2 #include "inspircd_io.h"
3 #include "inspircd_util.h"
4 #include "inspircd_config.h"
9 #include <sys/utsname.h>
14 #include <ext/hash_map>
26 #include "connection.h"
38 #define nspace __gnu_cxx
46 extern vector<Module*> modules;
47 extern vector<ircd_module*> factory;
50 extern char ServerName[MAXBUF];
51 extern char Network[MAXBUF];
52 extern char ServerDesc[MAXBUF];
53 extern char AdminName[MAXBUF];
54 extern char AdminEmail[MAXBUF];
55 extern char AdminNick[MAXBUF];
56 extern char diepass[MAXBUF];
57 extern char restartpass[MAXBUF];
58 extern char motd[MAXBUF];
59 extern char rules[MAXBUF];
60 extern char list[MAXBUF];
61 extern char PrefixQuit[MAXBUF];
62 extern char DieValue[MAXBUF];
65 extern int WHOWAS_STALE;
66 extern int WHOWAS_MAX;
68 extern time_t startup_time;
69 extern int NetBufferSize;
70 extern time_t nb_start;
72 extern std::vector<int> fd_reap;
73 extern std::vector<std::string> module_names;
75 extern char bannerBuffer[MAXBUF];
76 extern int boundPortCount;
78 extern int UDPportCount;
79 extern int ports[MAXSOCKS];
80 extern int defaultRoute;
82 extern std::vector<long> auth_cookies;
83 extern std::stringstream config_f;
85 extern serverrec* me[32];
87 extern FILE *log_file;
91 template<> struct nspace::hash<in_addr>
93 size_t operator()(const struct in_addr &a) const
96 memcpy(&q,&a,sizeof(size_t));
101 template<> struct nspace::hash<string>
103 size_t operator()(const string &s) const
106 static struct hash<const char *> strhash;
118 bool operator()(const string& s1, const string& s2) const
120 char a[MAXBUF],b[MAXBUF];
121 strcpy(a,s1.c_str());
122 strcpy(b,s2.c_str());
123 return (strcasecmp(a,b) == 0);
128 struct InAddr_HashComp
131 bool operator()(const in_addr &s1, const in_addr &s2) const
136 memcpy(&q,&s1,sizeof(size_t));
137 memcpy(&p,&s2,sizeof(size_t));
145 typedef nspace::hash_map<std::string, userrec*, nspace::hash<string>, StrHashComp> user_hash;
146 typedef nspace::hash_map<std::string, chanrec*, nspace::hash<string>, StrHashComp> chan_hash;
147 typedef nspace::hash_map<in_addr,string*, nspace::hash<in_addr>, InAddr_HashComp> address_cache;
148 typedef std::deque<command_t> command_table;
151 extern user_hash clientlist;
152 extern chan_hash chanlist;
153 extern user_hash whowas;
154 extern command_table cmdlist;
155 extern file_cache MOTD;
156 extern file_cache RULES;
157 extern address_cache IP;
160 void handle_join(char **parameters, int pcnt, userrec *user)
165 if (loop_call(handle_join,parameters,pcnt,user,0,0,1))
167 if (parameters[0][0] == '#')
169 Ptr = add_channel(user,parameters[0],parameters[1],false);
174 void handle_part(char **parameters, int pcnt, userrec *user)
180 if (loop_call(handle_part,parameters,pcnt,user,0,pcnt-2,0))
182 del_channel(user,parameters[0],parameters[1],false);
186 if (loop_call(handle_part,parameters,pcnt,user,0,pcnt-1,0))
188 del_channel(user,parameters[0],NULL,false);
192 void handle_kick(char **parameters, int pcnt, userrec *user)
194 chanrec* Ptr = FindChan(parameters[0]);
195 userrec* u = Find(parameters[1]);
199 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
203 if (!has_channel(u,Ptr))
205 WriteServ(user->fd,"442 %s %s :You're not on that channel!",user->nick, parameters[0]);
213 strncpy(reason,parameters[2],MAXBUF);
214 if (strlen(reason)>MAXKICK)
216 reason[MAXKICK-1] = '\0';
219 kick_channel(user,u,Ptr,reason);
223 strcpy(reason,user->nick);
224 kick_channel(user,u,Ptr,reason);
227 // this must be propogated so that channel membership is kept in step network-wide
230 snprintf(buffer,MAXBUF,"k %s %s %s :%s",user->nick,u->nick,Ptr->name,reason);
231 NetSendToAll(buffer);
235 void handle_die(char **parameters, int pcnt, userrec *user)
237 log(DEBUG,"die: %s",user->nick);
238 if (!strcmp(parameters[0],diepass))
240 WriteOpers("*** DIE command from %s!%s@%s, terminating...",user->nick,user->ident,user->host);
246 WriteOpers("*** Failed DIE Command from %s!%s@%s.",user->nick,user->ident,user->host);
250 void handle_restart(char **parameters, int pcnt, userrec *user)
252 log(DEBUG,"restart: %s",user->nick);
253 if (!strcmp(parameters[0],restartpass))
255 WriteOpers("*** RESTART command from %s!%s@%s, Pretending to restart till this is finished :D",user->nick,user->ident,user->host);
258 /* Will finish this later when i can be arsed :) */
262 WriteOpers("*** Failed RESTART Command from %s!%s@%s.",user->nick,user->ident,user->host);
266 void handle_kill(char **parameters, int pcnt, userrec *user)
268 userrec *u = Find(parameters[0]);
269 char killreason[MAXBUF];
271 log(DEBUG,"kill: %s %s",parameters[0],parameters[1]);
274 if (strcmp(ServerName,u->server))
277 WriteOpers("*** Remote kill by %s: %s!%s@%s (%s)",user->nick,u->nick,u->ident,u->host,parameters[1]);
278 sprintf(killreason,"[%s] Killed (%s (%s))",ServerName,user->nick,parameters[1]);
279 WriteCommonExcept(u,"QUIT :%s",killreason);
280 // K token must go to ALL servers!!!
282 snprintf(buffer,MAXBUF,"K %s %s :%s",user->nick,u->nick,killreason);
283 NetSendToAll(buffer);
285 user_hash::iterator iter = clientlist.find(u->nick);
286 if (iter != clientlist.end())
288 log(DEBUG,"deleting user hash value %d",iter->second);
289 if ((iter->second) && (user->registered == 7)) {
292 clientlist.erase(iter);
299 WriteTo(user, u, "KILL %s :%s!%s!%s (%s)", u->nick, ServerName,user->dhost,user->nick,parameters[1]);
300 WriteOpers("*** Local Kill by %s: %s!%s@%s (%s)",user->nick,u->nick,u->ident,u->host,parameters[1]);
301 sprintf(killreason,"Killed (%s (%s))",user->nick,parameters[1]);
302 kill_link(u,killreason);
307 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
311 void handle_summon(char **parameters, int pcnt, userrec *user)
313 WriteServ(user->fd,"445 %s :SUMMON has been disabled (depreciated command)",user->nick);
316 void handle_users(char **parameters, int pcnt, userrec *user)
318 WriteServ(user->fd,"445 %s :USERS has been disabled (depreciated command)",user->nick);
321 void handle_pass(char **parameters, int pcnt, userrec *user)
323 // Check to make sure they havnt registered -- Fix by FCS
324 if (user->registered == 7)
326 WriteServ(user->fd,"462 %s :You may not reregister",user->nick);
329 if (!strcasecmp(parameters[0],Passwd(user)))
331 user->haspassed = true;
335 void handle_invite(char **parameters, int pcnt, userrec *user)
337 userrec* u = Find(parameters[0]);
338 chanrec* c = FindChan(parameters[1]);
344 WriteServ(user->fd,"401 %s %s :No such nick/channel",user->nick, parameters[1]);
350 WriteServ(user->fd,"401 %s %s :No such nick/channel",user->nick, parameters[0]);
359 if (cstatus(user,c) < STATUS_HOP)
361 WriteServ(user->fd,"482 %s %s :You must be at least a half-operator to change modes on this channel",user->nick, c->name);
365 if (has_channel(u,c))
367 WriteServ(user->fd,"443 %s %s %s :Is already on channel %s",user->nick,u->nick,c->name,c->name);
370 if (!has_channel(user,c))
372 WriteServ(user->fd,"442 %s %s :You're not on that channel!",user->nick, c->name);
375 u->InviteTo(c->name);
376 WriteFrom(u->fd,user,"INVITE %s :%s",u->nick,c->name);
377 WriteServ(user->fd,"341 %s %s %s",user->nick,u->nick,c->name);
379 // i token must go to ALL servers!!!
381 snprintf(buffer,MAXBUF,"i %s %s %s",u->nick,user->nick,c->name);
382 NetSendToAll(buffer);
385 void handle_topic(char **parameters, int pcnt, userrec *user)
391 if (strlen(parameters[0]) <= CHANMAX)
393 Ptr = FindChan(parameters[0]);
398 WriteServ(user->fd,"332 %s %s :%s", user->nick, Ptr->name, Ptr->topic);
399 WriteServ(user->fd,"333 %s %s %s %d", user->nick, Ptr->name, Ptr->setby, Ptr->topicset);
403 WriteServ(user->fd,"331 %s %s :No topic is set.", user->nick, Ptr->name);
408 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
415 if (strlen(parameters[0]) <= CHANMAX)
417 Ptr = FindChan(parameters[0]);
420 if ((Ptr->topiclock) && (cstatus(user,Ptr)<STATUS_HOP))
422 WriteServ(user->fd,"482 %s %s :You must be at least a half-operator to change modes on this channel", user->nick, Ptr->name);
427 strncpy(topic,parameters[1],MAXBUF);
428 if (strlen(topic)>MAXTOPIC)
430 topic[MAXTOPIC-1] = '\0';
433 strcpy(Ptr->topic,topic);
434 strcpy(Ptr->setby,user->nick);
435 Ptr->topicset = time(NULL);
436 WriteChannel(Ptr,user,"TOPIC %s :%s",Ptr->name, Ptr->topic);
438 // t token must go to ALL servers!!!
440 snprintf(buffer,MAXBUF,"t %s %s :%s",user->nick,Ptr->name,topic);
441 NetSendToAll(buffer);
445 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
451 void handle_names(char **parameters, int pcnt, userrec *user)
455 if (loop_call(handle_names,parameters,pcnt,user,0,pcnt-1,0))
457 c = FindChan(parameters[0]);
460 /*WriteServ(user->fd,"353 %s = %s :%s", user->nick, c->name,*/
462 WriteServ(user->fd,"366 %s %s :End of /NAMES list.", user->nick, c->name);
466 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
470 void handle_privmsg(char **parameters, int pcnt, userrec *user)
475 user->idle_lastmsg = time(NULL);
477 if (loop_call(handle_privmsg,parameters,pcnt,user,0,pcnt-2,0))
479 if (parameters[0][0] == '#')
481 chan = FindChan(parameters[0]);
484 if ((chan->noexternal) && (!has_channel(user,chan)))
486 WriteServ(user->fd,"404 %s %s :Cannot send to channel (no external messages)", user->nick, chan->name);
489 if ((chan->moderated) && (cstatus(user,chan)<STATUS_VOICE))
491 WriteServ(user->fd,"404 %s %s :Cannot send to channel (+m)", user->nick, chan->name);
497 FOREACH_RESULT(OnUserPreMessage(user,chan,TYPE_CHANNEL,std::string(parameters[1])));
502 ChanExceptSender(chan, user, "PRIVMSG %s :%s", chan->name, parameters[1]);
504 // if any users of this channel are on remote servers, broadcast the packet
506 snprintf(buffer,MAXBUF,"P %s %s :%s",user->nick,chan->name,parameters[1]);
507 NetSendToCommon(user,buffer);
511 /* no such nick/channel */
512 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
517 dest = Find(parameters[0]);
520 if (strcmp(dest->awaymsg,""))
522 /* auto respond with aweh msg */
523 WriteServ(user->fd,"301 %s %s :%s",user->nick,dest->nick,dest->awaymsg);
528 FOREACH_RESULT(OnUserPreMessage(user,dest,TYPE_USER,std::string(parameters[1])));
535 if (!strcmp(dest->server,user->server))
537 // direct write, same server
538 WriteTo(user, dest, "PRIVMSG %s :%s", dest->nick, parameters[1]);
543 snprintf(buffer,MAXBUF,"P %s %s :%s",user->nick,dest->nick,parameters[1]);
544 NetSendToOne(dest->server,buffer);
549 /* no such nick/channel */
550 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
554 void handle_notice(char **parameters, int pcnt, userrec *user)
559 user->idle_lastmsg = time(NULL);
561 if (loop_call(handle_notice,parameters,pcnt,user,0,pcnt-2,0))
563 if (parameters[0][0] == '#')
565 chan = FindChan(parameters[0]);
568 if ((chan->noexternal) && (!has_channel(user,chan)))
570 WriteServ(user->fd,"404 %s %s :Cannot send to channel (no external messages)", user->nick, chan->name);
573 if ((chan->moderated) && (cstatus(user,chan)<STATUS_VOICE))
575 WriteServ(user->fd,"404 %s %s :Cannot send to channel (+m)", user->nick, chan->name);
581 FOREACH_RESULT(OnUserPreNotice(user,chan,TYPE_CHANNEL,std::string(parameters[1])));
586 ChanExceptSender(chan, user, "NOTICE %s :%s", chan->name, parameters[1]);
588 // if any users of this channel are on remote servers, broadcast the packet
590 snprintf(buffer,MAXBUF,"V %s %s :%s",user->nick,chan->name,parameters[1]);
591 NetSendToCommon(user,buffer);
595 /* no such nick/channel */
596 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
601 dest = Find(parameters[0]);
606 FOREACH_RESULT(OnUserPreNotice(user,dest,TYPE_USER,std::string(parameters[1])));
611 if (!strcmp(dest->server,user->server))
613 // direct write, same server
614 WriteTo(user, dest, "NOTICE %s :%s", dest->nick, parameters[1]);
619 snprintf(buffer,MAXBUF,"V %s %s :%s",user->nick,dest->nick,parameters[1]);
620 NetSendToOne(dest->server,buffer);
625 /* no such nick/channel */
626 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
631 void handle_info(char **parameters, int pcnt, userrec *user)
633 WriteServ(user->fd,"371 %s :The Inspire IRCd Project Has been brought to you by the following people..",user->nick);
634 WriteServ(user->fd,"371 %s :Craig Edwards, Craig McLure, and Others..",user->nick);
635 WriteServ(user->fd,"371 %s :Will finish this later when i can be arsed :p",user->nick);
636 FOREACH_MOD OnInfo(user);
637 WriteServ(user->fd,"374 %s :End of /INFO list",user->nick);
640 void handle_time(char **parameters, int pcnt, userrec *user)
643 struct tm * timeinfo;
646 timeinfo = localtime ( &rawtime );
647 WriteServ(user->fd,"391 %s %s :%s",user->nick,ServerName, asctime (timeinfo) );
651 void handle_whois(char **parameters, int pcnt, userrec *user)
656 if (loop_call(handle_whois,parameters,pcnt,user,0,pcnt-1,0))
658 dest = Find(parameters[0]);
661 // bug found by phidjit - were able to whois an incomplete connection if it had sent a NICK or USER
662 if (dest->registered == 7)
664 WriteServ(user->fd,"311 %s %s %s %s * :%s",user->nick, dest->nick, dest->ident, dest->dhost, dest->fullname);
665 if ((user == dest) || (strchr(user->modes,'o')))
667 WriteServ(user->fd,"378 %s %s :is connecting from *@%s",user->nick, dest->nick, dest->host);
669 if (strcmp(chlist(dest),""))
671 WriteServ(user->fd,"319 %s %s :%s",user->nick, dest->nick, chlist(dest));
673 WriteServ(user->fd,"312 %s %s %s :%s",user->nick, dest->nick, dest->server, GetServerDescription(dest->server).c_str());
674 if (strcmp(dest->awaymsg,""))
676 WriteServ(user->fd,"301 %s %s :%s",user->nick, dest->nick, dest->awaymsg);
678 if (strchr(dest->modes,'o'))
680 WriteServ(user->fd,"313 %s %s :is an IRC operator",user->nick, dest->nick);
682 FOREACH_MOD OnWhois(user,dest);
683 if (!strcasecmp(user->server,dest->server))
685 // idle time and signon line can only be sent if youre on the same server (according to RFC)
686 WriteServ(user->fd,"317 %s %s %d %d :seconds idle, signon time",user->nick, dest->nick, abs((dest->idle_lastmsg)-time(NULL)), dest->signon);
689 WriteServ(user->fd,"318 %s %s :End of /WHOIS list.",user->nick, dest->nick);
693 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
698 /* no such nick/channel */
699 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
703 void handle_quit(char **parameters, int pcnt, userrec *user)
705 user_hash::iterator iter = clientlist.find(user->nick);
708 if (user->registered == 7)
710 /* theres more to do here, but for now just close the socket */
713 if (parameters[0][0] == ':')
717 reason = parameters[0];
719 if (strlen(reason)>MAXQUIT)
721 reason[MAXQUIT-1] = '\0';
724 Write(user->fd,"ERROR :Closing link (%s@%s) [%s]",user->ident,user->host,parameters[0]);
725 WriteOpers("*** Client exiting: %s!%s@%s [%s]",user->nick,user->ident,user->host,parameters[0]);
726 WriteCommonExcept(user,"QUIT :%s%s",PrefixQuit,parameters[0]);
729 snprintf(buffer,MAXBUF,"Q %s :%s%s",user->nick,PrefixQuit,parameters[0]);
730 NetSendToAll(buffer);
734 Write(user->fd,"ERROR :Closing link (%s@%s) [QUIT]",user->ident,user->host);
735 WriteOpers("*** Client exiting: %s!%s@%s [Client exited]",user->nick,user->ident,user->host);
736 WriteCommonExcept(user,"QUIT :Client exited");
739 snprintf(buffer,MAXBUF,"Q %s :Client exited",user->nick);
740 NetSendToAll(buffer);
742 FOREACH_MOD OnUserQuit(user);
746 /* push the socket on a stack of sockets due to be closed at the next opportunity */
747 fd_reap.push_back(user->fd);
749 if (iter != clientlist.end())
751 clientlist.erase(iter);
752 log(DEBUG,"deleting user hash value %d",iter->second);
753 //if ((user) && (user->registered == 7)) {
758 if (user->registered == 7) {
763 void handle_who(char **parameters, int pcnt, userrec *user)
767 /* theres more to do here, but for now just close the socket */
770 if ((!strcmp(parameters[0],"0")) || (!strcmp(parameters[0],"*")))
772 if (user->chans[0].channel)
774 Ptr = user->chans[0].channel;
775 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
777 if ((common_channels(user,i->second)) && (isnick(i->second->nick)))
779 WriteServ(user->fd,"352 %s %s %s %s %s %s Hr@ :0 %s",user->nick, Ptr->name, i->second->ident, i->second->dhost, i->second->server, i->second->nick, i->second->fullname);
785 WriteServ(user->fd,"315 %s %s :End of /WHO list.",user->nick, Ptr->name);
789 WriteServ(user->fd,"315 %s %s :End of /WHO list.",user->nick, user->nick);
793 if (parameters[0][0] == '#')
795 Ptr = FindChan(parameters[0]);
798 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
800 if ((has_channel(i->second,Ptr)) && (isnick(i->second->nick)))
802 WriteServ(user->fd,"352 %s %s %s %s %s %s Hr@ :0 %s",user->nick, Ptr->name, i->second->ident, i->second->dhost, i->second->server, i->second->nick, i->second->fullname);
805 WriteServ(user->fd,"315 %s %s :End of /WHO list.",user->nick, Ptr->name);
809 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
814 userrec* u = Find(parameters[0]);
817 WriteServ(user->fd,"352 %s %s %s %s %s %s Hr@ :0 %s",user->nick, u->nick, u->ident, u->dhost, u->server, u->nick, u->fullname);
819 WriteServ(user->fd,"315 %s %s :End of /WHO list.",user->nick, parameters[0]);
824 if ((!strcmp(parameters[0],"0")) || (!strcmp(parameters[0],"*")) && (!strcmp(parameters[1],"o")))
826 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
828 if ((common_channels(user,i->second)) && (isnick(i->second->nick)))
830 if (strchr(i->second->modes,'o'))
832 WriteServ(user->fd,"352 %s %s %s %s %s %s Hr@ :0 %s",user->nick, user->nick, i->second->ident, i->second->dhost, i->second->server, i->second->nick, i->second->fullname);
836 WriteServ(user->fd,"315 %s %s :End of /WHO list.",user->nick, user->nick);
842 void handle_wallops(char **parameters, int pcnt, userrec *user)
844 WriteWallOps(user,false,"%s",parameters[0]);
847 void handle_list(char **parameters, int pcnt, userrec *user)
851 WriteServ(user->fd,"321 %s Channel :Users Name",user->nick);
852 for (chan_hash::const_iterator i = chanlist.begin(); i != chanlist.end(); i++)
854 if ((!i->second->c_private) && (!i->second->secret))
856 WriteServ(user->fd,"322 %s %s %d :[+%s] %s",user->nick,i->second->name,usercount_i(i->second),chanmodes(i->second),i->second->topic);
859 WriteServ(user->fd,"323 %s :End of channel list.",user->nick);
863 void handle_rehash(char **parameters, int pcnt, userrec *user)
865 WriteServ(user->fd,"382 %s %s :Rehashing",user->nick,CleanFilename(CONFIG_FILE));
867 FOREACH_MOD OnRehash();
868 WriteOpers("%s is rehashing config file %s",user->nick,CleanFilename(CONFIG_FILE));
871 void handle_lusers(char **parameters, int pcnt, userrec *user)
873 WriteServ(user->fd,"251 %s :There are %d users and %d invisible on %d servers",user->nick,usercnt()-usercount_invisible(),usercount_invisible(),servercount());
874 WriteServ(user->fd,"252 %s %d :operator(s) online",user->nick,usercount_opers());
875 WriteServ(user->fd,"253 %s %d :unknown connections",user->nick,usercount_unknown());
876 WriteServ(user->fd,"254 %s %d :channels formed",user->nick,chancount());
877 WriteServ(user->fd,"254 %s :I have %d clients and %d servers",user->nick,local_count(),count_servs());
880 void handle_admin(char **parameters, int pcnt, userrec *user)
882 WriteServ(user->fd,"256 %s :Administrative info for %s",user->nick,ServerName);
883 WriteServ(user->fd,"257 %s :Name - %s",user->nick,AdminName);
884 WriteServ(user->fd,"258 %s :Nickname - %s",user->nick,AdminNick);
885 WriteServ(user->fd,"258 %s :E-Mail - %s",user->nick,AdminEmail);
888 void handle_ping(char **parameters, int pcnt, userrec *user)
890 WriteServ(user->fd,"PONG %s :%s",ServerName,parameters[0]);
893 void handle_pong(char **parameters, int pcnt, userrec *user)
895 // set the user as alive so they survive to next ping
899 void handle_motd(char **parameters, int pcnt, userrec *user)
904 void handle_rules(char **parameters, int pcnt, userrec *user)
909 void handle_user(char **parameters, int pcnt, userrec *user)
911 if (user->registered < 3)
913 if (isident(parameters[0]) == 0) {
914 // This kinda Sucks, According to the RFC thou, its either this,
915 // or "You have already registered" :p -- Craig
916 WriteServ(user->fd,"461 %s USER :Not enough parameters",user->nick);
919 WriteServ(user->fd,"NOTICE Auth :No ident response, ident prefixed with ~");
920 strcpy(user->ident,"~"); /* we arent checking ident... but these days why bother anyway? */
921 strncat(user->ident,parameters[0],IDENTMAX);
922 strncpy(user->fullname,parameters[3],128);
923 user->registered = (user->registered | 1);
928 WriteServ(user->fd,"462 %s :You may not reregister",user->nick);
931 /* parameters 2 and 3 are local and remote hosts, ignored when sent by client connection */
932 if (user->registered == 3)
934 /* user is registered now, bit 0 = USER command, bit 1 = sent a NICK command */
939 void handle_userhost(char **parameters, int pcnt, userrec *user)
941 char Return[MAXBUF],junk[MAXBUF];
942 sprintf(Return,"302 %s :",user->nick);
943 for (int i = 0; i < pcnt; i++)
945 userrec *u = Find(parameters[i]);
948 if (strchr(u->modes,'o'))
950 sprintf(junk,"%s*=+%s@%s ",u->nick,u->ident,u->host);
955 sprintf(junk,"%s=+%s@%s ",u->nick,u->ident,u->host);
960 WriteServ(user->fd,Return);
964 void handle_ison(char **parameters, int pcnt, userrec *user)
967 sprintf(Return,"303 %s :",user->nick);
968 for (int i = 0; i < pcnt; i++)
970 userrec *u = Find(parameters[i]);
973 strcat(Return,u->nick);
977 WriteServ(user->fd,Return);
981 void handle_away(char **parameters, int pcnt, userrec *user)
985 strcpy(user->awaymsg,parameters[0]);
986 WriteServ(user->fd,"306 %s :You have been marked as being away",user->nick);
990 strcpy(user->awaymsg,"");
991 WriteServ(user->fd,"305 %s :You are no longer marked as being away",user->nick);
995 void handle_whowas(char **parameters, int pcnt, userrec* user)
997 user_hash::iterator i = whowas.find(parameters[0]);
999 if (i == whowas.end())
1001 WriteServ(user->fd,"406 %s %s :There was no such nickname",user->nick,parameters[0]);
1002 WriteServ(user->fd,"369 %s %s :End of WHOWAS",user->nick,parameters[0]);
1006 time_t rawtime = i->second->signon;
1010 timeinfo = localtime(&rawtime);
1011 strcpy(b,asctime(timeinfo));
1012 b[strlen(b)-1] = '\0';
1014 WriteServ(user->fd,"314 %s %s %s %s * :%s",user->nick,i->second->nick,i->second->ident,i->second->dhost,i->second->fullname);
1015 WriteServ(user->fd,"312 %s %s %s :%s",user->nick,i->second->nick,i->second->server,b);
1016 WriteServ(user->fd,"369 %s %s :End of WHOWAS",user->nick,parameters[0]);
1021 void handle_trace(char **parameters, int pcnt, userrec *user)
1023 for (user_hash::iterator i = clientlist.begin(); i != clientlist.end(); i++)
1027 if (isnick(i->second->nick))
1029 if (strchr(i->second->modes,'o'))
1031 WriteServ(user->fd,"205 %s :Oper 0 %s",user->nick,i->second->nick);
1035 WriteServ(user->fd,"204 %s :User 0 %s",user->nick,i->second->nick);
1040 WriteServ(user->fd,"203 %s :???? 0 [%s]",user->nick,i->second->host);
1046 void handle_modules(char **parameters, int pcnt, userrec *user)
1048 for (int i = 0; i < module_names.size(); i++)
1050 Version V = modules[i]->GetVersion();
1051 char modulename[MAXBUF];
1052 strncpy(modulename,module_names[i].c_str(),256);
1053 WriteServ(user->fd,"900 %s :0x%08lx %d.%d.%d.%d %s",user->nick,modules[i],V.Major,V.Minor,V.Revision,V.Build,CleanFilename(modulename));
1057 void handle_stats(char **parameters, int pcnt, userrec *user)
1063 if (strlen(parameters[0])>1)
1065 /* make the stats query 1 character long */
1066 parameters[0][1] = '\0';
1069 /* stats m (list number of times each command has been used, plus bytecount) */
1070 if (!strcasecmp(parameters[0],"m"))
1072 for (int i = 0; i < cmdlist.size(); i++)
1074 if (cmdlist[i].handler_function)
1076 if (cmdlist[i].use_count)
1078 /* RPL_STATSCOMMANDS */
1079 WriteServ(user->fd,"212 %s %s %d %d",user->nick,cmdlist[i].command,cmdlist[i].use_count,cmdlist[i].total_bytes);
1086 /* stats z (debug and memory info) */
1087 if (!strcasecmp(parameters[0],"z"))
1089 WriteServ(user->fd,"249 %s :Users(HASH_MAP) %d (%d bytes, %d buckets)",user->nick,clientlist.size(),clientlist.size()*sizeof(userrec),clientlist.bucket_count());
1090 WriteServ(user->fd,"249 %s :Channels(HASH_MAP) %d (%d bytes, %d buckets)",user->nick,chanlist.size(),chanlist.size()*sizeof(chanrec),chanlist.bucket_count());
1091 WriteServ(user->fd,"249 %s :Commands(VECTOR) %d (%d bytes)",user->nick,cmdlist.size(),cmdlist.size()*sizeof(command_t));
1092 WriteServ(user->fd,"249 %s :MOTD(VECTOR) %d, RULES(VECTOR) %d",user->nick,MOTD.size(),RULES.size());
1093 WriteServ(user->fd,"249 %s :address_cache(HASH_MAP) %d (%d buckets)",user->nick,IP.size(),IP.bucket_count());
1094 WriteServ(user->fd,"249 %s :Modules(VECTOR) %d (%d)",user->nick,modules.size(),modules.size()*sizeof(Module));
1095 WriteServ(user->fd,"249 %s :ClassFactories(VECTOR) %d (%d)",user->nick,factory.size(),factory.size()*sizeof(ircd_module));
1096 WriteServ(user->fd,"249 %s :Ports(STATIC_ARRAY) %d",user->nick,boundPortCount);
1100 if (!strcasecmp(parameters[0],"o"))
1102 for (int i = 0; i < ConfValueEnum("oper",&config_f); i++)
1104 char LoginName[MAXBUF];
1105 char HostName[MAXBUF];
1106 char OperType[MAXBUF];
1107 ConfValue("oper","name",i,LoginName,&config_f);
1108 ConfValue("oper","host",i,HostName,&config_f);
1109 ConfValue("oper","type",i,OperType,&config_f);
1110 WriteServ(user->fd,"243 %s O %s * %s %s 0",user->nick,HostName,LoginName,OperType);
1114 /* stats l (show user I/O stats) */
1115 if (!strcasecmp(parameters[0],"l"))
1117 WriteServ(user->fd,"211 %s :server:port nick bytes_in cmds_in bytes_out cmds_out",user->nick);
1118 for (user_hash::iterator i = clientlist.begin(); i != clientlist.end(); i++)
1120 if (isnick(i->second->nick))
1122 WriteServ(user->fd,"211 %s :%s:%d %s %d %d %d %d",user->nick,ServerName,i->second->port,i->second->nick,i->second->bytes_in,i->second->cmds_in,i->second->bytes_out,i->second->cmds_out);
1126 WriteServ(user->fd,"211 %s :%s:%d (unknown@%d) %d %d %d %d",user->nick,ServerName,i->second->port,i->second->fd,i->second->bytes_in,i->second->cmds_in,i->second->bytes_out,i->second->cmds_out);
1132 /* stats u (show server uptime) */
1133 if (!strcasecmp(parameters[0],"u"))
1135 time_t current_time = 0;
1136 current_time = time(NULL);
1137 time_t server_uptime = current_time - startup_time;
1139 stime = gmtime(&server_uptime);
1140 /* i dont know who the hell would have an ircd running for over a year nonstop, but
1141 * Craig suggested this, and it seemed a good idea so in it went */
1142 if (stime->tm_year > 70)
1144 WriteServ(user->fd,"242 %s :Server up %d years, %d days, %.2d:%.2d:%.2d",user->nick,(stime->tm_year-70),stime->tm_yday,stime->tm_hour,stime->tm_min,stime->tm_sec);
1148 WriteServ(user->fd,"242 %s :Server up %d days, %.2d:%.2d:%.2d",user->nick,stime->tm_yday,stime->tm_hour,stime->tm_min,stime->tm_sec);
1152 WriteServ(user->fd,"219 %s %s :End of /STATS report",user->nick,parameters[0]);
1153 WriteOpers("*** Notice: Stats '%s' requested by %s (%s@%s)",parameters[0],user->nick,user->ident,user->host);
1157 void handle_connect(char **parameters, int pcnt, userrec *user)
1159 char Link_ServerName[1024];
1160 char Link_IPAddr[1024];
1161 char Link_Port[1024];
1162 char Link_Pass[1024];
1166 for (int i = 0; i < ConfValueEnum("link",&config_f); i++)
1170 ConfValue("link","name",i,Link_ServerName,&config_f);
1171 ConfValue("link","ipaddr",i,Link_IPAddr,&config_f);
1172 ConfValue("link","port",i,Link_Port,&config_f);
1173 ConfValue("link","sendpass",i,Link_Pass,&config_f);
1174 log(DEBUG,"(%d) Comparing against name='%s', ipaddr='%s', port='%s', recvpass='%s'",i,Link_ServerName,Link_IPAddr,Link_Port,Link_Pass);
1175 LinkPort = atoi(Link_Port);
1176 if (match(Link_ServerName,parameters[0])) {
1184 WriteServ(user->fd,"NOTICE %s :*** Failed to connect to %s: No servers matching this pattern are configured for linking.",user->nick,parameters[0]);
1188 // TODO: Perform a check here to stop a server being linked twice!
1190 WriteServ(user->fd,"NOTICE %s :*** Connecting to %s (%s) port %s...",user->nick,Link_ServerName,Link_IPAddr,Link_Port);
1192 if (me[defaultRoute])
1194 me[defaultRoute]->BeginLink(Link_IPAddr,LinkPort,Link_Pass,Link_ServerName,me[defaultRoute]->port);
1199 WriteServ(user->fd,"NOTICE %s :No default route is defined for server connections on this server. You must define a server connection to be default route so that sockets can be bound to it.",user->nick);
1203 void handle_squit(char **parameters, int pcnt, userrec *user)
1205 // send out an squit across the mesh and then clear the server list (for local squit)
1208 WriteOpers("SQUIT command issued by %s",user->nick);
1209 char buffer[MAXBUF];
1210 snprintf(buffer,MAXBUF,"& %s",ServerName);
1211 NetSendToAll(buffer);
1216 WriteServ(user->fd,"NOTICE :*** Remote SQUIT not supported yet.");
1220 void handle_links(char **parameters, int pcnt, userrec *user)
1222 WriteServ(user->fd,"364 %s %s %s :0 %s",user->nick,ServerName,ServerName,ServerDesc);
1223 for (int j = 0; j < 32; j++)
1227 for (int k = 0; k < me[j]->connectors.size(); k++)
1229 WriteServ(user->fd,"364 %s %s %s :1 %s",user->nick,me[j]->connectors[k].GetServerName().c_str(),ServerName,me[j]->connectors[k].GetDescription().c_str());
1233 WriteServ(user->fd,"365 %s * :End of /LINKS list.",user->nick);
1236 void handle_map(char **parameters, int pcnt, userrec *user)
1239 snprintf(line,MAXBUF,"006 %s :%s",user->nick,ServerName);
1240 while (strlen(line) < 50)
1242 WriteServ(user->fd,"%s%d (%.2f%%)",line,local_count(),(float)(((float)local_count()/(float)usercnt())*100));
1243 for (int j = 0; j < 32; j++)
1247 for (int k = 0; k < me[j]->connectors.size(); k++)
1249 snprintf(line,MAXBUF,"006 %s :%c-%s",user->nick,islast(me[j]->connectors[k].GetServerName().c_str()),me[j]->connectors[k].GetServerName().c_str());
1250 while (strlen(line) < 50)
1252 WriteServ(user->fd,"%s%d (%.2f%%)",line,map_count(me[j]->connectors[k].GetServerName().c_str()),(float)(((float)map_count(me[j]->connectors[k].GetServerName().c_str())/(float)usercnt())*100));
1256 WriteServ(user->fd,"007 %s :End of /MAP",user->nick);
1260 void handle_oper(char **parameters, int pcnt, userrec *user)
1262 char LoginName[MAXBUF];
1263 char Password[MAXBUF];
1264 char OperType[MAXBUF];
1265 char TypeName[MAXBUF];
1266 char Hostname[MAXBUF];
1269 for (int i = 0; i < ConfValueEnum("oper",&config_f); i++)
1271 ConfValue("oper","name",i,LoginName,&config_f);
1272 ConfValue("oper","password",i,Password,&config_f);
1273 if ((!strcmp(LoginName,parameters[0])) && (!strcmp(Password,parameters[1])))
1275 /* correct oper credentials */
1276 ConfValue("oper","type",i,OperType,&config_f);
1277 WriteOpers("*** %s (%s@%s) is now an IRC operator of type %s",user->nick,user->ident,user->host,OperType);
1278 WriteServ(user->fd,"381 %s :You are now an IRC operator of type %s",user->nick,OperType);
1279 WriteServ(user->fd,"MODE %s :+o",user->nick);
1280 for (j =0; j < ConfValueEnum("type",&config_f); j++)
1282 ConfValue("type","name",j,TypeName,&config_f);
1283 if (!strcmp(TypeName,OperType))
1285 /* found this oper's opertype */
1286 ConfValue("type","host",j,Hostname,&config_f);
1287 ChangeDisplayedHost(user,Hostname);
1290 if (!strchr(user->modes,'o'))
1292 strcat(user->modes,"o");
1294 FOREACH_MOD OnOper(user);
1299 WriteServ(user->fd,"491 %s :Invalid oper credentials",user->nick);
1300 WriteOpers("*** WARNING! Failed oper attempt by %s!%s@%s!",user->nick,user->ident,user->host);
1303 void handle_nick(char **parameters, int pcnt, userrec *user)
1307 log(DEBUG,"not enough params for handle_nick");
1312 log(DEBUG,"invalid parameter passed to handle_nick");
1315 if (!strlen(parameters[0]))
1317 log(DEBUG,"zero length new nick passed to handle_nick");
1322 log(DEBUG,"invalid user passed to handle_nick");
1327 log(DEBUG,"invalid old nick passed to handle_nick");
1330 if (!strcasecmp(user->nick,parameters[0]))
1332 log(DEBUG,"old nick is new nick, skipping");
1337 if (strlen(parameters[0]) > 1)
1339 if (parameters[0][0] == ':')
1344 if ((Find(parameters[0])) && (Find(parameters[0]) != user))
1346 WriteServ(user->fd,"433 %s %s :Nickname is already in use.",user->nick,parameters[0]);
1350 if (isnick(parameters[0]) == 0)
1352 WriteServ(user->fd,"432 %s %s :Erroneous Nickname",user->nick,parameters[0]);
1356 if (user->registered == 7)
1358 WriteCommon(user,"NICK %s",parameters[0]);
1360 // Q token must go to ALL servers!!!
1361 char buffer[MAXBUF];
1362 snprintf(buffer,MAXBUF,"n %s %s",user->nick,parameters[0]);
1363 NetSendToAll(buffer);
1367 /* change the nick of the user in the users_hash */
1368 user = ReHashNick(user->nick, parameters[0]);
1369 /* actually change the nick within the record */
1371 if (!user->nick) return;
1373 strncpy(user->nick, parameters[0],NICKMAX);
1375 log(DEBUG,"new nick set: %s",user->nick);
1377 if (user->registered < 3)
1378 user->registered = (user->registered | 2);
1379 if (user->registered == 3)
1381 /* user is registered now, bit 0 = USER command, bit 1 = sent a NICK command */
1384 log(DEBUG,"exit nickchange: %s",user->nick);
1389 void handle_V(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1391 char* src = strtok(params," ");
1392 char* dest = strtok(NULL," :");
1393 char* text = strtok(NULL,"\r\n");
1396 userrec* user = Find(src);
1399 userrec* dst = Find(dest);
1403 WriteTo(user, dst, "NOTICE %s :%s", dst->nick, text);
1407 chanrec* d = FindChan(dest);
1410 ChanExceptSender(d, user, "NOTICE %s :%s", d->name, text);
1418 void handle_P(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1420 char* src = strtok(params," ");
1421 char* dest = strtok(NULL," :");
1422 char* text = strtok(NULL,"\r\n");
1425 userrec* user = Find(src);
1428 userrec* dst = Find(dest);
1432 WriteTo(user, dst, "PRIVMSG %s :%s", dst->nick, text);
1436 chanrec* d = FindChan(dest);
1439 ChanExceptSender(d, user, "PRIVMSG %s :%s", d->name, text);
1446 void handle_i(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1448 char* nick = strtok(params," ");
1449 char* from = strtok(NULL," ");
1450 char* channel = strtok(NULL," ");
1451 userrec* u = Find(nick);
1452 userrec* user = Find(from);
1453 chanrec* c = FindChan(channel);
1454 if ((c) && (u) && (user))
1456 u->InviteTo(c->name);
1457 WriteFrom(u->fd,user,"INVITE %s :%s",u->nick,c->name);
1461 void handle_t(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1463 char* setby = strtok(params," ");
1464 char* channel = strtok(NULL," :");
1465 char* topic = strtok(NULL,"\r\n");
1467 userrec* u = Find(setby);
1468 chanrec* c = FindChan(channel);
1471 WriteChannelLocal(c,u,"TOPIC %s :%s",c->name,topic);
1472 strncpy(c->topic,topic,MAXTOPIC);
1473 strncpy(c->setby,u->nick,NICKMAX);
1478 void handle_T(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1480 char* tm = strtok(params," ");
1481 char* setby = strtok(NULL," ");
1482 char* channel = strtok(NULL," :");
1483 char* topic = strtok(NULL,"\r\n");
1485 time_t TS = atoi(tm);
1486 chanrec* c = FindChan(channel);
1489 // in the case of topics and TS, the *NEWER*
1490 if (TS <= c->topicset)
1492 WriteChannelLocal(c,NULL,"TOPIC %s :%s",c->name,topic);
1493 strncpy(c->topic,topic,MAXTOPIC);
1494 strncpy(c->setby,setby,NICKMAX);
1499 void handle_M(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1502 char original[MAXBUF],target[MAXBUF];
1503 strncpy(original,params,MAXBUF);
1505 char* parameter = strtok(params," ");
1506 strncpy(target,parameter,MAXBUF);
1509 if (parameter[0] == ':')
1511 pars[index++] = parameter;
1512 parameter = strtok(NULL," ");
1514 log(DEBUG,"*** MODE: %s %s",pars[0],pars[1]);
1515 merge_mode(pars,index);
1516 if (FindChan(target))
1518 WriteChannelLocal(FindChan(target), NULL, "MODE %s",original);
1522 Write(Find(target)->fd,":%s MODE %s",ServerName,original);
1526 // m is modes set by users only (not servers) valid targets are channels or users.
1528 void handle_m(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1530 // m blah #chatspike +b *!test@*4
1532 char original[MAXBUF];
1533 strncpy(original,params,MAXBUF);
1535 if (!strchr(params,' '))
1537 WriteOpers("WARNING! 'm' token in data stream without any parameters! Something fishy is going on!");
1543 char* src = strtok(params," ");
1544 userrec* user = Find(src);
1548 log(DEBUG,"Found user: %s",user->nick);
1549 char* parameter = strtok(NULL," ");
1552 pars[index++] = parameter;
1553 parameter = strtok(NULL," ");
1556 log(DEBUG,"Calling merge_mode2");
1557 merge_mode2(pars,index,user);
1562 void handle_L(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1564 char* nick = strtok(params," ");
1565 char* channel = strtok(NULL," :");
1566 char* reason = strtok(NULL,"\r\n");
1567 userrec* user = Find(nick);
1571 if (strcmp(reason,""))
1573 del_channel(user,channel,reason,true);
1577 del_channel(user,channel,NULL,true);
1582 void handle_K(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1584 char* src = strtok(params," ");
1585 char* nick = strtok(NULL," :");
1586 char* reason = strtok(NULL,"\r\n");
1587 char kreason[MAXBUF];
1590 userrec* u = Find(nick);
1591 userrec* user = Find(src);
1595 WriteTo(user, u, "KILL %s :%s!%s!%s!%s (%s)", u->nick, source->name, ServerName, user->dhost,user->nick,reason);
1596 WriteOpers("*** Remote kill from %s by %s: %s!%s@%s (%s)",source->name,user->nick,u->nick,u->ident,u->host,reason);
1597 snprintf(kreason,MAXBUF,"[%s] Killed (%s (%s))",source->name,user->nick,reason);
1598 kill_link(u,kreason);
1602 void handle_Q(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1604 char* nick = strtok(params," :");
1605 char* reason = strtok(NULL,"\r\n");
1608 userrec* user = Find(nick);
1612 if (strlen(reason)>MAXQUIT)
1614 reason[MAXQUIT-1] = '\0';
1618 WriteCommonExcept(user,"QUIT :%s",reason);
1620 user_hash::iterator iter = clientlist.find(user->nick);
1622 if (iter != clientlist.end())
1624 log(DEBUG,"deleting user hash value %d",iter->second);
1625 if ((iter->second) && (user->registered == 7)) {
1626 delete iter->second;
1628 clientlist.erase(iter);
1631 purge_empty_chans();
1635 void handle_n(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1637 char* oldnick = strtok(params," ");
1638 char* newnick = strtok(NULL," ");
1640 userrec* user = Find(oldnick);
1644 WriteCommon(user,"NICK %s",newnick);
1645 user = ReHashNick(user->nick, newnick);
1647 if (!user->nick) return;
1648 strncpy(user->nick, newnick,NICKMAX);
1649 log(DEBUG,"new nick set: %s",user->nick);
1653 // k <SOURCE> <DEST> <CHANNEL> :<REASON>
1654 void handle_k(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1656 char* src = strtok(params," ");
1657 char* dest = strtok(NULL," ");
1658 char* channel = strtok(NULL," :");
1659 char* reason = strtok(NULL,"\r\n");
1661 userrec* s = Find(src);
1662 userrec* d = Find(dest);
1663 chanrec* c = FindChan(channel);
1664 if ((s) && (d) && (c))
1666 kick_channel(s,d,c,reason);
1670 void handle_AT(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1672 char* who = strtok(params," :");
1673 char* text = strtok(NULL,"\r\n");
1675 userrec* s = Find(who);
1678 WriteWallOps(s,true,text);
1683 void handle_N(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1685 char* tm = strtok(params," ");
1686 char* nick = strtok(NULL," ");
1687 char* host = strtok(NULL," ");
1688 char* dhost = strtok(NULL," ");
1689 char* ident = strtok(NULL," ");
1690 char* modes = strtok(NULL," ");
1691 char* server = strtok(NULL," :");
1692 char* gecos = strtok(NULL,"\r\n");
1695 time_t TS = atoi(tm);
1696 user_hash::iterator iter = clientlist.find(nick);
1697 if (iter != clientlist.end())
1700 WriteOpers("Nickname collision: %s@%s != %s@%s",nick,server,iter->second->nick,iter->second->server);
1702 snprintf(str,MAXBUF,"Killed (Nick Collision (%s@%s < %s@%s))",nick,server,iter->second->nick,iter->second->server);
1703 WriteServ(iter->second->fd, "KILL %s :%s",iter->second->nick,str);
1704 kill_link(iter->second,str);
1706 clientlist[nick] = new userrec();
1707 // remote users have an fd of -1. This is so that our Write abstraction
1708 // routines know to route any messages to this record away to whatever server
1710 clientlist[nick]->fd = -1;
1711 strncpy(clientlist[nick]->nick, nick,NICKMAX);
1712 strncpy(clientlist[nick]->host, host,160);
1713 strncpy(clientlist[nick]->dhost, dhost,160);
1714 strncpy(clientlist[nick]->server, server,256);
1715 strncpy(clientlist[nick]->ident, ident,10); // +1 char to compensate for tilde
1716 strncpy(clientlist[nick]->fullname, gecos,128);
1717 clientlist[nick]->signon = TS;
1718 clientlist[nick]->nping = 0; // this is ignored for a remote user anyway.
1719 clientlist[nick]->lastping = 1;
1720 clientlist[nick]->port = 0; // so is this...
1721 clientlist[nick]->registered = 7; // this however we need to set for them to receive messages and appear online
1722 clientlist[nick]->idle_lastmsg = time(NULL); // this is unrealiable and wont actually be used locally
1723 for (int i = 0; i < MAXCHANS; i++)
1725 clientlist[nick]->chans[i].channel = NULL;
1726 clientlist[nick]->chans[i].uc_modes = 0;
1730 void handle_F(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1732 long tdiff = time(NULL) - atoi(params);
1734 WriteOpers("TS split for %s -> %s: %d",source->name,reply->name,tdiff);
1737 void handle_a(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1739 char* nick = strtok(params," :");
1740 char* gecos = strtok(NULL,"\r\n");
1742 userrec* user = Find(nick);
1745 strncpy(user->fullname,gecos,MAXBUF);
1748 void handle_b(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1750 char* nick = strtok(params," ");
1751 char* host = strtok(NULL," ");
1753 userrec* user = Find(nick);
1756 strncpy(user->dhost,host,160);
1759 void handle_plus(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1762 // + test3.chatspike.net 7010 -2016508415
1763 char* servername = strtok(params," ");
1764 char* ipaddr = strtok(NULL," ");
1765 char* ipport = strtok(NULL," ");
1766 char* cookie = strtok(NULL," ");
1767 log(DEBUG,"*** Connecting back to %s:%d",ipaddr,atoi(ipport));
1770 bool conn_already = false;
1771 for (int i = 0; i < 32; i++)
1775 for (int j = 0; j < me[i]->connectors.size(); j++)
1777 if (!strcasecmp(me[i]->connectors[j].GetServerName().c_str(),servername))
1779 if (me[i]->connectors[j].GetServerPort() == atoi(ipport))
1781 log(DEBUG,"Already got a connection to %s:%d, ignoring +",ipaddr,atoi(ipport));
1782 conn_already = true;
1789 me[defaultRoute]->MeshCookie(ipaddr,atoi(ipport),atoi(cookie),servername);
1792 void handle_R(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1794 char* server = strtok(params," ");
1795 char* data = strtok(NULL,"\r\n");
1796 log(DEBUG,"Forwarded packet '%s' to '%s'",data,server);
1797 NetSendToOne(server,data);
1800 void handle_J(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1803 // The J token currently has no timestamp - this needs looking at
1804 // because it will allow splitriding.
1805 char* nick = strtok(params," ");
1806 char* channel = strtok(NULL," ");
1807 userrec* user = Find(nick);
1810 if ((user != NULL) && (strcmp(channel,"")))
1812 char privilage = '\0';
1813 if (channel[0] != '#')
1815 privilage = channel[0];
1818 add_channel(user,channel,"",true);
1820 // now work out the privilages they should have on each channel
1821 // and send the appropriate servermodes.
1822 for (int i = 0; i != MAXCHANS; i++)
1824 if (user->chans[i].channel)
1826 if (!strcasecmp(user->chans[i].channel->name,channel))
1828 if (privilage == '@')
1830 user->chans[i].uc_modes = user->chans[i].uc_modes | UCMODE_OP;
1831 WriteChannelLocal(user->chans[i].channel, NULL, "MODE %s +o %s",channel,user->nick);
1833 if (privilage == '%')
1835 user->chans[i].uc_modes = user->chans[i].uc_modes | UCMODE_HOP;
1836 WriteChannelLocal(user->chans[i].channel, NULL, "MODE %s +h %s",channel,user->nick);
1838 if (privilage == '+')
1840 user->chans[i].uc_modes = user->chans[i].uc_modes | UCMODE_VOICE;
1841 WriteChannelLocal(user->chans[i].channel, NULL, "MODE %s +v %s",channel,user->nick);
1848 channel = strtok(NULL," ");
1852 void handle_dollar(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1854 log(DEBUG,"Storing routing table...");
1855 char* sourceserver = strtok(params," ");
1856 char* server = strtok(NULL," ");
1857 for (int i = 0; i < 32; i++)
1861 for (int j = 0; j < me[i]->connectors.size(); j++)
1863 if (!strcasecmp(me[i]->connectors[j].GetServerName().c_str(),sourceserver))
1865 me[i]->connectors[j].routes.clear();
1866 log(DEBUG,"Found entry for source server.");
1870 me[i]->connectors[j].routes.push_back(server);
1871 log(DEBUG,"*** Stored route: %s -> %s -> %s",ServerName,sourceserver,server);
1872 server = strtok(NULL," ");
1879 log(DEBUG,"Warning! routing table received from nonexistent server!");
1882 void handle_amp(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1884 log(DEBUG,"Netsplit! %s split from mesh, removing!",params);
1885 bool go_again = true;
1889 for (int i = 0; i < 32; i++)
1893 for (vector<ircd_connector>::iterator j = me[i]->connectors.begin(); j != me[i]->connectors.end(); j++)
1895 if (!strcasecmp(j->GetServerName().c_str(),params))
1898 j->CloseConnection();
1899 me[i]->connectors.erase(j);
1907 log(DEBUG,"Removed server. Will remove clients...");
1908 // iterate through the userlist and remove all users on this server.
1909 // because we're dealing with a mesh, we dont have to deal with anything
1910 // "down-route" from this server (nice huh)
1912 char reason[MAXBUF];
1913 snprintf(reason,MAXBUF,"%s %s",ServerName,params);
1917 for (user_hash::const_iterator u = clientlist.begin(); u != clientlist.end(); u++)
1919 if (!strcasecmp(u->second->server,params))
1921 kill_link(u->second,reason);
1932 void process_restricted_commands(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host,char* ipaddr,int port)
1934 char buffer[MAXBUF];
1941 nb_start = time(NULL);
1942 WriteOpers("Server %s is starting netburst.",tcp_host);
1943 // now broadcast this new servers address out to all servers that are linked to us,
1944 // except the newcomer. They'll all attempt to connect back to it.
1945 authcookie = rand()*rand();
1946 snprintf(buffer,MAXBUF,"~ %d",authcookie);
1947 NetSendToAll(buffer);
1951 // once stored, this authcookie permits other servers to log in
1952 // without user or password, using it.
1954 auth_cookies.push_back(atoi(params));
1955 log(DEBUG,"*** Stored auth cookie, will permit servers with auth-cookie %d",atoi(params));
1957 // connect back to a server using an authcookie
1959 handle_plus(token,params,source,reply,tcp_host);
1963 handle_dollar(token,params,source,reply,tcp_host);
1965 // node unreachable - we cant route to a server, sooooo we slit it off.
1966 // servers can generate these for themselves for an squit.
1968 handle_amp(token,params,source,reply,tcp_host);
1970 // R <server> <data>
1971 // redirect token, send all of <data> along to the given
1972 // server as this server has been found to still have a route to it
1974 handle_R(token,params,source,reply,tcp_host);
1979 reply->SendPacket("!",tcp_host);
1989 // N <TS> <NICK> <HOST> <DHOST> <IDENT> <MODES> <SERVER> :<GECOS>
1990 // introduce remote client
1992 handle_N(token,params,source,reply,tcp_host);
1994 // a <NICK> :<GECOS>
1995 // change GECOS (SETNAME)
1997 handle_a(token,params,source,reply,tcp_host);
2000 // change displayed host (SETHOST)
2002 handle_b(token,params,source,reply,tcp_host);
2004 // t <NICK> <CHANNEL> :<TOPIC>
2005 // change a channel topic
2007 handle_t(token,params,source,reply,tcp_host);
2009 // i <NICK> <CHANNEL>
2010 // invite a user to a channel
2012 handle_i(token,params,source,reply,tcp_host);
2014 // k <SOURCE> <DEST> <CHANNEL> :<REASON>
2015 // kick a user from a channel
2017 handle_k(token,params,source,reply,tcp_host);
2019 // n <NICK> <NEWNICK>
2020 // change nickname of client -- a server should only be able to
2021 // change the nicknames of clients that reside on it unless
2024 handle_n(token,params,source,reply,tcp_host);
2026 // J <NICK> <CHANLIST>
2027 // Join user to channel list, merge channel permissions
2029 handle_J(token,params,source,reply,tcp_host);
2031 // T <TS> <CHANNEL> <TOPICSETTER> :<TOPIC>
2032 // change channel topic (netburst only)
2034 handle_T(token,params,source,reply,tcp_host);
2036 // M <TARGET> <MODES> [MODE-PARAMETERS]
2037 // Server setting modes on an object
2039 handle_M(token,params,source,reply,tcp_host);
2041 // m <SOURCE> <TARGET> <MODES> [MODE-PARAMETERS]
2042 // User setting modes on an object
2044 handle_m(token,params,source,reply,tcp_host);
2046 // P <SOURCE> <TARGET> :<TEXT>
2047 // Send a private/channel message
2049 handle_P(token,params,source,reply,tcp_host);
2051 // V <SOURCE> <TARGET> :<TEXT>
2052 // Send a private/channel notice
2054 handle_V(token,params,source,reply,tcp_host);
2056 // L <SOURCE> <CHANNEL> :<REASON>
2057 // User parting a channel
2059 handle_L(token,params,source,reply,tcp_host);
2061 // Q <SOURCE> :<REASON>
2064 handle_Q(token,params,source,reply,tcp_host);
2066 // K <SOURCE> <DEST> :<REASON>
2069 handle_K(token,params,source,reply,tcp_host);
2071 // @ <SOURCE> :<TEXT>
2074 handle_AT(token,params,source,reply,tcp_host);
2079 WriteOpers("Server %s has completed netburst. (%d secs)",tcp_host,time(NULL)-nb_start);
2080 handle_F(token,params,source,reply,tcp_host);
2082 // tell all the other servers to use this authcookie to connect back again
2083 // got '+ test3.chatspike.net 7010 -2016508415' from test.chatspike.net
2084 snprintf(buffer,MAXBUF,"+ %s %s %d %d",tcp_host,ipaddr,port,authcookie);
2085 NetSendToAllExcept(tcp_host,buffer);
2088 // end netburst with no mesh creation
2090 WriteOpers("Server %s has completed netburst. (%d secs)",tcp_host,time(NULL)-nb_start);
2091 handle_F(token,params,source,reply,tcp_host);
2093 // tell everyone else about the new server name so they just add it in the disconnected
2095 snprintf(buffer,MAXBUF,"u %s :%s",tcp_host,GetServerDescription(tcp_host).c_str());
2096 NetSendToAllExcept(tcp_host,buffer);
2099 // Send netburst now
2101 WriteOpers("Sending my netburst to %s",tcp_host);
2102 DoSync(source,tcp_host);
2103 WriteOpers("Send of netburst to %s completed",tcp_host);
2104 NetSendMyRoutingTable();
2108 WriteOpers("WARNING! Unknown datagram type '%c'",token);
2114 void handle_link_packet(char* udp_msg, char* tcp_host, serverrec *serv)
2116 char response[10240];
2117 char token = udp_msg[0];
2118 char* old = udp_msg;
2120 if (token == ':') // leading :servername or details - strip them off (services does this, sucky)
2122 char* src = udp_msg+1;
2123 while (udp_msg[0] != ' ')
2127 char* comd = udp_msg;
2128 while (udp_msg[0] != ' ')
2133 char source[MAXBUF];
2134 char command[MAXBUF];
2135 strcpy(data,udp_msg);
2137 strcpy(command,comd);
2139 if (!strcmp(command,"NOTICE"))
2141 snprintf(udp_msg,MAXBUF,"V %s %s",source,data);
2142 log(DEBUG,"Rewrote NOTICE from services to: '%s'",udp_msg);
2145 if (!strcmp(command,"SVSMODE"))
2147 snprintf(udp_msg,MAXBUF,"M %s",data);
2148 log(DEBUG,"Rewrote SVSMODE from services to: '%s'",udp_msg);
2151 // todo: this wont work without u:lines
2152 // in give_ops etc allow nick on a u:lined serv to do just about anything
2153 if (!strcmp(command,"MODE"))
2155 snprintf(udp_msg,MAXBUF,"m %s %s",source,data);
2156 log(DEBUG,"Rewrote MODE from services to: '%s'",udp_msg);
2163 char* params = udp_msg + 2;
2164 char finalparam[1024];
2165 strcpy(finalparam," :xxxx");
2166 if (strstr(udp_msg," :")) {
2167 strncpy(finalparam,strstr(udp_msg," :"),1024);
2172 char* cookie = strtok(params," ");
2173 char* servername = strtok(NULL," ");
2174 char* serverdesc = finalparam+2;
2176 WriteOpers("AuthCookie CONNECT from %s (%s)",servername,tcp_host);
2178 for (int u = 0; u < auth_cookies.size(); u++)
2180 if (auth_cookies[u] == atoi(cookie))
2182 WriteOpers("Allowed cookie from %s, is now part of the mesh",servername);
2185 for (int j = 0; j < 32; j++)
2189 for (int k = 0; k < me[j]->connectors.size(); k++)
2191 if (!strcasecmp(me[j]->connectors[k].GetServerName().c_str(),tcp_host))
2193 me[j]->connectors[k].SetServerName(servername);
2194 me[j]->connectors[k].SetDescription(serverdesc);
2195 me[j]->connectors[k].SetState(STATE_CONNECTED);
2196 NetSendMyRoutingTable();
2201 WriteOpers("\2WARNING!\2 %s sent us an authentication packet but we are not authenticating with this server right now! Possible intrusion attempt!",tcp_host);
2209 // bad cookie, bad bad! go sit in the corner!
2210 WriteOpers("Bad cookie from %s!",servername);
2215 // S test.chatspike.net password portn :ChatSpike InspIRCd test server
2216 char* servername = strtok(params," ");
2217 char* password = strtok(NULL," ");
2218 char* myport = strtok(NULL," ");
2219 char* revision = strtok(NULL," ");
2220 char* serverdesc = finalparam+2;
2222 WriteOpers("CONNECT from %s (%s) (their port: %d)",servername,tcp_host,atoi(myport));
2224 ircd_connector* cn = serv->FindHost(servername);
2228 WriteOpers("CONNECT aborted: Server %s already exists from %s",servername,ServerName);
2229 char buffer[MAXBUF];
2230 sprintf(buffer,"E :Server %s already exists!",servername);
2231 serv->SendPacket(buffer,tcp_host);
2232 RemoveServer(tcp_host);
2236 if (atoi(revision) != GetRevision())
2238 WriteOpers("CONNECT aborted: Could not link to %s, is an incompatible version %s, our version is %d",servername,revision,GetRevision());
2239 char buffer[MAXBUF];
2240 sprintf(buffer,"E :Version number mismatch");
2241 serv->SendPacket(buffer,tcp_host);
2242 RemoveServer(tcp_host);
2243 RemoveServer(servername);
2247 for (int j = 0; j < serv->connectors.size(); j++)
2249 if (!strcasecmp(serv->connectors[j].GetServerName().c_str(),tcp_host))
2251 serv->connectors[j].SetServerName(servername);
2252 serv->connectors[j].SetDescription(serverdesc);
2253 serv->connectors[j].SetServerPort(atoi(myport));
2258 char Link_ServerName[1024];
2259 char Link_IPAddr[1024];
2260 char Link_Port[1024];
2261 char Link_Pass[1024];
2262 char Link_SendPass[1024];
2265 // search for a corresponding <link> block in the config files
2266 for (int i = 0; i < ConfValueEnum("link",&config_f); i++)
2268 ConfValue("link","name",i,Link_ServerName,&config_f);
2269 ConfValue("link","ipaddr",i,Link_IPAddr,&config_f);
2270 ConfValue("link","port",i,Link_Port,&config_f);
2271 ConfValue("link","recvpass",i,Link_Pass,&config_f);
2272 ConfValue("link","sendpass",i,Link_SendPass,&config_f);
2273 log(DEBUG,"(%d) Comparing against name='%s', ipaddr='%s', port='%s', recvpass='%s'",i,Link_ServerName,Link_IPAddr,Link_Port,Link_Pass);
2274 LinkPort = atoi(Link_Port);
2275 if (!strcasecmp(Link_ServerName,servername))
2277 // we have a matching link line -
2278 // send a 'diminutive' server message back...
2279 snprintf(response,10240,"s %s %s :%s",ServerName,Link_SendPass,ServerDesc);
2280 serv->SendPacket(response,servername);
2282 for (int t = 0; t < serv->connectors.size(); t++)
2284 if (!strcasecmp(serv->connectors[t].GetServerName().c_str(),servername))
2286 serv->connectors[t].SetState(STATE_CONNECTED);
2293 char buffer[MAXBUF];
2294 sprintf(buffer,"E :Access is denied (no matching link block)");
2295 serv->SendPacket(buffer,tcp_host);
2296 WriteOpers("CONNECT from %s denied, no matching link block",servername);
2297 RemoveServer(tcp_host);
2298 RemoveServer(servername);
2303 // S test.chatspike.net password :ChatSpike InspIRCd test server
2304 char* servername = strtok(params," ");
2305 char* password = strtok(NULL," ");
2306 char* serverdesc = finalparam+2;
2308 // TODO: we should do a check here to ensure that this server is one we recently initiated a
2309 // link with, and didnt hear an 's' or 'E' back from yet (these are the only two valid responses
2310 // to an 'S' command. If we didn't recently send an 'S' to this server, theyre trying to spoof
2311 // a connect, so put out an oper alert!
2313 // for now, just accept all, we'll fix that later.
2314 WriteOpers("%s accepted our link credentials ",servername);
2316 char Link_ServerName[1024];
2317 char Link_IPAddr[1024];
2318 char Link_Port[1024];
2319 char Link_Pass[1024];
2320 char Link_SendPass[1024];
2323 // search for a corresponding <link> block in the config files
2324 for (int i = 0; i < ConfValueEnum("link",&config_f); i++)
2326 ConfValue("link","name",i,Link_ServerName,&config_f);
2327 ConfValue("link","ipaddr",i,Link_IPAddr,&config_f);
2328 ConfValue("link","port",i,Link_Port,&config_f);
2329 ConfValue("link","recvpass",i,Link_Pass,&config_f);
2330 ConfValue("link","sendpass",i,Link_SendPass,&config_f);
2331 log(DEBUG,"(%d) Comparing against name='%s', ipaddr='%s', port='%s', recvpass='%s'",i,Link_ServerName,Link_IPAddr,Link_Port,Link_Pass);
2332 LinkPort = atoi(Link_Port);
2333 if (!strcasecmp(Link_ServerName,servername))
2335 // matching link at this end too, we're all done!
2336 // at this point we must begin key exchange and insert this
2337 // server into our 'active' table.
2338 for (int j = 0; j < 32; j++)
2342 for (int k = 0; k < me[j]->connectors.size(); k++)
2344 if (!strcasecmp(me[j]->connectors[k].GetServerName().c_str(),tcp_host))
2346 char buffer[MAXBUF];
2347 me[j]->connectors[k].SetDescription(serverdesc);
2348 sprintf(buffer,"X 0");
2349 serv->SendPacket(buffer,tcp_host);
2350 DoSync(me[j],tcp_host);
2351 NetSendMyRoutingTable();
2356 WriteOpers("\2WARNING!\2 %s sent us an authentication packet but we are not authenticating with this server right noe! Possible intrusion attempt!",tcp_host);
2361 log(DEBUG,"Server names '%s' and '%s' don't match",Link_ServerName,servername);
2364 char buffer[MAXBUF];
2365 sprintf(buffer,"E :Access is denied (no matching link block)");
2366 serv->SendPacket(buffer,tcp_host);
2367 WriteOpers("CONNECT from %s denied, no matching link block",servername);
2368 RemoveServer(tcp_host);
2369 RemoveServer(servername);
2374 // U services.chatspike.net password :ChatSpike Services
2376 // non-meshed link, used by services. Everything coming from a non-meshed link is auto broadcasted.
2377 char* servername = strtok(params," ");
2378 char* password = strtok(NULL," ");
2379 char* serverdesc = finalparam+2;
2381 char Link_ServerName[1024];
2382 char Link_IPAddr[1024];
2383 char Link_Port[1024];
2384 char Link_Pass[1024];
2385 char Link_SendPass[1024];
2388 // search for a corresponding <link> block in the config files
2389 for (int i = 0; i < ConfValueEnum("link",&config_f); i++)
2391 ConfValue("link","name",i,Link_ServerName,&config_f);
2392 ConfValue("link","ipaddr",i,Link_IPAddr,&config_f);
2393 ConfValue("link","port",i,Link_Port,&config_f);
2394 ConfValue("link","recvpass",i,Link_Pass,&config_f);
2395 ConfValue("link","sendpass",i,Link_SendPass,&config_f);
2396 log(DEBUG,"(%d) Comparing against name='%s', ipaddr='%s', port='%s', recvpass='%s'",i,Link_ServerName,Link_IPAddr,Link_Port,Link_Pass);
2397 LinkPort = atoi(Link_Port);
2398 if (!strcasecmp(Link_ServerName,servername))
2400 // matching link at this end too, we're all done!
2401 // at this point we must begin key exchange and insert this
2402 // server into our 'active' table.
2403 for (int j = 0; j < 32; j++)
2407 for (int k = 0; k < me[j]->connectors.size(); k++)
2409 if (!strcasecmp(me[j]->connectors[k].GetServerName().c_str(),tcp_host))
2411 char buffer[MAXBUF];
2412 me[j]->connectors[k].SetDescription(serverdesc);
2413 me[j]->connectors[k].SetServerName(servername);
2414 me[j]->connectors[k].SetState(STATE_SERVICES);
2415 sprintf(buffer,"X 0");
2416 serv->SendPacket(buffer,servername);
2417 DoSync(me[j],servername);
2418 NetSendMyRoutingTable();
2423 WriteOpers("\2WARNING!\2 %s sent us an authentication packet but we are not authenticating with this server right noe! Possible intrusion attempt!",tcp_host);
2428 log(DEBUG,"Server names '%s' and '%s' don't match",Link_ServerName,servername);
2431 char buffer[MAXBUF];
2432 sprintf(buffer,"E :Access is denied (no matching link block)");
2433 serv->SendPacket(buffer,tcp_host);
2434 WriteOpers("CONNECT from %s denied, no matching link block",servername);
2435 RemoveServer(tcp_host);
2436 RemoveServer(servername);
2441 char* error_message = finalparam+2;
2442 WriteOpers("ERROR from %s: %s",tcp_host,error_message);
2447 serverrec* source_server = NULL;
2449 for (int j = 0; j < 32; j++)
2453 for (int x = 0; x < me[j]->connectors.size(); x++)
2455 log(DEBUG,"Servers are: '%s' '%s'",tcp_host,me[j]->connectors[x].GetServerName().c_str());
2456 if (!strcasecmp(me[j]->connectors[x].GetServerName().c_str(),tcp_host))
2458 if ((me[j]->connectors[x].GetState() == STATE_CONNECTED) || (me[j]->connectors[x].GetState() == STATE_SERVICES))
2460 // found a valid ircd_connector.
2461 process_restricted_commands(token,params,me[j],serv,tcp_host,me[j]->connectors[x].GetServerIP(),me[j]->connectors[x].GetServerPort());
2469 log(DEBUG,"Unrecognised token or unauthenticated host in datagram from %s: %c",tcp_host,token);