]> git.netwichtig.de Git - user/henk/code/inspircd.git/blob - src/users.cpp
Rewrite invite system
[user/henk/code/inspircd.git] / src / users.cpp
1 /*
2  * InspIRCd -- Internet Relay Chat Daemon
3  *
4  *   Copyright (C) 2009-2010 Daniel De Graaf <danieldg@inspircd.org>
5  *   Copyright (C) 2006-2009 Robin Burchell <robin+git@viroteck.net>
6  *   Copyright (C) 2006-2007, 2009 Dennis Friis <peavey@inspircd.org>
7  *   Copyright (C) 2008 John Brooks <john.brooks@dereferenced.net>
8  *   Copyright (C) 2008 Thomas Stagner <aquanight@inspircd.org>
9  *   Copyright (C) 2008 Oliver Lupton <oliverlupton@gmail.com>
10  *   Copyright (C) 2003-2008 Craig Edwards <craigedwards@brainbox.cc>
11  *
12  * This file is part of InspIRCd.  InspIRCd is free software: you can
13  * redistribute it and/or modify it under the terms of the GNU General Public
14  * License as published by the Free Software Foundation, version 2.
15  *
16  * This program is distributed in the hope that it will be useful, but WITHOUT
17  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
18  * FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more
19  * details.
20  *
21  * You should have received a copy of the GNU General Public License
22  * along with this program.  If not, see <http://www.gnu.org/licenses/>.
23  */
24
25
26 #include "inspircd.h"
27 #include "xline.h"
28
29 already_sent_t LocalUser::already_sent_id = 0;
30
31 bool User::IsNoticeMaskSet(unsigned char sm)
32 {
33         if (!isalpha(sm))
34                 return false;
35         return (snomasks[sm-65]);
36 }
37
38 bool User::IsModeSet(unsigned char m)
39 {
40         ModeHandler* mh = ServerInstance->Modes->FindMode(m, MODETYPE_USER);
41         return (mh && modes[mh->GetId()]);
42 }
43
44 const char* User::FormatModes(bool showparameters)
45 {
46         static std::string data;
47         std::string params;
48         data.clear();
49
50         for (unsigned char n = 0; n < 64; n++)
51         {
52                 ModeHandler* mh = ServerInstance->Modes->FindMode(n + 65, MODETYPE_USER);
53                 if (mh && IsModeSet(mh))
54                 {
55                         data.push_back(n + 65);
56                         if (showparameters && mh->GetNumParams(true))
57                         {
58                                 std::string p = mh->GetUserParameter(this);
59                                 if (p.length())
60                                         params.append(" ").append(p);
61                         }
62                 }
63         }
64         data += params;
65         return data.c_str();
66 }
67
68 User::User(const std::string& uid, Server* srv, int type)
69         : uuid(uid), server(srv), usertype(type)
70 {
71         age = ServerInstance->Time();
72         signon = 0;
73         registered = 0;
74         quitting = false;
75         client_sa.sa.sa_family = AF_UNSPEC;
76
77         ServerInstance->Logs->Log("USERS", LOG_DEBUG, "New UUID for user: %s", uuid.c_str());
78
79         if (!ServerInstance->Users->uuidlist.insert(std::make_pair(uuid, this)).second)
80                 throw CoreException("Duplicate UUID "+std::string(uuid)+" in User constructor");
81 }
82
83 LocalUser::LocalUser(int myfd, irc::sockets::sockaddrs* client, irc::sockets::sockaddrs* servaddr)
84         : User(ServerInstance->UIDGen.GetUID(), ServerInstance->FakeClient->server, USERTYPE_LOCAL), eh(this),
85         bytes_in(0), bytes_out(0), cmds_in(0), cmds_out(0), nping(0), CommandFloodPenalty(0),
86         already_sent(0)
87 {
88         exempt = quitting_sendq = false;
89         idle_lastmsg = 0;
90         ident = "unknown";
91         lastping = 0;
92         eh.SetFd(myfd);
93         memcpy(&client_sa, client, sizeof(irc::sockets::sockaddrs));
94         memcpy(&server_sa, servaddr, sizeof(irc::sockets::sockaddrs));
95         dhost = host = GetIPString();
96 }
97
98 User::~User()
99 {
100 }
101
102 const std::string& User::MakeHost()
103 {
104         if (!this->cached_makehost.empty())
105                 return this->cached_makehost;
106
107         // XXX: Is there really a need to cache this?
108         this->cached_makehost = ident + "@" + host;
109         return this->cached_makehost;
110 }
111
112 const std::string& User::MakeHostIP()
113 {
114         if (!this->cached_hostip.empty())
115                 return this->cached_hostip;
116
117         // XXX: Is there really a need to cache this?
118         this->cached_hostip = ident + "@" + this->GetIPString();
119         return this->cached_hostip;
120 }
121
122 const std::string& User::GetFullHost()
123 {
124         if (!this->cached_fullhost.empty())
125                 return this->cached_fullhost;
126
127         // XXX: Is there really a need to cache this?
128         this->cached_fullhost = nick + "!" + ident + "@" + dhost;
129         return this->cached_fullhost;
130 }
131
132 const std::string& User::GetFullRealHost()
133 {
134         if (!this->cached_fullrealhost.empty())
135                 return this->cached_fullrealhost;
136
137         // XXX: Is there really a need to cache this?
138         this->cached_fullrealhost = nick + "!" + ident + "@" + host;
139         return this->cached_fullrealhost;
140 }
141
142 bool User::HasModePermission(unsigned char, ModeType)
143 {
144         return true;
145 }
146
147 bool LocalUser::HasModePermission(unsigned char mode, ModeType type)
148 {
149         if (!this->IsOper())
150                 return false;
151
152         if (mode < 'A' || mode > ('A' + 64)) return false;
153
154         return ((type == MODETYPE_USER ? oper->AllowedUserModes : oper->AllowedChanModes))[(mode - 'A')];
155
156 }
157 /*
158  * users on remote servers can completely bypass all permissions based checks.
159  * This prevents desyncs when one server has different type/class tags to another.
160  * That having been said, this does open things up to the possibility of source changes
161  * allowing remote kills, etc - but if they have access to the src, they most likely have
162  * access to the conf - so it's an end to a means either way.
163  */
164 bool User::HasPermission(const std::string&)
165 {
166         return true;
167 }
168
169 bool LocalUser::HasPermission(const std::string &command)
170 {
171         // are they even an oper at all?
172         if (!this->IsOper())
173         {
174                 return false;
175         }
176
177         if (oper->AllowedOperCommands.find(command) != oper->AllowedOperCommands.end())
178                 return true;
179         else if (oper->AllowedOperCommands.find("*") != oper->AllowedOperCommands.end())
180                 return true;
181
182         return false;
183 }
184
185 bool User::HasPrivPermission(const std::string &privstr, bool noisy)
186 {
187         return true;
188 }
189
190 bool LocalUser::HasPrivPermission(const std::string &privstr, bool noisy)
191 {
192         if (!this->IsOper())
193         {
194                 if (noisy)
195                         this->WriteNotice("You are not an oper");
196                 return false;
197         }
198
199         if (oper->AllowedPrivs.find(privstr) != oper->AllowedPrivs.end())
200         {
201                 return true;
202         }
203         else if (oper->AllowedPrivs.find("*") != oper->AllowedPrivs.end())
204         {
205                 return true;
206         }
207
208         if (noisy)
209                 this->WriteNotice("Oper type " + oper->name + " does not have access to priv " + privstr);
210
211         return false;
212 }
213
214 void UserIOHandler::OnDataReady()
215 {
216         if (user->quitting)
217                 return;
218
219         if (recvq.length() > user->MyClass->GetRecvqMax() && !user->HasPrivPermission("users/flood/increased-buffers"))
220         {
221                 ServerInstance->Users->QuitUser(user, "RecvQ exceeded");
222                 ServerInstance->SNO->WriteToSnoMask('a', "User %s RecvQ of %lu exceeds connect class maximum of %lu",
223                         user->nick.c_str(), (unsigned long)recvq.length(), user->MyClass->GetRecvqMax());
224                 return;
225         }
226         unsigned long sendqmax = ULONG_MAX;
227         if (!user->HasPrivPermission("users/flood/increased-buffers"))
228                 sendqmax = user->MyClass->GetSendqSoftMax();
229         unsigned long penaltymax = ULONG_MAX;
230         if (!user->HasPrivPermission("users/flood/no-fakelag"))
231                 penaltymax = user->MyClass->GetPenaltyThreshold() * 1000;
232
233         while (user->CommandFloodPenalty < penaltymax && getSendQSize() < sendqmax)
234         {
235                 std::string line;
236                 line.reserve(ServerInstance->Config->Limits.MaxLine);
237                 std::string::size_type qpos = 0;
238                 while (qpos < recvq.length())
239                 {
240                         char c = recvq[qpos++];
241                         switch (c)
242                         {
243                         case '\0':
244                                 c = ' ';
245                                 break;
246                         case '\r':
247                                 continue;
248                         case '\n':
249                                 goto eol_found;
250                         }
251                         if (line.length() < ServerInstance->Config->Limits.MaxLine - 2)
252                                 line.push_back(c);
253                 }
254                 // if we got here, the recvq ran out before we found a newline
255                 return;
256 eol_found:
257                 // just found a newline. Terminate the string, and pull it out of recvq
258                 recvq.erase(0, qpos);
259
260                 // TODO should this be moved to when it was inserted in recvq?
261                 ServerInstance->stats.Recv += qpos;
262                 user->bytes_in += qpos;
263                 user->cmds_in++;
264
265                 ServerInstance->Parser.ProcessBuffer(line, user);
266                 if (user->quitting)
267                         return;
268         }
269         if (user->CommandFloodPenalty >= penaltymax && !user->MyClass->fakelag)
270                 ServerInstance->Users->QuitUser(user, "Excess Flood");
271 }
272
273 void UserIOHandler::AddWriteBuf(const std::string &data)
274 {
275         if (user->quitting_sendq)
276                 return;
277         if (!user->quitting && getSendQSize() + data.length() > user->MyClass->GetSendqHardMax() &&
278                 !user->HasPrivPermission("users/flood/increased-buffers"))
279         {
280                 user->quitting_sendq = true;
281                 ServerInstance->GlobalCulls.AddSQItem(user);
282                 return;
283         }
284
285         // We still want to append data to the sendq of a quitting user,
286         // e.g. their ERROR message that says 'closing link'
287
288         WriteData(data);
289 }
290
291 void UserIOHandler::OnError(BufferedSocketError)
292 {
293         ServerInstance->Users->QuitUser(user, getError());
294 }
295
296 CullResult User::cull()
297 {
298         if (!quitting)
299                 ServerInstance->Users->QuitUser(this, "Culled without QuitUser");
300
301         if (client_sa.sa.sa_family != AF_UNSPEC)
302                 ServerInstance->Users->RemoveCloneCounts(this);
303
304         return Extensible::cull();
305 }
306
307 CullResult LocalUser::cull()
308 {
309         eh.cull();
310         return User::cull();
311 }
312
313 CullResult FakeUser::cull()
314 {
315         // Fake users don't quit, they just get culled.
316         quitting = true;
317         // Fake users are not inserted into UserManager::clientlist, they're only in the uuidlist
318         // and they are removed from there by the linking mod when the server splits
319         return User::cull();
320 }
321
322 void User::Oper(OperInfo* info)
323 {
324         ModeHandler* opermh = ServerInstance->Modes->FindMode('o', MODETYPE_USER);
325         if (this->IsModeSet(opermh))
326                 this->UnOper();
327
328         this->SetMode(opermh, true);
329         this->oper = info;
330         this->WriteCommand("MODE", "+o");
331         FOREACH_MOD(OnOper, (this, info->name));
332
333         std::string opername;
334         if (info->oper_block)
335                 opername = info->oper_block->getString("name");
336
337         if (IS_LOCAL(this))
338         {
339                 LocalUser* l = IS_LOCAL(this);
340                 std::string vhost = oper->getConfig("vhost");
341                 if (!vhost.empty())
342                         l->ChangeDisplayedHost(vhost.c_str());
343                 std::string opClass = oper->getConfig("class");
344                 if (!opClass.empty())
345                         l->SetClass(opClass);
346         }
347
348         ServerInstance->SNO->WriteToSnoMask('o',"%s (%s@%s) is now an IRC operator of type %s (using oper '%s')",
349                 nick.c_str(), ident.c_str(), host.c_str(), oper->name.c_str(), opername.c_str());
350         this->WriteNumeric(RPL_YOUAREOPER, ":You are now %s %s", strchr("aeiouAEIOU", oper->name[0]) ? "an" : "a", oper->name.c_str());
351
352         ServerInstance->Logs->Log("OPER", LOG_DEFAULT, "%s opered as type: %s", GetFullRealHost().c_str(), oper->name.c_str());
353         ServerInstance->Users->all_opers.push_back(this);
354
355         // Expand permissions from config for faster lookup
356         if (IS_LOCAL(this))
357                 oper->init();
358
359         FOREACH_MOD(OnPostOper, (this, oper->name, opername));
360 }
361
362 void OperInfo::init()
363 {
364         AllowedOperCommands.clear();
365         AllowedPrivs.clear();
366         AllowedUserModes.reset();
367         AllowedChanModes.reset();
368         AllowedUserModes['o' - 'A'] = true; // Call me paranoid if you want.
369
370         for(std::vector<reference<ConfigTag> >::iterator iter = class_blocks.begin(); iter != class_blocks.end(); ++iter)
371         {
372                 ConfigTag* tag = *iter;
373                 std::string mycmd, mypriv;
374                 /* Process commands */
375                 irc::spacesepstream CommandList(tag->getString("commands"));
376                 while (CommandList.GetToken(mycmd))
377                 {
378                         AllowedOperCommands.insert(mycmd);
379                 }
380
381                 irc::spacesepstream PrivList(tag->getString("privs"));
382                 while (PrivList.GetToken(mypriv))
383                 {
384                         AllowedPrivs.insert(mypriv);
385                 }
386
387                 std::string modes = tag->getString("usermodes");
388                 for (std::string::const_iterator c = modes.begin(); c != modes.end(); ++c)
389                 {
390                         if (*c == '*')
391                         {
392                                 this->AllowedUserModes.set();
393                         }
394                         else if (*c >= 'A' && *c <= 'z')
395                         {
396                                 this->AllowedUserModes[*c - 'A'] = true;
397                         }
398                 }
399
400                 modes = tag->getString("chanmodes");
401                 for (std::string::const_iterator c = modes.begin(); c != modes.end(); ++c)
402                 {
403                         if (*c == '*')
404                         {
405                                 this->AllowedChanModes.set();
406                         }
407                         else if (*c >= 'A' && *c <= 'z')
408                         {
409                                 this->AllowedChanModes[*c - 'A'] = true;
410                         }
411                 }
412         }
413 }
414
415 void User::UnOper()
416 {
417         if (!this->IsOper())
418                 return;
419
420         /*
421          * unset their oper type (what IS_OPER checks).
422          * note, order is important - this must come before modes as -o attempts
423          * to call UnOper. -- w00t
424          */
425         oper = NULL;
426
427
428         /* Remove all oper only modes from the user when the deoper - Bug #466*/
429         Modes::ChangeList changelist;
430         const ModeParser::ModeHandlerMap& usermodes = ServerInstance->Modes->GetModes(MODETYPE_USER);
431         for (ModeParser::ModeHandlerMap::const_iterator i = usermodes.begin(); i != usermodes.end(); ++i)
432         {
433                 ModeHandler* mh = i->second;
434                 if (mh->NeedsOper())
435                         changelist.push_remove(mh);
436         }
437
438         ServerInstance->Modes->Process(this, NULL, this, changelist);
439
440         // Remove the user from the oper list
441         stdalgo::vector::swaperase(ServerInstance->Users->all_opers, this);
442
443         ModeHandler* opermh = ServerInstance->Modes->FindMode('o', MODETYPE_USER);
444         this->SetMode(opermh, false);
445 }
446
447 /*
448  * Check class restrictions
449  */
450 void LocalUser::CheckClass(bool clone_count)
451 {
452         ConnectClass* a = this->MyClass;
453
454         if (!a)
455         {
456                 ServerInstance->Users->QuitUser(this, "Access denied by configuration");
457                 return;
458         }
459         else if (a->type == CC_DENY)
460         {
461                 ServerInstance->Users->QuitUser(this, a->config->getString("reason", "Unauthorised connection"));
462                 return;
463         }
464         else if (clone_count)
465         {
466                 const UserManager::CloneCounts& clonecounts = ServerInstance->Users->GetCloneCounts(this);
467                 if ((a->GetMaxLocal()) && (clonecounts.local > a->GetMaxLocal()))
468                 {
469                         ServerInstance->Users->QuitUser(this, "No more connections allowed from your host via this connect class (local)");
470                         if (a->maxconnwarn)
471                                 ServerInstance->SNO->WriteToSnoMask('a', "WARNING: maximum LOCAL connections (%ld) exceeded for IP %s", a->GetMaxLocal(), this->GetIPString().c_str());
472                         return;
473                 }
474                 else if ((a->GetMaxGlobal()) && (clonecounts.global > a->GetMaxGlobal()))
475                 {
476                         ServerInstance->Users->QuitUser(this, "No more connections allowed from your host via this connect class (global)");
477                         if (a->maxconnwarn)
478                                 ServerInstance->SNO->WriteToSnoMask('a', "WARNING: maximum GLOBAL connections (%ld) exceeded for IP %s", a->GetMaxGlobal(), this->GetIPString().c_str());
479                         return;
480                 }
481         }
482
483         this->nping = ServerInstance->Time() + a->GetPingTime() + ServerInstance->Config->dns_timeout;
484 }
485
486 bool LocalUser::CheckLines(bool doZline)
487 {
488         const char* check[] = { "G" , "K", (doZline) ? "Z" : NULL, NULL };
489
490         if (!this->exempt)
491         {
492                 for (int n = 0; check[n]; ++n)
493                 {
494                         XLine *r = ServerInstance->XLines->MatchesLine(check[n], this);
495
496                         if (r)
497                         {
498                                 r->Apply(this);
499                                 return true;
500                         }
501                 }
502         }
503
504         return false;
505 }
506
507 void LocalUser::FullConnect()
508 {
509         ServerInstance->stats.Connects++;
510         this->idle_lastmsg = ServerInstance->Time();
511
512         /*
513          * You may be thinking "wtf, we checked this in User::AddClient!" - and yes, we did, BUT.
514          * At the time AddClient is called, we don't have a resolved host, by here we probably do - which
515          * may put the user into a totally seperate class with different restrictions! so we *must* check again.
516          * Don't remove this! -- w00t
517          */
518         MyClass = NULL;
519         SetClass();
520         CheckClass();
521         CheckLines();
522
523         if (quitting)
524                 return;
525
526         this->WriteNumeric(RPL_WELCOME, ":Welcome to the %s IRC Network %s", ServerInstance->Config->Network.c_str(), GetFullRealHost().c_str());
527         this->WriteNumeric(RPL_YOURHOSTIS, ":Your host is %s, running version %s", ServerInstance->Config->ServerName.c_str(), INSPIRCD_BRANCH);
528         this->WriteNumeric(RPL_SERVERCREATED, ":This server was created %s %s", __TIME__, __DATE__);
529
530         const std::string& modelist = ServerInstance->Modes->GetModeListFor004Numeric();
531         this->WriteNumeric(RPL_SERVERVERSION, "%s %s %s", ServerInstance->Config->ServerName.c_str(), INSPIRCD_BRANCH, modelist.c_str());
532
533         ServerInstance->ISupport.SendTo(this);
534
535         /* Now registered */
536         if (ServerInstance->Users->unregistered_count)
537                 ServerInstance->Users->unregistered_count--;
538
539         /* Trigger MOTD and LUSERS output, give modules a chance too */
540         ModResult MOD_RESULT;
541         std::string command("LUSERS");
542         std::vector<std::string> parameters;
543         FIRST_MOD_RESULT(OnPreCommand, MOD_RESULT, (command, parameters, this, true, command));
544         if (!MOD_RESULT)
545                 ServerInstance->Parser.CallHandler(command, parameters, this);
546
547         MOD_RESULT = MOD_RES_PASSTHRU;
548         command = "MOTD";
549         FIRST_MOD_RESULT(OnPreCommand, MOD_RESULT, (command, parameters, this, true, command));
550         if (!MOD_RESULT)
551                 ServerInstance->Parser.CallHandler(command, parameters, this);
552
553         if (ServerInstance->Config->RawLog)
554                 WriteServ("PRIVMSG %s :*** Raw I/O logging is enabled on this server. All messages, passwords, and commands are being recorded.", nick.c_str());
555
556         /*
557          * We don't set REG_ALL until triggering OnUserConnect, so some module events don't spew out stuff
558          * for a user that doesn't exist yet.
559          */
560         FOREACH_MOD(OnUserConnect, (this));
561
562         this->registered = REG_ALL;
563
564         FOREACH_MOD(OnPostConnect, (this));
565
566         ServerInstance->SNO->WriteToSnoMask('c',"Client connecting on port %d (class %s): %s (%s) [%s]",
567                 this->GetServerPort(), this->MyClass->name.c_str(), GetFullRealHost().c_str(), this->GetIPString().c_str(), this->fullname.c_str());
568         ServerInstance->Logs->Log("BANCACHE", LOG_DEBUG, "BanCache: Adding NEGATIVE hit for " + this->GetIPString());
569         ServerInstance->BanCache.AddHit(this->GetIPString(), "", "");
570         // reset the flood penalty (which could have been raised due to things like auto +x)
571         CommandFloodPenalty = 0;
572 }
573
574 void User::InvalidateCache()
575 {
576         /* Invalidate cache */
577         cached_fullhost.clear();
578         cached_hostip.clear();
579         cached_makehost.clear();
580         cached_fullrealhost.clear();
581 }
582
583 bool User::ChangeNick(const std::string& newnick, time_t newts)
584 {
585         if (quitting)
586         {
587                 ServerInstance->Logs->Log("USERS", LOG_DEFAULT, "ERROR: Attempted to change nick of a quitting user: " + this->nick);
588                 return false;
589         }
590
591         User* const InUse = ServerInstance->FindNickOnly(newnick);
592         if (InUse == this)
593         {
594                 // case change, don't need to check campers
595                 // and, if it's identical including case, we can leave right now
596                 // We also don't update the nick TS if it's a case change, either
597                 if (newnick == nick)
598                         return true;
599         }
600         else
601         {
602                 /*
603                  * Uh oh.. if the nickname is in use, and it's not in use by the person using it (doh) --
604                  * then we have a potential collide. Check whether someone else is camping on the nick
605                  * (i.e. connect -> send NICK, don't send USER.) If they are camping, force-change the
606                  * camper to their UID, and allow the incoming nick change.
607                  *
608                  * If the guy using the nick is already using it, tell the incoming nick change to gtfo,
609                  * because the nick is already (rightfully) in use. -- w00t
610                  */
611                 if (InUse)
612                 {
613                         if (InUse->registered != REG_ALL)
614                         {
615                                 /* force the camper to their UUID, and ask them to re-send a NICK. */
616                                 InUse->WriteFrom(InUse, "NICK %s", InUse->uuid.c_str());
617                                 InUse->WriteNumeric(ERR_NICKNAMEINUSE, "%s :Nickname overruled.", InUse->nick.c_str());
618
619                                 InUse->registered &= ~REG_NICK;
620                                 InUse->ChangeNick(InUse->uuid);
621                         }
622                         else
623                         {
624                                 /* No camping, tell the incoming user  to stop trying to change nick ;p */
625                                 this->WriteNumeric(ERR_NICKNAMEINUSE, "%s :Nickname is already in use.", newnick.c_str());
626                                 return false;
627                         }
628                 }
629
630                 age = newts ? newts : ServerInstance->Time();
631         }
632
633         if (this->registered == REG_ALL)
634                 this->WriteCommon("NICK %s",newnick.c_str());
635         std::string oldnick = nick;
636         nick = newnick;
637
638         InvalidateCache();
639         ServerInstance->Users->clientlist.erase(oldnick);
640         ServerInstance->Users->clientlist[newnick] = this;
641
642         if (registered == REG_ALL)
643                 FOREACH_MOD(OnUserPostNick, (this,oldnick));
644
645         return true;
646 }
647
648 int LocalUser::GetServerPort()
649 {
650         switch (this->server_sa.sa.sa_family)
651         {
652                 case AF_INET6:
653                         return htons(this->server_sa.in6.sin6_port);
654                 case AF_INET:
655                         return htons(this->server_sa.in4.sin_port);
656         }
657         return 0;
658 }
659
660 const std::string& User::GetIPString()
661 {
662         int port;
663         if (cachedip.empty())
664         {
665                 irc::sockets::satoap(client_sa, cachedip, port);
666                 /* IP addresses starting with a : on irc are a Bad Thing (tm) */
667                 if (cachedip[0] == ':')
668                         cachedip.insert(cachedip.begin(),1,'0');
669         }
670
671         return cachedip;
672 }
673
674 irc::sockets::cidr_mask User::GetCIDRMask()
675 {
676         int range = 0;
677         switch (client_sa.sa.sa_family)
678         {
679                 case AF_INET6:
680                         range = ServerInstance->Config->c_ipv6_range;
681                         break;
682                 case AF_INET:
683                         range = ServerInstance->Config->c_ipv4_range;
684                         break;
685         }
686         return irc::sockets::cidr_mask(client_sa, range);
687 }
688
689 bool User::SetClientIP(const char* sip, bool recheck_eline)
690 {
691         cachedip.clear();
692         cached_hostip.clear();
693         return irc::sockets::aptosa(sip, 0, client_sa);
694 }
695
696 void User::SetClientIP(const irc::sockets::sockaddrs& sa, bool recheck_eline)
697 {
698         cachedip.clear();
699         cached_hostip.clear();
700         memcpy(&client_sa, &sa, sizeof(irc::sockets::sockaddrs));
701 }
702
703 bool LocalUser::SetClientIP(const char* sip, bool recheck_eline)
704 {
705         irc::sockets::sockaddrs sa;
706         if (!irc::sockets::aptosa(sip, 0, sa))
707                 // Invalid
708                 return false;
709
710         LocalUser::SetClientIP(sa, recheck_eline);
711         return true;
712 }
713
714 void LocalUser::SetClientIP(const irc::sockets::sockaddrs& sa, bool recheck_eline)
715 {
716         if (sa != client_sa)
717         {
718                 User::SetClientIP(sa);
719                 if (recheck_eline)
720                         this->exempt = (ServerInstance->XLines->MatchesLine("E", this) != NULL);
721
722                 FOREACH_MOD(OnSetUserIP, (this));
723         }
724 }
725
726 static std::string wide_newline("\r\n");
727
728 void User::Write(const std::string& text)
729 {
730 }
731
732 void User::Write(const char *text, ...)
733 {
734 }
735
736 void LocalUser::Write(const std::string& text)
737 {
738         if (!SocketEngine::BoundsCheckFd(&eh))
739                 return;
740
741         if (text.length() > ServerInstance->Config->Limits.MaxLine - 2)
742         {
743                 // this should happen rarely or never. Crop the string at 512 and try again.
744                 std::string try_again(text, 0, ServerInstance->Config->Limits.MaxLine - 2);
745                 Write(try_again);
746                 return;
747         }
748
749         ServerInstance->Logs->Log("USEROUTPUT", LOG_RAWIO, "C[%s] O %s", uuid.c_str(), text.c_str());
750
751         eh.AddWriteBuf(text);
752         eh.AddWriteBuf(wide_newline);
753
754         ServerInstance->stats.Sent += text.length() + 2;
755         this->bytes_out += text.length() + 2;
756         this->cmds_out++;
757 }
758
759 /** Write()
760  */
761 void LocalUser::Write(const char *text, ...)
762 {
763         std::string textbuffer;
764         VAFORMAT(textbuffer, text, text);
765         this->Write(textbuffer);
766 }
767
768 void User::WriteServ(const std::string& text)
769 {
770         this->Write(":%s %s",ServerInstance->Config->ServerName.c_str(),text.c_str());
771 }
772
773 /** WriteServ()
774  *  Same as Write(), except `text' is prefixed with `:server.name '.
775  */
776 void User::WriteServ(const char* text, ...)
777 {
778         std::string textbuffer;
779         VAFORMAT(textbuffer, text, text);
780         this->WriteServ(textbuffer);
781 }
782
783 void User::WriteCommand(const char* command, const std::string& text)
784 {
785         this->WriteServ(command + (this->registered & REG_NICK ? " " + this->nick : " *") + " " + text);
786 }
787
788 void User::WriteNumeric(unsigned int numeric, const char* text, ...)
789 {
790         std::string textbuffer;
791         VAFORMAT(textbuffer, text, text);
792         this->WriteNumeric(numeric, textbuffer);
793 }
794
795 void User::WriteNumeric(unsigned int numeric, const std::string &text)
796 {
797         ModResult MOD_RESULT;
798
799         FIRST_MOD_RESULT(OnNumeric, MOD_RESULT, (this, numeric, text));
800
801         if (MOD_RESULT == MOD_RES_DENY)
802                 return;
803
804         const std::string message = InspIRCd::Format(":%s %03u %s %s", ServerInstance->Config->ServerName.c_str(),
805                 numeric, this->registered & REG_NICK ? this->nick.c_str() : "*", text.c_str());
806         this->Write(message);
807 }
808
809 void User::WriteFrom(User *user, const std::string &text)
810 {
811         const std::string message = ":" + user->GetFullHost() + " " + text;
812         this->Write(message);
813 }
814
815
816 /* write text from an originating user to originating user */
817
818 void User::WriteFrom(User *user, const char* text, ...)
819 {
820         std::string textbuffer;
821         VAFORMAT(textbuffer, text, text);
822         this->WriteFrom(user, textbuffer);
823 }
824
825 namespace
826 {
827         class WriteCommonRawHandler : public User::ForEachNeighborHandler
828         {
829                 const std::string& msg;
830
831                 void Execute(LocalUser* user) CXX11_OVERRIDE
832                 {
833                         user->Write(msg);
834                 }
835
836          public:
837                 WriteCommonRawHandler(const std::string& message)
838                         : msg(message)
839                 {
840                 }
841         };
842 }
843
844 void User::WriteCommon(const char* text, ...)
845 {
846         std::string textbuffer;
847         VAFORMAT(textbuffer, text, text);
848         textbuffer = ":" + this->GetFullHost() + " " + textbuffer;
849         this->WriteCommonRaw(textbuffer, true);
850 }
851
852 void User::WriteCommonRaw(const std::string &line, bool include_self)
853 {
854         WriteCommonRawHandler handler(line);
855         ForEachNeighbor(handler, include_self);
856 }
857
858 void User::ForEachNeighbor(ForEachNeighborHandler& handler, bool include_self)
859 {
860         // The basic logic for visiting the neighbors of a user is to iterate the channel list of the user
861         // and visit all users on those channels. Because two users may share more than one common channel,
862         // we must skip users that we have already visited.
863         // To do this, we make use of a global counter and an integral 'already_sent' field in LocalUser.
864         // The global counter is incremented every time we do something for each neighbor of a user. Then,
865         // before visiting a member we examine user->already_sent. If it's equal to the current counter, we
866         // skip the member. Otherwise, we set it to the current counter and visit the member.
867
868         // Ask modules to build a list of exceptions.
869         // Mods may also exclude entire channels by erasing them from include_chans.
870         IncludeChanList include_chans(chans.begin(), chans.end());
871         std::map<User*, bool> exceptions;
872         exceptions[this] = include_self;
873         FOREACH_MOD(OnBuildNeighborList, (this, include_chans, exceptions));
874
875         // Get next id, guaranteed to differ from the already_sent field of all users
876         const already_sent_t newid = ++LocalUser::already_sent_id;
877
878         // Handle exceptions first
879         for (std::map<User*, bool>::const_iterator i = exceptions.begin(); i != exceptions.end(); ++i)
880         {
881                 LocalUser* curr = IS_LOCAL(i->first);
882                 if (curr)
883                 {
884                         // Mark as visited to ensure we won't visit again if there is a common channel
885                         curr->already_sent = newid;
886                         // Always treat quitting users as excluded
887                         if ((i->second) && (!curr->quitting))
888                                 handler.Execute(curr);
889                 }
890         }
891
892         // Now consider the real neighbors
893         for (IncludeChanList::const_iterator i = include_chans.begin(); i != include_chans.end(); ++i)
894         {
895                 Channel* chan = (*i)->chan;
896                 const Channel::MemberMap& userlist = chan->GetUsers();
897                 for (Channel::MemberMap::const_iterator j = userlist.begin(); j != userlist.end(); ++j)
898                 {
899                         LocalUser* curr = IS_LOCAL(j->first);
900                         // User not yet visited?
901                         if ((curr) && (curr->already_sent != newid))
902                         {
903                                 // Mark as visited and execute function
904                                 curr->already_sent = newid;
905                                 handler.Execute(curr);
906                         }
907                 }
908         }
909 }
910
911 void LocalUser::SendText(const std::string& line)
912 {
913         Write(line);
914 }
915
916 void RemoteUser::SendText(const std::string& line)
917 {
918         ServerInstance->PI->PushToClient(this, line);
919 }
920
921 void FakeUser::SendText(const std::string& line)
922 {
923 }
924
925 void User::SendText(const char *text, ...)
926 {
927         std::string line;
928         VAFORMAT(line, text, text);
929         SendText(line);
930 }
931
932 void User::SendText(const std::string& linePrefix, std::stringstream& textStream)
933 {
934         std::string line;
935         std::string word;
936         while (textStream >> word)
937         {
938                 size_t lineLength = linePrefix.length() + line.length() + word.length() + 3; // "\s\n\r"
939                 if (lineLength > ServerInstance->Config->Limits.MaxLine)
940                 {
941                         SendText(linePrefix + line);
942                         line.clear();
943                 }
944                 line += " " + word;
945         }
946         SendText(linePrefix + line);
947 }
948
949 /* return 0 or 1 depending if users u and u2 share one or more common channels
950  * (used by QUIT, NICK etc which arent channel specific notices)
951  *
952  * The old algorithm in 1.0 for this was relatively inefficient, iterating over
953  * the first users channels then the second users channels within the outer loop,
954  * therefore it was a maximum of x*y iterations (upon returning 0 and checking
955  * all possible iterations). However this new function instead checks against the
956  * channel's userlist in the inner loop which is a std::map<User*,User*>
957  * and saves us time as we already know what pointer value we are after.
958  * Don't quote me on the maths as i am not a mathematician or computer scientist,
959  * but i believe this algorithm is now x+(log y) maximum iterations instead.
960  */
961 bool User::SharesChannelWith(User *other)
962 {
963         /* Outer loop */
964         for (User::ChanList::iterator i = this->chans.begin(); i != this->chans.end(); ++i)
965         {
966                 /* Eliminate the inner loop (which used to be ~equal in size to the outer loop)
967                  * by replacing it with a map::find which *should* be more efficient
968                  */
969                 if ((*i)->chan->HasUser(other))
970                         return true;
971         }
972         return false;
973 }
974
975 bool User::ChangeName(const std::string& gecos)
976 {
977         if (!this->fullname.compare(gecos))
978                 return true;
979
980         if (IS_LOCAL(this))
981         {
982                 ModResult MOD_RESULT;
983                 FIRST_MOD_RESULT(OnChangeLocalUserGECOS, MOD_RESULT, (IS_LOCAL(this),gecos));
984                 if (MOD_RESULT == MOD_RES_DENY)
985                         return false;
986                 FOREACH_MOD(OnChangeName, (this,gecos));
987         }
988         this->fullname.assign(gecos, 0, ServerInstance->Config->Limits.MaxGecos);
989
990         return true;
991 }
992
993 bool User::ChangeDisplayedHost(const std::string& shost)
994 {
995         if (dhost == shost)
996                 return true;
997
998         if (IS_LOCAL(this))
999         {
1000                 ModResult MOD_RESULT;
1001                 FIRST_MOD_RESULT(OnChangeLocalUserHost, MOD_RESULT, (IS_LOCAL(this),shost));
1002                 if (MOD_RESULT == MOD_RES_DENY)
1003                         return false;
1004         }
1005
1006         FOREACH_MOD(OnChangeHost, (this,shost));
1007
1008         this->dhost.assign(shost, 0, ServerInstance->Config->Limits.MaxHost);
1009         this->InvalidateCache();
1010
1011         if (IS_LOCAL(this))
1012                 this->WriteNumeric(RPL_YOURDISPLAYEDHOST, "%s :is now your displayed host", this->dhost.c_str());
1013
1014         return true;
1015 }
1016
1017 bool User::ChangeIdent(const std::string& newident)
1018 {
1019         if (this->ident == newident)
1020                 return true;
1021
1022         FOREACH_MOD(OnChangeIdent, (this,newident));
1023
1024         this->ident.assign(newident, 0, ServerInstance->Config->Limits.IdentMax);
1025         this->InvalidateCache();
1026
1027         return true;
1028 }
1029
1030 /*
1031  * Sets a user's connection class.
1032  * If the class name is provided, it will be used. Otherwise, the class will be guessed using host/ip/ident/etc.
1033  * NOTE: If the <ALLOW> or <DENY> tag specifies an ip, and this user resolves,
1034  * then their ip will be taken as 'priority' anyway, so for example,
1035  * <connect allow="127.0.0.1"> will match joe!bloggs@localhost
1036  */
1037 void LocalUser::SetClass(const std::string &explicit_name)
1038 {
1039         ConnectClass *found = NULL;
1040
1041         ServerInstance->Logs->Log("CONNECTCLASS", LOG_DEBUG, "Setting connect class for UID %s", this->uuid.c_str());
1042
1043         if (!explicit_name.empty())
1044         {
1045                 for (ServerConfig::ClassVector::const_iterator i = ServerInstance->Config->Classes.begin(); i != ServerInstance->Config->Classes.end(); ++i)
1046                 {
1047                         ConnectClass* c = *i;
1048
1049                         if (explicit_name == c->name)
1050                         {
1051                                 ServerInstance->Logs->Log("CONNECTCLASS", LOG_DEBUG, "Explicitly set to %s", explicit_name.c_str());
1052                                 found = c;
1053                         }
1054                 }
1055         }
1056         else
1057         {
1058                 for (ServerConfig::ClassVector::const_iterator i = ServerInstance->Config->Classes.begin(); i != ServerInstance->Config->Classes.end(); ++i)
1059                 {
1060                         ConnectClass* c = *i;
1061                         ServerInstance->Logs->Log("CONNECTCLASS", LOG_DEBUG, "Checking %s", c->GetName().c_str());
1062
1063                         ModResult MOD_RESULT;
1064                         FIRST_MOD_RESULT(OnSetConnectClass, MOD_RESULT, (this,c));
1065                         if (MOD_RESULT == MOD_RES_DENY)
1066                                 continue;
1067                         if (MOD_RESULT == MOD_RES_ALLOW)
1068                         {
1069                                 ServerInstance->Logs->Log("CONNECTCLASS", LOG_DEBUG, "Class forced by module to %s", c->GetName().c_str());
1070                                 found = c;
1071                                 break;
1072                         }
1073
1074                         if (c->type == CC_NAMED)
1075                                 continue;
1076
1077                         bool regdone = (registered != REG_NONE);
1078                         if (c->config->getBool("registered", regdone) != regdone)
1079                                 continue;
1080
1081                         /* check if host matches.. */
1082                         if (!InspIRCd::MatchCIDR(this->GetIPString(), c->GetHost(), NULL) &&
1083                             !InspIRCd::MatchCIDR(this->host, c->GetHost(), NULL))
1084                         {
1085                                 ServerInstance->Logs->Log("CONNECTCLASS", LOG_DEBUG, "No host match (for %s)", c->GetHost().c_str());
1086                                 continue;
1087                         }
1088
1089                         /*
1090                          * deny change if change will take class over the limit check it HERE, not after we found a matching class,
1091                          * because we should attempt to find another class if this one doesn't match us. -- w00t
1092                          */
1093                         if (c->limit && (c->GetReferenceCount() >= c->limit))
1094                         {
1095                                 ServerInstance->Logs->Log("CONNECTCLASS", LOG_DEBUG, "OOPS: Connect class limit (%lu) hit, denying", c->limit);
1096                                 continue;
1097                         }
1098
1099                         /* if it requires a port ... */
1100                         int port = c->config->getInt("port");
1101                         if (port)
1102                         {
1103                                 ServerInstance->Logs->Log("CONNECTCLASS", LOG_DEBUG, "Requires port (%d)", port);
1104
1105                                 /* and our port doesn't match, fail. */
1106                                 if (this->GetServerPort() != port)
1107                                         continue;
1108                         }
1109
1110                         if (regdone && !c->config->getString("password").empty())
1111                         {
1112                                 if (!ServerInstance->PassCompare(this, c->config->getString("password"), password, c->config->getString("hash")))
1113                                 {
1114                                         ServerInstance->Logs->Log("CONNECTCLASS", LOG_DEBUG, "Bad password, skipping");
1115                                         continue;
1116                                 }
1117                         }
1118
1119                         /* we stop at the first class that meets ALL critera. */
1120                         found = c;
1121                         break;
1122                 }
1123         }
1124
1125         /*
1126          * Okay, assuming we found a class that matches.. switch us into that class, keeping refcounts up to date.
1127          */
1128         if (found)
1129         {
1130                 MyClass = found;
1131         }
1132 }
1133
1134 void User::PurgeEmptyChannels()
1135 {
1136         // firstly decrement the count on each channel
1137         for (User::ChanList::iterator i = this->chans.begin(); i != this->chans.end(); )
1138         {
1139                 Channel* c = (*i)->chan;
1140                 ++i;
1141                 c->DelUser(this);
1142         }
1143
1144         this->UnOper();
1145 }
1146
1147 const std::string& FakeUser::GetFullHost()
1148 {
1149         if (!ServerInstance->Config->HideWhoisServer.empty())
1150                 return ServerInstance->Config->HideWhoisServer;
1151         return server->GetName();
1152 }
1153
1154 const std::string& FakeUser::GetFullRealHost()
1155 {
1156         if (!ServerInstance->Config->HideWhoisServer.empty())
1157                 return ServerInstance->Config->HideWhoisServer;
1158         return server->GetName();
1159 }
1160
1161 ConnectClass::ConnectClass(ConfigTag* tag, char t, const std::string& mask)
1162         : config(tag), type(t), fakelag(true), name("unnamed"), registration_timeout(0), host(mask),
1163         pingtime(0), softsendqmax(0), hardsendqmax(0), recvqmax(0),
1164         penaltythreshold(0), commandrate(0), maxlocal(0), maxglobal(0), maxconnwarn(true), maxchans(ServerInstance->Config->MaxChans),
1165         limit(0), resolvehostnames(true)
1166 {
1167 }
1168
1169 ConnectClass::ConnectClass(ConfigTag* tag, char t, const std::string& mask, const ConnectClass& parent)
1170         : config(tag), type(t), fakelag(parent.fakelag), name("unnamed"),
1171         registration_timeout(parent.registration_timeout), host(mask), pingtime(parent.pingtime),
1172         softsendqmax(parent.softsendqmax), hardsendqmax(parent.hardsendqmax), recvqmax(parent.recvqmax),
1173         penaltythreshold(parent.penaltythreshold), commandrate(parent.commandrate),
1174         maxlocal(parent.maxlocal), maxglobal(parent.maxglobal), maxconnwarn(parent.maxconnwarn), maxchans(parent.maxchans),
1175         limit(parent.limit), resolvehostnames(parent.resolvehostnames)
1176 {
1177 }
1178
1179 void ConnectClass::Update(const ConnectClass* src)
1180 {
1181         config = src->config;
1182         type = src->type;
1183         fakelag = src->fakelag;
1184         name = src->name;
1185         registration_timeout = src->registration_timeout;
1186         host = src->host;
1187         pingtime = src->pingtime;
1188         softsendqmax = src->softsendqmax;
1189         hardsendqmax = src->hardsendqmax;
1190         recvqmax = src->recvqmax;
1191         penaltythreshold = src->penaltythreshold;
1192         commandrate = src->commandrate;
1193         maxlocal = src->maxlocal;
1194         maxglobal = src->maxglobal;
1195         maxconnwarn = src->maxconnwarn;
1196         maxchans = src->maxchans;
1197         limit = src->limit;
1198         resolvehostnames = src->resolvehostnames;
1199 }