]>
Commit | Line | Data |
---|---|---|
1 | /* modcmd.c - Generalized module command support | |
2 | * Copyright 2002-2004 srvx Development Team | |
3 | * | |
4 | * This file is part of srvx. | |
5 | * | |
6 | * srvx is free software; you can redistribute it and/or modify | |
7 | * it under the terms of the GNU General Public License as published by | |
8 | * the Free Software Foundation; either version 2 of the License, or | |
9 | * (at your option) any later version. | |
10 | * | |
11 | * This program is distributed in the hope that it will be useful, | |
12 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
14 | * GNU General Public License for more details. | |
15 | * | |
16 | * You should have received a copy of the GNU General Public License | |
17 | * along with srvx; if not, write to the Free Software Foundation, | |
18 | * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA. | |
19 | */ | |
20 | ||
21 | #include "chanserv.h" | |
22 | #include "conf.h" | |
23 | #include "modcmd.h" | |
24 | #include "saxdb.h" | |
25 | ||
26 | struct pending_template { | |
27 | struct svccmd *cmd; | |
28 | char *base; | |
29 | struct pending_template *next; | |
30 | }; | |
31 | ||
32 | static struct dict *modules; | |
33 | static struct dict *services; | |
34 | static struct pending_template *pending_templates; | |
35 | static struct module *modcmd_module; | |
36 | static struct modcmd *bind_command, *help_command, *version_command; | |
37 | static const struct message_entry msgtab[] = { | |
38 | { "MCMSG_BARE_FLAG", "Flag %.*s must be preceded by a + or -." }, | |
39 | { "MCMSG_UNKNOWN_FLAG", "Unknown module flag %.*s." }, | |
40 | { "MCMSG_BAD_OPSERV_LEVEL", "Invalid $O access level %s." }, | |
41 | { "MCMSG_BAD_CHANSERV_LEVEL", "Invalid $C access level %s." }, | |
42 | { "MCMSG_LEVEL_TOO_LOW", "You cannot set the access requirements for %s (your level is too low.)" }, | |
43 | { "MCMSG_LEVEL_TOO_HIGH", "You cannot set the access requirements to %s (that is too high)." }, | |
44 | { "MCMSG_BAD_OPTION", "Unknown option %s." }, | |
45 | { "MCMSG_MUST_QUALIFY", "You $bMUST$b \"/msg %s@$s %s\" (not just /msg %s)." }, | |
46 | { "MCMSG_ACCOUNT_SUSPENDED", "Your account has been suspended." }, | |
47 | { "MCMSG_CHAN_NOT_REGISTERED", "%s has not been registered with $C." }, | |
48 | { "MCMSG_CHAN_SUSPENDED", "$b$C$b access to $b%s$b has been temporarily suspended (%s)." }, | |
49 | { "MCMSG_NO_CHANNEL_ACCESS", "You lack access to %s." }, | |
50 | { "MCMSG_LOW_CHANNEL_ACCESS", "You lack sufficient access in %s to use this command." }, | |
51 | { "MCMSG_REQUIRES_JOINABLE", "You must be in %s (or on its userlist) to use this command." }, | |
52 | { "MCMSG_MUST_BE_HELPING", "You must have security override (helping mode) on to use this command." }, | |
53 | { "MCMSG_MISSING_COMMAND", "You must specify a command as well as a channel." }, | |
54 | { "MCMSG_NO_CHANNEL_BEFORE", "You may not give a channel name before this command." }, | |
55 | { "MCMSG_NO_PLUS_CHANNEL", "You may not use a +channel with this command." }, | |
56 | { "MCMSG_COMMAND_ALIASES", "%s is an alias for: %s" }, | |
57 | { "MCMSG_HELP_COMMAND_ALIAS", "$uAlias for:$u %s" }, | |
58 | { "MCMSG_COMMAND_BINDING", "%s is a binding of: %s" }, | |
59 | { "MCMSG_ALIAS_ERROR", "Error in alias expansion for %s; check the error log for details." }, | |
60 | { "MCMSG_INTERNAL_COMMAND", "$b%s$b is an internal command and cannot be called directly; please check command bindings." }, | |
61 | { "MCMSG_UNKNOWN_MODULE", "Unknown module %s." }, | |
62 | { "MCMSG_UNKNOWN_SERVICE", "Unknown service %s." }, | |
63 | { "MCMSG_ALREADY_BOUND", "%s already has a command bound as %s." }, | |
64 | { "MCMSG_UNKNOWN_COMMAND_2", "Unknown command name %s (relative to service %s)." }, | |
65 | { "MCMSG_COMMAND_MODIFIED", "Option $b%s$b for $b%s$b has been set." }, | |
66 | { "MCMSG_INSPECTION_REFUSED", "You do not have access to inspect command %s." }, | |
67 | { "MCMSG_CANNOT_DOUBLE_ALIAS", "You cannot bind to a complex (argument-carrying) bind." }, | |
68 | { "MCMSG_BAD_ALIAS_ARGUMENT", "Invalid alias argument $b%s$b." }, | |
69 | { "MCMSG_COMMAND_BOUND", "New command %s bound to %s." }, | |
70 | { "MCMSG_MODULE_BOUND", "Bound %d commands from %s to %s." }, | |
71 | { "MCMSG_NO_COMMAND_BOUND", "%s has nothing bound as command %s." }, | |
72 | { "MCMSG_UNBIND_PROHIBITED", "It wouldn't be very much fun to unbind the last %s command, now would it?" }, | |
73 | { "MCMSG_COMMAND_UNBOUND", "Unbound command %s from %s." }, | |
74 | { "MCMSG_HELPFILE_UNBOUND", "Since that was the last command from module %s on the service, the helpfile for %s was removed." }, | |
75 | { "MCMSG_NO_HELPFILE", "Module %s does not have a help file." }, | |
76 | { "MCMSG_HELPFILE_ERROR", "Syntax error reading %s; help contents not changed." }, | |
77 | { "MCMSG_HELPFILE_READ", "Read %s help database in "FMT_TIME_T".%03lu seconds." }, | |
78 | { "MCMSG_COMMAND_TIME", "Command $b%s$b finished in "FMT_TIME_T".%06lu seconds." }, | |
79 | { "MCMSG_NEED_OPSERV_LEVEL", "You must have $O access of at least $b%u$b." }, | |
80 | { "MCMSG_NEED_CHANSERV_LEVEL", "You must have $C access of at least $b%u$b in the channel." }, | |
81 | { "MCMSG_NEED_ACCOUNT_FLAGS", "You must have account flags $b%s$b." }, | |
82 | { "MCMSG_NEED_NOTHING", "Anyone may use the $b%s$b command." }, | |
83 | { "MCMSG_NEED_STAFF_ACCESS", "You must be network staff." }, | |
84 | { "MCMSG_NEED_STAFF_OPER", "You must be an IRC operator." }, | |
85 | { "MCMSG_NEED_STAFF_NETHELPER", "You must be a network helper." }, | |
86 | { "MCMSG_NEED_STAFF_NETHELPER_OR_OPER", "You must be a network helper or IRC operator." }, | |
87 | { "MCMSG_NEED_STAFF_SHELPER", "You must be a support helper." }, | |
88 | { "MCMSG_NEED_STAFF_SHELPER_OR_OPER", "You must be a support helper or IRC operator." }, | |
89 | { "MCMSG_NEED_STAFF_HELPER", "You must be a network or support helper." }, | |
90 | { "MCMSG_NEED_JOINABLE", "The channel must be open or you must be in the channel or on its userlist." }, | |
91 | { "MCMSG_NEED_CHANUSER_CSUSPENDABLE", "You must be on the channel's userlist, and the channel can be suspended." }, | |
92 | { "MCMSG_NEED_CHANUSER", "You must be on the channel's userlist." }, | |
93 | { "MCMSG_NEED_REGCHAN", "You must specify a channel registered with $C." }, | |
94 | { "MCMSG_NEED_CHANNEL", "You must specify a channel that exists." }, | |
95 | { "MCMSG_NEED_AUTHED", "You must be authenticated with $N." }, | |
96 | { "MCMSG_IS_TOY", "$b%s$b is a toy command." }, | |
97 | { "MCMSG_END_REQUIREMENTS", "End of requirements for $b%s$b." }, | |
98 | { "MCMSG_ALREADY_HELPING", "You already have security override enabled." }, | |
99 | { "MCMSG_ALREADY_NOT_HELPING", "You already have security override disabled." }, | |
100 | { "MCMSG_NOW_HELPING", "Security override has been enabled." }, | |
101 | { "MCMSG_NOW_NOT_HELPING", "Security override has been disabled." }, | |
102 | { "MCMSG_JOINER_CHOICES", "Subcommands of %s: %s" }, | |
103 | { "MCMSG_MODULE_INFO", "Commands exported by module $b%s$b:" }, | |
104 | { "MCMSG_SERVICE_INFO", "Commands bound to service $b%s$b:" }, | |
105 | { "MCMSG_TOYS_DISABLED", "Toys are disabled in %s." }, | |
106 | { "MCMSG_PUBLIC_DENY", "Public commands in $b%s$b are restricted." }, | |
107 | { "MCMSG_HELPFILE_SEQUENCE", "Help priority %d: %s" }, | |
108 | { "MCMSG_HELPFILE_SEQUENCE_SET", "Set helpfile priority sequence for %s." }, | |
109 | { "MCMSG_BAD_SERVICE_NICK", "$b%s$b is an invalid nickname." }, | |
110 | { "MCMSG_ALREADY_SERVICE", "$b%s$b is already a service." }, | |
111 | { "MCMSG_NEW_SERVICE", "Added new service bot $b%s$b." }, | |
112 | { "MCMSG_SERVICE_RENAMED", "Service renamed to $b%s$b." }, | |
113 | { "MCMSG_NO_TRIGGER", "$b%s$b does not have an in-channel trigger." }, | |
114 | { "MCMSG_REMOVED_TRIGGER", "Removed trigger from $b%s$b." }, | |
115 | { "MCMSG_DUPLICATE_TRIGGER", "$b%s$b already uses trigger $b%c$b." }, | |
116 | { "MCMSG_CURRENT_TRIGGER", "Trigger for $b%s$b is $b%c$b." }, | |
117 | { "MCMSG_NEW_TRIGGER", "Changed trigger for $b%s$b to $b%c$b." }, | |
118 | { "MCMSG_SERVICE_PRIVILEGED", "Service $b%s$b privileged: $b%s$b." }, | |
119 | { "MCMSG_SERVICE_REMOVED", "Service $b%s$b has been deleted." }, | |
120 | { "MCMSG_FILE_NOT_OPENED", "Unable to open file $b%s$b for writing." }, | |
121 | { "MCMSG_MESSAGES_DUMPED", "Messages written to $b%s$b." }, | |
122 | { "MCMSG_MESSAGE_DUMP_FAILED", "Message dump failed: %s." }, | |
123 | { "MCMSG_COMMAND_FLAGS", "Command flags are %s (inferred: %s)." }, | |
124 | { "MCMSG_COMMAND_ACCOUNT_FLAGS", "Requires account flags +%s, prohibits account flags +%s." }, | |
125 | { "MCMSG_COMMAND_ACCESS_LEVEL", "Requires channel access %d and $O access %d." }, | |
126 | { "MCMSG_COMMAND_USES", "%s has been used %d times." }, | |
127 | { NULL, NULL } | |
128 | }; | |
129 | struct userData *_GetChannelUser(struct chanData *channel, struct handle_info *handle, int override, int allow_suspended); | |
130 | ||
131 | #define ACTION_ALLOW 1 | |
132 | #define ACTION_OVERRIDE 2 | |
133 | #define ACTION_NOCHANNEL 4 | |
134 | #define ACTION_STAFF 8 | |
135 | ||
136 | #define RESOLVE_DEPTH 4 | |
137 | ||
138 | static struct modcmd_flag { | |
139 | const char *name; | |
140 | unsigned int flag; | |
141 | } flags[] = { | |
142 | { "acceptchan", MODCMD_ACCEPT_CHANNEL }, | |
143 | { "acceptpluschan", MODCMD_ACCEPT_PCHANNEL }, | |
144 | { "authed", MODCMD_REQUIRE_AUTHED }, | |
145 | { "channel", MODCMD_REQUIRE_CHANNEL }, | |
146 | { "chanuser", MODCMD_REQUIRE_CHANUSER }, | |
147 | { "disabled", MODCMD_DISABLED }, | |
148 | { "ignore_csuspend", MODCMD_IGNORE_CSUSPEND }, | |
149 | { "joinable", MODCMD_REQUIRE_JOINABLE }, | |
150 | { "keepbound", MODCMD_KEEP_BOUND }, | |
151 | { "loghostmask", MODCMD_LOG_HOSTMASK }, | |
152 | { "nolog", MODCMD_NO_LOG }, | |
153 | { "networkhelper", MODCMD_REQUIRE_NETWORK_HELPER }, | |
154 | { "never_csuspend", MODCMD_NEVER_CSUSPEND }, | |
155 | { "oper", MODCMD_REQUIRE_OPER }, | |
156 | { "qualified", MODCMD_REQUIRE_QUALIFIED }, | |
157 | { "regchan", MODCMD_REQUIRE_REGCHAN }, | |
158 | { "supporthelper", MODCMD_REQUIRE_SUPPORT_HELPER }, | |
159 | { "helping", MODCMD_REQUIRE_HELPING }, | |
160 | { "toy", MODCMD_TOY }, | |
161 | { NULL, 0 } | |
162 | }; | |
163 | ||
164 | static int | |
165 | flags_bsearch(const void *a, const void *b) { | |
166 | const char *key = a; | |
167 | const struct modcmd_flag *flag = b; | |
168 | return ircncasecmp(key, flag->name, strlen(flag->name)); | |
169 | } | |
170 | ||
171 | static int | |
172 | flags_qsort(const void *a, const void *b) { | |
173 | const struct modcmd_flag *fa = a, *fb = b; | |
174 | return irccasecmp(fa->name, fb->name); | |
175 | } | |
176 | ||
177 | DEFINE_LIST(svccmd_list, struct svccmd*); | |
178 | DEFINE_LIST(module_list, struct module*); | |
179 | ||
180 | static void | |
181 | free_service_command(void *data) { | |
182 | struct svccmd *svccmd; | |
183 | unsigned int nn; | |
184 | ||
185 | svccmd = data; | |
186 | if (svccmd->alias.used) { | |
187 | for (nn=0; nn<svccmd->alias.used; ++nn) | |
188 | free(svccmd->alias.list[nn]); | |
189 | free(svccmd->alias.list); | |
190 | } | |
191 | free(svccmd->name); | |
192 | free(svccmd); | |
193 | } | |
194 | ||
195 | static void | |
196 | free_service(void *data) { | |
197 | struct service *service = data; | |
198 | dict_delete(service->commands); | |
199 | module_list_clean(&service->modules); | |
200 | free(service); | |
201 | } | |
202 | ||
203 | static void | |
204 | free_module_command(void *data) { | |
205 | struct modcmd *modcmd = data; | |
206 | free_service_command(modcmd->defaults); | |
207 | free(modcmd->name); | |
208 | free(modcmd); | |
209 | } | |
210 | ||
211 | static void | |
212 | free_module(void *data) { | |
213 | struct module *module = data; | |
214 | dict_delete(module->commands); | |
215 | close_helpfile(module->helpfile); | |
216 | free(module->name); | |
217 | free(module); | |
218 | } | |
219 | ||
220 | struct module * | |
221 | module_register(const char *name, struct log_type *clog, const char *helpfile_name, expand_func_t expand_help) { | |
222 | struct module *newmod; | |
223 | ||
224 | newmod = calloc(1, sizeof(*newmod)); | |
225 | newmod->name = strdup(name); | |
226 | newmod->commands = dict_new(); | |
227 | dict_set_free_data(newmod->commands, free_module_command); | |
228 | newmod->clog = clog; | |
229 | newmod->helpfile_name = helpfile_name; | |
230 | newmod->expand_help = expand_help; | |
231 | if (newmod->helpfile_name) { | |
232 | newmod->helpfile = open_helpfile(newmod->helpfile_name, newmod->expand_help); | |
233 | } | |
234 | dict_insert(modules, newmod->name, newmod); | |
235 | return newmod; | |
236 | } | |
237 | ||
238 | struct module * | |
239 | module_find(const char *name) { | |
240 | return dict_find(modules, name, NULL); | |
241 | } | |
242 | ||
243 | static void | |
244 | add_pending_template(struct svccmd *cmd, const char *target) { | |
245 | struct pending_template *pending = calloc(1, sizeof(*pending)); | |
246 | pending->cmd = cmd; | |
247 | pending->base = strdup(target); | |
248 | pending->next = pending_templates; | |
249 | pending_templates = pending; | |
250 | } | |
251 | ||
252 | static struct svccmd * | |
253 | svccmd_resolve_name(struct svccmd *origin, const char *name) { | |
254 | char *sep, svcname[MAXLEN]; | |
255 | ||
256 | if ((sep = strchr(name, '.'))) { | |
257 | memcpy(svcname, name, sep-name); | |
258 | svcname[sep-name] = 0; | |
259 | name = sep + 1; | |
260 | if (svcname[0] == '*') { | |
261 | struct module *module = module_find(svcname+1); | |
262 | struct modcmd *cmd = module ? dict_find(module->commands, name, NULL) : NULL; | |
263 | return cmd ? cmd->defaults : NULL; | |
264 | } else { | |
265 | struct service *service = service_find(svcname); | |
266 | return service ? dict_find(service->commands, name, NULL) : NULL; | |
267 | } | |
268 | } else { | |
269 | if (origin->parent) { | |
270 | return dict_find(origin->parent->commands, name, NULL); | |
271 | } else { | |
272 | struct modcmd *cmd = dict_find(origin->command->parent->commands, name, NULL); | |
273 | return cmd ? cmd->defaults : NULL; | |
274 | } | |
275 | } | |
276 | } | |
277 | ||
278 | static void | |
279 | modcmd_set_effective_flags(struct svccmd *cmd) { | |
280 | int flags = cmd->flags | cmd->command->flags; | |
281 | if (cmd->min_opserv_level > 0) | |
282 | flags |= MODCMD_REQUIRE_OPER; | |
283 | if (cmd->min_channel_access > 0) | |
284 | flags |= MODCMD_REQUIRE_CHANUSER; | |
285 | if (flags & MODCMD_REQUIRE_CHANUSER) | |
286 | flags |= MODCMD_REQUIRE_REGCHAN; | |
287 | if (flags & MODCMD_REQUIRE_REGCHAN) | |
288 | flags |= MODCMD_REQUIRE_CHANNEL; | |
289 | if (flags & (MODCMD_REQUIRE_STAFF|MODCMD_REQUIRE_HELPING)) | |
290 | flags |= MODCMD_REQUIRE_AUTHED; | |
291 | cmd->effective_flags = flags; | |
292 | } | |
293 | ||
294 | static void | |
295 | svccmd_copy_rules(struct svccmd *dest, struct svccmd *src) { | |
296 | dest->flags |= src->flags; | |
297 | dest->req_account_flags |= src->req_account_flags; | |
298 | dest->deny_account_flags |= src->deny_account_flags; | |
299 | if (src->min_opserv_level > dest->min_opserv_level) | |
300 | dest->min_opserv_level = src->min_opserv_level; | |
301 | if (src->min_channel_access > dest->min_channel_access) | |
302 | dest->min_channel_access = src->min_channel_access; | |
303 | modcmd_set_effective_flags(dest); | |
304 | } | |
305 | ||
306 | static int | |
307 | svccmd_configure(struct svccmd *cmd, struct userNode *user, struct userNode *bot, const char *param, const char *value) { | |
308 | if (!irccasecmp(param, "flags")) { | |
309 | unsigned int set_flags, rem_flags; | |
310 | struct modcmd_flag *flag; | |
311 | int opt, end; | |
312 | ||
313 | for (set_flags = rem_flags = 0; 1; value += end) { | |
314 | end = strcspn(value, ","); | |
315 | if (*value == '+') | |
316 | opt = 1; | |
317 | else if (*value == '-') | |
318 | opt = 0; | |
319 | else { | |
320 | if (user) | |
321 | send_message(user, bot, "MCMSG_BARE_FLAG", end, value); | |
322 | else | |
323 | log_module(MAIN_LOG, LOG_ERROR, "Flag %.*s must be preceded by a + or - (for command %s).", end, value, cmd->name); | |
324 | return 0; | |
325 | } | |
326 | value++; | |
327 | flag = bsearch(value, flags, ArrayLength(flags)-1, sizeof(flags[0]), flags_bsearch); | |
328 | if (!flag) { | |
329 | if (user) | |
330 | send_message(user, bot, "MCMSG_UNKNOWN_FLAG", end, value); | |
331 | else | |
332 | log_module(MAIN_LOG, LOG_ERROR, "Unknown module flag %.*s (for command %s).", end, value, cmd->name); | |
333 | return 0; | |
334 | } | |
335 | if (opt) | |
336 | set_flags |= flag->flag, rem_flags &= ~flag->flag; | |
337 | else | |
338 | rem_flags |= flag->flag, set_flags &= ~flag->flag; | |
339 | if (!value[end-1]) | |
340 | break; | |
341 | } | |
342 | cmd->flags = (cmd->flags | set_flags) & ~rem_flags; | |
343 | return 1; | |
344 | } else if (!irccasecmp(param, "channel_level") || !irccasecmp(param, "channel_access") || !irccasecmp(param, "access")) { | |
345 | unsigned short ul; | |
346 | if (!irccasecmp(value, "none") || !irccasecmp(value, "0")) { | |
347 | cmd->min_channel_access = 0; | |
348 | return 1; | |
349 | } else if ((ul = user_level_from_name(value, UL_OWNER)) > 0) { | |
350 | cmd->min_channel_access = ul; | |
351 | return 1; | |
352 | } else if (user) { | |
353 | send_message(user, bot, "MCMSG_BAD_CHANSERV_LEVEL", value); | |
354 | return 0; | |
355 | } else { | |
356 | log_module(MAIN_LOG, LOG_ERROR, "Invalid ChanServ access level %s (for command %s).", value, cmd->name); | |
357 | return 0; | |
358 | } | |
359 | } else if (!irccasecmp(param, "oper_level") || !irccasecmp(param, "oper_access") || !irccasecmp(param, "level")) { | |
360 | unsigned int newval = atoi(value); | |
361 | if (!isdigit(value[0]) || (newval > 1000)) { | |
362 | if (user) | |
363 | send_message(user, bot, "MCMSG_BAD_OPSERV_LEVEL", value); | |
364 | else | |
365 | log_module(MAIN_LOG, LOG_ERROR, "Invalid OpServ access level %s (for command %s).", value, cmd->name); | |
366 | return 0; | |
367 | } | |
368 | if (user && (!user->handle_info || (cmd->min_opserv_level > user->handle_info->opserv_level))) { | |
369 | send_message(user, bot, "MCMSG_LEVEL_TOO_LOW", cmd->name); | |
370 | return 0; | |
371 | } | |
372 | if (user && (!user->handle_info || (newval > user->handle_info->opserv_level))) { | |
373 | send_message(user, bot, "MCMSG_LEVEL_TOO_HIGH", value); | |
374 | return 0; | |
375 | } | |
376 | cmd->min_opserv_level = newval; | |
377 | return 1; | |
378 | } else if (!irccasecmp(param, "account_flags")) { | |
379 | return nickserv_modify_handle_flags(user, bot, value, &cmd->req_account_flags, &cmd->deny_account_flags); | |
380 | } else { | |
381 | if (user) | |
382 | send_message(user, bot, "MCMSG_BAD_OPTION", param); | |
383 | else | |
384 | log_module(MAIN_LOG, LOG_ERROR, "Unknown option %s (for command %s).", param, cmd->name); | |
385 | return 0; | |
386 | } | |
387 | } | |
388 | ||
389 | struct modcmd * | |
390 | modcmd_register(struct module *module, const char *name, modcmd_func_t func, unsigned int min_argc, unsigned int flags, ...) { | |
391 | struct modcmd *newcmd; | |
392 | va_list args; | |
393 | const char *param, *value; | |
394 | ||
395 | newcmd = calloc(1, sizeof(*newcmd)); | |
396 | newcmd->name = strdup(name); | |
397 | newcmd->parent = module; | |
398 | newcmd->func = func; | |
399 | newcmd->min_argc = min_argc; | |
400 | newcmd->flags = flags; | |
401 | newcmd->defaults = calloc(1, sizeof(*newcmd->defaults)); | |
402 | newcmd->defaults->name = strdup(newcmd->name); | |
403 | newcmd->defaults->command = newcmd; | |
404 | dict_insert(module->commands, newcmd->name, newcmd); | |
405 | if (newcmd->flags & (MODCMD_REQUIRE_REGCHAN|MODCMD_REQUIRE_CHANNEL|MODCMD_REQUIRE_CHANUSER|MODCMD_REQUIRE_JOINABLE)) { | |
406 | newcmd->defaults->flags |= MODCMD_ACCEPT_CHANNEL; | |
407 | } | |
408 | if (newcmd->flags & MODCMD_REQUIRE_STAFF) { | |
409 | newcmd->defaults->flags |= MODCMD_REQUIRE_AUTHED; | |
410 | } | |
411 | va_start(args, flags); | |
412 | while ((param = va_arg(args, const char*))) { | |
413 | value = va_arg(args, const char*); | |
414 | if (!irccasecmp(param, "template")) { | |
415 | struct svccmd *svccmd = svccmd_resolve_name(newcmd->defaults, value); | |
416 | if (svccmd) { | |
417 | svccmd_copy_rules(newcmd->defaults, svccmd); | |
418 | } else { | |
419 | log_module(MAIN_LOG, LOG_ERROR, "Unable to resolve template name %s for %s.%s.", value, newcmd->parent->name, newcmd->name); | |
420 | } | |
421 | add_pending_template(newcmd->defaults, value); | |
422 | } else { | |
423 | svccmd_configure(newcmd->defaults, NULL, NULL, param, value); | |
424 | } | |
425 | } | |
426 | modcmd_set_effective_flags(newcmd->defaults); | |
427 | va_end(args); | |
428 | return newcmd; | |
429 | } | |
430 | ||
431 | /* This is kind of a lame hack, but it is actually simpler than having | |
432 | * the permission check vary based on the command itself, or having a | |
433 | * more generic rule system. | |
434 | */ | |
435 | int | |
436 | svccmd_can_invoke(struct userNode *user, struct userNode *bot, struct svccmd *cmd, struct chanNode *channel, int options) { | |
437 | unsigned int uData_checked = 0; | |
438 | struct userData *uData = NULL; | |
439 | int rflags = 0, flags = cmd->effective_flags; | |
440 | ||
441 | if (flags & MODCMD_DISABLED) { | |
442 | if (options & SVCCMD_NOISY) | |
443 | send_message(user, bot, "MSG_COMMAND_DISABLED", cmd->name); | |
444 | return 0; | |
445 | } | |
446 | if ((flags & MODCMD_REQUIRE_QUALIFIED) && !(options & SVCCMD_QUALIFIED)) { | |
447 | if (options & SVCCMD_NOISY) | |
448 | send_message(user, bot, "MCMSG_MUST_QUALIFY", bot->nick, cmd->name, bot->nick); | |
449 | return 0; | |
450 | } | |
451 | if (flags & MODCMD_REQUIRE_AUTHED) { | |
452 | if (!user->handle_info) { | |
453 | if (options & SVCCMD_NOISY) | |
454 | send_message(user, bot, "MSG_AUTHENTICATE"); | |
455 | return 0; | |
456 | } | |
457 | if (HANDLE_FLAGGED(user->handle_info, SUSPENDED)) { | |
458 | if (options & SVCCMD_NOISY) | |
459 | send_message(user, bot, "MCMSG_ACCOUNT_SUSPENDED"); | |
460 | return 0; | |
461 | } | |
462 | } | |
463 | if (channel || (options & SVCCMD_NOISY)) { | |
464 | if ((flags & MODCMD_REQUIRE_CHANNEL) && !channel) { | |
465 | if (options & SVCCMD_NOISY) | |
466 | send_message(user, bot, "MSG_INVALID_CHANNEL"); | |
467 | return 0; | |
468 | } | |
469 | if (flags & MODCMD_REQUIRE_REGCHAN) { | |
470 | if (!channel->channel_info) { | |
471 | if (options & SVCCMD_NOISY) | |
472 | send_message(user, bot, "MCMSG_CHAN_NOT_REGISTERED", channel->name); | |
473 | return 0; | |
474 | } else if (IsSuspended(channel->channel_info) && !(flags & MODCMD_IGNORE_CSUSPEND)) { | |
475 | /* allow security-override users to always ignore channel suspensions, but flag it as a staff command */ | |
476 | if (!user->handle_info | |
477 | || !HANDLE_FLAGGED(user->handle_info, HELPING) | |
478 | || (flags & MODCMD_NEVER_CSUSPEND)) { | |
479 | if (options & SVCCMD_NOISY) | |
480 | send_message(user, bot, "MCMSG_CHAN_SUSPENDED", channel->name, channel->channel_info->suspended->reason); | |
481 | return 0; | |
482 | } | |
483 | rflags |= ACTION_STAFF; | |
484 | } | |
485 | } | |
486 | if (flags & MODCMD_REQUIRE_CHANUSER) { | |
487 | if (!uData_checked) | |
488 | uData = _GetChannelUser(channel->channel_info, user->handle_info, 1, 0), uData_checked = 1; | |
489 | if (!uData) { | |
490 | if (options & SVCCMD_NOISY) | |
491 | send_message(user, bot, "MCMSG_NO_CHANNEL_ACCESS", channel->name); | |
492 | return 0; | |
493 | } else if (uData->access < cmd->min_channel_access) { | |
494 | if (options & SVCCMD_NOISY) | |
495 | send_message(user, bot, "MCMSG_LOW_CHANNEL_ACCESS", channel->name); | |
496 | return 0; | |
497 | } | |
498 | } | |
499 | if ((flags & MODCMD_REQUIRE_JOINABLE) && channel) { | |
500 | if (!uData_checked) | |
501 | uData = _GetChannelUser(channel->channel_info, user->handle_info, 1, 0), uData_checked = 1; | |
502 | if ((channel->modes & (MODE_INVITEONLY|MODE_KEY|MODE_SECRET)) | |
503 | && !uData | |
504 | && !IsService(user) | |
505 | && !GetUserMode(channel, user)) { | |
506 | if (options & SVCCMD_NOISY) | |
507 | send_message(user, bot, "MCMSG_REQUIRES_JOINABLE", channel->name); | |
508 | return 0; | |
509 | } | |
510 | } | |
511 | if ((flags & MODCMD_TOY) && channel) { | |
512 | if (!channel->channel_info) | |
513 | rflags |= ACTION_NOCHANNEL; | |
514 | else switch (channel->channel_info->chOpts[chToys]) { | |
515 | case 'd': | |
516 | if (options & SVCCMD_NOISY) | |
517 | send_message(user, bot, "MCMSG_TOYS_DISABLED", channel->name); | |
518 | return 0; | |
519 | case 'n': | |
520 | rflags |= ACTION_NOCHANNEL; | |
521 | break; | |
522 | case 'p': | |
523 | break; | |
524 | } | |
525 | } | |
526 | } | |
527 | if (flags & MODCMD_REQUIRE_STAFF) { | |
528 | if (((flags & MODCMD_REQUIRE_OPER) && IsOper(user)) | |
529 | || ((flags & MODCMD_REQUIRE_NETWORK_HELPER) && IsNetworkHelper(user)) | |
530 | || ((flags & MODCMD_REQUIRE_SUPPORT_HELPER) && IsSupportHelper(user))) { | |
531 | /* allow it */ | |
532 | rflags |= ACTION_STAFF; | |
533 | } else { | |
534 | if (options & SVCCMD_NOISY) | |
535 | send_message(user, bot, "MSG_COMMAND_PRIVILEGED", cmd->name); | |
536 | return 0; | |
537 | } | |
538 | } | |
539 | if (flags & MODCMD_REQUIRE_HELPING) { | |
540 | if (!HANDLE_FLAGGED(user->handle_info, HELPING)) { | |
541 | if (options & SVCCMD_NOISY) | |
542 | send_message(user, bot, "MCMSG_MUST_BE_HELPING"); | |
543 | return 0; | |
544 | } | |
545 | rflags |= ACTION_STAFF; | |
546 | } | |
547 | if (cmd->min_opserv_level > 0) { | |
548 | if (!oper_has_access(user, bot, cmd->min_opserv_level, !(options & SVCCMD_NOISY))) return 0; | |
549 | rflags |= ACTION_STAFF; | |
550 | } | |
551 | if (cmd->req_account_flags || cmd->deny_account_flags) { | |
552 | if (!user->handle_info) { | |
553 | if (options & SVCCMD_NOISY) | |
554 | send_message(user, bot, "MSG_AUTHENTICATE"); | |
555 | return 0; | |
556 | } | |
557 | /* Do we want separate or different messages here? */ | |
558 | if ((cmd->req_account_flags & ~user->handle_info->flags) | |
559 | || (cmd->deny_account_flags & user->handle_info->flags)) { | |
560 | if (options & SVCCMD_NOISY) | |
561 | send_message(user, bot, "MSG_COMMAND_PRIVILEGED", cmd->name); | |
562 | return 0; | |
563 | } | |
564 | } | |
565 | ||
566 | /* If it's an override, return a special value. */ | |
567 | if ((flags & MODCMD_REQUIRE_CHANUSER) | |
568 | && (options & SVCCMD_NOISY) | |
569 | && (uData->access > 500) | |
570 | && (!(uData = _GetChannelUser(channel->channel_info, user->handle_info, 0, 0)) | |
571 | || uData->access < cmd->min_channel_access) | |
572 | && !(flags & (MODCMD_REQUIRE_STAFF|MODCMD_REQUIRE_HELPING))) { | |
573 | rflags |= ACTION_OVERRIDE; | |
574 | } | |
575 | return rflags | ACTION_ALLOW; | |
576 | } | |
577 | ||
578 | static int | |
579 | svccmd_expand_alias(struct svccmd *cmd, unsigned int old_argc, char *old_argv[], char *new_argv[]) { | |
580 | unsigned int ii, new_argc; | |
581 | char *arg; | |
582 | ||
583 | for (ii=new_argc=0; ii<cmd->alias.used; ++ii) { | |
584 | arg = cmd->alias.list[ii]; | |
585 | if (arg[0] != '$') { | |
586 | new_argv[new_argc++] = arg; | |
587 | continue; | |
588 | } | |
589 | if (arg[1] == '$') { | |
590 | new_argv[new_argc++] = arg + 1; | |
591 | } else if (isdigit(arg[1])) { | |
592 | unsigned int lbound, ubound, jj; | |
593 | char *end_num; | |
594 | ||
595 | lbound = strtoul(arg+1, &end_num, 10); | |
596 | switch (end_num[0]) { | |
597 | case 0: ubound = lbound; break; | |
598 | case '-': | |
599 | if (end_num[1] == 0) { | |
600 | ubound = old_argc - 1; | |
601 | break; | |
602 | } else if (isdigit(end_num[1])) { | |
603 | ubound = strtoul(end_num+1, NULL, 10); | |
604 | break; | |
605 | } | |
606 | /* else fall through to default case */ | |
607 | default: | |
608 | log_module(MAIN_LOG, LOG_ERROR, "Alias expansion parse error in %s (near %s; %s.%s arg %d).", arg, end_num, cmd->parent->bot->nick, cmd->name, ii); | |
609 | return 0; | |
610 | } | |
611 | if (ubound >= old_argc) | |
612 | ubound = old_argc - 1; | |
613 | if (lbound < old_argc) | |
614 | for (jj = lbound; jj <= ubound; ) | |
615 | new_argv[new_argc++] = old_argv[jj++]; | |
616 | } else { | |
617 | log_module(MAIN_LOG, LOG_ERROR, "Alias expansion: I do not know how to handle %s (%s.%s arg %d).", arg, cmd->parent->bot->nick, cmd->name, ii); | |
618 | return 0; | |
619 | } | |
620 | } | |
621 | return new_argc; | |
622 | } | |
623 | ||
624 | int | |
625 | svccmd_invoke_argv(struct userNode *user, struct service *service, struct chanNode *channel, unsigned int argc, char *argv[], unsigned int server_qualified) { | |
626 | extern struct userNode *chanserv; | |
627 | struct svccmd *cmd; | |
628 | unsigned int cmd_arg, perms, flags, options; | |
629 | char channel_name[CHANNELLEN+1]; | |
630 | ||
631 | /* First check pubcmd for the channel. */ | |
632 | if (channel && (channel->channel_info) && (service->bot == chanserv) | |
633 | && !check_user_level(channel, user, lvlPubCmd, 1, 0)) { | |
634 | send_message(user, service->bot, "MCMSG_PUBLIC_DENY", channel->name); | |
635 | return 0; | |
636 | } | |
637 | ||
638 | options = (server_qualified ? SVCCMD_QUALIFIED : 0) | SVCCMD_DEBIT | SVCCMD_NOISY; | |
639 | /* Find the command argument. */ | |
640 | cmd_arg = IsChannelName(argv[0]) ? 1 : 0; | |
641 | if (argc < cmd_arg+1) { | |
642 | send_message(user, service->bot, "MCMSG_MISSING_COMMAND"); | |
643 | return 0; | |
644 | } | |
645 | if (!isalnum(*argv[cmd_arg])) { | |
646 | /* Silently ignore stuff that doesn't begin with a letter or number. */ | |
647 | return 0; | |
648 | } | |
649 | cmd = dict_find(service->commands, argv[cmd_arg], NULL); | |
650 | if (!cmd) { | |
651 | if (!channel) | |
652 | send_message(user, service->bot, "MSG_COMMAND_UNKNOWN", argv[cmd_arg]); | |
653 | return 0; | |
654 | } | |
655 | flags = cmd->effective_flags; | |
656 | /* If they put a channel name first, check if the command allows | |
657 | * it. If so, swap it with the command name. | |
658 | */ | |
659 | if (cmd_arg == 1) { | |
660 | char *tmp; | |
661 | /* Complain if we're not supposed to accept the channel. */ | |
662 | if (!(flags & MODCMD_ACCEPT_CHANNEL)) { | |
663 | send_message(user, service->bot, "MCMSG_NO_CHANNEL_BEFORE"); | |
664 | return 0; | |
665 | } | |
666 | if (!(flags & MODCMD_ACCEPT_PCHANNEL) | |
667 | && (argv[0][0] == '+')) { | |
668 | send_message(user, service->bot, "MCMSG_NO_PLUS_CHANNEL"); | |
669 | return 0; | |
670 | } | |
671 | tmp = argv[1]; | |
672 | argv[1] = argv[0]; | |
673 | argv[0] = tmp; | |
674 | } | |
675 | ||
676 | /* Try to grab a channel handle before alias expansion. | |
677 | * If the command accepts a channel name, and argv[1] is | |
678 | * one, use it as a channel name, and hide it from logging. | |
679 | */ | |
680 | if ((argc > 1) | |
681 | && (flags & MODCMD_ACCEPT_CHANNEL) | |
682 | && IsChannelName(argv[1]) | |
683 | && ((argv[1][0] != '+') || (flags & MODCMD_ACCEPT_PCHANNEL)) | |
684 | && (channel = dict_find(channels, argv[1], NULL))) { | |
685 | argv[1] = argv[0]; | |
686 | argv++, argc--; | |
687 | cmd_arg = 1; | |
688 | } | |
689 | ||
690 | /* Expand the alias arguments, if there are any. */ | |
691 | if (cmd->alias.used) { | |
692 | char *new_argv[MAXNUMPARAMS]; | |
693 | argc = svccmd_expand_alias(cmd, argc, argv, new_argv); | |
694 | if (!argc) { | |
695 | send_message(service->bot, user, "MCMSG_ALIAS_ERROR", cmd->name); | |
696 | return 0; | |
697 | } | |
698 | argv = new_argv; | |
699 | ||
700 | /* Try again to grab a handle to the channel after alias | |
701 | * expansion, overwriting any previous channel. This should, | |
702 | * of course, only be done again if an alias was acually | |
703 | * expanded. */ | |
704 | if ((argc > 1) | |
705 | && (flags & MODCMD_ACCEPT_CHANNEL) | |
706 | && IsChannelName(argv[1]) | |
707 | && ((argv[1][0] != '+') || (flags & MODCMD_ACCEPT_PCHANNEL)) | |
708 | && (channel = dict_find(channels, argv[1], NULL))) { | |
709 | argv[1] = argv[0]; | |
710 | argv++, argc--; | |
711 | cmd_arg = 1; | |
712 | } | |
713 | } | |
714 | ||
715 | /* Figure out what actions we should do for it.. */ | |
716 | if (cmd_arg && (flags & MODCMD_TOY)) { | |
717 | /* Do not let user manually specify a channel. */ | |
718 | channel = NULL; | |
719 | } | |
720 | if (argc < cmd->command->min_argc) { | |
721 | send_message(user, service->bot, "MSG_MISSING_PARAMS", cmd->name); | |
722 | return 0; | |
723 | } | |
724 | if (!cmd->command->func) { | |
725 | send_message(user, service->bot, "MCMSG_INTERNAL_COMMAND", cmd->name); | |
726 | return 0; | |
727 | } | |
728 | perms = svccmd_can_invoke(user, service->bot, cmd, channel, options); | |
729 | if (!perms) | |
730 | return 0; | |
731 | cmd->uses++; | |
732 | if (perms & ACTION_NOCHANNEL) | |
733 | channel = NULL; | |
734 | ||
735 | if (channel) | |
736 | safestrncpy(channel_name, channel->name, sizeof(channel_name)); | |
737 | else | |
738 | channel_name[0] = 0; | |
739 | if (!cmd->command->func(user, channel, argc, argv, cmd)) | |
740 | return 0; | |
741 | if (!(flags & MODCMD_NO_LOG)) { | |
742 | enum log_severity slvl; | |
743 | if (perms & ACTION_STAFF) | |
744 | slvl = LOG_STAFF; | |
745 | else if (perms & ACTION_OVERRIDE) | |
746 | slvl = LOG_OVERRIDE; | |
747 | else | |
748 | slvl = LOG_COMMAND; | |
749 | /* Unsplit argv after running the function to get the benefit | |
750 | * of any mangling/hiding done by the commands. */ | |
751 | log_audit(cmd->command->parent->clog, slvl, user, service->bot, channel_name, ((flags & MODCMD_LOG_HOSTMASK) ? AUDIT_HOSTMASK : 0), unsplit_string(argv, argc, NULL)); | |
752 | } | |
753 | return 1; | |
754 | } | |
755 | ||
756 | int | |
757 | svccmd_send_help(struct userNode *user, struct userNode *bot, struct svccmd *cmd) { | |
758 | char cmdname[MAXLEN]; | |
759 | unsigned int nn; | |
760 | int r; | |
761 | /* Show command name (in bold). */ | |
762 | for (nn=0; cmd->name[nn]; nn++) | |
763 | cmdname[nn] = toupper(cmd->name[nn]); | |
764 | cmdname[nn] = 0; | |
765 | send_message_type(4, user, bot, "=--- $b%s$b ---=", cmdname); | |
766 | ||
767 | /* Show the help entry for the underlying command. */ | |
768 | /* Lets not show help for a parent command, thats not what | |
769 | * they asked for! | |
770 | * return send_help(user, bot, cmd->command->parent->helpfile, cmd->command->name); | |
771 | * TODO: We actually DO want to show the parent IF there is no other help. | |
772 | */ | |
773 | r = send_help(user, bot, cmd->command->parent->helpfile, cmd->name); | |
774 | ||
775 | /* If it's an alias, show what it's an alias for. */ | |
776 | if (cmd->alias.used) { | |
777 | char alias_text[MAXLEN]; | |
778 | unsplit_string((char**)cmd->alias.list, cmd->alias.used, alias_text); | |
779 | send_message(user, bot, "MCMSG_HELP_COMMAND_ALIAS", alias_text); | |
780 | } | |
781 | return r; | |
782 | } | |
783 | ||
784 | int | |
785 | svccmd_send_help_2(struct userNode *user, struct service *service, const char *topic) { | |
786 | struct module *module; | |
787 | struct svccmd *cmd; | |
788 | unsigned int ii; | |
789 | ||
790 | /* If there is a command, send help for the command */ | |
791 | if ((cmd = dict_find(service->commands, topic, NULL))) | |
792 | return svccmd_send_help(user, service->bot, cmd); | |
793 | ||
794 | /* If there is no topic show the index */ | |
795 | if (!topic) | |
796 | topic = "<index>"; | |
797 | /* look for the thing in the included help files */ | |
798 | for (ii = 0; ii < service->modules.used; ++ii) { | |
799 | module = service->modules.list[ii]; | |
800 | if (!module->helpfile) | |
801 | continue; | |
802 | if (dict_find(module->helpfile->db, topic, NULL)) | |
803 | return send_help(user, service->bot, module->helpfile, topic); | |
804 | } | |
805 | /* Otherwise say we cant find it */ | |
806 | send_message(user, service->bot, "MSG_TOPIC_UNKNOWN"); | |
807 | return 0; | |
808 | } | |
809 | ||
810 | static int | |
811 | svccmd_invoke(struct userNode *user, struct service *service, struct chanNode *channel, char *text, int server_qualified) { | |
812 | unsigned int argc; | |
813 | char *argv[MAXNUMPARAMS]; | |
814 | ||
815 | if (!*text) | |
816 | return 0; | |
817 | if (service->privileged) { | |
818 | if (!IsOper(user)) { | |
819 | send_message(user, service->bot, "MSG_SERVICE_PRIVILEGED", service->bot->nick); | |
820 | return 0; | |
821 | } | |
822 | if (!user->handle_info) { | |
823 | send_message(user, service->bot, "MSG_AUTHENTICATE"); | |
824 | return 0; | |
825 | } | |
826 | if (HANDLE_FLAGGED(user->handle_info, OPER_SUSPENDED)) { | |
827 | send_message(user, service->bot, "MSG_OPER_SUSPENDED"); | |
828 | return 0; | |
829 | } | |
830 | } | |
831 | argc = split_line(text, false, ArrayLength(argv), argv); | |
832 | return argc ? svccmd_invoke_argv(user, service, channel, argc, argv, server_qualified) : 0; | |
833 | } | |
834 | ||
835 | void | |
836 | modcmd_privmsg(struct userNode *user, struct userNode *bot, char *text, int server_qualified) { | |
837 | struct service *service; | |
838 | ||
839 | if (!(service = dict_find(services, bot->nick, NULL))) { | |
840 | log_module(MAIN_LOG, LOG_ERROR, "modcmd_privmsg got privmsg for unhandled service %s, unregistering.", bot->nick); | |
841 | reg_privmsg_func(bot, NULL); | |
842 | return; | |
843 | } | |
844 | ||
845 | if (text[0] == '\x01') { | |
846 | char *term, response[MAXLEN]; | |
847 | ||
848 | text++; /* Skip leading ^A. */ | |
849 | /* Chop off final ^A. */ | |
850 | term = strchr(text, '\x01'); | |
851 | if (!term) | |
852 | return; | |
853 | *term = '\0'; | |
854 | /* Parse out leading text. */ | |
855 | term = strchr(text, ' '); | |
856 | if (term) { | |
857 | *term++ = '\0'; | |
858 | if (!*term) | |
859 | term = NULL; | |
860 | } | |
861 | /* No dict lookup since these are so few. */ | |
862 | if (!irccasecmp(text, "CLIENTINFO")) { | |
863 | /* Use \001 instead of \x01 because apparently \x01C is | |
864 | * interpreted as ASCII FS (\034, decimal 28, hex 1C). | |
865 | */ | |
866 | irc_notice_user(bot, user, "\001CLIENTINFO CLIENTINFO PING TIME USERINFO VERSION\x01"); | |
867 | } else if (!irccasecmp(text, "PING")) { | |
868 | if (term) { | |
869 | snprintf(response, sizeof(response), "\x01PONG %s\x01", term); | |
870 | irc_notice_user(bot, user, response); | |
871 | } else { | |
872 | irc_notice_user(bot,user, "\x01PONG\x01"); | |
873 | } | |
874 | } else if (!irccasecmp(text, "TIME")) { | |
875 | struct tm tm; | |
876 | localtime_r(&now, &tm); | |
877 | strftime(response, sizeof(response), "\x01TIME %a %b %d %H:%M:%S %Y\x01", &tm); | |
878 | irc_notice_user(bot, user, response); | |
879 | } else if (!irccasecmp(text, "USERINFO")) { | |
880 | snprintf(response, sizeof(response), "\x01USERINFO %s\x01", bot->info); | |
881 | irc_notice_user(bot, user, response); | |
882 | } else if (!irccasecmp(text, "VERSION")) { | |
883 | /* This function provides copyright management information | |
884 | * to end users of srvx. You should not alter, disable or | |
885 | * remove this command or its accessibility to normal IRC | |
886 | * users, except to add copyright information pertaining | |
887 | * to changes you make to srvx. | |
888 | */ | |
889 | snprintf(response, sizeof(response), "\x01VERSION %s (%s) %s\x01", PACKAGE_STRING, CODENAME, ""); | |
890 | irc_notice_user(bot, user, response); | |
891 | } | |
892 | return; | |
893 | } | |
894 | ||
895 | if (service->msg_hook && service->msg_hook(user, bot, text, server_qualified)) | |
896 | return; | |
897 | svccmd_invoke(user, service, NULL, text, server_qualified); | |
898 | } | |
899 | ||
900 | void | |
901 | modcmd_chanmsg(struct userNode *user, struct chanNode *chan, char *text, struct userNode *bot) { | |
902 | struct service *service; | |
903 | if (!(service = dict_find(services, bot->nick, NULL))) return; | |
904 | svccmd_invoke(user, service, chan, text, 0); | |
905 | } | |
906 | ||
907 | struct service * | |
908 | service_register(struct userNode *bot) { | |
909 | struct service *service; | |
910 | if ((service = dict_find(services, bot->nick, NULL))) | |
911 | return service; | |
912 | service = calloc(1, sizeof(*service)); | |
913 | module_list_init(&service->modules); | |
914 | service->commands = dict_new(); | |
915 | service->bot = bot; | |
916 | dict_set_free_data(service->commands, free_service_command); | |
917 | dict_insert(services, service->bot->nick, service); | |
918 | reg_privmsg_func(bot, modcmd_privmsg); | |
919 | return service; | |
920 | } | |
921 | ||
922 | struct service * | |
923 | service_find(const char *name) { | |
924 | return dict_find(services, name, NULL); | |
925 | } | |
926 | ||
927 | static void | |
928 | svccmd_insert(struct service *service, char *name, struct svccmd *svccmd, struct modcmd *modcmd) { | |
929 | unsigned int ii; | |
930 | svccmd->parent = service; | |
931 | svccmd->name = name; | |
932 | svccmd->command = modcmd; | |
933 | svccmd->command->bind_count++; | |
934 | dict_insert(service->commands, svccmd->name, svccmd); | |
935 | for (ii=0; ii<service->modules.used; ++ii) { | |
936 | if (service->modules.list[ii] == svccmd->command->parent) break; | |
937 | } | |
938 | if (ii == service->modules.used) { | |
939 | module_list_append(&service->modules, svccmd->command->parent); | |
940 | } | |
941 | } | |
942 | ||
943 | struct svccmd * | |
944 | service_bind_modcmd(struct service *service, struct modcmd *cmd, const char *name) { | |
945 | struct svccmd *svccmd; | |
946 | if ((svccmd = dict_find(service->commands, name, NULL))) { | |
947 | if (svccmd->command == cmd) return svccmd; | |
948 | log_module(MAIN_LOG, LOG_ERROR, "Tried to bind command %s.%s into service %s as %s, but already bound (as %s.%s).", cmd->parent->name, cmd->name, service->bot->nick, name, svccmd->command->parent->name, svccmd->command->name); | |
949 | return NULL; | |
950 | } | |
951 | svccmd = calloc(1, sizeof(*svccmd)); | |
952 | svccmd_insert(service, strdup(name), svccmd, cmd); | |
953 | svccmd_copy_rules(svccmd, cmd->defaults); | |
954 | return svccmd; | |
955 | } | |
956 | ||
957 | static unsigned int | |
958 | service_bind_module(struct service *service, struct module *module) { | |
959 | dict_iterator_t it; | |
960 | struct modcmd *modcmd; | |
961 | unsigned int count; | |
962 | ||
963 | count = 0; | |
964 | for (it = dict_first(module->commands); it; it = iter_next(it)) { | |
965 | modcmd = iter_data(it); | |
966 | if (!((modcmd->flags | modcmd->defaults->flags) & MODCMD_NO_DEFAULT_BIND)) | |
967 | if (service_bind_modcmd(service, modcmd, iter_key(it))) | |
968 | count++; | |
969 | } | |
970 | return count; | |
971 | } | |
972 | ||
973 | /* This MUST return argc if the alias expansion code knows how to deal | |
974 | * with every argument in argv; otherwise, it MUST return the index of | |
975 | * an argument that the expansion code does not know how to deal with. | |
976 | */ | |
977 | static unsigned int | |
978 | check_alias_args(char *argv[], unsigned int argc) { | |
979 | unsigned int arg; | |
980 | ||
981 | for (arg=0; arg<argc; ++arg) { | |
982 | if (argv[arg][0] != '$') { | |
983 | continue; | |
984 | } else if (argv[arg][1] == '$') { | |
985 | continue; | |
986 | } else if (isdigit(argv[arg][1])) { | |
987 | char *end_num; | |
988 | ||
989 | strtoul(argv[arg]+1, &end_num, 10); | |
990 | switch (end_num[0]) { | |
991 | case 0: | |
992 | continue; | |
993 | case '-': | |
994 | if (end_num[1] == 0) | |
995 | continue; | |
996 | else if (isdigit(end_num[1])) | |
997 | continue; | |
998 | /* else fall through to default case */ | |
999 | default: | |
1000 | return arg; | |
1001 | } | |
1002 | } else | |
1003 | return arg; | |
1004 | } | |
1005 | return arg; | |
1006 | } | |
1007 | ||
1008 | static unsigned int | |
1009 | collapse_cmdname(char *argv[], unsigned int argc, char *dest) { | |
1010 | unsigned int ii, pos, arg; | |
1011 | if (!argc) { | |
1012 | dest[0] = 0; | |
1013 | return 0; | |
1014 | } | |
1015 | for (ii=pos=0, arg=0; argv[arg][ii]; ) { | |
1016 | if (argv[arg][ii] == '\\') { | |
1017 | if (argv[arg][ii+1]) { | |
1018 | /* escaping a real character just puts it in literally */ | |
1019 | dest[pos++] = argv[arg][++ii]; | |
1020 | } else if ((arg+1) == argc) { | |
1021 | /* we ran to the end of the argument list; abort */ | |
1022 | break; | |
1023 | } else { | |
1024 | /* escape at end of a word is a space */ | |
1025 | dest[pos++] = ' '; | |
1026 | ii = 0; | |
1027 | arg++; | |
1028 | } | |
1029 | } else { | |
1030 | /* normal characters don't need escapes */ | |
1031 | dest[pos++] = argv[arg][ii++]; | |
1032 | } | |
1033 | } | |
1034 | dest[pos] = 0; | |
1035 | return arg + 1; | |
1036 | } | |
1037 | ||
1038 | static MODCMD_FUNC(cmd_bind) { | |
1039 | struct service *service; | |
1040 | struct svccmd *template, *newcmd; | |
1041 | char *svcname, *dot; | |
1042 | char newname[MAXLEN], cmdname[MAXLEN]; | |
1043 | unsigned int arg, diff; | |
1044 | ||
1045 | assert(argc > 3); | |
1046 | svcname = argv[1]; | |
1047 | arg = collapse_cmdname(argv+2, argc-2, newname) + 2; | |
1048 | if (!arg) { | |
1049 | reply("MSG_MISSING_PARAMS", cmd->name); | |
1050 | return 0; | |
1051 | } | |
1052 | diff = collapse_cmdname(argv+arg, argc-arg, cmdname); | |
1053 | if (!diff) { | |
1054 | reply("MSG_MISSING_PARAMS", cmd->name); | |
1055 | return 0; | |
1056 | } | |
1057 | arg += diff; | |
1058 | ||
1059 | if (!(service = service_find(svcname))) { | |
1060 | reply("MCMSG_UNKNOWN_SERVICE", svcname); | |
1061 | return 0; | |
1062 | } | |
1063 | ||
1064 | if ((newcmd = dict_find(service->commands, newname, NULL))) { | |
1065 | reply("MCMSG_ALREADY_BOUND", service->bot->nick, newname); | |
1066 | return 0; | |
1067 | } | |
1068 | ||
1069 | if ((dot = strchr(cmdname, '.')) && (dot[1] == '*') && (dot[2] == 0)) { | |
1070 | unsigned int count; | |
1071 | struct module *module; | |
1072 | *dot = 0; | |
1073 | module = module_find((cmdname[0] == '*') ? cmdname+1 : cmdname); | |
1074 | if (!module) { | |
1075 | reply("MSG_MODULE_UNKNOWN", cmdname); | |
1076 | return 0; | |
1077 | } | |
1078 | count = service_bind_module(service, module); | |
1079 | reply("MCMSG_MODULE_BOUND", count, module->name, service->bot->nick); | |
1080 | return count != 0; | |
1081 | } | |
1082 | newcmd = calloc(1, sizeof(*newcmd)); | |
1083 | newcmd->name = strdup(newname); | |
1084 | newcmd->parent = service; | |
1085 | if (!(template = svccmd_resolve_name(newcmd, cmdname))) { | |
1086 | reply("MCMSG_UNKNOWN_COMMAND_2", cmdname, service->bot->nick); | |
1087 | free(newcmd->name); | |
1088 | free(newcmd); | |
1089 | return 0; | |
1090 | } | |
1091 | if (template->alias.used) { | |
1092 | reply("MCMSG_CANNOT_DOUBLE_ALIAS"); | |
1093 | free(newcmd->name); | |
1094 | free(newcmd); | |
1095 | return 0; | |
1096 | } | |
1097 | ||
1098 | if (argc > arg) { | |
1099 | /* a more complicated alias; fix it up */ | |
1100 | unsigned int nn; | |
1101 | ||
1102 | arg -= diff; | |
1103 | nn = check_alias_args(argv+arg, argc-arg); | |
1104 | if (nn+arg < argc) { | |
1105 | reply("MCMSG_BAD_ALIAS_ARGUMENT", argv[nn+arg]); | |
1106 | free(newcmd->name); | |
1107 | free(newcmd); | |
1108 | return 0; | |
1109 | } | |
1110 | newcmd->alias.used = newcmd->alias.size = argc-arg; | |
1111 | newcmd->alias.list = calloc(newcmd->alias.size, sizeof(newcmd->alias.list[0])); | |
1112 | for (nn=0; nn<newcmd->alias.used; ++nn) | |
1113 | newcmd->alias.list[nn] = strdup(argv[nn+arg]); | |
1114 | } | |
1115 | ||
1116 | svccmd_insert(service, newcmd->name, newcmd, template->command); | |
1117 | svccmd_copy_rules(newcmd, template); | |
1118 | reply("MCMSG_COMMAND_BOUND", newcmd->name, newcmd->parent->bot->nick); | |
1119 | return 1; | |
1120 | } | |
1121 | ||
1122 | static int | |
1123 | service_recheck_bindings(struct service *service, struct module *module) { | |
1124 | dict_iterator_t it; | |
1125 | struct svccmd *cmd; | |
1126 | ||
1127 | for (it = dict_first(service->commands); it; it = iter_next(it)) { | |
1128 | cmd = iter_data(it); | |
1129 | if (cmd->command->parent == module) return 0; | |
1130 | } | |
1131 | /* No more bindings, remove it from our list. */ | |
1132 | module_list_remove(&service->modules, module); | |
1133 | return 1; | |
1134 | } | |
1135 | ||
1136 | static svccmd_unbind_func_t *suf_list; | |
1137 | unsigned int suf_size, suf_used; | |
1138 | ||
1139 | void | |
1140 | reg_svccmd_unbind_func(svccmd_unbind_func_t handler) { | |
1141 | if (suf_used == suf_size) { | |
1142 | if (suf_size) { | |
1143 | suf_size <<= 1; | |
1144 | suf_list = realloc(suf_list, suf_size*sizeof(svccmd_unbind_func_t)); | |
1145 | } else { | |
1146 | suf_size = 8; | |
1147 | suf_list = malloc(suf_size*sizeof(svccmd_unbind_func_t)); | |
1148 | } | |
1149 | } | |
1150 | suf_list[suf_used++] = handler; | |
1151 | } | |
1152 | ||
1153 | static MODCMD_FUNC(cmd_unbind) { | |
1154 | struct service *service; | |
1155 | struct userNode *bot; | |
1156 | struct svccmd *bound; | |
1157 | struct module *module; | |
1158 | const char *svcname; | |
1159 | unsigned int arg, ii; | |
1160 | char cmdname[MAXLEN]; | |
1161 | ||
1162 | assert(argc > 2); | |
1163 | svcname = argv[1]; | |
1164 | arg = collapse_cmdname(argv+2, argc-2, cmdname) + 2; | |
1165 | if (!arg) { | |
1166 | reply("MSG_MISSING_PARAMS", cmd->name); | |
1167 | return 0; | |
1168 | } | |
1169 | if (!(service = service_find(svcname))) { | |
1170 | reply("MCMSG_UNKNOWN_SERVICE", svcname); | |
1171 | return 0; | |
1172 | } | |
1173 | if (!(bound = dict_find(service->commands, cmdname, NULL))) { | |
1174 | reply("MCMSG_NO_COMMAND_BOUND", service->bot->nick, cmdname); | |
1175 | return 0; | |
1176 | } | |
1177 | if ((bound->command->flags & MODCMD_KEEP_BOUND) && (bound->command->bind_count == 1)) { | |
1178 | reply("MCMSG_UNBIND_PROHIBITED", bound->command->name); | |
1179 | return 0; | |
1180 | } | |
1181 | ||
1182 | for (ii=0; ii<suf_used; ii++) | |
1183 | suf_list[ii](bound); | |
1184 | /* If this command binding is removing itself, we must take care | |
1185 | * not to dereference it after the dict_remove. | |
1186 | */ | |
1187 | bot = cmd->parent->bot; | |
1188 | module = cmd->command->parent; | |
1189 | dict_remove(service->commands, bound->name); | |
1190 | send_message(user, bot, "MCMSG_COMMAND_UNBOUND", cmdname, service->bot->nick); | |
1191 | if (service_recheck_bindings(service, module)) | |
1192 | send_message(user, bot, "MCMSG_HELPFILE_UNBOUND", module->name, module->name); | |
1193 | return 1; | |
1194 | } | |
1195 | ||
1196 | static MODCMD_FUNC(cmd_readhelp) { | |
1197 | const char *modname; | |
1198 | struct module *module; | |
1199 | struct helpfile *old_helpfile; | |
1200 | struct timeval start, stop; | |
1201 | ||
1202 | assert(argc > 1); | |
1203 | modname = argv[1]; | |
1204 | if (!(module = module_find(modname))) { | |
1205 | reply("MSG_MODULE_UNKNOWN", modname); | |
1206 | return 0; | |
1207 | } | |
1208 | if (!module->helpfile_name) { | |
1209 | reply("MCMSG_NO_HELPFILE", module->name); | |
1210 | return 0; | |
1211 | } | |
1212 | old_helpfile = module->helpfile; | |
1213 | gettimeofday(&start, NULL); | |
1214 | module->helpfile = open_helpfile(module->helpfile_name, module->expand_help); | |
1215 | if (!module->helpfile) { | |
1216 | module->helpfile = old_helpfile; | |
1217 | reply("MCMSG_HELPFILE_ERROR", module->helpfile_name); | |
1218 | return 0; | |
1219 | } | |
1220 | if (old_helpfile) close_helpfile(old_helpfile); | |
1221 | gettimeofday(&stop, NULL); | |
1222 | stop.tv_sec -= start.tv_sec; | |
1223 | stop.tv_usec -= start.tv_usec; | |
1224 | if (stop.tv_usec < 0) { | |
1225 | stop.tv_sec -= 1; | |
1226 | stop.tv_usec += 1000000; | |
1227 | } | |
1228 | reply("MCMSG_HELPFILE_READ", module->name, stop.tv_sec, stop.tv_usec/1000); | |
1229 | return 1; | |
1230 | } | |
1231 | ||
1232 | static MODCMD_FUNC(cmd_help) { | |
1233 | const char *topic; | |
1234 | ||
1235 | topic = (argc < 2) ? NULL : unsplit_string(argv+1, argc-1, NULL); | |
1236 | return svccmd_send_help_2(user, cmd->parent, topic); | |
1237 | } | |
1238 | ||
1239 | static MODCMD_FUNC(cmd_timecmd) { | |
1240 | struct timeval start, stop; | |
1241 | char cmd_text[MAXLEN]; | |
1242 | ||
1243 | unsplit_string(argv+1, argc-1, cmd_text); | |
1244 | gettimeofday(&start, NULL); | |
1245 | svccmd_invoke(user, cmd->parent, channel, cmd_text, 0); | |
1246 | gettimeofday(&stop, NULL); | |
1247 | stop.tv_sec -= start.tv_sec; | |
1248 | stop.tv_usec -= start.tv_usec; | |
1249 | if (stop.tv_usec < 0) { | |
1250 | stop.tv_sec -= 1; | |
1251 | stop.tv_usec += 1000000; | |
1252 | } | |
1253 | reply("MCMSG_COMMAND_TIME", cmd_text, stop.tv_sec, stop.tv_usec); | |
1254 | return 1; | |
1255 | } | |
1256 | ||
1257 | static MODCMD_FUNC(cmd_command) { | |
1258 | struct svccmd *svccmd; | |
1259 | const char *cmd_name, *fmt_str; | |
1260 | unsigned int flags, shown_flags, nn, pos; | |
1261 | char buf[MAXLEN]; | |
1262 | ||
1263 | assert(argc >= 2); | |
1264 | cmd_name = unsplit_string(argv+1, argc-1, NULL); | |
1265 | if (!(svccmd = svccmd_resolve_name(cmd, cmd_name))) { | |
1266 | reply("MCMSG_UNKNOWN_COMMAND_2", cmd_name, cmd->parent->bot->nick); | |
1267 | return 0; | |
1268 | } | |
1269 | pos = snprintf(buf, sizeof(buf), "%s.%s", svccmd->command->parent->name, svccmd->command->name); | |
1270 | if (svccmd->alias.used) { | |
1271 | buf[pos++] = ' '; | |
1272 | unsplit_string((char**)svccmd->alias.list+1, svccmd->alias.used-1, buf+pos); | |
1273 | reply("MCMSG_COMMAND_ALIASES", svccmd->name, buf); | |
1274 | } else { | |
1275 | reply("MCMSG_COMMAND_BINDING", svccmd->name, buf); | |
1276 | } | |
1277 | flags = svccmd->effective_flags; | |
1278 | if ((svccmd->parent && svccmd->parent->privileged && !IsOper(user)) | |
1279 | || ((flags & MODCMD_REQUIRE_STAFF) | |
1280 | && !IsOper(user) && !IsNetworkHelper(user) && !IsSupportHelper(user))) { | |
1281 | reply("MCMSG_INSPECTION_REFUSED", svccmd->name); | |
1282 | return 0; | |
1283 | } | |
1284 | if (flags & MODCMD_DISABLED) { | |
1285 | reply("MSG_COMMAND_DISABLED", svccmd->name); | |
1286 | return 1; | |
1287 | } | |
1288 | shown_flags = 0; | |
1289 | if (svccmd->min_opserv_level > 0) { | |
1290 | reply("MCMSG_NEED_OPSERV_LEVEL", svccmd->min_opserv_level); | |
1291 | shown_flags |= MODCMD_REQUIRE_OPER | MODCMD_REQUIRE_AUTHED; | |
1292 | } | |
1293 | if (svccmd->min_channel_access > 0) { | |
1294 | reply("MCMSG_NEED_CHANSERV_LEVEL", svccmd->min_channel_access); | |
1295 | shown_flags |= MODCMD_REQUIRE_CHANUSER | MODCMD_REQUIRE_REGCHAN | MODCMD_REQUIRE_CHANNEL | MODCMD_REQUIRE_AUTHED; | |
1296 | } | |
1297 | if (svccmd->req_account_flags) { | |
1298 | for (nn=pos=0; nn<32; nn++) { | |
1299 | if (!(svccmd->req_account_flags & (1 << nn))) continue; | |
1300 | buf[pos++] = HANDLE_FLAGS[nn]; | |
1301 | } | |
1302 | buf[pos] = 0; | |
1303 | reply("MCMSG_NEED_ACCOUNT_FLAGS", buf); | |
1304 | shown_flags |= MODCMD_REQUIRE_AUTHED; | |
1305 | } | |
1306 | if (!flags && !shown_flags) { | |
1307 | reply("MCMSG_NEED_NOTHING", svccmd->name); | |
1308 | return 1; | |
1309 | } | |
1310 | if (flags & ~shown_flags & MODCMD_REQUIRE_HELPING) { | |
1311 | reply("MCMSG_MUST_BE_HELPING"); | |
1312 | shown_flags |= MODCMD_REQUIRE_AUTHED | MODCMD_REQUIRE_STAFF; | |
1313 | } | |
1314 | if (flags & ~shown_flags & MODCMD_REQUIRE_STAFF) { | |
1315 | switch (flags & MODCMD_REQUIRE_STAFF) { | |
1316 | default: case MODCMD_REQUIRE_STAFF: | |
1317 | fmt_str = "MCMSG_NEED_STAFF_ACCESS"; | |
1318 | break; | |
1319 | case MODCMD_REQUIRE_OPER: | |
1320 | fmt_str = "MCMSG_NEED_STAFF_OPER"; | |
1321 | break; | |
1322 | case MODCMD_REQUIRE_NETWORK_HELPER: | |
1323 | fmt_str = "MCMSG_NEED_STAFF_NETHELPER"; | |
1324 | break; | |
1325 | case MODCMD_REQUIRE_OPER|MODCMD_REQUIRE_NETWORK_HELPER: | |
1326 | fmt_str = "MCMSG_NEED_STAFF_NETHELPER_OR_OPER"; | |
1327 | break; | |
1328 | case MODCMD_REQUIRE_SUPPORT_HELPER: | |
1329 | fmt_str = "MCMSG_NEED_STAFF_SHELPER"; | |
1330 | break; | |
1331 | case MODCMD_REQUIRE_OPER|MODCMD_REQUIRE_SUPPORT_HELPER: | |
1332 | fmt_str = "MCMSG_NEED_STAFF_SHELPER_OR_OPER"; | |
1333 | break; | |
1334 | case MODCMD_REQUIRE_SUPPORT_HELPER|MODCMD_REQUIRE_NETWORK_HELPER: | |
1335 | fmt_str = "MCMSG_NEED_STAFF_HELPER"; | |
1336 | break; | |
1337 | } | |
1338 | reply(fmt_str); | |
1339 | shown_flags |= MODCMD_REQUIRE_AUTHED | MODCMD_REQUIRE_STAFF; | |
1340 | } | |
1341 | if (flags & ~shown_flags & MODCMD_REQUIRE_JOINABLE) { | |
1342 | reply("MCMSG_NEED_JOINABLE"); | |
1343 | shown_flags |= MODCMD_REQUIRE_CHANUSER; | |
1344 | } | |
1345 | if (flags & ~shown_flags & MODCMD_REQUIRE_CHANUSER) { | |
1346 | if (flags & ~shown_flags & MODCMD_IGNORE_CSUSPEND) | |
1347 | reply("MCMSG_NEED_CHANUSER_CSUSPENDABLE"); | |
1348 | else | |
1349 | reply("MCMSG_NEED_CHANUSER"); | |
1350 | shown_flags |= MODCMD_IGNORE_CSUSPEND | MODCMD_REQUIRE_REGCHAN | MODCMD_REQUIRE_CHANNEL | MODCMD_REQUIRE_AUTHED; | |
1351 | } | |
1352 | if (flags & ~shown_flags & MODCMD_REQUIRE_REGCHAN) { | |
1353 | reply("MCMSG_NEED_REGCHAN"); | |
1354 | shown_flags |= MODCMD_REQUIRE_CHANNEL; | |
1355 | } | |
1356 | if (flags & ~shown_flags & MODCMD_REQUIRE_CHANNEL) | |
1357 | reply("MCMSG_NEED_CHANNEL"); | |
1358 | if (flags & ~shown_flags & MODCMD_REQUIRE_AUTHED) | |
1359 | reply("MCMSG_NEED_AUTHED"); | |
1360 | if (flags & ~shown_flags & MODCMD_TOY) | |
1361 | reply("MCMSG_IS_TOY", svccmd->name); | |
1362 | if (flags & ~shown_flags & MODCMD_REQUIRE_QUALIFIED) { | |
1363 | const char *botnick = svccmd->parent ? svccmd->parent->bot->nick : "SomeBot"; | |
1364 | reply("MCMSG_MUST_QUALIFY", botnick, svccmd->name, botnick); | |
1365 | } | |
1366 | reply("MCMSG_END_REQUIREMENTS", svccmd->name); | |
1367 | return 1; | |
1368 | } | |
1369 | ||
1370 | static void | |
1371 | modcmd_describe_command(struct userNode *user, struct svccmd *cmd, struct svccmd *target) { | |
1372 | char buf1[MAXLEN], buf2[MAXLEN]; | |
1373 | unsigned int ii, len, buf1_used, buf2_used; | |
1374 | ||
1375 | if (target->alias.used) { | |
1376 | unsplit_string((char**)target->alias.list, target->alias.used, buf1); | |
1377 | reply("MCMSG_COMMAND_ALIASES", target->name, buf1); | |
1378 | } else { | |
1379 | snprintf(buf1, sizeof(buf1), "%s.%s", target->command->parent->name, target->command->name); | |
1380 | reply("MCMSG_COMMAND_BINDING", target->name, buf1); | |
1381 | } | |
1382 | for (ii = buf1_used = buf2_used = 0; flags[ii].name; ++ii) { | |
1383 | if (target->flags & flags[ii].flag) { | |
1384 | if (buf1_used) | |
1385 | buf1[buf1_used++] = ','; | |
1386 | len = strlen(flags[ii].name); | |
1387 | memcpy(buf1 + buf1_used, flags[ii].name, len); | |
1388 | buf1_used += len; | |
1389 | } else if (target->effective_flags & flags[ii].flag) { | |
1390 | if (buf2_used) | |
1391 | buf2[buf2_used++] = ','; | |
1392 | len = strlen(flags[ii].name); | |
1393 | memcpy(buf2 + buf2_used, flags[ii].name, len); | |
1394 | buf2_used += len; | |
1395 | } | |
1396 | } | |
1397 | if (buf1_used) | |
1398 | buf1[buf1_used] = '\0'; | |
1399 | else | |
1400 | strcpy(buf1, user_find_message(user, "MSG_NONE")); | |
1401 | if (buf2_used) | |
1402 | buf2[buf2_used] = '\0'; | |
1403 | else | |
1404 | strcpy(buf2, user_find_message(user, "MSG_NONE")); | |
1405 | reply("MCMSG_COMMAND_FLAGS", buf1, buf2); | |
1406 | for (ii = buf1_used = buf2_used = 0; handle_flags[ii]; ++ii) { | |
1407 | if (target->req_account_flags & (1 << ii)) | |
1408 | buf1[buf1_used++] = handle_flags[ii]; | |
1409 | else if (target->deny_account_flags & (1 << ii)) | |
1410 | buf2[buf2_used++] = handle_flags[ii]; | |
1411 | } | |
1412 | buf1[buf1_used] = buf2[buf2_used] = '\0'; | |
1413 | reply("MCMSG_COMMAND_ACCOUNT_FLAGS", buf1, buf2); | |
1414 | reply("MCMSG_COMMAND_ACCESS_LEVEL", target->min_channel_access, target->min_opserv_level); | |
1415 | reply("MCMSG_COMMAND_USES", target->name, target->uses); | |
1416 | } | |
1417 | ||
1418 | static MODCMD_FUNC(cmd_modcmd) { | |
1419 | struct svccmd *svccmd; | |
1420 | unsigned int arg, changed; | |
1421 | char cmdname[MAXLEN]; | |
1422 | ||
1423 | assert(argc >= 2); | |
1424 | arg = collapse_cmdname(argv+1, argc-1, cmdname) + 1; | |
1425 | if (!arg) { | |
1426 | reply("MSG_MISSING_PARAMS", cmd->name); | |
1427 | return 0; | |
1428 | } | |
1429 | if (!(svccmd = svccmd_resolve_name(cmd, cmdname))) { | |
1430 | reply("MCMSG_UNKNOWN_COMMAND_2", cmdname, cmd->parent->bot->nick); | |
1431 | return 0; | |
1432 | } | |
1433 | for (changed = 0; arg+1 < argc; arg += 2) { | |
1434 | if (svccmd_configure(svccmd, user, cmd->parent->bot, argv[arg], argv[arg+1])) { | |
1435 | reply("MCMSG_COMMAND_MODIFIED", argv[arg], svccmd->name); | |
1436 | changed = 1; | |
1437 | } | |
1438 | } | |
1439 | if (changed) | |
1440 | modcmd_set_effective_flags(svccmd); | |
1441 | modcmd_describe_command(user, cmd, svccmd); | |
1442 | return changed; | |
1443 | } | |
1444 | ||
1445 | static MODCMD_FUNC(cmd_god) { | |
1446 | int helping; | |
1447 | ||
1448 | if (argc > 1) { | |
1449 | if (enabled_string(argv[1])) { | |
1450 | if (HANDLE_FLAGGED(user->handle_info, HELPING)) { | |
1451 | reply("MCMSG_ALREADY_HELPING"); | |
1452 | return 0; | |
1453 | } | |
1454 | helping = 1; | |
1455 | } else if (disabled_string(argv[1])) { | |
1456 | if (!HANDLE_FLAGGED(user->handle_info, HELPING)) { | |
1457 | reply("MCMSG_ALREADY_NOT_HELPING"); | |
1458 | return 0; | |
1459 | } | |
1460 | helping = 0; | |
1461 | } else { | |
1462 | reply("MSG_INVALID_BINARY", argv[1]); | |
1463 | return 0; | |
1464 | } | |
1465 | } else { | |
1466 | helping = !IsHelping(user); | |
1467 | } | |
1468 | ||
1469 | if (helping) { | |
1470 | HANDLE_SET_FLAG(user->handle_info, HELPING); | |
1471 | reply("MCMSG_NOW_HELPING"); | |
1472 | } else { | |
1473 | HANDLE_CLEAR_FLAG(user->handle_info, HELPING); | |
1474 | reply("MCMSG_NOW_NOT_HELPING"); | |
1475 | } | |
1476 | ||
1477 | return 1; | |
1478 | } | |
1479 | ||
1480 | static MODCMD_FUNC(cmd_joiner) { | |
1481 | char cmdname[MAXLEN]; | |
1482 | ||
1483 | if (argc < 2) { | |
1484 | int len = sprintf(cmdname, "%s ", cmd->name); | |
1485 | dict_iterator_t it; | |
1486 | struct string_buffer sbuf; | |
1487 | ||
1488 | string_buffer_init(&sbuf); | |
1489 | for (it = dict_first(cmd->parent->commands); it; it = iter_next(it)) { | |
1490 | if (!ircncasecmp(iter_key(it), cmdname, len)) { | |
1491 | if (sbuf.used) string_buffer_append_string(&sbuf, ", "); | |
1492 | string_buffer_append_string(&sbuf, iter_key(it)); | |
1493 | } | |
1494 | } | |
1495 | if (!sbuf.used) string_buffer_append(&sbuf, 0); | |
1496 | reply("MCMSG_JOINER_CHOICES", cmd->name, sbuf.list); | |
1497 | string_buffer_clean(&sbuf); | |
1498 | return 1; | |
1499 | } | |
1500 | sprintf(cmdname, "%s %s", cmd->name, argv[1]); | |
1501 | argv[1] = cmdname; | |
1502 | svccmd_invoke_argv(user, cmd->parent, channel, argc-1, argv+1, 0); | |
1503 | return 0; /* never try to log this; the recursive one logs it */ | |
1504 | } | |
1505 | ||
1506 | static MODCMD_FUNC(cmd_stats_modules) { | |
1507 | struct helpfile_table tbl; | |
1508 | dict_iterator_t it; | |
1509 | unsigned int ii; | |
1510 | struct module *mod; | |
1511 | struct modcmd *modcmd; | |
1512 | ||
1513 | if (argc < 2) { | |
1514 | tbl.length = dict_size(modules) + 1; | |
1515 | tbl.width = 3; | |
1516 | tbl.flags = TABLE_PAD_LEFT; | |
1517 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1518 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1519 | tbl.contents[0][0] = "Module"; | |
1520 | tbl.contents[0][1] = "Commands"; | |
1521 | tbl.contents[0][2] = "Helpfile"; | |
1522 | for (ii=1, it=dict_first(modules); it; it=iter_next(it), ii++) { | |
1523 | mod = iter_data(it); | |
1524 | tbl.contents[ii] = calloc(tbl.width, sizeof(tbl.contents[ii][0])); | |
1525 | tbl.contents[ii][0] = mod->name; | |
1526 | tbl.contents[ii][1] = strtab(dict_size(mod->commands)); | |
1527 | tbl.contents[ii][2] = mod->helpfile_name ? mod->helpfile_name : "(none)"; | |
1528 | } | |
1529 | } else if (!(mod = dict_find(modules, argv[1], NULL))) { | |
1530 | reply("MCMSG_UNKNOWN_MODULE", argv[1]); | |
1531 | return 0; | |
1532 | } else { | |
1533 | reply("MCMSG_MODULE_INFO", mod->name); | |
1534 | tbl.length = dict_size(mod->commands) + 1; | |
1535 | tbl.width = 3; | |
1536 | tbl.flags = TABLE_PAD_LEFT; | |
1537 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1538 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1539 | tbl.contents[0][0] = "Command"; | |
1540 | tbl.contents[0][1] = "Min. Args"; | |
1541 | tbl.contents[0][2] = "Bind Count"; | |
1542 | for (ii=1, it=dict_first(mod->commands); it; it=iter_next(it), ii++) { | |
1543 | modcmd = iter_data(it); | |
1544 | tbl.contents[ii] = calloc(tbl.width, sizeof(tbl.contents[ii][0])); | |
1545 | tbl.contents[ii][0] = modcmd->name; | |
1546 | tbl.contents[ii][1] = strtab(modcmd->min_argc); | |
1547 | tbl.contents[ii][2] = strtab(modcmd->bind_count); | |
1548 | } | |
1549 | } | |
1550 | table_send(cmd->parent->bot, user->nick, 0, 0, tbl); | |
1551 | return 0; | |
1552 | } | |
1553 | ||
1554 | static MODCMD_FUNC(cmd_stats_services) { | |
1555 | struct helpfile_table tbl; | |
1556 | dict_iterator_t it; | |
1557 | unsigned int ii; | |
1558 | struct service *service; | |
1559 | struct svccmd *svccmd; | |
1560 | char *extra; | |
1561 | ||
1562 | if (argc < 2) { | |
1563 | tbl.length = dict_size(services) + 1; | |
1564 | tbl.width = 4; | |
1565 | tbl.flags = TABLE_PAD_LEFT; | |
1566 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1567 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1568 | tbl.contents[0][0] = "Service"; | |
1569 | tbl.contents[0][1] = "Commands"; | |
1570 | tbl.contents[0][2] = "Priv'd?"; | |
1571 | tbl.contents[0][3] = "Trigger"; | |
1572 | extra = calloc(2, tbl.length); | |
1573 | for (ii=1, it=dict_first(services); it; it=iter_next(it), ii++) { | |
1574 | service = iter_data(it); | |
1575 | tbl.contents[ii] = calloc(tbl.width, sizeof(tbl.contents[ii][0])); | |
1576 | tbl.contents[ii][0] = service->bot->nick; | |
1577 | tbl.contents[ii][1] = strtab(dict_size(service->commands)); | |
1578 | tbl.contents[ii][2] = service->privileged ? "yes" : "no"; | |
1579 | extra[ii*2] = service->trigger; | |
1580 | tbl.contents[ii][3] = extra+ii*2; | |
1581 | } | |
1582 | table_send(cmd->parent->bot, user->nick, 0, 0, tbl); | |
1583 | free(extra); | |
1584 | return 0; | |
1585 | } else if (!(service = dict_find(services, argv[1], NULL))) { | |
1586 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1587 | return 0; | |
1588 | } else { | |
1589 | tbl.length = dict_size(service->commands) + 1; | |
1590 | tbl.width = 5; | |
1591 | tbl.flags = TABLE_PAD_LEFT | TABLE_NO_FREE; | |
1592 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1593 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1594 | tbl.contents[0][0] = "Command"; | |
1595 | tbl.contents[0][1] = "Module"; | |
1596 | tbl.contents[0][2] = "ModCmd"; | |
1597 | tbl.contents[0][3] = "Alias?"; | |
1598 | tbl.contents[0][4] = strdup("Uses"); | |
1599 | for (ii=1, it=dict_first(service->commands); it; it=iter_next(it), ii++) { | |
1600 | svccmd = iter_data(it); | |
1601 | tbl.contents[ii] = calloc(tbl.width, sizeof(tbl.contents[ii][0])); | |
1602 | tbl.contents[ii][0] = svccmd->name; | |
1603 | tbl.contents[ii][1] = svccmd->command->parent->name; | |
1604 | tbl.contents[ii][2] = svccmd->command->name; | |
1605 | tbl.contents[ii][3] = svccmd->alias.used ? "yes" : "no"; | |
1606 | tbl.contents[ii][4] = extra = malloc(12); | |
1607 | sprintf(extra, "%u", svccmd->uses); | |
1608 | } | |
1609 | reply("MCMSG_SERVICE_INFO", service->bot->nick); | |
1610 | table_send(cmd->parent->bot, user->nick, 0, 0, tbl); | |
1611 | for (ii=0; ii<tbl.length; ii++) { | |
1612 | free((char*)tbl.contents[ii][4]); | |
1613 | free(tbl.contents[ii]); | |
1614 | } | |
1615 | free(tbl.contents); | |
1616 | return 0; | |
1617 | } | |
1618 | } | |
1619 | ||
1620 | static MODCMD_FUNC(cmd_showcommands) { | |
1621 | struct svccmd_list commands; | |
1622 | struct helpfile_table tbl; | |
1623 | struct svccmd *svccmd; | |
1624 | dict_iterator_t it; | |
1625 | unsigned int ii, ignore_flags = 0; | |
1626 | unsigned int max_opserv_level = 1000; | |
1627 | unsigned short max_chanserv_level = 500; | |
1628 | char show_opserv_level = 0, show_channel_access = 0; | |
1629 | ||
1630 | /* Check to see what the max access they want to see is. */ | |
1631 | for (ii=1; ii<argc; ++ii) { | |
1632 | if (isdigit(argv[ii][0])) | |
1633 | max_opserv_level = atoi(argv[ii]); | |
1634 | else | |
1635 | max_chanserv_level = user_level_from_name(argv[ii], UL_OWNER); | |
1636 | } | |
1637 | ||
1638 | /* Find the matching commands. */ | |
1639 | svccmd_list_init(&commands); | |
1640 | if (cmd->parent->privileged) | |
1641 | ignore_flags = MODCMD_REQUIRE_OPER; | |
1642 | for (it = dict_first(cmd->parent->commands); it; it = iter_next(it)) { | |
1643 | svccmd = iter_data(it); | |
1644 | if (strchr(svccmd->name, ' ')) | |
1645 | continue; | |
1646 | if (!svccmd_can_invoke(user, svccmd->parent->bot, svccmd, channel, SVCCMD_QUALIFIED)) | |
1647 | continue; | |
1648 | if (svccmd->min_opserv_level > max_opserv_level) | |
1649 | continue; | |
1650 | if (svccmd->min_channel_access > max_chanserv_level) | |
1651 | continue; | |
1652 | if (svccmd->min_opserv_level > 0) | |
1653 | show_opserv_level = 1; | |
1654 | if (svccmd->min_channel_access > 0) | |
1655 | show_channel_access = 1; | |
1656 | if (svccmd->effective_flags | |
1657 | & (MODCMD_REQUIRE_STAFF|MODCMD_REQUIRE_HELPING) | |
1658 | & ~ignore_flags) { | |
1659 | show_channel_access = 1; | |
1660 | } | |
1661 | svccmd_list_append(&commands, svccmd); | |
1662 | } | |
1663 | ||
1664 | /* Build the table. */ | |
1665 | tbl.length = commands.used + 1; | |
1666 | tbl.width = 1 + show_opserv_level + show_channel_access; | |
1667 | tbl.flags = TABLE_REPEAT_ROWS; | |
1668 | tbl.contents = calloc(tbl.length, sizeof(tbl.contents[0])); | |
1669 | tbl.contents[0] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1670 | tbl.contents[0][ii = 0] = "Command"; | |
1671 | if (show_opserv_level) | |
1672 | tbl.contents[0][++ii] = "OpServ Level"; | |
1673 | if (show_channel_access) | |
1674 | tbl.contents[0][++ii] = "ChanServ Access"; | |
1675 | for (ii=0; ii<commands.used; ++ii) { | |
1676 | svccmd = commands.list[ii]; | |
1677 | tbl.contents[ii+1] = calloc(tbl.width, sizeof(tbl.contents[0][0])); | |
1678 | tbl.contents[ii+1][0] = svccmd->name; | |
1679 | if (show_opserv_level) | |
1680 | tbl.contents[ii+1][1] = strtab(svccmd->min_opserv_level); | |
1681 | if (show_channel_access) { | |
1682 | const char *access; | |
1683 | int flags = svccmd->effective_flags; | |
1684 | if (flags & MODCMD_REQUIRE_HELPING) | |
1685 | access = "helping"; | |
1686 | else if (flags & MODCMD_REQUIRE_STAFF) { | |
1687 | switch (flags & MODCMD_REQUIRE_STAFF) { | |
1688 | case MODCMD_REQUIRE_OPER: access = "oper"; break; | |
1689 | case MODCMD_REQUIRE_OPER | MODCMD_REQUIRE_NETWORK_HELPER: | |
1690 | case MODCMD_REQUIRE_NETWORK_HELPER: access = "net.helper"; break; | |
1691 | default: access = "staff"; break; | |
1692 | } | |
1693 | } else | |
1694 | access = strtab(svccmd->min_channel_access); | |
1695 | tbl.contents[ii+1][1+show_opserv_level] = access; | |
1696 | } | |
1697 | } | |
1698 | svccmd_list_clean(&commands); | |
1699 | table_send(cmd->parent->bot, user->nick, 0, 0, tbl); | |
1700 | return 0; | |
1701 | } | |
1702 | ||
1703 | static MODCMD_FUNC(cmd_helpfiles) { | |
1704 | struct service *service; | |
1705 | unsigned int ii; | |
1706 | ||
1707 | if (!(service = dict_find(services, argv[1], NULL))) { | |
1708 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1709 | return 0; | |
1710 | } | |
1711 | ||
1712 | if (argc < 3) { | |
1713 | for (ii=0; ii<service->modules.used; ++ii) | |
1714 | reply("MCMSG_HELPFILE_SEQUENCE", ii+1, service->modules.list[ii]->name); | |
1715 | return 0; | |
1716 | } | |
1717 | ||
1718 | service->modules.used = 0; | |
1719 | for (ii=0; ii<argc-2; ii++) { | |
1720 | struct module *module = dict_find(modules, argv[ii+2], NULL); | |
1721 | if (!module) { | |
1722 | reply("MCMSG_UNKNOWN_MODULE", argv[ii+2]); | |
1723 | continue; | |
1724 | } | |
1725 | module_list_append(&service->modules, module); | |
1726 | } | |
1727 | reply("MCMSG_HELPFILE_SEQUENCE_SET", service->bot->nick); | |
1728 | return 1; | |
1729 | } | |
1730 | ||
1731 | static MODCMD_FUNC(cmd_service_add) { | |
1732 | const char *nick, *hostname, *desc; | |
1733 | struct userNode *bot; | |
1734 | ||
1735 | nick = argv[1]; | |
1736 | if (!is_valid_nick(nick)) { | |
1737 | reply("MCMSG_BAD_SERVICE_NICK", nick); | |
1738 | return 0; | |
1739 | } | |
1740 | hostname = argv[2]; | |
1741 | desc = unsplit_string(argv+3, argc-3, NULL); | |
1742 | bot = GetUserH(nick); | |
1743 | if (bot && IsService(bot)) { | |
1744 | reply("MCMSG_ALREADY_SERVICE", bot->nick); | |
1745 | return 0; | |
1746 | } | |
1747 | bot = AddService(nick, NULL, desc, hostname); | |
1748 | service_register(bot); | |
1749 | reply("MCMSG_NEW_SERVICE", bot->nick); | |
1750 | return 1; | |
1751 | } | |
1752 | ||
1753 | static MODCMD_FUNC(cmd_service_rename) { | |
1754 | struct service *service; | |
1755 | ||
1756 | if (!(service = service_find(argv[1]))) { | |
1757 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1758 | return 0; | |
1759 | } | |
1760 | NickChange(service->bot, argv[2], 0); | |
1761 | reply("MCMSG_SERVICE_RENAMED", service->bot->nick); | |
1762 | return 1; | |
1763 | } | |
1764 | ||
1765 | static MODCMD_FUNC(cmd_service_trigger) { | |
1766 | struct userNode *bogon; | |
1767 | struct service *service; | |
1768 | ||
1769 | if (!(service = service_find(argv[1]))) { | |
1770 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1771 | return 0; | |
1772 | } | |
1773 | if (argc < 3) { | |
1774 | if (service->trigger) | |
1775 | reply("MCMSG_CURRENT_TRIGGER", service->bot->nick, service->trigger); | |
1776 | else | |
1777 | reply("MCMSG_NO_TRIGGER", service->bot->nick); | |
1778 | return 1; | |
1779 | } | |
1780 | if (service->trigger) | |
1781 | reg_chanmsg_func(service->trigger, NULL, NULL); | |
1782 | if (!irccasecmp(argv[2], "none") || !irccasecmp(argv[2], "remove")) { | |
1783 | service->trigger = 0; | |
1784 | reply("MCMSG_REMOVED_TRIGGER", service->bot->nick); | |
1785 | } else if ((bogon = get_chanmsg_bot(argv[2][0]))) { | |
1786 | reply("MCMSG_DUPLICATE_TRIGGER", bogon->nick, argv[2][0]); | |
1787 | return 1; | |
1788 | } else { | |
1789 | service->trigger = argv[2][0]; | |
1790 | reg_chanmsg_func(service->trigger, service->bot, modcmd_chanmsg); | |
1791 | reply("MCMSG_NEW_TRIGGER", service->bot->nick, service->trigger); | |
1792 | } | |
1793 | return 1; | |
1794 | } | |
1795 | ||
1796 | static MODCMD_FUNC(cmd_service_privileged) { | |
1797 | struct service *service; | |
1798 | const char *newval; | |
1799 | ||
1800 | if (!(service = service_find(argv[1]))) { | |
1801 | reply("MCMSG_UNKNOWN_SERVICE", argv[1]); | |
1802 | return 0; | |
1803 | } | |
1804 | if (argc >= 3) | |
1805 | service->privileged = true_string(argv[2]) || enabled_string(argv[2]); | |
1806 | newval = user_find_message(user, service->privileged ? "MSG_ON" : "MSG_OFF"); | |
1807 | reply("MCMSG_SERVICE_PRIVILEGED", service->bot->nick, newval); | |
1808 | return 1; | |
1809 | } | |
1810 | ||
1811 | static MODCMD_FUNC(cmd_service_remove) { | |
1812 | char *name, *reason; | |
1813 | struct service *service; | |
1814 | ||
1815 | name = argv[1]; | |
1816 | if (argc > 2) | |
1817 | reason = unsplit_string(argv+2, argc-2, NULL); | |
1818 | else | |
1819 | reason = "Removing bot"; | |
1820 | if (!(service = service_find(name))) { | |
1821 | reply("MCMSG_UNKNOWN_SERVICE", name); | |
1822 | return 0; | |
1823 | } | |
1824 | DelUser(service->bot, NULL, 1, reason); | |
1825 | reply("MCMSG_SERVICE_REMOVED", name); | |
1826 | dict_remove(services, name); | |
1827 | return 1; | |
1828 | } | |
1829 | ||
1830 | static MODCMD_FUNC(cmd_dump_messages) { | |
1831 | const char *fname = "strings.db"; | |
1832 | struct saxdb_context *ctx; | |
1833 | dict_iterator_t it; | |
1834 | FILE *pf; | |
1835 | int res; | |
1836 | ||
1837 | if (!(pf = fopen(fname, "w"))) { | |
1838 | reply("MCMSG_FILE_NOT_OPENED", fname); | |
1839 | return 0; | |
1840 | } | |
1841 | if (!(ctx = saxdb_open_context(pf))) { | |
1842 | reply("MSG_INTERNAL_FAILURE"); | |
1843 | return 0; | |
1844 | } | |
1845 | if ((res = setjmp(ctx->jbuf)) != 0) { | |
1846 | ctx->complex.used = 0; /* to avoid false assert()s in close */ | |
1847 | saxdb_close_context(ctx); | |
1848 | fclose(pf); | |
1849 | reply("MCMSG_MESSAGE_DUMP_FAILED", strerror(res)); | |
1850 | return 0; | |
1851 | } else { | |
1852 | for (it = dict_first(lang_C->messages); it; it = iter_next(it)) | |
1853 | saxdb_write_string(ctx, iter_key(it), iter_data(it)); | |
1854 | saxdb_close_context(ctx); | |
1855 | fclose(pf); | |
1856 | reply("MCMSG_MESSAGES_DUMPED", fname); | |
1857 | return 1; | |
1858 | } | |
1859 | } | |
1860 | ||
1861 | static MODCMD_FUNC(cmd_version) { | |
1862 | /* This function provides copyright management information to end | |
1863 | * users of srvx. You should not alter, disable or remove this | |
1864 | * command or its accessibility to normal IRC users, except to add | |
1865 | * copyright information pertaining to changes you make to srvx. | |
1866 | */ | |
1867 | send_message_type(4, user, cmd->parent->bot, "$b"PACKAGE_STRING"$b ("CODENAME"), Built: "__DATE__", "__TIME__".\nCopyright 2000-2004 srvx Development Team.\nThe srvx Development Team includes Paul Chang, Adrian Dewhurst, Miles Peterson, Michael Poole and others.\nThe srvx Development Team can be reached at http://sf.net/projects/srvx/ or in #srvx on irc.gamesurge.net."); | |
1868 | return 1; | |
1869 | } | |
1870 | ||
1871 | ||
1872 | void | |
1873 | modcmd_nick_change(struct userNode *user, const char *old_nick) { | |
1874 | struct service *svc; | |
1875 | if (!(svc = dict_find(services, old_nick, NULL))) | |
1876 | return; | |
1877 | dict_remove2(services, old_nick, 1); | |
1878 | dict_insert(services, user->nick, svc); | |
1879 | } | |
1880 | ||
1881 | void | |
1882 | modcmd_cleanup(void) { | |
1883 | dict_delete(services); | |
1884 | dict_delete(modules); | |
1885 | if (suf_list) | |
1886 | free(suf_list); | |
1887 | } | |
1888 | ||
1889 | static void | |
1890 | modcmd_saxdb_write_command(struct saxdb_context *ctx, struct svccmd *cmd) { | |
1891 | char buf[MAXLEN]; | |
1892 | unsigned int nn, len, pos; | |
1893 | struct svccmd *template = cmd->command->defaults; | |
1894 | ||
1895 | saxdb_start_record(ctx, cmd->name, 0); | |
1896 | sprintf(buf, "%s.%s", cmd->command->parent->name, cmd->command->name); | |
1897 | saxdb_write_string(ctx, "command", buf); | |
1898 | if (cmd->alias.used) | |
1899 | saxdb_write_string_list(ctx, "aliased", &cmd->alias); | |
1900 | if (cmd->min_opserv_level != template->min_opserv_level) | |
1901 | saxdb_write_int(ctx, "oper_access", cmd->min_opserv_level); | |
1902 | if (cmd->min_channel_access != template->min_channel_access) | |
1903 | saxdb_write_int(ctx, "channel_access", cmd->min_channel_access); | |
1904 | if (cmd->flags != template->flags) { | |
1905 | if (cmd->flags) { | |
1906 | for (nn=pos=0; flags[nn].name; ++nn) { | |
1907 | if (cmd->flags & flags[nn].flag) { | |
1908 | buf[pos++] = '+'; | |
1909 | len = strlen(flags[nn].name); | |
1910 | memcpy(buf+pos, flags[nn].name, len); | |
1911 | pos += len; | |
1912 | buf[pos++] = ','; | |
1913 | } | |
1914 | } | |
1915 | } else { | |
1916 | pos = 1; | |
1917 | } | |
1918 | buf[--pos] = 0; | |
1919 | saxdb_write_string(ctx, "flags", buf); | |
1920 | } | |
1921 | if ((cmd->req_account_flags != template->req_account_flags) | |
1922 | || (cmd->deny_account_flags != template->req_account_flags)) { | |
1923 | pos = 0; | |
1924 | if (cmd->req_account_flags) { | |
1925 | buf[pos++] = '+'; | |
1926 | for (nn=0; nn<32; nn++) | |
1927 | if (cmd->req_account_flags & (1 << nn)) | |
1928 | buf[pos++] = handle_flags[nn]; | |
1929 | } | |
1930 | if (cmd->deny_account_flags) { | |
1931 | buf[pos++] = '-'; | |
1932 | for (nn=0; nn<32; nn++) | |
1933 | if (cmd->deny_account_flags & (1 << nn)) | |
1934 | buf[pos++] = handle_flags[nn]; | |
1935 | } | |
1936 | buf[pos] = 0; | |
1937 | saxdb_write_string(ctx, "account_flags", buf); | |
1938 | } | |
1939 | saxdb_end_record(ctx); | |
1940 | } | |
1941 | ||
1942 | static int | |
1943 | modcmd_saxdb_write(struct saxdb_context *ctx) { | |
1944 | struct string_list slist; | |
1945 | dict_iterator_t it, it2; | |
1946 | struct service *service; | |
1947 | unsigned int ii; | |
1948 | ||
1949 | saxdb_start_record(ctx, "bots", 1); | |
1950 | for (it = dict_first(services); it; it = iter_next(it)) { | |
1951 | char buff[16]; | |
1952 | service = iter_data(it); | |
1953 | saxdb_start_record(ctx, service->bot->nick, 1); | |
1954 | if (service->trigger) { | |
1955 | buff[0] = service->trigger; | |
1956 | buff[1] = '\0'; | |
1957 | saxdb_write_string(ctx, "trigger", buff); | |
1958 | } | |
1959 | saxdb_write_string(ctx, "description", service->bot->info); | |
1960 | saxdb_write_string(ctx, "hostname", service->bot->hostname); | |
1961 | if (service->privileged) | |
1962 | saxdb_write_string(ctx, "privileged", "1"); | |
1963 | saxdb_end_record(ctx); | |
1964 | } | |
1965 | saxdb_end_record(ctx); | |
1966 | ||
1967 | saxdb_start_record(ctx, "services", 1); | |
1968 | for (it = dict_first(services); it; it = iter_next(it)) { | |
1969 | service = iter_data(it); | |
1970 | saxdb_start_record(ctx, service->bot->nick, 1); | |
1971 | for (it2 = dict_first(service->commands); it2; it2 = iter_next(it2)) | |
1972 | modcmd_saxdb_write_command(ctx, iter_data(it2)); | |
1973 | saxdb_end_record(ctx); | |
1974 | } | |
1975 | saxdb_end_record(ctx); | |
1976 | ||
1977 | saxdb_start_record(ctx, "helpfiles", 1); | |
1978 | slist.size = 0; | |
1979 | for (it = dict_first(services); it; it = iter_next(it)) { | |
1980 | service = iter_data(it); | |
1981 | slist.used = 0; | |
1982 | for (ii = 0; ii < service->modules.used; ++ii) | |
1983 | string_list_append(&slist, service->modules.list[ii]->name); | |
1984 | saxdb_write_string_list(ctx, iter_key(it), &slist); | |
1985 | } | |
1986 | if (slist.list) | |
1987 | free(slist.list); | |
1988 | saxdb_end_record(ctx); | |
1989 | ||
1990 | return 0; | |
1991 | } | |
1992 | ||
1993 | static int | |
1994 | append_entry(const char *key, UNUSED_ARG(void *data), void *extra) { | |
1995 | struct helpfile_expansion *exp = extra; | |
1996 | int row = exp->value.table.length++; | |
1997 | exp->value.table.contents[row] = calloc(1, sizeof(char*)); | |
1998 | exp->value.table.contents[row][0] = key; | |
1999 | return 0; | |
2000 | } | |
2001 | ||
2002 | static struct helpfile_expansion | |
2003 | modcmd_expand(const char *variable) { | |
2004 | struct helpfile_expansion exp; | |
2005 | extern struct userNode *message_source; | |
2006 | struct service *service; | |
2007 | ||
2008 | service = dict_find(services, message_source->nick, NULL); | |
2009 | if (!irccasecmp(variable, "index")) { | |
2010 | exp.type = HF_TABLE; | |
2011 | exp.value.table.length = 1; | |
2012 | exp.value.table.width = 1; | |
2013 | exp.value.table.flags = TABLE_REPEAT_ROWS; | |
2014 | exp.value.table.contents = calloc(dict_size(service->commands)+1, sizeof(char**)); | |
2015 | exp.value.table.contents[0] = calloc(1, sizeof(char*)); | |
2016 | exp.value.table.contents[0][0] = "Commands:"; | |
2017 | dict_foreach(service->commands, append_entry, &exp); | |
2018 | return exp; | |
2019 | } else if (!irccasecmp(variable, "languages")) { | |
2020 | struct string_buffer sbuf; | |
2021 | dict_iterator_t it; | |
2022 | sbuf.used = sbuf.size = 0; | |
2023 | sbuf.list = NULL; | |
2024 | for (it = dict_first(languages); it; it = iter_next(it)) { | |
2025 | string_buffer_append_string(&sbuf, iter_key(it)); | |
2026 | string_buffer_append(&sbuf, ' '); | |
2027 | } | |
2028 | sbuf.list[--sbuf.used] = 0; | |
2029 | exp.type = HF_STRING; | |
2030 | exp.value.str = sbuf.list; | |
2031 | return exp; | |
2032 | } | |
2033 | exp.type = HF_STRING; | |
2034 | exp.value.str = NULL; | |
2035 | return exp; | |
2036 | } | |
2037 | ||
2038 | static void | |
2039 | modcmd_load_bots(struct dict *db, int default_nick) { | |
2040 | dict_iterator_t it; | |
2041 | ||
2042 | for (it = dict_first(db); it; it = iter_next(it)) { | |
2043 | struct record_data *rd; | |
2044 | struct service *svc; | |
2045 | const char *nick, *desc, *hostname; | |
2046 | ||
2047 | rd = iter_data(it); | |
2048 | if (rd->type != RECDB_OBJECT) { | |
2049 | log_module(MAIN_LOG, LOG_ERROR, "Bad type for 'bots/%s' in modcmd db (expected object).", iter_key(it)); | |
2050 | continue; | |
2051 | } | |
2052 | nick = database_get_data(rd->d.object, "nick", RECDB_QSTRING); | |
2053 | if (!nick) { | |
2054 | if (default_nick) | |
2055 | nick = iter_key(it); | |
2056 | else | |
2057 | continue; | |
2058 | } | |
2059 | svc = service_find(nick); | |
2060 | desc = database_get_data(rd->d.object, "description", RECDB_QSTRING); | |
2061 | hostname = database_get_data(rd->d.object, "hostname", RECDB_QSTRING); | |
2062 | if (desc) { | |
2063 | if (!svc) | |
2064 | svc = service_register(AddService(nick, NULL, desc, hostname)); | |
2065 | else if (hostname) | |
2066 | strcpy(svc->bot->hostname, hostname); | |
2067 | desc = database_get_data(rd->d.object, "trigger", RECDB_QSTRING); | |
2068 | if (desc) | |
2069 | svc->trigger = desc[0]; | |
2070 | desc = database_get_data(rd->d.object, "privileged", RECDB_QSTRING); | |
2071 | if (desc && (true_string(desc) || enabled_string(desc))) | |
2072 | svc->privileged = 1; | |
2073 | } | |
2074 | } | |
2075 | } | |
2076 | ||
2077 | static void | |
2078 | modcmd_conf_read(void) { | |
2079 | modcmd_load_bots(conf_get_data("services", RECDB_OBJECT), 0); | |
2080 | } | |
2081 | ||
2082 | void | |
2083 | modcmd_init(void) { | |
2084 | qsort(flags, ArrayLength(flags)-1, sizeof(flags[0]), flags_qsort); | |
2085 | modules = dict_new(); | |
2086 | dict_set_free_data(modules, free_module); | |
2087 | services = dict_new(); | |
2088 | dict_set_free_data(services, free_service); | |
2089 | reg_nick_change_func(modcmd_nick_change); | |
2090 | reg_exit_func(modcmd_cleanup); | |
2091 | conf_register_reload(modcmd_conf_read); | |
2092 | ||
2093 | modcmd_module = module_register("modcmd", MAIN_LOG, "modcmd.help", modcmd_expand); | |
2094 | bind_command = modcmd_register(modcmd_module, "bind", cmd_bind, 4, MODCMD_KEEP_BOUND, "oper_level", "800", NULL); | |
2095 | help_command = modcmd_register(modcmd_module, "help", cmd_help, 1, 0, "flags", "+nolog", NULL); | |
2096 | modcmd_register(modcmd_module, "command", cmd_command, 2, 0, "flags", "+nolog", NULL); | |
2097 | modcmd_register(modcmd_module, "modcmd", cmd_modcmd, 2, MODCMD_KEEP_BOUND, "template", "bind", NULL); | |
2098 | modcmd_register(modcmd_module, "god", cmd_god, 0, MODCMD_REQUIRE_AUTHED, "flags", "+oper,+networkhelper", NULL); | |
2099 | modcmd_register(modcmd_module, "readhelp", cmd_readhelp, 2, 0, "oper_level", "650", NULL); | |
2100 | modcmd_register(modcmd_module, "timecmd", cmd_timecmd, 2, 0, "oper_level", "1", NULL); | |
2101 | modcmd_register(modcmd_module, "unbind", cmd_unbind, 3, 0, "template", "bind", NULL); | |
2102 | modcmd_register(modcmd_module, "joiner", cmd_joiner, 1, 0, NULL); | |
2103 | modcmd_register(modcmd_module, "stats modules", cmd_stats_modules, 1, 0, "flags", "+oper", NULL); | |
2104 | modcmd_register(modcmd_module, "stats services", cmd_stats_services, 1, 0, "flags", "+oper", NULL); | |
2105 | modcmd_register(modcmd_module, "showcommands", cmd_showcommands, 1, 0, "flags", "+acceptchan", NULL); | |
2106 | modcmd_register(modcmd_module, "helpfiles", cmd_helpfiles, 2, 0, "template", "bind", NULL); | |
2107 | modcmd_register(modcmd_module, "service add", cmd_service_add, 4, 0, "flags", "+oper", NULL); | |
2108 | modcmd_register(modcmd_module, "service rename", cmd_service_rename, 3, 0, "flags", "+oper", NULL); | |
2109 | modcmd_register(modcmd_module, "service trigger", cmd_service_trigger, 2, 0, "flags", "+oper", NULL); | |
2110 | modcmd_register(modcmd_module, "service privileged", cmd_service_privileged, 2, 0, "flags", "+oper", NULL); | |
2111 | modcmd_register(modcmd_module, "service remove", cmd_service_remove, 2, 0, "flags", "+oper", NULL); | |
2112 | modcmd_register(modcmd_module, "dumpmessages", cmd_dump_messages, 1, 0, "oper_level", "1000", NULL); | |
2113 | version_command = modcmd_register(modcmd_module, "version", cmd_version, 1, 0, NULL); | |
2114 | message_register_table(msgtab); | |
2115 | } | |
2116 | ||
2117 | static void | |
2118 | modcmd_db_load_command(struct service *service, const char *cmdname, struct dict *obj) { | |
2119 | struct svccmd *svccmd; | |
2120 | struct module *module; | |
2121 | struct modcmd *modcmd; | |
2122 | struct string_list *slist; | |
2123 | const char *str, *sep; | |
2124 | char buf[MAXLEN]; | |
2125 | ||
2126 | str = database_get_data(obj, "command", RECDB_QSTRING); | |
2127 | if (!str) { | |
2128 | log_module(MAIN_LOG, LOG_ERROR, "Missing command for service %s command %s in modcmd.db", service->bot->nick, cmdname); | |
2129 | return; | |
2130 | } | |
2131 | sep = strchr(str, '.'); | |
2132 | if (!sep) { | |
2133 | log_module(MAIN_LOG, LOG_ERROR, "Invalid command %s for service %s command %s in modcmd.db", str, service->bot->nick, cmdname); | |
2134 | return; | |
2135 | } | |
2136 | memcpy(buf, str, sep-str); | |
2137 | buf[sep-str] = 0; | |
2138 | if (!(module = module_find(buf))) { | |
2139 | log_module(MAIN_LOG, LOG_ERROR, "Unknown module %s for service %s command %s in modcmd.db", buf, service->bot->nick, cmdname); | |
2140 | return; | |
2141 | } | |
2142 | if (!(modcmd = dict_find(module->commands, sep+1, NULL))) { | |
2143 | log_module(MAIN_LOG, LOG_ERROR, "Unknown command %s in module %s for service %s command %s", sep+1, module->name, service->bot->nick, cmdname); | |
2144 | return; | |
2145 | } | |
2146 | /* Now that we know we have a command to use, fill in the basics. */ | |
2147 | svccmd = calloc(1, sizeof(*svccmd)); | |
2148 | svccmd_insert(service, strdup(cmdname), svccmd, modcmd); | |
2149 | if ((str = database_get_data(obj, "template", RECDB_QSTRING))) { | |
2150 | add_pending_template(svccmd, str); | |
2151 | } else { | |
2152 | svccmd_copy_rules(svccmd, modcmd->defaults); | |
2153 | } | |
2154 | if ((str = database_get_data(obj, "account_flags", RECDB_QSTRING))) { | |
2155 | svccmd->req_account_flags = svccmd->deny_account_flags = 0; | |
2156 | svccmd_configure(svccmd, NULL, service->bot, "account_flags", str); | |
2157 | } | |
2158 | if ((str = database_get_data(obj, "flags", RECDB_QSTRING))) { | |
2159 | svccmd->flags = 0; | |
2160 | svccmd_configure(svccmd, NULL, service->bot, "flags", str); | |
2161 | } | |
2162 | if ((str = database_get_data(obj, "oper_access", RECDB_QSTRING)) | |
2163 | || (str = database_get_data(obj, "opserv_level", RECDB_QSTRING))) { | |
2164 | svccmd_configure(svccmd, NULL, service->bot, "oper_access", str); | |
2165 | } | |
2166 | if ((str = database_get_data(obj, "channel_access", RECDB_QSTRING)) | |
2167 | || (str = database_get_data(obj, "chanserv_level", RECDB_QSTRING))) { | |
2168 | svccmd_configure(svccmd, NULL, service->bot, "channel_access", str); | |
2169 | } | |
2170 | if ((slist = database_get_data(obj, "aliased", RECDB_STRING_LIST))) { | |
2171 | unsigned int nn; | |
2172 | svccmd->alias.used = svccmd->alias.size = slist->used; | |
2173 | svccmd->alias.list = calloc(svccmd->alias.size, sizeof(svccmd->alias.list[0])); | |
2174 | for (nn=0; nn<slist->used; ++nn) | |
2175 | svccmd->alias.list[nn] = strdup(slist->list[nn]); | |
2176 | } | |
2177 | modcmd_set_effective_flags(svccmd); | |
2178 | } | |
2179 | ||
2180 | static struct svccmd * | |
2181 | service_make_alias(struct service *service, const char *alias, ...) { | |
2182 | char *arg, *argv[MAXNUMPARAMS]; | |
2183 | unsigned int nn, argc; | |
2184 | struct svccmd *svccmd, *template; | |
2185 | va_list args; | |
2186 | ||
2187 | va_start(args, alias); | |
2188 | argc = 0; | |
2189 | while (1) { | |
2190 | arg = va_arg(args, char*); | |
2191 | if (!arg) | |
2192 | break; | |
2193 | argv[argc++] = arg; | |
2194 | } | |
2195 | va_end(args); | |
2196 | svccmd = calloc(1, sizeof(*svccmd)); | |
2197 | if (!(template = svccmd_resolve_name(svccmd, argv[0]))) { | |
2198 | log_module(MAIN_LOG, LOG_ERROR, "Invalid base command %s for alias %s in service %s", argv[0], alias, service->bot->nick); | |
2199 | free(svccmd->name); | |
2200 | free(svccmd); | |
2201 | return NULL; | |
2202 | } | |
2203 | if (argc > 1) { | |
2204 | svccmd->alias.used = svccmd->alias.size = argc; | |
2205 | svccmd->alias.list = calloc(svccmd->alias.size, sizeof(svccmd->alias.list[0])); | |
2206 | for (nn=0; nn<argc; nn++) | |
2207 | svccmd->alias.list[nn] = strdup(argv[nn]); | |
2208 | } | |
2209 | svccmd_insert(service, strdup(alias), svccmd, template->command); | |
2210 | svccmd_copy_rules(svccmd, template); | |
2211 | return svccmd; | |
2212 | } | |
2213 | ||
2214 | static int saxdb_present; | |
2215 | ||
2216 | static int | |
2217 | modcmd_saxdb_read(struct dict *db) { | |
2218 | struct dict *db2; | |
2219 | dict_iterator_t it, it2; | |
2220 | struct record_data *rd, *rd2; | |
2221 | struct service *service; | |
2222 | ||
2223 | modcmd_load_bots(database_get_data(db, "bots", RECDB_OBJECT), 1); | |
2224 | db2 = database_get_data(db, "services", RECDB_OBJECT); | |
2225 | if (!db2) { | |
2226 | log_module(MAIN_LOG, LOG_ERROR, "Missing section 'services' in modcmd db."); | |
2227 | return 1; | |
2228 | } | |
2229 | for (it = dict_first(db2); it; it = iter_next(it)) { | |
2230 | rd = iter_data(it); | |
2231 | if (rd->type != RECDB_OBJECT) { | |
2232 | log_module(MAIN_LOG, LOG_ERROR, "Bad type for 'services/%s' in modcmd db (expected object).", iter_key(it)); | |
2233 | continue; | |
2234 | } | |
2235 | if (!(service = service_find(iter_key(it)))) { | |
2236 | log_module(MAIN_LOG, LOG_ERROR, "Unknown service '%s' listed in modcmd db.", iter_key(it)); | |
2237 | continue; | |
2238 | } | |
2239 | for (it2 = dict_first(rd->d.object); it2; it2 = iter_next(it2)) { | |
2240 | rd2 = iter_data(it2); | |
2241 | if (rd2->type != RECDB_OBJECT) { | |
2242 | log_module(MAIN_LOG, LOG_ERROR, "Bad type for 'services/%s/%s' in modcmd db (expected object).", iter_key(it), iter_key(it2)); | |
2243 | continue; | |
2244 | } | |
2245 | modcmd_db_load_command(service, iter_key(it2), rd2->d.object); | |
2246 | } | |
2247 | } | |
2248 | db2 = database_get_data(db, "helpfiles", RECDB_OBJECT); | |
2249 | for (it = dict_first(db2); it; it = iter_next(it)) { | |
2250 | struct module *module; | |
2251 | struct string_list *slist; | |
2252 | unsigned int ii; | |
2253 | ||
2254 | rd = iter_data(it); | |
2255 | if (rd->type != RECDB_STRING_LIST) { | |
2256 | log_module(MAIN_LOG, LOG_ERROR, "Bad type for 'helpfiles/%s' in modcmd db (expected string list).", iter_key(it)); | |
2257 | continue; | |
2258 | } | |
2259 | slist = rd->d.slist; | |
2260 | if (!(service = service_find(iter_key(it)))) { | |
2261 | /* We probably whined about the service being missing above. */ | |
2262 | continue; | |
2263 | } | |
2264 | service->modules.used = 0; | |
2265 | for (ii=0; ii<slist->used; ++ii) { | |
2266 | if (!(module = dict_find(modules, slist->list[ii], NULL))) { | |
2267 | log_module(MAIN_LOG, LOG_ERROR, "Unknown module '%s' listed in modcmd 'helpfiles/%s'.", slist->list[ii], iter_key(it)); | |
2268 | continue; | |
2269 | } | |
2270 | module_list_append(&service->modules, module); | |
2271 | } | |
2272 | } | |
2273 | saxdb_present = 1; | |
2274 | return 0; | |
2275 | } | |
2276 | ||
2277 | static void | |
2278 | create_default_binds(void) { | |
2279 | /* Which services should import which modules by default? */ | |
2280 | struct { | |
2281 | const char *svcname; | |
2282 | /* C is lame and requires a fixed size for this array. | |
2283 | * Be sure you NULL-terminate each array and increment the | |
2284 | * size here if you add more default modules to any | |
2285 | * service. */ | |
2286 | const char *modnames[8]; | |
2287 | } def_binds[] = { | |
2288 | { "ChanServ", { "ChanServ", NULL } }, | |
2289 | { "Global", { "Global", NULL } }, | |
2290 | { "NickServ", { "NickServ", NULL } }, | |
2291 | { "OpServ", { "OpServ", "modcmd", "sendmail", "saxdb", "proxycheck", NULL } }, | |
2292 | { NULL, { NULL } } | |
2293 | }; | |
2294 | unsigned int ii, jj; | |
2295 | char buf[128], *nick; | |
2296 | struct service *service; | |
2297 | struct module *module; | |
2298 | ||
2299 | for (ii = 0; def_binds[ii].svcname; ++ii) { | |
2300 | sprintf(buf, "services/%s/nick", def_binds[ii].svcname); | |
2301 | if (!(nick = conf_get_data(buf, RECDB_QSTRING))) | |
2302 | continue; | |
2303 | if (!(service = service_find(nick))) | |
2304 | continue; | |
2305 | if (dict_size(service->commands) > 0) | |
2306 | continue; | |
2307 | ||
2308 | /* Bind the default modules for this service to it */ | |
2309 | for (jj = 0; def_binds[ii].modnames[jj]; ++jj) { | |
2310 | if (!(module = module_find(def_binds[ii].modnames[jj]))) | |
2311 | continue; | |
2312 | service_bind_module(service, module); | |
2313 | } | |
2314 | ||
2315 | /* Bind the help and version commands to this service */ | |
2316 | service_bind_modcmd(service, help_command, help_command->name); | |
2317 | service_bind_modcmd(service, version_command, version_command->name); | |
2318 | ||
2319 | /* Now some silly hax.. (aliases that most people want) */ | |
2320 | if (!irccasecmp(def_binds[ii].svcname, "ChanServ")) { | |
2321 | service_make_alias(service, "addowner", "*chanserv.adduser", "$1", "owner", NULL); | |
2322 | service_make_alias(service, "addcoowner", "*chanserv.adduser", "$1", "coowner", NULL); | |
2323 | service_make_alias(service, "addmanager", "*chanserv.adduser", "$1", "manager", NULL); | |
2324 | service_make_alias(service, "addop", "*chanserv.adduser", "$1", "op", NULL); | |
2325 | service_make_alias(service, "addhop", "*chanserv.adduser", "$1", "halfop", NULL); | |
2326 | service_make_alias(service, "addpeon", "*chanserv.adduser", "$1", "peon", NULL); | |
2327 | service_make_alias(service, "delowner", "*chanserv.deluser", "owner", "$1", NULL); | |
2328 | service_make_alias(service, "delcoowner", "*chanserv.deluser", "coowner", "$1", NULL); | |
2329 | service_make_alias(service, "delmanager", "*chanserv.deluser", "manager", "$1", NULL); | |
2330 | service_make_alias(service, "delop", "*chanserv.deluser", "op", "$1", NULL); | |
2331 | service_make_alias(service, "delpeon", "*chanserv.deluser", "peon", "$1", NULL); | |
2332 | service_make_alias(service, "command", "*modcmd.command", NULL); | |
2333 | service_make_alias(service, "god", "*modcmd.god", NULL); | |
2334 | } else if (!irccasecmp(def_binds[ii].svcname, "OpServ")) { | |
2335 | struct svccmd *svccmd; | |
2336 | svccmd = service_make_alias(service, "stats", "*modcmd.joiner", NULL); | |
2337 | svccmd->min_opserv_level = 101; | |
2338 | svccmd = service_make_alias(service, "service", "*modcmd.joiner", NULL); | |
2339 | svccmd->min_opserv_level = 900; | |
2340 | } | |
2341 | } | |
2342 | } | |
2343 | ||
2344 | static void | |
2345 | import_aliases_db() { | |
2346 | struct dict *db; | |
2347 | dict_iterator_t it, it2; | |
2348 | struct record_data *rd, *rd2; | |
2349 | struct service *service; | |
2350 | struct module *module; | |
2351 | ||
2352 | if (!(db = parse_database("aliases.db"))) | |
2353 | return; | |
2354 | for (it = dict_first(db); it; it = iter_next(it)) { | |
2355 | service = service_find(iter_key(it)); | |
2356 | if (!service) | |
2357 | continue; | |
2358 | module = module_find(service->bot->nick); | |
2359 | rd = iter_data(it); | |
2360 | if (rd->type != RECDB_OBJECT) | |
2361 | continue; | |
2362 | for (it2 = dict_first(rd->d.object); it2; it2 = iter_next(it2)) { | |
2363 | struct modcmd *command; | |
2364 | rd2 = iter_data(it2); | |
2365 | if (rd2->type != RECDB_QSTRING) | |
2366 | continue; | |
2367 | command = dict_find(module->commands, rd2->d.qstring, NULL); | |
2368 | if (!command) | |
2369 | continue; | |
2370 | service_bind_modcmd(service, command, iter_key(it2)); | |
2371 | } | |
2372 | } | |
2373 | } | |
2374 | ||
2375 | void | |
2376 | modcmd_finalize(void) { | |
2377 | dict_iterator_t it; | |
2378 | ||
2379 | /* Check databases. */ | |
2380 | saxdb_register("modcmd", modcmd_saxdb_read, modcmd_saxdb_write); | |
2381 | create_default_binds(); | |
2382 | if (!saxdb_present) | |
2383 | import_aliases_db(); | |
2384 | ||
2385 | /* Register services for their triggers. */ | |
2386 | for (it = dict_first(services); it; it = iter_next(it)) { | |
2387 | struct service *svc = iter_data(it); | |
2388 | if (svc->trigger) | |
2389 | reg_chanmsg_func(svc->trigger, svc->bot, modcmd_chanmsg); | |
2390 | } | |
2391 | ||
2392 | /* Resolve command rule-templates. */ | |
2393 | while (pending_templates) { | |
2394 | struct pending_template *ptempl = pending_templates; | |
2395 | struct svccmd *svccmd; | |
2396 | ||
2397 | pending_templates = ptempl->next; | |
2398 | /* Only overwrite the current template if we have a valid template. */ | |
2399 | if (!strcmp(ptempl->base, "*")) { | |
2400 | /* Do nothing. */ | |
2401 | } else if ((svccmd = svccmd_resolve_name(ptempl->cmd, ptempl->base))) { | |
2402 | svccmd_copy_rules(ptempl->cmd, svccmd); | |
2403 | } else { | |
2404 | assert(ptempl->cmd->parent); | |
2405 | log_module(MAIN_LOG, LOG_ERROR, "Unable to resolve template name %s for command %s in service %s.", ptempl->base, ptempl->cmd->name, ptempl->cmd->parent->bot->nick); | |
2406 | } | |
2407 | free(ptempl->base); | |
2408 | free(ptempl); | |
2409 | } | |
2410 | } |