]> jfr.im git - irc/rqf/shadowircd.git/blob - src/parse.c
s_log.* -> logger.* (s_foo looks ugly, lets try to get rid of it)
[irc/rqf/shadowircd.git] / src / parse.c
1 /*
2 * charybdis: an advanced ircd.
3 * parse.c: The message parser.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
8 * Copyright (C) 2007 William Pitcock
9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2 of the License, or
13 * (at your option) any later version.
14 *
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
19 *
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
23 * USA
24 *
25 * $Id: parse.c 3177 2007-02-01 00:19:14Z jilles $
26 */
27
28 #include "stdinc.h"
29 #include "parse.h"
30 #include "client.h"
31 #include "channel.h"
32 #include "common.h"
33 #include "hash.h"
34 #include "irc_string.h"
35 #include "sprintf_irc.h"
36 #include "ircd.h"
37 #include "numeric.h"
38 #include "logger.h"
39 #include "s_stats.h"
40 #include "send.h"
41 #include "msg.h"
42 #include "s_conf.h"
43 #include "s_serv.h"
44 #include "packet.h"
45
46 static struct Dictionary *cmd_dict = NULL;
47 struct Dictionary *alias_dict = NULL;
48
49 /*
50 * NOTE: parse() should not be called recursively by other functions!
51 */
52 static char *sender;
53
54 /* parv[0] == source, and parv[LAST] == NULL */
55 static char *para[MAXPARA + 2];
56
57 static void cancel_clients(struct Client *, struct Client *, char *);
58 static void remove_unknown(struct Client *, char *, char *);
59
60 static void do_numeric(char[], struct Client *, struct Client *, int, char **);
61 static void do_alias(struct alias_entry *, struct Client *, char *);
62
63 static int handle_command(struct Message *, struct Client *, struct Client *, int, const char**);
64
65 static char buffer[1024];
66
67 /* turn a string into a parc/parv pair */
68
69
70 static inline int
71 string_to_array(char *string, char **parv)
72 {
73 char *p, *buf = string;
74 int x = 1;
75
76 parv[x] = NULL;
77 while (*buf == ' ') /* skip leading spaces */
78 buf++;
79 if(*buf == '\0') /* ignore all-space args */
80 return x;
81
82 do
83 {
84 if(*buf == ':') /* Last parameter */
85 {
86 buf++;
87 parv[x++] = buf;
88 parv[x] = NULL;
89 return x;
90 }
91 else
92 {
93 parv[x++] = buf;
94 parv[x] = NULL;
95 if((p = strchr(buf, ' ')) != NULL)
96 {
97 *p++ = '\0';
98 buf = p;
99 }
100 else
101 return x;
102 }
103 while (*buf == ' ')
104 buf++;
105 if(*buf == '\0')
106 return x;
107 }
108 /* we can go upto parv[MAXPARA], as parv[0] is taken by source */
109 while (x < MAXPARA);
110
111 if(*p == ':')
112 p++;
113
114 parv[x++] = p;
115 parv[x] = NULL;
116 return x;
117 }
118
119 /* parse()
120 *
121 * given a raw buffer, parses it and generates parv, parc and sender
122 */
123 void
124 parse(struct Client *client_p, char *pbuffer, char *bufend)
125 {
126 struct Client *from = client_p;
127 char *ch;
128 char *s;
129 char *end;
130 int i = 1;
131 char *numeric = 0;
132 struct Message *mptr;
133
134 s_assert(MyConnect(client_p));
135 s_assert(client_p->localClient->F->fd >= 0);
136 if(IsAnyDead(client_p))
137 return;
138
139 for (ch = pbuffer; *ch == ' '; ch++) /* skip spaces */
140 /* null statement */ ;
141
142 para[0] = from->name;
143
144 if(*ch == ':')
145 {
146 ch++;
147
148 /* point sender to the sender param */
149 sender = ch;
150
151 if((s = strchr(ch, ' ')))
152 {
153 *s = '\0';
154 s++;
155 ch = s;
156 }
157
158 if(*sender && IsServer(client_p))
159 {
160 from = find_client(sender);
161
162 /* didnt find any matching client, issue a kill */
163 if(from == NULL)
164 {
165 ServerStats->is_unpf++;
166 remove_unknown(client_p, sender, pbuffer);
167 return;
168 }
169
170 para[0] = from->name;
171
172 /* fake direction, hmm. */
173 if(from->from != client_p)
174 {
175 ServerStats->is_wrdi++;
176 cancel_clients(client_p, from, pbuffer);
177 return;
178 }
179 }
180 while (*ch == ' ')
181 ch++;
182 }
183
184 if(*ch == '\0')
185 {
186 ServerStats->is_empt++;
187 return;
188 }
189
190 /* at this point there must be some sort of command parameter */
191
192 /*
193 * Extract the command code from the packet. Point s to the end
194 * of the command code and calculate the length using pointer
195 * arithmetic. Note: only need length for numerics and *all*
196 * numerics must have parameters and thus a space after the command
197 * code. -avalon
198 */
199
200 /* EOB is 3 chars long but is not a numeric */
201
202 if(*(ch + 3) == ' ' && /* ok, lets see if its a possible numeric.. */
203 IsDigit(*ch) && IsDigit(*(ch + 1)) && IsDigit(*(ch + 2)))
204 {
205 mptr = NULL;
206 numeric = ch;
207 ServerStats->is_num++;
208 s = ch + 3; /* I know this is ' ' from above if */
209 *s++ = '\0'; /* blow away the ' ', and point s to next part */
210 }
211 else
212 {
213 int ii = 0;
214
215 if((s = strchr(ch, ' ')))
216 *s++ = '\0';
217
218 mptr = irc_dictionary_retrieve(cmd_dict, ch);
219
220 /* no command or its encap only, error */
221 if(!mptr || !mptr->cmd)
222 {
223 /*
224 * Note: Give error message *only* to recognized
225 * persons. It's a nightmare situation to have
226 * two programs sending "Unknown command"'s or
227 * equivalent to each other at full blast....
228 * If it has got to person state, it at least
229 * seems to be well behaving. Perhaps this message
230 * should never be generated, though... --msa
231 * Hm, when is the buffer empty -- if a command
232 * code has been found ?? -Armin
233 */
234 if(pbuffer[0] != '\0')
235 {
236 if (IsPerson(client_p))
237 {
238 struct alias_entry *aptr = irc_dictionary_retrieve(alias_dict, ch);
239 if (aptr != NULL)
240 {
241 do_alias(aptr, client_p, s);
242 return;
243 }
244 }
245 if(IsPerson(from))
246 {
247 sendto_one(from, form_str(ERR_UNKNOWNCOMMAND),
248 me.name, from->name, ch);
249 }
250 }
251 ServerStats->is_unco++;
252 return;
253 }
254
255 ii = bufend - ((s) ? s : ch);
256 mptr->bytes += ii;
257 }
258
259 end = bufend - 1;
260
261 /* XXX this should be done before parse() is called */
262 if(*end == '\n')
263 *end-- = '\0';
264 if(*end == '\r')
265 *end = '\0';
266
267 if(s != NULL)
268 i = string_to_array(s, para);
269
270 if(mptr == NULL)
271 {
272 do_numeric(numeric, client_p, from, i, para);
273 return;
274 }
275
276 if(handle_command(mptr, client_p, from, i, /* XXX discards const!!! */ (const char **)para) < -1)
277 {
278 char *p;
279 for (p = pbuffer; p <= end; p += 8)
280 {
281 /* HACK HACK */
282 /* Its expected this nasty code can be removed
283 * or rewritten later if still needed.
284 */
285 if((unsigned long) (p + 8) > (unsigned long) end)
286 {
287 for (; p <= end; p++)
288 {
289 ilog(L_MAIN, "%02x |%c", p[0], p[0]);
290 }
291 }
292 else
293 ilog(L_MAIN,
294 "%02x %02x %02x %02x %02x %02x %02x %02x |%c%c%c%c%c%c%c%c",
295 p[0], p[1], p[2], p[3], p[4], p[5],
296 p[6], p[7], p[0], p[1], p[2], p[3], p[4], p[5], p[6], p[7]);
297 }
298 }
299
300 }
301
302 /*
303 * handle_command
304 *
305 * inputs - pointer to message block
306 * - pointer to client
307 * - pointer to client message is from
308 * - count of number of args
309 * - pointer to argv[] array
310 * output - -1 if error from server
311 * side effects -
312 */
313 static int
314 handle_command(struct Message *mptr, struct Client *client_p,
315 struct Client *from, int i, const char** hpara)
316 {
317 struct MessageEntry ehandler;
318 MessageHandler handler = 0;
319 char squitreason[80];
320
321 if(IsAnyDead(client_p))
322 return -1;
323
324 if(IsServer(client_p))
325 mptr->rcount++;
326
327 mptr->count++;
328
329 /* New patch to avoid server flooding from unregistered connects
330 - Pie-Man 07/27/2000 */
331
332 if(!IsRegistered(client_p))
333 {
334 /* if its from a possible server connection
335 * ignore it.. more than likely its a header thats sneaked through
336 */
337
338 if(IsAnyServer(client_p) && !(mptr->flags & MFLG_UNREG))
339 return (1);
340 }
341
342 ehandler = mptr->handlers[from->handler];
343 handler = ehandler.handler;
344
345 /* check right amount of params is passed... --is */
346 if(i < ehandler.min_para ||
347 (ehandler.min_para && EmptyString(hpara[ehandler.min_para - 1])))
348 {
349 if(!IsServer(client_p))
350 {
351 sendto_one(client_p, form_str(ERR_NEEDMOREPARAMS),
352 me.name,
353 EmptyString(client_p->name) ? "*" : client_p->name,
354 mptr->cmd);
355 if(MyClient(client_p))
356 return (1);
357 else
358 return (-1);
359 }
360
361 sendto_realops_snomask(SNO_GENERAL, L_ALL,
362 "Dropping server %s due to (invalid) command '%s'"
363 " with only %d arguments (expecting %d).",
364 client_p->name, mptr->cmd, i, ehandler.min_para);
365 ilog(L_SERVER,
366 "Insufficient parameters (%d < %d) for command '%s' from %s.",
367 i, ehandler.min_para, mptr->cmd, client_p->name);
368 snprintf(squitreason, sizeof squitreason,
369 "Insufficient parameters (%d < %d) for command '%s'",
370 i, ehandler.min_para, mptr->cmd);
371 exit_client(client_p, client_p, client_p, squitreason);
372 return (-1);
373 }
374
375 (*handler) (client_p, from, i, hpara);
376 return (1);
377 }
378
379 void
380 handle_encap(struct Client *client_p, struct Client *source_p,
381 const char *command, int parc, const char *parv[])
382 {
383 struct Message *mptr;
384 struct MessageEntry ehandler;
385 MessageHandler handler = 0;
386
387 parv[0] = source_p->name;
388
389 mptr = irc_dictionary_retrieve(cmd_dict, command);
390
391 if(mptr == NULL || mptr->cmd == NULL)
392 return;
393
394 ehandler = mptr->handlers[ENCAP_HANDLER];
395 handler = ehandler.handler;
396
397 if(parc < ehandler.min_para ||
398 (ehandler.min_para && EmptyString(parv[ehandler.min_para - 1])))
399 return;
400
401 (*handler) (client_p, source_p, parc, parv);
402 }
403
404 /*
405 * clear_hash_parse()
406 *
407 * inputs -
408 * output - NONE
409 * side effects - MUST MUST be called at startup ONCE before
410 * any other keyword hash routine is used.
411 *
412 */
413 void
414 clear_hash_parse()
415 {
416 cmd_dict = irc_dictionary_create(strcasecmp);
417 }
418
419 /* mod_add_cmd
420 *
421 * inputs - command name
422 * - pointer to struct Message
423 * output - none
424 * side effects - load this one command name
425 * msg->count msg->bytes is modified in place, in
426 * modules address space. Might not want to do that...
427 */
428 void
429 mod_add_cmd(struct Message *msg)
430 {
431 s_assert(msg != NULL);
432 if(msg == NULL)
433 return;
434
435 if (irc_dictionary_find(cmd_dict, msg->cmd) != NULL)
436 return;
437
438 msg->count = 0;
439 msg->rcount = 0;
440 msg->bytes = 0;
441
442 irc_dictionary_add(cmd_dict, msg->cmd, msg);
443 }
444
445 /* mod_del_cmd
446 *
447 * inputs - command name
448 * output - none
449 * side effects - unload this one command name
450 */
451 void
452 mod_del_cmd(struct Message *msg)
453 {
454 s_assert(msg != NULL);
455 if(msg == NULL)
456 return;
457
458 irc_dictionary_delete(cmd_dict, msg->cmd);
459 }
460
461 /*
462 * report_messages
463 *
464 * inputs - pointer to client to report to
465 * output - NONE
466 * side effects - NONE
467 */
468 void
469 report_messages(struct Client *source_p)
470 {
471 struct DictionaryIter iter;
472 struct Message *msg;
473 struct alias_entry *amsg;
474
475 DICTIONARY_FOREACH(msg, &iter, cmd_dict)
476 {
477 s_assert(msg->cmd != NULL);
478 sendto_one_numeric(source_p, RPL_STATSCOMMANDS,
479 form_str(RPL_STATSCOMMANDS),
480 msg->cmd, msg->count,
481 msg->bytes, msg->rcount);
482 }
483
484 DICTIONARY_FOREACH(amsg, &iter, alias_dict)
485 {
486 s_assert(amsg->name != NULL);
487 sendto_one_numeric(source_p, RPL_STATSCOMMANDS,
488 form_str(RPL_STATSCOMMANDS),
489 amsg->name, amsg->hits, 0, 0);
490 }
491 }
492
493 /* cancel_clients()
494 *
495 * inputs - client who sent us the message, client with fake
496 * direction, command
497 * outputs - a given warning about the fake direction
498 * side effects -
499 */
500 static void
501 cancel_clients(struct Client *client_p, struct Client *source_p, char *cmd)
502 {
503 /* ok, fake prefix happens naturally during a burst on a nick
504 * collision with TS5, we cant kill them because one client has to
505 * survive, so we just send an error.
506 */
507 if(IsServer(source_p) || IsMe(source_p))
508 {
509 sendto_realops_snomask(SNO_DEBUG, L_ALL,
510 "Message for %s[%s] from %s",
511 source_p->name, source_p->from->name,
512 get_server_name(client_p, SHOW_IP));
513 }
514 else
515 {
516 sendto_realops_snomask(SNO_DEBUG, L_ALL,
517 "Message for %s[%s@%s!%s] from %s (TS, ignored)",
518 source_p->name,
519 source_p->username,
520 source_p->host,
521 source_p->from->name,
522 get_server_name(client_p, SHOW_IP));
523 }
524 }
525
526 /* remove_unknown()
527 *
528 * inputs - client who gave us message, supposed sender, buffer
529 * output -
530 * side effects - kills issued for clients, squits for servers
531 */
532 static void
533 remove_unknown(struct Client *client_p, char *lsender, char *lbuffer)
534 {
535 int slen = strlen(lsender);
536
537 /* meepfoo is a nickname (KILL)
538 * #XXXXXXXX is a UID (KILL)
539 * #XX is a SID (SQUIT)
540 * meep.foo is a server (SQUIT)
541 */
542 if((IsDigit(lsender[0]) && slen == 3) ||
543 (strchr(lsender, '.') != NULL))
544 {
545 sendto_realops_snomask(SNO_DEBUG, L_ALL,
546 "Unknown prefix (%s) from %s, Squitting %s",
547 lbuffer, get_server_name(client_p, SHOW_IP), lsender);
548
549 sendto_one(client_p,
550 ":%s SQUIT %s :(Unknown prefix (%s) from %s)",
551 get_id(&me, client_p), lsender,
552 lbuffer, client_p->name);
553 }
554 else
555 sendto_one(client_p, ":%s KILL %s :%s (Unknown Client)",
556 get_id(&me, client_p), lsender, me.name);
557 }
558
559
560
561 /*
562 *
563 * parc number of arguments ('sender' counted as one!)
564 * parv[0] pointer to 'sender' (may point to empty string) (not used)
565 * parv[1]..parv[parc-1]
566 * pointers to additional parameters, this is a NULL
567 * terminated list (parv[parc] == NULL).
568 *
569 * *WARNING*
570 * Numerics are mostly error reports. If there is something
571 * wrong with the message, just *DROP* it! Don't even think of
572 * sending back a neat error message -- big danger of creating
573 * a ping pong error message...
574 */
575 static void
576 do_numeric(char numeric[], struct Client *client_p, struct Client *source_p, int parc, char *parv[])
577 {
578 struct Client *target_p;
579 struct Channel *chptr;
580
581 if(parc < 2 || !IsServer(source_p))
582 return;
583
584 /* Remap low number numerics. */
585 if(numeric[0] == '0')
586 numeric[0] = '1';
587
588 /*
589 * Prepare the parameter portion of the message into 'buffer'.
590 * (Because the buffer is twice as large as the message buffer
591 * for the socket, no overflow can occur here... ...on current
592 * assumptions--bets are off, if these are changed --msa)
593 * Note: if buffer is non-empty, it will begin with SPACE.
594 */
595 if(parc > 1)
596 {
597 char *t = buffer; /* Current position within the buffer */
598 int i;
599 int tl; /* current length of presently being built string in t */
600 for (i = 2; i < (parc - 1); i++)
601 {
602 tl = rb_sprintf(t, " %s", parv[i]);
603 t += tl;
604 }
605 rb_sprintf(t, " :%s", parv[parc - 1]);
606 }
607
608 if((target_p = find_client(parv[1])) != NULL)
609 {
610 if(IsMe(target_p))
611 {
612 /*
613 * We shouldn't get numerics sent to us,
614 * any numerics we do get indicate a bug somewhere..
615 */
616 /* ugh. this is here because of nick collisions. when two servers
617 * relink, they burst each other their nicks, then perform collides.
618 * if there is a nick collision, BOTH servers will kill their own
619 * nicks, and BOTH will kill the other servers nick, which wont exist,
620 * because it will have been already killed by the local server.
621 *
622 * unfortunately, as we cant guarantee other servers will do the
623 * "right thing" on a nick collision, we have to keep both kills.
624 * ergo we need to ignore ERR_NOSUCHNICK. --fl_
625 */
626 /* quick comment. This _was_ tried. i.e. assume the other servers
627 * will do the "right thing" and kill a nick that is colliding.
628 * unfortunately, it did not work. --Dianora
629 */
630 /* note, now we send PING on server connect, we can
631 * also get ERR_NOSUCHSERVER..
632 */
633 if(atoi(numeric) != ERR_NOSUCHNICK &&
634 atoi(numeric) != ERR_NOSUCHSERVER)
635 sendto_realops_snomask(SNO_GENERAL, L_ADMIN,
636 "*** %s(via %s) sent a %s numeric to me: %s",
637 source_p->name,
638 client_p->name, numeric, buffer);
639 return;
640 }
641 else if(target_p->from == client_p)
642 {
643 /* This message changed direction (nick collision?)
644 * ignore it.
645 */
646 return;
647 }
648
649 /* csircd will send out unknown umode flag for +a (admin), drop it here. */
650 if((atoi(numeric) == ERR_UMODEUNKNOWNFLAG) && MyClient(target_p))
651 return;
652
653 /* Fake it for server hiding, if its our client */
654 sendto_one(target_p, ":%s %s %s%s",
655 get_id(source_p, target_p), numeric,
656 get_id(target_p, target_p), buffer);
657 return;
658 }
659 else if((chptr = find_channel(parv[1])) != NULL)
660 sendto_channel_flags(client_p, ALL_MEMBERS, source_p, chptr,
661 "%s %s%s",
662 numeric, chptr->chname, buffer);
663 }
664
665 static void do_alias(struct alias_entry *aptr, struct Client *source_p, char *text)
666 {
667 char *p;
668 struct Client *target_p;
669
670 if (!IsFloodDone(source_p) && source_p->localClient->receiveM > 20)
671 flood_endgrace(source_p);
672
673 p = strchr(aptr->target, '@');
674 if (p != NULL)
675 {
676 /* user@server */
677 target_p = find_server(NULL, p + 1);
678 if (target_p != NULL && IsMe(target_p))
679 target_p = NULL;
680 }
681 else
682 {
683 /* nick, must be +S */
684 target_p = find_named_person(aptr->target);
685 if (target_p != NULL && !IsService(target_p))
686 target_p = NULL;
687 }
688
689 if (target_p == NULL)
690 {
691 sendto_one_numeric(source_p, ERR_SERVICESDOWN, form_str(ERR_SERVICESDOWN), aptr->target);
692 return;
693 }
694
695 if (text != NULL && *text == ':')
696 text++;
697 if (text == NULL || *text == '\0')
698 {
699 sendto_one(source_p, form_str(ERR_NOTEXTTOSEND), me.name, source_p->name);
700 return;
701 }
702
703 /* increment the hitcounter on this alias */
704 aptr->hits++;
705
706 sendto_one(target_p, ":%s PRIVMSG %s :%s",
707 get_id(source_p, target_p),
708 p != NULL ? aptr->target : get_id(target_p, target_p),
709 text);
710 }
711
712 int
713 m_not_oper(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
714 {
715 sendto_one_numeric(source_p, ERR_NOPRIVILEGES, form_str(ERR_NOPRIVILEGES));
716 return 0;
717 }
718
719 int
720 m_unregistered(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
721 {
722 /* bit of a hack.
723 * I don't =really= want to waste a bit in a flag
724 * number_of_nick_changes is only really valid after the client
725 * is fully registered..
726 */
727 if(client_p->localClient->number_of_nick_changes == 0)
728 {
729 sendto_one(client_p, form_str(ERR_NOTREGISTERED), me.name);
730 client_p->localClient->number_of_nick_changes++;
731 }
732
733 return 0;
734 }
735
736 int
737 m_registered(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
738 {
739 sendto_one(client_p, form_str(ERR_ALREADYREGISTRED), me.name, source_p->name);
740 return 0;
741 }
742
743 int
744 m_ignore(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
745 {
746 return 0;
747 }