]> jfr.im git - solanum.git/blame - ircd/parse.c
authd/providers/ident: fix up trailing lf/cr at end of username
[solanum.git] / ircd / parse.c
CommitLineData
212380e3 1/*
8ac75529 2 * charybdis: an advanced ircd.
212380e3
AC
3 * parse.c: The message parser.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
4d03595d 8 * Copyright (C) 2007-2016 William Pitcock
212380e3
AC
9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2 of the License, or
13 * (at your option) any later version.
14 *
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
19 *
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
23 * USA
212380e3
AC
24 */
25
26#include "stdinc.h"
27#include "parse.h"
28#include "client.h"
29#include "channel.h"
212380e3 30#include "hash.h"
4562c604 31#include "match.h"
212380e3
AC
32#include "ircd.h"
33#include "numeric.h"
4016731b 34#include "logger.h"
212380e3
AC
35#include "s_stats.h"
36#include "send.h"
37#include "msg.h"
4d03595d 38#include "msgbuf.h"
212380e3 39#include "s_conf.h"
212380e3
AC
40#include "s_serv.h"
41#include "packet.h"
77d3d2db 42#include "s_assert.h"
212380e3 43
4177311e
EM
44rb_dictionary *cmd_dict = NULL;
45rb_dictionary *alias_dict = NULL;
8ac75529 46
29c92cf9 47static void cancel_clients(struct Client *, struct Client *);
1579e155 48static void remove_unknown(struct Client *, const char *, char *);
212380e3 49
4d03595d 50static void do_numeric(int, struct Client *, struct Client *, int, const char **);
212380e3
AC
51static void do_alias(struct alias_entry *, struct Client *, char *);
52
4a84a763 53static int handle_command(struct Message *, struct MsgBuf *, struct Client *, struct Client *);
212380e3 54
212380e3
AC
55static char buffer[1024];
56
212380e3
AC
57/* turn a string into a parc/parv pair */
58
e4603e3d
AC
59char *reconstruct_parv(int parc, const char *parv[])
60{
61 static char tmpbuf[BUFSIZE]; int i;
62
63 rb_strlcpy(tmpbuf, parv[0], BUFSIZE);
64 for (i = 1; i < parc; i++)
65 {
66 rb_strlcat(tmpbuf, " ", BUFSIZE);
67 rb_strlcat(tmpbuf, parv[i], BUFSIZE);
68 }
69 return tmpbuf;
70}
212380e3 71
212380e3
AC
72/* parse()
73 *
819dd2d2 74 * given a raw buffer, parses it and generates parv and parc
212380e3
AC
75 */
76void
77parse(struct Client *client_p, char *pbuffer, char *bufend)
78{
79 struct Client *from = client_p;
212380e3 80 char *end;
e23126c8 81 int res;
4d03595d 82 int numeric = 0;
212380e3 83 struct Message *mptr;
4d03595d 84 struct MsgBuf msgbuf;
212380e3
AC
85
86 s_assert(MyConnect(client_p));
8c23bb2e 87 s_assert(client_p->localClient->F != NULL);
212380e3
AC
88 if(IsAnyDead(client_p))
89 return;
90
4d03595d 91 end = bufend - 1;
212380e3 92
4d03595d
AC
93 /* XXX this should be done before parse() is called */
94 if(*end == '\n')
95 *end-- = '\0';
96 if(*end == '\r')
97 *end = '\0';
212380e3 98
4d03595d
AC
99 res = msgbuf_parse(&msgbuf, pbuffer);
100 if (res)
212380e3 101 {
4d03595d
AC
102 ServerStats.is_empt++;
103 return;
104 }
212380e3 105
5a5f173d 106 if (msgbuf.origin != NULL && IsServer(client_p))
4d03595d
AC
107 {
108 from = find_client(msgbuf.origin);
212380e3 109
4d03595d
AC
110 /* didnt find any matching client, issue a kill */
111 if(from == NULL)
212380e3 112 {
4d03595d 113 ServerStats.is_unpf++;
1579e155 114 remove_unknown(client_p, msgbuf.origin, pbuffer);
4d03595d 115 return;
212380e3
AC
116 }
117
4d03595d
AC
118 /* fake direction, hmm. */
119 if(from->from != client_p)
212380e3 120 {
4d03595d
AC
121 ServerStats.is_wrdi++;
122 cancel_clients(client_p, from);
123 return;
212380e3 124 }
212380e3
AC
125 }
126
4d03595d 127 if(IsDigit(*msgbuf.cmd) && IsDigit(*(msgbuf.cmd + 1)) && IsDigit(*(msgbuf.cmd + 2)))
212380e3
AC
128 {
129 mptr = NULL;
4d03595d 130 numeric = atoi(msgbuf.cmd);
47adde3d 131 ServerStats.is_num++;
212380e3
AC
132 }
133 else
134 {
a4bf26dd 135 mptr = rb_dictionary_retrieve(cmd_dict, msgbuf.cmd);
212380e3
AC
136
137 /* no command or its encap only, error */
138 if(!mptr || !mptr->cmd)
139 {
4d03595d 140 if (IsPerson(client_p))
212380e3 141 {
a4bf26dd 142 struct alias_entry *aptr = rb_dictionary_retrieve(alias_dict, msgbuf.cmd);
4d03595d 143 if (aptr != NULL)
212380e3 144 {
1ca8cd52
AC
145 if (msgbuf.n_para < 2)
146 {
147 sendto_one(client_p, form_str(ERR_NEEDMOREPARAMS),
148 me.name,
149 EmptyString(client_p->name) ? "*" : client_p->name,
150 msgbuf.cmd);
151 return;
152 }
153
20dd3725 154 do_alias(aptr, client_p, reconstruct_parv(msgbuf.n_para - 1, msgbuf.para + 1));
4d03595d 155 return;
212380e3
AC
156 }
157 }
4d03595d
AC
158 if(IsPerson(from))
159 {
160 sendto_one(from, form_str(ERR_UNKNOWNCOMMAND),
1579e155 161 me.name, from->name, msgbuf.cmd);
4d03595d 162 }
47adde3d 163 ServerStats.is_unco++;
212380e3
AC
164 return;
165 }
166
4d03595d 167 mptr->bytes += msgbuf.parselen;
212380e3
AC
168 }
169
212380e3
AC
170 if(mptr == NULL)
171 {
4d03595d 172 do_numeric(numeric, client_p, from, msgbuf.n_para, msgbuf.para);
212380e3
AC
173 return;
174 }
175
4a84a763 176 if(handle_command(mptr, &msgbuf, client_p, from) < -1)
212380e3
AC
177 {
178 char *p;
179 for (p = pbuffer; p <= end; p += 8)
180 {
181 /* HACK HACK */
182 /* Its expected this nasty code can be removed
183 * or rewritten later if still needed.
184 */
44f442e3 185 if((p + 8) > end)
212380e3
AC
186 {
187 for (; p <= end; p++)
188 {
189 ilog(L_MAIN, "%02x |%c", p[0], p[0]);
190 }
191 }
192 else
193 ilog(L_MAIN,
194 "%02x %02x %02x %02x %02x %02x %02x %02x |%c%c%c%c%c%c%c%c",
195 p[0], p[1], p[2], p[3], p[4], p[5],
196 p[6], p[7], p[0], p[1], p[2], p[3], p[4], p[5], p[6], p[7]);
197 }
198 }
199
200}
201
202/*
203 * handle_command
204 *
205 * inputs - pointer to message block
4a84a763 206 * - pointer to message buffer
212380e3
AC
207 * - pointer to client
208 * - pointer to client message is from
212380e3
AC
209 * output - -1 if error from server
210 * side effects -
211 */
212static int
4a84a763 213handle_command(struct Message *mptr, struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *from)
212380e3
AC
214{
215 struct MessageEntry ehandler;
216 MessageHandler handler = 0;
217 char squitreason[80];
218
219 if(IsAnyDead(client_p))
220 return -1;
221
222 if(IsServer(client_p))
223 mptr->rcount++;
224
225 mptr->count++;
226
212380e3
AC
227 ehandler = mptr->handlers[from->handler];
228 handler = ehandler.handler;
229
230 /* check right amount of params is passed... --is */
4a84a763
AC
231 if(msgbuf_p->n_para < ehandler.min_para ||
232 (ehandler.min_para && EmptyString(msgbuf_p->para[ehandler.min_para - 1])))
212380e3
AC
233 {
234 if(!IsServer(client_p))
235 {
236 sendto_one(client_p, form_str(ERR_NEEDMOREPARAMS),
55abcbb2
KB
237 me.name,
238 EmptyString(client_p->name) ? "*" : client_p->name,
212380e3
AC
239 mptr->cmd);
240 if(MyClient(client_p))
241 return (1);
242 else
243 return (-1);
244 }
245
246 sendto_realops_snomask(SNO_GENERAL, L_ALL,
247 "Dropping server %s due to (invalid) command '%s'"
66769bc1 248 " with only %zu arguments (expecting %zu).",
4a84a763 249 client_p->name, mptr->cmd, msgbuf_p->n_para, ehandler.min_para);
212380e3 250 ilog(L_SERVER,
66769bc1 251 "Insufficient parameters (%zu < %zu) for command '%s' from %s.",
4a84a763 252 msgbuf_p->n_para, ehandler.min_para, mptr->cmd, client_p->name);
5203cba5 253 snprintf(squitreason, sizeof squitreason,
66769bc1 254 "Insufficient parameters (%zu < %zu) for command '%s'",
4a84a763 255 msgbuf_p->n_para, ehandler.min_para, mptr->cmd);
212380e3
AC
256 exit_client(client_p, client_p, client_p, squitreason);
257 return (-1);
258 }
259
4a84a763 260 (*handler) (msgbuf_p, client_p, from, msgbuf_p->n_para, msgbuf_p->para);
212380e3
AC
261 return (1);
262}
263
264void
4a84a763 265handle_encap(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p,
212380e3
AC
266 const char *command, int parc, const char *parv[])
267{
268 struct Message *mptr;
269 struct MessageEntry ehandler;
270 MessageHandler handler = 0;
271
a4bf26dd 272 mptr = rb_dictionary_retrieve(cmd_dict, command);
212380e3
AC
273
274 if(mptr == NULL || mptr->cmd == NULL)
275 return;
276
277 ehandler = mptr->handlers[ENCAP_HANDLER];
278 handler = ehandler.handler;
279
66769bc1 280 if((size_t)parc < ehandler.min_para ||
212380e3
AC
281 (ehandler.min_para && EmptyString(parv[ehandler.min_para - 1])))
282 return;
283
4a84a763 284 (*handler) (msgbuf_p, client_p, source_p, parc, parv);
212380e3
AC
285}
286
287/*
288 * clear_hash_parse()
289 *
290 * inputs -
291 * output - NONE
292 * side effects - MUST MUST be called at startup ONCE before
293 * any other keyword hash routine is used.
212380e3
AC
294 */
295void
296clear_hash_parse()
297{
a4bf26dd 298 cmd_dict = rb_dictionary_create("command", strcasecmp);
212380e3
AC
299}
300
301/* mod_add_cmd
302 *
303 * inputs - command name
304 * - pointer to struct Message
305 * output - none
306 * side effects - load this one command name
307 * msg->count msg->bytes is modified in place, in
308 * modules address space. Might not want to do that...
309 */
310void
311mod_add_cmd(struct Message *msg)
312{
212380e3
AC
313 s_assert(msg != NULL);
314 if(msg == NULL)
315 return;
316
a4bf26dd 317 if (rb_dictionary_find(cmd_dict, msg->cmd) != NULL)
8ac75529 318 return;
212380e3
AC
319
320 msg->count = 0;
321 msg->rcount = 0;
322 msg->bytes = 0;
323
a4bf26dd 324 rb_dictionary_add(cmd_dict, msg->cmd, msg);
212380e3
AC
325}
326
327/* mod_del_cmd
328 *
329 * inputs - command name
330 * output - none
331 * side effects - unload this one command name
332 */
333void
334mod_del_cmd(struct Message *msg)
335{
212380e3
AC
336 s_assert(msg != NULL);
337 if(msg == NULL)
338 return;
339
a4bf26dd 340 rb_dictionary_delete(cmd_dict, msg->cmd);
212380e3
AC
341}
342
212380e3
AC
343/* cancel_clients()
344 *
345 * inputs - client who sent us the message, client with fake
29c92cf9 346 * direction
212380e3
AC
347 * outputs - a given warning about the fake direction
348 * side effects -
349 */
350static void
29c92cf9 351cancel_clients(struct Client *client_p, struct Client *source_p)
212380e3
AC
352{
353 /* ok, fake prefix happens naturally during a burst on a nick
354 * collision with TS5, we cant kill them because one client has to
355 * survive, so we just send an error.
356 */
357 if(IsServer(source_p) || IsMe(source_p))
358 {
359 sendto_realops_snomask(SNO_DEBUG, L_ALL,
360 "Message for %s[%s] from %s",
361 source_p->name, source_p->from->name,
b3ebc7ab 362 client_p->name);
212380e3
AC
363 }
364 else
365 {
366 sendto_realops_snomask(SNO_DEBUG, L_ALL,
367 "Message for %s[%s@%s!%s] from %s (TS, ignored)",
368 source_p->name,
369 source_p->username,
370 source_p->host,
371 source_p->from->name,
b3ebc7ab 372 client_p->name);
212380e3
AC
373 }
374}
375
376/* remove_unknown()
377 *
378 * inputs - client who gave us message, supposed sender, buffer
55abcbb2 379 * output -
212380e3
AC
380 * side effects - kills issued for clients, squits for servers
381 */
382static void
1579e155 383remove_unknown(struct Client *client_p, const char *lsender, char *lbuffer)
212380e3
AC
384{
385 int slen = strlen(lsender);
d45f5ea2
JT
386 char sid[4];
387 struct Client *server;
212380e3 388
ba0711fd 389 /* meepfoo is a nickname (ignore)
212380e3
AC
390 * #XXXXXXXX is a UID (KILL)
391 * #XX is a SID (SQUIT)
392 * meep.foo is a server (SQUIT)
393 */
55abcbb2 394 if((IsDigit(lsender[0]) && slen == 3) ||
212380e3
AC
395 (strchr(lsender, '.') != NULL))
396 {
397 sendto_realops_snomask(SNO_DEBUG, L_ALL,
398 "Unknown prefix (%s) from %s, Squitting %s",
b3ebc7ab 399 lbuffer, client_p->name, lsender);
212380e3
AC
400
401 sendto_one(client_p,
402 ":%s SQUIT %s :(Unknown prefix (%s) from %s)",
55abcbb2 403 get_id(&me, client_p), lsender,
212380e3
AC
404 lbuffer, client_p->name);
405 }
d45f5ea2
JT
406 else if(!IsDigit(lsender[0]))
407 ;
408 else if(slen != 9)
409 sendto_realops_snomask(SNO_DEBUG, L_ALL,
410 "Invalid prefix (%s) from %s",
411 lbuffer, client_p->name);
412 else
413 {
414 memcpy(sid, lsender, 3);
415 sid[3] = '\0';
416 server = find_server(NULL, sid);
417 if (server != NULL && server->from == client_p)
55abcbb2 418 sendto_one(client_p, ":%s KILL %s :%s (Unknown Client)",
d45f5ea2
JT
419 get_id(&me, client_p), lsender, me.name);
420 }
212380e3
AC
421}
422
423
424
425/*
426 *
427 * parc number of arguments ('sender' counted as one!)
212380e3
AC
428 * parv[1]..parv[parc-1]
429 * pointers to additional parameters, this is a NULL
430 * terminated list (parv[parc] == NULL).
431 *
432 * *WARNING*
433 * Numerics are mostly error reports. If there is something
434 * wrong with the message, just *DROP* it! Don't even think of
435 * sending back a neat error message -- big danger of creating
436 * a ping pong error message...
437 */
438static void
4d03595d 439do_numeric(int numeric, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
440{
441 struct Client *target_p;
442 struct Channel *chptr;
443
444 if(parc < 2 || !IsServer(source_p))
445 return;
446
447 /* Remap low number numerics. */
4d03595d
AC
448 if(numeric < 100)
449 numeric += 100;
212380e3
AC
450
451 /*
452 * Prepare the parameter portion of the message into 'buffer'.
453 * (Because the buffer is twice as large as the message buffer
454 * for the socket, no overflow can occur here... ...on current
455 * assumptions--bets are off, if these are changed --msa)
456 * Note: if buffer is non-empty, it will begin with SPACE.
457 */
458 if(parc > 1)
459 {
460 char *t = buffer; /* Current position within the buffer */
461 int i;
462 int tl; /* current length of presently being built string in t */
463 for (i = 2; i < (parc - 1); i++)
464 {
5203cba5 465 tl = sprintf(t, " %s", parv[i]);
212380e3
AC
466 t += tl;
467 }
5203cba5 468 sprintf(t, " :%s", parv[parc - 1]);
212380e3
AC
469 }
470
471 if((target_p = find_client(parv[1])) != NULL)
472 {
473 if(IsMe(target_p))
474 {
475 /*
476 * We shouldn't get numerics sent to us,
477 * any numerics we do get indicate a bug somewhere..
478 */
479 /* ugh. this is here because of nick collisions. when two servers
480 * relink, they burst each other their nicks, then perform collides.
481 * if there is a nick collision, BOTH servers will kill their own
482 * nicks, and BOTH will kill the other servers nick, which wont exist,
483 * because it will have been already killed by the local server.
484 *
485 * unfortunately, as we cant guarantee other servers will do the
55abcbb2 486 * "right thing" on a nick collision, we have to keep both kills.
212380e3
AC
487 * ergo we need to ignore ERR_NOSUCHNICK. --fl_
488 */
489 /* quick comment. This _was_ tried. i.e. assume the other servers
490 * will do the "right thing" and kill a nick that is colliding.
491 * unfortunately, it did not work. --Dianora
492 */
493 /* note, now we send PING on server connect, we can
494 * also get ERR_NOSUCHSERVER..
495 */
4d03595d
AC
496 if(numeric != ERR_NOSUCHNICK &&
497 numeric != ERR_NOSUCHSERVER)
212380e3 498 sendto_realops_snomask(SNO_GENERAL, L_ADMIN,
4d03595d 499 "*** %s(via %s) sent a %03d numeric to me: %s",
212380e3
AC
500 source_p->name,
501 client_p->name, numeric, buffer);
502 return;
503 }
504 else if(target_p->from == client_p)
505 {
506 /* This message changed direction (nick collision?)
507 * ignore it.
508 */
509 return;
510 }
511
512 /* csircd will send out unknown umode flag for +a (admin), drop it here. */
4d03595d 513 if(numeric == ERR_UMODEUNKNOWNFLAG && MyClient(target_p))
212380e3
AC
514 return;
515
516 /* Fake it for server hiding, if its our client */
4d03595d 517 sendto_one(target_p, ":%s %03d %s%s",
55abcbb2 518 get_id(source_p, target_p), numeric,
212380e3
AC
519 get_id(target_p, target_p), buffer);
520 return;
521 }
522 else if((chptr = find_channel(parv[1])) != NULL)
06b697a2 523 sendto_channel_flags(client_p, ALL_MEMBERS, source_p, chptr,
4d03595d 524 "%03d %s%s",
06b697a2 525 numeric, chptr->chname, buffer);
212380e3
AC
526}
527
528static void do_alias(struct alias_entry *aptr, struct Client *source_p, char *text)
529{
530 char *p;
531 struct Client *target_p;
532
533 if (!IsFloodDone(source_p) && source_p->localClient->receiveM > 20)
534 flood_endgrace(source_p);
535
536 p = strchr(aptr->target, '@');
537 if (p != NULL)
538 {
539 /* user@server */
540 target_p = find_server(NULL, p + 1);
541 if (target_p != NULL && IsMe(target_p))
542 target_p = NULL;
543 }
544 else
545 {
546 /* nick, must be +S */
547 target_p = find_named_person(aptr->target);
548 if (target_p != NULL && !IsService(target_p))
549 target_p = NULL;
550 }
551
552 if (target_p == NULL)
553 {
554 sendto_one_numeric(source_p, ERR_SERVICESDOWN, form_str(ERR_SERVICESDOWN), aptr->target);
555 return;
556 }
557
558 if (text != NULL && *text == ':')
559 text++;
560 if (text == NULL || *text == '\0')
561 {
562 sendto_one(source_p, form_str(ERR_NOTEXTTOSEND), me.name, source_p->name);
563 return;
564 }
565
566 /* increment the hitcounter on this alias */
567 aptr->hits++;
568
569 sendto_one(target_p, ":%s PRIVMSG %s :%s",
570 get_id(source_p, target_p),
571 p != NULL ? aptr->target : get_id(target_p, target_p),
572 text);
573}
574
3c7d6fcc 575void
4a84a763 576m_not_oper(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
577{
578 sendto_one_numeric(source_p, ERR_NOPRIVILEGES, form_str(ERR_NOPRIVILEGES));
212380e3
AC
579}
580
3c7d6fcc 581void
4a84a763 582m_unregistered(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
583{
584 /* bit of a hack.
585 * I don't =really= want to waste a bit in a flag
586 * number_of_nick_changes is only really valid after the client
587 * is fully registered..
588 */
589 if(client_p->localClient->number_of_nick_changes == 0)
590 {
591 sendto_one(client_p, form_str(ERR_NOTREGISTERED), me.name);
592 client_p->localClient->number_of_nick_changes++;
593 }
212380e3
AC
594}
595
3c7d6fcc 596void
4a84a763 597m_registered(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
598{
599 sendto_one(client_p, form_str(ERR_ALREADYREGISTRED), me.name, source_p->name);
212380e3
AC
600}
601
3c7d6fcc 602void
4a84a763 603m_ignore(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3 604{
3c7d6fcc 605 /* Does nothing */
212380e3 606}