You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

client_lookup_set.go 10KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410
  1. // Copyright (c) 2012-2014 Jeremy Latt
  2. // Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
  3. // released under the MIT license
  4. package irc
  5. import (
  6. "fmt"
  7. "log"
  8. "regexp"
  9. "strings"
  10. "github.com/goshuirc/irc-go/ircmatch"
  11. "github.com/oragono/oragono/irc/caps"
  12. "github.com/oragono/oragono/irc/modes"
  13. "sync"
  14. )
  15. // ExpandUserHost takes a userhost, and returns an expanded version.
  16. func ExpandUserHost(userhost string) (expanded string) {
  17. expanded = userhost
  18. // fill in missing wildcards for nicks
  19. //TODO(dan): this would fail with dan@lol, fix that.
  20. if !strings.Contains(expanded, "!") {
  21. expanded += "!*"
  22. }
  23. if !strings.Contains(expanded, "@") {
  24. expanded += "@*"
  25. }
  26. return
  27. }
  28. // ClientManager keeps track of clients by nick, enforcing uniqueness of casefolded nicks
  29. type ClientManager struct {
  30. sync.RWMutex // tier 2
  31. byNick map[string]*Client
  32. bySkeleton map[string]*Client
  33. }
  34. // Initialize initializes a ClientManager.
  35. func (clients *ClientManager) Initialize() {
  36. clients.byNick = make(map[string]*Client)
  37. clients.bySkeleton = make(map[string]*Client)
  38. }
  39. // Count returns how many clients are in the manager.
  40. func (clients *ClientManager) Count() int {
  41. clients.RLock()
  42. defer clients.RUnlock()
  43. count := len(clients.byNick)
  44. return count
  45. }
  46. // Get retrieves a client from the manager, if they exist.
  47. func (clients *ClientManager) Get(nick string) *Client {
  48. casefoldedName, err := CasefoldName(nick)
  49. if err == nil {
  50. clients.RLock()
  51. defer clients.RUnlock()
  52. cli := clients.byNick[casefoldedName]
  53. return cli
  54. }
  55. return nil
  56. }
  57. func (clients *ClientManager) removeInternal(client *Client) (err error) {
  58. // requires holding the writable Lock()
  59. oldcfnick, oldskeleton := client.uniqueIdentifiers()
  60. if oldcfnick == "*" || oldcfnick == "" {
  61. return errNickMissing
  62. }
  63. currentEntry, present := clients.byNick[oldcfnick]
  64. if present {
  65. if currentEntry == client {
  66. delete(clients.byNick, oldcfnick)
  67. } else {
  68. // this shouldn't happen, but we can ignore it
  69. client.server.logger.Warning("internal", "clients for nick out of sync", oldcfnick)
  70. err = errNickMissing
  71. }
  72. } else {
  73. err = errNickMissing
  74. }
  75. currentEntry, present = clients.bySkeleton[oldskeleton]
  76. if present {
  77. if currentEntry == client {
  78. delete(clients.bySkeleton, oldskeleton)
  79. } else {
  80. client.server.logger.Warning("internal", "clients for skeleton out of sync", oldskeleton)
  81. err = errNickMissing
  82. }
  83. } else {
  84. err = errNickMissing
  85. }
  86. return
  87. }
  88. // Remove removes a client from the lookup set.
  89. func (clients *ClientManager) Remove(client *Client) error {
  90. clients.Lock()
  91. defer clients.Unlock()
  92. return clients.removeInternal(client)
  93. }
  94. // Resume atomically replaces `oldClient` with `newClient`, updating
  95. // newClient's data to match. It is the caller's responsibility first
  96. // to verify that the resume is allowed, and then later to call oldClient.destroy().
  97. func (clients *ClientManager) Resume(newClient, oldClient *Client) (err error) {
  98. clients.Lock()
  99. defer clients.Unlock()
  100. // atomically grant the new client the old nick
  101. err = clients.removeInternal(oldClient)
  102. if err != nil {
  103. // oldClient no longer owns its nick, fail out
  104. return err
  105. }
  106. // nick has been reclaimed, grant it to the new client
  107. clients.removeInternal(newClient)
  108. oldcfnick, oldskeleton := oldClient.uniqueIdentifiers()
  109. clients.byNick[oldcfnick] = newClient
  110. clients.bySkeleton[oldskeleton] = newClient
  111. newClient.copyResumeData(oldClient)
  112. return nil
  113. }
  114. // SetNick sets a client's nickname, validating it against nicknames in use
  115. func (clients *ClientManager) SetNick(client *Client, session *Session, newNick string) error {
  116. newcfnick, err := CasefoldName(newNick)
  117. if err != nil {
  118. return err
  119. }
  120. newSkeleton, err := Skeleton(newNick)
  121. if err != nil {
  122. return err
  123. }
  124. reservedAccount, method := client.server.accounts.EnforcementStatus(newcfnick, newSkeleton)
  125. account := client.Account()
  126. bouncerAllowed := client.server.accounts.BouncerAllowed(account, session)
  127. clients.Lock()
  128. defer clients.Unlock()
  129. currentClient := clients.byNick[newcfnick]
  130. // the client may just be changing case
  131. if currentClient != nil && currentClient != client {
  132. // these conditions forbid reattaching to an existing session:
  133. if client.Registered() || !bouncerAllowed || account == "" || account != currentClient.Account() || client.isTor != currentClient.isTor || client.HasMode(modes.TLS) != currentClient.HasMode(modes.TLS) {
  134. return errNicknameInUse
  135. }
  136. if !currentClient.AddSession(session) {
  137. return errNicknameInUse
  138. }
  139. // successful reattach. temporarily assign them the nick they'll have going forward
  140. // (the current `client` will be discarded at the end of command execution)
  141. client.updateNick(currentClient.Nick(), newcfnick, newSkeleton)
  142. return nil
  143. }
  144. // analogous checks for skeletons
  145. skeletonHolder := clients.bySkeleton[newSkeleton]
  146. if skeletonHolder != nil && skeletonHolder != client {
  147. return errNicknameInUse
  148. }
  149. if method == NickReservationStrict && reservedAccount != "" && reservedAccount != account {
  150. return errNicknameReserved
  151. }
  152. clients.removeInternal(client)
  153. clients.byNick[newcfnick] = client
  154. clients.bySkeleton[newSkeleton] = client
  155. client.updateNick(newNick, newcfnick, newSkeleton)
  156. return nil
  157. }
  158. func (clients *ClientManager) AllClients() (result []*Client) {
  159. clients.RLock()
  160. defer clients.RUnlock()
  161. result = make([]*Client, len(clients.byNick))
  162. i := 0
  163. for _, client := range clients.byNick {
  164. result[i] = client
  165. i++
  166. }
  167. return
  168. }
  169. // AllWithCaps returns all clients with the given capabilities.
  170. func (clients *ClientManager) AllWithCaps(capabs ...caps.Capability) (sessions []*Session) {
  171. clients.RLock()
  172. defer clients.RUnlock()
  173. for _, client := range clients.byNick {
  174. for _, session := range client.Sessions() {
  175. if session.capabilities.HasAll(capabs...) {
  176. sessions = append(sessions, session)
  177. }
  178. }
  179. }
  180. return
  181. }
  182. // AllWithCapsNotify returns all clients with the given capabilities, and that support cap-notify.
  183. func (clients *ClientManager) AllWithCapsNotify(capabs ...caps.Capability) (sessions []*Session) {
  184. capabs = append(capabs, caps.CapNotify)
  185. clients.RLock()
  186. defer clients.RUnlock()
  187. for _, client := range clients.byNick {
  188. for _, session := range client.Sessions() {
  189. // cap-notify is implicit in cap version 302 and above
  190. if session.capabilities.HasAll(capabs...) || 302 <= session.capVersion {
  191. sessions = append(sessions, session)
  192. }
  193. }
  194. }
  195. return
  196. }
  197. // FindAll returns all clients that match the given userhost mask.
  198. func (clients *ClientManager) FindAll(userhost string) (set ClientSet) {
  199. set = make(ClientSet)
  200. userhost, err := Casefold(ExpandUserHost(userhost))
  201. if err != nil {
  202. return set
  203. }
  204. matcher := ircmatch.MakeMatch(userhost)
  205. clients.RLock()
  206. defer clients.RUnlock()
  207. for _, client := range clients.byNick {
  208. if matcher.Match(client.NickMaskCasefolded()) {
  209. set.Add(client)
  210. }
  211. }
  212. return set
  213. }
  214. // Find returns the first client that matches the given userhost mask.
  215. func (clients *ClientManager) Find(userhost string) *Client {
  216. userhost, err := Casefold(ExpandUserHost(userhost))
  217. if err != nil {
  218. return nil
  219. }
  220. matcher := ircmatch.MakeMatch(userhost)
  221. var matchedClient *Client
  222. clients.RLock()
  223. defer clients.RUnlock()
  224. for _, client := range clients.byNick {
  225. if matcher.Match(client.NickMaskCasefolded()) {
  226. matchedClient = client
  227. break
  228. }
  229. }
  230. return matchedClient
  231. }
  232. //
  233. // usermask to regexp
  234. //
  235. //TODO(dan): move this over to generally using glob syntax instead?
  236. // kinda more expected in normal ban/etc masks, though regex is useful (probably as an extban?)
  237. // UserMaskSet holds a set of client masks and lets you match hostnames to them.
  238. type UserMaskSet struct {
  239. sync.RWMutex
  240. masks map[string]bool
  241. regexp *regexp.Regexp
  242. }
  243. // NewUserMaskSet returns a new UserMaskSet.
  244. func NewUserMaskSet() *UserMaskSet {
  245. return &UserMaskSet{
  246. masks: make(map[string]bool),
  247. }
  248. }
  249. // Add adds the given mask to this set.
  250. func (set *UserMaskSet) Add(mask string) (added bool) {
  251. casefoldedMask, err := Casefold(mask)
  252. if err != nil {
  253. log.Println(fmt.Sprintf("ERROR: Could not add mask to usermaskset: [%s]", mask))
  254. return false
  255. }
  256. set.Lock()
  257. added = !set.masks[casefoldedMask]
  258. if added {
  259. set.masks[casefoldedMask] = true
  260. }
  261. set.Unlock()
  262. if added {
  263. set.setRegexp()
  264. }
  265. return
  266. }
  267. // AddAll adds the given masks to this set.
  268. func (set *UserMaskSet) AddAll(masks []string) (added bool) {
  269. set.Lock()
  270. defer set.Unlock()
  271. for _, mask := range masks {
  272. if !added && !set.masks[mask] {
  273. added = true
  274. }
  275. set.masks[mask] = true
  276. }
  277. if added {
  278. set.setRegexp()
  279. }
  280. return
  281. }
  282. // Remove removes the given mask from this set.
  283. func (set *UserMaskSet) Remove(mask string) (removed bool) {
  284. set.Lock()
  285. removed = set.masks[mask]
  286. if removed {
  287. delete(set.masks, mask)
  288. }
  289. set.Unlock()
  290. if removed {
  291. set.setRegexp()
  292. }
  293. return
  294. }
  295. // Match matches the given n!u@h.
  296. func (set *UserMaskSet) Match(userhost string) bool {
  297. set.RLock()
  298. regexp := set.regexp
  299. set.RUnlock()
  300. if regexp == nil {
  301. return false
  302. }
  303. return regexp.MatchString(userhost)
  304. }
  305. // String returns the masks in this set.
  306. func (set *UserMaskSet) String() string {
  307. set.RLock()
  308. masks := make([]string, len(set.masks))
  309. index := 0
  310. for mask := range set.masks {
  311. masks[index] = mask
  312. index++
  313. }
  314. set.RUnlock()
  315. return strings.Join(masks, " ")
  316. }
  317. func (set *UserMaskSet) Length() int {
  318. set.RLock()
  319. defer set.RUnlock()
  320. return len(set.masks)
  321. }
  322. // setRegexp generates a regular expression from the set of user mask
  323. // strings. Masks are split at the two types of wildcards, `*` and
  324. // `?`. All the pieces are meta-escaped. `*` is replaced with `.*`,
  325. // the regexp equivalent. Likewise, `?` is replaced with `.`. The
  326. // parts are re-joined and finally all masks are joined into a big
  327. // or-expression.
  328. func (set *UserMaskSet) setRegexp() {
  329. var re *regexp.Regexp
  330. set.RLock()
  331. maskExprs := make([]string, len(set.masks))
  332. index := 0
  333. for mask := range set.masks {
  334. manyParts := strings.Split(mask, "*")
  335. manyExprs := make([]string, len(manyParts))
  336. for mindex, manyPart := range manyParts {
  337. oneParts := strings.Split(manyPart, "?")
  338. oneExprs := make([]string, len(oneParts))
  339. for oindex, onePart := range oneParts {
  340. oneExprs[oindex] = regexp.QuoteMeta(onePart)
  341. }
  342. manyExprs[mindex] = strings.Join(oneExprs, ".")
  343. }
  344. maskExprs[index] = strings.Join(manyExprs, ".*")
  345. index++
  346. }
  347. set.RUnlock()
  348. if index > 0 {
  349. expr := "^" + strings.Join(maskExprs, "|") + "$"
  350. re, _ = regexp.Compile(expr)
  351. }
  352. set.Lock()
  353. set.regexp = re
  354. set.Unlock()
  355. }