]>
Commit | Line | Data |
---|---|---|
212380e3 | 1 | /* modules/m_testline.c |
55abcbb2 | 2 | * |
212380e3 AC |
3 | * Copyright (C) 2004 Lee Hardy <lee@leeh.co.uk> |
4 | * Copyright (C) 2004-2005 ircd-ratbox development team | |
5 | * | |
6 | * Redistribution and use in source and binary forms, with or without | |
7 | * modification, are permitted provided that the following conditions are | |
8 | * met: | |
9 | * | |
10 | * 1.Redistributions of source code must retain the above copyright notice, | |
11 | * this list of conditions and the following disclaimer. | |
12 | * 2.Redistributions in binary form must reproduce the above copyright | |
13 | * notice, this list of conditions and the following disclaimer in the | |
14 | * documentation and/or other materials provided with the distribution. | |
15 | * 3.The name of the author may not be used to endorse or promote products | |
16 | * derived from this software without specific prior written permission. | |
17 | * | |
18 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR | |
19 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED | |
20 | * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE | |
21 | * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, | |
22 | * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES | |
23 | * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR | |
24 | * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
25 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | |
26 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING | |
27 | * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE | |
28 | * POSSIBILITY OF SUCH DAMAGE. | |
212380e3 AC |
29 | */ |
30 | #include "stdinc.h" | |
212380e3 AC |
31 | #include "send.h" |
32 | #include "client.h" | |
33 | #include "modules.h" | |
34 | #include "msg.h" | |
add9f99d | 35 | #include "hash.h" |
212380e3 AC |
36 | #include "hostmask.h" |
37 | #include "numeric.h" | |
38 | #include "s_conf.h" | |
39 | #include "s_newconf.h" | |
83235e9e | 40 | #include "reject.h" |
212380e3 | 41 | |
eeabf33a EM |
42 | static const char testline_desc[] = "Provides the ability to test I/K/D/X lines and RESVs"; |
43 | ||
3c7d6fcc | 44 | static void mo_testline(struct MsgBuf *, struct Client *, struct Client *, int, const char **); |
4dc6ff3d | 45 | static void mo_testkline(struct MsgBuf *, struct Client *, struct Client *, int, const char **); |
3c7d6fcc | 46 | static void mo_testgecos(struct MsgBuf *, struct Client *, struct Client *, int, const char **); |
212380e3 AC |
47 | |
48 | struct Message testline_msgtab = { | |
7baa37a9 | 49 | "TESTLINE", 0, 0, 0, 0, |
96bfafc1 | 50 | {mg_unreg, mg_not_oper, mg_ignore, mg_ignore, mg_ignore, {mo_testline, 2}} |
212380e3 | 51 | }; |
4dc6ff3d EK |
52 | struct Message testkline_msgtab = { |
53 | "TESTKLINE", 0, 0, 0, 0, | |
54 | {mg_unreg, mg_not_oper, mg_ignore, mg_ignore, mg_ignore, {mo_testkline, 2}} | |
55 | }; | |
212380e3 | 56 | struct Message testgecos_msgtab = { |
7baa37a9 | 57 | "TESTGECOS", 0, 0, 0, 0, |
96bfafc1 | 58 | {mg_unreg, mg_not_oper, mg_ignore, mg_ignore, mg_ignore, {mo_testgecos, 2}} |
212380e3 AC |
59 | }; |
60 | ||
4dc6ff3d | 61 | mapi_clist_av1 testline_clist[] = { &testline_msgtab, &testkline_msgtab, &testgecos_msgtab, NULL }; |
eeabf33a | 62 | |
be9c3979 | 63 | DECLARE_MODULE_AV2(testline, NULL, NULL, testline_clist, NULL, NULL, NULL, NULL, testline_desc); |
212380e3 | 64 | |
3c7d6fcc | 65 | static void |
428ca87b | 66 | mo_testline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) |
212380e3 AC |
67 | { |
68 | struct ConfItem *aconf; | |
69 | struct ConfItem *resv_p; | |
e7046ee5 | 70 | struct rb_sockaddr_storage ip; |
212380e3 AC |
71 | char user_trunc[USERLEN + 1], notildeuser_trunc[USERLEN + 1]; |
72 | const char *name = NULL; | |
73 | const char *username = NULL; | |
74 | const char *host = NULL; | |
75 | char *mask; | |
76 | char *p; | |
77 | int host_mask; | |
78 | int type; | |
83235e9e | 79 | int duration; |
e5b12a61 JT |
80 | char *puser, *phost, *reason, *operreason; |
81 | char reasonbuf[BUFSIZE]; | |
212380e3 | 82 | |
58a490f9 EK |
83 | if (!HasPrivilege(source_p, "oper:testline")) |
84 | { | |
85 | sendto_one(source_p, form_str(ERR_NOPRIVS), | |
86 | me.name, source_p->name, "testline"); | |
87 | return; | |
88 | } | |
89 | ||
212380e3 AC |
90 | mask = LOCAL_COPY(parv[1]); |
91 | ||
add9f99d JT |
92 | if (IsChannelName(mask)) |
93 | { | |
94 | resv_p = hash_find_resv(mask); | |
95 | if (resv_p != NULL) | |
96 | { | |
97 | sendto_one(source_p, form_str(RPL_TESTLINE), | |
98 | me.name, source_p->name, | |
99 | resv_p->hold ? 'q' : 'Q', | |
e3354945 | 100 | resv_p->hold ? (long) ((resv_p->hold - rb_current_time()) / 60) : 0L, |
70ea02eb | 101 | resv_p->host, resv_p->passwd); |
add9f99d JT |
102 | /* this is a false positive, so make sure it isn't counted in stats q |
103 | * --nenolod | |
104 | */ | |
105 | resv_p->port--; | |
106 | } | |
107 | else | |
108 | sendto_one(source_p, form_str(RPL_NOTESTLINE), | |
109 | me.name, source_p->name, parv[1]); | |
3c7d6fcc | 110 | return; |
add9f99d JT |
111 | } |
112 | ||
212380e3 AC |
113 | if((p = strchr(mask, '!'))) |
114 | { | |
115 | *p++ = '\0'; | |
116 | name = mask; | |
117 | mask = p; | |
118 | ||
119 | if(EmptyString(mask)) | |
3c7d6fcc | 120 | return; |
212380e3 AC |
121 | } |
122 | ||
123 | if((p = strchr(mask, '@'))) | |
124 | { | |
125 | *p++ = '\0'; | |
126 | username = mask; | |
127 | host = p; | |
128 | ||
129 | if(EmptyString(host)) | |
3c7d6fcc | 130 | return; |
212380e3 AC |
131 | } |
132 | else | |
133 | host = mask; | |
134 | ||
135 | /* parses as an IP, check for a dline */ | |
29c92cf9 | 136 | if((type = parse_netmask(host, &ip, &host_mask)) != HM_HOST) |
212380e3 | 137 | { |
54ac8b60 VY |
138 | if(type == HM_IPV6) |
139 | aconf = find_dline((struct sockaddr *)&ip, AF_INET6); | |
140 | else | |
54ac8b60 | 141 | aconf = find_dline((struct sockaddr *)&ip, AF_INET); |
212380e3 AC |
142 | |
143 | if(aconf && aconf->status & CONF_DLINE) | |
144 | { | |
e5b12a61 | 145 | get_printable_kline(source_p, aconf, &phost, &reason, &puser, &operreason); |
5203cba5 | 146 | snprintf(reasonbuf, sizeof(reasonbuf), "%s%s%s", reason, |
e5b12a61 | 147 | operreason ? "|" : "", operreason ? operreason : ""); |
212380e3 AC |
148 | sendto_one(source_p, form_str(RPL_TESTLINE), |
149 | me.name, source_p->name, | |
150 | (aconf->flags & CONF_FLAGS_TEMPORARY) ? 'd' : 'D', | |
55abcbb2 KB |
151 | (aconf->flags & CONF_FLAGS_TEMPORARY) ? |
152 | (long) ((aconf->hold - rb_current_time()) / 60) : 0L, | |
e5b12a61 | 153 | phost, reasonbuf); |
212380e3 | 154 | |
3c7d6fcc | 155 | return; |
212380e3 | 156 | } |
83235e9e JT |
157 | /* Otherwise, aconf is an exempt{} */ |
158 | if(aconf == NULL && | |
159 | (duration = is_reject_ip((struct sockaddr *)&ip))) | |
160 | sendto_one(source_p, form_str(RPL_TESTLINE), | |
161 | me.name, source_p->name, | |
162 | '!', | |
0cce01d3 | 163 | duration / 60L, |
83235e9e JT |
164 | host, "Reject cache"); |
165 | if(aconf == NULL && | |
166 | (duration = is_throttle_ip((struct sockaddr *)&ip))) | |
167 | sendto_one(source_p, form_str(RPL_TESTLINE), | |
168 | me.name, source_p->name, | |
169 | '!', | |
0cce01d3 | 170 | duration / 60L, |
83235e9e | 171 | host, "Throttled"); |
212380e3 AC |
172 | } |
173 | ||
174 | if (username != NULL) | |
175 | { | |
f427c8b0 VY |
176 | rb_strlcpy(user_trunc, username, sizeof user_trunc); |
177 | rb_strlcpy(notildeuser_trunc, *username == '~' ? username + 1 : username, sizeof notildeuser_trunc); | |
212380e3 AC |
178 | } |
179 | else | |
180 | { | |
f427c8b0 VY |
181 | rb_strlcpy(user_trunc, "dummy", sizeof user_trunc); |
182 | rb_strlcpy(notildeuser_trunc, "dummy", sizeof notildeuser_trunc); | |
212380e3 AC |
183 | } |
184 | /* now look for a matching I/K/G */ | |
185 | if((aconf = find_address_conf(host, NULL, user_trunc, notildeuser_trunc, | |
186 | (type != HM_HOST) ? (struct sockaddr *)&ip : NULL, | |
187 | (type != HM_HOST) ? ( | |
55abcbb2 | 188 | (type == HM_IPV6) ? AF_INET6 : |
40c1fd47 | 189 | AF_INET) : 0, NULL))) |
212380e3 AC |
190 | { |
191 | static char buf[HOSTLEN+USERLEN+2]; | |
192 | ||
193 | if(aconf->status & CONF_KILL) | |
194 | { | |
1e57e391 | 195 | get_printable_kline(source_p, aconf, &phost, &reason, &puser, &operreason); |
5203cba5 | 196 | snprintf(buf, sizeof(buf), "%s@%s", |
1e57e391 | 197 | puser, phost); |
5203cba5 | 198 | snprintf(reasonbuf, sizeof(reasonbuf), "%s%s%s", reason, |
cb2540a6 | 199 | operreason ? "|" : "", operreason ? operreason : ""); |
212380e3 AC |
200 | sendto_one(source_p, form_str(RPL_TESTLINE), |
201 | me.name, source_p->name, | |
202 | (aconf->flags & CONF_FLAGS_TEMPORARY) ? 'k' : 'K', | |
55abcbb2 | 203 | (aconf->flags & CONF_FLAGS_TEMPORARY) ? |
e3354945 | 204 | (long) ((aconf->hold - rb_current_time()) / 60) : 0L, |
cb2540a6 | 205 | buf, reasonbuf); |
3c7d6fcc | 206 | return; |
212380e3 | 207 | } |
212380e3 AC |
208 | } |
209 | ||
210 | /* they asked us to check a nick, so hunt for resvs.. */ | |
211 | if(name && (resv_p = find_nick_resv(name))) | |
212 | { | |
213 | sendto_one(source_p, form_str(RPL_TESTLINE), | |
214 | me.name, source_p->name, | |
215 | resv_p->hold ? 'q' : 'Q', | |
e3354945 | 216 | resv_p->hold ? (long) ((resv_p->hold - rb_current_time()) / 60) : 0L, |
70ea02eb | 217 | resv_p->host, resv_p->passwd); |
212380e3 AC |
218 | |
219 | /* this is a false positive, so make sure it isn't counted in stats q | |
220 | * --nenolod | |
221 | */ | |
222 | resv_p->port--; | |
3c7d6fcc | 223 | return; |
212380e3 AC |
224 | } |
225 | ||
226 | /* no matching resv, we can print the I: if it exists */ | |
227 | if(aconf && aconf->status & CONF_CLIENT) | |
228 | { | |
229 | sendto_one_numeric(source_p, RPL_STATSILINE, form_str(RPL_STATSILINE), | |
27f616dd | 230 | aconf->info.name, EmptyString(aconf->spasswd) ? "<NULL>" : aconf->spasswd, |
59c3d09a | 231 | show_iline_prefix(source_p, aconf, aconf->user), |
212380e3 | 232 | aconf->host, aconf->port, aconf->className); |
3c7d6fcc | 233 | return; |
212380e3 AC |
234 | } |
235 | ||
236 | /* nothing matches.. */ | |
237 | sendto_one(source_p, form_str(RPL_NOTESTLINE), | |
238 | me.name, source_p->name, parv[1]); | |
212380e3 AC |
239 | } |
240 | ||
4dc6ff3d EK |
241 | |
242 | static void | |
243 | mo_testkline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) | |
244 | { | |
245 | struct ConfItem *aconf; | |
246 | struct rb_sockaddr_storage ip; | |
247 | char user_trunc[USERLEN + 1]; | |
248 | const char *username = NULL; | |
249 | const char *host = NULL; | |
250 | char *mask; | |
251 | char *p; | |
252 | int host_mask; | |
253 | int type; | |
254 | int duration; | |
255 | char *puser, *phost, *reason, *operreason; | |
256 | char reasonbuf[BUFSIZE]; | |
257 | ||
258 | if (!HasPrivilege(source_p, "oper:testline")) | |
259 | { | |
260 | sendto_one(source_p, form_str(ERR_NOPRIVS), | |
261 | me.name, source_p->name, "testline"); | |
262 | return; | |
263 | } | |
264 | ||
265 | mask = LOCAL_COPY(parv[1]); | |
266 | ||
267 | if ((p = strchr(mask, '!'))) | |
268 | { | |
269 | mask = p + 1; | |
270 | ||
271 | if(EmptyString(mask)) | |
272 | return; | |
273 | } | |
274 | ||
275 | if ((p = strchr(mask, '@'))) | |
276 | { | |
277 | *p++ = '\0'; | |
278 | username = mask; | |
279 | host = p; | |
280 | ||
281 | if(EmptyString(host)) | |
282 | return; | |
283 | } | |
284 | else | |
285 | { | |
286 | host = mask; | |
287 | } | |
288 | ||
289 | /* parses as an IP, check for a dline */ | |
290 | if ((type = parse_netmask(host, &ip, &host_mask)) != HM_HOST) | |
291 | { | |
292 | if(type == HM_IPV6) | |
293 | aconf = find_dline((struct sockaddr *)&ip, AF_INET6); | |
294 | else | |
295 | aconf = find_dline((struct sockaddr *)&ip, AF_INET); | |
296 | ||
297 | if(aconf && aconf->status & CONF_DLINE) | |
298 | { | |
299 | get_printable_kline(source_p, aconf, &phost, &reason, &puser, &operreason); | |
300 | snprintf(reasonbuf, sizeof(reasonbuf), "%s%s%s", reason, | |
301 | operreason ? "|" : "", operreason ? operreason : ""); | |
302 | sendto_one(source_p, form_str(RPL_TESTLINE), | |
303 | me.name, source_p->name, | |
304 | (aconf->flags & CONF_FLAGS_TEMPORARY) ? 'd' : 'D', | |
305 | (aconf->flags & CONF_FLAGS_TEMPORARY) ? | |
306 | (long) ((aconf->hold - rb_current_time()) / 60) : 0L, | |
307 | phost, reasonbuf); | |
308 | ||
309 | return; | |
310 | } | |
311 | /* Otherwise, aconf is an exempt{} */ | |
312 | if (aconf == NULL && (duration = is_reject_ip((struct sockaddr *)&ip))) | |
313 | sendto_one(source_p, form_str(RPL_TESTLINE), | |
314 | me.name, source_p->name, | |
315 | '!', | |
316 | duration / 60L, | |
317 | host, "Reject cache"); | |
318 | if (aconf == NULL && (duration = is_throttle_ip((struct sockaddr *)&ip))) | |
319 | sendto_one(source_p, form_str(RPL_TESTLINE), | |
320 | me.name, source_p->name, | |
321 | '!', | |
322 | duration / 60L, | |
323 | host, "Throttled"); | |
324 | } | |
325 | ||
326 | if (username != NULL) | |
327 | rb_strlcpy(user_trunc, username, sizeof user_trunc); | |
328 | else | |
329 | rb_strlcpy(user_trunc, "dummy", sizeof user_trunc); | |
330 | ||
331 | aconf = find_conf_by_address(host, | |
332 | type != HM_HOST ? host : NULL, | |
333 | NULL, | |
334 | type != HM_HOST ? (struct sockaddr *)&ip : NULL, | |
335 | CONF_KILL, | |
336 | type == HM_IPV6 ? AF_INET6 : AF_INET, | |
337 | user_trunc, NULL); | |
338 | ||
339 | if (aconf != NULL && aconf->status & CONF_KILL) | |
340 | { | |
341 | static char buf[HOSTLEN+USERLEN+2]; | |
342 | ||
343 | get_printable_kline(source_p, aconf, &phost, &reason, &puser, &operreason); | |
344 | snprintf(buf, sizeof(buf), "%s@%s", | |
345 | puser, phost); | |
346 | snprintf(reasonbuf, sizeof(reasonbuf), "%s%s%s", reason, | |
347 | operreason ? "|" : "", operreason ? operreason : ""); | |
348 | sendto_one(source_p, form_str(RPL_TESTLINE), | |
349 | me.name, source_p->name, | |
350 | (aconf->flags & CONF_FLAGS_TEMPORARY) ? 'k' : 'K', | |
351 | (aconf->flags & CONF_FLAGS_TEMPORARY) ? | |
352 | (long) ((aconf->hold - rb_current_time()) / 60) : 0L, | |
353 | buf, reasonbuf); | |
354 | return; | |
355 | } | |
356 | ||
357 | sendto_one(source_p, form_str(RPL_NOTESTLINE), | |
358 | me.name, source_p->name, parv[1]); | |
359 | } | |
360 | ||
3c7d6fcc | 361 | static void |
428ca87b | 362 | mo_testgecos(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) |
212380e3 AC |
363 | { |
364 | struct ConfItem *aconf; | |
365 | ||
58a490f9 EK |
366 | if (!HasPrivilege(source_p, "oper:testline")) |
367 | { | |
368 | sendto_one(source_p, form_str(ERR_NOPRIVS), | |
369 | me.name, source_p->name, "testline"); | |
370 | return; | |
371 | } | |
372 | ||
212380e3 AC |
373 | if(!(aconf = find_xline(parv[1], 0))) |
374 | { | |
375 | sendto_one(source_p, form_str(RPL_NOTESTLINE), | |
376 | me.name, source_p->name, parv[1]); | |
3c7d6fcc | 377 | return; |
212380e3 AC |
378 | } |
379 | ||
380 | sendto_one(source_p, form_str(RPL_TESTLINE), | |
381 | me.name, source_p->name, | |
382 | aconf->hold ? 'x' : 'X', | |
e3354945 | 383 | aconf->hold ? (long) ((aconf->hold - rb_current_time()) / 60) : 0L, |
70ea02eb | 384 | aconf->host, aconf->passwd); |
212380e3 | 385 | } |