]> jfr.im git - solanum.git/blame - ircd/parse.c
More cleanup
[solanum.git] / ircd / parse.c
CommitLineData
212380e3 1/*
8ac75529 2 * charybdis: an advanced ircd.
212380e3
AC
3 * parse.c: The message parser.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
4d03595d 8 * Copyright (C) 2007-2016 William Pitcock
212380e3
AC
9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2 of the License, or
13 * (at your option) any later version.
14 *
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
19 *
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
23 * USA
212380e3
AC
24 */
25
26#include "stdinc.h"
27#include "parse.h"
28#include "client.h"
29#include "channel.h"
30#include "common.h"
31#include "hash.h"
4562c604 32#include "match.h"
212380e3
AC
33#include "ircd.h"
34#include "numeric.h"
4016731b 35#include "logger.h"
212380e3
AC
36#include "s_stats.h"
37#include "send.h"
38#include "msg.h"
4d03595d 39#include "msgbuf.h"
212380e3 40#include "s_conf.h"
212380e3
AC
41#include "s_serv.h"
42#include "packet.h"
77d3d2db 43#include "s_assert.h"
212380e3 44
7416e480 45struct Dictionary *cmd_dict = NULL;
8ac75529
AC
46struct Dictionary *alias_dict = NULL;
47
29c92cf9 48static void cancel_clients(struct Client *, struct Client *);
1579e155 49static void remove_unknown(struct Client *, const char *, char *);
212380e3 50
4d03595d 51static void do_numeric(int, struct Client *, struct Client *, int, const char **);
212380e3
AC
52static void do_alias(struct alias_entry *, struct Client *, char *);
53
4a84a763 54static int handle_command(struct Message *, struct MsgBuf *, struct Client *, struct Client *);
212380e3 55
212380e3
AC
56static char buffer[1024];
57
212380e3
AC
58/* turn a string into a parc/parv pair */
59
e4603e3d
AC
60char *reconstruct_parv(int parc, const char *parv[])
61{
62 static char tmpbuf[BUFSIZE]; int i;
63
64 rb_strlcpy(tmpbuf, parv[0], BUFSIZE);
65 for (i = 1; i < parc; i++)
66 {
67 rb_strlcat(tmpbuf, " ", BUFSIZE);
68 rb_strlcat(tmpbuf, parv[i], BUFSIZE);
69 }
70 return tmpbuf;
71}
212380e3 72
212380e3
AC
73/* parse()
74 *
819dd2d2 75 * given a raw buffer, parses it and generates parv and parc
212380e3
AC
76 */
77void
78parse(struct Client *client_p, char *pbuffer, char *bufend)
79{
80 struct Client *from = client_p;
212380e3 81 char *end;
e23126c8 82 int res;
4d03595d 83 int numeric = 0;
212380e3 84 struct Message *mptr;
4d03595d 85 struct MsgBuf msgbuf;
212380e3
AC
86
87 s_assert(MyConnect(client_p));
8c23bb2e 88 s_assert(client_p->localClient->F != NULL);
212380e3
AC
89 if(IsAnyDead(client_p))
90 return;
91
4d03595d 92 end = bufend - 1;
212380e3 93
4d03595d
AC
94 /* XXX this should be done before parse() is called */
95 if(*end == '\n')
96 *end-- = '\0';
97 if(*end == '\r')
98 *end = '\0';
212380e3 99
4d03595d
AC
100 res = msgbuf_parse(&msgbuf, pbuffer);
101 if (res)
212380e3 102 {
4d03595d
AC
103 ServerStats.is_empt++;
104 return;
105 }
212380e3 106
5a5f173d 107 if (msgbuf.origin != NULL && IsServer(client_p))
4d03595d
AC
108 {
109 from = find_client(msgbuf.origin);
212380e3 110
4d03595d
AC
111 /* didnt find any matching client, issue a kill */
112 if(from == NULL)
212380e3 113 {
4d03595d 114 ServerStats.is_unpf++;
1579e155 115 remove_unknown(client_p, msgbuf.origin, pbuffer);
4d03595d 116 return;
212380e3
AC
117 }
118
4d03595d
AC
119 /* fake direction, hmm. */
120 if(from->from != client_p)
212380e3 121 {
4d03595d
AC
122 ServerStats.is_wrdi++;
123 cancel_clients(client_p, from);
124 return;
212380e3 125 }
212380e3
AC
126 }
127
4d03595d 128 if(IsDigit(*msgbuf.cmd) && IsDigit(*(msgbuf.cmd + 1)) && IsDigit(*(msgbuf.cmd + 2)))
212380e3
AC
129 {
130 mptr = NULL;
4d03595d 131 numeric = atoi(msgbuf.cmd);
47adde3d 132 ServerStats.is_num++;
212380e3
AC
133 }
134 else
135 {
a4bf26dd 136 mptr = rb_dictionary_retrieve(cmd_dict, msgbuf.cmd);
212380e3
AC
137
138 /* no command or its encap only, error */
139 if(!mptr || !mptr->cmd)
140 {
4d03595d 141 if (IsPerson(client_p))
212380e3 142 {
a4bf26dd 143 struct alias_entry *aptr = rb_dictionary_retrieve(alias_dict, msgbuf.cmd);
4d03595d 144 if (aptr != NULL)
212380e3 145 {
1ca8cd52
AC
146 if (msgbuf.n_para < 2)
147 {
148 sendto_one(client_p, form_str(ERR_NEEDMOREPARAMS),
149 me.name,
150 EmptyString(client_p->name) ? "*" : client_p->name,
151 msgbuf.cmd);
152 return;
153 }
154
20dd3725 155 do_alias(aptr, client_p, reconstruct_parv(msgbuf.n_para - 1, msgbuf.para + 1));
4d03595d 156 return;
212380e3
AC
157 }
158 }
4d03595d
AC
159 if(IsPerson(from))
160 {
161 sendto_one(from, form_str(ERR_UNKNOWNCOMMAND),
1579e155 162 me.name, from->name, msgbuf.cmd);
4d03595d 163 }
47adde3d 164 ServerStats.is_unco++;
212380e3
AC
165 return;
166 }
167
4d03595d 168 mptr->bytes += msgbuf.parselen;
212380e3
AC
169 }
170
212380e3
AC
171 if(mptr == NULL)
172 {
4d03595d 173 do_numeric(numeric, client_p, from, msgbuf.n_para, msgbuf.para);
212380e3
AC
174 return;
175 }
176
4a84a763 177 if(handle_command(mptr, &msgbuf, client_p, from) < -1)
212380e3
AC
178 {
179 char *p;
180 for (p = pbuffer; p <= end; p += 8)
181 {
182 /* HACK HACK */
183 /* Its expected this nasty code can be removed
184 * or rewritten later if still needed.
185 */
44f442e3 186 if((p + 8) > end)
212380e3
AC
187 {
188 for (; p <= end; p++)
189 {
190 ilog(L_MAIN, "%02x |%c", p[0], p[0]);
191 }
192 }
193 else
194 ilog(L_MAIN,
195 "%02x %02x %02x %02x %02x %02x %02x %02x |%c%c%c%c%c%c%c%c",
196 p[0], p[1], p[2], p[3], p[4], p[5],
197 p[6], p[7], p[0], p[1], p[2], p[3], p[4], p[5], p[6], p[7]);
198 }
199 }
200
201}
202
203/*
204 * handle_command
205 *
206 * inputs - pointer to message block
4a84a763 207 * - pointer to message buffer
212380e3
AC
208 * - pointer to client
209 * - pointer to client message is from
212380e3
AC
210 * output - -1 if error from server
211 * side effects -
212 */
213static int
4a84a763 214handle_command(struct Message *mptr, struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *from)
212380e3
AC
215{
216 struct MessageEntry ehandler;
217 MessageHandler handler = 0;
218 char squitreason[80];
219
220 if(IsAnyDead(client_p))
221 return -1;
222
223 if(IsServer(client_p))
224 mptr->rcount++;
225
226 mptr->count++;
227
212380e3
AC
228 ehandler = mptr->handlers[from->handler];
229 handler = ehandler.handler;
230
231 /* check right amount of params is passed... --is */
4a84a763
AC
232 if(msgbuf_p->n_para < ehandler.min_para ||
233 (ehandler.min_para && EmptyString(msgbuf_p->para[ehandler.min_para - 1])))
212380e3
AC
234 {
235 if(!IsServer(client_p))
236 {
237 sendto_one(client_p, form_str(ERR_NEEDMOREPARAMS),
55abcbb2
KB
238 me.name,
239 EmptyString(client_p->name) ? "*" : client_p->name,
212380e3
AC
240 mptr->cmd);
241 if(MyClient(client_p))
242 return (1);
243 else
244 return (-1);
245 }
246
247 sendto_realops_snomask(SNO_GENERAL, L_ALL,
248 "Dropping server %s due to (invalid) command '%s'"
66769bc1 249 " with only %zu arguments (expecting %zu).",
4a84a763 250 client_p->name, mptr->cmd, msgbuf_p->n_para, ehandler.min_para);
212380e3 251 ilog(L_SERVER,
66769bc1 252 "Insufficient parameters (%zu < %zu) for command '%s' from %s.",
4a84a763 253 msgbuf_p->n_para, ehandler.min_para, mptr->cmd, client_p->name);
5203cba5 254 snprintf(squitreason, sizeof squitreason,
66769bc1 255 "Insufficient parameters (%zu < %zu) for command '%s'",
4a84a763 256 msgbuf_p->n_para, ehandler.min_para, mptr->cmd);
212380e3
AC
257 exit_client(client_p, client_p, client_p, squitreason);
258 return (-1);
259 }
260
4a84a763 261 (*handler) (msgbuf_p, client_p, from, msgbuf_p->n_para, msgbuf_p->para);
212380e3
AC
262 return (1);
263}
264
265void
4a84a763 266handle_encap(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p,
212380e3
AC
267 const char *command, int parc, const char *parv[])
268{
269 struct Message *mptr;
270 struct MessageEntry ehandler;
271 MessageHandler handler = 0;
272
a4bf26dd 273 mptr = rb_dictionary_retrieve(cmd_dict, command);
212380e3
AC
274
275 if(mptr == NULL || mptr->cmd == NULL)
276 return;
277
278 ehandler = mptr->handlers[ENCAP_HANDLER];
279 handler = ehandler.handler;
280
66769bc1 281 if((size_t)parc < ehandler.min_para ||
212380e3
AC
282 (ehandler.min_para && EmptyString(parv[ehandler.min_para - 1])))
283 return;
284
4a84a763 285 (*handler) (msgbuf_p, client_p, source_p, parc, parv);
212380e3
AC
286}
287
288/*
289 * clear_hash_parse()
290 *
291 * inputs -
292 * output - NONE
293 * side effects - MUST MUST be called at startup ONCE before
294 * any other keyword hash routine is used.
212380e3
AC
295 */
296void
297clear_hash_parse()
298{
a4bf26dd 299 cmd_dict = rb_dictionary_create("command", strcasecmp);
212380e3
AC
300}
301
302/* mod_add_cmd
303 *
304 * inputs - command name
305 * - pointer to struct Message
306 * output - none
307 * side effects - load this one command name
308 * msg->count msg->bytes is modified in place, in
309 * modules address space. Might not want to do that...
310 */
311void
312mod_add_cmd(struct Message *msg)
313{
212380e3
AC
314 s_assert(msg != NULL);
315 if(msg == NULL)
316 return;
317
a4bf26dd 318 if (rb_dictionary_find(cmd_dict, msg->cmd) != NULL)
8ac75529 319 return;
212380e3
AC
320
321 msg->count = 0;
322 msg->rcount = 0;
323 msg->bytes = 0;
324
a4bf26dd 325 rb_dictionary_add(cmd_dict, msg->cmd, msg);
212380e3
AC
326}
327
328/* mod_del_cmd
329 *
330 * inputs - command name
331 * output - none
332 * side effects - unload this one command name
333 */
334void
335mod_del_cmd(struct Message *msg)
336{
212380e3
AC
337 s_assert(msg != NULL);
338 if(msg == NULL)
339 return;
340
a4bf26dd 341 rb_dictionary_delete(cmd_dict, msg->cmd);
212380e3
AC
342}
343
212380e3
AC
344/* cancel_clients()
345 *
346 * inputs - client who sent us the message, client with fake
29c92cf9 347 * direction
212380e3
AC
348 * outputs - a given warning about the fake direction
349 * side effects -
350 */
351static void
29c92cf9 352cancel_clients(struct Client *client_p, struct Client *source_p)
212380e3
AC
353{
354 /* ok, fake prefix happens naturally during a burst on a nick
355 * collision with TS5, we cant kill them because one client has to
356 * survive, so we just send an error.
357 */
358 if(IsServer(source_p) || IsMe(source_p))
359 {
360 sendto_realops_snomask(SNO_DEBUG, L_ALL,
361 "Message for %s[%s] from %s",
362 source_p->name, source_p->from->name,
b3ebc7ab 363 client_p->name);
212380e3
AC
364 }
365 else
366 {
367 sendto_realops_snomask(SNO_DEBUG, L_ALL,
368 "Message for %s[%s@%s!%s] from %s (TS, ignored)",
369 source_p->name,
370 source_p->username,
371 source_p->host,
372 source_p->from->name,
b3ebc7ab 373 client_p->name);
212380e3
AC
374 }
375}
376
377/* remove_unknown()
378 *
379 * inputs - client who gave us message, supposed sender, buffer
55abcbb2 380 * output -
212380e3
AC
381 * side effects - kills issued for clients, squits for servers
382 */
383static void
1579e155 384remove_unknown(struct Client *client_p, const char *lsender, char *lbuffer)
212380e3
AC
385{
386 int slen = strlen(lsender);
d45f5ea2
JT
387 char sid[4];
388 struct Client *server;
212380e3 389
ba0711fd 390 /* meepfoo is a nickname (ignore)
212380e3
AC
391 * #XXXXXXXX is a UID (KILL)
392 * #XX is a SID (SQUIT)
393 * meep.foo is a server (SQUIT)
394 */
55abcbb2 395 if((IsDigit(lsender[0]) && slen == 3) ||
212380e3
AC
396 (strchr(lsender, '.') != NULL))
397 {
398 sendto_realops_snomask(SNO_DEBUG, L_ALL,
399 "Unknown prefix (%s) from %s, Squitting %s",
b3ebc7ab 400 lbuffer, client_p->name, lsender);
212380e3
AC
401
402 sendto_one(client_p,
403 ":%s SQUIT %s :(Unknown prefix (%s) from %s)",
55abcbb2 404 get_id(&me, client_p), lsender,
212380e3
AC
405 lbuffer, client_p->name);
406 }
d45f5ea2
JT
407 else if(!IsDigit(lsender[0]))
408 ;
409 else if(slen != 9)
410 sendto_realops_snomask(SNO_DEBUG, L_ALL,
411 "Invalid prefix (%s) from %s",
412 lbuffer, client_p->name);
413 else
414 {
415 memcpy(sid, lsender, 3);
416 sid[3] = '\0';
417 server = find_server(NULL, sid);
418 if (server != NULL && server->from == client_p)
55abcbb2 419 sendto_one(client_p, ":%s KILL %s :%s (Unknown Client)",
d45f5ea2
JT
420 get_id(&me, client_p), lsender, me.name);
421 }
212380e3
AC
422}
423
424
425
426/*
427 *
428 * parc number of arguments ('sender' counted as one!)
212380e3
AC
429 * parv[1]..parv[parc-1]
430 * pointers to additional parameters, this is a NULL
431 * terminated list (parv[parc] == NULL).
432 *
433 * *WARNING*
434 * Numerics are mostly error reports. If there is something
435 * wrong with the message, just *DROP* it! Don't even think of
436 * sending back a neat error message -- big danger of creating
437 * a ping pong error message...
438 */
439static void
4d03595d 440do_numeric(int numeric, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
441{
442 struct Client *target_p;
443 struct Channel *chptr;
444
445 if(parc < 2 || !IsServer(source_p))
446 return;
447
448 /* Remap low number numerics. */
4d03595d
AC
449 if(numeric < 100)
450 numeric += 100;
212380e3
AC
451
452 /*
453 * Prepare the parameter portion of the message into 'buffer'.
454 * (Because the buffer is twice as large as the message buffer
455 * for the socket, no overflow can occur here... ...on current
456 * assumptions--bets are off, if these are changed --msa)
457 * Note: if buffer is non-empty, it will begin with SPACE.
458 */
459 if(parc > 1)
460 {
461 char *t = buffer; /* Current position within the buffer */
462 int i;
463 int tl; /* current length of presently being built string in t */
464 for (i = 2; i < (parc - 1); i++)
465 {
5203cba5 466 tl = sprintf(t, " %s", parv[i]);
212380e3
AC
467 t += tl;
468 }
5203cba5 469 sprintf(t, " :%s", parv[parc - 1]);
212380e3
AC
470 }
471
472 if((target_p = find_client(parv[1])) != NULL)
473 {
474 if(IsMe(target_p))
475 {
476 /*
477 * We shouldn't get numerics sent to us,
478 * any numerics we do get indicate a bug somewhere..
479 */
480 /* ugh. this is here because of nick collisions. when two servers
481 * relink, they burst each other their nicks, then perform collides.
482 * if there is a nick collision, BOTH servers will kill their own
483 * nicks, and BOTH will kill the other servers nick, which wont exist,
484 * because it will have been already killed by the local server.
485 *
486 * unfortunately, as we cant guarantee other servers will do the
55abcbb2 487 * "right thing" on a nick collision, we have to keep both kills.
212380e3
AC
488 * ergo we need to ignore ERR_NOSUCHNICK. --fl_
489 */
490 /* quick comment. This _was_ tried. i.e. assume the other servers
491 * will do the "right thing" and kill a nick that is colliding.
492 * unfortunately, it did not work. --Dianora
493 */
494 /* note, now we send PING on server connect, we can
495 * also get ERR_NOSUCHSERVER..
496 */
4d03595d
AC
497 if(numeric != ERR_NOSUCHNICK &&
498 numeric != ERR_NOSUCHSERVER)
212380e3 499 sendto_realops_snomask(SNO_GENERAL, L_ADMIN,
4d03595d 500 "*** %s(via %s) sent a %03d numeric to me: %s",
212380e3
AC
501 source_p->name,
502 client_p->name, numeric, buffer);
503 return;
504 }
505 else if(target_p->from == client_p)
506 {
507 /* This message changed direction (nick collision?)
508 * ignore it.
509 */
510 return;
511 }
512
513 /* csircd will send out unknown umode flag for +a (admin), drop it here. */
4d03595d 514 if(numeric == ERR_UMODEUNKNOWNFLAG && MyClient(target_p))
212380e3
AC
515 return;
516
517 /* Fake it for server hiding, if its our client */
4d03595d 518 sendto_one(target_p, ":%s %03d %s%s",
55abcbb2 519 get_id(source_p, target_p), numeric,
212380e3
AC
520 get_id(target_p, target_p), buffer);
521 return;
522 }
523 else if((chptr = find_channel(parv[1])) != NULL)
06b697a2 524 sendto_channel_flags(client_p, ALL_MEMBERS, source_p, chptr,
4d03595d 525 "%03d %s%s",
06b697a2 526 numeric, chptr->chname, buffer);
212380e3
AC
527}
528
529static void do_alias(struct alias_entry *aptr, struct Client *source_p, char *text)
530{
531 char *p;
532 struct Client *target_p;
533
534 if (!IsFloodDone(source_p) && source_p->localClient->receiveM > 20)
535 flood_endgrace(source_p);
536
537 p = strchr(aptr->target, '@');
538 if (p != NULL)
539 {
540 /* user@server */
541 target_p = find_server(NULL, p + 1);
542 if (target_p != NULL && IsMe(target_p))
543 target_p = NULL;
544 }
545 else
546 {
547 /* nick, must be +S */
548 target_p = find_named_person(aptr->target);
549 if (target_p != NULL && !IsService(target_p))
550 target_p = NULL;
551 }
552
553 if (target_p == NULL)
554 {
555 sendto_one_numeric(source_p, ERR_SERVICESDOWN, form_str(ERR_SERVICESDOWN), aptr->target);
556 return;
557 }
558
559 if (text != NULL && *text == ':')
560 text++;
561 if (text == NULL || *text == '\0')
562 {
563 sendto_one(source_p, form_str(ERR_NOTEXTTOSEND), me.name, source_p->name);
564 return;
565 }
566
567 /* increment the hitcounter on this alias */
568 aptr->hits++;
569
570 sendto_one(target_p, ":%s PRIVMSG %s :%s",
571 get_id(source_p, target_p),
572 p != NULL ? aptr->target : get_id(target_p, target_p),
573 text);
574}
575
3c7d6fcc 576void
4a84a763 577m_not_oper(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
578{
579 sendto_one_numeric(source_p, ERR_NOPRIVILEGES, form_str(ERR_NOPRIVILEGES));
212380e3
AC
580}
581
3c7d6fcc 582void
4a84a763 583m_unregistered(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
584{
585 /* bit of a hack.
586 * I don't =really= want to waste a bit in a flag
587 * number_of_nick_changes is only really valid after the client
588 * is fully registered..
589 */
590 if(client_p->localClient->number_of_nick_changes == 0)
591 {
592 sendto_one(client_p, form_str(ERR_NOTREGISTERED), me.name);
593 client_p->localClient->number_of_nick_changes++;
594 }
212380e3
AC
595}
596
3c7d6fcc 597void
4a84a763 598m_registered(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
599{
600 sendto_one(client_p, form_str(ERR_ALREADYREGISTRED), me.name, source_p->name);
212380e3
AC
601}
602
3c7d6fcc 603void
4a84a763 604m_ignore(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3 605{
3c7d6fcc 606 /* Does nothing */
212380e3 607}