1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008 |
- // Copyright (c) 2012-2014 Jeremy Latt
- // Copyright (c) 2014-2015 Edmund Huber
- // Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
- // released under the MIT license
-
- package irc
-
- import (
- "bufio"
- "crypto/tls"
- "encoding/base64"
- "errors"
- "fmt"
- "log"
- "math/rand"
- "net"
- "net/http"
- "os"
- "os/signal"
- "strconv"
- "strings"
- "sync"
- "syscall"
- "time"
-
- "github.com/DanielOaks/girc-go/ircmsg"
- "github.com/DanielOaks/oragono/irc/logger"
- "github.com/tidwall/buntdb"
- )
-
- var (
- // cached because this may be used lots
- tooManyClientsMsg = ircmsg.MakeMessage(nil, "", "ERROR", "Too many clients from your network")
- tooManyClientsBytes, _ = tooManyClientsMsg.Line()
-
- bannedFromServerMsg = ircmsg.MakeMessage(nil, "", "ERROR", "You are banned from this server (%s)")
- bannedFromServerBytes, _ = bannedFromServerMsg.Line()
-
- errDbOutOfDate = errors.New("Database schema is old")
- )
-
- // Limits holds the maximum limits for various things such as topic lengths.
- type Limits struct {
- AwayLen int
- ChannelLen int
- KickLen int
- MonitorEntries int
- NickLen int
- TopicLen int
- ChanListModes int
- LineLen LineLenLimits
- }
-
- // LineLenLimits holds the maximum limits for IRC lines.
- type LineLenLimits struct {
- Tags int
- Rest int
- }
-
- // ListenerInterface represents an interface for a listener.
- type ListenerInterface struct {
- Listener net.Listener
- Events chan ListenerEvent
- }
-
- const (
- // DestroyListener instructs the listener to destroy itself.
- DestroyListener ListenerEventType = iota
- // UpdateListener instructs the listener to update itself (grab new certs, etc).
- UpdateListener = iota
- )
-
- // ListenerEventType is the type of event this is.
- type ListenerEventType int
-
- // ListenerEvent is an event that's passed to the listener.
- type ListenerEvent struct {
- Type ListenerEventType
- NewConfig *tls.Config
- }
-
- // Server is the main Oragono server.
- type Server struct {
- accountAuthenticationEnabled bool
- accountRegistration *AccountRegistration
- accounts map[string]*ClientAccount
- channelRegistrationEnabled bool
- channels ChannelNameMap
- checkIdent bool
- clients *ClientLookupSet
- commands chan Command
- configFilename string
- connectionLimits *ConnectionLimits
- connectionLimitsMutex sync.Mutex // used when affecting the connection limiter, to make sure rehashing doesn't make things go out-of-whack
- connectionThrottle *ConnectionThrottle
- connectionThrottleMutex sync.Mutex // used when affecting the connection limiter, to make sure rehashing doesn't make things go out-of-whack
- ctime time.Time
- currentOpers map[*Client]bool
- dlines *DLineManager
- idle chan *Client
- isupport *ISupportList
- klines *KLineManager
- limits Limits
- listenerEventActMutex sync.Mutex
- listeners map[string]ListenerInterface
- listenerUpdateMutex sync.Mutex
- logger *logger.Manager
- MaxSendQBytes uint64
- monitoring map[string][]Client
- motdLines []string
- name string
- nameCasefolded string
- networkName string
- newConns chan clientConn
- operators map[string]Oper
- operclasses map[string]OperClass
- password []byte
- passwords *PasswordManager
- registeredChannels map[string]*RegisteredChannel
- registeredChannelsMutex sync.RWMutex
- rehashMutex sync.Mutex
- rehashSignal chan os.Signal
- restAPI *RestAPIConfig
- signals chan os.Signal
- store *buntdb.DB
- stsEnabled bool
- whoWas *WhoWasList
- }
-
- var (
- // ServerExitSignals are the signals the server will exit on.
- ServerExitSignals = []os.Signal{
- syscall.SIGINT,
- syscall.SIGTERM,
- syscall.SIGQUIT,
- }
- )
-
- type clientConn struct {
- Conn net.Conn
- IsTLS bool
- }
-
- // NewServer returns a new Oragono server.
- func NewServer(configFilename string, config *Config, logger *logger.Manager) (*Server, error) {
- casefoldedName, err := Casefold(config.Server.Name)
- if err != nil {
- return nil, fmt.Errorf("Server name isn't valid [%s]: %s", config.Server.Name, err.Error())
- }
-
- // startup check that we have HELP entries for every command
- for name := range Commands {
- _, exists := Help[strings.ToLower(name)]
- if !exists {
- return nil, fmt.Errorf("Help entry does not exist for command %s", name)
- }
- }
-
- if config.Accounts.AuthenticationEnabled {
- SupportedCapabilities[SASL] = true
- }
-
- if config.Server.STS.Enabled {
- SupportedCapabilities[STS] = true
- CapValues[STS] = config.Server.STS.Value()
- }
-
- if config.Limits.LineLen.Tags > 512 || config.Limits.LineLen.Rest > 512 {
- SupportedCapabilities[MaxLine] = true
- CapValues[MaxLine] = fmt.Sprintf("%d,%d", config.Limits.LineLen.Tags, config.Limits.LineLen.Rest)
- }
-
- operClasses, err := config.OperatorClasses()
- if err != nil {
- return nil, fmt.Errorf("Error loading oper classes: %s", err.Error())
- }
- opers, err := config.Operators(operClasses)
- if err != nil {
- return nil, fmt.Errorf("Error loading operators: %s", err.Error())
- }
-
- connectionLimits, err := NewConnectionLimits(config.Server.ConnectionLimits)
- if err != nil {
- return nil, fmt.Errorf("Error loading connection limits: %s", err.Error())
- }
- connectionThrottle, err := NewConnectionThrottle(config.Server.ConnectionThrottle)
- if err != nil {
- return nil, fmt.Errorf("Error loading connection throttler: %s", err.Error())
- }
-
- server := &Server{
- accountAuthenticationEnabled: config.Accounts.AuthenticationEnabled,
- accounts: make(map[string]*ClientAccount),
- channelRegistrationEnabled: config.Channels.Registration.Enabled,
- channels: NewChannelNameMap(),
- checkIdent: config.Server.CheckIdent,
- clients: NewClientLookupSet(),
- commands: make(chan Command),
- configFilename: configFilename,
- connectionLimits: connectionLimits,
- connectionThrottle: connectionThrottle,
- ctime: time.Now(),
- currentOpers: make(map[*Client]bool),
- idle: make(chan *Client),
- limits: Limits{
- AwayLen: int(config.Limits.AwayLen),
- ChannelLen: int(config.Limits.ChannelLen),
- KickLen: int(config.Limits.KickLen),
- MonitorEntries: int(config.Limits.MonitorEntries),
- NickLen: int(config.Limits.NickLen),
- TopicLen: int(config.Limits.TopicLen),
- ChanListModes: int(config.Limits.ChanListModes),
- LineLen: LineLenLimits{
- Tags: config.Limits.LineLen.Tags,
- Rest: config.Limits.LineLen.Rest,
- },
- },
- listeners: make(map[string]ListenerInterface),
- logger: logger,
- MaxSendQBytes: config.Server.MaxSendQBytes,
- monitoring: make(map[string][]Client),
- name: config.Server.Name,
- nameCasefolded: casefoldedName,
- networkName: config.Network.Name,
- newConns: make(chan clientConn),
- operators: opers,
- operclasses: *operClasses,
- registeredChannels: make(map[string]*RegisteredChannel),
- rehashSignal: make(chan os.Signal, 1),
- restAPI: &config.Server.RestAPI,
- signals: make(chan os.Signal, len(ServerExitSignals)),
- stsEnabled: config.Server.STS.Enabled,
- whoWas: NewWhoWasList(config.Limits.WhowasEntries),
- }
-
- // open data store
- server.logger.Debug("startup", "Opening datastore")
- db, err := buntdb.Open(config.Datastore.Path)
- if err != nil {
- return nil, fmt.Errorf("Failed to open datastore: %s", err.Error())
- }
- server.store = db
-
- // check db version
- err = server.store.View(func(tx *buntdb.Tx) error {
- version, _ := tx.Get(keySchemaVersion)
- if version != latestDbSchema {
- logger.Error("startup", "server", fmt.Sprintf("Database must be updated. Expected schema v%s, got v%s.", latestDbSchema, version))
- return errDbOutOfDate
- }
- return nil
- })
- if err != nil {
- // close the db
- db.Close()
- return nil, errDbOutOfDate
- }
-
- // load *lines
- server.logger.Debug("startup", "Loading D/Klines")
- server.loadDLines()
- server.loadKLines()
-
- // load password manager
- server.logger.Debug("startup", "Loading passwords")
- err = server.store.View(func(tx *buntdb.Tx) error {
- saltString, err := tx.Get(keySalt)
- if err != nil {
- return fmt.Errorf("Could not retrieve salt string: %s", err.Error())
- }
-
- salt, err := base64.StdEncoding.DecodeString(saltString)
- if err != nil {
- return err
- }
-
- pwm := NewPasswordManager(salt)
- server.passwords = &pwm
- return nil
- })
- if err != nil {
- return nil, fmt.Errorf("Could not load salt: %s", err.Error())
- }
-
- server.logger.Debug("startup", "Loading MOTD")
- if config.Server.MOTD != "" {
- file, err := os.Open(config.Server.MOTD)
- if err == nil {
- defer file.Close()
-
- reader := bufio.NewReader(file)
- for {
- line, err := reader.ReadString('\n')
- if err != nil {
- break
- }
- line = strings.TrimRight(line, "\r\n")
- // "- " is the required prefix for MOTD, we just add it here to make
- // bursting it out to clients easier
- line = fmt.Sprintf("- %s", line)
-
- server.motdLines = append(server.motdLines, line)
- }
- }
- }
-
- if config.Server.Password != "" {
- server.password = config.Server.PasswordBytes()
- }
-
- for _, addr := range config.Server.Listen {
- server.createListener(addr, config.TLSListeners())
- }
-
- if config.Server.Wslisten != "" {
- server.wslisten(config.Server.Wslisten, config.Server.TLSListeners)
- }
-
- // registration
- accountReg := NewAccountRegistration(config.Accounts.Registration)
- server.accountRegistration = &accountReg
-
- // Attempt to clean up when receiving these signals.
- signal.Notify(server.signals, ServerExitSignals...)
- signal.Notify(server.rehashSignal, syscall.SIGHUP)
-
- server.setISupport()
-
- // start API if enabled
- if server.restAPI.Enabled {
- logger.Info("startup", "server", fmt.Sprintf("%s rest API started on %s.", server.name, server.restAPI.Listen))
- server.startRestAPI()
- }
-
- return server, nil
- }
-
- // setISupport sets up our RPL_ISUPPORT reply.
- func (server *Server) setISupport() {
- maxTargetsString := strconv.Itoa(maxTargets)
-
- // add RPL_ISUPPORT tokens
- server.isupport = NewISupportList()
- server.isupport.Add("AWAYLEN", strconv.Itoa(server.limits.AwayLen))
- server.isupport.Add("CASEMAPPING", casemappingName)
- server.isupport.Add("CHANMODES", strings.Join([]string{Modes{BanMask, ExceptMask, InviteMask}.String(), "", Modes{UserLimit, Key}.String(), Modes{InviteOnly, Moderated, NoOutside, OpOnlyTopic, ChanRoleplaying, Secret}.String()}, ","))
- server.isupport.Add("CHANNELLEN", strconv.Itoa(server.limits.ChannelLen))
- server.isupport.Add("CHANTYPES", "#")
- server.isupport.Add("EXCEPTS", "")
- server.isupport.Add("INVEX", "")
- server.isupport.Add("KICKLEN", strconv.Itoa(server.limits.KickLen))
- server.isupport.Add("MAXLIST", fmt.Sprintf("beI:%s", strconv.Itoa(server.limits.ChanListModes)))
- server.isupport.Add("MAXTARGETS", maxTargetsString)
- server.isupport.Add("MODES", "")
- server.isupport.Add("MONITOR", strconv.Itoa(server.limits.MonitorEntries))
- server.isupport.Add("NETWORK", server.networkName)
- server.isupport.Add("NICKLEN", strconv.Itoa(server.limits.NickLen))
- server.isupport.Add("PREFIX", "(qaohv)~&@%+")
- server.isupport.Add("RPCHAN", "E")
- server.isupport.Add("RPUSER", "E")
- server.isupport.Add("STATUSMSG", "~&@%+")
- server.isupport.Add("TARGMAX", fmt.Sprintf("NAMES:1,LIST:1,KICK:1,WHOIS:1,USERHOST:10,PRIVMSG:%s,TAGMSG:%s,NOTICE:%s,MONITOR:", maxTargetsString, maxTargetsString, maxTargetsString))
- server.isupport.Add("TOPICLEN", strconv.Itoa(server.limits.TopicLen))
-
- // account registration
- if server.accountRegistration.Enabled {
- // 'none' isn't shown in the REGCALLBACKS vars
- var enabledCallbacks []string
- for _, name := range server.accountRegistration.EnabledCallbacks {
- if name != "*" {
- enabledCallbacks = append(enabledCallbacks, name)
- }
- }
-
- server.isupport.Add("REGCOMMANDS", "CREATE,VERIFY")
- server.isupport.Add("REGCALLBACKS", strings.Join(enabledCallbacks, ","))
- server.isupport.Add("REGCREDTYPES", "passphrase,certfp")
- }
-
- server.isupport.RegenerateCachedReply()
- }
-
- func loadChannelList(channel *Channel, list string, maskMode Mode) {
- if list == "" {
- return
- }
- channel.lists[maskMode].AddAll(strings.Split(list, " "))
- }
-
- // Shutdown shuts down the server.
- func (server *Server) Shutdown() {
- //TODO(dan): Make sure we disallow new nicks
- server.clients.ByNickMutex.RLock()
- for _, client := range server.clients.ByNick {
- client.Notice("Server is shutting down")
- }
- server.clients.ByNickMutex.RUnlock()
-
- if err := server.store.Close(); err != nil {
- server.logger.Error("shutdown", fmt.Sprintln("Could not close datastore:", err))
- }
- }
-
- // Run starts the server.
- func (server *Server) Run() {
- // defer closing db/store
- defer server.store.Close()
-
- done := false
- for !done {
- select {
- case <-server.signals:
- server.Shutdown()
- done = true
-
- case <-server.rehashSignal:
- server.logger.Info("rehash", "Rehashing due to SIGHUP")
- err := server.rehash()
- if err != nil {
- server.logger.Error("rehash", fmt.Sprintln("Failed to rehash:", err.Error()))
- }
-
- case conn := <-server.newConns:
- // check connection limits
- ipaddr := net.ParseIP(IPString(conn.Conn.RemoteAddr()))
- if ipaddr != nil {
- // check DLINEs
- isBanned, info := server.dlines.CheckIP(ipaddr)
- if isBanned {
- banMessage := fmt.Sprintf(bannedFromServerBytes, info.Reason)
- if info.Time != nil {
- banMessage += fmt.Sprintf(" [%s]", info.Time.Duration.String())
- }
- conn.Conn.Write([]byte(banMessage))
- conn.Conn.Close()
- continue
- }
-
- // check connection limits
- server.connectionLimitsMutex.Lock()
- err := server.connectionLimits.AddClient(ipaddr, false)
- server.connectionLimitsMutex.Unlock()
- if err != nil {
- // too many connections from one client, tell the client and close the connection
- // this might not show up properly on some clients, but our objective here is just to close it out before it has a load impact on us
- conn.Conn.Write([]byte(tooManyClientsBytes))
- conn.Conn.Close()
- continue
- }
-
- // check connection throttle
- server.connectionThrottleMutex.Lock()
- err = server.connectionThrottle.AddClient(ipaddr)
- server.connectionThrottleMutex.Unlock()
- if err != nil {
- // too many connections too quickly from client, tell them and close the connection
- length := &IPRestrictTime{
- Duration: server.connectionThrottle.BanDuration,
- Expires: time.Now().Add(server.connectionThrottle.BanDuration),
- }
- server.dlines.AddIP(ipaddr, length, server.connectionThrottle.BanMessage, "Exceeded automated connection throttle")
-
- // reset ban on connectionThrottle
- server.connectionThrottle.ResetFor(ipaddr)
-
- // this might not show up properly on some clients, but our objective here is just to close it out before it has a load impact on us
- conn.Conn.Write([]byte(server.connectionThrottle.BanMessageBytes))
- conn.Conn.Close()
- continue
- }
-
- server.logger.Debug("localconnect-ip", fmt.Sprintf("Client connecting from %v", ipaddr))
-
- go NewClient(server, conn.Conn, conn.IsTLS)
- continue
- }
-
- case client := <-server.idle:
- client.Idle()
- }
- }
- }
-
- //
- // IRC protocol listeners
- //
-
- // createListener starts the given listeners.
- func (server *Server) createListener(addr string, tlsMap map[string]*tls.Config) {
- config, listenTLS := tlsMap[addr]
-
- _, alreadyExists := server.listeners[addr]
- if alreadyExists {
- log.Fatal(server, "listener already exists:", addr)
- }
-
- // make listener event channel
- listenerEventChannel := make(chan ListenerEvent, 1)
-
- // make listener
- listener, err := net.Listen("tcp", addr)
- if err != nil {
- log.Fatal(server, "listen error: ", err)
- }
-
- tlsString := "plaintext"
- if listenTLS {
- config.ClientAuth = tls.RequestClientCert
- listener = tls.NewListener(listener, config)
- tlsString = "TLS"
- }
-
- // throw our details to the server so we can be modified/killed later
- li := ListenerInterface{
- Events: listenerEventChannel,
- Listener: listener,
- }
- server.listeners[addr] = li
-
- // start listening
- server.logger.Info("listeners", fmt.Sprintf("listening on %s using %s.", addr, tlsString))
-
- // setup accept goroutine
- go func() {
- for {
- conn, err := listener.Accept()
-
- if err == nil {
- newConn := clientConn{
- Conn: conn,
- IsTLS: listenTLS,
- }
-
- server.newConns <- newConn
- }
-
- select {
- case event := <-server.listeners[addr].Events:
- // this is used to confirm that whoever passed us this event has closed the existing listener correctly (in an attempt to get us to notice the event).
- // this is required to keep REHASH from having a very small race possibility of killing the primary listener
- server.listenerEventActMutex.Lock()
- server.listenerEventActMutex.Unlock()
-
- if event.Type == DestroyListener {
- // listener should already be closed, this is just for safety
- listener.Close()
- return
- } else if event.Type == UpdateListener {
- // close old listener
- listener.Close()
-
- // make new listener
- listener, err = net.Listen("tcp", addr)
- if err != nil {
- log.Fatal(server, "listen error: ", err)
- }
-
- tlsString := "plaintext"
- if event.NewConfig != nil {
- config = event.NewConfig
- config.ClientAuth = tls.RequestClientCert
- listener = tls.NewListener(listener, config)
- tlsString = "TLS"
- }
-
- // update server ListenerInterface
- li.Listener = listener
- server.listenerUpdateMutex.Lock()
- server.listeners[addr] = li
- server.listenerUpdateMutex.Unlock()
-
- // print notice
- server.logger.Info("listeners", fmt.Sprintf("updated listener %s using %s.", addr, tlsString))
- }
- default:
- // no events waiting for us, fall-through and continue
- }
- }
- }()
- }
-
- //
- // websocket listen goroutine
- //
-
- func (server *Server) wslisten(addr string, tlsMap map[string]*TLSListenConfig) {
- http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
- if r.Method != "GET" {
- server.logger.Error("ws", addr, fmt.Sprintf("%s method not allowed", r.Method))
- return
- }
-
- // We don't have any subprotocols, so if someone attempts to `new
- // WebSocket(server, "subprotocol")` they'll break here, instead of
- // getting the default, ambiguous, response from gorilla.
- if v, ok := r.Header["Sec-Websocket-Protocol"]; ok {
- http.Error(w, fmt.Sprintf("WebSocket subprocotols (e.g. %s) not supported", v), 400)
- }
-
- ws, err := upgrader.Upgrade(w, r, nil)
- if err != nil {
- server.logger.Error("ws", addr, fmt.Sprintf("%s websocket upgrade error: %s", server.name, err))
- return
- }
-
- newConn := clientConn{
- Conn: WSContainer{ws},
- IsTLS: false, //TODO(dan): track TLS or not here properly
- }
- server.newConns <- newConn
- })
- go func() {
- config, listenTLS := tlsMap[addr]
-
- tlsString := "plaintext"
- var err error
- if listenTLS {
- tlsString = "TLS"
- }
- server.logger.Info("listeners", fmt.Sprintf("websocket listening on %s using %s.", addr, tlsString))
-
- if listenTLS {
- err = http.ListenAndServeTLS(addr, config.Cert, config.Key, nil)
- } else {
- err = http.ListenAndServe(addr, nil)
- }
- if err != nil {
- server.logger.Error("listeners", fmt.Sprintf("listenAndServe error [%s]: %s", tlsString, err))
- }
- }()
- }
-
- // generateMessageID returns a network-unique message ID.
- func (server *Server) generateMessageID() string {
- return fmt.Sprintf("%s-%s", strconv.FormatInt(time.Now().UTC().UnixNano(), 10), strconv.FormatInt(rand.Int63(), 10))
- }
-
- //
- // server functionality
- //
-
- func (server *Server) tryRegister(c *Client) {
- if c.registered || !c.HasNick() || !c.HasUsername() ||
- (c.capState == CapNegotiating) {
- return
- }
-
- // check KLINEs
- isBanned, info := server.klines.CheckMasks(c.AllNickmasks()...)
- if isBanned {
- reason := info.Reason
- if info.Time != nil {
- reason += fmt.Sprintf(" [%s]", info.Time.Duration.String())
- }
- c.Send(nil, "", "ERROR", fmt.Sprintf("You are banned from this server (%s)", reason))
- c.quitMessageSent = true
- c.destroy()
- return
- }
-
- // continue registration
- server.logger.Debug("localconnect", fmt.Sprintf("Client registered [%s]", c.nick))
- c.Register()
-
- // send welcome text
- //NOTE(dan): we specifically use the NICK here instead of the nickmask
- // see http://modern.ircdocs.horse/#rplwelcome-001 for details on why we avoid using the nickmask
- c.Send(nil, server.name, RPL_WELCOME, c.nick, fmt.Sprintf("Welcome to the Internet Relay Network %s", c.nick))
- c.Send(nil, server.name, RPL_YOURHOST, c.nick, fmt.Sprintf("Your host is %s, running version %s", server.name, Ver))
- c.Send(nil, server.name, RPL_CREATED, c.nick, fmt.Sprintf("This server was created %s", server.ctime.Format(time.RFC1123)))
- //TODO(dan): Look at adding last optional [<channel modes with a parameter>] parameter
- c.Send(nil, server.name, RPL_MYINFO, c.nick, server.name, Ver, supportedUserModesString, supportedChannelModesString)
- c.RplISupport()
- server.MOTD(c)
- c.Send(nil, c.nickMaskString, RPL_UMODEIS, c.nick, c.ModeString())
- if server.logger.DumpingRawInOut {
- c.Notice("This server is in debug mode and is logging all user I/O. If you do not wish for everything you send to be readable by the server owner(s), please disconnect.")
- }
- }
-
- // MOTD serves the Message of the Day.
- func (server *Server) MOTD(client *Client) {
- if len(server.motdLines) < 1 {
- client.Send(nil, server.name, ERR_NOMOTD, client.nick, "MOTD File is missing")
- return
- }
-
- client.Send(nil, server.name, RPL_MOTDSTART, client.nick, fmt.Sprintf("- %s Message of the day - ", server.name))
- for _, line := range server.motdLines {
- client.Send(nil, server.name, RPL_MOTD, client.nick, line)
- }
- client.Send(nil, server.name, RPL_ENDOFMOTD, client.nick, "End of MOTD command")
- }
-
- //
- // registration commands
- //
-
- // PASS <password>
- func passHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- if client.registered {
- client.Send(nil, server.name, ERR_ALREADYREGISTRED, client.nick, "You may not reregister")
- return false
- }
-
- // if no password exists, skip checking
- if len(server.password) == 0 {
- client.authorized = true
- return false
- }
-
- // check the provided password
- password := []byte(msg.Params[0])
- if ComparePassword(server.password, password) != nil {
- client.Send(nil, server.name, ERR_PASSWDMISMATCH, client.nick, "Password incorrect")
- client.Send(nil, server.name, "ERROR", "Password incorrect")
- return true
- }
-
- client.authorized = true
- return false
- }
-
- // USER <username> * 0 <realname>
- func userHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- if client.registered {
- client.Send(nil, server.name, ERR_ALREADYREGISTRED, client.nick, "You may not reregister")
- return false
- }
-
- if !client.authorized {
- client.Quit("Bad password")
- return true
- }
-
- if client.username != "" && client.realname != "" {
- return false
- }
-
- // confirm that username is valid
- //
- _, err := CasefoldName(msg.Params[0])
- if err != nil {
- client.Send(nil, "", "ERROR", "Malformed username")
- return true
- }
-
- if !client.HasUsername() {
- client.username = "~" + msg.Params[0]
- // don't bother updating nickmask here, it's not valid anyway
- }
- if client.realname == "" {
- client.realname = msg.Params[3]
- }
-
- server.tryRegister(client)
-
- return false
- }
-
- // QUIT [<reason>]
- func quitHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- reason := "Quit"
- if len(msg.Params) > 0 {
- reason += ": " + msg.Params[0]
- }
- client.Quit(reason)
- return true
- }
-
- //
- // normal commands
- //
-
- // PING <server1> [<server2>]
- func pingHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- client.Send(nil, server.name, "PONG", msg.Params...)
- return false
- }
-
- // PONG <server> [ <server2> ]
- func pongHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- // client gets touched when they send this command, so we don't need to do anything
- return false
- }
-
- // JOIN <channel>{,<channel>} [<key>{,<key>}]
- // JOIN 0
- func joinHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- // handle JOIN 0
- if msg.Params[0] == "0" {
- for channel := range client.channels {
- channel.Part(client, client.nickCasefolded)
- }
- return false
- }
-
- // handle regular JOINs
- channels := strings.Split(msg.Params[0], ",")
- var keys []string
- if len(msg.Params) > 1 {
- keys = strings.Split(msg.Params[1], ",")
- }
-
- for i, name := range channels {
- casefoldedName, err := CasefoldChannel(name)
- if err != nil {
- if len(name) > 0 {
- client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, name, "No such channel")
- }
- continue
- }
-
- channel := server.channels.Get(casefoldedName)
- if channel == nil {
- if len(casefoldedName) > server.limits.ChannelLen {
- client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, name, "No such channel")
- continue
- }
- channel = NewChannel(server, name, true)
- }
-
- var key string
- if len(keys) > i {
- key = keys[i]
- }
-
- channel.Join(client, key)
- }
- return false
- }
-
- // PART <channel>{,<channel>} [<reason>]
- func partHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- channels := strings.Split(msg.Params[0], ",")
- var reason string //TODO(dan): if this isn't supplied here, make sure the param doesn't exist in the PART message sent to other users
- if len(msg.Params) > 1 {
- reason = msg.Params[1]
- }
-
- for _, chname := range channels {
- casefoldedChannelName, err := CasefoldChannel(chname)
- channel := server.channels.Get(casefoldedChannelName)
-
- if err != nil || channel == nil {
- if len(chname) > 0 {
- client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, "No such channel")
- }
- continue
- }
-
- channel.Part(client, reason)
- }
- return false
- }
-
- // TOPIC <channel> [<topic>]
- func topicHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- name, err := CasefoldChannel(msg.Params[0])
- channel := server.channels.Get(name)
- if err != nil || channel == nil {
- if len(msg.Params[0]) > 0 {
- client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, msg.Params[0], "No such channel")
- }
- return false
- }
-
- if len(msg.Params) > 1 {
- channel.SetTopic(client, msg.Params[1])
- } else {
- channel.GetTopic(client)
- }
- return false
- }
-
- func wordWrap(text string, lineWidth int) []string {
- var lines []string
- var cacheLine, cacheWord string
-
- for _, char := range text {
- if (char == ' ' || char == '-') && len(cacheLine)+len(cacheWord)+1 < lineWidth {
- cacheLine += cacheWord + string(char)
- cacheWord = ""
- } else if len(cacheLine)+len(cacheWord)+1 >= lineWidth {
- if len(cacheLine) < (lineWidth / 2) {
- // there must be a really long word or something, just split on word boundary
- cacheLine += cacheWord + string(char)
- cacheWord = ""
- }
- lines = append(lines, cacheLine)
- cacheLine = ""
- } else {
- cacheWord += string(char)
- }
- }
- if len(cacheWord) > 0 {
- cacheLine += cacheWord
- }
- if len(cacheLine) > 0 {
- lines = append(lines, cacheLine)
- }
-
- return lines
- }
-
- // SplitMessage represents a message that's been split for sending.
- type SplitMessage struct {
- For512 []string
- ForMaxLine string
- }
-
- func (server *Server) splitMessage(original string, origIs512 bool) SplitMessage {
- var newSplit SplitMessage
-
- newSplit.ForMaxLine = original
-
- if !origIs512 {
- newSplit.For512 = wordWrap(original, 400)
- } else {
- newSplit.For512 = []string{original}
- }
-
- return newSplit
- }
-
- // PRIVMSG <target>{,<target>} <message>
- func privmsgHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- clientOnlyTags := GetClientOnlyTags(msg.Tags)
- targets := strings.Split(msg.Params[0], ",")
- message := msg.Params[1]
-
- // split privmsg
- splitMsg := server.splitMessage(message, !client.capabilities[MaxLine])
-
- for i, targetString := range targets {
- // max of four targets per privmsg
- if i > maxTargets-1 {
- break
- }
- prefixes, targetString := SplitChannelMembershipPrefixes(targetString)
- lowestPrefix := GetLowestChannelModePrefix(prefixes)
-
- // eh, no need to notify them
- if len(targetString) < 1 {
- continue
- }
-
- target, err := CasefoldChannel(targetString)
- if err == nil {
- channel := server.channels.Get(target)
- if channel == nil {
- client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, targetString, "No such channel")
- continue
- }
- if !channel.CanSpeak(client) {
- client.Send(nil, client.server.name, ERR_CANNOTSENDTOCHAN, channel.name, "Cannot send to channel")
- continue
- }
- msgid := server.generateMessageID()
- channel.SplitPrivMsg(msgid, lowestPrefix, clientOnlyTags, client, splitMsg)
- } else {
- target, err = CasefoldName(targetString)
- if target == "chanserv" {
- server.chanservReceivePrivmsg(client, message)
- continue
- } else if target == "nickserv" {
- server.nickservReceivePrivmsg(client, message)
- continue
- }
- user := server.clients.Get(target)
- if err != nil || user == nil {
- if len(target) > 0 {
- client.Send(nil, server.name, ERR_NOSUCHNICK, target, "No such nick")
- }
- continue
- }
- if !user.capabilities[MessageTags] {
- clientOnlyTags = nil
- }
- msgid := server.generateMessageID()
- user.SendSplitMsgFromClient(msgid, client, clientOnlyTags, "PRIVMSG", user.nick, splitMsg)
- if client.capabilities[EchoMessage] {
- client.SendSplitMsgFromClient(msgid, client, clientOnlyTags, "PRIVMSG", user.nick, splitMsg)
- }
- if user.flags[Away] {
- //TODO(dan): possibly implement cooldown of away notifications to users
- client.Send(nil, server.name, RPL_AWAY, user.nick, user.awayMessage)
- }
- }
- }
- return false
- }
-
- // TAGMSG <target>{,<target>}
- func tagmsgHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- clientOnlyTags := GetClientOnlyTags(msg.Tags)
- // no client-only tags, so we can drop it
- if clientOnlyTags == nil {
- return false
- }
-
- targets := strings.Split(msg.Params[0], ",")
-
- for i, targetString := range targets {
- // max of four targets per privmsg
- if i > maxTargets-1 {
- break
- }
- prefixes, targetString := SplitChannelMembershipPrefixes(targetString)
- lowestPrefix := GetLowestChannelModePrefix(prefixes)
-
- // eh, no need to notify them
- if len(targetString) < 1 {
- continue
- }
-
- target, err := CasefoldChannel(targetString)
- if err == nil {
- channel := server.channels.Get(target)
- if channel == nil {
- client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, targetString, "No such channel")
- continue
- }
- if !channel.CanSpeak(client) {
- client.Send(nil, client.server.name, ERR_CANNOTSENDTOCHAN, channel.name, "Cannot send to channel")
- continue
- }
- msgid := server.generateMessageID()
-
- channel.TagMsg(msgid, lowestPrefix, clientOnlyTags, client)
- } else {
- target, err = CasefoldName(targetString)
- user := server.clients.Get(target)
- if err != nil || user == nil {
- if len(target) > 0 {
- client.Send(nil, server.name, ERR_NOSUCHNICK, target, "No such nick")
- }
- continue
- }
- msgid := server.generateMessageID()
-
- // end user can't receive tagmsgs
- if !user.capabilities[MessageTags] {
- continue
- }
- user.SendFromClient(msgid, client, clientOnlyTags, "TAGMSG", user.nick)
- if client.capabilities[EchoMessage] {
- client.SendFromClient(msgid, client, clientOnlyTags, "TAGMSG", user.nick)
- }
- if user.flags[Away] {
- //TODO(dan): possibly implement cooldown of away notifications to users
- client.Send(nil, server.name, RPL_AWAY, user.nick, user.awayMessage)
- }
- }
- }
- return false
- }
-
- // WhoisChannelsNames returns the common channel names between two users.
- func (client *Client) WhoisChannelsNames(target *Client) []string {
- isMultiPrefix := target.capabilities[MultiPrefix]
- var chstrs []string
- index := 0
- for channel := range client.channels {
- channel.membersMutex.RLock()
- defer channel.membersMutex.RUnlock()
-
- // channel is secret and the target can't see it
- if !target.flags[Operator] && channel.flags[Secret] && !channel.members.Has(target) {
- continue
- }
- chstrs = append(chstrs, channel.members[client].Prefixes(isMultiPrefix)+channel.name)
- index++
- }
- return chstrs
- }
-
- // WHOIS [ <target> ] <mask> *( "," <mask> )
- func whoisHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- var masksString string
- //var target string
-
- if len(msg.Params) > 1 {
- //target = msg.Params[0]
- masksString = msg.Params[1]
- } else {
- masksString = msg.Params[0]
- }
-
- if len(strings.TrimSpace(masksString)) < 1 {
- client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, msg.Command, "No masks given")
- return false
- }
-
- if client.flags[Operator] {
- masks := strings.Split(masksString, ",")
- for _, mask := range masks {
- casefoldedMask, err := Casefold(mask)
- if err != nil {
- client.Send(nil, client.server.name, ERR_NOSUCHNICK, mask, "No such nick")
- continue
- }
- matches := server.clients.FindAll(casefoldedMask)
- if len(matches) == 0 {
- client.Send(nil, client.server.name, ERR_NOSUCHNICK, mask, "No such nick")
- continue
- }
- for mclient := range matches {
- client.getWhoisOf(mclient)
- }
- }
- } else {
- // only get the first request
- casefoldedMask, err := Casefold(strings.Split(masksString, ",")[0])
- mclient := server.clients.Get(casefoldedMask)
- if err != nil || mclient == nil {
- client.Send(nil, client.server.name, ERR_NOSUCHNICK, masksString, "No such nick")
- // fall through, ENDOFWHOIS is always sent
- } else {
- client.getWhoisOf(mclient)
- }
- }
- client.Send(nil, server.name, RPL_ENDOFWHOIS, client.nick, masksString, "End of /WHOIS list")
- return false
- }
-
- func (client *Client) getWhoisOf(target *Client) {
- client.Send(nil, client.server.name, RPL_WHOISUSER, client.nick, target.nick, target.username, target.hostname, "*", target.realname)
-
- whoischannels := client.WhoisChannelsNames(target)
- if whoischannels != nil {
- client.Send(nil, client.server.name, RPL_WHOISCHANNELS, client.nick, target.nick, strings.Join(whoischannels, " "))
- }
- if target.class != nil {
- client.Send(nil, client.server.name, RPL_WHOISOPERATOR, client.nick, target.nick, target.whoisLine)
- }
- if target.certfp != "" && (client.flags[Operator] || client == target) {
- client.Send(nil, client.server.name, RPL_WHOISCERTFP, client.nick, target.nick, fmt.Sprintf("has client certificate fingerprint %s", target.certfp))
- }
- client.Send(nil, client.server.name, RPL_WHOISIDLE, client.nick, target.nick, strconv.FormatUint(target.IdleSeconds(), 10), strconv.FormatInt(target.SignonTime(), 10), "seconds idle, signon time")
- }
-
- // RplWhoReplyNoMutex returns the WHO reply between one user and another channel/user.
- // <channel> <user> <host> <server> <nick> ( "H" / "G" ) ["*"] [ ( "@" / "+" ) ]
- // :<hopcount> <real name>
- func (target *Client) RplWhoReplyNoMutex(channel *Channel, client *Client) {
- channelName := "*"
- flags := ""
-
- if client.flags[Away] {
- flags = "G"
- } else {
- flags = "H"
- }
- if client.flags[Operator] {
- flags += "*"
- }
-
- if channel != nil {
- flags += channel.members[client].Prefixes(target.capabilities[MultiPrefix])
- channelName = channel.name
- }
- target.Send(nil, target.server.name, RPL_WHOREPLY, target.nick, channelName, client.username, client.hostname, client.server.name, client.nick, flags, strconv.Itoa(client.hops)+" "+client.realname)
- }
-
- func whoChannel(client *Client, channel *Channel, friends ClientSet) {
- channel.membersMutex.RLock()
- defer channel.membersMutex.RUnlock()
-
- for member := range channel.members {
- if !client.flags[Invisible] || friends[client] {
- client.RplWhoReplyNoMutex(channel, member)
- }
- }
- }
-
- // WHO [ <mask> [ "o" ] ]
- func whoHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- friends := client.Friends()
-
- var mask string
- if len(msg.Params) > 0 {
- casefoldedMask, err := Casefold(msg.Params[0])
- if err != nil {
- client.Send(nil, server.name, ERR_UNKNOWNERROR, "WHO", "Mask isn't valid")
- return false
- }
- mask = casefoldedMask
- }
-
- //TODO(dan): is this used and would I put this param in the Modern doc?
- // if not, can we remove it?
- //var operatorOnly bool
- //if len(msg.Params) > 1 && msg.Params[1] == "o" {
- // operatorOnly = true
- //}
-
- if mask == "" {
- server.channels.ChansLock.RLock()
- for _, channel := range server.channels.Chans {
- whoChannel(client, channel, friends)
- }
- server.channels.ChansLock.RUnlock()
- } else if mask[0] == '#' {
- // TODO implement wildcard matching
- //TODO(dan): ^ only for opers
- channel := server.channels.Get(mask)
- if channel != nil {
- whoChannel(client, channel, friends)
- }
- } else {
- for mclient := range server.clients.FindAll(mask) {
- client.RplWhoReplyNoMutex(nil, mclient)
- }
- }
-
- client.Send(nil, server.name, RPL_ENDOFWHO, client.nick, mask, "End of WHO list")
- return false
- }
-
- // OPER <name> <password>
- func operHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- name, err := CasefoldName(msg.Params[0])
- if err != nil {
- client.Send(nil, server.name, ERR_PASSWDMISMATCH, client.nick, "Password incorrect")
- return true
- }
- hash := server.operators[name].Pass
- password := []byte(msg.Params[1])
-
- err = ComparePassword(hash, password)
-
- if (hash == nil) || (err != nil) {
- client.Send(nil, server.name, ERR_PASSWDMISMATCH, client.nick, "Password incorrect")
- return true
- }
-
- client.flags[Operator] = true
- client.operName = name
- client.class = server.operators[name].Class
- server.currentOpers[client] = true
- client.whoisLine = server.operators[name].WhoisLine
-
- // push new vhost if one is set
- if len(server.operators[name].Vhost) > 0 {
- for fClient := range client.Friends(ChgHost) {
- fClient.SendFromClient("", client, nil, "CHGHOST", client.username, server.operators[name].Vhost)
- }
- // CHGHOST requires prefix nickmask to have original hostname, so do that before updating nickmask
- client.vhost = server.operators[name].Vhost
- client.updateNickMask()
- }
-
- client.Send(nil, server.name, RPL_YOUREOPER, client.nick, "You are now an IRC operator")
- //TODO(dan): Should this be sent automagically as part of setting the flag/mode?
- modech := ModeChanges{ModeChange{
- mode: Operator,
- op: Add,
- }}
- client.Send(nil, server.name, "MODE", client.nick, modech.String())
- return false
- }
-
- // rehash reloads the config and applies the changes from the config file.
- func (server *Server) rehash() error {
- server.logger.Debug("rehash", "Starting rehash")
-
- // only let one REHASH go on at a time
- server.rehashMutex.Lock()
- defer server.rehashMutex.Unlock()
-
- server.logger.Debug("rehash", "Got rehash lock")
-
- config, err := LoadConfig(server.configFilename)
-
- if err != nil {
- return fmt.Errorf("Error rehashing config file config: %s", err.Error())
- }
-
- // line lengths cannot be changed after launching the server
- if server.limits.LineLen.Tags != config.Limits.LineLen.Tags || server.limits.LineLen.Rest != config.Limits.LineLen.Rest {
- return fmt.Errorf("Maximum line length (linelen) cannot be changed after launching the server, rehash aborted")
- }
-
- // confirm connectionLimits are fine
- connectionLimits, err := NewConnectionLimits(config.Server.ConnectionLimits)
- if err != nil {
- return fmt.Errorf("Error rehashing config file connection-limits: %s", err.Error())
- }
-
- // confirm connectionThrottler is fine
- connectionThrottle, err := NewConnectionThrottle(config.Server.ConnectionThrottle)
- if err != nil {
- return fmt.Errorf("Error rehashing config file connection-throttle: %s", err.Error())
- }
-
- // confirm operator stuff all exists and is fine
- operclasses, err := config.OperatorClasses()
- if err != nil {
- return fmt.Errorf("Error rehashing config file operclasses: %s", err.Error())
- }
- opers, err := config.Operators(operclasses)
- if err != nil {
- return fmt.Errorf("Error rehashing config file opers: %s", err.Error())
- }
- for client := range server.currentOpers {
- _, exists := opers[client.operName]
- if !exists {
- return fmt.Errorf("Oper [%s] no longer exists (used by client [%s])", client.operName, client.nickMaskString)
- }
- }
-
- // apply new connectionlimits
- server.connectionLimitsMutex.Lock()
- server.connectionLimits = connectionLimits
- server.connectionThrottleMutex.Lock()
- server.connectionThrottle = connectionThrottle
-
- server.clients.ByNickMutex.RLock()
- for _, client := range server.clients.ByNick {
- ipaddr := net.ParseIP(IPString(client.socket.conn.RemoteAddr()))
- if ipaddr != nil {
- server.connectionLimits.AddClient(ipaddr, true)
- }
- }
- server.clients.ByNickMutex.RUnlock()
- server.connectionThrottleMutex.Unlock()
- server.connectionLimitsMutex.Unlock()
-
- // setup new and removed caps
- addedCaps := make(CapabilitySet)
- removedCaps := make(CapabilitySet)
- updatedCaps := make(CapabilitySet)
-
- // SASL
- if config.Accounts.AuthenticationEnabled && !server.accountAuthenticationEnabled {
- // enabling SASL
- SupportedCapabilities[SASL] = true
- addedCaps[SASL] = true
- }
- if !config.Accounts.AuthenticationEnabled && server.accountAuthenticationEnabled {
- // disabling SASL
- SupportedCapabilities[SASL] = false
- removedCaps[SASL] = true
- }
- server.accountAuthenticationEnabled = config.Accounts.AuthenticationEnabled
-
- // STS
- stsValue := config.Server.STS.Value()
- var stsDisabled bool
- server.logger.Debug("rehash", "STS Vals", CapValues[STS], stsValue, fmt.Sprintf("server[%v] config[%v]", server.stsEnabled, config.Server.STS.Enabled))
- if config.Server.STS.Enabled && !server.stsEnabled {
- // enabling STS
- SupportedCapabilities[STS] = true
- addedCaps[STS] = true
- CapValues[STS] = stsValue
- } else if !config.Server.STS.Enabled && server.stsEnabled {
- // disabling STS
- SupportedCapabilities[STS] = false
- removedCaps[STS] = true
- stsDisabled = true
- } else if config.Server.STS.Enabled && server.stsEnabled && stsValue != CapValues[STS] {
- // STS policy updated
- CapValues[STS] = stsValue
- updatedCaps[STS] = true
- }
- server.stsEnabled = config.Server.STS.Enabled
-
- // burst new and removed caps
- var capBurstClients ClientSet
- added := make(map[CapVersion]string)
- var removed string
-
- // updated caps get DEL'd and then NEW'd
- // so, we can just add updated ones to both removed and added lists here and they'll be correctly handled
- server.logger.Debug("rehash", "Updated Caps", updatedCaps.String(Cap301), strconv.Itoa(len(updatedCaps)))
- if len(updatedCaps) > 0 {
- for capab := range updatedCaps {
- addedCaps[capab] = true
- removedCaps[capab] = true
- }
- }
-
- if len(addedCaps) > 0 || len(removedCaps) > 0 {
- capBurstClients = server.clients.AllWithCaps(CapNotify)
-
- added[Cap301] = addedCaps.String(Cap301)
- added[Cap302] = addedCaps.String(Cap302)
- // removed never has values
- removed = removedCaps.String(Cap301)
- }
-
- for sClient := range capBurstClients {
- if stsDisabled {
- // remove STS policy
- //TODO(dan): this is an ugly hack. we can write this better.
- stsPolicy := "sts=duration=0"
- if len(addedCaps) > 0 {
- added[Cap302] = added[Cap302] + " " + stsPolicy
- } else {
- addedCaps[STS] = true
- added[Cap302] = stsPolicy
- }
- }
- // DEL caps and then send NEW ones so that updated caps get removed/added correctly
- if len(removedCaps) > 0 {
- sClient.Send(nil, server.name, "CAP", sClient.nick, "DEL", removed)
- }
- if len(addedCaps) > 0 {
- sClient.Send(nil, server.name, "CAP", sClient.nick, "NEW", added[sClient.capVersion])
- }
- }
-
- // set server options
- lineLenConfig := LineLenLimits{
- Tags: config.Limits.LineLen.Tags,
- Rest: config.Limits.LineLen.Rest,
- }
- server.limits = Limits{
- AwayLen: int(config.Limits.AwayLen),
- ChannelLen: int(config.Limits.ChannelLen),
- KickLen: int(config.Limits.KickLen),
- MonitorEntries: int(config.Limits.MonitorEntries),
- NickLen: int(config.Limits.NickLen),
- TopicLen: int(config.Limits.TopicLen),
- ChanListModes: int(config.Limits.ChanListModes),
- LineLen: lineLenConfig,
- }
- server.operclasses = *operclasses
- server.operators = opers
- server.checkIdent = config.Server.CheckIdent
-
- // registration
- accountReg := NewAccountRegistration(config.Accounts.Registration)
- server.accountRegistration = &accountReg
- server.channelRegistrationEnabled = config.Channels.Registration.Enabled
-
- // set new sendqueue size
- if config.Server.MaxSendQBytes != server.MaxSendQBytes {
- server.MaxSendQBytes = config.Server.MaxSendQBytes
-
- // update on all clients
- server.clients.ByNickMutex.RLock()
- for _, sClient := range server.clients.ByNick {
- sClient.socket.MaxSendQBytes = config.Server.MaxSendQBytes
- }
- server.clients.ByNickMutex.RUnlock()
- }
-
- // set RPL_ISUPPORT
- oldISupportList := server.isupport
- server.setISupport()
- newISupportReplies := oldISupportList.GetDifference(server.isupport)
-
- // push new info to all of our clients
- server.clients.ByNickMutex.RLock()
- for _, sClient := range server.clients.ByNick {
- for _, tokenline := range newISupportReplies {
- // ugly trickery ahead
- sClient.Send(nil, server.name, RPL_ISUPPORT, append([]string{sClient.nick}, tokenline...)...)
- }
- }
- server.clients.ByNickMutex.RUnlock()
-
- // destroy old listeners
- tlsListeners := config.TLSListeners()
- for addr := range server.listeners {
- var exists bool
- for _, newaddr := range config.Server.Listen {
- if newaddr == addr {
- exists = true
- break
- }
- }
-
- server.listenerEventActMutex.Lock()
- if exists {
- // update old listener
- server.listeners[addr].Events <- ListenerEvent{
- Type: UpdateListener,
- NewConfig: tlsListeners[addr],
- }
- } else {
- // destroy nonexistent listener
- server.listeners[addr].Events <- ListenerEvent{
- Type: DestroyListener,
- }
- }
- // force listener to apply the event right away
- server.listeners[addr].Listener.Close()
-
- server.listenerEventActMutex.Unlock()
- }
-
- for _, newaddr := range config.Server.Listen {
- _, exists := server.listeners[newaddr]
- if !exists {
- // make new listener
- server.createListener(newaddr, tlsListeners)
- }
- }
-
- return nil
- }
-
- // REHASH
- func rehashHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- server.logger.Info("rehash", fmt.Sprintf("REHASH command used by %s", client.nick))
- err := server.rehash()
-
- if err == nil {
- client.Send(nil, server.name, RPL_REHASHING, client.nick, "ircd.yaml", "Rehashing")
- } else {
- server.logger.Error("rehash", fmt.Sprintln("Failed to rehash:", err.Error()))
- client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, "REHASH", err.Error())
- }
- return false
- }
-
- // AWAY [<message>]
- func awayHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- var isAway bool
- var text string
- if len(msg.Params) > 0 {
- isAway = true
- text = msg.Params[0]
- if len(text) > server.limits.AwayLen {
- text = text[:server.limits.AwayLen]
- }
- }
-
- if isAway {
- client.flags[Away] = true
- } else {
- delete(client.flags, Away)
- }
- client.awayMessage = text
-
- var op ModeOp
- if client.flags[Away] {
- op = Add
- client.Send(nil, server.name, RPL_NOWAWAY, client.nick, "You have been marked as being away")
- } else {
- op = Remove
- client.Send(nil, server.name, RPL_UNAWAY, client.nick, "You are no longer marked as being away")
- }
- //TODO(dan): Should this be sent automagically as part of setting the flag/mode?
- modech := ModeChanges{ModeChange{
- mode: Away,
- op: op,
- }}
- client.Send(nil, server.name, "MODE", client.nick, client.nick, modech.String())
-
- // dispatch away-notify
- for friend := range client.Friends(AwayNotify) {
- if client.flags[Away] {
- friend.SendFromClient("", client, nil, "AWAY", client.awayMessage)
- } else {
- friend.SendFromClient("", client, nil, "AWAY")
- }
- }
-
- return false
- }
-
- // ISON <nick>{ <nick>}
- func isonHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- var nicks = msg.Params
-
- var err error
- var casefoldedNick string
- ison := make([]string, 0)
- for _, nick := range nicks {
- casefoldedNick, err = CasefoldName(nick)
- if err != nil {
- continue
- }
- if iclient := server.clients.Get(casefoldedNick); iclient != nil {
- ison = append(ison, iclient.nick)
- }
- }
-
- client.Send(nil, server.name, RPL_ISON, client.nick, strings.Join(nicks, " "))
- return false
- }
-
- // MOTD [<target>]
- func motdHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- //TODO(dan): hook this up when we have multiple servers I guess???
- //var target string
- //if len(msg.Params) > 0 {
- // target = msg.Params[0]
- //}
-
- server.MOTD(client)
- return false
- }
-
- // NOTICE <target>{,<target>} <message>
- func noticeHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- clientOnlyTags := GetClientOnlyTags(msg.Tags)
- targets := strings.Split(msg.Params[0], ",")
- message := msg.Params[1]
-
- // split privmsg
- splitMsg := server.splitMessage(message, !client.capabilities[MaxLine])
-
- for i, targetString := range targets {
- // max of four targets per privmsg
- if i > maxTargets-1 {
- break
- }
- prefixes, targetString := SplitChannelMembershipPrefixes(targetString)
- lowestPrefix := GetLowestChannelModePrefix(prefixes)
-
- target, cerr := CasefoldChannel(targetString)
- if cerr == nil {
- channel := server.channels.Get(target)
- if channel == nil {
- // errors silently ignored with NOTICE as per RFC
- continue
- }
- if !channel.CanSpeak(client) {
- // errors silently ignored with NOTICE as per RFC
- continue
- }
- msgid := server.generateMessageID()
- channel.SplitNotice(msgid, lowestPrefix, clientOnlyTags, client, splitMsg)
- } else {
- target, err := CasefoldName(targetString)
- if err != nil {
- continue
- }
- if target == "chanserv" {
- server.chanservReceiveNotice(client, message)
- continue
- } else if target == "nickserv" {
- server.nickservReceiveNotice(client, message)
- continue
- }
-
- user := server.clients.Get(target)
- if user == nil {
- // errors silently ignored with NOTICE as per RFC
- continue
- }
- if !user.capabilities[MessageTags] {
- clientOnlyTags = nil
- }
- msgid := server.generateMessageID()
- user.SendSplitMsgFromClient(msgid, client, clientOnlyTags, "NOTICE", user.nick, splitMsg)
- if client.capabilities[EchoMessage] {
- client.SendSplitMsgFromClient(msgid, client, clientOnlyTags, "NOTICE", user.nick, splitMsg)
- }
- }
- }
- return false
- }
-
- // KICK <channel>{,<channel>} <user>{,<user>} [<comment>]
- func kickHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- channels := strings.Split(msg.Params[0], ",")
- users := strings.Split(msg.Params[1], ",")
- if (len(channels) != len(users)) && (len(users) != 1) {
- client.Send(nil, server.name, ERR_NEEDMOREPARAMS, client.nick, "KICK", "Not enough parameters")
- return false
- }
-
- var kicks [][]string
- for index, channel := range channels {
- if len(users) == 1 {
- kicks = append(kicks, []string{channel, users[0]})
- } else {
- kicks = append(kicks, []string{channel, users[index]})
- }
- }
-
- var comment string
- if len(msg.Params) > 2 {
- comment = msg.Params[2]
- }
- for _, info := range kicks {
- chname := info[0]
- nickname := info[1]
- casefoldedChname, err := CasefoldChannel(chname)
- channel := server.channels.Get(casefoldedChname)
- if err != nil || channel == nil {
- client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, "No such channel")
- continue
- }
-
- casefoldedNickname, err := CasefoldName(nickname)
- target := server.clients.Get(casefoldedNickname)
- if err != nil || target == nil {
- client.Send(nil, server.name, ERR_NOSUCHNICK, nickname, "No such nick")
- continue
- }
-
- // make sure client has privs to kick the given user
- //TODO(dan): split this into a separate function that checks if users have privs
- // over other users, useful for things like -aoh as well
- channel.membersMutex.Lock()
-
- var hasPrivs bool
- for _, mode := range ChannelPrivModes {
- if channel.members[client][mode] {
- hasPrivs = true
-
- // admins cannot kick other admins
- if mode == ChannelAdmin && channel.members[target][ChannelAdmin] {
- hasPrivs = false
- }
-
- break
- } else if channel.members[target][mode] {
- break
- }
- }
-
- if hasPrivs {
- if comment == "" {
- comment = nickname
- }
- channel.kickNoMutex(client, target, comment)
- } else {
- client.Send(nil, client.server.name, ERR_CHANOPRIVSNEEDED, chname, "You're not a channel operator")
- }
-
- channel.membersMutex.Unlock()
- }
- return false
- }
-
- // LIST [<channel>{,<channel>} [<server>]]
- func listHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- var channels []string
- if len(msg.Params) > 0 {
- channels = strings.Split(msg.Params[0], ",")
- }
- var target string
- if len(msg.Params) > 1 {
- target = msg.Params[1]
- }
-
- //TODO(dan): target server when we have multiple servers
- //TODO(dan): we should continue just fine if it's this current server though
- if target != "" {
- client.Send(nil, server.name, ERR_NOSUCHSERVER, client.nick, target, "No such server")
- return false
- }
-
- if len(channels) == 0 {
- server.channels.ChansLock.RLock()
- for _, channel := range server.channels.Chans {
- if !client.flags[Operator] && channel.flags[Secret] {
- continue
- }
- client.RplList(channel)
- }
- server.channels.ChansLock.RUnlock()
- } else {
- // limit regular users to only listing one channel
- if !client.flags[Operator] {
- channels = channels[:1]
- }
-
- for _, chname := range channels {
- casefoldedChname, err := CasefoldChannel(chname)
- channel := server.channels.Get(casefoldedChname)
- if err != nil || channel == nil || (!client.flags[Operator] && channel.flags[Secret]) {
- if len(chname) > 0 {
- client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, "No such channel")
- }
- continue
- }
- client.RplList(channel)
- }
- }
- client.Send(nil, server.name, RPL_LISTEND, client.nick, "End of LIST")
- return false
- }
-
- func (target *Client) RplList(channel *Channel) {
- channel.membersMutex.RLock()
- defer channel.membersMutex.RUnlock()
-
- // get the correct number of channel members
- var memberCount int
- if target.flags[Operator] || channel.members.Has(target) {
- memberCount = len(channel.members)
- } else {
- for member := range channel.members {
- if !member.flags[Invisible] {
- memberCount++
- }
- }
- }
-
- target.Send(nil, target.server.name, RPL_LIST, target.nick, channel.name, strconv.Itoa(memberCount), channel.topic)
- }
-
- // NAMES [<channel>{,<channel>}]
- func namesHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- var channels []string
- if len(msg.Params) > 0 {
- channels = strings.Split(msg.Params[0], ",")
- }
- //var target string
- //if len(msg.Params) > 1 {
- // target = msg.Params[1]
- //}
-
- if len(channels) == 0 {
- server.channels.ChansLock.RLock()
- for _, channel := range server.channels.Chans {
- channel.Names(client)
- }
- server.channels.ChansLock.RUnlock()
- return false
- }
-
- // limit regular users to only listing one channel
- if !client.flags[Operator] {
- channels = channels[:1]
- }
-
- for _, chname := range channels {
- casefoldedChname, err := CasefoldChannel(chname)
- channel := server.channels.Get(casefoldedChname)
- if err != nil || channel == nil {
- if len(chname) > 0 {
- client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, "No such channel")
- }
- continue
- }
- channel.Names(client)
- }
- return false
- }
-
- // VERSION [<server>]
- func versionHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- var target string
- if len(msg.Params) > 0 {
- target = msg.Params[0]
- }
- casefoldedTarget, err := Casefold(target)
- if target != "" && (err != nil || casefoldedTarget != server.nameCasefolded) {
- client.Send(nil, server.name, ERR_NOSUCHSERVER, client.nick, target, "No such server")
- return false
- }
-
- client.Send(nil, server.name, RPL_VERSION, client.nick, Ver, server.name)
- client.RplISupport()
- return false
- }
-
- // INVITE <nickname> <channel>
- func inviteHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- nickname := msg.Params[0]
- channelName := msg.Params[1]
-
- casefoldedNickname, err := CasefoldName(nickname)
- target := server.clients.Get(casefoldedNickname)
- if err != nil || target == nil {
- client.Send(nil, server.name, ERR_NOSUCHNICK, client.nick, nickname, "No such nick")
- return false
- }
-
- casefoldedChannelName, err := CasefoldChannel(channelName)
- channel := server.channels.Get(casefoldedChannelName)
- if err != nil || channel == nil {
- client.Send(nil, server.name, RPL_INVITING, client.nick, target.nick, channelName)
- target.Send(nil, client.nickMaskString, "INVITE", target.nick, channel.name)
- return true
- }
-
- channel.Invite(target, client)
- return false
- }
-
- // TIME [<server>]
- func timeHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- var target string
- if len(msg.Params) > 0 {
- target = msg.Params[0]
- }
- casefoldedTarget, err := Casefold(target)
- if (target != "") && err != nil || (casefoldedTarget != server.nameCasefolded) {
- client.Send(nil, server.name, ERR_NOSUCHSERVER, client.nick, target, "No such server")
- return false
- }
- client.Send(nil, server.name, RPL_TIME, client.nick, server.name, time.Now().Format(time.RFC1123))
- return false
- }
-
- // KILL <nickname> <comment>
- func killHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- nickname := msg.Params[0]
- comment := "<no reason supplied>"
- if len(msg.Params) > 1 {
- comment = msg.Params[1]
- }
-
- casefoldedNickname, err := CasefoldName(nickname)
- target := server.clients.Get(casefoldedNickname)
- if err != nil || target == nil {
- client.Send(nil, client.server.name, ERR_NOSUCHNICK, nickname, "No such nick")
- return false
- }
-
- quitMsg := fmt.Sprintf("Killed (%s (%s))", client.nick, comment)
- target.Quit(quitMsg)
- target.destroy()
- return false
- }
-
- // WHOWAS <nickname> [<count> [<server>]]
- func whowasHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- nicknames := strings.Split(msg.Params[0], ",")
-
- var count int64
- if len(msg.Params) > 1 {
- count, _ = strconv.ParseInt(msg.Params[1], 10, 64)
- }
- //var target string
- //if len(msg.Params) > 2 {
- // target = msg.Params[2]
- //}
- for _, nickname := range nicknames {
- results := server.whoWas.Find(nickname, count)
- if len(results) == 0 {
- if len(nickname) > 0 {
- client.Send(nil, server.name, ERR_WASNOSUCHNICK, client.nick, nickname, "There was no such nickname")
- }
- } else {
- for _, whoWas := range results {
- client.Send(nil, server.name, RPL_WHOWASUSER, client.nick, whoWas.nickname, whoWas.username, whoWas.hostname, "*", whoWas.realname)
- }
- }
- if len(nickname) > 0 {
- client.Send(nil, server.name, RPL_ENDOFWHOWAS, client.nick, nickname, "End of WHOWAS")
- }
- }
- return false
- }
-
- // LUSERS [<mask> [<server>]]
- func lusersHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- //TODO(vegax87) Fix network statistics and additional parameters
- var totalcount, invisiblecount, opercount int
-
- server.clients.ByNickMutex.RLock()
- defer server.clients.ByNickMutex.RUnlock()
-
- for _, onlineusers := range server.clients.ByNick {
- totalcount++
- if onlineusers.flags[Invisible] {
- invisiblecount++
- }
- if onlineusers.flags[Operator] {
- opercount++
- }
- }
- client.Send(nil, server.name, RPL_LUSERCLIENT, client.nick, fmt.Sprintf("There are %d users and %d invisible on %d server(s)", totalcount, invisiblecount, 1))
- client.Send(nil, server.name, RPL_LUSEROP, client.nick, fmt.Sprintf("%d IRC Operators online", opercount))
- client.Send(nil, server.name, RPL_LUSERCHANNELS, client.nick, fmt.Sprintf("%d channels formed", server.channels.Len()))
- client.Send(nil, server.name, RPL_LUSERME, client.nick, fmt.Sprintf("I have %d clients and %d servers", totalcount, 1))
- return false
- }
-
- // USERHOST <nickname> [<nickname> <nickname> ...]
- func userhostHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
- returnedNicks := make(map[string]bool)
-
- for i, nickname := range msg.Params {
- if i >= 10 {
- break
- }
-
- casefoldedNickname, err := CasefoldName(nickname)
- target := server.clients.Get(casefoldedNickname)
- if err != nil || target == nil {
- client.Send(nil, client.server.name, ERR_NOSUCHNICK, nickname, "No such nick")
- return false
- }
- if returnedNicks[casefoldedNickname] {
- continue
- }
-
- // to prevent returning multiple results for a single nick
- returnedNicks[casefoldedNickname] = true
-
- var isOper, isAway string
-
- if target.flags[Operator] {
- isOper = "*"
- }
- if target.flags[Away] {
- isAway = "-"
- } else {
- isAway = "+"
- }
- client.Send(nil, client.server.name, RPL_USERHOST, client.nick, fmt.Sprintf("%s%s=%s%s@%s", target.nick, isOper, isAway, target.username, target.hostname))
- }
-
- return false
- }
|