Ed Kellett
2f68b6e203
Document the remaining new privs
2020-08-04 22:58:31 +01:00
Ed Kellett
d3fd88a406
Send hidden mode changes to auspex:cmodes
2020-08-04 22:58:30 +01:00
Ed Kellett
076973363a
chmode: priv checks only for local clients
2020-08-04 22:58:30 +01:00
Ed Kellett
b549e8e80d
m_stats: use oper:privs for /stats O
2020-08-04 22:58:30 +01:00
Ed Kellett
326ecd968b
m_stats: Rework privilege requirements
...
.need_oper is replaced with a generic mechanism for requiring any
privilege. need_admin remains because I think it's the least horrible
way to deal with oper:hidden_admin.
All need_oper requirements have been changed to oper:general
requirements.
2020-08-04 22:58:30 +01:00
Ed Kellett
9039ac0178
m_stats: use designated initializers
2020-08-04 22:58:30 +01:00
Ed Kellett
4a4b20955f
Add oper:dehelper
2020-08-04 22:58:30 +01:00
Ed Kellett
f510983eeb
Add oper:receive_immunity
2020-08-04 22:58:30 +01:00
Ed Kellett
458c853869
Add auspex:hostname
2020-08-04 22:58:30 +01:00
Ed Kellett
74434cf81e
Add auspex:umodes
2020-08-04 22:58:30 +01:00
Ed Kellett
cc61cadade
Add auspex:cmodes
2020-08-04 22:58:30 +01:00
Ed Kellett
58a490f9a4
Add oper:testline
2020-08-04 22:58:30 +01:00
Ed Kellett
6d5be11fb1
Add oper:privs
2020-08-04 22:58:30 +01:00
Ed Kellett
1cd6639a35
Add auspex:oper
2020-08-04 22:58:30 +01:00
Ed Kellett
80303ab70e
chm_staff: use oper:cmodes, don't check op status
2020-08-04 22:58:30 +01:00
Ed Kellett
d4f7eb4ce6
Replace most checks for +o with oper:general
...
I'm preparing to PR a succession of privs changes with the ultimate goal
of severely limiting the scope of the binary oper/user dichotomy and
move conceptually distinct oper functions into their own privs.
Accomplishing this is a non-trivial task, and can wait, but it's
inconvenient now to have such functions enabled by the same mechanism
that grants any privs at all--so I'm moving all of them to a
transitional priv with the intention of eroding that later.
2020-08-04 22:58:30 +01:00
Aaron Jones
ad7ecd5cbb
Merge pull request #352 from edk0/grant-oper-data
...
m_grant: zero-initialize struct oper_conf
2020-07-27 17:13:33 +00:00
Aaron Jones
687641237a
Merge pull request #353 from edk0/privs-strtok
...
m_privs: don't leave a damaged privset behind
2020-07-25 23:55:57 +00:00
Ed Kellett
bd8b9a37be
m_privs: don't leave a damaged privset behind
2020-07-25 23:49:52 +01:00
Ed Kellett
687ec8f766
m_grant: zero-initialize struct oper_conf
...
bug noticed by @xnrand
2020-07-16 17:59:27 +01:00
Simon Arlott
373ba193b8
Merge pull request #351 from ophion-project/upstream/sasl
...
sasl: use mapi_cap_list_v2 correctly
2020-07-12 10:28:02 +01:00
Unit 193
7372db99f2
Fix a couple typos.
...
automaticlly → automatically
completly → completely
permissable → permissible
redunant → redundant
threshhold → threshold
2020-07-11 04:51:22 +00:00
Aaron Jones
0df422f5b0
help/*/umode: update help text for +g/+G
...
cf. https://github.com/charybdis-ircd/charybdis/pull/342
[ci skip]
2020-07-11 03:43:31 +00:00
Aaron Jones
077bedc4dd
Merge pull request #342 from ophion-project/upstream/modularize-callerid
...
modularize callerid
2020-07-11 03:39:25 +00:00
Ariadne Conill
8ad8fd34f5
callerid: fix a missed instance of hardcoded +g
2020-07-10 21:25:25 -06:00
Ariadne Conill
c6e584dd1b
callerid: fix invite case
2020-07-10 18:43:31 -06:00
Ariadne Conill
ace0c8655b
callerid: align soft caller-id behavior with ircd-hybrid implementation
2020-07-10 18:18:28 -06:00
Ariadne Conill
b07445c6d9
extensions/umode_noctcp: skip privmsg_user hook except on recipient server
2020-07-10 18:08:33 -06:00
Ariadne Conill
3792c63dc0
sasl: use mapi_cap_list_v2 correctly
2020-07-09 17:47:28 -06:00
Ariadne Conill
92f5320e1d
message: run privmsg_user hook on both source and target
2020-07-09 16:06:56 -06:00
Ariadne Conill
4abf8eb2e6
callerid: actually the guard should be for source_p
2020-07-09 16:06:33 -06:00
Ariadne Conill
4841ad6197
callerid: only check the target's accept list on their own local server
2020-07-09 16:06:33 -06:00
Ariadne Conill
3ed61fba8c
callerid: use public isupport_umode
2020-07-09 16:06:33 -06:00
Ariadne Conill
8906ffd1b7
supported: make isupport_umode() public
2020-07-09 16:06:33 -06:00
Ariadne Conill
5d4cce6cc0
callerid: has_common_channels(): fix return value
2020-07-09 16:06:33 -06:00
Ariadne Conill
4d07382c2d
callerid: fix module description
2020-07-09 16:06:33 -06:00
Ariadne Conill
915bb5614b
callerid: unregister usermode +g if usermode +G cannot be allocated
2020-07-09 16:06:33 -06:00
Ariadne Conill
5419d3c286
help: document soft callerid mode
2020-07-09 16:06:33 -06:00
Ariadne Conill
c6edf65411
callerid: use hdata.error where available
2020-07-09 16:06:33 -06:00
Ariadne Conill
fdff78f891
callerid: catch find_umode_slot() failures
2020-07-09 16:06:33 -06:00
Ariadne Conill
db80763427
callerid: use invite instead of can_invite hook
2020-07-09 16:06:33 -06:00
Ariadne Conill
7b60cca0f1
callerid: implement relaxed caller id mode (+G)
2020-07-09 16:06:33 -06:00
Ariadne Conill
7106e36ed3
callerid: fix up isupport
2020-07-09 16:06:33 -06:00
Ariadne Conill
6558648dc3
callerid: don't clobber other modules
2020-07-09 16:06:33 -06:00
Ariadne Conill
921b508b1b
add callerid module
2020-07-09 16:06:33 -06:00
Ariadne Conill
303e85c59e
remove callerid definitions
2020-07-09 16:06:33 -06:00
Ariadne Conill
4a9cf86981
message: remove hardcoded +G logic
2020-07-09 16:06:33 -06:00
Ariadne Conill
98ac35197b
invite: remove hardcoded callerid logic
2020-07-09 16:06:33 -06:00
Simon Arlott
ac09f70838
Merge remote-tracking branch 'ophion/upstream/dnsbl-rename'
2020-07-09 20:53:38 +01:00
Simon Arlott
bc89b788fa
authd: Don't reveal to users how many DNSBLs are configured
2020-07-09 20:53:00 +01:00