]> jfr.im git - irc/rqf/shadowircd.git/blame - src/s_newconf.c
We use Git now. Git is cool. Just like fezes.
[irc/rqf/shadowircd.git] / src / s_newconf.c
CommitLineData
212380e3 1/*
2 * ircd-ratbox: an advanced Internet Relay Chat Daemon(ircd).
3 * s_newconf.c - code for dealing with conf stuff
4 *
5 * Copyright (C) 2004 Lee Hardy <lee@leeh.co.uk>
6 * Copyright (C) 2004-2005 ircd-ratbox development team
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
10 * met:
11 *
12 * 1.Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
14 * 2.Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3.The name of the author may not be used to endorse or promote products
18 * derived from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
21 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
22 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
23 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
24 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
26 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
28 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
29 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 *
212380e3 32 */
33
34#include "stdinc.h"
35#include "ircd_defs.h"
36#include "common.h"
37#include "s_conf.h"
38#include "s_newconf.h"
212380e3 39#include "client.h"
212380e3 40#include "s_serv.h"
41#include "send.h"
42#include "hostmask.h"
43#include "newconf.h"
44#include "hash.h"
b37021a4 45#include "irc_dictionary.h"
212380e3 46
af81d5a0
WP
47rb_dlink_list shared_conf_list;
48rb_dlink_list cluster_conf_list;
49rb_dlink_list oper_conf_list;
50rb_dlink_list hubleaf_conf_list;
51rb_dlink_list server_conf_list;
52rb_dlink_list xline_conf_list;
53rb_dlink_list resv_conf_list; /* nicks only! */
54rb_dlink_list nd_list; /* nick delay */
55rb_dlink_list tgchange_list;
212380e3 56
7f4fa195 57rb_patricia_tree_t *tgchange_tree;
212380e3 58
6e9b4415 59static rb_bh *nd_heap = NULL;
212380e3 60
61static void expire_temp_rxlines(void *unused);
62static void expire_nd_entries(void *unused);
63
7c944f64
WP
64struct ev_entry *expire_nd_entries_ev = NULL;
65struct ev_entry *expire_temp_rxlines_ev = NULL;
66
212380e3 67void
68init_s_newconf(void)
69{
7c944f64
WP
70 tgchange_tree = rb_new_patricia(PATRICIA_BITS);
71 nd_heap = rb_bh_create(sizeof(struct nd_entry), ND_HEAP_SIZE, "nd_heap");
72 expire_nd_entries_ev = rb_event_addish("expire_nd_entries", expire_nd_entries, NULL, 30);
73 expire_temp_rxlines_ev = rb_event_addish("expire_temp_rxlines", expire_temp_rxlines, NULL, 60);
212380e3 74}
75
76void
77clear_s_newconf(void)
78{
79 struct server_conf *server_p;
af81d5a0 80 rb_dlink_node *ptr;
90a3c35b 81 rb_dlink_node *next_ptr;
212380e3 82
90a3c35b 83 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, shared_conf_list.head)
212380e3 84 {
85 /* ptr here is ptr->data->node */
af81d5a0 86 rb_dlinkDelete(ptr, &shared_conf_list);
212380e3 87 free_remote_conf(ptr->data);
88 }
89
90a3c35b 90 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, cluster_conf_list.head)
212380e3 91 {
af81d5a0 92 rb_dlinkDelete(ptr, &cluster_conf_list);
212380e3 93 free_remote_conf(ptr->data);
94 }
95
90a3c35b 96 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, hubleaf_conf_list.head)
212380e3 97 {
af81d5a0 98 rb_dlinkDelete(ptr, &hubleaf_conf_list);
212380e3 99 free_remote_conf(ptr->data);
100 }
101
90a3c35b 102 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, oper_conf_list.head)
212380e3 103 {
104 free_oper_conf(ptr->data);
af81d5a0 105 rb_dlinkDestroy(ptr, &oper_conf_list);
212380e3 106 }
107
90a3c35b 108 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, server_conf_list.head)
212380e3 109 {
110 server_p = ptr->data;
111
112 if(!server_p->servers)
113 {
af81d5a0 114 rb_dlinkDelete(ptr, &server_conf_list);
212380e3 115 free_server_conf(ptr->data);
116 }
117 else
118 server_p->flags |= SERVER_ILLEGAL;
119 }
120}
121
122void
123clear_s_newconf_bans(void)
124{
125 struct ConfItem *aconf;
90a3c35b 126 rb_dlink_node *ptr, *next_ptr;
212380e3 127
90a3c35b 128 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
212380e3 129 {
130 aconf = ptr->data;
131
132 if(aconf->hold)
133 continue;
134
135 free_conf(aconf);
af81d5a0 136 rb_dlinkDestroy(ptr, &xline_conf_list);
212380e3 137 }
138
90a3c35b 139 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
212380e3 140 {
141 aconf = ptr->data;
142
143 /* temporary resv */
144 if(aconf->hold)
145 continue;
146
147 free_conf(aconf);
af81d5a0 148 rb_dlinkDestroy(ptr, &resv_conf_list);
212380e3 149 }
150
151 clear_resv_hash();
152}
153
154struct remote_conf *
155make_remote_conf(void)
156{
8e43b0b4 157 struct remote_conf *remote_p = rb_malloc(sizeof(struct remote_conf));
212380e3 158 return remote_p;
159}
160
161void
162free_remote_conf(struct remote_conf *remote_p)
163{
164 s_assert(remote_p != NULL);
165 if(remote_p == NULL)
166 return;
167
90a3c35b
VY
168 rb_free(remote_p->username);
169 rb_free(remote_p->host);
170 rb_free(remote_p->server);
171 rb_free(remote_p);
212380e3 172}
173
174int
175find_shared_conf(const char *username, const char *host,
176 const char *server, int flags)
177{
178 struct remote_conf *shared_p;
af81d5a0 179 rb_dlink_node *ptr;
212380e3 180
8e69bb4e 181 RB_DLINK_FOREACH(ptr, shared_conf_list.head)
212380e3 182 {
183 shared_p = ptr->data;
184
185 if(match(shared_p->username, username) &&
186 match(shared_p->host, host) &&
187 match(shared_p->server, server))
188 {
189 if(shared_p->flags & flags)
190 return YES;
191 else
192 return NO;
193 }
194 }
195
196 return NO;
197}
198
199void
200propagate_generic(struct Client *source_p, const char *command,
201 const char *target, int cap, const char *format, ...)
202{
203 char buffer[BUFSIZE];
204 va_list args;
205
206 va_start(args, format);
7c944f64 207 rb_vsnprintf(buffer, sizeof(buffer), format, args);
212380e3 208 va_end(args);
209
210 sendto_match_servs(source_p, target, cap, NOCAPS,
211 "%s %s %s",
212 command, target, buffer);
213 sendto_match_servs(source_p, target, CAP_ENCAP, cap,
214 "ENCAP %s %s %s",
215 target, command, buffer);
216}
217
218void
219cluster_generic(struct Client *source_p, const char *command,
220 int cltype, int cap, const char *format, ...)
221{
222 char buffer[BUFSIZE];
223 struct remote_conf *shared_p;
224 va_list args;
af81d5a0 225 rb_dlink_node *ptr;
212380e3 226
227 va_start(args, format);
7c944f64 228 rb_vsnprintf(buffer, sizeof(buffer), format, args);
212380e3 229 va_end(args);
230
8e69bb4e 231 RB_DLINK_FOREACH(ptr, cluster_conf_list.head)
212380e3 232 {
233 shared_p = ptr->data;
234
235 if(!(shared_p->flags & cltype))
236 continue;
237
238 sendto_match_servs(source_p, shared_p->server, cap, NOCAPS,
239 "%s %s %s",
240 command, shared_p->server, buffer);
241 sendto_match_servs(source_p, shared_p->server, CAP_ENCAP, cap,
242 "ENCAP %s %s %s",
243 shared_p->server, command, buffer);
244 }
245}
246
247struct oper_conf *
248make_oper_conf(void)
249{
8e43b0b4 250 struct oper_conf *oper_p = rb_malloc(sizeof(struct oper_conf));
212380e3 251 return oper_p;
252}
253
254void
255free_oper_conf(struct oper_conf *oper_p)
256{
257 s_assert(oper_p != NULL);
258 if(oper_p == NULL)
259 return;
260
90a3c35b
VY
261 rb_free(oper_p->username);
262 rb_free(oper_p->host);
263 rb_free(oper_p->name);
6cb47f18 264 rb_free(oper_p->certfp);
212380e3 265
266 if(oper_p->passwd)
267 {
268 memset(oper_p->passwd, 0, strlen(oper_p->passwd));
90a3c35b 269 rb_free(oper_p->passwd);
212380e3 270 }
271
272#ifdef HAVE_LIBCRYPTO
90a3c35b 273 rb_free(oper_p->rsa_pubkey_file);
212380e3 274
275 if(oper_p->rsa_pubkey)
276 RSA_free(oper_p->rsa_pubkey);
277#endif
278
90a3c35b 279 rb_free(oper_p);
212380e3 280}
281
282struct oper_conf *
283find_oper_conf(const char *username, const char *host, const char *locip, const char *name)
284{
285 struct oper_conf *oper_p;
3ea5fee7 286 struct rb_sockaddr_storage ip, cip;
212380e3 287 char addr[HOSTLEN+1];
288 int bits, cbits;
af81d5a0 289 rb_dlink_node *ptr;
212380e3 290
291 parse_netmask(locip, (struct sockaddr *)&cip, &cbits);
292
8e69bb4e 293 RB_DLINK_FOREACH(ptr, oper_conf_list.head)
212380e3 294 {
295 oper_p = ptr->data;
296
297 /* name/username doesnt match.. */
298 if(irccmp(oper_p->name, name) || !match(oper_p->username, username))
299 continue;
300
907468c4 301 rb_strlcpy(addr, oper_p->host, sizeof(addr));
212380e3 302
303 if(parse_netmask(addr, (struct sockaddr *)&ip, &bits) != HM_HOST)
304 {
305 if(ip.ss_family == cip.ss_family &&
306 comp_with_mask_sock((struct sockaddr *)&ip, (struct sockaddr *)&cip, bits))
307 return oper_p;
308 }
309
310 /* we have to compare against the host as well, because its
311 * valid to set a spoof to an IP, which if we only compare
312 * in ip form to sockhost will not necessarily match --anfl
313 */
314 if(match(oper_p->host, host))
315 return oper_p;
316 }
317
318 return NULL;
319}
320
212380e3 321struct server_conf *
322make_server_conf(void)
323{
8e43b0b4 324 struct server_conf *server_p = rb_malloc(sizeof(struct server_conf));
212380e3 325 server_p->aftype = AF_INET;
326 return server_p;
327}
328
329void
330free_server_conf(struct server_conf *server_p)
331{
332 s_assert(server_p != NULL);
333 if(server_p == NULL)
334 return;
335
336 if(!EmptyString(server_p->passwd))
337 {
338 memset(server_p->passwd, 0, strlen(server_p->passwd));
90a3c35b 339 rb_free(server_p->passwd);
212380e3 340 }
341
342 if(!EmptyString(server_p->spasswd))
343 {
344 memset(server_p->spasswd, 0, strlen(server_p->spasswd));
90a3c35b 345 rb_free(server_p->spasswd);
212380e3 346 }
347
90a3c35b
VY
348 rb_free(server_p->name);
349 rb_free(server_p->host);
350 rb_free(server_p->class_name);
351 rb_free(server_p);
212380e3 352}
353
354void
355add_server_conf(struct server_conf *server_p)
356{
357 if(EmptyString(server_p->class_name))
358 {
62d28946 359 server_p->class_name = rb_strdup("default");
212380e3 360 server_p->class = default_class;
361 return;
362 }
363
364 server_p->class = find_class(server_p->class_name);
365
366 if(server_p->class == default_class)
367 {
368 conf_report_error("Warning connect::class invalid for %s",
369 server_p->name);
370
90a3c35b 371 rb_free(server_p->class_name);
62d28946 372 server_p->class_name = rb_strdup("default");
212380e3 373 }
374
375 if(strchr(server_p->host, '*') || strchr(server_p->host, '?'))
376 return;
377}
378
379struct server_conf *
380find_server_conf(const char *name)
381{
382 struct server_conf *server_p;
af81d5a0 383 rb_dlink_node *ptr;
212380e3 384
8e69bb4e 385 RB_DLINK_FOREACH(ptr, server_conf_list.head)
212380e3 386 {
387 server_p = ptr->data;
388
389 if(ServerConfIllegal(server_p))
390 continue;
391
392 if(match(name, server_p->name))
393 return server_p;
394 }
395
396 return NULL;
397}
398
399void
400attach_server_conf(struct Client *client_p, struct server_conf *server_p)
401{
402 /* already have an attached conf */
403 if(client_p->localClient->att_sconf)
404 {
405 /* short circuit this special case :) */
406 if(client_p->localClient->att_sconf == server_p)
407 return;
408
409 detach_server_conf(client_p);
410 }
411
412 CurrUsers(server_p->class)++;
413
414 client_p->localClient->att_sconf = server_p;
415 server_p->servers++;
416}
417
418void
419detach_server_conf(struct Client *client_p)
420{
421 struct server_conf *server_p = client_p->localClient->att_sconf;
422
423 if(server_p == NULL)
424 return;
425
426 client_p->localClient->att_sconf = NULL;
427 server_p->servers--;
428 CurrUsers(server_p->class)--;
429
430 if(ServerConfIllegal(server_p) && !server_p->servers)
431 {
432 /* the class this one is using may need destroying too */
433 if(MaxUsers(server_p->class) < 0 && CurrUsers(server_p->class) <= 0)
434 free_class(server_p->class);
435
af81d5a0 436 rb_dlinkDelete(&server_p->node, &server_conf_list);
212380e3 437 free_server_conf(server_p);
438 }
439}
440
441void
6d18bf1a 442set_server_conf_autoconn(struct Client *source_p, const char *name, int newval)
212380e3 443{
444 struct server_conf *server_p;
445
446 if((server_p = find_server_conf(name)) != NULL)
447 {
448 if(newval)
449 server_p->flags |= SERVER_AUTOCONN;
450 else
451 server_p->flags &= ~SERVER_AUTOCONN;
452
453 sendto_realops_snomask(SNO_GENERAL, L_ALL,
454 "%s has changed AUTOCONN for %s to %i",
455 get_oper_name(source_p), name, newval);
456 }
457 else
5366977b 458 sendto_one_notice(source_p, ":Can't find %s", name);
212380e3 459}
460
6b2cf989
JT
461void
462disable_server_conf_autoconn(const char *name)
463{
464 struct server_conf *server_p;
465
466 server_p = find_server_conf(name);
467 if(server_p != NULL && server_p->flags & SERVER_AUTOCONN)
468 {
469 server_p->flags &= ~SERVER_AUTOCONN;
470
471 sendto_realops_snomask(SNO_GENERAL, L_ALL,
472 "Disabling AUTOCONN for %s because of error",
473 name);
474 ilog(L_SERVER, "Disabling AUTOCONN for %s because of error",
475 name);
476 }
477}
478
212380e3 479struct ConfItem *
480find_xline(const char *gecos, int counter)
481{
482 struct ConfItem *aconf;
af81d5a0 483 rb_dlink_node *ptr;
212380e3 484
8e69bb4e 485 RB_DLINK_FOREACH(ptr, xline_conf_list.head)
212380e3 486 {
487 aconf = ptr->data;
488
70c6c150 489 if(match_esc(aconf->host, gecos))
212380e3 490 {
491 if(counter)
492 aconf->port++;
493 return aconf;
494 }
495 }
496
497 return NULL;
498}
499
0fdb2570
JT
500struct ConfItem *
501find_xline_mask(const char *gecos)
502{
503 struct ConfItem *aconf;
af81d5a0 504 rb_dlink_node *ptr;
0fdb2570 505
8e69bb4e 506 RB_DLINK_FOREACH(ptr, xline_conf_list.head)
0fdb2570
JT
507 {
508 aconf = ptr->data;
509
70c6c150 510 if(!irccmp(aconf->host, gecos))
0fdb2570
JT
511 return aconf;
512 }
513
514 return NULL;
515}
516
212380e3 517struct ConfItem *
518find_nick_resv(const char *name)
519{
520 struct ConfItem *aconf;
af81d5a0 521 rb_dlink_node *ptr;
212380e3 522
8e69bb4e 523 RB_DLINK_FOREACH(ptr, resv_conf_list.head)
212380e3 524 {
525 aconf = ptr->data;
526
70c6c150 527 if(match_esc(aconf->host, name))
212380e3 528 {
529 aconf->port++;
530 return aconf;
531 }
532 }
533
534 return NULL;
535}
536
0fdb2570
JT
537struct ConfItem *
538find_nick_resv_mask(const char *name)
539{
540 struct ConfItem *aconf;
af81d5a0 541 rb_dlink_node *ptr;
0fdb2570 542
8e69bb4e 543 RB_DLINK_FOREACH(ptr, resv_conf_list.head)
0fdb2570
JT
544 {
545 aconf = ptr->data;
546
70c6c150 547 if(!irccmp(aconf->host, name))
0fdb2570
JT
548 return aconf;
549 }
550
551 return NULL;
552}
553
212380e3 554/* clean_resv_nick()
555 *
556 * inputs - nick
557 * outputs - 1 if nick is vaild resv, 0 otherwise
558 * side effects -
559 */
560int
561clean_resv_nick(const char *nick)
562{
563 char tmpch;
564 int as = 0;
565 int q = 0;
566 int ch = 0;
567
568 if(*nick == '-' || IsDigit(*nick))
569 return 0;
570
571 while ((tmpch = *nick++))
572 {
573 if(tmpch == '?' || tmpch == '@' || tmpch == '#')
574 q++;
575 else if(tmpch == '*')
576 as++;
577 else if(IsNickChar(tmpch))
578 ch++;
579 else
580 return 0;
581 }
582
583 if(!ch && as)
584 return 0;
585
586 return 1;
587}
588
589/* valid_wild_card_simple()
590 *
591 * inputs - "thing" to test
592 * outputs - 1 if enough wildcards, else 0
593 * side effects -
594 */
595int
596valid_wild_card_simple(const char *data)
597{
598 const char *p;
599 char tmpch;
600 int nonwild = 0;
7d08aa89 601 int wild = 0;
212380e3 602
603 /* check the string for minimum number of nonwildcard chars */
604 p = data;
605
606 while((tmpch = *p++))
607 {
608 /* found an escape, p points to the char after it, so skip
609 * that and move on.
610 */
7d08aa89 611 if(tmpch == '\\' && *p)
212380e3 612 {
613 p++;
7d08aa89 614 if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
615 return 1;
212380e3 616 }
617 else if(!IsMWildChar(tmpch))
618 {
619 /* if we have enough nonwildchars, return */
620 if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
621 return 1;
622 }
7d08aa89 623 else
624 wild++;
212380e3 625 }
626
7d08aa89 627 /* strings without wilds are also ok */
628 return wild == 0;
212380e3 629}
630
631time_t
632valid_temp_time(const char *p)
633{
634 time_t result = 0;
635
636 while(*p)
637 {
638 if(IsDigit(*p))
639 {
640 result *= 10;
641 result += ((*p) & 0xF);
642 p++;
643 }
644 else
645 return -1;
646 }
647
648 if(result > (60 * 24 * 7 * 52))
649 result = (60 * 24 * 7 * 52);
650
651 return(result * 60);
652}
653
12894c88 654/* Propagated bans are expired elsewhere. */
212380e3 655static void
656expire_temp_rxlines(void *unused)
657{
658 struct ConfItem *aconf;
af81d5a0 659 rb_dlink_node *ptr;
90a3c35b 660 rb_dlink_node *next_ptr;
212380e3 661 int i;
662
90a3c35b 663 HASH_WALK_SAFE(i, R_MAX, ptr, next_ptr, resvTable)
212380e3 664 {
665 aconf = ptr->data;
666
12894c88
JT
667 if(aconf->lifetime != 0)
668 continue;
9f6bbe3c 669 if(aconf->hold && aconf->hold <= rb_current_time())
212380e3 670 {
671 if(ConfigFileEntry.tkline_expire_notices)
672 sendto_realops_snomask(SNO_GENERAL, L_ALL,
673 "Temporary RESV for [%s] expired",
70c6c150 674 aconf->host);
212380e3 675
676 free_conf(aconf);
af81d5a0 677 rb_dlinkDestroy(ptr, &resvTable[i]);
212380e3 678 }
679 }
680 HASH_WALK_END
681
90a3c35b 682 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
212380e3 683 {
684 aconf = ptr->data;
685
12894c88
JT
686 if(aconf->lifetime != 0)
687 continue;
9f6bbe3c 688 if(aconf->hold && aconf->hold <= rb_current_time())
212380e3 689 {
690 if(ConfigFileEntry.tkline_expire_notices)
691 sendto_realops_snomask(SNO_GENERAL, L_ALL,
692 "Temporary RESV for [%s] expired",
70c6c150 693 aconf->host);
212380e3 694 free_conf(aconf);
af81d5a0 695 rb_dlinkDestroy(ptr, &resv_conf_list);
212380e3 696 }
697 }
698
90a3c35b 699 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
212380e3 700 {
701 aconf = ptr->data;
702
12894c88
JT
703 if(aconf->lifetime != 0)
704 continue;
9f6bbe3c 705 if(aconf->hold && aconf->hold <= rb_current_time())
212380e3 706 {
707 if(ConfigFileEntry.tkline_expire_notices)
708 sendto_realops_snomask(SNO_GENERAL, L_ALL,
709 "Temporary X-line for [%s] expired",
70c6c150 710 aconf->host);
212380e3 711 free_conf(aconf);
af81d5a0 712 rb_dlinkDestroy(ptr, &xline_conf_list);
212380e3 713 }
714 }
715}
716
717unsigned long
718get_nd_count(void)
719{
af81d5a0 720 return(rb_dlink_list_length(&nd_list));
212380e3 721}
722
212380e3 723void
724add_nd_entry(const char *name)
725{
726 struct nd_entry *nd;
727
b37021a4 728 if(irc_dictionary_find(nd_dict, name) != NULL)
212380e3 729 return;
730
6e9b4415 731 nd = rb_bh_alloc(nd_heap);
212380e3 732
907468c4 733 rb_strlcpy(nd->name, name, sizeof(nd->name));
9f6bbe3c 734 nd->expire = rb_current_time() + ConfigFileEntry.nick_delay;
212380e3 735
736 /* this list is ordered */
af81d5a0 737 rb_dlinkAddTail(nd, &nd->lnode, &nd_list);
b37021a4
WP
738
739 irc_dictionary_add(nd_dict, nd->name, nd);
212380e3 740}
741
742void
743free_nd_entry(struct nd_entry *nd)
744{
b37021a4
WP
745 irc_dictionary_delete(nd_dict, nd->name);
746
af81d5a0 747 rb_dlinkDelete(&nd->lnode, &nd_list);
6e9b4415 748 rb_bh_free(nd_heap, nd);
212380e3 749}
750
751void
752expire_nd_entries(void *unused)
753{
754 struct nd_entry *nd;
af81d5a0 755 rb_dlink_node *ptr;
90a3c35b 756 rb_dlink_node *next_ptr;
212380e3 757
90a3c35b 758 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, nd_list.head)
212380e3 759 {
760 nd = ptr->data;
761
762 /* this list is ordered - we can stop when we hit the first
763 * entry that doesnt expire..
764 */
9f6bbe3c 765 if(nd->expire > rb_current_time())
212380e3 766 return;
767
768 free_nd_entry(nd);
769 }
770}
771
772void
773add_tgchange(const char *host)
774{
775 tgchange *target;
7c944f64 776 rb_patricia_node_t *pnode;
212380e3 777
778 if(find_tgchange(host))
779 return;
780
8e43b0b4 781 target = rb_malloc(sizeof(tgchange));
212380e3 782 pnode = make_and_lookup(tgchange_tree, host);
783
784 pnode->data = target;
785 target->pnode = pnode;
786
62d28946 787 target->ip = rb_strdup(host);
9f6bbe3c 788 target->expiry = rb_current_time() + (60*60*12);
212380e3 789
af81d5a0 790 rb_dlinkAdd(target, &target->node, &tgchange_list);
212380e3 791}
792
793tgchange *
794find_tgchange(const char *host)
795{
7c944f64 796 rb_patricia_node_t *pnode;
212380e3 797
7c944f64 798 if((pnode = rb_match_exact_string(tgchange_tree, host)))
212380e3 799 return pnode->data;
800
801 return NULL;
802}
803