.get('nicks'):
|
|
self.call_hooks([source, 'CLIENTBOT_SQUIT', squit_data])
|
|
|
|
def _stub(self, *args):
|
|
"""Stub outgoing command function (does nothing)."""
|
|
return
|
|
kill = topic = topic_burst = knock = numeric = _stub
|
|
|
|
def update_client(self, target, field, text):
|
|
"""Updates the known ident, host, or realname of a client."""
|
|
if target not in self.users:
|
|
log.warning("(%s) Unknown target %s for update_client()", self.name, target)
|
|
return
|
|
|
|
u = self.users[target]
|
|
|
|
if field == 'IDENT' and u.ident != text:
|
|
u.ident = text
|
|
if not self.is_internal_client(target):
|
|
# We're updating the host of an external client in our state, so send the appropriate
|
|
# hook payloads.
|
|
self.call_hooks([self.sid, 'CHGIDENT',
|
|
{'target': target, 'newident': text}])
|
|
elif field == 'HOST' and u.host != text:
|
|
u.host = text
|
|
if not self.is_internal_client(target):
|
|
self.call_hooks([self.sid, 'CHGHOST',
|
|
{'target': target, 'newhost': text}])
|
|
elif field in ('REALNAME', 'GECOS') and u.realname != text:
|
|
u.realname = text
|
|
if not self.is_internal_client(target):
|
|
self.call_hooks([self.sid, 'CHGNAME',
|
|
{'target': target, 'newgecos': text}])
|
|
else:
|
|
return # Nothing changed
|
|
|
|
def _get_UID(self, nick, ident=None, host=None):
|
|
"""
|
|
Fetches the UID for the given nick, creating one if it does not already exist.
|
|
|
|
Limited (internal) nick collision checking is done here to prevent Clientbot users from
|
|
being confused with virtual clients, and vice versa."""
|
|
self._check_puid_collision(nick)
|
|
idsource = self.nick_to_uid(nick)
|
|
is_internal = self.is_internal_client(idsource)
|
|
|
|
# If this sender isn't known or it is one of our virtual clients, spawn a new one.
|
|
# This also takes care of any nick collisions caused by new, Clientbot users
|
|
# taking the same nick as one of our virtual clients, and will force the virtual client to lose.
|
|
if (not idsource) or (is_internal and self.pseudoclient and idsource != self.pseudoclient.uid):
|
|
if idsource:
|
|
log.debug('(%s) Nick-colliding virtual client %s/%s', self.name, idsource, nick)
|
|
self.call_hooks([self.sid, 'CLIENTBOT_NICKCOLLIDE', {'target': idsource, 'parse_as': 'SAVE'}])
|
|
|
|
idsource = self.spawn_client(nick, ident or 'unknown', host or 'unknown',
|
|
server=self.uplink, realname=FALLBACK_REALNAME).uid
|
|
|
|
return idsource
|
|
|
|
def parse_message_tags(self, data):
|
|
"""
|
|
Parses a message with IRC v3.2 message tags, as described at http://ircv3.net/specs/core/message-tags-3.2.html
|
|
"""
|
|
# Example query:
|
|
# @aaa=bbb;ccc;example.com/ddd=eee :nick!ident@host.com PRIVMSG me :Hello
|
|
if data[0].startswith('@'):
|
|
tagdata = data[0].lstrip('@').split(';')
|
|
for idx, tag in enumerate(tagdata):
|
|
tag = tag.replace(r'\s', ' ')
|
|
tag = tag.replace(r'\\', '\\')
|
|
tag = tag.replace(r'\r', '\r')
|
|
tag = tag.replace(r'\n', '\n')
|
|
tag = tag.replace(r'\:', ';')
|
|
tagdata[idx] = tag
|
|
|
|
results = self.parse_isupport(tagdata, fallback=None)
|
|
log.debug('(%s) parsed message tags %s', self.name, results)
|
|
return results
|
|
return {}
|
|
|
|
def _set_account_name(self, uid, account):
|
|
"""
|
|
Updates the user's account metadata.
|
|
"""
|
|
if account is None: # Ignore when account=None
|
|
return
|
|
elif account == '*': # This indicates logout
|
|
account = ''
|
|
|
|
if account != self.users[uid].services_account:
|
|
self.call_hooks([uid, 'CLIENT_SERVICES_LOGIN', {'text': account}])
|
|
|
|
def handle_events(self, data):
|
|
"""Event handler for the RFC1459/2812 (clientbot) protocol."""
|
|
data = data.split(" ")
|
|
|
|
tags = self.parse_message_tags(data)
|
|
if tags:
|
|
# If we have tags, split off the first argument.
|
|
data = data[1:]
|
|
|
|
try:
|
|
args = self.parse_prefixed_args(data)
|
|
sender = args[0]
|
|
command = args[1]
|
|
args = args[2:]
|
|
|
|
except IndexError:
|
|
# Raw command without an explicit sender; assume it's being sent by our uplink.
|
|
args = self.parse_args(data)
|
|
idsource = sender = self.uplink
|
|
command = args[0]
|
|
args = args[1:]
|
|
else:
|
|
# PyLink as a services framework expects UIDs and SIDs for everything. Since we connect
|
|
# as a bot here, there's no explicit user introduction, so we're going to generate
|
|
# pseudo-uids and pseudo-sids as we see prefixes.
|
|
if ('!' not in sender) and '.' in sender:
|
|
# Sender is a server name. XXX: make this check more foolproof
|
|
assert '@' not in sender, "Incoming server name %r clashes with a PUID!" % sender
|
|
if sender not in self.servers:
|
|
self.spawn_server(sender, internal=False)
|
|
idsource = sender
|
|
else:
|
|
# Sender is a either a nick or a nick!user@host prefix. Split it into its relevant parts.
|
|
try:
|
|
nick, ident, host = utils.splitHostmask(sender)
|
|
except ValueError:
|
|
ident = host = None # Set ident and host as null for now.
|
|
nick = sender # Treat the sender prefix we received as a nick.
|
|
idsource = self._get_UID(nick, ident, host)
|
|
|
|
if idsource in self.users:
|
|
# Handle IRCv3.2 account-tag.
|
|
self._set_account_name(idsource, tags.get('account'))
|
|
|
|
try:
|
|
func = getattr(self, 'handle_'+command.lower())
|
|
except AttributeError: # unhandled command
|
|
pass
|
|
else:
|
|
parsed_args = func(idsource, command, args)
|
|
if parsed_args is not None:
|
|
parsed_args['tags'] = tags # Add message tags to this dict.
|
|
return [idsource, command, parsed_args]
|
|
|
|
def _do_cap_end(self):
|
|
"""
|
|
Abort SASL login by sending CAP END.
|
|
"""
|
|
self.send('CAP END')
|
|
log.debug("(%s) Stopping CAP END timer.", self.name)
|
|
self._cap_timer.cancel()
|
|
|
|
def _try_sasl_auth(self):
|
|
"""
|
|
Starts an authentication attempt via SASL. This returns True if SASL
|
|
is enabled and correctly configured, and False otherwise.
|
|
"""
|
|
if 'sasl' not in self.ircv3_caps:
|
|
log.info("(%s) Skipping SASL auth since the IRCd doesn't support it.", self.name)
|
|
return
|
|
|
|
sasl_mech = self.serverdata.get('sasl_mechanism')
|
|
if sasl_mech:
|
|
sasl_mech = sasl_mech.upper()
|
|
sasl_user = self.serverdata.get('sasl_username')
|
|
sasl_pass = self.serverdata.get('sasl_password')
|
|
ssl_cert = self.serverdata.get('ssl_certfile')
|
|
ssl_key = self.serverdata.get('ssl_keyfile')
|
|
ssl = self.serverdata.get('ssl')
|
|
|
|
if sasl_mech == 'PLAIN':
|
|
if not (sasl_user and sasl_pass):
|
|
log.warning("(%s) Not attempting PLAIN authentication; sasl_username and/or "
|
|
"sasl_password aren't correctly set.", self.name)
|
|
return False
|
|
elif sasl_mech == 'EXTERNAL':
|
|
if not ssl:
|
|
log.warning("(%s) Not attempting EXTERNAL authentication; SASL external requires "
|
|
"SSL, but it isn't enabled.", self.name)
|
|
return False
|
|
elif not (ssl_cert and ssl_key):
|
|
log.warning("(%s) Not attempting EXTERNAL authentication; ssl_certfile and/or "
|
|
"ssl_keyfile aren't correctly set.", self.name)
|
|
return False
|
|
else:
|
|
log.warning('(%s) Unsupported SASL mechanism %s; aborting SASL.', self.name, sasl_mech)
|
|
return False
|
|
self.send('AUTHENTICATE %s' % sasl_mech, queue=False)
|
|
return True
|
|
return False
|
|
|
|
def _send_auth_chunk(self, data):
|
|
"""Send Base64 encoded SASL authentication chunks."""
|
|
enc_data = base64.b64encode(data).decode()
|
|
self.send('AUTHENTICATE %s' % enc_data, queue=False)
|
|
|
|
def handle_authenticate(self, source, command, args):
|
|
"""
|
|
Handles AUTHENTICATE, or SASL authentication requests from the server.
|
|
"""
|
|
# Client: AUTHENTICATE PLAIN
|
|
# Server: AUTHENTICATE +
|
|
# Client: AUTHENTICATE ...
|
|
if not args:
|
|
return
|
|
if args[0] == '+':
|
|
sasl_mech = self.serverdata['sasl_mechanism'].upper()
|
|
if sasl_mech == 'PLAIN':
|
|
sasl_user = self.serverdata['sasl_username']
|
|
sasl_pass = self.serverdata['sasl_password']
|
|
authstring = '%s\0%s\0%s' % (sasl_user, sasl_user, sasl_pass)
|
|
self._send_auth_chunk(authstring.encode('utf-8'))
|
|
elif sasl_mech == 'EXTERNAL':
|
|
self.send('AUTHENTICATE +')
|
|
|
|
def handle_900(self, source, command, args):
|
|
"""
|
|
Handles SASL RPL_LOGGEDIN numerics.
|
|
"""
|
|
# <- :charybdis.midnight.vpn 900 ice ice!pylink@localhost ice :You are now logged in as ice
|
|
# <- :server 900 <nick> <nick>!<ident>@<host> <account> :You are now logged in as <user>
|
|
|
|
self.pseudoclient.services_account = args[2]
|
|
log.info('(%s) SASL authentication successful: now logged in as %s', self.name, args[2])
|
|
|
|
# Note: we don't send a hook here yet; is doing so for the bot this early in login
|
|
# really necessary?
|
|
|
|
def handle_904(self, source, command, args):
|
|
"""
|
|
Handles SASL authentication status reports.
|
|
"""
|
|
# <- :charybdis.midnight.vpn 903 ice :SASL authentication successful
|
|
logfunc = log.debug if command == '903' else log.warning
|
|
logfunc('(%s) %s', self.name, args[-1])
|
|
if not self.has_eob:
|
|
# End the pre-login CAP stuff regardless of whether SASL was successful.
|
|
self._do_cap_end()
|
|
handle_903 = handle_902 = handle_905 = handle_906 = handle_907 = handle_904
|
|
|
|
def _request_ircv3_caps(self):
|
|
# Filter the capabilities we want by the ones actually supported by the server.
|
|
available_caps = {cap for cap in IRCV3_CAPABILITIES if cap in self.ircv3_caps_available}
|
|
# And by the ones we don't already have.
|
|
caps_wanted = available_caps - self.ircv3_caps
|
|
|
|
log.debug('(%s) Requesting IRCv3 capabilities %s (available: %s)', self.name, caps_wanted, available_caps)
|
|
if caps_wanted:
|
|
self.send('CAP REQ :%s' % ' '.join(caps_wanted), queue=False)
|
|
|
|
def handle_cap(self, source, command, args):
|
|
"""
|
|
Handles IRCv3 capabilities transmission.
|
|
"""
|
|
subcmd = args[1]
|
|
|
|
if subcmd == 'LS':
|
|
# Server: CAP * LS * :multi-prefix extended-join account-notify batch invite-notify tls
|
|
# Server: CAP * LS * :cap-notify server-time example.org/dummy-cap=dummyvalue example.org/second-dummy-cap
|
|
# Server: CAP * LS :userhost-in-names sasl=EXTERNAL,DH-AES,DH-BLOWFISH,ECDSA-NIST256P-CHALLENGE,PLAIN
|
|
log.debug('(%s) Got new capabilities %s', self.name, args[-1])
|
|
self.ircv3_caps_available.update(self.parse_isupport(args[-1], None))
|
|
if args[2] != '*':
|
|
self._request_ircv3_caps()
|
|
|
|
elif subcmd == 'ACK':
|
|
# Server: CAP * ACK :multi-prefix sasl
|
|
newcaps = set(args[-1].split())
|
|
log.debug('(%s) Received ACK for IRCv3 capabilities %s', self.name, newcaps)
|
|
self.ircv3_caps |= newcaps
|
|
|
|
# Only send CAP END immediately if SASL is disabled. Otherwise, wait for the 90x responses
|
|
# to do so.
|
|
if not self._try_sasl_auth():
|
|
if not self.has_eob:
|
|
self._do_cap_end()
|
|
elif subcmd == 'NAK':
|
|
log.warning('(%s) Got NAK for IRCv3 capabilities %s, even though they were supposedly available',
|
|
self.name, args[-1])
|
|
if not self.has_eob:
|
|
self._do_cap_end()
|
|
elif subcmd == 'NEW':
|
|
# :irc.example.com CAP modernclient NEW :batch
|
|
# :irc.example.com CAP tester NEW :away-notify extended-join
|
|
# Note: CAP NEW allows capabilities with values (e.g. sasl=mech1,mech2), while CAP DEL
|
|
# does not.
|
|
log.debug('(%s) Got new capabilities %s', self.name, args[-1])
|
|
newcaps = self.parse_isupport(args[-1], None)
|
|
self.ircv3_caps_available.update(newcaps)
|
|
self._request_ircv3_caps()
|
|
|
|
# Attempt SASL auth routines when sasl is added/removed, if doing so is enabled.
|
|
if 'sasl' in newcaps and self.serverdata.get('sasl_reauth'):
|
|
log.debug('(%s) Attempting SASL reauth due to CAP NEW', self.name)
|
|
self._try_sasl_auth()
|
|
|
|
elif subcmd == 'DEL':
|
|
# :irc.example.com CAP modernclient DEL :userhost-in-names multi-prefix away-notify
|
|
log.debug('(%s) Removing capabilities %s', self.name, args[-1])
|
|
for cap in args[-1].split():
|
|
# Remove the capabilities from the list available, and return None (ignore) if any fail
|
|
self.ircv3_caps_available.pop(cap, None)
|
|
self.ircv3_caps.discard(cap)
|
|
|
|
def handle_001(self, source, command, args):
|
|
"""
|
|
Handles 001 / RPL_WELCOME.
|
|
"""
|
|
# enumerate our uplink
|
|
self.uplink = source
|
|
|
|
def handle_376(self, source, command, args):
|
|
"""
|
|
Handles end of MOTD numerics, used to start things like autoperform.
|
|
"""
|
|
|
|
# Run autoperform commands.
|
|
for line in self.serverdata.get("autoperform", []):
|
|
self.send(line)
|
|
|
|
# Virtual endburst hook.
|
|
self.connected.set() # Note, this should always be set before the actual ENDBURST hook
|
|
self.servers[self.uplink].has_eob = True
|
|
return {'parse_as': 'ENDBURST'}
|
|
|
|
handle_422 = handle_376
|
|
|
|
def handle_353(self, source, command, args):
|
|
"""
|
|
Handles 353 / RPL_NAMREPLY.
|
|
"""
|
|
# <- :charybdis.midnight.vpn 353 ice = #test :ice @GL
|
|
|
|
# Mark "@"-type channels as secret automatically, per RFC2812.
|
|
channel = args[2]
|
|
if args[1] == '@':
|
|
self.apply_modes(channel, [('+s', None)])
|
|
|
|
names = set()
|
|
modes = set()
|
|
prefix_to_mode = {v:k for k, v in self.prefixmodes.items()}
|
|
prefixes = ''.join(self.prefixmodes.values())
|
|
|
|
for name in args[-1].split():
|
|
nick = name.lstrip(prefixes)
|
|
|
|
# Handle userhost-in-names where available.
|
|
if 'userhost-in-names' in self.ircv3_caps:
|
|
nick, ident, host = utils.splitHostmask(nick)
|
|
else:
|
|
ident = host = None
|
|
|
|
# Get the PUID for the given nick. If one doesn't exist, spawn
|
|
# a new virtual user.
|
|
idsource = self._get_UID(nick, ident=ident, host=host)
|
|
|
|
# Queue these virtual users to be joined if they're not already in the channel,
|
|
# or we're waiting for a kick acknowledgment for them.
|
|
if (idsource not in self._channels[channel].users) or (idsource in \
|
|
self.kick_queue.get(channel, ([],))[0]):
|
|
names.add(idsource)
|
|
self.users[idsource].channels.add(channel)
|
|
if host:
|
|
self.users[idsource]._clientbot_identhost_received = True
|
|
|
|
# Process prefix modes
|
|
for char in name:
|
|
if char in self.prefixmodes.values():
|
|
modes.add(('+' + prefix_to_mode[char], idsource))
|
|
else:
|
|
break
|
|
|
|
# Statekeeping: make sure the channel's user list is updated!
|
|
self._channels[channel].users |= names
|
|
self.apply_modes(channel, modes)
|
|
|
|
log.debug('(%s) handle_353: adding users %s to %s', self.name, names, channel)
|
|
log.debug('(%s) handle_353: adding modes %s to %s', self.name, modes, channel)
|
|
|
|
# Send JOIN hook payloads only for users that we know the ident@host of already.
|
|
# We also use this to track whether kicks are successful, rejoining the target in the next /names lookup
|
|
# if it wasn't.
|
|
fully_synced_names = [uid for uid in names if hasattr(self.users[uid], '_clientbot_identhost_received')]
|
|
if fully_synced_names:
|
|
log.debug('(%s) handle_353: sending pre-WHO JOIN hook for %s: %s', self.name, channel, fully_synced_names)
|
|
return {'channel': channel, 'users': fully_synced_names, 'modes': self._channels[channel].modes,
|
|
'parse_as': "JOIN"}
|
|
|
|
def _check_puid_collision(self, nick):
|
|
"""
|
|
Checks to make sure a nick doesn't clash with a PUID.
|
|
"""
|
|
if nick in self.users or nick in self.servers:
|
|
raise ProtocolError("Got bad nick %s from IRC which clashes with a PUID. Is someone trying to spoof users?" % nick)
|
|
|
|
def _send_who(self, channel):
|
|
"""Sends /WHO to a channel, with WHOX args if that is supported."""
|
|
# Note: %% = escaped %
|
|
# %cuhsnfdr is the default; adding 'a' to it sends the account name.
|
|
# 'd' is omitted because we don't really care about hop count.
|
|
if 'WHOX' in self._caps:
|
|
self.send('WHO %s %%cuhsnfar' % channel)
|
|
else:
|
|
self.send('WHO %s' % channel)
|
|
|
|
def handle_352(self, source, command, args):
|
|
"""
|
|
Handles 352 / RPL_WHOREPLY.
|
|
"""
|
|
# parameter count: 0 1 2 3 4 5 6 7(-1)
|
|
# <- :charybdis.midnight.vpn 352 ice #test ~pylink 127.0.0.1 charybdis.midnight.vpn ice H+ :0 PyLink
|
|
# <- :charybdis.midnight.vpn 352 ice #test ~gl 127.0.0.1 charybdis.midnight.vpn GL H*@ :0 realname
|
|
# with WHO %cuhsnfar (WHOX) - note, hopcount and realname are separate!
|
|
# 0 1 2 3 4 5 6 7 8(-1)
|
|
# <- :charybdis.midnight.vpn 354 ice #test ~gl localhost charybdis.midnight.vpn GL H*@ GL :realname
|
|
ident = args[2]
|
|
host = args[3]
|
|
nick = args[5]
|
|
status = args[6]
|
|
|
|
# Hopcount and realname field are together in regular WHO. We only care about the latter.
|
|
realname = args[-1]
|
|
if command == '352':
|
|
realname = realname.split(' ', 1)[-1]
|
|
|
|
self._check_puid_collision(nick)
|
|
uid = self.nick_to_uid(nick)
|
|
|
|
if uid is None:
|
|
log.debug("(%s) Ignoring extraneous /WHO info for %s", self.name, nick)
|
|
return
|
|
|
|
self.update_client(uid, 'IDENT', ident)
|
|
self.update_client(uid, 'HOST', host)
|
|
self.update_client(uid, 'GECOS', realname)
|
|
self.users[uid]._clientbot_identhost_received = True
|
|
|
|
# The status given uses the following letters: <H|G>[*][@|+]
|
|
# H means here (not marked /away)
|
|
# G means away is set (we'll have to fake a message because it's not given)
|
|
# * means IRCop.
|
|
# The rest are prefix modes. Multiple can be given by the IRCd if multiple are set
|
|
log.debug('(%s) handle_352: status string on user %s: %s', self.name, nick, status)
|
|
if status[0] == 'G':
|
|
log.debug('(%s) handle_352: calling away() with argument', self.name)
|
|
self.away(uid, 'Away')
|
|
elif status[0] == 'H':
|
|
log.debug('(%s) handle_352: calling away() without argument', self.name)
|
|
self.away(uid, '') # Unmark away status
|
|
else:
|
|
log.warning('(%s) handle_352: got wrong string %s for away status', self.name, status[0])
|
|
|
|
if command == '354' and len(args) >= 9: # WHOX account
|
|
account = args[7]
|
|
log.debug('(%s) handle_354: got account %r for %s', self.name, account, uid)
|
|
|
|
self._set_account_name(uid, account)
|
|
|
|
if self.serverdata.get('track_oper_statuses'):
|
|
if '*' in status: # Track IRCop status
|
|
if not self.is_oper(uid, allowAuthed=False):
|
|
# Don't send duplicate oper ups if the target is already oper.
|
|
self.apply_modes(uid, [('+o', None)])
|
|
self.call_hooks([uid, 'MODE', {'target': uid, 'modes': {('+o', None)}}])
|
|
self.call_hooks([uid, 'CLIENT_OPERED', {'text': 'IRC Operator'}])
|
|
elif self.is_oper(uid, allowAuthed=False) and not self.is_internal_client(uid):
|
|
# Track deopers
|
|
self.apply_modes(uid, [('-o', None)])
|
|
self.call_hooks([uid, 'MODE', {'target': uid, 'modes': {('-o', None)}}])
|
|
|
|
self.who_received.add(uid)
|
|
handle_354 = handle_352 # 354 = RPL_WHOSPCRPL, used by WHOX
|
|
|
|
def handle_315(self, source, command, args):
|
|
"""
|
|
Handles 315 / RPL_ENDOFWHO.
|
|
"""
|
|
# <- :charybdis.midnight.vpn 315 ice #test :End of /WHO list.
|
|
# Join all the users in which the last batch of /who requests were received.
|
|
users = self.who_received.copy()
|
|
self.who_received.clear()
|
|
|
|
channel = args[1]
|
|
c = self._channels[channel]
|
|
|
|
modes = set(c.modes)
|
|
for user in users.copy():
|
|
if user in c.users and 'userhost-in-names' in self.ircv3_caps:
|
|
log.debug("(%s) handle_315: Skipping ENDOFWHO -> JOIN for %s on %s, they're already there", self.name, user, channel)
|
|
users.remove(user)
|
|
continue
|
|
|
|
# Fill in prefix modes of everyone when doing mock SJOIN.
|
|
try:
|
|
for mode in c.get_prefix_modes(user):
|
|
modechar = self.cmodes.get(mode)
|
|
log.debug('(%s) handle_315: adding mode %s +%s %s', self.name, mode, modechar, user)
|
|
if modechar:
|
|
modes.add((modechar, user))
|
|
except KeyError as e:
|
|
log.debug("(%s) Ignoring KeyError (%s) from WHO response; it's probably someone we "
|
|
"don't share any channels with", self.name, e)
|
|
|
|
if users:
|
|
return {'channel': channel, 'users': users, 'modes': modes,
|
|
'parse_as': "JOIN"}
|
|
|
|
def handle_433(self, source, command, args):
|
|
# <- :millennium.overdrivenetworks.com 433 * ice :Nickname is already in use.
|
|
|
|
self._nick_fails += 1
|
|
newnick = self.pseudoclient.nick = world.services['pylink'].get_nick(self, fails=self._nick_fails)
|
|
log.debug('(%s) _nick_fails = %s, trying new nick %r', self.name, self._nick_fails, newnick)
|
|
|
|
self.send('NICK %s' % newnick)
|
|
handle_432 = handle_437 = handle_433
|
|
|
|
def handle_account(self, source, command, args):
|
|
"""
|
|
Handles IRCv3 account-notify messages.
|
|
"""
|
|
# <- :nick!user@host ACCOUNT accountname
|
|
# <- :nick!user@host ACCOUNT *
|
|
|
|
self._set_account_name(source, args[0])
|
|
|
|
def handle_join(self, source, command, args):
|
|
"""
|
|
Handles incoming JOINs, as well as JOIN acknowledgements for us.
|
|
"""
|
|
# Classic format:
|
|
# <- :GL|!~GL@127.0.0.1 JOIN #whatever
|
|
# With extended-join:
|
|
# <- :GL|!~GL@127.0.0.1 JOIN #whatever accountname :realname
|
|
channel = args[0]
|
|
self._channels[channel].users.add(source)
|
|
self.users[source].channels.add(channel)
|
|
|
|
if len(args) >= 3:
|
|
self._set_account_name(source, args[1])
|
|
# Hmm, because _get_UID only looks at the sender prefix, it doesn't
|
|
# have a way to process the realname info from JOIN yet...
|
|
self.update_client(source, 'GECOS', args[2])
|
|
|
|
# Only fetch modes, TS, and user hosts once we're actually in the channel.
|
|
# The IRCd will send us a JOIN with our nick!user@host if our JOIN succeeded.
|
|
if self.pseudoclient and source == self.pseudoclient.uid:
|
|
self.send('MODE %s' % channel)
|
|
self._send_who(channel)
|
|
|
|
if self.serverdata.get('fetch_ban_lists', False):
|
|
self.send('MODE %s +b' % channel)
|
|
|
|
for m in ('banexception', 'invex'):
|
|
if m in self.cmodes:
|
|
self.send('MODE %s +%s' % (channel, self.cmodes[m]))
|
|
else:
|
|
self.call_hooks([source, 'CLIENTBOT_JOIN', {'channel': channel}])
|
|
return {'channel': channel, 'users': [source], 'modes': self._channels[channel].modes}
|
|
|
|
def handle_kick(self, source, command, args):
|
|
"""
|
|
Handles incoming KICKs.
|
|
"""
|
|
# <- :GL!~gl@127.0.0.1 KICK #whatever GL| :xd
|
|
channel = args[0]
|
|
target = self.nick_to_uid(args[1])
|
|
|
|
try:
|
|
reason = args[2]
|
|
except IndexError:
|
|
reason = ''
|
|
|
|
if channel in self.kick_queue:
|
|
# Remove this client from the kick queue if present there.
|
|
log.debug('(%s) kick: removing %s from kick queue for channel %s', self.name, target, channel)
|
|
self.kick_queue[channel][0].discard(target)
|
|
|
|
if not self.kick_queue[channel][0]:
|
|
log.debug('(%s) kick: cancelling kick timer for channel %s (all kicks accounted for)', self.name, channel)
|
|
# There aren't any kicks that failed to be acknowledged. We can remove the timer now
|
|
self.kick_queue[channel][1].cancel()
|
|
del self.kick_queue[channel]
|
|
|
|
# Statekeeping: remove the target from the channel they were previously in.
|
|
self._channels[channel].remove_user(target)
|
|
try:
|
|
self.users[target].channels.remove(channel)
|
|
except KeyError:
|
|
pass
|
|
|
|
if (not self.is_internal_client(source)) and not self.is_internal_server(source):
|
|
# Don't repeat hooks if we're the kicker.
|
|
self.call_hooks([source, 'KICK', {'channel': channel, 'target': target, 'text': reason}])
|
|
|
|
# Delete channels that we were kicked from, for better state keeping.
|
|
if self.pseudoclient and target == self.pseudoclient.uid:
|
|
del self._channels[channel]
|
|
|
|
def handle_mode(self, source, command, args):
|
|
"""Handles MODE changes."""
|
|
# <- :GL!~gl@127.0.0.1 MODE #dev +v ice
|
|
# <- :ice MODE ice :+Zi
|
|
target = args[0]
|
|
if self.is_channel(target):
|
|
oldobj = self._channels[target].deepcopy()
|
|
else:
|
|
target = self.nick_to_uid(target)
|
|
oldobj = None
|
|
modes = args[1:]
|
|
changedmodes = self.parse_modes(target, modes)
|
|
self.apply_modes(target, changedmodes)
|
|
|
|
if self.is_internal_client(target):
|
|
log.debug('(%s) Suppressing MODE change hook for internal client %s', self.name, target)
|
|
return
|
|
if changedmodes:
|
|
# Prevent infinite loops: don't send MODE hooks if the sender is US.
|
|
# Note: this is not the only check in Clientbot to prevent mode loops: if our nick
|
|
# somehow gets desynced, this may not catch everything it's supposed to.
|
|
if (self.pseudoclient and source != self.pseudoclient.uid) or not self.pseudoclient:
|
|
return {'target': target, 'modes': changedmodes, 'channeldata': oldobj}
|
|
|
|
def handle_324(self, source, command, args):
|
|
"""Handles MODE announcements via RPL_CHANNELMODEIS (i.e. the response to /mode #channel)"""
|
|
# -> MODE #test
|
|
# <- :midnight.vpn 324 GL #test +nt
|
|
# <- :midnight.vpn 329 GL #test 1491773459
|
|
channel = args[1]
|
|
modes = args[2:]
|
|
log.debug('(%s) Got RPL_CHANNELMODEIS (324) modes %s for %s', self.name, modes, channel)
|
|
changedmodes = self.parse_modes(channel, modes)
|
|
self.apply_modes(channel, changedmodes)
|
|
|
|
def handle_329(self, source, command, args):
|
|
"""Handles TS announcements via RPL_CREATIONTIME."""
|
|
channel = args[1]
|
|
ts = int(args[2])
|
|
self._channels[channel].ts = ts
|
|
|
|
def handle_chghost(self, source, command, args):
|
|
"""Handles the IRCv3 CHGHOST command."""
|
|
# <- :nick!user@host CHGHOST ident new.host
|
|
|
|
ident = self.users[source].ident
|
|
host = self.users[source].host
|
|
|
|
self.users[source].ident = newident = args[0]
|
|
self.users[source].host = newhost = args[1]
|
|
|
|
if ident != newident:
|
|
self.call_hooks([source, 'CHGIDENT',
|
|
{'target': source, 'newident': newident}])
|
|
|
|
if host != newhost:
|
|
self.call_hooks([source, 'CHGHOST',
|
|
{'target': source, 'newhost': newhost}])
|
|
|
|
def handle_nick(self, source, command, args):
|
|
"""Handles NICK changes."""
|
|
# <- :GL|!~GL@127.0.0.1 NICK :GL_
|
|
|
|
if not self.connected.is_set():
|
|
# We haven't properly logged on yet, so any initial NICK should be treated as a forced
|
|
# nick change for us. For example, this clause is used to handle forced nick changes
|
|
# sent by ZNC, when the login nick and the actual IRC nick of the bouncer differ.
|
|
self.pseudoclient.nick = args[0]
|
|
log.debug('(%s) Pre-auth FNC: Changing our nick to %s', self.name, args[0])
|
|
return
|
|
elif source == self.pseudoclient.uid:
|
|
self._nick_fails = 0 # Our last nick change succeeded.
|
|
|
|
oldnick = self.users[source].nick
|
|
self.users[source].nick = args[0]
|
|
|
|
return {'newnick': args[0], 'oldnick': oldnick}
|
|
|
|
def handle_part(self, source, command, args):
|
|
"""
|
|
Handles incoming PARTs.
|
|
"""
|
|
# <- :GL|!~GL@127.0.0.1 PART #whatever
|
|
channels = list(map(self.to_lower, args[0].split(',')))
|
|
try:
|
|
reason = args[1]
|
|
except IndexError:
|
|
reason = ''
|
|
|
|
for channel in channels:
|
|
self._channels[channel].remove_user(source)
|
|
self.users[source].channels -= set(channels)
|
|
|
|
self.call_hooks([source, 'PART', {'channels': channels, 'text': reason}])
|
|
|
|
# Clear channels that are empty, or that we're parting.
|
|
for channel in channels:
|
|
if (self.pseudoclient and source == self.pseudoclient.uid) or not self._channels[channel].users:
|
|
del self._channels[channel]
|
|
|
|
def handle_ping(self, source, command, args):
|
|
"""
|
|
Handles incoming PING requests.
|
|
"""
|
|
self.send('PONG :%s' % args[0], queue=False)
|
|
|
|
def handle_privmsg(self, source, command, args):
|
|
"""Handles incoming PRIVMSG/NOTICE."""
|
|
# <- :sender PRIVMSG #dev :afasfsa
|
|
# <- :sender NOTICE somenick :afasfsa
|
|
target = args[0]
|
|
|
|
if self.is_internal_client(source) or self.is_internal_server(source):
|
|
log.warning('(%s) Received %s to %s being routed the wrong way!', self.name, command, target)
|
|
return
|
|
|
|
if not self.is_channel(target):
|
|
target = self.nick_to_uid(target)
|
|
|
|
if target:
|
|
return {'target': target, 'text': args[1]}
|
|
handle_notice = handle_privmsg
|
|
|
|
def handle_quit(self, source, command, args):
|
|
"""Handles incoming QUITs."""
|
|
if self.pseudoclient and source == self.pseudoclient.uid:
|
|
# Someone faked a quit from us? We should abort.
|
|
raise ProtocolError("Received QUIT from uplink (%s)" % args[0])
|
|
|
|
self.quit(source, args[0])
|
|
return {'text': args[0]}
|
|
|
|
def handle_404(self, source, command, args):
|
|
"""
|
|
Handles ERR_CANNOTSENDTOCHAN and other similar numerics.
|
|
"""
|
|
# <- :some.server 404 james #test :Cannot send to channel
|
|
if len(args) >= 2 and self.is_channel(args[1]):
|
|
channel = args[1]
|
|
f = log.warning
|
|
|
|
# Don't sent the warning multiple times to prevent flood if the target
|
|
# is a log chan.
|
|
if hasattr(self.channels[channel], '_clientbot_cannot_send_warned'):
|
|
f = log.debug
|
|
f('(%s) Failed to send message to %s: %s', self.name, channel, args[-1])
|
|
|
|
self.channels[channel]._clientbot_cannot_send_warned = True
|
|
|
|
# 408: ERR_NOCOLORSONCHAN on Bahamut, ERR_NOCTRLSONCHAN on Hybrid
|
|
handle_408 = handle_404
|
|
# 492: ERR_NOCTCP on Hybrid
|
|
handle_492 = handle_404
|
|
|
|
def handle_367(self, source, command, args, banmode='b'):
|
|
"""
|
|
Handles RPL_BANLIST, used to enumerate bans.
|
|
"""
|
|
# <- :irc3.lose-the-game.nat 367 james #test *!*@1.2.3.4 james 1504560159
|
|
channel = args[1]
|
|
target = args[2]
|
|
if channel not in self.channels:
|
|
log.warning('(%s) got ban mode +%s %s on unknown channel %s?', self.name, banmode, target)
|
|
else:
|
|
# Just apply the mode; we send out a mode hook only when the corresponding ban list has finished sending.
|
|
self.apply_modes(channel, [('+%s' % banmode, target)])
|
|
|
|
def handle_368(self, source, command, args, banmode='b'):
|
|
"""
|
|
Handles RPL_ENDOFBANLIST, used to end off ban lists.
|
|
"""
|
|
# <- :irc3.lose-the-game.nat 368 james #test :End of Channel Ban List
|
|
channel = args[1]
|
|
# Send out the hook. We don't worry about repeats since these modes don't need to be
|
|
# enumerated more than once per JOIN anyways.
|
|
return {'target': channel, 'parse_as': 'MODE',
|
|
'modes': [('+%s' % banmode, m[1]) for m in self.channels[channel].modes if m[0] == banmode]}
|
|
|
|
def handle_346(self, *args):
|
|
"""
|
|
Handles RPL_INVITELIST, used to enumerate invite exceptions.
|
|
"""
|
|
return self.handle_367(*args, banmode=self.cmodes.get('invex', 'I'))
|
|
|
|
def handle_347(self, *args):
|
|
"""
|
|
Handles RPL_ENDOFINVITELIST, used to end off invite exception lists.
|
|
"""
|
|
if 'invex' not in self.cmodes:
|
|
log.warning('(%s) Got 347 / RPL_ENDOFINVITELIST even though invex is not a registered mode?', self.name)
|
|
return self.handle_368(*args, banmode=self.cmodes.get('invex', 'I'))
|
|
|
|
def handle_348(self, *args):
|
|
"""
|
|
Handles RPL_EXCEPTLIST, used to enumerate ban exceptions.
|
|
"""
|
|
return self.handle_367(*args, banmode=self.cmodes.get('banexception', 'e'))
|
|
|
|
def handle_349(self, *args):
|
|
"""
|
|
Handles RPL_ENDOFEXCEPTLIST, used to end off ban exception lists.
|
|
"""
|
|
if 'banexception' not in self.cmodes:
|
|
log.warning('(%s) Got 349 / RPL_ENDOFEXCEPTLIST even though banexception is not a registered mode?', self.name)
|
|
return self.handle_368(*args, banmode=self.cmodes.get('banexception', 'e'))
|
|
|
|
Class = ClientbotWrapperProtocol
|