aconf->hold = rb_current_time() + temp_time;
aconf->lifetime = aconf->hold;
replace_old_ban(aconf);
- rb_dlinkAddAlloc(aconf, &prop_bans);
+ add_prop_ban(aconf);
sendto_realops_snomask(SNO_GENERAL, L_ALL,
"%s added global %d min. RESV for [%s] [%s]",
aconf->hold = rb_current_time() + temp_time;
aconf->lifetime = aconf->hold;
replace_old_ban(aconf);
- rb_dlinkAddAlloc(aconf, &prop_bans);
+ add_prop_ban(aconf);
sendto_realops_snomask(SNO_GENERAL, L_ALL,
"%s added global %d min. RESV for [%s] [%s]",
sendto_one_notice(source_p, ":Cannot remove global RESV %s on specific servers", name);
return;
}
- ptr = rb_dlinkFind(aconf, &prop_bans);
- if(ptr == NULL)
+ if (!lookup_prop_ban(aconf))
return;
sendto_one_notice(source_p, ":RESV for [%s] is removed", name);
sendto_realops_snomask(SNO_GENERAL, L_ALL,
(unsigned long)aconf->created,
0,
(int)(aconf->lifetime - aconf->created));
- deactivate_conf(aconf, ptr);
+ deactivate_conf(aconf);
return;
}
else if(propagated && rb_dlink_list_length(&cluster_conf_list) > 0)
sendto_one_notice(source_p, ":Cannot remove global RESV %s on specific servers", name);
return;
}
- ptr = rb_dlinkFind(aconf, &prop_bans);
- if(ptr == NULL)
+ if (!lookup_prop_ban(aconf))
return;
sendto_one_notice(source_p, ":RESV for [%s] is removed", name);
sendto_realops_snomask(SNO_GENERAL, L_ALL,
(unsigned long)aconf->created,
0,
(int)(aconf->lifetime - aconf->created));
- deactivate_conf(aconf, ptr);
+ deactivate_conf(aconf);
return;
}
else if(propagated && rb_dlink_list_length(&cluster_conf_list) > 0)
static rb_bh *confitem_heap = NULL;
-rb_dlink_list prop_bans;
-
rb_dlink_list temp_klines[LAST_TEMP_TYPE];
rb_dlink_list temp_dlines[LAST_TEMP_TYPE];
rb_dlink_list service_list;
+struct Dictionary *prop_bans_dict;
+
/* internally defined functions */
static void set_default_conf(void);
static void validate_conf(void);
static void read_conf(FILE *);
static void clear_out_old_conf(void);
-static void expire_prop_bans(void *list);
+static void expire_prop_bans(void *);
static void expire_temp_kd(void *list);
static void reorganise_temp_kd(void *list);
+static int cmp_prop_ban(const void *, const void *);
+
FILE *conf_fbfile_in;
extern char yytext[];
init_s_conf(void)
{
confitem_heap = rb_bh_create(sizeof(struct ConfItem), CONFITEM_HEAP_SIZE, "confitem_heap");
+ prop_bans_dict = irc_dictionary_create(cmp_prop_ban);
- rb_event_addish("expire_prop_bans", expire_prop_bans, &prop_bans, 60);
+ rb_event_addish("expire_prop_bans", expire_prop_bans, NULL, 60);
rb_event_addish("expire_temp_klines", expire_temp_kd, &temp_klines[TEMP_MIN], 60);
rb_event_addish("expire_temp_dlines", expire_temp_kd, &temp_dlines[TEMP_MIN], 60);
if((i = verify_access(source_p, username)))
{
- ilog(L_FUSER, "Access denied: %s[%s]",
+ ilog(L_FUSER, "Access denied: %s[%s]",
source_p->name, source_p->sockhost);
}
-
+
switch (i)
{
case SOCKET_ERROR:
ilog(L_FUSER, "Too many local connections from %s!%s%s@%s",
source_p->name, IsGotId(source_p) ? "" : "~",
- source_p->username, source_p->sockhost);
+ source_p->username, source_p->sockhost);
ServerStats.is_ref++;
exit_client(client_p, source_p, &me, "Too many host connections (local)");
source_p->username, source_p->host,
show_ip(NULL, source_p) && !IsIPSpoof(source_p) ? source_p->sockhost : "255.255.255.255");
- ilog(L_FUSER, "Too many connections from %s!%s%s@%s.",
+ ilog(L_FUSER, "Too many connections from %s!%s%s@%s.",
source_p->name, IsGotId(source_p) ? "" : "~",
source_p->username, source_p->sockhost);
else
#endif
port = ntohs(((struct sockaddr_in *)&source_p->localClient->listener->addr)->sin_port);
-
+
ServerStats.is_ref++;
/* jdc - lists server name & port connections are on */
/* a purely cosmetical change */
if(IsGotId(client_p))
{
- aconf = find_address_conf(client_p->host, client_p->sockhost,
+ aconf = find_address_conf(client_p->host, client_p->sockhost,
client_p->username, client_p->username,
(struct sockaddr *) &client_p->localClient->ip,
client_p->localClient->ip.ss_family,
/*
* add_ip_limit
- *
+ *
* Returns 1 if successful 0 if not
*
* This checks if the user has exceed the limits for their class
/*
* attach_conf
- *
+ *
* inputs - client pointer
* - conf pointer
* output -
ConfigFileEntry.default_adminstring = rb_strdup("is a Server Administrator");
ConfigFileEntry.servicestring = rb_strdup("is a Network Service");
- ConfigFileEntry.default_umodes = UMODE_INVISIBLE;
+ ConfigFileEntry.default_umodes = UMODE_INVISIBLE;
ConfigFileEntry.failed_oper_notice = YES;
ConfigFileEntry.anti_nick_flood = NO;
ConfigFileEntry.disable_fake_channels = NO;
ConfigFileEntry.tkline_expire_notices = 0;
ConfigFileEntry.reject_after_count = 5;
- ConfigFileEntry.reject_ban_time = 300;
+ ConfigFileEntry.reject_ban_time = 300;
ConfigFileEntry.reject_duration = 120;
ConfigFileEntry.throttle_count = 4;
ConfigFileEntry.throttle_duration = 60;
#undef NO
/*
- * read_conf()
+ * read_conf()
*
*
* inputs - file descriptor pointing to config file to use
int start = ServerInfo.ssld_count - get_ssld_count();
/* start up additional ssld if needed */
start_ssldaemon(start, ServerInfo.ssl_cert, ServerInfo.ssl_private_key, ServerInfo.ssl_dh_params);
-
+
}
if((ConfigFileEntry.client_flood_max_lines < CLIENT_FLOOD_MIN) ||
*
* inputs - pointer to struct ConfItem
* output - none
- * Side effects - links in given struct ConfItem into
+ * Side effects - links in given struct ConfItem into
* temporary kline link list
*/
void
}
/* valid_wild_card()
- *
+ *
* input - user buffer, host buffer
* output - 0 if invalid, 1 if valid
* side effects -
return 0;
}
-rb_dlink_node *
-find_prop_ban(unsigned int status, const char *user, const char *host)
+
+int cmp_prop_ban(const void *a_, const void *b_)
{
- rb_dlink_node *ptr;
- struct ConfItem *aconf;
+ const struct ConfItem *a = a_, *b = b_;
+ int r;
- RB_DLINK_FOREACH(ptr, prop_bans.head)
- {
- aconf = ptr->data;
+ if ((a->status & ~CONF_ILLEGAL) > (int)(b->status & ~CONF_ILLEGAL)) return 1;
+ if ((a->status & ~CONF_ILLEGAL) < (int)(b->status & ~CONF_ILLEGAL)) return -1;
- if((aconf->status & ~CONF_ILLEGAL) == status &&
- (!user || !aconf->user ||
- !irccmp(aconf->user, user)) &&
- !irccmp(aconf->host, host))
- return ptr;
- }
- return NULL;
+ r = irccmp(a->host, b->host);
+ if (r) return r;
+
+ if (a->user && b->user)
+ return irccmp(a->user, b->user);
+
+ return 0;
}
void
-deactivate_conf(struct ConfItem *aconf, rb_dlink_node *ptr)
+add_prop_ban(struct ConfItem *aconf)
{
- int i;
+ irc_dictionary_add(prop_bans_dict, (const char *)aconf, aconf);
+}
- s_assert(ptr->data == aconf);
+struct ConfItem *
+find_prop_ban(unsigned status, const char *user, const char *host)
+{
+ struct ConfItem key = {.status = status, .user = (char *)user, .host = (char *)host};
+ return irc_dictionary_retrieve(prop_bans_dict, (const char *)&key);
+}
+
+void
+remove_prop_ban(struct ConfItem *aconf)
+{
+ irc_dictionary_delete(prop_bans_dict, (const char *)aconf);
+}
+
+int
+lookup_prop_ban(struct ConfItem *aconf)
+{
+ return irc_dictionary_retrieve(prop_bans_dict, (const char *)aconf) == aconf;
+}
+
+void
+deactivate_conf(struct ConfItem *aconf)
+{
+ int i;
switch (aconf->status)
{
else
{
if (aconf->lifetime != 0)
- rb_dlinkDestroy(ptr, &prop_bans);
+ remove_prop_ban(aconf);
free_conf(aconf);
}
}
void
replace_old_ban(struct ConfItem *aconf)
{
- rb_dlink_node *ptr;
struct ConfItem *oldconf;
- ptr = find_prop_ban(aconf->status, aconf->user, aconf->host);
- if(ptr != NULL)
+ oldconf = find_prop_ban(aconf->status, aconf->user, aconf->host);
+ if (oldconf != NULL)
{
- oldconf = ptr->data;
/* Remember at least as long as the old one. */
if(oldconf->lifetime > aconf->lifetime)
aconf->lifetime = oldconf->lifetime;
aconf->lifetime = aconf->hold;
/* Tell deactivate_conf() to destroy it. */
oldconf->lifetime = rb_current_time();
- deactivate_conf(oldconf, ptr);
+ deactivate_conf(oldconf);
}
}
static void
-expire_prop_bans(void *list)
+expire_prop_bans(void *unused)
{
- rb_dlink_node *ptr;
- rb_dlink_node *next_ptr;
struct ConfItem *aconf;
+ time_t now;
+ struct DictionaryIter state;
- RB_DLINK_FOREACH_SAFE(ptr, next_ptr, ((rb_dlink_list *) list)->head)
- {
- aconf = ptr->data;
+ now = rb_current_time();
- if(aconf->lifetime <= rb_current_time() ||
- (aconf->hold <= rb_current_time() &&
+ DICTIONARY_FOREACH(aconf, &state, prop_bans_dict)
+ {
+ if(aconf->lifetime <= now ||
+ (aconf->hold <= now &&
!(aconf->status & CONF_ILLEGAL)))
{
/* Alert opers that a TKline expired - Hwy */
aconf->host ? aconf->host : "*");
/* will destroy or mark illegal */
- deactivate_conf(aconf, ptr);
+ deactivate_conf(aconf);
}
}
}
if(aconf->hold < (rb_current_time() + (60 * 60)))
{
- rb_dlinkMoveNode(ptr, list, (aconf->status == CONF_KILL) ?
+ rb_dlinkMoveNode(ptr, list, (aconf->status == CONF_KILL) ?
&temp_klines[TEMP_MIN] : &temp_dlines[TEMP_MIN]);
aconf->port = TEMP_MIN;
}
{
if(aconf->hold < (rb_current_time() + (1440 * 60)))
{
- rb_dlinkMoveNode(ptr, list, (aconf->status == CONF_KILL) ?
+ rb_dlinkMoveNode(ptr, list, (aconf->status == CONF_KILL) ?
&temp_klines[TEMP_HOUR] : &temp_dlines[TEMP_HOUR]);
aconf->port = TEMP_HOUR;
}
- else if(aconf->port > TEMP_DAY &&
+ else if(aconf->port > TEMP_DAY &&
(aconf->hold < (rb_current_time() + (10080 * 60))))
{
- rb_dlinkMoveNode(ptr, list, (aconf->status == CONF_KILL) ?
+ rb_dlinkMoveNode(ptr, list, (aconf->status == CONF_KILL) ?
&temp_klines[TEMP_DAY] : &temp_dlines[TEMP_DAY]);
aconf->port = TEMP_DAY;
}
}
rb_snprintf(buffer, sizeof(buffer), "%s!%s@%s{%s}",
- client_p->name, client_p->username,
+ client_p->name, client_p->username,
client_p->host, client_p->servptr->name);
return buffer;
}
*
* inputs - struct ConfItem
*
- * output - name
+ * output - name
* - host
* - pass
* - user
}
void
-get_printable_kline(struct Client *source_p, struct ConfItem *aconf,
+get_printable_kline(struct Client *source_p, struct ConfItem *aconf,
char **host, char **reason,
char **user, char **oper_reason)
{
FIXME: The full path is in conffilenamebuf first time since we
dont know anything else
- - Gozem 2002-07-21
+ - Gozem 2002-07-21
*/
rb_strlcpy(conffilebuf, filename, sizeof(conffilebuf));
* conf_add_class_to_conf
* inputs - pointer to config item
* output - NONE
- * side effects - Add a class pointer to a conf
+ * side effects - Add a class pointer to a conf
*/
void