You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

client_lookup_set.go 11KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423
  1. // Copyright (c) 2012-2014 Jeremy Latt
  2. // Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
  3. // released under the MIT license
  4. package irc
  5. import (
  6. "regexp"
  7. "strings"
  8. "time"
  9. "github.com/goshuirc/irc-go/ircmatch"
  10. "github.com/oragono/oragono/irc/caps"
  11. "github.com/oragono/oragono/irc/modes"
  12. "sync"
  13. )
  14. // ClientManager keeps track of clients by nick, enforcing uniqueness of casefolded nicks
  15. type ClientManager struct {
  16. sync.RWMutex // tier 2
  17. byNick map[string]*Client
  18. bySkeleton map[string]*Client
  19. }
  20. // Initialize initializes a ClientManager.
  21. func (clients *ClientManager) Initialize() {
  22. clients.byNick = make(map[string]*Client)
  23. clients.bySkeleton = make(map[string]*Client)
  24. }
  25. // Count returns how many clients are in the manager.
  26. func (clients *ClientManager) Count() int {
  27. clients.RLock()
  28. defer clients.RUnlock()
  29. count := len(clients.byNick)
  30. return count
  31. }
  32. // Get retrieves a client from the manager, if they exist.
  33. func (clients *ClientManager) Get(nick string) *Client {
  34. casefoldedName, err := CasefoldName(nick)
  35. if err == nil {
  36. clients.RLock()
  37. defer clients.RUnlock()
  38. cli := clients.byNick[casefoldedName]
  39. return cli
  40. }
  41. return nil
  42. }
  43. func (clients *ClientManager) removeInternal(client *Client) (err error) {
  44. // requires holding the writable Lock()
  45. oldcfnick, oldskeleton := client.uniqueIdentifiers()
  46. if oldcfnick == "*" || oldcfnick == "" {
  47. return errNickMissing
  48. }
  49. currentEntry, present := clients.byNick[oldcfnick]
  50. if present {
  51. if currentEntry == client {
  52. delete(clients.byNick, oldcfnick)
  53. } else {
  54. // this shouldn't happen, but we can ignore it
  55. client.server.logger.Warning("internal", "clients for nick out of sync", oldcfnick)
  56. err = errNickMissing
  57. }
  58. } else {
  59. err = errNickMissing
  60. }
  61. currentEntry, present = clients.bySkeleton[oldskeleton]
  62. if present {
  63. if currentEntry == client {
  64. delete(clients.bySkeleton, oldskeleton)
  65. } else {
  66. client.server.logger.Warning("internal", "clients for skeleton out of sync", oldskeleton)
  67. err = errNickMissing
  68. }
  69. } else {
  70. err = errNickMissing
  71. }
  72. return
  73. }
  74. // Remove removes a client from the lookup set.
  75. func (clients *ClientManager) Remove(client *Client) error {
  76. clients.Lock()
  77. defer clients.Unlock()
  78. return clients.removeInternal(client)
  79. }
  80. // Handles a RESUME by attaching a session to a designated client. It is the
  81. // caller's responsibility to verify that the resume is allowed (checking tokens,
  82. // TLS status, etc.) before calling this.
  83. func (clients *ClientManager) Resume(oldClient *Client, session *Session) (err error) {
  84. clients.Lock()
  85. defer clients.Unlock()
  86. cfnick := oldClient.NickCasefolded()
  87. if _, ok := clients.byNick[cfnick]; !ok {
  88. return errNickMissing
  89. }
  90. success, _, _ := oldClient.AddSession(session)
  91. if !success {
  92. return errNickMissing
  93. }
  94. return nil
  95. }
  96. // SetNick sets a client's nickname, validating it against nicknames in use
  97. func (clients *ClientManager) SetNick(client *Client, session *Session, newNick string) (setNick string, err error) {
  98. newcfnick, err := CasefoldName(newNick)
  99. if err != nil {
  100. return "", errNicknameInvalid
  101. }
  102. if len(newcfnick) > client.server.Config().Limits.NickLen {
  103. return "", errNicknameInvalid
  104. }
  105. newSkeleton, err := Skeleton(newNick)
  106. if err != nil {
  107. return "", errNicknameInvalid
  108. }
  109. if restrictedCasefoldedNicks[newcfnick] || restrictedSkeletons[newSkeleton] {
  110. return "", errNicknameInvalid
  111. }
  112. reservedAccount, method := client.server.accounts.EnforcementStatus(newcfnick, newSkeleton)
  113. config := client.server.Config()
  114. client.stateMutex.RLock()
  115. account := client.account
  116. accountName := client.accountName
  117. settings := client.accountSettings
  118. registered := client.registered
  119. realname := client.realname
  120. client.stateMutex.RUnlock()
  121. // recompute this (client.alwaysOn is not set for unregistered clients):
  122. alwaysOn := account != "" && persistenceEnabled(config.Accounts.Bouncer.AlwaysOn, settings.AlwaysOn)
  123. if alwaysOn && registered {
  124. return "", errCantChangeNick
  125. }
  126. var bouncerAllowed bool
  127. if config.Accounts.Bouncer.Enabled {
  128. if alwaysOn {
  129. // ignore the pre-reg nick, force a reattach
  130. newNick = accountName
  131. newcfnick = account
  132. bouncerAllowed = true
  133. } else if session != nil && session.capabilities.Has(caps.Bouncer) {
  134. bouncerAllowed = true
  135. } else {
  136. if config.Accounts.Bouncer.AllowedByDefault && settings.AllowBouncer != BouncerDisallowedByUser {
  137. bouncerAllowed = true
  138. } else if settings.AllowBouncer == BouncerAllowedByUser {
  139. bouncerAllowed = true
  140. }
  141. }
  142. }
  143. clients.Lock()
  144. defer clients.Unlock()
  145. currentClient := clients.byNick[newcfnick]
  146. // the client may just be changing case
  147. if currentClient != nil && currentClient != client && session != nil {
  148. // these conditions forbid reattaching to an existing session:
  149. if registered || !bouncerAllowed || account == "" || account != currentClient.Account() || client.HasMode(modes.TLS) != currentClient.HasMode(modes.TLS) {
  150. return "", errNicknameInUse
  151. }
  152. reattachSuccessful, numSessions, lastSignoff := currentClient.AddSession(session)
  153. if !reattachSuccessful {
  154. return "", errNicknameInUse
  155. }
  156. if numSessions == 1 {
  157. invisible := client.HasMode(modes.Invisible)
  158. operator := client.HasMode(modes.Operator) || client.HasMode(modes.LocalOperator)
  159. client.server.stats.AddRegistered(invisible, operator)
  160. }
  161. session.lastSignoff = lastSignoff
  162. // XXX SetNames only changes names if they are unset, so the realname change only
  163. // takes effect on first attach to an always-on client (good), but the user/ident
  164. // change is always a no-op (bad). we could make user/ident act the same way as
  165. // realname, but then we'd have to send CHGHOST and i don't want to deal with that
  166. // for performance reasons
  167. currentClient.SetNames("user", realname, true)
  168. // successful reattach!
  169. return newNick, nil
  170. }
  171. // analogous checks for skeletons
  172. skeletonHolder := clients.bySkeleton[newSkeleton]
  173. if skeletonHolder != nil && skeletonHolder != client {
  174. return "", errNicknameInUse
  175. }
  176. if method == NickEnforcementStrict && reservedAccount != "" && reservedAccount != account {
  177. return "", errNicknameReserved
  178. }
  179. clients.removeInternal(client)
  180. clients.byNick[newcfnick] = client
  181. clients.bySkeleton[newSkeleton] = client
  182. client.updateNick(newNick, newcfnick, newSkeleton)
  183. return newNick, nil
  184. }
  185. func (clients *ClientManager) AllClients() (result []*Client) {
  186. clients.RLock()
  187. defer clients.RUnlock()
  188. result = make([]*Client, len(clients.byNick))
  189. i := 0
  190. for _, client := range clients.byNick {
  191. result[i] = client
  192. i++
  193. }
  194. return
  195. }
  196. // AllWithCaps returns all clients with the given capabilities.
  197. func (clients *ClientManager) AllWithCaps(capabs ...caps.Capability) (sessions []*Session) {
  198. clients.RLock()
  199. defer clients.RUnlock()
  200. for _, client := range clients.byNick {
  201. for _, session := range client.Sessions() {
  202. if session.capabilities.HasAll(capabs...) {
  203. sessions = append(sessions, session)
  204. }
  205. }
  206. }
  207. return
  208. }
  209. // AllWithCapsNotify returns all clients with the given capabilities, and that support cap-notify.
  210. func (clients *ClientManager) AllWithCapsNotify(capabs ...caps.Capability) (sessions []*Session) {
  211. capabs = append(capabs, caps.CapNotify)
  212. clients.RLock()
  213. defer clients.RUnlock()
  214. for _, client := range clients.byNick {
  215. for _, session := range client.Sessions() {
  216. // cap-notify is implicit in cap version 302 and above
  217. if session.capabilities.HasAll(capabs...) || 302 <= session.capVersion {
  218. sessions = append(sessions, session)
  219. }
  220. }
  221. }
  222. return
  223. }
  224. // FindAll returns all clients that match the given userhost mask.
  225. func (clients *ClientManager) FindAll(userhost string) (set ClientSet) {
  226. set = make(ClientSet)
  227. userhost, err := CanonicalizeMaskWildcard(userhost)
  228. if err != nil {
  229. return set
  230. }
  231. matcher := ircmatch.MakeMatch(userhost)
  232. clients.RLock()
  233. defer clients.RUnlock()
  234. for _, client := range clients.byNick {
  235. if matcher.Match(client.NickMaskCasefolded()) {
  236. set.Add(client)
  237. }
  238. }
  239. return set
  240. }
  241. //
  242. // usermask to regexp
  243. //
  244. //TODO(dan): move this over to generally using glob syntax instead?
  245. // kinda more expected in normal ban/etc masks, though regex is useful (probably as an extban?)
  246. type MaskInfo struct {
  247. TimeCreated time.Time
  248. CreatorNickmask string
  249. CreatorAccount string
  250. }
  251. // UserMaskSet holds a set of client masks and lets you match hostnames to them.
  252. type UserMaskSet struct {
  253. sync.RWMutex
  254. masks map[string]MaskInfo
  255. regexp *regexp.Regexp
  256. }
  257. func NewUserMaskSet() *UserMaskSet {
  258. return new(UserMaskSet)
  259. }
  260. // Add adds the given mask to this set.
  261. func (set *UserMaskSet) Add(mask, creatorNickmask, creatorAccount string) (maskAdded string, err error) {
  262. casefoldedMask, err := CanonicalizeMaskWildcard(mask)
  263. if err != nil {
  264. return
  265. }
  266. set.Lock()
  267. if set.masks == nil {
  268. set.masks = make(map[string]MaskInfo)
  269. }
  270. _, present := set.masks[casefoldedMask]
  271. if !present {
  272. maskAdded = casefoldedMask
  273. set.masks[casefoldedMask] = MaskInfo{
  274. TimeCreated: time.Now().UTC(),
  275. CreatorNickmask: creatorNickmask,
  276. CreatorAccount: creatorAccount,
  277. }
  278. }
  279. set.Unlock()
  280. if !present {
  281. set.setRegexp()
  282. }
  283. return
  284. }
  285. // Remove removes the given mask from this set.
  286. func (set *UserMaskSet) Remove(mask string) (maskRemoved string, err error) {
  287. mask, err = CanonicalizeMaskWildcard(mask)
  288. if err != nil {
  289. return
  290. }
  291. set.Lock()
  292. _, removed := set.masks[mask]
  293. if removed {
  294. maskRemoved = mask
  295. delete(set.masks, mask)
  296. }
  297. set.Unlock()
  298. if removed {
  299. set.setRegexp()
  300. }
  301. return
  302. }
  303. func (set *UserMaskSet) SetMasks(masks map[string]MaskInfo) {
  304. set.Lock()
  305. set.masks = masks
  306. set.Unlock()
  307. set.setRegexp()
  308. }
  309. func (set *UserMaskSet) Masks() (result map[string]MaskInfo) {
  310. set.RLock()
  311. defer set.RUnlock()
  312. result = make(map[string]MaskInfo, len(set.masks))
  313. for mask, info := range set.masks {
  314. result[mask] = info
  315. }
  316. return
  317. }
  318. // Match matches the given n!u@h.
  319. func (set *UserMaskSet) Match(userhost string) bool {
  320. set.RLock()
  321. regexp := set.regexp
  322. set.RUnlock()
  323. if regexp == nil {
  324. return false
  325. }
  326. return regexp.MatchString(userhost)
  327. }
  328. func (set *UserMaskSet) Length() int {
  329. set.RLock()
  330. defer set.RUnlock()
  331. return len(set.masks)
  332. }
  333. // setRegexp generates a regular expression from the set of user mask
  334. // strings. Masks are split at the two types of wildcards, `*` and
  335. // `?`. All the pieces are meta-escaped. `*` is replaced with `.*`,
  336. // the regexp equivalent. Likewise, `?` is replaced with `.`. The
  337. // parts are re-joined and finally all masks are joined into a big
  338. // or-expression.
  339. func (set *UserMaskSet) setRegexp() {
  340. var re *regexp.Regexp
  341. set.RLock()
  342. maskExprs := make([]string, len(set.masks))
  343. index := 0
  344. for mask := range set.masks {
  345. manyParts := strings.Split(mask, "*")
  346. manyExprs := make([]string, len(manyParts))
  347. for mindex, manyPart := range manyParts {
  348. oneParts := strings.Split(manyPart, "?")
  349. oneExprs := make([]string, len(oneParts))
  350. for oindex, onePart := range oneParts {
  351. oneExprs[oindex] = regexp.QuoteMeta(onePart)
  352. }
  353. manyExprs[mindex] = strings.Join(oneExprs, ".")
  354. }
  355. maskExprs[index] = strings.Join(manyExprs, ".*")
  356. index++
  357. }
  358. set.RUnlock()
  359. if index > 0 {
  360. expr := "^" + strings.Join(maskExprs, "|") + "$"
  361. re, _ = regexp.Compile(expr)
  362. }
  363. set.Lock()
  364. set.regexp = re
  365. set.Unlock()
  366. }