#include <stdio.h>
#include <string.h>
+#include "../lib/version.h"
#include "../control/control.h"
#include "../lib/irc_string.h"
#include "../lib/strlfunc.h"
#include "trusts.h"
#include "newsearch/trusts_newsearch.h"
+MODULE_VERSION("");
+
static void registercommands(int, void *);
static void deregistercommands(int, void *);
extern void printnick_channels(searchCtx *, nick *, nick *);
-void calculatespaces(int spaces, int width, char *str, char **_prebuf, char **_postbuf) {
+void calculatespaces(int spaces, int width, const char *str, char **_prebuf, char **_postbuf) {
static char prebuf[512], postbuf[512];
int spacelen;
}
static void outputtree(nick *np, unsigned int marker, trustgroup *originalgroup, trusthost *th, int depth, int showchildren) {
- char *cidrstr, *prespacebuf, *postspacebuf, parentbuf[512];
+ const char *cidrstr;
+ char *prespacebuf, *postspacebuf, parentbuf[512];
if(th->marker != marker)
return;
- cidrstr = trusts_cidr2str(&th->ip, th->bits);
+ cidrstr = CIDRtostr(th->ip, th->bits);
calculatespaces(depth + 2, 30 + 1, cidrstr, &prespacebuf, &postspacebuf);
if(th->group == originalgroup) {
outputtree(np, marker, originalgroup, th, depth + 1, showchildren);
}
+static char *formatflags(int flags) {
+ static char buf[512];
+
+ buf[0] = '\0';
+
+ if(flags & TRUST_ENFORCE_IDENT)
+ strncat(buf, "enforcing ident", 512);
+
+ if(flags & TRUST_NO_CLEANUP) {
+ if(buf[0])
+ strncat(buf, ", ", 512);
+
+ strncat(buf, "exempt from cleanup", 512);
+ }
+
+ if(flags & TRUST_PROTECTED) {
+ if(buf[0])
+ strncat(buf, ", ", 512);
+
+ strncat(buf, "protected", 512);
+ }
+
+ if(flags & TRUST_RELIABLE_USERNAME) {
+ if(buf[0])
+ strncat(buf, ", ", 512);
+
+ strncat(buf, "reliable username", 512);
+ }
+
+ if(flags & TRUST_UNTHROTTLE) {
+ if(buf[0])
+ strncat(buf, ", ", 512);
+
+ strncat(buf, "unthrottled", 512);
+ }
+
+ buf[512-1] = '\0';
+
+ return buf;
+}
+
+static char *formatlimit(unsigned int limit) {
+ static char buf[64];
+
+ if(limit)
+ snprintf(buf, sizeof(buf), "%u", limit);
+ else
+ strncpy(buf, "unlimited", sizeof(buf));
+
+ return buf;
+}
+
static void displaygroup(nick *sender, trustgroup *tg, int showchildren) {
trusthost *th, **p2;
unsigned int marker;
/* abusing the ternary operator a bit :( */
controlreply(sender, "Name: : %s", tg->name->content);
- controlreply(sender, "Trusted for : %d", tg->trustedfor);
+ controlreply(sender, "Trusted for : %s", formatlimit(tg->trustedfor));
controlreply(sender, "Currently using : %d", tg->count);
- controlreply(sender, "Clients per user : %d (%senforcing ident)", tg->maxperident, (tg->flags & TRUST_ENFORCE_IDENT)?"":"not ");
+ controlreply(sender, "Clients per user : %s", formatlimit(tg->maxperident));
+ controlreply(sender, "Flags : %s", formatflags(tg->flags));
controlreply(sender, "Contact: : %s", tg->contact->content);
controlreply(sender, "Expires in : %s", (tg->expires)?((tg->expires>t)?longtoduration(tg->expires - t, 2):"the past (will be removed during next cleanup)"):"never");
- controlreply(sender, "CIDR cleanup : %s", (tg->flags & TRUST_NO_CLEANUP)?"disabled":"enabled");
- controlreply(sender, "Protected : %s", (tg->flags & TRUST_PROTECTED)?"yes":"no");
controlreply(sender, "Created by : %s", tg->createdby->content);
controlreply(sender, "Comment: : %s", tg->comment->content);
controlreply(sender, "ID: : %u", tg->id);
controlreply(sender, "Last max reset : %s", tg->lastmaxusereset?trusts_timetostr(tg->lastmaxusereset):"(never)");
controlreply(sender, "---");
- controlreply(sender, "Attributes: * (has children, show with -v), > (belongs to this trust group)");
+ controlreply(sender, "Attributes: * (has hidden children, show with -v), > (belongs to this trust group)");
controlreply(sender, "Host Current Max Last seen Max per Node Node Mask Group ID Group name");
marker = nextthmarker();
return CMD_OK;
}
-static int comparetgs(const void *_a, const void *_b) {
- const trustgroup *a = _a;
- const trustgroup *b = _b;
-
- if(a->id > b->id)
- return 1;
- if(a->id < b-> id)
- return -1;
- return 0;
-}
-
-static int trusts_cmdtrustdump(void *source, int argc, char **argv) {
- trusthost *th;
- trustgroup *tg, **atg;
- unsigned int wanted, max, maxid, totalcount, i, groupcount, linecount;
- nick *np = source;
-
- if((argc < 2) || (argv[0][0] != '#'))
- return CMD_USAGE;
-
- wanted = atoi(&argv[0][1]);
- max = atoi(argv[1]);
-
- for(maxid=totalcount=0,tg=tglist;tg;tg=tg->next) {
- if(totalcount == 0 || tg->id > maxid)
- maxid = tg->id;
-
- totalcount++;
- }
-
- if(maxid > totalcount) {
- controlreply(np, "Start ID cannot exceed current maximum group ID (#%u)", maxid);
- return CMD_OK;
- }
-
- atg = nsmalloc(POOL_TRUSTS, sizeof(trusthost *) * totalcount);
- if(!atg) {
- controlreply(np, "Memory error.");
- return CMD_ERROR;
- }
-
- for(i=0,tg=tglist;i<totalcount&&tg;tg=tg->next,i++)
- atg[i] = tg;
-
- qsort(atg, totalcount, sizeof(trustgroup *), comparetgs);
-
- for(i=0;i<totalcount;i++)
- if(atg[i]->id >= wanted)
- break;
-
- for(groupcount=linecount=0;i<totalcount;i++) {
- linecount++;
- groupcount++;
-
- controlreply(np, "G,%s", dumptg(atg[i], 1));
-
- for(th=atg[i]->hosts;th;th=th->next) {
- linecount++;
- controlreply(np, "H,%s", dumpth(th, 1));
- }
-
- if(--max == 0)
- break;
- }
- nsfree(POOL_TRUSTS, atg);
-
- controlreply(np, "End of list, %u groups and %u lines returned.", groupcount, linecount);
- return CMD_OK;
-}
-
-static void trusts_suggestgline_cb(const char *mask, int hits, void *uarg) {
- nick *sender = uarg;
-
- controlreply(sender, "mask: %s, hits: %d", mask, hits);
-}
-
static int trusts_cmdtrustglinesuggest(void *source, int cargc, char **cargv) {
nick *sender = source;
char mask[512];
struct irc_in_addr ip;
unsigned char bits;
int count;
+ glinebuf gbuf;
+ char creator[32];
if(cargc < 1)
return CMD_USAGE;
return CMD_ERROR;
}
- count = glinesuggestbyip(user, &ip, 128, 0, trusts_suggestgline_cb, sender);
+ snprintf(creator, sizeof(creator), "#%s", sender->authname);
+
+ glinebufinit(&gbuf, 0);
+ glinebufaddbyip(&gbuf, user, &ip, 128, 0, creator, "Simulate", getnettime(), getnettime(), getnettime());
+ glinebufcounthits(&gbuf, &count, NULL);
+ glinebufspew(&gbuf, sender);
+ glinebufabort(&gbuf);
controlreply(sender, "Total hits: %d", count);
return CMD_USAGE;
tree = NSASTNode(tgroup_parse, NSASTLiteral(cargv[0]));
- return ast_nicksearch(&tree, controlreply, sender, NULL, printnick_channels, NULL, NULL, 2000);
+ return ast_nicksearch(&tree, controlreply, sender, NULL, printnick_channels, NULL, NULL, 2000, NULL);
}
static int commandsregistered;
commandsregistered = 1;
registercontrolhelpcmd("trustlist", NO_OPER, 2, trusts_cmdtrustlist, "Usage: trustlist [-v] <#id|name|IP>\nShows trust data for the specified trust group.");
- registercontrolhelpcmd("trustdump", NO_OPER, 2, trusts_cmdtrustdump, "Usage: trustdump <#id> <number>");
registercontrolhelpcmd("trustglinesuggest", NO_OPER, 1, trusts_cmdtrustglinesuggest, "Usage: trustglinesuggest <user@host>\nSuggests glines for the specified hostmask.");
registercontrolhelpcmd("trustspew", NO_OPER, 1, trusts_cmdtrustspew, "Usage: trustspew <#id|name>\nShows currently connected users for the specified trust group.");
}
commandsregistered = 0;
deregistercontrolcmd("trustlist", trusts_cmdtrustlist);
- deregistercontrolcmd("trustdump", trusts_cmdtrustdump);
deregistercontrolcmd("trustglinesuggest", trusts_cmdtrustglinesuggest);
deregistercontrolcmd("trustspew", trusts_cmdtrustspew);
}