mirror of
https://github.com/ergochat/ergo.git
synced 2024-11-29 07:29:31 +01:00
2292 lines
70 KiB
Go
2292 lines
70 KiB
Go
// Copyright (c) 2012-2014 Jeremy Latt
|
|
// Copyright (c) 2014-2015 Edmund Huber
|
|
// Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
|
|
// released under the MIT license
|
|
|
|
package irc
|
|
|
|
import (
|
|
"bufio"
|
|
"crypto/tls"
|
|
"encoding/base64"
|
|
"errors"
|
|
"fmt"
|
|
"log"
|
|
"math/rand"
|
|
"net"
|
|
"os"
|
|
"os/signal"
|
|
"strconv"
|
|
"strings"
|
|
"sync"
|
|
"syscall"
|
|
"time"
|
|
|
|
"github.com/goshuirc/irc-go/ircfmt"
|
|
"github.com/goshuirc/irc-go/ircmsg"
|
|
"github.com/oragono/oragono/irc/caps"
|
|
"github.com/oragono/oragono/irc/connection_limits"
|
|
"github.com/oragono/oragono/irc/isupport"
|
|
"github.com/oragono/oragono/irc/logger"
|
|
"github.com/oragono/oragono/irc/passwd"
|
|
"github.com/oragono/oragono/irc/sno"
|
|
"github.com/oragono/oragono/irc/utils"
|
|
"github.com/tidwall/buntdb"
|
|
)
|
|
|
|
var (
|
|
// common error line to sub values into
|
|
errorMsg, _ = (&[]ircmsg.IrcMessage{ircmsg.MakeMessage(nil, "", "ERROR", "%s ")}[0]).Line()
|
|
|
|
// common error responses
|
|
couldNotParseIPMsg, _ = (&[]ircmsg.IrcMessage{ircmsg.MakeMessage(nil, "", "ERROR", "Unable to parse your IP address")}[0]).Line()
|
|
|
|
RenamePrivsNeeded = errors.New("Only chanops can rename channels")
|
|
)
|
|
|
|
// Limits holds the maximum limits for various things such as topic lengths.
|
|
type Limits struct {
|
|
AwayLen int
|
|
ChannelLen int
|
|
KickLen int
|
|
MonitorEntries int
|
|
NickLen int
|
|
TopicLen int
|
|
ChanListModes int
|
|
LineLen LineLenLimits
|
|
}
|
|
|
|
// LineLenLimits holds the maximum limits for IRC lines.
|
|
type LineLenLimits struct {
|
|
Tags int
|
|
Rest int
|
|
}
|
|
|
|
// ListenerWrapper wraps a listener so it can be safely reconfigured or stopped
|
|
type ListenerWrapper struct {
|
|
listener net.Listener
|
|
tlsConfig *tls.Config
|
|
shouldStop bool
|
|
// lets the ListenerWrapper inform the server that it has stopped:
|
|
stopEvent chan bool
|
|
// protects atomic update of tlsConfig and shouldStop:
|
|
configMutex sync.Mutex // tier 1
|
|
}
|
|
|
|
// Server is the main Oragono server.
|
|
type Server struct {
|
|
accountAuthenticationEnabled bool
|
|
accountRegistration *AccountRegistration
|
|
accounts map[string]*ClientAccount
|
|
channelRegistrationEnabled bool
|
|
channels *ChannelManager
|
|
channelRegistry *ChannelRegistry
|
|
checkIdent bool
|
|
clients *ClientManager
|
|
configFilename string
|
|
configurableStateMutex sync.RWMutex // tier 1; generic protection for server state modified by rehash()
|
|
connectionLimiter *connection_limits.Limiter
|
|
connectionThrottler *connection_limits.Throttler
|
|
ctime time.Time
|
|
defaultChannelModes Modes
|
|
dlines *DLineManager
|
|
loggingRawIO bool
|
|
isupport *isupport.List
|
|
klines *KLineManager
|
|
languages *LanguageManager
|
|
limits Limits
|
|
listeners map[string]*ListenerWrapper
|
|
logger *logger.Manager
|
|
MaxSendQBytes uint64
|
|
monitorManager *MonitorManager
|
|
motdLines []string
|
|
name string
|
|
nameCasefolded string
|
|
networkName string
|
|
operators map[string]Oper
|
|
operclasses map[string]OperClass
|
|
password []byte
|
|
passwords *passwd.SaltedManager
|
|
recoverFromErrors bool
|
|
rehashMutex sync.Mutex // tier 3
|
|
rehashSignal chan os.Signal
|
|
proxyAllowedFrom []string
|
|
signals chan os.Signal
|
|
snomasks *SnoManager
|
|
store *buntdb.DB
|
|
stsEnabled bool
|
|
webirc []webircConfig
|
|
whoWas *WhoWasList
|
|
}
|
|
|
|
var (
|
|
// ServerExitSignals are the signals the server will exit on.
|
|
ServerExitSignals = []os.Signal{
|
|
syscall.SIGINT,
|
|
syscall.SIGTERM,
|
|
syscall.SIGQUIT,
|
|
}
|
|
)
|
|
|
|
type clientConn struct {
|
|
Conn net.Conn
|
|
IsTLS bool
|
|
}
|
|
|
|
// NewServer returns a new Oragono server.
|
|
func NewServer(config *Config, logger *logger.Manager) (*Server, error) {
|
|
// initialize data structures
|
|
server := &Server{
|
|
accounts: make(map[string]*ClientAccount),
|
|
channels: NewChannelManager(),
|
|
clients: NewClientManager(),
|
|
connectionLimiter: connection_limits.NewLimiter(),
|
|
connectionThrottler: connection_limits.NewThrottler(),
|
|
languages: NewLanguageManager(config.Languages.Default, config.Languages.Data),
|
|
listeners: make(map[string]*ListenerWrapper),
|
|
logger: logger,
|
|
monitorManager: NewMonitorManager(),
|
|
rehashSignal: make(chan os.Signal, 1),
|
|
signals: make(chan os.Signal, len(ServerExitSignals)),
|
|
snomasks: NewSnoManager(),
|
|
whoWas: NewWhoWasList(config.Limits.WhowasEntries),
|
|
}
|
|
|
|
if err := server.applyConfig(config, true); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// generate help info
|
|
if err := GenerateHelpIndices(server.languages); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Attempt to clean up when receiving these signals.
|
|
signal.Notify(server.signals, ServerExitSignals...)
|
|
signal.Notify(server.rehashSignal, syscall.SIGHUP)
|
|
|
|
return server, nil
|
|
}
|
|
|
|
// setISupport sets up our RPL_ISUPPORT reply.
|
|
func (server *Server) setISupport() {
|
|
maxTargetsString := strconv.Itoa(maxTargets)
|
|
|
|
server.configurableStateMutex.RLock()
|
|
|
|
// add RPL_ISUPPORT tokens
|
|
isupport := isupport.NewList()
|
|
isupport.Add("AWAYLEN", strconv.Itoa(server.limits.AwayLen))
|
|
isupport.Add("CASEMAPPING", "ascii")
|
|
isupport.Add("CHANMODES", strings.Join([]string{Modes{BanMask, ExceptMask, InviteMask}.String(), "", Modes{UserLimit, Key}.String(), Modes{InviteOnly, Moderated, NoOutside, OpOnlyTopic, ChanRoleplaying, Secret}.String()}, ","))
|
|
isupport.Add("CHANNELLEN", strconv.Itoa(server.limits.ChannelLen))
|
|
isupport.Add("CHANTYPES", "#")
|
|
isupport.Add("ELIST", "U")
|
|
isupport.Add("EXCEPTS", "")
|
|
isupport.Add("INVEX", "")
|
|
isupport.Add("KICKLEN", strconv.Itoa(server.limits.KickLen))
|
|
isupport.Add("MAXLIST", fmt.Sprintf("beI:%s", strconv.Itoa(server.limits.ChanListModes)))
|
|
isupport.Add("MAXTARGETS", maxTargetsString)
|
|
isupport.Add("MODES", "")
|
|
isupport.Add("MONITOR", strconv.Itoa(server.limits.MonitorEntries))
|
|
isupport.Add("NETWORK", server.networkName)
|
|
isupport.Add("NICKLEN", strconv.Itoa(server.limits.NickLen))
|
|
isupport.Add("PREFIX", "(qaohv)~&@%+")
|
|
isupport.Add("RPCHAN", "E")
|
|
isupport.Add("RPUSER", "E")
|
|
isupport.Add("STATUSMSG", "~&@%+")
|
|
isupport.Add("TARGMAX", fmt.Sprintf("NAMES:1,LIST:1,KICK:1,WHOIS:1,USERHOST:10,PRIVMSG:%s,TAGMSG:%s,NOTICE:%s,MONITOR:", maxTargetsString, maxTargetsString, maxTargetsString))
|
|
isupport.Add("TOPICLEN", strconv.Itoa(server.limits.TopicLen))
|
|
isupport.Add("UTF8MAPPING", casemappingName)
|
|
|
|
// account registration
|
|
if server.accountRegistration.Enabled {
|
|
// 'none' isn't shown in the REGCALLBACKS vars
|
|
var enabledCallbacks []string
|
|
for _, name := range server.accountRegistration.EnabledCallbacks {
|
|
if name != "*" {
|
|
enabledCallbacks = append(enabledCallbacks, name)
|
|
}
|
|
}
|
|
|
|
isupport.Add("REGCOMMANDS", "CREATE,VERIFY")
|
|
isupport.Add("REGCALLBACKS", strings.Join(enabledCallbacks, ","))
|
|
isupport.Add("REGCREDTYPES", "passphrase,certfp")
|
|
}
|
|
|
|
server.configurableStateMutex.RUnlock()
|
|
|
|
isupport.RegenerateCachedReply()
|
|
|
|
server.configurableStateMutex.Lock()
|
|
server.isupport = isupport
|
|
server.configurableStateMutex.Unlock()
|
|
}
|
|
|
|
func loadChannelList(channel *Channel, list string, maskMode Mode) {
|
|
if list == "" {
|
|
return
|
|
}
|
|
channel.lists[maskMode].AddAll(strings.Split(list, " "))
|
|
}
|
|
|
|
// Shutdown shuts down the server.
|
|
func (server *Server) Shutdown() {
|
|
//TODO(dan): Make sure we disallow new nicks
|
|
for _, client := range server.clients.AllClients() {
|
|
client.Notice("Server is shutting down")
|
|
}
|
|
|
|
if err := server.store.Close(); err != nil {
|
|
server.logger.Error("shutdown", fmt.Sprintln("Could not close datastore:", err))
|
|
}
|
|
}
|
|
|
|
// Run starts the server.
|
|
func (server *Server) Run() {
|
|
// defer closing db/store
|
|
defer server.store.Close()
|
|
|
|
for {
|
|
select {
|
|
case <-server.signals:
|
|
server.Shutdown()
|
|
return
|
|
|
|
case <-server.rehashSignal:
|
|
go func() {
|
|
server.logger.Info("rehash", "Rehashing due to SIGHUP")
|
|
err := server.rehash()
|
|
if err != nil {
|
|
server.logger.Error("rehash", fmt.Sprintln("Failed to rehash:", err.Error()))
|
|
}
|
|
}()
|
|
}
|
|
}
|
|
}
|
|
|
|
func (server *Server) acceptClient(conn clientConn) {
|
|
// check IP address
|
|
ipaddr := net.ParseIP(utils.IPString(conn.Conn.RemoteAddr()))
|
|
if ipaddr == nil {
|
|
conn.Conn.Write([]byte(couldNotParseIPMsg))
|
|
conn.Conn.Close()
|
|
return
|
|
}
|
|
|
|
isBanned, banMsg := server.checkBans(ipaddr)
|
|
if isBanned {
|
|
// this might not show up properly on some clients, but our objective here is just to close the connection out before it has a load impact on us
|
|
conn.Conn.Write([]byte(fmt.Sprintf(errorMsg, banMsg)))
|
|
conn.Conn.Close()
|
|
return
|
|
}
|
|
|
|
server.logger.Debug("localconnect-ip", fmt.Sprintf("Client connecting from %v", ipaddr))
|
|
// prolly don't need to alert snomasks on this, only on connection reg
|
|
|
|
NewClient(server, conn.Conn, conn.IsTLS)
|
|
}
|
|
|
|
func (server *Server) checkBans(ipaddr net.IP) (banned bool, message string) {
|
|
// check DLINEs
|
|
isBanned, info := server.dlines.CheckIP(ipaddr)
|
|
if isBanned {
|
|
server.logger.Info("localconnect-ip", fmt.Sprintf("Client from %v rejected by d-line", ipaddr))
|
|
return true, info.BanMessage("You are banned from this server (%s)")
|
|
}
|
|
|
|
// check connection limits
|
|
err := server.connectionLimiter.AddClient(ipaddr, false)
|
|
if err != nil {
|
|
// too many connections from one client, tell the client and close the connection
|
|
server.logger.Info("localconnect-ip", fmt.Sprintf("Client from %v rejected for connection limit", ipaddr))
|
|
return true, "Too many clients from your network"
|
|
}
|
|
|
|
// check connection throttle
|
|
err = server.connectionThrottler.AddClient(ipaddr)
|
|
if err != nil {
|
|
// too many connections too quickly from client, tell them and close the connection
|
|
duration := server.connectionThrottler.BanDuration()
|
|
length := &IPRestrictTime{
|
|
Duration: duration,
|
|
Expires: time.Now().Add(duration),
|
|
}
|
|
server.dlines.AddIP(ipaddr, length, server.connectionThrottler.BanMessage(), "Exceeded automated connection throttle", "auto.connection.throttler")
|
|
|
|
// they're DLINE'd for 15 minutes or whatever, so we can reset the connection throttle now,
|
|
// and once their temporary DLINE is finished they can fill up the throttler again
|
|
server.connectionThrottler.ResetFor(ipaddr)
|
|
|
|
// this might not show up properly on some clients, but our objective here is just to close it out before it has a load impact on us
|
|
server.logger.Info(
|
|
"localconnect-ip",
|
|
fmt.Sprintf("Client from %v exceeded connection throttle, d-lining for %v", ipaddr, duration))
|
|
return true, server.connectionThrottler.BanMessage()
|
|
}
|
|
|
|
return false, ""
|
|
}
|
|
|
|
//
|
|
// IRC protocol listeners
|
|
//
|
|
|
|
// createListener starts the given listeners.
|
|
func (server *Server) createListener(addr string, tlsConfig *tls.Config) *ListenerWrapper {
|
|
// make listener
|
|
listener, err := net.Listen("tcp", addr)
|
|
if err != nil {
|
|
log.Fatal(server, "listen error: ", err)
|
|
}
|
|
|
|
// throw our details to the server so we can be modified/killed later
|
|
wrapper := ListenerWrapper{
|
|
listener: listener,
|
|
tlsConfig: tlsConfig,
|
|
shouldStop: false,
|
|
stopEvent: make(chan bool, 1),
|
|
}
|
|
|
|
var shouldStop bool
|
|
|
|
// setup accept goroutine
|
|
go func() {
|
|
for {
|
|
conn, err := listener.Accept()
|
|
|
|
// synchronously access config data:
|
|
// whether TLS is enabled and whether we should stop listening
|
|
wrapper.configMutex.Lock()
|
|
shouldStop = wrapper.shouldStop
|
|
tlsConfig = wrapper.tlsConfig
|
|
wrapper.configMutex.Unlock()
|
|
|
|
if err == nil {
|
|
if tlsConfig != nil {
|
|
conn = tls.Server(conn, tlsConfig)
|
|
}
|
|
newConn := clientConn{
|
|
Conn: conn,
|
|
IsTLS: tlsConfig != nil,
|
|
}
|
|
// hand off the connection
|
|
go server.acceptClient(newConn)
|
|
}
|
|
|
|
if shouldStop {
|
|
listener.Close()
|
|
wrapper.stopEvent <- true
|
|
return
|
|
}
|
|
}
|
|
}()
|
|
|
|
return &wrapper
|
|
}
|
|
|
|
// generateMessageID returns a network-unique message ID.
|
|
func (server *Server) generateMessageID() string {
|
|
// we don't need the full like 30 chars since the unixnano below handles
|
|
// most of our uniqueness requirements, so just truncate at 5
|
|
lastbit := strconv.FormatInt(rand.Int63(), 36)
|
|
if 5 < len(lastbit) {
|
|
lastbit = lastbit[:4]
|
|
}
|
|
return fmt.Sprintf("%s%s", strconv.FormatInt(time.Now().UTC().UnixNano(), 36), lastbit)
|
|
}
|
|
|
|
//
|
|
// server functionality
|
|
//
|
|
|
|
func (server *Server) tryRegister(c *Client) {
|
|
if c.registered || !c.HasNick() || !c.HasUsername() ||
|
|
(c.capState == CapNegotiating) {
|
|
return
|
|
}
|
|
|
|
// check KLINEs
|
|
isBanned, info := server.klines.CheckMasks(c.AllNickmasks()...)
|
|
if isBanned {
|
|
reason := info.Reason
|
|
if info.Time != nil {
|
|
reason += fmt.Sprintf(" [%s]", info.Time.Duration.String())
|
|
}
|
|
c.Quit(fmt.Sprintf(c.t("You are banned from this server (%s)"), reason))
|
|
c.destroy(false)
|
|
return
|
|
}
|
|
|
|
// continue registration
|
|
server.logger.Debug("localconnect", fmt.Sprintf("Client registered [%s] [u:%s] [r:%s]", c.nick, c.username, c.realname))
|
|
server.snomasks.Send(sno.LocalConnects, fmt.Sprintf(ircfmt.Unescape("Client registered $c[grey][$r%s$c[grey]] [u:$r%s$c[grey]] [h:$r%s$c[grey]] [r:$r%s$c[grey]]"), c.nick, c.username, c.rawHostname, c.realname))
|
|
c.Register()
|
|
|
|
// send welcome text
|
|
//NOTE(dan): we specifically use the NICK here instead of the nickmask
|
|
// see http://modern.ircdocs.horse/#rplwelcome-001 for details on why we avoid using the nickmask
|
|
c.Send(nil, server.name, RPL_WELCOME, c.nick, fmt.Sprintf(c.t("Welcome to the Internet Relay Network %s"), c.nick))
|
|
c.Send(nil, server.name, RPL_YOURHOST, c.nick, fmt.Sprintf(c.t("Your host is %[1]s, running version %[2]s"), server.name, Ver))
|
|
c.Send(nil, server.name, RPL_CREATED, c.nick, fmt.Sprintf(c.t("This server was created %s"), server.ctime.Format(time.RFC1123)))
|
|
//TODO(dan): Look at adding last optional [<channel modes with a parameter>] parameter
|
|
c.Send(nil, server.name, RPL_MYINFO, c.nick, server.name, Ver, supportedUserModesString, supportedChannelModesString)
|
|
c.RplISupport()
|
|
server.MOTD(c)
|
|
c.Send(nil, c.nickMaskString, RPL_UMODEIS, c.nick, c.ModeString())
|
|
if server.logger.IsLoggingRawIO() {
|
|
c.Notice(c.t("This server is in debug mode and is logging all user I/O. If you do not wish for everything you send to be readable by the server owner(s), please disconnect."))
|
|
}
|
|
|
|
// if resumed, send fake channel joins
|
|
if c.resumeDetails != nil {
|
|
for _, name := range c.resumeDetails.SendFakeJoinsFor {
|
|
channel := server.channels.Get(name)
|
|
if channel == nil {
|
|
continue
|
|
}
|
|
|
|
if c.capabilities.Has(caps.ExtendedJoin) {
|
|
c.Send(nil, c.nickMaskString, "JOIN", channel.name, c.account.Name, c.realname)
|
|
} else {
|
|
c.Send(nil, c.nickMaskString, "JOIN", channel.name)
|
|
}
|
|
channel.SendTopic(c)
|
|
channel.Names(c)
|
|
|
|
// construct and send fake modestring if necessary
|
|
c.stateMutex.RLock()
|
|
myModes := channel.members[c]
|
|
c.stateMutex.RUnlock()
|
|
if myModes == nil {
|
|
continue
|
|
}
|
|
oldModes := myModes.String()
|
|
if 0 < len(oldModes) {
|
|
params := []string{channel.name, "+" + oldModes}
|
|
for _ = range oldModes {
|
|
params = append(params, c.nick)
|
|
}
|
|
|
|
c.Send(nil, server.name, "MODE", params...)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// t returns the translated version of the given string, based on the languages configured by the client.
|
|
func (client *Client) t(originalString string) string {
|
|
// grab this mutex to protect client.languages
|
|
client.stateMutex.RLock()
|
|
defer client.stateMutex.RUnlock()
|
|
|
|
return client.server.languages.Translate(client.languages, originalString)
|
|
}
|
|
|
|
// MOTD serves the Message of the Day.
|
|
func (server *Server) MOTD(client *Client) {
|
|
server.configurableStateMutex.RLock()
|
|
motdLines := server.motdLines
|
|
server.configurableStateMutex.RUnlock()
|
|
|
|
if len(motdLines) < 1 {
|
|
client.Send(nil, server.name, ERR_NOMOTD, client.nick, client.t("MOTD File is missing"))
|
|
return
|
|
}
|
|
|
|
client.Send(nil, server.name, RPL_MOTDSTART, client.nick, fmt.Sprintf(client.t("- %s Message of the day - "), server.name))
|
|
for _, line := range motdLines {
|
|
client.Send(nil, server.name, RPL_MOTD, client.nick, line)
|
|
}
|
|
client.Send(nil, server.name, RPL_ENDOFMOTD, client.nick, client.t("End of MOTD command"))
|
|
}
|
|
|
|
//
|
|
// registration commands
|
|
//
|
|
|
|
// PASS <password>
|
|
func passHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
if client.registered {
|
|
client.Send(nil, server.name, ERR_ALREADYREGISTRED, client.nick, client.t("You may not reregister"))
|
|
return false
|
|
}
|
|
|
|
// if no password exists, skip checking
|
|
if len(server.password) == 0 {
|
|
client.authorized = true
|
|
return false
|
|
}
|
|
|
|
// check the provided password
|
|
password := []byte(msg.Params[0])
|
|
if passwd.ComparePassword(server.password, password) != nil {
|
|
client.Send(nil, server.name, ERR_PASSWDMISMATCH, client.nick, client.t("Password incorrect"))
|
|
client.Send(nil, server.name, "ERROR", client.t("Password incorrect"))
|
|
return true
|
|
}
|
|
|
|
client.authorized = true
|
|
return false
|
|
}
|
|
|
|
// USER <username> * 0 <realname>
|
|
func userHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
if client.registered {
|
|
client.Send(nil, server.name, ERR_ALREADYREGISTRED, client.nick, client.t("You may not reregister"))
|
|
return false
|
|
}
|
|
|
|
if !client.authorized {
|
|
client.Quit("Bad password")
|
|
return true
|
|
}
|
|
|
|
if client.username != "" && client.realname != "" {
|
|
return false
|
|
}
|
|
|
|
// confirm that username is valid
|
|
//
|
|
_, err := CasefoldName(msg.Params[0])
|
|
if err != nil {
|
|
client.Send(nil, "", "ERROR", client.t("Malformed username"))
|
|
return true
|
|
}
|
|
|
|
if !client.HasUsername() {
|
|
client.username = "~" + msg.Params[0]
|
|
// don't bother updating nickmask here, it's not valid anyway
|
|
}
|
|
if client.realname == "" {
|
|
client.realname = msg.Params[3]
|
|
}
|
|
|
|
server.tryRegister(client)
|
|
|
|
return false
|
|
}
|
|
|
|
// QUIT [<reason>]
|
|
func quitHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
reason := "Quit"
|
|
if len(msg.Params) > 0 {
|
|
reason += ": " + msg.Params[0]
|
|
}
|
|
client.Quit(reason)
|
|
return true
|
|
}
|
|
|
|
//
|
|
// normal commands
|
|
//
|
|
|
|
// PING <server1> [<server2>]
|
|
func pingHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
client.Send(nil, server.name, "PONG", msg.Params...)
|
|
return false
|
|
}
|
|
|
|
// PONG <server> [ <server2> ]
|
|
func pongHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
// client gets touched when they send this command, so we don't need to do anything
|
|
return false
|
|
}
|
|
|
|
// RENAME <oldchan> <newchan> [<reason>]
|
|
func renameHandler(server *Server, client *Client, msg ircmsg.IrcMessage) (result bool) {
|
|
result = false
|
|
|
|
errorResponse := func(err error, name string) {
|
|
// TODO: send correct error codes, e.g., ERR_CANNOTRENAME, ERR_CHANNAMEINUSE
|
|
var code string
|
|
switch err {
|
|
case NoSuchChannel:
|
|
code = ERR_NOSUCHCHANNEL
|
|
case RenamePrivsNeeded:
|
|
code = ERR_CHANOPRIVSNEEDED
|
|
case InvalidChannelName:
|
|
code = ERR_UNKNOWNERROR
|
|
case ChannelNameInUse:
|
|
code = ERR_UNKNOWNERROR
|
|
default:
|
|
code = ERR_UNKNOWNERROR
|
|
}
|
|
client.Send(nil, server.name, code, client.Nick(), "RENAME", name, err.Error())
|
|
}
|
|
|
|
oldName := strings.TrimSpace(msg.Params[0])
|
|
newName := strings.TrimSpace(msg.Params[1])
|
|
if oldName == "" || newName == "" {
|
|
errorResponse(InvalidChannelName, "<empty>")
|
|
return
|
|
}
|
|
casefoldedOldName, err := CasefoldChannel(oldName)
|
|
if err != nil {
|
|
errorResponse(InvalidChannelName, oldName)
|
|
return
|
|
}
|
|
|
|
reason := "No reason"
|
|
if 2 < len(msg.Params) {
|
|
reason = msg.Params[2]
|
|
}
|
|
|
|
channel := server.channels.Get(oldName)
|
|
if channel == nil {
|
|
errorResponse(NoSuchChannel, oldName)
|
|
return
|
|
}
|
|
//TODO(dan): allow IRCops to do this?
|
|
if !channel.ClientIsAtLeast(client, Operator) {
|
|
errorResponse(RenamePrivsNeeded, oldName)
|
|
return
|
|
}
|
|
|
|
founder := channel.Founder()
|
|
if founder != "" && founder != client.AccountName() {
|
|
//TODO(dan): Change this to ERR_CANNOTRENAME
|
|
client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, "RENAME", oldName, client.t("Only channel founders can change registered channels"))
|
|
return false
|
|
}
|
|
|
|
// perform the channel rename
|
|
err = server.channels.Rename(oldName, newName)
|
|
if err != nil {
|
|
errorResponse(err, newName)
|
|
return
|
|
}
|
|
|
|
// rename succeeded, persist it
|
|
go server.channelRegistry.Rename(channel, casefoldedOldName)
|
|
|
|
// send RENAME messages
|
|
for _, mcl := range channel.Members() {
|
|
if mcl.capabilities.Has(caps.Rename) {
|
|
mcl.Send(nil, client.nickMaskString, "RENAME", oldName, newName, reason)
|
|
} else {
|
|
mcl.Send(nil, mcl.nickMaskString, "PART", oldName, fmt.Sprintf(mcl.t("Channel renamed: %s"), reason))
|
|
if mcl.capabilities.Has(caps.ExtendedJoin) {
|
|
accountName := "*"
|
|
if mcl.account != nil {
|
|
accountName = mcl.account.Name
|
|
}
|
|
mcl.Send(nil, mcl.nickMaskString, "JOIN", newName, accountName, mcl.realname)
|
|
} else {
|
|
mcl.Send(nil, mcl.nickMaskString, "JOIN", newName)
|
|
}
|
|
}
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// JOIN <channel>{,<channel>} [<key>{,<key>}]
|
|
func joinHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
// kill JOIN 0 requests
|
|
if msg.Params[0] == "0" {
|
|
client.Notice(client.t("JOIN 0 is not allowed"))
|
|
return false
|
|
}
|
|
|
|
// handle regular JOINs
|
|
channels := strings.Split(msg.Params[0], ",")
|
|
var keys []string
|
|
if len(msg.Params) > 1 {
|
|
keys = strings.Split(msg.Params[1], ",")
|
|
}
|
|
|
|
for i, name := range channels {
|
|
var key string
|
|
if len(keys) > i {
|
|
key = keys[i]
|
|
}
|
|
err := server.channels.Join(client, name, key)
|
|
if err == NoSuchChannel {
|
|
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.Nick(), name, client.t("No such channel"))
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// PART <channel>{,<channel>} [<reason>]
|
|
func partHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
channels := strings.Split(msg.Params[0], ",")
|
|
var reason string //TODO(dan): if this isn't supplied here, make sure the param doesn't exist in the PART message sent to other users
|
|
if len(msg.Params) > 1 {
|
|
reason = msg.Params[1]
|
|
}
|
|
|
|
for _, chname := range channels {
|
|
err := server.channels.Part(client, chname, reason)
|
|
if err == NoSuchChannel {
|
|
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, client.t("No such channel"))
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// TOPIC <channel> [<topic>]
|
|
func topicHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
name, err := CasefoldChannel(msg.Params[0])
|
|
channel := server.channels.Get(name)
|
|
if err != nil || channel == nil {
|
|
if len(msg.Params[0]) > 0 {
|
|
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, msg.Params[0], client.t("No such channel"))
|
|
}
|
|
return false
|
|
}
|
|
|
|
if len(msg.Params) > 1 {
|
|
channel.SetTopic(client, msg.Params[1])
|
|
} else {
|
|
channel.SendTopic(client)
|
|
}
|
|
return false
|
|
}
|
|
|
|
// wordWrap wraps the given text into a series of lines that don't exceed lineWidth characters.
|
|
func wordWrap(text string, lineWidth int) []string {
|
|
var lines []string
|
|
var cacheLine, cacheWord string
|
|
|
|
for _, char := range text {
|
|
if char == '\r' {
|
|
continue
|
|
} else if char == '\n' {
|
|
cacheLine += cacheWord
|
|
lines = append(lines, cacheLine)
|
|
cacheWord = ""
|
|
cacheLine = ""
|
|
} else if (char == ' ' || char == '-') && len(cacheLine)+len(cacheWord)+1 < lineWidth {
|
|
// natural word boundary
|
|
cacheLine += cacheWord + string(char)
|
|
cacheWord = ""
|
|
} else if lineWidth <= len(cacheLine)+len(cacheWord)+1 {
|
|
// time to wrap to next line
|
|
if len(cacheLine) < (lineWidth / 2) {
|
|
// this word takes up more than half a line... just split in the middle of the word
|
|
cacheLine += cacheWord + string(char)
|
|
cacheWord = ""
|
|
} else {
|
|
cacheWord += string(char)
|
|
}
|
|
lines = append(lines, cacheLine)
|
|
cacheLine = ""
|
|
} else {
|
|
// normal character
|
|
cacheWord += string(char)
|
|
}
|
|
}
|
|
if 0 < len(cacheWord) {
|
|
cacheLine += cacheWord
|
|
}
|
|
if 0 < len(cacheLine) {
|
|
lines = append(lines, cacheLine)
|
|
}
|
|
|
|
return lines
|
|
}
|
|
|
|
// SplitMessage represents a message that's been split for sending.
|
|
type SplitMessage struct {
|
|
For512 []string
|
|
ForMaxLine string
|
|
}
|
|
|
|
func (server *Server) splitMessage(original string, origIs512 bool) SplitMessage {
|
|
var newSplit SplitMessage
|
|
|
|
newSplit.ForMaxLine = original
|
|
|
|
if !origIs512 {
|
|
newSplit.For512 = wordWrap(original, 400)
|
|
} else {
|
|
newSplit.For512 = []string{original}
|
|
}
|
|
|
|
return newSplit
|
|
}
|
|
|
|
// PRIVMSG <target>{,<target>} <message>
|
|
func privmsgHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
clientOnlyTags := GetClientOnlyTags(msg.Tags)
|
|
targets := strings.Split(msg.Params[0], ",")
|
|
message := msg.Params[1]
|
|
|
|
// split privmsg
|
|
splitMsg := server.splitMessage(message, !client.capabilities.Has(caps.MaxLine))
|
|
|
|
for i, targetString := range targets {
|
|
// max of four targets per privmsg
|
|
if i > maxTargets-1 {
|
|
break
|
|
}
|
|
prefixes, targetString := SplitChannelMembershipPrefixes(targetString)
|
|
lowestPrefix := GetLowestChannelModePrefix(prefixes)
|
|
|
|
// eh, no need to notify them
|
|
if len(targetString) < 1 {
|
|
continue
|
|
}
|
|
|
|
target, err := CasefoldChannel(targetString)
|
|
if err == nil {
|
|
channel := server.channels.Get(target)
|
|
if channel == nil {
|
|
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, targetString, client.t("No such channel"))
|
|
continue
|
|
}
|
|
if !channel.CanSpeak(client) {
|
|
client.Send(nil, client.server.name, ERR_CANNOTSENDTOCHAN, channel.name, client.t("Cannot send to channel"))
|
|
continue
|
|
}
|
|
msgid := server.generateMessageID()
|
|
channel.SplitPrivMsg(msgid, lowestPrefix, clientOnlyTags, client, splitMsg)
|
|
} else {
|
|
target, err = CasefoldName(targetString)
|
|
if target == "chanserv" {
|
|
server.chanservReceivePrivmsg(client, message)
|
|
continue
|
|
} else if target == "nickserv" {
|
|
server.nickservReceivePrivmsg(client, message)
|
|
continue
|
|
}
|
|
user := server.clients.Get(target)
|
|
if err != nil || user == nil {
|
|
if len(target) > 0 {
|
|
client.Send(nil, server.name, ERR_NOSUCHNICK, client.nick, target, "No such nick")
|
|
}
|
|
continue
|
|
}
|
|
if !user.capabilities.Has(caps.MessageTags) {
|
|
clientOnlyTags = nil
|
|
}
|
|
msgid := server.generateMessageID()
|
|
// restrict messages appropriately when +R is set
|
|
// intentionally make the sending user think the message went through fine
|
|
if !user.flags[RegisteredOnly] || client.registered {
|
|
user.SendSplitMsgFromClient(msgid, client, clientOnlyTags, "PRIVMSG", user.nick, splitMsg)
|
|
}
|
|
if client.capabilities.Has(caps.EchoMessage) {
|
|
client.SendSplitMsgFromClient(msgid, client, clientOnlyTags, "PRIVMSG", user.nick, splitMsg)
|
|
}
|
|
if user.flags[Away] {
|
|
//TODO(dan): possibly implement cooldown of away notifications to users
|
|
client.Send(nil, server.name, RPL_AWAY, user.nick, user.awayMessage)
|
|
}
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// TAGMSG <target>{,<target>}
|
|
func tagmsgHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
clientOnlyTags := GetClientOnlyTags(msg.Tags)
|
|
// no client-only tags, so we can drop it
|
|
if clientOnlyTags == nil {
|
|
return false
|
|
}
|
|
|
|
targets := strings.Split(msg.Params[0], ",")
|
|
|
|
for i, targetString := range targets {
|
|
// max of four targets per privmsg
|
|
if i > maxTargets-1 {
|
|
break
|
|
}
|
|
prefixes, targetString := SplitChannelMembershipPrefixes(targetString)
|
|
lowestPrefix := GetLowestChannelModePrefix(prefixes)
|
|
|
|
// eh, no need to notify them
|
|
if len(targetString) < 1 {
|
|
continue
|
|
}
|
|
|
|
target, err := CasefoldChannel(targetString)
|
|
if err == nil {
|
|
channel := server.channels.Get(target)
|
|
if channel == nil {
|
|
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, targetString, client.t("No such channel"))
|
|
continue
|
|
}
|
|
if !channel.CanSpeak(client) {
|
|
client.Send(nil, client.server.name, ERR_CANNOTSENDTOCHAN, channel.name, client.t("Cannot send to channel"))
|
|
continue
|
|
}
|
|
msgid := server.generateMessageID()
|
|
|
|
channel.TagMsg(msgid, lowestPrefix, clientOnlyTags, client)
|
|
} else {
|
|
target, err = CasefoldName(targetString)
|
|
user := server.clients.Get(target)
|
|
if err != nil || user == nil {
|
|
if len(target) > 0 {
|
|
client.Send(nil, server.name, ERR_NOSUCHNICK, client.nick, target, client.t("No such nick"))
|
|
}
|
|
continue
|
|
}
|
|
msgid := server.generateMessageID()
|
|
|
|
// end user can't receive tagmsgs
|
|
if !user.capabilities.Has(caps.MessageTags) {
|
|
continue
|
|
}
|
|
user.SendFromClient(msgid, client, clientOnlyTags, "TAGMSG", user.nick)
|
|
if client.capabilities.Has(caps.EchoMessage) {
|
|
client.SendFromClient(msgid, client, clientOnlyTags, "TAGMSG", user.nick)
|
|
}
|
|
if user.flags[Away] {
|
|
//TODO(dan): possibly implement cooldown of away notifications to users
|
|
client.Send(nil, server.name, RPL_AWAY, user.nick, user.awayMessage)
|
|
}
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// WhoisChannelsNames returns the common channel names between two users.
|
|
func (client *Client) WhoisChannelsNames(target *Client) []string {
|
|
isMultiPrefix := target.capabilities.Has(caps.MultiPrefix)
|
|
var chstrs []string
|
|
for _, channel := range client.Channels() {
|
|
// channel is secret and the target can't see it
|
|
if !target.flags[Operator] && channel.HasMode(Secret) && !channel.hasClient(target) {
|
|
continue
|
|
}
|
|
chstrs = append(chstrs, channel.ClientPrefixes(client, isMultiPrefix)+channel.name)
|
|
}
|
|
return chstrs
|
|
}
|
|
|
|
// WHOIS [ <target> ] <mask> *( "," <mask> )
|
|
func whoisHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
var masksString string
|
|
//var target string
|
|
|
|
if len(msg.Params) > 1 {
|
|
//target = msg.Params[0]
|
|
masksString = msg.Params[1]
|
|
} else {
|
|
masksString = msg.Params[0]
|
|
}
|
|
|
|
if len(strings.TrimSpace(masksString)) < 1 {
|
|
client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, msg.Command, client.t("No masks given"))
|
|
return false
|
|
}
|
|
|
|
if client.flags[Operator] {
|
|
masks := strings.Split(masksString, ",")
|
|
for _, mask := range masks {
|
|
casefoldedMask, err := Casefold(mask)
|
|
if err != nil {
|
|
client.Send(nil, client.server.name, ERR_NOSUCHNICK, client.nick, mask, client.t("No such nick"))
|
|
continue
|
|
}
|
|
matches := server.clients.FindAll(casefoldedMask)
|
|
if len(matches) == 0 {
|
|
client.Send(nil, client.server.name, ERR_NOSUCHNICK, client.nick, mask, client.t("No such nick"))
|
|
continue
|
|
}
|
|
for mclient := range matches {
|
|
client.getWhoisOf(mclient)
|
|
}
|
|
}
|
|
} else {
|
|
// only get the first request
|
|
casefoldedMask, err := Casefold(strings.Split(masksString, ",")[0])
|
|
mclient := server.clients.Get(casefoldedMask)
|
|
if err != nil || mclient == nil {
|
|
client.Send(nil, client.server.name, ERR_NOSUCHNICK, client.nick, masksString, client.t("No such nick"))
|
|
// fall through, ENDOFWHOIS is always sent
|
|
} else {
|
|
client.getWhoisOf(mclient)
|
|
}
|
|
}
|
|
client.Send(nil, server.name, RPL_ENDOFWHOIS, client.nick, masksString, client.t("End of /WHOIS list"))
|
|
return false
|
|
}
|
|
|
|
func (client *Client) getWhoisOf(target *Client) {
|
|
target.stateMutex.RLock()
|
|
defer target.stateMutex.RUnlock()
|
|
|
|
client.Send(nil, client.server.name, RPL_WHOISUSER, client.nick, target.nick, target.username, target.hostname, "*", target.realname)
|
|
|
|
whoischannels := client.WhoisChannelsNames(target)
|
|
if whoischannels != nil {
|
|
client.Send(nil, client.server.name, RPL_WHOISCHANNELS, client.nick, target.nick, strings.Join(whoischannels, " "))
|
|
}
|
|
if target.class != nil {
|
|
client.Send(nil, client.server.name, RPL_WHOISOPERATOR, client.nick, target.nick, target.whoisLine)
|
|
}
|
|
if client.flags[Operator] || client == target {
|
|
client.Send(nil, client.server.name, RPL_WHOISACTUALLY, client.nick, target.nick, fmt.Sprintf("%s@%s", target.username, utils.LookupHostname(target.IPString())), target.IPString(), client.t("Actual user@host, Actual IP"))
|
|
}
|
|
if target.flags[TLS] {
|
|
client.Send(nil, client.server.name, RPL_WHOISSECURE, client.nick, target.nick, client.t("is using a secure connection"))
|
|
}
|
|
accountName := target.AccountName()
|
|
if accountName != "" {
|
|
client.Send(nil, client.server.name, RPL_WHOISACCOUNT, client.nick, accountName, client.t("is logged in as"))
|
|
}
|
|
if target.flags[Bot] {
|
|
client.Send(nil, client.server.name, RPL_WHOISBOT, client.nick, target.nick, ircfmt.Unescape(fmt.Sprintf(client.t("is a $bBot$b on %s"), client.server.networkName)))
|
|
}
|
|
|
|
if 0 < len(target.languages) {
|
|
params := []string{client.nick, target.nick}
|
|
for _, str := range client.server.languages.Codes(target.languages) {
|
|
params = append(params, str)
|
|
}
|
|
params = append(params, client.t("can speak these languages"))
|
|
client.Send(nil, client.server.name, RPL_WHOISLANGUAGE, params...)
|
|
}
|
|
|
|
if target.certfp != "" && (client.flags[Operator] || client == target) {
|
|
client.Send(nil, client.server.name, RPL_WHOISCERTFP, client.nick, target.nick, fmt.Sprintf(client.t("has client certificate fingerprint %s"), target.certfp))
|
|
}
|
|
client.Send(nil, client.server.name, RPL_WHOISIDLE, client.nick, target.nick, strconv.FormatUint(target.IdleSeconds(), 10), strconv.FormatInt(target.SignonTime(), 10), client.t("seconds idle, signon time"))
|
|
}
|
|
|
|
// rplWhoReply returns the WHO reply between one user and another channel/user.
|
|
// <channel> <user> <host> <server> <nick> ( "H" / "G" ) ["*"] [ ( "@" / "+" ) ]
|
|
// :<hopcount> <real name>
|
|
func (target *Client) rplWhoReply(channel *Channel, client *Client) {
|
|
channelName := "*"
|
|
flags := ""
|
|
|
|
if client.HasMode(Away) {
|
|
flags = "G"
|
|
} else {
|
|
flags = "H"
|
|
}
|
|
if client.HasMode(Operator) {
|
|
flags += "*"
|
|
}
|
|
|
|
if channel != nil {
|
|
flags += channel.ClientPrefixes(client, target.capabilities.Has(caps.MultiPrefix))
|
|
channelName = channel.name
|
|
}
|
|
target.Send(nil, target.server.name, RPL_WHOREPLY, target.nick, channelName, client.Username(), client.Hostname(), client.server.name, client.Nick(), flags, strconv.Itoa(client.hops)+" "+client.Realname())
|
|
}
|
|
|
|
func whoChannel(client *Client, channel *Channel, friends ClientSet) {
|
|
for _, member := range channel.Members() {
|
|
if !client.flags[Invisible] || friends[client] {
|
|
client.rplWhoReply(channel, member)
|
|
}
|
|
}
|
|
}
|
|
|
|
// WHO [ <mask> [ "o" ] ]
|
|
func whoHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
if msg.Params[0] == "" {
|
|
client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, "WHO", client.t("First param must be a mask or channel"))
|
|
return false
|
|
}
|
|
|
|
var mask string
|
|
if len(msg.Params) > 0 {
|
|
casefoldedMask, err := Casefold(msg.Params[0])
|
|
if err != nil {
|
|
client.Send(nil, server.name, ERR_UNKNOWNERROR, "WHO", client.t("Mask isn't valid"))
|
|
return false
|
|
}
|
|
mask = casefoldedMask
|
|
}
|
|
|
|
friends := client.Friends()
|
|
|
|
//TODO(dan): is this used and would I put this param in the Modern doc?
|
|
// if not, can we remove it?
|
|
//var operatorOnly bool
|
|
//if len(msg.Params) > 1 && msg.Params[1] == "o" {
|
|
// operatorOnly = true
|
|
//}
|
|
|
|
if mask[0] == '#' {
|
|
// TODO implement wildcard matching
|
|
//TODO(dan): ^ only for opers
|
|
channel := server.channels.Get(mask)
|
|
if channel != nil {
|
|
whoChannel(client, channel, friends)
|
|
}
|
|
} else {
|
|
for mclient := range server.clients.FindAll(mask) {
|
|
client.rplWhoReply(nil, mclient)
|
|
}
|
|
}
|
|
|
|
client.Send(nil, server.name, RPL_ENDOFWHO, client.nick, mask, client.t("End of WHO list"))
|
|
return false
|
|
}
|
|
|
|
// OPER <name> <password>
|
|
func operHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
name, err := CasefoldName(msg.Params[0])
|
|
if err != nil {
|
|
client.Send(nil, server.name, ERR_PASSWDMISMATCH, client.nick, client.t("Password incorrect"))
|
|
return true
|
|
}
|
|
if client.flags[Operator] == true {
|
|
client.Send(nil, server.name, ERR_UNKNOWNERROR, "OPER", client.t("You're already opered-up!"))
|
|
return false
|
|
}
|
|
server.configurableStateMutex.RLock()
|
|
oper := server.operators[name]
|
|
server.configurableStateMutex.RUnlock()
|
|
|
|
password := []byte(msg.Params[1])
|
|
err = passwd.ComparePassword(oper.Pass, password)
|
|
if (oper.Pass == nil) || (err != nil) {
|
|
client.Send(nil, server.name, ERR_PASSWDMISMATCH, client.nick, client.t("Password incorrect"))
|
|
return true
|
|
}
|
|
|
|
client.flags[Operator] = true
|
|
client.operName = name
|
|
client.class = oper.Class
|
|
client.whoisLine = oper.WhoisLine
|
|
|
|
// push new vhost if one is set
|
|
if len(oper.Vhost) > 0 {
|
|
for fClient := range client.Friends(caps.ChgHost) {
|
|
fClient.SendFromClient("", client, nil, "CHGHOST", client.username, oper.Vhost)
|
|
}
|
|
// CHGHOST requires prefix nickmask to have original hostname, so do that before updating nickmask
|
|
client.vhost = oper.Vhost
|
|
client.updateNickMask("")
|
|
}
|
|
|
|
// set new modes
|
|
var applied ModeChanges
|
|
if 0 < len(oper.Modes) {
|
|
modeChanges, unknownChanges := ParseUserModeChanges(strings.Split(oper.Modes, " ")...)
|
|
applied = client.applyUserModeChanges(true, modeChanges)
|
|
if 0 < len(unknownChanges) {
|
|
var runes string
|
|
for r := range unknownChanges {
|
|
runes += string(r)
|
|
}
|
|
client.Notice(fmt.Sprintf(client.t("Could not apply mode changes: +%s"), runes))
|
|
}
|
|
}
|
|
|
|
client.Send(nil, server.name, RPL_YOUREOPER, client.nick, client.t("You are now an IRC operator"))
|
|
|
|
applied = append(applied, ModeChange{
|
|
mode: Operator,
|
|
op: Add,
|
|
})
|
|
client.Send(nil, server.name, "MODE", client.nick, applied.String())
|
|
|
|
server.snomasks.Send(sno.LocalOpers, fmt.Sprintf(ircfmt.Unescape("Client opered up $c[grey][$r%s$c[grey], $r%s$c[grey]]"), client.nickMaskString, client.operName))
|
|
return false
|
|
}
|
|
|
|
// rehash reloads the config and applies the changes from the config file.
|
|
func (server *Server) rehash() error {
|
|
server.logger.Debug("rehash", "Starting rehash")
|
|
|
|
// only let one REHASH go on at a time
|
|
server.rehashMutex.Lock()
|
|
defer server.rehashMutex.Unlock()
|
|
|
|
server.logger.Debug("rehash", "Got rehash lock")
|
|
|
|
config, err := LoadConfig(server.configFilename)
|
|
if err != nil {
|
|
return fmt.Errorf("Error loading config file config: %s", err.Error())
|
|
}
|
|
|
|
err = server.applyConfig(config, false)
|
|
if err != nil {
|
|
return fmt.Errorf("Error applying config changes: %s", err.Error())
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (server *Server) applyConfig(config *Config, initial bool) error {
|
|
if initial {
|
|
server.ctime = time.Now()
|
|
server.configFilename = config.Filename
|
|
} else {
|
|
// enforce configs that can't be changed after launch:
|
|
if server.limits.LineLen.Tags != config.Limits.LineLen.Tags || server.limits.LineLen.Rest != config.Limits.LineLen.Rest {
|
|
return fmt.Errorf("Maximum line length (linelen) cannot be changed after launching the server, rehash aborted")
|
|
} else if server.name != config.Server.Name {
|
|
return fmt.Errorf("Server name cannot be changed after launching the server, rehash aborted")
|
|
}
|
|
}
|
|
|
|
casefoldedName, err := Casefold(config.Server.Name)
|
|
if err != nil {
|
|
return fmt.Errorf("Server name isn't valid [%s]: %s", config.Server.Name, err.Error())
|
|
}
|
|
|
|
// confirm operator stuff all exists and is fine
|
|
operclasses, err := config.OperatorClasses()
|
|
if err != nil {
|
|
return fmt.Errorf("Error rehashing config file operclasses: %s", err.Error())
|
|
}
|
|
opers, err := config.Operators(operclasses)
|
|
if err != nil {
|
|
return fmt.Errorf("Error rehashing config file opers: %s", err.Error())
|
|
}
|
|
|
|
// TODO: support rehash of existing operator perms?
|
|
|
|
// sanity checks complete, start modifying server state
|
|
|
|
if initial {
|
|
server.name = config.Server.Name
|
|
server.nameCasefolded = casefoldedName
|
|
}
|
|
|
|
server.configurableStateMutex.Lock()
|
|
server.networkName = config.Network.Name
|
|
if config.Server.Password != "" {
|
|
server.password = config.Server.PasswordBytes()
|
|
} else {
|
|
server.password = nil
|
|
}
|
|
// apply new WebIRC command restrictions
|
|
server.webirc = config.Server.WebIRC
|
|
// apply new PROXY command restrictions
|
|
server.proxyAllowedFrom = config.Server.ProxyAllowedFrom
|
|
server.recoverFromErrors = true
|
|
if config.Debug.RecoverFromErrors != nil {
|
|
server.recoverFromErrors = *config.Debug.RecoverFromErrors
|
|
}
|
|
server.configurableStateMutex.Unlock()
|
|
|
|
err = server.connectionLimiter.ApplyConfig(config.Server.ConnectionLimiter)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = server.connectionThrottler.ApplyConfig(config.Server.ConnectionThrottler)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// setup new and removed caps
|
|
addedCaps := caps.NewSet()
|
|
removedCaps := caps.NewSet()
|
|
updatedCaps := caps.NewSet()
|
|
|
|
// Translations
|
|
currentLanguageValue, _ := CapValues.Get(caps.Languages)
|
|
|
|
langCodes := []string{strconv.Itoa(len(config.Languages.Data) + 1), "en"}
|
|
for _, info := range config.Languages.Data {
|
|
if info.Incomplete {
|
|
langCodes = append(langCodes, "~"+info.Code)
|
|
} else {
|
|
langCodes = append(langCodes, info.Code)
|
|
}
|
|
}
|
|
newLanguageValue := strings.Join(langCodes, ",")
|
|
server.logger.Debug("rehash", "Languages:", newLanguageValue)
|
|
|
|
if currentLanguageValue != newLanguageValue {
|
|
updatedCaps.Add(caps.Languages)
|
|
CapValues.Set(caps.Languages, newLanguageValue)
|
|
}
|
|
|
|
lm := NewLanguageManager(config.Languages.Default, config.Languages.Data)
|
|
|
|
server.logger.Debug("rehash", "Regenerating HELP indexes for new languages")
|
|
GenerateHelpIndices(lm)
|
|
|
|
server.languages = lm
|
|
|
|
// SASL
|
|
if config.Accounts.AuthenticationEnabled && !server.accountAuthenticationEnabled {
|
|
// enabling SASL
|
|
SupportedCapabilities.Enable(caps.SASL)
|
|
CapValues.Set(caps.SASL, "PLAIN,EXTERNAL")
|
|
addedCaps.Add(caps.SASL)
|
|
}
|
|
if !config.Accounts.AuthenticationEnabled && server.accountAuthenticationEnabled {
|
|
// disabling SASL
|
|
SupportedCapabilities.Disable(caps.SASL)
|
|
removedCaps.Add(caps.SASL)
|
|
}
|
|
server.accountAuthenticationEnabled = config.Accounts.AuthenticationEnabled
|
|
|
|
// STS
|
|
stsValue := config.Server.STS.Value()
|
|
var stsDisabled bool
|
|
stsCurrentCapValue, _ := CapValues.Get(caps.STS)
|
|
server.logger.Debug("rehash", "STS Vals", stsCurrentCapValue, stsValue, fmt.Sprintf("server[%v] config[%v]", server.stsEnabled, config.Server.STS.Enabled))
|
|
if config.Server.STS.Enabled && !server.stsEnabled {
|
|
// enabling STS
|
|
SupportedCapabilities.Enable(caps.STS)
|
|
addedCaps.Add(caps.STS)
|
|
CapValues.Set(caps.STS, stsValue)
|
|
} else if !config.Server.STS.Enabled && server.stsEnabled {
|
|
// disabling STS
|
|
SupportedCapabilities.Disable(caps.STS)
|
|
removedCaps.Add(caps.STS)
|
|
stsDisabled = true
|
|
} else if config.Server.STS.Enabled && server.stsEnabled && stsValue != stsCurrentCapValue {
|
|
// STS policy updated
|
|
CapValues.Set(caps.STS, stsValue)
|
|
updatedCaps.Add(caps.STS)
|
|
}
|
|
server.stsEnabled = config.Server.STS.Enabled
|
|
|
|
// burst new and removed caps
|
|
var capBurstClients ClientSet
|
|
added := make(map[caps.Version]string)
|
|
var removed string
|
|
|
|
// updated caps get DEL'd and then NEW'd
|
|
// so, we can just add updated ones to both removed and added lists here and they'll be correctly handled
|
|
server.logger.Debug("rehash", "Updated Caps", updatedCaps.String(caps.Cap301, CapValues), strconv.Itoa(updatedCaps.Count()))
|
|
for _, capab := range updatedCaps.List() {
|
|
addedCaps.Enable(capab)
|
|
removedCaps.Enable(capab)
|
|
}
|
|
|
|
if 0 < addedCaps.Count() || 0 < removedCaps.Count() {
|
|
capBurstClients = server.clients.AllWithCaps(caps.CapNotify)
|
|
|
|
added[caps.Cap301] = addedCaps.String(caps.Cap301, CapValues)
|
|
added[caps.Cap302] = addedCaps.String(caps.Cap302, CapValues)
|
|
// removed never has values, so we leave it as Cap301
|
|
removed = removedCaps.String(caps.Cap301, CapValues)
|
|
}
|
|
|
|
for sClient := range capBurstClients {
|
|
if stsDisabled {
|
|
// remove STS policy
|
|
//TODO(dan): this is an ugly hack. we can write this better.
|
|
stsPolicy := "sts=duration=0"
|
|
if 0 < addedCaps.Count() {
|
|
added[caps.Cap302] = added[caps.Cap302] + " " + stsPolicy
|
|
} else {
|
|
addedCaps.Enable(caps.STS)
|
|
added[caps.Cap302] = stsPolicy
|
|
}
|
|
}
|
|
// DEL caps and then send NEW ones so that updated caps get removed/added correctly
|
|
if 0 < removedCaps.Count() {
|
|
sClient.Send(nil, server.name, "CAP", sClient.nick, "DEL", removed)
|
|
}
|
|
if 0 < addedCaps.Count() {
|
|
sClient.Send(nil, server.name, "CAP", sClient.nick, "NEW", added[sClient.capVersion])
|
|
}
|
|
}
|
|
|
|
// set server options
|
|
server.configurableStateMutex.Lock()
|
|
lineLenConfig := LineLenLimits{
|
|
Tags: config.Limits.LineLen.Tags,
|
|
Rest: config.Limits.LineLen.Rest,
|
|
}
|
|
server.limits = Limits{
|
|
AwayLen: int(config.Limits.AwayLen),
|
|
ChannelLen: int(config.Limits.ChannelLen),
|
|
KickLen: int(config.Limits.KickLen),
|
|
MonitorEntries: int(config.Limits.MonitorEntries),
|
|
NickLen: int(config.Limits.NickLen),
|
|
TopicLen: int(config.Limits.TopicLen),
|
|
ChanListModes: int(config.Limits.ChanListModes),
|
|
LineLen: lineLenConfig,
|
|
}
|
|
server.operclasses = *operclasses
|
|
server.operators = opers
|
|
server.checkIdent = config.Server.CheckIdent
|
|
|
|
// registration
|
|
accountReg := NewAccountRegistration(config.Accounts.Registration)
|
|
server.accountRegistration = &accountReg
|
|
server.channelRegistrationEnabled = config.Channels.Registration.Enabled
|
|
|
|
server.defaultChannelModes = ParseDefaultChannelModes(config)
|
|
server.configurableStateMutex.Unlock()
|
|
|
|
// set new sendqueue size
|
|
if config.Server.MaxSendQBytes != server.MaxSendQBytes {
|
|
server.configurableStateMutex.Lock()
|
|
server.MaxSendQBytes = config.Server.MaxSendQBytes
|
|
server.configurableStateMutex.Unlock()
|
|
|
|
// update on all clients
|
|
for _, sClient := range server.clients.AllClients() {
|
|
sClient.socket.MaxSendQBytes = config.Server.MaxSendQBytes
|
|
}
|
|
}
|
|
|
|
// set RPL_ISUPPORT
|
|
var newISupportReplies [][]string
|
|
oldISupportList := server.isupport
|
|
server.setISupport()
|
|
if oldISupportList != nil {
|
|
newISupportReplies = oldISupportList.GetDifference(server.isupport)
|
|
}
|
|
|
|
server.loadMOTD(config.Server.MOTD, config.Server.MOTDFormatting)
|
|
|
|
// reload logging config
|
|
err = server.logger.ApplyConfig(config.Logging)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
nowLoggingRawIO := server.logger.IsLoggingRawIO()
|
|
// notify clients if raw i/o logging was enabled by a rehash
|
|
sendRawOutputNotice := !initial && !server.loggingRawIO && nowLoggingRawIO
|
|
server.loggingRawIO = nowLoggingRawIO
|
|
|
|
if initial {
|
|
if err := server.loadDatastore(config.Datastore.Path); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// we are now open for business
|
|
server.setupListeners(config)
|
|
|
|
if !initial {
|
|
// push new info to all of our clients
|
|
for _, sClient := range server.clients.AllClients() {
|
|
for _, tokenline := range newISupportReplies {
|
|
sClient.Send(nil, server.name, RPL_ISUPPORT, append([]string{sClient.nick}, tokenline...)...)
|
|
}
|
|
|
|
if sendRawOutputNotice {
|
|
sClient.Notice(sClient.t("This server is in debug mode and is logging all user I/O. If you do not wish for everything you send to be readable by the server owner(s), please disconnect."))
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (server *Server) loadMOTD(motdPath string, useFormatting bool) error {
|
|
server.logger.Debug("rehash", "Loading MOTD")
|
|
motdLines := make([]string, 0)
|
|
if motdPath != "" {
|
|
file, err := os.Open(motdPath)
|
|
if err == nil {
|
|
defer file.Close()
|
|
|
|
reader := bufio.NewReader(file)
|
|
for {
|
|
line, err := reader.ReadString('\n')
|
|
if err != nil {
|
|
break
|
|
}
|
|
line = strings.TrimRight(line, "\r\n")
|
|
|
|
if useFormatting {
|
|
line = ircfmt.Unescape(line)
|
|
}
|
|
|
|
// "- " is the required prefix for MOTD, we just add it here to make
|
|
// bursting it out to clients easier
|
|
line = fmt.Sprintf("- %s", line)
|
|
|
|
motdLines = append(motdLines, line)
|
|
}
|
|
} else {
|
|
return err
|
|
}
|
|
}
|
|
|
|
server.configurableStateMutex.Lock()
|
|
server.motdLines = motdLines
|
|
server.configurableStateMutex.Unlock()
|
|
return nil
|
|
}
|
|
|
|
func (server *Server) loadDatastore(datastorePath string) error {
|
|
// open the datastore and load server state for which it (rather than config)
|
|
// is the source of truth
|
|
|
|
server.logger.Debug("startup", "Opening datastore")
|
|
db, err := OpenDatabase(datastorePath)
|
|
if err == nil {
|
|
server.store = db
|
|
} else {
|
|
return fmt.Errorf("Failed to open datastore: %s", err.Error())
|
|
}
|
|
|
|
// load *lines (from the datastores)
|
|
server.logger.Debug("startup", "Loading D/Klines")
|
|
server.loadDLines()
|
|
server.loadKLines()
|
|
|
|
// load password manager
|
|
server.logger.Debug("startup", "Loading passwords")
|
|
err = server.store.View(func(tx *buntdb.Tx) error {
|
|
saltString, err := tx.Get(keySalt)
|
|
if err != nil {
|
|
return fmt.Errorf("Could not retrieve salt string: %s", err.Error())
|
|
}
|
|
|
|
salt, err := base64.StdEncoding.DecodeString(saltString)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
pwm := passwd.NewSaltedManager(salt)
|
|
server.passwords = &pwm
|
|
return nil
|
|
})
|
|
if err != nil {
|
|
return fmt.Errorf("Could not load salt: %s", err.Error())
|
|
}
|
|
|
|
server.channelRegistry = NewChannelRegistry(server)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (server *Server) setupListeners(config *Config) {
|
|
// update or destroy all existing listeners
|
|
tlsListeners := config.TLSListeners()
|
|
for addr := range server.listeners {
|
|
currentListener := server.listeners[addr]
|
|
var stillConfigured bool
|
|
for _, newaddr := range config.Server.Listen {
|
|
if newaddr == addr {
|
|
stillConfigured = true
|
|
break
|
|
}
|
|
}
|
|
|
|
// pass new config information to the listener, to be picked up after
|
|
// its next Accept(). this is like sending over a buffered channel of
|
|
// size 1, but where sending a second item overwrites the buffered item
|
|
// instead of blocking.
|
|
currentListener.configMutex.Lock()
|
|
currentListener.shouldStop = !stillConfigured
|
|
currentListener.tlsConfig = tlsListeners[addr]
|
|
currentListener.configMutex.Unlock()
|
|
|
|
if stillConfigured {
|
|
server.logger.Info("listeners",
|
|
fmt.Sprintf("now listening on %s, tls=%t.", addr, (currentListener.tlsConfig != nil)),
|
|
)
|
|
} else {
|
|
// tell the listener it should stop by interrupting its Accept() call:
|
|
currentListener.listener.Close()
|
|
// TODO(golang1.10) delete stopEvent once issue #21856 is released
|
|
<-currentListener.stopEvent
|
|
delete(server.listeners, addr)
|
|
server.logger.Info("listeners", fmt.Sprintf("stopped listening on %s.", addr))
|
|
}
|
|
}
|
|
|
|
// create new listeners that were not previously configured
|
|
for _, newaddr := range config.Server.Listen {
|
|
_, exists := server.listeners[newaddr]
|
|
if !exists {
|
|
// make new listener
|
|
server.listeners[newaddr] = server.createListener(newaddr, tlsListeners[newaddr])
|
|
}
|
|
}
|
|
|
|
if len(tlsListeners) == 0 {
|
|
server.logger.Warning("startup", "You are not exposing an SSL/TLS listening port. You should expose at least one port (typically 6697) to accept TLS connections")
|
|
}
|
|
|
|
var usesStandardTLSPort bool
|
|
for addr := range config.TLSListeners() {
|
|
if strings.Contains(addr, "6697") {
|
|
usesStandardTLSPort = true
|
|
break
|
|
}
|
|
}
|
|
if 0 < len(tlsListeners) && !usesStandardTLSPort {
|
|
server.logger.Warning("startup", "Port 6697 is the standard TLS port for IRC. You should (also) expose port 6697 as a TLS port to ensure clients can connect securely")
|
|
}
|
|
}
|
|
|
|
// GetDefaultChannelModes returns our default channel modes.
|
|
func (server *Server) GetDefaultChannelModes() Modes {
|
|
server.configurableStateMutex.RLock()
|
|
defer server.configurableStateMutex.RUnlock()
|
|
return server.defaultChannelModes
|
|
}
|
|
|
|
// REHASH
|
|
func rehashHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
server.logger.Info("rehash", fmt.Sprintf("REHASH command used by %s", client.nick))
|
|
err := server.rehash()
|
|
|
|
if err == nil {
|
|
client.Send(nil, server.name, RPL_REHASHING, client.nick, "ircd.yaml", client.t("Rehashing"))
|
|
} else {
|
|
server.logger.Error("rehash", fmt.Sprintln("Failed to rehash:", err.Error()))
|
|
client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, "REHASH", err.Error())
|
|
}
|
|
return false
|
|
}
|
|
|
|
// AWAY [<message>]
|
|
func awayHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
var isAway bool
|
|
var text string
|
|
if len(msg.Params) > 0 {
|
|
isAway = true
|
|
text = msg.Params[0]
|
|
awayLen := server.Limits().AwayLen
|
|
if len(text) > awayLen {
|
|
text = text[:awayLen]
|
|
}
|
|
}
|
|
|
|
if isAway {
|
|
client.flags[Away] = true
|
|
} else {
|
|
delete(client.flags, Away)
|
|
}
|
|
client.awayMessage = text
|
|
|
|
var op ModeOp
|
|
if client.flags[Away] {
|
|
op = Add
|
|
client.Send(nil, server.name, RPL_NOWAWAY, client.nick, client.t("You have been marked as being away"))
|
|
} else {
|
|
op = Remove
|
|
client.Send(nil, server.name, RPL_UNAWAY, client.nick, client.t("You are no longer marked as being away"))
|
|
}
|
|
//TODO(dan): Should this be sent automagically as part of setting the flag/mode?
|
|
modech := ModeChanges{ModeChange{
|
|
mode: Away,
|
|
op: op,
|
|
}}
|
|
client.Send(nil, server.name, "MODE", client.nick, modech.String())
|
|
|
|
// dispatch away-notify
|
|
for friend := range client.Friends(caps.AwayNotify) {
|
|
if client.flags[Away] {
|
|
friend.SendFromClient("", client, nil, "AWAY", client.awayMessage)
|
|
} else {
|
|
friend.SendFromClient("", client, nil, "AWAY")
|
|
}
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// ISON <nick>{ <nick>}
|
|
func isonHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
var nicks = msg.Params
|
|
|
|
var err error
|
|
var casefoldedNick string
|
|
ison := make([]string, 0)
|
|
for _, nick := range nicks {
|
|
casefoldedNick, err = CasefoldName(nick)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
if iclient := server.clients.Get(casefoldedNick); iclient != nil {
|
|
ison = append(ison, iclient.nick)
|
|
}
|
|
}
|
|
|
|
client.Send(nil, server.name, RPL_ISON, client.nick, strings.Join(nicks, " "))
|
|
return false
|
|
}
|
|
|
|
// MOTD [<target>]
|
|
func motdHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
//TODO(dan): hook this up when we have multiple servers I guess???
|
|
//var target string
|
|
//if len(msg.Params) > 0 {
|
|
// target = msg.Params[0]
|
|
//}
|
|
|
|
server.MOTD(client)
|
|
return false
|
|
}
|
|
|
|
// NOTICE <target>{,<target>} <message>
|
|
func noticeHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
clientOnlyTags := GetClientOnlyTags(msg.Tags)
|
|
targets := strings.Split(msg.Params[0], ",")
|
|
message := msg.Params[1]
|
|
|
|
// split privmsg
|
|
splitMsg := server.splitMessage(message, !client.capabilities.Has(caps.MaxLine))
|
|
|
|
for i, targetString := range targets {
|
|
// max of four targets per privmsg
|
|
if i > maxTargets-1 {
|
|
break
|
|
}
|
|
prefixes, targetString := SplitChannelMembershipPrefixes(targetString)
|
|
lowestPrefix := GetLowestChannelModePrefix(prefixes)
|
|
|
|
target, cerr := CasefoldChannel(targetString)
|
|
if cerr == nil {
|
|
channel := server.channels.Get(target)
|
|
if channel == nil {
|
|
// errors silently ignored with NOTICE as per RFC
|
|
continue
|
|
}
|
|
if !channel.CanSpeak(client) {
|
|
// errors silently ignored with NOTICE as per RFC
|
|
continue
|
|
}
|
|
msgid := server.generateMessageID()
|
|
channel.SplitNotice(msgid, lowestPrefix, clientOnlyTags, client, splitMsg)
|
|
} else {
|
|
target, err := CasefoldName(targetString)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
if target == "chanserv" {
|
|
server.chanservReceiveNotice(client, message)
|
|
continue
|
|
} else if target == "nickserv" {
|
|
server.nickservReceiveNotice(client, message)
|
|
continue
|
|
}
|
|
|
|
user := server.clients.Get(target)
|
|
if user == nil {
|
|
// errors silently ignored with NOTICE as per RFC
|
|
continue
|
|
}
|
|
if !user.capabilities.Has(caps.MessageTags) {
|
|
clientOnlyTags = nil
|
|
}
|
|
msgid := server.generateMessageID()
|
|
// restrict messages appropriately when +R is set
|
|
// intentionally make the sending user think the message went through fine
|
|
if !user.flags[RegisteredOnly] || client.registered {
|
|
user.SendSplitMsgFromClient(msgid, client, clientOnlyTags, "NOTICE", user.nick, splitMsg)
|
|
}
|
|
if client.capabilities.Has(caps.EchoMessage) {
|
|
client.SendSplitMsgFromClient(msgid, client, clientOnlyTags, "NOTICE", user.nick, splitMsg)
|
|
}
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// KICK <channel>{,<channel>} <user>{,<user>} [<comment>]
|
|
func kickHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
channels := strings.Split(msg.Params[0], ",")
|
|
users := strings.Split(msg.Params[1], ",")
|
|
if (len(channels) != len(users)) && (len(users) != 1) {
|
|
client.Send(nil, server.name, ERR_NEEDMOREPARAMS, client.nick, "KICK", client.t("Not enough parameters"))
|
|
return false
|
|
}
|
|
|
|
var kicks [][]string
|
|
for index, channel := range channels {
|
|
if len(users) == 1 {
|
|
kicks = append(kicks, []string{channel, users[0]})
|
|
} else {
|
|
kicks = append(kicks, []string{channel, users[index]})
|
|
}
|
|
}
|
|
|
|
var comment string
|
|
if len(msg.Params) > 2 {
|
|
comment = msg.Params[2]
|
|
}
|
|
for _, info := range kicks {
|
|
chname := info[0]
|
|
nickname := info[1]
|
|
casefoldedChname, err := CasefoldChannel(chname)
|
|
channel := server.channels.Get(casefoldedChname)
|
|
if err != nil || channel == nil {
|
|
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, client.t("No such channel"))
|
|
continue
|
|
}
|
|
|
|
casefoldedNickname, err := CasefoldName(nickname)
|
|
target := server.clients.Get(casefoldedNickname)
|
|
if err != nil || target == nil {
|
|
client.Send(nil, server.name, ERR_NOSUCHNICK, client.nick, nickname, client.t("No such nick"))
|
|
continue
|
|
}
|
|
|
|
if comment == "" {
|
|
comment = nickname
|
|
}
|
|
channel.Kick(client, target, comment)
|
|
}
|
|
return false
|
|
}
|
|
|
|
// elistMatcher takes and matches ELIST conditions
|
|
type elistMatcher struct {
|
|
MinClientsActive bool
|
|
MinClients int
|
|
MaxClientsActive bool
|
|
MaxClients int
|
|
}
|
|
|
|
// Matches checks whether the given channel matches our matches.
|
|
func (matcher *elistMatcher) Matches(channel *Channel) bool {
|
|
if matcher.MinClientsActive {
|
|
if len(channel.Members()) < matcher.MinClients {
|
|
return false
|
|
}
|
|
}
|
|
|
|
if matcher.MaxClientsActive {
|
|
if len(channel.Members()) < len(channel.members) {
|
|
return false
|
|
}
|
|
}
|
|
|
|
return true
|
|
}
|
|
|
|
// LIST [<channel>{,<channel>}] [<elistcond>{,<elistcond>}]
|
|
func listHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
// get channels
|
|
var channels []string
|
|
for _, param := range msg.Params {
|
|
if 0 < len(param) && param[0] == '#' {
|
|
for _, channame := range strings.Split(param, ",") {
|
|
if 0 < len(channame) && channame[0] == '#' {
|
|
channels = append(channels, channame)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// get elist conditions
|
|
var matcher elistMatcher
|
|
for _, param := range msg.Params {
|
|
if len(param) < 1 {
|
|
continue
|
|
}
|
|
|
|
if param[0] == '<' {
|
|
param = param[1:]
|
|
val, err := strconv.Atoi(param)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
matcher.MaxClientsActive = true
|
|
matcher.MaxClients = val - 1 // -1 because < means less than the given number
|
|
}
|
|
if param[0] == '>' {
|
|
param = param[1:]
|
|
val, err := strconv.Atoi(param)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
matcher.MinClientsActive = true
|
|
matcher.MinClients = val + 1 // +1 because > means more than the given number
|
|
}
|
|
}
|
|
|
|
if len(channels) == 0 {
|
|
for _, channel := range server.channels.Channels() {
|
|
if !client.flags[Operator] && channel.flags[Secret] {
|
|
continue
|
|
}
|
|
if matcher.Matches(channel) {
|
|
client.RplList(channel)
|
|
}
|
|
}
|
|
} else {
|
|
// limit regular users to only listing one channel
|
|
if !client.flags[Operator] {
|
|
channels = channels[:1]
|
|
}
|
|
|
|
for _, chname := range channels {
|
|
casefoldedChname, err := CasefoldChannel(chname)
|
|
channel := server.channels.Get(casefoldedChname)
|
|
if err != nil || channel == nil || (!client.flags[Operator] && channel.flags[Secret]) {
|
|
if len(chname) > 0 {
|
|
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, client.t("No such channel"))
|
|
}
|
|
continue
|
|
}
|
|
if matcher.Matches(channel) {
|
|
client.RplList(channel)
|
|
}
|
|
}
|
|
}
|
|
client.Send(nil, server.name, RPL_LISTEND, client.nick, client.t("End of LIST"))
|
|
return false
|
|
}
|
|
|
|
// RplList returns the RPL_LIST numeric for the given channel.
|
|
func (target *Client) RplList(channel *Channel) {
|
|
// get the correct number of channel members
|
|
var memberCount int
|
|
if target.flags[Operator] || channel.hasClient(target) {
|
|
memberCount = len(channel.Members())
|
|
} else {
|
|
for _, member := range channel.Members() {
|
|
if !member.HasMode(Invisible) {
|
|
memberCount++
|
|
}
|
|
}
|
|
}
|
|
|
|
target.Send(nil, target.server.name, RPL_LIST, target.nick, channel.name, strconv.Itoa(memberCount), channel.topic)
|
|
}
|
|
|
|
// NAMES [<channel>{,<channel>}]
|
|
func namesHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
var channels []string
|
|
if len(msg.Params) > 0 {
|
|
channels = strings.Split(msg.Params[0], ",")
|
|
}
|
|
//var target string
|
|
//if len(msg.Params) > 1 {
|
|
// target = msg.Params[1]
|
|
//}
|
|
|
|
if len(channels) == 0 {
|
|
for _, channel := range server.channels.Channels() {
|
|
channel.Names(client)
|
|
}
|
|
return false
|
|
}
|
|
|
|
// limit regular users to only listing one channel
|
|
if !client.flags[Operator] {
|
|
channels = channels[:1]
|
|
}
|
|
|
|
for _, chname := range channels {
|
|
casefoldedChname, err := CasefoldChannel(chname)
|
|
channel := server.channels.Get(casefoldedChname)
|
|
if err != nil || channel == nil {
|
|
if len(chname) > 0 {
|
|
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, client.t("No such channel"))
|
|
}
|
|
continue
|
|
}
|
|
channel.Names(client)
|
|
}
|
|
return false
|
|
}
|
|
|
|
// VERSION [<server>]
|
|
func versionHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
var target string
|
|
if len(msg.Params) > 0 {
|
|
target = msg.Params[0]
|
|
}
|
|
casefoldedTarget, err := Casefold(target)
|
|
if target != "" && (err != nil || casefoldedTarget != server.nameCasefolded) {
|
|
client.Send(nil, server.name, ERR_NOSUCHSERVER, client.nick, target, client.t("No such server"))
|
|
return false
|
|
}
|
|
|
|
client.Send(nil, server.name, RPL_VERSION, client.nick, Ver, server.name)
|
|
client.RplISupport()
|
|
return false
|
|
}
|
|
|
|
// INVITE <nickname> <channel>
|
|
func inviteHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
nickname := msg.Params[0]
|
|
channelName := msg.Params[1]
|
|
|
|
casefoldedNickname, err := CasefoldName(nickname)
|
|
target := server.clients.Get(casefoldedNickname)
|
|
if err != nil || target == nil {
|
|
client.Send(nil, server.name, ERR_NOSUCHNICK, client.nick, nickname, client.t("No such nick"))
|
|
return false
|
|
}
|
|
|
|
casefoldedChannelName, err := CasefoldChannel(channelName)
|
|
channel := server.channels.Get(casefoldedChannelName)
|
|
if err != nil || channel == nil {
|
|
client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, channelName, client.t("No such channel"))
|
|
return false
|
|
}
|
|
|
|
channel.Invite(target, client)
|
|
return false
|
|
}
|
|
|
|
// TIME [<server>]
|
|
func timeHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
var target string
|
|
if len(msg.Params) > 0 {
|
|
target = msg.Params[0]
|
|
}
|
|
casefoldedTarget, err := Casefold(target)
|
|
if (target != "") && err != nil || (casefoldedTarget != server.nameCasefolded) {
|
|
client.Send(nil, server.name, ERR_NOSUCHSERVER, client.nick, target, client.t("No such server"))
|
|
return false
|
|
}
|
|
client.Send(nil, server.name, RPL_TIME, client.nick, server.name, time.Now().Format(time.RFC1123))
|
|
return false
|
|
}
|
|
|
|
// KILL <nickname> <comment>
|
|
func killHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
nickname := msg.Params[0]
|
|
comment := "<no reason supplied>"
|
|
if len(msg.Params) > 1 {
|
|
comment = msg.Params[1]
|
|
}
|
|
|
|
casefoldedNickname, err := CasefoldName(nickname)
|
|
target := server.clients.Get(casefoldedNickname)
|
|
if err != nil || target == nil {
|
|
client.Send(nil, client.server.name, ERR_NOSUCHNICK, client.nick, nickname, client.t("No such nick"))
|
|
return false
|
|
}
|
|
|
|
quitMsg := fmt.Sprintf("Killed (%s (%s))", client.nick, comment)
|
|
|
|
server.snomasks.Send(sno.LocalKills, fmt.Sprintf(ircfmt.Unescape("%s$r was killed by %s $c[grey][$r%s$c[grey]]"), target.nick, client.nick, comment))
|
|
target.exitedSnomaskSent = true
|
|
|
|
target.Quit(quitMsg)
|
|
target.destroy(false)
|
|
return false
|
|
}
|
|
|
|
// WHOWAS <nickname> [<count> [<server>]]
|
|
func whowasHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
nicknames := strings.Split(msg.Params[0], ",")
|
|
|
|
var count int64
|
|
if len(msg.Params) > 1 {
|
|
count, _ = strconv.ParseInt(msg.Params[1], 10, 64)
|
|
}
|
|
//var target string
|
|
//if len(msg.Params) > 2 {
|
|
// target = msg.Params[2]
|
|
//}
|
|
for _, nickname := range nicknames {
|
|
results := server.whoWas.Find(nickname, count)
|
|
if len(results) == 0 {
|
|
if len(nickname) > 0 {
|
|
client.Send(nil, server.name, ERR_WASNOSUCHNICK, client.nick, nickname, client.t("There was no such nickname"))
|
|
}
|
|
} else {
|
|
for _, whoWas := range results {
|
|
client.Send(nil, server.name, RPL_WHOWASUSER, client.nick, whoWas.nickname, whoWas.username, whoWas.hostname, "*", whoWas.realname)
|
|
}
|
|
}
|
|
if len(nickname) > 0 {
|
|
client.Send(nil, server.name, RPL_ENDOFWHOWAS, client.nick, nickname, client.t("End of WHOWAS"))
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// LUSERS [<mask> [<server>]]
|
|
func lusersHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
//TODO(vegax87) Fix network statistics and additional parameters
|
|
var totalcount, invisiblecount, opercount int
|
|
|
|
for _, onlineusers := range server.clients.AllClients() {
|
|
totalcount++
|
|
if onlineusers.flags[Invisible] {
|
|
invisiblecount++
|
|
}
|
|
if onlineusers.flags[Operator] {
|
|
opercount++
|
|
}
|
|
}
|
|
client.Send(nil, server.name, RPL_LUSERCLIENT, client.nick, fmt.Sprintf(client.t("There are %[1]d users and %[2]d invisible on %[3]d server(s)"), totalcount, invisiblecount, 1))
|
|
client.Send(nil, server.name, RPL_LUSEROP, client.nick, fmt.Sprintf(client.t("%d IRC Operators online"), opercount))
|
|
client.Send(nil, server.name, RPL_LUSERCHANNELS, client.nick, fmt.Sprintf(client.t("%d channels formed"), server.channels.Len()))
|
|
client.Send(nil, server.name, RPL_LUSERME, client.nick, fmt.Sprintf(client.t("I have %[1]d clients and %[2]d servers"), totalcount, 1))
|
|
return false
|
|
}
|
|
|
|
// ResumeDetails are the details that we use to resume connections.
|
|
type ResumeDetails struct {
|
|
OldNick string
|
|
Timestamp *time.Time
|
|
SendFakeJoinsFor []string
|
|
}
|
|
|
|
// RESUME <oldnick> [timestamp]
|
|
func resumeHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
oldnick := msg.Params[0]
|
|
|
|
if strings.Contains(oldnick, " ") {
|
|
client.Send(nil, server.name, ERR_CANNOT_RESUME, "*", client.t("Cannot resume connection, old nickname contains spaces"))
|
|
return false
|
|
}
|
|
|
|
if client.Registered() {
|
|
client.Send(nil, server.name, ERR_CANNOT_RESUME, oldnick, client.t("Cannot resume connection, connection registration has already been completed"))
|
|
return false
|
|
}
|
|
|
|
var timestamp *time.Time
|
|
if 1 < len(msg.Params) {
|
|
ts, err := time.Parse("2006-01-02T15:04:05.999Z", msg.Params[1])
|
|
if err == nil {
|
|
timestamp = &ts
|
|
} else {
|
|
client.Send(nil, server.name, ERR_CANNOT_RESUME, oldnick, client.t("Timestamp is not in 2006-01-02T15:04:05.999Z format, ignoring it"))
|
|
}
|
|
}
|
|
|
|
client.resumeDetails = &ResumeDetails{
|
|
OldNick: oldnick,
|
|
Timestamp: timestamp,
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// USERHOST <nickname> [<nickname> <nickname> ...]
|
|
func userhostHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
returnedNicks := make(map[string]bool)
|
|
|
|
for i, nickname := range msg.Params {
|
|
if i >= 10 {
|
|
break
|
|
}
|
|
|
|
casefoldedNickname, err := CasefoldName(nickname)
|
|
target := server.clients.Get(casefoldedNickname)
|
|
if err != nil || target == nil {
|
|
client.Send(nil, client.server.name, ERR_NOSUCHNICK, client.nick, nickname, client.t("No such nick"))
|
|
return false
|
|
}
|
|
if returnedNicks[casefoldedNickname] {
|
|
continue
|
|
}
|
|
|
|
// to prevent returning multiple results for a single nick
|
|
returnedNicks[casefoldedNickname] = true
|
|
|
|
var isOper, isAway string
|
|
|
|
if target.flags[Operator] {
|
|
isOper = "*"
|
|
}
|
|
if target.flags[Away] {
|
|
isAway = "-"
|
|
} else {
|
|
isAway = "+"
|
|
}
|
|
client.Send(nil, client.server.name, RPL_USERHOST, client.nick, fmt.Sprintf("%s%s=%s%s@%s", target.nick, isOper, isAway, target.username, target.hostname))
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// LANGUAGE <code>{ <code>}
|
|
func languageHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
alreadyDoneLanguages := make(map[string]bool)
|
|
var appliedLanguages []string
|
|
|
|
supportedLanguagesCount := server.languages.Count()
|
|
if supportedLanguagesCount < len(msg.Params) {
|
|
client.Send(nil, client.server.name, ERR_TOOMANYLANGUAGES, client.nick, strconv.Itoa(supportedLanguagesCount), client.t("You specified too many languages"))
|
|
return false
|
|
}
|
|
|
|
for _, value := range msg.Params {
|
|
value = strings.ToLower(value)
|
|
// strip ~ from the language if it has it
|
|
value = strings.TrimPrefix(value, "~")
|
|
|
|
// silently ignore empty languages or those with spaces in them
|
|
if len(value) == 0 || strings.Contains(value, " ") {
|
|
continue
|
|
}
|
|
|
|
_, exists := server.languages.Info[value]
|
|
if !exists {
|
|
client.Send(nil, client.server.name, ERR_NOLANGUAGE, client.nick, client.t("Languages are not supported by this server"))
|
|
return false
|
|
}
|
|
|
|
// if we've already applied the given language, skip it
|
|
_, exists = alreadyDoneLanguages[value]
|
|
if exists {
|
|
continue
|
|
}
|
|
|
|
appliedLanguages = append(appliedLanguages, value)
|
|
}
|
|
|
|
client.stateMutex.Lock()
|
|
if len(appliedLanguages) == 1 && appliedLanguages[0] == "en" {
|
|
// premature optimisation ahoy!
|
|
client.languages = []string{}
|
|
} else {
|
|
client.languages = appliedLanguages
|
|
}
|
|
client.stateMutex.Unlock()
|
|
|
|
params := []string{client.nick}
|
|
for _, lang := range appliedLanguages {
|
|
params = append(params, lang)
|
|
}
|
|
params = append(params, client.t("Language preferences have been set"))
|
|
|
|
client.Send(nil, client.server.name, RPL_YOURLANGUAGESARE, params...)
|
|
|
|
return false
|
|
}
|
|
|
|
var (
|
|
infoString1 = strings.Split(` ▄▄▄ ▄▄▄· ▄▄ • ▐ ▄
|
|
▪ ▀▄ █·▐█ ▀█ ▐█ ▀ ▪▪ •█▌▐█▪
|
|
▄█▀▄ ▐▀▀▄ ▄█▀▀█ ▄█ ▀█▄ ▄█▀▄▪▐█▐▐▌ ▄█▀▄
|
|
▐█▌.▐▌▐█•█▌▐█ ▪▐▌▐█▄▪▐█▐█▌ ▐▌██▐█▌▐█▌.▐▌
|
|
▀█▄▀▪.▀ ▀ ▀ ▀ ·▀▀▀▀ ▀█▄▀ ▀▀ █▪ ▀█▄▀▪
|
|
|
|
https://oragono.io/
|
|
https://github.com/oragono/oragono
|
|
https://crowdin.com/project/oragono
|
|
`, "\n")
|
|
infoString2 = strings.Split(` Daniel Oakley, DanielOaks, <daniel@danieloaks.net>
|
|
Shivaram Lingamneni, slingamn, <slingamn@cs.stanford.edu>
|
|
`, "\n")
|
|
infoString3 = strings.Split(` 3onyc
|
|
Edmund Huber
|
|
Euan Kemp (euank)
|
|
Jeremy Latt
|
|
Martin Lindhe (martinlindhe)
|
|
Roberto Besser (besser)
|
|
Robin Burchell (rburchell)
|
|
Sean Enck (enckse)
|
|
soul9
|
|
Vegax
|
|
`, "\n")
|
|
)
|
|
|
|
func infoHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
|
|
// we do the below so that the human-readable lines in info can be translated.
|
|
for _, line := range infoString1 {
|
|
client.Send(nil, server.name, RPL_INFO, client.nick, line)
|
|
}
|
|
client.Send(nil, server.name, RPL_INFO, client.nick, client.t("Oragono is released under the MIT license."))
|
|
client.Send(nil, server.name, RPL_INFO, client.nick, "")
|
|
client.Send(nil, server.name, RPL_INFO, client.nick, client.t("Thanks to Jeremy Latt for founding Ergonomadic, the project this is based on")+" <3")
|
|
client.Send(nil, server.name, RPL_INFO, client.nick, "")
|
|
client.Send(nil, server.name, RPL_INFO, client.nick, client.t("Core Developers:"))
|
|
for _, line := range infoString2 {
|
|
client.Send(nil, server.name, RPL_INFO, client.nick, line)
|
|
}
|
|
client.Send(nil, server.name, RPL_INFO, client.nick, "")
|
|
client.Send(nil, server.name, RPL_INFO, client.nick, client.t("Contributors and Former Developers:"))
|
|
for _, line := range infoString3 {
|
|
client.Send(nil, server.name, RPL_INFO, client.nick, line)
|
|
}
|
|
client.Send(nil, server.name, RPL_ENDOFINFO, client.nick, client.t("End of /INFO"))
|
|
return false
|
|
}
|