]> jfr.im git - solanum.git/blame - src/s_newconf.c
RESV FNC: Sign off/on monitor, and don't try to FNC users that already have a UID...
[solanum.git] / src / s_newconf.c
CommitLineData
212380e3
AC
1/*
2 * ircd-ratbox: an advanced Internet Relay Chat Daemon(ircd).
3 * s_newconf.c - code for dealing with conf stuff
4 *
5 * Copyright (C) 2004 Lee Hardy <lee@leeh.co.uk>
6 * Copyright (C) 2004-2005 ircd-ratbox development team
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
10 * met:
11 *
12 * 1.Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
14 * 2.Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3.The name of the author may not be used to endorse or promote products
18 * derived from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
21 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
22 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
23 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
24 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
26 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
28 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
29 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 *
7d08aa89 32 * $Id: s_newconf.c 3508 2007-06-04 16:04:49Z jilles $
212380e3
AC
33 */
34
35#include "stdinc.h"
36#include "ircd_defs.h"
37#include "common.h"
38#include "s_conf.h"
39#include "s_newconf.h"
212380e3 40#include "client.h"
212380e3
AC
41#include "s_serv.h"
42#include "send.h"
43#include "hostmask.h"
44#include "newconf.h"
45#include "hash.h"
b37021a4 46#include "irc_dictionary.h"
212380e3 47
330fc5c1
AC
48rb_dlink_list shared_conf_list;
49rb_dlink_list cluster_conf_list;
50rb_dlink_list oper_conf_list;
51rb_dlink_list hubleaf_conf_list;
52rb_dlink_list server_conf_list;
53rb_dlink_list xline_conf_list;
54rb_dlink_list resv_conf_list; /* nicks only! */
55rb_dlink_list nd_list; /* nick delay */
56rb_dlink_list tgchange_list;
212380e3 57
7018b86a 58rb_patricia_tree_t *tgchange_tree;
212380e3 59
398b6a73 60static rb_bh *nd_heap = NULL;
212380e3
AC
61
62static void expire_temp_rxlines(void *unused);
63static void expire_nd_entries(void *unused);
64
e410dcf5
AC
65struct ev_entry *expire_nd_entries_ev = NULL;
66struct ev_entry *expire_temp_rxlines_ev = NULL;
67
212380e3
AC
68void
69init_s_newconf(void)
70{
e410dcf5
AC
71 tgchange_tree = rb_new_patricia(PATRICIA_BITS);
72 nd_heap = rb_bh_create(sizeof(struct nd_entry), ND_HEAP_SIZE, "nd_heap");
73 expire_nd_entries_ev = rb_event_addish("expire_nd_entries", expire_nd_entries, NULL, 30);
74 expire_temp_rxlines_ev = rb_event_addish("expire_temp_rxlines", expire_temp_rxlines, NULL, 60);
212380e3
AC
75}
76
77void
78clear_s_newconf(void)
79{
80 struct server_conf *server_p;
330fc5c1 81 rb_dlink_node *ptr;
637c4932 82 rb_dlink_node *next_ptr;
212380e3 83
637c4932 84 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, shared_conf_list.head)
212380e3
AC
85 {
86 /* ptr here is ptr->data->node */
330fc5c1 87 rb_dlinkDelete(ptr, &shared_conf_list);
212380e3
AC
88 free_remote_conf(ptr->data);
89 }
90
637c4932 91 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, cluster_conf_list.head)
212380e3 92 {
330fc5c1 93 rb_dlinkDelete(ptr, &cluster_conf_list);
212380e3
AC
94 free_remote_conf(ptr->data);
95 }
96
637c4932 97 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, hubleaf_conf_list.head)
212380e3 98 {
330fc5c1 99 rb_dlinkDelete(ptr, &hubleaf_conf_list);
212380e3
AC
100 free_remote_conf(ptr->data);
101 }
102
637c4932 103 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, oper_conf_list.head)
212380e3
AC
104 {
105 free_oper_conf(ptr->data);
330fc5c1 106 rb_dlinkDestroy(ptr, &oper_conf_list);
212380e3
AC
107 }
108
637c4932 109 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, server_conf_list.head)
212380e3
AC
110 {
111 server_p = ptr->data;
112
113 if(!server_p->servers)
114 {
330fc5c1 115 rb_dlinkDelete(ptr, &server_conf_list);
212380e3
AC
116 free_server_conf(ptr->data);
117 }
118 else
119 server_p->flags |= SERVER_ILLEGAL;
120 }
121}
122
123void
124clear_s_newconf_bans(void)
125{
126 struct ConfItem *aconf;
637c4932 127 rb_dlink_node *ptr, *next_ptr;
212380e3 128
637c4932 129 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
212380e3
AC
130 {
131 aconf = ptr->data;
132
133 if(aconf->hold)
134 continue;
135
136 free_conf(aconf);
330fc5c1 137 rb_dlinkDestroy(ptr, &xline_conf_list);
212380e3
AC
138 }
139
637c4932 140 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
212380e3
AC
141 {
142 aconf = ptr->data;
143
144 /* temporary resv */
145 if(aconf->hold)
146 continue;
147
148 free_conf(aconf);
330fc5c1 149 rb_dlinkDestroy(ptr, &resv_conf_list);
212380e3
AC
150 }
151
152 clear_resv_hash();
153}
154
155struct remote_conf *
156make_remote_conf(void)
157{
eddc2ab6 158 struct remote_conf *remote_p = rb_malloc(sizeof(struct remote_conf));
212380e3
AC
159 return remote_p;
160}
161
162void
163free_remote_conf(struct remote_conf *remote_p)
164{
165 s_assert(remote_p != NULL);
166 if(remote_p == NULL)
167 return;
168
637c4932
VY
169 rb_free(remote_p->username);
170 rb_free(remote_p->host);
171 rb_free(remote_p->server);
172 rb_free(remote_p);
212380e3
AC
173}
174
175int
176find_shared_conf(const char *username, const char *host,
177 const char *server, int flags)
178{
179 struct remote_conf *shared_p;
330fc5c1 180 rb_dlink_node *ptr;
212380e3 181
5cefa1d6 182 RB_DLINK_FOREACH(ptr, shared_conf_list.head)
212380e3
AC
183 {
184 shared_p = ptr->data;
185
186 if(match(shared_p->username, username) &&
187 match(shared_p->host, host) &&
188 match(shared_p->server, server))
189 {
190 if(shared_p->flags & flags)
191 return YES;
192 else
193 return NO;
194 }
195 }
196
197 return NO;
198}
199
200void
201propagate_generic(struct Client *source_p, const char *command,
202 const char *target, int cap, const char *format, ...)
203{
204 char buffer[BUFSIZE];
205 va_list args;
206
207 va_start(args, format);
e410dcf5 208 rb_vsnprintf(buffer, sizeof(buffer), format, args);
212380e3
AC
209 va_end(args);
210
211 sendto_match_servs(source_p, target, cap, NOCAPS,
212 "%s %s %s",
213 command, target, buffer);
214 sendto_match_servs(source_p, target, CAP_ENCAP, cap,
215 "ENCAP %s %s %s",
216 target, command, buffer);
217}
218
219void
220cluster_generic(struct Client *source_p, const char *command,
221 int cltype, int cap, const char *format, ...)
222{
223 char buffer[BUFSIZE];
224 struct remote_conf *shared_p;
225 va_list args;
330fc5c1 226 rb_dlink_node *ptr;
212380e3
AC
227
228 va_start(args, format);
e410dcf5 229 rb_vsnprintf(buffer, sizeof(buffer), format, args);
212380e3
AC
230 va_end(args);
231
5cefa1d6 232 RB_DLINK_FOREACH(ptr, cluster_conf_list.head)
212380e3
AC
233 {
234 shared_p = ptr->data;
235
236 if(!(shared_p->flags & cltype))
237 continue;
238
239 sendto_match_servs(source_p, shared_p->server, cap, NOCAPS,
240 "%s %s %s",
241 command, shared_p->server, buffer);
242 sendto_match_servs(source_p, shared_p->server, CAP_ENCAP, cap,
243 "ENCAP %s %s %s",
244 shared_p->server, command, buffer);
245 }
246}
247
248struct oper_conf *
249make_oper_conf(void)
250{
eddc2ab6 251 struct oper_conf *oper_p = rb_malloc(sizeof(struct oper_conf));
212380e3
AC
252 return oper_p;
253}
254
255void
256free_oper_conf(struct oper_conf *oper_p)
257{
258 s_assert(oper_p != NULL);
259 if(oper_p == NULL)
260 return;
261
637c4932
VY
262 rb_free(oper_p->username);
263 rb_free(oper_p->host);
264 rb_free(oper_p->name);
462ae9d7 265 rb_free(oper_p->certfp);
212380e3
AC
266
267 if(oper_p->passwd)
268 {
269 memset(oper_p->passwd, 0, strlen(oper_p->passwd));
637c4932 270 rb_free(oper_p->passwd);
212380e3
AC
271 }
272
273#ifdef HAVE_LIBCRYPTO
637c4932 274 rb_free(oper_p->rsa_pubkey_file);
212380e3
AC
275
276 if(oper_p->rsa_pubkey)
277 RSA_free(oper_p->rsa_pubkey);
278#endif
279
637c4932 280 rb_free(oper_p);
212380e3
AC
281}
282
283struct oper_conf *
284find_oper_conf(const char *username, const char *host, const char *locip, const char *name)
285{
286 struct oper_conf *oper_p;
e7046ee5 287 struct rb_sockaddr_storage ip, cip;
212380e3
AC
288 char addr[HOSTLEN+1];
289 int bits, cbits;
330fc5c1 290 rb_dlink_node *ptr;
212380e3
AC
291
292 parse_netmask(locip, (struct sockaddr *)&cip, &cbits);
293
5cefa1d6 294 RB_DLINK_FOREACH(ptr, oper_conf_list.head)
212380e3
AC
295 {
296 oper_p = ptr->data;
297
298 /* name/username doesnt match.. */
299 if(irccmp(oper_p->name, name) || !match(oper_p->username, username))
300 continue;
301
f427c8b0 302 rb_strlcpy(addr, oper_p->host, sizeof(addr));
212380e3
AC
303
304 if(parse_netmask(addr, (struct sockaddr *)&ip, &bits) != HM_HOST)
305 {
306 if(ip.ss_family == cip.ss_family &&
307 comp_with_mask_sock((struct sockaddr *)&ip, (struct sockaddr *)&cip, bits))
308 return oper_p;
309 }
310
311 /* we have to compare against the host as well, because its
312 * valid to set a spoof to an IP, which if we only compare
313 * in ip form to sockhost will not necessarily match --anfl
314 */
315 if(match(oper_p->host, host))
316 return oper_p;
317 }
318
319 return NULL;
320}
321
212380e3
AC
322struct server_conf *
323make_server_conf(void)
324{
eddc2ab6 325 struct server_conf *server_p = rb_malloc(sizeof(struct server_conf));
212380e3
AC
326 server_p->aftype = AF_INET;
327 return server_p;
328}
329
330void
331free_server_conf(struct server_conf *server_p)
332{
333 s_assert(server_p != NULL);
334 if(server_p == NULL)
335 return;
336
337 if(!EmptyString(server_p->passwd))
338 {
339 memset(server_p->passwd, 0, strlen(server_p->passwd));
637c4932 340 rb_free(server_p->passwd);
212380e3
AC
341 }
342
343 if(!EmptyString(server_p->spasswd))
344 {
345 memset(server_p->spasswd, 0, strlen(server_p->spasswd));
637c4932 346 rb_free(server_p->spasswd);
212380e3
AC
347 }
348
637c4932
VY
349 rb_free(server_p->name);
350 rb_free(server_p->host);
351 rb_free(server_p->class_name);
352 rb_free(server_p);
212380e3
AC
353}
354
355void
356add_server_conf(struct server_conf *server_p)
357{
358 if(EmptyString(server_p->class_name))
359 {
47a03750 360 server_p->class_name = rb_strdup("default");
212380e3
AC
361 server_p->class = default_class;
362 return;
363 }
364
365 server_p->class = find_class(server_p->class_name);
366
367 if(server_p->class == default_class)
368 {
369 conf_report_error("Warning connect::class invalid for %s",
370 server_p->name);
371
637c4932 372 rb_free(server_p->class_name);
47a03750 373 server_p->class_name = rb_strdup("default");
212380e3
AC
374 }
375
376 if(strchr(server_p->host, '*') || strchr(server_p->host, '?'))
377 return;
378}
379
380struct server_conf *
381find_server_conf(const char *name)
382{
383 struct server_conf *server_p;
330fc5c1 384 rb_dlink_node *ptr;
212380e3 385
5cefa1d6 386 RB_DLINK_FOREACH(ptr, server_conf_list.head)
212380e3
AC
387 {
388 server_p = ptr->data;
389
390 if(ServerConfIllegal(server_p))
391 continue;
392
393 if(match(name, server_p->name))
394 return server_p;
395 }
396
397 return NULL;
398}
399
400void
401attach_server_conf(struct Client *client_p, struct server_conf *server_p)
402{
403 /* already have an attached conf */
404 if(client_p->localClient->att_sconf)
405 {
406 /* short circuit this special case :) */
407 if(client_p->localClient->att_sconf == server_p)
408 return;
409
410 detach_server_conf(client_p);
411 }
412
413 CurrUsers(server_p->class)++;
414
415 client_p->localClient->att_sconf = server_p;
416 server_p->servers++;
417}
418
419void
420detach_server_conf(struct Client *client_p)
421{
422 struct server_conf *server_p = client_p->localClient->att_sconf;
423
424 if(server_p == NULL)
425 return;
426
427 client_p->localClient->att_sconf = NULL;
428 server_p->servers--;
429 CurrUsers(server_p->class)--;
430
431 if(ServerConfIllegal(server_p) && !server_p->servers)
432 {
433 /* the class this one is using may need destroying too */
434 if(MaxUsers(server_p->class) < 0 && CurrUsers(server_p->class) <= 0)
435 free_class(server_p->class);
436
330fc5c1 437 rb_dlinkDelete(&server_p->node, &server_conf_list);
212380e3
AC
438 free_server_conf(server_p);
439 }
440}
441
442void
a3143c9b 443set_server_conf_autoconn(struct Client *source_p, const char *name, int newval)
212380e3
AC
444{
445 struct server_conf *server_p;
446
447 if((server_p = find_server_conf(name)) != NULL)
448 {
449 if(newval)
450 server_p->flags |= SERVER_AUTOCONN;
451 else
452 server_p->flags &= ~SERVER_AUTOCONN;
453
454 sendto_realops_snomask(SNO_GENERAL, L_ALL,
455 "%s has changed AUTOCONN for %s to %i",
456 get_oper_name(source_p), name, newval);
457 }
458 else
5366977b 459 sendto_one_notice(source_p, ":Can't find %s", name);
212380e3
AC
460}
461
53307da8
JT
462void
463disable_server_conf_autoconn(const char *name)
464{
465 struct server_conf *server_p;
466
467 server_p = find_server_conf(name);
468 if(server_p != NULL && server_p->flags & SERVER_AUTOCONN)
469 {
470 server_p->flags &= ~SERVER_AUTOCONN;
471
472 sendto_realops_snomask(SNO_GENERAL, L_ALL,
473 "Disabling AUTOCONN for %s because of error",
474 name);
475 ilog(L_SERVER, "Disabling AUTOCONN for %s because of error",
476 name);
477 }
478}
479
212380e3
AC
480struct ConfItem *
481find_xline(const char *gecos, int counter)
482{
483 struct ConfItem *aconf;
330fc5c1 484 rb_dlink_node *ptr;
212380e3 485
5cefa1d6 486 RB_DLINK_FOREACH(ptr, xline_conf_list.head)
212380e3
AC
487 {
488 aconf = ptr->data;
489
70ea02eb 490 if(match_esc(aconf->host, gecos))
212380e3
AC
491 {
492 if(counter)
493 aconf->port++;
494 return aconf;
495 }
496 }
497
498 return NULL;
499}
500
0fdb2570
JT
501struct ConfItem *
502find_xline_mask(const char *gecos)
503{
504 struct ConfItem *aconf;
330fc5c1 505 rb_dlink_node *ptr;
0fdb2570 506
5cefa1d6 507 RB_DLINK_FOREACH(ptr, xline_conf_list.head)
0fdb2570
JT
508 {
509 aconf = ptr->data;
510
70ea02eb 511 if(!irccmp(aconf->host, gecos))
0fdb2570
JT
512 return aconf;
513 }
514
515 return NULL;
516}
517
212380e3
AC
518struct ConfItem *
519find_nick_resv(const char *name)
520{
521 struct ConfItem *aconf;
330fc5c1 522 rb_dlink_node *ptr;
212380e3 523
5cefa1d6 524 RB_DLINK_FOREACH(ptr, resv_conf_list.head)
212380e3
AC
525 {
526 aconf = ptr->data;
527
70ea02eb 528 if(match_esc(aconf->host, name))
212380e3
AC
529 {
530 aconf->port++;
531 return aconf;
532 }
533 }
534
535 return NULL;
536}
537
0fdb2570
JT
538struct ConfItem *
539find_nick_resv_mask(const char *name)
540{
541 struct ConfItem *aconf;
330fc5c1 542 rb_dlink_node *ptr;
0fdb2570 543
5cefa1d6 544 RB_DLINK_FOREACH(ptr, resv_conf_list.head)
0fdb2570
JT
545 {
546 aconf = ptr->data;
547
70ea02eb 548 if(!irccmp(aconf->host, name))
0fdb2570
JT
549 return aconf;
550 }
551
552 return NULL;
553}
554
212380e3
AC
555/* clean_resv_nick()
556 *
557 * inputs - nick
558 * outputs - 1 if nick is vaild resv, 0 otherwise
559 * side effects -
560 */
561int
562clean_resv_nick(const char *nick)
563{
564 char tmpch;
565 int as = 0;
566 int q = 0;
567 int ch = 0;
568
569 if(*nick == '-' || IsDigit(*nick))
570 return 0;
571
572 while ((tmpch = *nick++))
573 {
574 if(tmpch == '?' || tmpch == '@' || tmpch == '#')
575 q++;
576 else if(tmpch == '*')
577 as++;
578 else if(IsNickChar(tmpch))
579 ch++;
580 else
581 return 0;
582 }
583
584 if(!ch && as)
585 return 0;
586
587 return 1;
588}
589
590/* valid_wild_card_simple()
591 *
592 * inputs - "thing" to test
593 * outputs - 1 if enough wildcards, else 0
594 * side effects -
595 */
596int
597valid_wild_card_simple(const char *data)
598{
599 const char *p;
600 char tmpch;
601 int nonwild = 0;
7d08aa89 602 int wild = 0;
212380e3
AC
603
604 /* check the string for minimum number of nonwildcard chars */
605 p = data;
606
607 while((tmpch = *p++))
608 {
609 /* found an escape, p points to the char after it, so skip
610 * that and move on.
611 */
7d08aa89 612 if(tmpch == '\\' && *p)
212380e3
AC
613 {
614 p++;
7d08aa89
JT
615 if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
616 return 1;
212380e3
AC
617 }
618 else if(!IsMWildChar(tmpch))
619 {
620 /* if we have enough nonwildchars, return */
621 if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
622 return 1;
623 }
7d08aa89
JT
624 else
625 wild++;
212380e3
AC
626 }
627
7d08aa89
JT
628 /* strings without wilds are also ok */
629 return wild == 0;
212380e3
AC
630}
631
632time_t
633valid_temp_time(const char *p)
634{
635 time_t result = 0;
636
637 while(*p)
638 {
639 if(IsDigit(*p))
640 {
641 result *= 10;
642 result += ((*p) & 0xF);
643 p++;
644 }
645 else
646 return -1;
647 }
648
649 if(result > (60 * 24 * 7 * 52))
650 result = (60 * 24 * 7 * 52);
651
652 return(result * 60);
653}
654
9197bc35 655/* Propagated bans are expired elsewhere. */
212380e3
AC
656static void
657expire_temp_rxlines(void *unused)
658{
659 struct ConfItem *aconf;
330fc5c1 660 rb_dlink_node *ptr;
637c4932 661 rb_dlink_node *next_ptr;
212380e3
AC
662 int i;
663
637c4932 664 HASH_WALK_SAFE(i, R_MAX, ptr, next_ptr, resvTable)
212380e3
AC
665 {
666 aconf = ptr->data;
667
9197bc35
JT
668 if(aconf->lifetime != 0)
669 continue;
e3354945 670 if(aconf->hold && aconf->hold <= rb_current_time())
212380e3
AC
671 {
672 if(ConfigFileEntry.tkline_expire_notices)
673 sendto_realops_snomask(SNO_GENERAL, L_ALL,
674 "Temporary RESV for [%s] expired",
70ea02eb 675 aconf->host);
212380e3
AC
676
677 free_conf(aconf);
330fc5c1 678 rb_dlinkDestroy(ptr, &resvTable[i]);
212380e3
AC
679 }
680 }
681 HASH_WALK_END
682
637c4932 683 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
212380e3
AC
684 {
685 aconf = ptr->data;
686
9197bc35
JT
687 if(aconf->lifetime != 0)
688 continue;
e3354945 689 if(aconf->hold && aconf->hold <= rb_current_time())
212380e3
AC
690 {
691 if(ConfigFileEntry.tkline_expire_notices)
692 sendto_realops_snomask(SNO_GENERAL, L_ALL,
693 "Temporary RESV for [%s] expired",
70ea02eb 694 aconf->host);
212380e3 695 free_conf(aconf);
330fc5c1 696 rb_dlinkDestroy(ptr, &resv_conf_list);
212380e3
AC
697 }
698 }
699
637c4932 700 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
212380e3
AC
701 {
702 aconf = ptr->data;
703
9197bc35
JT
704 if(aconf->lifetime != 0)
705 continue;
e3354945 706 if(aconf->hold && aconf->hold <= rb_current_time())
212380e3
AC
707 {
708 if(ConfigFileEntry.tkline_expire_notices)
709 sendto_realops_snomask(SNO_GENERAL, L_ALL,
710 "Temporary X-line for [%s] expired",
70ea02eb 711 aconf->host);
212380e3 712 free_conf(aconf);
330fc5c1 713 rb_dlinkDestroy(ptr, &xline_conf_list);
212380e3
AC
714 }
715 }
716}
717
718unsigned long
719get_nd_count(void)
720{
330fc5c1 721 return(rb_dlink_list_length(&nd_list));
212380e3
AC
722}
723
212380e3
AC
724void
725add_nd_entry(const char *name)
726{
727 struct nd_entry *nd;
728
b37021a4 729 if(irc_dictionary_find(nd_dict, name) != NULL)
212380e3
AC
730 return;
731
398b6a73 732 nd = rb_bh_alloc(nd_heap);
212380e3 733
f427c8b0 734 rb_strlcpy(nd->name, name, sizeof(nd->name));
e3354945 735 nd->expire = rb_current_time() + ConfigFileEntry.nick_delay;
212380e3
AC
736
737 /* this list is ordered */
330fc5c1 738 rb_dlinkAddTail(nd, &nd->lnode, &nd_list);
b37021a4
AC
739
740 irc_dictionary_add(nd_dict, nd->name, nd);
212380e3
AC
741}
742
743void
744free_nd_entry(struct nd_entry *nd)
745{
b37021a4
AC
746 irc_dictionary_delete(nd_dict, nd->name);
747
330fc5c1 748 rb_dlinkDelete(&nd->lnode, &nd_list);
398b6a73 749 rb_bh_free(nd_heap, nd);
212380e3
AC
750}
751
752void
753expire_nd_entries(void *unused)
754{
755 struct nd_entry *nd;
330fc5c1 756 rb_dlink_node *ptr;
637c4932 757 rb_dlink_node *next_ptr;
212380e3 758
637c4932 759 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, nd_list.head)
212380e3
AC
760 {
761 nd = ptr->data;
762
763 /* this list is ordered - we can stop when we hit the first
764 * entry that doesnt expire..
765 */
e3354945 766 if(nd->expire > rb_current_time())
212380e3
AC
767 return;
768
769 free_nd_entry(nd);
770 }
771}
772
773void
774add_tgchange(const char *host)
775{
776 tgchange *target;
e410dcf5 777 rb_patricia_node_t *pnode;
212380e3
AC
778
779 if(find_tgchange(host))
780 return;
781
eddc2ab6 782 target = rb_malloc(sizeof(tgchange));
212380e3
AC
783 pnode = make_and_lookup(tgchange_tree, host);
784
785 pnode->data = target;
786 target->pnode = pnode;
787
47a03750 788 target->ip = rb_strdup(host);
e3354945 789 target->expiry = rb_current_time() + (60*60*12);
212380e3 790
330fc5c1 791 rb_dlinkAdd(target, &target->node, &tgchange_list);
212380e3
AC
792}
793
794tgchange *
795find_tgchange(const char *host)
796{
e410dcf5 797 rb_patricia_node_t *pnode;
212380e3 798
e410dcf5 799 if((pnode = rb_match_exact_string(tgchange_tree, host)))
212380e3
AC
800 return pnode->data;
801
802 return NULL;
803}
804