]> jfr.im git - irc/rqf/shadowircd.git/blame - src/parse.c
Update NEWS.
[irc/rqf/shadowircd.git] / src / parse.c
CommitLineData
212380e3 1/*
8ac75529 2 * charybdis: an advanced ircd.
212380e3 3 * parse.c: The message parser.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
8ac75529 8 * Copyright (C) 2007 William Pitcock
212380e3 9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2 of the License, or
13 * (at your option) any later version.
14 *
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
19 *
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
23 * USA
24 *
f42e9ceb 25 * $Id: parse.c 3177 2007-02-01 00:19:14Z jilles $
212380e3 26 */
27
28#include "stdinc.h"
29#include "parse.h"
30#include "client.h"
31#include "channel.h"
32#include "common.h"
33#include "hash.h"
13ae2f4b 34#include "match.h"
212380e3 35#include "ircd.h"
36#include "numeric.h"
d3455e2c 37#include "logger.h"
212380e3 38#include "s_stats.h"
39#include "send.h"
40#include "msg.h"
41#include "s_conf.h"
212380e3 42#include "s_serv.h"
43#include "packet.h"
44
8ac75529
WP
45static struct Dictionary *cmd_dict = NULL;
46struct Dictionary *alias_dict = NULL;
47
212380e3 48/*
49 * NOTE: parse() should not be called recursively by other functions!
50 */
51static char *sender;
52
53/* parv[0] == source, and parv[LAST] == NULL */
54static char *para[MAXPARA + 2];
55
56static void cancel_clients(struct Client *, struct Client *, char *);
57static void remove_unknown(struct Client *, char *, char *);
58
59static void do_numeric(char[], struct Client *, struct Client *, int, char **);
60static void do_alias(struct alias_entry *, struct Client *, char *);
61
62static int handle_command(struct Message *, struct Client *, struct Client *, int, const char**);
63
212380e3 64static char buffer[1024];
65
212380e3 66/* turn a string into a parc/parv pair */
67
68
69static inline int
70string_to_array(char *string, char **parv)
71{
72 char *p, *buf = string;
73 int x = 1;
74
75 parv[x] = NULL;
76 while (*buf == ' ') /* skip leading spaces */
77 buf++;
78 if(*buf == '\0') /* ignore all-space args */
79 return x;
80
81 do
82 {
83 if(*buf == ':') /* Last parameter */
84 {
85 buf++;
86 parv[x++] = buf;
87 parv[x] = NULL;
88 return x;
89 }
90 else
91 {
92 parv[x++] = buf;
93 parv[x] = NULL;
94 if((p = strchr(buf, ' ')) != NULL)
95 {
96 *p++ = '\0';
97 buf = p;
98 }
99 else
100 return x;
101 }
102 while (*buf == ' ')
103 buf++;
104 if(*buf == '\0')
105 return x;
106 }
107 /* we can go upto parv[MAXPARA], as parv[0] is taken by source */
108 while (x < MAXPARA);
109
110 if(*p == ':')
111 p++;
112
113 parv[x++] = p;
114 parv[x] = NULL;
115 return x;
116}
117
118/* parse()
119 *
120 * given a raw buffer, parses it and generates parv, parc and sender
121 */
122void
123parse(struct Client *client_p, char *pbuffer, char *bufend)
124{
125 struct Client *from = client_p;
126 char *ch;
127 char *s;
128 char *end;
129 int i = 1;
130 char *numeric = 0;
131 struct Message *mptr;
132
133 s_assert(MyConnect(client_p));
de057244 134 s_assert(client_p->localClient->F->fd >= 0);
212380e3 135 if(IsAnyDead(client_p))
136 return;
137
138 for (ch = pbuffer; *ch == ' '; ch++) /* skip spaces */
139 /* null statement */ ;
140
141 para[0] = from->name;
142
143 if(*ch == ':')
144 {
145 ch++;
146
147 /* point sender to the sender param */
148 sender = ch;
149
150 if((s = strchr(ch, ' ')))
151 {
152 *s = '\0';
153 s++;
154 ch = s;
155 }
156
157 if(*sender && IsServer(client_p))
158 {
f42e9ceb 159 from = find_client(sender);
212380e3 160
161 /* didnt find any matching client, issue a kill */
162 if(from == NULL)
163 {
83251205 164 ServerStats.is_unpf++;
212380e3 165 remove_unknown(client_p, sender, pbuffer);
166 return;
167 }
168
169 para[0] = from->name;
170
171 /* fake direction, hmm. */
172 if(from->from != client_p)
173 {
83251205 174 ServerStats.is_wrdi++;
212380e3 175 cancel_clients(client_p, from, pbuffer);
176 return;
177 }
178 }
179 while (*ch == ' ')
180 ch++;
181 }
182
183 if(*ch == '\0')
184 {
83251205 185 ServerStats.is_empt++;
212380e3 186 return;
187 }
188
189 /* at this point there must be some sort of command parameter */
190
191 /*
192 * Extract the command code from the packet. Point s to the end
193 * of the command code and calculate the length using pointer
194 * arithmetic. Note: only need length for numerics and *all*
195 * numerics must have parameters and thus a space after the command
196 * code. -avalon
197 */
198
199 /* EOB is 3 chars long but is not a numeric */
200
201 if(*(ch + 3) == ' ' && /* ok, lets see if its a possible numeric.. */
202 IsDigit(*ch) && IsDigit(*(ch + 1)) && IsDigit(*(ch + 2)))
203 {
204 mptr = NULL;
205 numeric = ch;
83251205 206 ServerStats.is_num++;
212380e3 207 s = ch + 3; /* I know this is ' ' from above if */
208 *s++ = '\0'; /* blow away the ' ', and point s to next part */
209 }
210 else
211 {
212 int ii = 0;
213
214 if((s = strchr(ch, ' ')))
215 *s++ = '\0';
216
90187f21 217 mptr = irc_dictionary_retrieve(cmd_dict, ch);
212380e3 218
219 /* no command or its encap only, error */
220 if(!mptr || !mptr->cmd)
221 {
222 /*
223 * Note: Give error message *only* to recognized
224 * persons. It's a nightmare situation to have
225 * two programs sending "Unknown command"'s or
226 * equivalent to each other at full blast....
227 * If it has got to person state, it at least
228 * seems to be well behaving. Perhaps this message
229 * should never be generated, though... --msa
230 * Hm, when is the buffer empty -- if a command
231 * code has been found ?? -Armin
232 */
233 if(pbuffer[0] != '\0')
234 {
235 if (IsPerson(client_p))
236 {
8ac75529 237 struct alias_entry *aptr = irc_dictionary_retrieve(alias_dict, ch);
212380e3 238 if (aptr != NULL)
239 {
240 do_alias(aptr, client_p, s);
241 return;
242 }
243 }
244 if(IsPerson(from))
245 {
246 sendto_one(from, form_str(ERR_UNKNOWNCOMMAND),
247 me.name, from->name, ch);
248 }
249 }
83251205 250 ServerStats.is_unco++;
212380e3 251 return;
252 }
253
254 ii = bufend - ((s) ? s : ch);
255 mptr->bytes += ii;
256 }
257
258 end = bufend - 1;
259
260 /* XXX this should be done before parse() is called */
261 if(*end == '\n')
262 *end-- = '\0';
263 if(*end == '\r')
264 *end = '\0';
265
266 if(s != NULL)
267 i = string_to_array(s, para);
268
269 if(mptr == NULL)
270 {
271 do_numeric(numeric, client_p, from, i, para);
272 return;
273 }
274
275 if(handle_command(mptr, client_p, from, i, /* XXX discards const!!! */ (const char **)para) < -1)
276 {
277 char *p;
278 for (p = pbuffer; p <= end; p += 8)
279 {
280 /* HACK HACK */
281 /* Its expected this nasty code can be removed
282 * or rewritten later if still needed.
283 */
284 if((unsigned long) (p + 8) > (unsigned long) end)
285 {
286 for (; p <= end; p++)
287 {
288 ilog(L_MAIN, "%02x |%c", p[0], p[0]);
289 }
290 }
291 else
292 ilog(L_MAIN,
293 "%02x %02x %02x %02x %02x %02x %02x %02x |%c%c%c%c%c%c%c%c",
294 p[0], p[1], p[2], p[3], p[4], p[5],
295 p[6], p[7], p[0], p[1], p[2], p[3], p[4], p[5], p[6], p[7]);
296 }
297 }
298
299}
300
301/*
302 * handle_command
303 *
304 * inputs - pointer to message block
305 * - pointer to client
306 * - pointer to client message is from
307 * - count of number of args
308 * - pointer to argv[] array
309 * output - -1 if error from server
310 * side effects -
311 */
312static int
313handle_command(struct Message *mptr, struct Client *client_p,
314 struct Client *from, int i, const char** hpara)
315{
316 struct MessageEntry ehandler;
317 MessageHandler handler = 0;
318 char squitreason[80];
319
320 if(IsAnyDead(client_p))
321 return -1;
322
323 if(IsServer(client_p))
324 mptr->rcount++;
325
326 mptr->count++;
327
328 /* New patch to avoid server flooding from unregistered connects
329 - Pie-Man 07/27/2000 */
330
331 if(!IsRegistered(client_p))
332 {
333 /* if its from a possible server connection
334 * ignore it.. more than likely its a header thats sneaked through
335 */
336
337 if(IsAnyServer(client_p) && !(mptr->flags & MFLG_UNREG))
338 return (1);
339 }
340
341 ehandler = mptr->handlers[from->handler];
342 handler = ehandler.handler;
343
344 /* check right amount of params is passed... --is */
345 if(i < ehandler.min_para ||
346 (ehandler.min_para && EmptyString(hpara[ehandler.min_para - 1])))
347 {
348 if(!IsServer(client_p))
349 {
350 sendto_one(client_p, form_str(ERR_NEEDMOREPARAMS),
351 me.name,
352 EmptyString(client_p->name) ? "*" : client_p->name,
353 mptr->cmd);
354 if(MyClient(client_p))
355 return (1);
356 else
357 return (-1);
358 }
359
360 sendto_realops_snomask(SNO_GENERAL, L_ALL,
361 "Dropping server %s due to (invalid) command '%s'"
362 " with only %d arguments (expecting %d).",
363 client_p->name, mptr->cmd, i, ehandler.min_para);
364 ilog(L_SERVER,
365 "Insufficient parameters (%d < %d) for command '%s' from %s.",
366 i, ehandler.min_para, mptr->cmd, client_p->name);
5b0a5279 367 rb_snprintf(squitreason, sizeof squitreason,
212380e3 368 "Insufficient parameters (%d < %d) for command '%s'",
369 i, ehandler.min_para, mptr->cmd);
370 exit_client(client_p, client_p, client_p, squitreason);
371 return (-1);
372 }
373
374 (*handler) (client_p, from, i, hpara);
375 return (1);
376}
377
378void
379handle_encap(struct Client *client_p, struct Client *source_p,
380 const char *command, int parc, const char *parv[])
381{
382 struct Message *mptr;
383 struct MessageEntry ehandler;
384 MessageHandler handler = 0;
385
386 parv[0] = source_p->name;
387
8ac75529 388 mptr = irc_dictionary_retrieve(cmd_dict, command);
212380e3 389
390 if(mptr == NULL || mptr->cmd == NULL)
391 return;
392
393 ehandler = mptr->handlers[ENCAP_HANDLER];
394 handler = ehandler.handler;
395
396 if(parc < ehandler.min_para ||
397 (ehandler.min_para && EmptyString(parv[ehandler.min_para - 1])))
398 return;
399
400 (*handler) (client_p, source_p, parc, parv);
401}
402
403/*
404 * clear_hash_parse()
405 *
406 * inputs -
407 * output - NONE
408 * side effects - MUST MUST be called at startup ONCE before
409 * any other keyword hash routine is used.
410 *
411 */
412void
413clear_hash_parse()
414{
8ac75529 415 cmd_dict = irc_dictionary_create(strcasecmp);
212380e3 416}
417
418/* mod_add_cmd
419 *
420 * inputs - command name
421 * - pointer to struct Message
422 * output - none
423 * side effects - load this one command name
424 * msg->count msg->bytes is modified in place, in
425 * modules address space. Might not want to do that...
426 */
427void
428mod_add_cmd(struct Message *msg)
429{
212380e3 430 s_assert(msg != NULL);
431 if(msg == NULL)
432 return;
433
8ac75529
WP
434 if (irc_dictionary_find(cmd_dict, msg->cmd) != NULL)
435 return;
212380e3 436
437 msg->count = 0;
438 msg->rcount = 0;
439 msg->bytes = 0;
440
8ac75529 441 irc_dictionary_add(cmd_dict, msg->cmd, msg);
212380e3 442}
443
444/* mod_del_cmd
445 *
446 * inputs - command name
447 * output - none
448 * side effects - unload this one command name
449 */
450void
451mod_del_cmd(struct Message *msg)
452{
212380e3 453 s_assert(msg != NULL);
454 if(msg == NULL)
455 return;
456
8ac75529 457 irc_dictionary_delete(cmd_dict, msg->cmd);
212380e3 458}
459
460/*
461 * report_messages
462 *
463 * inputs - pointer to client to report to
464 * output - NONE
465 * side effects - NONE
466 */
467void
468report_messages(struct Client *source_p)
469{
8ac75529
WP
470 struct DictionaryIter iter;
471 struct Message *msg;
472 struct alias_entry *amsg;
212380e3 473
90187f21 474 DICTIONARY_FOREACH(msg, &iter, cmd_dict)
212380e3 475 {
8ac75529
WP
476 s_assert(msg->cmd != NULL);
477 sendto_one_numeric(source_p, RPL_STATSCOMMANDS,
478 form_str(RPL_STATSCOMMANDS),
479 msg->cmd, msg->count,
480 msg->bytes, msg->rcount);
481 }
212380e3 482
90187f21 483 DICTIONARY_FOREACH(amsg, &iter, alias_dict)
8ac75529
WP
484 {
485 s_assert(amsg->name != NULL);
486 sendto_one_numeric(source_p, RPL_STATSCOMMANDS,
487 form_str(RPL_STATSCOMMANDS),
488 amsg->name, amsg->hits, 0, 0);
212380e3 489 }
490}
491
492/* cancel_clients()
493 *
494 * inputs - client who sent us the message, client with fake
495 * direction, command
496 * outputs - a given warning about the fake direction
497 * side effects -
498 */
499static void
500cancel_clients(struct Client *client_p, struct Client *source_p, char *cmd)
501{
502 /* ok, fake prefix happens naturally during a burst on a nick
503 * collision with TS5, we cant kill them because one client has to
504 * survive, so we just send an error.
505 */
506 if(IsServer(source_p) || IsMe(source_p))
507 {
508 sendto_realops_snomask(SNO_DEBUG, L_ALL,
509 "Message for %s[%s] from %s",
510 source_p->name, source_p->from->name,
715b28fe 511 client_p->name);
212380e3 512 }
513 else
514 {
515 sendto_realops_snomask(SNO_DEBUG, L_ALL,
516 "Message for %s[%s@%s!%s] from %s (TS, ignored)",
517 source_p->name,
518 source_p->username,
519 source_p->host,
520 source_p->from->name,
715b28fe 521 client_p->name);
212380e3 522 }
523}
524
525/* remove_unknown()
526 *
527 * inputs - client who gave us message, supposed sender, buffer
528 * output -
529 * side effects - kills issued for clients, squits for servers
530 */
531static void
532remove_unknown(struct Client *client_p, char *lsender, char *lbuffer)
533{
534 int slen = strlen(lsender);
535
3fde0c14 536 /* meepfoo is a nickname (ignore)
212380e3 537 * #XXXXXXXX is a UID (KILL)
538 * #XX is a SID (SQUIT)
539 * meep.foo is a server (SQUIT)
540 */
541 if((IsDigit(lsender[0]) && slen == 3) ||
542 (strchr(lsender, '.') != NULL))
543 {
544 sendto_realops_snomask(SNO_DEBUG, L_ALL,
545 "Unknown prefix (%s) from %s, Squitting %s",
715b28fe 546 lbuffer, client_p->name, lsender);
212380e3 547
548 sendto_one(client_p,
549 ":%s SQUIT %s :(Unknown prefix (%s) from %s)",
550 get_id(&me, client_p), lsender,
551 lbuffer, client_p->name);
552 }
3fde0c14 553 else if(IsDigit(lsender[0]))
212380e3 554 sendto_one(client_p, ":%s KILL %s :%s (Unknown Client)",
555 get_id(&me, client_p), lsender, me.name);
556}
557
558
559
560/*
561 *
562 * parc number of arguments ('sender' counted as one!)
563 * parv[0] pointer to 'sender' (may point to empty string) (not used)
564 * parv[1]..parv[parc-1]
565 * pointers to additional parameters, this is a NULL
566 * terminated list (parv[parc] == NULL).
567 *
568 * *WARNING*
569 * Numerics are mostly error reports. If there is something
570 * wrong with the message, just *DROP* it! Don't even think of
571 * sending back a neat error message -- big danger of creating
572 * a ping pong error message...
573 */
574static void
575do_numeric(char numeric[], struct Client *client_p, struct Client *source_p, int parc, char *parv[])
576{
577 struct Client *target_p;
578 struct Channel *chptr;
579
580 if(parc < 2 || !IsServer(source_p))
581 return;
582
583 /* Remap low number numerics. */
584 if(numeric[0] == '0')
585 numeric[0] = '1';
586
587 /*
588 * Prepare the parameter portion of the message into 'buffer'.
589 * (Because the buffer is twice as large as the message buffer
590 * for the socket, no overflow can occur here... ...on current
591 * assumptions--bets are off, if these are changed --msa)
592 * Note: if buffer is non-empty, it will begin with SPACE.
593 */
594 if(parc > 1)
595 {
596 char *t = buffer; /* Current position within the buffer */
597 int i;
598 int tl; /* current length of presently being built string in t */
599 for (i = 2; i < (parc - 1); i++)
600 {
38e6acdd 601 tl = rb_sprintf(t, " %s", parv[i]);
212380e3 602 t += tl;
603 }
38e6acdd 604 rb_sprintf(t, " :%s", parv[parc - 1]);
212380e3 605 }
606
607 if((target_p = find_client(parv[1])) != NULL)
608 {
609 if(IsMe(target_p))
610 {
611 /*
612 * We shouldn't get numerics sent to us,
613 * any numerics we do get indicate a bug somewhere..
614 */
615 /* ugh. this is here because of nick collisions. when two servers
616 * relink, they burst each other their nicks, then perform collides.
617 * if there is a nick collision, BOTH servers will kill their own
618 * nicks, and BOTH will kill the other servers nick, which wont exist,
619 * because it will have been already killed by the local server.
620 *
621 * unfortunately, as we cant guarantee other servers will do the
622 * "right thing" on a nick collision, we have to keep both kills.
623 * ergo we need to ignore ERR_NOSUCHNICK. --fl_
624 */
625 /* quick comment. This _was_ tried. i.e. assume the other servers
626 * will do the "right thing" and kill a nick that is colliding.
627 * unfortunately, it did not work. --Dianora
628 */
629 /* note, now we send PING on server connect, we can
630 * also get ERR_NOSUCHSERVER..
631 */
632 if(atoi(numeric) != ERR_NOSUCHNICK &&
633 atoi(numeric) != ERR_NOSUCHSERVER)
634 sendto_realops_snomask(SNO_GENERAL, L_ADMIN,
635 "*** %s(via %s) sent a %s numeric to me: %s",
636 source_p->name,
637 client_p->name, numeric, buffer);
638 return;
639 }
640 else if(target_p->from == client_p)
641 {
642 /* This message changed direction (nick collision?)
643 * ignore it.
644 */
645 return;
646 }
647
648 /* csircd will send out unknown umode flag for +a (admin), drop it here. */
649 if((atoi(numeric) == ERR_UMODEUNKNOWNFLAG) && MyClient(target_p))
650 return;
651
652 /* Fake it for server hiding, if its our client */
653 sendto_one(target_p, ":%s %s %s%s",
654 get_id(source_p, target_p), numeric,
655 get_id(target_p, target_p), buffer);
656 return;
657 }
658 else if((chptr = find_channel(parv[1])) != NULL)
d23bc305
JT
659 sendto_channel_flags(client_p, ALL_MEMBERS, source_p, chptr,
660 "%s %s%s",
661 numeric, chptr->chname, buffer);
212380e3 662}
663
664static void do_alias(struct alias_entry *aptr, struct Client *source_p, char *text)
665{
666 char *p;
667 struct Client *target_p;
668
669 if (!IsFloodDone(source_p) && source_p->localClient->receiveM > 20)
670 flood_endgrace(source_p);
671
672 p = strchr(aptr->target, '@');
673 if (p != NULL)
674 {
675 /* user@server */
676 target_p = find_server(NULL, p + 1);
677 if (target_p != NULL && IsMe(target_p))
678 target_p = NULL;
679 }
680 else
681 {
682 /* nick, must be +S */
683 target_p = find_named_person(aptr->target);
684 if (target_p != NULL && !IsService(target_p))
685 target_p = NULL;
686 }
687
688 if (target_p == NULL)
689 {
690 sendto_one_numeric(source_p, ERR_SERVICESDOWN, form_str(ERR_SERVICESDOWN), aptr->target);
691 return;
692 }
693
694 if (text != NULL && *text == ':')
695 text++;
696 if (text == NULL || *text == '\0')
697 {
698 sendto_one(source_p, form_str(ERR_NOTEXTTOSEND), me.name, source_p->name);
699 return;
700 }
701
702 /* increment the hitcounter on this alias */
703 aptr->hits++;
704
705 sendto_one(target_p, ":%s PRIVMSG %s :%s",
706 get_id(source_p, target_p),
707 p != NULL ? aptr->target : get_id(target_p, target_p),
708 text);
709}
710
711int
712m_not_oper(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
713{
714 sendto_one_numeric(source_p, ERR_NOPRIVILEGES, form_str(ERR_NOPRIVILEGES));
715 return 0;
716}
717
718int
719m_unregistered(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
720{
721 /* bit of a hack.
722 * I don't =really= want to waste a bit in a flag
723 * number_of_nick_changes is only really valid after the client
724 * is fully registered..
725 */
726 if(client_p->localClient->number_of_nick_changes == 0)
727 {
728 sendto_one(client_p, form_str(ERR_NOTREGISTERED), me.name);
729 client_p->localClient->number_of_nick_changes++;
730 }
731
732 return 0;
733}
734
735int
736m_registered(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
737{
738 sendto_one(client_p, form_str(ERR_ALREADYREGISTRED), me.name, source_p->name);
739 return 0;
740}
741
742int
743m_ignore(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
744{
745 return 0;
746}