]>
Commit | Line | Data |
---|---|---|
212380e3 | 1 | /* |
6fce54ff | 2 | * charybdis: A slightly useful ircd. |
212380e3 AC |
3 | * ircd.c: Starts up and runs the ircd. |
4 | * | |
5 | * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center | |
6 | * Copyright (C) 1996-2002 Hybrid Development Team | |
6fce54ff VY |
7 | * Copyright (C) 2002-2008 ircd-ratbox development team |
8 | * Copyright (C) 2005-2008 charybdis development team | |
212380e3 AC |
9 | * |
10 | * This program is free software; you can redistribute it and/or modify | |
11 | * it under the terms of the GNU General Public License as published by | |
12 | * the Free Software Foundation; either version 2 of the License, or | |
13 | * (at your option) any later version. | |
14 | * | |
15 | * This program is distributed in the hope that it will be useful, | |
16 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
17 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
18 | * GNU General Public License for more details. | |
19 | * | |
20 | * You should have received a copy of the GNU General Public License | |
21 | * along with this program; if not, write to the Free Software | |
22 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 | |
23 | * USA | |
24 | * | |
6fce54ff | 25 | * $Id$ |
212380e3 AC |
26 | */ |
27 | ||
2af8c7ff | 28 | #include "ratbox_lib.h" |
212380e3 AC |
29 | #include "stdinc.h" |
30 | #include "setup.h" | |
31 | #include "config.h" | |
212380e3 AC |
32 | #include "ircd.h" |
33 | #include "channel.h" | |
34 | #include "class.h" | |
35 | #include "client.h" | |
36 | #include "common.h" | |
212380e3 | 37 | #include "hash.h" |
4562c604 | 38 | #include "match.h" |
212380e3 | 39 | #include "ircd_signal.h" |
212380e3 AC |
40 | #include "msg.h" /* msgtab */ |
41 | #include "hostmask.h" | |
42 | #include "numeric.h" | |
43 | #include "parse.h" | |
44 | #include "res.h" | |
45 | #include "restart.h" | |
46 | #include "s_auth.h" | |
212380e3 | 47 | #include "s_conf.h" |
4016731b | 48 | #include "logger.h" |
212380e3 AC |
49 | #include "s_serv.h" /* try_connections */ |
50 | #include "s_user.h" | |
51 | #include "s_stats.h" | |
52 | #include "scache.h" | |
53 | #include "send.h" | |
54 | #include "supported.h" | |
55 | #include "whowas.h" | |
56 | #include "modules.h" | |
212380e3 AC |
57 | #include "hook.h" |
58 | #include "ircd_getopt.h" | |
212380e3 | 59 | #include "newconf.h" |
212380e3 AC |
60 | #include "reject.h" |
61 | #include "s_conf.h" | |
62 | #include "s_newconf.h" | |
63 | #include "cache.h" | |
64 | #include "monitor.h" | |
212380e3 AC |
65 | #include "patchlevel.h" |
66 | #include "serno.h" | |
c6d72037 | 67 | #include "sslproc.h" |
efccc22c | 68 | #include "chmode.h" |
39a68b53 | 69 | #include "privilege.h" |
6eebc373 | 70 | #include "bandbi.h" |
212380e3 | 71 | |
8bd5767b | 72 | /* /quote set variables */ |
2af8c7ff | 73 | struct SetOptions GlobalSetOptions; |
8bd5767b JT |
74 | |
75 | /* configuration set from ircd.conf */ | |
76 | struct config_file_entry ConfigFileEntry; | |
77 | /* server info set from ircd.conf */ | |
78 | struct server_info ServerInfo; | |
79 | /* admin info set from ircd.conf */ | |
1aad9782 VY |
80 | struct admin_info AdminInfo; |
81 | ||
8bd5767b | 82 | struct Counter Count; |
47adde3d VY |
83 | struct ServerStatistics ServerStats; |
84 | ||
1aad9782 | 85 | int maxconnections; |
8bd5767b | 86 | struct Client me; /* That's me */ |
1aad9782 VY |
87 | struct LocalUser meLocalUser; /* That's also part of me */ |
88 | ||
3d3d1a95 | 89 | rb_dlink_list global_client_list; |
8bd5767b | 90 | |
3d3d1a95 | 91 | /* unknown/client pointer lists */ |
8bd5767b | 92 | rb_dlink_list unknown_list; /* unknown clients ON this server only */ |
3d3d1a95 | 93 | rb_dlink_list lclient_list; /* local clients only ON this server */ |
8bd5767b JT |
94 | rb_dlink_list serv_list; /* local servers to this server ONLY */ |
95 | rb_dlink_list global_serv_list; /* global servers on the network */ | |
96 | rb_dlink_list local_oper_list; /* our opers, duplicated in lclient_list */ | |
b5b84cad VY |
97 | rb_dlink_list oper_list; /* network opers */ |
98 | ||
8bd5767b | 99 | const char *logFileName = LPATH; |
b5b84cad VY |
100 | const char *pidFileName = PPATH; |
101 | ||
1aad9782 | 102 | char **myargv; |
8bd5767b JT |
103 | int dorehash = 0; |
104 | int dorehashbans = 0; | |
105 | int doremotd = 0; | |
106 | int kline_queued = 0; | |
107 | int server_state_foreground = 0; | |
108 | int opers_see_all_users = 0; | |
109 | int ssl_ok = 0; | |
110 | int zlib_ok = 1; | |
111 | ||
112 | int testing_conf = 0; | |
cd27d99c | 113 | time_t startup_time; |
8bd5767b | 114 | |
cd27d99c | 115 | int default_server_capabs = CAP_MASK; |
8bd5767b | 116 | |
cd27d99c VY |
117 | int splitmode; |
118 | int splitchecking; | |
119 | int split_users; | |
120 | int split_servers; | |
121 | int eob_count; | |
c6d72037 | 122 | |
fd5af3d0 VY |
123 | void |
124 | ircd_shutdown(const char *reason) | |
125 | { | |
126 | struct Client *target_p; | |
127 | rb_dlink_node *ptr; | |
128 | ||
129 | RB_DLINK_FOREACH(ptr, lclient_list.head) | |
130 | { | |
131 | target_p = ptr->data; | |
132 | ||
133 | sendto_one(target_p, ":%s NOTICE %s :Server Terminating. %s", | |
134 | me.name, target_p->name, reason); | |
135 | } | |
136 | ||
137 | RB_DLINK_FOREACH(ptr, serv_list.head) | |
138 | { | |
139 | target_p = ptr->data; | |
140 | ||
141 | sendto_one(target_p, ":%s ERROR :Terminated by %s", | |
142 | me.name, reason); | |
143 | } | |
144 | ||
145 | ilog(L_MAIN, "Server Terminating. %s", reason); | |
ea82a3ca | 146 | close_logfiles(); |
fd5af3d0 VY |
147 | |
148 | unlink(pidFileName); | |
149 | exit(0); | |
150 | } | |
151 | ||
212380e3 AC |
152 | /* |
153 | * print_startup - print startup information | |
154 | */ | |
155 | static void | |
156 | print_startup(int pid) | |
157 | { | |
158 | inotice("now running in %s mode from %s as pid %d ...", | |
159 | !server_state_foreground ? "background" : "foreground", | |
160 | ConfigFileEntry.dpath, pid); | |
161 | ||
162 | /* let the parent process know the initialization was successful | |
163 | * -- jilles */ | |
164 | if (!server_state_foreground) | |
165 | write(0, ".", 1); | |
166 | fclose(stdin); | |
167 | fclose(stdout); | |
168 | fclose(stderr); | |
169 | open("/dev/null", O_RDWR); | |
170 | dup2(0, 1); | |
171 | dup2(0, 2); | |
172 | } | |
173 | ||
212380e3 AC |
174 | /* |
175 | * init_sys | |
176 | * | |
177 | * inputs - boot_daemon flag | |
178 | * output - none | |
179 | * side effects - if boot_daemon flag is not set, don't daemonize | |
180 | */ | |
181 | static void | |
182 | init_sys(void) | |
183 | { | |
8bd5767b JT |
184 | #if defined(RLIMIT_NOFILE) && defined(HAVE_SYS_RESOURCE_H) |
185 | struct rlimit limit; | |
186 | ||
187 | if(!getrlimit(RLIMIT_NOFILE, &limit)) | |
188 | { | |
189 | maxconnections = limit.rlim_cur; | |
190 | if(maxconnections <= MAX_BUFFER) | |
191 | { | |
192 | fprintf(stderr, "ERROR: Shell FD limits are too low.\n"); | |
ec86417c | 193 | fprintf(stderr, "ERROR: charybdis reserves %d FDs, shell limits must be above this\n", MAX_BUFFER); |
8bd5767b JT |
194 | exit(EXIT_FAILURE); |
195 | } | |
196 | return; | |
197 | } | |
198 | #endif /* RLIMIT_FD_MAX */ | |
101db4c4 | 199 | maxconnections = MAXCONNECTIONS; |
212380e3 AC |
200 | } |
201 | ||
202 | static int | |
203 | make_daemon(void) | |
204 | { | |
205 | int pid; | |
206 | int pip[2]; | |
207 | char c; | |
208 | ||
209 | if (pipe(pip) < 0) | |
210 | { | |
211 | perror("pipe"); | |
212 | exit(EXIT_FAILURE); | |
213 | } | |
214 | dup2(pip[1], 0); | |
215 | close(pip[1]); | |
216 | if((pid = fork()) < 0) | |
217 | { | |
218 | perror("fork"); | |
219 | exit(EXIT_FAILURE); | |
220 | } | |
221 | else if(pid > 0) | |
222 | { | |
223 | close(0); | |
224 | /* Wait for initialization to finish, successfully or | |
225 | * unsuccessfully. Until this point the child may still | |
226 | * write to stdout/stderr. | |
227 | * -- jilles */ | |
228 | if (read(pip[0], &c, 1) > 0) | |
229 | exit(EXIT_SUCCESS); | |
230 | else | |
231 | exit(EXIT_FAILURE); | |
232 | } | |
233 | ||
234 | close(pip[0]); | |
235 | setsid(); | |
236 | /* fclose(stdin); | |
237 | fclose(stdout); | |
238 | fclose(stderr); */ | |
239 | ||
240 | return 0; | |
241 | } | |
242 | ||
243 | static int printVersion = 0; | |
244 | ||
245 | struct lgetopt myopts[] = { | |
212380e3 AC |
246 | {"configfile", &ConfigFileEntry.configfile, |
247 | STRING, "File to use for ircd.conf"}, | |
212380e3 AC |
248 | {"logfile", &logFileName, |
249 | STRING, "File to use for ircd.log"}, | |
250 | {"pidfile", &pidFileName, | |
251 | STRING, "File to use for process ID"}, | |
252 | {"foreground", &server_state_foreground, | |
253 | YESNO, "Run in foreground (don't detach)"}, | |
254 | {"version", &printVersion, | |
255 | YESNO, "Print version and exit"}, | |
256 | {"conftest", &testing_conf, | |
257 | YESNO, "Test the configuration files and exit"}, | |
258 | {"help", NULL, USAGE, "Print this text"}, | |
259 | {NULL, NULL, STRING, NULL}, | |
260 | }; | |
261 | ||
212380e3 AC |
262 | static void |
263 | check_rehash(void *unused) | |
264 | { | |
265 | /* | |
266 | * Check to see whether we have to rehash the configuration .. | |
267 | */ | |
268 | if(dorehash) | |
269 | { | |
270 | rehash(1); | |
271 | dorehash = 0; | |
272 | } | |
273 | ||
274 | if(dorehashbans) | |
275 | { | |
276 | rehash_bans(1); | |
277 | dorehashbans = 0; | |
278 | } | |
279 | ||
280 | if(doremotd) | |
281 | { | |
282 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
283 | "Got signal SIGUSR1, reloading ircd motd file"); | |
041d54ff | 284 | cache_user_motd(); |
212380e3 AC |
285 | doremotd = 0; |
286 | } | |
287 | } | |
288 | ||
212380e3 AC |
289 | /* |
290 | * initalialize_global_set_options | |
291 | * | |
292 | * inputs - none | |
293 | * output - none | |
294 | * side effects - This sets all global set options needed | |
295 | */ | |
296 | static void | |
297 | initialize_global_set_options(void) | |
298 | { | |
299 | memset(&GlobalSetOptions, 0, sizeof(GlobalSetOptions)); | |
300 | /* memset( &ConfigFileEntry, 0, sizeof(ConfigFileEntry)); */ | |
301 | ||
8bd5767b JT |
302 | GlobalSetOptions.maxclients = ServerInfo.default_max_clients; |
303 | ||
304 | if(GlobalSetOptions.maxclients > (maxconnections - MAX_BUFFER) || (GlobalSetOptions.maxclients <= 0)) | |
101db4c4 VY |
305 | GlobalSetOptions.maxclients = maxconnections - MAX_BUFFER; |
306 | ||
212380e3 AC |
307 | GlobalSetOptions.autoconn = 1; |
308 | ||
309 | GlobalSetOptions.spam_time = MIN_JOIN_LEAVE_TIME; | |
310 | GlobalSetOptions.spam_num = MAX_JOIN_LEAVE_COUNT; | |
311 | ||
312 | if(ConfigFileEntry.default_floodcount) | |
313 | GlobalSetOptions.floodcount = ConfigFileEntry.default_floodcount; | |
314 | else | |
315 | GlobalSetOptions.floodcount = 10; | |
316 | ||
317 | split_servers = ConfigChannel.default_split_server_count; | |
318 | split_users = ConfigChannel.default_split_user_count; | |
319 | ||
320 | if(split_users && split_servers | |
321 | && (ConfigChannel.no_create_on_split || ConfigChannel.no_join_on_split)) | |
322 | { | |
323 | splitmode = 1; | |
324 | splitchecking = 1; | |
325 | } | |
326 | ||
944b0584 JH |
327 | if(ConfigFileEntry.default_ident_timeout) |
328 | GlobalSetOptions.ident_timeout = ConfigFileEntry.default_ident_timeout; | |
0ffb8106 JH |
329 | else |
330 | GlobalSetOptions.ident_timeout = IDENT_TIMEOUT; | |
212380e3 | 331 | |
f427c8b0 | 332 | rb_strlcpy(GlobalSetOptions.operstring, |
212380e3 AC |
333 | ConfigFileEntry.default_operstring, |
334 | sizeof(GlobalSetOptions.operstring)); | |
f427c8b0 | 335 | rb_strlcpy(GlobalSetOptions.adminstring, |
212380e3 AC |
336 | ConfigFileEntry.default_adminstring, |
337 | sizeof(GlobalSetOptions.adminstring)); | |
338 | ||
339 | /* memset( &ConfigChannel, 0, sizeof(ConfigChannel)); */ | |
340 | ||
341 | /* End of global set options */ | |
342 | ||
343 | } | |
344 | ||
345 | /* | |
346 | * initialize_server_capabs | |
347 | * | |
348 | * inputs - none | |
349 | * output - none | |
350 | */ | |
351 | static void | |
352 | initialize_server_capabs(void) | |
353 | { | |
354 | default_server_capabs &= ~CAP_ZIP; | |
355 | } | |
356 | ||
357 | ||
358 | /* | |
359 | * write_pidfile | |
360 | * | |
361 | * inputs - filename+path of pid file | |
362 | * output - none | |
363 | * side effects - write the pid of the ircd to filename | |
364 | */ | |
365 | static void | |
366 | write_pidfile(const char *filename) | |
367 | { | |
368 | FILE *fb; | |
369 | char buff[32]; | |
370 | if((fb = fopen(filename, "w"))) | |
371 | { | |
372 | unsigned int pid = (unsigned int) getpid(); | |
373 | ||
b2f0da88 | 374 | rb_snprintf(buff, sizeof(buff), "%u\n", pid); |
212380e3 AC |
375 | if((fputs(buff, fb) == -1)) |
376 | { | |
377 | ilog(L_MAIN, "Error writing %u to pid file %s (%s)", | |
378 | pid, filename, strerror(errno)); | |
379 | } | |
380 | fclose(fb); | |
381 | return; | |
382 | } | |
383 | else | |
384 | { | |
385 | ilog(L_MAIN, "Error opening pid file %s", filename); | |
386 | } | |
387 | } | |
388 | ||
389 | /* | |
390 | * check_pidfile | |
391 | * | |
392 | * inputs - filename+path of pid file | |
393 | * output - none | |
394 | * side effects - reads pid from pidfile and checks if ircd is in process | |
395 | * list. if it is, gracefully exits | |
396 | * -kre | |
397 | */ | |
398 | static void | |
399 | check_pidfile(const char *filename) | |
400 | { | |
401 | FILE *fb; | |
402 | char buff[32]; | |
403 | pid_t pidfromfile; | |
404 | ||
405 | /* Don't do logging here, since we don't have log() initialised */ | |
406 | if((fb = fopen(filename, "r"))) | |
407 | { | |
408 | if(fgets(buff, 20, fb) != NULL) | |
409 | { | |
410 | pidfromfile = atoi(buff); | |
411 | if(!kill(pidfromfile, 0)) | |
412 | { | |
413 | printf("ircd: daemon is already running\n"); | |
414 | exit(-1); | |
415 | } | |
416 | } | |
417 | fclose(fb); | |
418 | } | |
419 | } | |
420 | ||
421 | /* | |
422 | * setup_corefile | |
423 | * | |
424 | * inputs - nothing | |
425 | * output - nothing | |
426 | * side effects - setups corefile to system limits. | |
427 | * -kre | |
428 | */ | |
429 | static void | |
430 | setup_corefile(void) | |
431 | { | |
432 | #ifdef HAVE_SYS_RESOURCE_H | |
433 | struct rlimit rlim; /* resource limits */ | |
434 | ||
435 | /* Set corefilesize to maximum */ | |
436 | if(!getrlimit(RLIMIT_CORE, &rlim)) | |
437 | { | |
438 | rlim.rlim_cur = rlim.rlim_max; | |
439 | setrlimit(RLIMIT_CORE, &rlim); | |
440 | } | |
441 | #endif | |
442 | } | |
443 | ||
6fce54ff VY |
444 | static void |
445 | ircd_log_cb(const char *str) | |
446 | { | |
6643434b | 447 | ilog(L_MAIN, "libratbox reports: %s", str); |
6fce54ff VY |
448 | } |
449 | ||
450 | static void | |
451 | ircd_restart_cb(const char *str) | |
452 | { | |
b1daa815 | 453 | inotice("libratbox has called the restart callback: %s", str); |
6fce54ff VY |
454 | restart(str); |
455 | } | |
456 | ||
457 | /* | |
458 | * Why EXIT_FAILURE here? | |
459 | * Because if ircd_die_cb() is called it's because of a fatal | |
460 | * error inside libcharybdis, and we don't know how to handle the | |
461 | * exception, so it is logical to return a FAILURE exit code here. | |
462 | * --nenolod | |
463 | */ | |
464 | static void | |
465 | ircd_die_cb(const char *str) | |
466 | { | |
467 | if(str != NULL) | |
468 | { | |
469 | /* Try to get the message out to currently logged in operators. */ | |
6643434b VY |
470 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, "libratbox has called the die callback..aborting: %s", str); |
471 | inotice("libratbox has called the die callback..aborting: %s", str); | |
6fce54ff | 472 | } |
6643434b | 473 | else |
b1daa815 | 474 | inotice("libratbox has called the die callback..aborting"); |
6fce54ff VY |
475 | |
476 | unlink(pidFileName); | |
477 | exit(EXIT_FAILURE); | |
478 | } | |
479 | ||
fa832850 AC |
480 | struct ev_entry *check_splitmode_ev = NULL; |
481 | ||
d80645d0 VY |
482 | static int |
483 | seed_with_urandom(void) | |
484 | { | |
485 | unsigned int seed; | |
486 | int fd; | |
487 | ||
488 | fd = open("/dev/urandom", O_RDONLY); | |
489 | if(fd >= 0) | |
490 | { | |
491 | if(read(fd, &seed, sizeof(seed)) == sizeof(seed)) | |
492 | { | |
493 | close(fd); | |
494 | srand(seed); | |
495 | return 1; | |
496 | } | |
497 | } | |
498 | return 0; | |
499 | } | |
500 | ||
501 | static void | |
502 | seed_with_clock(void) | |
503 | { | |
504 | const struct timeval *tv; | |
505 | rb_set_time(); | |
506 | tv = rb_current_time_tv(); | |
507 | srand(tv->tv_sec ^ (tv->tv_usec | (getpid() << 20))); | |
508 | } | |
509 | ||
510 | static void | |
511 | seed_random(void *unused) | |
512 | { | |
513 | unsigned int seed; | |
514 | if(rb_get_random(&seed, sizeof(seed)) == -1) | |
515 | { | |
516 | if(!seed_with_urandom()) | |
517 | seed_with_clock(); | |
518 | return; | |
519 | } | |
520 | srand(seed); | |
521 | } | |
522 | ||
212380e3 AC |
523 | /* |
524 | * main | |
525 | * | |
526 | * Initializes the IRCd. | |
527 | * | |
528 | * Inputs - number of commandline args, args themselves | |
529 | * Outputs - none | |
530 | * Side Effects - this is where the ircd gets going right now | |
531 | */ | |
532 | int | |
533 | main(int argc, char *argv[]) | |
534 | { | |
535 | int fd; | |
536 | ||
537 | /* Check to see if the user is running us as root, which is a nono */ | |
538 | if(geteuid() == 0) | |
539 | { | |
540 | fprintf(stderr, "Don't run ircd as root!!!\n"); | |
541 | return -1; | |
542 | } | |
543 | ||
adc7be98 VY |
544 | init_sys(); |
545 | ||
befa24c8 JT |
546 | ConfigFileEntry.dpath = DPATH; |
547 | ConfigFileEntry.configfile = CPATH; /* Server configuration file */ | |
befa24c8 JT |
548 | ConfigFileEntry.connect_timeout = 30; /* Default to 30 */ |
549 | ||
550 | umask(077); /* better safe than sorry --SRB */ | |
adc7be98 VY |
551 | |
552 | myargv = argv; | |
553 | parseargs(&argc, &argv, myopts); | |
554 | ||
555 | if(chdir(ConfigFileEntry.dpath)) | |
556 | { | |
557 | fprintf(stderr, "Unable to chdir to %s: %s\n", ConfigFileEntry.dpath, strerror(errno)); | |
558 | exit(EXIT_FAILURE); | |
559 | } | |
560 | ||
3d3d1a95 VY |
561 | rb_set_time(); |
562 | ||
212380e3 AC |
563 | /* |
564 | * Setup corefile size immediately after boot -kre | |
565 | */ | |
566 | setup_corefile(); | |
567 | ||
212380e3 AC |
568 | memset(&me, 0, sizeof(me)); |
569 | memset(&meLocalUser, 0, sizeof(meLocalUser)); | |
570 | me.localClient = &meLocalUser; | |
571 | ||
572 | /* Make sure all lists are zeroed */ | |
573 | memset(&unknown_list, 0, sizeof(unknown_list)); | |
574 | memset(&lclient_list, 0, sizeof(lclient_list)); | |
575 | memset(&serv_list, 0, sizeof(serv_list)); | |
576 | memset(&global_serv_list, 0, sizeof(global_serv_list)); | |
577 | memset(&local_oper_list, 0, sizeof(local_oper_list)); | |
578 | memset(&oper_list, 0, sizeof(oper_list)); | |
579 | ||
330fc5c1 | 580 | rb_dlinkAddTail(&me, &me.node, &global_client_list); |
212380e3 | 581 | |
2af8c7ff VY |
582 | memset(&Count, 0, sizeof(Count)); |
583 | memset(&ServerInfo, 0, sizeof(ServerInfo)); | |
584 | memset(&AdminInfo, 0, sizeof(AdminInfo)); | |
585 | memset(&ServerStats, 0, sizeof(struct ServerStatistics)); | |
212380e3 AC |
586 | |
587 | /* Initialise the channel capability usage counts... */ | |
588 | init_chcap_usage_counts(); | |
589 | ||
212380e3 AC |
590 | if(printVersion) |
591 | { | |
b3803848 | 592 | printf("ircd: version %s(%s)\n", ircd_version, serno); |
8bd1c8a1 AC |
593 | #ifdef CUSTOM_BRANDING |
594 | printf("ircd: based on %s-%s\n", PACKAGE_NAME, PACKAGE_VERSION); | |
595 | #endif | |
d2b6b9f3 | 596 | printf("ircd: %s\n", rb_lib_version()); |
212380e3 AC |
597 | exit(EXIT_SUCCESS); |
598 | } | |
599 | ||
adc7be98 | 600 | |
212380e3 AC |
601 | |
602 | setup_signals(); | |
603 | ||
212380e3 AC |
604 | if (testing_conf) |
605 | server_state_foreground = 1; | |
606 | ||
607 | /* Make sure fd 0, 1 and 2 are in use -- jilles */ | |
608 | do | |
609 | { | |
610 | fd = open("/dev/null", O_RDWR); | |
611 | } while (fd < 2 && fd != -1); | |
612 | if (fd > 2) | |
613 | close(fd); | |
614 | else if (fd == -1) | |
615 | exit(1); | |
616 | ||
617 | /* Check if there is pidfile and daemon already running */ | |
618 | if(!testing_conf) | |
619 | { | |
620 | check_pidfile(pidFileName); | |
621 | ||
622 | if(!server_state_foreground) | |
623 | make_daemon(); | |
624 | inotice("starting %s ...", ircd_version); | |
31c86ea8 | 625 | inotice("%s", rb_lib_version()); |
212380e3 AC |
626 | } |
627 | ||
628 | /* Init the event subsystem */ | |
0edb29fa | 629 | rb_lib_init(ircd_log_cb, ircd_restart_cb, ircd_die_cb, !server_state_foreground, maxconnections, DNODE_HEAP_SIZE, FD_HEAP_SIZE); |
150f35f7 | 630 | rb_linebuf_init(LINEBUF_HEAP_SIZE); |
212380e3 | 631 | |
37cd159e VY |
632 | if(ConfigFileEntry.use_egd && (ConfigFileEntry.egdpool_path != NULL)) |
633 | { | |
634 | rb_init_prng(ConfigFileEntry.egdpool_path, RB_PRNG_EGD); | |
635 | } else | |
636 | rb_init_prng(NULL, RB_PRNG_DEFAULT); | |
637 | ||
e1db84d8 VY |
638 | seed_random(NULL); |
639 | ||
212380e3 | 640 | init_main_logfile(); |
212380e3 AC |
641 | newconf_init(); |
642 | init_s_conf(); | |
643 | init_s_newconf(); | |
644 | init_hash(); | |
645 | clear_scache_hash_table(); /* server cache name table */ | |
646 | init_host_hash(); | |
647 | clear_hash_parse(); | |
648 | init_client(); | |
212380e3 AC |
649 | init_hook(); |
650 | init_channels(); | |
651 | initclass(); | |
652 | initwhowas(); | |
212380e3 AC |
653 | init_reject(); |
654 | init_cache(); | |
655 | init_monitor(); | |
656 | init_isupport(); | |
030cdce7 | 657 | |
19716b9f | 658 | construct_cflags_strings(); |
030cdce7 | 659 | |
212380e3 AC |
660 | load_all_modules(1); |
661 | #ifndef STATIC_MODULES | |
662 | load_core_modules(1); | |
663 | #endif | |
664 | init_auth(); /* Initialise the auth code */ | |
665 | init_resolver(); /* Needs to be setup before the io loop */ | |
39a68b53 | 666 | privilegeset_set_new("default", "", 0); |
212380e3 AC |
667 | |
668 | if (testing_conf) | |
669 | fprintf(stderr, "\nBeginning config test\n"); | |
670 | read_conf_files(YES); /* cold start init conf files */ | |
212380e3 AC |
671 | #ifndef STATIC_MODULES |
672 | ||
673 | mod_add_path(MODULE_DIR); | |
674 | mod_add_path(MODULE_DIR "/autoload"); | |
675 | #endif | |
676 | ||
6eebc373 | 677 | init_bandb(); |
c6d72037 VY |
678 | init_ssld(); |
679 | ||
80c9ac51 AC |
680 | rehash_bans(0); |
681 | ||
212380e3 AC |
682 | initialize_server_capabs(); /* Set up default_server_capabs */ |
683 | initialize_global_set_options(); | |
684 | ||
685 | if(ServerInfo.name == NULL) | |
686 | { | |
687 | ierror("no server name specified in serverinfo block."); | |
688 | return -1; | |
689 | } | |
f427c8b0 | 690 | rb_strlcpy(me.name, ServerInfo.name, sizeof(me.name)); |
212380e3 AC |
691 | |
692 | if(ServerInfo.sid[0] == '\0') | |
693 | { | |
694 | ierror("no server sid specified in serverinfo block."); | |
695 | return -2; | |
696 | } | |
697 | strcpy(me.id, ServerInfo.sid); | |
698 | init_uid(); | |
699 | ||
700 | /* serverinfo{} description must exist. If not, error out. */ | |
701 | if(ServerInfo.description == NULL) | |
702 | { | |
703 | ierror("no server description specified in serverinfo block."); | |
704 | return -3; | |
705 | } | |
f427c8b0 | 706 | rb_strlcpy(me.info, ServerInfo.description, sizeof(me.info)); |
212380e3 | 707 | |
8bd5767b JT |
708 | if(ServerInfo.ssl_cert != NULL && ServerInfo.ssl_private_key != NULL) |
709 | { | |
710 | /* just do the rb_setup_ssl_server to validate the config */ | |
711 | if(!rb_setup_ssl_server(ServerInfo.ssl_cert, ServerInfo.ssl_private_key, ServerInfo.ssl_dh_params)) | |
712 | { | |
713 | ilog(L_MAIN, "WARNING: Unable to setup SSL."); | |
714 | ssl_ok = 0; | |
715 | } | |
716 | else | |
717 | ssl_ok = 1; | |
c6d72037 VY |
718 | } |
719 | ||
212380e3 AC |
720 | if (testing_conf) |
721 | { | |
722 | fprintf(stderr, "\nConfig testing complete.\n"); | |
723 | fflush(stderr); | |
724 | return 0; /* Why? We want the launcher to exit out. */ | |
725 | } | |
726 | ||
727 | me.from = &me; | |
728 | me.servptr = &me; | |
729 | SetMe(&me); | |
730 | make_server(&me); | |
e3354945 | 731 | startup_time = rb_current_time(); |
212380e3 AC |
732 | add_to_client_hash(me.name, &me); |
733 | add_to_id_hash(me.id, &me); | |
994544c2 | 734 | me.serv->nameinfo = scache_connect(me.name, me.info, 0); |
212380e3 | 735 | |
330fc5c1 | 736 | rb_dlinkAddAlloc(&me, &global_serv_list); |
212380e3 AC |
737 | |
738 | construct_umodebuf(); | |
739 | ||
740 | check_class(); | |
741 | write_pidfile(pidFileName); | |
742 | load_help(); | |
743 | open_logfiles(); | |
744 | ||
745 | ilog(L_MAIN, "Server Ready"); | |
746 | ||
212380e3 AC |
747 | /* We want try_connections to be called as soon as possible now! -- adrian */ |
748 | /* No, 'cause after a restart it would cause all sorts of nick collides */ | |
749 | /* um. by waiting even longer, that just means we have even *more* | |
750 | * nick collisions. what a stupid idea. set an event for the IO loop --fl | |
751 | */ | |
12aea5fe | 752 | rb_event_addish("try_connections", try_connections, NULL, STARTUP_CONNECTIONS_TIME); |
36645728 VY |
753 | rb_event_addonce("try_connections_startup", try_connections, NULL, 2); |
754 | rb_event_add("check_rehash", check_rehash, NULL, 3); | |
d80645d0 | 755 | rb_event_addish("reseed_srand", seed_random, NULL, 300); /* reseed every 10 minutes */ |
212380e3 | 756 | |
212380e3 | 757 | if(splitmode) |
36645728 | 758 | check_splitmode_ev = rb_event_add("check_splitmode", check_splitmode, NULL, 5); |
212380e3 | 759 | |
212380e3 AC |
760 | print_startup(getpid()); |
761 | ||
39944e1f | 762 | rb_lib_loop(0); |
212380e3 AC |
763 | |
764 | return 0; | |
765 | } |