]>
Commit | Line | Data |
---|---|---|
212380e3 | 1 | /* |
2 | * ircd-ratbox: A slightly useful ircd. | |
3 | * s_user.c: User related functions. | |
4 | * | |
5 | * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center | |
6 | * Copyright (C) 1996-2002 Hybrid Development Team | |
7 | * Copyright (C) 2002-2005 ircd-ratbox development team | |
8 | * | |
9 | * This program is free software; you can redistribute it and/or modify | |
10 | * it under the terms of the GNU General Public License as published by | |
11 | * the Free Software Foundation; either version 2 of the License, or | |
12 | * (at your option) any later version. | |
13 | * | |
14 | * This program is distributed in the hope that it will be useful, | |
15 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
16 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
17 | * GNU General Public License for more details. | |
18 | * | |
19 | * You should have received a copy of the GNU General Public License | |
20 | * along with this program; if not, write to the Free Software | |
21 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 | |
22 | * USA | |
23 | * | |
212380e3 | 24 | */ |
25 | ||
26 | #include "stdinc.h" | |
212380e3 | 27 | #include "s_user.h" |
28 | #include "channel.h" | |
29 | #include "class.h" | |
30 | #include "client.h" | |
31 | #include "common.h" | |
32 | #include "hash.h" | |
13ae2f4b | 33 | #include "match.h" |
212380e3 | 34 | #include "ircd.h" |
35 | #include "listener.h" | |
36 | #include "msg.h" | |
37 | #include "numeric.h" | |
212380e3 | 38 | #include "s_conf.h" |
39 | #include "s_newconf.h" | |
d3455e2c | 40 | #include "logger.h" |
212380e3 | 41 | #include "s_serv.h" |
42 | #include "s_stats.h" | |
43 | #include "scache.h" | |
44 | #include "send.h" | |
45 | #include "supported.h" | |
46 | #include "whowas.h" | |
212380e3 | 47 | #include "packet.h" |
48 | #include "reject.h" | |
49 | #include "cache.h" | |
50 | #include "hook.h" | |
51 | #include "monitor.h" | |
52 | #include "snomask.h" | |
53 | #include "blacklist.h" | |
92fb5c31 | 54 | #include "substitution.h" |
2392eb24 | 55 | #include "chmode.h" |
212380e3 | 56 | |
57 | static void report_and_set_user_flags(struct Client *, struct ConfItem *); | |
58 | void user_welcome(struct Client *source_p); | |
59 | ||
212380e3 | 60 | char umodebuf[128]; |
61 | ||
a8086a7c | 62 | static int orphaned_umodes = 0; |
212380e3 | 63 | int user_modes[256] = { |
64 | /* 0x00 */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0x0F */ | |
65 | /* 0x10 */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0x1F */ | |
66 | /* 0x20 */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0x2F */ | |
67 | /* 0x30 */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0x3F */ | |
68 | 0, /* @ */ | |
69 | 0, /* A */ | |
930629c5 | 70 | UMODE_BOT, /* B */ |
2678f87a | 71 | UMODE_NOCTCP, /* C */ |
212380e3 | 72 | UMODE_DEAF, /* D */ |
73 | 0, /* E */ | |
74 | 0, /* F */ | |
61ffa214 | 75 | UMODE_SCALLERID, /* G */ |
212380e3 | 76 | 0, /* H */ |
77 | 0, /* I */ | |
78 | 0, /* J */ | |
79 | 0, /* K */ | |
80 | 0, /* L */ | |
81 | 0, /* M */ | |
82 | 0, /* N */ | |
83 | 0, /* O */ | |
84 | 0, /* P */ | |
85 | UMODE_NOFORWARD, /* Q */ | |
86 | UMODE_REGONLYMSG, /* R */ | |
87 | UMODE_SERVICE, /* S */ | |
88 | 0, /* T */ | |
89 | 0, /* U */ | |
854f6bd0 | 90 | UMODE_NOINVITE, /* V */ |
212380e3 | 91 | 0, /* W */ |
92 | 0, /* X */ | |
93 | 0, /* Y */ | |
16cb94cc | 94 | UMODE_SSLCLIENT, /* Z */ |
212380e3 | 95 | /* 0x5B */ 0, 0, 0, 0, 0, 0, /* 0x60 */ |
96 | UMODE_ADMIN, /* a */ | |
97 | 0, /* b */ | |
98 | 0, /* c */ | |
99 | 0, /* d */ | |
100 | 0, /* e */ | |
101 | 0, /* f */ | |
102 | UMODE_CALLERID, /* g */ | |
103 | 0, /* h */ | |
104 | UMODE_INVISIBLE, /* i */ | |
105 | 0, /* j */ | |
106 | 0, /* k */ | |
107 | UMODE_LOCOPS, /* l */ | |
108 | 0, /* m */ | |
109 | 0, /* n */ | |
110 | UMODE_OPER, /* o */ | |
13a467bb | 111 | UMODE_OVERRIDE, /* p */ |
212380e3 | 112 | 0, /* q */ |
113 | 0, /* r */ | |
114 | UMODE_SERVNOTICE, /* s */ | |
115 | 0, /* t */ | |
116 | 0, /* u */ | |
117 | 0, /* v */ | |
118 | UMODE_WALLOP, /* w */ | |
119 | 0, /* x */ | |
120 | 0, /* y */ | |
121 | UMODE_OPERWALL, /* z */ | |
122 | /* 0x7B */ 0, 0, 0, 0, 0, /* 0x7F */ | |
123 | /* 0x80 */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0x9F */ | |
124 | /* 0x90 */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0x9F */ | |
125 | /* 0xA0 */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0xAF */ | |
126 | /* 0xB0 */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0xBF */ | |
127 | /* 0xC0 */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0xCF */ | |
128 | /* 0xD0 */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0xDF */ | |
129 | /* 0xE0 */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0xEF */ | |
130 | /* 0xF0 */ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 /* 0xFF */ | |
131 | }; | |
132 | /* *INDENT-ON* */ | |
133 | ||
134 | /* | |
135 | * show_lusers - | |
136 | * | |
137 | * inputs - pointer to client | |
138 | * output - | |
139 | * side effects - display to client user counts etc. | |
140 | */ | |
141 | int | |
142 | show_lusers(struct Client *source_p) | |
143 | { | |
af81d5a0 WP |
144 | if(rb_dlink_list_length(&lclient_list) > (unsigned long)MaxClientCount) |
145 | MaxClientCount = rb_dlink_list_length(&lclient_list); | |
2f15f871 | 146 | |
af81d5a0 | 147 | if((rb_dlink_list_length(&lclient_list) + rb_dlink_list_length(&serv_list)) > |
2f15f871 | 148 | (unsigned long)MaxConnectionCount) |
af81d5a0 WP |
149 | MaxConnectionCount = rb_dlink_list_length(&lclient_list) + |
150 | rb_dlink_list_length(&serv_list); | |
2f15f871 | 151 | |
212380e3 | 152 | sendto_one_numeric(source_p, RPL_LUSERCLIENT, form_str(RPL_LUSERCLIENT), |
153 | (Count.total - Count.invisi), | |
af81d5a0 | 154 | Count.invisi, rb_dlink_list_length(&global_serv_list)); |
212380e3 | 155 | |
af81d5a0 | 156 | if(rb_dlink_list_length(&oper_list) > 0) |
212380e3 | 157 | sendto_one_numeric(source_p, RPL_LUSEROP, |
af81d5a0 | 158 | form_str(RPL_LUSEROP), rb_dlink_list_length(&oper_list)); |
212380e3 | 159 | |
af81d5a0 | 160 | if(rb_dlink_list_length(&unknown_list) > 0) |
212380e3 | 161 | sendto_one_numeric(source_p, RPL_LUSERUNKNOWN, |
162 | form_str(RPL_LUSERUNKNOWN), | |
af81d5a0 | 163 | rb_dlink_list_length(&unknown_list)); |
212380e3 | 164 | |
af81d5a0 | 165 | if(rb_dlink_list_length(&global_channel_list) > 0) |
212380e3 | 166 | sendto_one_numeric(source_p, RPL_LUSERCHANNELS, |
167 | form_str(RPL_LUSERCHANNELS), | |
af81d5a0 | 168 | rb_dlink_list_length(&global_channel_list)); |
212380e3 | 169 | |
170 | sendto_one_numeric(source_p, RPL_LUSERME, form_str(RPL_LUSERME), | |
af81d5a0 WP |
171 | rb_dlink_list_length(&lclient_list), |
172 | rb_dlink_list_length(&serv_list)); | |
212380e3 | 173 | |
174 | sendto_one_numeric(source_p, RPL_LOCALUSERS, | |
175 | form_str(RPL_LOCALUSERS), | |
af81d5a0 | 176 | rb_dlink_list_length(&lclient_list), |
212380e3 | 177 | Count.max_loc, |
af81d5a0 | 178 | rb_dlink_list_length(&lclient_list), |
212380e3 | 179 | Count.max_loc); |
180 | ||
181 | sendto_one_numeric(source_p, RPL_GLOBALUSERS, form_str(RPL_GLOBALUSERS), | |
182 | Count.total, Count.max_tot, | |
183 | Count.total, Count.max_tot); | |
184 | ||
185 | sendto_one_numeric(source_p, RPL_STATSCONN, | |
186 | form_str(RPL_STATSCONN), | |
187 | MaxConnectionCount, MaxClientCount, | |
188 | Count.totalrestartcount); | |
189 | ||
212380e3 | 190 | return 0; |
191 | } | |
192 | ||
193 | /* | |
194 | ** register_local_user | |
195 | ** This function is called when both NICK and USER messages | |
196 | ** have been accepted for the client, in whatever order. Only | |
197 | ** after this, is the USER message propagated. | |
198 | ** | |
199 | ** NICK's must be propagated at once when received, although | |
200 | ** it would be better to delay them too until full info is | |
201 | ** available. Doing it is not so simple though, would have | |
202 | ** to implement the following: | |
203 | ** | |
204 | ** (actually it has been implemented already for a while) -orabidoo | |
205 | ** | |
206 | ** 1) user telnets in and gives only "NICK foobar" and waits | |
207 | ** 2) another user far away logs in normally with the nick | |
208 | ** "foobar" (quite legal, as this server didn't propagate | |
209 | ** it). | |
210 | ** 3) now this server gets nick "foobar" from outside, but | |
211 | ** has alread the same defined locally. Current server | |
212 | ** would just issue "KILL foobar" to clean out dups. But, | |
213 | ** this is not fair. It should actually request another | |
214 | ** nick from local user or kill him/her... | |
215 | */ | |
216 | ||
217 | int | |
218 | register_local_user(struct Client *client_p, struct Client *source_p, const char *username) | |
219 | { | |
35f6f850 | 220 | struct ConfItem *aconf, *xconf; |
212380e3 | 221 | struct User *user = source_p->user; |
222 | char tmpstr2[IRCD_BUFSIZE]; | |
223 | char ipaddr[HOSTIPLEN]; | |
224 | char myusername[USERLEN+1]; | |
225 | int status; | |
226 | ||
227 | s_assert(NULL != source_p); | |
228 | s_assert(MyConnect(source_p)); | |
229 | s_assert(source_p->username != username); | |
230 | ||
231 | if(source_p == NULL) | |
232 | return -1; | |
233 | ||
234 | if(IsAnyDead(source_p)) | |
235 | return -1; | |
236 | ||
237 | if(ConfigFileEntry.ping_cookie) | |
238 | { | |
239 | if(!(source_p->flags & FLAGS_PINGSENT) && source_p->localClient->random_ping == 0) | |
240 | { | |
241 | source_p->localClient->random_ping = (unsigned long) (rand() * rand()) << 1; | |
242 | sendto_one(source_p, "PING :%08lX", | |
243 | (unsigned long) source_p->localClient->random_ping); | |
244 | source_p->flags |= FLAGS_PINGSENT; | |
245 | return -1; | |
246 | } | |
2d2c402d | 247 | if(!(source_p->flags & FLAGS_PING_COOKIE)) |
212380e3 | 248 | { |
249 | return -1; | |
250 | } | |
251 | } | |
252 | ||
253 | /* hasnt finished client cap negotiation */ | |
2d2c402d | 254 | if(source_p->flags & FLAGS_CLICAP) |
212380e3 | 255 | return -1; |
256 | ||
257 | /* still has DNSbls to validate against */ | |
af81d5a0 | 258 | if(rb_dlink_list_length(&source_p->preClient->dnsbl_queries) > 0) |
212380e3 | 259 | return -1; |
260 | ||
9f6bbe3c | 261 | client_p->localClient->last = rb_current_time(); |
212380e3 | 262 | /* Straight up the maximum rate of flooding... */ |
263 | source_p->localClient->allow_read = MAX_FLOOD_BURST; | |
264 | ||
265 | /* XXX - fixme. we shouldnt have to build a users buffer twice.. */ | |
266 | if(!IsGotId(source_p) && (strchr(username, '[') != NULL)) | |
267 | { | |
268 | const char *p; | |
269 | int i = 0; | |
270 | ||
271 | p = username; | |
272 | ||
273 | while(*p && i < USERLEN) | |
274 | { | |
275 | if(*p != '[') | |
276 | myusername[i++] = *p; | |
277 | p++; | |
278 | } | |
279 | ||
280 | myusername[i] = '\0'; | |
281 | username = myusername; | |
282 | } | |
283 | ||
284 | if((status = check_client(client_p, source_p, username)) < 0) | |
285 | return (CLIENT_EXITED); | |
286 | ||
287 | /* Apply nick override */ | |
288 | if(*source_p->preClient->spoofnick) | |
289 | { | |
73897182 WP |
290 | char note[NICKLEN + 10]; |
291 | ||
212380e3 | 292 | del_from_client_hash(source_p->name, source_p); |
907468c4 | 293 | rb_strlcpy(source_p->name, source_p->preClient->spoofnick, NICKLEN + 1); |
212380e3 | 294 | add_to_client_hash(source_p->name, source_p); |
73897182 WP |
295 | |
296 | rb_snprintf(note, NICKLEN + 10, "Nick: %s", source_p->name); | |
297 | rb_note(source_p->localClient->F, note); | |
212380e3 | 298 | } |
299 | ||
300 | if(!valid_hostname(source_p->host)) | |
301 | { | |
5366977b | 302 | sendto_one_notice(source_p, ":*** Notice -- You have an illegal character in your hostname"); |
212380e3 | 303 | |
907468c4 | 304 | rb_strlcpy(source_p->host, source_p->sockhost, sizeof(source_p->host)); |
212380e3 | 305 | } |
306 | ||
307 | ||
308 | aconf = source_p->localClient->att_conf; | |
309 | ||
310 | if(aconf == NULL) | |
311 | { | |
312 | exit_client(client_p, source_p, &me, "*** Not Authorised"); | |
313 | return (CLIENT_EXITED); | |
314 | } | |
315 | ||
663bbb28 JT |
316 | if(IsConfSSLNeeded(aconf) && !IsSSL(source_p)) |
317 | { | |
318 | ServerStats.is_ref++; | |
319 | sendto_one_notice(source_p, ":*** Notice -- You need to use SSL/TLS to use this server"); | |
320 | exit_client(client_p, source_p, &me, "Use SSL/TLS"); | |
321 | return (CLIENT_EXITED); | |
322 | } | |
323 | ||
212380e3 | 324 | if(!IsGotId(source_p)) |
325 | { | |
326 | const char *p; | |
327 | int i = 0; | |
328 | ||
329 | if(IsNeedIdentd(aconf)) | |
330 | { | |
83251205 | 331 | ServerStats.is_ref++; |
5366977b | 332 | sendto_one_notice(source_p, ":*** Notice -- You need to install identd to use this server"); |
212380e3 | 333 | exit_client(client_p, source_p, &me, "Install identd"); |
334 | return (CLIENT_EXITED); | |
335 | } | |
336 | ||
337 | /* dont replace username if its supposed to be spoofed --fl */ | |
a0f4c418 | 338 | if(!IsConfDoSpoofIp(aconf) || !strchr(aconf->info.name, '@')) |
212380e3 | 339 | { |
340 | p = username; | |
341 | ||
342 | if(!IsNoTilde(aconf)) | |
343 | source_p->username[i++] = '~'; | |
344 | ||
345 | while (*p && i < USERLEN) | |
346 | { | |
347 | if(*p != '[') | |
348 | source_p->username[i++] = *p; | |
349 | p++; | |
350 | } | |
351 | ||
352 | source_p->username[i] = '\0'; | |
353 | } | |
354 | } | |
355 | ||
356 | if(IsNeedSasl(aconf) && !*user->suser) | |
357 | { | |
83251205 | 358 | ServerStats.is_ref++; |
5366977b | 359 | sendto_one_notice(source_p, ":*** Notice -- You need to identify via SASL to use this server"); |
212380e3 | 360 | exit_client(client_p, source_p, &me, "SASL access only"); |
361 | return (CLIENT_EXITED); | |
362 | } | |
363 | ||
364 | /* password check */ | |
365 | if(!EmptyString(aconf->passwd)) | |
366 | { | |
367 | const char *encr; | |
368 | ||
369 | if(EmptyString(source_p->localClient->passwd)) | |
370 | encr = ""; | |
371 | else if(IsConfEncrypted(aconf)) | |
cd1dea97 | 372 | encr = rb_crypt(source_p->localClient->passwd, aconf->passwd); |
212380e3 | 373 | else |
374 | encr = source_p->localClient->passwd; | |
375 | ||
376 | if(strcmp(encr, aconf->passwd)) | |
377 | { | |
83251205 | 378 | ServerStats.is_ref++; |
212380e3 | 379 | sendto_one(source_p, form_str(ERR_PASSWDMISMATCH), me.name, source_p->name); |
380 | exit_client(client_p, source_p, &me, "Bad Password"); | |
381 | return (CLIENT_EXITED); | |
382 | } | |
383 | ||
384 | /* clear password only if used now, otherwise send it | |
385 | * to services -- jilles */ | |
386 | if(source_p->localClient->passwd) | |
387 | { | |
388 | memset(source_p->localClient->passwd, 0, strlen(source_p->localClient->passwd)); | |
90a3c35b | 389 | rb_free(source_p->localClient->passwd); |
212380e3 | 390 | source_p->localClient->passwd = NULL; |
391 | } | |
392 | } | |
393 | ||
394 | /* report if user has &^>= etc. and set flags as needed in source_p */ | |
395 | report_and_set_user_flags(source_p, aconf); | |
396 | ||
397 | /* Limit clients */ | |
398 | /* | |
399 | * We want to be able to have servers and F-line clients | |
400 | * connect, so save room for "buffer" connections. | |
401 | * Smaller servers may want to decrease this, and it should | |
402 | * probably be just a percentage of the MAXCLIENTS... | |
403 | * -Taner | |
404 | */ | |
405 | /* Except "F:" clients */ | |
af81d5a0 | 406 | if(rb_dlink_list_length(&lclient_list) >= |
7506208c | 407 | (unsigned long)GlobalSetOptions.maxclients && !IsConfExemptLimits(aconf)) |
212380e3 | 408 | { |
409 | sendto_realops_snomask(SNO_FULL, L_ALL, | |
410 | "Too many clients, rejecting %s[%s].", source_p->name, source_p->host); | |
411 | ||
83251205 | 412 | ServerStats.is_ref++; |
212380e3 | 413 | exit_client(client_p, source_p, &me, "Sorry, server is full - try later"); |
414 | return (CLIENT_EXITED); | |
415 | } | |
416 | ||
212380e3 | 417 | /* kline exemption extends to xline too */ |
418 | if(!IsExemptKline(source_p) && | |
35f6f850 | 419 | (xconf = find_xline(source_p->info, 1)) != NULL) |
212380e3 | 420 | { |
83251205 | 421 | ServerStats.is_ref++; |
70c6c150 | 422 | add_reject(source_p, xconf->host, NULL); |
212380e3 | 423 | exit_client(client_p, source_p, &me, "Bad user info"); |
424 | return CLIENT_EXITED; | |
425 | } | |
426 | ||
427 | /* dnsbl check */ | |
428 | if (source_p->preClient->dnsbl_listed != NULL) | |
429 | { | |
430 | if (IsExemptKline(source_p) || IsConfExemptDNSBL(aconf)) | |
431 | sendto_one_notice(source_p, ":*** Your IP address %s is listed in %s, but you are exempt", | |
432 | source_p->sockhost, source_p->preClient->dnsbl_listed->host); | |
433 | else | |
434 | { | |
af81d5a0 | 435 | rb_dlink_list varlist = { NULL, NULL, 0 }; |
92fb5c31 | 436 | |
437 | substitution_append_var(&varlist, "nick", source_p->name); | |
438 | substitution_append_var(&varlist, "ip", source_p->sockhost); | |
439 | substitution_append_var(&varlist, "host", source_p->host); | |
440 | substitution_append_var(&varlist, "dnsbl-host", source_p->preClient->dnsbl_listed->host); | |
441 | substitution_append_var(&varlist, "network-name", ServerInfo.network_name); | |
442 | ||
83251205 | 443 | ServerStats.is_ref++; |
92fb5c31 | 444 | |
212380e3 | 445 | sendto_one(source_p, form_str(ERR_YOUREBANNEDCREEP), |
446 | me.name, source_p->name, | |
92fb5c31 | 447 | substitution_parse(source_p->preClient->dnsbl_listed->reject_reason, &varlist)); |
448 | ||
449 | substitution_free(&varlist); | |
450 | ||
212380e3 | 451 | sendto_one_notice(source_p, ":*** Your IP address %s is listed in %s", |
452 | source_p->sockhost, source_p->preClient->dnsbl_listed->host); | |
453 | source_p->preClient->dnsbl_listed->hits++; | |
40114db2 | 454 | |
ed6ad7a3 | 455 | sendto_realops_snomask(SNO_REJ, L_ALL, |
1d0a5f6d | 456 | "%s (%s@%s) is being disconnected due to being listed in DNS Blacklist %s", |
a58c4fed | 457 | source_p->name, source_p->username, source_p->sockhost, source_p->preClient->dnsbl_listed->host); |
40114db2 | 458 | |
21c9d815 | 459 | add_reject(source_p, NULL, NULL); |
212380e3 | 460 | exit_client(client_p, source_p, &me, "*** Banned (DNS blacklist)"); |
461 | return CLIENT_EXITED; | |
462 | } | |
463 | } | |
464 | ||
0734f634 | 465 | /* valid user name check */ |
466 | ||
467 | if(!valid_username(source_p->username)) | |
468 | { | |
469 | sendto_realops_snomask(SNO_REJ, L_ALL, | |
470 | "Invalid username: %s (%s@%s)", | |
471 | source_p->name, source_p->username, source_p->host); | |
83251205 | 472 | ServerStats.is_ref++; |
cc32202d | 473 | sendto_one_notice(source_p, ":*** Your username is invalid. Please make sure that your username contains " |
474 | "only alphanumeric characters."); | |
38e6acdd | 475 | rb_sprintf(tmpstr2, "Invalid username [%s]", source_p->username); |
0734f634 | 476 | exit_client(client_p, source_p, &me, tmpstr2); |
477 | return (CLIENT_EXITED); | |
478 | } | |
479 | ||
480 | /* end of valid user name check */ | |
481 | ||
212380e3 | 482 | /* Store original hostname -- jilles */ |
907468c4 | 483 | rb_strlcpy(source_p->orighost, source_p->host, HOSTLEN + 1); |
212380e3 | 484 | |
485 | /* Spoof user@host */ | |
486 | if(*source_p->preClient->spoofuser) | |
907468c4 | 487 | rb_strlcpy(source_p->username, source_p->preClient->spoofuser, USERLEN + 1); |
212380e3 | 488 | if(*source_p->preClient->spoofhost) |
489 | { | |
907468c4 | 490 | rb_strlcpy(source_p->host, source_p->preClient->spoofhost, HOSTLEN + 1); |
212380e3 | 491 | if (irccmp(source_p->host, source_p->orighost)) |
492 | SetDynSpoof(source_p); | |
493 | } | |
494 | ||
e2b44358 | 495 | source_p->umodes |= ConfigFileEntry.default_umodes & ~ConfigFileEntry.oper_only_umodes & ~orphaned_umodes; |
496 | ||
497 | call_hook(h_new_local_user, source_p); | |
498 | ||
499 | /* If they have died in send_* or were thrown out by the | |
500 | * new_local_user hook don't do anything. */ | |
501 | if(IsAnyDead(source_p)) | |
212380e3 | 502 | return CLIENT_EXITED; |
503 | ||
e2b44358 | 504 | /* To avoid inconsistencies, do not abort the registration |
505 | * starting from this point -- jilles | |
506 | */ | |
9879cd59 | 507 | rb_inet_ntop_sock((struct sockaddr *)&source_p->localClient->ip, ipaddr, sizeof(ipaddr)); |
212380e3 | 508 | |
509 | sendto_realops_snomask(SNO_CCONN, L_ALL, | |
510 | "Client connecting: %s (%s@%s) [%s] {%s} [%s]", | |
511 | source_p->name, source_p->username, source_p->orighost, | |
512 | show_ip(NULL, source_p) ? ipaddr : "255.255.255.255", | |
513 | get_client_class(source_p), source_p->info); | |
514 | ||
515 | sendto_realops_snomask(SNO_CCONNEXT, L_ALL, | |
516 | "CLICONN %s %s %s %s %s %s 0 %s", | |
517 | source_p->name, source_p->username, source_p->orighost, | |
518 | show_ip(NULL, source_p) ? ipaddr : "255.255.255.255", | |
519 | get_client_class(source_p), | |
520 | /* mirc can sometimes send ips here */ | |
521 | show_ip(NULL, source_p) ? source_p->localClient->fullcaps : "<hidden> <hidden>", | |
522 | source_p->info); | |
523 | ||
212380e3 | 524 | add_to_hostname_hash(source_p->orighost, source_p); |
525 | ||
526 | /* Allocate a UID if it was not previously allocated. | |
527 | * If this already occured, it was probably during SASL auth... | |
528 | */ | |
529 | if(!*source_p->id) | |
530 | { | |
531 | strcpy(source_p->id, generate_uid()); | |
532 | add_to_id_hash(source_p->id, source_p); | |
533 | } | |
534 | ||
16cb94cc WP |
535 | if (IsSSL(source_p)) |
536 | source_p->umodes |= UMODE_SSLCLIENT; | |
537 | ||
212380e3 | 538 | if (source_p->umodes & UMODE_INVISIBLE) |
539 | Count.invisi++; | |
540 | ||
541 | s_assert(!IsClient(source_p)); | |
af81d5a0 | 542 | rb_dlinkMoveNode(&source_p->localClient->tnode, &unknown_list, &lclient_list); |
212380e3 | 543 | SetClient(source_p); |
544 | ||
0a61720a | 545 | source_p->servptr = &me; |
af81d5a0 | 546 | rb_dlinkAdd(source_p, &source_p->lnode, &source_p->servptr->serv->users); |
0a61720a | 547 | |
212380e3 | 548 | /* Increment our total user count here */ |
549 | if(++Count.total > Count.max_tot) | |
550 | Count.max_tot = Count.total; | |
0a61720a | 551 | |
212380e3 | 552 | source_p->localClient->allow_read = MAX_FLOOD_BURST; |
553 | ||
554 | Count.totalrestartcount++; | |
555 | ||
556 | s_assert(source_p->localClient != NULL); | |
557 | ||
af81d5a0 | 558 | if(rb_dlink_list_length(&lclient_list) > (unsigned long)Count.max_loc) |
212380e3 | 559 | { |
af81d5a0 | 560 | Count.max_loc = rb_dlink_list_length(&lclient_list); |
212380e3 | 561 | if(!(Count.max_loc % 10)) |
562 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
563 | "New Max Local Clients: %d", Count.max_loc); | |
564 | } | |
565 | ||
566 | /* they get a reduced limit */ | |
567 | if(find_tgchange(source_p->sockhost)) | |
30028776 JT |
568 | source_p->localClient->targets_free = TGCHANGE_INITIAL_LOW; |
569 | else | |
570 | source_p->localClient->targets_free = TGCHANGE_INITIAL; | |
212380e3 | 571 | |
212380e3 | 572 | monitor_signon(source_p); |
573 | user_welcome(source_p); | |
574 | ||
575 | free_pre_client(source_p); | |
576 | ||
577 | return (introduce_client(client_p, source_p, user, source_p->name, 1)); | |
578 | } | |
579 | ||
580 | /* | |
581 | * introduce_clients | |
582 | * | |
583 | * inputs - | |
584 | * output - | |
585 | * side effects - This common function introduces a client to the rest | |
586 | * of the net, either from a local client connect or | |
587 | * from a remote connect. | |
588 | */ | |
589 | int | |
2c489d8e | 590 | introduce_client(struct Client *client_p, struct Client *source_p, struct User *user, const char *nick, int use_euid) |
212380e3 | 591 | { |
592 | static char ubuf[12]; | |
593 | struct Client *identifyservice_p; | |
594 | char *p; | |
595 | hook_data_umode_changed hdata; | |
596 | hook_data_client hdata2; | |
a4857d78 | 597 | char sockhost[HOSTLEN]; |
2c489d8e | 598 | struct ConfItem *aconf; |
212380e3 | 599 | |
600 | if(MyClient(source_p)) | |
601 | send_umode(source_p, source_p, 0, 0, ubuf); | |
602 | else | |
603 | send_umode(NULL, source_p, 0, 0, ubuf); | |
604 | ||
605 | if(!*ubuf) | |
606 | { | |
607 | ubuf[0] = '+'; | |
608 | ubuf[1] = '\0'; | |
609 | } | |
610 | ||
a4857d78 WP |
611 | s_assert(has_id(source_p)); |
612 | ||
613 | if(source_p->sockhost[0] == ':') | |
212380e3 | 614 | { |
a4857d78 WP |
615 | sockhost[0] = '0'; |
616 | sockhost[1] = '\0'; | |
617 | rb_strlcat(sockhost, source_p->sockhost, sizeof(sockhost)); | |
618 | } else | |
619 | strcpy(sockhost, source_p->sockhost); | |
212380e3 | 620 | |
a4857d78 WP |
621 | if (use_euid) |
622 | sendto_server(client_p, NULL, CAP_EUID | CAP_TS6, NOCAPS, | |
623 | ":%s EUID %s %d %ld %s %s %s %s %s %s %s :%s", | |
624 | source_p->servptr->id, nick, | |
625 | source_p->hopcount + 1, | |
626 | (long) source_p->tsinfo, ubuf, | |
627 | source_p->username, source_p->host, | |
628 | IsIPSpoof(source_p) ? "0" : sockhost, | |
629 | source_p->id, | |
630 | IsDynSpoof(source_p) ? source_p->orighost : "*", | |
631 | EmptyString(source_p->user->suser) ? "*" : source_p->user->suser, | |
632 | source_p->info); | |
633 | ||
634 | sendto_server(client_p, NULL, CAP_TS6, use_euid ? CAP_EUID : NOCAPS, | |
635 | ":%s UID %s %d %ld %s %s %s %s %s :%s", | |
636 | source_p->servptr->id, nick, | |
637 | source_p->hopcount + 1, | |
638 | (long) source_p->tsinfo, ubuf, | |
639 | source_p->username, source_p->host, | |
640 | IsIPSpoof(source_p) ? "0" : sockhost, | |
641 | source_p->id, source_p->info); | |
212380e3 | 642 | |
54656d76 JT |
643 | if(!EmptyString(source_p->certfp)) |
644 | sendto_server(client_p, NULL, CAP_TS6, NOCAPS, | |
645 | ":%s ENCAP * CERTFP :%s", | |
646 | use_id(source_p), source_p->certfp); | |
647 | ||
212380e3 | 648 | if (IsDynSpoof(source_p)) |
649 | { | |
650 | sendto_server(client_p, NULL, CAP_TS6, use_euid ? CAP_EUID : NOCAPS, ":%s ENCAP * REALHOST %s", | |
651 | use_id(source_p), source_p->orighost); | |
212380e3 | 652 | } |
a4857d78 | 653 | |
212380e3 | 654 | if (!EmptyString(source_p->user->suser)) |
655 | { | |
656 | sendto_server(client_p, NULL, CAP_TS6, use_euid ? CAP_EUID : NOCAPS, ":%s ENCAP * LOGIN %s", | |
657 | use_id(source_p), source_p->user->suser); | |
212380e3 | 658 | } |
659 | ||
660 | if(MyConnect(source_p) && source_p->localClient->passwd) | |
661 | { | |
b96db1e3 JT |
662 | if (!EmptyString(ConfigFileEntry.identifyservice) && |
663 | !EmptyString(ConfigFileEntry.identifycommand)) | |
212380e3 | 664 | { |
665 | /* use user@server */ | |
666 | p = strchr(ConfigFileEntry.identifyservice, '@'); | |
667 | if (p != NULL) | |
668 | identifyservice_p = find_named_client(p + 1); | |
669 | else | |
670 | identifyservice_p = NULL; | |
671 | if (identifyservice_p != NULL) | |
645103ac SB |
672 | { |
673 | if (!EmptyString(source_p->localClient->auth_user)) | |
674 | sendto_one(identifyservice_p, ":%s PRIVMSG %s :%s %s %s", | |
675 | get_id(source_p, identifyservice_p), | |
676 | ConfigFileEntry.identifyservice, | |
677 | ConfigFileEntry.identifycommand, | |
678 | source_p->localClient->auth_user, | |
679 | source_p->localClient->passwd); | |
680 | else | |
681 | sendto_one(identifyservice_p, ":%s PRIVMSG %s :%s %s", | |
682 | get_id(source_p, identifyservice_p), | |
683 | ConfigFileEntry.identifyservice, | |
684 | ConfigFileEntry.identifycommand, | |
685 | source_p->localClient->passwd); | |
686 | } | |
212380e3 | 687 | } |
688 | memset(source_p->localClient->passwd, 0, strlen(source_p->localClient->passwd)); | |
90a3c35b | 689 | rb_free(source_p->localClient->passwd); |
212380e3 | 690 | source_p->localClient->passwd = NULL; |
691 | } | |
692 | ||
693 | /* let modules providing usermodes know that we've got a new user, | |
694 | * why is this here? -- well, some modules need to be able to send out new | |
695 | * information about a client, so this was the best place to do it | |
696 | * --nenolod | |
697 | */ | |
698 | hdata.client = source_p; | |
699 | hdata.oldumodes = 0; | |
700 | hdata.oldsnomask = 0; | |
701 | call_hook(h_umode_changed, &hdata); | |
702 | ||
703 | /* On the other hand, some modules need to know when a client is | |
704 | * being introduced, period. | |
705 | * --gxti | |
706 | */ | |
707 | hdata2.client = client_p; | |
708 | hdata2.target = source_p; | |
709 | call_hook(h_introduce_client, &hdata2); | |
710 | ||
fa72cee1 JH |
711 | /* Do all the auth::autojoin wizardry once we're connected */ |
712 | if(MyConnect(source_p)) | |
713 | { | |
714 | aconf = source_p->localClient->att_conf; | |
715 | ||
716 | if(aconf->autojoin != NULL) | |
717 | { | |
074fe45a | 718 | user_join(client_p, source_p, aconf->autojoin, NULL); |
fa72cee1 JH |
719 | } |
720 | } | |
721 | ||
212380e3 | 722 | return 0; |
723 | } | |
724 | ||
725 | /* | |
726 | * valid_hostname - check hostname for validity | |
727 | * | |
728 | * Inputs - pointer to user | |
729 | * Output - YES if valid, NO if not | |
730 | * Side effects - NONE | |
731 | * | |
732 | * NOTE: this doesn't allow a hostname to begin with a dot and | |
733 | * will not allow more dots than chars. | |
734 | */ | |
735 | int | |
736 | valid_hostname(const char *hostname) | |
737 | { | |
59bb8093 | 738 | const char *p = hostname, *last_slash = 0; |
212380e3 | 739 | int found_sep = 0; |
740 | ||
741 | s_assert(NULL != p); | |
742 | ||
743 | if(hostname == NULL) | |
744 | return NO; | |
745 | ||
59bb8093 | 746 | if('.' == *p || ':' == *p || '/' == *p) |
212380e3 | 747 | return NO; |
748 | ||
749 | while (*p) | |
750 | { | |
751 | if(!IsHostChar(*p)) | |
752 | return NO; | |
753 | if(*p == '.' || *p == ':') | |
754 | found_sep++; | |
59bb8093 SB |
755 | else if(*p == '/') |
756 | { | |
757 | found_sep++; | |
758 | last_slash = p; | |
759 | } | |
212380e3 | 760 | p++; |
761 | } | |
762 | ||
763 | if(found_sep == 0) | |
59bb8093 SB |
764 | return NO; |
765 | ||
766 | if(last_slash && IsDigit(last_slash[1])) | |
767 | return NO; | |
212380e3 | 768 | |
59bb8093 | 769 | return YES; |
212380e3 | 770 | } |
771 | ||
772 | /* | |
773 | * valid_username - check username for validity | |
774 | * | |
775 | * Inputs - pointer to user | |
776 | * Output - YES if valid, NO if not | |
777 | * Side effects - NONE | |
778 | * | |
779 | * Absolutely always reject any '*' '!' '?' '@' in an user name | |
780 | * reject any odd control characters names. | |
781 | * Allow '.' in username to allow for "first.last" | |
782 | * style of username | |
783 | */ | |
784 | int | |
785 | valid_username(const char *username) | |
786 | { | |
787 | int dots = 0; | |
788 | const char *p = username; | |
789 | ||
790 | s_assert(NULL != p); | |
791 | ||
792 | if(username == NULL) | |
793 | return NO; | |
794 | ||
795 | if('~' == *p) | |
796 | ++p; | |
797 | ||
798 | /* reject usernames that don't start with an alphanum | |
799 | * i.e. reject jokers who have '-@somehost' or '.@somehost' | |
800 | * or "-hi-@somehost", "h-----@somehost" would still be accepted. | |
801 | */ | |
802 | if(!IsAlNum(*p)) | |
803 | return NO; | |
804 | ||
805 | while (*++p) | |
806 | { | |
807 | if((*p == '.') && ConfigFileEntry.dots_in_ident) | |
808 | { | |
809 | dots++; | |
810 | if(dots > ConfigFileEntry.dots_in_ident) | |
811 | return NO; | |
812 | if(!IsUserChar(p[1])) | |
813 | return NO; | |
814 | } | |
815 | else if(!IsUserChar(*p)) | |
816 | return NO; | |
817 | } | |
818 | return YES; | |
819 | } | |
820 | ||
821 | /* report_and_set_user_flags | |
822 | * | |
823 | * Inputs - pointer to source_p | |
824 | * - pointer to aconf for this user | |
825 | * Output - NONE | |
826 | * Side effects - | |
827 | * Report to user any special flags they are getting, and set them. | |
828 | */ | |
829 | ||
830 | static void | |
831 | report_and_set_user_flags(struct Client *source_p, struct ConfItem *aconf) | |
832 | { | |
833 | /* If this user is being spoofed, tell them so */ | |
834 | if(IsConfDoSpoofIp(aconf)) | |
835 | { | |
51e1ce90 | 836 | sendto_one_notice(source_p, ":*** Spoofing your IP"); |
212380e3 | 837 | } |
838 | ||
839 | /* If this user is in the exception class, Set it "E lined" */ | |
840 | if(IsConfExemptKline(aconf)) | |
841 | { | |
842 | SetExemptKline(source_p); | |
e7c88922 | 843 | sendto_one_notice(source_p, ":*** You are exempt from K/X lines"); |
212380e3 | 844 | } |
845 | ||
212380e3 | 846 | if(IsConfExemptDNSBL(aconf)) |
847 | /* kline exempt implies this, don't send both */ | |
848 | if(!IsConfExemptKline(aconf)) | |
51e1ce90 | 849 | sendto_one_notice(source_p, ":*** You are exempt from DNS blacklists"); |
212380e3 | 850 | |
851 | /* If this user is exempt from user limits set it F lined" */ | |
852 | if(IsConfExemptLimits(aconf)) | |
853 | { | |
51e1ce90 | 854 | sendto_one_notice(source_p, ":*** You are exempt from user limits"); |
212380e3 | 855 | } |
856 | ||
212380e3 | 857 | if(IsConfExemptFlood(aconf)) |
858 | { | |
859 | SetExemptFlood(source_p); | |
51e1ce90 | 860 | sendto_one_notice(source_p, ":*** You are exempt from flood limits"); |
212380e3 | 861 | } |
862 | ||
863 | if(IsConfExemptSpambot(aconf)) | |
864 | { | |
865 | SetExemptSpambot(source_p); | |
51e1ce90 | 866 | sendto_one_notice(source_p, ":*** You are exempt from spambot checks"); |
212380e3 | 867 | } |
868 | ||
869 | if(IsConfExemptJupe(aconf)) | |
870 | { | |
871 | SetExemptJupe(source_p); | |
51e1ce90 | 872 | sendto_one_notice(source_p, ":*** You are exempt from juped channel warnings"); |
212380e3 | 873 | } |
874 | ||
875 | if(IsConfExemptResv(aconf)) | |
876 | { | |
877 | SetExemptResv(source_p); | |
51e1ce90 | 878 | sendto_one_notice(source_p, ":*** You are exempt from resvs"); |
212380e3 | 879 | } |
880 | ||
881 | if(IsConfExemptShide(aconf)) | |
882 | { | |
883 | SetExemptShide(source_p); | |
51e1ce90 | 884 | sendto_one_notice(source_p, ":*** You are exempt from serverhiding"); |
212380e3 | 885 | } |
886 | } | |
887 | ||
3471ceb5 JT |
888 | static void |
889 | show_other_user_mode(struct Client *source_p, struct Client *target_p) | |
890 | { | |
891 | int i; | |
892 | char buf[BUFSIZE]; | |
893 | char *m; | |
894 | ||
895 | m = buf; | |
896 | *m++ = '+'; | |
897 | ||
898 | for (i = 0; i < 128; i++) /* >= 127 is extended ascii */ | |
899 | if (target_p->umodes & user_modes[i]) | |
900 | *m++ = (char) i; | |
901 | *m = '\0'; | |
902 | ||
903 | if (MyConnect(target_p) && target_p->snomask != 0) | |
904 | sendto_one_notice(source_p, ":Modes for %s are %s %s", | |
905 | target_p->name, buf, | |
906 | construct_snobuf(target_p->snomask)); | |
907 | else | |
908 | sendto_one_notice(source_p, ":Modes for %s are %s", | |
909 | target_p->name, buf); | |
910 | } | |
911 | ||
9ace21a7 JH |
912 | static void |
913 | expire_umode_p(void *data) | |
914 | { | |
915 | struct Client *source_p = data; | |
4eaadbf4 | 916 | const char *parv[4] = {source_p->name, source_p->name, "-p", NULL}; |
1332a0ef | 917 | source_p->localClient->override_timeout_event = NULL; |
9ace21a7 JH |
918 | user_mode(source_p, source_p, 3, parv); |
919 | } | |
920 | ||
212380e3 | 921 | /* |
922 | * user_mode - set get current users mode | |
923 | * | |
924 | * m_umode() added 15/10/91 By Darren Reed. | |
212380e3 | 925 | * parv[1] - username to change mode for |
926 | * parv[2] - modes to change | |
927 | */ | |
928 | int | |
929 | user_mode(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) | |
930 | { | |
931 | int flag; | |
932 | int i; | |
933 | char *m; | |
934 | const char *pm; | |
935 | struct Client *target_p; | |
936 | int what, setflags; | |
937 | int badflag = NO; /* Only send one bad flag notice */ | |
938 | int showsnomask = NO; | |
939 | unsigned int setsnomask; | |
940 | char buf[BUFSIZE]; | |
941 | hook_data_umode_changed hdata; | |
942 | ||
943 | what = MODE_ADD; | |
944 | ||
945 | if(parc < 2) | |
946 | { | |
947 | sendto_one(source_p, form_str(ERR_NEEDMOREPARAMS), me.name, source_p->name, "MODE"); | |
948 | return 0; | |
949 | } | |
950 | ||
951 | if((target_p = MyClient(source_p) ? find_named_person(parv[1]) : find_person(parv[1])) == NULL) | |
952 | { | |
953 | if(MyConnect(source_p)) | |
954 | sendto_one_numeric(source_p, ERR_NOSUCHCHANNEL, | |
955 | form_str(ERR_NOSUCHCHANNEL), parv[1]); | |
956 | return 0; | |
957 | } | |
958 | ||
959 | /* Dont know why these were commented out.. | |
960 | * put them back using new sendto() funcs | |
961 | */ | |
962 | ||
963 | if(IsServer(source_p)) | |
964 | { | |
965 | sendto_realops_snomask(SNO_GENERAL, L_ADMIN, | |
966 | "*** Mode for User %s from %s", parv[1], source_p->name); | |
967 | return 0; | |
968 | } | |
969 | ||
53ece38b | 970 | if(source_p != target_p) |
212380e3 | 971 | { |
3471ceb5 JT |
972 | if (MyOper(source_p) && parc < 3) |
973 | show_other_user_mode(source_p, target_p); | |
974 | else | |
975 | sendto_one(source_p, form_str(ERR_USERSDONTMATCH), me.name, source_p->name); | |
212380e3 | 976 | return 0; |
977 | } | |
978 | ||
979 | if(parc < 3) | |
980 | { | |
981 | m = buf; | |
982 | *m++ = '+'; | |
983 | ||
984 | for (i = 0; i < 128; i++) /* >= 127 is extended ascii */ | |
985 | if (source_p->umodes & user_modes[i]) | |
986 | *m++ = (char) i; | |
987 | ||
988 | *m = '\0'; | |
e8a2d50d | 989 | sendto_one_numeric(source_p, RPL_UMODEIS, form_str(RPL_UMODEIS), buf); |
88520303 | 990 | |
212380e3 | 991 | if (source_p->snomask != 0) |
88520303 | 992 | sendto_one_numeric(source_p, RPL_SNOMASK, form_str(RPL_SNOMASK), |
212380e3 | 993 | construct_snobuf(source_p->snomask)); |
88520303 | 994 | |
212380e3 | 995 | return 0; |
996 | } | |
997 | ||
998 | /* find flags already set for user */ | |
999 | setflags = source_p->umodes; | |
1000 | setsnomask = source_p->snomask; | |
1001 | ||
1002 | /* | |
1003 | * parse mode change string(s) | |
1004 | */ | |
1005 | for (pm = parv[2]; *pm; pm++) | |
1006 | switch (*pm) | |
1007 | { | |
1008 | case '+': | |
1009 | what = MODE_ADD; | |
1010 | break; | |
1011 | case '-': | |
1012 | what = MODE_DEL; | |
1013 | break; | |
1014 | ||
1015 | case 'o': | |
1016 | if(what == MODE_ADD) | |
1017 | { | |
1018 | if(IsServer(client_p) && !IsOper(source_p)) | |
1019 | { | |
1020 | ++Count.oper; | |
1021 | SetOper(source_p); | |
af81d5a0 | 1022 | rb_dlinkAddAlloc(source_p, &oper_list); |
212380e3 | 1023 | } |
1024 | } | |
1025 | else | |
1026 | { | |
1027 | /* Only decrement the oper counts if an oper to begin with | |
1028 | * found by Pat Szuta, Perly , perly@xnet.com | |
1029 | */ | |
1030 | ||
1031 | if(!IsOper(source_p)) | |
1032 | break; | |
1033 | ||
1034 | ClearOper(source_p); | |
1035 | ||
1036 | Count.oper--; | |
1037 | ||
fb87421d G |
1038 | user_metadata_delete(source_p, "OPERSTRING", 1); |
1039 | user_metadata_delete(source_p, "SWHOIS", 1); | |
1040 | ||
212380e3 | 1041 | if(MyConnect(source_p)) |
1042 | { | |
1043 | source_p->umodes &= ~ConfigFileEntry.oper_only_umodes; | |
1044 | if (!(source_p->umodes & UMODE_SERVNOTICE) && source_p->snomask != 0) | |
1045 | { | |
1046 | source_p->snomask = 0; | |
1047 | showsnomask = YES; | |
1048 | } | |
1049 | source_p->flags2 &= ~OPER_FLAGS; | |
1050 | ||
90a3c35b | 1051 | rb_free(source_p->localClient->opername); |
212380e3 | 1052 | source_p->localClient->opername = NULL; |
1053 | ||
af81d5a0 | 1054 | rb_dlinkFindDestroy(source_p, &local_oper_list); |
6acb39cb JT |
1055 | privilegeset_unref(source_p->localClient->privset); |
1056 | source_p->localClient->privset = NULL; | |
212380e3 | 1057 | } |
1058 | ||
af81d5a0 | 1059 | rb_dlinkFindDestroy(source_p, &oper_list); |
212380e3 | 1060 | } |
1061 | break; | |
1062 | ||
1063 | /* we may not get these, | |
1064 | * but they shouldnt be in default | |
1065 | */ | |
1066 | ||
1067 | /* can only be set on burst */ | |
1068 | case 'S': | |
16cb94cc | 1069 | case 'Z': |
212380e3 | 1070 | case ' ': |
1071 | case '\n': | |
1072 | case '\r': | |
1073 | case '\t': | |
1074 | break; | |
1075 | ||
1076 | case 's': | |
1077 | if (MyConnect(source_p)) | |
1078 | { | |
1079 | if(!IsOper(source_p) | |
1080 | && (ConfigFileEntry.oper_only_umodes & UMODE_SERVNOTICE)) | |
1081 | { | |
1082 | if (what == MODE_ADD || source_p->umodes & UMODE_SERVNOTICE) | |
1083 | badflag = YES; | |
1084 | continue; | |
1085 | } | |
1086 | showsnomask = YES; | |
1087 | if(what == MODE_ADD) | |
1088 | { | |
1089 | if (parc > 3) | |
1090 | source_p->snomask = parse_snobuf_to_mask(source_p->snomask, parv[3]); | |
1091 | else | |
1092 | source_p->snomask |= SNO_GENERAL; | |
1093 | } | |
1094 | else | |
1095 | source_p->snomask = 0; | |
1096 | if (source_p->snomask != 0) | |
1097 | source_p->umodes |= UMODE_SERVNOTICE; | |
1098 | else | |
1099 | source_p->umodes &= ~UMODE_SERVNOTICE; | |
1100 | break; | |
1101 | } | |
1102 | /* FALLTHROUGH */ | |
1103 | default: | |
90728edb | 1104 | if (MyConnect(source_p) && *pm == 'Q' && !ConfigChannel.use_forward) { |
212380e3 | 1105 | badflag = YES; |
1106 | break; | |
1107 | } | |
1108 | ||
1109 | if((flag = user_modes[(unsigned char) *pm])) | |
1110 | { | |
1111 | if(MyConnect(source_p) | |
a8086a7c | 1112 | && ((!IsOper(source_p) |
1113 | && (ConfigFileEntry.oper_only_umodes & flag)) | |
1114 | || (orphaned_umodes & flag))) | |
212380e3 | 1115 | { |
1116 | if (what == MODE_ADD || source_p->umodes & flag) | |
1117 | badflag = YES; | |
1118 | } | |
1119 | else | |
1120 | { | |
1121 | if(what == MODE_ADD) | |
1122 | source_p->umodes |= flag; | |
1123 | else | |
1124 | source_p->umodes &= ~flag; | |
1125 | } | |
1126 | } | |
1127 | else | |
1128 | { | |
1129 | if(MyConnect(source_p)) | |
1130 | badflag = YES; | |
1131 | } | |
1132 | break; | |
1133 | } | |
1134 | ||
1135 | if(badflag) | |
1136 | sendto_one(source_p, form_str(ERR_UMODEUNKNOWNFLAG), me.name, source_p->name); | |
1137 | ||
1138 | if(MyClient(source_p) && (source_p->snomask & SNO_NCHANGE) && !IsOperN(source_p)) | |
1139 | { | |
d180319a | 1140 | sendto_one_notice(source_p, ":*** You need oper and nick_changes flag for +s +n"); |
212380e3 | 1141 | source_p->snomask &= ~SNO_NCHANGE; /* only tcm's really need this */ |
1142 | } | |
1143 | ||
1144 | if(MyClient(source_p) && (source_p->umodes & UMODE_OPERWALL) && !IsOperOperwall(source_p)) | |
1145 | { | |
5366977b | 1146 | sendto_one_notice(source_p, ":*** You need oper and operwall flag for +z"); |
212380e3 | 1147 | source_p->umodes &= ~UMODE_OPERWALL; |
1148 | } | |
1149 | ||
1150 | if(MyConnect(source_p) && (source_p->umodes & UMODE_ADMIN) && | |
1151 | (!IsOperAdmin(source_p) || IsOperHiddenAdmin(source_p))) | |
1152 | { | |
d180319a | 1153 | sendto_one_notice(source_p, ":*** You need oper and admin flag for +a"); |
212380e3 | 1154 | source_p->umodes &= ~UMODE_ADMIN; |
1155 | } | |
1156 | ||
13a467bb JH |
1157 | if(MyConnect(source_p) && (source_p->umodes & UMODE_OVERRIDE) && (!IsOperOverride(source_p))) |
1158 | { | |
1159 | sendto_one_notice(source_p, ":*** You need oper and the override flag for +p"); | |
1160 | source_p->umodes &= ~UMODE_OVERRIDE; | |
1161 | } | |
1162 | ||
212380e3 | 1163 | /* let modules providing usermodes know that we've changed our usermode --nenolod */ |
1164 | hdata.client = source_p; | |
1165 | hdata.oldumodes = setflags; | |
1166 | hdata.oldsnomask = setsnomask; | |
1167 | call_hook(h_umode_changed, &hdata); | |
1168 | ||
1169 | if(!(setflags & UMODE_INVISIBLE) && IsInvisible(source_p)) | |
1170 | ++Count.invisi; | |
1171 | if((setflags & UMODE_INVISIBLE) && !IsInvisible(source_p)) | |
1172 | --Count.invisi; | |
1173 | /* | |
1174 | * compare new flags with old flags and send string which | |
1175 | * will cause servers to update correctly. | |
1176 | */ | |
1177 | send_umode_out(client_p, source_p, setflags); | |
1178 | if (showsnomask && MyConnect(source_p)) | |
88520303 | 1179 | sendto_one_numeric(source_p, RPL_SNOMASK, form_str(RPL_SNOMASK), |
212380e3 | 1180 | construct_snobuf(source_p->snomask)); |
1181 | ||
ee36f72f JH |
1182 | /* If we're setting +p, expire it, but only from local clients */ |
1183 | if(ConfigFileEntry.expire_override_time && MyClient(source_p) && (source_p->umodes & ~setflags) & UMODE_OVERRIDE) | |
1184 | { | |
1185 | source_p->localClient->override_timeout_event = | |
1186 | rb_event_addonce("expire_override", expire_umode_p, source_p, ConfigFileEntry.expire_override_time); | |
1187 | } | |
1188 | else if(MyClient(source_p) && source_p->localClient->override_timeout_event && (setflags & ~source_p->umodes) & UMODE_OVERRIDE) | |
1189 | { | |
1190 | rb_event_delete(source_p->localClient->override_timeout_event); | |
1191 | source_p->localClient->override_timeout_event = NULL; | |
1192 | } | |
1193 | ||
1194 | ||
212380e3 | 1195 | return (0); |
1196 | } | |
1197 | ||
1198 | /* | |
1199 | * send the MODE string for user (user) to connection client_p | |
1200 | * -avalon | |
1201 | */ | |
1202 | void | |
1203 | send_umode(struct Client *client_p, struct Client *source_p, int old, int sendmask, char *umode_buf) | |
1204 | { | |
1205 | int i; | |
1206 | int flag; | |
1207 | char *m; | |
1208 | int what = 0; | |
1209 | ||
1210 | /* | |
1211 | * build a string in umode_buf to represent the change in the user's | |
1212 | * mode between the new (source_p->flag) and 'old'. | |
1213 | */ | |
1214 | m = umode_buf; | |
1215 | *m = '\0'; | |
1216 | ||
1217 | for (i = 0; i < 128; i++) | |
1218 | { | |
1219 | flag = user_modes[i]; | |
1220 | ||
1221 | if((flag & old) && !(source_p->umodes & flag)) | |
1222 | { | |
1223 | if(what == MODE_DEL) | |
1224 | *m++ = (char) i; | |
1225 | else | |
1226 | { | |
1227 | what = MODE_DEL; | |
1228 | *m++ = '-'; | |
1229 | *m++ = (char) i; | |
1230 | } | |
1231 | } | |
1232 | else if(!(flag & old) && (source_p->umodes & flag)) | |
1233 | { | |
1234 | if(what == MODE_ADD) | |
1235 | *m++ = (char) i; | |
1236 | else | |
1237 | { | |
1238 | what = MODE_ADD; | |
1239 | *m++ = '+'; | |
1240 | *m++ = (char) i; | |
1241 | } | |
1242 | } | |
1243 | } | |
1244 | *m = '\0'; | |
1245 | ||
1246 | if(*umode_buf && client_p) | |
1247 | sendto_one(client_p, ":%s MODE %s :%s", source_p->name, source_p->name, umode_buf); | |
1248 | } | |
1249 | ||
1250 | /* | |
1251 | * send_umode_out | |
1252 | * | |
1253 | * inputs - | |
1254 | * output - NONE | |
1255 | * side effects - | |
1256 | */ | |
1257 | void | |
1258 | send_umode_out(struct Client *client_p, struct Client *source_p, int old) | |
1259 | { | |
1260 | struct Client *target_p; | |
1261 | char buf[BUFSIZE]; | |
af81d5a0 | 1262 | rb_dlink_node *ptr; |
212380e3 | 1263 | |
1264 | send_umode(NULL, source_p, old, 0, buf); | |
1265 | ||
8e69bb4e | 1266 | RB_DLINK_FOREACH(ptr, serv_list.head) |
212380e3 | 1267 | { |
1268 | target_p = ptr->data; | |
1269 | ||
1270 | if((target_p != client_p) && (target_p != source_p) && (*buf)) | |
1271 | { | |
1272 | sendto_one(target_p, ":%s MODE %s :%s", | |
1273 | get_id(source_p, target_p), | |
1274 | get_id(source_p, target_p), buf); | |
1275 | } | |
1276 | } | |
1277 | ||
1278 | if(client_p && MyClient(client_p)) | |
1279 | send_umode(client_p, source_p, old, 0, buf); | |
1280 | } | |
1281 | ||
1282 | /* | |
1283 | * user_welcome | |
1284 | * | |
1285 | * inputs - client pointer to client to welcome | |
1286 | * output - NONE | |
1287 | * side effects - | |
1288 | */ | |
1289 | void | |
1290 | user_welcome(struct Client *source_p) | |
1291 | { | |
88520303 | 1292 | sendto_one_numeric(source_p, RPL_WELCOME, form_str(RPL_WELCOME), ServerInfo.network_name, source_p->name); |
1293 | sendto_one_numeric(source_p, RPL_YOURHOST, form_str(RPL_YOURHOST), | |
212380e3 | 1294 | get_listener_name(source_p->localClient->listener), ircd_version); |
88520303 | 1295 | sendto_one_numeric(source_p, RPL_CREATED, form_str(RPL_CREATED), creation); |
07db71cd | 1296 | sendto_one_numeric(source_p, RPL_MYINFO, form_str(RPL_MYINFO), me.name, ircd_version, umodebuf, cflagsmyinfo, cflagsparaminfo); |
212380e3 | 1297 | |
1298 | show_isupport(source_p); | |
1299 | ||
1300 | show_lusers(source_p); | |
1301 | ||
1302 | if(ConfigFileEntry.short_motd) | |
1303 | { | |
5366977b | 1304 | sendto_one_notice(source_p, ":*** Notice -- motd was last changed at %s", user_motd_changed); |
1305 | sendto_one_notice(source_p, ":*** Notice -- Please read the motd if you haven't read it"); | |
212380e3 | 1306 | |
1307 | sendto_one(source_p, form_str(RPL_MOTDSTART), | |
1308 | me.name, source_p->name, me.name); | |
1309 | ||
1310 | sendto_one(source_p, form_str(RPL_MOTD), | |
1311 | me.name, source_p->name, "*** This is the short motd ***"); | |
1312 | ||
1313 | sendto_one(source_p, form_str(RPL_ENDOFMOTD), me.name, source_p->name); | |
1314 | } | |
1315 | else | |
1316 | send_user_motd(source_p); | |
1317 | } | |
1318 | ||
1319 | /* oper_up() | |
1320 | * | |
1321 | * inputs - pointer to given client to oper | |
1322 | * - pointer to ConfItem to use | |
1323 | * output - none | |
1324 | * side effects - opers up source_p using aconf for reference | |
1325 | */ | |
1326 | int | |
2c489d8e | 1327 | oper_up(struct Client *source_p, struct oper_conf *oper_p) |
212380e3 | 1328 | { |
1329 | unsigned int old = source_p->umodes, oldsnomask = source_p->snomask; | |
1330 | hook_data_umode_changed hdata; | |
2c489d8e | 1331 | struct ConfItem *aconf; |
212380e3 | 1332 | |
1333 | SetOper(source_p); | |
1334 | ||
1335 | if(oper_p->umodes) | |
1336 | source_p->umodes |= oper_p->umodes; | |
1337 | else if(ConfigFileEntry.oper_umodes) | |
1338 | source_p->umodes |= ConfigFileEntry.oper_umodes; | |
1339 | else | |
1340 | source_p->umodes |= DEFAULT_OPER_UMODES; | |
1341 | ||
3e06a4c8 G |
1342 | if(oper_p->swhois) |
1343 | user_metadata_add(source_p, "SWHOIS", oper_p->swhois, 1); | |
1344 | ||
32d464fe G |
1345 | if(oper_p->operstring) |
1346 | user_metadata_add(source_p, "OPERSTRING", oper_p->operstring, 1); | |
1347 | ||
67537fef | 1348 | if(oper_p->vhost || !EmptyString(GlobalSetOptions.operhost)) |
220c9db5 | 1349 | { |
08e35f66 G |
1350 | if(oper_p->vhost) |
1351 | change_nick_user_host(source_p, source_p->name, source_p->username, oper_p->vhost, 0, "Changing host"); | |
1352 | else | |
67537fef | 1353 | change_nick_user_host(source_p, source_p->name, source_p->username, GlobalSetOptions.operhost, 0, "Changing host"); |
220c9db5 G |
1354 | |
1355 | sendto_one_numeric(source_p, RPL_HOSTHIDDEN, "%s :is now your hidden host (set by %s)", source_p->host, source_p->servptr->name); | |
1356 | ||
1357 | sendto_server(NULL, NULL, | |
1358 | CAP_EUID | CAP_TS6, NOCAPS, ":%s CHGHOST %s :%s", | |
1359 | use_id(&me), use_id(source_p), source_p->host); | |
1360 | sendto_server(NULL, NULL, | |
1361 | CAP_TS6, CAP_EUID, ":%s ENCAP * CHGHOST %s :%s", | |
1362 | use_id(&me), use_id(source_p), source_p->host); | |
1363 | ||
1364 | if (!IsDynSpoof(source_p)) | |
1365 | SetDynSpoof(source_p); | |
1366 | } | |
1367 | ||
212380e3 | 1368 | if (oper_p->snomask) |
1369 | { | |
1370 | source_p->snomask |= oper_p->snomask; | |
1371 | source_p->umodes |= UMODE_SERVNOTICE; | |
1372 | } | |
1373 | else if (source_p->umodes & UMODE_SERVNOTICE) | |
1374 | { | |
1375 | /* Only apply these if +s is already set -- jilles */ | |
1376 | if (ConfigFileEntry.oper_snomask) | |
1377 | source_p->snomask |= ConfigFileEntry.oper_snomask; | |
1378 | else | |
1379 | source_p->snomask |= DEFAULT_OPER_SNOMASK; | |
1380 | } | |
1381 | ||
1382 | Count.oper++; | |
1383 | ||
1384 | SetExemptKline(source_p); | |
1385 | ||
1386 | source_p->flags2 |= oper_p->flags; | |
62d28946 | 1387 | source_p->localClient->opername = rb_strdup(oper_p->name); |
34cb09ce | 1388 | source_p->localClient->privset = privilegeset_ref(oper_p->privset); |
212380e3 | 1389 | |
af81d5a0 WP |
1390 | rb_dlinkAddAlloc(source_p, &local_oper_list); |
1391 | rb_dlinkAddAlloc(source_p, &oper_list); | |
212380e3 | 1392 | |
1393 | if(IsOperAdmin(source_p) && !IsOperHiddenAdmin(source_p)) | |
1394 | source_p->umodes |= UMODE_ADMIN; | |
1395 | if(!IsOperN(source_p)) | |
1396 | source_p->snomask &= ~SNO_NCHANGE; | |
1397 | if(!IsOperOperwall(source_p)) | |
1398 | source_p->umodes &= ~UMODE_OPERWALL; | |
1399 | hdata.client = source_p; | |
1400 | hdata.oldumodes = old; | |
1401 | hdata.oldsnomask = oldsnomask; | |
1402 | call_hook(h_umode_changed, &hdata); | |
1403 | ||
1404 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
022573be | 1405 | "%s (%s!%s@%s) is now an operator", oper_p->name, source_p->name, |
212380e3 | 1406 | source_p->username, source_p->host); |
652b8478 | 1407 | if(!(old & UMODE_INVISIBLE) && IsInvisible(source_p)) |
1408 | ++Count.invisi; | |
1409 | if((old & UMODE_INVISIBLE) && !IsInvisible(source_p)) | |
1410 | --Count.invisi; | |
212380e3 | 1411 | send_umode_out(source_p, source_p, old); |
88520303 | 1412 | sendto_one_numeric(source_p, RPL_SNOMASK, form_str(RPL_SNOMASK), |
212380e3 | 1413 | construct_snobuf(source_p->snomask)); |
1414 | sendto_one(source_p, form_str(RPL_YOUREOPER), me.name, source_p->name); | |
b8be4a3f WP |
1415 | sendto_one_notice(source_p, ":*** Oper privilege set is %s", oper_p->privset->name); |
1416 | sendto_one_notice(source_p, ":*** Oper privs are %s", oper_p->privset->privs); | |
212380e3 | 1417 | send_oper_motd(source_p); |
1418 | ||
87f58b4f JH |
1419 | aconf = source_p->localClient->att_conf; |
1420 | ||
1421 | /* Do the auth::autojoin_opers wizardry here */ | |
1422 | if(aconf->autojoin_opers != NULL) | |
1423 | { | |
1424 | /* opers should never be banned from the opers channel. | |
1425 | * Plus this is post-umode being set so you'll pass +I $o or +O. | |
1426 | * Hence why we're making this a normal clean join. --jdhore | |
1427 | */ | |
074fe45a | 1428 | user_join(&me, source_p, aconf->autojoin_opers, NULL); |
87f58b4f JH |
1429 | } |
1430 | ||
212380e3 | 1431 | return (1); |
1432 | } | |
1433 | ||
01cebbd8 | 1434 | /* |
1435 | * find_umode_slot | |
1436 | * | |
1437 | * inputs - NONE | |
1438 | * outputs - an available umode bitmask or | |
1439 | * 0 if no umodes are available | |
1440 | * side effects - NONE | |
1441 | */ | |
1442 | unsigned int | |
1443 | find_umode_slot(void) | |
1444 | { | |
1445 | unsigned int all_umodes = 0, my_umode = 0, i; | |
1446 | ||
1447 | for (i = 0; i < 128; i++) | |
1448 | all_umodes |= user_modes[i]; | |
1449 | ||
1450 | for (my_umode = 1; my_umode && (all_umodes & my_umode); | |
1451 | my_umode <<= 1); | |
1452 | ||
1453 | return my_umode; | |
1454 | } | |
1455 | ||
212380e3 | 1456 | void |
1457 | construct_umodebuf(void) | |
1458 | { | |
1459 | int i; | |
1460 | char *ptr = umodebuf; | |
a8086a7c | 1461 | static int prev_user_modes[128]; |
212380e3 | 1462 | |
1463 | *ptr = '\0'; | |
1464 | ||
1465 | for (i = 0; i < 128; i++) | |
a8086a7c | 1466 | { |
1467 | if (prev_user_modes[i] != 0 && prev_user_modes[i] != user_modes[i]) | |
1468 | { | |
1469 | if (user_modes[i] == 0) | |
1470 | { | |
1471 | orphaned_umodes |= prev_user_modes[i]; | |
1472 | sendto_realops_snomask(SNO_DEBUG, L_ALL, "Umode +%c is now orphaned", i); | |
1473 | } | |
1474 | else | |
1475 | { | |
1476 | orphaned_umodes &= ~prev_user_modes[i]; | |
1477 | sendto_realops_snomask(SNO_DEBUG, L_ALL, "Orphaned umode +%c is picked up by module", i); | |
1478 | } | |
1479 | user_modes[i] = prev_user_modes[i]; | |
1480 | } | |
1481 | else | |
1482 | prev_user_modes[i] = user_modes[i]; | |
212380e3 | 1483 | if (user_modes[i]) |
1484 | *ptr++ = (char) i; | |
a8086a7c | 1485 | } |
212380e3 | 1486 | |
1487 | *ptr++ = '\0'; | |
1488 | } | |
1489 | ||
1490 | void | |
1491 | change_nick_user_host(struct Client *target_p, const char *nick, const char *user, | |
20961eea | 1492 | const char *host, int newts, const char *format, ...) |
212380e3 | 1493 | { |
af81d5a0 | 1494 | rb_dlink_node *ptr; |
212380e3 | 1495 | struct Channel *chptr; |
1496 | struct membership *mscptr; | |
1497 | int changed = irccmp(target_p->name, nick); | |
1498 | int changed_case = strcmp(target_p->name, nick); | |
c3a0fde2 | 1499 | int do_qjm = irccmp(target_p->username, user) || (irccmp(target_p->host, host) && ConfigChannel.cycle_host_change); |
212380e3 | 1500 | char mode[10], modeval[NICKLEN * 2 + 2], reason[256], *mptr; |
1501 | va_list ap; | |
1502 | ||
1503 | modeval[0] = '\0'; | |
1504 | ||
1505 | if(changed) | |
1506 | { | |
1507 | target_p->tsinfo = newts; | |
1508 | monitor_signoff(target_p); | |
1509 | } | |
1510 | invalidate_bancache_user(target_p); | |
1511 | ||
1512 | if(do_qjm) | |
1513 | { | |
1514 | va_start(ap, format); | |
1515 | vsnprintf(reason, 255, format, ap); | |
1516 | va_end(ap); | |
1517 | ||
1518 | sendto_common_channels_local_butone(target_p, ":%s!%s@%s QUIT :%s", | |
1519 | target_p->name, target_p->username, target_p->host, | |
1520 | reason); | |
1521 | ||
8e69bb4e | 1522 | RB_DLINK_FOREACH(ptr, target_p->user->channel.head) |
212380e3 | 1523 | { |
1524 | mscptr = ptr->data; | |
1525 | chptr = mscptr->chptr; | |
1526 | mptr = mode; | |
1527 | ||
c1c91f94 | 1528 | if(is_admin(mscptr)) |
da77e1ee G |
1529 | { |
1530 | *mptr++ = 'a'; | |
1531 | strcat(modeval, nick); | |
1532 | strcat(modeval, " "); | |
1533 | } | |
1534 | ||
212380e3 | 1535 | if(is_chanop(mscptr)) |
1536 | { | |
1537 | *mptr++ = 'o'; | |
1538 | strcat(modeval, nick); | |
1539 | strcat(modeval, " "); | |
1540 | } | |
1541 | ||
da77e1ee G |
1542 | if(is_halfop(mscptr)) |
1543 | { | |
1544 | *mptr++ = 'h'; | |
1545 | strcat(modeval, nick); | |
1546 | strcat(modeval, " "); | |
1547 | } | |
1548 | ||
212380e3 | 1549 | if(is_voiced(mscptr)) |
1550 | { | |
1551 | *mptr++ = 'v'; | |
1552 | strcat(modeval, nick); | |
1553 | } | |
1554 | ||
1555 | *mptr = '\0'; | |
1556 | ||
1557 | sendto_channel_local_butone(target_p, ALL_MEMBERS, chptr, ":%s!%s@%s JOIN :%s", | |
1558 | nick, user, host, chptr->chname); | |
1559 | if(*mode) | |
1560 | sendto_channel_local_butone(target_p, ALL_MEMBERS, chptr, | |
1561 | ":%s MODE %s +%s %s", | |
1562 | target_p->servptr->name, | |
1563 | chptr->chname, mode, modeval); | |
1564 | ||
1565 | *modeval = '\0'; | |
1566 | } | |
1567 | ||
1568 | if(MyClient(target_p) && changed_case) | |
1569 | sendto_one(target_p, ":%s!%s@%s NICK %s", | |
1570 | target_p->name, target_p->username, target_p->host, nick); | |
1571 | } | |
1572 | else if(changed_case) | |
1573 | { | |
1574 | sendto_common_channels_local(target_p, ":%s!%s@%s NICK :%s", | |
1575 | target_p->name, target_p->username, | |
1576 | target_p->host, nick); | |
1577 | } | |
1578 | ||
907468c4 VY |
1579 | rb_strlcpy(target_p->username, user, sizeof target_p->username); |
1580 | rb_strlcpy(target_p->host, host, sizeof target_p->host); | |
212380e3 | 1581 | |
1582 | if (changed) | |
1583 | add_history(target_p, 1); | |
1584 | ||
1585 | del_from_client_hash(target_p->name, target_p); | |
907468c4 | 1586 | rb_strlcpy(target_p->name, nick, NICKLEN); |
212380e3 | 1587 | add_to_client_hash(target_p->name, target_p); |
1588 | ||
1589 | if(changed) | |
1590 | { | |
1591 | monitor_signon(target_p); | |
1592 | del_all_accepts(target_p); | |
1593 | } | |
1594 | } |