2 * ircd-ratbox: A slightly useful ircd.
3 * channel.c: Controls channels.
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
34 #include "s_serv.h" /* captab */
38 #include "s_conf.h" /* ConfigFileEntry, ConfigChannel */
39 #include "s_newconf.h"
43 struct config_channel_entry ConfigChannel
;
44 rb_dlink_list global_channel_list
;
45 static rb_bh
*channel_heap
;
46 static rb_bh
*ban_heap
;
47 static rb_bh
*topic_heap
;
48 static rb_bh
*member_heap
;
50 static void free_topic(struct Channel
*chptr
);
52 static int h_can_join
;
53 static int h_can_send
;
54 int h_get_channel_access
;
60 * side effects - initialises the various blockheaps
65 channel_heap
= rb_bh_create(sizeof(struct Channel
), CHANNEL_HEAP_SIZE
, "channel_heap");
66 ban_heap
= rb_bh_create(sizeof(struct Ban
), BAN_HEAP_SIZE
, "ban_heap");
67 topic_heap
= rb_bh_create(TOPICLEN
+ 1 + USERHOST_REPLYLEN
, TOPIC_HEAP_SIZE
, "topic_heap");
68 member_heap
= rb_bh_create(sizeof(struct membership
), MEMBER_HEAP_SIZE
, "member_heap");
70 h_can_join
= register_hook("can_join");
71 h_can_send
= register_hook("can_send");
72 h_get_channel_access
= register_hook("get_channel_access");
76 * allocate_channel - Allocates a channel
79 allocate_channel(const char *chname
)
81 struct Channel
*chptr
;
82 chptr
= rb_bh_alloc(channel_heap
);
83 chptr
->chname
= rb_strdup(chname
);
88 free_channel(struct Channel
*chptr
)
90 rb_free(chptr
->chname
);
91 rb_free(chptr
->mode_lock
);
92 rb_bh_free(channel_heap
, chptr
);
96 allocate_ban(const char *banstr
, const char *who
, const char *forward
)
99 bptr
= rb_bh_alloc(ban_heap
);
100 bptr
->banstr
= rb_strdup(banstr
);
101 bptr
->who
= rb_strdup(who
);
102 bptr
->forward
= forward
? rb_strdup(forward
) : NULL
;
108 free_ban(struct Ban
*bptr
)
110 rb_free(bptr
->banstr
);
112 rb_free(bptr
->forward
);
113 rb_bh_free(ban_heap
, bptr
);
117 * send_channel_join()
119 * input - channel to join, client joining.
121 * side effects - none
124 send_channel_join(struct Channel
*chptr
, struct Client
*client_p
)
126 if (!IsClient(client_p
))
129 sendto_channel_local_with_capability(ALL_MEMBERS
, NOCAPS
, CLICAP_EXTENDED_JOIN
, chptr
, ":%s!%s@%s JOIN %s",
130 client_p
->name
, client_p
->username
, client_p
->host
, chptr
->chname
);
132 sendto_channel_local_with_capability(ALL_MEMBERS
, CLICAP_EXTENDED_JOIN
, NOCAPS
, chptr
, ":%s!%s@%s JOIN %s %s :%s",
133 client_p
->name
, client_p
->username
, client_p
->host
, chptr
->chname
,
134 EmptyString(client_p
->user
->suser
) ? "*" : client_p
->user
->suser
,
137 /* Send away message to away-notify enabled clients. */
138 if (client_p
->user
->away
)
139 sendto_channel_local_with_capability_butone(client_p
, ALL_MEMBERS
, CLICAP_AWAY_NOTIFY
, NOCAPS
, chptr
,
140 ":%s!%s@%s AWAY :%s", client_p
->name
, client_p
->username
,
141 client_p
->host
, client_p
->user
->away
);
144 /* find_channel_membership()
146 * input - channel to find them in, client to find
147 * output - membership of client in channel, else NULL
151 find_channel_membership(struct Channel
*chptr
, struct Client
*client_p
)
153 struct membership
*msptr
;
156 if(!IsClient(client_p
))
159 /* Pick the most efficient list to use to be nice to things like
160 * CHANSERV which could be in a large number of channels
162 if(rb_dlink_list_length(&chptr
->members
) < rb_dlink_list_length(&client_p
->user
->channel
))
164 RB_DLINK_FOREACH(ptr
, chptr
->members
.head
)
168 if(msptr
->client_p
== client_p
)
174 RB_DLINK_FOREACH(ptr
, client_p
->user
->channel
.head
)
178 if(msptr
->chptr
== chptr
)
186 /* find_channel_status()
188 * input - membership to get status for, whether we can combine flags
189 * output - flags of user on channel
193 find_channel_status(struct membership
*msptr
, int combine
)
195 static char buffer
[3];
214 /* add_user_to_channel()
216 * input - channel to add client to, client to add, channel flags
218 * side effects - user is added to channel
221 add_user_to_channel(struct Channel
*chptr
, struct Client
*client_p
, int flags
)
223 struct membership
*msptr
;
225 s_assert(client_p
->user
!= NULL
);
226 if(client_p
->user
== NULL
)
229 msptr
= rb_bh_alloc(member_heap
);
231 msptr
->chptr
= chptr
;
232 msptr
->client_p
= client_p
;
233 msptr
->flags
= flags
;
235 rb_dlinkAdd(msptr
, &msptr
->usernode
, &client_p
->user
->channel
);
236 rb_dlinkAdd(msptr
, &msptr
->channode
, &chptr
->members
);
238 if(MyClient(client_p
))
239 rb_dlinkAdd(msptr
, &msptr
->locchannode
, &chptr
->locmembers
);
242 /* remove_user_from_channel()
244 * input - membership pointer to remove from channel
246 * side effects - membership (thus user) is removed from channel
249 remove_user_from_channel(struct membership
*msptr
)
251 struct Client
*client_p
;
252 struct Channel
*chptr
;
253 s_assert(msptr
!= NULL
);
257 client_p
= msptr
->client_p
;
258 chptr
= msptr
->chptr
;
260 rb_dlinkDelete(&msptr
->usernode
, &client_p
->user
->channel
);
261 rb_dlinkDelete(&msptr
->channode
, &chptr
->members
);
263 if(client_p
->servptr
== &me
)
264 rb_dlinkDelete(&msptr
->locchannode
, &chptr
->locmembers
);
266 if(!(chptr
->mode
.mode
& MODE_PERMANENT
) && rb_dlink_list_length(&chptr
->members
) <= 0)
267 destroy_channel(chptr
);
269 rb_bh_free(member_heap
, msptr
);
274 /* remove_user_from_channels()
276 * input - user to remove from all channels
278 * side effects - user is removed from all channels
281 remove_user_from_channels(struct Client
*client_p
)
283 struct Channel
*chptr
;
284 struct membership
*msptr
;
286 rb_dlink_node
*next_ptr
;
291 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, client_p
->user
->channel
.head
)
294 chptr
= msptr
->chptr
;
296 rb_dlinkDelete(&msptr
->channode
, &chptr
->members
);
298 if(client_p
->servptr
== &me
)
299 rb_dlinkDelete(&msptr
->locchannode
, &chptr
->locmembers
);
301 if(!(chptr
->mode
.mode
& MODE_PERMANENT
) && rb_dlink_list_length(&chptr
->members
) <= 0)
302 destroy_channel(chptr
);
304 rb_bh_free(member_heap
, msptr
);
307 client_p
->user
->channel
.head
= client_p
->user
->channel
.tail
= NULL
;
308 client_p
->user
->channel
.length
= 0;
311 /* invalidate_bancache_user()
313 * input - user to invalidate ban cache for
315 * side effects - ban cache is invalidated for all memberships of that user
316 * to be used after a nick change
319 invalidate_bancache_user(struct Client
*client_p
)
321 struct membership
*msptr
;
327 RB_DLINK_FOREACH(ptr
, client_p
->user
->channel
.head
)
331 msptr
->flags
&= ~CHFL_BANNED
;
335 /* check_channel_name()
337 * input - channel name
338 * output - true if valid channel name, else false
342 check_channel_name(const char *name
)
344 s_assert(name
!= NULL
);
348 for (; *name
; ++name
)
350 if(!IsChanChar(*name
))
357 /* free_channel_list()
359 * input - rb_dlink list to free
361 * side effects - list of b/e/I modes is cleared
364 free_channel_list(rb_dlink_list
* list
)
367 rb_dlink_node
*next_ptr
;
368 struct Ban
*actualBan
;
370 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, list
->head
)
372 actualBan
= ptr
->data
;
376 list
->head
= list
->tail
= NULL
;
382 * input - channel to destroy
384 * side effects - channel is obliterated
387 destroy_channel(struct Channel
*chptr
)
389 rb_dlink_node
*ptr
, *next_ptr
;
391 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, chptr
->invites
.head
)
393 del_invite(chptr
, ptr
->data
);
396 /* free all bans/exceptions/denies */
397 free_channel_list(&chptr
->banlist
);
398 free_channel_list(&chptr
->exceptlist
);
399 free_channel_list(&chptr
->invexlist
);
400 free_channel_list(&chptr
->quietlist
);
405 rb_dlinkDelete(&chptr
->node
, &global_channel_list
);
406 del_from_channel_hash(chptr
->chname
, chptr
);
410 /* channel_pub_or_secret()
413 * output - "=" if public, "@" if secret, else "*"
417 channel_pub_or_secret(struct Channel
*chptr
)
419 if(PubChannel(chptr
))
421 else if(SecretChannel(chptr
))
426 /* channel_member_names()
428 * input - channel to list, client to list to, show endofnames
430 * side effects - client is given list of users on channel
433 channel_member_names(struct Channel
*chptr
, struct Client
*client_p
, int show_eon
)
435 struct membership
*msptr
;
436 struct Client
*target_p
;
444 int stack
= IsCapable(client_p
, CLICAP_MULTI_PREFIX
);
446 if(ShowChannel(client_p
, chptr
))
448 is_member
= IsMember(client_p
, chptr
);
450 cur_len
= mlen
= sprintf(lbuf
, form_str(RPL_NAMREPLY
),
451 me
.name
, client_p
->name
,
452 channel_pub_or_secret(chptr
), chptr
->chname
);
456 RB_DLINK_FOREACH(ptr
, chptr
->members
.head
)
459 target_p
= msptr
->client_p
;
461 if(IsInvisible(target_p
) && !is_member
)
464 if (IsCapable(client_p
, CLICAP_USERHOST_IN_NAMES
))
466 /* space, possible "@+" prefix */
467 if (cur_len
+ strlen(target_p
->name
) + strlen(target_p
->username
) + strlen(target_p
->host
) + 5 >= BUFSIZE
- 5)
470 sendto_one(client_p
, "%s", lbuf
);
475 tlen
= sprintf(t
, "%s%s!%s@%s ", find_channel_status(msptr
, stack
),
476 target_p
->name
, target_p
->username
, target_p
->host
);
480 /* space, possible "@+" prefix */
481 if(cur_len
+ strlen(target_p
->name
) + 3 >= BUFSIZE
- 3)
484 sendto_one(client_p
, "%s", lbuf
);
489 tlen
= sprintf(t
, "%s%s ", find_channel_status(msptr
, stack
),
497 /* The old behaviour here was to always output our buffer,
498 * even if there are no clients we can show. This happens
499 * when a client does "NAMES" with no parameters, and all
500 * the clients on a -sp channel are +i. I dont see a good
501 * reason for keeping that behaviour, as it just wastes
507 sendto_one(client_p
, "%s", lbuf
);
512 sendto_one(client_p
, form_str(RPL_ENDOFNAMES
),
513 me
.name
, client_p
->name
, chptr
->chname
);
518 * input - channel to remove invite from, client to remove
520 * side effects - user is removed from invite list, if exists
523 del_invite(struct Channel
*chptr
, struct Client
*who
)
525 rb_dlinkFindDestroy(who
, &chptr
->invites
);
526 rb_dlinkFindDestroy(chptr
, &who
->user
->invited
);
531 * input - channel to check bans for, ban list (banlist or quietlist),
532 * user to check bans against, optional prebuilt buffers,
533 * optional forward channel pointer
534 * output - 1 if banned, else 0
538 is_banned_list(struct Channel
*chptr
, rb_dlink_list
*list
,
539 struct Client
*who
, struct membership
*msptr
,
540 const char *s
, const char *s2
, const char **forward
)
542 char src_host
[NICKLEN
+ USERLEN
+ HOSTLEN
+ 6];
543 char src_iphost
[NICKLEN
+ USERLEN
+ HOSTLEN
+ 6];
544 char src_althost
[NICKLEN
+ USERLEN
+ HOSTLEN
+ 6];
545 char src_ip4host
[NICKLEN
+ USERLEN
+ HOSTLEN
+ 6];
548 struct sockaddr_in ip4
;
550 struct Ban
*actualBan
= NULL
;
551 struct Ban
*actualExcept
= NULL
;
556 /* if the buffers havent been built, do it here */
559 sprintf(src_host
, "%s!%s@%s", who
->name
, who
->username
, who
->host
);
560 sprintf(src_iphost
, "%s!%s@%s", who
->name
, who
->username
, who
->sockhost
);
565 if(who
->localClient
->mangledhost
!= NULL
)
567 /* if host mangling mode enabled, also check their real host */
568 if(!strcmp(who
->host
, who
->localClient
->mangledhost
))
570 sprintf(src_althost
, "%s!%s@%s", who
->name
, who
->username
, who
->orighost
);
573 /* if host mangling mode not enabled and no other spoof,
574 * also check the mangled form of their host */
575 else if (!IsDynSpoof(who
))
577 sprintf(src_althost
, "%s!%s@%s", who
->name
, who
->username
, who
->localClient
->mangledhost
);
582 if(GET_SS_FAMILY(&who
->localClient
->ip
) == AF_INET6
&&
583 rb_ipv4_from_ipv6((const struct sockaddr_in6
*)&who
->localClient
->ip
, &ip4
))
585 sprintf(src_ip4host
, "%s!%s@", who
->name
, who
->username
);
586 s4
= src_ip4host
+ strlen(src_ip4host
);
587 rb_inet_ntop_sock((struct sockaddr
*)&ip4
,
588 s4
, src_ip4host
+ sizeof src_ip4host
- s4
);
593 RB_DLINK_FOREACH(ptr
, list
->head
)
595 actualBan
= ptr
->data
;
596 if(match(actualBan
->banstr
, s
) ||
597 match(actualBan
->banstr
, s2
) ||
598 match_cidr(actualBan
->banstr
, s2
) ||
599 match_extban(actualBan
->banstr
, who
, chptr
, CHFL_BAN
) ||
600 (s3
!= NULL
&& match(actualBan
->banstr
, s3
))
603 (s4
!= NULL
&& (match(actualBan
->banstr
, s4
) || match_cidr(actualBan
->banstr
, s4
)))
611 if((actualBan
!= NULL
) && ConfigChannel
.use_except
)
613 RB_DLINK_FOREACH(ptr
, chptr
->exceptlist
.head
)
615 actualExcept
= ptr
->data
;
617 /* theyre exempted.. */
618 if(match(actualExcept
->banstr
, s
) ||
619 match(actualExcept
->banstr
, s2
) ||
620 match_cidr(actualExcept
->banstr
, s2
) ||
621 match_extban(actualExcept
->banstr
, who
, chptr
, CHFL_EXCEPTION
) ||
622 (s3
!= NULL
&& match(actualExcept
->banstr
, s3
)))
624 /* cache the fact theyre not banned */
627 msptr
->bants
= chptr
->bants
;
628 msptr
->flags
&= ~CHFL_BANNED
;
631 return CHFL_EXCEPTION
;
636 /* cache the banned/not banned status */
639 msptr
->bants
= chptr
->bants
;
641 if(actualBan
!= NULL
)
643 msptr
->flags
|= CHFL_BANNED
;
648 msptr
->flags
&= ~CHFL_BANNED
;
653 if (actualBan
&& actualBan
->forward
&& forward
)
654 *forward
= actualBan
->forward
;
656 return ((actualBan
? CHFL_BAN
: 0));
661 * input - channel to check bans for, user to check bans against
662 * optional prebuilt buffers, optional forward channel pointer
663 * output - 1 if banned, else 0
667 is_banned(struct Channel
*chptr
, struct Client
*who
, struct membership
*msptr
,
668 const char *s
, const char *s2
, const char **forward
)
671 if (chptr
->last_checked_client
!= NULL
&&
672 who
== chptr
->last_checked_client
&&
673 chptr
->last_checked_type
== CHFL_BAN
&&
674 chptr
->last_checked_ts
> chptr
->bants
)
675 return chptr
->last_checked_result
;
677 chptr
->last_checked_client
= who
;
678 chptr
->last_checked_type
= CHFL_BAN
;
679 chptr
->last_checked_result
= is_banned_list(chptr
, &chptr
->banlist
, who
, msptr
, s
, s2
, forward
);
680 chptr
->last_checked_ts
= rb_current_time();
682 return chptr
->last_checked_result
;
684 return is_banned_list(chptr
, &chptr
->banlist
, who
, msptr
, s
, s2
, forward
);
690 * input - channel to check bans for, user to check bans against
691 * optional prebuilt buffers
692 * output - 1 if banned, else 0
696 is_quieted(struct Channel
*chptr
, struct Client
*who
, struct membership
*msptr
,
697 const char *s
, const char *s2
)
700 if (chptr
->last_checked_client
!= NULL
&&
701 who
== chptr
->last_checked_client
&&
702 chptr
->last_checked_type
== CHFL_QUIET
&&
703 chptr
->last_checked_ts
> chptr
->bants
)
704 return chptr
->last_checked_result
;
706 chptr
->last_checked_client
= who
;
707 chptr
->last_checked_type
= CHFL_QUIET
;
708 chptr
->last_checked_result
= is_banned_list(chptr
, &chptr
->quietlist
, who
, msptr
, s
, s2
, NULL
);
709 chptr
->last_checked_ts
= rb_current_time();
711 return chptr
->last_checked_result
;
713 return is_banned_list(chptr
, &chptr
->quietlist
, who
, msptr
, s
, s2
, NULL
);
719 * input - client to check, channel to check for, key
720 * output - reason for not being able to join, else 0, channel name to forward to
722 * caveats - this function should only be called on a local user.
725 can_join(struct Client
*source_p
, struct Channel
*chptr
, const char *key
, const char **forward
)
727 rb_dlink_node
*invite
= NULL
;
729 struct Ban
*invex
= NULL
;
730 char src_host
[NICKLEN
+ USERLEN
+ HOSTLEN
+ 6];
731 char src_iphost
[NICKLEN
+ USERLEN
+ HOSTLEN
+ 6];
732 char src_althost
[NICKLEN
+ USERLEN
+ HOSTLEN
+ 6];
735 hook_data_channel moduledata
;
737 s_assert(source_p
->localClient
!= NULL
);
739 moduledata
.client
= source_p
;
740 moduledata
.chptr
= chptr
;
741 moduledata
.approved
= 0;
743 sprintf(src_host
, "%s!%s@%s", source_p
->name
, source_p
->username
, source_p
->host
);
744 sprintf(src_iphost
, "%s!%s@%s", source_p
->name
, source_p
->username
, source_p
->sockhost
);
745 if(source_p
->localClient
->mangledhost
!= NULL
)
747 /* if host mangling mode enabled, also check their real host */
748 if(!strcmp(source_p
->host
, source_p
->localClient
->mangledhost
))
750 sprintf(src_althost
, "%s!%s@%s", source_p
->name
, source_p
->username
, source_p
->orighost
);
753 /* if host mangling mode not enabled and no other spoof,
754 * also check the mangled form of their host */
755 else if (!IsDynSpoof(source_p
))
757 sprintf(src_althost
, "%s!%s@%s", source_p
->name
, source_p
->username
, source_p
->localClient
->mangledhost
);
762 if((is_banned(chptr
, source_p
, NULL
, src_host
, src_iphost
, forward
)) == CHFL_BAN
)
764 moduledata
.approved
= ERR_BANNEDFROMCHAN
;
765 goto finish_join_check
;
768 if(*chptr
->mode
.key
&& (EmptyString(key
) || irccmp(chptr
->mode
.key
, key
)))
770 moduledata
.approved
= ERR_BADCHANNELKEY
;
771 goto finish_join_check
;
774 /* All checks from this point on will forward... */
776 *forward
= chptr
->mode
.forward
;
778 if(chptr
->mode
.mode
& MODE_INVITEONLY
)
780 RB_DLINK_FOREACH(invite
, source_p
->user
->invited
.head
)
782 if(invite
->data
== chptr
)
787 if(!ConfigChannel
.use_invex
)
788 moduledata
.approved
= ERR_INVITEONLYCHAN
;
789 RB_DLINK_FOREACH(ptr
, chptr
->invexlist
.head
)
792 if(match(invex
->banstr
, src_host
)
793 || match(invex
->banstr
, src_iphost
)
794 || match_cidr(invex
->banstr
, src_iphost
)
795 || match_extban(invex
->banstr
, source_p
, chptr
, CHFL_INVEX
)
796 || (use_althost
&& match(invex
->banstr
, src_althost
)))
800 moduledata
.approved
= ERR_INVITEONLYCHAN
;
804 if(chptr
->mode
.limit
&&
805 rb_dlink_list_length(&chptr
->members
) >= (unsigned long) chptr
->mode
.limit
)
806 i
= ERR_CHANNELISFULL
;
807 if(chptr
->mode
.mode
& MODE_REGONLY
&& EmptyString(source_p
->user
->suser
))
808 i
= ERR_NEEDREGGEDNICK
;
809 /* join throttling stuff --nenolod */
810 else if(chptr
->mode
.join_num
> 0 && chptr
->mode
.join_time
> 0)
812 if ((rb_current_time() - chptr
->join_delta
<=
813 chptr
->mode
.join_time
) && (chptr
->join_count
>=
814 chptr
->mode
.join_num
))
818 /* allow /invite to override +l/+r/+j also -- jilles */
819 if (i
!= 0 && invite
== NULL
)
821 RB_DLINK_FOREACH(invite
, source_p
->user
->invited
.head
)
823 if(invite
->data
== chptr
)
827 moduledata
.approved
= i
;
831 call_hook(h_can_join
, &moduledata
);
833 return moduledata
.approved
;
838 * input - user to check in channel, membership pointer
839 * output - whether can explicitly send or not, else CAN_SEND_NONOP
843 can_send(struct Channel
*chptr
, struct Client
*source_p
, struct membership
*msptr
)
845 hook_data_channel_approval moduledata
;
847 moduledata
.approved
= CAN_SEND_NONOP
;
848 moduledata
.dir
= MODE_QUERY
;
850 if(IsServer(source_p
) || IsService(source_p
))
853 if(MyClient(source_p
) && hash_find_resv(chptr
->chname
) &&
854 !IsOper(source_p
) && !IsExemptResv(source_p
))
855 moduledata
.approved
= CAN_SEND_NO
;
859 msptr
= find_channel_membership(chptr
, source_p
);
863 /* if its +m or +n and theyre not in the channel,
864 * they cant send. we dont check bans here because
865 * theres no possibility of caching them --fl
867 if(chptr
->mode
.mode
& MODE_NOPRIVMSGS
|| chptr
->mode
.mode
& MODE_MODERATED
)
868 moduledata
.approved
= CAN_SEND_NO
;
870 moduledata
.approved
= CAN_SEND_NONOP
;
872 return moduledata
.approved
;
876 if(chptr
->mode
.mode
& MODE_MODERATED
)
877 moduledata
.approved
= CAN_SEND_NO
;
879 if(MyClient(source_p
))
881 /* cached can_send */
882 if(msptr
->bants
== chptr
->bants
)
884 if(can_send_banned(msptr
))
885 moduledata
.approved
= CAN_SEND_NO
;
887 else if(is_banned(chptr
, source_p
, msptr
, NULL
, NULL
, NULL
) == CHFL_BAN
888 || is_quieted(chptr
, source_p
, msptr
, NULL
, NULL
) == CHFL_BAN
)
889 moduledata
.approved
= CAN_SEND_NO
;
892 if(is_chanop_voiced(msptr
))
893 moduledata
.approved
= CAN_SEND_OPV
;
895 moduledata
.client
= source_p
;
896 moduledata
.chptr
= msptr
->chptr
;
897 moduledata
.msptr
= msptr
;
898 moduledata
.target
= NULL
;
899 moduledata
.dir
= (moduledata
.approved
== CAN_SEND_NO
) ? MODE_ADD
: MODE_QUERY
;
901 call_hook(h_can_send
, &moduledata
);
903 return moduledata
.approved
;
907 * flood_attack_channel
908 * inputs - flag 0 if PRIVMSG 1 if NOTICE. RFC
909 * says NOTICE must not auto reply
910 * - pointer to source Client
911 * - pointer to target channel
912 * output - true if target is under flood attack
913 * side effects - check for flood attack on target chptr
916 flood_attack_channel(int p_or_n
, struct Client
*source_p
, struct Channel
*chptr
, char *chname
)
920 if(GlobalSetOptions
.floodcount
&& MyClient(source_p
))
922 if((chptr
->first_received_message_time
+ 1) < rb_current_time())
924 delta
= rb_current_time() - chptr
->first_received_message_time
;
925 chptr
->received_number_of_privmsgs
-= delta
;
926 chptr
->first_received_message_time
= rb_current_time();
927 if(chptr
->received_number_of_privmsgs
<= 0)
929 chptr
->received_number_of_privmsgs
= 0;
930 chptr
->flood_noticed
= 0;
934 if((chptr
->received_number_of_privmsgs
>= GlobalSetOptions
.floodcount
)
935 || chptr
->flood_noticed
)
937 if(chptr
->flood_noticed
== 0)
939 sendto_realops_snomask(SNO_BOTS
, *chptr
->chname
== '&' ? L_ALL
: L_NETWIDE
,
940 "Possible Flooder %s[%s@%s] on %s target: %s",
941 source_p
->name
, source_p
->username
,
943 source_p
->servptr
->name
, chptr
->chname
);
944 chptr
->flood_noticed
= 1;
946 /* Add a bit of penalty */
947 chptr
->received_number_of_privmsgs
+= 2;
949 if(MyClient(source_p
) && (p_or_n
!= 1))
951 ":%s NOTICE %s :*** Message to %s throttled due to flooding",
952 me
.name
, source_p
->name
, chptr
->chname
);
956 chptr
->received_number_of_privmsgs
++;
962 /* find_bannickchange_channel()
963 * Input: client to check
964 * Output: channel preventing nick change
967 find_bannickchange_channel(struct Client
*client_p
)
969 struct Channel
*chptr
;
970 struct membership
*msptr
;
972 char src_host
[NICKLEN
+ USERLEN
+ HOSTLEN
+ 6];
973 char src_iphost
[NICKLEN
+ USERLEN
+ HOSTLEN
+ 6];
975 if (!MyClient(client_p
))
978 sprintf(src_host
, "%s!%s@%s", client_p
->name
, client_p
->username
, client_p
->host
);
979 sprintf(src_iphost
, "%s!%s@%s", client_p
->name
, client_p
->username
, client_p
->sockhost
);
981 RB_DLINK_FOREACH(ptr
, client_p
->user
->channel
.head
)
984 chptr
= msptr
->chptr
;
985 if (is_chanop_voiced(msptr
))
987 /* cached can_send */
988 if (msptr
->bants
== chptr
->bants
)
990 if (can_send_banned(msptr
))
993 else if (is_banned(chptr
, client_p
, msptr
, src_host
, src_iphost
, NULL
) == CHFL_BAN
994 || is_quieted(chptr
, client_p
, msptr
, src_host
, src_iphost
) == CHFL_BAN
)
1000 /* void check_spambot_warning(struct Client *source_p)
1001 * Input: Client to check, channel name or NULL if this is a part.
1003 * Side-effects: Updates the client's oper_warn_count_down, warns the
1004 * IRC operators if necessary, and updates join_leave_countdown as
1008 check_spambot_warning(struct Client
*source_p
, const char *name
)
1011 int decrement_count
;
1012 if((GlobalSetOptions
.spam_num
&&
1013 (source_p
->localClient
->join_leave_count
>= GlobalSetOptions
.spam_num
)))
1015 if(source_p
->localClient
->oper_warn_count_down
> 0)
1016 source_p
->localClient
->oper_warn_count_down
--;
1018 source_p
->localClient
->oper_warn_count_down
= 0;
1019 if(source_p
->localClient
->oper_warn_count_down
== 0 &&
1022 /* Its already known as a possible spambot */
1023 sendto_realops_snomask(SNO_BOTS
, L_NETWIDE
,
1024 "User %s (%s@%s) trying to join %s is a possible spambot",
1026 source_p
->username
, source_p
->orighost
, name
);
1027 source_p
->localClient
->oper_warn_count_down
= OPER_SPAM_COUNTDOWN
;
1033 (rb_current_time() - source_p
->localClient
->last_leave_time
)) >
1034 JOIN_LEAVE_COUNT_EXPIRE_TIME
)
1036 decrement_count
= (t_delta
/ JOIN_LEAVE_COUNT_EXPIRE_TIME
);
1039 else if(decrement_count
> source_p
->localClient
->join_leave_count
)
1040 source_p
->localClient
->join_leave_count
= 0;
1042 source_p
->localClient
->join_leave_count
-= decrement_count
;
1046 if((rb_current_time() -
1047 (source_p
->localClient
->last_join_time
)) < GlobalSetOptions
.spam_time
)
1049 /* oh, its a possible spambot */
1050 source_p
->localClient
->join_leave_count
++;
1054 source_p
->localClient
->last_join_time
= rb_current_time();
1056 source_p
->localClient
->last_leave_time
= rb_current_time();
1060 /* check_splitmode()
1064 * side effects - compares usercount and servercount against their split
1065 * values and adjusts splitmode accordingly
1068 check_splitmode(void *unused
)
1070 if(splitchecking
&& (ConfigChannel
.no_join_on_split
|| ConfigChannel
.no_create_on_split
))
1072 /* not split, we're being asked to check now because someone
1077 if(eob_count
< split_servers
|| Count
.total
< split_users
)
1080 sendto_realops_snomask(SNO_GENERAL
, L_ALL
,
1081 "Network split, activating splitmode");
1082 check_splitmode_ev
= rb_event_addish("check_splitmode", check_splitmode
, NULL
, 2);
1085 /* in splitmode, check whether its finished */
1086 else if(eob_count
>= split_servers
&& Count
.total
>= split_users
)
1090 sendto_realops_snomask(SNO_GENERAL
, L_ALL
,
1091 "Network rejoined, deactivating splitmode");
1093 rb_event_delete(check_splitmode_ev
);
1094 check_splitmode_ev
= NULL
;
1102 * input - channel to allocate topic for
1103 * output - 1 on success, else 0
1104 * side effects - channel gets a topic allocated
1107 allocate_topic(struct Channel
*chptr
)
1114 ptr
= rb_bh_alloc(topic_heap
);
1116 /* Basically we allocate one large block for the topic and
1117 * the topic info. We then split it up into two and shove it
1121 chptr
->topic_info
= (char *) ptr
+ TOPICLEN
+ 1;
1122 *chptr
->topic
= '\0';
1123 *chptr
->topic_info
= '\0';
1128 * input - channel which has topic to free
1130 * side effects - channels topic is free'd
1133 free_topic(struct Channel
*chptr
)
1137 if(chptr
== NULL
|| chptr
->topic
== NULL
)
1140 /* This is safe for now - If you change allocate_topic you
1141 * MUST change this as well
1144 rb_bh_free(topic_heap
, ptr
);
1145 chptr
->topic
= NULL
;
1146 chptr
->topic_info
= NULL
;
1149 /* set_channel_topic()
1151 * input - channel, topic to set, topic info and topic ts
1153 * side effects - channels topic, topic info and TS are set.
1156 set_channel_topic(struct Channel
*chptr
, const char *topic
, const char *topic_info
, time_t topicts
)
1158 if(strlen(topic
) > 0)
1160 if(chptr
->topic
== NULL
)
1161 allocate_topic(chptr
);
1162 rb_strlcpy(chptr
->topic
, topic
, TOPICLEN
+ 1);
1163 rb_strlcpy(chptr
->topic_info
, topic_info
, USERHOST_REPLYLEN
);
1164 chptr
->topic_time
= topicts
;
1168 if(chptr
->topic
!= NULL
)
1170 chptr
->topic_time
= 0;
1176 * inputs - pointer to channel
1177 * - pointer to client
1178 * output - string with simple modes
1179 * side effects - result from previous calls overwritten
1181 * Stolen from ShadowIRCd 4 --nenolod
1184 channel_modes(struct Channel
*chptr
, struct Client
*client_p
)
1189 static char final
[BUFSIZE
];
1196 for (i
= 0; i
< 256; i
++)
1198 if(chmode_table
[i
].set_func
== chm_hidden
&& (!IsOper(client_p
) || !IsClient(client_p
)))
1200 if(chptr
->mode
.mode
& chmode_flags
[i
])
1204 if(chptr
->mode
.limit
)
1208 if(!IsClient(client_p
) || IsMember(client_p
, chptr
))
1209 pbuf
+= sprintf(pbuf
, " %d", chptr
->mode
.limit
);
1212 if(*chptr
->mode
.key
)
1216 if(pbuf
> buf2
|| !IsClient(client_p
) || IsMember(client_p
, chptr
))
1217 pbuf
+= sprintf(pbuf
, " %s", chptr
->mode
.key
);
1220 if(chptr
->mode
.join_num
)
1224 if(pbuf
> buf2
|| !IsClient(client_p
) || IsMember(client_p
, chptr
))
1225 pbuf
+= sprintf(pbuf
, " %d:%d", chptr
->mode
.join_num
,
1226 chptr
->mode
.join_time
);
1229 if(*chptr
->mode
.forward
&&
1230 (ConfigChannel
.use_forward
|| !IsClient(client_p
)))
1234 if(pbuf
> buf2
|| !IsClient(client_p
) || IsMember(client_p
, chptr
))
1235 pbuf
+= sprintf(pbuf
, " %s", chptr
->mode
.forward
);
1240 rb_strlcpy(final
, buf1
, sizeof final
);
1241 rb_strlcat(final
, buf2
, sizeof final
);
1245 /* void send_cap_mode_changes(struct Client *client_p,
1246 * struct Client *source_p,
1247 * struct Channel *chptr, int cap, int nocap)
1248 * Input: The client sending(client_p), the source client(source_p),
1249 * the channel to send mode changes for(chptr)
1251 * Side-effects: Sends the appropriate mode changes to capable servers.
1253 * Reverted back to my original design, except that we now keep a count
1254 * of the number of servers which each combination as an optimisation, so
1255 * the capabs combinations which are not needed are not worked out. -A1kmm
1257 * Removed most code here because we don't need to be compatible with ircd
1258 * 2.8.21+CSr and stuff. --nenolod
1261 send_cap_mode_changes(struct Client
*client_p
, struct Client
*source_p
,
1262 struct Channel
*chptr
, struct ChModeChange mode_changes
[], int mode_count
)
1264 static char modebuf
[BUFSIZE
];
1265 static char parabuf
[BUFSIZE
];
1266 int i
, mbl
, pbl
, nc
, mc
, preflen
, len
;
1272 /* Now send to servers... */
1280 mbl
= preflen
= sprintf(modebuf
, ":%s TMODE %ld %s ",
1281 use_id(source_p
), (long) chptr
->channelts
,
1284 /* loop the list of - modes we have */
1285 for (i
= 0; i
< mode_count
; i
++)
1287 /* if they dont support the cap we need, or they do support a cap they
1288 * cant have, then dont add it to the modebuf.. that way they wont see
1291 if (mode_changes
[i
].letter
== 0)
1294 if (!EmptyString(mode_changes
[i
].id
))
1295 arg
= mode_changes
[i
].id
;
1297 arg
= mode_changes
[i
].arg
;
1301 arglen
= strlen(arg
);
1303 /* dont even think about it! --fl */
1304 if(arglen
> MODEBUFLEN
- 5)
1308 /* if we're creeping past the buf size, we need to send it and make
1309 * another line for the other modes
1310 * XXX - this could give away server topology with uids being
1311 * different lengths, but not much we can do, except possibly break
1312 * them as if they were the longest of the nick or uid at all times,
1313 * which even then won't work as we don't always know the uid -A1kmm.
1315 if(arg
&& ((mc
== MAXMODEPARAMSSERV
) ||
1316 ((mbl
+ pbl
+ arglen
+ 4) > (BUFSIZE
- 3))))
1319 sendto_server(client_p
, chptr
, NOCAPS
, NOCAPS
,
1320 "%s %s", modebuf
, parabuf
);
1331 if(dir
!= mode_changes
[i
].dir
)
1333 modebuf
[mbl
++] = (mode_changes
[i
].dir
== MODE_ADD
) ? '+' : '-';
1334 dir
= mode_changes
[i
].dir
;
1337 modebuf
[mbl
++] = mode_changes
[i
].letter
;
1343 len
= sprintf(pbuf
, "%s ", arg
);
1350 if(pbl
&& parabuf
[pbl
- 1] == ' ')
1351 parabuf
[pbl
- 1] = 0;
1354 sendto_server(client_p
, chptr
, NOCAPS
, NOCAPS
, "%s %s", modebuf
, parabuf
);
1358 resv_chan_forcepart(const char *name
, const char *reason
, int temp_time
)
1361 rb_dlink_node
*next_ptr
;
1362 struct Channel
*chptr
;
1363 struct membership
*msptr
;
1364 struct Client
*target_p
;
1366 if(!ConfigChannel
.resv_forcepart
)
1369 /* for each user on our server in the channel list
1370 * send them a PART, and notify opers.
1372 chptr
= find_channel(name
);
1375 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, chptr
->locmembers
.head
)
1378 target_p
= msptr
->client_p
;
1380 if(IsExemptResv(target_p
))
1383 sendto_server(target_p
, chptr
, CAP_TS6
, NOCAPS
,
1384 ":%s PART %s", target_p
->id
, chptr
->chname
);
1386 sendto_channel_local(ALL_MEMBERS
, chptr
, ":%s!%s@%s PART %s :%s",
1387 target_p
->name
, target_p
->username
,
1388 target_p
->host
, chptr
->chname
, target_p
->name
);
1390 remove_user_from_channel(msptr
);
1392 /* notify opers & user they were removed from the channel */
1393 sendto_realops_snomask(SNO_GENERAL
, L_ALL
,
1394 "Forced PART for %s!%s@%s from %s (%s)",
1395 target_p
->name
, target_p
->username
,
1396 target_p
->host
, name
, reason
);
1399 sendto_one_notice(target_p
, ":*** Channel %s is temporarily unavailable on this server.",
1402 sendto_one_notice(target_p
, ":*** Channel %s is no longer available on this server.",