solanum/modules/um_callerid.c

238 lines
6.4 KiB
C
Raw Permalink Normal View History

2020-06-26 18:50:34 +00:00
/*
* modules/um_callerid.c
* Copyright (c) 2020 Ariadne Conill <ariadne@dereferenced.org>
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* 1. Redistributions of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote products
* derived from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
* DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
#include "stdinc.h"
#include "modules.h"
#include "hook.h"
#include "client.h"
#include "ircd.h"
#include "send.h"
#include "hash.h"
#include "s_conf.h"
#include "s_user.h"
#include "s_serv.h"
#include "numeric.h"
#include "privilege.h"
#include "s_newconf.h"
#include "hook.h"
#include "supported.h"
#include "logger.h"
2020-06-26 18:50:34 +00:00
static int
um_callerid_modinit(void)
{
user_modes['g'] = find_umode_slot();
if (!user_modes['g'])
{
ierror("um_callerid: unable to allocate usermode slot for +g; unloading module.");
return -1;
}
user_modes['G'] = find_umode_slot();
if (!user_modes['G'])
{
user_modes['g'] = 0;
ierror("um_callerid: unable to allocate usermode slot for +G; unloading module.");
return -1;
}
2020-06-26 18:50:34 +00:00
construct_umodebuf();
2020-06-27 16:03:52 +00:00
add_isupport("CALLERID", isupport_umode, "g");
2020-06-26 18:50:34 +00:00
return 0;
}
static void
um_callerid_moddeinit(void)
{
user_modes['g'] = 0;
user_modes['G'] = 0;
2020-06-26 18:50:34 +00:00
construct_umodebuf();
delete_isupport("CALLERID");
}
#define IsSetStrictCallerID(c) ((c->umodes & user_modes['g']) == user_modes['g'])
#define IsSetRelaxedCallerID(c) ((c->umodes & user_modes['G']) == user_modes['G'])
#define IsSetAnyCallerID(c) (IsSetStrictCallerID(c) || IsSetRelaxedCallerID(c))
2020-06-26 18:50:34 +00:00
static const char um_callerid_desc[] =
2020-06-27 16:00:07 +00:00
"Provides usermodes +g and +G which restrict messages from unauthorized users.";
2020-06-26 18:50:34 +00:00
static bool
allow_message(struct Client *source_p, struct Client *target_p)
{
if (!MyClient(target_p))
return true;
if (!IsSetAnyCallerID(target_p))
2020-06-26 18:50:34 +00:00
return true;
if (!IsPerson(source_p))
return true;
if (IsSetRelaxedCallerID(target_p) &&
!IsSetStrictCallerID(target_p) &&
has_common_channel(source_p, target_p))
2020-06-26 18:50:34 +00:00
return true;
/* XXX: controversial? allow opers to send through +g */
2021-05-20 07:08:47 +00:00
if (MayHavePrivilege(source_p, "oper:message"))
2020-06-26 18:50:34 +00:00
return true;
if (accept_message(source_p, target_p))
return true;
return false;
}
static void
send_callerid_notice(enum message_type msgtype, struct Client *source_p, struct Client *target_p)
{
if (!MyClient(target_p))
return;
if (msgtype == MESSAGE_TYPE_NOTICE)
return;
sendto_one_numeric(source_p, ERR_TARGUMODEG, form_str(ERR_TARGUMODEG),
target_p->name, IsSetStrictCallerID(target_p) ? "+g" : "+G");
2020-06-26 18:50:34 +00:00
if ((target_p->localClient->last_caller_id_time + ConfigFileEntry.caller_id_wait) < rb_current_time())
{
sendto_one_numeric(source_p, RPL_TARGNOTIFY, form_str(RPL_TARGNOTIFY),
target_p->name);
sendto_one(target_p, form_str(RPL_UMODEGMSG),
me.name, target_p->name, source_p->name,
source_p->username, source_p->host, IsSetStrictCallerID(target_p) ? "+g" : "+G");
2020-06-26 18:50:34 +00:00
target_p->localClient->last_caller_id_time = rb_current_time();
}
}
static bool
add_callerid_accept_for_source(enum message_type msgtype, struct Client *source_p, struct Client *target_p)
{
/* only do this on source_p's server */
if (!MyClient(source_p))
return true;
2020-06-26 18:50:34 +00:00
/*
* XXX: Controversial? Allow target users to send replies
* through a +g. Rationale is that people can presently use +g
* as a way to taunt users, e.g. harass them and hide behind +g
* as a way of griefing. --nenolod
*/
if(msgtype != MESSAGE_TYPE_NOTICE &&
IsSetAnyCallerID(source_p) &&
!accept_message(target_p, source_p) &&
!IsOperGeneral(target_p))
2020-06-26 18:50:34 +00:00
{
if(rb_dlink_list_length(&source_p->localClient->allow_list) <
(unsigned long)ConfigFileEntry.max_accept)
{
rb_dlinkAddAlloc(target_p, &source_p->localClient->allow_list);
rb_dlinkAddAlloc(source_p, &target_p->on_allow_list);
}
else
{
sendto_one_numeric(source_p, ERR_OWNMODE,
form_str(ERR_OWNMODE),
target_p->name, IsSetStrictCallerID(target_p) ? "+g" : "+G");
2020-06-26 18:50:34 +00:00
return false;
}
}
return true;
}
static void
h_hdl_invite(void *vdata)
2020-06-26 18:50:34 +00:00
{
hook_data_channel_approval *data = vdata;
struct Client *source_p = data->client;
struct Client *target_p = data->target;
static char errorbuf[BUFSIZE];
2020-06-26 18:50:34 +00:00
2020-06-26 19:05:17 +00:00
if (data->approved)
return;
2020-06-26 18:50:34 +00:00
if (!add_callerid_accept_for_source(MESSAGE_TYPE_PRIVMSG, source_p, target_p))
{
data->approved = ERR_TARGUMODEG;
return;
}
if (allow_message(source_p, target_p))
return;
snprintf(errorbuf, sizeof errorbuf, form_str(ERR_TARGUMODEG),
2020-07-11 00:43:31 +00:00
target_p->name, IsSetStrictCallerID(target_p) ? "+g" : "+G");
2020-06-26 18:50:34 +00:00
data->approved = ERR_TARGUMODEG;
data->error = errorbuf;
2020-06-26 18:50:34 +00:00
}
static void
h_hdl_privmsg_user(void *vdata)
{
hook_data_privmsg_user *data = vdata;
enum message_type msgtype = data->msgtype;
struct Client *source_p = data->source_p;
struct Client *target_p = data->target_p;
2020-06-26 19:05:17 +00:00
if (data->approved)
return;
2020-06-26 18:50:34 +00:00
if (!add_callerid_accept_for_source(msgtype, source_p, target_p))
{
data->approved = ERR_TARGUMODEG;
return;
}
if (allow_message(source_p, target_p))
return;
send_callerid_notice(msgtype, source_p, target_p);
data->approved = ERR_TARGUMODEG;
}
static mapi_hfn_list_av1 um_callerid_hfnlist[] = {
{ "invite", h_hdl_invite },
2020-06-26 18:50:34 +00:00
{ "privmsg_user", h_hdl_privmsg_user },
{ NULL, NULL }
};
DECLARE_MODULE_AV2(um_callerid, um_callerid_modinit, um_callerid_moddeinit,
NULL, NULL, um_callerid_hfnlist, NULL, NULL, um_callerid_desc);