]> jfr.im git - irc/rqf/shadowircd.git/blame - modules/m_whois.c
Allow /ojoin !#channel/%#channel, if admin/halfop are enabled.
[irc/rqf/shadowircd.git] / modules / m_whois.c
CommitLineData
212380e3 1/*
2 * ircd-ratbox: A slightly useful ircd.
3 * m_whois.c: Shows who a user is.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
22 * USA
23 *
f7eac53d 24 * $Id: m_whois.c 3536 2007-07-14 21:50:21Z jilles $
212380e3 25 */
26
27#include "stdinc.h"
212380e3 28#include "common.h"
29#include "client.h"
30#include "hash.h"
31#include "channel.h"
32#include "hash.h"
33#include "ircd.h"
34#include "numeric.h"
35#include "s_conf.h"
36#include "s_serv.h"
37#include "send.h"
13ae2f4b 38#include "match.h"
212380e3 39#include "s_conf.h"
d3455e2c 40#include "logger.h"
212380e3 41#include "msg.h"
42#include "parse.h"
43#include "modules.h"
44#include "hook.h"
45#include "s_newconf.h"
be2d3c11 46#include "s_user.h"
212380e3 47
48static void do_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]);
49static void single_whois(struct Client *source_p, struct Client *target_p, int operspy);
50
51static int m_whois(struct Client *, struct Client *, int, const char **);
52static int ms_whois(struct Client *, struct Client *, int, const char **);
53
54struct Message whois_msgtab = {
55 "WHOIS", 0, 0, 0, MFLG_SLOW,
56 {mg_unreg, {m_whois, 2}, {ms_whois, 2}, mg_ignore, mg_ignore, {m_whois, 2}}
57};
58
59int doing_whois_hook;
60int doing_whois_global_hook;
61
62mapi_clist_av1 whois_clist[] = { &whois_msgtab, NULL };
63mapi_hlist_av1 whois_hlist[] = {
64 { "doing_whois", &doing_whois_hook },
65 { "doing_whois_global", &doing_whois_global_hook },
66 { NULL, NULL }
67};
68
f7eac53d 69DECLARE_MODULE_AV1(whois, NULL, NULL, whois_clist, whois_hlist, NULL, "$Revision: 3536 $");
212380e3 70
71/*
72 * m_whois
212380e3 73 * parv[1] = nickname masklist
74 */
75static int
76m_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
77{
78 static time_t last_used = 0;
79
80 if(parc > 2)
81 {
82 if(EmptyString(parv[2]))
83 {
84 sendto_one(source_p, form_str(ERR_NONICKNAMEGIVEN),
85 me.name, source_p->name);
86 return 0;
87 }
88
89 if(!IsOper(source_p))
90 {
91 /* seeing as this is going across servers, we should limit it */
9f6bbe3c 92 if((last_used + ConfigFileEntry.pace_wait_simple) > rb_current_time())
212380e3 93 {
94 sendto_one(source_p, form_str(RPL_LOAD2HI),
95 me.name, source_p->name, "WHOIS");
96 sendto_one_numeric(source_p, RPL_ENDOFWHOIS,
f7eac53d 97 form_str(RPL_ENDOFWHOIS), parv[2]);
212380e3 98 return 0;
99 }
100 else
9f6bbe3c 101 last_used = rb_current_time();
212380e3 102 }
103
104 if(hunt_server(client_p, source_p, ":%s WHOIS %s :%s", 1, parc, parv) !=
105 HUNTED_ISME)
106 return 0;
107
108 parv[1] = parv[2];
109
110 }
111 do_whois(client_p, source_p, parc, parv);
112
113 return 0;
114}
115
116/*
117 * ms_whois
212380e3 118 * parv[1] = server to reply
119 * parv[2] = nickname to whois
120 */
121static int
122ms_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
123{
124 struct Client *target_p;
125
126 /* note: early versions of ratbox allowed users to issue a remote
127 * whois with a blank parv[2], so we cannot treat it as a protocol
128 * violation. --anfl
129 */
130 if(parc < 3 || EmptyString(parv[2]))
131 {
132 sendto_one(source_p, form_str(ERR_NONICKNAMEGIVEN),
133 me.name, source_p->name);
134 return 0;
135 }
136
137 /* check if parv[1] exists */
138 if((target_p = find_client(parv[1])) == NULL)
139 {
140 sendto_one_numeric(source_p, ERR_NOSUCHSERVER,
141 form_str(ERR_NOSUCHSERVER),
142 IsDigit(parv[1][0]) ? "*" : parv[1]);
143 return 0;
144 }
145
146 /* if parv[1] isnt my client, or me, someone else is supposed
147 * to be handling the request.. so send it to them
148 */
149 if(!MyClient(target_p) && !IsMe(target_p))
150 {
151 sendto_one(target_p, ":%s WHOIS %s :%s",
152 get_id(source_p, target_p),
153 get_id(target_p, target_p), parv[2]);
154 return 0;
155 }
156
157 /* ok, the target is either us, or a client on our server, so perform the whois
158 * but first, parv[1] == server to perform the whois on, parv[2] == person
159 * to whois, so make parv[1] = parv[2] so do_whois is ok -- fl_
160 */
161 parv[1] = parv[2];
162 do_whois(client_p, source_p, parc, parv);
163
164 return 0;
165}
166
167/* do_whois
168 *
169 * inputs - pointer to
170 * output -
171 * side effects -
172 */
173static void
174do_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
175{
176 struct Client *target_p;
177 char *nick;
178 char *p = NULL;
179 int operspy = 0;
180
181 nick = LOCAL_COPY(parv[1]);
182 if((p = strchr(nick, ',')))
183 *p = '\0';
184
185 if(IsOperSpy(source_p) && *nick == '!')
186 {
187 operspy = 1;
188 nick++;
189 }
190
42fa7846
WP
191 if(MyClient(source_p))
192 target_p = find_named_person(nick);
193 else
8db00894 194 target_p = find_person(nick);
212380e3 195
196 if(target_p != NULL)
197 {
198 if(operspy)
199 {
200 char buffer[BUFSIZE];
201
5b0a5279 202 rb_snprintf(buffer, sizeof(buffer), "%s!%s@%s %s",
212380e3 203 target_p->name, target_p->username,
c88cdb00 204 target_p->host, target_p->servptr->name);
212380e3 205 report_operspy(source_p, "WHOIS", buffer);
206 }
207
208 single_whois(source_p, target_p, operspy);
209 }
210 else
211 sendto_one_numeric(source_p, ERR_NOSUCHNICK,
212 form_str(ERR_NOSUCHNICK),
8a1e143f 213 nick);
212380e3 214
215 sendto_one_numeric(source_p, RPL_ENDOFWHOIS,
216 form_str(RPL_ENDOFWHOIS), parv[1]);
217 return;
218}
219
220/*
221 * single_whois()
222 *
223 * Inputs - source_p client to report to
224 * - target_p client to report on
225 * Output - if found return 1
226 * Side Effects - do a single whois on given client
227 * writing results to source_p
228 */
229static void
230single_whois(struct Client *source_p, struct Client *target_p, int operspy)
231{
232 char buf[BUFSIZE];
08d11e34 233 rb_dlink_node *ptr;
212380e3 234 struct membership *msptr;
235 struct Channel *chptr;
236 int cur_len = 0;
237 int mlen;
238 char *t;
239 int tlen;
240 hook_data_client hdata;
212380e3 241 int visible;
242 int extra_space = 0;
88b63e65
G
243 int i;
244 char *m;
837a020a 245 int showsecret = 0;
3e06a4c8 246 struct Metadata *md;
837a020a
G
247
248 if(ConfigFileEntry.secret_channels_in_whois && IsOperSpy(source_p))
249 showsecret = 1;
212380e3 250
212380e3 251 if(target_p->user == NULL)
252 {
253 s_assert(0);
254 return;
255 }
256
212380e3 257 sendto_one_numeric(source_p, RPL_WHOISUSER, form_str(RPL_WHOISUSER),
258 target_p->name, target_p->username,
259 target_p->host, target_p->info);
260
581fa5c4 261 cur_len = mlen = rb_sprintf(buf, form_str(RPL_WHOISCHANNELS),
212380e3 262 get_id(&me, source_p), get_id(source_p, source_p),
263 target_p->name);
264
265 /* Make sure it won't overflow when sending it to the client
266 * in full names; note that serverhiding may require more space
267 * for a different server name (not done here) -- jilles
268 */
269 if (!MyConnect(source_p))
270 {
271 extra_space = strlen(source_p->name) - 9;
272 if (extra_space < 0)
273 extra_space = 0;
274 extra_space += strlen(me.name) - 2; /* make sure >= 0 */
275 cur_len += extra_space;
276 }
277
278 t = buf + mlen;
279
04513cff 280 if (!IsService(target_p))
212380e3 281 {
08d11e34 282 RB_DLINK_FOREACH(ptr, target_p->user->channel.head)
04513cff 283 {
284 msptr = ptr->data;
285 chptr = msptr->chptr;
212380e3 286
04513cff 287 visible = ShowChannel(source_p, chptr);
212380e3 288
837a020a 289 if(visible || operspy || showsecret)
212380e3 290 {
04513cff 291 if((cur_len + strlen(chptr->chname) + 3) > (BUFSIZE - 5))
292 {
293 sendto_one(source_p, "%s", buf);
294 cur_len = mlen + extra_space;
295 t = buf + mlen;
296 }
297
581fa5c4 298 tlen = rb_sprintf(t, "%s%s%s ",
763e2baa 299 visible ? "" : "*",
04513cff 300 find_channel_status(msptr, 1),
301 chptr->chname);
302 t += tlen;
303 cur_len += tlen;
212380e3 304 }
212380e3 305 }
306 }
307
308 if(cur_len > mlen + extra_space)
309 sendto_one(source_p, "%s", buf);
310
311 sendto_one_numeric(source_p, RPL_WHOISSERVER, form_str(RPL_WHOISSERVER),
c88cdb00 312 target_p->name, target_p->servptr->name,
1f8b58e7 313 target_p->servptr->info);
212380e3 314
c387fc41 315 if(target_p->user->away)
212380e3 316 sendto_one_numeric(source_p, RPL_AWAY, form_str(RPL_AWAY),
c387fc41 317 target_p->name, target_p->user->away);
212380e3 318
319 if(IsOper(target_p))
320 {
32d464fe
G
321 if(md = user_metadata_find(target_p, "OPERSTRING"))
322 sendto_one_numeric(source_p, 313, "%s :%s", target_p->name, md->value);
323 else
324 sendto_one_numeric(source_p, RPL_WHOISOPERATOR, form_str(RPL_WHOISOPERATOR),
325 target_p->name,
326 IsService(target_p) ? ConfigFileEntry.servicestring :
327 (IsAdmin(target_p) ? GlobalSetOptions.adminstring :
328 GlobalSetOptions.operstring));
3e06a4c8
G
329 if(md = user_metadata_find(target_p, "SWHOIS"))
330 sendto_one_numeric(source_p, 320, "%s :%s", target_p->name, md->value);
212380e3 331 }
332
5da17c50
WP
333 if(IsSSLClient(target_p))
334 sendto_one_numeric(source_p, RPL_WHOISSECURE, form_str(RPL_WHOISSECURE),
335 target_p->name);
54656d76
JT
336 if((source_p == target_p || IsOper(source_p)) &&
337 target_p->certfp != NULL)
338 sendto_one_numeric(source_p, RPL_WHOISCERTFP,
339 form_str(RPL_WHOISCERTFP),
340 target_p->name, target_p->certfp);
5da17c50 341
930629c5
G
342 if(IsSetBot(target_p))
343 sendto_one_numeric(source_p, RPL_WHOISBOT,
344 form_str(RPL_WHOISBOT),
345 target_p->name);
6faf3f4d
G
346 if(IsOper(source_p))
347 {
348 m = buf;
349 *m++ = '+';
88b63e65 350
6faf3f4d
G
351 for (i = 0; i < 128; i++) /* >= 127 is extended ascii */
352 if (target_p->umodes & user_modes[i])
353 *m++ = (char) i;
354 *m = '\0';
88b63e65 355
6faf3f4d
G
356 sendto_one_numeric(source_p, RPL_WHOISMODES,
357 form_str(RPL_WHOISMODES),
358 target_p->name, buf);
359 }
88b63e65 360
212380e3 361 if(MyClient(target_p))
362 {
363 if (IsDynSpoof(target_p) && (IsOper(source_p) || source_p == target_p))
364 {
365 /* trick here: show a nonoper their own IP if
366 * dynamic spoofed but not if auth{} spoofed
367 * -- jilles */
368 ClearDynSpoof(target_p);
369 sendto_one_numeric(source_p, RPL_WHOISHOST,
370 form_str(RPL_WHOISHOST),
371 target_p->name, target_p->orighost,
372 show_ip(source_p, target_p) ? target_p->sockhost : "255.255.255.255");
373 SetDynSpoof(target_p);
374 }
375 else if(ConfigFileEntry.use_whois_actually && show_ip(source_p, target_p))
376 sendto_one_numeric(source_p, RPL_WHOISACTUALLY,
377 form_str(RPL_WHOISACTUALLY),
378 target_p->name, target_p->sockhost);
379
380 sendto_one_numeric(source_p, RPL_WHOISIDLE, form_str(RPL_WHOISIDLE),
381 target_p->name,
9f6bbe3c 382 rb_current_time() - target_p->localClient->last,
212380e3 383 target_p->localClient->firsttime);
384 }
385 else
386 {
387 if (IsDynSpoof(target_p) && (IsOper(source_p) || source_p == target_p))
388 {
389 ClearDynSpoof(target_p);
390 sendto_one_numeric(source_p, RPL_WHOISHOST,
391 form_str(RPL_WHOISHOST),
392 target_p->name, target_p->orighost,
393 show_ip(source_p, target_p) && !EmptyString(target_p->sockhost) && strcmp(target_p->sockhost, "0")? target_p->sockhost : "255.255.255.255");
394 SetDynSpoof(target_p);
395 }
396 else if(ConfigFileEntry.use_whois_actually && show_ip(source_p, target_p) &&
397 !EmptyString(target_p->sockhost) && strcmp(target_p->sockhost, "0"))
398 {
399 sendto_one_numeric(source_p, RPL_WHOISACTUALLY,
400 form_str(RPL_WHOISACTUALLY),
401 target_p->name, target_p->sockhost);
402
403 }
212380e3 404 }
405
406 hdata.client = source_p;
407 hdata.target = target_p;
408
409 /* doing_whois_hook must only be called for local clients,
410 * doing_whois_global_hook must only be called for local targets
411 */
412 /* it is important that these are called *before* RPL_ENDOFWHOIS is
413 * sent, services compatibility code depends on it. --anfl
414 */
415 if(MyClient(source_p))
416 call_hook(doing_whois_hook, &hdata);
417 else
418 call_hook(doing_whois_global_hook, &hdata);
419
420 return;
421}
422