/* clean_ban_mask: makes a proper banmask * RETURNS: pointer to correct banmask or NULL in case of error * NOTES: * - A pointer is returned to a static buffer, which is overwritten * on next clean_ban_mask or make_nick_user_host call. * - mask is fragged in some cases, this could be bad. */ char *clean_ban_mask(char *mask, int what, aClient *cptr) { char *cp; char *user; char *host; Extban *p; cp = index(mask, ' '); if (cp) *cp = '\0'; /* Strip any ':' at beginning coz that desynchs clients/banlists */ for (; (*mask && (*mask == ':')); mask++); if (!*mask) return NULL; /* Extended ban? */ if ((*mask == '~') && mask[1] && (mask[2] == ':')) { if (RESTRICT_EXTENDEDBANS && MyClient(cptr) && !IsAnOper(cptr)) { if (!strcmp(RESTRICT_EXTENDEDBANS, "*")) { sendnotice(cptr, "Setting/removing of extended bans has been disabled"); return NULL; } if (strchr(RESTRICT_EXTENDEDBANS, mask[1])) { sendnotice(cptr, "Setting/removing of extended bantypes '%s' has been disabled", RESTRICT_EXTENDEDBANS); return NULL; } } p = findmod_by_bantype(mask[1]); if (!p) { /* extended bantype not supported, what to do? * Here are the rules: * - if from a remote client/server: allow it (easy upgrading, * no desynch) * - if from a local client trying to REMOVE the extban, * allow it too (so you don't get "unremovable" extbans). */ if (!MyClient(cptr) || (what == MODE_DEL)) return mask; /* allow it */ return NULL; /* reject */ } if (p->conv_param) return p->conv_param(mask); /* else, do some basic sanity checks and cut it off at 80 bytes */ if ((cp[1] != ':') || (cp[2] == '\0')) return NULL; /* require a ":<char>" after extban type */ if (strlen(mask) > 80) mask[80] = '\0'; return mask; } if ((*mask == '~') && !strchr(mask, '@')) return NULL; /* not an extended ban and not a ~user@host ban either. */ if ((user = index((cp = mask), '!'))) *user++ = '\0'; if ((host = rindex(user ? user : cp, '@'))) { *host++ = '\0'; if (!user) return make_nick_user_host(NULL, trim_str(cp,USERLEN), trim_str(host,HOSTLEN)); } else if (!user && index(cp, '.')) return make_nick_user_host(NULL, NULL, trim_str(cp,HOSTLEN)); return make_nick_user_host(trim_str(cp,NICKLEN), trim_str(user,USERLEN), trim_str(host,HOSTLEN)); }
/** conv_param to deal with stacked extbans. */ char* extban_conv_param_nuh_or_extban(char* para) { #if (USERLEN + NICKLEN + HOSTLEN + 32) > 256 #error "wtf?" #endif static char retbuf[256]; static char printbuf[256]; char *mask; char tmpbuf[USERLEN + NICKLEN + HOSTLEN + 32]; char bantype = para[1]; char *ret = NULL; Extban *p = NULL; static int extban_recursion = 0; if (para[3] == '~' && para[4] && para[5] == ':') { /* We're dealing with a stacked extended ban. * Rules: * 1) You can only stack once, so: ~x:~y:something and not ~x:~y:~z... * 2) The first item must be an action modifier, such as ~q/~n/~j * 3) The second item may never be an action modifier, nor have the * EXTBOPT_NOSTACKCHILD flag set (for things like a textban). */ /* Rule #1. Yes the recursion check is also in extban_is_ok_nuh_extban, * but it's possible to get here without the is_ok() function ever * being called (think: non-local client). And no, don't delete it * there either. It needs to be in BOTH places. -- Syzop */ if (extban_recursion) return NULL; /* Rule #2 */ p = findmod_by_bantype(para[1]); if (p && !(p->options & EXTBOPT_ACTMODIFIER)) { /* Rule #2 violation */ return NULL; } strncpyzt(tmpbuf, para, sizeof(tmpbuf)); mask = tmpbuf + 3; /* Already did restrict-extended bans check. */ p = findmod_by_bantype(mask[1]); if (!p) { /* Handling unknown bantypes in is_ok. Assume that it's ok here. */ return para; } if ((p->options & EXTBOPT_ACTMODIFIER) || (p->options & EXTBOPT_NOSTACKCHILD)) { /* Rule #3 violation */ return NULL; } if (p->conv_param) { extban_recursion++; ret = p->conv_param(mask); extban_recursion--; if (ret) { /* * If bans are stacked, then we have to use two buffers * to prevent ircsprintf() from going into a loop. */ ircsprintf(printbuf, "~%c:%s", bantype, ret); /* Make sure our extban prefix sticks. */ memcpy(retbuf, printbuf, sizeof(retbuf)); return retbuf; } else { return NULL; /* Fail. */ } } /* I honestly don't know what the deal is with the 80 char cap in clean_ban_mask is about. So I'm leaving it out here. -- aquanight */ /* I don't know why it's 80, but I like a limit anyway. A ban of 500 characters can never be good... -- Syzop */ if (strlen(para) > 80) { strlcpy(retbuf, para, 128); return retbuf; } return para; } else { return extban_conv_param_nuh(para); } }