您最多选择25个主题 主题必须以字母或数字开头,可以包含连字符 (-),并且长度不得超过35个字符

client_lookup_set.go 11KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439
  1. // Copyright (c) 2012-2014 Jeremy Latt
  2. // Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
  3. // released under the MIT license
  4. package irc
  5. import (
  6. "regexp"
  7. "strings"
  8. "sync"
  9. "time"
  10. "github.com/oragono/oragono/irc/caps"
  11. "github.com/oragono/oragono/irc/modes"
  12. "github.com/oragono/oragono/irc/utils"
  13. )
  14. // ClientManager keeps track of clients by nick, enforcing uniqueness of casefolded nicks
  15. type ClientManager struct {
  16. sync.RWMutex // tier 2
  17. byNick map[string]*Client
  18. bySkeleton map[string]*Client
  19. }
  20. // Initialize initializes a ClientManager.
  21. func (clients *ClientManager) Initialize() {
  22. clients.byNick = make(map[string]*Client)
  23. clients.bySkeleton = make(map[string]*Client)
  24. }
  25. // Get retrieves a client from the manager, if they exist.
  26. func (clients *ClientManager) Get(nick string) *Client {
  27. casefoldedName, err := CasefoldName(nick)
  28. if err == nil {
  29. clients.RLock()
  30. defer clients.RUnlock()
  31. cli := clients.byNick[casefoldedName]
  32. return cli
  33. }
  34. return nil
  35. }
  36. func (clients *ClientManager) removeInternal(client *Client, oldcfnick, oldskeleton string) (err error) {
  37. // requires holding the writable Lock()
  38. if oldcfnick == "*" || oldcfnick == "" {
  39. return errNickMissing
  40. }
  41. currentEntry, present := clients.byNick[oldcfnick]
  42. if present {
  43. if currentEntry == client {
  44. delete(clients.byNick, oldcfnick)
  45. } else {
  46. // this shouldn't happen, but we can ignore it
  47. client.server.logger.Warning("internal", "clients for nick out of sync", oldcfnick)
  48. err = errNickMissing
  49. }
  50. } else {
  51. err = errNickMissing
  52. }
  53. currentEntry, present = clients.bySkeleton[oldskeleton]
  54. if present {
  55. if currentEntry == client {
  56. delete(clients.bySkeleton, oldskeleton)
  57. } else {
  58. client.server.logger.Warning("internal", "clients for skeleton out of sync", oldskeleton)
  59. err = errNickMissing
  60. }
  61. } else {
  62. err = errNickMissing
  63. }
  64. return
  65. }
  66. // Remove removes a client from the lookup set.
  67. func (clients *ClientManager) Remove(client *Client) error {
  68. clients.Lock()
  69. defer clients.Unlock()
  70. oldcfnick, oldskeleton := client.uniqueIdentifiers()
  71. return clients.removeInternal(client, oldcfnick, oldskeleton)
  72. }
  73. // Handles a RESUME by attaching a session to a designated client. It is the
  74. // caller's responsibility to verify that the resume is allowed (checking tokens,
  75. // TLS status, etc.) before calling this.
  76. func (clients *ClientManager) Resume(oldClient *Client, session *Session) (err error) {
  77. clients.Lock()
  78. defer clients.Unlock()
  79. cfnick := oldClient.NickCasefolded()
  80. if _, ok := clients.byNick[cfnick]; !ok {
  81. return errNickMissing
  82. }
  83. success, _, _, _ := oldClient.AddSession(session)
  84. if !success {
  85. return errNickMissing
  86. }
  87. return nil
  88. }
  89. // SetNick sets a client's nickname, validating it against nicknames in use
  90. // XXX: dryRun validates a client's ability to claim a nick, without
  91. // actually claiming it
  92. func (clients *ClientManager) SetNick(client *Client, session *Session, newNick string, dryRun bool) (setNick string, err error, returnedFromAway bool) {
  93. config := client.server.Config()
  94. var newCfNick, newSkeleton string
  95. client.stateMutex.RLock()
  96. account := client.account
  97. accountName := client.accountName
  98. settings := client.accountSettings
  99. registered := client.registered
  100. realname := client.realname
  101. client.stateMutex.RUnlock()
  102. // recompute always-on status, because client.alwaysOn is not set for unregistered clients
  103. var alwaysOn, useAccountName bool
  104. if account != "" {
  105. alwaysOn = persistenceEnabled(config.Accounts.Multiclient.AlwaysOn, settings.AlwaysOn)
  106. useAccountName = alwaysOn || config.Accounts.NickReservation.ForceNickEqualsAccount
  107. }
  108. if useAccountName {
  109. if registered && newNick != accountName && newNick != "" {
  110. return "", errNickAccountMismatch, false
  111. }
  112. newNick = accountName
  113. newCfNick = account
  114. newSkeleton, err = Skeleton(newNick)
  115. if err != nil {
  116. return "", errNicknameInvalid, false
  117. }
  118. } else {
  119. newNick = strings.TrimSpace(newNick)
  120. if len(newNick) == 0 {
  121. return "", errNickMissing, false
  122. }
  123. if account == "" && config.Accounts.NickReservation.ForceGuestFormat && !dryRun {
  124. newCfNick, err = CasefoldName(newNick)
  125. if err != nil {
  126. return "", errNicknameInvalid, false
  127. }
  128. if !config.Accounts.NickReservation.guestRegexpFolded.MatchString(newCfNick) {
  129. newNick = strings.Replace(config.Accounts.NickReservation.GuestFormat, "*", newNick, 1)
  130. newCfNick = "" // re-fold it below
  131. }
  132. }
  133. if newCfNick == "" {
  134. newCfNick, err = CasefoldName(newNick)
  135. }
  136. if err != nil {
  137. return "", errNicknameInvalid, false
  138. }
  139. if len(newNick) > config.Limits.NickLen || len(newCfNick) > config.Limits.NickLen {
  140. return "", errNicknameInvalid, false
  141. }
  142. newSkeleton, err = Skeleton(newNick)
  143. if err != nil {
  144. return "", errNicknameInvalid, false
  145. }
  146. if config.isRelaymsgIdentifier(newNick) {
  147. return "", errNicknameInvalid, false
  148. }
  149. if restrictedCasefoldedNicks.Has(newCfNick) || restrictedSkeletons.Has(newSkeleton) {
  150. return "", errNicknameInvalid, false
  151. }
  152. reservedAccount, method := client.server.accounts.EnforcementStatus(newCfNick, newSkeleton)
  153. if method == NickEnforcementStrict && reservedAccount != "" && reservedAccount != account {
  154. return "", errNicknameReserved, false
  155. }
  156. }
  157. var bouncerAllowed bool
  158. if config.Accounts.Multiclient.Enabled {
  159. if useAccountName {
  160. bouncerAllowed = true
  161. } else {
  162. if config.Accounts.Multiclient.AllowedByDefault && settings.AllowBouncer != MulticlientDisallowedByUser {
  163. bouncerAllowed = true
  164. } else if settings.AllowBouncer == MulticlientAllowedByUser {
  165. bouncerAllowed = true
  166. }
  167. }
  168. }
  169. clients.Lock()
  170. defer clients.Unlock()
  171. currentClient := clients.byNick[newCfNick]
  172. // the client may just be changing case
  173. if currentClient != nil && currentClient != client {
  174. // these conditions forbid reattaching to an existing session:
  175. if registered || !bouncerAllowed || account == "" || account != currentClient.Account() ||
  176. dryRun || session == nil {
  177. return "", errNicknameInUse, false
  178. }
  179. // check TLS modes
  180. if client.HasMode(modes.TLS) != currentClient.HasMode(modes.TLS) {
  181. if useAccountName {
  182. // #955: this is fatal because they can't fix it by trying a different nick
  183. return "", errInsecureReattach, false
  184. } else {
  185. return "", errNicknameInUse, false
  186. }
  187. }
  188. reattachSuccessful, numSessions, lastSeen, back := currentClient.AddSession(session)
  189. if !reattachSuccessful {
  190. return "", errNicknameInUse, false
  191. }
  192. if numSessions == 1 {
  193. invisible := currentClient.HasMode(modes.Invisible)
  194. operator := currentClient.HasMode(modes.Operator) || currentClient.HasMode(modes.LocalOperator)
  195. client.server.stats.AddRegistered(invisible, operator)
  196. }
  197. session.autoreplayMissedSince = lastSeen
  198. // TODO: transition mechanism for #1065, clean this up eventually:
  199. if currentClient.Realname() == "" {
  200. currentClient.SetRealname(realname)
  201. }
  202. // successful reattach!
  203. return newNick, nil, back
  204. } else if currentClient == client && currentClient.Nick() == newNick {
  205. return "", errNoop, false
  206. }
  207. // analogous checks for skeletons
  208. skeletonHolder := clients.bySkeleton[newSkeleton]
  209. if skeletonHolder != nil && skeletonHolder != client {
  210. return "", errNicknameInUse, false
  211. }
  212. if dryRun {
  213. return "", nil, false
  214. }
  215. formercfnick, formerskeleton := client.uniqueIdentifiers()
  216. if changeSuccess := client.SetNick(newNick, newCfNick, newSkeleton); !changeSuccess {
  217. return "", errClientDestroyed, false
  218. }
  219. clients.removeInternal(client, formercfnick, formerskeleton)
  220. clients.byNick[newCfNick] = client
  221. clients.bySkeleton[newSkeleton] = client
  222. return newNick, nil, false
  223. }
  224. func (clients *ClientManager) AllClients() (result []*Client) {
  225. clients.RLock()
  226. defer clients.RUnlock()
  227. result = make([]*Client, len(clients.byNick))
  228. i := 0
  229. for _, client := range clients.byNick {
  230. result[i] = client
  231. i++
  232. }
  233. return
  234. }
  235. // AllWithCapsNotify returns all clients with the given capabilities, and that support cap-notify.
  236. func (clients *ClientManager) AllWithCapsNotify(capabs ...caps.Capability) (sessions []*Session) {
  237. capabs = append(capabs, caps.CapNotify)
  238. clients.RLock()
  239. defer clients.RUnlock()
  240. for _, client := range clients.byNick {
  241. for _, session := range client.Sessions() {
  242. // cap-notify is implicit in cap version 302 and above
  243. if session.capabilities.HasAll(capabs...) || 302 <= session.capVersion {
  244. sessions = append(sessions, session)
  245. }
  246. }
  247. }
  248. return
  249. }
  250. // FindAll returns all clients that match the given userhost mask.
  251. func (clients *ClientManager) FindAll(userhost string) (set ClientSet) {
  252. set = make(ClientSet)
  253. userhost, err := CanonicalizeMaskWildcard(userhost)
  254. if err != nil {
  255. return set
  256. }
  257. matcher, err := utils.CompileGlob(userhost, false)
  258. if err != nil {
  259. // not much we can do here
  260. return
  261. }
  262. clients.RLock()
  263. defer clients.RUnlock()
  264. for _, client := range clients.byNick {
  265. if matcher.MatchString(client.NickMaskCasefolded()) {
  266. set.Add(client)
  267. }
  268. }
  269. return set
  270. }
  271. //
  272. // usermask to regexp
  273. //
  274. //TODO(dan): move this over to generally using glob syntax instead?
  275. // kinda more expected in normal ban/etc masks, though regex is useful (probably as an extban?)
  276. type MaskInfo struct {
  277. TimeCreated time.Time
  278. CreatorNickmask string
  279. CreatorAccount string
  280. }
  281. // UserMaskSet holds a set of client masks and lets you match hostnames to them.
  282. type UserMaskSet struct {
  283. sync.RWMutex
  284. serialCacheUpdateMutex sync.Mutex
  285. masks map[string]MaskInfo
  286. regexp *regexp.Regexp
  287. }
  288. func NewUserMaskSet() *UserMaskSet {
  289. return new(UserMaskSet)
  290. }
  291. // Add adds the given mask to this set.
  292. func (set *UserMaskSet) Add(mask, creatorNickmask, creatorAccount string) (maskAdded string, err error) {
  293. casefoldedMask, err := CanonicalizeMaskWildcard(mask)
  294. if err != nil {
  295. return
  296. }
  297. set.serialCacheUpdateMutex.Lock()
  298. defer set.serialCacheUpdateMutex.Unlock()
  299. set.Lock()
  300. if set.masks == nil {
  301. set.masks = make(map[string]MaskInfo)
  302. }
  303. _, present := set.masks[casefoldedMask]
  304. if !present {
  305. maskAdded = casefoldedMask
  306. set.masks[casefoldedMask] = MaskInfo{
  307. TimeCreated: time.Now().UTC(),
  308. CreatorNickmask: creatorNickmask,
  309. CreatorAccount: creatorAccount,
  310. }
  311. }
  312. set.Unlock()
  313. if !present {
  314. set.setRegexp()
  315. }
  316. return
  317. }
  318. // Remove removes the given mask from this set.
  319. func (set *UserMaskSet) Remove(mask string) (maskRemoved string, err error) {
  320. mask, err = CanonicalizeMaskWildcard(mask)
  321. if err != nil {
  322. return
  323. }
  324. set.serialCacheUpdateMutex.Lock()
  325. defer set.serialCacheUpdateMutex.Unlock()
  326. set.Lock()
  327. _, removed := set.masks[mask]
  328. if removed {
  329. maskRemoved = mask
  330. delete(set.masks, mask)
  331. }
  332. set.Unlock()
  333. if removed {
  334. set.setRegexp()
  335. }
  336. return
  337. }
  338. func (set *UserMaskSet) SetMasks(masks map[string]MaskInfo) {
  339. set.Lock()
  340. set.masks = masks
  341. set.Unlock()
  342. set.setRegexp()
  343. }
  344. func (set *UserMaskSet) Masks() (result map[string]MaskInfo) {
  345. set.RLock()
  346. defer set.RUnlock()
  347. result = make(map[string]MaskInfo, len(set.masks))
  348. for mask, info := range set.masks {
  349. result[mask] = info
  350. }
  351. return
  352. }
  353. // Match matches the given n!u@h.
  354. func (set *UserMaskSet) Match(userhost string) bool {
  355. set.RLock()
  356. regexp := set.regexp
  357. set.RUnlock()
  358. if regexp == nil {
  359. return false
  360. }
  361. return regexp.MatchString(userhost)
  362. }
  363. func (set *UserMaskSet) Length() int {
  364. set.RLock()
  365. defer set.RUnlock()
  366. return len(set.masks)
  367. }
  368. func (set *UserMaskSet) setRegexp() {
  369. set.RLock()
  370. maskExprs := make([]string, len(set.masks))
  371. for mask := range set.masks {
  372. maskExprs = append(maskExprs, mask)
  373. }
  374. set.RUnlock()
  375. re, _ := utils.CompileMasks(maskExprs)
  376. set.Lock()
  377. set.regexp = re
  378. set.Unlock()
  379. }