3 * argv[0] - nick / *auth
5 static USERAUTH_CALLBACK(neonserv_cmd_a_nick_lookup);
6 static void neonserv_cmd_a_async1(struct ClientSocket *client, struct ClientSocket *textclient, struct UserNode *user, struct ChanNode *chan, char *nick, char *auth, struct UserNode *target);
8 struct neonserv_cmd_a_cache {
9 struct ClientSocket *client, *textclient;
10 struct UserNode *user;
11 struct ChanNode *chan;
15 static CMD_BIND(neonserv_cmd_a) {
17 if(!(user->flags & USERFLAG_ISAUTHED)) {
18 struct neonserv_cmd_a_cache *cache = malloc(sizeof(*cache));
20 perror("malloc() failed");
23 cache->client = client;
24 cache->textclient = getTextBot();
27 cache->nick = strdup(argv[0]);
28 get_userauth(user, neonserv_cmd_a_nick_lookup, cache);
30 neonserv_cmd_a_async1(client, getTextBot(), user, chan, user->nick, user->auth, user);
32 else if(argv[0][0] == '*') {
35 neonserv_cmd_a_async1(client, getTextBot(), user, chan, NULL, argv[0], NULL);
37 struct UserNode *cuser = getUserByNick(argv[0]);
39 cuser = createTempUser(argv[0]);
40 cuser->flags |= USERFLAG_ISTMPUSER;
42 if(cuser->flags & USERFLAG_ISAUTHED) {
43 neonserv_cmd_a_async1(client, getTextBot(), user, chan, argv[0], cuser->auth, cuser);
45 struct neonserv_cmd_a_cache *cache = malloc(sizeof(*cache));
47 perror("malloc() failed");
50 cache->client = client;
51 cache->textclient = getTextBot();
54 cache->nick = strdup(argv[0]);
55 get_userauth(cuser, neonserv_cmd_a_nick_lookup, cache);
60 static USERAUTH_CALLBACK(neonserv_cmd_a_nick_lookup) {
61 struct neonserv_cmd_a_cache *cache = data;
64 reply(cache->textclient, cache->user, "NS_USER_UNKNOWN", cache->nick);
66 else if(!(user->flags & USERFLAG_ISAUTHED)) {
68 if(!strcmp(cache->nick, cache->user->nick))
69 reply(cache->textclient, cache->user, "NS_YOU_NEED_AUTH");
71 reply(cache->textclient, cache->user, "NS_USER_NEED_AUTH", cache->nick);
74 neonserv_cmd_a_async1(cache->client, cache->textclient, cache->user, cache->chan, user->nick, user->auth, user);
79 static void neonserv_cmd_a_async1(struct ClientSocket *client, struct ClientSocket *textclient, struct UserNode *user, struct ChanNode *chan, char *nick, char *auth, struct UserNode *target) {
80 //we've got a valid auth now...
82 MYSQL_ROW user_row, chanuser_row;
84 printf_mysql_query("SELECT `user_id`, `user_access`, `user_god` FROM `users` WHERE `user_user` = '%s'", escape_string(auth));
86 if ((user_row = mysql_fetch_row(res)) != NULL) {
87 userid = atoi(user_row[0]);
88 //check if the user is already added
89 printf_mysql_query("SELECT `chanuser_access`, `chanuser_flags`, `chanuser_infoline` FROM `chanusers` WHERE `chanuser_cid` = '%d' AND `chanuser_uid` = '%d'", chan->channel_id, userid);
91 if ((chanuser_row = mysql_fetch_row(res)) != NULL) {
94 reply(textclient, user, (strcmp(user_row[2], "1") ? "NS_A_ACCESS_AUTH" : "NS_A_ACCESS_AUTH_GOD"), nick, auth, atoi(chanuser_row[0]), chan->name);
96 reply(textclient, user, (strcmp(user_row[2], "1") ? "NS_A_ACCESS_NICK" : "NS_A_ACCESS_NICK_GOD"), auth, atoi(chanuser_row[0]), chan->name);
97 int cflags = atoi(chanuser_row[1]);
98 if(cflags & DB_CHANUSER_SUSPENDED)
99 reply(textclient, user, "NS_A_SUSPENDED", (nick ? nick : auth), chan->name);
100 if(chanuser_row[2] && strcmp(chanuser_row[2], ""))
101 reply(textclient, user, "[%s] %s", (nick ? nick : auth), chanuser_row[2]);
102 } else if(!strcmp(user_row[2], "1")) {
104 reply(textclient, user, "NS_A_LACKS_ACCESS_BUT_GOD_AUTH", nick, auth, chan->name);
106 reply(textclient, user, "NS_A_LACKS_ACCESS_BUT_GOD_NICK", auth, chan->name);
108 reply(textclient, user, "NS_NOT_ON_USERLIST", nick, chan->name);
110 reply(textclient, user, "NS_NOT_ON_USERLIST", nick, chan->name);
111 if(target && (target->flags & USERFLAG_ISIRCOP))
112 reply(textclient, user, "NS_A_IS_IRCOP", nick);