]>
Commit | Line | Data |
---|---|---|
d76ed9a9 AS |
1 | /* modcmd.c - Generalized module command support |
2 | * Copyright 2002-2004 srvx Development Team | |
3 | * | |
83ff05c3 | 4 | * This file is part of x3. |
d76ed9a9 | 5 | * |
d0f04f71 | 6 | * x3 is free software; you can redistribute it and/or modify |
d76ed9a9 | 7 | * it under the terms of the GNU General Public License as published by |
348683aa | 8 | * the Free Software Foundation; either version 3 of the License, or |
d76ed9a9 AS |
9 | * (at your option) any later version. |
10 | * | |
11 | * This program is distributed in the hope that it will be useful, | |
12 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
14 | * GNU General Public License for more details. | |
15 | * | |
16 | * You should have received a copy of the GNU General Public License | |
17 | * along with srvx; if not, write to the Free Software Foundation, | |
18 | * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA. | |
19 | */ | |
20 | ||
d76ed9a9 AS |
21 | #include "chanserv.h" |
22 | #include "conf.h" | |
1136f709 | 23 | #include "compat.h" |
d76ed9a9 | 24 | #include "modcmd.h" |
7637f48f | 25 | #include "opserv.h" |
d76ed9a9 | 26 | #include "saxdb.h" |
7637f48f | 27 | #include "timeq.h" |
cc6339ac | 28 | #include "version.h" |
d76ed9a9 | 29 | |
2f65da8f | 30 | |
d76ed9a9 AS |
31 | struct pending_template { |
32 | struct svccmd *cmd; | |
33 | char *base; | |
34 | struct pending_template *next; | |
35 | }; | |
36 | ||
7637f48f | 37 | extern unsigned long god_timeout; |
d76ed9a9 AS |
38 | static struct dict *modules; |
39 | static struct dict *services; | |
40 | static struct pending_template *pending_templates; | |
41 | static struct module *modcmd_module; | |
a218fded | 42 | static struct modcmd *bind_command, *help_command, *version_command, *credits_command; |
d76ed9a9 AS |
43 | static const struct message_entry msgtab[] = { |
44 | { "MCMSG_BARE_FLAG", "Flag %.*s must be preceded by a + or -." }, | |
45 | { "MCMSG_UNKNOWN_FLAG", "Unknown module flag %.*s." }, | |
46 | { "MCMSG_BAD_OPSERV_LEVEL", "Invalid $O access level %s." }, | |
47 | { "MCMSG_BAD_CHANSERV_LEVEL", "Invalid $C access level %s." }, | |
48 | { "MCMSG_LEVEL_TOO_LOW", "You cannot set the access requirements for %s (your level is too low.)" }, | |
49 | { "MCMSG_LEVEL_TOO_HIGH", "You cannot set the access requirements to %s (that is too high)." }, | |
50 | { "MCMSG_BAD_OPTION", "Unknown option %s." }, | |
51 | { "MCMSG_MUST_QUALIFY", "You $bMUST$b \"/msg %s@$s %s\" (not just /msg %s)." }, | |
52 | { "MCMSG_ACCOUNT_SUSPENDED", "Your account has been suspended." }, | |
53 | { "MCMSG_CHAN_NOT_REGISTERED", "%s has not been registered with $C." }, | |
54 | { "MCMSG_CHAN_SUSPENDED", "$b$C$b access to $b%s$b has been temporarily suspended (%s)." }, | |
55 | { "MCMSG_NO_CHANNEL_ACCESS", "You lack access to %s." }, | |
56 | { "MCMSG_LOW_CHANNEL_ACCESS", "You lack sufficient access in %s to use this command." }, | |
57 | { "MCMSG_REQUIRES_JOINABLE", "You must be in %s (or on its userlist) to use this command." }, | |
58 | { "MCMSG_MUST_BE_HELPING", "You must have security override (helping mode) on to use this command." }, | |
59 | { "MCMSG_MISSING_COMMAND", "You must specify a command as well as a channel." }, | |
60 | { "MCMSG_NO_CHANNEL_BEFORE", "You may not give a channel name before this command." }, | |
61 | { "MCMSG_NO_PLUS_CHANNEL", "You may not use a +channel with this command." }, | |
62 | { "MCMSG_COMMAND_ALIASES", "%s is an alias for: %s" }, | |
4048352e | 63 | { "MCMSG_HELP_COMMAND_ALIAS", "$uAlias for:$u %s" }, |
b1bf690d | 64 | { "MCMSG_HELP_COMMAND_HEADER", "Command help for: $b%s$b" }, |
ed05669c | 65 | { "MCMSG_HELP_COMMAND_UNKNOWN", "No help available for that command." }, |
b1bf690d AS |
66 | { "MCMSG_HELP_TOPIC_HEADER", "Help topic: $b%s$b" }, |
67 | { "MCMSG_HELP_DIVIDER", "=---------------------------------------=" }, | |
68 | { "MCMSG_HELP_FOOTER", "=------------- End of Help -------------=" }, | |
d76ed9a9 AS |
69 | { "MCMSG_COMMAND_BINDING", "%s is a binding of: %s" }, |
70 | { "MCMSG_ALIAS_ERROR", "Error in alias expansion for %s; check the error log for details." }, | |
71 | { "MCMSG_INTERNAL_COMMAND", "$b%s$b is an internal command and cannot be called directly; please check command bindings." }, | |
72 | { "MCMSG_UNKNOWN_MODULE", "Unknown module %s." }, | |
73 | { "MCMSG_UNKNOWN_SERVICE", "Unknown service %s." }, | |
74 | { "MCMSG_ALREADY_BOUND", "%s already has a command bound as %s." }, | |
75 | { "MCMSG_UNKNOWN_COMMAND_2", "Unknown command name %s (relative to service %s)." }, | |
76 | { "MCMSG_COMMAND_MODIFIED", "Option $b%s$b for $b%s$b has been set." }, | |
77 | { "MCMSG_INSPECTION_REFUSED", "You do not have access to inspect command %s." }, | |
78 | { "MCMSG_CANNOT_DOUBLE_ALIAS", "You cannot bind to a complex (argument-carrying) bind." }, | |
79 | { "MCMSG_BAD_ALIAS_ARGUMENT", "Invalid alias argument $b%s$b." }, | |
80 | { "MCMSG_COMMAND_BOUND", "New command %s bound to %s." }, | |
81 | { "MCMSG_MODULE_BOUND", "Bound %d commands from %s to %s." }, | |
82 | { "MCMSG_NO_COMMAND_BOUND", "%s has nothing bound as command %s." }, | |
83 | { "MCMSG_UNBIND_PROHIBITED", "It wouldn't be very much fun to unbind the last %s command, now would it?" }, | |
84 | { "MCMSG_COMMAND_UNBOUND", "Unbound command %s from %s." }, | |
85 | { "MCMSG_HELPFILE_UNBOUND", "Since that was the last command from module %s on the service, the helpfile for %s was removed." }, | |
86 | { "MCMSG_NO_HELPFILE", "Module %s does not have a help file." }, | |
87 | { "MCMSG_HELPFILE_ERROR", "Syntax error reading %s; help contents not changed." }, | |
88 | { "MCMSG_HELPFILE_READ", "Read %s help database in "FMT_TIME_T".%03lu seconds." }, | |
89 | { "MCMSG_COMMAND_TIME", "Command $b%s$b finished in "FMT_TIME_T".%06lu seconds." }, | |
90 | { "MCMSG_NEED_OPSERV_LEVEL", "You must have $O access of at least $b%u$b." }, | |
91 | { "MCMSG_NEED_CHANSERV_LEVEL", "You must have $C access of at least $b%u$b in the channel." }, | |
92 | { "MCMSG_NEED_ACCOUNT_FLAGS", "You must have account flags $b%s$b." }, | |
93 | { "MCMSG_NEED_NOTHING", "Anyone may use the $b%s$b command." }, | |
94 | { "MCMSG_NEED_STAFF_ACCESS", "You must be network staff." }, | |
95 | { "MCMSG_NEED_STAFF_OPER", "You must be an IRC operator." }, | |
96 | { "MCMSG_NEED_STAFF_NETHELPER", "You must be a network helper." }, | |
97 | { "MCMSG_NEED_STAFF_NETHELPER_OR_OPER", "You must be a network helper or IRC operator." }, | |
98 | { "MCMSG_NEED_STAFF_SHELPER", "You must be a support helper." }, | |
99 | { "MCMSG_NEED_STAFF_SHELPER_OR_OPER", "You must be a support helper or IRC operator." }, | |
100 | { "MCMSG_NEED_STAFF_HELPER", "You must be a network or support helper." }, | |
101 | { "MCMSG_NEED_JOINABLE", "The channel must be open or you must be in the channel or on its userlist." }, | |
102 | { "MCMSG_NEED_CHANUSER_CSUSPENDABLE", "You must be on the channel's userlist, and the channel can be suspended." }, | |
103 | { "MCMSG_NEED_CHANUSER", "You must be on the channel's userlist." }, | |
104 | { "MCMSG_NEED_REGCHAN", "You must specify a channel registered with $C." }, | |
105 | { "MCMSG_NEED_CHANNEL", "You must specify a channel that exists." }, | |
106 | { "MCMSG_NEED_AUTHED", "You must be authenticated with $N." }, | |
107 | { "MCMSG_IS_TOY", "$b%s$b is a toy command." }, | |
108 | { "MCMSG_END_REQUIREMENTS", "End of requirements for $b%s$b." }, | |
109 | { "MCMSG_ALREADY_HELPING", "You already have security override enabled." }, | |
110 | { "MCMSG_ALREADY_NOT_HELPING", "You already have security override disabled." }, | |
111 | { "MCMSG_NOW_HELPING", "Security override has been enabled." }, | |
112 | { "MCMSG_NOW_NOT_HELPING", "Security override has been disabled." }, | |
113 | { "MCMSG_JOINER_CHOICES", "Subcommands of %s: %s" }, | |
114 | { "MCMSG_MODULE_INFO", "Commands exported by module $b%s$b:" }, | |
115 | { "MCMSG_SERVICE_INFO", "Commands bound to service $b%s$b:" }, | |
116 | { "MCMSG_TOYS_DISABLED", "Toys are disabled in %s." }, | |
117 | { "MCMSG_PUBLIC_DENY", "Public commands in $b%s$b are restricted." }, | |
118 | { "MCMSG_HELPFILE_SEQUENCE", "Help priority %d: %s" }, | |
119 | { "MCMSG_HELPFILE_SEQUENCE_SET", "Set helpfile priority sequence for %s." }, | |
120 | { "MCMSG_BAD_SERVICE_NICK", "$b%s$b is an invalid nickname." }, | |
121 | { "MCMSG_ALREADY_SERVICE", "$b%s$b is already a service." }, | |
122 | { "MCMSG_NEW_SERVICE", "Added new service bot $b%s$b." }, | |
123 | { "MCMSG_SERVICE_RENAMED", "Service renamed to $b%s$b." }, | |
124 | { "MCMSG_NO_TRIGGER", "$b%s$b does not have an in-channel trigger." }, | |
125 | { "MCMSG_REMOVED_TRIGGER", "Removed trigger from $b%s$b." }, | |
126 | { "MCMSG_DUPLICATE_TRIGGER", "$b%s$b already uses trigger $b%c$b." }, | |
127 | { "MCMSG_CURRENT_TRIGGER", "Trigger for $b%s$b is $b%c$b." }, | |
128 | { "MCMSG_NEW_TRIGGER", "Changed trigger for $b%s$b to $b%c$b." }, | |
129 | { "MCMSG_SERVICE_PRIVILEGED", "Service $b%s$b privileged: $b%s$b." }, | |
130 | { "MCMSG_SERVICE_REMOVED", "Service $b%s$b has been deleted." }, | |
131 | { "MCMSG_FILE_NOT_OPENED", "Unable to open file $b%s$b for writing." }, | |
132 | { "MCMSG_MESSAGES_DUMPED", "Messages written to $b%s$b." }, | |
133 | { "MCMSG_MESSAGE_DUMP_FAILED", "Message dump failed: %s." }, | |
134 | { "MCMSG_COMMAND_FLAGS", "Command flags are %s (inferred: %s)." }, | |
135 | { "MCMSG_COMMAND_ACCOUNT_FLAGS", "Requires account flags +%s, prohibits account flags +%s." }, | |
136 | { "MCMSG_COMMAND_ACCESS_LEVEL", "Requires channel access %d and $O access %d." }, | |
137 | { "MCMSG_COMMAND_USES", "%s has been used %d times." }, | |
7637f48f | 138 | { "MCMSG_GOD_EXPIRED", "Security override expired." }, |
d76ed9a9 AS |
139 | { NULL, NULL } |
140 | }; | |
141 | struct userData *_GetChannelUser(struct chanData *channel, struct handle_info *handle, int override, int allow_suspended); | |
142 | ||
143 | #define ACTION_ALLOW 1 | |
144 | #define ACTION_OVERRIDE 2 | |
145 | #define ACTION_NOCHANNEL 4 | |
146 | #define ACTION_STAFF 8 | |
147 | ||
148 | #define RESOLVE_DEPTH 4 | |
149 | ||
150 | static struct modcmd_flag { | |
151 | const char *name; | |
152 | unsigned int flag; | |
1136f709 | 153 | } modcmd_flags[] = { |
d76ed9a9 AS |
154 | { "acceptchan", MODCMD_ACCEPT_CHANNEL }, |
155 | { "acceptpluschan", MODCMD_ACCEPT_PCHANNEL }, | |
156 | { "authed", MODCMD_REQUIRE_AUTHED }, | |
157 | { "channel", MODCMD_REQUIRE_CHANNEL }, | |
158 | { "chanuser", MODCMD_REQUIRE_CHANUSER }, | |
159 | { "disabled", MODCMD_DISABLED }, | |
0d16e639 | 160 | { "helping", MODCMD_REQUIRE_HELPING }, |
d76ed9a9 AS |
161 | { "ignore_csuspend", MODCMD_IGNORE_CSUSPEND }, |
162 | { "joinable", MODCMD_REQUIRE_JOINABLE }, | |
163 | { "keepbound", MODCMD_KEEP_BOUND }, | |
164 | { "loghostmask", MODCMD_LOG_HOSTMASK }, | |
d76ed9a9 AS |
165 | { "networkhelper", MODCMD_REQUIRE_NETWORK_HELPER }, |
166 | { "never_csuspend", MODCMD_NEVER_CSUSPEND }, | |
0d16e639 | 167 | { "nolog", MODCMD_NO_LOG }, |
d76ed9a9 AS |
168 | { "oper", MODCMD_REQUIRE_OPER }, |
169 | { "qualified", MODCMD_REQUIRE_QUALIFIED }, | |
170 | { "regchan", MODCMD_REQUIRE_REGCHAN }, | |
171 | { "supporthelper", MODCMD_REQUIRE_SUPPORT_HELPER }, | |
d76ed9a9 AS |
172 | { "toy", MODCMD_TOY }, |
173 | { NULL, 0 } | |
174 | }; | |
175 | ||
176 | static int | |
177 | flags_bsearch(const void *a, const void *b) { | |
178 | const char *key = a; | |
179 | const struct modcmd_flag *flag = b; | |
180 | return ircncasecmp(key, flag->name, strlen(flag->name)); | |
181 | } | |
182 | ||
183 | static int | |
184 | flags_qsort(const void *a, const void *b) { | |
185 | const struct modcmd_flag *fa = a, *fb = b; | |
186 | return irccasecmp(fa->name, fb->name); | |
187 | } | |
188 | ||
1136f709 | 189 | DEFINE_LIST(svccmd_list, struct svccmd*) |
190 | DEFINE_LIST(module_list, struct module*) | |
d76ed9a9 AS |
191 | |
192 | static void | |
193 | free_service_command(void *data) { | |
194 | struct svccmd *svccmd; | |
195 | unsigned int nn; | |
196 | ||
197 | svccmd = data; | |
198 | if (svccmd->alias.used) { | |
199 | for (nn=0; nn<svccmd->alias.used; ++nn) | |
200 | free(svccmd->alias.list[nn]); | |
201 | free(svccmd->alias.list); | |
202 | } | |
203 | free(svccmd->name); | |
204 | free(svccmd); | |
205 | } | |
206 | ||
207 | static void | |
208 | free_service(void *data) { | |
209 | struct service *service = data; | |
210 | dict_delete(service->commands); | |
211 | module_list_clean(&service->modules); | |
212 | free(service); | |
213 | } | |
214 | ||
215 | static void | |
216 | free_module_command(void *data) { | |
217 | struct modcmd *modcmd = data; | |
218 | free_service_command(modcmd->defaults); | |
219 | free(modcmd->name); | |
220 | free(modcmd); | |
221 | } | |
222 | ||
223 | static void | |
224 | free_module(void *data) { | |
225 | struct module *module = data; | |
226 | dict_delete(module->commands); | |
227 | close_helpfile(module->helpfile); | |
228 | free(module->name); | |
229 | free(module); | |
230 | } | |
231 | ||
232 | struct module * | |
233 | module_register(const char *name, struct log_type *clog, const char *helpfile_name, expand_func_t expand_help) { | |
234 | struct module *newmod; | |
235 | ||
236 | newmod = calloc(1, sizeof(*newmod)); | |
237 | newmod->name = strdup(name); | |
238 | newmod->commands = dict_new(); | |
239 | dict_set_free_data(newmod->commands, free_module_command); | |
240 | newmod->clog = clog; | |
241 | newmod->helpfile_name = helpfile_name; | |
242 | newmod->expand_help = expand_help; | |
243 | if (newmod->helpfile_name) { | |
244 | newmod->helpfile = open_helpfile(newmod->helpfile_name, newmod->expand_help); | |
245 | } | |
246 | dict_insert(modules, newmod->name, newmod); | |
247 | return newmod; | |
248 | } | |
249 | ||
250 | struct module * | |
251 | module_find(const char *name) { | |
252 | return dict_find(modules, name, NULL); | |
253 | } | |
254 | ||
255 | static void | |
256 | add_pending_template(struct svccmd *cmd, const char *target) { | |
257 | struct pending_template *pending = calloc(1, sizeof(*pending)); | |
258 | pending->cmd = cmd; | |
259 | pending->base = strdup(target); | |
260 | pending->next = pending_templates; | |
261 | pending_templates = pending; | |
262 | } | |
263 | ||
2187a4e3 | 264 | struct svccmd * |
d76ed9a9 AS |
265 | svccmd_resolve_name(struct svccmd *origin, const char *name) { |
266 | char *sep, svcname[MAXLEN]; | |
267 | ||
268 | if ((sep = strchr(name, '.'))) { | |
269 | memcpy(svcname, name, sep-name); | |
270 | svcname[sep-name] = 0; | |
271 | name = sep + 1; | |
272 | if (svcname[0] == '*') { | |
273 | struct module *module = module_find(svcname+1); | |
274 | struct modcmd *cmd = module ? dict_find(module->commands, name, NULL) : NULL; | |
275 | return cmd ? cmd->defaults : NULL; | |
276 | } else { | |
277 | struct service *service = service_find(svcname); | |
278 | return service ? dict_find(service->commands, name, NULL) : NULL; | |
279 | } | |
280 | } else { | |
281 | if (origin->parent) { | |
282 | return dict_find(origin->parent->commands, name, NULL); | |
283 | } else { | |
284 | struct modcmd *cmd = dict_find(origin->command->parent->commands, name, NULL); | |
285 | return cmd ? cmd->defaults : NULL; | |
286 | } | |
287 | } | |
288 | } | |
289 | ||
290 | static void | |
291 | modcmd_set_effective_flags(struct svccmd *cmd) { | |
292 | int flags = cmd->flags | cmd->command->flags; | |
293 | if (cmd->min_opserv_level > 0) | |
294 | flags |= MODCMD_REQUIRE_OPER; | |
295 | if (cmd->min_channel_access > 0) | |
296 | flags |= MODCMD_REQUIRE_CHANUSER; | |
297 | if (flags & MODCMD_REQUIRE_CHANUSER) | |
298 | flags |= MODCMD_REQUIRE_REGCHAN; | |
299 | if (flags & MODCMD_REQUIRE_REGCHAN) | |
300 | flags |= MODCMD_REQUIRE_CHANNEL; | |
301 | if (flags & (MODCMD_REQUIRE_STAFF|MODCMD_REQUIRE_HELPING)) | |
302 | flags |= MODCMD_REQUIRE_AUTHED; | |
303 | cmd->effective_flags = flags; | |
304 | } | |
305 | ||
306 | static void | |
307 | svccmd_copy_rules(struct svccmd *dest, struct svccmd *src) { | |
308 | dest->flags |= src->flags; | |
309 | dest->req_account_flags |= src->req_account_flags; | |
310 | dest->deny_account_flags |= src->deny_account_flags; | |
311 | if (src->min_opserv_level > dest->min_opserv_level) | |
312 | dest->min_opserv_level = src->min_opserv_level; | |
313 | if (src->min_channel_access > dest->min_channel_access) | |
314 | dest->min_channel_access = src->min_channel_access; | |
315 | modcmd_set_effective_flags(dest); | |
316 | } | |
317 | ||
318 | static int | |
319 | svccmd_configure(struct svccmd *cmd, struct userNode *user, struct userNode *bot, const char *param, const char *value) { | |
320 | if (!irccasecmp(param, "flags")) { | |
321 | unsigned int set_flags, rem_flags; | |
322 | struct modcmd_flag *flag; | |
323 | int opt, end; | |
324 | ||
325 | for (set_flags = rem_flags = 0; 1; value += end) { | |
326 | end = strcspn(value, ","); | |
327 | if (*value == '+') | |
328 | opt = 1; | |
329 | else if (*value == '-') | |
330 | opt = 0; | |
331 | else { | |
332 | if (user) | |
333 | send_message(user, bot, "MCMSG_BARE_FLAG", end, value); | |
334 | else | |
335 | log_module(MAIN_LOG, LOG_ERROR, "Flag %.*s must be preceded by a + or - (for command %s).", end, value, cmd->name); | |
336 | return 0; | |
337 | } | |
338 | value++; | |
1136f709 | 339 | flag = bsearch(value, modcmd_flags, ArrayLength(modcmd_flags)-1, sizeof(modcmd_flags[0]), flags_bsearch); |
d76ed9a9 AS |
340 | if (!flag) { |
341 | if (user) | |
342 | send_message(user, bot, "MCMSG_UNKNOWN_FLAG", end, value); | |
343 | else | |
344 | log_module(MAIN_LOG, LOG_ERROR, "Unknown module flag %.*s (for command %s).", end, value, cmd->name); | |
345 | return 0; | |
346 | } | |
347 | if (opt) | |
348 | set_flags |= flag->flag, rem_flags &= ~flag->flag; | |
349 | else | |
350 | rem_flags |= flag->flag, set_flags &= ~flag->flag; | |
351 | if (!value[end-1]) | |
352 | break; | |
353 | } | |
354 | cmd->flags = (cmd->flags | set_flags) & ~rem_flags; | |
355 | return 1; | |
356 | } else if (!irccasecmp(param, "channel_level") || !irccasecmp(param, "channel_access") || !irccasecmp(param, "access")) { | |
357 | unsigned short ul; | |
358 | if (!irccasecmp(value, "none") || !irccasecmp(value, "0")) { | |
359 | cmd->min_channel_access = 0; | |
360 | return 1; | |
361 | } else if ((ul = user_level_from_name(value, UL_OWNER)) > 0) { | |
362 | cmd->min_channel_access = ul; | |
363 | return 1; | |
364 | } else if (user) { | |
365 | send_message(user, bot, "MCMSG_BAD_CHANSERV_LEVEL", value); | |
366 | return 0; | |
367 | } else { | |
368 | log_module(MAIN_LOG, LOG_ERROR, "Invalid ChanServ access level %s (for command %s).", value, cmd->name); | |
369 | return 0; | |
370 | } | |
371 | } else if (!irccasecmp(param, "oper_level") || !irccasecmp(param, "oper_access") || !irccasecmp(param, "level")) { | |
372 | unsigned int newval = atoi(value); | |
373 | if (!isdigit(value[0]) || (newval > 1000)) { | |
374 | if (user) | |
375 | send_message(user, bot, "MCMSG_BAD_OPSERV_LEVEL", value); | |
376 | else | |
377 | log_module(MAIN_LOG, LOG_ERROR, "Invalid OpServ access level %s (for command %s).", value, cmd->name); | |
378 | return 0; | |
379 | } | |
380 | if (user && (!user->handle_info || (cmd->min_opserv_level > user->handle_info->opserv_level))) { | |
381 | send_message(user, bot, "MCMSG_LEVEL_TOO_LOW", cmd->name); | |
382 | return 0; | |
383 | } | |
384 | if (user && (!user->handle_info || (newval > user->handle_info->opserv_level))) { | |
385 | send_message(user, bot, "MCMSG_LEVEL_TOO_HIGH", value); | |
386 | return 0; | |
387 | } | |
388 | cmd->min_opserv_level = newval; | |
389 | return 1; | |
390 | } else if (!irccasecmp(param, "account_flags")) { | |
391 | return nickserv_modify_handle_flags(user, bot, value, &cmd->req_account_flags, &cmd->deny_account_flags); | |
392 | } else { | |
393 | if (user) | |
394 | send_message(user, bot, "MCMSG_BAD_OPTION", param); | |
395 | else | |
396 | log_module(MAIN_LOG, LOG_ERROR, "Unknown option %s (for command %s).", param, cmd->name); | |
397 | return 0; | |
398 | } | |
399 | } | |
400 | ||
401 | struct modcmd * | |
402 | modcmd_register(struct module *module, const char *name, modcmd_func_t func, unsigned int min_argc, unsigned int flags, ...) { | |
403 | struct modcmd *newcmd; | |
404 | va_list args; | |
405 | const char *param, *value; | |
406 | ||
407 | newcmd = calloc(1, sizeof(*newcmd)); | |
408 | newcmd->name = strdup(name); | |
409 | newcmd->parent = module; | |
410 | newcmd->func = func; | |
411 | newcmd->min_argc = min_argc; | |
412 | newcmd->flags = flags; | |
413 | newcmd->defaults = calloc(1, sizeof(*newcmd->defaults)); | |
414 | newcmd->defaults->name = strdup(newcmd->name); | |
415 | newcmd->defaults->command = newcmd; | |
416 | dict_insert(module->commands, newcmd->name, newcmd); | |
417 | if (newcmd->flags & (MODCMD_REQUIRE_REGCHAN|MODCMD_REQUIRE_CHANNEL|MODCMD_REQUIRE_CHANUSER|MODCMD_REQUIRE_JOINABLE)) { | |
418 | newcmd->defaults->flags |= MODCMD_ACCEPT_CHANNEL; | |
419 | } | |
420 | if (newcmd->flags & MODCMD_REQUIRE_STAFF) { | |
421 | newcmd->defaults->flags |= MODCMD_REQUIRE_AUTHED; | |
422 | } | |
423 | va_start(args, flags); | |
424 | while ((param = va_arg(args, const char*))) { | |
425 | value = va_arg(args, const char*); | |
426 | if (!irccasecmp(param, "template")) { | |
427 | struct svccmd *svccmd = svccmd_resolve_name(newcmd->defaults, value); | |
428 | if (svccmd) { | |
429 | svccmd_copy_rules(newcmd->defaults, svccmd); | |
430 | } else { | |
431 | log_module(MAIN_LOG, LOG_ERROR, "Unable to resolve template name %s for %s.%s.", value, newcmd->parent->name, newcmd->name); | |
432 | } | |
433 | add_pending_template(newcmd->defaults, value); | |
434 | } else { | |
435 | svccmd_configure(newcmd->defaults, NULL, NULL, param, value); | |
436 | } | |
437 | } | |
438 | modcmd_set_effective_flags(newcmd->defaults); | |
439 | va_end(args); | |
440 | return newcmd; | |
441 | } | |
442 | ||
443 | /* This is kind of a lame hack, but it is actually simpler than having | |
444 | * the permission check vary based on the command itself, or having a | |
445 | * more generic rule system. | |
446 | */ | |
447 | int | |
448 | svccmd_can_invoke(struct userNode *user, struct userNode *bot, struct svccmd *cmd, struct chanNode *channel, int options) { | |
1136f709 | 449 | extern struct userNode *chanserv; |
d76ed9a9 AS |
450 | unsigned int uData_checked = 0; |
451 | struct userData *uData = NULL; | |
452 | int rflags = 0, flags = cmd->effective_flags; | |
453 | ||
454 | if (flags & MODCMD_DISABLED) { | |
455 | if (options & SVCCMD_NOISY) | |
456 | send_message(user, bot, "MSG_COMMAND_DISABLED", cmd->name); | |
457 | return 0; | |
458 | } | |
459 | if ((flags & MODCMD_REQUIRE_QUALIFIED) && !(options & SVCCMD_QUALIFIED)) { | |
460 | if (options & SVCCMD_NOISY) | |
461 | send_message(user, bot, "MCMSG_MUST_QUALIFY", bot->nick, cmd->name, bot->nick); | |
462 | return 0; | |
463 | } | |
464 | if (flags & MODCMD_REQUIRE_AUTHED) { | |
465 | if (!user->handle_info) { | |
466 | if (options & SVCCMD_NOISY) | |
467 | send_message(user, bot, "MSG_AUTHENTICATE"); | |
468 | return 0; | |
469 | } | |
470 | if (HANDLE_FLAGGED(user->handle_info, SUSPENDED)) { | |
471 | if (options & SVCCMD_NOISY) | |
472 | send_message(user, bot, "MCMSG_ACCOUNT_SUSPENDED"); | |
473 | return 0; | |
474 | } | |
475 | } | |
476 | if (channel || (options & SVCCMD_NOISY)) { | |
477 | if ((flags & MODCMD_REQUIRE_CHANNEL) && !channel) { | |
478 | if (options & SVCCMD_NOISY) | |
479 | send_message(user, bot, "MSG_INVALID_CHANNEL"); | |
480 | return 0; | |
481 | } | |
482 | if (flags & MODCMD_REQUIRE_REGCHAN) { | |
1136f709 | 483 | if (!chanserv) { |
484 | /* Just use the inferred MODCMD_REQUIRE_CHANNEL. */ | |
485 | } else if (!channel->channel_info) { | |
d76ed9a9 AS |
486 | if (options & SVCCMD_NOISY) |
487 | send_message(user, bot, "MCMSG_CHAN_NOT_REGISTERED", channel->name); | |
488 | return 0; | |
489 | } else if (IsSuspended(channel->channel_info) && !(flags & MODCMD_IGNORE_CSUSPEND)) { | |
1136f709 | 490 | /* Allow security-override users to ignore most channel |
491 | * suspensions, but flag that use as a staff command. | |
492 | */ | |
493 | if (!IsHelping(user) || (flags & MODCMD_NEVER_CSUSPEND)) { | |
d76ed9a9 AS |
494 | if (options & SVCCMD_NOISY) |
495 | send_message(user, bot, "MCMSG_CHAN_SUSPENDED", channel->name, channel->channel_info->suspended->reason); | |
496 | return 0; | |
497 | } | |
498 | rflags |= ACTION_STAFF; | |
499 | } | |
500 | } | |
501 | if (flags & MODCMD_REQUIRE_CHANUSER) { | |
502 | if (!uData_checked) | |
503 | uData = _GetChannelUser(channel->channel_info, user->handle_info, 1, 0), uData_checked = 1; | |
1136f709 | 504 | if (!chanserv) { |
505 | /* Assume someone knows what they're doing. */ | |
506 | } else if (!uData) { | |
d76ed9a9 AS |
507 | if (options & SVCCMD_NOISY) |
508 | send_message(user, bot, "MCMSG_NO_CHANNEL_ACCESS", channel->name); | |
509 | return 0; | |
510 | } else if (uData->access < cmd->min_channel_access) { | |
511 | if (options & SVCCMD_NOISY) | |
512 | send_message(user, bot, "MCMSG_LOW_CHANNEL_ACCESS", channel->name); | |
513 | return 0; | |
514 | } | |
515 | } | |
516 | if ((flags & MODCMD_REQUIRE_JOINABLE) && channel) { | |
517 | if (!uData_checked) | |
518 | uData = _GetChannelUser(channel->channel_info, user->handle_info, 1, 0), uData_checked = 1; | |
519 | if ((channel->modes & (MODE_INVITEONLY|MODE_KEY|MODE_SECRET)) | |
520 | && !uData | |
521 | && !IsService(user) | |
522 | && !GetUserMode(channel, user)) { | |
523 | if (options & SVCCMD_NOISY) | |
524 | send_message(user, bot, "MCMSG_REQUIRES_JOINABLE", channel->name); | |
525 | return 0; | |
526 | } | |
527 | } | |
528 | if ((flags & MODCMD_TOY) && channel) { | |
529 | if (!channel->channel_info) | |
530 | rflags |= ACTION_NOCHANNEL; | |
531 | else switch (channel->channel_info->chOpts[chToys]) { | |
532 | case 'd': | |
533 | if (options & SVCCMD_NOISY) | |
534 | send_message(user, bot, "MCMSG_TOYS_DISABLED", channel->name); | |
535 | return 0; | |
536 | case 'n': | |
537 | rflags |= ACTION_NOCHANNEL; | |
538 | break; | |
539 | case 'p': | |
540 | break; | |
541 | } | |
542 | } | |
543 | } | |
544 | if (flags & MODCMD_REQUIRE_STAFF) { | |
545 | if (((flags & MODCMD_REQUIRE_OPER) && IsOper(user)) | |
546 | || ((flags & MODCMD_REQUIRE_NETWORK_HELPER) && IsNetworkHelper(user)) | |
547 | || ((flags & MODCMD_REQUIRE_SUPPORT_HELPER) && IsSupportHelper(user))) { | |
548 | /* allow it */ | |
549 | rflags |= ACTION_STAFF; | |
550 | } else { | |
551 | if (options & SVCCMD_NOISY) | |
552 | send_message(user, bot, "MSG_COMMAND_PRIVILEGED", cmd->name); | |
553 | return 0; | |
554 | } | |
555 | } | |
556 | if (flags & MODCMD_REQUIRE_HELPING) { | |
557 | if (!HANDLE_FLAGGED(user->handle_info, HELPING)) { | |
558 | if (options & SVCCMD_NOISY) | |
559 | send_message(user, bot, "MCMSG_MUST_BE_HELPING"); | |
560 | return 0; | |
561 | } | |
562 | rflags |= ACTION_STAFF; | |
563 | } | |
564 | if (cmd->min_opserv_level > 0) { | |
0d16e639 | 565 | if (!oper_has_access(user, bot, cmd->min_opserv_level, !(options & SVCCMD_NOISY))) |
566 | return 0; | |
d76ed9a9 AS |
567 | rflags |= ACTION_STAFF; |
568 | } | |
569 | if (cmd->req_account_flags || cmd->deny_account_flags) { | |
570 | if (!user->handle_info) { | |
571 | if (options & SVCCMD_NOISY) | |
572 | send_message(user, bot, "MSG_AUTHENTICATE"); | |
573 | return 0; | |
574 | } | |
575 | /* Do we want separate or different messages here? */ | |
576 | if ((cmd->req_account_flags & ~user->handle_info->flags) | |
577 | || (cmd->deny_account_flags & user->handle_info->flags)) { | |
578 | if (options & SVCCMD_NOISY) | |
579 | send_message(user, bot, "MSG_COMMAND_PRIVILEGED", cmd->name); | |
580 | return 0; | |
581 | } | |
582 | } | |
583 | ||
584 | /* If it's an override, return a special value. */ | |
585 | if ((flags & MODCMD_REQUIRE_CHANUSER) | |
586 | && (options & SVCCMD_NOISY) | |
0d16e639 | 587 | && (!uData || (uData->access > 500)) |
d76ed9a9 AS |
588 | && (!(uData = _GetChannelUser(channel->channel_info, user->handle_info, 0, 0)) |
589 | || uData->access < cmd->min_channel_access) | |
590 | && !(flags & (MODCMD_REQUIRE_STAFF|MODCMD_REQUIRE_HELPING))) { | |
591 | rflags |= ACTION_OVERRIDE; | |
592 | } | |
593 | return rflags | ACTION_ALLOW; | |
594 | } | |
595 | ||
596 | static int | |
463e23c9 | 597 | svccmd_expand_alias(struct svccmd *cmd, struct userNode *user, unsigned int old_argc, char *old_argv[], char *new_argv[]) { |
d76ed9a9 | 598 | unsigned int ii, new_argc; |
ee2291da | 599 | char *arg, *altarg; |
d76ed9a9 AS |
600 | |
601 | for (ii=new_argc=0; ii<cmd->alias.used; ++ii) { | |
ee2291da | 602 | altarg = NULL; |
d76ed9a9 AS |
603 | arg = cmd->alias.list[ii]; |
604 | if (arg[0] != '$') { | |
605 | new_argv[new_argc++] = arg; | |
606 | continue; | |
607 | } | |
608 | if (arg[1] == '$') { | |
609 | new_argv[new_argc++] = arg + 1; | |
610 | } else if (isdigit(arg[1])) { | |
b1763079 MB |
611 | unsigned int lbound = 0; |
612 | unsigned int ubound = 0; | |
613 | unsigned int jj = 0; | |
d76ed9a9 AS |
614 | char *end_num; |
615 | ||
616 | lbound = strtoul(arg+1, &end_num, 10); | |
617 | switch (end_num[0]) { | |
618 | case 0: ubound = lbound; break; | |
ee2291da MB |
619 | case 'a': |
620 | altarg = (user && user->handle_info) ? user->handle_info->handle : "(account)"; | |
621 | break; | |
622 | case 'n': | |
623 | altarg = user ? user->nick : "(nick)"; | |
624 | break; | |
625 | case 'm': | |
626 | #ifdef WITH_PROTOCOL_P10 | |
627 | altarg = user ? user->numeric : "(numnick)"; | |
628 | #else | |
629 | altarg = "(This ircd protocol has no numnicks!)"; | |
630 | #endif | |
631 | break; | |
d76ed9a9 AS |
632 | case '-': |
633 | if (end_num[1] == 0) { | |
634 | ubound = old_argc - 1; | |
635 | break; | |
636 | } else if (isdigit(end_num[1])) { | |
637 | ubound = strtoul(end_num+1, NULL, 10); | |
638 | break; | |
639 | } | |
640 | /* else fall through to default case */ | |
641 | default: | |
642 | log_module(MAIN_LOG, LOG_ERROR, "Alias expansion parse error in %s (near %s; %s.%s arg %d).", arg, end_num, cmd->parent->bot->nick, cmd->name, ii); | |
643 | return 0; | |
644 | } | |
ee2291da MB |
645 | if (altarg != NULL) { |
646 | if (end_num[1] != 0) { | |
647 | if ((end_num[1] == '-') && (end_num[2] == 0)) | |
648 | ubound = old_argc - 1; | |
649 | else if ((end_num[1] == '-') && (isdigit(end_num[2]))) | |
650 | ubound = strtoul(end_num+2, NULL, 10); | |
651 | else { | |
652 | log_module(MAIN_LOG, LOG_ERROR, "Alias expansion parse error in %s (near %s; %s.%s arg %d).", arg, end_num, cmd->parent->bot->nick, cmd->name, ii); | |
653 | return 0; | |
654 | } | |
655 | } else { | |
656 | ubound = lbound; | |
657 | } | |
658 | if (lbound >= old_argc) | |
659 | new_argv[new_argc++] = altarg; | |
660 | } | |
d76ed9a9 AS |
661 | if (ubound >= old_argc) |
662 | ubound = old_argc - 1; | |
663 | if (lbound < old_argc) | |
664 | for (jj = lbound; jj <= ubound; ) | |
665 | new_argv[new_argc++] = old_argv[jj++]; | |
666 | } else { | |
463e23c9 | 667 | switch(arg[1]) { |
668 | case 'a': | |
669 | new_argv[new_argc++] = (user && user->handle_info) ? user->handle_info->handle : "(account)"; | |
670 | break; | |
671 | case 'n': | |
672 | new_argv[new_argc++] = user ? user->nick : "(nick)"; | |
673 | break; | |
674 | case 'm': | |
675 | #ifdef WITH_PROTOCOL_P10 | |
676 | new_argv[new_argc++] = user ? user->numeric : "(numnick)"; | |
677 | #else | |
678 | new_argv[new_argc++] = "(This ircd protocol has no numnicks!)"; | |
679 | #endif | |
680 | break; | |
681 | default: | |
682 | log_module(MAIN_LOG, LOG_ERROR, "Alias expansion: I do not know how to handle %s (%s.%s arg %d).", arg, cmd->parent->bot->nick, cmd->name, ii); | |
683 | return 0; | |
684 | } | |
d76ed9a9 AS |
685 | } |
686 | } | |
687 | return new_argc; | |
688 | } | |
689 | ||
690 | int | |
691 | svccmd_invoke_argv(struct userNode *user, struct service *service, struct chanNode *channel, unsigned int argc, char *argv[], unsigned int server_qualified) { | |
692 | extern struct userNode *chanserv; | |
693 | struct svccmd *cmd; | |
1136f709 | 694 | unsigned int cmd_arg, perms, flags, options, result; |
d76ed9a9 | 695 | char channel_name[CHANNELLEN+1]; |
ab26b178 | 696 | char *new_argv[MAXNUMPARAMS]; /* for aliases */ |
d76ed9a9 | 697 | |
d76ed9a9 AS |
698 | options = (server_qualified ? SVCCMD_QUALIFIED : 0) | SVCCMD_DEBIT | SVCCMD_NOISY; |
699 | /* Find the command argument. */ | |
700 | cmd_arg = IsChannelName(argv[0]) ? 1 : 0; | |
701 | if (argc < cmd_arg+1) { | |
702 | send_message(user, service->bot, "MCMSG_MISSING_COMMAND"); | |
703 | return 0; | |
704 | } | |
705 | if (!isalnum(*argv[cmd_arg])) { | |
706 | /* Silently ignore stuff that doesn't begin with a letter or number. */ | |
707 | return 0; | |
708 | } | |
709 | cmd = dict_find(service->commands, argv[cmd_arg], NULL); | |
710 | if (!cmd) { | |
711 | if (!channel) | |
712 | send_message(user, service->bot, "MSG_COMMAND_UNKNOWN", argv[cmd_arg]); | |
713 | return 0; | |
714 | } | |
827ecd60 AS |
715 | |
716 | /* Check pubcmd for the channel. */ | |
717 | if (channel && (channel->channel_info) && (service->bot == chanserv) | |
718 | && !check_user_level(channel, user, lvlPubCmd, 1, 0)) { | |
719 | send_message(user, service->bot, "MCMSG_PUBLIC_DENY", channel->name); | |
720 | return 0; | |
721 | } | |
722 | ||
d76ed9a9 AS |
723 | flags = cmd->effective_flags; |
724 | /* If they put a channel name first, check if the command allows | |
725 | * it. If so, swap it with the command name. | |
726 | */ | |
727 | if (cmd_arg == 1) { | |
728 | char *tmp; | |
729 | /* Complain if we're not supposed to accept the channel. */ | |
730 | if (!(flags & MODCMD_ACCEPT_CHANNEL)) { | |
731 | send_message(user, service->bot, "MCMSG_NO_CHANNEL_BEFORE"); | |
732 | return 0; | |
733 | } | |
734 | if (!(flags & MODCMD_ACCEPT_PCHANNEL) | |
735 | && (argv[0][0] == '+')) { | |
736 | send_message(user, service->bot, "MCMSG_NO_PLUS_CHANNEL"); | |
737 | return 0; | |
738 | } | |
739 | tmp = argv[1]; | |
740 | argv[1] = argv[0]; | |
741 | argv[0] = tmp; | |
742 | } | |
743 | ||
744 | /* Try to grab a channel handle before alias expansion. | |
745 | * If the command accepts a channel name, and argv[1] is | |
746 | * one, use it as a channel name, and hide it from logging. | |
747 | */ | |
748 | if ((argc > 1) | |
749 | && (flags & MODCMD_ACCEPT_CHANNEL) | |
750 | && IsChannelName(argv[1]) | |
751 | && ((argv[1][0] != '+') || (flags & MODCMD_ACCEPT_PCHANNEL)) | |
752 | && (channel = dict_find(channels, argv[1], NULL))) { | |
753 | argv[1] = argv[0]; | |
754 | argv++, argc--; | |
755 | cmd_arg = 1; | |
756 | } | |
757 | ||
758 | /* Expand the alias arguments, if there are any. */ | |
759 | if (cmd->alias.used) { | |
1136f709 | 760 | int res; |
761 | ||
463e23c9 | 762 | res = svccmd_expand_alias(cmd, user, argc, argv, new_argv); |
1136f709 | 763 | if (res < 0) { |
764 | send_message(user, service->bot, "MSG_MISSING_PARAMS", cmd->name); | |
765 | return 0; | |
766 | } else if (res == 0) { | |
33741441 | 767 | send_message(user, service->bot, "MCMSG_ALIAS_ERROR", cmd->name); |
d76ed9a9 AS |
768 | return 0; |
769 | } | |
1136f709 | 770 | argc = res; |
d76ed9a9 AS |
771 | argv = new_argv; |
772 | ||
773 | /* Try again to grab a handle to the channel after alias | |
774 | * expansion, overwriting any previous channel. This should, | |
775 | * of course, only be done again if an alias was acually | |
776 | * expanded. */ | |
777 | if ((argc > 1) | |
778 | && (flags & MODCMD_ACCEPT_CHANNEL) | |
779 | && IsChannelName(argv[1]) | |
780 | && ((argv[1][0] != '+') || (flags & MODCMD_ACCEPT_PCHANNEL)) | |
781 | && (channel = dict_find(channels, argv[1], NULL))) { | |
782 | argv[1] = argv[0]; | |
783 | argv++, argc--; | |
784 | cmd_arg = 1; | |
785 | } | |
786 | } | |
787 | ||
788 | /* Figure out what actions we should do for it.. */ | |
789 | if (cmd_arg && (flags & MODCMD_TOY)) { | |
790 | /* Do not let user manually specify a channel. */ | |
791 | channel = NULL; | |
792 | } | |
793 | if (argc < cmd->command->min_argc) { | |
794 | send_message(user, service->bot, "MSG_MISSING_PARAMS", cmd->name); | |
567a5f26 | 795 | svccmd_send_help_brief(user, service->bot, cmd); |
d76ed9a9 AS |
796 | return 0; |
797 | } | |
798 | if (!cmd->command->func) { | |
799 | send_message(user, service->bot, "MCMSG_INTERNAL_COMMAND", cmd->name); | |
800 | return 0; | |
801 | } | |
802 | perms = svccmd_can_invoke(user, service->bot, cmd, channel, options); | |
803 | if (!perms) | |
804 | return 0; | |
805 | cmd->uses++; | |
806 | if (perms & ACTION_NOCHANNEL) | |
807 | channel = NULL; | |
808 | ||
809 | if (channel) | |
810 | safestrncpy(channel_name, channel->name, sizeof(channel_name)); | |
811 | else | |
812 | channel_name[0] = 0; | |
ab26b178 AS |
813 | |
814 | /* Call the function here */ | |
815 | if (!(result = cmd->command->func(user, channel, argc, argv, cmd))) | |
d76ed9a9 | 816 | return 0; |
ab26b178 | 817 | |
d76ed9a9 AS |
818 | if (!(flags & MODCMD_NO_LOG)) { |
819 | enum log_severity slvl; | |
1136f709 | 820 | if (result & CMD_LOG_OVERRIDE) |
821 | slvl = LOG_OVERRIDE; | |
822 | else if ((perms & ACTION_STAFF) || (result & CMD_LOG_STAFF)) | |
d76ed9a9 AS |
823 | slvl = LOG_STAFF; |
824 | else if (perms & ACTION_OVERRIDE) | |
825 | slvl = LOG_OVERRIDE; | |
826 | else | |
827 | slvl = LOG_COMMAND; | |
828 | /* Unsplit argv after running the function to get the benefit | |
829 | * of any mangling/hiding done by the commands. */ | |
2187a4e3 | 830 | log_audit(cmd->command->parent->clog, slvl, user, service->bot, channel_name, AUDIT_HOSTMASK, unsplit_string(argv, argc, NULL)); |
d76ed9a9 AS |
831 | } |
832 | return 1; | |
833 | } | |
834 | ||
b1bf690d | 835 | /* First line (syntax usually) only help.. used for wrong param counts etc */ |
fc8798ec | 836 | int |
567a5f26 | 837 | svccmd_send_help_brief(struct userNode *user, struct userNode *bot, struct svccmd *cmd) { |
fc8798ec | 838 | int r; |
fc8798ec | 839 | |
180e0971 AS |
840 | /* If it's an alias, show what it's an alias for. */ |
841 | if (cmd->alias.used) { | |
842 | char alias_text[MAXLEN]; | |
843 | unsplit_string((char**)cmd->alias.list, cmd->alias.used, alias_text); | |
844 | send_message(user, bot, "MCMSG_COMMAND_ALIASES", cmd->name, cmd->command->name); | |
845 | } | |
b1bf690d | 846 | /* Send the syntax line of help.. */ |
567a5f26 | 847 | r = send_help_brief(user, bot, cmd->command->parent->helpfile, cmd->name); |
180e0971 AS |
848 | if(!r) { |
849 | if(cmd->command->name) | |
850 | { | |
4cf6e271 | 851 | send_message(user, bot, "MCMSG_COMMAND_ALIASES", cmd->name, cmd->command->name); |
180e0971 AS |
852 | r = send_help_brief(user, bot, cmd->command->parent->helpfile, cmd->command->name); |
853 | } | |
854 | } | |
fc8798ec AS |
855 | return r; |
856 | } | |
857 | ||
6aae9404 AS |
858 | int is_joiner(struct svccmd *cmd) |
859 | { | |
860 | if(cmd->command->name) | |
861 | { | |
862 | if(strcasecmp("joiner", cmd->command->name)) | |
863 | return(0); | |
864 | else | |
865 | return(1); | |
866 | } | |
867 | return(0); | |
868 | /* | |
869 | if(cmd->alias.used) | |
870 | { | |
871 | char alias_text[MAXLEN]; | |
872 | unsplit_string((char**)cmd->alias.list, cmd->alias.used, alias_text); | |
873 | if(strcasecmp("joiner", alias_text)) | |
874 | return(0); | |
875 | else | |
876 | return(1); | |
877 | } | |
878 | */ | |
879 | } | |
880 | ||
d76ed9a9 | 881 | int |
b1bf690d | 882 | svccmd_send_help(struct userNode *user, struct service *service, const char *topic) { |
d76ed9a9 AS |
883 | struct module *module; |
884 | struct svccmd *cmd; | |
b1bf690d | 885 | char cmdname[MAXLEN]; |
ed05669c | 886 | unsigned int nn, ii; |
1d957482 | 887 | int helpsent = 0; |
4048352e AS |
888 | |
889 | /* If there is no topic show the index */ | |
d76ed9a9 AS |
890 | if (!topic) |
891 | topic = "<index>"; | |
b1bf690d AS |
892 | /* make heading str (uppercase) */ |
893 | for (nn=0; topic[nn]; nn++) | |
894 | cmdname[nn] = toupper(topic[nn]); | |
895 | cmdname[nn] = 0; | |
896 | ||
6aae9404 AS |
897 | /* If there is a command 'topic', send command help for the command (unless its bound to JOINER) */ |
898 | if ((cmd = dict_find(service->commands, topic, NULL)) && !is_joiner(cmd)) | |
b1bf690d AS |
899 | { |
900 | send_message(user, service->bot, "MCMSG_HELP_COMMAND_HEADER", cmdname); | |
901 | send_message(user, service->bot, "MCMSG_HELP_DIVIDER"); | |
1d957482 | 902 | helpsent = send_help(user, service->bot, cmd->command->parent->helpfile, cmd->name); |
b1bf690d AS |
903 | |
904 | /* Show if its an alias, or a binding of another command */ | |
905 | if (cmd->alias.used) | |
906 | { | |
907 | char alias_text[MAXLEN]; | |
908 | unsplit_string((char**)cmd->alias.list, cmd->alias.used, alias_text); | |
909 | send_message(user, service->bot, "MCMSG_HELP_COMMAND_ALIAS", alias_text); | |
1d957482 AS |
910 | /* If send_help above didnt work, try again with the referenced command.. */ |
911 | if(!helpsent) | |
912 | helpsent = send_help(user, service->bot, cmd->command->parent->helpfile, alias_text); | |
b1bf690d AS |
913 | } |
914 | else if(cmd->command->name && strcasecmp(cmd->command->name, cmd->name)) | |
915 | { | |
916 | send_message(user, service->bot, "MCMSG_HELP_COMMAND_ALIAS", cmd->command->name); | |
1d957482 AS |
917 | /* If send_help above didnt work, try again with the referenced command.. */ |
918 | if(!helpsent) | |
919 | helpsent = send_help(user, service->bot, cmd->command->parent->helpfile, cmd->command->name); | |
b1bf690d | 920 | } |
1d957482 AS |
921 | /* If send_help still couldnt find it, tell them sorry */ |
922 | if(!helpsent) | |
ed05669c | 923 | send_message(user, service->bot, "MCMSG_HELP_COMMAND_UNKNOWN"); |
b1bf690d AS |
924 | send_message(user, service->bot, "MCMSG_HELP_FOOTER"); |
925 | return true; | |
926 | } | |
927 | else /* look for topic in the help files loaded to this nick/service */ | |
928 | { | |
ed05669c AS |
929 | /* Check for non command help in first primary help file, then next and so on */ |
930 | /* Note - we need to think about default bindings. see opserv.helpfiles */ | |
931 | for(ii = 0; ii < service->modules.used; ii++) | |
b1bf690d | 932 | { |
ed05669c AS |
933 | module = service->modules.list[ii]; |
934 | if(!module->helpfile) | |
935 | continue; | |
936 | if(dict_find(module->helpfile->db, topic, NULL)) | |
937 | { | |
938 | if (module->helpfile && dict_find(module->helpfile->db, topic, NULL)) | |
939 | { | |
940 | ||
941 | send_message(user, service->bot, "MCMSG_HELP_TOPIC_HEADER", cmdname); | |
942 | send_message(user, service->bot, "MCMSG_HELP_DIVIDER"); | |
943 | /* This should never fail but maybe if something is odd? */ | |
944 | if(!send_help(user, service->bot, module->helpfile, topic)) | |
945 | send_message(user, service->bot, "MSG_TOPIC_UNKNOWN"); | |
946 | send_message(user, service->bot, "MCMSG_HELP_FOOTER"); | |
947 | return true; | |
948 | } | |
949 | } | |
b1bf690d | 950 | } |
d76ed9a9 | 951 | } |
4048352e | 952 | /* Otherwise say we cant find it */ |
d76ed9a9 AS |
953 | send_message(user, service->bot, "MSG_TOPIC_UNKNOWN"); |
954 | return 0; | |
955 | } | |
956 | ||
957 | static int | |
f5b217c4 | 958 | svccmd_invoke(struct userNode *user, struct service *service, struct chanNode *channel, const char *text, int server_qualified, int chanmsg) { |
d76ed9a9 AS |
959 | unsigned int argc; |
960 | char *argv[MAXNUMPARAMS]; | |
1136f709 | 961 | char tmpline[MAXLEN]; |
d76ed9a9 AS |
962 | |
963 | if (!*text) | |
964 | return 0; | |
965 | if (service->privileged) { | |
f5b217c4 MB |
966 | /* Silently return if the message is a channel message (trigger) */ |
967 | if (chanmsg && (!IsOper(user) || !user->handle_info || HANDLE_FLAGGED(user->handle_info, OPER_SUSPENDED))) | |
968 | return 0; | |
d76ed9a9 AS |
969 | if (!IsOper(user)) { |
970 | send_message(user, service->bot, "MSG_SERVICE_PRIVILEGED", service->bot->nick); | |
971 | return 0; | |
972 | } | |
973 | if (!user->handle_info) { | |
974 | send_message(user, service->bot, "MSG_AUTHENTICATE"); | |
975 | return 0; | |
976 | } | |
977 | if (HANDLE_FLAGGED(user->handle_info, OPER_SUSPENDED)) { | |
978 | send_message(user, service->bot, "MSG_OPER_SUSPENDED"); | |
979 | return 0; | |
980 | } | |
981 | } | |
1136f709 | 982 | safestrncpy(tmpline, text, sizeof(tmpline)); |
983 | argc = split_line(tmpline, false, ArrayLength(argv), argv); | |
d76ed9a9 AS |
984 | return argc ? svccmd_invoke_argv(user, service, channel, argc, argv, server_qualified) : 0; |
985 | } | |
986 | ||
987 | void | |
1136f709 | 988 | modcmd_privmsg(struct userNode *user, struct userNode *bot, const char *text, int server_qualified) { |
d76ed9a9 AS |
989 | struct service *service; |
990 | ||
991 | if (!(service = dict_find(services, bot->nick, NULL))) { | |
992 | log_module(MAIN_LOG, LOG_ERROR, "modcmd_privmsg got privmsg for unhandled service %s, unregistering.", bot->nick); | |
993 | reg_privmsg_func(bot, NULL); | |
994 | return; | |
995 | } | |
996 | ||
997 | if (text[0] == '\x01') { | |
998 | char *term, response[MAXLEN]; | |
999 | ||
1000 | text++; /* Skip leading ^A. */ | |
1001 | /* Chop off final ^A. */ | |
1002 | term = strchr(text, '\x01'); | |
1003 | if (!term) | |
1004 | return; | |
1005 | *term = '\0'; | |
1006 | /* Parse out leading text. */ | |
1007 | term = strchr(text, ' '); | |
1008 | if (term) { | |
1009 | *term++ = '\0'; | |
1010 | if (!*term) | |
1011 | term = NULL; | |
1012 | } | |
1013 | /* No dict lookup since these are so few. */ | |
1014 | if (!irccasecmp(text, "CLIENTINFO")) { | |
1015 | /* Use \001 instead of \x01 because apparently \x01C is | |
1016 | * interpreted as ASCII FS (\034, decimal 28, hex 1C). | |
1017 | */ | |
1018 | irc_notice_user(bot, user, "\001CLIENTINFO CLIENTINFO PING TIME USERINFO VERSION\x01"); | |
1019 | } else if (!irccasecmp(text, "PING")) { | |
1020 | if (term) { | |
ec1a68c8 | 1021 | snprintf(response, sizeof(response), "\x01PING %s\x01", term); |
d76ed9a9 AS |
1022 | irc_notice_user(bot, user, response); |
1023 | } else { | |
ec1a68c8 | 1024 | irc_notice_user(bot,user, "\x01PING\x01"); |
d76ed9a9 AS |
1025 | } |
1026 | } else if (!irccasecmp(text, "TIME")) { | |
1027 | struct tm tm; | |
1028 | localtime_r(&now, &tm); | |
1029 | strftime(response, sizeof(response), "\x01TIME %a %b %d %H:%M:%S %Y\x01", &tm); | |
1030 | irc_notice_user(bot, user, response); | |
1031 | } else if (!irccasecmp(text, "USERINFO")) { | |
1032 | snprintf(response, sizeof(response), "\x01USERINFO %s\x01", bot->info); | |
1033 | irc_notice_user(bot, user, response); | |
1034 | } else if (!irccasecmp(text, "VERSION")) { | |
cc6339ac | 1035 | snprintf(response, sizeof(response), "\x01VERSION %s+[%s]\x01", PACKAGE_STRING, cvs_version); |
d76ed9a9 | 1036 | irc_notice_user(bot, user, response); |
23475fc6 | 1037 | } else if (!irccasecmp(text, "GENDER")) { |
1038 | snprintf(response, sizeof(response), "\x01GENDER ummm im still deciding\x01"); | |
1039 | irc_notice_user(bot, user, response); | |
d76ed9a9 AS |
1040 | } |
1041 | return; | |
1042 | } | |
1043 | ||
1044 | if (service->msg_hook && service->msg_hook(user, bot, text, server_qualified)) | |
1045 | return; | |
f5b217c4 | 1046 | svccmd_invoke(user, service, NULL, text, server_qualified, 0); |
d76ed9a9 AS |
1047 | } |
1048 | ||
1049 | void | |
1c14af0b | 1050 | modcmd_chanmsg(struct userNode *user, struct chanNode *chan, const char *text, struct userNode *bot, unsigned int is_notice, UNUSED_ARG(void *extra)) { |
d76ed9a9 | 1051 | struct service *service; |
1136f709 | 1052 | if (!(service = dict_find(services, bot->nick, NULL))) |
1053 | return; | |
f5b217c4 | 1054 | svccmd_invoke(user, service, chan, text, 0, 1); |
1136f709 | 1055 | (void)is_notice; |
d76ed9a9 AS |
1056 | } |
1057 | ||
1058 | struct service * | |
1059 | service_register(struct userNode *bot) { | |
1060 | struct service *service; | |
1061 | if ((service = dict_find(services, bot->nick, NULL))) | |
1062 | return service; | |
1063 | service = calloc(1, sizeof(*service)); | |
1064 | module_list_init(&service->modules); | |
1065 | service->commands = dict_new(); | |
1066 | service->bot = bot; | |
1067 | dict_set_free_data(service->commands, free_service_command); | |
1068 | dict_insert(services, service->bot->nick, service); | |
1069 | reg_privmsg_func(bot, modcmd_privmsg); | |
1070 | return service; | |
1071 | } | |
1072 | ||
1073 | struct service * | |
1074 | service_find(const char *name) { | |
1075 | return dict_find(services, name, NULL); | |
1076 | } | |
1077 | ||
1078 | static void | |
1079 | svccmd_insert(struct service *service, char *name, struct svccmd *svccmd, struct modcmd *modcmd) { | |
1080 | unsigned int ii; | |
1081 | svccmd->parent = service; | |
1082 | svccmd->name = name; | |
1083 | svccmd->command = modcmd; | |
1084 | svccmd->command->bind_count++; | |
1085 | dict_insert(service->commands, svccmd->name, svccmd); | |
1086 | for (ii=0; ii<service->modules.used; ++ii) { | |
1087 | if (service->modules.list[ii] == svccmd->command->parent) break; | |
1088 | } | |
1089 | if (ii == service->modules.used) { | |
1090 | module_list_append(&service->modules, svccmd->command->parent); | |
1091 | } | |
1092 | } | |
1093 | ||
1094 | struct svccmd * | |
1095 | service_bind_modcmd(struct service *service, struct modcmd *cmd, const char *name) { | |
1096 | struct svccmd *svccmd; | |
1097 | if ((svccmd = dict_find(service->commands, name, NULL))) { | |
1098 | if (svccmd->command == cmd) return svccmd; | |
1099 | log_module(MAIN_LOG, LOG_ERROR, "Tried to bind command %s.%s into service %s as %s, but already bound (as %s.%s).", cmd->parent->name, cmd->name, service->bot->nick, name, svccmd->command->parent->name, svccmd->command->name); | |
1100 | return NULL; | |
1101 | } | |
1102 | svccmd = calloc(1, sizeof(*svccmd)); | |
1103 | svccmd_insert(service, strdup(name), svccmd, cmd); | |
1104 | svccmd_copy_rules(svccmd, cmd->defaults); | |
1105 | return svccmd; | |
1106 | } | |
1107 | ||
1108 | static unsigned int | |
1109 | service_bind_module(struct service *service, struct module *module) { | |
1110 | dict_iterator_t it; | |
1111 | struct modcmd *modcmd; | |
1112 | unsigned int count; | |
1113 | ||
1114 | count = 0; | |
1115 | for (it = dict_first(module->commands); it; it = iter_next(it)) { | |
1116 | modcmd = iter_data(it); | |
1117 | if (!((modcmd->flags | modcmd->defaults->flags) & MODCMD_NO_DEFAULT_BIND)) | |
1118 | if (service_bind_modcmd(service, modcmd, iter_key(it))) | |
1119 | count++; | |
1120 | } | |
1121 | return count; | |
1122 | } | |
1123 | ||
1124 | /* This MUST return argc if the alias expansion code knows how to deal | |
1125 | * with every argument in argv; otherwise, it MUST return the index of | |
1126 | * an argument that the expansion code does not know how to deal with. | |
1127 | */ | |
1128 | static unsigned int | |
1129 | check_alias_args(char *argv[], unsigned int argc) { | |
1130 | unsigned int arg; | |
1131 | ||
1132 | for (arg=0; arg<argc; ++arg) { | |
1133 | if (argv[arg][0] != '$') { | |
1134 | continue; | |
1135 | } else if (argv[arg][1] == '$') { | |
1136 | continue; | |
1137 | } else if (isdigit(argv[arg][1])) { | |
1138 | char *end_num; | |
1139 | ||
bde4a337 | 1140 | strtoul(argv[arg]+1, &end_num, 10); |
d76ed9a9 AS |
1141 | switch (end_num[0]) { |
1142 | case 0: | |
1143 | continue; | |
ee2291da MB |
1144 | case 'a': |
1145 | case 'n': | |
1146 | case 'm': | |
1147 | if (end_num[1] == 0) | |
1148 | continue; | |
1149 | else if (end_num[1] == '-') | |
1150 | end_num++; | |
1151 | else | |
1152 | return arg; | |
d76ed9a9 AS |
1153 | case '-': |
1154 | if (end_num[1] == 0) | |
1155 | continue; | |
1156 | else if (isdigit(end_num[1])) | |
1157 | continue; | |
1158 | /* else fall through to default case */ | |
1159 | default: | |
1160 | return arg; | |
1161 | } | |
33741441 AS |
1162 | } else { |
1163 | switch(argv[arg][1]) { | |
1164 | case 'a': | |
1165 | case 'n': | |
1166 | case 'm': | |
1167 | continue; | |
1168 | default: | |
1169 | return arg; | |
1170 | } | |
1171 | } | |
d76ed9a9 AS |
1172 | } |
1173 | return arg; | |
1174 | } | |
1175 | ||
1176 | static unsigned int | |
1177 | collapse_cmdname(char *argv[], unsigned int argc, char *dest) { | |
1178 | unsigned int ii, pos, arg; | |
1179 | if (!argc) { | |
1180 | dest[0] = 0; | |
1181 | return 0; | |
1182 | } | |
1183 | for (ii=pos=0, arg=0; argv[arg][ii]; ) { | |
1184 | if (argv[arg][ii] == '\\') { | |
1185 | if (argv[arg][ii+1]) { | |
1186 | /* escaping a real character just puts it in literally */ | |
1187 | dest[pos++] = argv[arg][++ii]; | |
1188 | } else if ((arg+1) == argc) { | |
1189 | /* we ran to the end of the argument list; abort */ | |
1190 | break; | |
1191 | } else { | |
1192 | /* escape at end of a word is a space */ | |
1193 | dest[pos++] = ' '; | |
1194 | ii = 0; | |
1195 | arg++; | |
1196 | } | |
1197 | } else { | |
1198 | /* normal characters don't need escapes */ | |
1199 | dest[pos++] = argv[arg][ii++]; | |
1200 | } | |
1201 | } | |
1202 | dest[pos] = 0; | |
1203 | return arg + 1; | |
1204 | } | |
1205 | ||
1206 | static MODCMD_FUNC(cmd_bind) { | |
1207 | struct service *service; | |
1208 | struct svccmd *template, *newcmd; | |
1209 | char *svcname, *dot; | |
1210 | char newname[MAXLEN], cmdname[MAXLEN]; | |
1211 | unsigned int arg, diff; | |
1212 | ||
1213 | assert(argc > 3); | |
1214 | svcname = argv[1]; | |
1215 | arg = collapse_cmdname(argv+2, argc-2, newname) + 2; | |
1216 | if (!arg) { | |
1217 | reply("MSG_MISSING_PARAMS", cmd->name); | |
1218 | return 0; | |
1219 | } | |
1220 | diff = collapse_cmdname(argv+arg, argc-arg, cmdname); | |
1221 | if (!diff) { | |
1222 | reply("MSG_MISSING_PARAMS", cmd->name); | |
1223 | return 0; | |
1224 | } | |
1225 | arg += diff; | |
1226 | ||
1227 | if (!(service = service_find(svcname))) { | |
1228 | reply("MCMSG_UNKNOWN_SERVICE", svcname); | |
1229 | return 0; | |
1230 | } | |
1231 | ||
1232 | if ((newcmd = dict_find(service->commands, newname, NULL))) { | |
1233 | reply("MCMSG_ALREADY_BOUND", service->bot->nick, newname); | |
1234 | return 0; | |
1235 | } | |
1236 | ||
1237 | if ((dot = strchr(cmdname, '.')) && (dot[1] == '*') && (dot[2] == 0)) { | |
1238 | unsigned int count; | |
1239 | struct module *module; | |
1240 | *dot = 0; | |
1241 | module = module_find((cmdname[0] == '*') ? cmdname+1 : cmdname); | |
1242 | if (!module) { | |
1243 | reply("MSG_MODULE_UNKNOWN", cmdname); | |
1244 | return 0; | |
1245 | } | |
1246 | count = service_bind_module(service, module); | |
1247 | reply("MCMSG_MODULE_BOUND", count, module->name, service->bot->nick); | |
1248 | return count != 0; | |
1249 | } | |
1250 | newcmd = calloc(1, sizeof(*newcmd)); | |
1251 | newcmd->name = strdup(newname); | |
1252 | newcmd->parent = service; | |
1253 | if (!(template = svccmd_resolve_name(newcmd, cmdname))) { | |
1254 | reply("MCMSG_UNKNOWN_COMMAND_2", cmdname, service->bot->nick); | |
1255 | free(newcmd->name); | |
1256 | free(newcmd); | |
1257 | return 0; | |
1258 | } | |
1259 | if (template->alias.used) { | |
1260 | reply("MCMSG_CANNOT_DOUBLE_ALIAS"); | |
1261 | free(newcmd->name); | |
1262 | free(newcmd); | |
1263 | return 0; | |
1264 | } | |
1265 | ||
1266 | if (argc > arg) { | |
1267 | /* a more complicated alias; fix it up */ | |
1268 | unsigned int nn; | |
1269 | ||
1270 | arg -= diff; | |
1271 | nn = check_alias_args(argv+arg, argc-arg); | |
1272 | if (nn+arg < argc) { | |
1273 | reply("MCMSG_BAD_ALIAS_ARGUMENT", argv[nn+arg]); | |
1274 | free(newcmd->name); | |
1275 | free(newcmd); | |
1276 | return 0; | |
1277 | } | |
1278 | newcmd->alias.used = newcmd->alias.size = argc-arg; | |
1279 | newcmd->alias.list = calloc(newcmd->alias.size, sizeof(newcmd->alias.list[0])); | |
1280 | for (nn=0; nn<newcmd->alias.used; ++nn) | |
1281 | newcmd->alias.list[nn] = strdup(argv[nn+arg]); | |
1282 | } | |
1283 | ||
1284 | svccmd_insert(service, newcmd->name, newcmd, template->command); | |
1285 | svccmd_copy_rules(newcmd, template); | |
1286 | reply("MCMSG_COMMAND_BOUND", newcmd->name, newcmd->parent->bot->nick); | |
1287 | return 1; | |
1288 | } | |
1289 | ||
1290 | static int | |
1291 | service_recheck_bindings(struct service *service, struct module *module) { | |
1292 | dict_iterator_t it; | |
1293 | struct svccmd *cmd; | |
1294 | ||
1295 | for (it = dict_first(service->commands); it; it = iter_next(it)) { | |
1296 | cmd = iter_data(it); | |
1297 | if (cmd->command->parent == module) return 0; | |
1298 | } | |
1299 | /* No more bindings, remove it from our list. */ | |
1300 | module_list_remove(&service->modules, module); | |
1301 | return 1; | |
1302 | } | |
1303 | ||
1304 | static svccmd_unbind_func_t *suf_list; | |
d77556d0 | 1305 | static void **suf_list_extra; |
d76ed9a9 AS |
1306 | unsigned int suf_size, suf_used; |
1307 | ||
1308 | void | |
d77556d0 | 1309 | reg_svccmd_unbind_func(svccmd_unbind_func_t handler, void *extra) { |
d76ed9a9 AS |
1310 | if (suf_used == suf_size) { |
1311 | if (suf_size) { | |
1312 | suf_size <<= 1; | |
1313 | suf_list = realloc(suf_list, suf_size*sizeof(svccmd_unbind_func_t)); | |
d77556d0 | 1314 | suf_list_extra = realloc(suf_list_extra, suf_size*sizeof(void*)); |
d76ed9a9 AS |
1315 | } else { |
1316 | suf_size = 8; | |
1317 | suf_list = malloc(suf_size*sizeof(svccmd_unbind_func_t)); | |
d77556d0 | 1318 | suf_list_extra = malloc(suf_size*sizeof(void*)); |
d76ed9a9 AS |
1319 | } |
1320 | } | |
d77556d0 | 1321 | suf_list[suf_used] = handler; |
1322 | suf_list_extra[suf_used++] = extra; | |
d76ed9a9 AS |
1323 | } |
1324 | ||
1325 | static MODCMD_FUNC(cmd_unbind) { | |
1326 | struct service *service; | |
1327 | struct userNode *bot; | |
1328 | struct svccmd *bound; | |
1329 | struct module *module; | |
1330 | const char *svcname; | |
1331 | unsigned int arg, ii; | |
1332 | char cmdname[MAXLEN]; | |
1333 | ||
1334 | assert(argc > 2); | |
1335 | svcname = argv[1]; | |
1336 | arg = collapse_cmdname(argv+2, argc-2, cmdname) + 2; | |
1337 | if (!arg) { | |
1338 | reply("MSG_MISSING_PARAMS", cmd->name); | |
1339 | return 0; | |
1340 | } | |
1341 | if (!(service = service_find(svcname))) { | |
1342 | reply("MCMSG_UNKNOWN_SERVICE", svcname); | |
1343 | return 0; | |
1344 | } | |
1345 | if (!(bound = dict_find(service->commands, cmdname, NULL))) { | |
1346 | reply("MCMSG_NO_COMMAND_BOUND", service->bot->nick, cmdname); | |
1347 | return 0; | |
1348 | } | |
1349 | if ((bound->command->flags & MODCMD_KEEP_BOUND) && (bound->command->bind_count == 1)) { | |
1350 | reply("MCMSG_UNBIND_PROHIBITED", bound->command->name); | |
1351 | return 0; | |
1352 | } | |
1353 | ||
1354 | for (ii=0; ii<suf_used; ii++) | |
d77556d0 | 1355 | suf_list[ii](bound, suf_list_extra[ii]); |
d76ed9a9 AS |
1356 | /* If this command binding is removing itself, we must take care |
1357 | * not to dereference it after the dict_remove. | |
1358 | */ | |
1359 | bot = cmd->parent->bot; | |
1360 | module = cmd->command->parent; | |
1361 | dict_remove(service->commands, bound->name); | |
1362 | send_message(user, bot, "MCMSG_COMMAND_UNBOUND", cmdname, service->bot->nick); | |
1363 | if (service_recheck_bindings(service, module)) | |
1364 | send_message(user, bot, "MCMSG_HELPFILE_UNBOUND", module->name, module->name); | |
1365 | return 1; | |
1366 | } | |
1367 | ||
1368 | static MODCMD_FUNC(cmd_readhelp) { | |
1369 | const char *modname; | |
1370 | struct module *module; | |
1371 | struct helpfile *old_helpfile; | |
1372 | struct timeval start, stop; | |
1373 | ||
1374 | assert(argc > 1); | |
1375 | modname = argv[1]; | |
1376 | if (!(module = module_find(modname))) { | |
1377 | reply("MSG_MODULE_UNKNOWN", modname); | |
1378 | return 0; | |
1379 | } | |
1380 | if (!module->helpfile_name) { | |
1381 | reply("MCMSG_NO_HELPFILE", module->name); | |
1382 | return 0; | |
1383 | } | |
1384 | old_helpfile = module->helpfile; | |
1385 | gettimeofday(&start, NULL); | |
1386 | module->helpfile = open_helpfile(module->helpfile_name, module->expand_help); | |
1387 | if (!module->helpfile) { | |
1388 | module->helpfile = old_helpfile; | |
1389 | reply("MCMSG_HELPFILE_ERROR", module->helpfile_name); | |
1390 | return 0; | |
1391 | } | |
1392 | if (old_helpfile) close_helpfile(old_helpfile); | |
1393 | gettimeofday(&stop, NULL); | |
1394 | stop.tv_sec -= start.tv_sec; | |
1395 | stop.tv_usec -= start.tv_usec; | |
1396 | if (stop.tv_usec < 0) { | |
6aae9404 AS |
1397 | stop.tv_sec -= 1; |
1398 | stop.tv_usec += 1000000; | |
d76ed9a9 AS |
1399 | } |
1400 | reply("MCMSG_HELPFILE_READ", module->name, stop.tv_sec, stop.tv_usec/1000); | |
1401 | return 1; | |
1402 | } | |
1403 | ||
1404 | static MODCMD_FUNC(cmd_help) { | |
1405 | const char *topic; | |
1406 | ||
1407 | topic = (argc < 2) ? NULL : unsplit_string(argv+1, argc-1, NULL); | |
b1bf690d | 1408 | return svccmd_send_help(user, cmd->parent, topic); |
d76ed9a9 AS |
1409 | } |
1410 | ||
1411 | static MODCMD_FUNC(cmd_timecmd) { | |
1412 | struct timeval start, stop; | |
1413 | char cmd_text[MAXLEN]; | |
1414 | ||
1415 | unsplit_string(argv+1, argc-1, cmd_text); | |
1416 | gettimeofday(&start, NULL); | |
f5b217c4 | 1417 | svccmd_invoke(user, cmd->parent, channel, cmd_text, 0, 0); |
d76ed9a9 AS |
1418 | gettimeofday(&stop, NULL); |
1419 | stop.tv_sec -= start.tv_sec; | |
1420 | stop.tv_usec -= start.tv_usec; | |
1421 | if (stop.tv_usec < 0) { | |
6aae9404 AS |
1422 | stop.tv_sec -= 1; |
1423 | stop.tv_usec += 1000000; | |
d76ed9a9 AS |
1424 | } |
1425 | reply("MCMSG_COMMAND_TIME", cmd_text, stop.tv_sec, stop.tv_usec); | |
1426 | return 1; | |
1427 | } | |
1428 | ||
1429 | static MODCMD_FUNC(cmd_command) { | |
1430 | struct svccmd *svccmd; | |
1431 | const char *cmd_name, *fmt_str; | |
1432 | unsigned int flags, shown_flags, nn, pos; | |
1433 | char buf[MAXLEN]; | |
1434 | ||
1435 | assert(argc >= 2); | |
1436 | cmd_name = unsplit_string(argv+1, argc-1, NULL); | |
1437 | if (!(svccmd = svccmd_resolve_name(cmd, cmd_name))) { | |
1438 | reply("MCMSG_UNKNOWN_COMMAND_2", cmd_name, cmd->parent->bot->nick); | |
1439 | return 0; | |
1440 | } | |
1441 | pos = snprintf(buf, sizeof(buf), "%s.%s", svccmd->command->parent->name, svccmd->command->name); | |
1442 | if (svccmd->alias.used) { | |
1443 | buf[pos++] = ' '; | |
1444 | unsplit_string((char**)svccmd->alias.list+1, svccmd->alias.used-1, buf+pos); | |
1445 | reply("MCMSG_COMMAND_ALIASES", svccmd->name, buf); | |
1446 | } else { | |
1447 | reply("MCMSG_COMMAND_BINDING", svccmd->name, buf); | |
1448 | } | |
1449 | flags = svccmd->effective_flags; | |
1450 | if ((svccmd->parent && svccmd->parent->privileged && !IsOper(user)) | |
1451 | || ((flags & MODCMD_REQUIRE_STAFF) | |
1452 | && !IsOper(user) && !IsNetworkHelper(user) && !IsSupportHelper(user))) { | |
1453 | reply("MCMSG_INSPECTION_REFUSED", svccmd->name); | |
1454 | return 0; | |
1455 | } | |
1456 | if (flags & MODCMD_DISABLED) { | |
1457 | reply("MSG_COMMAND_DISABLED", svccmd->name); | |
1458 | return 1; | |
1459 | } | |
1460 | shown_flags = 0; | |
1461 | if (svccmd->min_opserv_level > 0) { | |
1462 | reply("MCMSG_NEED_OPSERV_LEVEL", svccmd->min_opserv_level); | |
1463 | shown_flags |= MODCMD_REQUIRE_OPER | MODCMD_REQUIRE_AUTHED; | |
1464 | } | |
1465 | if (svccmd->min_channel_access > 0) { | |
1466 | reply("MCMSG_NEED_CHANSERV_LEVEL", svccmd->min_channel_access); | |
1467 | shown_flags |= MODCMD_REQUIRE_CHANUSER | MODCMD_REQUIRE_REGCHAN | MODCMD_REQUIRE_CHANNEL | MODCMD_REQUIRE_AUTHED; | |
1468 | } | |
1469 | if (svccmd->req_account_flags) { | |
1470 | for (nn=pos=0; nn<32; nn++) { | |
1471 | if (!(svccmd->req_account_flags & (1 << nn))) continue; | |
1472 | buf[pos++] = HANDLE_FLAGS[nn]; | |
1473 | } | |
1474 | buf[pos] = 0; | |
1475 | reply("MCMSG_NEED_ACCOUNT_FLAGS", buf); | |
1476 | shown_flags |= MODCMD_REQUIRE_AUTHED; | |
1477 | } | |
1478 | if (!flags && !shown_flags) { | |
1479 | reply("MCMSG_NEED_NOTHING", svccmd->name); | |
1480 | return 1; | |
1481 | } | |
1482 | if (flags & ~shown_flags & MODCMD_REQUIRE_HELPING) { | |
1483 | reply("MCMSG_MUST_BE_HELPING"); | |
1484 | shown_flags |= MODCMD_REQUIRE_AUTHED | MODCMD_REQUIRE_STAFF; | |
1485 | } | |
1486 | if (flags & ~shown_flags & MODCMD_REQUIRE_STAFF) { | |
1487 | switch (flags & MODCMD_REQUIRE_STAFF) { | |
1488 | default: case MODCMD_REQUIRE_STAFF: | |
1489 | fmt_str = "MCMSG_NEED_STAFF_ACCESS"; | |
1490 | break; | |
1491 | case MODCMD_REQUIRE_OPER: | |
1492 | fmt_str = "MCMSG_NEED_STAFF_OPER"; | |
1493 | break; | |
1494 | case MODCMD_REQUIRE_NETWORK_HELPER: | |
1495 | fmt_str = "MCMSG_NEED_STAFF_NETHELPER"; | |
1496 | break; | |
1497 | case MODCMD_REQUIRE_OPER|MODCMD_REQUIRE_NETWORK_HELPER: | |
1498 | fmt_str = "MCMSG_NEED_STAFF_NETHELPER_OR_OPER"; | |
1499 | break; | |
1500 | case MODCMD_REQUIRE_SUPPORT_HELPER: | |
1501 | fmt_str = "MCMSG_NEED_STAFF_SHELPER"; | |
1502 | break; | |
1503 | case MODCMD_REQUIRE_OPER|MODCMD_REQUIRE_SUPPORT_HELPER: | |
1504 | fmt_str = "MCMSG_NEED_STAFF_SHELPER_OR_OPER"; | |
1505 | break; | |
1506 | case MODCMD_REQUIRE_SUPPORT_HELPER|MODCMD_REQUIRE_NETWORK_HELPER: | |
1507 | fmt_str = "MCMSG_NEED_STAFF_HELPER"; | |
1508 | break; | |
1509 | } | |
1510 | reply(fmt_str); | |
1511 | shown_flags |= MODCMD_REQUIRE_AUTHED | MODCMD_REQUIRE_STAFF; | |
1512 | } | |
1513 | if (flags & ~shown_flags & MODCMD_REQUIRE_JOINABLE) { | |
1514 | reply("MCMSG_NEED_JOINABLE"); | |
1515 | shown_flags |= MODCMD_REQUIRE_CHANUSER; | |
1516 | } | |
1517 | if (flags & ~shown_flags & MODCMD_REQUIRE_CHANUSER) { | |
1518 | if (flags & ~shown_flags & MODCMD_IGNORE_CSUSPEND) | |
1519 | reply("MCMSG_NEED_CHANUSER_CSUSPENDABLE"); | |
1520 | else | |
1521 | reply("MCMSG_NEED_CHANUSER"); | |
1522 | shown_flags |= MODCMD_IGNORE_CSUSPEND | MODCMD_REQUIRE_REGCHAN | MODCMD_REQUIRE_CHANNEL | MODCMD_REQUIRE_AUTHED; | |
1523 | } | |
1524 | if (flags & ~shown_flags & MODCMD_REQUIRE_REGCHAN) { | |
1525 | reply("MCMSG_NEED_REGCHAN"); | |
1526 | shown_flags |= MODCMD_REQUIRE_CHANNEL; | |
1527 | } | |
1528 | if (flags & ~shown_flags & MODCMD_REQUIRE_CHANNEL) | |
1529 | reply("MCMSG_NEED_CHANNEL"); | |
1530 | if (flags & ~shown_flags & MODCMD_REQUIRE_AUTHED) | |
1531 | reply("MCMSG_NEED_AUTHED"); | |
1532 | if (flags & ~shown_flags & MODCMD_TOY) | |
1533 | reply("MCMSG_IS_TOY", svccmd->name); | |
1534 | if (flags & ~shown_flags & MODCMD_REQUIRE_QUALIFIED) { | |
1535 | const char *botnick = svccmd->parent ? svccmd->parent->bot->nick : "SomeBot"; | |
1536 | reply("MCMSG_MUST_QUALIFY", botnick, svccmd->name, botnick); | |
1537 | } | |
1538 | reply("MCMSG_END_REQUIREMENTS", svccmd->name); | |
1539 | return 1; | |
1540 | } | |
1541 | ||
1542 | static void | |
1543 | modcmd_describe_command(struct userNode *user, struct svccmd *cmd, struct svccmd *target) { | |
1544 | char buf1[MAXLEN], buf2[MAXLEN]; | |
1545 | unsigned int ii, len, buf1_used, buf2_used; | |
1546 | ||
1547 | if (target->alias.used) { | |
1548 | unsplit_string((char**)target->alias.list, target->alias.used, buf1); | |
1549 | reply("MCMSG_COMMAND_ALIASES", target->name, buf1); | |
1550 | } else { | |
1551 | snprintf(buf1, sizeof(buf1), "%s.%s", target->command->parent->name, target->command->name); | |
1552 | reply("MCMSG_COMMAND_BINDING", target->name, buf1); | |
1553 | } | |
1136f709 | 1554 | for (ii = buf1_used = buf2_used = 0; modcmd_flags[ii].name; ++ii) { |
1555 | const struct modcmd_flag *flag = &modcmd_flags[ii]; | |
1556 | if (target->flags & flag->flag) { | |
d76ed9a9 AS |
1557 | if (buf1_used) |
1558 | buf1[buf1_used++] = ','; | |
1136f709 | 1559 | len = strlen(flag->name); |
1560 | memcpy(buf1 + buf1_used, flag->name, len); | |
d76ed9a9 | 1561 | buf1_used += len; |
1136f709 | 1562 | } else if (target->effective_flags & flag->flag) { |
d76ed9a9 AS |
1563 | if (buf2_used) |
1564 | buf2[buf2_used++] = ','; | |
1136f709 | 1565 | len = strlen(flag->name); |
1566 | memcpy(buf2 + buf2_used, flag->name, len); | |
d76ed9a9 AS |
1567 | buf2_used += len; |
1568 | } | |
1569 | } | |
1570 | if (buf1_used) | |
1571 | buf1[buf1_used] = '\0'; | |
1572 | else | |
1573 | strcpy(buf1, user_find_message(user, "MSG_NONE")); | |
1574 | if (buf2_used) | |
1575 | buf2[buf2_used] = '\0'; | |
1576 | else | |
1577 | strcpy(buf2, user_find_message(user, "MSG_NONE")); | |
1578 | reply("MCMSG_COMMAND_FLAGS", buf1, buf2); | |
1579 | for (ii = buf1_used = buf2_used = 0; handle_flags[ii]; ++ii) { | |
1580 | if (target->req_account_flags & (1 << ii)) | |
1581 | buf1[buf1_used++] = handle_flags[ii]; | |
1582 | else if (target->deny_account_flags & (1 << ii)) | |
1583 | buf2[buf2_used++] = handle_flags[ii]; | |
1584 | } | |
1585 | buf1[buf1_used] = buf2[buf2_used] = '\0'; | |
1586 | reply("MCMSG_COMMAND_ACCOUNT_FLAGS", buf1, buf2); | |
1587 | reply("MCMSG_COMMAND_ACCESS_LEVEL", target->min_channel_access, target->min_opserv_level); | |
1588 | reply("MCMSG_COMMAND_USES", target->name, target->uses); | |
1589 | } | |
1590 | ||
1591 | static MODCMD_FUNC(cmd_modcmd) { | |
1592 | struct svccmd *svccmd; | |
1593 | unsigned int arg, changed; | |
1594 | char cmdname[MAXLEN]; | |
1595 | ||
1596 | assert(argc >= 2); | |
1597 | arg = collapse_cmdname(argv+1, argc-1, cmdname) + 1; | |
1598 | if (!arg) { | |
1599 | reply("MSG_MISSING_PARAMS", cmd->name); | |
1600 | return 0; | |
1601 | } | |
1602 | if (!(svccmd = svccmd_resolve_name(cmd, cmdname))) { | |
1603 | reply("MCMSG_UNKNOWN_COMMAND_2", cmdname, cmd->parent->bot->nick); | |
1604 | return 0; | |
1605 | } | |
1606 | for (changed = 0; arg+1 < argc; arg += 2) { | |
1607 | if (svccmd_configure(svccmd, user, cmd->parent->bot, argv[arg], argv[arg+1])) { | |
1608 | reply("MCMSG_COMMAND_MODIFIED", argv[arg], svccmd->name); | |
1609 | changed = 1; | |
1610 | } | |
1611 | } | |
1612 | if (changed) | |
1613 | modcmd_set_effective_flags(svccmd); | |
1614 | modcmd_describe_command(user, cmd, svccmd); | |
1615 | return changed; | |
1616 | } | |
1617 | ||
7637f48f | 1618 | static void |
1619 | timeout_god(void *data) | |
1620 | { | |
1621 | extern struct userNode *chanserv; | |
1622 | struct userNode *user = data; | |
1623 | ||
1624 | if(!user || !IsHelping(user)) return; | |
1625 | ||
1626 | HANDLE_CLEAR_FLAG(user->handle_info, HELPING); | |
1627 | send_message(user, chanserv, "MCMSG_GOD_EXPIRED"); | |
1628 | } | |
1629 | ||
d76ed9a9 AS |
1630 | static MODCMD_FUNC(cmd_god) { |
1631 | int helping; | |
1632 | ||
1633 | if (argc > 1) { | |
1634 | if (enabled_string(argv[1])) { | |
1635 | if (HANDLE_FLAGGED(user->handle_info, HELPING)) { | |
1636 | reply("MCMSG_ALREADY_HELPING"); | |
1637 | return 0; | |
1638 | } | |
6aae9404 | 1639 | helping = 1; |
d76ed9a9 AS |
1640 | } else if (disabled_string(argv[1])) { |
1641 | if (!HANDLE_FLAGGED(user->handle_info, HELPING)) { | |
1642 | reply("MCMSG_ALREADY_NOT_HELPING"); | |
1643 | return 0; | |
1644 | } | |
6aae9404 | 1645 | helping = 0; |
d76ed9a9 AS |
1646 | } else { |
1647 | reply("MSG_INVALID_BINARY", argv[1]); | |
1648 | return 0; | |
6aae9404 | 1649 | } |
d76ed9a9 AS |
1650 | } else { |
1651 | helping = !IsHelping(user); | |
1652 | } | |
1653 | ||
1654 | if (helping) { | |
1655 | HANDLE_SET_FLAG(user->handle_info, HELPING); | |
7637f48f | 1656 | timeq_add(now + god_timeout, timeout_god, user); |
d76ed9a9 AS |
1657 | reply("MCMSG_NOW_HELPING"); |
1658 | } else { | |
1659 | HANDLE_CLEAR_FLAG(user->handle_info, HELPING); | |
7637f48f | 1660 | timeq_del(0, timeout_god, user, TIMEQ_IGNORE_WHEN); |
d76ed9a9 AS |
1661 | reply("MCMSG_NOW_NOT_HELPING"); |
1662 | } | |
1663 | ||
1664 | return 1; | |
1665 | } | |
1666 | ||
1667 | static MODCMD_FUNC(cmd_joiner) { | |
1117fc5a | 1668 | char cmdname[MAXLEN]; |
d76ed9a9 AS |
1669 | |
1670 | if (argc < 2) { | |
1671 | int len = sprintf(cmdname, "%s ", cmd->name); | |
1672 | dict_iterator_t it; | |
1673 | struct string_buffer sbuf; | |
1674 | ||
1675 | string_buffer_init(&sbuf); | |
1676 | for (it = dict_first(cmd->parent->commands); it; it = iter_next(it)) { | |
1677 | if (!ircncasecmp(iter_key(it), cmdname, len)) { | |
1678 | if (sbuf.used) string_buffer_append_string(&sbuf, ", "); | |
1679 | string_buffer_append_string(&sbuf, iter_key(it)); | |
1680 | } | |
1681 | } | |
1682 | if (!sbuf.used) string_buffer_append(&sbuf, 0); | |
1683 | reply("MCMSG_JOINER_CHOICES", cmd->name, sbuf.list); | |
1684 | string_buffer_clean(&sbuf); | |
1685 | return 1; | |
1686 | } | |
1687 | sprintf(cmdname, "%s %s", cmd->name, argv[1]); | |
1688 | argv[1] = cmdname; | |
1689 | svccmd_invoke_argv(user, cmd->parent, channel, argc-1, argv+1, 0); | |
1690 | return 0; /* never try to log this; the recursive one logs it */ | |
1691 | } | |
1692 | ||
1693 | static MODCMD_FUNC(cmd_stats_modules) { | |
1694 | struct helpfile_table tbl; | |
1695 | dict_iterator_t it; | |
1696 | unsigned int ii; | |
1697 | struct module *mod; | |
1698 | struct modcmd *modcmd; | |
1699 | ||
1700 | if (argc < 2) { | |
1701 | tbl.length = dict_size(modules) + 1; | |
1702 | tbl.width = 3; | |
1703 | tbl.flags = TABLE_PAD_LEFT; | |
1704 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1705 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1706 | tbl.contents[0][0] = "Module"; | |
1707 | tbl.contents[0][1] = "Commands"; | |
1708 | tbl.contents[0][2] = "Helpfile"; | |
1709 | for (ii=1, it=dict_first(modules); it; it=iter_next(it), ii++) { | |
1710 | mod = iter_data(it); | |
1711 | tbl.contents[ii] = calloc(tbl.width, sizeof(tbl.contents[ii][0])); | |
1712 | tbl.contents[ii][0] = mod->name; | |
1713 | tbl.contents[ii][1] = strtab(dict_size(mod->commands)); | |
1714 | tbl.contents[ii][2] = mod->helpfile_name ? mod->helpfile_name : "(none)"; | |
1715 | } | |
1716 | } else if (!(mod = dict_find(modules, argv[1], NULL))) { | |
1717 | reply("MCMSG_UNKNOWN_MODULE", argv[1]); | |
1718 | return 0; | |
1719 | } else { | |
1720 | reply("MCMSG_MODULE_INFO", mod->name); | |
1721 | tbl.length = dict_size(mod->commands) + 1; | |
1722 | tbl.width = 3; | |
1723 | tbl.flags = TABLE_PAD_LEFT; | |
1724 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1725 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1726 | tbl.contents[0][0] = "Command"; | |
1727 | tbl.contents[0][1] = "Min. Args"; | |
1728 | tbl.contents[0][2] = "Bind Count"; | |
1729 | for (ii=1, it=dict_first(mod->commands); it; it=iter_next(it), ii++) { | |
1730 | modcmd = iter_data(it); | |
1731 | tbl.contents[ii] = calloc(tbl.width, sizeof(tbl.contents[ii][0])); | |
1732 | tbl.contents[ii][0] = modcmd->name; | |
1733 | tbl.contents[ii][1] = strtab(modcmd->min_argc); | |
1734 | tbl.contents[ii][2] = strtab(modcmd->bind_count); | |
1735 | } | |
1736 | } | |
1737 | table_send(cmd->parent->bot, user->nick, 0, 0, tbl); | |
1738 | return 0; | |
1739 | } | |
1740 | ||
1741 | static MODCMD_FUNC(cmd_stats_services) { | |
1742 | struct helpfile_table tbl; | |
1743 | dict_iterator_t it; | |
1744 | unsigned int ii; | |
1745 | struct service *service; | |
1746 | struct svccmd *svccmd; | |
1747 | char *extra; | |
1748 | ||
1749 | if (argc < 2) { | |
1750 | tbl.length = dict_size(services) + 1; | |
1751 | tbl.width = 4; | |
1752 | tbl.flags = TABLE_PAD_LEFT; | |
1753 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1754 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1755 | tbl.contents[0][0] = "Service"; | |
1756 | tbl.contents[0][1] = "Commands"; | |
1757 | tbl.contents[0][2] = "Priv'd?"; | |
1758 | tbl.contents[0][3] = "Trigger"; | |
1759 | extra = calloc(2, tbl.length); | |
1760 | for (ii=1, it=dict_first(services); it; it=iter_next(it), ii++) { | |
1761 | service = iter_data(it); | |
1762 | tbl.contents[ii] = calloc(tbl.width, sizeof(tbl.contents[ii][0])); | |
1763 | tbl.contents[ii][0] = service->bot->nick; | |
1764 | tbl.contents[ii][1] = strtab(dict_size(service->commands)); | |
1765 | tbl.contents[ii][2] = service->privileged ? "yes" : "no"; | |
1766 | extra[ii*2] = service->trigger; | |
1767 | tbl.contents[ii][3] = extra+ii*2; | |
1768 | } | |
1769 | table_send(cmd->parent->bot, user->nick, 0, 0, tbl); | |
1770 | free(extra); | |
1771 | return 0; | |
1772 | } else if (!(service = dict_find(services, argv[1], NULL))) { | |
1773 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1774 | return 0; | |
1775 | } else { | |
1776 | tbl.length = dict_size(service->commands) + 1; | |
1777 | tbl.width = 5; | |
1778 | tbl.flags = TABLE_PAD_LEFT | TABLE_NO_FREE; | |
1779 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1780 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1781 | tbl.contents[0][0] = "Command"; | |
1782 | tbl.contents[0][1] = "Module"; | |
1783 | tbl.contents[0][2] = "ModCmd"; | |
1784 | tbl.contents[0][3] = "Alias?"; | |
1785 | tbl.contents[0][4] = strdup("Uses"); | |
1786 | for (ii=1, it=dict_first(service->commands); it; it=iter_next(it), ii++) { | |
1787 | svccmd = iter_data(it); | |
1788 | tbl.contents[ii] = calloc(tbl.width, sizeof(tbl.contents[ii][0])); | |
1789 | tbl.contents[ii][0] = svccmd->name; | |
1790 | tbl.contents[ii][1] = svccmd->command->parent->name; | |
1791 | tbl.contents[ii][2] = svccmd->command->name; | |
1792 | tbl.contents[ii][3] = svccmd->alias.used ? "yes" : "no"; | |
1793 | tbl.contents[ii][4] = extra = malloc(12); | |
1794 | sprintf(extra, "%u", svccmd->uses); | |
1795 | } | |
1796 | reply("MCMSG_SERVICE_INFO", service->bot->nick); | |
1797 | table_send(cmd->parent->bot, user->nick, 0, 0, tbl); | |
1798 | for (ii=0; ii<tbl.length; ii++) { | |
1799 | free((char*)tbl.contents[ii][4]); | |
1800 | free(tbl.contents[ii]); | |
1801 | } | |
1802 | free(tbl.contents); | |
1803 | return 0; | |
1804 | } | |
1805 | } | |
1806 | ||
1807 | static MODCMD_FUNC(cmd_showcommands) { | |
1808 | struct svccmd_list commands; | |
1809 | struct helpfile_table tbl; | |
1810 | struct svccmd *svccmd; | |
1811 | dict_iterator_t it; | |
1812 | unsigned int ii, ignore_flags = 0; | |
1813 | unsigned int max_opserv_level = 1000; | |
1814 | unsigned short max_chanserv_level = 500; | |
1815 | char show_opserv_level = 0, show_channel_access = 0; | |
1816 | ||
1817 | /* Check to see what the max access they want to see is. */ | |
1818 | for (ii=1; ii<argc; ++ii) { | |
1819 | if (isdigit(argv[ii][0])) | |
1820 | max_opserv_level = atoi(argv[ii]); | |
1821 | else | |
1822 | max_chanserv_level = user_level_from_name(argv[ii], UL_OWNER); | |
1823 | } | |
1824 | ||
1825 | /* Find the matching commands. */ | |
1826 | svccmd_list_init(&commands); | |
1827 | if (cmd->parent->privileged) | |
1828 | ignore_flags = MODCMD_REQUIRE_OPER; | |
1829 | for (it = dict_first(cmd->parent->commands); it; it = iter_next(it)) { | |
1830 | svccmd = iter_data(it); | |
1831 | if (strchr(svccmd->name, ' ')) | |
1832 | continue; | |
1833 | if (!svccmd_can_invoke(user, svccmd->parent->bot, svccmd, channel, SVCCMD_QUALIFIED)) | |
1834 | continue; | |
1835 | if (svccmd->min_opserv_level > max_opserv_level) | |
1836 | continue; | |
1837 | if (svccmd->min_channel_access > max_chanserv_level) | |
1838 | continue; | |
1839 | if (svccmd->min_opserv_level > 0) | |
1840 | show_opserv_level = 1; | |
1841 | if (svccmd->min_channel_access > 0) | |
1842 | show_channel_access = 1; | |
1843 | if (svccmd->effective_flags | |
1844 | & (MODCMD_REQUIRE_STAFF|MODCMD_REQUIRE_HELPING) | |
1845 | & ~ignore_flags) { | |
1846 | show_channel_access = 1; | |
1847 | } | |
1848 | svccmd_list_append(&commands, svccmd); | |
1849 | } | |
1850 | ||
1851 | /* Build the table. */ | |
1852 | tbl.length = commands.used + 1; | |
1853 | tbl.width = 1 + show_opserv_level + show_channel_access; | |
1854 | tbl.flags = TABLE_REPEAT_ROWS; | |
1855 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1856 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1857 | tbl.contents[0][ii = 0] = "Command"; | |
1858 | if (show_opserv_level) | |
1859 | tbl.contents[0][++ii] = "OpServ Level"; | |
1860 | if (show_channel_access) | |
1861 | tbl.contents[0][++ii] = "ChanServ Access"; | |
1862 | for (ii=0; ii<commands.used; ++ii) { | |
1863 | svccmd = commands.list[ii]; | |
1864 | tbl.contents[ii+1] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1865 | tbl.contents[ii+1][0] = svccmd->name; | |
1866 | if (show_opserv_level) | |
1867 | tbl.contents[ii+1][1] = strtab(svccmd->min_opserv_level); | |
1868 | if (show_channel_access) { | |
1136f709 | 1869 | const char *access_name; |
d76ed9a9 AS |
1870 | int flags = svccmd->effective_flags; |
1871 | if (flags & MODCMD_REQUIRE_HELPING) | |
1136f709 | 1872 | access_name = "helping"; |
d76ed9a9 | 1873 | else if (flags & MODCMD_REQUIRE_STAFF) { |
0d16e639 | 1874 | if (flags & MODCMD_REQUIRE_OPER) |
1136f709 | 1875 | access_name = "oper"; |
0d16e639 | 1876 | else if (flags & MODCMD_REQUIRE_NETWORK_HELPER) |
1136f709 | 1877 | access_name = "net.helper"; |
0d16e639 | 1878 | else |
1136f709 | 1879 | access_name = "staff"; |
d76ed9a9 | 1880 | } else |
1136f709 | 1881 | access_name = strtab(svccmd->min_channel_access); |
1882 | tbl.contents[ii+1][1+show_opserv_level] = access_name; | |
d76ed9a9 AS |
1883 | } |
1884 | } | |
1885 | svccmd_list_clean(&commands); | |
1886 | table_send(cmd->parent->bot, user->nick, 0, 0, tbl); | |
1887 | return 0; | |
1888 | } | |
1889 | ||
1890 | static MODCMD_FUNC(cmd_helpfiles) { | |
1891 | struct service *service; | |
1892 | unsigned int ii; | |
1893 | ||
1894 | if (!(service = dict_find(services, argv[1], NULL))) { | |
1895 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1896 | return 0; | |
1897 | } | |
1898 | ||
1899 | if (argc < 3) { | |
1900 | for (ii=0; ii<service->modules.used; ++ii) | |
1901 | reply("MCMSG_HELPFILE_SEQUENCE", ii+1, service->modules.list[ii]->name); | |
1902 | return 0; | |
1903 | } | |
1904 | ||
1905 | service->modules.used = 0; | |
1906 | for (ii=0; ii<argc-2; ii++) { | |
1907 | struct module *module = dict_find(modules, argv[ii+2], NULL); | |
1908 | if (!module) { | |
1909 | reply("MCMSG_UNKNOWN_MODULE", argv[ii+2]); | |
1910 | continue; | |
1911 | } | |
1912 | module_list_append(&service->modules, module); | |
1913 | } | |
1914 | reply("MCMSG_HELPFILE_SEQUENCE_SET", service->bot->nick); | |
1915 | return 1; | |
1916 | } | |
1917 | ||
1918 | static MODCMD_FUNC(cmd_service_add) { | |
1919 | const char *nick, *hostname, *desc; | |
1920 | struct userNode *bot; | |
1921 | ||
1922 | nick = argv[1]; | |
1923 | if (!is_valid_nick(nick)) { | |
1924 | reply("MCMSG_BAD_SERVICE_NICK", nick); | |
1925 | return 0; | |
1926 | } | |
1927 | hostname = argv[2]; | |
1928 | desc = unsplit_string(argv+3, argc-3, NULL); | |
1929 | bot = GetUserH(nick); | |
1930 | if (bot && IsService(bot)) { | |
1931 | reply("MCMSG_ALREADY_SERVICE", bot->nick); | |
1932 | return 0; | |
1933 | } | |
1136f709 | 1934 | bot = AddLocalUser(nick, nick, hostname, desc, NULL); |
d76ed9a9 AS |
1935 | service_register(bot); |
1936 | reply("MCMSG_NEW_SERVICE", bot->nick); | |
1937 | return 1; | |
1938 | } | |
1939 | ||
1940 | static MODCMD_FUNC(cmd_service_rename) { | |
1941 | struct service *service; | |
1942 | ||
1943 | if (!(service = service_find(argv[1]))) { | |
1944 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1945 | return 0; | |
1946 | } | |
1947 | NickChange(service->bot, argv[2], 0); | |
1948 | reply("MCMSG_SERVICE_RENAMED", service->bot->nick); | |
1949 | return 1; | |
1950 | } | |
1951 | ||
1952 | static MODCMD_FUNC(cmd_service_trigger) { | |
1953 | struct userNode *bogon; | |
1954 | struct service *service; | |
1955 | ||
1956 | if (!(service = service_find(argv[1]))) { | |
1957 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1958 | return 0; | |
1959 | } | |
1960 | if (argc < 3) { | |
1961 | if (service->trigger) | |
1962 | reply("MCMSG_CURRENT_TRIGGER", service->bot->nick, service->trigger); | |
1963 | else | |
1964 | reply("MCMSG_NO_TRIGGER", service->bot->nick); | |
1965 | return 1; | |
1966 | } | |
1967 | if (service->trigger) | |
1c14af0b | 1968 | reg_chanmsg_func(service->trigger, NULL, NULL, NULL); |
d76ed9a9 AS |
1969 | if (!irccasecmp(argv[2], "none") || !irccasecmp(argv[2], "remove")) { |
1970 | service->trigger = 0; | |
1971 | reply("MCMSG_REMOVED_TRIGGER", service->bot->nick); | |
1972 | } else if ((bogon = get_chanmsg_bot(argv[2][0]))) { | |
1973 | reply("MCMSG_DUPLICATE_TRIGGER", bogon->nick, argv[2][0]); | |
1974 | return 1; | |
1975 | } else { | |
1976 | service->trigger = argv[2][0]; | |
1c14af0b | 1977 | reg_chanmsg_func(service->trigger, service->bot, modcmd_chanmsg, NULL); |
d76ed9a9 AS |
1978 | reply("MCMSG_NEW_TRIGGER", service->bot->nick, service->trigger); |
1979 | } | |
1980 | return 1; | |
1981 | } | |
1982 | ||
1983 | static MODCMD_FUNC(cmd_service_privileged) { | |
1984 | struct service *service; | |
1985 | const char *newval; | |
1986 | ||
1987 | if (!(service = service_find(argv[1]))) { | |
1988 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1989 | return 0; | |
1990 | } | |
1991 | if (argc >= 3) | |
1992 | service->privileged = true_string(argv[2]) || enabled_string(argv[2]); | |
1993 | newval = user_find_message(user, service->privileged ? "MSG_ON" : "MSG_OFF"); | |
1994 | reply("MCMSG_SERVICE_PRIVILEGED", service->bot->nick, newval); | |
1995 | return 1; | |
1996 | } | |
1997 | ||
1998 | static MODCMD_FUNC(cmd_service_remove) { | |
1999 | char *name, *reason; | |
2000 | struct service *service; | |
2001 | ||
2002 | name = argv[1]; | |
2003 | if (argc > 2) | |
2004 | reason = unsplit_string(argv+2, argc-2, NULL); | |
2005 | else | |
2006 | reason = "Removing bot"; | |
2007 | if (!(service = service_find(name))) { | |
2008 | reply("MCMSG_UNKNOWN_SERVICE", name); | |
2009 | return 0; | |
2010 | } | |
2011 | DelUser(service->bot, NULL, 1, reason); | |
2012 | reply("MCMSG_SERVICE_REMOVED", name); | |
2013 | dict_remove(services, name); | |
2014 | return 1; | |
2015 | } | |
2016 | ||
2017 | static MODCMD_FUNC(cmd_dump_messages) { | |
2018 | const char *fname = "strings.db"; | |
2019 | struct saxdb_context *ctx; | |
2020 | dict_iterator_t it; | |
2021 | FILE *pf; | |
2022 | int res; | |
2023 | ||
2024 | if (!(pf = fopen(fname, "w"))) { | |
2025 | reply("MCMSG_FILE_NOT_OPENED", fname); | |
2026 | return 0; | |
2027 | } | |
2028 | if (!(ctx = saxdb_open_context(pf))) { | |
2029 | reply("MSG_INTERNAL_FAILURE"); | |
2030 | return 0; | |
2031 | } | |
1136f709 | 2032 | |
2033 | if ((res = setjmp(*saxdb_jmp_buf(ctx))) != 0) { | |
2034 | saxdb_close_context(ctx, 1); | |
d76ed9a9 AS |
2035 | reply("MCMSG_MESSAGE_DUMP_FAILED", strerror(res)); |
2036 | return 0; | |
2037 | } else { | |
2038 | for (it = dict_first(lang_C->messages); it; it = iter_next(it)) | |
2039 | saxdb_write_string(ctx, iter_key(it), iter_data(it)); | |
1136f709 | 2040 | saxdb_close_context(ctx, 1); |
d76ed9a9 AS |
2041 | reply("MCMSG_MESSAGES_DUMPED", fname); |
2042 | return 1; | |
2043 | } | |
2044 | } | |
2045 | ||
2046 | static MODCMD_FUNC(cmd_version) { | |
cc6339ac | 2047 | send_message_type(4, user, cmd->parent->bot, "$b"PACKAGE_STRING"+[%s]$b (Based on srvx 1.3.x), Built: "__DATE__", "__TIME__".", cvs_version); |
a218fded AS |
2048 | send_message_type(4, user, cmd->parent->bot, "See $bCREDITS$b for more information."); |
2049 | return 1; | |
2050 | } | |
63665495 | 2051 | |
a218fded AS |
2052 | /* This function provides copyright management information to end |
2053 | * users of X3. You should not alter, disable or remove this | |
2054 | * command or its accessibility to normal IRC users, except to add | |
2055 | * copyright information pertaining to changes you make to X3. | |
2056 | */ | |
2057 | static MODCMD_FUNC(cmd_credits) { | |
2058 | send_message_type(4, user, cmd->parent->bot, "$b"PACKAGE"$b is based on srvx"); | |
3da28d8e | 2059 | send_message_type(4, user, cmd->parent->bot, "Copyright 2000-2007 srvx Development Team."); |
2060 | send_message_type(4, user, cmd->parent->bot, "Copyright 2004-2007 X3 Development Team."); | |
37d706b7 AS |
2061 | send_message_type(4, user, cmd->parent->bot, "This software is OSI Certified Open Source Software."); |
2062 | send_message_type(4, user, cmd->parent->bot, "OSI Certified is a certification mark of the Open Source Initiative."); | |
63665495 | 2063 | send_message_type(4, user, cmd->parent->bot, "$b$b"); |
2f61d1d7 | 2064 | send_message_type(4, user, cmd->parent->bot, "The srvx 1.3.x Development Team includes Paul Chang, Adrian Dewhurst, Miles Peterson, Michael Poole and others."); |
857925cb | 2065 | send_message_type(4, user, cmd->parent->bot, "The X3 Development Team includes Alex Schumann, Reed Loden, Neil Spierling, Matthew Beeching."); |
7a3028c6 | 2066 | send_message_type(4, user, cmd->parent->bot, "The X3 Development Team can be reached at https://github.com/evilnet/x3/ or in #evilnet on irc.afternet.org."); |
63665495 | 2067 | send_message_type(4, user, cmd->parent->bot, "$b$b"); |
95adb209 | 2068 | send_message_type(4, user, cmd->parent->bot, "Thanks goes to ThiefMaster, Joe Hansche (joeatrr), Martijn Smit (wasted), and to any other people who have contributed to X3."); |
a218fded | 2069 | send_message_type(4, user, cmd->parent->bot, "This program is free software; see COPYING in the distribution files."); |
63665495 | 2070 | |
d76ed9a9 AS |
2071 | return 1; |
2072 | } | |
2073 | ||
c8273589 AS |
2074 | static void create_default_binds(int rebind); |
2075 | ||
2076 | static MODCMD_FUNC(cmd_rebindall) { | |
2077 | send_message_type(4, user, cmd->parent->bot, "$bRe-binding all default commands to respective services..$b"); | |
2078 | create_default_binds(1); | |
2079 | return 1; | |
2080 | } | |
2081 | ||
1136f709 | 2082 | static MODCMD_FUNC(cmd_tell) { |
2083 | struct userNode *target; | |
2084 | char *msg; | |
2085 | ||
2086 | target = GetUserH(argv[1]); | |
2087 | msg = unsplit_string(argv + 2, argc - 2, NULL); | |
2088 | if (!target) { | |
2089 | reply("MSG_NOT_TARGET_NAME"); | |
2090 | return 0; | |
2091 | } | |
2092 | send_message_type(MSG_TYPE_NOXLATE, target, cmd->parent->bot, "%s", msg); | |
2093 | return 1; | |
2094 | } | |
d76ed9a9 AS |
2095 | |
2096 | void | |
63189c10 | 2097 | modcmd_nick_change(struct userNode *user, const char *old_nick, UNUSED_ARG(void *extra)) { |
d76ed9a9 AS |
2098 | struct service *svc; |
2099 | if (!(svc = dict_find(services, old_nick, NULL))) | |
2100 | return; | |
2101 | dict_remove2(services, old_nick, 1); | |
2102 | dict_insert(services, user->nick, svc); | |
2103 | } | |
2104 | ||
2105 | void | |
30874d66 | 2106 | modcmd_cleanup(UNUSED_ARG(void* extra)) { |
d76ed9a9 AS |
2107 | dict_delete(services); |
2108 | dict_delete(modules); | |
2109 | if (suf_list) | |
2110 | free(suf_list); | |
d77556d0 | 2111 | if (suf_list_extra) |
2112 | free(suf_list_extra); | |
d76ed9a9 AS |
2113 | } |
2114 | ||
2115 | static void | |
2116 | modcmd_saxdb_write_command(struct saxdb_context *ctx, struct svccmd *cmd) { | |
2117 | char buf[MAXLEN]; | |
2118 | unsigned int nn, len, pos; | |
2119 | struct svccmd *template = cmd->command->defaults; | |
2120 | ||
2121 | saxdb_start_record(ctx, cmd->name, 0); | |
2122 | sprintf(buf, "%s.%s", cmd->command->parent->name, cmd->command->name); | |
2123 | saxdb_write_string(ctx, "command", buf); | |
2124 | if (cmd->alias.used) | |
2125 | saxdb_write_string_list(ctx, "aliased", &cmd->alias); | |
2126 | if (cmd->min_opserv_level != template->min_opserv_level) | |
2127 | saxdb_write_int(ctx, "oper_access", cmd->min_opserv_level); | |
2128 | if (cmd->min_channel_access != template->min_channel_access) | |
2129 | saxdb_write_int(ctx, "channel_access", cmd->min_channel_access); | |
2130 | if (cmd->flags != template->flags) { | |
2131 | if (cmd->flags) { | |
1136f709 | 2132 | for (nn=pos=0; modcmd_flags[nn].name; ++nn) { |
2133 | const struct modcmd_flag *flag = &modcmd_flags[nn]; | |
2134 | if (cmd->flags & flag->flag) { | |
d76ed9a9 | 2135 | buf[pos++] = '+'; |
1136f709 | 2136 | len = strlen(flag->name); |
2137 | memcpy(buf+pos, flag->name, len); | |
d76ed9a9 AS |
2138 | pos += len; |
2139 | buf[pos++] = ','; | |
2140 | } | |
2141 | } | |
2142 | } else { | |
2143 | pos = 1; | |
2144 | } | |
2145 | buf[--pos] = 0; | |
2146 | saxdb_write_string(ctx, "flags", buf); | |
2147 | } | |
2148 | if ((cmd->req_account_flags != template->req_account_flags) | |
2149 | || (cmd->deny_account_flags != template->req_account_flags)) { | |
2150 | pos = 0; | |
2151 | if (cmd->req_account_flags) { | |
2152 | buf[pos++] = '+'; | |
2153 | for (nn=0; nn<32; nn++) | |
2154 | if (cmd->req_account_flags & (1 << nn)) | |
2155 | buf[pos++] = handle_flags[nn]; | |
2156 | } | |
2157 | if (cmd->deny_account_flags) { | |
2158 | buf[pos++] = '-'; | |
2159 | for (nn=0; nn<32; nn++) | |
2160 | if (cmd->deny_account_flags & (1 << nn)) | |
2161 | buf[pos++] = handle_flags[nn]; | |
2162 | } | |
2163 | buf[pos] = 0; | |
2164 | saxdb_write_string(ctx, "account_flags", buf); | |
2165 | } | |
2166 | saxdb_end_record(ctx); | |
2167 | } | |
2168 | ||
2169 | static int | |
2170 | modcmd_saxdb_write(struct saxdb_context *ctx) { | |
2171 | struct string_list slist; | |
2172 | dict_iterator_t it, it2; | |
2173 | struct service *service; | |
2174 | unsigned int ii; | |
2175 | ||
2176 | saxdb_start_record(ctx, "bots", 1); | |
2177 | for (it = dict_first(services); it; it = iter_next(it)) { | |
2178 | char buff[16]; | |
57fdf922 | 2179 | char modes[32]; |
2180 | ||
d76ed9a9 AS |
2181 | service = iter_data(it); |
2182 | saxdb_start_record(ctx, service->bot->nick, 1); | |
2183 | if (service->trigger) { | |
2184 | buff[0] = service->trigger; | |
2185 | buff[1] = '\0'; | |
2186 | saxdb_write_string(ctx, "trigger", buff); | |
2187 | } | |
2188 | saxdb_write_string(ctx, "description", service->bot->info); | |
2189 | saxdb_write_string(ctx, "hostname", service->bot->hostname); | |
57fdf922 | 2190 | if (service->bot->modes) { |
2191 | irc_user_modes(service->bot, modes, sizeof(modes)); | |
2192 | saxdb_write_string(ctx, "modes", modes); | |
2193 | } | |
d76ed9a9 AS |
2194 | if (service->privileged) |
2195 | saxdb_write_string(ctx, "privileged", "1"); | |
2196 | saxdb_end_record(ctx); | |
2197 | } | |
2198 | saxdb_end_record(ctx); | |
2199 | ||
2200 | saxdb_start_record(ctx, "services", 1); | |
2201 | for (it = dict_first(services); it; it = iter_next(it)) { | |
2202 | service = iter_data(it); | |
2203 | saxdb_start_record(ctx, service->bot->nick, 1); | |
2204 | for (it2 = dict_first(service->commands); it2; it2 = iter_next(it2)) | |
2205 | modcmd_saxdb_write_command(ctx, iter_data(it2)); | |
2206 | saxdb_end_record(ctx); | |
2207 | } | |
2208 | saxdb_end_record(ctx); | |
2209 | ||
2210 | saxdb_start_record(ctx, "helpfiles", 1); | |
2211 | slist.size = 0; | |
2212 | for (it = dict_first(services); it; it = iter_next(it)) { | |
2213 | service = iter_data(it); | |
2214 | slist.used = 0; | |
2215 | for (ii = 0; ii < service->modules.used; ++ii) | |
2216 | string_list_append(&slist, service->modules.list[ii]->name); | |
2217 | saxdb_write_string_list(ctx, iter_key(it), &slist); | |
2218 | } | |
2219 | if (slist.list) | |
2220 | free(slist.list); | |
2221 | saxdb_end_record(ctx); | |
2222 | ||
2223 | return 0; | |
2224 | } | |
2225 | ||
2226 | static int | |
2227 | append_entry(const char *key, UNUSED_ARG(void *data), void *extra) { | |
2228 | struct helpfile_expansion *exp = extra; | |
2229 | int row = exp->value.table.length++; | |
2230 | exp->value.table.contents[row] = calloc(1, sizeof(char*)); | |
2231 | exp->value.table.contents[row][0] = key; | |
2232 | return 0; | |
2233 | } | |
2234 | ||
2235 | static struct helpfile_expansion | |
2236 | modcmd_expand(const char *variable) { | |
2237 | struct helpfile_expansion exp; | |
2238 | extern struct userNode *message_source; | |
2239 | struct service *service; | |
2240 | ||
2241 | service = dict_find(services, message_source->nick, NULL); | |
2242 | if (!irccasecmp(variable, "index")) { | |
2243 | exp.type = HF_TABLE; | |
2244 | exp.value.table.length = 1; | |
2245 | exp.value.table.width = 1; | |
a8370a20 | 2246 | exp.value.table.flags = TABLE_REPEAT_ROWS | TABLE_NO_HEADERS; |
d76ed9a9 AS |
2247 | exp.value.table.contents = calloc(dict_size(service->commands)+1, sizeof(char**)); |
2248 | exp.value.table.contents[0] = calloc(1, sizeof(char*)); | |
a8370a20 | 2249 | exp.value.table.contents[0][0] = "Commands"; |
d76ed9a9 AS |
2250 | dict_foreach(service->commands, append_entry, &exp); |
2251 | return exp; | |
2252 | } else if (!irccasecmp(variable, "languages")) { | |
2253 | struct string_buffer sbuf; | |
2254 | dict_iterator_t it; | |
2255 | sbuf.used = sbuf.size = 0; | |
2256 | sbuf.list = NULL; | |
2257 | for (it = dict_first(languages); it; it = iter_next(it)) { | |
2258 | string_buffer_append_string(&sbuf, iter_key(it)); | |
2259 | string_buffer_append(&sbuf, ' '); | |
2260 | } | |
2261 | sbuf.list[--sbuf.used] = 0; | |
2262 | exp.type = HF_STRING; | |
2263 | exp.value.str = sbuf.list; | |
2264 | return exp; | |
2265 | } | |
2266 | exp.type = HF_STRING; | |
2267 | exp.value.str = NULL; | |
2268 | return exp; | |
2269 | } | |
2270 | ||
2271 | static void | |
2272 | modcmd_load_bots(struct dict *db, int default_nick) { | |
2273 | dict_iterator_t it; | |
2274 | ||
2275 | for (it = dict_first(db); it; it = iter_next(it)) { | |
2276 | struct record_data *rd; | |
2277 | struct service *svc; | |
57fdf922 | 2278 | const char *nick, *desc, *hostname, *modes; |
d76ed9a9 AS |
2279 | |
2280 | rd = iter_data(it); | |
2281 | if (rd->type != RECDB_OBJECT) { | |
2282 | log_module(MAIN_LOG, LOG_ERROR, "Bad type for 'bots/%s' in modcmd db (expected object).", iter_key(it)); | |
2283 | continue; | |
2284 | } | |
2285 | nick = database_get_data(rd->d.object, "nick", RECDB_QSTRING); | |
2286 | if (!nick) { | |
2287 | if (default_nick) | |
2288 | nick = iter_key(it); | |
2289 | else | |
2290 | continue; | |
2291 | } | |
2292 | svc = service_find(nick); | |
2293 | desc = database_get_data(rd->d.object, "description", RECDB_QSTRING); | |
2294 | hostname = database_get_data(rd->d.object, "hostname", RECDB_QSTRING); | |
57fdf922 | 2295 | modes = database_get_data(rd->d.object, "modes", RECDB_QSTRING); |
d76ed9a9 AS |
2296 | if (desc) { |
2297 | if (!svc) | |
57fdf922 | 2298 | svc = service_register(AddLocalUser(nick, nick, hostname, desc, modes)); |
d76ed9a9 AS |
2299 | else if (hostname) |
2300 | strcpy(svc->bot->hostname, hostname); | |
2301 | desc = database_get_data(rd->d.object, "trigger", RECDB_QSTRING); | |
2302 | if (desc) | |
2303 | svc->trigger = desc[0]; | |
2304 | desc = database_get_data(rd->d.object, "privileged", RECDB_QSTRING); | |
2305 | if (desc && (true_string(desc) || enabled_string(desc))) | |
2306 | svc->privileged = 1; | |
2307 | } | |
2308 | } | |
2309 | } | |
2310 | ||
2311 | static void | |
2312 | modcmd_conf_read(void) { | |
2313 | modcmd_load_bots(conf_get_data("services", RECDB_OBJECT), 0); | |
2314 | } | |
2315 | ||
2316 | void | |
2317 | modcmd_init(void) { | |
1136f709 | 2318 | qsort(modcmd_flags, ArrayLength(modcmd_flags)-1, sizeof(modcmd_flags[0]), flags_qsort); |
d76ed9a9 AS |
2319 | modules = dict_new(); |
2320 | dict_set_free_data(modules, free_module); | |
2321 | services = dict_new(); | |
2322 | dict_set_free_data(services, free_service); | |
63189c10 | 2323 | reg_nick_change_func(modcmd_nick_change, NULL); |
30874d66 | 2324 | reg_exit_func(modcmd_cleanup, NULL); |
d76ed9a9 AS |
2325 | conf_register_reload(modcmd_conf_read); |
2326 | ||
2327 | modcmd_module = module_register("modcmd", MAIN_LOG, "modcmd.help", modcmd_expand); | |
2328 | bind_command = modcmd_register(modcmd_module, "bind", cmd_bind, 4, MODCMD_KEEP_BOUND, "oper_level", "800", NULL); | |
2329 | help_command = modcmd_register(modcmd_module, "help", cmd_help, 1, 0, "flags", "+nolog", NULL); | |
2330 | modcmd_register(modcmd_module, "command", cmd_command, 2, 0, "flags", "+nolog", NULL); | |
2331 | modcmd_register(modcmd_module, "modcmd", cmd_modcmd, 2, MODCMD_KEEP_BOUND, "template", "bind", NULL); | |
2332 | modcmd_register(modcmd_module, "god", cmd_god, 0, MODCMD_REQUIRE_AUTHED, "flags", "+oper,+networkhelper", NULL); | |
2333 | modcmd_register(modcmd_module, "readhelp", cmd_readhelp, 2, 0, "oper_level", "650", NULL); | |
2334 | modcmd_register(modcmd_module, "timecmd", cmd_timecmd, 2, 0, "oper_level", "1", NULL); | |
2335 | modcmd_register(modcmd_module, "unbind", cmd_unbind, 3, 0, "template", "bind", NULL); | |
2336 | modcmd_register(modcmd_module, "joiner", cmd_joiner, 1, 0, NULL); | |
2337 | modcmd_register(modcmd_module, "stats modules", cmd_stats_modules, 1, 0, "flags", "+oper", NULL); | |
2338 | modcmd_register(modcmd_module, "stats services", cmd_stats_services, 1, 0, "flags", "+oper", NULL); | |
2339 | modcmd_register(modcmd_module, "showcommands", cmd_showcommands, 1, 0, "flags", "+acceptchan", NULL); | |
2340 | modcmd_register(modcmd_module, "helpfiles", cmd_helpfiles, 2, 0, "template", "bind", NULL); | |
2341 | modcmd_register(modcmd_module, "service add", cmd_service_add, 4, 0, "flags", "+oper", NULL); | |
2342 | modcmd_register(modcmd_module, "service rename", cmd_service_rename, 3, 0, "flags", "+oper", NULL); | |
2343 | modcmd_register(modcmd_module, "service trigger", cmd_service_trigger, 2, 0, "flags", "+oper", NULL); | |
2344 | modcmd_register(modcmd_module, "service privileged", cmd_service_privileged, 2, 0, "flags", "+oper", NULL); | |
2345 | modcmd_register(modcmd_module, "service remove", cmd_service_remove, 2, 0, "flags", "+oper", NULL); | |
2346 | modcmd_register(modcmd_module, "dumpmessages", cmd_dump_messages, 1, 0, "oper_level", "1000", NULL); | |
1136f709 | 2347 | modcmd_register(modcmd_module, "tell", cmd_tell, 3, 0, "flags", "+oper", NULL); |
c8273589 | 2348 | modcmd_register(modcmd_module, "rebindall", cmd_rebindall, 0, MODCMD_KEEP_BOUND, "oper_level", "800", NULL); |
d76ed9a9 | 2349 | version_command = modcmd_register(modcmd_module, "version", cmd_version, 1, 0, NULL); |
a218fded | 2350 | credits_command = modcmd_register(modcmd_module, "credits", cmd_credits, 1, 0, NULL); |
d76ed9a9 | 2351 | message_register_table(msgtab); |
0b350353 | 2352 | |
d76ed9a9 AS |
2353 | } |
2354 | ||
2355 | static void | |
2356 | modcmd_db_load_command(struct service *service, const char *cmdname, struct dict *obj) { | |
2357 | struct svccmd *svccmd; | |
2358 | struct module *module; | |
2359 | struct modcmd *modcmd; | |
2360 | struct string_list *slist; | |
2361 | const char *str, *sep; | |
2362 | char buf[MAXLEN]; | |
2363 | ||
2364 | str = database_get_data(obj, "command", RECDB_QSTRING); | |
2365 | if (!str) { | |
2366 | log_module(MAIN_LOG, LOG_ERROR, "Missing command for service %s command %s in modcmd.db", service->bot->nick, cmdname); | |
2367 | return; | |
2368 | } | |
2369 | sep = strchr(str, '.'); | |
2370 | if (!sep) { | |
2371 | log_module(MAIN_LOG, LOG_ERROR, "Invalid command %s for service %s command %s in modcmd.db", str, service->bot->nick, cmdname); | |
2372 | return; | |
2373 | } | |
2374 | memcpy(buf, str, sep-str); | |
2375 | buf[sep-str] = 0; | |
2376 | if (!(module = module_find(buf))) { | |
2377 | log_module(MAIN_LOG, LOG_ERROR, "Unknown module %s for service %s command %s in modcmd.db", buf, service->bot->nick, cmdname); | |
2378 | return; | |
2379 | } | |
2380 | if (!(modcmd = dict_find(module->commands, sep+1, NULL))) { | |
2381 | log_module(MAIN_LOG, LOG_ERROR, "Unknown command %s in module %s for service %s command %s", sep+1, module->name, service->bot->nick, cmdname); | |
2382 | return; | |
2383 | } | |
2384 | /* Now that we know we have a command to use, fill in the basics. */ | |
2385 | svccmd = calloc(1, sizeof(*svccmd)); | |
2386 | svccmd_insert(service, strdup(cmdname), svccmd, modcmd); | |
2387 | if ((str = database_get_data(obj, "template", RECDB_QSTRING))) { | |
2388 | add_pending_template(svccmd, str); | |
2389 | } else { | |
2390 | svccmd_copy_rules(svccmd, modcmd->defaults); | |
2391 | } | |
2392 | if ((str = database_get_data(obj, "account_flags", RECDB_QSTRING))) { | |
2393 | svccmd->req_account_flags = svccmd->deny_account_flags = 0; | |
2394 | svccmd_configure(svccmd, NULL, service->bot, "account_flags", str); | |
2395 | } | |
2396 | if ((str = database_get_data(obj, "flags", RECDB_QSTRING))) { | |
2397 | svccmd->flags = 0; | |
2398 | svccmd_configure(svccmd, NULL, service->bot, "flags", str); | |
2399 | } | |
2400 | if ((str = database_get_data(obj, "oper_access", RECDB_QSTRING)) | |
2401 | || (str = database_get_data(obj, "opserv_level", RECDB_QSTRING))) { | |
2402 | svccmd_configure(svccmd, NULL, service->bot, "oper_access", str); | |
2403 | } | |
2404 | if ((str = database_get_data(obj, "channel_access", RECDB_QSTRING)) | |
2405 | || (str = database_get_data(obj, "chanserv_level", RECDB_QSTRING))) { | |
2406 | svccmd_configure(svccmd, NULL, service->bot, "channel_access", str); | |
2407 | } | |
2408 | if ((slist = database_get_data(obj, "aliased", RECDB_STRING_LIST))) { | |
2409 | unsigned int nn; | |
2410 | svccmd->alias.used = svccmd->alias.size = slist->used; | |
2411 | svccmd->alias.list = calloc(svccmd->alias.size, sizeof(svccmd->alias.list[0])); | |
2412 | for (nn=0; nn<slist->used; ++nn) | |
2413 | svccmd->alias.list[nn] = strdup(slist->list[nn]); | |
2414 | } | |
2415 | modcmd_set_effective_flags(svccmd); | |
2416 | } | |
2417 | ||
2418 | static struct svccmd * | |
2419 | service_make_alias(struct service *service, const char *alias, ...) { | |
2420 | char *arg, *argv[MAXNUMPARAMS]; | |
2421 | unsigned int nn, argc; | |
2422 | struct svccmd *svccmd, *template; | |
2423 | va_list args; | |
2424 | ||
2425 | va_start(args, alias); | |
2426 | argc = 0; | |
2427 | while (1) { | |
2428 | arg = va_arg(args, char*); | |
2429 | if (!arg) | |
2430 | break; | |
2431 | argv[argc++] = arg; | |
2432 | } | |
2433 | va_end(args); | |
2434 | svccmd = calloc(1, sizeof(*svccmd)); | |
2435 | if (!(template = svccmd_resolve_name(svccmd, argv[0]))) { | |
2436 | log_module(MAIN_LOG, LOG_ERROR, "Invalid base command %s for alias %s in service %s", argv[0], alias, service->bot->nick); | |
2437 | free(svccmd->name); | |
2438 | free(svccmd); | |
2439 | return NULL; | |
2440 | } | |
2441 | if (argc > 1) { | |
2442 | svccmd->alias.used = svccmd->alias.size = argc; | |
2443 | svccmd->alias.list = calloc(svccmd->alias.size, sizeof(svccmd->alias.list[0])); | |
2444 | for (nn=0; nn<argc; nn++) | |
2445 | svccmd->alias.list[nn] = strdup(argv[nn]); | |
2446 | } | |
2447 | svccmd_insert(service, strdup(alias), svccmd, template->command); | |
2448 | svccmd_copy_rules(svccmd, template); | |
2449 | return svccmd; | |
2450 | } | |
2451 | ||
2452 | static int saxdb_present; | |
2453 | ||
2454 | static int | |
2455 | modcmd_saxdb_read(struct dict *db) { | |
2456 | struct dict *db2; | |
2457 | dict_iterator_t it, it2; | |
2458 | struct record_data *rd, *rd2; | |
2459 | struct service *service; | |
2460 | ||
2461 | modcmd_load_bots(database_get_data(db, "bots", RECDB_OBJECT), 1); | |
2462 | db2 = database_get_data(db, "services", RECDB_OBJECT); | |
2463 | if (!db2) { | |
2464 | log_module(MAIN_LOG, LOG_ERROR, "Missing section 'services' in modcmd db."); | |
2465 | return 1; | |
2466 | } | |
2467 | for (it = dict_first(db2); it; it = iter_next(it)) { | |
2468 | rd = iter_data(it); | |
2469 | if (rd->type != RECDB_OBJECT) { | |
2470 | log_module(MAIN_LOG, LOG_ERROR, "Bad type for 'services/%s' in modcmd db (expected object).", iter_key(it)); | |
2471 | continue; | |
2472 | } | |
2473 | if (!(service = service_find(iter_key(it)))) { | |
2474 | log_module(MAIN_LOG, LOG_ERROR, "Unknown service '%s' listed in modcmd db.", iter_key(it)); | |
2475 | continue; | |
2476 | } | |
2477 | for (it2 = dict_first(rd->d.object); it2; it2 = iter_next(it2)) { | |
2478 | rd2 = iter_data(it2); | |
2479 | if (rd2->type != RECDB_OBJECT) { | |
2480 | log_module(MAIN_LOG, LOG_ERROR, "Bad type for 'services/%s/%s' in modcmd db (expected object).", iter_key(it), iter_key(it2)); | |
2481 | continue; | |
2482 | } | |
2483 | modcmd_db_load_command(service, iter_key(it2), rd2->d.object); | |
2484 | } | |
2485 | } | |
2486 | db2 = database_get_data(db, "helpfiles", RECDB_OBJECT); | |
2487 | for (it = dict_first(db2); it; it = iter_next(it)) { | |
2488 | struct module *module; | |
2489 | struct string_list *slist; | |
2490 | unsigned int ii; | |
2491 | ||
2492 | rd = iter_data(it); | |
2493 | if (rd->type != RECDB_STRING_LIST) { | |
2494 | log_module(MAIN_LOG, LOG_ERROR, "Bad type for 'helpfiles/%s' in modcmd db (expected string list).", iter_key(it)); | |
2495 | continue; | |
2496 | } | |
2497 | slist = rd->d.slist; | |
2498 | if (!(service = service_find(iter_key(it)))) { | |
2499 | /* We probably whined about the service being missing above. */ | |
2500 | continue; | |
2501 | } | |
2502 | service->modules.used = 0; | |
2503 | for (ii=0; ii<slist->used; ++ii) { | |
2504 | if (!(module = dict_find(modules, slist->list[ii], NULL))) { | |
2505 | log_module(MAIN_LOG, LOG_ERROR, "Unknown module '%s' listed in modcmd 'helpfiles/%s'.", slist->list[ii], iter_key(it)); | |
2506 | continue; | |
2507 | } | |
2508 | module_list_append(&service->modules, module); | |
2509 | } | |
2510 | } | |
2511 | saxdb_present = 1; | |
2512 | return 0; | |
2513 | } | |
2514 | ||
2515 | static void | |
c8273589 | 2516 | create_default_binds(int rebind) { |
d76ed9a9 AS |
2517 | /* Which services should import which modules by default? */ |
2518 | struct { | |
2519 | const char *svcname; | |
2520 | /* C is lame and requires a fixed size for this array. | |
2521 | * Be sure you NULL-terminate each array and increment the | |
2522 | * size here if you add more default modules to any | |
2523 | * service. */ | |
2524 | const char *modnames[8]; | |
2525 | } def_binds[] = { | |
2526 | { "ChanServ", { "ChanServ", NULL } }, | |
2527 | { "Global", { "Global", NULL } }, | |
2528 | { "NickServ", { "NickServ", NULL } }, | |
2529 | { "OpServ", { "OpServ", "modcmd", "sendmail", "saxdb", "proxycheck", NULL } }, | |
63c95a47 | 2530 | { "SpamServ", { "SpamServ", NULL } }, |
d76ed9a9 AS |
2531 | { NULL, { NULL } } |
2532 | }; | |
2533 | unsigned int ii, jj; | |
2534 | char buf[128], *nick; | |
2535 | struct service *service; | |
2536 | struct module *module; | |
2537 | ||
2538 | for (ii = 0; def_binds[ii].svcname; ++ii) { | |
2539 | sprintf(buf, "services/%s/nick", def_binds[ii].svcname); | |
2540 | if (!(nick = conf_get_data(buf, RECDB_QSTRING))) | |
2541 | continue; | |
2542 | if (!(service = service_find(nick))) | |
2543 | continue; | |
c8273589 | 2544 | if (dict_size(service->commands) > 0 && !rebind) |
d76ed9a9 AS |
2545 | continue; |
2546 | ||
2547 | /* Bind the default modules for this service to it */ | |
2548 | for (jj = 0; def_binds[ii].modnames[jj]; ++jj) { | |
2549 | if (!(module = module_find(def_binds[ii].modnames[jj]))) | |
2550 | continue; | |
2551 | service_bind_module(service, module); | |
2552 | } | |
2553 | ||
2554 | /* Bind the help and version commands to this service */ | |
2555 | service_bind_modcmd(service, help_command, help_command->name); | |
2556 | service_bind_modcmd(service, version_command, version_command->name); | |
a218fded | 2557 | service_bind_modcmd(service, credits_command, credits_command->name); |
d76ed9a9 AS |
2558 | |
2559 | /* Now some silly hax.. (aliases that most people want) */ | |
2560 | if (!irccasecmp(def_binds[ii].svcname, "ChanServ")) { | |
fd20b142 | 2561 | service_make_alias(service, "addowner", "*chanserv.adduser", "$1", "owner", "$2", NULL); |
2562 | service_make_alias(service, "addcoowner", "*chanserv.adduser", "$1", "coowner", "$2", NULL); | |
2563 | service_make_alias(service, "addco", "*chanserv.adduser", "$1", "coowner", "$2", NULL); | |
2564 | service_make_alias(service, "addmanager", "*chanserv.adduser", "$1", "manager", "$2", NULL); | |
2565 | service_make_alias(service, "addop", "*chanserv.adduser", "$1", "op", "$2", NULL); | |
2566 | service_make_alias(service, "addhop", "*chanserv.adduser", "$1", "halfop", "$2", NULL); | |
2567 | service_make_alias(service, "addpeon", "*chanserv.adduser", "$1", "peon", "$2", NULL); | |
2a4ca4f5 | 2568 | service_make_alias(service, "addpal", "*chanserv.adduser", "$1", "pal", "$2", NULL); |
d76ed9a9 AS |
2569 | service_make_alias(service, "delowner", "*chanserv.deluser", "owner", "$1", NULL); |
2570 | service_make_alias(service, "delcoowner", "*chanserv.deluser", "coowner", "$1", NULL); | |
4048352e | 2571 | service_make_alias(service, "delmanager", "*chanserv.deluser", "manager", "$1", NULL); |
d76ed9a9 AS |
2572 | service_make_alias(service, "delop", "*chanserv.deluser", "op", "$1", NULL); |
2573 | service_make_alias(service, "delpeon", "*chanserv.deluser", "peon", "$1", NULL); | |
2a4ca4f5 | 2574 | service_make_alias(service, "delpal", "*chanserv.deluser", "pal", "$1", NULL); |
b1bf690d | 2575 | service_make_alias(service, "llist", "*chanserv.lamers", "$1", NULL); |
d76ed9a9 AS |
2576 | service_make_alias(service, "command", "*modcmd.command", NULL); |
2577 | service_make_alias(service, "god", "*modcmd.god", NULL); | |
2578 | } else if (!irccasecmp(def_binds[ii].svcname, "OpServ")) { | |
2579 | struct svccmd *svccmd; | |
2580 | svccmd = service_make_alias(service, "stats", "*modcmd.joiner", NULL); | |
2581 | svccmd->min_opserv_level = 101; | |
2582 | svccmd = service_make_alias(service, "service", "*modcmd.joiner", NULL); | |
2583 | svccmd->min_opserv_level = 900; | |
47956fc5 AS |
2584 | svccmd = service_make_alias(service, "routing", "*modcmd.joiner", NULL); |
2585 | svccmd->min_opserv_level = 100; | |
d76ed9a9 AS |
2586 | } |
2587 | } | |
2588 | } | |
2589 | ||
2590 | static void | |
2591 | import_aliases_db() { | |
2592 | struct dict *db; | |
2593 | dict_iterator_t it, it2; | |
2594 | struct record_data *rd, *rd2; | |
2595 | struct service *service; | |
2596 | struct module *module; | |
2597 | ||
2598 | if (!(db = parse_database("aliases.db"))) | |
2599 | return; | |
2600 | for (it = dict_first(db); it; it = iter_next(it)) { | |
2601 | service = service_find(iter_key(it)); | |
2602 | if (!service) | |
2603 | continue; | |
2604 | module = module_find(service->bot->nick); | |
2605 | rd = iter_data(it); | |
2606 | if (rd->type != RECDB_OBJECT) | |
2607 | continue; | |
2608 | for (it2 = dict_first(rd->d.object); it2; it2 = iter_next(it2)) { | |
2609 | struct modcmd *command; | |
2610 | rd2 = iter_data(it2); | |
2611 | if (rd2->type != RECDB_QSTRING) | |
2612 | continue; | |
2613 | command = dict_find(module->commands, rd2->d.qstring, NULL); | |
2614 | if (!command) | |
2615 | continue; | |
2616 | service_bind_modcmd(service, command, iter_key(it2)); | |
2617 | } | |
2618 | } | |
2619 | } | |
2620 | ||
2621 | void | |
2622 | modcmd_finalize(void) { | |
2623 | dict_iterator_t it; | |
2624 | ||
2625 | /* Check databases. */ | |
2626 | saxdb_register("modcmd", modcmd_saxdb_read, modcmd_saxdb_write); | |
c8273589 | 2627 | create_default_binds(0); |
d76ed9a9 AS |
2628 | if (!saxdb_present) |
2629 | import_aliases_db(); | |
2630 | ||
2631 | /* Register services for their triggers. */ | |
2632 | for (it = dict_first(services); it; it = iter_next(it)) { | |
2633 | struct service *svc = iter_data(it); | |
2634 | if (svc->trigger) | |
1c14af0b | 2635 | reg_chanmsg_func(svc->trigger, svc->bot, modcmd_chanmsg, NULL); |
d76ed9a9 AS |
2636 | } |
2637 | ||
2638 | /* Resolve command rule-templates. */ | |
2639 | while (pending_templates) { | |
2640 | struct pending_template *ptempl = pending_templates; | |
2641 | struct svccmd *svccmd; | |
2642 | ||
2643 | pending_templates = ptempl->next; | |
2644 | /* Only overwrite the current template if we have a valid template. */ | |
2645 | if (!strcmp(ptempl->base, "*")) { | |
2646 | /* Do nothing. */ | |
2647 | } else if ((svccmd = svccmd_resolve_name(ptempl->cmd, ptempl->base))) { | |
2648 | svccmd_copy_rules(ptempl->cmd, svccmd); | |
2649 | } else { | |
2650 | assert(ptempl->cmd->parent); | |
2651 | log_module(MAIN_LOG, LOG_ERROR, "Unable to resolve template name %s for command %s in service %s.", ptempl->base, ptempl->cmd->name, ptempl->cmd->parent->bot->nick); | |
2652 | } | |
2653 | free(ptempl->base); | |
2654 | free(ptempl); | |
2655 | } | |
2656 | } |