3
0
mirror of https://github.com/ergochat/ergo.git synced 2024-12-29 14:12:38 +01:00
ergo/irc/client_lookup_set.go

392 lines
9.7 KiB
Go
Raw Normal View History

// Copyright (c) 2012-2014 Jeremy Latt
2017-03-27 14:15:02 +02:00
// Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
// released under the MIT license
2014-03-06 22:10:54 +01:00
package irc
import (
"regexp"
2014-03-06 22:10:54 +01:00
"strings"
2019-10-10 10:17:44 +02:00
"time"
2017-06-15 18:14:19 +02:00
"github.com/goshuirc/irc-go/ircmatch"
"github.com/oragono/oragono/irc/caps"
"github.com/oragono/oragono/irc/modes"
2017-06-15 18:14:19 +02:00
"sync"
2014-03-06 22:10:54 +01:00
)
2017-11-22 10:41:11 +01:00
// ClientManager keeps track of clients by nick, enforcing uniqueness of casefolded nicks
type ClientManager struct {
sync.RWMutex // tier 2
2017-11-22 22:35:38 +01:00
byNick map[string]*Client
bySkeleton map[string]*Client
2014-03-06 22:10:54 +01:00
}
2019-03-12 00:24:45 +01:00
// Initialize initializes a ClientManager.
func (clients *ClientManager) Initialize() {
clients.byNick = make(map[string]*Client)
clients.bySkeleton = make(map[string]*Client)
2014-03-06 22:10:54 +01:00
}
2017-11-22 10:41:11 +01:00
// Count returns how many clients are in the manager.
func (clients *ClientManager) Count() int {
clients.RLock()
defer clients.RUnlock()
count := len(clients.byNick)
return count
2016-11-06 02:05:29 +01:00
}
2017-11-22 10:41:11 +01:00
// Get retrieves a client from the manager, if they exist.
func (clients *ClientManager) Get(nick string) *Client {
2016-10-16 12:14:56 +02:00
casefoldedName, err := CasefoldName(nick)
if err == nil {
2017-11-22 10:41:11 +01:00
clients.RLock()
defer clients.RUnlock()
cli := clients.byNick[casefoldedName]
return cli
}
return nil
}
func (clients *ClientManager) removeInternal(client *Client) (err error) {
2017-11-22 22:35:38 +01:00
// requires holding the writable Lock()
oldcfnick, oldskeleton := client.uniqueIdentifiers()
if oldcfnick == "*" || oldcfnick == "" {
return errNickMissing
}
2017-11-22 10:41:11 +01:00
currentEntry, present := clients.byNick[oldcfnick]
if present {
if currentEntry == client {
delete(clients.byNick, oldcfnick)
} else {
// this shouldn't happen, but we can ignore it
client.server.logger.Warning("internal", "clients for nick out of sync", oldcfnick)
err = errNickMissing
2017-11-22 10:41:11 +01:00
}
} else {
err = errNickMissing
}
currentEntry, present = clients.bySkeleton[oldskeleton]
if present {
if currentEntry == client {
delete(clients.bySkeleton, oldskeleton)
} else {
client.server.logger.Warning("internal", "clients for skeleton out of sync", oldskeleton)
err = errNickMissing
}
} else {
err = errNickMissing
2014-03-06 22:10:54 +01:00
}
2017-11-22 10:41:11 +01:00
return
2014-03-06 22:10:54 +01:00
}
2017-03-25 00:19:13 +01:00
// Remove removes a client from the lookup set.
2017-11-22 10:41:11 +01:00
func (clients *ClientManager) Remove(client *Client) error {
clients.Lock()
defer clients.Unlock()
return clients.removeInternal(client)
}
2019-05-22 03:40:25 +02:00
// Handles a RESUME by attaching a session to a designated client. It is the
// caller's responsibility to verify that the resume is allowed (checking tokens,
// TLS status, etc.) before calling this.
func (clients *ClientManager) Resume(oldClient *Client, session *Session) (err error) {
clients.Lock()
defer clients.Unlock()
2019-05-22 03:40:25 +02:00
cfnick := oldClient.NickCasefolded()
if _, ok := clients.byNick[cfnick]; !ok {
return errNickMissing
}
2019-05-22 03:40:25 +02:00
if !oldClient.AddSession(session) {
return errNickMissing
}
2014-03-06 22:10:54 +01:00
return nil
}
2017-11-22 10:41:11 +01:00
// SetNick sets a client's nickname, validating it against nicknames in use
func (clients *ClientManager) SetNick(client *Client, session *Session, newNick string) error {
if len(newNick) > client.server.Config().Limits.NickLen {
return errNicknameInvalid
}
2017-11-22 10:41:11 +01:00
newcfnick, err := CasefoldName(newNick)
2016-11-16 03:02:22 +01:00
if err != nil {
return errNicknameInvalid
2016-11-16 03:02:22 +01:00
}
newSkeleton, err := Skeleton(newNick)
if err != nil {
return errNicknameInvalid
}
if restrictedCasefoldedNicks[newcfnick] || restrictedSkeletons[newSkeleton] {
return errNicknameInvalid
}
2016-11-16 03:02:22 +01:00
reservedAccount, method := client.server.accounts.EnforcementStatus(newcfnick, newSkeleton)
account := client.Account()
2019-05-19 10:27:44 +02:00
config := client.server.Config()
var bouncerAllowed bool
if config.Accounts.Bouncer.Enabled {
if session != nil && session.capabilities.Has(caps.Bouncer) {
bouncerAllowed = true
} else {
settings := client.AccountSettings()
if config.Accounts.Bouncer.AllowedByDefault && settings.AllowBouncer != BouncerDisallowedByUser {
bouncerAllowed = true
} else if settings.AllowBouncer == BouncerAllowedByUser {
bouncerAllowed = true
}
}
}
2017-11-22 10:41:11 +01:00
clients.Lock()
defer clients.Unlock()
2016-11-16 03:02:22 +01:00
currentClient := clients.byNick[newcfnick]
2017-11-22 10:41:11 +01:00
// the client may just be changing case
if currentClient != nil && currentClient != client && session != nil {
// these conditions forbid reattaching to an existing session:
2019-09-25 03:47:37 +02:00
if client.Registered() || !bouncerAllowed || account == "" || account != currentClient.Account() || client.HasMode(modes.TLS) != currentClient.HasMode(modes.TLS) {
return errNicknameInUse
}
if !currentClient.AddSession(session) {
return errNicknameInUse
}
2019-05-09 00:14:49 +02:00
// successful reattach!
return nil
2016-11-16 03:02:22 +01:00
}
// analogous checks for skeletons
skeletonHolder := clients.bySkeleton[newSkeleton]
if skeletonHolder != nil && skeletonHolder != client {
return errNicknameInUse
}
2019-05-19 10:27:44 +02:00
if method == NickEnforcementStrict && reservedAccount != "" && reservedAccount != account {
return errNicknameReserved
}
clients.removeInternal(client)
2017-11-22 10:41:11 +01:00
clients.byNick[newcfnick] = client
clients.bySkeleton[newSkeleton] = client
client.updateNick(newNick, newcfnick, newSkeleton)
2017-11-22 10:41:11 +01:00
return nil
}
2016-11-16 03:02:22 +01:00
2017-11-22 10:41:11 +01:00
func (clients *ClientManager) AllClients() (result []*Client) {
clients.RLock()
defer clients.RUnlock()
result = make([]*Client, len(clients.byNick))
i := 0
2017-11-22 22:35:38 +01:00
for _, client := range clients.byNick {
2017-11-22 10:41:11 +01:00
result[i] = client
i++
2016-11-16 03:02:22 +01:00
}
2017-11-22 10:41:11 +01:00
return
2016-11-16 03:02:22 +01:00
}
2017-03-25 00:19:13 +01:00
// AllWithCaps returns all clients with the given capabilities.
func (clients *ClientManager) AllWithCaps(capabs ...caps.Capability) (sessions []*Session) {
2017-11-22 10:41:11 +01:00
clients.RLock()
defer clients.RUnlock()
for _, client := range clients.byNick {
for _, session := range client.Sessions() {
if session.capabilities.HasAll(capabs...) {
sessions = append(sessions, session)
}
}
}
return
}
// AllWithCapsNotify returns all clients with the given capabilities, and that support cap-notify.
func (clients *ClientManager) AllWithCapsNotify(capabs ...caps.Capability) (sessions []*Session) {
2019-04-28 07:57:42 +02:00
capabs = append(capabs, caps.CapNotify)
clients.RLock()
defer clients.RUnlock()
for _, client := range clients.byNick {
for _, session := range client.Sessions() {
2019-04-28 07:57:42 +02:00
// cap-notify is implicit in cap version 302 and above
if session.capabilities.HasAll(capabs...) || 302 <= session.capVersion {
sessions = append(sessions, session)
}
}
}
return
}
2017-03-25 00:19:13 +01:00
// FindAll returns all clients that match the given userhost mask.
2017-11-22 10:41:11 +01:00
func (clients *ClientManager) FindAll(userhost string) (set ClientSet) {
2014-03-06 22:10:54 +01:00
set = make(ClientSet)
2019-07-14 22:17:37 +02:00
userhost, err := CanonicalizeMaskWildcard(userhost)
if err != nil {
return set
}
matcher := ircmatch.MakeMatch(userhost)
2017-11-22 10:41:11 +01:00
clients.RLock()
defer clients.RUnlock()
for _, client := range clients.byNick {
2018-12-30 12:45:23 +01:00
if matcher.Match(client.NickMaskCasefolded()) {
set.Add(client)
2014-03-06 22:10:54 +01:00
}
}
return set
2014-03-06 22:10:54 +01:00
}
2014-03-08 02:09:49 +01:00
//
// usermask to regexp
//
//TODO(dan): move this over to generally using glob syntax instead?
// kinda more expected in normal ban/etc masks, though regex is useful (probably as an extban?)
2017-10-05 15:29:34 +02:00
2019-10-10 10:17:44 +02:00
type MaskInfo struct {
TimeCreated time.Time
CreatorNickmask string
CreatorAccount string
}
2017-10-05 15:29:34 +02:00
// UserMaskSet holds a set of client masks and lets you match hostnames to them.
2014-03-08 02:09:49 +01:00
type UserMaskSet struct {
2017-10-23 01:50:16 +02:00
sync.RWMutex
2019-10-10 10:17:44 +02:00
masks map[string]MaskInfo
2014-03-08 02:09:49 +01:00
regexp *regexp.Regexp
}
func NewUserMaskSet() *UserMaskSet {
2019-10-10 10:17:44 +02:00
return new(UserMaskSet)
2014-03-08 02:09:49 +01:00
}
2017-10-05 15:29:34 +02:00
// Add adds the given mask to this set.
2019-10-13 12:07:30 +02:00
func (set *UserMaskSet) Add(mask, creatorNickmask, creatorAccount string) (maskAdded string, err error) {
2019-10-10 10:17:44 +02:00
casefoldedMask, err := CanonicalizeMaskWildcard(mask)
if err != nil {
2019-10-13 12:07:30 +02:00
return
}
2017-10-23 01:50:16 +02:00
set.Lock()
2019-10-10 10:17:44 +02:00
if set.masks == nil {
set.masks = make(map[string]MaskInfo)
}
2019-10-10 10:17:44 +02:00
_, present := set.masks[casefoldedMask]
2019-10-13 12:07:30 +02:00
if !present {
maskAdded = casefoldedMask
2019-10-10 10:17:44 +02:00
set.masks[casefoldedMask] = MaskInfo{
TimeCreated: time.Now().UTC(),
CreatorNickmask: creatorNickmask,
CreatorAccount: creatorAccount,
}
}
2019-10-10 10:17:44 +02:00
set.Unlock()
2019-10-13 12:07:30 +02:00
if !present {
set.setRegexp()
}
return
}
2017-10-05 15:29:34 +02:00
// Remove removes the given mask from this set.
2019-10-13 12:07:30 +02:00
func (set *UserMaskSet) Remove(mask string) (maskRemoved string, err error) {
mask, err = CanonicalizeMaskWildcard(mask)
2019-10-10 10:17:44 +02:00
if err != nil {
2019-10-13 12:07:30 +02:00
return
2019-10-10 10:17:44 +02:00
}
2017-10-23 01:50:16 +02:00
set.Lock()
2019-10-13 12:07:30 +02:00
_, removed := set.masks[mask]
if removed {
2019-10-13 12:07:30 +02:00
maskRemoved = mask
delete(set.masks, mask)
}
2017-10-23 01:50:16 +02:00
set.Unlock()
if removed {
2017-10-23 01:50:16 +02:00
set.setRegexp()
2014-03-08 02:35:58 +01:00
}
return
2014-03-08 02:09:49 +01:00
}
2019-10-10 10:17:44 +02:00
func (set *UserMaskSet) SetMasks(masks map[string]MaskInfo) {
set.Lock()
set.masks = masks
set.Unlock()
set.setRegexp()
}
func (set *UserMaskSet) Masks() (result map[string]MaskInfo) {
set.RLock()
defer set.RUnlock()
result = make(map[string]MaskInfo, len(set.masks))
for mask, info := range set.masks {
result[mask] = info
}
return
}
2017-10-05 15:29:34 +02:00
// Match matches the given n!u@h.
func (set *UserMaskSet) Match(userhost string) bool {
2017-10-23 01:50:16 +02:00
set.RLock()
regexp := set.regexp
set.RUnlock()
if regexp == nil {
2014-03-08 02:09:49 +01:00
return false
}
2017-10-23 01:50:16 +02:00
return regexp.MatchString(userhost)
2014-03-08 02:09:49 +01:00
}
2017-10-23 01:50:16 +02:00
func (set *UserMaskSet) Length() int {
set.RLock()
defer set.RUnlock()
return len(set.masks)
}
2017-10-05 15:29:34 +02:00
// setRegexp generates a regular expression from the set of user mask
// strings. Masks are split at the two types of wildcards, `*` and
// `?`. All the pieces are meta-escaped. `*` is replaced with `.*`,
// the regexp equivalent. Likewise, `?` is replaced with `.`. The
// parts are re-joined and finally all masks are joined into a big
// or-expression.
2014-03-08 02:09:49 +01:00
func (set *UserMaskSet) setRegexp() {
2017-10-23 01:50:16 +02:00
var re *regexp.Regexp
2014-03-08 02:09:49 +01:00
2017-10-23 01:50:16 +02:00
set.RLock()
2014-03-08 02:09:49 +01:00
maskExprs := make([]string, len(set.masks))
index := 0
for mask := range set.masks {
manyParts := strings.Split(mask, "*")
2014-03-08 02:09:49 +01:00
manyExprs := make([]string, len(manyParts))
for mindex, manyPart := range manyParts {
oneParts := strings.Split(manyPart, "?")
oneExprs := make([]string, len(oneParts))
for oindex, onePart := range oneParts {
oneExprs[oindex] = regexp.QuoteMeta(onePart)
}
manyExprs[mindex] = strings.Join(oneExprs, ".")
}
maskExprs[index] = strings.Join(manyExprs, ".*")
2017-10-23 01:50:16 +02:00
index++
2014-03-08 02:09:49 +01:00
}
2017-10-23 01:50:16 +02:00
set.RUnlock()
if index > 0 {
expr := "^" + strings.Join(maskExprs, "|") + "$"
re, _ = regexp.Compile(expr)
}
set.Lock()
set.regexp = re
set.Unlock()
2014-03-08 02:09:49 +01:00
}