3
0
mirror of https://github.com/ergochat/ergo.git synced 2024-12-30 14:42:50 +01:00
ergo/irc/client.go

1932 lines
58 KiB
Go
Raw Normal View History

// Copyright (c) 2012-2014 Jeremy Latt
// Copyright (c) 2014-2015 Edmund Huber
2017-03-27 14:15:02 +02:00
// Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
// released under the MIT license
2012-04-07 20:44:59 +02:00
package irc
import (
2020-09-23 08:23:35 +02:00
"crypto/x509"
2012-04-18 07:11:35 +02:00
"fmt"
2012-04-07 20:44:59 +02:00
"net"
2016-10-16 12:35:50 +02:00
"runtime/debug"
"strconv"
"strings"
2017-04-18 14:26:01 +02:00
"sync"
2017-10-23 01:50:16 +02:00
"sync/atomic"
2012-12-12 08:12:35 +01:00
"time"
2017-06-15 18:14:19 +02:00
"github.com/goshuirc/irc-go/ircfmt"
"github.com/goshuirc/irc-go/ircmsg"
2017-06-14 20:00:53 +02:00
ident "github.com/oragono/go-ident"
"github.com/oragono/oragono/irc/caps"
2019-01-01 22:45:37 +01:00
"github.com/oragono/oragono/irc/connection_limits"
"github.com/oragono/oragono/irc/history"
"github.com/oragono/oragono/irc/modes"
2017-06-14 20:00:53 +02:00
"github.com/oragono/oragono/irc/sno"
"github.com/oragono/oragono/irc/utils"
2012-04-07 20:44:59 +02:00
)
const (
// maximum line length not including tags; don't change this for a public server
MaxLineLen = 512
2020-05-12 00:25:25 +02:00
// IdentTimeout is how long before our ident (username) check times out.
IdentTimeout = time.Second + 500*time.Millisecond
IRCv3TimestampFormat = utils.IRCv3TimestampFormat
2020-06-12 21:51:48 +02:00
// limit the number of device IDs a client can use, as a DoS mitigation
maxDeviceIDsPerClient = 64
// controls how often often we write an autoreplay-missed client's
// deviceid->lastseentime mapping to the database
2020-06-27 00:03:39 +02:00
lastSeenWriteInterval = time.Hour
)
2020-08-07 23:30:42 +02:00
const (
// RegisterTimeout is how long clients have to register before we disconnect them
RegisterTimeout = time.Minute
// DefaultIdleTimeout is how long without traffic before we send the client a PING
DefaultIdleTimeout = time.Minute + 30*time.Second
// For Tor clients, we send a PING at least every 30 seconds, as a workaround for this bug
// (single-onion circuits will close unless the client sends data once every 60 seconds):
// https://bugs.torproject.org/29665
TorIdleTimeout = time.Second * 30
// This is how long a client gets without sending any message, including the PONG to our
// PING, before we disconnect them:
DefaultTotalTimeout = 2*time.Minute + 30*time.Second
// Resumeable clients (clients who have negotiated caps.Resume) get longer:
ResumeableTotalTimeout = 3*time.Minute + 30*time.Second
// round off the ping interval by this much, see below:
PingCoalesceThreshold = time.Second
2020-08-07 23:30:42 +02:00
)
// ResumeDetails is a place to stash data at various stages of
// the resume process: when handling the RESUME command itself,
// when completing the registration, and when rejoining channels.
type ResumeDetails struct {
PresentedToken string
Timestamp time.Time
HistoryIncomplete bool
}
2016-10-23 03:48:57 +02:00
// Client is an IRC client.
2012-04-07 20:44:59 +02:00
type Client struct {
account string
accountName string // display name of the account: uncasefolded, '*' if not logged in
accountRegDate time.Time
2019-05-19 10:27:44 +02:00
accountSettings AccountSettings
2019-04-28 21:10:03 +02:00
away bool
2020-05-19 20:12:20 +02:00
autoAway bool
awayMessage string
2019-05-22 03:40:25 +02:00
brbTimer BrbTimer
channels ChannelSet
ctime time.Time
2019-05-27 11:52:40 +02:00
destroyed bool
modes modes.ModeSet
hostname string
2020-08-05 03:46:16 +02:00
invitedTo utils.StringSet
2019-08-27 06:51:09 +02:00
isSTSOnly bool
languages []string
2020-06-12 21:51:48 +02:00
lastActive time.Time // last time they sent a command that wasn't PONG or similar
lastSeen map[string]time.Time // maps device ID (including "") to time of last received command
lastSeenLastWrite time.Time // last time `lastSeen` was written to the datastore
2019-01-01 22:45:37 +01:00
loginThrottle connection_limits.GenericThrottle
nextSessionID int64 // Incremented when a new session is established
nick string
nickCasefolded string
nickMaskCasefolded string
2017-04-18 14:26:01 +02:00
nickMaskString string // cache for nickmask string since it's used with lots of replies
2018-04-19 08:48:19 +02:00
oper *Oper
2018-02-27 03:44:03 +01:00
preregNick string
2018-02-01 21:53:49 +01:00
proxiedIP net.IP // actual remote IP if using the PROXY protocol
2017-04-18 14:26:01 +02:00
rawHostname string
2019-05-12 08:17:57 +02:00
cloakedHostname string
realname string
2019-02-05 06:19:03 +01:00
realIP net.IP
requireSASLMessage string
requireSASL bool
registered bool
2020-08-07 23:30:42 +02:00
registrationTimer *time.Timer
resumeID string
server *Server
skeleton string
sessions []*Session
2017-11-22 10:41:11 +01:00
stateMutex sync.RWMutex // tier 1
alwaysOn bool
username string
2017-04-18 14:26:01 +02:00
vhost string
2019-05-22 03:40:25 +02:00
history history.Buffer
dirtyBits uint
writerSemaphore utils.Semaphore // tier 1.5
}
type saslStatus struct {
mechanism string
value string
}
func (s *saslStatus) Clear() {
*s = saslStatus{}
}
2020-05-18 00:06:20 +02:00
// what stage the client is at w.r.t. the PASS command:
type serverPassStatus uint
const (
serverPassUnsent serverPassStatus = iota
serverPassSuccessful
serverPassFailed
)
// Session is an individual client connection to the server (TCP connection
// and associated per-connection data, such as capabilities). There is a
// many-one relationship between sessions and clients.
type Session struct {
client *Client
2020-06-12 21:51:48 +02:00
deviceID string
ctime time.Time
2020-08-07 23:30:42 +02:00
lastActive time.Time // last non-CTCP PRIVMSG sent; updates publicly visible idle time
lastTouch time.Time // last line sent; updates timer for idle timeouts
idleTimer *time.Timer
pingSent bool // we sent PING to a putatively idle connection and we're waiting for PONG
sessionID int64
socket *Socket
realIP net.IP
proxiedIP net.IP
rawHostname string
isTor bool
2020-03-27 15:40:19 +01:00
fakelag Fakelag
deferredFakelagCount int
destroyed uint32
2020-05-18 00:06:20 +02:00
certfp string
2020-09-23 08:23:35 +02:00
peerCerts []*x509.Certificate
2020-05-18 00:06:20 +02:00
sasl saslStatus
passStatus serverPassStatus
2019-12-23 21:26:37 +01:00
batchCounter uint32
quitMessage string
capabilities caps.Set
capState caps.State
capVersion caps.Version
2019-05-22 03:40:25 +02:00
registrationMessages int
resumeID string
resumeDetails *ResumeDetails
zncPlaybackTimes *zncPlaybackTimes
autoreplayMissedSince time.Time
2019-12-23 21:26:37 +01:00
batch MultilineBatch
}
// MultilineBatch tracks the state of a client-to-server multiline batch.
type MultilineBatch struct {
label string // this is the first param to BATCH (the "reference tag")
command string
target string
responseLabel string // this is the value of the labeled-response tag sent with BATCH
message utils.SplitMessage
2020-05-15 04:16:34 +02:00
lenBytes int
2019-12-23 21:26:37 +01:00
tags map[string]string
}
2020-03-27 15:40:19 +01:00
// Starts a multiline batch, failing if there's one already open
func (s *Session) StartMultilineBatch(label, target, responseLabel string, tags map[string]string) (err error) {
if s.batch.label != "" {
return errInvalidMultilineBatch
}
s.batch.label, s.batch.target, s.batch.responseLabel, s.batch.tags = label, target, responseLabel, tags
s.fakelag.Suspend()
return
}
// Closes a multiline batch unconditionally; returns the batch and whether
// it was validly terminated (pass "" as the label if you don't care about the batch)
func (s *Session) EndMultilineBatch(label string) (batch MultilineBatch, err error) {
batch = s.batch
s.batch = MultilineBatch{}
s.fakelag.Unsuspend()
// heuristics to estimate how much data they used while fakelag was suspended
fakelagBill := (batch.lenBytes / MaxLineLen) + 1
fakelagBillLines := (batch.message.LenLines() * 60) / MaxLineLen
2020-03-27 15:40:19 +01:00
if fakelagBill < fakelagBillLines {
fakelagBill = fakelagBillLines
}
s.deferredFakelagCount = fakelagBill
2020-05-14 18:58:49 +02:00
if batch.label == "" || batch.label != label || !batch.message.ValidMultiline() {
2020-03-27 15:40:19 +01:00
err = errInvalidMultilineBatch
return
}
batch.message.SetTime()
return
}
// sets the session quit message, if there isn't one already
func (sd *Session) SetQuitMessage(message string) (set bool) {
if message == "" {
message = "Connection closed"
}
if sd.quitMessage == "" {
sd.quitMessage = message
return true
} else {
return false
}
}
func (s *Session) IP() net.IP {
if s.proxiedIP != nil {
return s.proxiedIP
}
return s.realIP
}
2019-05-27 10:18:07 +02:00
// returns whether the session was actively destroyed (for example, by ping
// timeout or NS GHOST).
// avoids a race condition between asynchronous idle-timing-out of sessions,
// and a condition that allows implicit BRB on connection errors (since
// destroy()'s socket.Close() appears to socket.Read() as a connection error)
func (session *Session) Destroyed() bool {
return atomic.LoadUint32(&session.destroyed) == 1
}
// sets the timed-out flag
func (session *Session) SetDestroyed() {
atomic.StoreUint32(&session.destroyed, 1)
}
2019-05-30 01:23:46 +02:00
// returns whether the client supports a smart history replay cap,
// and therefore autoreplay-on-join and similar should be suppressed
func (session *Session) HasHistoryCaps() bool {
return session.capabilities.Has(caps.Chathistory) || session.capabilities.Has(caps.ZNCPlayback)
2019-05-30 01:23:46 +02:00
}
2019-12-23 21:26:37 +01:00
// generates a batch ID. the uniqueness requirements for this are fairly weak:
// any two batch IDs that are active concurrently (either through interleaving
// or nesting) on an individual session connection need to be unique.
// this allows ~4 billion such batches which should be fine.
func (session *Session) generateBatchID() string {
id := atomic.AddUint32(&session.batchCounter, 1)
2020-05-03 09:27:13 +02:00
return strconv.FormatInt(int64(id), 32)
2019-12-23 21:26:37 +01:00
}
// WhoWas is the subset of client details needed to answer a WHOWAS query
type WhoWas struct {
nick string
nickCasefolded string
username string
hostname string
realname string
}
// ClientDetails is a standard set of details about a client
type ClientDetails struct {
WhoWas
nickMask string
nickMaskCasefolded string
account string
accountName string
}
// RunClient sets up a new client and runs its goroutine.
2020-05-05 04:29:10 +02:00
func (server *Server) RunClient(conn IRCConn) {
config := server.Config()
2020-05-19 15:37:06 +02:00
wConn := conn.UnderlyingConn()
var isBanned, requireSASL bool
var banMsg string
2020-05-19 15:37:06 +02:00
realIP := utils.AddrToIP(wConn.RemoteAddr())
2020-05-05 04:29:10 +02:00
var proxiedIP net.IP
2020-05-19 15:37:06 +02:00
if wConn.Config.Tor {
2020-05-05 04:29:10 +02:00
// cover up details of the tor proxying infrastructure (not a user privacy concern,
// but a hardening measure):
proxiedIP = utils.IPv4LoopbackAddress
isBanned, banMsg = server.checkTorLimits()
} else {
2020-05-05 04:29:10 +02:00
ipToCheck := realIP
2020-05-19 15:37:06 +02:00
if wConn.ProxiedIP != nil {
proxiedIP = wConn.ProxiedIP
2020-05-05 04:29:10 +02:00
ipToCheck = proxiedIP
}
// XXX only run the check script now if the IP cannot be replaced by PROXY or WEBIRC,
// otherwise we'll do it in ApplyProxiedIP.
checkScripts := proxiedIP != nil || !utils.IPInNets(realIP, config.Server.proxyAllowedFromNets)
isBanned, requireSASL, banMsg = server.checkBans(config, ipToCheck, checkScripts)
}
if isBanned {
// this might not show up properly on some clients,
// but our objective here is just to close the connection out before it has a load impact on us
conn.WriteLine([]byte(fmt.Sprintf(errorMsg, banMsg)))
2020-05-05 04:29:10 +02:00
conn.Close()
return
}
2020-05-11 00:45:32 +02:00
server.logger.Info("connect-ip", fmt.Sprintf("Client connecting: real IP %v, proxied IP %v", realIP, proxiedIP))
now := time.Now().UTC()
// give them 1k of grace over the limit:
2020-05-05 04:29:10 +02:00
socket := NewSocket(conn, config.Server.MaxSendQBytes)
2012-12-09 21:51:50 +01:00
client := &Client{
lastActive: now,
channels: make(ChannelSet),
ctime: now,
2020-05-19 15:37:06 +02:00
isSTSOnly: wConn.Config.STSOnly,
languages: server.Languages().Default(),
2019-01-01 22:45:37 +01:00
loginThrottle: connection_limits.GenericThrottle{
Duration: config.Accounts.LoginThrottling.Duration,
Limit: config.Accounts.LoginThrottling.MaxAttempts,
},
server: server,
accountName: "*",
nick: "*", // * is used until actual nick is given
nickCasefolded: "*",
nickMaskString: "*", // * is used until actual nick is given
2020-05-05 04:29:10 +02:00
realIP: realIP,
proxiedIP: proxiedIP,
requireSASL: requireSASL,
nextSessionID: 1,
2012-12-09 21:51:50 +01:00
}
if requireSASL {
client.requireSASLMessage = banMsg
}
client.writerSemaphore.Initialize(1)
2020-05-19 13:57:44 +02:00
client.history.Initialize(config.History.ClientLength, time.Duration(config.History.AutoresizeWindow))
2019-05-22 03:40:25 +02:00
client.brbTimer.Initialize(client)
session := &Session{
client: client,
socket: socket,
capVersion: caps.Cap301,
capState: caps.NoneState,
ctime: now,
lastActive: now,
realIP: realIP,
2020-05-05 04:29:10 +02:00
proxiedIP: proxiedIP,
2020-05-19 15:37:06 +02:00
isTor: wConn.Config.Tor,
}
client.sessions = []*Session{session}
2016-09-07 13:32:58 +02:00
session.resetFakelag()
2020-05-19 15:37:06 +02:00
if wConn.Secure {
2020-05-10 12:17:11 +02:00
client.SetMode(modes.TLS, true)
}
2020-05-19 15:37:06 +02:00
if wConn.Config.TLSConfig != nil {
2016-09-07 13:32:58 +02:00
// error is not useful to us here anyways so we can ignore it
2020-09-23 08:23:35 +02:00
session.certfp, session.peerCerts, _ = utils.GetCertFP(wConn.Conn, RegisterTimeout)
2016-06-28 17:09:07 +02:00
}
2019-02-26 03:50:43 +01:00
2020-05-05 04:29:10 +02:00
if session.isTor {
session.rawHostname = config.Server.TorListeners.Vhost
2019-12-17 21:10:23 +01:00
client.rawHostname = session.rawHostname
2019-02-26 03:50:43 +01:00
} else {
2020-05-05 04:29:10 +02:00
if config.Server.CheckIdent {
2020-05-19 15:37:06 +02:00
client.doIdentLookup(wConn.Conn)
}
2019-02-26 03:50:43 +01:00
}
2020-08-07 23:30:42 +02:00
client.registrationTimer = time.AfterFunc(RegisterTimeout, client.handleRegisterTimeout)
2019-07-01 15:21:38 +02:00
server.stats.Add()
2020-05-05 04:29:10 +02:00
client.run(session)
2019-02-26 03:50:43 +01:00
}
2020-07-06 10:08:04 +02:00
func (server *Server) AddAlwaysOnClient(account ClientAccount, chnames []string, lastSeen map[string]time.Time, uModes modes.Modes, realname string) {
now := time.Now().UTC()
config := server.Config()
2020-06-14 19:52:29 +02:00
if lastSeen == nil && account.Settings.AutoreplayMissed {
lastSeen = map[string]time.Time{"": now}
}
client := &Client{
lastSeen: lastSeen,
lastActive: now,
channels: make(ChannelSet),
ctime: now,
languages: server.Languages().Default(),
server: server,
// TODO figure out how to set these on reattach?
username: "~user",
rawHostname: server.name,
realIP: utils.IPv4LoopbackAddress,
alwaysOn: true,
2020-07-06 10:08:04 +02:00
realname: realname,
nextSessionID: 1,
}
client.SetMode(modes.TLS, true)
2020-05-19 20:38:56 +02:00
for _, m := range uModes {
client.SetMode(m, true)
}
client.writerSemaphore.Initialize(1)
client.history.Initialize(0, 0)
client.brbTimer.Initialize(client)
server.accounts.Login(client, account)
client.resizeHistory(config)
2020-05-19 20:12:20 +02:00
_, err, _ := server.clients.SetNick(client, nil, account.Name)
if err != nil {
server.logger.Error("internal", "could not establish always-on client", account.Name, err.Error())
return
} else {
server.logger.Debug("accounts", "established always-on client", account.Name)
}
// XXX set this last to avoid confusing SetNick:
client.registered = true
for _, chname := range chnames {
// XXX we're using isSajoin=true, to make these joins succeed even without channel key
// this is *probably* ok as long as the persisted memberships are accurate
server.channels.Join(client, chname, "", true, nil)
}
2020-05-19 20:12:20 +02:00
if persistenceEnabled(config.Accounts.Multiclient.AutoAway, client.accountSettings.AutoAway) {
client.autoAway = true
client.away = true
client.awayMessage = client.t("User is currently disconnected")
}
}
func (client *Client) resizeHistory(config *Config) {
status, _ := client.historyStatus(config)
if status == HistoryEphemeral {
2020-05-19 13:57:44 +02:00
client.history.Resize(config.History.ClientLength, time.Duration(config.History.AutoresizeWindow))
} else {
client.history.Resize(0, 0)
}
}
2019-12-17 21:10:23 +01:00
// resolve an IP to an IRC-ready hostname, using reverse DNS, forward-confirming if necessary,
// and sending appropriate notices to the client
func (client *Client) lookupHostname(session *Session, overwrite bool) {
if session.isTor {
2019-12-17 21:10:23 +01:00
return
} // else: even if cloaking is enabled, look up the real hostname to show to operators
config := client.server.Config()
ip := session.realIP
if session.proxiedIP != nil {
ip = session.proxiedIP
}
ipString := ip.String()
var hostname, candidate string
if config.Server.lookupHostnames {
session.Notice("*** Looking up your hostname...")
names, err := net.LookupAddr(ipString)
if err == nil && 0 < len(names) {
candidate = strings.TrimSuffix(names[0], ".")
}
if utils.IsHostname(candidate) {
if config.Server.ForwardConfirmHostnames {
addrs, err := net.LookupHost(candidate)
if err == nil {
for _, addr := range addrs {
if addr == ipString {
hostname = candidate // successful forward confirmation
break
}
}
}
} else {
hostname = candidate
}
}
}
if hostname != "" {
session.Notice("*** Found your hostname")
} else {
if config.Server.lookupHostnames {
session.Notice("*** Couldn't look up your hostname")
}
hostname = utils.IPStringToHostname(ipString)
}
session.rawHostname = hostname
2019-12-18 01:57:23 +01:00
cloakedHostname := config.Server.Cloaks.ComputeCloak(ip)
client.stateMutex.Lock()
defer client.stateMutex.Unlock()
2019-12-17 21:10:23 +01:00
// update the hostname if this is a new connection or a resume, but not if it's a reattach
if overwrite || client.rawHostname == "" {
client.rawHostname = hostname
client.cloakedHostname = cloakedHostname
client.updateNickMaskNoMutex()
}
}
2019-02-26 03:50:43 +01:00
func (client *Client) doIdentLookup(conn net.Conn) {
2020-05-05 04:29:10 +02:00
localTCPAddr, ok := conn.LocalAddr().(*net.TCPAddr)
if !ok {
2019-02-26 03:50:43 +01:00
return
}
2020-05-05 04:29:10 +02:00
serverPort := localTCPAddr.Port
remoteTCPAddr, ok := conn.RemoteAddr().(*net.TCPAddr)
if !ok {
2019-02-26 03:50:43 +01:00
return
}
2020-05-05 04:29:10 +02:00
clientPort := remoteTCPAddr.Port
2019-02-26 03:50:43 +01:00
client.Notice(client.t("*** Looking up your username"))
2020-05-12 00:25:25 +02:00
resp, err := ident.Query(remoteTCPAddr.IP.String(), serverPort, clientPort, IdentTimeout)
2019-02-26 03:50:43 +01:00
if err == nil {
err := client.SetNames(resp.Identifier, "", true)
if err == nil {
2019-02-26 03:50:43 +01:00
client.Notice(client.t("*** Found your username"))
// we don't need to updateNickMask here since nickMask is not used for anything yet
} else {
2019-02-26 03:50:43 +01:00
client.Notice(client.t("*** Got a malformed username, ignoring"))
}
2019-02-26 03:50:43 +01:00
} else {
client.Notice(client.t("*** Could not find your username"))
}
2012-04-07 20:44:59 +02:00
}
2019-05-23 02:25:57 +02:00
type AuthOutcome uint
const (
authSuccess AuthOutcome = iota
authFailPass
authFailTorSaslRequired
authFailSaslRequired
)
func (client *Client) isAuthorized(server *Server, config *Config, session *Session, forceRequireSASL bool) AuthOutcome {
2019-02-05 06:19:03 +01:00
saslSent := client.account != ""
2019-02-26 03:50:43 +01:00
// PASS requirement
2020-05-18 00:06:20 +02:00
if (config.Server.passwordBytes != nil) && session.passStatus != serverPassSuccessful && !(config.Accounts.SkipServerPassword && saslSent) {
2019-05-23 02:25:57 +02:00
return authFailPass
2019-02-05 06:19:03 +01:00
}
2019-02-26 03:50:43 +01:00
// Tor connections may be required to authenticate with SASL
if session.isTor && config.Server.TorListeners.RequireSasl && !saslSent {
2019-05-23 02:25:57 +02:00
return authFailTorSaslRequired
2019-02-26 03:50:43 +01:00
}
// finally, enforce require-sasl
if !saslSent && (forceRequireSASL || config.Accounts.RequireSasl.Enabled || server.Defcon() <= 2) &&
2020-07-08 11:32:14 +02:00
!utils.IPInNets(session.IP(), config.Accounts.RequireSasl.exemptedNets) {
2019-05-23 02:25:57 +02:00
return authFailSaslRequired
}
return authSuccess
2019-02-05 06:19:03 +01:00
}
func (session *Session) resetFakelag() {
var flc FakelagConfig = session.client.server.Config().Fakelag
flc.Enabled = flc.Enabled && !session.client.HasRoleCapabs("nofakelag")
session.fakelag.Initialize(flc)
2018-03-22 16:04:21 +01:00
}
// IP returns the IP address of this client.
func (client *Client) IP() net.IP {
2019-02-05 06:19:03 +01:00
client.stateMutex.RLock()
defer client.stateMutex.RUnlock()
2018-02-01 21:53:49 +01:00
if client.proxiedIP != nil {
return client.proxiedIP
}
2019-02-05 06:19:03 +01:00
return client.realIP
}
// IPString returns the IP address of this client as a string.
func (client *Client) IPString() string {
ip := client.IP().String()
if 0 < len(ip) && ip[0] == ':' {
ip = "0" + ip
}
return ip
}
2019-07-01 15:21:38 +02:00
// t returns the translated version of the given string, based on the languages configured by the client.
func (client *Client) t(originalString string) string {
languageManager := client.server.Config().languageManager
if !languageManager.Enabled() {
return originalString
}
return languageManager.Translate(client.Languages(), originalString)
}
2019-11-20 23:14:42 +01:00
// main client goroutine: read lines and execute the corresponding commands
// `proxyLine` is the PROXY-before-TLS line, if there was one
2020-05-05 04:29:10 +02:00
func (client *Client) run(session *Session) {
2017-10-24 00:38:32 +02:00
defer func() {
2017-10-26 11:15:55 +02:00
if r := recover(); r != nil {
client.server.logger.Error("internal",
fmt.Sprintf("Client caused panic: %v\n%s", r, debug.Stack()))
2019-05-23 01:07:12 +02:00
if client.server.Config().Debug.recoverFromErrors {
2017-10-26 11:15:55 +02:00
client.server.logger.Error("internal", "Disconnecting client and attempting to recover")
} else {
panic(r)
2017-10-26 10:19:01 +02:00
}
2017-10-24 00:38:32 +02:00
}
// ensure client connection gets closed
2019-05-22 03:40:25 +02:00
client.destroy(session)
2017-10-24 00:38:32 +02:00
}()
isReattach := client.Registered()
2019-05-09 00:14:49 +02:00
if isReattach {
2020-08-07 23:30:42 +02:00
client.Touch(session)
2019-05-22 03:40:25 +02:00
if session.resumeDetails != nil {
session.playResume()
session.resumeDetails = nil
client.brbTimer.Disable()
2019-07-04 12:59:08 +02:00
client.SetAway(false, "") // clear BRB message if any
2019-05-22 03:40:25 +02:00
} else {
client.playReattachMessages(session)
}
}
2018-03-22 16:04:21 +01:00
2019-05-27 10:18:07 +02:00
firstLine := !isReattach
for {
2020-06-22 20:54:43 +02:00
var invalidUtf8 bool
2020-05-05 04:29:10 +02:00
line, err := session.socket.Read()
2020-06-22 20:54:43 +02:00
if err == errInvalidUtf8 {
invalidUtf8 = true // handle as normal, including labeling
} else if err != nil {
2018-03-18 02:32:12 +01:00
quitMessage := "connection closed"
if err == errReadQ {
quitMessage = "readQ exceeded"
}
client.Quit(quitMessage, session)
2019-05-22 03:40:25 +02:00
// since the client did not actually send us a QUIT,
2019-05-27 10:18:07 +02:00
// give them a chance to resume if applicable:
if !session.Destroyed() {
client.brbTimer.Enable()
}
break
}
if client.server.logger.IsLoggingRawIO() {
client.server.logger.Debug("userinput", client.nick, "<- ", line)
}
// special-cased handling of PROXY protocol, see `handleProxyCommand` for details:
2019-05-27 10:18:07 +02:00
if firstLine {
firstLine = false
if strings.HasPrefix(line, "PROXY") {
err = handleProxyCommand(client.server, client, session, line)
if err != nil {
break
} else {
continue
}
}
}
if client.registered {
2020-03-27 15:40:19 +01:00
touches := session.deferredFakelagCount + 1
session.deferredFakelagCount = 0
for i := 0; i < touches; i++ {
session.fakelag.Touch()
}
} else {
// DoS hardening, #505
session.registrationMessages++
if client.server.Config().Limits.RegistrationMessages < session.registrationMessages {
client.Send(nil, client.server.name, ERR_UNKNOWNERROR, "*", client.t("You have sent too many registration messages"))
break
}
}
msg, err := ircmsg.ParseLineStrict(line, true, MaxLineLen)
if err == ircmsg.ErrorLineIsEmpty {
continue
} else if err == ircmsg.ErrorLineTooLong {
session.Send(nil, client.server.name, ERR_INPUTTOOLONG, client.Nick(), client.t("Input line too long"))
continue
} else if err != nil {
client.Quit(client.t("Received malformed line"), session)
break
2014-02-24 07:21:39 +01:00
}
cmd, exists := Commands[msg.Command]
if !exists {
2020-05-08 11:44:40 +02:00
cmd = unknownCommand
2020-06-22 20:54:43 +02:00
} else if invalidUtf8 {
cmd = invalidUtf8Command
}
isExiting := cmd.Run(client.server, client, session, msg)
if isExiting {
break
} else if session.client != client {
// bouncer reattach
2020-05-05 04:29:10 +02:00
go session.client.run(session)
break
}
2014-02-24 07:21:39 +01:00
}
}
2019-05-09 00:14:49 +02:00
func (client *Client) playReattachMessages(session *Session) {
client.server.playRegistrationBurst(session)
hasHistoryCaps := session.HasHistoryCaps()
for _, channel := range session.client.Channels() {
channel.playJoinForSession(session)
// clients should receive autoreplay-on-join lines, if applicable:
if hasHistoryCaps {
continue
}
2019-05-30 01:23:46 +02:00
// if they negotiated znc.in/playback or chathistory, they will receive nothing,
// because those caps disable autoreplay-on-join and they haven't sent the relevant
// *playback PRIVMSG or CHATHISTORY command yet
rb := NewResponseBuffer(session)
channel.autoReplayHistory(client, rb, "")
rb.Send(true)
}
if !session.autoreplayMissedSince.IsZero() && !hasHistoryCaps {
rb := NewResponseBuffer(session)
2020-02-28 01:07:49 +01:00
zncPlayPrivmsgs(client, rb, "*", time.Now().UTC(), session.autoreplayMissedSince)
rb.Send(true)
}
session.autoreplayMissedSince = time.Time{}
}
//
// idle, quit, timers and timeouts
//
// Touch indicates that we received a line from the client (so the connection is healthy
2020-06-29 10:32:39 +02:00
// at this time, modulo network latency and fakelag).
func (client *Client) Touch(session *Session) {
2020-06-12 21:51:48 +02:00
var markDirty bool
now := time.Now().UTC()
2017-12-03 02:05:06 +01:00
client.stateMutex.Lock()
2020-06-18 09:38:00 +02:00
if client.accountSettings.AutoreplayMissed || session.deviceID != "" {
2020-06-12 21:51:48 +02:00
client.setLastSeen(now, session.deviceID)
if now.Sub(client.lastSeenLastWrite) > lastSeenWriteInterval {
markDirty = true
client.lastSeenLastWrite = now
}
}
2020-08-07 23:30:42 +02:00
client.updateIdleTimer(session, now)
2020-06-12 21:51:48 +02:00
client.stateMutex.Unlock()
if markDirty {
client.markDirty(IncludeLastSeen)
}
}
func (client *Client) setLastSeen(now time.Time, deviceID string) {
2020-06-14 19:52:29 +02:00
if client.lastSeen == nil {
client.lastSeen = make(map[string]time.Time)
}
2020-06-12 21:51:48 +02:00
client.lastSeen[deviceID] = now
// evict the least-recently-used entry if necessary
if maxDeviceIDsPerClient < len(client.lastSeen) {
var minLastSeen time.Time
var minClientId string
for deviceID, lastSeen := range client.lastSeen {
if minLastSeen.IsZero() || lastSeen.Before(minLastSeen) {
minClientId, minLastSeen = deviceID, lastSeen
}
}
delete(client.lastSeen, minClientId)
}
2014-02-18 22:25:21 +01:00
}
2020-08-07 23:30:42 +02:00
func (client *Client) updateIdleTimer(session *Session, now time.Time) {
session.lastTouch = now
session.pingSent = false
if session.idleTimer == nil {
pingTimeout := DefaultIdleTimeout
if session.isTor {
pingTimeout = TorIdleTimeout
}
session.idleTimer = time.AfterFunc(pingTimeout, session.handleIdleTimeout)
}
}
func (session *Session) handleIdleTimeout() {
totalTimeout := DefaultTotalTimeout
if session.capabilities.Has(caps.Resume) {
totalTimeout = ResumeableTotalTimeout
}
pingTimeout := DefaultIdleTimeout
if session.isTor {
pingTimeout = TorIdleTimeout
}
session.client.stateMutex.Lock()
now := time.Now()
timeUntilDestroy := session.lastTouch.Add(totalTimeout).Sub(now)
timeUntilPing := session.lastTouch.Add(pingTimeout).Sub(now)
shouldDestroy := session.pingSent && timeUntilDestroy <= 0
// XXX this should really be time <= 0, but let's do some hacky timer coalescing:
// a typical idling client will do nothing other than respond immediately to our pings,
// so we'll PING at t=0, they'll respond at t=0.05, then we'll wake up at t=90 and find
// that we need to PING again at t=90.05. Rather than wake up again, just send it now:
shouldSendPing := !session.pingSent && timeUntilPing <= PingCoalesceThreshold
2020-08-07 23:30:42 +02:00
if !shouldDestroy {
if shouldSendPing {
session.pingSent = true
}
// check in again at the minimum of these 3 possible intervals:
// 1. the ping timeout (assuming we PING and they reply immediately with PONG)
// 2. the next time we would send PING (if they don't send any more lines)
// 3. the next time we would destroy (if they don't send any more lines)
nextTimeout := pingTimeout
if PingCoalesceThreshold < timeUntilPing && timeUntilPing < nextTimeout {
2020-08-07 23:30:42 +02:00
nextTimeout = timeUntilPing
}
if 0 < timeUntilDestroy && timeUntilDestroy < nextTimeout {
nextTimeout = timeUntilDestroy
}
session.idleTimer.Stop()
session.idleTimer.Reset(nextTimeout)
}
session.client.stateMutex.Unlock()
if shouldDestroy {
session.client.Quit(fmt.Sprintf("Ping timeout: %v", totalTimeout), session)
session.client.destroy(session)
} else if shouldSendPing {
session.Ping()
}
}
func (session *Session) stopIdleTimer() {
session.client.stateMutex.Lock()
defer session.client.stateMutex.Unlock()
if session.idleTimer != nil {
session.idleTimer.Stop()
}
}
2017-10-15 18:24:28 +02:00
// Ping sends the client a PING message.
func (session *Session) Ping() {
session.Send(nil, "", "PING", session.client.Nick())
}
// tryResume tries to resume if the client asked us to.
2019-05-22 03:40:25 +02:00
func (session *Session) tryResume() (success bool) {
var oldResumeID string
defer func() {
2019-05-22 03:40:25 +02:00
if success {
// "On a successful request, the server [...] terminates the old client's connection"
oldSession := session.client.GetSessionByResumeID(oldResumeID)
if oldSession != nil {
session.client.destroy(oldSession)
}
} else {
session.resumeDetails = nil
}
}()
2019-05-22 03:40:25 +02:00
client := session.client
server := client.server
config := server.Config()
2019-05-22 03:40:25 +02:00
oldClient, oldResumeID := server.resumeManager.VerifyToken(client, session.resumeDetails.PresentedToken)
if oldClient == nil {
2019-05-22 03:40:25 +02:00
session.Send(nil, server.name, "FAIL", "RESUME", "INVALID_TOKEN", client.t("Cannot resume connection, token is not valid"))
2018-01-21 03:23:47 +01:00
return
}
resumeAllowed := config.Server.AllowPlaintextResume || (oldClient.HasMode(modes.TLS) && client.HasMode(modes.TLS))
if !resumeAllowed {
2019-05-22 03:40:25 +02:00
session.Send(nil, server.name, "FAIL", "RESUME", "INSECURE_SESSION", client.t("Cannot resume connection, old and new clients must have TLS"))
return
}
2019-05-22 03:40:25 +02:00
err := server.clients.Resume(oldClient, session)
if err != nil {
2019-05-22 03:40:25 +02:00
session.Send(nil, server.name, "FAIL", "RESUME", "CANNOT_RESUME", client.t("Cannot resume connection"))
return
}
success = true
2019-05-22 03:40:25 +02:00
client.server.logger.Debug("quit", fmt.Sprintf("%s is being resumed", oldClient.Nick()))
2019-05-22 03:40:25 +02:00
return
}
2019-05-22 03:40:25 +02:00
// playResume is called from the session's fresh goroutine after a resume;
// it sends notifications to friends, then plays the registration burst and replays
// stored history to the session
func (session *Session) playResume() {
client := session.client
server := client.server
config := server.Config()
friends := make(ClientSet)
var oldestLostMessage time.Time
// work out how much time, if any, is not covered by history buffers
// assume that a persistent buffer covers the whole resume period
2019-05-22 03:40:25 +02:00
for _, channel := range client.Channels() {
for _, member := range channel.Members() {
friends.Add(member)
}
status, _ := channel.historyStatus(config)
if status == HistoryEphemeral {
lastDiscarded := channel.history.LastDiscarded()
if oldestLostMessage.Before(lastDiscarded) {
oldestLostMessage = lastDiscarded
}
}
}
cHistoryStatus, _ := client.historyStatus(config)
if cHistoryStatus == HistoryEphemeral {
lastDiscarded := client.history.LastDiscarded()
if oldestLostMessage.Before(lastDiscarded) {
oldestLostMessage = lastDiscarded
}
}
_, privmsgSeq, _ := server.GetHistorySequence(nil, client, "*")
if privmsgSeq != nil {
privmsgs, _, _ := privmsgSeq.Between(history.Selector{}, history.Selector{}, config.History.ClientLength)
for _, item := range privmsgs {
sender := server.clients.Get(stripMaskFromNick(item.Nick))
if sender != nil {
friends.Add(sender)
}
}
}
2019-05-22 03:40:25 +02:00
timestamp := session.resumeDetails.Timestamp
gap := oldestLostMessage.Sub(timestamp)
2019-05-29 13:34:23 +02:00
session.resumeDetails.HistoryIncomplete = gap > 0 || timestamp.IsZero()
gapSeconds := int(gap.Seconds()) + 1 // round up to avoid confusion
2019-05-22 03:40:25 +02:00
details := client.Details()
oldNickmask := details.nickMask
2019-12-17 21:10:23 +01:00
client.lookupHostname(session, true)
2019-05-22 03:40:25 +02:00
hostname := client.Hostname() // may be a vhost
2019-05-29 13:34:23 +02:00
timestampString := timestamp.Format(IRCv3TimestampFormat)
2019-05-22 03:40:25 +02:00
// send quit/resume messages to friends
for friend := range friends {
2019-05-22 03:40:25 +02:00
if friend == client {
continue
}
for _, fSession := range friend.Sessions() {
if fSession.capabilities.Has(caps.Resume) {
2019-05-29 13:34:23 +02:00
if !session.resumeDetails.HistoryIncomplete {
fSession.Send(nil, oldNickmask, "RESUMED", hostname, "ok")
} else if session.resumeDetails.HistoryIncomplete && !timestamp.IsZero() {
2019-05-22 03:40:25 +02:00
fSession.Send(nil, oldNickmask, "RESUMED", hostname, timestampString)
} else {
fSession.Send(nil, oldNickmask, "RESUMED", hostname)
}
} else {
2019-05-29 13:34:23 +02:00
if !session.resumeDetails.HistoryIncomplete {
fSession.Send(nil, oldNickmask, "QUIT", friend.t("Client reconnected"))
2019-05-29 13:34:23 +02:00
} else if session.resumeDetails.HistoryIncomplete && !timestamp.IsZero() {
fSession.Send(nil, oldNickmask, "QUIT", fmt.Sprintf(friend.t("Client reconnected (up to %d seconds of message history lost)"), gapSeconds))
} else {
fSession.Send(nil, oldNickmask, "QUIT", friend.t("Client reconnected (message history may have been lost)"))
}
}
}
}
if session.resumeDetails.HistoryIncomplete {
if !timestamp.IsZero() {
session.Send(nil, client.server.name, "WARN", "RESUME", "HISTORY_LOST", fmt.Sprintf(client.t("Resume may have lost up to %d seconds of history"), gapSeconds))
} else {
session.Send(nil, client.server.name, "WARN", "RESUME", "HISTORY_LOST", client.t("Resume may have lost some message history"))
}
}
2019-05-22 21:08:02 +02:00
session.Send(nil, client.server.name, "RESUME", "SUCCESS", details.nick)
2018-04-24 09:11:11 +02:00
2019-05-22 03:40:25 +02:00
server.playRegistrationBurst(session)
2019-05-22 03:40:25 +02:00
for _, channel := range client.Channels() {
channel.Resume(session, timestamp)
}
// replay direct PRIVSMG history
if !timestamp.IsZero() && privmsgSeq != nil {
after := history.Selector{Time: timestamp}
items, complete, _ := privmsgSeq.Between(after, history.Selector{}, config.History.ZNCMax)
if len(items) != 0 {
rb := NewResponseBuffer(session)
client.replayPrivmsgHistory(rb, items, "", complete)
rb.Send(true)
}
2018-04-24 09:11:11 +02:00
}
2019-05-22 03:40:25 +02:00
session.resumeDetails = nil
}
func (client *Client) replayPrivmsgHistory(rb *ResponseBuffer, items []history.Item, target string, complete bool) {
2019-05-07 05:17:57 +02:00
var batchID string
2019-05-19 08:14:36 +02:00
details := client.Details()
nick := details.nick
if target == "" {
target = nick
2019-05-07 05:17:57 +02:00
}
batchID = rb.StartNestedHistoryBatch(target)
2019-05-07 05:17:57 +02:00
allowTags := rb.session.capabilities.Has(caps.EventPlayback)
for _, item := range items {
var command string
switch item.Type {
case history.Privmsg:
command = "PRIVMSG"
case history.Notice:
command = "NOTICE"
2019-05-07 05:17:57 +02:00
case history.Tagmsg:
if allowTags {
command = "TAGMSG"
} else {
continue
}
default:
continue
}
var tags map[string]string
2019-05-07 05:17:57 +02:00
if allowTags {
tags = item.Tags
}
2020-02-20 07:45:17 +01:00
// XXX: Params[0] is the message target. if the source of this message is an in-memory
// buffer, then it's "" for an incoming message and the recipient's nick for an outgoing
// message. if the source of the message is mysql, then mysql only sees one copy of the
// message, and it's the version with the recipient's nick filled in. so this is an
// incoming message if Params[0] (the recipient's nick) equals the client's nick:
if item.Params[0] == "" || item.Params[0] == nick {
2019-05-19 08:14:36 +02:00
rb.AddSplitMessageFromClient(item.Nick, item.AccountName, tags, command, nick, item.Message)
} else {
// this message was sent *from* the client to another nick; the target is item.Params[0]
// substitute client's current nickmask in case client changed nick
2019-05-19 08:14:36 +02:00
rb.AddSplitMessageFromClient(details.nickMask, item.AccountName, tags, command, item.Params[0], item.Message)
}
}
2019-05-07 05:17:57 +02:00
rb.EndNestedBatch(batchID)
if !complete {
rb.Add(nil, "HistServ", "NOTICE", nick, client.t("Some additional message history may have been lost"))
}
}
2016-10-23 03:48:57 +02:00
// IdleTime returns how long this client's been idle.
2014-02-18 00:25:32 +01:00
func (client *Client) IdleTime() time.Duration {
2017-12-03 02:05:06 +01:00
client.stateMutex.RLock()
defer client.stateMutex.RUnlock()
return time.Since(client.lastActive)
2014-02-18 00:25:32 +01:00
}
2016-10-23 03:48:57 +02:00
// SignonTime returns this client's signon time as a unix timestamp.
2014-02-18 04:56:06 +01:00
func (client *Client) SignonTime() int64 {
return client.ctime.Unix()
}
2016-10-23 03:48:57 +02:00
// IdleSeconds returns the number of seconds this client's been idle.
2014-02-18 04:08:57 +01:00
func (client *Client) IdleSeconds() uint64 {
return uint64(client.IdleTime().Seconds())
}
2019-02-03 09:49:42 +01:00
// SetNames sets the client's ident and realname.
2019-02-05 08:40:49 +01:00
func (client *Client) SetNames(username, realname string, fromIdent bool) error {
2020-09-07 11:59:31 +02:00
config := client.server.Config()
limit := config.Limits.IdentLen
2019-02-05 08:40:49 +01:00
if !fromIdent {
limit -= 1 // leave room for the prepended ~
}
2019-02-05 09:04:52 +01:00
if limit < len(username) {
2019-02-05 08:40:49 +01:00
username = username[:limit]
}
2019-02-03 09:49:42 +01:00
if !isIdent(username) {
return errInvalidUsername
}
2020-09-07 11:59:31 +02:00
if config.Server.SuppressIdent {
username = "~user"
} else if !fromIdent {
2019-02-05 08:40:49 +01:00
username = "~" + username
}
2019-02-03 09:49:42 +01:00
client.stateMutex.Lock()
defer client.stateMutex.Unlock()
if client.username == "" {
2019-02-05 08:40:49 +01:00
client.username = username
}
if client.realname == "" {
client.realname = realname
}
return nil
}
// HasRoleCapabs returns true if client has the given (role) capabilities.
func (client *Client) HasRoleCapabs(capabs ...string) bool {
2018-04-19 08:48:19 +02:00
oper := client.Oper()
if oper == nil {
2016-10-23 03:13:08 +02:00
return false
}
for _, capab := range capabs {
2020-03-18 10:42:52 +01:00
if !oper.Class.Capabilities.Has(capab) {
2016-10-23 03:13:08 +02:00
return false
}
}
return true
}
2017-04-16 03:31:33 +02:00
// ModeString returns the mode string for this client.
func (client *Client) ModeString() (str string) {
return "+" + client.modes.String()
2012-04-18 05:24:26 +02:00
}
2012-04-18 06:13:12 +02:00
// Friends refers to clients that share a channel with this client.
2020-07-17 10:53:30 +02:00
func (client *Client) Friends(capabs ...caps.Capability) (result map[*Session]empty) {
result = make(map[*Session]empty)
// look at the client's own sessions
2020-07-17 10:53:30 +02:00
addFriendsToSet(result, client, capabs...)
2017-10-23 01:50:16 +02:00
for _, channel := range client.Channels() {
for _, member := range channel.Members() {
2020-07-17 10:53:30 +02:00
addFriendsToSet(result, member, capabs...)
2014-02-19 00:28:20 +01:00
}
}
return
}
2020-07-17 10:53:30 +02:00
// helper for Friends
func addFriendsToSet(set map[*Session]empty, client *Client, capabs ...caps.Capability) {
client.stateMutex.RLock()
defer client.stateMutex.RUnlock()
for _, session := range client.sessions {
if session.capabilities.HasAll(capabs...) {
set[session] = empty{}
}
}
}
func (client *Client) SetOper(oper *Oper) {
client.stateMutex.Lock()
defer client.stateMutex.Unlock()
client.oper = oper
// operators typically get a vhost, update the nickmask
client.updateNickMaskNoMutex()
}
2018-04-19 08:48:19 +02:00
// XXX: CHGHOST requires prefix nickmask to have original hostname,
// this is annoying to do correctly
func (client *Client) sendChghost(oldNickMask string, vhost string) {
2020-06-03 00:57:28 +02:00
details := client.Details()
2018-04-19 08:48:19 +02:00
for fClient := range client.Friends(caps.ChgHost) {
2020-06-03 00:57:28 +02:00
fClient.sendFromClientInternal(false, time.Time{}, "", oldNickMask, details.accountName, nil, "CHGHOST", details.username, vhost)
2018-04-19 08:48:19 +02:00
}
}
// choose the correct vhost to display
func (client *Client) getVHostNoMutex() string {
// hostserv vhost OR operclass vhost OR nothing (i.e., normal rdns hostmask)
if client.vhost != "" {
return client.vhost
} else if client.oper != nil {
return client.oper.Vhost
} else {
return ""
}
}
// SetVHost updates the client's hostserv-based vhost
func (client *Client) SetVHost(vhost string) (updated bool) {
client.stateMutex.Lock()
defer client.stateMutex.Unlock()
updated = (client.vhost != vhost)
client.vhost = vhost
if updated {
client.updateNickMaskNoMutex()
}
return
}
2020-08-06 09:16:58 +02:00
// SetNick gives the client a nickname and marks it as registered, if necessary
func (client *Client) SetNick(nick, nickCasefolded, skeleton string) (success bool) {
client.stateMutex.Lock()
defer client.stateMutex.Unlock()
2020-08-06 09:16:58 +02:00
if client.destroyed {
return false
} else if !client.registered {
// XXX test this before setting it to avoid annoying the race detector
client.registered = true
2020-08-07 23:30:42 +02:00
if client.registrationTimer != nil {
client.registrationTimer.Stop()
client.registrationTimer = nil
}
2020-08-06 09:16:58 +02:00
}
client.nick = nick
client.nickCasefolded = nickCasefolded
client.skeleton = skeleton
client.updateNickMaskNoMutex()
2020-08-06 09:16:58 +02:00
return true
2016-10-16 12:35:50 +02:00
}
// updateNickMaskNoMutex updates the casefolded nickname and nickmask, not acquiring any mutexes.
func (client *Client) updateNickMaskNoMutex() {
2020-02-06 23:43:54 +01:00
if client.nick == "*" {
return // pre-registration, don't bother generating the hostname
}
2018-04-19 08:48:19 +02:00
client.hostname = client.getVHostNoMutex()
if client.hostname == "" {
2019-05-12 08:17:57 +02:00
client.hostname = client.cloakedHostname
if client.hostname == "" {
client.hostname = client.rawHostname
}
}
2019-12-18 13:01:26 +01:00
cfhostname := strings.ToLower(client.hostname)
client.nickMaskString = fmt.Sprintf("%s!%s@%s", client.nick, client.username, client.hostname)
2019-02-05 08:40:49 +01:00
client.nickMaskCasefolded = fmt.Sprintf("%s!%s@%s", client.nickCasefolded, strings.ToLower(client.username), cfhostname)
2016-06-19 07:37:29 +02:00
}
2017-01-11 13:38:16 +01:00
// AllNickmasks returns all the possible nickmasks for the client.
2019-01-29 05:03:30 +01:00
func (client *Client) AllNickmasks() (masks []string) {
2018-04-19 08:48:19 +02:00
client.stateMutex.RLock()
2019-01-29 05:03:30 +01:00
nick := client.nickCasefolded
2019-02-05 08:40:49 +01:00
username := client.username
2018-04-19 08:48:19 +02:00
rawHostname := client.rawHostname
2019-05-12 08:17:57 +02:00
cloakedHostname := client.cloakedHostname
2018-04-19 08:48:19 +02:00
vhost := client.getVHostNoMutex()
client.stateMutex.RUnlock()
2019-02-05 09:04:52 +01:00
username = strings.ToLower(username)
2018-04-19 08:48:19 +02:00
if len(vhost) > 0 {
2019-12-18 13:01:26 +01:00
cfvhost := strings.ToLower(vhost)
masks = append(masks, fmt.Sprintf("%s!%s@%s", nick, username, cfvhost))
2017-01-11 13:38:16 +01:00
}
2019-01-29 05:03:30 +01:00
var rawhostmask string
2019-12-18 13:01:26 +01:00
cfrawhost := strings.ToLower(rawHostname)
rawhostmask = fmt.Sprintf("%s!%s@%s", nick, username, cfrawhost)
masks = append(masks, rawhostmask)
2017-01-11 13:38:16 +01:00
2019-05-12 08:17:57 +02:00
if cloakedHostname != "" {
masks = append(masks, fmt.Sprintf("%s!%s@%s", nick, username, cloakedHostname))
}
2017-01-11 13:38:16 +01:00
2019-01-29 05:03:30 +01:00
ipmask := fmt.Sprintf("%s!%s@%s", nick, username, client.IPString())
if ipmask != rawhostmask {
masks = append(masks, ipmask)
2017-01-11 13:38:16 +01:00
}
2019-01-29 05:03:30 +01:00
return
2017-01-11 13:38:16 +01:00
}
// LoggedIntoAccount returns true if this client is logged into an account.
func (client *Client) LoggedIntoAccount() bool {
return client.Account() != ""
}
2019-02-10 19:57:32 +01:00
// Quit sets the given quit message for the client.
// (You must ensure separately that destroy() is called, e.g., by returning `true` from
// the command handler or calling it yourself.)
func (client *Client) Quit(message string, session *Session) {
setFinalData := func(sess *Session) {
message := sess.quitMessage
var finalData []byte
// #364: don't send QUIT lines to unregistered clients
if client.registered {
quitMsg := ircmsg.MakeMessage(nil, client.nickMaskString, "QUIT", message)
finalData, _ = quitMsg.LineBytesStrict(false, MaxLineLen)
}
2017-10-11 02:49:29 +02:00
errorMsg := ircmsg.MakeMessage(nil, "", "ERROR", message)
errorMsgBytes, _ := errorMsg.LineBytesStrict(false, MaxLineLen)
finalData = append(finalData, errorMsgBytes...)
2017-10-11 02:49:29 +02:00
sess.socket.SetFinalData(finalData)
2019-02-10 19:57:32 +01:00
}
2017-10-11 02:49:29 +02:00
client.stateMutex.Lock()
defer client.stateMutex.Unlock()
var sessions []*Session
if session != nil {
sessions = []*Session{session}
} else {
sessions = client.sessions
}
2017-10-11 02:49:29 +02:00
for _, session := range sessions {
if session.SetQuitMessage(message) {
setFinalData(session)
}
}
}
2016-10-23 03:48:57 +02:00
// destroy gets rid of a client, removes them from server lists etc.
// if `session` is nil, destroys the client unconditionally, removing all sessions;
// otherwise, destroys one specific session, only destroying the client if it
// has no more sessions.
2019-05-22 03:40:25 +02:00
func (client *Client) destroy(session *Session) {
2020-05-19 20:12:20 +02:00
config := client.server.Config()
var sessionsToDestroy []*Session
2020-06-18 09:38:00 +02:00
var saveLastSeen bool
client.stateMutex.Lock()
2020-06-18 09:38:00 +02:00
2019-05-09 00:14:49 +02:00
details := client.detailsNoMutex()
2019-05-22 03:40:25 +02:00
brbState := client.brbTimer.state
2019-05-27 10:18:07 +02:00
brbAt := client.brbTimer.brbAt
2019-05-09 00:14:49 +02:00
wasReattach := session != nil && session.client != client
sessionRemoved := false
registered := client.registered
2020-07-26 21:51:33 +02:00
// XXX a temporary (reattaching) client can be marked alwaysOn when it logs in,
// but then the session attaches to another client and we need to clean it up here
alwaysOn := registered && client.alwaysOn
2020-06-18 09:38:00 +02:00
var remainingSessions int
if session == nil {
sessionsToDestroy = client.sessions
client.sessions = nil
remainingSessions = 0
} else {
sessionRemoved, remainingSessions = client.removeSession(session)
if sessionRemoved {
sessionsToDestroy = []*Session{session}
}
}
2019-05-27 11:52:40 +02:00
2020-06-18 09:38:00 +02:00
// save last seen if applicable:
if alwaysOn {
if client.accountSettings.AutoreplayMissed {
saveLastSeen = true
} else {
for _, session := range sessionsToDestroy {
if session.deviceID != "" {
saveLastSeen = true
break
}
}
}
}
2019-05-27 11:52:40 +02:00
// should we destroy the whole client this time?
2019-05-31 00:48:12 +02:00
// BRB is not respected if this is a destroy of the whole client (i.e., session == nil)
2020-03-06 10:21:21 +01:00
brbEligible := session != nil && brbState == BrbEnabled
shouldDestroy := !client.destroyed && remainingSessions == 0 && !brbEligible && !alwaysOn
// decrement stats on a true destroy, or for the removal of the last connected session
// of an always-on client
shouldDecrement := shouldDestroy || (alwaysOn && len(sessionsToDestroy) != 0 && len(client.sessions) == 0)
2019-05-27 11:52:40 +02:00
if shouldDestroy {
// if it's our job to destroy it, don't let anyone else try
client.destroyed = true
}
if saveLastSeen {
client.dirtyBits |= IncludeLastSeen
}
2020-05-19 20:12:20 +02:00
autoAway := false
var awayMessage string
if alwaysOn && !client.away && remainingSessions == 0 &&
persistenceEnabled(config.Accounts.Multiclient.AutoAway, client.accountSettings.AutoAway) {
2020-05-19 20:12:20 +02:00
autoAway = true
client.autoAway = true
client.away = true
awayMessage = config.languageManager.Translate(client.languages, `User is currently disconnected`)
2020-05-19 20:12:20 +02:00
client.awayMessage = awayMessage
}
2020-08-07 23:30:42 +02:00
if client.registrationTimer != nil {
// unconditionally stop; if the client is still unregistered it must be destroyed
client.registrationTimer.Stop()
}
client.stateMutex.Unlock()
// XXX there is no particular reason to persist this state here rather than
// any other place: it would be correct to persist it after every `Touch`. However,
// I'm not comfortable introducing that many database writes, and I don't want to
// design a throttle.
if saveLastSeen {
2020-02-20 08:33:49 +01:00
client.wakeWriter()
}
2019-05-09 00:14:49 +02:00
// destroy all applicable sessions:
var quitMessage string
for _, session := range sessionsToDestroy {
if session.client != client {
// session has been attached to a new client; do not destroy it
continue
}
2020-08-07 23:30:42 +02:00
session.stopIdleTimer()
// send quit/error message to client if they haven't been sent already
client.Quit("", session)
2019-05-09 00:14:49 +02:00
quitMessage = session.quitMessage
2019-05-27 10:18:07 +02:00
session.SetDestroyed()
2019-05-09 00:14:49 +02:00
session.socket.Close()
2020-06-22 05:51:31 +02:00
// clean up monitor state
client.server.monitorManager.RemoveAll(session)
2019-05-09 00:14:49 +02:00
// remove from connection limits
var source string
if session.isTor {
2019-05-09 00:14:49 +02:00
client.server.torLimiter.RemoveClient()
source = "tor"
} else {
ip := session.realIP
if session.proxiedIP != nil {
ip = session.proxiedIP
}
client.server.connectionLimiter.RemoveClient(ip)
source = ip.String()
}
2020-04-12 19:58:35 +02:00
client.server.logger.Info("connect-ip", fmt.Sprintf("disconnecting session of %s from %s", details.nick, source))
}
// decrement stats if we have no more sessions, even if the client will not be destroyed
2020-03-06 10:21:21 +01:00
if shouldDecrement {
invisible := client.HasMode(modes.Invisible)
operator := client.HasMode(modes.LocalOperator) || client.HasMode(modes.Operator)
client.server.stats.Remove(registered, invisible, operator)
}
2020-05-19 20:12:20 +02:00
if autoAway {
dispatchAwayNotify(client, true, awayMessage)
}
2019-05-27 11:52:40 +02:00
if !shouldDestroy {
return
2014-02-18 22:25:21 +01:00
}
splitQuitMessage := utils.MakeMessage(quitMessage)
quitItem := history.Item{
Type: history.Quit,
Nick: details.nickMask,
AccountName: details.accountName,
Message: splitQuitMessage,
}
var channels []*Channel
2020-02-20 07:45:17 +01:00
// use a defer here to avoid writing to mysql while holding the destroy semaphore:
defer func() {
for _, channel := range channels {
2020-05-12 18:05:40 +02:00
channel.AddHistoryItem(quitItem, details.account)
}
}()
2018-04-25 02:34:28 +02:00
// see #235: deduplicating the list of PART recipients uses (comparatively speaking)
// a lot of RAM, so limit concurrency to avoid thrashing
client.server.semaphores.ClientDestroy.Acquire()
defer client.server.semaphores.ClientDestroy.Release()
2019-05-22 03:40:25 +02:00
if !wasReattach {
2019-05-07 05:17:57 +02:00
client.server.logger.Debug("quit", fmt.Sprintf("%s is no longer on the server", details.nick))
}
2019-05-22 03:40:25 +02:00
if registered {
2018-05-04 06:24:54 +02:00
client.server.whoWas.Append(client.WhoWas())
}
client.server.resumeManager.Delete(client)
2016-10-16 12:14:56 +02:00
// alert monitors
2019-05-09 00:14:49 +02:00
if registered {
2020-05-28 23:55:53 +02:00
client.server.monitorManager.AlertAbout(details.nick, details.nickCasefolded, false)
2019-05-09 00:14:49 +02:00
}
2016-10-16 12:14:56 +02:00
// clean up channels
2019-05-09 00:14:49 +02:00
// (note that if this is a reattach, client has no channels and therefore no friends)
2018-04-25 02:23:01 +02:00
friends := make(ClientSet)
channels = client.Channels()
for _, channel := range channels {
2019-05-22 03:40:25 +02:00
channel.Quit(client)
2017-10-23 01:50:16 +02:00
for _, member := range channel.Members() {
friends.Add(member)
}
}
2018-04-25 02:23:01 +02:00
friends.Remove(client)
// clean up server
2019-05-22 03:40:25 +02:00
client.server.clients.Remove(client)
// clean up self
2019-05-22 03:40:25 +02:00
client.brbTimer.Disable()
client.server.accounts.Logout(client)
2019-05-27 10:18:07 +02:00
// this happens under failure to return from BRB
if quitMessage == "" {
2019-10-06 05:50:11 +02:00
if brbState == BrbDead && !brbAt.IsZero() {
2019-05-27 10:18:07 +02:00
awayMessage := client.AwayMessage()
2019-07-04 12:59:08 +02:00
if awayMessage == "" {
awayMessage = "Disconnected" // auto-BRB
2019-05-27 10:18:07 +02:00
}
2019-07-04 12:59:08 +02:00
quitMessage = fmt.Sprintf("%s [%s ago]", awayMessage, time.Since(brbAt).Truncate(time.Second).String())
}
2019-05-27 10:18:07 +02:00
}
if quitMessage == "" {
quitMessage = "Exited"
}
for friend := range friends {
2019-05-22 03:40:25 +02:00
friend.sendFromClientInternal(false, splitQuitMessage.Time, splitQuitMessage.Msgid, details.nickMask, details.accountName, nil, "QUIT", quitMessage)
}
2019-05-22 03:40:25 +02:00
if registered {
2019-05-22 03:40:25 +02:00
client.server.snomasks.Send(sno.LocalQuits, fmt.Sprintf(ircfmt.Unescape("%s$r exited the network"), details.nick))
}
}
2014-02-18 22:25:21 +01:00
// SendSplitMsgFromClient sends an IRC PRIVMSG/NOTICE coming from a specific client.
// Adds account-tag to the line as well.
2019-05-13 06:39:59 +02:00
func (session *Session) sendSplitMsgFromClientInternal(blocking bool, nickmask, accountName string, tags map[string]string, command, target string, message utils.SplitMessage) {
2020-01-19 05:47:05 +01:00
if message.Is512() {
2019-05-13 06:39:59 +02:00
session.sendFromClientInternal(blocking, message.Time, message.Msgid, nickmask, accountName, tags, command, target, message.Message)
} else {
if session.capabilities.Has(caps.Multiline) {
2019-12-23 21:26:37 +01:00
for _, msg := range session.composeMultilineBatch(nickmask, accountName, tags, command, target, message) {
session.SendRawMessage(msg, blocking)
}
} else {
2020-05-14 18:58:49 +02:00
msgidSent := false // send msgid on the first nonblank line
for _, messagePair := range message.Split {
if len(messagePair.Message) == 0 {
continue
}
2020-01-19 05:47:05 +01:00
var msgid string
2020-05-14 18:58:49 +02:00
if !msgidSent {
msgidSent = true
2020-01-19 05:47:05 +01:00
msgid = message.Msgid
}
session.sendFromClientInternal(blocking, message.Time, msgid, nickmask, accountName, tags, command, target, messagePair.Message)
2019-12-23 21:26:37 +01:00
}
}
}
}
2019-05-07 05:17:57 +02:00
// Sends a line with `nickmask` as the prefix, adding `time` and `account` tags if supported
func (client *Client) sendFromClientInternal(blocking bool, serverTime time.Time, msgid string, nickmask, accountName string, tags map[string]string, command string, params ...string) (err error) {
for _, session := range client.Sessions() {
err_ := session.sendFromClientInternal(blocking, serverTime, msgid, nickmask, accountName, tags, command, params...)
if err_ != nil {
err = err_
}
}
return
}
func (session *Session) sendFromClientInternal(blocking bool, serverTime time.Time, msgid string, nickmask, accountName string, tags map[string]string, command string, params ...string) (err error) {
msg := ircmsg.MakeMessage(tags, nickmask, command, params...)
2016-09-12 03:25:31 +02:00
// attach account-tag
if session.capabilities.Has(caps.AccountTag) && accountName != "*" {
msg.SetTag("account", accountName)
2016-09-12 03:25:31 +02:00
}
2017-01-14 10:52:47 +01:00
// attach message-id
if msgid != "" && session.capabilities.Has(caps.MessageTags) {
2019-05-15 07:30:21 +02:00
msg.SetTag("msgid", msgid)
}
// attach server-time
2019-06-13 08:24:14 +02:00
session.setTimeTag(&msg, serverTime)
2016-09-12 03:25:31 +02:00
return session.SendRawMessage(msg, blocking)
2016-09-12 03:25:31 +02:00
}
2019-12-23 21:26:37 +01:00
func (session *Session) composeMultilineBatch(fromNickMask, fromAccount string, tags map[string]string, command, target string, message utils.SplitMessage) (result []ircmsg.IrcMessage) {
batchID := session.generateBatchID()
2020-01-03 15:46:55 +01:00
batchStart := ircmsg.MakeMessage(tags, fromNickMask, "BATCH", "+"+batchID, caps.MultilineBatchType, target)
2019-12-23 21:26:37 +01:00
batchStart.SetTag("time", message.Time.Format(IRCv3TimestampFormat))
batchStart.SetTag("msgid", message.Msgid)
if session.capabilities.Has(caps.AccountTag) && fromAccount != "*" {
batchStart.SetTag("account", fromAccount)
}
result = append(result, batchStart)
2020-01-19 05:47:05 +01:00
for _, msg := range message.Split {
2019-12-23 21:26:37 +01:00
message := ircmsg.MakeMessage(nil, fromNickMask, command, target, msg.Message)
message.SetTag("batch", batchID)
if msg.Concat {
message.SetTag(caps.MultilineConcatTag, "")
}
result = append(result, message)
}
result = append(result, ircmsg.MakeMessage(nil, fromNickMask, "BATCH", "-"+batchID))
return
}
var (
// these are all the output commands that MUST have their last param be a trailing.
// this is needed because dumb clients like to treat trailing params separately from the
// other params in messages.
commandsThatMustUseTrailing = map[string]bool{
"PRIVMSG": true,
"NOTICE": true,
RPL_WHOISCHANNELS: true,
2017-03-06 06:50:23 +01:00
RPL_USERHOST: true,
2020-03-11 23:57:42 +01:00
// mirc's handling of RPL_NAMREPLY is broken:
// https://forums.mirc.com/ubbthreads.php/topics/266939/re-nick-list
RPL_NAMREPLY: true,
}
)
// SendRawMessage sends a raw message to the client.
func (session *Session) SendRawMessage(message ircmsg.IrcMessage, blocking bool) error {
// use dumb hack to force the last param to be a trailing param if required
2019-05-09 20:18:30 +02:00
config := session.client.server.Config()
2020-03-11 23:57:25 +01:00
if config.Server.Compatibility.forceTrailing && commandsThatMustUseTrailing[message.Command] {
message.ForceTrailing()
}
// assemble message
line, err := message.LineBytesStrict(false, MaxLineLen)
if err != nil {
errorParams := []string{"Error assembling message for sending", err.Error(), message.Command}
errorParams = append(errorParams, message.Params...)
session.client.server.logger.Error("internal", errorParams...)
message = ircmsg.MakeMessage(nil, session.client.server.name, ERR_UNKNOWNERROR, "*", "Error assembling message for sending")
line, _ := message.LineBytesStrict(false, 0)
if blocking {
session.socket.BlockingWrite(line)
} else {
session.socket.Write(line)
}
return err
}
if session.client.server.logger.IsLoggingRawIO() {
2018-04-26 21:32:32 +02:00
logline := string(line[:len(line)-2]) // strip "\r\n"
session.client.server.logger.Debug("useroutput", session.client.Nick(), " ->", logline)
2018-04-26 21:32:32 +02:00
}
if blocking {
return session.socket.BlockingWrite(line)
} else {
return session.socket.Write(line)
}
}
// Send sends an IRC line to the client.
func (client *Client) Send(tags map[string]string, prefix string, command string, params ...string) (err error) {
for _, session := range client.Sessions() {
err_ := session.Send(tags, prefix, command, params...)
if err_ != nil {
err = err_
}
}
return
}
func (session *Session) Send(tags map[string]string, prefix string, command string, params ...string) (err error) {
msg := ircmsg.MakeMessage(tags, prefix, command, params...)
2019-06-13 08:24:14 +02:00
session.setTimeTag(&msg, time.Time{})
return session.SendRawMessage(msg, false)
}
func (session *Session) setTimeTag(msg *ircmsg.IrcMessage, serverTime time.Time) {
if session.capabilities.Has(caps.ServerTime) && !msg.HasTag("time") {
2019-06-13 08:24:14 +02:00
if serverTime.IsZero() {
serverTime = time.Now()
}
msg.SetTag("time", serverTime.UTC().Format(IRCv3TimestampFormat))
}
}
// Notice sends the client a notice from the server.
func (client *Client) Notice(text string) {
client.Send(nil, client.server.name, "NOTICE", client.Nick(), text)
}
2017-10-23 01:50:16 +02:00
2019-12-17 21:10:23 +01:00
func (session *Session) Notice(text string) {
session.Send(nil, session.client.server.name, "NOTICE", session.client.Nick(), text)
}
// `simulated` is for the fake join of an always-on client
// (we just read the channel name from the database, there's no need to write it back)
2020-07-01 01:24:56 +02:00
func (client *Client) addChannel(channel *Channel, simulated bool) (err error) {
config := client.server.Config()
2017-10-23 01:50:16 +02:00
client.stateMutex.Lock()
alwaysOn := client.alwaysOn
2020-07-01 01:24:56 +02:00
if client.destroyed {
err = errClientDestroyed
} else if client.oper == nil && len(client.channels) >= config.Channels.MaxChannelsPerClient {
err = errTooManyChannels
} else {
client.channels[channel] = empty{} // success
}
2017-10-23 01:50:16 +02:00
client.stateMutex.Unlock()
2020-07-01 01:24:56 +02:00
if err == nil && alwaysOn && !simulated {
client.markDirty(IncludeChannels)
}
2020-07-01 01:24:56 +02:00
return
2017-10-23 01:50:16 +02:00
}
func (client *Client) removeChannel(channel *Channel) {
client.stateMutex.Lock()
delete(client.channels, channel)
alwaysOn := client.alwaysOn
2017-10-23 01:50:16 +02:00
client.stateMutex.Unlock()
if alwaysOn {
client.markDirty(IncludeChannels)
}
2017-10-23 01:50:16 +02:00
}
2018-12-23 19:25:02 +01:00
// Records that the client has been invited to join an invite-only channel
func (client *Client) Invite(casefoldedChannel string) {
client.stateMutex.Lock()
defer client.stateMutex.Unlock()
if client.invitedTo == nil {
2020-08-05 03:46:16 +02:00
client.invitedTo = make(utils.StringSet)
2018-12-23 19:25:02 +01:00
}
2020-07-01 01:24:56 +02:00
client.invitedTo.Add(casefoldedChannel)
2018-12-23 19:25:02 +01:00
}
// Checks that the client was invited to join a given channel
func (client *Client) CheckInvited(casefoldedChannel string) (invited bool) {
client.stateMutex.Lock()
defer client.stateMutex.Unlock()
2020-07-01 01:24:56 +02:00
invited = client.invitedTo.Has(casefoldedChannel)
2018-12-23 19:25:02 +01:00
// joining an invited channel "uses up" your invite, so you can't rejoin on kick
delete(client.invitedTo, casefoldedChannel)
return
}
// Implements auto-oper by certfp (scans for an auto-eligible operator block that matches
// the client's cert, then applies it).
func (client *Client) attemptAutoOper(session *Session) {
if session.certfp == "" || client.HasMode(modes.Operator) {
return
}
for _, oper := range client.server.Config().operators {
2020-06-21 21:46:08 +02:00
if oper.Auto && oper.Pass == nil && oper.Certfp != "" && oper.Certfp == session.certfp {
rb := NewResponseBuffer(session)
applyOper(client, oper, rb)
rb.Send(true)
2019-12-29 17:59:49 +01:00
return
}
}
}
2020-06-12 21:51:48 +02:00
func (client *Client) checkLoginThrottle() (throttled bool, remainingTime time.Duration) {
client.stateMutex.Lock()
defer client.stateMutex.Unlock()
return client.loginThrottle.Touch()
}
func (client *Client) historyStatus(config *Config) (status HistoryStatus, target string) {
if !config.History.Enabled {
return HistoryDisabled, ""
}
client.stateMutex.RLock()
2020-02-28 11:41:08 +01:00
target = client.account
historyStatus := client.accountSettings.DMHistory
client.stateMutex.RUnlock()
2020-02-28 11:41:08 +01:00
if target == "" {
return HistoryEphemeral, ""
}
2020-02-28 11:41:08 +01:00
status = historyEnabled(config.History.Persistent.DirectMessages, historyStatus)
if status != HistoryPersistent {
target = ""
}
return
}
2020-08-07 23:30:42 +02:00
func (client *Client) handleRegisterTimeout() {
client.Quit(fmt.Sprintf("Registration timeout: %v", RegisterTimeout), nil)
client.destroy(nil)
}
2020-06-12 21:51:48 +02:00
func (client *Client) copyLastSeen() (result map[string]time.Time) {
client.stateMutex.RLock()
defer client.stateMutex.RUnlock()
result = make(map[string]time.Time, len(client.lastSeen))
for id, lastSeen := range client.lastSeen {
result[id] = lastSeen
}
return
}
// these are bit flags indicating what part of the client status is "dirty"
// and needs to be read from memory and written to the db
const (
IncludeChannels uint = 1 << iota
IncludeLastSeen
2020-05-19 20:38:56 +02:00
IncludeUserModes
2020-07-06 10:08:04 +02:00
IncludeRealname
)
func (client *Client) markDirty(dirtyBits uint) {
client.stateMutex.Lock()
alwaysOn := client.alwaysOn
client.dirtyBits = client.dirtyBits | dirtyBits
client.stateMutex.Unlock()
if alwaysOn {
client.wakeWriter()
}
}
func (client *Client) wakeWriter() {
if client.writerSemaphore.TryAcquire() {
go client.writeLoop()
}
}
func (client *Client) writeLoop() {
for {
2020-06-29 06:30:27 +02:00
client.performWrite(0)
client.writerSemaphore.Release()
client.stateMutex.RLock()
isDirty := client.dirtyBits != 0
client.stateMutex.RUnlock()
if !isDirty || !client.writerSemaphore.TryAcquire() {
return
}
}
}
2020-06-29 06:30:27 +02:00
func (client *Client) performWrite(additionalDirtyBits uint) {
client.stateMutex.Lock()
2020-06-29 06:30:27 +02:00
dirtyBits := client.dirtyBits | additionalDirtyBits
client.dirtyBits = 0
account := client.account
client.stateMutex.Unlock()
if account == "" {
client.server.logger.Error("internal", "attempting to persist logged-out client", client.Nick())
return
}
2020-02-20 08:33:49 +01:00
if (dirtyBits & IncludeChannels) != 0 {
channels := client.Channels()
channelNames := make([]string, len(channels))
for i, channel := range channels {
channelNames[i] = channel.Name()
}
client.server.accounts.saveChannels(account, channelNames)
}
if (dirtyBits & IncludeLastSeen) != 0 {
2020-06-12 21:51:48 +02:00
client.server.accounts.saveLastSeen(account, client.copyLastSeen())
}
2020-05-19 20:38:56 +02:00
if (dirtyBits & IncludeUserModes) != 0 {
uModes := make(modes.Modes, 0, len(modes.SupportedUserModes))
for _, m := range modes.SupportedUserModes {
switch m {
case modes.Operator, modes.ServerNotice:
// these can't be persisted because they depend on the operator block
default:
if client.HasMode(m) {
uModes = append(uModes, m)
}
}
}
client.server.accounts.saveModes(account, uModes)
}
2020-07-06 10:08:04 +02:00
if (dirtyBits & IncludeRealname) != 0 {
client.server.accounts.saveRealname(account, client.realname)
}
}
2020-06-29 06:30:27 +02:00
// Blocking store; see Channel.Store and Socket.BlockingWrite
func (client *Client) Store(dirtyBits uint) (err error) {
defer func() {
client.stateMutex.Lock()
isDirty := client.dirtyBits != 0
client.stateMutex.Unlock()
if isDirty {
client.wakeWriter()
}
}()
client.writerSemaphore.Acquire()
defer client.writerSemaphore.Release()
client.performWrite(dirtyBits)
return nil
}