]>
Commit | Line | Data |
---|---|---|
212380e3 AC |
1 | /* |
2 | * ircd-ratbox: A slightly useful ircd. | |
3 | * modules.c: A module loader. | |
4 | * | |
5 | * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center | |
6 | * Copyright (C) 1996-2002 Hybrid Development Team | |
7 | * Copyright (C) 2002-2005 ircd-ratbox development team | |
8 | * | |
9 | * This program is free software; you can redistribute it and/or modify | |
10 | * it under the terms of the GNU General Public License as published by | |
11 | * the Free Software Foundation; either version 2 of the License, or | |
12 | * (at your option) any later version. | |
13 | * | |
14 | * This program is distributed in the hope that it will be useful, | |
15 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
16 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
17 | * GNU General Public License for more details. | |
18 | * | |
19 | * You should have received a copy of the GNU General Public License | |
20 | * along with this program; if not, write to the Free Software | |
21 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 | |
22 | * USA | |
212380e3 AC |
23 | */ |
24 | ||
25 | #include "stdinc.h" | |
212380e3 | 26 | #include "modules.h" |
4016731b | 27 | #include "logger.h" |
212380e3 AC |
28 | #include "ircd.h" |
29 | #include "client.h" | |
30 | #include "send.h" | |
31 | #include "s_conf.h" | |
32 | #include "s_newconf.h" | |
33 | #include "numeric.h" | |
34 | #include "parse.h" | |
35 | #include "ircd_defs.h" | |
4562c604 | 36 | #include "match.h" |
15feac53 | 37 | #include "s_serv.h" |
8e9c6a75 | 38 | #include "capability.h" |
212380e3 | 39 | |
f272e7ab AC |
40 | #include <ltdl.h> |
41 | ||
9abdcf1c EM |
42 | #ifndef LT_MODULE_EXT |
43 | # error "Charybdis requires loadable module support." | |
44 | #endif | |
45 | ||
e55a9d6a AC |
46 | rb_dlink_list module_list; |
47 | rb_dlink_list mod_paths; | |
212380e3 AC |
48 | |
49 | static const char *core_module_table[] = { | |
431a1a27 | 50 | "m_ban", |
212380e3 AC |
51 | "m_die", |
52 | "m_error", | |
53 | "m_join", | |
54 | "m_kick", | |
55 | "m_kill", | |
56 | "m_message", | |
57 | "m_mode", | |
78946542 | 58 | "m_modules", |
212380e3 AC |
59 | "m_nick", |
60 | "m_part", | |
61 | "m_quit", | |
62 | "m_server", | |
212380e3 AC |
63 | "m_squit", |
64 | NULL | |
65 | }; | |
66 | ||
81204be8 EM |
67 | #define MOD_WARN_DELTA (90 * 86400) /* time in seconds, 86400 seconds in a day */ |
68 | ||
212380e3 | 69 | void |
92dad483 | 70 | init_modules(void) |
212380e3 | 71 | { |
f272e7ab AC |
72 | if(lt_dlinit()) |
73 | { | |
74 | ilog(L_MAIN, "lt_dlinit failed"); | |
c173a8ad | 75 | exit(EXIT_FAILURE); |
f272e7ab AC |
76 | } |
77 | ||
212380e3 | 78 | /* Add the default paths we look in to the module system --nenolod */ |
4d8cfacd AC |
79 | mod_add_path(ircd_paths[IRCD_PATH_MODULES]); |
80 | mod_add_path(ircd_paths[IRCD_PATH_AUTOLOAD_MODULES]); | |
212380e3 AC |
81 | } |
82 | ||
83 | /* mod_find_path() | |
84 | * | |
85 | * input - path | |
86 | * output - none | |
87 | * side effects - returns a module path from path | |
88 | */ | |
26c6ac3d | 89 | static char * |
212380e3 AC |
90 | mod_find_path(const char *path) |
91 | { | |
330fc5c1 | 92 | rb_dlink_node *ptr; |
26c6ac3d | 93 | char *mpath; |
212380e3 | 94 | |
5cefa1d6 | 95 | RB_DLINK_FOREACH(ptr, mod_paths.head) |
212380e3 AC |
96 | { |
97 | mpath = ptr->data; | |
98 | ||
26c6ac3d | 99 | if(!strcmp(path, mpath)) |
212380e3 AC |
100 | return mpath; |
101 | } | |
102 | ||
103 | return NULL; | |
104 | } | |
105 | ||
106 | /* mod_add_path | |
107 | * | |
108 | * input - path | |
55abcbb2 | 109 | * ouput - |
212380e3 AC |
110 | * side effects - adds path to list |
111 | */ | |
112 | void | |
113 | mod_add_path(const char *path) | |
114 | { | |
26c6ac3d | 115 | char *pathst; |
212380e3 AC |
116 | |
117 | if(mod_find_path(path)) | |
118 | return; | |
119 | ||
26c6ac3d | 120 | pathst = rb_strdup(path); |
330fc5c1 | 121 | rb_dlinkAddAlloc(pathst, &mod_paths); |
212380e3 AC |
122 | } |
123 | ||
124 | /* mod_clear_paths() | |
125 | * | |
126 | * input - | |
127 | * output - | |
128 | * side effects - clear the lists of paths | |
129 | */ | |
130 | void | |
131 | mod_clear_paths(void) | |
132 | { | |
637c4932 | 133 | rb_dlink_node *ptr, *next_ptr; |
212380e3 | 134 | |
637c4932 | 135 | RB_DLINK_FOREACH_SAFE(ptr, next_ptr, mod_paths.head) |
212380e3 | 136 | { |
637c4932 | 137 | rb_free(ptr->data); |
30106156 | 138 | rb_free_rb_dlink_node(ptr); |
212380e3 AC |
139 | } |
140 | ||
141 | mod_paths.head = mod_paths.tail = NULL; | |
142 | mod_paths.length = 0; | |
143 | } | |
144 | ||
212380e3 AC |
145 | /* findmodule_byname |
146 | * | |
aa483e55 EM |
147 | * input - module to load |
148 | * output - index of module on success, -1 on failure | |
149 | * side effects - none | |
212380e3 | 150 | */ |
e55a9d6a | 151 | struct module * |
212380e3 AC |
152 | findmodule_byname(const char *name) |
153 | { | |
e55a9d6a | 154 | rb_dlink_node *ptr; |
c9108ea0 AC |
155 | char name_ext[PATH_MAX + 1]; |
156 | ||
dd92c99b AC |
157 | rb_strlcpy(name_ext, name, sizeof name_ext); |
158 | rb_strlcat(name_ext, LT_MODULE_EXT, sizeof name_ext); | |
212380e3 | 159 | |
e55a9d6a | 160 | RB_DLINK_FOREACH(ptr, module_list.head) |
212380e3 | 161 | { |
e55a9d6a AC |
162 | struct module *mod = ptr->data; |
163 | ||
164 | if(!irccmp(mod->name, name)) | |
165 | return mod; | |
c9108ea0 | 166 | |
e55a9d6a AC |
167 | if(!irccmp(mod->name, name_ext)) |
168 | return mod; | |
212380e3 | 169 | } |
c9108ea0 | 170 | |
e55a9d6a | 171 | return NULL; |
212380e3 AC |
172 | } |
173 | ||
174 | /* load_all_modules() | |
175 | * | |
176 | * input - | |
177 | * output - | |
178 | * side effects - | |
179 | */ | |
180 | void | |
aa483e55 | 181 | load_all_modules(bool warn) |
212380e3 AC |
182 | { |
183 | DIR *system_module_dir = NULL; | |
184 | struct dirent *ldirent = NULL; | |
185 | char module_fq_name[PATH_MAX + 1]; | |
1db8a313 EM |
186 | size_t module_ext_len = strlen(LT_MODULE_EXT); |
187 | ||
4d8cfacd | 188 | system_module_dir = opendir(ircd_paths[IRCD_PATH_AUTOLOAD_MODULES]); |
212380e3 AC |
189 | |
190 | if(system_module_dir == NULL) | |
191 | { | |
4d8cfacd | 192 | ilog(L_MAIN, "Could not load modules from %s: %s", ircd_paths[IRCD_PATH_AUTOLOAD_MODULES], strerror(errno)); |
212380e3 AC |
193 | return; |
194 | } | |
195 | ||
196 | while ((ldirent = readdir(system_module_dir)) != NULL) | |
197 | { | |
66031753 | 198 | size_t len = strlen(ldirent->d_name); |
9abdcf1c | 199 | |
66031753 | 200 | if(len > module_ext_len && |
f956cb0f | 201 | rb_strncasecmp(ldirent->d_name + (len - module_ext_len), LT_MODULE_EXT, module_ext_len) == 0) |
5203cba5 | 202 | { |
66031753 EM |
203 | (void) snprintf(module_fq_name, sizeof(module_fq_name), "%s%c%s", |
204 | ircd_paths[IRCD_PATH_AUTOLOAD_MODULES], RB_PATH_SEPARATOR, ldirent->d_name); | |
aa483e55 | 205 | (void) load_a_module(module_fq_name, warn, MAPI_ORIGIN_CORE, false); |
5203cba5 | 206 | } |
212380e3 AC |
207 | |
208 | } | |
209 | (void) closedir(system_module_dir); | |
210 | } | |
211 | ||
212 | /* load_core_modules() | |
213 | * | |
214 | * input - | |
215 | * output - | |
216 | * side effects - core modules are loaded, if any fail, kill ircd | |
217 | */ | |
218 | void | |
aa483e55 | 219 | load_core_modules(bool warn) |
212380e3 | 220 | { |
d74fa5b5 | 221 | char module_name[PATH_MAX]; |
212380e3 AC |
222 | int i; |
223 | ||
224 | ||
225 | for (i = 0; core_module_table[i]; i++) | |
226 | { | |
aa483e55 EM |
227 | snprintf(module_name, sizeof(module_name), "%s%c%s", ircd_paths[IRCD_PATH_MODULES], RB_PATH_SEPARATOR, |
228 | core_module_table[i]); | |
212380e3 | 229 | |
aa483e55 | 230 | if(load_a_module(module_name, warn, MAPI_ORIGIN_CORE, true) == false) |
212380e3 AC |
231 | { |
232 | ilog(L_MAIN, | |
9abdcf1c EM |
233 | "Error loading core module %s: terminating ircd", |
234 | core_module_table[i]); | |
c173a8ad | 235 | exit(EXIT_FAILURE); |
212380e3 AC |
236 | } |
237 | } | |
238 | } | |
239 | ||
240 | /* load_one_module() | |
241 | * | |
242 | * input - | |
243 | * output - | |
244 | * side effects - | |
245 | */ | |
aa483e55 EM |
246 | bool |
247 | load_one_module(const char *path, int origin, bool coremodule) | |
212380e3 | 248 | { |
d74fa5b5 | 249 | char modpath[PATH_MAX]; |
330fc5c1 | 250 | rb_dlink_node *pathst; |
212380e3 | 251 | |
503727d1 | 252 | if (server_state_foreground) |
55abcbb2 | 253 | inotice("loading module %s ...", path); |
212380e3 | 254 | |
aa483e55 | 255 | if(coremodule) |
216d70e9 | 256 | origin = MAPI_ORIGIN_CORE; |
216d70e9 | 257 | |
5cefa1d6 | 258 | RB_DLINK_FOREACH(pathst, mod_paths.head) |
212380e3 | 259 | { |
aa483e55 EM |
260 | struct stat statbuf; |
261 | const char *mpath = pathst->data; | |
212380e3 | 262 | |
aa483e55 | 263 | snprintf(modpath, sizeof(modpath), "%s%c%s%s", mpath, RB_PATH_SEPARATOR, path, LT_MODULE_EXT); |
212380e3 AC |
264 | if((strstr(modpath, "../") == NULL) && (strstr(modpath, "/..") == NULL)) |
265 | { | |
aa483e55 | 266 | if(stat(modpath, &statbuf) == 0 && S_ISREG(statbuf.st_mode)) |
212380e3 | 267 | { |
aa483e55 EM |
268 | /* Regular files only please */ |
269 | return load_a_module(modpath, true, origin, coremodule); | |
212380e3 AC |
270 | } |
271 | ||
272 | } | |
273 | } | |
274 | ||
275 | sendto_realops_snomask(SNO_GENERAL, L_ALL, "Cannot locate module %s", path); | |
aa483e55 | 276 | return false; |
212380e3 AC |
277 | } |
278 | ||
212380e3 | 279 | static char unknown_ver[] = "<unknown>"; |
8e9c6a75 | 280 | static char unknown_description[] = "<none>"; |
212380e3 | 281 | |
212380e3 AC |
282 | /* unload_one_module() |
283 | * | |
284 | * inputs - name of module to unload | |
aa483e55 EM |
285 | * - true to say modules unloaded, false to not |
286 | * output - true if successful, false if error | |
212380e3 AC |
287 | * side effects - module is unloaded |
288 | */ | |
aa483e55 EM |
289 | bool |
290 | unload_one_module(const char *name, bool warn) | |
212380e3 | 291 | { |
e55a9d6a | 292 | struct module *mod; |
212380e3 | 293 | |
e55a9d6a | 294 | if((mod = findmodule_byname(name)) == NULL) |
aa483e55 | 295 | return false; |
b5cfad03 | 296 | |
212380e3 AC |
297 | /* |
298 | ** XXX - The type system in C does not allow direct conversion between | |
299 | ** data and function pointers, but as it happens, most C compilers will | |
55abcbb2 KB |
300 | ** safely do this, however it is a theoretical overlow to cast as we |
301 | ** must do here. I have library functions to take care of this, but | |
302 | ** despite being more "correct" for the C language, this is more | |
212380e3 AC |
303 | ** practical. Removing the abuse of the ability to cast ANY pointer |
304 | ** to and from an integer value here will break some compilers. | |
305 | ** -jmallett | |
306 | */ | |
307 | /* Left the comment in but the code isn't here any more -larne */ | |
e55a9d6a | 308 | switch (mod->mapi_version) |
212380e3 AC |
309 | { |
310 | case 1: | |
311 | { | |
e55a9d6a | 312 | struct mapi_mheader_av1 *mheader = mod->mapi_header; |
212380e3 AC |
313 | if(mheader->mapi_command_list) |
314 | { | |
315 | struct Message **m; | |
316 | for (m = mheader->mapi_command_list; *m; ++m) | |
317 | mod_del_cmd(*m); | |
318 | } | |
319 | ||
320 | /* hook events are never removed, we simply lose the | |
321 | * ability to call them --fl | |
322 | */ | |
323 | if(mheader->mapi_hfn_list) | |
324 | { | |
325 | mapi_hfn_list_av1 *m; | |
326 | for (m = mheader->mapi_hfn_list; m->hapi_name; ++m) | |
327 | remove_hook(m->hapi_name, m->fn); | |
328 | } | |
329 | ||
330 | if(mheader->mapi_unregister) | |
331 | mheader->mapi_unregister(); | |
332 | break; | |
333 | } | |
8e9c6a75 EM |
334 | case 2: |
335 | { | |
e55a9d6a | 336 | struct mapi_mheader_av2 *mheader = mod->mapi_header; |
8e9c6a75 EM |
337 | |
338 | /* XXX duplicate code :( */ | |
339 | if(mheader->mapi_command_list) | |
340 | { | |
341 | struct Message **m; | |
342 | for (m = mheader->mapi_command_list; *m; ++m) | |
343 | mod_del_cmd(*m); | |
344 | } | |
345 | ||
346 | /* hook events are never removed, we simply lose the | |
347 | * ability to call them --fl | |
348 | */ | |
349 | if(mheader->mapi_hfn_list) | |
350 | { | |
351 | mapi_hfn_list_av1 *m; | |
352 | for (m = mheader->mapi_hfn_list; m->hapi_name; ++m) | |
353 | remove_hook(m->hapi_name, m->fn); | |
354 | } | |
355 | ||
356 | if(mheader->mapi_unregister) | |
357 | mheader->mapi_unregister(); | |
358 | ||
359 | if(mheader->mapi_cap_list) | |
360 | { | |
361 | mapi_cap_list_av2 *m; | |
362 | for (m = mheader->mapi_cap_list; m->cap_name; ++m) | |
363 | { | |
364 | struct CapabilityIndex *idx; | |
365 | ||
978b7232 | 366 | switch (m->cap_index) |
8e9c6a75 EM |
367 | { |
368 | case MAPI_CAP_CLIENT: | |
369 | idx = cli_capindex; | |
370 | break; | |
371 | case MAPI_CAP_SERVER: | |
372 | idx = serv_capindex; | |
373 | break; | |
374 | default: | |
375 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
376 | "Unknown/unsupported CAP index found of type %d on capability %s when unloading %s", | |
e55a9d6a | 377 | m->cap_index, m->cap_name, mod->name); |
8e9c6a75 EM |
378 | ilog(L_MAIN, |
379 | "Unknown/unsupported CAP index found of type %d on capability %s when unloading %s", | |
e55a9d6a | 380 | m->cap_index, m->cap_name, mod->name); |
8e9c6a75 EM |
381 | continue; |
382 | } | |
383 | ||
3256156a EM |
384 | if (m->cap_id != NULL) |
385 | { | |
386 | capability_orphan(idx, m->cap_name); | |
387 | sendto_local_clients_with_capability(CLICAP_CAP_NOTIFY, ":%s CAP * DEL :%s", me.name, m->cap_name); | |
388 | } | |
8e9c6a75 EM |
389 | } |
390 | } | |
e8de2bfa | 391 | break; |
8e9c6a75 | 392 | } |
212380e3 AC |
393 | default: |
394 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
395 | "Unknown/unsupported MAPI version %d when unloading %s!", | |
e55a9d6a | 396 | mod->mapi_version, mod->name); |
212380e3 | 397 | ilog(L_MAIN, "Unknown/unsupported MAPI version %d when unloading %s!", |
e55a9d6a | 398 | mod->mapi_version, mod->name); |
212380e3 AC |
399 | break; |
400 | } | |
401 | ||
e55a9d6a | 402 | lt_dlclose(mod->address); |
212380e3 | 403 | |
e55a9d6a AC |
404 | rb_dlinkDelete(&mod->node, &module_list); |
405 | rb_free(mod->name); | |
406 | rb_free(mod); | |
212380e3 | 407 | |
aa483e55 | 408 | if(warn) |
212380e3 AC |
409 | { |
410 | ilog(L_MAIN, "Module %s unloaded", name); | |
411 | sendto_realops_snomask(SNO_GENERAL, L_ALL, "Module %s unloaded", name); | |
412 | } | |
413 | ||
aa483e55 | 414 | return true; |
212380e3 AC |
415 | } |
416 | ||
212380e3 AC |
417 | /* |
418 | * load_a_module() | |
419 | * | |
aa483e55 EM |
420 | * inputs - path name of module, bool to notice, int of origin, bool if core |
421 | * output - false if error true if success | |
212380e3 AC |
422 | * side effects - loads a module if successful |
423 | */ | |
aa483e55 EM |
424 | bool |
425 | load_a_module(const char *path, bool warn, int origin, bool core) | |
212380e3 | 426 | { |
e55a9d6a | 427 | struct module *mod; |
f272e7ab | 428 | lt_dlhandle tmpptr; |
0a87075b | 429 | char *mod_displayname, *c; |
8e9c6a75 | 430 | const char *ver, *description = NULL; |
212380e3 AC |
431 | |
432 | int *mapi_version; | |
433 | ||
0a87075b EM |
434 | mod_displayname = rb_basename(path); |
435 | ||
436 | /* Trim off the ending for the display name if we have to */ | |
437 | if((c = rb_strcasestr(mod_displayname, LT_MODULE_EXT)) != NULL) | |
438 | *c = '\0'; | |
212380e3 | 439 | |
9abdcf1c | 440 | tmpptr = lt_dlopenext(path); |
212380e3 AC |
441 | |
442 | if(tmpptr == NULL) | |
443 | { | |
f272e7ab | 444 | const char *err = lt_dlerror(); |
212380e3 AC |
445 | |
446 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
0a87075b EM |
447 | "Error loading module %s: %s", mod_displayname, err); |
448 | ilog(L_MAIN, "Error loading module %s: %s", mod_displayname, err); | |
449 | rb_free(mod_displayname); | |
aa483e55 | 450 | return false; |
212380e3 AC |
451 | } |
452 | ||
212380e3 AC |
453 | /* |
454 | * _mheader is actually a struct mapi_mheader_*, but mapi_version | |
455 | * is always the first member of this structure, so we treate it | |
456 | * as a single int in order to determine the API version. | |
457 | * -larne. | |
458 | */ | |
f272e7ab | 459 | mapi_version = (int *) (uintptr_t) lt_dlsym(tmpptr, "_mheader"); |
212380e3 | 460 | if((mapi_version == NULL |
f272e7ab | 461 | && (mapi_version = (int *) (uintptr_t) lt_dlsym(tmpptr, "__mheader")) == NULL) |
212380e3 AC |
462 | || MAPI_MAGIC(*mapi_version) != MAPI_MAGIC_HDR) |
463 | { | |
464 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
465 | "Data format error: module %s has no MAPI header.", | |
0a87075b EM |
466 | mod_displayname); |
467 | ilog(L_MAIN, "Data format error: module %s has no MAPI header.", mod_displayname); | |
f272e7ab | 468 | (void) lt_dlclose(tmpptr); |
0a87075b | 469 | rb_free(mod_displayname); |
aa483e55 | 470 | return false; |
212380e3 AC |
471 | } |
472 | ||
473 | switch (MAPI_VERSION(*mapi_version)) | |
474 | { | |
475 | case 1: | |
476 | { | |
29c92cf9 | 477 | struct mapi_mheader_av1 *mheader = (struct mapi_mheader_av1 *)(void *)mapi_version; /* see above */ |
212380e3 AC |
478 | if(mheader->mapi_register && (mheader->mapi_register() == -1)) |
479 | { | |
480 | ilog(L_MAIN, "Module %s indicated failure during load.", | |
0a87075b | 481 | mod_displayname); |
212380e3 AC |
482 | sendto_realops_snomask(SNO_GENERAL, L_ALL, |
483 | "Module %s indicated failure during load.", | |
0a87075b | 484 | mod_displayname); |
f272e7ab | 485 | lt_dlclose(tmpptr); |
0a87075b | 486 | rb_free(mod_displayname); |
aa483e55 | 487 | return false; |
212380e3 AC |
488 | } |
489 | if(mheader->mapi_command_list) | |
490 | { | |
491 | struct Message **m; | |
492 | for (m = mheader->mapi_command_list; *m; ++m) | |
493 | mod_add_cmd(*m); | |
494 | } | |
495 | ||
496 | if(mheader->mapi_hook_list) | |
497 | { | |
498 | mapi_hlist_av1 *m; | |
499 | for (m = mheader->mapi_hook_list; m->hapi_name; ++m) | |
500 | *m->hapi_id = register_hook(m->hapi_name); | |
501 | } | |
502 | ||
503 | if(mheader->mapi_hfn_list) | |
504 | { | |
505 | mapi_hfn_list_av1 *m; | |
506 | for (m = mheader->mapi_hfn_list; m->hapi_name; ++m) | |
507 | add_hook(m->hapi_name, m->fn); | |
508 | } | |
509 | ||
510 | ver = mheader->mapi_module_version; | |
511 | break; | |
512 | } | |
8e9c6a75 EM |
513 | case 2: |
514 | { | |
515 | struct mapi_mheader_av2 *mheader = (struct mapi_mheader_av2 *)(void *)mapi_version; /* see above */ | |
212380e3 | 516 | |
8e9c6a75 | 517 | /* XXX duplicated code :( */ |
5eb3d7a7 | 518 | if(mheader->mapi_register && (mheader->mapi_register() == -1)) |
8e9c6a75 EM |
519 | { |
520 | ilog(L_MAIN, "Module %s indicated failure during load.", | |
0a87075b | 521 | mod_displayname); |
8e9c6a75 EM |
522 | sendto_realops_snomask(SNO_GENERAL, L_ALL, |
523 | "Module %s indicated failure during load.", | |
0a87075b | 524 | mod_displayname); |
8e9c6a75 | 525 | lt_dlclose(tmpptr); |
0a87075b | 526 | rb_free(mod_displayname); |
aa483e55 | 527 | return false; |
8e9c6a75 | 528 | } |
81204be8 EM |
529 | |
530 | /* Basic date code checks | |
531 | * | |
532 | * Don't make them fatal, but do complain about differences within a certain time frame. | |
533 | * Later on if there are major API changes we can add fatal checks. | |
534 | * -- Elizafox | |
535 | */ | |
536 | if(mheader->mapi_datecode != datecode && mheader->mapi_datecode > 0) | |
537 | { | |
3089f59c | 538 | long int delta = datecode - mheader->mapi_datecode; |
81204be8 EM |
539 | if (delta > MOD_WARN_DELTA) |
540 | { | |
541 | delta /= 86400; | |
881acf00 | 542 | iwarn("Module %s build date is out of sync with ircd build date by %ld days, expect problems", |
0a87075b | 543 | mod_displayname, delta); |
81204be8 EM |
544 | sendto_realops_snomask(SNO_GENERAL, L_ALL, |
545 | "Module %s build date is out of sync with ircd build date by %ld days, expect problems", | |
0a87075b | 546 | mod_displayname, delta); |
81204be8 EM |
547 | } |
548 | } | |
549 | ||
8e9c6a75 EM |
550 | if(mheader->mapi_command_list) |
551 | { | |
552 | struct Message **m; | |
553 | for (m = mheader->mapi_command_list; *m; ++m) | |
554 | mod_add_cmd(*m); | |
555 | } | |
556 | ||
557 | if(mheader->mapi_hook_list) | |
558 | { | |
559 | mapi_hlist_av1 *m; | |
560 | for (m = mheader->mapi_hook_list; m->hapi_name; ++m) | |
561 | *m->hapi_id = register_hook(m->hapi_name); | |
562 | } | |
563 | ||
564 | if(mheader->mapi_hfn_list) | |
565 | { | |
566 | mapi_hfn_list_av1 *m; | |
567 | for (m = mheader->mapi_hfn_list; m->hapi_name; ++m) | |
568 | add_hook(m->hapi_name, m->fn); | |
569 | } | |
570 | ||
571 | /* New in MAPI v2 - version replacement */ | |
572 | ver = mheader->mapi_module_version ? mheader->mapi_module_version : ircd_version; | |
573 | description = mheader->mapi_module_description; | |
574 | ||
575 | if(mheader->mapi_cap_list) | |
576 | { | |
577 | mapi_cap_list_av2 *m; | |
578 | for (m = mheader->mapi_cap_list; m->cap_name; ++m) | |
579 | { | |
580 | struct CapabilityIndex *idx; | |
581 | int result; | |
582 | ||
978b7232 | 583 | switch (m->cap_index) |
8e9c6a75 EM |
584 | { |
585 | case MAPI_CAP_CLIENT: | |
586 | idx = cli_capindex; | |
587 | break; | |
588 | case MAPI_CAP_SERVER: | |
589 | idx = serv_capindex; | |
590 | break; | |
591 | default: | |
592 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
593 | "Unknown/unsupported CAP index found of type %d on capability %s when loading %s", | |
0a87075b | 594 | m->cap_index, m->cap_name, mod_displayname); |
8e9c6a75 EM |
595 | ilog(L_MAIN, |
596 | "Unknown/unsupported CAP index found of type %d on capability %s when loading %s", | |
0a87075b | 597 | m->cap_index, m->cap_name, mod_displayname); |
8e9c6a75 EM |
598 | continue; |
599 | } | |
600 | ||
601 | result = capability_put(idx, m->cap_name, m->cap_ownerdata); | |
602 | if (m->cap_id != NULL) | |
3256156a | 603 | { |
8e9c6a75 | 604 | *(m->cap_id) = result; |
3256156a EM |
605 | sendto_local_clients_with_capability(CLICAP_CAP_NOTIFY, ":%s CAP * ADD :%s", me.name, m->cap_name); |
606 | } | |
8e9c6a75 EM |
607 | } |
608 | } | |
609 | } | |
0e5bf029 EM |
610 | |
611 | break; | |
212380e3 AC |
612 | default: |
613 | ilog(L_MAIN, "Module %s has unknown/unsupported MAPI version %d.", | |
0a87075b | 614 | mod_displayname, MAPI_VERSION(*mapi_version)); |
212380e3 AC |
615 | sendto_realops_snomask(SNO_GENERAL, L_ALL, |
616 | "Module %s has unknown/unsupported MAPI version %d.", | |
0a87075b | 617 | mod_displayname, *mapi_version); |
f272e7ab | 618 | lt_dlclose(tmpptr); |
0a87075b | 619 | rb_free(mod_displayname); |
aa483e55 | 620 | return false; |
212380e3 AC |
621 | } |
622 | ||
623 | if(ver == NULL) | |
624 | ver = unknown_ver; | |
625 | ||
8e9c6a75 EM |
626 | if(description == NULL) |
627 | description = unknown_description; | |
628 | ||
e55a9d6a AC |
629 | mod = rb_malloc(sizeof(struct module)); |
630 | mod->address = tmpptr; | |
631 | mod->version = ver; | |
632 | mod->description = description; | |
633 | mod->core = core; | |
634 | mod->name = rb_strdup(mod_displayname); | |
635 | mod->mapi_header = mapi_version; | |
636 | mod->mapi_version = MAPI_VERSION(*mapi_version); | |
637 | mod->origin = origin; | |
638 | rb_dlinkAdd(mod, &mod->node, &module_list); | |
212380e3 | 639 | |
aa483e55 | 640 | if(warn) |
212380e3 | 641 | { |
c63aeb44 EM |
642 | const char *o; |
643 | ||
978b7232 | 644 | switch (origin) |
c63aeb44 | 645 | { |
c63aeb44 EM |
646 | case MAPI_ORIGIN_EXTENSION: |
647 | o = "extension"; | |
648 | break; | |
649 | case MAPI_ORIGIN_CORE: | |
650 | o = "core"; | |
651 | break; | |
652 | default: | |
653 | o = "unknown"; | |
654 | break; | |
655 | } | |
656 | ||
212380e3 | 657 | sendto_realops_snomask(SNO_GENERAL, L_ALL, |
02831b6f | 658 | "Module %s [version: %s; MAPI version: %d; origin: %s; description: \"%s\"] loaded at %p", |
0a87075b | 659 | mod_displayname, ver, MAPI_VERSION(*mapi_version), o, description, |
02831b6f AC |
660 | (void *) tmpptr); |
661 | ilog(L_MAIN, "Module %s [version: %s; MAPI version: %d; origin: %s; description: \"%s\"] loaded at %p", | |
0a87075b | 662 | mod_displayname, ver, MAPI_VERSION(*mapi_version), o, description, (void *) tmpptr); |
212380e3 | 663 | } |
0a87075b | 664 | rb_free(mod_displayname); |
aa483e55 | 665 | return true; |
212380e3 | 666 | } |
41390bfe AJ |
667 | |
668 | void | |
669 | modules_do_restart(void *unused) | |
670 | { | |
671 | unsigned int modnum = 0; | |
672 | rb_dlink_node *ptr, *nptr; | |
673 | ||
674 | RB_DLINK_FOREACH_SAFE(ptr, nptr, module_list.head) | |
675 | { | |
676 | struct module *mod = ptr->data; | |
677 | if(!unload_one_module(mod->name, false)) | |
678 | { | |
679 | ilog(L_MAIN, "Module Restart: %s was not unloaded %s", | |
680 | mod->name, | |
681 | mod->core? "(core module)" : ""); | |
682 | ||
683 | if(!mod->core) | |
684 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, | |
685 | "Module Restart: %s failed to unload", | |
686 | mod->name); | |
687 | continue; | |
688 | } | |
689 | ||
690 | modnum++; | |
691 | } | |
692 | ||
693 | load_all_modules(false); | |
694 | load_core_modules(false); | |
695 | rehash(false); | |
696 | ||
697 | sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, | |
698 | "Module Restart: %u modules unloaded, %lu modules loaded", | |
699 | modnum, rb_dlink_list_length(&module_list)); | |
700 | ilog(L_MAIN, "Module Restart: %u modules unloaded, %lu modules loaded", modnum, rb_dlink_list_length(&module_list)); | |
701 | } |