]>
Commit | Line | Data |
---|---|---|
3b1c2aa6 AC |
1 | /* |
2 | * Copyright (C) 2006 Jilles Tjoelker | |
3 | * Copyright (C) 2006 Stephen Bennett <spb@gentoo.org> | |
3b1c2aa6 AC |
4 | */ |
5 | ||
6 | #include "stdinc.h" | |
7 | #include "modules.h" | |
8 | #include "numeric.h" | |
9 | #include "client.h" | |
10 | #include "ircd.h" | |
11 | #include "send.h" | |
12 | #include "s_user.h" | |
13 | #include "s_serv.h" | |
14 | #include "s_conf.h" | |
15 | #include "s_newconf.h" | |
6119faa9 | 16 | #include "msgbuf.h" |
3b1c2aa6 | 17 | |
7f373431 EK |
18 | static void mo_grant(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]); |
19 | static void me_grant(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]); | |
eeabf33a | 20 | |
c1649fd0 | 21 | static int do_grant(struct Client *source_p, struct Client *target_p, const char *new_privset); |
3b1c2aa6 | 22 | |
c1649fd0 | 23 | struct Message grant_msgtab = { |
6119faa9 | 24 | "GRANT", 0, 0, 0, 0, |
c1649fd0 EK |
25 | { mg_ignore, mg_not_oper, mg_ignore, mg_ignore, {me_grant, 3}, {mo_grant, 3}} |
26 | }; | |
3b1c2aa6 | 27 | |
c1649fd0 | 28 | mapi_clist_av1 grant_clist[] = { &grant_msgtab, NULL }; |
3b1c2aa6 | 29 | |
7f373431 | 30 | static const char grant_desc[] = "Allows operators to set or remove operator privileges on other users"; |
c1649fd0 | 31 | |
7f373431 EK |
32 | DECLARE_MODULE_AV2(grant, NULL, NULL, grant_clist, NULL, NULL, NULL, NULL, grant_desc); |
33 | ||
34 | static void | |
6119faa9 | 35 | mo_grant(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) |
3b1c2aa6 | 36 | { |
c1649fd0 | 37 | struct Client *target_p; |
3b1c2aa6 | 38 | |
6119faa9 | 39 | if(!HasPrivilege(source_p, "oper:grant")) |
3b1c2aa6 | 40 | { |
c1649fd0 | 41 | sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "grant"); |
7f373431 | 42 | return; |
3b1c2aa6 AC |
43 | } |
44 | ||
c1649fd0 EK |
45 | target_p = find_named_person(parv[1]); |
46 | if (target_p == NULL) | |
3b1c2aa6 | 47 | { |
c1649fd0 EK |
48 | sendto_one_numeric(source_p, ERR_NOSUCHNICK, |
49 | form_str(ERR_NOSUCHNICK), parv[1]); | |
7f373431 | 50 | return; |
3b1c2aa6 | 51 | } |
17f92581 | 52 | |
c1649fd0 | 53 | if (MyClient(target_p)) |
3b1c2aa6 | 54 | { |
c1649fd0 EK |
55 | do_grant(source_p, target_p, parv[2]); |
56 | } | |
57 | else | |
3b1c2aa6 | 58 | { |
c1649fd0 EK |
59 | sendto_one(target_p, ":%s ENCAP %s GRANT %s %s", |
60 | get_id(source_p, target_p), target_p->servptr->name, | |
61 | get_id(target_p, target_p), parv[2]); | |
3b1c2aa6 | 62 | } |
17f92581 JV |
63 | } |
64 | ||
7f373431 | 65 | static void |
6119faa9 | 66 | me_grant(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) |
17f92581 | 67 | { |
c1649fd0 EK |
68 | struct Client *target_p; |
69 | ||
70 | target_p = find_person(parv[1]); | |
71 | if (target_p == NULL) | |
3b1c2aa6 | 72 | { |
c1649fd0 EK |
73 | sendto_one_numeric(source_p, ERR_NOSUCHNICK, |
74 | form_str(ERR_NOSUCHNICK), parv[1]); | |
7f373431 | 75 | return; |
3b1c2aa6 AC |
76 | } |
77 | ||
c1649fd0 | 78 | do_grant(source_p, target_p, parv[2]); |
c1649fd0 | 79 | } |
17f92581 | 80 | |
17f92581 | 81 | |
c1649fd0 EK |
82 | static int do_grant(struct Client *source_p, struct Client *target_p, const char *new_privset) |
83 | { | |
84 | int dooper = 0, dodeoper = 0; | |
8aadf0ce | 85 | struct PrivilegeSet *privset = NULL, *old_privset = NULL; |
c1649fd0 | 86 | |
b143f5e3 | 87 | if (!strcasecmp(new_privset, "deoper")) |
c1649fd0 | 88 | { |
6119faa9 | 89 | if (!IsOper(target_p)) |
c1649fd0 EK |
90 | { |
91 | sendto_one_notice(source_p, ":You can't deoper someone who isn't an oper."); | |
92 | return 0; | |
93 | } | |
c1649fd0 EK |
94 | dodeoper = 1; |
95 | ||
96 | sendto_one_notice(target_p, ":%s is deopering you.", source_p->name); | |
97 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, "%s is deopering %s.", get_oper_name(source_p), target_p->name); | |
98 | } | |
99 | else | |
3b1c2aa6 | 100 | { |
c1649fd0 EK |
101 | if (!(privset = privilegeset_get(new_privset))) |
102 | { | |
103 | sendto_one_notice(source_p, ":There is no privilege set named '%s'.", new_privset); | |
104 | return 0; | |
105 | } | |
106 | ||
107 | if (privset == target_p->user->privset) | |
108 | { | |
109 | sendto_one_notice(source_p, ":%s already has privilege set %s.", target_p->name, target_p->user->privset->name); | |
110 | return 0; | |
111 | } | |
40ecb85a | 112 | |
113 | if (ConfigFileEntry.oper_secure_only && !IsSecureClient(target_p)) | |
114 | { | |
115 | sendto_one_notice(source_p, ":Cannot GRANT %s, opers must be using secure connections.", target_p->name); | |
116 | return 0; | |
117 | } | |
3b1c2aa6 AC |
118 | } |
119 | ||
c1649fd0 | 120 | if (!dodeoper) |
3b1c2aa6 | 121 | { |
6119faa9 | 122 | if (!IsOper(target_p)) |
c1649fd0 EK |
123 | { |
124 | sendto_one_notice(target_p, ":%s is opering you with privilege set %s", source_p->name, privset->name); | |
125 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, "%s is opering %s with privilege set %s", get_oper_name(source_p), target_p->name, privset->name); | |
126 | dooper = 1; | |
127 | } | |
3b1c2aa6 | 128 | else |
c1649fd0 EK |
129 | { |
130 | sendto_one_notice(target_p, ":%s is changing your privilege set to %s", source_p->name, privset->name); | |
131 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, "%s is changing the privilege set of %s to %s", get_oper_name(source_p), target_p->name, privset->name); | |
132 | } | |
133 | ||
134 | if (!IsOper(target_p)) | |
135 | { | |
136 | dooper = 1; | |
137 | } | |
3b1c2aa6 | 138 | } |
c1649fd0 EK |
139 | |
140 | if (dodeoper) | |
3b1c2aa6 | 141 | { |
c1649fd0 EK |
142 | const char *modeparv[4]; |
143 | modeparv[0] = modeparv[1] = target_p->name; | |
144 | modeparv[2] = "-o"; | |
145 | modeparv[3] = NULL; | |
146 | user_mode(target_p, target_p, 3, modeparv); | |
8aadf0ce EK |
147 | |
148 | return 0; | |
3b1c2aa6 AC |
149 | } |
150 | ||
c1649fd0 | 151 | if (dooper) |
17f92581 | 152 | { |
687ec8f7 | 153 | struct oper_conf oper = {0}; |
c1649fd0 | 154 | oper.name = "<grant>"; |
c1649fd0 EK |
155 | oper.privset = privset; |
156 | ||
157 | oper_up(target_p, &oper); | |
3b1c2aa6 | 158 | } |
8aadf0ce | 159 | else |
bdc87b5f | 160 | { |
8aadf0ce EK |
161 | if (privset != NULL) |
162 | privilegeset_ref(privset); | |
163 | ||
164 | if (target_p->user->privset != NULL) | |
165 | old_privset = target_p->user->privset; | |
166 | ||
167 | target_p->user->privset = privset; | |
bdc87b5f | 168 | |
8aadf0ce EK |
169 | if (privset != NULL) |
170 | sendto_server(NULL, NULL, CAP_TS6, NOCAPS, ":%s OPER %s %s", | |
171 | use_id(target_p), target_p->user->opername, privset->name); | |
3b1c2aa6 | 172 | |
8aadf0ce | 173 | report_priv_change(target_p, old_privset, privset); |
910f8839 | 174 | |
8aadf0ce EK |
175 | if (old_privset != NULL) |
176 | privilegeset_unref(old_privset); | |
910f8839 | 177 | |
8aadf0ce EK |
178 | const char *modeparv[4]; |
179 | modeparv[0] = modeparv[1] = target_p->name; | |
180 | modeparv[2] = "+"; | |
181 | modeparv[3] = NULL; | |
182 | user_mode(target_p, target_p, 3, modeparv); | |
183 | } | |
17f92581 | 184 | |
c1649fd0 EK |
185 | return 0; |
186 | } |