]> jfr.im git - solanum.git/blobdiff - ircd/client.c
Implement hook priorities
[solanum.git] / ircd / client.c
index a4ee0cac292de11db69543dc75f22290100d256f..b333f44edd436f29a14087c676bc4cb18298512b 100644 (file)
@@ -80,12 +80,6 @@ static uint32_t current_connid = 0;
 
 rb_dictionary *nd_dict = NULL;
 
-enum
-{
-       D_LINED,
-       K_LINED
-};
-
 rb_dlink_list dead_list;
 #ifdef DEBUG_EXITED_CLIENTS
 static rb_dlink_list dead_remote_list;
@@ -306,10 +300,7 @@ free_local_client(struct Client *client_p)
        rb_free(client_p->localClient->auth_user);
        rb_free(client_p->localClient->challenge);
        rb_free(client_p->localClient->fullcaps);
-       rb_free(client_p->localClient->opername);
        rb_free(client_p->localClient->mangledhost);
-       if (client_p->localClient->privset)
-               privilegeset_unref(client_p->localClient->privset);
 
        if (IsSSL(client_p))
                ssld_decrement_clicount(client_p->localClient->ssl_ctl);
@@ -487,7 +478,7 @@ check_unknowns_list(rb_dlink_list * list)
        }
 }
 
-static void
+void
 notify_banned_client(struct Client *client_p, struct ConfItem *aconf, int ban)
 {
        static const char conn_closed[] = "Connection closed";
@@ -532,19 +523,6 @@ check_banned_lines(void)
        check_xlines();
 }
 
-/* check_klines_event()
- *
- * inputs      -
- * outputs     -
- * side effects - check_klines() is called, kline_queued unset
- */
-void
-check_klines_event(void *unused)
-{
-       kline_queued = false;
-       check_klines();
-}
-
 /* check_klines
  *
  * inputs       -
@@ -587,6 +565,88 @@ check_klines(void)
        }
 }
 
+
+/* check_one_kline()
+ *
+ * This process needs to be kept in sync with find_kline() aka find_conf_by_address().
+ *
+ * inputs       - pointer to kline to check
+ * outputs      -
+ * side effects - all clients will be checked against given kline
+ */
+void
+check_one_kline(struct ConfItem *kline)
+{
+       struct Client *client_p;
+       rb_dlink_node *ptr;
+       rb_dlink_node *next_ptr;
+       int masktype;
+       int bits;
+       struct rb_sockaddr_storage sockaddr;
+       struct sockaddr_in ip4;
+
+       masktype = parse_netmask(kline->host, (struct sockaddr_storage *)&sockaddr, &bits);
+
+       RB_DLINK_FOREACH_SAFE(ptr, next_ptr, lclient_list.head)
+       {
+               int matched = 0;
+
+               client_p = ptr->data;
+
+               if(IsMe(client_p) || !IsPerson(client_p))
+                       continue;
+
+               if(!match(kline->user, client_p->username))
+                       continue;
+
+               /* match one kline */
+               switch (masktype) {
+               case HM_IPV4:
+               case HM_IPV6:
+                       if (IsConfDoSpoofIp(client_p->localClient->att_conf) &&
+                                       IsConfKlineSpoof(client_p->localClient->att_conf))
+                               continue;
+                       if (client_p->localClient->ip.ss_family == AF_INET6 && sockaddr.ss_family == AF_INET &&
+                                       rb_ipv4_from_ipv6((struct sockaddr_in6 *)&client_p->localClient->ip, &ip4)
+                                               && comp_with_mask_sock((struct sockaddr *)&ip4, (struct sockaddr *)&sockaddr, bits))
+                               matched = 1;
+                       else if (client_p->localClient->ip.ss_family == sockaddr.ss_family &&
+                                       comp_with_mask_sock((struct sockaddr *)&client_p->localClient->ip,
+                                               (struct sockaddr *)&sockaddr, bits))
+                               matched = 1;
+                       break;
+               case HM_HOST:
+                       if (match(kline->host, client_p->orighost))
+                               matched = 1;
+                       if (IsConfDoSpoofIp(client_p->localClient->att_conf) &&
+                                       IsConfKlineSpoof(client_p->localClient->att_conf))
+                               continue;
+                       if (match(kline->host, client_p->sockhost))
+                               matched = 1;
+                       break;
+               }
+
+               if (!matched)
+                       continue;
+
+               if(IsExemptKline(client_p))
+               {
+                       sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
+                                                "KLINE over-ruled for %s, client is kline_exempt [%s@%s]",
+                                                get_client_name(client_p, HIDE_IP),
+                                                kline->user, kline->host);
+                       continue;
+               }
+
+               sendto_realops_snomask(SNO_GENERAL, L_ALL,
+                                        "KLINE active for %s",
+                                        get_client_name(client_p, HIDE_IP));
+
+               notify_banned_client(client_p, kline, K_LINED);
+       }
+}
+
+
 /* check_dlines()
  *
  * inputs       -
@@ -1383,7 +1443,8 @@ exit_unknown_client(struct Client *client_p, /* The local client originating the
                del_from_id_hash(source_p->id, source_p);
 
        del_from_hostname_hash(source_p->host, source_p);
-       del_from_client_hash(source_p->name, source_p);
+       if (!IsAnyServer(source_p))
+               del_from_client_hash(source_p->name, source_p);
        remove_client_from_list(source_p);
        SetDead(source_p);
        rb_dlinkAddAlloc(source_p, &dead_list);
@@ -1625,6 +1686,8 @@ exit_client(struct Client *client_p,      /* The local client originating the
            const char *comment /* Reason for the exit */
        )
 {
+       int ret = -1;
+
        hook_data_client_exit hdata;
        if(IsClosing(source_p))
                return -1;
@@ -1645,23 +1708,25 @@ exit_client(struct Client *client_p,    /* The local client originating the
        {
                /* Local clients of various types */
                if(IsPerson(source_p))
-                       return exit_local_client(client_p, source_p, from, comment);
+                       ret = exit_local_client(client_p, source_p, from, comment);
                else if(IsServer(source_p))
-                       return exit_local_server(client_p, source_p, from, comment);
+                       ret = exit_local_server(client_p, source_p, from, comment);
                /* IsUnknown || IsConnecting || IsHandShake */
                else if(!IsReject(source_p))
-                       return exit_unknown_client(client_p, source_p, from, comment);
+                       ret = exit_unknown_client(client_p, source_p, from, comment);
        }
        else
        {
                /* Remotes */
                if(IsPerson(source_p))
-                       return exit_remote_client(client_p, source_p, from, comment);
+                       ret = exit_remote_client(client_p, source_p, from, comment);
                else if(IsServer(source_p))
-                       return exit_remote_server(client_p, source_p, from, comment);
+                       ret = exit_remote_server(client_p, source_p, from, comment);
        }
 
-       return -1;
+       call_hook(h_after_client_exit, NULL);
+
+       return ret;
 }
 
 /*
@@ -1866,6 +1931,9 @@ free_user(struct User *user, struct Client *client_p)
        {
                if(user->away)
                        rb_free((char *) user->away);
+               rb_free(user->opername);
+               if (user->privset)
+                       privilegeset_unref(user->privset);
                /*
                 * sanity check
                 */