]> jfr.im git - solanum.git/blame - ircd/s_newconf.c
ssld: avoid clang static analysis warning
[solanum.git] / ircd / s_newconf.c
CommitLineData
212380e3
AC
1/*
2 * ircd-ratbox: an advanced Internet Relay Chat Daemon(ircd).
3 * s_newconf.c - code for dealing with conf stuff
4 *
5 * Copyright (C) 2004 Lee Hardy <lee@leeh.co.uk>
6 * Copyright (C) 2004-2005 ircd-ratbox development team
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
10 * met:
11 *
12 * 1.Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
14 * 2.Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3.The name of the author may not be used to endorse or promote products
18 * derived from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
21 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
22 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
23 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
24 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
26 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
28 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
29 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
212380e3
AC
31 */
32
33#include "stdinc.h"
34#include "ircd_defs.h"
212380e3
AC
35#include "s_conf.h"
36#include "s_newconf.h"
212380e3 37#include "client.h"
212380e3
AC
38#include "s_serv.h"
39#include "send.h"
40#include "hostmask.h"
41#include "newconf.h"
42#include "hash.h"
a4bf26dd
EM
43#include "rb_dictionary.h"
44#include "rb_radixtree.h"
77d3d2db
KB
45#include "s_assert.h"
46#include "logger.h"
1d02144f 47#include "dns.h"
212380e3 48
330fc5c1
AC
49rb_dlink_list shared_conf_list;
50rb_dlink_list cluster_conf_list;
51rb_dlink_list oper_conf_list;
52rb_dlink_list hubleaf_conf_list;
53rb_dlink_list server_conf_list;
54rb_dlink_list xline_conf_list;
55rb_dlink_list resv_conf_list; /* nicks only! */
56rb_dlink_list nd_list; /* nick delay */
57rb_dlink_list tgchange_list;
212380e3 58
7018b86a 59rb_patricia_tree_t *tgchange_tree;
212380e3 60
398b6a73 61static rb_bh *nd_heap = NULL;
212380e3
AC
62
63static void expire_temp_rxlines(void *unused);
64static void expire_nd_entries(void *unused);
65
e410dcf5
AC
66struct ev_entry *expire_nd_entries_ev = NULL;
67struct ev_entry *expire_temp_rxlines_ev = NULL;
68
212380e3
AC
69void
70init_s_newconf(void)
71{
e410dcf5
AC
72 tgchange_tree = rb_new_patricia(PATRICIA_BITS);
73 nd_heap = rb_bh_create(sizeof(struct nd_entry), ND_HEAP_SIZE, "nd_heap");
74 expire_nd_entries_ev = rb_event_addish("expire_nd_entries", expire_nd_entries, NULL, 30);
75 expire_temp_rxlines_ev = rb_event_addish("expire_temp_rxlines", expire_temp_rxlines, NULL, 60);
212380e3
AC
76}
77
78void
79clear_s_newconf(void)
80{
81 struct server_conf *server_p;
330fc5c1 82 rb_dlink_node *ptr;
637c4932 83 rb_dlink_node *next_ptr;
212380e3 84
637c4932 85 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, shared_conf_list.head)
212380e3
AC
86 {
87 /* ptr here is ptr->data->node */
330fc5c1 88 rb_dlinkDelete(ptr, &shared_conf_list);
212380e3
AC
89 free_remote_conf(ptr->data);
90 }
91
637c4932 92 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, cluster_conf_list.head)
212380e3 93 {
330fc5c1 94 rb_dlinkDelete(ptr, &cluster_conf_list);
212380e3
AC
95 free_remote_conf(ptr->data);
96 }
97
637c4932 98 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, hubleaf_conf_list.head)
212380e3 99 {
330fc5c1 100 rb_dlinkDelete(ptr, &hubleaf_conf_list);
212380e3
AC
101 free_remote_conf(ptr->data);
102 }
103
637c4932 104 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, oper_conf_list.head)
212380e3
AC
105 {
106 free_oper_conf(ptr->data);
330fc5c1 107 rb_dlinkDestroy(ptr, &oper_conf_list);
212380e3
AC
108 }
109
637c4932 110 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, server_conf_list.head)
212380e3
AC
111 {
112 server_p = ptr->data;
113
114 if(!server_p->servers)
115 {
330fc5c1 116 rb_dlinkDelete(ptr, &server_conf_list);
212380e3
AC
117 free_server_conf(ptr->data);
118 }
119 else
120 server_p->flags |= SERVER_ILLEGAL;
121 }
122}
123
124void
125clear_s_newconf_bans(void)
126{
127 struct ConfItem *aconf;
637c4932 128 rb_dlink_node *ptr, *next_ptr;
212380e3 129
637c4932 130 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
212380e3
AC
131 {
132 aconf = ptr->data;
133
134 if(aconf->hold)
135 continue;
136
137 free_conf(aconf);
330fc5c1 138 rb_dlinkDestroy(ptr, &xline_conf_list);
212380e3
AC
139 }
140
637c4932 141 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
212380e3
AC
142 {
143 aconf = ptr->data;
144
145 /* temporary resv */
146 if(aconf->hold)
147 continue;
148
149 free_conf(aconf);
330fc5c1 150 rb_dlinkDestroy(ptr, &resv_conf_list);
212380e3
AC
151 }
152
153 clear_resv_hash();
154}
155
156struct remote_conf *
157make_remote_conf(void)
158{
eddc2ab6 159 struct remote_conf *remote_p = rb_malloc(sizeof(struct remote_conf));
212380e3
AC
160 return remote_p;
161}
162
163void
164free_remote_conf(struct remote_conf *remote_p)
165{
166 s_assert(remote_p != NULL);
167 if(remote_p == NULL)
168 return;
169
637c4932
VY
170 rb_free(remote_p->username);
171 rb_free(remote_p->host);
172 rb_free(remote_p->server);
173 rb_free(remote_p);
212380e3
AC
174}
175
bd43a444 176bool
55abcbb2 177find_shared_conf(const char *username, const char *host,
212380e3
AC
178 const char *server, int flags)
179{
180 struct remote_conf *shared_p;
330fc5c1 181 rb_dlink_node *ptr;
212380e3 182
5cefa1d6 183 RB_DLINK_FOREACH(ptr, shared_conf_list.head)
212380e3
AC
184 {
185 shared_p = ptr->data;
186
187 if(match(shared_p->username, username) &&
188 match(shared_p->host, host) &&
189 match(shared_p->server, server))
190 {
191 if(shared_p->flags & flags)
bd43a444 192 return true;
212380e3 193 else
bd43a444 194 return false;
212380e3
AC
195 }
196 }
197
ab31d2b0 198 return false;
212380e3
AC
199}
200
201void
202propagate_generic(struct Client *source_p, const char *command,
203 const char *target, int cap, const char *format, ...)
204{
205 char buffer[BUFSIZE];
206 va_list args;
207
208 va_start(args, format);
5203cba5 209 vsnprintf(buffer, sizeof(buffer), format, args);
212380e3
AC
210 va_end(args);
211
212 sendto_match_servs(source_p, target, cap, NOCAPS,
213 "%s %s %s",
214 command, target, buffer);
215 sendto_match_servs(source_p, target, CAP_ENCAP, cap,
216 "ENCAP %s %s %s",
217 target, command, buffer);
218}
55abcbb2 219
212380e3
AC
220void
221cluster_generic(struct Client *source_p, const char *command,
222 int cltype, int cap, const char *format, ...)
223{
224 char buffer[BUFSIZE];
225 struct remote_conf *shared_p;
226 va_list args;
330fc5c1 227 rb_dlink_node *ptr;
212380e3
AC
228
229 va_start(args, format);
5203cba5 230 vsnprintf(buffer, sizeof(buffer), format, args);
212380e3
AC
231 va_end(args);
232
5cefa1d6 233 RB_DLINK_FOREACH(ptr, cluster_conf_list.head)
212380e3
AC
234 {
235 shared_p = ptr->data;
236
237 if(!(shared_p->flags & cltype))
238 continue;
239
240 sendto_match_servs(source_p, shared_p->server, cap, NOCAPS,
241 "%s %s %s",
242 command, shared_p->server, buffer);
243 sendto_match_servs(source_p, shared_p->server, CAP_ENCAP, cap,
244 "ENCAP %s %s %s",
245 shared_p->server, command, buffer);
246 }
247}
248
249struct oper_conf *
250make_oper_conf(void)
251{
eddc2ab6 252 struct oper_conf *oper_p = rb_malloc(sizeof(struct oper_conf));
212380e3
AC
253 return oper_p;
254}
255
256void
257free_oper_conf(struct oper_conf *oper_p)
258{
259 s_assert(oper_p != NULL);
260 if(oper_p == NULL)
261 return;
262
637c4932
VY
263 rb_free(oper_p->username);
264 rb_free(oper_p->host);
265 rb_free(oper_p->name);
462ae9d7 266 rb_free(oper_p->certfp);
212380e3
AC
267
268 if(oper_p->passwd)
269 {
270 memset(oper_p->passwd, 0, strlen(oper_p->passwd));
637c4932 271 rb_free(oper_p->passwd);
212380e3
AC
272 }
273
274#ifdef HAVE_LIBCRYPTO
637c4932 275 rb_free(oper_p->rsa_pubkey_file);
212380e3
AC
276
277 if(oper_p->rsa_pubkey)
278 RSA_free(oper_p->rsa_pubkey);
279#endif
280
637c4932 281 rb_free(oper_p);
212380e3
AC
282}
283
284struct oper_conf *
285find_oper_conf(const char *username, const char *host, const char *locip, const char *name)
286{
287 struct oper_conf *oper_p;
e7046ee5 288 struct rb_sockaddr_storage ip, cip;
212380e3
AC
289 char addr[HOSTLEN+1];
290 int bits, cbits;
330fc5c1 291 rb_dlink_node *ptr;
212380e3 292
29c92cf9 293 parse_netmask(locip, &cip, &cbits);
212380e3 294
5cefa1d6 295 RB_DLINK_FOREACH(ptr, oper_conf_list.head)
212380e3
AC
296 {
297 oper_p = ptr->data;
298
299 /* name/username doesnt match.. */
300 if(irccmp(oper_p->name, name) || !match(oper_p->username, username))
301 continue;
302
f427c8b0 303 rb_strlcpy(addr, oper_p->host, sizeof(addr));
212380e3 304
29c92cf9 305 if(parse_netmask(addr, &ip, &bits) != HM_HOST)
212380e3 306 {
e867208d 307 if(GET_SS_FAMILY(&ip) == GET_SS_FAMILY(&cip) &&
212380e3
AC
308 comp_with_mask_sock((struct sockaddr *)&ip, (struct sockaddr *)&cip, bits))
309 return oper_p;
310 }
311
312 /* we have to compare against the host as well, because its
313 * valid to set a spoof to an IP, which if we only compare
314 * in ip form to sockhost will not necessarily match --anfl
315 */
316 if(match(oper_p->host, host))
317 return oper_p;
318 }
319
320 return NULL;
321}
322
212380e3
AC
323struct server_conf *
324make_server_conf(void)
325{
eddc2ab6 326 struct server_conf *server_p = rb_malloc(sizeof(struct server_conf));
d4214e94
SA
327
328 SET_SS_FAMILY(&server_p->connect4, AF_UNSPEC);
329 SET_SS_LEN(&server_p->connect4, sizeof(struct sockaddr_in));
330
331 SET_SS_FAMILY(&server_p->bind4, AF_UNSPEC);
332 SET_SS_LEN(&server_p->bind4, sizeof(struct sockaddr_in));
333
334#ifdef RB_IPV6
335 SET_SS_FAMILY(&server_p->connect6, AF_UNSPEC);
336 SET_SS_LEN(&server_p->connect6, sizeof(struct sockaddr_in6));
337
338 SET_SS_FAMILY(&server_p->bind6, AF_UNSPEC);
339 SET_SS_LEN(&server_p->bind6, sizeof(struct sockaddr_in6));
340#endif
341
342 server_p->aftype = AF_UNSPEC;
343
e4a7cf9f 344 return server_p;
212380e3
AC
345}
346
347void
348free_server_conf(struct server_conf *server_p)
349{
350 s_assert(server_p != NULL);
351 if(server_p == NULL)
352 return;
353
354 if(!EmptyString(server_p->passwd))
355 {
356 memset(server_p->passwd, 0, strlen(server_p->passwd));
637c4932 357 rb_free(server_p->passwd);
212380e3
AC
358 }
359
360 if(!EmptyString(server_p->spasswd))
361 {
362 memset(server_p->spasswd, 0, strlen(server_p->spasswd));
637c4932 363 rb_free(server_p->spasswd);
212380e3
AC
364 }
365
637c4932 366 rb_free(server_p->name);
d4214e94
SA
367 rb_free(server_p->connect_host);
368 rb_free(server_p->bind_host);
637c4932 369 rb_free(server_p->class_name);
1c4f9748 370 rb_free(server_p->certfp);
637c4932 371 rb_free(server_p);
212380e3
AC
372}
373
1d02144f 374/*
d4214e94
SA
375 * conf_connect_dns_callback
376 * inputs - pointer to struct ConfItem
377 * - pointer to adns reply
378 * output - none
379 * side effects - called when resolver query finishes
380 * if the query resulted in a successful search, hp will contain
381 * a non-null pointer, otherwise hp will be null.
382 * if successful save hp in the conf item it was called with
383 */
384static void
385conf_connect_dns_callback(const char *result, int status, int aftype, void *data)
386{
387 struct server_conf *server_p = data;
388
389 if(aftype == AF_INET)
390 {
391 if(status == 1)
392 rb_inet_pton_sock(result, (struct sockaddr *)&server_p->connect4);
393
394 server_p->dns_query_connect4 = 0;
395 }
396#ifdef RB_IPV6
397 else if(aftype == AF_INET6)
398 {
399 if(status == 1)
400 rb_inet_pton_sock(result, (struct sockaddr *)&server_p->connect6);
401
402 server_p->dns_query_connect6 = 0;
403 }
404#endif
405}
406
407/*
408 * conf_bind_dns_callback
1d02144f
AC
409 * inputs - pointer to struct ConfItem
410 * - pointer to adns reply
411 * output - none
412 * side effects - called when resolver query finishes
413 * if the query resulted in a successful search, hp will contain
414 * a non-null pointer, otherwise hp will be null.
415 * if successful save hp in the conf item it was called with
416 */
417static void
d4214e94 418conf_bind_dns_callback(const char *result, int status, int aftype, void *data)
1d02144f
AC
419{
420 struct server_conf *server_p = data;
421
d4214e94
SA
422 if(aftype == AF_INET)
423 {
424 if(status == 1)
425 rb_inet_pton_sock(result, (struct sockaddr *)&server_p->bind4);
1d02144f 426
d4214e94
SA
427 server_p->dns_query_bind4 = 0;
428 }
429#ifdef RB_IPV6
430 else if(aftype == AF_INET6)
431 {
432 if(status == 1)
433 rb_inet_pton_sock(result, (struct sockaddr *)&server_p->bind6);
434
435 server_p->dns_query_bind6 = 0;
436 }
437#endif
1d02144f
AC
438}
439
212380e3
AC
440void
441add_server_conf(struct server_conf *server_p)
442{
443 if(EmptyString(server_p->class_name))
444 {
47a03750 445 server_p->class_name = rb_strdup("default");
212380e3
AC
446 server_p->class = default_class;
447 return;
448 }
449
450 server_p->class = find_class(server_p->class_name);
451
452 if(server_p->class == default_class)
453 {
454 conf_report_error("Warning connect::class invalid for %s",
455 server_p->name);
456
637c4932 457 rb_free(server_p->class_name);
47a03750 458 server_p->class_name = rb_strdup("default");
212380e3
AC
459 }
460
d4214e94
SA
461 if(server_p->connect_host && !strpbrk(server_p->connect_host, "*?"))
462 {
463 server_p->dns_query_connect4 =
464 lookup_hostname(server_p->connect_host, AF_INET, conf_connect_dns_callback, server_p);
465#ifdef RB_IPV6
466 server_p->dns_query_connect6 =
467 lookup_hostname(server_p->connect_host, AF_INET6, conf_connect_dns_callback, server_p);
468#endif
469 }
1d02144f 470
d4214e94
SA
471 if(server_p->bind_host)
472 {
473 server_p->dns_query_bind4 =
474 lookup_hostname(server_p->bind_host, AF_INET, conf_bind_dns_callback, server_p);
475#ifdef RB_IPV6
476 server_p->dns_query_bind6 =
477 lookup_hostname(server_p->bind_host, AF_INET6, conf_bind_dns_callback, server_p);
478#endif
479 }
212380e3
AC
480}
481
482struct server_conf *
483find_server_conf(const char *name)
484{
485 struct server_conf *server_p;
330fc5c1 486 rb_dlink_node *ptr;
212380e3 487
5cefa1d6 488 RB_DLINK_FOREACH(ptr, server_conf_list.head)
212380e3
AC
489 {
490 server_p = ptr->data;
491
492 if(ServerConfIllegal(server_p))
493 continue;
494
495 if(match(name, server_p->name))
496 return server_p;
497 }
498
499 return NULL;
500}
501
502void
503attach_server_conf(struct Client *client_p, struct server_conf *server_p)
504{
505 /* already have an attached conf */
506 if(client_p->localClient->att_sconf)
507 {
508 /* short circuit this special case :) */
509 if(client_p->localClient->att_sconf == server_p)
510 return;
511
512 detach_server_conf(client_p);
513 }
514
515 CurrUsers(server_p->class)++;
516
517 client_p->localClient->att_sconf = server_p;
518 server_p->servers++;
519}
520
521void
522detach_server_conf(struct Client *client_p)
523{
524 struct server_conf *server_p = client_p->localClient->att_sconf;
525
526 if(server_p == NULL)
527 return;
528
529 client_p->localClient->att_sconf = NULL;
530 server_p->servers--;
531 CurrUsers(server_p->class)--;
532
533 if(ServerConfIllegal(server_p) && !server_p->servers)
534 {
535 /* the class this one is using may need destroying too */
536 if(MaxUsers(server_p->class) < 0 && CurrUsers(server_p->class) <= 0)
537 free_class(server_p->class);
538
330fc5c1 539 rb_dlinkDelete(&server_p->node, &server_conf_list);
212380e3
AC
540 free_server_conf(server_p);
541 }
542}
543
544void
a3143c9b 545set_server_conf_autoconn(struct Client *source_p, const char *name, int newval)
212380e3
AC
546{
547 struct server_conf *server_p;
548
549 if((server_p = find_server_conf(name)) != NULL)
550 {
551 if(newval)
552 server_p->flags |= SERVER_AUTOCONN;
553 else
554 server_p->flags &= ~SERVER_AUTOCONN;
555
556 sendto_realops_snomask(SNO_GENERAL, L_ALL,
557 "%s has changed AUTOCONN for %s to %i",
558 get_oper_name(source_p), name, newval);
559 }
560 else
5366977b 561 sendto_one_notice(source_p, ":Can't find %s", name);
212380e3
AC
562}
563
53307da8
JT
564void
565disable_server_conf_autoconn(const char *name)
566{
567 struct server_conf *server_p;
568
569 server_p = find_server_conf(name);
570 if(server_p != NULL && server_p->flags & SERVER_AUTOCONN)
571 {
572 server_p->flags &= ~SERVER_AUTOCONN;
573
574 sendto_realops_snomask(SNO_GENERAL, L_ALL,
575 "Disabling AUTOCONN for %s because of error",
576 name);
577 ilog(L_SERVER, "Disabling AUTOCONN for %s because of error",
578 name);
579 }
580}
581
212380e3
AC
582struct ConfItem *
583find_xline(const char *gecos, int counter)
584{
585 struct ConfItem *aconf;
330fc5c1 586 rb_dlink_node *ptr;
212380e3 587
5cefa1d6 588 RB_DLINK_FOREACH(ptr, xline_conf_list.head)
212380e3
AC
589 {
590 aconf = ptr->data;
591
70ea02eb 592 if(match_esc(aconf->host, gecos))
212380e3
AC
593 {
594 if(counter)
595 aconf->port++;
596 return aconf;
597 }
598 }
599
600 return NULL;
601}
602
0fdb2570
JT
603struct ConfItem *
604find_xline_mask(const char *gecos)
605{
606 struct ConfItem *aconf;
330fc5c1 607 rb_dlink_node *ptr;
0fdb2570 608
5cefa1d6 609 RB_DLINK_FOREACH(ptr, xline_conf_list.head)
0fdb2570
JT
610 {
611 aconf = ptr->data;
612
70ea02eb 613 if(!irccmp(aconf->host, gecos))
0fdb2570
JT
614 return aconf;
615 }
616
617 return NULL;
618}
619
212380e3
AC
620struct ConfItem *
621find_nick_resv(const char *name)
622{
623 struct ConfItem *aconf;
330fc5c1 624 rb_dlink_node *ptr;
212380e3 625
5cefa1d6 626 RB_DLINK_FOREACH(ptr, resv_conf_list.head)
212380e3
AC
627 {
628 aconf = ptr->data;
629
70ea02eb 630 if(match_esc(aconf->host, name))
212380e3
AC
631 {
632 aconf->port++;
633 return aconf;
634 }
635 }
636
637 return NULL;
638}
639
0fdb2570
JT
640struct ConfItem *
641find_nick_resv_mask(const char *name)
642{
643 struct ConfItem *aconf;
330fc5c1 644 rb_dlink_node *ptr;
0fdb2570 645
5cefa1d6 646 RB_DLINK_FOREACH(ptr, resv_conf_list.head)
0fdb2570
JT
647 {
648 aconf = ptr->data;
649
70ea02eb 650 if(!irccmp(aconf->host, name))
0fdb2570
JT
651 return aconf;
652 }
653
654 return NULL;
655}
656
212380e3
AC
657/* clean_resv_nick()
658 *
659 * inputs - nick
660 * outputs - 1 if nick is vaild resv, 0 otherwise
661 * side effects -
662 */
663int
664clean_resv_nick(const char *nick)
665{
666 char tmpch;
667 int as = 0;
668 int q = 0;
669 int ch = 0;
670
671 if(*nick == '-' || IsDigit(*nick))
672 return 0;
673
674 while ((tmpch = *nick++))
675 {
676 if(tmpch == '?' || tmpch == '@' || tmpch == '#')
677 q++;
678 else if(tmpch == '*')
679 as++;
680 else if(IsNickChar(tmpch))
681 ch++;
682 else
683 return 0;
684 }
685
686 if(!ch && as)
687 return 0;
688
689 return 1;
690}
691
692/* valid_wild_card_simple()
693 *
694 * inputs - "thing" to test
695 * outputs - 1 if enough wildcards, else 0
696 * side effects -
697 */
698int
699valid_wild_card_simple(const char *data)
700{
701 const char *p;
702 char tmpch;
703 int nonwild = 0;
7d08aa89 704 int wild = 0;
212380e3
AC
705
706 /* check the string for minimum number of nonwildcard chars */
707 p = data;
708
709 while((tmpch = *p++))
710 {
711 /* found an escape, p points to the char after it, so skip
712 * that and move on.
713 */
7d08aa89 714 if(tmpch == '\\' && *p)
212380e3
AC
715 {
716 p++;
7d08aa89
JT
717 if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
718 return 1;
212380e3
AC
719 }
720 else if(!IsMWildChar(tmpch))
721 {
722 /* if we have enough nonwildchars, return */
723 if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
724 return 1;
725 }
7d08aa89
JT
726 else
727 wild++;
212380e3
AC
728 }
729
7d08aa89
JT
730 /* strings without wilds are also ok */
731 return wild == 0;
212380e3
AC
732}
733
734time_t
735valid_temp_time(const char *p)
736{
737 time_t result = 0;
738
739 while(*p)
740 {
741 if(IsDigit(*p))
742 {
743 result *= 10;
744 result += ((*p) & 0xF);
745 p++;
746 }
747 else
748 return -1;
749 }
750
751 if(result > (60 * 24 * 7 * 52))
752 result = (60 * 24 * 7 * 52);
753
754 return(result * 60);
755}
756
9197bc35 757/* Propagated bans are expired elsewhere. */
212380e3
AC
758static void
759expire_temp_rxlines(void *unused)
760{
761 struct ConfItem *aconf;
330fc5c1 762 rb_dlink_node *ptr;
637c4932 763 rb_dlink_node *next_ptr;
2fc6772e 764 rb_radixtree_iteration_state state;
212380e3 765
a4bf26dd 766 RB_RADIXTREE_FOREACH(aconf, &state, resv_tree)
212380e3 767 {
9197bc35
JT
768 if(aconf->lifetime != 0)
769 continue;
e3354945 770 if(aconf->hold && aconf->hold <= rb_current_time())
212380e3
AC
771 {
772 if(ConfigFileEntry.tkline_expire_notices)
773 sendto_realops_snomask(SNO_GENERAL, L_ALL,
774 "Temporary RESV for [%s] expired",
70ea02eb 775 aconf->host);
212380e3 776
a4bf26dd 777 rb_radixtree_delete(resv_tree, aconf->host);
212380e3 778 free_conf(aconf);
212380e3
AC
779 }
780 }
212380e3 781
637c4932 782 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
212380e3
AC
783 {
784 aconf = ptr->data;
785
9197bc35
JT
786 if(aconf->lifetime != 0)
787 continue;
e3354945 788 if(aconf->hold && aconf->hold <= rb_current_time())
212380e3
AC
789 {
790 if(ConfigFileEntry.tkline_expire_notices)
791 sendto_realops_snomask(SNO_GENERAL, L_ALL,
792 "Temporary RESV for [%s] expired",
70ea02eb 793 aconf->host);
212380e3 794 free_conf(aconf);
330fc5c1 795 rb_dlinkDestroy(ptr, &resv_conf_list);
212380e3
AC
796 }
797 }
798
637c4932 799 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
212380e3
AC
800 {
801 aconf = ptr->data;
802
9197bc35
JT
803 if(aconf->lifetime != 0)
804 continue;
e3354945 805 if(aconf->hold && aconf->hold <= rb_current_time())
212380e3
AC
806 {
807 if(ConfigFileEntry.tkline_expire_notices)
808 sendto_realops_snomask(SNO_GENERAL, L_ALL,
809 "Temporary X-line for [%s] expired",
70ea02eb 810 aconf->host);
212380e3 811 free_conf(aconf);
330fc5c1 812 rb_dlinkDestroy(ptr, &xline_conf_list);
212380e3
AC
813 }
814 }
815}
816
817unsigned long
818get_nd_count(void)
819{
330fc5c1 820 return(rb_dlink_list_length(&nd_list));
212380e3
AC
821}
822
212380e3
AC
823void
824add_nd_entry(const char *name)
825{
826 struct nd_entry *nd;
827
a4bf26dd 828 if(rb_dictionary_find(nd_dict, name) != NULL)
212380e3
AC
829 return;
830
398b6a73 831 nd = rb_bh_alloc(nd_heap);
55abcbb2 832
f427c8b0 833 rb_strlcpy(nd->name, name, sizeof(nd->name));
e3354945 834 nd->expire = rb_current_time() + ConfigFileEntry.nick_delay;
212380e3
AC
835
836 /* this list is ordered */
330fc5c1 837 rb_dlinkAddTail(nd, &nd->lnode, &nd_list);
b37021a4 838
a4bf26dd 839 rb_dictionary_add(nd_dict, nd->name, nd);
212380e3
AC
840}
841
842void
843free_nd_entry(struct nd_entry *nd)
844{
a4bf26dd 845 rb_dictionary_delete(nd_dict, nd->name);
b37021a4 846
330fc5c1 847 rb_dlinkDelete(&nd->lnode, &nd_list);
398b6a73 848 rb_bh_free(nd_heap, nd);
212380e3
AC
849}
850
851void
852expire_nd_entries(void *unused)
853{
854 struct nd_entry *nd;
330fc5c1 855 rb_dlink_node *ptr;
637c4932 856 rb_dlink_node *next_ptr;
212380e3 857
637c4932 858 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, nd_list.head)
212380e3
AC
859 {
860 nd = ptr->data;
861
862 /* this list is ordered - we can stop when we hit the first
863 * entry that doesnt expire..
864 */
e3354945 865 if(nd->expire > rb_current_time())
212380e3
AC
866 return;
867
868 free_nd_entry(nd);
869 }
870}
871
872void
873add_tgchange(const char *host)
874{
875 tgchange *target;
e410dcf5 876 rb_patricia_node_t *pnode;
212380e3
AC
877
878 if(find_tgchange(host))
879 return;
880
eddc2ab6 881 target = rb_malloc(sizeof(tgchange));
212380e3
AC
882 pnode = make_and_lookup(tgchange_tree, host);
883
884 pnode->data = target;
885 target->pnode = pnode;
886
47a03750 887 target->ip = rb_strdup(host);
e3354945 888 target->expiry = rb_current_time() + (60*60*12);
212380e3 889
330fc5c1 890 rb_dlinkAdd(target, &target->node, &tgchange_list);
212380e3
AC
891}
892
893tgchange *
894find_tgchange(const char *host)
895{
e410dcf5 896 rb_patricia_node_t *pnode;
212380e3 897
e410dcf5 898 if((pnode = rb_match_exact_string(tgchange_tree, host)))
212380e3
AC
899 return pnode->data;
900
901 return NULL;
902}