]> jfr.im git - solanum.git/blobdiff - ircd/s_serv.c
whowas.c: store account name in whowas (#323)
[solanum.git] / ircd / s_serv.c
index 7eabf27c102de1876126bfaf827d860c82896175..98caf93a6556a57321649ef2bfdb6163820800d2 100644 (file)
@@ -73,7 +73,6 @@ unsigned int CAP_EX;
 unsigned int CAP_CHW;
 unsigned int CAP_IE;
 unsigned int CAP_KLN;
-unsigned int CAP_ZIP;
 unsigned int CAP_KNOCK;
 unsigned int CAP_TB;
 unsigned int CAP_UNKLN;
@@ -116,7 +115,6 @@ init_builtin_capabs(void)
        CAP_IE = capability_put(serv_capindex, "IE", NULL);
        CAP_KLN = capability_put(serv_capindex, "KLN", NULL);
        CAP_KNOCK = capability_put(serv_capindex, "KNOCK", NULL);
-       CAP_ZIP = capability_put(serv_capindex, "ZIP", NULL);
        CAP_TB = capability_put(serv_capindex, "TB", NULL);
        CAP_UNKLN = capability_put(serv_capindex, "UNKLN", NULL);
        CAP_CLUSTER = capability_put(serv_capindex, "CLUSTER", NULL);
@@ -330,7 +328,7 @@ try_connections(void *unused)
         * error afterwards if it fails.
         *   -- adrian
         */
-       sendto_realops_snomask(SNO_GENERAL, L_ALL,
+       sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
                        "Connection to %s activated",
                        server_p->name);
 
@@ -443,12 +441,7 @@ check_server(const char *name, struct Client *client_p)
        }
        attach_server_conf(client_p, server_p);
 
-       /* clear ZIP/TB if they support but we dont want them */
-#ifdef HAVE_LIBZ
-       if(!ServerConfCompressed(server_p))
-#endif
-               ClearCap(client_p, CAP_ZIP);
-
+       /* clear TB if they support but we dont want it */
        if(!ServerConfTb(server_p))
                ClearCap(client_p, CAP_TB);
 
@@ -472,19 +465,12 @@ send_capabilities(struct Client *client_p, unsigned int cap_can_send)
 static void
 burst_ban(struct Client *client_p)
 {
-       rb_dlink_node *ptr;
        struct ConfItem *aconf;
-       const char *type, *oper;
-       /* +5 for !,@,{,} and null */
-       char operbuf[NICKLEN + USERLEN + HOSTLEN + HOSTLEN + 5];
-       char *p;
-       size_t melen;
-
-       melen = strlen(me.name);
-       RB_DLINK_FOREACH(ptr, prop_bans.head)
-       {
-               aconf = ptr->data;
+       const char *type;
+       rb_dictionary_iter state;
 
+       RB_DICTIONARY_FOREACH(aconf, &state, prop_bans_dict)
+       {
                /* Skip expired stuff. */
                if(aconf->lifetime < rb_current_time())
                        continue;
@@ -498,24 +484,6 @@ burst_ban(struct Client *client_p)
                        default:
                                continue;
                }
-               oper = aconf->info.oper;
-               if(aconf->flags & CONF_FLAGS_MYOPER)
-               {
-                       /* Our operator{} names may not be meaningful
-                        * to other servers, so rewrite to our server
-                        * name.
-                        */
-                       rb_strlcpy(operbuf, aconf->info.oper, sizeof operbuf);
-                       p = strrchr(operbuf, '{');
-                       if (p != NULL &&
-                                       operbuf + sizeof operbuf - p > (ptrdiff_t)(melen + 2))
-                       {
-                               memcpy(p + 1, me.name, melen);
-                               p[melen + 1] = '}';
-                               p[melen + 2] = '\0';
-                               oper = operbuf;
-                       }
-               }
                sendto_one(client_p, ":%s BAN %s %s %s %lu %d %d %s :%s%s%s",
                                me.id,
                                type,
@@ -523,7 +491,7 @@ burst_ban(struct Client *client_p)
                                (unsigned long)aconf->created,
                                (int)(aconf->hold - aconf->created),
                                (int)(aconf->lifetime - aconf->created),
-                               oper,
+                               aconf->info.oper,
                                aconf->passwd,
                                aconf->spasswd ? "|" : "",
                                aconf->spasswd ? aconf->spasswd : "");
@@ -542,51 +510,26 @@ burst_modes_TS6(struct Client *client_p, struct Channel *chptr,
 {
        rb_dlink_node *ptr;
        struct Ban *banptr;
-       char *t;
-       int tlen;
-       int mlen;
-       int cur_len;
 
-       cur_len = mlen = sprintf(buf, ":%s BMASK %ld %s %c :",
-                                   me.id, (long) chptr->channelts, chptr->chname, flag);
-       t = buf + mlen;
+       send_multiline_init(client_p, " ", ":%s BMASK %ld %s %c :",
+                       me.id,
+                       (long)chptr->channelts,
+                       chptr->chname,
+                       flag);
 
-       RB_DLINK_FOREACH(ptr, list->head)
+       RB_DLINK_FOREACH_PREV(ptr, list->tail)
        {
                banptr = ptr->data;
 
-               tlen = strlen(banptr->banstr) + (banptr->forward ? strlen(banptr->forward) + 1 : 0) + 1;
-
-               /* uh oh */
-               if(cur_len + tlen > BUFSIZE - 3)
-               {
-                       /* the one we're trying to send doesnt fit at all! */
-                       if(cur_len == mlen)
-                       {
-                               s_assert(0);
-                               continue;
-                       }
-
-                       /* chop off trailing space and send.. */
-                       *(t-1) = '\0';
-                       sendto_one(client_p, "%s", buf);
-                       cur_len = mlen;
-                       t = buf + mlen;
-               }
-
                if (banptr->forward)
-                       sprintf(t, "%s$%s ", banptr->banstr, banptr->forward);
+                       send_multiline_item(client_p, "%s$%s",
+                                       banptr->banstr,
+                                       banptr->forward);
                else
-                       sprintf(t, "%s ", banptr->banstr);
-               t += tlen;
-               cur_len += tlen;
+                       send_multiline_item(client_p, "%s", banptr->banstr);
        }
 
-       /* cant ever exit the loop above without having modified buf,
-        * chop off trailing space and send.
-        */
-       *(t-1) = '\0';
-       sendto_one(client_p, "%s", buf);
+       send_multiline_fini(client_p, NULL);
 }
 
 /*
@@ -670,11 +613,18 @@ burst_TS6(struct Client *client_p)
                                   use_id(target_p),
                                   target_p->user->away);
 
-               if(IsOper(target_p) && target_p->user && target_p->user->opername && target_p->user->privset)
-                       sendto_one(client_p, ":%s OPER %s %s",
-                                       use_id(target_p),
-                                       target_p->user->opername,
-                                       target_p->user->privset->name);
+               if (IsOper(target_p) && target_p->user && target_p->user->opername)
+               {
+                       if (target_p->user->privset)
+                               sendto_one(client_p, ":%s OPER %s %s",
+                                               use_id(target_p),
+                                               target_p->user->opername,
+                                               target_p->user->privset->name);
+                       else
+                               sendto_one(client_p, ":%s OPER %s",
+                                               use_id(target_p),
+                                               target_p->user->opername);
+               }
 
                hclientinfo.target = target_p;
                call_hook(h_burst_client, &hclientinfo);
@@ -814,7 +764,7 @@ server_estab(struct Client *client_p)
        if((server_p = client_p->localClient->att_sconf) == NULL)
        {
                /* This shouldn't happen, better tell the ops... -A1kmm */
-               sendto_realops_snomask(SNO_GENERAL, is_remote_connect(client_p) ? L_NETWIDE : L_ALL,
+               sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
                                     "Warning: Lost connect{} block for server %s!", host);
                return exit_client(client_p, client_p, client_p, "Lost connect{} block!");
        }
@@ -840,7 +790,6 @@ server_estab(struct Client *client_p)
 
                /* pass info to new server */
                send_capabilities(client_p, default_server_capabs | CAP_MASK
-                                 | (ServerConfCompressed(server_p) ? CAP_ZIP_SUPPORTED : 0)
                                  | (ServerConfTb(server_p) ? CAP_TB : 0));
 
                sendto_one(client_p, "SERVER %s 1 :%s%s",
@@ -852,12 +801,6 @@ server_estab(struct Client *client_p)
        if(!rb_set_buffers(client_p->localClient->F, READBUF_SIZE))
                ilog_error("rb_set_buffers failed for server");
 
-       /* Enable compression now */
-       if(IsCapable(client_p, CAP_ZIP))
-       {
-               start_zlib_session(client_p);
-       }
-
        client_p->servptr = &me;
 
        if(IsAnyDead(client_p))
@@ -1106,7 +1049,7 @@ serv_connect(struct server_conf *server_p, struct Client *by)
         */
        if((client_p = find_server(NULL, server_p->name)))
        {
-               sendto_realops_snomask(SNO_GENERAL, L_ALL,
+               sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
                                     "Server %s already present from %s",
                                     server_p->name, client_p->name);
                if(by && IsPerson(by) && !MyClient(by))
@@ -1116,7 +1059,7 @@ serv_connect(struct server_conf *server_p, struct Client *by)
        }
 
        if (CurrUsers(server_p->class) >= MaxUsers(server_p->class)) {
-               sendto_realops_snomask(SNO_GENERAL, L_ALL,
+               sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
                                     "No more connections allowed in class \"%s\" for server %s",
                                     server_p->class->class_name, server_p->name);
                if(by && IsPerson(by) && !MyClient(by))
@@ -1302,7 +1245,7 @@ serv_connect_callback(rb_fde_t *F, int status, void *data)
                 */
                if(status == RB_ERR_TIMEOUT || status == RB_ERROR_SSL)
                {
-                       sendto_realops_snomask(SNO_GENERAL, is_remote_connect(client_p) ? L_NETWIDE : L_ALL,
+                       sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
                                        "Error connecting to %s[%s]: %s",
                                        client_p->name,
                                        "255.255.255.255",
@@ -1314,7 +1257,7 @@ serv_connect_callback(rb_fde_t *F, int status, void *data)
                else
                {
                        errstr = strerror(rb_get_sockerr(F));
-                       sendto_realops_snomask(SNO_GENERAL, is_remote_connect(client_p) ? L_NETWIDE : L_ALL,
+                       sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
                                        "Error connecting to %s[%s]: %s (%s)",
                                        client_p->name,
                                        "255.255.255.255",
@@ -1332,7 +1275,7 @@ serv_connect_callback(rb_fde_t *F, int status, void *data)
        /* Get the C/N lines */
        if((server_p = client_p->localClient->att_sconf) == NULL)
        {
-               sendto_realops_snomask(SNO_GENERAL, is_remote_connect(client_p) ? L_NETWIDE : L_ALL, "Lost connect{} block for %s",
+               sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, "Lost connect{} block for %s",
                                client_p->name);
                exit_client(client_p, client_p, &me, "Lost connect{} block");
                return;
@@ -1340,7 +1283,7 @@ serv_connect_callback(rb_fde_t *F, int status, void *data)
 
        if(server_p->certfp && (!client_p->certfp || rb_strcasecmp(server_p->certfp, client_p->certfp) != 0))
        {
-               sendto_realops_snomask(SNO_GENERAL, is_remote_connect(client_p) ? L_NETWIDE : L_ALL,
+               sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
                     "Connection to %s has invalid certificate fingerprint %s",
                     client_p->name, client_p->certfp);
                ilog(L_SERVER, "Access denied, invalid certificate fingerprint %s from %s",
@@ -1359,7 +1302,6 @@ serv_connect_callback(rb_fde_t *F, int status, void *data)
 
        /* pass my info to the new server */
        send_capabilities(client_p, default_server_capabs | CAP_MASK
-                         | (ServerConfCompressed(server_p) ? CAP_ZIP_SUPPORTED : 0)
                          | (ServerConfTb(server_p) ? CAP_TB : 0));
 
        sendto_one(client_p, "SERVER %s 1 :%s%s",
@@ -1372,7 +1314,7 @@ serv_connect_callback(rb_fde_t *F, int status, void *data)
         */
        if(IsAnyDead(client_p))
        {
-               sendto_realops_snomask(SNO_GENERAL, is_remote_connect(client_p) ? L_NETWIDE : L_ALL,
+               sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
                                     "%s went dead during handshake", client_p->name);
                exit_client(client_p, client_p, &me, "Went dead during handshake");
                return;