]> jfr.im git - solanum.git/blame - ircd/parse.c
parse: further cleanups
[solanum.git] / ircd / parse.c
CommitLineData
212380e3 1/*
8ac75529 2 * charybdis: an advanced ircd.
212380e3
AC
3 * parse.c: The message parser.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
4d03595d 8 * Copyright (C) 2007-2016 William Pitcock
212380e3
AC
9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2 of the License, or
13 * (at your option) any later version.
14 *
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
19 *
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
23 * USA
24 *
f42e9ceb 25 * $Id: parse.c 3177 2007-02-01 00:19:14Z jilles $
212380e3
AC
26 */
27
28#include "stdinc.h"
29#include "parse.h"
30#include "client.h"
31#include "channel.h"
32#include "common.h"
33#include "hash.h"
4562c604 34#include "match.h"
212380e3
AC
35#include "ircd.h"
36#include "numeric.h"
4016731b 37#include "logger.h"
212380e3
AC
38#include "s_stats.h"
39#include "send.h"
40#include "msg.h"
4d03595d 41#include "msgbuf.h"
212380e3 42#include "s_conf.h"
212380e3
AC
43#include "s_serv.h"
44#include "packet.h"
77d3d2db 45#include "s_assert.h"
212380e3 46
8ac75529
AC
47static struct Dictionary *cmd_dict = NULL;
48struct Dictionary *alias_dict = NULL;
49
161f0409 50/* parv[0] is not used, and parv[LAST] == NULL */
212380e3
AC
51static char *para[MAXPARA + 2];
52
29c92cf9 53static void cancel_clients(struct Client *, struct Client *);
1579e155 54static void remove_unknown(struct Client *, const char *, char *);
212380e3 55
4d03595d 56static void do_numeric(int, struct Client *, struct Client *, int, const char **);
212380e3
AC
57static void do_alias(struct alias_entry *, struct Client *, char *);
58
59static int handle_command(struct Message *, struct Client *, struct Client *, int, const char**);
60
212380e3
AC
61static char buffer[1024];
62
212380e3
AC
63/* turn a string into a parc/parv pair */
64
e4603e3d
AC
65char *reconstruct_parv(int parc, const char *parv[])
66{
67 static char tmpbuf[BUFSIZE]; int i;
68
69 rb_strlcpy(tmpbuf, parv[0], BUFSIZE);
70 for (i = 1; i < parc; i++)
71 {
72 rb_strlcat(tmpbuf, " ", BUFSIZE);
73 rb_strlcat(tmpbuf, parv[i], BUFSIZE);
74 }
75 return tmpbuf;
76}
212380e3 77
212380e3
AC
78/* parse()
79 *
819dd2d2 80 * given a raw buffer, parses it and generates parv and parc
212380e3
AC
81 */
82void
83parse(struct Client *client_p, char *pbuffer, char *bufend)
84{
85 struct Client *from = client_p;
212380e3 86 char *end;
4d03595d
AC
87 int i = 1, res;
88 int numeric = 0;
212380e3 89 struct Message *mptr;
4d03595d 90 struct MsgBuf msgbuf;
212380e3
AC
91
92 s_assert(MyConnect(client_p));
8c23bb2e 93 s_assert(client_p->localClient->F != NULL);
212380e3
AC
94 if(IsAnyDead(client_p))
95 return;
96
4d03595d 97 end = bufend - 1;
212380e3 98
4d03595d
AC
99 /* XXX this should be done before parse() is called */
100 if(*end == '\n')
101 *end-- = '\0';
102 if(*end == '\r')
103 *end = '\0';
212380e3 104
4d03595d
AC
105 res = msgbuf_parse(&msgbuf, pbuffer);
106 if (res)
212380e3 107 {
4d03595d
AC
108 ServerStats.is_empt++;
109 return;
110 }
212380e3 111
4d03595d
AC
112 if (msgbuf.origin != NULL)
113 {
114 from = find_client(msgbuf.origin);
212380e3 115
4d03595d
AC
116 /* didnt find any matching client, issue a kill */
117 if(from == NULL)
212380e3 118 {
4d03595d 119 ServerStats.is_unpf++;
1579e155 120 remove_unknown(client_p, msgbuf.origin, pbuffer);
4d03595d 121 return;
212380e3
AC
122 }
123
4d03595d
AC
124 /* fake direction, hmm. */
125 if(from->from != client_p)
212380e3 126 {
4d03595d
AC
127 ServerStats.is_wrdi++;
128 cancel_clients(client_p, from);
129 return;
212380e3 130 }
212380e3
AC
131 }
132
4d03595d 133 if(IsDigit(*msgbuf.cmd) && IsDigit(*(msgbuf.cmd + 1)) && IsDigit(*(msgbuf.cmd + 2)))
212380e3
AC
134 {
135 mptr = NULL;
4d03595d 136 numeric = atoi(msgbuf.cmd);
47adde3d 137 ServerStats.is_num++;
212380e3
AC
138 }
139 else
140 {
4d03595d 141 mptr = irc_dictionary_retrieve(cmd_dict, msgbuf.cmd);
212380e3
AC
142
143 /* no command or its encap only, error */
144 if(!mptr || !mptr->cmd)
145 {
4d03595d 146 if (IsPerson(client_p))
212380e3 147 {
20dd3725 148 struct alias_entry *aptr = irc_dictionary_retrieve(alias_dict, msgbuf.cmd);
4d03595d 149 if (aptr != NULL)
212380e3 150 {
20dd3725 151 do_alias(aptr, client_p, reconstruct_parv(msgbuf.n_para - 1, msgbuf.para + 1));
4d03595d 152 return;
212380e3
AC
153 }
154 }
4d03595d
AC
155 if(IsPerson(from))
156 {
157 sendto_one(from, form_str(ERR_UNKNOWNCOMMAND),
1579e155 158 me.name, from->name, msgbuf.cmd);
4d03595d 159 }
47adde3d 160 ServerStats.is_unco++;
212380e3
AC
161 return;
162 }
163
4d03595d 164 mptr->bytes += msgbuf.parselen;
212380e3
AC
165 }
166
212380e3
AC
167 if(mptr == NULL)
168 {
4d03595d 169 do_numeric(numeric, client_p, from, msgbuf.n_para, msgbuf.para);
212380e3
AC
170 return;
171 }
172
4d03595d 173 if(handle_command(mptr, client_p, from, msgbuf.n_para, /* XXX discards const!!! */ (const char **)(void *) msgbuf.para) < -1)
212380e3
AC
174 {
175 char *p;
176 for (p = pbuffer; p <= end; p += 8)
177 {
178 /* HACK HACK */
179 /* Its expected this nasty code can be removed
180 * or rewritten later if still needed.
181 */
182 if((unsigned long) (p + 8) > (unsigned long) end)
183 {
184 for (; p <= end; p++)
185 {
186 ilog(L_MAIN, "%02x |%c", p[0], p[0]);
187 }
188 }
189 else
190 ilog(L_MAIN,
191 "%02x %02x %02x %02x %02x %02x %02x %02x |%c%c%c%c%c%c%c%c",
192 p[0], p[1], p[2], p[3], p[4], p[5],
193 p[6], p[7], p[0], p[1], p[2], p[3], p[4], p[5], p[6], p[7]);
194 }
195 }
196
197}
198
199/*
200 * handle_command
201 *
202 * inputs - pointer to message block
203 * - pointer to client
204 * - pointer to client message is from
205 * - count of number of args
206 * - pointer to argv[] array
207 * output - -1 if error from server
208 * side effects -
209 */
210static int
211handle_command(struct Message *mptr, struct Client *client_p,
212 struct Client *from, int i, const char** hpara)
213{
214 struct MessageEntry ehandler;
215 MessageHandler handler = 0;
216 char squitreason[80];
217
218 if(IsAnyDead(client_p))
219 return -1;
220
221 if(IsServer(client_p))
222 mptr->rcount++;
223
224 mptr->count++;
225
226 /* New patch to avoid server flooding from unregistered connects
227 - Pie-Man 07/27/2000 */
228
229 if(!IsRegistered(client_p))
230 {
231 /* if its from a possible server connection
232 * ignore it.. more than likely its a header thats sneaked through
233 */
234
235 if(IsAnyServer(client_p) && !(mptr->flags & MFLG_UNREG))
236 return (1);
237 }
238
239 ehandler = mptr->handlers[from->handler];
240 handler = ehandler.handler;
241
242 /* check right amount of params is passed... --is */
55abcbb2 243 if(i < ehandler.min_para ||
212380e3
AC
244 (ehandler.min_para && EmptyString(hpara[ehandler.min_para - 1])))
245 {
246 if(!IsServer(client_p))
247 {
248 sendto_one(client_p, form_str(ERR_NEEDMOREPARAMS),
55abcbb2
KB
249 me.name,
250 EmptyString(client_p->name) ? "*" : client_p->name,
212380e3
AC
251 mptr->cmd);
252 if(MyClient(client_p))
253 return (1);
254 else
255 return (-1);
256 }
257
258 sendto_realops_snomask(SNO_GENERAL, L_ALL,
259 "Dropping server %s due to (invalid) command '%s'"
260 " with only %d arguments (expecting %d).",
261 client_p->name, mptr->cmd, i, ehandler.min_para);
262 ilog(L_SERVER,
263 "Insufficient parameters (%d < %d) for command '%s' from %s.",
264 i, ehandler.min_para, mptr->cmd, client_p->name);
5203cba5 265 snprintf(squitreason, sizeof squitreason,
212380e3
AC
266 "Insufficient parameters (%d < %d) for command '%s'",
267 i, ehandler.min_para, mptr->cmd);
268 exit_client(client_p, client_p, client_p, squitreason);
269 return (-1);
270 }
271
272 (*handler) (client_p, from, i, hpara);
273 return (1);
274}
275
276void
277handle_encap(struct Client *client_p, struct Client *source_p,
278 const char *command, int parc, const char *parv[])
279{
280 struct Message *mptr;
281 struct MessageEntry ehandler;
282 MessageHandler handler = 0;
283
8ac75529 284 mptr = irc_dictionary_retrieve(cmd_dict, command);
212380e3
AC
285
286 if(mptr == NULL || mptr->cmd == NULL)
287 return;
288
289 ehandler = mptr->handlers[ENCAP_HANDLER];
290 handler = ehandler.handler;
291
55abcbb2 292 if(parc < ehandler.min_para ||
212380e3
AC
293 (ehandler.min_para && EmptyString(parv[ehandler.min_para - 1])))
294 return;
295
296 (*handler) (client_p, source_p, parc, parv);
297}
298
299/*
300 * clear_hash_parse()
301 *
302 * inputs -
303 * output - NONE
304 * side effects - MUST MUST be called at startup ONCE before
305 * any other keyword hash routine is used.
306 *
307 */
308void
309clear_hash_parse()
310{
99b461bb 311 cmd_dict = irc_dictionary_create("command", strcasecmp);
212380e3
AC
312}
313
314/* mod_add_cmd
315 *
316 * inputs - command name
317 * - pointer to struct Message
318 * output - none
319 * side effects - load this one command name
320 * msg->count msg->bytes is modified in place, in
321 * modules address space. Might not want to do that...
322 */
323void
324mod_add_cmd(struct Message *msg)
325{
212380e3
AC
326 s_assert(msg != NULL);
327 if(msg == NULL)
328 return;
329
8ac75529
AC
330 if (irc_dictionary_find(cmd_dict, msg->cmd) != NULL)
331 return;
212380e3
AC
332
333 msg->count = 0;
334 msg->rcount = 0;
335 msg->bytes = 0;
336
8ac75529 337 irc_dictionary_add(cmd_dict, msg->cmd, msg);
212380e3
AC
338}
339
340/* mod_del_cmd
341 *
342 * inputs - command name
343 * output - none
344 * side effects - unload this one command name
345 */
346void
347mod_del_cmd(struct Message *msg)
348{
212380e3
AC
349 s_assert(msg != NULL);
350 if(msg == NULL)
351 return;
352
8ac75529 353 irc_dictionary_delete(cmd_dict, msg->cmd);
212380e3
AC
354}
355
356/*
357 * report_messages
358 *
359 * inputs - pointer to client to report to
360 * output - NONE
361 * side effects - NONE
362 */
363void
364report_messages(struct Client *source_p)
365{
8ac75529
AC
366 struct DictionaryIter iter;
367 struct Message *msg;
368 struct alias_entry *amsg;
212380e3 369
90187f21 370 DICTIONARY_FOREACH(msg, &iter, cmd_dict)
212380e3 371 {
8ac75529 372 s_assert(msg->cmd != NULL);
55abcbb2 373 sendto_one_numeric(source_p, RPL_STATSCOMMANDS,
8ac75529 374 form_str(RPL_STATSCOMMANDS),
55abcbb2 375 msg->cmd, msg->count,
8ac75529
AC
376 msg->bytes, msg->rcount);
377 }
212380e3 378
90187f21 379 DICTIONARY_FOREACH(amsg, &iter, alias_dict)
8ac75529
AC
380 {
381 s_assert(amsg->name != NULL);
382 sendto_one_numeric(source_p, RPL_STATSCOMMANDS,
383 form_str(RPL_STATSCOMMANDS),
77910830 384 amsg->name, amsg->hits, 0L, 0);
212380e3
AC
385 }
386}
387
388/* cancel_clients()
389 *
390 * inputs - client who sent us the message, client with fake
29c92cf9 391 * direction
212380e3
AC
392 * outputs - a given warning about the fake direction
393 * side effects -
394 */
395static void
29c92cf9 396cancel_clients(struct Client *client_p, struct Client *source_p)
212380e3
AC
397{
398 /* ok, fake prefix happens naturally during a burst on a nick
399 * collision with TS5, we cant kill them because one client has to
400 * survive, so we just send an error.
401 */
402 if(IsServer(source_p) || IsMe(source_p))
403 {
404 sendto_realops_snomask(SNO_DEBUG, L_ALL,
405 "Message for %s[%s] from %s",
406 source_p->name, source_p->from->name,
b3ebc7ab 407 client_p->name);
212380e3
AC
408 }
409 else
410 {
411 sendto_realops_snomask(SNO_DEBUG, L_ALL,
412 "Message for %s[%s@%s!%s] from %s (TS, ignored)",
413 source_p->name,
414 source_p->username,
415 source_p->host,
416 source_p->from->name,
b3ebc7ab 417 client_p->name);
212380e3
AC
418 }
419}
420
421/* remove_unknown()
422 *
423 * inputs - client who gave us message, supposed sender, buffer
55abcbb2 424 * output -
212380e3
AC
425 * side effects - kills issued for clients, squits for servers
426 */
427static void
1579e155 428remove_unknown(struct Client *client_p, const char *lsender, char *lbuffer)
212380e3
AC
429{
430 int slen = strlen(lsender);
d45f5ea2
JT
431 char sid[4];
432 struct Client *server;
212380e3 433
ba0711fd 434 /* meepfoo is a nickname (ignore)
212380e3
AC
435 * #XXXXXXXX is a UID (KILL)
436 * #XX is a SID (SQUIT)
437 * meep.foo is a server (SQUIT)
438 */
55abcbb2 439 if((IsDigit(lsender[0]) && slen == 3) ||
212380e3
AC
440 (strchr(lsender, '.') != NULL))
441 {
442 sendto_realops_snomask(SNO_DEBUG, L_ALL,
443 "Unknown prefix (%s) from %s, Squitting %s",
b3ebc7ab 444 lbuffer, client_p->name, lsender);
212380e3
AC
445
446 sendto_one(client_p,
447 ":%s SQUIT %s :(Unknown prefix (%s) from %s)",
55abcbb2 448 get_id(&me, client_p), lsender,
212380e3
AC
449 lbuffer, client_p->name);
450 }
d45f5ea2
JT
451 else if(!IsDigit(lsender[0]))
452 ;
453 else if(slen != 9)
454 sendto_realops_snomask(SNO_DEBUG, L_ALL,
455 "Invalid prefix (%s) from %s",
456 lbuffer, client_p->name);
457 else
458 {
459 memcpy(sid, lsender, 3);
460 sid[3] = '\0';
461 server = find_server(NULL, sid);
462 if (server != NULL && server->from == client_p)
55abcbb2 463 sendto_one(client_p, ":%s KILL %s :%s (Unknown Client)",
d45f5ea2
JT
464 get_id(&me, client_p), lsender, me.name);
465 }
212380e3
AC
466}
467
468
469
470/*
471 *
472 * parc number of arguments ('sender' counted as one!)
212380e3
AC
473 * parv[1]..parv[parc-1]
474 * pointers to additional parameters, this is a NULL
475 * terminated list (parv[parc] == NULL).
476 *
477 * *WARNING*
478 * Numerics are mostly error reports. If there is something
479 * wrong with the message, just *DROP* it! Don't even think of
480 * sending back a neat error message -- big danger of creating
481 * a ping pong error message...
482 */
483static void
4d03595d 484do_numeric(int numeric, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
485{
486 struct Client *target_p;
487 struct Channel *chptr;
488
489 if(parc < 2 || !IsServer(source_p))
490 return;
491
492 /* Remap low number numerics. */
4d03595d
AC
493 if(numeric < 100)
494 numeric += 100;
212380e3
AC
495
496 /*
497 * Prepare the parameter portion of the message into 'buffer'.
498 * (Because the buffer is twice as large as the message buffer
499 * for the socket, no overflow can occur here... ...on current
500 * assumptions--bets are off, if these are changed --msa)
501 * Note: if buffer is non-empty, it will begin with SPACE.
502 */
503 if(parc > 1)
504 {
505 char *t = buffer; /* Current position within the buffer */
506 int i;
507 int tl; /* current length of presently being built string in t */
508 for (i = 2; i < (parc - 1); i++)
509 {
5203cba5 510 tl = sprintf(t, " %s", parv[i]);
212380e3
AC
511 t += tl;
512 }
5203cba5 513 sprintf(t, " :%s", parv[parc - 1]);
212380e3
AC
514 }
515
516 if((target_p = find_client(parv[1])) != NULL)
517 {
518 if(IsMe(target_p))
519 {
520 /*
521 * We shouldn't get numerics sent to us,
522 * any numerics we do get indicate a bug somewhere..
523 */
524 /* ugh. this is here because of nick collisions. when two servers
525 * relink, they burst each other their nicks, then perform collides.
526 * if there is a nick collision, BOTH servers will kill their own
527 * nicks, and BOTH will kill the other servers nick, which wont exist,
528 * because it will have been already killed by the local server.
529 *
530 * unfortunately, as we cant guarantee other servers will do the
55abcbb2 531 * "right thing" on a nick collision, we have to keep both kills.
212380e3
AC
532 * ergo we need to ignore ERR_NOSUCHNICK. --fl_
533 */
534 /* quick comment. This _was_ tried. i.e. assume the other servers
535 * will do the "right thing" and kill a nick that is colliding.
536 * unfortunately, it did not work. --Dianora
537 */
538 /* note, now we send PING on server connect, we can
539 * also get ERR_NOSUCHSERVER..
540 */
4d03595d
AC
541 if(numeric != ERR_NOSUCHNICK &&
542 numeric != ERR_NOSUCHSERVER)
212380e3 543 sendto_realops_snomask(SNO_GENERAL, L_ADMIN,
4d03595d 544 "*** %s(via %s) sent a %03d numeric to me: %s",
212380e3
AC
545 source_p->name,
546 client_p->name, numeric, buffer);
547 return;
548 }
549 else if(target_p->from == client_p)
550 {
551 /* This message changed direction (nick collision?)
552 * ignore it.
553 */
554 return;
555 }
556
557 /* csircd will send out unknown umode flag for +a (admin), drop it here. */
4d03595d 558 if(numeric == ERR_UMODEUNKNOWNFLAG && MyClient(target_p))
212380e3
AC
559 return;
560
561 /* Fake it for server hiding, if its our client */
4d03595d 562 sendto_one(target_p, ":%s %03d %s%s",
55abcbb2 563 get_id(source_p, target_p), numeric,
212380e3
AC
564 get_id(target_p, target_p), buffer);
565 return;
566 }
567 else if((chptr = find_channel(parv[1])) != NULL)
06b697a2 568 sendto_channel_flags(client_p, ALL_MEMBERS, source_p, chptr,
4d03595d 569 "%03d %s%s",
06b697a2 570 numeric, chptr->chname, buffer);
212380e3
AC
571}
572
573static void do_alias(struct alias_entry *aptr, struct Client *source_p, char *text)
574{
575 char *p;
576 struct Client *target_p;
577
578 if (!IsFloodDone(source_p) && source_p->localClient->receiveM > 20)
579 flood_endgrace(source_p);
580
581 p = strchr(aptr->target, '@');
582 if (p != NULL)
583 {
584 /* user@server */
585 target_p = find_server(NULL, p + 1);
586 if (target_p != NULL && IsMe(target_p))
587 target_p = NULL;
588 }
589 else
590 {
591 /* nick, must be +S */
592 target_p = find_named_person(aptr->target);
593 if (target_p != NULL && !IsService(target_p))
594 target_p = NULL;
595 }
596
597 if (target_p == NULL)
598 {
599 sendto_one_numeric(source_p, ERR_SERVICESDOWN, form_str(ERR_SERVICESDOWN), aptr->target);
600 return;
601 }
602
603 if (text != NULL && *text == ':')
604 text++;
605 if (text == NULL || *text == '\0')
606 {
607 sendto_one(source_p, form_str(ERR_NOTEXTTOSEND), me.name, source_p->name);
608 return;
609 }
610
611 /* increment the hitcounter on this alias */
612 aptr->hits++;
613
614 sendto_one(target_p, ":%s PRIVMSG %s :%s",
615 get_id(source_p, target_p),
616 p != NULL ? aptr->target : get_id(target_p, target_p),
617 text);
618}
619
620int
621m_not_oper(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
622{
623 sendto_one_numeric(source_p, ERR_NOPRIVILEGES, form_str(ERR_NOPRIVILEGES));
624 return 0;
625}
626
627int
628m_unregistered(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
629{
630 /* bit of a hack.
631 * I don't =really= want to waste a bit in a flag
632 * number_of_nick_changes is only really valid after the client
633 * is fully registered..
634 */
635 if(client_p->localClient->number_of_nick_changes == 0)
636 {
637 sendto_one(client_p, form_str(ERR_NOTREGISTERED), me.name);
638 client_p->localClient->number_of_nick_changes++;
639 }
640
641 return 0;
642}
643
644int
645m_registered(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
646{
647 sendto_one(client_p, form_str(ERR_ALREADYREGISTRED), me.name, source_p->name);
648 return 0;
649}
650
651int
652m_ignore(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
653{
654 return 0;
655}