2 * ircd-ratbox: an advanced Internet Relay Chat Daemon(ircd).
3 * s_newconf.c - code for dealing with conf stuff
5 * Copyright (C) 2004 Lee Hardy <lee@leeh.co.uk>
6 * Copyright (C) 2004-2005 ircd-ratbox development team
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
12 * 1.Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
14 * 2.Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3.The name of the author may not be used to endorse or promote products
18 * derived from this software without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
21 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
22 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
23 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
24 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
26 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
28 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
29 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
34 #include "ircd_defs.h"
36 #include "s_newconf.h"
43 #include "rb_dictionary.h"
44 #include "rb_radixtree.h"
49 rb_dlink_list shared_conf_list
;
50 rb_dlink_list cluster_conf_list
;
51 rb_dlink_list oper_conf_list
;
52 rb_dlink_list hubleaf_conf_list
;
53 rb_dlink_list server_conf_list
;
54 rb_dlink_list xline_conf_list
;
55 rb_dlink_list resv_conf_list
; /* nicks only! */
56 rb_dlink_list nd_list
; /* nick delay */
57 rb_dlink_list tgchange_list
;
59 rb_patricia_tree_t
*tgchange_tree
;
61 static rb_bh
*nd_heap
= NULL
;
63 static void expire_temp_rxlines(void *unused
);
64 static void expire_nd_entries(void *unused
);
66 struct ev_entry
*expire_nd_entries_ev
= NULL
;
67 struct ev_entry
*expire_temp_rxlines_ev
= NULL
;
72 tgchange_tree
= rb_new_patricia(PATRICIA_BITS
);
73 nd_heap
= rb_bh_create(sizeof(struct nd_entry
), ND_HEAP_SIZE
, "nd_heap");
74 expire_nd_entries_ev
= rb_event_addish("expire_nd_entries", expire_nd_entries
, NULL
, 30);
75 expire_temp_rxlines_ev
= rb_event_addish("expire_temp_rxlines", expire_temp_rxlines
, NULL
, 60);
81 struct server_conf
*server_p
;
83 rb_dlink_node
*next_ptr
;
85 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, shared_conf_list
.head
)
87 /* ptr here is ptr->data->node */
88 rb_dlinkDelete(ptr
, &shared_conf_list
);
89 free_remote_conf(ptr
->data
);
92 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, cluster_conf_list
.head
)
94 rb_dlinkDelete(ptr
, &cluster_conf_list
);
95 free_remote_conf(ptr
->data
);
98 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, hubleaf_conf_list
.head
)
100 rb_dlinkDelete(ptr
, &hubleaf_conf_list
);
101 free_remote_conf(ptr
->data
);
104 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, oper_conf_list
.head
)
106 free_oper_conf(ptr
->data
);
107 rb_dlinkDestroy(ptr
, &oper_conf_list
);
110 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, server_conf_list
.head
)
112 server_p
= ptr
->data
;
114 if(!server_p
->servers
)
116 rb_dlinkDelete(ptr
, &server_conf_list
);
117 free_server_conf(ptr
->data
);
120 server_p
->flags
|= SERVER_ILLEGAL
;
125 clear_s_newconf_bans(void)
127 struct ConfItem
*aconf
;
128 rb_dlink_node
*ptr
, *next_ptr
;
130 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, xline_conf_list
.head
)
138 rb_dlinkDestroy(ptr
, &xline_conf_list
);
141 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, resv_conf_list
.head
)
150 rb_dlinkDestroy(ptr
, &resv_conf_list
);
157 make_remote_conf(void)
159 struct remote_conf
*remote_p
= rb_malloc(sizeof(struct remote_conf
));
164 free_remote_conf(struct remote_conf
*remote_p
)
166 s_assert(remote_p
!= NULL
);
170 rb_free(remote_p
->username
);
171 rb_free(remote_p
->host
);
172 rb_free(remote_p
->server
);
177 find_shared_conf(const char *username
, const char *host
,
178 const char *server
, int flags
)
180 struct remote_conf
*shared_p
;
183 RB_DLINK_FOREACH(ptr
, shared_conf_list
.head
)
185 shared_p
= ptr
->data
;
187 if(match(shared_p
->username
, username
) &&
188 match(shared_p
->host
, host
) &&
189 match(shared_p
->server
, server
))
191 if(shared_p
->flags
& flags
)
202 propagate_generic(struct Client
*source_p
, const char *command
,
203 const char *target
, int cap
, const char *format
, ...)
205 char buffer
[BUFSIZE
];
208 va_start(args
, format
);
209 vsnprintf(buffer
, sizeof(buffer
), format
, args
);
212 sendto_match_servs(source_p
, target
, cap
, NOCAPS
,
214 command
, target
, buffer
);
215 sendto_match_servs(source_p
, target
, CAP_ENCAP
, cap
,
217 target
, command
, buffer
);
221 cluster_generic(struct Client
*source_p
, const char *command
,
222 int cltype
, int cap
, const char *format
, ...)
224 char buffer
[BUFSIZE
];
225 struct remote_conf
*shared_p
;
229 va_start(args
, format
);
230 vsnprintf(buffer
, sizeof(buffer
), format
, args
);
233 RB_DLINK_FOREACH(ptr
, cluster_conf_list
.head
)
235 shared_p
= ptr
->data
;
237 if(!(shared_p
->flags
& cltype
))
240 sendto_match_servs(source_p
, shared_p
->server
, cap
, NOCAPS
,
242 command
, shared_p
->server
, buffer
);
243 sendto_match_servs(source_p
, shared_p
->server
, CAP_ENCAP
, cap
,
245 shared_p
->server
, command
, buffer
);
252 struct oper_conf
*oper_p
= rb_malloc(sizeof(struct oper_conf
));
257 free_oper_conf(struct oper_conf
*oper_p
)
259 s_assert(oper_p
!= NULL
);
263 rb_free(oper_p
->username
);
264 rb_free(oper_p
->host
);
265 rb_free(oper_p
->name
);
266 rb_free(oper_p
->certfp
);
270 memset(oper_p
->passwd
, 0, strlen(oper_p
->passwd
));
271 rb_free(oper_p
->passwd
);
274 #ifdef HAVE_LIBCRYPTO
275 rb_free(oper_p
->rsa_pubkey_file
);
277 if(oper_p
->rsa_pubkey
)
278 RSA_free(oper_p
->rsa_pubkey
);
285 find_oper_conf(const char *username
, const char *host
, const char *locip
, const char *name
)
287 struct oper_conf
*oper_p
;
288 struct rb_sockaddr_storage ip
, cip
;
289 char addr
[HOSTLEN
+1];
293 parse_netmask(locip
, &cip
, &cbits
);
295 RB_DLINK_FOREACH(ptr
, oper_conf_list
.head
)
299 /* name/username doesnt match.. */
300 if(irccmp(oper_p
->name
, name
) || !match(oper_p
->username
, username
))
303 rb_strlcpy(addr
, oper_p
->host
, sizeof(addr
));
305 if(parse_netmask(addr
, &ip
, &bits
) != HM_HOST
)
307 if(GET_SS_FAMILY(&ip
) == GET_SS_FAMILY(&cip
) &&
308 comp_with_mask_sock((struct sockaddr
*)&ip
, (struct sockaddr
*)&cip
, bits
))
312 /* we have to compare against the host as well, because its
313 * valid to set a spoof to an IP, which if we only compare
314 * in ip form to sockhost will not necessarily match --anfl
316 if(match(oper_p
->host
, host
))
324 make_server_conf(void)
326 struct server_conf
*server_p
= rb_malloc(sizeof(struct server_conf
));
328 SET_SS_FAMILY(&server_p
->connect4
, AF_UNSPEC
);
329 SET_SS_LEN(&server_p
->connect4
, sizeof(struct sockaddr_in
));
331 SET_SS_FAMILY(&server_p
->bind4
, AF_UNSPEC
);
332 SET_SS_LEN(&server_p
->bind4
, sizeof(struct sockaddr_in
));
335 SET_SS_FAMILY(&server_p
->connect6
, AF_UNSPEC
);
336 SET_SS_LEN(&server_p
->connect6
, sizeof(struct sockaddr_in6
));
338 SET_SS_FAMILY(&server_p
->bind6
, AF_UNSPEC
);
339 SET_SS_LEN(&server_p
->bind6
, sizeof(struct sockaddr_in6
));
342 server_p
->aftype
= AF_UNSPEC
;
348 free_server_conf(struct server_conf
*server_p
)
350 s_assert(server_p
!= NULL
);
354 if(!EmptyString(server_p
->passwd
))
356 memset(server_p
->passwd
, 0, strlen(server_p
->passwd
));
357 rb_free(server_p
->passwd
);
360 if(!EmptyString(server_p
->spasswd
))
362 memset(server_p
->spasswd
, 0, strlen(server_p
->spasswd
));
363 rb_free(server_p
->spasswd
);
366 rb_free(server_p
->name
);
367 rb_free(server_p
->connect_host
);
368 rb_free(server_p
->bind_host
);
369 rb_free(server_p
->class_name
);
370 rb_free(server_p
->certfp
);
375 * conf_connect_dns_callback
376 * inputs - pointer to struct ConfItem
377 * - pointer to adns reply
379 * side effects - called when resolver query finishes
380 * if the query resulted in a successful search, hp will contain
381 * a non-null pointer, otherwise hp will be null.
382 * if successful save hp in the conf item it was called with
385 conf_connect_dns_callback(const char *result
, int status
, int aftype
, void *data
)
387 struct server_conf
*server_p
= data
;
389 if(aftype
== AF_INET
)
392 rb_inet_pton_sock(result
, (struct sockaddr
*)&server_p
->connect4
);
394 server_p
->dns_query_connect4
= 0;
397 else if(aftype
== AF_INET6
)
400 rb_inet_pton_sock(result
, (struct sockaddr
*)&server_p
->connect6
);
402 server_p
->dns_query_connect6
= 0;
408 * conf_bind_dns_callback
409 * inputs - pointer to struct ConfItem
410 * - pointer to adns reply
412 * side effects - called when resolver query finishes
413 * if the query resulted in a successful search, hp will contain
414 * a non-null pointer, otherwise hp will be null.
415 * if successful save hp in the conf item it was called with
418 conf_bind_dns_callback(const char *result
, int status
, int aftype
, void *data
)
420 struct server_conf
*server_p
= data
;
422 if(aftype
== AF_INET
)
425 rb_inet_pton_sock(result
, (struct sockaddr
*)&server_p
->bind4
);
427 server_p
->dns_query_bind4
= 0;
430 else if(aftype
== AF_INET6
)
433 rb_inet_pton_sock(result
, (struct sockaddr
*)&server_p
->bind6
);
435 server_p
->dns_query_bind6
= 0;
441 add_server_conf(struct server_conf
*server_p
)
443 if(EmptyString(server_p
->class_name
))
445 server_p
->class_name
= rb_strdup("default");
446 server_p
->class = default_class
;
450 server_p
->class = find_class(server_p
->class_name
);
452 if(server_p
->class == default_class
)
454 conf_report_error("Warning connect::class invalid for %s",
457 rb_free(server_p
->class_name
);
458 server_p
->class_name
= rb_strdup("default");
461 if(server_p
->connect_host
&& !strpbrk(server_p
->connect_host
, "*?"))
463 server_p
->dns_query_connect4
=
464 lookup_hostname(server_p
->connect_host
, AF_INET
, conf_connect_dns_callback
, server_p
);
466 server_p
->dns_query_connect6
=
467 lookup_hostname(server_p
->connect_host
, AF_INET6
, conf_connect_dns_callback
, server_p
);
471 if(server_p
->bind_host
)
473 server_p
->dns_query_bind4
=
474 lookup_hostname(server_p
->bind_host
, AF_INET
, conf_bind_dns_callback
, server_p
);
476 server_p
->dns_query_bind6
=
477 lookup_hostname(server_p
->bind_host
, AF_INET6
, conf_bind_dns_callback
, server_p
);
483 find_server_conf(const char *name
)
485 struct server_conf
*server_p
;
488 RB_DLINK_FOREACH(ptr
, server_conf_list
.head
)
490 server_p
= ptr
->data
;
492 if(ServerConfIllegal(server_p
))
495 if(match(name
, server_p
->name
))
503 attach_server_conf(struct Client
*client_p
, struct server_conf
*server_p
)
505 /* already have an attached conf */
506 if(client_p
->localClient
->att_sconf
)
508 /* short circuit this special case :) */
509 if(client_p
->localClient
->att_sconf
== server_p
)
512 detach_server_conf(client_p
);
515 CurrUsers(server_p
->class)++;
517 client_p
->localClient
->att_sconf
= server_p
;
522 detach_server_conf(struct Client
*client_p
)
524 struct server_conf
*server_p
= client_p
->localClient
->att_sconf
;
529 client_p
->localClient
->att_sconf
= NULL
;
531 CurrUsers(server_p
->class)--;
533 if(ServerConfIllegal(server_p
) && !server_p
->servers
)
535 /* the class this one is using may need destroying too */
536 if(MaxUsers(server_p
->class) < 0 && CurrUsers(server_p
->class) <= 0)
537 free_class(server_p
->class);
539 rb_dlinkDelete(&server_p
->node
, &server_conf_list
);
540 free_server_conf(server_p
);
545 set_server_conf_autoconn(struct Client
*source_p
, const char *name
, int newval
)
547 struct server_conf
*server_p
;
549 if((server_p
= find_server_conf(name
)) != NULL
)
552 server_p
->flags
|= SERVER_AUTOCONN
;
554 server_p
->flags
&= ~SERVER_AUTOCONN
;
556 sendto_realops_snomask(SNO_GENERAL
, L_ALL
,
557 "%s has changed AUTOCONN for %s to %i",
558 get_oper_name(source_p
), name
, newval
);
561 sendto_one_notice(source_p
, ":Can't find %s", name
);
565 disable_server_conf_autoconn(const char *name
)
567 struct server_conf
*server_p
;
569 server_p
= find_server_conf(name
);
570 if(server_p
!= NULL
&& server_p
->flags
& SERVER_AUTOCONN
)
572 server_p
->flags
&= ~SERVER_AUTOCONN
;
574 sendto_realops_snomask(SNO_GENERAL
, L_ALL
,
575 "Disabling AUTOCONN for %s because of error",
577 ilog(L_SERVER
, "Disabling AUTOCONN for %s because of error",
583 find_xline(const char *gecos
, int counter
)
585 struct ConfItem
*aconf
;
588 RB_DLINK_FOREACH(ptr
, xline_conf_list
.head
)
592 if(match_esc(aconf
->host
, gecos
))
604 find_xline_mask(const char *gecos
)
606 struct ConfItem
*aconf
;
609 RB_DLINK_FOREACH(ptr
, xline_conf_list
.head
)
613 if(!irccmp(aconf
->host
, gecos
))
621 find_nick_resv(const char *name
)
623 struct ConfItem
*aconf
;
626 RB_DLINK_FOREACH(ptr
, resv_conf_list
.head
)
630 if(match_esc(aconf
->host
, name
))
641 find_nick_resv_mask(const char *name
)
643 struct ConfItem
*aconf
;
646 RB_DLINK_FOREACH(ptr
, resv_conf_list
.head
)
650 if(!irccmp(aconf
->host
, name
))
660 * outputs - 1 if nick is vaild resv, 0 otherwise
664 clean_resv_nick(const char *nick
)
671 if(*nick
== '-' || IsDigit(*nick
))
674 while ((tmpch
= *nick
++))
676 if(tmpch
== '?' || tmpch
== '@' || tmpch
== '#')
678 else if(tmpch
== '*')
680 else if(IsNickChar(tmpch
))
692 /* valid_wild_card_simple()
694 * inputs - "thing" to test
695 * outputs - 1 if enough wildcards, else 0
699 valid_wild_card_simple(const char *data
)
706 /* check the string for minimum number of nonwildcard chars */
709 while((tmpch
= *p
++))
711 /* found an escape, p points to the char after it, so skip
714 if(tmpch
== '\\' && *p
)
717 if(++nonwild
>= ConfigFileEntry
.min_nonwildcard_simple
)
720 else if(!IsMWildChar(tmpch
))
722 /* if we have enough nonwildchars, return */
723 if(++nonwild
>= ConfigFileEntry
.min_nonwildcard_simple
)
730 /* strings without wilds are also ok */
735 valid_temp_time(const char *p
)
744 result
+= ((*p
) & 0xF);
751 if(result
> (60 * 24 * 7 * 52))
752 result
= (60 * 24 * 7 * 52);
757 /* Propagated bans are expired elsewhere. */
759 expire_temp_rxlines(void *unused
)
761 struct ConfItem
*aconf
;
763 rb_dlink_node
*next_ptr
;
764 rb_radixtree_iteration_state state
;
766 RB_RADIXTREE_FOREACH(aconf
, &state
, resv_tree
)
768 if(aconf
->lifetime
!= 0)
770 if(aconf
->hold
&& aconf
->hold
<= rb_current_time())
772 if(ConfigFileEntry
.tkline_expire_notices
)
773 sendto_realops_snomask(SNO_GENERAL
, L_ALL
,
774 "Temporary RESV for [%s] expired",
777 rb_radixtree_delete(resv_tree
, aconf
->host
);
782 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, resv_conf_list
.head
)
786 if(aconf
->lifetime
!= 0)
788 if(aconf
->hold
&& aconf
->hold
<= rb_current_time())
790 if(ConfigFileEntry
.tkline_expire_notices
)
791 sendto_realops_snomask(SNO_GENERAL
, L_ALL
,
792 "Temporary RESV for [%s] expired",
795 rb_dlinkDestroy(ptr
, &resv_conf_list
);
799 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, xline_conf_list
.head
)
803 if(aconf
->lifetime
!= 0)
805 if(aconf
->hold
&& aconf
->hold
<= rb_current_time())
807 if(ConfigFileEntry
.tkline_expire_notices
)
808 sendto_realops_snomask(SNO_GENERAL
, L_ALL
,
809 "Temporary X-line for [%s] expired",
812 rb_dlinkDestroy(ptr
, &xline_conf_list
);
820 return(rb_dlink_list_length(&nd_list
));
824 add_nd_entry(const char *name
)
828 if(rb_dictionary_find(nd_dict
, name
) != NULL
)
831 nd
= rb_bh_alloc(nd_heap
);
833 rb_strlcpy(nd
->name
, name
, sizeof(nd
->name
));
834 nd
->expire
= rb_current_time() + ConfigFileEntry
.nick_delay
;
836 /* this list is ordered */
837 rb_dlinkAddTail(nd
, &nd
->lnode
, &nd_list
);
839 rb_dictionary_add(nd_dict
, nd
->name
, nd
);
843 free_nd_entry(struct nd_entry
*nd
)
845 rb_dictionary_delete(nd_dict
, nd
->name
);
847 rb_dlinkDelete(&nd
->lnode
, &nd_list
);
848 rb_bh_free(nd_heap
, nd
);
852 expire_nd_entries(void *unused
)
856 rb_dlink_node
*next_ptr
;
858 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, nd_list
.head
)
862 /* this list is ordered - we can stop when we hit the first
863 * entry that doesnt expire..
865 if(nd
->expire
> rb_current_time())
873 add_tgchange(const char *host
)
876 rb_patricia_node_t
*pnode
;
878 if(find_tgchange(host
))
881 target
= rb_malloc(sizeof(tgchange
));
882 pnode
= make_and_lookup(tgchange_tree
, host
);
884 pnode
->data
= target
;
885 target
->pnode
= pnode
;
887 target
->ip
= rb_strdup(host
);
888 target
->expiry
= rb_current_time() + (60*60*12);
890 rb_dlinkAdd(target
, &target
->node
, &tgchange_list
);
894 find_tgchange(const char *host
)
896 rb_patricia_node_t
*pnode
;
898 if((pnode
= rb_match_exact_string(tgchange_tree
, host
)))