]>
Commit | Line | Data |
---|---|---|
d76ed9a9 AS |
1 | /* modcmd.c - Generalized module command support |
2 | * Copyright 2002-2004 srvx Development Team | |
3 | * | |
4 | * This file is part of srvx. | |
5 | * | |
6 | * srvx is free software; you can redistribute it and/or modify | |
7 | * it under the terms of the GNU General Public License as published by | |
8 | * the Free Software Foundation; either version 2 of the License, or | |
9 | * (at your option) any later version. | |
10 | * | |
11 | * This program is distributed in the hope that it will be useful, | |
12 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
14 | * GNU General Public License for more details. | |
15 | * | |
16 | * You should have received a copy of the GNU General Public License | |
17 | * along with srvx; if not, write to the Free Software Foundation, | |
18 | * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA. | |
19 | */ | |
20 | ||
21 | //#include "arch-version.h" | |
22 | #include "chanserv.h" | |
23 | #include "conf.h" | |
24 | #include "modcmd.h" | |
25 | #include "saxdb.h" | |
26 | ||
27 | struct pending_template { | |
28 | struct svccmd *cmd; | |
29 | char *base; | |
30 | struct pending_template *next; | |
31 | }; | |
32 | ||
33 | static struct dict *modules; | |
34 | static struct dict *services; | |
35 | static struct pending_template *pending_templates; | |
36 | static struct module *modcmd_module; | |
37 | static struct modcmd *bind_command, *help_command, *version_command; | |
38 | static const struct message_entry msgtab[] = { | |
39 | { "MCMSG_BARE_FLAG", "Flag %.*s must be preceded by a + or -." }, | |
40 | { "MCMSG_UNKNOWN_FLAG", "Unknown module flag %.*s." }, | |
41 | { "MCMSG_BAD_OPSERV_LEVEL", "Invalid $O access level %s." }, | |
42 | { "MCMSG_BAD_CHANSERV_LEVEL", "Invalid $C access level %s." }, | |
43 | { "MCMSG_LEVEL_TOO_LOW", "You cannot set the access requirements for %s (your level is too low.)" }, | |
44 | { "MCMSG_LEVEL_TOO_HIGH", "You cannot set the access requirements to %s (that is too high)." }, | |
45 | { "MCMSG_BAD_OPTION", "Unknown option %s." }, | |
46 | { "MCMSG_MUST_QUALIFY", "You $bMUST$b \"/msg %s@$s %s\" (not just /msg %s)." }, | |
47 | { "MCMSG_ACCOUNT_SUSPENDED", "Your account has been suspended." }, | |
48 | { "MCMSG_CHAN_NOT_REGISTERED", "%s has not been registered with $C." }, | |
49 | { "MCMSG_CHAN_SUSPENDED", "$b$C$b access to $b%s$b has been temporarily suspended (%s)." }, | |
50 | { "MCMSG_NO_CHANNEL_ACCESS", "You lack access to %s." }, | |
51 | { "MCMSG_LOW_CHANNEL_ACCESS", "You lack sufficient access in %s to use this command." }, | |
52 | { "MCMSG_REQUIRES_JOINABLE", "You must be in %s (or on its userlist) to use this command." }, | |
53 | { "MCMSG_MUST_BE_HELPING", "You must have security override (helping mode) on to use this command." }, | |
54 | { "MCMSG_MISSING_COMMAND", "You must specify a command as well as a channel." }, | |
55 | { "MCMSG_NO_CHANNEL_BEFORE", "You may not give a channel name before this command." }, | |
56 | { "MCMSG_NO_PLUS_CHANNEL", "You may not use a +channel with this command." }, | |
57 | { "MCMSG_COMMAND_ALIASES", "%s is an alias for: %s" }, | |
4048352e | 58 | { "MCMSG_HELP_COMMAND_ALIAS", "$uAlias for:$u %s" }, |
d76ed9a9 AS |
59 | { "MCMSG_COMMAND_BINDING", "%s is a binding of: %s" }, |
60 | { "MCMSG_ALIAS_ERROR", "Error in alias expansion for %s; check the error log for details." }, | |
61 | { "MCMSG_INTERNAL_COMMAND", "$b%s$b is an internal command and cannot be called directly; please check command bindings." }, | |
62 | { "MCMSG_UNKNOWN_MODULE", "Unknown module %s." }, | |
63 | { "MCMSG_UNKNOWN_SERVICE", "Unknown service %s." }, | |
64 | { "MCMSG_ALREADY_BOUND", "%s already has a command bound as %s." }, | |
65 | { "MCMSG_UNKNOWN_COMMAND_2", "Unknown command name %s (relative to service %s)." }, | |
66 | { "MCMSG_COMMAND_MODIFIED", "Option $b%s$b for $b%s$b has been set." }, | |
67 | { "MCMSG_INSPECTION_REFUSED", "You do not have access to inspect command %s." }, | |
68 | { "MCMSG_CANNOT_DOUBLE_ALIAS", "You cannot bind to a complex (argument-carrying) bind." }, | |
69 | { "MCMSG_BAD_ALIAS_ARGUMENT", "Invalid alias argument $b%s$b." }, | |
70 | { "MCMSG_COMMAND_BOUND", "New command %s bound to %s." }, | |
71 | { "MCMSG_MODULE_BOUND", "Bound %d commands from %s to %s." }, | |
72 | { "MCMSG_NO_COMMAND_BOUND", "%s has nothing bound as command %s." }, | |
73 | { "MCMSG_UNBIND_PROHIBITED", "It wouldn't be very much fun to unbind the last %s command, now would it?" }, | |
74 | { "MCMSG_COMMAND_UNBOUND", "Unbound command %s from %s." }, | |
75 | { "MCMSG_HELPFILE_UNBOUND", "Since that was the last command from module %s on the service, the helpfile for %s was removed." }, | |
76 | { "MCMSG_NO_HELPFILE", "Module %s does not have a help file." }, | |
77 | { "MCMSG_HELPFILE_ERROR", "Syntax error reading %s; help contents not changed." }, | |
78 | { "MCMSG_HELPFILE_READ", "Read %s help database in "FMT_TIME_T".%03lu seconds." }, | |
79 | { "MCMSG_COMMAND_TIME", "Command $b%s$b finished in "FMT_TIME_T".%06lu seconds." }, | |
80 | { "MCMSG_NEED_OPSERV_LEVEL", "You must have $O access of at least $b%u$b." }, | |
81 | { "MCMSG_NEED_CHANSERV_LEVEL", "You must have $C access of at least $b%u$b in the channel." }, | |
82 | { "MCMSG_NEED_ACCOUNT_FLAGS", "You must have account flags $b%s$b." }, | |
83 | { "MCMSG_NEED_NOTHING", "Anyone may use the $b%s$b command." }, | |
84 | { "MCMSG_NEED_STAFF_ACCESS", "You must be network staff." }, | |
85 | { "MCMSG_NEED_STAFF_OPER", "You must be an IRC operator." }, | |
86 | { "MCMSG_NEED_STAFF_NETHELPER", "You must be a network helper." }, | |
87 | { "MCMSG_NEED_STAFF_NETHELPER_OR_OPER", "You must be a network helper or IRC operator." }, | |
88 | { "MCMSG_NEED_STAFF_SHELPER", "You must be a support helper." }, | |
89 | { "MCMSG_NEED_STAFF_SHELPER_OR_OPER", "You must be a support helper or IRC operator." }, | |
90 | { "MCMSG_NEED_STAFF_HELPER", "You must be a network or support helper." }, | |
91 | { "MCMSG_NEED_JOINABLE", "The channel must be open or you must be in the channel or on its userlist." }, | |
92 | { "MCMSG_NEED_CHANUSER_CSUSPENDABLE", "You must be on the channel's userlist, and the channel can be suspended." }, | |
93 | { "MCMSG_NEED_CHANUSER", "You must be on the channel's userlist." }, | |
94 | { "MCMSG_NEED_REGCHAN", "You must specify a channel registered with $C." }, | |
95 | { "MCMSG_NEED_CHANNEL", "You must specify a channel that exists." }, | |
96 | { "MCMSG_NEED_AUTHED", "You must be authenticated with $N." }, | |
97 | { "MCMSG_IS_TOY", "$b%s$b is a toy command." }, | |
98 | { "MCMSG_END_REQUIREMENTS", "End of requirements for $b%s$b." }, | |
99 | { "MCMSG_ALREADY_HELPING", "You already have security override enabled." }, | |
100 | { "MCMSG_ALREADY_NOT_HELPING", "You already have security override disabled." }, | |
101 | { "MCMSG_NOW_HELPING", "Security override has been enabled." }, | |
102 | { "MCMSG_NOW_NOT_HELPING", "Security override has been disabled." }, | |
103 | { "MCMSG_JOINER_CHOICES", "Subcommands of %s: %s" }, | |
104 | { "MCMSG_MODULE_INFO", "Commands exported by module $b%s$b:" }, | |
105 | { "MCMSG_SERVICE_INFO", "Commands bound to service $b%s$b:" }, | |
106 | { "MCMSG_TOYS_DISABLED", "Toys are disabled in %s." }, | |
107 | { "MCMSG_PUBLIC_DENY", "Public commands in $b%s$b are restricted." }, | |
108 | { "MCMSG_HELPFILE_SEQUENCE", "Help priority %d: %s" }, | |
109 | { "MCMSG_HELPFILE_SEQUENCE_SET", "Set helpfile priority sequence for %s." }, | |
110 | { "MCMSG_BAD_SERVICE_NICK", "$b%s$b is an invalid nickname." }, | |
111 | { "MCMSG_ALREADY_SERVICE", "$b%s$b is already a service." }, | |
112 | { "MCMSG_NEW_SERVICE", "Added new service bot $b%s$b." }, | |
113 | { "MCMSG_SERVICE_RENAMED", "Service renamed to $b%s$b." }, | |
114 | { "MCMSG_NO_TRIGGER", "$b%s$b does not have an in-channel trigger." }, | |
115 | { "MCMSG_REMOVED_TRIGGER", "Removed trigger from $b%s$b." }, | |
116 | { "MCMSG_DUPLICATE_TRIGGER", "$b%s$b already uses trigger $b%c$b." }, | |
117 | { "MCMSG_CURRENT_TRIGGER", "Trigger for $b%s$b is $b%c$b." }, | |
118 | { "MCMSG_NEW_TRIGGER", "Changed trigger for $b%s$b to $b%c$b." }, | |
119 | { "MCMSG_SERVICE_PRIVILEGED", "Service $b%s$b privileged: $b%s$b." }, | |
120 | { "MCMSG_SERVICE_REMOVED", "Service $b%s$b has been deleted." }, | |
121 | { "MCMSG_FILE_NOT_OPENED", "Unable to open file $b%s$b for writing." }, | |
122 | { "MCMSG_MESSAGES_DUMPED", "Messages written to $b%s$b." }, | |
123 | { "MCMSG_MESSAGE_DUMP_FAILED", "Message dump failed: %s." }, | |
124 | { "MCMSG_COMMAND_FLAGS", "Command flags are %s (inferred: %s)." }, | |
125 | { "MCMSG_COMMAND_ACCOUNT_FLAGS", "Requires account flags +%s, prohibits account flags +%s." }, | |
126 | { "MCMSG_COMMAND_ACCESS_LEVEL", "Requires channel access %d and $O access %d." }, | |
127 | { "MCMSG_COMMAND_USES", "%s has been used %d times." }, | |
128 | { NULL, NULL } | |
129 | }; | |
130 | struct userData *_GetChannelUser(struct chanData *channel, struct handle_info *handle, int override, int allow_suspended); | |
131 | ||
132 | #define ACTION_ALLOW 1 | |
133 | #define ACTION_OVERRIDE 2 | |
134 | #define ACTION_NOCHANNEL 4 | |
135 | #define ACTION_STAFF 8 | |
136 | ||
137 | #define RESOLVE_DEPTH 4 | |
138 | ||
139 | static struct modcmd_flag { | |
140 | const char *name; | |
141 | unsigned int flag; | |
142 | } flags[] = { | |
143 | { "acceptchan", MODCMD_ACCEPT_CHANNEL }, | |
144 | { "acceptpluschan", MODCMD_ACCEPT_PCHANNEL }, | |
145 | { "authed", MODCMD_REQUIRE_AUTHED }, | |
146 | { "channel", MODCMD_REQUIRE_CHANNEL }, | |
147 | { "chanuser", MODCMD_REQUIRE_CHANUSER }, | |
148 | { "disabled", MODCMD_DISABLED }, | |
149 | { "ignore_csuspend", MODCMD_IGNORE_CSUSPEND }, | |
150 | { "joinable", MODCMD_REQUIRE_JOINABLE }, | |
151 | { "keepbound", MODCMD_KEEP_BOUND }, | |
152 | { "loghostmask", MODCMD_LOG_HOSTMASK }, | |
153 | { "nolog", MODCMD_NO_LOG }, | |
154 | { "networkhelper", MODCMD_REQUIRE_NETWORK_HELPER }, | |
155 | { "never_csuspend", MODCMD_NEVER_CSUSPEND }, | |
156 | { "oper", MODCMD_REQUIRE_OPER }, | |
157 | { "qualified", MODCMD_REQUIRE_QUALIFIED }, | |
158 | { "regchan", MODCMD_REQUIRE_REGCHAN }, | |
159 | { "supporthelper", MODCMD_REQUIRE_SUPPORT_HELPER }, | |
160 | { "helping", MODCMD_REQUIRE_HELPING }, | |
161 | { "toy", MODCMD_TOY }, | |
162 | { NULL, 0 } | |
163 | }; | |
164 | ||
165 | static int | |
166 | flags_bsearch(const void *a, const void *b) { | |
167 | const char *key = a; | |
168 | const struct modcmd_flag *flag = b; | |
169 | return ircncasecmp(key, flag->name, strlen(flag->name)); | |
170 | } | |
171 | ||
172 | static int | |
173 | flags_qsort(const void *a, const void *b) { | |
174 | const struct modcmd_flag *fa = a, *fb = b; | |
175 | return irccasecmp(fa->name, fb->name); | |
176 | } | |
177 | ||
178 | DEFINE_LIST(svccmd_list, struct svccmd*); | |
179 | DEFINE_LIST(module_list, struct module*); | |
180 | ||
181 | static void | |
182 | free_service_command(void *data) { | |
183 | struct svccmd *svccmd; | |
184 | unsigned int nn; | |
185 | ||
186 | svccmd = data; | |
187 | if (svccmd->alias.used) { | |
188 | for (nn=0; nn<svccmd->alias.used; ++nn) | |
189 | free(svccmd->alias.list[nn]); | |
190 | free(svccmd->alias.list); | |
191 | } | |
192 | free(svccmd->name); | |
193 | free(svccmd); | |
194 | } | |
195 | ||
196 | static void | |
197 | free_service(void *data) { | |
198 | struct service *service = data; | |
199 | dict_delete(service->commands); | |
200 | module_list_clean(&service->modules); | |
201 | free(service); | |
202 | } | |
203 | ||
204 | static void | |
205 | free_module_command(void *data) { | |
206 | struct modcmd *modcmd = data; | |
207 | free_service_command(modcmd->defaults); | |
208 | free(modcmd->name); | |
209 | free(modcmd); | |
210 | } | |
211 | ||
212 | static void | |
213 | free_module(void *data) { | |
214 | struct module *module = data; | |
215 | dict_delete(module->commands); | |
216 | close_helpfile(module->helpfile); | |
217 | free(module->name); | |
218 | free(module); | |
219 | } | |
220 | ||
221 | struct module * | |
222 | module_register(const char *name, struct log_type *clog, const char *helpfile_name, expand_func_t expand_help) { | |
223 | struct module *newmod; | |
224 | ||
225 | newmod = calloc(1, sizeof(*newmod)); | |
226 | newmod->name = strdup(name); | |
227 | newmod->commands = dict_new(); | |
228 | dict_set_free_data(newmod->commands, free_module_command); | |
229 | newmod->clog = clog; | |
230 | newmod->helpfile_name = helpfile_name; | |
231 | newmod->expand_help = expand_help; | |
232 | if (newmod->helpfile_name) { | |
233 | newmod->helpfile = open_helpfile(newmod->helpfile_name, newmod->expand_help); | |
234 | } | |
235 | dict_insert(modules, newmod->name, newmod); | |
236 | return newmod; | |
237 | } | |
238 | ||
239 | struct module * | |
240 | module_find(const char *name) { | |
241 | return dict_find(modules, name, NULL); | |
242 | } | |
243 | ||
244 | static void | |
245 | add_pending_template(struct svccmd *cmd, const char *target) { | |
246 | struct pending_template *pending = calloc(1, sizeof(*pending)); | |
247 | pending->cmd = cmd; | |
248 | pending->base = strdup(target); | |
249 | pending->next = pending_templates; | |
250 | pending_templates = pending; | |
251 | } | |
252 | ||
253 | static struct svccmd * | |
254 | svccmd_resolve_name(struct svccmd *origin, const char *name) { | |
255 | char *sep, svcname[MAXLEN]; | |
256 | ||
257 | if ((sep = strchr(name, '.'))) { | |
258 | memcpy(svcname, name, sep-name); | |
259 | svcname[sep-name] = 0; | |
260 | name = sep + 1; | |
261 | if (svcname[0] == '*') { | |
262 | struct module *module = module_find(svcname+1); | |
263 | struct modcmd *cmd = module ? dict_find(module->commands, name, NULL) : NULL; | |
264 | return cmd ? cmd->defaults : NULL; | |
265 | } else { | |
266 | struct service *service = service_find(svcname); | |
267 | return service ? dict_find(service->commands, name, NULL) : NULL; | |
268 | } | |
269 | } else { | |
270 | if (origin->parent) { | |
271 | return dict_find(origin->parent->commands, name, NULL); | |
272 | } else { | |
273 | struct modcmd *cmd = dict_find(origin->command->parent->commands, name, NULL); | |
274 | return cmd ? cmd->defaults : NULL; | |
275 | } | |
276 | } | |
277 | } | |
278 | ||
279 | static void | |
280 | modcmd_set_effective_flags(struct svccmd *cmd) { | |
281 | int flags = cmd->flags | cmd->command->flags; | |
282 | if (cmd->min_opserv_level > 0) | |
283 | flags |= MODCMD_REQUIRE_OPER; | |
284 | if (cmd->min_channel_access > 0) | |
285 | flags |= MODCMD_REQUIRE_CHANUSER; | |
286 | if (flags & MODCMD_REQUIRE_CHANUSER) | |
287 | flags |= MODCMD_REQUIRE_REGCHAN; | |
288 | if (flags & MODCMD_REQUIRE_REGCHAN) | |
289 | flags |= MODCMD_REQUIRE_CHANNEL; | |
290 | if (flags & (MODCMD_REQUIRE_STAFF|MODCMD_REQUIRE_HELPING)) | |
291 | flags |= MODCMD_REQUIRE_AUTHED; | |
292 | cmd->effective_flags = flags; | |
293 | } | |
294 | ||
295 | static void | |
296 | svccmd_copy_rules(struct svccmd *dest, struct svccmd *src) { | |
297 | dest->flags |= src->flags; | |
298 | dest->req_account_flags |= src->req_account_flags; | |
299 | dest->deny_account_flags |= src->deny_account_flags; | |
300 | if (src->min_opserv_level > dest->min_opserv_level) | |
301 | dest->min_opserv_level = src->min_opserv_level; | |
302 | if (src->min_channel_access > dest->min_channel_access) | |
303 | dest->min_channel_access = src->min_channel_access; | |
304 | modcmd_set_effective_flags(dest); | |
305 | } | |
306 | ||
307 | static int | |
308 | svccmd_configure(struct svccmd *cmd, struct userNode *user, struct userNode *bot, const char *param, const char *value) { | |
309 | if (!irccasecmp(param, "flags")) { | |
310 | unsigned int set_flags, rem_flags; | |
311 | struct modcmd_flag *flag; | |
312 | int opt, end; | |
313 | ||
314 | for (set_flags = rem_flags = 0; 1; value += end) { | |
315 | end = strcspn(value, ","); | |
316 | if (*value == '+') | |
317 | opt = 1; | |
318 | else if (*value == '-') | |
319 | opt = 0; | |
320 | else { | |
321 | if (user) | |
322 | send_message(user, bot, "MCMSG_BARE_FLAG", end, value); | |
323 | else | |
324 | log_module(MAIN_LOG, LOG_ERROR, "Flag %.*s must be preceded by a + or - (for command %s).", end, value, cmd->name); | |
325 | return 0; | |
326 | } | |
327 | value++; | |
328 | flag = bsearch(value, flags, ArrayLength(flags)-1, sizeof(flags[0]), flags_bsearch); | |
329 | if (!flag) { | |
330 | if (user) | |
331 | send_message(user, bot, "MCMSG_UNKNOWN_FLAG", end, value); | |
332 | else | |
333 | log_module(MAIN_LOG, LOG_ERROR, "Unknown module flag %.*s (for command %s).", end, value, cmd->name); | |
334 | return 0; | |
335 | } | |
336 | if (opt) | |
337 | set_flags |= flag->flag, rem_flags &= ~flag->flag; | |
338 | else | |
339 | rem_flags |= flag->flag, set_flags &= ~flag->flag; | |
340 | if (!value[end-1]) | |
341 | break; | |
342 | } | |
343 | cmd->flags = (cmd->flags | set_flags) & ~rem_flags; | |
344 | return 1; | |
345 | } else if (!irccasecmp(param, "channel_level") || !irccasecmp(param, "channel_access") || !irccasecmp(param, "access")) { | |
346 | unsigned short ul; | |
347 | if (!irccasecmp(value, "none") || !irccasecmp(value, "0")) { | |
348 | cmd->min_channel_access = 0; | |
349 | return 1; | |
350 | } else if ((ul = user_level_from_name(value, UL_OWNER)) > 0) { | |
351 | cmd->min_channel_access = ul; | |
352 | return 1; | |
353 | } else if (user) { | |
354 | send_message(user, bot, "MCMSG_BAD_CHANSERV_LEVEL", value); | |
355 | return 0; | |
356 | } else { | |
357 | log_module(MAIN_LOG, LOG_ERROR, "Invalid ChanServ access level %s (for command %s).", value, cmd->name); | |
358 | return 0; | |
359 | } | |
360 | } else if (!irccasecmp(param, "oper_level") || !irccasecmp(param, "oper_access") || !irccasecmp(param, "level")) { | |
361 | unsigned int newval = atoi(value); | |
362 | if (!isdigit(value[0]) || (newval > 1000)) { | |
363 | if (user) | |
364 | send_message(user, bot, "MCMSG_BAD_OPSERV_LEVEL", value); | |
365 | else | |
366 | log_module(MAIN_LOG, LOG_ERROR, "Invalid OpServ access level %s (for command %s).", value, cmd->name); | |
367 | return 0; | |
368 | } | |
369 | if (user && (!user->handle_info || (cmd->min_opserv_level > user->handle_info->opserv_level))) { | |
370 | send_message(user, bot, "MCMSG_LEVEL_TOO_LOW", cmd->name); | |
371 | return 0; | |
372 | } | |
373 | if (user && (!user->handle_info || (newval > user->handle_info->opserv_level))) { | |
374 | send_message(user, bot, "MCMSG_LEVEL_TOO_HIGH", value); | |
375 | return 0; | |
376 | } | |
377 | cmd->min_opserv_level = newval; | |
378 | return 1; | |
379 | } else if (!irccasecmp(param, "account_flags")) { | |
380 | return nickserv_modify_handle_flags(user, bot, value, &cmd->req_account_flags, &cmd->deny_account_flags); | |
381 | } else { | |
382 | if (user) | |
383 | send_message(user, bot, "MCMSG_BAD_OPTION", param); | |
384 | else | |
385 | log_module(MAIN_LOG, LOG_ERROR, "Unknown option %s (for command %s).", param, cmd->name); | |
386 | return 0; | |
387 | } | |
388 | } | |
389 | ||
390 | struct modcmd * | |
391 | modcmd_register(struct module *module, const char *name, modcmd_func_t func, unsigned int min_argc, unsigned int flags, ...) { | |
392 | struct modcmd *newcmd; | |
393 | va_list args; | |
394 | const char *param, *value; | |
395 | ||
396 | newcmd = calloc(1, sizeof(*newcmd)); | |
397 | newcmd->name = strdup(name); | |
398 | newcmd->parent = module; | |
399 | newcmd->func = func; | |
400 | newcmd->min_argc = min_argc; | |
401 | newcmd->flags = flags; | |
402 | newcmd->defaults = calloc(1, sizeof(*newcmd->defaults)); | |
403 | newcmd->defaults->name = strdup(newcmd->name); | |
404 | newcmd->defaults->command = newcmd; | |
405 | dict_insert(module->commands, newcmd->name, newcmd); | |
406 | if (newcmd->flags & (MODCMD_REQUIRE_REGCHAN|MODCMD_REQUIRE_CHANNEL|MODCMD_REQUIRE_CHANUSER|MODCMD_REQUIRE_JOINABLE)) { | |
407 | newcmd->defaults->flags |= MODCMD_ACCEPT_CHANNEL; | |
408 | } | |
409 | if (newcmd->flags & MODCMD_REQUIRE_STAFF) { | |
410 | newcmd->defaults->flags |= MODCMD_REQUIRE_AUTHED; | |
411 | } | |
412 | va_start(args, flags); | |
413 | while ((param = va_arg(args, const char*))) { | |
414 | value = va_arg(args, const char*); | |
415 | if (!irccasecmp(param, "template")) { | |
416 | struct svccmd *svccmd = svccmd_resolve_name(newcmd->defaults, value); | |
417 | if (svccmd) { | |
418 | svccmd_copy_rules(newcmd->defaults, svccmd); | |
419 | } else { | |
420 | log_module(MAIN_LOG, LOG_ERROR, "Unable to resolve template name %s for %s.%s.", value, newcmd->parent->name, newcmd->name); | |
421 | } | |
422 | add_pending_template(newcmd->defaults, value); | |
423 | } else { | |
424 | svccmd_configure(newcmd->defaults, NULL, NULL, param, value); | |
425 | } | |
426 | } | |
427 | modcmd_set_effective_flags(newcmd->defaults); | |
428 | va_end(args); | |
429 | return newcmd; | |
430 | } | |
431 | ||
432 | /* This is kind of a lame hack, but it is actually simpler than having | |
433 | * the permission check vary based on the command itself, or having a | |
434 | * more generic rule system. | |
435 | */ | |
436 | int | |
437 | svccmd_can_invoke(struct userNode *user, struct userNode *bot, struct svccmd *cmd, struct chanNode *channel, int options) { | |
438 | unsigned int uData_checked = 0; | |
439 | struct userData *uData = NULL; | |
440 | int rflags = 0, flags = cmd->effective_flags; | |
441 | ||
442 | if (flags & MODCMD_DISABLED) { | |
443 | if (options & SVCCMD_NOISY) | |
444 | send_message(user, bot, "MSG_COMMAND_DISABLED", cmd->name); | |
445 | return 0; | |
446 | } | |
447 | if ((flags & MODCMD_REQUIRE_QUALIFIED) && !(options & SVCCMD_QUALIFIED)) { | |
448 | if (options & SVCCMD_NOISY) | |
449 | send_message(user, bot, "MCMSG_MUST_QUALIFY", bot->nick, cmd->name, bot->nick); | |
450 | return 0; | |
451 | } | |
452 | if (flags & MODCMD_REQUIRE_AUTHED) { | |
453 | if (!user->handle_info) { | |
454 | if (options & SVCCMD_NOISY) | |
455 | send_message(user, bot, "MSG_AUTHENTICATE"); | |
456 | return 0; | |
457 | } | |
458 | if (HANDLE_FLAGGED(user->handle_info, SUSPENDED)) { | |
459 | if (options & SVCCMD_NOISY) | |
460 | send_message(user, bot, "MCMSG_ACCOUNT_SUSPENDED"); | |
461 | return 0; | |
462 | } | |
463 | } | |
464 | if (channel || (options & SVCCMD_NOISY)) { | |
465 | if ((flags & MODCMD_REQUIRE_CHANNEL) && !channel) { | |
466 | if (options & SVCCMD_NOISY) | |
467 | send_message(user, bot, "MSG_INVALID_CHANNEL"); | |
468 | return 0; | |
469 | } | |
470 | if (flags & MODCMD_REQUIRE_REGCHAN) { | |
471 | if (!channel->channel_info) { | |
472 | if (options & SVCCMD_NOISY) | |
473 | send_message(user, bot, "MCMSG_CHAN_NOT_REGISTERED", channel->name); | |
474 | return 0; | |
475 | } else if (IsSuspended(channel->channel_info) && !(flags & MODCMD_IGNORE_CSUSPEND)) { | |
476 | /* allow security-override users to always ignore channel suspensions, but flag it as a staff command */ | |
477 | if (!user->handle_info | |
478 | || !HANDLE_FLAGGED(user->handle_info, HELPING) | |
479 | || (flags & MODCMD_NEVER_CSUSPEND)) { | |
480 | if (options & SVCCMD_NOISY) | |
481 | send_message(user, bot, "MCMSG_CHAN_SUSPENDED", channel->name, channel->channel_info->suspended->reason); | |
482 | return 0; | |
483 | } | |
484 | rflags |= ACTION_STAFF; | |
485 | } | |
486 | } | |
487 | if (flags & MODCMD_REQUIRE_CHANUSER) { | |
488 | if (!uData_checked) | |
489 | uData = _GetChannelUser(channel->channel_info, user->handle_info, 1, 0), uData_checked = 1; | |
490 | if (!uData) { | |
491 | if (options & SVCCMD_NOISY) | |
492 | send_message(user, bot, "MCMSG_NO_CHANNEL_ACCESS", channel->name); | |
493 | return 0; | |
494 | } else if (uData->access < cmd->min_channel_access) { | |
495 | if (options & SVCCMD_NOISY) | |
496 | send_message(user, bot, "MCMSG_LOW_CHANNEL_ACCESS", channel->name); | |
497 | return 0; | |
498 | } | |
499 | } | |
500 | if ((flags & MODCMD_REQUIRE_JOINABLE) && channel) { | |
501 | if (!uData_checked) | |
502 | uData = _GetChannelUser(channel->channel_info, user->handle_info, 1, 0), uData_checked = 1; | |
503 | if ((channel->modes & (MODE_INVITEONLY|MODE_KEY|MODE_SECRET)) | |
504 | && !uData | |
505 | && !IsService(user) | |
506 | && !GetUserMode(channel, user)) { | |
507 | if (options & SVCCMD_NOISY) | |
508 | send_message(user, bot, "MCMSG_REQUIRES_JOINABLE", channel->name); | |
509 | return 0; | |
510 | } | |
511 | } | |
512 | if ((flags & MODCMD_TOY) && channel) { | |
513 | if (!channel->channel_info) | |
514 | rflags |= ACTION_NOCHANNEL; | |
515 | else switch (channel->channel_info->chOpts[chToys]) { | |
516 | case 'd': | |
517 | if (options & SVCCMD_NOISY) | |
518 | send_message(user, bot, "MCMSG_TOYS_DISABLED", channel->name); | |
519 | return 0; | |
520 | case 'n': | |
521 | rflags |= ACTION_NOCHANNEL; | |
522 | break; | |
523 | case 'p': | |
524 | break; | |
525 | } | |
526 | } | |
527 | } | |
528 | if (flags & MODCMD_REQUIRE_STAFF) { | |
529 | if (((flags & MODCMD_REQUIRE_OPER) && IsOper(user)) | |
530 | || ((flags & MODCMD_REQUIRE_NETWORK_HELPER) && IsNetworkHelper(user)) | |
531 | || ((flags & MODCMD_REQUIRE_SUPPORT_HELPER) && IsSupportHelper(user))) { | |
532 | /* allow it */ | |
533 | rflags |= ACTION_STAFF; | |
534 | } else { | |
535 | if (options & SVCCMD_NOISY) | |
536 | send_message(user, bot, "MSG_COMMAND_PRIVILEGED", cmd->name); | |
537 | return 0; | |
538 | } | |
539 | } | |
540 | if (flags & MODCMD_REQUIRE_HELPING) { | |
541 | if (!HANDLE_FLAGGED(user->handle_info, HELPING)) { | |
542 | if (options & SVCCMD_NOISY) | |
543 | send_message(user, bot, "MCMSG_MUST_BE_HELPING"); | |
544 | return 0; | |
545 | } | |
546 | rflags |= ACTION_STAFF; | |
547 | } | |
548 | if (cmd->min_opserv_level > 0) { | |
549 | if (!oper_has_access(user, bot, cmd->min_opserv_level, !(options & SVCCMD_NOISY))) return 0; | |
550 | rflags |= ACTION_STAFF; | |
551 | } | |
552 | if (cmd->req_account_flags || cmd->deny_account_flags) { | |
553 | if (!user->handle_info) { | |
554 | if (options & SVCCMD_NOISY) | |
555 | send_message(user, bot, "MSG_AUTHENTICATE"); | |
556 | return 0; | |
557 | } | |
558 | /* Do we want separate or different messages here? */ | |
559 | if ((cmd->req_account_flags & ~user->handle_info->flags) | |
560 | || (cmd->deny_account_flags & user->handle_info->flags)) { | |
561 | if (options & SVCCMD_NOISY) | |
562 | send_message(user, bot, "MSG_COMMAND_PRIVILEGED", cmd->name); | |
563 | return 0; | |
564 | } | |
565 | } | |
566 | ||
567 | /* If it's an override, return a special value. */ | |
568 | if ((flags & MODCMD_REQUIRE_CHANUSER) | |
569 | && (options & SVCCMD_NOISY) | |
570 | && (uData->access > 500) | |
571 | && (!(uData = _GetChannelUser(channel->channel_info, user->handle_info, 0, 0)) | |
572 | || uData->access < cmd->min_channel_access) | |
573 | && !(flags & (MODCMD_REQUIRE_STAFF|MODCMD_REQUIRE_HELPING))) { | |
574 | rflags |= ACTION_OVERRIDE; | |
575 | } | |
576 | return rflags | ACTION_ALLOW; | |
577 | } | |
578 | ||
579 | static int | |
580 | svccmd_expand_alias(struct svccmd *cmd, unsigned int old_argc, char *old_argv[], char *new_argv[]) { | |
581 | unsigned int ii, new_argc; | |
582 | char *arg; | |
583 | ||
584 | for (ii=new_argc=0; ii<cmd->alias.used; ++ii) { | |
585 | arg = cmd->alias.list[ii]; | |
586 | if (arg[0] != '$') { | |
587 | new_argv[new_argc++] = arg; | |
588 | continue; | |
589 | } | |
590 | if (arg[1] == '$') { | |
591 | new_argv[new_argc++] = arg + 1; | |
592 | } else if (isdigit(arg[1])) { | |
593 | unsigned int lbound, ubound, jj; | |
594 | char *end_num; | |
595 | ||
596 | lbound = strtoul(arg+1, &end_num, 10); | |
597 | switch (end_num[0]) { | |
598 | case 0: ubound = lbound; break; | |
599 | case '-': | |
600 | if (end_num[1] == 0) { | |
601 | ubound = old_argc - 1; | |
602 | break; | |
603 | } else if (isdigit(end_num[1])) { | |
604 | ubound = strtoul(end_num+1, NULL, 10); | |
605 | break; | |
606 | } | |
607 | /* else fall through to default case */ | |
608 | default: | |
609 | log_module(MAIN_LOG, LOG_ERROR, "Alias expansion parse error in %s (near %s; %s.%s arg %d).", arg, end_num, cmd->parent->bot->nick, cmd->name, ii); | |
610 | return 0; | |
611 | } | |
612 | if (ubound >= old_argc) | |
613 | ubound = old_argc - 1; | |
614 | if (lbound < old_argc) | |
615 | for (jj = lbound; jj <= ubound; ) | |
616 | new_argv[new_argc++] = old_argv[jj++]; | |
617 | } else { | |
618 | log_module(MAIN_LOG, LOG_ERROR, "Alias expansion: I do not know how to handle %s (%s.%s arg %d).", arg, cmd->parent->bot->nick, cmd->name, ii); | |
619 | return 0; | |
620 | } | |
621 | } | |
622 | return new_argc; | |
623 | } | |
624 | ||
625 | int | |
626 | svccmd_invoke_argv(struct userNode *user, struct service *service, struct chanNode *channel, unsigned int argc, char *argv[], unsigned int server_qualified) { | |
627 | extern struct userNode *chanserv; | |
628 | struct svccmd *cmd; | |
629 | unsigned int cmd_arg, perms, flags, options; | |
630 | char channel_name[CHANNELLEN+1]; | |
631 | ||
632 | /* First check pubcmd for the channel. */ | |
633 | if (channel && (channel->channel_info) && (service->bot == chanserv) | |
634 | && !check_user_level(channel, user, lvlPubCmd, 1, 0)) { | |
635 | send_message(user, service->bot, "MCMSG_PUBLIC_DENY", channel->name); | |
636 | return 0; | |
637 | } | |
638 | ||
639 | options = (server_qualified ? SVCCMD_QUALIFIED : 0) | SVCCMD_DEBIT | SVCCMD_NOISY; | |
640 | /* Find the command argument. */ | |
641 | cmd_arg = IsChannelName(argv[0]) ? 1 : 0; | |
642 | if (argc < cmd_arg+1) { | |
643 | send_message(user, service->bot, "MCMSG_MISSING_COMMAND"); | |
644 | return 0; | |
645 | } | |
646 | if (!isalnum(*argv[cmd_arg])) { | |
647 | /* Silently ignore stuff that doesn't begin with a letter or number. */ | |
648 | return 0; | |
649 | } | |
650 | cmd = dict_find(service->commands, argv[cmd_arg], NULL); | |
651 | if (!cmd) { | |
652 | if (!channel) | |
653 | send_message(user, service->bot, "MSG_COMMAND_UNKNOWN", argv[cmd_arg]); | |
654 | return 0; | |
655 | } | |
656 | flags = cmd->effective_flags; | |
657 | /* If they put a channel name first, check if the command allows | |
658 | * it. If so, swap it with the command name. | |
659 | */ | |
660 | if (cmd_arg == 1) { | |
661 | char *tmp; | |
662 | /* Complain if we're not supposed to accept the channel. */ | |
663 | if (!(flags & MODCMD_ACCEPT_CHANNEL)) { | |
664 | send_message(user, service->bot, "MCMSG_NO_CHANNEL_BEFORE"); | |
665 | return 0; | |
666 | } | |
667 | if (!(flags & MODCMD_ACCEPT_PCHANNEL) | |
668 | && (argv[0][0] == '+')) { | |
669 | send_message(user, service->bot, "MCMSG_NO_PLUS_CHANNEL"); | |
670 | return 0; | |
671 | } | |
672 | tmp = argv[1]; | |
673 | argv[1] = argv[0]; | |
674 | argv[0] = tmp; | |
675 | } | |
676 | ||
677 | /* Try to grab a channel handle before alias expansion. | |
678 | * If the command accepts a channel name, and argv[1] is | |
679 | * one, use it as a channel name, and hide it from logging. | |
680 | */ | |
681 | if ((argc > 1) | |
682 | && (flags & MODCMD_ACCEPT_CHANNEL) | |
683 | && IsChannelName(argv[1]) | |
684 | && ((argv[1][0] != '+') || (flags & MODCMD_ACCEPT_PCHANNEL)) | |
685 | && (channel = dict_find(channels, argv[1], NULL))) { | |
686 | argv[1] = argv[0]; | |
687 | argv++, argc--; | |
688 | cmd_arg = 1; | |
689 | } | |
690 | ||
691 | /* Expand the alias arguments, if there are any. */ | |
692 | if (cmd->alias.used) { | |
693 | char *new_argv[MAXNUMPARAMS]; | |
694 | argc = svccmd_expand_alias(cmd, argc, argv, new_argv); | |
695 | if (!argc) { | |
696 | send_message(service->bot, user, "MCMSG_ALIAS_ERROR", cmd->name); | |
697 | return 0; | |
698 | } | |
699 | argv = new_argv; | |
700 | ||
701 | /* Try again to grab a handle to the channel after alias | |
702 | * expansion, overwriting any previous channel. This should, | |
703 | * of course, only be done again if an alias was acually | |
704 | * expanded. */ | |
705 | if ((argc > 1) | |
706 | && (flags & MODCMD_ACCEPT_CHANNEL) | |
707 | && IsChannelName(argv[1]) | |
708 | && ((argv[1][0] != '+') || (flags & MODCMD_ACCEPT_PCHANNEL)) | |
709 | && (channel = dict_find(channels, argv[1], NULL))) { | |
710 | argv[1] = argv[0]; | |
711 | argv++, argc--; | |
712 | cmd_arg = 1; | |
713 | } | |
714 | } | |
715 | ||
716 | /* Figure out what actions we should do for it.. */ | |
717 | if (cmd_arg && (flags & MODCMD_TOY)) { | |
718 | /* Do not let user manually specify a channel. */ | |
719 | channel = NULL; | |
720 | } | |
721 | if (argc < cmd->command->min_argc) { | |
722 | send_message(user, service->bot, "MSG_MISSING_PARAMS", cmd->name); | |
723 | return 0; | |
724 | } | |
725 | if (!cmd->command->func) { | |
726 | send_message(user, service->bot, "MCMSG_INTERNAL_COMMAND", cmd->name); | |
727 | return 0; | |
728 | } | |
729 | perms = svccmd_can_invoke(user, service->bot, cmd, channel, options); | |
730 | if (!perms) | |
731 | return 0; | |
732 | cmd->uses++; | |
733 | if (perms & ACTION_NOCHANNEL) | |
734 | channel = NULL; | |
735 | ||
736 | if (channel) | |
737 | safestrncpy(channel_name, channel->name, sizeof(channel_name)); | |
738 | else | |
739 | channel_name[0] = 0; | |
740 | if (!cmd->command->func(user, channel, argc, argv, cmd)) | |
741 | return 0; | |
742 | if (!(flags & MODCMD_NO_LOG)) { | |
743 | enum log_severity slvl; | |
744 | if (perms & ACTION_STAFF) | |
745 | slvl = LOG_STAFF; | |
746 | else if (perms & ACTION_OVERRIDE) | |
747 | slvl = LOG_OVERRIDE; | |
748 | else | |
749 | slvl = LOG_COMMAND; | |
750 | /* Unsplit argv after running the function to get the benefit | |
751 | * of any mangling/hiding done by the commands. */ | |
752 | log_audit(cmd->command->parent->clog, slvl, user, service->bot, channel_name, ((flags & MODCMD_LOG_HOSTMASK) ? AUDIT_HOSTMASK : 0), unsplit_string(argv, argc, NULL)); | |
753 | } | |
754 | return 1; | |
755 | } | |
756 | ||
757 | int | |
758 | svccmd_send_help(struct userNode *user, struct userNode *bot, struct svccmd *cmd) { | |
759 | char cmdname[MAXLEN]; | |
760 | unsigned int nn; | |
4048352e | 761 | int r; |
d76ed9a9 AS |
762 | /* Show command name (in bold). */ |
763 | for (nn=0; cmd->name[nn]; nn++) | |
764 | cmdname[nn] = toupper(cmd->name[nn]); | |
765 | cmdname[nn] = 0; | |
4048352e AS |
766 | send_message_type(4, user, bot, "=--- $b%s$b ---=", cmdname); |
767 | ||
768 | /* Show the help entry for the underlying command. */ | |
769 | /* Lets not show help for a parent command, thats not what | |
770 | * they asked for! | |
771 | * return send_help(user, bot, cmd->command->parent->helpfile, cmd->command->name); | |
772 | * TODO: We actually DO want to show the parent IF there is no other help. | |
773 | */ | |
774 | r = send_help(user, bot, cmd->command->parent->helpfile, cmd->name); | |
775 | ||
d76ed9a9 AS |
776 | /* If it's an alias, show what it's an alias for. */ |
777 | if (cmd->alias.used) { | |
778 | char alias_text[MAXLEN]; | |
779 | unsplit_string((char**)cmd->alias.list, cmd->alias.used, alias_text); | |
4048352e | 780 | send_message(user, bot, "MCMSG_HELP_COMMAND_ALIAS", alias_text); |
d76ed9a9 | 781 | } |
4048352e | 782 | return r; |
d76ed9a9 AS |
783 | } |
784 | ||
785 | int | |
786 | svccmd_send_help_2(struct userNode *user, struct service *service, const char *topic) { | |
787 | struct module *module; | |
788 | struct svccmd *cmd; | |
789 | unsigned int ii; | |
790 | ||
4048352e | 791 | /* If there is a command, send help for the command */ |
d76ed9a9 AS |
792 | if ((cmd = dict_find(service->commands, topic, NULL))) |
793 | return svccmd_send_help(user, service->bot, cmd); | |
4048352e AS |
794 | |
795 | /* If there is no topic show the index */ | |
d76ed9a9 AS |
796 | if (!topic) |
797 | topic = "<index>"; | |
4048352e | 798 | /* look for the thing in the included help files */ |
d76ed9a9 AS |
799 | for (ii = 0; ii < service->modules.used; ++ii) { |
800 | module = service->modules.list[ii]; | |
801 | if (!module->helpfile) | |
802 | continue; | |
803 | if (dict_find(module->helpfile->db, topic, NULL)) | |
804 | return send_help(user, service->bot, module->helpfile, topic); | |
805 | } | |
4048352e | 806 | /* Otherwise say we cant find it */ |
d76ed9a9 AS |
807 | send_message(user, service->bot, "MSG_TOPIC_UNKNOWN"); |
808 | return 0; | |
809 | } | |
810 | ||
811 | static int | |
812 | svccmd_invoke(struct userNode *user, struct service *service, struct chanNode *channel, char *text, int server_qualified) { | |
813 | unsigned int argc; | |
814 | char *argv[MAXNUMPARAMS]; | |
815 | ||
816 | if (!*text) | |
817 | return 0; | |
818 | if (service->privileged) { | |
819 | if (!IsOper(user)) { | |
820 | send_message(user, service->bot, "MSG_SERVICE_PRIVILEGED", service->bot->nick); | |
821 | return 0; | |
822 | } | |
823 | if (!user->handle_info) { | |
824 | send_message(user, service->bot, "MSG_AUTHENTICATE"); | |
825 | return 0; | |
826 | } | |
827 | if (HANDLE_FLAGGED(user->handle_info, OPER_SUSPENDED)) { | |
828 | send_message(user, service->bot, "MSG_OPER_SUSPENDED"); | |
829 | return 0; | |
830 | } | |
831 | } | |
832 | argc = split_line(text, false, ArrayLength(argv), argv); | |
833 | return argc ? svccmd_invoke_argv(user, service, channel, argc, argv, server_qualified) : 0; | |
834 | } | |
835 | ||
836 | void | |
837 | modcmd_privmsg(struct userNode *user, struct userNode *bot, char *text, int server_qualified) { | |
838 | struct service *service; | |
839 | ||
840 | if (!(service = dict_find(services, bot->nick, NULL))) { | |
841 | log_module(MAIN_LOG, LOG_ERROR, "modcmd_privmsg got privmsg for unhandled service %s, unregistering.", bot->nick); | |
842 | reg_privmsg_func(bot, NULL); | |
843 | return; | |
844 | } | |
845 | ||
846 | if (text[0] == '\x01') { | |
847 | char *term, response[MAXLEN]; | |
848 | ||
849 | text++; /* Skip leading ^A. */ | |
850 | /* Chop off final ^A. */ | |
851 | term = strchr(text, '\x01'); | |
852 | if (!term) | |
853 | return; | |
854 | *term = '\0'; | |
855 | /* Parse out leading text. */ | |
856 | term = strchr(text, ' '); | |
857 | if (term) { | |
858 | *term++ = '\0'; | |
859 | if (!*term) | |
860 | term = NULL; | |
861 | } | |
862 | /* No dict lookup since these are so few. */ | |
863 | if (!irccasecmp(text, "CLIENTINFO")) { | |
864 | /* Use \001 instead of \x01 because apparently \x01C is | |
865 | * interpreted as ASCII FS (\034, decimal 28, hex 1C). | |
866 | */ | |
867 | irc_notice_user(bot, user, "\001CLIENTINFO CLIENTINFO PING TIME USERINFO VERSION\x01"); | |
868 | } else if (!irccasecmp(text, "PING")) { | |
869 | if (term) { | |
870 | snprintf(response, sizeof(response), "\x01PONG %s\x01", term); | |
871 | irc_notice_user(bot, user, response); | |
872 | } else { | |
873 | irc_notice_user(bot,user, "\x01PONG\x01"); | |
874 | } | |
875 | } else if (!irccasecmp(text, "TIME")) { | |
876 | struct tm tm; | |
877 | localtime_r(&now, &tm); | |
878 | strftime(response, sizeof(response), "\x01TIME %a %b %d %H:%M:%S %Y\x01", &tm); | |
879 | irc_notice_user(bot, user, response); | |
880 | } else if (!irccasecmp(text, "USERINFO")) { | |
881 | snprintf(response, sizeof(response), "\x01USERINFO %s\x01", bot->info); | |
882 | irc_notice_user(bot, user, response); | |
883 | } else if (!irccasecmp(text, "VERSION")) { | |
884 | /* This function provides copyright management information | |
885 | * to end users of srvx. You should not alter, disable or | |
886 | * remove this command or its accessibility to normal IRC | |
887 | * users, except to add copyright information pertaining | |
888 | * to changes you make to srvx. | |
889 | */ | |
890 | snprintf(response, sizeof(response), "\x01VERSION %s (%s) %s\x01", PACKAGE_STRING, CODENAME, ""); | |
891 | irc_notice_user(bot, user, response); | |
892 | } | |
893 | return; | |
894 | } | |
895 | ||
896 | if (service->msg_hook && service->msg_hook(user, bot, text, server_qualified)) | |
897 | return; | |
898 | svccmd_invoke(user, service, NULL, text, server_qualified); | |
899 | } | |
900 | ||
901 | void | |
902 | modcmd_chanmsg(struct userNode *user, struct chanNode *chan, char *text, struct userNode *bot) { | |
903 | struct service *service; | |
904 | if (!(service = dict_find(services, bot->nick, NULL))) return; | |
905 | svccmd_invoke(user, service, chan, text, 0); | |
906 | } | |
907 | ||
908 | struct service * | |
909 | service_register(struct userNode *bot) { | |
910 | struct service *service; | |
911 | if ((service = dict_find(services, bot->nick, NULL))) | |
912 | return service; | |
913 | service = calloc(1, sizeof(*service)); | |
914 | module_list_init(&service->modules); | |
915 | service->commands = dict_new(); | |
916 | service->bot = bot; | |
917 | dict_set_free_data(service->commands, free_service_command); | |
918 | dict_insert(services, service->bot->nick, service); | |
919 | reg_privmsg_func(bot, modcmd_privmsg); | |
920 | return service; | |
921 | } | |
922 | ||
923 | struct service * | |
924 | service_find(const char *name) { | |
925 | return dict_find(services, name, NULL); | |
926 | } | |
927 | ||
928 | static void | |
929 | svccmd_insert(struct service *service, char *name, struct svccmd *svccmd, struct modcmd *modcmd) { | |
930 | unsigned int ii; | |
931 | svccmd->parent = service; | |
932 | svccmd->name = name; | |
933 | svccmd->command = modcmd; | |
934 | svccmd->command->bind_count++; | |
935 | dict_insert(service->commands, svccmd->name, svccmd); | |
936 | for (ii=0; ii<service->modules.used; ++ii) { | |
937 | if (service->modules.list[ii] == svccmd->command->parent) break; | |
938 | } | |
939 | if (ii == service->modules.used) { | |
940 | module_list_append(&service->modules, svccmd->command->parent); | |
941 | } | |
942 | } | |
943 | ||
944 | struct svccmd * | |
945 | service_bind_modcmd(struct service *service, struct modcmd *cmd, const char *name) { | |
946 | struct svccmd *svccmd; | |
947 | if ((svccmd = dict_find(service->commands, name, NULL))) { | |
948 | if (svccmd->command == cmd) return svccmd; | |
949 | log_module(MAIN_LOG, LOG_ERROR, "Tried to bind command %s.%s into service %s as %s, but already bound (as %s.%s).", cmd->parent->name, cmd->name, service->bot->nick, name, svccmd->command->parent->name, svccmd->command->name); | |
950 | return NULL; | |
951 | } | |
952 | svccmd = calloc(1, sizeof(*svccmd)); | |
953 | svccmd_insert(service, strdup(name), svccmd, cmd); | |
954 | svccmd_copy_rules(svccmd, cmd->defaults); | |
955 | return svccmd; | |
956 | } | |
957 | ||
958 | static unsigned int | |
959 | service_bind_module(struct service *service, struct module *module) { | |
960 | dict_iterator_t it; | |
961 | struct modcmd *modcmd; | |
962 | unsigned int count; | |
963 | ||
964 | count = 0; | |
965 | for (it = dict_first(module->commands); it; it = iter_next(it)) { | |
966 | modcmd = iter_data(it); | |
967 | if (!((modcmd->flags | modcmd->defaults->flags) & MODCMD_NO_DEFAULT_BIND)) | |
968 | if (service_bind_modcmd(service, modcmd, iter_key(it))) | |
969 | count++; | |
970 | } | |
971 | return count; | |
972 | } | |
973 | ||
974 | /* This MUST return argc if the alias expansion code knows how to deal | |
975 | * with every argument in argv; otherwise, it MUST return the index of | |
976 | * an argument that the expansion code does not know how to deal with. | |
977 | */ | |
978 | static unsigned int | |
979 | check_alias_args(char *argv[], unsigned int argc) { | |
980 | unsigned int arg; | |
981 | ||
982 | for (arg=0; arg<argc; ++arg) { | |
983 | if (argv[arg][0] != '$') { | |
984 | continue; | |
985 | } else if (argv[arg][1] == '$') { | |
986 | continue; | |
987 | } else if (isdigit(argv[arg][1])) { | |
988 | char *end_num; | |
989 | ||
990 | strtoul(argv[arg]+1, &end_num, 10); | |
991 | switch (end_num[0]) { | |
992 | case 0: | |
993 | continue; | |
994 | case '-': | |
995 | if (end_num[1] == 0) | |
996 | continue; | |
997 | else if (isdigit(end_num[1])) | |
998 | continue; | |
999 | /* else fall through to default case */ | |
1000 | default: | |
1001 | return arg; | |
1002 | } | |
1003 | } else | |
1004 | return arg; | |
1005 | } | |
1006 | return arg; | |
1007 | } | |
1008 | ||
1009 | static unsigned int | |
1010 | collapse_cmdname(char *argv[], unsigned int argc, char *dest) { | |
1011 | unsigned int ii, pos, arg; | |
1012 | if (!argc) { | |
1013 | dest[0] = 0; | |
1014 | return 0; | |
1015 | } | |
1016 | for (ii=pos=0, arg=0; argv[arg][ii]; ) { | |
1017 | if (argv[arg][ii] == '\\') { | |
1018 | if (argv[arg][ii+1]) { | |
1019 | /* escaping a real character just puts it in literally */ | |
1020 | dest[pos++] = argv[arg][++ii]; | |
1021 | } else if ((arg+1) == argc) { | |
1022 | /* we ran to the end of the argument list; abort */ | |
1023 | break; | |
1024 | } else { | |
1025 | /* escape at end of a word is a space */ | |
1026 | dest[pos++] = ' '; | |
1027 | ii = 0; | |
1028 | arg++; | |
1029 | } | |
1030 | } else { | |
1031 | /* normal characters don't need escapes */ | |
1032 | dest[pos++] = argv[arg][ii++]; | |
1033 | } | |
1034 | } | |
1035 | dest[pos] = 0; | |
1036 | return arg + 1; | |
1037 | } | |
1038 | ||
1039 | static MODCMD_FUNC(cmd_bind) { | |
1040 | struct service *service; | |
1041 | struct svccmd *template, *newcmd; | |
1042 | char *svcname, *dot; | |
1043 | char newname[MAXLEN], cmdname[MAXLEN]; | |
1044 | unsigned int arg, diff; | |
1045 | ||
1046 | assert(argc > 3); | |
1047 | svcname = argv[1]; | |
1048 | arg = collapse_cmdname(argv+2, argc-2, newname) + 2; | |
1049 | if (!arg) { | |
1050 | reply("MSG_MISSING_PARAMS", cmd->name); | |
1051 | return 0; | |
1052 | } | |
1053 | diff = collapse_cmdname(argv+arg, argc-arg, cmdname); | |
1054 | if (!diff) { | |
1055 | reply("MSG_MISSING_PARAMS", cmd->name); | |
1056 | return 0; | |
1057 | } | |
1058 | arg += diff; | |
1059 | ||
1060 | if (!(service = service_find(svcname))) { | |
1061 | reply("MCMSG_UNKNOWN_SERVICE", svcname); | |
1062 | return 0; | |
1063 | } | |
1064 | ||
1065 | if ((newcmd = dict_find(service->commands, newname, NULL))) { | |
1066 | reply("MCMSG_ALREADY_BOUND", service->bot->nick, newname); | |
1067 | return 0; | |
1068 | } | |
1069 | ||
1070 | if ((dot = strchr(cmdname, '.')) && (dot[1] == '*') && (dot[2] == 0)) { | |
1071 | unsigned int count; | |
1072 | struct module *module; | |
1073 | *dot = 0; | |
1074 | module = module_find((cmdname[0] == '*') ? cmdname+1 : cmdname); | |
1075 | if (!module) { | |
1076 | reply("MSG_MODULE_UNKNOWN", cmdname); | |
1077 | return 0; | |
1078 | } | |
1079 | count = service_bind_module(service, module); | |
1080 | reply("MCMSG_MODULE_BOUND", count, module->name, service->bot->nick); | |
1081 | return count != 0; | |
1082 | } | |
1083 | newcmd = calloc(1, sizeof(*newcmd)); | |
1084 | newcmd->name = strdup(newname); | |
1085 | newcmd->parent = service; | |
1086 | if (!(template = svccmd_resolve_name(newcmd, cmdname))) { | |
1087 | reply("MCMSG_UNKNOWN_COMMAND_2", cmdname, service->bot->nick); | |
1088 | free(newcmd->name); | |
1089 | free(newcmd); | |
1090 | return 0; | |
1091 | } | |
1092 | if (template->alias.used) { | |
1093 | reply("MCMSG_CANNOT_DOUBLE_ALIAS"); | |
1094 | free(newcmd->name); | |
1095 | free(newcmd); | |
1096 | return 0; | |
1097 | } | |
1098 | ||
1099 | if (argc > arg) { | |
1100 | /* a more complicated alias; fix it up */ | |
1101 | unsigned int nn; | |
1102 | ||
1103 | arg -= diff; | |
1104 | nn = check_alias_args(argv+arg, argc-arg); | |
1105 | if (nn+arg < argc) { | |
1106 | reply("MCMSG_BAD_ALIAS_ARGUMENT", argv[nn+arg]); | |
1107 | free(newcmd->name); | |
1108 | free(newcmd); | |
1109 | return 0; | |
1110 | } | |
1111 | newcmd->alias.used = newcmd->alias.size = argc-arg; | |
1112 | newcmd->alias.list = calloc(newcmd->alias.size, sizeof(newcmd->alias.list[0])); | |
1113 | for (nn=0; nn<newcmd->alias.used; ++nn) | |
1114 | newcmd->alias.list[nn] = strdup(argv[nn+arg]); | |
1115 | } | |
1116 | ||
1117 | svccmd_insert(service, newcmd->name, newcmd, template->command); | |
1118 | svccmd_copy_rules(newcmd, template); | |
1119 | reply("MCMSG_COMMAND_BOUND", newcmd->name, newcmd->parent->bot->nick); | |
1120 | return 1; | |
1121 | } | |
1122 | ||
1123 | static int | |
1124 | service_recheck_bindings(struct service *service, struct module *module) { | |
1125 | dict_iterator_t it; | |
1126 | struct svccmd *cmd; | |
1127 | ||
1128 | for (it = dict_first(service->commands); it; it = iter_next(it)) { | |
1129 | cmd = iter_data(it); | |
1130 | if (cmd->command->parent == module) return 0; | |
1131 | } | |
1132 | /* No more bindings, remove it from our list. */ | |
1133 | module_list_remove(&service->modules, module); | |
1134 | return 1; | |
1135 | } | |
1136 | ||
1137 | static svccmd_unbind_func_t *suf_list; | |
1138 | unsigned int suf_size, suf_used; | |
1139 | ||
1140 | void | |
1141 | reg_svccmd_unbind_func(svccmd_unbind_func_t handler) { | |
1142 | if (suf_used == suf_size) { | |
1143 | if (suf_size) { | |
1144 | suf_size <<= 1; | |
1145 | suf_list = realloc(suf_list, suf_size*sizeof(svccmd_unbind_func_t)); | |
1146 | } else { | |
1147 | suf_size = 8; | |
1148 | suf_list = malloc(suf_size*sizeof(svccmd_unbind_func_t)); | |
1149 | } | |
1150 | } | |
1151 | suf_list[suf_used++] = handler; | |
1152 | } | |
1153 | ||
1154 | static MODCMD_FUNC(cmd_unbind) { | |
1155 | struct service *service; | |
1156 | struct userNode *bot; | |
1157 | struct svccmd *bound; | |
1158 | struct module *module; | |
1159 | const char *svcname; | |
1160 | unsigned int arg, ii; | |
1161 | char cmdname[MAXLEN]; | |
1162 | ||
1163 | assert(argc > 2); | |
1164 | svcname = argv[1]; | |
1165 | arg = collapse_cmdname(argv+2, argc-2, cmdname) + 2; | |
1166 | if (!arg) { | |
1167 | reply("MSG_MISSING_PARAMS", cmd->name); | |
1168 | return 0; | |
1169 | } | |
1170 | if (!(service = service_find(svcname))) { | |
1171 | reply("MCMSG_UNKNOWN_SERVICE", svcname); | |
1172 | return 0; | |
1173 | } | |
1174 | if (!(bound = dict_find(service->commands, cmdname, NULL))) { | |
1175 | reply("MCMSG_NO_COMMAND_BOUND", service->bot->nick, cmdname); | |
1176 | return 0; | |
1177 | } | |
1178 | if ((bound->command->flags & MODCMD_KEEP_BOUND) && (bound->command->bind_count == 1)) { | |
1179 | reply("MCMSG_UNBIND_PROHIBITED", bound->command->name); | |
1180 | return 0; | |
1181 | } | |
1182 | ||
1183 | for (ii=0; ii<suf_used; ii++) | |
1184 | suf_list[ii](bound); | |
1185 | /* If this command binding is removing itself, we must take care | |
1186 | * not to dereference it after the dict_remove. | |
1187 | */ | |
1188 | bot = cmd->parent->bot; | |
1189 | module = cmd->command->parent; | |
1190 | dict_remove(service->commands, bound->name); | |
1191 | send_message(user, bot, "MCMSG_COMMAND_UNBOUND", cmdname, service->bot->nick); | |
1192 | if (service_recheck_bindings(service, module)) | |
1193 | send_message(user, bot, "MCMSG_HELPFILE_UNBOUND", module->name, module->name); | |
1194 | return 1; | |
1195 | } | |
1196 | ||
1197 | static MODCMD_FUNC(cmd_readhelp) { | |
1198 | const char *modname; | |
1199 | struct module *module; | |
1200 | struct helpfile *old_helpfile; | |
1201 | struct timeval start, stop; | |
1202 | ||
1203 | assert(argc > 1); | |
1204 | modname = argv[1]; | |
1205 | if (!(module = module_find(modname))) { | |
1206 | reply("MSG_MODULE_UNKNOWN", modname); | |
1207 | return 0; | |
1208 | } | |
1209 | if (!module->helpfile_name) { | |
1210 | reply("MCMSG_NO_HELPFILE", module->name); | |
1211 | return 0; | |
1212 | } | |
1213 | old_helpfile = module->helpfile; | |
1214 | gettimeofday(&start, NULL); | |
1215 | module->helpfile = open_helpfile(module->helpfile_name, module->expand_help); | |
1216 | if (!module->helpfile) { | |
1217 | module->helpfile = old_helpfile; | |
1218 | reply("MCMSG_HELPFILE_ERROR", module->helpfile_name); | |
1219 | return 0; | |
1220 | } | |
1221 | if (old_helpfile) close_helpfile(old_helpfile); | |
1222 | gettimeofday(&stop, NULL); | |
1223 | stop.tv_sec -= start.tv_sec; | |
1224 | stop.tv_usec -= start.tv_usec; | |
1225 | if (stop.tv_usec < 0) { | |
1226 | stop.tv_sec -= 1; | |
1227 | stop.tv_usec += 1000000; | |
1228 | } | |
1229 | reply("MCMSG_HELPFILE_READ", module->name, stop.tv_sec, stop.tv_usec/1000); | |
1230 | return 1; | |
1231 | } | |
1232 | ||
1233 | static MODCMD_FUNC(cmd_help) { | |
1234 | const char *topic; | |
1235 | ||
1236 | topic = (argc < 2) ? NULL : unsplit_string(argv+1, argc-1, NULL); | |
1237 | return svccmd_send_help_2(user, cmd->parent, topic); | |
1238 | } | |
1239 | ||
1240 | static MODCMD_FUNC(cmd_timecmd) { | |
1241 | struct timeval start, stop; | |
1242 | char cmd_text[MAXLEN]; | |
1243 | ||
1244 | unsplit_string(argv+1, argc-1, cmd_text); | |
1245 | gettimeofday(&start, NULL); | |
1246 | svccmd_invoke(user, cmd->parent, channel, cmd_text, 0); | |
1247 | gettimeofday(&stop, NULL); | |
1248 | stop.tv_sec -= start.tv_sec; | |
1249 | stop.tv_usec -= start.tv_usec; | |
1250 | if (stop.tv_usec < 0) { | |
1251 | stop.tv_sec -= 1; | |
1252 | stop.tv_usec += 1000000; | |
1253 | } | |
1254 | reply("MCMSG_COMMAND_TIME", cmd_text, stop.tv_sec, stop.tv_usec); | |
1255 | return 1; | |
1256 | } | |
1257 | ||
1258 | static MODCMD_FUNC(cmd_command) { | |
1259 | struct svccmd *svccmd; | |
1260 | const char *cmd_name, *fmt_str; | |
1261 | unsigned int flags, shown_flags, nn, pos; | |
1262 | char buf[MAXLEN]; | |
1263 | ||
1264 | assert(argc >= 2); | |
1265 | cmd_name = unsplit_string(argv+1, argc-1, NULL); | |
1266 | if (!(svccmd = svccmd_resolve_name(cmd, cmd_name))) { | |
1267 | reply("MCMSG_UNKNOWN_COMMAND_2", cmd_name, cmd->parent->bot->nick); | |
1268 | return 0; | |
1269 | } | |
1270 | pos = snprintf(buf, sizeof(buf), "%s.%s", svccmd->command->parent->name, svccmd->command->name); | |
1271 | if (svccmd->alias.used) { | |
1272 | buf[pos++] = ' '; | |
1273 | unsplit_string((char**)svccmd->alias.list+1, svccmd->alias.used-1, buf+pos); | |
1274 | reply("MCMSG_COMMAND_ALIASES", svccmd->name, buf); | |
1275 | } else { | |
1276 | reply("MCMSG_COMMAND_BINDING", svccmd->name, buf); | |
1277 | } | |
1278 | flags = svccmd->effective_flags; | |
1279 | if ((svccmd->parent && svccmd->parent->privileged && !IsOper(user)) | |
1280 | || ((flags & MODCMD_REQUIRE_STAFF) | |
1281 | && !IsOper(user) && !IsNetworkHelper(user) && !IsSupportHelper(user))) { | |
1282 | reply("MCMSG_INSPECTION_REFUSED", svccmd->name); | |
1283 | return 0; | |
1284 | } | |
1285 | if (flags & MODCMD_DISABLED) { | |
1286 | reply("MSG_COMMAND_DISABLED", svccmd->name); | |
1287 | return 1; | |
1288 | } | |
1289 | shown_flags = 0; | |
1290 | if (svccmd->min_opserv_level > 0) { | |
1291 | reply("MCMSG_NEED_OPSERV_LEVEL", svccmd->min_opserv_level); | |
1292 | shown_flags |= MODCMD_REQUIRE_OPER | MODCMD_REQUIRE_AUTHED; | |
1293 | } | |
1294 | if (svccmd->min_channel_access > 0) { | |
1295 | reply("MCMSG_NEED_CHANSERV_LEVEL", svccmd->min_channel_access); | |
1296 | shown_flags |= MODCMD_REQUIRE_CHANUSER | MODCMD_REQUIRE_REGCHAN | MODCMD_REQUIRE_CHANNEL | MODCMD_REQUIRE_AUTHED; | |
1297 | } | |
1298 | if (svccmd->req_account_flags) { | |
1299 | for (nn=pos=0; nn<32; nn++) { | |
1300 | if (!(svccmd->req_account_flags & (1 << nn))) continue; | |
1301 | buf[pos++] = HANDLE_FLAGS[nn]; | |
1302 | } | |
1303 | buf[pos] = 0; | |
1304 | reply("MCMSG_NEED_ACCOUNT_FLAGS", buf); | |
1305 | shown_flags |= MODCMD_REQUIRE_AUTHED; | |
1306 | } | |
1307 | if (!flags && !shown_flags) { | |
1308 | reply("MCMSG_NEED_NOTHING", svccmd->name); | |
1309 | return 1; | |
1310 | } | |
1311 | if (flags & ~shown_flags & MODCMD_REQUIRE_HELPING) { | |
1312 | reply("MCMSG_MUST_BE_HELPING"); | |
1313 | shown_flags |= MODCMD_REQUIRE_AUTHED | MODCMD_REQUIRE_STAFF; | |
1314 | } | |
1315 | if (flags & ~shown_flags & MODCMD_REQUIRE_STAFF) { | |
1316 | switch (flags & MODCMD_REQUIRE_STAFF) { | |
1317 | default: case MODCMD_REQUIRE_STAFF: | |
1318 | fmt_str = "MCMSG_NEED_STAFF_ACCESS"; | |
1319 | break; | |
1320 | case MODCMD_REQUIRE_OPER: | |
1321 | fmt_str = "MCMSG_NEED_STAFF_OPER"; | |
1322 | break; | |
1323 | case MODCMD_REQUIRE_NETWORK_HELPER: | |
1324 | fmt_str = "MCMSG_NEED_STAFF_NETHELPER"; | |
1325 | break; | |
1326 | case MODCMD_REQUIRE_OPER|MODCMD_REQUIRE_NETWORK_HELPER: | |
1327 | fmt_str = "MCMSG_NEED_STAFF_NETHELPER_OR_OPER"; | |
1328 | break; | |
1329 | case MODCMD_REQUIRE_SUPPORT_HELPER: | |
1330 | fmt_str = "MCMSG_NEED_STAFF_SHELPER"; | |
1331 | break; | |
1332 | case MODCMD_REQUIRE_OPER|MODCMD_REQUIRE_SUPPORT_HELPER: | |
1333 | fmt_str = "MCMSG_NEED_STAFF_SHELPER_OR_OPER"; | |
1334 | break; | |
1335 | case MODCMD_REQUIRE_SUPPORT_HELPER|MODCMD_REQUIRE_NETWORK_HELPER: | |
1336 | fmt_str = "MCMSG_NEED_STAFF_HELPER"; | |
1337 | break; | |
1338 | } | |
1339 | reply(fmt_str); | |
1340 | shown_flags |= MODCMD_REQUIRE_AUTHED | MODCMD_REQUIRE_STAFF; | |
1341 | } | |
1342 | if (flags & ~shown_flags & MODCMD_REQUIRE_JOINABLE) { | |
1343 | reply("MCMSG_NEED_JOINABLE"); | |
1344 | shown_flags |= MODCMD_REQUIRE_CHANUSER; | |
1345 | } | |
1346 | if (flags & ~shown_flags & MODCMD_REQUIRE_CHANUSER) { | |
1347 | if (flags & ~shown_flags & MODCMD_IGNORE_CSUSPEND) | |
1348 | reply("MCMSG_NEED_CHANUSER_CSUSPENDABLE"); | |
1349 | else | |
1350 | reply("MCMSG_NEED_CHANUSER"); | |
1351 | shown_flags |= MODCMD_IGNORE_CSUSPEND | MODCMD_REQUIRE_REGCHAN | MODCMD_REQUIRE_CHANNEL | MODCMD_REQUIRE_AUTHED; | |
1352 | } | |
1353 | if (flags & ~shown_flags & MODCMD_REQUIRE_REGCHAN) { | |
1354 | reply("MCMSG_NEED_REGCHAN"); | |
1355 | shown_flags |= MODCMD_REQUIRE_CHANNEL; | |
1356 | } | |
1357 | if (flags & ~shown_flags & MODCMD_REQUIRE_CHANNEL) | |
1358 | reply("MCMSG_NEED_CHANNEL"); | |
1359 | if (flags & ~shown_flags & MODCMD_REQUIRE_AUTHED) | |
1360 | reply("MCMSG_NEED_AUTHED"); | |
1361 | if (flags & ~shown_flags & MODCMD_TOY) | |
1362 | reply("MCMSG_IS_TOY", svccmd->name); | |
1363 | if (flags & ~shown_flags & MODCMD_REQUIRE_QUALIFIED) { | |
1364 | const char *botnick = svccmd->parent ? svccmd->parent->bot->nick : "SomeBot"; | |
1365 | reply("MCMSG_MUST_QUALIFY", botnick, svccmd->name, botnick); | |
1366 | } | |
1367 | reply("MCMSG_END_REQUIREMENTS", svccmd->name); | |
1368 | return 1; | |
1369 | } | |
1370 | ||
1371 | static void | |
1372 | modcmd_describe_command(struct userNode *user, struct svccmd *cmd, struct svccmd *target) { | |
1373 | char buf1[MAXLEN], buf2[MAXLEN]; | |
1374 | unsigned int ii, len, buf1_used, buf2_used; | |
1375 | ||
1376 | if (target->alias.used) { | |
1377 | unsplit_string((char**)target->alias.list, target->alias.used, buf1); | |
1378 | reply("MCMSG_COMMAND_ALIASES", target->name, buf1); | |
1379 | } else { | |
1380 | snprintf(buf1, sizeof(buf1), "%s.%s", target->command->parent->name, target->command->name); | |
1381 | reply("MCMSG_COMMAND_BINDING", target->name, buf1); | |
1382 | } | |
1383 | for (ii = buf1_used = buf2_used = 0; flags[ii].name; ++ii) { | |
1384 | if (target->flags & flags[ii].flag) { | |
1385 | if (buf1_used) | |
1386 | buf1[buf1_used++] = ','; | |
1387 | len = strlen(flags[ii].name); | |
1388 | memcpy(buf1 + buf1_used, flags[ii].name, len); | |
1389 | buf1_used += len; | |
1390 | } else if (target->effective_flags & flags[ii].flag) { | |
1391 | if (buf2_used) | |
1392 | buf2[buf2_used++] = ','; | |
1393 | len = strlen(flags[ii].name); | |
1394 | memcpy(buf2 + buf2_used, flags[ii].name, len); | |
1395 | buf2_used += len; | |
1396 | } | |
1397 | } | |
1398 | if (buf1_used) | |
1399 | buf1[buf1_used] = '\0'; | |
1400 | else | |
1401 | strcpy(buf1, user_find_message(user, "MSG_NONE")); | |
1402 | if (buf2_used) | |
1403 | buf2[buf2_used] = '\0'; | |
1404 | else | |
1405 | strcpy(buf2, user_find_message(user, "MSG_NONE")); | |
1406 | reply("MCMSG_COMMAND_FLAGS", buf1, buf2); | |
1407 | for (ii = buf1_used = buf2_used = 0; handle_flags[ii]; ++ii) { | |
1408 | if (target->req_account_flags & (1 << ii)) | |
1409 | buf1[buf1_used++] = handle_flags[ii]; | |
1410 | else if (target->deny_account_flags & (1 << ii)) | |
1411 | buf2[buf2_used++] = handle_flags[ii]; | |
1412 | } | |
1413 | buf1[buf1_used] = buf2[buf2_used] = '\0'; | |
1414 | reply("MCMSG_COMMAND_ACCOUNT_FLAGS", buf1, buf2); | |
1415 | reply("MCMSG_COMMAND_ACCESS_LEVEL", target->min_channel_access, target->min_opserv_level); | |
1416 | reply("MCMSG_COMMAND_USES", target->name, target->uses); | |
1417 | } | |
1418 | ||
1419 | static MODCMD_FUNC(cmd_modcmd) { | |
1420 | struct svccmd *svccmd; | |
1421 | unsigned int arg, changed; | |
1422 | char cmdname[MAXLEN]; | |
1423 | ||
1424 | assert(argc >= 2); | |
1425 | arg = collapse_cmdname(argv+1, argc-1, cmdname) + 1; | |
1426 | if (!arg) { | |
1427 | reply("MSG_MISSING_PARAMS", cmd->name); | |
1428 | return 0; | |
1429 | } | |
1430 | if (!(svccmd = svccmd_resolve_name(cmd, cmdname))) { | |
1431 | reply("MCMSG_UNKNOWN_COMMAND_2", cmdname, cmd->parent->bot->nick); | |
1432 | return 0; | |
1433 | } | |
1434 | for (changed = 0; arg+1 < argc; arg += 2) { | |
1435 | if (svccmd_configure(svccmd, user, cmd->parent->bot, argv[arg], argv[arg+1])) { | |
1436 | reply("MCMSG_COMMAND_MODIFIED", argv[arg], svccmd->name); | |
1437 | changed = 1; | |
1438 | } | |
1439 | } | |
1440 | if (changed) | |
1441 | modcmd_set_effective_flags(svccmd); | |
1442 | modcmd_describe_command(user, cmd, svccmd); | |
1443 | return changed; | |
1444 | } | |
1445 | ||
1446 | static MODCMD_FUNC(cmd_god) { | |
1447 | int helping; | |
1448 | ||
1449 | if (argc > 1) { | |
1450 | if (enabled_string(argv[1])) { | |
1451 | if (HANDLE_FLAGGED(user->handle_info, HELPING)) { | |
1452 | reply("MCMSG_ALREADY_HELPING"); | |
1453 | return 0; | |
1454 | } | |
1455 | helping = 1; | |
1456 | } else if (disabled_string(argv[1])) { | |
1457 | if (!HANDLE_FLAGGED(user->handle_info, HELPING)) { | |
1458 | reply("MCMSG_ALREADY_NOT_HELPING"); | |
1459 | return 0; | |
1460 | } | |
1461 | helping = 0; | |
1462 | } else { | |
1463 | reply("MSG_INVALID_BINARY", argv[1]); | |
1464 | return 0; | |
1465 | } | |
1466 | } else { | |
1467 | helping = !IsHelping(user); | |
1468 | } | |
1469 | ||
1470 | if (helping) { | |
1471 | HANDLE_SET_FLAG(user->handle_info, HELPING); | |
1472 | reply("MCMSG_NOW_HELPING"); | |
1473 | } else { | |
1474 | HANDLE_CLEAR_FLAG(user->handle_info, HELPING); | |
1475 | reply("MCMSG_NOW_NOT_HELPING"); | |
1476 | } | |
1477 | ||
1478 | return 1; | |
1479 | } | |
1480 | ||
1481 | static MODCMD_FUNC(cmd_joiner) { | |
1482 | char cmdname[80]; | |
1483 | ||
1484 | if (argc < 2) { | |
1485 | int len = sprintf(cmdname, "%s ", cmd->name); | |
1486 | dict_iterator_t it; | |
1487 | struct string_buffer sbuf; | |
1488 | ||
1489 | string_buffer_init(&sbuf); | |
1490 | for (it = dict_first(cmd->parent->commands); it; it = iter_next(it)) { | |
1491 | if (!ircncasecmp(iter_key(it), cmdname, len)) { | |
1492 | if (sbuf.used) string_buffer_append_string(&sbuf, ", "); | |
1493 | string_buffer_append_string(&sbuf, iter_key(it)); | |
1494 | } | |
1495 | } | |
1496 | if (!sbuf.used) string_buffer_append(&sbuf, 0); | |
1497 | reply("MCMSG_JOINER_CHOICES", cmd->name, sbuf.list); | |
1498 | string_buffer_clean(&sbuf); | |
1499 | return 1; | |
1500 | } | |
1501 | sprintf(cmdname, "%s %s", cmd->name, argv[1]); | |
1502 | argv[1] = cmdname; | |
1503 | svccmd_invoke_argv(user, cmd->parent, channel, argc-1, argv+1, 0); | |
1504 | return 0; /* never try to log this; the recursive one logs it */ | |
1505 | } | |
1506 | ||
1507 | static MODCMD_FUNC(cmd_stats_modules) { | |
1508 | struct helpfile_table tbl; | |
1509 | dict_iterator_t it; | |
1510 | unsigned int ii; | |
1511 | struct module *mod; | |
1512 | struct modcmd *modcmd; | |
1513 | ||
1514 | if (argc < 2) { | |
1515 | tbl.length = dict_size(modules) + 1; | |
1516 | tbl.width = 3; | |
1517 | tbl.flags = TABLE_PAD_LEFT; | |
1518 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1519 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1520 | tbl.contents[0][0] = "Module"; | |
1521 | tbl.contents[0][1] = "Commands"; | |
1522 | tbl.contents[0][2] = "Helpfile"; | |
1523 | for (ii=1, it=dict_first(modules); it; it=iter_next(it), ii++) { | |
1524 | mod = iter_data(it); | |
1525 | tbl.contents[ii] = calloc(tbl.width, sizeof(tbl.contents[ii][0])); | |
1526 | tbl.contents[ii][0] = mod->name; | |
1527 | tbl.contents[ii][1] = strtab(dict_size(mod->commands)); | |
1528 | tbl.contents[ii][2] = mod->helpfile_name ? mod->helpfile_name : "(none)"; | |
1529 | } | |
1530 | } else if (!(mod = dict_find(modules, argv[1], NULL))) { | |
1531 | reply("MCMSG_UNKNOWN_MODULE", argv[1]); | |
1532 | return 0; | |
1533 | } else { | |
1534 | reply("MCMSG_MODULE_INFO", mod->name); | |
1535 | tbl.length = dict_size(mod->commands) + 1; | |
1536 | tbl.width = 3; | |
1537 | tbl.flags = TABLE_PAD_LEFT; | |
1538 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1539 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1540 | tbl.contents[0][0] = "Command"; | |
1541 | tbl.contents[0][1] = "Min. Args"; | |
1542 | tbl.contents[0][2] = "Bind Count"; | |
1543 | for (ii=1, it=dict_first(mod->commands); it; it=iter_next(it), ii++) { | |
1544 | modcmd = iter_data(it); | |
1545 | tbl.contents[ii] = calloc(tbl.width, sizeof(tbl.contents[ii][0])); | |
1546 | tbl.contents[ii][0] = modcmd->name; | |
1547 | tbl.contents[ii][1] = strtab(modcmd->min_argc); | |
1548 | tbl.contents[ii][2] = strtab(modcmd->bind_count); | |
1549 | } | |
1550 | } | |
1551 | table_send(cmd->parent->bot, user->nick, 0, 0, tbl); | |
1552 | return 0; | |
1553 | } | |
1554 | ||
1555 | static MODCMD_FUNC(cmd_stats_services) { | |
1556 | struct helpfile_table tbl; | |
1557 | dict_iterator_t it; | |
1558 | unsigned int ii; | |
1559 | struct service *service; | |
1560 | struct svccmd *svccmd; | |
1561 | char *extra; | |
1562 | ||
1563 | if (argc < 2) { | |
1564 | tbl.length = dict_size(services) + 1; | |
1565 | tbl.width = 4; | |
1566 | tbl.flags = TABLE_PAD_LEFT; | |
1567 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1568 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1569 | tbl.contents[0][0] = "Service"; | |
1570 | tbl.contents[0][1] = "Commands"; | |
1571 | tbl.contents[0][2] = "Priv'd?"; | |
1572 | tbl.contents[0][3] = "Trigger"; | |
1573 | extra = calloc(2, tbl.length); | |
1574 | for (ii=1, it=dict_first(services); it; it=iter_next(it), ii++) { | |
1575 | service = iter_data(it); | |
1576 | tbl.contents[ii] = calloc(tbl.width, sizeof(tbl.contents[ii][0])); | |
1577 | tbl.contents[ii][0] = service->bot->nick; | |
1578 | tbl.contents[ii][1] = strtab(dict_size(service->commands)); | |
1579 | tbl.contents[ii][2] = service->privileged ? "yes" : "no"; | |
1580 | extra[ii*2] = service->trigger; | |
1581 | tbl.contents[ii][3] = extra+ii*2; | |
1582 | } | |
1583 | table_send(cmd->parent->bot, user->nick, 0, 0, tbl); | |
1584 | free(extra); | |
1585 | return 0; | |
1586 | } else if (!(service = dict_find(services, argv[1], NULL))) { | |
1587 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1588 | return 0; | |
1589 | } else { | |
1590 | tbl.length = dict_size(service->commands) + 1; | |
1591 | tbl.width = 5; | |
1592 | tbl.flags = TABLE_PAD_LEFT | TABLE_NO_FREE; | |
1593 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1594 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1595 | tbl.contents[0][0] = "Command"; | |
1596 | tbl.contents[0][1] = "Module"; | |
1597 | tbl.contents[0][2] = "ModCmd"; | |
1598 | tbl.contents[0][3] = "Alias?"; | |
1599 | tbl.contents[0][4] = strdup("Uses"); | |
1600 | for (ii=1, it=dict_first(service->commands); it; it=iter_next(it), ii++) { | |
1601 | svccmd = iter_data(it); | |
1602 | tbl.contents[ii] = calloc(tbl.width, sizeof(tbl.contents[ii][0])); | |
1603 | tbl.contents[ii][0] = svccmd->name; | |
1604 | tbl.contents[ii][1] = svccmd->command->parent->name; | |
1605 | tbl.contents[ii][2] = svccmd->command->name; | |
1606 | tbl.contents[ii][3] = svccmd->alias.used ? "yes" : "no"; | |
1607 | tbl.contents[ii][4] = extra = malloc(12); | |
1608 | sprintf(extra, "%u", svccmd->uses); | |
1609 | } | |
1610 | reply("MCMSG_SERVICE_INFO", service->bot->nick); | |
1611 | table_send(cmd->parent->bot, user->nick, 0, 0, tbl); | |
1612 | for (ii=0; ii<tbl.length; ii++) { | |
1613 | free((char*)tbl.contents[ii][4]); | |
1614 | free(tbl.contents[ii]); | |
1615 | } | |
1616 | free(tbl.contents); | |
1617 | return 0; | |
1618 | } | |
1619 | } | |
1620 | ||
1621 | static MODCMD_FUNC(cmd_showcommands) { | |
1622 | struct svccmd_list commands; | |
1623 | struct helpfile_table tbl; | |
1624 | struct svccmd *svccmd; | |
1625 | dict_iterator_t it; | |
1626 | unsigned int ii, ignore_flags = 0; | |
1627 | unsigned int max_opserv_level = 1000; | |
1628 | unsigned short max_chanserv_level = 500; | |
1629 | char show_opserv_level = 0, show_channel_access = 0; | |
1630 | ||
1631 | /* Check to see what the max access they want to see is. */ | |
1632 | for (ii=1; ii<argc; ++ii) { | |
1633 | if (isdigit(argv[ii][0])) | |
1634 | max_opserv_level = atoi(argv[ii]); | |
1635 | else | |
1636 | max_chanserv_level = user_level_from_name(argv[ii], UL_OWNER); | |
1637 | } | |
1638 | ||
1639 | /* Find the matching commands. */ | |
1640 | svccmd_list_init(&commands); | |
1641 | if (cmd->parent->privileged) | |
1642 | ignore_flags = MODCMD_REQUIRE_OPER; | |
1643 | for (it = dict_first(cmd->parent->commands); it; it = iter_next(it)) { | |
1644 | svccmd = iter_data(it); | |
1645 | if (strchr(svccmd->name, ' ')) | |
1646 | continue; | |
1647 | if (!svccmd_can_invoke(user, svccmd->parent->bot, svccmd, channel, SVCCMD_QUALIFIED)) | |
1648 | continue; | |
1649 | if (svccmd->min_opserv_level > max_opserv_level) | |
1650 | continue; | |
1651 | if (svccmd->min_channel_access > max_chanserv_level) | |
1652 | continue; | |
1653 | if (svccmd->min_opserv_level > 0) | |
1654 | show_opserv_level = 1; | |
1655 | if (svccmd->min_channel_access > 0) | |
1656 | show_channel_access = 1; | |
1657 | if (svccmd->effective_flags | |
1658 | & (MODCMD_REQUIRE_STAFF|MODCMD_REQUIRE_HELPING) | |
1659 | & ~ignore_flags) { | |
1660 | show_channel_access = 1; | |
1661 | } | |
1662 | svccmd_list_append(&commands, svccmd); | |
1663 | } | |
1664 | ||
1665 | /* Build the table. */ | |
1666 | tbl.length = commands.used + 1; | |
1667 | tbl.width = 1 + show_opserv_level + show_channel_access; | |
1668 | tbl.flags = TABLE_REPEAT_ROWS; | |
1669 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1670 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1671 | tbl.contents[0][ii = 0] = "Command"; | |
1672 | if (show_opserv_level) | |
1673 | tbl.contents[0][++ii] = "OpServ Level"; | |
1674 | if (show_channel_access) | |
1675 | tbl.contents[0][++ii] = "ChanServ Access"; | |
1676 | for (ii=0; ii<commands.used; ++ii) { | |
1677 | svccmd = commands.list[ii]; | |
1678 | tbl.contents[ii+1] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1679 | tbl.contents[ii+1][0] = svccmd->name; | |
1680 | if (show_opserv_level) | |
1681 | tbl.contents[ii+1][1] = strtab(svccmd->min_opserv_level); | |
1682 | if (show_channel_access) { | |
1683 | const char *access; | |
1684 | int flags = svccmd->effective_flags; | |
1685 | if (flags & MODCMD_REQUIRE_HELPING) | |
1686 | access = "helping"; | |
1687 | else if (flags & MODCMD_REQUIRE_STAFF) { | |
1688 | switch (flags & MODCMD_REQUIRE_STAFF) { | |
1689 | case MODCMD_REQUIRE_OPER: access = "oper"; break; | |
1690 | case MODCMD_REQUIRE_OPER | MODCMD_REQUIRE_NETWORK_HELPER: | |
1691 | case MODCMD_REQUIRE_NETWORK_HELPER: access = "net.helper"; break; | |
1692 | default: access = "staff"; break; | |
1693 | } | |
1694 | } else | |
1695 | access = strtab(svccmd->min_channel_access); | |
1696 | tbl.contents[ii+1][1+show_opserv_level] = access; | |
1697 | } | |
1698 | } | |
1699 | svccmd_list_clean(&commands); | |
1700 | table_send(cmd->parent->bot, user->nick, 0, 0, tbl); | |
1701 | return 0; | |
1702 | } | |
1703 | ||
1704 | static MODCMD_FUNC(cmd_helpfiles) { | |
1705 | struct service *service; | |
1706 | unsigned int ii; | |
1707 | ||
1708 | if (!(service = dict_find(services, argv[1], NULL))) { | |
1709 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1710 | return 0; | |
1711 | } | |
1712 | ||
1713 | if (argc < 3) { | |
1714 | for (ii=0; ii<service->modules.used; ++ii) | |
1715 | reply("MCMSG_HELPFILE_SEQUENCE", ii+1, service->modules.list[ii]->name); | |
1716 | return 0; | |
1717 | } | |
1718 | ||
1719 | service->modules.used = 0; | |
1720 | for (ii=0; ii<argc-2; ii++) { | |
1721 | struct module *module = dict_find(modules, argv[ii+2], NULL); | |
1722 | if (!module) { | |
1723 | reply("MCMSG_UNKNOWN_MODULE", argv[ii+2]); | |
1724 | continue; | |
1725 | } | |
1726 | module_list_append(&service->modules, module); | |
1727 | } | |
1728 | reply("MCMSG_HELPFILE_SEQUENCE_SET", service->bot->nick); | |
1729 | return 1; | |
1730 | } | |
1731 | ||
1732 | static MODCMD_FUNC(cmd_service_add) { | |
1733 | const char *nick, *hostname, *desc; | |
1734 | struct userNode *bot; | |
1735 | ||
1736 | nick = argv[1]; | |
1737 | if (!is_valid_nick(nick)) { | |
1738 | reply("MCMSG_BAD_SERVICE_NICK", nick); | |
1739 | return 0; | |
1740 | } | |
1741 | hostname = argv[2]; | |
1742 | desc = unsplit_string(argv+3, argc-3, NULL); | |
1743 | bot = GetUserH(nick); | |
1744 | if (bot && IsService(bot)) { | |
1745 | reply("MCMSG_ALREADY_SERVICE", bot->nick); | |
1746 | return 0; | |
1747 | } | |
1748 | bot = AddService(nick, desc, hostname); | |
1749 | service_register(bot); | |
1750 | reply("MCMSG_NEW_SERVICE", bot->nick); | |
1751 | return 1; | |
1752 | } | |
1753 | ||
1754 | static MODCMD_FUNC(cmd_service_rename) { | |
1755 | struct service *service; | |
1756 | ||
1757 | if (!(service = service_find(argv[1]))) { | |
1758 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1759 | return 0; | |
1760 | } | |
1761 | NickChange(service->bot, argv[2], 0); | |
1762 | reply("MCMSG_SERVICE_RENAMED", service->bot->nick); | |
1763 | return 1; | |
1764 | } | |
1765 | ||
1766 | static MODCMD_FUNC(cmd_service_trigger) { | |
1767 | struct userNode *bogon; | |
1768 | struct service *service; | |
1769 | ||
1770 | if (!(service = service_find(argv[1]))) { | |
1771 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1772 | return 0; | |
1773 | } | |
1774 | if (argc < 3) { | |
1775 | if (service->trigger) | |
1776 | reply("MCMSG_CURRENT_TRIGGER", service->bot->nick, service->trigger); | |
1777 | else | |
1778 | reply("MCMSG_NO_TRIGGER", service->bot->nick); | |
1779 | return 1; | |
1780 | } | |
1781 | if (service->trigger) | |
1782 | reg_chanmsg_func(service->trigger, NULL, NULL); | |
1783 | if (!irccasecmp(argv[2], "none") || !irccasecmp(argv[2], "remove")) { | |
1784 | service->trigger = 0; | |
1785 | reply("MCMSG_REMOVED_TRIGGER", service->bot->nick); | |
1786 | } else if ((bogon = get_chanmsg_bot(argv[2][0]))) { | |
1787 | reply("MCMSG_DUPLICATE_TRIGGER", bogon->nick, argv[2][0]); | |
1788 | return 1; | |
1789 | } else { | |
1790 | service->trigger = argv[2][0]; | |
1791 | reg_chanmsg_func(service->trigger, service->bot, modcmd_chanmsg); | |
1792 | reply("MCMSG_NEW_TRIGGER", service->bot->nick, service->trigger); | |
1793 | } | |
1794 | return 1; | |
1795 | } | |
1796 | ||
1797 | static MODCMD_FUNC(cmd_service_privileged) { | |
1798 | struct service *service; | |
1799 | const char *newval; | |
1800 | ||
1801 | if (!(service = service_find(argv[1]))) { | |
1802 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1803 | return 0; | |
1804 | } | |
1805 | if (argc >= 3) | |
1806 | service->privileged = true_string(argv[2]) || enabled_string(argv[2]); | |
1807 | newval = user_find_message(user, service->privileged ? "MSG_ON" : "MSG_OFF"); | |
1808 | reply("MCMSG_SERVICE_PRIVILEGED", service->bot->nick, newval); | |
1809 | return 1; | |
1810 | } | |
1811 | ||
1812 | static MODCMD_FUNC(cmd_service_remove) { | |
1813 | char *name, *reason; | |
1814 | struct service *service; | |
1815 | ||
1816 | name = argv[1]; | |
1817 | if (argc > 2) | |
1818 | reason = unsplit_string(argv+2, argc-2, NULL); | |
1819 | else | |
1820 | reason = "Removing bot"; | |
1821 | if (!(service = service_find(name))) { | |
1822 | reply("MCMSG_UNKNOWN_SERVICE", name); | |
1823 | return 0; | |
1824 | } | |
1825 | DelUser(service->bot, NULL, 1, reason); | |
1826 | reply("MCMSG_SERVICE_REMOVED", name); | |
1827 | dict_remove(services, name); | |
1828 | return 1; | |
1829 | } | |
1830 | ||
1831 | static MODCMD_FUNC(cmd_dump_messages) { | |
1832 | const char *fname = "strings.db"; | |
1833 | struct saxdb_context *ctx; | |
1834 | dict_iterator_t it; | |
1835 | FILE *pf; | |
1836 | int res; | |
1837 | ||
1838 | if (!(pf = fopen(fname, "w"))) { | |
1839 | reply("MCMSG_FILE_NOT_OPENED", fname); | |
1840 | return 0; | |
1841 | } | |
1842 | if (!(ctx = saxdb_open_context(pf))) { | |
1843 | reply("MSG_INTERNAL_FAILURE"); | |
1844 | return 0; | |
1845 | } | |
1846 | if ((res = setjmp(ctx->jbuf)) != 0) { | |
1847 | ctx->complex.used = 0; /* to avoid false assert()s in close */ | |
1848 | saxdb_close_context(ctx); | |
1849 | fclose(pf); | |
1850 | reply("MCMSG_MESSAGE_DUMP_FAILED", strerror(res)); | |
1851 | return 0; | |
1852 | } else { | |
1853 | for (it = dict_first(lang_C->messages); it; it = iter_next(it)) | |
1854 | saxdb_write_string(ctx, iter_key(it), iter_data(it)); | |
1855 | saxdb_close_context(ctx); | |
1856 | fclose(pf); | |
1857 | reply("MCMSG_MESSAGES_DUMPED", fname); | |
1858 | return 1; | |
1859 | } | |
1860 | } | |
1861 | ||
1862 | static MODCMD_FUNC(cmd_version) { | |
1863 | /* This function provides copyright management information to end | |
1864 | * users of srvx. You should not alter, disable or remove this | |
1865 | * command or its accessibility to normal IRC users, except to add | |
1866 | * copyright information pertaining to changes you make to srvx. | |
1867 | */ | |
1868 | send_message_type(4, user, cmd->parent->bot, "$b"PACKAGE_STRING"$b ("CODENAME"), Built: "__DATE__", "__TIME__".\nCopyright 2000-2004 srvx Development Team.\nThe srvx Development Team includes Paul Chang, Adrian Dewhurst, Miles Peterson, Michael Poole and others.\nThe srvx Development Team can be reached at http://sf.net/projects/srvx/ or in #srvx on irc.gamesurge.net."); | |
1869 | if ((argc > 1) && !irccasecmp(argv[1], "arch")) | |
1870 | send_message_type(4, user, cmd->parent->bot, "%s", ""); | |
1871 | return 1; | |
1872 | } | |
1873 | ||
1874 | ||
1875 | void | |
1876 | modcmd_nick_change(struct userNode *user, const char *old_nick) { | |
1877 | struct service *svc; | |
1878 | if (!(svc = dict_find(services, old_nick, NULL))) | |
1879 | return; | |
1880 | dict_remove2(services, old_nick, 1); | |
1881 | dict_insert(services, user->nick, svc); | |
1882 | } | |
1883 | ||
1884 | void | |
1885 | modcmd_cleanup(void) { | |
1886 | dict_delete(services); | |
1887 | dict_delete(modules); | |
1888 | if (suf_list) | |
1889 | free(suf_list); | |
1890 | } | |
1891 | ||
1892 | static void | |
1893 | modcmd_saxdb_write_command(struct saxdb_context *ctx, struct svccmd *cmd) { | |
1894 | char buf[MAXLEN]; | |
1895 | unsigned int nn, len, pos; | |
1896 | struct svccmd *template = cmd->command->defaults; | |
1897 | ||
1898 | saxdb_start_record(ctx, cmd->name, 0); | |
1899 | sprintf(buf, "%s.%s", cmd->command->parent->name, cmd->command->name); | |
1900 | saxdb_write_string(ctx, "command", buf); | |
1901 | if (cmd->alias.used) | |
1902 | saxdb_write_string_list(ctx, "aliased", &cmd->alias); | |
1903 | if (cmd->min_opserv_level != template->min_opserv_level) | |
1904 | saxdb_write_int(ctx, "oper_access", cmd->min_opserv_level); | |
1905 | if (cmd->min_channel_access != template->min_channel_access) | |
1906 | saxdb_write_int(ctx, "channel_access", cmd->min_channel_access); | |
1907 | if (cmd->flags != template->flags) { | |
1908 | if (cmd->flags) { | |
1909 | for (nn=pos=0; flags[nn].name; ++nn) { | |
1910 | if (cmd->flags & flags[nn].flag) { | |
1911 | buf[pos++] = '+'; | |
1912 | len = strlen(flags[nn].name); | |
1913 | memcpy(buf+pos, flags[nn].name, len); | |
1914 | pos += len; | |
1915 | buf[pos++] = ','; | |
1916 | } | |
1917 | } | |
1918 | } else { | |
1919 | pos = 1; | |
1920 | } | |
1921 | buf[--pos] = 0; | |
1922 | saxdb_write_string(ctx, "flags", buf); | |
1923 | } | |
1924 | if ((cmd->req_account_flags != template->req_account_flags) | |
1925 | || (cmd->deny_account_flags != template->req_account_flags)) { | |
1926 | pos = 0; | |
1927 | if (cmd->req_account_flags) { | |
1928 | buf[pos++] = '+'; | |
1929 | for (nn=0; nn<32; nn++) | |
1930 | if (cmd->req_account_flags & (1 << nn)) | |
1931 | buf[pos++] = handle_flags[nn]; | |
1932 | } | |
1933 | if (cmd->deny_account_flags) { | |
1934 | buf[pos++] = '-'; | |
1935 | for (nn=0; nn<32; nn++) | |
1936 | if (cmd->deny_account_flags & (1 << nn)) | |
1937 | buf[pos++] = handle_flags[nn]; | |
1938 | } | |
1939 | buf[pos] = 0; | |
1940 | saxdb_write_string(ctx, "account_flags", buf); | |
1941 | } | |
1942 | saxdb_end_record(ctx); | |
1943 | } | |
1944 | ||
1945 | static int | |
1946 | modcmd_saxdb_write(struct saxdb_context *ctx) { | |
1947 | struct string_list slist; | |
1948 | dict_iterator_t it, it2; | |
1949 | struct service *service; | |
1950 | unsigned int ii; | |
1951 | ||
1952 | saxdb_start_record(ctx, "bots", 1); | |
1953 | for (it = dict_first(services); it; it = iter_next(it)) { | |
1954 | char buff[16]; | |
1955 | service = iter_data(it); | |
1956 | saxdb_start_record(ctx, service->bot->nick, 1); | |
1957 | if (service->trigger) { | |
1958 | buff[0] = service->trigger; | |
1959 | buff[1] = '\0'; | |
1960 | saxdb_write_string(ctx, "trigger", buff); | |
1961 | } | |
1962 | saxdb_write_string(ctx, "description", service->bot->info); | |
1963 | saxdb_write_string(ctx, "hostname", service->bot->hostname); | |
1964 | if (service->privileged) | |
1965 | saxdb_write_string(ctx, "privileged", "1"); | |
1966 | saxdb_end_record(ctx); | |
1967 | } | |
1968 | saxdb_end_record(ctx); | |
1969 | ||
1970 | saxdb_start_record(ctx, "services", 1); | |
1971 | for (it = dict_first(services); it; it = iter_next(it)) { | |
1972 | service = iter_data(it); | |
1973 | saxdb_start_record(ctx, service->bot->nick, 1); | |
1974 | for (it2 = dict_first(service->commands); it2; it2 = iter_next(it2)) | |
1975 | modcmd_saxdb_write_command(ctx, iter_data(it2)); | |
1976 | saxdb_end_record(ctx); | |
1977 | } | |
1978 | saxdb_end_record(ctx); | |
1979 | ||
1980 | saxdb_start_record(ctx, "helpfiles", 1); | |
1981 | slist.size = 0; | |
1982 | for (it = dict_first(services); it; it = iter_next(it)) { | |
1983 | service = iter_data(it); | |
1984 | slist.used = 0; | |
1985 | for (ii = 0; ii < service->modules.used; ++ii) | |
1986 | string_list_append(&slist, service->modules.list[ii]->name); | |
1987 | saxdb_write_string_list(ctx, iter_key(it), &slist); | |
1988 | } | |
1989 | if (slist.list) | |
1990 | free(slist.list); | |
1991 | saxdb_end_record(ctx); | |
1992 | ||
1993 | return 0; | |
1994 | } | |
1995 | ||
1996 | static int | |
1997 | append_entry(const char *key, UNUSED_ARG(void *data), void *extra) { | |
1998 | struct helpfile_expansion *exp = extra; | |
1999 | int row = exp->value.table.length++; | |
2000 | exp->value.table.contents[row] = calloc(1, sizeof(char*)); | |
2001 | exp->value.table.contents[row][0] = key; | |
2002 | return 0; | |
2003 | } | |
2004 | ||
2005 | static struct helpfile_expansion | |
2006 | modcmd_expand(const char *variable) { | |
2007 | struct helpfile_expansion exp; | |
2008 | extern struct userNode *message_source; | |
2009 | struct service *service; | |
2010 | ||
2011 | service = dict_find(services, message_source->nick, NULL); | |
2012 | if (!irccasecmp(variable, "index")) { | |
2013 | exp.type = HF_TABLE; | |
2014 | exp.value.table.length = 1; | |
2015 | exp.value.table.width = 1; | |
2016 | exp.value.table.flags = TABLE_REPEAT_ROWS; | |
2017 | exp.value.table.contents = calloc(dict_size(service->commands)+1, sizeof(char**)); | |
2018 | exp.value.table.contents[0] = calloc(1, sizeof(char*)); | |
2019 | exp.value.table.contents[0][0] = "Commands:"; | |
2020 | dict_foreach(service->commands, append_entry, &exp); | |
2021 | return exp; | |
2022 | } else if (!irccasecmp(variable, "languages")) { | |
2023 | struct string_buffer sbuf; | |
2024 | dict_iterator_t it; | |
2025 | sbuf.used = sbuf.size = 0; | |
2026 | sbuf.list = NULL; | |
2027 | for (it = dict_first(languages); it; it = iter_next(it)) { | |
2028 | string_buffer_append_string(&sbuf, iter_key(it)); | |
2029 | string_buffer_append(&sbuf, ' '); | |
2030 | } | |
2031 | sbuf.list[--sbuf.used] = 0; | |
2032 | exp.type = HF_STRING; | |
2033 | exp.value.str = sbuf.list; | |
2034 | return exp; | |
2035 | } | |
2036 | exp.type = HF_STRING; | |
2037 | exp.value.str = NULL; | |
2038 | return exp; | |
2039 | } | |
2040 | ||
2041 | static void | |
2042 | modcmd_load_bots(struct dict *db, int default_nick) { | |
2043 | dict_iterator_t it; | |
2044 | ||
2045 | for (it = dict_first(db); it; it = iter_next(it)) { | |
2046 | struct record_data *rd; | |
2047 | struct service *svc; | |
2048 | const char *nick, *desc, *hostname; | |
2049 | ||
2050 | rd = iter_data(it); | |
2051 | if (rd->type != RECDB_OBJECT) { | |
2052 | log_module(MAIN_LOG, LOG_ERROR, "Bad type for 'bots/%s' in modcmd db (expected object).", iter_key(it)); | |
2053 | continue; | |
2054 | } | |
2055 | nick = database_get_data(rd->d.object, "nick", RECDB_QSTRING); | |
2056 | if (!nick) { | |
2057 | if (default_nick) | |
2058 | nick = iter_key(it); | |
2059 | else | |
2060 | continue; | |
2061 | } | |
2062 | svc = service_find(nick); | |
2063 | desc = database_get_data(rd->d.object, "description", RECDB_QSTRING); | |
2064 | hostname = database_get_data(rd->d.object, "hostname", RECDB_QSTRING); | |
2065 | if (desc) { | |
2066 | if (!svc) | |
2067 | svc = service_register(AddService(nick, desc, hostname)); | |
2068 | else if (hostname) | |
2069 | strcpy(svc->bot->hostname, hostname); | |
2070 | desc = database_get_data(rd->d.object, "trigger", RECDB_QSTRING); | |
2071 | if (desc) | |
2072 | svc->trigger = desc[0]; | |
2073 | desc = database_get_data(rd->d.object, "privileged", RECDB_QSTRING); | |
2074 | if (desc && (true_string(desc) || enabled_string(desc))) | |
2075 | svc->privileged = 1; | |
2076 | } | |
2077 | } | |
2078 | } | |
2079 | ||
2080 | static void | |
2081 | modcmd_conf_read(void) { | |
2082 | modcmd_load_bots(conf_get_data("services", RECDB_OBJECT), 0); | |
2083 | } | |
2084 | ||
2085 | void | |
2086 | modcmd_init(void) { | |
2087 | qsort(flags, ArrayLength(flags)-1, sizeof(flags[0]), flags_qsort); | |
2088 | modules = dict_new(); | |
2089 | dict_set_free_data(modules, free_module); | |
2090 | services = dict_new(); | |
2091 | dict_set_free_data(services, free_service); | |
2092 | reg_nick_change_func(modcmd_nick_change); | |
2093 | reg_exit_func(modcmd_cleanup); | |
2094 | conf_register_reload(modcmd_conf_read); | |
2095 | ||
2096 | modcmd_module = module_register("modcmd", MAIN_LOG, "modcmd.help", modcmd_expand); | |
2097 | bind_command = modcmd_register(modcmd_module, "bind", cmd_bind, 4, MODCMD_KEEP_BOUND, "oper_level", "800", NULL); | |
2098 | help_command = modcmd_register(modcmd_module, "help", cmd_help, 1, 0, "flags", "+nolog", NULL); | |
2099 | modcmd_register(modcmd_module, "command", cmd_command, 2, 0, "flags", "+nolog", NULL); | |
2100 | modcmd_register(modcmd_module, "modcmd", cmd_modcmd, 2, MODCMD_KEEP_BOUND, "template", "bind", NULL); | |
2101 | modcmd_register(modcmd_module, "god", cmd_god, 0, MODCMD_REQUIRE_AUTHED, "flags", "+oper,+networkhelper", NULL); | |
2102 | modcmd_register(modcmd_module, "readhelp", cmd_readhelp, 2, 0, "oper_level", "650", NULL); | |
2103 | modcmd_register(modcmd_module, "timecmd", cmd_timecmd, 2, 0, "oper_level", "1", NULL); | |
2104 | modcmd_register(modcmd_module, "unbind", cmd_unbind, 3, 0, "template", "bind", NULL); | |
2105 | modcmd_register(modcmd_module, "joiner", cmd_joiner, 1, 0, NULL); | |
2106 | modcmd_register(modcmd_module, "stats modules", cmd_stats_modules, 1, 0, "flags", "+oper", NULL); | |
2107 | modcmd_register(modcmd_module, "stats services", cmd_stats_services, 1, 0, "flags", "+oper", NULL); | |
2108 | modcmd_register(modcmd_module, "showcommands", cmd_showcommands, 1, 0, "flags", "+acceptchan", NULL); | |
2109 | modcmd_register(modcmd_module, "helpfiles", cmd_helpfiles, 2, 0, "template", "bind", NULL); | |
2110 | modcmd_register(modcmd_module, "service add", cmd_service_add, 4, 0, "flags", "+oper", NULL); | |
2111 | modcmd_register(modcmd_module, "service rename", cmd_service_rename, 3, 0, "flags", "+oper", NULL); | |
2112 | modcmd_register(modcmd_module, "service trigger", cmd_service_trigger, 2, 0, "flags", "+oper", NULL); | |
2113 | modcmd_register(modcmd_module, "service privileged", cmd_service_privileged, 2, 0, "flags", "+oper", NULL); | |
2114 | modcmd_register(modcmd_module, "service remove", cmd_service_remove, 2, 0, "flags", "+oper", NULL); | |
2115 | modcmd_register(modcmd_module, "dumpmessages", cmd_dump_messages, 1, 0, "oper_level", "1000", NULL); | |
2116 | version_command = modcmd_register(modcmd_module, "version", cmd_version, 1, 0, NULL); | |
2117 | message_register_table(msgtab); | |
2118 | } | |
2119 | ||
2120 | static void | |
2121 | modcmd_db_load_command(struct service *service, const char *cmdname, struct dict *obj) { | |
2122 | struct svccmd *svccmd; | |
2123 | struct module *module; | |
2124 | struct modcmd *modcmd; | |
2125 | struct string_list *slist; | |
2126 | const char *str, *sep; | |
2127 | char buf[MAXLEN]; | |
2128 | ||
2129 | str = database_get_data(obj, "command", RECDB_QSTRING); | |
2130 | if (!str) { | |
2131 | log_module(MAIN_LOG, LOG_ERROR, "Missing command for service %s command %s in modcmd.db", service->bot->nick, cmdname); | |
2132 | return; | |
2133 | } | |
2134 | sep = strchr(str, '.'); | |
2135 | if (!sep) { | |
2136 | log_module(MAIN_LOG, LOG_ERROR, "Invalid command %s for service %s command %s in modcmd.db", str, service->bot->nick, cmdname); | |
2137 | return; | |
2138 | } | |
2139 | memcpy(buf, str, sep-str); | |
2140 | buf[sep-str] = 0; | |
2141 | if (!(module = module_find(buf))) { | |
2142 | log_module(MAIN_LOG, LOG_ERROR, "Unknown module %s for service %s command %s in modcmd.db", buf, service->bot->nick, cmdname); | |
2143 | return; | |
2144 | } | |
2145 | if (!(modcmd = dict_find(module->commands, sep+1, NULL))) { | |
2146 | log_module(MAIN_LOG, LOG_ERROR, "Unknown command %s in module %s for service %s command %s", sep+1, module->name, service->bot->nick, cmdname); | |
2147 | return; | |
2148 | } | |
2149 | /* Now that we know we have a command to use, fill in the basics. */ | |
2150 | svccmd = calloc(1, sizeof(*svccmd)); | |
2151 | svccmd_insert(service, strdup(cmdname), svccmd, modcmd); | |
2152 | if ((str = database_get_data(obj, "template", RECDB_QSTRING))) { | |
2153 | add_pending_template(svccmd, str); | |
2154 | } else { | |
2155 | svccmd_copy_rules(svccmd, modcmd->defaults); | |
2156 | } | |
2157 | if ((str = database_get_data(obj, "account_flags", RECDB_QSTRING))) { | |
2158 | svccmd->req_account_flags = svccmd->deny_account_flags = 0; | |
2159 | svccmd_configure(svccmd, NULL, service->bot, "account_flags", str); | |
2160 | } | |
2161 | if ((str = database_get_data(obj, "flags", RECDB_QSTRING))) { | |
2162 | svccmd->flags = 0; | |
2163 | svccmd_configure(svccmd, NULL, service->bot, "flags", str); | |
2164 | } | |
2165 | if ((str = database_get_data(obj, "oper_access", RECDB_QSTRING)) | |
2166 | || (str = database_get_data(obj, "opserv_level", RECDB_QSTRING))) { | |
2167 | svccmd_configure(svccmd, NULL, service->bot, "oper_access", str); | |
2168 | } | |
2169 | if ((str = database_get_data(obj, "channel_access", RECDB_QSTRING)) | |
2170 | || (str = database_get_data(obj, "chanserv_level", RECDB_QSTRING))) { | |
2171 | svccmd_configure(svccmd, NULL, service->bot, "channel_access", str); | |
2172 | } | |
2173 | if ((slist = database_get_data(obj, "aliased", RECDB_STRING_LIST))) { | |
2174 | unsigned int nn; | |
2175 | svccmd->alias.used = svccmd->alias.size = slist->used; | |
2176 | svccmd->alias.list = calloc(svccmd->alias.size, sizeof(svccmd->alias.list[0])); | |
2177 | for (nn=0; nn<slist->used; ++nn) | |
2178 | svccmd->alias.list[nn] = strdup(slist->list[nn]); | |
2179 | } | |
2180 | modcmd_set_effective_flags(svccmd); | |
2181 | } | |
2182 | ||
2183 | static struct svccmd * | |
2184 | service_make_alias(struct service *service, const char *alias, ...) { | |
2185 | char *arg, *argv[MAXNUMPARAMS]; | |
2186 | unsigned int nn, argc; | |
2187 | struct svccmd *svccmd, *template; | |
2188 | va_list args; | |
2189 | ||
2190 | va_start(args, alias); | |
2191 | argc = 0; | |
2192 | while (1) { | |
2193 | arg = va_arg(args, char*); | |
2194 | if (!arg) | |
2195 | break; | |
2196 | argv[argc++] = arg; | |
2197 | } | |
2198 | va_end(args); | |
2199 | svccmd = calloc(1, sizeof(*svccmd)); | |
2200 | if (!(template = svccmd_resolve_name(svccmd, argv[0]))) { | |
2201 | log_module(MAIN_LOG, LOG_ERROR, "Invalid base command %s for alias %s in service %s", argv[0], alias, service->bot->nick); | |
2202 | free(svccmd->name); | |
2203 | free(svccmd); | |
2204 | return NULL; | |
2205 | } | |
2206 | if (argc > 1) { | |
2207 | svccmd->alias.used = svccmd->alias.size = argc; | |
2208 | svccmd->alias.list = calloc(svccmd->alias.size, sizeof(svccmd->alias.list[0])); | |
2209 | for (nn=0; nn<argc; nn++) | |
2210 | svccmd->alias.list[nn] = strdup(argv[nn]); | |
2211 | } | |
2212 | svccmd_insert(service, strdup(alias), svccmd, template->command); | |
2213 | svccmd_copy_rules(svccmd, template); | |
2214 | return svccmd; | |
2215 | } | |
2216 | ||
2217 | static int saxdb_present; | |
2218 | ||
2219 | static int | |
2220 | modcmd_saxdb_read(struct dict *db) { | |
2221 | struct dict *db2; | |
2222 | dict_iterator_t it, it2; | |
2223 | struct record_data *rd, *rd2; | |
2224 | struct service *service; | |
2225 | ||
2226 | modcmd_load_bots(database_get_data(db, "bots", RECDB_OBJECT), 1); | |
2227 | db2 = database_get_data(db, "services", RECDB_OBJECT); | |
2228 | if (!db2) { | |
2229 | log_module(MAIN_LOG, LOG_ERROR, "Missing section 'services' in modcmd db."); | |
2230 | return 1; | |
2231 | } | |
2232 | for (it = dict_first(db2); it; it = iter_next(it)) { | |
2233 | rd = iter_data(it); | |
2234 | if (rd->type != RECDB_OBJECT) { | |
2235 | log_module(MAIN_LOG, LOG_ERROR, "Bad type for 'services/%s' in modcmd db (expected object).", iter_key(it)); | |
2236 | continue; | |
2237 | } | |
2238 | if (!(service = service_find(iter_key(it)))) { | |
2239 | log_module(MAIN_LOG, LOG_ERROR, "Unknown service '%s' listed in modcmd db.", iter_key(it)); | |
2240 | continue; | |
2241 | } | |
2242 | for (it2 = dict_first(rd->d.object); it2; it2 = iter_next(it2)) { | |
2243 | rd2 = iter_data(it2); | |
2244 | if (rd2->type != RECDB_OBJECT) { | |
2245 | log_module(MAIN_LOG, LOG_ERROR, "Bad type for 'services/%s/%s' in modcmd db (expected object).", iter_key(it), iter_key(it2)); | |
2246 | continue; | |
2247 | } | |
2248 | modcmd_db_load_command(service, iter_key(it2), rd2->d.object); | |
2249 | } | |
2250 | } | |
2251 | db2 = database_get_data(db, "helpfiles", RECDB_OBJECT); | |
2252 | for (it = dict_first(db2); it; it = iter_next(it)) { | |
2253 | struct module *module; | |
2254 | struct string_list *slist; | |
2255 | unsigned int ii; | |
2256 | ||
2257 | rd = iter_data(it); | |
2258 | if (rd->type != RECDB_STRING_LIST) { | |
2259 | log_module(MAIN_LOG, LOG_ERROR, "Bad type for 'helpfiles/%s' in modcmd db (expected string list).", iter_key(it)); | |
2260 | continue; | |
2261 | } | |
2262 | slist = rd->d.slist; | |
2263 | if (!(service = service_find(iter_key(it)))) { | |
2264 | /* We probably whined about the service being missing above. */ | |
2265 | continue; | |
2266 | } | |
2267 | service->modules.used = 0; | |
2268 | for (ii=0; ii<slist->used; ++ii) { | |
2269 | if (!(module = dict_find(modules, slist->list[ii], NULL))) { | |
2270 | log_module(MAIN_LOG, LOG_ERROR, "Unknown module '%s' listed in modcmd 'helpfiles/%s'.", slist->list[ii], iter_key(it)); | |
2271 | continue; | |
2272 | } | |
2273 | module_list_append(&service->modules, module); | |
2274 | } | |
2275 | } | |
2276 | saxdb_present = 1; | |
2277 | return 0; | |
2278 | } | |
2279 | ||
2280 | static void | |
2281 | create_default_binds(void) { | |
2282 | /* Which services should import which modules by default? */ | |
2283 | struct { | |
2284 | const char *svcname; | |
2285 | /* C is lame and requires a fixed size for this array. | |
2286 | * Be sure you NULL-terminate each array and increment the | |
2287 | * size here if you add more default modules to any | |
2288 | * service. */ | |
2289 | const char *modnames[8]; | |
2290 | } def_binds[] = { | |
2291 | { "ChanServ", { "ChanServ", NULL } }, | |
2292 | { "Global", { "Global", NULL } }, | |
2293 | { "NickServ", { "NickServ", NULL } }, | |
2294 | { "OpServ", { "OpServ", "modcmd", "sendmail", "saxdb", "proxycheck", NULL } }, | |
2295 | { NULL, { NULL } } | |
2296 | }; | |
2297 | unsigned int ii, jj; | |
2298 | char buf[128], *nick; | |
2299 | struct service *service; | |
2300 | struct module *module; | |
2301 | ||
2302 | for (ii = 0; def_binds[ii].svcname; ++ii) { | |
2303 | sprintf(buf, "services/%s/nick", def_binds[ii].svcname); | |
2304 | if (!(nick = conf_get_data(buf, RECDB_QSTRING))) | |
2305 | continue; | |
2306 | if (!(service = service_find(nick))) | |
2307 | continue; | |
2308 | if (dict_size(service->commands) > 0) | |
2309 | continue; | |
2310 | ||
2311 | /* Bind the default modules for this service to it */ | |
2312 | for (jj = 0; def_binds[ii].modnames[jj]; ++jj) { | |
2313 | if (!(module = module_find(def_binds[ii].modnames[jj]))) | |
2314 | continue; | |
2315 | service_bind_module(service, module); | |
2316 | } | |
2317 | ||
2318 | /* Bind the help and version commands to this service */ | |
2319 | service_bind_modcmd(service, help_command, help_command->name); | |
2320 | service_bind_modcmd(service, version_command, version_command->name); | |
2321 | ||
2322 | /* Now some silly hax.. (aliases that most people want) */ | |
2323 | if (!irccasecmp(def_binds[ii].svcname, "ChanServ")) { | |
2324 | service_make_alias(service, "addowner", "*chanserv.adduser", "$1", "owner", NULL); | |
2325 | service_make_alias(service, "addcoowner", "*chanserv.adduser", "$1", "coowner", NULL); | |
4048352e | 2326 | service_make_alias(service, "addmanager", "*chanserv.adduser", "$1", "manager", NULL); |
d76ed9a9 AS |
2327 | service_make_alias(service, "addop", "*chanserv.adduser", "$1", "op", NULL); |
2328 | service_make_alias(service, "addpeon", "*chanserv.adduser", "$1", "peon", NULL); | |
2329 | service_make_alias(service, "delowner", "*chanserv.deluser", "owner", "$1", NULL); | |
2330 | service_make_alias(service, "delcoowner", "*chanserv.deluser", "coowner", "$1", NULL); | |
4048352e | 2331 | service_make_alias(service, "delmanager", "*chanserv.deluser", "manager", "$1", NULL); |
d76ed9a9 AS |
2332 | service_make_alias(service, "delop", "*chanserv.deluser", "op", "$1", NULL); |
2333 | service_make_alias(service, "delpeon", "*chanserv.deluser", "peon", "$1", NULL); | |
2334 | service_make_alias(service, "command", "*modcmd.command", NULL); | |
2335 | service_make_alias(service, "god", "*modcmd.god", NULL); | |
2336 | } else if (!irccasecmp(def_binds[ii].svcname, "OpServ")) { | |
2337 | struct svccmd *svccmd; | |
2338 | svccmd = service_make_alias(service, "stats", "*modcmd.joiner", NULL); | |
2339 | svccmd->min_opserv_level = 101; | |
2340 | svccmd = service_make_alias(service, "service", "*modcmd.joiner", NULL); | |
2341 | svccmd->min_opserv_level = 900; | |
2342 | } | |
2343 | } | |
2344 | } | |
2345 | ||
2346 | static void | |
2347 | import_aliases_db() { | |
2348 | struct dict *db; | |
2349 | dict_iterator_t it, it2; | |
2350 | struct record_data *rd, *rd2; | |
2351 | struct service *service; | |
2352 | struct module *module; | |
2353 | ||
2354 | if (!(db = parse_database("aliases.db"))) | |
2355 | return; | |
2356 | for (it = dict_first(db); it; it = iter_next(it)) { | |
2357 | service = service_find(iter_key(it)); | |
2358 | if (!service) | |
2359 | continue; | |
2360 | module = module_find(service->bot->nick); | |
2361 | rd = iter_data(it); | |
2362 | if (rd->type != RECDB_OBJECT) | |
2363 | continue; | |
2364 | for (it2 = dict_first(rd->d.object); it2; it2 = iter_next(it2)) { | |
2365 | struct modcmd *command; | |
2366 | rd2 = iter_data(it2); | |
2367 | if (rd2->type != RECDB_QSTRING) | |
2368 | continue; | |
2369 | command = dict_find(module->commands, rd2->d.qstring, NULL); | |
2370 | if (!command) | |
2371 | continue; | |
2372 | service_bind_modcmd(service, command, iter_key(it2)); | |
2373 | } | |
2374 | } | |
2375 | } | |
2376 | ||
2377 | void | |
2378 | modcmd_finalize(void) { | |
2379 | dict_iterator_t it; | |
2380 | ||
2381 | /* Check databases. */ | |
2382 | saxdb_register("modcmd", modcmd_saxdb_read, modcmd_saxdb_write); | |
2383 | create_default_binds(); | |
2384 | if (!saxdb_present) | |
2385 | import_aliases_db(); | |
2386 | ||
2387 | /* Register services for their triggers. */ | |
2388 | for (it = dict_first(services); it; it = iter_next(it)) { | |
2389 | struct service *svc = iter_data(it); | |
2390 | if (svc->trigger) | |
2391 | reg_chanmsg_func(svc->trigger, svc->bot, modcmd_chanmsg); | |
2392 | } | |
2393 | ||
2394 | /* Resolve command rule-templates. */ | |
2395 | while (pending_templates) { | |
2396 | struct pending_template *ptempl = pending_templates; | |
2397 | struct svccmd *svccmd; | |
2398 | ||
2399 | pending_templates = ptempl->next; | |
2400 | /* Only overwrite the current template if we have a valid template. */ | |
2401 | if (!strcmp(ptempl->base, "*")) { | |
2402 | /* Do nothing. */ | |
2403 | } else if ((svccmd = svccmd_resolve_name(ptempl->cmd, ptempl->base))) { | |
2404 | svccmd_copy_rules(ptempl->cmd, svccmd); | |
2405 | } else { | |
2406 | assert(ptempl->cmd->parent); | |
2407 | log_module(MAIN_LOG, LOG_ERROR, "Unable to resolve template name %s for command %s in service %s.", ptempl->base, ptempl->cmd->name, ptempl->cmd->parent->bot->nick); | |
2408 | } | |
2409 | free(ptempl->base); | |
2410 | free(ptempl); | |
2411 | } | |
2412 | } |