]> jfr.im git - irc/rqf/shadowircd.git/blame - src/s_newconf.c
[svn] Backport from early 3.x:
[irc/rqf/shadowircd.git] / src / s_newconf.c
CommitLineData
212380e3 1/*
2 * ircd-ratbox: an advanced Internet Relay Chat Daemon(ircd).
3 * s_newconf.c - code for dealing with conf stuff
4 *
5 * Copyright (C) 2004 Lee Hardy <lee@leeh.co.uk>
6 * Copyright (C) 2004-2005 ircd-ratbox development team
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
10 * met:
11 *
12 * 1.Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
14 * 2.Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3.The name of the author may not be used to endorse or promote products
18 * derived from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
21 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
22 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
23 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
24 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
26 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
28 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
29 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 *
5366977b 32 * $Id: s_newconf.c 3161 2007-01-25 07:23:01Z nenolod $
212380e3 33 */
34
35#include "stdinc.h"
36#include "ircd_defs.h"
37#include "common.h"
38#include "s_conf.h"
39#include "s_newconf.h"
40#include "tools.h"
41#include "client.h"
42#include "memory.h"
43#include "s_serv.h"
44#include "send.h"
45#include "hostmask.h"
46#include "newconf.h"
47#include "hash.h"
48#include "balloc.h"
49#include "event.h"
50#include "sprintf_irc.h"
51
52dlink_list shared_conf_list;
53dlink_list cluster_conf_list;
54dlink_list oper_conf_list;
55dlink_list hubleaf_conf_list;
56dlink_list server_conf_list;
57dlink_list xline_conf_list;
58dlink_list resv_conf_list; /* nicks only! */
59dlink_list nd_list; /* nick delay */
60dlink_list tgchange_list;
61
62patricia_tree_t *tgchange_tree;
63
64static BlockHeap *nd_heap = NULL;
65
66static void expire_temp_rxlines(void *unused);
67static void expire_nd_entries(void *unused);
68
69void
70init_s_newconf(void)
71{
72 tgchange_tree = New_Patricia(PATRICIA_BITS);
73 nd_heap = BlockHeapCreate(sizeof(struct nd_entry), ND_HEAP_SIZE);
74 eventAddIsh("expire_nd_entries", expire_nd_entries, NULL, 30);
75 eventAddIsh("expire_temp_rxlines", expire_temp_rxlines, NULL, 60);
76}
77
78void
79clear_s_newconf(void)
80{
81 struct server_conf *server_p;
82 dlink_node *ptr;
83 dlink_node *next_ptr;
84
85 DLINK_FOREACH_SAFE(ptr, next_ptr, shared_conf_list.head)
86 {
87 /* ptr here is ptr->data->node */
88 dlinkDelete(ptr, &shared_conf_list);
89 free_remote_conf(ptr->data);
90 }
91
92 DLINK_FOREACH_SAFE(ptr, next_ptr, cluster_conf_list.head)
93 {
94 dlinkDelete(ptr, &cluster_conf_list);
95 free_remote_conf(ptr->data);
96 }
97
98 DLINK_FOREACH_SAFE(ptr, next_ptr, hubleaf_conf_list.head)
99 {
100 dlinkDelete(ptr, &hubleaf_conf_list);
101 free_remote_conf(ptr->data);
102 }
103
104 DLINK_FOREACH_SAFE(ptr, next_ptr, oper_conf_list.head)
105 {
106 free_oper_conf(ptr->data);
107 dlinkDestroy(ptr, &oper_conf_list);
108 }
109
110 DLINK_FOREACH_SAFE(ptr, next_ptr, server_conf_list.head)
111 {
112 server_p = ptr->data;
113
114 if(!server_p->servers)
115 {
116 dlinkDelete(ptr, &server_conf_list);
117 free_server_conf(ptr->data);
118 }
119 else
120 server_p->flags |= SERVER_ILLEGAL;
121 }
122}
123
124void
125clear_s_newconf_bans(void)
126{
127 struct ConfItem *aconf;
128 dlink_node *ptr, *next_ptr;
129
130 DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
131 {
132 aconf = ptr->data;
133
134 if(aconf->hold)
135 continue;
136
137 free_conf(aconf);
138 dlinkDestroy(ptr, &xline_conf_list);
139 }
140
141 DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
142 {
143 aconf = ptr->data;
144
145 /* temporary resv */
146 if(aconf->hold)
147 continue;
148
149 free_conf(aconf);
150 dlinkDestroy(ptr, &resv_conf_list);
151 }
152
153 clear_resv_hash();
154}
155
156struct remote_conf *
157make_remote_conf(void)
158{
159 struct remote_conf *remote_p = MyMalloc(sizeof(struct remote_conf));
160 return remote_p;
161}
162
163void
164free_remote_conf(struct remote_conf *remote_p)
165{
166 s_assert(remote_p != NULL);
167 if(remote_p == NULL)
168 return;
169
170 MyFree(remote_p->username);
171 MyFree(remote_p->host);
172 MyFree(remote_p->server);
173 MyFree(remote_p);
174}
175
176int
177find_shared_conf(const char *username, const char *host,
178 const char *server, int flags)
179{
180 struct remote_conf *shared_p;
181 dlink_node *ptr;
182
183 DLINK_FOREACH(ptr, shared_conf_list.head)
184 {
185 shared_p = ptr->data;
186
187 if(match(shared_p->username, username) &&
188 match(shared_p->host, host) &&
189 match(shared_p->server, server))
190 {
191 if(shared_p->flags & flags)
192 return YES;
193 else
194 return NO;
195 }
196 }
197
198 return NO;
199}
200
201void
202propagate_generic(struct Client *source_p, const char *command,
203 const char *target, int cap, const char *format, ...)
204{
205 char buffer[BUFSIZE];
206 va_list args;
207
208 va_start(args, format);
209 ircvsnprintf(buffer, sizeof(buffer), format, args);
210 va_end(args);
211
212 sendto_match_servs(source_p, target, cap, NOCAPS,
213 "%s %s %s",
214 command, target, buffer);
215 sendto_match_servs(source_p, target, CAP_ENCAP, cap,
216 "ENCAP %s %s %s",
217 target, command, buffer);
218}
219
220void
221cluster_generic(struct Client *source_p, const char *command,
222 int cltype, int cap, const char *format, ...)
223{
224 char buffer[BUFSIZE];
225 struct remote_conf *shared_p;
226 va_list args;
227 dlink_node *ptr;
228
229 va_start(args, format);
230 ircvsnprintf(buffer, sizeof(buffer), format, args);
231 va_end(args);
232
233 DLINK_FOREACH(ptr, cluster_conf_list.head)
234 {
235 shared_p = ptr->data;
236
237 if(!(shared_p->flags & cltype))
238 continue;
239
240 sendto_match_servs(source_p, shared_p->server, cap, NOCAPS,
241 "%s %s %s",
242 command, shared_p->server, buffer);
243 sendto_match_servs(source_p, shared_p->server, CAP_ENCAP, cap,
244 "ENCAP %s %s %s",
245 shared_p->server, command, buffer);
246 }
247}
248
249struct oper_conf *
250make_oper_conf(void)
251{
252 struct oper_conf *oper_p = MyMalloc(sizeof(struct oper_conf));
253 return oper_p;
254}
255
256void
257free_oper_conf(struct oper_conf *oper_p)
258{
259 s_assert(oper_p != NULL);
260 if(oper_p == NULL)
261 return;
262
263 MyFree(oper_p->username);
264 MyFree(oper_p->host);
265 MyFree(oper_p->name);
266
267 if(oper_p->passwd)
268 {
269 memset(oper_p->passwd, 0, strlen(oper_p->passwd));
270 MyFree(oper_p->passwd);
271 }
272
273#ifdef HAVE_LIBCRYPTO
274 MyFree(oper_p->rsa_pubkey_file);
275
276 if(oper_p->rsa_pubkey)
277 RSA_free(oper_p->rsa_pubkey);
278#endif
279
280 MyFree(oper_p);
281}
282
283struct oper_conf *
284find_oper_conf(const char *username, const char *host, const char *locip, const char *name)
285{
286 struct oper_conf *oper_p;
287 struct irc_sockaddr_storage ip, cip;
288 char addr[HOSTLEN+1];
289 int bits, cbits;
290 dlink_node *ptr;
291
292 parse_netmask(locip, (struct sockaddr *)&cip, &cbits);
293
294 DLINK_FOREACH(ptr, oper_conf_list.head)
295 {
296 oper_p = ptr->data;
297
298 /* name/username doesnt match.. */
299 if(irccmp(oper_p->name, name) || !match(oper_p->username, username))
300 continue;
301
302 strlcpy(addr, oper_p->host, sizeof(addr));
303
304 if(parse_netmask(addr, (struct sockaddr *)&ip, &bits) != HM_HOST)
305 {
306 if(ip.ss_family == cip.ss_family &&
307 comp_with_mask_sock((struct sockaddr *)&ip, (struct sockaddr *)&cip, bits))
308 return oper_p;
309 }
310
311 /* we have to compare against the host as well, because its
312 * valid to set a spoof to an IP, which if we only compare
313 * in ip form to sockhost will not necessarily match --anfl
314 */
315 if(match(oper_p->host, host))
316 return oper_p;
317 }
318
319 return NULL;
320}
321
322struct oper_flags
323{
324 int flag;
325 char has;
326 char hasnt;
327};
328static struct oper_flags oper_flagtable[] =
329{
330 { OPER_GLINE, 'G', 'g' },
331 { OPER_KLINE, 'K', 'k' },
332 { OPER_XLINE, 'X', 'x' },
333 { OPER_GLOBKILL, 'O', 'o' },
334 { OPER_LOCKILL, 'C', 'c' },
335 { OPER_REMOTE, 'R', 'r' },
336 { OPER_UNKLINE, 'U', 'u' },
337 { OPER_REHASH, 'H', 'h' },
338 { OPER_DIE, 'D', 'd' },
339 { OPER_ADMIN, 'A', 'a' },
340 { OPER_NICKS, 'N', 'n' },
341 { OPER_OPERWALL, 'L', 'l' },
342 { OPER_SPY, 'S', 's' },
343 { OPER_INVIS, 'P', 'p' },
344 { OPER_REMOTEBAN, 'B', 'b' },
345 { 0, '\0', '\0' }
346};
347
348const char *
349get_oper_privs(int flags)
350{
351 static char buf[20];
352 char *p;
353 int i;
354
355 p = buf;
356
357 for(i = 0; oper_flagtable[i].flag; i++)
358 {
359 if(flags & oper_flagtable[i].flag)
360 *p++ = oper_flagtable[i].has;
361 else
362 *p++ = oper_flagtable[i].hasnt;
363 }
364
365 *p = '\0';
366
367 return buf;
368}
369
370struct server_conf *
371make_server_conf(void)
372{
373 struct server_conf *server_p = MyMalloc(sizeof(struct server_conf));
374 server_p->aftype = AF_INET;
375 return server_p;
376}
377
378void
379free_server_conf(struct server_conf *server_p)
380{
381 s_assert(server_p != NULL);
382 if(server_p == NULL)
383 return;
384
385 if(!EmptyString(server_p->passwd))
386 {
387 memset(server_p->passwd, 0, strlen(server_p->passwd));
388 MyFree(server_p->passwd);
389 }
390
391 if(!EmptyString(server_p->spasswd))
392 {
393 memset(server_p->spasswd, 0, strlen(server_p->spasswd));
394 MyFree(server_p->spasswd);
395 }
396
397 MyFree(server_p->name);
398 MyFree(server_p->host);
399 MyFree(server_p->class_name);
400 MyFree(server_p);
401}
402
403void
404add_server_conf(struct server_conf *server_p)
405{
406 if(EmptyString(server_p->class_name))
407 {
408 DupString(server_p->class_name, "default");
409 server_p->class = default_class;
410 return;
411 }
412
413 server_p->class = find_class(server_p->class_name);
414
415 if(server_p->class == default_class)
416 {
417 conf_report_error("Warning connect::class invalid for %s",
418 server_p->name);
419
420 MyFree(server_p->class_name);
421 DupString(server_p->class_name, "default");
422 }
423
424 if(strchr(server_p->host, '*') || strchr(server_p->host, '?'))
425 return;
426}
427
428struct server_conf *
429find_server_conf(const char *name)
430{
431 struct server_conf *server_p;
432 dlink_node *ptr;
433
434 DLINK_FOREACH(ptr, server_conf_list.head)
435 {
436 server_p = ptr->data;
437
438 if(ServerConfIllegal(server_p))
439 continue;
440
441 if(match(name, server_p->name))
442 return server_p;
443 }
444
445 return NULL;
446}
447
448void
449attach_server_conf(struct Client *client_p, struct server_conf *server_p)
450{
451 /* already have an attached conf */
452 if(client_p->localClient->att_sconf)
453 {
454 /* short circuit this special case :) */
455 if(client_p->localClient->att_sconf == server_p)
456 return;
457
458 detach_server_conf(client_p);
459 }
460
461 CurrUsers(server_p->class)++;
462
463 client_p->localClient->att_sconf = server_p;
464 server_p->servers++;
465}
466
467void
468detach_server_conf(struct Client *client_p)
469{
470 struct server_conf *server_p = client_p->localClient->att_sconf;
471
472 if(server_p == NULL)
473 return;
474
475 client_p->localClient->att_sconf = NULL;
476 server_p->servers--;
477 CurrUsers(server_p->class)--;
478
479 if(ServerConfIllegal(server_p) && !server_p->servers)
480 {
481 /* the class this one is using may need destroying too */
482 if(MaxUsers(server_p->class) < 0 && CurrUsers(server_p->class) <= 0)
483 free_class(server_p->class);
484
485 dlinkDelete(&server_p->node, &server_conf_list);
486 free_server_conf(server_p);
487 }
488}
489
490void
491set_server_conf_autoconn(struct Client *source_p, char *name, int newval)
492{
493 struct server_conf *server_p;
494
495 if((server_p = find_server_conf(name)) != NULL)
496 {
497 if(newval)
498 server_p->flags |= SERVER_AUTOCONN;
499 else
500 server_p->flags &= ~SERVER_AUTOCONN;
501
502 sendto_realops_snomask(SNO_GENERAL, L_ALL,
503 "%s has changed AUTOCONN for %s to %i",
504 get_oper_name(source_p), name, newval);
505 }
506 else
5366977b 507 sendto_one_notice(source_p, ":Can't find %s", name);
212380e3 508}
509
510struct ConfItem *
511find_xline(const char *gecos, int counter)
512{
513 struct ConfItem *aconf;
514 dlink_node *ptr;
515
516 DLINK_FOREACH(ptr, xline_conf_list.head)
517 {
518 aconf = ptr->data;
519
520 if(match_esc(aconf->name, gecos))
521 {
522 if(counter)
523 aconf->port++;
524 return aconf;
525 }
526 }
527
528 return NULL;
529}
530
531struct ConfItem *
532find_nick_resv(const char *name)
533{
534 struct ConfItem *aconf;
535 dlink_node *ptr;
536
537 DLINK_FOREACH(ptr, resv_conf_list.head)
538 {
539 aconf = ptr->data;
540
541 if(match_esc(aconf->name, name))
542 {
543 aconf->port++;
544 return aconf;
545 }
546 }
547
548 return NULL;
549}
550
551/* clean_resv_nick()
552 *
553 * inputs - nick
554 * outputs - 1 if nick is vaild resv, 0 otherwise
555 * side effects -
556 */
557int
558clean_resv_nick(const char *nick)
559{
560 char tmpch;
561 int as = 0;
562 int q = 0;
563 int ch = 0;
564
565 if(*nick == '-' || IsDigit(*nick))
566 return 0;
567
568 while ((tmpch = *nick++))
569 {
570 if(tmpch == '?' || tmpch == '@' || tmpch == '#')
571 q++;
572 else if(tmpch == '*')
573 as++;
574 else if(IsNickChar(tmpch))
575 ch++;
576 else
577 return 0;
578 }
579
580 if(!ch && as)
581 return 0;
582
583 return 1;
584}
585
586/* valid_wild_card_simple()
587 *
588 * inputs - "thing" to test
589 * outputs - 1 if enough wildcards, else 0
590 * side effects -
591 */
592int
593valid_wild_card_simple(const char *data)
594{
595 const char *p;
596 char tmpch;
597 int nonwild = 0;
598
599 /* check the string for minimum number of nonwildcard chars */
600 p = data;
601
602 while((tmpch = *p++))
603 {
604 /* found an escape, p points to the char after it, so skip
605 * that and move on.
606 */
607 if(tmpch == '\\')
608 {
609 p++;
610 }
611 else if(!IsMWildChar(tmpch))
612 {
613 /* if we have enough nonwildchars, return */
614 if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
615 return 1;
616 }
617 }
618
619 return 0;
620}
621
622time_t
623valid_temp_time(const char *p)
624{
625 time_t result = 0;
626
627 while(*p)
628 {
629 if(IsDigit(*p))
630 {
631 result *= 10;
632 result += ((*p) & 0xF);
633 p++;
634 }
635 else
636 return -1;
637 }
638
639 if(result > (60 * 24 * 7 * 52))
640 result = (60 * 24 * 7 * 52);
641
642 return(result * 60);
643}
644
645static void
646expire_temp_rxlines(void *unused)
647{
648 struct ConfItem *aconf;
649 dlink_node *ptr;
650 dlink_node *next_ptr;
651 int i;
652
653 HASH_WALK_SAFE(i, R_MAX, ptr, next_ptr, resvTable)
654 {
655 aconf = ptr->data;
656
657 if(aconf->hold && aconf->hold <= CurrentTime)
658 {
659 if(ConfigFileEntry.tkline_expire_notices)
660 sendto_realops_snomask(SNO_GENERAL, L_ALL,
661 "Temporary RESV for [%s] expired",
662 aconf->name);
663
664 free_conf(aconf);
665 dlinkDestroy(ptr, &resvTable[i]);
666 }
667 }
668 HASH_WALK_END
669
670 DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
671 {
672 aconf = ptr->data;
673
674 if(aconf->hold && aconf->hold <= CurrentTime)
675 {
676 if(ConfigFileEntry.tkline_expire_notices)
677 sendto_realops_snomask(SNO_GENERAL, L_ALL,
678 "Temporary RESV for [%s] expired",
679 aconf->name);
680 free_conf(aconf);
681 dlinkDestroy(ptr, &resv_conf_list);
682 }
683 }
684
685 DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
686 {
687 aconf = ptr->data;
688
689 if(aconf->hold && aconf->hold <= CurrentTime)
690 {
691 if(ConfigFileEntry.tkline_expire_notices)
692 sendto_realops_snomask(SNO_GENERAL, L_ALL,
693 "Temporary X-line for [%s] expired",
694 aconf->name);
695 free_conf(aconf);
696 dlinkDestroy(ptr, &xline_conf_list);
697 }
698 }
699}
700
701unsigned long
702get_nd_count(void)
703{
704 return(dlink_list_length(&nd_list));
705}
706
707
708void
709add_nd_entry(const char *name)
710{
711 struct nd_entry *nd;
712
713 if(hash_find_nd(name) != NULL)
714 return;
715
716 nd = BlockHeapAlloc(nd_heap);
717
718 strlcpy(nd->name, name, sizeof(nd->name));
719 nd->expire = CurrentTime + ConfigFileEntry.nick_delay;
720
721 /* this list is ordered */
722 dlinkAddTail(nd, &nd->lnode, &nd_list);
723 add_to_nd_hash(name, nd);
724}
725
726void
727free_nd_entry(struct nd_entry *nd)
728{
729 dlinkDelete(&nd->lnode, &nd_list);
730 dlinkDelete(&nd->hnode, &ndTable[nd->hashv]);
731 BlockHeapFree(nd_heap, nd);
732}
733
734void
735expire_nd_entries(void *unused)
736{
737 struct nd_entry *nd;
738 dlink_node *ptr;
739 dlink_node *next_ptr;
740
741 DLINK_FOREACH_SAFE(ptr, next_ptr, nd_list.head)
742 {
743 nd = ptr->data;
744
745 /* this list is ordered - we can stop when we hit the first
746 * entry that doesnt expire..
747 */
748 if(nd->expire > CurrentTime)
749 return;
750
751 free_nd_entry(nd);
752 }
753}
754
755void
756add_tgchange(const char *host)
757{
758 tgchange *target;
759 patricia_node_t *pnode;
760
761 if(find_tgchange(host))
762 return;
763
764 target = MyMalloc(sizeof(tgchange));
765 pnode = make_and_lookup(tgchange_tree, host);
766
767 pnode->data = target;
768 target->pnode = pnode;
769
770 DupString(target->ip, host);
771 target->expiry = CurrentTime + (60*60*12);
772
773 dlinkAdd(target, &target->node, &tgchange_list);
774}
775
776tgchange *
777find_tgchange(const char *host)
778{
779 patricia_node_t *pnode;
780
781 if((pnode = match_exact_string(tgchange_tree, host)))
782 return pnode->data;
783
784 return NULL;
785}
786