]>
Commit | Line | Data |
---|---|---|
1 | /* modcmd.c - Generalized module command support | |
2 | * Copyright 2002-2004 srvx Development Team | |
3 | * | |
4 | * This file is part of x3. | |
5 | * | |
6 | * x3 is free software; you can redistribute it and/or modify | |
7 | * it under the terms of the GNU General Public License as published by | |
8 | * the Free Software Foundation; either version 3 of the License, or | |
9 | * (at your option) any later version. | |
10 | * | |
11 | * This program is distributed in the hope that it will be useful, | |
12 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
14 | * GNU General Public License for more details. | |
15 | * | |
16 | * You should have received a copy of the GNU General Public License | |
17 | * along with srvx; if not, write to the Free Software Foundation, | |
18 | * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA. | |
19 | */ | |
20 | ||
21 | #include "../ChangeLog" | |
22 | #include "chanserv.h" | |
23 | #include "conf.h" | |
24 | #include "compat.h" | |
25 | #include "modcmd.h" | |
26 | #include "opserv.h" | |
27 | #include "saxdb.h" | |
28 | #include "timeq.h" | |
29 | #include "version.h" | |
30 | ||
31 | ||
32 | struct pending_template { | |
33 | struct svccmd *cmd; | |
34 | char *base; | |
35 | struct pending_template *next; | |
36 | }; | |
37 | ||
38 | extern unsigned long god_timeout; | |
39 | static struct dict *modules; | |
40 | static struct dict *services; | |
41 | static struct pending_template *pending_templates; | |
42 | static struct module *modcmd_module; | |
43 | static struct modcmd *bind_command, *help_command, *version_command, *credits_command; | |
44 | static const struct message_entry msgtab[] = { | |
45 | { "MCMSG_BARE_FLAG", "Flag %.*s must be preceded by a + or -." }, | |
46 | { "MCMSG_UNKNOWN_FLAG", "Unknown module flag %.*s." }, | |
47 | { "MCMSG_BAD_OPSERV_LEVEL", "Invalid $O access level %s." }, | |
48 | { "MCMSG_BAD_CHANSERV_LEVEL", "Invalid $C access level %s." }, | |
49 | { "MCMSG_LEVEL_TOO_LOW", "You cannot set the access requirements for %s (your level is too low.)" }, | |
50 | { "MCMSG_LEVEL_TOO_HIGH", "You cannot set the access requirements to %s (that is too high)." }, | |
51 | { "MCMSG_BAD_OPTION", "Unknown option %s." }, | |
52 | { "MCMSG_MUST_QUALIFY", "You $bMUST$b \"/msg %s@$s %s\" (not just /msg %s)." }, | |
53 | { "MCMSG_ACCOUNT_SUSPENDED", "Your account has been suspended." }, | |
54 | { "MCMSG_CHAN_NOT_REGISTERED", "%s has not been registered with $C." }, | |
55 | { "MCMSG_CHAN_SUSPENDED", "$b$C$b access to $b%s$b has been temporarily suspended (%s)." }, | |
56 | { "MCMSG_NO_CHANNEL_ACCESS", "You lack access to %s." }, | |
57 | { "MCMSG_LOW_CHANNEL_ACCESS", "You lack sufficient access in %s to use this command." }, | |
58 | { "MCMSG_REQUIRES_JOINABLE", "You must be in %s (or on its userlist) to use this command." }, | |
59 | { "MCMSG_MUST_BE_HELPING", "You must have security override (helping mode) on to use this command." }, | |
60 | { "MCMSG_MISSING_COMMAND", "You must specify a command as well as a channel." }, | |
61 | { "MCMSG_NO_CHANNEL_BEFORE", "You may not give a channel name before this command." }, | |
62 | { "MCMSG_NO_PLUS_CHANNEL", "You may not use a +channel with this command." }, | |
63 | { "MCMSG_COMMAND_ALIASES", "%s is an alias for: %s" }, | |
64 | { "MCMSG_HELP_COMMAND_ALIAS", "$uAlias for:$u %s" }, | |
65 | { "MCMSG_HELP_COMMAND_HEADER", "Command help for: $b%s$b" }, | |
66 | { "MCMSG_HELP_COMMAND_UNKNOWN", "No help available for that command." }, | |
67 | { "MCMSG_HELP_TOPIC_HEADER", "Help topic: $b%s$b" }, | |
68 | { "MCMSG_HELP_DIVIDER", "=---------------------------------------=" }, | |
69 | { "MCMSG_HELP_FOOTER", "=------------- End of Help -------------=" }, | |
70 | { "MCMSG_COMMAND_BINDING", "%s is a binding of: %s" }, | |
71 | { "MCMSG_ALIAS_ERROR", "Error in alias expansion for %s; check the error log for details." }, | |
72 | { "MCMSG_INTERNAL_COMMAND", "$b%s$b is an internal command and cannot be called directly; please check command bindings." }, | |
73 | { "MCMSG_UNKNOWN_MODULE", "Unknown module %s." }, | |
74 | { "MCMSG_UNKNOWN_SERVICE", "Unknown service %s." }, | |
75 | { "MCMSG_ALREADY_BOUND", "%s already has a command bound as %s." }, | |
76 | { "MCMSG_UNKNOWN_COMMAND_2", "Unknown command name %s (relative to service %s)." }, | |
77 | { "MCMSG_COMMAND_MODIFIED", "Option $b%s$b for $b%s$b has been set." }, | |
78 | { "MCMSG_INSPECTION_REFUSED", "You do not have access to inspect command %s." }, | |
79 | { "MCMSG_CANNOT_DOUBLE_ALIAS", "You cannot bind to a complex (argument-carrying) bind." }, | |
80 | { "MCMSG_BAD_ALIAS_ARGUMENT", "Invalid alias argument $b%s$b." }, | |
81 | { "MCMSG_COMMAND_BOUND", "New command %s bound to %s." }, | |
82 | { "MCMSG_MODULE_BOUND", "Bound %d commands from %s to %s." }, | |
83 | { "MCMSG_NO_COMMAND_BOUND", "%s has nothing bound as command %s." }, | |
84 | { "MCMSG_UNBIND_PROHIBITED", "It wouldn't be very much fun to unbind the last %s command, now would it?" }, | |
85 | { "MCMSG_COMMAND_UNBOUND", "Unbound command %s from %s." }, | |
86 | { "MCMSG_HELPFILE_UNBOUND", "Since that was the last command from module %s on the service, the helpfile for %s was removed." }, | |
87 | { "MCMSG_NO_HELPFILE", "Module %s does not have a help file." }, | |
88 | { "MCMSG_HELPFILE_ERROR", "Syntax error reading %s; help contents not changed." }, | |
89 | { "MCMSG_HELPFILE_READ", "Read %s help database in "FMT_TIME_T".%03lu seconds." }, | |
90 | { "MCMSG_COMMAND_TIME", "Command $b%s$b finished in "FMT_TIME_T".%06lu seconds." }, | |
91 | { "MCMSG_NEED_OPSERV_LEVEL", "You must have $O access of at least $b%u$b." }, | |
92 | { "MCMSG_NEED_CHANSERV_LEVEL", "You must have $C access of at least $b%u$b in the channel." }, | |
93 | { "MCMSG_NEED_ACCOUNT_FLAGS", "You must have account flags $b%s$b." }, | |
94 | { "MCMSG_NEED_NOTHING", "Anyone may use the $b%s$b command." }, | |
95 | { "MCMSG_NEED_STAFF_ACCESS", "You must be network staff." }, | |
96 | { "MCMSG_NEED_STAFF_OPER", "You must be an IRC operator." }, | |
97 | { "MCMSG_NEED_STAFF_NETHELPER", "You must be a network helper." }, | |
98 | { "MCMSG_NEED_STAFF_NETHELPER_OR_OPER", "You must be a network helper or IRC operator." }, | |
99 | { "MCMSG_NEED_STAFF_SHELPER", "You must be a support helper." }, | |
100 | { "MCMSG_NEED_STAFF_SHELPER_OR_OPER", "You must be a support helper or IRC operator." }, | |
101 | { "MCMSG_NEED_STAFF_HELPER", "You must be a network or support helper." }, | |
102 | { "MCMSG_NEED_JOINABLE", "The channel must be open or you must be in the channel or on its userlist." }, | |
103 | { "MCMSG_NEED_CHANUSER_CSUSPENDABLE", "You must be on the channel's userlist, and the channel can be suspended." }, | |
104 | { "MCMSG_NEED_CHANUSER", "You must be on the channel's userlist." }, | |
105 | { "MCMSG_NEED_REGCHAN", "You must specify a channel registered with $C." }, | |
106 | { "MCMSG_NEED_CHANNEL", "You must specify a channel that exists." }, | |
107 | { "MCMSG_NEED_AUTHED", "You must be authenticated with $N." }, | |
108 | { "MCMSG_IS_TOY", "$b%s$b is a toy command." }, | |
109 | { "MCMSG_END_REQUIREMENTS", "End of requirements for $b%s$b." }, | |
110 | { "MCMSG_ALREADY_HELPING", "You already have security override enabled." }, | |
111 | { "MCMSG_ALREADY_NOT_HELPING", "You already have security override disabled." }, | |
112 | { "MCMSG_NOW_HELPING", "Security override has been enabled." }, | |
113 | { "MCMSG_NOW_NOT_HELPING", "Security override has been disabled." }, | |
114 | { "MCMSG_JOINER_CHOICES", "Subcommands of %s: %s" }, | |
115 | { "MCMSG_MODULE_INFO", "Commands exported by module $b%s$b:" }, | |
116 | { "MCMSG_SERVICE_INFO", "Commands bound to service $b%s$b:" }, | |
117 | { "MCMSG_TOYS_DISABLED", "Toys are disabled in %s." }, | |
118 | { "MCMSG_PUBLIC_DENY", "Public commands in $b%s$b are restricted." }, | |
119 | { "MCMSG_HELPFILE_SEQUENCE", "Help priority %d: %s" }, | |
120 | { "MCMSG_HELPFILE_SEQUENCE_SET", "Set helpfile priority sequence for %s." }, | |
121 | { "MCMSG_BAD_SERVICE_NICK", "$b%s$b is an invalid nickname." }, | |
122 | { "MCMSG_ALREADY_SERVICE", "$b%s$b is already a service." }, | |
123 | { "MCMSG_NEW_SERVICE", "Added new service bot $b%s$b." }, | |
124 | { "MCMSG_SERVICE_RENAMED", "Service renamed to $b%s$b." }, | |
125 | { "MCMSG_NO_TRIGGER", "$b%s$b does not have an in-channel trigger." }, | |
126 | { "MCMSG_REMOVED_TRIGGER", "Removed trigger from $b%s$b." }, | |
127 | { "MCMSG_DUPLICATE_TRIGGER", "$b%s$b already uses trigger $b%c$b." }, | |
128 | { "MCMSG_CURRENT_TRIGGER", "Trigger for $b%s$b is $b%c$b." }, | |
129 | { "MCMSG_NEW_TRIGGER", "Changed trigger for $b%s$b to $b%c$b." }, | |
130 | { "MCMSG_SERVICE_PRIVILEGED", "Service $b%s$b privileged: $b%s$b." }, | |
131 | { "MCMSG_SERVICE_REMOVED", "Service $b%s$b has been deleted." }, | |
132 | { "MCMSG_FILE_NOT_OPENED", "Unable to open file $b%s$b for writing." }, | |
133 | { "MCMSG_MESSAGES_DUMPED", "Messages written to $b%s$b." }, | |
134 | { "MCMSG_MESSAGE_DUMP_FAILED", "Message dump failed: %s." }, | |
135 | { "MCMSG_COMMAND_FLAGS", "Command flags are %s (inferred: %s)." }, | |
136 | { "MCMSG_COMMAND_ACCOUNT_FLAGS", "Requires account flags +%s, prohibits account flags +%s." }, | |
137 | { "MCMSG_COMMAND_ACCESS_LEVEL", "Requires channel access %d and $O access %d." }, | |
138 | { "MCMSG_COMMAND_USES", "%s has been used %d times." }, | |
139 | { "MCMSG_GOD_EXPIRED", "Security override expired." }, | |
140 | { NULL, NULL } | |
141 | }; | |
142 | struct userData *_GetChannelUser(struct chanData *channel, struct handle_info *handle, int override, int allow_suspended); | |
143 | ||
144 | #define ACTION_ALLOW 1 | |
145 | #define ACTION_OVERRIDE 2 | |
146 | #define ACTION_NOCHANNEL 4 | |
147 | #define ACTION_STAFF 8 | |
148 | ||
149 | #define RESOLVE_DEPTH 4 | |
150 | ||
151 | static struct modcmd_flag { | |
152 | const char *name; | |
153 | unsigned int flag; | |
154 | } modcmd_flags[] = { | |
155 | { "acceptchan", MODCMD_ACCEPT_CHANNEL }, | |
156 | { "acceptpluschan", MODCMD_ACCEPT_PCHANNEL }, | |
157 | { "authed", MODCMD_REQUIRE_AUTHED }, | |
158 | { "channel", MODCMD_REQUIRE_CHANNEL }, | |
159 | { "chanuser", MODCMD_REQUIRE_CHANUSER }, | |
160 | { "disabled", MODCMD_DISABLED }, | |
161 | { "helping", MODCMD_REQUIRE_HELPING }, | |
162 | { "ignore_csuspend", MODCMD_IGNORE_CSUSPEND }, | |
163 | { "joinable", MODCMD_REQUIRE_JOINABLE }, | |
164 | { "keepbound", MODCMD_KEEP_BOUND }, | |
165 | { "loghostmask", MODCMD_LOG_HOSTMASK }, | |
166 | { "networkhelper", MODCMD_REQUIRE_NETWORK_HELPER }, | |
167 | { "never_csuspend", MODCMD_NEVER_CSUSPEND }, | |
168 | { "nolog", MODCMD_NO_LOG }, | |
169 | { "oper", MODCMD_REQUIRE_OPER }, | |
170 | { "qualified", MODCMD_REQUIRE_QUALIFIED }, | |
171 | { "regchan", MODCMD_REQUIRE_REGCHAN }, | |
172 | { "supporthelper", MODCMD_REQUIRE_SUPPORT_HELPER }, | |
173 | { "toy", MODCMD_TOY }, | |
174 | { NULL, 0 } | |
175 | }; | |
176 | ||
177 | static int | |
178 | flags_bsearch(const void *a, const void *b) { | |
179 | const char *key = a; | |
180 | const struct modcmd_flag *flag = b; | |
181 | return ircncasecmp(key, flag->name, strlen(flag->name)); | |
182 | } | |
183 | ||
184 | static int | |
185 | flags_qsort(const void *a, const void *b) { | |
186 | const struct modcmd_flag *fa = a, *fb = b; | |
187 | return irccasecmp(fa->name, fb->name); | |
188 | } | |
189 | ||
190 | DEFINE_LIST(svccmd_list, struct svccmd*) | |
191 | DEFINE_LIST(module_list, struct module*) | |
192 | ||
193 | static void | |
194 | free_service_command(void *data) { | |
195 | struct svccmd *svccmd; | |
196 | unsigned int nn; | |
197 | ||
198 | svccmd = data; | |
199 | if (svccmd->alias.used) { | |
200 | for (nn=0; nn<svccmd->alias.used; ++nn) | |
201 | free(svccmd->alias.list[nn]); | |
202 | free(svccmd->alias.list); | |
203 | } | |
204 | free(svccmd->name); | |
205 | free(svccmd); | |
206 | } | |
207 | ||
208 | static void | |
209 | free_service(void *data) { | |
210 | struct service *service = data; | |
211 | dict_delete(service->commands); | |
212 | module_list_clean(&service->modules); | |
213 | free(service); | |
214 | } | |
215 | ||
216 | static void | |
217 | free_module_command(void *data) { | |
218 | struct modcmd *modcmd = data; | |
219 | free_service_command(modcmd->defaults); | |
220 | free(modcmd->name); | |
221 | free(modcmd); | |
222 | } | |
223 | ||
224 | static void | |
225 | free_module(void *data) { | |
226 | struct module *module = data; | |
227 | dict_delete(module->commands); | |
228 | close_helpfile(module->helpfile); | |
229 | free(module->name); | |
230 | free(module); | |
231 | } | |
232 | ||
233 | struct module * | |
234 | module_register(const char *name, struct log_type *clog, const char *helpfile_name, expand_func_t expand_help) { | |
235 | struct module *newmod; | |
236 | ||
237 | newmod = calloc(1, sizeof(*newmod)); | |
238 | newmod->name = strdup(name); | |
239 | newmod->commands = dict_new(); | |
240 | dict_set_free_data(newmod->commands, free_module_command); | |
241 | newmod->clog = clog; | |
242 | newmod->helpfile_name = helpfile_name; | |
243 | newmod->expand_help = expand_help; | |
244 | if (newmod->helpfile_name) { | |
245 | newmod->helpfile = open_helpfile(newmod->helpfile_name, newmod->expand_help); | |
246 | } | |
247 | dict_insert(modules, newmod->name, newmod); | |
248 | return newmod; | |
249 | } | |
250 | ||
251 | struct module * | |
252 | module_find(const char *name) { | |
253 | return dict_find(modules, name, NULL); | |
254 | } | |
255 | ||
256 | static void | |
257 | add_pending_template(struct svccmd *cmd, const char *target) { | |
258 | struct pending_template *pending = calloc(1, sizeof(*pending)); | |
259 | pending->cmd = cmd; | |
260 | pending->base = strdup(target); | |
261 | pending->next = pending_templates; | |
262 | pending_templates = pending; | |
263 | } | |
264 | ||
265 | struct svccmd * | |
266 | svccmd_resolve_name(struct svccmd *origin, const char *name) { | |
267 | char *sep, svcname[MAXLEN]; | |
268 | ||
269 | if ((sep = strchr(name, '.'))) { | |
270 | memcpy(svcname, name, sep-name); | |
271 | svcname[sep-name] = 0; | |
272 | name = sep + 1; | |
273 | if (svcname[0] == '*') { | |
274 | struct module *module = module_find(svcname+1); | |
275 | struct modcmd *cmd = module ? dict_find(module->commands, name, NULL) : NULL; | |
276 | return cmd ? cmd->defaults : NULL; | |
277 | } else { | |
278 | struct service *service = service_find(svcname); | |
279 | return service ? dict_find(service->commands, name, NULL) : NULL; | |
280 | } | |
281 | } else { | |
282 | if (origin->parent) { | |
283 | return dict_find(origin->parent->commands, name, NULL); | |
284 | } else { | |
285 | struct modcmd *cmd = dict_find(origin->command->parent->commands, name, NULL); | |
286 | return cmd ? cmd->defaults : NULL; | |
287 | } | |
288 | } | |
289 | } | |
290 | ||
291 | static void | |
292 | modcmd_set_effective_flags(struct svccmd *cmd) { | |
293 | int flags = cmd->flags | cmd->command->flags; | |
294 | if (cmd->min_opserv_level > 0) | |
295 | flags |= MODCMD_REQUIRE_OPER; | |
296 | if (cmd->min_channel_access > 0) | |
297 | flags |= MODCMD_REQUIRE_CHANUSER; | |
298 | if (flags & MODCMD_REQUIRE_CHANUSER) | |
299 | flags |= MODCMD_REQUIRE_REGCHAN; | |
300 | if (flags & MODCMD_REQUIRE_REGCHAN) | |
301 | flags |= MODCMD_REQUIRE_CHANNEL; | |
302 | if (flags & (MODCMD_REQUIRE_STAFF|MODCMD_REQUIRE_HELPING)) | |
303 | flags |= MODCMD_REQUIRE_AUTHED; | |
304 | cmd->effective_flags = flags; | |
305 | } | |
306 | ||
307 | static void | |
308 | svccmd_copy_rules(struct svccmd *dest, struct svccmd *src) { | |
309 | dest->flags |= src->flags; | |
310 | dest->req_account_flags |= src->req_account_flags; | |
311 | dest->deny_account_flags |= src->deny_account_flags; | |
312 | if (src->min_opserv_level > dest->min_opserv_level) | |
313 | dest->min_opserv_level = src->min_opserv_level; | |
314 | if (src->min_channel_access > dest->min_channel_access) | |
315 | dest->min_channel_access = src->min_channel_access; | |
316 | modcmd_set_effective_flags(dest); | |
317 | } | |
318 | ||
319 | static int | |
320 | svccmd_configure(struct svccmd *cmd, struct userNode *user, struct userNode *bot, const char *param, const char *value) { | |
321 | if (!irccasecmp(param, "flags")) { | |
322 | unsigned int set_flags, rem_flags; | |
323 | struct modcmd_flag *flag; | |
324 | int opt, end; | |
325 | ||
326 | for (set_flags = rem_flags = 0; 1; value += end) { | |
327 | end = strcspn(value, ","); | |
328 | if (*value == '+') | |
329 | opt = 1; | |
330 | else if (*value == '-') | |
331 | opt = 0; | |
332 | else { | |
333 | if (user) | |
334 | send_message(user, bot, "MCMSG_BARE_FLAG", end, value); | |
335 | else | |
336 | log_module(MAIN_LOG, LOG_ERROR, "Flag %.*s must be preceded by a + or - (for command %s).", end, value, cmd->name); | |
337 | return 0; | |
338 | } | |
339 | value++; | |
340 | flag = bsearch(value, modcmd_flags, ArrayLength(modcmd_flags)-1, sizeof(modcmd_flags[0]), flags_bsearch); | |
341 | if (!flag) { | |
342 | if (user) | |
343 | send_message(user, bot, "MCMSG_UNKNOWN_FLAG", end, value); | |
344 | else | |
345 | log_module(MAIN_LOG, LOG_ERROR, "Unknown module flag %.*s (for command %s).", end, value, cmd->name); | |
346 | return 0; | |
347 | } | |
348 | if (opt) | |
349 | set_flags |= flag->flag, rem_flags &= ~flag->flag; | |
350 | else | |
351 | rem_flags |= flag->flag, set_flags &= ~flag->flag; | |
352 | if (!value[end-1]) | |
353 | break; | |
354 | } | |
355 | cmd->flags = (cmd->flags | set_flags) & ~rem_flags; | |
356 | return 1; | |
357 | } else if (!irccasecmp(param, "channel_level") || !irccasecmp(param, "channel_access") || !irccasecmp(param, "access")) { | |
358 | unsigned short ul; | |
359 | if (!irccasecmp(value, "none") || !irccasecmp(value, "0")) { | |
360 | cmd->min_channel_access = 0; | |
361 | return 1; | |
362 | } else if ((ul = user_level_from_name(value, UL_OWNER)) > 0) { | |
363 | cmd->min_channel_access = ul; | |
364 | return 1; | |
365 | } else if (user) { | |
366 | send_message(user, bot, "MCMSG_BAD_CHANSERV_LEVEL", value); | |
367 | return 0; | |
368 | } else { | |
369 | log_module(MAIN_LOG, LOG_ERROR, "Invalid ChanServ access level %s (for command %s).", value, cmd->name); | |
370 | return 0; | |
371 | } | |
372 | } else if (!irccasecmp(param, "oper_level") || !irccasecmp(param, "oper_access") || !irccasecmp(param, "level")) { | |
373 | unsigned int newval = atoi(value); | |
374 | if (!isdigit(value[0]) || (newval > 1000)) { | |
375 | if (user) | |
376 | send_message(user, bot, "MCMSG_BAD_OPSERV_LEVEL", value); | |
377 | else | |
378 | log_module(MAIN_LOG, LOG_ERROR, "Invalid OpServ access level %s (for command %s).", value, cmd->name); | |
379 | return 0; | |
380 | } | |
381 | if (user && (!user->handle_info || (cmd->min_opserv_level > user->handle_info->opserv_level))) { | |
382 | send_message(user, bot, "MCMSG_LEVEL_TOO_LOW", cmd->name); | |
383 | return 0; | |
384 | } | |
385 | if (user && (!user->handle_info || (newval > user->handle_info->opserv_level))) { | |
386 | send_message(user, bot, "MCMSG_LEVEL_TOO_HIGH", value); | |
387 | return 0; | |
388 | } | |
389 | cmd->min_opserv_level = newval; | |
390 | return 1; | |
391 | } else if (!irccasecmp(param, "account_flags")) { | |
392 | return nickserv_modify_handle_flags(user, bot, value, &cmd->req_account_flags, &cmd->deny_account_flags); | |
393 | } else { | |
394 | if (user) | |
395 | send_message(user, bot, "MCMSG_BAD_OPTION", param); | |
396 | else | |
397 | log_module(MAIN_LOG, LOG_ERROR, "Unknown option %s (for command %s).", param, cmd->name); | |
398 | return 0; | |
399 | } | |
400 | } | |
401 | ||
402 | struct modcmd * | |
403 | modcmd_register(struct module *module, const char *name, modcmd_func_t func, unsigned int min_argc, unsigned int flags, ...) { | |
404 | struct modcmd *newcmd; | |
405 | va_list args; | |
406 | const char *param, *value; | |
407 | ||
408 | newcmd = calloc(1, sizeof(*newcmd)); | |
409 | newcmd->name = strdup(name); | |
410 | newcmd->parent = module; | |
411 | newcmd->func = func; | |
412 | newcmd->min_argc = min_argc; | |
413 | newcmd->flags = flags; | |
414 | newcmd->defaults = calloc(1, sizeof(*newcmd->defaults)); | |
415 | newcmd->defaults->name = strdup(newcmd->name); | |
416 | newcmd->defaults->command = newcmd; | |
417 | dict_insert(module->commands, newcmd->name, newcmd); | |
418 | if (newcmd->flags & (MODCMD_REQUIRE_REGCHAN|MODCMD_REQUIRE_CHANNEL|MODCMD_REQUIRE_CHANUSER|MODCMD_REQUIRE_JOINABLE)) { | |
419 | newcmd->defaults->flags |= MODCMD_ACCEPT_CHANNEL; | |
420 | } | |
421 | if (newcmd->flags & MODCMD_REQUIRE_STAFF) { | |
422 | newcmd->defaults->flags |= MODCMD_REQUIRE_AUTHED; | |
423 | } | |
424 | va_start(args, flags); | |
425 | while ((param = va_arg(args, const char*))) { | |
426 | value = va_arg(args, const char*); | |
427 | if (!irccasecmp(param, "template")) { | |
428 | struct svccmd *svccmd = svccmd_resolve_name(newcmd->defaults, value); | |
429 | if (svccmd) { | |
430 | svccmd_copy_rules(newcmd->defaults, svccmd); | |
431 | } else { | |
432 | log_module(MAIN_LOG, LOG_ERROR, "Unable to resolve template name %s for %s.%s.", value, newcmd->parent->name, newcmd->name); | |
433 | } | |
434 | add_pending_template(newcmd->defaults, value); | |
435 | } else { | |
436 | svccmd_configure(newcmd->defaults, NULL, NULL, param, value); | |
437 | } | |
438 | } | |
439 | modcmd_set_effective_flags(newcmd->defaults); | |
440 | va_end(args); | |
441 | return newcmd; | |
442 | } | |
443 | ||
444 | /* This is kind of a lame hack, but it is actually simpler than having | |
445 | * the permission check vary based on the command itself, or having a | |
446 | * more generic rule system. | |
447 | */ | |
448 | int | |
449 | svccmd_can_invoke(struct userNode *user, struct userNode *bot, struct svccmd *cmd, struct chanNode *channel, int options) { | |
450 | extern struct userNode *chanserv; | |
451 | unsigned int uData_checked = 0; | |
452 | struct userData *uData = NULL; | |
453 | int rflags = 0, flags = cmd->effective_flags; | |
454 | ||
455 | if (flags & MODCMD_DISABLED) { | |
456 | if (options & SVCCMD_NOISY) | |
457 | send_message(user, bot, "MSG_COMMAND_DISABLED", cmd->name); | |
458 | return 0; | |
459 | } | |
460 | if ((flags & MODCMD_REQUIRE_QUALIFIED) && !(options & SVCCMD_QUALIFIED)) { | |
461 | if (options & SVCCMD_NOISY) | |
462 | send_message(user, bot, "MCMSG_MUST_QUALIFY", bot->nick, cmd->name, bot->nick); | |
463 | return 0; | |
464 | } | |
465 | if (flags & MODCMD_REQUIRE_AUTHED) { | |
466 | if (!user->handle_info) { | |
467 | if (options & SVCCMD_NOISY) | |
468 | send_message(user, bot, "MSG_AUTHENTICATE"); | |
469 | return 0; | |
470 | } | |
471 | if (HANDLE_FLAGGED(user->handle_info, SUSPENDED)) { | |
472 | if (options & SVCCMD_NOISY) | |
473 | send_message(user, bot, "MCMSG_ACCOUNT_SUSPENDED"); | |
474 | return 0; | |
475 | } | |
476 | } | |
477 | if (channel || (options & SVCCMD_NOISY)) { | |
478 | if ((flags & MODCMD_REQUIRE_CHANNEL) && !channel) { | |
479 | if (options & SVCCMD_NOISY) | |
480 | send_message(user, bot, "MSG_INVALID_CHANNEL"); | |
481 | return 0; | |
482 | } | |
483 | if (flags & MODCMD_REQUIRE_REGCHAN) { | |
484 | if (!chanserv) { | |
485 | /* Just use the inferred MODCMD_REQUIRE_CHANNEL. */ | |
486 | } else if (!channel->channel_info) { | |
487 | if (options & SVCCMD_NOISY) | |
488 | send_message(user, bot, "MCMSG_CHAN_NOT_REGISTERED", channel->name); | |
489 | return 0; | |
490 | } else if (IsSuspended(channel->channel_info) && !(flags & MODCMD_IGNORE_CSUSPEND)) { | |
491 | /* Allow security-override users to ignore most channel | |
492 | * suspensions, but flag that use as a staff command. | |
493 | */ | |
494 | if (!IsHelping(user) || (flags & MODCMD_NEVER_CSUSPEND)) { | |
495 | if (options & SVCCMD_NOISY) | |
496 | send_message(user, bot, "MCMSG_CHAN_SUSPENDED", channel->name, channel->channel_info->suspended->reason); | |
497 | return 0; | |
498 | } | |
499 | rflags |= ACTION_STAFF; | |
500 | } | |
501 | } | |
502 | if (flags & MODCMD_REQUIRE_CHANUSER) { | |
503 | if (!uData_checked) | |
504 | uData = _GetChannelUser(channel->channel_info, user->handle_info, 1, 0), uData_checked = 1; | |
505 | if (!chanserv) { | |
506 | /* Assume someone knows what they're doing. */ | |
507 | } else if (!uData) { | |
508 | if (options & SVCCMD_NOISY) | |
509 | send_message(user, bot, "MCMSG_NO_CHANNEL_ACCESS", channel->name); | |
510 | return 0; | |
511 | } else if (uData->access < cmd->min_channel_access) { | |
512 | if (options & SVCCMD_NOISY) | |
513 | send_message(user, bot, "MCMSG_LOW_CHANNEL_ACCESS", channel->name); | |
514 | return 0; | |
515 | } | |
516 | } | |
517 | if ((flags & MODCMD_REQUIRE_JOINABLE) && channel) { | |
518 | if (!uData_checked) | |
519 | uData = _GetChannelUser(channel->channel_info, user->handle_info, 1, 0), uData_checked = 1; | |
520 | if ((channel->modes & (MODE_INVITEONLY|MODE_KEY|MODE_SECRET)) | |
521 | && !uData | |
522 | && !IsService(user) | |
523 | && !GetUserMode(channel, user)) { | |
524 | if (options & SVCCMD_NOISY) | |
525 | send_message(user, bot, "MCMSG_REQUIRES_JOINABLE", channel->name); | |
526 | return 0; | |
527 | } | |
528 | } | |
529 | if ((flags & MODCMD_TOY) && channel) { | |
530 | if (!channel->channel_info) | |
531 | rflags |= ACTION_NOCHANNEL; | |
532 | else switch (channel->channel_info->chOpts[chToys]) { | |
533 | case 'd': | |
534 | if (options & SVCCMD_NOISY) | |
535 | send_message(user, bot, "MCMSG_TOYS_DISABLED", channel->name); | |
536 | return 0; | |
537 | case 'n': | |
538 | rflags |= ACTION_NOCHANNEL; | |
539 | break; | |
540 | case 'p': | |
541 | break; | |
542 | } | |
543 | } | |
544 | } | |
545 | if (flags & MODCMD_REQUIRE_STAFF) { | |
546 | if (((flags & MODCMD_REQUIRE_OPER) && IsOper(user)) | |
547 | || ((flags & MODCMD_REQUIRE_NETWORK_HELPER) && IsNetworkHelper(user)) | |
548 | || ((flags & MODCMD_REQUIRE_SUPPORT_HELPER) && IsSupportHelper(user))) { | |
549 | /* allow it */ | |
550 | rflags |= ACTION_STAFF; | |
551 | } else { | |
552 | if (options & SVCCMD_NOISY) | |
553 | send_message(user, bot, "MSG_COMMAND_PRIVILEGED", cmd->name); | |
554 | return 0; | |
555 | } | |
556 | } | |
557 | if (flags & MODCMD_REQUIRE_HELPING) { | |
558 | if (!HANDLE_FLAGGED(user->handle_info, HELPING)) { | |
559 | if (options & SVCCMD_NOISY) | |
560 | send_message(user, bot, "MCMSG_MUST_BE_HELPING"); | |
561 | return 0; | |
562 | } | |
563 | rflags |= ACTION_STAFF; | |
564 | } | |
565 | if (cmd->min_opserv_level > 0) { | |
566 | if (!oper_has_access(user, bot, cmd->min_opserv_level, !(options & SVCCMD_NOISY))) | |
567 | return 0; | |
568 | rflags |= ACTION_STAFF; | |
569 | } | |
570 | if (cmd->req_account_flags || cmd->deny_account_flags) { | |
571 | if (!user->handle_info) { | |
572 | if (options & SVCCMD_NOISY) | |
573 | send_message(user, bot, "MSG_AUTHENTICATE"); | |
574 | return 0; | |
575 | } | |
576 | /* Do we want separate or different messages here? */ | |
577 | if ((cmd->req_account_flags & ~user->handle_info->flags) | |
578 | || (cmd->deny_account_flags & user->handle_info->flags)) { | |
579 | if (options & SVCCMD_NOISY) | |
580 | send_message(user, bot, "MSG_COMMAND_PRIVILEGED", cmd->name); | |
581 | return 0; | |
582 | } | |
583 | } | |
584 | ||
585 | /* If it's an override, return a special value. */ | |
586 | if ((flags & MODCMD_REQUIRE_CHANUSER) | |
587 | && (options & SVCCMD_NOISY) | |
588 | && (!uData || (uData->access > 500)) | |
589 | && (!(uData = _GetChannelUser(channel->channel_info, user->handle_info, 0, 0)) | |
590 | || uData->access < cmd->min_channel_access) | |
591 | && !(flags & (MODCMD_REQUIRE_STAFF|MODCMD_REQUIRE_HELPING))) { | |
592 | rflags |= ACTION_OVERRIDE; | |
593 | } | |
594 | return rflags | ACTION_ALLOW; | |
595 | } | |
596 | ||
597 | static int | |
598 | svccmd_expand_alias(struct svccmd *cmd, struct userNode *user, unsigned int old_argc, char *old_argv[], char *new_argv[]) { | |
599 | unsigned int ii, new_argc; | |
600 | char *arg, *altarg; | |
601 | ||
602 | for (ii=new_argc=0; ii<cmd->alias.used; ++ii) { | |
603 | altarg = NULL; | |
604 | arg = cmd->alias.list[ii]; | |
605 | if (arg[0] != '$') { | |
606 | new_argv[new_argc++] = arg; | |
607 | continue; | |
608 | } | |
609 | if (arg[1] == '$') { | |
610 | new_argv[new_argc++] = arg + 1; | |
611 | } else if (isdigit(arg[1])) { | |
612 | unsigned int lbound, ubound, jj; | |
613 | char *end_num; | |
614 | ||
615 | lbound = strtoul(arg+1, &end_num, 10); | |
616 | switch (end_num[0]) { | |
617 | case 0: ubound = lbound; break; | |
618 | case 'a': | |
619 | altarg = (user && user->handle_info) ? user->handle_info->handle : "(account)"; | |
620 | break; | |
621 | case 'n': | |
622 | altarg = user ? user->nick : "(nick)"; | |
623 | break; | |
624 | case 'm': | |
625 | #ifdef WITH_PROTOCOL_P10 | |
626 | altarg = user ? user->numeric : "(numnick)"; | |
627 | #else | |
628 | altarg = "(This ircd protocol has no numnicks!)"; | |
629 | #endif | |
630 | break; | |
631 | case '-': | |
632 | if (end_num[1] == 0) { | |
633 | ubound = old_argc - 1; | |
634 | break; | |
635 | } else if (isdigit(end_num[1])) { | |
636 | ubound = strtoul(end_num+1, NULL, 10); | |
637 | break; | |
638 | } | |
639 | /* else fall through to default case */ | |
640 | default: | |
641 | log_module(MAIN_LOG, LOG_ERROR, "Alias expansion parse error in %s (near %s; %s.%s arg %d).", arg, end_num, cmd->parent->bot->nick, cmd->name, ii); | |
642 | return 0; | |
643 | } | |
644 | if (altarg != NULL) { | |
645 | if (end_num[1] != 0) { | |
646 | if ((end_num[1] == '-') && (end_num[2] == 0)) | |
647 | ubound = old_argc - 1; | |
648 | else if ((end_num[1] == '-') && (isdigit(end_num[2]))) | |
649 | ubound = strtoul(end_num+2, NULL, 10); | |
650 | else { | |
651 | log_module(MAIN_LOG, LOG_ERROR, "Alias expansion parse error in %s (near %s; %s.%s arg %d).", arg, end_num, cmd->parent->bot->nick, cmd->name, ii); | |
652 | return 0; | |
653 | } | |
654 | } else { | |
655 | ubound = lbound; | |
656 | } | |
657 | if (lbound >= old_argc) | |
658 | new_argv[new_argc++] = altarg; | |
659 | } | |
660 | if (ubound >= old_argc) | |
661 | ubound = old_argc - 1; | |
662 | if (lbound < old_argc) | |
663 | for (jj = lbound; jj <= ubound; ) | |
664 | new_argv[new_argc++] = old_argv[jj++]; | |
665 | } else { | |
666 | switch(arg[1]) { | |
667 | case 'a': | |
668 | new_argv[new_argc++] = (user && user->handle_info) ? user->handle_info->handle : "(account)"; | |
669 | break; | |
670 | case 'n': | |
671 | new_argv[new_argc++] = user ? user->nick : "(nick)"; | |
672 | break; | |
673 | case 'm': | |
674 | #ifdef WITH_PROTOCOL_P10 | |
675 | new_argv[new_argc++] = user ? user->numeric : "(numnick)"; | |
676 | #else | |
677 | new_argv[new_argc++] = "(This ircd protocol has no numnicks!)"; | |
678 | #endif | |
679 | break; | |
680 | default: | |
681 | log_module(MAIN_LOG, LOG_ERROR, "Alias expansion: I do not know how to handle %s (%s.%s arg %d).", arg, cmd->parent->bot->nick, cmd->name, ii); | |
682 | return 0; | |
683 | } | |
684 | } | |
685 | } | |
686 | return new_argc; | |
687 | } | |
688 | ||
689 | int | |
690 | svccmd_invoke_argv(struct userNode *user, struct service *service, struct chanNode *channel, unsigned int argc, char *argv[], unsigned int server_qualified) { | |
691 | extern struct userNode *chanserv; | |
692 | struct svccmd *cmd; | |
693 | unsigned int cmd_arg, perms, flags, options, result; | |
694 | char channel_name[CHANNELLEN+1]; | |
695 | ||
696 | options = (server_qualified ? SVCCMD_QUALIFIED : 0) | SVCCMD_DEBIT | SVCCMD_NOISY; | |
697 | /* Find the command argument. */ | |
698 | cmd_arg = IsChannelName(argv[0]) ? 1 : 0; | |
699 | if (argc < cmd_arg+1) { | |
700 | send_message(user, service->bot, "MCMSG_MISSING_COMMAND"); | |
701 | return 0; | |
702 | } | |
703 | if (!isalnum(*argv[cmd_arg])) { | |
704 | /* Silently ignore stuff that doesn't begin with a letter or number. */ | |
705 | return 0; | |
706 | } | |
707 | cmd = dict_find(service->commands, argv[cmd_arg], NULL); | |
708 | if (!cmd) { | |
709 | if (!channel) | |
710 | send_message(user, service->bot, "MSG_COMMAND_UNKNOWN", argv[cmd_arg]); | |
711 | return 0; | |
712 | } | |
713 | ||
714 | /* Check pubcmd for the channel. */ | |
715 | if (channel && (channel->channel_info) && (service->bot == chanserv) | |
716 | && !check_user_level(channel, user, lvlPubCmd, 1, 0)) { | |
717 | send_message(user, service->bot, "MCMSG_PUBLIC_DENY", channel->name); | |
718 | return 0; | |
719 | } | |
720 | ||
721 | flags = cmd->effective_flags; | |
722 | /* If they put a channel name first, check if the command allows | |
723 | * it. If so, swap it with the command name. | |
724 | */ | |
725 | if (cmd_arg == 1) { | |
726 | char *tmp; | |
727 | /* Complain if we're not supposed to accept the channel. */ | |
728 | if (!(flags & MODCMD_ACCEPT_CHANNEL)) { | |
729 | send_message(user, service->bot, "MCMSG_NO_CHANNEL_BEFORE"); | |
730 | return 0; | |
731 | } | |
732 | if (!(flags & MODCMD_ACCEPT_PCHANNEL) | |
733 | && (argv[0][0] == '+')) { | |
734 | send_message(user, service->bot, "MCMSG_NO_PLUS_CHANNEL"); | |
735 | return 0; | |
736 | } | |
737 | tmp = argv[1]; | |
738 | argv[1] = argv[0]; | |
739 | argv[0] = tmp; | |
740 | } | |
741 | ||
742 | /* Try to grab a channel handle before alias expansion. | |
743 | * If the command accepts a channel name, and argv[1] is | |
744 | * one, use it as a channel name, and hide it from logging. | |
745 | */ | |
746 | if ((argc > 1) | |
747 | && (flags & MODCMD_ACCEPT_CHANNEL) | |
748 | && IsChannelName(argv[1]) | |
749 | && ((argv[1][0] != '+') || (flags & MODCMD_ACCEPT_PCHANNEL)) | |
750 | && (channel = dict_find(channels, argv[1], NULL))) { | |
751 | argv[1] = argv[0]; | |
752 | argv++, argc--; | |
753 | cmd_arg = 1; | |
754 | } | |
755 | ||
756 | /* Expand the alias arguments, if there are any. */ | |
757 | if (cmd->alias.used) { | |
758 | char *new_argv[MAXNUMPARAMS]; | |
759 | int res; | |
760 | ||
761 | res = svccmd_expand_alias(cmd, user, argc, argv, new_argv); | |
762 | if (res < 0) { | |
763 | send_message(user, service->bot, "MSG_MISSING_PARAMS", cmd->name); | |
764 | return 0; | |
765 | } else if (res == 0) { | |
766 | send_message(user, service->bot, "MCMSG_ALIAS_ERROR", cmd->name); | |
767 | return 0; | |
768 | } | |
769 | argc = res; | |
770 | argv = new_argv; | |
771 | ||
772 | /* Try again to grab a handle to the channel after alias | |
773 | * expansion, overwriting any previous channel. This should, | |
774 | * of course, only be done again if an alias was acually | |
775 | * expanded. */ | |
776 | if ((argc > 1) | |
777 | && (flags & MODCMD_ACCEPT_CHANNEL) | |
778 | && IsChannelName(argv[1]) | |
779 | && ((argv[1][0] != '+') || (flags & MODCMD_ACCEPT_PCHANNEL)) | |
780 | && (channel = dict_find(channels, argv[1], NULL))) { | |
781 | argv[1] = argv[0]; | |
782 | argv++, argc--; | |
783 | cmd_arg = 1; | |
784 | } | |
785 | } | |
786 | ||
787 | /* Figure out what actions we should do for it.. */ | |
788 | if (cmd_arg && (flags & MODCMD_TOY)) { | |
789 | /* Do not let user manually specify a channel. */ | |
790 | channel = NULL; | |
791 | } | |
792 | if (argc < cmd->command->min_argc) { | |
793 | send_message(user, service->bot, "MSG_MISSING_PARAMS", cmd->name); | |
794 | svccmd_send_help_brief(user, service->bot, cmd); | |
795 | return 0; | |
796 | } | |
797 | if (!cmd->command->func) { | |
798 | send_message(user, service->bot, "MCMSG_INTERNAL_COMMAND", cmd->name); | |
799 | return 0; | |
800 | } | |
801 | perms = svccmd_can_invoke(user, service->bot, cmd, channel, options); | |
802 | if (!perms) | |
803 | return 0; | |
804 | cmd->uses++; | |
805 | if (perms & ACTION_NOCHANNEL) | |
806 | channel = NULL; | |
807 | ||
808 | if (channel) | |
809 | safestrncpy(channel_name, channel->name, sizeof(channel_name)); | |
810 | else | |
811 | channel_name[0] = 0; | |
812 | if (!(result = cmd->command->func(user, channel, argc, argv, cmd))) | |
813 | return 0; | |
814 | if (!(flags & MODCMD_NO_LOG)) { | |
815 | enum log_severity slvl; | |
816 | if (result & CMD_LOG_OVERRIDE) | |
817 | slvl = LOG_OVERRIDE; | |
818 | else if ((perms & ACTION_STAFF) || (result & CMD_LOG_STAFF)) | |
819 | slvl = LOG_STAFF; | |
820 | else if (perms & ACTION_OVERRIDE) | |
821 | slvl = LOG_OVERRIDE; | |
822 | else | |
823 | slvl = LOG_COMMAND; | |
824 | /* Unsplit argv after running the function to get the benefit | |
825 | * of any mangling/hiding done by the commands. */ | |
826 | log_audit(cmd->command->parent->clog, slvl, user, service->bot, channel_name, AUDIT_HOSTMASK, unsplit_string(argv, argc, NULL)); | |
827 | } | |
828 | return 1; | |
829 | } | |
830 | ||
831 | /* First line (syntax usually) only help.. used for wrong param counts etc */ | |
832 | int | |
833 | svccmd_send_help_brief(struct userNode *user, struct userNode *bot, struct svccmd *cmd) { | |
834 | int r; | |
835 | ||
836 | /* If it's an alias, show what it's an alias for. */ | |
837 | if (cmd->alias.used) { | |
838 | char alias_text[MAXLEN]; | |
839 | unsplit_string((char**)cmd->alias.list, cmd->alias.used, alias_text); | |
840 | send_message(user, bot, "MCMSG_COMMAND_ALIASES", cmd->name, cmd->command->name); | |
841 | } | |
842 | /* Send the syntax line of help.. */ | |
843 | r = send_help_brief(user, bot, cmd->command->parent->helpfile, cmd->name); | |
844 | if(!r) { | |
845 | if(cmd->command->name) | |
846 | { | |
847 | send_message(user, bot, "MCMSG_COMMAND_ALIASES", cmd->name, cmd->command->name); | |
848 | r = send_help_brief(user, bot, cmd->command->parent->helpfile, cmd->command->name); | |
849 | } | |
850 | } | |
851 | return r; | |
852 | } | |
853 | ||
854 | int is_joiner(struct svccmd *cmd) | |
855 | { | |
856 | if(cmd->command->name) | |
857 | { | |
858 | if(strcasecmp("joiner", cmd->command->name)) | |
859 | return(0); | |
860 | else | |
861 | return(1); | |
862 | } | |
863 | return(0); | |
864 | /* | |
865 | if(cmd->alias.used) | |
866 | { | |
867 | char alias_text[MAXLEN]; | |
868 | unsplit_string((char**)cmd->alias.list, cmd->alias.used, alias_text); | |
869 | if(strcasecmp("joiner", alias_text)) | |
870 | return(0); | |
871 | else | |
872 | return(1); | |
873 | } | |
874 | */ | |
875 | } | |
876 | ||
877 | int | |
878 | svccmd_send_help(struct userNode *user, struct service *service, const char *topic) { | |
879 | struct module *module; | |
880 | struct svccmd *cmd; | |
881 | char cmdname[MAXLEN]; | |
882 | unsigned int nn, ii; | |
883 | int helpsent = 0; | |
884 | ||
885 | /* If there is no topic show the index */ | |
886 | if (!topic) | |
887 | topic = "<index>"; | |
888 | /* make heading str (uppercase) */ | |
889 | for (nn=0; topic[nn]; nn++) | |
890 | cmdname[nn] = toupper(topic[nn]); | |
891 | cmdname[nn] = 0; | |
892 | ||
893 | /* If there is a command 'topic', send command help for the command (unless its bound to JOINER) */ | |
894 | if ((cmd = dict_find(service->commands, topic, NULL)) && !is_joiner(cmd)) | |
895 | { | |
896 | send_message(user, service->bot, "MCMSG_HELP_COMMAND_HEADER", cmdname); | |
897 | send_message(user, service->bot, "MCMSG_HELP_DIVIDER"); | |
898 | helpsent = send_help(user, service->bot, cmd->command->parent->helpfile, cmd->name); | |
899 | ||
900 | /* Show if its an alias, or a binding of another command */ | |
901 | if (cmd->alias.used) | |
902 | { | |
903 | char alias_text[MAXLEN]; | |
904 | unsplit_string((char**)cmd->alias.list, cmd->alias.used, alias_text); | |
905 | send_message(user, service->bot, "MCMSG_HELP_COMMAND_ALIAS", alias_text); | |
906 | /* If send_help above didnt work, try again with the referenced command.. */ | |
907 | if(!helpsent) | |
908 | helpsent = send_help(user, service->bot, cmd->command->parent->helpfile, alias_text); | |
909 | } | |
910 | else if(cmd->command->name && strcasecmp(cmd->command->name, cmd->name)) | |
911 | { | |
912 | send_message(user, service->bot, "MCMSG_HELP_COMMAND_ALIAS", cmd->command->name); | |
913 | /* If send_help above didnt work, try again with the referenced command.. */ | |
914 | if(!helpsent) | |
915 | helpsent = send_help(user, service->bot, cmd->command->parent->helpfile, cmd->command->name); | |
916 | } | |
917 | /* If send_help still couldnt find it, tell them sorry */ | |
918 | if(!helpsent) | |
919 | send_message(user, service->bot, "MCMSG_HELP_COMMAND_UNKNOWN"); | |
920 | send_message(user, service->bot, "MCMSG_HELP_FOOTER"); | |
921 | return true; | |
922 | } | |
923 | else /* look for topic in the help files loaded to this nick/service */ | |
924 | { | |
925 | /* Check for non command help in first primary help file, then next and so on */ | |
926 | /* Note - we need to think about default bindings. see opserv.helpfiles */ | |
927 | for(ii = 0; ii < service->modules.used; ii++) | |
928 | { | |
929 | module = service->modules.list[ii]; | |
930 | if(!module->helpfile) | |
931 | continue; | |
932 | if(dict_find(module->helpfile->db, topic, NULL)) | |
933 | { | |
934 | if (module->helpfile && dict_find(module->helpfile->db, topic, NULL)) | |
935 | { | |
936 | ||
937 | send_message(user, service->bot, "MCMSG_HELP_TOPIC_HEADER", cmdname); | |
938 | send_message(user, service->bot, "MCMSG_HELP_DIVIDER"); | |
939 | /* This should never fail but maybe if something is odd? */ | |
940 | if(!send_help(user, service->bot, module->helpfile, topic)) | |
941 | send_message(user, service->bot, "MSG_TOPIC_UNKNOWN"); | |
942 | send_message(user, service->bot, "MCMSG_HELP_FOOTER"); | |
943 | return true; | |
944 | } | |
945 | } | |
946 | } | |
947 | } | |
948 | /* Otherwise say we cant find it */ | |
949 | send_message(user, service->bot, "MSG_TOPIC_UNKNOWN"); | |
950 | return 0; | |
951 | } | |
952 | ||
953 | static int | |
954 | svccmd_invoke(struct userNode *user, struct service *service, struct chanNode *channel, const char *text, int server_qualified) { | |
955 | unsigned int argc; | |
956 | char *argv[MAXNUMPARAMS]; | |
957 | char tmpline[MAXLEN]; | |
958 | ||
959 | if (!*text) | |
960 | return 0; | |
961 | if (service->privileged) { | |
962 | if (!IsOper(user)) { | |
963 | send_message(user, service->bot, "MSG_SERVICE_PRIVILEGED", service->bot->nick); | |
964 | return 0; | |
965 | } | |
966 | if (!user->handle_info) { | |
967 | send_message(user, service->bot, "MSG_AUTHENTICATE"); | |
968 | return 0; | |
969 | } | |
970 | if (HANDLE_FLAGGED(user->handle_info, OPER_SUSPENDED)) { | |
971 | send_message(user, service->bot, "MSG_OPER_SUSPENDED"); | |
972 | return 0; | |
973 | } | |
974 | } | |
975 | safestrncpy(tmpline, text, sizeof(tmpline)); | |
976 | argc = split_line(tmpline, false, ArrayLength(argv), argv); | |
977 | return argc ? svccmd_invoke_argv(user, service, channel, argc, argv, server_qualified) : 0; | |
978 | } | |
979 | ||
980 | char *cvs_verstring() { | |
981 | static char verstring[MAXLEN] = { 0 }; | |
982 | ||
983 | if(!*verstring) { | |
984 | char *svn = NULL, *svnver = NULL, *svndate = NULL, *v = 0, ver[MAXLEN]; | |
985 | int vc = 0; | |
986 | ||
987 | strcpy(ver, CVS_VERSION); | |
988 | for (svn = x3_strtok(&v, ver, " "); svn; | |
989 | svn = x3_strtok(&v, 0, " ")) { | |
990 | if (vc == 2) | |
991 | svnver = svn; | |
992 | else if (vc == 3) | |
993 | svndate = svn; | |
994 | vc++; | |
995 | } | |
996 | sprintf(verstring, "%s %s", svnver, svndate); | |
997 | } | |
998 | return verstring; | |
999 | } | |
1000 | ||
1001 | ||
1002 | void | |
1003 | modcmd_privmsg(struct userNode *user, struct userNode *bot, const char *text, int server_qualified) { | |
1004 | struct service *service; | |
1005 | ||
1006 | if (!(service = dict_find(services, bot->nick, NULL))) { | |
1007 | log_module(MAIN_LOG, LOG_ERROR, "modcmd_privmsg got privmsg for unhandled service %s, unregistering.", bot->nick); | |
1008 | reg_privmsg_func(bot, NULL); | |
1009 | return; | |
1010 | } | |
1011 | ||
1012 | if (text[0] == '\x01') { | |
1013 | char *term, response[MAXLEN]; | |
1014 | ||
1015 | text++; /* Skip leading ^A. */ | |
1016 | /* Chop off final ^A. */ | |
1017 | term = strchr(text, '\x01'); | |
1018 | if (!term) | |
1019 | return; | |
1020 | *term = '\0'; | |
1021 | /* Parse out leading text. */ | |
1022 | term = strchr(text, ' '); | |
1023 | if (term) { | |
1024 | *term++ = '\0'; | |
1025 | if (!*term) | |
1026 | term = NULL; | |
1027 | } | |
1028 | /* No dict lookup since these are so few. */ | |
1029 | if (!irccasecmp(text, "CLIENTINFO")) { | |
1030 | /* Use \001 instead of \x01 because apparently \x01C is | |
1031 | * interpreted as ASCII FS (\034, decimal 28, hex 1C). | |
1032 | */ | |
1033 | irc_notice_user(bot, user, "\001CLIENTINFO CLIENTINFO PING TIME USERINFO VERSION\x01"); | |
1034 | } else if (!irccasecmp(text, "PING")) { | |
1035 | if (term) { | |
1036 | snprintf(response, sizeof(response), "\x01PING %s\x01", term); | |
1037 | irc_notice_user(bot, user, response); | |
1038 | } else { | |
1039 | irc_notice_user(bot,user, "\x01PING\x01"); | |
1040 | } | |
1041 | } else if (!irccasecmp(text, "TIME")) { | |
1042 | struct tm tm; | |
1043 | localtime_r(&now, &tm); | |
1044 | strftime(response, sizeof(response), "\x01TIME %a %b %d %H:%M:%S %Y\x01", &tm); | |
1045 | irc_notice_user(bot, user, response); | |
1046 | } else if (!irccasecmp(text, "USERINFO")) { | |
1047 | snprintf(response, sizeof(response), "\x01USERINFO %s\x01", bot->info); | |
1048 | irc_notice_user(bot, user, response); | |
1049 | } else if (!irccasecmp(text, "VERSION")) { | |
1050 | snprintf(response, sizeof(response), "\x01VERSION %s+[%s]\x01", PACKAGE_STRING, cvs_version); | |
1051 | irc_notice_user(bot, user, response); | |
1052 | } else if (!irccasecmp(text, "GENDER")) { | |
1053 | snprintf(response, sizeof(response), "\x01GENDER ummm im still deciding\x01"); | |
1054 | irc_notice_user(bot, user, response); | |
1055 | } | |
1056 | return; | |
1057 | } | |
1058 | ||
1059 | if (service->msg_hook && service->msg_hook(user, bot, text, server_qualified)) | |
1060 | return; | |
1061 | svccmd_invoke(user, service, NULL, text, server_qualified); | |
1062 | } | |
1063 | ||
1064 | void | |
1065 | modcmd_chanmsg(struct userNode *user, struct chanNode *chan, const char *text, struct userNode *bot, unsigned int is_notice, UNUSED_ARG(void *extra)) { | |
1066 | struct service *service; | |
1067 | if (!(service = dict_find(services, bot->nick, NULL))) | |
1068 | return; | |
1069 | svccmd_invoke(user, service, chan, text, 0); | |
1070 | (void)is_notice; | |
1071 | } | |
1072 | ||
1073 | struct service * | |
1074 | service_register(struct userNode *bot) { | |
1075 | struct service *service; | |
1076 | if ((service = dict_find(services, bot->nick, NULL))) | |
1077 | return service; | |
1078 | service = calloc(1, sizeof(*service)); | |
1079 | module_list_init(&service->modules); | |
1080 | service->commands = dict_new(); | |
1081 | service->bot = bot; | |
1082 | dict_set_free_data(service->commands, free_service_command); | |
1083 | dict_insert(services, service->bot->nick, service); | |
1084 | reg_privmsg_func(bot, modcmd_privmsg); | |
1085 | return service; | |
1086 | } | |
1087 | ||
1088 | struct service * | |
1089 | service_find(const char *name) { | |
1090 | return dict_find(services, name, NULL); | |
1091 | } | |
1092 | ||
1093 | static void | |
1094 | svccmd_insert(struct service *service, char *name, struct svccmd *svccmd, struct modcmd *modcmd) { | |
1095 | unsigned int ii; | |
1096 | svccmd->parent = service; | |
1097 | svccmd->name = name; | |
1098 | svccmd->command = modcmd; | |
1099 | svccmd->command->bind_count++; | |
1100 | dict_insert(service->commands, svccmd->name, svccmd); | |
1101 | for (ii=0; ii<service->modules.used; ++ii) { | |
1102 | if (service->modules.list[ii] == svccmd->command->parent) break; | |
1103 | } | |
1104 | if (ii == service->modules.used) { | |
1105 | module_list_append(&service->modules, svccmd->command->parent); | |
1106 | } | |
1107 | } | |
1108 | ||
1109 | struct svccmd * | |
1110 | service_bind_modcmd(struct service *service, struct modcmd *cmd, const char *name) { | |
1111 | struct svccmd *svccmd; | |
1112 | if ((svccmd = dict_find(service->commands, name, NULL))) { | |
1113 | if (svccmd->command == cmd) return svccmd; | |
1114 | log_module(MAIN_LOG, LOG_ERROR, "Tried to bind command %s.%s into service %s as %s, but already bound (as %s.%s).", cmd->parent->name, cmd->name, service->bot->nick, name, svccmd->command->parent->name, svccmd->command->name); | |
1115 | return NULL; | |
1116 | } | |
1117 | svccmd = calloc(1, sizeof(*svccmd)); | |
1118 | svccmd_insert(service, strdup(name), svccmd, cmd); | |
1119 | svccmd_copy_rules(svccmd, cmd->defaults); | |
1120 | return svccmd; | |
1121 | } | |
1122 | ||
1123 | static unsigned int | |
1124 | service_bind_module(struct service *service, struct module *module) { | |
1125 | dict_iterator_t it; | |
1126 | struct modcmd *modcmd; | |
1127 | unsigned int count; | |
1128 | ||
1129 | count = 0; | |
1130 | for (it = dict_first(module->commands); it; it = iter_next(it)) { | |
1131 | modcmd = iter_data(it); | |
1132 | if (!((modcmd->flags | modcmd->defaults->flags) & MODCMD_NO_DEFAULT_BIND)) | |
1133 | if (service_bind_modcmd(service, modcmd, iter_key(it))) | |
1134 | count++; | |
1135 | } | |
1136 | return count; | |
1137 | } | |
1138 | ||
1139 | /* This MUST return argc if the alias expansion code knows how to deal | |
1140 | * with every argument in argv; otherwise, it MUST return the index of | |
1141 | * an argument that the expansion code does not know how to deal with. | |
1142 | */ | |
1143 | static unsigned int | |
1144 | check_alias_args(char *argv[], unsigned int argc) { | |
1145 | unsigned int arg; | |
1146 | ||
1147 | for (arg=0; arg<argc; ++arg) { | |
1148 | if (argv[arg][0] != '$') { | |
1149 | continue; | |
1150 | } else if (argv[arg][1] == '$') { | |
1151 | continue; | |
1152 | } else if (isdigit(argv[arg][1])) { | |
1153 | char *end_num; | |
1154 | unsigned long tmp; | |
1155 | ||
1156 | tmp = strtoul(argv[arg]+1, &end_num, 10); | |
1157 | switch (end_num[0]) { | |
1158 | case 0: | |
1159 | continue; | |
1160 | case 'a': | |
1161 | case 'n': | |
1162 | case 'm': | |
1163 | if (end_num[1] == 0) | |
1164 | continue; | |
1165 | else if (end_num[1] == '-') | |
1166 | end_num++; | |
1167 | else | |
1168 | return arg; | |
1169 | case '-': | |
1170 | if (end_num[1] == 0) | |
1171 | continue; | |
1172 | else if (isdigit(end_num[1])) | |
1173 | continue; | |
1174 | /* else fall through to default case */ | |
1175 | default: | |
1176 | return arg; | |
1177 | } | |
1178 | } else { | |
1179 | switch(argv[arg][1]) { | |
1180 | case 'a': | |
1181 | case 'n': | |
1182 | case 'm': | |
1183 | continue; | |
1184 | default: | |
1185 | return arg; | |
1186 | } | |
1187 | } | |
1188 | } | |
1189 | return arg; | |
1190 | } | |
1191 | ||
1192 | static unsigned int | |
1193 | collapse_cmdname(char *argv[], unsigned int argc, char *dest) { | |
1194 | unsigned int ii, pos, arg; | |
1195 | if (!argc) { | |
1196 | dest[0] = 0; | |
1197 | return 0; | |
1198 | } | |
1199 | for (ii=pos=0, arg=0; argv[arg][ii]; ) { | |
1200 | if (argv[arg][ii] == '\\') { | |
1201 | if (argv[arg][ii+1]) { | |
1202 | /* escaping a real character just puts it in literally */ | |
1203 | dest[pos++] = argv[arg][++ii]; | |
1204 | } else if ((arg+1) == argc) { | |
1205 | /* we ran to the end of the argument list; abort */ | |
1206 | break; | |
1207 | } else { | |
1208 | /* escape at end of a word is a space */ | |
1209 | dest[pos++] = ' '; | |
1210 | ii = 0; | |
1211 | arg++; | |
1212 | } | |
1213 | } else { | |
1214 | /* normal characters don't need escapes */ | |
1215 | dest[pos++] = argv[arg][ii++]; | |
1216 | } | |
1217 | } | |
1218 | dest[pos] = 0; | |
1219 | return arg + 1; | |
1220 | } | |
1221 | ||
1222 | static MODCMD_FUNC(cmd_bind) { | |
1223 | struct service *service; | |
1224 | struct svccmd *template, *newcmd; | |
1225 | char *svcname, *dot; | |
1226 | char newname[MAXLEN], cmdname[MAXLEN]; | |
1227 | unsigned int arg, diff; | |
1228 | ||
1229 | assert(argc > 3); | |
1230 | svcname = argv[1]; | |
1231 | arg = collapse_cmdname(argv+2, argc-2, newname) + 2; | |
1232 | if (!arg) { | |
1233 | reply("MSG_MISSING_PARAMS", cmd->name); | |
1234 | return 0; | |
1235 | } | |
1236 | diff = collapse_cmdname(argv+arg, argc-arg, cmdname); | |
1237 | if (!diff) { | |
1238 | reply("MSG_MISSING_PARAMS", cmd->name); | |
1239 | return 0; | |
1240 | } | |
1241 | arg += diff; | |
1242 | ||
1243 | if (!(service = service_find(svcname))) { | |
1244 | reply("MCMSG_UNKNOWN_SERVICE", svcname); | |
1245 | return 0; | |
1246 | } | |
1247 | ||
1248 | if ((newcmd = dict_find(service->commands, newname, NULL))) { | |
1249 | reply("MCMSG_ALREADY_BOUND", service->bot->nick, newname); | |
1250 | return 0; | |
1251 | } | |
1252 | ||
1253 | if ((dot = strchr(cmdname, '.')) && (dot[1] == '*') && (dot[2] == 0)) { | |
1254 | unsigned int count; | |
1255 | struct module *module; | |
1256 | *dot = 0; | |
1257 | module = module_find((cmdname[0] == '*') ? cmdname+1 : cmdname); | |
1258 | if (!module) { | |
1259 | reply("MSG_MODULE_UNKNOWN", cmdname); | |
1260 | return 0; | |
1261 | } | |
1262 | count = service_bind_module(service, module); | |
1263 | reply("MCMSG_MODULE_BOUND", count, module->name, service->bot->nick); | |
1264 | return count != 0; | |
1265 | } | |
1266 | newcmd = calloc(1, sizeof(*newcmd)); | |
1267 | newcmd->name = strdup(newname); | |
1268 | newcmd->parent = service; | |
1269 | if (!(template = svccmd_resolve_name(newcmd, cmdname))) { | |
1270 | reply("MCMSG_UNKNOWN_COMMAND_2", cmdname, service->bot->nick); | |
1271 | free(newcmd->name); | |
1272 | free(newcmd); | |
1273 | return 0; | |
1274 | } | |
1275 | if (template->alias.used) { | |
1276 | reply("MCMSG_CANNOT_DOUBLE_ALIAS"); | |
1277 | free(newcmd->name); | |
1278 | free(newcmd); | |
1279 | return 0; | |
1280 | } | |
1281 | ||
1282 | if (argc > arg) { | |
1283 | /* a more complicated alias; fix it up */ | |
1284 | unsigned int nn; | |
1285 | ||
1286 | arg -= diff; | |
1287 | nn = check_alias_args(argv+arg, argc-arg); | |
1288 | if (nn+arg < argc) { | |
1289 | reply("MCMSG_BAD_ALIAS_ARGUMENT", argv[nn+arg]); | |
1290 | free(newcmd->name); | |
1291 | free(newcmd); | |
1292 | return 0; | |
1293 | } | |
1294 | newcmd->alias.used = newcmd->alias.size = argc-arg; | |
1295 | newcmd->alias.list = calloc(newcmd->alias.size, sizeof(newcmd->alias.list[0])); | |
1296 | for (nn=0; nn<newcmd->alias.used; ++nn) | |
1297 | newcmd->alias.list[nn] = strdup(argv[nn+arg]); | |
1298 | } | |
1299 | ||
1300 | svccmd_insert(service, newcmd->name, newcmd, template->command); | |
1301 | svccmd_copy_rules(newcmd, template); | |
1302 | reply("MCMSG_COMMAND_BOUND", newcmd->name, newcmd->parent->bot->nick); | |
1303 | return 1; | |
1304 | } | |
1305 | ||
1306 | static int | |
1307 | service_recheck_bindings(struct service *service, struct module *module) { | |
1308 | dict_iterator_t it; | |
1309 | struct svccmd *cmd; | |
1310 | ||
1311 | for (it = dict_first(service->commands); it; it = iter_next(it)) { | |
1312 | cmd = iter_data(it); | |
1313 | if (cmd->command->parent == module) return 0; | |
1314 | } | |
1315 | /* No more bindings, remove it from our list. */ | |
1316 | module_list_remove(&service->modules, module); | |
1317 | return 1; | |
1318 | } | |
1319 | ||
1320 | static svccmd_unbind_func_t *suf_list; | |
1321 | static void **suf_list_extra; | |
1322 | unsigned int suf_size, suf_used; | |
1323 | ||
1324 | void | |
1325 | reg_svccmd_unbind_func(svccmd_unbind_func_t handler, void *extra) { | |
1326 | if (suf_used == suf_size) { | |
1327 | if (suf_size) { | |
1328 | suf_size <<= 1; | |
1329 | suf_list = realloc(suf_list, suf_size*sizeof(svccmd_unbind_func_t)); | |
1330 | suf_list_extra = realloc(suf_list_extra, suf_size*sizeof(void*)); | |
1331 | } else { | |
1332 | suf_size = 8; | |
1333 | suf_list = malloc(suf_size*sizeof(svccmd_unbind_func_t)); | |
1334 | suf_list_extra = malloc(suf_size*sizeof(void*)); | |
1335 | } | |
1336 | } | |
1337 | suf_list[suf_used] = handler; | |
1338 | suf_list_extra[suf_used++] = extra; | |
1339 | } | |
1340 | ||
1341 | static MODCMD_FUNC(cmd_unbind) { | |
1342 | struct service *service; | |
1343 | struct userNode *bot; | |
1344 | struct svccmd *bound; | |
1345 | struct module *module; | |
1346 | const char *svcname; | |
1347 | unsigned int arg, ii; | |
1348 | char cmdname[MAXLEN]; | |
1349 | ||
1350 | assert(argc > 2); | |
1351 | svcname = argv[1]; | |
1352 | arg = collapse_cmdname(argv+2, argc-2, cmdname) + 2; | |
1353 | if (!arg) { | |
1354 | reply("MSG_MISSING_PARAMS", cmd->name); | |
1355 | return 0; | |
1356 | } | |
1357 | if (!(service = service_find(svcname))) { | |
1358 | reply("MCMSG_UNKNOWN_SERVICE", svcname); | |
1359 | return 0; | |
1360 | } | |
1361 | if (!(bound = dict_find(service->commands, cmdname, NULL))) { | |
1362 | reply("MCMSG_NO_COMMAND_BOUND", service->bot->nick, cmdname); | |
1363 | return 0; | |
1364 | } | |
1365 | if ((bound->command->flags & MODCMD_KEEP_BOUND) && (bound->command->bind_count == 1)) { | |
1366 | reply("MCMSG_UNBIND_PROHIBITED", bound->command->name); | |
1367 | return 0; | |
1368 | } | |
1369 | ||
1370 | for (ii=0; ii<suf_used; ii++) | |
1371 | suf_list[ii](bound, suf_list_extra[ii]); | |
1372 | /* If this command binding is removing itself, we must take care | |
1373 | * not to dereference it after the dict_remove. | |
1374 | */ | |
1375 | bot = cmd->parent->bot; | |
1376 | module = cmd->command->parent; | |
1377 | dict_remove(service->commands, bound->name); | |
1378 | send_message(user, bot, "MCMSG_COMMAND_UNBOUND", cmdname, service->bot->nick); | |
1379 | if (service_recheck_bindings(service, module)) | |
1380 | send_message(user, bot, "MCMSG_HELPFILE_UNBOUND", module->name, module->name); | |
1381 | return 1; | |
1382 | } | |
1383 | ||
1384 | static MODCMD_FUNC(cmd_readhelp) { | |
1385 | const char *modname; | |
1386 | struct module *module; | |
1387 | struct helpfile *old_helpfile; | |
1388 | struct timeval start, stop; | |
1389 | ||
1390 | assert(argc > 1); | |
1391 | modname = argv[1]; | |
1392 | if (!(module = module_find(modname))) { | |
1393 | reply("MSG_MODULE_UNKNOWN", modname); | |
1394 | return 0; | |
1395 | } | |
1396 | if (!module->helpfile_name) { | |
1397 | reply("MCMSG_NO_HELPFILE", module->name); | |
1398 | return 0; | |
1399 | } | |
1400 | old_helpfile = module->helpfile; | |
1401 | gettimeofday(&start, NULL); | |
1402 | module->helpfile = open_helpfile(module->helpfile_name, module->expand_help); | |
1403 | if (!module->helpfile) { | |
1404 | module->helpfile = old_helpfile; | |
1405 | reply("MCMSG_HELPFILE_ERROR", module->helpfile_name); | |
1406 | return 0; | |
1407 | } | |
1408 | if (old_helpfile) close_helpfile(old_helpfile); | |
1409 | gettimeofday(&stop, NULL); | |
1410 | stop.tv_sec -= start.tv_sec; | |
1411 | stop.tv_usec -= start.tv_usec; | |
1412 | if (stop.tv_usec < 0) { | |
1413 | stop.tv_sec -= 1; | |
1414 | stop.tv_usec += 1000000; | |
1415 | } | |
1416 | reply("MCMSG_HELPFILE_READ", module->name, stop.tv_sec, stop.tv_usec/1000); | |
1417 | return 1; | |
1418 | } | |
1419 | ||
1420 | static MODCMD_FUNC(cmd_help) { | |
1421 | const char *topic; | |
1422 | ||
1423 | topic = (argc < 2) ? NULL : unsplit_string(argv+1, argc-1, NULL); | |
1424 | return svccmd_send_help(user, cmd->parent, topic); | |
1425 | } | |
1426 | ||
1427 | static MODCMD_FUNC(cmd_timecmd) { | |
1428 | struct timeval start, stop; | |
1429 | char cmd_text[MAXLEN]; | |
1430 | ||
1431 | unsplit_string(argv+1, argc-1, cmd_text); | |
1432 | gettimeofday(&start, NULL); | |
1433 | svccmd_invoke(user, cmd->parent, channel, cmd_text, 0); | |
1434 | gettimeofday(&stop, NULL); | |
1435 | stop.tv_sec -= start.tv_sec; | |
1436 | stop.tv_usec -= start.tv_usec; | |
1437 | if (stop.tv_usec < 0) { | |
1438 | stop.tv_sec -= 1; | |
1439 | stop.tv_usec += 1000000; | |
1440 | } | |
1441 | reply("MCMSG_COMMAND_TIME", cmd_text, stop.tv_sec, stop.tv_usec); | |
1442 | return 1; | |
1443 | } | |
1444 | ||
1445 | static MODCMD_FUNC(cmd_command) { | |
1446 | struct svccmd *svccmd; | |
1447 | const char *cmd_name, *fmt_str; | |
1448 | unsigned int flags, shown_flags, nn, pos; | |
1449 | char buf[MAXLEN]; | |
1450 | ||
1451 | assert(argc >= 2); | |
1452 | cmd_name = unsplit_string(argv+1, argc-1, NULL); | |
1453 | if (!(svccmd = svccmd_resolve_name(cmd, cmd_name))) { | |
1454 | reply("MCMSG_UNKNOWN_COMMAND_2", cmd_name, cmd->parent->bot->nick); | |
1455 | return 0; | |
1456 | } | |
1457 | pos = snprintf(buf, sizeof(buf), "%s.%s", svccmd->command->parent->name, svccmd->command->name); | |
1458 | if (svccmd->alias.used) { | |
1459 | buf[pos++] = ' '; | |
1460 | unsplit_string((char**)svccmd->alias.list+1, svccmd->alias.used-1, buf+pos); | |
1461 | reply("MCMSG_COMMAND_ALIASES", svccmd->name, buf); | |
1462 | } else { | |
1463 | reply("MCMSG_COMMAND_BINDING", svccmd->name, buf); | |
1464 | } | |
1465 | flags = svccmd->effective_flags; | |
1466 | if ((svccmd->parent && svccmd->parent->privileged && !IsOper(user)) | |
1467 | || ((flags & MODCMD_REQUIRE_STAFF) | |
1468 | && !IsOper(user) && !IsNetworkHelper(user) && !IsSupportHelper(user))) { | |
1469 | reply("MCMSG_INSPECTION_REFUSED", svccmd->name); | |
1470 | return 0; | |
1471 | } | |
1472 | if (flags & MODCMD_DISABLED) { | |
1473 | reply("MSG_COMMAND_DISABLED", svccmd->name); | |
1474 | return 1; | |
1475 | } | |
1476 | shown_flags = 0; | |
1477 | if (svccmd->min_opserv_level > 0) { | |
1478 | reply("MCMSG_NEED_OPSERV_LEVEL", svccmd->min_opserv_level); | |
1479 | shown_flags |= MODCMD_REQUIRE_OPER | MODCMD_REQUIRE_AUTHED; | |
1480 | } | |
1481 | if (svccmd->min_channel_access > 0) { | |
1482 | reply("MCMSG_NEED_CHANSERV_LEVEL", svccmd->min_channel_access); | |
1483 | shown_flags |= MODCMD_REQUIRE_CHANUSER | MODCMD_REQUIRE_REGCHAN | MODCMD_REQUIRE_CHANNEL | MODCMD_REQUIRE_AUTHED; | |
1484 | } | |
1485 | if (svccmd->req_account_flags) { | |
1486 | for (nn=pos=0; nn<32; nn++) { | |
1487 | if (!(svccmd->req_account_flags & (1 << nn))) continue; | |
1488 | buf[pos++] = HANDLE_FLAGS[nn]; | |
1489 | } | |
1490 | buf[pos] = 0; | |
1491 | reply("MCMSG_NEED_ACCOUNT_FLAGS", buf); | |
1492 | shown_flags |= MODCMD_REQUIRE_AUTHED; | |
1493 | } | |
1494 | if (!flags && !shown_flags) { | |
1495 | reply("MCMSG_NEED_NOTHING", svccmd->name); | |
1496 | return 1; | |
1497 | } | |
1498 | if (flags & ~shown_flags & MODCMD_REQUIRE_HELPING) { | |
1499 | reply("MCMSG_MUST_BE_HELPING"); | |
1500 | shown_flags |= MODCMD_REQUIRE_AUTHED | MODCMD_REQUIRE_STAFF; | |
1501 | } | |
1502 | if (flags & ~shown_flags & MODCMD_REQUIRE_STAFF) { | |
1503 | switch (flags & MODCMD_REQUIRE_STAFF) { | |
1504 | default: case MODCMD_REQUIRE_STAFF: | |
1505 | fmt_str = "MCMSG_NEED_STAFF_ACCESS"; | |
1506 | break; | |
1507 | case MODCMD_REQUIRE_OPER: | |
1508 | fmt_str = "MCMSG_NEED_STAFF_OPER"; | |
1509 | break; | |
1510 | case MODCMD_REQUIRE_NETWORK_HELPER: | |
1511 | fmt_str = "MCMSG_NEED_STAFF_NETHELPER"; | |
1512 | break; | |
1513 | case MODCMD_REQUIRE_OPER|MODCMD_REQUIRE_NETWORK_HELPER: | |
1514 | fmt_str = "MCMSG_NEED_STAFF_NETHELPER_OR_OPER"; | |
1515 | break; | |
1516 | case MODCMD_REQUIRE_SUPPORT_HELPER: | |
1517 | fmt_str = "MCMSG_NEED_STAFF_SHELPER"; | |
1518 | break; | |
1519 | case MODCMD_REQUIRE_OPER|MODCMD_REQUIRE_SUPPORT_HELPER: | |
1520 | fmt_str = "MCMSG_NEED_STAFF_SHELPER_OR_OPER"; | |
1521 | break; | |
1522 | case MODCMD_REQUIRE_SUPPORT_HELPER|MODCMD_REQUIRE_NETWORK_HELPER: | |
1523 | fmt_str = "MCMSG_NEED_STAFF_HELPER"; | |
1524 | break; | |
1525 | } | |
1526 | reply(fmt_str); | |
1527 | shown_flags |= MODCMD_REQUIRE_AUTHED | MODCMD_REQUIRE_STAFF; | |
1528 | } | |
1529 | if (flags & ~shown_flags & MODCMD_REQUIRE_JOINABLE) { | |
1530 | reply("MCMSG_NEED_JOINABLE"); | |
1531 | shown_flags |= MODCMD_REQUIRE_CHANUSER; | |
1532 | } | |
1533 | if (flags & ~shown_flags & MODCMD_REQUIRE_CHANUSER) { | |
1534 | if (flags & ~shown_flags & MODCMD_IGNORE_CSUSPEND) | |
1535 | reply("MCMSG_NEED_CHANUSER_CSUSPENDABLE"); | |
1536 | else | |
1537 | reply("MCMSG_NEED_CHANUSER"); | |
1538 | shown_flags |= MODCMD_IGNORE_CSUSPEND | MODCMD_REQUIRE_REGCHAN | MODCMD_REQUIRE_CHANNEL | MODCMD_REQUIRE_AUTHED; | |
1539 | } | |
1540 | if (flags & ~shown_flags & MODCMD_REQUIRE_REGCHAN) { | |
1541 | reply("MCMSG_NEED_REGCHAN"); | |
1542 | shown_flags |= MODCMD_REQUIRE_CHANNEL; | |
1543 | } | |
1544 | if (flags & ~shown_flags & MODCMD_REQUIRE_CHANNEL) | |
1545 | reply("MCMSG_NEED_CHANNEL"); | |
1546 | if (flags & ~shown_flags & MODCMD_REQUIRE_AUTHED) | |
1547 | reply("MCMSG_NEED_AUTHED"); | |
1548 | if (flags & ~shown_flags & MODCMD_TOY) | |
1549 | reply("MCMSG_IS_TOY", svccmd->name); | |
1550 | if (flags & ~shown_flags & MODCMD_REQUIRE_QUALIFIED) { | |
1551 | const char *botnick = svccmd->parent ? svccmd->parent->bot->nick : "SomeBot"; | |
1552 | reply("MCMSG_MUST_QUALIFY", botnick, svccmd->name, botnick); | |
1553 | } | |
1554 | reply("MCMSG_END_REQUIREMENTS", svccmd->name); | |
1555 | return 1; | |
1556 | } | |
1557 | ||
1558 | static void | |
1559 | modcmd_describe_command(struct userNode *user, struct svccmd *cmd, struct svccmd *target) { | |
1560 | char buf1[MAXLEN], buf2[MAXLEN]; | |
1561 | unsigned int ii, len, buf1_used, buf2_used; | |
1562 | ||
1563 | if (target->alias.used) { | |
1564 | unsplit_string((char**)target->alias.list, target->alias.used, buf1); | |
1565 | reply("MCMSG_COMMAND_ALIASES", target->name, buf1); | |
1566 | } else { | |
1567 | snprintf(buf1, sizeof(buf1), "%s.%s", target->command->parent->name, target->command->name); | |
1568 | reply("MCMSG_COMMAND_BINDING", target->name, buf1); | |
1569 | } | |
1570 | for (ii = buf1_used = buf2_used = 0; modcmd_flags[ii].name; ++ii) { | |
1571 | const struct modcmd_flag *flag = &modcmd_flags[ii]; | |
1572 | if (target->flags & flag->flag) { | |
1573 | if (buf1_used) | |
1574 | buf1[buf1_used++] = ','; | |
1575 | len = strlen(flag->name); | |
1576 | memcpy(buf1 + buf1_used, flag->name, len); | |
1577 | buf1_used += len; | |
1578 | } else if (target->effective_flags & flag->flag) { | |
1579 | if (buf2_used) | |
1580 | buf2[buf2_used++] = ','; | |
1581 | len = strlen(flag->name); | |
1582 | memcpy(buf2 + buf2_used, flag->name, len); | |
1583 | buf2_used += len; | |
1584 | } | |
1585 | } | |
1586 | if (buf1_used) | |
1587 | buf1[buf1_used] = '\0'; | |
1588 | else | |
1589 | strcpy(buf1, user_find_message(user, "MSG_NONE")); | |
1590 | if (buf2_used) | |
1591 | buf2[buf2_used] = '\0'; | |
1592 | else | |
1593 | strcpy(buf2, user_find_message(user, "MSG_NONE")); | |
1594 | reply("MCMSG_COMMAND_FLAGS", buf1, buf2); | |
1595 | for (ii = buf1_used = buf2_used = 0; handle_flags[ii]; ++ii) { | |
1596 | if (target->req_account_flags & (1 << ii)) | |
1597 | buf1[buf1_used++] = handle_flags[ii]; | |
1598 | else if (target->deny_account_flags & (1 << ii)) | |
1599 | buf2[buf2_used++] = handle_flags[ii]; | |
1600 | } | |
1601 | buf1[buf1_used] = buf2[buf2_used] = '\0'; | |
1602 | reply("MCMSG_COMMAND_ACCOUNT_FLAGS", buf1, buf2); | |
1603 | reply("MCMSG_COMMAND_ACCESS_LEVEL", target->min_channel_access, target->min_opserv_level); | |
1604 | reply("MCMSG_COMMAND_USES", target->name, target->uses); | |
1605 | } | |
1606 | ||
1607 | static MODCMD_FUNC(cmd_modcmd) { | |
1608 | struct svccmd *svccmd; | |
1609 | unsigned int arg, changed; | |
1610 | char cmdname[MAXLEN]; | |
1611 | ||
1612 | assert(argc >= 2); | |
1613 | arg = collapse_cmdname(argv+1, argc-1, cmdname) + 1; | |
1614 | if (!arg) { | |
1615 | reply("MSG_MISSING_PARAMS", cmd->name); | |
1616 | return 0; | |
1617 | } | |
1618 | if (!(svccmd = svccmd_resolve_name(cmd, cmdname))) { | |
1619 | reply("MCMSG_UNKNOWN_COMMAND_2", cmdname, cmd->parent->bot->nick); | |
1620 | return 0; | |
1621 | } | |
1622 | for (changed = 0; arg+1 < argc; arg += 2) { | |
1623 | if (svccmd_configure(svccmd, user, cmd->parent->bot, argv[arg], argv[arg+1])) { | |
1624 | reply("MCMSG_COMMAND_MODIFIED", argv[arg], svccmd->name); | |
1625 | changed = 1; | |
1626 | } | |
1627 | } | |
1628 | if (changed) | |
1629 | modcmd_set_effective_flags(svccmd); | |
1630 | modcmd_describe_command(user, cmd, svccmd); | |
1631 | return changed; | |
1632 | } | |
1633 | ||
1634 | static void | |
1635 | timeout_god(void *data) | |
1636 | { | |
1637 | extern struct userNode *chanserv; | |
1638 | struct userNode *user = data; | |
1639 | ||
1640 | if(!user || !IsHelping(user)) return; | |
1641 | ||
1642 | HANDLE_CLEAR_FLAG(user->handle_info, HELPING); | |
1643 | send_message(user, chanserv, "MCMSG_GOD_EXPIRED"); | |
1644 | } | |
1645 | ||
1646 | static MODCMD_FUNC(cmd_god) { | |
1647 | int helping; | |
1648 | ||
1649 | if (argc > 1) { | |
1650 | if (enabled_string(argv[1])) { | |
1651 | if (HANDLE_FLAGGED(user->handle_info, HELPING)) { | |
1652 | reply("MCMSG_ALREADY_HELPING"); | |
1653 | return 0; | |
1654 | } | |
1655 | helping = 1; | |
1656 | } else if (disabled_string(argv[1])) { | |
1657 | if (!HANDLE_FLAGGED(user->handle_info, HELPING)) { | |
1658 | reply("MCMSG_ALREADY_NOT_HELPING"); | |
1659 | return 0; | |
1660 | } | |
1661 | helping = 0; | |
1662 | } else { | |
1663 | reply("MSG_INVALID_BINARY", argv[1]); | |
1664 | return 0; | |
1665 | } | |
1666 | } else { | |
1667 | helping = !IsHelping(user); | |
1668 | } | |
1669 | ||
1670 | if (helping) { | |
1671 | HANDLE_SET_FLAG(user->handle_info, HELPING); | |
1672 | timeq_add(now + god_timeout, timeout_god, user); | |
1673 | reply("MCMSG_NOW_HELPING"); | |
1674 | } else { | |
1675 | HANDLE_CLEAR_FLAG(user->handle_info, HELPING); | |
1676 | timeq_del(0, timeout_god, user, TIMEQ_IGNORE_WHEN); | |
1677 | reply("MCMSG_NOW_NOT_HELPING"); | |
1678 | } | |
1679 | ||
1680 | return 1; | |
1681 | } | |
1682 | ||
1683 | static MODCMD_FUNC(cmd_joiner) { | |
1684 | char cmdname[MAXLEN]; | |
1685 | ||
1686 | if (argc < 2) { | |
1687 | int len = sprintf(cmdname, "%s ", cmd->name); | |
1688 | dict_iterator_t it; | |
1689 | struct string_buffer sbuf; | |
1690 | ||
1691 | string_buffer_init(&sbuf); | |
1692 | for (it = dict_first(cmd->parent->commands); it; it = iter_next(it)) { | |
1693 | if (!ircncasecmp(iter_key(it), cmdname, len)) { | |
1694 | if (sbuf.used) string_buffer_append_string(&sbuf, ", "); | |
1695 | string_buffer_append_string(&sbuf, iter_key(it)); | |
1696 | } | |
1697 | } | |
1698 | if (!sbuf.used) string_buffer_append(&sbuf, 0); | |
1699 | reply("MCMSG_JOINER_CHOICES", cmd->name, sbuf.list); | |
1700 | string_buffer_clean(&sbuf); | |
1701 | return 1; | |
1702 | } | |
1703 | sprintf(cmdname, "%s %s", cmd->name, argv[1]); | |
1704 | argv[1] = cmdname; | |
1705 | svccmd_invoke_argv(user, cmd->parent, channel, argc-1, argv+1, 0); | |
1706 | return 0; /* never try to log this; the recursive one logs it */ | |
1707 | } | |
1708 | ||
1709 | static MODCMD_FUNC(cmd_stats_modules) { | |
1710 | struct helpfile_table tbl; | |
1711 | dict_iterator_t it; | |
1712 | unsigned int ii; | |
1713 | struct module *mod; | |
1714 | struct modcmd *modcmd; | |
1715 | ||
1716 | if (argc < 2) { | |
1717 | tbl.length = dict_size(modules) + 1; | |
1718 | tbl.width = 3; | |
1719 | tbl.flags = TABLE_PAD_LEFT; | |
1720 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1721 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1722 | tbl.contents[0][0] = "Module"; | |
1723 | tbl.contents[0][1] = "Commands"; | |
1724 | tbl.contents[0][2] = "Helpfile"; | |
1725 | for (ii=1, it=dict_first(modules); it; it=iter_next(it), ii++) { | |
1726 | mod = iter_data(it); | |
1727 | tbl.contents[ii] = calloc(tbl.width, sizeof(tbl.contents[ii][0])); | |
1728 | tbl.contents[ii][0] = mod->name; | |
1729 | tbl.contents[ii][1] = strtab(dict_size(mod->commands)); | |
1730 | tbl.contents[ii][2] = mod->helpfile_name ? mod->helpfile_name : "(none)"; | |
1731 | } | |
1732 | } else if (!(mod = dict_find(modules, argv[1], NULL))) { | |
1733 | reply("MCMSG_UNKNOWN_MODULE", argv[1]); | |
1734 | return 0; | |
1735 | } else { | |
1736 | reply("MCMSG_MODULE_INFO", mod->name); | |
1737 | tbl.length = dict_size(mod->commands) + 1; | |
1738 | tbl.width = 3; | |
1739 | tbl.flags = TABLE_PAD_LEFT; | |
1740 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1741 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1742 | tbl.contents[0][0] = "Command"; | |
1743 | tbl.contents[0][1] = "Min. Args"; | |
1744 | tbl.contents[0][2] = "Bind Count"; | |
1745 | for (ii=1, it=dict_first(mod->commands); it; it=iter_next(it), ii++) { | |
1746 | modcmd = iter_data(it); | |
1747 | tbl.contents[ii] = calloc(tbl.width, sizeof(tbl.contents[ii][0])); | |
1748 | tbl.contents[ii][0] = modcmd->name; | |
1749 | tbl.contents[ii][1] = strtab(modcmd->min_argc); | |
1750 | tbl.contents[ii][2] = strtab(modcmd->bind_count); | |
1751 | } | |
1752 | } | |
1753 | table_send(cmd->parent->bot, user->nick, 0, 0, tbl); | |
1754 | return 0; | |
1755 | } | |
1756 | ||
1757 | static MODCMD_FUNC(cmd_stats_services) { | |
1758 | struct helpfile_table tbl; | |
1759 | dict_iterator_t it; | |
1760 | unsigned int ii; | |
1761 | struct service *service; | |
1762 | struct svccmd *svccmd; | |
1763 | char *extra; | |
1764 | ||
1765 | if (argc < 2) { | |
1766 | tbl.length = dict_size(services) + 1; | |
1767 | tbl.width = 4; | |
1768 | tbl.flags = TABLE_PAD_LEFT; | |
1769 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1770 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1771 | tbl.contents[0][0] = "Service"; | |
1772 | tbl.contents[0][1] = "Commands"; | |
1773 | tbl.contents[0][2] = "Priv'd?"; | |
1774 | tbl.contents[0][3] = "Trigger"; | |
1775 | extra = calloc(2, tbl.length); | |
1776 | for (ii=1, it=dict_first(services); it; it=iter_next(it), ii++) { | |
1777 | service = iter_data(it); | |
1778 | tbl.contents[ii] = calloc(tbl.width, sizeof(tbl.contents[ii][0])); | |
1779 | tbl.contents[ii][0] = service->bot->nick; | |
1780 | tbl.contents[ii][1] = strtab(dict_size(service->commands)); | |
1781 | tbl.contents[ii][2] = service->privileged ? "yes" : "no"; | |
1782 | extra[ii*2] = service->trigger; | |
1783 | tbl.contents[ii][3] = extra+ii*2; | |
1784 | } | |
1785 | table_send(cmd->parent->bot, user->nick, 0, 0, tbl); | |
1786 | free(extra); | |
1787 | return 0; | |
1788 | } else if (!(service = dict_find(services, argv[1], NULL))) { | |
1789 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1790 | return 0; | |
1791 | } else { | |
1792 | tbl.length = dict_size(service->commands) + 1; | |
1793 | tbl.width = 5; | |
1794 | tbl.flags = TABLE_PAD_LEFT | TABLE_NO_FREE; | |
1795 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1796 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1797 | tbl.contents[0][0] = "Command"; | |
1798 | tbl.contents[0][1] = "Module"; | |
1799 | tbl.contents[0][2] = "ModCmd"; | |
1800 | tbl.contents[0][3] = "Alias?"; | |
1801 | tbl.contents[0][4] = strdup("Uses"); | |
1802 | for (ii=1, it=dict_first(service->commands); it; it=iter_next(it), ii++) { | |
1803 | svccmd = iter_data(it); | |
1804 | tbl.contents[ii] = calloc(tbl.width, sizeof(tbl.contents[ii][0])); | |
1805 | tbl.contents[ii][0] = svccmd->name; | |
1806 | tbl.contents[ii][1] = svccmd->command->parent->name; | |
1807 | tbl.contents[ii][2] = svccmd->command->name; | |
1808 | tbl.contents[ii][3] = svccmd->alias.used ? "yes" : "no"; | |
1809 | tbl.contents[ii][4] = extra = malloc(12); | |
1810 | sprintf(extra, "%u", svccmd->uses); | |
1811 | } | |
1812 | reply("MCMSG_SERVICE_INFO", service->bot->nick); | |
1813 | table_send(cmd->parent->bot, user->nick, 0, 0, tbl); | |
1814 | for (ii=0; ii<tbl.length; ii++) { | |
1815 | free((char*)tbl.contents[ii][4]); | |
1816 | free(tbl.contents[ii]); | |
1817 | } | |
1818 | free(tbl.contents); | |
1819 | return 0; | |
1820 | } | |
1821 | } | |
1822 | ||
1823 | static MODCMD_FUNC(cmd_showcommands) { | |
1824 | struct svccmd_list commands; | |
1825 | struct helpfile_table tbl; | |
1826 | struct svccmd *svccmd; | |
1827 | dict_iterator_t it; | |
1828 | unsigned int ii, ignore_flags = 0; | |
1829 | unsigned int max_opserv_level = 1000; | |
1830 | unsigned short max_chanserv_level = 500; | |
1831 | char show_opserv_level = 0, show_channel_access = 0; | |
1832 | ||
1833 | /* Check to see what the max access they want to see is. */ | |
1834 | for (ii=1; ii<argc; ++ii) { | |
1835 | if (isdigit(argv[ii][0])) | |
1836 | max_opserv_level = atoi(argv[ii]); | |
1837 | else | |
1838 | max_chanserv_level = user_level_from_name(argv[ii], UL_OWNER); | |
1839 | } | |
1840 | ||
1841 | /* Find the matching commands. */ | |
1842 | svccmd_list_init(&commands); | |
1843 | if (cmd->parent->privileged) | |
1844 | ignore_flags = MODCMD_REQUIRE_OPER; | |
1845 | for (it = dict_first(cmd->parent->commands); it; it = iter_next(it)) { | |
1846 | svccmd = iter_data(it); | |
1847 | if (strchr(svccmd->name, ' ')) | |
1848 | continue; | |
1849 | if (!svccmd_can_invoke(user, svccmd->parent->bot, svccmd, channel, SVCCMD_QUALIFIED)) | |
1850 | continue; | |
1851 | if (svccmd->min_opserv_level > max_opserv_level) | |
1852 | continue; | |
1853 | if (svccmd->min_channel_access > max_chanserv_level) | |
1854 | continue; | |
1855 | if (svccmd->min_opserv_level > 0) | |
1856 | show_opserv_level = 1; | |
1857 | if (svccmd->min_channel_access > 0) | |
1858 | show_channel_access = 1; | |
1859 | if (svccmd->effective_flags | |
1860 | & (MODCMD_REQUIRE_STAFF|MODCMD_REQUIRE_HELPING) | |
1861 | & ~ignore_flags) { | |
1862 | show_channel_access = 1; | |
1863 | } | |
1864 | svccmd_list_append(&commands, svccmd); | |
1865 | } | |
1866 | ||
1867 | /* Build the table. */ | |
1868 | tbl.length = commands.used + 1; | |
1869 | tbl.width = 1 + show_opserv_level + show_channel_access; | |
1870 | tbl.flags = TABLE_REPEAT_ROWS; | |
1871 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1872 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1873 | tbl.contents[0][ii = 0] = "Command"; | |
1874 | if (show_opserv_level) | |
1875 | tbl.contents[0][++ii] = "OpServ Level"; | |
1876 | if (show_channel_access) | |
1877 | tbl.contents[0][++ii] = "ChanServ Access"; | |
1878 | for (ii=0; ii<commands.used; ++ii) { | |
1879 | svccmd = commands.list[ii]; | |
1880 | tbl.contents[ii+1] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1881 | tbl.contents[ii+1][0] = svccmd->name; | |
1882 | if (show_opserv_level) | |
1883 | tbl.contents[ii+1][1] = strtab(svccmd->min_opserv_level); | |
1884 | if (show_channel_access) { | |
1885 | const char *access_name; | |
1886 | int flags = svccmd->effective_flags; | |
1887 | if (flags & MODCMD_REQUIRE_HELPING) | |
1888 | access_name = "helping"; | |
1889 | else if (flags & MODCMD_REQUIRE_STAFF) { | |
1890 | if (flags & MODCMD_REQUIRE_OPER) | |
1891 | access_name = "oper"; | |
1892 | else if (flags & MODCMD_REQUIRE_NETWORK_HELPER) | |
1893 | access_name = "net.helper"; | |
1894 | else | |
1895 | access_name = "staff"; | |
1896 | } else | |
1897 | access_name = strtab(svccmd->min_channel_access); | |
1898 | tbl.contents[ii+1][1+show_opserv_level] = access_name; | |
1899 | } | |
1900 | } | |
1901 | svccmd_list_clean(&commands); | |
1902 | table_send(cmd->parent->bot, user->nick, 0, 0, tbl); | |
1903 | return 0; | |
1904 | } | |
1905 | ||
1906 | static MODCMD_FUNC(cmd_helpfiles) { | |
1907 | struct service *service; | |
1908 | unsigned int ii; | |
1909 | ||
1910 | if (!(service = dict_find(services, argv[1], NULL))) { | |
1911 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1912 | return 0; | |
1913 | } | |
1914 | ||
1915 | if (argc < 3) { | |
1916 | for (ii=0; ii<service->modules.used; ++ii) | |
1917 | reply("MCMSG_HELPFILE_SEQUENCE", ii+1, service->modules.list[ii]->name); | |
1918 | return 0; | |
1919 | } | |
1920 | ||
1921 | service->modules.used = 0; | |
1922 | for (ii=0; ii<argc-2; ii++) { | |
1923 | struct module *module = dict_find(modules, argv[ii+2], NULL); | |
1924 | if (!module) { | |
1925 | reply("MCMSG_UNKNOWN_MODULE", argv[ii+2]); | |
1926 | continue; | |
1927 | } | |
1928 | module_list_append(&service->modules, module); | |
1929 | } | |
1930 | reply("MCMSG_HELPFILE_SEQUENCE_SET", service->bot->nick); | |
1931 | return 1; | |
1932 | } | |
1933 | ||
1934 | static MODCMD_FUNC(cmd_service_add) { | |
1935 | const char *nick, *hostname, *desc; | |
1936 | struct userNode *bot; | |
1937 | ||
1938 | nick = argv[1]; | |
1939 | if (!is_valid_nick(nick)) { | |
1940 | reply("MCMSG_BAD_SERVICE_NICK", nick); | |
1941 | return 0; | |
1942 | } | |
1943 | hostname = argv[2]; | |
1944 | desc = unsplit_string(argv+3, argc-3, NULL); | |
1945 | bot = GetUserH(nick); | |
1946 | if (bot && IsService(bot)) { | |
1947 | reply("MCMSG_ALREADY_SERVICE", bot->nick); | |
1948 | return 0; | |
1949 | } | |
1950 | bot = AddLocalUser(nick, nick, hostname, desc, NULL); | |
1951 | service_register(bot); | |
1952 | reply("MCMSG_NEW_SERVICE", bot->nick); | |
1953 | return 1; | |
1954 | } | |
1955 | ||
1956 | static MODCMD_FUNC(cmd_service_rename) { | |
1957 | struct service *service; | |
1958 | ||
1959 | if (!(service = service_find(argv[1]))) { | |
1960 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1961 | return 0; | |
1962 | } | |
1963 | NickChange(service->bot, argv[2], 0); | |
1964 | reply("MCMSG_SERVICE_RENAMED", service->bot->nick); | |
1965 | return 1; | |
1966 | } | |
1967 | ||
1968 | static MODCMD_FUNC(cmd_service_trigger) { | |
1969 | struct userNode *bogon; | |
1970 | struct service *service; | |
1971 | ||
1972 | if (!(service = service_find(argv[1]))) { | |
1973 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1974 | return 0; | |
1975 | } | |
1976 | if (argc < 3) { | |
1977 | if (service->trigger) | |
1978 | reply("MCMSG_CURRENT_TRIGGER", service->bot->nick, service->trigger); | |
1979 | else | |
1980 | reply("MCMSG_NO_TRIGGER", service->bot->nick); | |
1981 | return 1; | |
1982 | } | |
1983 | if (service->trigger) | |
1984 | reg_chanmsg_func(service->trigger, NULL, NULL, NULL); | |
1985 | if (!irccasecmp(argv[2], "none") || !irccasecmp(argv[2], "remove")) { | |
1986 | service->trigger = 0; | |
1987 | reply("MCMSG_REMOVED_TRIGGER", service->bot->nick); | |
1988 | } else if ((bogon = get_chanmsg_bot(argv[2][0]))) { | |
1989 | reply("MCMSG_DUPLICATE_TRIGGER", bogon->nick, argv[2][0]); | |
1990 | return 1; | |
1991 | } else { | |
1992 | service->trigger = argv[2][0]; | |
1993 | reg_chanmsg_func(service->trigger, service->bot, modcmd_chanmsg, NULL); | |
1994 | reply("MCMSG_NEW_TRIGGER", service->bot->nick, service->trigger); | |
1995 | } | |
1996 | return 1; | |
1997 | } | |
1998 | ||
1999 | static MODCMD_FUNC(cmd_service_privileged) { | |
2000 | struct service *service; | |
2001 | const char *newval; | |
2002 | ||
2003 | if (!(service = service_find(argv[1]))) { | |
2004 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
2005 | return 0; | |
2006 | } | |
2007 | if (argc >= 3) | |
2008 | service->privileged = true_string(argv[2]) || enabled_string(argv[2]); | |
2009 | newval = user_find_message(user, service->privileged ? "MSG_ON" : "MSG_OFF"); | |
2010 | reply("MCMSG_SERVICE_PRIVILEGED", service->bot->nick, newval); | |
2011 | return 1; | |
2012 | } | |
2013 | ||
2014 | static MODCMD_FUNC(cmd_service_remove) { | |
2015 | char *name, *reason; | |
2016 | struct service *service; | |
2017 | ||
2018 | name = argv[1]; | |
2019 | if (argc > 2) | |
2020 | reason = unsplit_string(argv+2, argc-2, NULL); | |
2021 | else | |
2022 | reason = "Removing bot"; | |
2023 | if (!(service = service_find(name))) { | |
2024 | reply("MCMSG_UNKNOWN_SERVICE", name); | |
2025 | return 0; | |
2026 | } | |
2027 | DelUser(service->bot, NULL, 1, reason); | |
2028 | reply("MCMSG_SERVICE_REMOVED", name); | |
2029 | dict_remove(services, name); | |
2030 | return 1; | |
2031 | } | |
2032 | ||
2033 | static MODCMD_FUNC(cmd_dump_messages) { | |
2034 | const char *fname = "strings.db"; | |
2035 | struct saxdb_context *ctx; | |
2036 | dict_iterator_t it; | |
2037 | FILE *pf; | |
2038 | int res; | |
2039 | ||
2040 | if (!(pf = fopen(fname, "w"))) { | |
2041 | reply("MCMSG_FILE_NOT_OPENED", fname); | |
2042 | return 0; | |
2043 | } | |
2044 | if (!(ctx = saxdb_open_context(pf))) { | |
2045 | reply("MSG_INTERNAL_FAILURE"); | |
2046 | return 0; | |
2047 | } | |
2048 | ||
2049 | if ((res = setjmp(*saxdb_jmp_buf(ctx))) != 0) { | |
2050 | saxdb_close_context(ctx, 1); | |
2051 | reply("MCMSG_MESSAGE_DUMP_FAILED", strerror(res)); | |
2052 | return 0; | |
2053 | } else { | |
2054 | for (it = dict_first(lang_C->messages); it; it = iter_next(it)) | |
2055 | saxdb_write_string(ctx, iter_key(it), iter_data(it)); | |
2056 | saxdb_close_context(ctx, 1); | |
2057 | reply("MCMSG_MESSAGES_DUMPED", fname); | |
2058 | return 1; | |
2059 | } | |
2060 | } | |
2061 | ||
2062 | static MODCMD_FUNC(cmd_version) { | |
2063 | send_message_type(4, user, cmd->parent->bot, "$b"PACKAGE_STRING"+[%s]$b (Based on srvx 1.3.x), Built: "__DATE__", "__TIME__".", cvs_version); | |
2064 | send_message_type(4, user, cmd->parent->bot, "See $bCREDITS$b for more information."); | |
2065 | return 1; | |
2066 | } | |
2067 | ||
2068 | /* This function provides copyright management information to end | |
2069 | * users of X3. You should not alter, disable or remove this | |
2070 | * command or its accessibility to normal IRC users, except to add | |
2071 | * copyright information pertaining to changes you make to X3. | |
2072 | */ | |
2073 | static MODCMD_FUNC(cmd_credits) { | |
2074 | send_message_type(4, user, cmd->parent->bot, "$b"PACKAGE"$b is based on srvx"); | |
2075 | send_message_type(4, user, cmd->parent->bot, "Copyright 2000-2007 srvx Development Team."); | |
2076 | send_message_type(4, user, cmd->parent->bot, "Copyright 2004-2007 X3 Development Team."); | |
2077 | send_message_type(4, user, cmd->parent->bot, "This software is OSI Certified Open Source Software."); | |
2078 | send_message_type(4, user, cmd->parent->bot, "OSI Certified is a certification mark of the Open Source Initiative."); | |
2079 | send_message_type(4, user, cmd->parent->bot, "$b$b"); | |
2080 | send_message_type(4, user, cmd->parent->bot, "The srvx 1.3.x Development Team includes Paul Chang, Adrian Dewhurst, Miles Peterson, Michael Poole and others."); | |
2081 | send_message_type(4, user, cmd->parent->bot, "The X3 Development Team includes Alex Schumann, Reed Loden, Neil Spierling."); | |
2082 | send_message_type(4, user, cmd->parent->bot, "The X3 Development Team can be reached at http://evilnet.sourceforge.net or in #evilnet on irc.afternet.org."); | |
2083 | send_message_type(4, user, cmd->parent->bot, "$b$b"); | |
2084 | send_message_type(4, user, cmd->parent->bot, "Thanks goes to ThiefMaster, Joe Hansche (joeatrr), Martijn Smit (wasted), and to any other people who have contributed to X3."); | |
2085 | send_message_type(4, user, cmd->parent->bot, "This program is free software; see COPYING in the distribution files."); | |
2086 | ||
2087 | return 1; | |
2088 | } | |
2089 | ||
2090 | static void create_default_binds(int rebind); | |
2091 | ||
2092 | static MODCMD_FUNC(cmd_rebindall) { | |
2093 | send_message_type(4, user, cmd->parent->bot, "$bRe-binding all default commands to respective services..$b"); | |
2094 | create_default_binds(1); | |
2095 | return 1; | |
2096 | } | |
2097 | ||
2098 | static MODCMD_FUNC(cmd_tell) { | |
2099 | struct userNode *target; | |
2100 | char *msg; | |
2101 | ||
2102 | target = GetUserH(argv[1]); | |
2103 | msg = unsplit_string(argv + 2, argc - 2, NULL); | |
2104 | if (!target) { | |
2105 | reply("MSG_NOT_TARGET_NAME"); | |
2106 | return 0; | |
2107 | } | |
2108 | send_message_type(MSG_TYPE_NOXLATE, target, cmd->parent->bot, "%s", msg); | |
2109 | return 1; | |
2110 | } | |
2111 | ||
2112 | void | |
2113 | modcmd_nick_change(struct userNode *user, const char *old_nick, UNUSED_ARG(void *extra)) { | |
2114 | struct service *svc; | |
2115 | if (!(svc = dict_find(services, old_nick, NULL))) | |
2116 | return; | |
2117 | dict_remove2(services, old_nick, 1); | |
2118 | dict_insert(services, user->nick, svc); | |
2119 | } | |
2120 | ||
2121 | void | |
2122 | modcmd_cleanup(UNUSED_ARG(void* extra)) { | |
2123 | dict_delete(services); | |
2124 | dict_delete(modules); | |
2125 | if (suf_list) | |
2126 | free(suf_list); | |
2127 | if (suf_list_extra) | |
2128 | free(suf_list_extra); | |
2129 | } | |
2130 | ||
2131 | static void | |
2132 | modcmd_saxdb_write_command(struct saxdb_context *ctx, struct svccmd *cmd) { | |
2133 | char buf[MAXLEN]; | |
2134 | unsigned int nn, len, pos; | |
2135 | struct svccmd *template = cmd->command->defaults; | |
2136 | ||
2137 | saxdb_start_record(ctx, cmd->name, 0); | |
2138 | sprintf(buf, "%s.%s", cmd->command->parent->name, cmd->command->name); | |
2139 | saxdb_write_string(ctx, "command", buf); | |
2140 | if (cmd->alias.used) | |
2141 | saxdb_write_string_list(ctx, "aliased", &cmd->alias); | |
2142 | if (cmd->min_opserv_level != template->min_opserv_level) | |
2143 | saxdb_write_int(ctx, "oper_access", cmd->min_opserv_level); | |
2144 | if (cmd->min_channel_access != template->min_channel_access) | |
2145 | saxdb_write_int(ctx, "channel_access", cmd->min_channel_access); | |
2146 | if (cmd->flags != template->flags) { | |
2147 | if (cmd->flags) { | |
2148 | for (nn=pos=0; modcmd_flags[nn].name; ++nn) { | |
2149 | const struct modcmd_flag *flag = &modcmd_flags[nn]; | |
2150 | if (cmd->flags & flag->flag) { | |
2151 | buf[pos++] = '+'; | |
2152 | len = strlen(flag->name); | |
2153 | memcpy(buf+pos, flag->name, len); | |
2154 | pos += len; | |
2155 | buf[pos++] = ','; | |
2156 | } | |
2157 | } | |
2158 | } else { | |
2159 | pos = 1; | |
2160 | } | |
2161 | buf[--pos] = 0; | |
2162 | saxdb_write_string(ctx, "flags", buf); | |
2163 | } | |
2164 | if ((cmd->req_account_flags != template->req_account_flags) | |
2165 | || (cmd->deny_account_flags != template->req_account_flags)) { | |
2166 | pos = 0; | |
2167 | if (cmd->req_account_flags) { | |
2168 | buf[pos++] = '+'; | |
2169 | for (nn=0; nn<32; nn++) | |
2170 | if (cmd->req_account_flags & (1 << nn)) | |
2171 | buf[pos++] = handle_flags[nn]; | |
2172 | } | |
2173 | if (cmd->deny_account_flags) { | |
2174 | buf[pos++] = '-'; | |
2175 | for (nn=0; nn<32; nn++) | |
2176 | if (cmd->deny_account_flags & (1 << nn)) | |
2177 | buf[pos++] = handle_flags[nn]; | |
2178 | } | |
2179 | buf[pos] = 0; | |
2180 | saxdb_write_string(ctx, "account_flags", buf); | |
2181 | } | |
2182 | saxdb_end_record(ctx); | |
2183 | } | |
2184 | ||
2185 | static int | |
2186 | modcmd_saxdb_write(struct saxdb_context *ctx) { | |
2187 | struct string_list slist; | |
2188 | dict_iterator_t it, it2; | |
2189 | struct service *service; | |
2190 | unsigned int ii; | |
2191 | ||
2192 | saxdb_start_record(ctx, "bots", 1); | |
2193 | for (it = dict_first(services); it; it = iter_next(it)) { | |
2194 | char buff[16]; | |
2195 | char modes[32]; | |
2196 | ||
2197 | service = iter_data(it); | |
2198 | saxdb_start_record(ctx, service->bot->nick, 1); | |
2199 | if (service->trigger) { | |
2200 | buff[0] = service->trigger; | |
2201 | buff[1] = '\0'; | |
2202 | saxdb_write_string(ctx, "trigger", buff); | |
2203 | } | |
2204 | saxdb_write_string(ctx, "description", service->bot->info); | |
2205 | saxdb_write_string(ctx, "hostname", service->bot->hostname); | |
2206 | if (service->bot->modes) { | |
2207 | irc_user_modes(service->bot, modes, sizeof(modes)); | |
2208 | saxdb_write_string(ctx, "modes", modes); | |
2209 | } | |
2210 | if (service->privileged) | |
2211 | saxdb_write_string(ctx, "privileged", "1"); | |
2212 | saxdb_end_record(ctx); | |
2213 | } | |
2214 | saxdb_end_record(ctx); | |
2215 | ||
2216 | saxdb_start_record(ctx, "services", 1); | |
2217 | for (it = dict_first(services); it; it = iter_next(it)) { | |
2218 | service = iter_data(it); | |
2219 | saxdb_start_record(ctx, service->bot->nick, 1); | |
2220 | for (it2 = dict_first(service->commands); it2; it2 = iter_next(it2)) | |
2221 | modcmd_saxdb_write_command(ctx, iter_data(it2)); | |
2222 | saxdb_end_record(ctx); | |
2223 | } | |
2224 | saxdb_end_record(ctx); | |
2225 | ||
2226 | saxdb_start_record(ctx, "helpfiles", 1); | |
2227 | slist.size = 0; | |
2228 | for (it = dict_first(services); it; it = iter_next(it)) { | |
2229 | service = iter_data(it); | |
2230 | slist.used = 0; | |
2231 | for (ii = 0; ii < service->modules.used; ++ii) | |
2232 | string_list_append(&slist, service->modules.list[ii]->name); | |
2233 | saxdb_write_string_list(ctx, iter_key(it), &slist); | |
2234 | } | |
2235 | if (slist.list) | |
2236 | free(slist.list); | |
2237 | saxdb_end_record(ctx); | |
2238 | ||
2239 | return 0; | |
2240 | } | |
2241 | ||
2242 | static int | |
2243 | append_entry(const char *key, UNUSED_ARG(void *data), void *extra) { | |
2244 | struct helpfile_expansion *exp = extra; | |
2245 | int row = exp->value.table.length++; | |
2246 | exp->value.table.contents[row] = calloc(1, sizeof(char*)); | |
2247 | exp->value.table.contents[row][0] = key; | |
2248 | return 0; | |
2249 | } | |
2250 | ||
2251 | static struct helpfile_expansion | |
2252 | modcmd_expand(const char *variable) { | |
2253 | struct helpfile_expansion exp; | |
2254 | extern struct userNode *message_source; | |
2255 | struct service *service; | |
2256 | ||
2257 | service = dict_find(services, message_source->nick, NULL); | |
2258 | if (!irccasecmp(variable, "index")) { | |
2259 | exp.type = HF_TABLE; | |
2260 | exp.value.table.length = 1; | |
2261 | exp.value.table.width = 1; | |
2262 | exp.value.table.flags = TABLE_REPEAT_ROWS | TABLE_NO_HEADERS; | |
2263 | exp.value.table.contents = calloc(dict_size(service->commands)+1, sizeof(char**)); | |
2264 | exp.value.table.contents[0] = calloc(1, sizeof(char*)); | |
2265 | exp.value.table.contents[0][0] = "Commands"; | |
2266 | dict_foreach(service->commands, append_entry, &exp); | |
2267 | return exp; | |
2268 | } else if (!irccasecmp(variable, "languages")) { | |
2269 | struct string_buffer sbuf; | |
2270 | dict_iterator_t it; | |
2271 | sbuf.used = sbuf.size = 0; | |
2272 | sbuf.list = NULL; | |
2273 | for (it = dict_first(languages); it; it = iter_next(it)) { | |
2274 | string_buffer_append_string(&sbuf, iter_key(it)); | |
2275 | string_buffer_append(&sbuf, ' '); | |
2276 | } | |
2277 | sbuf.list[--sbuf.used] = 0; | |
2278 | exp.type = HF_STRING; | |
2279 | exp.value.str = sbuf.list; | |
2280 | return exp; | |
2281 | } | |
2282 | exp.type = HF_STRING; | |
2283 | exp.value.str = NULL; | |
2284 | return exp; | |
2285 | } | |
2286 | ||
2287 | static void | |
2288 | modcmd_load_bots(struct dict *db, int default_nick) { | |
2289 | dict_iterator_t it; | |
2290 | ||
2291 | for (it = dict_first(db); it; it = iter_next(it)) { | |
2292 | struct record_data *rd; | |
2293 | struct service *svc; | |
2294 | const char *nick, *desc, *hostname, *modes; | |
2295 | ||
2296 | rd = iter_data(it); | |
2297 | if (rd->type != RECDB_OBJECT) { | |
2298 | log_module(MAIN_LOG, LOG_ERROR, "Bad type for 'bots/%s' in modcmd db (expected object).", iter_key(it)); | |
2299 | continue; | |
2300 | } | |
2301 | nick = database_get_data(rd->d.object, "nick", RECDB_QSTRING); | |
2302 | if (!nick) { | |
2303 | if (default_nick) | |
2304 | nick = iter_key(it); | |
2305 | else | |
2306 | continue; | |
2307 | } | |
2308 | svc = service_find(nick); | |
2309 | desc = database_get_data(rd->d.object, "description", RECDB_QSTRING); | |
2310 | hostname = database_get_data(rd->d.object, "hostname", RECDB_QSTRING); | |
2311 | modes = database_get_data(rd->d.object, "modes", RECDB_QSTRING); | |
2312 | if (desc) { | |
2313 | if (!svc) | |
2314 | svc = service_register(AddLocalUser(nick, nick, hostname, desc, modes)); | |
2315 | else if (hostname) | |
2316 | strcpy(svc->bot->hostname, hostname); | |
2317 | desc = database_get_data(rd->d.object, "trigger", RECDB_QSTRING); | |
2318 | if (desc) | |
2319 | svc->trigger = desc[0]; | |
2320 | desc = database_get_data(rd->d.object, "privileged", RECDB_QSTRING); | |
2321 | if (desc && (true_string(desc) || enabled_string(desc))) | |
2322 | svc->privileged = 1; | |
2323 | } | |
2324 | } | |
2325 | } | |
2326 | ||
2327 | static void | |
2328 | modcmd_conf_read(void) { | |
2329 | modcmd_load_bots(conf_get_data("services", RECDB_OBJECT), 0); | |
2330 | } | |
2331 | ||
2332 | void | |
2333 | modcmd_init(void) { | |
2334 | qsort(modcmd_flags, ArrayLength(modcmd_flags)-1, sizeof(modcmd_flags[0]), flags_qsort); | |
2335 | modules = dict_new(); | |
2336 | dict_set_free_data(modules, free_module); | |
2337 | services = dict_new(); | |
2338 | dict_set_free_data(services, free_service); | |
2339 | reg_nick_change_func(modcmd_nick_change, NULL); | |
2340 | reg_exit_func(modcmd_cleanup, NULL); | |
2341 | conf_register_reload(modcmd_conf_read); | |
2342 | ||
2343 | modcmd_module = module_register("modcmd", MAIN_LOG, "modcmd.help", modcmd_expand); | |
2344 | bind_command = modcmd_register(modcmd_module, "bind", cmd_bind, 4, MODCMD_KEEP_BOUND, "oper_level", "800", NULL); | |
2345 | help_command = modcmd_register(modcmd_module, "help", cmd_help, 1, 0, "flags", "+nolog", NULL); | |
2346 | modcmd_register(modcmd_module, "command", cmd_command, 2, 0, "flags", "+nolog", NULL); | |
2347 | modcmd_register(modcmd_module, "modcmd", cmd_modcmd, 2, MODCMD_KEEP_BOUND, "template", "bind", NULL); | |
2348 | modcmd_register(modcmd_module, "god", cmd_god, 0, MODCMD_REQUIRE_AUTHED, "flags", "+oper,+networkhelper", NULL); | |
2349 | modcmd_register(modcmd_module, "readhelp", cmd_readhelp, 2, 0, "oper_level", "650", NULL); | |
2350 | modcmd_register(modcmd_module, "timecmd", cmd_timecmd, 2, 0, "oper_level", "1", NULL); | |
2351 | modcmd_register(modcmd_module, "unbind", cmd_unbind, 3, 0, "template", "bind", NULL); | |
2352 | modcmd_register(modcmd_module, "joiner", cmd_joiner, 1, 0, NULL); | |
2353 | modcmd_register(modcmd_module, "stats modules", cmd_stats_modules, 1, 0, "flags", "+oper", NULL); | |
2354 | modcmd_register(modcmd_module, "stats services", cmd_stats_services, 1, 0, "flags", "+oper", NULL); | |
2355 | modcmd_register(modcmd_module, "showcommands", cmd_showcommands, 1, 0, "flags", "+acceptchan", NULL); | |
2356 | modcmd_register(modcmd_module, "helpfiles", cmd_helpfiles, 2, 0, "template", "bind", NULL); | |
2357 | modcmd_register(modcmd_module, "service add", cmd_service_add, 4, 0, "flags", "+oper", NULL); | |
2358 | modcmd_register(modcmd_module, "service rename", cmd_service_rename, 3, 0, "flags", "+oper", NULL); | |
2359 | modcmd_register(modcmd_module, "service trigger", cmd_service_trigger, 2, 0, "flags", "+oper", NULL); | |
2360 | modcmd_register(modcmd_module, "service privileged", cmd_service_privileged, 2, 0, "flags", "+oper", NULL); | |
2361 | modcmd_register(modcmd_module, "service remove", cmd_service_remove, 2, 0, "flags", "+oper", NULL); | |
2362 | modcmd_register(modcmd_module, "dumpmessages", cmd_dump_messages, 1, 0, "oper_level", "1000", NULL); | |
2363 | modcmd_register(modcmd_module, "tell", cmd_tell, 3, 0, "flags", "+oper", NULL); | |
2364 | modcmd_register(modcmd_module, "rebindall", cmd_rebindall, 0, MODCMD_KEEP_BOUND, "oper_level", "800", NULL); | |
2365 | version_command = modcmd_register(modcmd_module, "version", cmd_version, 1, 0, NULL); | |
2366 | credits_command = modcmd_register(modcmd_module, "credits", cmd_credits, 1, 0, NULL); | |
2367 | message_register_table(msgtab); | |
2368 | ||
2369 | } | |
2370 | ||
2371 | static void | |
2372 | modcmd_db_load_command(struct service *service, const char *cmdname, struct dict *obj) { | |
2373 | struct svccmd *svccmd; | |
2374 | struct module *module; | |
2375 | struct modcmd *modcmd; | |
2376 | struct string_list *slist; | |
2377 | const char *str, *sep; | |
2378 | char buf[MAXLEN]; | |
2379 | ||
2380 | str = database_get_data(obj, "command", RECDB_QSTRING); | |
2381 | if (!str) { | |
2382 | log_module(MAIN_LOG, LOG_ERROR, "Missing command for service %s command %s in modcmd.db", service->bot->nick, cmdname); | |
2383 | return; | |
2384 | } | |
2385 | sep = strchr(str, '.'); | |
2386 | if (!sep) { | |
2387 | log_module(MAIN_LOG, LOG_ERROR, "Invalid command %s for service %s command %s in modcmd.db", str, service->bot->nick, cmdname); | |
2388 | return; | |
2389 | } | |
2390 | memcpy(buf, str, sep-str); | |
2391 | buf[sep-str] = 0; | |
2392 | if (!(module = module_find(buf))) { | |
2393 | log_module(MAIN_LOG, LOG_ERROR, "Unknown module %s for service %s command %s in modcmd.db", buf, service->bot->nick, cmdname); | |
2394 | return; | |
2395 | } | |
2396 | if (!(modcmd = dict_find(module->commands, sep+1, NULL))) { | |
2397 | log_module(MAIN_LOG, LOG_ERROR, "Unknown command %s in module %s for service %s command %s", sep+1, module->name, service->bot->nick, cmdname); | |
2398 | return; | |
2399 | } | |
2400 | /* Now that we know we have a command to use, fill in the basics. */ | |
2401 | svccmd = calloc(1, sizeof(*svccmd)); | |
2402 | svccmd_insert(service, strdup(cmdname), svccmd, modcmd); | |
2403 | if ((str = database_get_data(obj, "template", RECDB_QSTRING))) { | |
2404 | add_pending_template(svccmd, str); | |
2405 | } else { | |
2406 | svccmd_copy_rules(svccmd, modcmd->defaults); | |
2407 | } | |
2408 | if ((str = database_get_data(obj, "account_flags", RECDB_QSTRING))) { | |
2409 | svccmd->req_account_flags = svccmd->deny_account_flags = 0; | |
2410 | svccmd_configure(svccmd, NULL, service->bot, "account_flags", str); | |
2411 | } | |
2412 | if ((str = database_get_data(obj, "flags", RECDB_QSTRING))) { | |
2413 | svccmd->flags = 0; | |
2414 | svccmd_configure(svccmd, NULL, service->bot, "flags", str); | |
2415 | } | |
2416 | if ((str = database_get_data(obj, "oper_access", RECDB_QSTRING)) | |
2417 | || (str = database_get_data(obj, "opserv_level", RECDB_QSTRING))) { | |
2418 | svccmd_configure(svccmd, NULL, service->bot, "oper_access", str); | |
2419 | } | |
2420 | if ((str = database_get_data(obj, "channel_access", RECDB_QSTRING)) | |
2421 | || (str = database_get_data(obj, "chanserv_level", RECDB_QSTRING))) { | |
2422 | svccmd_configure(svccmd, NULL, service->bot, "channel_access", str); | |
2423 | } | |
2424 | if ((slist = database_get_data(obj, "aliased", RECDB_STRING_LIST))) { | |
2425 | unsigned int nn; | |
2426 | svccmd->alias.used = svccmd->alias.size = slist->used; | |
2427 | svccmd->alias.list = calloc(svccmd->alias.size, sizeof(svccmd->alias.list[0])); | |
2428 | for (nn=0; nn<slist->used; ++nn) | |
2429 | svccmd->alias.list[nn] = strdup(slist->list[nn]); | |
2430 | } | |
2431 | modcmd_set_effective_flags(svccmd); | |
2432 | } | |
2433 | ||
2434 | static struct svccmd * | |
2435 | service_make_alias(struct service *service, const char *alias, ...) { | |
2436 | char *arg, *argv[MAXNUMPARAMS]; | |
2437 | unsigned int nn, argc; | |
2438 | struct svccmd *svccmd, *template; | |
2439 | va_list args; | |
2440 | ||
2441 | va_start(args, alias); | |
2442 | argc = 0; | |
2443 | while (1) { | |
2444 | arg = va_arg(args, char*); | |
2445 | if (!arg) | |
2446 | break; | |
2447 | argv[argc++] = arg; | |
2448 | } | |
2449 | va_end(args); | |
2450 | svccmd = calloc(1, sizeof(*svccmd)); | |
2451 | if (!(template = svccmd_resolve_name(svccmd, argv[0]))) { | |
2452 | log_module(MAIN_LOG, LOG_ERROR, "Invalid base command %s for alias %s in service %s", argv[0], alias, service->bot->nick); | |
2453 | free(svccmd->name); | |
2454 | free(svccmd); | |
2455 | return NULL; | |
2456 | } | |
2457 | if (argc > 1) { | |
2458 | svccmd->alias.used = svccmd->alias.size = argc; | |
2459 | svccmd->alias.list = calloc(svccmd->alias.size, sizeof(svccmd->alias.list[0])); | |
2460 | for (nn=0; nn<argc; nn++) | |
2461 | svccmd->alias.list[nn] = strdup(argv[nn]); | |
2462 | } | |
2463 | svccmd_insert(service, strdup(alias), svccmd, template->command); | |
2464 | svccmd_copy_rules(svccmd, template); | |
2465 | return svccmd; | |
2466 | } | |
2467 | ||
2468 | static int saxdb_present; | |
2469 | ||
2470 | static int | |
2471 | modcmd_saxdb_read(struct dict *db) { | |
2472 | struct dict *db2; | |
2473 | dict_iterator_t it, it2; | |
2474 | struct record_data *rd, *rd2; | |
2475 | struct service *service; | |
2476 | ||
2477 | modcmd_load_bots(database_get_data(db, "bots", RECDB_OBJECT), 1); | |
2478 | db2 = database_get_data(db, "services", RECDB_OBJECT); | |
2479 | if (!db2) { | |
2480 | log_module(MAIN_LOG, LOG_ERROR, "Missing section 'services' in modcmd db."); | |
2481 | return 1; | |
2482 | } | |
2483 | for (it = dict_first(db2); it; it = iter_next(it)) { | |
2484 | rd = iter_data(it); | |
2485 | if (rd->type != RECDB_OBJECT) { | |
2486 | log_module(MAIN_LOG, LOG_ERROR, "Bad type for 'services/%s' in modcmd db (expected object).", iter_key(it)); | |
2487 | continue; | |
2488 | } | |
2489 | if (!(service = service_find(iter_key(it)))) { | |
2490 | log_module(MAIN_LOG, LOG_ERROR, "Unknown service '%s' listed in modcmd db.", iter_key(it)); | |
2491 | continue; | |
2492 | } | |
2493 | for (it2 = dict_first(rd->d.object); it2; it2 = iter_next(it2)) { | |
2494 | rd2 = iter_data(it2); | |
2495 | if (rd2->type != RECDB_OBJECT) { | |
2496 | log_module(MAIN_LOG, LOG_ERROR, "Bad type for 'services/%s/%s' in modcmd db (expected object).", iter_key(it), iter_key(it2)); | |
2497 | continue; | |
2498 | } | |
2499 | modcmd_db_load_command(service, iter_key(it2), rd2->d.object); | |
2500 | } | |
2501 | } | |
2502 | db2 = database_get_data(db, "helpfiles", RECDB_OBJECT); | |
2503 | for (it = dict_first(db2); it; it = iter_next(it)) { | |
2504 | struct module *module; | |
2505 | struct string_list *slist; | |
2506 | unsigned int ii; | |
2507 | ||
2508 | rd = iter_data(it); | |
2509 | if (rd->type != RECDB_STRING_LIST) { | |
2510 | log_module(MAIN_LOG, LOG_ERROR, "Bad type for 'helpfiles/%s' in modcmd db (expected string list).", iter_key(it)); | |
2511 | continue; | |
2512 | } | |
2513 | slist = rd->d.slist; | |
2514 | if (!(service = service_find(iter_key(it)))) { | |
2515 | /* We probably whined about the service being missing above. */ | |
2516 | continue; | |
2517 | } | |
2518 | service->modules.used = 0; | |
2519 | for (ii=0; ii<slist->used; ++ii) { | |
2520 | if (!(module = dict_find(modules, slist->list[ii], NULL))) { | |
2521 | log_module(MAIN_LOG, LOG_ERROR, "Unknown module '%s' listed in modcmd 'helpfiles/%s'.", slist->list[ii], iter_key(it)); | |
2522 | continue; | |
2523 | } | |
2524 | module_list_append(&service->modules, module); | |
2525 | } | |
2526 | } | |
2527 | saxdb_present = 1; | |
2528 | return 0; | |
2529 | } | |
2530 | ||
2531 | static void | |
2532 | create_default_binds(int rebind) { | |
2533 | /* Which services should import which modules by default? */ | |
2534 | struct { | |
2535 | const char *svcname; | |
2536 | /* C is lame and requires a fixed size for this array. | |
2537 | * Be sure you NULL-terminate each array and increment the | |
2538 | * size here if you add more default modules to any | |
2539 | * service. */ | |
2540 | const char *modnames[8]; | |
2541 | } def_binds[] = { | |
2542 | { "ChanServ", { "ChanServ", NULL } }, | |
2543 | { "Global", { "Global", NULL } }, | |
2544 | { "NickServ", { "NickServ", NULL } }, | |
2545 | { "OpServ", { "OpServ", "modcmd", "sendmail", "saxdb", "proxycheck", NULL } }, | |
2546 | { "SpamServ", { "SpamServ", NULL } }, | |
2547 | { NULL, { NULL } } | |
2548 | }; | |
2549 | unsigned int ii, jj; | |
2550 | char buf[128], *nick; | |
2551 | struct service *service; | |
2552 | struct module *module; | |
2553 | ||
2554 | for (ii = 0; def_binds[ii].svcname; ++ii) { | |
2555 | sprintf(buf, "services/%s/nick", def_binds[ii].svcname); | |
2556 | if (!(nick = conf_get_data(buf, RECDB_QSTRING))) | |
2557 | continue; | |
2558 | if (!(service = service_find(nick))) | |
2559 | continue; | |
2560 | if (dict_size(service->commands) > 0 && !rebind) | |
2561 | continue; | |
2562 | ||
2563 | /* Bind the default modules for this service to it */ | |
2564 | for (jj = 0; def_binds[ii].modnames[jj]; ++jj) { | |
2565 | if (!(module = module_find(def_binds[ii].modnames[jj]))) | |
2566 | continue; | |
2567 | service_bind_module(service, module); | |
2568 | } | |
2569 | ||
2570 | /* Bind the help and version commands to this service */ | |
2571 | service_bind_modcmd(service, help_command, help_command->name); | |
2572 | service_bind_modcmd(service, version_command, version_command->name); | |
2573 | service_bind_modcmd(service, credits_command, credits_command->name); | |
2574 | ||
2575 | /* Now some silly hax.. (aliases that most people want) */ | |
2576 | if (!irccasecmp(def_binds[ii].svcname, "ChanServ")) { | |
2577 | service_make_alias(service, "addowner", "*chanserv.adduser", "$1", "owner", "$2", NULL); | |
2578 | service_make_alias(service, "addcoowner", "*chanserv.adduser", "$1", "coowner", "$2", NULL); | |
2579 | service_make_alias(service, "addco", "*chanserv.adduser", "$1", "coowner", "$2", NULL); | |
2580 | service_make_alias(service, "addmanager", "*chanserv.adduser", "$1", "manager", "$2", NULL); | |
2581 | service_make_alias(service, "addop", "*chanserv.adduser", "$1", "op", "$2", NULL); | |
2582 | service_make_alias(service, "addhop", "*chanserv.adduser", "$1", "halfop", "$2", NULL); | |
2583 | service_make_alias(service, "addpeon", "*chanserv.adduser", "$1", "peon", "$2", NULL); | |
2584 | service_make_alias(service, "addpal", "*chanserv.adduser", "$1", "pal", "$2", NULL); | |
2585 | service_make_alias(service, "delowner", "*chanserv.deluser", "owner", "$1", NULL); | |
2586 | service_make_alias(service, "delcoowner", "*chanserv.deluser", "coowner", "$1", NULL); | |
2587 | service_make_alias(service, "delmanager", "*chanserv.deluser", "manager", "$1", NULL); | |
2588 | service_make_alias(service, "delop", "*chanserv.deluser", "op", "$1", NULL); | |
2589 | service_make_alias(service, "delpeon", "*chanserv.deluser", "peon", "$1", NULL); | |
2590 | service_make_alias(service, "delpal", "*chanserv.deluser", "pal", "$1", NULL); | |
2591 | service_make_alias(service, "llist", "*chanserv.lamers", "$1", NULL); | |
2592 | service_make_alias(service, "command", "*modcmd.command", NULL); | |
2593 | service_make_alias(service, "god", "*modcmd.god", NULL); | |
2594 | } else if (!irccasecmp(def_binds[ii].svcname, "OpServ")) { | |
2595 | struct svccmd *svccmd; | |
2596 | svccmd = service_make_alias(service, "stats", "*modcmd.joiner", NULL); | |
2597 | svccmd->min_opserv_level = 101; | |
2598 | svccmd = service_make_alias(service, "service", "*modcmd.joiner", NULL); | |
2599 | svccmd->min_opserv_level = 900; | |
2600 | svccmd = service_make_alias(service, "routing", "*modcmd.joiner", NULL); | |
2601 | svccmd->min_opserv_level = 100; | |
2602 | } | |
2603 | } | |
2604 | } | |
2605 | ||
2606 | static void | |
2607 | import_aliases_db() { | |
2608 | struct dict *db; | |
2609 | dict_iterator_t it, it2; | |
2610 | struct record_data *rd, *rd2; | |
2611 | struct service *service; | |
2612 | struct module *module; | |
2613 | ||
2614 | if (!(db = parse_database("aliases.db"))) | |
2615 | return; | |
2616 | for (it = dict_first(db); it; it = iter_next(it)) { | |
2617 | service = service_find(iter_key(it)); | |
2618 | if (!service) | |
2619 | continue; | |
2620 | module = module_find(service->bot->nick); | |
2621 | rd = iter_data(it); | |
2622 | if (rd->type != RECDB_OBJECT) | |
2623 | continue; | |
2624 | for (it2 = dict_first(rd->d.object); it2; it2 = iter_next(it2)) { | |
2625 | struct modcmd *command; | |
2626 | rd2 = iter_data(it2); | |
2627 | if (rd2->type != RECDB_QSTRING) | |
2628 | continue; | |
2629 | command = dict_find(module->commands, rd2->d.qstring, NULL); | |
2630 | if (!command) | |
2631 | continue; | |
2632 | service_bind_modcmd(service, command, iter_key(it2)); | |
2633 | } | |
2634 | } | |
2635 | } | |
2636 | ||
2637 | void | |
2638 | modcmd_finalize(void) { | |
2639 | dict_iterator_t it; | |
2640 | ||
2641 | /* Check databases. */ | |
2642 | saxdb_register("modcmd", modcmd_saxdb_read, modcmd_saxdb_write); | |
2643 | create_default_binds(0); | |
2644 | if (!saxdb_present) | |
2645 | import_aliases_db(); | |
2646 | ||
2647 | /* Register services for their triggers. */ | |
2648 | for (it = dict_first(services); it; it = iter_next(it)) { | |
2649 | struct service *svc = iter_data(it); | |
2650 | if (svc->trigger) | |
2651 | reg_chanmsg_func(svc->trigger, svc->bot, modcmd_chanmsg, NULL); | |
2652 | } | |
2653 | ||
2654 | /* Resolve command rule-templates. */ | |
2655 | while (pending_templates) { | |
2656 | struct pending_template *ptempl = pending_templates; | |
2657 | struct svccmd *svccmd; | |
2658 | ||
2659 | pending_templates = ptempl->next; | |
2660 | /* Only overwrite the current template if we have a valid template. */ | |
2661 | if (!strcmp(ptempl->base, "*")) { | |
2662 | /* Do nothing. */ | |
2663 | } else if ((svccmd = svccmd_resolve_name(ptempl->cmd, ptempl->base))) { | |
2664 | svccmd_copy_rules(ptempl->cmd, svccmd); | |
2665 | } else { | |
2666 | assert(ptempl->cmd->parent); | |
2667 | log_module(MAIN_LOG, LOG_ERROR, "Unable to resolve template name %s for command %s in service %s.", ptempl->base, ptempl->cmd->name, ptempl->cmd->parent->bot->nick); | |
2668 | } | |
2669 | free(ptempl->base); | |
2670 | free(ptempl); | |
2671 | } | |
2672 | } |