mirror of
https://github.com/inspircd/inspircd.git
synced 2025-03-12 20:19:02 -04:00
1328 lines
38 KiB
C++
1328 lines
38 KiB
C++
/*
|
|
* InspIRCd -- Internet Relay Chat Daemon
|
|
*
|
|
* Copyright (C) 2019 linuxdaemon <linuxdaemon.irc@gmail.com>
|
|
* Copyright (C) 2018 systocrat <systocrat@outlook.com>
|
|
* Copyright (C) 2018 Dylan Frank <b00mx0r@aureus.pw>
|
|
* Copyright (C) 2013, 2016-2021 Sadie Powell <sadie@witchery.services>
|
|
* Copyright (C) 2013 Daniel Vassdal <shutter@canternet.org>
|
|
* Copyright (C) 2013 ChrisTX <xpipe@hotmail.de>
|
|
* Copyright (C) 2013 Adam <Adam@anope.org>
|
|
* Copyright (C) 2012-2016, 2018 Attila Molnar <attilamolnar@hush.com>
|
|
* Copyright (C) 2012, 2019 Robby <robby@chatbelgie.be>
|
|
* Copyright (C) 2012 DjSlash <djslash@djslash.org>
|
|
* Copyright (C) 2011 jackmcbarn <jackmcbarn@inspircd.org>
|
|
* Copyright (C) 2009-2010 Daniel De Graaf <danieldg@inspircd.org>
|
|
* Copyright (C) 2009 Uli Schlachter <psychon@inspircd.org>
|
|
* Copyright (C) 2008 Thomas Stagner <aquanight@inspircd.org>
|
|
* Copyright (C) 2008 John Brooks <special@inspircd.org>
|
|
* Copyright (C) 2007, 2009 Dennis Friis <peavey@inspircd.org>
|
|
* Copyright (C) 2006-2009 Robin Burchell <robin+git@viroteck.net>
|
|
* Copyright (C) 2004, 2006-2009 Craig Edwards <brain@inspircd.org>
|
|
*
|
|
* This file is part of InspIRCd. InspIRCd is free software: you can
|
|
* redistribute it and/or modify it under the terms of the GNU General Public
|
|
* License as published by the Free Software Foundation, version 2.
|
|
*
|
|
* This program is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
|
|
* FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
|
|
* details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
|
|
#include "inspircd.h"
|
|
#include "xline.h"
|
|
|
|
ClientProtocol::MessageList LocalUser::sendmsglist;
|
|
|
|
bool User::IsNoticeMaskSet(unsigned char sm)
|
|
{
|
|
if (!isalpha(sm))
|
|
return false;
|
|
return (snomasks[sm-65]);
|
|
}
|
|
|
|
bool User::IsModeSet(unsigned char m) const
|
|
{
|
|
ModeHandler* mh = ServerInstance->Modes.FindMode(m, MODETYPE_USER);
|
|
return (mh && modes[mh->GetId()]);
|
|
}
|
|
|
|
std::string User::GetModeLetters(bool includeparams) const
|
|
{
|
|
std::string ret(1, '+');
|
|
std::string params;
|
|
|
|
for (unsigned char i = 'A'; i <= 'z'; i++)
|
|
{
|
|
const ModeHandler* const mh = ServerInstance->Modes.FindMode(i, MODETYPE_USER);
|
|
if ((!mh) || (!IsModeSet(mh)))
|
|
continue;
|
|
|
|
ret.push_back(mh->GetModeChar());
|
|
if ((includeparams) && (mh->NeedsParam(true)))
|
|
{
|
|
const std::string val = mh->GetUserParameter(this);
|
|
if (!val.empty())
|
|
params.append(1, ' ').append(val);
|
|
}
|
|
}
|
|
|
|
ret += params;
|
|
return ret;
|
|
}
|
|
|
|
User::User(const std::string& uid, Server* srv, Type type)
|
|
: Extensible(ExtensionType::USER)
|
|
, age(ServerInstance->Time())
|
|
, uuid(uid)
|
|
, server(srv)
|
|
, registered(REG_NONE)
|
|
, quitting(false)
|
|
, uniqueusername(false)
|
|
, usertype(type)
|
|
{
|
|
client_sa.sa.sa_family = AF_UNSPEC;
|
|
|
|
ServerInstance->Logs.Log("USERS", LOG_DEBUG, "New UUID for user: %s", uuid.c_str());
|
|
|
|
if (srv->IsService())
|
|
ServerInstance->Users.all_services.push_back(this);
|
|
|
|
// Do not insert FakeUsers into the uuidlist so FindUUID() won't return them which is the desired behavior
|
|
if (type != User::TYPE_SERVER)
|
|
{
|
|
if (!ServerInstance->Users.uuidlist.emplace(uuid, this).second)
|
|
throw CoreException("Duplicate UUID in User constructor: " + uuid);
|
|
}
|
|
}
|
|
|
|
LocalUser::LocalUser(int myfd, irc::sockets::sockaddrs* client, irc::sockets::sockaddrs* servaddr)
|
|
: User(ServerInstance->UIDGen.GetUID(), ServerInstance->FakeClient->server, User::TYPE_LOCAL)
|
|
, eh(this)
|
|
, quitting_sendq(false)
|
|
, lastping(true)
|
|
, exempt(false)
|
|
{
|
|
signon = ServerInstance->Time();
|
|
// The user's default nick is their UUID
|
|
nick = uuid;
|
|
ident = uuid;
|
|
eh.SetFd(myfd);
|
|
memcpy(&client_sa, client, sizeof(irc::sockets::sockaddrs));
|
|
memcpy(&server_sa, servaddr, sizeof(irc::sockets::sockaddrs));
|
|
ChangeRealHost(GetIPString(), true);
|
|
}
|
|
|
|
LocalUser::LocalUser(int myfd, const std::string& uid, Serializable::Data& data)
|
|
: User(uid, ServerInstance->FakeClient->server, User::TYPE_LOCAL)
|
|
, eh(this)
|
|
{
|
|
eh.SetFd(myfd);
|
|
Deserialize(data);
|
|
}
|
|
|
|
const std::string& User::MakeHost()
|
|
{
|
|
if (!this->cached_makehost.empty())
|
|
return this->cached_makehost;
|
|
|
|
this->cached_makehost = ident + "@" + GetRealHost();
|
|
return this->cached_makehost;
|
|
}
|
|
|
|
const std::string& User::MakeHostIP()
|
|
{
|
|
if (!this->cached_hostip.empty())
|
|
return this->cached_hostip;
|
|
|
|
this->cached_hostip = ident + "@" + this->GetIPString();
|
|
return this->cached_hostip;
|
|
}
|
|
|
|
const std::string& User::GetFullHost()
|
|
{
|
|
if (!this->cached_fullhost.empty())
|
|
return this->cached_fullhost;
|
|
|
|
this->cached_fullhost = nick + "!" + ident + "@" + GetDisplayedHost();
|
|
return this->cached_fullhost;
|
|
}
|
|
|
|
const std::string& User::GetFullRealHost()
|
|
{
|
|
if (!this->cached_fullrealhost.empty())
|
|
return this->cached_fullrealhost;
|
|
|
|
this->cached_fullrealhost = nick + "!" + ident + "@" + GetRealHost();
|
|
return this->cached_fullrealhost;
|
|
}
|
|
|
|
bool User::HasModePermission(const ModeHandler* mh) const
|
|
{
|
|
return true;
|
|
}
|
|
|
|
bool LocalUser::HasModePermission(const ModeHandler* mh) const
|
|
{
|
|
if (!this->IsOper())
|
|
return false;
|
|
|
|
const unsigned char mode = mh->GetModeChar();
|
|
if (!ModeParser::IsModeChar(mode))
|
|
return false;
|
|
|
|
return ((mh->GetModeType() == MODETYPE_USER ? oper->AllowedUserModes : oper->AllowedChanModes))[(mode - 'A')];
|
|
|
|
}
|
|
/*
|
|
* users on remote servers can completely bypass all permissions based checks.
|
|
* This prevents desyncs when one server has different type/class tags to another.
|
|
* That having been said, this does open things up to the possibility of source changes
|
|
* allowing remote kills, etc - but if they have access to the src, they most likely have
|
|
* access to the conf - so it's an end to a means either way.
|
|
*/
|
|
bool User::HasCommandPermission(const std::string&)
|
|
{
|
|
return true;
|
|
}
|
|
|
|
bool LocalUser::HasCommandPermission(const std::string& command)
|
|
{
|
|
// are they even an oper at all?
|
|
if (!this->IsOper())
|
|
{
|
|
return false;
|
|
}
|
|
|
|
return oper->AllowedOperCommands.Contains(command);
|
|
}
|
|
|
|
bool User::HasPrivPermission(const std::string& privstr)
|
|
{
|
|
return true;
|
|
}
|
|
|
|
bool LocalUser::HasPrivPermission(const std::string& privstr)
|
|
{
|
|
if (!this->IsOper())
|
|
return false;
|
|
|
|
return oper->AllowedPrivs.Contains(privstr);
|
|
}
|
|
|
|
bool User::HasSnomaskPermission(char chr) const
|
|
{
|
|
return true;
|
|
}
|
|
|
|
bool LocalUser::HasSnomaskPermission(char chr) const
|
|
{
|
|
if (!this->IsOper() || !ModeParser::IsModeChar(chr))
|
|
return false;
|
|
|
|
return this->oper->AllowedSnomasks[chr - 'A'];
|
|
}
|
|
|
|
void UserIOHandler::OnDataReady()
|
|
{
|
|
if (user->quitting)
|
|
return;
|
|
|
|
if (recvq.length() > user->GetClass()->GetRecvqMax() && !user->HasPrivPermission("users/flood/increased-buffers"))
|
|
{
|
|
ServerInstance->Users.QuitUser(user, "RecvQ exceeded");
|
|
ServerInstance->SNO.WriteToSnoMask('a', "User %s RecvQ of %zu exceeds connect class maximum of %lu",
|
|
user->nick.c_str(), recvq.length(), user->GetClass()->GetRecvqMax());
|
|
return;
|
|
}
|
|
|
|
unsigned long sendqmax = ULONG_MAX;
|
|
if (!user->HasPrivPermission("users/flood/increased-buffers"))
|
|
sendqmax = user->GetClass()->GetSendqSoftMax();
|
|
|
|
unsigned long penaltymax = ULONG_MAX;
|
|
if (!user->HasPrivPermission("users/flood/no-fakelag"))
|
|
penaltymax = user->GetClass()->GetPenaltyThreshold() * 1000;
|
|
|
|
// The cleaned message sent by the user or empty if not found yet.
|
|
std::string line;
|
|
|
|
// The position of the most \n character or npos if not found yet.
|
|
std::string::size_type eolpos;
|
|
|
|
// The position within the recvq of the current character.
|
|
std::string::size_type qpos;
|
|
|
|
while (user->CommandFloodPenalty < penaltymax && GetSendQSize() < sendqmax)
|
|
{
|
|
// Check the newly received data for an EOL.
|
|
eolpos = recvq.find('\n', checked_until);
|
|
if (eolpos == std::string::npos)
|
|
{
|
|
checked_until = recvq.length();
|
|
return;
|
|
}
|
|
|
|
// We've found a line! Clean it up and move it to the line buffer.
|
|
line.reserve(eolpos);
|
|
for (qpos = 0; qpos < eolpos; ++qpos)
|
|
{
|
|
char c = recvq[qpos];
|
|
switch (c)
|
|
{
|
|
case '\0':
|
|
c = ' ';
|
|
break;
|
|
case '\r':
|
|
continue;
|
|
}
|
|
|
|
line.push_back(c);
|
|
}
|
|
|
|
// just found a newline. Terminate the string, and pull it out of recvq
|
|
recvq.erase(0, eolpos + 1);
|
|
checked_until = 0;
|
|
|
|
// TODO should this be moved to when it was inserted in recvq?
|
|
ServerInstance->stats.Recv += qpos;
|
|
user->bytes_in += qpos;
|
|
user->cmds_in++;
|
|
|
|
ServerInstance->Parser.ProcessBuffer(user, line);
|
|
if (user->quitting)
|
|
return;
|
|
|
|
// clear() does not reclaim memory associated with the string, so our .reserve() call is safe
|
|
line.clear();
|
|
}
|
|
|
|
if (user->CommandFloodPenalty >= penaltymax && !user->GetClass()->fakelag)
|
|
ServerInstance->Users.QuitUser(user, "Excess Flood");
|
|
}
|
|
|
|
void UserIOHandler::AddWriteBuf(const std::string &data)
|
|
{
|
|
if (user->quitting_sendq)
|
|
return;
|
|
if (!user->quitting && GetSendQSize() + data.length() > user->GetClass()->GetSendqHardMax() &&
|
|
!user->HasPrivPermission("users/flood/increased-buffers"))
|
|
{
|
|
user->quitting_sendq = true;
|
|
ServerInstance->GlobalCulls.AddSQItem(user);
|
|
return;
|
|
}
|
|
|
|
// We still want to append data to the sendq of a quitting user,
|
|
// e.g. their ERROR message that says 'closing link'
|
|
|
|
WriteData(data);
|
|
}
|
|
|
|
bool UserIOHandler::OnSetLocalEndPoint(const irc::sockets::sockaddrs& ep)
|
|
{
|
|
memcpy(&user->server_sa, &ep, sizeof(irc::sockets::sockaddrs));
|
|
return true;
|
|
}
|
|
|
|
bool UserIOHandler::OnSetRemoteEndPoint(const irc::sockets::sockaddrs& ep)
|
|
{
|
|
user->SetClientIP(ep);
|
|
return !user->quitting;
|
|
}
|
|
|
|
void UserIOHandler::OnError(BufferedSocketError sockerr)
|
|
{
|
|
ServerInstance->Users.QuitUser(user, GetError());
|
|
}
|
|
|
|
Cullable::Result User::Cull()
|
|
{
|
|
if (!quitting)
|
|
ServerInstance->Users.QuitUser(this, "Culled without QuitUser");
|
|
|
|
if (client_sa.family() != AF_UNSPEC)
|
|
ServerInstance->Users.RemoveCloneCounts(this);
|
|
|
|
if (server->IsService())
|
|
stdalgo::erase(ServerInstance->Users.all_services, this);
|
|
|
|
return Extensible::Cull();
|
|
}
|
|
|
|
Cullable::Result LocalUser::Cull()
|
|
{
|
|
eh.Cull();
|
|
return User::Cull();
|
|
}
|
|
|
|
Cullable::Result FakeUser::Cull()
|
|
{
|
|
// Fake users don't quit, they just get culled.
|
|
quitting = true;
|
|
// Fake users are not inserted into UserManager::clientlist or uuidlist, so we don't need to modify those here
|
|
return User::Cull();
|
|
}
|
|
|
|
void User::Oper(std::shared_ptr<OperInfo> info)
|
|
{
|
|
ModeHandler* opermh = ServerInstance->Modes.FindMode('o', MODETYPE_USER);
|
|
if (opermh)
|
|
{
|
|
if (this->IsModeSet(opermh))
|
|
this->UnOper();
|
|
this->SetMode(opermh, true);
|
|
}
|
|
this->oper = info;
|
|
|
|
LocalUser* localuser = IS_LOCAL(this);
|
|
if (localuser)
|
|
{
|
|
Modes::ChangeList changelist;
|
|
changelist.push_add(opermh);
|
|
ClientProtocol::Events::Mode modemsg(ServerInstance->FakeClient, NULL, localuser, changelist);
|
|
localuser->Send(modemsg);
|
|
}
|
|
|
|
FOREACH_MOD(OnOper, (this, info->name));
|
|
|
|
std::string opername;
|
|
if (info->oper_block)
|
|
opername = info->oper_block->getString("name");
|
|
|
|
ServerInstance->SNO.WriteToSnoMask('o', "%s (%s) is now a server operator of type %s (using oper '%s')",
|
|
nick.c_str(), MakeHost().c_str(), oper->name.c_str(), opername.c_str());
|
|
this->WriteNumeric(RPL_YOUAREOPER, InspIRCd::Format("You are now %s %s", strchr("aeiouAEIOU", oper->name[0]) ? "an" : "a", oper->name.c_str()));
|
|
|
|
ServerInstance->Users.all_opers.push_back(this);
|
|
|
|
// Expand permissions from config for faster lookup
|
|
if (localuser)
|
|
oper->init();
|
|
|
|
FOREACH_MOD(OnPostOper, (this, oper->name, opername));
|
|
}
|
|
|
|
namespace
|
|
{
|
|
void ParseModeList(std::bitset<64>& modeset, std::shared_ptr<ConfigTag> tag, const std::string& field)
|
|
{
|
|
for (const auto& chr : tag->getString(field))
|
|
{
|
|
if (chr == '*')
|
|
modeset.set();
|
|
else if (ModeParser::IsModeChar(chr))
|
|
modeset.set(chr - 'A');
|
|
else
|
|
ServerInstance->Logs.Log("CONFIG", LOG_DEFAULT, "'%c' is not a valid value for <class:%s>, ignoring...", chr, field.c_str());
|
|
}
|
|
}
|
|
}
|
|
|
|
void OperInfo::init()
|
|
{
|
|
AllowedOperCommands.Clear();
|
|
AllowedPrivs.Clear();
|
|
AllowedUserModes.reset();
|
|
AllowedChanModes.reset();
|
|
AllowedSnomasks.reset();
|
|
AllowedUserModes['o' - 'A'] = true; // Call me paranoid if you want.
|
|
|
|
for (const auto& tag : class_blocks)
|
|
{
|
|
AllowedOperCommands.AddList(tag->getString("commands"));
|
|
AllowedPrivs.AddList(tag->getString("privs"));
|
|
ParseModeList(AllowedChanModes, tag, "chanmodes");
|
|
ParseModeList(AllowedUserModes, tag, "usermodes");
|
|
ParseModeList(AllowedSnomasks, tag, "snomasks");
|
|
}
|
|
}
|
|
|
|
void User::UnOper()
|
|
{
|
|
if (!this->IsOper())
|
|
return;
|
|
|
|
/*
|
|
* unset their oper type (what IS_OPER checks).
|
|
* note, order is important - this must come before modes as -o attempts
|
|
* to call UnOper. -- w00t
|
|
*/
|
|
oper = NULL;
|
|
|
|
// Remove the user from the oper list
|
|
stdalgo::vector::swaperase(ServerInstance->Users.all_opers, this);
|
|
|
|
// If the user is quitting we shouldn't remove any modes as it results in
|
|
// mode messages being broadcast across the network.
|
|
if (quitting)
|
|
return;
|
|
|
|
/* Remove all oper only modes from the user when the deoper - Bug #466*/
|
|
Modes::ChangeList changelist;
|
|
for (const auto& [_, mh] : ServerInstance->Modes.GetModes(MODETYPE_USER))
|
|
{
|
|
if (mh->NeedsOper())
|
|
changelist.push_remove(mh);
|
|
}
|
|
|
|
ServerInstance->Modes.Process(this, NULL, this, changelist);
|
|
|
|
ModeHandler* opermh = ServerInstance->Modes.FindMode('o', MODETYPE_USER);
|
|
if (opermh)
|
|
this->SetMode(opermh, false);
|
|
FOREACH_MOD(OnPostDeoper, (this));
|
|
}
|
|
|
|
/*
|
|
* Check class restrictions
|
|
*/
|
|
void LocalUser::CheckClass(bool clone_count)
|
|
{
|
|
ConnectClass::Ptr a = GetClass();
|
|
|
|
if (!a)
|
|
{
|
|
ServerInstance->Users.QuitUser(this, "Access denied by configuration");
|
|
return;
|
|
}
|
|
else if (a->type == ConnectClass::DENY)
|
|
{
|
|
ServerInstance->Users.QuitUser(this, a->config->getString("reason", "Unauthorised connection", 1));
|
|
return;
|
|
}
|
|
else if (clone_count)
|
|
{
|
|
const UserManager::CloneCounts& clonecounts = ServerInstance->Users.GetCloneCounts(this);
|
|
if ((a->GetMaxLocal()) && (clonecounts.local > a->GetMaxLocal()))
|
|
{
|
|
ServerInstance->Users.QuitUser(this, "No more connections allowed from your host via this connect class (local)");
|
|
if (a->maxconnwarn)
|
|
{
|
|
ServerInstance->SNO.WriteToSnoMask('a', "WARNING: maximum local connections for the %s class (%ld) exceeded by %s",
|
|
a->name.c_str(), a->GetMaxLocal(), this->GetIPString().c_str());
|
|
}
|
|
return;
|
|
}
|
|
else if ((a->GetMaxGlobal()) && (clonecounts.global > a->GetMaxGlobal()))
|
|
{
|
|
ServerInstance->Users.QuitUser(this, "No more connections allowed from your host via this connect class (global)");
|
|
if (a->maxconnwarn)
|
|
{
|
|
ServerInstance->SNO.WriteToSnoMask('a', "WARNING: maximum global connections for the %s class (%ld) exceeded by %s",
|
|
a->name.c_str(), a->GetMaxGlobal(), this->GetIPString().c_str());
|
|
}
|
|
return;
|
|
}
|
|
}
|
|
|
|
this->nextping = ServerInstance->Time() + a->GetPingTime();
|
|
this->uniqueusername = a->uniqueusername;
|
|
}
|
|
|
|
bool LocalUser::CheckLines(bool doZline)
|
|
{
|
|
const char* check[] = { "G" , "K", (doZline) ? "Z" : NULL, NULL };
|
|
|
|
if (!this->exempt)
|
|
{
|
|
for (int n = 0; check[n]; ++n)
|
|
{
|
|
XLine *r = ServerInstance->XLines->MatchesLine(check[n], this);
|
|
|
|
if (r)
|
|
{
|
|
r->Apply(this);
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
void LocalUser::FullConnect()
|
|
{
|
|
ServerInstance->stats.Connects++;
|
|
this->idle_lastmsg = ServerInstance->Time();
|
|
|
|
/*
|
|
* You may be thinking "wtf, we checked this in User::AddClient!" - and yes, we did, BUT.
|
|
* At the time AddClient is called, we don't have a resolved host, by here we probably do - which
|
|
* may put the user into a totally separate class with different restrictions! so we *must* check again.
|
|
* Don't remove this! -- w00t
|
|
*/
|
|
connectclass = NULL;
|
|
SetClass();
|
|
CheckClass();
|
|
CheckLines();
|
|
|
|
if (quitting)
|
|
return;
|
|
|
|
/*
|
|
* We don't set REG_ALL until triggering OnUserConnect, so some module events don't spew out stuff
|
|
* for a user that doesn't exist yet.
|
|
*/
|
|
FOREACH_MOD(OnUserConnect, (this));
|
|
|
|
/* Now registered */
|
|
if (ServerInstance->Users.unregistered_count)
|
|
ServerInstance->Users.unregistered_count--;
|
|
this->registered = REG_ALL;
|
|
|
|
FOREACH_MOD(OnPostConnect, (this));
|
|
|
|
ServerInstance->SNO.WriteToSnoMask('c',"Client connecting on port %d (class %s): %s (%s) [%s\x0F]",
|
|
this->server_sa.port(), this->GetClass()->name.c_str(), GetFullRealHost().c_str(), this->GetIPString().c_str(), this->GetRealName().c_str());
|
|
ServerInstance->Logs.Log("BANCACHE", LOG_DEBUG, "BanCache: Adding NEGATIVE hit for " + this->GetIPString());
|
|
ServerInstance->BanCache.AddHit(this->GetIPString(), "", "");
|
|
// reset the flood penalty (which could have been raised due to things like auto +x)
|
|
CommandFloodPenalty = 0;
|
|
}
|
|
|
|
void User::InvalidateCache()
|
|
{
|
|
/* Invalidate cache */
|
|
cachedip.clear();
|
|
cached_fullhost.clear();
|
|
cached_hostip.clear();
|
|
cached_makehost.clear();
|
|
cached_fullrealhost.clear();
|
|
}
|
|
|
|
bool User::ChangeNick(const std::string& newnick, time_t newts)
|
|
{
|
|
if (quitting)
|
|
{
|
|
ServerInstance->Logs.Log("USERS", LOG_DEFAULT, "ERROR: Attempted to change nick of a quitting user: " + this->nick);
|
|
return false;
|
|
}
|
|
|
|
User* const InUse = ServerInstance->Users.FindNick(newnick);
|
|
if (InUse == this)
|
|
{
|
|
// case change, don't need to check campers
|
|
// and, if it's identical including case, we can leave right now
|
|
// We also don't update the nick TS if it's a case change, either
|
|
if (newnick == nick)
|
|
return true;
|
|
}
|
|
else
|
|
{
|
|
/*
|
|
* Uh oh.. if the nickname is in use, and it's not in use by the person using it (doh) --
|
|
* then we have a potential collide. Check whether someone else is camping on the nick
|
|
* (i.e. connect -> send NICK, don't send USER.) If they are camping, force-change the
|
|
* camper to their UID, and allow the incoming nick change.
|
|
*
|
|
* If the guy using the nick is already using it, tell the incoming nick change to gtfo,
|
|
* because the nick is already (rightfully) in use. -- w00t
|
|
*/
|
|
if (InUse)
|
|
{
|
|
if (InUse->registered != REG_ALL)
|
|
{
|
|
/* force the camper to their UUID, and ask them to re-send a NICK. */
|
|
LocalUser* const localuser = static_cast<LocalUser*>(InUse);
|
|
localuser->OverruleNick();
|
|
}
|
|
else
|
|
{
|
|
/* No camping, tell the incoming user to stop trying to change nick ;p */
|
|
this->WriteNumeric(ERR_NICKNAMEINUSE, newnick, "Nickname is already in use.");
|
|
return false;
|
|
}
|
|
}
|
|
|
|
age = newts ? newts : ServerInstance->Time();
|
|
}
|
|
|
|
if (this->registered == REG_ALL)
|
|
{
|
|
ClientProtocol::Messages::Nick nickmsg(this, newnick);
|
|
ClientProtocol::Event nickevent(ServerInstance->GetRFCEvents().nick, nickmsg);
|
|
this->WriteCommonRaw(nickevent, true);
|
|
}
|
|
const std::string oldnick = nick;
|
|
nick = newnick;
|
|
|
|
InvalidateCache();
|
|
ServerInstance->Users.clientlist.erase(oldnick);
|
|
ServerInstance->Users.clientlist[newnick] = this;
|
|
|
|
if (registered == REG_ALL)
|
|
FOREACH_MOD(OnUserPostNick, (this,oldnick));
|
|
|
|
return true;
|
|
}
|
|
|
|
void LocalUser::OverruleNick()
|
|
{
|
|
{
|
|
ClientProtocol::Messages::Nick nickmsg(this, this->uuid);
|
|
this->Send(ServerInstance->GetRFCEvents().nick, nickmsg);
|
|
}
|
|
this->WriteNumeric(ERR_NICKNAMEINUSE, this->nick, "Nickname overruled.");
|
|
|
|
// Clear the bit before calling ChangeNick() to make it NOT run the OnUserPostNick() hook
|
|
this->registered &= ~REG_NICK;
|
|
this->ChangeNick(this->uuid);
|
|
}
|
|
|
|
const std::string& User::GetIPString()
|
|
{
|
|
if (cachedip.empty())
|
|
{
|
|
cachedip = client_sa.addr();
|
|
/* IP addresses starting with a : on irc are a Bad Thing (tm) */
|
|
if (cachedip[0] == ':')
|
|
cachedip.insert(cachedip.begin(),1,'0');
|
|
}
|
|
|
|
return cachedip;
|
|
}
|
|
|
|
const std::string& User::GetBanIdent() const
|
|
{
|
|
static const std::string wildcard = "*";
|
|
return uniqueusername ? ident : wildcard;
|
|
}
|
|
|
|
const std::string& User::GetHost(bool uncloak) const
|
|
{
|
|
return uncloak ? GetRealHost() : GetDisplayedHost();
|
|
}
|
|
|
|
const std::string& User::GetDisplayedHost() const
|
|
{
|
|
return displayhost.empty() ? realhost : displayhost;
|
|
}
|
|
|
|
const std::string& User::GetRealHost() const
|
|
{
|
|
return realhost;
|
|
}
|
|
|
|
const std::string& User::GetRealName() const
|
|
{
|
|
return realname;
|
|
}
|
|
|
|
irc::sockets::cidr_mask User::GetCIDRMask()
|
|
{
|
|
unsigned char range = 0;
|
|
switch (client_sa.family())
|
|
{
|
|
case AF_INET6:
|
|
range = ServerInstance->Config->c_ipv6_range;
|
|
break;
|
|
case AF_INET:
|
|
range = ServerInstance->Config->c_ipv4_range;
|
|
break;
|
|
}
|
|
return irc::sockets::cidr_mask(client_sa, range);
|
|
}
|
|
|
|
bool User::SetClientIP(const std::string& address)
|
|
{
|
|
irc::sockets::sockaddrs sa;
|
|
if (!irc::sockets::aptosa(address, client_sa.port(), sa))
|
|
return false;
|
|
|
|
User::SetClientIP(sa);
|
|
return true;
|
|
}
|
|
|
|
void User::SetClientIP(const irc::sockets::sockaddrs& sa)
|
|
{
|
|
const std::string oldip(GetIPString());
|
|
memcpy(&client_sa, &sa, sizeof(irc::sockets::sockaddrs));
|
|
this->InvalidateCache();
|
|
|
|
// If the users hostname was their IP then update it.
|
|
if (GetRealHost() == oldip)
|
|
ChangeRealHost(GetIPString(), false);
|
|
if (GetDisplayedHost() == oldip)
|
|
ChangeDisplayedHost(GetIPString());
|
|
}
|
|
|
|
bool LocalUser::SetClientIP(const std::string& address)
|
|
{
|
|
irc::sockets::sockaddrs sa;
|
|
if (!irc::sockets::aptosa(address, client_sa.port(), sa))
|
|
return false;
|
|
|
|
LocalUser::SetClientIP(sa);
|
|
return true;
|
|
}
|
|
|
|
void LocalUser::SetClientIP(const irc::sockets::sockaddrs& sa)
|
|
{
|
|
if (sa == client_sa)
|
|
return;
|
|
|
|
ServerInstance->Users.RemoveCloneCounts(this);
|
|
User::SetClientIP(sa);
|
|
ServerInstance->Users.AddClone(this);
|
|
|
|
// Recheck the connect class.
|
|
this->connectclass = NULL;
|
|
this->SetClass();
|
|
this->CheckClass();
|
|
|
|
if (!quitting)
|
|
FOREACH_MOD(OnSetUserIP, (this));
|
|
}
|
|
|
|
void LocalUser::Write(const ClientProtocol::SerializedMessage& text)
|
|
{
|
|
if (!SocketEngine::BoundsCheckFd(&eh))
|
|
return;
|
|
|
|
if (ServerInstance->Config->RawLog)
|
|
{
|
|
if (text.empty())
|
|
return;
|
|
|
|
std::string::size_type nlpos = text.find_first_of("\r\n", 0, 2);
|
|
if (nlpos == std::string::npos)
|
|
nlpos = text.length(); // TODO is this ok, test it
|
|
|
|
ServerInstance->Logs.Log("USEROUTPUT", LOG_RAWIO, "C[%s] O %.*s", uuid.c_str(), static_cast<int>(nlpos), text.c_str());
|
|
}
|
|
|
|
eh.AddWriteBuf(text);
|
|
|
|
const size_t bytessent = text.length() + 2;
|
|
ServerInstance->stats.Sent += bytessent;
|
|
this->bytes_out += bytessent;
|
|
this->cmds_out++;
|
|
}
|
|
|
|
void LocalUser::Send(ClientProtocol::Event& protoev)
|
|
{
|
|
if (!serializer)
|
|
{
|
|
ServerInstance->Logs.Log("USERS", LOG_DEBUG, "BUG: LocalUser::Send() called on %s who does not have a serializer!",
|
|
GetFullRealHost().c_str());
|
|
return;
|
|
}
|
|
|
|
// In the most common case a static LocalUser field, sendmsglist, is passed to the event to be
|
|
// populated. The list is cleared before returning.
|
|
// To handle re-enters, if sendmsglist is non-empty upon entering the method then a temporary
|
|
// list is used instead of the static one.
|
|
if (sendmsglist.empty())
|
|
{
|
|
Send(protoev, sendmsglist);
|
|
sendmsglist.clear();
|
|
}
|
|
else
|
|
{
|
|
ClientProtocol::MessageList msglist;
|
|
Send(protoev, msglist);
|
|
}
|
|
}
|
|
|
|
void LocalUser::Send(ClientProtocol::Event& protoev, ClientProtocol::MessageList& msglist)
|
|
{
|
|
// Modules can personalize the messages sent per user for the event
|
|
protoev.GetMessagesForUser(this, msglist);
|
|
for (ClientProtocol::MessageList::const_iterator i = msglist.begin(); i != msglist.end(); ++i)
|
|
{
|
|
ClientProtocol::Message& curr = **i;
|
|
ModResult res;
|
|
FIRST_MOD_RESULT(OnUserWrite, res, (this, curr));
|
|
if (res != MOD_RES_DENY)
|
|
Write(serializer->SerializeForUser(this, curr));
|
|
}
|
|
}
|
|
|
|
void User::WriteNumeric(const Numeric::Numeric& numeric)
|
|
{
|
|
LocalUser* const localuser = IS_LOCAL(this);
|
|
if (!localuser)
|
|
return;
|
|
|
|
ModResult MOD_RESULT;
|
|
|
|
FIRST_MOD_RESULT(OnNumeric, MOD_RESULT, (this, numeric));
|
|
|
|
if (MOD_RESULT == MOD_RES_DENY)
|
|
return;
|
|
|
|
ClientProtocol::Messages::Numeric numericmsg(numeric, localuser);
|
|
localuser->Send(ServerInstance->GetRFCEvents().numeric, numericmsg);
|
|
}
|
|
|
|
void User::WriteRemoteNotice(const std::string& text)
|
|
{
|
|
ServerInstance->PI->SendMessage(this, text, MSG_NOTICE);
|
|
}
|
|
|
|
void LocalUser::WriteRemoteNotice(const std::string& text)
|
|
{
|
|
WriteNotice(text);
|
|
}
|
|
|
|
namespace
|
|
{
|
|
class WriteCommonRawHandler final
|
|
: public User::ForEachNeighborHandler
|
|
{
|
|
ClientProtocol::Event& ev;
|
|
|
|
void Execute(LocalUser* user) override
|
|
{
|
|
user->Send(ev);
|
|
}
|
|
|
|
public:
|
|
WriteCommonRawHandler(ClientProtocol::Event& protoev)
|
|
: ev(protoev)
|
|
{
|
|
}
|
|
};
|
|
}
|
|
|
|
void User::WriteCommonRaw(ClientProtocol::Event& protoev, bool include_self)
|
|
{
|
|
WriteCommonRawHandler handler(protoev);
|
|
ForEachNeighbor(handler, include_self);
|
|
}
|
|
|
|
uint64_t User::ForEachNeighbor(ForEachNeighborHandler& handler, bool include_self)
|
|
{
|
|
// The basic logic for visiting the neighbors of a user is to iterate the channel list of the user
|
|
// and visit all users on those channels. Because two users may share more than one common channel,
|
|
// we must skip users that we have already visited.
|
|
// To do this, we make use of a global counter and an integral 'already_sent' field in LocalUser.
|
|
// The global counter is incremented every time we do something for each neighbor of a user. Then,
|
|
// before visiting a member we examine user->already_sent. If it's equal to the current counter, we
|
|
// skip the member. Otherwise, we set it to the current counter and visit the member.
|
|
|
|
// Ask modules to build a list of exceptions.
|
|
// Mods may also exclude entire channels by erasing them from include_chans.
|
|
IncludeChanList include_chans(chans.begin(), chans.end());
|
|
std::map<User*, bool> exceptions;
|
|
exceptions[this] = include_self;
|
|
FOREACH_MOD(OnBuildNeighborList, (this, include_chans, exceptions));
|
|
|
|
// Get next id, guaranteed to differ from the already_sent field of all users
|
|
const uint64_t newid = ServerInstance->Users.NextAlreadySentId();
|
|
|
|
// Handle exceptions first
|
|
for (std::map<User*, bool>::const_iterator i = exceptions.begin(); i != exceptions.end(); ++i)
|
|
{
|
|
LocalUser* curr = IS_LOCAL(i->first);
|
|
if (curr)
|
|
{
|
|
// Mark as visited to ensure we won't visit again if there is a common channel
|
|
curr->already_sent = newid;
|
|
// Always treat quitting users as excluded
|
|
if ((i->second) && (!curr->quitting))
|
|
handler.Execute(curr);
|
|
}
|
|
}
|
|
|
|
// Now consider the real neighbors
|
|
for (const auto* memb : include_chans)
|
|
{
|
|
for (const auto& [user, _] : memb->chan->GetUsers())
|
|
{
|
|
LocalUser* curr = IS_LOCAL(user);
|
|
// User not yet visited?
|
|
if ((curr) && (curr->already_sent != newid))
|
|
{
|
|
// Mark as visited and execute function
|
|
curr->already_sent = newid;
|
|
handler.Execute(curr);
|
|
}
|
|
}
|
|
}
|
|
|
|
return newid;
|
|
}
|
|
|
|
void User::WriteRemoteNumeric(const Numeric::Numeric& numeric)
|
|
{
|
|
WriteNumeric(numeric);
|
|
}
|
|
|
|
/* return 0 or 1 depending if users u and u2 share one or more common channels
|
|
* (used by QUIT, NICK etc which arent channel specific notices)
|
|
*
|
|
* The old algorithm in 1.0 for this was relatively inefficient, iterating over
|
|
* the first users channels then the second users channels within the outer loop,
|
|
* therefore it was a maximum of x*y iterations (upon returning 0 and checking
|
|
* all possible iterations). However this new function instead checks against the
|
|
* channel's userlist in the inner loop which is a std::map<User*,User*>
|
|
* and saves us time as we already know what pointer value we are after.
|
|
* Don't quote me on the maths as i am not a mathematician or computer scientist,
|
|
* but i believe this algorithm is now x+(log y) maximum iterations instead.
|
|
*/
|
|
bool User::SharesChannelWith(User *other)
|
|
{
|
|
for (const auto* memb : chans)
|
|
{
|
|
if (memb->chan->HasUser(other))
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
bool User::ChangeRealName(const std::string& real)
|
|
{
|
|
if (!this->realname.compare(real))
|
|
return true;
|
|
|
|
if (IS_LOCAL(this))
|
|
{
|
|
ModResult MOD_RESULT;
|
|
FIRST_MOD_RESULT(OnPreChangeRealName, MOD_RESULT, (IS_LOCAL(this), real));
|
|
if (MOD_RESULT == MOD_RES_DENY)
|
|
return false;
|
|
}
|
|
FOREACH_MOD(OnChangeRealName, (this, real));
|
|
this->realname.assign(real, 0, ServerInstance->Config->Limits.MaxReal);
|
|
|
|
return true;
|
|
}
|
|
|
|
bool User::ChangeDisplayedHost(const std::string& shost)
|
|
{
|
|
if (GetDisplayedHost() == shost)
|
|
return true;
|
|
|
|
LocalUser* luser = IS_LOCAL(this);
|
|
if (luser)
|
|
{
|
|
ModResult MOD_RESULT;
|
|
FIRST_MOD_RESULT(OnPreChangeHost, MOD_RESULT, (luser, shost));
|
|
if (MOD_RESULT == MOD_RES_DENY)
|
|
return false;
|
|
}
|
|
|
|
FOREACH_MOD(OnChangeHost, (this,shost));
|
|
|
|
if (realhost == shost)
|
|
this->displayhost.clear();
|
|
else
|
|
this->displayhost.assign(shost, 0, ServerInstance->Config->Limits.MaxHost);
|
|
|
|
this->InvalidateCache();
|
|
|
|
if (IS_LOCAL(this) && this->registered != REG_NONE)
|
|
this->WriteNumeric(RPL_YOURDISPLAYEDHOST, this->GetDisplayedHost(), "is now your displayed host");
|
|
|
|
return true;
|
|
}
|
|
|
|
void User::ChangeRealHost(const std::string& host, bool resetdisplay)
|
|
{
|
|
// If the real host is the new host and we are not resetting the
|
|
// display host then we have nothing to do.
|
|
const bool changehost = (realhost != host);
|
|
if (!changehost && !resetdisplay)
|
|
return;
|
|
|
|
// If the displayhost is not set and we are not resetting it then
|
|
// we need to copy it to the displayhost field.
|
|
if (displayhost.empty() && !resetdisplay)
|
|
displayhost = realhost;
|
|
|
|
// If the displayhost is the new host or we are resetting it then
|
|
// we clear its contents to save memory.
|
|
else if (displayhost == host || resetdisplay)
|
|
displayhost.clear();
|
|
|
|
// If we are just resetting the display host then we don't need to
|
|
// do anything else.
|
|
if (!changehost)
|
|
return;
|
|
|
|
// Don't call the OnChangeRealHost event when initialising a user.
|
|
const bool initializing = realhost.empty();
|
|
if (!initializing)
|
|
FOREACH_MOD(OnChangeRealHost, (this, host));
|
|
|
|
realhost = host;
|
|
this->InvalidateCache();
|
|
|
|
// Don't call the OnPostChangeRealHost event when initialising a user.
|
|
if (!this->quitting && !initializing)
|
|
FOREACH_MOD(OnPostChangeRealHost, (this));
|
|
}
|
|
|
|
bool User::ChangeIdent(const std::string& newident)
|
|
{
|
|
if (this->ident == newident)
|
|
return true;
|
|
|
|
FOREACH_MOD(OnChangeIdent, (this,newident));
|
|
|
|
this->ident.assign(newident, 0, ServerInstance->Config->Limits.MaxUser);
|
|
this->InvalidateCache();
|
|
|
|
return true;
|
|
}
|
|
|
|
/*
|
|
* Sets a user's connection class.
|
|
* If the class name is provided, it will be used. Otherwise, the class will be guessed using host/ip/ident/etc.
|
|
* NOTE: If the <ALLOW> or <DENY> tag specifies an ip, and this user resolves,
|
|
* then their ip will be taken as 'priority' anyway, so for example,
|
|
* <connect allow="127.0.0.1"> will match joe!bloggs@localhost
|
|
*/
|
|
void LocalUser::SetClass(const std::string &explicit_name)
|
|
{
|
|
ServerInstance->Logs.Log("CONNECTCLASS", LOG_DEBUG, "Setting connect class for %s (%s) ...",
|
|
this->uuid.c_str(), this->GetFullRealHost().c_str());
|
|
|
|
ConnectClass::Ptr found;
|
|
if (!explicit_name.empty())
|
|
{
|
|
for (const auto& c : ServerInstance->Config->Classes)
|
|
{
|
|
if (explicit_name == c->name)
|
|
{
|
|
ServerInstance->Logs.Log("CONNECTCLASS", LOG_DEBUG, "Connect class explicitly set to %s",
|
|
explicit_name.c_str());
|
|
found = c;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
for (const auto& c : ServerInstance->Config->Classes)
|
|
{
|
|
ServerInstance->Logs.Log("CONNECTCLASS", LOG_DEBUG, "Checking the %s connect class ...",
|
|
c->GetName().c_str());
|
|
|
|
ModResult MOD_RESULT;
|
|
FIRST_MOD_RESULT(OnSetConnectClass, MOD_RESULT, (this,c));
|
|
if (MOD_RESULT == MOD_RES_DENY)
|
|
continue;
|
|
|
|
if (MOD_RESULT == MOD_RES_ALLOW)
|
|
{
|
|
ServerInstance->Logs.Log("CONNECTCLASS", LOG_DEBUG, "The %s connect class was explicitly chosen by a module",
|
|
c->GetName().c_str());
|
|
found = c;
|
|
break;
|
|
}
|
|
|
|
if (c->type == ConnectClass::NAMED)
|
|
{
|
|
ServerInstance->Logs.Log("CONNECTCLASS", LOG_DEBUG, "The %s connect class is not suitable as neither <connect:allow> nor <connect:deny> are set",
|
|
c->GetName().c_str());
|
|
continue;
|
|
}
|
|
|
|
bool regdone = (registered != REG_NONE);
|
|
if (c->config->getBool("registered", regdone) != regdone)
|
|
{
|
|
ServerInstance->Logs.Log("CONNECTCLASS", LOG_DEBUG, "The %s connect class is not suitable as it requires that the user is %s",
|
|
c->GetName().c_str(), regdone ? "not fully connected" : "fully connected");
|
|
continue;
|
|
}
|
|
|
|
bool hostmatches = false;
|
|
for (const auto& host : c->GetHosts())
|
|
{
|
|
if (InspIRCd::MatchCIDR(this->GetIPString(), host) || InspIRCd::MatchCIDR(this->GetRealHost(), host))
|
|
{
|
|
hostmatches = true;
|
|
break;
|
|
}
|
|
}
|
|
if (!hostmatches)
|
|
{
|
|
const std::string hosts = stdalgo::string::join(c->GetHosts());
|
|
ServerInstance->Logs.Log("CONNECTCLASS", LOG_DEBUG, "The %s connect class is not suitable as neither the host (%s) nor the IP (%s) matches %s",
|
|
c->GetName().c_str(), this->GetRealHost().c_str(), this->GetIPString().c_str(), hosts.c_str());
|
|
continue;
|
|
}
|
|
|
|
/*
|
|
* deny change if change will take class over the limit check it HERE, not after we found a matching class,
|
|
* because we should attempt to find another class if this one doesn't match us. -- w00t
|
|
*/
|
|
if (c->limit && (c.use_count() >= static_cast<long>(c->limit)))
|
|
{
|
|
// HACK: using use_count() is awful and should be removed before v4 is released.
|
|
ServerInstance->Logs.Log("CONNECTCLASS", LOG_DEBUG, "The %s connect class is not suitable as it has reached its user limit (%lu)",
|
|
c->GetName().c_str(), c->limit);
|
|
continue;
|
|
}
|
|
|
|
/* if it requires a port and our port doesn't match, fail */
|
|
if (!c->ports.empty() && !c->ports.count(this->server_sa.port()))
|
|
{
|
|
ServerInstance->Logs.Log("CONNECTCLASS", LOG_DEBUG, "The %s connect class is not suitable as the connection port (%d) is not any of %s",
|
|
c->GetName().c_str(), this->server_sa.port(), stdalgo::string::join(c->ports).c_str());
|
|
continue;
|
|
}
|
|
|
|
if (regdone && !c->password.empty() && !ServerInstance->PassCompare(this, c->password, password, c->passwordhash))
|
|
{
|
|
ServerInstance->Logs.Log("CONNECTCLASS", LOG_DEBUG, "The %s connect class is not suitable as requires a password and %s",
|
|
c->GetName().c_str(), password.empty() ? "one was not provided" : "the provided password was incorrect");
|
|
continue;
|
|
}
|
|
|
|
/* we stop at the first class that meets ALL criteria. */
|
|
ServerInstance->Logs.Log("CONNECTCLASS", LOG_DEBUG, "The %s connect class is suitable for %s (%s)",
|
|
c->GetName().c_str(), this->uuid.c_str(), this->GetFullRealHost().c_str());
|
|
found = c;
|
|
break;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Okay, assuming we found a class that matches.. switch us into that class, keeping refcounts up to date.
|
|
*/
|
|
if (found)
|
|
{
|
|
connectclass = found;
|
|
}
|
|
}
|
|
|
|
void User::PurgeEmptyChannels()
|
|
{
|
|
// firstly decrement the count on each channel
|
|
for (User::ChanList::iterator i = this->chans.begin(); i != this->chans.end(); )
|
|
{
|
|
Channel* c = (*i)->chan;
|
|
++i;
|
|
c->DelUser(this);
|
|
}
|
|
}
|
|
|
|
void User::WriteNotice(const std::string& text)
|
|
{
|
|
LocalUser* const localuser = IS_LOCAL(this);
|
|
if (!localuser)
|
|
return;
|
|
|
|
ClientProtocol::Messages::Privmsg msg(ClientProtocol::Messages::Privmsg::nocopy, ServerInstance->FakeClient, localuser, text, MSG_NOTICE);
|
|
localuser->Send(ServerInstance->GetRFCEvents().privmsg, msg);
|
|
}
|
|
|
|
const std::string& FakeUser::GetFullHost()
|
|
{
|
|
return server->GetPublicName();
|
|
}
|
|
|
|
const std::string& FakeUser::GetFullRealHost()
|
|
{
|
|
return server->GetPublicName();
|
|
}
|
|
|
|
ConnectClass::ConnectClass(std::shared_ptr<ConfigTag> tag, Type t, const std::vector<std::string>& masks)
|
|
: config(tag)
|
|
, hosts(masks)
|
|
, name("unnamed")
|
|
, type(t)
|
|
, fakelag(true)
|
|
, maxconnwarn(true)
|
|
, resolvehostnames(true)
|
|
, uniqueusername(false)
|
|
{
|
|
}
|
|
|
|
ConnectClass::ConnectClass(std::shared_ptr<ConfigTag> tag, Type t, const std::vector<std::string>& masks, ConnectClass::Ptr parent)
|
|
{
|
|
Update(parent);
|
|
name = "unnamed";
|
|
type = t;
|
|
hosts = masks;
|
|
|
|
// Connect classes can inherit from each other but this is problematic for modules which can't use
|
|
// ConnectClass::Update so we build a hybrid tag containing all of the values set on this class as
|
|
// well as the parent class.
|
|
config = std::make_shared<ConfigTag>(tag->name, tag->source);
|
|
for (const auto& [key, value] : parent->config->GetItems())
|
|
{
|
|
// The class name and parent name are not inherited
|
|
if (stdalgo::string::equalsci(key, "name") || stdalgo::string::equalsci(key, "parent"))
|
|
continue;
|
|
|
|
// Store the item in the config tag. If this item also
|
|
// exists in the child it will be overwritten.
|
|
config->GetItems()[key] = value;
|
|
}
|
|
|
|
for (const auto& [key, value] : tag->GetItems())
|
|
{
|
|
// This will overwrite the parent value if present.
|
|
config->GetItems()[key] = value;
|
|
}
|
|
}
|
|
|
|
void ConnectClass::Configure(const std::string& classname, std::shared_ptr<ConfigTag> tag)
|
|
{
|
|
name = classname;
|
|
|
|
password = tag->getString("password", password);
|
|
passwordhash = tag->getString("hash", passwordhash);
|
|
if (!password.empty() && (passwordhash.empty() || stdalgo::string::equalsci(passwordhash, "plaintext")))
|
|
{
|
|
ServerInstance->Logs.Log("CONNECTCLASS", LOG_DEFAULT, "<connect> tag '%s' at %s contains an plain text password, this is insecure!",
|
|
name.c_str(), tag->source.str().c_str());
|
|
}
|
|
|
|
irc::portparser portrange(tag->getString("port"), false);
|
|
while (long port = portrange.GetToken())
|
|
ports.insert(static_cast<int>(port));
|
|
|
|
commandrate = tag->getUInt("commandrate", commandrate, 1);
|
|
fakelag = tag->getBool("fakelag", fakelag);
|
|
hardsendqmax = tag->getUInt("hardsendq", hardsendqmax, ServerInstance->Config->Limits.MaxLine);
|
|
limit = tag->getUInt("limit", limit, 1);
|
|
maxchans = tag->getUInt("maxchans", maxchans);
|
|
maxconnwarn = tag->getBool("maxconnwarn", maxconnwarn);
|
|
maxglobal = tag->getUInt("globalmax", maxglobal, 1);
|
|
maxlocal = tag->getUInt("localmax", maxlocal, 1);
|
|
penaltythreshold = tag->getUInt("threshold", penaltythreshold, 1);
|
|
pingtime = tag->getDuration("pingfreq", pingtime);
|
|
recvqmax = tag->getUInt("recvq", recvqmax, ServerInstance->Config->Limits.MaxLine);
|
|
registration_timeout = tag->getDuration("timeout", registration_timeout);
|
|
resolvehostnames = tag->getBool("resolvehostnames", resolvehostnames);
|
|
softsendqmax = tag->getUInt("softsendq", softsendqmax, ServerInstance->Config->Limits.MaxLine);
|
|
uniqueusername = tag->getBool("uniqueusername", uniqueusername);
|
|
}
|
|
|
|
void ConnectClass::Update(const ConnectClass::Ptr src)
|
|
{
|
|
ServerInstance->Logs.Log("CONNECTCLASS", LOG_DEBUG, "Updating %s from %s", name.c_str(), src->name.c_str());
|
|
commandrate = src->commandrate;
|
|
config = src->config;
|
|
fakelag = src->fakelag;
|
|
hardsendqmax = src->hardsendqmax;
|
|
hosts = src->hosts;
|
|
limit = src->limit;
|
|
maxchans = src->maxchans;
|
|
maxconnwarn = src->maxconnwarn;
|
|
maxglobal = src->maxglobal;
|
|
maxlocal = src->maxlocal;
|
|
name = src->name;
|
|
password = src->password;
|
|
passwordhash = src->passwordhash;
|
|
penaltythreshold = src->penaltythreshold;
|
|
pingtime = src->pingtime;
|
|
ports = src->ports;
|
|
recvqmax = src->recvqmax;
|
|
registration_timeout = src->registration_timeout;
|
|
resolvehostnames = src->resolvehostnames;
|
|
softsendqmax = src->softsendqmax;
|
|
type = src->type;
|
|
uniqueusername = src->uniqueusername;
|
|
}
|