solanum-vs-hackint-and-char.../modules/m_grant.c

187 lines
4.7 KiB
C
Raw Normal View History

2016-01-12 05:52:04 +00:00
/*
* Copyright (C) 2006 Jilles Tjoelker
* Copyright (C) 2006 Stephen Bennett <spb@gentoo.org>
*/
#include "stdinc.h"
#include "modules.h"
#include "numeric.h"
#include "client.h"
#include "ircd.h"
#include "send.h"
#include "s_user.h"
#include "s_serv.h"
#include "s_conf.h"
#include "s_newconf.h"
2019-07-27 14:20:49 +00:00
#include "msgbuf.h"
2016-01-12 05:52:04 +00:00
2019-07-30 22:18:22 +00:00
static void mo_grant(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]);
static void me_grant(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]);
static int do_grant(struct Client *source_p, struct Client *target_p, const char *new_privset);
2016-01-12 05:52:04 +00:00
struct Message grant_msgtab = {
2019-07-27 14:20:49 +00:00
"GRANT", 0, 0, 0, 0,
{ mg_ignore, mg_not_oper, mg_ignore, mg_ignore, {me_grant, 3}, {mo_grant, 3}}
};
2016-01-12 05:52:04 +00:00
mapi_clist_av1 grant_clist[] = { &grant_msgtab, NULL };
2016-01-12 05:52:04 +00:00
2019-07-30 22:18:22 +00:00
static const char grant_desc[] = "Allows operators to set or remove operator privileges on other users";
2019-07-30 22:18:22 +00:00
DECLARE_MODULE_AV2(grant, NULL, NULL, grant_clist, NULL, NULL, NULL, NULL, grant_desc);
static void
2019-07-27 14:20:49 +00:00
mo_grant(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
2016-01-12 05:52:04 +00:00
{
struct Client *target_p;
2016-01-12 05:52:04 +00:00
2019-07-27 14:20:49 +00:00
if(!HasPrivilege(source_p, "oper:grant"))
2016-01-12 05:52:04 +00:00
{
sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "grant");
2019-07-30 22:18:22 +00:00
return;
2016-01-12 05:52:04 +00:00
}
target_p = find_named_person(parv[1]);
if (target_p == NULL)
2016-01-12 05:52:04 +00:00
{
sendto_one_numeric(source_p, ERR_NOSUCHNICK,
form_str(ERR_NOSUCHNICK), parv[1]);
2019-07-30 22:18:22 +00:00
return;
2016-01-12 05:52:04 +00:00
}
2016-07-27 05:40:26 +00:00
if (MyClient(target_p))
2016-01-12 05:52:04 +00:00
{
do_grant(source_p, target_p, parv[2]);
}
else
2016-01-12 05:52:04 +00:00
{
sendto_one(target_p, ":%s ENCAP %s GRANT %s %s",
get_id(source_p, target_p), target_p->servptr->name,
get_id(target_p, target_p), parv[2]);
2016-01-12 05:52:04 +00:00
}
2016-07-27 05:40:26 +00:00
}
2019-07-30 22:18:22 +00:00
static void
2019-07-27 14:20:49 +00:00
me_grant(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
2016-07-27 05:40:26 +00:00
{
struct Client *target_p;
target_p = find_person(parv[1]);
if (target_p == NULL)
2016-01-12 05:52:04 +00:00
{
sendto_one_numeric(source_p, ERR_NOSUCHNICK,
form_str(ERR_NOSUCHNICK), parv[1]);
2019-07-30 22:18:22 +00:00
return;
2016-01-12 05:52:04 +00:00
}
do_grant(source_p, target_p, parv[2]);
}
2016-07-27 05:40:26 +00:00
static int do_grant(struct Client *source_p, struct Client *target_p, const char *new_privset)
{
int dooper = 0, dodeoper = 0;
struct PrivilegeSet *privset = NULL, *old_privset = NULL;
if (!strcasecmp(new_privset, "deoper"))
{
2019-07-27 14:20:49 +00:00
if (!IsOper(target_p))
{
sendto_one_notice(source_p, ":You can't deoper someone who isn't an oper.");
return 0;
}
dodeoper = 1;
sendto_one_notice(target_p, ":%s is deopering you.", source_p->name);
sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, "%s is deopering %s.", get_oper_name(source_p), target_p->name);
}
else
2016-01-12 05:52:04 +00:00
{
if (!(privset = privilegeset_get(new_privset)))
{
sendto_one_notice(source_p, ":There is no privilege set named '%s'.", new_privset);
return 0;
}
if (privset == target_p->user->privset)
{
sendto_one_notice(source_p, ":%s already has privilege set %s.", target_p->name, target_p->user->privset->name);
return 0;
}
if (ConfigFileEntry.oper_secure_only && !IsSecureClient(target_p))
{
sendto_one_notice(source_p, ":Cannot GRANT %s, opers must be using secure connections.", target_p->name);
return 0;
}
2016-01-12 05:52:04 +00:00
}
if (!dodeoper)
2016-01-12 05:52:04 +00:00
{
2019-07-27 14:20:49 +00:00
if (!IsOper(target_p))
{
sendto_one_notice(target_p, ":%s is opering you with privilege set %s", source_p->name, privset->name);
sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, "%s is opering %s with privilege set %s", get_oper_name(source_p), target_p->name, privset->name);
dooper = 1;
}
2016-01-12 05:52:04 +00:00
else
{
sendto_one_notice(target_p, ":%s is changing your privilege set to %s", source_p->name, privset->name);
sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, "%s is changing the privilege set of %s to %s", get_oper_name(source_p), target_p->name, privset->name);
}
if (!IsOper(target_p))
{
dooper = 1;
}
2016-01-12 05:52:04 +00:00
}
if (dodeoper)
2016-01-12 05:52:04 +00:00
{
const char *modeparv[4];
modeparv[0] = modeparv[1] = target_p->name;
modeparv[2] = "-o";
modeparv[3] = NULL;
user_mode(target_p, target_p, 3, modeparv);
return 0;
2016-01-12 05:52:04 +00:00
}
if (dooper)
2016-07-27 05:40:26 +00:00
{
struct oper_conf oper = {0};
oper.name = "<grant>";
oper.privset = privset;
oper_up(target_p, &oper);
2016-01-12 05:52:04 +00:00
}
else
{
if (privset != NULL)
privilegeset_ref(privset);
if (target_p->user->privset != NULL)
old_privset = target_p->user->privset;
target_p->user->privset = privset;
if (privset != NULL)
sendto_server(NULL, NULL, CAP_TS6, NOCAPS, ":%s OPER %s %s",
use_id(target_p), target_p->user->opername, privset->name);
2016-01-12 05:52:04 +00:00
report_priv_change(target_p, old_privset, privset);
2019-07-27 14:43:33 +00:00
if (old_privset != NULL)
privilegeset_unref(old_privset);
2019-07-27 14:43:33 +00:00
const char *modeparv[4];
modeparv[0] = modeparv[1] = target_p->name;
modeparv[2] = "+";
modeparv[3] = NULL;
user_mode(target_p, target_p, 3, modeparv);
}
2016-07-27 05:40:26 +00:00
return 0;
}