2010-11-21 19:53:14 +00:00
|
|
|
package client
|
2009-11-29 20:23:15 +00:00
|
|
|
|
|
|
|
import (
|
2009-12-17 21:30:18 +00:00
|
|
|
"bufio"
|
|
|
|
"os"
|
|
|
|
"net"
|
2010-08-30 11:16:20 +00:00
|
|
|
"crypto/tls"
|
2009-12-17 21:30:18 +00:00
|
|
|
"fmt"
|
|
|
|
"strings"
|
2009-12-19 13:40:50 +00:00
|
|
|
"time"
|
2009-11-29 20:23:15 +00:00
|
|
|
)
|
|
|
|
|
2009-12-18 22:39:22 +00:00
|
|
|
// An IRC connection is represented by this struct. Once connected, any errors
|
|
|
|
// encountered are piped down *Conn.Err; this channel is closed on disconnect.
|
2009-12-17 17:22:31 +00:00
|
|
|
type Conn struct {
|
2009-12-18 22:39:22 +00:00
|
|
|
// Connection Hostname and Nickname
|
2010-11-04 00:25:46 +00:00
|
|
|
Host string
|
|
|
|
Me *Nick
|
2010-11-02 21:47:05 +00:00
|
|
|
Network string
|
2009-12-17 17:22:31 +00:00
|
|
|
|
2010-11-23 22:18:08 +00:00
|
|
|
// Event handler mapping
|
|
|
|
events map[string][]func(*Conn, *Line)
|
|
|
|
// Map of channels we're on
|
|
|
|
chans map[string]*Channel
|
|
|
|
// Map of nicks we know about
|
|
|
|
nicks map[string]*Nick
|
|
|
|
|
2009-12-17 17:22:31 +00:00
|
|
|
// I/O stuff to server
|
2010-08-30 11:16:20 +00:00
|
|
|
sock net.Conn
|
2009-12-17 21:30:18 +00:00
|
|
|
io *bufio.ReadWriter
|
|
|
|
in chan *Line
|
|
|
|
out chan string
|
|
|
|
connected bool
|
2009-12-17 17:22:31 +00:00
|
|
|
|
2010-11-23 22:18:08 +00:00
|
|
|
// Error channel to transmit any fail back to the user
|
|
|
|
Err chan os.Error
|
|
|
|
|
|
|
|
// Misc knobs to tweak client behaviour:
|
2010-11-03 23:49:28 +00:00
|
|
|
// Are we connecting via SSL? Do we care about certificate validity?
|
2010-11-04 00:25:46 +00:00
|
|
|
SSL bool
|
2010-11-03 23:49:28 +00:00
|
|
|
SSLConfig *tls.Config
|
2010-08-30 11:16:20 +00:00
|
|
|
|
2009-12-19 18:09:29 +00:00
|
|
|
// Set this to true to disable flood protection and false to re-enable
|
2010-08-30 11:16:20 +00:00
|
|
|
Flood bool
|
2009-12-19 13:40:50 +00:00
|
|
|
|
2010-11-23 22:01:26 +00:00
|
|
|
// Function which returns a *time.Time for use as a timestamp
|
|
|
|
Timestamp func() *time.Time
|
|
|
|
|
2010-11-23 22:18:08 +00:00
|
|
|
// Enable debugging? Set format for timestamps on debug output.
|
|
|
|
Debug bool
|
|
|
|
TSFormat string
|
2009-11-29 20:23:15 +00:00
|
|
|
}
|
|
|
|
|
2009-12-18 22:39:22 +00:00
|
|
|
// We parse an incoming line into this struct. Line.Cmd is used as the trigger
|
|
|
|
// name for incoming event handlers, see *Conn.recv() for details.
|
|
|
|
// Raw =~ ":nick!user@host cmd args[] :text"
|
|
|
|
// Src == "nick!user@host"
|
|
|
|
// Cmd == e.g. PRIVMSG, 332
|
2009-12-17 17:22:31 +00:00
|
|
|
type Line struct {
|
2009-12-17 21:30:18 +00:00
|
|
|
Nick, Ident, Host, Src string
|
2010-11-23 22:07:21 +00:00
|
|
|
Cmd, Raw string
|
2009-12-17 21:30:18 +00:00
|
|
|
Args []string
|
2010-11-20 23:40:45 +00:00
|
|
|
Time *time.Time
|
2009-11-29 20:23:15 +00:00
|
|
|
}
|
|
|
|
|
2009-12-18 22:39:22 +00:00
|
|
|
// Creates a new IRC connection object, but doesn't connect to anything so
|
|
|
|
// that you can add event handlers to it. See AddHandler() for details.
|
2009-12-17 17:22:31 +00:00
|
|
|
func New(nick, user, name string) *Conn {
|
2009-12-17 21:30:18 +00:00
|
|
|
conn := new(Conn)
|
|
|
|
conn.initialise()
|
2010-11-23 22:18:08 +00:00
|
|
|
conn.SSL = false
|
|
|
|
conn.SSLConfig = nil
|
2009-12-17 21:30:18 +00:00
|
|
|
conn.Me = conn.NewNick(nick, user, name, "")
|
2010-11-23 22:18:08 +00:00
|
|
|
conn.Timestamp = time.LocalTime
|
2010-12-20 22:14:22 +00:00
|
|
|
conn.TSFormat = "15:04:05"
|
2009-12-17 21:30:18 +00:00
|
|
|
conn.setupEvents()
|
|
|
|
return conn
|
2009-11-29 20:23:15 +00:00
|
|
|
}
|
|
|
|
|
2009-12-17 17:22:31 +00:00
|
|
|
func (conn *Conn) initialise() {
|
2009-11-29 20:23:15 +00:00
|
|
|
// allocate meh some memoraaaahh
|
2009-12-17 21:30:18 +00:00
|
|
|
conn.nicks = make(map[string]*Nick)
|
|
|
|
conn.chans = make(map[string]*Channel)
|
|
|
|
conn.in = make(chan *Line, 32)
|
|
|
|
conn.out = make(chan string, 32)
|
|
|
|
conn.Err = make(chan os.Error, 4)
|
|
|
|
conn.io = nil
|
|
|
|
conn.sock = nil
|
2009-12-19 19:00:27 +00:00
|
|
|
|
|
|
|
// if this is being called because we are reconnecting, conn.Me
|
|
|
|
// will still have all the old channels referenced -- nuke them!
|
|
|
|
if conn.Me != nil {
|
|
|
|
conn.Me = conn.NewNick(conn.Me.Nick, conn.Me.Ident, conn.Me.Name, "")
|
|
|
|
}
|
2009-11-29 20:23:15 +00:00
|
|
|
}
|
|
|
|
|
2009-12-18 22:39:22 +00:00
|
|
|
// Connect the IRC connection object to "host[:port]" which should be either
|
2010-08-30 11:16:20 +00:00
|
|
|
// a hostname or an IP address, with an optional port. To enable explicit SSL
|
2010-11-03 23:49:28 +00:00
|
|
|
// on the connection to the IRC server, set Conn.SSL to true before calling
|
|
|
|
// Connect(). The port will default to 6697 if ssl is enabled, and 6667
|
|
|
|
// otherwise. You can also provide an optional connect password.
|
|
|
|
func (conn *Conn) Connect(host string, pass ...string) os.Error {
|
2009-12-17 17:22:31 +00:00
|
|
|
if conn.connected {
|
2010-11-03 23:49:28 +00:00
|
|
|
return os.NewError(fmt.Sprintf(
|
2010-11-04 00:25:46 +00:00
|
|
|
"irc.Connect(): already connected to %s, cannot connect to %s",
|
|
|
|
conn.Host, host))
|
2009-12-17 17:22:31 +00:00
|
|
|
}
|
2010-11-03 23:49:28 +00:00
|
|
|
|
|
|
|
if conn.SSL {
|
|
|
|
if !hasPort(host) {
|
2010-08-30 11:16:20 +00:00
|
|
|
host += ":6697"
|
2010-11-03 23:49:28 +00:00
|
|
|
}
|
|
|
|
// It's unfortunate that tls.Dial doesn't allow a tls.Config arg,
|
|
|
|
// so we simply replicate it here with the correct Config.
|
|
|
|
// http://codereview.appspot.com/2883041
|
|
|
|
if s, err := net.Dial("tcp", "", host); err == nil {
|
|
|
|
// Passing nil config => certs are validated.
|
|
|
|
c := tls.Client(s, conn.SSLConfig)
|
|
|
|
if err = c.Handshake(); err == nil {
|
|
|
|
conn.sock = c
|
|
|
|
} else {
|
|
|
|
s.Close()
|
|
|
|
return err
|
|
|
|
}
|
2010-08-30 11:16:20 +00:00
|
|
|
} else {
|
2010-11-03 23:49:28 +00:00
|
|
|
return err
|
2010-08-30 11:16:20 +00:00
|
|
|
}
|
2010-11-03 20:42:39 +00:00
|
|
|
} else {
|
2010-11-03 23:49:28 +00:00
|
|
|
if !hasPort(host) {
|
|
|
|
host += ":6667"
|
|
|
|
}
|
|
|
|
if s, err := net.Dial("tcp", "", host); err == nil {
|
|
|
|
conn.sock = s
|
|
|
|
} else {
|
|
|
|
return err
|
|
|
|
}
|
2009-11-29 20:23:15 +00:00
|
|
|
}
|
2010-08-30 11:16:20 +00:00
|
|
|
|
2009-12-17 21:30:18 +00:00
|
|
|
conn.Host = host
|
2009-12-17 17:22:31 +00:00
|
|
|
conn.io = bufio.NewReadWriter(
|
|
|
|
bufio.NewReader(conn.sock),
|
2009-12-17 21:30:18 +00:00
|
|
|
bufio.NewWriter(conn.sock))
|
|
|
|
go conn.send()
|
|
|
|
go conn.recv()
|
2009-12-17 17:22:31 +00:00
|
|
|
|
2010-10-24 09:06:18 +00:00
|
|
|
if len(pass) > 0 {
|
|
|
|
conn.Pass(pass[0])
|
2009-11-29 20:23:15 +00:00
|
|
|
}
|
2009-12-17 21:30:18 +00:00
|
|
|
conn.Nick(conn.Me.Nick)
|
|
|
|
conn.User(conn.Me.Ident, conn.Me.Name)
|
2009-11-29 20:23:15 +00:00
|
|
|
|
2009-12-17 21:30:18 +00:00
|
|
|
go conn.runLoop()
|
|
|
|
return nil
|
2009-11-29 20:23:15 +00:00
|
|
|
}
|
|
|
|
|
2009-12-17 17:22:31 +00:00
|
|
|
// dispatch a nicely formatted os.Error to the error channel
|
2010-11-03 23:46:58 +00:00
|
|
|
func (conn *Conn) error(s string, a ...interface{}) {
|
|
|
|
conn.Err <- os.NewError(fmt.Sprintf(s, a...))
|
|
|
|
}
|
2009-11-29 20:23:15 +00:00
|
|
|
|
|
|
|
// copied from http.client for great justice
|
2010-11-03 23:46:58 +00:00
|
|
|
func hasPort(s string) bool {
|
|
|
|
return strings.LastIndex(s, ":") > strings.LastIndex(s, "]")
|
|
|
|
}
|
2009-11-29 20:23:15 +00:00
|
|
|
|
2009-12-17 17:22:31 +00:00
|
|
|
// dispatch input from channel as \r\n terminated line to peer
|
2009-12-19 13:40:50 +00:00
|
|
|
// flood controlled using hybrid's algorithm if conn.Flood is true
|
2009-12-17 17:22:31 +00:00
|
|
|
func (conn *Conn) send() {
|
2009-12-19 18:09:29 +00:00
|
|
|
lastsent := time.Nanoseconds()
|
2010-11-04 00:25:46 +00:00
|
|
|
var badness, linetime, second int64 = 0, 0, 1000000000
|
2009-12-19 15:19:28 +00:00
|
|
|
for line := range conn.out {
|
2009-12-19 18:09:29 +00:00
|
|
|
// Hybrid's algorithm allows for 2 seconds per line and an additional
|
|
|
|
// 1/120 of a second per character on that line.
|
|
|
|
linetime = 2*second + int64(len(line))*second/120
|
|
|
|
if !conn.Flood && conn.connected {
|
|
|
|
// No point in tallying up flood protection stuff until connected
|
|
|
|
if badness += linetime + lastsent - time.Nanoseconds(); badness < 0 {
|
|
|
|
// negative badness times are badness...
|
|
|
|
badness = int64(0)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
lastsent = time.Nanoseconds()
|
|
|
|
|
|
|
|
// If we've sent more than 10 second's worth of lines according to the
|
|
|
|
// calculation above, then we're at risk of "Excess Flood".
|
|
|
|
if badness > 10*second && !conn.Flood {
|
|
|
|
// so sleep for the current line's time value before sending it
|
|
|
|
time.Sleep(linetime)
|
|
|
|
}
|
2010-08-21 18:23:07 +00:00
|
|
|
if _, err := conn.io.WriteString(line + "\r\n"); err != nil {
|
2009-12-17 21:30:18 +00:00
|
|
|
conn.error("irc.send(): %s", err.String())
|
|
|
|
conn.shutdown()
|
|
|
|
break
|
2009-12-17 17:22:31 +00:00
|
|
|
}
|
2009-12-17 21:30:18 +00:00
|
|
|
conn.io.Flush()
|
2010-11-02 21:47:05 +00:00
|
|
|
if conn.Debug {
|
2010-12-20 22:14:22 +00:00
|
|
|
fmt.Println(conn.Timestamp().Format(conn.TSFormat) + " -> " + line)
|
2010-11-02 21:47:05 +00:00
|
|
|
}
|
2009-12-17 17:22:31 +00:00
|
|
|
}
|
2009-11-29 20:23:15 +00:00
|
|
|
}
|
|
|
|
|
2009-12-17 17:22:31 +00:00
|
|
|
// receive one \r\n terminated line from peer, parse and dispatch it
|
|
|
|
func (conn *Conn) recv() {
|
|
|
|
for {
|
2009-12-17 21:30:18 +00:00
|
|
|
s, err := conn.io.ReadString('\n')
|
2010-11-23 22:01:26 +00:00
|
|
|
t := conn.Timestamp()
|
2009-12-17 17:22:31 +00:00
|
|
|
if err != nil {
|
2009-12-17 21:30:18 +00:00
|
|
|
conn.error("irc.recv(): %s", err.String())
|
|
|
|
conn.shutdown()
|
|
|
|
break
|
2009-12-17 17:22:31 +00:00
|
|
|
}
|
2010-08-21 18:23:07 +00:00
|
|
|
s = strings.Trim(s, "\r\n")
|
2010-11-02 21:47:05 +00:00
|
|
|
if conn.Debug {
|
2010-12-20 22:14:22 +00:00
|
|
|
fmt.Println(t.Format(conn.TSFormat) + " <- " + s)
|
2010-11-02 21:47:05 +00:00
|
|
|
}
|
2009-12-17 17:22:31 +00:00
|
|
|
|
2010-11-20 23:40:45 +00:00
|
|
|
line := &Line{Raw: s, Time: t}
|
2009-12-17 17:22:31 +00:00
|
|
|
if s[0] == ':' {
|
|
|
|
// remove a source and parse it
|
|
|
|
if idx := strings.Index(s, " "); idx != -1 {
|
2009-12-17 21:30:18 +00:00
|
|
|
line.Src, s = s[1:idx], s[idx+1:len(s)]
|
2009-12-17 17:22:31 +00:00
|
|
|
} else {
|
|
|
|
// pretty sure we shouldn't get here ...
|
2009-12-17 21:30:18 +00:00
|
|
|
line.Src = s[1:len(s)]
|
|
|
|
conn.in <- line
|
|
|
|
continue
|
2009-12-17 17:22:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// src can be the hostname of the irc server or a nick!user@host
|
2009-12-17 21:30:18 +00:00
|
|
|
line.Host = line.Src
|
|
|
|
nidx, uidx := strings.Index(line.Src, "!"), strings.Index(line.Src, "@")
|
2009-12-17 17:22:31 +00:00
|
|
|
if uidx != -1 && nidx != -1 {
|
2009-12-17 21:30:18 +00:00
|
|
|
line.Nick = line.Src[0:nidx]
|
|
|
|
line.Ident = line.Src[nidx+1 : uidx]
|
|
|
|
line.Host = line.Src[uidx+1 : len(line.Src)]
|
2009-12-17 17:22:31 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// now we're here, we've parsed a :nick!user@host or :server off
|
|
|
|
// s should contain "cmd args[] :text"
|
2009-12-17 21:30:18 +00:00
|
|
|
args := strings.Split(s, " :", 2)
|
2009-12-17 17:22:31 +00:00
|
|
|
if len(args) > 1 {
|
2010-11-23 22:07:21 +00:00
|
|
|
args = append(strings.Fields(args[0]), args[1])
|
|
|
|
} else {
|
|
|
|
args = strings.Fields(args[0])
|
2009-11-29 20:23:15 +00:00
|
|
|
}
|
2009-12-17 21:30:18 +00:00
|
|
|
line.Cmd = strings.ToUpper(args[0])
|
2009-12-17 17:22:31 +00:00
|
|
|
if len(args) > 1 {
|
2009-12-17 21:30:18 +00:00
|
|
|
line.Args = args[1:len(args)]
|
2009-12-17 17:22:31 +00:00
|
|
|
}
|
|
|
|
conn.in <- line
|
|
|
|
}
|
|
|
|
}
|
2009-11-29 20:23:15 +00:00
|
|
|
|
2009-12-17 17:22:31 +00:00
|
|
|
func (conn *Conn) runLoop() {
|
2009-12-19 15:19:28 +00:00
|
|
|
for line := range conn.in {
|
2010-11-04 00:25:46 +00:00
|
|
|
conn.dispatchEvent(line)
|
2009-11-29 20:23:15 +00:00
|
|
|
}
|
2009-12-17 17:22:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (conn *Conn) shutdown() {
|
2009-12-17 21:30:18 +00:00
|
|
|
close(conn.in)
|
|
|
|
close(conn.out)
|
|
|
|
close(conn.Err)
|
|
|
|
conn.connected = false
|
|
|
|
conn.sock.Close()
|
2009-12-19 19:00:27 +00:00
|
|
|
// reinit datastructures ready for next connection
|
|
|
|
// do this here rather than after runLoop()'s for due to race
|
|
|
|
conn.initialise()
|
2009-12-17 17:22:31 +00:00
|
|
|
}
|
2009-11-29 20:23:15 +00:00
|
|
|
|
2009-12-18 22:39:22 +00:00
|
|
|
// Dumps a load of information about the current state of the connection to a
|
|
|
|
// string for debugging state tracking and other such things.
|
2009-12-17 17:22:31 +00:00
|
|
|
func (conn *Conn) String() string {
|
2009-12-17 21:30:18 +00:00
|
|
|
str := "GoIRC Connection\n"
|
|
|
|
str += "----------------\n\n"
|
2009-12-17 17:22:31 +00:00
|
|
|
if conn.connected {
|
|
|
|
str += "Connected to " + conn.Host + "\n\n"
|
|
|
|
} else {
|
2009-12-17 21:30:18 +00:00
|
|
|
str += "Not currently connected!\n\n"
|
2009-11-29 20:23:15 +00:00
|
|
|
}
|
2009-12-17 21:30:18 +00:00
|
|
|
str += conn.Me.String() + "\n"
|
|
|
|
str += "GoIRC Channels\n"
|
|
|
|
str += "--------------\n\n"
|
2009-12-17 17:22:31 +00:00
|
|
|
for _, ch := range conn.chans {
|
|
|
|
str += ch.String() + "\n"
|
|
|
|
}
|
2009-12-17 21:30:18 +00:00
|
|
|
str += "GoIRC NickNames\n"
|
|
|
|
str += "---------------\n\n"
|
2009-12-17 17:22:31 +00:00
|
|
|
for _, n := range conn.nicks {
|
|
|
|
if n != conn.Me {
|
|
|
|
str += n.String() + "\n"
|
|
|
|
}
|
2009-11-29 20:23:15 +00:00
|
|
|
}
|
2009-12-17 21:30:18 +00:00
|
|
|
return str
|
2009-11-29 20:23:15 +00:00
|
|
|
}
|