]>
Commit | Line | Data |
---|---|---|
212380e3 | 1 | /* |
8ac75529 | 2 | * charybdis: an advanced ircd. |
212380e3 AC |
3 | * parse.c: The message parser. |
4 | * | |
5 | * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center | |
6 | * Copyright (C) 1996-2002 Hybrid Development Team | |
7 | * Copyright (C) 2002-2005 ircd-ratbox development team | |
8ac75529 | 8 | * Copyright (C) 2007 William Pitcock |
212380e3 AC |
9 | * |
10 | * This program is free software; you can redistribute it and/or modify | |
11 | * it under the terms of the GNU General Public License as published by | |
12 | * the Free Software Foundation; either version 2 of the License, or | |
13 | * (at your option) any later version. | |
14 | * | |
15 | * This program is distributed in the hope that it will be useful, | |
16 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
17 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
18 | * GNU General Public License for more details. | |
19 | * | |
20 | * You should have received a copy of the GNU General Public License | |
21 | * along with this program; if not, write to the Free Software | |
22 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 | |
23 | * USA | |
24 | * | |
f42e9ceb | 25 | * $Id: parse.c 3177 2007-02-01 00:19:14Z jilles $ |
212380e3 AC |
26 | */ |
27 | ||
28 | #include "stdinc.h" | |
29 | #include "parse.h" | |
30 | #include "client.h" | |
31 | #include "channel.h" | |
32 | #include "common.h" | |
33 | #include "hash.h" | |
4562c604 | 34 | #include "match.h" |
212380e3 AC |
35 | #include "ircd.h" |
36 | #include "numeric.h" | |
4016731b | 37 | #include "logger.h" |
212380e3 AC |
38 | #include "s_stats.h" |
39 | #include "send.h" | |
40 | #include "msg.h" | |
41 | #include "s_conf.h" | |
212380e3 AC |
42 | #include "s_serv.h" |
43 | #include "packet.h" | |
77d3d2db | 44 | #include "s_assert.h" |
212380e3 | 45 | |
8ac75529 AC |
46 | static struct Dictionary *cmd_dict = NULL; |
47 | struct Dictionary *alias_dict = NULL; | |
48 | ||
161f0409 | 49 | /* parv[0] is not used, and parv[LAST] == NULL */ |
212380e3 AC |
50 | static char *para[MAXPARA + 2]; |
51 | ||
29c92cf9 | 52 | static void cancel_clients(struct Client *, struct Client *); |
212380e3 AC |
53 | static void remove_unknown(struct Client *, char *, char *); |
54 | ||
55 | static void do_numeric(char[], struct Client *, struct Client *, int, char **); | |
56 | static void do_alias(struct alias_entry *, struct Client *, char *); | |
57 | ||
58 | static int handle_command(struct Message *, struct Client *, struct Client *, int, const char**); | |
59 | ||
212380e3 AC |
60 | static char buffer[1024]; |
61 | ||
212380e3 AC |
62 | /* turn a string into a parc/parv pair */ |
63 | ||
64 | ||
65 | static inline int | |
66 | string_to_array(char *string, char **parv) | |
67 | { | |
68 | char *p, *buf = string; | |
69 | int x = 1; | |
70 | ||
71 | parv[x] = NULL; | |
72 | while (*buf == ' ') /* skip leading spaces */ | |
73 | buf++; | |
74 | if(*buf == '\0') /* ignore all-space args */ | |
75 | return x; | |
76 | ||
77 | do | |
78 | { | |
79 | if(*buf == ':') /* Last parameter */ | |
80 | { | |
81 | buf++; | |
82 | parv[x++] = buf; | |
83 | parv[x] = NULL; | |
84 | return x; | |
85 | } | |
86 | else | |
87 | { | |
88 | parv[x++] = buf; | |
89 | parv[x] = NULL; | |
90 | if((p = strchr(buf, ' ')) != NULL) | |
91 | { | |
92 | *p++ = '\0'; | |
93 | buf = p; | |
94 | } | |
95 | else | |
96 | return x; | |
97 | } | |
98 | while (*buf == ' ') | |
99 | buf++; | |
100 | if(*buf == '\0') | |
101 | return x; | |
102 | } | |
161f0409 | 103 | /* we can go upto parv[MAXPARA], as parv[0] is skipped */ |
212380e3 AC |
104 | while (x < MAXPARA); |
105 | ||
106 | if(*p == ':') | |
107 | p++; | |
108 | ||
109 | parv[x++] = p; | |
110 | parv[x] = NULL; | |
111 | return x; | |
112 | } | |
113 | ||
114 | /* parse() | |
115 | * | |
819dd2d2 | 116 | * given a raw buffer, parses it and generates parv and parc |
212380e3 AC |
117 | */ |
118 | void | |
119 | parse(struct Client *client_p, char *pbuffer, char *bufend) | |
120 | { | |
121 | struct Client *from = client_p; | |
819dd2d2 | 122 | char *sender; |
212380e3 AC |
123 | char *ch; |
124 | char *s; | |
125 | char *end; | |
126 | int i = 1; | |
127 | char *numeric = 0; | |
128 | struct Message *mptr; | |
129 | ||
130 | s_assert(MyConnect(client_p)); | |
8c23bb2e | 131 | s_assert(client_p->localClient->F != NULL); |
212380e3 AC |
132 | if(IsAnyDead(client_p)) |
133 | return; | |
134 | ||
135 | for (ch = pbuffer; *ch == ' '; ch++) /* skip spaces */ | |
136 | /* null statement */ ; | |
137 | ||
138 | para[0] = from->name; | |
139 | ||
140 | if(*ch == ':') | |
141 | { | |
142 | ch++; | |
143 | ||
144 | /* point sender to the sender param */ | |
145 | sender = ch; | |
146 | ||
147 | if((s = strchr(ch, ' '))) | |
148 | { | |
149 | *s = '\0'; | |
150 | s++; | |
151 | ch = s; | |
152 | } | |
153 | ||
154 | if(*sender && IsServer(client_p)) | |
155 | { | |
f42e9ceb | 156 | from = find_client(sender); |
212380e3 AC |
157 | |
158 | /* didnt find any matching client, issue a kill */ | |
159 | if(from == NULL) | |
160 | { | |
47adde3d | 161 | ServerStats.is_unpf++; |
212380e3 AC |
162 | remove_unknown(client_p, sender, pbuffer); |
163 | return; | |
164 | } | |
165 | ||
166 | para[0] = from->name; | |
167 | ||
168 | /* fake direction, hmm. */ | |
169 | if(from->from != client_p) | |
170 | { | |
47adde3d | 171 | ServerStats.is_wrdi++; |
29c92cf9 | 172 | cancel_clients(client_p, from); |
212380e3 AC |
173 | return; |
174 | } | |
175 | } | |
176 | while (*ch == ' ') | |
177 | ch++; | |
178 | } | |
179 | ||
180 | if(*ch == '\0') | |
181 | { | |
47adde3d | 182 | ServerStats.is_empt++; |
212380e3 AC |
183 | return; |
184 | } | |
185 | ||
186 | /* at this point there must be some sort of command parameter */ | |
187 | ||
188 | /* | |
189 | * Extract the command code from the packet. Point s to the end | |
190 | * of the command code and calculate the length using pointer | |
191 | * arithmetic. Note: only need length for numerics and *all* | |
192 | * numerics must have parameters and thus a space after the command | |
193 | * code. -avalon | |
194 | */ | |
195 | ||
196 | /* EOB is 3 chars long but is not a numeric */ | |
197 | ||
198 | if(*(ch + 3) == ' ' && /* ok, lets see if its a possible numeric.. */ | |
199 | IsDigit(*ch) && IsDigit(*(ch + 1)) && IsDigit(*(ch + 2))) | |
200 | { | |
201 | mptr = NULL; | |
202 | numeric = ch; | |
47adde3d | 203 | ServerStats.is_num++; |
212380e3 AC |
204 | s = ch + 3; /* I know this is ' ' from above if */ |
205 | *s++ = '\0'; /* blow away the ' ', and point s to next part */ | |
206 | } | |
207 | else | |
208 | { | |
209 | int ii = 0; | |
210 | ||
211 | if((s = strchr(ch, ' '))) | |
212 | *s++ = '\0'; | |
213 | ||
90187f21 | 214 | mptr = irc_dictionary_retrieve(cmd_dict, ch); |
212380e3 AC |
215 | |
216 | /* no command or its encap only, error */ | |
217 | if(!mptr || !mptr->cmd) | |
218 | { | |
219 | /* | |
220 | * Note: Give error message *only* to recognized | |
221 | * persons. It's a nightmare situation to have | |
222 | * two programs sending "Unknown command"'s or | |
223 | * equivalent to each other at full blast.... | |
224 | * If it has got to person state, it at least | |
225 | * seems to be well behaving. Perhaps this message | |
226 | * should never be generated, though... --msa | |
227 | * Hm, when is the buffer empty -- if a command | |
228 | * code has been found ?? -Armin | |
229 | */ | |
230 | if(pbuffer[0] != '\0') | |
231 | { | |
232 | if (IsPerson(client_p)) | |
233 | { | |
8ac75529 | 234 | struct alias_entry *aptr = irc_dictionary_retrieve(alias_dict, ch); |
212380e3 AC |
235 | if (aptr != NULL) |
236 | { | |
237 | do_alias(aptr, client_p, s); | |
238 | return; | |
239 | } | |
240 | } | |
241 | if(IsPerson(from)) | |
242 | { | |
243 | sendto_one(from, form_str(ERR_UNKNOWNCOMMAND), | |
244 | me.name, from->name, ch); | |
245 | } | |
246 | } | |
47adde3d | 247 | ServerStats.is_unco++; |
212380e3 AC |
248 | return; |
249 | } | |
250 | ||
251 | ii = bufend - ((s) ? s : ch); | |
252 | mptr->bytes += ii; | |
253 | } | |
254 | ||
255 | end = bufend - 1; | |
256 | ||
257 | /* XXX this should be done before parse() is called */ | |
258 | if(*end == '\n') | |
259 | *end-- = '\0'; | |
260 | if(*end == '\r') | |
261 | *end = '\0'; | |
262 | ||
263 | if(s != NULL) | |
264 | i = string_to_array(s, para); | |
265 | ||
266 | if(mptr == NULL) | |
267 | { | |
268 | do_numeric(numeric, client_p, from, i, para); | |
269 | return; | |
270 | } | |
271 | ||
29c92cf9 | 272 | if(handle_command(mptr, client_p, from, i, /* XXX discards const!!! */ (const char **)(void *)para) < -1) |
212380e3 AC |
273 | { |
274 | char *p; | |
275 | for (p = pbuffer; p <= end; p += 8) | |
276 | { | |
277 | /* HACK HACK */ | |
278 | /* Its expected this nasty code can be removed | |
279 | * or rewritten later if still needed. | |
280 | */ | |
281 | if((unsigned long) (p + 8) > (unsigned long) end) | |
282 | { | |
283 | for (; p <= end; p++) | |
284 | { | |
285 | ilog(L_MAIN, "%02x |%c", p[0], p[0]); | |
286 | } | |
287 | } | |
288 | else | |
289 | ilog(L_MAIN, | |
290 | "%02x %02x %02x %02x %02x %02x %02x %02x |%c%c%c%c%c%c%c%c", | |
291 | p[0], p[1], p[2], p[3], p[4], p[5], | |
292 | p[6], p[7], p[0], p[1], p[2], p[3], p[4], p[5], p[6], p[7]); | |
293 | } | |
294 | } | |
295 | ||
296 | } | |
297 | ||
298 | /* | |
299 | * handle_command | |
300 | * | |
301 | * inputs - pointer to message block | |
302 | * - pointer to client | |
303 | * - pointer to client message is from | |
304 | * - count of number of args | |
305 | * - pointer to argv[] array | |
306 | * output - -1 if error from server | |
307 | * side effects - | |
308 | */ | |
309 | static int | |
310 | handle_command(struct Message *mptr, struct Client *client_p, | |
311 | struct Client *from, int i, const char** hpara) | |
312 | { | |
313 | struct MessageEntry ehandler; | |
314 | MessageHandler handler = 0; | |
315 | char squitreason[80]; | |
316 | ||
317 | if(IsAnyDead(client_p)) | |
318 | return -1; | |
319 | ||
320 | if(IsServer(client_p)) | |
321 | mptr->rcount++; | |
322 | ||
323 | mptr->count++; | |
324 | ||
325 | /* New patch to avoid server flooding from unregistered connects | |
326 | - Pie-Man 07/27/2000 */ | |
327 | ||
328 | if(!IsRegistered(client_p)) | |
329 | { | |
330 | /* if its from a possible server connection | |
331 | * ignore it.. more than likely its a header thats sneaked through | |
332 | */ | |
333 | ||
334 | if(IsAnyServer(client_p) && !(mptr->flags & MFLG_UNREG)) | |
335 | return (1); | |
336 | } | |
337 | ||
338 | ehandler = mptr->handlers[from->handler]; | |
339 | handler = ehandler.handler; | |
340 | ||
341 | /* check right amount of params is passed... --is */ | |
55abcbb2 | 342 | if(i < ehandler.min_para || |
212380e3 AC |
343 | (ehandler.min_para && EmptyString(hpara[ehandler.min_para - 1]))) |
344 | { | |
345 | if(!IsServer(client_p)) | |
346 | { | |
347 | sendto_one(client_p, form_str(ERR_NEEDMOREPARAMS), | |
55abcbb2 KB |
348 | me.name, |
349 | EmptyString(client_p->name) ? "*" : client_p->name, | |
212380e3 AC |
350 | mptr->cmd); |
351 | if(MyClient(client_p)) | |
352 | return (1); | |
353 | else | |
354 | return (-1); | |
355 | } | |
356 | ||
357 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
358 | "Dropping server %s due to (invalid) command '%s'" | |
359 | " with only %d arguments (expecting %d).", | |
360 | client_p->name, mptr->cmd, i, ehandler.min_para); | |
361 | ilog(L_SERVER, | |
362 | "Insufficient parameters (%d < %d) for command '%s' from %s.", | |
363 | i, ehandler.min_para, mptr->cmd, client_p->name); | |
c2f73e5d | 364 | rb_snprintf(squitreason, sizeof squitreason, |
212380e3 AC |
365 | "Insufficient parameters (%d < %d) for command '%s'", |
366 | i, ehandler.min_para, mptr->cmd); | |
367 | exit_client(client_p, client_p, client_p, squitreason); | |
368 | return (-1); | |
369 | } | |
370 | ||
371 | (*handler) (client_p, from, i, hpara); | |
372 | return (1); | |
373 | } | |
374 | ||
375 | void | |
376 | handle_encap(struct Client *client_p, struct Client *source_p, | |
377 | const char *command, int parc, const char *parv[]) | |
378 | { | |
379 | struct Message *mptr; | |
380 | struct MessageEntry ehandler; | |
381 | MessageHandler handler = 0; | |
382 | ||
8ac75529 | 383 | mptr = irc_dictionary_retrieve(cmd_dict, command); |
212380e3 AC |
384 | |
385 | if(mptr == NULL || mptr->cmd == NULL) | |
386 | return; | |
387 | ||
388 | ehandler = mptr->handlers[ENCAP_HANDLER]; | |
389 | handler = ehandler.handler; | |
390 | ||
55abcbb2 | 391 | if(parc < ehandler.min_para || |
212380e3 AC |
392 | (ehandler.min_para && EmptyString(parv[ehandler.min_para - 1]))) |
393 | return; | |
394 | ||
395 | (*handler) (client_p, source_p, parc, parv); | |
396 | } | |
397 | ||
398 | /* | |
399 | * clear_hash_parse() | |
400 | * | |
401 | * inputs - | |
402 | * output - NONE | |
403 | * side effects - MUST MUST be called at startup ONCE before | |
404 | * any other keyword hash routine is used. | |
405 | * | |
406 | */ | |
407 | void | |
408 | clear_hash_parse() | |
409 | { | |
8ac75529 | 410 | cmd_dict = irc_dictionary_create(strcasecmp); |
212380e3 AC |
411 | } |
412 | ||
413 | /* mod_add_cmd | |
414 | * | |
415 | * inputs - command name | |
416 | * - pointer to struct Message | |
417 | * output - none | |
418 | * side effects - load this one command name | |
419 | * msg->count msg->bytes is modified in place, in | |
420 | * modules address space. Might not want to do that... | |
421 | */ | |
422 | void | |
423 | mod_add_cmd(struct Message *msg) | |
424 | { | |
212380e3 AC |
425 | s_assert(msg != NULL); |
426 | if(msg == NULL) | |
427 | return; | |
428 | ||
8ac75529 AC |
429 | if (irc_dictionary_find(cmd_dict, msg->cmd) != NULL) |
430 | return; | |
212380e3 AC |
431 | |
432 | msg->count = 0; | |
433 | msg->rcount = 0; | |
434 | msg->bytes = 0; | |
435 | ||
8ac75529 | 436 | irc_dictionary_add(cmd_dict, msg->cmd, msg); |
212380e3 AC |
437 | } |
438 | ||
439 | /* mod_del_cmd | |
440 | * | |
441 | * inputs - command name | |
442 | * output - none | |
443 | * side effects - unload this one command name | |
444 | */ | |
445 | void | |
446 | mod_del_cmd(struct Message *msg) | |
447 | { | |
212380e3 AC |
448 | s_assert(msg != NULL); |
449 | if(msg == NULL) | |
450 | return; | |
451 | ||
8ac75529 | 452 | irc_dictionary_delete(cmd_dict, msg->cmd); |
212380e3 AC |
453 | } |
454 | ||
455 | /* | |
456 | * report_messages | |
457 | * | |
458 | * inputs - pointer to client to report to | |
459 | * output - NONE | |
460 | * side effects - NONE | |
461 | */ | |
462 | void | |
463 | report_messages(struct Client *source_p) | |
464 | { | |
8ac75529 AC |
465 | struct DictionaryIter iter; |
466 | struct Message *msg; | |
467 | struct alias_entry *amsg; | |
212380e3 | 468 | |
90187f21 | 469 | DICTIONARY_FOREACH(msg, &iter, cmd_dict) |
212380e3 | 470 | { |
8ac75529 | 471 | s_assert(msg->cmd != NULL); |
55abcbb2 | 472 | sendto_one_numeric(source_p, RPL_STATSCOMMANDS, |
8ac75529 | 473 | form_str(RPL_STATSCOMMANDS), |
55abcbb2 | 474 | msg->cmd, msg->count, |
8ac75529 AC |
475 | msg->bytes, msg->rcount); |
476 | } | |
212380e3 | 477 | |
90187f21 | 478 | DICTIONARY_FOREACH(amsg, &iter, alias_dict) |
8ac75529 AC |
479 | { |
480 | s_assert(amsg->name != NULL); | |
481 | sendto_one_numeric(source_p, RPL_STATSCOMMANDS, | |
482 | form_str(RPL_STATSCOMMANDS), | |
77910830 | 483 | amsg->name, amsg->hits, 0L, 0); |
212380e3 AC |
484 | } |
485 | } | |
486 | ||
487 | /* cancel_clients() | |
488 | * | |
489 | * inputs - client who sent us the message, client with fake | |
29c92cf9 | 490 | * direction |
212380e3 AC |
491 | * outputs - a given warning about the fake direction |
492 | * side effects - | |
493 | */ | |
494 | static void | |
29c92cf9 | 495 | cancel_clients(struct Client *client_p, struct Client *source_p) |
212380e3 AC |
496 | { |
497 | /* ok, fake prefix happens naturally during a burst on a nick | |
498 | * collision with TS5, we cant kill them because one client has to | |
499 | * survive, so we just send an error. | |
500 | */ | |
501 | if(IsServer(source_p) || IsMe(source_p)) | |
502 | { | |
503 | sendto_realops_snomask(SNO_DEBUG, L_ALL, | |
504 | "Message for %s[%s] from %s", | |
505 | source_p->name, source_p->from->name, | |
b3ebc7ab | 506 | client_p->name); |
212380e3 AC |
507 | } |
508 | else | |
509 | { | |
510 | sendto_realops_snomask(SNO_DEBUG, L_ALL, | |
511 | "Message for %s[%s@%s!%s] from %s (TS, ignored)", | |
512 | source_p->name, | |
513 | source_p->username, | |
514 | source_p->host, | |
515 | source_p->from->name, | |
b3ebc7ab | 516 | client_p->name); |
212380e3 AC |
517 | } |
518 | } | |
519 | ||
520 | /* remove_unknown() | |
521 | * | |
522 | * inputs - client who gave us message, supposed sender, buffer | |
55abcbb2 | 523 | * output - |
212380e3 AC |
524 | * side effects - kills issued for clients, squits for servers |
525 | */ | |
526 | static void | |
527 | remove_unknown(struct Client *client_p, char *lsender, char *lbuffer) | |
528 | { | |
529 | int slen = strlen(lsender); | |
d45f5ea2 JT |
530 | char sid[4]; |
531 | struct Client *server; | |
212380e3 | 532 | |
ba0711fd | 533 | /* meepfoo is a nickname (ignore) |
212380e3 AC |
534 | * #XXXXXXXX is a UID (KILL) |
535 | * #XX is a SID (SQUIT) | |
536 | * meep.foo is a server (SQUIT) | |
537 | */ | |
55abcbb2 | 538 | if((IsDigit(lsender[0]) && slen == 3) || |
212380e3 AC |
539 | (strchr(lsender, '.') != NULL)) |
540 | { | |
541 | sendto_realops_snomask(SNO_DEBUG, L_ALL, | |
542 | "Unknown prefix (%s) from %s, Squitting %s", | |
b3ebc7ab | 543 | lbuffer, client_p->name, lsender); |
212380e3 AC |
544 | |
545 | sendto_one(client_p, | |
546 | ":%s SQUIT %s :(Unknown prefix (%s) from %s)", | |
55abcbb2 | 547 | get_id(&me, client_p), lsender, |
212380e3 AC |
548 | lbuffer, client_p->name); |
549 | } | |
d45f5ea2 JT |
550 | else if(!IsDigit(lsender[0])) |
551 | ; | |
552 | else if(slen != 9) | |
553 | sendto_realops_snomask(SNO_DEBUG, L_ALL, | |
554 | "Invalid prefix (%s) from %s", | |
555 | lbuffer, client_p->name); | |
556 | else | |
557 | { | |
558 | memcpy(sid, lsender, 3); | |
559 | sid[3] = '\0'; | |
560 | server = find_server(NULL, sid); | |
561 | if (server != NULL && server->from == client_p) | |
55abcbb2 | 562 | sendto_one(client_p, ":%s KILL %s :%s (Unknown Client)", |
d45f5ea2 JT |
563 | get_id(&me, client_p), lsender, me.name); |
564 | } | |
212380e3 AC |
565 | } |
566 | ||
567 | ||
568 | ||
569 | /* | |
570 | * | |
571 | * parc number of arguments ('sender' counted as one!) | |
212380e3 AC |
572 | * parv[1]..parv[parc-1] |
573 | * pointers to additional parameters, this is a NULL | |
574 | * terminated list (parv[parc] == NULL). | |
575 | * | |
576 | * *WARNING* | |
577 | * Numerics are mostly error reports. If there is something | |
578 | * wrong with the message, just *DROP* it! Don't even think of | |
579 | * sending back a neat error message -- big danger of creating | |
580 | * a ping pong error message... | |
581 | */ | |
582 | static void | |
583 | do_numeric(char numeric[], struct Client *client_p, struct Client *source_p, int parc, char *parv[]) | |
584 | { | |
585 | struct Client *target_p; | |
586 | struct Channel *chptr; | |
587 | ||
588 | if(parc < 2 || !IsServer(source_p)) | |
589 | return; | |
590 | ||
591 | /* Remap low number numerics. */ | |
592 | if(numeric[0] == '0') | |
593 | numeric[0] = '1'; | |
594 | ||
595 | /* | |
596 | * Prepare the parameter portion of the message into 'buffer'. | |
597 | * (Because the buffer is twice as large as the message buffer | |
598 | * for the socket, no overflow can occur here... ...on current | |
599 | * assumptions--bets are off, if these are changed --msa) | |
600 | * Note: if buffer is non-empty, it will begin with SPACE. | |
601 | */ | |
602 | if(parc > 1) | |
603 | { | |
604 | char *t = buffer; /* Current position within the buffer */ | |
605 | int i; | |
606 | int tl; /* current length of presently being built string in t */ | |
607 | for (i = 2; i < (parc - 1); i++) | |
608 | { | |
b2f0da88 | 609 | tl = rb_sprintf(t, " %s", parv[i]); |
212380e3 AC |
610 | t += tl; |
611 | } | |
b2f0da88 | 612 | rb_sprintf(t, " :%s", parv[parc - 1]); |
212380e3 AC |
613 | } |
614 | ||
615 | if((target_p = find_client(parv[1])) != NULL) | |
616 | { | |
617 | if(IsMe(target_p)) | |
618 | { | |
619 | /* | |
620 | * We shouldn't get numerics sent to us, | |
621 | * any numerics we do get indicate a bug somewhere.. | |
622 | */ | |
623 | /* ugh. this is here because of nick collisions. when two servers | |
624 | * relink, they burst each other their nicks, then perform collides. | |
625 | * if there is a nick collision, BOTH servers will kill their own | |
626 | * nicks, and BOTH will kill the other servers nick, which wont exist, | |
627 | * because it will have been already killed by the local server. | |
628 | * | |
629 | * unfortunately, as we cant guarantee other servers will do the | |
55abcbb2 | 630 | * "right thing" on a nick collision, we have to keep both kills. |
212380e3 AC |
631 | * ergo we need to ignore ERR_NOSUCHNICK. --fl_ |
632 | */ | |
633 | /* quick comment. This _was_ tried. i.e. assume the other servers | |
634 | * will do the "right thing" and kill a nick that is colliding. | |
635 | * unfortunately, it did not work. --Dianora | |
636 | */ | |
637 | /* note, now we send PING on server connect, we can | |
638 | * also get ERR_NOSUCHSERVER.. | |
639 | */ | |
640 | if(atoi(numeric) != ERR_NOSUCHNICK && | |
641 | atoi(numeric) != ERR_NOSUCHSERVER) | |
642 | sendto_realops_snomask(SNO_GENERAL, L_ADMIN, | |
643 | "*** %s(via %s) sent a %s numeric to me: %s", | |
644 | source_p->name, | |
645 | client_p->name, numeric, buffer); | |
646 | return; | |
647 | } | |
648 | else if(target_p->from == client_p) | |
649 | { | |
650 | /* This message changed direction (nick collision?) | |
651 | * ignore it. | |
652 | */ | |
653 | return; | |
654 | } | |
655 | ||
656 | /* csircd will send out unknown umode flag for +a (admin), drop it here. */ | |
657 | if((atoi(numeric) == ERR_UMODEUNKNOWNFLAG) && MyClient(target_p)) | |
658 | return; | |
659 | ||
660 | /* Fake it for server hiding, if its our client */ | |
55abcbb2 KB |
661 | sendto_one(target_p, ":%s %s %s%s", |
662 | get_id(source_p, target_p), numeric, | |
212380e3 AC |
663 | get_id(target_p, target_p), buffer); |
664 | return; | |
665 | } | |
666 | else if((chptr = find_channel(parv[1])) != NULL) | |
06b697a2 JT |
667 | sendto_channel_flags(client_p, ALL_MEMBERS, source_p, chptr, |
668 | "%s %s%s", | |
669 | numeric, chptr->chname, buffer); | |
212380e3 AC |
670 | } |
671 | ||
672 | static void do_alias(struct alias_entry *aptr, struct Client *source_p, char *text) | |
673 | { | |
674 | char *p; | |
675 | struct Client *target_p; | |
676 | ||
677 | if (!IsFloodDone(source_p) && source_p->localClient->receiveM > 20) | |
678 | flood_endgrace(source_p); | |
679 | ||
680 | p = strchr(aptr->target, '@'); | |
681 | if (p != NULL) | |
682 | { | |
683 | /* user@server */ | |
684 | target_p = find_server(NULL, p + 1); | |
685 | if (target_p != NULL && IsMe(target_p)) | |
686 | target_p = NULL; | |
687 | } | |
688 | else | |
689 | { | |
690 | /* nick, must be +S */ | |
691 | target_p = find_named_person(aptr->target); | |
692 | if (target_p != NULL && !IsService(target_p)) | |
693 | target_p = NULL; | |
694 | } | |
695 | ||
696 | if (target_p == NULL) | |
697 | { | |
698 | sendto_one_numeric(source_p, ERR_SERVICESDOWN, form_str(ERR_SERVICESDOWN), aptr->target); | |
699 | return; | |
700 | } | |
701 | ||
702 | if (text != NULL && *text == ':') | |
703 | text++; | |
704 | if (text == NULL || *text == '\0') | |
705 | { | |
706 | sendto_one(source_p, form_str(ERR_NOTEXTTOSEND), me.name, source_p->name); | |
707 | return; | |
708 | } | |
709 | ||
710 | /* increment the hitcounter on this alias */ | |
711 | aptr->hits++; | |
712 | ||
713 | sendto_one(target_p, ":%s PRIVMSG %s :%s", | |
714 | get_id(source_p, target_p), | |
715 | p != NULL ? aptr->target : get_id(target_p, target_p), | |
716 | text); | |
717 | } | |
718 | ||
719 | int | |
720 | m_not_oper(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) | |
721 | { | |
722 | sendto_one_numeric(source_p, ERR_NOPRIVILEGES, form_str(ERR_NOPRIVILEGES)); | |
723 | return 0; | |
724 | } | |
725 | ||
726 | int | |
727 | m_unregistered(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) | |
728 | { | |
729 | /* bit of a hack. | |
730 | * I don't =really= want to waste a bit in a flag | |
731 | * number_of_nick_changes is only really valid after the client | |
732 | * is fully registered.. | |
733 | */ | |
734 | if(client_p->localClient->number_of_nick_changes == 0) | |
735 | { | |
736 | sendto_one(client_p, form_str(ERR_NOTREGISTERED), me.name); | |
737 | client_p->localClient->number_of_nick_changes++; | |
738 | } | |
739 | ||
740 | return 0; | |
741 | } | |
742 | ||
743 | int | |
744 | m_registered(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) | |
745 | { | |
746 | sendto_one(client_p, form_str(ERR_ALREADYREGISTRED), me.name, source_p->name); | |
747 | return 0; | |
748 | } | |
749 | ||
750 | int | |
751 | m_ignore(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) | |
752 | { | |
753 | return 0; | |
754 | } |