Du kannst nicht mehr als 25 Themen auswählen Themen müssen mit entweder einem Buchstaben oder einer Ziffer beginnen. Sie können Bindestriche („-“) enthalten und bis zu 35 Zeichen lang sein.

server.go 48KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678
  1. // Copyright (c) 2012-2014 Jeremy Latt
  2. // Copyright (c) 2014-2015 Edmund Huber
  3. // Copyright (c) 2016- Daniel Oaks <daniel@danieloaks.net>
  4. // released under the MIT license
  5. package irc
  6. import (
  7. "bufio"
  8. "crypto/tls"
  9. "encoding/base64"
  10. "errors"
  11. "fmt"
  12. "log"
  13. "net"
  14. "net/http"
  15. "os"
  16. "os/signal"
  17. "strconv"
  18. "strings"
  19. "sync"
  20. "syscall"
  21. "time"
  22. "github.com/DanielOaks/girc-go/ircmsg"
  23. "github.com/tidwall/buntdb"
  24. )
  25. var (
  26. // cached because this may be used lots
  27. tooManyClientsMsg = ircmsg.MakeMessage(nil, "", "ERROR", "Too many clients from your network")
  28. tooManyClientsBytes, _ = tooManyClientsMsg.Line()
  29. bannedFromServerMsg = ircmsg.MakeMessage(nil, "", "ERROR", "You are banned from this server (%s)")
  30. bannedFromServerBytes, _ = bannedFromServerMsg.Line()
  31. errDbOutOfDate = errors.New("Database schema is old.")
  32. )
  33. // Limits holds the maximum limits for various things such as topic lengths
  34. type Limits struct {
  35. AwayLen int
  36. ChannelLen int
  37. KickLen int
  38. MonitorEntries int
  39. NickLen int
  40. TopicLen int
  41. ChanListModes int
  42. }
  43. // ListenerInterface represents an interface for a listener.
  44. type ListenerInterface struct {
  45. Listener net.Listener
  46. Events chan ListenerEvent
  47. }
  48. const (
  49. // DestroyListener instructs the listener to destroy itself.
  50. DestroyListener ListenerEventType = iota
  51. // UpdateListener instructs the listener to update itself (grab new certs, etc).
  52. UpdateListener = iota
  53. )
  54. // ListenerEventType is the type of event this is.
  55. type ListenerEventType int
  56. // ListenerEvent is an event that's passed to the listener.
  57. type ListenerEvent struct {
  58. Type ListenerEventType
  59. NewConfig *tls.Config
  60. }
  61. // Server is the main Oragono server.
  62. type Server struct {
  63. accountRegistration *AccountRegistration
  64. accounts map[string]*ClientAccount
  65. authenticationEnabled bool
  66. channels ChannelNameMap
  67. checkIdent bool
  68. clients *ClientLookupSet
  69. commands chan Command
  70. configFilename string
  71. connectionThrottle *ConnectionThrottle
  72. connectionThrottleMutex sync.Mutex // used when affecting the connection limiter, to make sure rehashing doesn't make things go out-of-whack
  73. connectionLimits *ConnectionLimits
  74. connectionLimitsMutex sync.Mutex // used when affecting the connection limiter, to make sure rehashing doesn't make things go out-of-whack
  75. ctime time.Time
  76. currentOpers map[*Client]bool
  77. dlines *DLineManager
  78. idle chan *Client
  79. isupport *ISupportList
  80. klines *KLineManager
  81. limits Limits
  82. listenerEventActMutex sync.Mutex
  83. listeners map[string]ListenerInterface
  84. listenerUpdateMutex sync.Mutex
  85. monitoring map[string][]Client
  86. motdLines []string
  87. name string
  88. nameCasefolded string
  89. networkName string
  90. newConns chan clientConn
  91. operators map[string]Oper
  92. operclasses map[string]OperClass
  93. password []byte
  94. passwords *PasswordManager
  95. rehashMutex sync.Mutex
  96. rehashSignal chan os.Signal
  97. restAPI *RestAPIConfig
  98. signals chan os.Signal
  99. store *buntdb.DB
  100. whoWas *WhoWasList
  101. }
  102. var (
  103. // ServerExitSignals are the signals the server will exit on.
  104. ServerExitSignals = []os.Signal{
  105. syscall.SIGINT,
  106. syscall.SIGTERM,
  107. syscall.SIGQUIT,
  108. }
  109. )
  110. type clientConn struct {
  111. Conn net.Conn
  112. IsTLS bool
  113. }
  114. // NewServer returns a new Oragono server.
  115. func NewServer(configFilename string, config *Config) *Server {
  116. casefoldedName, err := Casefold(config.Server.Name)
  117. if err != nil {
  118. log.Println(fmt.Sprintf("Server name isn't valid: [%s]", config.Server.Name), err.Error())
  119. return nil
  120. }
  121. // startup check that we have HELP entries for every command
  122. for name := range Commands {
  123. _, exists := Help[strings.ToLower(name)]
  124. if !exists {
  125. log.Fatal("Help entry does not exist for ", name)
  126. }
  127. }
  128. if config.AuthenticationEnabled {
  129. SupportedCapabilities[SASL] = true
  130. }
  131. operClasses, err := config.OperatorClasses()
  132. if err != nil {
  133. log.Fatal("Error loading oper classes:", err.Error())
  134. }
  135. opers, err := config.Operators(operClasses)
  136. if err != nil {
  137. log.Fatal("Error loading operators:", err.Error())
  138. }
  139. connectionLimits, err := NewConnectionLimits(config.Server.ConnectionLimits)
  140. if err != nil {
  141. log.Fatal("Error loading connection limits:", err.Error())
  142. }
  143. connectionThrottle, err := NewConnectionThrottle(config.Server.ConnectionThrottle)
  144. if err != nil {
  145. log.Fatal("Error loading connection throttler:", err.Error())
  146. }
  147. server := &Server{
  148. accounts: make(map[string]*ClientAccount),
  149. authenticationEnabled: config.AuthenticationEnabled,
  150. channels: make(ChannelNameMap),
  151. clients: NewClientLookupSet(),
  152. commands: make(chan Command),
  153. configFilename: configFilename,
  154. connectionLimits: connectionLimits,
  155. connectionThrottle: connectionThrottle,
  156. ctime: time.Now(),
  157. currentOpers: make(map[*Client]bool),
  158. idle: make(chan *Client),
  159. limits: Limits{
  160. AwayLen: int(config.Limits.AwayLen),
  161. ChannelLen: int(config.Limits.ChannelLen),
  162. KickLen: int(config.Limits.KickLen),
  163. MonitorEntries: int(config.Limits.MonitorEntries),
  164. NickLen: int(config.Limits.NickLen),
  165. TopicLen: int(config.Limits.TopicLen),
  166. ChanListModes: int(config.Limits.ChanListModes),
  167. },
  168. listeners: make(map[string]ListenerInterface),
  169. monitoring: make(map[string][]Client),
  170. name: config.Server.Name,
  171. nameCasefolded: casefoldedName,
  172. networkName: config.Network.Name,
  173. newConns: make(chan clientConn),
  174. operclasses: *operClasses,
  175. operators: opers,
  176. signals: make(chan os.Signal, len(ServerExitSignals)),
  177. rehashSignal: make(chan os.Signal, 1),
  178. restAPI: &config.Server.RestAPI,
  179. whoWas: NewWhoWasList(config.Limits.WhowasEntries),
  180. checkIdent: config.Server.CheckIdent,
  181. }
  182. // open data store
  183. db, err := buntdb.Open(config.Datastore.Path)
  184. if err != nil {
  185. log.Fatal(fmt.Sprintf("Failed to open datastore: %s", err.Error()))
  186. }
  187. server.store = db
  188. // check db version
  189. err = server.store.View(func(tx *buntdb.Tx) error {
  190. version, _ := tx.Get(keySchemaVersion)
  191. if version != latestDbSchema {
  192. log.Println(fmt.Sprintf("Database must be updated. Expected schema v%s, got v%s.", latestDbSchema, version))
  193. return errDbOutOfDate
  194. }
  195. return nil
  196. })
  197. if err != nil {
  198. // close the db
  199. db.Close()
  200. return nil
  201. }
  202. // load *lines
  203. server.loadDLines()
  204. server.loadKLines()
  205. // load password manager
  206. err = server.store.View(func(tx *buntdb.Tx) error {
  207. saltString, err := tx.Get(keySalt)
  208. if err != nil {
  209. return fmt.Errorf("Could not retrieve salt string: %s", err.Error())
  210. }
  211. salt, err := base64.StdEncoding.DecodeString(saltString)
  212. if err != nil {
  213. return err
  214. }
  215. pwm := NewPasswordManager(salt)
  216. server.passwords = &pwm
  217. return nil
  218. })
  219. if err != nil {
  220. log.Fatal(fmt.Sprintf("Could not load salt: %s", err.Error()))
  221. }
  222. if config.Server.MOTD != "" {
  223. file, err := os.Open(config.Server.MOTD)
  224. if err == nil {
  225. defer file.Close()
  226. reader := bufio.NewReader(file)
  227. for {
  228. line, err := reader.ReadString('\n')
  229. if err != nil {
  230. break
  231. }
  232. line = strings.TrimRight(line, "\r\n")
  233. // "- " is the required prefix for MOTD, we just add it here to make
  234. // bursting it out to clients easier
  235. line = fmt.Sprintf("- %s", line)
  236. server.motdLines = append(server.motdLines, line)
  237. }
  238. }
  239. }
  240. if config.Server.Password != "" {
  241. server.password = config.Server.PasswordBytes()
  242. }
  243. for _, addr := range config.Server.Listen {
  244. server.createListener(addr, config.TLSListeners())
  245. }
  246. if config.Server.Wslisten != "" {
  247. server.wslisten(config.Server.Wslisten, config.Server.TLSListeners)
  248. }
  249. // registration
  250. accountReg := NewAccountRegistration(config.Registration.Accounts)
  251. server.accountRegistration = &accountReg
  252. // Attempt to clean up when receiving these signals.
  253. signal.Notify(server.signals, ServerExitSignals...)
  254. signal.Notify(server.rehashSignal, syscall.SIGHUP)
  255. server.setISupport()
  256. // start API if enabled
  257. if server.restAPI.Enabled {
  258. Log.info.Printf("%s rest API started on %s .", server.name, server.restAPI.Listen)
  259. server.startRestAPI()
  260. }
  261. return server
  262. }
  263. // setISupport sets up our RPL_ISUPPORT reply.
  264. func (server *Server) setISupport() {
  265. maxTargetsString := strconv.Itoa(maxTargets)
  266. // add RPL_ISUPPORT tokens
  267. server.isupport = NewISupportList()
  268. server.isupport.Add("AWAYLEN", strconv.Itoa(server.limits.AwayLen))
  269. server.isupport.Add("CASEMAPPING", casemappingName)
  270. server.isupport.Add("CHANMODES", strings.Join([]string{ChannelModes{BanMask, ExceptMask, InviteMask}.String(), "", ChannelModes{UserLimit, Key}.String(), ChannelModes{InviteOnly, Moderated, NoOutside, OpOnlyTopic, ChanRoleplaying, Secret}.String()}, ","))
  271. server.isupport.Add("CHANNELLEN", strconv.Itoa(server.limits.ChannelLen))
  272. server.isupport.Add("CHANTYPES", "#")
  273. server.isupport.Add("EXCEPTS", "")
  274. server.isupport.Add("INVEX", "")
  275. server.isupport.Add("KICKLEN", strconv.Itoa(server.limits.KickLen))
  276. server.isupport.Add("MAXLIST", fmt.Sprintf("beI:%s", strconv.Itoa(server.limits.ChanListModes)))
  277. server.isupport.Add("MAXTARGETS", maxTargetsString)
  278. server.isupport.Add("MODES", "")
  279. server.isupport.Add("MONITOR", strconv.Itoa(server.limits.MonitorEntries))
  280. server.isupport.Add("NETWORK", server.networkName)
  281. server.isupport.Add("NICKLEN", strconv.Itoa(server.limits.NickLen))
  282. server.isupport.Add("PREFIX", "(qaohv)~&@%+")
  283. server.isupport.Add("RPCHAN", "E")
  284. server.isupport.Add("RPUSER", "E")
  285. server.isupport.Add("STATUSMSG", "~&@%+")
  286. server.isupport.Add("TARGMAX", fmt.Sprintf("NAMES:1,LIST:1,KICK:1,WHOIS:1,PRIVMSG:%s,NOTICE:%s,MONITOR:", maxTargetsString, maxTargetsString))
  287. server.isupport.Add("TOPICLEN", strconv.Itoa(server.limits.TopicLen))
  288. // account registration
  289. if server.accountRegistration.Enabled {
  290. // 'none' isn't shown in the REGCALLBACKS vars
  291. var enabledCallbacks []string
  292. for _, name := range server.accountRegistration.EnabledCallbacks {
  293. if name != "*" {
  294. enabledCallbacks = append(enabledCallbacks, name)
  295. }
  296. }
  297. server.isupport.Add("REGCOMMANDS", "CREATE,VERIFY")
  298. server.isupport.Add("REGCALLBACKS", strings.Join(enabledCallbacks, ","))
  299. server.isupport.Add("REGCREDTYPES", "passphrase,certfp")
  300. }
  301. server.isupport.RegenerateCachedReply()
  302. }
  303. func loadChannelList(channel *Channel, list string, maskMode ChannelMode) {
  304. if list == "" {
  305. return
  306. }
  307. channel.lists[maskMode].AddAll(strings.Split(list, " "))
  308. }
  309. func (server *Server) Shutdown() {
  310. //TODO(dan): Make sure we disallow new nicks
  311. server.clients.ByNickMutex.RLock()
  312. for _, client := range server.clients.ByNick {
  313. client.Notice("Server is shutting down")
  314. }
  315. server.clients.ByNickMutex.RUnlock()
  316. if err := server.store.Close(); err != nil {
  317. Log.error.Println("Server.Shutdown store.Close: error:", err)
  318. }
  319. }
  320. // Run starts the server.
  321. func (server *Server) Run() {
  322. // defer closing db/store
  323. defer server.store.Close()
  324. done := false
  325. for !done {
  326. select {
  327. case <-server.signals:
  328. server.Shutdown()
  329. done = true
  330. case <-server.rehashSignal:
  331. // eventually we expect to use HUP to reload config
  332. err := server.rehash()
  333. if err != nil {
  334. Log.error.Println("Failed to rehash:", err.Error())
  335. }
  336. case conn := <-server.newConns:
  337. // check connection limits
  338. ipaddr := net.ParseIP(IPString(conn.Conn.RemoteAddr()))
  339. if ipaddr != nil {
  340. // check DLINEs
  341. isBanned, info := server.dlines.CheckIP(ipaddr)
  342. if isBanned {
  343. banMessage := fmt.Sprintf(bannedFromServerBytes, info.Reason)
  344. if info.Time != nil {
  345. banMessage += fmt.Sprintf(" [%s]", info.Time.Duration.String())
  346. }
  347. conn.Conn.Write([]byte(banMessage))
  348. conn.Conn.Close()
  349. continue
  350. }
  351. // check connection limits
  352. server.connectionLimitsMutex.Lock()
  353. err := server.connectionLimits.AddClient(ipaddr, false)
  354. server.connectionLimitsMutex.Unlock()
  355. if err != nil {
  356. // too many connections from one client, tell the client and close the connection
  357. // this might not show up properly on some clients, but our objective here is just to close it out before it has a load impact on us
  358. conn.Conn.Write([]byte(tooManyClientsBytes))
  359. conn.Conn.Close()
  360. continue
  361. }
  362. // check connection throttle
  363. server.connectionThrottleMutex.Lock()
  364. err = server.connectionThrottle.AddClient(ipaddr)
  365. server.connectionThrottleMutex.Unlock()
  366. if err != nil {
  367. // too many connections too quickly from client, tell them and close the connection
  368. length := &IPRestrictTime{
  369. Duration: server.connectionThrottle.BanDuration,
  370. Expires: time.Now().Add(server.connectionThrottle.BanDuration),
  371. }
  372. server.dlines.AddIP(ipaddr, length, server.connectionThrottle.BanMessage, "Exceeded automated connection throttle")
  373. // reset ban on connectionThrottle
  374. server.connectionThrottle.ResetFor(ipaddr)
  375. // this might not show up properly on some clients, but our objective here is just to close it out before it has a load impact on us
  376. conn.Conn.Write([]byte(server.connectionThrottle.BanMessageBytes))
  377. conn.Conn.Close()
  378. continue
  379. }
  380. go NewClient(server, conn.Conn, conn.IsTLS)
  381. continue
  382. }
  383. case client := <-server.idle:
  384. client.Idle()
  385. }
  386. }
  387. }
  388. //
  389. // IRC protocol listeners
  390. //
  391. // createListener starts the given listeners.
  392. func (server *Server) createListener(addr string, tlsMap map[string]*tls.Config) {
  393. config, listenTLS := tlsMap[addr]
  394. _, alreadyExists := server.listeners[addr]
  395. if alreadyExists {
  396. log.Fatal(server, "listener already exists:", addr)
  397. }
  398. // make listener event channel
  399. listenerEventChannel := make(chan ListenerEvent, 1)
  400. // make listener
  401. listener, err := net.Listen("tcp", addr)
  402. if err != nil {
  403. log.Fatal(server, "listen error: ", err)
  404. }
  405. tlsString := "plaintext"
  406. if listenTLS {
  407. config.ClientAuth = tls.RequestClientCert
  408. listener = tls.NewListener(listener, config)
  409. tlsString = "TLS"
  410. }
  411. // throw our details to the server so we can be modified/killed later
  412. li := ListenerInterface{
  413. Events: listenerEventChannel,
  414. Listener: listener,
  415. }
  416. server.listeners[addr] = li
  417. // start listening
  418. Log.info.Printf("%s listening on %s using %s.", server.name, addr, tlsString)
  419. // setup accept goroutine
  420. go func() {
  421. for {
  422. conn, err := listener.Accept()
  423. if err == nil {
  424. newConn := clientConn{
  425. Conn: conn,
  426. IsTLS: listenTLS,
  427. }
  428. server.newConns <- newConn
  429. }
  430. select {
  431. case event := <-server.listeners[addr].Events:
  432. // this is used to confirm that whoever passed us this event has closed the existing listener correctly (in an attempt to get us to notice the event).
  433. // this is required to keep REHASH from having a very small race possibility of killing the primary listener
  434. server.listenerEventActMutex.Lock()
  435. server.listenerEventActMutex.Unlock()
  436. if event.Type == DestroyListener {
  437. // listener should already be closed, this is just for safety
  438. listener.Close()
  439. return
  440. } else if event.Type == UpdateListener {
  441. // close old listener
  442. listener.Close()
  443. // make new listener
  444. listener, err = net.Listen("tcp", addr)
  445. if err != nil {
  446. log.Fatal(server, "listen error: ", err)
  447. }
  448. tlsString := "plaintext"
  449. if event.NewConfig != nil {
  450. config = event.NewConfig
  451. config.ClientAuth = tls.RequestClientCert
  452. listener = tls.NewListener(listener, config)
  453. tlsString = "TLS"
  454. }
  455. // update server ListenerInterface
  456. li.Listener = listener
  457. server.listenerUpdateMutex.Lock()
  458. server.listeners[addr] = li
  459. server.listenerUpdateMutex.Unlock()
  460. // print notice
  461. Log.info.Printf("%s updated listener %s using %s.", server.name, addr, tlsString)
  462. }
  463. default:
  464. // no events waiting for us, fall-through and continue
  465. }
  466. }
  467. }()
  468. }
  469. //
  470. // websocket listen goroutine
  471. //
  472. func (server *Server) wslisten(addr string, tlsMap map[string]*TLSListenConfig) {
  473. http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
  474. if r.Method != "GET" {
  475. Log.error.Printf("%s method not allowed", server.name)
  476. return
  477. }
  478. // We don't have any subprotocols, so if someone attempts to `new
  479. // WebSocket(server, "subprotocol")` they'll break here, instead of
  480. // getting the default, ambiguous, response from gorilla.
  481. if v, ok := r.Header["Sec-Websocket-Protocol"]; ok {
  482. http.Error(w, fmt.Sprintf("WebSocket subprocotols (e.g. %s) not supported", v), 400)
  483. }
  484. ws, err := upgrader.Upgrade(w, r, nil)
  485. if err != nil {
  486. Log.error.Printf("%s websocket upgrade error: %s", server.name, err)
  487. return
  488. }
  489. newConn := clientConn{
  490. Conn: WSContainer{ws},
  491. IsTLS: false, //TODO(dan): track TLS or not here properly
  492. }
  493. server.newConns <- newConn
  494. })
  495. go func() {
  496. config, listenTLS := tlsMap[addr]
  497. tlsString := "plaintext"
  498. var err error
  499. if listenTLS {
  500. tlsString = "TLS"
  501. }
  502. Log.info.Printf("%s websocket listening on %s using %s.", server.name, addr, tlsString)
  503. if listenTLS {
  504. err = http.ListenAndServeTLS(addr, config.Cert, config.Key, nil)
  505. } else {
  506. err = http.ListenAndServe(addr, nil)
  507. }
  508. if err != nil {
  509. Log.error.Printf("%s listenAndServe (%s) error: %s", server.name, tlsString, err)
  510. }
  511. }()
  512. }
  513. //
  514. // server functionality
  515. //
  516. func (server *Server) tryRegister(c *Client) {
  517. if c.registered || !c.HasNick() || !c.HasUsername() ||
  518. (c.capState == CapNegotiating) {
  519. return
  520. }
  521. // check KLINEs
  522. isBanned, info := server.klines.CheckMasks(c.AllNickmasks()...)
  523. if isBanned {
  524. reason := info.Reason
  525. if info.Time != nil {
  526. reason += fmt.Sprintf(" [%s]", info.Time.Duration.String())
  527. }
  528. c.Send(nil, "", "ERROR", fmt.Sprintf("You are banned from this server (%s)", reason))
  529. c.quitMessageSent = true
  530. c.destroy()
  531. return
  532. }
  533. // continue registration
  534. c.Register()
  535. // send welcome text
  536. //NOTE(dan): we specifically use the NICK here instead of the nickmask
  537. // see http://modern.ircdocs.horse/#rplwelcome-001 for details on why we avoid using the nickmask
  538. c.Send(nil, server.name, RPL_WELCOME, c.nick, fmt.Sprintf("Welcome to the Internet Relay Network %s", c.nick))
  539. c.Send(nil, server.name, RPL_YOURHOST, c.nick, fmt.Sprintf("Your host is %s, running version %s", server.name, Ver))
  540. c.Send(nil, server.name, RPL_CREATED, c.nick, fmt.Sprintf("This server was created %s", server.ctime.Format(time.RFC1123)))
  541. //TODO(dan): Look at adding last optional [<channel modes with a parameter>] parameter
  542. c.Send(nil, server.name, RPL_MYINFO, c.nick, server.name, Ver, supportedUserModesString, supportedChannelModesString)
  543. c.RplISupport()
  544. server.MOTD(c)
  545. c.Send(nil, c.nickMaskString, RPL_UMODEIS, c.nick, c.ModeString())
  546. }
  547. func (server *Server) MOTD(client *Client) {
  548. if len(server.motdLines) < 1 {
  549. client.Send(nil, server.name, ERR_NOMOTD, client.nick, "MOTD File is missing")
  550. return
  551. }
  552. client.Send(nil, server.name, RPL_MOTDSTART, client.nick, fmt.Sprintf("- %s Message of the day - ", server.name))
  553. for _, line := range server.motdLines {
  554. client.Send(nil, server.name, RPL_MOTD, client.nick, line)
  555. }
  556. client.Send(nil, server.name, RPL_ENDOFMOTD, client.nick, "End of MOTD command")
  557. }
  558. func (server *Server) Id() string {
  559. return server.name
  560. }
  561. func (server *Server) Nick() string {
  562. return server.Id()
  563. }
  564. //
  565. // registration commands
  566. //
  567. // PASS <password>
  568. func passHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  569. if client.registered {
  570. client.Send(nil, server.name, ERR_ALREADYREGISTRED, client.nick, "You may not reregister")
  571. return false
  572. }
  573. // if no password exists, skip checking
  574. if len(server.password) == 0 {
  575. client.authorized = true
  576. return false
  577. }
  578. // check the provided password
  579. password := []byte(msg.Params[0])
  580. if ComparePassword(server.password, password) != nil {
  581. client.Send(nil, server.name, ERR_PASSWDMISMATCH, client.nick, "Password incorrect")
  582. client.Send(nil, server.name, "ERROR", "Password incorrect")
  583. return true
  584. }
  585. client.authorized = true
  586. return false
  587. }
  588. // USER <username> * 0 <realname>
  589. func userHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  590. if client.registered {
  591. client.Send(nil, server.name, ERR_ALREADYREGISTRED, client.nick, "You may not reregister")
  592. return false
  593. }
  594. if !client.authorized {
  595. client.Quit("Bad password")
  596. return true
  597. }
  598. if client.username != "" && client.realname != "" {
  599. return false
  600. }
  601. // confirm that username is valid
  602. //
  603. _, err := CasefoldName(msg.Params[0])
  604. if err != nil {
  605. client.Send(nil, "", "ERROR", "Malformed username")
  606. return true
  607. }
  608. if !client.HasUsername() {
  609. client.username = "~" + msg.Params[0]
  610. // don't bother updating nickmask here, it's not valid anyway
  611. }
  612. if client.realname == "" {
  613. client.realname = msg.Params[3]
  614. }
  615. server.tryRegister(client)
  616. return false
  617. }
  618. // QUIT [<reason>]
  619. func quitHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  620. reason := "Quit"
  621. if len(msg.Params) > 0 {
  622. reason += ": " + msg.Params[0]
  623. }
  624. client.Quit(reason)
  625. return true
  626. }
  627. //
  628. // normal commands
  629. //
  630. // PING <server1> [<server2>]
  631. func pingHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  632. client.Send(nil, server.name, "PONG", msg.Params...)
  633. return false
  634. }
  635. // PONG <server> [ <server2> ]
  636. func pongHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  637. // client gets touched when they send this command, so we don't need to do anything
  638. return false
  639. }
  640. // JOIN <channel>{,<channel>} [<key>{,<key>}]
  641. // JOIN 0
  642. func joinHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  643. // handle JOIN 0
  644. if msg.Params[0] == "0" {
  645. for channel := range client.channels {
  646. channel.Part(client, client.nickCasefolded)
  647. }
  648. return false
  649. }
  650. // handle regular JOINs
  651. channels := strings.Split(msg.Params[0], ",")
  652. var keys []string
  653. if len(msg.Params) > 1 {
  654. keys = strings.Split(msg.Params[1], ",")
  655. }
  656. for i, name := range channels {
  657. casefoldedName, err := CasefoldChannel(name)
  658. if err != nil {
  659. if len(name) > 0 {
  660. client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, name, "No such channel")
  661. }
  662. continue
  663. }
  664. channel := server.channels.Get(casefoldedName)
  665. if channel == nil {
  666. if len(casefoldedName) > server.limits.ChannelLen {
  667. client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, name, "No such channel")
  668. continue
  669. }
  670. channel = NewChannel(server, name, true)
  671. }
  672. var key string
  673. if len(keys) > i {
  674. key = keys[i]
  675. }
  676. channel.Join(client, key)
  677. }
  678. return false
  679. }
  680. // PART <channel>{,<channel>} [<reason>]
  681. func partHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  682. channels := strings.Split(msg.Params[0], ",")
  683. var reason string //TODO(dan): if this isn't supplied here, make sure the param doesn't exist in the PART message sent to other users
  684. if len(msg.Params) > 1 {
  685. reason = msg.Params[1]
  686. }
  687. for _, chname := range channels {
  688. casefoldedChannelName, err := CasefoldChannel(chname)
  689. channel := server.channels.Get(casefoldedChannelName)
  690. if err != nil || channel == nil {
  691. if len(chname) > 0 {
  692. client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, "No such channel")
  693. }
  694. continue
  695. }
  696. channel.Part(client, reason)
  697. }
  698. return false
  699. }
  700. // TOPIC <channel> [<topic>]
  701. func topicHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  702. name, err := CasefoldChannel(msg.Params[0])
  703. channel := server.channels.Get(name)
  704. if err != nil || channel == nil {
  705. if len(msg.Params[0]) > 0 {
  706. client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, msg.Params[0], "No such channel")
  707. }
  708. return false
  709. }
  710. if len(msg.Params) > 1 {
  711. channel.SetTopic(client, msg.Params[1])
  712. } else {
  713. channel.GetTopic(client)
  714. }
  715. return false
  716. }
  717. // PRIVMSG <target>{,<target>} <message>
  718. func privmsgHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  719. clientOnlyTags := GetClientOnlyTags(msg.Tags)
  720. targets := strings.Split(msg.Params[0], ",")
  721. message := msg.Params[1]
  722. for i, targetString := range targets {
  723. // max of four targets per privmsg
  724. if i > maxTargets-1 {
  725. break
  726. }
  727. prefixes, targetString := SplitChannelMembershipPrefixes(targetString)
  728. lowestPrefix := GetLowestChannelModePrefix(prefixes)
  729. // eh, no need to notify them
  730. if len(targetString) < 1 {
  731. continue
  732. }
  733. target, err := CasefoldChannel(targetString)
  734. if err == nil {
  735. channel := server.channels.Get(target)
  736. if channel == nil {
  737. client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, targetString, "No such channel")
  738. continue
  739. }
  740. channel.PrivMsg(lowestPrefix, clientOnlyTags, client, message)
  741. } else {
  742. target, err = CasefoldName(targetString)
  743. user := server.clients.Get(target)
  744. if err != nil || user == nil {
  745. if len(target) > 0 {
  746. client.Send(nil, server.name, ERR_NOSUCHNICK, target, "No such nick")
  747. }
  748. continue
  749. }
  750. if !user.capabilities[MessageTags] {
  751. clientOnlyTags = nil
  752. }
  753. user.SendFromClient(client, clientOnlyTags, client.nickMaskString, "PRIVMSG", user.nick, message)
  754. if client.capabilities[EchoMessage] {
  755. client.SendFromClient(client, clientOnlyTags, client.nickMaskString, "PRIVMSG", user.nick, message)
  756. }
  757. if user.flags[Away] {
  758. //TODO(dan): possibly implement cooldown of away notifications to users
  759. client.Send(nil, server.name, RPL_AWAY, user.nick, user.awayMessage)
  760. }
  761. }
  762. }
  763. return false
  764. }
  765. func (client *Client) WhoisChannelsNames(target *Client) []string {
  766. isMultiPrefix := target.capabilities[MultiPrefix]
  767. var chstrs []string
  768. index := 0
  769. for channel := range client.channels {
  770. channel.membersMutex.RLock()
  771. defer channel.membersMutex.RUnlock()
  772. // channel is secret and the target can't see it
  773. if !target.flags[Operator] && channel.flags[Secret] && !channel.members.Has(target) {
  774. continue
  775. }
  776. chstrs = append(chstrs, channel.members[client].Prefixes(isMultiPrefix)+channel.name)
  777. index++
  778. }
  779. return chstrs
  780. }
  781. // WHOIS [ <target> ] <mask> *( "," <mask> )
  782. func whoisHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  783. var masksString string
  784. //var target string
  785. if len(msg.Params) > 1 {
  786. //target = msg.Params[0]
  787. masksString = msg.Params[1]
  788. } else {
  789. masksString = msg.Params[0]
  790. }
  791. if len(strings.TrimSpace(masksString)) < 1 {
  792. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, msg.Command, "No masks given")
  793. return false
  794. }
  795. if client.flags[Operator] {
  796. masks := strings.Split(masksString, ",")
  797. for _, mask := range masks {
  798. casefoldedMask, err := Casefold(mask)
  799. if err != nil {
  800. client.Send(nil, client.server.name, ERR_NOSUCHNICK, mask, "No such nick")
  801. continue
  802. }
  803. matches := server.clients.FindAll(casefoldedMask)
  804. if len(matches) == 0 {
  805. client.Send(nil, client.server.name, ERR_NOSUCHNICK, mask, "No such nick")
  806. continue
  807. }
  808. for mclient := range matches {
  809. client.getWhoisOf(mclient)
  810. }
  811. }
  812. } else {
  813. // only get the first request
  814. casefoldedMask, err := Casefold(strings.Split(masksString, ",")[0])
  815. mclient := server.clients.Get(casefoldedMask)
  816. if err != nil || mclient == nil {
  817. client.Send(nil, client.server.name, ERR_NOSUCHNICK, masksString, "No such nick")
  818. // fall through, ENDOFWHOIS is always sent
  819. } else {
  820. client.getWhoisOf(mclient)
  821. }
  822. }
  823. client.Send(nil, server.name, RPL_ENDOFWHOIS, client.nick, masksString, "End of /WHOIS list")
  824. return false
  825. }
  826. func (client *Client) getWhoisOf(target *Client) {
  827. client.Send(nil, client.server.name, RPL_WHOISUSER, client.nick, target.nick, target.username, target.hostname, "*", target.realname)
  828. whoischannels := client.WhoisChannelsNames(target)
  829. if whoischannels != nil {
  830. client.Send(nil, client.server.name, RPL_WHOISCHANNELS, client.nick, target.nick, strings.Join(whoischannels, " "))
  831. }
  832. if target.class != nil {
  833. client.Send(nil, client.server.name, RPL_WHOISOPERATOR, client.nick, target.nick, target.whoisLine)
  834. }
  835. if target.certfp != "" && (client.flags[Operator] || client == target) {
  836. client.Send(nil, client.server.name, RPL_WHOISCERTFP, client.nick, target.nick, fmt.Sprintf("has client certificate fingerprint %s", target.certfp))
  837. }
  838. client.Send(nil, client.server.name, RPL_WHOISIDLE, client.nick, target.nick, strconv.FormatUint(target.IdleSeconds(), 10), strconv.FormatInt(target.SignonTime(), 10), "seconds idle, signon time")
  839. }
  840. // <channel> <user> <host> <server> <nick> ( "H" / "G" ) ["*"] [ ( "@" / "+" ) ]
  841. // :<hopcount> <real name>
  842. func (target *Client) RplWhoReply(channel *Channel, client *Client) {
  843. channelName := "*"
  844. flags := ""
  845. if client.flags[Away] {
  846. flags = "G"
  847. } else {
  848. flags = "H"
  849. }
  850. if client.flags[Operator] {
  851. flags += "*"
  852. }
  853. if channel != nil {
  854. channel.membersMutex.RLock()
  855. defer channel.membersMutex.RUnlock()
  856. flags += channel.members[client].Prefixes(target.capabilities[MultiPrefix])
  857. channelName = channel.name
  858. }
  859. target.Send(nil, target.server.name, RPL_WHOREPLY, target.nick, channelName, client.username, client.hostname, client.server.name, client.nick, flags, strconv.Itoa(client.hops)+" "+client.realname)
  860. }
  861. func whoChannel(client *Client, channel *Channel, friends ClientSet) {
  862. channel.membersMutex.RLock()
  863. defer channel.membersMutex.RUnlock()
  864. for member := range channel.members {
  865. if !client.flags[Invisible] || friends[client] {
  866. client.RplWhoReply(channel, member)
  867. }
  868. }
  869. }
  870. // WHO [ <mask> [ "o" ] ]
  871. func whoHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  872. friends := client.Friends()
  873. var mask string
  874. if len(msg.Params) > 0 {
  875. casefoldedMask, err := Casefold(msg.Params[0])
  876. if err != nil {
  877. client.Send(nil, server.name, ERR_UNKNOWNERROR, "WHO", "Mask isn't valid")
  878. return false
  879. }
  880. mask = casefoldedMask
  881. }
  882. //TODO(dan): is this used and would I put this param in the Modern doc?
  883. // if not, can we remove it?
  884. //var operatorOnly bool
  885. //if len(msg.Params) > 1 && msg.Params[1] == "o" {
  886. // operatorOnly = true
  887. //}
  888. if mask == "" {
  889. for _, channel := range server.channels {
  890. whoChannel(client, channel, friends)
  891. }
  892. } else if mask[0] == '#' {
  893. // TODO implement wildcard matching
  894. //TODO(dan): ^ only for opers
  895. channel := server.channels.Get(mask)
  896. if channel != nil {
  897. whoChannel(client, channel, friends)
  898. }
  899. } else {
  900. for mclient := range server.clients.FindAll(mask) {
  901. client.RplWhoReply(nil, mclient)
  902. }
  903. }
  904. client.Send(nil, server.name, RPL_ENDOFWHO, client.nick, mask, "End of WHO list")
  905. return false
  906. }
  907. // OPER <name> <password>
  908. func operHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  909. name, err := CasefoldName(msg.Params[0])
  910. if err != nil {
  911. client.Send(nil, server.name, ERR_PASSWDMISMATCH, client.nick, "Password incorrect")
  912. return true
  913. }
  914. hash := server.operators[name].Pass
  915. password := []byte(msg.Params[1])
  916. err = ComparePassword(hash, password)
  917. if (hash == nil) || (err != nil) {
  918. client.Send(nil, server.name, ERR_PASSWDMISMATCH, client.nick, "Password incorrect")
  919. return true
  920. }
  921. client.flags[Operator] = true
  922. client.operName = name
  923. client.class = server.operators[name].Class
  924. server.currentOpers[client] = true
  925. client.whoisLine = server.operators[name].WhoisLine
  926. // push new vhost if one is set
  927. if len(server.operators[name].Vhost) > 0 {
  928. originalHost := client.nickMaskString
  929. client.vhost = server.operators[name].Vhost
  930. for fClient := range client.Friends(ChgHost) {
  931. fClient.SendFromClient(client, nil, originalHost, "CHGHOST", client.username, client.vhost)
  932. }
  933. client.updateNickMask()
  934. }
  935. client.Send(nil, server.name, RPL_YOUREOPER, client.nick, "You are now an IRC operator")
  936. //TODO(dan): Should this be sent automagically as part of setting the flag/mode?
  937. modech := ModeChanges{&ModeChange{
  938. mode: Operator,
  939. op: Add,
  940. }}
  941. client.Send(nil, server.name, "MODE", client.nick, modech.String())
  942. return false
  943. }
  944. // rehash reloads the config and applies the changes from the config file.
  945. func (server *Server) rehash() error {
  946. // only let one REHASH go on at a time
  947. server.rehashMutex.Lock()
  948. config, err := LoadConfig(server.configFilename)
  949. if err != nil {
  950. return fmt.Errorf("Error rehashing config file config: %s", err.Error())
  951. }
  952. // confirm connectionLimits are fine
  953. connectionLimits, err := NewConnectionLimits(config.Server.ConnectionLimits)
  954. if err != nil {
  955. return fmt.Errorf("Error rehashing config file connection-limits: %s", err.Error())
  956. }
  957. // confirm connectionThrottler is fine
  958. connectionThrottle, err := NewConnectionThrottle(config.Server.ConnectionThrottle)
  959. if err != nil {
  960. return fmt.Errorf("Error rehashing config file connection-throttle: %s", err.Error())
  961. }
  962. // confirm operator stuff all exists and is fine
  963. operclasses, err := config.OperatorClasses()
  964. if err != nil {
  965. return fmt.Errorf("Error rehashing config file operclasses: %s", err.Error())
  966. }
  967. opers, err := config.Operators(operclasses)
  968. if err != nil {
  969. return fmt.Errorf("Error rehashing config file opers: %s", err.Error())
  970. }
  971. for client := range server.currentOpers {
  972. _, exists := opers[client.operName]
  973. if !exists {
  974. return fmt.Errorf("Oper [%s] no longer exists (used by client [%s])", client.operName, client.nickMaskString)
  975. }
  976. }
  977. // apply new connectionlimits
  978. server.connectionLimitsMutex.Lock()
  979. server.connectionLimits = connectionLimits
  980. server.connectionThrottleMutex.Lock()
  981. server.connectionThrottle = connectionThrottle
  982. server.clients.ByNickMutex.RLock()
  983. for _, client := range server.clients.ByNick {
  984. ipaddr := net.ParseIP(IPString(client.socket.conn.RemoteAddr()))
  985. if ipaddr != nil {
  986. server.connectionLimits.AddClient(ipaddr, true)
  987. }
  988. }
  989. server.clients.ByNickMutex.RUnlock()
  990. server.connectionLimitsMutex.Unlock()
  991. // setup new and removed caps
  992. addedCaps := make(CapabilitySet)
  993. removedCaps := make(CapabilitySet)
  994. // SASL
  995. if config.AuthenticationEnabled && !server.authenticationEnabled {
  996. // enabling SASL
  997. SupportedCapabilities[SASL] = true
  998. addedCaps[SASL] = true
  999. }
  1000. if !config.AuthenticationEnabled && server.authenticationEnabled {
  1001. // disabling SASL
  1002. SupportedCapabilities[SASL] = false
  1003. removedCaps[SASL] = true
  1004. }
  1005. server.authenticationEnabled = config.AuthenticationEnabled
  1006. // burst new and removed caps
  1007. var capBurstClients ClientSet
  1008. added := make(map[CapVersion]string)
  1009. var removed string
  1010. if len(addedCaps) > 0 || len(removedCaps) > 0 {
  1011. capBurstClients = server.clients.AllWithCaps(CapNotify)
  1012. added[Cap301] = addedCaps.String(Cap301)
  1013. added[Cap302] = addedCaps.String(Cap302)
  1014. // removed never has values
  1015. removed = removedCaps.String(Cap301)
  1016. }
  1017. for sClient := range capBurstClients {
  1018. if len(addedCaps) > 0 {
  1019. sClient.Send(nil, server.name, "CAP", sClient.nick, "NEW", added[sClient.capVersion])
  1020. }
  1021. if len(removedCaps) > 0 {
  1022. sClient.Send(nil, server.name, "CAP", sClient.nick, "DEL", removed)
  1023. }
  1024. }
  1025. // set server options
  1026. server.limits = Limits{
  1027. AwayLen: int(config.Limits.AwayLen),
  1028. ChannelLen: int(config.Limits.ChannelLen),
  1029. KickLen: int(config.Limits.KickLen),
  1030. MonitorEntries: int(config.Limits.MonitorEntries),
  1031. NickLen: int(config.Limits.NickLen),
  1032. TopicLen: int(config.Limits.TopicLen),
  1033. ChanListModes: int(config.Limits.ChanListModes),
  1034. }
  1035. server.operclasses = *operclasses
  1036. server.operators = opers
  1037. server.checkIdent = config.Server.CheckIdent
  1038. // registration
  1039. accountReg := NewAccountRegistration(config.Registration.Accounts)
  1040. server.accountRegistration = &accountReg
  1041. // set RPL_ISUPPORT
  1042. oldISupportList := server.isupport
  1043. server.setISupport()
  1044. newISupportReplies := oldISupportList.GetDifference(server.isupport)
  1045. // push new info to all of our clients
  1046. server.clients.ByNickMutex.RLock()
  1047. for _, sClient := range server.clients.ByNick {
  1048. for _, tokenline := range newISupportReplies {
  1049. // ugly trickery ahead
  1050. sClient.Send(nil, server.name, RPL_ISUPPORT, append([]string{sClient.nick}, tokenline...)...)
  1051. }
  1052. }
  1053. server.clients.ByNickMutex.RUnlock()
  1054. // destroy old listeners
  1055. tlsListeners := config.TLSListeners()
  1056. for addr := range server.listeners {
  1057. var exists bool
  1058. for _, newaddr := range config.Server.Listen {
  1059. if newaddr == addr {
  1060. exists = true
  1061. break
  1062. }
  1063. }
  1064. server.listenerEventActMutex.Lock()
  1065. if exists {
  1066. // update old listener
  1067. server.listeners[addr].Events <- ListenerEvent{
  1068. Type: UpdateListener,
  1069. NewConfig: tlsListeners[addr],
  1070. }
  1071. } else {
  1072. // destroy nonexistent listener
  1073. server.listeners[addr].Events <- ListenerEvent{
  1074. Type: DestroyListener,
  1075. }
  1076. }
  1077. // force listener to apply the event right away
  1078. server.listeners[addr].Listener.Close()
  1079. server.listenerEventActMutex.Unlock()
  1080. }
  1081. for _, newaddr := range config.Server.Listen {
  1082. _, exists := server.listeners[newaddr]
  1083. if !exists {
  1084. // make new listener
  1085. server.createListener(newaddr, tlsListeners)
  1086. }
  1087. }
  1088. server.rehashMutex.Unlock()
  1089. return nil
  1090. }
  1091. // REHASH
  1092. func rehashHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1093. err := server.rehash()
  1094. if err == nil {
  1095. client.Send(nil, server.name, RPL_REHASHING, client.nick, "ircd.yaml", "Rehashing")
  1096. } else {
  1097. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, "REHASH", err.Error())
  1098. }
  1099. return false
  1100. }
  1101. // AWAY [<message>]
  1102. func awayHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1103. var isAway bool
  1104. var text string
  1105. if len(msg.Params) > 0 {
  1106. isAway = true
  1107. text = msg.Params[0]
  1108. if len(text) > server.limits.AwayLen {
  1109. text = text[:server.limits.AwayLen]
  1110. }
  1111. }
  1112. if isAway {
  1113. client.flags[Away] = true
  1114. } else {
  1115. delete(client.flags, Away)
  1116. }
  1117. client.awayMessage = text
  1118. var op ModeOp
  1119. if client.flags[Away] {
  1120. op = Add
  1121. client.Send(nil, server.name, RPL_NOWAWAY, client.nick, "You have been marked as being away")
  1122. } else {
  1123. op = Remove
  1124. client.Send(nil, server.name, RPL_UNAWAY, client.nick, "You are no longer marked as being away")
  1125. }
  1126. //TODO(dan): Should this be sent automagically as part of setting the flag/mode?
  1127. modech := ModeChanges{&ModeChange{
  1128. mode: Away,
  1129. op: op,
  1130. }}
  1131. client.Send(nil, server.name, "MODE", client.nick, client.nick, modech.String())
  1132. // dispatch away-notify
  1133. for friend := range client.Friends(AwayNotify) {
  1134. if client.flags[Away] {
  1135. friend.SendFromClient(client, nil, client.nickMaskString, "AWAY", client.awayMessage)
  1136. } else {
  1137. friend.SendFromClient(client, nil, client.nickMaskString, "AWAY")
  1138. }
  1139. }
  1140. return false
  1141. }
  1142. // ISON <nick>{ <nick>}
  1143. func isonHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1144. var nicks = msg.Params
  1145. var err error
  1146. var casefoldedNick string
  1147. ison := make([]string, 0)
  1148. for _, nick := range nicks {
  1149. casefoldedNick, err = CasefoldName(nick)
  1150. if err != nil {
  1151. continue
  1152. }
  1153. if iclient := server.clients.Get(casefoldedNick); iclient != nil {
  1154. ison = append(ison, iclient.nick)
  1155. }
  1156. }
  1157. client.Send(nil, server.name, RPL_ISON, client.nick, strings.Join(nicks, " "))
  1158. return false
  1159. }
  1160. // MOTD [<target>]
  1161. func motdHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1162. //TODO(dan): hook this up when we have multiple servers I guess???
  1163. //var target string
  1164. //if len(msg.Params) > 0 {
  1165. // target = msg.Params[0]
  1166. //}
  1167. server.MOTD(client)
  1168. return false
  1169. }
  1170. // NOTICE <target>{,<target>} <message>
  1171. func noticeHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1172. clientOnlyTags := GetClientOnlyTags(msg.Tags)
  1173. targets := strings.Split(msg.Params[0], ",")
  1174. message := msg.Params[1]
  1175. for i, targetString := range targets {
  1176. // max of four targets per privmsg
  1177. if i > maxTargets-1 {
  1178. break
  1179. }
  1180. prefixes, targetString := SplitChannelMembershipPrefixes(targetString)
  1181. lowestPrefix := GetLowestChannelModePrefix(prefixes)
  1182. target, cerr := CasefoldChannel(targetString)
  1183. if cerr == nil {
  1184. channel := server.channels.Get(target)
  1185. if channel == nil {
  1186. // errors silently ignored with NOTICE as per RFC
  1187. continue
  1188. }
  1189. channel.Notice(lowestPrefix, clientOnlyTags, client, message)
  1190. } else {
  1191. target, err := CasefoldName(targetString)
  1192. if err != nil {
  1193. continue
  1194. }
  1195. user := server.clients.Get(target)
  1196. if user == nil {
  1197. // errors silently ignored with NOTICE as per RFC
  1198. continue
  1199. }
  1200. if !user.capabilities[MessageTags] {
  1201. clientOnlyTags = nil
  1202. }
  1203. user.SendFromClient(client, clientOnlyTags, client.nickMaskString, "NOTICE", user.nick, message)
  1204. if client.capabilities[EchoMessage] {
  1205. client.SendFromClient(client, clientOnlyTags, client.nickMaskString, "NOTICE", user.nick, message)
  1206. }
  1207. }
  1208. }
  1209. return false
  1210. }
  1211. // KICK <channel>{,<channel>} <user>{,<user>} [<comment>]
  1212. func kickHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1213. channels := strings.Split(msg.Params[0], ",")
  1214. users := strings.Split(msg.Params[1], ",")
  1215. if (len(channels) != len(users)) && (len(users) != 1) {
  1216. client.Send(nil, server.name, ERR_NEEDMOREPARAMS, client.nick, "KICK", "Not enough parameters")
  1217. return false
  1218. }
  1219. var kicks [][]string
  1220. for index, channel := range channels {
  1221. if len(users) == 1 {
  1222. kicks = append(kicks, []string{channel, users[0]})
  1223. } else {
  1224. kicks = append(kicks, []string{channel, users[index]})
  1225. }
  1226. }
  1227. var comment string
  1228. if len(msg.Params) > 2 {
  1229. comment = msg.Params[2]
  1230. }
  1231. for _, info := range kicks {
  1232. chname := info[0]
  1233. nickname := info[1]
  1234. casefoldedChname, err := CasefoldChannel(chname)
  1235. channel := server.channels.Get(casefoldedChname)
  1236. if err != nil || channel == nil {
  1237. client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, "No such channel")
  1238. continue
  1239. }
  1240. casefoldedNickname, err := CasefoldName(nickname)
  1241. target := server.clients.Get(casefoldedNickname)
  1242. if err != nil || target == nil {
  1243. client.Send(nil, server.name, ERR_NOSUCHNICK, nickname, "No such nick")
  1244. continue
  1245. }
  1246. // make sure client has privs to kick the given user
  1247. //TODO(dan): split this into a separate function that checks if users have privs
  1248. // over other users, useful for things like -aoh as well
  1249. channel.membersMutex.Lock()
  1250. var hasPrivs bool
  1251. for _, mode := range ChannelPrivModes {
  1252. if channel.members[client][mode] {
  1253. hasPrivs = true
  1254. // admins cannot kick other admins
  1255. if mode == ChannelAdmin && channel.members[target][ChannelAdmin] {
  1256. hasPrivs = false
  1257. }
  1258. break
  1259. } else if channel.members[target][mode] {
  1260. break
  1261. }
  1262. }
  1263. if hasPrivs {
  1264. if comment == "" {
  1265. comment = nickname
  1266. }
  1267. channel.kickNoMutex(client, target, comment)
  1268. } else {
  1269. client.Send(nil, client.server.name, ERR_CHANOPRIVSNEEDED, chname, "You're not a channel operator")
  1270. }
  1271. channel.membersMutex.Unlock()
  1272. }
  1273. return false
  1274. }
  1275. // LIST [<channel>{,<channel>} [<server>]]
  1276. func listHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1277. var channels []string
  1278. if len(msg.Params) > 0 {
  1279. channels = strings.Split(msg.Params[0], ",")
  1280. }
  1281. var target string
  1282. if len(msg.Params) > 1 {
  1283. target = msg.Params[1]
  1284. }
  1285. //TODO(dan): target server when we have multiple servers
  1286. //TODO(dan): we should continue just fine if it's this current server though
  1287. if target != "" {
  1288. client.Send(nil, server.name, ERR_NOSUCHSERVER, client.nick, target, "No such server")
  1289. return false
  1290. }
  1291. if len(channels) == 0 {
  1292. for _, channel := range server.channels {
  1293. if !client.flags[Operator] && channel.flags[Secret] {
  1294. continue
  1295. }
  1296. client.RplList(channel)
  1297. }
  1298. } else {
  1299. // limit regular users to only listing one channel
  1300. if !client.flags[Operator] {
  1301. channels = channels[:1]
  1302. }
  1303. for _, chname := range channels {
  1304. casefoldedChname, err := CasefoldChannel(chname)
  1305. channel := server.channels.Get(casefoldedChname)
  1306. if err != nil || channel == nil || (!client.flags[Operator] && channel.flags[Secret]) {
  1307. if len(chname) > 0 {
  1308. client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, "No such channel")
  1309. }
  1310. continue
  1311. }
  1312. client.RplList(channel)
  1313. }
  1314. }
  1315. client.Send(nil, server.name, RPL_LISTEND, client.nick, "End of LIST")
  1316. return false
  1317. }
  1318. func (target *Client) RplList(channel *Channel) {
  1319. channel.membersMutex.RLock()
  1320. defer channel.membersMutex.RUnlock()
  1321. // get the correct number of channel members
  1322. var memberCount int
  1323. if target.flags[Operator] || channel.members.Has(target) {
  1324. memberCount = len(channel.members)
  1325. } else {
  1326. for member := range channel.members {
  1327. if !member.flags[Invisible] {
  1328. memberCount += 1
  1329. }
  1330. }
  1331. }
  1332. target.Send(nil, target.server.name, RPL_LIST, target.nick, channel.name, string(memberCount), channel.topic)
  1333. }
  1334. // NAMES [<channel>{,<channel>}]
  1335. func namesHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1336. var channels []string
  1337. if len(msg.Params) > 0 {
  1338. channels = strings.Split(msg.Params[0], ",")
  1339. }
  1340. //var target string
  1341. //if len(msg.Params) > 1 {
  1342. // target = msg.Params[1]
  1343. //}
  1344. if len(channels) == 0 {
  1345. for _, channel := range server.channels {
  1346. channel.Names(client)
  1347. }
  1348. return false
  1349. }
  1350. // limit regular users to only listing one channel
  1351. if !client.flags[Operator] {
  1352. channels = channels[:1]
  1353. }
  1354. for _, chname := range channels {
  1355. casefoldedChname, err := CasefoldChannel(chname)
  1356. channel := server.channels.Get(casefoldedChname)
  1357. if err != nil || channel == nil {
  1358. if len(chname) > 0 {
  1359. client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, "No such channel")
  1360. }
  1361. continue
  1362. }
  1363. channel.Names(client)
  1364. }
  1365. return false
  1366. }
  1367. // VERSION [<server>]
  1368. func versionHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1369. var target string
  1370. if len(msg.Params) > 0 {
  1371. target = msg.Params[0]
  1372. }
  1373. casefoldedTarget, err := Casefold(target)
  1374. if target != "" && (err != nil || casefoldedTarget != server.nameCasefolded) {
  1375. client.Send(nil, server.name, ERR_NOSUCHSERVER, client.nick, target, "No such server")
  1376. return false
  1377. }
  1378. client.Send(nil, server.name, RPL_VERSION, client.nick, Ver, server.name)
  1379. client.RplISupport()
  1380. return false
  1381. }
  1382. // INVITE <nickname> <channel>
  1383. func inviteHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1384. nickname := msg.Params[0]
  1385. channelName := msg.Params[1]
  1386. casefoldedNickname, err := CasefoldName(nickname)
  1387. target := server.clients.Get(casefoldedNickname)
  1388. if err != nil || target == nil {
  1389. client.Send(nil, server.name, ERR_NOSUCHNICK, client.nick, nickname, "No such nick")
  1390. return false
  1391. }
  1392. casefoldedChannelName, err := CasefoldChannel(channelName)
  1393. channel := server.channels.Get(casefoldedChannelName)
  1394. if err != nil || channel == nil {
  1395. client.Send(nil, server.name, RPL_INVITING, client.nick, target.nick, channelName)
  1396. target.Send(nil, client.nickMaskString, "INVITE", target.nick, channel.name)
  1397. return true
  1398. }
  1399. channel.Invite(target, client)
  1400. return false
  1401. }
  1402. // TIME [<server>]
  1403. func timeHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1404. var target string
  1405. if len(msg.Params) > 0 {
  1406. target = msg.Params[0]
  1407. }
  1408. casefoldedTarget, err := Casefold(target)
  1409. if (target != "") && err != nil || (casefoldedTarget != server.nameCasefolded) {
  1410. client.Send(nil, server.name, ERR_NOSUCHSERVER, client.nick, target, "No such server")
  1411. return false
  1412. }
  1413. client.Send(nil, server.name, RPL_TIME, client.nick, server.name, time.Now().Format(time.RFC1123))
  1414. return false
  1415. }
  1416. // KILL <nickname> <comment>
  1417. func killHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1418. nickname := msg.Params[0]
  1419. comment := "<no reason supplied>"
  1420. if len(msg.Params) > 1 {
  1421. comment = msg.Params[1]
  1422. }
  1423. casefoldedNickname, err := CasefoldName(nickname)
  1424. target := server.clients.Get(casefoldedNickname)
  1425. if err != nil || target == nil {
  1426. client.Send(nil, client.server.name, ERR_NOSUCHNICK, nickname, "No such nick")
  1427. return false
  1428. }
  1429. quitMsg := fmt.Sprintf("Killed (%s (%s))", client.nick, comment)
  1430. target.Quit(quitMsg)
  1431. target.destroy()
  1432. return false
  1433. }
  1434. // WHOWAS <nickname> [<count> [<server>]]
  1435. func whowasHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1436. nicknames := strings.Split(msg.Params[0], ",")
  1437. var count int64
  1438. if len(msg.Params) > 1 {
  1439. count, _ = strconv.ParseInt(msg.Params[1], 10, 64)
  1440. }
  1441. //var target string
  1442. //if len(msg.Params) > 2 {
  1443. // target = msg.Params[2]
  1444. //}
  1445. for _, nickname := range nicknames {
  1446. results := server.whoWas.Find(nickname, count)
  1447. if len(results) == 0 {
  1448. if len(nickname) > 0 {
  1449. client.Send(nil, server.name, ERR_WASNOSUCHNICK, client.nick, nickname, "There was no such nickname")
  1450. }
  1451. } else {
  1452. for _, whoWas := range results {
  1453. client.Send(nil, server.name, RPL_WHOWASUSER, client.nick, whoWas.nickname, whoWas.username, whoWas.hostname, "*", whoWas.realname)
  1454. }
  1455. }
  1456. if len(nickname) > 0 {
  1457. client.Send(nil, server.name, RPL_ENDOFWHOWAS, client.nick, nickname, "End of WHOWAS")
  1458. }
  1459. }
  1460. return false
  1461. }