mirror of
https://github.com/ergochat/ergo.git
synced 2024-11-11 06:29:29 +01:00
119 lines
3.6 KiB
Go
119 lines
3.6 KiB
Go
// Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
|
|
// released under the MIT license
|
|
|
|
package irc
|
|
|
|
import (
|
|
"bytes"
|
|
|
|
"github.com/oragono/oragono/irc/history"
|
|
"github.com/oragono/oragono/irc/modes"
|
|
"github.com/oragono/oragono/irc/utils"
|
|
)
|
|
|
|
const (
|
|
npcNickMask = "*%s*!%s@npc.fakeuser.invalid"
|
|
sceneNickMask = "=Scene=!%s@npc.fakeuser.invalid"
|
|
)
|
|
|
|
func sendRoleplayMessage(server *Server, client *Client, source string, targetString string, isAction bool, messageParts []string, rb *ResponseBuffer) {
|
|
config := server.Config()
|
|
if !config.Roleplay.enabled {
|
|
rb.Add(nil, client.server.name, ERR_CANNOTSENDRP, targetString, client.t("Roleplaying has been disabled by the server administrators"))
|
|
return
|
|
}
|
|
if config.Roleplay.RequireOper && !client.HasRoleCapabs("roleplay") {
|
|
rb.Add(nil, client.server.name, ERR_CANNOTSENDRP, targetString, client.t("Insufficient privileges"))
|
|
return
|
|
}
|
|
|
|
// block attempts to send CTCP messages to Tor clients
|
|
if len(messageParts) > 0 && len(messageParts[0]) > 0 && messageParts[0][0] == '\x01' {
|
|
return
|
|
}
|
|
|
|
var buf bytes.Buffer
|
|
if isAction {
|
|
buf.WriteString("\x01ACTION ")
|
|
}
|
|
for i, part := range messageParts {
|
|
buf.WriteString(part)
|
|
if i != len(messageParts)-1 {
|
|
buf.WriteByte(' ')
|
|
}
|
|
}
|
|
if config.Roleplay.addSuffix {
|
|
buf.WriteString(" (")
|
|
buf.WriteString(client.Nick())
|
|
buf.WriteString(")")
|
|
}
|
|
|
|
splitMessage := utils.MakeMessage(buf.String())
|
|
|
|
target, cerr := CasefoldChannel(targetString)
|
|
if cerr == nil {
|
|
channel := server.channels.Get(target)
|
|
if channel == nil {
|
|
rb.Add(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, targetString, client.t("No such channel"))
|
|
return
|
|
}
|
|
|
|
targetString = channel.Name()
|
|
if !channel.CanSpeak(client) {
|
|
rb.Add(nil, client.server.name, ERR_CANNOTSENDTOCHAN, targetString, client.t("Cannot send to channel"))
|
|
return
|
|
}
|
|
|
|
if !channel.flags.HasMode(modes.ChanRoleplaying) {
|
|
rb.Add(nil, client.server.name, ERR_CANNOTSENDRP, targetString, client.t("Channel doesn't have roleplaying mode available"))
|
|
return
|
|
}
|
|
|
|
if config.Roleplay.RequireChanops && !channel.ClientIsAtLeast(client, modes.ChannelOperator) {
|
|
rb.Add(nil, client.server.name, ERR_CANNOTSENDRP, targetString, client.t("Insufficient privileges"))
|
|
return
|
|
}
|
|
|
|
for _, member := range channel.Members() {
|
|
for _, session := range member.Sessions() {
|
|
// see discussion on #865: clients do not understand how to do local echo
|
|
// of roleplay commands, so send them a copy whether they have echo-message
|
|
// or not
|
|
if rb.session == session {
|
|
rb.AddSplitMessageFromClient(source, "", nil, "PRIVMSG", targetString, splitMessage)
|
|
} else {
|
|
session.sendSplitMsgFromClientInternal(false, source, "", nil, "PRIVMSG", targetString, splitMessage)
|
|
}
|
|
}
|
|
}
|
|
|
|
channel.AddHistoryItem(history.Item{
|
|
Type: history.Privmsg,
|
|
Message: splitMessage,
|
|
Nick: source,
|
|
})
|
|
} else {
|
|
target, err := CasefoldName(targetString)
|
|
user := server.clients.Get(target)
|
|
if err != nil || user == nil {
|
|
rb.Add(nil, server.name, ERR_NOSUCHNICK, client.nick, target, client.t("No such nick"))
|
|
return
|
|
}
|
|
|
|
if !user.HasMode(modes.UserRoleplaying) {
|
|
rb.Add(nil, client.server.name, ERR_CANNOTSENDRP, user.nick, client.t("User doesn't have roleplaying mode enabled"))
|
|
return
|
|
}
|
|
|
|
cnick := client.Nick()
|
|
tnick := user.Nick()
|
|
for _, session := range user.Sessions() {
|
|
session.sendSplitMsgFromClientInternal(false, source, "", nil, "PRIVMSG", tnick, splitMessage)
|
|
}
|
|
if user.Away() {
|
|
//TODO(dan): possibly implement cooldown of away notifications to users
|
|
rb.Add(nil, server.name, RPL_AWAY, cnick, tnick, user.AwayMessage())
|
|
}
|
|
}
|
|
}
|