2020-12-21 00:32:39 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2024-05-01 20:39:18 +00:00
|
|
|
"path"
|
2020-12-21 00:32:39 +00:00
|
|
|
"sync"
|
|
|
|
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
log "github.com/sirupsen/logrus"
|
2023-09-11 17:51:38 +00:00
|
|
|
"gopkg.in/irc.v4"
|
2021-11-25 22:48:16 +00:00
|
|
|
|
2024-04-03 19:00:28 +00:00
|
|
|
"github.com/Luzifer/go_helpers/v2/fieldcollection"
|
2024-05-01 20:39:18 +00:00
|
|
|
"github.com/Luzifer/twitch-bot/v3/internal/locker"
|
2022-11-02 21:38:14 +00:00
|
|
|
"github.com/Luzifer/twitch-bot/v3/plugins"
|
2020-12-21 00:32:39 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2021-09-22 13:36:45 +00:00
|
|
|
availableActions = map[string]plugins.ActorCreationFunc{}
|
2020-12-21 00:32:39 +00:00
|
|
|
availableActionsLock = new(sync.RWMutex)
|
|
|
|
)
|
|
|
|
|
2021-08-19 13:33:56 +00:00
|
|
|
// Compile-time assertion
|
|
|
|
var _ plugins.ActorRegistrationFunc = registerAction
|
|
|
|
|
2021-09-22 13:36:45 +00:00
|
|
|
func getActorByName(name string) (plugins.Actor, error) {
|
|
|
|
availableActionsLock.RLock()
|
|
|
|
defer availableActionsLock.RUnlock()
|
|
|
|
|
|
|
|
acf, ok := availableActions[name]
|
|
|
|
if !ok {
|
|
|
|
return nil, errors.Errorf("undefined actor %q called", name)
|
|
|
|
}
|
|
|
|
|
|
|
|
return acf(), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func registerAction(name string, acf plugins.ActorCreationFunc) {
|
2020-12-21 00:32:39 +00:00
|
|
|
availableActionsLock.Lock()
|
|
|
|
defer availableActionsLock.Unlock()
|
|
|
|
|
2021-09-22 13:36:45 +00:00
|
|
|
if _, ok := availableActions[name]; ok {
|
|
|
|
log.WithField("name", name).Fatal("Duplicate registration of actor")
|
|
|
|
}
|
|
|
|
|
|
|
|
availableActions[name] = acf
|
2020-12-21 00:32:39 +00:00
|
|
|
}
|
|
|
|
|
2024-04-03 19:00:28 +00:00
|
|
|
func triggerAction(c *irc.Client, m *irc.Message, rule *plugins.Rule, ra *plugins.RuleAction, eventData *fieldcollection.FieldCollection) (preventCooldown bool, err error) {
|
2020-12-21 00:32:39 +00:00
|
|
|
availableActionsLock.RLock()
|
|
|
|
defer availableActionsLock.RUnlock()
|
|
|
|
|
2021-09-22 13:36:45 +00:00
|
|
|
a, err := getActorByName(ra.Type)
|
|
|
|
if err != nil {
|
|
|
|
return false, errors.Wrap(err, "getting actor")
|
|
|
|
}
|
2021-06-11 11:52:42 +00:00
|
|
|
|
2021-09-22 13:36:45 +00:00
|
|
|
logger := log.WithField("actor", a.Name())
|
2021-06-11 11:52:42 +00:00
|
|
|
|
2021-09-22 13:36:45 +00:00
|
|
|
if a.IsAsync() {
|
|
|
|
go func() {
|
|
|
|
if _, err := a.Execute(c, m, rule, eventData, ra.Attributes); err != nil {
|
|
|
|
logger.WithError(err).Error("Error in async actor")
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
return preventCooldown, nil
|
2020-12-21 00:32:39 +00:00
|
|
|
}
|
|
|
|
|
2021-09-22 13:36:45 +00:00
|
|
|
apc, err := a.Execute(c, m, rule, eventData, ra.Attributes)
|
|
|
|
return apc, errors.Wrap(err, "execute action")
|
2020-12-21 00:32:39 +00:00
|
|
|
}
|
|
|
|
|
2024-04-03 19:00:28 +00:00
|
|
|
func handleMessage(c *irc.Client, m *irc.Message, event *string, eventData *fieldcollection.FieldCollection) {
|
2022-05-01 22:12:57 +00:00
|
|
|
// Send events to registered handlers
|
|
|
|
if event != nil {
|
|
|
|
go notifyEventHandlers(*event, eventData)
|
|
|
|
}
|
|
|
|
|
2023-12-04 14:05:09 +00:00
|
|
|
matchingRules := config.GetMatchingRules(m, event, eventData)
|
|
|
|
for i := range matchingRules {
|
|
|
|
go handleMessageRuleExecution(c, m, matchingRules[i], eventData)
|
|
|
|
}
|
|
|
|
}
|
2021-08-11 22:12:10 +00:00
|
|
|
|
2024-04-03 19:00:28 +00:00
|
|
|
func handleMessageRuleExecution(c *irc.Client, m *irc.Message, r *plugins.Rule, eventData *fieldcollection.FieldCollection) {
|
2024-05-01 20:39:18 +00:00
|
|
|
locker.LockByKey(path.Join("rule-execution", r.MatcherID()))
|
|
|
|
defer locker.UnlockByKey(path.Join("rule-execution", r.MatcherID()))
|
|
|
|
|
2023-12-04 14:05:09 +00:00
|
|
|
var (
|
2024-04-03 19:00:28 +00:00
|
|
|
ruleEventData = fieldcollection.NewFieldCollection()
|
2023-12-04 14:05:09 +00:00
|
|
|
preventCooldown bool
|
|
|
|
)
|
2020-12-21 00:32:39 +00:00
|
|
|
|
2023-12-04 14:05:09 +00:00
|
|
|
if eventData != nil {
|
|
|
|
ruleEventData.SetFromData(eventData.Data())
|
|
|
|
}
|
|
|
|
|
|
|
|
ActionsLoop:
|
|
|
|
for _, a := range r.Actions {
|
|
|
|
apc, err := triggerAction(c, m, r, a, ruleEventData)
|
|
|
|
switch {
|
|
|
|
case err == nil:
|
|
|
|
// Rule execution did not cause an error, we store the
|
|
|
|
// cooldown modifier and continue
|
|
|
|
|
|
|
|
preventCooldown = preventCooldown || apc
|
|
|
|
continue ActionsLoop
|
|
|
|
|
|
|
|
case errors.Is(err, plugins.ErrStopRuleExecution):
|
|
|
|
// Action has asked to stop executing this rule so we store
|
|
|
|
// the cooldown modifier and stop executing the actions stack
|
|
|
|
// Action experienced an error: We don't store the cooldown
|
|
|
|
// state of this action and stop executing the actions stack
|
|
|
|
// for this rule
|
|
|
|
|
|
|
|
preventCooldown = preventCooldown || apc
|
|
|
|
break ActionsLoop
|
|
|
|
|
|
|
|
default:
|
|
|
|
// Break execution for this rule when one action fails
|
|
|
|
// Lock command
|
|
|
|
|
|
|
|
log.WithError(err).Error("Unable to trigger action")
|
|
|
|
break ActionsLoop
|
2021-08-11 22:12:10 +00:00
|
|
|
}
|
2020-12-21 00:32:39 +00:00
|
|
|
}
|
2023-12-04 14:05:09 +00:00
|
|
|
|
|
|
|
if !preventCooldown {
|
|
|
|
r.SetCooldown(timerService, m, eventData)
|
|
|
|
}
|
2020-12-21 00:32:39 +00:00
|
|
|
}
|