You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

client_lookup_set.go 10KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402
  1. // Copyright (c) 2012-2014 Jeremy Latt
  2. // Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
  3. // released under the MIT license
  4. package irc
  5. import (
  6. "fmt"
  7. "log"
  8. "regexp"
  9. "strings"
  10. "github.com/goshuirc/irc-go/ircmatch"
  11. "github.com/oragono/oragono/irc/caps"
  12. "github.com/oragono/oragono/irc/modes"
  13. "sync"
  14. )
  15. // ExpandUserHost takes a userhost, and returns an expanded version.
  16. func ExpandUserHost(userhost string) (expanded string) {
  17. expanded = userhost
  18. // fill in missing wildcards for nicks
  19. //TODO(dan): this would fail with dan@lol, fix that.
  20. if !strings.Contains(expanded, "!") {
  21. expanded += "!*"
  22. }
  23. if !strings.Contains(expanded, "@") {
  24. expanded += "@*"
  25. }
  26. return
  27. }
  28. // ClientManager keeps track of clients by nick, enforcing uniqueness of casefolded nicks
  29. type ClientManager struct {
  30. sync.RWMutex // tier 2
  31. byNick map[string]*Client
  32. bySkeleton map[string]*Client
  33. }
  34. // Initialize initializes a ClientManager.
  35. func (clients *ClientManager) Initialize() {
  36. clients.byNick = make(map[string]*Client)
  37. clients.bySkeleton = make(map[string]*Client)
  38. }
  39. // Count returns how many clients are in the manager.
  40. func (clients *ClientManager) Count() int {
  41. clients.RLock()
  42. defer clients.RUnlock()
  43. count := len(clients.byNick)
  44. return count
  45. }
  46. // Get retrieves a client from the manager, if they exist.
  47. func (clients *ClientManager) Get(nick string) *Client {
  48. casefoldedName, err := CasefoldName(nick)
  49. if err == nil {
  50. clients.RLock()
  51. defer clients.RUnlock()
  52. cli := clients.byNick[casefoldedName]
  53. return cli
  54. }
  55. return nil
  56. }
  57. func (clients *ClientManager) removeInternal(client *Client) (err error) {
  58. // requires holding the writable Lock()
  59. oldcfnick, oldskeleton := client.uniqueIdentifiers()
  60. if oldcfnick == "*" || oldcfnick == "" {
  61. return errNickMissing
  62. }
  63. currentEntry, present := clients.byNick[oldcfnick]
  64. if present {
  65. if currentEntry == client {
  66. delete(clients.byNick, oldcfnick)
  67. } else {
  68. // this shouldn't happen, but we can ignore it
  69. client.server.logger.Warning("internal", "clients for nick out of sync", oldcfnick)
  70. err = errNickMissing
  71. }
  72. } else {
  73. err = errNickMissing
  74. }
  75. currentEntry, present = clients.bySkeleton[oldskeleton]
  76. if present {
  77. if currentEntry == client {
  78. delete(clients.bySkeleton, oldskeleton)
  79. } else {
  80. client.server.logger.Warning("internal", "clients for skeleton out of sync", oldskeleton)
  81. err = errNickMissing
  82. }
  83. } else {
  84. err = errNickMissing
  85. }
  86. return
  87. }
  88. // Remove removes a client from the lookup set.
  89. func (clients *ClientManager) Remove(client *Client) error {
  90. clients.Lock()
  91. defer clients.Unlock()
  92. return clients.removeInternal(client)
  93. }
  94. // Handles a RESUME by attaching a session to a designated client. It is the
  95. // caller's responsibility to verify that the resume is allowed (checking tokens,
  96. // TLS status, etc.) before calling this.
  97. func (clients *ClientManager) Resume(oldClient *Client, session *Session) (err error) {
  98. clients.Lock()
  99. defer clients.Unlock()
  100. cfnick := oldClient.NickCasefolded()
  101. if _, ok := clients.byNick[cfnick]; !ok {
  102. return errNickMissing
  103. }
  104. if !oldClient.AddSession(session) {
  105. return errNickMissing
  106. }
  107. return nil
  108. }
  109. // SetNick sets a client's nickname, validating it against nicknames in use
  110. func (clients *ClientManager) SetNick(client *Client, session *Session, newNick string) error {
  111. if len(newNick) > client.server.Config().Limits.NickLen {
  112. return errNicknameInvalid
  113. }
  114. newcfnick, err := CasefoldName(newNick)
  115. if err != nil {
  116. return errNicknameInvalid
  117. }
  118. newSkeleton, err := Skeleton(newNick)
  119. if err != nil {
  120. return errNicknameInvalid
  121. }
  122. if restrictedCasefoldedNicks[newcfnick] || restrictedSkeletons[newSkeleton] {
  123. return errNicknameInvalid
  124. }
  125. reservedAccount, method := client.server.accounts.EnforcementStatus(newcfnick, newSkeleton)
  126. account := client.Account()
  127. config := client.server.Config()
  128. var bouncerAllowed bool
  129. if config.Accounts.Bouncer.Enabled {
  130. if session != nil && session.capabilities.Has(caps.Bouncer) {
  131. bouncerAllowed = true
  132. } else {
  133. settings := client.AccountSettings()
  134. if config.Accounts.Bouncer.AllowedByDefault && settings.AllowBouncer != BouncerDisallowedByUser {
  135. bouncerAllowed = true
  136. } else if settings.AllowBouncer == BouncerAllowedByUser {
  137. bouncerAllowed = true
  138. }
  139. }
  140. }
  141. clients.Lock()
  142. defer clients.Unlock()
  143. currentClient := clients.byNick[newcfnick]
  144. // the client may just be changing case
  145. if currentClient != nil && currentClient != client && session != nil {
  146. // these conditions forbid reattaching to an existing session:
  147. if client.Registered() || !bouncerAllowed || account == "" || account != currentClient.Account() || client.isTor != currentClient.isTor || client.HasMode(modes.TLS) != currentClient.HasMode(modes.TLS) {
  148. return errNicknameInUse
  149. }
  150. if !currentClient.AddSession(session) {
  151. return errNicknameInUse
  152. }
  153. // successful reattach!
  154. return nil
  155. }
  156. // analogous checks for skeletons
  157. skeletonHolder := clients.bySkeleton[newSkeleton]
  158. if skeletonHolder != nil && skeletonHolder != client {
  159. return errNicknameInUse
  160. }
  161. if method == NickEnforcementStrict && reservedAccount != "" && reservedAccount != account {
  162. return errNicknameReserved
  163. }
  164. clients.removeInternal(client)
  165. clients.byNick[newcfnick] = client
  166. clients.bySkeleton[newSkeleton] = client
  167. client.updateNick(newNick, newcfnick, newSkeleton)
  168. return nil
  169. }
  170. func (clients *ClientManager) AllClients() (result []*Client) {
  171. clients.RLock()
  172. defer clients.RUnlock()
  173. result = make([]*Client, len(clients.byNick))
  174. i := 0
  175. for _, client := range clients.byNick {
  176. result[i] = client
  177. i++
  178. }
  179. return
  180. }
  181. // AllWithCaps returns all clients with the given capabilities.
  182. func (clients *ClientManager) AllWithCaps(capabs ...caps.Capability) (sessions []*Session) {
  183. clients.RLock()
  184. defer clients.RUnlock()
  185. for _, client := range clients.byNick {
  186. for _, session := range client.Sessions() {
  187. if session.capabilities.HasAll(capabs...) {
  188. sessions = append(sessions, session)
  189. }
  190. }
  191. }
  192. return
  193. }
  194. // AllWithCapsNotify returns all clients with the given capabilities, and that support cap-notify.
  195. func (clients *ClientManager) AllWithCapsNotify(capabs ...caps.Capability) (sessions []*Session) {
  196. capabs = append(capabs, caps.CapNotify)
  197. clients.RLock()
  198. defer clients.RUnlock()
  199. for _, client := range clients.byNick {
  200. for _, session := range client.Sessions() {
  201. // cap-notify is implicit in cap version 302 and above
  202. if session.capabilities.HasAll(capabs...) || 302 <= session.capVersion {
  203. sessions = append(sessions, session)
  204. }
  205. }
  206. }
  207. return
  208. }
  209. // FindAll returns all clients that match the given userhost mask.
  210. func (clients *ClientManager) FindAll(userhost string) (set ClientSet) {
  211. set = make(ClientSet)
  212. userhost, err := Casefold(ExpandUserHost(userhost))
  213. if err != nil {
  214. return set
  215. }
  216. matcher := ircmatch.MakeMatch(userhost)
  217. clients.RLock()
  218. defer clients.RUnlock()
  219. for _, client := range clients.byNick {
  220. if matcher.Match(client.NickMaskCasefolded()) {
  221. set.Add(client)
  222. }
  223. }
  224. return set
  225. }
  226. //
  227. // usermask to regexp
  228. //
  229. //TODO(dan): move this over to generally using glob syntax instead?
  230. // kinda more expected in normal ban/etc masks, though regex is useful (probably as an extban?)
  231. // UserMaskSet holds a set of client masks and lets you match hostnames to them.
  232. type UserMaskSet struct {
  233. sync.RWMutex
  234. masks map[string]bool
  235. regexp *regexp.Regexp
  236. }
  237. // NewUserMaskSet returns a new UserMaskSet.
  238. func NewUserMaskSet() *UserMaskSet {
  239. return &UserMaskSet{
  240. masks: make(map[string]bool),
  241. }
  242. }
  243. // Add adds the given mask to this set.
  244. func (set *UserMaskSet) Add(mask string) (added bool) {
  245. casefoldedMask, err := Casefold(mask)
  246. if err != nil {
  247. log.Println(fmt.Sprintf("ERROR: Could not add mask to usermaskset: [%s]", mask))
  248. return false
  249. }
  250. set.Lock()
  251. added = !set.masks[casefoldedMask]
  252. if added {
  253. set.masks[casefoldedMask] = true
  254. }
  255. set.Unlock()
  256. if added {
  257. set.setRegexp()
  258. }
  259. return
  260. }
  261. // AddAll adds the given masks to this set.
  262. func (set *UserMaskSet) AddAll(masks []string) (added bool) {
  263. set.Lock()
  264. defer set.Unlock()
  265. for _, mask := range masks {
  266. if !added && !set.masks[mask] {
  267. added = true
  268. }
  269. set.masks[mask] = true
  270. }
  271. if added {
  272. set.setRegexp()
  273. }
  274. return
  275. }
  276. // Remove removes the given mask from this set.
  277. func (set *UserMaskSet) Remove(mask string) (removed bool) {
  278. set.Lock()
  279. removed = set.masks[mask]
  280. if removed {
  281. delete(set.masks, mask)
  282. }
  283. set.Unlock()
  284. if removed {
  285. set.setRegexp()
  286. }
  287. return
  288. }
  289. // Match matches the given n!u@h.
  290. func (set *UserMaskSet) Match(userhost string) bool {
  291. set.RLock()
  292. regexp := set.regexp
  293. set.RUnlock()
  294. if regexp == nil {
  295. return false
  296. }
  297. return regexp.MatchString(userhost)
  298. }
  299. // String returns the masks in this set.
  300. func (set *UserMaskSet) String() string {
  301. set.RLock()
  302. masks := make([]string, len(set.masks))
  303. index := 0
  304. for mask := range set.masks {
  305. masks[index] = mask
  306. index++
  307. }
  308. set.RUnlock()
  309. return strings.Join(masks, " ")
  310. }
  311. func (set *UserMaskSet) Length() int {
  312. set.RLock()
  313. defer set.RUnlock()
  314. return len(set.masks)
  315. }
  316. // setRegexp generates a regular expression from the set of user mask
  317. // strings. Masks are split at the two types of wildcards, `*` and
  318. // `?`. All the pieces are meta-escaped. `*` is replaced with `.*`,
  319. // the regexp equivalent. Likewise, `?` is replaced with `.`. The
  320. // parts are re-joined and finally all masks are joined into a big
  321. // or-expression.
  322. func (set *UserMaskSet) setRegexp() {
  323. var re *regexp.Regexp
  324. set.RLock()
  325. maskExprs := make([]string, len(set.masks))
  326. index := 0
  327. for mask := range set.masks {
  328. manyParts := strings.Split(mask, "*")
  329. manyExprs := make([]string, len(manyParts))
  330. for mindex, manyPart := range manyParts {
  331. oneParts := strings.Split(manyPart, "?")
  332. oneExprs := make([]string, len(oneParts))
  333. for oindex, onePart := range oneParts {
  334. oneExprs[oindex] = regexp.QuoteMeta(onePart)
  335. }
  336. manyExprs[mindex] = strings.Join(oneExprs, ".")
  337. }
  338. maskExprs[index] = strings.Join(manyExprs, ".*")
  339. index++
  340. }
  341. set.RUnlock()
  342. if index > 0 {
  343. expr := "^" + strings.Join(maskExprs, "|") + "$"
  344. re, _ = regexp.Compile(expr)
  345. }
  346. set.Lock()
  347. set.regexp = re
  348. set.Unlock()
  349. }