]>
Commit | Line | Data |
---|---|---|
212380e3 AC |
1 | /* modules/m_services.c |
2 | * Copyright (C) 2005 Lee Hardy <lee -at- leeh.co.uk> | |
3 | * Copyright (C) 2005 ircd-ratbox development team | |
4 | * | |
5 | * Redistribution and use in source and binary forms, with or without | |
6 | * modification, are permitted provided that the following conditions are | |
7 | * met: | |
8 | * | |
9 | * 1.Redistributions of source code must retain the above copyright notice, | |
10 | * this list of conditions and the following disclaimer. | |
11 | * 2.Redistributions in binary form must reproduce the above copyright | |
12 | * notice, this list of conditions and the following disclaimer in the | |
13 | * documentation and/or other materials provided with the distribution. | |
14 | * 3.The name of the author may not be used to endorse or promote products | |
15 | * derived from this software without specific prior written permission. | |
16 | * | |
17 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR | |
18 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED | |
19 | * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE | |
20 | * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, | |
21 | * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES | |
22 | * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR | |
23 | * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
24 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | |
25 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING | |
26 | * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE | |
27 | * POSSIBILITY OF SUCH DAMAGE. | |
212380e3 AC |
28 | */ |
29 | ||
30 | #include "stdinc.h" | |
31 | ||
212380e3 AC |
32 | #include "send.h" |
33 | #include "channel.h" | |
34 | #include "client.h" | |
9b8e9eb3 | 35 | #include "defaults.h" |
212380e3 AC |
36 | #include "ircd.h" |
37 | #include "numeric.h" | |
212380e3 AC |
38 | #include "s_conf.h" |
39 | #include "s_newconf.h" | |
40 | #include "s_serv.h" | |
41 | #include "hash.h" | |
42 | #include "msg.h" | |
43 | #include "parse.h" | |
44 | #include "modules.h" | |
212380e3 AC |
45 | #include "whowas.h" |
46 | #include "monitor.h" | |
0b904d91 | 47 | #include "supported.h" |
212380e3 | 48 | |
eeabf33a EM |
49 | static const char services_desc[] = "Provides support for running a services daemon"; |
50 | ||
c46a4ecd KB |
51 | static int _modinit(void); |
52 | static void _moddeinit(void); | |
53 | ||
54 | static void mark_services(void); | |
55 | static void unmark_services(void); | |
56 | ||
3c7d6fcc EM |
57 | static void me_su(struct MsgBuf *, struct Client *, struct Client *, int, const char **); |
58 | static void me_login(struct MsgBuf *, struct Client *, struct Client *, int, const char **); | |
59 | static void me_rsfnc(struct MsgBuf *, struct Client *, struct Client *, int, const char **); | |
60 | static void me_nickdelay(struct MsgBuf *, struct Client *, struct Client *, int, const char **); | |
212380e3 | 61 | |
82436efb EM |
62 | static void h_svc_server_introduced(void *); |
63 | static void h_svc_whois(void *); | |
64 | static void h_svc_stats(void *); | |
c46a4ecd KB |
65 | static void h_svc_conf_read_start(void *); |
66 | static void h_svc_conf_read_end(void *); | |
212380e3 AC |
67 | |
68 | struct Message su_msgtab = { | |
7baa37a9 | 69 | "SU", 0, 0, 0, 0, |
212380e3 AC |
70 | {mg_ignore, mg_ignore, mg_ignore, mg_ignore, {me_su, 2}, mg_ignore} |
71 | }; | |
72 | struct Message login_msgtab = { | |
7baa37a9 | 73 | "LOGIN", 0, 0, 0, 0, |
212380e3 AC |
74 | {mg_ignore, mg_ignore, mg_ignore, mg_ignore, {me_login, 2}, mg_ignore} |
75 | }; | |
76 | struct Message rsfnc_msgtab = { | |
7baa37a9 | 77 | "RSFNC", 0, 0, 0, 0, |
212380e3 AC |
78 | {mg_ignore, mg_ignore, mg_ignore, mg_ignore, {me_rsfnc, 4}, mg_ignore} |
79 | }; | |
80 | struct Message nickdelay_msgtab = { | |
7baa37a9 | 81 | "NICKDELAY", 0, 0, 0, 0, |
212380e3 AC |
82 | {mg_unreg, mg_ignore, mg_ignore, mg_ignore, {me_nickdelay, 3}, mg_ignore} |
83 | }; | |
84 | ||
55abcbb2 | 85 | mapi_clist_av1 services_clist[] = { |
212380e3 AC |
86 | &su_msgtab, &login_msgtab, &rsfnc_msgtab, &nickdelay_msgtab, NULL |
87 | }; | |
88 | mapi_hfn_list_av1 services_hfnlist[] = { | |
82436efb EM |
89 | { "doing_stats", h_svc_stats }, |
90 | { "doing_whois", h_svc_whois }, | |
91 | { "doing_whois_global", h_svc_whois }, | |
92 | { "server_introduced", h_svc_server_introduced }, | |
93 | { "conf_read_start", h_svc_conf_read_start }, | |
94 | { "conf_read_end", h_svc_conf_read_end }, | |
212380e3 AC |
95 | { NULL, NULL } |
96 | }; | |
97 | ||
3abc337f | 98 | DECLARE_MODULE_AV2(services, _modinit, _moddeinit, services_clist, NULL, services_hfnlist, NULL, NULL, services_desc); |
c46a4ecd KB |
99 | |
100 | static int | |
101 | _modinit(void) | |
102 | { | |
103 | mark_services(); | |
0b904d91 | 104 | add_isupport("FNC", isupport_string, ""); |
8a4b8377 | 105 | return 0; |
c46a4ecd KB |
106 | } |
107 | ||
108 | static void | |
109 | _moddeinit(void) | |
110 | { | |
0b904d91 | 111 | delete_isupport("FNC"); |
c46a4ecd KB |
112 | unmark_services(); |
113 | } | |
212380e3 | 114 | |
3c7d6fcc | 115 | static void |
428ca87b | 116 | me_su(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, |
212380e3 AC |
117 | int parc, const char *parv[]) |
118 | { | |
119 | struct Client *target_p; | |
120 | ||
121 | if(!(source_p->flags & FLAGS_SERVICE)) | |
ec57fe67 KB |
122 | { |
123 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
124 | "Non-service server %s attempting to execute services-only command SU", source_p->name); | |
3c7d6fcc | 125 | return; |
ec57fe67 | 126 | } |
212380e3 AC |
127 | |
128 | if((target_p = find_client(parv[1])) == NULL) | |
3c7d6fcc | 129 | return; |
212380e3 AC |
130 | |
131 | if(!target_p->user) | |
3c7d6fcc | 132 | return; |
212380e3 AC |
133 | |
134 | if(EmptyString(parv[2])) | |
135 | target_p->user->suser[0] = '\0'; | |
136 | else | |
f427c8b0 | 137 | rb_strlcpy(target_p->user->suser, parv[2], sizeof(target_p->user->suser)); |
212380e3 | 138 | |
5a261597 | 139 | sendto_common_channels_local(target_p, CLICAP_ACCOUNT_NOTIFY, NOCAPS, ":%s!%s@%s ACCOUNT %s", |
7a7f86d3 AC |
140 | target_p->name, target_p->username, target_p->host, |
141 | EmptyString(target_p->user->suser) ? "*" : target_p->user->suser); | |
142 | ||
8e3239be JP |
143 | if (MyClient(target_p)) |
144 | { | |
145 | if (EmptyString(target_p->user->suser)) | |
146 | sendto_one(target_p, form_str(RPL_LOGGEDOUT), me.name, target_p->name, | |
147 | target_p->name, target_p->username, target_p->host); | |
148 | else | |
149 | sendto_one(target_p, form_str(RPL_LOGGEDIN), me.name, target_p->name, | |
150 | target_p->name, target_p->username, target_p->host, parv[2], parv[2]); | |
151 | } | |
152 | ||
212380e3 | 153 | invalidate_bancache_user(target_p); |
212380e3 AC |
154 | } |
155 | ||
3c7d6fcc | 156 | static void |
428ca87b | 157 | me_login(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, |
212380e3 AC |
158 | int parc, const char *parv[]) |
159 | { | |
160 | if(!IsPerson(source_p)) | |
3c7d6fcc | 161 | return; |
212380e3 | 162 | |
f427c8b0 | 163 | rb_strlcpy(source_p->user->suser, parv[1], sizeof(source_p->user->suser)); |
212380e3 AC |
164 | } |
165 | ||
3c7d6fcc | 166 | static void |
428ca87b | 167 | me_rsfnc(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, |
212380e3 AC |
168 | int parc, const char *parv[]) |
169 | { | |
170 | struct Client *target_p; | |
171 | struct Client *exist_p; | |
172 | time_t newts, curts; | |
52f1947f | 173 | struct nd_entry *nd; |
fe5fc851 | 174 | char note[NAMELEN + 10]; |
212380e3 AC |
175 | |
176 | if(!(source_p->flags & FLAGS_SERVICE)) | |
ec57fe67 KB |
177 | { |
178 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
179 | "Non-service server %s attempting to execute services-only command RSFNC", source_p->name); | |
3c7d6fcc | 180 | return; |
ec57fe67 | 181 | } |
212380e3 AC |
182 | |
183 | if((target_p = find_person(parv[1])) == NULL) | |
3c7d6fcc | 184 | return; |
212380e3 AC |
185 | |
186 | if(!MyClient(target_p)) | |
3c7d6fcc | 187 | return; |
212380e3 | 188 | |
2d28539c | 189 | if(!clean_nick(parv[2], 0) || IsDigit(parv[2][0])) |
3c7d6fcc | 190 | return; |
212380e3 AC |
191 | |
192 | curts = atol(parv[4]); | |
193 | ||
194 | /* if tsinfo is different from what it was when services issued the | |
195 | * RSFNC, then we ignore it. This can happen when a client changes | |
196 | * nicknames before the RSFNC arrives.. --anfl | |
197 | */ | |
198 | if(target_p->tsinfo != curts) | |
3c7d6fcc | 199 | return; |
212380e3 AC |
200 | |
201 | if((exist_p = find_named_client(parv[2]))) | |
202 | { | |
203 | char buf[BUFSIZE]; | |
204 | ||
205 | /* this would be one hell of a race condition to trigger | |
55abcbb2 | 206 | * this one given the tsinfo check above, but its here for |
212380e3 AC |
207 | * safety --anfl |
208 | */ | |
209 | if(target_p == exist_p) | |
03510227 | 210 | goto doit; |
212380e3 AC |
211 | |
212 | if(MyClient(exist_p)) | |
213 | sendto_one(exist_p, ":%s KILL %s :(Nickname regained by services)", | |
214 | me.name, exist_p->name); | |
215 | ||
216 | exist_p->flags |= FLAGS_KILLED; | |
217 | /* Do not send kills to servers for unknowns -- jilles */ | |
218 | if(IsClient(exist_p)) | |
45ed8835 | 219 | { |
212380e3 AC |
220 | kill_client_serv_butone(NULL, exist_p, "%s (Nickname regained by services)", |
221 | me.name); | |
45ed8835 JT |
222 | sendto_realops_snomask(SNO_SKILL, L_ALL, |
223 | "Nick collision due to services forced nick change on %s", | |
224 | parv[2]); | |
225 | } | |
212380e3 | 226 | |
5203cba5 | 227 | snprintf(buf, sizeof(buf), "Killed (%s (Nickname regained by services))", |
212380e3 AC |
228 | me.name); |
229 | exit_client(NULL, exist_p, &me, buf); | |
230 | } | |
231 | ||
03510227 | 232 | doit: |
212380e3 AC |
233 | newts = atol(parv[3]); |
234 | ||
235 | /* timestamp is older than 15mins, ignore it */ | |
e3354945 VY |
236 | if(newts < (rb_current_time() - 900)) |
237 | newts = rb_current_time() - 900; | |
212380e3 AC |
238 | |
239 | target_p->tsinfo = newts; | |
240 | ||
241 | monitor_signoff(target_p); | |
242 | ||
243 | invalidate_bancache_user(target_p); | |
244 | ||
245 | sendto_realops_snomask(SNO_NCHANGE, L_ALL, | |
246 | "Nick change: From %s to %s [%s@%s]", | |
247 | target_p->name, parv[2], target_p->username, | |
248 | target_p->host); | |
249 | ||
583f064f | 250 | sendto_common_channels_local(target_p, NOCAPS, NOCAPS, ":%s!%s@%s NICK :%s", |
212380e3 AC |
251 | target_p->name, target_p->username, |
252 | target_p->host, parv[2]); | |
253 | ||
b47f8a4f | 254 | whowas_add_history(target_p, 1); |
212380e3 AC |
255 | sendto_server(NULL, NULL, CAP_TS6, NOCAPS, ":%s NICK %s :%ld", |
256 | use_id(target_p), parv[2], (long) target_p->tsinfo); | |
212380e3 AC |
257 | |
258 | del_from_client_hash(target_p->name, target_p); | |
52f1947f DF |
259 | |
260 | /* invalidate nick delay because we're forcing this nick to be used */ | |
261 | nd = rb_dictionary_retrieve(nd_dict, parv[2]); | |
262 | if (nd != NULL) | |
263 | free_nd_entry(nd); | |
264 | ||
e2606551 | 265 | rb_strlcpy(target_p->name, parv[2], NICKLEN); |
212380e3 AC |
266 | add_to_client_hash(target_p->name, target_p); |
267 | ||
268 | monitor_signon(target_p); | |
269 | ||
270 | del_all_accepts(target_p); | |
271 | ||
fe5fc851 | 272 | snprintf(note, sizeof(note), "Nick: %s", target_p->name); |
75d60088 | 273 | rb_note(target_p->localClient->F, note); |
212380e3 AC |
274 | } |
275 | ||
276 | /* | |
277 | ** me_nickdelay | |
212380e3 AC |
278 | ** parv[1] = duration in seconds (0 to remove) |
279 | ** parv[2] = nick | |
280 | */ | |
3c7d6fcc | 281 | static void |
428ca87b | 282 | me_nickdelay(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) |
212380e3 AC |
283 | { |
284 | int duration; | |
285 | struct nd_entry *nd; | |
286 | ||
287 | if(!(source_p->flags & FLAGS_SERVICE)) | |
ec57fe67 KB |
288 | { |
289 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
290 | "Non-service server %s attempting to execute services-only command NICKDELAY", source_p->name); | |
3c7d6fcc | 291 | return; |
ec57fe67 | 292 | } |
212380e3 AC |
293 | |
294 | duration = atoi(parv[1]); | |
295 | if (duration <= 0) | |
296 | { | |
a4bf26dd | 297 | nd = rb_dictionary_retrieve(nd_dict, parv[2]); |
212380e3 AC |
298 | if (nd != NULL) |
299 | free_nd_entry(nd); | |
300 | } | |
301 | else | |
302 | { | |
303 | if (duration > 86400) | |
304 | duration = 86400; | |
305 | add_nd_entry(parv[2]); | |
a4bf26dd | 306 | nd = rb_dictionary_retrieve(nd_dict, parv[2]); |
212380e3 | 307 | if (nd != NULL) |
e3354945 | 308 | nd->expire = rb_current_time() + duration; |
212380e3 | 309 | } |
212380e3 AC |
310 | } |
311 | ||
312 | static void | |
82436efb | 313 | h_svc_server_introduced(void *data) |
212380e3 | 314 | { |
82436efb | 315 | hook_data_client *hdata = data; |
5b96d9a6 | 316 | rb_dlink_node *ptr; |
212380e3 | 317 | |
5b96d9a6 | 318 | RB_DLINK_FOREACH(ptr, service_list.head) |
212380e3 AC |
319 | { |
320 | if(!irccmp((const char *) ptr->data, hdata->target->name)) | |
321 | { | |
322 | hdata->target->flags |= FLAGS_SERVICE; | |
323 | return; | |
324 | } | |
325 | } | |
326 | } | |
327 | ||
328 | static void | |
82436efb | 329 | h_svc_whois(void *data_) |
212380e3 | 330 | { |
82436efb | 331 | hook_data_client *data = data_; |
212380e3 AC |
332 | char *p = data->target->user->suser; |
333 | if(!EmptyString(p)) | |
334 | { | |
335 | /* Try to strip off any leading digits as this may be used to | |
336 | * store both an ID number and an account name in one field. | |
337 | * If only digits are present, leave as is. | |
338 | */ | |
339 | while(IsDigit(*p)) | |
340 | p++; | |
341 | if(*p == '\0') | |
342 | p = data->target->user->suser; | |
343 | ||
5b383ce0 JT |
344 | sendto_one_numeric(data->client, RPL_WHOISLOGGEDIN, |
345 | form_str(RPL_WHOISLOGGEDIN), | |
212380e3 AC |
346 | data->target->name, p); |
347 | } | |
348 | } | |
349 | ||
350 | static void | |
82436efb | 351 | h_svc_stats(void *data_) |
212380e3 | 352 | { |
82436efb | 353 | hook_data_int *data = data_; |
212380e3 | 354 | char statchar = (char) data->arg2; |
5b96d9a6 | 355 | rb_dlink_node *ptr; |
212380e3 | 356 | |
d4f7eb4c | 357 | if (statchar == 'U' && IsOperGeneral(data->client)) |
212380e3 | 358 | { |
5b96d9a6 | 359 | RB_DLINK_FOREACH(ptr, service_list.head) |
212380e3 AC |
360 | { |
361 | sendto_one_numeric(data->client, RPL_STATSULINE, | |
362 | form_str(RPL_STATSULINE), | |
0cce01d3 | 363 | (const char *)ptr->data, "*", "*", "s"); |
212380e3 AC |
364 | } |
365 | } | |
366 | } | |
c46a4ecd KB |
367 | |
368 | static void | |
369 | h_svc_conf_read_start(void *dummy) | |
370 | { | |
371 | unmark_services(); | |
372 | } | |
373 | ||
374 | static void | |
375 | unmark_services(void) | |
376 | { | |
377 | struct Client *target_p; | |
378 | rb_dlink_node *ptr; | |
379 | ||
380 | RB_DLINK_FOREACH(ptr, global_serv_list.head) | |
381 | { | |
382 | target_p = ptr->data; | |
383 | ||
384 | target_p->flags &= ~FLAGS_SERVICE; | |
385 | } | |
386 | } | |
387 | ||
388 | static void | |
389 | h_svc_conf_read_end(void *dummy) | |
390 | { | |
391 | mark_services(); | |
392 | } | |
393 | ||
394 | static void | |
395 | mark_services(void) | |
396 | { | |
397 | struct Client *target_p; | |
398 | rb_dlink_node *ptr; | |
399 | ||
400 | RB_DLINK_FOREACH(ptr, service_list.head) | |
401 | { | |
402 | target_p = find_server(NULL, (const char *)ptr->data); | |
403 | ||
404 | if (target_p) | |
405 | target_p->flags |= FLAGS_SERVICE; | |
406 | } | |
407 | } |