5089 lines
155 KiB
C
5089 lines
155 KiB
C
/*
|
|
* IRC - Internet Relay Chat, ircd/channel.c
|
|
* Copyright (C) 1990 Jarkko Oikarinen and
|
|
* University of Oulu, Co Center
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 1, or (at your option)
|
|
* any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
/** @file
|
|
* @brief Channel management and maintenance
|
|
* @version $Id: channel.c 1928 2010-01-03 21:04:54Z entrope $
|
|
*/
|
|
#include "config.h"
|
|
|
|
#include "channel.h"
|
|
#include "class.h"
|
|
#include "client.h"
|
|
#include "destruct_event.h"
|
|
#include "hash.h"
|
|
#include "ircd.h"
|
|
#include "ircd_alloc.h"
|
|
#include "ircd_chattr.h"
|
|
#include "ircd_defs.h"
|
|
#include "ircd_features.h"
|
|
#include "ircd_log.h"
|
|
#include "ircd_reply.h"
|
|
#include "ircd_snprintf.h"
|
|
#include "ircd_string.h"
|
|
#include "list.h"
|
|
#include "match.h"
|
|
#include "msg.h"
|
|
#include "msgq.h"
|
|
#include "numeric.h"
|
|
#include "numnicks.h"
|
|
#include "querycmds.h"
|
|
#include "s_bsd.h"
|
|
#include "s_conf.h"
|
|
#include "s_debug.h"
|
|
#include "s_misc.h"
|
|
#include "s_user.h"
|
|
#include "send.h"
|
|
#include "struct.h"
|
|
#include "sys.h"
|
|
#include "whowas.h"
|
|
|
|
/* #include <assert.h> -- Now using assert in ircd_log.h */
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
/** Linked list containing the full list of all channels */
|
|
struct Channel* GlobalChannelList = 0;
|
|
|
|
/** Number of struct Membership*'s allocated */
|
|
static unsigned int membershipAllocCount;
|
|
/** Freelist for struct Membership*'s */
|
|
static struct Membership* membershipFreeList;
|
|
/** Freelist for struct Ban*'s */
|
|
static struct Ban* free_bans;
|
|
/** Number of ban structures allocated. */
|
|
static size_t bans_alloc;
|
|
/** Number of ban structures in use. */
|
|
static size_t bans_inuse;
|
|
|
|
int parse_extban(char *ban, struct ExtBan *extban, int level, char *prefix);
|
|
|
|
#if !defined(NDEBUG)
|
|
/** return the length (>=0) of a chain of links.
|
|
* @param lp pointer to the start of the linked list
|
|
* @return the number of items in the list
|
|
*/
|
|
static int list_length(struct SLink *lp)
|
|
{
|
|
int count = 0;
|
|
|
|
for (; lp; lp = lp->next)
|
|
++count;
|
|
return count;
|
|
}
|
|
#endif
|
|
|
|
/** Set the mask for a ban, checking for IP masks.
|
|
* @param[in,out] ban Ban structure to modify.
|
|
* @param[in] banstr Mask to ban.
|
|
*/
|
|
static void
|
|
set_ban_mask(struct Ban *ban, const char *banstr)
|
|
{
|
|
char *sep = NULL;
|
|
char *b = (char *)banstr;
|
|
char prefix[BUFSIZE+1];
|
|
assert(banstr != NULL);
|
|
memset(&ban->extban, 0, sizeof(struct ExtBan));
|
|
if (parse_extban((char *)banstr, &ban->extban, 0, (char *)&prefix) > 0) {
|
|
b = (char *)&ban->extban.mask;
|
|
ban->flags |= BAN_EXTENDED;
|
|
if (!(ban->extban.flags & EBAN_MASKTYPE))
|
|
sep = strrchr(b, '@');
|
|
} else
|
|
sep = strrchr(b, '@');
|
|
ircd_strncpy(ban->banstr, banstr, sizeof(ban->banstr));
|
|
if (sep) {
|
|
ban->nu_len = sep - b;
|
|
if (ban->flags & BAN_EXTENDED)
|
|
ban->nu_len += ban->extban.prefixlen;
|
|
if (ipmask_parse(sep + 1, &ban->address, &ban->addrbits))
|
|
ban->flags |= BAN_IPMASK;
|
|
}
|
|
}
|
|
|
|
/** Allocate a new Ban structure.
|
|
* @param[in] banstr Ban mask to use.
|
|
* @return Newly allocated ban.
|
|
*/
|
|
struct Ban *
|
|
make_ban(const char *banstr)
|
|
{
|
|
struct Ban *ban;
|
|
if (free_bans) {
|
|
ban = free_bans;
|
|
free_bans = free_bans->next;
|
|
}
|
|
else if (!(ban = MyMalloc(sizeof(*ban))))
|
|
return NULL;
|
|
else
|
|
bans_alloc++;
|
|
bans_inuse++;
|
|
memset(ban, 0, sizeof(*ban));
|
|
set_ban_mask(ban, banstr);
|
|
return ban;
|
|
}
|
|
|
|
/** Deallocate a ban structure.
|
|
* @param[in] ban Ban to deallocate.
|
|
*/
|
|
void
|
|
free_ban(struct Ban *ban)
|
|
{
|
|
ban->next = free_bans;
|
|
free_bans = ban;
|
|
bans_inuse--;
|
|
}
|
|
|
|
/** Report ban usage to \a cptr.
|
|
* @param[in] cptr Client requesting information.
|
|
*/
|
|
void bans_send_meminfo(struct Client *cptr)
|
|
{
|
|
struct Ban *ban;
|
|
size_t num_free;
|
|
for (num_free = 0, ban = free_bans; ban; ban = ban->next)
|
|
num_free++;
|
|
send_reply(cptr, SND_EXPLICIT | RPL_STATSDEBUG, ":Bans: inuse %zu(%zu) free %zu alloc %zu",
|
|
bans_inuse, bans_inuse * sizeof(*ban), num_free, bans_alloc);
|
|
}
|
|
|
|
/** return the struct Membership* that represents a client on a channel
|
|
* This function finds a struct Membership* which holds the state about
|
|
* a client on a specific channel. The code is smart enough to iterate
|
|
* over the channels a user is in, or the users in a channel to find the
|
|
* user depending on which is likely to be more efficient.
|
|
*
|
|
* @param chptr pointer to the channel struct
|
|
* @param cptr pointer to the client struct
|
|
*
|
|
* @returns pointer to the struct Membership representing this client on
|
|
* this channel. Returns NULL if the client is not on the channel.
|
|
* Returns NULL if the client is actually a server.
|
|
* @see find_channel_member()
|
|
*/
|
|
struct Membership* find_member_link(struct Channel* chptr, const struct Client* cptr)
|
|
{
|
|
struct Membership *m;
|
|
assert(0 != cptr);
|
|
assert(0 != chptr);
|
|
|
|
/* Servers don't have member links */
|
|
if (IsServer(cptr)||IsMe(cptr))
|
|
return 0;
|
|
|
|
/* +k users are typically on a LOT of channels. So we iterate over who
|
|
* is in the channel. X/W are +k and are in about 5800 channels each.
|
|
* however there are typically no more than 1000 people in a channel
|
|
* at a time.
|
|
*/
|
|
if (IsChannelService(cptr)) {
|
|
m = chptr->members;
|
|
while (m) {
|
|
assert(m->channel == chptr);
|
|
if (m->user == cptr)
|
|
return m;
|
|
m = m->next_member;
|
|
}
|
|
}
|
|
/* Users on the other hand aren't allowed on more than 15 channels. 50%
|
|
* of users that are on channels are on 2 or less, 95% are on 7 or less,
|
|
* and 99% are on 10 or less.
|
|
*/
|
|
else {
|
|
m = (cli_user(cptr))->channel;
|
|
while (m) {
|
|
assert(m->user == cptr);
|
|
if (m->channel == chptr)
|
|
return m;
|
|
m = m->next_channel;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/** Find the client structure for a nick name (user)
|
|
* Find the client structure for a nick name (user)
|
|
* using history mechanism if necessary. If the client is not found, an error
|
|
* message (NO SUCH NICK) is generated. If the client was found
|
|
* through the history, chasing will be 1 and otherwise 0.
|
|
*
|
|
* This function was used extensively in the P09 days, and since we now have
|
|
* numeric nicks is no longer quite as important.
|
|
*
|
|
* @param sptr Pointer to the client that has requested the search
|
|
* @param user a string representing the client to be found
|
|
* @param chasing a variable set to 0 if the user was found directly,
|
|
* 1 otherwise
|
|
* @returns a pointer the client, or NULL if the client wasn't found.
|
|
*/
|
|
struct Client* find_chasing(struct Client* sptr, const char* user, int* chasing)
|
|
{
|
|
struct Client* who = FindClient(user);
|
|
|
|
if (chasing)
|
|
*chasing = 0;
|
|
if (who)
|
|
return who;
|
|
|
|
if (!(who = get_history(user, feature_int(FEAT_KILLCHASETIMELIMIT)))) {
|
|
send_reply(sptr, ERR_NOSUCHNICK, user);
|
|
return 0;
|
|
}
|
|
if (chasing)
|
|
*chasing = 1;
|
|
return who;
|
|
}
|
|
|
|
/** Decrement the count of users, and free if empty.
|
|
* Subtract one user from channel i (and free channel * block, if channel
|
|
* became empty).
|
|
*
|
|
* @param chptr The channel to subtract one from.
|
|
*
|
|
* @returns true (1) if channel still has members.
|
|
* false (0) if the channel is now empty.
|
|
*/
|
|
int sub1_from_channel(struct Channel* chptr)
|
|
{
|
|
if (chptr->users > 1) /* Can be 0, called for an empty channel too */
|
|
{
|
|
assert(0 != chptr->members);
|
|
--chptr->users;
|
|
return 1;
|
|
}
|
|
|
|
chptr->users = 0;
|
|
|
|
if (chptr->mode.exmode & EXMODE_PERSIST)
|
|
return 0;
|
|
|
|
/*
|
|
* Also channels without Apass set need to be kept alive,
|
|
* otherwise Bad Guys(tm) would be able to takeover
|
|
* existing channels too easily, and then set an Apass!
|
|
* However, if a channel without Apass becomes empty
|
|
* then we try to be kind to them and remove possible
|
|
* limiting modes.
|
|
*/
|
|
chptr->mode.mode &= ~MODE_INVITEONLY;
|
|
chptr->mode.limit = 0;
|
|
/*
|
|
* We do NOT reset a possible key or bans because when
|
|
* the 'channel owners' can't get in because of a key
|
|
* or ban then apparently there was a fight/takeover
|
|
* on the channel and we want them to contact IRC opers
|
|
* who then will educate them on the use of Apass/Upass.
|
|
*/
|
|
if (!chptr->mode.apass[0]) /* If no Apass, reset all modes. */
|
|
{
|
|
struct Ban *link, *next;
|
|
chptr->mode.mode = 0;
|
|
chptr->mode.exmode = 0;
|
|
*chptr->mode.key = '\0';
|
|
while (chptr->invites)
|
|
del_invite(chptr->invites->value.cptr, chptr);
|
|
for (link = chptr->banlist; link; link = next) {
|
|
next = link->next;
|
|
free_ban(link);
|
|
}
|
|
chptr->banlist = NULL;
|
|
for (link = chptr->exceptlist; link; link = next) {
|
|
next = link->next;
|
|
free_ban(link);
|
|
}
|
|
chptr->exceptlist = NULL;
|
|
|
|
/* Immediately destruct empty -A channels if not using apass. */
|
|
if (!feature_bool(FEAT_OPLEVELS))
|
|
{
|
|
destruct_channel(chptr);
|
|
return 0;
|
|
}
|
|
}
|
|
if (feature_bool(FEAT_ZANNELS)) {
|
|
/* Only used delayed destruction if ZANNELS enabled */
|
|
if (TStime() - chptr->creationtime < 172800) /* Channel younger than 48 hours? */
|
|
schedule_destruct_event_1m(chptr); /* Get rid of it in approximately 4-5 minutes */
|
|
else
|
|
schedule_destruct_event_48h(chptr); /* Get rid of it in approximately 48 hours */
|
|
} else
|
|
destruct_channel(chptr);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/** Destroy an empty channel
|
|
* This function destroys an empty channel, removing it from hashtables,
|
|
* and removing any resources it may have consumed.
|
|
*
|
|
* @param chptr The channel to destroy
|
|
*
|
|
* @returns 0 (success)
|
|
*
|
|
* FIXME: Change to return void, this function never fails.
|
|
*/
|
|
int destruct_channel(struct Channel* chptr)
|
|
{
|
|
struct Ban *ban, *next;
|
|
|
|
assert(0 == chptr->members);
|
|
|
|
/*
|
|
* Now, find all invite links from channel structure
|
|
*/
|
|
while (chptr->invites)
|
|
del_invite(chptr->invites->value.cptr, chptr);
|
|
|
|
for (ban = chptr->banlist; ban; ban = next)
|
|
{
|
|
next = ban->next;
|
|
free_ban(ban);
|
|
}
|
|
for (ban = chptr->exceptlist; ban; ban = next)
|
|
{
|
|
next = ban->next;
|
|
free_ban(ban);
|
|
}
|
|
if (chptr->prev)
|
|
chptr->prev->next = chptr->next;
|
|
else
|
|
GlobalChannelList = chptr->next;
|
|
if (chptr->next)
|
|
chptr->next->prev = chptr->prev;
|
|
hRemChannel(chptr);
|
|
--UserStats.channels;
|
|
/*
|
|
* make sure that channel actually got removed from hash table
|
|
*/
|
|
assert(chptr->hnext == chptr);
|
|
MyFree(chptr);
|
|
return 0;
|
|
}
|
|
|
|
/** returns Membership * if a person is joined and not a zombie
|
|
* @param cptr Client
|
|
* @param chptr Channel
|
|
* @returns pointer to the client's struct Membership * on the channel if that
|
|
* user is a full member of the channel, or NULL otherwise.
|
|
*
|
|
* @see find_member_link()
|
|
*/
|
|
struct Membership* find_channel_member(struct Client* cptr, struct Channel* chptr)
|
|
{
|
|
struct Membership* member;
|
|
assert(0 != chptr);
|
|
|
|
member = find_member_link(chptr, cptr);
|
|
return (member && !IsZombie(member)) ? member : 0;
|
|
}
|
|
|
|
/** Searches for a ban from a ban list that matches a user.
|
|
* @param[in] cptr The client to test.
|
|
* @param[in] banlist The list of bans to test.
|
|
* @param[in] extbantype The extended ban type to find.
|
|
* @param[in] level Used to track how deep through a chain of ~j extended bans we are.
|
|
* @return Pointer to a matching ban, or NULL if none exit.
|
|
*/
|
|
struct Ban *find_ban(struct Client *cptr, struct Ban *banlist, int extbantype, int level)
|
|
{
|
|
char nu[NICKLEN + USERLEN + 2];
|
|
char tmphost[HOSTLEN + 1];
|
|
char iphost[SOCKIPLEN + 1];
|
|
char *hostmask;
|
|
char *sr;
|
|
int isexcepts = 0;
|
|
struct Ban *found;
|
|
|
|
if (extbantype & EBAN_EXCEPTLIST) {
|
|
isexcepts = 1;
|
|
extbantype &= ~EBAN_EXCEPTLIST;
|
|
}
|
|
|
|
/* Build nick!user and alternate host names. */
|
|
ircd_snprintf(0, nu, sizeof(nu), "%s!%s",
|
|
cli_name(cptr), cli_user(cptr)->username);
|
|
ircd_ntoa_r(iphost, &cli_ip(cptr));
|
|
if (IsAccount(cptr) && ((feature_int(FEAT_HOST_HIDING_STYLE) == 1) ||
|
|
(feature_int(FEAT_HOST_HIDING_STYLE) == 3)))
|
|
{
|
|
ircd_snprintf(0, tmphost, HOSTLEN, "%s.%s",
|
|
cli_user(cptr)->account, (feature_bool(FEAT_OPERHOST_HIDING) &&
|
|
IsAnOper(cptr) ? feature_str(FEAT_HIDDEN_OPERHOST) :
|
|
feature_str(FEAT_HIDDEN_HOST)));
|
|
sr = tmphost;
|
|
}
|
|
else
|
|
sr = NULL;
|
|
|
|
/* Walk through ban list. */
|
|
for (found = NULL; banlist; banlist = banlist->next) {
|
|
int res;
|
|
/* If we have found a positive ban already, only consider exceptions. */
|
|
if (found && !(banlist->flags & BAN_EXCEPTION))
|
|
continue;
|
|
|
|
if (banlist->flags & BAN_EXTENDED) {
|
|
int ismatch = 0;
|
|
if (banlist->extban.flags & EBAN_ACCOUNT) {
|
|
if (IsAccount(cptr) && !match(banlist->extban.mask, cli_account(cptr)))
|
|
ismatch = 1;
|
|
} else if (banlist->extban.flags & EBAN_REALNAME) {
|
|
if (!match(banlist->extban.mask, cli_info(cptr)))
|
|
ismatch = 1;
|
|
} else if (banlist->extban.flags & EBAN_MARK) {
|
|
if (find_mark_match(cptr, banlist->extban.mask))
|
|
ismatch = 1;
|
|
} else if (banlist->extban.flags & EBAN_MARKUA) {
|
|
if (!IsAccount(cptr) && find_mark_match(cptr, banlist->extban.mask))
|
|
ismatch = 1;
|
|
} else if (banlist->extban.flags & EBAN_CHANNEL) {
|
|
struct Membership *lp;
|
|
for (lp = cptr->cli_user->channel; lp; lp = lp->next_channel) {
|
|
if (IsChannelName(banlist->extban.mask) &&
|
|
!match(banlist->extban.mask, lp->channel->chname))
|
|
ismatch = 1;
|
|
else if (!match(banlist->extban.mask + 1, lp->channel->chname)) {
|
|
if ((*banlist->extban.mask == '@') && IsChanOp(lp))
|
|
ismatch = 1;
|
|
else if ((*banlist->extban.mask == '%') && IsHalfOp(lp))
|
|
ismatch = 1;
|
|
else if ((*banlist->extban.mask == '+') && HasVoice(lp))
|
|
ismatch = 1;
|
|
}
|
|
}
|
|
} else if (banlist->extban.flags & EBAN_JOIN) {
|
|
struct Channel *chptr;
|
|
|
|
if (level >= feature_int(FEAT_EXTBAN_j_MAXDEPTH))
|
|
continue;
|
|
|
|
if ((chptr = FindChannel(banlist->extban.mask))) {
|
|
if (isexcepts)
|
|
found = find_ban(cptr, chptr->exceptlist, extbantype | EBAN_EXCEPTLIST, level + 1);
|
|
else
|
|
found = find_ban(cptr, chptr->banlist, extbantype, level + 1);
|
|
}
|
|
} else if (banlist->extban.nu_len) {
|
|
/* Compare nick!user portion of ban. */
|
|
banlist->extban.mask[banlist->extban.nu_len] = '\0';
|
|
res = match(banlist->extban.mask, nu);
|
|
banlist->extban.mask[banlist->extban.nu_len] = '@';
|
|
if (!res)
|
|
ismatch = 1;
|
|
/* Compare host portion of ban. */
|
|
hostmask = banlist->extban.mask + banlist->extban.nu_len + 1;
|
|
if (((banlist->flags & BAN_IPMASK)
|
|
&& ipmask_check(&cli_ip(cptr), &banlist->address, banlist->addrbits))
|
|
&& !match(hostmask, cli_user(cptr)->host)
|
|
&& !match(hostmask, cli_user(cptr)->realhost)
|
|
&& (IsCloakIP(cptr) && !match(hostmask, cli_user(cptr)->cloakip))
|
|
&& (IsCloakHost(cptr) && !match(hostmask, cli_user(cptr)->cloakhost))
|
|
&& (sr && !match(hostmask, sr)))
|
|
ismatch = 1;
|
|
}
|
|
if ((banlist->extban.flags & extbantype) || !(banlist->extban.flags & EBAN_ACTIVITY)) {
|
|
if ((banlist->extban.flags & EBAN_NEGATEMASK) && !ismatch)
|
|
found = banlist;
|
|
else if (!(banlist->extban.flags & EBAN_NEGATEMASK) && ismatch)
|
|
found = banlist;
|
|
}
|
|
} else {
|
|
/* Compare nick!user portion of ban. */
|
|
banlist->banstr[banlist->nu_len] = '\0';
|
|
res = match(banlist->banstr, nu);
|
|
banlist->banstr[banlist->nu_len] = '@';
|
|
if (res)
|
|
continue;
|
|
/* Compare host portion of ban. */
|
|
hostmask = banlist->banstr + banlist->nu_len + 1;
|
|
if (!((banlist->flags & BAN_IPMASK)
|
|
&& ipmask_check(&cli_ip(cptr), &banlist->address, banlist->addrbits))
|
|
&& match(hostmask, cli_user(cptr)->host)
|
|
&& match(hostmask, cli_user(cptr)->realhost)
|
|
&& !(IsCloakIP(cptr) && !match(hostmask, cli_user(cptr)->cloakip))
|
|
&& !(IsCloakHost(cptr) && !match(hostmask, cli_user(cptr)->cloakhost))
|
|
&& !(sr && !match(hostmask, sr)))
|
|
continue;
|
|
/* If an exception matches, no ban can match. */
|
|
if (banlist->flags & BAN_EXCEPTION)
|
|
return NULL;
|
|
/* Otherwise, remember this ban but keep searching for an exception. */
|
|
found = banlist;
|
|
}
|
|
}
|
|
return found;
|
|
}
|
|
|
|
/**
|
|
* This function returns true if the user is banned on the said channel.
|
|
* This function will check the ban cache if applicable, otherwise will
|
|
* do the comparisons and cache the result.
|
|
*
|
|
* @param[in] member The Membership to test for banned-ness.
|
|
* @param[in] extbantype The extended ban type to check for.
|
|
* @return Non-zero if the member is banned, zero if not.
|
|
*/
|
|
static int is_banned(struct Membership* member, int extbantype)
|
|
{
|
|
if (extbantype) {
|
|
if (extbantype == EBAN_NICK) {
|
|
if (IsBanValidNick(member))
|
|
return IsBannedNick(member);
|
|
|
|
SetBanValidNick(member);
|
|
} else if (extbantype == EBAN_QUIET) {
|
|
if (IsBanValidQuiet(member))
|
|
return IsBannedQuiet(member);
|
|
|
|
SetBanValidQuiet(member);
|
|
}
|
|
|
|
if (find_ban(member->user, member->channel->banlist, extbantype, 0)) {
|
|
if (extbantype == EBAN_NICK)
|
|
SetBannedNick(member);
|
|
else if (extbantype == EBAN_QUIET)
|
|
SetBannedQuiet(member);
|
|
return 1;
|
|
} else {
|
|
if (extbantype == EBAN_NICK)
|
|
ClearBannedNick(member);
|
|
else if (extbantype == EBAN_QUIET)
|
|
ClearBannedQuiet(member);
|
|
return 0;
|
|
}
|
|
} else {
|
|
if (IsBanValid(member))
|
|
return IsBanned(member);
|
|
|
|
SetBanValid(member);
|
|
if (find_ban(member->user, member->channel->banlist, EBAN_NONE, 0)) {
|
|
SetBanned(member);
|
|
return 1;
|
|
} else {
|
|
ClearBanned(member);
|
|
return 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
* This function returns true if the user is excepted on the said channel.
|
|
* This function will check the ban exception cache if applicable,
|
|
* otherwise will do the comparisons and cache the result.
|
|
*
|
|
* @param[in] member The Membership to test for excepted-ness.
|
|
* @param[in] extbantype The extended ban type to check for.
|
|
* @return Non-zero if the member is excepted, zero if not.
|
|
*/
|
|
static int is_excepted(struct Membership* member, int extbantype)
|
|
{
|
|
if (extbantype) {
|
|
if (extbantype == EBAN_NICK) {
|
|
if (IsExceptValidNick(member))
|
|
return IsExceptedNick(member);
|
|
|
|
SetExceptValidNick(member);
|
|
} else if (extbantype == EBAN_QUIET) {
|
|
if (IsExceptValidQuiet(member))
|
|
return IsExceptedQuiet(member);
|
|
|
|
SetExceptValidQuiet(member);
|
|
}
|
|
|
|
if (find_ban(member->user, member->channel->exceptlist, extbantype | EBAN_EXCEPTLIST, 0)) {
|
|
if (extbantype == EBAN_NICK)
|
|
SetExceptedNick(member);
|
|
else if (extbantype == EBAN_QUIET)
|
|
SetExceptedQuiet(member);
|
|
return 1;
|
|
} else {
|
|
if (extbantype == EBAN_NICK)
|
|
ClearExceptedNick(member);
|
|
else if (extbantype == EBAN_QUIET)
|
|
ClearExceptedQuiet(member);
|
|
return 0;
|
|
}
|
|
} else {
|
|
if (IsExceptValid(member))
|
|
return IsExcepted(member);
|
|
|
|
SetExceptValid(member);
|
|
if (find_ban(member->user, member->channel->exceptlist, EBAN_EXCEPTLIST, 0)) {
|
|
SetExcepted(member);
|
|
return 1;
|
|
} else {
|
|
ClearExcepted(member);
|
|
return 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
/** add a user to a channel.
|
|
* adds a user to a channel by adding another link to the channels member
|
|
* chain.
|
|
*
|
|
* @param chptr The channel to add to.
|
|
* @param who The user to add.
|
|
* @param flags The flags the user gets initially.
|
|
* @param oplevel The oplevel the user starts with.
|
|
*/
|
|
void add_user_to_channel(struct Channel* chptr, struct Client* who,
|
|
unsigned int flags, int oplevel)
|
|
{
|
|
assert(0 != chptr);
|
|
assert(0 != who);
|
|
|
|
if (cli_user(who)) {
|
|
|
|
struct Membership* member = membershipFreeList;
|
|
if (member)
|
|
membershipFreeList = member->next_member;
|
|
else {
|
|
member = (struct Membership*) MyMalloc(sizeof(struct Membership));
|
|
++membershipAllocCount;
|
|
}
|
|
|
|
assert(0 != member);
|
|
member->user = who;
|
|
member->channel = chptr;
|
|
member->status = flags;
|
|
member->banflags = 0;
|
|
SetOpLevel(member, oplevel);
|
|
|
|
member->next_member = chptr->members;
|
|
if (member->next_member)
|
|
member->next_member->prev_member = member;
|
|
member->prev_member = 0;
|
|
chptr->members = member;
|
|
|
|
member->next_channel = (cli_user(who))->channel;
|
|
if (member->next_channel)
|
|
member->next_channel->prev_channel = member;
|
|
member->prev_channel = 0;
|
|
(cli_user(who))->channel = member;
|
|
|
|
if (chptr->destruct_event)
|
|
remove_destruct_event(chptr);
|
|
++chptr->users;
|
|
if (!IsSSL(who) && !IsChannelService(who))
|
|
++chptr->nonsslusers;
|
|
++((cli_user(who))->joined);
|
|
}
|
|
}
|
|
|
|
/** Remove a person from a channel, given their Membership*
|
|
*
|
|
* @param member A member of a channel.
|
|
*
|
|
* @returns true if there are more people in the channel.
|
|
*/
|
|
static int remove_member_from_channel(struct Membership* member)
|
|
{
|
|
struct Channel* chptr;
|
|
assert(0 != member);
|
|
chptr = member->channel;
|
|
/*
|
|
* unlink channel member list
|
|
*/
|
|
if (member->next_member)
|
|
member->next_member->prev_member = member->prev_member;
|
|
if (member->prev_member)
|
|
member->prev_member->next_member = member->next_member;
|
|
else
|
|
member->channel->members = member->next_member;
|
|
|
|
/*
|
|
* If this is the last delayed-join user, may have to clear WASDELJOINS.
|
|
*/
|
|
if (IsDelayedJoin(member))
|
|
CheckDelayedJoins(chptr);
|
|
|
|
/*
|
|
* unlink client channel list
|
|
*/
|
|
if (member->next_channel)
|
|
member->next_channel->prev_channel = member->prev_channel;
|
|
if (member->prev_channel)
|
|
member->prev_channel->next_channel = member->next_channel;
|
|
else
|
|
(cli_user(member->user))->channel = member->next_channel;
|
|
|
|
--(cli_user(member->user))->joined;
|
|
|
|
member->next_member = membershipFreeList;
|
|
membershipFreeList = member;
|
|
|
|
if (!IsSSL(member->user) && !IsChannelService(member->user))
|
|
--chptr->nonsslusers;
|
|
|
|
return sub1_from_channel(chptr);
|
|
}
|
|
|
|
/** Check if all the remaining members on the channel are zombies
|
|
*
|
|
* @returns False if the channel has any non zombie members, True otherwise.
|
|
* @see \ref zombie
|
|
*/
|
|
static int channel_all_zombies(struct Channel* chptr)
|
|
{
|
|
struct Membership* member;
|
|
|
|
for (member = chptr->members; member; member = member->next_member) {
|
|
if (!IsZombie(member))
|
|
return 0;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
|
|
/** Remove a user from a channel
|
|
* This is the generic entry point for removing a user from a channel, this
|
|
* function will remove the client from the channel, and destroy the channel
|
|
* if there are no more normal users left.
|
|
*
|
|
* @param cptr The client
|
|
* @param chptr The channel
|
|
*/
|
|
void remove_user_from_channel(struct Client* cptr, struct Channel* chptr)
|
|
{
|
|
|
|
struct Membership* member;
|
|
assert(0 != chptr);
|
|
|
|
if ((member = find_member_link(chptr, cptr))) {
|
|
if (remove_member_from_channel(member)) {
|
|
if (channel_all_zombies(chptr)) {
|
|
/*
|
|
* XXX - this looks dangerous but isn't if we got the referential
|
|
* integrity right for channels
|
|
*/
|
|
while (remove_member_from_channel(chptr->members))
|
|
;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/** Remove a user from all channels they are on.
|
|
*
|
|
* This function removes a user from all channels they are on.
|
|
*
|
|
* @param cptr The client to remove.
|
|
*/
|
|
void remove_user_from_all_channels(struct Client* cptr)
|
|
{
|
|
struct Membership* chan;
|
|
assert(0 != cptr);
|
|
assert(0 != cli_user(cptr));
|
|
|
|
while ((chan = (cli_user(cptr))->channel))
|
|
remove_user_from_channel(cptr, chan->channel);
|
|
}
|
|
|
|
/** Check if this user is a legitimate chanop
|
|
*
|
|
* @param cptr Client to check
|
|
* @param chptr Channel to check
|
|
*
|
|
* @returns True if the user is a chanop (And not a zombie), False otherwise.
|
|
* @see \ref zombie
|
|
*/
|
|
int is_chan_op(struct Client *cptr, struct Channel *chptr)
|
|
{
|
|
struct Membership* member;
|
|
assert(chptr);
|
|
if ((member = find_member_link(chptr, cptr)))
|
|
return (!IsZombie(member) && IsChanOp(member));
|
|
|
|
return 0;
|
|
}
|
|
|
|
/** Check if a user is a Zombie on a specific channel.
|
|
*
|
|
* @param cptr The client to check.
|
|
* @param chptr The channel to check.
|
|
*
|
|
* @returns True if the client (cptr) is a zombie on the channel (chptr),
|
|
* False otherwise.
|
|
*
|
|
* @see \ref zombie
|
|
*/
|
|
int is_zombie(struct Client *cptr, struct Channel *chptr)
|
|
{
|
|
struct Membership* member;
|
|
|
|
assert(0 != chptr);
|
|
|
|
if ((member = find_member_link(chptr, cptr)))
|
|
return IsZombie(member);
|
|
return 0;
|
|
}
|
|
|
|
/** Check if this user is a legitimate halfop
|
|
*
|
|
* @param cptr Client to check
|
|
* @param chptr Channel to check
|
|
*
|
|
* @returns True if the user is a halfop (And not a zombie), False otherwise.
|
|
* @see \ref zombie
|
|
*/
|
|
int is_half_op(struct Client *cptr, struct Channel *chptr)
|
|
{
|
|
struct Membership* member;
|
|
assert(chptr);
|
|
if ((member = find_member_link(chptr, cptr)))
|
|
return (!IsZombie(member) && IsHalfOp(member));
|
|
|
|
return 0;
|
|
}
|
|
|
|
/** Returns if a user has voice on a channel.
|
|
*
|
|
* @param cptr The client
|
|
* @param chptr The channel
|
|
*
|
|
* @returns True if the client (cptr) is voiced on (chptr) and is not a zombie.
|
|
* @see \ref zombie
|
|
*/
|
|
int has_voice(struct Client* cptr, struct Channel* chptr)
|
|
{
|
|
struct Membership* member;
|
|
|
|
assert(0 != chptr);
|
|
if ((member = find_member_link(chptr, cptr)))
|
|
return (!IsZombie(member) && HasVoice(member));
|
|
|
|
return 0;
|
|
}
|
|
|
|
/** Can this member send to a channel
|
|
*
|
|
* A user can speak on a channel iff:
|
|
* <ol>
|
|
* <li> They didn't use the Apass to gain ops.
|
|
* <li> They are op'd or voice'd.
|
|
* <li> You aren't banned.
|
|
* <li> The channel isn't +m
|
|
* <li> The channel isn't +n or you are on the channel.
|
|
* </ol>
|
|
*
|
|
* This function will optionally reveal a user on a delayed join channel if
|
|
* they are allowed to send to the channel.
|
|
*
|
|
* @param member The membership of the user
|
|
* @param reveal If true, the user will be "revealed" on a delayed
|
|
* joined channel.
|
|
*
|
|
* @returns True if the client can speak on the channel.
|
|
*/
|
|
int member_can_send_to_channel(struct Membership* member, int reveal)
|
|
{
|
|
assert(0 != member);
|
|
|
|
/* Do not check for users on other servers: This should be a
|
|
* temporary desynch, or maybe they are on an older server, but
|
|
* we do not want to send ERR_CANNOTSENDTOCHAN more than once.
|
|
*/
|
|
if (!MyUser(member->user))
|
|
{
|
|
if (IsDelayedJoin(member) && reveal)
|
|
RevealDelayedJoin(member);
|
|
return 1;
|
|
}
|
|
|
|
/* Discourage using the Apass to get op. They should use the Upass. */
|
|
if (IsChannelManager(member) && member->channel->mode.apass[0] &&
|
|
!feature_bool(FEAT_APASS_CANSEND))
|
|
return 0;
|
|
|
|
/* If you have voice or ops, you can speak. */
|
|
if (IsVoicedOrOpped(member))
|
|
return 1;
|
|
|
|
/*
|
|
* If it's moderated, and you aren't a privileged user, you can't
|
|
* speak.
|
|
*/
|
|
if (member->channel->mode.mode & MODE_MODERATED)
|
|
return 0;
|
|
|
|
/* Same as above but includes logged in users as priviledged too */
|
|
if (member->channel->mode.exmode & EXMODE_REGMODERATED && !IsAccount(member->user))
|
|
return 0;
|
|
|
|
/* If only IRC admins may join and you're not one, you can't speak. */
|
|
if (member->channel->mode.exmode & EXMODE_ADMINONLY && !IsAdmin(member->user))
|
|
return 0;
|
|
|
|
/* If only IRC operators may join and you're not one, you can't speak. */
|
|
if (member->channel->mode.exmode & EXMODE_OPERONLY && !IsAnOper(member->user))
|
|
return 0;
|
|
|
|
/* If only SSL users may join and you're not one, you can't speak. */
|
|
if (member->channel->mode.exmode & EXMODE_SSLONLY && !IsSSL(member->user))
|
|
return 0;
|
|
|
|
/* If only logged in users may join and you're not one, you can't speak. */
|
|
if (member->channel->mode.mode & MODE_REGONLY && !IsAccount(member->user))
|
|
return 0;
|
|
|
|
/* If you're banned then you can't speak either. */
|
|
if (is_banned(member, EBAN_QUIET) && !is_excepted(member, EBAN_QUIET))
|
|
return 0;
|
|
|
|
if (IsDelayedJoin(member) && reveal)
|
|
RevealDelayedJoin(member);
|
|
|
|
return 1;
|
|
}
|
|
|
|
/** Check if a client can send to a channel.
|
|
*
|
|
* Has the added check over member_can_send_to_channel() of servers can
|
|
* always speak.
|
|
*
|
|
* @param cptr The client to check
|
|
* @param chptr The channel to check
|
|
* @param reveal If the user should be revealed (see
|
|
* member_can_send_to_channel())
|
|
*
|
|
* @returns true if the client is allowed to speak on the channel, false
|
|
* otherwise
|
|
*
|
|
* @see member_can_send_to_channel()
|
|
*/
|
|
int client_can_send_to_channel(struct Client *cptr, struct Channel *chptr, int reveal)
|
|
{
|
|
struct Membership *member;
|
|
assert(0 != cptr);
|
|
/*
|
|
* Servers can always speak on channels.
|
|
*/
|
|
if (IsServer(cptr) || IsChannelService(cptr) || IsXtraOp(cptr))
|
|
return 1;
|
|
|
|
member = find_channel_member(cptr, chptr);
|
|
|
|
/*
|
|
* You can't speak if you're off channel, and it is +n (no external messages)
|
|
* or +m (moderated).
|
|
*/
|
|
if (!member) {
|
|
if ((chptr->mode.mode & (MODE_NOPRIVMSGS|MODE_MODERATED)) ||
|
|
((chptr->mode.exmode & EXMODE_ADMINONLY) && !IsAdmin(cptr)) ||
|
|
((chptr->mode.exmode & EXMODE_OPERONLY) && !IsAnOper(cptr)) ||
|
|
((chptr->mode.exmode & EXMODE_REGMODERATED) && !IsAccount(cptr)) ||
|
|
((chptr->mode.exmode & EXMODE_SSLONLY) && !IsSSL(cptr)) ||
|
|
((chptr->mode.mode & MODE_REGONLY) && !IsAccount(cptr)))
|
|
return 0;
|
|
else {
|
|
struct Ban *ban = NULL;
|
|
int isbanned = 0;
|
|
if ((ban = find_ban(cptr, chptr->banlist, EBAN_QUIET, 0))) {
|
|
if (ban->flags & BAN_EXTENDED) {
|
|
if ((ban->extban.flags & EBAN_QUIET) || !(ban->extban.flags & EBAN_ACTIVITY))
|
|
isbanned = 1;
|
|
} else
|
|
isbanned = 1;
|
|
}
|
|
return !(isbanned && !find_ban(cptr, chptr->exceptlist, EBAN_QUIET | EBAN_EXCEPTLIST, 0));
|
|
}
|
|
}
|
|
return member_can_send_to_channel(member, reveal);
|
|
}
|
|
|
|
/** Returns the name of a channel that prevents the user from changing nick.
|
|
* if a member and not (opped or voiced) and (banned or moderated), return
|
|
* the name of the first channel banned on.
|
|
*
|
|
* @param cptr The client
|
|
*
|
|
* @returns the name of the first channel banned on, or NULL if the user
|
|
* can change nicks.
|
|
*/
|
|
const char* find_no_nickchange_channel(struct Client* cptr)
|
|
{
|
|
if (MyUser(cptr)) {
|
|
struct Membership* member;
|
|
for (member = (cli_user(cptr))->channel; member;
|
|
member = member->next_channel) {
|
|
if (IsVoicedOrOpped(member))
|
|
continue;
|
|
if ((member->channel->mode.mode & MODE_MODERATED && feature_bool(FEAT_CHMODE_m_NONICKCHANGE))
|
|
|| (member->channel->mode.mode & MODE_REGONLY && !IsAccount(cptr) && feature_bool(FEAT_CHMODE_r_NONICKCHANGE))
|
|
|| (is_banned(member, EBAN_NICK) && !is_excepted(member, EBAN_NICK)))
|
|
return member->channel->chname;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
/** Helper to append a mode parameter to the parameter buffer.
|
|
* @param pbuf The parameter buffer.
|
|
* @param pos Pointer to current position in buffer.
|
|
* @param buflen Total buffer length.
|
|
* @param param The parameter string to append.
|
|
* @param prev_param Pointer to previous_parameter flag.
|
|
* @returns 1 if appended successfully, 0 if buffer too small.
|
|
*/
|
|
static int append_mode_param(char *pbuf, size_t *pos, size_t buflen,
|
|
const char *param, int *prev_param)
|
|
{
|
|
size_t len = strlen(param);
|
|
if (*pos + len + 2 < buflen) {
|
|
if (*prev_param)
|
|
pbuf[(*pos)++] = ' ';
|
|
memcpy(pbuf + *pos, param, len);
|
|
*pos += len;
|
|
pbuf[*pos] = '\0';
|
|
*prev_param = 1;
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/** Fill mbuf/pbuf with modes from chptr
|
|
* write the "simple" list of channel modes for channel chptr onto buffer mbuf
|
|
* with the parameters in pbuf as visible by cptr.
|
|
*
|
|
* This function will hide keys from non-op'd, non-server clients.
|
|
*
|
|
* @param cptr The client to generate the mode for.
|
|
* @param mbuf The buffer to write the modes into.
|
|
* @param pbuf The buffer to write the mode parameters into.
|
|
* @param buflen The length of the buffers.
|
|
* @param chptr The channel to get the modes from.
|
|
* @param member The membership of this client on this channel (or NULL
|
|
* if this client isn't on this channel)
|
|
*
|
|
*/
|
|
void channel_modes(struct Client *cptr, char *mbuf, char *pbuf, int buflen,
|
|
struct Channel *chptr, struct Membership *member)
|
|
{
|
|
int previous_parameter = 0;
|
|
size_t pbuf_pos = 0;
|
|
|
|
assert(0 != mbuf);
|
|
assert(0 != pbuf);
|
|
assert(0 != chptr);
|
|
|
|
*mbuf++ = '+';
|
|
if (chptr->mode.mode & MODE_SECRET)
|
|
*mbuf++ = 's';
|
|
else if (chptr->mode.mode & MODE_PRIVATE)
|
|
*mbuf++ = 'p';
|
|
if (chptr->mode.mode & MODE_MODERATED)
|
|
*mbuf++ = 'm';
|
|
if (chptr->mode.mode & MODE_TOPICLIMIT)
|
|
*mbuf++ = 't';
|
|
if (chptr->mode.mode & MODE_INVITEONLY)
|
|
*mbuf++ = 'i';
|
|
if (chptr->mode.mode & MODE_NOPRIVMSGS)
|
|
*mbuf++ = 'n';
|
|
if (chptr->mode.mode & MODE_REGONLY)
|
|
*mbuf++ = 'r';
|
|
if (chptr->mode.mode & MODE_DELJOINS)
|
|
*mbuf++ = 'D';
|
|
else if (MyUser(cptr) && (chptr->mode.mode & MODE_WASDELJOINS))
|
|
*mbuf++ = 'd';
|
|
if (chptr->mode.mode & MODE_REGISTERED)
|
|
*mbuf++ = 'R';
|
|
if (chptr->mode.exmode & EXMODE_ADMINONLY)
|
|
*mbuf++ = 'a';
|
|
if (chptr->mode.exmode & EXMODE_OPERONLY)
|
|
*mbuf++ = 'O';
|
|
if (chptr->mode.exmode & EXMODE_REGMODERATED)
|
|
*mbuf++ = 'M';
|
|
if (chptr->mode.exmode & EXMODE_NONOTICES)
|
|
*mbuf++ = 'N';
|
|
if (chptr->mode.exmode & EXMODE_PERSIST)
|
|
*mbuf++ = 'z';
|
|
if (chptr->mode.exmode & EXMODE_SSLONLY)
|
|
*mbuf++ = 'Z';
|
|
if (chptr->mode.exmode & EXMODE_NOQUITPARTS)
|
|
*mbuf++ = 'Q';
|
|
if (chptr->mode.exmode & EXMODE_NOCTCPS)
|
|
*mbuf++ = 'C';
|
|
if (chptr->mode.exmode & EXMODE_NOMULTITARG)
|
|
*mbuf++ = 'T';
|
|
if (chptr->mode.exmode & EXMODE_NOCOLOR)
|
|
*mbuf++ = 'c';
|
|
if (chptr->mode.exmode & EXMODE_STRIPCOLOR)
|
|
*mbuf++ = 'S';
|
|
if (chptr->mode.limit) {
|
|
*mbuf++ = 'l';
|
|
pbuf_pos = ircd_snprintf(0, pbuf, buflen, "%u", chptr->mode.limit);
|
|
previous_parameter = 1;
|
|
}
|
|
if (*chptr->mode.redir) {
|
|
*mbuf++ = 'L';
|
|
append_mode_param(pbuf, &pbuf_pos, buflen, chptr->mode.redir, &previous_parameter);
|
|
}
|
|
if (*chptr->mode.key) {
|
|
*mbuf++ = 'k';
|
|
if (is_chan_op(cptr, chptr) || IsServer(cptr) || IsOper(cptr)) {
|
|
append_mode_param(pbuf, &pbuf_pos, buflen, chptr->mode.key, &previous_parameter);
|
|
} else {
|
|
append_mode_param(pbuf, &pbuf_pos, buflen, "*", &previous_parameter);
|
|
}
|
|
}
|
|
if (*chptr->mode.apass && (IsOpLevels(cptr) || !IsServer(cptr))) {
|
|
*mbuf++ = 'A';
|
|
if (IsServer(cptr) || IsOper(cptr)) {
|
|
append_mode_param(pbuf, &pbuf_pos, buflen, chptr->mode.apass, &previous_parameter);
|
|
} else {
|
|
append_mode_param(pbuf, &pbuf_pos, buflen, "*", &previous_parameter);
|
|
}
|
|
}
|
|
if (*chptr->mode.upass && (IsOpLevels(cptr) || !IsServer(cptr))) {
|
|
*mbuf++ = 'U';
|
|
if (IsServer(cptr) || (member && IsChanOp(member) && OpLevel(member) == 0) || IsOper(cptr)) {
|
|
append_mode_param(pbuf, &pbuf_pos, buflen, chptr->mode.upass, &previous_parameter);
|
|
} else {
|
|
append_mode_param(pbuf, &pbuf_pos, buflen, "*", &previous_parameter);
|
|
}
|
|
}
|
|
*mbuf = '\0';
|
|
}
|
|
|
|
/** Compare two members oplevel
|
|
*
|
|
* @param mp1 Pointer to a pointer to a membership
|
|
* @param mp2 Pointer to a pointer to a membership
|
|
*
|
|
* @returns 0 if equal, -1 if mp1 is lower, +1 otherwise.
|
|
*
|
|
* Used for qsort(3).
|
|
*/
|
|
int compare_member_oplevel(const void *mp1, const void *mp2)
|
|
{
|
|
struct Membership const* member1 = *(struct Membership const**)mp1;
|
|
struct Membership const* member2 = *(struct Membership const**)mp2;
|
|
if (member1->oplevel == member2->oplevel)
|
|
return 0;
|
|
return (member1->oplevel < member2->oplevel) ? -1 : 1;
|
|
}
|
|
|
|
/* send "cptr" a full list of the modes for channel chptr.
|
|
*
|
|
* Sends a BURST line to cptr, bursting all the modes for the channel.
|
|
*
|
|
* @param cptr Client pointer
|
|
* @param chptr Channel pointer
|
|
*/
|
|
void send_channel_modes(struct Client *cptr, struct Channel *chptr)
|
|
{
|
|
/* The order in which modes are generated is now mandatory */
|
|
static unsigned int current_flags[8] =
|
|
{
|
|
0,
|
|
CHFL_VOICE,
|
|
CHFL_HALFOP,
|
|
CHFL_VOICE | CHFL_HALFOP,
|
|
CHFL_CHANOP,
|
|
CHFL_CHANOP | CHFL_VOICE,
|
|
CHFL_CHANOP | CHFL_HALFOP,
|
|
CHFL_CHANOP | CHFL_HALFOP | CHFL_VOICE
|
|
};
|
|
int first = 1;
|
|
int efirst = 1;
|
|
int full = 1;
|
|
int flag_cnt = 0;
|
|
int new_mode = 0;
|
|
size_t len;
|
|
struct Membership* member;
|
|
struct Ban* lp2;
|
|
struct Ban* lp3;
|
|
char modebuf[MODEBUFLEN];
|
|
char parabuf[MODEBUFLEN];
|
|
struct MsgBuf *mb;
|
|
int number_of_ops = 0;
|
|
int opped_members_index = 0;
|
|
struct Membership** opped_members = NULL;
|
|
int last_oplevel = 0;
|
|
int send_oplevels = 0;
|
|
|
|
assert(0 != cptr);
|
|
assert(0 != chptr);
|
|
|
|
if (IsLocalChannel(chptr->chname))
|
|
return;
|
|
|
|
member = chptr->members;
|
|
lp2 = chptr->banlist;
|
|
lp3 = chptr->exceptlist;
|
|
|
|
*modebuf = *parabuf = '\0';
|
|
channel_modes(cptr, modebuf, parabuf, sizeof(parabuf), chptr, 0);
|
|
|
|
for (first = 1; full; first = 0) /* Loop for multiple messages */
|
|
{
|
|
full = 0; /* Assume by default we get it
|
|
all in one message */
|
|
|
|
/* (Continued) prefix: "<Y> B <channel> <TS>" */
|
|
/* is there any better way we can do this? */
|
|
mb = msgq_make(&me, "%C " TOK_BURST " %H %Tu", &me, chptr,
|
|
chptr->creationtime);
|
|
|
|
if (first && modebuf[1]) /* Add simple modes (Aiklmnpstu)
|
|
if first message */
|
|
{
|
|
/* prefix: "<Y> B <channel> <TS>[ <modes>[ <params>]]" */
|
|
msgq_append(&me, mb, " %s", modebuf);
|
|
|
|
if (*parabuf)
|
|
msgq_append(&me, mb, " %s", parabuf);
|
|
}
|
|
|
|
/*
|
|
* Attach nicks, comma separated " nick[:modes],nick[:modes],..."
|
|
*
|
|
* First find all opless members.
|
|
* Run 2 times over all members, to group the members with
|
|
* and without voice together.
|
|
* Then run 2 times over all opped members (which are ordered
|
|
* by op-level) to also group voice and non-voice together.
|
|
*/
|
|
for (first = 1; flag_cnt < 8; new_mode = 1, ++flag_cnt)
|
|
{
|
|
while (member)
|
|
{
|
|
if (flag_cnt < 2 && IsChanOp(member))
|
|
{
|
|
/*
|
|
* The first loop (to find all non-voice/halfop/op), we count the ops.
|
|
* The second loop (to find all non-ops), store the ops
|
|
* in a dynamic array.
|
|
*/
|
|
if (flag_cnt == 0)
|
|
++number_of_ops;
|
|
else
|
|
opped_members[opped_members_index++] = member;
|
|
/* We also send oplevels if anyone is below the weakest level. */
|
|
if ((OpLevel(member) < MAXOPLEVEL) && IsOpLevels(cptr))
|
|
send_oplevels = 1;
|
|
}
|
|
/* Only handle the members with the flags that we are interested in. */
|
|
if ((member->status & CHFL_VOICED_OR_OPPED) == current_flags[flag_cnt])
|
|
{
|
|
if (msgq_bufleft(mb) < NUMNICKLEN + 4 + MAXOPLEVELDIGITS)
|
|
/* The 4 + MAXOPLEVELDIGITS is a possible ",:vh999". */
|
|
{
|
|
full = 1; /* Make sure we continue after
|
|
sending it so far */
|
|
/* Ensure the new BURST line contains the current
|
|
* ":mode", except when there is no mode yet. */
|
|
new_mode = (flag_cnt > 0) ? 1 : 0;
|
|
break; /* Do not add this member to this message */
|
|
}
|
|
msgq_append(&me, mb, "%c%C", first ? ' ' : ',', member->user);
|
|
first = 0; /* From now on, use commas to add new nicks */
|
|
|
|
/*
|
|
* Do we have a nick with a new mode ?
|
|
* Or are we starting a new BURST line?
|
|
*/
|
|
if (new_mode)
|
|
{
|
|
/*
|
|
* This means we are at the _first_ member that has only
|
|
* voice, or the first member that has only ops, or the
|
|
* first member that has voice and ops (so we get here
|
|
* at most three times, plus once for every start of
|
|
* a continued BURST line where only these modes is current.
|
|
* In the two cases where the current mode includes ops,
|
|
* we need to add the _absolute_ value of the oplevel to the mode.
|
|
*/
|
|
char tbuf[4 + MAXOPLEVELDIGITS] = ":";
|
|
int loc = 1;
|
|
|
|
if (HasVoice(member)) /* flag_cnt == 1, 3, 5 and 7 */
|
|
tbuf[loc++] = 'v';
|
|
if (IsHalfOp(member)) /* flag_cnt == 2, 3, 6 and 7 */
|
|
tbuf[loc++] = 'h';
|
|
if (IsChanOp(member)) /* flag_cnt == 4, 5, 6 and 7 */
|
|
{
|
|
/* append the absolute value of the oplevel */
|
|
if (send_oplevels)
|
|
loc += ircd_snprintf(0, tbuf + loc, sizeof(tbuf) - loc, "%u", last_oplevel = member->oplevel);
|
|
else
|
|
tbuf[loc++] = 'o';
|
|
}
|
|
tbuf[loc] = '\0';
|
|
msgq_append(&me, mb, tbuf);
|
|
new_mode = 0;
|
|
}
|
|
else if (send_oplevels && flag_cnt > 3 && last_oplevel != member->oplevel)
|
|
{
|
|
/*
|
|
* This can't be the first member of a (continued) BURST
|
|
* message because then either flag_cnt == 0 or new_mode == 1
|
|
* Now we need to append the incremental value of the oplevel.
|
|
*/
|
|
char tbuf[2 + MAXOPLEVELDIGITS];
|
|
ircd_snprintf(0, tbuf, sizeof(tbuf), ":%u", member->oplevel - last_oplevel);
|
|
last_oplevel = member->oplevel;
|
|
msgq_append(&me, mb, tbuf);
|
|
}
|
|
}
|
|
/* Go to the next `member'. */
|
|
if (flag_cnt < 4)
|
|
member = member->next_member;
|
|
else
|
|
member = opped_members[++opped_members_index];
|
|
}
|
|
if (full)
|
|
break;
|
|
|
|
/* Point `member' at the start of the list again. */
|
|
if (flag_cnt == 0)
|
|
{
|
|
member = chptr->members;
|
|
/* Now, after one loop, we know the number of ops and can
|
|
* allocate the dynamic array with pointer to the ops. */
|
|
opped_members = (struct Membership**)
|
|
MyMalloc((number_of_ops + 1) * sizeof(struct Membership*));
|
|
opped_members[number_of_ops] = NULL; /* Needed for loop termination */
|
|
}
|
|
else if (flag_cnt < 3)
|
|
{
|
|
member = chptr->members;
|
|
/* At the end of the second loop, sort the opped members with
|
|
* increasing op-level, so that we will output them in the
|
|
* correct order (and all op-level increments stay positive) */
|
|
if (flag_cnt == 1)
|
|
qsort(opped_members, number_of_ops,
|
|
sizeof(struct Membership*), compare_member_oplevel);
|
|
}
|
|
else
|
|
{
|
|
/* The third and fourth loop run only over the opped members. */
|
|
member = opped_members[(opped_members_index = 0)];
|
|
}
|
|
|
|
} /* loop over 0,+v,+h,+o,+ov,+oh,+hv,+ohv */
|
|
|
|
if (!full)
|
|
{
|
|
/*
|
|
* This may look unnecesary, but as long as it's here we can be
|
|
* sure first is set to 2 even if the first for loop doesn't
|
|
* execute at all.
|
|
*/
|
|
first = 2;
|
|
/* Attach all bans, space separated " :%ban ban ..." */
|
|
for (first = 2; lp2; lp2 = lp2->next)
|
|
{
|
|
len = strlen(lp2->banstr);
|
|
if (msgq_bufleft(mb) < len + 1 + first)
|
|
/* The +1 stands for the added ' '.
|
|
* The +first stands for the added ":%".
|
|
*/
|
|
{
|
|
full = 1;
|
|
break;
|
|
}
|
|
msgq_append(&me, mb, " %s%s", first ? ":%" : "",
|
|
lp2->banstr);
|
|
first = 0;
|
|
}
|
|
|
|
if (feature_bool(FEAT_EXCEPTS)) {
|
|
/* Attach all excepts, space seperated " :% ban ~ except ..." */
|
|
for (efirst = 3; lp3; lp3 = lp3->next)
|
|
{
|
|
len = strlen(lp3->banstr);
|
|
if (msgq_bufleft(mb) < len + 1 + efirst + first)
|
|
/* The +1 stands for the added ' '.
|
|
* The +efirst stands for the added " ~ ".
|
|
* The +first stands for the added ":%".
|
|
*/
|
|
{
|
|
full = 1;
|
|
break;
|
|
}
|
|
msgq_append(&me, mb, " %s%s%s", first ? ":% " : "",
|
|
efirst ? "~ " : "", lp3->banstr);
|
|
first = 0;
|
|
efirst = 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
send_buffer(cptr, mb, 0); /* Send this message */
|
|
msgq_clean(mb);
|
|
} /* Continue when there was something
|
|
that didn't fit (full==1) */
|
|
if (opped_members)
|
|
MyFree(opped_members);
|
|
if (feature_bool(FEAT_TOPIC_BURST) && (chptr->topic[0] != '\0'))
|
|
sendcmdto_one(&me, CMD_TOPIC, cptr, "%H %s %Tu %Tu :%s", chptr,
|
|
chptr->topic_nick, chptr->creationtime,
|
|
chptr->topic_time, chptr->topic);
|
|
}
|
|
|
|
/** Canonify a mask.
|
|
* pretty_mask
|
|
*
|
|
* @author Carlo Wood (Run),
|
|
* 05 Oct 1998.
|
|
*
|
|
* When the nick is longer then NICKLEN, it is cut off (its an error of course).
|
|
* When the user name or host name are too long (USERLEN and HOSTLEN
|
|
* respectively) then they are cut off at the start with a '*'.
|
|
*
|
|
* The following transformations are made:
|
|
*
|
|
* 1) xxx -> nick!*@*
|
|
* 2) xxx.xxx -> *!*\@host
|
|
* 3) xxx\!yyy -> nick!user\@*
|
|
* 4) xxx\@yyy -> *!user\@host
|
|
* 5) xxx!yyy\@zzz -> nick!user\@host
|
|
*
|
|
* @param mask The uncanonified mask.
|
|
* @returns The updated mask in a static buffer.
|
|
*/
|
|
char *pretty_mask(char *mask)
|
|
{
|
|
static char star[2] = { '*', 0 };
|
|
static char retmask[NICKLEN + USERLEN + HOSTLEN + 3];
|
|
char *last_dot = NULL;
|
|
char *ptr;
|
|
|
|
/* Case 1: default */
|
|
char *nick = mask;
|
|
char *user = star;
|
|
char *host = star;
|
|
|
|
/* Do a _single_ pass through the characters of the mask: */
|
|
for (ptr = mask; *ptr; ++ptr)
|
|
{
|
|
if (*ptr == '!')
|
|
{
|
|
/* Case 3 or 5: Found first '!' (without finding a '@' yet) */
|
|
user = ++ptr;
|
|
host = star;
|
|
}
|
|
else if (*ptr == '@')
|
|
{
|
|
/* Case 4: Found last '@' (without finding a '!' yet) */
|
|
nick = star;
|
|
user = mask;
|
|
host = ++ptr;
|
|
}
|
|
else if (*ptr == '.' || *ptr == ':')
|
|
{
|
|
/* Case 2: Found character specific to IP or hostname (without
|
|
* finding a '!' or '@' yet) */
|
|
last_dot = ptr;
|
|
continue;
|
|
}
|
|
else
|
|
continue;
|
|
for (; *ptr; ++ptr)
|
|
{
|
|
if (*ptr == '@')
|
|
{
|
|
/* Case 4 or 5: Found last '@' */
|
|
host = ptr + 1;
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
if (user == star && last_dot)
|
|
{
|
|
/* Case 2: */
|
|
nick = star;
|
|
user = star;
|
|
host = mask;
|
|
}
|
|
/* Check lengths */
|
|
if (nick != star)
|
|
{
|
|
char *nick_end = (user != star) ? user - 1 : ptr;
|
|
if (nick_end - nick > NICKLEN)
|
|
nick[NICKLEN] = 0;
|
|
*nick_end = 0;
|
|
}
|
|
if (user != star)
|
|
{
|
|
char *user_end = (host != star) ? host - 1 : ptr;
|
|
if (user_end - user > USERLEN)
|
|
{
|
|
user = user_end - USERLEN;
|
|
*user = '*';
|
|
}
|
|
*user_end = 0;
|
|
}
|
|
if (host != star && ptr - host > HOSTLEN)
|
|
{
|
|
host = ptr - HOSTLEN;
|
|
*host = '*';
|
|
}
|
|
ircd_snprintf(0, retmask, sizeof(retmask), "%s!%s@%s", nick, user, host);
|
|
return retmask;
|
|
}
|
|
|
|
static struct ExtBanInfo extban_list[] = {
|
|
{'q', EBAN_QUIET, FEAT_EXTBAN_q},
|
|
{'n', EBAN_NICK, FEAT_EXTBAN_n},
|
|
{'j', EBAN_NOCHILD | EBAN_JOIN, FEAT_EXTBAN_j},
|
|
{'a', EBAN_NOCHILD | EBAN_ACCOUNT, FEAT_EXTBAN_a},
|
|
{'c', EBAN_NOCHILD | EBAN_CHANNEL, FEAT_EXTBAN_c},
|
|
{'r', EBAN_NOCHILD | EBAN_REALNAME, FEAT_EXTBAN_r},
|
|
{'m', EBAN_NOCHILD | EBAN_MARK, FEAT_EXTBAN_m},
|
|
{'M', EBAN_NOCHILD | EBAN_MARKUA, FEAT_EXTBAN_M},
|
|
{'!', EBAN_NEGATEMASK, 0},
|
|
{0, 0, 0}
|
|
};
|
|
|
|
int check_extban_feats(struct ExtBan *extban) {
|
|
int i;
|
|
|
|
if (!extban || !extban->flags)
|
|
return -1;
|
|
|
|
if (!feature_bool(FEAT_EXTBANS))
|
|
return 0;
|
|
|
|
for (i = 0; extban_list[i].banchar; i++)
|
|
{
|
|
if (((extban->flags & EBAN_TYPES) & (extban_list[i].flags & EBAN_TYPES)) &&
|
|
!feature_bool(extban_list[i].feat)) {
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
int get_extban_flags(char extban) {
|
|
int i;
|
|
|
|
for (i = 0; extban_list[i].banchar; i++)
|
|
{
|
|
if (extban_list[i].banchar == extban)
|
|
return extban_list[i].flags;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int parse_extban(char *ban, struct ExtBan *extban, int level, char *prefix) {
|
|
char *b = ban;
|
|
int flags = 0;
|
|
int r = 0;
|
|
|
|
if (level >= 5)
|
|
return -1;
|
|
|
|
if (!*b)
|
|
return -1;
|
|
|
|
if (*b != EXTBANPREFIX)
|
|
return 0;
|
|
|
|
prefix[extban->prefixlen++] = *b++;
|
|
|
|
if (!*b)
|
|
return -1;
|
|
|
|
flags = get_extban_flags(*b);
|
|
extban->flags |= flags;
|
|
prefix[extban->prefixlen++] = *b++;
|
|
|
|
if (flags == 0)
|
|
return -1;
|
|
|
|
if (!*b)
|
|
return 0;
|
|
|
|
if (flags & EBAN_NEGATEMASK) {
|
|
flags = get_extban_flags(*b);
|
|
if (flags != 0) {
|
|
extban->flags |= flags;
|
|
prefix[extban->prefixlen++] = *b++;
|
|
}
|
|
}
|
|
|
|
extban->delimiter = *b;
|
|
prefix[extban->prefixlen++] = *b++;
|
|
|
|
if (!*b)
|
|
return 0;
|
|
|
|
if (extban->flags & EBAN_NOCHILD)
|
|
ircd_strncpy(extban->mask, b, sizeof(extban->mask));
|
|
else {
|
|
r = parse_extban(b, extban, level + 1, prefix);
|
|
if (r == 0)
|
|
ircd_strncpy(extban->mask, b, sizeof(extban->mask));
|
|
else
|
|
return r;
|
|
}
|
|
|
|
if (!(extban->flags & EBAN_MASKTYPE)) {
|
|
char *sep;
|
|
ircd_strncpy(extban->mask, collapse(pretty_mask(extban->mask)), sizeof(extban->mask));
|
|
sep = strrchr(extban->mask, '@');
|
|
extban->nu_len = sep - extban->mask;
|
|
}
|
|
|
|
prefix[extban->prefixlen] = '\0';
|
|
extban->flags &= ~EBAN_NOCHILD;
|
|
|
|
return 1;
|
|
}
|
|
|
|
char *pretty_extmask(char *mask)
|
|
{
|
|
static char retmask[NICKLEN + USERLEN + HOSTLEN + 3];
|
|
char prefix[BUFSIZE+1];
|
|
struct ExtBan extban;
|
|
int r = 0;
|
|
|
|
memset(&extban, 0, sizeof(struct ExtBan));
|
|
|
|
r = parse_extban(mask, &extban, 0, (char *)&prefix);
|
|
if (r == 0)
|
|
return collapse(pretty_mask(mask));
|
|
else if (r < 0)
|
|
return NULL;
|
|
|
|
ircd_snprintf(0, retmask, NICKLEN+USERLEN+HOSTLEN+3, "%s%s", prefix, extban.mask);
|
|
|
|
return retmask;
|
|
}
|
|
|
|
/** send a banlist to a client for a channel
|
|
*
|
|
* @param cptr Client to send the banlist to.
|
|
* @param chptr Channel whose banlist to send.
|
|
*/
|
|
static void send_ban_list(struct Client* cptr, struct Channel* chptr)
|
|
{
|
|
struct Ban* lp;
|
|
|
|
assert(0 != cptr);
|
|
assert(0 != chptr);
|
|
|
|
for (lp = chptr->banlist; lp; lp = lp->next)
|
|
send_reply(cptr, RPL_BANLIST, chptr->chname, lp->banstr,
|
|
lp->who, lp->when);
|
|
|
|
send_reply(cptr, RPL_ENDOFBANLIST, chptr->chname);
|
|
}
|
|
|
|
/** send a exceptlist to a client for a channel
|
|
*
|
|
* @param cptr Client to send the exceptlist to.
|
|
* @param chptr Channel whose exceptlist to send.
|
|
*/
|
|
static void send_except_list(struct Client* cptr, struct Channel* chptr)
|
|
{
|
|
struct Ban* lp;
|
|
|
|
assert(0 != cptr);
|
|
assert(0 != chptr);
|
|
|
|
for (lp = chptr->exceptlist; lp; lp = lp->next)
|
|
send_reply(cptr, RPL_EXCEPTLIST, chptr->chname, lp->banstr,
|
|
lp->who, lp->when);
|
|
|
|
send_reply(cptr, RPL_ENDOFEXCEPTLIST, chptr->chname);
|
|
}
|
|
|
|
int SetAutoChanModes(struct Channel *chptr)
|
|
{
|
|
static int chan_flags[] = {
|
|
MODE_INVITEONLY, 'i',
|
|
MODE_MODERATED, 'm',
|
|
MODE_NOPRIVMSGS, 'n',
|
|
MODE_PRIVATE, 'p',
|
|
MODE_SECRET, 's',
|
|
MODE_TOPICLIMIT, 't',
|
|
MODE_REGONLY, 'r',
|
|
MODE_DELJOINS, 'D',
|
|
MODE_WASDELJOINS, 'd',
|
|
/* MODE_REGISTERED, 'R', */
|
|
0, 0
|
|
};
|
|
|
|
static int chan_exflags[] = {
|
|
EXMODE_REGMODERATED, 'M',
|
|
EXMODE_NONOTICES, 'N',
|
|
EXMODE_SSLONLY, 'Z',
|
|
EXMODE_NOQUITPARTS, 'Q',
|
|
EXMODE_NOCTCPS, 'C',
|
|
EXMODE_NOMULTITARG, 'T',
|
|
EXMODE_NOCOLOR, 'c',
|
|
EXMODE_STRIPCOLOR, 'S',
|
|
0, 0
|
|
};
|
|
unsigned int *flag_p;
|
|
unsigned int t_mode;
|
|
unsigned int t_exmode;
|
|
const char *modestr;
|
|
|
|
t_mode = 0;
|
|
|
|
assert(0 != chptr);
|
|
|
|
if (!feature_bool(FEAT_AUTOCHANMODES) || !feature_str(FEAT_AUTOCHANMODES_LIST) ||
|
|
strlen(feature_str(FEAT_AUTOCHANMODES_LIST)) <= 1)
|
|
return 0;
|
|
|
|
modestr = feature_str(FEAT_AUTOCHANMODES_LIST);
|
|
|
|
for (; *modestr; modestr++) {
|
|
for (flag_p = (unsigned int*)chan_flags; flag_p[0];
|
|
flag_p += 2) /* look up flag */
|
|
if (flag_p[1] == *modestr)
|
|
break;
|
|
|
|
if (!flag_p[0]) /* didn't find it */
|
|
continue;
|
|
|
|
t_mode |= flag_p[0];
|
|
|
|
} /* for (; *modestr; modestr++) { */
|
|
|
|
if (t_mode != 0)
|
|
chptr->mode.mode = t_mode;
|
|
|
|
t_exmode = 0;
|
|
modestr = feature_str(FEAT_AUTOCHANMODES_LIST);
|
|
|
|
for (; *modestr; modestr++) {
|
|
for (flag_p = (unsigned int*)chan_exflags; flag_p[0];
|
|
flag_p += 2) /* look up flag */
|
|
if (flag_p[1] == *modestr)
|
|
break;
|
|
|
|
if (!flag_p[0]) /* didn't find it */
|
|
continue;
|
|
|
|
t_exmode |= flag_p[0];
|
|
|
|
} /* for (; *modestr; modestr++) { */
|
|
|
|
if (t_exmode != 0)
|
|
chptr->mode.exmode = t_exmode;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/** Get a channel block, creating if necessary.
|
|
* Get Channel block for chname (and allocate a new channel
|
|
* block, if it didn't exists before).
|
|
*
|
|
* @param cptr Client joining the channel.
|
|
* @param chname The name of the channel to join.
|
|
* @param flag set to CGT_CREATE to create the channel if it doesn't
|
|
* exist
|
|
*
|
|
* @returns NULL if the channel is invalid, doesn't exist and CGT_CREATE
|
|
* wasn't specified or a pointer to the channel structure
|
|
*/
|
|
struct Channel *get_channel(struct Client *cptr, char *chname, ChannelGetType flag)
|
|
{
|
|
struct Channel *chptr;
|
|
int len;
|
|
|
|
if (EmptyString(chname))
|
|
return NULL;
|
|
|
|
len = strlen(chname);
|
|
if (MyUser(cptr) && len > CHANNELLEN)
|
|
{
|
|
len = CHANNELLEN;
|
|
*(chname + CHANNELLEN) = '\0';
|
|
}
|
|
if ((chptr = FindChannel(chname)))
|
|
return (chptr);
|
|
if (flag == CGT_CREATE)
|
|
{
|
|
chptr = (struct Channel*) MyMalloc(sizeof(struct Channel) + len);
|
|
assert(0 != chptr);
|
|
++UserStats.channels;
|
|
memset(chptr, 0, sizeof(struct Channel));
|
|
strcpy(chptr->chname, chname);
|
|
if (GlobalChannelList)
|
|
GlobalChannelList->prev = chptr;
|
|
chptr->prev = NULL;
|
|
chptr->next = GlobalChannelList;
|
|
chptr->creationtime = MyUser(cptr) ? TStime() : (time_t) 0;
|
|
if (feature_bool(FEAT_AUTOCHANMODES) && feature_str(FEAT_AUTOCHANMODES_LIST) &&
|
|
(strlen(feature_str(FEAT_AUTOCHANMODES_LIST)) > 0) && MyUser(cptr))
|
|
SetAutoChanModes(chptr);
|
|
GlobalChannelList = chptr;
|
|
hAddChannel(chptr);
|
|
}
|
|
return chptr;
|
|
}
|
|
|
|
/** invite a user to a channel.
|
|
*
|
|
* Adds an invite for a user to a channel. Limits the number of invites
|
|
* to FEAT_MAXCHANNELSPERUSER. Does not sent notification to the user.
|
|
*
|
|
* @param cptr The client to be invited.
|
|
* @param chptr The channel to be invited to.
|
|
*/
|
|
void add_invite(struct Client *cptr, struct Channel *chptr)
|
|
{
|
|
struct SLink *inv, **tmp;
|
|
|
|
del_invite(cptr, chptr);
|
|
/*
|
|
* Delete last link in chain if the list is max length
|
|
*/
|
|
assert(list_length((cli_user(cptr))->invited) == (cli_user(cptr))->invites);
|
|
if ((cli_user(cptr))->invites >= get_client_maxchans(cptr))
|
|
del_invite(cptr, (cli_user(cptr))->invited->value.chptr);
|
|
/*
|
|
* Add client to channel invite list
|
|
*/
|
|
inv = make_link();
|
|
inv->value.cptr = cptr;
|
|
inv->next = chptr->invites;
|
|
chptr->invites = inv;
|
|
/*
|
|
* Add channel to the end of the client invite list
|
|
*/
|
|
for (tmp = &((cli_user(cptr))->invited); *tmp; tmp = &((*tmp)->next));
|
|
inv = make_link();
|
|
inv->value.chptr = chptr;
|
|
inv->next = NULL;
|
|
(*tmp) = inv;
|
|
(cli_user(cptr))->invites++;
|
|
}
|
|
|
|
/** Delete an invite
|
|
* Delete Invite block from channel invite list and client invite list
|
|
*
|
|
* @param cptr Client pointer
|
|
* @param chptr Channel pointer
|
|
*/
|
|
void del_invite(struct Client *cptr, struct Channel *chptr)
|
|
{
|
|
struct SLink **inv, *tmp;
|
|
|
|
for (inv = &(chptr->invites); (tmp = *inv); inv = &tmp->next)
|
|
if (tmp->value.cptr == cptr)
|
|
{
|
|
*inv = tmp->next;
|
|
free_link(tmp);
|
|
tmp = 0;
|
|
(cli_user(cptr))->invites--;
|
|
break;
|
|
}
|
|
|
|
for (inv = &((cli_user(cptr))->invited); (tmp = *inv); inv = &tmp->next)
|
|
if (tmp->value.chptr == chptr)
|
|
{
|
|
*inv = tmp->next;
|
|
free_link(tmp);
|
|
tmp = 0;
|
|
break;
|
|
}
|
|
}
|
|
|
|
/** @page zombie Explanation of Zombies
|
|
*
|
|
* Synopsis:
|
|
*
|
|
* A channel member is turned into a zombie when he is kicked from a
|
|
* channel but his server has not acknowledged the kick. Servers that
|
|
* see the member as a zombie can accept actions he performed before
|
|
* being kicked, without allowing chanop operations from outsiders or
|
|
* desyncing the network.
|
|
*
|
|
* Consider:
|
|
* <pre>
|
|
* client
|
|
* |
|
|
* c
|
|
* |
|
|
* X --a--> A --b--> B --d--> D
|
|
* |
|
|
* who
|
|
* </pre>
|
|
*
|
|
* Where `who' is being KICK-ed by a "KICK" message received by server 'A'
|
|
* via 'a', or on server 'B' via either 'b' or 'c', or on server D via 'd'.
|
|
*
|
|
* a) On server A : set CHFL_ZOMBIE for `who' (lp) and pass on the KICK.
|
|
* Remove the user immediately when no users are left on the channel.
|
|
* b) On server B : remove the user (who/lp) from the channel, send a
|
|
* PART upstream (to A) and pass on the KICK.
|
|
* c) KICKed by `client'; On server B : remove the user (who/lp) from the
|
|
* channel, and pass on the KICK.
|
|
* d) On server D : remove the user (who/lp) from the channel, and pass on
|
|
* the KICK.
|
|
*
|
|
* Note:
|
|
* - Setting the ZOMBIE flag never hurts, we either remove the
|
|
* client after that or we don't.
|
|
* - The KICK message was already passed on, as should be in all cases.
|
|
* - `who' is removed in all cases except case a) when users are left.
|
|
* - A PART is only sent upstream in case b).
|
|
*
|
|
* 2 aug 97:
|
|
* <pre>
|
|
* 6
|
|
* |
|
|
* 1 --- 2 --- 3 --- 4 --- 5
|
|
* | |
|
|
* kicker who
|
|
* </pre>
|
|
*
|
|
* We also need to turn 'who' into a zombie on servers 1 and 6,
|
|
* because a KICK from 'who' (kicking someone else in that direction)
|
|
* can arrive there afterward - which should not be bounced itself.
|
|
* Therefore case a) also applies for servers 1 and 6.
|
|
*
|
|
* --Run
|
|
*/
|
|
|
|
/** Turn a user on a channel into a zombie
|
|
* This function turns a user into a zombie (see \ref zombie)
|
|
*
|
|
* @param member The structure representing this user on this channel.
|
|
* @param who The client that is being kicked.
|
|
* @param cptr The connection the kick came from.
|
|
* @param sptr The client that is doing the kicking.
|
|
* @param chptr The channel the user is being kicked from.
|
|
*/
|
|
void make_zombie(struct Membership* member, struct Client* who,
|
|
struct Client* cptr, struct Client* sptr, struct Channel* chptr)
|
|
{
|
|
assert(0 != member);
|
|
assert(0 != who);
|
|
assert(0 != cptr);
|
|
assert(0 != chptr);
|
|
|
|
/* Default for case a): */
|
|
SetZombie(member);
|
|
|
|
/* Case b) or c) ?: */
|
|
if (MyUser(who)) /* server 4 */
|
|
{
|
|
if (IsServer(cptr)) /* Case b) ? */
|
|
sendcmdto_one(who, CMD_PART, cptr, "%H", chptr);
|
|
remove_user_from_channel(who, chptr);
|
|
return;
|
|
}
|
|
if (cli_from(who) == cptr) /* True on servers 1, 5 and 6 */
|
|
{
|
|
struct Client *acptr = IsServer(sptr) ? sptr : (cli_user(sptr))->server;
|
|
for (; acptr != &me; acptr = (cli_serv(acptr))->up)
|
|
if (acptr == (cli_user(who))->server) /* Case d) (server 5) */
|
|
{
|
|
remove_user_from_channel(who, chptr);
|
|
return;
|
|
}
|
|
}
|
|
|
|
/* Case a) (servers 1, 2, 3 and 6) */
|
|
if (channel_all_zombies(chptr))
|
|
remove_user_from_channel(who, chptr);
|
|
|
|
/* XXX Can't actually call Debug here; if the channel is all zombies,
|
|
* chptr will no longer exist when we get here.
|
|
Debug((DEBUG_INFO, "%s is now a zombie on %s", who->name, chptr->chname));
|
|
*/
|
|
}
|
|
|
|
/** returns the number of zombies on a channel
|
|
* @param chptr Channel to count zombies in.
|
|
*
|
|
* @returns The number of zombies on the channel.
|
|
*/
|
|
int number_of_zombies(struct Channel *chptr)
|
|
{
|
|
struct Membership* member;
|
|
int count = 0;
|
|
|
|
assert(0 != chptr);
|
|
for (member = chptr->members; member; member = member->next_member) {
|
|
if (IsZombie(member))
|
|
++count;
|
|
}
|
|
return count;
|
|
}
|
|
|
|
/** Concatenate some strings together.
|
|
* This helper function builds an argument string in strptr, consisting
|
|
* of the original string, a space, and str1 and str2 concatenated (if,
|
|
* of course, str2 is not NULL)
|
|
*
|
|
* @param strptr The buffer to concatenate into
|
|
* @param strptr_i modified offset to the position to modify
|
|
* @param str1 The string to concatenate from.
|
|
* @param str2 The second string to contatenate from.
|
|
* @param c Charactor to separate the string from str1 and str2.
|
|
*/
|
|
static void
|
|
build_string(char *strptr, int *strptr_i, const char *str1,
|
|
const char *str2, char c)
|
|
{
|
|
if (c)
|
|
strptr[(*strptr_i)++] = c;
|
|
|
|
while (*str1)
|
|
strptr[(*strptr_i)++] = *(str1++);
|
|
|
|
if (str2)
|
|
while (*str2)
|
|
strptr[(*strptr_i)++] = *(str2++);
|
|
|
|
strptr[(*strptr_i)] = '\0';
|
|
}
|
|
|
|
/** Check a channel for join-delayed members.
|
|
* @param[in] chan Channel to search.
|
|
* @return Non-zero if any members are join-delayed; false if none are.
|
|
*/
|
|
static int
|
|
find_delayed_joins(const struct Channel *chan)
|
|
{
|
|
const struct Membership *memb;
|
|
for (memb = chan->members; memb; memb = memb->next_member)
|
|
if (IsDelayedJoin(memb))
|
|
return 1;
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
show_delayed_joins(const struct Channel *chan)
|
|
{
|
|
struct Membership *memb;
|
|
for (memb = chan->members; memb; memb = memb->next_member)
|
|
if (IsDelayedJoin(memb))
|
|
RevealDelayedJoin(memb);
|
|
}
|
|
|
|
/** Flush out the modes
|
|
* This is the workhorse of our ModeBuf suite; this actually generates the
|
|
* output MODE commands, HACK notices, or whatever. It's pretty complicated.
|
|
*
|
|
* @param mbuf The mode buffer to flush
|
|
* @param all If true, flush all modes, otherwise leave partial modes in the
|
|
* buffer.
|
|
*
|
|
* @returns 0
|
|
*/
|
|
static int
|
|
modebuf_flush_int(struct ModeBuf *mbuf, int all)
|
|
{
|
|
/* we only need the flags that don't take args right now */
|
|
static int flags[] = {
|
|
/* MODE_CHANOP, 'o', */
|
|
/* MODE_HALFOP, 'h', */
|
|
/* MODE_VOICE, 'v', */
|
|
MODE_PRIVATE, 'p',
|
|
MODE_SECRET, 's',
|
|
MODE_MODERATED, 'm',
|
|
MODE_TOPICLIMIT, 't',
|
|
MODE_INVITEONLY, 'i',
|
|
MODE_NOPRIVMSGS, 'n',
|
|
MODE_REGONLY, 'r',
|
|
MODE_DELJOINS, 'D',
|
|
MODE_REGISTERED, 'R',
|
|
/* MODE_KEY, 'k', */
|
|
/* MODE_BAN, 'b', */
|
|
/* MODE_EXCEPT, 'e', */
|
|
MODE_LIMIT, 'l',
|
|
MODE_REDIRECT, 'L',
|
|
/* MODE_APASS, 'A', */
|
|
/* MODE_UPASS, 'U', */
|
|
0x0, 0x0
|
|
};
|
|
static int exflags[] = {
|
|
EXMODE_ADMINONLY, 'a',
|
|
EXMODE_OPERONLY, 'O',
|
|
EXMODE_REGMODERATED, 'M',
|
|
EXMODE_NONOTICES, 'N',
|
|
EXMODE_PERSIST, 'z',
|
|
EXMODE_SSLONLY, 'Z',
|
|
EXMODE_NOQUITPARTS, 'Q',
|
|
EXMODE_NOCTCPS, 'C',
|
|
EXMODE_NOMULTITARG, 'T',
|
|
EXMODE_NOCOLOR, 'c',
|
|
EXMODE_STRIPCOLOR, 'S',
|
|
0x0, 0x0
|
|
};
|
|
static int local_flags[] = {
|
|
MODE_WASDELJOINS, 'd',
|
|
0x0, 0x0
|
|
};
|
|
int i;
|
|
int *flag_p;
|
|
|
|
struct Client *app_source; /* where the MODE appears to come from */
|
|
|
|
char addbuf[40], addbuf_local[40]; /* accumulates +psmtinaO, etc. */
|
|
int addbuf_i = 0, addbuf_local_i = 0;
|
|
char rembuf[40], rembuf_local[40]; /* accumulates -psmtinaO, etc. */
|
|
int rembuf_i = 0, rembuf_local_i = 0;
|
|
char *bufptr; /* we make use of indirection to simplify the code */
|
|
int *bufptr_i;
|
|
|
|
char addstr[BUFSIZE]; /* accumulates MODE parameters to add */
|
|
char addstro[BUFSIZE]; /* accumulates MODE parameters to add */
|
|
int addstr_i;
|
|
int addstro_i;
|
|
char remstr[BUFSIZE]; /* accumulates MODE parameters to remove */
|
|
int remstr_i;
|
|
char *strptr, *strptro; /* more indirection to simplify the code */
|
|
int *strptr_i, *strptro_i;
|
|
|
|
int totalbuflen = BUFSIZE - 200; /* fuzz factor -- don't overrun buffer! */
|
|
int tmp;
|
|
|
|
char limitbuf[20]; /* convert limits to strings */
|
|
|
|
unsigned int limitdel = MODE_LIMIT;
|
|
unsigned int redirdel = MODE_REDIRECT;
|
|
|
|
assert(0 != mbuf);
|
|
|
|
/* If the ModeBuf is empty, we have nothing to do */
|
|
if (mbuf->mb_add == 0 && mbuf->mb_rem == 0 &&
|
|
mbuf->mb_exadd == 0 && mbuf->mb_exrem == 0 && mbuf->mb_count == 0)
|
|
return 0;
|
|
|
|
/* Ok, if we were given the OPMODE flag, or its a server, hide the source.
|
|
*/
|
|
if (feature_bool(FEAT_HIS_MODEWHO) &&
|
|
(mbuf->mb_dest & MODEBUF_DEST_OPMODE ||
|
|
IsServer(mbuf->mb_source) ||
|
|
IsMe(mbuf->mb_source)))
|
|
app_source = &his;
|
|
else
|
|
app_source = mbuf->mb_source;
|
|
|
|
/* Must be set if going -D and some clients are hidden */
|
|
if ((mbuf->mb_rem & MODE_DELJOINS)
|
|
&& !(mbuf->mb_channel->mode.mode & (MODE_DELJOINS | MODE_WASDELJOINS))) {
|
|
if (!feature_bool(FEAT_JOIN_ON_REMOVEDELAY) && find_delayed_joins(mbuf->mb_channel)) {
|
|
mbuf->mb_channel->mode.mode |= MODE_WASDELJOINS;
|
|
mbuf->mb_add |= MODE_WASDELJOINS;
|
|
mbuf->mb_rem &= ~MODE_WASDELJOINS;
|
|
} else
|
|
show_delayed_joins(mbuf->mb_channel);
|
|
}
|
|
|
|
/* +d must be cleared if +D is set */
|
|
if ((mbuf->mb_add & MODE_DELJOINS)
|
|
&& (mbuf->mb_channel->mode.mode & MODE_WASDELJOINS)) {
|
|
mbuf->mb_channel->mode.mode &= ~MODE_WASDELJOINS;
|
|
mbuf->mb_add &= ~MODE_WASDELJOINS;
|
|
mbuf->mb_rem |= MODE_WASDELJOINS;
|
|
}
|
|
|
|
/*
|
|
* Account for user we're bouncing; we have to get it in on the first
|
|
* bounced MODE, or we could have problems
|
|
*/
|
|
if (mbuf->mb_dest & MODEBUF_DEST_DEOP)
|
|
totalbuflen -= 6; /* numeric nick == 5, plus one space */
|
|
|
|
/* Calculate the simple flags */
|
|
for (flag_p = flags; flag_p[0]; flag_p += 2) {
|
|
if (*flag_p & mbuf->mb_add)
|
|
addbuf[addbuf_i++] = flag_p[1];
|
|
else if (*flag_p & mbuf->mb_rem)
|
|
rembuf[rembuf_i++] = flag_p[1];
|
|
}
|
|
|
|
for (flag_p = exflags; flag_p[0]; flag_p += 2) {
|
|
if (*flag_p & mbuf->mb_exadd)
|
|
addbuf[addbuf_i++] = flag_p[1];
|
|
else if (*flag_p & mbuf->mb_exrem)
|
|
rembuf[rembuf_i++] = flag_p[1];
|
|
}
|
|
|
|
/* Some flags may be for local display only. */
|
|
for (flag_p = local_flags; flag_p[0]; flag_p += 2) {
|
|
if (*flag_p & mbuf->mb_add)
|
|
addbuf_local[addbuf_local_i++] = flag_p[1];
|
|
else if (*flag_p & mbuf->mb_rem)
|
|
rembuf_local[rembuf_local_i++] = flag_p[1];
|
|
}
|
|
|
|
/* Now go through the modes with arguments... */
|
|
for (i = 0; i < mbuf->mb_count; i++) {
|
|
if (MB_TYPE(mbuf, i) & MODE_ADD) { /* adding or removing? */
|
|
bufptr = addbuf;
|
|
bufptr_i = &addbuf_i;
|
|
} else {
|
|
bufptr = rembuf;
|
|
bufptr_i = &rembuf_i;
|
|
}
|
|
|
|
if (MB_TYPE(mbuf, i) & (MODE_CHANOP | MODE_HALFOP | MODE_VOICE)) {
|
|
tmp = strlen(cli_name(MB_CLIENT(mbuf, i)));
|
|
|
|
if ((totalbuflen - IRCD_MAX(9, tmp)) <= 0) /* don't overflow buffer */
|
|
MB_TYPE(mbuf, i) |= MODE_SAVE; /* save for later */
|
|
else {
|
|
bufptr[(*bufptr_i)++] = MB_TYPE(mbuf, i) & MODE_CHANOP ? 'o' :
|
|
(MB_TYPE(mbuf, i) & MODE_HALFOP ? 'h' : 'v');
|
|
totalbuflen -= IRCD_MAX(9, tmp) + 1;
|
|
}
|
|
} else if (MB_TYPE(mbuf, i) & (MODE_BAN | MODE_EXCEPT | MODE_APASS | MODE_UPASS)) {
|
|
tmp = strlen(MB_STRING(mbuf, i));
|
|
|
|
if ((totalbuflen - tmp) <= 0) /* don't overflow buffer */
|
|
MB_TYPE(mbuf, i) |= MODE_SAVE; /* save for later */
|
|
else {
|
|
char mode_char;
|
|
switch(MB_TYPE(mbuf, i) & (MODE_BAN | MODE_EXCEPT | MODE_APASS | MODE_UPASS))
|
|
{
|
|
case MODE_APASS:
|
|
mode_char = 'A';
|
|
break;
|
|
case MODE_UPASS:
|
|
mode_char = 'U';
|
|
break;
|
|
case MODE_EXCEPT:
|
|
mode_char = 'e';
|
|
break;
|
|
default:
|
|
mode_char = 'b';
|
|
break;
|
|
}
|
|
bufptr[(*bufptr_i)++] = mode_char;
|
|
totalbuflen -= tmp + 1;
|
|
}
|
|
} else if (MB_TYPE(mbuf, i) & MODE_KEY) {
|
|
tmp = (mbuf->mb_dest & MODEBUF_DEST_NOKEY ? 1 :
|
|
strlen(MB_STRING(mbuf, i)));
|
|
|
|
if ((totalbuflen - tmp) <= 0) /* don't overflow buffer */
|
|
MB_TYPE(mbuf, i) |= MODE_SAVE; /* save for later */
|
|
else {
|
|
bufptr[(*bufptr_i)++] = 'k';
|
|
totalbuflen -= tmp + 1;
|
|
}
|
|
} else if (MB_TYPE(mbuf, i) & MODE_REDIRECT) {
|
|
tmp = strlen(MB_STRING(mbuf, i));
|
|
|
|
if ((totalbuflen - tmp) <= 0) /* don't overflow buffer */
|
|
MB_TYPE(mbuf, i) |= MODE_SAVE; /* save for later */
|
|
else {
|
|
bufptr[(*bufptr_i)++] = 'L';
|
|
totalbuflen -= tmp + 1;
|
|
}
|
|
} else if (MB_TYPE(mbuf, i) & MODE_LIMIT) {
|
|
/* if it's a limit, we also format the number */
|
|
ircd_snprintf(0, limitbuf, sizeof(limitbuf), "%u", MB_UINT(mbuf, i));
|
|
|
|
tmp = strlen(limitbuf);
|
|
|
|
if ((totalbuflen - tmp) <= 0) /* don't overflow buffer */
|
|
MB_TYPE(mbuf, i) |= MODE_SAVE; /* save for later */
|
|
else {
|
|
bufptr[(*bufptr_i)++] = 'l';
|
|
totalbuflen -= tmp + 1;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* terminate the mode strings */
|
|
addbuf[addbuf_i] = '\0';
|
|
rembuf[rembuf_i] = '\0';
|
|
addbuf_local[addbuf_local_i] = '\0';
|
|
rembuf_local[rembuf_local_i] = '\0';
|
|
|
|
/* If we're building a user visible MODE or HACK... */
|
|
if (mbuf->mb_dest & (MODEBUF_DEST_CHANNEL | MODEBUF_DEST_HACK2 |
|
|
MODEBUF_DEST_HACK3 | MODEBUF_DEST_HACK4 |
|
|
MODEBUF_DEST_LOG)) {
|
|
/* Set up the parameter strings */
|
|
addstr[0] = '\0';
|
|
addstr_i = 0;
|
|
remstr[0] = '\0';
|
|
remstr_i = 0;
|
|
|
|
for (i = 0; i < mbuf->mb_count; i++) {
|
|
if (MB_TYPE(mbuf, i) & MODE_SAVE)
|
|
continue;
|
|
|
|
if (MB_TYPE(mbuf, i) & MODE_ADD) { /* adding or removing? */
|
|
strptr = addstr;
|
|
strptr_i = &addstr_i;
|
|
} else {
|
|
strptr = remstr;
|
|
strptr_i = &remstr_i;
|
|
}
|
|
|
|
/* deal with clients... */
|
|
if (MB_TYPE(mbuf, i) & (MODE_CHANOP | MODE_HALFOP | MODE_VOICE))
|
|
build_string(strptr, strptr_i, cli_name(MB_CLIENT(mbuf, i)), 0, ' ');
|
|
|
|
/* deal with bans... */
|
|
else if (MB_TYPE(mbuf, i) & MODE_BAN)
|
|
build_string(strptr, strptr_i, MB_STRING(mbuf, i), 0, ' ');
|
|
|
|
/* deal with ban exceptions... */
|
|
else if (MB_TYPE(mbuf, i) & MODE_EXCEPT)
|
|
build_string(strptr, strptr_i, MB_STRING(mbuf, i), 0, ' ');
|
|
|
|
/* deal with redirect... */
|
|
else if ((MB_TYPE(mbuf, i) & (MODE_ADD | MODE_REDIRECT)) ==
|
|
(MODE_ADD | MODE_REDIRECT))
|
|
build_string(strptr, strptr_i, MB_STRING(mbuf, i), 0, ' ');
|
|
|
|
/* deal with keys... */
|
|
else if (MB_TYPE(mbuf, i) & MODE_KEY)
|
|
build_string(strptr, strptr_i, mbuf->mb_dest & MODEBUF_DEST_NOKEY ?
|
|
"*" : MB_STRING(mbuf, i), 0, ' ');
|
|
|
|
/* deal with invisible passwords */
|
|
else if (MB_TYPE(mbuf, i) & (MODE_APASS | MODE_UPASS))
|
|
build_string(strptr, strptr_i, "*", 0, ' ');
|
|
|
|
/*
|
|
* deal with limit; note we cannot include the limit parameter if we're
|
|
* removing it
|
|
*/
|
|
else if ((MB_TYPE(mbuf, i) & (MODE_ADD | MODE_LIMIT)) ==
|
|
(MODE_ADD | MODE_LIMIT))
|
|
build_string(strptr, strptr_i, limitbuf, 0, ' ');
|
|
}
|
|
|
|
/* send the messages off to their destination */
|
|
if (mbuf->mb_dest & MODEBUF_DEST_HACK2)
|
|
sendto_opmask_butone(0, SNO_HACK2, "HACK(2): %s MODE %s %s%s%s%s%s%s "
|
|
"[%Tu]",
|
|
cli_name(feature_bool(FEAT_HIS_SNOTICES) ?
|
|
mbuf->mb_source : app_source),
|
|
mbuf->mb_channel->chname,
|
|
rembuf_i ? "-" : "", rembuf, addbuf_i ? "+" : "",
|
|
addbuf, remstr, addstr,
|
|
mbuf->mb_channel->creationtime);
|
|
|
|
if (mbuf->mb_dest & MODEBUF_DEST_HACK3)
|
|
sendto_opmask_butone(0, SNO_HACK3, "BOUNCE or HACK(3): %s MODE %s "
|
|
"%s%s%s%s%s%s [%Tu]",
|
|
cli_name(feature_bool(FEAT_HIS_SNOTICES) ?
|
|
mbuf->mb_source : app_source),
|
|
mbuf->mb_channel->chname, rembuf_i ? "-" : "",
|
|
rembuf, addbuf_i ? "+" : "", addbuf, remstr, addstr,
|
|
mbuf->mb_channel->creationtime);
|
|
|
|
if (mbuf->mb_dest & MODEBUF_DEST_HACK4)
|
|
sendto_opmask_butone(0, SNO_HACK4, "HACK(4): %s MODE %s %s%s%s%s%s%s "
|
|
"[%Tu]",
|
|
cli_name(feature_bool(FEAT_HIS_SNOTICES) ?
|
|
mbuf->mb_source : app_source),
|
|
mbuf->mb_channel->chname,
|
|
rembuf_i ? "-" : "", rembuf, addbuf_i ? "+" : "",
|
|
addbuf, remstr, addstr,
|
|
mbuf->mb_channel->creationtime);
|
|
|
|
if (mbuf->mb_dest & MODEBUF_DEST_LOG)
|
|
log_write(LS_OPERMODE, L_INFO, LOG_NOSNOTICE,
|
|
"%#C OPMODE %H %s%s%s%s%s%s", mbuf->mb_source,
|
|
mbuf->mb_channel, rembuf_i ? "-" : "", rembuf,
|
|
addbuf_i ? "+" : "", addbuf, remstr, addstr);
|
|
|
|
if (mbuf->mb_dest & MODEBUF_DEST_CHANNEL)
|
|
sendcmdto_channel_butserv_butone(app_source, CMD_MODE, mbuf->mb_channel, NULL, 0,
|
|
"%H %s%s%s%s%s%s%s%s", mbuf->mb_channel,
|
|
rembuf_i || rembuf_local_i ? "-" : "",
|
|
rembuf, rembuf_local,
|
|
addbuf_i || addbuf_local_i ? "+" : "",
|
|
addbuf, addbuf_local,
|
|
remstr, addstr);
|
|
}
|
|
|
|
/* Now are we supposed to propagate to other servers? */
|
|
if (mbuf->mb_dest & MODEBUF_DEST_SERVER) {
|
|
/* set up parameter string */
|
|
addstr[0] = '\0';
|
|
addstro[0] = '\0';
|
|
addstr_i = 0;
|
|
addstro_i = 0;
|
|
remstr[0] = '\0';
|
|
remstr_i = 0;
|
|
|
|
/*
|
|
* limit is supressed if we're removing it; we have to figure out which
|
|
* direction is the direction for it to be removed, though...
|
|
*/
|
|
limitdel |= (mbuf->mb_dest & MODEBUF_DEST_BOUNCE) ? MODE_DEL : MODE_ADD;
|
|
redirdel |= (mbuf->mb_dest & MODEBUF_DEST_BOUNCE) ? MODE_DEL : MODE_ADD;
|
|
|
|
for (i = 0; i < mbuf->mb_count; i++) {
|
|
if (MB_TYPE(mbuf, i) & MODE_SAVE)
|
|
continue;
|
|
|
|
if (MB_TYPE(mbuf, i) & MODE_ADD) { /* adding or removing? */
|
|
strptr = addstr;
|
|
strptr_i = &addstr_i;
|
|
strptro = addstro;
|
|
strptro_i = &addstro_i;
|
|
} else {
|
|
strptr = remstr;
|
|
strptr_i = &remstr_i;
|
|
strptro = NULL;
|
|
strptro_i = NULL;
|
|
}
|
|
|
|
/* if we're changing oplevels and we know the oplevel, pass it on */
|
|
if ((MB_TYPE(mbuf, i) & MODE_CHANOP)
|
|
&& MB_OPLEVEL(mbuf, i) < MAXOPLEVEL) {
|
|
*strptr_i += ircd_snprintf(0, strptr + *strptr_i, BUFSIZE - *strptr_i,
|
|
" %s%s:%d",
|
|
NumNick(MB_CLIENT(mbuf, i)),
|
|
MB_OPLEVEL(mbuf, i));
|
|
*strptro_i += ircd_snprintf(0, strptro+ *strptro_i, BUFSIZE - *strptro_i,
|
|
" %s%s", NumNick(MB_CLIENT(mbuf, i)));
|
|
|
|
/* deal with other modes that take clients */
|
|
} else if (MB_TYPE(mbuf, i) & (MODE_CHANOP | MODE_HALFOP | MODE_VOICE)) {
|
|
build_string(strptr, strptr_i, NumNick(MB_CLIENT(mbuf, i)), ' ');
|
|
if (MB_TYPE(mbuf, i) & MODE_ADD)
|
|
build_string(strptro, strptro_i, NumNick(MB_CLIENT(mbuf, i)), ' ');
|
|
|
|
/* deal with modes that take strings */
|
|
} else if (MB_TYPE(mbuf, i) & (MODE_KEY | MODE_BAN | MODE_EXCEPT | MODE_APASS | MODE_UPASS)) {
|
|
build_string(strptr, strptr_i, MB_STRING(mbuf, i), 0, ' ');
|
|
if (MB_TYPE(mbuf, i) & MODE_ADD)
|
|
build_string(strptro, strptro_i, MB_STRING(mbuf, i), 0, ' ');
|
|
|
|
/* deal with redirect */
|
|
} else if ((MB_TYPE(mbuf, i) & redirdel) == redirdel) {
|
|
build_string(strptr, strptr_i, MB_STRING(mbuf, i), 0, ' ');
|
|
if (MB_TYPE(mbuf, i) & MODE_ADD)
|
|
build_string(strptro, strptro_i, MB_STRING(mbuf, i), 0, ' ');
|
|
|
|
/*
|
|
* deal with the limit. Logic here is complicated; if HACK2 is set,
|
|
* we're bouncing the mode, so sense is reversed, and we have to
|
|
* include the original limit if it looks like it's being removed
|
|
*/
|
|
} else if ((MB_TYPE(mbuf, i) & limitdel) == limitdel) {
|
|
build_string(strptr, strptr_i, limitbuf, 0, ' ');
|
|
if (MB_TYPE(mbuf, i) & MODE_ADD)
|
|
build_string(strptro, strptro_i, limitbuf, 0, ' ');
|
|
}
|
|
}
|
|
|
|
/* we were told to deop the source */
|
|
if (mbuf->mb_dest & MODEBUF_DEST_DEOP) {
|
|
addbuf[addbuf_i++] = 'o'; /* remember, sense is reversed */
|
|
addbuf[addbuf_i] = '\0'; /* terminate the string... */
|
|
build_string(addstr, &addstr_i, NumNick(mbuf->mb_source), ' ');
|
|
build_string(addstro, &addstro_i, NumNick(mbuf->mb_source), ' ');
|
|
|
|
/* mark that we've done this, so we don't do it again */
|
|
mbuf->mb_dest &= ~MODEBUF_DEST_DEOP;
|
|
}
|
|
|
|
if (mbuf->mb_dest & MODEBUF_DEST_OPMODE) {
|
|
/* If OPMODE was set, we're propagating the mode as an OPMODE message */
|
|
sendcmdto_flag_serv_butone(mbuf->mb_source, CMD_OPMODE, mbuf->mb_connect,
|
|
FLAG_OPLEVELS, FLAG_LAST_FLAG,
|
|
"%H %s%s%s%s%s%s", mbuf->mb_channel,
|
|
rembuf_i ? "-" : "", rembuf, addbuf_i ? "+" : "",
|
|
addbuf, remstr, addstr);
|
|
sendcmdto_flag_serv_butone(mbuf->mb_source, CMD_OPMODE, mbuf->mb_connect,
|
|
FLAG_LAST_FLAG, FLAG_OPLEVELS,
|
|
"%H %s%s%s%s%s%s", mbuf->mb_channel,
|
|
rembuf_i ? "-" : "", rembuf, addbuf_i ? "+" : "",
|
|
addbuf, remstr, addstro);
|
|
} else if (mbuf->mb_dest & MODEBUF_DEST_BOUNCE) {
|
|
/*
|
|
* If HACK2 was set, we're bouncing; we send the MODE back to
|
|
* the connection we got it from with the senses reversed and
|
|
* the proper TS; origin is us
|
|
*/
|
|
sendcmdto_one(&me, CMD_MODE, mbuf->mb_connect, "%H %s%s%s%s%s%s %Tu",
|
|
mbuf->mb_channel, addbuf_i ? "-" : "", addbuf,
|
|
rembuf_i ? "+" : "", rembuf,
|
|
IsOpLevels(mbuf->mb_connect) ? addstr : addstro,
|
|
remstr, mbuf->mb_channel->creationtime);
|
|
} else {
|
|
/*
|
|
* We're propagating a normal (or HACK3 or HACK4) MODE command
|
|
* to the rest of the network. We send the actual channel TS.
|
|
*/
|
|
/* Send oplevels to servers with oplevels support. */
|
|
sendcmdto_flag_serv_butone(mbuf->mb_source, CMD_MODE, mbuf->mb_connect,
|
|
FLAG_OPLEVELS, FLAG_LAST_FLAG,
|
|
"%H %s%s%s%s%s%s %Tu", mbuf->mb_channel,
|
|
rembuf_i ? "-" : "", rembuf, addbuf_i ? "+" : "",
|
|
addbuf, remstr, addstr,
|
|
mbuf->mb_channel->creationtime);
|
|
/* Send no oplevels to servers without oplevels support. */
|
|
sendcmdto_flag_serv_butone(mbuf->mb_source, CMD_MODE, mbuf->mb_connect,
|
|
FLAG_LAST_FLAG, FLAG_OPLEVELS,
|
|
"%H %s%s%s%s%s%s %Tu", mbuf->mb_channel,
|
|
rembuf_i ? "-" : "", rembuf, addbuf_i ? "+" : "",
|
|
addbuf, remstr, addstro,
|
|
mbuf->mb_channel->creationtime);
|
|
}
|
|
}
|
|
|
|
/* We've drained the ModeBuf... */
|
|
mbuf->mb_add = 0;
|
|
mbuf->mb_exadd = 0;
|
|
mbuf->mb_rem = 0;
|
|
mbuf->mb_exrem = 0;
|
|
mbuf->mb_count = 0;
|
|
|
|
/* reinitialize the mode-with-arg slots */
|
|
for (i = 0; i < MAXMODEPARAMS; i++) {
|
|
/* If we saved any, pack them down */
|
|
if (MB_TYPE(mbuf, i) & MODE_SAVE) {
|
|
mbuf->mb_modeargs[mbuf->mb_count] = mbuf->mb_modeargs[i];
|
|
MB_TYPE(mbuf, mbuf->mb_count) &= ~MODE_SAVE; /* don't save anymore */
|
|
|
|
if (mbuf->mb_count++ == i) /* don't overwrite our hard work */
|
|
continue;
|
|
} else if (MB_TYPE(mbuf, i) & MODE_FREE)
|
|
MyFree(MB_STRING(mbuf, i)); /* free string if needed */
|
|
|
|
MB_TYPE(mbuf, i) = 0;
|
|
MB_UINT(mbuf, i) = 0;
|
|
}
|
|
|
|
/* If we're supposed to flush it all, do so--all hail tail recursion */
|
|
if (all && mbuf->mb_count)
|
|
return modebuf_flush_int(mbuf, 1);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/** Initialise a modebuf
|
|
* This routine just initializes a ModeBuf structure with the information
|
|
* needed and the options given.
|
|
*
|
|
* @param mbuf The mode buffer to initialise.
|
|
* @param source The client that is performing the mode.
|
|
* @param connect ?
|
|
* @param chan The channel that the mode is being performed upon.
|
|
* @param dest ?
|
|
*/
|
|
void
|
|
modebuf_init(struct ModeBuf *mbuf, struct Client *source,
|
|
struct Client *connect, struct Channel *chan, unsigned int dest)
|
|
{
|
|
int i;
|
|
|
|
assert(0 != mbuf);
|
|
assert(0 != source);
|
|
assert(0 != chan);
|
|
assert(0 != dest);
|
|
|
|
if (IsLocalChannel(chan->chname)) dest &= ~MODEBUF_DEST_SERVER;
|
|
|
|
mbuf->mb_add = 0;
|
|
mbuf->mb_exadd = 0;
|
|
mbuf->mb_rem = 0;
|
|
mbuf->mb_exrem = 0;
|
|
mbuf->mb_source = source;
|
|
mbuf->mb_connect = connect;
|
|
mbuf->mb_channel = chan;
|
|
mbuf->mb_dest = dest;
|
|
mbuf->mb_count = 0;
|
|
|
|
/* clear each mode-with-parameter slot */
|
|
for (i = 0; i < MAXMODEPARAMS; i++) {
|
|
MB_TYPE(mbuf, i) = 0;
|
|
MB_UINT(mbuf, i) = 0;
|
|
}
|
|
}
|
|
|
|
/** Append a new mode to a modebuf
|
|
* This routine simply adds modes to be added or deleted; do a binary OR
|
|
* with either MODE_ADD or MODE_DEL
|
|
*
|
|
* @param mbuf Mode buffer
|
|
* @param mode MODE_ADD or MODE_DEL OR'd with MODE_PRIVATE etc.
|
|
*/
|
|
void
|
|
modebuf_mode(struct ModeBuf *mbuf, unsigned int mode)
|
|
{
|
|
assert(0 != mbuf);
|
|
assert(0 != (mode & (MODE_ADD | MODE_DEL)));
|
|
|
|
mode &= (MODE_ADD | MODE_DEL | MODE_PRIVATE | MODE_SECRET | MODE_MODERATED |
|
|
MODE_TOPICLIMIT | MODE_INVITEONLY | MODE_NOPRIVMSGS | MODE_REGONLY |
|
|
MODE_DELJOINS | MODE_WASDELJOINS | MODE_REGISTERED);
|
|
|
|
if (!(mode & ~(MODE_ADD | MODE_DEL))) /* don't add empty modes... */
|
|
return;
|
|
|
|
if (mode & MODE_ADD) {
|
|
mbuf->mb_rem &= ~mode;
|
|
mbuf->mb_add |= mode;
|
|
} else {
|
|
mbuf->mb_add &= ~mode;
|
|
mbuf->mb_rem |= mode;
|
|
}
|
|
}
|
|
|
|
void
|
|
modebuf_exmode(struct ModeBuf *mbuf, unsigned int mode)
|
|
{
|
|
assert(0 != mbuf);
|
|
assert(0 != (mode & (MODE_ADD | MODE_DEL)));
|
|
|
|
mode &= (MODE_ADD | MODE_DEL | EXMODE_ADMINONLY | EXMODE_OPERONLY |
|
|
EXMODE_REGMODERATED | EXMODE_NONOTICES | EXMODE_PERSIST |
|
|
EXMODE_SSLONLY | EXMODE_NOQUITPARTS | EXMODE_NOCTCPS |
|
|
EXMODE_NOMULTITARG | EXMODE_NOCOLOR | EXMODE_STRIPCOLOR);
|
|
|
|
if (!(mode & ~(MODE_ADD | MODE_DEL))) /* don't add empty modes... */
|
|
return;
|
|
|
|
if (mode & MODE_ADD) {
|
|
mbuf->mb_exrem &= ~mode;
|
|
mbuf->mb_exadd |= mode;
|
|
} else {
|
|
mbuf->mb_exadd &= ~mode;
|
|
mbuf->mb_exrem |= mode;
|
|
}
|
|
}
|
|
|
|
/** Append a mode that takes an int argument to the modebuf
|
|
*
|
|
* This routine adds a mode to be added or deleted that takes a unsigned
|
|
* int parameter; mode may *only* be the relevant mode flag ORed with one
|
|
* of MODE_ADD or MODE_DEL
|
|
*
|
|
* @param mbuf The mode buffer to append to.
|
|
* @param mode The mode to append.
|
|
* @param uint The argument to the mode.
|
|
*/
|
|
void
|
|
modebuf_mode_uint(struct ModeBuf *mbuf, unsigned int mode, unsigned int uint)
|
|
{
|
|
assert(0 != mbuf);
|
|
assert(0 != (mode & (MODE_ADD | MODE_DEL)));
|
|
|
|
if (mode == (MODE_LIMIT | MODE_DEL)) {
|
|
mbuf->mb_rem |= mode;
|
|
return;
|
|
}
|
|
MB_TYPE(mbuf, mbuf->mb_count) = mode;
|
|
MB_UINT(mbuf, mbuf->mb_count) = uint;
|
|
|
|
/* when we've reached the maximal count, flush the buffer */
|
|
if (++mbuf->mb_count >=
|
|
(MAXMODEPARAMS - (mbuf->mb_dest & MODEBUF_DEST_DEOP ? 1 : 0)))
|
|
modebuf_flush_int(mbuf, 0);
|
|
}
|
|
|
|
/** append a string mode
|
|
* This routine adds a mode to be added or deleted that takes a string
|
|
* parameter; mode may *only* be the relevant mode flag ORed with one of
|
|
* MODE_ADD or MODE_DEL
|
|
*
|
|
* @param mbuf The mode buffer to append to.
|
|
* @param mode The mode to append.
|
|
* @param string The string parameter to append.
|
|
* @param free If the string should be free'd later.
|
|
*/
|
|
void
|
|
modebuf_mode_string(struct ModeBuf *mbuf, unsigned int mode, char *string,
|
|
int free)
|
|
{
|
|
assert(0 != mbuf);
|
|
assert(0 != (mode & (MODE_ADD | MODE_DEL)));
|
|
|
|
if (mode == (MODE_REDIRECT | MODE_DEL)) {
|
|
mbuf->mb_rem |= mode;
|
|
return;
|
|
}
|
|
MB_TYPE(mbuf, mbuf->mb_count) = mode | (free ? MODE_FREE : 0);
|
|
MB_STRING(mbuf, mbuf->mb_count) = string;
|
|
|
|
/* when we've reached the maximal count, flush the buffer */
|
|
if (++mbuf->mb_count >=
|
|
(MAXMODEPARAMS - (mbuf->mb_dest & MODEBUF_DEST_DEOP ? 1 : 0)))
|
|
modebuf_flush_int(mbuf, 0);
|
|
}
|
|
|
|
/** Append a mode on a client to a modebuf.
|
|
* This routine adds a mode to be added or deleted that takes a client
|
|
* parameter; mode may *only* be the relevant mode flag ORed with one of
|
|
* MODE_ADD or MODE_DEL
|
|
*
|
|
* @param mbuf The modebuf to append the mode to.
|
|
* @param mode The mode to append.
|
|
* @param client The client argument to append.
|
|
* @param oplevel The oplevel the user had or will have
|
|
*/
|
|
void
|
|
modebuf_mode_client(struct ModeBuf *mbuf, unsigned int mode,
|
|
struct Client *client, int oplevel)
|
|
{
|
|
assert(0 != mbuf);
|
|
assert(0 != (mode & (MODE_ADD | MODE_DEL)));
|
|
|
|
MB_TYPE(mbuf, mbuf->mb_count) = mode;
|
|
MB_CLIENT(mbuf, mbuf->mb_count) = client;
|
|
MB_OPLEVEL(mbuf, mbuf->mb_count) = oplevel;
|
|
|
|
/* when we've reached the maximal count, flush the buffer */
|
|
if (++mbuf->mb_count >=
|
|
(MAXMODEPARAMS - (mbuf->mb_dest & MODEBUF_DEST_DEOP ? 1 : 0)))
|
|
modebuf_flush_int(mbuf, 0);
|
|
}
|
|
|
|
/** The exported binding for modebuf_flush()
|
|
*
|
|
* @param mbuf The mode buffer to flush.
|
|
*
|
|
* @see modebuf_flush_int()
|
|
*/
|
|
int
|
|
modebuf_flush(struct ModeBuf *mbuf)
|
|
{
|
|
return modebuf_flush_int(mbuf, 1);
|
|
}
|
|
|
|
/* This extracts the simple modes contained in mbuf
|
|
*
|
|
* @param mbuf The mode buffer to extract the modes from.
|
|
* @param buf The string buffer to write the modes into.
|
|
* @param oplevels Include oplevels modes (+AU)?
|
|
*/
|
|
void
|
|
modebuf_extract(struct ModeBuf *mbuf, char *buf, int oplevels)
|
|
{
|
|
static int flags[] = {
|
|
/* MODE_CHANOP, 'o', */
|
|
/* MODE_HALFOP, 'h', */
|
|
/* MODE_VOICE, 'v', */
|
|
MODE_PRIVATE, 'p',
|
|
MODE_SECRET, 's',
|
|
MODE_MODERATED, 'm',
|
|
MODE_TOPICLIMIT, 't',
|
|
MODE_INVITEONLY, 'i',
|
|
MODE_NOPRIVMSGS, 'n',
|
|
MODE_KEY, 'k',
|
|
MODE_APASS, 'A',
|
|
MODE_UPASS, 'U',
|
|
MODE_REGISTERED, 'R',
|
|
/* MODE_BAN, 'b', */
|
|
/* MODE_EXCEPT, 'e', */
|
|
MODE_LIMIT, 'l',
|
|
MODE_REDIRECT, 'L',
|
|
MODE_REGONLY, 'r',
|
|
MODE_DELJOINS, 'D',
|
|
0x0, 0x0
|
|
};
|
|
static int exflags[] = {
|
|
EXMODE_ADMINONLY, 'a',
|
|
EXMODE_OPERONLY, 'O',
|
|
EXMODE_REGMODERATED, 'M',
|
|
EXMODE_NONOTICES, 'N',
|
|
EXMODE_PERSIST, 'z',
|
|
EXMODE_SSLONLY, 'Z',
|
|
EXMODE_NOQUITPARTS, 'Q',
|
|
EXMODE_NOCTCPS, 'C',
|
|
EXMODE_NOMULTITARG, 'T',
|
|
EXMODE_NOCOLOR, 'c',
|
|
EXMODE_STRIPCOLOR, 'S',
|
|
0x0, 0x0
|
|
};
|
|
unsigned int add;
|
|
unsigned int exadd;
|
|
int i, bufpos = 0, len;
|
|
int *flag_p;
|
|
char *key = 0, limitbuf[20];
|
|
char *apass = 0, *upass = 0;
|
|
char *redir = 0;
|
|
|
|
assert(0 != mbuf);
|
|
assert(0 != buf);
|
|
|
|
buf[0] = '\0';
|
|
|
|
add = mbuf->mb_add;
|
|
exadd = mbuf->mb_exadd;
|
|
|
|
for (i = 0; i < mbuf->mb_count; i++) { /* find keys and limits */
|
|
if (MB_TYPE(mbuf, i) & MODE_ADD) {
|
|
add |= MB_TYPE(mbuf, i) & (MODE_KEY | MODE_LIMIT | MODE_APASS | MODE_UPASS | MODE_REDIRECT);
|
|
|
|
if (MB_TYPE(mbuf, i) & MODE_KEY) /* keep strings */
|
|
key = MB_STRING(mbuf, i);
|
|
else if (MB_TYPE(mbuf, i) & MODE_REDIRECT)
|
|
redir = MB_STRING(mbuf, i);
|
|
else if (MB_TYPE(mbuf, i) & MODE_LIMIT)
|
|
ircd_snprintf(0, limitbuf, sizeof(limitbuf), "%u", MB_UINT(mbuf, i));
|
|
else if (MB_TYPE(mbuf, i) & MODE_UPASS)
|
|
upass = MB_STRING(mbuf, i);
|
|
else if (MB_TYPE(mbuf, i) & MODE_APASS)
|
|
apass = MB_STRING(mbuf, i);
|
|
}
|
|
}
|
|
|
|
if (!add && !exadd)
|
|
return;
|
|
|
|
buf[bufpos++] = '+'; /* start building buffer */
|
|
|
|
for (flag_p = flags; flag_p[0]; flag_p += 2) {
|
|
if (*flag_p & add) {
|
|
if (!((*flag_p & (MODE_APASS | MODE_UPASS)) && !oplevels))
|
|
buf[bufpos++] = flag_p[1];
|
|
}
|
|
}
|
|
|
|
for (flag_p = exflags; flag_p[0]; flag_p += 2) {
|
|
if (*flag_p & exadd) {
|
|
if (!(!oplevels)) /* Nothing like a double negative to wake you up in the morning */
|
|
buf[bufpos++] = flag_p[1];
|
|
}
|
|
}
|
|
|
|
for (i = 0, len = bufpos; i < len; i++) {
|
|
if (buf[i] == 'k')
|
|
build_string(buf, &bufpos, key, 0, ' ');
|
|
else if (buf[i] == 'L')
|
|
build_string(buf, &bufpos, redir, 0, ' ');
|
|
else if (buf[i] == 'l')
|
|
build_string(buf, &bufpos, limitbuf, 0, ' ');
|
|
else if ((buf[i] == 'U') && oplevels)
|
|
build_string(buf, &bufpos, upass, 0, ' ');
|
|
else if ((buf[i] == 'A') && oplevels)
|
|
build_string(buf, &bufpos, apass, 0, ' ');
|
|
}
|
|
|
|
buf[bufpos] = '\0';
|
|
|
|
return;
|
|
}
|
|
|
|
/** Simple function to invalidate a channel's ban cache.
|
|
*
|
|
* This function marks all members of the channel as being neither
|
|
* banned nor banned.
|
|
*
|
|
* @param chan The channel to operate on.
|
|
*/
|
|
void
|
|
mode_ban_invalidate(struct Channel *chan)
|
|
{
|
|
struct Membership *member;
|
|
|
|
for (member = chan->members; member; member = member->next_member) {
|
|
ClearBanValid(member);
|
|
ClearBanValidQuiet(member);
|
|
ClearBanValidNick(member);
|
|
}
|
|
}
|
|
|
|
/** Simple function to invalidate a channel's ban exception cache.
|
|
*
|
|
* This function marks all members of the channel as being neither
|
|
* ban excepted not ban excepted.
|
|
*
|
|
* @param chan The channel to operate on.
|
|
*/
|
|
void
|
|
mode_except_invalidate(struct Channel *chan)
|
|
{
|
|
struct Membership *member;
|
|
|
|
for (member = chan->members; member; member = member->next_member) {
|
|
ClearExceptValid(member);
|
|
ClearExceptValidQuiet(member);
|
|
ClearExceptValidNick(member);
|
|
}
|
|
}
|
|
|
|
/** Simple function to drop invite structures
|
|
*
|
|
* Remove all the invites on the channel.
|
|
*
|
|
* @param chan Channel to remove invites from.
|
|
*
|
|
*/
|
|
void
|
|
mode_invite_clear(struct Channel *chan)
|
|
{
|
|
while (chan->invites)
|
|
del_invite(chan->invites->value.cptr, chan);
|
|
}
|
|
|
|
/* What we've done for mode_parse so far... */
|
|
#define DONE_LIMIT 0x01 /**< We've set the limit */
|
|
#define DONE_KEY_ADD 0x02 /**< We've set the key */
|
|
#define DONE_BANLIST 0x04 /**< We've sent the ban list */
|
|
#define DONE_NOTOPER 0x08 /**< We've sent a "Not oper" error */
|
|
#define DONE_BANCLEAN 0x10 /**< We've cleaned bans... */
|
|
#define DONE_UPASS_ADD 0x20 /**< We've set user pass */
|
|
#define DONE_APASS_ADD 0x40 /**< We've set admin pass */
|
|
#define DONE_KEY_DEL 0x80 /**< We've removed the key */
|
|
#define DONE_UPASS_DEL 0x100 /**< We've removed the user pass */
|
|
#define DONE_APASS_DEL 0x200 /**< We've removed the admin pass */
|
|
#define DONE_EXCEPTLIST 0x400 /**< We've sent the ban exceptions list */
|
|
#define DONE_EXCEPTCLEAN 0x800 /**< We've cleaned ban exceptions... */
|
|
#define DONE_REDIR 0x1000 /**< We've set a redirection */
|
|
|
|
struct ParseState {
|
|
struct ModeBuf *mbuf;
|
|
struct Client *cptr;
|
|
struct Client *sptr;
|
|
struct Channel *chptr;
|
|
struct Membership *member;
|
|
int parc;
|
|
char **parv;
|
|
unsigned int flags;
|
|
unsigned int dir;
|
|
unsigned int done;
|
|
unsigned int add;
|
|
unsigned int exadd;
|
|
unsigned int del;
|
|
unsigned int exdel;
|
|
int args_used;
|
|
int max_args;
|
|
int numbans;
|
|
struct Ban banlist[MAXPARA];
|
|
struct Ban exceptlist[MAXPARA];
|
|
struct {
|
|
unsigned int flag;
|
|
unsigned short oplevel;
|
|
struct Client *client;
|
|
} cli_change[MAXPARA];
|
|
};
|
|
|
|
/** Helper function to send "Not oper" or "Not member" messages
|
|
* Here's a helper function to deal with sending along "Not oper" or
|
|
* "Not member" messages
|
|
*
|
|
* @param state Parsing State object
|
|
*/
|
|
static void
|
|
send_notoper(struct ParseState *state)
|
|
{
|
|
if (state->done & DONE_NOTOPER)
|
|
return;
|
|
|
|
send_reply(state->sptr, (state->flags & MODE_PARSE_NOTOPER) ?
|
|
ERR_CHANOPRIVSNEEDED : ERR_NOTONCHANNEL, state->chptr->chname);
|
|
|
|
state->done |= DONE_NOTOPER;
|
|
}
|
|
|
|
/** Parse a redirect
|
|
* Helper function to convert redirects
|
|
*
|
|
* @param state Parsing state object.
|
|
* @param flag_p ?
|
|
*/
|
|
static void
|
|
mode_parse_redir(struct ParseState *state, int *flag_p)
|
|
{
|
|
char *t_str;
|
|
|
|
if (state->dir == MODE_ADD) { /* convert arg only if adding redirect */
|
|
if (MyUser(state->sptr) && state->max_args <= 0) /* too many args? */
|
|
return;
|
|
|
|
if (state->parc <= 0) { /* warn if not enough args */
|
|
if (MyUser(state->sptr))
|
|
need_more_params(state->sptr, "MODE +L");
|
|
return;
|
|
}
|
|
|
|
t_str = state->parv[state->args_used++]; /* grab arg */
|
|
state->parc--;
|
|
state->max_args--;
|
|
|
|
if (!ircd_strcmp(t_str, state->chptr->chname)) {
|
|
send_reply(state->sptr, ERR_LINKSELF, t_str);
|
|
return;
|
|
}
|
|
|
|
if (!(feature_bool(FEAT_CHMODE_L) || IsServer(state->sptr) ||
|
|
IsChannelService(state->sptr) || IsOper(state->sptr))) {
|
|
send_reply(state->sptr, ERR_NOPRIVILEGES);
|
|
return;
|
|
}
|
|
|
|
/* Reject invalid channel names or those exceeding CHANNELLEN */
|
|
if (!IsChannelName(t_str) || !strIsIrcCh(t_str) || strlen(t_str) > CHANNELLEN)
|
|
return;
|
|
} else
|
|
t_str = state->chptr->mode.redir;
|
|
|
|
/* If they're not an oper, they can't change modes */
|
|
if (state->flags & (MODE_PARSE_NOTOPER | MODE_PARSE_NOTMEMBER)) {
|
|
send_notoper(state);
|
|
return;
|
|
}
|
|
|
|
/* Can't remove a redirect that's not there */
|
|
if (state->dir == MODE_DEL && !(*state->chptr->mode.redir))
|
|
return;
|
|
|
|
if (state->done & DONE_REDIR) /* allow redirect to be set only once */
|
|
return;
|
|
state->done |= DONE_REDIR;
|
|
|
|
if (!state->mbuf)
|
|
return;
|
|
|
|
/* Skip if this is a burst, we have a redirect already and the new redirect
|
|
* is after the old one alphabetically */
|
|
if ((state->flags & MODE_PARSE_BURST) &&
|
|
*(state->chptr->mode.redir) &&
|
|
ircd_strcmp(state->chptr->mode.redir, t_str) <= 0)
|
|
return;
|
|
|
|
if (!(state->flags & MODE_PARSE_WIPEOUT) && state->dir == MODE_ADD &&
|
|
!ircd_strcmp(state->chptr->mode.redir, t_str))
|
|
return; /* no redir change */
|
|
|
|
if (state->flags & MODE_PARSE_BOUNCE) {
|
|
if (*state->chptr->mode.redir) /* reset old redir */
|
|
modebuf_mode_string(state->mbuf, MODE_DEL | flag_p[0],
|
|
state->chptr->mode.redir, 0);
|
|
else /* remove new bogus redir */
|
|
modebuf_mode_string(state->mbuf, MODE_ADD | flag_p[0], t_str, 0);
|
|
} else /* send new redir */
|
|
modebuf_mode_string(state->mbuf, state->dir | flag_p[0], t_str, 0);
|
|
|
|
if (state->flags & MODE_PARSE_SET) {
|
|
if (state->dir == MODE_DEL) /* remove the old redirect */
|
|
*state->chptr->mode.redir = '\0';
|
|
else
|
|
ircd_strncpy(state->chptr->mode.redir, t_str, CHANNELLEN + 1);
|
|
}
|
|
}
|
|
|
|
/** Parse a limit
|
|
* Helper function to convert limits
|
|
*
|
|
* @param state Parsing state object.
|
|
* @param flag_p ?
|
|
*/
|
|
static void
|
|
mode_parse_limit(struct ParseState *state, int *flag_p)
|
|
{
|
|
unsigned int t_limit;
|
|
|
|
if (state->dir == MODE_ADD) { /* convert arg only if adding limit */
|
|
if (MyUser(state->sptr) && state->max_args <= 0) /* too many args? */
|
|
return;
|
|
|
|
if (state->parc <= 0) { /* warn if not enough args */
|
|
if (MyUser(state->sptr))
|
|
need_more_params(state->sptr, "MODE +l");
|
|
return;
|
|
}
|
|
|
|
t_limit = strtoul(state->parv[state->args_used++], 0, 10); /* grab arg */
|
|
state->parc--;
|
|
state->max_args--;
|
|
|
|
if ((int)t_limit<0) /* don't permit a negative limit */
|
|
return;
|
|
|
|
if (!(state->flags & MODE_PARSE_WIPEOUT) &&
|
|
(!t_limit || t_limit == state->chptr->mode.limit))
|
|
return;
|
|
} else
|
|
t_limit = state->chptr->mode.limit;
|
|
|
|
/* If they're not an oper, they can't change modes */
|
|
if (state->flags & (MODE_PARSE_NOTOPER | MODE_PARSE_NOTMEMBER)) {
|
|
send_notoper(state);
|
|
return;
|
|
}
|
|
|
|
/* Can't remove a limit that's not there */
|
|
if (state->dir == MODE_DEL && !state->chptr->mode.limit)
|
|
return;
|
|
|
|
/* Skip if this is a burst and a lower limit than this is set already */
|
|
if ((state->flags & MODE_PARSE_BURST) &&
|
|
(state->chptr->mode.mode & flag_p[0]) &&
|
|
(state->chptr->mode.limit < t_limit))
|
|
return;
|
|
|
|
if (state->done & DONE_LIMIT) /* allow limit to be set only once */
|
|
return;
|
|
state->done |= DONE_LIMIT;
|
|
|
|
if (!state->mbuf)
|
|
return;
|
|
|
|
modebuf_mode_uint(state->mbuf, state->dir | flag_p[0], t_limit);
|
|
|
|
if (state->flags & MODE_PARSE_SET) { /* set the limit */
|
|
if (state->dir & MODE_ADD) {
|
|
state->chptr->mode.mode |= flag_p[0];
|
|
state->chptr->mode.limit = t_limit;
|
|
} else {
|
|
state->chptr->mode.mode &= ~flag_p[0];
|
|
state->chptr->mode.limit = 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
/** Helper function to validate key-like parameters.
|
|
*
|
|
* @param[in] state Parse state for feedback to user.
|
|
* @param[in] s Key to validate.
|
|
* @param[in] command String to pass for need_more_params() command.
|
|
* @return Zero on an invalid key, non-zero if the key was okay.
|
|
*/
|
|
static int
|
|
is_clean_key(struct ParseState *state, char *s, char *command)
|
|
{
|
|
int ii;
|
|
|
|
if (s[0] == '\0') {
|
|
if (MyUser(state->sptr))
|
|
need_more_params(state->sptr, command);
|
|
return 0;
|
|
}
|
|
else if (s[0] == ':') {
|
|
if (MyUser(state->sptr))
|
|
send_reply(state->sptr, ERR_INVALIDKEY, state->chptr->chname);
|
|
return 0;
|
|
}
|
|
for (ii = 0; (ii <= KEYLEN) && (s[ii] != '\0'); ++ii) {
|
|
if ((unsigned char)s[ii] <= ' ' || s[ii] == ',') {
|
|
if (MyUser(state->sptr))
|
|
send_reply(state->sptr, ERR_INVALIDKEY, state->chptr->chname);
|
|
return 0;
|
|
}
|
|
}
|
|
if (ii > KEYLEN) {
|
|
if (MyUser(state->sptr))
|
|
send_reply(state->sptr, ERR_INVALIDKEY, state->chptr->chname);
|
|
return 0;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
/*
|
|
* Helper function to convert keys
|
|
*/
|
|
static void
|
|
mode_parse_key(struct ParseState *state, int *flag_p)
|
|
{
|
|
char *t_str;
|
|
|
|
if (MyUser(state->sptr) && state->max_args <= 0) /* drop if too many args */
|
|
return;
|
|
|
|
if (state->parc <= 0) { /* warn if not enough args */
|
|
if (MyUser(state->sptr))
|
|
need_more_params(state->sptr, state->dir == MODE_ADD ? "MODE +k" :
|
|
"MODE -k");
|
|
return;
|
|
}
|
|
|
|
t_str = state->parv[state->args_used++]; /* grab arg */
|
|
state->parc--;
|
|
state->max_args--;
|
|
|
|
/* If they're not an oper, they can't change modes */
|
|
if (state->flags & (MODE_PARSE_NOTOPER | MODE_PARSE_NOTMEMBER)) {
|
|
send_notoper(state);
|
|
return;
|
|
}
|
|
|
|
/* allow removing and then adding key, but not adding and then removing */
|
|
if (state->dir == MODE_ADD)
|
|
{
|
|
if (state->done & DONE_KEY_ADD)
|
|
return;
|
|
state->done |= DONE_KEY_ADD;
|
|
}
|
|
else
|
|
{
|
|
if (state->done & (DONE_KEY_ADD | DONE_KEY_DEL))
|
|
return;
|
|
state->done |= DONE_KEY_DEL;
|
|
}
|
|
|
|
/* If the key is invalid, tell the user and bail. */
|
|
if (!is_clean_key(state, t_str, state->dir == MODE_ADD ? "MODE +k" :
|
|
"MODE -k"))
|
|
return;
|
|
|
|
if (!state->mbuf)
|
|
return;
|
|
|
|
/* Skip if this is a burst, we have a key already and the new key is
|
|
* after the old one alphabetically */
|
|
if ((state->flags & MODE_PARSE_BURST) &&
|
|
*(state->chptr->mode.key) &&
|
|
ircd_strcmp(state->chptr->mode.key, t_str) <= 0)
|
|
return;
|
|
|
|
/* can't add a key if one is set, nor can one remove the wrong key */
|
|
if (!(state->flags & MODE_PARSE_FORCE))
|
|
if ((state->dir == MODE_ADD && *state->chptr->mode.key) ||
|
|
(state->dir == MODE_DEL &&
|
|
ircd_strcmp(state->chptr->mode.key, t_str))) {
|
|
send_reply(state->sptr, ERR_KEYSET, state->chptr->chname);
|
|
return;
|
|
}
|
|
|
|
if (!(state->flags & MODE_PARSE_WIPEOUT) && state->dir == MODE_ADD &&
|
|
!ircd_strcmp(state->chptr->mode.key, t_str))
|
|
return; /* no key change */
|
|
|
|
if (state->flags & MODE_PARSE_BOUNCE) {
|
|
if (*state->chptr->mode.key) /* reset old key */
|
|
modebuf_mode_string(state->mbuf, MODE_DEL | flag_p[0],
|
|
state->chptr->mode.key, 0);
|
|
else /* remove new bogus key */
|
|
modebuf_mode_string(state->mbuf, MODE_ADD | flag_p[0], t_str, 0);
|
|
} else /* send new key */
|
|
modebuf_mode_string(state->mbuf, state->dir | flag_p[0], t_str, 0);
|
|
|
|
if (state->flags & MODE_PARSE_SET) {
|
|
if (state->dir == MODE_DEL) /* remove the old key */
|
|
*state->chptr->mode.key = '\0';
|
|
else
|
|
ircd_strncpy(state->chptr->mode.key, t_str, KEYLEN + 1);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Helper function to convert user passes
|
|
*/
|
|
static void
|
|
mode_parse_upass(struct ParseState *state, int *flag_p)
|
|
{
|
|
char *t_str;
|
|
|
|
if (MyUser(state->sptr) && state->max_args <= 0) /* drop if too many args */
|
|
return;
|
|
|
|
if (state->parc <= 0) { /* warn if not enough args */
|
|
if (MyUser(state->sptr))
|
|
need_more_params(state->sptr, state->dir == MODE_ADD ? "MODE +U" :
|
|
"MODE -U");
|
|
return;
|
|
}
|
|
|
|
t_str = state->parv[state->args_used++]; /* grab arg */
|
|
state->parc--;
|
|
state->max_args--;
|
|
|
|
/* If they're not an oper, they can't change modes */
|
|
if (state->flags & (MODE_PARSE_NOTOPER | MODE_PARSE_NOTMEMBER)) {
|
|
send_notoper(state);
|
|
return;
|
|
}
|
|
|
|
/* If a non-service user is trying to force it, refuse. */
|
|
if (state->flags & MODE_PARSE_FORCE && MyUser(state->sptr)
|
|
&& !HasPriv(state->sptr, PRIV_APASS_OPMODE)) {
|
|
send_reply(state->sptr, ERR_NOTMANAGER, state->chptr->chname,
|
|
state->chptr->chname);
|
|
return;
|
|
}
|
|
|
|
/* If they are not the channel manager, they are not allowed to change it */
|
|
if (MyUser(state->sptr) && !(state->flags & MODE_PARSE_FORCE || IsChannelManager(state->member))) {
|
|
if (*state->chptr->mode.apass) {
|
|
send_reply(state->sptr, ERR_NOTMANAGER, state->chptr->chname,
|
|
state->chptr->chname);
|
|
} else {
|
|
send_reply(state->sptr, ERR_NOMANAGER, state->chptr->chname,
|
|
(TStime() - state->chptr->creationtime < 172800) ?
|
|
"approximately 4-5 minutes" : "approximately 48 hours");
|
|
}
|
|
return;
|
|
}
|
|
|
|
/* allow removing and then adding upass, but not adding and then removing */
|
|
if (state->dir == MODE_ADD)
|
|
{
|
|
if (state->done & DONE_UPASS_ADD)
|
|
return;
|
|
state->done |= DONE_UPASS_ADD;
|
|
}
|
|
else
|
|
{
|
|
if (state->done & (DONE_UPASS_ADD | DONE_UPASS_DEL))
|
|
return;
|
|
state->done |= DONE_UPASS_DEL;
|
|
}
|
|
|
|
/* If the Upass is invalid, tell the user and bail. */
|
|
if (!is_clean_key(state, t_str, state->dir == MODE_ADD ? "MODE +U" :
|
|
"MODE -U"))
|
|
return;
|
|
|
|
if (!state->mbuf)
|
|
return;
|
|
|
|
if (!(state->flags & MODE_PARSE_FORCE)) {
|
|
/* can't add the upass while apass is not set */
|
|
if (state->dir == MODE_ADD && !*state->chptr->mode.apass) {
|
|
send_reply(state->sptr, ERR_UPASSNOTSET, state->chptr->chname, state->chptr->chname);
|
|
return;
|
|
}
|
|
/* cannot set a +U password that is the same as +A */
|
|
if (state->dir == MODE_ADD && !ircd_strcmp(state->chptr->mode.apass, t_str)) {
|
|
send_reply(state->sptr, ERR_UPASS_SAME_APASS, state->chptr->chname);
|
|
return;
|
|
}
|
|
/* can't add a upass if one is set, nor can one remove the wrong upass */
|
|
if ((state->dir == MODE_ADD && *state->chptr->mode.upass) ||
|
|
(state->dir == MODE_DEL &&
|
|
ircd_strcmp(state->chptr->mode.upass, t_str))) {
|
|
send_reply(state->sptr, ERR_KEYSET, state->chptr->chname);
|
|
return;
|
|
}
|
|
}
|
|
|
|
if (!(state->flags & MODE_PARSE_WIPEOUT) && state->dir == MODE_ADD &&
|
|
!ircd_strcmp(state->chptr->mode.upass, t_str))
|
|
return; /* no upass change */
|
|
|
|
/* Skip if this is a burst, we have a Upass already and the new Upass is
|
|
* after the old one alphabetically */
|
|
if ((state->flags & MODE_PARSE_BURST) &&
|
|
*(state->chptr->mode.upass) &&
|
|
ircd_strcmp(state->chptr->mode.upass, t_str) <= 0)
|
|
return;
|
|
|
|
if (state->flags & MODE_PARSE_BOUNCE) {
|
|
if (*state->chptr->mode.upass) /* reset old upass */
|
|
modebuf_mode_string(state->mbuf, MODE_DEL | flag_p[0],
|
|
state->chptr->mode.upass, 0);
|
|
else /* remove new bogus upass */
|
|
modebuf_mode_string(state->mbuf, MODE_ADD | flag_p[0], t_str, 0);
|
|
} else /* send new upass */
|
|
modebuf_mode_string(state->mbuf, state->dir | flag_p[0], t_str, 0);
|
|
|
|
if (state->flags & MODE_PARSE_SET) {
|
|
if (state->dir == MODE_DEL) /* remove the old upass */
|
|
*state->chptr->mode.upass = '\0';
|
|
else
|
|
ircd_strncpy(state->chptr->mode.upass, t_str, KEYLEN + 1);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Helper function to convert admin passes
|
|
*/
|
|
static void
|
|
mode_parse_apass(struct ParseState *state, int *flag_p)
|
|
{
|
|
struct Membership *memb;
|
|
char *t_str;
|
|
|
|
if (MyUser(state->sptr) && state->max_args <= 0) /* drop if too many args */
|
|
return;
|
|
|
|
if (state->parc <= 0) { /* warn if not enough args */
|
|
if (MyUser(state->sptr))
|
|
need_more_params(state->sptr, state->dir == MODE_ADD ? "MODE +A" :
|
|
"MODE -A");
|
|
return;
|
|
}
|
|
|
|
t_str = state->parv[state->args_used++]; /* grab arg */
|
|
state->parc--;
|
|
state->max_args--;
|
|
|
|
/* If they're not an oper, they can't change modes */
|
|
if (state->flags & (MODE_PARSE_NOTOPER | MODE_PARSE_NOTMEMBER)) {
|
|
send_notoper(state);
|
|
return;
|
|
}
|
|
|
|
if (MyUser(state->sptr)) {
|
|
if (state->flags & MODE_PARSE_FORCE) {
|
|
/* If an unprivileged oper is trying to force it, refuse. */
|
|
if (!HasPriv(state->sptr, PRIV_APASS_OPMODE)) {
|
|
send_reply(state->sptr, ERR_NOTMANAGER, state->chptr->chname,
|
|
state->chptr->chname);
|
|
return;
|
|
}
|
|
} else {
|
|
/* If they are not the channel manager, they are not allowed to change it. */
|
|
if (!IsChannelManager(state->member)) {
|
|
if (*state->chptr->mode.apass) {
|
|
send_reply(state->sptr, ERR_NOTMANAGER, state->chptr->chname,
|
|
state->chptr->chname);
|
|
} else {
|
|
send_reply(state->sptr, ERR_NOMANAGER, state->chptr->chname,
|
|
(TStime() - state->chptr->creationtime < 172800) ?
|
|
"approximately 4-5 minutes" : "approximately 48 hours");
|
|
}
|
|
return;
|
|
}
|
|
/* Can't remove the Apass while Upass is still set. */
|
|
if (state->dir == MODE_DEL && *state->chptr->mode.upass) {
|
|
send_reply(state->sptr, ERR_UPASSSET, state->chptr->chname, state->chptr->chname);
|
|
return;
|
|
}
|
|
/* Can't add an Apass if one is set, nor can one remove the wrong Apass. */
|
|
if ((state->dir == MODE_ADD && *state->chptr->mode.apass) ||
|
|
(state->dir == MODE_DEL && ircd_strcmp(state->chptr->mode.apass, t_str))) {
|
|
send_reply(state->sptr, ERR_KEYSET, state->chptr->chname);
|
|
return;
|
|
}
|
|
}
|
|
|
|
/* Forbid removing the Apass if the channel is older than 48 hours
|
|
* unless an oper is doing it. */
|
|
if (TStime() - state->chptr->creationtime >= 172800
|
|
&& state->dir == MODE_DEL
|
|
&& !IsAnOper(state->sptr)) {
|
|
send_reply(state->sptr, ERR_CHANSECURED, state->chptr->chname);
|
|
return;
|
|
}
|
|
}
|
|
|
|
/* allow removing and then adding apass, but not adding and then removing */
|
|
if (state->dir == MODE_ADD)
|
|
{
|
|
if (state->done & DONE_APASS_ADD)
|
|
return;
|
|
state->done |= DONE_APASS_ADD;
|
|
}
|
|
else
|
|
{
|
|
if (state->done & (DONE_APASS_ADD | DONE_APASS_DEL))
|
|
return;
|
|
state->done |= DONE_APASS_DEL;
|
|
}
|
|
|
|
/* If the Apass is invalid, tell the user and bail. */
|
|
if (!is_clean_key(state, t_str, state->dir == MODE_ADD ? "MODE +A" :
|
|
"MODE -A"))
|
|
return;
|
|
|
|
if (!state->mbuf)
|
|
return;
|
|
|
|
if (!(state->flags & MODE_PARSE_WIPEOUT) && state->dir == MODE_ADD &&
|
|
!ircd_strcmp(state->chptr->mode.apass, t_str))
|
|
return; /* no apass change */
|
|
|
|
/* Skip if this is a burst, we have an Apass already and the new Apass is
|
|
* after the old one alphabetically */
|
|
if ((state->flags & MODE_PARSE_BURST) &&
|
|
*(state->chptr->mode.apass) &&
|
|
ircd_strcmp(state->chptr->mode.apass, t_str) <= 0)
|
|
return;
|
|
|
|
if (state->flags & MODE_PARSE_BOUNCE) {
|
|
if (*state->chptr->mode.apass) /* reset old apass */
|
|
modebuf_mode_string(state->mbuf, MODE_DEL | flag_p[0],
|
|
state->chptr->mode.apass, 0);
|
|
else /* remove new bogus apass */
|
|
modebuf_mode_string(state->mbuf, MODE_ADD | flag_p[0], t_str, 0);
|
|
} else /* send new apass */
|
|
modebuf_mode_string(state->mbuf, state->dir | flag_p[0], t_str, 0);
|
|
|
|
if (state->flags & MODE_PARSE_SET) {
|
|
if (state->dir == MODE_ADD) { /* set the new apass */
|
|
/* Only accept the new apass if there is no current apass or
|
|
* this is a BURST. */
|
|
if (state->chptr->mode.apass[0] == '\0' ||
|
|
(state->flags & MODE_PARSE_BURST))
|
|
ircd_strncpy(state->chptr->mode.apass, t_str, KEYLEN + 1);
|
|
/* Make it VERY clear to the user that this is a one-time password */
|
|
if (MyUser(state->sptr)) {
|
|
send_reply(state->sptr, RPL_APASSWARN_SET, state->chptr->mode.apass);
|
|
send_reply(state->sptr, RPL_APASSWARN_SECRET, state->chptr->chname,
|
|
state->chptr->mode.apass);
|
|
}
|
|
/* Give the channel manager level 0 ops.
|
|
There should not be tested for IsChannelManager here because
|
|
on the local server it is impossible to set the apass if one
|
|
isn't a channel manager and remote servers might need to sync
|
|
the oplevel here: when someone creates a channel (and becomes
|
|
channel manager) during a net.break, and only sets the Apass
|
|
after the net rejoined, they will have oplevel MAXOPLEVEL on
|
|
all remote servers. */
|
|
if (state->member)
|
|
SetOpLevel(state->member, 0);
|
|
} else { /* remove the old apass */
|
|
*state->chptr->mode.apass = '\0';
|
|
/* Clear Upass so that there is never a Upass set when a zannel is burst. */
|
|
*state->chptr->mode.upass = '\0';
|
|
if (MyUser(state->sptr))
|
|
send_reply(state->sptr, RPL_APASSWARN_CLEAR);
|
|
/* Revert everyone to MAXOPLEVEL. */
|
|
for (memb = state->chptr->members; memb; memb = memb->next_member) {
|
|
if (memb->status & MODE_CHANOP)
|
|
SetOpLevel(memb, MAXOPLEVEL);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/** Compare one ban's extent to another.
|
|
* This works very similarly to mmatch() but it knows about CIDR masks
|
|
* and ban exceptions. If both bans are CIDR-based, compare their
|
|
* address bits; otherwise, use mmatch().
|
|
* @param[in] old_ban One ban.
|
|
* @param[in] new_ban Another ban.
|
|
* @return Zero if \a old_ban is a superset of \a new_ban, non-zero otherwise.
|
|
*/
|
|
static int
|
|
bmatch(struct Ban *old_ban, struct Ban *new_ban)
|
|
{
|
|
int res;
|
|
assert(old_ban != NULL);
|
|
assert(new_ban != NULL);
|
|
/* A ban is never treated as a superset of an exception. */
|
|
if (!(old_ban->flags & BAN_EXCEPTION)
|
|
&& (new_ban->flags & BAN_EXCEPTION))
|
|
return 1;
|
|
/* If either is not an address mask, match the text masks. */
|
|
if ((old_ban->flags & new_ban->flags & BAN_IPMASK) == 0)
|
|
return mmatch(old_ban->banstr, new_ban->banstr);
|
|
/* If the old ban has a longer prefix than new, it cannot be a superset. */
|
|
if (old_ban->addrbits > new_ban->addrbits)
|
|
return 1;
|
|
/* Compare the masks before the hostname part. */
|
|
old_ban->banstr[old_ban->nu_len] = new_ban->banstr[new_ban->nu_len] = '\0';
|
|
res = mmatch(old_ban->banstr, new_ban->banstr);
|
|
old_ban->banstr[old_ban->nu_len] = new_ban->banstr[new_ban->nu_len] = '@';
|
|
if (res)
|
|
return res;
|
|
/* If the old ban's mask mismatches, cannot be a superset. */
|
|
if (!ipmask_check(&new_ban->address, &old_ban->address, old_ban->addrbits))
|
|
return 1;
|
|
/* Otherwise it depends on whether the old ban's text is a superset
|
|
* of the new. */
|
|
return mmatch(old_ban->banstr, new_ban->banstr);
|
|
}
|
|
|
|
/** Add a ban from a ban list and mark bans that should be removed
|
|
* because they overlap.
|
|
*
|
|
* There are three invariants for a ban list. First, no ban may be
|
|
* more specific than another ban. Second, no exception may be more
|
|
* specific than another exception. Finally, no ban may be more
|
|
* specific than any exception.
|
|
*
|
|
* @param[in,out] banlist Pointer to head of list.
|
|
* @param[in] newban Ban (or exception) to add (or remove).
|
|
* @param[in] do_free If non-zero, free \a newban on failure.
|
|
* @return Zero if \a newban could be applied, non-zero if not.
|
|
*/
|
|
int apply_ban(struct Ban **banlist, struct Ban *newban, int do_free)
|
|
{
|
|
struct Ban *ban;
|
|
//size_t count = 0;
|
|
|
|
assert(newban->flags & (BAN_ADD|BAN_DEL));
|
|
if (newban->flags & BAN_ADD) {
|
|
//size_t totlen = 0;
|
|
/* If a less specific *active* entry is found, fail. */
|
|
for (ban = *banlist; ban; ban = ban->next) {
|
|
if (!bmatch(ban, newban) && !(ban->flags & BAN_DEL)) {
|
|
if (do_free)
|
|
free_ban(newban);
|
|
return 1;
|
|
}
|
|
//if (!(ban->flags & (BAN_OVERLAPPED|BAN_DEL))) {
|
|
// count++;
|
|
// totlen += strlen(ban->banstr);
|
|
//}
|
|
}
|
|
/* Mark more specific entries and add this one to the end of the list. */
|
|
while ((ban = *banlist) != NULL) {
|
|
if (!bmatch(newban, ban)) {
|
|
ban->flags |= BAN_OVERLAPPED | BAN_DEL;
|
|
}
|
|
banlist = &ban->next;
|
|
}
|
|
*banlist = newban;
|
|
return 0;
|
|
} else if (newban->flags & BAN_DEL) {
|
|
size_t remove_count = 0;
|
|
/* Mark more specific entries. */
|
|
for (ban = *banlist; ban; ban = ban->next) {
|
|
if (!bmatch(newban, ban)) {
|
|
ban->flags |= BAN_OVERLAPPED | BAN_DEL;
|
|
remove_count++;
|
|
}
|
|
}
|
|
if (remove_count)
|
|
return 0;
|
|
/* If no matches were found, fail. */
|
|
if (do_free)
|
|
free_ban(newban);
|
|
return 3;
|
|
}
|
|
if (do_free)
|
|
free_ban(newban);
|
|
return 4;
|
|
}
|
|
|
|
/** Add a ban exception from a ban exception list and mark ban
|
|
* exceptions that should be removed because they overlap.
|
|
*
|
|
* @param[in,out] exceptlist Pointer to head of list.
|
|
* @param[in] newban Ban exception to add (or remove).
|
|
* @param[in] do_free If non-zero, free \a newban on failure.
|
|
* @return Zero if \a newban could be applied, non-zero if not.
|
|
*/
|
|
int apply_except(struct Ban **exceptlist, struct Ban *newban, int do_free)
|
|
{
|
|
struct Ban *ban;
|
|
//size_t count = 0;
|
|
|
|
assert(newban->flags & (BAN_ADD|BAN_DEL));
|
|
if (newban->flags & BAN_ADD) {
|
|
//size_t totlen = 0;
|
|
/* If a less specific *active* entry is found, fail. */
|
|
for (ban = *exceptlist; ban; ban = ban->next) {
|
|
if (!bmatch(ban, newban) && !(ban->flags & BAN_DEL)) {
|
|
if (do_free)
|
|
free_ban(newban);
|
|
return 1;
|
|
}
|
|
//if (!(ban->flags & (BAN_OVERLAPPED|BAN_DEL))) {
|
|
// count++;
|
|
// totlen += strlen(ban->banstr);
|
|
//}
|
|
}
|
|
/* Mark more specific entries and add this one to the end of the list. */
|
|
while ((ban = *exceptlist) != NULL) {
|
|
if (!bmatch(newban, ban)) {
|
|
ban->flags |= BAN_OVERLAPPED | BAN_DEL;
|
|
}
|
|
exceptlist = &ban->next;
|
|
}
|
|
*exceptlist = newban;
|
|
return 0;
|
|
} else if (newban->flags & BAN_DEL) {
|
|
size_t remove_count = 0;
|
|
/* Mark more specific entries. */
|
|
for (ban = *exceptlist; ban; ban = ban->next) {
|
|
if (!bmatch(newban, ban)) {
|
|
ban->flags |= BAN_OVERLAPPED | BAN_DEL;
|
|
remove_count++;
|
|
}
|
|
}
|
|
if (remove_count)
|
|
return 0;
|
|
/* If no matches were found, fail. */
|
|
if (do_free)
|
|
free_ban(newban);
|
|
return 3;
|
|
}
|
|
if (do_free)
|
|
free_ban(newban);
|
|
return 4;
|
|
}
|
|
|
|
/*
|
|
* Helper function to convert bans
|
|
*/
|
|
static void
|
|
mode_parse_ban(struct ParseState *state, int *flag_p)
|
|
{
|
|
char *t_str, *s, *pmask;
|
|
struct Ban *ban, *newban;
|
|
|
|
if (state->parc <= 0) { /* Not enough args, send ban list */
|
|
if (MyUser(state->sptr) && !(state->done & DONE_BANLIST)) {
|
|
send_ban_list(state->sptr, state->chptr);
|
|
state->done |= DONE_BANLIST;
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
if (MyUser(state->sptr) && state->max_args <= 0) /* drop if too many args */
|
|
return;
|
|
|
|
t_str = state->parv[state->args_used++]; /* grab arg */
|
|
state->parc--;
|
|
state->max_args--;
|
|
|
|
/* If they're not an oper, they can't change modes */
|
|
if ((state->flags & (MODE_PARSE_NOTOPER | MODE_PARSE_NOTMEMBER)) &&
|
|
!(state->flags & MODE_PARSE_ISHALFOP)) {
|
|
send_notoper(state);
|
|
return;
|
|
}
|
|
|
|
if ((s = strchr(t_str, ' ')))
|
|
*s = '\0';
|
|
|
|
if (!*t_str || *t_str == ':') { /* warn if empty */
|
|
if (MyUser(state->sptr))
|
|
need_more_params(state->sptr, state->dir == MODE_ADD ? "MODE +b" :
|
|
"MODE -b");
|
|
return;
|
|
}
|
|
|
|
if (!(pmask = pretty_extmask(t_str)))
|
|
return;
|
|
|
|
/* Clear all ADD/DEL/OVERLAPPED flags from ban list. */
|
|
if (!(state->done & DONE_BANCLEAN)) {
|
|
for (ban = state->chptr->banlist; ban; ban = ban->next)
|
|
ban->flags &= ~(BAN_ADD | BAN_DEL | BAN_OVERLAPPED);
|
|
state->done |= DONE_BANCLEAN;
|
|
}
|
|
|
|
/* remember the ban for the moment... */
|
|
newban = state->banlist + (state->numbans++);
|
|
newban->next = 0;
|
|
newban->flags = ((state->dir == MODE_ADD) ? BAN_ADD : BAN_DEL)
|
|
| (*flag_p == MODE_BAN ? 0 : BAN_EXCEPTION);
|
|
set_ban_mask(newban, pmask);
|
|
ircd_strncpy(newban->who, IsUser(state->sptr) ? cli_name(state->sptr) : "*", NICKLEN + 1);
|
|
newban->when = TStime();
|
|
apply_ban(&state->chptr->banlist, newban, 0);
|
|
}
|
|
|
|
/*
|
|
* This is the bottom half of the ban processor
|
|
*/
|
|
static void
|
|
mode_process_bans(struct ParseState *state)
|
|
{
|
|
struct Ban *ban, *newban, *prevban, *nextban;
|
|
int count = 0;
|
|
int len = 0;
|
|
int banlen;
|
|
int changed = 0;
|
|
int isjban = 0;
|
|
int extjbans = 0;
|
|
|
|
for (prevban = 0, ban = state->chptr->banlist; ban; ban = nextban) {
|
|
count++;
|
|
banlen = strlen(ban->banstr);
|
|
len += banlen;
|
|
nextban = ban->next;
|
|
|
|
isjban = ((ban->flags & BAN_EXTENDED) && (ban->extban.flags & EBAN_JOIN) ? 1 : 0);
|
|
|
|
if (isjban)
|
|
extjbans++;
|
|
|
|
if ((ban->flags & (BAN_DEL | BAN_ADD)) == (BAN_DEL | BAN_ADD)) {
|
|
if (prevban)
|
|
prevban->next = 0; /* Break the list; ban isn't a real ban */
|
|
else
|
|
state->chptr->banlist = 0;
|
|
|
|
if (isjban)
|
|
extjbans--;
|
|
count--;
|
|
len -= banlen;
|
|
|
|
continue;
|
|
} else if (ban->flags & BAN_DEL) { /* Deleted a ban? */
|
|
char *bandup;
|
|
DupString(bandup, ban->banstr);
|
|
modebuf_mode_string(state->mbuf, MODE_DEL | MODE_BAN,
|
|
bandup, 1);
|
|
|
|
if (state->flags & MODE_PARSE_SET) { /* Ok, make it take effect */
|
|
if (prevban) /* clip it out of the list... */
|
|
prevban->next = ban->next;
|
|
else
|
|
state->chptr->banlist = ban->next;
|
|
|
|
if (isjban)
|
|
extjbans--;
|
|
count--;
|
|
len -= banlen;
|
|
free_ban(ban);
|
|
|
|
changed++;
|
|
continue; /* next ban; keep prevban like it is */
|
|
} else
|
|
ban->flags &= BAN_IPMASK | BAN_EXTENDED; /* unset other flags */
|
|
} else if (ban->flags & BAN_ADD) { /* adding a ban? */
|
|
if (prevban)
|
|
prevban->next = 0; /* Break the list; ban isn't a real ban */
|
|
else
|
|
state->chptr->banlist = 0;
|
|
|
|
/* If we're supposed to ignore it, do so. */
|
|
if (ban->flags & BAN_OVERLAPPED &&
|
|
!(state->flags & MODE_PARSE_BOUNCE)) {
|
|
if (isjban)
|
|
extjbans--;
|
|
count--;
|
|
len -= banlen;
|
|
} else {
|
|
if (state->flags & MODE_PARSE_SET && MyUser(state->sptr) &&
|
|
!(state->mbuf->mb_dest & MODEBUF_DEST_OPMODE) &&
|
|
(len > (feature_int(FEAT_AVBANLEN) * feature_int(FEAT_MAXBANS)) ||
|
|
count > feature_int(FEAT_MAXBANS))) {
|
|
send_reply(state->sptr, ERR_BANLISTFULL, state->chptr->chname,
|
|
ban->banstr);
|
|
if (isjban)
|
|
extjbans--;
|
|
count--;
|
|
len -= banlen;
|
|
} else if ((state->flags & MODE_PARSE_SET) && MyUser(state->sptr) &&
|
|
(ban->flags & BAN_EXTENDED) && !check_extban_feats(&ban->extban)) {
|
|
if (isjban)
|
|
extjbans--;
|
|
count--;
|
|
len -= banlen;
|
|
} else if ((state->flags & MODE_PARSE_SET) && MyUser(state->sptr) && isjban &&
|
|
((extjbans > feature_int(FEAT_EXTBAN_j_MAXPERCHAN)) ||
|
|
!ircd_strcmp(ban->extban.mask, state->chptr->chname))) {
|
|
extjbans--;
|
|
count--;
|
|
len -= banlen;
|
|
} else {
|
|
char *bandup;
|
|
/* add the ban to the buffer */
|
|
DupString(bandup, ban->banstr);
|
|
modebuf_mode_string(state->mbuf, MODE_ADD | MODE_BAN,
|
|
bandup, 1);
|
|
|
|
if (state->flags & MODE_PARSE_SET) { /* create a new ban */
|
|
newban = make_ban(ban->banstr);
|
|
strcpy(newban->who, ban->who);
|
|
newban->when = ban->when;
|
|
newban->flags = ban->flags & (BAN_IPMASK | BAN_EXTENDED);
|
|
|
|
newban->next = state->chptr->banlist; /* and link it in */
|
|
state->chptr->banlist = newban;
|
|
|
|
changed++;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
prevban = ban;
|
|
} /* for (prevban = 0, ban = state->chptr->banlist; ban; ban = nextban) { */
|
|
|
|
if (changed) /* if we changed the ban list, we must invalidate the bans */
|
|
mode_ban_invalidate(state->chptr);
|
|
}
|
|
|
|
/*
|
|
* Helper function to convert ban exceptions
|
|
*/
|
|
static void
|
|
mode_parse_except(struct ParseState *state, int *flag_p)
|
|
{
|
|
char *t_str, *s, *pmask;
|
|
struct Ban *ban, *newban;
|
|
|
|
if (state->parc <= 0) { /* Not enough args, send ban exception list */
|
|
if (MyUser(state->sptr) && !(state->done & DONE_EXCEPTLIST)) {
|
|
send_except_list(state->sptr, state->chptr);
|
|
state->done |= DONE_EXCEPTLIST;
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
if (MyUser(state->sptr) && state->max_args <= 0) /* drop if too many args */
|
|
return;
|
|
|
|
t_str = state->parv[state->args_used++]; /* grab arg */
|
|
state->parc--;
|
|
state->max_args--;
|
|
|
|
/* If they're not an oper, they can't change modes */
|
|
if (state->flags & (MODE_PARSE_NOTOPER | MODE_PARSE_NOTMEMBER)) {
|
|
send_notoper(state);
|
|
return;
|
|
}
|
|
if ((s = strchr(t_str, ' ')))
|
|
*s = '\0';
|
|
|
|
if (!*t_str || *t_str == ':') { /* warn if empty */
|
|
if (MyUser(state->sptr))
|
|
need_more_params(state->sptr, state->dir == MODE_ADD ? "MODE +b" :
|
|
"MODE -b");
|
|
return;
|
|
}
|
|
|
|
if (!(pmask = pretty_extmask(t_str)))
|
|
return;
|
|
|
|
/* Clear all ADD/DEL/OVERLAPPED flags from ban exception list. */
|
|
if (!(state->done & DONE_EXCEPTCLEAN)) {
|
|
for (ban = state->chptr->exceptlist; ban; ban = ban->next)
|
|
ban->flags &= ~(BAN_ADD | BAN_DEL | BAN_OVERLAPPED);
|
|
state->done |= DONE_EXCEPTCLEAN;
|
|
}
|
|
|
|
/* remember the ban exception for the moment... */
|
|
newban = state->exceptlist + (state->numbans++);
|
|
newban->next = 0;
|
|
newban->flags = ((state->dir == MODE_ADD) ? BAN_ADD : BAN_DEL)
|
|
| (*flag_p == MODE_EXCEPT ? 0 : BAN_EXCEPTION);
|
|
set_ban_mask(newban, pmask);
|
|
ircd_strncpy(newban->who, IsUser(state->sptr) ? cli_name(state->sptr) : "*", NICKLEN + 1);
|
|
newban->when = TStime();
|
|
apply_except(&state->chptr->exceptlist, newban, 0);
|
|
}
|
|
|
|
/*
|
|
* This is the bottom half of the ban exception processor
|
|
*/
|
|
static void
|
|
mode_process_excepts(struct ParseState *state)
|
|
{
|
|
struct Ban *ban, *newban, *prevban, *nextban;
|
|
int count = 0;
|
|
int len = 0;
|
|
int banlen;
|
|
int changed = 0;
|
|
int isjban = 0;
|
|
int extjbans = 0;
|
|
|
|
for (prevban = 0, ban = state->chptr->exceptlist; ban; ban = nextban) {
|
|
count++;
|
|
banlen = strlen(ban->banstr);
|
|
len += banlen;
|
|
nextban = ban->next;
|
|
|
|
isjban = ((ban->flags & BAN_EXTENDED) && (ban->extban.flags & EBAN_JOIN) ? 1 : 0);
|
|
|
|
if (isjban)
|
|
extjbans++;
|
|
|
|
if ((ban->flags & (BAN_DEL | BAN_ADD)) == (BAN_DEL | BAN_ADD)) {
|
|
if (prevban)
|
|
prevban->next = 0; /* Break the list; ban isn't a real ban exception */
|
|
else
|
|
state->chptr->exceptlist = 0;
|
|
|
|
if (isjban)
|
|
extjbans--;
|
|
count--;
|
|
len -= banlen;
|
|
|
|
continue;
|
|
} else if (ban->flags & BAN_DEL) { /* Deleted a ban exception? */
|
|
char *bandup;
|
|
DupString(bandup, ban->banstr);
|
|
modebuf_mode_string(state->mbuf, MODE_DEL | MODE_EXCEPT,
|
|
bandup, 1);
|
|
|
|
if (state->flags & MODE_PARSE_SET) { /* Ok, make it take effect */
|
|
if (prevban) /* clip it out of the list... */
|
|
prevban->next = ban->next;
|
|
else
|
|
state->chptr->exceptlist = ban->next;
|
|
|
|
if (isjban)
|
|
extjbans--;
|
|
count--;
|
|
len -= banlen;
|
|
free_ban(ban);
|
|
|
|
changed++;
|
|
continue; /* next ban exception; keep prevban like it is */
|
|
} else
|
|
ban->flags &= (BAN_IPMASK | BAN_EXTENDED); /* unset other flags */
|
|
} else if (ban->flags & BAN_ADD) { /* adding a ban exception? */
|
|
if (prevban)
|
|
prevban->next = 0; /* Break the list; ban isn't a real ban exception */
|
|
else
|
|
state->chptr->exceptlist = 0;
|
|
|
|
/* If we're supposed to ignore it, do so. */
|
|
if (ban->flags & BAN_OVERLAPPED &&
|
|
!(state->flags & MODE_PARSE_BOUNCE)) {
|
|
if (isjban)
|
|
extjbans--;
|
|
count--;
|
|
len -= banlen;
|
|
} else {
|
|
if (state->flags & MODE_PARSE_SET && MyUser(state->sptr) &&
|
|
!(state->mbuf->mb_dest & MODEBUF_DEST_OPMODE) &&
|
|
(len > (feature_int(FEAT_AVEXCEPTLEN) * feature_int(FEAT_MAXEXCEPTS)) ||
|
|
count > feature_int(FEAT_MAXEXCEPTS))) {
|
|
send_reply(state->sptr, ERR_EXCEPTLISTFULL, state->chptr->chname,
|
|
ban->banstr);
|
|
if (isjban)
|
|
extjbans--;
|
|
count--;
|
|
len -= banlen;
|
|
} else if ((state->flags & MODE_PARSE_SET) && MyUser(state->sptr) &&
|
|
(ban->flags & BAN_EXTENDED) && !check_extban_feats(&ban->extban)) {
|
|
if (isjban)
|
|
extjbans--;
|
|
count--;
|
|
len -= banlen;
|
|
} else if ((state->flags & MODE_PARSE_SET) && MyUser(state->sptr) && isjban &&
|
|
((extjbans > feature_int(FEAT_EXTBAN_j_MAXPERCHAN)) ||
|
|
!ircd_strcmp(ban->extban.mask, state->chptr->chname))) {
|
|
extjbans--;
|
|
count--;
|
|
len -= banlen;
|
|
} else {
|
|
char *bandup;
|
|
/* add the ban exception to the buffer */
|
|
DupString(bandup, ban->banstr);
|
|
modebuf_mode_string(state->mbuf, MODE_ADD | MODE_EXCEPT,
|
|
bandup, 1);
|
|
|
|
if (state->flags & MODE_PARSE_SET) { /* create a new ban exception */
|
|
newban = make_ban(ban->banstr);
|
|
strcpy(newban->who, ban->who);
|
|
newban->when = ban->when;
|
|
newban->flags = ban->flags & (BAN_IPMASK | BAN_EXTENDED);
|
|
|
|
newban->next = state->chptr->exceptlist; /* and link it in */
|
|
state->chptr->exceptlist = newban;
|
|
|
|
changed++;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
prevban = ban;
|
|
} /* for (prevban = 0, ban = state->chptr->exceptlist; ban; ban = nextban) { */
|
|
|
|
if (changed) /* if we changed the except list, we must invalidate the ban exceptions */
|
|
mode_except_invalidate(state->chptr);
|
|
}
|
|
|
|
static void
|
|
mode_parse_dummy(struct ParseState *state, int *flag_p)
|
|
{
|
|
if (MyUser(state->sptr) && state->max_args <= 0) /* drop if too many args */
|
|
return;
|
|
|
|
if (state->parc <= 0) /* return if not enough args */
|
|
return;
|
|
|
|
state->args_used++;
|
|
state->parc--;
|
|
state->max_args--;
|
|
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* Helper function to process client changes
|
|
*/
|
|
static void
|
|
mode_parse_client(struct ParseState *state, int *flag_p)
|
|
{
|
|
char *t_str;
|
|
char *colon;
|
|
struct Client *acptr;
|
|
struct Membership *member;
|
|
int oplevel = MAXOPLEVEL + 1;
|
|
int req_oplevel;
|
|
int notoper = 0;
|
|
int i;
|
|
|
|
if (MyUser(state->sptr) && state->max_args <= 0) /* drop if too many args */
|
|
return;
|
|
|
|
if (state->parc <= 0) /* return if not enough args */
|
|
return;
|
|
|
|
t_str = state->parv[state->args_used++]; /* grab arg */
|
|
state->parc--;
|
|
state->max_args--;
|
|
|
|
/* If they're not an oper, they can't change modes */
|
|
if ((state->flags & (MODE_PARSE_NOTOPER | MODE_PARSE_NOTMEMBER)) &&
|
|
!((*flag_p == MODE_VOICE) && (state->flags & MODE_PARSE_ISHALFOP)))
|
|
notoper = 1;
|
|
|
|
if (notoper && (state->dir != MODE_DEL)) {
|
|
send_notoper(state);
|
|
return;
|
|
}
|
|
|
|
if (MyUser(state->sptr)) {
|
|
colon = strchr(t_str, ':');
|
|
if (colon != NULL) {
|
|
*colon++ = '\0';
|
|
req_oplevel = atoi(colon);
|
|
if (*flag_p == CHFL_VOICE || *flag_p == CHFL_HALFOP || state->dir == MODE_DEL) {
|
|
/* Ignore the colon and its argument. */
|
|
} else if (!(state->flags & MODE_PARSE_FORCE)
|
|
&& state->member
|
|
&& (req_oplevel < OpLevel(state->member)
|
|
|| (req_oplevel == OpLevel(state->member)
|
|
&& OpLevel(state->member) < MAXOPLEVEL)
|
|
|| req_oplevel > MAXOPLEVEL)) {
|
|
send_reply(state->sptr, ERR_NOTLOWEROPLEVEL,
|
|
t_str, state->chptr->chname,
|
|
OpLevel(state->member), req_oplevel, "op",
|
|
OpLevel(state->member) == req_oplevel ? "the same" : "a higher");
|
|
} else if (req_oplevel <= MAXOPLEVEL)
|
|
oplevel = req_oplevel;
|
|
}
|
|
/* find client we're manipulating */
|
|
acptr = find_chasing(state->sptr, t_str, NULL);
|
|
} else {
|
|
if (t_str[5] == ':') {
|
|
t_str[5] = '\0';
|
|
oplevel = atoi(t_str + 6);
|
|
}
|
|
acptr = findNUser(t_str);
|
|
}
|
|
|
|
if (!acptr)
|
|
return; /* find_chasing() already reported an error to the user */
|
|
|
|
if (notoper && (state->dir == MODE_DEL) &&
|
|
!((state->sptr == acptr) && (*flag_p == CHFL_HALFOP) && feature_bool(FEAT_HALFOP_DEHALFOP_SELF))) {
|
|
send_notoper(state);
|
|
return;
|
|
}
|
|
|
|
for (i = 0; i < MAXPARA; i++) /* find an element to stick them in */
|
|
if (!state->cli_change[i].flag || (state->cli_change[i].client == acptr &&
|
|
state->cli_change[i].flag & flag_p[0]))
|
|
break; /* found a slot */
|
|
|
|
/* If we are going to bounce this deop, mark the correct oplevel. */
|
|
if (state->flags & MODE_PARSE_BOUNCE
|
|
&& state->dir == MODE_DEL
|
|
&& flag_p[0] == MODE_CHANOP
|
|
&& (member = find_member_link(state->chptr, acptr)))
|
|
oplevel = OpLevel(member);
|
|
|
|
/* Store what we're doing to them */
|
|
state->cli_change[i].flag = state->dir | flag_p[0];
|
|
state->cli_change[i].oplevel = oplevel;
|
|
state->cli_change[i].client = acptr;
|
|
}
|
|
|
|
/*
|
|
* Helper function to process the changed client list
|
|
*/
|
|
static void
|
|
mode_process_clients(struct ParseState *state)
|
|
{
|
|
int i;
|
|
int newoplevel = MAXOPLEVEL + 1;
|
|
struct Membership *member;
|
|
|
|
for (i = 0; state->cli_change[i].flag; i++) {
|
|
assert(0 != state->cli_change[i].client);
|
|
|
|
/* look up member link */
|
|
if (!(member = find_member_link(state->chptr,
|
|
state->cli_change[i].client)) ||
|
|
(MyUser(state->sptr) && IsZombie(member))) {
|
|
if (MyUser(state->sptr))
|
|
send_reply(state->sptr, ERR_USERNOTINCHANNEL,
|
|
cli_name(state->cli_change[i].client),
|
|
state->chptr->chname);
|
|
continue;
|
|
}
|
|
|
|
newoplevel = MAXOPLEVEL + 1;
|
|
/* get op-level for member being opped */
|
|
if ((state->cli_change[i].flag & (MODE_ADD | MODE_CHANOP)) ==
|
|
(MODE_ADD | MODE_CHANOP)) {
|
|
/* If a valid oplevel was specified, use it.
|
|
* Otherwise, if being opped by an outsider, get MAXOPLEVEL.
|
|
* Otherwise, if not an apass channel, or state->member has
|
|
* MAXOPLEVEL, get oplevel MAXOPLEVEL.
|
|
* Otherwise, get state->member's oplevel+1.
|
|
*/
|
|
if (state->cli_change[i].oplevel <= MAXOPLEVEL)
|
|
newoplevel = state->cli_change[i].oplevel;
|
|
else if (!state->member)
|
|
newoplevel = MAXOPLEVEL;
|
|
else if (OpLevel(state->member) >= MAXOPLEVEL)
|
|
newoplevel = OpLevel(state->member);
|
|
else
|
|
newoplevel = OpLevel(state->member) + 1;
|
|
}
|
|
|
|
if ((state->cli_change[i].flag & MODE_ADD &&
|
|
(state->cli_change[i].flag & member->status) &&
|
|
(!feature_bool(FEAT_ALLOW_OPLEVEL_CHANGE) ||
|
|
(newoplevel == member->oplevel))) ||
|
|
(state->cli_change[i].flag & MODE_DEL &&
|
|
!(state->cli_change[i].flag & member->status)))
|
|
continue; /* no change made, don't do anything */
|
|
|
|
/* see if the deop is allowed */
|
|
if ((state->cli_change[i].flag & (MODE_DEL | MODE_CHANOP)) ==
|
|
(MODE_DEL | MODE_CHANOP)) {
|
|
/* prevent +k users from being deopped */
|
|
if ((IsChannelService(state->cli_change[i].client) && IsService(cli_user(state->cli_change[i].client)->server))
|
|
|| (IsChannelService(state->cli_change[i].client) && !IsXtraOp(state->sptr))) {
|
|
if (state->flags & MODE_PARSE_FORCE) /* it was forced */
|
|
sendto_opmask_butone(0, SNO_HACK4, "Deop of +k user on %H by %s",
|
|
state->chptr,
|
|
(IsServer(state->sptr) ? cli_name(state->sptr) :
|
|
cli_name((cli_user(state->sptr))->server)));
|
|
|
|
else if (MyUser(state->sptr) && state->flags & MODE_PARSE_SET) {
|
|
if(IsService(cli_user(state->cli_change[i].client)->server) && IsChannelService(state->cli_change[i].client)){
|
|
send_reply(state->sptr, ERR_ISCHANSERVICE,
|
|
cli_name(state->cli_change[i].client),
|
|
state->chptr->chname, "a network service");
|
|
}else{
|
|
send_reply(state->sptr, ERR_ISCHANSERVICE,
|
|
cli_name(state->cli_change[i].client),
|
|
state->chptr->chname, "an IRC operator");
|
|
}
|
|
continue;
|
|
}
|
|
}
|
|
|
|
/* check deop for local user */
|
|
if (MyUser(state->sptr)) {
|
|
|
|
/* don't allow local opers to be deopped on local channels */
|
|
if (state->cli_change[i].client != state->sptr &&
|
|
IsLocalChannel(state->chptr->chname) &&
|
|
HasPriv(state->cli_change[i].client, PRIV_DEOP_LCHAN)) {
|
|
send_reply(state->sptr, ERR_ISOPERLCHAN,
|
|
cli_name(state->cli_change[i].client),
|
|
state->chptr->chname);
|
|
continue;
|
|
}
|
|
|
|
/* Forbid deopping other members with an oplevel less than
|
|
* one's own level, and other members with an oplevel the same
|
|
* as one's own unless both are at MAXOPLEVEL. */
|
|
if (state->sptr != state->cli_change[i].client
|
|
&& state->member
|
|
&& ((OpLevel(member) < OpLevel(state->member))
|
|
|| (OpLevel(member) == OpLevel(state->member)
|
|
&& OpLevel(member) < MAXOPLEVEL))) {
|
|
int equal = (OpLevel(member) == OpLevel(state->member));
|
|
send_reply(state->sptr, ERR_NOTLOWEROPLEVEL,
|
|
cli_name(state->cli_change[i].client),
|
|
state->chptr->chname,
|
|
OpLevel(state->member), OpLevel(member),
|
|
"deop", equal ? "the same" : "a higher");
|
|
continue;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* set op-level of member being opped */
|
|
if ((state->cli_change[i].flag & (MODE_ADD | MODE_CHANOP)) ==
|
|
(MODE_ADD | MODE_CHANOP)) {
|
|
SetOpLevel(member, newoplevel);
|
|
}
|
|
|
|
/* actually effect the change */
|
|
if (state->flags & MODE_PARSE_SET) {
|
|
if (state->cli_change[i].flag & MODE_ADD) {
|
|
if (IsDelayedJoin(member) && !IsZombie(member))
|
|
RevealDelayedJoin(member);
|
|
member->status |= (state->cli_change[i].flag &
|
|
(MODE_CHANOP | MODE_HALFOP | MODE_VOICE));
|
|
if (state->cli_change[i].flag & MODE_CHANOP)
|
|
ClearDeopped(member);
|
|
} else
|
|
member->status &= ~(state->cli_change[i].flag &
|
|
(MODE_CHANOP | MODE_HALFOP | MODE_VOICE));
|
|
}
|
|
|
|
/* accumulate the change */
|
|
modebuf_mode_client(state->mbuf, state->cli_change[i].flag,
|
|
state->cli_change[i].client,
|
|
state->cli_change[i].oplevel);
|
|
} /* for (i = 0; state->cli_change[i].flags; i++) */
|
|
}
|
|
|
|
/*
|
|
* Helper function to process the simple modes
|
|
*/
|
|
static void
|
|
mode_parse_mode(struct ParseState *state, int *flag_p)
|
|
{
|
|
/* If they're not an oper, they can't change modes */
|
|
if (state->flags & (MODE_PARSE_NOTOPER | MODE_PARSE_NOTMEMBER)) {
|
|
send_notoper(state);
|
|
return;
|
|
}
|
|
|
|
if (!state->mbuf)
|
|
return;
|
|
|
|
/* Local users are not permitted to change registration status */
|
|
if (flag_p[0] == MODE_REGISTERED && !(state->flags & MODE_PARSE_FORCE) &&
|
|
MyUser(state->sptr))
|
|
return;
|
|
|
|
if (state->dir == MODE_ADD) {
|
|
state->add |= flag_p[0];
|
|
state->del &= ~flag_p[0];
|
|
|
|
if (flag_p[0] & MODE_SECRET) {
|
|
state->add &= ~MODE_PRIVATE;
|
|
state->del |= MODE_PRIVATE;
|
|
} else if (flag_p[0] & MODE_PRIVATE) {
|
|
state->add &= ~MODE_SECRET;
|
|
state->del |= MODE_SECRET;
|
|
}
|
|
} else {
|
|
state->add &= ~flag_p[0];
|
|
state->del |= flag_p[0];
|
|
}
|
|
|
|
assert(0 == (state->add & state->del));
|
|
assert((MODE_SECRET | MODE_PRIVATE) !=
|
|
(state->add & (MODE_SECRET | MODE_PRIVATE)));
|
|
}
|
|
|
|
static void
|
|
mode_parse_exmode(struct ParseState *state, int *flag_p)
|
|
{
|
|
/* If they're not an oper, they can't change modes */
|
|
if (state->flags & (MODE_PARSE_NOTOPER | MODE_PARSE_NOTMEMBER)) {
|
|
send_notoper(state);
|
|
return;
|
|
}
|
|
if (!state->mbuf)
|
|
return;
|
|
|
|
if (state->dir == MODE_ADD) {
|
|
state->exadd |= flag_p[0];
|
|
state->exdel &= ~flag_p[0];
|
|
|
|
if (flag_p[0] & EXMODE_STRIPCOLOR) {
|
|
state->exadd &= ~EXMODE_NOCOLOR;
|
|
state->exdel |= EXMODE_NOCOLOR;
|
|
} else if (flag_p[0] & EXMODE_NOCOLOR) {
|
|
state->exadd &= ~EXMODE_STRIPCOLOR;
|
|
state->exdel |= EXMODE_STRIPCOLOR;
|
|
}
|
|
} else {
|
|
state->exadd &= ~flag_p[0];
|
|
state->exdel |= flag_p[0];
|
|
}
|
|
|
|
assert(0 == (state->exadd & state->exdel));
|
|
}
|
|
|
|
/**
|
|
* This routine is intended to parse MODE or OPMODE commands and effect the
|
|
* changes (or just build the bounce buffer).
|
|
*
|
|
* \param[out] mbuf Receives parsed representation of mode change.
|
|
* \param[in] cptr Connection that sent the message to this server.
|
|
* \param[in] sptr Original source of the message.
|
|
* \param[in] chptr Channel whose modes are being changed.
|
|
* \param[in] parc Number of valid strings in \a parv.
|
|
* \param[in] parv Text arguments representing mode change, with the
|
|
* zero'th element containing a string like "+m" or "-o".
|
|
* \param[in] flags Set of bitwise MODE_PARSE_* flags.
|
|
* \param[in] member If non-null, the channel member attempting to change the modes.
|
|
*/
|
|
int
|
|
mode_parse(struct ModeBuf *mbuf, struct Client *cptr, struct Client *sptr,
|
|
struct Channel *chptr, int parc, char *parv[], unsigned int flags,
|
|
struct Membership* member)
|
|
{
|
|
static int chan_flags[] = {
|
|
MODE_CHANOP, 'o',
|
|
MODE_HALFOP, 'h',
|
|
MODE_VOICE, 'v',
|
|
MODE_PRIVATE, 'p',
|
|
MODE_SECRET, 's',
|
|
MODE_MODERATED, 'm',
|
|
MODE_TOPICLIMIT, 't',
|
|
MODE_INVITEONLY, 'i',
|
|
MODE_NOPRIVMSGS, 'n',
|
|
MODE_KEY, 'k',
|
|
MODE_APASS, 'A',
|
|
MODE_UPASS, 'U',
|
|
MODE_REGISTERED, 'R',
|
|
MODE_BAN, 'b',
|
|
MODE_EXCEPT, 'e',
|
|
MODE_LIMIT, 'l',
|
|
MODE_REDIRECT, 'L',
|
|
MODE_REGONLY, 'r',
|
|
MODE_DELJOINS, 'D',
|
|
MODE_ADD, '+',
|
|
MODE_DEL, '-',
|
|
0x0, 0x0
|
|
};
|
|
|
|
static int chan_exflags[] = {
|
|
EXMODE_ADMINONLY, 'a',
|
|
EXMODE_OPERONLY, 'O',
|
|
EXMODE_REGMODERATED, 'M',
|
|
EXMODE_NONOTICES, 'N',
|
|
EXMODE_PERSIST, 'z',
|
|
EXMODE_SSLONLY, 'Z',
|
|
EXMODE_NOQUITPARTS, 'Q',
|
|
EXMODE_NOCTCPS, 'C',
|
|
EXMODE_NOMULTITARG, 'T',
|
|
EXMODE_NOCOLOR, 'c',
|
|
EXMODE_STRIPCOLOR, 'S',
|
|
0x0, 0x0
|
|
};
|
|
|
|
int i;
|
|
int *flag_p;
|
|
int isexflag;
|
|
unsigned int t_mode;
|
|
unsigned int t_exmode;
|
|
char *modestr;
|
|
struct ParseState state;
|
|
|
|
assert(0 != cptr);
|
|
assert(0 != sptr);
|
|
assert(0 != chptr);
|
|
assert(0 != parc);
|
|
assert(0 != parv);
|
|
|
|
state.mbuf = mbuf;
|
|
state.cptr = cptr;
|
|
state.sptr = sptr;
|
|
state.chptr = chptr;
|
|
state.member = member;
|
|
state.parc = parc;
|
|
state.parv = parv;
|
|
state.flags = flags;
|
|
state.dir = MODE_ADD;
|
|
state.done = 0;
|
|
state.add = 0;
|
|
state.exadd = 0;
|
|
state.del = 0;
|
|
state.exdel = 0;
|
|
state.args_used = 0;
|
|
state.max_args = MAXMODEPARAMS;
|
|
state.numbans = 0;
|
|
|
|
for (i = 0; i < MAXPARA; i++) { /* initialize ops/voices arrays */
|
|
state.banlist[i].next = 0;
|
|
state.banlist[i].who[0] = '\0';
|
|
state.banlist[i].when = 0;
|
|
state.banlist[i].flags = 0;
|
|
state.exceptlist[i].next = 0;
|
|
state.exceptlist[i].who[0] = '\0';
|
|
state.exceptlist[i].when = 0;
|
|
state.exceptlist[i].flags = 0;
|
|
state.cli_change[i].flag = 0;
|
|
state.cli_change[i].client = 0;
|
|
}
|
|
|
|
modestr = state.parv[state.args_used++];
|
|
state.parc--;
|
|
|
|
while (*modestr) {
|
|
for (; *modestr; modestr++) {
|
|
isexflag = 0;
|
|
|
|
for (flag_p = chan_flags; flag_p[0]; flag_p += 2) /* look up flag */
|
|
if (flag_p[1] == *modestr)
|
|
break;
|
|
|
|
if (!flag_p[0]) { /* didn't find it? try chan_exflags */
|
|
isexflag = 1;
|
|
|
|
for (flag_p = chan_exflags; flag_p[0]; flag_p += 2) /* look up flag */
|
|
if (flag_p[1] == *modestr)
|
|
break;
|
|
|
|
if (!flag_p[0]) { /* didn't find it? complain and continue */
|
|
if (MyUser(state.sptr))
|
|
send_reply(state.sptr, ERR_UNKNOWNMODE, *modestr);
|
|
continue;
|
|
}
|
|
}
|
|
|
|
switch (*modestr) {
|
|
case '+': /* switch direction to MODE_ADD */
|
|
case '-': /* switch direction to MODE_DEL */
|
|
state.dir = flag_p[0];
|
|
break;
|
|
|
|
case 'l': /* deal with limits */
|
|
mode_parse_limit(&state, flag_p);
|
|
break;
|
|
|
|
case 'L': /* deal with redirect */
|
|
mode_parse_redir(&state, flag_p);
|
|
break;
|
|
|
|
case 'k': /* deal with keys */
|
|
mode_parse_key(&state, flag_p);
|
|
break;
|
|
|
|
case 'A': /* deal with Admin passes */
|
|
if (IsServer(cptr) || feature_bool(FEAT_OPLEVELS))
|
|
mode_parse_apass(&state, flag_p);
|
|
break;
|
|
|
|
case 'U': /* deal with user passes */
|
|
if (IsServer(cptr) || feature_bool(FEAT_OPLEVELS))
|
|
mode_parse_upass(&state, flag_p);
|
|
break;
|
|
|
|
case 'b': /* deal with bans */
|
|
mode_parse_ban(&state, flag_p);
|
|
break;
|
|
|
|
case 'e': /* deal with channel exceptions */
|
|
if (IsServer(sptr) || feature_bool(FEAT_EXCEPTS))
|
|
mode_parse_except(&state, flag_p);
|
|
else
|
|
mode_parse_dummy(&state, flag_p);
|
|
break;
|
|
|
|
case 'h': /* deal with ops/halfops/voice */
|
|
if (!(feature_bool(FEAT_HALFOPS) || IsServer(sptr))) {
|
|
mode_parse_dummy(&state, flag_p);
|
|
break;
|
|
}
|
|
case 'o':
|
|
case 'v':
|
|
mode_parse_client(&state, flag_p);
|
|
break;
|
|
|
|
case 'a': /* deal with admin only */
|
|
/* If they're not an admin, they can't +/- EXMODE_ADMINONLY. */
|
|
if ((feature_bool(FEAT_CHMODE_a) && IsAdmin(sptr)) ||
|
|
IsServer(sptr) || IsChannelService(sptr))
|
|
mode_parse_exmode(&state, flag_p);
|
|
else
|
|
send_reply(sptr, ERR_NOPRIVILEGES);
|
|
break;
|
|
|
|
case 'M': /* deal with registered + moderated */
|
|
if (feature_bool(FEAT_CHMODE_M) || IsServer(sptr) ||
|
|
IsOper(sptr) || IsChannelService(sptr))
|
|
mode_parse_exmode(&state, flag_p);
|
|
else
|
|
send_reply(sptr, ERR_NOPRIVILEGES);
|
|
break;
|
|
|
|
case 'N': /* deal with no notices */
|
|
if (feature_bool(FEAT_CHMODE_N) || IsServer(sptr) ||
|
|
IsOper(sptr) || IsChannelService(sptr))
|
|
mode_parse_exmode(&state, flag_p);
|
|
else
|
|
send_reply(sptr, ERR_NOPRIVILEGES);
|
|
break;
|
|
|
|
case 'O': /* deal with oper only */
|
|
/* If they're not an oper, they can't +/- EXMODE_OPERONLY. */
|
|
if ((feature_bool(FEAT_CHMODE_O) && IsOper(sptr)) ||
|
|
IsServer(sptr) || IsChannelService(sptr))
|
|
mode_parse_exmode(&state, flag_p);
|
|
else
|
|
send_reply(sptr, ERR_NOPRIVILEGES);
|
|
break;
|
|
|
|
case 'z': /* deal with persistant (EXMODE_PERSIST) channels */
|
|
if (!IsBurst(sptr) && ((IsServer(sptr) && !IsService(sptr)) ||
|
|
(!IsServer(sptr) && !IsService(cli_user(sptr)->server))))
|
|
break;
|
|
mode_parse_exmode(&state, flag_p);
|
|
if ((state.dir == MODE_DEL) && (chptr->users == 0))
|
|
schedule_destruct_event_1m(state.chptr);
|
|
break;
|
|
|
|
case 'Z': /* deal with oper only */
|
|
/* If they're not an SSL user, they can't +/- EXMODE_SSLONLY. */
|
|
if (feature_bool(FEAT_CHMODE_Z_STRICT) && (state.dir == MODE_ADD) &&
|
|
(chptr->nonsslusers > 0) && MyUser(sptr))
|
|
send_reply(sptr, ERR_CANNOTCHANGECHANMODE, chptr->chname, "Z", "Mode cannot be set while non-SSL members are present");
|
|
else if ((feature_bool(FEAT_CHMODE_Z) && IsSSL(sptr)) ||
|
|
IsOper(sptr) || IsServer(sptr) || IsChannelService(sptr))
|
|
mode_parse_exmode(&state, flag_p);
|
|
else
|
|
send_reply(sptr, ERR_NOPRIVILEGES);
|
|
break;
|
|
|
|
case 'Q': /* deal with strip QUIT/PART messages */
|
|
if (feature_bool(FEAT_CHMODE_Q) || IsServer(sptr) ||
|
|
IsOper(sptr) || IsChannelService(sptr))
|
|
mode_parse_exmode(&state, flag_p);
|
|
else
|
|
send_reply(sptr, ERR_NOPRIVILEGES);
|
|
break;
|
|
|
|
case 'C': /* deal with block CTCP messages */
|
|
if (feature_bool(FEAT_CHMODE_C) || IsServer(sptr) ||
|
|
IsOper(sptr) || IsChannelService(sptr))
|
|
mode_parse_exmode(&state, flag_p);
|
|
else
|
|
send_reply(sptr, ERR_NOPRIVILEGES);
|
|
break;
|
|
|
|
case 'T': /* deal with block multi-target messages */
|
|
if (feature_bool(FEAT_CHMODE_T) || IsServer(sptr) ||
|
|
IsOper(sptr) || IsChannelService(sptr))
|
|
mode_parse_exmode(&state, flag_p);
|
|
else
|
|
send_reply(sptr, ERR_NOPRIVILEGES);
|
|
break;
|
|
|
|
case 'c': /* deal with block color */
|
|
if (feature_bool(FEAT_CHMODE_c) || IsServer(sptr) ||
|
|
IsOper(sptr) || IsChannelService(sptr))
|
|
mode_parse_exmode(&state, flag_p);
|
|
else
|
|
send_reply(sptr, ERR_NOPRIVILEGES);
|
|
break;
|
|
|
|
case 'S': /* deal with strip color */
|
|
if (feature_bool(FEAT_CHMODE_S) || IsServer(sptr) ||
|
|
IsOper(sptr) || IsChannelService(sptr))
|
|
mode_parse_exmode(&state, flag_p);
|
|
else
|
|
send_reply(sptr, ERR_NOPRIVILEGES);
|
|
break;
|
|
|
|
default: /* deal with other modes */
|
|
if (isexflag)
|
|
mode_parse_exmode(&state, flag_p);
|
|
else
|
|
mode_parse_mode(&state, flag_p);
|
|
break;
|
|
} /* switch (*modestr) */
|
|
} /* for (; *modestr; modestr++) */
|
|
|
|
if (state.flags & MODE_PARSE_BURST)
|
|
break; /* don't interpret any more arguments */
|
|
|
|
if (state.parc > 0) { /* process next argument in string */
|
|
modestr = state.parv[state.args_used++];
|
|
state.parc--;
|
|
|
|
/* is it a TS? */
|
|
if (IsServer(state.cptr) && !state.parc && IsDigit(*modestr)) {
|
|
time_t recv_ts;
|
|
|
|
if (!(state.flags & MODE_PARSE_SET)) /* don't set earlier TS if */
|
|
break; /* we're then going to bounce the mode! */
|
|
|
|
recv_ts = atoi(modestr);
|
|
|
|
if (recv_ts && recv_ts < state.chptr->creationtime)
|
|
state.chptr->creationtime = recv_ts; /* respect earlier TS */
|
|
else if (recv_ts > state.chptr->creationtime) {
|
|
struct Client *sserv;
|
|
|
|
/* Check whether the originating server has fully processed
|
|
* the burst to it. */
|
|
sserv = state.cptr;
|
|
if (!IsServer(sserv))
|
|
sserv = cli_user(sserv)->server;
|
|
if (IsBurstOrBurstAck(sserv)) {
|
|
/* This is a legal but unusual case; the source server
|
|
* probably just has not processed the BURST for this
|
|
* channel. It SHOULD wipe out all its modes soon, so
|
|
* silently ignore the mode change rather than send a
|
|
* bounce that could desync modes from our side (that
|
|
* have already been sent).
|
|
*/
|
|
state.mbuf->mb_add = 0;
|
|
state.mbuf->mb_exadd = 0;
|
|
state.mbuf->mb_rem = 0;
|
|
state.mbuf->mb_exrem = 0;
|
|
state.mbuf->mb_count = 0;
|
|
return state.args_used;
|
|
} else {
|
|
/* Server is desynced; bounce the mode and deop the source
|
|
* to fix it. */
|
|
state.flags &= ~MODE_PARSE_SET;
|
|
state.flags |= MODE_PARSE_BOUNCE;
|
|
state.mbuf->mb_dest &= ~(MODEBUF_DEST_CHANNEL | MODEBUF_DEST_HACK4);
|
|
state.mbuf->mb_dest |= MODEBUF_DEST_BOUNCE | MODEBUF_DEST_HACK2;
|
|
if (!IsServer(state.cptr))
|
|
state.mbuf->mb_dest |= MODEBUF_DEST_DEOP;
|
|
}
|
|
}
|
|
|
|
break; /* break out of while loop */
|
|
} else if (state.flags & MODE_PARSE_STRICT ||
|
|
(MyUser(state.sptr) && state.max_args <= 0)) {
|
|
state.parc++; /* we didn't actually gobble the argument */
|
|
state.args_used--;
|
|
break; /* break out of while loop */
|
|
}
|
|
}
|
|
} /* while (*modestr) */
|
|
|
|
/*
|
|
* the rest of the function finishes building resultant MODEs; if the
|
|
* origin isn't a member or an oper, skip it.
|
|
*/
|
|
if (!state.mbuf ||
|
|
((state.flags & (MODE_PARSE_NOTOPER | MODE_PARSE_NOTMEMBER))
|
|
&& !(state.flags & MODE_PARSE_ISHALFOP)))
|
|
return state.args_used; /* tell our parent how many args we gobbled */
|
|
|
|
t_mode = state.chptr->mode.mode;
|
|
t_exmode = state.chptr->mode.exmode;
|
|
|
|
if (state.del & t_mode) { /* delete any modes to be deleted... */
|
|
modebuf_mode(state.mbuf, MODE_DEL | (state.del & t_mode));
|
|
|
|
t_mode &= ~state.del;
|
|
}
|
|
if (state.exdel & t_exmode) { /* delete any extended modes to be deleted... */
|
|
modebuf_exmode(state.mbuf, MODE_DEL | (state.exdel & t_exmode));
|
|
|
|
t_exmode &= ~state.exdel;
|
|
}
|
|
if (state.add & ~t_mode) { /* add any modes to be added... */
|
|
modebuf_mode(state.mbuf, MODE_ADD | (state.add & ~t_mode));
|
|
|
|
t_mode |= state.add;
|
|
}
|
|
if (state.exadd & ~t_exmode) { /* add any extended modes to be added... */
|
|
modebuf_exmode(state.mbuf, MODE_ADD | (state.exadd & ~t_exmode));
|
|
|
|
t_exmode |= state.exadd;
|
|
}
|
|
|
|
if (state.flags & MODE_PARSE_SET) { /* set the channel modes */
|
|
if ((state.chptr->mode.mode & MODE_INVITEONLY) &&
|
|
!(t_mode & MODE_INVITEONLY))
|
|
mode_invite_clear(state.chptr);
|
|
|
|
state.chptr->mode.mode = t_mode;
|
|
state.chptr->mode.exmode = t_exmode;
|
|
}
|
|
|
|
if (state.flags & MODE_PARSE_WIPEOUT) {
|
|
if (state.chptr->mode.limit && !(state.done & DONE_LIMIT))
|
|
modebuf_mode_uint(state.mbuf, MODE_DEL | MODE_LIMIT,
|
|
state.chptr->mode.limit);
|
|
if (*state.chptr->mode.redir && !(state.done & DONE_REDIR))
|
|
modebuf_mode_string(state.mbuf, MODE_DEL | MODE_REDIRECT,
|
|
state.chptr->mode.redir, 0);
|
|
if (*state.chptr->mode.key && !(state.done & DONE_KEY_DEL))
|
|
modebuf_mode_string(state.mbuf, MODE_DEL | MODE_KEY,
|
|
state.chptr->mode.key, 0);
|
|
if (*state.chptr->mode.upass && !(state.done & DONE_UPASS_DEL))
|
|
modebuf_mode_string(state.mbuf, MODE_DEL | MODE_UPASS,
|
|
state.chptr->mode.upass, 0);
|
|
if (*state.chptr->mode.apass && !(state.done & DONE_APASS_DEL))
|
|
modebuf_mode_string(state.mbuf, MODE_DEL | MODE_APASS,
|
|
state.chptr->mode.apass, 0);
|
|
}
|
|
|
|
if (state.done & DONE_BANCLEAN) /* process bans */
|
|
mode_process_bans(&state);
|
|
|
|
if (state.done & DONE_EXCEPTCLEAN) /* process ban exceptions */
|
|
mode_process_excepts(&state);
|
|
|
|
/* process client changes */
|
|
if (state.cli_change[0].flag)
|
|
mode_process_clients(&state);
|
|
|
|
return state.args_used; /* tell our parent how many args we gobbled */
|
|
}
|
|
|
|
/*
|
|
* Initialize a join buffer
|
|
*/
|
|
void
|
|
joinbuf_init(struct JoinBuf *jbuf, struct Client *source,
|
|
struct Client *connect, unsigned int type, char *comment,
|
|
time_t create)
|
|
{
|
|
int i;
|
|
|
|
assert(0 != jbuf);
|
|
assert(0 != source);
|
|
assert(0 != connect);
|
|
|
|
jbuf->jb_source = source; /* just initialize struct JoinBuf */
|
|
jbuf->jb_connect = connect;
|
|
jbuf->jb_type = type;
|
|
jbuf->jb_comment = comment;
|
|
jbuf->jb_create = create;
|
|
jbuf->jb_count = 0;
|
|
jbuf->jb_strlen = (((type == JOINBUF_TYPE_JOIN ||
|
|
type == JOINBUF_TYPE_PART ||
|
|
type == JOINBUF_TYPE_PARTALL) ?
|
|
STARTJOINLEN : STARTCREATELEN) +
|
|
(comment ? strlen(comment) + 2 : 0));
|
|
|
|
for (i = 0; i < MAXJOINARGS; i++)
|
|
jbuf->jb_channels[i] = 0;
|
|
}
|
|
|
|
/*
|
|
* Add a channel to the join buffer
|
|
*/
|
|
void
|
|
joinbuf_join(struct JoinBuf *jbuf, struct Channel *chan, unsigned int flags)
|
|
{
|
|
unsigned int len;
|
|
int is_local;
|
|
|
|
assert(0 != jbuf);
|
|
|
|
if (!chan) {
|
|
sendcmdto_serv_butone(jbuf->jb_source, CMD_JOIN, jbuf->jb_connect, "0");
|
|
return;
|
|
}
|
|
|
|
is_local = IsLocalChannel(chan->chname);
|
|
|
|
if (jbuf->jb_type == JOINBUF_TYPE_PART ||
|
|
jbuf->jb_type == JOINBUF_TYPE_PARTALL) {
|
|
struct Membership *member = find_member_link(chan, jbuf->jb_source);
|
|
if (IsUserParting(member))
|
|
return;
|
|
SetUserParting(member);
|
|
|
|
/* Send notification to channel */
|
|
if (!(flags & (CHFL_ZOMBIE | CHFL_DELAYED)))
|
|
sendcmdto_channel_butserv_butone(jbuf->jb_source, CMD_PART, chan, NULL, 0,
|
|
(flags & CHFL_BANNED || !jbuf->jb_comment) ?
|
|
":%H" : "%H :%s", chan, jbuf->jb_comment);
|
|
else if (MyUser(jbuf->jb_source))
|
|
sendcmdto_one(jbuf->jb_source, CMD_PART, jbuf->jb_source,
|
|
(flags & CHFL_BANNED || !jbuf->jb_comment) ?
|
|
":%H" : "%H :%s", chan, jbuf->jb_comment);
|
|
/* XXX: Shouldn't we send a PART here anyway? */
|
|
/* to users on the channel? Why? From their POV, the user isn't on
|
|
* the channel anymore anyway. We don't send to servers until below,
|
|
* when we gang all the channel parts together. Note that this is
|
|
* exactly the same logic, albeit somewhat more concise, as was in
|
|
* the original m_part.c */
|
|
|
|
if (jbuf->jb_type == JOINBUF_TYPE_PARTALL ||
|
|
is_local) /* got to remove user here */
|
|
remove_user_from_channel(jbuf->jb_source, chan);
|
|
} else {
|
|
int oplevel = !chan->mode.apass[0] ? MAXOPLEVEL
|
|
: (flags & CHFL_CHANNEL_MANAGER) ? 0
|
|
: 1;
|
|
/* Add user to channel */
|
|
if ((chan->mode.mode & MODE_DELJOINS) && !(flags & CHFL_VOICED_OR_OPPED))
|
|
add_user_to_channel(chan, jbuf->jb_source, flags | CHFL_DELAYED, oplevel);
|
|
else
|
|
add_user_to_channel(chan, jbuf->jb_source, flags, oplevel);
|
|
|
|
/* send JOIN notification to all servers (CREATE is sent later). */
|
|
if (jbuf->jb_type != JOINBUF_TYPE_CREATE && !is_local)
|
|
sendcmdto_serv_butone(jbuf->jb_source, CMD_JOIN, jbuf->jb_connect,
|
|
"%H %Tu", chan, chan->creationtime);
|
|
|
|
if (!((chan->mode.mode & MODE_DELJOINS) && !(flags & CHFL_VOICED_OR_OPPED))) {
|
|
/* Send the notification to the channel */
|
|
sendcmdto_channel_capab_butserv_butone(jbuf->jb_source, CMD_JOIN, chan, NULL, 0,
|
|
CAP_NONE, CAP_EXTJOIN, "%H", chan);
|
|
sendcmdto_channel_capab_butserv_butone(jbuf->jb_source, CMD_JOIN, chan, NULL, 0,
|
|
CAP_EXTJOIN, CAP_NONE, "%H %s :%s", chan,
|
|
IsAccount(jbuf->jb_source) ? cli_account(jbuf->jb_source) : "*",
|
|
cli_info(jbuf->jb_source));
|
|
|
|
if (cli_user(jbuf->jb_source)->away)
|
|
sendcmdto_channel_capab_butserv_butone(jbuf->jb_source, CMD_AWAY, chan, NULL, 0,
|
|
CAP_AWAYNOTIFY, CAP_NONE, ":%s",
|
|
cli_user(jbuf->jb_source)->away);
|
|
|
|
/* send an op, too, if needed */
|
|
if (flags & CHFL_CHANOP && (oplevel < MAXOPLEVEL || !MyUser(jbuf->jb_source)))
|
|
sendcmdto_channel_butserv_butone((chan->mode.apass[0] ? &his : jbuf->jb_source),
|
|
CMD_MODE, chan, NULL, 0, "%H +o %C",
|
|
chan, jbuf->jb_source);
|
|
} else if (MyUser(jbuf->jb_source)) {
|
|
if (CapActive(jbuf->jb_source, CAP_EXTJOIN))
|
|
sendcmdto_one(jbuf->jb_source, CMD_JOIN, jbuf->jb_source, "%H %s :%s", chan,
|
|
IsAccount(jbuf->jb_source) ? cli_account(jbuf->jb_source) : "*",
|
|
cli_info(jbuf->jb_source));
|
|
else
|
|
sendcmdto_one(jbuf->jb_source, CMD_JOIN, jbuf->jb_source, ":%H", chan);
|
|
}
|
|
}
|
|
|
|
if (jbuf->jb_type == JOINBUF_TYPE_PARTALL ||
|
|
jbuf->jb_type == JOINBUF_TYPE_JOIN || is_local)
|
|
return; /* don't send to remote */
|
|
|
|
/* figure out if channel name will cause buffer to be overflowed */
|
|
len = chan ? strlen(chan->chname) + 1 : 2;
|
|
if (jbuf->jb_strlen + len > BUFSIZE)
|
|
joinbuf_flush(jbuf);
|
|
|
|
/* add channel to list of channels to send and update counts */
|
|
jbuf->jb_channels[jbuf->jb_count++] = chan;
|
|
jbuf->jb_strlen += len;
|
|
|
|
/* if we've used up all slots, flush */
|
|
if (jbuf->jb_count >= MAXJOINARGS)
|
|
joinbuf_flush(jbuf);
|
|
}
|
|
|
|
/*
|
|
* Flush the channel list to remote servers
|
|
*/
|
|
int
|
|
joinbuf_flush(struct JoinBuf *jbuf)
|
|
{
|
|
char chanlist[BUFSIZE];
|
|
char *name;
|
|
char *p = 0;
|
|
int chanlist_i = 0;
|
|
int i;
|
|
|
|
if (!jbuf->jb_count || jbuf->jb_type == JOINBUF_TYPE_PARTALL ||
|
|
jbuf->jb_type == JOINBUF_TYPE_JOIN)
|
|
return 0; /* no joins to process */
|
|
|
|
for (i = 0; i < jbuf->jb_count; i++) { /* build channel list */
|
|
build_string(chanlist, &chanlist_i,
|
|
jbuf->jb_channels[i] ? jbuf->jb_channels[i]->chname : "0", 0,
|
|
i == 0 ? '\0' : ',');
|
|
if (JOINBUF_TYPE_PART == jbuf->jb_type)
|
|
/* Remove user from channel */
|
|
remove_user_from_channel(jbuf->jb_source, jbuf->jb_channels[i]);
|
|
|
|
jbuf->jb_channels[i] = 0; /* mark slot empty */
|
|
}
|
|
|
|
jbuf->jb_count = 0; /* reset base counters */
|
|
jbuf->jb_strlen = ((jbuf->jb_type == JOINBUF_TYPE_PART ?
|
|
STARTJOINLEN : STARTCREATELEN) +
|
|
(jbuf->jb_comment ? strlen(jbuf->jb_comment) + 2 : 0));
|
|
|
|
/* and send the appropriate command */
|
|
switch (jbuf->jb_type) {
|
|
case JOINBUF_TYPE_CREATE:
|
|
sendcmdto_serv_butone(jbuf->jb_source, CMD_CREATE, jbuf->jb_connect,
|
|
"%s %Tu", chanlist, jbuf->jb_create);
|
|
if (feature_bool(FEAT_AUTOCHANMODES) && feature_str(FEAT_AUTOCHANMODES_LIST)
|
|
&& strlen(feature_str(FEAT_AUTOCHANMODES_LIST)) > 0 && MyUser(jbuf->jb_source)) {
|
|
for (name = ircd_strtok(&p, chanlist, ","); name; name = ircd_strtok(&p, 0, ",")) {
|
|
if (!IsLocalChannel(name))
|
|
sendcmdto_serv_butone(&me, CMD_MODE, jbuf->jb_connect, "%s +%s", name,
|
|
feature_str(FEAT_AUTOCHANMODES_LIST));
|
|
}
|
|
}
|
|
break;
|
|
|
|
case JOINBUF_TYPE_PART:
|
|
sendcmdto_serv_butone(jbuf->jb_source, CMD_PART, jbuf->jb_connect,
|
|
jbuf->jb_comment ? "%s :%s" : "%s", chanlist,
|
|
jbuf->jb_comment);
|
|
break;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* Returns TRUE (1) if client is invited, FALSE (0) if not */
|
|
int IsInvited(struct Client* cptr, const void* chptr)
|
|
{
|
|
struct SLink *lp;
|
|
|
|
for (lp = (cli_user(cptr))->invited; lp; lp = lp->next)
|
|
if (lp->value.chptr == chptr)
|
|
return 1;
|
|
return 0;
|
|
}
|
|
|
|
/* RevealDelayedJoin: sends a join for a hidden user */
|
|
|
|
void RevealDelayedJoin(struct Membership *member)
|
|
{
|
|
ClearDelayedJoin(member);
|
|
sendcmdto_channel_capab_butserv_butone(member->user, CMD_JOIN, member->channel,
|
|
member->user, 0, CAP_NONE, CAP_EXTJOIN, "%H",
|
|
member->channel);
|
|
sendcmdto_channel_capab_butserv_butone(member->user, CMD_JOIN, member->channel,
|
|
member->user, 0, CAP_EXTJOIN, CAP_NONE, "%H %s :%s",
|
|
member->channel,
|
|
IsAccount(member->user) ? cli_account(member->user) : "*",
|
|
cli_info(member->user));
|
|
if (cli_user(member->user)->away)
|
|
sendcmdto_channel_capab_butserv_butone(member->user, CMD_AWAY, member->channel, NULL, 0,
|
|
CAP_AWAYNOTIFY, CAP_NONE, ":%s",
|
|
cli_user(member->user)->away);
|
|
|
|
CheckDelayedJoins(member->channel);
|
|
}
|
|
|
|
/* CheckDelayedJoins: checks and clear +d if necessary */
|
|
|
|
void CheckDelayedJoins(struct Channel *chan)
|
|
{
|
|
if ((chan->mode.mode & MODE_WASDELJOINS) && !find_delayed_joins(chan)) {
|
|
chan->mode.mode &= ~MODE_WASDELJOINS;
|
|
sendcmdto_channel_butserv_butone(&his, CMD_MODE, chan, NULL, 0,
|
|
"%H -d", chan);
|
|
}
|
|
}
|
|
|
|
/** Send a join for the user if (s)he is a hidden member of the channel.
|
|
*/
|
|
void RevealDelayedJoinIfNeeded(struct Client *sptr, struct Channel *chptr)
|
|
{
|
|
struct Membership *member = find_member_link(chptr, sptr);
|
|
if (member && IsDelayedJoin(member))
|
|
RevealDelayedJoin(member);
|
|
}
|
|
|
|
/* Returns the number of common channels between two users, upto max. */
|
|
int common_chan_count(struct Client *a, struct Client *b, int max)
|
|
{
|
|
int count = 0;
|
|
struct Membership* member;
|
|
struct Membership* chan;
|
|
struct Channel *chptr;
|
|
|
|
if (!a || !b)
|
|
return 0;
|
|
|
|
|
|
for (chan = cli_user(a)->channel; chan; chan = chan->next_channel) {
|
|
chptr = chan->channel;
|
|
for (member = chptr->members; member; member = member->next_member) {
|
|
if (b == member->user) {
|
|
count++;
|
|
if (max && (count >= max))
|
|
return count;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
return count;
|
|
}
|
|
|