Вы не можете выбрать более 25 тем Темы должны начинаться с буквы или цифры, могут содержать дефисы(-) и должны содержать не более 35 символов.

client_lookup_set.go 12KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453
  1. // Copyright (c) 2012-2014 Jeremy Latt
  2. // Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
  3. // released under the MIT license
  4. package irc
  5. import (
  6. "regexp"
  7. "strings"
  8. "sync"
  9. "time"
  10. "github.com/oragono/oragono/irc/caps"
  11. "github.com/oragono/oragono/irc/modes"
  12. "github.com/oragono/oragono/irc/utils"
  13. )
  14. // ClientManager keeps track of clients by nick, enforcing uniqueness of casefolded nicks
  15. type ClientManager struct {
  16. sync.RWMutex // tier 2
  17. byNick map[string]*Client
  18. bySkeleton map[string]*Client
  19. }
  20. // Initialize initializes a ClientManager.
  21. func (clients *ClientManager) Initialize() {
  22. clients.byNick = make(map[string]*Client)
  23. clients.bySkeleton = make(map[string]*Client)
  24. }
  25. // Count returns how many clients are in the manager.
  26. func (clients *ClientManager) Count() int {
  27. clients.RLock()
  28. defer clients.RUnlock()
  29. count := len(clients.byNick)
  30. return count
  31. }
  32. // Get retrieves a client from the manager, if they exist.
  33. func (clients *ClientManager) Get(nick string) *Client {
  34. casefoldedName, err := CasefoldName(nick)
  35. if err == nil {
  36. clients.RLock()
  37. defer clients.RUnlock()
  38. cli := clients.byNick[casefoldedName]
  39. return cli
  40. }
  41. return nil
  42. }
  43. func (clients *ClientManager) removeInternal(client *Client) (err error) {
  44. // requires holding the writable Lock()
  45. oldcfnick, oldskeleton := client.uniqueIdentifiers()
  46. if oldcfnick == "*" || oldcfnick == "" {
  47. return errNickMissing
  48. }
  49. currentEntry, present := clients.byNick[oldcfnick]
  50. if present {
  51. if currentEntry == client {
  52. delete(clients.byNick, oldcfnick)
  53. } else {
  54. // this shouldn't happen, but we can ignore it
  55. client.server.logger.Warning("internal", "clients for nick out of sync", oldcfnick)
  56. err = errNickMissing
  57. }
  58. } else {
  59. err = errNickMissing
  60. }
  61. currentEntry, present = clients.bySkeleton[oldskeleton]
  62. if present {
  63. if currentEntry == client {
  64. delete(clients.bySkeleton, oldskeleton)
  65. } else {
  66. client.server.logger.Warning("internal", "clients for skeleton out of sync", oldskeleton)
  67. err = errNickMissing
  68. }
  69. } else {
  70. err = errNickMissing
  71. }
  72. return
  73. }
  74. // Remove removes a client from the lookup set.
  75. func (clients *ClientManager) Remove(client *Client) error {
  76. clients.Lock()
  77. defer clients.Unlock()
  78. return clients.removeInternal(client)
  79. }
  80. // Handles a RESUME by attaching a session to a designated client. It is the
  81. // caller's responsibility to verify that the resume is allowed (checking tokens,
  82. // TLS status, etc.) before calling this.
  83. func (clients *ClientManager) Resume(oldClient *Client, session *Session) (err error) {
  84. clients.Lock()
  85. defer clients.Unlock()
  86. cfnick := oldClient.NickCasefolded()
  87. if _, ok := clients.byNick[cfnick]; !ok {
  88. return errNickMissing
  89. }
  90. success, _, _, _ := oldClient.AddSession(session)
  91. if !success {
  92. return errNickMissing
  93. }
  94. return nil
  95. }
  96. // SetNick sets a client's nickname, validating it against nicknames in use
  97. func (clients *ClientManager) SetNick(client *Client, session *Session, newNick string) (setNick string, err error, returnedFromAway bool) {
  98. config := client.server.Config()
  99. var newCfNick, newSkeleton string
  100. client.stateMutex.RLock()
  101. account := client.account
  102. accountName := client.accountName
  103. settings := client.accountSettings
  104. registered := client.registered
  105. realname := client.realname
  106. client.stateMutex.RUnlock()
  107. // recompute always-on status, because client.alwaysOn is not set for unregistered clients
  108. var alwaysOn, useAccountName bool
  109. if account != "" {
  110. alwaysOn = persistenceEnabled(config.Accounts.Multiclient.AlwaysOn, settings.AlwaysOn)
  111. useAccountName = alwaysOn || config.Accounts.NickReservation.ForceNickEqualsAccount
  112. }
  113. if useAccountName {
  114. if registered && newNick != accountName && newNick != "" {
  115. return "", errNickAccountMismatch, false
  116. }
  117. newNick = accountName
  118. newCfNick = account
  119. newSkeleton, err = Skeleton(newNick)
  120. if err != nil {
  121. return "", errNicknameInvalid, false
  122. }
  123. } else {
  124. newNick = strings.TrimSpace(newNick)
  125. if len(newNick) == 0 {
  126. return "", errNickMissing, false
  127. }
  128. if account == "" && config.Accounts.NickReservation.ForceGuestFormat {
  129. newCfNick, err = CasefoldName(newNick)
  130. if err != nil {
  131. return "", errNicknameInvalid, false
  132. }
  133. if !config.Accounts.NickReservation.guestRegexpFolded.MatchString(newCfNick) {
  134. newNick = strings.Replace(config.Accounts.NickReservation.GuestFormat, "*", newNick, 1)
  135. newCfNick = "" // re-fold it below
  136. }
  137. }
  138. if newCfNick == "" {
  139. newCfNick, err = CasefoldName(newNick)
  140. }
  141. if err != nil {
  142. return "", errNicknameInvalid, false
  143. }
  144. if len(newNick) > config.Limits.NickLen || len(newCfNick) > config.Limits.NickLen {
  145. return "", errNicknameInvalid, false
  146. }
  147. newSkeleton, err = Skeleton(newNick)
  148. if err != nil {
  149. return "", errNicknameInvalid, false
  150. }
  151. if restrictedCasefoldedNicks[newCfNick] || restrictedSkeletons[newSkeleton] {
  152. return "", errNicknameInvalid, false
  153. }
  154. reservedAccount, method := client.server.accounts.EnforcementStatus(newCfNick, newSkeleton)
  155. if method == NickEnforcementStrict && reservedAccount != "" && reservedAccount != account {
  156. return "", errNicknameReserved, false
  157. }
  158. }
  159. var bouncerAllowed bool
  160. if config.Accounts.Multiclient.Enabled {
  161. if useAccountName {
  162. bouncerAllowed = true
  163. } else {
  164. if config.Accounts.Multiclient.AllowedByDefault && settings.AllowBouncer != MulticlientDisallowedByUser {
  165. bouncerAllowed = true
  166. } else if settings.AllowBouncer == MulticlientAllowedByUser {
  167. bouncerAllowed = true
  168. }
  169. }
  170. }
  171. clients.Lock()
  172. defer clients.Unlock()
  173. currentClient := clients.byNick[newCfNick]
  174. // the client may just be changing case
  175. if currentClient != nil && currentClient != client && session != nil {
  176. // these conditions forbid reattaching to an existing session:
  177. if registered || !bouncerAllowed || account == "" || account != currentClient.Account() {
  178. return "", errNicknameInUse, false
  179. }
  180. // check TLS modes
  181. if client.HasMode(modes.TLS) != currentClient.HasMode(modes.TLS) {
  182. if useAccountName {
  183. // #955: this is fatal because they can't fix it by trying a different nick
  184. return "", errInsecureReattach, false
  185. } else {
  186. return "", errNicknameInUse, false
  187. }
  188. }
  189. reattachSuccessful, numSessions, lastSeen, back := currentClient.AddSession(session)
  190. if !reattachSuccessful {
  191. return "", errNicknameInUse, false
  192. }
  193. if numSessions == 1 {
  194. invisible := currentClient.HasMode(modes.Invisible)
  195. operator := currentClient.HasMode(modes.Operator) || currentClient.HasMode(modes.LocalOperator)
  196. client.server.stats.AddRegistered(invisible, operator)
  197. }
  198. session.autoreplayMissedSince = lastSeen
  199. // TODO: transition mechanism for #1065, clean this up eventually:
  200. if currentClient.Realname() == "" {
  201. currentClient.SetRealname(realname)
  202. }
  203. // successful reattach!
  204. return newNick, nil, back
  205. } else if currentClient == client && currentClient.Nick() == newNick {
  206. // see #1019: normally no-op nick changes are caught earlier, by performNickChange,
  207. // but they are not detected there when force-guest-format is enabled (because
  208. // the proposed nickname is e.g. alice and the current nickname is Guest-alice)
  209. return "", errNoop, false
  210. }
  211. // analogous checks for skeletons
  212. skeletonHolder := clients.bySkeleton[newSkeleton]
  213. if skeletonHolder != nil && skeletonHolder != client {
  214. return "", errNicknameInUse, false
  215. }
  216. if changeSuccess := client.SetNick(newNick, newCfNick, newSkeleton); !changeSuccess {
  217. return "", errClientDestroyed, false
  218. }
  219. clients.removeInternal(client)
  220. clients.byNick[newCfNick] = client
  221. clients.bySkeleton[newSkeleton] = client
  222. return newNick, nil, false
  223. }
  224. func (clients *ClientManager) AllClients() (result []*Client) {
  225. clients.RLock()
  226. defer clients.RUnlock()
  227. result = make([]*Client, len(clients.byNick))
  228. i := 0
  229. for _, client := range clients.byNick {
  230. result[i] = client
  231. i++
  232. }
  233. return
  234. }
  235. // AllWithCaps returns all clients with the given capabilities.
  236. func (clients *ClientManager) AllWithCaps(capabs ...caps.Capability) (sessions []*Session) {
  237. clients.RLock()
  238. defer clients.RUnlock()
  239. for _, client := range clients.byNick {
  240. for _, session := range client.Sessions() {
  241. if session.capabilities.HasAll(capabs...) {
  242. sessions = append(sessions, session)
  243. }
  244. }
  245. }
  246. return
  247. }
  248. // AllWithCapsNotify returns all clients with the given capabilities, and that support cap-notify.
  249. func (clients *ClientManager) AllWithCapsNotify(capabs ...caps.Capability) (sessions []*Session) {
  250. capabs = append(capabs, caps.CapNotify)
  251. clients.RLock()
  252. defer clients.RUnlock()
  253. for _, client := range clients.byNick {
  254. for _, session := range client.Sessions() {
  255. // cap-notify is implicit in cap version 302 and above
  256. if session.capabilities.HasAll(capabs...) || 302 <= session.capVersion {
  257. sessions = append(sessions, session)
  258. }
  259. }
  260. }
  261. return
  262. }
  263. // FindAll returns all clients that match the given userhost mask.
  264. func (clients *ClientManager) FindAll(userhost string) (set ClientSet) {
  265. set = make(ClientSet)
  266. userhost, err := CanonicalizeMaskWildcard(userhost)
  267. if err != nil {
  268. return set
  269. }
  270. matcher, err := utils.CompileGlob(userhost, false)
  271. if err != nil {
  272. // not much we can do here
  273. return
  274. }
  275. clients.RLock()
  276. defer clients.RUnlock()
  277. for _, client := range clients.byNick {
  278. if matcher.MatchString(client.NickMaskCasefolded()) {
  279. set.Add(client)
  280. }
  281. }
  282. return set
  283. }
  284. //
  285. // usermask to regexp
  286. //
  287. //TODO(dan): move this over to generally using glob syntax instead?
  288. // kinda more expected in normal ban/etc masks, though regex is useful (probably as an extban?)
  289. type MaskInfo struct {
  290. TimeCreated time.Time
  291. CreatorNickmask string
  292. CreatorAccount string
  293. }
  294. // UserMaskSet holds a set of client masks and lets you match hostnames to them.
  295. type UserMaskSet struct {
  296. sync.RWMutex
  297. serialCacheUpdateMutex sync.Mutex
  298. masks map[string]MaskInfo
  299. regexp *regexp.Regexp
  300. }
  301. func NewUserMaskSet() *UserMaskSet {
  302. return new(UserMaskSet)
  303. }
  304. // Add adds the given mask to this set.
  305. func (set *UserMaskSet) Add(mask, creatorNickmask, creatorAccount string) (maskAdded string, err error) {
  306. casefoldedMask, err := CanonicalizeMaskWildcard(mask)
  307. if err != nil {
  308. return
  309. }
  310. set.serialCacheUpdateMutex.Lock()
  311. defer set.serialCacheUpdateMutex.Unlock()
  312. set.Lock()
  313. if set.masks == nil {
  314. set.masks = make(map[string]MaskInfo)
  315. }
  316. _, present := set.masks[casefoldedMask]
  317. if !present {
  318. maskAdded = casefoldedMask
  319. set.masks[casefoldedMask] = MaskInfo{
  320. TimeCreated: time.Now().UTC(),
  321. CreatorNickmask: creatorNickmask,
  322. CreatorAccount: creatorAccount,
  323. }
  324. }
  325. set.Unlock()
  326. if !present {
  327. set.setRegexp()
  328. }
  329. return
  330. }
  331. // Remove removes the given mask from this set.
  332. func (set *UserMaskSet) Remove(mask string) (maskRemoved string, err error) {
  333. mask, err = CanonicalizeMaskWildcard(mask)
  334. if err != nil {
  335. return
  336. }
  337. set.serialCacheUpdateMutex.Lock()
  338. defer set.serialCacheUpdateMutex.Unlock()
  339. set.Lock()
  340. _, removed := set.masks[mask]
  341. if removed {
  342. maskRemoved = mask
  343. delete(set.masks, mask)
  344. }
  345. set.Unlock()
  346. if removed {
  347. set.setRegexp()
  348. }
  349. return
  350. }
  351. func (set *UserMaskSet) SetMasks(masks map[string]MaskInfo) {
  352. set.Lock()
  353. set.masks = masks
  354. set.Unlock()
  355. set.setRegexp()
  356. }
  357. func (set *UserMaskSet) Masks() (result map[string]MaskInfo) {
  358. set.RLock()
  359. defer set.RUnlock()
  360. result = make(map[string]MaskInfo, len(set.masks))
  361. for mask, info := range set.masks {
  362. result[mask] = info
  363. }
  364. return
  365. }
  366. // Match matches the given n!u@h.
  367. func (set *UserMaskSet) Match(userhost string) bool {
  368. set.RLock()
  369. regexp := set.regexp
  370. set.RUnlock()
  371. if regexp == nil {
  372. return false
  373. }
  374. return regexp.MatchString(userhost)
  375. }
  376. func (set *UserMaskSet) Length() int {
  377. set.RLock()
  378. defer set.RUnlock()
  379. return len(set.masks)
  380. }
  381. func (set *UserMaskSet) setRegexp() {
  382. set.RLock()
  383. maskExprs := make([]string, len(set.masks))
  384. for mask := range set.masks {
  385. maskExprs = append(maskExprs, mask)
  386. }
  387. set.RUnlock()
  388. re, _ := utils.CompileMasks(maskExprs)
  389. set.Lock()
  390. set.regexp = re
  391. set.Unlock()
  392. }