+#include "xline.h"
+#include "bancache.h"
+
+/* add a client connection to the sockets list */
+void UserManager::AddUser(InspIRCd* Instance, int socket, int port, bool iscached, int socketfamily, sockaddr* ip, const std::string &targetip)
+{
+ /* NOTE: Calling this one parameter constructor for User automatically
+ * allocates a new UUID and places it in the hash_map.
+ */
+ User* New = NULL;
+ try
+ {
+ New = new User(Instance);
+ }
+ catch (...)
+ {
+ Instance->Logs->Log("USERS", DEFAULT,"*** WTF *** Duplicated UUID! -- Crack smoking monkies have been unleashed.");
+ Instance->SNO->WriteToSnoMask('A', "WARNING *** Duplicate UUID allocated!");
+ return;
+ }
+
+ char ipaddr[MAXBUF];
+#ifdef IPV6
+ if (socketfamily == AF_INET6)
+ inet_ntop(AF_INET6, &((const sockaddr_in6*)ip)->sin6_addr, ipaddr, sizeof(ipaddr));
+ else
+#endif
+ inet_ntop(AF_INET, &((const sockaddr_in*)ip)->sin_addr, ipaddr, sizeof(ipaddr));
+
+ New->SetFd(socket);
+ New->SetSockAddr(socketfamily, ipaddr, port);
+
+ /* Give each of the modules an attempt to hook the user for I/O */
+ FOREACH_MOD_I(Instance, I_OnHookUserIO, OnHookUserIO(New, targetip));
+
+ if (New->io)
+ {
+ try
+ {
+ New->io->OnRawSocketAccept(socket, ipaddr, port);
+ }
+ catch (CoreException& modexcept)
+ {
+ ServerInstance->Logs->Log("SOCKET", DEBUG,"%s threw an exception: %s", modexcept.GetSource(), modexcept.GetReason());
+ }
+ }
+
+ Instance->Logs->Log("USERS", DEBUG,"New user fd: %d", socket);
+
+ this->unregistered_count++;
+
+ (*(this->clientlist))[New->uuid] = New;
+
+ /* The users default nick is their UUID */
+ New->nick.assign(New->uuid, 0, ServerInstance->Config->Limits.NickMax);
+
+ New->server = Instance->FindServerNamePtr(Instance->Config->ServerName);
+ New->ident.assign("unknown");
+
+ New->registered = REG_NONE;
+ New->signon = Instance->Time() + Instance->Config->dns_timeout;
+ New->lastping = 1;
+
+ /* Smarter than your average bear^H^H^H^Hset of strlcpys. */
+ New->dhost.assign(New->GetIPString(), 0, 64);
+ New->host.assign(New->GetIPString(), 0, 64);
+
+ Instance->Users->AddLocalClone(New);
+ Instance->Users->AddGlobalClone(New);
+
+ /*
+ * First class check. We do this again in FullConnect after DNS is done, and NICK/USER is recieved.
+ * See my note down there for why this is required. DO NOT REMOVE. :) -- w00t
+ */
+ ConnectClass* i = New->SetClass();
+
+ if (!i)
+ {
+ this->QuitUser(New, "Access denied by configuration");
+ return;
+ }
+
+ /*
+ * Check connect class settings and initialise settings into User.
+ * This will be done again after DNS resolution. -- w00t
+ */
+ New->CheckClass();
+
+ this->local_users.push_back(New);
+
+ if ((this->local_users.size() > Instance->Config->SoftLimit) || (this->local_users.size() >= (unsigned int)Instance->SE->GetMaxFds()))
+ {
+ Instance->SNO->WriteToSnoMask('A', "Warning: softlimit value has been reached: %d clients", Instance->Config->SoftLimit);
+ this->QuitUser(New,"No more connections allowed");
+ return;
+ }
+
+ /*
+ * XXX -
+ * this is done as a safety check to keep the file descriptors within range of fd_ref_table.
+ * its a pretty big but for the moment valid assumption:
+ * file descriptors are handed out starting at 0, and are recycled as theyre freed.
+ * therefore if there is ever an fd over 65535, 65536 clients must be connected to the
+ * irc server at once (or the irc server otherwise initiating this many connections, files etc)
+ * which for the time being is a physical impossibility (even the largest networks dont have more
+ * than about 10,000 users on ONE server!)
+ */
+ if (socket >= Instance->SE->GetMaxFds())
+ {
+ this->QuitUser(New, "Server is full");
+ return;
+ }
+
+ /*
+ * even with bancache, we still have to keep User::exempt current.
+ * besides that, if we get a positive bancache hit, we still won't fuck
+ * them over if they are exempt. -- w00t
+ */
+ New->exempt = (Instance->XLines->MatchesLine("E",New) != NULL);
+
+ if (BanCacheHit *b = Instance->BanCache->GetHit(New->GetIPString()))
+ {
+ if (!b->Type.empty() && !New->exempt)
+ {
+ /* user banned */
+ Instance->Logs->Log("BANCACHE", DEBUG, std::string("BanCache: Positive hit for ") + New->GetIPString());
+ if (*Instance->Config->MoronBanner)
+ New->WriteServ("NOTICE %s :*** %s", New->nick.c_str(), Instance->Config->MoronBanner);
+ this->QuitUser(New, b->Reason);
+ return;
+ }
+ else
+ {
+ Instance->Logs->Log("BANCACHE", DEBUG, std::string("BanCache: Negative hit for ") + New->GetIPString());
+ }
+ }
+ else
+ {
+ if (!New->exempt)
+ {
+ XLine* r = Instance->XLines->MatchesLine("Z",New);
+
+ if (r)
+ {
+ r->Apply(New);
+ return;
+ }
+ }
+ }
+
+ if (!Instance->SE->AddFd(New))
+ {
+ Instance->Logs->Log("USERS", DEBUG,"Internal error on new connection");
+ this->QuitUser(New, "Internal error handling connection");
+ }
+
+ /* NOTE: even if dns lookups are *off*, we still need to display this.
+ * BOPM and other stuff requires it.
+ */
+ New->WriteServ("NOTICE Auth :*** Looking up your hostname...");
+
+ if (Instance->Config->NoUserDns)
+ {
+ New->WriteServ("NOTICE %s :*** Skipping host resolution (disabled by server administrator)", New->nick.c_str());
+ New->dns_done = true;
+ }
+ else
+ {
+ New->StartDNSLookup();
+ }
+}
+
+void UserManager::QuitUser(User *user, const std::string &quitreason, const char* operreason)
+{
+ ServerInstance->Logs->Log("USERS", DEBUG,"QuitUser: %s '%s'", user->nick.c_str(), quitreason.c_str());
+ user->Write("ERROR :Closing link (%s@%s) [%s]", user->ident.c_str(), user->host.c_str(), *operreason ? operreason : quitreason.c_str());
+ user->quietquit = false;
+ user->quitmsg = quitreason;
+
+ if (!*operreason)
+ user->operquitmsg = quitreason;
+ else
+ user->operquitmsg = operreason;
+
+ ServerInstance->GlobalCulls.AddItem(user);
+}
+