/[sudobot]/branches/5.x/src/automod/MessageRuleService.ts
ViewVC logotype

Annotation of /branches/5.x/src/automod/MessageRuleService.ts

Parent Directory Parent Directory | Revision Log Revision Log


Revision 577 - (hide annotations)
Mon Jul 29 18:52:37 2024 UTC (8 months ago) by rakinar2
File MIME type: application/typescript
File size: 16839 byte(s)
chore: add old version archive branches (2.x to 9.x-dev)
1 rakinar2 577 /**
2     * This file is part of SudoBot.
3     *
4     * Copyright (C) 2021-2023 OSN Developers.
5     *
6     * SudoBot is free software; you can redistribute it and/or modify it
7     * under the terms of the GNU Affero General Public License as published by
8     * the Free Software Foundation, either version 3 of the License, or
9     * (at your option) any later version.
10     *
11     * SudoBot is distributed in the hope that it will be useful, but
12     * WITHOUT ANY WARRANTY; without even the implied warranty of
13     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14     * GNU Affero General Public License for more details.
15     *
16     * You should have received a copy of the GNU Affero General Public License
17     * along with SudoBot. If not, see <https://www.gnu.org/licenses/>.
18     */
19    
20     import {
21     Message,
22     PermissionFlagsBits,
23     Snowflake,
24     TextChannel,
25     escapeCodeBlock,
26     escapeInlineCode,
27     escapeMarkdown
28     } from "discord.js";
29     import Service from "../core/Service";
30     import { CreateLogEmbedOptions } from "../services/LoggerService";
31     import { HasEventListeners } from "../types/HasEventListeners";
32     import { MessageRuleType } from "../types/MessageRuleSchema";
33     import { log, logError, logWarn } from "../utils/logger";
34     import { escapeRegex } from "../utils/utils";
35    
36     export const name = "messageRuleService";
37    
38     const handlers: Record<MessageRuleType["type"], Extract<keyof MessageRuleService, `rule${string}`>> = {
39     domain: "ruleDomain",
40     blocked_file_extension: "ruleBlockedFileExtension",
41     blocked_mime_type: "ruleBlockedMimeType",
42     anti_invite: "ruleAntiInvite",
43     regex_filter: "ruleRegexFilter",
44     block_repeated_text: "ruleRepeatedText",
45     block_mass_mention: "ruleBlockMassMention",
46     regex_must_match: "ruleRegexMustMatch"
47     };
48    
49     type MessageRuleAction = MessageRuleType["actions"][number];
50    
51     export default class MessageRuleService extends Service implements HasEventListeners {
52     private config(guildId: Snowflake) {
53     return this.client.configManager.config[guildId]?.message_rules;
54     }
55    
56     async onMessageCreate(message: Message<boolean>) {
57     if (message.author.bot) {
58     return false;
59     }
60    
61     const config = this.config(message.guildId!);
62    
63     if (
64     !config?.enabled ||
65     config?.global_disabled_channels?.includes(message.channelId!) ||
66     this.client.permissionManager.isImmuneToAutoMod(message.member!, PermissionFlagsBits.ManageGuild)
67     ) {
68     return false;
69     }
70    
71     return this.processMessageRules(message, config.rules);
72     }
73    
74     private async processMessageRules(message: Message, rules: Array<MessageRuleType>) {
75     for (const rule of rules) {
76     if (rule.actions.length === 0) {
77     log("No action found in this rule! Considering it as disabled.");
78     continue;
79     }
80    
81     if (rule.actions.length === 1 && rule.actions.includes("delete") && !message.deletable) {
82     log("Missing permissions to delete messages, but the rule actions include `delete`. Skipping.");
83     continue;
84     }
85    
86     if (rule.actions.includes("mute") && rule.actions.includes("warn")) {
87     logWarn("You cannot include mute and warn together as message rule actions! Skipping.");
88     continue;
89     }
90    
91     if (rule.disabled_channels.includes(message.channelId!)) {
92     logWarn("This rule is disabled in this channel.");
93     continue;
94     }
95    
96     if (rule.immune_users.includes(message.author.id)) {
97     logWarn("This user is immune to this rule.");
98     continue;
99     }
100    
101     if (message.member?.roles.cache.hasAny(...rule.immune_roles)) {
102     logWarn("This user is immune to this rule, due to having some whitelisted roles.");
103     continue;
104     }
105    
106     const handlerFunctionName = handlers[rule.type];
107    
108     if (!handlerFunctionName || !handlerFunctionName.startsWith("rule")) {
109     continue;
110     }
111    
112     const handler = this[handlerFunctionName] as (
113     ...args: any[]
114     ) => Promise<boolean | null | undefined | CreateLogEmbedOptions>;
115    
116     if (typeof handler !== "function") {
117     continue;
118     }
119    
120     try {
121     const result = await handler.call(this, message, rule);
122    
123     if (result) {
124     try {
125     for (const action of rule.actions) {
126     log("Taking action: ", action);
127     await this.takeAction(message, rule, action);
128     }
129    
130     await this.client.logger
131     .logMessageRuleAction({
132     message,
133     actions: rule.actions,
134     rule: rule.type,
135     embedOptions: typeof result === "object" ? result : undefined
136     })
137     .catch(logError);
138     } catch (e) {
139     logError(e);
140     }
141    
142     return true;
143     }
144     } catch (e) {
145     logError(e);
146     continue;
147     }
148     }
149    
150     return false;
151     }
152    
153     private getReason(rule: MessageRuleType, key: Extract<keyof MessageRuleType, `${string}_reason`>) {
154     return rule[key] ?? rule.common_reason ?? "Your message violated the server rules. Please be careful next time.";
155     }
156    
157     private async takeAction(message: Message, rule: MessageRuleType, action: MessageRuleAction) {
158     switch (action) {
159     case "delete":
160     if (message.deletable) {
161     await message.delete().catch(logError);
162     }
163    
164     break;
165    
166     case "verbal_warn":
167     {
168     const content = this.getReason(rule, "verbal_warning_reason");
169    
170     await message.reply({
171     content
172     });
173     }
174    
175     break;
176    
177     case "warn":
178     {
179     const reason = this.getReason(rule, "warning_reason");
180    
181     await this.client.infractionManager.createMemberWarn(message.member!, {
182     guild: message.guild!,
183     moderator: this.client.user!,
184     notifyUser: true,
185     reason,
186     sendLog: true
187     });
188     }
189    
190     break;
191    
192     case "mute":
193     {
194     const reason = this.getReason(rule, "mute_reason");
195    
196     await this.client.infractionManager.createMemberMute(message.member!, {
197     guild: message.guild!,
198     moderator: this.client.user!,
199     notifyUser: true,
200     reason,
201     sendLog: true,
202     autoRemoveQueue: true,
203     duration: rule.mute_duration === -1 ? 60_000 : rule.mute_duration
204     });
205     }
206    
207     break;
208    
209     case "clear":
210     {
211     await this.client.infractionManager.bulkDeleteMessages({
212     guild: message.guild!,
213     moderator: this.client.user!,
214     count: 50,
215     sendLog: true,
216     messageChannel: message.channel! as TextChannel,
217     user: message.member!.user,
218     reason: "Message rule triggered"
219     });
220     }
221    
222     break;
223     }
224     }
225    
226     async ruleDomain(message: Message, rule: Extract<MessageRuleType, { type: "domain" }>) {
227     if (message.content.trim() === "") {
228     return null;
229     }
230    
231     const { domains, mode, scan_links_only } = rule;
232    
233     const prefix = scan_links_only ? `(https?://)` : `(https?://)?`;
234     let specificRegex = `${prefix}(`;
235     const genericRegex = `${prefix}([a-zA-Z0-9.-]+\\.[a-zA-Z]{2,})`;
236    
237     let index = 0;
238     for (const domain of domains) {
239     const escapedDomain = escapeRegex(domain).replace(/\\\*/g, "[A-Za-z0-9-]+");
240     specificRegex += `${escapedDomain}`;
241    
242     if (index < domains.length - 1) {
243     specificRegex += "|";
244     }
245    
246     index++;
247     }
248    
249     specificRegex += ")\\S*";
250     log(specificRegex);
251    
252     const specificMatches = [...(new RegExp(specificRegex, "i").exec(message.content) ?? [])];
253     log(specificMatches);
254    
255     const genericMatches = [...(new RegExp(genericRegex, "i").exec(message.content) ?? [])];
256     log(genericMatches);
257    
258     if (specificMatches.length > 0) {
259     const cleanedDomain = (specificMatches[2] ?? specificMatches[1] ?? specificMatches[0]).replace(/https?:\/\//, '');
260     if (mode === "disallow") {
261     return {
262     title: "Blocked domain(s) detected",
263     fields: [
264     {
265     name: "Domain",
266     value: `\`${escapeMarkdown(cleanedDomain)}\``
267     }
268     ]
269     } satisfies CreateLogEmbedOptions;
270     } else if (mode === "allow") {
271     return false;
272     }
273     } else if (genericMatches.length > 0 && mode === "allow" && !scan_links_only) {
274     const cleanedDomain = (genericMatches[2] ?? genericMatches[1] ?? genericMatches[0]).replace(/https?:\/\//, '');
275     return {
276     title: "Blocked domain(s) detected",
277     fields: [
278     {
279     name: "Domain",
280     value: `\`${escapeMarkdown(cleanedDomain)}\``
281     }
282     ]
283     } satisfies CreateLogEmbedOptions;
284     }
285    
286     return false;
287     }
288    
289     async ruleBlockedFileExtension(message: Message, rule: Extract<MessageRuleType, { type: "blocked_file_extension" }>) {
290     for (const attachment of message.attachments.values()) {
291     for (const extension of rule.data) {
292     if (attachment.proxyURL.endsWith(`.${extension}`)) {
293     return {
294     title: "File(s) with blocked extensions found",
295     fields: [
296     {
297     name: "File",
298     value: `[${attachment.name}](${attachment.url}): \`.${escapeMarkdown(extension)}\``
299     }
300     ]
301     };
302     }
303     }
304     }
305    
306     return null;
307     }
308    
309     async ruleBlockedMimeType(message: Message, rule: Extract<MessageRuleType, { type: "blocked_mime_type" }>) {
310     for (const attachment of message.attachments.values()) {
311     if (rule.data.includes(attachment.contentType ?? "unknown")) {
312     return {
313     title: "File(s) with blocked MIME-type found",
314     fields: [
315     {
316     name: "File",
317     value: `[${attachment.name}](${attachment.url}): \`${attachment.contentType}\``
318     }
319     ]
320     };
321     }
322     }
323    
324     return null;
325     }
326    
327     async ruleAntiInvite(message: Message, rule: Extract<MessageRuleType, { type: "anti_invite" }>) {
328     if (message.content.trim() === "") {
329     return null;
330     }
331    
332     const allowedInviteCodes = rule.allowed_invite_codes;
333     const regex = /(https?:\/\/)?discord.(gg|com\/invite)\/([A-Za-z0-9_]+)/gi;
334     const matches = message.content.matchAll(regex);
335    
336     for (const match of matches) {
337     if (match[3] && !allowedInviteCodes.includes(match[3])) {
338     if (rule.allow_internal_invites && this.client.inviteTracker.invites.has(`${message.guildId!}_${match[3]}`)) {
339     continue;
340     }
341    
342     return {
343     title: "Posted Invite(s)",
344     fields: [
345     {
346     name: "Invite URL",
347     value: `\`https://discord.gg/${match[3]}\``
348     }
349     ]
350     };
351     }
352     }
353    
354     return null;
355     }
356    
357     async ruleRegexMustMatch(message: Message, rule: Extract<MessageRuleType, { type: "regex_must_match" }>) {
358     if (message.content.trim() === "") {
359     return null;
360     }
361    
362     const { patterns } = rule;
363    
364     for (const pattern of patterns) {
365     const regex = new RegExp(
366     typeof pattern === "string" ? pattern : pattern[0],
367     typeof pattern === "string" ? "gi" : pattern[1]
368     );
369    
370     if (regex.test(message.content)) {
371     return null;
372     }
373     }
374    
375     return {
376     title: "Message did not match with the specified regex patterns"
377     };
378     }
379    
380     async ruleRegexFilter(message: Message, rule: Extract<MessageRuleType, { type: "regex_filter" }>) {
381     if (message.content.trim() === "") {
382     return null;
383     }
384    
385     const { patterns } = rule;
386    
387     for (const pattern of patterns) {
388     const regex = new RegExp(
389     typeof pattern === "string" ? pattern : pattern[0],
390     typeof pattern === "string" ? "gi" : pattern[1]
391     );
392    
393     if (regex.test(message.content)) {
394     return {
395     title: "Message matched with a blocked regex pattern",
396     fields: [
397     {
398     name: "Pattern Info",
399     value: `Pattern: \`${escapeInlineCode(
400     escapeCodeBlock(typeof pattern === "string" ? pattern : pattern[0])
401     )}\`\nFlags: \`${escapeInlineCode(
402     escapeCodeBlock(typeof pattern === "string" ? "gi" : pattern[1])
403     )}\``
404     }
405     ]
406     };
407     }
408     }
409    
410     return null;
411     }
412    
413     async ruleRepeatedText(message: Message, rule: Extract<MessageRuleType, { type: "block_repeated_text" }>) {
414     if (message.content.trim() === "") {
415     return null;
416     }
417    
418     if (new RegExp("(.+)\\1{" + rule.max_repeated_chars + ",}", "gm").test(message.content)) {
419     return {
420     title: "Repeated text detected",
421     fields: [
422     {
423     name: "Description",
424     value: `Too many repetitive characters were found`
425     }
426     ]
427     };
428     } else if (new RegExp("^(.+)(?: +\\1){" + rule.max_repeated_words + "}", "gm").test(message.content)) {
429     return {
430     title: "Repeated text detected",
431     fields: [
432     {
433     name: "Description",
434     value: `Too many repetitive words were found`
435     }
436     ]
437     };
438     }
439    
440     return null;
441     }
442    
443     async ruleBlockMassMention(message: Message, rule: Extract<MessageRuleType, { type: "block_mass_mention" }>) {
444     if (message.content.trim() === "") {
445     return null;
446     }
447    
448     let data = [...message.content.matchAll(new RegExp(`\<\@[0-9]+\>`, "gm"))];
449    
450     console.log("users", data);
451    
452     if (data.length >= rule.max_mentions || (rule.max_user_mentions > 0 && data.length >= rule.max_user_mentions)) {
453     return {
454     title: "Mass mentions detected",
455     fields: [
456     {
457     name: "Description",
458     value: `Too many users were mentioned`
459     }
460     ]
461     };
462     }
463    
464     data = [...message.content.matchAll(new RegExp(`\<\@\&[0-9]+\>`, "gm"))];
465    
466     if (data.length >= rule.max_mentions || (rule.max_role_mentions > 0 && data.length >= rule.max_role_mentions)) {
467     return {
468     title: "Repeated text detected",
469     fields: [
470     {
471     name: "Description",
472     value: `Too many roles were mentioned`
473     }
474     ]
475     };
476     }
477    
478     return null;
479     }
480     }

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26