bitbot-3.11-fork/modules/sasl.py

36 lines
1.4 KiB
Python
Raw Normal View History

2018-07-15 22:56:06 +00:00
import base64
class Module(object):
def __init__(self, bot, events, exports):
2018-07-15 22:56:06 +00:00
self.bot = bot
events.on("preprocess.connect").hook(self.preprocess_connect)
events.on("received.cap.ls").hook(self.on_cap)
events.on("received.cap.ack").hook(self.on_cap_ack)
events.on("received.authenticate").hook(self.on_authenticate)
2018-07-15 22:56:06 +00:00
def preprocess_connect(self, event):
sasl = event["server"].get_setting("sasl")
if sasl:
event["server"].send_capability_request("sasl")
2018-07-15 22:56:06 +00:00
def on_cap(self, event):
if "sasl" in event["capabilities"] and event["server"].get_setting(
"sasl", None):
event["server"].queue_capability("sasl")
def on_cap_ack(self, event):
if "sasl" in event["capabilities"]:
event["server"].send_authenticate("PLAIN")
event["server"].wait_for_capability("sasl")
2018-07-15 22:56:06 +00:00
def on_authenticate(self, event):
if event["message"] != "+":
event["server"].send_authenticate("*")
else:
sasl_nick, sasl_pass = event["server"].get_setting("sasl")
auth_text = "%s\0%s\0%s" % (
sasl_nick, sasl_nick, sasl_pass)
auth_text = base64.b64encode(auth_text.encode("utf8"))
auth_text = auth_text.decode("utf8")
event["server"].send_authenticate(auth_text)
event["server"].capability_done("sasl")