summaryrefslogtreecommitdiff
path: root/modules/chanserv/cs_access.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'modules/chanserv/cs_access.cpp')
-rw-r--r--modules/chanserv/cs_access.cpp930
1 files changed, 930 insertions, 0 deletions
diff --git a/modules/chanserv/cs_access.cpp b/modules/chanserv/cs_access.cpp
new file mode 100644
index 000000000..4c3981a5e
--- /dev/null
+++ b/modules/chanserv/cs_access.cpp
@@ -0,0 +1,930 @@
+/* ChanServ core functions
+ *
+ * (C) 2003-2024 Anope Team
+ * Contact us at team@anope.org
+ *
+ * Please read COPYING and README for further details.
+ *
+ * Based on the original code of Epona by Lara.
+ * Based on the original code of Services by Andy Church.
+ */
+
+#include "module.h"
+
+static std::map<Anope::string, int16_t, ci::less> defaultLevels;
+
+static inline void reset_levels(ChannelInfo *ci)
+{
+ ci->ClearLevels();
+ for (auto &[priv, level] : defaultLevels)
+ ci->SetLevel(priv, level);
+}
+
+class AccessChanAccess final
+ : public ChanAccess
+{
+public:
+ int level = 0;
+
+ AccessChanAccess(AccessProvider *p) : ChanAccess(p)
+ {
+ }
+
+ bool HasPriv(const Anope::string &name) const override
+ {
+ return this->ci->GetLevel(name) != ACCESS_INVALID && this->level >= this->ci->GetLevel(name);
+ }
+
+ Anope::string AccessSerialize() const override
+ {
+ return Anope::ToString(this->level);
+ }
+
+ void AccessUnserialize(const Anope::string &data) override
+ {
+ if (auto l = Anope::TryConvert<int>(data))
+ this->level = l.value();
+ }
+
+ bool operator>(const ChanAccess &other) const override
+ {
+ if (this->provider != other.provider)
+ return ChanAccess::operator>(other);
+ else
+ return this->level > anope_dynamic_static_cast<const AccessChanAccess *>(&other)->level;
+ }
+
+ bool operator<(const ChanAccess &other) const override
+ {
+ if (this->provider != other.provider)
+ return ChanAccess::operator<(other);
+ else
+ return this->level < anope_dynamic_static_cast<const AccessChanAccess *>(&other)->level;
+ }
+};
+
+class AccessAccessProvider final
+ : public AccessProvider
+{
+public:
+ static AccessAccessProvider *me;
+
+ AccessAccessProvider(Module *o) : AccessProvider(o, "access/access")
+ {
+ me = this;
+ }
+
+ ChanAccess *Create() override
+ {
+ return new AccessChanAccess(this);
+ }
+};
+AccessAccessProvider *AccessAccessProvider::me;
+
+class CommandCSAccess final
+ : public Command
+{
+ void DoAdd(CommandSource &source, ChannelInfo *ci, const std::vector<Anope::string> &params)
+ {
+ Anope::string mask = params[2];
+ Privilege *p = NULL;
+ int level = ACCESS_INVALID;
+
+ if (auto lvl = Anope::TryConvert<int>(params[3]))
+ level = lvl.value();
+ else
+ {
+ p = PrivilegeManager::FindPrivilege(params[3]);
+ if (p != NULL && defaultLevels[p->name])
+ level = defaultLevels[p->name];
+ }
+
+ if (!level)
+ {
+ source.Reply(_("Access level must be non-zero."));
+ return;
+ }
+ else if (level <= ACCESS_INVALID || level >= ACCESS_FOUNDER)
+ {
+ source.Reply(CHAN_ACCESS_LEVEL_RANGE, ACCESS_INVALID + 1, ACCESS_FOUNDER - 1);
+ return;
+ }
+
+ AccessGroup u_access = source.AccessFor(ci);
+ const ChanAccess *highest = u_access.Highest();
+
+ AccessChanAccess tmp_access(AccessAccessProvider::me);
+ tmp_access.ci = ci;
+ tmp_access.level = level;
+
+ bool override = false;
+ const NickAlias *na = NULL;
+
+ if ((!highest || *highest <= tmp_access) && !u_access.founder)
+ {
+ if (source.HasPriv("chanserv/access/modify"))
+ override = true;
+ else
+ {
+ source.Reply(ACCESS_DENIED);
+ return;
+ }
+ }
+
+ if (IRCD->IsChannelValid(mask))
+ {
+ if (Config->GetModule("chanserv")->Get<bool>("disallow_channel_access"))
+ {
+ source.Reply(_("Channels may not be on access lists."));
+ return;
+ }
+
+ ChannelInfo *targ_ci = ChannelInfo::Find(mask);
+ if (targ_ci == NULL)
+ {
+ source.Reply(CHAN_X_NOT_REGISTERED, mask.c_str());
+ return;
+ }
+ else if (ci == targ_ci)
+ {
+ source.Reply(_("You can't add a channel to its own access list."));
+ return;
+ }
+
+ mask = targ_ci->name;
+ }
+ else
+ {
+ na = NickAlias::Find(mask);
+
+ if (!na && Config->GetModule("chanserv")->Get<bool>("disallow_hostmask_access"))
+ {
+ source.Reply(_("Masks and unregistered users may not be on access lists."));
+ return;
+ }
+ else if (na && na->nc->HasExt("NEVEROP"))
+ {
+ source.Reply(_("\002%s\002 does not wish to be added to channel access lists."),
+ na->nc->display.c_str());
+ return;
+ }
+ else if (mask.find_first_of("!*@") == Anope::string::npos && !na)
+ {
+ User *targ = User::Find(mask, true);
+ if (targ != NULL)
+ mask = "*!*@" + targ->GetDisplayedHost();
+ else
+ {
+ source.Reply(NICK_X_NOT_REGISTERED, mask.c_str());
+ return;
+ }
+ }
+
+ if (na)
+ mask = na->nick;
+ }
+
+ for (unsigned i = ci->GetAccessCount(); i > 0; --i)
+ {
+ const ChanAccess *access = ci->GetAccess(i - 1);
+ if ((na && na->nc == access->GetAccount()) || mask.equals_ci(access->Mask()))
+ {
+ /* Don't allow lowering from a level >= u_level */
+ if ((!highest || *access >= *highest) && !u_access.founder && !source.HasPriv("chanserv/access/modify"))
+ {
+ source.Reply(ACCESS_DENIED);
+ return;
+ }
+ delete ci->EraseAccess(i - 1);
+ break;
+ }
+ }
+
+ unsigned access_max = Config->GetModule("chanserv")->Get<unsigned>("accessmax", "1000");
+ if (access_max && ci->GetDeepAccessCount() >= access_max)
+ {
+ source.Reply(_("Sorry, you can only have %d access entries on a channel, including access entries from other channels."), access_max);
+ return;
+ }
+
+ ServiceReference<AccessProvider> provider("AccessProvider", "access/access");
+ if (!provider)
+ return;
+ AccessChanAccess *access = anope_dynamic_static_cast<AccessChanAccess *>(provider->Create());
+ access->SetMask(mask, ci);
+ access->creator = source.GetNick();
+ access->level = level;
+ access->last_seen = 0;
+ access->created = Anope::CurTime;
+ access->description = params.size() > 4 ? params[4] : "";
+ ci->AddAccess(access);
+
+ FOREACH_MOD(OnAccessAdd, (ci, source, access));
+
+ Log(override ? LOG_OVERRIDE : LOG_COMMAND, source, this, ci) << "to add " << mask << " with level " << level;
+ if (p != NULL)
+ source.Reply(_("\002%s\002 added to %s access list at privilege %s (level %d)"), access->Mask().c_str(), ci->name.c_str(), p->name.c_str(), level);
+ else
+ source.Reply(_("\002%s\002 added to %s access list at level \002%d\002."), access->Mask().c_str(), ci->name.c_str(), level);
+ }
+
+ void DoDel(CommandSource &source, ChannelInfo *ci, const std::vector<Anope::string> &params)
+ {
+ Anope::string mask = params[2];
+
+ const NickAlias *na = NickAlias::Find(mask);
+ if (na && na->nc)
+ {
+ mask = na->nc->display;
+ }
+ else if (!isdigit(mask[0]) && mask.find_first_of("#!*@") == Anope::string::npos)
+ {
+ User *targ = User::Find(mask, true);
+ if (targ != NULL)
+ mask = "*!*@" + targ->GetDisplayedHost();
+ else
+ {
+ source.Reply(NICK_X_NOT_REGISTERED, mask.c_str());
+ return;
+ }
+ }
+
+ if (!ci->GetAccessCount())
+ source.Reply(_("%s access list is empty."), ci->name.c_str());
+ else if (isdigit(mask[0]) && mask.find_first_not_of("1234567890,-") == Anope::string::npos)
+ {
+ class AccessDelCallback final
+ : public NumberList
+ {
+ CommandSource &source;
+ ChannelInfo *ci;
+ Command *c;
+ unsigned deleted = 0;
+ Anope::string Nicks;
+ bool denied = false;
+ bool override = false;
+ public:
+ AccessDelCallback(CommandSource &_source, ChannelInfo *_ci, Command *_c, const Anope::string &numlist) : NumberList(numlist, true), source(_source), ci(_ci), c(_c)
+ {
+ if (!source.AccessFor(ci).HasPriv("ACCESS_CHANGE") && source.HasPriv("chanserv/access/modify"))
+ this->override = true;
+ }
+
+ ~AccessDelCallback() override
+ {
+ if (denied && !deleted)
+ source.Reply(ACCESS_DENIED);
+ else if (!deleted)
+ source.Reply(_("No matching entries on %s access list."), ci->name.c_str());
+ else
+ {
+ Log(override ? LOG_OVERRIDE : LOG_COMMAND, source, c, ci) << "to delete " << Nicks;
+
+ if (deleted == 1)
+ source.Reply(_("Deleted 1 entry from %s access list."), ci->name.c_str());
+ else
+ source.Reply(_("Deleted %d entries from %s access list."), deleted, ci->name.c_str());
+ }
+ }
+
+ void HandleNumber(unsigned Number) override
+ {
+ if (!Number || Number > ci->GetAccessCount())
+ return;
+
+ ChanAccess *access = ci->GetAccess(Number - 1);
+
+ AccessGroup ag = source.AccessFor(ci);
+ const ChanAccess *u_highest = ag.Highest();
+
+ if ((!u_highest || *u_highest <= *access) && !ag.founder && !this->override && access->GetAccount() != source.nc)
+ {
+ denied = true;
+ return;
+ }
+
+ ++deleted;
+ if (!Nicks.empty())
+ Nicks += ", " + access->Mask();
+ else
+ Nicks = access->Mask();
+
+ ci->EraseAccess(Number - 1);
+
+ FOREACH_MOD(OnAccessDel, (ci, source, access));
+ delete access;
+ }
+ }
+ delcallback(source, ci, this, mask);
+ delcallback.Process();
+ }
+ else
+ {
+ AccessGroup u_access = source.AccessFor(ci);
+ const ChanAccess *highest = u_access.Highest();
+
+ for (unsigned i = ci->GetAccessCount(); i > 0; --i)
+ {
+ ChanAccess *access = ci->GetAccess(i - 1);
+ if (mask.equals_ci(access->Mask()))
+ {
+ if (access->GetAccount() != source.nc && !u_access.founder && (!highest || *highest <= *access) && !source.HasPriv("chanserv/access/modify"))
+ source.Reply(ACCESS_DENIED);
+ else
+ {
+ source.Reply(_("\002%s\002 deleted from %s access list."), access->Mask().c_str(), ci->name.c_str());
+ bool override = !u_access.founder && !u_access.HasPriv("ACCESS_CHANGE") && access->GetAccount() != source.nc;
+ Log(override ? LOG_OVERRIDE : LOG_COMMAND, source, this, ci) << "to delete " << access->Mask();
+
+ ci->EraseAccess(i - 1);
+ FOREACH_MOD(OnAccessDel, (ci, source, access));
+ delete access;
+ }
+ return;
+ }
+ }
+
+ source.Reply(_("\002%s\002 not found on %s access list."), mask.c_str(), ci->name.c_str());
+ }
+
+ return;
+ }
+
+ void ProcessList(CommandSource &source, ChannelInfo *ci, const std::vector<Anope::string> &params, ListFormatter &list)
+ {
+ const Anope::string &nick = params.size() > 2 ? params[2] : "";
+
+ if (!ci->GetAccessCount())
+ source.Reply(_("%s access list is empty."), ci->name.c_str());
+ else if (!nick.empty() && nick.find_first_not_of("1234567890,-") == Anope::string::npos)
+ {
+ class AccessListCallback final
+ : public NumberList
+ {
+ ListFormatter &list;
+ ChannelInfo *ci;
+
+ public:
+ AccessListCallback(ListFormatter &_list, ChannelInfo *_ci, const Anope::string &numlist) : NumberList(numlist, false), list(_list), ci(_ci)
+ {
+ }
+
+ void HandleNumber(unsigned number) override
+ {
+ if (!number || number > ci->GetAccessCount())
+ return;
+
+ const ChanAccess *access = ci->GetAccess(number - 1);
+
+ Anope::string timebuf;
+ if (ci->c)
+ {
+ for (const auto &[_, cuc] : ci->c->users)
+ {
+ ChannelInfo *p;
+ if (access->Matches(cuc->user, cuc->user->Account(), p))
+ timebuf = "Now";
+ }
+ }
+ if (timebuf.empty())
+ {
+ if (access->last_seen == 0)
+ timebuf = "Never";
+ else
+ timebuf = Anope::strftime(access->last_seen, NULL, true);
+ }
+
+ ListFormatter::ListEntry entry;
+ entry["Number"] = Anope::ToString(number);
+ entry["Level"] = access->AccessSerialize();
+ entry["Mask"] = access->Mask();
+ entry["By"] = access->creator;
+ entry["Last seen"] = timebuf;
+ entry["Description"] = access->description;
+ this->list.AddEntry(entry);
+ }
+ }
+ nl_list(list, ci, nick);
+ nl_list.Process();
+ }
+ else
+ {
+ for (unsigned i = 0, end = ci->GetAccessCount(); i < end; ++i)
+ {
+ const ChanAccess *access = ci->GetAccess(i);
+
+ if (!nick.empty() && !Anope::Match(access->Mask(), nick))
+ continue;
+
+ Anope::string timebuf;
+ if (ci->c)
+ {
+ for (auto &[_, cuc] : ci->c->users)
+ {
+ ChannelInfo *p;
+ if (access->Matches(cuc->user, cuc->user->Account(), p))
+ timebuf = "Now";
+ }
+ }
+ if (timebuf.empty())
+ {
+ if (access->last_seen == 0)
+ timebuf = "Never";
+ else
+ timebuf = Anope::strftime(access->last_seen, NULL, true);
+ }
+
+ ListFormatter::ListEntry entry;
+ entry["Number"] = Anope::ToString(i + 1);
+ entry["Level"] = access->AccessSerialize();
+ entry["Mask"] = access->Mask();
+ entry["By"] = access->creator;
+ entry["Last seen"] = timebuf;
+ entry["Description"] = access->description;
+ list.AddEntry(entry);
+ }
+ }
+
+ if (list.IsEmpty())
+ source.Reply(_("No matching entries on %s access list."), ci->name.c_str());
+ else
+ {
+ std::vector<Anope::string> replies;
+ list.Process(replies);
+
+ source.Reply(_("Access list for %s:"), ci->name.c_str());
+
+ for (const auto &reply : replies)
+ source.Reply(reply);
+
+ source.Reply(_("End of access list"));
+ }
+
+ return;
+ }
+
+ void DoList(CommandSource &source, ChannelInfo *ci, const std::vector<Anope::string> &params)
+ {
+ if (!ci->GetAccessCount())
+ {
+ source.Reply(_("%s access list is empty."), ci->name.c_str());
+ return;
+ }
+
+ ListFormatter list(source.GetAccount());
+ list.AddColumn(_("Number")).AddColumn(_("Level")).AddColumn(_("Mask")).AddColumn(_("Description"));
+ this->ProcessList(source, ci, params, list);
+ }
+
+ void DoView(CommandSource &source, ChannelInfo *ci, const std::vector<Anope::string> &params)
+ {
+ if (!ci->GetAccessCount())
+ {
+ source.Reply(_("%s access list is empty."), ci->name.c_str());
+ return;
+ }
+
+ ListFormatter list(source.GetAccount());
+ list.AddColumn(_("Number")).AddColumn(_("Level")).AddColumn(_("Mask")).AddColumn(_("By")).AddColumn(_("Last seen")).AddColumn(_("Description"));
+ this->ProcessList(source, ci, params, list);
+ }
+
+ void DoClear(CommandSource &source, ChannelInfo *ci)
+ {
+ if (!source.IsFounder(ci) && !source.HasPriv("chanserv/access/modify"))
+ source.Reply(ACCESS_DENIED);
+ else
+ {
+ FOREACH_MOD(OnAccessClear, (ci, source));
+
+ ci->ClearAccess();
+
+ source.Reply(_("Channel %s access list has been cleared."), ci->name.c_str());
+
+ bool override = !source.IsFounder(ci);
+ Log(override ? LOG_OVERRIDE : LOG_COMMAND, source, this, ci) << "to clear the access list";
+ }
+
+ return;
+ }
+
+public:
+ CommandCSAccess(Module *creator) : Command(creator, "chanserv/access", 2, 5)
+ {
+ this->SetDesc(_("Modify the list of privileged users"));
+ this->SetSyntax(_("\037channel\037 ADD \037mask\037 \037level\037 [\037description\037]"));
+ this->SetSyntax(_("\037channel\037 DEL {\037mask\037 | \037entry-num\037 | \037list\037}"));
+ this->SetSyntax(_("\037channel\037 LIST [\037mask\037 | \037list\037]"));
+ this->SetSyntax(_("\037channel\037 VIEW [\037mask\037 | \037list\037]"));
+ this->SetSyntax(_("\037channel\037 CLEAR"));
+ }
+
+ void Execute(CommandSource &source, const std::vector<Anope::string> &params) override
+ {
+ const Anope::string &cmd = params[1];
+ const Anope::string &nick = params.size() > 2 ? params[2] : "";
+ const Anope::string &s = params.size() > 3 ? params[3] : "";
+
+ ChannelInfo *ci = ChannelInfo::Find(params[0]);
+ if (ci == NULL)
+ {
+ source.Reply(CHAN_X_NOT_REGISTERED, params[0].c_str());
+ return;
+ }
+
+ bool is_list = cmd.equals_ci("LIST") || cmd.equals_ci("VIEW");
+ bool is_clear = cmd.equals_ci("CLEAR");
+ bool is_del = cmd.equals_ci("DEL");
+
+ bool has_access = false;
+ if (source.HasPriv("chanserv/access/modify"))
+ has_access = true;
+ else if (is_list && source.HasPriv("chanserv/access/list"))
+ has_access = true;
+ else if (is_list && source.AccessFor(ci).HasPriv("ACCESS_LIST"))
+ has_access = true;
+ else if (source.AccessFor(ci).HasPriv("ACCESS_CHANGE"))
+ has_access = true;
+ else if (is_del)
+ {
+ const NickAlias *na = NickAlias::Find(nick);
+ if (na && na->nc == source.GetAccount())
+ has_access = true;
+ }
+
+ /* If LIST, we don't *require* any parameters, but we can take any.
+ * If DEL, we require a nick and no level.
+ * Else (ADD), we require a level (which implies a nick). */
+ if (is_list || is_clear ? 0 : (cmd.equals_ci("DEL") ? (nick.empty() || !s.empty()) : s.empty()))
+ this->OnSyntaxError(source, cmd);
+ else if (!has_access)
+ source.Reply(ACCESS_DENIED);
+ else if (Anope::ReadOnly && !is_list)
+ source.Reply(READ_ONLY_MODE);
+ else if (cmd.equals_ci("ADD"))
+ this->DoAdd(source, ci, params);
+ else if (cmd.equals_ci("DEL"))
+ this->DoDel(source, ci, params);
+ else if (cmd.equals_ci("LIST"))
+ this->DoList(source, ci, params);
+ else if (cmd.equals_ci("VIEW"))
+ this->DoView(source, ci, params);
+ else if (cmd.equals_ci("CLEAR"))
+ this->DoClear(source, ci);
+ else
+ this->OnSyntaxError(source, "");
+
+ return;
+ }
+
+ bool OnHelp(CommandSource &source, const Anope::string &subcommand) override
+ {
+ this->SendSyntax(source);
+ source.Reply(" ");
+ source.Reply(_("Maintains the \002access list\002 for a channel. The access\n"
+ "list specifies which users are allowed chanop status or\n"
+ "access to %s commands on the channel. Different\n"
+ "user levels allow for access to different subsets of\n"
+ "privileges. Any registered user not on the access list has\n"
+ "a user level of 0, and any unregistered user has a user level\n"
+ "of -1."), source.service->nick.c_str());
+ source.Reply(" ");
+ source.Reply(_("The \002ACCESS ADD\002 command adds the given mask to the\n"
+ "access list with the given user level; if the mask is\n"
+ "already present on the list, its access level is changed to\n"
+ "the level specified in the command. The \037level\037 specified\n"
+ "may be a numerical level or the name of a privilege (eg AUTOOP).\n"
+ "When a user joins the channel the access they receive is from the\n"
+ "highest level entry in the access list."));
+ if (!Config->GetModule("chanserv")->Get<bool>("disallow_channel_access"))
+ source.Reply(_("The given mask may also be a channel, which will use the\n"
+ "access list from the other channel up to the given \037level\037."));
+ source.Reply(" ");
+ source.Reply(_("The \002ACCESS DEL\002 command removes the given nick from the\n"
+ "access list. If a list of entry numbers is given, those\n"
+ "entries are deleted. (See the example for LIST below.)\n"
+ "You may remove yourself from an access list, even if you\n"
+ "do not have access to modify that list otherwise."));
+ source.Reply(" ");
+ source.Reply(_("The \002ACCESS LIST\002 command displays the access list. If\n"
+ "a wildcard mask is given, only those entries matching the\n"
+ "mask are displayed. If a list of entry numbers is given,\n"
+ "only those entries are shown; for example:\n"
+ " \002ACCESS #channel LIST 2-5,7-9\002\n"
+ " Lists access entries numbered 2 through 5 and\n"
+ " 7 through 9.\n"
+ " \n"
+ "The \002ACCESS VIEW\002 command displays the access list similar\n"
+ "to \002ACCESS LIST\002 but shows the creator and last used time.\n"
+ " \n"
+ "The \002ACCESS CLEAR\002 command clears all entries of the\n"
+ "access list."));
+ source.Reply(" ");
+
+ BotInfo *bi;
+ Anope::string cmd;
+ if (Command::FindCommandFromService("chanserv/levels", bi, cmd))
+ source.Reply(_("\002User access levels\002 can be seen by using the\n"
+ "\002%s\002 command; type \002%s%s HELP LEVELS\002 for\n"
+ "information."), cmd.c_str(), Config->StrictPrivmsg.c_str(), bi->nick.c_str());
+ return true;
+ }
+};
+
+class CommandCSLevels final
+ : public Command
+{
+ void DoSet(CommandSource &source, ChannelInfo *ci, const std::vector<Anope::string> &params)
+ {
+ const Anope::string &what = params[2];
+ const Anope::string &lev = params[3];
+
+ int level;
+
+ if (lev.equals_ci("FOUNDER"))
+ level = ACCESS_FOUNDER;
+ else
+ {
+ if (auto lvl = Anope::TryConvert<int>(lev))
+ level = lvl.value();
+ else
+ {
+ this->OnSyntaxError(source, "SET");
+ return;
+ }
+ }
+
+ if (level <= ACCESS_INVALID || level > ACCESS_FOUNDER)
+ source.Reply(_("Level must be between %d and %d inclusive."), ACCESS_INVALID + 1, ACCESS_FOUNDER - 1);
+ else
+ {
+ Privilege *p = PrivilegeManager::FindPrivilege(what);
+ if (p == NULL)
+ source.Reply(_("Setting \002%s\002 not known. Type \002%s%s HELP LEVELS\002 for a list of valid settings."), what.c_str(), Config->StrictPrivmsg.c_str(), source.service->nick.c_str());
+ else
+ {
+ bool override = !source.AccessFor(ci).HasPriv("FOUNDER");
+ Log(override ? LOG_OVERRIDE : LOG_COMMAND, source, this, ci) << "to set " << p->name << " to level " << level;
+
+ ci->SetLevel(p->name, level);
+ FOREACH_MOD(OnLevelChange, (source, ci, p->name, level));
+
+ if (level == ACCESS_FOUNDER)
+ source.Reply(_("Level for %s on channel %s changed to founder only."), p->name.c_str(), ci->name.c_str());
+ else
+ source.Reply(_("Level for \002%s\002 on channel %s changed to \002%d\002."), p->name.c_str(), ci->name.c_str(), level);
+ }
+ }
+ }
+
+ void DoDisable(CommandSource &source, ChannelInfo *ci, const std::vector<Anope::string> &params)
+ {
+ const Anope::string &what = params[2];
+
+ /* Don't allow disabling of the founder level. It would be hard to change it back if you don't have access to use this command */
+ if (what.equals_ci("FOUNDER"))
+ {
+ source.Reply(_("You can not disable the founder privilege because it would be impossible to re-enable it at a later time."));
+ return;
+ }
+
+ Privilege *p = PrivilegeManager::FindPrivilege(what);
+ if (p != NULL)
+ {
+ bool override = !source.AccessFor(ci).HasPriv("FOUNDER");
+ Log(override ? LOG_OVERRIDE : LOG_COMMAND, source, this, ci) << "to disable " << p->name;
+
+ ci->SetLevel(p->name, ACCESS_INVALID);
+ FOREACH_MOD(OnLevelChange, (source, ci, p->name, ACCESS_INVALID));
+
+ source.Reply(_("\002%s\002 disabled on channel %s."), p->name.c_str(), ci->name.c_str());
+ return;
+ }
+
+ source.Reply(_("Setting \002%s\002 not known. Type \002%s%s HELP LEVELS\002 for a list of valid settings."), what.c_str(), Config->StrictPrivmsg.c_str(), source.service->nick.c_str());
+ }
+
+ static void DoList(CommandSource &source, ChannelInfo *ci)
+ {
+ source.Reply(_("Access level settings for channel %s:"), ci->name.c_str());
+
+ ListFormatter list(source.GetAccount());
+ list.AddColumn(_("Name")).AddColumn(_("Level"));
+
+ const std::vector<Privilege> &privs = PrivilegeManager::GetPrivileges();
+
+ for (const auto &p : privs)
+ {
+ int16_t j = ci->GetLevel(p.name);
+
+ ListFormatter::ListEntry entry;
+ entry["Name"] = p.name;
+
+ if (j == ACCESS_INVALID)
+ entry["Level"] = Language::Translate(source.GetAccount(), _("(disabled)"));
+ else if (j == ACCESS_FOUNDER)
+ entry["Level"] = Language::Translate(source.GetAccount(), _("(founder only)"));
+ else
+ entry["Level"] = Anope::ToString(j);
+
+ list.AddEntry(entry);
+ }
+
+ std::vector<Anope::string> replies;
+ list.Process(replies);
+
+ for (const auto &reply : replies)
+ source.Reply(reply);
+ }
+
+ void DoReset(CommandSource &source, ChannelInfo *ci)
+ {
+ bool override = !source.AccessFor(ci).HasPriv("FOUNDER");
+ Log(override ? LOG_OVERRIDE : LOG_COMMAND, source, this, ci) << "to reset all levels";
+
+ reset_levels(ci);
+ FOREACH_MOD(OnLevelChange, (source, ci, "ALL", 0));
+
+ source.Reply(_("Access levels for \002%s\002 reset to defaults."), ci->name.c_str());
+ return;
+ }
+
+public:
+ CommandCSLevels(Module *creator) : Command(creator, "chanserv/levels", 2, 4)
+ {
+ this->SetDesc(_("Redefine the meanings of access levels"));
+ this->SetSyntax(_("\037channel\037 SET \037type\037 \037level\037"));
+ this->SetSyntax(_("\037channel\037 {DIS | DISABLE} \037type\037"));
+ this->SetSyntax(_("\037channel\037 LIST"));
+ this->SetSyntax(_("\037channel\037 RESET"));
+ }
+
+ void Execute(CommandSource &source, const std::vector<Anope::string> &params) override
+ {
+ const Anope::string &cmd = params[1];
+ const Anope::string &what = params.size() > 2 ? params[2] : "";
+ const Anope::string &s = params.size() > 3 ? params[3] : "";
+
+ ChannelInfo *ci = ChannelInfo::Find(params[0]);
+ if (ci == NULL)
+ {
+ source.Reply(CHAN_X_NOT_REGISTERED, params[0].c_str());
+ return;
+ }
+
+ bool has_access = false;
+ if (source.HasPriv("chanserv/access/modify"))
+ has_access = true;
+ else if (cmd.equals_ci("LIST") && source.HasPriv("chanserv/access/list"))
+ has_access = true;
+ else if (source.AccessFor(ci).HasPriv("FOUNDER"))
+ has_access = true;
+
+ /* If SET, we want two extra parameters; if DIS[ABLE] or FOUNDER, we want only
+ * one; else, we want none.
+ */
+ if (cmd.equals_ci("SET") ? s.empty() : (cmd.substr(0, 3).equals_ci("DIS") ? (what.empty() || !s.empty()) : !what.empty()))
+ this->OnSyntaxError(source, cmd);
+ else if (!has_access)
+ source.Reply(ACCESS_DENIED);
+ else if (Anope::ReadOnly && !cmd.equals_ci("LIST"))
+ source.Reply(READ_ONLY_MODE);
+ else if (cmd.equals_ci("SET"))
+ this->DoSet(source, ci, params);
+ else if (cmd.equals_ci("DIS") || cmd.equals_ci("DISABLE"))
+ this->DoDisable(source, ci, params);
+ else if (cmd.equals_ci("LIST"))
+ this->DoList(source, ci);
+ else if (cmd.equals_ci("RESET"))
+ this->DoReset(source, ci);
+ else
+ this->OnSyntaxError(source, "");
+
+ return;
+ }
+
+ bool OnHelp(CommandSource &source, const Anope::string &subcommand) override
+ {
+ if (subcommand.equals_ci("DESC"))
+ {
+ source.Reply(_("The following feature/function names are available:"));
+
+ ListFormatter list(source.GetAccount());
+ list.AddColumn(_("Name")).AddColumn(_("Description"));
+
+ for (const auto &p : PrivilegeManager::GetPrivileges())
+ {
+ ListFormatter::ListEntry entry;
+ entry["Name"] = p.name;
+ entry["Description"] = Language::Translate(source.nc, p.desc.c_str());
+ list.AddEntry(entry);
+ }
+
+ std::vector<Anope::string> replies;
+ list.Process(replies);
+
+ for (const auto &reply : replies)
+ source.Reply(reply);
+ }
+ else
+ {
+ this->SendSyntax(source);
+ source.Reply(" ");
+ source.Reply(_("The \002LEVELS\002 command allows fine control over the meaning of\n"
+ "the numeric access levels used for channels. With this\n"
+ "command, you can define the access level required for most\n"
+ "of %s's functions. (The \002SET FOUNDER\002 and this command\n"
+ "are always restricted to the channel founder.)\n"
+ " \n"
+ "\002LEVELS SET\002 allows the access level for a function or group of\n"
+ "functions to be changed. \002LEVELS DISABLE\002 (or \002DIS\002 for short)\n"
+ "disables an automatic feature or disallows access to a\n"
+ "function by anyone, INCLUDING the founder (although, the founder\n"
+ "can always re-enable it). Use \002LEVELS SET founder\002 to make a level\n"
+ "founder only.\n"
+ " \n"
+ "\002LEVELS LIST\002 shows the current levels for each function or\n"
+ "group of functions. \002LEVELS RESET\002 resets the levels to the\n"
+ "default levels of a newly-created channel.\n"
+ " \n"
+ "For a list of the features and functions whose levels can be\n"
+ "set, see \002HELP LEVELS DESC\002."), source.service->nick.c_str());
+ }
+ return true;
+ }
+};
+
+class CSAccess final
+ : public Module
+{
+ AccessAccessProvider accessprovider;
+ CommandCSAccess commandcsaccess;
+ CommandCSLevels commandcslevels;
+
+public:
+ CSAccess(const Anope::string &modname, const Anope::string &creator) : Module(modname, creator, VENDOR),
+ accessprovider(this), commandcsaccess(this), commandcslevels(this)
+ {
+ this->SetPermanent(true);
+
+ }
+
+ void OnReload(Configuration::Conf *conf) override
+ {
+ defaultLevels.clear();
+
+ for (int i = 0; i < conf->CountBlock("privilege"); ++i)
+ {
+ Configuration::Block *priv = conf->GetBlock("privilege", i);
+
+ const Anope::string &pname = priv->Get<const Anope::string>("name");
+
+ Privilege *p = PrivilegeManager::FindPrivilege(pname);
+ if (p == NULL)
+ continue;
+
+ const Anope::string &value = priv->Get<const Anope::string>("level");
+ if (value.empty())
+ continue;
+ else if (value.equals_ci("founder"))
+ defaultLevels[p->name] = ACCESS_FOUNDER;
+ else if (value.equals_ci("disabled"))
+ defaultLevels[p->name] = ACCESS_INVALID;
+ else
+ defaultLevels[p->name] = priv->Get<int16_t>("level");
+ }
+ }
+
+ void OnCreateChan(ChannelInfo *ci) override
+ {
+ reset_levels(ci);
+ }
+
+ EventReturn OnGroupCheckPriv(const AccessGroup *group, const Anope::string &priv) override
+ {
+ if (group->ci == NULL)
+ return EVENT_CONTINUE;
+
+ const ChanAccess *highest = group->Highest();
+ if (highest && highest->provider == &accessprovider)
+ {
+ /* Access accessprovider is the only accessprovider with the concept of negative access,
+ * so check they don't have negative access
+ */
+ const AccessChanAccess *aca = anope_dynamic_static_cast<const AccessChanAccess *>(highest);
+
+ if (aca->level < 0)
+ return EVENT_CONTINUE;
+ }
+
+ /* Special case. Allows a level of -1 to match anyone, and a level of 0 to match anyone identified. */
+ int16_t level = group->ci->GetLevel(priv);
+ if (level == -1)
+ return EVENT_ALLOW;
+ else if (level == 0 && group->nc && !group->nc->HasExt("UNCONFIRMED"))
+ return EVENT_ALLOW;
+ return EVENT_CONTINUE;
+ }
+};
+
+MODULE_INIT(CSAccess)