]> jfr.im git - irc/rqf/shadowircd.git/blobdiff - src/s_serv.c
Clarify no_oper_flood option in the reference.conf
[irc/rqf/shadowircd.git] / src / s_serv.c
index 069fac4f131ee85cde3dadebf5656783fd1607ff..2569d562e80bbb501e05281765695c7eddece0ce 100644 (file)
 #include "msg.h"
 #include "reject.h"
 #include "sslproc.h"
+#include "irc_dictionary.h"
 
 #ifndef INADDR_NONE
 #define INADDR_NONE ((unsigned int) 0xffffffff)
 #endif
 
-#ifndef HAVE_SOCKETPAIR
-static int inet_socketpair(int d, int type, int protocol, int sv[2]);
-#endif
-
 int MaxConnectionCount = 1;
 int MaxClientCount = 1;
 int refresh_user_links = 0;
@@ -91,6 +88,8 @@ struct Capability captab[] = {
        { "RSFNC",      CAP_RSFNC },
        { "SAVE",       CAP_SAVE },
        { "EUID",       CAP_EUID },
+       { "EOPMOD",     CAP_EOPMOD },
+       { "BAN",        CAP_BAN },
        {0, 0}
 };
 
@@ -156,41 +155,23 @@ hunt_server(struct Client *client_p, struct Client *source_p,
         * Again, if there are no wild cards involved in the server
         * name, use the hash lookup
         */
-       if(!target_p)
+       if(!target_p && wilds)
        {
-               if(!wilds)
-               {
-                       if(MyClient(source_p) || !IsDigit(parv[server][0]))
-                               sendto_one_numeric(source_p, ERR_NOSUCHSERVER,
-                                                  form_str(ERR_NOSUCHSERVER),
-                                                  parv[server]);
-                       return (HUNTED_NOSUCH);
-               }
-               else
+               RB_DLINK_FOREACH(ptr, global_client_list.head)
                {
-                       target_p = NULL;
-
-                       RB_DLINK_FOREACH(ptr, global_client_list.head)
+                       if(match(new, ((struct Client *) (ptr->data))->name))
                        {
-                               if(match(new, ((struct Client *) (ptr->data))->name))
-                               {
-                                       target_p = ptr->data;
-                                       break;
-                               }
+                               target_p = ptr->data;
+                               break;
                        }
                }
        }
 
+       if(target_p && !IsRegistered(target_p))
+               target_p = NULL;
+
        if(target_p)
        {
-               if(!IsRegistered(target_p))
-               {
-                       sendto_one_numeric(source_p, ERR_NOSUCHSERVER,
-                                          form_str(ERR_NOSUCHSERVER),
-                                          parv[server]);
-                       return HUNTED_NOSUCH;
-               }
-
                if(IsMe(target_p) || MyClient(target_p))
                        return HUNTED_ISME;
 
@@ -412,6 +393,67 @@ send_capabilities(struct Client *client_p, int cap_can_send)
        sendto_one(client_p, "CAPAB :%s", msgbuf);
 }
 
+static void
+burst_ban(struct Client *client_p)
+{
+       rb_dlink_node *ptr;
+       struct ConfItem *aconf;
+       const char *type, *oper;
+       /* +5 for !,@,{,} and null */
+       char operbuf[NICKLEN + USERLEN + HOSTLEN + HOSTLEN + 5];
+       char *p;
+       size_t melen;
+
+       melen = strlen(me.name);
+       RB_DLINK_FOREACH(ptr, prop_bans.head)
+       {
+               aconf = ptr->data;
+
+               /* Skip expired stuff. */
+               if(aconf->lifetime < rb_current_time())
+                       continue;
+               switch(aconf->status & ~CONF_ILLEGAL)
+               {
+                       case CONF_KILL: type = "K"; break;
+                       case CONF_DLINE: type = "D"; break;
+                       case CONF_XLINE: type = "X"; break;
+                       case CONF_RESV_NICK: type = "R"; break;
+                       case CONF_RESV_CHANNEL: type = "R"; break;
+                       default:
+                               continue;
+               }
+               oper = aconf->info.oper;
+               if(aconf->flags & CONF_FLAGS_MYOPER)
+               {
+                       /* Our operator{} names may not be meaningful
+                        * to other servers, so rewrite to our server
+                        * name.
+                        */
+                       rb_strlcpy(operbuf, aconf->info.oper, sizeof buf);
+                       p = strrchr(operbuf, '{');
+                       if (p != NULL &&
+                                       operbuf + sizeof operbuf - p > (ptrdiff_t)(melen + 2))
+                       {
+                               memcpy(p + 1, me.name, melen);
+                               p[melen + 1] = '}';
+                               p[melen + 2] = '\0';
+                               oper = operbuf;
+                       }
+               }
+               sendto_one(client_p, ":%s BAN %s %s %s %lu %d %d %s :%s%s%s",
+                               me.id,
+                               type,
+                               aconf->user ? aconf->user : "*", aconf->host,
+                               (unsigned long)aconf->created,
+                               (int)(aconf->hold - aconf->created),
+                               (int)(aconf->lifetime - aconf->created),
+                               oper,
+                               aconf->passwd,
+                               aconf->spasswd ? "|" : "",
+                               aconf->spasswd ? aconf->spasswd : "");
+       }
+}
+
 /* burst_modes_TS6()
  *
  * input       - client to burst to, channel name, list to burst, mode flag
@@ -490,6 +532,8 @@ burst_TS6(struct Client *client_p)
        char *t;
        int tlen, mlen;
        int cur_len = 0;
+       struct Metadata *md;
+       struct DictionaryIter iter;
 
        hclientinfo.client = hchaninfo.client = client_p;
 
@@ -527,6 +571,10 @@ burst_TS6(struct Client *client_p)
                                   IsIPSpoof(target_p) ? "0" : target_p->sockhost,
                                   target_p->id, target_p->info);
 
+               if(!EmptyString(target_p->certfp))
+                       sendto_one(client_p, ":%s ENCAP * CERTFP :%s",
+                                       use_id(target_p), target_p->certfp);
+
                if(!IsCapable(client_p, CAP_EUID))
                {
                        if(IsDynSpoof(target_p))
@@ -537,6 +585,12 @@ burst_TS6(struct Client *client_p)
                                                use_id(target_p), target_p->user->suser);
                }
 
+               DICTIONARY_FOREACH(md, &iter, target_p->user->metadata)
+               {
+                       sendto_one(client_p, ":%s ENCAP * METADATA ADD %s %s :%s",
+                                  use_id(&me), use_id(target_p), md->name, md->value);
+               }
+
                if(ConfigFileEntry.burst_away && !EmptyString(target_p->user->away))
                        sendto_one(client_p, ":%s AWAY :%s",
                                   use_id(target_p),
@@ -564,8 +618,12 @@ burst_TS6(struct Client *client_p)
                        msptr = uptr->data;
 
                        tlen = strlen(use_id(msptr->client_p)) + 1;
+                       if(is_admin(msptr))
+                               tlen++;
                        if(is_chanop(msptr))
                                tlen++;
+                       if(is_halfop(msptr))
+                               tlen++;
                        if(is_voiced(msptr))
                                tlen++;
 
@@ -591,6 +649,14 @@ burst_TS6(struct Client *client_p)
                }
                sendto_one(client_p, "%s", buf);
 
+               DICTIONARY_FOREACH(md, &iter, chptr->metadata)
+               {
+                       /* don't bother bursting +J metadata */
+                       if(!(md->name[0] == 'K'))
+                               sendto_one(client_p, ":%s ENCAP * METADATA ADD %s %s :%s",
+                                          use_id(&me), chptr->chname, md->name, md->value);
+               }
+
                if(rb_dlink_list_length(&chptr->banlist) > 0)
                        burst_modes_TS6(client_p, chptr, &chptr->banlist, 'b');
 
@@ -877,6 +943,9 @@ server_estab(struct Client *client_p)
                                        target_p->serv->fullcaps);
        }
 
+       if(IsCapable(client_p, CAP_BAN))
+               burst_ban(client_p);
+
        burst_TS6(client_p);
 
        /* Always send a PING after connect burst is done */
@@ -1178,7 +1247,13 @@ serv_connect_ssl_callback(rb_fde_t *F, int status, void *data)
                serv_connect_callback(F, status, data);
                return;
        }
-       rb_socketpair(AF_UNIX, SOCK_STREAM, 0, &xF[0], &xF[1], "Outgoing ssld connection");
+       if(rb_socketpair(AF_UNIX, SOCK_STREAM, 0, &xF[0], &xF[1], "Outgoing ssld connection") == -1)
+       {
+                ilog_error("rb_socketpair failed for server");
+               serv_connect_callback(F, RB_ERROR, data);
+               return;
+               
+       }
        del_from_cli_fd_hash(client_p);
        client_p->localClient->F = xF[0];
        add_to_cli_fd_hash(client_p);
@@ -1270,9 +1345,6 @@ serv_connect_callback(rb_fde_t *F, int status, void *data)
        /* Next, send the initial handshake */
        SetHandshake(client_p);
 
-       /* kludge, if we're not using TS6, dont ever send
-        * ourselves as being TS6 capable.
-        */
        if(!EmptyString(server_p->spasswd))
        {
                sendto_one(client_p, "PASS %s TS %d :%s", 
@@ -1305,60 +1377,3 @@ serv_connect_callback(rb_fde_t *F, int status, void *data)
        /* If we get here, we're ok, so lets start reading some data */
        read_packet(F, client_p);
 }
-
-#ifndef HAVE_SOCKETPAIR
-static int
-inet_socketpair(int d, int type, int protocol, int sv[2])
-{
-       struct sockaddr_in addr1, addr2, addr3;
-       int addr3_len = sizeof(addr3);
-       int fd, rc;
-       int port_no = 20000;
-       
-       if(d != AF_INET || type != SOCK_STREAM || protocol)
-       {
-               errno = EAFNOSUPPORT;
-               return -1;
-       }
-       if(((sv[0] = socket(AF_INET, SOCK_STREAM, 0)) < 0) || ((sv[1] = socket(AF_INET, SOCK_STREAM, 0)) < 0))
-               return -1;
-       
-       addr1.sin_port = htons(port_no);
-       addr1.sin_family = AF_INET;
-       addr1.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
-       while ((rc = bind (sv[0], (struct sockaddr *) &addr1, sizeof (addr1))) < 0 && errno == EADDRINUSE)
-               addr1.sin_port = htons(++port_no);
-       
-       if(rc < 0)
-               return -1;
-       
-       if(listen(sv[0], 1) < 0)
-       {
-               close(sv[0]);
-               close(sv[1]);
-               return -1;
-       }
-       
-       addr2.sin_port = htons(port_no);
-       addr2.sin_family = AF_INET;
-       addr2.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
-       if(connect (sv[1], (struct sockaddr *) &addr2, sizeof (addr2)) < 0) 
-       {
-               close(sv[0]);
-               close(sv[1]);
-               return -1;
-       }
-       
-       if((fd = accept(sv[1], (struct sockaddr *) &addr3, &addr3_len)) < 0)
-       {
-               close(sv[0]);
-               close(sv[1]);
-               return -1;
-       }
-       close(sv[0]);
-       sv[0] = fd;
-       
-       return(0);
-
-}
-#endif