Вы не можете выбрать более 25 тем Темы должны начинаться с буквы или цифры, могут содержать дефисы(-) и должны содержать не более 35 символов.

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017
  1. // Copyright (c) 2012-2014 Jeremy Latt
  2. // Copyright (c) 2014-2015 Edmund Huber
  3. // Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
  4. // released under the MIT license
  5. package irc
  6. import (
  7. "bufio"
  8. "crypto/tls"
  9. "encoding/base64"
  10. "errors"
  11. "fmt"
  12. "log"
  13. "math/rand"
  14. "net"
  15. "net/http"
  16. "os"
  17. "os/signal"
  18. "strconv"
  19. "strings"
  20. "sync"
  21. "syscall"
  22. "time"
  23. "github.com/DanielOaks/girc-go/ircmsg"
  24. "github.com/DanielOaks/oragono/irc/logger"
  25. "github.com/tidwall/buntdb"
  26. )
  27. var (
  28. // cached because this may be used lots
  29. tooManyClientsMsg = ircmsg.MakeMessage(nil, "", "ERROR", "Too many clients from your network")
  30. tooManyClientsBytes, _ = tooManyClientsMsg.Line()
  31. bannedFromServerMsg = ircmsg.MakeMessage(nil, "", "ERROR", "You are banned from this server (%s)")
  32. bannedFromServerBytes, _ = bannedFromServerMsg.Line()
  33. errDbOutOfDate = errors.New("Database schema is old")
  34. )
  35. // Limits holds the maximum limits for various things such as topic lengths.
  36. type Limits struct {
  37. AwayLen int
  38. ChannelLen int
  39. KickLen int
  40. MonitorEntries int
  41. NickLen int
  42. TopicLen int
  43. ChanListModes int
  44. LineLen LineLenLimits
  45. }
  46. // LineLenLimits holds the maximum limits for IRC lines.
  47. type LineLenLimits struct {
  48. Tags int
  49. Rest int
  50. }
  51. // ListenerInterface represents an interface for a listener.
  52. type ListenerInterface struct {
  53. Listener net.Listener
  54. Events chan ListenerEvent
  55. }
  56. const (
  57. // DestroyListener instructs the listener to destroy itself.
  58. DestroyListener ListenerEventType = iota
  59. // UpdateListener instructs the listener to update itself (grab new certs, etc).
  60. UpdateListener = iota
  61. )
  62. // ListenerEventType is the type of event this is.
  63. type ListenerEventType int
  64. // ListenerEvent is an event that's passed to the listener.
  65. type ListenerEvent struct {
  66. Type ListenerEventType
  67. NewConfig *tls.Config
  68. }
  69. // Server is the main Oragono server.
  70. type Server struct {
  71. accountAuthenticationEnabled bool
  72. accountRegistration *AccountRegistration
  73. accounts map[string]*ClientAccount
  74. channelRegistrationEnabled bool
  75. channels ChannelNameMap
  76. channelJoinPartMutex sync.Mutex // used when joining/parting channels to prevent stomping over each others' access and all
  77. checkIdent bool
  78. clients *ClientLookupSet
  79. commands chan Command
  80. configFilename string
  81. connectionLimits *ConnectionLimits
  82. connectionLimitsMutex sync.Mutex // used when affecting the connection limiter, to make sure rehashing doesn't make things go out-of-whack
  83. connectionThrottle *ConnectionThrottle
  84. connectionThrottleMutex sync.Mutex // used when affecting the connection limiter, to make sure rehashing doesn't make things go out-of-whack
  85. ctime time.Time
  86. currentOpers map[*Client]bool
  87. dlines *DLineManager
  88. idle chan *Client
  89. isupport *ISupportList
  90. klines *KLineManager
  91. limits Limits
  92. listenerEventActMutex sync.Mutex
  93. listeners map[string]ListenerInterface
  94. listenerUpdateMutex sync.Mutex
  95. logger *logger.Manager
  96. MaxSendQBytes uint64
  97. monitoring map[string][]*Client
  98. motdLines []string
  99. name string
  100. nameCasefolded string
  101. networkName string
  102. newConns chan clientConn
  103. operators map[string]Oper
  104. operclasses map[string]OperClass
  105. password []byte
  106. passwords *PasswordManager
  107. registeredChannels map[string]*RegisteredChannel
  108. registeredChannelsMutex sync.RWMutex
  109. rehashMutex sync.Mutex
  110. rehashSignal chan os.Signal
  111. restAPI *RestAPIConfig
  112. signals chan os.Signal
  113. store *buntdb.DB
  114. stsEnabled bool
  115. whoWas *WhoWasList
  116. }
  117. var (
  118. // ServerExitSignals are the signals the server will exit on.
  119. ServerExitSignals = []os.Signal{
  120. syscall.SIGINT,
  121. syscall.SIGTERM,
  122. syscall.SIGQUIT,
  123. }
  124. )
  125. type clientConn struct {
  126. Conn net.Conn
  127. IsTLS bool
  128. }
  129. // NewServer returns a new Oragono server.
  130. func NewServer(configFilename string, config *Config, logger *logger.Manager) (*Server, error) {
  131. casefoldedName, err := Casefold(config.Server.Name)
  132. if err != nil {
  133. return nil, fmt.Errorf("Server name isn't valid [%s]: %s", config.Server.Name, err.Error())
  134. }
  135. // startup check that we have HELP entries for every command
  136. for name := range Commands {
  137. _, exists := Help[strings.ToLower(name)]
  138. if !exists {
  139. return nil, fmt.Errorf("Help entry does not exist for command %s", name)
  140. }
  141. }
  142. if config.Accounts.AuthenticationEnabled {
  143. SupportedCapabilities[SASL] = true
  144. }
  145. if config.Server.STS.Enabled {
  146. SupportedCapabilities[STS] = true
  147. CapValues[STS] = config.Server.STS.Value()
  148. }
  149. if config.Limits.LineLen.Tags > 512 || config.Limits.LineLen.Rest > 512 {
  150. SupportedCapabilities[MaxLine] = true
  151. CapValues[MaxLine] = fmt.Sprintf("%d,%d", config.Limits.LineLen.Tags, config.Limits.LineLen.Rest)
  152. }
  153. operClasses, err := config.OperatorClasses()
  154. if err != nil {
  155. return nil, fmt.Errorf("Error loading oper classes: %s", err.Error())
  156. }
  157. opers, err := config.Operators(operClasses)
  158. if err != nil {
  159. return nil, fmt.Errorf("Error loading operators: %s", err.Error())
  160. }
  161. connectionLimits, err := NewConnectionLimits(config.Server.ConnectionLimits)
  162. if err != nil {
  163. return nil, fmt.Errorf("Error loading connection limits: %s", err.Error())
  164. }
  165. connectionThrottle, err := NewConnectionThrottle(config.Server.ConnectionThrottle)
  166. if err != nil {
  167. return nil, fmt.Errorf("Error loading connection throttler: %s", err.Error())
  168. }
  169. server := &Server{
  170. accountAuthenticationEnabled: config.Accounts.AuthenticationEnabled,
  171. accounts: make(map[string]*ClientAccount),
  172. channelRegistrationEnabled: config.Channels.Registration.Enabled,
  173. channels: *NewChannelNameMap(),
  174. checkIdent: config.Server.CheckIdent,
  175. clients: NewClientLookupSet(),
  176. commands: make(chan Command),
  177. configFilename: configFilename,
  178. connectionLimits: connectionLimits,
  179. connectionThrottle: connectionThrottle,
  180. ctime: time.Now(),
  181. currentOpers: make(map[*Client]bool),
  182. idle: make(chan *Client),
  183. limits: Limits{
  184. AwayLen: int(config.Limits.AwayLen),
  185. ChannelLen: int(config.Limits.ChannelLen),
  186. KickLen: int(config.Limits.KickLen),
  187. MonitorEntries: int(config.Limits.MonitorEntries),
  188. NickLen: int(config.Limits.NickLen),
  189. TopicLen: int(config.Limits.TopicLen),
  190. ChanListModes: int(config.Limits.ChanListModes),
  191. LineLen: LineLenLimits{
  192. Tags: config.Limits.LineLen.Tags,
  193. Rest: config.Limits.LineLen.Rest,
  194. },
  195. },
  196. listeners: make(map[string]ListenerInterface),
  197. logger: logger,
  198. MaxSendQBytes: config.Server.MaxSendQBytes,
  199. monitoring: make(map[string][]*Client),
  200. name: config.Server.Name,
  201. nameCasefolded: casefoldedName,
  202. networkName: config.Network.Name,
  203. newConns: make(chan clientConn),
  204. operators: opers,
  205. operclasses: *operClasses,
  206. registeredChannels: make(map[string]*RegisteredChannel),
  207. rehashSignal: make(chan os.Signal, 1),
  208. restAPI: &config.Server.RestAPI,
  209. signals: make(chan os.Signal, len(ServerExitSignals)),
  210. stsEnabled: config.Server.STS.Enabled,
  211. whoWas: NewWhoWasList(config.Limits.WhowasEntries),
  212. }
  213. // open data store
  214. server.logger.Debug("startup", "Opening datastore")
  215. db, err := buntdb.Open(config.Datastore.Path)
  216. if err != nil {
  217. return nil, fmt.Errorf("Failed to open datastore: %s", err.Error())
  218. }
  219. server.store = db
  220. // check db version
  221. err = server.store.View(func(tx *buntdb.Tx) error {
  222. version, _ := tx.Get(keySchemaVersion)
  223. if version != latestDbSchema {
  224. logger.Error("startup", "server", fmt.Sprintf("Database must be updated. Expected schema v%s, got v%s.", latestDbSchema, version))
  225. return errDbOutOfDate
  226. }
  227. return nil
  228. })
  229. if err != nil {
  230. // close the db
  231. db.Close()
  232. return nil, errDbOutOfDate
  233. }
  234. // load *lines
  235. server.logger.Debug("startup", "Loading D/Klines")
  236. server.loadDLines()
  237. server.loadKLines()
  238. // load password manager
  239. server.logger.Debug("startup", "Loading passwords")
  240. err = server.store.View(func(tx *buntdb.Tx) error {
  241. saltString, err := tx.Get(keySalt)
  242. if err != nil {
  243. return fmt.Errorf("Could not retrieve salt string: %s", err.Error())
  244. }
  245. salt, err := base64.StdEncoding.DecodeString(saltString)
  246. if err != nil {
  247. return err
  248. }
  249. pwm := NewPasswordManager(salt)
  250. server.passwords = &pwm
  251. return nil
  252. })
  253. if err != nil {
  254. return nil, fmt.Errorf("Could not load salt: %s", err.Error())
  255. }
  256. server.logger.Debug("startup", "Loading MOTD")
  257. if config.Server.MOTD != "" {
  258. file, err := os.Open(config.Server.MOTD)
  259. if err == nil {
  260. defer file.Close()
  261. reader := bufio.NewReader(file)
  262. for {
  263. line, err := reader.ReadString('\n')
  264. if err != nil {
  265. break
  266. }
  267. line = strings.TrimRight(line, "\r\n")
  268. // "- " is the required prefix for MOTD, we just add it here to make
  269. // bursting it out to clients easier
  270. line = fmt.Sprintf("- %s", line)
  271. server.motdLines = append(server.motdLines, line)
  272. }
  273. }
  274. }
  275. if config.Server.Password != "" {
  276. server.password = config.Server.PasswordBytes()
  277. }
  278. for _, addr := range config.Server.Listen {
  279. server.createListener(addr, config.TLSListeners())
  280. }
  281. if config.Server.Wslisten != "" {
  282. server.wslisten(config.Server.Wslisten, config.Server.TLSListeners)
  283. }
  284. // registration
  285. accountReg := NewAccountRegistration(config.Accounts.Registration)
  286. server.accountRegistration = &accountReg
  287. // Attempt to clean up when receiving these signals.
  288. signal.Notify(server.signals, ServerExitSignals...)
  289. signal.Notify(server.rehashSignal, syscall.SIGHUP)
  290. server.setISupport()
  291. // start API if enabled
  292. if server.restAPI.Enabled {
  293. logger.Info("startup", "server", fmt.Sprintf("%s rest API started on %s.", server.name, server.restAPI.Listen))
  294. server.startRestAPI()
  295. }
  296. return server, nil
  297. }
  298. // setISupport sets up our RPL_ISUPPORT reply.
  299. func (server *Server) setISupport() {
  300. maxTargetsString := strconv.Itoa(maxTargets)
  301. // add RPL_ISUPPORT tokens
  302. server.isupport = NewISupportList()
  303. server.isupport.Add("AWAYLEN", strconv.Itoa(server.limits.AwayLen))
  304. server.isupport.Add("CASEMAPPING", casemappingName)
  305. server.isupport.Add("CHANMODES", strings.Join([]string{Modes{BanMask, ExceptMask, InviteMask}.String(), "", Modes{UserLimit, Key}.String(), Modes{InviteOnly, Moderated, NoOutside, OpOnlyTopic, ChanRoleplaying, Secret}.String()}, ","))
  306. server.isupport.Add("CHANNELLEN", strconv.Itoa(server.limits.ChannelLen))
  307. server.isupport.Add("CHANTYPES", "#")
  308. server.isupport.Add("EXCEPTS", "")
  309. server.isupport.Add("INVEX", "")
  310. server.isupport.Add("KICKLEN", strconv.Itoa(server.limits.KickLen))
  311. server.isupport.Add("MAXLIST", fmt.Sprintf("beI:%s", strconv.Itoa(server.limits.ChanListModes)))
  312. server.isupport.Add("MAXTARGETS", maxTargetsString)
  313. server.isupport.Add("MODES", "")
  314. server.isupport.Add("MONITOR", strconv.Itoa(server.limits.MonitorEntries))
  315. server.isupport.Add("NETWORK", server.networkName)
  316. server.isupport.Add("NICKLEN", strconv.Itoa(server.limits.NickLen))
  317. server.isupport.Add("PREFIX", "(qaohv)~&@%+")
  318. server.isupport.Add("RPCHAN", "E")
  319. server.isupport.Add("RPUSER", "E")
  320. server.isupport.Add("STATUSMSG", "~&@%+")
  321. server.isupport.Add("TARGMAX", fmt.Sprintf("NAMES:1,LIST:1,KICK:1,WHOIS:1,USERHOST:10,PRIVMSG:%s,TAGMSG:%s,NOTICE:%s,MONITOR:", maxTargetsString, maxTargetsString, maxTargetsString))
  322. server.isupport.Add("TOPICLEN", strconv.Itoa(server.limits.TopicLen))
  323. // account registration
  324. if server.accountRegistration.Enabled {
  325. // 'none' isn't shown in the REGCALLBACKS vars
  326. var enabledCallbacks []string
  327. for _, name := range server.accountRegistration.EnabledCallbacks {
  328. if name != "*" {
  329. enabledCallbacks = append(enabledCallbacks, name)
  330. }
  331. }
  332. server.isupport.Add("REGCOMMANDS", "CREATE,VERIFY")
  333. server.isupport.Add("REGCALLBACKS", strings.Join(enabledCallbacks, ","))
  334. server.isupport.Add("REGCREDTYPES", "passphrase,certfp")
  335. }
  336. server.isupport.RegenerateCachedReply()
  337. }
  338. func loadChannelList(channel *Channel, list string, maskMode Mode) {
  339. if list == "" {
  340. return
  341. }
  342. channel.lists[maskMode].AddAll(strings.Split(list, " "))
  343. }
  344. // Shutdown shuts down the server.
  345. func (server *Server) Shutdown() {
  346. //TODO(dan): Make sure we disallow new nicks
  347. server.clients.ByNickMutex.RLock()
  348. for _, client := range server.clients.ByNick {
  349. client.Notice("Server is shutting down")
  350. }
  351. server.clients.ByNickMutex.RUnlock()
  352. if err := server.store.Close(); err != nil {
  353. server.logger.Error("shutdown", fmt.Sprintln("Could not close datastore:", err))
  354. }
  355. }
  356. // Run starts the server.
  357. func (server *Server) Run() {
  358. // defer closing db/store
  359. defer server.store.Close()
  360. done := false
  361. for !done {
  362. select {
  363. case <-server.signals:
  364. server.Shutdown()
  365. done = true
  366. case <-server.rehashSignal:
  367. server.logger.Info("rehash", "Rehashing due to SIGHUP")
  368. err := server.rehash()
  369. if err != nil {
  370. server.logger.Error("rehash", fmt.Sprintln("Failed to rehash:", err.Error()))
  371. }
  372. case conn := <-server.newConns:
  373. // check connection limits
  374. ipaddr := net.ParseIP(IPString(conn.Conn.RemoteAddr()))
  375. if ipaddr != nil {
  376. // check DLINEs
  377. isBanned, info := server.dlines.CheckIP(ipaddr)
  378. if isBanned {
  379. banMessage := fmt.Sprintf(bannedFromServerBytes, info.Reason)
  380. if info.Time != nil {
  381. banMessage += fmt.Sprintf(" [%s]", info.Time.Duration.String())
  382. }
  383. conn.Conn.Write([]byte(banMessage))
  384. conn.Conn.Close()
  385. continue
  386. }
  387. // check connection limits
  388. server.connectionLimitsMutex.Lock()
  389. err := server.connectionLimits.AddClient(ipaddr, false)
  390. server.connectionLimitsMutex.Unlock()
  391. if err != nil {
  392. // too many connections from one client, tell the client and close the connection
  393. // this might not show up properly on some clients, but our objective here is just to close it out before it has a load impact on us
  394. conn.Conn.Write([]byte(tooManyClientsBytes))
  395. conn.Conn.Close()
  396. continue
  397. }
  398. // check connection throttle
  399. server.connectionThrottleMutex.Lock()
  400. err = server.connectionThrottle.AddClient(ipaddr)
  401. server.connectionThrottleMutex.Unlock()
  402. if err != nil {
  403. // too many connections too quickly from client, tell them and close the connection
  404. length := &IPRestrictTime{
  405. Duration: server.connectionThrottle.BanDuration,
  406. Expires: time.Now().Add(server.connectionThrottle.BanDuration),
  407. }
  408. server.dlines.AddIP(ipaddr, length, server.connectionThrottle.BanMessage, "Exceeded automated connection throttle")
  409. // reset ban on connectionThrottle
  410. server.connectionThrottle.ResetFor(ipaddr)
  411. // this might not show up properly on some clients, but our objective here is just to close it out before it has a load impact on us
  412. conn.Conn.Write([]byte(server.connectionThrottle.BanMessageBytes))
  413. conn.Conn.Close()
  414. continue
  415. }
  416. server.logger.Debug("localconnect-ip", fmt.Sprintf("Client connecting from %v", ipaddr))
  417. go NewClient(server, conn.Conn, conn.IsTLS)
  418. continue
  419. }
  420. case client := <-server.idle:
  421. client.Idle()
  422. }
  423. }
  424. }
  425. //
  426. // IRC protocol listeners
  427. //
  428. // createListener starts the given listeners.
  429. func (server *Server) createListener(addr string, tlsMap map[string]*tls.Config) {
  430. config, listenTLS := tlsMap[addr]
  431. _, alreadyExists := server.listeners[addr]
  432. if alreadyExists {
  433. log.Fatal(server, "listener already exists:", addr)
  434. }
  435. // make listener event channel
  436. listenerEventChannel := make(chan ListenerEvent, 1)
  437. // make listener
  438. listener, err := net.Listen("tcp", addr)
  439. if err != nil {
  440. log.Fatal(server, "listen error: ", err)
  441. }
  442. tlsString := "plaintext"
  443. if listenTLS {
  444. config.ClientAuth = tls.RequestClientCert
  445. listener = tls.NewListener(listener, config)
  446. tlsString = "TLS"
  447. }
  448. // throw our details to the server so we can be modified/killed later
  449. li := ListenerInterface{
  450. Events: listenerEventChannel,
  451. Listener: listener,
  452. }
  453. server.listeners[addr] = li
  454. // start listening
  455. server.logger.Info("listeners", fmt.Sprintf("listening on %s using %s.", addr, tlsString))
  456. // setup accept goroutine
  457. go func() {
  458. for {
  459. conn, err := listener.Accept()
  460. if err == nil {
  461. newConn := clientConn{
  462. Conn: conn,
  463. IsTLS: listenTLS,
  464. }
  465. server.newConns <- newConn
  466. }
  467. select {
  468. case event := <-server.listeners[addr].Events:
  469. // this is used to confirm that whoever passed us this event has closed the existing listener correctly (in an attempt to get us to notice the event).
  470. // this is required to keep REHASH from having a very small race possibility of killing the primary listener
  471. server.listenerEventActMutex.Lock()
  472. server.listenerEventActMutex.Unlock()
  473. if event.Type == DestroyListener {
  474. // listener should already be closed, this is just for safety
  475. listener.Close()
  476. return
  477. } else if event.Type == UpdateListener {
  478. // close old listener
  479. listener.Close()
  480. // make new listener
  481. listener, err = net.Listen("tcp", addr)
  482. if err != nil {
  483. log.Fatal(server, "listen error: ", err)
  484. }
  485. tlsString := "plaintext"
  486. if event.NewConfig != nil {
  487. config = event.NewConfig
  488. config.ClientAuth = tls.RequestClientCert
  489. listener = tls.NewListener(listener, config)
  490. tlsString = "TLS"
  491. }
  492. // update server ListenerInterface
  493. li.Listener = listener
  494. server.listenerUpdateMutex.Lock()
  495. server.listeners[addr] = li
  496. server.listenerUpdateMutex.Unlock()
  497. // print notice
  498. server.logger.Info("listeners", fmt.Sprintf("updated listener %s using %s.", addr, tlsString))
  499. }
  500. default:
  501. // no events waiting for us, fall-through and continue
  502. }
  503. }
  504. }()
  505. }
  506. //
  507. // websocket listen goroutine
  508. //
  509. func (server *Server) wslisten(addr string, tlsMap map[string]*TLSListenConfig) {
  510. http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
  511. if r.Method != "GET" {
  512. server.logger.Error("ws", addr, fmt.Sprintf("%s method not allowed", r.Method))
  513. return
  514. }
  515. // We don't have any subprotocols, so if someone attempts to `new
  516. // WebSocket(server, "subprotocol")` they'll break here, instead of
  517. // getting the default, ambiguous, response from gorilla.
  518. if v, ok := r.Header["Sec-Websocket-Protocol"]; ok {
  519. http.Error(w, fmt.Sprintf("WebSocket subprocotols (e.g. %s) not supported", v), 400)
  520. }
  521. ws, err := upgrader.Upgrade(w, r, nil)
  522. if err != nil {
  523. server.logger.Error("ws", addr, fmt.Sprintf("%s websocket upgrade error: %s", server.name, err))
  524. return
  525. }
  526. newConn := clientConn{
  527. Conn: WSContainer{ws},
  528. IsTLS: false, //TODO(dan): track TLS or not here properly
  529. }
  530. server.newConns <- newConn
  531. })
  532. go func() {
  533. config, listenTLS := tlsMap[addr]
  534. tlsString := "plaintext"
  535. var err error
  536. if listenTLS {
  537. tlsString = "TLS"
  538. }
  539. server.logger.Info("listeners", fmt.Sprintf("websocket listening on %s using %s.", addr, tlsString))
  540. if listenTLS {
  541. err = http.ListenAndServeTLS(addr, config.Cert, config.Key, nil)
  542. } else {
  543. err = http.ListenAndServe(addr, nil)
  544. }
  545. if err != nil {
  546. server.logger.Error("listeners", fmt.Sprintf("listenAndServe error [%s]: %s", tlsString, err))
  547. }
  548. }()
  549. }
  550. // generateMessageID returns a network-unique message ID.
  551. func (server *Server) generateMessageID() string {
  552. return fmt.Sprintf("%s-%s", strconv.FormatInt(time.Now().UTC().UnixNano(), 10), strconv.FormatInt(rand.Int63(), 10))
  553. }
  554. //
  555. // server functionality
  556. //
  557. func (server *Server) tryRegister(c *Client) {
  558. if c.registered || !c.HasNick() || !c.HasUsername() ||
  559. (c.capState == CapNegotiating) {
  560. return
  561. }
  562. // check KLINEs
  563. isBanned, info := server.klines.CheckMasks(c.AllNickmasks()...)
  564. if isBanned {
  565. reason := info.Reason
  566. if info.Time != nil {
  567. reason += fmt.Sprintf(" [%s]", info.Time.Duration.String())
  568. }
  569. c.Send(nil, "", "ERROR", fmt.Sprintf("You are banned from this server (%s)", reason))
  570. c.quitMessageSent = true
  571. c.destroy()
  572. return
  573. }
  574. // continue registration
  575. server.logger.Debug("localconnect", fmt.Sprintf("Client registered [%s]", c.nick))
  576. c.Register()
  577. // send welcome text
  578. //NOTE(dan): we specifically use the NICK here instead of the nickmask
  579. // see http://modern.ircdocs.horse/#rplwelcome-001 for details on why we avoid using the nickmask
  580. c.Send(nil, server.name, RPL_WELCOME, c.nick, fmt.Sprintf("Welcome to the Internet Relay Network %s", c.nick))
  581. c.Send(nil, server.name, RPL_YOURHOST, c.nick, fmt.Sprintf("Your host is %s, running version %s", server.name, Ver))
  582. c.Send(nil, server.name, RPL_CREATED, c.nick, fmt.Sprintf("This server was created %s", server.ctime.Format(time.RFC1123)))
  583. //TODO(dan): Look at adding last optional [<channel modes with a parameter>] parameter
  584. c.Send(nil, server.name, RPL_MYINFO, c.nick, server.name, Ver, supportedUserModesString, supportedChannelModesString)
  585. c.RplISupport()
  586. server.MOTD(c)
  587. c.Send(nil, c.nickMaskString, RPL_UMODEIS, c.nick, c.ModeString())
  588. if server.logger.DumpingRawInOut {
  589. c.Notice("This server is in debug mode and is logging all user I/O. If you do not wish for everything you send to be readable by the server owner(s), please disconnect.")
  590. }
  591. }
  592. // MOTD serves the Message of the Day.
  593. func (server *Server) MOTD(client *Client) {
  594. if len(server.motdLines) < 1 {
  595. client.Send(nil, server.name, ERR_NOMOTD, client.nick, "MOTD File is missing")
  596. return
  597. }
  598. client.Send(nil, server.name, RPL_MOTDSTART, client.nick, fmt.Sprintf("- %s Message of the day - ", server.name))
  599. for _, line := range server.motdLines {
  600. client.Send(nil, server.name, RPL_MOTD, client.nick, line)
  601. }
  602. client.Send(nil, server.name, RPL_ENDOFMOTD, client.nick, "End of MOTD command")
  603. }
  604. //
  605. // registration commands
  606. //
  607. // PASS <password>
  608. func passHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  609. if client.registered {
  610. client.Send(nil, server.name, ERR_ALREADYREGISTRED, client.nick, "You may not reregister")
  611. return false
  612. }
  613. // if no password exists, skip checking
  614. if len(server.password) == 0 {
  615. client.authorized = true
  616. return false
  617. }
  618. // check the provided password
  619. password := []byte(msg.Params[0])
  620. if ComparePassword(server.password, password) != nil {
  621. client.Send(nil, server.name, ERR_PASSWDMISMATCH, client.nick, "Password incorrect")
  622. client.Send(nil, server.name, "ERROR", "Password incorrect")
  623. return true
  624. }
  625. client.authorized = true
  626. return false
  627. }
  628. // USER <username> * 0 <realname>
  629. func userHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  630. if client.registered {
  631. client.Send(nil, server.name, ERR_ALREADYREGISTRED, client.nick, "You may not reregister")
  632. return false
  633. }
  634. if !client.authorized {
  635. client.Quit("Bad password")
  636. return true
  637. }
  638. if client.username != "" && client.realname != "" {
  639. return false
  640. }
  641. // confirm that username is valid
  642. //
  643. _, err := CasefoldName(msg.Params[0])
  644. if err != nil {
  645. client.Send(nil, "", "ERROR", "Malformed username")
  646. return true
  647. }
  648. if !client.HasUsername() {
  649. client.username = "~" + msg.Params[0]
  650. // don't bother updating nickmask here, it's not valid anyway
  651. }
  652. if client.realname == "" {
  653. client.realname = msg.Params[3]
  654. }
  655. server.tryRegister(client)
  656. return false
  657. }
  658. // QUIT [<reason>]
  659. func quitHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  660. reason := "Quit"
  661. if len(msg.Params) > 0 {
  662. reason += ": " + msg.Params[0]
  663. }
  664. client.Quit(reason)
  665. return true
  666. }
  667. //
  668. // normal commands
  669. //
  670. // PING <server1> [<server2>]
  671. func pingHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  672. client.Send(nil, server.name, "PONG", msg.Params...)
  673. return false
  674. }
  675. // PONG <server> [ <server2> ]
  676. func pongHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  677. // client gets touched when they send this command, so we don't need to do anything
  678. return false
  679. }
  680. // JOIN <channel>{,<channel>} [<key>{,<key>}]
  681. // JOIN 0
  682. func joinHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  683. // handle JOIN 0
  684. if msg.Params[0] == "0" {
  685. for channel := range client.channels {
  686. channel.Part(client, client.nickCasefolded)
  687. }
  688. return false
  689. }
  690. // handle regular JOINs
  691. channels := strings.Split(msg.Params[0], ",")
  692. var keys []string
  693. if len(msg.Params) > 1 {
  694. keys = strings.Split(msg.Params[1], ",")
  695. }
  696. // get lock
  697. server.channelJoinPartMutex.Lock()
  698. defer server.channelJoinPartMutex.Unlock()
  699. for i, name := range channels {
  700. casefoldedName, err := CasefoldChannel(name)
  701. if err != nil {
  702. if len(name) > 0 {
  703. client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, name, "No such channel")
  704. }
  705. continue
  706. }
  707. channel := server.channels.Get(casefoldedName)
  708. if channel == nil {
  709. if len(casefoldedName) > server.limits.ChannelLen {
  710. client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, name, "No such channel")
  711. continue
  712. }
  713. channel = NewChannel(server, name, true)
  714. }
  715. var key string
  716. if len(keys) > i {
  717. key = keys[i]
  718. }
  719. channel.Join(client, key)
  720. }
  721. return false
  722. }
  723. // PART <channel>{,<channel>} [<reason>]
  724. func partHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  725. channels := strings.Split(msg.Params[0], ",")
  726. var reason string //TODO(dan): if this isn't supplied here, make sure the param doesn't exist in the PART message sent to other users
  727. if len(msg.Params) > 1 {
  728. reason = msg.Params[1]
  729. }
  730. // get lock
  731. server.channelJoinPartMutex.Lock()
  732. defer server.channelJoinPartMutex.Unlock()
  733. for _, chname := range channels {
  734. casefoldedChannelName, err := CasefoldChannel(chname)
  735. channel := server.channels.Get(casefoldedChannelName)
  736. if err != nil || channel == nil {
  737. if len(chname) > 0 {
  738. client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, "No such channel")
  739. }
  740. continue
  741. }
  742. channel.Part(client, reason)
  743. }
  744. return false
  745. }
  746. // TOPIC <channel> [<topic>]
  747. func topicHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  748. name, err := CasefoldChannel(msg.Params[0])
  749. channel := server.channels.Get(name)
  750. if err != nil || channel == nil {
  751. if len(msg.Params[0]) > 0 {
  752. client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, msg.Params[0], "No such channel")
  753. }
  754. return false
  755. }
  756. if len(msg.Params) > 1 {
  757. channel.SetTopic(client, msg.Params[1])
  758. } else {
  759. channel.GetTopic(client)
  760. }
  761. return false
  762. }
  763. func wordWrap(text string, lineWidth int) []string {
  764. var lines []string
  765. var cacheLine, cacheWord string
  766. for _, char := range text {
  767. if (char == ' ' || char == '-') && len(cacheLine)+len(cacheWord)+1 < lineWidth {
  768. cacheLine += cacheWord + string(char)
  769. cacheWord = ""
  770. } else if len(cacheLine)+len(cacheWord)+1 >= lineWidth {
  771. if len(cacheLine) < (lineWidth / 2) {
  772. // there must be a really long word or something, just split on word boundary
  773. cacheLine += cacheWord + string(char)
  774. cacheWord = ""
  775. }
  776. lines = append(lines, cacheLine)
  777. cacheLine = ""
  778. } else {
  779. cacheWord += string(char)
  780. }
  781. }
  782. if len(cacheWord) > 0 {
  783. cacheLine += cacheWord
  784. }
  785. if len(cacheLine) > 0 {
  786. lines = append(lines, cacheLine)
  787. }
  788. return lines
  789. }
  790. // SplitMessage represents a message that's been split for sending.
  791. type SplitMessage struct {
  792. For512 []string
  793. ForMaxLine string
  794. }
  795. func (server *Server) splitMessage(original string, origIs512 bool) SplitMessage {
  796. var newSplit SplitMessage
  797. newSplit.ForMaxLine = original
  798. if !origIs512 {
  799. newSplit.For512 = wordWrap(original, 400)
  800. } else {
  801. newSplit.For512 = []string{original}
  802. }
  803. return newSplit
  804. }
  805. // PRIVMSG <target>{,<target>} <message>
  806. func privmsgHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  807. clientOnlyTags := GetClientOnlyTags(msg.Tags)
  808. targets := strings.Split(msg.Params[0], ",")
  809. message := msg.Params[1]
  810. // split privmsg
  811. splitMsg := server.splitMessage(message, !client.capabilities[MaxLine])
  812. for i, targetString := range targets {
  813. // max of four targets per privmsg
  814. if i > maxTargets-1 {
  815. break
  816. }
  817. prefixes, targetString := SplitChannelMembershipPrefixes(targetString)
  818. lowestPrefix := GetLowestChannelModePrefix(prefixes)
  819. // eh, no need to notify them
  820. if len(targetString) < 1 {
  821. continue
  822. }
  823. target, err := CasefoldChannel(targetString)
  824. if err == nil {
  825. channel := server.channels.Get(target)
  826. if channel == nil {
  827. client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, targetString, "No such channel")
  828. continue
  829. }
  830. if !channel.CanSpeak(client) {
  831. client.Send(nil, client.server.name, ERR_CANNOTSENDTOCHAN, channel.name, "Cannot send to channel")
  832. continue
  833. }
  834. msgid := server.generateMessageID()
  835. channel.SplitPrivMsg(msgid, lowestPrefix, clientOnlyTags, client, splitMsg)
  836. } else {
  837. target, err = CasefoldName(targetString)
  838. if target == "chanserv" {
  839. server.chanservReceivePrivmsg(client, message)
  840. continue
  841. } else if target == "nickserv" {
  842. server.nickservReceivePrivmsg(client, message)
  843. continue
  844. }
  845. user := server.clients.Get(target)
  846. if err != nil || user == nil {
  847. if len(target) > 0 {
  848. client.Send(nil, server.name, ERR_NOSUCHNICK, target, "No such nick")
  849. }
  850. continue
  851. }
  852. if !user.capabilities[MessageTags] {
  853. clientOnlyTags = nil
  854. }
  855. msgid := server.generateMessageID()
  856. user.SendSplitMsgFromClient(msgid, client, clientOnlyTags, "PRIVMSG", user.nick, splitMsg)
  857. if client.capabilities[EchoMessage] {
  858. client.SendSplitMsgFromClient(msgid, client, clientOnlyTags, "PRIVMSG", user.nick, splitMsg)
  859. }
  860. if user.flags[Away] {
  861. //TODO(dan): possibly implement cooldown of away notifications to users
  862. client.Send(nil, server.name, RPL_AWAY, user.nick, user.awayMessage)
  863. }
  864. }
  865. }
  866. return false
  867. }
  868. // TAGMSG <target>{,<target>}
  869. func tagmsgHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  870. clientOnlyTags := GetClientOnlyTags(msg.Tags)
  871. // no client-only tags, so we can drop it
  872. if clientOnlyTags == nil {
  873. return false
  874. }
  875. targets := strings.Split(msg.Params[0], ",")
  876. for i, targetString := range targets {
  877. // max of four targets per privmsg
  878. if i > maxTargets-1 {
  879. break
  880. }
  881. prefixes, targetString := SplitChannelMembershipPrefixes(targetString)
  882. lowestPrefix := GetLowestChannelModePrefix(prefixes)
  883. // eh, no need to notify them
  884. if len(targetString) < 1 {
  885. continue
  886. }
  887. target, err := CasefoldChannel(targetString)
  888. if err == nil {
  889. channel := server.channels.Get(target)
  890. if channel == nil {
  891. client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, targetString, "No such channel")
  892. continue
  893. }
  894. if !channel.CanSpeak(client) {
  895. client.Send(nil, client.server.name, ERR_CANNOTSENDTOCHAN, channel.name, "Cannot send to channel")
  896. continue
  897. }
  898. msgid := server.generateMessageID()
  899. channel.TagMsg(msgid, lowestPrefix, clientOnlyTags, client)
  900. } else {
  901. target, err = CasefoldName(targetString)
  902. user := server.clients.Get(target)
  903. if err != nil || user == nil {
  904. if len(target) > 0 {
  905. client.Send(nil, server.name, ERR_NOSUCHNICK, target, "No such nick")
  906. }
  907. continue
  908. }
  909. msgid := server.generateMessageID()
  910. // end user can't receive tagmsgs
  911. if !user.capabilities[MessageTags] {
  912. continue
  913. }
  914. user.SendFromClient(msgid, client, clientOnlyTags, "TAGMSG", user.nick)
  915. if client.capabilities[EchoMessage] {
  916. client.SendFromClient(msgid, client, clientOnlyTags, "TAGMSG", user.nick)
  917. }
  918. if user.flags[Away] {
  919. //TODO(dan): possibly implement cooldown of away notifications to users
  920. client.Send(nil, server.name, RPL_AWAY, user.nick, user.awayMessage)
  921. }
  922. }
  923. }
  924. return false
  925. }
  926. // WhoisChannelsNames returns the common channel names between two users.
  927. func (client *Client) WhoisChannelsNames(target *Client) []string {
  928. isMultiPrefix := target.capabilities[MultiPrefix]
  929. var chstrs []string
  930. index := 0
  931. for channel := range client.channels {
  932. channel.membersMutex.RLock()
  933. defer channel.membersMutex.RUnlock()
  934. // channel is secret and the target can't see it
  935. if !target.flags[Operator] && channel.flags[Secret] && !channel.members.Has(target) {
  936. continue
  937. }
  938. chstrs = append(chstrs, channel.members[client].Prefixes(isMultiPrefix)+channel.name)
  939. index++
  940. }
  941. return chstrs
  942. }
  943. // WHOIS [ <target> ] <mask> *( "," <mask> )
  944. func whoisHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  945. var masksString string
  946. //var target string
  947. if len(msg.Params) > 1 {
  948. //target = msg.Params[0]
  949. masksString = msg.Params[1]
  950. } else {
  951. masksString = msg.Params[0]
  952. }
  953. if len(strings.TrimSpace(masksString)) < 1 {
  954. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, msg.Command, "No masks given")
  955. return false
  956. }
  957. if client.flags[Operator] {
  958. masks := strings.Split(masksString, ",")
  959. for _, mask := range masks {
  960. casefoldedMask, err := Casefold(mask)
  961. if err != nil {
  962. client.Send(nil, client.server.name, ERR_NOSUCHNICK, mask, "No such nick")
  963. continue
  964. }
  965. matches := server.clients.FindAll(casefoldedMask)
  966. if len(matches) == 0 {
  967. client.Send(nil, client.server.name, ERR_NOSUCHNICK, mask, "No such nick")
  968. continue
  969. }
  970. for mclient := range matches {
  971. client.getWhoisOf(mclient)
  972. }
  973. }
  974. } else {
  975. // only get the first request
  976. casefoldedMask, err := Casefold(strings.Split(masksString, ",")[0])
  977. mclient := server.clients.Get(casefoldedMask)
  978. if err != nil || mclient == nil {
  979. client.Send(nil, client.server.name, ERR_NOSUCHNICK, masksString, "No such nick")
  980. // fall through, ENDOFWHOIS is always sent
  981. } else {
  982. client.getWhoisOf(mclient)
  983. }
  984. }
  985. client.Send(nil, server.name, RPL_ENDOFWHOIS, client.nick, masksString, "End of /WHOIS list")
  986. return false
  987. }
  988. func (client *Client) getWhoisOf(target *Client) {
  989. client.Send(nil, client.server.name, RPL_WHOISUSER, client.nick, target.nick, target.username, target.hostname, "*", target.realname)
  990. whoischannels := client.WhoisChannelsNames(target)
  991. if whoischannels != nil {
  992. client.Send(nil, client.server.name, RPL_WHOISCHANNELS, client.nick, target.nick, strings.Join(whoischannels, " "))
  993. }
  994. if target.class != nil {
  995. client.Send(nil, client.server.name, RPL_WHOISOPERATOR, client.nick, target.nick, target.whoisLine)
  996. }
  997. if target.certfp != "" && (client.flags[Operator] || client == target) {
  998. client.Send(nil, client.server.name, RPL_WHOISCERTFP, client.nick, target.nick, fmt.Sprintf("has client certificate fingerprint %s", target.certfp))
  999. }
  1000. client.Send(nil, client.server.name, RPL_WHOISIDLE, client.nick, target.nick, strconv.FormatUint(target.IdleSeconds(), 10), strconv.FormatInt(target.SignonTime(), 10), "seconds idle, signon time")
  1001. }
  1002. // RplWhoReplyNoMutex returns the WHO reply between one user and another channel/user.
  1003. // <channel> <user> <host> <server> <nick> ( "H" / "G" ) ["*"] [ ( "@" / "+" ) ]
  1004. // :<hopcount> <real name>
  1005. func (target *Client) RplWhoReplyNoMutex(channel *Channel, client *Client) {
  1006. channelName := "*"
  1007. flags := ""
  1008. if client.flags[Away] {
  1009. flags = "G"
  1010. } else {
  1011. flags = "H"
  1012. }
  1013. if client.flags[Operator] {
  1014. flags += "*"
  1015. }
  1016. if channel != nil {
  1017. flags += channel.members[client].Prefixes(target.capabilities[MultiPrefix])
  1018. channelName = channel.name
  1019. }
  1020. target.Send(nil, target.server.name, RPL_WHOREPLY, target.nick, channelName, client.username, client.hostname, client.server.name, client.nick, flags, strconv.Itoa(client.hops)+" "+client.realname)
  1021. }
  1022. func whoChannel(client *Client, channel *Channel, friends ClientSet) {
  1023. channel.membersMutex.RLock()
  1024. defer channel.membersMutex.RUnlock()
  1025. for member := range channel.members {
  1026. if !client.flags[Invisible] || friends[client] {
  1027. client.RplWhoReplyNoMutex(channel, member)
  1028. }
  1029. }
  1030. }
  1031. // WHO [ <mask> [ "o" ] ]
  1032. func whoHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1033. friends := client.Friends()
  1034. var mask string
  1035. if len(msg.Params) > 0 {
  1036. casefoldedMask, err := Casefold(msg.Params[0])
  1037. if err != nil {
  1038. client.Send(nil, server.name, ERR_UNKNOWNERROR, "WHO", "Mask isn't valid")
  1039. return false
  1040. }
  1041. mask = casefoldedMask
  1042. }
  1043. //TODO(dan): is this used and would I put this param in the Modern doc?
  1044. // if not, can we remove it?
  1045. //var operatorOnly bool
  1046. //if len(msg.Params) > 1 && msg.Params[1] == "o" {
  1047. // operatorOnly = true
  1048. //}
  1049. if mask == "" {
  1050. server.channels.ChansLock.RLock()
  1051. for _, channel := range server.channels.Chans {
  1052. whoChannel(client, channel, friends)
  1053. }
  1054. server.channels.ChansLock.RUnlock()
  1055. } else if mask[0] == '#' {
  1056. // TODO implement wildcard matching
  1057. //TODO(dan): ^ only for opers
  1058. channel := server.channels.Get(mask)
  1059. if channel != nil {
  1060. whoChannel(client, channel, friends)
  1061. }
  1062. } else {
  1063. for mclient := range server.clients.FindAll(mask) {
  1064. client.RplWhoReplyNoMutex(nil, mclient)
  1065. }
  1066. }
  1067. client.Send(nil, server.name, RPL_ENDOFWHO, client.nick, mask, "End of WHO list")
  1068. return false
  1069. }
  1070. // OPER <name> <password>
  1071. func operHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1072. name, err := CasefoldName(msg.Params[0])
  1073. if err != nil {
  1074. client.Send(nil, server.name, ERR_PASSWDMISMATCH, client.nick, "Password incorrect")
  1075. return true
  1076. }
  1077. hash := server.operators[name].Pass
  1078. password := []byte(msg.Params[1])
  1079. err = ComparePassword(hash, password)
  1080. if (hash == nil) || (err != nil) {
  1081. client.Send(nil, server.name, ERR_PASSWDMISMATCH, client.nick, "Password incorrect")
  1082. return true
  1083. }
  1084. client.flags[Operator] = true
  1085. client.operName = name
  1086. client.class = server.operators[name].Class
  1087. server.currentOpers[client] = true
  1088. client.whoisLine = server.operators[name].WhoisLine
  1089. // push new vhost if one is set
  1090. if len(server.operators[name].Vhost) > 0 {
  1091. for fClient := range client.Friends(ChgHost) {
  1092. fClient.SendFromClient("", client, nil, "CHGHOST", client.username, server.operators[name].Vhost)
  1093. }
  1094. // CHGHOST requires prefix nickmask to have original hostname, so do that before updating nickmask
  1095. client.vhost = server.operators[name].Vhost
  1096. client.updateNickMask()
  1097. }
  1098. client.Send(nil, server.name, RPL_YOUREOPER, client.nick, "You are now an IRC operator")
  1099. //TODO(dan): Should this be sent automagically as part of setting the flag/mode?
  1100. modech := ModeChanges{ModeChange{
  1101. mode: Operator,
  1102. op: Add,
  1103. }}
  1104. client.Send(nil, server.name, "MODE", client.nick, modech.String())
  1105. return false
  1106. }
  1107. // rehash reloads the config and applies the changes from the config file.
  1108. func (server *Server) rehash() error {
  1109. server.logger.Debug("rehash", "Starting rehash")
  1110. // only let one REHASH go on at a time
  1111. server.rehashMutex.Lock()
  1112. defer server.rehashMutex.Unlock()
  1113. server.logger.Debug("rehash", "Got rehash lock")
  1114. config, err := LoadConfig(server.configFilename)
  1115. if err != nil {
  1116. return fmt.Errorf("Error rehashing config file config: %s", err.Error())
  1117. }
  1118. // line lengths cannot be changed after launching the server
  1119. if server.limits.LineLen.Tags != config.Limits.LineLen.Tags || server.limits.LineLen.Rest != config.Limits.LineLen.Rest {
  1120. return fmt.Errorf("Maximum line length (linelen) cannot be changed after launching the server, rehash aborted")
  1121. }
  1122. // confirm connectionLimits are fine
  1123. connectionLimits, err := NewConnectionLimits(config.Server.ConnectionLimits)
  1124. if err != nil {
  1125. return fmt.Errorf("Error rehashing config file connection-limits: %s", err.Error())
  1126. }
  1127. // confirm connectionThrottler is fine
  1128. connectionThrottle, err := NewConnectionThrottle(config.Server.ConnectionThrottle)
  1129. if err != nil {
  1130. return fmt.Errorf("Error rehashing config file connection-throttle: %s", err.Error())
  1131. }
  1132. // confirm operator stuff all exists and is fine
  1133. operclasses, err := config.OperatorClasses()
  1134. if err != nil {
  1135. return fmt.Errorf("Error rehashing config file operclasses: %s", err.Error())
  1136. }
  1137. opers, err := config.Operators(operclasses)
  1138. if err != nil {
  1139. return fmt.Errorf("Error rehashing config file opers: %s", err.Error())
  1140. }
  1141. for client := range server.currentOpers {
  1142. _, exists := opers[client.operName]
  1143. if !exists {
  1144. return fmt.Errorf("Oper [%s] no longer exists (used by client [%s])", client.operName, client.nickMaskString)
  1145. }
  1146. }
  1147. // apply new connectionlimits
  1148. server.connectionLimitsMutex.Lock()
  1149. server.connectionLimits = connectionLimits
  1150. server.connectionThrottleMutex.Lock()
  1151. server.connectionThrottle = connectionThrottle
  1152. server.clients.ByNickMutex.RLock()
  1153. for _, client := range server.clients.ByNick {
  1154. ipaddr := net.ParseIP(IPString(client.socket.conn.RemoteAddr()))
  1155. if ipaddr != nil {
  1156. server.connectionLimits.AddClient(ipaddr, true)
  1157. }
  1158. }
  1159. server.clients.ByNickMutex.RUnlock()
  1160. server.connectionThrottleMutex.Unlock()
  1161. server.connectionLimitsMutex.Unlock()
  1162. // setup new and removed caps
  1163. addedCaps := make(CapabilitySet)
  1164. removedCaps := make(CapabilitySet)
  1165. updatedCaps := make(CapabilitySet)
  1166. // SASL
  1167. if config.Accounts.AuthenticationEnabled && !server.accountAuthenticationEnabled {
  1168. // enabling SASL
  1169. SupportedCapabilities[SASL] = true
  1170. addedCaps[SASL] = true
  1171. }
  1172. if !config.Accounts.AuthenticationEnabled && server.accountAuthenticationEnabled {
  1173. // disabling SASL
  1174. SupportedCapabilities[SASL] = false
  1175. removedCaps[SASL] = true
  1176. }
  1177. server.accountAuthenticationEnabled = config.Accounts.AuthenticationEnabled
  1178. // STS
  1179. stsValue := config.Server.STS.Value()
  1180. var stsDisabled bool
  1181. server.logger.Debug("rehash", "STS Vals", CapValues[STS], stsValue, fmt.Sprintf("server[%v] config[%v]", server.stsEnabled, config.Server.STS.Enabled))
  1182. if config.Server.STS.Enabled && !server.stsEnabled {
  1183. // enabling STS
  1184. SupportedCapabilities[STS] = true
  1185. addedCaps[STS] = true
  1186. CapValues[STS] = stsValue
  1187. } else if !config.Server.STS.Enabled && server.stsEnabled {
  1188. // disabling STS
  1189. SupportedCapabilities[STS] = false
  1190. removedCaps[STS] = true
  1191. stsDisabled = true
  1192. } else if config.Server.STS.Enabled && server.stsEnabled && stsValue != CapValues[STS] {
  1193. // STS policy updated
  1194. CapValues[STS] = stsValue
  1195. updatedCaps[STS] = true
  1196. }
  1197. server.stsEnabled = config.Server.STS.Enabled
  1198. // burst new and removed caps
  1199. var capBurstClients ClientSet
  1200. added := make(map[CapVersion]string)
  1201. var removed string
  1202. // updated caps get DEL'd and then NEW'd
  1203. // so, we can just add updated ones to both removed and added lists here and they'll be correctly handled
  1204. server.logger.Debug("rehash", "Updated Caps", updatedCaps.String(Cap301), strconv.Itoa(len(updatedCaps)))
  1205. if len(updatedCaps) > 0 {
  1206. for capab := range updatedCaps {
  1207. addedCaps[capab] = true
  1208. removedCaps[capab] = true
  1209. }
  1210. }
  1211. if len(addedCaps) > 0 || len(removedCaps) > 0 {
  1212. capBurstClients = server.clients.AllWithCaps(CapNotify)
  1213. added[Cap301] = addedCaps.String(Cap301)
  1214. added[Cap302] = addedCaps.String(Cap302)
  1215. // removed never has values
  1216. removed = removedCaps.String(Cap301)
  1217. }
  1218. for sClient := range capBurstClients {
  1219. if stsDisabled {
  1220. // remove STS policy
  1221. //TODO(dan): this is an ugly hack. we can write this better.
  1222. stsPolicy := "sts=duration=0"
  1223. if len(addedCaps) > 0 {
  1224. added[Cap302] = added[Cap302] + " " + stsPolicy
  1225. } else {
  1226. addedCaps[STS] = true
  1227. added[Cap302] = stsPolicy
  1228. }
  1229. }
  1230. // DEL caps and then send NEW ones so that updated caps get removed/added correctly
  1231. if len(removedCaps) > 0 {
  1232. sClient.Send(nil, server.name, "CAP", sClient.nick, "DEL", removed)
  1233. }
  1234. if len(addedCaps) > 0 {
  1235. sClient.Send(nil, server.name, "CAP", sClient.nick, "NEW", added[sClient.capVersion])
  1236. }
  1237. }
  1238. // set server options
  1239. lineLenConfig := LineLenLimits{
  1240. Tags: config.Limits.LineLen.Tags,
  1241. Rest: config.Limits.LineLen.Rest,
  1242. }
  1243. server.limits = Limits{
  1244. AwayLen: int(config.Limits.AwayLen),
  1245. ChannelLen: int(config.Limits.ChannelLen),
  1246. KickLen: int(config.Limits.KickLen),
  1247. MonitorEntries: int(config.Limits.MonitorEntries),
  1248. NickLen: int(config.Limits.NickLen),
  1249. TopicLen: int(config.Limits.TopicLen),
  1250. ChanListModes: int(config.Limits.ChanListModes),
  1251. LineLen: lineLenConfig,
  1252. }
  1253. server.operclasses = *operclasses
  1254. server.operators = opers
  1255. server.checkIdent = config.Server.CheckIdent
  1256. // registration
  1257. accountReg := NewAccountRegistration(config.Accounts.Registration)
  1258. server.accountRegistration = &accountReg
  1259. server.channelRegistrationEnabled = config.Channels.Registration.Enabled
  1260. // set new sendqueue size
  1261. if config.Server.MaxSendQBytes != server.MaxSendQBytes {
  1262. server.MaxSendQBytes = config.Server.MaxSendQBytes
  1263. // update on all clients
  1264. server.clients.ByNickMutex.RLock()
  1265. for _, sClient := range server.clients.ByNick {
  1266. sClient.socket.MaxSendQBytes = config.Server.MaxSendQBytes
  1267. }
  1268. server.clients.ByNickMutex.RUnlock()
  1269. }
  1270. // set RPL_ISUPPORT
  1271. oldISupportList := server.isupport
  1272. server.setISupport()
  1273. newISupportReplies := oldISupportList.GetDifference(server.isupport)
  1274. // push new info to all of our clients
  1275. server.clients.ByNickMutex.RLock()
  1276. for _, sClient := range server.clients.ByNick {
  1277. for _, tokenline := range newISupportReplies {
  1278. // ugly trickery ahead
  1279. sClient.Send(nil, server.name, RPL_ISUPPORT, append([]string{sClient.nick}, tokenline...)...)
  1280. }
  1281. }
  1282. server.clients.ByNickMutex.RUnlock()
  1283. // destroy old listeners
  1284. tlsListeners := config.TLSListeners()
  1285. for addr := range server.listeners {
  1286. var exists bool
  1287. for _, newaddr := range config.Server.Listen {
  1288. if newaddr == addr {
  1289. exists = true
  1290. break
  1291. }
  1292. }
  1293. server.listenerEventActMutex.Lock()
  1294. if exists {
  1295. // update old listener
  1296. server.listeners[addr].Events <- ListenerEvent{
  1297. Type: UpdateListener,
  1298. NewConfig: tlsListeners[addr],
  1299. }
  1300. } else {
  1301. // destroy nonexistent listener
  1302. server.listeners[addr].Events <- ListenerEvent{
  1303. Type: DestroyListener,
  1304. }
  1305. }
  1306. // force listener to apply the event right away
  1307. server.listeners[addr].Listener.Close()
  1308. server.listenerEventActMutex.Unlock()
  1309. }
  1310. for _, newaddr := range config.Server.Listen {
  1311. _, exists := server.listeners[newaddr]
  1312. if !exists {
  1313. // make new listener
  1314. server.createListener(newaddr, tlsListeners)
  1315. }
  1316. }
  1317. return nil
  1318. }
  1319. // REHASH
  1320. func rehashHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1321. server.logger.Info("rehash", fmt.Sprintf("REHASH command used by %s", client.nick))
  1322. err := server.rehash()
  1323. if err == nil {
  1324. client.Send(nil, server.name, RPL_REHASHING, client.nick, "ircd.yaml", "Rehashing")
  1325. } else {
  1326. server.logger.Error("rehash", fmt.Sprintln("Failed to rehash:", err.Error()))
  1327. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, "REHASH", err.Error())
  1328. }
  1329. return false
  1330. }
  1331. // AWAY [<message>]
  1332. func awayHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1333. var isAway bool
  1334. var text string
  1335. if len(msg.Params) > 0 {
  1336. isAway = true
  1337. text = msg.Params[0]
  1338. if len(text) > server.limits.AwayLen {
  1339. text = text[:server.limits.AwayLen]
  1340. }
  1341. }
  1342. if isAway {
  1343. client.flags[Away] = true
  1344. } else {
  1345. delete(client.flags, Away)
  1346. }
  1347. client.awayMessage = text
  1348. var op ModeOp
  1349. if client.flags[Away] {
  1350. op = Add
  1351. client.Send(nil, server.name, RPL_NOWAWAY, client.nick, "You have been marked as being away")
  1352. } else {
  1353. op = Remove
  1354. client.Send(nil, server.name, RPL_UNAWAY, client.nick, "You are no longer marked as being away")
  1355. }
  1356. //TODO(dan): Should this be sent automagically as part of setting the flag/mode?
  1357. modech := ModeChanges{ModeChange{
  1358. mode: Away,
  1359. op: op,
  1360. }}
  1361. client.Send(nil, server.name, "MODE", client.nick, client.nick, modech.String())
  1362. // dispatch away-notify
  1363. for friend := range client.Friends(AwayNotify) {
  1364. if client.flags[Away] {
  1365. friend.SendFromClient("", client, nil, "AWAY", client.awayMessage)
  1366. } else {
  1367. friend.SendFromClient("", client, nil, "AWAY")
  1368. }
  1369. }
  1370. return false
  1371. }
  1372. // ISON <nick>{ <nick>}
  1373. func isonHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1374. var nicks = msg.Params
  1375. var err error
  1376. var casefoldedNick string
  1377. ison := make([]string, 0)
  1378. for _, nick := range nicks {
  1379. casefoldedNick, err = CasefoldName(nick)
  1380. if err != nil {
  1381. continue
  1382. }
  1383. if iclient := server.clients.Get(casefoldedNick); iclient != nil {
  1384. ison = append(ison, iclient.nick)
  1385. }
  1386. }
  1387. client.Send(nil, server.name, RPL_ISON, client.nick, strings.Join(nicks, " "))
  1388. return false
  1389. }
  1390. // MOTD [<target>]
  1391. func motdHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1392. //TODO(dan): hook this up when we have multiple servers I guess???
  1393. //var target string
  1394. //if len(msg.Params) > 0 {
  1395. // target = msg.Params[0]
  1396. //}
  1397. server.MOTD(client)
  1398. return false
  1399. }
  1400. // NOTICE <target>{,<target>} <message>
  1401. func noticeHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1402. clientOnlyTags := GetClientOnlyTags(msg.Tags)
  1403. targets := strings.Split(msg.Params[0], ",")
  1404. message := msg.Params[1]
  1405. // split privmsg
  1406. splitMsg := server.splitMessage(message, !client.capabilities[MaxLine])
  1407. for i, targetString := range targets {
  1408. // max of four targets per privmsg
  1409. if i > maxTargets-1 {
  1410. break
  1411. }
  1412. prefixes, targetString := SplitChannelMembershipPrefixes(targetString)
  1413. lowestPrefix := GetLowestChannelModePrefix(prefixes)
  1414. target, cerr := CasefoldChannel(targetString)
  1415. if cerr == nil {
  1416. channel := server.channels.Get(target)
  1417. if channel == nil {
  1418. // errors silently ignored with NOTICE as per RFC
  1419. continue
  1420. }
  1421. if !channel.CanSpeak(client) {
  1422. // errors silently ignored with NOTICE as per RFC
  1423. continue
  1424. }
  1425. msgid := server.generateMessageID()
  1426. channel.SplitNotice(msgid, lowestPrefix, clientOnlyTags, client, splitMsg)
  1427. } else {
  1428. target, err := CasefoldName(targetString)
  1429. if err != nil {
  1430. continue
  1431. }
  1432. if target == "chanserv" {
  1433. server.chanservReceiveNotice(client, message)
  1434. continue
  1435. } else if target == "nickserv" {
  1436. server.nickservReceiveNotice(client, message)
  1437. continue
  1438. }
  1439. user := server.clients.Get(target)
  1440. if user == nil {
  1441. // errors silently ignored with NOTICE as per RFC
  1442. continue
  1443. }
  1444. if !user.capabilities[MessageTags] {
  1445. clientOnlyTags = nil
  1446. }
  1447. msgid := server.generateMessageID()
  1448. user.SendSplitMsgFromClient(msgid, client, clientOnlyTags, "NOTICE", user.nick, splitMsg)
  1449. if client.capabilities[EchoMessage] {
  1450. client.SendSplitMsgFromClient(msgid, client, clientOnlyTags, "NOTICE", user.nick, splitMsg)
  1451. }
  1452. }
  1453. }
  1454. return false
  1455. }
  1456. // KICK <channel>{,<channel>} <user>{,<user>} [<comment>]
  1457. func kickHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1458. channels := strings.Split(msg.Params[0], ",")
  1459. users := strings.Split(msg.Params[1], ",")
  1460. if (len(channels) != len(users)) && (len(users) != 1) {
  1461. client.Send(nil, server.name, ERR_NEEDMOREPARAMS, client.nick, "KICK", "Not enough parameters")
  1462. return false
  1463. }
  1464. var kicks [][]string
  1465. for index, channel := range channels {
  1466. if len(users) == 1 {
  1467. kicks = append(kicks, []string{channel, users[0]})
  1468. } else {
  1469. kicks = append(kicks, []string{channel, users[index]})
  1470. }
  1471. }
  1472. var comment string
  1473. if len(msg.Params) > 2 {
  1474. comment = msg.Params[2]
  1475. }
  1476. for _, info := range kicks {
  1477. chname := info[0]
  1478. nickname := info[1]
  1479. casefoldedChname, err := CasefoldChannel(chname)
  1480. channel := server.channels.Get(casefoldedChname)
  1481. if err != nil || channel == nil {
  1482. client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, "No such channel")
  1483. continue
  1484. }
  1485. casefoldedNickname, err := CasefoldName(nickname)
  1486. target := server.clients.Get(casefoldedNickname)
  1487. if err != nil || target == nil {
  1488. client.Send(nil, server.name, ERR_NOSUCHNICK, nickname, "No such nick")
  1489. continue
  1490. }
  1491. // make sure client has privs to kick the given user
  1492. //TODO(dan): split this into a separate function that checks if users have privs
  1493. // over other users, useful for things like -aoh as well
  1494. channel.membersMutex.Lock()
  1495. var hasPrivs bool
  1496. for _, mode := range ChannelPrivModes {
  1497. if channel.members[client][mode] {
  1498. hasPrivs = true
  1499. // admins cannot kick other admins
  1500. if mode == ChannelAdmin && channel.members[target][ChannelAdmin] {
  1501. hasPrivs = false
  1502. }
  1503. break
  1504. } else if channel.members[target][mode] {
  1505. break
  1506. }
  1507. }
  1508. if hasPrivs {
  1509. if comment == "" {
  1510. comment = nickname
  1511. }
  1512. channel.kickNoMutex(client, target, comment)
  1513. } else {
  1514. client.Send(nil, client.server.name, ERR_CHANOPRIVSNEEDED, chname, "You're not a channel operator")
  1515. }
  1516. channel.membersMutex.Unlock()
  1517. }
  1518. return false
  1519. }
  1520. // LIST [<channel>{,<channel>} [<server>]]
  1521. func listHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1522. var channels []string
  1523. if len(msg.Params) > 0 {
  1524. channels = strings.Split(msg.Params[0], ",")
  1525. }
  1526. var target string
  1527. if len(msg.Params) > 1 {
  1528. target = msg.Params[1]
  1529. }
  1530. //TODO(dan): target server when we have multiple servers
  1531. //TODO(dan): we should continue just fine if it's this current server though
  1532. if target != "" {
  1533. client.Send(nil, server.name, ERR_NOSUCHSERVER, client.nick, target, "No such server")
  1534. return false
  1535. }
  1536. if len(channels) == 0 {
  1537. server.channels.ChansLock.RLock()
  1538. for _, channel := range server.channels.Chans {
  1539. if !client.flags[Operator] && channel.flags[Secret] {
  1540. continue
  1541. }
  1542. client.RplList(channel)
  1543. }
  1544. server.channels.ChansLock.RUnlock()
  1545. } else {
  1546. // limit regular users to only listing one channel
  1547. if !client.flags[Operator] {
  1548. channels = channels[:1]
  1549. }
  1550. for _, chname := range channels {
  1551. casefoldedChname, err := CasefoldChannel(chname)
  1552. channel := server.channels.Get(casefoldedChname)
  1553. if err != nil || channel == nil || (!client.flags[Operator] && channel.flags[Secret]) {
  1554. if len(chname) > 0 {
  1555. client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, "No such channel")
  1556. }
  1557. continue
  1558. }
  1559. client.RplList(channel)
  1560. }
  1561. }
  1562. client.Send(nil, server.name, RPL_LISTEND, client.nick, "End of LIST")
  1563. return false
  1564. }
  1565. func (target *Client) RplList(channel *Channel) {
  1566. channel.membersMutex.RLock()
  1567. defer channel.membersMutex.RUnlock()
  1568. // get the correct number of channel members
  1569. var memberCount int
  1570. if target.flags[Operator] || channel.members.Has(target) {
  1571. memberCount = len(channel.members)
  1572. } else {
  1573. for member := range channel.members {
  1574. if !member.flags[Invisible] {
  1575. memberCount++
  1576. }
  1577. }
  1578. }
  1579. target.Send(nil, target.server.name, RPL_LIST, target.nick, channel.name, strconv.Itoa(memberCount), channel.topic)
  1580. }
  1581. // NAMES [<channel>{,<channel>}]
  1582. func namesHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1583. var channels []string
  1584. if len(msg.Params) > 0 {
  1585. channels = strings.Split(msg.Params[0], ",")
  1586. }
  1587. //var target string
  1588. //if len(msg.Params) > 1 {
  1589. // target = msg.Params[1]
  1590. //}
  1591. if len(channels) == 0 {
  1592. server.channels.ChansLock.RLock()
  1593. for _, channel := range server.channels.Chans {
  1594. channel.Names(client)
  1595. }
  1596. server.channels.ChansLock.RUnlock()
  1597. return false
  1598. }
  1599. // limit regular users to only listing one channel
  1600. if !client.flags[Operator] {
  1601. channels = channels[:1]
  1602. }
  1603. for _, chname := range channels {
  1604. casefoldedChname, err := CasefoldChannel(chname)
  1605. channel := server.channels.Get(casefoldedChname)
  1606. if err != nil || channel == nil {
  1607. if len(chname) > 0 {
  1608. client.Send(nil, server.name, ERR_NOSUCHCHANNEL, client.nick, chname, "No such channel")
  1609. }
  1610. continue
  1611. }
  1612. channel.Names(client)
  1613. }
  1614. return false
  1615. }
  1616. // VERSION [<server>]
  1617. func versionHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1618. var target string
  1619. if len(msg.Params) > 0 {
  1620. target = msg.Params[0]
  1621. }
  1622. casefoldedTarget, err := Casefold(target)
  1623. if target != "" && (err != nil || casefoldedTarget != server.nameCasefolded) {
  1624. client.Send(nil, server.name, ERR_NOSUCHSERVER, client.nick, target, "No such server")
  1625. return false
  1626. }
  1627. client.Send(nil, server.name, RPL_VERSION, client.nick, Ver, server.name)
  1628. client.RplISupport()
  1629. return false
  1630. }
  1631. // INVITE <nickname> <channel>
  1632. func inviteHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1633. nickname := msg.Params[0]
  1634. channelName := msg.Params[1]
  1635. casefoldedNickname, err := CasefoldName(nickname)
  1636. target := server.clients.Get(casefoldedNickname)
  1637. if err != nil || target == nil {
  1638. client.Send(nil, server.name, ERR_NOSUCHNICK, client.nick, nickname, "No such nick")
  1639. return false
  1640. }
  1641. casefoldedChannelName, err := CasefoldChannel(channelName)
  1642. channel := server.channels.Get(casefoldedChannelName)
  1643. if err != nil || channel == nil {
  1644. client.Send(nil, server.name, RPL_INVITING, client.nick, target.nick, channelName)
  1645. target.Send(nil, client.nickMaskString, "INVITE", target.nick, channel.name)
  1646. return true
  1647. }
  1648. channel.Invite(target, client)
  1649. return false
  1650. }
  1651. // TIME [<server>]
  1652. func timeHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1653. var target string
  1654. if len(msg.Params) > 0 {
  1655. target = msg.Params[0]
  1656. }
  1657. casefoldedTarget, err := Casefold(target)
  1658. if (target != "") && err != nil || (casefoldedTarget != server.nameCasefolded) {
  1659. client.Send(nil, server.name, ERR_NOSUCHSERVER, client.nick, target, "No such server")
  1660. return false
  1661. }
  1662. client.Send(nil, server.name, RPL_TIME, client.nick, server.name, time.Now().Format(time.RFC1123))
  1663. return false
  1664. }
  1665. // KILL <nickname> <comment>
  1666. func killHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1667. nickname := msg.Params[0]
  1668. comment := "<no reason supplied>"
  1669. if len(msg.Params) > 1 {
  1670. comment = msg.Params[1]
  1671. }
  1672. casefoldedNickname, err := CasefoldName(nickname)
  1673. target := server.clients.Get(casefoldedNickname)
  1674. if err != nil || target == nil {
  1675. client.Send(nil, client.server.name, ERR_NOSUCHNICK, nickname, "No such nick")
  1676. return false
  1677. }
  1678. quitMsg := fmt.Sprintf("Killed (%s (%s))", client.nick, comment)
  1679. target.Quit(quitMsg)
  1680. target.destroy()
  1681. return false
  1682. }
  1683. // WHOWAS <nickname> [<count> [<server>]]
  1684. func whowasHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1685. nicknames := strings.Split(msg.Params[0], ",")
  1686. var count int64
  1687. if len(msg.Params) > 1 {
  1688. count, _ = strconv.ParseInt(msg.Params[1], 10, 64)
  1689. }
  1690. //var target string
  1691. //if len(msg.Params) > 2 {
  1692. // target = msg.Params[2]
  1693. //}
  1694. for _, nickname := range nicknames {
  1695. results := server.whoWas.Find(nickname, count)
  1696. if len(results) == 0 {
  1697. if len(nickname) > 0 {
  1698. client.Send(nil, server.name, ERR_WASNOSUCHNICK, client.nick, nickname, "There was no such nickname")
  1699. }
  1700. } else {
  1701. for _, whoWas := range results {
  1702. client.Send(nil, server.name, RPL_WHOWASUSER, client.nick, whoWas.nickname, whoWas.username, whoWas.hostname, "*", whoWas.realname)
  1703. }
  1704. }
  1705. if len(nickname) > 0 {
  1706. client.Send(nil, server.name, RPL_ENDOFWHOWAS, client.nick, nickname, "End of WHOWAS")
  1707. }
  1708. }
  1709. return false
  1710. }
  1711. // LUSERS [<mask> [<server>]]
  1712. func lusersHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1713. //TODO(vegax87) Fix network statistics and additional parameters
  1714. var totalcount, invisiblecount, opercount int
  1715. server.clients.ByNickMutex.RLock()
  1716. defer server.clients.ByNickMutex.RUnlock()
  1717. for _, onlineusers := range server.clients.ByNick {
  1718. totalcount++
  1719. if onlineusers.flags[Invisible] {
  1720. invisiblecount++
  1721. }
  1722. if onlineusers.flags[Operator] {
  1723. opercount++
  1724. }
  1725. }
  1726. client.Send(nil, server.name, RPL_LUSERCLIENT, client.nick, fmt.Sprintf("There are %d users and %d invisible on %d server(s)", totalcount, invisiblecount, 1))
  1727. client.Send(nil, server.name, RPL_LUSEROP, client.nick, fmt.Sprintf("%d IRC Operators online", opercount))
  1728. client.Send(nil, server.name, RPL_LUSERCHANNELS, client.nick, fmt.Sprintf("%d channels formed", server.channels.Len()))
  1729. client.Send(nil, server.name, RPL_LUSERME, client.nick, fmt.Sprintf("I have %d clients and %d servers", totalcount, 1))
  1730. return false
  1731. }
  1732. // USERHOST <nickname> [<nickname> <nickname> ...]
  1733. func userhostHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  1734. returnedNicks := make(map[string]bool)
  1735. for i, nickname := range msg.Params {
  1736. if i >= 10 {
  1737. break
  1738. }
  1739. casefoldedNickname, err := CasefoldName(nickname)
  1740. target := server.clients.Get(casefoldedNickname)
  1741. if err != nil || target == nil {
  1742. client.Send(nil, client.server.name, ERR_NOSUCHNICK, nickname, "No such nick")
  1743. return false
  1744. }
  1745. if returnedNicks[casefoldedNickname] {
  1746. continue
  1747. }
  1748. // to prevent returning multiple results for a single nick
  1749. returnedNicks[casefoldedNickname] = true
  1750. var isOper, isAway string
  1751. if target.flags[Operator] {
  1752. isOper = "*"
  1753. }
  1754. if target.flags[Away] {
  1755. isAway = "-"
  1756. } else {
  1757. isAway = "+"
  1758. }
  1759. client.Send(nil, client.server.name, RPL_USERHOST, client.nick, fmt.Sprintf("%s%s=%s%s@%s", target.nick, isOper, isAway, target.username, target.hostname))
  1760. }
  1761. return false
  1762. }