]> git.netwichtig.de Git - user/henk/code/inspircd.git/blobdiff - src/usermanager.cpp
Rename `<bind:ssl>` to `<bind:sslprofile>`.
[user/henk/code/inspircd.git] / src / usermanager.cpp
index b5050d91a56c4a17bda9be5cf9628b74741193be..c7aaa5c1134e54c9240c1ff0557bfa2112cd8d0c 100644 (file)
@@ -1,10 +1,17 @@
 /*
  * InspIRCd -- Internet Relay Chat Daemon
  *
+ *   Copyright (C) 2019 iwalkalone <iwalkalone69@gmail.com>
+ *   Copyright (C) 2019 Matt Schatz <genius3000@g3k.solutions>
+ *   Copyright (C) 2013-2016, 2018 Attila Molnar <attilamolnar@hush.com>
+ *   Copyright (C) 2013, 2018-2020 Sadie Powell <sadie@witchery.services>
+ *   Copyright (C) 2013, 2015 Adam <Adam@anope.org>
+ *   Copyright (C) 2013 Daniel Vassdal <shutter@canternet.org>
+ *   Copyright (C) 2012, 2019 Robby <robby@chatbelgie.be>
  *   Copyright (C) 2009-2010 Daniel De Graaf <danieldg@inspircd.org>
- *   Copyright (C) 2008 Dennis Friis <peavey@inspircd.org>
+ *   Copyright (C) 2009 Uli Schlachter <psychon@inspircd.org>
+ *   Copyright (C) 2008-2010 Craig Edwards <brain@inspircd.org>
  *   Copyright (C) 2008 Robin Burchell <robin+git@viroteck.net>
- *   Copyright (C) 2008 Craig Edwards <craigedwards@brainbox.cc>
  *
  * This file is part of InspIRCd.  InspIRCd is free software: you can
  * redistribute it and/or modify it under the terms of the GNU General Public
 
 #include "inspircd.h"
 #include "xline.h"
-#include "bancache.h"
 #include "iohook.h"
 
+namespace
+{
+       class WriteCommonQuit : public User::ForEachNeighborHandler
+       {
+               ClientProtocol::Messages::Quit quitmsg;
+               ClientProtocol::Event quitevent;
+               ClientProtocol::Messages::Quit operquitmsg;
+               ClientProtocol::Event operquitevent;
+
+               void Execute(LocalUser* user) CXX11_OVERRIDE
+               {
+                       user->Send(user->IsOper() ? operquitevent : quitevent);
+               }
+
+        public:
+               WriteCommonQuit(User* user, const std::string& msg, const std::string& opermsg)
+                       : quitmsg(user, msg)
+                       , quitevent(ServerInstance->GetRFCEvents().quit, quitmsg)
+                       , operquitmsg(user, opermsg)
+                       , operquitevent(ServerInstance->GetRFCEvents().quit, operquitmsg)
+               {
+                       user->ForEachNeighbor(*this, false);
+               }
+       };
+
+       void CheckPingTimeout(LocalUser* user)
+       {
+               // Check if it is time to ping the user yet.
+               if (ServerInstance->Time() < user->nextping)
+                       return;
+
+               // This user didn't answer the last ping, remove them.
+               if (!user->lastping)
+               {
+                       ModResult res;
+                       FIRST_MOD_RESULT(OnConnectionFail, res, (user, I_ERR_TIMEOUT));
+                       if (res == MOD_RES_ALLOW)
+                       {
+                               // A module is preventing this user from being timed out.
+                               user->lastping = 1;
+                               user->nextping = ServerInstance->Time() + user->MyClass->GetPingTime();
+                               return;
+                       }
+
+                       time_t secs = ServerInstance->Time() - (user->nextping - user->MyClass->GetPingTime());
+                       const std::string message = "Ping timeout: " + ConvToStr(secs) + (secs != 1 ? " seconds" : " second");
+                       ServerInstance->Users.QuitUser(user, message);
+                       return;
+               }
+
+               // Send a ping to the client.
+               ClientProtocol::Messages::Ping ping;
+               user->Send(ServerInstance->GetRFCEvents().ping, ping);
+               user->lastping = 0;
+               user->nextping = ServerInstance->Time() + user->MyClass->GetPingTime();
+       }
+
+       void CheckRegistrationTimeout(LocalUser* user)
+       {
+               if (user->GetClass() && (ServerInstance->Time() > (user->signon + user->GetClass()->GetRegTimeout())))
+               {
+                       // Either the user did not send NICK/USER or a module blocked registration in
+                       // OnCheckReady until the client timed out.
+                       ServerInstance->Users.QuitUser(user, "Registration timeout");
+               }
+       }
+
+       void CheckModulesReady(LocalUser* user)
+       {
+               ModResult res;
+               FIRST_MOD_RESULT(OnCheckReady, res, (user));
+               if (res == MOD_RES_PASSTHRU)
+               {
+                       // User has sent NICK/USER and modules are ready.
+                       user->FullConnect();
+                       return;
+               }
+
+               // If the user has been quit in OnCheckReady then we shouldn't quit
+               // them again for having a registration timeout.
+               if (!user->quitting)
+                       CheckRegistrationTimeout(user);
+       }
+}
+
 UserManager::UserManager()
-       : clientlist(new user_hash)
-       , uuidlist(new user_hash)
+       : already_sent_id(0)
        , unregistered_count(0)
 {
 }
 
 UserManager::~UserManager()
 {
-       for (user_hash::iterator i = clientlist->begin(); i != clientlist->end(); ++i)
+       for (user_hash::iterator i = clientlist.begin(); i != clientlist.end(); ++i)
        {
                delete i->second;
        }
-
-       delete clientlist;
-       delete uuidlist;
 }
 
-/* add a client connection to the sockets list */
 void UserManager::AddUser(int socket, ListenSocket* via, irc::sockets::sockaddrs* client, irc::sockets::sockaddrs* server)
 {
-       /* NOTE: Calling this one parameter constructor for User automatically
-        * allocates a new UUID and places it in the hash_map.
-        */
-       LocalUser* New = NULL;
-       try
-       {
-               New = new LocalUser(socket, client, server);
-       }
-       catch (...)
-       {
-               ServerInstance->Logs->Log("USERS", LOG_DEFAULT, "*** WTF *** Duplicated UUID! -- Crack smoking monkeys have been unleashed.");
-               ServerInstance->SNO->WriteToSnoMask('a', "WARNING *** Duplicate UUID allocated!");
-               return;
-       }
+       // User constructor allocates a new UUID for the user and inserts it into the uuidlist
+       LocalUser* const New = new LocalUser(socket, client, server);
        UserIOHandler* eh = &New->eh;
 
-       // If this listener has an IO hook provider set then tell it about the connection
-       if (via->iohookprov)
-               via->iohookprov->OnAccept(eh, client, server);
-
        ServerInstance->Logs->Log("USERS", LOG_DEBUG, "New user fd: %d", socket);
 
        this->unregistered_count++;
+       this->clientlist[New->nick] = New;
+       this->AddClone(New);
+       this->local_users.push_front(New);
+       FOREACH_MOD(OnUserInit, (New));
 
-       /* The users default nick is their UUID */
-       New->nick = New->uuid;
-       (*(this->clientlist))[New->nick] = New;
+       if (!SocketEngine::AddFd(eh, FD_WANT_FAST_READ | FD_WANT_EDGE_WRITE))
+       {
+               ServerInstance->Logs->Log("USERS", LOG_DEBUG, "Internal error on new connection");
+               this->QuitUser(New, "Internal error handling connection");
+               return;
+       }
 
-       New->registered = REG_NONE;
-       New->signon = ServerInstance->Time() + ServerInstance->Config->dns_timeout;
-       New->lastping = 1;
+       // If this listener has an IO hook provider set then tell it about the connection
+       for (ListenSocket::IOHookProvList::iterator i = via->iohookprovs.begin(); i != via->iohookprovs.end(); ++i)
+       {
+               ListenSocket::IOHookProvRef& iohookprovref = *i;
+               if (!iohookprovref)
+               {
+                       if (!iohookprovref.GetProvider().empty())
+                       {
+                               ServerInstance->Logs->Log("USERS", LOG_DEBUG, "Non-existent I/O hook '%s' in <bind:%s> tag at %s",
+                                       iohookprovref.GetProvider().c_str(),
+                                       i == via->iohookprovs.begin() ? "hook" : "sslprofile",
+                                       via->bind_tag->getTagLocation().c_str());
+                               this->QuitUser(New, "Internal error handling connection");
+                               return;
+                       }
+                       continue;
+               }
 
-       ServerInstance->Users->AddLocalClone(New);
-       ServerInstance->Users->AddGlobalClone(New);
+               iohookprovref->OnAccept(eh, client, server);
 
-       this->local_users.push_front(New);
+               // IOHook could have encountered a fatal error, e.g. if the TLS ClientHello
+               // was already in the queue and there was no common TLS version.
+               if (!eh->getError().empty())
+               {
+                       QuitUser(New, eh->getError());
+                       return;
+               }
+       }
 
-       if ((this->local_users.size() > ServerInstance->Config->SoftLimit) || (this->local_users.size() >= (unsigned int)ServerInstance->SE->GetMaxFds()))
+       if (this->local_users.size() > ServerInstance->Config->SoftLimit)
        {
                ServerInstance->SNO->WriteToSnoMask('a', "Warning: softlimit value has been reached: %d clients", ServerInstance->Config->SoftLimit);
                this->QuitUser(New,"No more connections allowed");
                return;
        }
 
-       /*
-        * First class check. We do this again in FullConnect after DNS is done, and NICK/USER is recieved.
-        * See my note down there for why this is required. DO NOT REMOVE. :) -- w00t
-        */
+       // First class check. We do this again in LocalUser::FullConnect() after DNS is done, and NICK/USER is received.
        New->SetClass();
-
-       /*
-        * Check connect class settings and initialise settings into User.
-        * This will be done again after DNS resolution. -- w00t
-        */
+       // If the user doesn't have an acceptable connect class CheckClass() quits them
        New->CheckClass(ServerInstance->Config->CCOnConnect);
        if (New->quitting)
                return;
@@ -111,15 +201,20 @@ void UserManager::AddUser(int socket, ListenSocket* via, irc::sockets::sockaddrs
         */
        New->exempt = (ServerInstance->XLines->MatchesLine("E",New) != NULL);
 
-       if (BanCacheHit *b = ServerInstance->BanCache->GetHit(New->GetIPString()))
+       BanCacheHit* const b = ServerInstance->BanCache.GetHit(New->GetIPString());
+       if (b)
        {
                if (!b->Type.empty() && !New->exempt)
                {
                        /* user banned */
                        ServerInstance->Logs->Log("BANCACHE", LOG_DEBUG, "BanCache: Positive hit for " + New->GetIPString());
                        if (!ServerInstance->Config->XLineMessage.empty())
-                               New->WriteNotice("*** " +  ServerInstance->Config->XLineMessage);
-                       this->QuitUser(New, b->Reason);
+                               New->WriteNumeric(ERR_YOUREBANNEDCREEP, ServerInstance->Config->XLineMessage);
+
+                       if (ServerInstance->Config->HideBans)
+                               this->QuitUser(New, b->Type + "-lined", &b->Reason);
+                       else
+                               this->QuitUser(New, b->Reason);
                        return;
                }
                else
@@ -141,23 +236,15 @@ void UserManager::AddUser(int socket, ListenSocket* via, irc::sockets::sockaddrs
                }
        }
 
-       if (!ServerInstance->SE->AddFd(eh, FD_WANT_FAST_READ | FD_WANT_EDGE_WRITE))
-       {
-               ServerInstance->Logs->Log("USERS", LOG_DEBUG, "Internal error on new connection");
-               this->QuitUser(New, "Internal error handling connection");
-       }
-
        if (ServerInstance->Config->RawLog)
                New->WriteNotice("*** Raw I/O logging is enabled on this server. All messages, passwords, and commands are being recorded.");
 
        FOREACH_MOD(OnSetUserIP, (New));
-       if (New->quitting)
-               return;
-
-       FOREACH_MOD(OnUserInit, (New));
+       if (!New->quitting)
+               FOREACH_MOD(OnUserPostInit, (New));
 }
 
-void UserManager::QuitUser(User* user, const std::string& quitreason, const std::string* operreason)
+void UserManager::QuitUser(User* user, const std::string& quitmessage, const std::string* operquitmessage)
 {
        if (user->quitting)
        {
@@ -171,22 +258,42 @@ void UserManager::QuitUser(User* user, const std::string& quitreason, const std:
                return;
        }
 
-       user->quitting = true;
+       std::string quitmsg(quitmessage);
+       std::string operquitmsg;
+       if (operquitmessage)
+               operquitmsg.assign(*operquitmessage);
+
+       LocalUser* const localuser = IS_LOCAL(user);
+       if (localuser)
+       {
+               ModResult MOD_RESULT;
+               FIRST_MOD_RESULT(OnUserPreQuit, MOD_RESULT, (localuser, quitmsg, operquitmsg));
+               if (MOD_RESULT == MOD_RES_DENY)
+                       return;
+       }
+
+       if (quitmsg.length() > ServerInstance->Config->Limits.MaxQuit)
+               quitmsg.erase(ServerInstance->Config->Limits.MaxQuit + 1);
 
-       ServerInstance->Logs->Log("USERS", LOG_DEBUG, "QuitUser: %s=%s '%s'", user->uuid.c_str(), user->nick.c_str(), quitreason.c_str());
-       user->Write("ERROR :Closing link: (%s@%s) [%s]", user->ident.c_str(), user->host.c_str(), operreason ? operreason->c_str() : quitreason.c_str());
+       if (operquitmsg.empty())
+               operquitmsg.assign(quitmsg);
+       else if (operquitmsg.length() > ServerInstance->Config->Limits.MaxQuit)
+               operquitmsg.erase(ServerInstance->Config->Limits.MaxQuit + 1);
 
-       std::string reason;
-       reason.assign(quitreason, 0, ServerInstance->Config->Limits.MaxQuit);
-       if (!operreason)
-               operreason = &reason;
+       user->quitting = true;
+       ServerInstance->Logs->Log("USERS", LOG_DEBUG, "QuitUser: %s=%s '%s'", user->uuid.c_str(), user->nick.c_str(), quitmessage.c_str());
+       if (localuser)
+       {
+               ClientProtocol::Messages::Error errormsg(InspIRCd::Format("Closing link: (%s@%s) [%s]", user->ident.c_str(), user->GetRealHost().c_str(), operquitmsg.c_str()));
+               localuser->Send(ServerInstance->GetRFCEvents().error, errormsg);
+       }
 
        ServerInstance->GlobalCulls.AddItem(user);
 
        if (user->registered == REG_ALL)
        {
-               FOREACH_MOD(OnUserQuit, (user, reason, *operreason));
-               user->WriteCommonQuit(reason, *operreason);
+               FOREACH_MOD(OnUserQuit, (user, quitmsg, operquitmsg));
+               WriteCommonQuit(user, quitmsg, operquitmsg);
        }
        else
                unregistered_count--;
@@ -198,125 +305,92 @@ void UserManager::QuitUser(User* user, const std::string& quitreason, const std:
                lu->eh.Close();
 
                if (lu->registered == REG_ALL)
-                       ServerInstance->SNO->WriteToSnoMask('q',"Client exiting: %s (%s) [%s]", user->GetFullRealHost().c_str(), user->GetIPString().c_str(), operreason->c_str());
+                       ServerInstance->SNO->WriteToSnoMask('q',"Client exiting: %s (%s) [%s]", user->GetFullRealHost().c_str(), user->GetIPString().c_str(), operquitmsg.c_str());
+               local_users.erase(lu);
        }
 
-       user_hash::iterator iter = this->clientlist->find(user->nick);
-
-       if (iter != this->clientlist->end())
-               this->clientlist->erase(iter);
-       else
+       if (!clientlist.erase(user->nick))
                ServerInstance->Logs->Log("USERS", LOG_DEFAULT, "ERROR: Nick not found in clientlist, cannot remove: " + user->nick);
 
-       uuidlist->erase(user->uuid);
+       uuidlist.erase(user->uuid);
        user->PurgeEmptyChannels();
+       user->UnOper();
 }
 
-void UserManager::AddLocalClone(User *user)
-{
-       local_clones[user->GetCIDRMask()]++;
-}
-
-void UserManager::AddGlobalClone(User *user)
+void UserManager::AddClone(User* user)
 {
-       global_clones[user->GetCIDRMask()]++;
+       CloneCounts& counts = clonemap[user->GetCIDRMask()];
+       counts.global++;
+       if (IS_LOCAL(user))
+               counts.local++;
 }
 
 void UserManager::RemoveCloneCounts(User *user)
 {
-       if (IS_LOCAL(user))
+       CloneMap::iterator it = clonemap.find(user->GetCIDRMask());
+       if (it != clonemap.end())
        {
-               clonemap::iterator x = local_clones.find(user->GetCIDRMask());
-               if (x != local_clones.end())
+               CloneCounts& counts = it->second;
+               counts.global--;
+               if (counts.global == 0)
                {
-                       x->second--;
-                       if (!x->second)
-                       {
-                               local_clones.erase(x);
-                       }
+                       // No more users from this IP, remove entry from the map
+                       clonemap.erase(it);
+                       return;
                }
-       }
 
-       clonemap::iterator y = global_clones.find(user->GetCIDRMask());
-       if (y != global_clones.end())
-       {
-               y->second--;
-               if (!y->second)
-               {
-                       global_clones.erase(y);
-               }
+               if (IS_LOCAL(user))
+                       counts.local--;
        }
 }
 
-unsigned long UserManager::GlobalCloneCount(User *user)
+void UserManager::RehashCloneCounts()
 {
-       clonemap::iterator x = global_clones.find(user->GetCIDRMask());
-       if (x != global_clones.end())
-               return x->second;
-       else
-               return 0;
+       clonemap.clear();
+
+       const user_hash& hash = ServerInstance->Users.GetUsers();
+       for (user_hash::const_iterator i = hash.begin(); i != hash.end(); ++i)
+       {
+               User* u = i->second;
+               AddClone(u);
+       }
 }
 
-unsigned long UserManager::LocalCloneCount(User *user)
+const UserManager::CloneCounts& UserManager::GetCloneCounts(User* user) const
 {
-       clonemap::iterator x = local_clones.find(user->GetCIDRMask());
-       if (x != local_clones.end())
-               return x->second;
+       CloneMap::const_iterator it = clonemap.find(user->GetCIDRMask());
+       if (it != clonemap.end())
+               return it->second;
        else
-               return 0;
+               return zeroclonecounts;
 }
 
 void UserManager::ServerNoticeAll(const char* text, ...)
 {
        std::string message;
        VAFORMAT(message, text, text);
-       message = "NOTICE $" + ServerInstance->Config->ServerName + " :" + message;
-
-       for (LocalUserList::const_iterator i = local_users.begin(); i != local_users.end(); i++)
-       {
-               User* t = *i;
-               t->WriteServ(message);
-       }
-}
+       ClientProtocol::Messages::Privmsg msg(ClientProtocol::Messages::Privmsg::nocopy, ServerInstance->FakeClient, ServerInstance->Config->GetServerName(), message, MSG_NOTICE);
+       ClientProtocol::Event msgevent(ServerInstance->GetRFCEvents().privmsg, msg);
 
-void UserManager::GarbageCollect()
-{
-       // Reset the already_sent IDs so we don't wrap it around and drop a message
-       LocalUser::already_sent_id = 0;
-       for (LocalUserList::const_iterator i = this->local_users.begin(); i != this->local_users.end(); i++)
+       for (LocalList::const_iterator i = local_users.begin(); i != local_users.end(); ++i)
        {
-               (**i).already_sent = 0;
-               (**i).RemoveExpiredInvites();
+               LocalUser* user = *i;
+               user->Send(msgevent);
        }
 }
 
-/* this returns true when all modules are satisfied that the user should be allowed onto the irc server
- * (until this returns true, a user will block in the waiting state, waiting to connect up to the
- * registration timeout maximum seconds)
- */
-bool UserManager::AllModulesReportReady(LocalUser* user)
-{
-       ModResult res;
-       FIRST_MOD_RESULT(OnCheckReady, res, (user));
-       return (res == MOD_RES_PASSTHRU);
-}
-
 /**
  * This function is called once a second from the mainloop.
- * It is intended to do background checking on all the user structs, e.g.
- * stuff like ping checks, registration timeouts, etc.
+ * It is intended to do background checking on all the users, e.g. do
+ * ping checks, registration timeouts, etc.
  */
 void UserManager::DoBackgroundUserStuff()
 {
-       /*
-        * loop over all local users..
-        */
-       for (LocalUserList::iterator i = local_users.begin(); i != local_users.end(); ++i)
+       for (LocalList::iterator i = local_users.begin(); i != local_users.end(); )
        {
+               // It's possible that we quit the user below due to ping timeout etc. and QuitUser() removes it from the list
                LocalUser* curr = *i;
-
-               if (curr->quitting)
-                       continue;
+               ++i;
 
                if (curr->CommandFloodPenalty || curr->eh.getSendQSize())
                {
@@ -331,40 +405,31 @@ void UserManager::DoBackgroundUserStuff()
                switch (curr->registered)
                {
                        case REG_ALL:
-                               if (ServerInstance->Time() > curr->nping)
-                               {
-                                       // This user didn't answer the last ping, remove them
-                                       if (!curr->lastping)
-                                       {
-                                               time_t time = ServerInstance->Time() - (curr->nping - curr->MyClass->GetPingTime());
-                                               const std::string message = "Ping timeout: " + ConvToStr(time) + (time == 1 ? " seconds" : " second");
-                                               this->QuitUser(curr, message);
-                                               continue;
-                                       }
-
-                                       curr->Write("PING :" + ServerInstance->Config->ServerName);
-                                       curr->lastping = 0;
-                                       curr->nping = ServerInstance->Time() + curr->MyClass->GetPingTime();
-                               }
+                               CheckPingTimeout(curr);
                                break;
+
                        case REG_NICKUSER:
-                               if (AllModulesReportReady(curr))
-                               {
-                                       /* User has sent NICK/USER, modules are okay, DNS finished. */
-                                       curr->FullConnect();
-                                       continue;
-                               }
+                               CheckModulesReady(curr);
+                               break;
+
+                       default:
+                               CheckRegistrationTimeout(curr);
                                break;
                }
+       }
+}
 
-               if (curr->registered != REG_ALL && (ServerInstance->Time() > (curr->age + curr->MyClass->GetRegTimeout())))
+already_sent_t UserManager::NextAlreadySentId()
+{
+       if (++already_sent_id == 0)
+       {
+               // Wrapped around, reset the already_sent ids of all users
+               already_sent_id = 1;
+               for (LocalList::iterator i = local_users.begin(); i != local_users.end(); ++i)
                {
-                       /*
-                        * registration timeout -- didnt send USER/NICK/HOST
-                        * in the time specified in their connection class.
-                        */
-                       this->QuitUser(curr, "Registration timeout");
-                       continue;
+                       LocalUser* user = *i;
+                       user->already_sent = 0;
                }
        }
+       return already_sent_id;
 }