mirror of
git://git.acid.vegas/anope.git
synced 2024-11-30 11:36:41 +00:00
293 lines
8.9 KiB
C++
293 lines
8.9 KiB
C++
/* ChanServ core functions
|
|
*
|
|
* (C) 2003-2022 Anope Team
|
|
* Contact us at team@anope.org
|
|
*
|
|
* Original Coder: GeniusDex <geniusdex@anope.org>
|
|
*
|
|
* Please read COPYING and README for further details.
|
|
*
|
|
* Send any bug reports to the Anope Coder, as he will be able
|
|
* to deal with it best.
|
|
*/
|
|
|
|
#include "module.h"
|
|
|
|
class CommandCSEnforce : public Command
|
|
{
|
|
private:
|
|
void DoSecureOps(CommandSource &source, ChannelInfo *ci)
|
|
{
|
|
bool override = !source.AccessFor(ci).HasPriv("AKICK") && source.HasPriv("chanserv/access/modify");
|
|
Log(override ? LOG_OVERRIDE : LOG_COMMAND, source, this, ci) << "to enforce secureops";
|
|
|
|
/* Dirty hack to allow Channel::SetCorrectModes to work ok.
|
|
* We pretend like SECUREOPS is on so it doesn't ignore that
|
|
* part of the code. This way we can enforce SECUREOPS even
|
|
* if it's off.
|
|
*/
|
|
bool hadsecureops = ci->HasExt("SECUREOPS");
|
|
ci->Extend<bool>("SECUREOPS");
|
|
|
|
for (Channel::ChanUserList::iterator it = ci->c->users.begin(), it_end = ci->c->users.end(); it != it_end; ++it)
|
|
{
|
|
ChanUserContainer *uc = it->second;
|
|
|
|
ci->c->SetCorrectModes(uc->user, false);
|
|
}
|
|
|
|
if (!hadsecureops)
|
|
ci->Shrink<bool>("SECUREOPS");
|
|
|
|
source.Reply(_("Secureops enforced on %s."), ci->name.c_str());
|
|
}
|
|
|
|
void DoRestricted(CommandSource &source, ChannelInfo *ci)
|
|
{
|
|
bool override = !source.AccessFor(ci).HasPriv("AKICK") && source.HasPriv("chanserv/access/modify");
|
|
Log(override ? LOG_OVERRIDE : LOG_COMMAND, source, this, ci) << "to enforce restricted";
|
|
|
|
std::vector<User *> users;
|
|
for (Channel::ChanUserList::iterator it = ci->c->users.begin(), it_end = ci->c->users.end(); it != it_end; ++it)
|
|
{
|
|
ChanUserContainer *uc = it->second;
|
|
User *user = uc->user;
|
|
|
|
if (user->IsProtected())
|
|
continue;
|
|
|
|
if (ci->AccessFor(user).empty())
|
|
users.push_back(user);
|
|
}
|
|
|
|
for (unsigned i = 0; i < users.size(); ++i)
|
|
{
|
|
User *user = users[i];
|
|
|
|
Anope::string mask = ci->GetIdealBan(user);
|
|
Anope::string reason = Language::Translate(user, _("RESTRICTED enforced by ")) + source.GetNick();
|
|
ci->c->SetMode(NULL, "BAN", mask);
|
|
ci->c->Kick(NULL, user, "%s", reason.c_str());
|
|
}
|
|
|
|
source.Reply(_("Restricted enforced on %s."), ci->name.c_str());
|
|
}
|
|
|
|
void DoRegOnly(CommandSource &source, ChannelInfo *ci)
|
|
{
|
|
bool override = !source.AccessFor(ci).HasPriv("AKICK") && source.HasPriv("chanserv/access/modify");
|
|
Log(override ? LOG_OVERRIDE : LOG_COMMAND, source, this, ci) << "to enforce registered only";
|
|
|
|
std::vector<User *> users;
|
|
for (Channel::ChanUserList::iterator it = ci->c->users.begin(), it_end = ci->c->users.end(); it != it_end; ++it)
|
|
{
|
|
ChanUserContainer *uc = it->second;
|
|
User *user = uc->user;
|
|
|
|
if (user->IsProtected())
|
|
continue;
|
|
|
|
if (!user->IsIdentified())
|
|
users.push_back(user);
|
|
}
|
|
|
|
for (unsigned i = 0; i < users.size(); ++i)
|
|
{
|
|
User *user = users[i];
|
|
|
|
Anope::string mask = ci->GetIdealBan(user);
|
|
Anope::string reason = Language::Translate(user, _("REGONLY enforced by ")) + source.GetNick();
|
|
if (!ci->c->HasMode("REGISTEREDONLY"))
|
|
ci->c->SetMode(NULL, "BAN", mask);
|
|
ci->c->Kick(NULL, user, "%s", reason.c_str());
|
|
}
|
|
|
|
source.Reply(_("Registered only enforced on %s."), ci->name.c_str());
|
|
}
|
|
|
|
void DoSSLOnly(CommandSource &source, ChannelInfo *ci)
|
|
{
|
|
bool override = !source.AccessFor(ci).HasPriv("AKICK") && source.HasPriv("chanserv/access/modify");
|
|
Log(override ? LOG_OVERRIDE : LOG_COMMAND, source, this, ci) << "to enforce SSL only";
|
|
|
|
std::vector<User *> users;
|
|
for (Channel::ChanUserList::iterator it = ci->c->users.begin(), it_end = ci->c->users.end(); it != it_end; ++it)
|
|
{
|
|
ChanUserContainer *uc = it->second;
|
|
User *user = uc->user;
|
|
|
|
if (user->IsProtected())
|
|
continue;
|
|
|
|
if (!user->HasMode("SSL") && !user->HasExt("ssl"))
|
|
users.push_back(user);
|
|
}
|
|
|
|
for (unsigned i = 0; i < users.size(); ++i)
|
|
{
|
|
User *user = users[i];
|
|
|
|
Anope::string mask = ci->GetIdealBan(user);
|
|
Anope::string reason = Language::Translate(user, _("SSLONLY enforced by ")) + source.GetNick();
|
|
if (!ci->c->HasMode("SSL"))
|
|
ci->c->SetMode(NULL, "BAN", mask);
|
|
ci->c->Kick(NULL, user, "%s", reason.c_str());
|
|
}
|
|
|
|
source.Reply(_("SSL only enforced on %s."), ci->name.c_str());
|
|
}
|
|
|
|
void DoBans(CommandSource &source, ChannelInfo *ci)
|
|
{
|
|
bool override = !source.AccessFor(ci).HasPriv("AKICK") && source.HasPriv("chanserv/access/modify");
|
|
Log(override ? LOG_OVERRIDE : LOG_COMMAND, source, this, ci) << "to enforce bans";
|
|
|
|
std::vector<User *> users;
|
|
for (Channel::ChanUserList::iterator it = ci->c->users.begin(), it_end = ci->c->users.end(); it != it_end; ++it)
|
|
{
|
|
ChanUserContainer *uc = it->second;
|
|
User *user = uc->user;
|
|
|
|
if (user->IsProtected())
|
|
continue;
|
|
|
|
if (ci->c->MatchesList(user, "BAN") && !ci->c->MatchesList(user, "EXCEPT"))
|
|
users.push_back(user);
|
|
}
|
|
|
|
for (unsigned i = 0; i < users.size(); ++i)
|
|
{
|
|
User *user = users[i];
|
|
|
|
Anope::string reason = Language::Translate(user, _("BANS enforced by ")) + source.GetNick();
|
|
ci->c->Kick(NULL, user, "%s", reason.c_str());
|
|
}
|
|
|
|
source.Reply(_("Bans enforced on %s."), ci->name.c_str());
|
|
}
|
|
|
|
void DoLimit(CommandSource &source, ChannelInfo *ci)
|
|
{
|
|
bool override = !source.AccessFor(ci).HasPriv("AKICK") && source.HasPriv("chanserv/access/modify");
|
|
Log(override ? LOG_OVERRIDE : LOG_COMMAND, source, this, ci) << "to enforce limit";
|
|
|
|
Anope::string l_str;
|
|
if (!ci->c->GetParam("LIMIT", l_str))
|
|
{
|
|
source.Reply(_("No limit is set on %s."), ci->name.c_str());
|
|
return;
|
|
}
|
|
|
|
int l;
|
|
try
|
|
{
|
|
l = convertTo<int>(l_str);
|
|
if (l < 0)
|
|
throw ConvertException();
|
|
}
|
|
catch (const ConvertException &)
|
|
{
|
|
source.Reply(_("The limit on %s is not valid."), ci->name.c_str());
|
|
return;
|
|
}
|
|
|
|
std::vector<User *> users;
|
|
/* The newer users are at the end of the list, so kick users starting from the end */
|
|
for (Channel::ChanUserList::reverse_iterator it = ci->c->users.rbegin(), it_end = ci->c->users.rend(); it != it_end; ++it)
|
|
{
|
|
ChanUserContainer *uc = it->second;
|
|
User *user = uc->user;
|
|
|
|
if (user->IsProtected())
|
|
continue;
|
|
|
|
if (!ci->AccessFor(user).empty())
|
|
continue;
|
|
|
|
if (ci->c->users.size() - users.size() <= static_cast<unsigned>(l))
|
|
continue;
|
|
|
|
users.push_back(user);
|
|
}
|
|
|
|
for (unsigned i = 0; i < users.size(); ++i)
|
|
{
|
|
User *user = users[i];
|
|
|
|
Anope::string reason = Language::Translate(user, _("LIMIT enforced by ")) + source.GetNick();
|
|
ci->c->Kick(NULL, user, "%s", reason.c_str());
|
|
}
|
|
|
|
source.Reply(_("LIMIT enforced on %s, %d users removed."), ci->name.c_str(), users.size());
|
|
}
|
|
|
|
public:
|
|
CommandCSEnforce(Module *creator) : Command(creator, "chanserv/enforce", 2, 2)
|
|
{
|
|
this->SetDesc(_("Enforce various channel modes and set options"));
|
|
this->SetSyntax(_("\037channel\037 \037what\037"));
|
|
}
|
|
|
|
void Execute(CommandSource &source, const std::vector<Anope::string> ¶ms) anope_override
|
|
{
|
|
const Anope::string &what = params.size() > 1 ? params[1] : "";
|
|
|
|
ChannelInfo *ci = ChannelInfo::Find(params[0]);
|
|
|
|
if (!ci)
|
|
source.Reply(CHAN_X_NOT_REGISTERED, params[0].c_str());
|
|
else if (!ci->c)
|
|
source.Reply(CHAN_X_NOT_IN_USE, ci->name.c_str());
|
|
else if (!source.AccessFor(ci).HasPriv("AKICK") && !source.HasPriv("chanserv/access/modify"))
|
|
source.Reply(ACCESS_DENIED);
|
|
else if (what.equals_ci("SECUREOPS"))
|
|
this->DoSecureOps(source, ci);
|
|
else if (what.equals_ci("RESTRICTED"))
|
|
this->DoRestricted(source, ci);
|
|
else if (what.equals_ci("REGONLY"))
|
|
this->DoRegOnly(source, ci);
|
|
else if (what.equals_ci("SSLONLY"))
|
|
this->DoSSLOnly(source, ci);
|
|
else if (what.equals_ci("BANS"))
|
|
this->DoBans(source, ci);
|
|
else if (what.equals_ci("LIMIT"))
|
|
this->DoLimit(source, ci);
|
|
else
|
|
this->OnSyntaxError(source, "");
|
|
}
|
|
|
|
bool OnHelp(CommandSource &source, const Anope::string &subcommand) anope_override
|
|
{
|
|
this->SendSyntax(source);
|
|
source.Reply(" ");
|
|
source.Reply(_("Enforce various channel modes and set options. The \037channel\037\n"
|
|
"option indicates what channel to enforce the modes and options\n"
|
|
"on. The \037what\037 option indicates what modes and options to\n"
|
|
"enforce, and can be any of \002SECUREOPS\002, \002RESTRICTED\002, \002REGONLY\002, \002SSLONLY\002,\n"
|
|
"\002BANS\002, or \002LIMIT\002.\n"
|
|
" \n"
|
|
"Use \002SECUREOPS\002 to enforce the SECUREOPS option, even if it is not\n"
|
|
"enabled. Use \002RESTRICTED\002 to enforce the RESTRICTED option, also\n"
|
|
"if it's not enabled. Use \002REGONLY\002 to kick all unregistered users\n"
|
|
"from the channel. Use \002SSLONLY\002 to kick all users not using a secure\n"
|
|
"connection from the channel. \002BANS\002 will enforce bans on the channel by\n"
|
|
"kicking users affected by them, and \002LIMIT\002 will kick users until the\n"
|
|
"user count drops below the channel limit, if one is set."));
|
|
return true;
|
|
}
|
|
};
|
|
|
|
class CSEnforce : public Module
|
|
{
|
|
CommandCSEnforce commandcsenforce;
|
|
|
|
public:
|
|
CSEnforce(const Anope::string &modname, const Anope::string &creator) : Module(modname, creator, VENDOR),
|
|
commandcsenforce(this)
|
|
{
|
|
|
|
}
|
|
};
|
|
|
|
MODULE_INIT(CSEnforce)
|