]> jfr.im git - irc/rqf/shadowircd.git/blame - src/logger.c
Clarify connection setup.
[irc/rqf/shadowircd.git] / src / logger.c
CommitLineData
212380e3 1/*
3a2ff95d 2 * charybdis: an advanced Internet Relay Chat Daemon(ircd).
212380e3 3 *
4 * Copyright (C) 2003 Lee H <lee@leeh.co.uk>
5 * Copyright (C) 2003-2005 ircd-ratbox development team
3a2ff95d 6 * Copyright (C) 2008 William Pitcock <nenolod@sacredspiral.co.uk>
212380e3 7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
10 * met:
11 *
12 * 1.Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
3a2ff95d 14 *
212380e3 15 * 2.Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
3a2ff95d 18 *
212380e3 19 * 3.The name of the author may not be used to endorse or promote products
20 * derived from this software without specific prior written permission.
21 *
22 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
23 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
24 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
25 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
26 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
27 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
28 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
30 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
31 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
32 * POSSIBILITY OF SUCH DAMAGE.
33 *
9b6ff0c8 34 * $Id: s_log.c 3209 2007-02-11 16:54:43Z jilles $
212380e3 35 */
36
37#include "stdinc.h"
38#include "ircd_defs.h"
d3455e2c 39#include "logger.h"
212380e3 40#include "s_conf.h"
212380e3 41#include "send.h"
42#include "client.h"
43#include "s_serv.h"
44
45static FILE *log_main;
46static FILE *log_user;
47static FILE *log_fuser;
48static FILE *log_oper;
49static FILE *log_foper;
50static FILE *log_server;
51static FILE *log_kill;
212380e3 52static FILE *log_kline;
53static FILE *log_operspy;
54static FILE *log_ioerror;
55
56struct log_struct
57{
58 char **name;
59 FILE **logfile;
60};
61
62static struct log_struct log_table[LAST_LOGFILE] =
63{
64 { NULL, &log_main },
65 { &ConfigFileEntry.fname_userlog, &log_user },
66 { &ConfigFileEntry.fname_fuserlog, &log_fuser },
67 { &ConfigFileEntry.fname_operlog, &log_oper },
68 { &ConfigFileEntry.fname_foperlog, &log_foper },
69 { &ConfigFileEntry.fname_serverlog, &log_server },
70 { &ConfigFileEntry.fname_killlog, &log_kill },
71 { &ConfigFileEntry.fname_klinelog, &log_kline },
212380e3 72 { &ConfigFileEntry.fname_operspylog, &log_operspy },
73 { &ConfigFileEntry.fname_ioerrorlog, &log_ioerror }
74};
75
5274a6d7
AS
76static void
77verify_logfile_access(const char *filename)
78{
79 char *dirname, *d;
80 char buf[512];
81 d = rb_dirname(filename);
82 dirname = LOCAL_COPY(d);
83 rb_free(d);
84
85 if(access(dirname, F_OK) == -1)
86 {
87 rb_snprintf(buf, sizeof(buf), "WARNING: Unable to access logfile %s - parent directory %s does not exist", filename, dirname);
88 if(testing_conf || server_state_foreground)
89 fprintf(stderr, "%s\n", buf);
90 sendto_realops_snomask(SNO_GENERAL, L_ALL, "%s", buf);
91 return;
92 }
93
94 if(access(filename, F_OK) == -1)
95 {
96 if(access(dirname, W_OK) == -1)
97 {
98 rb_snprintf(buf, sizeof(buf), "WARNING: Unable to access logfile %s - access to parent directory %s failed: %s",
99 filename, dirname, strerror(errno));
100 if(testing_conf || server_state_foreground)
101 fprintf(stderr, "%s\n", buf);
102 sendto_realops_snomask(SNO_GENERAL, L_ALL, "%s", buf);
103 }
104 return;
105 }
106
107 if(access(filename, W_OK) == -1)
108 {
109 rb_snprintf(buf, sizeof(buf), "WARNING: Access denied for logfile %s: %s", filename, strerror(errno));
110 if(testing_conf || server_state_foreground)
111 fprintf(stderr, "%s\n", buf);
112 sendto_realops_snomask(SNO_GENERAL, L_ALL, "%s", buf);
113 return;
114 }
115 return;
116}
117
212380e3 118void
119init_main_logfile(void)
120{
5274a6d7 121 verify_logfile_access(logFileName);
212380e3 122 if(log_main == NULL)
5274a6d7 123 {
9b6ff0c8 124 log_main = fopen(logFileName, "a");
5274a6d7 125 }
212380e3 126}
127
128void
129open_logfiles(void)
130{
131 int i;
132
359dada2 133 close_logfiles();
212380e3 134
9b6ff0c8 135 log_main = fopen(logFileName, "a");
212380e3 136
137 /* log_main is handled above, so just do the rest */
138 for(i = 1; i < LAST_LOGFILE; i++)
139 {
359dada2
VY
140 /* reopen those with paths */
141 if(!EmptyString(*log_table[i].name))
5274a6d7
AS
142 {
143 verify_logfile_access(*log_table[i].name);
359dada2 144 *log_table[i].logfile = fopen(*log_table[i].name, "a");
5274a6d7 145 }
359dada2
VY
146 }
147}
148
149void
150close_logfiles(void)
151{
152 int i;
153
154 if(log_main != NULL)
155 fclose(log_main);
156
157 /* log_main is handled above, so just do the rest */
158 for(i = 1; i < LAST_LOGFILE; i++)
159 {
212380e3 160 if(*log_table[i].logfile != NULL)
161 {
162 fclose(*log_table[i].logfile);
163 *log_table[i].logfile = NULL;
164 }
212380e3 165 }
359dada2 166}
212380e3 167
168void
169ilog(ilogfile dest, const char *format, ...)
170{
171 FILE *logfile = *log_table[dest].logfile;
172 char buf[BUFSIZE];
173 char buf2[BUFSIZE];
174 va_list args;
175
176 if(logfile == NULL)
177 return;
178
179 va_start(args, format);
e49c49f9 180 rb_vsnprintf(buf, sizeof(buf), format, args);
212380e3 181 va_end(args);
182
38e6acdd 183 rb_snprintf(buf2, sizeof(buf2), "%s %s\n", smalldate(), buf);
212380e3 184
185 if(fputs(buf2, logfile) < 0)
186 {
187 fclose(logfile);
188 *log_table[dest].logfile = NULL;
0fcbff0c 189 return;
212380e3 190 }
191
192 fflush(logfile);
193}
194
195static void
3a2ff95d 196_iprint(const char *domain, const char *buf)
212380e3 197{
198 if (domain == NULL || buf == NULL)
199 return;
200
201 fprintf(stderr, "%8s: %s\n", domain, buf);
202}
203
204void
205inotice(const char *format, ...)
206{
207 char buf[BUFSIZE];
208 va_list args;
209
210 va_start(args, format);
a5497589 211 rb_vsnprintf(buf, sizeof(buf), format, args);
212380e3 212 va_end(args);
213
214 _iprint("notice", buf);
215
216 ilog(L_MAIN, "%s", buf);
217}
218
219void
220iwarn(const char *format, ...)
221{
222 char buf[BUFSIZE];
223 va_list args;
224
225 va_start(args, format);
a5497589 226 rb_vsnprintf(buf, sizeof(buf), format, args);
212380e3 227 va_end(args);
228
229 _iprint("warning", buf);
230
231 ilog(L_MAIN, "%s", buf);
232}
233
234void
235ierror(const char *format, ...)
236{
237 char buf[BUFSIZE];
238 va_list args;
239
240 va_start(args, format);
a5497589 241 rb_vsnprintf(buf, sizeof(buf), format, args);
212380e3 242 va_end(args);
243
244 _iprint("error", buf);
245
246 ilog(L_MAIN, "%s", buf);
247}
248
249void
250report_operspy(struct Client *source_p, const char *token, const char *arg)
251{
252 /* if its not my client its already propagated */
253 if(MyClient(source_p))
254 sendto_match_servs(source_p, "*", CAP_ENCAP, NOCAPS,
255 "ENCAP * OPERSPY %s %s",
256 token, arg ? arg : "");
257
258 sendto_realops_snomask(SNO_OPERSPY,
259 ConfigFileEntry.operspy_admin_only ? L_ADMIN : L_ALL,
260 "OPERSPY %s %s %s",
261 get_oper_name(source_p), token,
262 arg ? arg : "");
263
264 ilog(L_OPERSPY, "OPERSPY %s %s %s",
265 get_oper_name(source_p), token, arg ? arg : "");
266}
267
268const char *
269smalldate(void)
270{
271 static char buf[MAX_DATE_STRING];
272 struct tm *lt;
9f6bbe3c 273 time_t ltime = rb_current_time();
212380e3 274
275 lt = localtime(&ltime);
276
38e6acdd 277 rb_snprintf(buf, sizeof(buf), "%d/%d/%d %02d.%02d",
212380e3 278 lt->tm_year + 1900, lt->tm_mon + 1,
279 lt->tm_mday, lt->tm_hour, lt->tm_min);
280
281 return buf;
282}
283
212380e3 284void
3a2ff95d 285ilog_error(const char *error)
212380e3 286{
d7b7d8bb 287 ilog(L_IOERROR, "%s: %d (%s)", error, errno, strerror(errno));
212380e3 288
d7b7d8bb 289 sendto_realops_snomask(SNO_DEBUG, L_ALL, "%s: %d (%s)", error, errno, strerror(errno));
212380e3 290}