]> jfr.im git - irc/rqf/shadowircd.git/blob - src/s_newconf.c
ircs[n]printf -> rb_s[n]printf
[irc/rqf/shadowircd.git] / src / s_newconf.c
1 /*
2 * ircd-ratbox: an advanced Internet Relay Chat Daemon(ircd).
3 * s_newconf.c - code for dealing with conf stuff
4 *
5 * Copyright (C) 2004 Lee Hardy <lee@leeh.co.uk>
6 * Copyright (C) 2004-2005 ircd-ratbox development team
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
10 * met:
11 *
12 * 1.Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
14 * 2.Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3.The name of the author may not be used to endorse or promote products
18 * derived from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
21 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
22 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
23 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
24 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
26 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
28 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
29 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 *
32 * $Id: s_newconf.c 3508 2007-06-04 16:04:49Z jilles $
33 */
34
35 #include "stdinc.h"
36 #include "ircd_defs.h"
37 #include "common.h"
38 #include "s_conf.h"
39 #include "s_newconf.h"
40 #include "tools.h"
41 #include "client.h"
42 #include "memory.h"
43 #include "s_serv.h"
44 #include "send.h"
45 #include "hostmask.h"
46 #include "newconf.h"
47 #include "hash.h"
48 #include "balloc.h"
49 #include "event.h"
50 #include "sprintf_irc.h"
51 #include "irc_dictionary.h"
52
53 dlink_list shared_conf_list;
54 dlink_list cluster_conf_list;
55 dlink_list oper_conf_list;
56 dlink_list hubleaf_conf_list;
57 dlink_list server_conf_list;
58 dlink_list xline_conf_list;
59 dlink_list resv_conf_list; /* nicks only! */
60 dlink_list nd_list; /* nick delay */
61 dlink_list tgchange_list;
62
63 patricia_tree_t *tgchange_tree;
64
65 static BlockHeap *nd_heap = NULL;
66
67 static void expire_temp_rxlines(void *unused);
68 static void expire_nd_entries(void *unused);
69
70 void
71 init_s_newconf(void)
72 {
73 tgchange_tree = New_Patricia(PATRICIA_BITS);
74 nd_heap = BlockHeapCreate(sizeof(struct nd_entry), ND_HEAP_SIZE);
75 eventAddIsh("expire_nd_entries", expire_nd_entries, NULL, 30);
76 eventAddIsh("expire_temp_rxlines", expire_temp_rxlines, NULL, 60);
77 }
78
79 void
80 clear_s_newconf(void)
81 {
82 struct server_conf *server_p;
83 dlink_node *ptr;
84 dlink_node *next_ptr;
85
86 DLINK_FOREACH_SAFE(ptr, next_ptr, shared_conf_list.head)
87 {
88 /* ptr here is ptr->data->node */
89 dlinkDelete(ptr, &shared_conf_list);
90 free_remote_conf(ptr->data);
91 }
92
93 DLINK_FOREACH_SAFE(ptr, next_ptr, cluster_conf_list.head)
94 {
95 dlinkDelete(ptr, &cluster_conf_list);
96 free_remote_conf(ptr->data);
97 }
98
99 DLINK_FOREACH_SAFE(ptr, next_ptr, hubleaf_conf_list.head)
100 {
101 dlinkDelete(ptr, &hubleaf_conf_list);
102 free_remote_conf(ptr->data);
103 }
104
105 DLINK_FOREACH_SAFE(ptr, next_ptr, oper_conf_list.head)
106 {
107 free_oper_conf(ptr->data);
108 dlinkDestroy(ptr, &oper_conf_list);
109 }
110
111 DLINK_FOREACH_SAFE(ptr, next_ptr, server_conf_list.head)
112 {
113 server_p = ptr->data;
114
115 if(!server_p->servers)
116 {
117 dlinkDelete(ptr, &server_conf_list);
118 free_server_conf(ptr->data);
119 }
120 else
121 server_p->flags |= SERVER_ILLEGAL;
122 }
123 }
124
125 void
126 clear_s_newconf_bans(void)
127 {
128 struct ConfItem *aconf;
129 dlink_node *ptr, *next_ptr;
130
131 DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
132 {
133 aconf = ptr->data;
134
135 if(aconf->hold)
136 continue;
137
138 free_conf(aconf);
139 dlinkDestroy(ptr, &xline_conf_list);
140 }
141
142 DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
143 {
144 aconf = ptr->data;
145
146 /* temporary resv */
147 if(aconf->hold)
148 continue;
149
150 free_conf(aconf);
151 dlinkDestroy(ptr, &resv_conf_list);
152 }
153
154 clear_resv_hash();
155 }
156
157 struct remote_conf *
158 make_remote_conf(void)
159 {
160 struct remote_conf *remote_p = MyMalloc(sizeof(struct remote_conf));
161 return remote_p;
162 }
163
164 void
165 free_remote_conf(struct remote_conf *remote_p)
166 {
167 s_assert(remote_p != NULL);
168 if(remote_p == NULL)
169 return;
170
171 MyFree(remote_p->username);
172 MyFree(remote_p->host);
173 MyFree(remote_p->server);
174 MyFree(remote_p);
175 }
176
177 int
178 find_shared_conf(const char *username, const char *host,
179 const char *server, int flags)
180 {
181 struct remote_conf *shared_p;
182 dlink_node *ptr;
183
184 DLINK_FOREACH(ptr, shared_conf_list.head)
185 {
186 shared_p = ptr->data;
187
188 if(match(shared_p->username, username) &&
189 match(shared_p->host, host) &&
190 match(shared_p->server, server))
191 {
192 if(shared_p->flags & flags)
193 return YES;
194 else
195 return NO;
196 }
197 }
198
199 return NO;
200 }
201
202 void
203 propagate_generic(struct Client *source_p, const char *command,
204 const char *target, int cap, const char *format, ...)
205 {
206 char buffer[BUFSIZE];
207 va_list args;
208
209 va_start(args, format);
210 ircvsnprintf(buffer, sizeof(buffer), format, args);
211 va_end(args);
212
213 sendto_match_servs(source_p, target, cap, NOCAPS,
214 "%s %s %s",
215 command, target, buffer);
216 sendto_match_servs(source_p, target, CAP_ENCAP, cap,
217 "ENCAP %s %s %s",
218 target, command, buffer);
219 }
220
221 void
222 cluster_generic(struct Client *source_p, const char *command,
223 int cltype, int cap, const char *format, ...)
224 {
225 char buffer[BUFSIZE];
226 struct remote_conf *shared_p;
227 va_list args;
228 dlink_node *ptr;
229
230 va_start(args, format);
231 ircvsnprintf(buffer, sizeof(buffer), format, args);
232 va_end(args);
233
234 DLINK_FOREACH(ptr, cluster_conf_list.head)
235 {
236 shared_p = ptr->data;
237
238 if(!(shared_p->flags & cltype))
239 continue;
240
241 sendto_match_servs(source_p, shared_p->server, cap, NOCAPS,
242 "%s %s %s",
243 command, shared_p->server, buffer);
244 sendto_match_servs(source_p, shared_p->server, CAP_ENCAP, cap,
245 "ENCAP %s %s %s",
246 shared_p->server, command, buffer);
247 }
248 }
249
250 struct oper_conf *
251 make_oper_conf(void)
252 {
253 struct oper_conf *oper_p = MyMalloc(sizeof(struct oper_conf));
254 return oper_p;
255 }
256
257 void
258 free_oper_conf(struct oper_conf *oper_p)
259 {
260 s_assert(oper_p != NULL);
261 if(oper_p == NULL)
262 return;
263
264 MyFree(oper_p->username);
265 MyFree(oper_p->host);
266 MyFree(oper_p->name);
267
268 if(oper_p->passwd)
269 {
270 memset(oper_p->passwd, 0, strlen(oper_p->passwd));
271 MyFree(oper_p->passwd);
272 }
273
274 #ifdef HAVE_LIBCRYPTO
275 MyFree(oper_p->rsa_pubkey_file);
276
277 if(oper_p->rsa_pubkey)
278 RSA_free(oper_p->rsa_pubkey);
279 #endif
280
281 MyFree(oper_p);
282 }
283
284 struct oper_conf *
285 find_oper_conf(const char *username, const char *host, const char *locip, const char *name)
286 {
287 struct oper_conf *oper_p;
288 struct irc_sockaddr_storage ip, cip;
289 char addr[HOSTLEN+1];
290 int bits, cbits;
291 dlink_node *ptr;
292
293 parse_netmask(locip, (struct sockaddr *)&cip, &cbits);
294
295 DLINK_FOREACH(ptr, oper_conf_list.head)
296 {
297 oper_p = ptr->data;
298
299 /* name/username doesnt match.. */
300 if(irccmp(oper_p->name, name) || !match(oper_p->username, username))
301 continue;
302
303 strlcpy(addr, oper_p->host, sizeof(addr));
304
305 if(parse_netmask(addr, (struct sockaddr *)&ip, &bits) != HM_HOST)
306 {
307 if(ip.ss_family == cip.ss_family &&
308 comp_with_mask_sock((struct sockaddr *)&ip, (struct sockaddr *)&cip, bits))
309 return oper_p;
310 }
311
312 /* we have to compare against the host as well, because its
313 * valid to set a spoof to an IP, which if we only compare
314 * in ip form to sockhost will not necessarily match --anfl
315 */
316 if(match(oper_p->host, host))
317 return oper_p;
318 }
319
320 return NULL;
321 }
322
323 struct oper_flags
324 {
325 int flag;
326 char has;
327 char hasnt;
328 };
329 static struct oper_flags oper_flagtable[] =
330 {
331 { OPER_GLINE, 'G', 'g' },
332 { OPER_KLINE, 'K', 'k' },
333 { OPER_XLINE, 'X', 'x' },
334 { OPER_RESV, 'Q', 'q' },
335 { OPER_GLOBKILL, 'O', 'o' },
336 { OPER_LOCKILL, 'C', 'c' },
337 { OPER_REMOTE, 'R', 'r' },
338 { OPER_UNKLINE, 'U', 'u' },
339 { OPER_REHASH, 'H', 'h' },
340 { OPER_DIE, 'D', 'd' },
341 { OPER_ADMIN, 'A', 'a' },
342 { OPER_NICKS, 'N', 'n' },
343 { OPER_OPERWALL, 'L', 'l' },
344 { OPER_SPY, 'S', 's' },
345 { OPER_INVIS, 'P', 'p' },
346 { OPER_REMOTEBAN, 'B', 'b' },
347 { OPER_MASSNOTICE, 'M', 'm' },
348 { 0, '\0', '\0' }
349 };
350
351 const char *
352 get_oper_privs(int flags)
353 {
354 static char buf[20];
355 char *p;
356 int i;
357
358 p = buf;
359
360 for(i = 0; oper_flagtable[i].flag; i++)
361 {
362 if(flags & oper_flagtable[i].flag)
363 *p++ = oper_flagtable[i].has;
364 else
365 *p++ = oper_flagtable[i].hasnt;
366 }
367
368 *p = '\0';
369
370 return buf;
371 }
372
373 struct server_conf *
374 make_server_conf(void)
375 {
376 struct server_conf *server_p = MyMalloc(sizeof(struct server_conf));
377 server_p->aftype = AF_INET;
378 return server_p;
379 }
380
381 void
382 free_server_conf(struct server_conf *server_p)
383 {
384 s_assert(server_p != NULL);
385 if(server_p == NULL)
386 return;
387
388 if(!EmptyString(server_p->passwd))
389 {
390 memset(server_p->passwd, 0, strlen(server_p->passwd));
391 MyFree(server_p->passwd);
392 }
393
394 if(!EmptyString(server_p->spasswd))
395 {
396 memset(server_p->spasswd, 0, strlen(server_p->spasswd));
397 MyFree(server_p->spasswd);
398 }
399
400 MyFree(server_p->name);
401 MyFree(server_p->host);
402 MyFree(server_p->class_name);
403 MyFree(server_p);
404 }
405
406 void
407 add_server_conf(struct server_conf *server_p)
408 {
409 if(EmptyString(server_p->class_name))
410 {
411 DupString(server_p->class_name, "default");
412 server_p->class = default_class;
413 return;
414 }
415
416 server_p->class = find_class(server_p->class_name);
417
418 if(server_p->class == default_class)
419 {
420 conf_report_error("Warning connect::class invalid for %s",
421 server_p->name);
422
423 MyFree(server_p->class_name);
424 DupString(server_p->class_name, "default");
425 }
426
427 if(strchr(server_p->host, '*') || strchr(server_p->host, '?'))
428 return;
429 }
430
431 struct server_conf *
432 find_server_conf(const char *name)
433 {
434 struct server_conf *server_p;
435 dlink_node *ptr;
436
437 DLINK_FOREACH(ptr, server_conf_list.head)
438 {
439 server_p = ptr->data;
440
441 if(ServerConfIllegal(server_p))
442 continue;
443
444 if(match(name, server_p->name))
445 return server_p;
446 }
447
448 return NULL;
449 }
450
451 void
452 attach_server_conf(struct Client *client_p, struct server_conf *server_p)
453 {
454 /* already have an attached conf */
455 if(client_p->localClient->att_sconf)
456 {
457 /* short circuit this special case :) */
458 if(client_p->localClient->att_sconf == server_p)
459 return;
460
461 detach_server_conf(client_p);
462 }
463
464 CurrUsers(server_p->class)++;
465
466 client_p->localClient->att_sconf = server_p;
467 server_p->servers++;
468 }
469
470 void
471 detach_server_conf(struct Client *client_p)
472 {
473 struct server_conf *server_p = client_p->localClient->att_sconf;
474
475 if(server_p == NULL)
476 return;
477
478 client_p->localClient->att_sconf = NULL;
479 server_p->servers--;
480 CurrUsers(server_p->class)--;
481
482 if(ServerConfIllegal(server_p) && !server_p->servers)
483 {
484 /* the class this one is using may need destroying too */
485 if(MaxUsers(server_p->class) < 0 && CurrUsers(server_p->class) <= 0)
486 free_class(server_p->class);
487
488 dlinkDelete(&server_p->node, &server_conf_list);
489 free_server_conf(server_p);
490 }
491 }
492
493 void
494 set_server_conf_autoconn(struct Client *source_p, char *name, int newval)
495 {
496 struct server_conf *server_p;
497
498 if((server_p = find_server_conf(name)) != NULL)
499 {
500 if(newval)
501 server_p->flags |= SERVER_AUTOCONN;
502 else
503 server_p->flags &= ~SERVER_AUTOCONN;
504
505 sendto_realops_snomask(SNO_GENERAL, L_ALL,
506 "%s has changed AUTOCONN for %s to %i",
507 get_oper_name(source_p), name, newval);
508 }
509 else
510 sendto_one_notice(source_p, ":Can't find %s", name);
511 }
512
513 struct ConfItem *
514 find_xline(const char *gecos, int counter)
515 {
516 struct ConfItem *aconf;
517 dlink_node *ptr;
518
519 DLINK_FOREACH(ptr, xline_conf_list.head)
520 {
521 aconf = ptr->data;
522
523 if(match_esc(aconf->name, gecos))
524 {
525 if(counter)
526 aconf->port++;
527 return aconf;
528 }
529 }
530
531 return NULL;
532 }
533
534 struct ConfItem *
535 find_xline_mask(const char *gecos)
536 {
537 struct ConfItem *aconf;
538 dlink_node *ptr;
539
540 DLINK_FOREACH(ptr, xline_conf_list.head)
541 {
542 aconf = ptr->data;
543
544 if(!irccmp(aconf->name, gecos))
545 return aconf;
546 }
547
548 return NULL;
549 }
550
551 struct ConfItem *
552 find_nick_resv(const char *name)
553 {
554 struct ConfItem *aconf;
555 dlink_node *ptr;
556
557 DLINK_FOREACH(ptr, resv_conf_list.head)
558 {
559 aconf = ptr->data;
560
561 if(match_esc(aconf->name, name))
562 {
563 aconf->port++;
564 return aconf;
565 }
566 }
567
568 return NULL;
569 }
570
571 struct ConfItem *
572 find_nick_resv_mask(const char *name)
573 {
574 struct ConfItem *aconf;
575 dlink_node *ptr;
576
577 DLINK_FOREACH(ptr, resv_conf_list.head)
578 {
579 aconf = ptr->data;
580
581 if(!irccmp(aconf->name, name))
582 return aconf;
583 }
584
585 return NULL;
586 }
587
588 /* clean_resv_nick()
589 *
590 * inputs - nick
591 * outputs - 1 if nick is vaild resv, 0 otherwise
592 * side effects -
593 */
594 int
595 clean_resv_nick(const char *nick)
596 {
597 char tmpch;
598 int as = 0;
599 int q = 0;
600 int ch = 0;
601
602 if(*nick == '-' || IsDigit(*nick))
603 return 0;
604
605 while ((tmpch = *nick++))
606 {
607 if(tmpch == '?' || tmpch == '@' || tmpch == '#')
608 q++;
609 else if(tmpch == '*')
610 as++;
611 else if(IsNickChar(tmpch))
612 ch++;
613 else
614 return 0;
615 }
616
617 if(!ch && as)
618 return 0;
619
620 return 1;
621 }
622
623 /* valid_wild_card_simple()
624 *
625 * inputs - "thing" to test
626 * outputs - 1 if enough wildcards, else 0
627 * side effects -
628 */
629 int
630 valid_wild_card_simple(const char *data)
631 {
632 const char *p;
633 char tmpch;
634 int nonwild = 0;
635 int wild = 0;
636
637 /* check the string for minimum number of nonwildcard chars */
638 p = data;
639
640 while((tmpch = *p++))
641 {
642 /* found an escape, p points to the char after it, so skip
643 * that and move on.
644 */
645 if(tmpch == '\\' && *p)
646 {
647 p++;
648 if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
649 return 1;
650 }
651 else if(!IsMWildChar(tmpch))
652 {
653 /* if we have enough nonwildchars, return */
654 if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
655 return 1;
656 }
657 else
658 wild++;
659 }
660
661 /* strings without wilds are also ok */
662 return wild == 0;
663 }
664
665 time_t
666 valid_temp_time(const char *p)
667 {
668 time_t result = 0;
669
670 while(*p)
671 {
672 if(IsDigit(*p))
673 {
674 result *= 10;
675 result += ((*p) & 0xF);
676 p++;
677 }
678 else
679 return -1;
680 }
681
682 if(result > (60 * 24 * 7 * 52))
683 result = (60 * 24 * 7 * 52);
684
685 return(result * 60);
686 }
687
688 static void
689 expire_temp_rxlines(void *unused)
690 {
691 struct ConfItem *aconf;
692 dlink_node *ptr;
693 dlink_node *next_ptr;
694 int i;
695
696 HASH_WALK_SAFE(i, R_MAX, ptr, next_ptr, resvTable)
697 {
698 aconf = ptr->data;
699
700 if(aconf->hold && aconf->hold <= CurrentTime)
701 {
702 if(ConfigFileEntry.tkline_expire_notices)
703 sendto_realops_snomask(SNO_GENERAL, L_ALL,
704 "Temporary RESV for [%s] expired",
705 aconf->name);
706
707 free_conf(aconf);
708 dlinkDestroy(ptr, &resvTable[i]);
709 }
710 }
711 HASH_WALK_END
712
713 DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
714 {
715 aconf = ptr->data;
716
717 if(aconf->hold && aconf->hold <= CurrentTime)
718 {
719 if(ConfigFileEntry.tkline_expire_notices)
720 sendto_realops_snomask(SNO_GENERAL, L_ALL,
721 "Temporary RESV for [%s] expired",
722 aconf->name);
723 free_conf(aconf);
724 dlinkDestroy(ptr, &resv_conf_list);
725 }
726 }
727
728 DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
729 {
730 aconf = ptr->data;
731
732 if(aconf->hold && aconf->hold <= CurrentTime)
733 {
734 if(ConfigFileEntry.tkline_expire_notices)
735 sendto_realops_snomask(SNO_GENERAL, L_ALL,
736 "Temporary X-line for [%s] expired",
737 aconf->name);
738 free_conf(aconf);
739 dlinkDestroy(ptr, &xline_conf_list);
740 }
741 }
742 }
743
744 unsigned long
745 get_nd_count(void)
746 {
747 return(dlink_list_length(&nd_list));
748 }
749
750 void
751 add_nd_entry(const char *name)
752 {
753 struct nd_entry *nd;
754
755 if(irc_dictionary_find(nd_dict, name) != NULL)
756 return;
757
758 nd = BlockHeapAlloc(nd_heap);
759
760 strlcpy(nd->name, name, sizeof(nd->name));
761 nd->expire = CurrentTime + ConfigFileEntry.nick_delay;
762
763 /* this list is ordered */
764 dlinkAddTail(nd, &nd->lnode, &nd_list);
765
766 irc_dictionary_add(nd_dict, nd->name, nd);
767 }
768
769 void
770 free_nd_entry(struct nd_entry *nd)
771 {
772 irc_dictionary_delete(nd_dict, nd->name);
773
774 dlinkDelete(&nd->lnode, &nd_list);
775 BlockHeapFree(nd_heap, nd);
776 }
777
778 void
779 expire_nd_entries(void *unused)
780 {
781 struct nd_entry *nd;
782 dlink_node *ptr;
783 dlink_node *next_ptr;
784
785 DLINK_FOREACH_SAFE(ptr, next_ptr, nd_list.head)
786 {
787 nd = ptr->data;
788
789 /* this list is ordered - we can stop when we hit the first
790 * entry that doesnt expire..
791 */
792 if(nd->expire > CurrentTime)
793 return;
794
795 free_nd_entry(nd);
796 }
797 }
798
799 void
800 add_tgchange(const char *host)
801 {
802 tgchange *target;
803 patricia_node_t *pnode;
804
805 if(find_tgchange(host))
806 return;
807
808 target = MyMalloc(sizeof(tgchange));
809 pnode = make_and_lookup(tgchange_tree, host);
810
811 pnode->data = target;
812 target->pnode = pnode;
813
814 DupString(target->ip, host);
815 target->expiry = CurrentTime + (60*60*12);
816
817 dlinkAdd(target, &target->node, &tgchange_list);
818 }
819
820 tgchange *
821 find_tgchange(const char *host)
822 {
823 patricia_node_t *pnode;
824
825 if((pnode = match_exact_string(tgchange_tree, host)))
826 return pnode->data;
827
828 return NULL;
829 }
830