irc-client.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453
  1. package ircclient
  2. import (
  3. "bufio"
  4. "crypto/tls"
  5. "crypto/x509"
  6. "encoding/base64"
  7. "fmt"
  8. "io"
  9. "log"
  10. "math/rand"
  11. "net"
  12. "os"
  13. "os/signal"
  14. "strconv"
  15. "strings"
  16. "syscall"
  17. "time"
  18. )
  19. type IRCMsg struct {
  20. MsgParts []string
  21. From string
  22. To string
  23. Cmd string
  24. Msg string
  25. }
  26. type IRCWrite struct {
  27. To string
  28. Output string
  29. }
  30. type IRCConfig struct {
  31. Port int
  32. Hostname string
  33. UseTLS bool // Use TLS Secure connection
  34. UseSASL bool // Authenticate via SASL
  35. Insecure bool // Allow self-signed certificates
  36. Nick string
  37. MyNick string
  38. Username string
  39. Realname string
  40. Password string // Password for nickserv
  41. ServerPassword string // Password for server
  42. Socket net.Conn
  43. TLSSocket *tls.Conn
  44. Reader *bufio.Reader
  45. ReadChannel chan IRCMsg
  46. ReadEvents []string
  47. WriteChannel chan IRCWrite
  48. DelChannel chan string
  49. Registered bool
  50. Flood_Num int // Number of lines sent before considered a flood
  51. Flood_Time int // Number of Seconds to track previous messages
  52. Flood_Delay int // Delay between sending when flood protection on (Milliseconds)
  53. OnExit func()
  54. }
  55. // Writer *bufio.Writer
  56. func (Config *IRCConfig) Connect() bool {
  57. var err error
  58. if Config.Flood_Num == 0 {
  59. Config.Flood_Num = 5
  60. }
  61. if Config.Flood_Time == 0 {
  62. Config.Flood_Time = 10
  63. }
  64. if Config.Flood_Delay == 0 {
  65. Config.Flood_Delay = 1000
  66. }
  67. Config.Registered = false
  68. if Config.ReadChannel == nil {
  69. log.Println("Warning: ReadChannel is nil.")
  70. }
  71. if Config.UseTLS {
  72. var tlsConfig tls.Config
  73. if !Config.Insecure {
  74. certPool := x509.NewCertPool()
  75. tlsConfig.ClientCAs = certPool
  76. tlsConfig.InsecureSkipVerify = false
  77. } else {
  78. tlsConfig.InsecureSkipVerify = true
  79. }
  80. Config.TLSSocket, err = tls.Dial("tcp", Config.Hostname+":"+strconv.Itoa(Config.Port), &tlsConfig)
  81. if err != nil {
  82. log.Fatal("tls.Dial:", err)
  83. }
  84. // Config.Writer = bufio.NewWriter(Config.TLSSocket)
  85. Config.Reader = bufio.NewReader(Config.TLSSocket)
  86. } else {
  87. Config.Socket, err = net.Dial("tcp", Config.Hostname+":"+strconv.Itoa(Config.Port))
  88. if err != nil {
  89. log.Fatal("net.Dial:", err)
  90. }
  91. // Config.Writer = bufio.NewWriter(Config.Socket)
  92. Config.Reader = bufio.NewReader(Config.Socket)
  93. }
  94. Config.WriteChannel = make(chan IRCWrite)
  95. Config.DelChannel = make(chan string)
  96. // We are connected.
  97. go Config.WriterRoutine()
  98. // Registration
  99. if Config.UseTLS && Config.UseSASL {
  100. Config.PriorityWrite("CAP REQ :sasl")
  101. }
  102. if Config.ServerPassword != "" {
  103. Config.PriorityWrite(fmt.Sprintf("PASS %s", Config.ServerPassword))
  104. }
  105. // Register nick
  106. Config.MyNick = Config.Nick
  107. Config.PriorityWrite(fmt.Sprintf("NICK %s", Config.Nick))
  108. Config.PriorityWrite(fmt.Sprintf("USER %s 0 * :%s", Config.Username, Config.Realname))
  109. // Config.Writer.Flush()
  110. go Config.ReaderRoutine()
  111. return true
  112. }
  113. // Low level write to [TLS]Socket routine.
  114. func (Config *IRCConfig) write(output string) error {
  115. var err error
  116. log.Println(">>", output)
  117. output += "\r\n"
  118. if Config.UseTLS {
  119. _, err = Config.TLSSocket.Write([]byte(output))
  120. } else {
  121. _, err = Config.Socket.Write([]byte(output))
  122. }
  123. return err
  124. }
  125. func (Config *IRCConfig) WriterRoutine() {
  126. var err error
  127. var throttle ThrottleBuffer
  128. var Flood FloodTrack
  129. throttle.init()
  130. Flood.Track = make([]time.Time, Config.Flood_Num)
  131. // signal handler
  132. var sigChannel chan os.Signal = make(chan os.Signal, 1)
  133. signal.Notify(sigChannel, os.Interrupt, syscall.SIGINT, syscall.SIGTERM)
  134. // Change this into a select with timeout.
  135. // Timeout, if there's something to be buffered.
  136. for {
  137. if throttle.Life_sucks {
  138. select {
  139. case output := <-Config.WriteChannel:
  140. if output.To == "" {
  141. err = Config.write(output.Output)
  142. if err != nil {
  143. log.Println("Writer:", err)
  144. }
  145. continue
  146. }
  147. throttle.push(output.To, output.Output)
  148. case <-sigChannel:
  149. if Config.OnExit != nil {
  150. Config.OnExit()
  151. }
  152. os.Exit(2)
  153. case remove := <-Config.DelChannel:
  154. log.Printf("Remove: [%s]\n", remove)
  155. throttle.delete(remove)
  156. case <-time.After(time.Millisecond * time.Duration(Config.Flood_Delay)):
  157. // Send from the buffer
  158. // debugging the flood buffer
  159. // log.Printf("targets: %#v\n", targets)
  160. // log.Printf("last: %d\n", last)
  161. // log.Printf("buffer: %#v\n", buffer)
  162. var msg string = throttle.pop()
  163. err = Config.write(msg)
  164. if err != nil {
  165. log.Println("Writer:", err)
  166. }
  167. }
  168. } else {
  169. // Life is good.
  170. select {
  171. case <-sigChannel:
  172. if Config.OnExit != nil {
  173. Config.OnExit()
  174. }
  175. os.Exit(2)
  176. case output := <-Config.WriteChannel:
  177. if output.To == "" {
  178. err = Config.write(output.Output)
  179. if err != nil {
  180. log.Println("Writer:", err)
  181. }
  182. continue
  183. }
  184. if Flood.Pos > 0 {
  185. Flood.Expire(Config.Flood_Time)
  186. }
  187. if Flood.Pos == Config.Flood_Num {
  188. throttle.push(output.To, output.Output)
  189. } else {
  190. // Flood limits not reached
  191. Flood.Save()
  192. err = Config.write(output.Output)
  193. if err != nil {
  194. log.Println("Writer:", err)
  195. }
  196. }
  197. }
  198. }
  199. }
  200. log.Println("~WriterRoutine")
  201. }
  202. func (Config *IRCConfig) Close() {
  203. if Config.UseTLS {
  204. Config.TLSSocket.Close()
  205. } else {
  206. Config.Socket.Close()
  207. }
  208. }
  209. func IRCParse(line string) []string {
  210. var pos int = strings.Index(line, " :")
  211. var message string
  212. if pos != -1 {
  213. message = line[pos+2:]
  214. line = line[:pos]
  215. }
  216. var results []string
  217. results = strings.Split(line, " ")
  218. if message != "" {
  219. results = append(results, message)
  220. }
  221. return results
  222. }
  223. func IRCNick(from string) string {
  224. if from[0] == ':' {
  225. from = from[1:]
  226. }
  227. var pos int = strings.Index(from, "!")
  228. if pos != -1 {
  229. from = from[:pos]
  230. }
  231. return from
  232. }
  233. func RandomNick(nick string) string {
  234. var result string = nick + "-"
  235. result += strconv.Itoa(rand.Intn(1000))
  236. return result
  237. }
  238. func (Config *IRCConfig) PriorityWrite(output string) {
  239. Config.WriteChannel <- IRCWrite{To: "", Output: output}
  240. }
  241. func (Config *IRCConfig) WriteTo(to string, output string) {
  242. Config.WriteChannel <- IRCWrite{To: to, Output: output}
  243. }
  244. func (Config *IRCConfig) Msg(to string, message string) {
  245. Config.WriteTo(to, fmt.Sprintf("PRIVMSG %s :%s", to, message))
  246. }
  247. func (Config *IRCConfig) Notice(to string, message string) {
  248. Config.WriteTo(to, fmt.Sprintf("NOTICE %s :%s", to, message))
  249. }
  250. func (Config *IRCConfig) Action(to string, message string) {
  251. Config.WriteTo(to, fmt.Sprintf("PRIVMSG %s :\x01ACTION %s\x01", to, message))
  252. }
  253. func (Config *IRCConfig) ReaderRoutine() {
  254. for {
  255. var line string
  256. var err error
  257. var results []string
  258. line, err = Config.Reader.ReadString('\n')
  259. if err == nil {
  260. line = strings.Trim(line, "\r\n")
  261. log.Println("<< ", line)
  262. results = IRCParse(line)
  263. if results[1] == "433" {
  264. // Nick already in use!
  265. var newNick string = RandomNick(Config.Nick)
  266. Config.MyNick = newNick
  267. Config.PriorityWrite("NICK " + newNick)
  268. }
  269. if results[1] == "PRIVMSG" {
  270. // Is this an action?
  271. if len(results) >= 3 {
  272. if (results[3][0] == '\x01') && (results[3][len(results[3])-1] == '\x01') {
  273. // ACTION
  274. results[1] = "CTCP"
  275. results[3] = results[3][1 : len(results[3])-1]
  276. log.Println("CTCP:", results[3])
  277. // Process CTCP commands
  278. if strings.HasPrefix(results[3], "ACTION ") {
  279. results[1] = "ACTION"
  280. results[3] = results[3][7:]
  281. }
  282. if strings.HasPrefix(results[3], "PING ") {
  283. Config.WriteTo(IRCNick(results[0]),
  284. fmt.Sprintf("NOTICE %s :\x01PING %s\x01",
  285. IRCNick(results[0]),
  286. results[3][5:]))
  287. }
  288. if results[3] == "VERSION" {
  289. // Send version reply
  290. Config.WriteTo(IRCNick(results[0]),
  291. fmt.Sprintf("NOTICE %s :\x01VERSION red-green.com/irc-client 0.1\x01",
  292. IRCNick(results[0])))
  293. }
  294. if results[3] == "TIME" {
  295. // Send time reply
  296. var now time.Time = time.Now()
  297. Config.WriteTo(IRCNick(results[0]),
  298. fmt.Sprintf("NOTICE %s :\x01TIME %s\x01",
  299. IRCNick(results[0]),
  300. now.Format(time.ANSIC)))
  301. }
  302. }
  303. }
  304. }
  305. } else {
  306. // This is likely, 2022/04/05 10:11:41 ReadString: EOF
  307. if err != io.EOF {
  308. log.Println("ReadString:", err)
  309. }
  310. close(Config.ReadChannel)
  311. return
  312. }
  313. var msg IRCMsg = IRCMsg{MsgParts: results}
  314. if len(results) >= 3 {
  315. msg.From = IRCNick(results[0])
  316. msg.Cmd = results[1]
  317. msg.To = results[2]
  318. if len(results) >= 4 {
  319. msg.Msg = results[3]
  320. }
  321. } else {
  322. msg.Cmd = results[0]
  323. }
  324. // Answer PING/PONG immediately.
  325. if results[0] == "PING" {
  326. Config.PriorityWrite("PONG " + results[1])
  327. }
  328. if (msg.Cmd == "401") || (msg.Cmd == "404") {
  329. // No such nick/channel
  330. log.Printf("Remove %s from buffer.", msg.MsgParts[3])
  331. Config.DelChannel <- msg.MsgParts[3]
  332. }
  333. if !Config.Registered {
  334. // We're not registered yet
  335. // Answer the queries for SASL authentication
  336. if (msg.Cmd == "CAP") && (msg.Msg == "ACK") {
  337. Config.PriorityWrite("AUTHENTICATE PLAIN")
  338. }
  339. if (msg.MsgParts[0] == "AUTHENTICATE") && (msg.MsgParts[1] == "+") {
  340. var userpass string = fmt.Sprintf("\x00%s\x00%s", Config.Nick, Config.Password)
  341. var b64 string = base64.StdEncoding.EncodeToString([]byte(userpass))
  342. Config.PriorityWrite("AUTHENTICATE " + b64)
  343. }
  344. if msg.Cmd == "903" {
  345. // Success SASL
  346. Config.PriorityWrite("CAP END")
  347. Config.Registered = true
  348. }
  349. if msg.Cmd == "904" {
  350. // Failed SASL
  351. Config.PriorityWrite("CAP END")
  352. // Should we exit here?
  353. }
  354. /*
  355. 2022/04/06 19:12:11 << :[email protected] NOTICE meow :This nickname is registered and protected. If it is your
  356. 2022/04/06 19:12:11 << :[email protected] NOTICE meow :nick, type /msg NickServ IDENTIFY password. Otherwise,
  357. 2022/04/06 19:12:11 << :[email protected] NOTICE meow :please choose a different nick.
  358. */
  359. if (msg.From == "NickServ") && (msg.Cmd == "NOTICE") {
  360. if strings.Contains(msg.Msg, "IDENTIFY") {
  361. Config.PriorityWrite(fmt.Sprintf("NS IDENTIFY %s", Config.Password))
  362. }
  363. // :[email protected] NOTICE meow :Password accepted - you are now recognized.
  364. }
  365. if !Config.UseSASL && (msg.Cmd == "900") {
  366. Config.Registered = true
  367. }
  368. }
  369. // This is a better way of knowing when we've identified for services
  370. if (msg.Cmd == "MODE") && (msg.To == Config.MyNick) {
  371. // This should probably be look for + and contains "r"
  372. if (msg.Msg[0] == '+') && (strings.Contains(msg.Msg, "r")) {
  373. Config.ReadChannel <- IRCMsg{Cmd: "Identified"}
  374. }
  375. }
  376. if Config.ReadChannel != nil {
  377. Config.ReadChannel <- msg
  378. }
  379. if (msg.Cmd == "376") || (msg.Cmd == "422") {
  380. // End MOTD, or MOTD Missing
  381. var reg IRCMsg = IRCMsg{Cmd: "EndMOTD"}
  382. Config.ReadChannel <- reg
  383. }
  384. }
  385. }