]> jfr.im git - solanum.git/blame - ircd/parse.c
msg: remove last vestiges of the fakelag system. charybdis has never supported fakelag.
[solanum.git] / ircd / parse.c
CommitLineData
212380e3 1/*
8ac75529 2 * charybdis: an advanced ircd.
212380e3
AC
3 * parse.c: The message parser.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
4d03595d 8 * Copyright (C) 2007-2016 William Pitcock
212380e3
AC
9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2 of the License, or
13 * (at your option) any later version.
14 *
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
19 *
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
23 * USA
24 *
f42e9ceb 25 * $Id: parse.c 3177 2007-02-01 00:19:14Z jilles $
212380e3
AC
26 */
27
28#include "stdinc.h"
29#include "parse.h"
30#include "client.h"
31#include "channel.h"
32#include "common.h"
33#include "hash.h"
4562c604 34#include "match.h"
212380e3
AC
35#include "ircd.h"
36#include "numeric.h"
4016731b 37#include "logger.h"
212380e3
AC
38#include "s_stats.h"
39#include "send.h"
40#include "msg.h"
4d03595d 41#include "msgbuf.h"
212380e3 42#include "s_conf.h"
212380e3
AC
43#include "s_serv.h"
44#include "packet.h"
77d3d2db 45#include "s_assert.h"
212380e3 46
8ac75529
AC
47static struct Dictionary *cmd_dict = NULL;
48struct Dictionary *alias_dict = NULL;
49
161f0409 50/* parv[0] is not used, and parv[LAST] == NULL */
212380e3
AC
51static char *para[MAXPARA + 2];
52
29c92cf9 53static void cancel_clients(struct Client *, struct Client *);
1579e155 54static void remove_unknown(struct Client *, const char *, char *);
212380e3 55
4d03595d 56static void do_numeric(int, struct Client *, struct Client *, int, const char **);
212380e3
AC
57static void do_alias(struct alias_entry *, struct Client *, char *);
58
4a84a763 59static int handle_command(struct Message *, struct MsgBuf *, struct Client *, struct Client *);
212380e3 60
212380e3
AC
61static char buffer[1024];
62
212380e3
AC
63/* turn a string into a parc/parv pair */
64
e4603e3d
AC
65char *reconstruct_parv(int parc, const char *parv[])
66{
67 static char tmpbuf[BUFSIZE]; int i;
68
69 rb_strlcpy(tmpbuf, parv[0], BUFSIZE);
70 for (i = 1; i < parc; i++)
71 {
72 rb_strlcat(tmpbuf, " ", BUFSIZE);
73 rb_strlcat(tmpbuf, parv[i], BUFSIZE);
74 }
75 return tmpbuf;
76}
212380e3 77
212380e3
AC
78/* parse()
79 *
819dd2d2 80 * given a raw buffer, parses it and generates parv and parc
212380e3
AC
81 */
82void
83parse(struct Client *client_p, char *pbuffer, char *bufend)
84{
85 struct Client *from = client_p;
212380e3 86 char *end;
4d03595d
AC
87 int i = 1, res;
88 int numeric = 0;
212380e3 89 struct Message *mptr;
4d03595d 90 struct MsgBuf msgbuf;
212380e3
AC
91
92 s_assert(MyConnect(client_p));
8c23bb2e 93 s_assert(client_p->localClient->F != NULL);
212380e3
AC
94 if(IsAnyDead(client_p))
95 return;
96
4d03595d 97 end = bufend - 1;
212380e3 98
4d03595d
AC
99 /* XXX this should be done before parse() is called */
100 if(*end == '\n')
101 *end-- = '\0';
102 if(*end == '\r')
103 *end = '\0';
212380e3 104
4d03595d
AC
105 res = msgbuf_parse(&msgbuf, pbuffer);
106 if (res)
212380e3 107 {
4d03595d
AC
108 ServerStats.is_empt++;
109 return;
110 }
212380e3 111
4d03595d
AC
112 if (msgbuf.origin != NULL)
113 {
114 from = find_client(msgbuf.origin);
212380e3 115
4d03595d
AC
116 /* didnt find any matching client, issue a kill */
117 if(from == NULL)
212380e3 118 {
4d03595d 119 ServerStats.is_unpf++;
1579e155 120 remove_unknown(client_p, msgbuf.origin, pbuffer);
4d03595d 121 return;
212380e3
AC
122 }
123
4d03595d
AC
124 /* fake direction, hmm. */
125 if(from->from != client_p)
212380e3 126 {
4d03595d
AC
127 ServerStats.is_wrdi++;
128 cancel_clients(client_p, from);
129 return;
212380e3 130 }
212380e3
AC
131 }
132
4d03595d 133 if(IsDigit(*msgbuf.cmd) && IsDigit(*(msgbuf.cmd + 1)) && IsDigit(*(msgbuf.cmd + 2)))
212380e3
AC
134 {
135 mptr = NULL;
4d03595d 136 numeric = atoi(msgbuf.cmd);
47adde3d 137 ServerStats.is_num++;
212380e3
AC
138 }
139 else
140 {
4d03595d 141 mptr = irc_dictionary_retrieve(cmd_dict, msgbuf.cmd);
212380e3
AC
142
143 /* no command or its encap only, error */
144 if(!mptr || !mptr->cmd)
145 {
4d03595d 146 if (IsPerson(client_p))
212380e3 147 {
20dd3725 148 struct alias_entry *aptr = irc_dictionary_retrieve(alias_dict, msgbuf.cmd);
4d03595d 149 if (aptr != NULL)
212380e3 150 {
20dd3725 151 do_alias(aptr, client_p, reconstruct_parv(msgbuf.n_para - 1, msgbuf.para + 1));
4d03595d 152 return;
212380e3
AC
153 }
154 }
4d03595d
AC
155 if(IsPerson(from))
156 {
157 sendto_one(from, form_str(ERR_UNKNOWNCOMMAND),
1579e155 158 me.name, from->name, msgbuf.cmd);
4d03595d 159 }
47adde3d 160 ServerStats.is_unco++;
212380e3
AC
161 return;
162 }
163
4d03595d 164 mptr->bytes += msgbuf.parselen;
212380e3
AC
165 }
166
212380e3
AC
167 if(mptr == NULL)
168 {
4d03595d 169 do_numeric(numeric, client_p, from, msgbuf.n_para, msgbuf.para);
212380e3
AC
170 return;
171 }
172
4a84a763 173 if(handle_command(mptr, &msgbuf, client_p, from) < -1)
212380e3
AC
174 {
175 char *p;
176 for (p = pbuffer; p <= end; p += 8)
177 {
178 /* HACK HACK */
179 /* Its expected this nasty code can be removed
180 * or rewritten later if still needed.
181 */
182 if((unsigned long) (p + 8) > (unsigned long) end)
183 {
184 for (; p <= end; p++)
185 {
186 ilog(L_MAIN, "%02x |%c", p[0], p[0]);
187 }
188 }
189 else
190 ilog(L_MAIN,
191 "%02x %02x %02x %02x %02x %02x %02x %02x |%c%c%c%c%c%c%c%c",
192 p[0], p[1], p[2], p[3], p[4], p[5],
193 p[6], p[7], p[0], p[1], p[2], p[3], p[4], p[5], p[6], p[7]);
194 }
195 }
196
197}
198
199/*
200 * handle_command
201 *
202 * inputs - pointer to message block
4a84a763 203 * - pointer to message buffer
212380e3
AC
204 * - pointer to client
205 * - pointer to client message is from
212380e3
AC
206 * output - -1 if error from server
207 * side effects -
208 */
209static int
4a84a763 210handle_command(struct Message *mptr, struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *from)
212380e3
AC
211{
212 struct MessageEntry ehandler;
213 MessageHandler handler = 0;
214 char squitreason[80];
215
216 if(IsAnyDead(client_p))
217 return -1;
218
219 if(IsServer(client_p))
220 mptr->rcount++;
221
222 mptr->count++;
223
212380e3
AC
224 ehandler = mptr->handlers[from->handler];
225 handler = ehandler.handler;
226
227 /* check right amount of params is passed... --is */
4a84a763
AC
228 if(msgbuf_p->n_para < ehandler.min_para ||
229 (ehandler.min_para && EmptyString(msgbuf_p->para[ehandler.min_para - 1])))
212380e3
AC
230 {
231 if(!IsServer(client_p))
232 {
233 sendto_one(client_p, form_str(ERR_NEEDMOREPARAMS),
55abcbb2
KB
234 me.name,
235 EmptyString(client_p->name) ? "*" : client_p->name,
212380e3
AC
236 mptr->cmd);
237 if(MyClient(client_p))
238 return (1);
239 else
240 return (-1);
241 }
242
243 sendto_realops_snomask(SNO_GENERAL, L_ALL,
244 "Dropping server %s due to (invalid) command '%s'"
4a84a763
AC
245 " with only %zu arguments (expecting %d).",
246 client_p->name, mptr->cmd, msgbuf_p->n_para, ehandler.min_para);
212380e3 247 ilog(L_SERVER,
4a84a763
AC
248 "Insufficient parameters (%zu < %d) for command '%s' from %s.",
249 msgbuf_p->n_para, ehandler.min_para, mptr->cmd, client_p->name);
5203cba5 250 snprintf(squitreason, sizeof squitreason,
4a84a763
AC
251 "Insufficient parameters (%zu < %d) for command '%s'",
252 msgbuf_p->n_para, ehandler.min_para, mptr->cmd);
212380e3
AC
253 exit_client(client_p, client_p, client_p, squitreason);
254 return (-1);
255 }
256
4a84a763 257 (*handler) (msgbuf_p, client_p, from, msgbuf_p->n_para, msgbuf_p->para);
212380e3
AC
258 return (1);
259}
260
261void
4a84a763 262handle_encap(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p,
212380e3
AC
263 const char *command, int parc, const char *parv[])
264{
265 struct Message *mptr;
266 struct MessageEntry ehandler;
267 MessageHandler handler = 0;
268
8ac75529 269 mptr = irc_dictionary_retrieve(cmd_dict, command);
212380e3
AC
270
271 if(mptr == NULL || mptr->cmd == NULL)
272 return;
273
274 ehandler = mptr->handlers[ENCAP_HANDLER];
275 handler = ehandler.handler;
276
55abcbb2 277 if(parc < ehandler.min_para ||
212380e3
AC
278 (ehandler.min_para && EmptyString(parv[ehandler.min_para - 1])))
279 return;
280
4a84a763 281 (*handler) (msgbuf_p, client_p, source_p, parc, parv);
212380e3
AC
282}
283
284/*
285 * clear_hash_parse()
286 *
287 * inputs -
288 * output - NONE
289 * side effects - MUST MUST be called at startup ONCE before
290 * any other keyword hash routine is used.
291 *
292 */
293void
294clear_hash_parse()
295{
99b461bb 296 cmd_dict = irc_dictionary_create("command", strcasecmp);
212380e3
AC
297}
298
299/* mod_add_cmd
300 *
301 * inputs - command name
302 * - pointer to struct Message
303 * output - none
304 * side effects - load this one command name
305 * msg->count msg->bytes is modified in place, in
306 * modules address space. Might not want to do that...
307 */
308void
309mod_add_cmd(struct Message *msg)
310{
212380e3
AC
311 s_assert(msg != NULL);
312 if(msg == NULL)
313 return;
314
8ac75529
AC
315 if (irc_dictionary_find(cmd_dict, msg->cmd) != NULL)
316 return;
212380e3
AC
317
318 msg->count = 0;
319 msg->rcount = 0;
320 msg->bytes = 0;
321
8ac75529 322 irc_dictionary_add(cmd_dict, msg->cmd, msg);
212380e3
AC
323}
324
325/* mod_del_cmd
326 *
327 * inputs - command name
328 * output - none
329 * side effects - unload this one command name
330 */
331void
332mod_del_cmd(struct Message *msg)
333{
212380e3
AC
334 s_assert(msg != NULL);
335 if(msg == NULL)
336 return;
337
8ac75529 338 irc_dictionary_delete(cmd_dict, msg->cmd);
212380e3
AC
339}
340
341/*
342 * report_messages
343 *
344 * inputs - pointer to client to report to
345 * output - NONE
346 * side effects - NONE
347 */
348void
349report_messages(struct Client *source_p)
350{
8ac75529
AC
351 struct DictionaryIter iter;
352 struct Message *msg;
353 struct alias_entry *amsg;
212380e3 354
90187f21 355 DICTIONARY_FOREACH(msg, &iter, cmd_dict)
212380e3 356 {
8ac75529 357 s_assert(msg->cmd != NULL);
55abcbb2 358 sendto_one_numeric(source_p, RPL_STATSCOMMANDS,
8ac75529 359 form_str(RPL_STATSCOMMANDS),
55abcbb2 360 msg->cmd, msg->count,
8ac75529
AC
361 msg->bytes, msg->rcount);
362 }
212380e3 363
90187f21 364 DICTIONARY_FOREACH(amsg, &iter, alias_dict)
8ac75529
AC
365 {
366 s_assert(amsg->name != NULL);
367 sendto_one_numeric(source_p, RPL_STATSCOMMANDS,
368 form_str(RPL_STATSCOMMANDS),
77910830 369 amsg->name, amsg->hits, 0L, 0);
212380e3
AC
370 }
371}
372
373/* cancel_clients()
374 *
375 * inputs - client who sent us the message, client with fake
29c92cf9 376 * direction
212380e3
AC
377 * outputs - a given warning about the fake direction
378 * side effects -
379 */
380static void
29c92cf9 381cancel_clients(struct Client *client_p, struct Client *source_p)
212380e3
AC
382{
383 /* ok, fake prefix happens naturally during a burst on a nick
384 * collision with TS5, we cant kill them because one client has to
385 * survive, so we just send an error.
386 */
387 if(IsServer(source_p) || IsMe(source_p))
388 {
389 sendto_realops_snomask(SNO_DEBUG, L_ALL,
390 "Message for %s[%s] from %s",
391 source_p->name, source_p->from->name,
b3ebc7ab 392 client_p->name);
212380e3
AC
393 }
394 else
395 {
396 sendto_realops_snomask(SNO_DEBUG, L_ALL,
397 "Message for %s[%s@%s!%s] from %s (TS, ignored)",
398 source_p->name,
399 source_p->username,
400 source_p->host,
401 source_p->from->name,
b3ebc7ab 402 client_p->name);
212380e3
AC
403 }
404}
405
406/* remove_unknown()
407 *
408 * inputs - client who gave us message, supposed sender, buffer
55abcbb2 409 * output -
212380e3
AC
410 * side effects - kills issued for clients, squits for servers
411 */
412static void
1579e155 413remove_unknown(struct Client *client_p, const char *lsender, char *lbuffer)
212380e3
AC
414{
415 int slen = strlen(lsender);
d45f5ea2
JT
416 char sid[4];
417 struct Client *server;
212380e3 418
ba0711fd 419 /* meepfoo is a nickname (ignore)
212380e3
AC
420 * #XXXXXXXX is a UID (KILL)
421 * #XX is a SID (SQUIT)
422 * meep.foo is a server (SQUIT)
423 */
55abcbb2 424 if((IsDigit(lsender[0]) && slen == 3) ||
212380e3
AC
425 (strchr(lsender, '.') != NULL))
426 {
427 sendto_realops_snomask(SNO_DEBUG, L_ALL,
428 "Unknown prefix (%s) from %s, Squitting %s",
b3ebc7ab 429 lbuffer, client_p->name, lsender);
212380e3
AC
430
431 sendto_one(client_p,
432 ":%s SQUIT %s :(Unknown prefix (%s) from %s)",
55abcbb2 433 get_id(&me, client_p), lsender,
212380e3
AC
434 lbuffer, client_p->name);
435 }
d45f5ea2
JT
436 else if(!IsDigit(lsender[0]))
437 ;
438 else if(slen != 9)
439 sendto_realops_snomask(SNO_DEBUG, L_ALL,
440 "Invalid prefix (%s) from %s",
441 lbuffer, client_p->name);
442 else
443 {
444 memcpy(sid, lsender, 3);
445 sid[3] = '\0';
446 server = find_server(NULL, sid);
447 if (server != NULL && server->from == client_p)
55abcbb2 448 sendto_one(client_p, ":%s KILL %s :%s (Unknown Client)",
d45f5ea2
JT
449 get_id(&me, client_p), lsender, me.name);
450 }
212380e3
AC
451}
452
453
454
455/*
456 *
457 * parc number of arguments ('sender' counted as one!)
212380e3
AC
458 * parv[1]..parv[parc-1]
459 * pointers to additional parameters, this is a NULL
460 * terminated list (parv[parc] == NULL).
461 *
462 * *WARNING*
463 * Numerics are mostly error reports. If there is something
464 * wrong with the message, just *DROP* it! Don't even think of
465 * sending back a neat error message -- big danger of creating
466 * a ping pong error message...
467 */
468static void
4d03595d 469do_numeric(int numeric, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
470{
471 struct Client *target_p;
472 struct Channel *chptr;
473
474 if(parc < 2 || !IsServer(source_p))
475 return;
476
477 /* Remap low number numerics. */
4d03595d
AC
478 if(numeric < 100)
479 numeric += 100;
212380e3
AC
480
481 /*
482 * Prepare the parameter portion of the message into 'buffer'.
483 * (Because the buffer is twice as large as the message buffer
484 * for the socket, no overflow can occur here... ...on current
485 * assumptions--bets are off, if these are changed --msa)
486 * Note: if buffer is non-empty, it will begin with SPACE.
487 */
488 if(parc > 1)
489 {
490 char *t = buffer; /* Current position within the buffer */
491 int i;
492 int tl; /* current length of presently being built string in t */
493 for (i = 2; i < (parc - 1); i++)
494 {
5203cba5 495 tl = sprintf(t, " %s", parv[i]);
212380e3
AC
496 t += tl;
497 }
5203cba5 498 sprintf(t, " :%s", parv[parc - 1]);
212380e3
AC
499 }
500
501 if((target_p = find_client(parv[1])) != NULL)
502 {
503 if(IsMe(target_p))
504 {
505 /*
506 * We shouldn't get numerics sent to us,
507 * any numerics we do get indicate a bug somewhere..
508 */
509 /* ugh. this is here because of nick collisions. when two servers
510 * relink, they burst each other their nicks, then perform collides.
511 * if there is a nick collision, BOTH servers will kill their own
512 * nicks, and BOTH will kill the other servers nick, which wont exist,
513 * because it will have been already killed by the local server.
514 *
515 * unfortunately, as we cant guarantee other servers will do the
55abcbb2 516 * "right thing" on a nick collision, we have to keep both kills.
212380e3
AC
517 * ergo we need to ignore ERR_NOSUCHNICK. --fl_
518 */
519 /* quick comment. This _was_ tried. i.e. assume the other servers
520 * will do the "right thing" and kill a nick that is colliding.
521 * unfortunately, it did not work. --Dianora
522 */
523 /* note, now we send PING on server connect, we can
524 * also get ERR_NOSUCHSERVER..
525 */
4d03595d
AC
526 if(numeric != ERR_NOSUCHNICK &&
527 numeric != ERR_NOSUCHSERVER)
212380e3 528 sendto_realops_snomask(SNO_GENERAL, L_ADMIN,
4d03595d 529 "*** %s(via %s) sent a %03d numeric to me: %s",
212380e3
AC
530 source_p->name,
531 client_p->name, numeric, buffer);
532 return;
533 }
534 else if(target_p->from == client_p)
535 {
536 /* This message changed direction (nick collision?)
537 * ignore it.
538 */
539 return;
540 }
541
542 /* csircd will send out unknown umode flag for +a (admin), drop it here. */
4d03595d 543 if(numeric == ERR_UMODEUNKNOWNFLAG && MyClient(target_p))
212380e3
AC
544 return;
545
546 /* Fake it for server hiding, if its our client */
4d03595d 547 sendto_one(target_p, ":%s %03d %s%s",
55abcbb2 548 get_id(source_p, target_p), numeric,
212380e3
AC
549 get_id(target_p, target_p), buffer);
550 return;
551 }
552 else if((chptr = find_channel(parv[1])) != NULL)
06b697a2 553 sendto_channel_flags(client_p, ALL_MEMBERS, source_p, chptr,
4d03595d 554 "%03d %s%s",
06b697a2 555 numeric, chptr->chname, buffer);
212380e3
AC
556}
557
558static void do_alias(struct alias_entry *aptr, struct Client *source_p, char *text)
559{
560 char *p;
561 struct Client *target_p;
562
563 if (!IsFloodDone(source_p) && source_p->localClient->receiveM > 20)
564 flood_endgrace(source_p);
565
566 p = strchr(aptr->target, '@');
567 if (p != NULL)
568 {
569 /* user@server */
570 target_p = find_server(NULL, p + 1);
571 if (target_p != NULL && IsMe(target_p))
572 target_p = NULL;
573 }
574 else
575 {
576 /* nick, must be +S */
577 target_p = find_named_person(aptr->target);
578 if (target_p != NULL && !IsService(target_p))
579 target_p = NULL;
580 }
581
582 if (target_p == NULL)
583 {
584 sendto_one_numeric(source_p, ERR_SERVICESDOWN, form_str(ERR_SERVICESDOWN), aptr->target);
585 return;
586 }
587
588 if (text != NULL && *text == ':')
589 text++;
590 if (text == NULL || *text == '\0')
591 {
592 sendto_one(source_p, form_str(ERR_NOTEXTTOSEND), me.name, source_p->name);
593 return;
594 }
595
596 /* increment the hitcounter on this alias */
597 aptr->hits++;
598
599 sendto_one(target_p, ":%s PRIVMSG %s :%s",
600 get_id(source_p, target_p),
601 p != NULL ? aptr->target : get_id(target_p, target_p),
602 text);
603}
604
605int
4a84a763 606m_not_oper(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
607{
608 sendto_one_numeric(source_p, ERR_NOPRIVILEGES, form_str(ERR_NOPRIVILEGES));
609 return 0;
610}
611
612int
4a84a763 613m_unregistered(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
614{
615 /* bit of a hack.
616 * I don't =really= want to waste a bit in a flag
617 * number_of_nick_changes is only really valid after the client
618 * is fully registered..
619 */
620 if(client_p->localClient->number_of_nick_changes == 0)
621 {
622 sendto_one(client_p, form_str(ERR_NOTREGISTERED), me.name);
623 client_p->localClient->number_of_nick_changes++;
624 }
625
626 return 0;
627}
628
629int
4a84a763 630m_registered(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
631{
632 sendto_one(client_p, form_str(ERR_ALREADYREGISTRED), me.name, source_p->name);
633 return 0;
634}
635
636int
4a84a763 637m_ignore(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
638{
639 return 0;
640}