2 * InspIRCd -- Internet Relay Chat Daemon
4 * Copyright (C) 2009-2010 Daniel De Graaf <danieldg@inspircd.org>
5 * Copyright (C) 2006-2009 Robin Burchell <robin+git@viroteck.net>
6 * Copyright (C) 2006-2007, 2009 Dennis Friis <peavey@inspircd.org>
7 * Copyright (C) 2008 John Brooks <john.brooks@dereferenced.net>
8 * Copyright (C) 2008 Thomas Stagner <aquanight@inspircd.org>
9 * Copyright (C) 2008 Oliver Lupton <oliverlupton@gmail.com>
10 * Copyright (C) 2003-2008 Craig Edwards <craigedwards@brainbox.cc>
12 * This file is part of InspIRCd. InspIRCd is free software: you can
13 * redistribute it and/or modify it under the terms of the GNU General Public
14 * License as published by the Free Software Foundation, version 2.
16 * This program is distributed in the hope that it will be useful, but WITHOUT
17 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
18 * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
21 * You should have received a copy of the GNU General Public License
22 * along with this program. If not, see <http://www.gnu.org/licenses/>.
28 #include "socketengine.h"
32 already_sent_t LocalUser::already_sent_id = 0;
34 bool User::IsNoticeMaskSet(unsigned char sm)
38 return (snomasks[sm-65]);
41 bool User::IsModeSet(unsigned char m)
43 ModeHandler* mh = ServerInstance->Modes->FindMode(m, MODETYPE_USER);
44 return (mh && modes[mh->GetId()]);
47 const char* User::FormatModes(bool showparameters)
49 static std::string data;
53 for (unsigned char n = 0; n < 64; n++)
55 ModeHandler* mh = ServerInstance->Modes->FindMode(n + 65, MODETYPE_USER);
56 if (mh && IsModeSet(mh))
58 data.push_back(n + 65);
59 if (showparameters && mh->GetNumParams(true))
61 std::string p = mh->GetUserParameter(this);
63 params.append(" ").append(p);
71 User::User(const std::string& uid, Server* srv, int type)
72 : uuid(uid), server(srv), usertype(type)
74 age = ServerInstance->Time();
78 client_sa.sa.sa_family = AF_UNSPEC;
80 ServerInstance->Logs->Log("USERS", LOG_DEBUG, "New UUID for user: %s", uuid.c_str());
82 if (!ServerInstance->Users->uuidlist->insert(std::make_pair(uuid, this)).second)
83 throw CoreException("Duplicate UUID "+std::string(uuid)+" in User constructor");
86 LocalUser::LocalUser(int myfd, irc::sockets::sockaddrs* client, irc::sockets::sockaddrs* servaddr)
87 : User(ServerInstance->UIDGen.GetUID(), ServerInstance->FakeClient->server, USERTYPE_LOCAL), eh(this),
88 bytes_in(0), bytes_out(0), cmds_in(0), cmds_out(0), nping(0), CommandFloodPenalty(0),
91 exempt = quitting_sendq = false;
96 memcpy(&client_sa, client, sizeof(irc::sockets::sockaddrs));
97 memcpy(&server_sa, servaddr, sizeof(irc::sockets::sockaddrs));
98 dhost = host = GetIPString();
103 if (ServerInstance->Users->uuidlist->find(uuid) != ServerInstance->Users->uuidlist->end())
104 ServerInstance->Logs->Log("USERS", LOG_DEFAULT, "User destructor for %s called without cull", uuid.c_str());
107 const std::string& User::MakeHost()
109 if (!this->cached_makehost.empty())
110 return this->cached_makehost;
112 // XXX: Is there really a need to cache this?
113 this->cached_makehost = ident + "@" + host;
114 return this->cached_makehost;
117 const std::string& User::MakeHostIP()
119 if (!this->cached_hostip.empty())
120 return this->cached_hostip;
122 // XXX: Is there really a need to cache this?
123 this->cached_hostip = ident + "@" + this->GetIPString();
124 return this->cached_hostip;
127 const std::string& User::GetFullHost()
129 if (!this->cached_fullhost.empty())
130 return this->cached_fullhost;
132 // XXX: Is there really a need to cache this?
133 this->cached_fullhost = nick + "!" + ident + "@" + dhost;
134 return this->cached_fullhost;
137 const std::string& User::GetFullRealHost()
139 if (!this->cached_fullrealhost.empty())
140 return this->cached_fullrealhost;
142 // XXX: Is there really a need to cache this?
143 this->cached_fullrealhost = nick + "!" + ident + "@" + host;
144 return this->cached_fullrealhost;
147 InviteList& LocalUser::GetInviteList()
149 RemoveExpiredInvites();
153 bool LocalUser::RemoveInvite(Channel* chan)
155 Invitation* inv = Invitation::Find(chan, this);
164 void LocalUser::RemoveExpiredInvites()
166 Invitation::Find(NULL, this);
169 bool User::HasModePermission(unsigned char, ModeType)
174 bool LocalUser::HasModePermission(unsigned char mode, ModeType type)
179 if (mode < 'A' || mode > ('A' + 64)) return false;
181 return ((type == MODETYPE_USER ? oper->AllowedUserModes : oper->AllowedChanModes))[(mode - 'A')];
185 * users on remote servers can completely bypass all permissions based checks.
186 * This prevents desyncs when one server has different type/class tags to another.
187 * That having been said, this does open things up to the possibility of source changes
188 * allowing remote kills, etc - but if they have access to the src, they most likely have
189 * access to the conf - so it's an end to a means either way.
191 bool User::HasPermission(const std::string&)
196 bool LocalUser::HasPermission(const std::string &command)
198 // are they even an oper at all?
204 if (oper->AllowedOperCommands.find(command) != oper->AllowedOperCommands.end())
206 else if (oper->AllowedOperCommands.find("*") != oper->AllowedOperCommands.end())
212 bool User::HasPrivPermission(const std::string &privstr, bool noisy)
217 bool LocalUser::HasPrivPermission(const std::string &privstr, bool noisy)
222 this->WriteNotice("You are not an oper");
226 if (oper->AllowedPrivs.find(privstr) != oper->AllowedPrivs.end())
230 else if (oper->AllowedPrivs.find("*") != oper->AllowedPrivs.end())
236 this->WriteNotice("Oper type " + oper->name + " does not have access to priv " + privstr);
241 void UserIOHandler::OnDataReady()
246 if (recvq.length() > user->MyClass->GetRecvqMax() && !user->HasPrivPermission("users/flood/increased-buffers"))
248 ServerInstance->Users->QuitUser(user, "RecvQ exceeded");
249 ServerInstance->SNO->WriteToSnoMask('a', "User %s RecvQ of %lu exceeds connect class maximum of %lu",
250 user->nick.c_str(), (unsigned long)recvq.length(), user->MyClass->GetRecvqMax());
253 unsigned long sendqmax = ULONG_MAX;
254 if (!user->HasPrivPermission("users/flood/increased-buffers"))
255 sendqmax = user->MyClass->GetSendqSoftMax();
256 unsigned long penaltymax = ULONG_MAX;
257 if (!user->HasPrivPermission("users/flood/no-fakelag"))
258 penaltymax = user->MyClass->GetPenaltyThreshold() * 1000;
260 while (user->CommandFloodPenalty < penaltymax && getSendQSize() < sendqmax)
263 line.reserve(ServerInstance->Config->Limits.MaxLine);
264 std::string::size_type qpos = 0;
265 while (qpos < recvq.length())
267 char c = recvq[qpos++];
278 if (line.length() < ServerInstance->Config->Limits.MaxLine - 2)
281 // if we got here, the recvq ran out before we found a newline
284 // just found a newline. Terminate the string, and pull it out of recvq
285 recvq = recvq.substr(qpos);
287 // TODO should this be moved to when it was inserted in recvq?
288 ServerInstance->stats->statsRecv += qpos;
289 user->bytes_in += qpos;
292 ServerInstance->Parser->ProcessBuffer(line, user);
296 if (user->CommandFloodPenalty >= penaltymax && !user->MyClass->fakelag)
297 ServerInstance->Users->QuitUser(user, "Excess Flood");
300 void UserIOHandler::AddWriteBuf(const std::string &data)
302 if (user->quitting_sendq)
304 if (!user->quitting && getSendQSize() + data.length() > user->MyClass->GetSendqHardMax() &&
305 !user->HasPrivPermission("users/flood/increased-buffers"))
307 user->quitting_sendq = true;
308 ServerInstance->GlobalCulls.AddSQItem(user);
312 // We still want to append data to the sendq of a quitting user,
313 // e.g. their ERROR message that says 'closing link'
318 void UserIOHandler::OnError(BufferedSocketError)
320 ServerInstance->Users->QuitUser(user, getError());
323 CullResult User::cull()
326 ServerInstance->Users->QuitUser(this, "Culled without QuitUser");
328 if (client_sa.sa.sa_family != AF_UNSPEC)
329 ServerInstance->Users->RemoveCloneCounts(this);
331 return Extensible::cull();
334 CullResult LocalUser::cull()
336 ServerInstance->Users->local_users.erase(this);
342 CullResult FakeUser::cull()
344 // Fake users don't quit, they just get culled.
346 // Fake users are not inserted into UserManager::clientlist, they're only in the uuidlist
347 ServerInstance->Users->uuidlist->erase(uuid);
351 void User::Oper(OperInfo* info)
353 ModeHandler* opermh = ServerInstance->Modes->FindMode('o', MODETYPE_USER);
354 if (this->IsModeSet(opermh))
357 this->SetMode(opermh, true);
359 this->WriteCommand("MODE", "+o");
360 FOREACH_MOD(OnOper, (this, info->name));
362 std::string opername;
363 if (info->oper_block)
364 opername = info->oper_block->getString("name");
368 LocalUser* l = IS_LOCAL(this);
369 std::string vhost = oper->getConfig("vhost");
371 l->ChangeDisplayedHost(vhost.c_str());
372 std::string opClass = oper->getConfig("class");
373 if (!opClass.empty())
374 l->SetClass(opClass);
377 ServerInstance->SNO->WriteToSnoMask('o',"%s (%s@%s) is now an IRC operator of type %s (using oper '%s')",
378 nick.c_str(), ident.c_str(), host.c_str(), oper->name.c_str(), opername.c_str());
379 this->WriteNumeric(RPL_YOUAREOPER, ":You are now %s %s", strchr("aeiouAEIOU", oper->name[0]) ? "an" : "a", oper->name.c_str());
381 ServerInstance->Logs->Log("OPER", LOG_DEFAULT, "%s opered as type: %s", GetFullRealHost().c_str(), oper->name.c_str());
382 ServerInstance->Users->all_opers.push_back(this);
384 // Expand permissions from config for faster lookup
388 FOREACH_MOD(OnPostOper, (this, oper->name, opername));
391 void OperInfo::init()
393 AllowedOperCommands.clear();
394 AllowedPrivs.clear();
395 AllowedUserModes.reset();
396 AllowedChanModes.reset();
397 AllowedUserModes['o' - 'A'] = true; // Call me paranoid if you want.
399 for(std::vector<reference<ConfigTag> >::iterator iter = class_blocks.begin(); iter != class_blocks.end(); ++iter)
401 ConfigTag* tag = *iter;
402 std::string mycmd, mypriv;
403 /* Process commands */
404 irc::spacesepstream CommandList(tag->getString("commands"));
405 while (CommandList.GetToken(mycmd))
407 AllowedOperCommands.insert(mycmd);
410 irc::spacesepstream PrivList(tag->getString("privs"));
411 while (PrivList.GetToken(mypriv))
413 AllowedPrivs.insert(mypriv);
416 std::string modes = tag->getString("usermodes");
417 for (std::string::const_iterator c = modes.begin(); c != modes.end(); ++c)
421 this->AllowedUserModes.set();
423 else if (*c >= 'A' && *c < 'z')
425 this->AllowedUserModes[*c - 'A'] = true;
429 modes = tag->getString("chanmodes");
430 for (std::string::const_iterator c = modes.begin(); c != modes.end(); ++c)
434 this->AllowedChanModes.set();
436 else if (*c >= 'A' && *c < 'z')
438 this->AllowedChanModes[*c - 'A'] = true;
450 * unset their oper type (what IS_OPER checks).
451 * note, order is important - this must come before modes as -o attempts
452 * to call UnOper. -- w00t
457 /* Remove all oper only modes from the user when the deoper - Bug #466*/
458 std::string moderemove("-");
460 for (unsigned char letter = 'A'; letter <= 'z'; letter++)
462 ModeHandler* mh = ServerInstance->Modes->FindMode(letter, MODETYPE_USER);
463 if (mh && mh->NeedsOper())
464 moderemove += letter;
468 std::vector<std::string> parameters;
469 parameters.push_back(this->nick);
470 parameters.push_back(moderemove);
472 ServerInstance->Modes->Process(parameters, this);
474 /* remove the user from the oper list. Will remove multiple entries as a safeguard against bug #404 */
475 ServerInstance->Users->all_opers.remove(this);
477 ModeHandler* opermh = ServerInstance->Modes->FindMode('o', MODETYPE_USER);
478 this->SetMode(opermh, false);
482 * Check class restrictions
484 void LocalUser::CheckClass(bool clone_count)
486 ConnectClass* a = this->MyClass;
490 ServerInstance->Users->QuitUser(this, "Access denied by configuration");
493 else if (a->type == CC_DENY)
495 ServerInstance->Users->QuitUser(this, a->config->getString("reason", "Unauthorised connection"));
498 else if (clone_count)
500 if ((a->GetMaxLocal()) && (ServerInstance->Users->LocalCloneCount(this) > a->GetMaxLocal()))
502 ServerInstance->Users->QuitUser(this, "No more connections allowed from your host via this connect class (local)");
504 ServerInstance->SNO->WriteToSnoMask('a', "WARNING: maximum LOCAL connections (%ld) exceeded for IP %s", a->GetMaxLocal(), this->GetIPString().c_str());
507 else if ((a->GetMaxGlobal()) && (ServerInstance->Users->GlobalCloneCount(this) > a->GetMaxGlobal()))
509 ServerInstance->Users->QuitUser(this, "No more connections allowed from your host via this connect class (global)");
511 ServerInstance->SNO->WriteToSnoMask('a', "WARNING: maximum GLOBAL connections (%ld) exceeded for IP %s", a->GetMaxGlobal(), this->GetIPString().c_str());
516 this->nping = ServerInstance->Time() + a->GetPingTime() + ServerInstance->Config->dns_timeout;
519 bool LocalUser::CheckLines(bool doZline)
521 const char* check[] = { "G" , "K", (doZline) ? "Z" : NULL, NULL };
525 for (int n = 0; check[n]; ++n)
527 XLine *r = ServerInstance->XLines->MatchesLine(check[n], this);
540 void LocalUser::FullConnect()
542 ServerInstance->stats->statsConnects++;
543 this->idle_lastmsg = ServerInstance->Time();
546 * You may be thinking "wtf, we checked this in User::AddClient!" - and yes, we did, BUT.
547 * At the time AddClient is called, we don't have a resolved host, by here we probably do - which
548 * may put the user into a totally seperate class with different restrictions! so we *must* check again.
549 * Don't remove this! -- w00t
559 this->WriteNumeric(RPL_WELCOME, ":Welcome to the %s IRC Network %s", ServerInstance->Config->Network.c_str(), GetFullRealHost().c_str());
560 this->WriteNumeric(RPL_YOURHOSTIS, ":Your host is %s, running version %s", ServerInstance->Config->ServerName.c_str(), BRANCH);
561 this->WriteNumeric(RPL_SERVERCREATED, ":This server was created %s %s", __TIME__, __DATE__);
563 const std::string& modelist = ServerInstance->Modes->GetModeListFor004Numeric();
564 this->WriteNumeric(RPL_SERVERVERSION, "%s %s %s", ServerInstance->Config->ServerName.c_str(), BRANCH, modelist.c_str());
566 ServerInstance->ISupport.SendTo(this);
569 if (ServerInstance->Users->unregistered_count)
570 ServerInstance->Users->unregistered_count--;
572 /* Trigger MOTD and LUSERS output, give modules a chance too */
573 ModResult MOD_RESULT;
574 std::string command("LUSERS");
575 std::vector<std::string> parameters;
576 FIRST_MOD_RESULT(OnPreCommand, MOD_RESULT, (command, parameters, this, true, command));
578 ServerInstance->Parser->CallHandler(command, parameters, this);
580 MOD_RESULT = MOD_RES_PASSTHRU;
582 FIRST_MOD_RESULT(OnPreCommand, MOD_RESULT, (command, parameters, this, true, command));
584 ServerInstance->Parser->CallHandler(command, parameters, this);
586 if (ServerInstance->Config->RawLog)
587 WriteServ("PRIVMSG %s :*** Raw I/O logging is enabled on this server. All messages, passwords, and commands are being recorded.", nick.c_str());
590 * We don't set REG_ALL until triggering OnUserConnect, so some module events don't spew out stuff
591 * for a user that doesn't exist yet.
593 FOREACH_MOD(OnUserConnect, (this));
595 this->registered = REG_ALL;
597 FOREACH_MOD(OnPostConnect, (this));
599 ServerInstance->SNO->WriteToSnoMask('c',"Client connecting on port %d (class %s): %s (%s) [%s]",
600 this->GetServerPort(), this->MyClass->name.c_str(), GetFullRealHost().c_str(), this->GetIPString().c_str(), this->fullname.c_str());
601 ServerInstance->Logs->Log("BANCACHE", LOG_DEBUG, "BanCache: Adding NEGATIVE hit for " + this->GetIPString());
602 ServerInstance->BanCache->AddHit(this->GetIPString(), "", "");
603 // reset the flood penalty (which could have been raised due to things like auto +x)
604 CommandFloodPenalty = 0;
607 void User::InvalidateCache()
609 /* Invalidate cache */
610 cached_fullhost.clear();
611 cached_hostip.clear();
612 cached_makehost.clear();
613 cached_fullrealhost.clear();
616 bool User::ChangeNick(const std::string& newnick, bool force)
620 ServerInstance->Logs->Log("USERS", LOG_DEFAULT, "ERROR: Attempted to change nick of a quitting user: " + this->nick);
626 ModResult MOD_RESULT;
627 FIRST_MOD_RESULT(OnUserPreNick, MOD_RESULT, (this, newnick));
629 if (MOD_RESULT == MOD_RES_DENY)
631 ServerInstance->stats->statsCollisions++;
636 if (assign(newnick) == assign(nick))
638 // case change, don't need to check Q:lines and such
639 // and, if it's identical including case, we can leave right now
646 * Don't check Q:Lines if it's a server-enforced change, just on the off-chance some fucking *moron*
647 * tries to Q:Line SIDs, also, this means we just get our way period, as it really should be.
648 * Thanks Kein for finding this. -- w00t
650 * Also don't check Q:Lines for remote nickchanges, they should have our Q:Lines anyway to enforce themselves.
653 if (IS_LOCAL(this) && !force)
655 XLine* mq = ServerInstance->XLines->MatchesLine("Q",newnick);
658 if (this->registered == REG_ALL)
660 ServerInstance->SNO->WriteGlobalSno('a', "Q-Lined nickname %s from %s: %s",
661 newnick.c_str(), GetFullRealHost().c_str(), mq->reason.c_str());
663 this->WriteNumeric(ERR_ERRONEUSNICKNAME, "%s :Invalid nickname: %s", newnick.c_str(), mq->reason.c_str());
667 if (ServerInstance->Config->RestrictBannedUsers)
669 for (UCListIter i = this->chans.begin(); i != this->chans.end(); i++)
671 Channel* chan = (*i)->chan;
672 if (chan->GetPrefixValue(this) < VOICE_VALUE && chan->IsBanned(this))
674 this->WriteNumeric(ERR_CANNOTSENDTOCHAN, "%s :Cannot send to channel (you're banned)", chan->name.c_str());
682 * Uh oh.. if the nickname is in use, and it's not in use by the person using it (doh) --
683 * then we have a potential collide. Check whether someone else is camping on the nick
684 * (i.e. connect -> send NICK, don't send USER.) If they are camping, force-change the
685 * camper to their UID, and allow the incoming nick change.
687 * If the guy using the nick is already using it, tell the incoming nick change to gtfo,
688 * because the nick is already (rightfully) in use. -- w00t
690 User* InUse = ServerInstance->FindNickOnly(newnick);
691 if (InUse && (InUse != this))
693 if (InUse->registered != REG_ALL)
695 /* force the camper to their UUID, and ask them to re-send a NICK. */
696 InUse->WriteTo(InUse, "NICK %s", InUse->uuid.c_str());
697 InUse->WriteNumeric(ERR_NICKNAMEINUSE, "%s :Nickname overruled.", InUse->nick.c_str());
699 ServerInstance->Users->clientlist->erase(InUse->nick);
700 (*(ServerInstance->Users->clientlist))[InUse->uuid] = InUse;
702 InUse->nick = InUse->uuid;
703 InUse->InvalidateCache();
704 InUse->registered &= ~REG_NICK;
708 /* No camping, tell the incoming user to stop trying to change nick ;p */
709 this->WriteNumeric(ERR_NICKNAMEINUSE, "%s :Nickname is already in use.", newnick.c_str());
715 if (this->registered == REG_ALL)
716 this->WriteCommon("NICK %s",newnick.c_str());
717 std::string oldnick = nick;
721 ServerInstance->Users->clientlist->erase(oldnick);
722 (*(ServerInstance->Users->clientlist))[newnick] = this;
724 if (registered == REG_ALL)
725 FOREACH_MOD(OnUserPostNick, (this,oldnick));
730 int LocalUser::GetServerPort()
732 switch (this->server_sa.sa.sa_family)
735 return htons(this->server_sa.in6.sin6_port);
737 return htons(this->server_sa.in4.sin_port);
742 const std::string& User::GetIPString()
745 if (cachedip.empty())
747 irc::sockets::satoap(client_sa, cachedip, port);
748 /* IP addresses starting with a : on irc are a Bad Thing (tm) */
749 if (cachedip[0] == ':')
750 cachedip.insert(cachedip.begin(),1,'0');
756 irc::sockets::cidr_mask User::GetCIDRMask()
759 switch (client_sa.sa.sa_family)
762 range = ServerInstance->Config->c_ipv6_range;
765 range = ServerInstance->Config->c_ipv4_range;
768 return irc::sockets::cidr_mask(client_sa, range);
771 bool User::SetClientIP(const char* sip, bool recheck_eline)
774 cached_hostip.clear();
775 return irc::sockets::aptosa(sip, 0, client_sa);
778 void User::SetClientIP(const irc::sockets::sockaddrs& sa, bool recheck_eline)
781 cached_hostip.clear();
782 memcpy(&client_sa, &sa, sizeof(irc::sockets::sockaddrs));
785 bool LocalUser::SetClientIP(const char* sip, bool recheck_eline)
787 irc::sockets::sockaddrs sa;
788 if (!irc::sockets::aptosa(sip, 0, sa))
792 LocalUser::SetClientIP(sa, recheck_eline);
796 void LocalUser::SetClientIP(const irc::sockets::sockaddrs& sa, bool recheck_eline)
800 User::SetClientIP(sa);
802 this->exempt = (ServerInstance->XLines->MatchesLine("E", this) != NULL);
804 FOREACH_MOD(OnSetUserIP, (this));
808 static std::string wide_newline("\r\n");
810 void User::Write(const std::string& text)
814 void User::Write(const char *text, ...)
818 void LocalUser::Write(const std::string& text)
820 if (!SocketEngine::BoundsCheckFd(&eh))
823 if (text.length() > ServerInstance->Config->Limits.MaxLine - 2)
825 // this should happen rarely or never. Crop the string at 512 and try again.
826 std::string try_again = text.substr(0, ServerInstance->Config->Limits.MaxLine - 2);
831 ServerInstance->Logs->Log("USEROUTPUT", LOG_RAWIO, "C[%s] O %s", uuid.c_str(), text.c_str());
833 eh.AddWriteBuf(text);
834 eh.AddWriteBuf(wide_newline);
836 ServerInstance->stats->statsSent += text.length() + 2;
837 this->bytes_out += text.length() + 2;
843 void LocalUser::Write(const char *text, ...)
845 std::string textbuffer;
846 VAFORMAT(textbuffer, text, text);
847 this->Write(textbuffer);
850 void User::WriteServ(const std::string& text)
852 this->Write(":%s %s",ServerInstance->Config->ServerName.c_str(),text.c_str());
856 * Same as Write(), except `text' is prefixed with `:server.name '.
858 void User::WriteServ(const char* text, ...)
860 std::string textbuffer;
861 VAFORMAT(textbuffer, text, text);
862 this->WriteServ(textbuffer);
865 void User::WriteCommand(const char* command, const std::string& text)
867 this->WriteServ(command + (this->registered & REG_NICK ? " " + this->nick : " *") + " " + text);
870 void User::WriteNumeric(unsigned int numeric, const char* text, ...)
872 std::string textbuffer;
873 VAFORMAT(textbuffer, text, text);
874 this->WriteNumeric(numeric, textbuffer);
877 void User::WriteNumeric(unsigned int numeric, const std::string &text)
879 ModResult MOD_RESULT;
881 FIRST_MOD_RESULT(OnNumeric, MOD_RESULT, (this, numeric, text));
883 if (MOD_RESULT == MOD_RES_DENY)
886 const std::string message = InspIRCd::Format(":%s %03u %s %s", ServerInstance->Config->ServerName.c_str(),
887 numeric, this->registered & REG_NICK ? this->nick.c_str() : "*", text.c_str());
888 this->Write(message);
891 void User::WriteFrom(User *user, const std::string &text)
893 const std::string message = ":" + user->GetFullHost() + " " + text;
894 this->Write(message);
898 /* write text from an originating user to originating user */
900 void User::WriteFrom(User *user, const char* text, ...)
902 std::string textbuffer;
903 VAFORMAT(textbuffer, text, text);
904 this->WriteFrom(user, textbuffer);
908 /* write text to an destination user from a source user (e.g. user privmsg) */
910 void User::WriteTo(User *dest, const char *data, ...)
912 std::string textbuffer;
913 VAFORMAT(textbuffer, data, data);
914 this->WriteTo(dest, textbuffer);
917 void User::WriteTo(User *dest, const std::string &data)
919 dest->WriteFrom(this, data);
922 void User::WriteCommon(const char* text, ...)
924 if (this->registered != REG_ALL || quitting)
927 std::string textbuffer;
928 VAFORMAT(textbuffer, text, text);
929 textbuffer = ":" + this->GetFullHost() + " " + textbuffer;
930 this->WriteCommonRaw(textbuffer, true);
933 void User::WriteCommonExcept(const char* text, ...)
935 if (this->registered != REG_ALL || quitting)
938 std::string textbuffer;
939 VAFORMAT(textbuffer, text, text);
940 textbuffer = ":" + this->GetFullHost() + " " + textbuffer;
941 this->WriteCommonRaw(textbuffer, false);
944 void User::WriteCommonRaw(const std::string &line, bool include_self)
946 if (this->registered != REG_ALL || quitting)
949 LocalUser::already_sent_id++;
951 IncludeChanList include_c(chans.begin(), chans.end());
952 std::map<User*,bool> exceptions;
954 exceptions[this] = include_self;
956 FOREACH_MOD(OnBuildNeighborList, (this, include_c, exceptions));
958 for (std::map<User*,bool>::iterator i = exceptions.begin(); i != exceptions.end(); ++i)
960 LocalUser* u = IS_LOCAL(i->first);
961 if (u && !u->quitting)
963 u->already_sent = LocalUser::already_sent_id;
968 for (IncludeChanList::const_iterator v = include_c.begin(); v != include_c.end(); ++v)
970 Channel* c = (*v)->chan;
971 const UserMembList* ulist = c->GetUsers();
972 for (UserMembList::const_iterator i = ulist->begin(); i != ulist->end(); i++)
974 LocalUser* u = IS_LOCAL(i->first);
975 if (u && u->already_sent != LocalUser::already_sent_id)
977 u->already_sent = LocalUser::already_sent_id;
984 void User::WriteCommonQuit(const std::string &normal_text, const std::string &oper_text)
986 if (this->registered != REG_ALL)
989 already_sent_t uniq_id = ++LocalUser::already_sent_id;
991 const std::string normalMessage = ":" + this->GetFullHost() + " QUIT :" + normal_text;
992 const std::string operMessage = ":" + this->GetFullHost() + " QUIT :" + oper_text;
994 IncludeChanList include_c(chans.begin(), chans.end());
995 std::map<User*,bool> exceptions;
997 FOREACH_MOD(OnBuildNeighborList, (this, include_c, exceptions));
999 for (std::map<User*,bool>::iterator i = exceptions.begin(); i != exceptions.end(); ++i)
1001 LocalUser* u = IS_LOCAL(i->first);
1002 if (u && !u->quitting)
1004 u->already_sent = uniq_id;
1006 u->Write(u->IsOper() ? operMessage : normalMessage);
1009 for (IncludeChanList::const_iterator v = include_c.begin(); v != include_c.end(); ++v)
1011 const UserMembList* ulist = (*v)->chan->GetUsers();
1012 for (UserMembList::const_iterator i = ulist->begin(); i != ulist->end(); i++)
1014 LocalUser* u = IS_LOCAL(i->first);
1015 if (u && (u->already_sent != uniq_id))
1017 u->already_sent = uniq_id;
1018 u->Write(u->IsOper() ? operMessage : normalMessage);
1024 void LocalUser::SendText(const std::string& line)
1029 void RemoteUser::SendText(const std::string& line)
1031 ServerInstance->PI->PushToClient(this, line);
1034 void FakeUser::SendText(const std::string& line)
1038 void User::SendText(const char *text, ...)
1041 VAFORMAT(line, text, text);
1045 void User::SendText(const std::string& linePrefix, std::stringstream& textStream)
1049 while (textStream >> word)
1051 size_t lineLength = linePrefix.length() + line.length() + word.length() + 3; // "\s\n\r"
1052 if (lineLength > ServerInstance->Config->Limits.MaxLine)
1054 SendText(linePrefix + line);
1059 SendText(linePrefix + line);
1062 /* return 0 or 1 depending if users u and u2 share one or more common channels
1063 * (used by QUIT, NICK etc which arent channel specific notices)
1065 * The old algorithm in 1.0 for this was relatively inefficient, iterating over
1066 * the first users channels then the second users channels within the outer loop,
1067 * therefore it was a maximum of x*y iterations (upon returning 0 and checking
1068 * all possible iterations). However this new function instead checks against the
1069 * channel's userlist in the inner loop which is a std::map<User*,User*>
1070 * and saves us time as we already know what pointer value we are after.
1071 * Don't quote me on the maths as i am not a mathematician or computer scientist,
1072 * but i believe this algorithm is now x+(log y) maximum iterations instead.
1074 bool User::SharesChannelWith(User *other)
1077 for (UCListIter i = this->chans.begin(); i != this->chans.end(); i++)
1079 /* Eliminate the inner loop (which used to be ~equal in size to the outer loop)
1080 * by replacing it with a map::find which *should* be more efficient
1082 if ((*i)->chan->HasUser(other))
1088 bool User::ChangeName(const std::string& gecos)
1090 if (!this->fullname.compare(gecos))
1095 ModResult MOD_RESULT;
1096 FIRST_MOD_RESULT(OnChangeLocalUserGECOS, MOD_RESULT, (IS_LOCAL(this),gecos));
1097 if (MOD_RESULT == MOD_RES_DENY)
1099 FOREACH_MOD(OnChangeName, (this,gecos));
1101 this->fullname.assign(gecos, 0, ServerInstance->Config->Limits.MaxGecos);
1106 bool User::ChangeDisplayedHost(const std::string& shost)
1113 ModResult MOD_RESULT;
1114 FIRST_MOD_RESULT(OnChangeLocalUserHost, MOD_RESULT, (IS_LOCAL(this),shost));
1115 if (MOD_RESULT == MOD_RES_DENY)
1119 FOREACH_MOD(OnChangeHost, (this,shost));
1121 this->dhost.assign(shost, 0, 64);
1122 this->InvalidateCache();
1125 this->WriteNumeric(RPL_YOURDISPLAYEDHOST, "%s :is now your displayed host", this->dhost.c_str());
1130 bool User::ChangeIdent(const std::string& newident)
1132 if (this->ident == newident)
1135 FOREACH_MOD(OnChangeIdent, (this,newident));
1137 this->ident.assign(newident, 0, ServerInstance->Config->Limits.IdentMax);
1138 this->InvalidateCache();
1143 void User::SendAll(const char* command, const char* text, ...)
1145 std::string textbuffer;
1146 VAFORMAT(textbuffer, text, text);
1147 const std::string message = ":" + this->GetFullHost() + " " + command + " $* :" + textbuffer;
1149 for (LocalUserList::const_iterator i = ServerInstance->Users->local_users.begin(); i != ServerInstance->Users->local_users.end(); i++)
1151 if ((*i)->registered == REG_ALL)
1152 (*i)->Write(message);
1157 * Sets a user's connection class.
1158 * If the class name is provided, it will be used. Otherwise, the class will be guessed using host/ip/ident/etc.
1159 * NOTE: If the <ALLOW> or <DENY> tag specifies an ip, and this user resolves,
1160 * then their ip will be taken as 'priority' anyway, so for example,
1161 * <connect allow="127.0.0.1"> will match joe!bloggs@localhost
1163 void LocalUser::SetClass(const std::string &explicit_name)
1165 ConnectClass *found = NULL;
1167 ServerInstance->Logs->Log("CONNECTCLASS", LOG_DEBUG, "Setting connect class for UID %s", this->uuid.c_str());
1169 if (!explicit_name.empty())
1171 for (ClassVector::iterator i = ServerInstance->Config->Classes.begin(); i != ServerInstance->Config->Classes.end(); i++)
1173 ConnectClass* c = *i;
1175 if (explicit_name == c->name)
1177 ServerInstance->Logs->Log("CONNECTCLASS", LOG_DEBUG, "Explicitly set to %s", explicit_name.c_str());
1184 for (ClassVector::iterator i = ServerInstance->Config->Classes.begin(); i != ServerInstance->Config->Classes.end(); i++)
1186 ConnectClass* c = *i;
1187 ServerInstance->Logs->Log("CONNECTCLASS", LOG_DEBUG, "Checking %s", c->GetName().c_str());
1189 ModResult MOD_RESULT;
1190 FIRST_MOD_RESULT(OnSetConnectClass, MOD_RESULT, (this,c));
1191 if (MOD_RESULT == MOD_RES_DENY)
1193 if (MOD_RESULT == MOD_RES_ALLOW)
1195 ServerInstance->Logs->Log("CONNECTCLASS", LOG_DEBUG, "Class forced by module to %s", c->GetName().c_str());
1200 if (c->type == CC_NAMED)
1203 bool regdone = (registered != REG_NONE);
1204 if (c->config->getBool("registered", regdone) != regdone)
1207 /* check if host matches.. */
1208 if (!InspIRCd::MatchCIDR(this->GetIPString(), c->GetHost(), NULL) &&
1209 !InspIRCd::MatchCIDR(this->host, c->GetHost(), NULL))
1211 ServerInstance->Logs->Log("CONNECTCLASS", LOG_DEBUG, "No host match (for %s)", c->GetHost().c_str());
1216 * deny change if change will take class over the limit check it HERE, not after we found a matching class,
1217 * because we should attempt to find another class if this one doesn't match us. -- w00t
1219 if (c->limit && (c->GetReferenceCount() >= c->limit))
1221 ServerInstance->Logs->Log("CONNECTCLASS", LOG_DEBUG, "OOPS: Connect class limit (%lu) hit, denying", c->limit);
1225 /* if it requires a port ... */
1226 int port = c->config->getInt("port");
1229 ServerInstance->Logs->Log("CONNECTCLASS", LOG_DEBUG, "Requires port (%d)", port);
1231 /* and our port doesn't match, fail. */
1232 if (this->GetServerPort() != port)
1236 if (regdone && !c->config->getString("password").empty())
1238 if (!ServerInstance->PassCompare(this, c->config->getString("password"), password, c->config->getString("hash")))
1240 ServerInstance->Logs->Log("CONNECTCLASS", LOG_DEBUG, "Bad password, skipping");
1245 /* we stop at the first class that meets ALL critera. */
1252 * Okay, assuming we found a class that matches.. switch us into that class, keeping refcounts up to date.
1260 void User::PurgeEmptyChannels()
1262 // firstly decrement the count on each channel
1263 for (UCListIter i = this->chans.begin(); i != this->chans.end(); )
1265 Channel* c = (*i)->chan;
1273 const std::string& FakeUser::GetFullHost()
1275 if (!ServerInstance->Config->HideWhoisServer.empty())
1276 return ServerInstance->Config->HideWhoisServer;
1277 return server->GetName();
1280 const std::string& FakeUser::GetFullRealHost()
1282 if (!ServerInstance->Config->HideWhoisServer.empty())
1283 return ServerInstance->Config->HideWhoisServer;
1284 return server->GetName();
1287 ConnectClass::ConnectClass(ConfigTag* tag, char t, const std::string& mask)
1288 : config(tag), type(t), fakelag(true), name("unnamed"), registration_timeout(0), host(mask),
1289 pingtime(0), softsendqmax(0), hardsendqmax(0), recvqmax(0),
1290 penaltythreshold(0), commandrate(0), maxlocal(0), maxglobal(0), maxconnwarn(true), maxchans(0),
1291 limit(0), resolvehostnames(true)
1295 ConnectClass::ConnectClass(ConfigTag* tag, char t, const std::string& mask, const ConnectClass& parent)
1296 : config(tag), type(t), fakelag(parent.fakelag), name("unnamed"),
1297 registration_timeout(parent.registration_timeout), host(mask), pingtime(parent.pingtime),
1298 softsendqmax(parent.softsendqmax), hardsendqmax(parent.hardsendqmax), recvqmax(parent.recvqmax),
1299 penaltythreshold(parent.penaltythreshold), commandrate(parent.commandrate),
1300 maxlocal(parent.maxlocal), maxglobal(parent.maxglobal), maxconnwarn(parent.maxconnwarn), maxchans(parent.maxchans),
1301 limit(parent.limit), resolvehostnames(parent.resolvehostnames)
1305 void ConnectClass::Update(const ConnectClass* src)
1307 config = src->config;
1309 fakelag = src->fakelag;
1311 registration_timeout = src->registration_timeout;
1313 pingtime = src->pingtime;
1314 softsendqmax = src->softsendqmax;
1315 hardsendqmax = src->hardsendqmax;
1316 recvqmax = src->recvqmax;
1317 penaltythreshold = src->penaltythreshold;
1318 commandrate = src->commandrate;
1319 maxlocal = src->maxlocal;
1320 maxglobal = src->maxglobal;
1321 maxconnwarn = src->maxconnwarn;
1322 maxchans = src->maxchans;
1324 resolvehostnames = src->resolvehostnames;