Вы не можете выбрать более 25 тем Темы должны начинаться с буквы или цифры, могут содержать дефисы(-) и должны содержать не более 35 символов.

client_lookup_set.go 9.8KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395
  1. // Copyright (c) 2012-2014 Jeremy Latt
  2. // Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
  3. // released under the MIT license
  4. package irc
  5. import (
  6. "fmt"
  7. "log"
  8. "regexp"
  9. "strings"
  10. "github.com/goshuirc/irc-go/ircmatch"
  11. "github.com/oragono/oragono/irc/caps"
  12. "github.com/oragono/oragono/irc/modes"
  13. "sync"
  14. )
  15. // ExpandUserHost takes a userhost, and returns an expanded version.
  16. func ExpandUserHost(userhost string) (expanded string) {
  17. expanded = userhost
  18. // fill in missing wildcards for nicks
  19. //TODO(dan): this would fail with dan@lol, fix that.
  20. if !strings.Contains(expanded, "!") {
  21. expanded += "!*"
  22. }
  23. if !strings.Contains(expanded, "@") {
  24. expanded += "@*"
  25. }
  26. return
  27. }
  28. // ClientManager keeps track of clients by nick, enforcing uniqueness of casefolded nicks
  29. type ClientManager struct {
  30. sync.RWMutex // tier 2
  31. byNick map[string]*Client
  32. bySkeleton map[string]*Client
  33. }
  34. // Initialize initializes a ClientManager.
  35. func (clients *ClientManager) Initialize() {
  36. clients.byNick = make(map[string]*Client)
  37. clients.bySkeleton = make(map[string]*Client)
  38. }
  39. // Count returns how many clients are in the manager.
  40. func (clients *ClientManager) Count() int {
  41. clients.RLock()
  42. defer clients.RUnlock()
  43. count := len(clients.byNick)
  44. return count
  45. }
  46. // Get retrieves a client from the manager, if they exist.
  47. func (clients *ClientManager) Get(nick string) *Client {
  48. casefoldedName, err := CasefoldName(nick)
  49. if err == nil {
  50. clients.RLock()
  51. defer clients.RUnlock()
  52. cli := clients.byNick[casefoldedName]
  53. return cli
  54. }
  55. return nil
  56. }
  57. func (clients *ClientManager) removeInternal(client *Client) (err error) {
  58. // requires holding the writable Lock()
  59. oldcfnick, oldskeleton := client.uniqueIdentifiers()
  60. if oldcfnick == "*" || oldcfnick == "" {
  61. return errNickMissing
  62. }
  63. currentEntry, present := clients.byNick[oldcfnick]
  64. if present {
  65. if currentEntry == client {
  66. delete(clients.byNick, oldcfnick)
  67. } else {
  68. // this shouldn't happen, but we can ignore it
  69. client.server.logger.Warning("internal", "clients for nick out of sync", oldcfnick)
  70. err = errNickMissing
  71. }
  72. } else {
  73. err = errNickMissing
  74. }
  75. currentEntry, present = clients.bySkeleton[oldskeleton]
  76. if present {
  77. if currentEntry == client {
  78. delete(clients.bySkeleton, oldskeleton)
  79. } else {
  80. client.server.logger.Warning("internal", "clients for skeleton out of sync", oldskeleton)
  81. err = errNickMissing
  82. }
  83. } else {
  84. err = errNickMissing
  85. }
  86. return
  87. }
  88. // Remove removes a client from the lookup set.
  89. func (clients *ClientManager) Remove(client *Client) error {
  90. clients.Lock()
  91. defer clients.Unlock()
  92. return clients.removeInternal(client)
  93. }
  94. // Handles a RESUME by attaching a session to a designated client. It is the
  95. // caller's responsibility to verify that the resume is allowed (checking tokens,
  96. // TLS status, etc.) before calling this.
  97. func (clients *ClientManager) Resume(oldClient *Client, session *Session) (err error) {
  98. clients.Lock()
  99. defer clients.Unlock()
  100. cfnick := oldClient.NickCasefolded()
  101. if _, ok := clients.byNick[cfnick]; !ok {
  102. return errNickMissing
  103. }
  104. if !oldClient.AddSession(session) {
  105. return errNickMissing
  106. }
  107. return nil
  108. }
  109. // SetNick sets a client's nickname, validating it against nicknames in use
  110. func (clients *ClientManager) SetNick(client *Client, session *Session, newNick string) error {
  111. newcfnick, err := CasefoldName(newNick)
  112. if err != nil {
  113. return err
  114. }
  115. newSkeleton, err := Skeleton(newNick)
  116. if err != nil {
  117. return err
  118. }
  119. reservedAccount, method := client.server.accounts.EnforcementStatus(newcfnick, newSkeleton)
  120. account := client.Account()
  121. config := client.server.Config()
  122. var bouncerAllowed bool
  123. if config.Accounts.Bouncer.Enabled {
  124. if session != nil && session.capabilities.Has(caps.Bouncer) {
  125. bouncerAllowed = true
  126. } else {
  127. settings := client.AccountSettings()
  128. if config.Accounts.Bouncer.AllowedByDefault && settings.AllowBouncer != BouncerDisallowedByUser {
  129. bouncerAllowed = true
  130. } else if settings.AllowBouncer == BouncerAllowedByUser {
  131. bouncerAllowed = true
  132. }
  133. }
  134. }
  135. clients.Lock()
  136. defer clients.Unlock()
  137. currentClient := clients.byNick[newcfnick]
  138. // the client may just be changing case
  139. if currentClient != nil && currentClient != client && session != nil {
  140. // these conditions forbid reattaching to an existing session:
  141. if client.Registered() || !bouncerAllowed || account == "" || account != currentClient.Account() || client.isTor != currentClient.isTor || client.HasMode(modes.TLS) != currentClient.HasMode(modes.TLS) {
  142. return errNicknameInUse
  143. }
  144. if !currentClient.AddSession(session) {
  145. return errNicknameInUse
  146. }
  147. // successful reattach!
  148. return nil
  149. }
  150. // analogous checks for skeletons
  151. skeletonHolder := clients.bySkeleton[newSkeleton]
  152. if skeletonHolder != nil && skeletonHolder != client {
  153. return errNicknameInUse
  154. }
  155. if method == NickEnforcementStrict && reservedAccount != "" && reservedAccount != account {
  156. return errNicknameReserved
  157. }
  158. clients.removeInternal(client)
  159. clients.byNick[newcfnick] = client
  160. clients.bySkeleton[newSkeleton] = client
  161. client.updateNick(newNick, newcfnick, newSkeleton)
  162. return nil
  163. }
  164. func (clients *ClientManager) AllClients() (result []*Client) {
  165. clients.RLock()
  166. defer clients.RUnlock()
  167. result = make([]*Client, len(clients.byNick))
  168. i := 0
  169. for _, client := range clients.byNick {
  170. result[i] = client
  171. i++
  172. }
  173. return
  174. }
  175. // AllWithCaps returns all clients with the given capabilities.
  176. func (clients *ClientManager) AllWithCaps(capabs ...caps.Capability) (sessions []*Session) {
  177. clients.RLock()
  178. defer clients.RUnlock()
  179. for _, client := range clients.byNick {
  180. for _, session := range client.Sessions() {
  181. if session.capabilities.HasAll(capabs...) {
  182. sessions = append(sessions, session)
  183. }
  184. }
  185. }
  186. return
  187. }
  188. // AllWithCapsNotify returns all clients with the given capabilities, and that support cap-notify.
  189. func (clients *ClientManager) AllWithCapsNotify(capabs ...caps.Capability) (sessions []*Session) {
  190. capabs = append(capabs, caps.CapNotify)
  191. clients.RLock()
  192. defer clients.RUnlock()
  193. for _, client := range clients.byNick {
  194. for _, session := range client.Sessions() {
  195. // cap-notify is implicit in cap version 302 and above
  196. if session.capabilities.HasAll(capabs...) || 302 <= session.capVersion {
  197. sessions = append(sessions, session)
  198. }
  199. }
  200. }
  201. return
  202. }
  203. // FindAll returns all clients that match the given userhost mask.
  204. func (clients *ClientManager) FindAll(userhost string) (set ClientSet) {
  205. set = make(ClientSet)
  206. userhost, err := Casefold(ExpandUserHost(userhost))
  207. if err != nil {
  208. return set
  209. }
  210. matcher := ircmatch.MakeMatch(userhost)
  211. clients.RLock()
  212. defer clients.RUnlock()
  213. for _, client := range clients.byNick {
  214. if matcher.Match(client.NickMaskCasefolded()) {
  215. set.Add(client)
  216. }
  217. }
  218. return set
  219. }
  220. //
  221. // usermask to regexp
  222. //
  223. //TODO(dan): move this over to generally using glob syntax instead?
  224. // kinda more expected in normal ban/etc masks, though regex is useful (probably as an extban?)
  225. // UserMaskSet holds a set of client masks and lets you match hostnames to them.
  226. type UserMaskSet struct {
  227. sync.RWMutex
  228. masks map[string]bool
  229. regexp *regexp.Regexp
  230. }
  231. // NewUserMaskSet returns a new UserMaskSet.
  232. func NewUserMaskSet() *UserMaskSet {
  233. return &UserMaskSet{
  234. masks: make(map[string]bool),
  235. }
  236. }
  237. // Add adds the given mask to this set.
  238. func (set *UserMaskSet) Add(mask string) (added bool) {
  239. casefoldedMask, err := Casefold(mask)
  240. if err != nil {
  241. log.Println(fmt.Sprintf("ERROR: Could not add mask to usermaskset: [%s]", mask))
  242. return false
  243. }
  244. set.Lock()
  245. added = !set.masks[casefoldedMask]
  246. if added {
  247. set.masks[casefoldedMask] = true
  248. }
  249. set.Unlock()
  250. if added {
  251. set.setRegexp()
  252. }
  253. return
  254. }
  255. // AddAll adds the given masks to this set.
  256. func (set *UserMaskSet) AddAll(masks []string) (added bool) {
  257. set.Lock()
  258. defer set.Unlock()
  259. for _, mask := range masks {
  260. if !added && !set.masks[mask] {
  261. added = true
  262. }
  263. set.masks[mask] = true
  264. }
  265. if added {
  266. set.setRegexp()
  267. }
  268. return
  269. }
  270. // Remove removes the given mask from this set.
  271. func (set *UserMaskSet) Remove(mask string) (removed bool) {
  272. set.Lock()
  273. removed = set.masks[mask]
  274. if removed {
  275. delete(set.masks, mask)
  276. }
  277. set.Unlock()
  278. if removed {
  279. set.setRegexp()
  280. }
  281. return
  282. }
  283. // Match matches the given n!u@h.
  284. func (set *UserMaskSet) Match(userhost string) bool {
  285. set.RLock()
  286. regexp := set.regexp
  287. set.RUnlock()
  288. if regexp == nil {
  289. return false
  290. }
  291. return regexp.MatchString(userhost)
  292. }
  293. // String returns the masks in this set.
  294. func (set *UserMaskSet) String() string {
  295. set.RLock()
  296. masks := make([]string, len(set.masks))
  297. index := 0
  298. for mask := range set.masks {
  299. masks[index] = mask
  300. index++
  301. }
  302. set.RUnlock()
  303. return strings.Join(masks, " ")
  304. }
  305. func (set *UserMaskSet) Length() int {
  306. set.RLock()
  307. defer set.RUnlock()
  308. return len(set.masks)
  309. }
  310. // setRegexp generates a regular expression from the set of user mask
  311. // strings. Masks are split at the two types of wildcards, `*` and
  312. // `?`. All the pieces are meta-escaped. `*` is replaced with `.*`,
  313. // the regexp equivalent. Likewise, `?` is replaced with `.`. The
  314. // parts are re-joined and finally all masks are joined into a big
  315. // or-expression.
  316. func (set *UserMaskSet) setRegexp() {
  317. var re *regexp.Regexp
  318. set.RLock()
  319. maskExprs := make([]string, len(set.masks))
  320. index := 0
  321. for mask := range set.masks {
  322. manyParts := strings.Split(mask, "*")
  323. manyExprs := make([]string, len(manyParts))
  324. for mindex, manyPart := range manyParts {
  325. oneParts := strings.Split(manyPart, "?")
  326. oneExprs := make([]string, len(oneParts))
  327. for oindex, onePart := range oneParts {
  328. oneExprs[oindex] = regexp.QuoteMeta(onePart)
  329. }
  330. manyExprs[mindex] = strings.Join(oneExprs, ".")
  331. }
  332. maskExprs[index] = strings.Join(manyExprs, ".*")
  333. index++
  334. }
  335. set.RUnlock()
  336. if index > 0 {
  337. expr := "^" + strings.Join(maskExprs, "|") + "$"
  338. re, _ = regexp.Compile(expr)
  339. }
  340. set.Lock()
  341. set.regexp = re
  342. set.Unlock()
  343. }