]>
Commit | Line | Data |
---|---|---|
1 | /* | |
2 | * charybdis: an advanced ircd. | |
3 | * parse.c: The message parser. | |
4 | * | |
5 | * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center | |
6 | * Copyright (C) 1996-2002 Hybrid Development Team | |
7 | * Copyright (C) 2002-2005 ircd-ratbox development team | |
8 | * Copyright (C) 2007-2016 William Pitcock | |
9 | * | |
10 | * This program is free software; you can redistribute it and/or modify | |
11 | * it under the terms of the GNU General Public License as published by | |
12 | * the Free Software Foundation; either version 2 of the License, or | |
13 | * (at your option) any later version. | |
14 | * | |
15 | * This program is distributed in the hope that it will be useful, | |
16 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
17 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
18 | * GNU General Public License for more details. | |
19 | * | |
20 | * You should have received a copy of the GNU General Public License | |
21 | * along with this program; if not, write to the Free Software | |
22 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 | |
23 | * USA | |
24 | */ | |
25 | ||
26 | #include "stdinc.h" | |
27 | #include "parse.h" | |
28 | #include "client.h" | |
29 | #include "channel.h" | |
30 | #include "hash.h" | |
31 | #include "match.h" | |
32 | #include "ircd.h" | |
33 | #include "numeric.h" | |
34 | #include "logger.h" | |
35 | #include "s_stats.h" | |
36 | #include "send.h" | |
37 | #include "msg.h" | |
38 | #include "msgbuf.h" | |
39 | #include "s_conf.h" | |
40 | #include "s_serv.h" | |
41 | #include "packet.h" | |
42 | #include "s_assert.h" | |
43 | ||
44 | rb_dictionary *cmd_dict = NULL; | |
45 | rb_dictionary *alias_dict = NULL; | |
46 | ||
47 | static void cancel_clients(struct Client *, struct Client *); | |
48 | static void remove_unknown(struct Client *, const char *, char *); | |
49 | ||
50 | static void do_numeric(int, struct Client *, struct Client *, int, const char **); | |
51 | ||
52 | static int handle_command(struct Message *, struct MsgBuf *, struct Client *, struct Client *); | |
53 | ||
54 | static char buffer[1024]; | |
55 | ||
56 | /* turn a string into a parc/parv pair */ | |
57 | ||
58 | char *reconstruct_parv(int parc, const char *parv[]) | |
59 | { | |
60 | static char tmpbuf[BUFSIZE]; int i; | |
61 | ||
62 | rb_strlcpy(tmpbuf, parv[0], BUFSIZE); | |
63 | for (i = 1; i < parc; i++) | |
64 | { | |
65 | rb_strlcat(tmpbuf, " ", BUFSIZE); | |
66 | rb_strlcat(tmpbuf, parv[i], BUFSIZE); | |
67 | } | |
68 | return tmpbuf; | |
69 | } | |
70 | ||
71 | /* parse() | |
72 | * | |
73 | * given a raw buffer, parses it and generates parv and parc | |
74 | */ | |
75 | void | |
76 | parse(struct Client *client_p, char *pbuffer, char *bufend) | |
77 | { | |
78 | struct Client *from = client_p; | |
79 | char *end; | |
80 | int res; | |
81 | int numeric = 0; | |
82 | struct Message *mptr; | |
83 | struct MsgBuf msgbuf; | |
84 | ||
85 | s_assert(MyConnect(client_p)); | |
86 | s_assert(client_p->localClient->F != NULL); | |
87 | if(IsAnyDead(client_p)) | |
88 | return; | |
89 | ||
90 | end = bufend - 1; | |
91 | ||
92 | /* XXX this should be done before parse() is called */ | |
93 | if(*end == '\n') | |
94 | *end-- = '\0'; | |
95 | if(*end == '\r') | |
96 | *end = '\0'; | |
97 | ||
98 | res = msgbuf_parse(&msgbuf, pbuffer); | |
99 | if (res) | |
100 | { | |
101 | ServerStats.is_empt++; | |
102 | return; | |
103 | } | |
104 | ||
105 | if (msgbuf.origin != NULL && IsServer(client_p)) | |
106 | { | |
107 | from = find_client(msgbuf.origin); | |
108 | ||
109 | /* didnt find any matching client, issue a kill */ | |
110 | if(from == NULL) | |
111 | { | |
112 | ServerStats.is_unpf++; | |
113 | remove_unknown(client_p, msgbuf.origin, pbuffer); | |
114 | return; | |
115 | } | |
116 | ||
117 | /* fake direction, hmm. */ | |
118 | if(from->from != client_p) | |
119 | { | |
120 | ServerStats.is_wrdi++; | |
121 | cancel_clients(client_p, from); | |
122 | return; | |
123 | } | |
124 | } | |
125 | ||
126 | if(IsDigit(*msgbuf.cmd) && IsDigit(*(msgbuf.cmd + 1)) && IsDigit(*(msgbuf.cmd + 2))) | |
127 | { | |
128 | mptr = NULL; | |
129 | numeric = atoi(msgbuf.cmd); | |
130 | ServerStats.is_num++; | |
131 | } | |
132 | else | |
133 | { | |
134 | mptr = rb_dictionary_retrieve(cmd_dict, msgbuf.cmd); | |
135 | ||
136 | /* no command or its encap only, error */ | |
137 | if(!mptr || !mptr->cmd) | |
138 | { | |
139 | if(IsPerson(from)) | |
140 | { | |
141 | sendto_one(from, form_str(ERR_UNKNOWNCOMMAND), | |
142 | me.name, from->name, msgbuf.cmd); | |
143 | } | |
144 | ServerStats.is_unco++; | |
145 | return; | |
146 | } | |
147 | ||
148 | mptr->bytes += msgbuf.parselen; | |
149 | } | |
150 | ||
151 | if(mptr == NULL) | |
152 | { | |
153 | do_numeric(numeric, client_p, from, msgbuf.n_para, msgbuf.para); | |
154 | return; | |
155 | } | |
156 | ||
157 | if(handle_command(mptr, &msgbuf, client_p, from) < -1) | |
158 | { | |
159 | char *p; | |
160 | for (p = pbuffer; p <= end; p += 8) | |
161 | { | |
162 | /* HACK HACK */ | |
163 | /* Its expected this nasty code can be removed | |
164 | * or rewritten later if still needed. | |
165 | */ | |
166 | if((p + 8) > end) | |
167 | { | |
168 | for (; p <= end; p++) | |
169 | { | |
170 | ilog(L_MAIN, "%02x |%c", p[0], p[0]); | |
171 | } | |
172 | } | |
173 | else | |
174 | ilog(L_MAIN, | |
175 | "%02x %02x %02x %02x %02x %02x %02x %02x |%c%c%c%c%c%c%c%c", | |
176 | p[0], p[1], p[2], p[3], p[4], p[5], | |
177 | p[6], p[7], p[0], p[1], p[2], p[3], p[4], p[5], p[6], p[7]); | |
178 | } | |
179 | } | |
180 | ||
181 | } | |
182 | ||
183 | /* | |
184 | * handle_command | |
185 | * | |
186 | * inputs - pointer to message block | |
187 | * - pointer to message buffer | |
188 | * - pointer to client | |
189 | * - pointer to client message is from | |
190 | * output - -1 if error from server | |
191 | * side effects - | |
192 | */ | |
193 | static int | |
194 | handle_command(struct Message *mptr, struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *from) | |
195 | { | |
196 | struct MessageEntry ehandler; | |
197 | MessageHandler handler = 0; | |
198 | char squitreason[80]; | |
199 | ||
200 | if(IsAnyDead(client_p)) | |
201 | return -1; | |
202 | ||
203 | if(IsServer(client_p)) | |
204 | mptr->rcount++; | |
205 | ||
206 | mptr->count++; | |
207 | ||
208 | ehandler = mptr->handlers[from->handler]; | |
209 | handler = ehandler.handler; | |
210 | ||
211 | /* check right amount of params is passed... --is */ | |
212 | if(msgbuf_p->n_para < ehandler.min_para || | |
213 | (ehandler.min_para && EmptyString(msgbuf_p->para[ehandler.min_para - 1]))) | |
214 | { | |
215 | if(!IsServer(client_p)) | |
216 | { | |
217 | sendto_one(client_p, form_str(ERR_NEEDMOREPARAMS), | |
218 | me.name, | |
219 | EmptyString(client_p->name) ? "*" : client_p->name, | |
220 | mptr->cmd); | |
221 | if(MyClient(client_p)) | |
222 | return (1); | |
223 | else | |
224 | return (-1); | |
225 | } | |
226 | ||
227 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
228 | "Dropping server %s due to (invalid) command '%s'" | |
229 | " with only %zu arguments (expecting %zu).", | |
230 | client_p->name, mptr->cmd, msgbuf_p->n_para, ehandler.min_para); | |
231 | ilog(L_SERVER, | |
232 | "Insufficient parameters (%zu < %zu) for command '%s' from %s.", | |
233 | msgbuf_p->n_para, ehandler.min_para, mptr->cmd, client_p->name); | |
234 | snprintf(squitreason, sizeof squitreason, | |
235 | "Insufficient parameters (%zu < %zu) for command '%s'", | |
236 | msgbuf_p->n_para, ehandler.min_para, mptr->cmd); | |
237 | exit_client(client_p, client_p, client_p, squitreason); | |
238 | return (-1); | |
239 | } | |
240 | ||
241 | (*handler) (msgbuf_p, client_p, from, msgbuf_p->n_para, msgbuf_p->para); | |
242 | return (1); | |
243 | } | |
244 | ||
245 | void | |
246 | handle_encap(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, | |
247 | const char *command, int parc, const char *parv[]) | |
248 | { | |
249 | struct Message *mptr; | |
250 | struct MessageEntry ehandler; | |
251 | MessageHandler handler = 0; | |
252 | ||
253 | mptr = rb_dictionary_retrieve(cmd_dict, command); | |
254 | ||
255 | if(mptr == NULL || mptr->cmd == NULL) | |
256 | return; | |
257 | ||
258 | ehandler = mptr->handlers[ENCAP_HANDLER]; | |
259 | handler = ehandler.handler; | |
260 | ||
261 | if((size_t)parc < ehandler.min_para || | |
262 | (ehandler.min_para && EmptyString(parv[ehandler.min_para - 1]))) | |
263 | return; | |
264 | ||
265 | (*handler) (msgbuf_p, client_p, source_p, parc, parv); | |
266 | } | |
267 | ||
268 | /* | |
269 | * clear_hash_parse() | |
270 | * | |
271 | * inputs - | |
272 | * output - NONE | |
273 | * side effects - MUST MUST be called at startup ONCE before | |
274 | * any other keyword hash routine is used. | |
275 | */ | |
276 | void | |
277 | clear_hash_parse() | |
278 | { | |
279 | cmd_dict = rb_dictionary_create("command", rb_strcasecmp); | |
280 | } | |
281 | ||
282 | /* mod_add_cmd | |
283 | * | |
284 | * inputs - command name | |
285 | * - pointer to struct Message | |
286 | * output - none | |
287 | * side effects - load this one command name | |
288 | * msg->count msg->bytes is modified in place, in | |
289 | * modules address space. Might not want to do that... | |
290 | */ | |
291 | void | |
292 | mod_add_cmd(struct Message *msg) | |
293 | { | |
294 | s_assert(msg != NULL); | |
295 | if(msg == NULL) | |
296 | return; | |
297 | ||
298 | if (rb_dictionary_find(cmd_dict, msg->cmd) != NULL) { | |
299 | s_assert(0); | |
300 | return; | |
301 | } | |
302 | ||
303 | msg->count = 0; | |
304 | msg->rcount = 0; | |
305 | msg->bytes = 0; | |
306 | ||
307 | rb_dictionary_add(cmd_dict, msg->cmd, msg); | |
308 | } | |
309 | ||
310 | /* mod_del_cmd | |
311 | * | |
312 | * inputs - command name | |
313 | * output - none | |
314 | * side effects - unload this one command name | |
315 | */ | |
316 | void | |
317 | mod_del_cmd(struct Message *msg) | |
318 | { | |
319 | s_assert(msg != NULL); | |
320 | if(msg == NULL) | |
321 | return; | |
322 | ||
323 | if (rb_dictionary_delete(cmd_dict, msg->cmd) == NULL) | |
324 | s_assert(0); | |
325 | } | |
326 | ||
327 | /* cancel_clients() | |
328 | * | |
329 | * inputs - client who sent us the message, client with fake | |
330 | * direction | |
331 | * outputs - a given warning about the fake direction | |
332 | * side effects - | |
333 | */ | |
334 | static void | |
335 | cancel_clients(struct Client *client_p, struct Client *source_p) | |
336 | { | |
337 | /* ok, fake prefix happens naturally during a burst on a nick | |
338 | * collision with TS5, we cant kill them because one client has to | |
339 | * survive, so we just send an error. | |
340 | */ | |
341 | if(IsServer(source_p) || IsMe(source_p)) | |
342 | { | |
343 | sendto_realops_snomask(SNO_DEBUG, L_ALL, | |
344 | "Message for %s[%s] from %s", | |
345 | source_p->name, source_p->from->name, | |
346 | client_p->name); | |
347 | } | |
348 | else | |
349 | { | |
350 | sendto_realops_snomask(SNO_DEBUG, L_ALL, | |
351 | "Message for %s[%s@%s!%s] from %s (TS, ignored)", | |
352 | source_p->name, | |
353 | source_p->username, | |
354 | source_p->host, | |
355 | source_p->from->name, | |
356 | client_p->name); | |
357 | } | |
358 | } | |
359 | ||
360 | /* remove_unknown() | |
361 | * | |
362 | * inputs - client who gave us message, supposed sender, buffer | |
363 | * output - | |
364 | * side effects - kills issued for clients, squits for servers | |
365 | */ | |
366 | static void | |
367 | remove_unknown(struct Client *client_p, const char *lsender, char *lbuffer) | |
368 | { | |
369 | int slen = strlen(lsender); | |
370 | char sid[4]; | |
371 | struct Client *server; | |
372 | ||
373 | /* meepfoo is a nickname (ignore) | |
374 | * #XXXXXXXX is a UID (KILL) | |
375 | * #XX is a SID (SQUIT) | |
376 | * meep.foo is a server (SQUIT) | |
377 | */ | |
378 | if((IsDigit(lsender[0]) && slen == 3) || | |
379 | (strchr(lsender, '.') != NULL)) | |
380 | { | |
381 | sendto_realops_snomask(SNO_DEBUG, L_ALL, | |
382 | "Unknown prefix (%s) from %s, Squitting %s", | |
383 | lbuffer, client_p->name, lsender); | |
384 | ||
385 | sendto_one(client_p, | |
386 | ":%s SQUIT %s :(Unknown prefix (%s) from %s)", | |
387 | get_id(&me, client_p), lsender, | |
388 | lbuffer, client_p->name); | |
389 | } | |
390 | else if(!IsDigit(lsender[0])) | |
391 | ; | |
392 | else if(slen != 9) | |
393 | sendto_realops_snomask(SNO_DEBUG, L_ALL, | |
394 | "Invalid prefix (%s) from %s", | |
395 | lbuffer, client_p->name); | |
396 | else | |
397 | { | |
398 | memcpy(sid, lsender, 3); | |
399 | sid[3] = '\0'; | |
400 | server = find_server(NULL, sid); | |
401 | if (server != NULL && server->from == client_p) | |
402 | sendto_one(client_p, ":%s KILL %s :%s (Unknown Client)", | |
403 | get_id(&me, client_p), lsender, me.name); | |
404 | } | |
405 | } | |
406 | ||
407 | ||
408 | ||
409 | /* | |
410 | * | |
411 | * parc number of arguments ('sender' counted as one!) | |
412 | * parv[1]..parv[parc-1] | |
413 | * pointers to additional parameters, this is a NULL | |
414 | * terminated list (parv[parc] == NULL). | |
415 | * | |
416 | * *WARNING* | |
417 | * Numerics are mostly error reports. If there is something | |
418 | * wrong with the message, just *DROP* it! Don't even think of | |
419 | * sending back a neat error message -- big danger of creating | |
420 | * a ping pong error message... | |
421 | */ | |
422 | static void | |
423 | do_numeric(int numeric, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) | |
424 | { | |
425 | struct Client *target_p; | |
426 | struct Channel *chptr; | |
427 | ||
428 | if(parc < 2 || !IsServer(source_p)) | |
429 | return; | |
430 | ||
431 | /* Remap low number numerics. */ | |
432 | if(numeric < 100) | |
433 | numeric += 100; | |
434 | ||
435 | /* | |
436 | * Prepare the parameter portion of the message into 'buffer'. | |
437 | * (Because the buffer is twice as large as the message buffer | |
438 | * for the socket, no overflow can occur here... ...on current | |
439 | * assumptions--bets are off, if these are changed --msa) | |
440 | * Note: if buffer is non-empty, it will begin with SPACE. | |
441 | */ | |
442 | if(parc > 1) | |
443 | { | |
444 | char *t = buffer; /* Current position within the buffer */ | |
445 | int i; | |
446 | int tl; /* current length of presently being built string in t */ | |
447 | for (i = 2; i < (parc - 1); i++) | |
448 | { | |
449 | tl = sprintf(t, " %s", parv[i]); | |
450 | t += tl; | |
451 | } | |
452 | sprintf(t, " :%s", parv[parc - 1]); | |
453 | } | |
454 | ||
455 | if((target_p = find_client(parv[1])) != NULL) | |
456 | { | |
457 | if(IsMe(target_p)) | |
458 | { | |
459 | /* | |
460 | * We shouldn't get numerics sent to us, | |
461 | * any numerics we do get indicate a bug somewhere.. | |
462 | */ | |
463 | /* ugh. this is here because of nick collisions. when two servers | |
464 | * relink, they burst each other their nicks, then perform collides. | |
465 | * if there is a nick collision, BOTH servers will kill their own | |
466 | * nicks, and BOTH will kill the other servers nick, which wont exist, | |
467 | * because it will have been already killed by the local server. | |
468 | * | |
469 | * unfortunately, as we cant guarantee other servers will do the | |
470 | * "right thing" on a nick collision, we have to keep both kills. | |
471 | * ergo we need to ignore ERR_NOSUCHNICK. --fl_ | |
472 | */ | |
473 | /* quick comment. This _was_ tried. i.e. assume the other servers | |
474 | * will do the "right thing" and kill a nick that is colliding. | |
475 | * unfortunately, it did not work. --Dianora | |
476 | */ | |
477 | /* note, now we send PING on server connect, we can | |
478 | * also get ERR_NOSUCHSERVER.. | |
479 | */ | |
480 | if(numeric != ERR_NOSUCHNICK && | |
481 | numeric != ERR_NOSUCHSERVER) | |
482 | sendto_realops_snomask(SNO_GENERAL, L_ADMIN, | |
483 | "*** %s(via %s) sent a %03d numeric to me: %s", | |
484 | source_p->name, | |
485 | client_p->name, numeric, buffer); | |
486 | return; | |
487 | } | |
488 | else if(target_p->from == client_p) | |
489 | { | |
490 | /* This message changed direction (nick collision?) | |
491 | * ignore it. | |
492 | */ | |
493 | return; | |
494 | } | |
495 | ||
496 | /* csircd will send out unknown umode flag for +a (admin), drop it here. */ | |
497 | if(numeric == ERR_UMODEUNKNOWNFLAG && MyClient(target_p)) | |
498 | return; | |
499 | ||
500 | /* Fake it for server hiding, if its our client */ | |
501 | sendto_one(target_p, ":%s %03d %s%s", | |
502 | get_id(source_p, target_p), numeric, | |
503 | get_id(target_p, target_p), buffer); | |
504 | return; | |
505 | } | |
506 | else if((chptr = find_channel(parv[1])) != NULL) | |
507 | sendto_channel_flags(client_p, ALL_MEMBERS, source_p, chptr, | |
508 | "%03d %s%s", | |
509 | numeric, chptr->chname, buffer); | |
510 | } | |
511 | ||
512 | void | |
513 | m_not_oper(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) | |
514 | { | |
515 | sendto_one_numeric(source_p, ERR_NOPRIVILEGES, form_str(ERR_NOPRIVILEGES)); | |
516 | } | |
517 | ||
518 | void | |
519 | m_unregistered(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) | |
520 | { | |
521 | if(IsAnyServer(client_p)) | |
522 | return; | |
523 | ||
524 | /* bit of a hack. | |
525 | * I don't =really= want to waste a bit in a flag | |
526 | * number_of_nick_changes is only really valid after the client | |
527 | * is fully registered.. | |
528 | */ | |
529 | if(client_p->localClient->number_of_nick_changes == 0) | |
530 | { | |
531 | sendto_one(client_p, form_str(ERR_NOTREGISTERED), me.name); | |
532 | client_p->localClient->number_of_nick_changes++; | |
533 | } | |
534 | } | |
535 | ||
536 | void | |
537 | m_registered(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) | |
538 | { | |
539 | sendto_one(client_p, form_str(ERR_ALREADYREGISTRED), me.name, source_p->name); | |
540 | } | |
541 | ||
542 | void | |
543 | m_ignore(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) | |
544 | { | |
545 | /* Does nothing */ | |
546 | } |