1 /* +------------------------------------+
2 * | Inspire Internet Relay Chat Daemon |
3 * +------------------------------------+
5 * InspIRCd: (C) 2002-2009 InspIRCd Development Team
6 * See: http://wiki.inspircd.org/Credits
8 * This program is free but copyrighted software; see
9 * the file COPYING for details.
11 * ---------------------------------------------------
15 /* $CopyInstall: conf/inspircd.quotes.example $(CONPATH) */
16 /* $CopyInstall: conf/inspircd.rules.example $(CONPATH) */
17 /* $CopyInstall: conf/inspircd.motd.example $(CONPATH) */
18 /* $CopyInstall: conf/inspircd.helpop-full.example $(CONPATH) */
19 /* $CopyInstall: conf/inspircd.helpop.example $(CONPATH) */
20 /* $CopyInstall: conf/inspircd.censor.example $(CONPATH) */
21 /* $CopyInstall: conf/inspircd.filter.example $(CONPATH) */
22 /* $CopyInstall: conf/inspircd.conf.example $(CONPATH) */
23 /* $CopyInstall: conf/modules.conf.example $(CONPATH) */
24 /* $CopyInstall: conf/opers.conf.example $(CONPATH) */
25 /* $CopyInstall: conf/links.conf.example $(CONPATH) */
26 /* $CopyInstall: tools/gdbargs $(BASE)/.gdbargs */
31 #include "exitcodes.h"
32 #include "commands/cmd_whowas.h"
33 #include "configparser.h"
35 ServerConfig::ServerConfig()
37 WhoWasGroupSize = WhoWasMaxGroups = WhoWasMaxKeep = 0;
38 NoUserDns = OperSpyWhois = HideBans = HideSplits = UndernetMsgPrefix = false;
39 CycleHosts = InvBypassModes = true;
40 dns_timeout = DieDelay = 5;
42 NetBufferSize = 10240;
43 SoftLimit = ServerInstance->SE->GetMaxFds();
52 void ServerConfig::Update005()
54 std::stringstream out(data005);
57 int token_counter = 0;
61 line5 = line5 + token + " ";
63 if (token_counter >= 13)
66 snprintf(buf, MAXBUF, "%s:are supported by this server", line5.c_str());
67 isupport.push_back(buf);
75 snprintf(buf, MAXBUF, "%s:are supported by this server", line5.c_str());
76 isupport.push_back(buf);
80 void ServerConfig::Send005(User* user)
82 for (std::vector<std::string>::iterator line = ServerInstance->Config->isupport.begin(); line != ServerInstance->Config->isupport.end(); line++)
83 user->WriteNumeric(RPL_ISUPPORT, "%s %s", user->nick.c_str(), line->c_str());
86 static void ReqRead(ServerConfig* src, const std::string& tag, const std::string& key, std::string& dest)
88 ConfigTag* t = src->ConfValue(tag);
89 if (!t || !t->readString(key, dest))
90 throw CoreException("You must specify a value for <" + tag + ":" + key + ">");
93 template<typename T, typename V>
94 static void range(T& value, V min, V max, V def, const char* msg)
96 if (value >= (T)min && value <= (T)max)
98 ServerInstance->Logs->Log("CONFIG", DEFAULT,
99 "WARNING: %s value of %ld is not between %ld and %ld; set to %ld.",
100 msg, (long)value, (long)min, (long)max, (long)def);
105 /* NOTE: Before anyone asks why we're not using inet_pton for this, it is because inet_pton and friends do not return so much detail,
106 * even in strerror(errno). They just return 'yes' or 'no' to an address without such detail as to whats WRONG with the address.
107 * Because ircd users arent as technical as they used to be (;)) we are going to give more of a useful error message.
109 static void ValidIP(const std::string& ip, const std::string& key)
111 const char* p = ip.c_str();
114 int not_numbers = false;
120 throw CoreException("The value of "+key+" is not an IP address");
122 for (const char* ptr = p; *ptr; ++ptr)
124 if (*ptr != ':' && *ptr != '.')
126 if (*ptr < '0' || *ptr > '9')
128 if ((*ptr < '0' || *ptr > '9') && (toupper(*ptr) < 'A' || toupper(*ptr) > 'F'))
134 throw CoreException("The value of "+key+" is not an IP address");
145 throw CoreException("The value of "+key+" is an IPv4 address with too many fields!");
148 throw CoreException("The value of "+key+" is an IPv6 address with too many fields!");
150 if (num_seps == 0 && num_dots < 3)
151 throw CoreException("The value of "+key+" looks to be a malformed IPv4 address");
153 if (num_seps == 0 && num_dots == 3 && not_numbers)
154 throw CoreException("The value of "+key+" contains non-numeric characters in an IPv4 address");
156 if (num_seps != 0 && not_hex)
157 throw CoreException("The value of "+key+" contains non-hexdecimal characters in an IPv6 address");
159 if (num_seps != 0 && num_dots != 3 && num_dots != 0)
160 throw CoreException("The value of "+key+" is a malformed IPv6 4in6 address");
164 static void ValidHost(const std::string& p, const std::string& msg)
167 if (p.empty() || p[0] == '.')
168 throw CoreException("The value of "+msg+" is not a valid hostname");
169 for (unsigned int i=0;i < p.length();i++)
174 throw CoreException("The value of "+msg+" is not a valid hostname");
181 throw CoreException("The value of "+msg+" is not a valid hostname");
184 // Specialized validators
186 bool ServerConfig::ApplyDisabledCommands(const std::string& data)
188 std::stringstream dcmds(data);
191 /* Enable everything first */
192 for (Commandtable::iterator x = ServerInstance->Parser->cmdlist.begin(); x != ServerInstance->Parser->cmdlist.end(); x++)
193 x->second->Disable(false);
195 /* Now disable all the ones which the user wants disabled */
196 while (dcmds >> thiscmd)
198 Commandtable::iterator cm = ServerInstance->Parser->cmdlist.find(thiscmd);
199 if (cm != ServerInstance->Parser->cmdlist.end())
201 cm->second->Disable(true);
208 // Note: the windows validator is in win32wrapper.cpp
209 void FindDNS(std::string& server);
211 static void FindDNS(std::string& server)
216 // attempt to look up their nameserver from /etc/resolv.conf
217 ServerInstance->Logs->Log("CONFIG",DEFAULT,"WARNING: <dns:server> not defined, attempting to find working server in /etc/resolv.conf...");
219 std::ifstream resolv("/etc/resolv.conf");
221 while (resolv >> server)
223 if (server == "nameserver")
226 ServerInstance->Logs->Log("CONFIG",DEFAULT,"<dns:server> set to '%s' as first resolver in /etc/resolv.conf.",server.c_str());
231 ServerInstance->Logs->Log("CONFIG",DEFAULT,"/etc/resolv.conf contains no viable nameserver entries! Defaulting to nameserver '127.0.0.1'!");
232 server = "127.0.0.1";
236 static void ReadXLine(ServerConfig* conf, const std::string& tag, const std::string& key, XLineFactory* make)
238 ConfigTagList tags = conf->ConfTags(tag);
239 for(ConfigIter i = tags.first; i != tags.second; ++i)
241 ConfigTag* ctag = i->second;
243 if (!ctag->readString(key, mask))
244 throw CoreException("<"+tag+":"+key+"> missing at " + ctag->getTagLocation());
245 std::string reason = ctag->getString("reason", "<Config>");
246 XLine* xl = make->Generate(ServerInstance->Time(), 0, "<Config>", reason, mask);
247 if (!ServerInstance->XLines->AddLine(xl, NULL))
252 typedef std::map<std::string, ConfigTag*> LocalIndex;
253 void ServerConfig::CrossCheckOperClassType()
255 LocalIndex operclass;
256 ConfigTagList tags = ConfTags("class");
257 for(ConfigIter i = tags.first; i != tags.second; ++i)
259 ConfigTag* tag = i->second;
260 std::string name = tag->getString("name");
262 throw CoreException("<class:name> missing from tag at " + tag->getTagLocation());
263 operclass[name] = tag;
265 tags = ConfTags("type");
266 for(ConfigIter i = tags.first; i != tags.second; ++i)
268 ConfigTag* tag = i->second;
269 std::string name = tag->getString("name");
271 throw CoreException("<type:name> is missing from tag at " + tag->getTagLocation());
273 if (!ServerInstance->IsNick(name.c_str(), Limits.NickMax))
274 throw CoreException("<type:name> is invalid (value '" + name + "')");
276 OperInfo* ifo = new OperInfo;
277 oper_blocks[" " + name] = ifo;
278 ifo->type_block = tag;
280 std::string classname;
281 irc::spacesepstream str(tag->getString("classes"));
282 while (str.GetToken(classname))
284 LocalIndex::iterator cls = operclass.find(classname);
285 if (cls == operclass.end())
286 throw CoreException("Oper type " + name + " has missing class " + classname);
287 ifo->class_blocks.push_back(cls->second);
291 tags = ConfTags("oper");
292 for(ConfigIter i = tags.first; i != tags.second; ++i)
294 ConfigTag* tag = i->second;
296 std::string name = tag->getString("name");
298 throw CoreException("<oper:name> missing from tag at " + tag->getTagLocation());
300 std::string type = tag->getString("type");
301 OperIndex::iterator tblk = oper_blocks.find(" " + type);
302 if (tblk == oper_blocks.end())
303 throw CoreException("Oper block " + name + " has missing type " + type);
304 if (oper_blocks.find(name) != oper_blocks.end())
305 throw CoreException("Duplicate oper block with name " + name);
307 OperInfo* ifo = new OperInfo;
309 ifo->oper_block = tag;
310 ifo->type_block = tblk->second->type_block;
311 ifo->class_blocks.assign(tblk->second->class_blocks.begin(), tblk->second->class_blocks.end());
312 oper_blocks[name] = ifo;
316 void ServerConfig::CrossCheckConnectBlocks(ServerConfig* current)
318 typedef std::map<std::string, ConnectClass*> ClassMap;
319 ClassMap oldBlocksByMask;
322 for(ClassVector::iterator i = current->Classes.begin(); i != current->Classes.end(); ++i)
324 ConnectClass* c = *i;
325 std::string typeMask = (c->type == CC_ALLOW) ? "a" : "d";
327 oldBlocksByMask[typeMask] = c;
331 ClassMap newBlocksByMask;
332 Classes.resize(config_data.count("connect"));
333 std::map<std::string, int> names;
335 bool try_again = true;
336 for(int tries=0; try_again; tries++)
339 ConfigTagList tags = ConfTags("connect");
341 for(ConfigIter it = tags.first; it != tags.second; ++it, ++i)
343 ConfigTag* tag = it->second;
347 ConnectClass* parent = NULL;
348 std::string parentName = tag->getString("parent");
349 if (!parentName.empty())
351 std::map<std::string,int>::iterator parentIter = names.find(parentName);
352 if (parentIter == names.end())
355 // couldn't find parent this time. If it's the last time, we'll never find it.
357 throw CoreException("Could not find parent connect class \"" + parentName + "\" for connect block " + ConvToStr(i));
360 parent = Classes[parentIter->second];
363 std::string name = tag->getString("name");
366 if (names.find(name) != names.end())
367 throw CoreException("Two connect classes with name \"" + name + "\" defined!");
371 std::string mask, typeMask;
374 if (tag->readString("allow", mask, false))
377 typeMask = 'a' + mask;
379 else if (tag->readString("deny", mask, false))
382 typeMask = 'd' + mask;
386 throw CoreException("Connect class must have an allow or deny mask at " + tag->getTagLocation());
388 ClassMap::iterator dupMask = newBlocksByMask.find(typeMask);
389 if (dupMask != newBlocksByMask.end())
390 throw CoreException("Two connect classes cannot have the same mask (" + mask + ")");
392 ConnectClass* me = parent ?
393 new ConnectClass(tag, type, mask, *parent) :
394 new ConnectClass(tag, type, mask);
399 tag->readString("password", me->pass);
400 tag->readString("hash", me->hash);
401 me->registration_timeout = tag->getInt("timeout", me->registration_timeout);
402 me->pingtime = tag->getInt("pingfreq", me->pingtime);
404 if (tag->readString("sendq", sendq))
406 // attempt to guess a good hard/soft sendq from a single value
407 long value = atol(sendq.c_str());
409 me->softsendqmax = value / 16;
411 me->softsendqmax = value;
412 me->hardsendqmax = value * 8;
414 me->softsendqmax = tag->getInt("softsendq", me->softsendqmax);
415 me->hardsendqmax = tag->getInt("hardsendq", me->hardsendqmax);
416 me->recvqmax = tag->getInt("recvq", me->recvqmax);
417 me->penaltythreshold = tag->getInt("threshold", me->penaltythreshold);
418 me->maxlocal = tag->getInt("localmax", me->maxlocal);
419 me->maxglobal = tag->getInt("globalmax", me->maxglobal);
420 me->port = tag->getInt("port", me->port);
421 me->maxchans = tag->getInt("maxchans", me->maxchans);
422 me->limit = tag->getInt("limit", me->limit);
424 ClassMap::iterator oldMask = oldBlocksByMask.find(typeMask);
425 if (oldMask != oldBlocksByMask.end())
427 ConnectClass* old = oldMask->second;
428 oldBlocksByMask.erase(oldMask);
433 newBlocksByMask[typeMask] = me;
439 /** Represents a deprecated configuration tag.
449 /** Reason for deprecation
454 static const Deprecated ChangedConfig[] = {
455 {"options", "hidelinks", "has been moved to <security:hidelinks> as of 1.2a3"},
456 {"options", "hidewhois", "has been moved to <security:hidewhois> as of 1.2a3"},
457 {"options", "userstats", "has been moved to <security:userstats> as of 1.2a3"},
458 {"options", "customversion", "has been moved to <security:customversion> as of 1.2a3"},
459 {"options", "hidesplits", "has been moved to <security:hidesplits> as of 1.2a3"},
460 {"options", "hidebans", "has been moved to <security:hidebans> as of 1.2a3"},
461 {"options", "hidekills", "has been moved to <security:hidekills> as of 1.2a3"},
462 {"options", "operspywhois", "has been moved to <security:operspywhois> as of 1.2a3"},
463 {"options", "announceinvites", "has been moved to <security:announceinvites> as of 1.2a3"},
464 {"options", "hidemodes", "has been moved to <security:hidemodes> as of 1.2a3"},
465 {"options", "maxtargets", "has been moved to <security:maxtargets> as of 1.2a3"},
466 {"options", "nouserdns", "has been moved to <performance:nouserdns> as of 1.2a3"},
467 {"options", "maxwho", "has been moved to <performance:maxwho> as of 1.2a3"},
468 {"options", "softlimit", "has been moved to <performance:softlimit> as of 1.2a3"},
469 {"options", "somaxconn", "has been moved to <performance:somaxconn> as of 1.2a3"},
470 {"options", "netbuffersize", "has been moved to <performance:netbuffersize> as of 1.2a3"},
471 {"options", "maxwho", "has been moved to <performance:maxwho> as of 1.2a3"},
472 {"options", "loglevel", "1.2 does not use the loglevel value. Please define <log> tags instead."},
473 {"die", "value", "has always been deprecated"},
476 void ServerConfig::Fill()
478 ReqRead(this, "server", "name", ServerName);
479 ReqRead(this, "power", "diepass", diepass);
480 ReqRead(this, "power", "restartpass", restartpass);
482 ConfigTag* options = ConfValue("options");
483 ConfigTag* security = ConfValue("security");
484 powerhash = ConfValue("power")->getString("hash");
485 DieDelay = ConfValue("power")->getInt("pause");
486 PrefixQuit = options->getString("prefixquit");
487 SuffixQuit = options->getString("suffixquit");
488 FixedQuit = options->getString("fixedquit");
489 PrefixPart = options->getString("prefixpart");
490 SuffixPart = options->getString("suffixpart");
491 FixedPart = options->getString("fixedpart");
492 SoftLimit = ConfValue("performance")->getInt("softlimit", ServerInstance->SE->GetMaxFds());
493 MaxConn = ConfValue("performance")->getInt("somaxconn", SOMAXCONN);
494 MoronBanner = options->getString("moronbanner", "You're banned!");
495 ServerDesc = ConfValue("server")->getString("description", "Configure Me");
496 Network = ConfValue("server")->getString("network", "Network");
497 sid = ConfValue("server")->getString("id", "");
498 AdminName = ConfValue("admin")->getString("name", "");
499 AdminEmail = ConfValue("admin")->getString("email", "null@example.com");
500 AdminNick = ConfValue("admin")->getString("nick", "admin");
501 ModPath = ConfValue("path")->getString("moduledir", MOD_PATH);
502 NetBufferSize = ConfValue("performance")->getInt("netbuffersize", 10240);
503 MaxWhoResults = ConfValue("performance")->getInt("maxwho", 1024);
504 dns_timeout = ConfValue("dns")->getInt("timeout", 5);
505 DisabledCommands = ConfValue("disabled")->getString("commands", "");
506 DisabledDontExist = ConfValue("disabled")->getBool("fakenonexistant");
507 UserStats = security->getString("userstats");
508 CustomVersion = security->getString("customversion");
509 HideSplits = security->getBool("hidesplits");
510 HideBans = security->getBool("hidebans");
511 HideWhoisServer = security->getString("hidewhois");
512 HideKillsServer = security->getString("hidekills");
513 OperSpyWhois = security->getBool("operspywhois");
514 RestrictBannedUsers = security->getBool("restrictbannedusers", true);
515 GenericOper = security->getBool("genericoper");
516 NoUserDns = ConfValue("performance")->getBool("nouserdns");
517 SyntaxHints = options->getBool("syntaxhints");
518 CycleHosts = options->getBool("cyclehosts");
519 UndernetMsgPrefix = options->getBool("ircumsgprefix");
520 FullHostInTopic = options->getBool("hostintopic");
521 MaxTargets = security->getInt("maxtargets", 20);
522 DefaultModes = options->getString("defaultmodes", "nt");
523 PID = ConfValue("pid")->getString("file");
524 WhoWasGroupSize = ConfValue("whowas")->getInt("groupsize");
525 WhoWasMaxGroups = ConfValue("whowas")->getInt("maxgroups");
526 WhoWasMaxKeep = ServerInstance->Duration(ConfValue("whowas")->getString("maxkeep"));
527 DieValue = ConfValue("die")->getString("value");
528 MaxChans = ConfValue("channels")->getInt("users");
529 OperMaxChans = ConfValue("channels")->getInt("opers");
530 c_ipv4_range = ConfValue("cidr")->getInt("ipv4clone");
531 c_ipv6_range = ConfValue("cidr")->getInt("ipv6clone");
532 Limits.NickMax = ConfValue("limits")->getInt("maxnick", 32);
533 Limits.ChanMax = ConfValue("limits")->getInt("maxchan", 64);
534 Limits.MaxModes = ConfValue("limits")->getInt("maxmodes", 20);
535 Limits.IdentMax = ConfValue("limits")->getInt("maxident", 11);
536 Limits.MaxQuit = ConfValue("limits")->getInt("maxquit", 255);
537 Limits.MaxTopic = ConfValue("limits")->getInt("maxtopic", 307);
538 Limits.MaxKick = ConfValue("limits")->getInt("maxkick", 255);
539 Limits.MaxGecos = ConfValue("limits")->getInt("maxgecos", 128);
540 Limits.MaxAway = ConfValue("limits")->getInt("maxaway", 200);
541 InvBypassModes = options->getBool("invitebypassmodes", true);
543 range(SoftLimit, 10, ServerInstance->SE->GetMaxFds(), ServerInstance->SE->GetMaxFds(), "<performance:softlimit>");
544 range(MaxConn, 0, SOMAXCONN, SOMAXCONN, "<performance:somaxconn>");
545 range(MaxTargets, 1, 31, 20, "<security:maxtargets>");
546 range(NetBufferSize, 1024, 65534, 10240, "<performance:netbuffersize>");
547 range(MaxWhoResults, 1, 65535, 1024, "<performace:maxwho>");
548 range(WhoWasGroupSize, 0, 10000, 10, "<whowas:groupsize>");
549 range(WhoWasMaxGroups, 0, 1000000, 10240, "<whowas:maxgroups>");
550 range(WhoWasMaxKeep, 3600, INT_MAX, 3600, "<whowas:maxkeep>");
552 ValidIP(DNSServer, "<dns:server>");
553 ValidHost(ServerName, "<server:name>");
554 if (!sid.empty() && !ServerInstance->IsSID(sid))
555 throw CoreException(sid + " is not a valid server ID. A server ID must be 3 characters long, with the first character a digit and the next two characters a digit or letter.");
557 ConfigTagList tags = ConfTags("uline");
558 for(ConfigIter i = tags.first; i != tags.second; ++i)
560 ConfigTag* tag = i->second;
562 if (!tag->readString("server", server))
563 throw CoreException("<uline> tag missing server at " + tag->getTagLocation());
564 ulines[assign(server)] = tag->getBool("silent");
567 tags = ConfTags("banlist");
568 for(ConfigIter i = tags.first; i != tags.second; ++i)
570 ConfigTag* tag = i->second;
572 if (!tag->readString("chan", chan))
573 throw CoreException("<banlist> tag missing chan at " + tag->getTagLocation());
574 maxbans[chan] = tag->getInt("limit");
577 ReadXLine(this, "badip", "ipmask", ServerInstance->XLines->GetFactory("Z"));
578 ReadXLine(this, "badnick", "nick", ServerInstance->XLines->GetFactory("Q"));
579 ReadXLine(this, "badhost", "host", ServerInstance->XLines->GetFactory("K"));
580 ReadXLine(this, "exception", "host", ServerInstance->XLines->GetFactory("E"));
582 memset(DisabledUModes, 0, sizeof(DisabledUModes));
583 for (const unsigned char* p = (const unsigned char*)ConfValue("disabled")->getString("usermodes").c_str(); *p; ++p)
585 if (*p < 'A' || *p > ('A' + 64)) throw CoreException(std::string("Invalid usermode ")+(char)*p+" was found.");
586 DisabledUModes[*p - 'A'] = 1;
589 memset(DisabledCModes, 0, sizeof(DisabledCModes));
590 for (const unsigned char* p = (const unsigned char*)ConfValue("disabled")->getString("chanmodes").c_str(); *p; ++p)
592 if (*p < 'A' || *p > ('A' + 64)) throw CoreException(std::string("Invalid chanmode ")+(char)*p+" was found.");
593 DisabledCModes[*p - 'A'] = 1;
596 memset(HideModeLists, 0, sizeof(HideModeLists));
597 for (const unsigned char* p = (const unsigned char*)ConfValue("security")->getString("hidemodes").c_str(); *p; ++p)
598 HideModeLists[*p] = true;
600 std::string v = security->getString("announceinvites");
603 AnnounceInvites = ServerConfig::INVITE_ANNOUNCE_OPS;
605 AnnounceInvites = ServerConfig::INVITE_ANNOUNCE_ALL;
606 else if (v == "dynamic")
607 AnnounceInvites = ServerConfig::INVITE_ANNOUNCE_DYNAMIC;
609 AnnounceInvites = ServerConfig::INVITE_ANNOUNCE_NONE;
614 /* These tags MUST occur and must ONLY occur once in the config file */
615 static const char* const Once[] = { "server", "admin", "files", "power", "options" };
617 // WARNING: it is not safe to use most of the codebase in this function, as it
618 // will run in the config reader thread
619 void ServerConfig::Read()
621 /* Load and parse the config file, if there are any errors then explode */
623 ParseStack stack(this);
626 valid = stack.ParseFile(ServerInstance->ConfigFileName, 0);
628 catch (CoreException& err)
631 errstr << err.GetReason();
635 ReadFile(MOTD, ConfValue("files")->getString("motd"));
636 ReadFile(RULES, ConfValue("files")->getString("rules"));
637 DNSServer = ConfValue("dns")->getString("server");
642 void ServerConfig::Apply(ServerConfig* old, const std::string &useruid)
646 /* The stuff in here may throw CoreException, be sure we're in a position to catch it. */
649 /* Check we dont have more than one of singular tags, or any of them missing
651 for (int Index = 0; Index * sizeof(*Once) < sizeof(Once); Index++)
653 std::string tag = Once[Index];
654 ConfigTagList tags = ConfTags(tag);
655 if (tags.first == tags.second)
656 throw CoreException("You have not defined a <"+tag+"> tag, this is required.");
658 if (tags.first != tags.second)
660 errstr << "You have more than one <" << tag << "> tag.\n"
661 << "First occurrence at " << ConfValue(tag)->getTagLocation()
662 << "; second occurrence at " << tags.first->second->getTagLocation() << std::endl;
666 for (int Index = 0; Index * sizeof(Deprecated) < sizeof(ChangedConfig); Index++)
669 if (ConfValue(ChangedConfig[Index].tag)->readString(ChangedConfig[Index].value, dummy, true))
670 errstr << "Your configuration contains a deprecated value: <"
671 << ChangedConfig[Index].tag << ":" << ChangedConfig[Index].value << "> - " << ChangedConfig[Index].reason
672 << " (at " << ConfValue(ChangedConfig[Index].tag)->getTagLocation() << ")\n";
677 // Handle special items
678 CrossCheckOperClassType();
679 CrossCheckConnectBlocks(old);
681 catch (CoreException &ce)
683 errstr << ce.GetReason();
686 // write once here, to try it out and make sure its ok
687 ServerInstance->WritePID(this->PID);
690 * These values can only be set on boot. Keep their old values. Do it before we send messages so we actually have a servername.
694 this->ServerName = old->ServerName;
695 this->sid = old->sid;
696 this->cmdline = old->cmdline;
698 // Same for ports... they're bound later on first run.
700 ServerInstance->BindPorts(pl);
703 errstr << "Not all your client ports could be bound.\nThe following port(s) failed to bind:\n";
706 for (FailedPortList::iterator i = pl.begin(); i != pl.end(); i++, j++)
709 snprintf(buf, MAXBUF, "%d. Address: %s Reason: %s\n", j, i->first.empty() ? "<all>" : i->first.c_str(), i->second.c_str());
715 User* user = useruid.empty() ? NULL : ServerInstance->FindNick(useruid);
717 valid = errstr.str().empty();
719 ServerInstance->Logs->Log("CONFIG",DEFAULT, "There were errors in your configuration file:");
721 while (errstr.good())
724 getline(errstr, line, '\n');
728 user->WriteServ("NOTICE %s :*** %s", user->nick.c_str(), line.c_str());
730 ServerInstance->SNO->WriteGlobalSno('a', line);
735 // Starting up, so print it out so it's seen. XXX this is a bit of a hack.
736 printf("%s\n", line.c_str());
741 errstr.str(std::string());
743 /* No old configuration -> initial boot, nothing more to do here */
748 ServerInstance->Exit(EXIT_STATUS_CONFIG);
754 // If there were errors processing configuration, don't touch modules.
761 user->WriteServ("NOTICE %s :*** Successfully rehashed server.", user->nick.c_str());
762 ServerInstance->SNO->WriteGlobalSno('a', "*** Successfully rehashed server.");
765 void ServerConfig::ApplyModules(User* user)
767 Module* whowas = ServerInstance->Modules->Find("cmd_whowas.so");
769 WhowasRequest(NULL, whowas, WhowasRequest::WHOWAS_PRUNE).Send();
771 const std::vector<std::string> v = ServerInstance->Modules->GetAllModuleNames(0);
772 std::vector<std::string> added_modules;
773 std::set<std::string> removed_modules(v.begin(), v.end());
775 ConfigTagList tags = ConfTags("module");
776 for(ConfigIter i = tags.first; i != tags.second; ++i)
778 ConfigTag* tag = i->second;
780 if (tag->readString("name", name))
782 // if this module is already loaded, the erase will succeed, so we need do nothing
783 // otherwise, we need to add the module (which will be done later)
784 if (removed_modules.erase(name) == 0)
785 added_modules.push_back(name);
789 if (ConfValue("options")->getBool("allowhalfop") && removed_modules.erase("m_halfop.so") == 0)
790 added_modules.push_back("m_halfop.so");
792 for (std::set<std::string>::iterator removing = removed_modules.begin(); removing != removed_modules.end(); removing++)
794 // Don't remove cmd_*.so, just remove m_*.so
795 if (removing->c_str()[0] == 'c')
797 Module* m = ServerInstance->Modules->Find(*removing);
798 if (m && ServerInstance->Modules->Unload(m))
800 ServerInstance->SNO->WriteGlobalSno('a', "*** REHASH UNLOADED MODULE: %s",removing->c_str());
803 user->WriteNumeric(RPL_UNLOADEDMODULE, "%s %s :Module %s successfully unloaded.",user->nick.c_str(), removing->c_str(), removing->c_str());
805 ServerInstance->SNO->WriteGlobalSno('a', "Module %s successfully unloaded.", removing->c_str());
810 user->WriteNumeric(ERR_CANTUNLOADMODULE, "%s %s :Failed to unload module %s: %s",user->nick.c_str(), removing->c_str(), removing->c_str(), ServerInstance->Modules->LastError().c_str());
812 ServerInstance->SNO->WriteGlobalSno('a', "Failed to unload module %s: %s", removing->c_str(), ServerInstance->Modules->LastError().c_str());
816 for (std::vector<std::string>::iterator adding = added_modules.begin(); adding != added_modules.end(); adding++)
818 if (ServerInstance->Modules->Load(adding->c_str()))
820 ServerInstance->SNO->WriteGlobalSno('a', "*** REHASH LOADED MODULE: %s",adding->c_str());
822 user->WriteNumeric(RPL_LOADEDMODULE, "%s %s :Module %s successfully loaded.",user->nick.c_str(), adding->c_str(), adding->c_str());
824 ServerInstance->SNO->WriteGlobalSno('a', "Module %s successfully loaded.", adding->c_str());
829 user->WriteNumeric(ERR_CANTLOADMODULE, "%s %s :Failed to load module %s: %s",user->nick.c_str(), adding->c_str(), adding->c_str(), ServerInstance->Modules->LastError().c_str());
831 ServerInstance->SNO->WriteGlobalSno('a', "Failed to load module %s: %s", adding->c_str(), ServerInstance->Modules->LastError().c_str());
836 bool ServerConfig::StartsWithWindowsDriveLetter(const std::string &path)
838 return (path.length() > 2 && isalpha(path[0]) && path[1] == ':');
841 ConfigTag* ServerConfig::ConfValue(const std::string &tag)
843 ConfigDataHash::iterator iter = config_data.find(tag);
844 if (iter == config_data.end())
849 ConfigTagList ServerConfig::ConfTags(const std::string& tag)
851 return config_data.equal_range(tag);
854 /** Read the contents of a file located by `fname' into a file_cache pointed at by `F'.
856 bool ServerConfig::ReadFile(file_cache &F, const std::string& fname)
861 char linebuf[MAXBUF];
865 FileWrapper file(fopen(fname.c_str(), "r"));
871 if (fgets(linebuf, sizeof(linebuf), file))
872 linebuf[strlen(linebuf)-1] = 0;
876 F.push_back(*linebuf ? linebuf : " ");
882 bool ServerConfig::FileExists(const char* file)
885 if (stat(file, &sb) == -1)
888 if ((sb.st_mode & S_IFDIR) > 0)
891 FILE *input = fopen(file, "r");
901 const char* ServerConfig::CleanFilename(const char* name)
903 const char* p = name + strlen(name);
904 while ((p != name) && (*p != '/') && (*p != '\\')) p--;
905 return (p != name ? ++p : p);
908 std::string ServerConfig::GetSID()
913 void ConfigReaderThread::Run()
919 void ConfigReaderThread::Finish()
921 ServerConfig* old = ServerInstance->Config;
922 ServerInstance->Logs->Log("CONFIG",DEBUG,"Switching to new configuration...");
923 ServerInstance->Logs->CloseLogs();
924 ServerInstance->Config = this->Config;
925 ServerInstance->Logs->OpenFileLogs();
926 Config->Apply(old, TheUserUID);
931 * Apply the changed configuration from the rehash.
933 * XXX: The order of these is IMPORTANT, do not reorder them without testing
936 ServerInstance->XLines->CheckELines();
937 ServerInstance->XLines->CheckELines();
938 ServerInstance->XLines->ApplyLines();
939 ServerInstance->Res->Rehash();
940 ServerInstance->ResetMaxBans();
941 Config->ApplyDisabledCommands(Config->DisabledCommands);
942 User* user = TheUserUID.empty() ? ServerInstance->FindNick(TheUserUID) : NULL;
943 FOREACH_MOD(I_OnRehash, OnRehash(user));
944 ServerInstance->BuildISupport();
951 ServerInstance->Logs->CloseLogs();
952 ServerInstance->Config = old;
953 ServerInstance->Logs->OpenFileLogs();