]> jfr.im git - solanum.git/blame - modules/m_testline.c
add separate priv (oper:message) for walking over CALLERID (umode +g) (#152)
[solanum.git] / modules / m_testline.c
CommitLineData
212380e3 1/* modules/m_testline.c
55abcbb2 2 *
212380e3
AC
3 * Copyright (C) 2004 Lee Hardy <lee@leeh.co.uk>
4 * Copyright (C) 2004-2005 ircd-ratbox development team
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are
8 * met:
9 *
10 * 1.Redistributions of source code must retain the above copyright notice,
11 * this list of conditions and the following disclaimer.
12 * 2.Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3.The name of the author may not be used to endorse or promote products
16 * derived from this software without specific prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
19 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
20 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
21 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
22 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
23 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
24 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
26 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
27 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
212380e3
AC
29 */
30#include "stdinc.h"
212380e3
AC
31#include "send.h"
32#include "client.h"
33#include "modules.h"
34#include "msg.h"
add9f99d 35#include "hash.h"
212380e3
AC
36#include "hostmask.h"
37#include "numeric.h"
38#include "s_conf.h"
39#include "s_newconf.h"
83235e9e 40#include "reject.h"
212380e3 41
eeabf33a
EM
42static const char testline_desc[] = "Provides the ability to test I/K/D/X lines and RESVs";
43
3c7d6fcc 44static void mo_testline(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
4dc6ff3d 45static void mo_testkline(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
3c7d6fcc 46static void mo_testgecos(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
212380e3
AC
47
48struct Message testline_msgtab = {
7baa37a9 49 "TESTLINE", 0, 0, 0, 0,
96bfafc1 50 {mg_unreg, mg_not_oper, mg_ignore, mg_ignore, mg_ignore, {mo_testline, 2}}
212380e3 51};
4dc6ff3d
EK
52struct Message testkline_msgtab = {
53 "TESTKLINE", 0, 0, 0, 0,
54 {mg_unreg, mg_not_oper, mg_ignore, mg_ignore, mg_ignore, {mo_testkline, 2}}
55};
212380e3 56struct Message testgecos_msgtab = {
7baa37a9 57 "TESTGECOS", 0, 0, 0, 0,
96bfafc1 58 {mg_unreg, mg_not_oper, mg_ignore, mg_ignore, mg_ignore, {mo_testgecos, 2}}
212380e3
AC
59};
60
4dc6ff3d 61mapi_clist_av1 testline_clist[] = { &testline_msgtab, &testkline_msgtab, &testgecos_msgtab, NULL };
eeabf33a 62
be9c3979 63DECLARE_MODULE_AV2(testline, NULL, NULL, testline_clist, NULL, NULL, NULL, NULL, testline_desc);
212380e3 64
3c7d6fcc 65static void
428ca87b 66mo_testline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
67{
68 struct ConfItem *aconf;
69 struct ConfItem *resv_p;
e7046ee5 70 struct rb_sockaddr_storage ip;
212380e3
AC
71 char user_trunc[USERLEN + 1], notildeuser_trunc[USERLEN + 1];
72 const char *name = NULL;
73 const char *username = NULL;
74 const char *host = NULL;
75 char *mask;
76 char *p;
77 int host_mask;
78 int type;
83235e9e 79 int duration;
e5b12a61
JT
80 char *puser, *phost, *reason, *operreason;
81 char reasonbuf[BUFSIZE];
212380e3 82
58a490f9
EK
83 if (!HasPrivilege(source_p, "oper:testline"))
84 {
85 sendto_one(source_p, form_str(ERR_NOPRIVS),
86 me.name, source_p->name, "testline");
87 return;
88 }
89
212380e3
AC
90 mask = LOCAL_COPY(parv[1]);
91
add9f99d
JT
92 if (IsChannelName(mask))
93 {
94 resv_p = hash_find_resv(mask);
95 if (resv_p != NULL)
96 {
97 sendto_one(source_p, form_str(RPL_TESTLINE),
98 me.name, source_p->name,
99 resv_p->hold ? 'q' : 'Q',
e3354945 100 resv_p->hold ? (long) ((resv_p->hold - rb_current_time()) / 60) : 0L,
70ea02eb 101 resv_p->host, resv_p->passwd);
add9f99d
JT
102 /* this is a false positive, so make sure it isn't counted in stats q
103 * --nenolod
104 */
105 resv_p->port--;
106 }
107 else
108 sendto_one(source_p, form_str(RPL_NOTESTLINE),
109 me.name, source_p->name, parv[1]);
3c7d6fcc 110 return;
add9f99d
JT
111 }
112
212380e3
AC
113 if((p = strchr(mask, '!')))
114 {
115 *p++ = '\0';
116 name = mask;
117 mask = p;
118
119 if(EmptyString(mask))
3dcaa851
EK
120 {
121 sendto_one_notice(source_p, "Invalid syntax for TESTLINE");
3c7d6fcc 122 return;
3dcaa851 123 }
212380e3
AC
124 }
125
126 if((p = strchr(mask, '@')))
127 {
128 *p++ = '\0';
129 username = mask;
130 host = p;
131
132 if(EmptyString(host))
3dcaa851
EK
133 {
134 sendto_one_notice(source_p, "Invalid syntax for TESTLINE");
3c7d6fcc 135 return;
3dcaa851 136 }
212380e3
AC
137 }
138 else
139 host = mask;
140
141 /* parses as an IP, check for a dline */
29c92cf9 142 if((type = parse_netmask(host, &ip, &host_mask)) != HM_HOST)
212380e3 143 {
54ac8b60
VY
144 if(type == HM_IPV6)
145 aconf = find_dline((struct sockaddr *)&ip, AF_INET6);
146 else
54ac8b60 147 aconf = find_dline((struct sockaddr *)&ip, AF_INET);
212380e3
AC
148
149 if(aconf && aconf->status & CONF_DLINE)
150 {
e5b12a61 151 get_printable_kline(source_p, aconf, &phost, &reason, &puser, &operreason);
5203cba5 152 snprintf(reasonbuf, sizeof(reasonbuf), "%s%s%s", reason,
e5b12a61 153 operreason ? "|" : "", operreason ? operreason : "");
212380e3
AC
154 sendto_one(source_p, form_str(RPL_TESTLINE),
155 me.name, source_p->name,
156 (aconf->flags & CONF_FLAGS_TEMPORARY) ? 'd' : 'D',
55abcbb2
KB
157 (aconf->flags & CONF_FLAGS_TEMPORARY) ?
158 (long) ((aconf->hold - rb_current_time()) / 60) : 0L,
e5b12a61 159 phost, reasonbuf);
212380e3 160
3c7d6fcc 161 return;
212380e3 162 }
83235e9e
JT
163 /* Otherwise, aconf is an exempt{} */
164 if(aconf == NULL &&
165 (duration = is_reject_ip((struct sockaddr *)&ip)))
166 sendto_one(source_p, form_str(RPL_TESTLINE),
167 me.name, source_p->name,
168 '!',
0cce01d3 169 duration / 60L,
83235e9e
JT
170 host, "Reject cache");
171 if(aconf == NULL &&
172 (duration = is_throttle_ip((struct sockaddr *)&ip)))
173 sendto_one(source_p, form_str(RPL_TESTLINE),
174 me.name, source_p->name,
175 '!',
0cce01d3 176 duration / 60L,
83235e9e 177 host, "Throttled");
212380e3
AC
178 }
179
180 if (username != NULL)
181 {
f427c8b0
VY
182 rb_strlcpy(user_trunc, username, sizeof user_trunc);
183 rb_strlcpy(notildeuser_trunc, *username == '~' ? username + 1 : username, sizeof notildeuser_trunc);
212380e3
AC
184 }
185 else
186 {
f427c8b0
VY
187 rb_strlcpy(user_trunc, "dummy", sizeof user_trunc);
188 rb_strlcpy(notildeuser_trunc, "dummy", sizeof notildeuser_trunc);
212380e3
AC
189 }
190 /* now look for a matching I/K/G */
191 if((aconf = find_address_conf(host, NULL, user_trunc, notildeuser_trunc,
192 (type != HM_HOST) ? (struct sockaddr *)&ip : NULL,
193 (type != HM_HOST) ? (
55abcbb2 194 (type == HM_IPV6) ? AF_INET6 :
40c1fd47 195 AF_INET) : 0, NULL)))
212380e3
AC
196 {
197 static char buf[HOSTLEN+USERLEN+2];
198
199 if(aconf->status & CONF_KILL)
200 {
1e57e391 201 get_printable_kline(source_p, aconf, &phost, &reason, &puser, &operreason);
5203cba5 202 snprintf(buf, sizeof(buf), "%s@%s",
1e57e391 203 puser, phost);
5203cba5 204 snprintf(reasonbuf, sizeof(reasonbuf), "%s%s%s", reason,
cb2540a6 205 operreason ? "|" : "", operreason ? operreason : "");
212380e3
AC
206 sendto_one(source_p, form_str(RPL_TESTLINE),
207 me.name, source_p->name,
208 (aconf->flags & CONF_FLAGS_TEMPORARY) ? 'k' : 'K',
55abcbb2 209 (aconf->flags & CONF_FLAGS_TEMPORARY) ?
e3354945 210 (long) ((aconf->hold - rb_current_time()) / 60) : 0L,
cb2540a6 211 buf, reasonbuf);
3c7d6fcc 212 return;
212380e3 213 }
212380e3
AC
214 }
215
216 /* they asked us to check a nick, so hunt for resvs.. */
217 if(name && (resv_p = find_nick_resv(name)))
218 {
219 sendto_one(source_p, form_str(RPL_TESTLINE),
220 me.name, source_p->name,
221 resv_p->hold ? 'q' : 'Q',
e3354945 222 resv_p->hold ? (long) ((resv_p->hold - rb_current_time()) / 60) : 0L,
70ea02eb 223 resv_p->host, resv_p->passwd);
212380e3
AC
224
225 /* this is a false positive, so make sure it isn't counted in stats q
226 * --nenolod
227 */
228 resv_p->port--;
3c7d6fcc 229 return;
212380e3
AC
230 }
231
232 /* no matching resv, we can print the I: if it exists */
233 if(aconf && aconf->status & CONF_CLIENT)
234 {
235 sendto_one_numeric(source_p, RPL_STATSILINE, form_str(RPL_STATSILINE),
27f616dd 236 aconf->info.name, EmptyString(aconf->spasswd) ? "<NULL>" : aconf->spasswd,
59c3d09a 237 show_iline_prefix(source_p, aconf, aconf->user),
212380e3 238 aconf->host, aconf->port, aconf->className);
3c7d6fcc 239 return;
212380e3
AC
240 }
241
242 /* nothing matches.. */
243 sendto_one(source_p, form_str(RPL_NOTESTLINE),
244 me.name, source_p->name, parv[1]);
212380e3
AC
245}
246
4dc6ff3d
EK
247
248static void
249mo_testkline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
250{
251 struct ConfItem *aconf;
252 struct rb_sockaddr_storage ip;
253 char user_trunc[USERLEN + 1];
254 const char *username = NULL;
255 const char *host = NULL;
256 char *mask;
257 char *p;
258 int host_mask;
259 int type;
260 int duration;
261 char *puser, *phost, *reason, *operreason;
262 char reasonbuf[BUFSIZE];
263
264 if (!HasPrivilege(source_p, "oper:testline"))
265 {
266 sendto_one(source_p, form_str(ERR_NOPRIVS),
267 me.name, source_p->name, "testline");
268 return;
269 }
270
271 mask = LOCAL_COPY(parv[1]);
272
273 if ((p = strchr(mask, '!')))
274 {
275 mask = p + 1;
276
277 if(EmptyString(mask))
3dcaa851
EK
278 {
279 sendto_one_notice(source_p, "Invalid syntax for TESTKLINE");
4dc6ff3d 280 return;
3dcaa851 281 }
4dc6ff3d
EK
282 }
283
284 if ((p = strchr(mask, '@')))
285 {
286 *p++ = '\0';
287 username = mask;
288 host = p;
289
290 if(EmptyString(host))
3dcaa851
EK
291 {
292 sendto_one_notice(source_p, "Invalid syntax for TESTKLINE");
4dc6ff3d 293 return;
3dcaa851 294 }
4dc6ff3d
EK
295 }
296 else
297 {
298 host = mask;
299 }
300
301 /* parses as an IP, check for a dline */
302 if ((type = parse_netmask(host, &ip, &host_mask)) != HM_HOST)
303 {
304 if(type == HM_IPV6)
305 aconf = find_dline((struct sockaddr *)&ip, AF_INET6);
306 else
307 aconf = find_dline((struct sockaddr *)&ip, AF_INET);
308
309 if(aconf && aconf->status & CONF_DLINE)
310 {
311 get_printable_kline(source_p, aconf, &phost, &reason, &puser, &operreason);
312 snprintf(reasonbuf, sizeof(reasonbuf), "%s%s%s", reason,
313 operreason ? "|" : "", operreason ? operreason : "");
314 sendto_one(source_p, form_str(RPL_TESTLINE),
315 me.name, source_p->name,
316 (aconf->flags & CONF_FLAGS_TEMPORARY) ? 'd' : 'D',
317 (aconf->flags & CONF_FLAGS_TEMPORARY) ?
318 (long) ((aconf->hold - rb_current_time()) / 60) : 0L,
319 phost, reasonbuf);
320
321 return;
322 }
323 /* Otherwise, aconf is an exempt{} */
324 if (aconf == NULL && (duration = is_reject_ip((struct sockaddr *)&ip)))
325 sendto_one(source_p, form_str(RPL_TESTLINE),
326 me.name, source_p->name,
327 '!',
328 duration / 60L,
329 host, "Reject cache");
330 if (aconf == NULL && (duration = is_throttle_ip((struct sockaddr *)&ip)))
331 sendto_one(source_p, form_str(RPL_TESTLINE),
332 me.name, source_p->name,
333 '!',
334 duration / 60L,
335 host, "Throttled");
336 }
337
338 if (username != NULL)
339 rb_strlcpy(user_trunc, username, sizeof user_trunc);
340 else
341 rb_strlcpy(user_trunc, "dummy", sizeof user_trunc);
342
343 aconf = find_conf_by_address(host,
344 type != HM_HOST ? host : NULL,
345 NULL,
346 type != HM_HOST ? (struct sockaddr *)&ip : NULL,
347 CONF_KILL,
348 type == HM_IPV6 ? AF_INET6 : AF_INET,
349 user_trunc, NULL);
350
351 if (aconf != NULL && aconf->status & CONF_KILL)
352 {
353 static char buf[HOSTLEN+USERLEN+2];
354
355 get_printable_kline(source_p, aconf, &phost, &reason, &puser, &operreason);
356 snprintf(buf, sizeof(buf), "%s@%s",
357 puser, phost);
358 snprintf(reasonbuf, sizeof(reasonbuf), "%s%s%s", reason,
359 operreason ? "|" : "", operreason ? operreason : "");
360 sendto_one(source_p, form_str(RPL_TESTLINE),
361 me.name, source_p->name,
362 (aconf->flags & CONF_FLAGS_TEMPORARY) ? 'k' : 'K',
363 (aconf->flags & CONF_FLAGS_TEMPORARY) ?
364 (long) ((aconf->hold - rb_current_time()) / 60) : 0L,
365 buf, reasonbuf);
366 return;
367 }
368
369 sendto_one(source_p, form_str(RPL_NOTESTLINE),
370 me.name, source_p->name, parv[1]);
371}
372
3c7d6fcc 373static void
428ca87b 374mo_testgecos(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
375{
376 struct ConfItem *aconf;
377
58a490f9
EK
378 if (!HasPrivilege(source_p, "oper:testline"))
379 {
380 sendto_one(source_p, form_str(ERR_NOPRIVS),
381 me.name, source_p->name, "testline");
382 return;
383 }
384
212380e3
AC
385 if(!(aconf = find_xline(parv[1], 0)))
386 {
387 sendto_one(source_p, form_str(RPL_NOTESTLINE),
388 me.name, source_p->name, parv[1]);
3c7d6fcc 389 return;
212380e3
AC
390 }
391
392 sendto_one(source_p, form_str(RPL_TESTLINE),
393 me.name, source_p->name,
394 aconf->hold ? 'x' : 'X',
e3354945 395 aconf->hold ? (long) ((aconf->hold - rb_current_time()) / 60) : 0L,
70ea02eb 396 aconf->host, aconf->passwd);
212380e3 397}