2017-03-05 22:33:31 +01:00
|
|
|
# This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
# License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2019-09-01 20:01:18 +02:00
|
|
|
package Plugins::AntiRepeat;
|
2020-02-09 04:48:05 +01:00
|
|
|
use parent 'Plugins::Plugin';
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2020-02-09 04:48:05 +01:00
|
|
|
use warnings; use strict;
|
|
|
|
use feature 'unicode_strings';
|
2016-01-30 04:56:29 +01:00
|
|
|
|
|
|
|
use feature 'switch';
|
|
|
|
no if $] >= 5.018, warnings => "experimental::smartmatch";
|
|
|
|
|
|
|
|
use String::LCSS qw/lcss/;
|
|
|
|
use Time::HiRes qw/gettimeofday/;
|
|
|
|
use POSIX qw/strftime/;
|
|
|
|
|
|
|
|
sub initialize {
|
2020-02-15 23:38:32 +01:00
|
|
|
my ($self, %conf) = @_;
|
|
|
|
$self->{pbot}->{registry}->add_default('text', 'antiflood', 'antirepeat', $conf{antirepeat} // 1);
|
|
|
|
$self->{pbot}->{registry}->add_default('text', 'antiflood', 'antirepeat_threshold', $conf{antirepeat_threshold} // 2.5);
|
|
|
|
$self->{pbot}->{registry}->add_default('text', 'antiflood', 'antirepeat_match', $conf{antirepeat_match} // 0.5);
|
|
|
|
$self->{pbot}->{registry}->add_default('text', 'antiflood', 'antirepeat_allow_bot', $conf{antirepeat_allow_bot} // 1);
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
$self->{pbot}->{event_dispatcher}->register_handler('irc.public', sub { $self->on_public(@_) });
|
|
|
|
$self->{pbot}->{event_dispatcher}->register_handler('irc.caction', sub { $self->on_public(@_) });
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
$self->{offenses} = {};
|
2016-01-30 04:56:29 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
sub unload {
|
2020-02-15 23:38:32 +01:00
|
|
|
my $self = shift;
|
2020-03-08 03:43:07 +01:00
|
|
|
$self->{pbot}->{timer}->dequeue_event('antirepeat .*');
|
2020-02-15 23:38:32 +01:00
|
|
|
$self->{pbot}->{event_dispatcher}->remove_handler('irc.public');
|
|
|
|
$self->{pbot}->{event_dispatcher}->remove_handler('irc.caction');
|
2016-01-30 04:56:29 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
sub on_public {
|
2020-02-15 23:38:32 +01:00
|
|
|
my ($self, $event_type, $event) = @_;
|
|
|
|
my ($nick, $user, $host, $msg) = ($event->{event}->nick, $event->{event}->user, $event->{event}->host, $event->{event}->args);
|
|
|
|
my $channel = lc $event->{event}->{to}[0];
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
($nick, $user, $host) = $self->{pbot}->{irchandlers}->normalize_hostmask($nick, $user, $host);
|
2017-06-18 12:40:51 +02:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
return 0 if not $self->{pbot}->{registry}->get_value('antiflood', 'antirepeat');
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
my $antirepeat = $self->{pbot}->{registry}->get_value($channel, 'antirepeat');
|
|
|
|
return 0 if defined $antirepeat and not $antirepeat;
|
2019-06-26 18:34:19 +02:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
return 0 if $self->{pbot}->{registry}->get_value($channel, 'dont_enforce_antiflood');
|
2019-12-29 07:01:46 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
return 0 if $channel !~ m/^#/;
|
|
|
|
return 0 if $event->{interpreted};
|
2020-02-10 01:20:58 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
my $u = $self->{pbot}->{users}->loggedin($channel, "$nick!$user\@$host");
|
|
|
|
return 0 if $self->{pbot}->{capabilities}->userhas($u, 'is-whitelisted');
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
my $account = $self->{pbot}->{messagehistory}->{database}->get_message_account($nick, $user, $host);
|
2018-08-13 23:23:47 +02:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
# don't enforce anti-repeat for unreg spam
|
|
|
|
my $chanmodes = $self->{pbot}->{channels}->get_meta($channel, 'MODE');
|
2020-04-29 06:33:49 +02:00
|
|
|
if (defined $chanmodes and $chanmodes =~ m/z/ and $self->{pbot}->{banlist}->{quietlist}->exists($channel, '$~a')) {
|
2020-02-15 23:38:32 +01:00
|
|
|
my $nickserv = $self->{pbot}->{messagehistory}->{database}->get_current_nickserv_account($account);
|
|
|
|
return 0 if not defined $nickserv or not length $nickserv;
|
|
|
|
}
|
2018-08-13 23:23:47 +02:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
my $messages = $self->{pbot}->{messagehistory}->{database}->get_recent_messages($account, $channel, 6, $self->{pbot}->{messagehistory}->{MSG_CHAT});
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
my $botnick = $self->{pbot}->{registry}->get_value('irc', 'botnick');
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
my $bot_trigger = $self->{pbot}->{registry}->get_value($channel, 'trigger') // $self->{pbot}->{registry}->get_value('general', 'trigger');
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
my $allow_bot = $self->{pbot}->{registry}->get_value($channel, 'antirepeat_allow_bot') // $self->{pbot}->{registry}->get_value('antiflood', 'antirepeat_allow_bot');
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
my $match = $self->{pbot}->{registry}->get_value($channel, 'antirepeat_match') // $self->{pbot}->{registry}->get_value('antiflood', 'antirepeat_match');
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
my %matches;
|
|
|
|
my $now = gettimeofday;
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
foreach my $string1 (@$messages) {
|
|
|
|
next if $now - $string1->{timestamp} > 60 * 60 * 2;
|
|
|
|
next if $allow_bot and $string1->{msg} =~ m/^(?:$bot_trigger|$botnick.?)/;
|
|
|
|
$string1->{msg} =~ s/^[^;,:]{1,20}[;,:]//; # remove nick-like prefix if one exists
|
|
|
|
next if length $string1->{msg} <= 5; # allow really short messages since "yep" "ok" etc are so common
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
if (exists $self->{offenses}->{$account} and exists $self->{offenses}->{$account}->{$channel}) {
|
|
|
|
next if $self->{offenses}->{$account}->{$channel}->{last_offense} >= $string1->{timestamp};
|
|
|
|
}
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
foreach my $string2 (@$messages) {
|
|
|
|
next if $now - $string2->{timestamp} > 60 * 60 * 2;
|
|
|
|
next if $allow_bot and $string2->{msg} =~ m/^(?:$bot_trigger|$botnick.?)/;
|
|
|
|
$string2->{msg} =~ s/^[^;,:]{1,20}[;,:]//; # remove nick-like prefix if one exists
|
|
|
|
next if length $string2->{msg} <= 5; # allow really short messages since "yep" "ok" etc are so common
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
if (exists $self->{offenses}->{$account} and exists $self->{offenses}->{$account}->{$channel}) {
|
|
|
|
next if $self->{offenses}->{$account}->{$channel}->{last_offense} >= $string2->{timestamp};
|
|
|
|
}
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
my $string = lcss(lc $string1->{msg}, lc $string2->{msg});
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
if (defined $string) {
|
|
|
|
my $length = length $string;
|
|
|
|
my $length1 = $length / length $string1->{msg};
|
|
|
|
my $length2 = $length / length $string2->{msg};
|
2016-01-30 04:56:29 +01:00
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
if ($length1 >= $match && $length2 >= $match) { $matches{$string}++; }
|
|
|
|
}
|
2016-01-30 04:56:29 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
my $threshold = $self->{pbot}->{registry}->get_value($channel, 'antirepeat_threshold') // $self->{pbot}->{registry}->get_value('antiflood', 'antirepeat_threshold');
|
|
|
|
|
|
|
|
foreach my $match (keys %matches) {
|
|
|
|
if (sqrt $matches{$match} > $threshold) {
|
2020-03-08 03:31:55 +01:00
|
|
|
$self->{offenses}->{$account}->{$channel}->{last_offense} = gettimeofday;
|
2020-02-15 23:38:32 +01:00
|
|
|
$self->{offenses}->{$account}->{$channel}->{offenses}++;
|
|
|
|
|
2020-03-08 03:31:55 +01:00
|
|
|
$self->{pbot}->{timer}->enqueue_event(sub {
|
|
|
|
my ($event) = @_;
|
|
|
|
$self->{offenses}->{$account}->{$channel}->{offenses}--;
|
|
|
|
|
|
|
|
if ($self->{offenses}->{$account}->{$channel}->{offenses} <= 0) {
|
|
|
|
$event->{repeating} = 0;
|
|
|
|
delete $self->{offenses}->{$account}->{$channel};
|
|
|
|
if (keys %{$self->{offenses}->{$account}} == 0) { delete $self->{offenses}->{$account}; }
|
|
|
|
}
|
|
|
|
|
2020-03-08 03:33:33 +01:00
|
|
|
}, 60 * 60 * 2, "antirepeat offense-- $account $channel", 1
|
2020-03-08 03:31:55 +01:00
|
|
|
);
|
|
|
|
|
2020-02-15 23:38:32 +01:00
|
|
|
$self->{pbot}->{logger}->log("$nick!$user\@$host triggered anti-repeat; offense $self->{offenses}->{$account}->{$channel}->{offenses}\n");
|
|
|
|
|
|
|
|
given ($self->{offenses}->{$account}->{$channel}->{offenses}) {
|
|
|
|
when (1) {
|
|
|
|
$self->{pbot}->{chanops}->add_op_command($channel, "kick $channel $nick Stop repeating yourself");
|
|
|
|
$self->{pbot}->{chanops}->gain_ops($channel);
|
|
|
|
}
|
2020-04-29 06:33:49 +02:00
|
|
|
when (2) { $self->{pbot}->{banlist}->ban_user_timed($channel, 'b', "*!*\@$host", 30, $botnick, 'repeating messages'); }
|
|
|
|
when (3) { $self->{pbot}->{banlist}->ban_user_timed($channel, 'b', "*!*\@$host", 60 * 5, $botnick, 'repeating messages'); }
|
|
|
|
default { $self->{pbot}->{banlist}->ban_user_timed($channel, 'b', "*!*\@$host", 60 * 60, $botnick, 'repeating messages'); }
|
2020-02-15 23:38:32 +01:00
|
|
|
}
|
|
|
|
return 0;
|
2016-01-30 04:56:29 +01:00
|
|
|
}
|
|
|
|
}
|
2020-02-15 23:38:32 +01:00
|
|
|
return 0;
|
2016-01-30 04:56:29 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
1;
|