diff options
Diffstat (limited to 'modules/m_cap.c')
-rw-r--r-- | modules/m_cap.c | 433 |
1 files changed, 433 insertions, 0 deletions
diff --git a/modules/m_cap.c b/modules/m_cap.c new file mode 100644 index 0000000..0633da3 --- /dev/null +++ b/modules/m_cap.c @@ -0,0 +1,433 @@ +/* + * ircd-hybrid: an advanced Internet Relay Chat Daemon(ircd). + * + * Copyright (C) 2004 Kevin L. Mitchell <klmitch@mit.edu> + * Copyright (C) 2006-2012 Hybrid Development Team + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 + * USA + * + * $Id$ + */ + +/** @file + * @brief Capability negotiation commands + * @version $Id$ + */ + +#include "stdinc.h" +#include "client.h" +#include "hash.h" +#include "ircd.h" +#include "numeric.h" +#include "conf.h" +#include "s_user.h" +#include "s_serv.h" +#include "send.h" +#include "parse.h" +#include "modules.h" +#include "packet.h" +#include "irc_string.h" + + +#define CAPFL_HIDDEN 0x0001 /**< Do not advertize this capability */ +#define CAPFL_PROHIBIT 0x0002 /**< Client may not set this capability */ +#define CAPFL_PROTO 0x0004 /**< Cap must be acknowledged by client */ +#define CAPFL_STICKY 0x0008 /**< Cap may not be cleared once set */ + +typedef int (*bqcmp)(const void *, const void *); + +static struct capabilities +{ + unsigned int cap; + unsigned int flags; + const char *name; + size_t namelen; +} capab_list[] = { +#define _CAP(cap, flags, name) \ + { (cap), (flags), (name), sizeof(name) - 1 } + _CAP(CAP_MULTI_PREFIX, 0, "multi-prefix") +#undef _CAP +}; + +#define CAPAB_LIST_LEN (sizeof(capab_list) / sizeof(struct capabilities)) + +static int +capab_sort(const struct capabilities *cap1, const struct capabilities *cap2) +{ + return strcasecmp(cap1->name, cap2->name); +} + +static int +capab_search(const char *key, const struct capabilities *cap) +{ + const char *rb = cap->name; + + while (ToLower(*key) == ToLower(*rb)) /* walk equivalent part of strings */ + if (*key++ == '\0') /* hit the end, all right... */ + return 0; + else /* OK, let's move on... */ + rb++; + + /* + * If the character they differ on happens to be a space, and it happens + * to be the same length as the capability name, then we've found a + * match; otherwise, return the difference of the two. + */ + return (IsSpace(*key) && *rb == '\0') ? 0 : (ToLower(*key) - ToLower(*rb)); +} + +static struct capabilities * +find_cap(const char **caplist_p, int *neg_p) +{ + static int inited = 0; + const char *caplist = *caplist_p; + struct capabilities *cap = NULL; + + *neg_p = 0; /* clear negative flag... */ + + if (!inited) + { + /* First, let's sort the array... */ + qsort(capab_list, CAPAB_LIST_LEN, sizeof(struct capabilities), (bqcmp)capab_sort); + ++inited; + } + + /* Next, find first non-whitespace character... */ + while (*caplist && IsSpace(*caplist)) + ++caplist; + + /* We are now at the beginning of an element of the list; is it negative? */ + if (*caplist == '-') + { + ++caplist; /* yes; step past the flag... */ + *neg_p = 1; /* remember that it is negative... */ + } + + /* OK, now see if we can look up the capability... */ + if (*caplist) + { + if (!(cap = bsearch(caplist, capab_list, CAPAB_LIST_LEN, + sizeof(struct capabilities), + (bqcmp)capab_search))) + { + /* Couldn't find the capability; advance to first whitespace character */ + while (*caplist && !IsSpace(*caplist)) + ++caplist; + } + else + caplist += cap->namelen; /* advance to end of capability name */ + } + + assert(caplist != *caplist_p || !*caplist); /* we *must* advance */ + + /* move ahead in capability list string--or zero pointer if we hit end */ + *caplist_p = *caplist ? caplist : 0; + + return cap; /* and return the capability (if any) */ +} + +/** Send a CAP \a subcmd list of capability changes to \a source_p. + * If more than one line is necessary, each line before the last has + * an added "*" parameter before that line's capability list. + * @param[in] source_p Client receiving capability list. + * @param[in] set Capabilities to show as set (with ack and sticky modifiers). + * @param[in] rem Capabalities to show as removed (with no other modifier). + * @param[in] subcmd Name of capability subcommand. + */ +static int +send_caplist(struct Client *source_p, unsigned int set, + unsigned int rem, const char *subcmd) +{ + char capbuf[IRCD_BUFSIZE] = "", pfx[16]; + char cmdbuf[IRCD_BUFSIZE] = ""; + unsigned int i, loc, len, flags, pfx_len, clen; + + /* set up the buffer for the final LS message... */ + clen = snprintf(cmdbuf, sizeof(capbuf), ":%s CAP %s %s ", me.name, + source_p->name[0] ? source_p->name : "*", subcmd); + + for (i = 0, loc = 0; i < CAPAB_LIST_LEN; ++i) + { + flags = capab_list[i].flags; + + /* + * This is a little bit subtle, but just involves applying de + * Morgan's laws to the obvious check: We must display the + * capability if (and only if) it is set in \a rem or \a set, or + * if both are null and the capability is hidden. + */ + if (!(rem && (rem & capab_list[i].cap)) && + !(set && (set & capab_list[i].cap)) && + (rem || set || (flags & CAPFL_HIDDEN))) + continue; + + /* Build the prefix (space separator and any modifiers needed). */ + pfx_len = 0; + + if (loc) + pfx[pfx_len++] = ' '; + if (rem && (rem & capab_list[i].cap)) + pfx[pfx_len++] = '-'; + else + { + if (flags & CAPFL_PROTO) + pfx[pfx_len++] = '~'; + if (flags & CAPFL_STICKY) + pfx[pfx_len++] = '='; + } + + pfx[pfx_len] = '\0'; + + len = capab_list[i].namelen + pfx_len; /* how much we'd add... */ + + if (sizeof(capbuf) < (clen + loc + len + 15)) + { + /* would add too much; must flush */ + sendto_one(source_p, "%s* :%s", cmdbuf, capbuf); + capbuf[(loc = 0)] = '\0'; /* re-terminate the buffer... */ + } + + loc += snprintf(capbuf + loc, sizeof(capbuf) - loc, + "%s%s", pfx, capab_list[i].name); + } + + sendto_one(source_p, "%s:%s", cmdbuf, capbuf); + + return 0; /* convenience return */ +} + +static int +cap_ls(struct Client *source_p, const char *caplist) +{ + if (IsUnknown(source_p)) /* registration hasn't completed; suspend it... */ + source_p->localClient->registration |= REG_NEED_CAP; + + return send_caplist(source_p, 0, 0, "LS"); /* send list of capabilities */ +} + +static int +cap_req(struct Client *source_p, const char *caplist) +{ + const char *cl = caplist; + struct capabilities *cap = NULL; + unsigned int set = 0, rem = 0; + unsigned int cs = source_p->localClient->cap_client; /* capability set */ + unsigned int as = source_p->localClient->cap_active; /* active set */ + int neg = 0; + + if (IsUnknown(source_p)) /* registration hasn't completed; suspend it... */ + source_p->localClient->registration |= REG_NEED_CAP; + + while (cl) { /* walk through the capabilities list... */ + if (!(cap = find_cap(&cl, &neg)) /* look up capability... */ + || (!neg && (cap->flags & CAPFL_PROHIBIT)) /* is it prohibited? */ + || (neg && (cap->flags & CAPFL_STICKY))) { /* is it sticky? */ + sendto_one(source_p, ":%s CAP %s NAK :%s", me.name, + source_p->name[0] ? source_p->name : "*", caplist); + return 0; /* can't complete requested op... */ + } + + if (neg) + { + /* set or clear the capability... */ + rem |= cap->cap; + set &= ~cap->cap; + cs &= ~cap->cap; + + if (!(cap->flags & CAPFL_PROTO)) + as &= ~cap->cap; + } + else + { + rem &= ~cap->cap; + set |= cap->cap; + cs |= cap->cap; + + if (!(cap->flags & CAPFL_PROTO)) + as |= cap->cap; + } + } + + /* Notify client of accepted changes and copy over results. */ + send_caplist(source_p, set, rem, "ACK"); + + source_p->localClient->cap_client = cs; + source_p->localClient->cap_active = as; + + return 0; +} + +static int +cap_ack(struct Client *source_p, const char *caplist) +{ + const char *cl = caplist; + struct capabilities *cap = NULL; + int neg = 0; + + /* + * Coming from the client, this generally indicates that the client + * is using a new backwards-incompatible protocol feature. As such, + * it does not require further response from the server. + */ + while (cl) + { + /* walk through the capabilities list... */ + if (!(cap = find_cap(&cl, &neg)) || /* look up capability... */ + (neg ? (source_p->localClient->cap_active & cap->cap) : + !(source_p->localClient->cap_active & cap->cap))) /* uh... */ + continue; + + if (neg) /* set or clear the active capability... */ + source_p->localClient->cap_active &= ~cap->cap; + else + source_p->localClient->cap_active |= cap->cap; + } + + return 0; +} + +static int +cap_clear(struct Client *source_p, const char *caplist) +{ + struct capabilities *cap = NULL; + unsigned int ii; + unsigned int cleared = 0; + + for (ii = 0; ii < CAPAB_LIST_LEN; ++ii) + { + cap = &capab_list[ii]; + + /* Only clear active non-sticky capabilities. */ + if (!(source_p->localClient->cap_active & cap->cap) || (cap->flags & CAPFL_STICKY)) + continue; + + cleared |= cap->cap; + source_p->localClient->cap_client &= ~cap->cap; + + if (!(cap->flags & CAPFL_PROTO)) + source_p->localClient->cap_active &= ~cap->cap; + } + + return send_caplist(source_p, 0, cleared, "ACK"); +} + +static int +cap_end(struct Client *source_p, const char *caplist) +{ + if (!IsUnknown(source_p)) /* registration has completed... */ + return 0; /* so just ignore the message... */ + + /* capability negotiation is now done... */ + source_p->localClient->registration &= ~REG_NEED_CAP; + + /* if client is now done... */ + if (!source_p->localClient->registration) + { + register_local_user(source_p); + return 0; + } + + return 0; /* Can't do registration yet... */ +} + +static int +cap_list(struct Client *source_p, const char *caplist) +{ + /* Send the list of the client's capabilities */ + return send_caplist(source_p, source_p->localClient->cap_client, 0, "LIST"); +} + +static struct subcmd +{ + const char *cmd; + int (*proc)(struct Client *, const char *); +} cmdlist[] = { + { "ACK", cap_ack }, + { "CLEAR", cap_clear }, + { "END", cap_end }, + { "LIST", cap_list }, + { "LS", cap_ls }, + { "NAK", NULL }, + { "REQ", cap_req } +}; + +static int +subcmd_search(const char *cmd, const struct subcmd *elem) +{ + return strcasecmp(cmd, elem->cmd); +} + +/** Handle a capability request or response from a client. + * \param client_p Client that sent us the message. + * \param source_p Original source of message. + * \param parc Number of arguments. + * \param parv Argument vector. + */ +static void +m_cap(struct Client *client_p, struct Client *source_p, int parc, char *parv[]) +{ + const char *subcmd = NULL, *caplist = NULL; + struct subcmd *cmd = NULL; + + if (EmptyString(parv[1])) /* a subcommand is required */ + return; + + subcmd = parv[1]; + + if (parc > 2) /* a capability list was provided */ + caplist = parv[2]; + + /* find the subcommand handler */ + if (!(cmd = bsearch(subcmd, cmdlist, + sizeof(cmdlist) / sizeof(struct subcmd), + sizeof(struct subcmd), (bqcmp)subcmd_search))) + { + sendto_one(source_p, form_str(ERR_INVALIDCAPCMD), me.name, + source_p->name[0] ? source_p->name : "*", subcmd); + return; + } + + /* then execute it... */ + if (cmd->proc) + (cmd->proc)(source_p, caplist); +} + +static struct Message cap_msgtab = { + "CAP", 0, 0, 2, MAXPARA, MFLG_SLOW, 0, + { m_cap, m_cap, m_ignore, m_ignore, m_cap, m_ignore } +}; + +static void +module_init(void) +{ + mod_add_cmd(&cap_msgtab); +} + +static void +module_exit(void) +{ + mod_del_cmd(&cap_msgtab); +} + +struct module module_entry = { + .node = { NULL, NULL, NULL }, + .name = NULL, + .version = "$Revision$", + .handle = NULL, + .modinit = module_init, + .modexit = module_exit, + .flags = 0 +}; |