233 lines
5.1 KiB
Go
233 lines
5.1 KiB
Go
package bot
|
|
|
|
import (
|
|
"context"
|
|
"net"
|
|
"regexp"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/raja/argon2pw"
|
|
"gitlab.com/etke.cc/go/mxidwc"
|
|
"maunium.net/go/mautrix/id"
|
|
|
|
"gitlab.com/etke.cc/postmoogle/utils"
|
|
)
|
|
|
|
func parseMXIDpatterns(patterns []string, defaultPattern string) ([]*regexp.Regexp, error) {
|
|
if len(patterns) == 0 && defaultPattern != "" {
|
|
patterns = []string{defaultPattern}
|
|
}
|
|
|
|
return mxidwc.ParsePatterns(patterns)
|
|
}
|
|
|
|
func (b *Bot) allowUsers(actorID id.UserID) bool {
|
|
if len(b.allowedUsers) != 0 {
|
|
if !mxidwc.Match(actorID.String(), b.allowedUsers) {
|
|
return false
|
|
}
|
|
}
|
|
|
|
return true
|
|
}
|
|
|
|
func (b *Bot) allowAnyone(actorID id.UserID, targetRoomID id.RoomID) bool {
|
|
return true
|
|
}
|
|
|
|
func (b *Bot) allowOwner(actorID id.UserID, targetRoomID id.RoomID) bool {
|
|
if !b.allowUsers(actorID) {
|
|
return false
|
|
}
|
|
cfg, err := b.cfg.GetRoom(targetRoomID)
|
|
if err != nil {
|
|
b.Error(context.Background(), "failed to retrieve settings: %v", err)
|
|
return false
|
|
}
|
|
|
|
owner := cfg.Owner()
|
|
if owner == "" {
|
|
return true
|
|
}
|
|
|
|
return owner == actorID.String()
|
|
}
|
|
|
|
func (b *Bot) allowAdmin(actorID id.UserID, targetRoomID id.RoomID) bool {
|
|
return mxidwc.Match(actorID.String(), b.allowedAdmins)
|
|
}
|
|
|
|
func (b *Bot) allowSend(actorID id.UserID, targetRoomID id.RoomID) bool {
|
|
if !b.allowUsers(actorID) {
|
|
return false
|
|
}
|
|
|
|
cfg, err := b.cfg.GetRoom(targetRoomID)
|
|
if err != nil {
|
|
b.Error(context.Background(), "failed to retrieve settings: %v", err)
|
|
return false
|
|
}
|
|
|
|
return !cfg.NoSend()
|
|
}
|
|
|
|
func (b *Bot) allowReply(actorID id.UserID, targetRoomID id.RoomID) bool {
|
|
if !b.allowUsers(actorID) {
|
|
return false
|
|
}
|
|
|
|
cfg, err := b.cfg.GetRoom(targetRoomID)
|
|
if err != nil {
|
|
b.Error(context.Background(), "failed to retrieve settings: %v", err)
|
|
return false
|
|
}
|
|
|
|
return !cfg.NoReplies()
|
|
}
|
|
|
|
func (b *Bot) isReserved(mailbox string) bool {
|
|
for _, reserved := range b.mbxc.Reserved {
|
|
if mailbox == reserved {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// IsGreylisted checks if host is in greylist
|
|
func (b *Bot) IsGreylisted(addr net.Addr) bool {
|
|
if b.cfg.GetBot().Greylist() == 0 {
|
|
return false
|
|
}
|
|
|
|
greylist := b.cfg.GetGreylist()
|
|
greylistedAt, ok := greylist.Get(addr)
|
|
if !ok {
|
|
b.log.Debug().Str("addr", addr.String()).Msg("greylisting")
|
|
greylist.Add(addr)
|
|
err := b.cfg.SetGreylist(greylist)
|
|
if err != nil {
|
|
b.log.Error().Err(err).Str("addr", addr.String()).Msg("cannot update greylist")
|
|
}
|
|
return true
|
|
}
|
|
duration := time.Duration(b.cfg.GetBot().Greylist()) * time.Minute
|
|
|
|
return greylistedAt.Add(duration).After(time.Now().UTC())
|
|
}
|
|
|
|
// IsBanned checks if address is banned
|
|
func (b *Bot) IsBanned(addr net.Addr) bool {
|
|
return b.cfg.GetBanlist().Has(addr)
|
|
}
|
|
|
|
// IsTrusted checks if address is a trusted (proxy)
|
|
func (b *Bot) IsTrusted(addr net.Addr) bool {
|
|
ip := utils.AddrIP(addr)
|
|
for _, proxy := range b.proxies {
|
|
if ip == proxy {
|
|
b.log.Debug().Str("addr", ip).Msg("address is trusted")
|
|
return true
|
|
}
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// Ban an address automatically
|
|
func (b *Bot) BanAuto(addr net.Addr) {
|
|
if !b.cfg.GetBot().BanlistEnabled() {
|
|
return
|
|
}
|
|
|
|
if !b.cfg.GetBot().BanlistAuto() {
|
|
return
|
|
}
|
|
|
|
if b.IsTrusted(addr) {
|
|
return
|
|
}
|
|
b.log.Debug().Str("addr", addr.String()).Msg("attempting to automatically ban")
|
|
banlist := b.cfg.GetBanlist()
|
|
banlist.Add(addr)
|
|
err := b.cfg.SetBanlist(banlist)
|
|
if err != nil {
|
|
b.log.Error().Err(err).Str("addr", addr.String()).Msg("cannot update banlist")
|
|
}
|
|
}
|
|
|
|
// Ban an address for incorrect auth automatically
|
|
func (b *Bot) BanAuth(addr net.Addr) {
|
|
if !b.cfg.GetBot().BanlistEnabled() {
|
|
return
|
|
}
|
|
|
|
if !b.cfg.GetBot().BanlistAuth() {
|
|
return
|
|
}
|
|
|
|
if b.IsTrusted(addr) {
|
|
return
|
|
}
|
|
b.log.Debug().Str("addr", addr.String()).Msg("attempting to automatically ban")
|
|
banlist := b.cfg.GetBanlist()
|
|
banlist.Add(addr)
|
|
err := b.cfg.SetBanlist(banlist)
|
|
if err != nil {
|
|
b.log.Error().Err(err).Str("addr", addr.String()).Msg("cannot update banlist")
|
|
}
|
|
}
|
|
|
|
// Ban an address manually
|
|
func (b *Bot) BanManually(addr net.Addr) {
|
|
if !b.cfg.GetBot().BanlistEnabled() {
|
|
return
|
|
}
|
|
if b.IsTrusted(addr) {
|
|
return
|
|
}
|
|
b.log.Debug().Str("addr", addr.String()).Msg("attempting to manually ban")
|
|
banlist := b.cfg.GetBanlist()
|
|
banlist.Add(addr)
|
|
err := b.cfg.SetBanlist(banlist)
|
|
if err != nil {
|
|
b.log.Error().Err(err).Str("addr", addr.String()).Msg("cannot update banlist")
|
|
}
|
|
}
|
|
|
|
// AllowAuth check if SMTP login (email) and password are valid
|
|
func (b *Bot) AllowAuth(email, password string) (id.RoomID, bool) {
|
|
var suffix bool
|
|
for _, domain := range b.domains {
|
|
if strings.HasSuffix(email, "@"+domain) {
|
|
suffix = true
|
|
break
|
|
}
|
|
}
|
|
if !suffix {
|
|
return "", false
|
|
}
|
|
|
|
roomID, ok := b.getMapping(utils.Mailbox(email))
|
|
if !ok {
|
|
return "", false
|
|
}
|
|
cfg, err := b.cfg.GetRoom(roomID)
|
|
if err != nil {
|
|
b.log.Error().Err(err).Msg("failed to retrieve settings")
|
|
return "", false
|
|
}
|
|
|
|
if cfg.NoSend() {
|
|
b.log.Warn().Str("email", email).Str("roomID", roomID.String()).Msg("trying to send email, but room is receive-only")
|
|
return "", false
|
|
}
|
|
|
|
allow, err := argon2pw.CompareHashWithPassword(cfg.Password(), password)
|
|
if err != nil {
|
|
b.log.Warn().Err(err).Str("email", email).Msg("Password is not valid")
|
|
}
|
|
return roomID, allow
|
|
}
|