3
0
mirror of https://github.com/ergochat/ergo.git synced 2024-12-30 14:42:50 +01:00
ergo/irc/client_lookup_set.go

304 lines
8.6 KiB
Go
Raw Normal View History

// Copyright (c) 2012-2014 Jeremy Latt
2017-03-27 14:15:02 +02:00
// Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
// released under the MIT license
2014-03-06 22:10:54 +01:00
package irc
import (
"strings"
2020-05-13 09:41:00 +02:00
"sync"
2021-05-25 06:34:38 +02:00
"github.com/ergochat/ergo/irc/caps"
"github.com/ergochat/ergo/irc/modes"
"github.com/ergochat/ergo/irc/utils"
2014-03-06 22:10:54 +01:00
)
2017-11-22 10:41:11 +01:00
// ClientManager keeps track of clients by nick, enforcing uniqueness of casefolded nicks
type ClientManager struct {
sync.RWMutex // tier 2
2017-11-22 22:35:38 +01:00
byNick map[string]*Client
bySkeleton map[string]*Client
2014-03-06 22:10:54 +01:00
}
2019-03-12 00:24:45 +01:00
// Initialize initializes a ClientManager.
func (clients *ClientManager) Initialize() {
clients.byNick = make(map[string]*Client)
clients.bySkeleton = make(map[string]*Client)
2014-03-06 22:10:54 +01:00
}
2017-11-22 10:41:11 +01:00
// Get retrieves a client from the manager, if they exist.
func (clients *ClientManager) Get(nick string) *Client {
2016-10-16 12:14:56 +02:00
casefoldedName, err := CasefoldName(nick)
if err == nil {
2017-11-22 10:41:11 +01:00
clients.RLock()
defer clients.RUnlock()
cli := clients.byNick[casefoldedName]
return cli
}
return nil
}
2020-08-30 05:40:49 +02:00
func (clients *ClientManager) removeInternal(client *Client, oldcfnick, oldskeleton string) (err error) {
2017-11-22 22:35:38 +01:00
// requires holding the writable Lock()
if oldcfnick == "*" || oldcfnick == "" {
return errNickMissing
}
2017-11-22 10:41:11 +01:00
currentEntry, present := clients.byNick[oldcfnick]
if present {
if currentEntry == client {
delete(clients.byNick, oldcfnick)
} else {
// this shouldn't happen, but we can ignore it
client.server.logger.Warning("internal", "clients for nick out of sync", oldcfnick)
err = errNickMissing
2017-11-22 10:41:11 +01:00
}
} else {
err = errNickMissing
}
currentEntry, present = clients.bySkeleton[oldskeleton]
if present {
if currentEntry == client {
delete(clients.bySkeleton, oldskeleton)
} else {
client.server.logger.Warning("internal", "clients for skeleton out of sync", oldskeleton)
err = errNickMissing
}
} else {
err = errNickMissing
2014-03-06 22:10:54 +01:00
}
2017-11-22 10:41:11 +01:00
return
2014-03-06 22:10:54 +01:00
}
2017-03-25 00:19:13 +01:00
// Remove removes a client from the lookup set.
2017-11-22 10:41:11 +01:00
func (clients *ClientManager) Remove(client *Client) error {
clients.Lock()
defer clients.Unlock()
2020-08-30 05:40:49 +02:00
oldcfnick, oldskeleton := client.uniqueIdentifiers()
return clients.removeInternal(client, oldcfnick, oldskeleton)
}
2017-11-22 10:41:11 +01:00
// SetNick sets a client's nickname, validating it against nicknames in use
2020-10-07 00:04:29 +02:00
// XXX: dryRun validates a client's ability to claim a nick, without
// actually claiming it
func (clients *ClientManager) SetNick(client *Client, session *Session, newNick string, dryRun bool) (setNick string, err error, returnedFromAway bool) {
config := client.server.Config()
2020-03-19 10:09:25 +01:00
var newCfNick, newSkeleton string
2016-11-16 03:02:22 +01:00
client.stateMutex.RLock()
account := client.account
accountName := client.accountName
settings := client.accountSettings
registered := client.registered
realname := client.realname
client.stateMutex.RUnlock()
2020-12-07 09:51:52 +01:00
if newNick != accountName && strings.ContainsAny(newNick, disfavoredNameCharacters) {
return "", errNicknameInvalid, false
}
2020-03-16 12:54:50 +01:00
// recompute always-on status, because client.alwaysOn is not set for unregistered clients
var alwaysOn, useAccountName bool
if account != "" {
alwaysOn = persistenceEnabled(config.Accounts.Multiclient.AlwaysOn, settings.AlwaysOn)
useAccountName = alwaysOn || config.Accounts.NickReservation.ForceNickEqualsAccount
2020-03-16 12:54:50 +01:00
}
2020-03-16 12:54:50 +01:00
if useAccountName {
if registered && newNick != accountName && newNick != "" {
2020-05-19 20:12:20 +02:00
return "", errNickAccountMismatch, false
2020-03-16 12:54:50 +01:00
}
newNick = accountName
2020-03-19 10:09:25 +01:00
newCfNick = account
2020-03-16 12:54:50 +01:00
newSkeleton, err = Skeleton(newNick)
if err != nil {
2020-05-19 20:12:20 +02:00
return "", errNicknameInvalid, false
2020-03-16 12:54:50 +01:00
}
} else {
newNick = strings.TrimSpace(newNick)
if len(newNick) == 0 {
2020-05-19 20:12:20 +02:00
return "", errNickMissing, false
2020-03-16 12:54:50 +01:00
}
2020-10-07 14:54:46 +02:00
if account == "" && config.Accounts.NickReservation.ForceGuestFormat && !dryRun {
2020-03-19 10:09:25 +01:00
newCfNick, err = CasefoldName(newNick)
2020-03-19 10:08:53 +01:00
if err != nil {
2020-05-19 20:12:20 +02:00
return "", errNicknameInvalid, false
2020-03-19 10:08:53 +01:00
}
2020-03-19 10:09:25 +01:00
if !config.Accounts.NickReservation.guestRegexpFolded.MatchString(newCfNick) {
2020-03-19 10:08:53 +01:00
newNick = strings.Replace(config.Accounts.NickReservation.GuestFormat, "*", newNick, 1)
2020-03-19 10:09:25 +01:00
newCfNick = "" // re-fold it below
2020-03-19 10:08:53 +01:00
}
2020-03-16 12:54:50 +01:00
}
2020-03-19 10:09:25 +01:00
if newCfNick == "" {
newCfNick, err = CasefoldName(newNick)
2020-03-19 10:08:53 +01:00
}
2020-03-16 12:54:50 +01:00
if err != nil {
2020-05-19 20:12:20 +02:00
return "", errNicknameInvalid, false
2020-03-16 12:54:50 +01:00
}
2020-03-19 10:09:25 +01:00
if len(newNick) > config.Limits.NickLen || len(newCfNick) > config.Limits.NickLen {
2020-05-19 20:12:20 +02:00
return "", errNicknameInvalid, false
2020-03-16 12:54:50 +01:00
}
newSkeleton, err = Skeleton(newNick)
if err != nil {
2020-05-19 20:12:20 +02:00
return "", errNicknameInvalid, false
2020-03-16 12:54:50 +01:00
}
2020-09-09 10:01:46 +02:00
if config.isRelaymsgIdentifier(newNick) {
return "", errNicknameInvalid, false
2020-06-08 02:19:28 +02:00
}
2020-08-23 04:43:21 +02:00
if restrictedCasefoldedNicks.Has(newCfNick) || restrictedSkeletons.Has(newSkeleton) {
2020-05-19 20:12:20 +02:00
return "", errNicknameInvalid, false
2020-03-16 12:54:50 +01:00
}
2020-03-19 10:09:25 +01:00
reservedAccount, method := client.server.accounts.EnforcementStatus(newCfNick, newSkeleton)
2020-03-16 12:54:50 +01:00
if method == NickEnforcementStrict && reservedAccount != "" && reservedAccount != account {
2020-05-19 20:12:20 +02:00
return "", errNicknameReserved, false
2020-03-16 12:54:50 +01:00
}
}
2019-05-19 10:27:44 +02:00
var bouncerAllowed bool
2020-02-21 05:55:42 +01:00
if config.Accounts.Multiclient.Enabled {
2020-03-16 12:54:50 +01:00
if useAccountName {
bouncerAllowed = true
2019-05-19 10:27:44 +02:00
} else {
2020-02-21 05:55:42 +01:00
if config.Accounts.Multiclient.AllowedByDefault && settings.AllowBouncer != MulticlientDisallowedByUser {
2019-05-19 10:27:44 +02:00
bouncerAllowed = true
2020-02-21 05:55:42 +01:00
} else if settings.AllowBouncer == MulticlientAllowedByUser {
2019-05-19 10:27:44 +02:00
bouncerAllowed = true
}
}
}
2017-11-22 10:41:11 +01:00
clients.Lock()
defer clients.Unlock()
2016-11-16 03:02:22 +01:00
2020-03-19 10:09:25 +01:00
currentClient := clients.byNick[newCfNick]
2017-11-22 10:41:11 +01:00
// the client may just be changing case
2020-10-07 14:54:46 +02:00
if currentClient != nil && currentClient != client {
// these conditions forbid reattaching to an existing session:
2020-10-07 14:54:46 +02:00
if registered || !bouncerAllowed || account == "" || account != currentClient.Account() ||
dryRun || session == nil {
2020-05-19 20:12:20 +02:00
return "", errNicknameInUse, false
}
2020-04-23 07:38:12 +02:00
// check TLS modes
if client.HasMode(modes.TLS) != currentClient.HasMode(modes.TLS) {
if useAccountName {
// #955: this is fatal because they can't fix it by trying a different nick
2020-05-19 20:12:20 +02:00
return "", errInsecureReattach, false
2020-04-23 07:38:12 +02:00
} else {
2020-05-19 20:12:20 +02:00
return "", errNicknameInUse, false
2020-04-23 07:38:12 +02:00
}
}
2020-05-19 20:12:20 +02:00
reattachSuccessful, numSessions, lastSeen, back := currentClient.AddSession(session)
if !reattachSuccessful {
2020-05-19 20:12:20 +02:00
return "", errNicknameInUse, false
}
if numSessions == 1 {
2020-03-06 10:21:21 +01:00
invisible := currentClient.HasMode(modes.Invisible)
operator := currentClient.HasMode(modes.Operator)
client.server.stats.AddRegistered(invisible, operator)
}
session.autoreplayMissedSince = lastSeen
2020-07-12 22:31:51 +02:00
// TODO: transition mechanism for #1065, clean this up eventually:
if currentClient.Realname() == "" {
currentClient.SetRealname(realname)
}
2019-05-09 00:14:49 +02:00
// successful reattach!
2020-05-19 20:12:20 +02:00
return newNick, nil, back
2020-05-17 19:39:37 +02:00
} else if currentClient == client && currentClient.Nick() == newNick {
2020-05-19 20:12:20 +02:00
return "", errNoop, false
2016-11-16 03:02:22 +01:00
}
// analogous checks for skeletons
skeletonHolder := clients.bySkeleton[newSkeleton]
if skeletonHolder != nil && skeletonHolder != client {
2020-05-19 20:12:20 +02:00
return "", errNicknameInUse, false
}
2020-03-16 12:54:50 +01:00
2020-10-07 00:04:29 +02:00
if dryRun {
return "", nil, false
}
2020-08-30 05:40:49 +02:00
formercfnick, formerskeleton := client.uniqueIdentifiers()
2020-08-06 09:16:58 +02:00
if changeSuccess := client.SetNick(newNick, newCfNick, newSkeleton); !changeSuccess {
return "", errClientDestroyed, false
}
2020-08-30 05:40:49 +02:00
clients.removeInternal(client, formercfnick, formerskeleton)
2020-03-19 10:09:25 +01:00
clients.byNick[newCfNick] = client
clients.bySkeleton[newSkeleton] = client
2020-05-19 20:12:20 +02:00
return newNick, nil, false
2017-11-22 10:41:11 +01:00
}
2016-11-16 03:02:22 +01:00
2017-11-22 10:41:11 +01:00
func (clients *ClientManager) AllClients() (result []*Client) {
clients.RLock()
defer clients.RUnlock()
result = make([]*Client, len(clients.byNick))
i := 0
2017-11-22 22:35:38 +01:00
for _, client := range clients.byNick {
2017-11-22 10:41:11 +01:00
result[i] = client
i++
2016-11-16 03:02:22 +01:00
}
2017-11-22 10:41:11 +01:00
return
2016-11-16 03:02:22 +01:00
}
// AllWithCapsNotify returns all clients with the given capabilities, and that support cap-notify.
func (clients *ClientManager) AllWithCapsNotify(capabs ...caps.Capability) (sessions []*Session) {
2019-04-28 07:57:42 +02:00
capabs = append(capabs, caps.CapNotify)
clients.RLock()
defer clients.RUnlock()
for _, client := range clients.byNick {
for _, session := range client.Sessions() {
2019-04-28 07:57:42 +02:00
// cap-notify is implicit in cap version 302 and above
if session.capabilities.HasAll(capabs...) || 302 <= session.capVersion {
sessions = append(sessions, session)
}
}
}
return
}
2017-03-25 00:19:13 +01:00
// FindAll returns all clients that match the given userhost mask.
2017-11-22 10:41:11 +01:00
func (clients *ClientManager) FindAll(userhost string) (set ClientSet) {
2014-03-06 22:10:54 +01:00
set = make(ClientSet)
2019-07-14 22:17:37 +02:00
userhost, err := CanonicalizeMaskWildcard(userhost)
if err != nil {
return set
}
2020-05-13 09:41:00 +02:00
matcher, err := utils.CompileGlob(userhost, false)
if err != nil {
// not much we can do here
return
}
2017-11-22 10:41:11 +01:00
clients.RLock()
defer clients.RUnlock()
for _, client := range clients.byNick {
2020-05-13 09:41:00 +02:00
if matcher.MatchString(client.NickMaskCasefolded()) {
set.Add(client)
2014-03-06 22:10:54 +01:00
}
}
return set
2014-03-06 22:10:54 +01:00
}
// Determine the canonical / unfolded form of a nick, if a client matching it
// is present (or always-on).
func (clients *ClientManager) UnfoldNick(cfnick string) (nick string) {
clients.RLock()
c := clients.byNick[cfnick]
clients.RUnlock()
if c != nil {
return c.Nick()
} else {
return cfnick
}
}