1 /*
2 * Copyright (c) 2005 William Pitcock
3 * Rights to this code are as documented in doc/LICENSE.
4 *
5 * Restrictions for nicknames.
6 *
7 */
8
9 #include "atheme.h"
10 #include "list_common.h"
11 #include "list.h"
12
13 DECLARE_MODULE_V1
14 (
15 "nickserv/restrict", false, _modinit, _moddeinit,
16 PACKAGE_STRING,
17 VENDOR_STRING
18 );
19
20 static void ns_cmd_restrict(sourceinfo_t *si, int parc, char *parv[]);
21
22 command_t ns_restrict = { "RESTRICT", N_("Restrict a user from using certain commands."), PRIV_MARK, 3, ns_cmd_restrict, { .path = "nickserv/restrict" } };
23
is_restricted(const mynick_t * mn,const void * arg)24 static bool is_restricted(const mynick_t *mn, const void *arg) {
25 myuser_t *mu = mn->owner;
26
27 return !!metadata_find(mu, "private:restrict:setter");
28 }
29
restricted_match(const mynick_t * mn,const void * arg)30 static bool restricted_match(const mynick_t *mn, const void *arg) {
31 const char *restrictedpattern = (const char*)arg;
32 metadata_t *mdrestricted;
33
34 myuser_t *mu = mn->owner;
35
36 mdrestricted = metadata_find(mu, "private:restrict:reason");
37
38 if (mdrestricted != NULL && !match(restrictedpattern, mdrestricted->value))
39 return true;
40
41 return false;
42 }
43
info_hook(hook_user_req_t * hdata)44 static void info_hook(hook_user_req_t *hdata)
45 {
46 metadata_t *md;
47
48 if (has_priv(hdata->si, PRIV_USER_AUSPEX) && (md = metadata_find(hdata->mu, "private:restrict:setter")))
49 {
50 const char *setter = md->value;
51 const char *reason;
52 time_t ts;
53 struct tm tm;
54 char strfbuf[BUFSIZE];
55
56 md = metadata_find(hdata->mu, "private:restrict:reason");
57 reason = md != NULL ? md->value : "unknown";
58
59 md = metadata_find(hdata->mu, "private:restrict:timestamp");
60 ts = md != NULL ? atoi(md->value) : 0;
61
62 tm = *localtime(&ts);
63 strftime(strfbuf, sizeof strfbuf, TIME_FORMAT, &tm);
64
65 command_success_nodata(hdata->si, _("%s was \2RESTRICTED\2 by %s on %s (%s)"), entity(hdata->mu)->name, setter, strfbuf, reason);
66 }
67 }
68
_modinit(module_t * m)69 void _modinit(module_t *m)
70 {
71 service_named_bind_command("nickserv", &ns_restrict);
72
73 hook_add_event("user_info");
74 hook_add_user_info(info_hook);
75
76 use_nslist_main_symbols(m);
77
78 static list_param_t restricted;
79 restricted.opttype = OPT_BOOL;
80 restricted.is_match = is_restricted;
81
82 static list_param_t restrict_match;
83 restrict_match.opttype = OPT_STRING;
84 restrict_match.is_match = restricted_match;
85
86 list_register("restricted", &restricted);
87 list_register("restricted-reason", &restrict_match);
88 }
89
_moddeinit(module_unload_intent_t intent)90 void _moddeinit(module_unload_intent_t intent)
91 {
92 service_named_unbind_command("nickserv", &ns_restrict);
93
94 hook_del_user_info(info_hook);
95
96 list_unregister("restricted");
97 list_unregister("restricted-reason");
98 }
99
ns_cmd_restrict(sourceinfo_t * si,int parc,char * parv[])100 static void ns_cmd_restrict(sourceinfo_t *si, int parc, char *parv[])
101 {
102 char *target = parv[0];
103 char *action = parv[1];
104 char *info = parv[2];
105 myuser_t *mu;
106
107 if (!target || !action)
108 {
109 command_fail(si, fault_needmoreparams, STR_INSUFFICIENT_PARAMS, "RESTRICT");
110 command_fail(si, fault_needmoreparams, _("Usage: RESTRICT <target> <ON|OFF> [note]"));
111 return;
112 }
113
114 if (!(mu = myuser_find_ext(target)))
115 {
116 command_fail(si, fault_nosuch_target, _("\2%s\2 is not registered."), target);
117 return;
118 }
119
120 if (!strcasecmp(action, "ON"))
121 {
122 if (!info)
123 {
124 command_fail(si, fault_needmoreparams, STR_INSUFFICIENT_PARAMS, "RESTRICT");
125 command_fail(si, fault_needmoreparams, _("Usage: RESTRICT <target> ON <note>"));
126 return;
127 }
128
129 if (metadata_find(mu, "private:restrict:setter"))
130 {
131 command_fail(si, fault_badparams, _("\2%s\2 is already restricted."), entity(mu)->name);
132 return;
133 }
134
135 metadata_add(mu, "private:restrict:setter", get_oper_name(si));
136 metadata_add(mu, "private:restrict:reason", info);
137 metadata_add(mu, "private:restrict:timestamp", number_to_string(time(NULL)));
138
139 wallops("%s restricted the account \2%s\2.", get_oper_name(si), entity(mu)->name);
140 logcommand(si, CMDLOG_ADMIN, "RESTRICT:ON: \2%s\2 (reason: \2%s\2)", entity(mu)->name, info);
141 command_success_nodata(si, _("\2%s\2 is now restricted."), entity(mu)->name);
142 }
143 else if (!strcasecmp(action, "OFF"))
144 {
145 if (!metadata_find(mu, "private:restrict:setter"))
146 {
147 command_fail(si, fault_badparams, _("\2%s\2 is not restricted."), entity(mu)->name);
148 return;
149 }
150
151 metadata_delete(mu, "private:restrict:setter");
152 metadata_delete(mu, "private:restrict:reason");
153 metadata_delete(mu, "private:restrict:timestamp");
154
155 wallops("%s unrestricted the account \2%s\2.", get_oper_name(si), entity(mu)->name);
156 logcommand(si, CMDLOG_ADMIN, "RESTRICT:OFF: \2%s\2", entity(mu)->name);
157 command_success_nodata(si, _("\2%s\2 is now unrestricted."), entity(mu)->name);
158 }
159 else
160 {
161 command_fail(si, fault_needmoreparams, STR_INVALID_PARAMS, "RESTRICT");
162 command_fail(si, fault_needmoreparams, _("Usage: RESTRICT <target> <ON|OFF> [note]"));
163 }
164 }
165
166 /* vim:cinoptions=>s,e0,n0,f0,{0,}0,^0,=s,ps,t0,c3,+s,(2s,us,)20,*30,gs,hs
167 * vim:ts=8
168 * vim:sw=8
169 * vim:noexpandtab
170 */
171