]>
Commit | Line | Data |
---|---|---|
212380e3 AC |
1 | /* |
2 | * ircd-ratbox: A slightly useful ircd. | |
3 | * modules.c: A module loader. | |
4 | * | |
5 | * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center | |
6 | * Copyright (C) 1996-2002 Hybrid Development Team | |
7 | * Copyright (C) 2002-2005 ircd-ratbox development team | |
8 | * | |
9 | * This program is free software; you can redistribute it and/or modify | |
10 | * it under the terms of the GNU General Public License as published by | |
11 | * the Free Software Foundation; either version 2 of the License, or | |
12 | * (at your option) any later version. | |
13 | * | |
14 | * This program is distributed in the hope that it will be useful, | |
15 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
16 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
17 | * GNU General Public License for more details. | |
18 | * | |
19 | * You should have received a copy of the GNU General Public License | |
20 | * along with this program; if not, write to the Free Software | |
21 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 | |
22 | * USA | |
212380e3 AC |
23 | */ |
24 | ||
25 | #include "stdinc.h" | |
212380e3 | 26 | #include "modules.h" |
4016731b | 27 | #include "logger.h" |
212380e3 AC |
28 | #include "ircd.h" |
29 | #include "client.h" | |
30 | #include "send.h" | |
31 | #include "s_conf.h" | |
32 | #include "s_newconf.h" | |
33 | #include "numeric.h" | |
34 | #include "parse.h" | |
35 | #include "ircd_defs.h" | |
4562c604 | 36 | #include "match.h" |
15feac53 | 37 | #include "s_serv.h" |
8e9c6a75 | 38 | #include "capability.h" |
7b641013 | 39 | #include "hash.h" |
212380e3 | 40 | |
f272e7ab AC |
41 | #include <ltdl.h> |
42 | ||
9abdcf1c | 43 | #ifndef LT_MODULE_EXT |
a6f63a82 | 44 | # error "Solanum requires loadable module support." |
9abdcf1c EM |
45 | #endif |
46 | ||
e55a9d6a AC |
47 | rb_dlink_list module_list; |
48 | rb_dlink_list mod_paths; | |
212380e3 AC |
49 | |
50 | static const char *core_module_table[] = { | |
431a1a27 | 51 | "m_ban", |
212380e3 AC |
52 | "m_die", |
53 | "m_error", | |
94613c78 | 54 | "m_identified", |
212380e3 AC |
55 | "m_join", |
56 | "m_kick", | |
57 | "m_kill", | |
58 | "m_message", | |
59 | "m_mode", | |
78946542 | 60 | "m_modules", |
212380e3 AC |
61 | "m_nick", |
62 | "m_part", | |
63 | "m_quit", | |
64 | "m_server", | |
212380e3 AC |
65 | "m_squit", |
66 | NULL | |
67 | }; | |
68 | ||
81204be8 EM |
69 | #define MOD_WARN_DELTA (90 * 86400) /* time in seconds, 86400 seconds in a day */ |
70 | ||
212380e3 | 71 | void |
92dad483 | 72 | init_modules(void) |
212380e3 | 73 | { |
f272e7ab AC |
74 | if(lt_dlinit()) |
75 | { | |
76 | ilog(L_MAIN, "lt_dlinit failed"); | |
c173a8ad | 77 | exit(EXIT_FAILURE); |
f272e7ab AC |
78 | } |
79 | ||
212380e3 | 80 | /* Add the default paths we look in to the module system --nenolod */ |
4d8cfacd AC |
81 | mod_add_path(ircd_paths[IRCD_PATH_MODULES]); |
82 | mod_add_path(ircd_paths[IRCD_PATH_AUTOLOAD_MODULES]); | |
212380e3 AC |
83 | } |
84 | ||
28cc8bb9 EK |
85 | static unsigned int prev_caps; |
86 | ||
87 | void | |
88 | mod_remember_clicaps(void) | |
89 | { | |
90 | prev_caps = capability_index_mask(cli_capindex); | |
91 | } | |
92 | ||
93 | void | |
94 | mod_notify_clicaps(void) | |
95 | { | |
96 | unsigned int cur_caps = capability_index_mask(cli_capindex); | |
97 | unsigned int del = prev_caps & ~cur_caps; | |
98 | unsigned int new = cur_caps & ~prev_caps; | |
99 | ||
100 | if (del) | |
101 | sendto_local_clients_with_capability(CLICAP_CAP_NOTIFY, ":%s CAP * DEL :%s", | |
102 | me.name, capability_index_list(cli_capindex, del)); | |
103 | if (new) | |
104 | sendto_local_clients_with_capability(CLICAP_CAP_NOTIFY, ":%s CAP * NEW :%s", | |
105 | me.name, capability_index_list(cli_capindex, new)); | |
106 | } | |
107 | ||
212380e3 AC |
108 | /* mod_find_path() |
109 | * | |
110 | * input - path | |
111 | * output - none | |
112 | * side effects - returns a module path from path | |
113 | */ | |
26c6ac3d | 114 | static char * |
212380e3 AC |
115 | mod_find_path(const char *path) |
116 | { | |
330fc5c1 | 117 | rb_dlink_node *ptr; |
26c6ac3d | 118 | char *mpath; |
212380e3 | 119 | |
5cefa1d6 | 120 | RB_DLINK_FOREACH(ptr, mod_paths.head) |
212380e3 AC |
121 | { |
122 | mpath = ptr->data; | |
123 | ||
26c6ac3d | 124 | if(!strcmp(path, mpath)) |
212380e3 AC |
125 | return mpath; |
126 | } | |
127 | ||
128 | return NULL; | |
129 | } | |
130 | ||
131 | /* mod_add_path | |
132 | * | |
133 | * input - path | |
55abcbb2 | 134 | * ouput - |
212380e3 AC |
135 | * side effects - adds path to list |
136 | */ | |
137 | void | |
138 | mod_add_path(const char *path) | |
139 | { | |
26c6ac3d | 140 | char *pathst; |
212380e3 AC |
141 | |
142 | if(mod_find_path(path)) | |
143 | return; | |
144 | ||
26c6ac3d | 145 | pathst = rb_strdup(path); |
330fc5c1 | 146 | rb_dlinkAddAlloc(pathst, &mod_paths); |
212380e3 AC |
147 | } |
148 | ||
149 | /* mod_clear_paths() | |
150 | * | |
151 | * input - | |
152 | * output - | |
153 | * side effects - clear the lists of paths | |
154 | */ | |
155 | void | |
156 | mod_clear_paths(void) | |
157 | { | |
637c4932 | 158 | rb_dlink_node *ptr, *next_ptr; |
212380e3 | 159 | |
637c4932 | 160 | RB_DLINK_FOREACH_SAFE(ptr, next_ptr, mod_paths.head) |
212380e3 | 161 | { |
637c4932 | 162 | rb_free(ptr->data); |
30106156 | 163 | rb_free_rb_dlink_node(ptr); |
212380e3 AC |
164 | } |
165 | ||
166 | mod_paths.head = mod_paths.tail = NULL; | |
167 | mod_paths.length = 0; | |
168 | } | |
169 | ||
212380e3 AC |
170 | /* findmodule_byname |
171 | * | |
aa483e55 EM |
172 | * input - module to load |
173 | * output - index of module on success, -1 on failure | |
174 | * side effects - none | |
212380e3 | 175 | */ |
e55a9d6a | 176 | struct module * |
212380e3 AC |
177 | findmodule_byname(const char *name) |
178 | { | |
e55a9d6a | 179 | rb_dlink_node *ptr; |
c9108ea0 AC |
180 | char name_ext[PATH_MAX + 1]; |
181 | ||
dd92c99b AC |
182 | rb_strlcpy(name_ext, name, sizeof name_ext); |
183 | rb_strlcat(name_ext, LT_MODULE_EXT, sizeof name_ext); | |
212380e3 | 184 | |
e55a9d6a | 185 | RB_DLINK_FOREACH(ptr, module_list.head) |
212380e3 | 186 | { |
e55a9d6a AC |
187 | struct module *mod = ptr->data; |
188 | ||
189 | if(!irccmp(mod->name, name)) | |
190 | return mod; | |
c9108ea0 | 191 | |
e55a9d6a AC |
192 | if(!irccmp(mod->name, name_ext)) |
193 | return mod; | |
212380e3 | 194 | } |
c9108ea0 | 195 | |
e55a9d6a | 196 | return NULL; |
212380e3 AC |
197 | } |
198 | ||
199 | /* load_all_modules() | |
200 | * | |
201 | * input - | |
202 | * output - | |
203 | * side effects - | |
204 | */ | |
205 | void | |
aa483e55 | 206 | load_all_modules(bool warn) |
212380e3 AC |
207 | { |
208 | DIR *system_module_dir = NULL; | |
209 | struct dirent *ldirent = NULL; | |
210 | char module_fq_name[PATH_MAX + 1]; | |
1db8a313 EM |
211 | size_t module_ext_len = strlen(LT_MODULE_EXT); |
212 | ||
4d8cfacd | 213 | system_module_dir = opendir(ircd_paths[IRCD_PATH_AUTOLOAD_MODULES]); |
212380e3 AC |
214 | |
215 | if(system_module_dir == NULL) | |
216 | { | |
4d8cfacd | 217 | ilog(L_MAIN, "Could not load modules from %s: %s", ircd_paths[IRCD_PATH_AUTOLOAD_MODULES], strerror(errno)); |
212380e3 AC |
218 | return; |
219 | } | |
220 | ||
221 | while ((ldirent = readdir(system_module_dir)) != NULL) | |
222 | { | |
66031753 | 223 | size_t len = strlen(ldirent->d_name); |
9abdcf1c | 224 | |
66031753 | 225 | if(len > module_ext_len && |
f956cb0f | 226 | rb_strncasecmp(ldirent->d_name + (len - module_ext_len), LT_MODULE_EXT, module_ext_len) == 0) |
5203cba5 | 227 | { |
8f0c3422 | 228 | (void) snprintf(module_fq_name, sizeof(module_fq_name), "%s/%s", |
229 | ircd_paths[IRCD_PATH_AUTOLOAD_MODULES], ldirent->d_name); | |
aa483e55 | 230 | (void) load_a_module(module_fq_name, warn, MAPI_ORIGIN_CORE, false); |
5203cba5 | 231 | } |
212380e3 AC |
232 | |
233 | } | |
234 | (void) closedir(system_module_dir); | |
235 | } | |
236 | ||
237 | /* load_core_modules() | |
238 | * | |
239 | * input - | |
240 | * output - | |
241 | * side effects - core modules are loaded, if any fail, kill ircd | |
242 | */ | |
243 | void | |
aa483e55 | 244 | load_core_modules(bool warn) |
212380e3 | 245 | { |
d74fa5b5 | 246 | char module_name[PATH_MAX]; |
212380e3 AC |
247 | int i; |
248 | ||
249 | ||
250 | for (i = 0; core_module_table[i]; i++) | |
251 | { | |
8f0c3422 | 252 | snprintf(module_name, sizeof(module_name), "%s/%s", ircd_paths[IRCD_PATH_MODULES], core_module_table[i]); |
212380e3 | 253 | |
aa483e55 | 254 | if(load_a_module(module_name, warn, MAPI_ORIGIN_CORE, true) == false) |
212380e3 AC |
255 | { |
256 | ilog(L_MAIN, | |
9abdcf1c EM |
257 | "Error loading core module %s: terminating ircd", |
258 | core_module_table[i]); | |
c173a8ad | 259 | exit(EXIT_FAILURE); |
212380e3 AC |
260 | } |
261 | } | |
262 | } | |
263 | ||
264 | /* load_one_module() | |
265 | * | |
266 | * input - | |
267 | * output - | |
268 | * side effects - | |
269 | */ | |
aa483e55 EM |
270 | bool |
271 | load_one_module(const char *path, int origin, bool coremodule) | |
212380e3 | 272 | { |
d74fa5b5 | 273 | char modpath[PATH_MAX]; |
330fc5c1 | 274 | rb_dlink_node *pathst; |
212380e3 | 275 | |
503727d1 | 276 | if (server_state_foreground) |
55abcbb2 | 277 | inotice("loading module %s ...", path); |
212380e3 | 278 | |
aa483e55 | 279 | if(coremodule) |
216d70e9 | 280 | origin = MAPI_ORIGIN_CORE; |
216d70e9 | 281 | |
5cefa1d6 | 282 | RB_DLINK_FOREACH(pathst, mod_paths.head) |
212380e3 | 283 | { |
aa483e55 EM |
284 | struct stat statbuf; |
285 | const char *mpath = pathst->data; | |
212380e3 | 286 | |
8f0c3422 | 287 | snprintf(modpath, sizeof(modpath), "%s/%s%s", mpath, path, LT_MODULE_EXT); |
212380e3 AC |
288 | if((strstr(modpath, "../") == NULL) && (strstr(modpath, "/..") == NULL)) |
289 | { | |
aa483e55 | 290 | if(stat(modpath, &statbuf) == 0 && S_ISREG(statbuf.st_mode)) |
212380e3 | 291 | { |
aa483e55 EM |
292 | /* Regular files only please */ |
293 | return load_a_module(modpath, true, origin, coremodule); | |
212380e3 AC |
294 | } |
295 | ||
296 | } | |
297 | } | |
298 | ||
a9227555 | 299 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, "Cannot locate module %s", path); |
f598ba38 AJ |
300 | |
301 | if (server_state_foreground) | |
302 | ierror("cannot locate module %s", path); | |
303 | ||
aa483e55 | 304 | return false; |
212380e3 AC |
305 | } |
306 | ||
212380e3 | 307 | static char unknown_ver[] = "<unknown>"; |
8e9c6a75 | 308 | static char unknown_description[] = "<none>"; |
212380e3 | 309 | |
212380e3 AC |
310 | /* unload_one_module() |
311 | * | |
312 | * inputs - name of module to unload | |
aa483e55 EM |
313 | * - true to say modules unloaded, false to not |
314 | * output - true if successful, false if error | |
212380e3 AC |
315 | * side effects - module is unloaded |
316 | */ | |
aa483e55 EM |
317 | bool |
318 | unload_one_module(const char *name, bool warn) | |
212380e3 | 319 | { |
e55a9d6a | 320 | struct module *mod; |
212380e3 | 321 | |
e55a9d6a | 322 | if((mod = findmodule_byname(name)) == NULL) |
aa483e55 | 323 | return false; |
b5cfad03 | 324 | |
212380e3 AC |
325 | /* |
326 | ** XXX - The type system in C does not allow direct conversion between | |
327 | ** data and function pointers, but as it happens, most C compilers will | |
55abcbb2 KB |
328 | ** safely do this, however it is a theoretical overlow to cast as we |
329 | ** must do here. I have library functions to take care of this, but | |
330 | ** despite being more "correct" for the C language, this is more | |
212380e3 AC |
331 | ** practical. Removing the abuse of the ability to cast ANY pointer |
332 | ** to and from an integer value here will break some compilers. | |
333 | ** -jmallett | |
334 | */ | |
335 | /* Left the comment in but the code isn't here any more -larne */ | |
e55a9d6a | 336 | switch (mod->mapi_version) |
212380e3 AC |
337 | { |
338 | case 1: | |
339 | { | |
e55a9d6a | 340 | struct mapi_mheader_av1 *mheader = mod->mapi_header; |
212380e3 AC |
341 | if(mheader->mapi_command_list) |
342 | { | |
343 | struct Message **m; | |
344 | for (m = mheader->mapi_command_list; *m; ++m) | |
345 | mod_del_cmd(*m); | |
346 | } | |
347 | ||
348 | /* hook events are never removed, we simply lose the | |
349 | * ability to call them --fl | |
350 | */ | |
351 | if(mheader->mapi_hfn_list) | |
352 | { | |
353 | mapi_hfn_list_av1 *m; | |
354 | for (m = mheader->mapi_hfn_list; m->hapi_name; ++m) | |
355 | remove_hook(m->hapi_name, m->fn); | |
356 | } | |
357 | ||
358 | if(mheader->mapi_unregister) | |
359 | mheader->mapi_unregister(); | |
360 | break; | |
361 | } | |
8e9c6a75 EM |
362 | case 2: |
363 | { | |
e55a9d6a | 364 | struct mapi_mheader_av2 *mheader = mod->mapi_header; |
8e9c6a75 EM |
365 | |
366 | /* XXX duplicate code :( */ | |
367 | if(mheader->mapi_command_list) | |
368 | { | |
369 | struct Message **m; | |
370 | for (m = mheader->mapi_command_list; *m; ++m) | |
371 | mod_del_cmd(*m); | |
372 | } | |
373 | ||
374 | /* hook events are never removed, we simply lose the | |
375 | * ability to call them --fl | |
376 | */ | |
377 | if(mheader->mapi_hfn_list) | |
378 | { | |
379 | mapi_hfn_list_av1 *m; | |
380 | for (m = mheader->mapi_hfn_list; m->hapi_name; ++m) | |
381 | remove_hook(m->hapi_name, m->fn); | |
382 | } | |
383 | ||
384 | if(mheader->mapi_unregister) | |
385 | mheader->mapi_unregister(); | |
386 | ||
387 | if(mheader->mapi_cap_list) | |
388 | { | |
389 | mapi_cap_list_av2 *m; | |
390 | for (m = mheader->mapi_cap_list; m->cap_name; ++m) | |
391 | { | |
392 | struct CapabilityIndex *idx; | |
393 | ||
978b7232 | 394 | switch (m->cap_index) |
8e9c6a75 EM |
395 | { |
396 | case MAPI_CAP_CLIENT: | |
397 | idx = cli_capindex; | |
398 | break; | |
399 | case MAPI_CAP_SERVER: | |
400 | idx = serv_capindex; | |
401 | break; | |
402 | default: | |
a9227555 | 403 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, |
8e9c6a75 | 404 | "Unknown/unsupported CAP index found of type %d on capability %s when unloading %s", |
e55a9d6a | 405 | m->cap_index, m->cap_name, mod->name); |
8e9c6a75 EM |
406 | ilog(L_MAIN, |
407 | "Unknown/unsupported CAP index found of type %d on capability %s when unloading %s", | |
e55a9d6a | 408 | m->cap_index, m->cap_name, mod->name); |
8e9c6a75 EM |
409 | continue; |
410 | } | |
411 | ||
33c01426 | 412 | capability_orphan(idx, m->cap_name); |
8e9c6a75 EM |
413 | } |
414 | } | |
e8de2bfa | 415 | break; |
8e9c6a75 | 416 | } |
212380e3 | 417 | default: |
a9227555 | 418 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, |
212380e3 | 419 | "Unknown/unsupported MAPI version %d when unloading %s!", |
e55a9d6a | 420 | mod->mapi_version, mod->name); |
212380e3 | 421 | ilog(L_MAIN, "Unknown/unsupported MAPI version %d when unloading %s!", |
e55a9d6a | 422 | mod->mapi_version, mod->name); |
212380e3 AC |
423 | break; |
424 | } | |
425 | ||
e55a9d6a | 426 | lt_dlclose(mod->address); |
212380e3 | 427 | |
e55a9d6a AC |
428 | rb_dlinkDelete(&mod->node, &module_list); |
429 | rb_free(mod->name); | |
df7e3dab | 430 | rb_free(mod->path); |
e55a9d6a | 431 | rb_free(mod); |
212380e3 | 432 | |
aa483e55 | 433 | if(warn) |
212380e3 AC |
434 | { |
435 | ilog(L_MAIN, "Module %s unloaded", name); | |
a9227555 | 436 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, "Module %s unloaded", name); |
212380e3 AC |
437 | } |
438 | ||
aa483e55 | 439 | return true; |
212380e3 AC |
440 | } |
441 | ||
212380e3 AC |
442 | /* |
443 | * load_a_module() | |
444 | * | |
aa483e55 EM |
445 | * inputs - path name of module, bool to notice, int of origin, bool if core |
446 | * output - false if error true if success | |
212380e3 AC |
447 | * side effects - loads a module if successful |
448 | */ | |
aa483e55 EM |
449 | bool |
450 | load_a_module(const char *path, bool warn, int origin, bool core) | |
212380e3 | 451 | { |
e55a9d6a | 452 | struct module *mod; |
f272e7ab | 453 | lt_dlhandle tmpptr; |
0a87075b | 454 | char *mod_displayname, *c; |
8e9c6a75 | 455 | const char *ver, *description = NULL; |
212380e3 AC |
456 | |
457 | int *mapi_version; | |
458 | ||
0a87075b EM |
459 | mod_displayname = rb_basename(path); |
460 | ||
461 | /* Trim off the ending for the display name if we have to */ | |
462 | if((c = rb_strcasestr(mod_displayname, LT_MODULE_EXT)) != NULL) | |
463 | *c = '\0'; | |
212380e3 | 464 | |
9abdcf1c | 465 | tmpptr = lt_dlopenext(path); |
212380e3 AC |
466 | |
467 | if(tmpptr == NULL) | |
468 | { | |
f272e7ab | 469 | const char *err = lt_dlerror(); |
212380e3 | 470 | |
a9227555 | 471 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, |
0a87075b EM |
472 | "Error loading module %s: %s", mod_displayname, err); |
473 | ilog(L_MAIN, "Error loading module %s: %s", mod_displayname, err); | |
474 | rb_free(mod_displayname); | |
aa483e55 | 475 | return false; |
212380e3 AC |
476 | } |
477 | ||
212380e3 AC |
478 | /* |
479 | * _mheader is actually a struct mapi_mheader_*, but mapi_version | |
480 | * is always the first member of this structure, so we treate it | |
481 | * as a single int in order to determine the API version. | |
482 | * -larne. | |
483 | */ | |
f272e7ab | 484 | mapi_version = (int *) (uintptr_t) lt_dlsym(tmpptr, "_mheader"); |
212380e3 | 485 | if((mapi_version == NULL |
f272e7ab | 486 | && (mapi_version = (int *) (uintptr_t) lt_dlsym(tmpptr, "__mheader")) == NULL) |
212380e3 AC |
487 | || MAPI_MAGIC(*mapi_version) != MAPI_MAGIC_HDR) |
488 | { | |
a9227555 | 489 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, |
212380e3 | 490 | "Data format error: module %s has no MAPI header.", |
0a87075b EM |
491 | mod_displayname); |
492 | ilog(L_MAIN, "Data format error: module %s has no MAPI header.", mod_displayname); | |
f272e7ab | 493 | (void) lt_dlclose(tmpptr); |
0a87075b | 494 | rb_free(mod_displayname); |
aa483e55 | 495 | return false; |
212380e3 AC |
496 | } |
497 | ||
498 | switch (MAPI_VERSION(*mapi_version)) | |
499 | { | |
500 | case 1: | |
501 | { | |
29c92cf9 | 502 | struct mapi_mheader_av1 *mheader = (struct mapi_mheader_av1 *)(void *)mapi_version; /* see above */ |
212380e3 AC |
503 | if(mheader->mapi_register && (mheader->mapi_register() == -1)) |
504 | { | |
505 | ilog(L_MAIN, "Module %s indicated failure during load.", | |
0a87075b | 506 | mod_displayname); |
a9227555 | 507 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, |
212380e3 | 508 | "Module %s indicated failure during load.", |
0a87075b | 509 | mod_displayname); |
f272e7ab | 510 | lt_dlclose(tmpptr); |
0a87075b | 511 | rb_free(mod_displayname); |
aa483e55 | 512 | return false; |
212380e3 AC |
513 | } |
514 | if(mheader->mapi_command_list) | |
515 | { | |
516 | struct Message **m; | |
517 | for (m = mheader->mapi_command_list; *m; ++m) | |
518 | mod_add_cmd(*m); | |
519 | } | |
520 | ||
521 | if(mheader->mapi_hook_list) | |
522 | { | |
523 | mapi_hlist_av1 *m; | |
524 | for (m = mheader->mapi_hook_list; m->hapi_name; ++m) | |
525 | *m->hapi_id = register_hook(m->hapi_name); | |
526 | } | |
527 | ||
528 | if(mheader->mapi_hfn_list) | |
529 | { | |
530 | mapi_hfn_list_av1 *m; | |
531 | for (m = mheader->mapi_hfn_list; m->hapi_name; ++m) | |
532 | add_hook(m->hapi_name, m->fn); | |
533 | } | |
534 | ||
535 | ver = mheader->mapi_module_version; | |
536 | break; | |
537 | } | |
8e9c6a75 EM |
538 | case 2: |
539 | { | |
540 | struct mapi_mheader_av2 *mheader = (struct mapi_mheader_av2 *)(void *)mapi_version; /* see above */ | |
212380e3 | 541 | |
33c01426 EK |
542 | if(mheader->mapi_cap_list) |
543 | { | |
544 | mapi_cap_list_av2 *m; | |
545 | for (m = mheader->mapi_cap_list; m->cap_name; ++m) | |
546 | { | |
547 | struct CapabilityIndex *idx; | |
548 | int result; | |
549 | ||
550 | switch (m->cap_index) | |
551 | { | |
552 | case MAPI_CAP_CLIENT: | |
553 | idx = cli_capindex; | |
554 | break; | |
555 | case MAPI_CAP_SERVER: | |
556 | idx = serv_capindex; | |
557 | break; | |
558 | default: | |
a9227555 | 559 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, |
33c01426 EK |
560 | "Unknown/unsupported CAP index found of type %d on capability %s when loading %s", |
561 | m->cap_index, m->cap_name, mod_displayname); | |
562 | ilog(L_MAIN, | |
563 | "Unknown/unsupported CAP index found of type %d on capability %s when loading %s", | |
564 | m->cap_index, m->cap_name, mod_displayname); | |
565 | continue; | |
566 | } | |
567 | ||
568 | result = capability_put(idx, m->cap_name, m->cap_ownerdata); | |
569 | if (m->cap_id != NULL) | |
570 | *(m->cap_id) = result; | |
571 | } | |
572 | } | |
573 | ||
8e9c6a75 | 574 | /* XXX duplicated code :( */ |
5eb3d7a7 | 575 | if(mheader->mapi_register && (mheader->mapi_register() == -1)) |
8e9c6a75 EM |
576 | { |
577 | ilog(L_MAIN, "Module %s indicated failure during load.", | |
0a87075b | 578 | mod_displayname); |
a9227555 | 579 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, |
8e9c6a75 | 580 | "Module %s indicated failure during load.", |
0a87075b | 581 | mod_displayname); |
33c01426 EK |
582 | if(mheader->mapi_cap_list) |
583 | { | |
584 | mapi_cap_list_av2 *m; | |
585 | for (m = mheader->mapi_cap_list; m->cap_name; ++m) | |
586 | { | |
587 | struct CapabilityIndex *idx; | |
588 | switch (m->cap_index) | |
589 | { | |
590 | case MAPI_CAP_CLIENT: | |
591 | idx = cli_capindex; | |
592 | break; | |
593 | case MAPI_CAP_SERVER: | |
594 | idx = serv_capindex; | |
595 | break; | |
596 | default: | |
597 | continue; | |
598 | } | |
599 | capability_orphan(idx, m->cap_name); | |
600 | } | |
601 | } | |
8e9c6a75 | 602 | lt_dlclose(tmpptr); |
0a87075b | 603 | rb_free(mod_displayname); |
aa483e55 | 604 | return false; |
8e9c6a75 | 605 | } |
81204be8 EM |
606 | |
607 | /* Basic date code checks | |
608 | * | |
609 | * Don't make them fatal, but do complain about differences within a certain time frame. | |
610 | * Later on if there are major API changes we can add fatal checks. | |
611 | * -- Elizafox | |
612 | */ | |
613 | if(mheader->mapi_datecode != datecode && mheader->mapi_datecode > 0) | |
614 | { | |
3089f59c | 615 | long int delta = datecode - mheader->mapi_datecode; |
81204be8 EM |
616 | if (delta > MOD_WARN_DELTA) |
617 | { | |
618 | delta /= 86400; | |
881acf00 | 619 | iwarn("Module %s build date is out of sync with ircd build date by %ld days, expect problems", |
0a87075b | 620 | mod_displayname, delta); |
a9227555 | 621 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, |
81204be8 | 622 | "Module %s build date is out of sync with ircd build date by %ld days, expect problems", |
0a87075b | 623 | mod_displayname, delta); |
81204be8 EM |
624 | } |
625 | } | |
626 | ||
8e9c6a75 EM |
627 | if(mheader->mapi_command_list) |
628 | { | |
629 | struct Message **m; | |
630 | for (m = mheader->mapi_command_list; *m; ++m) | |
631 | mod_add_cmd(*m); | |
632 | } | |
633 | ||
634 | if(mheader->mapi_hook_list) | |
635 | { | |
636 | mapi_hlist_av1 *m; | |
637 | for (m = mheader->mapi_hook_list; m->hapi_name; ++m) | |
638 | *m->hapi_id = register_hook(m->hapi_name); | |
639 | } | |
640 | ||
641 | if(mheader->mapi_hfn_list) | |
642 | { | |
643 | mapi_hfn_list_av1 *m; | |
644 | for (m = mheader->mapi_hfn_list; m->hapi_name; ++m) | |
91b12782 EK |
645 | { |
646 | int priority = m->priority; | |
647 | if (priority == 0) | |
648 | priority = HOOK_NORMAL; | |
eed4099e | 649 | add_hook_prio(m->hapi_name, m->fn, priority); |
91b12782 | 650 | } |
8e9c6a75 EM |
651 | } |
652 | ||
653 | /* New in MAPI v2 - version replacement */ | |
654 | ver = mheader->mapi_module_version ? mheader->mapi_module_version : ircd_version; | |
655 | description = mheader->mapi_module_description; | |
8e9c6a75 | 656 | } |
0e5bf029 EM |
657 | |
658 | break; | |
212380e3 AC |
659 | default: |
660 | ilog(L_MAIN, "Module %s has unknown/unsupported MAPI version %d.", | |
0a87075b | 661 | mod_displayname, MAPI_VERSION(*mapi_version)); |
a9227555 | 662 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, |
212380e3 | 663 | "Module %s has unknown/unsupported MAPI version %d.", |
0a87075b | 664 | mod_displayname, *mapi_version); |
f272e7ab | 665 | lt_dlclose(tmpptr); |
0a87075b | 666 | rb_free(mod_displayname); |
aa483e55 | 667 | return false; |
212380e3 AC |
668 | } |
669 | ||
670 | if(ver == NULL) | |
671 | ver = unknown_ver; | |
672 | ||
8e9c6a75 EM |
673 | if(description == NULL) |
674 | description = unknown_description; | |
675 | ||
e55a9d6a AC |
676 | mod = rb_malloc(sizeof(struct module)); |
677 | mod->address = tmpptr; | |
678 | mod->version = ver; | |
679 | mod->description = description; | |
680 | mod->core = core; | |
681 | mod->name = rb_strdup(mod_displayname); | |
682 | mod->mapi_header = mapi_version; | |
683 | mod->mapi_version = MAPI_VERSION(*mapi_version); | |
684 | mod->origin = origin; | |
df7e3dab | 685 | mod->path = rb_strdup(path); |
e55a9d6a | 686 | rb_dlinkAdd(mod, &mod->node, &module_list); |
212380e3 | 687 | |
aa483e55 | 688 | if(warn) |
212380e3 | 689 | { |
c63aeb44 EM |
690 | const char *o; |
691 | ||
978b7232 | 692 | switch (origin) |
c63aeb44 | 693 | { |
c63aeb44 EM |
694 | case MAPI_ORIGIN_EXTENSION: |
695 | o = "extension"; | |
696 | break; | |
697 | case MAPI_ORIGIN_CORE: | |
698 | o = "core"; | |
699 | break; | |
700 | default: | |
701 | o = "unknown"; | |
702 | break; | |
703 | } | |
704 | ||
a9227555 | 705 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, |
02831b6f | 706 | "Module %s [version: %s; MAPI version: %d; origin: %s; description: \"%s\"] loaded at %p", |
0a87075b | 707 | mod_displayname, ver, MAPI_VERSION(*mapi_version), o, description, |
02831b6f AC |
708 | (void *) tmpptr); |
709 | ilog(L_MAIN, "Module %s [version: %s; MAPI version: %d; origin: %s; description: \"%s\"] loaded at %p", | |
0a87075b | 710 | mod_displayname, ver, MAPI_VERSION(*mapi_version), o, description, (void *) tmpptr); |
212380e3 | 711 | } |
0a87075b | 712 | rb_free(mod_displayname); |
aa483e55 | 713 | return true; |
212380e3 | 714 | } |
41390bfe | 715 | |
7b641013 EK |
716 | void |
717 | modules_do_reload(void *info_) | |
718 | { | |
719 | struct modreload *info = info_; | |
720 | struct module *mod; | |
721 | int check_core; | |
6aa5c725 | 722 | int origin; |
7b641013 | 723 | char *m_bn = rb_basename(info->module); |
df7e3dab | 724 | char *path; |
7b641013 EK |
725 | struct Client *source_p = find_id(info->id); |
726 | ||
727 | if((mod = findmodule_byname(m_bn)) == NULL) | |
728 | { | |
729 | if (source_p) sendto_one_notice(source_p, ":Module %s is not loaded", m_bn); | |
730 | rb_free(info); | |
731 | rb_free(m_bn); | |
732 | return; | |
733 | } | |
734 | ||
6aa5c725 | 735 | origin = mod->origin; |
7b641013 | 736 | check_core = mod->core; |
df7e3dab | 737 | path = rb_strdup(mod->path); |
7b641013 EK |
738 | |
739 | mod_remember_clicaps(); | |
740 | ||
741 | if(unload_one_module(m_bn, true) == false) | |
742 | { | |
743 | if (source_p) sendto_one_notice(source_p, ":Module %s is not loaded", m_bn); | |
744 | rb_free(info); | |
745 | rb_free(m_bn); | |
df7e3dab | 746 | rb_free(path); |
7b641013 EK |
747 | return; |
748 | } | |
749 | ||
df7e3dab | 750 | if((load_a_module(path, true, origin, check_core) == false) && check_core) |
7b641013 EK |
751 | { |
752 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, | |
753 | "Error reloading core module: %s: terminating ircd", m_bn); | |
754 | ilog(L_MAIN, "Error loading core module %s: terminating ircd", m_bn); | |
755 | exit(0); | |
756 | } | |
757 | ||
758 | mod_notify_clicaps(); | |
759 | ||
760 | rb_free(info); | |
761 | rb_free(m_bn); | |
df7e3dab | 762 | rb_free(path); |
7b641013 EK |
763 | } |
764 | ||
41390bfe AJ |
765 | void |
766 | modules_do_restart(void *unused) | |
767 | { | |
768 | unsigned int modnum = 0; | |
769 | rb_dlink_node *ptr, *nptr; | |
770 | ||
28cc8bb9 EK |
771 | mod_remember_clicaps(); |
772 | ||
41390bfe AJ |
773 | RB_DLINK_FOREACH_SAFE(ptr, nptr, module_list.head) |
774 | { | |
775 | struct module *mod = ptr->data; | |
776 | if(!unload_one_module(mod->name, false)) | |
777 | { | |
778 | ilog(L_MAIN, "Module Restart: %s was not unloaded %s", | |
779 | mod->name, | |
780 | mod->core? "(core module)" : ""); | |
781 | ||
782 | if(!mod->core) | |
783 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, | |
784 | "Module Restart: %s failed to unload", | |
785 | mod->name); | |
786 | continue; | |
787 | } | |
788 | ||
789 | modnum++; | |
790 | } | |
791 | ||
792 | load_all_modules(false); | |
793 | load_core_modules(false); | |
794 | rehash(false); | |
795 | ||
28cc8bb9 EK |
796 | mod_notify_clicaps(); |
797 | ||
41390bfe AJ |
798 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, |
799 | "Module Restart: %u modules unloaded, %lu modules loaded", | |
800 | modnum, rb_dlink_list_length(&module_list)); | |
801 | ilog(L_MAIN, "Module Restart: %u modules unloaded, %lu modules loaded", modnum, rb_dlink_list_length(&module_list)); | |
802 | } |