/[sudobot]/branches/5.x/src/automod/MessageRuleService.ts
ViewVC logotype

Contents of /branches/5.x/src/automod/MessageRuleService.ts

Parent Directory Parent Directory | Revision Log Revision Log


Revision 577 - (show annotations)
Mon Jul 29 18:52:37 2024 UTC (8 months ago) by rakinar2
File MIME type: application/typescript
File size: 16839 byte(s)
chore: add old version archive branches (2.x to 9.x-dev)
1 /**
2 * This file is part of SudoBot.
3 *
4 * Copyright (C) 2021-2023 OSN Developers.
5 *
6 * SudoBot is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU Affero General Public License as published by
8 * the Free Software Foundation, either version 3 of the License, or
9 * (at your option) any later version.
10 *
11 * SudoBot is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU Affero General Public License for more details.
15 *
16 * You should have received a copy of the GNU Affero General Public License
17 * along with SudoBot. If not, see <https://www.gnu.org/licenses/>.
18 */
19
20 import {
21 Message,
22 PermissionFlagsBits,
23 Snowflake,
24 TextChannel,
25 escapeCodeBlock,
26 escapeInlineCode,
27 escapeMarkdown
28 } from "discord.js";
29 import Service from "../core/Service";
30 import { CreateLogEmbedOptions } from "../services/LoggerService";
31 import { HasEventListeners } from "../types/HasEventListeners";
32 import { MessageRuleType } from "../types/MessageRuleSchema";
33 import { log, logError, logWarn } from "../utils/logger";
34 import { escapeRegex } from "../utils/utils";
35
36 export const name = "messageRuleService";
37
38 const handlers: Record<MessageRuleType["type"], Extract<keyof MessageRuleService, `rule${string}`>> = {
39 domain: "ruleDomain",
40 blocked_file_extension: "ruleBlockedFileExtension",
41 blocked_mime_type: "ruleBlockedMimeType",
42 anti_invite: "ruleAntiInvite",
43 regex_filter: "ruleRegexFilter",
44 block_repeated_text: "ruleRepeatedText",
45 block_mass_mention: "ruleBlockMassMention",
46 regex_must_match: "ruleRegexMustMatch"
47 };
48
49 type MessageRuleAction = MessageRuleType["actions"][number];
50
51 export default class MessageRuleService extends Service implements HasEventListeners {
52 private config(guildId: Snowflake) {
53 return this.client.configManager.config[guildId]?.message_rules;
54 }
55
56 async onMessageCreate(message: Message<boolean>) {
57 if (message.author.bot) {
58 return false;
59 }
60
61 const config = this.config(message.guildId!);
62
63 if (
64 !config?.enabled ||
65 config?.global_disabled_channels?.includes(message.channelId!) ||
66 this.client.permissionManager.isImmuneToAutoMod(message.member!, PermissionFlagsBits.ManageGuild)
67 ) {
68 return false;
69 }
70
71 return this.processMessageRules(message, config.rules);
72 }
73
74 private async processMessageRules(message: Message, rules: Array<MessageRuleType>) {
75 for (const rule of rules) {
76 if (rule.actions.length === 0) {
77 log("No action found in this rule! Considering it as disabled.");
78 continue;
79 }
80
81 if (rule.actions.length === 1 && rule.actions.includes("delete") && !message.deletable) {
82 log("Missing permissions to delete messages, but the rule actions include `delete`. Skipping.");
83 continue;
84 }
85
86 if (rule.actions.includes("mute") && rule.actions.includes("warn")) {
87 logWarn("You cannot include mute and warn together as message rule actions! Skipping.");
88 continue;
89 }
90
91 if (rule.disabled_channels.includes(message.channelId!)) {
92 logWarn("This rule is disabled in this channel.");
93 continue;
94 }
95
96 if (rule.immune_users.includes(message.author.id)) {
97 logWarn("This user is immune to this rule.");
98 continue;
99 }
100
101 if (message.member?.roles.cache.hasAny(...rule.immune_roles)) {
102 logWarn("This user is immune to this rule, due to having some whitelisted roles.");
103 continue;
104 }
105
106 const handlerFunctionName = handlers[rule.type];
107
108 if (!handlerFunctionName || !handlerFunctionName.startsWith("rule")) {
109 continue;
110 }
111
112 const handler = this[handlerFunctionName] as (
113 ...args: any[]
114 ) => Promise<boolean | null | undefined | CreateLogEmbedOptions>;
115
116 if (typeof handler !== "function") {
117 continue;
118 }
119
120 try {
121 const result = await handler.call(this, message, rule);
122
123 if (result) {
124 try {
125 for (const action of rule.actions) {
126 log("Taking action: ", action);
127 await this.takeAction(message, rule, action);
128 }
129
130 await this.client.logger
131 .logMessageRuleAction({
132 message,
133 actions: rule.actions,
134 rule: rule.type,
135 embedOptions: typeof result === "object" ? result : undefined
136 })
137 .catch(logError);
138 } catch (e) {
139 logError(e);
140 }
141
142 return true;
143 }
144 } catch (e) {
145 logError(e);
146 continue;
147 }
148 }
149
150 return false;
151 }
152
153 private getReason(rule: MessageRuleType, key: Extract<keyof MessageRuleType, `${string}_reason`>) {
154 return rule[key] ?? rule.common_reason ?? "Your message violated the server rules. Please be careful next time.";
155 }
156
157 private async takeAction(message: Message, rule: MessageRuleType, action: MessageRuleAction) {
158 switch (action) {
159 case "delete":
160 if (message.deletable) {
161 await message.delete().catch(logError);
162 }
163
164 break;
165
166 case "verbal_warn":
167 {
168 const content = this.getReason(rule, "verbal_warning_reason");
169
170 await message.reply({
171 content
172 });
173 }
174
175 break;
176
177 case "warn":
178 {
179 const reason = this.getReason(rule, "warning_reason");
180
181 await this.client.infractionManager.createMemberWarn(message.member!, {
182 guild: message.guild!,
183 moderator: this.client.user!,
184 notifyUser: true,
185 reason,
186 sendLog: true
187 });
188 }
189
190 break;
191
192 case "mute":
193 {
194 const reason = this.getReason(rule, "mute_reason");
195
196 await this.client.infractionManager.createMemberMute(message.member!, {
197 guild: message.guild!,
198 moderator: this.client.user!,
199 notifyUser: true,
200 reason,
201 sendLog: true,
202 autoRemoveQueue: true,
203 duration: rule.mute_duration === -1 ? 60_000 : rule.mute_duration
204 });
205 }
206
207 break;
208
209 case "clear":
210 {
211 await this.client.infractionManager.bulkDeleteMessages({
212 guild: message.guild!,
213 moderator: this.client.user!,
214 count: 50,
215 sendLog: true,
216 messageChannel: message.channel! as TextChannel,
217 user: message.member!.user,
218 reason: "Message rule triggered"
219 });
220 }
221
222 break;
223 }
224 }
225
226 async ruleDomain(message: Message, rule: Extract<MessageRuleType, { type: "domain" }>) {
227 if (message.content.trim() === "") {
228 return null;
229 }
230
231 const { domains, mode, scan_links_only } = rule;
232
233 const prefix = scan_links_only ? `(https?://)` : `(https?://)?`;
234 let specificRegex = `${prefix}(`;
235 const genericRegex = `${prefix}([a-zA-Z0-9.-]+\\.[a-zA-Z]{2,})`;
236
237 let index = 0;
238 for (const domain of domains) {
239 const escapedDomain = escapeRegex(domain).replace(/\\\*/g, "[A-Za-z0-9-]+");
240 specificRegex += `${escapedDomain}`;
241
242 if (index < domains.length - 1) {
243 specificRegex += "|";
244 }
245
246 index++;
247 }
248
249 specificRegex += ")\\S*";
250 log(specificRegex);
251
252 const specificMatches = [...(new RegExp(specificRegex, "i").exec(message.content) ?? [])];
253 log(specificMatches);
254
255 const genericMatches = [...(new RegExp(genericRegex, "i").exec(message.content) ?? [])];
256 log(genericMatches);
257
258 if (specificMatches.length > 0) {
259 const cleanedDomain = (specificMatches[2] ?? specificMatches[1] ?? specificMatches[0]).replace(/https?:\/\//, '');
260 if (mode === "disallow") {
261 return {
262 title: "Blocked domain(s) detected",
263 fields: [
264 {
265 name: "Domain",
266 value: `\`${escapeMarkdown(cleanedDomain)}\``
267 }
268 ]
269 } satisfies CreateLogEmbedOptions;
270 } else if (mode === "allow") {
271 return false;
272 }
273 } else if (genericMatches.length > 0 && mode === "allow" && !scan_links_only) {
274 const cleanedDomain = (genericMatches[2] ?? genericMatches[1] ?? genericMatches[0]).replace(/https?:\/\//, '');
275 return {
276 title: "Blocked domain(s) detected",
277 fields: [
278 {
279 name: "Domain",
280 value: `\`${escapeMarkdown(cleanedDomain)}\``
281 }
282 ]
283 } satisfies CreateLogEmbedOptions;
284 }
285
286 return false;
287 }
288
289 async ruleBlockedFileExtension(message: Message, rule: Extract<MessageRuleType, { type: "blocked_file_extension" }>) {
290 for (const attachment of message.attachments.values()) {
291 for (const extension of rule.data) {
292 if (attachment.proxyURL.endsWith(`.${extension}`)) {
293 return {
294 title: "File(s) with blocked extensions found",
295 fields: [
296 {
297 name: "File",
298 value: `[${attachment.name}](${attachment.url}): \`.${escapeMarkdown(extension)}\``
299 }
300 ]
301 };
302 }
303 }
304 }
305
306 return null;
307 }
308
309 async ruleBlockedMimeType(message: Message, rule: Extract<MessageRuleType, { type: "blocked_mime_type" }>) {
310 for (const attachment of message.attachments.values()) {
311 if (rule.data.includes(attachment.contentType ?? "unknown")) {
312 return {
313 title: "File(s) with blocked MIME-type found",
314 fields: [
315 {
316 name: "File",
317 value: `[${attachment.name}](${attachment.url}): \`${attachment.contentType}\``
318 }
319 ]
320 };
321 }
322 }
323
324 return null;
325 }
326
327 async ruleAntiInvite(message: Message, rule: Extract<MessageRuleType, { type: "anti_invite" }>) {
328 if (message.content.trim() === "") {
329 return null;
330 }
331
332 const allowedInviteCodes = rule.allowed_invite_codes;
333 const regex = /(https?:\/\/)?discord.(gg|com\/invite)\/([A-Za-z0-9_]+)/gi;
334 const matches = message.content.matchAll(regex);
335
336 for (const match of matches) {
337 if (match[3] && !allowedInviteCodes.includes(match[3])) {
338 if (rule.allow_internal_invites && this.client.inviteTracker.invites.has(`${message.guildId!}_${match[3]}`)) {
339 continue;
340 }
341
342 return {
343 title: "Posted Invite(s)",
344 fields: [
345 {
346 name: "Invite URL",
347 value: `\`https://discord.gg/${match[3]}\``
348 }
349 ]
350 };
351 }
352 }
353
354 return null;
355 }
356
357 async ruleRegexMustMatch(message: Message, rule: Extract<MessageRuleType, { type: "regex_must_match" }>) {
358 if (message.content.trim() === "") {
359 return null;
360 }
361
362 const { patterns } = rule;
363
364 for (const pattern of patterns) {
365 const regex = new RegExp(
366 typeof pattern === "string" ? pattern : pattern[0],
367 typeof pattern === "string" ? "gi" : pattern[1]
368 );
369
370 if (regex.test(message.content)) {
371 return null;
372 }
373 }
374
375 return {
376 title: "Message did not match with the specified regex patterns"
377 };
378 }
379
380 async ruleRegexFilter(message: Message, rule: Extract<MessageRuleType, { type: "regex_filter" }>) {
381 if (message.content.trim() === "") {
382 return null;
383 }
384
385 const { patterns } = rule;
386
387 for (const pattern of patterns) {
388 const regex = new RegExp(
389 typeof pattern === "string" ? pattern : pattern[0],
390 typeof pattern === "string" ? "gi" : pattern[1]
391 );
392
393 if (regex.test(message.content)) {
394 return {
395 title: "Message matched with a blocked regex pattern",
396 fields: [
397 {
398 name: "Pattern Info",
399 value: `Pattern: \`${escapeInlineCode(
400 escapeCodeBlock(typeof pattern === "string" ? pattern : pattern[0])
401 )}\`\nFlags: \`${escapeInlineCode(
402 escapeCodeBlock(typeof pattern === "string" ? "gi" : pattern[1])
403 )}\``
404 }
405 ]
406 };
407 }
408 }
409
410 return null;
411 }
412
413 async ruleRepeatedText(message: Message, rule: Extract<MessageRuleType, { type: "block_repeated_text" }>) {
414 if (message.content.trim() === "") {
415 return null;
416 }
417
418 if (new RegExp("(.+)\\1{" + rule.max_repeated_chars + ",}", "gm").test(message.content)) {
419 return {
420 title: "Repeated text detected",
421 fields: [
422 {
423 name: "Description",
424 value: `Too many repetitive characters were found`
425 }
426 ]
427 };
428 } else if (new RegExp("^(.+)(?: +\\1){" + rule.max_repeated_words + "}", "gm").test(message.content)) {
429 return {
430 title: "Repeated text detected",
431 fields: [
432 {
433 name: "Description",
434 value: `Too many repetitive words were found`
435 }
436 ]
437 };
438 }
439
440 return null;
441 }
442
443 async ruleBlockMassMention(message: Message, rule: Extract<MessageRuleType, { type: "block_mass_mention" }>) {
444 if (message.content.trim() === "") {
445 return null;
446 }
447
448 let data = [...message.content.matchAll(new RegExp(`\<\@[0-9]+\>`, "gm"))];
449
450 console.log("users", data);
451
452 if (data.length >= rule.max_mentions || (rule.max_user_mentions > 0 && data.length >= rule.max_user_mentions)) {
453 return {
454 title: "Mass mentions detected",
455 fields: [
456 {
457 name: "Description",
458 value: `Too many users were mentioned`
459 }
460 ]
461 };
462 }
463
464 data = [...message.content.matchAll(new RegExp(`\<\@\&[0-9]+\>`, "gm"))];
465
466 if (data.length >= rule.max_mentions || (rule.max_role_mentions > 0 && data.length >= rule.max_role_mentions)) {
467 return {
468 title: "Repeated text detected",
469 fields: [
470 {
471 name: "Description",
472 value: `Too many roles were mentioned`
473 }
474 ]
475 };
476 }
477
478 return null;
479 }
480 }

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26