2016-06-15 21:50:56 +10:00
|
|
|
// Copyright (c) 2012-2014 Jeremy Latt
|
2017-03-27 22:15:02 +10:00
|
|
|
// Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
|
2016-06-15 21:50:56 +10:00
|
|
|
// released under the MIT license
|
|
|
|
|
2014-03-06 13:10:54 -08:00
|
|
|
package irc
|
|
|
|
|
|
|
|
import (
|
2014-03-06 16:51:33 -08:00
|
|
|
"regexp"
|
2014-03-06 13:10:54 -08:00
|
|
|
"strings"
|
2020-05-13 03:41:00 -04:00
|
|
|
"sync"
|
2019-10-10 04:17:44 -04:00
|
|
|
"time"
|
2016-09-17 21:23:04 +10:00
|
|
|
|
2017-09-29 12:07:52 +10:00
|
|
|
"github.com/oragono/oragono/irc/caps"
|
2019-04-12 00:08:46 -04:00
|
|
|
"github.com/oragono/oragono/irc/modes"
|
2020-05-13 03:41:00 -04:00
|
|
|
"github.com/oragono/oragono/irc/utils"
|
2014-03-06 13:10:54 -08:00
|
|
|
)
|
|
|
|
|
2017-11-22 04:41:11 -05:00
|
|
|
// ClientManager keeps track of clients by nick, enforcing uniqueness of casefolded nicks
|
|
|
|
type ClientManager struct {
|
|
|
|
sync.RWMutex // tier 2
|
2017-11-22 16:35:38 -05:00
|
|
|
byNick map[string]*Client
|
2019-01-30 18:59:49 -05:00
|
|
|
bySkeleton map[string]*Client
|
2014-03-06 13:10:54 -08:00
|
|
|
}
|
|
|
|
|
2019-03-11 19:24:45 -04:00
|
|
|
// Initialize initializes a ClientManager.
|
|
|
|
func (clients *ClientManager) Initialize() {
|
|
|
|
clients.byNick = make(map[string]*Client)
|
|
|
|
clients.bySkeleton = make(map[string]*Client)
|
2014-03-06 13:10:54 -08:00
|
|
|
}
|
|
|
|
|
2017-11-22 04:41:11 -05:00
|
|
|
// Count returns how many clients are in the manager.
|
|
|
|
func (clients *ClientManager) Count() int {
|
|
|
|
clients.RLock()
|
|
|
|
defer clients.RUnlock()
|
|
|
|
count := len(clients.byNick)
|
2016-11-16 03:05:33 +10:00
|
|
|
return count
|
2016-11-06 11:05:29 +10:00
|
|
|
}
|
|
|
|
|
2017-11-22 04:41:11 -05:00
|
|
|
// Get retrieves a client from the manager, if they exist.
|
|
|
|
func (clients *ClientManager) Get(nick string) *Client {
|
2016-10-16 20:14:56 +10:00
|
|
|
casefoldedName, err := CasefoldName(nick)
|
|
|
|
if err == nil {
|
2017-11-22 04:41:11 -05:00
|
|
|
clients.RLock()
|
|
|
|
defer clients.RUnlock()
|
|
|
|
cli := clients.byNick[casefoldedName]
|
2016-11-16 03:05:33 +10:00
|
|
|
return cli
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-11-26 05:23:27 -05:00
|
|
|
func (clients *ClientManager) removeInternal(client *Client) (err error) {
|
2017-11-22 16:35:38 -05:00
|
|
|
// requires holding the writable Lock()
|
2019-01-30 18:59:49 -05:00
|
|
|
oldcfnick, oldskeleton := client.uniqueIdentifiers()
|
|
|
|
if oldcfnick == "*" || oldcfnick == "" {
|
|
|
|
return errNickMissing
|
|
|
|
}
|
|
|
|
|
2017-11-22 04:41:11 -05:00
|
|
|
currentEntry, present := clients.byNick[oldcfnick]
|
|
|
|
if present {
|
|
|
|
if currentEntry == client {
|
|
|
|
delete(clients.byNick, oldcfnick)
|
|
|
|
} else {
|
|
|
|
// this shouldn't happen, but we can ignore it
|
2018-12-31 11:33:42 -05:00
|
|
|
client.server.logger.Warning("internal", "clients for nick out of sync", oldcfnick)
|
2018-11-26 05:23:27 -05:00
|
|
|
err = errNickMissing
|
2017-11-22 04:41:11 -05:00
|
|
|
}
|
2019-01-30 18:59:49 -05:00
|
|
|
} else {
|
|
|
|
err = errNickMissing
|
|
|
|
}
|
|
|
|
|
|
|
|
currentEntry, present = clients.bySkeleton[oldskeleton]
|
|
|
|
if present {
|
|
|
|
if currentEntry == client {
|
|
|
|
delete(clients.bySkeleton, oldskeleton)
|
|
|
|
} else {
|
|
|
|
client.server.logger.Warning("internal", "clients for skeleton out of sync", oldskeleton)
|
|
|
|
err = errNickMissing
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
err = errNickMissing
|
2014-03-06 13:10:54 -08:00
|
|
|
}
|
2019-01-30 18:59:49 -05:00
|
|
|
|
2017-11-22 04:41:11 -05:00
|
|
|
return
|
2014-03-06 13:10:54 -08:00
|
|
|
}
|
|
|
|
|
2017-03-25 09:19:13 +10:00
|
|
|
// Remove removes a client from the lookup set.
|
2017-11-22 04:41:11 -05:00
|
|
|
func (clients *ClientManager) Remove(client *Client) error {
|
|
|
|
clients.Lock()
|
|
|
|
defer clients.Unlock()
|
|
|
|
|
2018-11-26 05:23:27 -05:00
|
|
|
return clients.removeInternal(client)
|
|
|
|
}
|
|
|
|
|
2019-05-21 21:40:25 -04:00
|
|
|
// Handles a RESUME by attaching a session to a designated client. It is the
|
|
|
|
// caller's responsibility to verify that the resume is allowed (checking tokens,
|
|
|
|
// TLS status, etc.) before calling this.
|
|
|
|
func (clients *ClientManager) Resume(oldClient *Client, session *Session) (err error) {
|
2018-11-26 05:23:27 -05:00
|
|
|
clients.Lock()
|
|
|
|
defer clients.Unlock()
|
|
|
|
|
2019-05-21 21:40:25 -04:00
|
|
|
cfnick := oldClient.NickCasefolded()
|
|
|
|
if _, ok := clients.byNick[cfnick]; !ok {
|
|
|
|
return errNickMissing
|
2018-11-26 05:23:27 -05:00
|
|
|
}
|
|
|
|
|
2020-05-19 14:12:20 -04:00
|
|
|
success, _, _, _ := oldClient.AddSession(session)
|
2020-02-18 19:38:42 -05:00
|
|
|
if !success {
|
2019-05-21 21:40:25 -04:00
|
|
|
return errNickMissing
|
|
|
|
}
|
2018-11-26 05:23:27 -05:00
|
|
|
|
2014-03-06 13:10:54 -08:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-11-22 04:41:11 -05:00
|
|
|
// SetNick sets a client's nickname, validating it against nicknames in use
|
2020-05-19 14:12:20 -04:00
|
|
|
func (clients *ClientManager) SetNick(client *Client, session *Session, newNick string) (setNick string, err error, returnedFromAway bool) {
|
2020-02-20 18:19:17 -05:00
|
|
|
config := client.server.Config()
|
2019-05-24 13:09:56 -04:00
|
|
|
|
2020-03-19 05:09:25 -04:00
|
|
|
var newCfNick, newSkeleton string
|
2016-11-16 12:02:22 +10:00
|
|
|
|
2020-02-18 19:38:42 -05:00
|
|
|
client.stateMutex.RLock()
|
|
|
|
account := client.account
|
|
|
|
accountName := client.accountName
|
|
|
|
settings := client.accountSettings
|
|
|
|
registered := client.registered
|
|
|
|
realname := client.realname
|
|
|
|
client.stateMutex.RUnlock()
|
|
|
|
|
2020-03-16 07:54:50 -04:00
|
|
|
// recompute always-on status, because client.alwaysOn is not set for unregistered clients
|
|
|
|
var alwaysOn, useAccountName bool
|
|
|
|
if account != "" {
|
|
|
|
alwaysOn = persistenceEnabled(config.Accounts.Multiclient.AlwaysOn, settings.AlwaysOn)
|
2020-03-16 23:25:50 -04:00
|
|
|
useAccountName = alwaysOn || config.Accounts.NickReservation.ForceNickEqualsAccount
|
2020-03-16 07:54:50 -04:00
|
|
|
}
|
2020-02-18 19:38:42 -05:00
|
|
|
|
2020-03-16 07:54:50 -04:00
|
|
|
if useAccountName {
|
|
|
|
if registered && newNick != accountName && newNick != "" {
|
2020-05-19 14:12:20 -04:00
|
|
|
return "", errNickAccountMismatch, false
|
2020-03-16 07:54:50 -04:00
|
|
|
}
|
|
|
|
newNick = accountName
|
2020-03-19 05:09:25 -04:00
|
|
|
newCfNick = account
|
2020-03-16 07:54:50 -04:00
|
|
|
newSkeleton, err = Skeleton(newNick)
|
|
|
|
if err != nil {
|
2020-05-19 14:12:20 -04:00
|
|
|
return "", errNicknameInvalid, false
|
2020-03-16 07:54:50 -04:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
newNick = strings.TrimSpace(newNick)
|
|
|
|
if len(newNick) == 0 {
|
2020-05-19 14:12:20 -04:00
|
|
|
return "", errNickMissing, false
|
2020-03-16 07:54:50 -04:00
|
|
|
}
|
|
|
|
|
2020-03-16 23:25:50 -04:00
|
|
|
if account == "" && config.Accounts.NickReservation.ForceGuestFormat {
|
2020-03-19 05:09:25 -04:00
|
|
|
newCfNick, err = CasefoldName(newNick)
|
2020-03-19 05:08:53 -04:00
|
|
|
if err != nil {
|
2020-05-19 14:12:20 -04:00
|
|
|
return "", errNicknameInvalid, false
|
2020-03-19 05:08:53 -04:00
|
|
|
}
|
2020-03-19 05:09:25 -04:00
|
|
|
if !config.Accounts.NickReservation.guestRegexpFolded.MatchString(newCfNick) {
|
2020-03-19 05:08:53 -04:00
|
|
|
newNick = strings.Replace(config.Accounts.NickReservation.GuestFormat, "*", newNick, 1)
|
2020-03-19 05:09:25 -04:00
|
|
|
newCfNick = "" // re-fold it below
|
2020-03-19 05:08:53 -04:00
|
|
|
}
|
2020-03-16 07:54:50 -04:00
|
|
|
}
|
|
|
|
|
2020-03-19 05:09:25 -04:00
|
|
|
if newCfNick == "" {
|
|
|
|
newCfNick, err = CasefoldName(newNick)
|
2020-03-19 05:08:53 -04:00
|
|
|
}
|
2020-03-16 07:54:50 -04:00
|
|
|
if err != nil {
|
2020-05-19 14:12:20 -04:00
|
|
|
return "", errNicknameInvalid, false
|
2020-03-16 07:54:50 -04:00
|
|
|
}
|
2020-03-19 05:09:25 -04:00
|
|
|
if len(newNick) > config.Limits.NickLen || len(newCfNick) > config.Limits.NickLen {
|
2020-05-19 14:12:20 -04:00
|
|
|
return "", errNicknameInvalid, false
|
2020-03-16 07:54:50 -04:00
|
|
|
}
|
|
|
|
newSkeleton, err = Skeleton(newNick)
|
|
|
|
if err != nil {
|
2020-05-19 14:12:20 -04:00
|
|
|
return "", errNicknameInvalid, false
|
2020-03-16 07:54:50 -04:00
|
|
|
}
|
|
|
|
|
2020-03-19 05:09:25 -04:00
|
|
|
if restrictedCasefoldedNicks[newCfNick] || restrictedSkeletons[newSkeleton] {
|
2020-05-19 14:12:20 -04:00
|
|
|
return "", errNicknameInvalid, false
|
2020-03-16 07:54:50 -04:00
|
|
|
}
|
|
|
|
|
2020-03-19 05:09:25 -04:00
|
|
|
reservedAccount, method := client.server.accounts.EnforcementStatus(newCfNick, newSkeleton)
|
2020-03-16 07:54:50 -04:00
|
|
|
if method == NickEnforcementStrict && reservedAccount != "" && reservedAccount != account {
|
2020-05-19 14:12:20 -04:00
|
|
|
return "", errNicknameReserved, false
|
2020-03-16 07:54:50 -04:00
|
|
|
}
|
2020-02-18 19:38:42 -05:00
|
|
|
}
|
|
|
|
|
2019-05-19 04:27:44 -04:00
|
|
|
var bouncerAllowed bool
|
2020-02-20 23:55:42 -05:00
|
|
|
if config.Accounts.Multiclient.Enabled {
|
2020-03-16 07:54:50 -04:00
|
|
|
if useAccountName {
|
2020-02-18 19:38:42 -05:00
|
|
|
bouncerAllowed = true
|
2019-05-19 04:27:44 -04:00
|
|
|
} else {
|
2020-02-20 23:55:42 -05:00
|
|
|
if config.Accounts.Multiclient.AllowedByDefault && settings.AllowBouncer != MulticlientDisallowedByUser {
|
2019-05-19 04:27:44 -04:00
|
|
|
bouncerAllowed = true
|
2020-02-20 23:55:42 -05:00
|
|
|
} else if settings.AllowBouncer == MulticlientAllowedByUser {
|
2019-05-19 04:27:44 -04:00
|
|
|
bouncerAllowed = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2018-02-11 05:30:40 -05:00
|
|
|
|
2017-11-22 04:41:11 -05:00
|
|
|
clients.Lock()
|
|
|
|
defer clients.Unlock()
|
2016-11-16 12:02:22 +10:00
|
|
|
|
2020-03-19 05:09:25 -04:00
|
|
|
currentClient := clients.byNick[newCfNick]
|
2017-11-22 04:41:11 -05:00
|
|
|
// the client may just be changing case
|
2019-05-09 05:03:21 -04:00
|
|
|
if currentClient != nil && currentClient != client && session != nil {
|
2019-04-12 00:08:46 -04:00
|
|
|
// these conditions forbid reattaching to an existing session:
|
2020-04-23 01:38:12 -04:00
|
|
|
if registered || !bouncerAllowed || account == "" || account != currentClient.Account() {
|
2020-05-19 14:12:20 -04:00
|
|
|
return "", errNicknameInUse, false
|
2019-04-12 00:08:46 -04:00
|
|
|
}
|
2020-04-23 01:38:12 -04:00
|
|
|
// check TLS modes
|
|
|
|
if client.HasMode(modes.TLS) != currentClient.HasMode(modes.TLS) {
|
|
|
|
if useAccountName {
|
|
|
|
// #955: this is fatal because they can't fix it by trying a different nick
|
2020-05-19 14:12:20 -04:00
|
|
|
return "", errInsecureReattach, false
|
2020-04-23 01:38:12 -04:00
|
|
|
} else {
|
2020-05-19 14:12:20 -04:00
|
|
|
return "", errNicknameInUse, false
|
2020-04-23 01:38:12 -04:00
|
|
|
}
|
|
|
|
}
|
2020-05-19 14:12:20 -04:00
|
|
|
reattachSuccessful, numSessions, lastSeen, back := currentClient.AddSession(session)
|
2020-02-18 19:38:42 -05:00
|
|
|
if !reattachSuccessful {
|
2020-05-19 14:12:20 -04:00
|
|
|
return "", errNicknameInUse, false
|
2019-04-12 00:08:46 -04:00
|
|
|
}
|
2020-02-18 19:38:42 -05:00
|
|
|
if numSessions == 1 {
|
2020-03-06 04:21:21 -05:00
|
|
|
invisible := currentClient.HasMode(modes.Invisible)
|
|
|
|
operator := currentClient.HasMode(modes.Operator) || currentClient.HasMode(modes.LocalOperator)
|
2020-02-18 19:38:42 -05:00
|
|
|
client.server.stats.AddRegistered(invisible, operator)
|
|
|
|
}
|
2020-02-27 02:13:31 -05:00
|
|
|
session.autoreplayMissedSince = lastSeen
|
2020-02-18 19:38:42 -05:00
|
|
|
// XXX SetNames only changes names if they are unset, so the realname change only
|
|
|
|
// takes effect on first attach to an always-on client (good), but the user/ident
|
|
|
|
// change is always a no-op (bad). we could make user/ident act the same way as
|
|
|
|
// realname, but then we'd have to send CHGHOST and i don't want to deal with that
|
|
|
|
// for performance reasons
|
|
|
|
currentClient.SetNames("user", realname, true)
|
2019-05-08 18:14:49 -04:00
|
|
|
// successful reattach!
|
2020-05-19 14:12:20 -04:00
|
|
|
return newNick, nil, back
|
2020-05-17 13:39:37 -04:00
|
|
|
} else if currentClient == client && currentClient.Nick() == newNick {
|
|
|
|
// see #1019: normally no-op nick changes are caught earlier, by performNickChange,
|
|
|
|
// but they are not detected there when force-guest-format is enabled (because
|
|
|
|
// the proposed nickname is e.g. alice and the current nickname is Guest-alice)
|
2020-05-19 14:12:20 -04:00
|
|
|
return "", errNoop, false
|
2016-11-16 12:02:22 +10:00
|
|
|
}
|
2019-01-30 18:59:49 -05:00
|
|
|
// analogous checks for skeletons
|
|
|
|
skeletonHolder := clients.bySkeleton[newSkeleton]
|
|
|
|
if skeletonHolder != nil && skeletonHolder != client {
|
2020-05-19 14:12:20 -04:00
|
|
|
return "", errNicknameInUse, false
|
2019-01-30 18:59:49 -05:00
|
|
|
}
|
2020-03-16 07:54:50 -04:00
|
|
|
|
2019-01-01 21:16:29 -05:00
|
|
|
clients.removeInternal(client)
|
2020-03-19 05:09:25 -04:00
|
|
|
clients.byNick[newCfNick] = client
|
2019-01-30 18:59:49 -05:00
|
|
|
clients.bySkeleton[newSkeleton] = client
|
2020-03-19 05:09:25 -04:00
|
|
|
client.updateNick(newNick, newCfNick, newSkeleton)
|
2020-05-19 14:12:20 -04:00
|
|
|
return newNick, nil, false
|
2017-11-22 04:41:11 -05:00
|
|
|
}
|
2016-11-16 12:02:22 +10:00
|
|
|
|
2017-11-22 04:41:11 -05:00
|
|
|
func (clients *ClientManager) AllClients() (result []*Client) {
|
|
|
|
clients.RLock()
|
|
|
|
defer clients.RUnlock()
|
|
|
|
result = make([]*Client, len(clients.byNick))
|
|
|
|
i := 0
|
2017-11-22 16:35:38 -05:00
|
|
|
for _, client := range clients.byNick {
|
2017-11-22 04:41:11 -05:00
|
|
|
result[i] = client
|
|
|
|
i++
|
2016-11-16 12:02:22 +10:00
|
|
|
}
|
2017-11-22 04:41:11 -05:00
|
|
|
return
|
2016-11-16 12:02:22 +10:00
|
|
|
}
|
|
|
|
|
2017-03-25 09:19:13 +10:00
|
|
|
// AllWithCaps returns all clients with the given capabilities.
|
2019-04-12 00:08:46 -04:00
|
|
|
func (clients *ClientManager) AllWithCaps(capabs ...caps.Capability) (sessions []*Session) {
|
2017-11-22 04:41:11 -05:00
|
|
|
clients.RLock()
|
|
|
|
defer clients.RUnlock()
|
2019-04-12 00:08:46 -04:00
|
|
|
for _, client := range clients.byNick {
|
|
|
|
for _, session := range client.Sessions() {
|
|
|
|
if session.capabilities.HasAll(capabs...) {
|
|
|
|
sessions = append(sessions, session)
|
2016-10-22 22:18:41 +10:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-12 00:08:46 -04:00
|
|
|
return
|
2016-10-22 22:18:41 +10:00
|
|
|
}
|
|
|
|
|
2019-04-28 01:50:43 +10:00
|
|
|
// AllWithCapsNotify returns all clients with the given capabilities, and that support cap-notify.
|
|
|
|
func (clients *ClientManager) AllWithCapsNotify(capabs ...caps.Capability) (sessions []*Session) {
|
2019-04-28 15:57:42 +10:00
|
|
|
capabs = append(capabs, caps.CapNotify)
|
2019-04-28 01:50:43 +10:00
|
|
|
clients.RLock()
|
|
|
|
defer clients.RUnlock()
|
|
|
|
for _, client := range clients.byNick {
|
|
|
|
for _, session := range client.Sessions() {
|
2019-04-28 15:57:42 +10:00
|
|
|
// cap-notify is implicit in cap version 302 and above
|
2019-04-28 01:50:43 +10:00
|
|
|
if session.capabilities.HasAll(capabs...) || 302 <= session.capVersion {
|
|
|
|
sessions = append(sessions, session)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-03-25 09:19:13 +10:00
|
|
|
// FindAll returns all clients that match the given userhost mask.
|
2017-11-22 04:41:11 -05:00
|
|
|
func (clients *ClientManager) FindAll(userhost string) (set ClientSet) {
|
2014-03-06 13:10:54 -08:00
|
|
|
set = make(ClientSet)
|
2016-09-17 21:23:04 +10:00
|
|
|
|
2019-07-14 16:17:37 -04:00
|
|
|
userhost, err := CanonicalizeMaskWildcard(userhost)
|
2016-10-11 23:51:46 +10:00
|
|
|
if err != nil {
|
|
|
|
return set
|
|
|
|
}
|
2020-05-13 03:41:00 -04:00
|
|
|
matcher, err := utils.CompileGlob(userhost, false)
|
|
|
|
if err != nil {
|
|
|
|
// not much we can do here
|
|
|
|
return
|
|
|
|
}
|
2016-09-17 21:23:04 +10:00
|
|
|
|
2017-11-22 04:41:11 -05:00
|
|
|
clients.RLock()
|
|
|
|
defer clients.RUnlock()
|
|
|
|
for _, client := range clients.byNick {
|
2020-05-13 03:41:00 -04:00
|
|
|
if matcher.MatchString(client.NickMaskCasefolded()) {
|
2016-09-17 21:23:04 +10:00
|
|
|
set.Add(client)
|
2014-03-06 13:10:54 -08:00
|
|
|
}
|
|
|
|
}
|
2016-09-17 21:23:04 +10:00
|
|
|
|
|
|
|
return set
|
2014-03-06 13:10:54 -08:00
|
|
|
}
|
|
|
|
|
2014-03-07 17:09:49 -08:00
|
|
|
//
|
|
|
|
// usermask to regexp
|
|
|
|
//
|
|
|
|
|
2016-09-17 21:23:04 +10:00
|
|
|
//TODO(dan): move this over to generally using glob syntax instead?
|
|
|
|
// kinda more expected in normal ban/etc masks, though regex is useful (probably as an extban?)
|
2017-10-05 23:29:34 +10:00
|
|
|
|
2019-10-10 04:17:44 -04:00
|
|
|
type MaskInfo struct {
|
|
|
|
TimeCreated time.Time
|
|
|
|
CreatorNickmask string
|
|
|
|
CreatorAccount string
|
|
|
|
}
|
|
|
|
|
2017-10-05 23:29:34 +10:00
|
|
|
// UserMaskSet holds a set of client masks and lets you match hostnames to them.
|
2014-03-07 17:09:49 -08:00
|
|
|
type UserMaskSet struct {
|
2017-10-22 19:50:16 -04:00
|
|
|
sync.RWMutex
|
2020-05-13 03:41:00 -04:00
|
|
|
serialCacheUpdateMutex sync.Mutex
|
|
|
|
masks map[string]MaskInfo
|
|
|
|
regexp *regexp.Regexp
|
2014-03-07 17:09:49 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
func NewUserMaskSet() *UserMaskSet {
|
2019-10-10 04:17:44 -04:00
|
|
|
return new(UserMaskSet)
|
2014-03-07 17:09:49 -08:00
|
|
|
}
|
|
|
|
|
2017-10-05 23:29:34 +10:00
|
|
|
// Add adds the given mask to this set.
|
2019-10-13 06:07:30 -04:00
|
|
|
func (set *UserMaskSet) Add(mask, creatorNickmask, creatorAccount string) (maskAdded string, err error) {
|
2019-10-10 04:17:44 -04:00
|
|
|
casefoldedMask, err := CanonicalizeMaskWildcard(mask)
|
2016-10-11 23:51:46 +10:00
|
|
|
if err != nil {
|
2019-10-13 06:07:30 -04:00
|
|
|
return
|
2016-10-11 23:51:46 +10:00
|
|
|
}
|
2017-10-22 19:50:16 -04:00
|
|
|
|
2020-05-13 03:41:00 -04:00
|
|
|
set.serialCacheUpdateMutex.Lock()
|
|
|
|
defer set.serialCacheUpdateMutex.Unlock()
|
|
|
|
|
2017-10-22 19:50:16 -04:00
|
|
|
set.Lock()
|
2019-10-10 04:17:44 -04:00
|
|
|
if set.masks == nil {
|
|
|
|
set.masks = make(map[string]MaskInfo)
|
2017-11-13 03:12:17 -05:00
|
|
|
}
|
2019-10-10 04:17:44 -04:00
|
|
|
_, present := set.masks[casefoldedMask]
|
2019-10-13 06:07:30 -04:00
|
|
|
if !present {
|
|
|
|
maskAdded = casefoldedMask
|
2019-10-10 04:17:44 -04:00
|
|
|
set.masks[casefoldedMask] = MaskInfo{
|
|
|
|
TimeCreated: time.Now().UTC(),
|
|
|
|
CreatorNickmask: creatorNickmask,
|
|
|
|
CreatorAccount: creatorAccount,
|
2014-03-08 19:22:04 -08:00
|
|
|
}
|
|
|
|
}
|
2019-10-10 04:17:44 -04:00
|
|
|
set.Unlock()
|
|
|
|
|
2019-10-13 06:07:30 -04:00
|
|
|
if !present {
|
2017-11-13 03:12:17 -05:00
|
|
|
set.setRegexp()
|
|
|
|
}
|
2014-03-08 19:22:04 -08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-10-05 23:29:34 +10:00
|
|
|
// Remove removes the given mask from this set.
|
2019-10-13 06:07:30 -04:00
|
|
|
func (set *UserMaskSet) Remove(mask string) (maskRemoved string, err error) {
|
|
|
|
mask, err = CanonicalizeMaskWildcard(mask)
|
2019-10-10 04:17:44 -04:00
|
|
|
if err != nil {
|
2019-10-13 06:07:30 -04:00
|
|
|
return
|
2019-10-10 04:17:44 -04:00
|
|
|
}
|
|
|
|
|
2020-05-13 03:41:00 -04:00
|
|
|
set.serialCacheUpdateMutex.Lock()
|
|
|
|
defer set.serialCacheUpdateMutex.Unlock()
|
|
|
|
|
2017-10-22 19:50:16 -04:00
|
|
|
set.Lock()
|
2019-10-13 06:07:30 -04:00
|
|
|
_, removed := set.masks[mask]
|
2017-11-13 03:12:17 -05:00
|
|
|
if removed {
|
2019-10-13 06:07:30 -04:00
|
|
|
maskRemoved = mask
|
2017-11-13 03:12:17 -05:00
|
|
|
delete(set.masks, mask)
|
|
|
|
}
|
2017-10-22 19:50:16 -04:00
|
|
|
set.Unlock()
|
|
|
|
|
2017-11-13 03:12:17 -05:00
|
|
|
if removed {
|
2017-10-22 19:50:16 -04:00
|
|
|
set.setRegexp()
|
2014-03-07 17:35:58 -08:00
|
|
|
}
|
2017-11-13 03:12:17 -05:00
|
|
|
return
|
2014-03-07 17:09:49 -08:00
|
|
|
}
|
|
|
|
|
2019-10-10 04:17:44 -04:00
|
|
|
func (set *UserMaskSet) SetMasks(masks map[string]MaskInfo) {
|
|
|
|
set.Lock()
|
|
|
|
set.masks = masks
|
|
|
|
set.Unlock()
|
|
|
|
set.setRegexp()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (set *UserMaskSet) Masks() (result map[string]MaskInfo) {
|
|
|
|
set.RLock()
|
|
|
|
defer set.RUnlock()
|
|
|
|
|
|
|
|
result = make(map[string]MaskInfo, len(set.masks))
|
|
|
|
for mask, info := range set.masks {
|
|
|
|
result[mask] = info
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-10-05 23:29:34 +10:00
|
|
|
// Match matches the given n!u@h.
|
2016-10-11 23:51:46 +10:00
|
|
|
func (set *UserMaskSet) Match(userhost string) bool {
|
2017-10-22 19:50:16 -04:00
|
|
|
set.RLock()
|
|
|
|
regexp := set.regexp
|
|
|
|
set.RUnlock()
|
|
|
|
|
|
|
|
if regexp == nil {
|
2014-03-07 17:09:49 -08:00
|
|
|
return false
|
|
|
|
}
|
2017-10-22 19:50:16 -04:00
|
|
|
return regexp.MatchString(userhost)
|
2014-03-07 17:09:49 -08:00
|
|
|
}
|
|
|
|
|
2017-10-22 19:50:16 -04:00
|
|
|
func (set *UserMaskSet) Length() int {
|
|
|
|
set.RLock()
|
|
|
|
defer set.RUnlock()
|
|
|
|
return len(set.masks)
|
|
|
|
}
|
|
|
|
|
2014-03-07 17:09:49 -08:00
|
|
|
func (set *UserMaskSet) setRegexp() {
|
2017-10-22 19:50:16 -04:00
|
|
|
set.RLock()
|
2014-03-07 17:09:49 -08:00
|
|
|
maskExprs := make([]string, len(set.masks))
|
|
|
|
for mask := range set.masks {
|
2020-05-13 03:41:00 -04:00
|
|
|
maskExprs = append(maskExprs, mask)
|
2014-03-07 17:09:49 -08:00
|
|
|
}
|
2017-10-22 19:50:16 -04:00
|
|
|
set.RUnlock()
|
|
|
|
|
2020-05-13 03:41:00 -04:00
|
|
|
re, _ := utils.CompileMasks(maskExprs)
|
2017-10-22 19:50:16 -04:00
|
|
|
|
|
|
|
set.Lock()
|
|
|
|
set.regexp = re
|
|
|
|
set.Unlock()
|
2014-03-07 17:09:49 -08:00
|
|
|
}
|