implemented event logger
[NeonServV5.git] / cmd_neonserv_kick.c
1
2 /*
3 * argv[0]    nick[,*auth[,*!*@mask[...]]]
4 * argv[1-*]  reason
5 */
6 static USERLIST_CALLBACK(neonserv_cmd_kick_userlist_lookup);
7 static void neonserv_cmd_kick_async1(struct ClientSocket *client, struct ClientSocket *textclient, struct UserNode *user, struct ChanNode *chan, struct Event *event, char *nicks, char *reason);
8
9 struct neonserv_cmd_kick_cache {
10     struct ClientSocket *client, *textclient;
11     struct UserNode *user;
12     struct Event *event;
13     char *nicks;
14     char *reason;
15 };
16
17 static CMD_BIND(neonserv_cmd_kick) {
18     struct neonserv_cmd_kick_cache *cache = malloc(sizeof(*cache));
19     if (!cache) {
20         perror("malloc() failed");
21         return;
22     }
23     cache->client = client;
24     cache->textclient = getTextBot();
25     cache->user = user;
26     cache->event = event;
27     cache->nicks = strdup(argv[0]);
28     if(argc > 1) {
29         cache->reason = strdup(merge_argv(argv, 1, argc));
30     } else
31         cache->reason = NULL;
32     get_userlist_with_invisible(chan, neonserv_cmd_kick_userlist_lookup, cache);
33 }
34
35 static USERLIST_CALLBACK(neonserv_cmd_kick_userlist_lookup) {
36     struct neonserv_cmd_kick_cache *cache = data;
37     neonserv_cmd_kick_async1(cache->client, cache->textclient, cache->user, chan, cache->event, cache->nicks, (cache->reason ? cache->reason : "Bye."));
38     free(cache->nicks);
39     if(cache->reason)
40         free(cache->reason);
41     free(cache);
42 }
43
44 static void neonserv_cmd_kick_async1(struct ClientSocket *client, struct ClientSocket *textclient, struct UserNode *user, struct ChanNode *chan, struct Event *event, char *nicks, char *reason) {
45     int i, kicked_users = 0, provided_nicks = 0;
46     char *nick, *nextnick;
47     struct UserNode *cuser;
48     struct ChanUser *chanuser;
49     nextnick = nicks;
50     while((nick = nextnick)) {
51         nextnick = strstr(nick, ",");
52         if(nextnick) {
53             *nextnick = '\0';
54             nextnick++;
55         }
56         if(!*nick) continue;
57         if(is_ircmask(nick)) {
58             //KICK HOSTMASK
59             char usermask[NICKLEN+USERLEN+HOSTLEN+3];
60             struct ChanUser *kick_chanuser[chan->usercount];
61             int kick_chanuser_pos = 0;
62             for(chanuser = getChannelUsers(chan, NULL); chanuser; chanuser = getChannelUsers(chan, chanuser)) {
63                 cuser = chanuser->user;
64                 sprintf(usermask, "%s!%s@%s", cuser->nick, cuser->ident, cuser->host);
65                 if(!match(nick, usermask)) {
66                     provided_nicks++;
67                     if(isNetworkService(chanuser->user)) {
68                         reply(textclient, user, "NS_SERVICE_IMMUNE", chanuser->user->nick);
69                         continue;
70                     }
71                     if(isUserProtected(chan, cuser, user)) {
72                         reply(textclient, user, "NS_USER_PROTECTED", cuser->nick);
73                         continue;
74                     }
75                     kick_chanuser[kick_chanuser_pos++] = chanuser;
76                     if(kick_chanuser_pos > 4 && (kick_chanuser_pos * 3) > chan->usercount && !isGodMode(user)) {
77                         kick_chanuser_pos = 0;
78                         reply(textclient, user, "NS_LAME_MASK", nick);
79                         break;
80                     }
81                 }
82             }
83             for(i = 0; i < kick_chanuser_pos; i++) {
84                 kicked_users++;
85                 putsock(client, "KICK %s %s :%s", chan->name, kick_chanuser[i]->user->nick, reason);
86             }
87         } else if(*nick == '*') {
88             //KICK AUTH
89             nick++;
90             cuser = NULL;
91             for(chanuser = getChannelUsers(chan, NULL); chanuser; chanuser = getChannelUsers(chan, chanuser)) {
92                 if((chanuser->user->flags & USERFLAG_ISAUTHED) && !stricmp(chanuser->user->auth, nick)) {
93                     provided_nicks++;
94                     if(isNetworkService(chanuser->user)) {
95                         reply(textclient, user, "NS_SERVICE_IMMUNE", chanuser->user->nick);
96                         continue;
97                     }
98                     if(!cuser) {
99                         //check if the user is protected
100                         if(isUserProtected(chan, chanuser->user, user)) {
101                             reply(textclient, user, "NS_USER_PROTECTED", chanuser->user->nick);
102                             break; //all other users are also protected...
103                         }
104                         cuser = chanuser->user;
105                     }
106                     kicked_users++;
107                     putsock(client, "KICK %s %s :%s", chan->name, cuser->nick, reason);
108                 }
109             }
110         } else {
111             provided_nicks++;
112             cuser = NULL;
113             for(chanuser = getChannelUsers(chan, NULL); chanuser; chanuser = getChannelUsers(chan, chanuser)) {
114                 if(!stricmp(chanuser->user->nick, nick)) {
115                     cuser = chanuser->user;
116                 }
117             }
118             if(!cuser) continue;
119             if(isNetworkService(cuser)) {
120                 reply(textclient, user, "NS_SERVICE_IMMUNE", cuser->nick);
121                 continue;
122             }
123             if(isUserProtected(chan, cuser, user)) {
124                 reply(textclient, user, "NS_USER_PROTECTED", cuser->nick);
125                 continue;
126             }
127             kicked_users++;
128             putsock(client, "KICK %s %s :%s", chan->name, cuser->nick, reason);
129         }
130     }
131     if(kicked_users == provided_nicks)
132         reply(getTextBot(), user, "NS_KICK_DONE", kicked_users, chan->name);
133     else
134         reply(getTextBot(), user, "NS_KICK_FAIL", client->user->nick);
135     if(kicked_users)
136         logEvent(event);
137 }