]> jfr.im git - irc/evilnet/x3.git/blob - src/opserv.c
Synchronization with srvx--devo--1.3--patch-70.
[irc/evilnet/x3.git] / src / opserv.c
1 /* opserv.c - IRC Operator assistance service
2 * Copyright 2000-2004 srvx Development Team
3 *
4 * This file is part of srvx.
5 *
6 * srvx is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with srvx; if not, write to the Free Software Foundation,
18 * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA.
19 */
20
21 #include "conf.h"
22 #include "gline.h"
23 #include "global.h"
24 #include "nickserv.h"
25 #include "modcmd.h"
26 #include "opserv.h"
27 #include "timeq.h"
28 #include "saxdb.h"
29
30 #ifdef HAVE_SYS_TIMES_H
31 #include <sys/times.h>
32 #endif
33 #ifdef HAVE_NETINET_IN_H
34 #include <netinet/in.h>
35 #endif
36 #ifdef HAVE_ARPA_INET_H
37 #include <arpa/inet.h>
38 #endif
39
40 #define OPSERV_CONF_NAME "services/opserv"
41
42 #define KEY_ALERT_CHANNEL "alert_channel"
43 #define KEY_ALERT_CHANNEL_MODES "alert_channel_modes"
44 #define KEY_DEBUG_CHANNEL "debug_channel"
45 #define KEY_DEBUG_CHANNEL_MODES "debug_channel_modes"
46 #define KEY_UNTRUSTED_MAX "untrusted_max"
47 #define KEY_PURGE_LOCK_DELAY "purge_lock_delay"
48 #define KEY_JOIN_FLOOD_MODERATE "join_flood_moderate"
49 #define KEY_JOIN_FLOOD_MODERATE_THRESH "join_flood_moderate_threshold"
50 #define KEY_NICK "nick"
51 #define KEY_JOIN_POLICER "join_policer"
52 #define KEY_NEW_USER_POLICER "new_user_policer"
53 #define KEY_REASON "reason"
54 #define KEY_RESERVES "reserves"
55 #define KEY_IDENT "username" /* for compatibility with 1.0 DBs */
56 #define KEY_HOSTNAME "hostname"
57 #define KEY_DESC "description"
58 #define KEY_BAD_WORDS "bad"
59 #define KEY_EXEMPT_CHANNELS "exempt"
60 #define KEY_SECRET_WORDS "secret"
61 #define KEY_TRUSTED_HOSTS "trusted"
62 #define KEY_OWNER "owner"
63 #define KEY_GAGS "gags"
64 #define KEY_ALERTS "alerts"
65 #define KEY_REACTION "reaction"
66 #define KEY_DISCRIM "discrim"
67 #define KEY_WARN "chanwarn"
68 #define KEY_MAX "max"
69 #define KEY_TIME "time"
70 #define KEY_MAX_CLIENTS "max_clients"
71 #define KEY_LIMIT "limit"
72 #define KEY_EXPIRES "expires"
73 #define KEY_STAFF_AUTH_CHANNEL "staff_auth_channel"
74 #define KEY_STAFF_AUTH_CHANNEL_MODES "staff_auth_channel_modes"
75 #define KEY_CLONE_GLINE_DURATION "clone_gline_duration"
76 #define KEY_BLOCK_GLINE_DURATION "block_gline_duration"
77 #define KEY_ISSUER "issuer"
78 #define KEY_ISSUED "issued"
79
80 #define IDENT_FORMAT "%s [%s@%s/%s]"
81 #define IDENT_DATA(user) user->nick, user->ident, user->hostname, inet_ntoa(user->ip)
82 #define MAX_CHANNELS_WHOIS 50
83 #define OSMSG_PART_REASON "%s has no reason."
84 #define OSMSG_KICK_REQUESTED "Kick requested by %s."
85 #define OSMSG_KILL_REQUESTED "Kill requested by %s."
86 #define OSMSG_GAG_REQUESTED "Gag requested by %s."
87
88 static const struct message_entry msgtab[] = {
89 { "OSMSG_USER_ACCESS_IS", "$b%s$b (account $b%s$b) has %d access." },
90 { "OSMSG_LEVEL_TOO_LOW", "You lack sufficient access to use this command." },
91 { "OSMSG_NEED_CHANNEL", "You must specify a channel for $b%s$b." },
92 { "OSMSG_INVALID_IRCMASK", "$b%s$b is an invalid IRC hostmask." },
93 { "OSMSG_ADDED_BAN", "I have banned $b%s$b from $b%s$b." },
94 { "OSMSG_GLINE_ISSUED", "G-line issued for $b%s$b." },
95 { "OSMSG_GLINE_REMOVED", "G-line removed for $b%s$b." },
96 { "OSMSG_GLINE_FORCE_REMOVED", "Unknown/expired G-line removed for $b%s$b." },
97 { "OSMSG_GLINES_ONE_REFRESHED", "All G-lines resent to $b%s$b." },
98 { "OSMSG_GLINES_REFRESHED", "All G-lines refreshed." },
99 { "OSMSG_CLEARBANS_DONE", "Cleared all bans from channel $b%s$b." },
100 { "OSMSG_CLEARMODES_DONE", "Cleared all modes from channel $b%s$b." },
101 { "OSMSG_NO_CHANNEL_MODES", "Channel $b%s$b had no modes to clear." },
102 { "OSMSG_DEOP_DONE", "Deopped the requested lusers." },
103 { "OSMSG_DEOPALL_DONE", "Deopped everyone on $b%s$b." },
104 { "OSMSG_DEHOP_DONE", "Dehalfopped the requested lusers." },
105 { "OSMSG_DEHOPALL_DONE", "Dehalfopped everyone on $b%s$b." },
106 { "OSMSG_NO_DEBUG_CHANNEL", "No debug channel has been configured." },
107 { "OSMSG_INVITE_DONE", "Invited $b%s$b to $b%s$b." },
108 { "OSMSG_ALREADY_THERE", "You are already in $b%s$b." },
109 { "OSMSG_JOIN_DONE", "I have joined $b%s$b." },
110 { "OSMSG_ALREADY_JOINED", "I am already in $b%s$b." },
111 { "OSMSG_NOT_ON_CHANNEL", "$b%s$b does not seem to be on $b%s$b." },
112 { "OSMSG_KICKALL_DONE", "I have cleared out %s." },
113 { "OSMSG_LEAVING", "Leaving $b%s$b." },
114 { "OSMSG_MODE_SET", "I have set the modes for $b%s$b." },
115 { "OSMSG_OP_DONE", "Opped the requested lusers." },
116 { "OSMSG_OPALL_DONE", "Opped everyone on $b%s$b." },
117 { "OSMSG_HOP_DONE", "Halfopped the requested lusers." },
118 { "OSMSG_HOPALL_DONE", "Halfopped everyone on $b%s$b." },
119 { "OSMSG_WHOIS_IDENT", "%s (%s@%s) from %d.%d.%d.%d" },
120 { "OSMSG_WHOIS_NICK", "Nick : %s" },
121 { "OSMSG_WHOIS_HOST", "Host : %s@%s" },
122 { "OSMSG_WHOIS_FAKEHOST", "Fakehost: %s" },
123 { "OSMSG_WHOIS_IP", "Real IP : %s" },
124 { "OSMSG_WHOIS_MODES", "Modes : +%s " },
125 { "OSMSG_WHOIS_INFO", "Info : %s" },
126 { "OSMSG_WHOIS_NUMERIC", "Numnick : %s" },
127 { "OSMSG_WHOIS_SERVER", "Server : %s" },
128 { "OSMSG_WHOIS_NICK_AGE", "Nick Age: %s" },
129 { "OSMSG_WHOIS_ACCOUNT", "Account : %s" },
130 { "OSMSG_WHOIS_CHANNELS", "Channels: %s" },
131 { "OSMSG_WHOIS_HIDECHANS", "Channel list omitted for your sanity." },
132 { "OSMSG_UNBAN_DONE", "Ban(s) removed from channel %s." },
133 { "OSMSG_CHANNEL_VOICED", "All users on %s voiced." },
134 { "OSMSG_CHANNEL_DEVOICED", "All voiced users on %s de-voiced." },
135 { "OSMSG_BAD_MODIFIER", "Unknown bad-word modifier $b%s$b." },
136 { "OSMSG_BAD_REDUNDANT", "$b%s$b is already covered by a bad word ($b%s$b)." },
137 { "OSMSG_BAD_GROWING", "Replacing bad word $b%s$b with shorter bad word $b%s$b." },
138 { "OSMSG_BAD_NUKING", " .. and removing redundant bad word $b%s$b." },
139 { "OSMSG_ADDED_BAD", "Added $b%s$b to the bad-word list." },
140 { "OSMSG_REMOVED_BAD", "Removed $b%s$b from the bad-word list." },
141 { "OSMSG_NOT_BAD_WORD", "$b%s$b is not a bad word." },
142 { "OSMSG_ADDED_EXEMPTION", "Added $b%s$b to the bad-word exemption list." },
143 { "OSMSG_ADDED_EXEMPTIONS", "Added %d exception(s) to the bad word list." },
144 { "OSMSG_REMOVED_EXEMPTION", "Removed $b%s$b from the exemption list." },
145 { "OSMSG_NOT_EXEMPT", "$b%s$b is not on the exempt list." },
146 { "OSMSG_ALREADY_TRUSTED", "Host $b%s$b is already trusted (use $bdeltrust$b and then $baddtrust$b to adjust)." },
147 { "OSMSG_NOT_TRUSTED", "Host $b%s$b is not trusted." },
148 { "OSMSG_BAD_IP", "$b%s$b is not a valid IP address" },
149 { "OSMSG_BAD_NUMBER", "$b%s$b is not a number" },
150 { "OSMSG_ADDED_TRUSTED", "Added trusted hosts to the trusted-hosts list." },
151 { "OSMSG_UPDATED_TRUSTED", "Updated trusted host $b%s$b." },
152 { "OSMSG_REMOVED_TRUSTED", "Removed trusted hosts from the trusted-hosts list." },
153 { "OSMSG_CLONE_EXISTS", "Nick $b%s$b is already in use." },
154 { "OSMSG_NOT_A_HOSTMASK", "The hostmask must be in user@host form." },
155 { "OSMSG_BADWORD_LIST", "Bad words: %s" },
156 { "OSMSG_EXEMPTED_LIST", "Exempted channels: %s" },
157 { "OSMSG_GLINE_COUNT", "There are %d glines active on the network." },
158 { "OSMSG_LINKS_SERVER", "%s%s (%u clients; %s)" },
159 { "OSMSG_MAX_CLIENTS", "Max clients: %d at %s" },
160 { "OSMSG_NETWORK_INFO", "Total users: %d (%d invisible, %d opers)" },
161 { "OSMSG_RESERVED_LIST", "List of reserved nicks:" },
162 { "OSMSG_TRUSTED_LIST", "List of trusted hosts:" },
163 { "OSMSG_HOST_IS_TRUSTED", "%s (%s; set %s ago by %s; expires %s: %s)" },
164 { "OSMSG_HOST_NOT_TRUSTED", "%s does not have a special trust." },
165 { "OSMSG_UPTIME_STATS", "Uptime: %s (%u lines processed, CPU time %.2fu/%.2fs)" },
166 { "OSMSG_LINE_DUMPED", "Raw line sent." },
167 { "OSMSG_RAW_PARSE_ERROR", "Error parsing raw line (not dumping to uplink)." },
168 { "OSMSG_COLLIDED_NICK", "Now temporarily holding nick $b%s$b." },
169 { "OSMSG_RESERVED_NICK", "Now reserving nick $b%s$b." },
170 { "OSMSG_NICK_UNRESERVED", "Nick $b%s$b is no longer reserved." },
171 { "OSMSG_NOT_RESERVED", "Nick $b%s$b is not reserved." },
172 { "OSMSG_ILLEGAL_REASON", "This channel is illegal." },
173 { "OSMSG_ILLEGAL_KILL_REASON", "Joined an illegal modeless channel - do not repeat." },
174 { "OSMSG_ILLEGAL_CHANNEL", "$b%s$b is an ILLEGAL channel. Do not re-join it." },
175 { "OSMSG_FLOOD_MODERATE", "This channel has been temporarily moderated due to a possible join flood attack detected in this channel; network staff have been notified and will investigate." },
176 { "OSMSG_CLONE_WARNING", "WARNING: You have connected the maximum permitted number of clients from one IP address (clones). If you connect any more, your host will be temporarily banned from the network." },
177 { "OSMSG_CLONE_ADDED", "Added clone $b%s$b." },
178 { "OSMSG_CLONE_FAILED", "Unable to add user $b%s$b." },
179 { "OSMSG_NOT_A_CLONE", "Har har. $b%s$b isn't a clone." },
180 { "OSMSG_CLONE_REMOVED", "Removed clone $b%s$b." },
181 { "OSMSG_CLONE_JOINED", "$b%s$b has joined $b%s$b." },
182 { "OSMSG_CLONE_PARTED", "$b%s$b has left $b%s$b." },
183 { "OSMSG_OPS_GIVEN", "I have given ops in $b%s$b to $b%s$b." },
184 { "OSMSG_HOPS_GIVEN", "I have given halfops in $b%s$b to $b%s$b." },
185 { "OSMSG_CLONE_SAID", "$b%s$b has spoken to $b%s$b." },
186 { "OSMSG_UNKNOWN_SUBCOMMAND", "$b%s$b is not a valid subcommand of $b%s$b." },
187 { "OSMSG_UNKNOWN_OPTION", "$b%s$b has not been set." },
188 { "OSMSG_OPTION_IS", "$b%s$b is set to $b%s$b." },
189 { "OSMSG_OPTION_ROOT", "The following keys can be queried:" },
190 { "OSMSG_OPTION_LIST", "$b%s$b contains the following values:" },
191 { "OSMSG_OPTION_KEYS", "$b%s$b contains the following keys:" },
192 { "OSMSG_OPTION_LIST_EMPTY", "Empty list." },
193 { "OSMSG_SET_NOT_SET", "$b%s$b does not exist, and cannot be set." },
194 { "OSMSG_SET_BAD_TYPE", "$b%s$b is not a string, and cannot be set." },
195 { "OSMSG_SET_SUCCESS", "$b%s$b has been set to $b%s$b." },
196 { "OSMSG_SETTIME_SUCCESS", "Set time for servers named like $b%s$b." },
197 { "OSMSG_BAD_ACTION", "Unrecognized trace action $b%s$b." },
198 { "OSMSG_USER_SEARCH_RESULTS", "The following users were found:" },
199 { "OSMSG_CHANNEL_SEARCH_RESULTS", "The following channels were found:" },
200 { "OSMSG_GLINE_SEARCH_RESULTS", "The following glines were found:" },
201 { "OSMSG_LOG_SEARCH_RESULTS", "The following log entries were found:" },
202 { "OSMSG_GSYNC_RUNNING", "Synchronizing glines from %s." },
203 { "OSMSG_GTRACE_FORMAT", "%s (issued %s by %s, expires %s): %s" },
204 { "OSMSG_GAG_APPLIED", "Gagged $b%s$b, affecting %d users." },
205 { "OSMSG_GAG_ADDED", "Gagged $b%s$b." },
206 { "OSMSG_REDUNDANT_GAG", "Gag $b%s$b is redundant." },
207 { "OSMSG_GAG_NOT_FOUND", "Could not find gag $b%s$b." },
208 { "OSMSG_NO_GAGS", "No gags have been set." },
209 { "OSMSG_UNGAG_APPLIED", "Ungagged $b%s$b, affecting %d users." },
210 { "OSMSG_UNGAG_ADDED", "Ungagged $b%s$b." },
211 { "OSMSG_TIMEQ_INFO", "%u events in timeq; next in %lu seconds." },
212 { "OSMSG_ALERT_EXISTS", "An alert named $b%s$b already exists." },
213 { "OSMSG_UNKNOWN_REACTION", "Unknown alert reaction $b%s$b." },
214 { "OSMSG_ADDED_ALERT", "Added alert named $b%s$b." },
215 { "OSMSG_REMOVED_ALERT", "Removed alert named $b%s$b." },
216 { "OSMSG_NO_SUCH_ALERT", "No alert named $b%s$b could be found." },
217 { "OSMSG_ALERT_IS", "%s (by %s, reaction %s): %s" },
218 { "OSMSG_ALERTS_LIST", "Current $O alerts:" },
219 { "OSMSG_REHASH_COMPLETE", "Completed rehash of configuration database." },
220 { "OSMSG_REHASH_FAILED", "Rehash of configuration database failed, previous configuration is intact." },
221 { "OSMSG_REOPEN_COMPLETE", "Closed and reopened all log files." },
222 { "OSMSG_RECONNECTING", "Reconnecting to my uplink." },
223 { "OSMSG_NUMERIC_COLLIDE", "Numeric %d (%s) is already in use." },
224 { "OSMSG_NAME_COLLIDE", "That name is already in use." },
225 { "OSMSG_SRV_CREATE_FAILED", "Server creation failed -- check log files." },
226 { "OSMSG_SERVER_JUPED", "Added new jupe server %s." },
227 { "OSMSG_SERVER_NOT_JUPE", "That server is not a juped server." },
228 { "OSMSG_SERVER_UNJUPED", "Server jupe removed." },
229 { "OSMSG_WARN_ADDED", "Added channel activity warning for $b%s$b (%s)" },
230 { "OSMSG_WARN_EXISTS", "Channel activity warning for $b%s$b already exists." },
231 { "OSMSG_WARN_DELETED", "Removed channel activity warning for $b%s$b" },
232 { "OSMSG_WARN_NOEXIST", "Channel activity warning for $b%s$b does not exist." },
233 { "OSMSG_WARN_LISTSTART", "Channel activity warnings:" },
234 { "OSMSG_WARN_LISTENTRY", "%s (%s)" },
235 { "OSMSG_WARN_LISTEND", "End of activity warning list." },
236 { "OSMSG_UPLINK_CONNECTING", "Establishing connection with %s (%s:%d)." },
237 { "OSMSG_CURRENT_UPLINK", "$b%s$b is already the current uplink." },
238 { "OSMSG_INVALID_UPLINK", "$b%s$b is not a valid uplink name." },
239 { "OSMSG_UPLINK_DISABLED", "$b%s$b is a disabled or unavailable uplink." },
240 { "OSMSG_UPLINK_START", "Uplink $b%s$b:" },
241 { "OSMSG_UPLINK_ADDRESS", "Address: %s:%d" },
242 { "OSMSG_STUPID_GLINE", "Gline %s? Now $bthat$b would be smooth." },
243 { "OSMSG_ACCOUNTMASK_AUTHED", "Invalid criteria: it is impossible to match an account mask but not be authed" },
244 { "OSMSG_CHANINFO_HEADER", "%s Information" },
245 { "OSMSG_CHANINFO_TIMESTAMP", "Created on: %a %b %d %H:%M:%S %Y (%s)" },
246 { "OSMSG_CHANINFO_MODES", "Modes: %s" },
247 { "OSMSG_CHANINFO_MODES_BADWORD", "Modes: %s; bad-word channel" },
248 { "OSMSG_CHANINFO_TOPIC", "Topic (set by %%s, %a %b %d %H:%M:%S %Y): %%s" },
249 { "OSMSG_CHANINFO_TOPIC_UNKNOWN", "Topic: (none / not gathered)" },
250 { "OSMSG_CHANINFO_BAN_COUNT", "Bans (%d):" },
251 { "OSMSG_CHANINFO_BAN", "%%s by %%s (%a %b %d %H:%M:%S %Y)" },
252 { "OSMSG_CHANINFO_EXEMPT_COUNT", "Exempts (%d):" },
253 { "OSMSG_CHANINFO_EXEMPT", "%%s by %%s (%a %b %d %H:%M:%S %Y)" },
254 { "OSMSG_CHANINFO_MANY_USERS", "%d users (\"/msg $S %s %s users\" for the list)" },
255 { "OSMSG_CHANINFO_USER_COUNT", "Users (%d):" },
256 { "OSMSG_CSEARCH_CHANNEL_INFO", "%s [%d users] %s %s" },
257 { NULL, NULL }
258 };
259
260 #define OPSERV_SYNTAX() svccmd_send_help(user, opserv, cmd)
261
262 typedef int (*discrim_search_func)(struct userNode *match, void *extra);
263
264 struct userNode *opserv;
265
266 static dict_t opserv_chan_warn; /* data is char* */
267 static dict_t opserv_reserved_nick_dict; /* data is struct userNode* */
268 static struct string_list *opserv_bad_words;
269 static dict_t opserv_exempt_channels; /* data is not used */
270 static dict_t opserv_trusted_hosts; /* data is struct trusted_host* */
271 static dict_t opserv_hostinfo_dict; /* data is struct opserv_hostinfo* */
272 static dict_t opserv_user_alerts; /* data is struct opserv_user_alert* */
273 static dict_t opserv_nick_based_alerts; /* data is struct opserv_user_alert* */
274 static dict_t opserv_channel_alerts; /* data is struct opserv_user_alert* */
275 static struct module *opserv_module;
276 static struct log_type *OS_LOG;
277 static unsigned int new_user_flood;
278 static char *level_strings[1001];
279
280 static struct {
281 struct chanNode *debug_channel;
282 struct chanNode *alert_channel;
283 struct chanNode *staff_auth_channel;
284 struct policer_params *join_policer_params;
285 struct policer new_user_policer;
286 unsigned long untrusted_max;
287 unsigned long clone_gline_duration;
288 unsigned long block_gline_duration;
289 unsigned long purge_lock_delay;
290 unsigned long join_flood_moderate;
291 unsigned long join_flood_moderate_threshold;
292 } opserv_conf;
293
294 struct trusted_host {
295 char *ipaddr;
296 char *issuer;
297 char *reason;
298 unsigned long limit;
299 time_t issued;
300 time_t expires;
301 };
302
303 struct gag_entry {
304 char *mask;
305 char *owner;
306 char *reason;
307 time_t expires;
308 struct gag_entry *next;
309 };
310
311 static struct gag_entry *gagList;
312
313 struct opserv_hostinfo {
314 struct userList clients;
315 struct trusted_host *trusted;
316 };
317
318 static void
319 opserv_free_hostinfo(void *data)
320 {
321 struct opserv_hostinfo *ohi = data;
322 userList_clean(&ohi->clients);
323 free(ohi);
324 }
325
326 typedef struct opservDiscrim {
327 struct chanNode *channel;
328 char *mask_nick, *mask_ident, *mask_host, *mask_info, *server, *ip_mask_str, *reason, *accountmask;
329 unsigned long limit, ip_mask;
330 struct in_addr ip_addr;
331 unsigned int min_level, max_level, domain_depth, duration, min_clones, min_channels, max_channels;
332 unsigned int match_opers : 1, option_log : 1;
333 unsigned int chan_req_modes : 2, chan_no_modes : 2;
334 int authed : 2, info_space : 2;
335 time_t min_ts, max_ts;
336 } *discrim_t;
337
338 struct discrim_and_source {
339 discrim_t discrim;
340 struct userNode *source;
341 dict_t dict;
342 unsigned int disp_limit;
343 };
344
345 static discrim_t opserv_discrim_create(struct userNode *user, unsigned int argc, char *argv[], int allow_channel);
346 static unsigned int opserv_discrim_search(discrim_t discrim, discrim_search_func dsf, void *data);
347 static int gag_helper_func(struct userNode *match, void *extra);
348 static int ungag_helper_func(struct userNode *match, void *extra);
349
350 typedef enum {
351 REACT_NOTICE,
352 REACT_KILL,
353 REACT_GLINE
354 } opserv_alert_reaction;
355
356 struct opserv_user_alert {
357 char *owner;
358 char *text_discrim, *split_discrim;
359 discrim_t discrim;
360 opserv_alert_reaction reaction;
361 };
362
363 /* funny type to make it acceptible to dict_set_free_data, far below */
364 static void
365 opserv_free_user_alert(void *data)
366 {
367 struct opserv_user_alert *alert = data;
368 if (alert->discrim->channel)
369 UnlockChannel(alert->discrim->channel);
370 free(alert->owner);
371 free(alert->text_discrim);
372 free(alert->split_discrim);
373 free(alert->discrim->reason);
374 free(alert->discrim);
375 free(alert);
376 }
377
378 #define opserv_debug(format...) do { if (opserv_conf.debug_channel) send_channel_notice(opserv_conf.debug_channel , opserv , ## format); } while (0)
379 #define opserv_alert(format...) do { if (opserv_conf.alert_channel) send_channel_notice(opserv_conf.alert_channel , opserv , ## format); } while (0)
380
381 /* A lot of these commands are very similar to what ChanServ can do,
382 * but OpServ can do them even on channels that aren't registered.
383 */
384
385 static MODCMD_FUNC(cmd_access)
386 {
387 struct handle_info *hi;
388 const char *target;
389 unsigned int res;
390
391 target = (argc > 1) ? (const char*)argv[1] : user->nick;
392 if (!irccasecmp(target, "*")) {
393 nickserv_show_oper_accounts(user, cmd);
394 return 1;
395 }
396 if (!(hi = modcmd_get_handle_info(user, target)))
397 return 0;
398 res = (argc > 2) ? oper_try_set_access(user, cmd->parent->bot, hi, strtoul(argv[2], NULL, 0)) : 0;
399 reply("OSMSG_USER_ACCESS_IS", target, hi->handle, hi->opserv_level);
400 return res;
401 }
402
403 static MODCMD_FUNC(cmd_ban)
404 {
405 struct mod_chanmode change;
406 struct userNode *victim;
407
408 mod_chanmode_init(&change);
409 change.argc = 1;
410 change.args[0].mode = MODE_BAN;
411 if (is_ircmask(argv[1]))
412 change.args[0].u.hostmask = strdup(argv[1]);
413 else if ((victim = GetUserH(argv[1])))
414 change.args[0].u.hostmask = generate_hostmask(victim, 0);
415 else {
416 reply("OSMSG_INVALID_IRCMASK", argv[1]);
417 return 0;
418 }
419 modcmd_chanmode_announce(&change);
420 reply("OSMSG_ADDED_BAN", change.args[0].u.hostmask, channel->name);
421 free((char*)change.args[0].u.hostmask);
422 return 1;
423 }
424
425 static MODCMD_FUNC(cmd_chaninfo)
426 {
427 char buffer[MAXLEN];
428 const char *fmt;
429 struct banNode *ban;
430 struct exemptNode *exempt;
431 struct modeNode *moden;
432 unsigned int n;
433
434 reply("OSMSG_CHANINFO_HEADER", channel->name);
435 fmt = user_find_message(user, "OSMSG_CHANINFO_TIMESTAMP");
436 strftime(buffer, sizeof(buffer), fmt, gmtime(&channel->timestamp));
437 send_message_type(4, user, cmd->parent->bot, "%s", buffer);
438 irc_make_chanmode(channel, buffer);
439 if (channel->bad_channel)
440 reply("OSMSG_CHANINFO_MODES_BADWORD", buffer);
441 else
442 reply("OSMSG_CHANINFO_MODES", buffer);
443 if (channel->topic_time) {
444 fmt = user_find_message(user, "OSMSG_CHANINFO_TOPIC");
445 strftime(buffer, sizeof(buffer), fmt, gmtime(&channel->topic_time));
446 send_message_type(4, user, cmd->parent->bot, buffer, channel->topic_nick, channel->topic);
447 } else {
448 irc_fetchtopic(cmd->parent->bot, channel->name);
449 reply("OSMSG_CHANINFO_TOPIC_UNKNOWN");
450 }
451 if (channel->banlist.used) {
452 reply("OSMSG_CHANINFO_BAN_COUNT", channel->banlist.used);
453 fmt = user_find_message(user, "OSMSG_CHANINFO_BAN");
454 for (n = 0; n < channel->banlist.used; n++) {
455 ban = channel->banlist.list[n];
456 strftime(buffer, sizeof(buffer), fmt, localtime(&ban->set));
457 send_message_type(4, user, cmd->parent->bot, buffer, ban->ban, ban->who);
458 }
459 }
460 if (channel->exemptlist.used) {
461 reply("OSMSG_CHANINFO_EXEMPT_COUNT", channel->exemptlist.used);
462 fmt = user_find_message(user, "OSMSG_CHANINFO_EXEMPT");
463 for (n = 0; n < channel->exemptlist.used; n++) {
464 exempt = channel->exemptlist.list[n];
465 strftime(buffer, sizeof(buffer), fmt, localtime(&exempt->set));
466 send_message_type(4, user, cmd->parent->bot, buffer, exempt->exempt, exempt->who);
467 }
468 }
469 if ((argc < 2) && (channel->members.used >= 50)) {
470 /* early out unless they ask for users */
471 reply("OSMSG_CHANINFO_MANY_USERS", channel->members.used, argv[0], channel->name);
472 return 1;
473 }
474 reply("OSMSG_CHANINFO_USER_COUNT", channel->members.used);
475 for (n=0; n<channel->members.used; n++) {
476 moden = channel->members.list[n];
477 if (moden->modes & MODE_CHANOP)
478 send_message_type(4, user, cmd->parent->bot, " @%s (%s@%s)", moden->user->nick, moden->user->ident, moden->user->hostname);
479 }
480 for (n=0; n<channel->members.used; n++) {
481 moden = channel->members.list[n];
482 if ((moden->modes & (MODE_CHANOP|MODE_HALFOP|MODE_VOICE)) == MODE_HALFOP)
483 send_message_type(4, user, cmd->parent->bot, " %s%s (%s@%s)", "%", moden->user->nick, moden->user->ident, moden->user->hostname);
484 }
485 for (n=0; n<channel->members.used; n++) {
486 moden = channel->members.list[n];
487 if ((moden->modes & (MODE_CHANOP|MODE_HALFOP|MODE_VOICE)) == MODE_VOICE)
488 send_message_type(4, user, cmd->parent->bot, " +%s (%s@%s)", moden->user->nick, moden->user->ident, moden->user->hostname);
489 }
490 for (n=0; n<channel->members.used; n++) {
491 moden = channel->members.list[n];
492 if ((moden->modes & (MODE_CHANOP|MODE_HALFOP|MODE_VOICE)) == 0)
493 send_message_type(4, user, cmd->parent->bot, " %s (%s@%s)", moden->user->nick, moden->user->ident, moden->user->hostname);
494 }
495 return 1;
496 }
497
498 static MODCMD_FUNC(cmd_warn)
499 {
500 char *reason, *message;
501
502 if (!IsChannelName(argv[1])) {
503 reply("OSMSG_NEED_CHANNEL", argv[0]);
504 return 0;
505 }
506 reason = dict_find(opserv_chan_warn, argv[1], NULL);
507 if (reason) {
508 reply("OSMSG_WARN_EXISTS", argv[1]);
509 return 0;
510 }
511 if (argv[2])
512 reason = strdup(unsplit_string(argv+2, argc-2, NULL));
513 else
514 reason = strdup("No reason");
515 dict_insert(opserv_chan_warn, strdup(argv[1]), reason);
516 reply("OSMSG_WARN_ADDED", argv[1], reason);
517 if (dict_find(channels, argv[1], NULL)) {
518 message = alloca(strlen(reason) + strlen(argv[1]) + 55);
519 sprintf(message, "Channel activity warning for channel %s: %s", argv[1], reason);
520 global_message(MESSAGE_RECIPIENT_OPERS, message);
521 }
522 return 1;
523 }
524
525 static MODCMD_FUNC(cmd_unwarn)
526 {
527 if ((argc < 2) || !IsChannelName(argv[1])) {
528 reply("OSMSG_NEED_CHANNEL", argv[0]);
529 return 0;
530 }
531 if (!dict_remove(opserv_chan_warn, argv[1])) {
532 reply("OSMSG_WARN_NOEXIST", argv[1]);
533 return 0;
534 }
535 reply("OSMSG_WARN_DELETED", argv[1]);
536 return 1;
537 }
538
539 static MODCMD_FUNC(cmd_clearbans)
540 {
541 struct mod_chanmode *change;
542 unsigned int ii;
543
544 change = mod_chanmode_alloc(channel->banlist.used);
545 for (ii=0; ii<channel->banlist.used; ii++) {
546 change->args[ii].mode = MODE_REMOVE | MODE_BAN;
547 change->args[ii].u.hostmask = channel->banlist.list[ii]->ban;
548 }
549 modcmd_chanmode_announce(change);
550 mod_chanmode_free(change);
551 reply("OSMSG_CLEARBANS_DONE", channel->name);
552 return 1;
553 }
554
555 static MODCMD_FUNC(cmd_clearmodes)
556 {
557 struct mod_chanmode change;
558
559 if (!channel->modes) {
560 reply("OSMSG_NO_CHANNEL_MODES", channel->name);
561 return 0;
562 }
563 mod_chanmode_init(&change);
564 change.modes_clear = channel->modes;
565 modcmd_chanmode_announce(&change);
566 reply("OSMSG_CLEARMODES_DONE", channel->name);
567 return 1;
568 }
569
570 static MODCMD_FUNC(cmd_deop)
571 {
572 struct mod_chanmode *change;
573 unsigned int arg, count;
574
575 change = mod_chanmode_alloc(argc-1);
576 for (arg = 1, count = 0; arg < argc; ++arg) {
577 struct userNode *victim = GetUserH(argv[arg]);
578 struct modeNode *mn;
579 if (!victim || IsService(victim)
580 || !(mn = GetUserMode(channel, victim))
581 || !(mn->modes & MODE_CHANOP))
582 continue;
583 change->args[count].mode = MODE_REMOVE | MODE_CHANOP;
584 change->args[count++].u.member = mn;
585 }
586 if (count) {
587 change->argc = count;
588 modcmd_chanmode_announce(change);
589 }
590 mod_chanmode_free(change);
591 reply("OSMSG_DEOP_DONE");
592 return 1;
593 }
594
595 static MODCMD_FUNC(cmd_dehop)
596 {
597 struct mod_chanmode *change;
598 unsigned int arg, count;
599
600 change = mod_chanmode_alloc(argc-1);
601 for (arg = 1, count = 0; arg < argc; ++arg) {
602 struct userNode *victim = GetUserH(argv[arg]);
603 struct modeNode *mn;
604 if (!victim || IsService(victim)
605 || !(mn = GetUserMode(channel, victim))
606 || !(mn->modes & MODE_HALFOP))
607 continue;
608 change->args[count].mode = MODE_REMOVE | MODE_HALFOP;
609 change->args[count++].member = mn;
610 }
611 if (count) {
612 change->argc = count;
613 modcmd_chanmode_announce(change);
614 }
615 mod_chanmode_free(change);
616 reply("OSMSG_DEHOP_DONE");
617 return 1;
618 }
619
620 static MODCMD_FUNC(cmd_deopall)
621 {
622 struct mod_chanmode *change;
623 unsigned int ii, count;
624
625 change = mod_chanmode_alloc(channel->members.used);
626 for (ii = count = 0; ii < channel->members.used; ++ii) {
627 struct modeNode *mn = channel->members.list[ii];
628 if (IsService(mn->user) || !(mn->modes & MODE_CHANOP))
629 continue;
630 change->args[count].mode = MODE_REMOVE | MODE_CHANOP;
631 change->args[count++].u.member = mn;
632 }
633 if (count) {
634 change->argc = count;
635 modcmd_chanmode_announce(change);
636 }
637 mod_chanmode_free(change);
638 reply("OSMSG_DEOPALL_DONE", channel->name);
639 return 1;
640 }
641
642 static MODCMD_FUNC(cmd_dehopall)
643 {
644 struct mod_chanmode *change;
645 unsigned int ii, count;
646
647 change = mod_chanmode_alloc(channel->members.used);
648 for (ii = count = 0; ii < channel->members.used; ++ii) {
649 struct modeNode *mn = channel->members.list[ii];
650 if (IsService(mn->user) || !(mn->modes & MODE_HALFOP))
651 continue;
652 change->args[count].mode = MODE_REMOVE | MODE_HALFOP;
653 change->args[count++].member = mn;
654 }
655 if (count) {
656 change->argc = count;
657 modcmd_chanmode_announce(change);
658 }
659 mod_chanmode_free(change);
660 reply("OSMSG_DEHOPALL_DONE", channel->name);
661 return 1;
662 }
663
664 static MODCMD_FUNC(cmd_rehash)
665 {
666 extern char *services_config;
667
668 if (conf_read(services_config))
669 reply("OSMSG_REHASH_COMPLETE");
670 else
671 reply("OSMSG_REHASH_FAILED");
672 return 1;
673 }
674
675 static MODCMD_FUNC(cmd_reopen)
676 {
677 log_reopen();
678 reply("OSMSG_REOPEN_COMPLETE");
679 return 1;
680 }
681
682 static MODCMD_FUNC(cmd_reconnect)
683 {
684 reply("OSMSG_RECONNECTING");
685 irc_squit(self, "Reconnecting.", NULL);
686 return 1;
687 }
688
689 static MODCMD_FUNC(cmd_jupe)
690 {
691 extern int force_n2k;
692 struct server *newsrv;
693 unsigned int num;
694 char numeric[COMBO_NUMERIC_LEN+1], srvdesc[SERVERDESCRIPTMAX+1];
695
696 num = atoi(argv[2]);
697 if ((num < 64) && !force_n2k) {
698 inttobase64(numeric, num, 1);
699 inttobase64(numeric+1, 64*64-1, 2);
700 } else {
701 inttobase64(numeric, num, 2);
702 inttobase64(numeric+2, 64*64*64-1, 3);
703 }
704 #ifdef WITH_PROTOCOL_P10
705 if (GetServerN(numeric)) {
706 reply("OSMSG_NUMERIC_COLLIDE", num, numeric);
707 return 0;
708 }
709 #endif
710 if (GetServerH(argv[1])) {
711 reply("OSMSG_NAME_COLLIDE");
712 return 0;
713 }
714 snprintf(srvdesc, sizeof(srvdesc), "JUPE %s", unsplit_string(argv+3, argc-3, NULL));
715 newsrv = AddServer(self, argv[1], 1, now, now, numeric, srvdesc);
716 if (!newsrv) {
717 reply("OSMSG_SRV_CREATE_FAILED");
718 return 0;
719 }
720 irc_server(newsrv);
721 reply("OSMSG_SERVER_JUPED", argv[1]);
722 return 1;
723 }
724
725 static MODCMD_FUNC(cmd_unjupe)
726 {
727 struct server *srv;
728 char *reason;
729
730 srv = GetServerH(argv[1]);
731 if (!srv) {
732 reply("MSG_SERVER_UNKNOWN", argv[1]);
733 return 0;
734 }
735 if (strncmp(srv->description, "JUPE", 4)) {
736 reply("OSMSG_SERVER_NOT_JUPE");
737 return 0;
738 }
739 reason = (argc > 2) ? unsplit_string(argv+2, argc-2, NULL) : "Unjuping server";
740 DelServer(srv, 1, reason);
741 reply("OSMSG_SERVER_UNJUPED");
742 return 1;
743 }
744
745 static MODCMD_FUNC(cmd_jump)
746 {
747 extern struct cManagerNode cManager;
748 void uplink_select(char *name);
749 struct uplinkNode *uplink_find(char *name);
750 struct uplinkNode *uplink;
751 char *target;
752
753 target = unsplit_string(argv+1, argc-1, NULL);
754
755 if (!strcmp(cManager.uplink->name, target)) {
756 reply("OSMSG_CURRENT_UPLINK", cManager.uplink->name);
757 return 0;
758 }
759
760 uplink = uplink_find(target);
761 if (!uplink) {
762 reply("OSMSG_INVALID_UPLINK", target);
763 return 0;
764 }
765 if (uplink->flags & UPLINK_UNAVAILABLE) {
766 reply("OSMSG_UPLINK_DISABLED", uplink->name);
767 return 0;
768 }
769
770 reply("OSMSG_UPLINK_CONNECTING", uplink->name, uplink->host, uplink->port);
771 uplink_select(target);
772 irc_squit(self, "Reconnecting.", NULL);
773 return 1;
774 }
775
776 static MODCMD_FUNC(cmd_die)
777 {
778 char *reason, *text;
779
780 text = unsplit_string(argv+1, argc-1, NULL);
781 reason = alloca(strlen(text) + strlen(user->nick) + 20);
782 sprintf(reason, "Disconnected by %s [%s]", user->nick, text);
783 irc_squit(self, reason, text);
784 quit_services = 1;
785 return 1;
786 }
787
788 static MODCMD_FUNC(cmd_restart)
789 {
790 extern int services_argc;
791 extern char **services_argv;
792 char **restart_argv, *reason, *text;
793
794 text = unsplit_string(argv+1, argc-1, NULL);
795 reason = alloca(strlen(text) + strlen(user->nick) + 17);
796 sprintf(reason, "Restarted by %s [%s]", user->nick, text);
797 irc_squit(self, reason, text);
798
799 /* Append a NULL to the end of argv[]. */
800 restart_argv = (char **)alloca((services_argc + 1) * sizeof(char *));
801 memcpy(restart_argv, services_argv, services_argc * sizeof(char *));
802 restart_argv[services_argc] = NULL;
803
804 call_exit_funcs();
805
806 /* Don't blink. */
807 execv(services_argv[0], restart_argv);
808
809 /* If we're still here, that means something went wrong. Reconnect. */
810 return 1;
811 }
812
813 static struct gline *
814 opserv_block(struct userNode *target, char *src_handle, char *reason, unsigned long duration)
815 {
816 char *mask;
817 mask = alloca(MAXLEN);
818 snprintf(mask, MAXLEN, "*@%s", target->hostname);
819 if (!reason) {
820 reason = alloca(MAXLEN);
821 snprintf(reason, MAXLEN, "G-line requested by %s.", src_handle);
822 }
823 if (!duration) duration = opserv_conf.block_gline_duration;
824 return gline_add(src_handle, mask, duration, reason, now, 1);
825 }
826
827 static MODCMD_FUNC(cmd_block)
828 {
829 struct userNode *target;
830 struct gline *gline;
831 char *reason;
832
833 target = GetUserH(argv[1]);
834 if (!target) {
835 reply("MSG_NICK_UNKNOWN", argv[1]);
836 return 0;
837 }
838 if (IsService(target)) {
839 reply("MSG_SERVICE_IMMUNE", target->nick);
840 return 0;
841 }
842 reason = (argc > 2) ? unsplit_string(argv+2, argc-2, NULL) : NULL;
843 gline = opserv_block(target, user->handle_info->handle, reason, 0);
844 reply("OSMSG_GLINE_ISSUED", gline->target);
845 return 1;
846 }
847
848 static MODCMD_FUNC(cmd_gline)
849 {
850 unsigned long duration;
851 char *reason;
852 struct gline *gline;
853
854 reason = unsplit_string(argv+3, argc-3, NULL);
855 if (!is_gline(argv[1]) && !IsChannelName(argv[1]) && (argv[1][0] != '&')) {
856 reply("MSG_INVALID_GLINE", argv[1]);
857 return 0;
858 }
859 if (!argv[1][strspn(argv[1], "#&*?@.")] && (strlen(argv[1]) < 10)) {
860 reply("OSMSG_STUPID_GLINE", argv[1]);
861 return 0;
862 }
863 duration = ParseInterval(argv[2]);
864 if (!duration) {
865 reply("MSG_INVALID_DURATION", argv[2]);
866 return 0;
867 }
868 gline = gline_add(user->handle_info->handle, argv[1], duration, reason, now, 1);
869 reply("OSMSG_GLINE_ISSUED", gline->target);
870 return 1;
871 }
872
873 static MODCMD_FUNC(cmd_ungline)
874 {
875 if (gline_remove(argv[1], 1))
876 reply("OSMSG_GLINE_REMOVED", argv[1]);
877 else
878 reply("OSMSG_GLINE_FORCE_REMOVED", argv[1]);
879 return 1;
880 }
881
882 static MODCMD_FUNC(cmd_refreshg)
883 {
884 if (argc > 1) {
885 unsigned int count;
886 dict_iterator_t it;
887 struct server *srv;
888
889 for (it=dict_first(servers), count=0; it; it=iter_next(it)) {
890 srv = iter_data(it);
891 if ((srv == self) || !match_ircglob(srv->name, argv[1]))
892 continue;
893 gline_refresh_server(srv);
894 reply("OSMSG_GLINES_ONE_REFRESHED", srv->name);
895 count++;
896 }
897 if (!count) {
898 reply("MSG_SERVER_UNKNOWN", argv[1]);
899 return 0;
900 }
901 } else {
902 gline_refresh_all();
903 reply("OSMSG_GLINES_REFRESHED");
904 }
905 return 1;
906 }
907
908 static void
909 opserv_ison(struct userNode *tell, struct userNode *target, const char *message)
910 {
911 struct modeNode *mn;
912 unsigned int count, here_len, n, maxlen;
913 char buff[MAXLEN];
914
915 maxlen = tell->handle_info ? tell->handle_info->screen_width : 0;
916 if (!maxlen)
917 maxlen = MAX_LINE_SIZE;
918 for (n=count=0; n<target->channels.used; n++) {
919 mn = target->channels.list[n];
920 here_len = strlen(mn->channel->name);
921 if ((count + here_len + 4) > maxlen) {
922 buff[count] = 0;
923 send_message(tell, opserv, message, buff);
924 count = 0;
925 }
926 if (mn->modes & MODE_CHANOP)
927 buff[count++] = '@';
928 if (mn->modes & MODE_HALFOP)
929 buff[count++] = '%';
930 if (mn->modes & MODE_VOICE)
931 buff[count++] = '+';
932 memcpy(buff+count, mn->channel->name, here_len);
933 count += here_len;
934 buff[count++] = ' ';
935 }
936 if (count) {
937 buff[count] = 0;
938 send_message(tell, opserv, message, buff);
939 }
940 }
941
942 static MODCMD_FUNC(cmd_inviteme)
943 {
944 struct userNode *target;
945
946 if (argc < 2) {
947 target = user;
948 } else {
949 target = GetUserH(argv[1]);
950 if (!target) {
951 reply("MSG_NICK_UNKNOWN", argv[1]);
952 return 0;
953 }
954 }
955 if (opserv_conf.debug_channel == NULL) {
956 reply("OSMSG_NO_DEBUG_CHANNEL");
957 return 0;
958 }
959 if (GetUserMode(opserv_conf.debug_channel, user)) {
960 reply("OSMSG_ALREADY_THERE", opserv_conf.debug_channel->name);
961 return 0;
962 }
963 irc_invite(cmd->parent->bot, target, opserv_conf.debug_channel);
964 if (target != user)
965 reply("OSMSG_INVITE_DONE", target->nick, opserv_conf.debug_channel->name);
966 return 1;
967 }
968
969 static MODCMD_FUNC(cmd_invite)
970 {
971 if (GetUserMode(channel, user)) {
972 reply("OSMSG_ALREADY_THERE", channel->name);
973 return 0;
974 }
975 irc_invite(cmd->parent->bot, user, channel);
976 return 1;
977 }
978
979 static MODCMD_FUNC(cmd_join)
980 {
981 struct userNode *bot = cmd->parent->bot;
982
983 if (!IsChannelName(argv[1])) {
984 reply("MSG_NOT_CHANNEL_NAME");
985 return 0;
986 } else if (!(channel = GetChannel(argv[1]))) {
987 channel = AddChannel(argv[1], now, NULL, NULL, NULL);
988 AddChannelUser(bot, channel)->modes |= MODE_CHANOP;
989 } else if (GetUserMode(channel, bot)) {
990 reply("OSMSG_ALREADY_JOINED", channel->name);
991 return 0;
992 } else {
993 struct mod_chanmode change;
994 mod_chanmode_init(&change);
995 change.argc = 1;
996 change.args[0].mode = MODE_CHANOP;
997 change.args[0].u.member = AddChannelUser(bot, channel);
998 modcmd_chanmode_announce(&change);
999 }
1000 irc_fetchtopic(bot, channel->name);
1001 reply("OSMSG_JOIN_DONE", channel->name);
1002 return 1;
1003 }
1004
1005 static MODCMD_FUNC(cmd_kick)
1006 {
1007 struct userNode *target;
1008 char *reason;
1009
1010 if (argc < 3) {
1011 reason = alloca(strlen(OSMSG_KICK_REQUESTED)+strlen(user->nick)+1);
1012 sprintf(reason, OSMSG_KICK_REQUESTED, user->nick);
1013 } else {
1014 reason = unsplit_string(argv+2, argc-2, NULL);
1015 }
1016 target = GetUserH(argv[1]);
1017 if (!target) {
1018 reply("MSG_NICK_UNKNOWN", argv[1]);
1019 return 0;
1020 }
1021 if (!GetUserMode(channel, target)) {
1022 reply("OSMSG_NOT_ON_CHANNEL", target->nick, channel->name);
1023 return 0;
1024 }
1025 KickChannelUser(target, channel, cmd->parent->bot, reason);
1026 return 1;
1027 }
1028
1029 static MODCMD_FUNC(cmd_kickall)
1030 {
1031 unsigned int limit, n, inchan;
1032 struct modeNode *mn;
1033 char *reason;
1034 struct userNode *bot = cmd->parent->bot;
1035
1036 /* ircu doesn't let servers KICK users, so if OpServ's not in the
1037 * channel, we have to join it in temporarily. */
1038 if (!(inchan = GetUserMode(channel, bot) ? 1 : 0)) {
1039 struct mod_chanmode change;
1040 mod_chanmode_init(&change);
1041 change.args[0].mode = MODE_CHANOP;
1042 change.args[0].u.member = AddChannelUser(bot, channel);
1043 modcmd_chanmode_announce(&change);
1044 }
1045 if (argc < 2) {
1046 reason = alloca(strlen(OSMSG_KICK_REQUESTED)+strlen(user->nick)+1);
1047 sprintf(reason, OSMSG_KICK_REQUESTED, user->nick);
1048 } else {
1049 reason = unsplit_string(argv+1, argc-1, NULL);
1050 }
1051 limit = user->handle_info->opserv_level;
1052 for (n=channel->members.used; n>0;) {
1053 mn = channel->members.list[--n];
1054 if (IsService(mn->user)
1055 || (mn->user->handle_info
1056 && (mn->user->handle_info->opserv_level >= limit))) {
1057 continue;
1058 }
1059 KickChannelUser(mn->user, channel, bot, reason);
1060 }
1061 if (!inchan)
1062 DelChannelUser(bot, channel, "My work here is done", 0);
1063 reply("OSMSG_KICKALL_DONE", channel->name);
1064 return 1;
1065 }
1066
1067 static MODCMD_FUNC(cmd_kickban)
1068 {
1069 struct mod_chanmode change;
1070 struct userNode *target;
1071 char *reason;
1072 char *mask;
1073
1074 if (argc == 2) {
1075 reason = alloca(strlen(OSMSG_KICK_REQUESTED)+strlen(user->nick)+1);
1076 sprintf(reason, OSMSG_KICK_REQUESTED, user->nick);
1077 } else {
1078 reason = unsplit_string(argv+2, argc-2, NULL);
1079 }
1080 target = GetUserH(argv[1]);
1081 if (!target) {
1082 reply("MSG_NICK_UNKNOWN", argv[1]);
1083 return 0;
1084 }
1085 if (!GetUserMode(channel, target)) {
1086 reply("OSMSG_NOT_ON_CHANNEL", target->nick, channel->name);
1087 return 0;
1088 }
1089 mod_chanmode_init(&change);
1090 change.argc = 1;
1091 change.args[0].mode = MODE_BAN;
1092 change.args[0].u.hostmask = mask = generate_hostmask(target, 0);
1093 modcmd_chanmode_announce(&change);
1094 KickChannelUser(target, channel, cmd->parent->bot, reason);
1095 free(mask);
1096 return 1;
1097 }
1098
1099 static MODCMD_FUNC(cmd_kickbanall)
1100 {
1101 struct modeNode *mn;
1102 struct userNode *bot = cmd->parent->bot;
1103 struct mod_chanmode *change;
1104 char *reason;
1105 unsigned int limit, n, inchan;
1106
1107 /* ircu doesn't let servers KICK users, so if OpServ's not in the
1108 * channel, we have to join it in temporarily. */
1109 if (!(inchan = GetUserMode(channel, bot) ? 1 : 0)) {
1110 change = mod_chanmode_alloc(2);
1111 change->args[0].mode = MODE_CHANOP;
1112 change->args[0].u.member = AddChannelUser(bot, channel);
1113 change->args[1].mode = MODE_BAN;
1114 change->args[1].u.hostmask = "*!*@*";
1115 } else {
1116 change = mod_chanmode_alloc(1);
1117 change->args[0].mode = MODE_BAN;
1118 change->args[0].u.hostmask = "*!*@*";
1119 }
1120 modcmd_chanmode_announce(change);
1121 mod_chanmode_free(change);
1122 if (argc < 2) {
1123 reason = alloca(strlen(OSMSG_KICK_REQUESTED)+strlen(user->nick)+1);
1124 sprintf(reason, OSMSG_KICK_REQUESTED, user->nick);
1125 } else {
1126 reason = unsplit_string(argv+1, argc-1, NULL);
1127 }
1128 /* now kick them */
1129 limit = user->handle_info->opserv_level;
1130 for (n=channel->members.used; n>0; ) {
1131 mn = channel->members.list[--n];
1132 if (IsService(mn->user)
1133 || (mn->user->handle_info
1134 && (mn->user->handle_info->opserv_level >= limit))) {
1135 continue;
1136 }
1137 KickChannelUser(mn->user, channel, bot, reason);
1138 }
1139 if (!inchan)
1140 DelChannelUser(bot, channel, "My work here is done", 0);
1141 reply("OSMSG_KICKALL_DONE", channel->name);
1142 return 1;
1143 }
1144
1145 static MODCMD_FUNC(cmd_part)
1146 {
1147 char *reason;
1148
1149 if (!IsChannelName(argv[1])) {
1150 reply("MSG_NOT_CHANNEL_NAME");
1151 return 0;
1152 }
1153 if ((channel = GetChannel(argv[1]))) {
1154 if (!GetUserMode(channel, cmd->parent->bot)) {
1155 reply("OSMSG_NOT_ON_CHANNEL", cmd->parent->bot->nick, channel->name);
1156 return 0;
1157 }
1158 reason = (argc < 3) ? "Leaving." : unsplit_string(argv+2, argc-2, NULL);
1159 reply("OSMSG_LEAVING", channel->name);
1160 DelChannelUser(cmd->parent->bot, channel, reason, 0);
1161 }
1162 return 1;
1163 }
1164
1165 static MODCMD_FUNC(cmd_mode)
1166 {
1167 if (!modcmd_chanmode(argv+1, argc-1, MCP_ALLOW_OVB|MCP_KEY_FREE|MC_ANNOUNCE)) {
1168 reply("MSG_INVALID_MODES", unsplit_string(argv+1, argc-1, NULL));
1169 return 0;
1170 }
1171 reply("OSMSG_MODE_SET", channel->name);
1172 return 1;
1173 }
1174
1175 static MODCMD_FUNC(cmd_op)
1176 {
1177 struct mod_chanmode *change;
1178 unsigned int arg, count;
1179
1180 change = mod_chanmode_alloc(argc-1);
1181 for (arg = 1, count = 0; arg < argc; ++arg) {
1182 struct userNode *victim;
1183 struct modeNode *mn;
1184 if (!(victim = GetUserH(argv[arg])))
1185 continue;
1186 if (!(mn = GetUserMode(channel, victim)))
1187 continue;
1188 if (mn->modes & MODE_CHANOP)
1189 continue;
1190 change->args[count].mode = MODE_CHANOP;
1191 change->args[count++].u.member = mn;
1192 }
1193 if (count) {
1194 change->argc = count;
1195 modcmd_chanmode_announce(change);
1196 }
1197 mod_chanmode_free(change);
1198 reply("OSMSG_OP_DONE");
1199 return 1;
1200 }
1201
1202 static MODCMD_FUNC(cmd_hop)
1203 {
1204 struct mod_chanmode *change;
1205 unsigned int arg, count;
1206
1207 change = mod_chanmode_alloc(argc-1);
1208 for (arg = 1, count = 0; arg < argc; ++arg) {
1209 struct userNode *victim;
1210 struct modeNode *mn;
1211 if (!(victim = GetUserH(argv[arg])))
1212 continue;
1213 if (!(mn = GetUserMode(channel, victim)))
1214 continue;
1215 if (mn->modes & MODE_HALFOP)
1216 continue;
1217 change->args[count].mode = MODE_HALFOP;
1218 change->args[count++].member = mn;
1219 }
1220 if (count) {
1221 change->argc = count;
1222 modcmd_chanmode_announce(change);
1223 }
1224 mod_chanmode_free(change);
1225 reply("OSMSG_HOP_DONE");
1226 return 1;
1227 }
1228
1229 static MODCMD_FUNC(cmd_opall)
1230 {
1231 struct mod_chanmode *change;
1232 unsigned int ii, count;
1233
1234 change = mod_chanmode_alloc(channel->members.used);
1235 for (ii = count = 0; ii < channel->members.used; ++ii) {
1236 struct modeNode *mn = channel->members.list[ii];
1237 if (mn->modes & MODE_CHANOP)
1238 continue;
1239 change->args[count].mode = MODE_CHANOP;
1240 change->args[count++].u.member = mn;
1241 }
1242 if (count) {
1243 change->argc = count;
1244 modcmd_chanmode_announce(change);
1245 }
1246 mod_chanmode_free(change);
1247 reply("OSMSG_OPALL_DONE", channel->name);
1248 return 1;
1249 }
1250
1251 static MODCMD_FUNC(cmd_hopall)
1252 {
1253 struct mod_chanmode *change;
1254 unsigned int ii, count;
1255
1256 change = mod_chanmode_alloc(channel->members.used);
1257 for (ii = count = 0; ii < channel->members.used; ++ii) {
1258 struct modeNode *mn = channel->members.list[ii];
1259 if (mn->modes & MODE_HALFOP)
1260 continue;
1261 change->args[count].mode = MODE_HALFOP;
1262 change->args[count++].member = mn;
1263 }
1264 if (count) {
1265 change->argc = count;
1266 modcmd_chanmode_announce(change);
1267 }
1268 mod_chanmode_free(change);
1269 reply("OSMSG_HOPALL_DONE", channel->name);
1270 return 1;
1271 }
1272
1273 static MODCMD_FUNC(cmd_whois)
1274 {
1275 struct userNode *target;
1276 char buffer[128];
1277 int bpos, herelen;
1278
1279 #ifdef WITH_PROTOCOL_P10
1280 if (argv[1][0] == '*')
1281 target = GetUserN(argv[1]+1);
1282 else
1283 target = GetUserH(argv[1]);
1284 #else
1285 target = GetUserH(argv[1]);
1286 #endif
1287 if (!target) {
1288 reply("MSG_NICK_UNKNOWN", argv[1]);
1289 return 0;
1290 }
1291 reply("OSMSG_WHOIS_NICK", target->nick);
1292 reply("OSMSG_WHOIS_HOST", target->ident, target->hostname);
1293 if (IsFakeHost(target))
1294 reply("OSMSG_WHOIS_FAKEHOST", target->fakehost);
1295 reply("OSMSG_WHOIS_IP", inet_ntoa(target->ip));
1296 if (target->modes) {
1297 bpos = 0;
1298 #define buffer_cat(str) (herelen = strlen(str), memcpy(buffer+bpos, str, herelen), bpos += herelen)
1299 if (IsInvisible(target)) buffer[bpos++] = 'i';
1300 if (IsWallOp(target)) buffer[bpos++] = 'w';
1301 if (IsOper(target)) buffer[bpos++] = 'o';
1302 if (IsGlobal(target)) buffer[bpos++] = 'g';
1303 if (IsServNotice(target)) buffer[bpos++] = 's';
1304
1305 // sethost - reed/apples
1306 // if (IsHelperIrcu(target)) buffer[bpos++] = 'h';
1307 if (IsSetHost(target)) buffer[bpos++] = 'h';
1308
1309 if (IsService(target)) buffer[bpos++] = 'k';
1310 if (IsDeaf(target)) buffer[bpos++] = 'd';
1311 if (IsHiddenHost(target)) buffer[bpos++] = 'x';
1312 if (IsGagged(target)) buffer_cat(" (gagged)");
1313 if (IsRegistering(target)) buffer_cat(" (registered account)");
1314 buffer[bpos] = 0;
1315 if (bpos > 0)
1316 reply("OSMSG_WHOIS_MODES", buffer);
1317 }
1318 reply("OSMSG_WHOIS_INFO", target->info);
1319 #ifdef WITH_PROTOCOL_P10
1320 reply("OSMSG_WHOIS_NUMERIC", target->numeric);
1321 #endif
1322 reply("OSMSG_WHOIS_SERVER", target->uplink->name);
1323 reply("OSMSG_WHOIS_ACCOUNT", (target->handle_info ? target->handle_info->handle : "Not authenticated"));
1324 intervalString(buffer, now - target->timestamp, user->handle_info);
1325 reply("OSMSG_WHOIS_NICK_AGE", buffer);
1326 if (target->channels.used <= MAX_CHANNELS_WHOIS)
1327 opserv_ison(user, target, "OSMSG_WHOIS_CHANNELS");
1328 else
1329 reply("OSMSG_WHOIS_HIDECHANS");
1330 return 1;
1331 }
1332
1333 static MODCMD_FUNC(cmd_unban)
1334 {
1335 struct mod_chanmode change;
1336 mod_chanmode_init(&change);
1337 change.argc = 1;
1338 change.args[0].mode = MODE_REMOVE | MODE_BAN;
1339 change.args[0].u.hostmask = argv[1];
1340 modcmd_chanmode_announce(&change);
1341 reply("OSMSG_UNBAN_DONE", channel->name);
1342 return 1;
1343 }
1344
1345 static MODCMD_FUNC(cmd_voiceall)
1346 {
1347 struct mod_chanmode *change;
1348 unsigned int ii, count;
1349
1350 change = mod_chanmode_alloc(channel->members.used);
1351 for (ii = count = 0; ii < channel->members.used; ++ii) {
1352 struct modeNode *mn = channel->members.list[ii];
1353 if (mn->modes & (MODE_CHANOP|MODE_HALFOP|MODE_VOICE))
1354 continue;
1355 change->args[count].mode = MODE_VOICE;
1356 change->args[count++].u.member = mn;
1357 }
1358 if (count) {
1359 change->argc = count;
1360 modcmd_chanmode_announce(change);
1361 }
1362 mod_chanmode_free(change);
1363 reply("OSMSG_CHANNEL_VOICED", channel->name);
1364 return 1;
1365 }
1366
1367 static MODCMD_FUNC(cmd_devoiceall)
1368 {
1369 struct mod_chanmode *change;
1370 unsigned int ii, count;
1371
1372 change = mod_chanmode_alloc(channel->members.used);
1373 for (ii = count = 0; ii < channel->members.used; ++ii) {
1374 struct modeNode *mn = channel->members.list[ii];
1375 if (!(mn->modes & MODE_VOICE))
1376 continue;
1377 change->args[count].mode = MODE_REMOVE | MODE_VOICE;
1378 change->args[count++].u.member = mn;
1379 }
1380 if (count) {
1381 change->argc = count;
1382 modcmd_chanmode_announce(change);
1383 }
1384 mod_chanmode_free(change);
1385 reply("OSMSG_CHANNEL_DEVOICED", channel->name);
1386 return 1;
1387 }
1388
1389 static MODCMD_FUNC(cmd_stats_bad) {
1390 dict_iterator_t it;
1391 unsigned int ii, end, here_len;
1392 char buffer[400];
1393
1394 /* Show the bad word list.. */
1395 for (ii=end=0; ii<opserv_bad_words->used; ii++) {
1396 here_len = strlen(opserv_bad_words->list[ii]);
1397 if ((end + here_len + 2) > sizeof(buffer)) {
1398 buffer[end] = 0;
1399 reply("OSMSG_BADWORD_LIST", buffer);
1400 end = 0;
1401 }
1402 memcpy(buffer+end, opserv_bad_words->list[ii], here_len);
1403 end += here_len;
1404 buffer[end++] = ' ';
1405 }
1406 buffer[end] = 0;
1407 reply("OSMSG_BADWORD_LIST", buffer);
1408
1409 /* Show the exemption list.. */
1410 for (it=dict_first(opserv_exempt_channels), end=0; it; it=iter_next(it)) {
1411 here_len = strlen(iter_key(it));
1412 if ((end + here_len + 2) > sizeof(buffer)) {
1413 buffer[end] = 0;
1414 reply("OSMSG_EXEMPTED_LIST", buffer);
1415 end = 0;
1416 }
1417 memcpy(buffer+end, iter_key(it), here_len);
1418 end += here_len;
1419 buffer[end++] = ' ';
1420 }
1421 buffer[end] = 0;
1422 reply("OSMSG_EXEMPTED_LIST", buffer);
1423 return 1;
1424 }
1425
1426 static MODCMD_FUNC(cmd_stats_glines) {
1427 reply("OSMSG_GLINE_COUNT", gline_count());
1428 return 1;
1429 }
1430
1431 static void
1432 trace_links(struct userNode *bot, struct userNode *user, struct server *server, unsigned int depth) {
1433 unsigned int nn, pos;
1434 char buffer[400];
1435
1436 for (nn=1; nn<=depth; nn<<=1) ;
1437 for (pos=0, nn>>=1; nn>1; ) {
1438 nn >>= 1;
1439 buffer[pos++] = (depth & nn) ? ((nn == 1) ? '`' : ' ') : '|';
1440 buffer[pos++] = (nn == 1) ? '-': ' ';
1441 }
1442 buffer[pos] = 0;
1443 send_message(user, bot, "OSMSG_LINKS_SERVER", buffer, server->name, server->clients, server->description);
1444 if (!server->children.used)
1445 return;
1446 for (nn=0; nn<server->children.used-1; nn++) {
1447 trace_links(bot, user, server->children.list[nn], depth<<1);
1448 }
1449 trace_links(bot, user, server->children.list[nn], (depth<<1)|1);
1450 }
1451
1452 static MODCMD_FUNC(cmd_stats_links) {
1453 trace_links(cmd->parent->bot, user, self, 1);
1454 return 1;
1455 }
1456
1457
1458 static MODCMD_FUNC(cmd_stats_max) {
1459 reply("OSMSG_MAX_CLIENTS", max_clients, asctime(localtime(&max_clients_time)));
1460 return 1;
1461 }
1462
1463 static MODCMD_FUNC(cmd_stats_network) {
1464 struct helpfile_table tbl;
1465 unsigned int nn, tot_clients;
1466 dict_iterator_t it;
1467
1468 tot_clients = dict_size(clients);
1469 reply("OSMSG_NETWORK_INFO", tot_clients, invis_clients, curr_opers.used);
1470 tbl.length = dict_size(servers)+1;
1471 tbl.width = 3;
1472 tbl.flags = TABLE_NO_FREE;
1473 tbl.contents = calloc(tbl.length, sizeof(*tbl.contents));
1474 tbl.contents[0] = calloc(tbl.width, sizeof(**tbl.contents));
1475 tbl.contents[0][0] = "Server Name";
1476 tbl.contents[0][1] = "Clients";
1477 tbl.contents[0][2] = "Load";
1478 for (it=dict_first(servers), nn=1; it; it=iter_next(it)) {
1479 struct server *server = iter_data(it);
1480 char *buffer = malloc(32);
1481 tbl.contents[nn] = calloc(tbl.width, sizeof(**tbl.contents));
1482 tbl.contents[nn][0] = server->name;
1483 tbl.contents[nn][1] = buffer;
1484 sprintf(buffer, "%u", server->clients);
1485 tbl.contents[nn][2] = buffer + 16;
1486 sprintf(buffer+16, "%3.3g%%", ((double)server->clients/tot_clients)*100);
1487 nn++;
1488 }
1489 table_send(cmd->parent->bot, user->nick, 0, 0, tbl);
1490 for (nn=1; nn<tbl.length; nn++) {
1491 free((char*)tbl.contents[nn][1]);
1492 free(tbl.contents[nn]);
1493 }
1494 free(tbl.contents[0]);
1495 free(tbl.contents);
1496 return 1;
1497 }
1498
1499 static MODCMD_FUNC(cmd_stats_network2) {
1500 struct helpfile_table tbl;
1501 unsigned int nn;
1502 dict_iterator_t it;
1503
1504 tbl.length = dict_size(servers)+1;
1505 tbl.width = 3;
1506 tbl.flags = TABLE_NO_FREE;
1507 tbl.contents = calloc(tbl.length, sizeof(*tbl.contents));
1508 tbl.contents[0] = calloc(tbl.width, sizeof(**tbl.contents));
1509 tbl.contents[0][0] = "Server Name";
1510 tbl.contents[0][1] = "Numeric";
1511 tbl.contents[0][2] = "Link Time";
1512 for (it=dict_first(servers), nn=1; it; it=iter_next(it)) {
1513 struct server *server = iter_data(it);
1514 char *buffer = malloc(64);
1515 int ofs;
1516
1517 tbl.contents[nn] = calloc(tbl.width, sizeof(**tbl.contents));
1518 tbl.contents[nn][0] = server->name;
1519 #ifdef WITH_PROTOCOL_P10
1520 sprintf(buffer, "%s (%ld)", server->numeric, base64toint(server->numeric, strlen(server->numeric)));
1521 #else
1522 buffer[0] = 0;
1523 #endif
1524 tbl.contents[nn][1] = buffer;
1525 ofs = strlen(buffer) + 1;
1526 intervalString(buffer + ofs, now - server->link, user->handle_info);
1527 if (server->self_burst)
1528 strcat(buffer + ofs, " Bursting");
1529 tbl.contents[nn][2] = buffer + ofs;
1530 nn++;
1531 }
1532 table_send(cmd->parent->bot, user->nick, 0, 0, tbl);
1533 for (nn=1; nn<tbl.length; nn++) {
1534 free((char*)tbl.contents[nn][1]);
1535 free(tbl.contents[nn]);
1536 }
1537 free(tbl.contents[0]);
1538 free(tbl.contents);
1539 return 1;
1540 }
1541
1542 static MODCMD_FUNC(cmd_stats_reserved) {
1543 dict_iterator_t it;
1544
1545 reply("OSMSG_RESERVED_LIST");
1546 for (it = dict_first(opserv_reserved_nick_dict); it; it = iter_next(it))
1547 send_message_type(4, user, cmd->parent->bot, "%s", iter_key(it));
1548 return 1;
1549 }
1550
1551 static MODCMD_FUNC(cmd_stats_trusted) {
1552 dict_iterator_t it;
1553 struct trusted_host *th;
1554 char length[INTERVALLEN], issued[INTERVALLEN], limit[32];
1555
1556 if (argc > 1) {
1557 th = dict_find(opserv_trusted_hosts, argv[1], NULL);
1558 if (th) {
1559 if (th->issued)
1560 intervalString(issued, now - th->issued, user->handle_info);
1561 if (th->expires)
1562 intervalString(length, th->expires - now, user->handle_info);
1563 if (th->limit)
1564 sprintf(limit, "limit %lu", th->limit);
1565 reply("OSMSG_HOST_IS_TRUSTED",
1566 th->ipaddr,
1567 (th->limit ? limit : "no limit"),
1568 (th->issued ? issued : "some time"),
1569 (th->issuer ? th->issuer : "<unknown>"),
1570 (th->expires ? length : "never"),
1571 (th->reason ? th->reason : "<unknown>"));
1572 } else {
1573 reply("OSMSG_HOST_NOT_TRUSTED", argv[1]);
1574 }
1575 } else {
1576 reply("OSMSG_TRUSTED_LIST");
1577 for (it = dict_first(opserv_trusted_hosts); it; it = iter_next(it)) {
1578 th = iter_data(it);
1579 if (th->issued)
1580 intervalString(issued, now - th->issued, user->handle_info);
1581 if (th->expires)
1582 intervalString(length, th->expires - now, user->handle_info);
1583 if (th->limit)
1584 sprintf(limit, "limit %lu", th->limit);
1585 reply("OSMSG_HOST_IS_TRUSTED", iter_key(it),
1586 (th->limit ? limit : "no limit"),
1587 (th->issued ? issued : "some time"),
1588 (th->issuer ? th->issuer : "<unknown>"),
1589 (th->expires ? length : "never"),
1590 (th->reason ? th->reason : "<unknown>"));
1591 }
1592 }
1593 return 1;
1594 }
1595
1596 static MODCMD_FUNC(cmd_stats_uplink) {
1597 extern struct cManagerNode cManager;
1598 struct uplinkNode *uplink;
1599
1600 uplink = cManager.uplink;
1601 reply("OSMSG_UPLINK_START", uplink->name);
1602 reply("OSMSG_UPLINK_ADDRESS", uplink->host, uplink->port);
1603 return 1;
1604 }
1605
1606 static MODCMD_FUNC(cmd_stats_uptime) {
1607 char uptime[INTERVALLEN];
1608 struct tms buf;
1609 extern time_t boot_time;
1610 extern int lines_processed;
1611 static long clocks_per_sec;
1612
1613 if (!clocks_per_sec) {
1614 #if defined(HAVE_SYSCONF) && defined(_SC_CLK_TCK)
1615 clocks_per_sec = sysconf(_SC_CLK_TCK);
1616 if (clocks_per_sec <= 0)
1617 #endif
1618 {
1619 log_module(OS_LOG, LOG_ERROR, "Unable to query sysconf(_SC_CLK_TCK), output of 'stats uptime' will be wrong");
1620 clocks_per_sec = CLOCKS_PER_SEC;
1621 }
1622 }
1623 intervalString(uptime, time(NULL)-boot_time, user->handle_info);
1624 times(&buf);
1625 reply("OSMSG_UPTIME_STATS",
1626 uptime, lines_processed,
1627 buf.tms_utime/(double)clocks_per_sec,
1628 buf.tms_stime/(double)clocks_per_sec);
1629 return 1;
1630 }
1631
1632 static MODCMD_FUNC(cmd_stats_alerts) {
1633 dict_iterator_t it;
1634 struct opserv_user_alert *alert;
1635 const char *reaction;
1636
1637 reply("OSMSG_ALERTS_LIST");
1638 for (it = dict_first(opserv_user_alerts); it; it = iter_next(it)) {
1639 alert = iter_data(it);
1640 switch (alert->reaction) {
1641 case REACT_NOTICE: reaction = "notice"; break;
1642 case REACT_KILL: reaction = "kill"; break;
1643 case REACT_GLINE: reaction = "gline"; break;
1644 default: reaction = "<unknown>"; break;
1645 }
1646 reply("OSMSG_ALERT_IS", iter_key(it), alert->owner, reaction, alert->text_discrim);
1647 }
1648 return 1;
1649 }
1650
1651 static MODCMD_FUNC(cmd_stats_gags) {
1652 struct gag_entry *gag;
1653 struct helpfile_table table;
1654 unsigned int nn;
1655
1656 if (!gagList) {
1657 reply("OSMSG_NO_GAGS");
1658 return 1;
1659 }
1660 for (nn=0, gag=gagList; gag; nn++, gag=gag->next) ;
1661 table.length = nn+1;
1662 table.width = 4;
1663 table.flags = TABLE_NO_FREE;
1664 table.contents = calloc(table.length, sizeof(char**));
1665 table.contents[0] = calloc(table.width, sizeof(char*));
1666 table.contents[0][0] = "Mask";
1667 table.contents[0][1] = "Owner";
1668 table.contents[0][2] = "Expires";
1669 table.contents[0][3] = "Reason";
1670 for (nn=1, gag=gagList; gag; nn++, gag=gag->next) {
1671 char expstr[INTERVALLEN];
1672 if (gag->expires)
1673 intervalString(expstr, gag->expires - now, user->handle_info);
1674 else
1675 strcpy(expstr, "Never");
1676 table.contents[nn] = calloc(table.width, sizeof(char*));
1677 table.contents[nn][0] = gag->mask;
1678 table.contents[nn][1] = gag->owner;
1679 table.contents[nn][2] = strdup(expstr);
1680 table.contents[nn][3] = gag->reason;
1681 }
1682 table_send(cmd->parent->bot, user->nick, 0, NULL, table);
1683 for (nn=1; nn<table.length; nn++) {
1684 free((char*)table.contents[nn][2]);
1685 free(table.contents[nn]);
1686 }
1687 free(table.contents[0]);
1688 free(table.contents);
1689 return 1;
1690 }
1691
1692 static MODCMD_FUNC(cmd_stats_timeq) {
1693 reply("OSMSG_TIMEQ_INFO", timeq_size(), timeq_next()-now);
1694 return 1;
1695 }
1696
1697 static MODCMD_FUNC(cmd_stats_warn) {
1698 dict_iterator_t it;
1699
1700 reply("OSMSG_WARN_LISTSTART");
1701 for (it=dict_first(opserv_chan_warn); it; it=iter_next(it))
1702 reply("OSMSG_WARN_LISTENTRY", iter_key(it), (char*)iter_data(it));
1703 reply("OSMSG_WARN_LISTEND");
1704 return 1;
1705 }
1706
1707 static MODCMD_FUNC(cmd_dump)
1708 {
1709 char linedup[MAXLEN], *original;
1710
1711 original = unsplit_string(argv+1, argc-1, NULL);
1712 safestrncpy(linedup, original, sizeof(linedup));
1713 /* assume it's only valid IRC if we can parse it */
1714 if (parse_line(linedup, 1)) {
1715 irc_raw(original);
1716 reply("OSMSG_LINE_DUMPED");
1717 } else
1718 reply("OSMSG_RAW_PARSE_ERROR");
1719 return 1;
1720 }
1721
1722 static MODCMD_FUNC(cmd_raw)
1723 {
1724 char linedup[MAXLEN], *original;
1725
1726 original = unsplit_string(argv+1, argc-1, NULL);
1727 safestrncpy(linedup, original, sizeof(linedup));
1728 /* Try to parse the line before sending it; if it's too wrong,
1729 * maybe it will core us instead of our uplink. */
1730 parse_line(linedup, 1);
1731 irc_raw(original);
1732 reply("OSMSG_LINE_DUMPED");
1733 return 1;
1734 }
1735
1736 static struct userNode *
1737 opserv_add_reserve(struct svccmd *cmd, struct userNode *user, const char *nick, const char *ident, const char *host, const char *desc)
1738 {
1739 struct userNode *resv = GetUserH(nick);
1740 if (resv) {
1741 if (IsService(resv)) {
1742 reply("MSG_SERVICE_IMMUNE", resv->nick);
1743 return NULL;
1744 }
1745 if (resv->handle_info
1746 && resv->handle_info->opserv_level > user->handle_info->opserv_level) {
1747 reply("OSMSG_LEVEL_TOO_LOW");
1748 return NULL;
1749 }
1750 }
1751 if ((resv = AddClone(nick, ident, host, desc))) {
1752 dict_insert(opserv_reserved_nick_dict, resv->nick, resv);
1753 }
1754 return resv;
1755 }
1756
1757 static MODCMD_FUNC(cmd_collide)
1758 {
1759 struct userNode *resv;
1760
1761 resv = opserv_add_reserve(cmd, user, argv[1], argv[2], argv[3], unsplit_string(argv+4, argc-4, NULL));
1762 if (resv) {
1763 reply("OSMSG_COLLIDED_NICK", resv->nick);
1764 return 1;
1765 } else {
1766 reply("OSMSG_CLONE_FAILED", argv[1]);
1767 return 0;
1768 }
1769 }
1770
1771 static MODCMD_FUNC(cmd_reserve)
1772 {
1773 struct userNode *resv;
1774
1775 resv = opserv_add_reserve(cmd, user, argv[1], argv[2], argv[3], unsplit_string(argv+4, argc-4, NULL));
1776 if (resv) {
1777 resv->modes |= FLAGS_PERSISTENT;
1778 reply("OSMSG_RESERVED_NICK", resv->nick);
1779 return 1;
1780 } else {
1781 reply("OSMSG_CLONE_FAILED", argv[1]);
1782 return 0;
1783 }
1784 }
1785
1786 static int
1787 free_reserve(char *nick)
1788 {
1789 struct userNode *resv;
1790 unsigned int rlen;
1791 char *reason;
1792
1793 resv = dict_find(opserv_reserved_nick_dict, nick, NULL);
1794 if (!resv)
1795 return 0;
1796
1797 rlen = strlen(resv->nick)+strlen(OSMSG_PART_REASON);
1798 reason = alloca(rlen);
1799 snprintf(reason, rlen, OSMSG_PART_REASON, resv->nick);
1800 DelUser(resv, NULL, 1, reason);
1801 dict_remove(opserv_reserved_nick_dict, nick);
1802 return 1;
1803 }
1804
1805 static MODCMD_FUNC(cmd_unreserve)
1806 {
1807 if (free_reserve(argv[1]))
1808 reply("OSMSG_NICK_UNRESERVED", argv[1]);
1809 else
1810 reply("OSMSG_NOT_RESERVED", argv[1]);
1811 return 1;
1812 }
1813
1814 static void
1815 opserv_part_channel(void *data)
1816 {
1817 DelChannelUser(opserv, data, "Leaving.", 0);
1818 }
1819
1820 static int alert_check_user(const char *key, void *data, void *extra);
1821
1822 static int
1823 opserv_new_user_check(struct userNode *user)
1824 {
1825 struct opserv_hostinfo *ohi;
1826 struct gag_entry *gag;
1827
1828 /* Check to see if we should ignore them entirely. */
1829 if (IsLocal(user) || IsService(user))
1830 return 0;
1831
1832 /* Check for alerts, and stop if we find one that kills them. */
1833 if (dict_foreach(opserv_user_alerts, alert_check_user, user))
1834 return 1;
1835
1836 /* Gag them if appropriate. */
1837 for (gag = gagList; gag; gag = gag->next) {
1838 if (user_matches_glob(user, gag->mask, 1)) {
1839 gag_helper_func(user, NULL);
1840 break;
1841 }
1842 }
1843
1844 /* Add to host info struct */
1845 if (!(ohi = dict_find(opserv_hostinfo_dict, inet_ntoa(user->ip), NULL))) {
1846 ohi = calloc(1, sizeof(*ohi));
1847 dict_insert(opserv_hostinfo_dict, strdup(inet_ntoa(user->ip)), ohi);
1848 userList_init(&ohi->clients);
1849 }
1850 userList_append(&ohi->clients, user);
1851
1852 /* Only warn of new user floods outside of bursts. */
1853 if (!user->uplink->burst) {
1854 if (!policer_conforms(&opserv_conf.new_user_policer, now, 10)) {
1855 if (!new_user_flood) {
1856 new_user_flood = 1;
1857 opserv_alert("Warning: Possible new-user flood.");
1858 }
1859 } else {
1860 new_user_flood = 0;
1861 }
1862 }
1863
1864 /* Only warn or G-line if there's an untrusted max and their IP is sane. */
1865 if (opserv_conf.untrusted_max && user->ip.s_addr && (ntohl(user->ip.s_addr) != INADDR_LOOPBACK)) {
1866 struct trusted_host *th = dict_find(opserv_trusted_hosts, inet_ntoa(user->ip), NULL);
1867 unsigned int limit = th ? th->limit : opserv_conf.untrusted_max;
1868 if (!limit) {
1869 /* 0 means unlimited hosts */
1870 } else if (ohi->clients.used == limit) {
1871 unsigned int nn;
1872 for (nn=0; nn<ohi->clients.used; nn++)
1873 send_message(ohi->clients.list[nn], opserv, "OSMSG_CLONE_WARNING");
1874 } else if (ohi->clients.used > limit) {
1875 char target[18];
1876 sprintf(target, "*@%s", inet_ntoa(user->ip));
1877 gline_add(opserv->nick, target, opserv_conf.clone_gline_duration, "AUTO Excessive connections from a single host.", now, 1);
1878 }
1879 }
1880
1881 return 0;
1882 }
1883
1884 static void
1885 opserv_user_cleanup(struct userNode *user, UNUSED_ARG(struct userNode *killer), UNUSED_ARG(const char *why))
1886 {
1887 struct opserv_hostinfo *ohi;
1888
1889 if (IsLocal(user)) {
1890 /* Try to remove it from the reserved nick dict without
1891 * calling free_reserve, because that would call DelUser(),
1892 * and we'd loop back to here. */
1893 dict_remove(opserv_reserved_nick_dict, user->nick);
1894 return;
1895 }
1896 if ((ohi = dict_find(opserv_hostinfo_dict, inet_ntoa(user->ip), NULL))) {
1897 userList_remove(&ohi->clients, user);
1898 if (ohi->clients.used == 0) dict_remove(opserv_hostinfo_dict, inet_ntoa(user->ip));
1899 }
1900 }
1901
1902 int
1903 opserv_bad_channel(const char *name)
1904 {
1905 unsigned int found;
1906
1907 dict_find(opserv_exempt_channels, name, &found);
1908 if (found)
1909 return 0;
1910
1911 if (gline_find(name))
1912 return 1;
1913
1914 for (found=0; found<opserv_bad_words->used; ++found)
1915 if (irccasestr(name, opserv_bad_words->list[found]))
1916 return 1;
1917
1918 return 0;
1919 }
1920
1921 static void
1922 opserv_shutdown_channel(struct chanNode *channel, const char *reason)
1923 {
1924 struct mod_chanmode *change;
1925 unsigned int nn;
1926
1927 change = mod_chanmode_alloc(2);
1928 change->modes_set = MODE_SECRET | MODE_INVITEONLY;
1929 change->args[0].mode = MODE_CHANOP;
1930 change->args[0].u.member = AddChannelUser(opserv, channel);
1931 change->args[1].mode = MODE_BAN;
1932 change->args[1].u.hostmask = "*!*@*";
1933 mod_chanmode_announce(opserv, channel, change);
1934 mod_chanmode_free(change);
1935 for (nn=channel->members.used; nn>0; ) {
1936 struct modeNode *mNode = channel->members.list[--nn];
1937 if (IsService(mNode->user))
1938 continue;
1939 KickChannelUser(mNode->user, channel, opserv, user_find_message(mNode->user, reason));
1940 }
1941 timeq_add(now + opserv_conf.purge_lock_delay, opserv_part_channel, channel);
1942 }
1943
1944 static void
1945 opserv_channel_check(struct chanNode *newchan)
1946 {
1947 char *warning;
1948
1949 if (!newchan->join_policer.params) {
1950 newchan->join_policer.last_req = now;
1951 newchan->join_policer.params = opserv_conf.join_policer_params;
1952 }
1953 if ((warning = dict_find(opserv_chan_warn, newchan->name, NULL))) {
1954 char message[MAXLEN];
1955 snprintf(message, sizeof(message), "Channel activity warning for channel %s: %s", newchan->name, warning);
1956 global_message(MESSAGE_RECIPIENT_OPERS, message);
1957 }
1958
1959 /* Wait until the join check to shut channels down. */
1960 newchan->bad_channel = opserv_bad_channel(newchan->name);
1961 }
1962
1963 static void
1964 opserv_channel_delete(struct chanNode *chan)
1965 {
1966 timeq_del(0, opserv_part_channel, chan, TIMEQ_IGNORE_WHEN);
1967 }
1968
1969 static int
1970 opserv_join_check(struct modeNode *mNode)
1971 {
1972 struct userNode *user = mNode->user;
1973 struct chanNode *channel = mNode->channel;
1974 const char *msg;
1975
1976 if (IsService(user))
1977 return 0;
1978
1979 dict_foreach(opserv_channel_alerts, alert_check_user, user);
1980
1981 if (channel->bad_channel) {
1982 opserv_debug("Found $b%s$b in bad-word channel $b%s$b; removing the user.", user->nick, channel->name);
1983 if (channel->name[0] != '#')
1984 DelUser(user, opserv, 1, "OSMSG_ILLEGAL_KILL_REASON");
1985 else if (!GetUserMode(channel, opserv))
1986 opserv_shutdown_channel(channel, "OSMSG_ILLEGAL_REASON");
1987 else {
1988 send_message(user, opserv, "OSMSG_ILLEGAL_CHANNEL", channel->name);
1989 msg = user_find_message(user, "OSMSG_ILLEGAL_REASON");
1990 KickChannelUser(user, channel, opserv, msg);
1991 }
1992 return 1;
1993 }
1994
1995 if (user->uplink->burst)
1996 return 0;
1997 if (policer_conforms(&channel->join_policer, now, 1.0)) {
1998 channel->join_flooded = 0;
1999 return 0;
2000 }
2001 if (!channel->join_flooded) {
2002 /* Don't moderate the channel unless it is activated and
2003 the number of users in the channel is over the threshold. */
2004 struct mod_chanmode change;
2005 mod_chanmode_init(&change);
2006 channel->join_flooded = 1;
2007 if (opserv_conf.join_flood_moderate && (channel->members.used > opserv_conf.join_flood_moderate_threshold)) {
2008 if (!GetUserMode(channel, opserv)) {
2009 /* If we aren't in the channel, join it. */
2010 change.args[0].mode = MODE_CHANOP;
2011 change.args[0].u.member = AddChannelUser(opserv, channel);
2012 change.argc++;
2013 }
2014 if (!(channel->modes & MODE_MODERATED))
2015 change.modes_set |= MODE_MODERATED;
2016 if (change.modes_set || change.argc)
2017 mod_chanmode_announce(opserv, channel, &change);
2018 send_target_message(0, channel->name, opserv, "OSMSG_FLOOD_MODERATE");
2019 opserv_alert("Warning: Possible join flood in %s (currently %d users; channel moderated).", channel->name, channel->members.used);
2020 } else {
2021 opserv_alert("Warning: Possible join flood in %s (currently %d users).", channel->name, channel->members.used);
2022 }
2023 }
2024 log_module(OS_LOG, LOG_INFO, "Join to %s during flood: "IDENT_FORMAT, channel->name, IDENT_DATA(user));
2025 return 0;
2026 }
2027
2028 static int
2029 opserv_add_bad_word(struct svccmd *cmd, struct userNode *user, const char *new_bad) {
2030 unsigned int bad_idx;
2031
2032 for (bad_idx = 0; bad_idx < opserv_bad_words->used; ++bad_idx) {
2033 char *orig_bad = opserv_bad_words->list[bad_idx];
2034 if (irccasestr(new_bad, orig_bad)) {
2035 if (user)
2036 reply("OSMSG_BAD_REDUNDANT", new_bad, orig_bad);
2037 return 0;
2038 } else if (irccasestr(orig_bad, new_bad)) {
2039 if (user)
2040 reply("OSMSG_BAD_GROWING", orig_bad, new_bad);
2041 free(orig_bad);
2042 opserv_bad_words->list[bad_idx] = strdup(new_bad);
2043 for (bad_idx++; bad_idx < opserv_bad_words->used; bad_idx++) {
2044 orig_bad = opserv_bad_words->list[bad_idx];
2045 if (!irccasestr(orig_bad, new_bad))
2046 continue;
2047 if (user)
2048 reply("OSMSG_BAD_NUKING", orig_bad);
2049 string_list_delete(opserv_bad_words, bad_idx);
2050 bad_idx--;
2051 free(orig_bad);
2052 }
2053 return 1;
2054 }
2055 }
2056 string_list_append(opserv_bad_words, strdup(new_bad));
2057 if (user)
2058 reply("OSMSG_ADDED_BAD", new_bad);
2059 return 1;
2060 }
2061
2062 static MODCMD_FUNC(cmd_addbad)
2063 {
2064 unsigned int arg, count;
2065 dict_iterator_t it;
2066 int bad_found, exempt_found;
2067
2068 /* Create the bad word if it doesn't exist. */
2069 bad_found = !opserv_add_bad_word(cmd, user, argv[1]);
2070
2071 /* Look for exception modifiers. */
2072 for (arg=2; arg<argc; arg++) {
2073 if (!irccasecmp(argv[arg], "except")) {
2074 reply("MSG_DEPRECATED_COMMAND", "addbad ... except", "addexempt");
2075 if (++arg > argc) {
2076 reply("MSG_MISSING_PARAMS", "except");
2077 break;
2078 }
2079 for (count = 0; (arg < argc) && IsChannelName(argv[arg]); arg++) {
2080 dict_find(opserv_exempt_channels, argv[arg], &exempt_found);
2081 if (!exempt_found) {
2082 dict_insert(opserv_exempt_channels, strdup(argv[arg]), NULL);
2083 count++;
2084 }
2085 }
2086 reply("OSMSG_ADDED_EXEMPTIONS", count);
2087 } else {
2088 reply("MSG_DEPRECATED_COMMAND", "addbad (with modifiers)", "addbad");
2089 reply("OSMSG_BAD_MODIFIER", argv[arg]);
2090 }
2091 }
2092
2093 /* Scan for existing channels that match the new bad word. */
2094 if (!bad_found) {
2095 for (it = dict_first(channels); it; it = iter_next(it)) {
2096 struct chanNode *channel = iter_data(it);
2097
2098 if (!opserv_bad_channel(channel->name))
2099 continue;
2100 channel->bad_channel = 1;
2101 if (channel->name[0] == '#')
2102 opserv_shutdown_channel(channel, "OSMSG_ILLEGAL_REASON");
2103 else {
2104 unsigned int nn;
2105 for (nn=0; nn<channel->members.used; nn++) {
2106 struct userNode *user = channel->members.list[nn]->user;
2107 DelUser(user, cmd->parent->bot, 1, "OSMSG_ILLEGAL_KILL_REASON");
2108 }
2109 }
2110 }
2111 }
2112
2113 return 1;
2114 }
2115
2116 static MODCMD_FUNC(cmd_delbad)
2117 {
2118 dict_iterator_t it;
2119 unsigned int nn;
2120
2121 for (nn=0; nn<opserv_bad_words->used; nn++) {
2122 if (!irccasecmp(opserv_bad_words->list[nn], argv[1])) {
2123 string_list_delete(opserv_bad_words, nn);
2124 for (it = dict_first(channels); it; it = iter_next(it)) {
2125 channel = iter_data(it);
2126 if (irccasestr(channel->name, argv[1])
2127 && !opserv_bad_channel(channel->name)) {
2128 DelChannelUser(cmd->parent->bot, channel, "Channel name no longer contains a bad word.", 1);
2129 timeq_del(0, opserv_part_channel, channel, TIMEQ_IGNORE_WHEN);
2130 channel->bad_channel = 0;
2131 }
2132 }
2133 reply("OSMSG_REMOVED_BAD", argv[1]);
2134 return 1;
2135 }
2136 }
2137 reply("OSMSG_NOT_BAD_WORD", argv[1]);
2138 return 0;
2139 }
2140
2141 static MODCMD_FUNC(cmd_addexempt)
2142 {
2143 const char *chanName;
2144
2145 if ((argc > 1) && IsChannelName(argv[1])) {
2146 chanName = argv[1];
2147 } else {
2148 reply("MSG_NOT_CHANNEL_NAME");
2149 OPSERV_SYNTAX();
2150 return 0;
2151 }
2152 dict_insert(opserv_exempt_channels, strdup(chanName), NULL);
2153 channel = GetChannel(chanName);
2154 if (channel) {
2155 if (channel->bad_channel) {
2156 DelChannelUser(cmd->parent->bot, channel, "Channel is now exempt from bad-word checking.", 1);
2157 timeq_del(0, opserv_part_channel, channel, TIMEQ_IGNORE_WHEN);
2158 }
2159 channel->bad_channel = 0;
2160 }
2161 reply("OSMSG_ADDED_EXEMPTION", chanName);
2162 return 1;
2163 }
2164
2165 static MODCMD_FUNC(cmd_delexempt)
2166 {
2167 const char *chanName;
2168
2169 if ((argc > 1) && IsChannelName(argv[1])) {
2170 chanName = argv[1];
2171 } else {
2172 reply("MSG_NOT_CHANNEL_NAME");
2173 OPSERV_SYNTAX();
2174 return 0;
2175 }
2176 if (!dict_remove(opserv_exempt_channels, chanName)) {
2177 reply("OSMSG_NOT_EXEMPT", chanName);
2178 return 0;
2179 }
2180 reply("OSMSG_REMOVED_EXEMPTION", chanName);
2181 return 1;
2182 }
2183
2184 static void
2185 opserv_expire_trusted_host(void *data)
2186 {
2187 struct trusted_host *th = data;
2188 dict_remove(opserv_trusted_hosts, th->ipaddr);
2189 }
2190
2191 static void
2192 opserv_add_trusted_host(const char *ipaddr, unsigned int limit, const char *issuer, time_t issued, time_t expires, const char *reason)
2193 {
2194 struct trusted_host *th;
2195 th = calloc(1, sizeof(*th));
2196 if (!th)
2197 return;
2198 th->ipaddr = strdup(ipaddr);
2199 th->reason = reason ? strdup(reason) : NULL;
2200 th->issuer = issuer ? strdup(issuer) : NULL;
2201 th->issued = issued;
2202 th->limit = limit;
2203 th->expires = expires;
2204 dict_insert(opserv_trusted_hosts, th->ipaddr, th);
2205 if (th->expires)
2206 timeq_add(th->expires, opserv_expire_trusted_host, th);
2207 }
2208
2209 static void
2210 free_trusted_host(void *data)
2211 {
2212 struct trusted_host *th = data;
2213 free(th->ipaddr);
2214 free(th->reason);
2215 free(th->issuer);
2216 free(th);
2217 }
2218
2219 static MODCMD_FUNC(cmd_addtrust)
2220 {
2221 unsigned long interval;
2222 char *reason, *tmp;
2223 struct in_addr tmpaddr;
2224 unsigned int count;
2225
2226 if (dict_find(opserv_trusted_hosts, argv[1], NULL)) {
2227 reply("OSMSG_ALREADY_TRUSTED", argv[1]);
2228 return 0;
2229 }
2230
2231 if (!inet_aton(argv[1], &tmpaddr)) {
2232 reply("OSMSG_BAD_IP", argv[1]);
2233 return 0;
2234 }
2235
2236 count = strtoul(argv[2], &tmp, 10);
2237 if (*tmp != '\0') {
2238 reply("OSMSG_BAD_NUMBER", argv[2]);
2239 return 0;
2240 }
2241
2242 interval = ParseInterval(argv[3]);
2243 if (!interval && strcmp(argv[3], "0")) {
2244 reply("MSG_INVALID_DURATION", argv[3]);
2245 return 0;
2246 }
2247
2248 reason = unsplit_string(argv+4, argc-4, NULL);
2249 opserv_add_trusted_host(argv[1], count, user->handle_info->handle, now, interval ? (now + interval) : 0, reason);
2250 reply("OSMSG_ADDED_TRUSTED");
2251 return 1;
2252 }
2253
2254 static MODCMD_FUNC(cmd_edittrust)
2255 {
2256 unsigned long interval;
2257 struct trusted_host *th;
2258 char *reason, *tmp;
2259 unsigned int count;
2260
2261 th = dict_find(opserv_trusted_hosts, argv[1], NULL);
2262 if (!th) {
2263 reply("OSMSG_NOT_TRUSTED", argv[1]);
2264 return 0;
2265 }
2266 count = strtoul(argv[2], &tmp, 10);
2267 if (!count || *tmp) {
2268 reply("OSMSG_BAD_NUMBER", argv[2]);
2269 return 0;
2270 }
2271 interval = ParseInterval(argv[3]);
2272 if (!interval && strcmp(argv[3], "0")) {
2273 reply("MSG_INVALID_DURATION", argv[3]);
2274 return 0;
2275 }
2276 reason = unsplit_string(argv+4, argc-4, NULL);
2277 if (th->expires)
2278 timeq_del(th->expires, opserv_expire_trusted_host, th, 0);
2279
2280 free(th->reason);
2281 th->reason = strdup(reason);
2282 free(th->issuer);
2283 th->issuer = strdup(user->handle_info->handle);
2284 th->issued = now;
2285 th->limit = count;
2286 if (interval) {
2287 th->expires = now + interval;
2288 timeq_add(th->expires, opserv_expire_trusted_host, th);
2289 } else
2290 th->expires = 0;
2291 reply("OSMSG_UPDATED_TRUSTED", th->ipaddr);
2292 return 1;
2293 }
2294
2295 static MODCMD_FUNC(cmd_deltrust)
2296 {
2297 unsigned int n;
2298
2299 for (n=1; n<argc; n++) {
2300 struct trusted_host *th = dict_find(opserv_trusted_hosts, argv[n], NULL);
2301 if (!th)
2302 continue;
2303 if (th->expires)
2304 timeq_del(th->expires, opserv_expire_trusted_host, th, 0);
2305 dict_remove(opserv_trusted_hosts, argv[n]);
2306 }
2307 reply("OSMSG_REMOVED_TRUSTED");
2308 return 1;
2309 }
2310
2311 /* This doesn't use dict_t because it's a little simpler to open-code the
2312 * comparisons (and simpler arg-passing for the ADD subcommand).
2313 */
2314 static MODCMD_FUNC(cmd_clone)
2315 {
2316 int i;
2317 struct userNode *clone;
2318
2319 clone = GetUserH(argv[2]);
2320 if (!irccasecmp(argv[1], "ADD")) {
2321 char *userinfo;
2322 char ident[USERLEN+1];
2323
2324 if (argc < 5) {
2325 reply("MSG_MISSING_PARAMS", argv[1]);
2326 OPSERV_SYNTAX();
2327 return 0;
2328 }
2329 if (clone) {
2330 reply("OSMSG_CLONE_EXISTS", argv[2]);
2331 return 0;
2332 }
2333 userinfo = unsplit_string(argv+4, argc-4, NULL);
2334 for (i=0; argv[3][i] && (i<USERLEN); i++) {
2335 if (argv[3][i] == '@') {
2336 ident[i++] = 0;
2337 break;
2338 } else {
2339 ident[i] = argv[3][i];
2340 }
2341 }
2342 if (!argv[3][i] || (i==USERLEN)) {
2343 reply("OSMSG_NOT_A_HOSTMASK");
2344 return 0;
2345 }
2346 if (!(clone = AddClone(argv[2], ident, argv[3]+i, userinfo))) {
2347 reply("OSMSG_CLONE_FAILED", argv[2]);
2348 return 0;
2349 }
2350 reply("OSMSG_CLONE_ADDED", clone->nick);
2351 return 1;
2352 }
2353 if (!clone) {
2354 reply("MSG_NICK_UNKNOWN", argv[2]);
2355 return 0;
2356 }
2357 if (clone->uplink != self || IsService(clone)) {
2358 reply("OSMSG_NOT_A_CLONE", clone->nick);
2359 return 0;
2360 }
2361 if (!irccasecmp(argv[1], "REMOVE")) {
2362 const char *reason;
2363 if (argc > 3) {
2364 reason = unsplit_string(argv+3, argc-3, NULL);
2365 } else {
2366 char *tmp;
2367 tmp = alloca(strlen(clone->nick) + strlen(OSMSG_PART_REASON));
2368 sprintf(tmp, OSMSG_PART_REASON, clone->nick);
2369 reason = tmp;
2370 }
2371 DelUser(clone, NULL, 1, reason);
2372 reply("OSMSG_CLONE_REMOVED", argv[2]);
2373 return 1;
2374 }
2375 if (argc < 4) {
2376 reply("MSG_MISSING_PARAMS", argv[1]);
2377 OPSERV_SYNTAX();
2378 return 0;
2379 }
2380 channel = GetChannel(argv[3]);
2381 if (!irccasecmp(argv[1], "JOIN")) {
2382 if (!channel
2383 && !(channel = AddChannel(argv[3], now, NULL, NULL, NULL))) {
2384 reply("MSG_CHANNEL_UNKNOWN", argv[3]);
2385 return 0;
2386 }
2387 AddChannelUser(clone, channel);
2388 reply("OSMSG_CLONE_JOINED", clone->nick, channel->name);
2389 return 1;
2390 }
2391 if (!irccasecmp(argv[1], "PART")) {
2392 if (!channel) {
2393 reply("MSG_CHANNEL_UNKNOWN", argv[3]);
2394 return 0;
2395 }
2396 if (!GetUserMode(channel, clone)) {
2397 reply("OSMSG_NOT_ON_CHANNEL", clone->nick, channel->name);
2398 return 0;
2399 }
2400 reply("OSMSG_CLONE_PARTED", clone->nick, channel->name);
2401 DelChannelUser(clone, channel, "Leaving.", 0);
2402 return 1;
2403 }
2404 if (!irccasecmp(argv[1], "OP")) {
2405 struct mod_chanmode change;
2406 if (!channel) {
2407 reply("MSG_CHANNEL_UNKNOWN", argv[3]);
2408 return 0;
2409 }
2410 mod_chanmode_init(&change);
2411 change.argc = 1;
2412 change.args[0].mode = MODE_CHANOP;
2413 change.args[0].u.member = GetUserMode(channel, clone);
2414 if (!change.args[0].u.member) {
2415 reply("OSMSG_NOT_ON_CHANNEL", clone->nick, channel->name);
2416 return 0;
2417 }
2418 modcmd_chanmode_announce(&change);
2419 reply("OSMSG_OPS_GIVEN", channel->name, clone->nick);
2420 return 1;
2421 }
2422 if (!irccasecmp(argv[1], "HOP")) {
2423 struct mod_chanmode change;
2424 if (!channel) {
2425 reply("MSG_CHANNEL_UNKNOWN", argv[3]);
2426 return 0;
2427 }
2428 mod_chanmode_init(&change);
2429 change.argc = 1;
2430 change.args[0].mode = MODE_HALFOP;
2431 change.args[0].member = GetUserMode(channel, clone);
2432 if (!change.args[0].member) {
2433 reply("OSMSG_NOT_ON_CHANNEL", clone->nick, channel->name);
2434 return 0;
2435 }
2436 modcmd_chanmode_announce(&change);
2437 reply("OSMSG_HOPS_GIVEN", channel->name, clone->nick);
2438 return 1;
2439 }
2440 if (argc < 5) {
2441 reply("MSG_MISSING_PARAMS", argv[1]);
2442 OPSERV_SYNTAX();
2443 return 0;
2444 }
2445 if (!irccasecmp(argv[1], "SAY")) {
2446 char *text = unsplit_string(argv+4, argc-4, NULL);
2447 irc_privmsg(clone, argv[3], text);
2448 reply("OSMSG_CLONE_SAID", clone->nick, argv[3]);
2449 return 1;
2450 }
2451 reply("OSMSG_UNKNOWN_SUBCOMMAND", argv[1], argv[0]);
2452 return 0;
2453 }
2454
2455 static struct helpfile_expansion
2456 opserv_help_expand(const char *variable)
2457 {
2458 extern struct userNode *message_source;
2459 struct helpfile_expansion exp;
2460 struct service *service;
2461 struct svccmd *cmd;
2462 dict_iterator_t it;
2463 int row;
2464 unsigned int level;
2465
2466 if (!(service = service_find(message_source->nick))) {
2467 exp.type = HF_STRING;
2468 exp.value.str = NULL;
2469 } else if (!irccasecmp(variable, "index")) {
2470 exp.type = HF_TABLE;
2471 exp.value.table.length = 1;
2472 exp.value.table.width = 2;
2473 exp.value.table.flags = TABLE_REPEAT_HEADERS | TABLE_REPEAT_ROWS;
2474 exp.value.table.contents = calloc(dict_size(service->commands)+1, sizeof(char**));
2475 exp.value.table.contents[0] = calloc(exp.value.table.width, sizeof(char*));
2476 exp.value.table.contents[0][0] = "Command";
2477 exp.value.table.contents[0][1] = "Level";
2478 for (it=dict_first(service->commands); it; it=iter_next(it)) {
2479 cmd = iter_data(it);
2480 row = exp.value.table.length++;
2481 exp.value.table.contents[row] = calloc(exp.value.table.width, sizeof(char*));
2482 exp.value.table.contents[row][0] = iter_key(it);
2483 level = cmd->min_opserv_level;
2484 if (!level_strings[level]) {
2485 level_strings[level] = malloc(16);
2486 snprintf(level_strings[level], 16, "%3d", level);
2487 }
2488 exp.value.table.contents[row][1] = level_strings[level];
2489 }
2490 } else if (!strncasecmp(variable, "level", 5)) {
2491 cmd = dict_find(service->commands, variable+6, NULL);
2492 exp.type = HF_STRING;
2493 if (cmd) {
2494 level = cmd->min_opserv_level;
2495 exp.value.str = malloc(16);
2496 snprintf(exp.value.str, 16, "%3d", level);
2497 } else {
2498 exp.value.str = NULL;
2499 }
2500 } else {
2501 exp.type = HF_STRING;
2502 exp.value.str = NULL;
2503 }
2504 return exp;
2505 }
2506
2507 struct modcmd *
2508 opserv_define_func(const char *name, modcmd_func_t *func, int min_level, int reqchan, int min_argc)
2509 {
2510 char buf[16], *flags = NULL;
2511 unsigned int iflags = 0;
2512 sprintf(buf, "%d", min_level);
2513 switch (reqchan) {
2514 case 1: flags = "+acceptchan"; break;
2515 case 3: flags = "+acceptpluschan"; /* fall through */
2516 case 2: iflags = MODCMD_REQUIRE_CHANNEL; break;
2517 }
2518 if (flags) {
2519 return modcmd_register(opserv_module, name, func, min_argc, iflags, "level", buf, "flags", flags, "flags", "+oper", NULL);
2520 } else {
2521 return modcmd_register(opserv_module, name, func, min_argc, iflags, "level", buf, "flags", "+oper", NULL);
2522 }
2523 }
2524
2525 int add_reserved(const char *key, void *data, void *extra)
2526 {
2527 struct record_data *rd = data;
2528 const char *ident, *hostname, *desc;
2529 struct userNode *reserve;
2530 ident = database_get_data(rd->d.object, KEY_IDENT, RECDB_QSTRING);
2531 if (!ident) {
2532 log_module(OS_LOG, LOG_ERROR, "Missing ident for reserve of %s", key);
2533 return 0;
2534 }
2535 hostname = database_get_data(rd->d.object, KEY_HOSTNAME, RECDB_QSTRING);
2536 if (!hostname) {
2537 log_module(OS_LOG, LOG_ERROR, "Missing hostname for reserve of %s", key);
2538 return 0;
2539 }
2540 desc = database_get_data(rd->d.object, KEY_DESC, RECDB_QSTRING);
2541 if (!desc) {
2542 log_module(OS_LOG, LOG_ERROR, "Missing description for reserve of %s", key);
2543 return 0;
2544 }
2545 if ((reserve = AddClone(key, ident, hostname, desc))) {
2546 reserve->modes |= FLAGS_PERSISTENT;
2547 dict_insert(extra, reserve->nick, reserve);
2548 }
2549 return 0;
2550 }
2551
2552 static unsigned int
2553 foreach_matching_user(const char *hostmask, discrim_search_func func, void *extra)
2554 {
2555 discrim_t discrim;
2556 char *dupmask;
2557 unsigned int matched;
2558
2559 if (!self->uplink) return 0;
2560 discrim = calloc(1, sizeof(*discrim));
2561 discrim->limit = dict_size(clients);
2562 discrim->max_level = ~0;
2563 discrim->max_ts = now;
2564 discrim->max_channels = INT_MAX;
2565 discrim->authed = -1;
2566 discrim->info_space = -1;
2567 dupmask = strdup(hostmask);
2568 if (split_ircmask(dupmask, &discrim->mask_nick, &discrim->mask_ident, &discrim->mask_host)) {
2569 if (discrim->mask_host && !discrim->mask_host[strspn(discrim->mask_host, "0123456789.?*")]) {
2570 if (!parse_ipmask(discrim->mask_host, &discrim->ip_addr, &discrim->ip_mask)) {
2571 log_module(OS_LOG, LOG_ERROR, "Couldn't parse %s as an IP mask!", discrim->mask_host);
2572 free(discrim);
2573 free(dupmask);
2574 return 0;
2575 }
2576 discrim->mask_host = 0;
2577 }
2578 matched = opserv_discrim_search(discrim, func, extra);
2579 } else {
2580 log_module(OS_LOG, LOG_ERROR, "Couldn't split IRC mask for gag %s!", hostmask);
2581 matched = 0;
2582 }
2583 free(discrim);
2584 free(dupmask);
2585 return matched;
2586 }
2587
2588 static unsigned int
2589 gag_free(struct gag_entry *gag)
2590 {
2591 unsigned int ungagged;
2592
2593 /* Remove from gag list */
2594 if (gagList == gag) {
2595 gagList = gag->next;
2596 } else {
2597 struct gag_entry *prev;
2598 for (prev = gagList; prev->next != gag; prev = prev->next) ;
2599 prev->next = gag->next;
2600 }
2601
2602 ungagged = foreach_matching_user(gag->mask, ungag_helper_func, NULL);
2603
2604 /* Deallocate storage */
2605 free(gag->reason);
2606 free(gag->owner);
2607 free(gag->mask);
2608 free(gag);
2609
2610 return ungagged;
2611 }
2612
2613 static void
2614 gag_expire(void *data)
2615 {
2616 gag_free(data);
2617 }
2618
2619 unsigned int
2620 gag_create(const char *mask, const char *owner, const char *reason, time_t expires)
2621 {
2622 struct gag_entry *gag;
2623
2624 /* Create gag and put it into linked list */
2625 gag = calloc(1, sizeof(*gag));
2626 gag->mask = strdup(mask);
2627 gag->owner = strdup(owner ? owner : "<unknown>");
2628 gag->reason = strdup(reason ? reason : "<unknown>");
2629 gag->expires = expires;
2630 if (gag->expires)
2631 timeq_add(gag->expires, gag_expire, gag);
2632 gag->next = gagList;
2633 gagList = gag;
2634
2635 /* If we're linked, see if who the gag applies to */
2636 return foreach_matching_user(mask, gag_helper_func, gag);
2637 }
2638
2639 static int
2640 add_gag_helper(const char *key, void *data, UNUSED_ARG(void *extra))
2641 {
2642 struct record_data *rd = data;
2643 char *owner, *reason, *expstr;
2644 time_t expires;
2645
2646 owner = database_get_data(rd->d.object, KEY_OWNER, RECDB_QSTRING);
2647 reason = database_get_data(rd->d.object, KEY_REASON, RECDB_QSTRING);
2648 expstr = database_get_data(rd->d.object, KEY_EXPIRES, RECDB_QSTRING);
2649 expires = expstr ? strtoul(expstr, NULL, 0) : 0;
2650 gag_create(key, owner, reason, expires);
2651
2652 return 0;
2653 }
2654
2655 static struct opserv_user_alert *
2656 opserv_add_user_alert(struct userNode *req, const char *name, opserv_alert_reaction reaction, const char *text_discrim)
2657 {
2658 unsigned int wordc;
2659 char *wordv[MAXNUMPARAMS], *discrim_copy;
2660 struct opserv_user_alert *alert;
2661 char *name_dup;
2662
2663 if (dict_find(opserv_user_alerts, name, NULL)) {
2664 send_message(req, opserv, "OSMSG_ALERT_EXISTS", name);
2665 return NULL;
2666 }
2667 alert = malloc(sizeof(*alert));
2668 alert->owner = strdup(req->handle_info ? req->handle_info->handle : req->nick);
2669 alert->text_discrim = strdup(text_discrim);
2670 discrim_copy = strdup(text_discrim); /* save a copy of the discrim */
2671 wordc = split_line(discrim_copy, false, ArrayLength(wordv), wordv);
2672 alert->discrim = opserv_discrim_create(req, wordc, wordv, 0);
2673 if (!alert->discrim) {
2674 free(alert->text_discrim);
2675 free(discrim_copy);
2676 free(alert);
2677 return NULL;
2678 }
2679 alert->split_discrim = discrim_copy;
2680 name_dup = strdup(name);
2681 if (!alert->discrim->reason)
2682 alert->discrim->reason = strdup(name);
2683 alert->reaction = reaction;
2684 dict_insert(opserv_user_alerts, name_dup, alert);
2685 if (alert->discrim->channel)
2686 dict_insert(opserv_channel_alerts, name_dup, alert);
2687 else if (alert->discrim->mask_nick)
2688 dict_insert(opserv_nick_based_alerts, name_dup, alert);
2689 return alert;
2690 }
2691
2692 static int
2693 add_chan_warn(const char *key, void *data, UNUSED_ARG(void *extra))
2694 {
2695 struct record_data *rd = data;
2696 char *reason = GET_RECORD_QSTRING(rd);
2697
2698 /* i hope this can't happen */
2699 if (!reason)
2700 reason = "No Reason";
2701
2702 dict_insert(opserv_chan_warn, strdup(key), strdup(reason));
2703 return 0;
2704 }
2705
2706 static int
2707 add_user_alert(const char *key, void *data, UNUSED_ARG(void *extra))
2708 {
2709 dict_t alert_dict;
2710 const char *discrim, *react, *owner;
2711 opserv_alert_reaction reaction;
2712 struct opserv_user_alert *alert;
2713
2714 if (!(alert_dict = GET_RECORD_OBJECT((struct record_data *)data))) {
2715 log_module(OS_LOG, LOG_ERROR, "Bad type (not a record) for alert %s.", key);
2716 return 1;
2717 }
2718 discrim = database_get_data(alert_dict, KEY_DISCRIM, RECDB_QSTRING);
2719 react = database_get_data(alert_dict, KEY_REACTION, RECDB_QSTRING);
2720 if (!react || !irccasecmp(react, "notice"))
2721 reaction = REACT_NOTICE;
2722 else if (!irccasecmp(react, "kill"))
2723 reaction = REACT_KILL;
2724 else if (!irccasecmp(react, "gline"))
2725 reaction = REACT_GLINE;
2726 else {
2727 log_module(OS_LOG, LOG_ERROR, "Invalid reaction %s for alert %s.", react, key);
2728 return 0;
2729 }
2730 alert = opserv_add_user_alert(opserv, key, reaction, discrim);
2731 if (!alert) {
2732 log_module(OS_LOG, LOG_ERROR, "Unable to create alert %s from database.", key);
2733 return 0;
2734 }
2735 owner = database_get_data(alert_dict, KEY_OWNER, RECDB_QSTRING);
2736 free(alert->owner);
2737 alert->owner = strdup(owner ? owner : "<unknown>");
2738 return 0;
2739 }
2740
2741 static int
2742 trusted_host_read(const char *host, void *data, UNUSED_ARG(void *extra))
2743 {
2744 struct record_data *rd = data;
2745 const char *limit, *str, *reason, *issuer;
2746 time_t issued, expires;
2747
2748 if (rd->type == RECDB_QSTRING) {
2749 /* old style host by itself */
2750 limit = GET_RECORD_QSTRING(rd);
2751 issued = 0;
2752 issuer = NULL;
2753 expires = 0;
2754 reason = NULL;
2755 } else if (rd->type == RECDB_OBJECT) {
2756 dict_t obj = GET_RECORD_OBJECT(rd);
2757 /* new style structure */
2758 limit = database_get_data(obj, KEY_LIMIT, RECDB_QSTRING);
2759 str = database_get_data(obj, KEY_EXPIRES, RECDB_QSTRING);
2760 expires = str ? ParseInterval(str) : 0;
2761 reason = database_get_data(obj, KEY_REASON, RECDB_QSTRING);
2762 issuer = database_get_data(obj, KEY_ISSUER, RECDB_QSTRING);
2763 str = database_get_data(obj, KEY_ISSUED, RECDB_QSTRING);
2764 issued = str ? ParseInterval(str) : 0;
2765 } else
2766 return 0;
2767
2768 if (expires && (expires < now))
2769 return 0;
2770 opserv_add_trusted_host(host, (limit ? strtoul(limit, NULL, 0) : 0), issuer, issued, expires, reason);
2771 return 0;
2772 }
2773
2774 static int
2775 opserv_saxdb_read(struct dict *conf_db)
2776 {
2777 dict_t object;
2778 struct record_data *rd;
2779 dict_iterator_t it;
2780 unsigned int nn;
2781
2782 if ((object = database_get_data(conf_db, KEY_RESERVES, RECDB_OBJECT)))
2783 dict_foreach(object, add_reserved, opserv_reserved_nick_dict);
2784 if ((rd = database_get_path(conf_db, KEY_BAD_WORDS))) {
2785 switch (rd->type) {
2786 case RECDB_STRING_LIST:
2787 /* Add words one by one just in case there are overlaps from an old DB. */
2788 for (nn=0; nn<rd->d.slist->used; ++nn)
2789 opserv_add_bad_word(NULL, NULL, rd->d.slist->list[nn]);
2790 break;
2791 case RECDB_OBJECT:
2792 for (it=dict_first(rd->d.object); it; it=iter_next(it)) {
2793 opserv_add_bad_word(NULL, NULL, iter_key(it));
2794 rd = iter_data(it);
2795 if (rd->type == RECDB_STRING_LIST)
2796 for (nn=0; nn<rd->d.slist->used; nn++)
2797 dict_insert(opserv_exempt_channels, strdup(rd->d.slist->list[nn]), NULL);
2798 }
2799 break;
2800 default:
2801 /* do nothing */;
2802 }
2803 }
2804 if ((rd = database_get_path(conf_db, KEY_EXEMPT_CHANNELS))
2805 && (rd->type == RECDB_STRING_LIST)) {
2806 for (nn=0; nn<rd->d.slist->used; ++nn)
2807 dict_insert(opserv_exempt_channels, strdup(rd->d.slist->list[nn]), NULL);
2808 }
2809 if ((object = database_get_data(conf_db, KEY_MAX_CLIENTS, RECDB_OBJECT))) {
2810 char *str;
2811 if ((str = database_get_data(object, KEY_MAX, RECDB_QSTRING)))
2812 max_clients = atoi(str);
2813 if ((str = database_get_data(object, KEY_TIME, RECDB_QSTRING)))
2814 max_clients_time = atoi(str);
2815 }
2816 if ((object = database_get_data(conf_db, KEY_TRUSTED_HOSTS, RECDB_OBJECT)))
2817 dict_foreach(object, trusted_host_read, opserv_trusted_hosts);
2818 if ((object = database_get_data(conf_db, KEY_GAGS, RECDB_OBJECT)))
2819 dict_foreach(object, add_gag_helper, NULL);
2820 if ((object = database_get_data(conf_db, KEY_ALERTS, RECDB_OBJECT)))
2821 dict_foreach(object, add_user_alert, NULL);
2822 if ((object = database_get_data(conf_db, KEY_WARN, RECDB_OBJECT)))
2823 dict_foreach(object, add_chan_warn, NULL);
2824 return 0;
2825 }
2826
2827 static int
2828 opserv_saxdb_write(struct saxdb_context *ctx)
2829 {
2830 struct string_list *slist;
2831 dict_iterator_t it;
2832
2833 /* reserved nicks */
2834 if (dict_size(opserv_reserved_nick_dict)) {
2835 saxdb_start_record(ctx, KEY_RESERVES, 1);
2836 for (it = dict_first(opserv_reserved_nick_dict); it; it = iter_next(it)) {
2837 struct userNode *user = iter_data(it);
2838 if (!IsPersistent(user)) continue;
2839 saxdb_start_record(ctx, iter_key(it), 0);
2840 saxdb_write_string(ctx, KEY_IDENT, user->ident);
2841 saxdb_write_string(ctx, KEY_HOSTNAME, user->hostname);
2842 saxdb_write_string(ctx, KEY_DESC, user->info);
2843 saxdb_end_record(ctx);
2844 }
2845 saxdb_end_record(ctx);
2846 }
2847 /* bad word set */
2848 if (opserv_bad_words->used) {
2849 saxdb_write_string_list(ctx, KEY_BAD_WORDS, opserv_bad_words);
2850 }
2851 /* insert exempt channel names */
2852 if (dict_size(opserv_exempt_channels)) {
2853 slist = alloc_string_list(dict_size(opserv_exempt_channels));
2854 for (it=dict_first(opserv_exempt_channels); it; it=iter_next(it)) {
2855 string_list_append(slist, strdup(iter_key(it)));
2856 }
2857 saxdb_write_string_list(ctx, KEY_EXEMPT_CHANNELS, slist);
2858 free_string_list(slist);
2859 }
2860 /* trusted hosts takes a little more work */
2861 if (dict_size(opserv_trusted_hosts)) {
2862 saxdb_start_record(ctx, KEY_TRUSTED_HOSTS, 1);
2863 for (it = dict_first(opserv_trusted_hosts); it; it = iter_next(it)) {
2864 struct trusted_host *th = iter_data(it);
2865 saxdb_start_record(ctx, iter_key(it), 0);
2866 if (th->limit) saxdb_write_int(ctx, KEY_LIMIT, th->limit);
2867 if (th->expires) saxdb_write_int(ctx, KEY_EXPIRES, th->expires);
2868 if (th->issued) saxdb_write_int(ctx, KEY_ISSUED, th->issued);
2869 if (th->issuer) saxdb_write_string(ctx, KEY_ISSUER, th->issuer);
2870 if (th->reason) saxdb_write_string(ctx, KEY_REASON, th->reason);
2871 saxdb_end_record(ctx);
2872 }
2873 saxdb_end_record(ctx);
2874 }
2875 /* gags */
2876 if (gagList) {
2877 struct gag_entry *gag;
2878 saxdb_start_record(ctx, KEY_GAGS, 1);
2879 for (gag = gagList; gag; gag = gag->next) {
2880 saxdb_start_record(ctx, gag->mask, 0);
2881 saxdb_write_string(ctx, KEY_OWNER, gag->owner);
2882 saxdb_write_string(ctx, KEY_REASON, gag->reason);
2883 if (gag->expires) saxdb_write_int(ctx, KEY_EXPIRES, gag->expires);
2884 saxdb_end_record(ctx);
2885 }
2886 saxdb_end_record(ctx);
2887 }
2888 /* channel warnings */
2889 if (dict_size(opserv_chan_warn)) {
2890 saxdb_start_record(ctx, KEY_WARN, 0);
2891 for (it = dict_first(opserv_chan_warn); it; it = iter_next(it)) {
2892 saxdb_write_string(ctx, iter_key(it), iter_data(it));
2893 }
2894 saxdb_end_record(ctx);
2895 }
2896 /* alerts */
2897 if (dict_size(opserv_user_alerts)) {
2898 saxdb_start_record(ctx, KEY_ALERTS, 1);
2899 for (it = dict_first(opserv_user_alerts); it; it = iter_next(it)) {
2900 struct opserv_user_alert *alert = iter_data(it);
2901 const char *reaction;
2902 saxdb_start_record(ctx, iter_key(it), 0);
2903 saxdb_write_string(ctx, KEY_DISCRIM, alert->text_discrim);
2904 saxdb_write_string(ctx, KEY_OWNER, alert->owner);
2905 switch (alert->reaction) {
2906 case REACT_NOTICE: reaction = "notice"; break;
2907 case REACT_KILL: reaction = "kill"; break;
2908 case REACT_GLINE: reaction = "gline"; break;
2909 default:
2910 reaction = NULL;
2911 log_module(OS_LOG, LOG_ERROR, "Invalid reaction type %d for alert %s (while writing database).", alert->reaction, iter_key(it));
2912 break;
2913 }
2914 if (reaction) saxdb_write_string(ctx, KEY_REACTION, reaction);
2915 saxdb_end_record(ctx);
2916 }
2917 saxdb_end_record(ctx);
2918 }
2919 /* max clients */
2920 saxdb_start_record(ctx, KEY_MAX_CLIENTS, 0);
2921 saxdb_write_int(ctx, KEY_MAX, max_clients);
2922 saxdb_write_int(ctx, KEY_TIME, max_clients_time);
2923 saxdb_end_record(ctx);
2924 return 0;
2925 }
2926
2927 static int
2928 query_keys_helper(const char *key, UNUSED_ARG(void *data), void *extra)
2929 {
2930 send_message_type(4, extra, opserv, "$b%s$b", key);
2931 return 0;
2932 }
2933
2934 static MODCMD_FUNC(cmd_query)
2935 {
2936 struct record_data *rd;
2937 unsigned int i;
2938 char *nodename;
2939
2940 if (argc < 2) {
2941 reply("OSMSG_OPTION_ROOT");
2942 conf_enum_root(query_keys_helper, user);
2943 return 1;
2944 }
2945
2946 nodename = unsplit_string(argv+1, argc-1, NULL);
2947 if (!(rd = conf_get_node(nodename))) {
2948 reply("OSMSG_UNKNOWN_OPTION", nodename);
2949 return 0;
2950 }
2951
2952 if (rd->type == RECDB_QSTRING)
2953 reply("OSMSG_OPTION_IS", nodename, rd->d.qstring);
2954 else if (rd->type == RECDB_STRING_LIST) {
2955 reply("OSMSG_OPTION_LIST", nodename);
2956 if (rd->d.slist->used)
2957 for (i=0; i<rd->d.slist->used; i++)
2958 send_message_type(4, user, cmd->parent->bot, "$b%s$b", rd->d.slist->list[i]);
2959 else
2960 reply("OSMSG_OPTION_LIST_EMPTY");
2961 } else if (rd->type == RECDB_OBJECT) {
2962 reply("OSMSG_OPTION_KEYS", nodename);
2963 dict_foreach(rd->d.object, query_keys_helper, user);
2964 }
2965
2966 return 1;
2967 }
2968
2969 static MODCMD_FUNC(cmd_set)
2970 {
2971 struct record_data *rd;
2972
2973 /* I originally wanted to be able to fully manipulate the config
2974 db with this, but i wussed out. feel free to fix this - you'll
2975 need to handle quoted strings which have been split, and likely
2976 invent a syntax for it. -Zoot */
2977
2978 if (!(rd = conf_get_node(argv[1]))) {
2979 reply("OSMSG_SET_NOT_SET", argv[1]);
2980 return 0;
2981 }
2982
2983 if (rd->type != RECDB_QSTRING) {
2984 reply("OSMSG_SET_BAD_TYPE", argv[1]);
2985 return 0;
2986 }
2987
2988 free(rd->d.qstring);
2989 rd->d.qstring = strdup(argv[2]);
2990 conf_call_reload_funcs();
2991 reply("OSMSG_SET_SUCCESS", argv[1], argv[2]);
2992 return 1;
2993 }
2994
2995 static MODCMD_FUNC(cmd_settime)
2996 {
2997 const char *srv_name_mask = "*";
2998 time_t new_time = now;
2999
3000 if (argc > 1)
3001 srv_name_mask = argv[1];
3002 if (argc > 2)
3003 new_time = time(NULL);
3004 irc_settime(srv_name_mask, new_time);
3005 reply("OSMSG_SETTIME_SUCCESS", srv_name_mask);
3006 return 1;
3007 }
3008
3009 static discrim_t
3010 opserv_discrim_create(struct userNode *user, unsigned int argc, char *argv[], int allow_channel)
3011 {
3012 unsigned int i, j;
3013 discrim_t discrim;
3014
3015 discrim = calloc(1, sizeof(*discrim));
3016 discrim->limit = 250;
3017 discrim->max_level = ~0;
3018 discrim->max_ts = INT_MAX;
3019 discrim->domain_depth = 2;
3020 discrim->max_channels = INT_MAX;
3021 discrim->authed = -1;
3022 discrim->info_space = -1;
3023
3024 for (i=0; i<argc; i++) {
3025 if (irccasecmp(argv[i], "log") == 0) {
3026 discrim->option_log = 1;
3027 continue;
3028 }
3029 /* Assume all other criteria require arguments. */
3030 if (i == argc - 1) {
3031 send_message(user, opserv, "MSG_MISSING_PARAMS", argv[i]);
3032 goto fail;
3033 }
3034 if (irccasecmp(argv[i], "mask") == 0) {
3035 if (!is_ircmask(argv[++i])) {
3036 send_message(user, opserv, "OSMSG_INVALID_IRCMASK", argv[i]);
3037 goto fail;
3038 }
3039 if (!split_ircmask(argv[i],
3040 &discrim->mask_nick,
3041 &discrim->mask_ident,
3042 &discrim->mask_host)) {
3043 send_message(user, opserv, "OSMSG_INVALID_IRCMASK", argv[i]);
3044 goto fail;
3045 }
3046 } else if (irccasecmp(argv[i], "nick") == 0) {
3047 discrim->mask_nick = argv[++i];
3048 } else if (irccasecmp(argv[i], "ident") == 0) {
3049 discrim->mask_ident = argv[++i];
3050 } else if (irccasecmp(argv[i], "host") == 0) {
3051 discrim->mask_host = argv[++i];
3052 } else if (irccasecmp(argv[i], "info") == 0) {
3053 discrim->mask_info = argv[++i];
3054 } else if (irccasecmp(argv[i], "server") == 0) {
3055 discrim->server = argv[++i];
3056 } else if (irccasecmp(argv[i], "ip") == 0) {
3057 j = parse_ipmask(argv[++i], &discrim->ip_addr, &discrim->ip_mask);
3058 if (!j) discrim->ip_mask_str = argv[i];
3059 } else if (irccasecmp(argv[i], "account") == 0) {
3060 if (discrim->authed == 0) {
3061 send_message(user, opserv, "OSMSG_ACCOUNTMASK_AUTHED");
3062 goto fail;
3063 }
3064 discrim->accountmask = argv[++i];
3065 discrim->authed = 1;
3066 } else if (irccasecmp(argv[i], "authed") == 0) {
3067 i++; /* true_string and false_string are macros! */
3068 if (true_string(argv[i])) {
3069 discrim->authed = 1;
3070 } else if (false_string(argv[i])) {
3071 if (discrim->accountmask) {
3072 send_message(user, opserv, "OSMSG_ACCOUNTMASK_AUTHED");
3073 goto fail;
3074 }
3075 discrim->authed = 0;
3076 } else {
3077 send_message(user, opserv, "MSG_INVALID_BINARY", argv[i]);
3078 goto fail;
3079 }
3080 } else if (irccasecmp(argv[i], "info_space") == 0) {
3081 /* XXX: A hack because you can't check explicitly for a space through
3082 * any other means */
3083 i++;
3084 if (true_string(argv[i])) {
3085 discrim->info_space = 1;
3086 } else if (false_string(argv[i])) {
3087 discrim->info_space = 0;
3088 } else {
3089 send_message(user, opserv, "MSG_INVALID_BINARY", argv[i]);
3090 goto fail;
3091 }
3092 } else if (irccasecmp(argv[i], "duration") == 0) {
3093 discrim->duration = ParseInterval(argv[++i]);
3094 } else if (irccasecmp(argv[i], "channel") == 0) {
3095 for (j=0, i++; ; j++) {
3096 switch (argv[i][j]) {
3097 case '#':
3098 goto find_channel;
3099 case '-':
3100 discrim->chan_no_modes |= MODE_CHANOP | MODE_HALFOP | MODE_VOICE;
3101 break;
3102 case '+':
3103 discrim->chan_req_modes |= MODE_VOICE;
3104 discrim->chan_no_modes |= MODE_CHANOP;
3105 discrim->chan_no_modes |= MODE_HALFOP;
3106 break;
3107 case '%':
3108 discrim->chan_req_modes |= MODE_HALFOP;
3109 discrim->chan_no_modes |= MODE_CHANOP;
3110 discrim->chan_no_modes |= MODE_VOICE;
3111 break;
3112 case '@':
3113 discrim->chan_req_modes |= MODE_CHANOP;
3114 break;
3115 case '\0':
3116 send_message(user, opserv, "MSG_NOT_CHANNEL_NAME");
3117 goto fail;
3118 }
3119 }
3120 find_channel:
3121 discrim->chan_no_modes &= ~discrim->chan_req_modes;
3122 if (!(discrim->channel = GetChannel(argv[i]+j))) {
3123 /* secretly "allow_channel" now means "if a channel name is
3124 * specified, require that it currently exist" */
3125 if (allow_channel) {
3126 send_message(user, opserv, "MSG_CHANNEL_UNKNOWN", argv[i]);
3127 goto fail;
3128 } else {
3129 discrim->channel = AddChannel(argv[i]+j, now, NULL, NULL, NULL);
3130 }
3131 }
3132 LockChannel(discrim->channel);
3133 } else if (irccasecmp(argv[i], "numchannels") == 0) {
3134 discrim->min_channels = discrim->max_channels = strtoul(argv[++i], NULL, 10);
3135 } else if (irccasecmp(argv[i], "limit") == 0) {
3136 discrim->limit = strtoul(argv[++i], NULL, 10);
3137 } else if (irccasecmp(argv[i], "reason") == 0) {
3138 discrim->reason = strdup(unsplit_string(argv+i+1, argc-i-1, NULL));
3139 i = argc;
3140 } else if (irccasecmp(argv[i], "last") == 0) {
3141 discrim->min_ts = now - ParseInterval(argv[++i]);
3142 } else if ((irccasecmp(argv[i], "linked") == 0)
3143 || (irccasecmp(argv[i], "nickage") == 0)) {
3144 const char *cmp = argv[++i];
3145 if (cmp[0] == '<') {
3146 if (cmp[1] == '=') {
3147 discrim->min_ts = now - ParseInterval(cmp+2);
3148 } else {
3149 discrim->min_ts = now - (ParseInterval(cmp+1) - 1);
3150 }
3151 } else if (cmp[0] == '>') {
3152 if (cmp[1] == '=') {
3153 discrim->max_ts = now - ParseInterval(cmp+2);
3154 } else {
3155 discrim->max_ts = now - (ParseInterval(cmp+1) - 1);
3156 }
3157 } else {
3158 discrim->min_ts = now - ParseInterval(cmp+2);
3159 }
3160 } else if (irccasecmp(argv[i], "access") == 0) {
3161 const char *cmp = argv[++i];
3162 if (cmp[0] == '<') {
3163 if (discrim->min_level == 0) discrim->min_level = 1;
3164 if (cmp[1] == '=') {
3165 discrim->max_level = strtoul(cmp+2, NULL, 0);
3166 } else {
3167 discrim->max_level = strtoul(cmp+1, NULL, 0) - 1;
3168 }
3169 } else if (cmp[0] == '=') {
3170 discrim->min_level = discrim->max_level = strtoul(cmp+1, NULL, 0);
3171 } else if (cmp[0] == '>') {
3172 if (cmp[1] == '=') {
3173 discrim->min_level = strtoul(cmp+2, NULL, 0);
3174 } else {
3175 discrim->min_level = strtoul(cmp+1, NULL, 0) + 1;
3176 }
3177 } else {
3178 discrim->min_level = strtoul(cmp+2, NULL, 0);
3179 }
3180 } else if ((irccasecmp(argv[i], "abuse") == 0)
3181 && (irccasecmp(argv[++i], "opers") == 0)) {
3182 discrim->match_opers = 1;
3183 } else if (irccasecmp(argv[i], "depth") == 0) {
3184 discrim->domain_depth = strtoul(argv[++i], NULL, 0);
3185 } else if (irccasecmp(argv[i], "clones") == 0) {
3186 discrim->min_clones = strtoul(argv[++i], NULL, 0);
3187 } else {
3188 send_message(user, opserv, "MSG_INVALID_CRITERIA", argv[i]);
3189 goto fail;
3190 }
3191 }
3192
3193 if (discrim->mask_nick && !strcmp(discrim->mask_nick, "*")) {
3194 discrim->mask_nick = 0;
3195 }
3196 if (discrim->mask_ident && !strcmp(discrim->mask_ident, "*")) {
3197 discrim->mask_ident = 0;
3198 }
3199 if (discrim->mask_info && !strcmp(discrim->mask_info, "*")) {
3200 discrim->mask_info = 0;
3201 }
3202 if (discrim->mask_host && !discrim->mask_host[strspn(discrim->mask_host, "*.")]) {
3203 discrim->mask_host = 0;
3204 }
3205 return discrim;
3206 fail:
3207 free(discrim);
3208 return NULL;
3209 }
3210
3211 static int
3212 discrim_match(discrim_t discrim, struct userNode *user)
3213 {
3214 unsigned int access;
3215
3216 if ((user->timestamp < discrim->min_ts)
3217 || (user->timestamp > discrim->max_ts)
3218 || (user->channels.used < discrim->min_channels)
3219 || (user->channels.used > discrim->max_channels)
3220 || (discrim->authed == 0 && user->handle_info)
3221 || (discrim->authed == 1 && !user->handle_info)
3222 || (discrim->info_space == 0 && user->info[0] == ' ')
3223 || (discrim->info_space == 1 && user->info[0] != ' ')
3224 || (discrim->mask_nick && !match_ircglob(user->nick, discrim->mask_nick))
3225 || (discrim->mask_ident && !match_ircglob(user->ident, discrim->mask_ident))
3226 || (discrim->mask_host && !match_ircglob(user->hostname, discrim->mask_host))
3227 || (discrim->mask_info && !match_ircglob(user->info, discrim->mask_info))
3228 || (discrim->server && !match_ircglob(user->uplink->name, discrim->server))
3229 || (discrim->accountmask && (!user->handle_info || !match_ircglob(user->handle_info->handle, discrim->accountmask)))
3230 || (discrim->ip_mask && !MATCH_IPMASK(user->ip, discrim->ip_addr, discrim->ip_mask))) {
3231 return 0;
3232 }
3233 if (discrim->channel && !GetUserMode(discrim->channel, user)) return 0;
3234 access = user->handle_info ? user->handle_info->opserv_level : 0;
3235 if ((access < discrim->min_level)
3236 || (access > discrim->max_level)) {
3237 return 0;
3238 }
3239 if (discrim->ip_mask_str) {
3240 if (!match_ircglob(inet_ntoa(user->ip), discrim->ip_mask_str)) return 0;
3241 }
3242 if (discrim->min_clones > 1) {
3243 struct opserv_hostinfo *ohi = dict_find(opserv_hostinfo_dict, inet_ntoa(user->ip), NULL);
3244 if (!ohi || (ohi->clients.used < discrim->min_clones)) return 0;
3245 }
3246 return 1;
3247 }
3248
3249 static unsigned int
3250 opserv_discrim_search(discrim_t discrim, discrim_search_func dsf, void *data)
3251 {
3252 unsigned int nn, count;
3253 struct userList matched;
3254
3255 userList_init(&matched);
3256 /* Try most optimized search methods first */
3257 if (discrim->channel) {
3258 for (nn=0;
3259 (nn < discrim->channel->members.used)
3260 && (matched.used < discrim->limit);
3261 nn++) {
3262 struct modeNode *mn = discrim->channel->members.list[nn];
3263 if (((mn->modes & discrim->chan_req_modes) != discrim->chan_req_modes)
3264 || ((mn->modes & discrim->chan_no_modes) != 0)) {
3265 continue;
3266 }
3267 if (discrim_match(discrim, mn->user)) {
3268 userList_append(&matched, mn->user);
3269 }
3270 }
3271 } else if (discrim->ip_mask_str && !discrim->ip_mask_str[strcspn(discrim->ip_mask_str, "?*")]) {
3272 struct opserv_hostinfo *ohi = dict_find(opserv_hostinfo_dict, discrim->ip_mask_str, NULL);
3273 if (!ohi) {
3274 userList_clean(&matched);
3275 return 0;
3276 }
3277 for (nn=0; (nn<ohi->clients.used) && (matched.used < discrim->limit); nn++) {
3278 if (discrim_match(discrim, ohi->clients.list[nn])) {
3279 userList_append(&matched, ohi->clients.list[nn]);
3280 }
3281 }
3282 } else {
3283 dict_iterator_t it;
3284 for (it=dict_first(clients); it && (matched.used < discrim->limit); it=iter_next(it)) {
3285 if (discrim_match(discrim, iter_data(it))) {
3286 userList_append(&matched, iter_data(it));
3287 }
3288 }
3289 }
3290
3291 if (!matched.used) {
3292 userList_clean(&matched);
3293 return 0;
3294 }
3295
3296 if (discrim->option_log) {
3297 log_module(OS_LOG, LOG_INFO, "Logging matches for search:");
3298 }
3299 for (nn=0; nn<matched.used; nn++) {
3300 struct userNode *user = matched.list[nn];
3301 if (discrim->option_log) {
3302 log_module(OS_LOG, LOG_INFO, " %s!%s@%s", user->nick, user->ident, user->hostname);
3303 }
3304 if (dsf(user, data)) {
3305 /* If a search function returns true, it ran into a
3306 problem. Stop going through the list. */
3307 break;
3308 }
3309 }
3310 if (discrim->option_log) {
3311 log_module(OS_LOG, LOG_INFO, "End of matching users.");
3312 }
3313 count = matched.used;
3314 userList_clean(&matched);
3315 return count;
3316 }
3317
3318 static int
3319 trace_print_func(struct userNode *match, void *extra)
3320 {
3321 struct discrim_and_source *das = extra;
3322 if (match->handle_info) {
3323 send_message_type(4, das->source, opserv, "%s!%s@%s %s", match->nick, match->ident, match->hostname, match->handle_info->handle);
3324 } else {
3325 send_message_type(4, das->source, opserv, "%s!%s@%s", match->nick, match->ident, match->hostname);
3326 }
3327 return 0;
3328 }
3329
3330 static int
3331 trace_count_func(UNUSED_ARG(struct userNode *match), UNUSED_ARG(void *extra))
3332 {
3333 return 0;
3334 }
3335
3336 static int
3337 is_oper_victim(struct userNode *user, struct userNode *target, int match_opers)
3338 {
3339 return !(IsService(target)
3340 || (!match_opers && IsOper(target))
3341 || (target->handle_info
3342 && target->handle_info->opserv_level > user->handle_info->opserv_level));
3343 }
3344
3345 static int
3346 trace_gline_func(struct userNode *match, void *extra)
3347 {
3348 struct discrim_and_source *das = extra;
3349
3350 if (is_oper_victim(das->source, match, das->discrim->match_opers)) {
3351 opserv_block(match, das->source->handle_info->handle, das->discrim->reason, das->discrim->duration);
3352 }
3353
3354 return 0;
3355 }
3356
3357 static int
3358 trace_kill_func(struct userNode *match, void *extra)
3359 {
3360 struct discrim_and_source *das = extra;
3361
3362 if (is_oper_victim(das->source, match, das->discrim->match_opers)) {
3363 char *reason;
3364 if (das->discrim->reason) {
3365 reason = das->discrim->reason;
3366 } else {
3367 reason = alloca(strlen(OSMSG_KILL_REQUESTED)+strlen(das->source->nick)+1);
3368 sprintf(reason, OSMSG_KILL_REQUESTED, das->source->nick);
3369 }
3370 DelUser(match, opserv, 1, reason);
3371 }
3372
3373 return 0;
3374 }
3375
3376 static int
3377 is_gagged(char *mask)
3378 {
3379 struct gag_entry *gag;
3380
3381 for (gag = gagList; gag; gag = gag->next) {
3382 if (match_ircglobs(gag->mask, mask)) return 1;
3383 }
3384 return 0;
3385 }
3386
3387 static int
3388 trace_gag_func(struct userNode *match, void *extra)
3389 {
3390 struct discrim_and_source *das = extra;
3391
3392 if (is_oper_victim(das->source, match, das->discrim->match_opers)) {
3393 char *reason, *mask;
3394 int masksize;
3395 if (das->discrim->reason) {
3396 reason = das->discrim->reason;
3397 } else {
3398 reason = alloca(strlen(OSMSG_GAG_REQUESTED)+strlen(das->source->nick)+1);
3399 sprintf(reason, OSMSG_GAG_REQUESTED, das->source->nick);
3400 }
3401 masksize = 5+strlen(match->hostname);
3402 mask = alloca(masksize);
3403 snprintf(mask, masksize, "*!*@%s", match->hostname);
3404 if (!is_gagged(mask)) {
3405 gag_create(mask, das->source->handle_info->handle, reason,
3406 das->discrim->duration ? (now + das->discrim->duration) : 0);
3407 }
3408 }
3409
3410 return 0;
3411 }
3412
3413 static int
3414 trace_domains_func(struct userNode *match, void *extra)
3415 {
3416 struct discrim_and_source *das = extra;
3417 unsigned long *count;
3418 unsigned int depth;
3419 char *hostname;
3420
3421 if (!match->hostname[strspn(match->hostname, "0123456789.")]) {
3422 char ipmask[16];
3423 unsigned long matchip = ntohl(match->ip.s_addr);
3424 /* raw IP address.. use up to first three octets of IP */
3425 switch (das->discrim->domain_depth) {
3426 default:
3427 snprintf(ipmask, sizeof(ipmask), "%lu.%lu.%lu.*", (matchip>>24)&255, (matchip>>16)&255, (matchip>>8)&255);
3428 break;
3429 case 2:
3430 snprintf(ipmask, sizeof(ipmask), "%lu.%lu.*", (matchip>>24)&255, (matchip>>16)&255);
3431 break;
3432 case 1:
3433 snprintf(ipmask, sizeof(ipmask), "%lu.*", (matchip>>24)&255);
3434 break;
3435 }
3436 hostname = ipmask;
3437 } else {
3438 hostname = match->hostname + strlen(match->hostname);
3439 for (depth=das->discrim->domain_depth;
3440 depth && (hostname > match->hostname);
3441 depth--) {
3442 hostname--;
3443 while ((hostname > match->hostname) && (*hostname != '.')) hostname--;
3444 }
3445 if (*hostname == '.') hostname++; /* advance past last dot we saw */
3446 }
3447 if (!(count = dict_find(das->dict, hostname, NULL))) {
3448 count = calloc(1, sizeof(*count));
3449 dict_insert(das->dict, strdup(hostname), count);
3450 }
3451 (*count)++;
3452 return 0;
3453 }
3454
3455 static int
3456 opserv_show_hostinfo(const char *key, void *data, void *extra)
3457 {
3458 unsigned long *count = data;
3459 struct discrim_and_source *das = extra;
3460
3461 send_message_type(4, das->source, opserv, "%s %lu", key, *count);
3462 return !--das->disp_limit;
3463 }
3464
3465 static MODCMD_FUNC(cmd_trace)
3466 {
3467 struct discrim_and_source das;
3468 discrim_search_func action;
3469 unsigned int matches;
3470 struct svccmd *subcmd;
3471 char buf[MAXLEN];
3472
3473 sprintf(buf, "trace %s", argv[1]);
3474 if (!(subcmd = dict_find(cmd->parent->commands, buf, NULL))) {
3475 reply("OSMSG_BAD_ACTION", argv[1]);
3476 return 0;
3477 }
3478 if (!svccmd_can_invoke(user, cmd->parent->bot, subcmd, channel, SVCCMD_NOISY))
3479 return 0;
3480 if (!irccasecmp(argv[1], "print"))
3481 action = trace_print_func;
3482 else if (!irccasecmp(argv[1], "count"))
3483 action = trace_count_func;
3484 else if (!irccasecmp(argv[1], "domains"))
3485 action = trace_domains_func;
3486 else if (!irccasecmp(argv[1], "gline"))
3487 action = trace_gline_func;
3488 else if (!irccasecmp(argv[1], "kill"))
3489 action = trace_kill_func;
3490 else if (!irccasecmp(argv[1], "gag"))
3491 action = trace_gag_func;
3492 else {
3493 reply("OSMSG_BAD_ACTION", argv[1]);
3494 return 0;
3495 }
3496
3497 if (user->handle_info->opserv_level < subcmd->min_opserv_level) {
3498 reply("OSMSG_LEVEL_TOO_LOW");
3499 return 0;
3500 }
3501
3502 das.dict = NULL;
3503 das.source = user;
3504 das.discrim = opserv_discrim_create(user, argc-2, argv+2, 1);
3505 if (!das.discrim)
3506 return 0;
3507
3508 if (action == trace_print_func)
3509 reply("OSMSG_USER_SEARCH_RESULTS");
3510 else if (action == trace_count_func)
3511 das.discrim->limit = INT_MAX;
3512 else if ((action == trace_gline_func) && !das.discrim->duration)
3513 das.discrim->duration = opserv_conf.block_gline_duration;
3514 else if (action == trace_domains_func) {
3515 das.dict = dict_new();
3516 dict_set_free_data(das.dict, free);
3517 dict_set_free_keys(das.dict, free);
3518 das.disp_limit = das.discrim->limit;
3519 das.discrim->limit = INT_MAX;
3520 }
3521 matches = opserv_discrim_search(das.discrim, action, &das);
3522
3523 if (action == trace_domains_func)
3524 dict_foreach(das.dict, opserv_show_hostinfo, &das);
3525
3526 if (matches)
3527 reply("MSG_MATCH_COUNT", matches);
3528 else
3529 reply("MSG_NO_MATCHES");
3530
3531 if (das.discrim->channel)
3532 UnlockChannel(das.discrim->channel);
3533 free(das.discrim->reason);
3534 free(das.discrim);
3535 dict_delete(das.dict);
3536 return 1;
3537 }
3538
3539 typedef void (*cdiscrim_search_func)(struct chanNode *match, void *data);
3540
3541 typedef struct channel_discrim {
3542 char *name, *topic;
3543
3544 unsigned int min_users, max_users;
3545 time_t min_ts, max_ts;
3546 unsigned int limit;
3547 } *cdiscrim_t;
3548
3549 static cdiscrim_t opserv_cdiscrim_create(struct userNode *user, unsigned int argc, char *argv[]);
3550 static unsigned int opserv_cdiscrim_search(cdiscrim_t discrim, cdiscrim_search_func dsf, void *data);
3551
3552 static time_t
3553 smart_parse_time(const char *str) {
3554 /* If an interval-style string is given, treat as time before now.
3555 * If it's all digits, treat directly as a Unix timestamp. */
3556 return str[strspn(str, "0123456789")] ? (time_t)(now - ParseInterval(str)) : (time_t)atoi(str);
3557 }
3558
3559 static cdiscrim_t
3560 opserv_cdiscrim_create(struct userNode *user, unsigned int argc, char *argv[])
3561 {
3562 cdiscrim_t discrim;
3563 unsigned int i;
3564
3565 discrim = calloc(1, sizeof(*discrim));
3566 discrim->limit = 25;
3567
3568 for (i = 0; i < argc; i++) {
3569 /* Assume all criteria require arguments. */
3570 if (i == (argc - 1)) {
3571 send_message(user, opserv, "MSG_MISSING_PARAMS", argv[i]);
3572 return NULL;
3573 }
3574
3575 if (!irccasecmp(argv[i], "name"))
3576 discrim->name = argv[++i];
3577 else if (!irccasecmp(argv[i], "topic"))
3578 discrim->topic = argv[++i];
3579 else if (!irccasecmp(argv[i], "users")) {
3580 const char *cmp = argv[++i];
3581 if (cmp[0] == '<') {
3582 if (cmp[1] == '=')
3583 discrim->max_users = strtoul(cmp+2, NULL, 0);
3584 else
3585 discrim->max_users = strtoul(cmp+1, NULL, 0) - 1;
3586 } else if (cmp[0] == '=') {
3587 discrim->min_users = discrim->max_users = strtoul(cmp+1, NULL, 0);
3588 } else if (cmp[0] == '>') {
3589 if (cmp[1] == '=')
3590 discrim->min_users = strtoul(cmp+2, NULL, 0);
3591 else
3592 discrim->min_users = strtoul(cmp+1, NULL, 0) + 1;
3593 } else {
3594 discrim->min_users = strtoul(cmp+2, NULL, 0);
3595 }
3596 } else if (!irccasecmp(argv[i], "timestamp")) {
3597 const char *cmp = argv[++i];
3598 if (cmp[0] == '<') {
3599 if (cmp[1] == '=')
3600 discrim->max_ts = smart_parse_time(cmp+2);
3601 else
3602 discrim->max_ts = smart_parse_time(cmp+1)-1;
3603 } else if (cmp[0] == '=') {
3604 discrim->min_ts = discrim->max_ts = smart_parse_time(cmp+1);
3605 } else if (cmp[0] == '>') {
3606 if (cmp[1] == '=')
3607 discrim->min_ts = smart_parse_time(cmp+2);
3608 else
3609 discrim->min_ts = smart_parse_time(cmp+1)+1;
3610 } else {
3611 discrim->min_ts = smart_parse_time(cmp);
3612 }
3613 } else if (!irccasecmp(argv[i], "limit")) {
3614 discrim->limit = strtoul(argv[++i], NULL, 10);
3615 } else {
3616 send_message(user, opserv, "MSG_INVALID_CRITERIA", argv[i]);
3617 goto fail;
3618 }
3619 }
3620
3621 if (discrim->name && !strcmp(discrim->name, "*"))
3622 discrim->name = 0;
3623 if (discrim->topic && !strcmp(discrim->topic, "*"))
3624 discrim->topic = 0;
3625
3626 return discrim;
3627 fail:
3628 free(discrim);
3629 return NULL;
3630 }
3631
3632 static int
3633 cdiscrim_match(cdiscrim_t discrim, struct chanNode *chan)
3634 {
3635 if ((discrim->name && !match_ircglob(chan->name, discrim->name)) ||
3636 (discrim->topic && !match_ircglob(chan->topic, discrim->topic)) ||
3637 (discrim->min_users && chan->members.used < discrim->min_users) ||
3638 (discrim->max_users && chan->members.used > discrim->max_users) ||
3639 (discrim->min_ts && chan->timestamp < discrim->min_ts) ||
3640 (discrim->max_ts && chan->timestamp > discrim->max_ts)) {
3641 return 0;
3642 }
3643 return 1;
3644 }
3645
3646 static unsigned int opserv_cdiscrim_search(cdiscrim_t discrim, cdiscrim_search_func dsf, void *data)
3647 {
3648 unsigned int count = 0;
3649 dict_iterator_t it, next;
3650
3651 for (it = dict_first(channels); it && count < discrim->limit ; it = next) {
3652 struct chanNode *chan = iter_data(it);
3653
3654 /* Hold on to the next channel in case we decide to
3655 add actions that destructively modify the channel. */
3656 next = iter_next(it);
3657 if ((chan->members.used > 0) && cdiscrim_match(discrim, chan)) {
3658 dsf(chan, data);
3659 count++;
3660 }
3661 }
3662
3663 return count;
3664 }
3665
3666 void channel_count(UNUSED_ARG(struct chanNode *channel), UNUSED_ARG(void *data))
3667 {
3668 }
3669
3670 void channel_print(struct chanNode *channel, void *data)
3671 {
3672 char modes[MAXLEN];
3673 irc_make_chanmode(channel, modes);
3674 send_message(data, opserv, "OSMSG_CSEARCH_CHANNEL_INFO", channel->name, channel->members.used, modes, channel->topic);
3675 }
3676
3677 static MODCMD_FUNC(cmd_csearch)
3678 {
3679 cdiscrim_t discrim;
3680 unsigned int matches;
3681 cdiscrim_search_func action;
3682 struct svccmd *subcmd;
3683 char buf[MAXLEN];
3684
3685 if (!irccasecmp(argv[1], "count"))
3686 action = channel_count;
3687 else if (!irccasecmp(argv[1], "print"))
3688 action = channel_print;
3689 else {
3690 reply("OSMSG_BAD_ACTION", argv[1]);
3691 return 0;
3692 }
3693
3694 sprintf(buf, "%s %s", argv[0], argv[0]);
3695 if ((subcmd = dict_find(cmd->parent->commands, buf, NULL))
3696 && !svccmd_can_invoke(user, cmd->parent->bot, subcmd, channel, SVCCMD_NOISY)) {
3697 return 0;
3698 }
3699
3700 discrim = opserv_cdiscrim_create(user, argc - 2, argv + 2);
3701 if (!discrim)
3702 return 0;
3703
3704 if (action == channel_print)
3705 reply("OSMSG_CHANNEL_SEARCH_RESULTS");
3706 else if (action == channel_count)
3707 discrim->limit = INT_MAX;
3708
3709 matches = opserv_cdiscrim_search(discrim, action, user);
3710
3711 if (matches)
3712 reply("MSG_MATCH_COUNT", matches);
3713 else
3714 reply("MSG_NO_MATCHES");
3715
3716 free(discrim);
3717 return 1;
3718 }
3719
3720 static MODCMD_FUNC(cmd_gsync)
3721 {
3722 struct server *src;
3723 if (argc > 1) {
3724 src = GetServerH(argv[1]);
3725 if (!src) {
3726 reply("MSG_SERVER_UNKNOWN", argv[1]);
3727 return 0;
3728 }
3729 } else {
3730 src = self->uplink;
3731 }
3732 irc_stats(cmd->parent->bot, src, 'G');
3733 reply("OSMSG_GSYNC_RUNNING", src->name);
3734 return 1;
3735 }
3736
3737 struct gline_extra {
3738 struct userNode *user;
3739 struct string_list *glines;
3740 };
3741
3742 static void
3743 gtrace_print_func(struct gline *gline, void *extra)
3744 {
3745 struct gline_extra *xtra = extra;
3746 char *when_text, set_text[20];
3747 strftime(set_text, sizeof(set_text), "%Y-%m-%d", localtime(&gline->issued));
3748 when_text = asctime(localtime(&gline->expires));
3749 when_text[strlen(when_text)-1] = 0; /* strip lame \n */
3750 send_message(xtra->user, opserv, "OSMSG_GTRACE_FORMAT", gline->target, set_text, gline->issuer, when_text, gline->reason);
3751 }
3752
3753 static void
3754 gtrace_count_func(UNUSED_ARG(struct gline *gline), UNUSED_ARG(void *extra))
3755 {
3756 }
3757
3758 static void
3759 gtrace_ungline_func(struct gline *gline, void *extra)
3760 {
3761 struct gline_extra *xtra = extra;
3762 string_list_append(xtra->glines, strdup(gline->target));
3763 }
3764
3765 static MODCMD_FUNC(cmd_gtrace)
3766 {
3767 struct gline_discrim *discrim;
3768 gline_search_func action;
3769 unsigned int matches, nn;
3770 struct gline_extra extra;
3771 struct svccmd *subcmd;
3772 char buf[MAXLEN];
3773
3774 if (!irccasecmp(argv[1], "print"))
3775 action = gtrace_print_func;
3776 else if (!irccasecmp(argv[1], "count"))
3777 action = gtrace_count_func;
3778 else if (!irccasecmp(argv[1], "ungline"))
3779 action = gtrace_ungline_func;
3780 else {
3781 reply("OSMSG_BAD_ACTION", argv[1]);
3782 return 0;
3783 }
3784 sprintf(buf, "%s %s", argv[0], argv[0]);
3785 if ((subcmd = dict_find(cmd->parent->commands, buf, NULL))
3786 && !svccmd_can_invoke(user, cmd->parent->bot, subcmd, channel, SVCCMD_NOISY)) {
3787 return 0;
3788 }
3789
3790 discrim = gline_discrim_create(user, cmd->parent->bot, argc-2, argv+2);
3791 if (!discrim)
3792 return 0;
3793
3794 if (action == gtrace_print_func)
3795 reply("OSMSG_GLINE_SEARCH_RESULTS");
3796 else if (action == gtrace_count_func)
3797 discrim->limit = INT_MAX;
3798
3799 extra.user = user;
3800 extra.glines = alloc_string_list(4);
3801 matches = gline_discrim_search(discrim, action, &extra);
3802
3803 if (action == gtrace_ungline_func)
3804 for (nn=0; nn<extra.glines->used; nn++)
3805 gline_remove(extra.glines->list[nn], 1);
3806 free_string_list(extra.glines);
3807
3808 if (matches)
3809 reply("MSG_MATCH_COUNT", matches);
3810 else
3811 reply("MSG_NO_MATCHES");
3812 free(discrim->alt_target_mask);
3813 free(discrim);
3814 return 1;
3815 }
3816
3817 static int
3818 alert_check_user(const char *key, void *data, void *extra)
3819 {
3820 struct opserv_user_alert *alert = data;
3821 struct userNode *user = extra;
3822
3823 if (!discrim_match(alert->discrim, user))
3824 return 0;
3825
3826 if ((alert->reaction != REACT_NOTICE)
3827 && IsOper(user)
3828 && !alert->discrim->match_opers) {
3829 return 0;
3830 }
3831
3832 /* The user matches the alert criteria, so trigger the reaction. */
3833 if (alert->discrim->option_log)
3834 log_module(OS_LOG, LOG_INFO, "Alert %s triggered by user %s!%s@%s (%s).", key, user->nick, user->ident, user->hostname, alert->discrim->reason);
3835
3836 /* Return 1 to halt alert matching, such as when killing the user
3837 that triggered the alert. */
3838 switch (alert->reaction) {
3839 case REACT_KILL:
3840 DelUser(user, opserv, 1, alert->discrim->reason);
3841 return 1;
3842 case REACT_GLINE:
3843 opserv_block(user, alert->owner, alert->discrim->reason, alert->discrim->duration);
3844 return 1;
3845 default:
3846 log_module(OS_LOG, LOG_ERROR, "Invalid reaction type %d for alert %s.", alert->reaction, key);
3847 /* fall through to REACT_NOTICE case */
3848 case REACT_NOTICE:
3849 opserv_alert("Alert $b%s$b triggered by user $b%s$b!%s@%s (%s).", key, user->nick, user->ident, user->hostname, alert->discrim->reason);
3850 break;
3851 }
3852 return 0;
3853 }
3854
3855 static void
3856 opserv_alert_check_nick(struct userNode *user, UNUSED_ARG(const char *old_nick))
3857 {
3858 struct gag_entry *gag;
3859 dict_foreach(opserv_nick_based_alerts, alert_check_user, user);
3860 /* Gag them if appropriate (and only if). */
3861 user->modes &= ~FLAGS_GAGGED;
3862 for (gag = gagList; gag; gag = gag->next) {
3863 if (user_matches_glob(user, gag->mask, 1)) {
3864 gag_helper_func(user, NULL);
3865 break;
3866 }
3867 }
3868 }
3869
3870 static void
3871 opserv_staff_alert(struct userNode *user, UNUSED_ARG(struct handle_info *old_handle))
3872 {
3873 const char *type;
3874
3875 if (!opserv_conf.staff_auth_channel
3876 || user->uplink->burst
3877 || !user->handle_info)
3878 return;
3879 else if (user->handle_info->opserv_level)
3880 type = "OPER";
3881 else if (IsNetworkHelper(user))
3882 type = "NETWORK HELPER";
3883 else if (IsSupportHelper(user))
3884 type = "SUPPORT HELPER";
3885 else
3886 return;
3887
3888 if (user->ip.s_addr)
3889 send_channel_notice(opserv_conf.staff_auth_channel, opserv, IDENT_FORMAT" authed to %s account %s", IDENT_DATA(user), type, user->handle_info->handle);
3890 else
3891 send_channel_notice(opserv_conf.staff_auth_channel, opserv, "%s [%s@%s] authed to %s account %s", user->nick, user->ident, user->hostname, type, user->handle_info->handle);
3892 }
3893
3894 static MODCMD_FUNC(cmd_log)
3895 {
3896 struct logSearch *discrim;
3897 unsigned int matches;
3898 struct logReport report;
3899
3900 discrim = log_discrim_create(cmd->parent->bot, user, argc, argv);
3901 if (!discrim)
3902 return 0;
3903
3904 reply("OSMSG_LOG_SEARCH_RESULTS");
3905 report.reporter = opserv;
3906 report.user = user;
3907 matches = log_entry_search(discrim, log_report_entry, &report);
3908
3909 if (matches)
3910 reply("MSG_MATCH_COUNT", matches);
3911 else
3912 reply("MSG_NO_MATCHES");
3913
3914 free(discrim);
3915 return 1;
3916 }
3917
3918 static int
3919 gag_helper_func(struct userNode *match, UNUSED_ARG(void *extra))
3920 {
3921 if (IsOper(match) || IsLocal(match))
3922 return 0;
3923 match->modes |= FLAGS_GAGGED;
3924 return 0;
3925 }
3926
3927 static MODCMD_FUNC(cmd_gag)
3928 {
3929 struct gag_entry *gag;
3930 unsigned int gagged;
3931 unsigned long duration;
3932 char *reason;
3933
3934 reason = unsplit_string(argv + 3, argc - 3, NULL);
3935
3936 if (!is_ircmask(argv[1])) {
3937 reply("OSMSG_INVALID_IRCMASK", argv[1]);
3938 return 0;
3939 }
3940
3941 for (gag = gagList; gag; gag = gag->next)
3942 if (match_ircglobs(gag->mask, argv[1]))
3943 break;
3944
3945 if (gag) {
3946 reply("OSMSG_REDUNDANT_GAG", argv[1]);
3947 return 0;
3948 }
3949
3950 duration = ParseInterval(argv[2]);
3951 gagged = gag_create(argv[1], user->handle_info->handle, reason, (duration?now+duration:0));
3952
3953 if (gagged)
3954 reply("OSMSG_GAG_APPLIED", argv[1], gagged);
3955 else
3956 reply("OSMSG_GAG_ADDED", argv[1]);
3957 return 1;
3958 }
3959
3960 static int
3961 ungag_helper_func(struct userNode *match, UNUSED_ARG(void *extra))
3962 {
3963 match->modes &= ~FLAGS_GAGGED;
3964 return 0;
3965 }
3966
3967 static MODCMD_FUNC(cmd_ungag)
3968 {
3969 struct gag_entry *gag;
3970 unsigned int ungagged;
3971
3972 for (gag = gagList; gag; gag = gag->next)
3973 if (!strcmp(gag->mask, argv[1]))
3974 break;
3975
3976 if (!gag) {
3977 reply("OSMSG_GAG_NOT_FOUND", argv[1]);
3978 return 0;
3979 }
3980
3981 timeq_del(gag->expires, gag_expire, gag, 0);
3982 ungagged = gag_free(gag);
3983
3984 if (ungagged)
3985 reply("OSMSG_UNGAG_APPLIED", argv[1], ungagged);
3986 else
3987 reply("OSMSG_UNGAG_ADDED", argv[1]);
3988 return 1;
3989 }
3990
3991 static MODCMD_FUNC(cmd_addalert)
3992 {
3993 opserv_alert_reaction reaction;
3994 struct svccmd *subcmd;
3995 const char *name;
3996 char buf[MAXLEN];
3997
3998 name = argv[1];
3999 sprintf(buf, "addalert %s", argv[2]);
4000 if (!(subcmd = dict_find(cmd->parent->commands, buf, NULL))) {
4001 reply("OSMSG_UNKNOWN_REACTION", argv[2]);
4002 return 0;
4003 }
4004 if (!irccasecmp(argv[2], "notice"))
4005 reaction = REACT_NOTICE;
4006 else if (!irccasecmp(argv[2], "kill"))
4007 reaction = REACT_KILL;
4008 else if (!irccasecmp(argv[2], "gline"))
4009 reaction = REACT_GLINE;
4010 else {
4011 reply("OSMSG_UNKNOWN_REACTION", argv[2]);
4012 return 0;
4013 }
4014 if (!svccmd_can_invoke(user, cmd->parent->bot, subcmd, channel, SVCCMD_NOISY)
4015 || !opserv_add_user_alert(user, name, reaction, unsplit_string(argv + 3, argc - 3, NULL)))
4016 return 0;
4017 reply("OSMSG_ADDED_ALERT", name);
4018 return 1;
4019 }
4020
4021 static MODCMD_FUNC(cmd_delalert)
4022 {
4023 unsigned int i;
4024 for (i=1; i<argc; i++) {
4025 dict_remove(opserv_nick_based_alerts, argv[i]);
4026 dict_remove(opserv_channel_alerts, argv[i]);
4027 if (dict_remove(opserv_user_alerts, argv[i]))
4028 reply("OSMSG_REMOVED_ALERT", argv[i]);
4029 else
4030 reply("OSMSG_NO_SUCH_ALERT", argv[i]);
4031 }
4032 return 1;
4033 }
4034
4035 static void
4036 opserv_conf_read(void)
4037 {
4038 struct record_data *rd;
4039 dict_t conf_node, child;
4040 const char *str, *str2;
4041 struct policer_params *pp;
4042 dict_iterator_t it;
4043
4044 rd = conf_get_node(OPSERV_CONF_NAME);
4045 if (!rd || rd->type != RECDB_OBJECT) {
4046 log_module(OS_LOG, LOG_ERROR, "config node `%s' is missing or has wrong type.", OPSERV_CONF_NAME);
4047 return;
4048 }
4049 conf_node = rd->d.object;
4050 str = database_get_data(conf_node, KEY_DEBUG_CHANNEL, RECDB_QSTRING);
4051 if (opserv && str) {
4052 str2 = database_get_data(conf_node, KEY_DEBUG_CHANNEL_MODES, RECDB_QSTRING);
4053 if (!str2)
4054 str2 = "+tinms";
4055 opserv_conf.debug_channel = AddChannel(str, now, str2, NULL, NULL);
4056 AddChannelUser(opserv, opserv_conf.debug_channel)->modes |= MODE_CHANOP;
4057 } else {
4058 opserv_conf.debug_channel = NULL;
4059 }
4060 str = database_get_data(conf_node, KEY_ALERT_CHANNEL, RECDB_QSTRING);
4061 if (opserv && str) {
4062 str2 = database_get_data(conf_node, KEY_ALERT_CHANNEL_MODES, RECDB_QSTRING);
4063 if (!str2)
4064 str2 = "+tns";
4065 opserv_conf.alert_channel = AddChannel(str, now, str2, NULL, NULL);
4066 AddChannelUser(opserv, opserv_conf.alert_channel)->modes |= MODE_CHANOP;
4067 } else {
4068 opserv_conf.alert_channel = NULL;
4069 }
4070 str = database_get_data(conf_node, KEY_STAFF_AUTH_CHANNEL, RECDB_QSTRING);
4071 if (opserv && str) {
4072 str2 = database_get_data(conf_node, KEY_STAFF_AUTH_CHANNEL_MODES, RECDB_QSTRING);
4073 if (!str2)
4074 str2 = "+timns";
4075 opserv_conf.staff_auth_channel = AddChannel(str, now, str2, NULL, NULL);
4076 AddChannelUser(opserv, opserv_conf.staff_auth_channel)->modes |= MODE_CHANOP;
4077 } else {
4078 opserv_conf.staff_auth_channel = NULL;
4079 }
4080 str = database_get_data(conf_node, KEY_UNTRUSTED_MAX, RECDB_QSTRING);
4081 opserv_conf.untrusted_max = str ? strtoul(str, NULL, 0) : 5;
4082 str = database_get_data(conf_node, KEY_PURGE_LOCK_DELAY, RECDB_QSTRING);
4083 opserv_conf.purge_lock_delay = str ? strtoul(str, NULL, 0) : 60;
4084 str = database_get_data(conf_node, KEY_JOIN_FLOOD_MODERATE, RECDB_QSTRING);
4085 opserv_conf.join_flood_moderate = str ? strtoul(str, NULL, 0) : 1;
4086 str = database_get_data(conf_node, KEY_JOIN_FLOOD_MODERATE_THRESH, RECDB_QSTRING);
4087 opserv_conf.join_flood_moderate_threshold = str ? strtoul(str, NULL, 0) : 50;
4088 str = database_get_data(conf_node, KEY_NICK, RECDB_QSTRING);
4089 if (opserv && str)
4090 NickChange(opserv, str, 0);
4091 str = database_get_data(conf_node, KEY_CLONE_GLINE_DURATION, RECDB_QSTRING);
4092 opserv_conf.clone_gline_duration = str ? ParseInterval(str) : 3600;
4093 str = database_get_data(conf_node, KEY_BLOCK_GLINE_DURATION, RECDB_QSTRING);
4094 opserv_conf.block_gline_duration = str ? ParseInterval(str) : 3600;
4095
4096 if (!opserv_conf.join_policer_params)
4097 opserv_conf.join_policer_params = policer_params_new();
4098 policer_params_set(opserv_conf.join_policer_params, "size", "20");
4099 policer_params_set(opserv_conf.join_policer_params, "drain-rate", "1");
4100 if ((child = database_get_data(conf_node, KEY_JOIN_POLICER, RECDB_OBJECT)))
4101 dict_foreach(child, set_policer_param, opserv_conf.join_policer_params);
4102
4103 for (it = dict_first(channels); it; it = iter_next(it)) {
4104 struct chanNode *cNode = iter_data(it);
4105 cNode->join_policer.params = opserv_conf.join_policer_params;
4106 }
4107
4108 if (opserv_conf.new_user_policer.params)
4109 pp = opserv_conf.new_user_policer.params;
4110 else
4111 pp = opserv_conf.new_user_policer.params = policer_params_new();
4112 policer_params_set(pp, "size", "200");
4113 policer_params_set(pp, "drain-rate", "3");
4114 if ((child = database_get_data(conf_node, KEY_NEW_USER_POLICER, RECDB_OBJECT)))
4115 dict_foreach(child, set_policer_param, pp);
4116 }
4117
4118 static void
4119 opserv_db_init(void) {
4120 /* set up opserv_trusted_hosts dict */
4121 dict_delete(opserv_trusted_hosts);
4122 opserv_trusted_hosts = dict_new();
4123 dict_set_free_data(opserv_trusted_hosts, free_trusted_host);
4124 /* set up opserv_chan_warn dict */
4125 dict_delete(opserv_chan_warn);
4126 opserv_chan_warn = dict_new();
4127 dict_set_free_keys(opserv_chan_warn, free);
4128 dict_set_free_data(opserv_chan_warn, free);
4129 /* set up opserv_user_alerts */
4130 dict_delete(opserv_channel_alerts);
4131 opserv_channel_alerts = dict_new();
4132 dict_delete(opserv_nick_based_alerts);
4133 opserv_nick_based_alerts = dict_new();
4134 dict_delete(opserv_user_alerts);
4135 opserv_user_alerts = dict_new();
4136 dict_set_free_keys(opserv_user_alerts, free);
4137 dict_set_free_data(opserv_user_alerts, opserv_free_user_alert);
4138 /* set up opserv_bad_words */
4139 free_string_list(opserv_bad_words);
4140 opserv_bad_words = alloc_string_list(4);
4141 /* and opserv_exempt_channels */
4142 dict_delete(opserv_exempt_channels);
4143 opserv_exempt_channels = dict_new();
4144 dict_set_free_keys(opserv_exempt_channels, free);
4145 }
4146
4147 static void
4148 opserv_db_cleanup(void)
4149 {
4150 unsigned int nn;
4151
4152 dict_delete(opserv_chan_warn);
4153 dict_delete(opserv_reserved_nick_dict);
4154 free_string_list(opserv_bad_words);
4155 dict_delete(opserv_exempt_channels);
4156 dict_delete(opserv_trusted_hosts);
4157 unreg_del_user_func(opserv_user_cleanup);
4158 dict_delete(opserv_hostinfo_dict);
4159 dict_delete(opserv_nick_based_alerts);
4160 dict_delete(opserv_channel_alerts);
4161 dict_delete(opserv_user_alerts);
4162 for (nn=0; nn<ArrayLength(level_strings); ++nn)
4163 free(level_strings[nn]);
4164 while (gagList)
4165 gag_free(gagList);
4166 policer_params_delete(opserv_conf.join_policer_params);
4167 policer_params_delete(opserv_conf.new_user_policer.params);
4168 }
4169
4170 void
4171 init_opserv(const char *nick)
4172 {
4173 OS_LOG = log_register_type("OpServ", "file:opserv.log");
4174 if (nick) {
4175 const char *modes = conf_get_data("services/opserv/modes", RECDB_QSTRING);
4176 opserv = AddService(nick, modes ? modes : NULL, "Oper Services", NULL);
4177 }
4178 conf_register_reload(opserv_conf_read);
4179
4180 memset(level_strings, 0, sizeof(level_strings));
4181 opserv_module = module_register("OpServ", OS_LOG, "opserv.help", opserv_help_expand);
4182 opserv_define_func("ACCESS", cmd_access, 0, 0, 0);
4183 opserv_define_func("ADDALERT", cmd_addalert, 800, 0, 4);
4184 opserv_define_func("ADDALERT NOTICE", NULL, 0, 0, 0);
4185 opserv_define_func("ADDALERT GLINE", NULL, 900, 0, 0);
4186 opserv_define_func("ADDALERT KILL", NULL, 900, 0, 0);
4187 opserv_define_func("ADDBAD", cmd_addbad, 800, 0, 2);
4188 opserv_define_func("ADDEXEMPT", cmd_addexempt, 800, 0, 2);
4189 opserv_define_func("ADDTRUST", cmd_addtrust, 800, 0, 5);
4190 opserv_define_func("BAN", cmd_ban, 100, 2, 2);
4191 opserv_define_func("BLOCK", cmd_block, 100, 0, 2);
4192 opserv_define_func("CHANINFO", cmd_chaninfo, 0, 3, 0);
4193 opserv_define_func("CLEARBANS", cmd_clearbans, 300, 2, 0);
4194 opserv_define_func("CLEARMODES", cmd_clearmodes, 400, 2, 0);
4195 opserv_define_func("CLONE", cmd_clone, 999, 0, 3);
4196 opserv_define_func("COLLIDE", cmd_collide, 800, 0, 5);
4197 opserv_define_func("CSEARCH", cmd_csearch, 100, 0, 3);
4198 opserv_define_func("CSEARCH COUNT", cmd_csearch, 0, 0, 0);
4199 opserv_define_func("CSEARCH PRINT", cmd_csearch, 0, 0, 0);
4200 opserv_define_func("DELALERT", cmd_delalert, 800, 0, 2);
4201 opserv_define_func("DELBAD", cmd_delbad, 800, 0, 2);
4202 opserv_define_func("DELEXEMPT", cmd_delexempt, 800, 0, 2);
4203 opserv_define_func("DELTRUST", cmd_deltrust, 800, 0, 2);
4204 opserv_define_func("DEOP", cmd_deop, 100, 2, 2);
4205 opserv_define_func("DEOPALL", cmd_deopall, 400, 2, 0);
4206 opserv_define_func("DEHOP", cmd_dehop, 100, 2, 2);
4207 opserv_define_func("DEHOPALL", cmd_dehopall, 400, 2, 0);
4208 opserv_define_func("DEVOICEALL", cmd_devoiceall, 300, 2, 0);
4209 opserv_define_func("DIE", cmd_die, 900, 0, 2);
4210 opserv_define_func("DUMP", cmd_dump, 999, 0, 2);
4211 opserv_define_func("EDITTRUST", cmd_edittrust, 800, 0, 5);
4212 opserv_define_func("GAG", cmd_gag, 600, 0, 4);
4213 opserv_define_func("GLINE", cmd_gline, 600, 0, 4);
4214 opserv_define_func("GSYNC", cmd_gsync, 600, 0, 0);
4215 opserv_define_func("GTRACE", cmd_gtrace, 100, 0, 3);
4216 opserv_define_func("GTRACE COUNT", NULL, 0, 0, 0);
4217 opserv_define_func("GTRACE PRINT", NULL, 0, 0, 0);
4218 opserv_define_func("INVITE", cmd_invite, 100, 2, 0);
4219 opserv_define_func("INVITEME", cmd_inviteme, 100, 0, 0);
4220 opserv_define_func("JOIN", cmd_join, 601, 0, 2);
4221 opserv_define_func("JUMP", cmd_jump, 900, 0, 2);
4222 opserv_define_func("JUPE", cmd_jupe, 900, 0, 4);
4223 opserv_define_func("KICK", cmd_kick, 100, 2, 2);
4224 opserv_define_func("KICKALL", cmd_kickall, 400, 2, 0);
4225 opserv_define_func("KICKBAN", cmd_kickban, 100, 2, 2);
4226 opserv_define_func("KICKBANALL", cmd_kickbanall, 450, 2, 0);
4227 opserv_define_func("LOG", cmd_log, 900, 0, 2);
4228 opserv_define_func("MODE", cmd_mode, 100, 2, 2);
4229 opserv_define_func("OP", cmd_op, 100, 2, 2);
4230 opserv_define_func("OPALL", cmd_opall, 400, 2, 0);
4231 opserv_define_func("HOP", cmd_hop, 100, 2, 2);
4232 opserv_define_func("HOPALL", cmd_hopall, 400, 2, 0);
4233 opserv_define_func("PART", cmd_part, 601, 0, 2);
4234 opserv_define_func("QUERY", cmd_query, 0, 0, 0);
4235 opserv_define_func("RAW", cmd_raw, 999, 0, 2);
4236 opserv_define_func("RECONNECT", cmd_reconnect, 900, 0, 0);
4237 opserv_define_func("REFRESHG", cmd_refreshg, 600, 0, 0);
4238 opserv_define_func("REHASH", cmd_rehash, 900, 0, 0);
4239 opserv_define_func("REOPEN", cmd_reopen, 900, 0, 0);
4240 opserv_define_func("RESERVE", cmd_reserve, 800, 0, 5);
4241 opserv_define_func("RESTART", cmd_restart, 900, 0, 2);
4242 opserv_define_func("SET", cmd_set, 900, 0, 3);
4243 opserv_define_func("SETTIME", cmd_settime, 901, 0, 0);
4244 opserv_define_func("STATS ALERTS", cmd_stats_alerts, 0, 0, 0);
4245 opserv_define_func("STATS BAD", cmd_stats_bad, 0, 0, 0);
4246 opserv_define_func("STATS GAGS", cmd_stats_gags, 0, 0, 0);
4247 opserv_define_func("STATS GLINES", cmd_stats_glines, 0, 0, 0);
4248 opserv_define_func("STATS LINKS", cmd_stats_links, 0, 0, 0);
4249 opserv_define_func("STATS MAX", cmd_stats_max, 0, 0, 0);
4250 opserv_define_func("STATS NETWORK", cmd_stats_network, 0, 0, 0);
4251 opserv_define_func("STATS NETWORK2", cmd_stats_network2, 0, 0, 0);
4252 opserv_define_func("STATS RESERVED", cmd_stats_reserved, 0, 0, 0);
4253 opserv_define_func("STATS TIMEQ", cmd_stats_timeq, 0, 0, 0);
4254 opserv_define_func("STATS TRUSTED", cmd_stats_trusted, 0, 0, 0);
4255 opserv_define_func("STATS UPLINK", cmd_stats_uplink, 0, 0, 0);
4256 opserv_define_func("STATS UPTIME", cmd_stats_uptime, 0, 0, 0);
4257 opserv_define_func("STATS WARN", cmd_stats_warn, 0, 0, 0);
4258 opserv_define_func("TRACE", cmd_trace, 100, 0, 3);
4259 opserv_define_func("TRACE PRINT", NULL, 0, 0, 0);
4260 opserv_define_func("TRACE COUNT", NULL, 0, 0, 0);
4261 opserv_define_func("TRACE DOMAINS", NULL, 0, 0, 0);
4262 opserv_define_func("TRACE GLINE", NULL, 600, 0, 0);
4263 opserv_define_func("TRACE GAG", NULL, 600, 0, 0);
4264 opserv_define_func("TRACE KILL", NULL, 600, 0, 0);
4265 opserv_define_func("UNBAN", cmd_unban, 100, 2, 2);
4266 opserv_define_func("UNGAG", cmd_ungag, 600, 0, 2);
4267 opserv_define_func("UNGLINE", cmd_ungline, 600, 0, 2);
4268 modcmd_register(opserv_module, "GTRACE UNGLINE", NULL, 0, 0, "template", "ungline", NULL);
4269 opserv_define_func("UNJUPE", cmd_unjupe, 900, 0, 2);
4270 opserv_define_func("UNRESERVE", cmd_unreserve, 800, 0, 2);
4271 opserv_define_func("UNWARN", cmd_unwarn, 800, 0, 0);
4272 opserv_define_func("VOICEALL", cmd_voiceall, 300, 2, 0);
4273 opserv_define_func("WARN", cmd_warn, 800, 0, 2);
4274 opserv_define_func("WHOIS", cmd_whois, 0, 0, 2);
4275
4276 opserv_reserved_nick_dict = dict_new();
4277 opserv_hostinfo_dict = dict_new();
4278 dict_set_free_keys(opserv_hostinfo_dict, free);
4279 dict_set_free_data(opserv_hostinfo_dict, opserv_free_hostinfo);
4280
4281 reg_new_user_func(opserv_new_user_check);
4282 reg_nick_change_func(opserv_alert_check_nick);
4283 reg_del_user_func(opserv_user_cleanup);
4284 reg_new_channel_func(opserv_channel_check);
4285 reg_del_channel_func(opserv_channel_delete);
4286 reg_join_func(opserv_join_check);
4287 reg_auth_func(opserv_staff_alert);
4288
4289 opserv_db_init();
4290 saxdb_register("OpServ", opserv_saxdb_read, opserv_saxdb_write);
4291 if (nick)
4292 service_register(opserv)->trigger = '?';
4293
4294 reg_exit_func(opserv_db_cleanup);
4295 message_register_table(msgtab);
4296 }