]> jfr.im git - irc/rqf/shadowircd.git/blame - modules/m_whois.c
[svn] Merge old trunk r2817:
[irc/rqf/shadowircd.git] / modules / m_whois.c
CommitLineData
212380e3 1/*
2 * ircd-ratbox: A slightly useful ircd.
3 * m_whois.c: Shows who a user is.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
22 * USA
23 *
8a1e143f 24 * $Id: m_whois.c 3299 2007-03-28 14:54:10Z jilles $
212380e3 25 */
26
27#include "stdinc.h"
28#include "tools.h"
29#include "common.h"
30#include "client.h"
31#include "hash.h"
32#include "channel.h"
33#include "hash.h"
34#include "ircd.h"
35#include "numeric.h"
36#include "s_conf.h"
37#include "s_serv.h"
38#include "send.h"
39#include "irc_string.h"
40#include "sprintf_irc.h"
41#include "s_conf.h"
42#include "s_log.h"
43#include "msg.h"
44#include "parse.h"
45#include "modules.h"
46#include "hook.h"
47#include "s_newconf.h"
48
49static void do_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]);
50static void single_whois(struct Client *source_p, struct Client *target_p, int operspy);
51
52static int m_whois(struct Client *, struct Client *, int, const char **);
53static int ms_whois(struct Client *, struct Client *, int, const char **);
54
55struct Message whois_msgtab = {
56 "WHOIS", 0, 0, 0, MFLG_SLOW,
57 {mg_unreg, {m_whois, 2}, {ms_whois, 2}, mg_ignore, mg_ignore, {m_whois, 2}}
58};
59
60int doing_whois_hook;
61int doing_whois_global_hook;
62
63mapi_clist_av1 whois_clist[] = { &whois_msgtab, NULL };
64mapi_hlist_av1 whois_hlist[] = {
65 { "doing_whois", &doing_whois_hook },
66 { "doing_whois_global", &doing_whois_global_hook },
67 { NULL, NULL }
68};
69
8a1e143f 70DECLARE_MODULE_AV1(whois, NULL, NULL, whois_clist, whois_hlist, NULL, "$Revision: 3299 $");
212380e3 71
72/*
73 * m_whois
74 * parv[0] = sender prefix
75 * parv[1] = nickname masklist
76 */
77static int
78m_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
79{
80 static time_t last_used = 0;
81
82 if(parc > 2)
83 {
84 if(EmptyString(parv[2]))
85 {
86 sendto_one(source_p, form_str(ERR_NONICKNAMEGIVEN),
87 me.name, source_p->name);
88 return 0;
89 }
90
91 if(!IsOper(source_p))
92 {
93 /* seeing as this is going across servers, we should limit it */
94 if((last_used + ConfigFileEntry.pace_wait_simple) > CurrentTime)
95 {
96 sendto_one(source_p, form_str(RPL_LOAD2HI),
97 me.name, source_p->name, "WHOIS");
98 sendto_one_numeric(source_p, RPL_ENDOFWHOIS,
99 form_str(RPL_ENDOFWHOIS), parv[1]);
100 return 0;
101 }
102 else
103 last_used = CurrentTime;
104 }
105
106 if(hunt_server(client_p, source_p, ":%s WHOIS %s :%s", 1, parc, parv) !=
107 HUNTED_ISME)
108 return 0;
109
110 parv[1] = parv[2];
111
112 }
113 do_whois(client_p, source_p, parc, parv);
114
115 return 0;
116}
117
118/*
119 * ms_whois
120 * parv[0] = sender prefix
121 * parv[1] = server to reply
122 * parv[2] = nickname to whois
123 */
124static int
125ms_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
126{
127 struct Client *target_p;
128
129 /* note: early versions of ratbox allowed users to issue a remote
130 * whois with a blank parv[2], so we cannot treat it as a protocol
131 * violation. --anfl
132 */
133 if(parc < 3 || EmptyString(parv[2]))
134 {
135 sendto_one(source_p, form_str(ERR_NONICKNAMEGIVEN),
136 me.name, source_p->name);
137 return 0;
138 }
139
140 /* check if parv[1] exists */
141 if((target_p = find_client(parv[1])) == NULL)
142 {
143 sendto_one_numeric(source_p, ERR_NOSUCHSERVER,
144 form_str(ERR_NOSUCHSERVER),
145 IsDigit(parv[1][0]) ? "*" : parv[1]);
146 return 0;
147 }
148
149 /* if parv[1] isnt my client, or me, someone else is supposed
150 * to be handling the request.. so send it to them
151 */
152 if(!MyClient(target_p) && !IsMe(target_p))
153 {
154 sendto_one(target_p, ":%s WHOIS %s :%s",
155 get_id(source_p, target_p),
156 get_id(target_p, target_p), parv[2]);
157 return 0;
158 }
159
160 /* ok, the target is either us, or a client on our server, so perform the whois
161 * but first, parv[1] == server to perform the whois on, parv[2] == person
162 * to whois, so make parv[1] = parv[2] so do_whois is ok -- fl_
163 */
164 parv[1] = parv[2];
165 do_whois(client_p, source_p, parc, parv);
166
167 return 0;
168}
169
170/* do_whois
171 *
172 * inputs - pointer to
173 * output -
174 * side effects -
175 */
176static void
177do_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
178{
179 struct Client *target_p;
180 char *nick;
181 char *p = NULL;
182 int operspy = 0;
183
184 nick = LOCAL_COPY(parv[1]);
185 if((p = strchr(nick, ',')))
186 *p = '\0';
187
188 if(IsOperSpy(source_p) && *nick == '!')
189 {
190 operspy = 1;
191 nick++;
192 }
193
194 target_p = find_named_person(nick);
195
196 if(target_p != NULL)
197 {
198 if(operspy)
199 {
200 char buffer[BUFSIZE];
201
202 snprintf(buffer, sizeof(buffer), "%s!%s@%s %s",
203 target_p->name, target_p->username,
204 target_p->host, target_p->user->server);
205 report_operspy(source_p, "WHOIS", buffer);
206 }
207
208 single_whois(source_p, target_p, operspy);
209 }
210 else
211 sendto_one_numeric(source_p, ERR_NOSUCHNICK,
212 form_str(ERR_NOSUCHNICK),
8a1e143f 213 nick);
212380e3 214
215 sendto_one_numeric(source_p, RPL_ENDOFWHOIS,
216 form_str(RPL_ENDOFWHOIS), parv[1]);
217 return;
218}
219
220/*
221 * single_whois()
222 *
223 * Inputs - source_p client to report to
224 * - target_p client to report on
225 * Output - if found return 1
226 * Side Effects - do a single whois on given client
227 * writing results to source_p
228 */
229static void
230single_whois(struct Client *source_p, struct Client *target_p, int operspy)
231{
232 char buf[BUFSIZE];
233 dlink_node *ptr;
234 struct Client *a2client_p;
235 struct membership *msptr;
236 struct Channel *chptr;
237 int cur_len = 0;
238 int mlen;
239 char *t;
240 int tlen;
241 hook_data_client hdata;
242 char *name;
243 char quest[] = "?";
244 int visible;
245 int extra_space = 0;
246
247 if(target_p->name[0] == '\0')
248 name = quest;
249 else
250 name = target_p->name;
251
252 if(target_p->user == NULL)
253 {
254 s_assert(0);
255 return;
256 }
257
258 a2client_p = target_p->servptr;
259
260 sendto_one_numeric(source_p, RPL_WHOISUSER, form_str(RPL_WHOISUSER),
261 target_p->name, target_p->username,
262 target_p->host, target_p->info);
263
264 cur_len = mlen = ircsprintf(buf, form_str(RPL_WHOISCHANNELS),
265 get_id(&me, source_p), get_id(source_p, source_p),
266 target_p->name);
267
268 /* Make sure it won't overflow when sending it to the client
269 * in full names; note that serverhiding may require more space
270 * for a different server name (not done here) -- jilles
271 */
272 if (!MyConnect(source_p))
273 {
274 extra_space = strlen(source_p->name) - 9;
275 if (extra_space < 0)
276 extra_space = 0;
277 extra_space += strlen(me.name) - 2; /* make sure >= 0 */
278 cur_len += extra_space;
279 }
280
281 t = buf + mlen;
282
04513cff 283 if (!IsService(target_p))
212380e3 284 {
04513cff 285 DLINK_FOREACH(ptr, target_p->user->channel.head)
286 {
287 msptr = ptr->data;
288 chptr = msptr->chptr;
212380e3 289
04513cff 290 visible = ShowChannel(source_p, chptr);
212380e3 291
04513cff 292 if(visible || operspy)
212380e3 293 {
04513cff 294 if((cur_len + strlen(chptr->chname) + 3) > (BUFSIZE - 5))
295 {
296 sendto_one(source_p, "%s", buf);
297 cur_len = mlen + extra_space;
298 t = buf + mlen;
299 }
300
301 tlen = ircsprintf(t, "%s%s%s ",
302 visible ? "" : "!",
303 find_channel_status(msptr, 1),
304 chptr->chname);
305 t += tlen;
306 cur_len += tlen;
212380e3 307 }
212380e3 308 }
309 }
310
311 if(cur_len > mlen + extra_space)
312 sendto_one(source_p, "%s", buf);
313
314 sendto_one_numeric(source_p, RPL_WHOISSERVER, form_str(RPL_WHOISSERVER),
315 target_p->name, target_p->user->server,
316 a2client_p ? a2client_p->info : "*Not On This Net*");
317
318 if(target_p->user->away)
319 sendto_one_numeric(source_p, RPL_AWAY, form_str(RPL_AWAY),
320 target_p->name, target_p->user->away);
321
322 if(IsOper(target_p))
323 {
324 sendto_one_numeric(source_p, RPL_WHOISOPERATOR, form_str(RPL_WHOISOPERATOR),
325 target_p->name,
326 IsService(target_p) ? ConfigFileEntry.servicestring :
327 (IsAdmin(target_p) ? GlobalSetOptions.adminstring :
328 GlobalSetOptions.operstring));
329 }
330
331 if(MyClient(target_p))
332 {
333 if (IsDynSpoof(target_p) && (IsOper(source_p) || source_p == target_p))
334 {
335 /* trick here: show a nonoper their own IP if
336 * dynamic spoofed but not if auth{} spoofed
337 * -- jilles */
338 ClearDynSpoof(target_p);
339 sendto_one_numeric(source_p, RPL_WHOISHOST,
340 form_str(RPL_WHOISHOST),
341 target_p->name, target_p->orighost,
342 show_ip(source_p, target_p) ? target_p->sockhost : "255.255.255.255");
343 SetDynSpoof(target_p);
344 }
345 else if(ConfigFileEntry.use_whois_actually && show_ip(source_p, target_p))
346 sendto_one_numeric(source_p, RPL_WHOISACTUALLY,
347 form_str(RPL_WHOISACTUALLY),
348 target_p->name, target_p->sockhost);
349
350 sendto_one_numeric(source_p, RPL_WHOISIDLE, form_str(RPL_WHOISIDLE),
351 target_p->name,
352 CurrentTime - target_p->localClient->last,
353 target_p->localClient->firsttime);
354 }
355 else
356 {
357 if (IsDynSpoof(target_p) && (IsOper(source_p) || source_p == target_p))
358 {
359 ClearDynSpoof(target_p);
360 sendto_one_numeric(source_p, RPL_WHOISHOST,
361 form_str(RPL_WHOISHOST),
362 target_p->name, target_p->orighost,
363 show_ip(source_p, target_p) && !EmptyString(target_p->sockhost) && strcmp(target_p->sockhost, "0")? target_p->sockhost : "255.255.255.255");
364 SetDynSpoof(target_p);
365 }
366 else if(ConfigFileEntry.use_whois_actually && show_ip(source_p, target_p) &&
367 !EmptyString(target_p->sockhost) && strcmp(target_p->sockhost, "0"))
368 {
369 sendto_one_numeric(source_p, RPL_WHOISACTUALLY,
370 form_str(RPL_WHOISACTUALLY),
371 target_p->name, target_p->sockhost);
372
373 }
374
375 }
376
377 hdata.client = source_p;
378 hdata.target = target_p;
379
380 /* doing_whois_hook must only be called for local clients,
381 * doing_whois_global_hook must only be called for local targets
382 */
383 /* it is important that these are called *before* RPL_ENDOFWHOIS is
384 * sent, services compatibility code depends on it. --anfl
385 */
386 if(MyClient(source_p))
387 call_hook(doing_whois_hook, &hdata);
388 else
389 call_hook(doing_whois_global_hook, &hdata);
390
391 return;
392}
393