]> jfr.im git - irc/rqf/shadowircd.git/blame - modules/m_whois.c
.cvsignore files removed, SVN-Access replaced by Mercurial-Access
[irc/rqf/shadowircd.git] / modules / m_whois.c
CommitLineData
212380e3 1/*
2 * ircd-ratbox: A slightly useful ircd.
3 * m_whois.c: Shows who a user is.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
22 * USA
23 *
f7eac53d 24 * $Id: m_whois.c 3536 2007-07-14 21:50:21Z jilles $
212380e3 25 */
26
27#include "stdinc.h"
212380e3 28#include "common.h"
29#include "client.h"
30#include "hash.h"
31#include "channel.h"
32#include "hash.h"
33#include "ircd.h"
34#include "numeric.h"
35#include "s_conf.h"
36#include "s_serv.h"
37#include "send.h"
38#include "irc_string.h"
39#include "sprintf_irc.h"
40#include "s_conf.h"
d3455e2c 41#include "logger.h"
212380e3 42#include "msg.h"
43#include "parse.h"
44#include "modules.h"
45#include "hook.h"
46#include "s_newconf.h"
47
48static void do_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]);
49static void single_whois(struct Client *source_p, struct Client *target_p, int operspy);
50
51static int m_whois(struct Client *, struct Client *, int, const char **);
52static int ms_whois(struct Client *, struct Client *, int, const char **);
53
54struct Message whois_msgtab = {
55 "WHOIS", 0, 0, 0, MFLG_SLOW,
56 {mg_unreg, {m_whois, 2}, {ms_whois, 2}, mg_ignore, mg_ignore, {m_whois, 2}}
57};
58
59int doing_whois_hook;
60int doing_whois_global_hook;
61
62mapi_clist_av1 whois_clist[] = { &whois_msgtab, NULL };
63mapi_hlist_av1 whois_hlist[] = {
64 { "doing_whois", &doing_whois_hook },
65 { "doing_whois_global", &doing_whois_global_hook },
66 { NULL, NULL }
67};
68
f7eac53d 69DECLARE_MODULE_AV1(whois, NULL, NULL, whois_clist, whois_hlist, NULL, "$Revision: 3536 $");
212380e3 70
71/*
72 * m_whois
73 * parv[0] = sender prefix
74 * parv[1] = nickname masklist
75 */
76static int
77m_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
78{
79 static time_t last_used = 0;
80
81 if(parc > 2)
82 {
83 if(EmptyString(parv[2]))
84 {
85 sendto_one(source_p, form_str(ERR_NONICKNAMEGIVEN),
86 me.name, source_p->name);
87 return 0;
88 }
89
90 if(!IsOper(source_p))
91 {
92 /* seeing as this is going across servers, we should limit it */
9f6bbe3c 93 if((last_used + ConfigFileEntry.pace_wait_simple) > rb_current_time())
212380e3 94 {
95 sendto_one(source_p, form_str(RPL_LOAD2HI),
96 me.name, source_p->name, "WHOIS");
97 sendto_one_numeric(source_p, RPL_ENDOFWHOIS,
f7eac53d 98 form_str(RPL_ENDOFWHOIS), parv[2]);
212380e3 99 return 0;
100 }
101 else
9f6bbe3c 102 last_used = rb_current_time();
212380e3 103 }
104
105 if(hunt_server(client_p, source_p, ":%s WHOIS %s :%s", 1, parc, parv) !=
106 HUNTED_ISME)
107 return 0;
108
109 parv[1] = parv[2];
110
111 }
112 do_whois(client_p, source_p, parc, parv);
113
114 return 0;
115}
116
117/*
118 * ms_whois
119 * parv[0] = sender prefix
120 * parv[1] = server to reply
121 * parv[2] = nickname to whois
122 */
123static int
124ms_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
125{
126 struct Client *target_p;
127
128 /* note: early versions of ratbox allowed users to issue a remote
129 * whois with a blank parv[2], so we cannot treat it as a protocol
130 * violation. --anfl
131 */
132 if(parc < 3 || EmptyString(parv[2]))
133 {
134 sendto_one(source_p, form_str(ERR_NONICKNAMEGIVEN),
135 me.name, source_p->name);
136 return 0;
137 }
138
139 /* check if parv[1] exists */
140 if((target_p = find_client(parv[1])) == NULL)
141 {
142 sendto_one_numeric(source_p, ERR_NOSUCHSERVER,
143 form_str(ERR_NOSUCHSERVER),
144 IsDigit(parv[1][0]) ? "*" : parv[1]);
145 return 0;
146 }
147
148 /* if parv[1] isnt my client, or me, someone else is supposed
149 * to be handling the request.. so send it to them
150 */
151 if(!MyClient(target_p) && !IsMe(target_p))
152 {
153 sendto_one(target_p, ":%s WHOIS %s :%s",
154 get_id(source_p, target_p),
155 get_id(target_p, target_p), parv[2]);
156 return 0;
157 }
158
159 /* ok, the target is either us, or a client on our server, so perform the whois
160 * but first, parv[1] == server to perform the whois on, parv[2] == person
161 * to whois, so make parv[1] = parv[2] so do_whois is ok -- fl_
162 */
163 parv[1] = parv[2];
164 do_whois(client_p, source_p, parc, parv);
165
166 return 0;
167}
168
169/* do_whois
170 *
171 * inputs - pointer to
172 * output -
173 * side effects -
174 */
175static void
176do_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
177{
178 struct Client *target_p;
179 char *nick;
180 char *p = NULL;
181 int operspy = 0;
182
183 nick = LOCAL_COPY(parv[1]);
184 if((p = strchr(nick, ',')))
185 *p = '\0';
186
187 if(IsOperSpy(source_p) && *nick == '!')
188 {
189 operspy = 1;
190 nick++;
191 }
192
42fa7846
WP
193 if(MyClient(source_p))
194 target_p = find_named_person(nick);
195 else
8db00894 196 target_p = find_person(nick);
212380e3 197
198 if(target_p != NULL)
199 {
200 if(operspy)
201 {
202 char buffer[BUFSIZE];
203
204 snprintf(buffer, sizeof(buffer), "%s!%s@%s %s",
205 target_p->name, target_p->username,
c88cdb00 206 target_p->host, target_p->servptr->name);
212380e3 207 report_operspy(source_p, "WHOIS", buffer);
208 }
209
210 single_whois(source_p, target_p, operspy);
211 }
212 else
213 sendto_one_numeric(source_p, ERR_NOSUCHNICK,
214 form_str(ERR_NOSUCHNICK),
8a1e143f 215 nick);
212380e3 216
217 sendto_one_numeric(source_p, RPL_ENDOFWHOIS,
218 form_str(RPL_ENDOFWHOIS), parv[1]);
219 return;
220}
221
222/*
223 * single_whois()
224 *
225 * Inputs - source_p client to report to
226 * - target_p client to report on
227 * Output - if found return 1
228 * Side Effects - do a single whois on given client
229 * writing results to source_p
230 */
231static void
232single_whois(struct Client *source_p, struct Client *target_p, int operspy)
233{
234 char buf[BUFSIZE];
08d11e34 235 rb_dlink_node *ptr;
212380e3 236 struct membership *msptr;
237 struct Channel *chptr;
238 int cur_len = 0;
239 int mlen;
240 char *t;
241 int tlen;
242 hook_data_client hdata;
243 char *name;
244 char quest[] = "?";
245 int visible;
246 int extra_space = 0;
247
248 if(target_p->name[0] == '\0')
249 name = quest;
250 else
251 name = target_p->name;
252
253 if(target_p->user == NULL)
254 {
255 s_assert(0);
256 return;
257 }
258
212380e3 259 sendto_one_numeric(source_p, RPL_WHOISUSER, form_str(RPL_WHOISUSER),
260 target_p->name, target_p->username,
261 target_p->host, target_p->info);
262
581fa5c4 263 cur_len = mlen = rb_sprintf(buf, form_str(RPL_WHOISCHANNELS),
212380e3 264 get_id(&me, source_p), get_id(source_p, source_p),
265 target_p->name);
266
267 /* Make sure it won't overflow when sending it to the client
268 * in full names; note that serverhiding may require more space
269 * for a different server name (not done here) -- jilles
270 */
271 if (!MyConnect(source_p))
272 {
273 extra_space = strlen(source_p->name) - 9;
274 if (extra_space < 0)
275 extra_space = 0;
276 extra_space += strlen(me.name) - 2; /* make sure >= 0 */
277 cur_len += extra_space;
278 }
279
280 t = buf + mlen;
281
04513cff 282 if (!IsService(target_p))
212380e3 283 {
08d11e34 284 RB_DLINK_FOREACH(ptr, target_p->user->channel.head)
04513cff 285 {
286 msptr = ptr->data;
287 chptr = msptr->chptr;
212380e3 288
04513cff 289 visible = ShowChannel(source_p, chptr);
212380e3 290
04513cff 291 if(visible || operspy)
212380e3 292 {
04513cff 293 if((cur_len + strlen(chptr->chname) + 3) > (BUFSIZE - 5))
294 {
295 sendto_one(source_p, "%s", buf);
296 cur_len = mlen + extra_space;
297 t = buf + mlen;
298 }
299
581fa5c4 300 tlen = rb_sprintf(t, "%s%s%s ",
04513cff 301 visible ? "" : "!",
302 find_channel_status(msptr, 1),
303 chptr->chname);
304 t += tlen;
305 cur_len += tlen;
212380e3 306 }
212380e3 307 }
308 }
309
310 if(cur_len > mlen + extra_space)
311 sendto_one(source_p, "%s", buf);
312
313 sendto_one_numeric(source_p, RPL_WHOISSERVER, form_str(RPL_WHOISSERVER),
c88cdb00 314 target_p->name, target_p->servptr->name,
1f8b58e7 315 target_p->servptr->info);
212380e3 316
317 if(target_p->user->away)
318 sendto_one_numeric(source_p, RPL_AWAY, form_str(RPL_AWAY),
319 target_p->name, target_p->user->away);
320
321 if(IsOper(target_p))
322 {
323 sendto_one_numeric(source_p, RPL_WHOISOPERATOR, form_str(RPL_WHOISOPERATOR),
324 target_p->name,
325 IsService(target_p) ? ConfigFileEntry.servicestring :
326 (IsAdmin(target_p) ? GlobalSetOptions.adminstring :
327 GlobalSetOptions.operstring));
328 }
329
5da17c50
WP
330 if(IsSSLClient(target_p))
331 sendto_one_numeric(source_p, RPL_WHOISSECURE, form_str(RPL_WHOISSECURE),
332 target_p->name);
333
212380e3 334 if(MyClient(target_p))
335 {
336 if (IsDynSpoof(target_p) && (IsOper(source_p) || source_p == target_p))
337 {
338 /* trick here: show a nonoper their own IP if
339 * dynamic spoofed but not if auth{} spoofed
340 * -- jilles */
341 ClearDynSpoof(target_p);
342 sendto_one_numeric(source_p, RPL_WHOISHOST,
343 form_str(RPL_WHOISHOST),
344 target_p->name, target_p->orighost,
345 show_ip(source_p, target_p) ? target_p->sockhost : "255.255.255.255");
346 SetDynSpoof(target_p);
347 }
348 else if(ConfigFileEntry.use_whois_actually && show_ip(source_p, target_p))
349 sendto_one_numeric(source_p, RPL_WHOISACTUALLY,
350 form_str(RPL_WHOISACTUALLY),
351 target_p->name, target_p->sockhost);
352
353 sendto_one_numeric(source_p, RPL_WHOISIDLE, form_str(RPL_WHOISIDLE),
354 target_p->name,
9f6bbe3c 355 rb_current_time() - target_p->localClient->last,
212380e3 356 target_p->localClient->firsttime);
357 }
358 else
359 {
360 if (IsDynSpoof(target_p) && (IsOper(source_p) || source_p == target_p))
361 {
362 ClearDynSpoof(target_p);
363 sendto_one_numeric(source_p, RPL_WHOISHOST,
364 form_str(RPL_WHOISHOST),
365 target_p->name, target_p->orighost,
366 show_ip(source_p, target_p) && !EmptyString(target_p->sockhost) && strcmp(target_p->sockhost, "0")? target_p->sockhost : "255.255.255.255");
367 SetDynSpoof(target_p);
368 }
369 else if(ConfigFileEntry.use_whois_actually && show_ip(source_p, target_p) &&
370 !EmptyString(target_p->sockhost) && strcmp(target_p->sockhost, "0"))
371 {
372 sendto_one_numeric(source_p, RPL_WHOISACTUALLY,
373 form_str(RPL_WHOISACTUALLY),
374 target_p->name, target_p->sockhost);
375
376 }
212380e3 377 }
378
379 hdata.client = source_p;
380 hdata.target = target_p;
381
382 /* doing_whois_hook must only be called for local clients,
383 * doing_whois_global_hook must only be called for local targets
384 */
385 /* it is important that these are called *before* RPL_ENDOFWHOIS is
386 * sent, services compatibility code depends on it. --anfl
387 */
388 if(MyClient(source_p))
389 call_hook(doing_whois_hook, &hdata);
390 else
391 call_hook(doing_whois_global_hook, &hdata);
392
393 return;
394}
395