ergo/irc/server.go

2164 lines
64 KiB
Go
Raw Normal View History

// Copyright (c) 2012-2014 Jeremy Latt
// Copyright (c) 2014-2015 Edmund Huber
2017-03-27 14:15:02 +02:00
// Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
// released under the MIT license
2012-04-07 20:44:59 +02:00
package irc
import (
2014-02-12 01:35:32 +01:00
"bufio"
"crypto/tls"
"encoding/base64"
"fmt"
2012-04-07 20:44:59 +02:00
"log"
2017-01-14 10:52:47 +01:00
"math/rand"
2012-04-07 20:44:59 +02:00
"net"
2014-02-12 01:35:32 +01:00
"os"
"os/signal"
"strconv"
"strings"
"sync"
"syscall"
2012-04-18 07:21:41 +02:00
"time"
2017-06-15 18:14:19 +02:00
"github.com/goshuirc/irc-go/ircfmt"
"github.com/goshuirc/irc-go/ircmsg"
"github.com/oragono/oragono/irc/caps"
"github.com/oragono/oragono/irc/connection_limits"
2017-10-05 15:39:57 +02:00
"github.com/oragono/oragono/irc/isupport"
2017-06-14 20:00:53 +02:00
"github.com/oragono/oragono/irc/logger"
2017-10-05 16:03:53 +02:00
"github.com/oragono/oragono/irc/passwd"
2017-06-14 20:00:53 +02:00
"github.com/oragono/oragono/irc/sno"
"github.com/oragono/oragono/irc/utils"
2016-08-19 15:21:52 +02:00
"github.com/tidwall/buntdb"
)
var (
// common error line to sub values into
errorMsg, _ = (&[]ircmsg.IrcMessage{ircmsg.MakeMessage(nil, "", "ERROR", "%s ")}[0]).Line()
// common error responses
couldNotParseIPMsg, _ = (&[]ircmsg.IrcMessage{ircmsg.MakeMessage(nil, "", "ERROR", "Unable to parse your IP address")}[0]).Line()
2017-09-28 07:30:53 +02:00
)
2017-10-02 05:31:40 +02:00
const (
2017-10-04 19:41:19 +02:00
rawIONotice = "This server is in debug mode and is logging all user I/O. If you do not wish for everything you send to be readable by the server owner(s), please disconnect."
2017-10-02 05:31:40 +02:00
)
// Limits holds the maximum limits for various things such as topic lengths.
2016-09-12 04:22:50 +02:00
type Limits struct {
2016-10-16 12:14:56 +02:00
AwayLen int
ChannelLen int
KickLen int
MonitorEntries int
NickLen int
TopicLen int
2016-10-23 16:50:18 +02:00
ChanListModes int
LineLen LineLenLimits
}
// LineLenLimits holds the maximum limits for IRC lines.
type LineLenLimits struct {
Tags int
Rest int
2016-09-12 04:22:50 +02:00
}
// ListenerWrapper wraps a listener so it can be safely reconfigured or stopped
type ListenerWrapper struct {
listener net.Listener
tlsConfig *tls.Config
shouldStop bool
// lets the ListenerWrapper inform the server that it has stopped:
stopEvent chan bool
// protects atomic update of tlsConfig and shouldStop:
configMutex sync.Mutex
}
// Server is the main Oragono server.
2012-04-07 20:44:59 +02:00
type Server struct {
2017-03-06 04:05:33 +01:00
accountAuthenticationEnabled bool
accountRegistration *AccountRegistration
accounts map[string]*ClientAccount
channelRegistrationEnabled bool
channels ChannelNameMap
channelJoinPartMutex sync.Mutex // used when joining/parting channels to prevent stomping over each others' access and all
checkIdent bool
clients *ClientLookupSet
commands chan Command
configFilename string
2017-09-28 07:30:53 +02:00
configurableStateMutex sync.RWMutex // generic protection for server state modified by rehash()
connectionLimiter *connection_limits.Limiter
connectionThrottler *connection_limits.Throttler
ctime time.Time
defaultChannelModes Modes
dlines *DLineManager
2017-10-04 19:41:19 +02:00
loggingRawIO bool
2017-10-05 15:39:57 +02:00
isupport *isupport.List
klines *KLineManager
limits Limits
listeners map[string]*ListenerWrapper
logger *logger.Manager
2017-03-13 23:12:39 +01:00
MaxSendQBytes uint64
monitorManager *MonitorManager
motdLines []string
name string
nameCasefolded string
networkName string
newConns chan clientConn
operators map[string]Oper
operclasses map[string]OperClass
password []byte
2017-10-05 16:03:53 +02:00
passwords *passwd.SaltedManager
registeredChannels map[string]*RegisteredChannel
registeredChannelsMutex sync.RWMutex
rehashMutex sync.Mutex
rehashSignal chan os.Signal
proxyAllowedFrom []string
signals chan os.Signal
2017-05-08 01:15:16 +02:00
snomasks *SnoManager
store *buntdb.DB
stsEnabled bool
2017-10-15 08:18:14 +02:00
webirc []webircConfig
whoWas *WhoWasList
}
var (
2016-10-23 03:48:57 +02:00
// ServerExitSignals are the signals the server will exit on.
ServerExitSignals = []os.Signal{
syscall.SIGINT,
syscall.SIGTERM,
syscall.SIGQUIT,
}
)
2016-06-28 17:09:07 +02:00
type clientConn struct {
Conn net.Conn
IsTLS bool
}
2016-10-19 13:38:31 +02:00
// NewServer returns a new Oragono server.
2017-09-28 07:30:53 +02:00
func NewServer(config *Config, logger *logger.Manager) (*Server, error) {
// TODO move this to main?
if err := GenerateHelpIndices(); err != nil {
return nil, err
}
2017-09-28 07:30:53 +02:00
// initialize data structures
2012-12-09 21:51:50 +01:00
server := &Server{
accounts: make(map[string]*ClientAccount),
channels: *NewChannelNameMap(),
clients: NewClientLookupSet(),
commands: make(chan Command),
connectionLimiter: connection_limits.NewLimiter(),
connectionThrottler: connection_limits.NewThrottler(),
listeners: make(map[string]*ListenerWrapper),
logger: logger,
monitorManager: NewMonitorManager(),
newConns: make(chan clientConn),
registeredChannels: make(map[string]*RegisteredChannel),
rehashSignal: make(chan os.Signal, 1),
signals: make(chan os.Signal, len(ServerExitSignals)),
snomasks: NewSnoManager(),
whoWas: NewWhoWasList(config.Limits.WhowasEntries),
}
2014-02-09 19:07:40 +01:00
2017-09-28 07:30:53 +02:00
if err := server.applyConfig(config, true); err != nil {
return nil, err
2016-08-19 15:21:52 +02:00
}
// Attempt to clean up when receiving these signals.
2016-10-23 03:48:57 +02:00
signal.Notify(server.signals, ServerExitSignals...)
2016-10-22 13:20:08 +02:00
signal.Notify(server.rehashSignal, syscall.SIGHUP)
2014-03-02 20:51:29 +01:00
2017-03-06 06:50:23 +01:00
return server, nil
2016-10-19 13:38:31 +02:00
}
// setISupport sets up our RPL_ISUPPORT reply.
func (server *Server) setISupport() {
maxTargetsString := strconv.Itoa(maxTargets)
server.configurableStateMutex.RLock()
// add RPL_ISUPPORT tokens
2017-10-05 15:39:57 +02:00
isupport := isupport.NewList()
isupport.Add("AWAYLEN", strconv.Itoa(server.limits.AwayLen))
isupport.Add("CASEMAPPING", casemappingName)
isupport.Add("CHANMODES", strings.Join([]string{Modes{BanMask, ExceptMask, InviteMask}.String(), "", Modes{UserLimit, Key}.String(), Modes{InviteOnly, Moderated, NoOutside, OpOnlyTopic, ChanRoleplaying, Secret}.String()}, ","))
isupport.Add("CHANNELLEN", strconv.Itoa(server.limits.ChannelLen))
isupport.Add("CHANTYPES", "#")
isupport.Add("ELIST", "U")
isupport.Add("EXCEPTS", "")
isupport.Add("INVEX", "")
isupport.Add("KICKLEN", strconv.Itoa(server.limits.KickLen))
isupport.Add("MAXLIST", fmt.Sprintf("beI:%s", strconv.Itoa(server.limits.ChanListModes)))
isupport.Add("MAXTARGETS", maxTargetsString)
isupport.Add("MODES", "")
isupport.Add("MONITOR", strconv.Itoa(server.limits.MonitorEntries))
isupport.Add("NETWORK", server.networkName)
isupport.Add("NICKLEN", strconv.Itoa(server.limits.NickLen))
isupport.Add("PREFIX", "(qaohv)~&@%+")
isupport.Add("RPCHAN", "E")
isupport.Add("RPUSER", "E")
isupport.Add("STATUSMSG", "~&@%+")
isupport.Add("TARGMAX", fmt.Sprintf("NAMES:1,LIST:1,KICK:1,WHOIS:1,USERHOST:10,PRIVMSG:%s,TAGMSG:%s,NOTICE:%s,MONITOR:", maxTargetsString, maxTargetsString, maxTargetsString))
isupport.Add("TOPICLEN", strconv.Itoa(server.limits.TopicLen))
// account registration
if server.accountRegistration.Enabled {
// 'none' isn't shown in the REGCALLBACKS vars
var enabledCallbacks []string
for _, name := range server.accountRegistration.EnabledCallbacks {
if name != "*" {
enabledCallbacks = append(enabledCallbacks, name)
}
}
isupport.Add("REGCOMMANDS", "CREATE,VERIFY")
isupport.Add("REGCALLBACKS", strings.Join(enabledCallbacks, ","))
isupport.Add("REGCREDTYPES", "passphrase,certfp")
}
server.configurableStateMutex.RUnlock()
isupport.RegenerateCachedReply()
server.configurableStateMutex.Lock()
server.isupport = isupport
server.configurableStateMutex.Unlock()
2014-02-26 00:57:35 +01:00
}
2017-03-24 03:23:21 +01:00
func loadChannelList(channel *Channel, list string, maskMode Mode) {
2014-03-08 03:14:02 +01:00
if list == "" {
return
}
channel.lists[maskMode].AddAll(strings.Split(list, " "))
2014-03-08 03:14:02 +01:00
}
2017-03-06 00:27:08 +01:00
// Shutdown shuts down the server.
func (server *Server) Shutdown() {
//TODO(dan): Make sure we disallow new nicks
2017-01-10 16:06:02 +01:00
server.clients.ByNickMutex.RLock()
2016-10-19 13:38:31 +02:00
for _, client := range server.clients.ByNick {
2016-06-19 13:59:18 +02:00
client.Notice("Server is shutting down")
}
2017-01-10 16:06:02 +01:00
server.clients.ByNickMutex.RUnlock()
if err := server.store.Close(); err != nil {
server.logger.Error("shutdown", fmt.Sprintln("Could not close datastore:", err))
}
}
2016-10-23 03:48:57 +02:00
// Run starts the server.
2014-02-24 04:13:45 +01:00
func (server *Server) Run() {
// defer closing db/store
defer server.store.Close()
done := false
for !done {
select {
case <-server.signals:
server.Shutdown()
done = true
2016-10-22 13:20:08 +02:00
case <-server.rehashSignal:
server.logger.Info("rehash", "Rehashing due to SIGHUP")
go func() {
err := server.rehash()
if err != nil {
server.logger.Error("rehash", fmt.Sprintln("Failed to rehash:", err.Error()))
}
}()
2016-10-22 13:20:08 +02:00
case conn := <-server.newConns:
2017-09-11 08:41:59 +02:00
// check IP address
ipaddr := net.ParseIP(utils.IPString(conn.Conn.RemoteAddr()))
if ipaddr == nil {
conn.Conn.Write([]byte(couldNotParseIPMsg))
conn.Conn.Close()
continue
}
2017-09-11 08:41:59 +02:00
2017-09-28 20:19:39 +02:00
isBanned, banMsg := server.checkBans(ipaddr)
if isBanned {
// this might not show up properly on some clients, but our objective here is just to close the connection out before it has a load impact on us
conn.Conn.Write([]byte(fmt.Sprintf(errorMsg, banMsg)))
conn.Conn.Close()
2016-11-04 03:42:58 +01:00
continue
}
server.logger.Debug("localconnect-ip", fmt.Sprintf("Client connecting from %v", ipaddr))
// prolly don't need to alert snomasks on this, only on connection reg
go NewClient(server, conn.Conn, conn.IsTLS)
continue
2014-02-15 03:28:36 +01:00
}
}
}
func (server *Server) checkBans(ipaddr net.IP) (banned bool, message string) {
2017-09-28 20:19:39 +02:00
// check DLINEs
isBanned, info := server.dlines.CheckIP(ipaddr)
if isBanned {
2017-10-09 19:17:49 +02:00
server.logger.Info("localconnect-ip", fmt.Sprintf("Client from %v rejected by d-line", ipaddr))
return true, info.BanMessage("You are banned from this server (%s)")
2017-09-28 20:19:39 +02:00
}
// check connection limits
err := server.connectionLimiter.AddClient(ipaddr, false)
2017-09-28 20:19:39 +02:00
if err != nil {
// too many connections from one client, tell the client and close the connection
2017-10-09 19:17:49 +02:00
server.logger.Info("localconnect-ip", fmt.Sprintf("Client from %v rejected for connection limit", ipaddr))
return true, "Too many clients from your network"
2017-09-28 20:19:39 +02:00
}
// check connection throttle
err = server.connectionThrottler.AddClient(ipaddr)
2017-09-28 20:19:39 +02:00
if err != nil {
// too many connections too quickly from client, tell them and close the connection
duration := server.connectionThrottler.BanDuration()
2017-09-28 20:19:39 +02:00
length := &IPRestrictTime{
2017-10-09 07:47:04 +02:00
Duration: duration,
Expires: time.Now().Add(duration),
2017-09-28 20:19:39 +02:00
}
server.dlines.AddIP(ipaddr, length, server.connectionThrottler.BanMessage(), "Exceeded automated connection throttle")
2017-09-28 20:19:39 +02:00
// they're DLINE'd for 15 minutes or whatever, so we can reset the connection throttle now,
// and once their temporary DLINE is finished they can fill up the throttler again
server.connectionThrottler.ResetFor(ipaddr)
2017-09-28 20:19:39 +02:00
// this might not show up properly on some clients, but our objective here is just to close it out before it has a load impact on us
2017-10-09 19:17:49 +02:00
server.logger.Info(
"localconnect-ip",
fmt.Sprintf("Client from %v exceeded connection throttle, d-lining for %v", ipaddr, duration))
return true, server.connectionThrottler.BanMessage()
2017-09-28 20:19:39 +02:00
}
return false, ""
2017-09-28 20:19:39 +02:00
}
//
// IRC protocol listeners
//
2016-10-23 03:48:57 +02:00
// createListener starts the given listeners.
func (server *Server) createListener(addr string, tlsConfig *tls.Config) *ListenerWrapper {
// make listener
listener, err := net.Listen("tcp", addr)
2012-04-07 20:44:59 +02:00
if err != nil {
2016-10-23 03:48:57 +02:00
log.Fatal(server, "listen error: ", err)
2012-04-07 20:44:59 +02:00
}
// throw our details to the server so we can be modified/killed later
wrapper := ListenerWrapper{
listener: listener,
tlsConfig: tlsConfig,
shouldStop: false,
stopEvent: make(chan bool, 1),
}
var shouldStop bool
// setup accept goroutine
go func() {
for {
conn, err := listener.Accept()
// synchronously access config data:
// whether TLS is enabled and whether we should stop listening
wrapper.configMutex.Lock()
shouldStop = wrapper.shouldStop
tlsConfig = wrapper.tlsConfig
wrapper.configMutex.Unlock()
if err == nil {
if tlsConfig != nil {
conn = tls.Server(conn, tlsConfig)
}
newConn := clientConn{
Conn: conn,
IsTLS: tlsConfig != nil,
}
// hand off the connection
2016-10-23 03:48:57 +02:00
server.newConns <- newConn
2016-06-28 17:09:07 +02:00
}
if shouldStop {
listener.Close()
wrapper.stopEvent <- true
return
}
}
}()
return &wrapper
}
2017-01-14 10:52:47 +01:00
// generateMessageID returns a network-unique message ID.
func (server *Server) generateMessageID() string {
return fmt.Sprintf("%s-%s", strconv.FormatInt(time.Now().UTC().UnixNano(), 10), strconv.FormatInt(rand.Int63(), 10))
}
2014-02-15 03:28:36 +01:00
//
// server functionality
2014-02-15 03:28:36 +01:00
//
2016-10-23 03:48:57 +02:00
func (server *Server) tryRegister(c *Client) {
if c.registered || !c.HasNick() || !c.HasUsername() ||
(c.capState == CapNegotiating) {
return
}
2017-01-11 13:38:16 +01:00
// check KLINEs
isBanned, info := server.klines.CheckMasks(c.AllNickmasks()...)
if isBanned {
reason := info.Reason
if info.Time != nil {
reason += fmt.Sprintf(" [%s]", info.Time.Duration.String())
}
c.Quit(fmt.Sprintf("You are banned from this server (%s)", reason))
2017-01-11 13:38:16 +01:00
c.destroy()
return
}
// continue registration
server.logger.Debug("localconnect", fmt.Sprintf("Client registered [%s] [u:%s] [r:%s]", c.nick, c.username, c.realname))
2017-05-08 01:15:16 +02:00
server.snomasks.Send(sno.LocalConnects, fmt.Sprintf(ircfmt.Unescape("Client registered $c[grey][$r%s$c[grey]] [u:$r%s$c[grey]] [h:$r%s$c[grey]] [r:$r%s$c[grey]]"), c.nick, c.username, c.rawHostname, c.realname))
c.Register()
2016-06-19 13:59:18 +02:00
// send welcome text
//NOTE(dan): we specifically use the NICK here instead of the nickmask
// see http://modern.ircdocs.horse/#rplwelcome-001 for details on why we avoid using the nickmask
2016-10-23 03:48:57 +02:00
c.Send(nil, server.name, RPL_WELCOME, c.nick, fmt.Sprintf("Welcome to the Internet Relay Network %s", c.nick))
c.Send(nil, server.name, RPL_YOURHOST, c.nick, fmt.Sprintf("Your host is %s, running version %s", server.name, Ver))
c.Send(nil, server.name, RPL_CREATED, c.nick, fmt.Sprintf("This server was created %s", server.ctime.Format(time.RFC1123)))
2016-06-19 13:59:18 +02:00
//TODO(dan): Look at adding last optional [<channel modes with a parameter>] parameter
2016-10-23 03:48:57 +02:00
c.Send(nil, server.name, RPL_MYINFO, c.nick, server.name, Ver, supportedUserModesString, supportedChannelModesString)
c.RplISupport()
2016-10-23 03:48:57 +02:00
server.MOTD(c)
c.Send(nil, c.nickMaskString, RPL_UMODEIS, c.nick, c.ModeString())
2017-10-04 19:41:19 +02:00
if server.logger.IsLoggingRawIO() {
c.Notice(rawIONotice)
}
}
2017-03-06 00:27:08 +01:00
// MOTD serves the Message of the Day.
2014-02-12 00:33:02 +01:00
func (server *Server) MOTD(client *Client) {
2017-09-28 07:30:53 +02:00
server.configurableStateMutex.RLock()
motdLines := server.motdLines
server.configurableStateMutex.RUnlock()
2017-09-28 07:30:53 +02:00
if len(motdLines) < 1 {
client.Send(nil, server.name, ERR_NOMOTD, client.nick, "MOTD File is missing")
2014-02-12 01:35:32 +01:00
return
}
client.Send(nil, server.name, RPL_MOTDSTART, client.nick, fmt.Sprintf("- %s Message of the day - ", server.name))
for _, line := range motdLines {
client.Send(nil, server.name, RPL_MOTD, client.nick, line)
2014-02-12 01:35:32 +01:00
}
client.Send(nil, server.name, RPL_ENDOFMOTD, client.nick, "End of MOTD command")
2014-02-12 00:33:02 +01:00
}
//
// registration commands
//
// PASS <password>
func passHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
2016-06-19 13:59:18 +02:00
if client.registered {
client.Send(nil, server.name, ERR_ALREADYREGISTRED, client.nick, "You may not reregister")
return false
}
// if no password exists, skip checking
if len(server.password) == 0 {
client.authorized = true
return false
}
// check the provided password
2016-06-19 13:59:18 +02:00
password := []byte(msg.Params[0])
2017-10-05 16:03:53 +02:00
if passwd.ComparePassword(server.password, password) != nil {
client.Send(nil, server.name, ERR_PASSWDMISMATCH, client.nick, "Password incorrect")
client.Send(nil, server.name, "ERROR", "Password incorrect")
return true
2014-02-15 03:28:36 +01:00
}
client.authorized = true
return false
}
// USER <username> * 0 <realname>
func userHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
2016-06-19 13:59:18 +02:00
if client.registered {
client.Send(nil, server.name, ERR_ALREADYREGISTRED, client.nick, "You may not reregister")
return false
}
if !client.authorized {
2016-06-19 13:59:18 +02:00
client.Quit("Bad password")
return true
}
if client.username != "" && client.realname != "" {
return false
}
// confirm that username is valid
//
_, err := CasefoldName(msg.Params[0])
if err != nil {
client.Send(nil, "", "ERROR", "Malformed username")
return true
}
if !client.HasUsername() {
client.username = "~" + msg.Params[0]
2016-10-16 12:35:50 +02:00
// don't bother updating nickmask here, it's not valid anyway
}
if client.realname == "" {
2016-06-19 13:59:18 +02:00
client.realname = msg.Params[3]
}
server.tryRegister(client)
2016-06-19 13:59:18 +02:00
return false
2014-02-15 03:28:36 +01:00
}
// QUIT [<reason>]
func quitHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
reason := "Quit"
if len(msg.Params) > 0 {
reason += ": " + msg.Params[0]
}
2016-06-19 13:59:18 +02:00
client.Quit(reason)
return true
2014-02-18 22:25:21 +01:00
}
2014-02-15 03:28:36 +01:00
//
// normal commands
//
// PING <server1> [<server2>]
func pingHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
client.Send(nil, server.name, "PONG", msg.Params...)
2016-06-22 14:04:13 +02:00
return false
2014-02-15 03:28:36 +01:00
}
// PONG <server> [ <server2> ]
func pongHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
2016-06-22 14:04:13 +02:00
// client gets touched when they send this command, so we don't need to do anything
return false
}
2017-06-05 04:01:37 +02:00
// RENAME <oldchan> <newchan> [<reason>]
//TODO(dan): Clean up this function so it doesn't look like an eldrich horror... prolly by putting it into a server.renameChannel function.
func renameHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
// get lots of locks... make sure nobody touches anything while we're doing this
server.registeredChannelsMutex.Lock()
defer server.registeredChannelsMutex.Unlock()
server.channels.ChansLock.Lock()
defer server.channels.ChansLock.Unlock()
oldName := strings.TrimSpace(msg.Params[0])
newName := strings.TrimSpace(msg.Params[1])
reason := "No reason"
if 2 < len(msg.Params) {
reason = msg.Params[2]
}
// check for all the reasons why the rename couldn't happen
casefoldedOldName, err := CasefoldChannel(oldName)
if err != nil {
//TODO(dan): Change this to ERR_CANNOTRENAME
client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, "RENAME", oldName, "Old channel name is invalid")
return false
}
channel := server.channels.Chans[casefoldedOldName]
if channel == nil {
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, oldName, "No such channel")
return false
}
//TODO(dan): allow IRCops to do this?
if !channel.ClientIsAtLeast(client, Operator) {
client.Send(nil, server.name, ERR_CHANOPRIVSNEEDED, client.nick, oldName, "Only chanops can rename channels")
return false
2017-06-05 04:01:37 +02:00
}
channel.membersMutex.Lock()
defer channel.membersMutex.Unlock()
casefoldedNewName, err := CasefoldChannel(newName)
if err != nil {
//TODO(dan): Change this to ERR_CANNOTRENAME
client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, "RENAME", newName, "New channel name is invalid")
return false
}
newChannel := server.channels.Chans[casefoldedNewName]
if newChannel != nil {
//TODO(dan): Change this to ERR_CHANNAMEINUSE
client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, "RENAME", newName, "New channel name is in use")
return false
}
var canEdit bool
server.store.Update(func(tx *buntdb.Tx) error {
chanReg := server.loadChannelNoMutex(tx, casefoldedOldName)
if chanReg == nil || !client.LoggedIntoAccount() || client.account.Name == chanReg.Founder {
2017-06-05 04:01:37 +02:00
canEdit = true
}
chanReg = server.loadChannelNoMutex(tx, casefoldedNewName)
if chanReg != nil {
canEdit = false
}
return nil
})
if !canEdit {
//TODO(dan): Change this to ERR_CANNOTRENAME
client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, "RENAME", oldName, "Only channel founders can change registered channels")
return false
}
// perform the channel rename
server.channels.Chans[casefoldedOldName] = nil
server.channels.Chans[casefoldedNewName] = channel
channel.name = strings.TrimSpace(msg.Params[1])
channel.nameCasefolded = casefoldedNewName
// rename stored channel info if any exists
server.store.Update(func(tx *buntdb.Tx) error {
chanReg := server.loadChannelNoMutex(tx, casefoldedOldName)
if chanReg == nil {
return nil
}
server.deleteChannelNoMutex(tx, casefoldedOldName)
chanReg.Name = newName
server.saveChannelNoMutex(tx, casefoldedNewName, *chanReg)
return nil
})
// send RENAME messages
for mcl := range channel.members {
if mcl.capabilities.Has(caps.Rename) {
2017-06-05 04:01:37 +02:00
mcl.Send(nil, client.nickMaskString, "RENAME", oldName, newName, reason)
} else {
mcl.Send(nil, mcl.nickMaskString, "PART", oldName, fmt.Sprintf("Channel renamed: %s", reason))
if mcl.capabilities.Has(caps.ExtendedJoin) {
2017-06-05 04:01:37 +02:00
accountName := "*"
if mcl.account != nil {
accountName = mcl.account.Name
}
mcl.Send(nil, mcl.nickMaskString, "JOIN", newName, accountName, mcl.realname)
} else {
mcl.Send(nil, mcl.nickMaskString, "JOIN", newName)
}
}
}
return false
}
// JOIN <channel>{,<channel>} [<key>{,<key>}]
func joinHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
// kill JOIN 0 requests
if msg.Params[0] == "0" {
client.Notice("JOIN 0 is not allowed")
return false
}
// handle regular JOINs
channels := strings.Split(msg.Params[0], ",")
var keys []string
if len(msg.Params) > 1 {
keys = strings.Split(msg.Params[1], ",")
}
// get lock
server.channelJoinPartMutex.Lock()
defer server.channelJoinPartMutex.Unlock()
for i, name := range channels {
casefoldedName, err := CasefoldChannel(name)
if err != nil {
if len(name) > 0 {
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, name, "No such channel")
}
2014-02-22 02:19:02 +01:00
continue
}
channel := server.channels.Get(casefoldedName)
2014-02-22 02:19:02 +01:00
if channel == nil {
if len(casefoldedName) > server.getLimits().ChannelLen {
2016-10-19 13:38:31 +02:00
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, name, "No such channel")
continue
}
2016-06-19 13:59:18 +02:00
channel = NewChannel(server, name, true)
2014-02-22 02:19:02 +01:00
}
var key string
if len(keys) > i {
key = keys[i]
}
2014-02-19 04:31:59 +01:00
channel.Join(client, key)
}
2016-06-19 13:59:18 +02:00
return false
}
// PART <channel>{,<channel>} [<reason>]
func partHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
channels := strings.Split(msg.Params[0], ",")
2016-06-19 13:59:18 +02:00
var reason string //TODO(dan): if this isn't supplied here, make sure the param doesn't exist in the PART message sent to other users
if len(msg.Params) > 1 {
reason = msg.Params[1]
}
// get lock
server.channelJoinPartMutex.Lock()
defer server.channelJoinPartMutex.Unlock()
for _, chname := range channels {
casefoldedChannelName, err := CasefoldChannel(chname)
channel := server.channels.Get(casefoldedChannelName)
if err != nil || channel == nil {
if len(chname) > 0 {
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, "No such channel")
}
continue
}
2016-06-19 13:59:18 +02:00
channel.Part(client, reason)
}
2016-06-19 13:59:18 +02:00
return false
}
// TOPIC <channel> [<topic>]
func topicHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
name, err := CasefoldChannel(msg.Params[0])
channel := server.channels.Get(name)
if err != nil || channel == nil {
if len(msg.Params[0]) > 0 {
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, msg.Params[0], "No such channel")
}
2016-06-19 13:59:18 +02:00
return false
}
if len(msg.Params) > 1 {
channel.SetTopic(client, msg.Params[1])
} else {
channel.GetTopic(client)
}
2016-06-19 13:59:18 +02:00
return false
}
// wordWrap wraps the given text into a series of lines that don't exceed lineWidth characters.
func wordWrap(text string, lineWidth int) []string {
2017-01-17 23:05:31 +01:00
var lines []string
var cacheLine, cacheWord string
for _, char := range text {
if char == '\r' {
continue
} else if char == '\n' {
cacheLine += cacheWord
lines = append(lines, cacheLine)
cacheWord = ""
cacheLine = ""
} else if (char == ' ' || char == '-') && len(cacheLine)+len(cacheWord)+1 < lineWidth {
// natural word boundary
2017-01-17 23:05:31 +01:00
cacheLine += cacheWord + string(char)
cacheWord = ""
} else if lineWidth <= len(cacheLine)+len(cacheWord)+1 {
// time to wrap to next line
2017-01-17 23:05:31 +01:00
if len(cacheLine) < (lineWidth / 2) {
// this word takes up more than half a line... just split in the middle of the word
2017-01-17 23:05:31 +01:00
cacheLine += cacheWord + string(char)
cacheWord = ""
} else {
cacheWord += string(char)
2017-01-17 23:05:31 +01:00
}
lines = append(lines, cacheLine)
cacheLine = ""
} else {
// normal character
2017-01-17 23:05:31 +01:00
cacheWord += string(char)
}
}
if 0 < len(cacheWord) {
2017-01-17 23:05:31 +01:00
cacheLine += cacheWord
}
if 0 < len(cacheLine) {
2017-01-17 23:05:31 +01:00
lines = append(lines, cacheLine)
}
2017-01-17 23:05:31 +01:00
return lines
}
// SplitMessage represents a message that's been split for sending.
type SplitMessage struct {
For512 []string
ForMaxLine string
}
2017-01-14 12:48:57 +01:00
func (server *Server) splitMessage(original string, origIs512 bool) SplitMessage {
var newSplit SplitMessage
newSplit.ForMaxLine = original
2017-01-17 23:05:31 +01:00
if !origIs512 {
newSplit.For512 = wordWrap(original, 400)
} else {
newSplit.For512 = []string{original}
}
return newSplit
}
// PRIVMSG <target>{,<target>} <message>
func privmsgHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
clientOnlyTags := GetClientOnlyTags(msg.Tags)
targets := strings.Split(msg.Params[0], ",")
message := msg.Params[1]
// split privmsg
splitMsg := server.splitMessage(message, !client.capabilities.Has(caps.MaxLine))
for i, targetString := range targets {
// max of four targets per privmsg
if i > maxTargets-1 {
break
}
2016-10-22 16:45:51 +02:00
prefixes, targetString := SplitChannelMembershipPrefixes(targetString)
lowestPrefix := GetLowestChannelModePrefix(prefixes)
// eh, no need to notify them
if len(targetString) < 1 {
continue
}
target, err := CasefoldChannel(targetString)
2016-10-16 04:59:36 +02:00
if err == nil {
channel := server.channels.Get(target)
if channel == nil {
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, targetString, "No such channel")
continue
}
if !channel.CanSpeak(client) {
client.Send(nil, client.server.name, ERR_CANNOTSENDTOCHAN, channel.name, "Cannot send to channel")
continue
}
2017-01-14 10:52:47 +01:00
msgid := server.generateMessageID()
channel.SplitPrivMsg(msgid, lowestPrefix, clientOnlyTags, client, splitMsg)
} else {
target, err = CasefoldName(targetString)
if target == "chanserv" {
server.chanservReceivePrivmsg(client, message)
continue
} else if target == "nickserv" {
server.nickservReceivePrivmsg(client, message)
continue
}
user := server.clients.Get(target)
if err != nil || user == nil {
if len(target) > 0 {
client.Send(nil, server.name, ERR_NOSUCHNICK, client.nick, target, "No such nick")
}
2016-06-19 13:59:18 +02:00
continue
}
if !user.capabilities.Has(caps.MessageTags) {
clientOnlyTags = nil
}
2017-01-14 10:52:47 +01:00
msgid := server.generateMessageID()
// restrict messages appropriately when +R is set
// intentionally make the sending user think the message went through fine
if !user.flags[RegisteredOnly] || client.registered {
user.SendSplitMsgFromClient(msgid, client, clientOnlyTags, "PRIVMSG", user.nick, splitMsg)
}
if client.capabilities.Has(caps.EchoMessage) {
2017-01-14 10:52:47 +01:00
client.SendSplitMsgFromClient(msgid, client, clientOnlyTags, "PRIVMSG", user.nick, splitMsg)
2016-10-22 14:29:01 +02:00
}
if user.flags[Away] {
2016-06-19 13:59:18 +02:00
//TODO(dan): possibly implement cooldown of away notifications to users
client.Send(nil, server.name, RPL_AWAY, user.nick, user.awayMessage)
}
}
2014-02-12 00:44:58 +01:00
}
2016-06-19 13:59:18 +02:00
return false
2012-04-07 20:44:59 +02:00
}
2012-12-13 08:27:17 +01:00
2017-01-14 06:52:32 +01:00
// TAGMSG <target>{,<target>}
func tagmsgHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
clientOnlyTags := GetClientOnlyTags(msg.Tags)
// no client-only tags, so we can drop it
if clientOnlyTags == nil {
return false
}
targets := strings.Split(msg.Params[0], ",")
for i, targetString := range targets {
// max of four targets per privmsg
if i > maxTargets-1 {
break
}
prefixes, targetString := SplitChannelMembershipPrefixes(targetString)
lowestPrefix := GetLowestChannelModePrefix(prefixes)
// eh, no need to notify them
if len(targetString) < 1 {
continue
}
target, err := CasefoldChannel(targetString)
if err == nil {
channel := server.channels.Get(target)
if channel == nil {
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, targetString, "No such channel")
continue
}
if !channel.CanSpeak(client) {
client.Send(nil, client.server.name, ERR_CANNOTSENDTOCHAN, channel.name, "Cannot send to channel")
continue
}
2017-01-14 10:52:47 +01:00
msgid := server.generateMessageID()
channel.TagMsg(msgid, lowestPrefix, clientOnlyTags, client)
2017-01-14 06:52:32 +01:00
} else {
target, err = CasefoldName(targetString)
user := server.clients.Get(target)
if err != nil || user == nil {
if len(target) > 0 {
client.Send(nil, server.name, ERR_NOSUCHNICK, client.nick, target, "No such nick")
2017-01-14 06:52:32 +01:00
}
continue
}
2017-01-14 10:52:47 +01:00
msgid := server.generateMessageID()
2017-01-14 06:52:32 +01:00
// end user can't receive tagmsgs
if !user.capabilities.Has(caps.MessageTags) {
2017-01-14 06:52:32 +01:00
continue
}
2017-01-14 10:52:47 +01:00
user.SendFromClient(msgid, client, clientOnlyTags, "TAGMSG", user.nick)
if client.capabilities.Has(caps.EchoMessage) {
2017-01-14 10:52:47 +01:00
client.SendFromClient(msgid, client, clientOnlyTags, "TAGMSG", user.nick)
2017-01-14 06:52:32 +01:00
}
if user.flags[Away] {
//TODO(dan): possibly implement cooldown of away notifications to users
client.Send(nil, server.name, RPL_AWAY, user.nick, user.awayMessage)
}
}
}
return false
}
2017-03-06 00:27:08 +01:00
// WhoisChannelsNames returns the common channel names between two users.
func (client *Client) WhoisChannelsNames(target *Client) []string {
isMultiPrefix := target.capabilities.Has(caps.MultiPrefix)
var chstrs []string
index := 0
for channel := range client.channels {
2017-01-10 17:09:08 +01:00
channel.membersMutex.RLock()
defer channel.membersMutex.RUnlock()
// channel is secret and the target can't see it
if !target.flags[Operator] && channel.flags[Secret] && !channel.members.Has(target) {
continue
}
chstrs = append(chstrs, channel.members[client].Prefixes(isMultiPrefix)+channel.name)
index++
}
return chstrs
}
// WHOIS [ <target> ] <mask> *( "," <mask> )
func whoisHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
2016-06-19 13:59:18 +02:00
var masksString string
//var target string
2014-02-09 02:43:59 +01:00
if len(msg.Params) > 1 {
//target = msg.Params[0]
2016-06-19 13:59:18 +02:00
masksString = msg.Params[1]
} else {
2016-06-19 13:59:18 +02:00
masksString = msg.Params[0]
}
2014-02-09 02:43:59 +01:00
if len(strings.TrimSpace(masksString)) < 1 {
client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, msg.Command, "No masks given")
return false
}
2016-06-19 13:59:18 +02:00
if client.flags[Operator] {
masks := strings.Split(masksString, ",")
for _, mask := range masks {
casefoldedMask, err := Casefold(mask)
if err != nil {
client.Send(nil, client.server.name, ERR_NOSUCHNICK, client.nick, mask, "No such nick")
continue
}
matches := server.clients.FindAll(casefoldedMask)
2016-06-19 13:59:18 +02:00
if len(matches) == 0 {
client.Send(nil, client.server.name, ERR_NOSUCHNICK, client.nick, mask, "No such nick")
2016-06-19 13:59:18 +02:00
continue
}
for mclient := range matches {
2016-09-05 06:23:57 +02:00
client.getWhoisOf(mclient)
2016-06-19 13:59:18 +02:00
}
2014-02-18 04:08:57 +01:00
}
2016-06-19 13:59:18 +02:00
} else {
// only get the first request
casefoldedMask, err := Casefold(strings.Split(masksString, ",")[0])
mclient := server.clients.Get(casefoldedMask)
if err != nil || mclient == nil {
client.Send(nil, client.server.name, ERR_NOSUCHNICK, client.nick, masksString, "No such nick")
2016-06-19 13:59:18 +02:00
// fall through, ENDOFWHOIS is always sent
} else {
client.getWhoisOf(mclient)
2014-02-09 02:43:59 +01:00
}
}
client.Send(nil, server.name, RPL_ENDOFWHOIS, client.nick, masksString, "End of /WHOIS list")
2016-06-19 13:59:18 +02:00
return false
}
func (client *Client) getWhoisOf(target *Client) {
client.Send(nil, client.server.name, RPL_WHOISUSER, client.nick, target.nick, target.username, target.hostname, "*", target.realname)
2017-01-13 02:05:58 +01:00
whoischannels := client.WhoisChannelsNames(target)
if whoischannels != nil {
client.Send(nil, client.server.name, RPL_WHOISCHANNELS, client.nick, target.nick, strings.Join(whoischannels, " "))
2016-09-05 06:23:57 +02:00
}
if target.class != nil {
client.Send(nil, client.server.name, RPL_WHOISOPERATOR, client.nick, target.nick, target.whoisLine)
2016-06-19 13:59:18 +02:00
}
if client.flags[Operator] || client == target {
client.Send(nil, client.server.name, RPL_WHOISACTUALLY, client.nick, target.nick, fmt.Sprintf("%s@%s", target.username, utils.LookupHostname(target.IPString())), target.IPString(), "Actual user@host, Actual IP")
}
if target.flags[TLS] {
client.Send(nil, client.server.name, RPL_WHOISSECURE, client.nick, target.nick, "is using a secure connection")
}
2016-09-05 06:23:57 +02:00
if target.certfp != "" && (client.flags[Operator] || client == target) {
client.Send(nil, client.server.name, RPL_WHOISCERTFP, client.nick, target.nick, fmt.Sprintf("has client certificate fingerprint %s", target.certfp))
2016-06-19 13:59:18 +02:00
}
client.Send(nil, client.server.name, RPL_WHOISIDLE, client.nick, target.nick, strconv.FormatUint(target.IdleSeconds(), 10), strconv.FormatInt(target.SignonTime(), 10), "seconds idle, signon time")
2016-06-19 13:59:18 +02:00
}
2017-03-27 06:30:00 +02:00
// RplWhoReplyNoMutex returns the WHO reply between one user and another channel/user.
2016-06-19 13:59:18 +02:00
// <channel> <user> <host> <server> <nick> ( "H" / "G" ) ["*"] [ ( "@" / "+" ) ]
// :<hopcount> <real name>
2017-03-27 06:30:00 +02:00
func (target *Client) RplWhoReplyNoMutex(channel *Channel, client *Client) {
2016-06-19 13:59:18 +02:00
channelName := "*"
flags := ""
if client.flags[Away] {
flags = "G"
} else {
flags = "H"
}
if client.flags[Operator] {
flags += "*"
}
if channel != nil {
flags += channel.members[client].Prefixes(target.capabilities.Has(caps.MultiPrefix))
channelName = channel.name
2016-06-19 13:59:18 +02:00
}
2016-10-16 13:28:59 +02:00
target.Send(nil, target.server.name, RPL_WHOREPLY, target.nick, channelName, client.username, client.hostname, client.server.name, client.nick, flags, strconv.Itoa(client.hops)+" "+client.realname)
2014-02-09 02:43:59 +01:00
}
2014-02-09 03:14:39 +01:00
func whoChannel(client *Client, channel *Channel, friends ClientSet) {
2017-01-10 17:09:08 +01:00
channel.membersMutex.RLock()
defer channel.membersMutex.RUnlock()
2014-02-09 03:49:52 +01:00
for member := range channel.members {
if !client.flags[Invisible] || friends[client] {
2017-03-27 06:30:00 +02:00
client.RplWhoReplyNoMutex(channel, member)
2014-02-18 06:30:14 +01:00
}
2014-02-09 03:49:52 +01:00
}
}
// WHO [ <mask> [ "o" ] ]
func whoHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
friends := client.Friends()
var mask string
if len(msg.Params) > 0 {
casefoldedMask, err := Casefold(msg.Params[0])
if err != nil {
client.Send(nil, server.name, ERR_UNKNOWNERROR, "WHO", "Mask isn't valid")
return false
}
mask = casefoldedMask
}
//TODO(dan): is this used and would I put this param in the Modern doc?
// if not, can we remove it?
//var operatorOnly bool
//if len(msg.Params) > 1 && msg.Params[1] == "o" {
// operatorOnly = true
//}
2014-02-09 03:49:52 +01:00
2014-02-09 07:42:14 +01:00
if mask == "" {
server.channels.ChansLock.RLock()
for _, channel := range server.channels.Chans {
whoChannel(client, channel, friends)
2014-02-09 03:49:52 +01:00
}
server.channels.ChansLock.RUnlock()
} else if mask[0] == '#' {
// TODO implement wildcard matching
2016-06-19 13:59:18 +02:00
//TODO(dan): ^ only for opers
channel := server.channels.Get(mask)
2014-02-09 03:49:52 +01:00
if channel != nil {
whoChannel(client, channel, friends)
2014-02-09 03:49:52 +01:00
}
} else {
for mclient := range server.clients.FindAll(mask) {
2017-03-27 06:30:00 +02:00
client.RplWhoReplyNoMutex(nil, mclient)
2014-02-09 03:49:52 +01:00
}
}
client.Send(nil, server.name, RPL_ENDOFWHO, client.nick, mask, "End of WHO list")
2016-06-19 13:59:18 +02:00
return false
2014-02-09 03:49:52 +01:00
}
2014-02-09 19:07:40 +01:00
// OPER <name> <password>
func operHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
name, err := CasefoldName(msg.Params[0])
if err != nil {
client.Send(nil, server.name, ERR_PASSWDMISMATCH, client.nick, "Password incorrect")
return true
}
if client.flags[Operator] == true {
client.Send(nil, server.name, ERR_UNKNOWNERROR, "OPER", "You're already opered-up!")
return false
}
server.configurableStateMutex.RLock()
oper := server.operators[name]
server.configurableStateMutex.RUnlock()
password := []byte(msg.Params[1])
2017-10-05 16:03:53 +02:00
err = passwd.ComparePassword(oper.Pass, password)
if (oper.Pass == nil) || (err != nil) {
client.Send(nil, server.name, ERR_PASSWDMISMATCH, client.nick, "Password incorrect")
return true
2014-02-24 07:21:39 +01:00
}
2014-02-09 19:07:40 +01:00
2014-02-24 07:21:39 +01:00
client.flags[Operator] = true
client.operName = name
client.class = oper.Class
client.whoisLine = oper.WhoisLine
// push new vhost if one is set
if len(oper.Vhost) > 0 {
for fClient := range client.Friends(caps.ChgHost) {
fClient.SendFromClient("", client, nil, "CHGHOST", client.username, oper.Vhost)
}
2017-01-14 12:48:57 +01:00
// CHGHOST requires prefix nickmask to have original hostname, so do that before updating nickmask
client.vhost = oper.Vhost
client.updateNickMask("")
}
2017-05-08 01:15:16 +02:00
// set new modes
var applied ModeChanges
if 0 < len(oper.Modes) {
modeChanges, unknownChanges := ParseUserModeChanges(strings.Split(oper.Modes, " ")...)
2017-05-08 01:15:16 +02:00
applied = client.applyUserModeChanges(true, modeChanges)
if 0 < len(unknownChanges) {
var runes string
for r := range unknownChanges {
runes += string(r)
}
client.Notice(fmt.Sprintf("Could not apply mode changes: +%s", runes))
}
}
client.Send(nil, server.name, RPL_YOUREOPER, client.nick, "You are now an IRC operator")
2017-05-08 01:15:16 +02:00
applied = append(applied, ModeChange{
mode: Operator,
op: Add,
2017-05-08 01:15:16 +02:00
})
client.Send(nil, server.name, "MODE", client.nick, applied.String())
2017-05-28 20:43:09 +02:00
server.snomasks.Send(sno.LocalOpers, fmt.Sprintf(ircfmt.Unescape("Client opered up $c[grey][$r%s$c[grey], $r%s$c[grey]]"), client.nickMaskString, client.operName))
2016-06-19 13:59:18 +02:00
return false
2014-02-09 19:07:40 +01:00
}
2014-02-10 20:14:34 +01:00
2016-10-22 13:20:08 +02:00
// rehash reloads the config and applies the changes from the config file.
func (server *Server) rehash() error {
server.logger.Debug("rehash", "Starting rehash")
// only let one REHASH go on at a time
server.rehashMutex.Lock()
defer server.rehashMutex.Unlock()
server.logger.Debug("rehash", "Got rehash lock")
2016-10-19 13:38:31 +02:00
config, err := LoadConfig(server.configFilename)
2017-09-28 07:30:53 +02:00
if err != nil {
return fmt.Errorf("Error loading config file config: %s", err.Error())
}
err = server.applyConfig(config, false)
if err != nil {
return fmt.Errorf("Error applying config changes: %s", err.Error())
}
return nil
}
func (server *Server) applyConfig(config *Config, initial bool) error {
if initial {
server.ctime = time.Now()
server.configFilename = config.Filename
2017-09-28 08:58:09 +02:00
} else {
// enforce configs that can't be changed after launch:
if server.limits.LineLen.Tags != config.Limits.LineLen.Tags || server.limits.LineLen.Rest != config.Limits.LineLen.Rest {
return fmt.Errorf("Maximum line length (linelen) cannot be changed after launching the server, rehash aborted")
} else if server.name != config.Server.Name {
return fmt.Errorf("Server name cannot be changed after launching the server, rehash aborted")
}
2017-09-28 07:30:53 +02:00
}
2016-10-19 13:38:31 +02:00
2017-09-28 07:30:53 +02:00
casefoldedName, err := Casefold(config.Server.Name)
2016-10-19 13:38:31 +02:00
if err != nil {
2017-09-28 07:30:53 +02:00
return fmt.Errorf("Server name isn't valid [%s]: %s", config.Server.Name, err.Error())
2016-10-19 13:38:31 +02:00
}
// confirm operator stuff all exists and is fine
operclasses, err := config.OperatorClasses()
if err != nil {
return fmt.Errorf("Error rehashing config file operclasses: %s", err.Error())
}
opers, err := config.Operators(operclasses)
if err != nil {
return fmt.Errorf("Error rehashing config file opers: %s", err.Error())
}
// TODO: support rehash of existing operator perms?
2017-09-28 07:30:53 +02:00
// sanity checks complete, start modifying server state
if initial {
server.name = config.Server.Name
server.nameCasefolded = casefoldedName
}
2017-09-28 07:30:53 +02:00
server.networkName = config.Network.Name
server.configurableStateMutex.Lock()
2017-09-28 07:30:53 +02:00
if config.Server.Password != "" {
server.password = config.Server.PasswordBytes()
} else {
server.password = nil
}
server.configurableStateMutex.Unlock()
2017-09-28 07:30:53 +02:00
2017-10-15 08:18:14 +02:00
// apply new WebIRC command restrictions
server.webirc = config.Server.WebIRC
2017-09-28 23:03:47 +02:00
// apply new PROXY command restrictions
server.proxyAllowedFrom = config.Server.ProxyAllowedFrom
err = server.connectionLimiter.ApplyConfig(config.Server.ConnectionLimiter)
2017-10-09 07:47:04 +02:00
if err != nil {
return err
}
err = server.connectionThrottler.ApplyConfig(config.Server.ConnectionThrottler)
2017-10-09 07:47:04 +02:00
if err != nil {
return err
}
// setup new and removed caps
addedCaps := caps.NewSet()
removedCaps := caps.NewSet()
updatedCaps := caps.NewSet()
// SASL
if config.Accounts.AuthenticationEnabled && !server.accountAuthenticationEnabled {
// enabling SASL
SupportedCapabilities.Enable(caps.SASL)
CapValues.Set(caps.SASL, "PLAIN,EXTERNAL")
addedCaps.Add(caps.SASL)
}
if !config.Accounts.AuthenticationEnabled && server.accountAuthenticationEnabled {
// disabling SASL
SupportedCapabilities.Disable(caps.SASL)
removedCaps.Add(caps.SASL)
}
server.accountAuthenticationEnabled = config.Accounts.AuthenticationEnabled
// STS
stsValue := config.Server.STS.Value()
var stsDisabled bool
stsCurrentCapValue, _ := CapValues.Get(caps.STS)
server.logger.Debug("rehash", "STS Vals", stsCurrentCapValue, stsValue, fmt.Sprintf("server[%v] config[%v]", server.stsEnabled, config.Server.STS.Enabled))
if config.Server.STS.Enabled && !server.stsEnabled {
// enabling STS
SupportedCapabilities.Enable(caps.STS)
addedCaps.Add(caps.STS)
CapValues.Set(caps.STS, stsValue)
} else if !config.Server.STS.Enabled && server.stsEnabled {
// disabling STS
SupportedCapabilities.Disable(caps.STS)
removedCaps.Add(caps.STS)
stsDisabled = true
} else if config.Server.STS.Enabled && server.stsEnabled && stsValue != stsCurrentCapValue {
// STS policy updated
CapValues.Set(caps.STS, stsValue)
updatedCaps.Add(caps.STS)
}
server.stsEnabled = config.Server.STS.Enabled
// burst new and removed caps
var capBurstClients ClientSet
added := make(map[caps.Version]string)
var removed string
// updated caps get DEL'd and then NEW'd
// so, we can just add updated ones to both removed and added lists here and they'll be correctly handled
server.logger.Debug("rehash", "Updated Caps", updatedCaps.String(caps.Cap301, CapValues), strconv.Itoa(updatedCaps.Count()))
for _, capab := range updatedCaps.List() {
addedCaps.Enable(capab)
removedCaps.Enable(capab)
}
if 0 < addedCaps.Count() || 0 < removedCaps.Count() {
capBurstClients = server.clients.AllWithCaps(caps.CapNotify)
added[caps.Cap301] = addedCaps.String(caps.Cap301, CapValues)
added[caps.Cap302] = addedCaps.String(caps.Cap302, CapValues)
// removed never has values, so we leave it as Cap301
removed = removedCaps.String(caps.Cap301, CapValues)
}
for sClient := range capBurstClients {
if stsDisabled {
// remove STS policy
//TODO(dan): this is an ugly hack. we can write this better.
stsPolicy := "sts=duration=0"
if 0 < addedCaps.Count() {
added[caps.Cap302] = added[caps.Cap302] + " " + stsPolicy
} else {
addedCaps.Enable(caps.STS)
added[caps.Cap302] = stsPolicy
}
}
// DEL caps and then send NEW ones so that updated caps get removed/added correctly
if 0 < removedCaps.Count() {
sClient.Send(nil, server.name, "CAP", sClient.nick, "DEL", removed)
}
if 0 < addedCaps.Count() {
sClient.Send(nil, server.name, "CAP", sClient.nick, "NEW", added[sClient.capVersion])
}
}
2016-10-19 13:38:31 +02:00
// set server options
server.configurableStateMutex.Lock()
lineLenConfig := LineLenLimits{
Tags: config.Limits.LineLen.Tags,
Rest: config.Limits.LineLen.Rest,
}
2016-10-19 13:38:31 +02:00
server.limits = Limits{
AwayLen: int(config.Limits.AwayLen),
ChannelLen: int(config.Limits.ChannelLen),
KickLen: int(config.Limits.KickLen),
MonitorEntries: int(config.Limits.MonitorEntries),
NickLen: int(config.Limits.NickLen),
TopicLen: int(config.Limits.TopicLen),
2016-10-23 16:50:18 +02:00
ChanListModes: int(config.Limits.ChanListModes),
LineLen: lineLenConfig,
2016-10-19 13:38:31 +02:00
}
server.operclasses = *operclasses
server.operators = opers
2016-10-19 13:38:31 +02:00
server.checkIdent = config.Server.CheckIdent
// registration
accountReg := NewAccountRegistration(config.Accounts.Registration)
2016-10-19 13:38:31 +02:00
server.accountRegistration = &accountReg
server.channelRegistrationEnabled = config.Channels.Registration.Enabled
2016-10-19 13:38:31 +02:00
server.defaultChannelModes = ParseDefaultChannelModes(config)
2017-09-28 07:30:53 +02:00
server.configurableStateMutex.Unlock()
2017-03-13 23:12:39 +01:00
// set new sendqueue size
if config.Server.MaxSendQBytes != server.MaxSendQBytes {
server.configurableStateMutex.Lock()
2017-03-13 23:12:39 +01:00
server.MaxSendQBytes = config.Server.MaxSendQBytes
server.configurableStateMutex.Unlock()
2017-03-13 23:12:39 +01:00
// update on all clients
server.clients.ByNickMutex.RLock()
for _, sClient := range server.clients.ByNick {
sClient.socket.MaxSendQBytes = config.Server.MaxSendQBytes
}
server.clients.ByNickMutex.RUnlock()
}
2016-10-19 13:38:31 +02:00
// set RPL_ISUPPORT
2017-10-02 05:31:40 +02:00
var newISupportReplies [][]string
2016-10-19 13:38:31 +02:00
oldISupportList := server.isupport
server.setISupport()
2017-09-28 07:30:53 +02:00
if oldISupportList != nil {
2017-10-02 05:31:40 +02:00
newISupportReplies = oldISupportList.GetDifference(server.isupport)
2017-09-28 07:30:53 +02:00
}
2016-10-19 13:38:31 +02:00
2017-10-08 12:17:49 +02:00
server.loadMOTD(config.Server.MOTD, config.Server.MOTDFormatting)
2017-09-28 07:30:53 +02:00
2017-10-02 05:31:40 +02:00
// reload logging config
err = server.logger.ApplyConfig(config.Logging)
if err != nil {
return err
}
2017-10-04 19:41:19 +02:00
nowLoggingRawIO := server.logger.IsLoggingRawIO()
// notify clients if raw i/o logging was enabled by a rehash
sendRawOutputNotice := !initial && !server.loggingRawIO && nowLoggingRawIO
server.loggingRawIO = nowLoggingRawIO
2017-10-02 05:31:40 +02:00
2017-09-28 07:30:53 +02:00
if initial {
if err := server.loadDatastore(config.Datastore.Path); err != nil {
return err
}
}
// we are now open for business
server.setupListeners(config)
2017-10-02 05:31:40 +02:00
if !initial {
// push new info to all of our clients
server.clients.ByNickMutex.RLock()
for _, sClient := range server.clients.ByNick {
for _, tokenline := range newISupportReplies {
sClient.Send(nil, server.name, RPL_ISUPPORT, append([]string{sClient.nick}, tokenline...)...)
}
2017-10-04 19:41:19 +02:00
if sendRawOutputNotice {
sClient.Notice(rawIONotice)
2017-10-02 05:31:40 +02:00
}
}
server.clients.ByNickMutex.RUnlock()
}
2017-09-28 07:30:53 +02:00
return nil
}
2017-10-08 12:17:49 +02:00
func (server *Server) loadMOTD(motdPath string, useFormatting bool) error {
2017-09-28 07:30:53 +02:00
server.logger.Debug("rehash", "Loading MOTD")
motdLines := make([]string, 0)
if motdPath != "" {
file, err := os.Open(motdPath)
if err == nil {
defer file.Close()
reader := bufio.NewReader(file)
for {
line, err := reader.ReadString('\n')
if err != nil {
break
}
line = strings.TrimRight(line, "\r\n")
2017-10-08 12:17:49 +02:00
if useFormatting {
line = ircfmt.Unescape(line)
}
2017-09-28 07:30:53 +02:00
// "- " is the required prefix for MOTD, we just add it here to make
// bursting it out to clients easier
line = fmt.Sprintf("- %s", line)
motdLines = append(motdLines, line)
}
} else {
return err
2016-10-19 13:38:31 +02:00
}
}
2017-09-28 07:30:53 +02:00
server.configurableStateMutex.Lock()
server.motdLines = motdLines
server.configurableStateMutex.Unlock()
2017-09-28 07:30:53 +02:00
return nil
}
func (server *Server) loadDatastore(datastorePath string) error {
// open the datastore and load server state for which it (rather than config)
// is the source of truth
server.logger.Debug("startup", "Opening datastore")
db, err := OpenDatabase(datastorePath)
if err == nil {
server.store = db
} else {
return fmt.Errorf("Failed to open datastore: %s", err.Error())
}
// load *lines (from the datastores)
server.logger.Debug("startup", "Loading D/Klines")
server.loadDLines()
server.loadKLines()
// load password manager
server.logger.Debug("startup", "Loading passwords")
err = server.store.View(func(tx *buntdb.Tx) error {
saltString, err := tx.Get(keySalt)
if err != nil {
return fmt.Errorf("Could not retrieve salt string: %s", err.Error())
}
salt, err := base64.StdEncoding.DecodeString(saltString)
if err != nil {
return err
}
2017-10-05 16:03:53 +02:00
pwm := passwd.NewSaltedManager(salt)
2017-09-28 07:30:53 +02:00
server.passwords = &pwm
return nil
})
if err != nil {
return fmt.Errorf("Could not load salt: %s", err.Error())
}
return nil
}
func (server *Server) setupListeners(config *Config) {
// update or destroy all existing listeners
tlsListeners := config.TLSListeners()
for addr := range server.listeners {
currentListener := server.listeners[addr]
var stillConfigured bool
for _, newaddr := range config.Server.Listen {
if newaddr == addr {
stillConfigured = true
break
}
}
// pass new config information to the listener, to be picked up after
// its next Accept(). this is like sending over a buffered channel of
// size 1, but where sending a second item overwrites the buffered item
// instead of blocking.
currentListener.configMutex.Lock()
currentListener.shouldStop = !stillConfigured
currentListener.tlsConfig = tlsListeners[addr]
currentListener.configMutex.Unlock()
if stillConfigured {
2017-09-28 07:30:53 +02:00
server.logger.Info("listeners",
fmt.Sprintf("now listening on %s, tls=%t.", addr, (currentListener.tlsConfig != nil)),
)
} else {
// tell the listener it should stop by interrupting its Accept() call:
currentListener.listener.Close()
2017-09-28 07:30:53 +02:00
// TODO(golang1.10) delete stopEvent once issue #21856 is released
<-currentListener.stopEvent
delete(server.listeners, addr)
2017-09-28 07:30:53 +02:00
server.logger.Info("listeners", fmt.Sprintf("stopped listening on %s.", addr))
}
}
// create new listeners that were not previously configured
for _, newaddr := range config.Server.Listen {
_, exists := server.listeners[newaddr]
if !exists {
// make new listener
server.listeners[newaddr] = server.createListener(newaddr, tlsListeners[newaddr])
}
}
2017-09-28 07:30:53 +02:00
if len(tlsListeners) == 0 {
server.logger.Warning("startup", "You are not exposing an SSL/TLS listening port. You should expose at least one port (typically 6697) to accept TLS connections")
}
var usesStandardTLSPort bool
for addr := range config.TLSListeners() {
if strings.Contains(addr, "6697") {
usesStandardTLSPort = true
break
}
}
if 0 < len(tlsListeners) && !usesStandardTLSPort {
server.logger.Warning("startup", "Port 6697 is the standard TLS port for IRC. You should (also) expose port 6697 as a TLS port to ensure clients can connect securely")
}
}
2017-10-05 15:29:34 +02:00
// GetDefaultChannelModes returns our default channel modes.
2017-09-28 07:30:53 +02:00
func (server *Server) GetDefaultChannelModes() Modes {
server.configurableStateMutex.RLock()
defer server.configurableStateMutex.RUnlock()
return server.defaultChannelModes
2016-10-22 13:20:08 +02:00
}
// REHASH
func rehashHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
server.logger.Info("rehash", fmt.Sprintf("REHASH command used by %s", client.nick))
2016-10-22 13:20:08 +02:00
err := server.rehash()
2016-10-22 13:20:08 +02:00
if err == nil {
client.Send(nil, server.name, RPL_REHASHING, client.nick, "ircd.yaml", "Rehashing")
} else {
server.logger.Error("rehash", fmt.Sprintln("Failed to rehash:", err.Error()))
2016-10-22 13:20:08 +02:00
client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, "REHASH", err.Error())
}
2016-10-19 13:38:31 +02:00
return false
}
// AWAY [<message>]
func awayHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
var isAway bool
var text string
if len(msg.Params) > 0 {
2016-06-19 13:59:18 +02:00
isAway = true
text = msg.Params[0]
awayLen := server.getLimits().AwayLen
if len(text) > awayLen {
text = text[:awayLen]
2016-09-12 04:40:09 +02:00
}
}
if isAway {
2014-02-17 22:22:35 +01:00
client.flags[Away] = true
} else {
delete(client.flags, Away)
}
client.awayMessage = text
2014-02-12 00:44:58 +01:00
var op ModeOp
2014-02-17 22:22:35 +01:00
if client.flags[Away] {
op = Add
client.Send(nil, server.name, RPL_NOWAWAY, client.nick, "You have been marked as being away")
2014-02-12 00:44:58 +01:00
} else {
op = Remove
client.Send(nil, server.name, RPL_UNAWAY, client.nick, "You are no longer marked as being away")
2014-02-12 00:44:58 +01:00
}
2016-06-19 13:59:18 +02:00
//TODO(dan): Should this be sent automagically as part of setting the flag/mode?
2017-03-24 03:23:21 +01:00
modech := ModeChanges{ModeChange{
mode: Away,
op: op,
2016-06-19 13:59:18 +02:00
}}
client.Send(nil, server.name, "MODE", client.nick, modech.String())
2016-09-12 03:56:20 +02:00
// dispatch away-notify
for friend := range client.Friends(caps.AwayNotify) {
2016-09-12 03:56:20 +02:00
if client.flags[Away] {
2017-01-14 12:48:57 +01:00
friend.SendFromClient("", client, nil, "AWAY", client.awayMessage)
2016-09-12 03:56:20 +02:00
} else {
2017-01-14 12:48:57 +01:00
friend.SendFromClient("", client, nil, "AWAY")
2016-09-12 03:56:20 +02:00
}
}
2016-06-19 13:59:18 +02:00
return false
2014-02-12 00:44:58 +01:00
}
2014-02-12 00:58:54 +01:00
// ISON <nick>{ <nick>}
func isonHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
2016-06-19 13:59:18 +02:00
var nicks = msg.Params
2014-02-12 00:58:54 +01:00
var err error
var casefoldedNick string
2014-02-12 00:58:54 +01:00
ison := make([]string, 0)
for _, nick := range nicks {
casefoldedNick, err = CasefoldName(nick)
if err != nil {
continue
}
if iclient := server.clients.Get(casefoldedNick); iclient != nil {
ison = append(ison, iclient.nick)
2014-02-12 00:58:54 +01:00
}
}
client.Send(nil, server.name, RPL_ISON, client.nick, strings.Join(nicks, " "))
2016-06-19 13:59:18 +02:00
return false
2014-02-12 00:58:54 +01:00
}
2014-02-12 01:35:32 +01:00
// MOTD [<target>]
func motdHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
//TODO(dan): hook this up when we have multiple servers I guess???
//var target string
//if len(msg.Params) > 0 {
// target = msg.Params[0]
//}
2016-06-19 13:59:18 +02:00
server.MOTD(client)
return false
2014-02-12 01:35:32 +01:00
}
2014-02-12 02:11:59 +01:00
// NOTICE <target>{,<target>} <message>
func noticeHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
clientOnlyTags := GetClientOnlyTags(msg.Tags)
2016-06-19 13:59:18 +02:00
targets := strings.Split(msg.Params[0], ",")
message := msg.Params[1]
// split privmsg
splitMsg := server.splitMessage(message, !client.capabilities.Has(caps.MaxLine))
for i, targetString := range targets {
// max of four targets per privmsg
if i > maxTargets-1 {
break
}
2016-10-22 16:45:51 +02:00
prefixes, targetString := SplitChannelMembershipPrefixes(targetString)
lowestPrefix := GetLowestChannelModePrefix(prefixes)
target, cerr := CasefoldChannel(targetString)
if cerr == nil {
2016-06-19 13:59:18 +02:00
channel := server.channels.Get(target)
if channel == nil {
// errors silently ignored with NOTICE as per RFC
continue
}
if !channel.CanSpeak(client) {
// errors silently ignored with NOTICE as per RFC
continue
}
2017-01-14 10:52:47 +01:00
msgid := server.generateMessageID()
channel.SplitNotice(msgid, lowestPrefix, clientOnlyTags, client, splitMsg)
2016-06-19 13:59:18 +02:00
} else {
target, err := CasefoldName(targetString)
if err != nil {
continue
}
if target == "chanserv" {
server.chanservReceiveNotice(client, message)
continue
} else if target == "nickserv" {
server.nickservReceiveNotice(client, message)
continue
}
2016-06-19 13:59:18 +02:00
user := server.clients.Get(target)
if user == nil {
// errors silently ignored with NOTICE as per RFC
continue
}
if !user.capabilities.Has(caps.MessageTags) {
clientOnlyTags = nil
}
2017-01-14 10:52:47 +01:00
msgid := server.generateMessageID()
// restrict messages appropriately when +R is set
// intentionally make the sending user think the message went through fine
if !user.flags[RegisteredOnly] || client.registered {
user.SendSplitMsgFromClient(msgid, client, clientOnlyTags, "NOTICE", user.nick, splitMsg)
}
if client.capabilities.Has(caps.EchoMessage) {
2017-01-14 10:52:47 +01:00
client.SendSplitMsgFromClient(msgid, client, clientOnlyTags, "NOTICE", user.nick, splitMsg)
2016-10-22 14:29:01 +02:00
}
2014-02-12 02:11:59 +01:00
}
}
2016-06-19 13:59:18 +02:00
return false
}
2014-02-17 08:29:11 +01:00
// KICK <channel>{,<channel>} <user>{,<user>} [<comment>]
func kickHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
2016-06-19 13:59:18 +02:00
channels := strings.Split(msg.Params[0], ",")
users := strings.Split(msg.Params[1], ",")
if (len(channels) != len(users)) && (len(users) != 1) {
client.Send(nil, server.name, ERR_NEEDMOREPARAMS, client.nick, "KICK", "Not enough parameters")
return false
}
var kicks [][]string
for index, channel := range channels {
if len(users) == 1 {
kicks = append(kicks, []string{channel, users[0]})
} else {
kicks = append(kicks, []string{channel, users[index]})
}
}
var comment string
if len(msg.Params) > 2 {
comment = msg.Params[2]
}
for _, info := range kicks {
chname := info[0]
nickname := info[1]
casefoldedChname, err := CasefoldChannel(chname)
channel := server.channels.Get(casefoldedChname)
if err != nil || channel == nil {
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, "No such channel")
2014-02-17 08:29:11 +01:00
continue
}
casefoldedNickname, err := CasefoldName(nickname)
target := server.clients.Get(casefoldedNickname)
if err != nil || target == nil {
client.Send(nil, server.name, ERR_NOSUCHNICK, client.nick, nickname, "No such nick")
2014-02-17 08:29:11 +01:00
continue
}
// make sure client has privs to kick the given user
2016-06-30 07:43:27 +02:00
//TODO(dan): split this into a separate function that checks if users have privs
// over other users, useful for things like -aoh as well
channel.membersMutex.Lock()
2017-01-10 17:09:08 +01:00
var hasPrivs bool
for _, mode := range ChannelPrivModes {
if channel.members[client][mode] {
hasPrivs = true
// admins cannot kick other admins
if mode == ChannelAdmin && channel.members[target][ChannelAdmin] {
hasPrivs = false
}
break
} else if channel.members[target][mode] {
break
}
}
if hasPrivs {
if comment == "" {
2016-06-30 07:43:27 +02:00
comment = nickname
}
channel.kickNoMutex(client, target, comment)
} else {
client.Send(nil, client.server.name, ERR_CHANOPRIVSNEEDED, chname, "You're not a channel operator")
}
channel.membersMutex.Unlock()
2014-02-17 08:29:11 +01:00
}
2016-06-19 13:59:18 +02:00
return false
2014-02-17 08:29:11 +01:00
}
2014-02-17 08:51:27 +01:00
// elistMatcher takes and matches ELIST conditions
type elistMatcher struct {
MinClientsActive bool
MinClients int
MaxClientsActive bool
MaxClients int
}
// Matches checks whether the given channel matches our matches.
func (matcher *elistMatcher) Matches(channel *Channel) bool {
channel.membersMutex.RLock()
defer channel.membersMutex.RUnlock()
if matcher.MinClientsActive {
if len(channel.members) < matcher.MinClients {
return false
}
}
if matcher.MaxClientsActive {
if matcher.MaxClients < len(channel.members) {
return false
}
}
return true
}
// LIST [<channel>{,<channel>}] [<elistcond>{,<elistcond>}]
func listHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
// get channels
2016-06-19 13:59:18 +02:00
var channels []string
for _, param := range msg.Params {
if 0 < len(param) && param[0] == '#' {
for _, channame := range strings.Split(param, ",") {
if 0 < len(channame) && channame[0] == '#' {
channels = append(channels, channame)
}
}
}
}
2014-02-17 08:51:27 +01:00
// get elist conditions
var matcher elistMatcher
for _, param := range msg.Params {
if len(param) < 1 {
continue
}
if param[0] == '<' {
param = param[1:]
val, err := strconv.Atoi(param)
if err != nil {
continue
}
matcher.MaxClientsActive = true
matcher.MaxClients = val - 1 // -1 because < means less than the given number
}
if param[0] == '>' {
param = param[1:]
val, err := strconv.Atoi(param)
if err != nil {
continue
}
matcher.MinClientsActive = true
matcher.MinClients = val + 1 // +1 because > means more than the given number
}
2014-02-17 08:51:27 +01:00
}
if len(channels) == 0 {
server.channels.ChansLock.RLock()
for _, channel := range server.channels.Chans {
if !client.flags[Operator] && channel.flags[Secret] {
2014-02-17 08:51:27 +01:00
continue
}
if matcher.Matches(channel) {
client.RplList(channel)
}
2014-02-17 08:51:27 +01:00
}
server.channels.ChansLock.RUnlock()
2014-02-17 08:51:27 +01:00
} else {
// limit regular users to only listing one channel
if !client.flags[Operator] {
channels = channels[:1]
}
for _, chname := range channels {
casefoldedChname, err := CasefoldChannel(chname)
channel := server.channels.Get(casefoldedChname)
if err != nil || channel == nil || (!client.flags[Operator] && channel.flags[Secret]) {
if len(chname) > 0 {
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, "No such channel")
}
2014-02-17 08:51:27 +01:00
continue
}
if matcher.Matches(channel) {
client.RplList(channel)
}
2014-02-17 08:51:27 +01:00
}
}
client.Send(nil, server.name, RPL_LISTEND, client.nick, "End of LIST")
2016-06-19 13:59:18 +02:00
return false
}
// RplList returns the RPL_LIST numeric for the given channel.
2016-06-19 13:59:18 +02:00
func (target *Client) RplList(channel *Channel) {
2017-01-10 17:09:08 +01:00
channel.membersMutex.RLock()
defer channel.membersMutex.RUnlock()
2016-06-19 13:59:18 +02:00
// get the correct number of channel members
var memberCount int
if target.flags[Operator] || channel.members.Has(target) {
memberCount = len(channel.members)
} else {
for member := range channel.members {
if !member.flags[Invisible] {
2017-03-06 00:27:08 +01:00
memberCount++
2016-06-19 13:59:18 +02:00
}
}
}
target.Send(nil, target.server.name, RPL_LIST, target.nick, channel.name, strconv.Itoa(memberCount), channel.topic)
2014-02-17 08:51:27 +01:00
}
// NAMES [<channel>{,<channel>}]
func namesHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
2016-06-19 13:59:18 +02:00
var channels []string
if len(msg.Params) > 0 {
channels = strings.Split(msg.Params[0], ",")
}
//var target string
//if len(msg.Params) > 1 {
// target = msg.Params[1]
//}
if len(channels) == 0 {
server.channels.ChansLock.RLock()
for _, channel := range server.channels.Chans {
2014-02-18 06:02:03 +01:00
channel.Names(client)
}
server.channels.ChansLock.RUnlock()
return false
2014-02-18 06:02:03 +01:00
}
// limit regular users to only listing one channel
if !client.flags[Operator] {
channels = channels[:1]
}
for _, chname := range channels {
casefoldedChname, err := CasefoldChannel(chname)
channel := server.channels.Get(casefoldedChname)
if err != nil || channel == nil {
if len(chname) > 0 {
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, "No such channel")
}
2014-02-18 06:02:03 +01:00
continue
}
channel.Names(client)
}
2016-06-19 13:59:18 +02:00
return false
2014-02-18 06:02:03 +01:00
}
// VERSION [<server>]
func versionHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
2016-06-19 13:59:18 +02:00
var target string
if len(msg.Params) > 0 {
target = msg.Params[0]
}
casefoldedTarget, err := Casefold(target)
2016-11-01 14:56:21 +01:00
if target != "" && (err != nil || casefoldedTarget != server.nameCasefolded) {
client.Send(nil, server.name, ERR_NOSUCHSERVER, client.nick, target, "No such server")
2016-06-19 13:59:18 +02:00
return false
2014-02-25 07:04:11 +01:00
}
2016-10-13 09:36:44 +02:00
client.Send(nil, server.name, RPL_VERSION, client.nick, Ver, server.name)
client.RplISupport()
2016-06-19 13:59:18 +02:00
return false
2014-02-25 07:04:11 +01:00
}
2014-02-25 16:28:09 +01:00
// INVITE <nickname> <channel>
func inviteHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
2016-06-19 13:59:18 +02:00
nickname := msg.Params[0]
channelName := msg.Params[1]
2014-02-25 16:28:09 +01:00
casefoldedNickname, err := CasefoldName(nickname)
target := server.clients.Get(casefoldedNickname)
if err != nil || target == nil {
client.Send(nil, server.name, ERR_NOSUCHNICK, client.nick, nickname, "No such nick")
2016-06-19 13:59:18 +02:00
return false
2014-02-25 16:28:09 +01:00
}
casefoldedChannelName, err := CasefoldChannel(channelName)
channel := server.channels.Get(casefoldedChannelName)
if err != nil || channel == nil {
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, channelName, "No such channel")
return false
2014-02-25 16:28:09 +01:00
}
channel.Invite(target, client)
2016-06-19 13:59:18 +02:00
return false
2014-02-25 16:28:09 +01:00
}
2014-02-25 16:45:40 +01:00
// TIME [<server>]
func timeHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
2016-06-19 13:59:18 +02:00
var target string
if len(msg.Params) > 0 {
2016-06-19 13:59:18 +02:00
target = msg.Params[0]
}
casefoldedTarget, err := Casefold(target)
if (target != "") && err != nil || (casefoldedTarget != server.nameCasefolded) {
client.Send(nil, server.name, ERR_NOSUCHSERVER, client.nick, target, "No such server")
2016-06-19 13:59:18 +02:00
return false
2014-02-25 18:10:16 +01:00
}
client.Send(nil, server.name, RPL_TIME, client.nick, server.name, time.Now().Format(time.RFC1123))
2016-06-19 13:59:18 +02:00
return false
2014-02-25 18:10:16 +01:00
}
// KILL <nickname> <comment>
func killHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
2016-06-19 13:59:18 +02:00
nickname := msg.Params[0]
comment := "<no reason supplied>"
if len(msg.Params) > 1 {
comment = msg.Params[1]
}
casefoldedNickname, err := CasefoldName(nickname)
target := server.clients.Get(casefoldedNickname)
if err != nil || target == nil {
client.Send(nil, client.server.name, ERR_NOSUCHNICK, client.nick, nickname, "No such nick")
2016-06-19 13:59:18 +02:00
return false
2014-02-25 18:10:16 +01:00
}
quitMsg := fmt.Sprintf("Killed (%s (%s))", client.nick, comment)
server.snomasks.Send(sno.LocalKills, fmt.Sprintf(ircfmt.Unescape("%s$r was killed by %s $c[grey][$r%s$c[grey]]"), target.nick, client.nick, comment))
target.exitedSnomaskSent = true
2016-06-19 13:59:18 +02:00
target.Quit(quitMsg)
target.destroy()
return false
2014-02-25 16:45:40 +01:00
}
// WHOWAS <nickname> [<count> [<server>]]
func whowasHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
2016-06-19 13:59:18 +02:00
nicknames := strings.Split(msg.Params[0], ",")
2016-06-19 13:59:18 +02:00
var count int64
if len(msg.Params) > 1 {
count, _ = strconv.ParseInt(msg.Params[1], 10, 64)
}
//var target string
//if len(msg.Params) > 2 {
// target = msg.Params[2]
//}
for _, nickname := range nicknames {
results := server.whoWas.Find(nickname, count)
if len(results) == 0 {
if len(nickname) > 0 {
client.Send(nil, server.name, ERR_WASNOSUCHNICK, client.nick, nickname, "There was no such nickname")
}
} else {
for _, whoWas := range results {
client.Send(nil, server.name, RPL_WHOWASUSER, client.nick, whoWas.nickname, whoWas.username, whoWas.hostname, "*", whoWas.realname)
}
}
if len(nickname) > 0 {
client.Send(nil, server.name, RPL_ENDOFWHOWAS, client.nick, nickname, "End of WHOWAS")
}
2014-03-06 21:14:21 +01:00
}
2016-06-19 13:59:18 +02:00
return false
2014-03-06 21:14:21 +01:00
}
2017-01-15 01:48:47 +01:00
// LUSERS [<mask> [<server>]]
2017-01-15 01:48:47 +01:00
func lusersHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
2017-01-17 12:09:51 +01:00
//TODO(vegax87) Fix network statistics and additional parameters
var totalcount, invisiblecount, opercount int
2017-01-15 01:48:47 +01:00
server.clients.ByNickMutex.RLock()
defer server.clients.ByNickMutex.RUnlock()
2017-01-15 01:48:47 +01:00
for _, onlineusers := range server.clients.ByNick {
totalcount++
2017-01-15 01:48:47 +01:00
if onlineusers.flags[Invisible] {
invisiblecount++
2017-01-15 01:48:47 +01:00
}
if onlineusers.flags[Operator] {
opercount++
2017-01-15 01:48:47 +01:00
}
}
client.Send(nil, server.name, RPL_LUSERCLIENT, client.nick, fmt.Sprintf("There are %d users and %d invisible on %d server(s)", totalcount, invisiblecount, 1))
client.Send(nil, server.name, RPL_LUSEROP, client.nick, fmt.Sprintf("%d IRC Operators online", opercount))
client.Send(nil, server.name, RPL_LUSERCHANNELS, client.nick, fmt.Sprintf("%d channels formed", server.channels.Len()))
2017-01-15 01:48:47 +01:00
client.Send(nil, server.name, RPL_LUSERME, client.nick, fmt.Sprintf("I have %d clients and %d servers", totalcount, 1))
return false
}
2017-01-23 17:44:35 +01:00
// USERHOST <nickname> [<nickname> <nickname> ...]
2017-01-23 17:44:35 +01:00
func userhostHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
returnedNicks := make(map[string]bool)
2017-01-23 17:44:35 +01:00
for i, nickname := range msg.Params {
if i >= 10 {
break
}
2017-01-23 17:44:35 +01:00
casefoldedNickname, err := CasefoldName(nickname)
target := server.clients.Get(casefoldedNickname)
if err != nil || target == nil {
client.Send(nil, client.server.name, ERR_NOSUCHNICK, client.nick, nickname, "No such nick")
return false
}
if returnedNicks[casefoldedNickname] {
continue
}
// to prevent returning multiple results for a single nick
returnedNicks[casefoldedNickname] = true
var isOper, isAway string
if target.flags[Operator] {
isOper = "*"
}
if target.flags[Away] {
isAway = "-"
} else {
isAway = "+"
}
client.Send(nil, client.server.name, RPL_USERHOST, client.nick, fmt.Sprintf("%s%s=%s%s@%s", target.nick, isOper, isAway, target.username, target.hostname))
2017-01-23 17:44:35 +01:00
}
2017-01-23 17:44:35 +01:00
return false
}