2016-06-15 13:50:56 +02:00
// Copyright (c) 2012-2014 Jeremy Latt
// Copyright (c) 2014-2015 Edmund Huber
2017-03-27 14:15:02 +02:00
// Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
2016-06-15 13:50:56 +02:00
// released under the MIT license
2014-02-09 16:53:42 +01:00
package irc
import (
2016-04-13 12:45:09 +02:00
"crypto/tls"
2018-01-23 06:06:55 +01:00
"encoding/json"
2016-10-23 02:47:11 +02:00
"fmt"
2016-04-12 15:00:09 +02:00
"io/ioutil"
2014-02-24 07:21:39 +01:00
"log"
2018-08-28 19:34:43 +02:00
"os"
2018-01-22 08:30:31 +01:00
"path/filepath"
2018-04-19 08:48:19 +02:00
"regexp"
2016-10-23 03:01:05 +02:00
"strings"
2017-01-12 08:40:01 +01:00
"time"
2016-04-12 15:00:09 +02:00
2017-10-05 16:03:53 +02:00
"code.cloudfoundry.org/bytefmt"
2017-10-09 23:37:13 +02:00
"github.com/oragono/oragono/irc/connection_limits"
2017-06-14 20:00:53 +02:00
"github.com/oragono/oragono/irc/custime"
2018-02-03 10:46:14 +01:00
"github.com/oragono/oragono/irc/languages"
2017-06-14 20:00:53 +02:00
"github.com/oragono/oragono/irc/logger"
2018-04-23 00:47:10 +02:00
"github.com/oragono/oragono/irc/modes"
2017-10-05 16:03:53 +02:00
"github.com/oragono/oragono/irc/passwd"
2017-10-05 15:47:43 +02:00
"github.com/oragono/oragono/irc/utils"
2016-04-12 15:00:09 +02:00
"gopkg.in/yaml.v2"
2014-02-09 16:53:42 +01:00
)
2018-07-16 09:46:40 +02:00
// here's how this works: exported (capitalized) members of the config structs
// are defined in the YAML file and deserialized directly from there. They may
// be postprocessed and overwritten by LoadConfig. Unexported (lowercase) members
// are derived from the exported members in LoadConfig.
2014-03-01 23:34:51 +01:00
2017-04-16 03:31:33 +02:00
// TLSListenConfig defines configuration options for listening on TLS.
2016-04-28 12:12:23 +02:00
type TLSListenConfig struct {
2016-04-13 12:45:09 +02:00
Cert string
Key string
}
2017-04-16 03:31:33 +02:00
// Config returns the TLS contiguration assicated with this TLSListenConfig.
2016-04-28 12:12:23 +02:00
func ( conf * TLSListenConfig ) Config ( ) ( * tls . Config , error ) {
2016-04-13 12:45:09 +02:00
cert , err := tls . LoadX509KeyPair ( conf . Cert , conf . Key )
if err != nil {
2018-02-03 13:03:36 +01:00
return nil , ErrInvalidCertKeyPair
2016-04-13 12:45:09 +02:00
}
return & tls . Config {
Certificates : [ ] tls . Certificate { cert } ,
} , err
}
2018-02-11 11:30:40 +01:00
type AccountConfig struct {
2018-02-18 10:46:14 +01:00
Registration AccountRegistrationConfig
2019-01-01 22:45:37 +01:00
AuthenticationEnabled bool ` yaml:"authentication-enabled" `
LoginThrottling struct {
Enabled bool
Duration time . Duration
MaxAttempts int ` yaml:"max-attempts" `
} ` yaml:"login-throttling" `
SkipServerPassword bool ` yaml:"skip-server-password" `
NickReservation NickReservationConfig ` yaml:"nick-reservation" `
VHosts VHostConfig
2018-02-11 11:30:40 +01:00
}
2017-04-16 03:31:33 +02:00
// AccountRegistrationConfig controls account registration.
2016-09-04 11:25:33 +02:00
type AccountRegistrationConfig struct {
2018-02-11 11:30:40 +01:00
Enabled bool
EnabledCallbacks [ ] string ` yaml:"enabled-callbacks" `
EnabledCredentialTypes [ ] string ` yaml:"-" `
VerifyTimeout time . Duration ` yaml:"verify-timeout" `
Callbacks struct {
2016-09-04 11:25:33 +02:00
Mailto struct {
Server string
Port int
TLS struct {
Enabled bool
InsecureSkipVerify bool ` yaml:"insecure_skip_verify" `
ServerName string ` yaml:"servername" `
}
Username string
Password string
Sender string
VerifyMessageSubject string ` yaml:"verify-message-subject" `
VerifyMessage string ` yaml:"verify-message" `
}
}
2018-08-15 19:02:05 +02:00
BcryptCost uint ` yaml:"bcrypt-cost" `
2016-09-04 11:25:33 +02:00
}
2018-04-23 08:38:35 +02:00
type VHostConfig struct {
Enabled bool
MaxLength int ` yaml:"max-length" `
ValidRegexpRaw string ` yaml:"valid-regexp" `
ValidRegexp * regexp . Regexp
UserRequests struct {
Enabled bool
Channel string
Cooldown time . Duration
} ` yaml:"user-requests" `
2018-04-19 08:48:19 +02:00
}
2018-02-18 10:46:14 +01:00
type NickReservationMethod int
const (
2019-01-02 16:08:44 +01:00
// NickReservationOptional is the zero value; it serializes to
// "optional" in the yaml config, and "default" as an arg to `NS ENFORCE`.
// in both cases, it means "defer to the other source of truth", i.e.,
// in the config, defer to the user's custom setting, and as a custom setting,
// defer to the default in the config. if both are NickReservationOptional then
// there is no enforcement.
NickReservationOptional NickReservationMethod = iota
NickReservationNone
NickReservationWithTimeout
2018-02-18 10:46:14 +01:00
NickReservationStrict
)
2019-01-02 16:08:44 +01:00
func nickReservationToString ( method NickReservationMethod ) string {
switch method {
case NickReservationOptional :
return "default"
case NickReservationNone :
return "none"
case NickReservationWithTimeout :
return "timeout"
case NickReservationStrict :
return "strict"
default :
return ""
}
}
func nickReservationFromString ( method string ) ( NickReservationMethod , error ) {
switch method {
case "default" :
return NickReservationOptional , nil
case "optional" :
return NickReservationOptional , nil
case "none" :
return NickReservationNone , nil
case "timeout" :
return NickReservationWithTimeout , nil
case "strict" :
return NickReservationStrict , nil
default :
return NickReservationOptional , fmt . Errorf ( "invalid nick-reservation.method value: %s" , method )
}
}
2018-02-18 10:46:14 +01:00
func ( nr * NickReservationMethod ) UnmarshalYAML ( unmarshal func ( interface { } ) error ) error {
var orig , raw string
var err error
if err = unmarshal ( & orig ) ; err != nil {
return err
}
if raw , err = Casefold ( orig ) ; err != nil {
return err
}
2019-01-02 16:08:44 +01:00
method , err := nickReservationFromString ( raw )
if err == nil {
* nr = method
2018-02-18 10:46:14 +01:00
}
2019-01-02 16:08:44 +01:00
return err
2018-02-18 10:46:14 +01:00
}
type NickReservationConfig struct {
2019-01-02 16:08:44 +01:00
Enabled bool
AdditionalNickLimit int ` yaml:"additional-nick-limit" `
Method NickReservationMethod
AllowCustomEnforcement bool ` yaml:"allow-custom-enforcement" `
RenameTimeout time . Duration ` yaml:"rename-timeout" `
RenamePrefix string ` yaml:"rename-prefix" `
2018-02-18 10:46:14 +01:00
}
2017-04-16 03:31:33 +02:00
// ChannelRegistrationConfig controls channel registration.
2017-03-24 03:52:38 +01:00
type ChannelRegistrationConfig struct {
Enabled bool
}
2017-04-16 03:31:33 +02:00
// OperClassConfig defines a specific operator class.
2016-10-23 02:47:11 +02:00
type OperClassConfig struct {
Title string
2016-10-23 03:01:05 +02:00
WhoisLine string
2016-10-23 02:47:11 +02:00
Extends string
Capabilities [ ] string
}
2017-04-16 03:31:33 +02:00
// OperConfig defines a specific operator's configuration.
2016-10-23 02:47:11 +02:00
type OperConfig struct {
2016-10-23 03:01:05 +02:00
Class string
Vhost string
WhoisLine string ` yaml:"whois-line" `
Password string
2017-05-08 01:15:16 +02:00
Modes string
2016-10-23 02:47:11 +02:00
}
2017-04-16 03:31:33 +02:00
// LineLenConfig controls line lengths.
2018-07-16 09:46:40 +02:00
type LineLenLimits struct {
2017-01-13 15:22:42 +01:00
Tags int
Rest int
}
2018-07-16 09:46:40 +02:00
// Various server-enforced limits on data size.
type Limits struct {
AwayLen int ` yaml:"awaylen" `
ChanListModes int ` yaml:"chan-list-modes" `
ChannelLen int ` yaml:"channellen" `
KickLen int ` yaml:"kicklen" `
MonitorEntries int ` yaml:"monitor-entries" `
NickLen int ` yaml:"nicklen" `
TopicLen int ` yaml:"topiclen" `
WhowasEntries int ` yaml:"whowas-entries" `
LineLen LineLenLimits ` yaml:"linelen" `
}
2017-04-16 03:31:33 +02:00
// STSConfig controls the STS configuration/
2017-03-09 10:07:35 +01:00
type STSConfig struct {
Enabled bool
Duration time . Duration ` yaml:"duration-real" `
DurationString string ` yaml:"duration" `
Port int
Preload bool
}
// Value returns the STS value to advertise in CAP
func ( sts * STSConfig ) Value ( ) string {
2018-01-28 01:52:07 +01:00
val := fmt . Sprintf ( "duration=%d" , int ( sts . Duration . Seconds ( ) ) )
2017-03-09 10:07:35 +01:00
if sts . Enabled && sts . Port > 0 {
val += fmt . Sprintf ( ",port=%d" , sts . Port )
}
if sts . Enabled && sts . Preload {
val += ",preload"
}
return val
}
2018-03-22 16:04:21 +01:00
type FakelagConfig struct {
Enabled bool
Window time . Duration
BurstLimit uint ` yaml:"burst-limit" `
MessagesPerWindow uint ` yaml:"messages-per-window" `
2018-03-28 19:18:08 +02:00
Cooldown time . Duration
2018-03-22 16:04:21 +01:00
}
2017-04-16 03:31:33 +02:00
// Config defines the overall configuration.
2014-02-09 16:53:42 +01:00
type Config struct {
2016-04-12 07:44:00 +02:00
Network struct {
Name string
}
2014-03-01 23:34:51 +01:00
Server struct {
2018-11-26 11:23:27 +01:00
Password string
passwordBytes [ ] byte
Name string
nameCasefolded string
Listen [ ] string
UnixBindMode os . FileMode ` yaml:"unix-bind-mode" `
TLSListeners map [ string ] * TLSListenConfig ` yaml:"tls-listeners" `
STS STSConfig
CheckIdent bool ` yaml:"check-ident" `
MOTD string
MOTDFormatting bool ` yaml:"motd-formatting" `
ProxyAllowedFrom [ ] string ` yaml:"proxy-allowed-from" `
WebIRC [ ] webircConfig ` yaml:"webirc" `
MaxSendQString string ` yaml:"max-sendq" `
MaxSendQBytes int
AllowPlaintextResume bool ` yaml:"allow-plaintext-resume" `
ConnectionLimiter connection_limits . LimiterConfig ` yaml:"connection-limits" `
ConnectionThrottler connection_limits . ThrottlerConfig ` yaml:"connection-throttling" `
2014-03-01 23:34:51 +01:00
}
2014-02-25 20:11:34 +01:00
2018-01-21 07:11:16 +01:00
Languages struct {
Enabled bool
Path string
2018-01-22 08:30:31 +01:00
Default string
2018-02-03 10:46:14 +01:00
Data map [ string ] languages . LangData
2018-01-21 07:11:16 +01:00
}
2016-09-04 11:25:33 +02:00
Datastore struct {
2018-04-16 22:28:31 +02:00
Path string
2018-04-20 09:57:48 +02:00
AutoUpgrade bool
2016-09-04 11:25:33 +02:00
}
2018-02-11 11:30:40 +01:00
Accounts AccountConfig
2016-09-04 11:25:33 +02:00
2017-03-24 03:52:38 +01:00
Channels struct {
2018-08-28 19:34:43 +02:00
DefaultModes * string ` yaml:"default-modes" `
defaultModes modes . Modes
Registration ChannelRegistrationConfig
2017-03-24 03:52:38 +01:00
}
2016-10-23 02:47:11 +02:00
OperClasses map [ string ] * OperClassConfig ` yaml:"oper-classes" `
Opers map [ string ] * OperConfig
2014-03-13 09:55:46 +01:00
2018-07-16 09:46:40 +02:00
// parsed operator definitions, unexported so they can't be defined
// directly in YAML:
operators map [ string ] * Oper
2017-10-02 05:31:40 +02:00
Logging [ ] logger . LoggingConfig
2017-03-06 04:31:10 +01:00
2017-04-30 04:35:07 +02:00
Debug struct {
2018-03-13 19:46:39 +01:00
RecoverFromErrors * bool ` yaml:"recover-from-errors" `
PprofListener * string ` yaml:"pprof-listener" `
2017-04-30 04:35:07 +02:00
}
2018-07-16 09:46:40 +02:00
Limits Limits
2017-09-28 07:30:53 +02:00
2018-03-22 16:04:21 +01:00
Fakelag FakelagConfig
2018-11-26 11:23:27 +01:00
History struct {
2018-12-28 19:45:55 +01:00
Enabled bool
ChannelLength int ` yaml:"channel-length" `
ClientLength int ` yaml:"client-length" `
AutoreplayOnJoin int ` yaml:"autoreplay-on-join" `
2018-11-26 11:23:27 +01:00
}
2017-09-28 07:30:53 +02:00
Filename string
2014-02-24 07:21:39 +01:00
}
2017-04-16 03:31:33 +02:00
// OperClass defines an assembled operator class.
2016-10-23 02:47:11 +02:00
type OperClass struct {
Title string
2016-10-23 03:01:05 +02:00
WhoisLine string ` yaml:"whois-line" `
2016-10-23 02:47:11 +02:00
Capabilities map [ string ] bool // map to make lookups much easier
}
2017-04-16 03:31:33 +02:00
// OperatorClasses returns a map of assembled operator classes from the given config.
2018-04-19 08:48:19 +02:00
func ( conf * Config ) OperatorClasses ( ) ( map [ string ] * OperClass , error ) {
ocs := make ( map [ string ] * OperClass )
2016-10-23 02:47:11 +02:00
// loop from no extends to most extended, breaking if we can't add any more
lenOfLastOcs := - 1
for {
if lenOfLastOcs == len ( ocs ) {
2018-02-03 13:03:36 +01:00
return nil , ErrOperClassDependencies
2016-10-23 02:47:11 +02:00
}
lenOfLastOcs = len ( ocs )
var anyMissing bool
for name , info := range conf . OperClasses {
_ , exists := ocs [ name ]
_ , extendsExists := ocs [ info . Extends ]
if exists {
// class already exists
continue
} else if len ( info . Extends ) > 0 && ! extendsExists {
// class we extend on doesn't exist
_ , exists := conf . OperClasses [ info . Extends ]
if ! exists {
return nil , fmt . Errorf ( "Operclass [%s] extends [%s], which doesn't exist" , name , info . Extends )
}
anyMissing = true
continue
}
// create new operclass
var oc OperClass
oc . Capabilities = make ( map [ string ] bool )
// get inhereted info from other operclasses
if len ( info . Extends ) > 0 {
einfo , _ := ocs [ info . Extends ]
for capab := range einfo . Capabilities {
oc . Capabilities [ capab ] = true
}
}
// add our own info
oc . Title = info . Title
for _ , capab := range info . Capabilities {
oc . Capabilities [ capab ] = true
}
2016-10-23 03:01:05 +02:00
if len ( info . WhoisLine ) > 0 {
oc . WhoisLine = info . WhoisLine
} else {
oc . WhoisLine = "is a"
if strings . Contains ( strings . ToLower ( string ( oc . Title [ 0 ] ) ) , "aeiou" ) {
oc . WhoisLine += "n"
}
oc . WhoisLine += " "
oc . WhoisLine += oc . Title
}
2016-10-23 02:47:11 +02:00
2018-04-19 08:48:19 +02:00
ocs [ name ] = & oc
2016-10-23 02:47:11 +02:00
}
if ! anyMissing {
// we've got every operclass!
break
}
}
2018-04-19 08:48:19 +02:00
return ocs , nil
2016-10-23 02:47:11 +02:00
}
2017-04-16 03:31:33 +02:00
// Oper represents a single assembled operator's config.
2016-10-23 02:47:11 +02:00
type Oper struct {
2018-04-19 08:48:19 +02:00
Name string
2016-10-23 03:01:05 +02:00
Class * OperClass
WhoisLine string
2016-10-23 03:28:31 +02:00
Vhost string
2016-10-23 03:01:05 +02:00
Pass [ ] byte
2018-04-23 00:47:10 +02:00
Modes [ ] modes . ModeChange
2016-10-23 02:47:11 +02:00
}
2017-04-16 03:31:33 +02:00
// Operators returns a map of operator configs from the given OperClass and config.
2018-04-19 08:48:19 +02:00
func ( conf * Config ) Operators ( oc map [ string ] * OperClass ) ( map [ string ] * Oper , error ) {
operators := make ( map [ string ] * Oper )
2016-10-23 02:47:11 +02:00
for name , opConf := range conf . Opers {
var oper Oper
// oper name
2016-10-11 15:51:46 +02:00
name , err := CasefoldName ( name )
2016-10-23 02:47:11 +02:00
if err != nil {
return nil , fmt . Errorf ( "Could not casefold oper name: %s" , err . Error ( ) )
}
2018-04-19 08:48:19 +02:00
oper . Name = name
2016-10-23 02:47:11 +02:00
2018-08-06 04:51:39 +02:00
oper . Pass , err = decodeLegacyPasswordHash ( opConf . Password )
if err != nil {
return nil , err
}
2016-10-23 03:28:31 +02:00
oper . Vhost = opConf . Vhost
2018-04-19 08:48:19 +02:00
class , exists := oc [ opConf . Class ]
2016-10-23 02:47:11 +02:00
if ! exists {
return nil , fmt . Errorf ( "Could not load operator [%s] - they use operclass [%s] which does not exist" , name , opConf . Class )
2016-10-11 15:51:46 +02:00
}
2018-04-19 08:48:19 +02:00
oper . Class = class
2016-10-23 03:01:05 +02:00
if len ( opConf . WhoisLine ) > 0 {
oper . WhoisLine = opConf . WhoisLine
} else {
oper . WhoisLine = class . WhoisLine
}
2018-04-23 00:47:10 +02:00
modeStr := strings . TrimSpace ( opConf . Modes )
modeChanges , unknownChanges := modes . ParseUserModeChanges ( strings . Split ( modeStr , " " ) ... )
if len ( unknownChanges ) > 0 {
return nil , fmt . Errorf ( "Could not load operator [%s] due to unknown modes %v" , name , unknownChanges )
}
oper . Modes = modeChanges
2016-10-23 02:47:11 +02:00
// successful, attach to list of opers
2018-04-19 08:48:19 +02:00
operators [ name ] = & oper
2014-02-24 18:41:09 +01:00
}
2016-10-23 02:47:11 +02:00
return operators , nil
2014-02-24 18:41:09 +01:00
}
2017-04-16 03:31:33 +02:00
// TLSListeners returns a list of TLS listeners and their configs.
2018-08-06 11:02:47 +02:00
func ( conf * Config ) TLSListeners ( ) ( map [ string ] * tls . Config , error ) {
2016-10-11 15:51:46 +02:00
tlsListeners := make ( map [ string ] * tls . Config )
2016-04-28 12:12:23 +02:00
for s , tlsListenersConf := range conf . Server . TLSListeners {
config , err := tlsListenersConf . Config ( )
2016-04-13 12:45:09 +02:00
if err != nil {
2018-08-06 11:02:47 +02:00
return nil , err
2016-04-13 12:45:09 +02:00
}
2018-01-28 01:52:07 +01:00
config . ClientAuth = tls . RequestClientCert
2017-07-26 08:27:11 +02:00
tlsListeners [ s ] = config
2016-04-13 12:45:09 +02:00
}
2018-08-06 11:02:47 +02:00
return tlsListeners , nil
2016-04-13 12:45:09 +02:00
}
2017-04-16 03:31:33 +02:00
// LoadConfig loads the given YAML configuration file.
2014-02-24 07:21:39 +01:00
func LoadConfig ( filename string ) ( config * Config , err error ) {
2016-04-12 15:00:09 +02:00
data , err := ioutil . ReadFile ( filename )
2014-02-09 16:53:42 +01:00
if err != nil {
2016-04-12 15:00:09 +02:00
return nil , err
2014-02-09 16:53:42 +01:00
}
2016-04-12 15:00:09 +02:00
err = yaml . Unmarshal ( data , & config )
if err != nil {
return nil , err
}
2017-09-28 07:30:53 +02:00
config . Filename = filename
2016-04-12 07:44:00 +02:00
if config . Network . Name == "" {
2018-02-03 13:03:36 +01:00
return nil , ErrNetworkNameMissing
2016-04-12 07:44:00 +02:00
}
2014-03-01 23:34:51 +01:00
if config . Server . Name == "" {
2018-02-03 13:03:36 +01:00
return nil , ErrServerNameMissing
2014-03-01 23:34:51 +01:00
}
2017-10-05 15:47:43 +02:00
if ! utils . IsHostname ( config . Server . Name ) {
2018-02-03 13:03:36 +01:00
return nil , ErrServerNameNotHostname
2016-04-21 02:48:15 +02:00
}
2016-08-19 15:21:52 +02:00
if config . Datastore . Path == "" {
2018-02-03 13:03:36 +01:00
return nil , ErrDatastorePathMissing
2016-08-19 15:21:52 +02:00
}
2014-03-01 23:34:51 +01:00
if len ( config . Server . Listen ) == 0 {
2018-02-03 13:03:36 +01:00
return nil , ErrNoListenersDefined
2014-02-10 22:52:28 +01:00
}
2016-10-16 12:14:56 +02:00
if config . Limits . NickLen < 1 || config . Limits . ChannelLen < 2 || config . Limits . AwayLen < 1 || config . Limits . KickLen < 1 || config . Limits . TopicLen < 1 {
2018-02-03 13:03:36 +01:00
return nil , ErrLimitsAreInsane
2016-08-12 14:20:32 +02:00
}
2017-03-09 10:07:35 +01:00
if config . Server . STS . Enabled {
config . Server . STS . Duration , err = custime . ParseDuration ( config . Server . STS . DurationString )
if err != nil {
return nil , fmt . Errorf ( "Could not parse STS duration: %s" , err . Error ( ) )
}
if config . Server . STS . Port < 0 || config . Server . STS . Port > 65535 {
return nil , fmt . Errorf ( "STS port is incorrect, should be 0 if disabled: %d" , config . Server . STS . Port )
}
}
2017-10-09 23:37:13 +02:00
if config . Server . ConnectionThrottler . Enabled {
config . Server . ConnectionThrottler . Duration , err = time . ParseDuration ( config . Server . ConnectionThrottler . DurationString )
2017-01-12 08:40:01 +01:00
if err != nil {
return nil , fmt . Errorf ( "Could not parse connection-throttle duration: %s" , err . Error ( ) )
}
2017-10-09 23:37:13 +02:00
config . Server . ConnectionThrottler . BanDuration , err = time . ParseDuration ( config . Server . ConnectionThrottler . BanDurationString )
2017-01-12 08:40:01 +01:00
if err != nil {
return nil , fmt . Errorf ( "Could not parse connection-throttle ban-duration: %s" , err . Error ( ) )
}
}
2017-10-15 08:18:14 +02:00
// process webirc blocks
var newWebIRC [ ] webircConfig
for _ , webirc := range config . Server . WebIRC {
// skip webirc blocks with no hosts (such as the example one)
2017-10-15 10:15:18 +02:00
if len ( webirc . Hosts ) == 0 {
2017-10-15 08:18:14 +02:00
continue
}
2017-10-16 00:47:49 +02:00
err = webirc . Populate ( )
2017-10-15 08:18:14 +02:00
if err != nil {
return nil , fmt . Errorf ( "Could not parse WebIRC config: %s" , err . Error ( ) )
}
newWebIRC = append ( newWebIRC , webirc )
}
config . Server . WebIRC = newWebIRC
// process limits
2019-01-12 13:17:51 +01:00
if config . Limits . LineLen . Tags < 512 {
config . Limits . LineLen . Tags = 512
}
if config . Limits . LineLen . Rest < 512 {
config . Limits . LineLen . Rest = 512
2016-11-29 09:38:04 +01:00
}
2017-10-02 05:31:40 +02:00
var newLogConfigs [ ] logger . LoggingConfig
2017-03-06 04:31:10 +01:00
for _ , logConfig := range config . Logging {
// methods
2017-03-10 13:02:08 +01:00
methods := make ( map [ string ] bool )
2017-03-06 04:31:10 +01:00
for _ , method := range strings . Split ( logConfig . Method , " " ) {
if len ( method ) > 0 {
2017-03-10 13:02:08 +01:00
methods [ strings . ToLower ( method ) ] = true
2017-03-06 04:31:10 +01:00
}
}
2017-03-10 13:02:08 +01:00
if methods [ "file" ] && logConfig . Filename == "" {
2018-02-03 13:03:36 +01:00
return nil , ErrLoggerFilenameMissing
2017-03-06 04:31:10 +01:00
}
2017-03-10 13:02:08 +01:00
logConfig . MethodFile = methods [ "file" ]
2017-05-01 10:51:37 +02:00
logConfig . MethodStdout = methods [ "stdout" ]
2017-03-10 13:02:08 +01:00
logConfig . MethodStderr = methods [ "stderr" ]
2017-03-06 04:31:10 +01:00
// levels
2017-03-10 13:02:08 +01:00
level , exists := logger . LogLevelNames [ strings . ToLower ( logConfig . LevelString ) ]
2017-03-06 04:31:10 +01:00
if ! exists {
return nil , fmt . Errorf ( "Could not translate log leve [%s]" , logConfig . LevelString )
}
logConfig . Level = level
// types
for _ , typeStr := range strings . Split ( logConfig . TypeString , " " ) {
if len ( typeStr ) == 0 {
continue
}
if typeStr == "-" {
2018-02-03 13:03:36 +01:00
return nil , ErrLoggerExcludeEmpty
2017-03-06 04:31:10 +01:00
}
if typeStr [ 0 ] == '-' {
typeStr = typeStr [ 1 : ]
2017-03-10 13:02:08 +01:00
logConfig . ExcludedTypes = append ( logConfig . ExcludedTypes , typeStr )
2017-03-06 04:31:10 +01:00
} else {
2017-03-10 13:02:08 +01:00
logConfig . Types = append ( logConfig . Types , typeStr )
2017-03-06 04:31:10 +01:00
}
}
if len ( logConfig . Types ) < 1 {
2018-02-03 13:03:36 +01:00
return nil , ErrLoggerHasNoTypes
2017-03-06 04:31:10 +01:00
}
2017-03-06 06:50:23 +01:00
newLogConfigs = append ( newLogConfigs , logConfig )
2017-03-06 04:31:10 +01:00
}
2017-03-06 06:50:23 +01:00
config . Logging = newLogConfigs
2016-10-23 02:47:11 +02:00
2018-02-11 11:30:40 +01:00
// hardcode this for now
config . Accounts . Registration . EnabledCredentialTypes = [ ] string { "passphrase" , "certfp" }
for i , name := range config . Accounts . Registration . EnabledCallbacks {
if name == "none" {
// we store "none" as "*" internally
config . Accounts . Registration . EnabledCallbacks [ i ] = "*"
}
}
2018-04-23 08:38:35 +02:00
rawRegexp := config . Accounts . VHosts . ValidRegexpRaw
2018-04-19 08:48:19 +02:00
if rawRegexp != "" {
regexp , err := regexp . Compile ( rawRegexp )
if err == nil {
2018-04-23 08:38:35 +02:00
config . Accounts . VHosts . ValidRegexp = regexp
2018-04-19 08:48:19 +02:00
} else {
log . Printf ( "invalid vhost regexp: %s\n" , err . Error ( ) )
}
}
2018-04-23 08:38:35 +02:00
if config . Accounts . VHosts . ValidRegexp == nil {
config . Accounts . VHosts . ValidRegexp = defaultValidVhostRegex
2018-04-19 08:48:19 +02:00
}
2019-01-01 22:45:37 +01:00
if ! config . Accounts . LoginThrottling . Enabled {
config . Accounts . LoginThrottling . MaxAttempts = 0 // limit of 0 means disabled
}
2018-03-18 02:32:12 +01:00
maxSendQBytes , err := bytefmt . ToBytes ( config . Server . MaxSendQString )
2017-03-13 23:12:39 +01:00
if err != nil {
return nil , fmt . Errorf ( "Could not parse maximum SendQ size (make sure it only contains whole numbers): %s" , err . Error ( ) )
}
2018-03-18 02:32:12 +01:00
config . Server . MaxSendQBytes = int ( maxSendQBytes )
2017-03-13 23:12:39 +01:00
2018-01-22 08:30:31 +01:00
// get language files
2018-02-03 10:46:14 +01:00
config . Languages . Data = make ( map [ string ] languages . LangData )
2018-01-22 08:30:31 +01:00
if config . Languages . Enabled {
files , err := ioutil . ReadDir ( config . Languages . Path )
if err != nil {
return nil , fmt . Errorf ( "Could not load language files: %s" , err . Error ( ) )
}
for _ , f := range files {
// skip dirs
if f . IsDir ( ) {
continue
}
2019-02-03 11:21:07 +01:00
// only load core .lang.yaml file, and ignore help/irc files
2018-01-22 08:30:31 +01:00
name := f . Name ( )
2018-01-23 06:06:55 +01:00
lowerName := strings . ToLower ( name )
if ! strings . HasSuffix ( lowerName , ".lang.yaml" ) {
2018-01-22 08:30:31 +01:00
continue
}
2018-01-23 06:06:55 +01:00
// don't load our example files in practice
if strings . HasPrefix ( lowerName , "example" ) {
2018-01-22 13:16:07 +01:00
continue
}
2018-01-22 08:30:31 +01:00
2018-01-23 06:06:55 +01:00
// load core info file
2018-01-22 08:30:31 +01:00
data , err = ioutil . ReadFile ( filepath . Join ( config . Languages . Path , name ) )
if err != nil {
return nil , fmt . Errorf ( "Could not load language file [%s]: %s" , name , err . Error ( ) )
}
2018-02-03 10:46:14 +01:00
var langInfo languages . LangData
2018-01-22 08:30:31 +01:00
err = yaml . Unmarshal ( data , & langInfo )
if err != nil {
return nil , fmt . Errorf ( "Could not parse language file [%s]: %s" , name , err . Error ( ) )
}
2018-01-23 06:06:55 +01:00
langInfo . Translations = make ( map [ string ] string )
// load actual translation files
var tlList map [ string ] string
// load irc strings file
ircName := strings . TrimSuffix ( name , ".lang.yaml" ) + "-irc.lang.json"
data , err = ioutil . ReadFile ( filepath . Join ( config . Languages . Path , ircName ) )
2019-02-03 11:21:07 +01:00
if err == nil {
err = json . Unmarshal ( data , & tlList )
if err != nil {
return nil , fmt . Errorf ( "Could not parse language's irc file [%s]: %s" , ircName , err . Error ( ) )
}
2018-01-23 06:06:55 +01:00
2019-02-03 11:21:07 +01:00
for key , value := range tlList {
// because of how crowdin works, this is how we skip untranslated lines
if key == value || value == "" {
continue
}
langInfo . Translations [ key ] = value
2018-01-23 06:06:55 +01:00
}
}
// load help strings file
helpName := strings . TrimSuffix ( name , ".lang.yaml" ) + "-help.lang.json"
data , err = ioutil . ReadFile ( filepath . Join ( config . Languages . Path , helpName ) )
2019-02-03 11:21:07 +01:00
if err == nil {
err = json . Unmarshal ( data , & tlList )
if err != nil {
return nil , fmt . Errorf ( "Could not parse language's help file [%s]: %s" , helpName , err . Error ( ) )
}
2018-01-23 06:06:55 +01:00
2019-02-03 11:21:07 +01:00
for key , value := range tlList {
// because of how crowdin works, this is how we skip untranslated lines
if key == value || value == "" {
continue
}
langInfo . Translations [ key ] = value
2018-01-23 06:06:55 +01:00
}
}
2018-01-22 08:30:31 +01:00
// confirm that values are correct
if langInfo . Code == "en" {
return nil , fmt . Errorf ( "Cannot have language file with code 'en' (this is the default language using strings inside the server code). If you're making an English variant, name it with a more specific code" )
}
2019-02-03 18:54:10 +01:00
if len ( langInfo . Translations ) == 0 {
// skip empty translations
continue
2018-01-22 08:30:31 +01:00
}
2019-02-03 18:54:10 +01:00
if langInfo . Code == "" || langInfo . Name == "" || langInfo . Contributors == "" {
return nil , fmt . Errorf ( "Code, name or contributors is empty in language file [%s]" , name )
2018-01-22 08:30:31 +01:00
}
// check for duplicate languages
_ , exists := config . Languages . Data [ strings . ToLower ( langInfo . Code ) ]
if exists {
return nil , fmt . Errorf ( "Language code [%s] defined twice" , langInfo . Code )
}
// and insert into lang info
config . Languages . Data [ strings . ToLower ( langInfo . Code ) ] = langInfo
}
// confirm that default language exists
if config . Languages . Default == "" {
config . Languages . Default = "en"
} else {
config . Languages . Default = strings . ToLower ( config . Languages . Default )
}
_ , exists := config . Languages . Data [ config . Languages . Default ]
if config . Languages . Default != "en" && ! exists {
return nil , fmt . Errorf ( "Cannot find default language [%s]" , config . Languages . Default )
}
}
2018-07-16 10:08:24 +02:00
// RecoverFromErrors defaults to true
if config . Debug . RecoverFromErrors == nil {
config . Debug . RecoverFromErrors = new ( bool )
* config . Debug . RecoverFromErrors = true
}
2018-07-16 09:46:40 +02:00
// casefold/validate server name
config . Server . nameCasefolded , err = Casefold ( config . Server . Name )
if err != nil {
return nil , fmt . Errorf ( "Server name isn't valid [%s]: %s" , config . Server . Name , err . Error ( ) )
}
// process operator definitions, store them to config.operators
operclasses , err := config . OperatorClasses ( )
if err != nil {
return nil , err
}
opers , err := config . Operators ( operclasses )
if err != nil {
return nil , err
}
config . operators = opers
// parse default channel modes
2018-08-28 19:34:43 +02:00
config . Channels . defaultModes = ParseDefaultChannelModes ( config . Channels . DefaultModes )
2018-07-16 09:46:40 +02:00
if config . Server . Password != "" {
2018-08-06 04:51:39 +02:00
config . Server . passwordBytes , err = decodeLegacyPasswordHash ( config . Server . Password )
2018-07-16 09:46:40 +02:00
if err != nil {
return nil , err
}
2018-08-06 04:51:39 +02:00
}
if config . Accounts . Registration . BcryptCost == 0 {
config . Accounts . Registration . BcryptCost = passwd . DefaultCost
2018-07-16 09:46:40 +02:00
}
2018-11-26 11:23:27 +01:00
// in the current implementation, we disable history by creating a history buffer
// with zero capacity. but the `enabled` config option MUST be respected regardless
// of this detail
if ! config . History . Enabled {
config . History . ChannelLength = 0
config . History . ClientLength = 0
}
2016-04-12 15:00:09 +02:00
return config , nil
2014-02-09 16:53:42 +01:00
}