]> jfr.im git - solanum.git/blame - modules/m_whois.c
Don't send original error message if we're already on the channel we're forwarding to
[solanum.git] / modules / m_whois.c
CommitLineData
212380e3
AC
1/*
2 * ircd-ratbox: A slightly useful ircd.
3 * m_whois.c: Shows who a user is.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
22 * USA
212380e3
AC
23 */
24
25#include "stdinc.h"
212380e3
AC
26#include "client.h"
27#include "hash.h"
28#include "channel.h"
29#include "hash.h"
30#include "ircd.h"
31#include "numeric.h"
32#include "s_conf.h"
33#include "s_serv.h"
34#include "send.h"
4562c604 35#include "match.h"
212380e3 36#include "s_conf.h"
4016731b 37#include "logger.h"
212380e3
AC
38#include "msg.h"
39#include "parse.h"
40#include "modules.h"
41#include "hook.h"
42#include "s_newconf.h"
ae52fe0f 43#include "ipv4_from_ipv6.h"
7e132ff0 44#include "ratelimit.h"
77d3d2db 45#include "s_assert.h"
212380e3 46
eeabf33a
EM
47static const char whois_desc[] =
48 "Provides the WHOIS command to display information about a user";
49
212380e3
AC
50static void do_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]);
51static void single_whois(struct Client *source_p, struct Client *target_p, int operspy);
52
3c7d6fcc
EM
53static void m_whois(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
54static void ms_whois(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
212380e3
AC
55
56struct Message whois_msgtab = {
7baa37a9 57 "WHOIS", 0, 0, 0, 0,
212380e3
AC
58 {mg_unreg, {m_whois, 2}, {ms_whois, 2}, mg_ignore, mg_ignore, {m_whois, 2}}
59};
60
61int doing_whois_hook;
62int doing_whois_global_hook;
9e07c8f7 63int doing_whois_channel_visibility_hook;
212380e3
AC
64
65mapi_clist_av1 whois_clist[] = { &whois_msgtab, NULL };
66mapi_hlist_av1 whois_hlist[] = {
9e07c8f7
AC
67 { "doing_whois", &doing_whois_hook },
68 { "doing_whois_global", &doing_whois_global_hook },
69 { "doing_whois_channel_visibility", &doing_whois_channel_visibility_hook },
212380e3
AC
70 { NULL, NULL }
71};
72
3bf449fe 73DECLARE_MODULE_AV2(whois, NULL, NULL, whois_clist, whois_hlist, NULL, NULL, NULL, whois_desc);
212380e3
AC
74
75/*
76 * m_whois
212380e3
AC
77 * parv[1] = nickname masklist
78 */
3c7d6fcc 79static void
428ca87b 80m_whois(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
81{
82 static time_t last_used = 0;
83
84 if(parc > 2)
85 {
86 if(EmptyString(parv[2]))
87 {
88 sendto_one(source_p, form_str(ERR_NONICKNAMEGIVEN),
89 me.name, source_p->name);
3c7d6fcc 90 return;
212380e3
AC
91 }
92
93 if(!IsOper(source_p))
94 {
95 /* seeing as this is going across servers, we should limit it */
7e132ff0 96 if((last_used + ConfigFileEntry.pace_wait_simple) > rb_current_time() || !ratelimit_client(source_p, 2))
212380e3
AC
97 {
98 sendto_one(source_p, form_str(RPL_LOAD2HI),
99 me.name, source_p->name, "WHOIS");
55abcbb2 100 sendto_one_numeric(source_p, RPL_ENDOFWHOIS,
f7eac53d 101 form_str(RPL_ENDOFWHOIS), parv[2]);
3c7d6fcc 102 return;
212380e3
AC
103 }
104 else
e3354945 105 last_used = rb_current_time();
212380e3
AC
106 }
107
108 if(hunt_server(client_p, source_p, ":%s WHOIS %s :%s", 1, parc, parv) !=
109 HUNTED_ISME)
3c7d6fcc 110 return;
212380e3
AC
111
112 parv[1] = parv[2];
113
114 }
115 do_whois(client_p, source_p, parc, parv);
212380e3
AC
116}
117
118/*
119 * ms_whois
212380e3
AC
120 * parv[1] = server to reply
121 * parv[2] = nickname to whois
122 */
3c7d6fcc 123static void
428ca87b 124ms_whois(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
125{
126 struct Client *target_p;
127
128 /* note: early versions of ratbox allowed users to issue a remote
129 * whois with a blank parv[2], so we cannot treat it as a protocol
130 * violation. --anfl
131 */
132 if(parc < 3 || EmptyString(parv[2]))
133 {
134 sendto_one(source_p, form_str(ERR_NONICKNAMEGIVEN),
135 me.name, source_p->name);
3c7d6fcc 136 return;
212380e3
AC
137 }
138
139 /* check if parv[1] exists */
140 if((target_p = find_client(parv[1])) == NULL)
141 {
142 sendto_one_numeric(source_p, ERR_NOSUCHSERVER,
55abcbb2 143 form_str(ERR_NOSUCHSERVER),
212380e3 144 IsDigit(parv[1][0]) ? "*" : parv[1]);
3c7d6fcc 145 return;
212380e3
AC
146 }
147
148 /* if parv[1] isnt my client, or me, someone else is supposed
55abcbb2 149 * to be handling the request.. so send it to them
212380e3
AC
150 */
151 if(!MyClient(target_p) && !IsMe(target_p))
152 {
55abcbb2
KB
153 sendto_one(target_p, ":%s WHOIS %s :%s",
154 get_id(source_p, target_p),
212380e3 155 get_id(target_p, target_p), parv[2]);
3c7d6fcc 156 return;
212380e3
AC
157 }
158
159 /* ok, the target is either us, or a client on our server, so perform the whois
160 * but first, parv[1] == server to perform the whois on, parv[2] == person
161 * to whois, so make parv[1] = parv[2] so do_whois is ok -- fl_
162 */
163 parv[1] = parv[2];
164 do_whois(client_p, source_p, parc, parv);
212380e3
AC
165}
166
167/* do_whois
168 *
55abcbb2
KB
169 * inputs - pointer to
170 * output -
212380e3
AC
171 * side effects -
172 */
173static void
174do_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
175{
176 struct Client *target_p;
177 char *nick;
178 char *p = NULL;
179 int operspy = 0;
180
181 nick = LOCAL_COPY(parv[1]);
182 if((p = strchr(nick, ',')))
183 *p = '\0';
184
185 if(IsOperSpy(source_p) && *nick == '!')
186 {
187 operspy = 1;
188 nick++;
189 }
190
2ebef8d9 191 target_p = find_named_person(nick);
212380e3
AC
192 if(target_p != NULL)
193 {
194 if(operspy)
195 {
196 char buffer[BUFSIZE];
197
5203cba5 198 snprintf(buffer, sizeof(buffer), "%s!%s@%s %s",
212380e3 199 target_p->name, target_p->username,
c88cdb00 200 target_p->host, target_p->servptr->name);
212380e3
AC
201 report_operspy(source_p, "WHOIS", buffer);
202 }
203
204 single_whois(source_p, target_p, operspy);
205 }
206 else
207 sendto_one_numeric(source_p, ERR_NOSUCHNICK,
55abcbb2 208 form_str(ERR_NOSUCHNICK),
8a1e143f 209 nick);
212380e3 210
55abcbb2 211 sendto_one_numeric(source_p, RPL_ENDOFWHOIS,
212380e3 212 form_str(RPL_ENDOFWHOIS), parv[1]);
212380e3
AC
213}
214
215/*
216 * single_whois()
217 *
218 * Inputs - source_p client to report to
219 * - target_p client to report on
220 * Output - if found return 1
221 * Side Effects - do a single whois on given client
222 * writing results to source_p
223 */
224static void
225single_whois(struct Client *source_p, struct Client *target_p, int operspy)
226{
227 char buf[BUFSIZE];
5b96d9a6 228 rb_dlink_node *ptr;
212380e3
AC
229 struct membership *msptr;
230 struct Channel *chptr;
231 int cur_len = 0;
232 int mlen;
233 char *t;
234 int tlen;
235 hook_data_client hdata;
212380e3 236 int extra_space = 0;
ae52fe0f
JT
237#ifdef RB_IPV6
238 struct sockaddr_in ip4;
239#endif
212380e3 240
212380e3
AC
241 if(target_p->user == NULL)
242 {
243 s_assert(0);
244 return;
245 }
246
212380e3 247 sendto_one_numeric(source_p, RPL_WHOISUSER, form_str(RPL_WHOISUSER),
55abcbb2 248 target_p->name, target_p->username,
212380e3
AC
249 target_p->host, target_p->info);
250
5203cba5 251 cur_len = mlen = sprintf(buf, form_str(RPL_WHOISCHANNELS),
55abcbb2 252 get_id(&me, source_p), get_id(source_p, source_p),
212380e3
AC
253 target_p->name);
254
255 /* Make sure it won't overflow when sending it to the client
256 * in full names; note that serverhiding may require more space
257 * for a different server name (not done here) -- jilles
258 */
259 if (!MyConnect(source_p))
260 {
261 extra_space = strlen(source_p->name) - 9;
262 if (extra_space < 0)
263 extra_space = 0;
264 extra_space += strlen(me.name) - 2; /* make sure >= 0 */
265 cur_len += extra_space;
266 }
267
268 t = buf + mlen;
269
9e07c8f7
AC
270 hdata.client = source_p;
271 hdata.target = target_p;
272
04513cff 273 if (!IsService(target_p))
212380e3 274 {
5b96d9a6 275 RB_DLINK_FOREACH(ptr, target_p->user->channel.head)
04513cff
JT
276 {
277 msptr = ptr->data;
278 chptr = msptr->chptr;
212380e3 279
9e07c8f7
AC
280 hdata.chptr = chptr;
281
282 hdata.approved = ShowChannel(source_p, chptr);
283 call_hook(doing_whois_channel_visibility_hook, &hdata);
212380e3 284
9e07c8f7 285 if(hdata.approved || operspy)
212380e3 286 {
04513cff
JT
287 if((cur_len + strlen(chptr->chname) + 3) > (BUFSIZE - 5))
288 {
289 sendto_one(source_p, "%s", buf);
290 cur_len = mlen + extra_space;
291 t = buf + mlen;
292 }
293
5203cba5 294 tlen = sprintf(t, "%s%s%s ",
9e07c8f7 295 hdata.approved ? "" : "!",
04513cff
JT
296 find_channel_status(msptr, 1),
297 chptr->chname);
298 t += tlen;
299 cur_len += tlen;
212380e3 300 }
212380e3
AC
301 }
302 }
303
304 if(cur_len > mlen + extra_space)
305 sendto_one(source_p, "%s", buf);
306
307 sendto_one_numeric(source_p, RPL_WHOISSERVER, form_str(RPL_WHOISSERVER),
c88cdb00 308 target_p->name, target_p->servptr->name,
8170176a 309 target_p->servptr->info);
212380e3 310
c127b45b 311 if(target_p->user->away)
212380e3 312 sendto_one_numeric(source_p, RPL_AWAY, form_str(RPL_AWAY),
c127b45b 313 target_p->name, target_p->user->away);
212380e3 314
6da38a0a 315 if(IsOper(target_p) && (!ConfigFileEntry.hide_opers_in_whois || IsOper(source_p)))
212380e3
AC
316 {
317 sendto_one_numeric(source_p, RPL_WHOISOPERATOR, form_str(RPL_WHOISOPERATOR),
318 target_p->name,
319 IsService(target_p) ? ConfigFileEntry.servicestring :
320 (IsAdmin(target_p) ? GlobalSetOptions.adminstring :
321 GlobalSetOptions.operstring));
322 }
323
5810d36e 324 if(MyClient(target_p) && !EmptyString(target_p->localClient->opername) && IsOper(source_p))
72ad5c04
AC
325 {
326 char buf[512];
5203cba5 327 snprintf(buf, sizeof(buf), "is opered as %s, privset %s",
72ad5c04
AC
328 target_p->localClient->opername, target_p->localClient->privset->name);
329 sendto_one_numeric(source_p, RPL_WHOISSPECIAL, form_str(RPL_WHOISSPECIAL),
330 target_p->name, buf);
331 }
332
af7aaa84 333 if(IsSSLClient(target_p))
427a8d5d
AC
334 {
335 char cbuf[256] = "is using a secure connection";
336
337 if (MyClient(target_p) && target_p->localClient->cipher_string != NULL)
338 rb_snprintf_append(cbuf, sizeof(cbuf), " [%s]", target_p->localClient->cipher_string);
339
af7aaa84 340 sendto_one_numeric(source_p, RPL_WHOISSECURE, form_str(RPL_WHOISSECURE),
427a8d5d
AC
341 target_p->name, cbuf);
342 if((source_p == target_p || IsOper(source_p)) &&
343 target_p->certfp != NULL)
344 sendto_one_numeric(source_p, RPL_WHOISCERTFP,
345 form_str(RPL_WHOISCERTFP),
346 target_p->name, target_p->certfp);
347 }
af7aaa84 348
212380e3
AC
349 if(MyClient(target_p))
350 {
351 if (IsDynSpoof(target_p) && (IsOper(source_p) || source_p == target_p))
352 {
353 /* trick here: show a nonoper their own IP if
354 * dynamic spoofed but not if auth{} spoofed
355 * -- jilles */
356 ClearDynSpoof(target_p);
357 sendto_one_numeric(source_p, RPL_WHOISHOST,
358 form_str(RPL_WHOISHOST),
359 target_p->name, target_p->orighost,
360 show_ip(source_p, target_p) ? target_p->sockhost : "255.255.255.255");
361 SetDynSpoof(target_p);
362 }
363 else if(ConfigFileEntry.use_whois_actually && show_ip(source_p, target_p))
364 sendto_one_numeric(source_p, RPL_WHOISACTUALLY,
365 form_str(RPL_WHOISACTUALLY),
366 target_p->name, target_p->sockhost);
367
ae52fe0f 368#ifdef RB_IPV6
032ef5ef 369 if (GET_SS_FAMILY(&target_p->localClient->ip) == AF_INET6 &&
ae52fe0f
JT
370 (show_ip(source_p, target_p) ||
371 (source_p == target_p && !IsIPSpoof(target_p))) &&
372 ipv4_from_ipv6((struct sockaddr_in6 *)&target_p->localClient->ip, &ip4))
373 {
374 rb_inet_ntop_sock((struct sockaddr *)&ip4,
375 buf, sizeof buf);
376 sendto_one_numeric(source_p, RPL_WHOISTEXT,
377 "%s :Underlying IPv4 is %s",
378 target_p->name, buf);
379 }
380#endif /* RB_IPV6 */
381
212380e3 382 sendto_one_numeric(source_p, RPL_WHOISIDLE, form_str(RPL_WHOISIDLE),
55abcbb2
KB
383 target_p->name,
384 (long)(rb_current_time() - target_p->localClient->last),
77910830 385 (unsigned long)target_p->localClient->firsttime);
212380e3
AC
386 }
387 else
388 {
389 if (IsDynSpoof(target_p) && (IsOper(source_p) || source_p == target_p))
390 {
391 ClearDynSpoof(target_p);
392 sendto_one_numeric(source_p, RPL_WHOISHOST,
393 form_str(RPL_WHOISHOST),
394 target_p->name, target_p->orighost,
395 show_ip(source_p, target_p) && !EmptyString(target_p->sockhost) && strcmp(target_p->sockhost, "0")? target_p->sockhost : "255.255.255.255");
396 SetDynSpoof(target_p);
397 }
398 else if(ConfigFileEntry.use_whois_actually && show_ip(source_p, target_p) &&
399 !EmptyString(target_p->sockhost) && strcmp(target_p->sockhost, "0"))
400 {
401 sendto_one_numeric(source_p, RPL_WHOISACTUALLY,
402 form_str(RPL_WHOISACTUALLY),
403 target_p->name, target_p->sockhost);
55abcbb2 404
212380e3 405 }
212380e3
AC
406 }
407
212380e3
AC
408 /* doing_whois_hook must only be called for local clients,
409 * doing_whois_global_hook must only be called for local targets
410 */
411 /* it is important that these are called *before* RPL_ENDOFWHOIS is
412 * sent, services compatibility code depends on it. --anfl
413 */
414 if(MyClient(source_p))
415 call_hook(doing_whois_hook, &hdata);
416 else
417 call_hook(doing_whois_global_hook, &hdata);
212380e3 418}