]> jfr.im git - irc/rqf/shadowircd.git/blob - modules/m_whois.c
Automated merge with ssh://hg.atheme.org//hg/charybdis
[irc/rqf/shadowircd.git] / modules / m_whois.c
1 /*
2 * ircd-ratbox: A slightly useful ircd.
3 * m_whois.c: Shows who a user is.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
22 * USA
23 *
24 * $Id: m_whois.c 3536 2007-07-14 21:50:21Z jilles $
25 */
26
27 #include "stdinc.h"
28 #include "common.h"
29 #include "client.h"
30 #include "hash.h"
31 #include "channel.h"
32 #include "hash.h"
33 #include "ircd.h"
34 #include "numeric.h"
35 #include "s_conf.h"
36 #include "s_serv.h"
37 #include "send.h"
38 #include "match.h"
39 #include "s_conf.h"
40 #include "logger.h"
41 #include "msg.h"
42 #include "parse.h"
43 #include "modules.h"
44 #include "hook.h"
45 #include "s_newconf.h"
46
47 static void do_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]);
48 static void single_whois(struct Client *source_p, struct Client *target_p, int operspy);
49
50 static int m_whois(struct Client *, struct Client *, int, const char **);
51 static int ms_whois(struct Client *, struct Client *, int, const char **);
52
53 struct Message whois_msgtab = {
54 "WHOIS", 0, 0, 0, MFLG_SLOW,
55 {mg_unreg, {m_whois, 2}, {ms_whois, 2}, mg_ignore, mg_ignore, {m_whois, 2}}
56 };
57
58 int doing_whois_hook;
59 int doing_whois_global_hook;
60
61 mapi_clist_av1 whois_clist[] = { &whois_msgtab, NULL };
62 mapi_hlist_av1 whois_hlist[] = {
63 { "doing_whois", &doing_whois_hook },
64 { "doing_whois_global", &doing_whois_global_hook },
65 { NULL, NULL }
66 };
67
68 DECLARE_MODULE_AV1(whois, NULL, NULL, whois_clist, whois_hlist, NULL, "$Revision: 3536 $");
69
70 /*
71 * m_whois
72 * parv[0] = sender prefix
73 * parv[1] = nickname masklist
74 */
75 static int
76 m_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
77 {
78 static time_t last_used = 0;
79
80 if(parc > 2)
81 {
82 if(EmptyString(parv[2]))
83 {
84 sendto_one(source_p, form_str(ERR_NONICKNAMEGIVEN),
85 me.name, source_p->name);
86 return 0;
87 }
88
89 if(!IsOper(source_p))
90 {
91 /* seeing as this is going across servers, we should limit it */
92 if((last_used + ConfigFileEntry.pace_wait_simple) > rb_current_time())
93 {
94 sendto_one(source_p, form_str(RPL_LOAD2HI),
95 me.name, source_p->name, "WHOIS");
96 sendto_one_numeric(source_p, RPL_ENDOFWHOIS,
97 form_str(RPL_ENDOFWHOIS), parv[2]);
98 return 0;
99 }
100 else
101 last_used = rb_current_time();
102 }
103
104 if(hunt_server(client_p, source_p, ":%s WHOIS %s :%s", 1, parc, parv) !=
105 HUNTED_ISME)
106 return 0;
107
108 parv[1] = parv[2];
109
110 }
111 do_whois(client_p, source_p, parc, parv);
112
113 return 0;
114 }
115
116 /*
117 * ms_whois
118 * parv[0] = sender prefix
119 * parv[1] = server to reply
120 * parv[2] = nickname to whois
121 */
122 static int
123 ms_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
124 {
125 struct Client *target_p;
126
127 /* note: early versions of ratbox allowed users to issue a remote
128 * whois with a blank parv[2], so we cannot treat it as a protocol
129 * violation. --anfl
130 */
131 if(parc < 3 || EmptyString(parv[2]))
132 {
133 sendto_one(source_p, form_str(ERR_NONICKNAMEGIVEN),
134 me.name, source_p->name);
135 return 0;
136 }
137
138 /* check if parv[1] exists */
139 if((target_p = find_client(parv[1])) == NULL)
140 {
141 sendto_one_numeric(source_p, ERR_NOSUCHSERVER,
142 form_str(ERR_NOSUCHSERVER),
143 IsDigit(parv[1][0]) ? "*" : parv[1]);
144 return 0;
145 }
146
147 /* if parv[1] isnt my client, or me, someone else is supposed
148 * to be handling the request.. so send it to them
149 */
150 if(!MyClient(target_p) && !IsMe(target_p))
151 {
152 sendto_one(target_p, ":%s WHOIS %s :%s",
153 get_id(source_p, target_p),
154 get_id(target_p, target_p), parv[2]);
155 return 0;
156 }
157
158 /* ok, the target is either us, or a client on our server, so perform the whois
159 * but first, parv[1] == server to perform the whois on, parv[2] == person
160 * to whois, so make parv[1] = parv[2] so do_whois is ok -- fl_
161 */
162 parv[1] = parv[2];
163 do_whois(client_p, source_p, parc, parv);
164
165 return 0;
166 }
167
168 /* do_whois
169 *
170 * inputs - pointer to
171 * output -
172 * side effects -
173 */
174 static void
175 do_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
176 {
177 struct Client *target_p;
178 char *nick;
179 char *p = NULL;
180 int operspy = 0;
181
182 nick = LOCAL_COPY(parv[1]);
183 if((p = strchr(nick, ',')))
184 *p = '\0';
185
186 if(IsOperSpy(source_p) && *nick == '!')
187 {
188 operspy = 1;
189 nick++;
190 }
191
192 if(MyClient(source_p))
193 target_p = find_named_person(nick);
194 else
195 target_p = find_person(nick);
196
197 if(target_p != NULL)
198 {
199 if(operspy)
200 {
201 char buffer[BUFSIZE];
202
203 snprintf(buffer, sizeof(buffer), "%s!%s@%s %s",
204 target_p->name, target_p->username,
205 target_p->host, target_p->servptr->name);
206 report_operspy(source_p, "WHOIS", buffer);
207 }
208
209 single_whois(source_p, target_p, operspy);
210 }
211 else
212 sendto_one_numeric(source_p, ERR_NOSUCHNICK,
213 form_str(ERR_NOSUCHNICK),
214 nick);
215
216 sendto_one_numeric(source_p, RPL_ENDOFWHOIS,
217 form_str(RPL_ENDOFWHOIS), parv[1]);
218 return;
219 }
220
221 /*
222 * single_whois()
223 *
224 * Inputs - source_p client to report to
225 * - target_p client to report on
226 * Output - if found return 1
227 * Side Effects - do a single whois on given client
228 * writing results to source_p
229 */
230 static void
231 single_whois(struct Client *source_p, struct Client *target_p, int operspy)
232 {
233 char buf[BUFSIZE];
234 rb_dlink_node *ptr;
235 struct membership *msptr;
236 struct Channel *chptr;
237 int cur_len = 0;
238 int mlen;
239 char *t;
240 int tlen;
241 hook_data_client hdata;
242 int visible;
243 int extra_space = 0;
244
245 if(target_p->user == NULL)
246 {
247 s_assert(0);
248 return;
249 }
250
251 sendto_one_numeric(source_p, RPL_WHOISUSER, form_str(RPL_WHOISUSER),
252 target_p->name, target_p->username,
253 target_p->host, target_p->info);
254
255 cur_len = mlen = rb_sprintf(buf, form_str(RPL_WHOISCHANNELS),
256 get_id(&me, source_p), get_id(source_p, source_p),
257 target_p->name);
258
259 /* Make sure it won't overflow when sending it to the client
260 * in full names; note that serverhiding may require more space
261 * for a different server name (not done here) -- jilles
262 */
263 if (!MyConnect(source_p))
264 {
265 extra_space = strlen(source_p->name) - 9;
266 if (extra_space < 0)
267 extra_space = 0;
268 extra_space += strlen(me.name) - 2; /* make sure >= 0 */
269 cur_len += extra_space;
270 }
271
272 t = buf + mlen;
273
274 if (!IsService(target_p))
275 {
276 RB_DLINK_FOREACH(ptr, target_p->user->channel.head)
277 {
278 msptr = ptr->data;
279 chptr = msptr->chptr;
280
281 visible = ShowChannel(source_p, chptr);
282
283 if(visible || operspy)
284 {
285 if((cur_len + strlen(chptr->chname) + 3) > (BUFSIZE - 5))
286 {
287 sendto_one(source_p, "%s", buf);
288 cur_len = mlen + extra_space;
289 t = buf + mlen;
290 }
291
292 tlen = rb_sprintf(t, "%s%s%s ",
293 visible ? "" : "!",
294 find_channel_status(msptr, 1),
295 chptr->chname);
296 t += tlen;
297 cur_len += tlen;
298 }
299 }
300 }
301
302 if(cur_len > mlen + extra_space)
303 sendto_one(source_p, "%s", buf);
304
305 sendto_one_numeric(source_p, RPL_WHOISSERVER, form_str(RPL_WHOISSERVER),
306 target_p->name, target_p->servptr->name,
307 target_p->servptr->info);
308
309 if(target_p->user->away)
310 sendto_one_numeric(source_p, RPL_AWAY, form_str(RPL_AWAY),
311 target_p->name, target_p->user->away);
312
313 if(IsOper(target_p))
314 {
315 sendto_one_numeric(source_p, RPL_WHOISOPERATOR, form_str(RPL_WHOISOPERATOR),
316 target_p->name,
317 IsService(target_p) ? ConfigFileEntry.servicestring :
318 (IsAdmin(target_p) ? GlobalSetOptions.adminstring :
319 GlobalSetOptions.operstring));
320 }
321
322 if(IsSSLClient(target_p))
323 sendto_one_numeric(source_p, RPL_WHOISSECURE, form_str(RPL_WHOISSECURE),
324 target_p->name);
325
326 if(MyClient(target_p))
327 {
328 if (IsDynSpoof(target_p) && (IsOper(source_p) || source_p == target_p))
329 {
330 /* trick here: show a nonoper their own IP if
331 * dynamic spoofed but not if auth{} spoofed
332 * -- jilles */
333 ClearDynSpoof(target_p);
334 sendto_one_numeric(source_p, RPL_WHOISHOST,
335 form_str(RPL_WHOISHOST),
336 target_p->name, target_p->orighost,
337 show_ip(source_p, target_p) ? target_p->sockhost : "255.255.255.255");
338 SetDynSpoof(target_p);
339 }
340 else if(ConfigFileEntry.use_whois_actually && show_ip(source_p, target_p))
341 sendto_one_numeric(source_p, RPL_WHOISACTUALLY,
342 form_str(RPL_WHOISACTUALLY),
343 target_p->name, target_p->sockhost);
344
345 sendto_one_numeric(source_p, RPL_WHOISIDLE, form_str(RPL_WHOISIDLE),
346 target_p->name,
347 rb_current_time() - target_p->localClient->last,
348 target_p->localClient->firsttime);
349 }
350 else
351 {
352 if (IsDynSpoof(target_p) && (IsOper(source_p) || source_p == target_p))
353 {
354 ClearDynSpoof(target_p);
355 sendto_one_numeric(source_p, RPL_WHOISHOST,
356 form_str(RPL_WHOISHOST),
357 target_p->name, target_p->orighost,
358 show_ip(source_p, target_p) && !EmptyString(target_p->sockhost) && strcmp(target_p->sockhost, "0")? target_p->sockhost : "255.255.255.255");
359 SetDynSpoof(target_p);
360 }
361 else if(ConfigFileEntry.use_whois_actually && show_ip(source_p, target_p) &&
362 !EmptyString(target_p->sockhost) && strcmp(target_p->sockhost, "0"))
363 {
364 sendto_one_numeric(source_p, RPL_WHOISACTUALLY,
365 form_str(RPL_WHOISACTUALLY),
366 target_p->name, target_p->sockhost);
367
368 }
369 }
370
371 hdata.client = source_p;
372 hdata.target = target_p;
373
374 /* doing_whois_hook must only be called for local clients,
375 * doing_whois_global_hook must only be called for local targets
376 */
377 /* it is important that these are called *before* RPL_ENDOFWHOIS is
378 * sent, services compatibility code depends on it. --anfl
379 */
380 if(MyClient(source_p))
381 call_hook(doing_whois_hook, &hdata);
382 else
383 call_hook(doing_whois_global_hook, &hdata);
384
385 return;
386 }
387