]> jfr.im git - solanum.git/blame - modules/m_grant.c
ircd: handle some EXIT_FAILURE cases differently on win32
[solanum.git] / modules / m_grant.c
CommitLineData
3b1c2aa6
AC
1/*
2 * Copyright (C) 2006 Jilles Tjoelker
3 * Copyright (C) 2006 Stephen Bennett <spb@gentoo.org>
3b1c2aa6
AC
4 */
5
6#include "stdinc.h"
7#include "modules.h"
8#include "numeric.h"
9#include "client.h"
10#include "ircd.h"
11#include "send.h"
12#include "s_user.h"
13#include "s_serv.h"
14#include "s_conf.h"
15#include "s_newconf.h"
16
eeabf33a
EM
17static const char grant_desc[] =
18 "Provides the grant facility for giving other users specific privilege sets";
19
3c7d6fcc
EM
20static void mo_grant(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]);
21static void me_grant(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]);
3b1c2aa6 22
3c7d6fcc 23static void do_grant(struct Client *source_p, struct Client *target_p, const char *new_privset);
3b1c2aa6
AC
24
25struct Message grant_msgtab = {
9fd8e7cb
EM
26 "GRANT", 0, 0, 0, 0,
27 { mg_ignore, mg_not_oper, mg_ignore, mg_ignore, {me_grant, 3}, {mo_grant, 3}}
3b1c2aa6
AC
28};
29
30mapi_clist_av1 grant_clist[] = { &grant_msgtab, NULL };
31
9fd8e7cb 32DECLARE_MODULE_AV2(grant, NULL, NULL, grant_clist, NULL, NULL, NULL, NULL, grant_desc);
3b1c2aa6 33
3c7d6fcc 34static void
428ca87b 35mo_grant(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
3b1c2aa6
AC
36{
37 struct Client *target_p;
38
39 if(!HasPrivilege(source_p, "oper:grant"))
40 {
41 sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "grant");
3c7d6fcc 42 return;
3b1c2aa6
AC
43 }
44
45 target_p = find_named_person(parv[1]);
46 if (target_p == NULL)
47 {
48 sendto_one_numeric(source_p, ERR_NOSUCHNICK,
49 form_str(ERR_NOSUCHNICK), parv[1]);
3c7d6fcc 50 return;
3b1c2aa6
AC
51 }
52
53 if (MyClient(target_p))
54 {
55 do_grant(source_p, target_p, parv[2]);
56 }
57 else
58 {
59 sendto_one(target_p, ":%s ENCAP %s GRANT %s %s",
60 get_id(source_p, target_p), target_p->servptr->name,
61 get_id(target_p, target_p), parv[2]);
62 }
3b1c2aa6
AC
63}
64
3c7d6fcc
EM
65static void
66me_grant(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
3b1c2aa6
AC
67{
68 struct Client *target_p;
69
70 target_p = find_person(parv[1]);
71 if (target_p == NULL)
72 {
73 sendto_one_numeric(source_p, ERR_NOSUCHNICK,
74 form_str(ERR_NOSUCHNICK), parv[1]);
3c7d6fcc 75 return;
3b1c2aa6
AC
76 }
77
78 if(!find_shared_conf(source_p->username, source_p->host,
79 source_p->servptr->name, SHARED_GRANT))
80 {
81 sendto_one(source_p, ":%s NOTICE %s :You don't have an appropriate shared"
82 "block to grant privilege on this server.", me.name, source_p->name);
3c7d6fcc 83 return;
3b1c2aa6
AC
84 }
85
86 do_grant(source_p, target_p, parv[2]);
3b1c2aa6
AC
87}
88
89
3c7d6fcc
EM
90static void
91do_grant(struct Client *source_p, struct Client *target_p, const char *new_privset)
3b1c2aa6
AC
92{
93 int dooper = 0, dodeoper = 0;
94 struct PrivilegeSet *privset = 0;
3c7d6fcc 95 const char *modeparv[4];
3b1c2aa6
AC
96
97 if (!strcmp(new_privset, "deoper"))
98 {
99 if (!IsOper(target_p))
100 {
101 sendto_one_notice(source_p, ":You can't deoper someone who isn't an oper.");
3c7d6fcc 102 return;
3b1c2aa6
AC
103 }
104 new_privset = "default";
105 dodeoper = 1;
106
107 sendto_one_notice(target_p, ":%s is deopering you.", source_p->name);
108 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, "%s is deopering %s.", get_oper_name(source_p), target_p->name);
109 }
110 else
111 {
112 if (!(privset = privilegeset_get(new_privset)))
113 {
114 sendto_one_notice(source_p, ":There is no privilege set named '%s'.", new_privset);
3c7d6fcc 115 return;
3b1c2aa6
AC
116 }
117
118 if (privset == target_p->localClient->privset)
119 {
120 sendto_one_notice(source_p, ":%s already has privilege set %s.", target_p->name, target_p->localClient->privset->name);
3c7d6fcc 121 return;
3b1c2aa6
AC
122 }
123 }
124
125 if (!dodeoper)
126 {
127 if (!IsOper(target_p))
128 {
129 sendto_one_notice(target_p, ":%s is opering you with privilege set %s", source_p->name, privset->name);
130 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, "%s is opering %s with privilege set %s", get_oper_name(source_p), target_p->name, privset->name);
131 dooper = 1;
132 }
133 else
134 {
135 sendto_one_notice(target_p, ":%s is changing your privilege set to %s", source_p->name, privset->name);
136 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, "%s is changing the privilege set of %s to %s", get_oper_name(source_p), target_p->name, privset->name);
137 }
138 }
139
140 if (dodeoper)
141 {
142 const char *modeparv[4];
143 modeparv[0] = modeparv[1] = target_p->name;
144 modeparv[2] = "-o";
145 modeparv[3] = NULL;
146 user_mode(target_p, target_p, 3, modeparv);
147 }
148
149 if (dooper)
150 {
151 struct oper_conf oper;
152 oper.name = "<grant>";
153 oper.umodes = 0;
154 oper.snomask = 0;
155 oper.privset = privset;
156
157 oper_up(target_p, &oper);
158 }
159
160 target_p->localClient->privset = privset;
3b1c2aa6
AC
161 modeparv[0] = modeparv[1] = target_p->name;
162 modeparv[2] = "+";
163 modeparv[3] = NULL;
164 user_mode(target_p, target_p, 3, modeparv);
3b1c2aa6 165}