You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

client_lookup_set.go 10KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408
  1. // Copyright (c) 2012-2014 Jeremy Latt
  2. // Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
  3. // released under the MIT license
  4. package irc
  5. import (
  6. "fmt"
  7. "log"
  8. "regexp"
  9. "strings"
  10. "github.com/goshuirc/irc-go/ircmatch"
  11. "github.com/oragono/oragono/irc/caps"
  12. "github.com/oragono/oragono/irc/modes"
  13. "sync"
  14. )
  15. // ExpandUserHost takes a userhost, and returns an expanded version.
  16. func ExpandUserHost(userhost string) (expanded string) {
  17. expanded = userhost
  18. // fill in missing wildcards for nicks
  19. //TODO(dan): this would fail with dan@lol, fix that.
  20. if !strings.Contains(expanded, "!") {
  21. expanded += "!*"
  22. }
  23. if !strings.Contains(expanded, "@") {
  24. expanded += "@*"
  25. }
  26. return
  27. }
  28. // ClientManager keeps track of clients by nick, enforcing uniqueness of casefolded nicks
  29. type ClientManager struct {
  30. sync.RWMutex // tier 2
  31. byNick map[string]*Client
  32. bySkeleton map[string]*Client
  33. }
  34. // Initialize initializes a ClientManager.
  35. func (clients *ClientManager) Initialize() {
  36. clients.byNick = make(map[string]*Client)
  37. clients.bySkeleton = make(map[string]*Client)
  38. }
  39. // Count returns how many clients are in the manager.
  40. func (clients *ClientManager) Count() int {
  41. clients.RLock()
  42. defer clients.RUnlock()
  43. count := len(clients.byNick)
  44. return count
  45. }
  46. // Get retrieves a client from the manager, if they exist.
  47. func (clients *ClientManager) Get(nick string) *Client {
  48. casefoldedName, err := CasefoldName(nick)
  49. if err == nil {
  50. clients.RLock()
  51. defer clients.RUnlock()
  52. cli := clients.byNick[casefoldedName]
  53. return cli
  54. }
  55. return nil
  56. }
  57. func (clients *ClientManager) removeInternal(client *Client) (err error) {
  58. // requires holding the writable Lock()
  59. oldcfnick, oldskeleton := client.uniqueIdentifiers()
  60. if oldcfnick == "*" || oldcfnick == "" {
  61. return errNickMissing
  62. }
  63. currentEntry, present := clients.byNick[oldcfnick]
  64. if present {
  65. if currentEntry == client {
  66. delete(clients.byNick, oldcfnick)
  67. } else {
  68. // this shouldn't happen, but we can ignore it
  69. client.server.logger.Warning("internal", "clients for nick out of sync", oldcfnick)
  70. err = errNickMissing
  71. }
  72. } else {
  73. err = errNickMissing
  74. }
  75. currentEntry, present = clients.bySkeleton[oldskeleton]
  76. if present {
  77. if currentEntry == client {
  78. delete(clients.bySkeleton, oldskeleton)
  79. } else {
  80. client.server.logger.Warning("internal", "clients for skeleton out of sync", oldskeleton)
  81. err = errNickMissing
  82. }
  83. } else {
  84. err = errNickMissing
  85. }
  86. return
  87. }
  88. // Remove removes a client from the lookup set.
  89. func (clients *ClientManager) Remove(client *Client) error {
  90. clients.Lock()
  91. defer clients.Unlock()
  92. return clients.removeInternal(client)
  93. }
  94. // Resume atomically replaces `oldClient` with `newClient`, updating
  95. // newClient's data to match. It is the caller's responsibility first
  96. // to verify that the resume is allowed, and then later to call oldClient.destroy().
  97. func (clients *ClientManager) Resume(newClient, oldClient *Client) (err error) {
  98. clients.Lock()
  99. defer clients.Unlock()
  100. // atomically grant the new client the old nick
  101. err = clients.removeInternal(oldClient)
  102. if err != nil {
  103. // oldClient no longer owns its nick, fail out
  104. return err
  105. }
  106. // nick has been reclaimed, grant it to the new client
  107. clients.removeInternal(newClient)
  108. oldcfnick, oldskeleton := oldClient.uniqueIdentifiers()
  109. clients.byNick[oldcfnick] = newClient
  110. clients.bySkeleton[oldskeleton] = newClient
  111. newClient.copyResumeData(oldClient)
  112. return nil
  113. }
  114. // SetNick sets a client's nickname, validating it against nicknames in use
  115. func (clients *ClientManager) SetNick(client *Client, session *Session, newNick string) error {
  116. newcfnick, err := CasefoldName(newNick)
  117. if err != nil {
  118. return err
  119. }
  120. newSkeleton, err := Skeleton(newNick)
  121. if err != nil {
  122. return err
  123. }
  124. reservedAccount, method := client.server.accounts.EnforcementStatus(newcfnick, newSkeleton)
  125. account := client.Account()
  126. bouncerAllowed := client.server.accounts.BouncerAllowed(account, session)
  127. clients.Lock()
  128. defer clients.Unlock()
  129. currentClient := clients.byNick[newcfnick]
  130. // the client may just be changing case
  131. if currentClient != nil && currentClient != client && session != nil {
  132. // these conditions forbid reattaching to an existing session:
  133. if client.Registered() || !bouncerAllowed || account == "" || account != currentClient.Account() || client.isTor != currentClient.isTor || client.HasMode(modes.TLS) != currentClient.HasMode(modes.TLS) {
  134. return errNicknameInUse
  135. }
  136. if !currentClient.AddSession(session) {
  137. return errNicknameInUse
  138. }
  139. // successful reattach!
  140. return nil
  141. }
  142. // analogous checks for skeletons
  143. skeletonHolder := clients.bySkeleton[newSkeleton]
  144. if skeletonHolder != nil && skeletonHolder != client {
  145. return errNicknameInUse
  146. }
  147. if method == NickReservationStrict && reservedAccount != "" && reservedAccount != account {
  148. return errNicknameReserved
  149. }
  150. clients.removeInternal(client)
  151. clients.byNick[newcfnick] = client
  152. clients.bySkeleton[newSkeleton] = client
  153. client.updateNick(newNick, newcfnick, newSkeleton)
  154. return nil
  155. }
  156. func (clients *ClientManager) AllClients() (result []*Client) {
  157. clients.RLock()
  158. defer clients.RUnlock()
  159. result = make([]*Client, len(clients.byNick))
  160. i := 0
  161. for _, client := range clients.byNick {
  162. result[i] = client
  163. i++
  164. }
  165. return
  166. }
  167. // AllWithCaps returns all clients with the given capabilities.
  168. func (clients *ClientManager) AllWithCaps(capabs ...caps.Capability) (sessions []*Session) {
  169. clients.RLock()
  170. defer clients.RUnlock()
  171. for _, client := range clients.byNick {
  172. for _, session := range client.Sessions() {
  173. if session.capabilities.HasAll(capabs...) {
  174. sessions = append(sessions, session)
  175. }
  176. }
  177. }
  178. return
  179. }
  180. // AllWithCapsNotify returns all clients with the given capabilities, and that support cap-notify.
  181. func (clients *ClientManager) AllWithCapsNotify(capabs ...caps.Capability) (sessions []*Session) {
  182. capabs = append(capabs, caps.CapNotify)
  183. clients.RLock()
  184. defer clients.RUnlock()
  185. for _, client := range clients.byNick {
  186. for _, session := range client.Sessions() {
  187. // cap-notify is implicit in cap version 302 and above
  188. if session.capabilities.HasAll(capabs...) || 302 <= session.capVersion {
  189. sessions = append(sessions, session)
  190. }
  191. }
  192. }
  193. return
  194. }
  195. // FindAll returns all clients that match the given userhost mask.
  196. func (clients *ClientManager) FindAll(userhost string) (set ClientSet) {
  197. set = make(ClientSet)
  198. userhost, err := Casefold(ExpandUserHost(userhost))
  199. if err != nil {
  200. return set
  201. }
  202. matcher := ircmatch.MakeMatch(userhost)
  203. clients.RLock()
  204. defer clients.RUnlock()
  205. for _, client := range clients.byNick {
  206. if matcher.Match(client.NickMaskCasefolded()) {
  207. set.Add(client)
  208. }
  209. }
  210. return set
  211. }
  212. // Find returns the first client that matches the given userhost mask.
  213. func (clients *ClientManager) Find(userhost string) *Client {
  214. userhost, err := Casefold(ExpandUserHost(userhost))
  215. if err != nil {
  216. return nil
  217. }
  218. matcher := ircmatch.MakeMatch(userhost)
  219. var matchedClient *Client
  220. clients.RLock()
  221. defer clients.RUnlock()
  222. for _, client := range clients.byNick {
  223. if matcher.Match(client.NickMaskCasefolded()) {
  224. matchedClient = client
  225. break
  226. }
  227. }
  228. return matchedClient
  229. }
  230. //
  231. // usermask to regexp
  232. //
  233. //TODO(dan): move this over to generally using glob syntax instead?
  234. // kinda more expected in normal ban/etc masks, though regex is useful (probably as an extban?)
  235. // UserMaskSet holds a set of client masks and lets you match hostnames to them.
  236. type UserMaskSet struct {
  237. sync.RWMutex
  238. masks map[string]bool
  239. regexp *regexp.Regexp
  240. }
  241. // NewUserMaskSet returns a new UserMaskSet.
  242. func NewUserMaskSet() *UserMaskSet {
  243. return &UserMaskSet{
  244. masks: make(map[string]bool),
  245. }
  246. }
  247. // Add adds the given mask to this set.
  248. func (set *UserMaskSet) Add(mask string) (added bool) {
  249. casefoldedMask, err := Casefold(mask)
  250. if err != nil {
  251. log.Println(fmt.Sprintf("ERROR: Could not add mask to usermaskset: [%s]", mask))
  252. return false
  253. }
  254. set.Lock()
  255. added = !set.masks[casefoldedMask]
  256. if added {
  257. set.masks[casefoldedMask] = true
  258. }
  259. set.Unlock()
  260. if added {
  261. set.setRegexp()
  262. }
  263. return
  264. }
  265. // AddAll adds the given masks to this set.
  266. func (set *UserMaskSet) AddAll(masks []string) (added bool) {
  267. set.Lock()
  268. defer set.Unlock()
  269. for _, mask := range masks {
  270. if !added && !set.masks[mask] {
  271. added = true
  272. }
  273. set.masks[mask] = true
  274. }
  275. if added {
  276. set.setRegexp()
  277. }
  278. return
  279. }
  280. // Remove removes the given mask from this set.
  281. func (set *UserMaskSet) Remove(mask string) (removed bool) {
  282. set.Lock()
  283. removed = set.masks[mask]
  284. if removed {
  285. delete(set.masks, mask)
  286. }
  287. set.Unlock()
  288. if removed {
  289. set.setRegexp()
  290. }
  291. return
  292. }
  293. // Match matches the given n!u@h.
  294. func (set *UserMaskSet) Match(userhost string) bool {
  295. set.RLock()
  296. regexp := set.regexp
  297. set.RUnlock()
  298. if regexp == nil {
  299. return false
  300. }
  301. return regexp.MatchString(userhost)
  302. }
  303. // String returns the masks in this set.
  304. func (set *UserMaskSet) String() string {
  305. set.RLock()
  306. masks := make([]string, len(set.masks))
  307. index := 0
  308. for mask := range set.masks {
  309. masks[index] = mask
  310. index++
  311. }
  312. set.RUnlock()
  313. return strings.Join(masks, " ")
  314. }
  315. func (set *UserMaskSet) Length() int {
  316. set.RLock()
  317. defer set.RUnlock()
  318. return len(set.masks)
  319. }
  320. // setRegexp generates a regular expression from the set of user mask
  321. // strings. Masks are split at the two types of wildcards, `*` and
  322. // `?`. All the pieces are meta-escaped. `*` is replaced with `.*`,
  323. // the regexp equivalent. Likewise, `?` is replaced with `.`. The
  324. // parts are re-joined and finally all masks are joined into a big
  325. // or-expression.
  326. func (set *UserMaskSet) setRegexp() {
  327. var re *regexp.Regexp
  328. set.RLock()
  329. maskExprs := make([]string, len(set.masks))
  330. index := 0
  331. for mask := range set.masks {
  332. manyParts := strings.Split(mask, "*")
  333. manyExprs := make([]string, len(manyParts))
  334. for mindex, manyPart := range manyParts {
  335. oneParts := strings.Split(manyPart, "?")
  336. oneExprs := make([]string, len(oneParts))
  337. for oindex, onePart := range oneParts {
  338. oneExprs[oindex] = regexp.QuoteMeta(onePart)
  339. }
  340. manyExprs[mindex] = strings.Join(oneExprs, ".")
  341. }
  342. maskExprs[index] = strings.Join(manyExprs, ".*")
  343. index++
  344. }
  345. set.RUnlock()
  346. if index > 0 {
  347. expr := "^" + strings.Join(maskExprs, "|") + "$"
  348. re, _ = regexp.Compile(expr)
  349. }
  350. set.Lock()
  351. set.regexp = re
  352. set.Unlock()
  353. }