/************************************************************************ * IRC - Internet Relay Chat, api-extban.c * (C) 2003 Bram Matthys (Syzop) and the UnrealIRCd Team * * See file AUTHORS in IRC package for additional names of * the programmers. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 1, or (at your option) * any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "unrealircd.h" Extban MODVAR ExtBan_Table[EXTBANTABLESZ]; /* this should be fastest */ unsigned MODVAR short ExtBan_highest = 0; void set_isupport_extban(void) { int i; char extbanstr[EXTBANTABLESZ+1], *m; m = extbanstr; for (i = 0; i <= ExtBan_highest; i++) { if (ExtBan_Table[i].flag) *m++ = ExtBan_Table[i].flag; } *m = 0; ISupportSetFmt(NULL, "EXTBAN", "~,%s", extbanstr); } Extban *findmod_by_bantype(char c) { int i; for (i=0; i <= ExtBan_highest; i++) if (ExtBan_Table[i].flag == c) return &ExtBan_Table[i]; return NULL; } Extban *ExtbanAdd(Module *module, ExtbanInfo req) { int slot; if (findmod_by_bantype(req.flag)) { if (module) module->errorcode = MODERR_EXISTS; return NULL; } /* TODO: perhaps some sanity checking on a-zA-Z0-9? */ for (slot = 0; slot < EXTBANTABLESZ; slot++) if (ExtBan_Table[slot].flag == '\0') break; if (slot >= EXTBANTABLESZ - 1) { if (module) module->errorcode = MODERR_NOSPACE; return NULL; } ExtBan_Table[slot].flag = req.flag; ExtBan_Table[slot].is_ok = req.is_ok; ExtBan_Table[slot].conv_param = req.conv_param; ExtBan_Table[slot].is_banned = req.is_banned; ExtBan_Table[slot].owner = module; ExtBan_Table[slot].options = req.options; if (module) { ModuleObject *banobj = safe_alloc(sizeof(ModuleObject)); banobj->object.extban = &ExtBan_Table[slot]; banobj->type = MOBJ_EXTBAN; AddListItem(banobj, module->objects); module->errorcode = MODERR_NOERROR; } ExtBan_highest = slot; set_isupport_extban(); return &ExtBan_Table[slot]; } void ExtbanDel(Extban *eb) { /* Just zero it all away.. */ if (eb->owner) { ModuleObject *banobj; for (banobj = eb->owner->objects; banobj; banobj = banobj->next) { if (banobj->type == MOBJ_EXTBAN && banobj->object.extban == eb) { DelListItem(banobj, eb->owner->objects); safe_free(banobj); break; } } } memset(eb, 0, sizeof(Extban)); set_isupport_extban(); /* Hmm do we want to go trough all chans and remove the bans? * I would say 'no' because perhaps we are just reloading, * and else.. well... screw them? */ } /* NOTE: the routines below can safely assume the ban has at * least the '~t:' part (t=type). -- Syzop */ /** General is_ok for n!u@h stuff that also deals with recursive extbans. */ int extban_is_ok_nuh_extban(Client *client, Channel* channel, char *para, int checkt, int what, int what2) { char *mask = (para + 3); Extban *p = NULL; int isok; static int extban_is_ok_recursion = 0; /* Mostly copied from clean_ban_mask - but note MyUser checks aren't needed here: extban->is_ok() according to cmd_mode isn't called for nonlocal. */ if (is_extended_ban(mask)) { if (extban_is_ok_recursion) return 0; /* Fail: more than one stacked extban */ if ((checkt == EXBCHK_PARAM) && RESTRICT_EXTENDEDBANS && !ValidatePermissionsForPath("immune:restrict-extendedbans",client,NULL,channel,NULL)) { /* Test if this specific extban has been disabled. * (We can be sure RESTRICT_EXTENDEDBANS is not *. Else this extended ban wouldn't be happening at all.) */ if (strchr(RESTRICT_EXTENDEDBANS, mask[1])) { sendnotice(client, "Setting/removing of extended bantypes '%s' has been disabled.", RESTRICT_EXTENDEDBANS); return 0; /* Fail */ } } p = findmod_by_bantype(mask[1]); if (!p) { if (what == MODE_DEL) { return 1; /* Always allow killing unknowns. */ } return 0; /* Don't add unknown extbans. */ } /* Now we have to ask the stacked extban if it's ok. */ if (p->is_ok) { extban_is_ok_recursion++; isok = p->is_ok(client, channel, mask, checkt, what, what2); extban_is_ok_recursion--; return isok; } } return 1; /* Either not an extban, or extban has NULL is_ok. Good to go. */ } /** Some kind of general conv_param routine, * to ensure the parameter is nick!user@host. * most of the code is just copied from clean_ban_mask. */ char *extban_conv_param_nuh(char *para) { char *cp, *user, *host, *mask, *ret = NULL; static char retbuf[USERLEN + NICKLEN + HOSTLEN + 32]; char tmpbuf[USERLEN + NICKLEN + HOSTLEN + 32]; char pfix[8]; if (strlen(para)<3) return NULL; /* normally impossible */ strlcpy(tmpbuf, para, sizeof(retbuf)); mask = tmpbuf + 3; strlcpy(pfix, tmpbuf, mask - tmpbuf + 1); if (!*mask) return NULL; /* empty extban */ if ((*mask == '~') && !strchr(mask, '@')) return NULL; /* not a user@host ban, too confusing. */ if ((user = strchr((cp = mask), '!'))) *user++ = '\0'; if ((host = strrchr(user ? user : cp, '@'))) { *host++ = '\0'; if (!user) ret = make_nick_user_host(NULL, trim_str(cp,USERLEN), trim_str(host,HOSTLEN)); } else if (!user && strchr(cp, '.')) ret = make_nick_user_host(NULL, NULL, trim_str(cp,HOSTLEN)); if (!ret) ret = make_nick_user_host(trim_str(cp,NICKLEN), trim_str(user,USERLEN), trim_str(host,HOSTLEN)); ircsnprintf(retbuf, sizeof(retbuf), "%s%s", pfix, ret); return retbuf; } /** conv_param to deal with stacked extbans. */ char *extban_conv_param_nuh_or_extban(char *para) { #if (USERLEN + NICKLEN + HOSTLEN + 32) > 256 #error "wtf?" #endif static char retbuf[256]; static char printbuf[256]; char *mask; char tmpbuf[USERLEN + NICKLEN + HOSTLEN + 32]; char bantype = para[1]; char *ret = NULL; Extban *p = NULL; static int extban_recursion = 0; if ((strlen(para)>3) && is_extended_ban(para+3)) { /* We're dealing with a stacked extended ban. * Rules: * 1) You can only stack once, so: ~x:~y:something and not ~x:~y:~z... * 2) The first item must be an action modifier, such as ~q/~n/~j * 3) The second item may never be an action modifier, nor have the * EXTBOPT_NOSTACKCHILD flag set (for things like a textban). */ /* Rule #1. Yes the recursion check is also in extban_is_ok_nuh_extban, * but it's possible to get here without the is_ok() function ever * being called (think: non-local client). And no, don't delete it * there either. It needs to be in BOTH places. -- Syzop */ if (extban_recursion) return NULL; /* Rule #2 */ p = findmod_by_bantype(para[1]); if (p && !(p->options & EXTBOPT_ACTMODIFIER)) { /* Rule #2 violation */ return NULL; } strlcpy(tmpbuf, para, sizeof(tmpbuf)); mask = tmpbuf + 3; /* Already did restrict-extended bans check. */ p = findmod_by_bantype(mask[1]); if (!p) { /* Handling unknown bantypes in is_ok. Assume that it's ok here. */ return para; } if ((p->options & EXTBOPT_ACTMODIFIER) || (p->options & EXTBOPT_NOSTACKCHILD)) { /* Rule #3 violation */ return NULL; } if (p->conv_param) { extban_recursion++; ret = p->conv_param(mask); extban_recursion--; if (ret) { /* * If bans are stacked, then we have to use two buffers * to prevent ircsnprintf() from going into a loop. */ ircsnprintf(printbuf, sizeof(printbuf), "~%c:%s", bantype, ret); /* Make sure our extban prefix sticks. */ memcpy(retbuf, printbuf, sizeof(retbuf)); return retbuf; } else { return NULL; /* Fail. */ } } /* I honestly don't know what the deal is with the 80 char cap in clean_ban_mask is about. So I'm leaving it out here. -- aquanight */ /* I don't know why it's 80, but I like a limit anyway. A ban of 500 characters can never be good... -- Syzop */ if (strlen(para) > 80) { strlcpy(retbuf, para, 128); return retbuf; } return para; } else { return extban_conv_param_nuh(para); } }