]>
jfr.im git - solanum.git/log
Ariadne Conill [Fri, 26 Jun 2020 18:50:24 +0000 (12:50 -0600)]
remove callerid definitions
Ariadne Conill [Fri, 26 Jun 2020 18:49:52 +0000 (12:49 -0600)]
message: remove hardcoded +G logic
Ariadne Conill [Fri, 26 Jun 2020 18:49:19 +0000 (12:49 -0600)]
invite: remove hardcoded callerid logic
Simon Arlott [Thu, 9 Jul 2020 19:53:38 +0000 (20:53 +0100)]
Merge remote-tracking branch 'ophion/upstream/dnsbl-rename'
Simon Arlott [Thu, 9 Jul 2020 19:53:00 +0000 (20:53 +0100)]
authd: Don't reveal to users how many DNSBLs are configured
Simon Arlott [Thu, 9 Jul 2020 19:52:24 +0000 (20:52 +0100)]
authd: Fix DNSBL messages
Aaron Jones [Tue, 7 Jul 2020 09:16:38 +0000 (09:16 +0000)]
Merge pull request #345 from edk0/alias
m_alias: Preserve protocol framing characters
Aaron Jones [Mon, 6 Jul 2020 10:52:15 +0000 (10:52 +0000)]
Merge pull request #346 from edk0/opmod-as-statusmsg
Port opmod_send_cprivmsg from ircd-seven, sans naming mistake
Ed Kellett [Sun, 5 Jul 2020 18:08:33 +0000 (19:08 +0100)]
Add tests for opmod_send_statusmsg
Janik Kleinhoff [Tue, 27 Feb 2018 22:49:13 +0000 (22:49 +0000)]
Make
5614c9e6f0b (opmod as fake statusmsg) optional
This adds a channel { ... } option, opmod_send_statusmsg, disabled by
default for compatibility reasons.
Aaron Jones [Mon, 6 Jul 2020 08:31:47 +0000 (08:31 +0000)]
Merge pull request #347 from edk0/hide-tls-info
Add general::tls_ciphers_oper_only
Ariadne Conill [Mon, 6 Jul 2020 03:18:23 +0000 (21:18 -0600)]
authd: rename blacklist_provider to dnsbl_provider, change auth notices accordingly
Ariadne Conill [Mon, 6 Jul 2020 03:09:48 +0000 (21:09 -0600)]
example config: dnsbl{} block change, update explanation comment a bit
Ariadne Conill [Mon, 6 Jul 2020 03:07:33 +0000 (21:07 -0600)]
newconf: deprecate blacklist{} blocks, replace with dnsbl{} blocks.
Ariadne Conill [Mon, 6 Jul 2020 03:01:56 +0000 (21:01 -0600)]
ircd: rename DNSBL entries from blacklist to dnsbl_entry.
Ariadne Conill [Mon, 6 Jul 2020 02:53:30 +0000 (20:53 -0600)]
client: drop no longer existent 'struct blacklist' definition.
This went away when authd was implemented.
Ed Kellett [Sun, 5 Jul 2020 20:05:18 +0000 (21:05 +0100)]
Add general::tls_ciphers_oper_only
Mike Quin [Sat, 10 Jun 2017 12:21:29 +0000 (12:21 +0000)]
add @ prefix to op-moderated (+z) messages to distinguish them from regular channel traffic
Ed Kellett [Sun, 5 Jul 2020 00:15:03 +0000 (01:15 +0100)]
m_alias: Preserve protocol framing characters
Aaron Jones [Sat, 4 Jul 2020 02:13:13 +0000 (02:13 +0000)]
ircd/modules.c: complain to foreground if unable to locate module
Without this a conftest user has no idea whether the module path
is correct or not.
[ci skip]
Aaron Jones [Thu, 2 Jul 2020 12:41:18 +0000 (12:41 +0000)]
Merge pull request #344 from dwfreed/use-module-hook-priorities
Actually use modules' declared hook priorities
Doug Freed [Wed, 1 Jul 2020 19:43:48 +0000 (19:43 +0000)]
Actually use modules' declared hook priorities
Aaron Jones [Mon, 29 Jun 2020 17:36:30 +0000 (17:36 +0000)]
Merge pull request #343 from xnrand/patch-ison-unreg-conn
m_ison: Do not report unregistered connections
Aaron Jones [Sat, 27 Jun 2020 14:42:20 +0000 (14:42 +0000)]
m_invite: remove redundant block of code missed by review
I missed this due to refactoring in #341. This function is already
called by the same function we're already in, just further down.
[ci skip]
Aaron Jones [Sat, 27 Jun 2020 10:46:36 +0000 (10:46 +0000)]
Merge pull request #341 from ophion-project/upstream/modularize-regonlymsg
modularize regonlymsg
Ariadne Conill [Fri, 26 Jun 2020 21:34:22 +0000 (15:34 -0600)]
regonlymsg: use hdata.error where available
xnrand [Sun, 17 Feb 2019 09:47:19 +0000 (10:47 +0100)]
m_ison: Do not report unregistered connections
Prior to this, m_ison would report a nick as being online if a client
that was not yet registered had chosen this nickname on the same server.
This change adds a check to make sure the struct Client has a
struct User associated with it, i.e. registration has occurred.
Ariadne Conill [Fri, 26 Jun 2020 20:32:46 +0000 (14:32 -0600)]
regonlymsg: catch find_umode_slot() failure
Ariadne Conill [Fri, 26 Jun 2020 20:22:31 +0000 (14:22 -0600)]
regonlymsg: use invite instead of can_invite hook
Ariadne Conill [Fri, 26 Jun 2020 20:21:29 +0000 (14:21 -0600)]
invite: revert the ERR_CHANOPRIVSNEEDED change too
Ariadne Conill [Fri, 26 Jun 2020 20:20:52 +0000 (14:20 -0600)]
Revert "invite: rework the way can_invite hook is called"
This reverts commit
ed06fed70a67b0cdd4e53aad575fca7b9d046061 .
Ariadne Conill [Fri, 26 Jun 2020 19:58:00 +0000 (13:58 -0600)]
invite: remove redundant parenthesis
Ariadne Conill [Fri, 26 Jun 2020 19:55:12 +0000 (19:55 +0000)]
invite: rework the way can_invite hook is called
Ariadne Conill [Fri, 26 Jun 2020 19:46:57 +0000 (19:46 +0000)]
regonlymsg: allow messages through if target is not a local client
Ariadne Conill [Fri, 26 Jun 2020 19:03:25 +0000 (19:03 +0000)]
regonlymsg: do not clobber the work of other modules
Ariadne Conill [Fri, 26 Jun 2020 18:03:43 +0000 (12:03 -0600)]
regonlymsg: fix allow_message() return values
Ariadne Conill [Fri, 26 Jun 2020 17:55:30 +0000 (11:55 -0600)]
modularize usermode +R (registered users only)
Ariadne Conill [Fri, 26 Jun 2020 17:55:07 +0000 (11:55 -0600)]
message: remove hardcoded +R logic
Ariadne Conill [Fri, 26 Jun 2020 17:41:05 +0000 (11:41 -0600)]
invite: remove hardcoded UMODE_REGONLYMSG code
Aaron Jones [Fri, 26 Jun 2020 16:55:56 +0000 (16:55 +0000)]
Merge pull request #333 from edk0/privs-multiline
m_privs: break long responses into multiple lines
Aaron Jones [Fri, 26 Jun 2020 16:51:52 +0000 (16:51 +0000)]
Merge pull request #340 from ophion-project/upstream/hook-channel-lowerts
join: add channel_lowerts hook
Ariadne Conill [Fri, 26 Jun 2020 16:21:19 +0000 (16:21 +0000)]
join: add channel_lowerts hook
Aaron Jones [Thu, 25 Jun 2020 17:42:43 +0000 (17:42 +0000)]
Merge pull request #334 from edk0/massnotice
Remove the massnotice wildcard restriction
Aaron Jones [Thu, 25 Jun 2020 17:37:04 +0000 (17:37 +0000)]
Merge pull request #322 from edk0/invite-umode-g
m_invite: Don't punch through +g
Aaron Jones [Thu, 25 Jun 2020 17:35:44 +0000 (17:35 +0000)]
Merge pull request #328 from edk0/capability-put-ownerdata
capability: accept new ownerdata for existing caps
Aaron Jones [Thu, 25 Jun 2020 17:32:58 +0000 (17:32 +0000)]
Merge pull request #329 from edk0/reload-by-path
Reload modules by path
Aaron Jones [Thu, 25 Jun 2020 11:49:40 +0000 (11:49 +0000)]
Merge pull request #338 from edk0/kline-zero
m_kline: insert a safety zero early
Ed Kellett [Thu, 25 Jun 2020 11:32:01 +0000 (12:32 +0100)]
m_kline: insert a safety zero early
Ed Kellett [Sat, 2 May 2020 01:26:39 +0000 (02:26 +0100)]
m_invite: Don't punch through +g
Aaron Jones [Sun, 21 Jun 2020 12:56:56 +0000 (12:56 +0000)]
Merge pull request #335 from edk0/post-registration-delay
Import post_registration_delay from ircd-seven
Aaron Jones [Wed, 10 Jun 2020 15:03:57 +0000 (15:03 +0000)]
Merge pull request #330 from edk0/caps-before-init
modules: create caps before mapi_register()
Aaron Jones [Wed, 10 Jun 2020 14:55:02 +0000 (14:55 +0000)]
Merge pull request #327 from edk0/filter-quit
filter quit messages
Aaron Jones [Wed, 10 Jun 2020 14:49:59 +0000 (14:49 +0000)]
Merge pull request #321 from edk0/hook-priorities
Simple hook priority system
Aaron Jones [Wed, 10 Jun 2020 14:38:53 +0000 (14:38 +0000)]
Merge pull request #336 from edk0/range-leak
ircd_parser: free the ends of ranges after use
Ed Kellett [Sun, 7 Jun 2020 22:31:40 +0000 (23:31 +0100)]
ircd_parser: free the ends of ranges after use
Stephen Bennett [Wed, 13 Jan 2010 23:54:49 +0000 (23:54 +0000)]
Rename connect_delay to post_registration_delay. This matches the ircd-ratbox feature, and better describes what it actually is. Also make sure to set localClient->firsttime on registration, so that the delay counts from the right time.
Stephen Bennett [Wed, 13 Jan 2010 13:52:28 +0000 (13:52 +0000)]
Add connect_delay to example and reference configs
Stephen Bennett [Tue, 12 Jan 2010 21:32:18 +0000 (21:32 +0000)]
Initial attempt at the conndelay hack
Ed Kellett [Sun, 7 Jun 2020 14:06:24 +0000 (15:06 +0100)]
Remove the massnotice wildcard restriction
Ed Kellett [Sat, 6 Jun 2020 23:19:35 +0000 (00:19 +0100)]
m_privs: break long responses into multiple lines
Ed Kellett [Tue, 2 Jun 2020 15:32:28 +0000 (16:32 +0100)]
modules: create caps before mapi_register()
Ed Kellett [Tue, 2 Jun 2020 15:17:26 +0000 (16:17 +0100)]
Reload modules by path
Ed Kellett [Tue, 2 Jun 2020 15:08:40 +0000 (16:08 +0100)]
capability: accept new ownerdata for existing caps
Aaron Jones [Sun, 24 May 2020 23:08:02 +0000 (23:08 +0000)]
Merge pull request #326 from edk0/filter-part
Handle PARTs properly in extensions/filter
Ed Kellett [Sat, 23 May 2020 18:10:31 +0000 (19:10 +0100)]
extensions/filter: filter quit messages
Ed Kellett [Sat, 23 May 2020 18:10:07 +0000 (19:10 +0100)]
Add client_quit hook
Aaron Jones [Mon, 11 May 2020 07:32:41 +0000 (07:32 +0000)]
Merge pull request #324 from mas90/patch-1
Skip any unhandled DNS record type
Malcolm Scott [Sun, 10 May 2020 20:00:43 +0000 (21:00 +0100)]
Skip any unhandled DNS record type
Currently the DNS resolver handles CNAME by skipping that record in the answer and looking for the subsequent A/AAAA/PTR record. There are other record types which could be handled in the same way, e.g. DNAME, but their presence currently causes the answer parsing to be abandoned. A better approach would be to skip *any* other record and just use the first A, AAAA or PTR in the answer, regardless of what comes before it.
Ed Kellett [Sat, 2 May 2020 01:52:21 +0000 (02:52 +0100)]
filter: fix part handling
previously we would have formatted a null pointer into %s for the
command, which is theoretically bad but handled by glibc
Ed Kellett [Mon, 27 Apr 2020 15:36:40 +0000 (16:36 +0100)]
hook: Use old insertion order for equal priority
Ed Kellett [Sun, 26 Apr 2020 23:42:53 +0000 (00:42 +0100)]
Add priorities to some hooks
Ed Kellett [Sun, 26 Apr 2020 23:14:56 +0000 (00:14 +0100)]
Implement hook priorities
Aaron Jones [Fri, 1 May 2020 16:22:44 +0000 (16:22 +0000)]
Merge pull request #319 from edk0/invite-notify
Fix invite-notify and move it to an extension
Ed Kellett [Wed, 29 Apr 2020 10:01:39 +0000 (11:01 +0100)]
Document invite hooks
Ed Kellett [Sun, 26 Apr 2020 14:46:32 +0000 (15:46 +0100)]
Use a different cap for send tests
Ed Kellett [Sat, 1 Feb 2020 02:10:33 +0000 (02:10 +0000)]
Fix invite-notify and move it to an extension
The existing approach to invite-notify is deeply flawed--it currently
notifies only the target user's server, and that can't be fixed without
sending notifies for invites that end up not happening.
I'm resolving this by broadcasting a second message, INVITED, from the
target user's server. I'm also pulling it out into an extension while
I'm at it--invite notifies reveal new information, so I don't think
they should be mandatory.
Ed Kellett [Sat, 1 Feb 2020 00:08:23 +0000 (00:08 +0000)]
m_invite: Add hooks
can_invite is called on the source server, can override channel access
invite is called on the target
Aaron Jones [Wed, 29 Apr 2020 10:00:39 +0000 (10:00 +0000)]
Merge pull request #320 from edk0/runtests
Run tests with ASan leak detection off
Ed Kellett [Sun, 26 Apr 2020 15:05:05 +0000 (16:05 +0100)]
Run tests with ASan leak detection off
The test environment is sufficiently weird that I don't think fixing
these would be a good use of anyone's time
Aaron Jones [Fri, 24 Apr 2020 09:13:19 +0000 (09:13 +0000)]
Merge pull request #316 from edk0/kline-spoof-flag
Add an iline flag to match klines by spoof only
Ed Kellett [Sun, 19 Apr 2020 23:45:22 +0000 (00:45 +0100)]
Document kline_spoof_ip
Ed Kellett [Tue, 14 Apr 2020 22:51:23 +0000 (23:51 +0100)]
Handle kline_spoof_ip in check_one_kline
Ed Kellett [Mon, 13 Apr 2020 22:51:52 +0000 (23:51 +0100)]
Add an iline flag to match klines by spoof only
Aaron Jones [Sun, 19 Apr 2020 14:25:14 +0000 (14:25 +0000)]
Merge pull request #317 from edk0/leak
librb/event: Don't leak event names on completion
Ed Kellett [Sun, 19 Apr 2020 13:22:18 +0000 (14:22 +0100)]
librb/event: Don't leak event names on completion
Aaron Jones [Sun, 19 Apr 2020 12:11:19 +0000 (12:11 +0000)]
Merge pull request #313 from edk0/spoof-chban
Don't match iline-spoofed IPs for channel bans
Aaron Jones [Sun, 19 Apr 2020 12:06:16 +0000 (12:06 +0000)]
Merge pull request #314 from jesopo/message-handler-comment
rectify comment for Message handler indexes
jesopo [Sun, 19 Apr 2020 12:05:01 +0000 (13:05 +0100)]
remove LAST in comment too; it's a bit pointless
Aaron Jones [Sun, 19 Apr 2020 11:57:08 +0000 (11:57 +0000)]
Merge pull request #315 from edk0/check-kline
Make K-line checking more consistent
Ed Kellett [Sun, 19 Apr 2020 01:16:17 +0000 (02:16 +0100)]
Add ipv4-in-ipv6 logic to check_one_kline
Ed Kellett [Sat, 18 Apr 2020 23:53:10 +0000 (00:53 +0100)]
Align check_one_kline better with find_kline
Ed Kellett [Sat, 18 Apr 2020 15:57:22 +0000 (16:57 +0100)]
Move ipv4-in-ipv6 handling to find_conf_by_address
This removes some inconsistencies: first of all it applies to both
CONF_KILL searches by IP in find_address_conf, and secondly it applies
to find_kline, which would have been an edge case before.
Ed Kellett [Wed, 15 Apr 2020 22:51:39 +0000 (23:51 +0100)]
Refactor check_one_kline a tiny bit
jesopo [Sat, 18 Apr 2020 23:00:20 +0000 (00:00 +0100)]
rectify comment for Message handler indexes
Ed Kellett [Sun, 12 Apr 2020 01:09:12 +0000 (02:09 +0100)]
Don't match iline-spoofed IPs for channel bans
Ed Kellett [Sun, 12 Apr 2020 01:07:17 +0000 (02:07 +0100)]
Centralise banmask matching logic
Aaron Jones [Sun, 15 Mar 2020 22:14:26 +0000 (22:14 +0000)]
Merge pull request #311 from qaisjp/patch-2
readme: fix macOS instructions
Qais Patankar [Sun, 15 Mar 2020 22:06:42 +0000 (22:06 +0000)]
readme: fix macOS instructions
Aaron Jones [Tue, 28 Jan 2020 20:46:14 +0000 (20:46 +0000)]
extensions/extb_ssl.c: make certfp parameter case-insensitive
I had the idea that maybe these should be case-sensitive because some
encodings (like Base-64) are. But it turns out it's better to
prioritise not breaking existing configurations / channel mode lists,
and just revisit this in future maybe.
[ci skip]
Aaron Jones [Tue, 28 Jan 2020 20:37:39 +0000 (20:37 +0000)]
extensions/extb_ssl.c: port
e0f1c3b5bc6c55b88938 &
5572f43834b93b898ea0
Reported-by: Opal Hart <redacted>