twitch-bot/config.go

238 lines
5.5 KiB
Go
Raw Normal View History

2020-12-21 00:32:39 +00:00
package main
import (
"crypto/sha256"
"fmt"
"os"
"regexp"
"strings"
2020-12-21 00:32:39 +00:00
"time"
"github.com/go-irc/irc"
"github.com/pkg/errors"
log "github.com/sirupsen/logrus"
"gopkg.in/yaml.v2"
"github.com/Luzifer/go_helpers/v2/str"
2020-12-21 00:32:39 +00:00
)
type configFile struct {
Channels []string `yaml:"channels"`
PermitAllowModerator bool `yaml:"permit_allow_moderator"`
PermitTimeout time.Duration `yaml:"permit_timeout"`
Rules []*rule `yaml:"rules"`
}
func newConfigFile() configFile {
return configFile{
PermitTimeout: time.Minute,
}
}
type rule struct {
Actions []*ruleAction `yaml:"actions"`
Cooldown *time.Duration `yaml:"cooldown"`
MatchChannels []string `yaml:"match_channels"`
MatchEvent *string `yaml:"match_event"`
MatchMessage *string `yaml:"match_message"`
MatchUsers []string `yaml:"match_users"`
2020-12-21 00:32:39 +00:00
DisableOnMatchMessages []string `yaml:"disable_on_match_messages"`
2020-12-21 00:32:39 +00:00
DisableOnPermit bool `yaml:"disable_on_permit"`
DisableOn []string `yaml:"disable_on"`
EnableOn []string `yaml:"enable_on"`
matchMessage *regexp.Regexp
disableOnMatchMessages []*regexp.Regexp
2020-12-21 00:32:39 +00:00
}
func (r rule) MatcherID() string {
out := sha256.New()
for _, e := range []*string{
ptrStr(strings.Join(r.MatchChannels, "|")),
2020-12-21 00:32:39 +00:00
r.MatchEvent,
r.MatchMessage,
} {
if e != nil {
fmt.Fprintf(out, *e)
}
}
return fmt.Sprintf("sha256:%x", out.Sum(nil))
}
func (r *rule) Matches(m *irc.Message, event *string) bool {
2020-12-21 00:32:39 +00:00
var err error
var (
badges = ircHandler{}.ParseBadgeLevels(m)
logger = log.WithFields(log.Fields{
"msg": m,
"rule": r,
})
)
// Check Channel match
if len(r.MatchChannels) > 0 {
if len(m.Params) == 0 || !str.StringInSlice(m.Params[0], r.MatchChannels) {
2020-12-21 00:32:39 +00:00
logger.Trace("Non-Match: Channel")
return false
}
}
if len(r.MatchUsers) > 0 {
if !str.StringInSlice(strings.ToLower(m.User), r.MatchUsers) {
logger.Trace("Non-Match: Users")
return false
}
}
2020-12-21 00:32:39 +00:00
// Check Event match
if r.MatchEvent != nil {
if event == nil || *r.MatchEvent != *event {
logger.Trace("Non-Match: Event")
return false
}
}
// Check Message match
if r.MatchMessage != nil {
// If the regexp was not yet compiled, cache it
if r.matchMessage == nil {
if r.matchMessage, err = regexp.Compile(*r.MatchMessage); err != nil {
logger.WithError(err).Error("Unable to compile expression")
return false
}
}
// Check whether the message matches
if !r.matchMessage.MatchString(m.Trailing()) {
logger.Trace("Non-Match: Message")
return false
}
}
if len(r.DisableOnMatchMessages) > 0 {
// If the regexps were not pre-compiled, do it now
if len(r.disableOnMatchMessages) != len(r.DisableOnMatchMessages) {
r.disableOnMatchMessages = nil
for _, dm := range r.DisableOnMatchMessages {
dmr, err := regexp.Compile(dm)
if err != nil {
logger.WithError(err).Error("Unable to compile expression")
return false
}
r.disableOnMatchMessages = append(r.disableOnMatchMessages, dmr)
}
}
for _, rex := range r.disableOnMatchMessages {
if rex.MatchString(m.Trailing()) {
logger.Trace("Non-Match: Disable-On-Message")
return false
}
}
}
2020-12-21 00:32:39 +00:00
// Check whether user has one of the disable rules
for _, b := range r.DisableOn {
if badges.Has(b) {
logger.Tracef("Non-Match: Disable-Badge %s", b)
return false
}
}
// Check whether user has at least one of the enable rules
if len(r.EnableOn) > 0 {
var userHasEnableBadge bool
for _, b := range r.EnableOn {
if badges.Has(b) {
userHasEnableBadge = true
}
}
if !userHasEnableBadge {
logger.Trace("Non-Match: No enable-badges")
return false
}
}
// Check on permit
if r.DisableOnPermit && timerStore.HasPermit(m.Params[0], m.User) {
2020-12-21 00:32:39 +00:00
logger.Trace("Non-Match: Permit")
return false
}
// Check whether rule is in cooldown
if r.Cooldown != nil && timerStore.InCooldown(r.MatcherID(), *r.Cooldown) {
2020-12-21 00:32:39 +00:00
logger.Trace("Non-Match: On cooldown")
return false
}
// Nothing objected: Matches!
return true
}
type ruleAction struct {
Ban *string `json:"ban" yaml:"ban"`
Command []string `json:"command" yaml:"command"`
CounterSet *int64 `json:"counter_set" yaml:"counter_set"`
CounterStep *int64 `json:"counter_step" yaml:"counter_step"`
Counter *string `json:"counter" yaml:"counter"`
DeleteMessage *bool `json:"delete_message" yaml:"delete_message"`
Respond *string `json:"respond" yaml:"respond"`
RespondFallback *string `json:"respond_fallback" yaml:"respond_fallback"`
Timeout *time.Duration `json:"timeout" yaml:"timeout"`
2020-12-21 00:32:39 +00:00
}
func loadConfig(filename string) error {
f, err := os.Open(filename)
if err != nil {
return errors.Wrap(err, "open config file")
}
defer f.Close()
var (
decoder = yaml.NewDecoder(f)
tmpConfig = newConfigFile()
)
decoder.SetStrict(true)
if err = decoder.Decode(&tmpConfig); err != nil {
return errors.Wrap(err, "decode config file")
}
if len(tmpConfig.Channels) == 0 {
log.Warn("Loaded config with empty channel list")
}
if len(tmpConfig.Rules) == 0 {
log.Warn("Loaded config with empty ruleset")
}
configLock.Lock()
defer configLock.Unlock()
config = &tmpConfig
return nil
}
func (c configFile) GetMatchingRules(m *irc.Message, event *string) []*rule {
configLock.RLock()
defer configLock.RUnlock()
var out []*rule
for _, r := range c.Rules {
if r.Matches(m, event) {
out = append(out, r)
}
}
return out
}