1 /* +------------------------------------+
2 * | Inspire Internet Relay Chat Daemon |
3 * +------------------------------------+
5 * Inspire is copyright (C) 2002-2004 ChatSpike-Dev.
7 * <brain@chatspike.net>
8 * <Craig@chatspike.net>
10 * Written by Craig Edwards, Craig McLure, and others.
11 * This program is free but copyrighted software; see
12 * the file COPYING for details.
14 * ---------------------------------------------------
17 /* Now with added unF! ;) */
22 #include "inspircd_io.h"
23 #include "inspircd_util.h"
24 #include "inspircd_config.h"
27 #include <sys/errno.h>
28 #include <sys/ioctl.h>
29 #include <sys/utsname.h>
31 #include <sys/types.h>
32 #include <sys/event.h>
39 #include <ext/hash_map>
51 #include "connection.h"
63 #include "inspstring.h"
67 #define nspace __gnu_cxx
72 int LogLevel = DEFAULT;
73 char ServerName[MAXBUF];
75 char ServerDesc[MAXBUF];
76 char AdminName[MAXBUF];
77 char AdminEmail[MAXBUF];
78 char AdminNick[MAXBUF];
80 char restartpass[MAXBUF];
84 char PrefixQuit[MAXBUF];
85 char DieValue[MAXBUF];
86 char DNSServer[MAXBUF];
88 int WHOWAS_STALE = 48; // default WHOWAS Entries last 2 days before they go 'stale'
89 int WHOWAS_MAX = 100; // default 100 people maximum in the WHOWAS list
91 time_t startup_time = time(NULL);
92 int NetBufferSize = 10240; // NetBufferSize used as the buffer size for all read() ops
93 extern int MaxWhoResults;
97 char DisabledCommands[MAXBUF];
99 bool AllowHalfop = true;
100 bool AllowProtect = true;
101 bool AllowFounder = true;
103 extern std::vector<Module*> modules;
104 std::vector<std::string> module_names;
105 extern std::vector<ircd_module*> factory;
108 int openSockfd[MAXSOCKS];
110 bool unlimitcore = false;
112 time_t TIME = time(NULL), OLDTIME = time(NULL);
121 template<> struct hash<in_addr>
123 template<> struct nspace::hash<in_addr>
126 size_t operator()(const struct in_addr &a) const
129 memcpy(&q,&a,sizeof(size_t));
134 template<> struct hash<string>
136 template<> struct nspace::hash<string>
139 size_t operator()(const string &s) const
142 static struct hash<const char *> strhash;
143 strlcpy(a,s.c_str(),MAXBUF);
154 bool operator()(const string& s1, const string& s2) const
156 char a[MAXBUF],b[MAXBUF];
157 strlcpy(a,s1.c_str(),MAXBUF);
158 strlcpy(b,s2.c_str(),MAXBUF);
161 return (strcasecmp(a,b) == 0);
166 struct InAddr_HashComp
169 bool operator()(const in_addr &s1, const in_addr &s2) const
174 memcpy(&q,&s1,sizeof(size_t));
175 memcpy(&p,&s2,sizeof(size_t));
183 typedef nspace::hash_map<std::string, userrec*, nspace::hash<string>, StrHashComp> user_hash;
184 typedef nspace::hash_map<std::string, chanrec*, nspace::hash<string>, StrHashComp> chan_hash;
185 typedef nspace::hash_map<in_addr,string*, nspace::hash<in_addr>, InAddr_HashComp> address_cache;
186 typedef std::deque<command_t> command_table;
188 // This table references users by file descriptor.
189 // its an array to make it VERY fast, as all lookups are referenced
190 // by an integer, meaning there is no need for a scan/search operation.
191 userrec* fd_ref_table[65536];
193 int statsAccept = 0, statsRefused = 0, statsUnknown = 0, statsCollisions = 0, statsDns = 0, statsDnsGood = 0, statsDnsBad = 0, statsConnects = 0, statsSent= 0, statsRecv = 0;
199 user_hash clientlist;
202 command_table cmdlist;
209 struct linger linger = { 0 };
210 char MyExecutable[1024];
211 int boundPortCount = 0;
212 int portCount = 0, SERVERportCount = 0, ports[MAXSOCKS];
213 int defaultRoute = 0;
214 char ModPath[MAXBUF];
218 int has_channel(userrec *u, chanrec *c);
219 int usercount(chanrec *c);
220 int usercount_i(chanrec *c);
221 char* Passwd(userrec *user);
222 bool IsDenied(userrec *user);
223 void AddWhoWas(userrec* u);
225 std::vector<long> auth_cookies;
226 std::stringstream config_f(stringstream::in | stringstream::out);
228 std::vector<userrec*> all_opers;
230 static char already_sent[65536];
234 void AddOper(userrec* user)
236 log(DEBUG,"Oper added to optimization list");
237 all_opers.push_back(user);
240 void DeleteOper(userrec* user)
242 for (std::vector<userrec*>::iterator a = all_opers.begin(); a < all_opers.end(); a++)
246 log(DEBUG,"Oper removed from optimization list");
255 char Revision[] = "$Revision$";
258 char *v2 = strtok_r(s1," ",&savept);
260 v2 = strtok_r(s1," ",&savept);
262 return (long)(atof(v2)*10000);
266 std::string getservername()
271 std::string getserverdesc()
276 std::string getnetworkname()
281 std::string getadminname()
286 std::string getadminemail()
291 std::string getadminnick()
296 void log(int level,char *text, ...)
298 char textbuffer[MAXBUF];
301 struct tm * timeinfo;
302 if (level < LogLevel)
306 timeinfo = localtime (&rawtime);
311 va_start (argsPtr, text);
312 vsnprintf(textbuffer, MAXBUF, text, argsPtr);
314 strlcpy(b,asctime(timeinfo),MAXBUF);
315 b[24] = ':'; // we know this is the end of the time string
316 fprintf(log_file,"%s %s\n",b,textbuffer);
319 // nofork enabled? display it on terminal too
320 printf("%s %s\n",b,textbuffer);
325 void readfile(file_cache &F, const char* fname)
328 char linebuf[MAXBUF];
330 log(DEBUG,"readfile: loading %s",fname);
332 file = fopen(fname,"r");
337 fgets(linebuf,sizeof(linebuf),file);
338 linebuf[strlen(linebuf)-1]='\0';
345 F.push_back(linebuf);
352 log(DEBUG,"readfile: failed to load file: %s",fname);
354 log(DEBUG,"readfile: loaded %s, %lu lines",fname,(unsigned long)F.size());
357 void ReadConfig(bool bail, userrec* user)
359 char dbg[MAXBUF],pauseval[MAXBUF],Value[MAXBUF],timeout[MAXBUF],NB[MAXBUF],flood[MAXBUF],MW[MAXBUF];
360 char AH[MAXBUF],AP[MAXBUF],AF[MAXBUF],DNT[MAXBUF],pfreq[MAXBUF],thold[MAXBUF],sqmax[MAXBUF],rqmax[MAXBUF];
362 std::stringstream errstr;
364 if (!LoadConf(CONFIG_FILE,&config_f,&errstr))
369 printf("There were errors in your configuration:\n%s",errstr.str().c_str());
377 WriteServ(user->fd,"NOTICE %s :There were errors in the configuration file:",user->nick);
378 while (!errstr.eof())
380 errstr.getline(dataline,1024);
381 WriteServ(user->fd,"NOTICE %s :%s",user->nick,dataline);
386 WriteOpers("There were errors in the configuration file:",user->nick);
387 while (!errstr.eof())
389 errstr.getline(dataline,1024);
390 WriteOpers(dataline);
397 ConfValue("server","name",0,ServerName,&config_f);
398 ConfValue("server","description",0,ServerDesc,&config_f);
399 ConfValue("server","network",0,Network,&config_f);
400 ConfValue("admin","name",0,AdminName,&config_f);
401 ConfValue("admin","email",0,AdminEmail,&config_f);
402 ConfValue("admin","nick",0,AdminNick,&config_f);
403 ConfValue("files","motd",0,motd,&config_f);
404 ConfValue("files","rules",0,rules,&config_f);
405 ConfValue("power","diepass",0,diepass,&config_f);
406 ConfValue("power","pause",0,pauseval,&config_f);
407 ConfValue("power","restartpass",0,restartpass,&config_f);
408 ConfValue("options","prefixquit",0,PrefixQuit,&config_f);
409 ConfValue("die","value",0,DieValue,&config_f);
410 ConfValue("options","loglevel",0,dbg,&config_f);
411 ConfValue("options","netbuffersize",0,NB,&config_f);
412 ConfValue("options","maxwho",0,MW,&config_f);
413 ConfValue("options","allowhalfop",0,AH,&config_f);
414 ConfValue("options","allowprotect",0,AP,&config_f);
415 ConfValue("options","allowfounder",0,AF,&config_f);
416 ConfValue("dns","server",0,DNSServer,&config_f);
417 ConfValue("dns","timeout",0,DNT,&config_f);
418 ConfValue("options","moduledir",0,ModPath,&config_f);
419 ConfValue("disabled","commands",0,DisabledCommands,&config_f);
421 NetBufferSize = atoi(NB);
422 MaxWhoResults = atoi(MW);
423 dns_timeout = atoi(DNT);
427 strlcpy(DNSServer,"127.0.0.1",MAXBUF);
429 strlcpy(ModPath,MOD_PATH,MAXBUF);
430 AllowHalfop = ((!strcasecmp(AH,"true")) || (!strcasecmp(AH,"1")) || (!strcasecmp(AH,"yes")));
431 AllowProtect = ((!strcasecmp(AP,"true")) || (!strcasecmp(AP,"1")) || (!strcasecmp(AP,"yes")));
432 AllowFounder = ((!strcasecmp(AF,"true")) || (!strcasecmp(AF,"1")) || (!strcasecmp(AF,"yes")));
433 if ((!NetBufferSize) || (NetBufferSize > 65535) || (NetBufferSize < 1024))
435 log(DEFAULT,"No NetBufferSize specified or size out of range, setting to default of 10240.");
436 NetBufferSize = 10240;
438 if ((!MaxWhoResults) || (MaxWhoResults > 65535) || (MaxWhoResults < 1))
440 log(DEFAULT,"No MaxWhoResults specified or size out of range, setting to default of 128.");
443 if (!strcmp(dbg,"debug"))
445 if (!strcmp(dbg,"verbose"))
447 if (!strcmp(dbg,"default"))
449 if (!strcmp(dbg,"sparse"))
451 if (!strcmp(dbg,"none"))
454 log(DEFAULT,"Reading message of the day...");
455 readfile(RULES,rules);
456 log(DEFAULT,"Reading connect classes...");
458 for (int i = 0; i < ConfValueEnum("connect",&config_f); i++)
461 ConfValue("connect","allow",i,Value,&config_f);
462 ConfValue("connect","timeout",i,timeout,&config_f);
463 ConfValue("connect","flood",i,flood,&config_f);
464 ConfValue("connect","pingfreq",i,pfreq,&config_f);
465 ConfValue("connect","threshold",i,thold,&config_f);
466 ConfValue("connect","sendq",i,sqmax,&config_f);
467 ConfValue("connect","recvq",i,rqmax,&config_f);
470 strlcpy(c.host,Value,MAXBUF);
472 strlcpy(Value,"",MAXBUF);
473 ConfValue("connect","password",i,Value,&config_f);
474 strlcpy(c.pass,Value,MAXBUF);
475 c.registration_timeout = 90; // default is 2 minutes
477 c.flood = atoi(flood);
479 c.sendqmax = 262144; // 256k
480 c.recvqmax = 4096; // 4k
483 c.threshold = atoi(thold);
487 c.sendqmax = atoi(sqmax);
491 c.recvqmax = atoi(rqmax);
495 c.registration_timeout = atoi(timeout);
499 c.pingtime = atoi(pfreq);
501 Classes.push_back(c);
502 log(DEBUG,"Read connect class type ALLOW, host=%s password=%s timeout=%lu flood=%lu",c.host,c.pass,(unsigned long)c.registration_timeout,(unsigned long)c.flood);
506 ConfValue("connect","deny",i,Value,&config_f);
507 strlcpy(c.host,Value,MAXBUF);
509 Classes.push_back(c);
510 log(DEBUG,"Read connect class type DENY, host=%s",c.host);
514 log(DEFAULT,"Reading K lines,Q lines and Z lines from config...");
515 read_xline_defaults();
516 log(DEFAULT,"Applying K lines, Q lines and Z lines...");
518 log(DEFAULT,"Done reading configuration file, InspIRCd is now starting.");
521 log(DEFAULT,"Adding and removing modules due to rehash...");
523 std::vector<std::string> old_module_names, new_module_names, added_modules, removed_modules;
525 // store the old module names
526 for (std::vector<std::string>::iterator t = module_names.begin(); t != module_names.end(); t++)
528 old_module_names.push_back(*t);
531 // get the new module names
532 for (int count2 = 0; count2 < ConfValueEnum("module",&config_f); count2++)
534 ConfValue("module","name",count2,Value,&config_f);
535 new_module_names.push_back(Value);
538 // now create a list of new modules that are due to be loaded
539 // and a seperate list of modules which are due to be unloaded
540 for (std::vector<std::string>::iterator _new = new_module_names.begin(); _new != new_module_names.end(); _new++)
543 for (std::vector<std::string>::iterator old = old_module_names.begin(); old != old_module_names.end(); old++)
549 added_modules.push_back(*_new);
551 for (std::vector<std::string>::iterator oldm = old_module_names.begin(); oldm != old_module_names.end(); oldm++)
554 for (std::vector<std::string>::iterator newm = new_module_names.begin(); newm != new_module_names.end(); newm++)
560 removed_modules.push_back(*oldm);
562 // now we have added_modules, a vector of modules to be loaded, and removed_modules, a vector of modules
564 int rem = 0, add = 0;
565 if (!removed_modules.empty())
566 for (std::vector<std::string>::iterator removing = removed_modules.begin(); removing != removed_modules.end(); removing++)
568 if (UnloadModule(removing->c_str()))
570 WriteOpers("*** REHASH UNLOADED MODULE: %s",removing->c_str());
571 WriteServ(user->fd,"973 %s %s :Module %s successfully unloaded.",user->nick, removing->c_str(), removing->c_str());
576 WriteServ(user->fd,"972 %s %s :Failed to unload module %s: %s",user->nick, removing->c_str(), removing->c_str(), ModuleError());
579 if (!added_modules.empty())
580 for (std::vector<std::string>::iterator adding = added_modules.begin(); adding != added_modules.end(); adding++)
582 if (LoadModule(adding->c_str()))
584 WriteOpers("*** REHASH LOADED MODULE: %s",adding->c_str());
585 WriteServ(user->fd,"975 %s %s :Module %s successfully loaded.",user->nick, adding->c_str(), adding->c_str());
590 WriteServ(user->fd,"974 %s %s :Failed to load module %s: %s",user->nick, adding->c_str(), adding->c_str(), ModuleError());
593 log(DEFAULT,"Successfully unloaded %lu of %lu modules and loaded %lu of %lu modules.",(unsigned long)rem,(unsigned long)removed_modules.size(),(unsigned long)add,(unsigned long)added_modules.size());
597 /* write formatted text to a socket, in same format as printf
598 * New in 1.0 Beta 5 - Nothing is written directly to a users fd any more.
599 * Instead, data builds up in the users sendq and each time around the mainloop
600 * this data is flushed to the user's socket (see userrec::FlushWriteBuf).
603 void Write(int sock,char *text, ...)
609 log(DEFAULT,"*** BUG *** Write was given an invalid parameter");
612 char textbuffer[MAXBUF];
617 va_start (argsPtr, text);
618 vsnprintf(textbuffer, MAXBUF, text, argsPtr);
620 int bytes = snprintf(tb,MAXBUF,"%s\r\n",textbuffer);
622 if (fd_ref_table[sock])
625 FOREACH_RESULT(OnRawSocketWrite(sock,tb,bytes));
626 fd_ref_table[sock]->AddWriteBuf(tb);
629 else log(DEFAULT,"ERROR! attempted write to a user with no fd_ref_table entry!!!");
632 /* write a server formatted numeric response to a single socket */
634 void WriteServ(int sock, char* text, ...)
640 log(DEFAULT,"*** BUG *** WriteServ was given an invalid parameter");
643 char textbuffer[MAXBUF],tb[MAXBUF];
646 va_start (argsPtr, text);
648 vsnprintf(textbuffer, MAXBUF, text, argsPtr);
650 int bytes = snprintf(tb,MAXBUF,":%s %s\r\n",ServerName,textbuffer);
652 if (fd_ref_table[sock])
655 FOREACH_RESULT(OnRawSocketWrite(sock,tb,bytes));
656 fd_ref_table[sock]->AddWriteBuf(tb);
659 else log(DEFAULT,"ERROR! attempted write to a user with no fd_ref_table entry!!!");
662 /* write text from an originating user to originating user */
664 void WriteFrom(int sock, userrec *user,char* text, ...)
668 if ((!text) || (!user))
670 log(DEFAULT,"*** BUG *** WriteFrom was given an invalid parameter");
673 char textbuffer[MAXBUF],tb[MAXBUF];
676 va_start (argsPtr, text);
678 vsnprintf(textbuffer, MAXBUF, text, argsPtr);
680 int bytes = snprintf(tb,MAXBUF,":%s!%s@%s %s\r\n",user->nick,user->ident,user->dhost,textbuffer);
682 if (fd_ref_table[sock])
685 FOREACH_RESULT(OnRawSocketWrite(sock,tb,bytes));
686 fd_ref_table[sock]->AddWriteBuf(tb);
689 else log(DEFAULT,"ERROR! attempted write to a user with no fd_ref_table entry!!!");
692 /* write text to an destination user from a source user (e.g. user privmsg) */
694 void WriteTo(userrec *source, userrec *dest,char *data, ...)
696 if ((!dest) || (!data))
698 log(DEFAULT,"*** BUG *** WriteTo was given an invalid parameter");
701 if (dest->fd == FD_MAGIC_NUMBER)
703 char textbuffer[MAXBUF],tb[MAXBUF];
705 va_start (argsPtr, data);
706 vsnprintf(textbuffer, MAXBUF, data, argsPtr);
710 // if no source given send it from the server.
713 WriteServ(dest->fd,":%s %s",ServerName,textbuffer);
717 WriteFrom(dest->fd,source,"%s",textbuffer);
721 /* write formatted text from a source user to all users on a channel
722 * including the sender (NOT for privmsg, notice etc!) */
724 void WriteChannel(chanrec* Ptr, userrec* user, char* text, ...)
726 if ((!Ptr) || (!user) || (!text))
728 log(DEFAULT,"*** BUG *** WriteChannel was given an invalid parameter");
731 char textbuffer[MAXBUF];
733 va_start (argsPtr, text);
734 vsnprintf(textbuffer, MAXBUF, text, argsPtr);
737 std::vector<char*> *ulist = Ptr->GetUsers();
738 for (int j = 0; j < ulist->size(); j++)
740 char* o = (*ulist)[j];
741 userrec* otheruser = (userrec*)o;
742 if (otheruser->fd != FD_MAGIC_NUMBER)
743 WriteTo(user,otheruser,"%s",textbuffer);
747 /* write formatted text from a source user to all users on a channel
748 * including the sender (NOT for privmsg, notice etc!) doesnt send to
749 * users on remote servers */
751 void WriteChannelLocal(chanrec* Ptr, userrec* user, char* text, ...)
753 if ((!Ptr) || (!text))
755 log(DEFAULT,"*** BUG *** WriteChannel was given an invalid parameter");
758 char textbuffer[MAXBUF];
760 va_start (argsPtr, text);
761 vsnprintf(textbuffer, MAXBUF, text, argsPtr);
764 std::vector<char*> *ulist = Ptr->GetUsers();
765 for (int j = 0; j < ulist->size(); j++)
767 char* o = (*ulist)[j];
768 userrec* otheruser = (userrec*)o;
769 if ((otheruser->fd != FD_MAGIC_NUMBER) && (otheruser->fd != -1) && (otheruser != user))
773 WriteServ(otheruser->fd,"%s",textbuffer);
777 WriteTo(user,otheruser,"%s",textbuffer);
784 void WriteChannelWithServ(char* ServName, chanrec* Ptr, char* text, ...)
786 if ((!Ptr) || (!text))
788 log(DEFAULT,"*** BUG *** WriteChannelWithServ was given an invalid parameter");
791 char textbuffer[MAXBUF];
793 va_start (argsPtr, text);
794 vsnprintf(textbuffer, MAXBUF, text, argsPtr);
798 std::vector<char*> *ulist = Ptr->GetUsers();
799 for (int j = 0; j < ulist->size(); j++)
801 char* o = (*ulist)[j];
802 userrec* otheruser = (userrec*)o;
803 if (otheruser->fd != FD_MAGIC_NUMBER)
804 WriteServ(otheruser->fd,"%s",textbuffer);
809 /* write formatted text from a source user to all users on a channel except
810 * for the sender (for privmsg etc) */
812 void ChanExceptSender(chanrec* Ptr, userrec* user, char* text, ...)
814 if ((!Ptr) || (!user) || (!text))
816 log(DEFAULT,"*** BUG *** ChanExceptSender was given an invalid parameter");
819 char textbuffer[MAXBUF];
821 va_start (argsPtr, text);
822 vsnprintf(textbuffer, MAXBUF, text, argsPtr);
825 std::vector<char*> *ulist = Ptr->GetUsers();
826 for (int j = 0; j < ulist->size(); j++)
828 char* o = (*ulist)[j];
829 userrec* otheruser = (userrec*)o;
830 if ((otheruser->fd != FD_MAGIC_NUMBER) && (user != otheruser))
831 WriteFrom(otheruser->fd,user,"%s",textbuffer);
836 std::string GetServerDescription(char* servername)
838 for (int j = 0; j < 32; j++)
842 for (int k = 0; k < me[j]->connectors.size(); k++)
844 if (!strcasecmp(me[j]->connectors[k].GetServerName().c_str(),servername))
846 return me[j]->connectors[k].GetDescription();
850 return ServerDesc; // not a remote server that can be found, it must be me.
855 /* write a formatted string to all users who share at least one common
856 * channel, including the source user e.g. for use in NICK */
858 void WriteCommon(userrec *u, char* text, ...)
862 log(DEFAULT,"*** BUG *** WriteCommon was given an invalid parameter");
866 if (u->registered != 7) {
867 log(DEFAULT,"*** BUG *** WriteCommon on an unregistered user");
871 char textbuffer[MAXBUF];
873 va_start (argsPtr, text);
874 vsnprintf(textbuffer, MAXBUF, text, argsPtr);
877 // FIX: Stops a message going to the same person more than once
878 bzero(&already_sent,65536);
880 bool sent_to_at_least_one = false;
882 for (int i = 0; i < MAXCHANS; i++)
884 if (u->chans[i].channel)
886 std::vector<char*> *ulist = u->chans[i].channel->GetUsers();
887 for (int j = 0; j < ulist->size(); j++)
889 char* o = (*ulist)[j];
890 userrec* otheruser = (userrec*)o;
891 if ((otheruser->fd > 0) && (!already_sent[otheruser->fd]))
893 already_sent[otheruser->fd] = 1;
894 WriteFrom(otheruser->fd,u,"%s",textbuffer);
895 sent_to_at_least_one = true;
900 // if the user was not in any channels, no users will receive the text. Make sure the user
901 // receives their OWN message for WriteCommon
902 if (!sent_to_at_least_one)
904 WriteFrom(u->fd,u,"%s",textbuffer);
908 /* write a formatted string to all users who share at least one common
909 * channel, NOT including the source user e.g. for use in QUIT */
911 void WriteCommonExcept(userrec *u, char* text, ...)
915 log(DEFAULT,"*** BUG *** WriteCommon was given an invalid parameter");
919 if (u->registered != 7) {
920 log(DEFAULT,"*** BUG *** WriteCommon on an unregistered user");
924 char textbuffer[MAXBUF];
926 va_start (argsPtr, text);
927 vsnprintf(textbuffer, MAXBUF, text, argsPtr);
930 bzero(&already_sent,65536);
932 for (int i = 0; i < MAXCHANS; i++)
934 if (u->chans[i].channel)
936 std::vector<char*> *ulist = u->chans[i].channel->GetUsers();
937 for (int j = 0; j < ulist->size(); j++)
939 char* o = (*ulist)[j];
940 userrec* otheruser = (userrec*)o;
943 if ((otheruser->fd > 0) && (!already_sent[otheruser->fd]))
945 already_sent[otheruser->fd] = 1;
946 WriteFrom(otheruser->fd,u,"%s",textbuffer);
954 void WriteOpers(char* text, ...)
958 log(DEFAULT,"*** BUG *** WriteOpers was given an invalid parameter");
962 char textbuffer[MAXBUF];
964 va_start (argsPtr, text);
965 vsnprintf(textbuffer, MAXBUF, text, argsPtr);
968 for (std::vector<userrec*>::iterator i = all_opers.begin(); i != all_opers.end(); i++)
971 if ((a) && (a->fd != FD_MAGIC_NUMBER))
973 if (strchr(a->modes,'s'))
975 // send server notices to all with +s
976 WriteServ(a->fd,"NOTICE %s :%s",a->nick,textbuffer);
982 void NoticeAllOpers(userrec *source, bool local_only, char* text, ...)
984 if ((!text) || (!source))
986 log(DEFAULT,"*** BUG *** NoticeAllOpers was given an invalid parameter");
990 char textbuffer[MAXBUF];
992 va_start (argsPtr, text);
993 vsnprintf(textbuffer, MAXBUF, text, argsPtr);
996 for (std::vector<userrec*>::iterator i = all_opers.begin(); i != all_opers.end(); i++)
999 if ((a) && (a->fd != FD_MAGIC_NUMBER))
1001 if (strchr(a->modes,'s'))
1003 // send server notices to all with +s
1004 WriteServ(a->fd,"NOTICE %s :*** Notice From %s: %s",a->nick,source->nick,textbuffer);
1011 char buffer[MAXBUF];
1012 snprintf(buffer,MAXBUF,"V %s @* :%s",source->nick,textbuffer);
1013 NetSendToAll(buffer);
1017 // returns TRUE of any users on channel C occupy server 'servername'.
1019 bool ChanAnyOnThisServer(chanrec *c,char* servername)
1021 log(DEBUG,"ChanAnyOnThisServer");
1023 std::vector<char*> *ulist = c->GetUsers();
1024 for (int j = 0; j < ulist->size(); j++)
1026 char* o = (*ulist)[j];
1027 userrec* user = (userrec*)o;
1028 if (!strcasecmp(user->server,servername))
1034 // returns true if user 'u' shares any common channels with any users on server 'servername'
1036 bool CommonOnThisServer(userrec* u,const char* servername)
1038 log(DEBUG,"ChanAnyOnThisServer");
1040 for (int i = 0; i < MAXCHANS; i++)
1042 if (u->chans[i].channel)
1044 std::vector<char*> *ulist = u->chans[i].channel->GetUsers();
1045 for (int j = 0; j < ulist->size(); j++)
1047 char* o = (*ulist)[j];
1048 userrec* user = (userrec*)o;
1049 if (!strcasecmp(user->server,servername))
1058 void NetSendToCommon(userrec* u, char* s)
1060 char buffer[MAXBUF];
1061 snprintf(buffer,MAXBUF,"%s",s);
1063 log(DEBUG,"NetSendToCommon: '%s' '%s'",u->nick,s);
1065 std::string msg = buffer;
1066 FOREACH_MOD OnPacketTransmit(msg,s);
1067 strlcpy(buffer,msg.c_str(),MAXBUF);
1069 for (int j = 0; j < 32; j++)
1073 for (int k = 0; k < me[j]->connectors.size(); k++)
1075 if (CommonOnThisServer(u,me[j]->connectors[k].GetServerName().c_str()))
1077 me[j]->SendPacket(buffer,me[j]->connectors[k].GetServerName().c_str());
1085 void NetSendToAll(char* s)
1087 char buffer[MAXBUF];
1088 snprintf(buffer,MAXBUF,"%s",s);
1090 log(DEBUG,"NetSendToAll: '%s'",s);
1092 std::string msg = buffer;
1093 FOREACH_MOD OnPacketTransmit(msg,s);
1094 strlcpy(buffer,msg.c_str(),MAXBUF);
1096 for (int j = 0; j < 32; j++)
1100 for (int k = 0; k < me[j]->connectors.size(); k++)
1102 me[j]->SendPacket(buffer,me[j]->connectors[k].GetServerName().c_str());
1108 void NetSendToAllAlive(char* s)
1110 char buffer[MAXBUF];
1111 snprintf(buffer,MAXBUF,"%s",s);
1113 log(DEBUG,"NetSendToAllAlive: '%s'",s);
1115 std::string msg = buffer;
1116 FOREACH_MOD OnPacketTransmit(msg,s);
1117 strlcpy(buffer,msg.c_str(),MAXBUF);
1119 for (int j = 0; j < 32; j++)
1123 for (int k = 0; k < me[j]->connectors.size(); k++)
1125 if (me[j]->connectors[k].GetState() != STATE_DISCONNECTED)
1127 me[j]->SendPacket(buffer,me[j]->connectors[k].GetServerName().c_str());
1131 log(DEBUG,"%s is dead, not sending to it.",me[j]->connectors[k].GetServerName().c_str());
1139 void NetSendToOne(char* target,char* s)
1141 char buffer[MAXBUF];
1142 snprintf(buffer,MAXBUF,"%s",s);
1144 log(DEBUG,"NetSendToOne: '%s' '%s'",target,s);
1146 std::string msg = buffer;
1147 FOREACH_MOD OnPacketTransmit(msg,s);
1148 strlcpy(buffer,msg.c_str(),MAXBUF);
1150 for (int j = 0; j < 32; j++)
1154 for (int k = 0; k < me[j]->connectors.size(); k++)
1156 if (!strcasecmp(me[j]->connectors[k].GetServerName().c_str(),target))
1158 me[j]->SendPacket(buffer,me[j]->connectors[k].GetServerName().c_str());
1165 void NetSendToAllExcept(const char* target,char* s)
1167 char buffer[MAXBUF];
1168 snprintf(buffer,MAXBUF,"%s",s);
1170 log(DEBUG,"NetSendToAllExcept: '%s' '%s'",target,s);
1172 std::string msg = buffer;
1173 FOREACH_MOD OnPacketTransmit(msg,s);
1174 strlcpy(buffer,msg.c_str(),MAXBUF);
1176 for (int j = 0; j < 32; j++)
1180 for (int k = 0; k < me[j]->connectors.size(); k++)
1182 if (strcasecmp(me[j]->connectors[k].GetServerName().c_str(),target))
1184 me[j]->SendPacket(buffer,me[j]->connectors[k].GetServerName().c_str());
1192 void WriteMode(const char* modes, int flags, const char* text, ...)
1194 if ((!text) || (!modes) || (!flags))
1196 log(DEFAULT,"*** BUG *** WriteMode was given an invalid parameter");
1200 char textbuffer[MAXBUF];
1202 va_start (argsPtr, text);
1203 vsnprintf(textbuffer, MAXBUF, text, argsPtr);
1205 int modelen = strlen(modes);
1207 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
1209 if ((i->second) && (i->second->fd != FD_MAGIC_NUMBER))
1211 bool send_to_user = false;
1213 if (flags == WM_AND)
1215 send_to_user = true;
1216 for (int n = 0; n < modelen; n++)
1218 if (!hasumode(i->second,modes[n]))
1220 send_to_user = false;
1225 else if (flags == WM_OR)
1227 send_to_user = false;
1228 for (int n = 0; n < modelen; n++)
1230 if (hasumode(i->second,modes[n]))
1232 send_to_user = true;
1240 WriteServ(i->second->fd,"NOTICE %s :%s",i->second->nick,textbuffer);
1247 void NoticeAll(userrec *source, bool local_only, char* text, ...)
1249 if ((!text) || (!source))
1251 log(DEFAULT,"*** BUG *** NoticeAll was given an invalid parameter");
1255 char textbuffer[MAXBUF];
1257 va_start (argsPtr, text);
1258 vsnprintf(textbuffer, MAXBUF, text, argsPtr);
1261 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
1263 if ((i->second) && (i->second->fd != FD_MAGIC_NUMBER))
1265 WriteFrom(i->second->fd,source,"NOTICE $* :%s",textbuffer);
1271 char buffer[MAXBUF];
1272 snprintf(buffer,MAXBUF,"V %s * :%s",source->nick,textbuffer);
1273 NetSendToAll(buffer);
1278 void WriteWallOps(userrec *source, bool local_only, char* text, ...)
1280 if ((!text) || (!source))
1282 log(DEFAULT,"*** BUG *** WriteOpers was given an invalid parameter");
1286 char textbuffer[MAXBUF];
1288 va_start (argsPtr, text);
1289 vsnprintf(textbuffer, MAXBUF, text, argsPtr);
1292 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
1294 if ((i->second) && (i->second->fd != FD_MAGIC_NUMBER))
1296 if (strchr(i->second->modes,'w'))
1298 WriteTo(source,i->second,"WALLOPS :%s",textbuffer);
1305 char buffer[MAXBUF];
1306 snprintf(buffer,MAXBUF,"@ %s :%s",source->nick,textbuffer);
1307 NetSendToAll(buffer);
1311 /* convert a string to lowercase. Note following special circumstances
1312 * taken from RFC 1459. Many "official" server branches still hold to this
1313 * rule so i will too;
1315 * Because of IRC's scandanavian origin, the characters {}| are
1316 * considered to be the lower case equivalents of the characters []\,
1317 * respectively. This is a critical issue when determining the
1318 * equivalence of two nicknames.
1321 void strlower(char *n)
1325 for (char* t = n; *t; t++)
1332 /* Find a user record by nickname and return a pointer to it */
1334 userrec* Find(std::string nick)
1336 user_hash::iterator iter = clientlist.find(nick);
1338 if (iter == clientlist.end())
1339 /* Couldn't find it */
1342 return iter->second;
1345 /* find a channel record by channel name and return a pointer to it */
1347 chanrec* FindChan(const char* chan)
1351 log(DEFAULT,"*** BUG *** Findchan was given an invalid parameter");
1355 chan_hash::iterator iter = chanlist.find(chan);
1357 if (iter == chanlist.end())
1358 /* Couldn't find it */
1361 return iter->second;
1365 long GetMaxBans(char* name)
1368 for (int count = 0; count < ConfValueEnum("banlist",&config_f); count++)
1370 ConfValue("banlist","chan",count,CM,&config_f);
1373 ConfValue("banlist","limit",count,CM,&config_f);
1381 void purge_empty_chans(userrec* u)
1384 int go_again = 1, purge = 0;
1386 // firstly decrement the count on each channel
1387 for (int f = 0; f < MAXCHANS; f++)
1389 if (u->chans[f].channel)
1391 u->chans[f].channel->DelUser((char*)u);
1395 for (int i = 0; i < MAXCHANS; i++)
1397 if (u->chans[i].channel)
1399 if (!usercount(u->chans[i].channel))
1401 chan_hash::iterator i2 = chanlist.find(u->chans[i].channel->name);
1402 /* kill the record */
1403 if (i2 != chanlist.end())
1405 log(DEBUG,"del_channel: destroyed: %s",i2->second->name);
1411 u->chans[i].channel = NULL;
1416 log(DEBUG,"skipped purge for %s",u->chans[i].channel->name);
1420 log(DEBUG,"completed channel purge, killed %lu",(unsigned long)purge);
1426 char scratch[MAXBUF];
1427 char sparam[MAXBUF];
1429 char* chanmodes(chanrec *chan)
1433 log(DEFAULT,"*** BUG *** chanmodes was given an invalid parameter");
1440 if (chan->noexternal)
1442 strlcat(scratch,"n",MAXMODES);
1444 if (chan->topiclock)
1446 strlcat(scratch,"t",MAXMODES);
1450 strlcat(scratch,"k",MAXMODES);
1454 strlcat(scratch,"l",MAXMODES);
1456 if (chan->inviteonly)
1458 strlcat(scratch,"i",MAXMODES);
1460 if (chan->moderated)
1462 strlcat(scratch,"m",MAXMODES);
1466 strlcat(scratch,"s",MAXMODES);
1468 if (chan->c_private)
1470 strlcat(scratch,"p",MAXMODES);
1474 strlcat(sparam," ",MAXBUF);
1475 strlcat(sparam,chan->key,MAXBUF);
1480 sprintf(foo," %lu",(unsigned long)chan->limit);
1481 strlcat(sparam,foo,MAXBUF);
1483 if (*chan->custom_modes)
1485 strlcat(scratch,chan->custom_modes,MAXMODES);
1486 for (int z = 0; chan->custom_modes[z] != 0; z++)
1488 std::string extparam = chan->GetModeParameter(chan->custom_modes[z]);
1491 strlcat(sparam," ",MAXBUF);
1492 strlcat(sparam,extparam.c_str(),MAXBUF);
1496 log(DEBUG,"chanmodes: %s %s%s",chan->name,scratch,sparam);
1497 strlcat(scratch,sparam,MAXMODES);
1502 /* compile a userlist of a channel into a string, each nick seperated by
1503 * spaces and op, voice etc status shown as @ and + */
1505 void userlist(userrec *user,chanrec *c)
1507 if ((!c) || (!user))
1509 log(DEFAULT,"*** BUG *** userlist was given an invalid parameter");
1513 snprintf(list,MAXBUF,"353 %s = %s :", user->nick, c->name);
1515 std::vector<char*> *ulist = c->GetUsers();
1516 for (int i = 0; i < ulist->size(); i++)
1518 char* o = (*ulist)[i];
1519 userrec* otheruser = (userrec*)o;
1520 if ((!has_channel(user,c)) && (strchr(otheruser->modes,'i')))
1522 /* user is +i, and source not on the channel, does not show
1523 * nick in NAMES list */
1526 strlcat(list,cmode(otheruser,c),MAXBUF);
1527 strlcat(list,otheruser->nick,MAXBUF);
1528 strlcat(list," ",MAXBUF);
1529 if (strlen(list)>(480-NICKMAX))
1531 /* list overflowed into
1532 * multiple numerics */
1533 WriteServ(user->fd,"%s",list);
1534 snprintf(list,MAXBUF,"353 %s = %s :", user->nick, c->name);
1537 /* if whats left in the list isnt empty, send it */
1538 if (list[strlen(list)-1] != ':')
1540 WriteServ(user->fd,"%s",list);
1544 /* return a count of the users on a specific channel accounting for
1545 * invisible users who won't increase the count. e.g. for /LIST */
1547 int usercount_i(chanrec *c)
1553 log(DEFAULT,"*** BUG *** usercount_i was given an invalid parameter");
1558 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
1562 if (has_channel(i->second,c))
1564 if (isnick(i->second->nick))
1566 if ((!has_channel(i->second,c)) && (strchr(i->second->modes,'i')))
1568 /* user is +i, and source not on the channel, does not show
1569 * nick in NAMES list */
1577 log(DEBUG,"usercount_i: %s %lu",c->name,(unsigned long)count);
1582 int usercount(chanrec *c)
1586 log(DEFAULT,"*** BUG *** usercount was given an invalid parameter");
1589 int count = c->GetUserCounter();
1590 log(DEBUG,"usercount: %s %lu",c->name,(unsigned long)count);
1595 /* add a channel to a user, creating the record for it if needed and linking
1596 * it to the user record */
1598 chanrec* add_channel(userrec *user, const char* cn, const char* key, bool override)
1600 if ((!user) || (!cn))
1602 log(DEFAULT,"*** BUG *** add_channel was given an invalid parameter");
1610 strncpy(cname,cn,MAXBUF);
1612 // we MUST declare this wherever we use FOREACH_RESULT
1615 if (strlen(cname) > CHANMAX-1)
1617 cname[CHANMAX-1] = '\0';
1620 log(DEBUG,"add_channel: %s %s",user->nick,cname);
1622 if ((FindChan(cname)) && (has_channel(user,FindChan(cname))))
1624 return NULL; // already on the channel!
1628 if (!FindChan(cname))
1631 FOREACH_RESULT(OnUserPreJoin(user,NULL,cname));
1632 if (MOD_RESULT == 1) {
1636 /* create a new one */
1637 log(DEBUG,"add_channel: creating: %s",cname);
1639 chanlist[cname] = new chanrec();
1641 strlcpy(chanlist[cname]->name, cname,CHANMAX);
1642 chanlist[cname]->topiclock = 1;
1643 chanlist[cname]->noexternal = 1;
1644 chanlist[cname]->created = TIME;
1645 strcpy(chanlist[cname]->topic, "");
1646 strncpy(chanlist[cname]->setby, user->nick,NICKMAX);
1647 chanlist[cname]->topicset = 0;
1648 Ptr = chanlist[cname];
1649 log(DEBUG,"add_channel: created: %s",cname);
1650 /* set created to 2 to indicate user
1651 * is the first in the channel
1652 * and should be given ops */
1658 /* channel exists, just fish out a pointer to its struct */
1659 Ptr = FindChan(cname);
1662 log(DEBUG,"add_channel: joining to: %s",Ptr->name);
1664 // the override flag allows us to bypass channel modes
1665 // and bans (used by servers)
1666 if ((!override) || (!strcasecmp(user->server,ServerName)))
1668 log(DEBUG,"Not overriding...");
1670 FOREACH_RESULT(OnUserPreJoin(user,Ptr,cname));
1671 if (MOD_RESULT == 1) {
1674 log(DEBUG,"MOD_RESULT=%d",MOD_RESULT);
1678 log(DEBUG,"add_channel: checking key, invite, etc");
1680 FOREACH_RESULT(OnCheckKey(user, Ptr, key ? key : ""));
1681 if (MOD_RESULT == 0)
1685 log(DEBUG,"add_channel: %s has key %s",Ptr->name,Ptr->key);
1688 log(DEBUG,"add_channel: no key given in JOIN");
1689 WriteServ(user->fd,"475 %s %s :Cannot join channel (Requires key)",user->nick, Ptr->name);
1694 if (strcasecmp(key,Ptr->key))
1696 log(DEBUG,"add_channel: bad key given in JOIN");
1697 WriteServ(user->fd,"475 %s %s :Cannot join channel (Incorrect key)",user->nick, Ptr->name);
1702 log(DEBUG,"add_channel: no key");
1705 FOREACH_RESULT(OnCheckInvite(user, Ptr));
1706 if (MOD_RESULT == 0)
1708 if (Ptr->inviteonly)
1710 log(DEBUG,"add_channel: channel is +i");
1711 if (user->IsInvited(Ptr->name))
1713 /* user was invited to channel */
1714 /* there may be an optional channel NOTICE here */
1718 WriteServ(user->fd,"473 %s %s :Cannot join channel (Invite only)",user->nick, Ptr->name);
1722 log(DEBUG,"add_channel: channel is not +i");
1725 FOREACH_RESULT(OnCheckLimit(user, Ptr));
1726 if (MOD_RESULT == 0)
1730 if (usercount(Ptr) >= Ptr->limit)
1732 WriteServ(user->fd,"471 %s %s :Cannot join channel (Channel is full)",user->nick, Ptr->name);
1737 log(DEBUG,"add_channel: about to walk banlist");
1739 FOREACH_RESULT(OnCheckBan(user, Ptr));
1740 if (MOD_RESULT == 0)
1742 /* check user against the channel banlist */
1745 if (Ptr->bans.size())
1747 for (BanList::iterator i = Ptr->bans.begin(); i != Ptr->bans.end(); i++)
1749 if (match(user->GetFullHost(),i->data))
1751 WriteServ(user->fd,"474 %s %s :Cannot join channel (You're banned)",user->nick, Ptr->name);
1757 log(DEBUG,"add_channel: bans checked");
1763 if ((Ptr) && (user))
1765 user->RemoveInvite(Ptr->name);
1768 log(DEBUG,"add_channel: invites removed");
1773 log(DEBUG,"Overridden checks");
1781 log(DEBUG,"Passed channel checks");
1783 for (int index =0; index != MAXCHANS; index++)
1785 log(DEBUG,"Check location %d",index);
1786 if (user->chans[index].channel == NULL)
1788 log(DEBUG,"Adding into their channel list at location %d",index);
1792 /* first user in is given ops */
1793 user->chans[index].uc_modes = UCMODE_OP;
1797 user->chans[index].uc_modes = 0;
1799 user->chans[index].channel = Ptr;
1800 Ptr->IncUserCounter();
1801 Ptr->AddUser((char*)user);
1802 WriteChannel(Ptr,user,"JOIN :%s",Ptr->name);
1804 if (!override) // we're not overriding... so this isnt part of a netburst, broadcast it.
1806 // use the stamdard J token with no privilages.
1807 char buffer[MAXBUF];
1810 snprintf(buffer,MAXBUF,"J %s @%s",user->nick,Ptr->name);
1814 snprintf(buffer,MAXBUF,"J %s %s",user->nick,Ptr->name);
1816 NetSendToAll(buffer);
1819 log(DEBUG,"Sent JOIN to client");
1823 WriteServ(user->fd,"332 %s %s :%s", user->nick, Ptr->name, Ptr->topic);
1824 WriteServ(user->fd,"333 %s %s %s %lu", user->nick, Ptr->name, Ptr->setby, (unsigned long)Ptr->topicset);
1827 WriteServ(user->fd,"366 %s %s :End of /NAMES list.", user->nick, Ptr->name);
1828 //WriteServ(user->fd,"324 %s %s +%s",user->nick, Ptr->name,chanmodes(Ptr));
1829 //WriteServ(user->fd,"329 %s %s %lu", user->nick, Ptr->name, (unsigned long)Ptr->created);
1830 FOREACH_MOD OnUserJoin(user,Ptr);
1834 log(DEBUG,"add_channel: user channel max exceeded: %s %s",user->nick,cname);
1835 WriteServ(user->fd,"405 %s %s :You are on too many channels",user->nick, cname);
1839 /* remove a channel from a users record, and remove the record from memory
1840 * if the channel has become empty */
1842 chanrec* del_channel(userrec *user, const char* cname, const char* reason, bool local)
1844 if ((!user) || (!cname))
1846 log(DEFAULT,"*** BUG *** del_channel was given an invalid parameter");
1852 if ((!cname) || (!user))
1857 Ptr = FindChan(cname);
1864 FOREACH_MOD OnUserPart(user,Ptr);
1865 log(DEBUG,"del_channel: removing: %s %s",user->nick,Ptr->name);
1867 for (int i =0; i != MAXCHANS; i++)
1869 /* zap it from the channel list of the user */
1870 if (user->chans[i].channel == Ptr)
1874 WriteChannel(Ptr,user,"PART %s :%s",Ptr->name, reason);
1878 char buffer[MAXBUF];
1879 snprintf(buffer,MAXBUF,"L %s %s :%s",user->nick,Ptr->name,reason);
1880 NetSendToAll(buffer);
1889 char buffer[MAXBUF];
1890 snprintf(buffer,MAXBUF,"L %s %s :",user->nick,Ptr->name);
1891 NetSendToAll(buffer);
1894 WriteChannel(Ptr,user,"PART :%s",Ptr->name);
1896 user->chans[i].uc_modes = 0;
1897 user->chans[i].channel = NULL;
1898 log(DEBUG,"del_channel: unlinked: %s %s",user->nick,Ptr->name);
1903 Ptr->DelUser((char*)user);
1905 /* if there are no users left on the channel */
1906 if (!usercount(Ptr))
1908 chan_hash::iterator iter = chanlist.find(Ptr->name);
1910 log(DEBUG,"del_channel: destroying channel: %s",Ptr->name);
1912 /* kill the record */
1913 if (iter != chanlist.end())
1915 log(DEBUG,"del_channel: destroyed: %s",Ptr->name);
1917 chanlist.erase(iter);
1923 void kick_channel(userrec *src,userrec *user, chanrec *Ptr, char* reason)
1925 if ((!src) || (!user) || (!Ptr) || (!reason))
1927 log(DEFAULT,"*** BUG *** kick_channel was given an invalid parameter");
1931 if ((!Ptr) || (!user) || (!src))
1936 log(DEBUG,"kick_channel: removing: %s %s %s",user->nick,Ptr->name,src->nick);
1938 if (!has_channel(user,Ptr))
1940 WriteServ(src->fd,"441 %s %s %s :They are not on that channel",src->nick, user->nick, Ptr->name);
1945 FOREACH_RESULT(OnAccessCheck(src,user,Ptr,AC_KICK));
1946 if (MOD_RESULT == ACR_DENY)
1949 if (MOD_RESULT == ACR_DEFAULT)
1951 if (((cstatus(src,Ptr) < STATUS_HOP) || (cstatus(src,Ptr) < cstatus(user,Ptr))) && (!is_uline(src->server)))
1953 if (cstatus(src,Ptr) == STATUS_HOP)
1955 WriteServ(src->fd,"482 %s %s :You must be a channel operator",src->nick, Ptr->name);
1959 WriteServ(src->fd,"482 %s %s :You must be at least a half-operator to change modes on this channel",src->nick, Ptr->name);
1967 FOREACH_RESULT(OnUserPreKick(src,user,Ptr,reason));
1971 FOREACH_MOD OnUserKick(src,user,Ptr,reason);
1973 for (int i =0; i != MAXCHANS; i++)
1975 /* zap it from the channel list of the user */
1976 if (user->chans[i].channel)
1977 if (!strcasecmp(user->chans[i].channel->name,Ptr->name))
1979 WriteChannel(Ptr,src,"KICK %s %s :%s",Ptr->name, user->nick, reason);
1980 user->chans[i].uc_modes = 0;
1981 user->chans[i].channel = NULL;
1982 log(DEBUG,"del_channel: unlinked: %s %s",user->nick,Ptr->name);
1987 Ptr->DelUser((char*)user);
1989 /* if there are no users left on the channel */
1990 if (!usercount(Ptr))
1992 chan_hash::iterator iter = chanlist.find(Ptr->name);
1994 log(DEBUG,"del_channel: destroying channel: %s",Ptr->name);
1996 /* kill the record */
1997 if (iter != chanlist.end())
1999 log(DEBUG,"del_channel: destroyed: %s",Ptr->name);
2001 chanlist.erase(iter);
2009 /* This function pokes and hacks at a parameter list like the following:
2011 * PART #winbot,#darkgalaxy :m00!
2013 * to turn it into a series of individual calls like this:
2015 * PART #winbot :m00!
2016 * PART #darkgalaxy :m00!
2018 * The seperate calls are sent to a callback function provided by the caller
2019 * (the caller will usually call itself recursively). The callback function
2020 * must be a command handler. Calling this function on a line with no list causes
2021 * no action to be taken. You must provide a starting and ending parameter number
2022 * where the range of the list can be found, useful if you have a terminating
2023 * parameter as above which is actually not part of the list, or parameters
2024 * before the actual list as well. This code is used by many functions which
2025 * can function as "one to list" (see the RFC) */
2027 int loop_call(handlerfunc fn, char **parameters, int pcnt, userrec *u, int start, int end, int joins)
2032 char blog[32][MAXBUF];
2033 char blog2[32][MAXBUF];
2034 int j = 0, q = 0, total = 0, t = 0, t2 = 0, total2 = 0;
2035 char keystr[MAXBUF];
2038 for (int i = 0; i <32; i++)
2041 for (int i = 0; i <32; i++)
2042 strcpy(blog2[i],"");
2045 for (int i = 0; i <10; i++)
2049 parameters[i] = moo;
2054 if (pcnt > 1) /* we have a key to copy */
2056 strlcpy(keystr,parameters[1],MAXBUF);
2060 if (!parameters[start])
2064 if (!strchr(parameters[start],','))
2069 for (int i = start; i <= end; i++)
2073 strlcat(plist,parameters[i],MAXBUF);
2081 for (int i = 0; i < t; i++)
2083 if (plist[i] == ',')
2086 strlcpy(blog[j++],param,MAXBUF);
2090 WriteServ(u->fd,"407 %s %s :Too many targets in list, message not delivered.",u->nick,blog[j-1]);
2095 strlcpy(blog[j++],param,MAXBUF);
2098 if ((joins) && (keystr) && (total>0)) // more than one channel and is joining
2103 if ((joins) && (keystr))
2105 if (strchr(keystr,','))
2109 t2 = strlen(keystr);
2110 for (int i = 0; i < t2; i++)
2112 if (keystr[i] == ',')
2115 strlcpy(blog2[j++],param,MAXBUF);
2119 strlcpy(blog2[j++],param,MAXBUF);
2124 for (j = 0; j < total; j++)
2130 for (q = end; q < pcnt-1; q++)
2132 if (parameters[q+1])
2134 pars[q-end+1] = parameters[q+1];
2137 if ((joins) && (parameters[1]))
2148 /* repeatedly call the function with the hacked parameter list */
2149 if ((joins) && (pcnt > 1))
2153 // pars[1] already set up and containing key from blog2[j]
2158 pars[1] = parameters[1];
2164 fn(pars,pcnt-(end-start),u);
2173 void kill_link(userrec *user,const char* r)
2175 user_hash::iterator iter = clientlist.find(user->nick);
2177 char reason[MAXBUF];
2179 strncpy(reason,r,MAXBUF);
2181 if (strlen(reason)>MAXQUIT)
2183 reason[MAXQUIT-1] = '\0';
2186 log(DEBUG,"kill_link: %s '%s'",user->nick,reason);
2187 Write(user->fd,"ERROR :Closing link (%s@%s) [%s]",user->ident,user->host,reason);
2188 log(DEBUG,"closing fd %lu",(unsigned long)user->fd);
2190 if (user->registered == 7) {
2191 FOREACH_MOD OnUserQuit(user);
2192 WriteCommonExcept(user,"QUIT :%s",reason);
2194 // Q token must go to ALL servers!!!
2195 char buffer[MAXBUF];
2196 snprintf(buffer,MAXBUF,"Q %s :%s",user->nick,reason);
2197 NetSendToAll(buffer);
2200 FOREACH_MOD OnUserDisconnect(user);
2204 FOREACH_MOD OnRawSocketClose(user->fd);
2207 EV_SET(&ke, user->fd, EVFILT_READ, EV_DELETE, 0, 0, NULL);
2208 int i = kevent(kq, &ke, 1, 0, 0, NULL);
2211 log(DEBUG,"kqueue: Failed to remove user from queue!");
2214 shutdown(user->fd,2);
2218 if (user->registered == 7) {
2219 WriteOpers("*** Client exiting: %s!%s@%s [%s]",user->nick,user->ident,user->host,reason);
2223 if (user->registered == 7) {
2224 purge_empty_chans(user);
2227 if (iter != clientlist.end())
2229 log(DEBUG,"deleting user hash value %lu",(unsigned long)user);
2231 fd_ref_table[user->fd] = NULL;
2233 clientlist.erase(iter);
2237 void kill_link_silent(userrec *user,const char* r)
2239 user_hash::iterator iter = clientlist.find(user->nick);
2241 char reason[MAXBUF];
2243 strncpy(reason,r,MAXBUF);
2245 if (strlen(reason)>MAXQUIT)
2247 reason[MAXQUIT-1] = '\0';
2250 log(DEBUG,"kill_link: %s '%s'",user->nick,reason);
2251 Write(user->fd,"ERROR :Closing link (%s@%s) [%s]",user->ident,user->host,reason);
2252 log(DEBUG,"closing fd %lu",(unsigned long)user->fd);
2254 if (user->registered == 7) {
2255 FOREACH_MOD OnUserQuit(user);
2256 WriteCommonExcept(user,"QUIT :%s",reason);
2258 // Q token must go to ALL servers!!!
2259 char buffer[MAXBUF];
2260 snprintf(buffer,MAXBUF,"Q %s :%s",user->nick,reason);
2261 NetSendToAll(buffer);
2264 FOREACH_MOD OnUserDisconnect(user);
2268 FOREACH_MOD OnRawSocketClose(user->fd);
2271 EV_SET(&ke, user->fd, EVFILT_READ, EV_DELETE, 0, 0, NULL);
2272 int i = kevent(kq, &ke, 1, 0, 0, NULL);
2275 log(DEBUG,"kqueue: Failed to remove user from queue!");
2278 shutdown(user->fd,2);
2282 if (user->registered == 7) {
2283 purge_empty_chans(user);
2286 if (iter != clientlist.end())
2288 log(DEBUG,"deleting user hash value %lu",(unsigned long)user);
2290 fd_ref_table[user->fd] = NULL;
2292 clientlist.erase(iter);
2298 // looks up a users password for their connection class (<ALLOW>/<DENY> tags)
2300 char* Passwd(userrec *user)
2302 for (ClassVector::iterator i = Classes.begin(); i != Classes.end(); i++)
2304 if (match(user->host,i->host) && (i->type == CC_ALLOW))
2312 bool IsDenied(userrec *user)
2314 for (ClassVector::iterator i = Classes.begin(); i != Classes.end(); i++)
2316 if (match(user->host,i->host) && (i->type == CC_DENY))
2327 /* sends out an error notice to all connected clients (not to be used
2330 void send_error(char *s)
2332 log(DEBUG,"send_error: %s",s);
2333 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
2335 if (isnick(i->second->nick))
2337 WriteServ(i->second->fd,"NOTICE %s :%s",i->second->nick,s);
2341 // fix - unregistered connections receive ERROR, not NOTICE
2342 Write(i->second->fd,"ERROR :%s",s);
2347 void Error(int status)
2349 signal (SIGALRM, SIG_IGN);
2350 signal (SIGPIPE, SIG_IGN);
2351 signal (SIGTERM, SIG_IGN);
2352 signal (SIGABRT, SIG_IGN);
2353 signal (SIGSEGV, SIG_IGN);
2354 signal (SIGURG, SIG_IGN);
2355 signal (SIGKILL, SIG_IGN);
2356 log(DEFAULT,"*** fell down a pothole in the road to perfection ***");
2357 send_error("Error! Segmentation fault! save meeeeeeeeeeeeee *splat!*");
2362 int main(int argc, char** argv)
2366 log(DEBUG,"*** InspIRCd starting up!");
2367 if (!FileExists(CONFIG_FILE))
2369 printf("ERROR: Cannot open config file: %s\nExiting...\n",CONFIG_FILE);
2370 log(DEFAULT,"main: no config");
2371 printf("ERROR: Your config file is missing, this IRCd will self destruct in 10 seconds!\n");
2375 for (int i = 1; i < argc; i++)
2377 if (!strcmp(argv[i],"-nofork")) {
2380 if (!strcmp(argv[i],"-wait")) {
2383 if (!strcmp(argv[i],"-nolimit")) {
2388 strlcpy(MyExecutable,argv[0],MAXBUF);
2390 // initialize the lowercase mapping table
2391 for (int cn = 0; cn < 256; cn++)
2393 // lowercase the uppercase chars
2394 for (int cn = 65; cn < 91; cn++)
2395 lowermap[cn] = tolower(cn);
2396 // now replace the specific chars for scandanavian comparison
2397 lowermap['['] = '{';
2398 lowermap[']'] = '}';
2399 lowermap['\\'] = '|';
2401 if (InspIRCd(argv,argc) == ERROR)
2403 log(DEFAULT,"main: daemon function bailed");
2404 printf("ERROR: could not initialise. Shutting down.\n");
2411 template<typename T> inline string ConvToStr(const T &in)
2414 if (!(tmp << in)) return string();
2418 /* re-allocates a nick in the user_hash after they change nicknames,
2419 * returns a pointer to the new user as it may have moved */
2421 userrec* ReHashNick(char* Old, char* New)
2423 //user_hash::iterator newnick;
2424 user_hash::iterator oldnick = clientlist.find(Old);
2426 log(DEBUG,"ReHashNick: %s %s",Old,New);
2428 if (!strcasecmp(Old,New))
2430 log(DEBUG,"old nick is new nick, skipping");
2431 return oldnick->second;
2434 if (oldnick == clientlist.end()) return NULL; /* doesnt exist */
2436 log(DEBUG,"ReHashNick: Found hashed nick %s",Old);
2438 clientlist[New] = new userrec();
2439 clientlist[New] = oldnick->second;
2440 clientlist.erase(oldnick);
2442 log(DEBUG,"ReHashNick: Nick rehashed as %s",New);
2444 return clientlist[New];
2447 /* adds or updates an entry in the whowas list */
2448 void AddWhoWas(userrec* u)
2450 user_hash::iterator iter = whowas.find(u->nick);
2451 userrec *a = new userrec();
2452 strlcpy(a->nick,u->nick,NICKMAX);
2453 strlcpy(a->ident,u->ident,64);
2454 strlcpy(a->dhost,u->dhost,256);
2455 strlcpy(a->host,u->host,256);
2456 strlcpy(a->fullname,u->fullname,128);
2457 strlcpy(a->server,u->server,256);
2458 a->signon = u->signon;
2460 /* MAX_WHOWAS: max number of /WHOWAS items
2461 * WHOWAS_STALE: number of hours before a WHOWAS item is marked as stale and
2462 * can be replaced by a newer one
2465 if (iter == whowas.end())
2467 if (whowas.size() == WHOWAS_MAX)
2469 for (user_hash::iterator i = whowas.begin(); i != whowas.end(); i++)
2471 // 3600 seconds in an hour ;)
2472 if ((i->second->signon)<(TIME-(WHOWAS_STALE*3600)))
2474 if (i->second) delete i->second;
2476 log(DEBUG,"added WHOWAS entry, purged an old record");
2483 log(DEBUG,"added fresh WHOWAS entry");
2484 whowas[a->nick] = a;
2489 log(DEBUG,"updated WHOWAS entry");
2490 if (iter->second) delete iter->second;
2496 /* add a client connection to the sockets list */
2497 void AddClient(int socket, char* host, int port, bool iscached, char* ip)
2501 user_hash::iterator iter;
2503 tempnick = ConvToStr(socket) + "-unknown";
2504 sprintf(tn2,"%lu-unknown",(unsigned long)socket);
2506 iter = clientlist.find(tempnick);
2509 // as these nicknames are 'RFC impossible', we can be sure nobody is going to be
2510 // using one as a registered connection. As theyre per fd, we can also safely assume
2511 // that we wont have collisions. Therefore, if the nick exists in the list, its only
2512 // used by a dead socket, erase the iterator so that the new client may reclaim it.
2513 // this was probably the cause of 'server ignores me when i hammer it with reconnects'
2514 // issue in earlier alphas/betas
2515 if (iter != clientlist.end())
2517 clientlist.erase(iter);
2521 * It is OK to access the value here this way since we know
2522 * it exists, we just created it above.
2524 * At NO other time should you access a value in a map or a
2525 * hash_map this way.
2527 clientlist[tempnick] = new userrec();
2529 NonBlocking(socket);
2530 log(DEBUG,"AddClient: %lu %s %d %s",(unsigned long)socket,host,port,ip);
2532 clientlist[tempnick]->fd = socket;
2533 strncpy(clientlist[tempnick]->nick, tn2,NICKMAX);
2534 strncpy(clientlist[tempnick]->host, host,160);
2535 strncpy(clientlist[tempnick]->dhost, host,160);
2536 strncpy(clientlist[tempnick]->server, ServerName,256);
2537 strncpy(clientlist[tempnick]->ident, "unknown",12);
2538 clientlist[tempnick]->registered = 0;
2539 clientlist[tempnick]->signon = TIME+dns_timeout;
2540 clientlist[tempnick]->lastping = 1;
2541 clientlist[tempnick]->port = port;
2542 strncpy(clientlist[tempnick]->ip,ip,32);
2544 // set the registration timeout for this user
2545 unsigned long class_regtimeout = 90;
2546 int class_flood = 0;
2547 long class_threshold = 5;
2548 long class_sqmax = 262144; // 256kb
2549 long class_rqmax = 4096; // 4k
2551 for (ClassVector::iterator i = Classes.begin(); i != Classes.end(); i++)
2553 if (match(clientlist[tempnick]->host,i->host) && (i->type == CC_ALLOW))
2555 class_regtimeout = (unsigned long)i->registration_timeout;
2556 class_flood = i->flood;
2557 clientlist[tempnick]->pingmax = i->pingtime;
2558 class_threshold = i->threshold;
2559 class_sqmax = i->sendqmax;
2560 class_rqmax = i->recvqmax;
2565 clientlist[tempnick]->nping = TIME+clientlist[tempnick]->pingmax+dns_timeout;
2566 clientlist[tempnick]->timeout = TIME+class_regtimeout;
2567 clientlist[tempnick]->flood = class_flood;
2568 clientlist[tempnick]->threshold = class_threshold;
2569 clientlist[tempnick]->sendqmax = class_sqmax;
2570 clientlist[tempnick]->recvqmax = class_rqmax;
2572 for (int i = 0; i < MAXCHANS; i++)
2574 clientlist[tempnick]->chans[i].channel = NULL;
2575 clientlist[tempnick]->chans[i].uc_modes = 0;
2578 if (clientlist.size() == MAXCLIENTS)
2580 kill_link(clientlist[tempnick],"No more connections allowed in this class");
2584 // this is done as a safety check to keep the file descriptors within range of fd_ref_table.
2585 // its a pretty big but for the moment valid assumption:
2586 // file descriptors are handed out starting at 0, and are recycled as theyre freed.
2587 // therefore if there is ever an fd over 65535, 65536 clients must be connected to the
2588 // irc server at once (or the irc server otherwise initiating this many connections, files etc)
2589 // which for the time being is a physical impossibility (even the largest networks dont have more
2590 // than about 10,000 users on ONE server!)
2593 kill_link(clientlist[tempnick],"Server is full");
2598 char* e = matches_exception(ip);
2601 char* r = matches_zline(ip);
2604 char reason[MAXBUF];
2605 snprintf(reason,MAXBUF,"Z-Lined: %s",r);
2606 kill_link(clientlist[tempnick],reason);
2610 fd_ref_table[socket] = clientlist[tempnick];
2614 log(DEBUG,"kqueue: Add user to events, kq=%d socket=%d",kq,socket);
2615 EV_SET(&ke, socket, EVFILT_READ, EV_ADD, 0, 0, NULL);
2616 int i = kevent(kq, &ke, 1, 0, 0, NULL);
2622 log(DEBUG,"kqueue: EACCES");
2625 log(DEBUG,"kqueue: EFAULT");
2628 log(DEBUG,"kqueue: EBADF=%d",ke.ident);
2631 log(DEBUG,"kqueue: EINTR");
2634 log(DEBUG,"kqueue: EINVAL");
2637 log(DEBUG,"kqueue: ENOENT");
2640 log(DEBUG,"kqueue: ENOMEM");
2643 log(DEBUG,"kqueue: ESRCH");
2646 log(DEBUG,"kqueue: UNKNOWN!");
2649 log(DEBUG,"kqueue: Failed to add user to queue!");
2655 // this function counts all users connected, wether they are registered or NOT.
2658 return clientlist.size();
2661 // this counts only registered users, so that the percentages in /MAP don't mess up when users are sitting in an unregistered state
2662 int registered_usercount(void)
2665 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
2667 if ((i->second->fd) && (isnick(i->second->nick))) c++;
2672 int usercount_invisible(void)
2676 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
2678 if ((i->second->fd) && (isnick(i->second->nick)) && (strchr(i->second->modes,'i'))) c++;
2683 int usercount_opers(void)
2687 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
2689 if ((i->second->fd) && (isnick(i->second->nick)) && (strchr(i->second->modes,'o'))) c++;
2694 int usercount_unknown(void)
2698 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
2700 if ((i->second->fd) && (i->second->registered != 7))
2706 long chancount(void)
2708 return chanlist.size();
2711 long count_servs(void)
2714 for (int i = 0; i < 32; i++)
2718 for (vector<ircd_connector>::iterator j = me[i]->connectors.begin(); j != me[i]->connectors.end(); j++)
2720 if (strcasecmp(j->GetServerName().c_str(),ServerName))
2730 long servercount(void)
2732 return count_servs()+1;
2738 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
2740 if ((i->second->fd) && (isnick(i->second->nick)) && (!strcasecmp(i->second->server,ServerName))) c++;
2746 void ShowMOTD(userrec *user)
2749 std::string WholeMOTD = "";
2752 WriteServ(user->fd,"422 %s :Message of the day file is missing.",user->nick);
2755 snprintf(buf,65535,":%s 375 %s :- %s message of the day\r\n", ServerName, user->nick, ServerName);
2756 WholeMOTD = WholeMOTD + buf;
2757 for (int i = 0; i != MOTD.size(); i++)
2759 snprintf(buf,65535,":%s 372 %s :- %s\r\n", ServerName, user->nick, MOTD[i].c_str());
2760 WholeMOTD = WholeMOTD + buf;
2762 snprintf(buf,65535,":%s 376 %s :End of message of the day.\r\n", ServerName, user->nick);
2763 WholeMOTD = WholeMOTD + buf;
2764 // only one write operation
2765 user->AddWriteBuf(WholeMOTD);
2766 statsSent += WholeMOTD.length();
2769 void ShowRULES(userrec *user)
2773 WriteServ(user->fd,"NOTICE %s :Rules file is missing.",user->nick);
2776 WriteServ(user->fd,"NOTICE %s :%s rules",user->nick,ServerName);
2777 for (int i = 0; i != RULES.size(); i++)
2779 WriteServ(user->fd,"NOTICE %s :%s",user->nick,RULES[i].c_str());
2781 WriteServ(user->fd,"NOTICE %s :End of %s rules.",user->nick,ServerName);
2784 /* shows the message of the day, and any other on-logon stuff */
2785 void FullConnectUser(userrec* user)
2788 user->idle_lastmsg = TIME;
2789 log(DEBUG,"ConnectUser: %s",user->nick);
2791 if ((strcmp(Passwd(user),"")) && (!user->haspassed))
2793 kill_link(user,"Invalid password");
2798 kill_link(user,"Unauthorised connection");
2802 char match_against[MAXBUF];
2803 snprintf(match_against,MAXBUF,"%s@%s",user->ident,user->host);
2804 char* e = matches_exception(match_against);
2807 char* r = matches_gline(match_against);
2810 char reason[MAXBUF];
2811 snprintf(reason,MAXBUF,"G-Lined: %s",r);
2812 kill_link_silent(user,reason);
2815 r = matches_kline(user->host);
2818 char reason[MAXBUF];
2819 snprintf(reason,MAXBUF,"K-Lined: %s",r);
2820 kill_link_silent(user,reason);
2825 // fix by brain: move this below the xline checks to prevent spurious quits going onto the net that dont belong
2826 user->registered = 7;
2828 WriteServ(user->fd,"NOTICE Auth :Welcome to \002%s\002!",Network);
2829 WriteServ(user->fd,"001 %s :Welcome to the %s IRC Network %s!%s@%s",user->nick,Network,user->nick,user->ident,user->host);
2830 WriteServ(user->fd,"002 %s :Your host is %s, running version %s",user->nick,ServerName,VERSION);
2831 WriteServ(user->fd,"003 %s :This server was created %s %s",user->nick,__TIME__,__DATE__);
2832 WriteServ(user->fd,"004 %s %s %s iowghraAsORVSxNCWqBzvdHtGI lvhopsmntikrRcaqOALQbSeKVfHGCuzN",user->nick,ServerName,VERSION);
2833 // the neatest way to construct the initial 005 numeric, considering the number of configure constants to go in it...
2834 std::stringstream v;
2835 v << "MESHED WALLCHOPS MODES=13 CHANTYPES=# PREFIX=(ohv)@%+ MAP SAFELIST MAXCHANNELS=" << MAXCHANS;
2836 v << " MAXBANS=60 NICKLEN=" << NICKMAX;
2837 v << " TOPICLEN=307 KICKLEN=307 MAXTARGETS=20 AWAYLEN=307 CHANMODES=ohvb,k,l,psmnti NETWORK=";
2839 std::string data005 = v.str();
2840 FOREACH_MOD On005Numeric(data005);
2841 // anfl @ #ratbox, efnet reminded me that according to the RFC this cant contain more than 13 tokens per line...
2842 // so i'd better split it :)
2843 std::stringstream out(data005);
2844 std::string token = "";
2845 std::string line5 = "";
2846 int token_counter = 0;
2850 line5 = line5 + token + " ";
2852 if ((token_counter >= 13) || (out.eof() == true))
2854 WriteServ(user->fd,"005 %s %s:are supported by this server",user->nick,line5.c_str());
2861 char buffer[MAXBUF];
2862 snprintf(buffer,MAXBUF,"N %lu %s %s %s %s +%s %s %s :%s",(unsigned long)user->age,user->nick,user->host,user->dhost,user->ident,user->modes,user->ip,ServerName,user->fullname);
2863 NetSendToAll(buffer);
2865 // fix by brain: these should be AFTER the N token, so other servers know what the HELL we're on about... :)
2866 FOREACH_MOD OnUserConnect(user);
2867 WriteOpers("*** Client connecting on port %lu: %s!%s@%s [%s]",(unsigned long)user->port,user->nick,user->ident,user->host,user->ip);
2871 // this returns 1 when all modules are satisfied that the user should be allowed onto the irc server
2872 // (until this returns true, a user will block in the waiting state, waiting to connect up to the
2873 // registration timeout maximum seconds)
2874 bool AllModulesReportReady(userrec* user)
2876 for (int i = 0; i <= MODCOUNT; i++)
2878 int res = modules[i]->OnCheckReady(user);
2885 /* shows the message of the day, and any other on-logon stuff */
2886 void ConnectUser(userrec *user)
2888 // dns is already done, things are fast. no need to wait for dns to complete just pass them straight on
2889 if ((user->dns_done) && (user->registered >= 3) && (AllModulesReportReady(user)))
2891 FullConnectUser(user);
2895 std::string GetVersionString()
2897 char Revision[] = "$Revision$";
2898 char versiondata[MAXBUF];
2899 char *s1 = Revision;
2901 char *v2 = strtok_r(s1," ",&savept);
2903 v2 = strtok_r(s1," ",&savept);
2906 char socketengine[] = "kqueue";
2908 char socketengine[] = "select";
2910 snprintf(versiondata,MAXBUF,"%s Rev. %s %s :%s (O=%lu) [SE=%s]",VERSION,v2,ServerName,SYSTEM,(unsigned long)OPTIMISATION,socketengine);
2914 void handle_version(char **parameters, int pcnt, userrec *user)
2918 WriteServ(user->fd,"351 %s :%s",user->nick,GetVersionString().c_str());
2922 if (!strcmp(parameters[0],"*"))
2924 for (int j = 0; j < 32; j++)
2928 for (int x = 0; x < me[j]->connectors.size(); x++)
2930 WriteServ(user->fd,"351 %s :Server %d:%d (%s): %s",user->nick,j,x,me[j]->connectors[x].GetServerName().c_str(),me[j]->connectors[x].GetVersionString().c_str());
2936 if (match(ServerName,parameters[0]))
2938 WriteServ(user->fd,"351 %s :%s",user->nick,GetVersionString().c_str());
2941 bool displayed = false, found = false;
2942 for (int j = 0; j < 32; j++)
2946 for (int x = 0; x < me[j]->connectors.size(); x++)
2948 if (match(me[j]->connectors[x].GetServerName().c_str(),parameters[0]))
2951 if ((me[j]->connectors[x].GetVersionString() != "") && (!displayed))
2954 WriteServ(user->fd,"351 %s :%s",user->nick,me[j]->connectors[x].GetVersionString().c_str());
2960 if ((!displayed) && (found))
2962 WriteServ(user->fd,"402 %s %s :Server %s has no version information",user->nick,parameters[0],parameters[0]);
2967 WriteServ(user->fd,"402 %s %s :No such server",user->nick,parameters[0]);
2974 // calls a handler function for a command
2976 void call_handler(const char* commandname,char **parameters, int pcnt, userrec *user)
2978 for (int i = 0; i < cmdlist.size(); i++)
2980 if (!strcasecmp(cmdlist[i].command,commandname))
2982 if (cmdlist[i].handler_function)
2984 if (pcnt>=cmdlist[i].min_params)
2986 if (strchr(user->modes,cmdlist[i].flags_needed))
2988 cmdlist[i].handler_function(parameters,pcnt,user);
2996 void DoSplitEveryone()
2998 bool go_again = true;
3002 for (int i = 0; i < 32; i++)
3006 for (vector<ircd_connector>::iterator j = me[i]->connectors.begin(); j != me[i]->connectors.end(); j++)
3008 if (strcasecmp(j->GetServerName().c_str(),ServerName))
3011 j->CloseConnection();
3012 me[i]->connectors.erase(j);
3020 log(DEBUG,"Removed server. Will remove clients...");
3021 // iterate through the userlist and remove all users on this server.
3022 // because we're dealing with a mesh, we dont have to deal with anything
3023 // "down-route" from this server (nice huh)
3025 char reason[MAXBUF];
3029 for (user_hash::const_iterator u = clientlist.begin(); u != clientlist.end(); u++)
3031 if (strcasecmp(u->second->server,ServerName))
3033 snprintf(reason,MAXBUF,"%s %s",ServerName,u->second->server);
3034 kill_link(u->second,reason);
3044 char islast(const char* s)
3047 for (int j = 0; j < 32; j++)
3051 for (int k = 0; k < me[j]->connectors.size(); k++)
3053 if (strcasecmp(me[j]->connectors[k].GetServerName().c_str(),s))
3057 if (!strcasecmp(me[j]->connectors[k].GetServerName().c_str(),s))
3067 long map_count(const char* s)
3070 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
3072 if ((i->second->fd) && (isnick(i->second->nick)) && (!strcasecmp(i->second->server,s))) c++;
3078 void force_nickchange(userrec* user,const char* newnick)
3085 FOREACH_RESULT(OnUserPreNick(user,newnick));
3088 kill_link(user,"Nickname collision");
3091 if (matches_qline(newnick))
3094 kill_link(user,"Nickname collision");
3102 strncpy(nick,newnick,MAXBUF);
3104 if (user->registered == 7)
3108 handle_nick(pars,1,user);
3114 int process_parameters(char **command_p,char *parameters)
3117 int q = strlen(parameters);
3120 /* no parameters, command_p invalid! */
3123 if (parameters[0] == ':')
3125 command_p[0] = parameters+1;
3130 if ((strchr(parameters,' ')==NULL) || (parameters[0] == ':'))
3132 /* only one parameter */
3133 command_p[0] = parameters;
3134 if (parameters[0] == ':')
3136 if (strchr(parameters,' ') != NULL)
3144 command_p[j++] = parameters;
3145 for (int i = 0; i <= q; i++)
3147 if (parameters[i] == ' ')
3149 command_p[j++] = parameters+i+1;
3150 parameters[i] = '\0';
3151 if (command_p[j-1][0] == ':')
3153 *command_p[j-1]++; /* remove dodgy ":" */
3155 /* parameter like this marks end of the sequence */
3159 return j; /* returns total number of items in the list */
3162 void process_command(userrec *user, char* cmd)
3166 char *command_p[127];
3167 char p[MAXBUF], temp[MAXBUF];
3168 int j, items, cmd_found;
3170 for (int i = 0; i < 127; i++)
3171 command_p[i] = NULL;
3186 int total_params = 0;
3189 for (int q = 0; q < strlen(cmd)-1; q++)
3191 if ((cmd[q] == ' ') && (cmd[q+1] == ':'))
3194 // found a 'trailing', we dont count them after this.
3202 // another phidjit bug...
3203 if (total_params > 126)
3205 *(strchr(cmd,' ')) = '\0';
3206 WriteServ(user->fd,"421 %s %s :Too many parameters given",user->nick,cmd);
3210 strlcpy(temp,cmd,MAXBUF);
3212 std::string tmp = cmd;
3213 for (int i = 0; i <= MODCOUNT; i++)
3215 std::string oldtmp = tmp;
3216 modules[i]->OnServerRaw(tmp,true,user);
3219 log(DEBUG,"A Module changed the input string!");
3220 log(DEBUG,"New string: %s",tmp.c_str());
3221 log(DEBUG,"Old string: %s",oldtmp.c_str());
3225 strlcpy(cmd,tmp.c_str(),MAXBUF);
3226 strlcpy(temp,cmd,MAXBUF);
3228 if (!strchr(cmd,' '))
3230 /* no parameters, lets skip the formalities and not chop up
3232 log(DEBUG,"About to preprocess command with no params");
3234 command_p[0] = NULL;
3236 for (int i = 0; i <= strlen(cmd); i++)
3238 cmd[i] = toupper(cmd[i]);
3246 /* strip out extraneous linefeeds through mirc's crappy pasting (thanks Craig) */
3247 for (int i = 0; i < strlen(temp); i++)
3249 if ((temp[i] != 10) && (temp[i] != 13) && (temp[i] != 0) && (temp[i] != 7))
3255 /* split the full string into a command plus parameters */
3259 if (strchr(cmd,' '))
3261 for (int i = 0; i <= strlen(cmd); i++)
3263 /* capitalise the command ONLY, leave params intact */
3264 cmd[i] = toupper(cmd[i]);
3265 /* are we nearly there yet?! :P */
3269 parameters = cmd+i+1;
3277 for (int i = 0; i <= strlen(cmd); i++)
3279 cmd[i] = toupper(cmd[i]);
3286 if (strlen(command)>MAXCOMMAND)
3288 WriteServ(user->fd,"421 %s %s :Command too long",user->nick,command);
3292 for (int x = 0; x < strlen(command); x++)
3294 if (((command[x] < 'A') || (command[x] > 'Z')) && (command[x] != '.'))
3296 if (((command[x] < '0') || (command[x]> '9')) && (command[x] != '-'))
3298 if (strchr("@!\"$%^&*(){}[]_=+;:'#~,<>/?\\|`",command[x]))
3301 WriteServ(user->fd,"421 %s %s :Unknown command",user->nick,command);
3308 for (int i = 0; i != cmdlist.size(); i++)
3310 if (cmdlist[i].command[0])
3312 if (strlen(command)>=(strlen(cmdlist[i].command))) if (!strncmp(command, cmdlist[i].command,MAXCOMMAND))
3318 items = process_parameters(command_p,parameters);
3323 command_p[0] = NULL;
3329 command_p[0] = NULL;
3334 /* activity resets the ping pending timer */
3335 user->nping = TIME + user->pingmax;
3336 if ((items) < cmdlist[i].min_params)
3338 log(DEBUG,"process_command: not enough parameters: %s %s",user->nick,command);
3339 WriteServ(user->fd,"461 %s %s :Not enough parameters",user->nick,command);
3342 if ((!strchr(user->modes,cmdlist[i].flags_needed)) && (cmdlist[i].flags_needed))
3344 log(DEBUG,"process_command: permission denied: %s %s",user->nick,command);
3345 WriteServ(user->fd,"481 %s :Permission Denied- You do not have the required operator privilages",user->nick);
3349 if ((cmdlist[i].flags_needed) && (!user->HasPermission(command)))
3351 log(DEBUG,"process_command: permission denied: %s %s",user->nick,command);
3352 WriteServ(user->fd,"481 %s :Permission Denied- Oper type %s does not have access to command %s",user->nick,user->oper,command);
3356 /* if the command isnt USER, PASS, or NICK, and nick is empty,
3358 if ((strncmp(command,"USER",4)) && (strncmp(command,"NICK",4)) && (strncmp(command,"PASS",4)))
3360 if ((!isnick(user->nick)) || (user->registered != 7))
3362 log(DEBUG,"process_command: not registered: %s %s",user->nick,command);
3363 WriteServ(user->fd,"451 %s :You have not registered",command);
3367 if ((user->registered == 7) && (!strchr(user->modes,'o')))
3371 mycmd = strtok_r(DisabledCommands," ",&savept2);
3374 if (!strcasecmp(mycmd,command))
3376 // command is disabled!
3377 WriteServ(user->fd,"421 %s %s :This command has been disabled.",user->nick,command);
3380 mycmd = strtok_r(NULL," ",&savept2);
3385 if ((user->registered == 7) || (!strncmp(command,"USER",4)) || (!strncmp(command,"NICK",4)) || (!strncmp(command,"PASS",4)))
3387 if (cmdlist[i].handler_function)
3390 /* ikky /stats counters */
3393 cmdlist[i].use_count++;
3394 cmdlist[i].total_bytes+=strlen(temp);
3398 FOREACH_RESULT(OnPreCommand(command,command_p,items,user));
3399 if (MOD_RESULT == 1) {
3403 /* WARNING: nothing may come after the
3404 * command handler call, as the handler
3405 * may free the user structure! */
3407 cmdlist[i].handler_function(command_p,items,user);
3413 WriteServ(user->fd,"451 %s :You have not registered",command);
3421 if ((!cmd_found) && (user))
3424 WriteServ(user->fd,"421 %s %s :Unknown command",user->nick,command);
3429 void createcommand(char* cmd, handlerfunc f, char flags, int minparams,char* source)
3432 /* create the command and push it onto the table */
3433 strlcpy(comm.command,cmd,MAXBUF);
3434 strlcpy(comm.source,source,MAXBUF);
3435 comm.handler_function = f;
3436 comm.flags_needed = flags;
3437 comm.min_params = minparams;
3439 comm.total_bytes = 0;
3440 cmdlist.push_back(comm);
3441 log(DEBUG,"Added command %s (%lu parameters)",cmd,(unsigned long)minparams);
3444 bool removecommands(const char* source)
3446 bool go_again = true;
3450 for (std::deque<command_t>::iterator i = cmdlist.begin(); i != cmdlist.end(); i++)
3452 if (!strcmp(i->source,source))
3454 log(DEBUG,"removecommands(%s) Removing dependent command: %s",i->source,i->command);
3464 void SetupCommandTable(void)
3466 createcommand("USER",handle_user,0,4,"<core>");
3467 createcommand("NICK",handle_nick,0,1,"<core>");
3468 createcommand("QUIT",handle_quit,0,0,"<core>");
3469 createcommand("VERSION",handle_version,0,0,"<core>");
3470 createcommand("PING",handle_ping,0,1,"<core>");
3471 createcommand("PONG",handle_pong,0,1,"<core>");
3472 createcommand("ADMIN",handle_admin,0,0,"<core>");
3473 createcommand("PRIVMSG",handle_privmsg,0,2,"<core>");
3474 createcommand("INFO",handle_info,0,0,"<core>");
3475 createcommand("TIME",handle_time,0,0,"<core>");
3476 createcommand("WHOIS",handle_whois,0,1,"<core>");
3477 createcommand("WALLOPS",handle_wallops,'o',1,"<core>");
3478 createcommand("NOTICE",handle_notice,0,2,"<core>");
3479 createcommand("JOIN",handle_join,0,1,"<core>");
3480 createcommand("NAMES",handle_names,0,0,"<core>");
3481 createcommand("PART",handle_part,0,1,"<core>");
3482 createcommand("KICK",handle_kick,0,2,"<core>");
3483 createcommand("MODE",handle_mode,0,1,"<core>");
3484 createcommand("TOPIC",handle_topic,0,1,"<core>");
3485 createcommand("WHO",handle_who,0,1,"<core>");
3486 createcommand("MOTD",handle_motd,0,0,"<core>");
3487 createcommand("RULES",handle_rules,0,0,"<core>");
3488 createcommand("OPER",handle_oper,0,2,"<core>");
3489 createcommand("LIST",handle_list,0,0,"<core>");
3490 createcommand("DIE",handle_die,'o',1,"<core>");
3491 createcommand("RESTART",handle_restart,'o',1,"<core>");
3492 createcommand("KILL",handle_kill,'o',2,"<core>");
3493 createcommand("REHASH",handle_rehash,'o',0,"<core>");
3494 createcommand("LUSERS",handle_lusers,0,0,"<core>");
3495 createcommand("STATS",handle_stats,0,1,"<core>");
3496 createcommand("USERHOST",handle_userhost,0,1,"<core>");
3497 createcommand("AWAY",handle_away,0,0,"<core>");
3498 createcommand("ISON",handle_ison,0,0,"<core>");
3499 createcommand("SUMMON",handle_summon,0,0,"<core>");
3500 createcommand("USERS",handle_users,0,0,"<core>");
3501 createcommand("INVITE",handle_invite,0,2,"<core>");
3502 createcommand("PASS",handle_pass,0,1,"<core>");
3503 createcommand("TRACE",handle_trace,'o',0,"<core>");
3504 createcommand("WHOWAS",handle_whowas,0,1,"<core>");
3505 createcommand("CONNECT",handle_connect,'o',1,"<core>");
3506 createcommand("SQUIT",handle_squit,'o',0,"<core>");
3507 createcommand("MODULES",handle_modules,0,0,"<core>");
3508 createcommand("LINKS",handle_links,0,0,"<core>");
3509 createcommand("MAP",handle_map,0,0,"<core>");
3510 createcommand("KLINE",handle_kline,'o',1,"<core>");
3511 createcommand("GLINE",handle_gline,'o',1,"<core>");
3512 createcommand("ZLINE",handle_zline,'o',1,"<core>");
3513 createcommand("QLINE",handle_qline,'o',1,"<core>");
3514 createcommand("ELINE",handle_eline,'o',1,"<core>");
3515 createcommand("LOADMODULE",handle_loadmodule,'o',1,"<core>");
3516 createcommand("UNLOADMODULE",handle_unloadmodule,'o',1,"<core>");
3517 createcommand("SERVER",handle_server,0,0,"<core>");
3520 void process_buffer(const char* cmdbuf,userrec *user)
3524 log(DEFAULT,"*** BUG *** process_buffer was given an invalid parameter");
3530 log(DEFAULT,"*** BUG *** process_buffer was given an invalid parameter");
3537 while (*cmdbuf == ' ') cmdbuf++; // strip leading spaces
3539 strlcpy(cmd,cmdbuf,MAXBUF);
3544 int sl = strlen(cmd)-1;
3545 if ((cmd[sl] == 13) || (cmd[sl] == 10))
3550 if ((cmd[sl] == 13) || (cmd[sl] == 10))
3555 while (cmd[sl] == ' ') // strip trailing spaces
3565 log(DEBUG,"CMDIN: %s %s",user->nick,cmd);
3567 if ((user) && (cmd))
3569 process_command(user,cmd);
3573 void DoSync(serverrec* serv, char* tcp_host)
3576 log(DEBUG,"Sending sync");
3577 // send start of sync marker: Y <timestamp>
3578 // at this point the ircd receiving it starts broadcasting this netburst to all ircds
3579 // except the ones its receiving it from.
3580 snprintf(data,MAXBUF,"Y %lu",(unsigned long)TIME);
3581 serv->SendPacket(data,tcp_host);
3582 // send users and channels
3584 NetSendMyRoutingTable();
3586 // send all routing table and uline voodoo. The ordering of these commands is IMPORTANT!
3587 for (int j = 0; j < 32; j++)
3591 for (int k = 0; k < me[j]->connectors.size(); k++)
3593 if (is_uline(me[j]->connectors[k].GetServerName().c_str()))
3595 snprintf(data,MAXBUF,"H %s",me[j]->connectors[k].GetServerName().c_str());
3596 serv->SendPacket(data,tcp_host);
3602 // send our version for the remote side to cache
3603 snprintf(data,MAXBUF,"v %s %s",ServerName,GetVersionString().c_str());
3604 serv->SendPacket(data,tcp_host);
3606 // sync the users and channels, give the modules a look-in.
3607 for (user_hash::iterator u = clientlist.begin(); u != clientlist.end(); u++)
3609 snprintf(data,MAXBUF,"N %lu %s %s %s %s +%s %s %s :%s",(unsigned long)u->second->age,u->second->nick,u->second->host,u->second->dhost,u->second->ident,u->second->modes,u->second->ip,u->second->server,u->second->fullname);
3610 serv->SendPacket(data,tcp_host);
3611 if (strchr(u->second->modes,'o'))
3613 snprintf(data,MAXBUF,"| %s %s",u->second->nick,u->second->oper);
3614 serv->SendPacket(data,tcp_host);
3616 for (int i = 0; i <= MODCOUNT; i++)
3618 string_list l = modules[i]->OnUserSync(u->second);
3619 for (int j = 0; j < l.size(); j++)
3621 strlcpy(data,l[j].c_str(),MAXBUF);
3622 serv->SendPacket(data,tcp_host);
3625 char* chl = chlist(u->second,u->second);
3628 snprintf(data,MAXBUF,"J %s %s",u->second->nick,chl);
3629 serv->SendPacket(data,tcp_host);
3632 // send channel modes, topics etc...
3633 for (chan_hash::iterator c = chanlist.begin(); c != chanlist.end(); c++)
3635 snprintf(data,MAXBUF,"M %s +%s",c->second->name,chanmodes(c->second));
3636 serv->SendPacket(data,tcp_host);
3637 for (int i = 0; i <= MODCOUNT; i++)
3639 string_list l = modules[i]->OnChannelSync(c->second);
3640 for (int j = 0; j < l.size(); j++)
3642 strlcpy(data,l[j].c_str(),MAXBUF);
3643 serv->SendPacket(data,tcp_host);
3646 if (c->second->topic[0])
3648 snprintf(data,MAXBUF,"T %lu %s %s :%s",(unsigned long)c->second->topicset,c->second->setby,c->second->name,c->second->topic);
3649 serv->SendPacket(data,tcp_host);
3651 // send current banlist
3653 for (BanList::iterator b = c->second->bans.begin(); b != c->second->bans.end(); b++)
3655 snprintf(data,MAXBUF,"M %s +b %s",c->second->name,b->data);
3656 serv->SendPacket(data,tcp_host);
3659 // sync global zlines, glines, etc
3660 sync_xlines(serv,tcp_host);
3662 snprintf(data,MAXBUF,"F %lu",(unsigned long)TIME);
3663 serv->SendPacket(data,tcp_host);
3664 log(DEBUG,"Sent sync");
3665 // ircd sends its serverlist after the end of sync here
3669 void NetSendMyRoutingTable()
3671 // send out a line saying what is reachable to us.
3672 // E.g. if A is linked to B C and D, send out:
3674 // if its only linked to B and D send out:
3676 // if it has no links, dont even send out the line at all.
3677 char buffer[MAXBUF];
3678 snprintf(buffer,MAXBUF,"$ %s",ServerName);
3679 bool sendit = false;
3680 for (int i = 0; i < 32; i++)
3684 for (int j = 0; j < me[i]->connectors.size(); j++)
3686 if ((me[i]->connectors[j].GetState() != STATE_DISCONNECTED) || (is_uline(me[i]->connectors[j].GetServerName().c_str())))
3688 strlcat(buffer," ",MAXBUF);
3689 strlcat(buffer,me[i]->connectors[j].GetServerName().c_str(),MAXBUF);
3696 NetSendToAll(buffer);
3700 void DoSplit(const char* params)
3702 bool go_again = true;
3706 for (int i = 0; i < 32; i++)
3710 for (vector<ircd_connector>::iterator j = me[i]->connectors.begin(); j != me[i]->connectors.end(); j++)
3712 if (!strcasecmp(j->GetServerName().c_str(),params))
3715 j->CloseConnection();
3716 me[i]->connectors.erase(j);
3724 log(DEBUG,"Removed server. Will remove clients...");
3725 // iterate through the userlist and remove all users on this server.
3726 // because we're dealing with a mesh, we dont have to deal with anything
3727 // "down-route" from this server (nice huh)
3729 char reason[MAXBUF];
3730 snprintf(reason,MAXBUF,"%s %s",ServerName,params);
3734 for (user_hash::const_iterator u = clientlist.begin(); u != clientlist.end(); u++)
3736 if (!strcasecmp(u->second->server,params))
3738 kill_link(u->second,reason);
3746 // removes a server. Will NOT remove its users!
3748 void RemoveServer(const char* name)
3750 bool go_again = true;
3754 for (int i = 0; i < 32; i++)
3758 for (vector<ircd_connector>::iterator j = me[i]->connectors.begin(); j != me[i]->connectors.end(); j++)
3760 if (!strcasecmp(j->GetServerName().c_str(),name))
3763 j->CloseConnection();
3764 me[i]->connectors.erase(j);
3775 char MODERR[MAXBUF];
3782 void erase_factory(int j)
3785 for (std::vector<ircd_module*>::iterator t = factory.begin(); t != factory.end(); t++)
3790 factory.push_back(NULL);
3797 void erase_module(int j)
3800 for (std::vector<Module*>::iterator m = modules.begin(); m!= modules.end(); m++)
3806 modules.push_back(NULL);
3812 for (std::vector<std::string>::iterator v = module_names.begin(); v != module_names.end(); v++)
3816 module_names.erase(v);
3824 bool UnloadModule(const char* filename)
3826 std::string filename_str = filename;
3827 for (int j = 0; j != module_names.size(); j++)
3829 if (module_names[j] == filename_str)
3831 if (modules[j]->GetVersion().Flags & VF_STATIC)
3833 log(DEFAULT,"Failed to unload STATIC module %s",filename);
3834 snprintf(MODERR,MAXBUF,"Module not unloadable (marked static)");
3838 log(DEBUG,"Deleting module...");
3840 log(DEBUG,"Erasing module entry...");
3842 log(DEBUG,"Removing dependent commands...");
3843 removecommands(filename);
3844 log(DEFAULT,"Module %s unloaded",filename);
3849 log(DEFAULT,"Module %s is not loaded, cannot unload it!",filename);
3850 snprintf(MODERR,MAXBUF,"Module not loaded");
3854 bool DirValid(char* dirandfile)
3857 strlcpy(work,dirandfile,MAXBUF);
3858 int p = strlen(work);
3859 // we just want the dir
3860 while (strlen(work))
3869 char buffer[MAXBUF], otherdir[MAXBUF];
3870 // Get the current working directory
3871 if( getcwd( buffer, MAXBUF ) == NULL )
3874 if( getcwd( otherdir, MAXBUF ) == NULL )
3877 if (strlen(otherdir) >= strlen(work))
3879 otherdir[strlen(work)] = '\0';
3880 if (!strcmp(otherdir,work))
3889 std::string GetFullProgDir(char** argv, int argc)
3892 strlcpy(work,argv[0],MAXBUF);
3893 int p = strlen(work);
3894 // we just want the dir
3895 while (strlen(work))
3904 char buffer[MAXBUF], otherdir[MAXBUF];
3905 // Get the current working directory
3906 if( getcwd( buffer, MAXBUF ) == NULL )
3909 if( getcwd( otherdir, MAXBUF ) == NULL )
3915 bool LoadModule(const char* filename)
3917 char modfile[MAXBUF];
3918 snprintf(modfile,MAXBUF,"%s/%s",ModPath,filename);
3919 std::string filename_str = filename;
3920 if (!DirValid(modfile))
3922 log(DEFAULT,"Module %s is not within the modules directory.",modfile);
3923 snprintf(MODERR,MAXBUF,"Module %s is not within the modules directory.",modfile);
3926 log(DEBUG,"Loading module: %s",modfile);
3927 if (FileExists(modfile))
3929 for (int j = 0; j < module_names.size(); j++)
3931 if (module_names[j] == filename_str)
3933 log(DEFAULT,"Module %s is already loaded, cannot load a module twice!",modfile);
3934 snprintf(MODERR,MAXBUF,"Module already loaded");
3938 ircd_module* a = new ircd_module(modfile);
3939 factory[MODCOUNT+1] = a;
3940 if (factory[MODCOUNT+1]->LastError())
3942 log(DEFAULT,"Unable to load %s: %s",modfile,factory[MODCOUNT+1]->LastError());
3943 snprintf(MODERR,MAXBUF,"Loader/Linker error: %s",factory[MODCOUNT+1]->LastError());
3947 if (factory[MODCOUNT+1]->factory)
3949 Module* m = factory[MODCOUNT+1]->factory->CreateModule();
3950 modules[MODCOUNT+1] = m;
3951 /* save the module and the module's classfactory, if
3952 * this isnt done, random crashes can occur :/ */
3953 module_names.push_back(filename);
3957 log(DEFAULT,"Unable to load %s",modfile);
3958 snprintf(MODERR,MAXBUF,"Factory function failed!");
3964 log(DEFAULT,"InspIRCd: startup: Module Not Found %s",modfile);
3965 snprintf(MODERR,MAXBUF,"Module file could not be found");
3972 int InspIRCd(char** argv, int argc)
3974 struct sockaddr_in client,server;
3975 char addrs[MAXBUF][255];
3976 int incomingSockfd, result = TRUE;
3979 int selectResult = 0, selectResult2 = 0;
3980 char configToken[MAXBUF], Addr[MAXBUF], Type[MAXBUF];
3984 std::string logpath = GetFullProgDir(argv,argc) + "/ircd.log";
3985 log_file = fopen(logpath.c_str(),"a+");
3988 printf("ERROR: Could not write to logfile %s, bailing!\n\n",logpath.c_str());
3991 printf("Logging to %s...\n",logpath.c_str());
3993 log(DEFAULT,"$Id$");
3996 printf("WARNING!!! You are running an irc server as ROOT!!! DO NOT DO THIS!!!\n\n");
3998 log(DEFAULT,"InspIRCd: startup: not starting with UID 0!");
4000 SetupCommandTable();
4001 log(DEBUG,"InspIRCd: startup: default command table set up");
4003 ReadConfig(true,NULL);
4006 printf("WARNING: %s\n\n",DieValue);
4007 log(DEFAULT,"Ut-Oh, somebody didn't read their config file: '%s'",DieValue);
4010 log(DEBUG,"InspIRCd: startup: read config");
4012 int clientportcount = 0, serverportcount = 0;
4014 for (count = 0; count < ConfValueEnum("bind",&config_f); count++)
4016 ConfValue("bind","port",count,configToken,&config_f);
4017 ConfValue("bind","address",count,Addr,&config_f);
4018 ConfValue("bind","type",count,Type,&config_f);
4019 if (!strcmp(Type,"servers"))
4021 char Default[MAXBUF];
4022 strcpy(Default,"no");
4023 ConfValue("bind","default",count,Default,&config_f);
4024 if (strchr(Default,'y'))
4026 defaultRoute = serverportcount;
4027 log(DEBUG,"InspIRCd: startup: binding '%s:%s' is default server route",Addr,configToken);
4029 me[serverportcount] = new serverrec(ServerName,100L,false);
4030 if (!me[serverportcount]->CreateListener(Addr,atoi(configToken)))
4032 log(DEFAULT,"Warning: Failed to bind port %lu",(unsigned long)atoi(configToken));
4033 printf("Warning: Failed to bind port %lu\n",(unsigned long)atoi(configToken));
4042 ports[clientportcount] = atoi(configToken);
4043 strlcpy(addrs[clientportcount],Addr,256);
4046 log(DEBUG,"InspIRCd: startup: read binding %s:%s [%s] from config",Addr,configToken, Type);
4048 portCount = clientportcount;
4049 SERVERportCount = serverportcount;
4051 log(DEBUG,"InspIRCd: startup: read %lu total client ports and %lu total server ports",(unsigned long)portCount,(unsigned long)SERVERportCount);
4052 log(DEBUG,"InspIRCd: startup: InspIRCd is now starting!");
4056 /* BugFix By Craig! :p */
4058 for (count = 0; count < ConfValueEnum("module",&config_f); count++)
4060 ConfValue("module","name",count,configToken,&config_f);
4061 printf("Loading module... \033[1;32m%s\033[0m\n",configToken);
4062 if (!LoadModule(configToken))
4064 log(DEFAULT,"Exiting due to a module loader error.");
4065 printf("\nThere was an error loading a module: %s\n\nYou might want to do './inspircd start' instead of 'bin/inspircd'\n\n",ModuleError());
4069 log(DEFAULT,"Total loaded modules: %lu",(unsigned long)MODCOUNT+1);
4071 startup_time = time(NULL);
4074 ConfValue("pid","file",0,PID,&config_f);
4075 // write once here, to try it out and make sure its ok
4078 /* setup select call */
4080 FD_ZERO(&selectFds);
4082 log(DEBUG,"InspIRCd: startup: zero selects");
4083 log(VERBOSE,"InspIRCd: startup: portCount = %lu", (unsigned long)portCount);
4085 for (count = 0; count < portCount; count++)
4087 if ((openSockfd[boundPortCount] = OpenTCPSocket()) == ERROR)
4089 log(DEBUG,"InspIRCd: startup: bad fd %lu",(unsigned long)openSockfd[boundPortCount]);
4092 if (BindSocket(openSockfd[boundPortCount],client,server,ports[count],addrs[count]) == ERROR)
4094 log(DEFAULT,"InspIRCd: startup: failed to bind port %lu",(unsigned long)ports[count]);
4096 else /* well we at least bound to one socket so we'll continue */
4102 log(DEBUG,"InspIRCd: startup: total bound ports %lu",(unsigned long)boundPortCount);
4104 /* if we didn't bind to anything then abort */
4105 if (boundPortCount == 0)
4107 log(DEFAULT,"InspIRCd: startup: no ports bound, bailing!");
4108 printf("\nERROR: Was not able to bind any of %lu ports! Please check your configuration.\n\n", (unsigned long)portCount);
4113 printf("\nInspIRCd is now running!\n");
4117 log(VERBOSE,"Not forking as -nofork was specified");
4121 if (DaemonSeed() == ERROR)
4123 log(DEFAULT,"InspIRCd: startup: can't daemonise");
4124 printf("ERROR: could not go into daemon mode. Shutting down.\n");
4129 // BUGFIX: We cannot initialize this before forking, as the kqueue data is not inherited by child processes!
4134 if ((kq == -1) || (lkq == -1) || (skq == -1))
4136 log(DEFAULT,"main: kqueue() failed!");
4137 printf("ERROR: could not initialise kqueue event system. Shutting down.\n");
4144 log(DEFAULT,"kqueue socket engine is enabled. Filling listen list.");
4145 for (count = 0; count < boundPortCount; count++)
4148 log(DEBUG,"kqueue: Add listening socket to events, kq=%d socket=%d",lkq,openSockfd[count]);
4149 EV_SET(&ke, openSockfd[count], EVFILT_READ, EV_ADD, 0, 5, NULL);
4150 int i = kevent(lkq, &ke, 1, 0, 0, NULL);
4153 log(DEFAULT,"main: add listen ports to kqueue failed!");
4154 printf("ERROR: could not initialise listening sockets in kqueue. Shutting down.\n");
4157 for (int t = 0; t != SERVERportCount; t++)
4162 log(DEBUG,"kqueue: Add listening SERVER socket to events, kq=%d socket=%d",skq,me[t]->fd);
4163 EV_SET(&ke, me[t]->fd, EVFILT_READ, EV_ADD, 0, 5, NULL);
4164 int i = kevent(skq, &ke, 1, 0, 0, NULL);
4167 log(DEFAULT,"main: add server listen ports to kqueue failed!");
4168 printf("ERROR: could not initialise listening server sockets in kqueue. Shutting down.\n");
4175 log(DEFAULT,"Using standard select socket engine.");
4180 length = sizeof (client);
4181 char tcp_msg[MAXBUF],tcp_host[MAXBUF];
4185 struct kevent ke_list[33];
4190 tvs.tv_usec = 10000L;
4193 tv.tv_usec = 10000L;
4197 tval.tv_usec = 10000L;
4199 int total_in_this_set = 0;
4200 int i = 0, v = 0, j = 0, cycle_iter = 0;
4201 bool expire_run = false;
4203 /* main loop, this never returns */
4206 #ifdef _POSIX_PRIORITY_SCHEDULING
4213 // we only read time() once per iteration rather than tons of times!
4219 // *FIX* Instead of closing sockets in kill_link when they receive the ERROR :blah line, we should queue
4220 // them in a list, then reap the list every second or so.
4221 if (((TIME % 5) == 0) && (!expire_run))
4224 FOREACH_MOD OnBackgroundTimer(TIME);
4228 if ((TIME % 5) == 1)
4231 // fix by brain - this must be below any manipulation of the hashmap by modules
4232 user_hash::iterator count2 = clientlist.begin();
4236 ts.tv_nsec = 30000L;
4237 i = kevent(skq, NULL, 0, &ke, 1, &ts);
4240 log(DEBUG,"kqueue: Listening server socket event, i=%d, ke.ident=%d",i,ke.ident);
4241 for (int x = 0; x != SERVERportCount; x++)
4243 if ((me[x]) && (ke.ident == me[x]->fd))
4247 FD_ZERO(&serverfds);
4248 for (int x = 0; x != SERVERportCount; x++)
4251 FD_SET(me[x]->fd, &serverfds);
4253 tvs.tv_usec = 30000L;
4255 int servresult = select(32767, &serverfds, NULL, NULL, &tvs);
4258 for (int x = 0; x != SERVERportCount; x++)
4260 if ((me[x]) && (FD_ISSET (me[x]->fd, &serverfds)))
4263 char remotehost[MAXBUF],resolved[MAXBUF];
4264 length = sizeof (client);
4265 incomingSockfd = accept (me[x]->fd, (sockaddr *) &client, &length);
4266 if (incomingSockfd != -1)
4268 strlcpy(remotehost,(char *)inet_ntoa(client.sin_addr),MAXBUF);
4269 if(CleanAndResolve(resolved, remotehost) != TRUE)
4271 strlcpy(resolved,remotehost,MAXBUF);
4273 // add to this connections ircd_connector vector
4274 // *FIX* - we need the LOCAL port not the remote port in &client!
4275 me[x]->AddIncoming(incomingSockfd,resolved,me[x]->port);
4281 for (int x = 0; x < SERVERportCount; x++)
4283 std::deque<std::string> msgs;
4285 if ((me[x]) && (me[x]->RecvPacket(msgs, tcp_host)))
4287 for (int ctr = 0; ctr < msgs.size(); ctr++)
4289 strlcpy(tcp_msg,msgs[ctr].c_str(),MAXBUF);
4290 log(DEBUG,"Processing: %s",tcp_msg);
4293 log(DEBUG,"Invalid string from %s [route%lu]",tcp_host,(unsigned long)x);
4296 // during a netburst, send all data to all other linked servers
4297 if ((((nb_start>0) && (tcp_msg[0] != 'Y') && (tcp_msg[0] != 'X') && (tcp_msg[0] != 'F'))) || (is_uline(tcp_host)))
4299 if (is_uline(tcp_host))
4301 if ((tcp_msg[0] != 'Y') && (tcp_msg[0] != 'X') && (tcp_msg[0] != 'F'))
4303 NetSendToAllExcept(tcp_host,tcp_msg);
4307 NetSendToAllExcept(tcp_host,tcp_msg);
4309 std::string msg = tcp_msg;
4310 FOREACH_MOD OnPacketReceive(msg,tcp_host);
4311 strlcpy(tcp_msg,msg.c_str(),MAXBUF);
4312 handle_link_packet(tcp_msg, tcp_host, me[x]);
4318 while (count2 != clientlist.end())
4324 total_in_this_set = 0;
4326 user_hash::iterator xcount = count2;
4327 user_hash::iterator endingiter = count2;
4329 if (count2 == clientlist.end()) break;
4331 userrec* curr = NULL;
4334 curr = count2->second;
4336 if ((curr) && (curr->fd != 0))
4338 #ifdef _POSIX_PRIORITY_SCHEDULING
4341 // assemble up to 64 sockets into an fd_set
4342 // to implement a pooling mechanism.
4344 // This should be up to 64x faster than the
4345 // old implementation.
4347 while (total_in_this_set < 1024)
4349 if (count2 != clientlist.end())
4351 curr = count2->second;
4352 // we don't check the state of remote users.
4353 if ((curr->fd != -1) && (curr->fd != FD_MAGIC_NUMBER))
4355 curr->FlushWriteBuf();
4356 if (curr->GetWriteError() != "")
4358 log(DEBUG,"InspIRCd: write error: %s",curr->GetWriteError().c_str());
4359 kill_link(curr,curr->GetWriteError().c_str());
4363 FD_SET (curr->fd, &sfd);
4365 // registration timeout -- didnt send USER/NICK/HOST in the time specified in
4366 // their connection class.
4367 if ((TIME > curr->timeout) && (curr->registered != 7))
4369 log(DEBUG,"InspIRCd: registration timeout: %s",curr->nick);
4370 kill_link(curr,"Registration timeout");
4373 if ((TIME > curr->signon) && (curr->registered == 3) && (AllModulesReportReady(curr)))
4375 log(DEBUG,"signon exceed, registered=3, and modules ready, OK");
4376 curr->dns_done = true;
4378 FullConnectUser(curr);
4381 if ((curr->dns_done) && (curr->registered == 3) && (AllModulesReportReady(curr))) // both NICK and USER... and DNS
4383 log(DEBUG,"dns done, registered=3, and modules ready, OK");
4384 FullConnectUser(curr);
4387 if ((TIME > curr->nping) && (isnick(curr->nick)) && (curr->registered == 7))
4389 if ((!curr->lastping) && (curr->registered == 7))
4391 log(DEBUG,"InspIRCd: ping timeout: %s",curr->nick);
4392 kill_link(curr,"Ping timeout");
4395 Write(curr->fd,"PING :%s",ServerName);
4396 log(DEBUG,"InspIRCd: pinging: %s",curr->nick);
4398 curr->nping = TIME+curr->pingmax; // was hard coded to 120
4402 total_in_this_set++;
4406 endingiter = count2;
4407 count2 = xcount; // roll back to where we were
4409 // KQUEUE: We don't go through a loop to fill the fd_set so instead we must manually do this loop every now and again.
4410 // TODO: We dont need to do all this EVERY loop iteration, tone down the visits to this if we're using kqueue.
4412 if (cycle_iter > 10) while (count2 != clientlist.end())
4415 if (count2 != clientlist.end())
4417 curr = count2->second;
4418 // we don't check the state of remote users.
4419 if ((curr->fd != -1) && (curr->fd != FD_MAGIC_NUMBER))
4422 curr->FlushWriteBuf();
4423 if (curr->GetWriteError() != "")
4425 log(DEBUG,"InspIRCd: write error: %s",curr->GetWriteError().c_str());
4426 kill_link(curr,curr->GetWriteError().c_str());
4430 // registration timeout -- didnt send USER/NICK/HOST in the time specified in
4431 // their connection class.
4432 if ((TIME > curr->timeout) && (curr->registered != 7))
4434 log(DEBUG,"InspIRCd: registration timeout: %s",curr->nick);
4435 kill_link(curr,"Registration timeout");
4438 if ((TIME > curr->signon) && (curr->registered == 3) && (AllModulesReportReady(curr)))
4440 log(DEBUG,"signon exceed, registered=3, and modules ready, OK: %d %d",TIME,curr->signon);
4441 curr->dns_done = true;
4443 FullConnectUser(curr);
4446 if ((curr->dns_done) && (curr->registered == 3) && (AllModulesReportReady(curr)))
4448 log(DEBUG,"dns done, registered=3, and modules ready, OK");
4449 FullConnectUser(curr);
4452 if ((TIME > curr->nping) && (isnick(curr->nick)) && (curr->registered == 7))
4454 if ((!curr->lastping) && (curr->registered == 7))
4456 log(DEBUG,"InspIRCd: ping timeout: %s",curr->nick);
4457 kill_link(curr,"Ping timeout");
4460 Write(curr->fd,"PING :%s",ServerName);
4461 log(DEBUG,"InspIRCd: pinging: %s",curr->nick);
4463 curr->nping = TIME+curr->pingmax; // was hard coded to 120
4470 // increment the counter right to the end of the list, as kqueue processes everything in one go
4478 // for now, we only read 1 event. We could read soooo many more :)
4479 int i = kevent(kq, NULL, 0, &ke, 1, &ts);
4482 log(DEBUG,"kevent call: kq=%d, i=%d",kq,i);
4483 // KQUEUE: kevent gives us ONE fd which is ready to have something done to it. Do something to it.
4484 userrec* cu = fd_ref_table[ke.ident];
4486 tval.tv_usec = 1000L;
4487 selectResult2 = select(65535, &sfd, NULL, NULL, &tval);
4489 // now loop through all of the items in this pool if any are waiting
4490 if (selectResult2 > 0)
4491 for (user_hash::iterator count2a = xcount; count2a != endingiter; count2a++)
4493 // SELECT: we have to iterate...
4494 userrec* cu = count2a->second;
4497 #ifdef _POSIX_PRIORITY_SCHEDULING
4502 // KQUEUE: We already know we have a valid FD. No checks needed.
4503 if ((cu->fd != FD_MAGIC_NUMBER) && (cu->fd != -1))
4505 // SELECT: We don't know if our FD is valid.
4506 if ((cu->fd != FD_MAGIC_NUMBER) && (cu->fd != -1) && (FD_ISSET (cu->fd, &sfd)))
4509 log(DEBUG,"Data waiting on socket %d",cu->fd);
4512 FOREACH_RESULT(OnRawSocketRead(cu->fd,data,65535,result2));
4515 result = read(cu->fd, data, 65535);
4517 else result = result2;
4518 log(DEBUG,"Read result: %d",result);
4521 statsRecv += result;
4522 // perform a check on the raw buffer as an array (not a string!) to remove
4523 // characters 0 and 7 which are illegal in the RFC - replace them with spaces.
4524 // hopefully this should stop even more people whining about "Unknown command: *"
4525 for (int checker = 0; checker < result; checker++)
4527 if ((data[checker] == 0) || (data[checker] == 7))
4528 data[checker] = ' ';
4531 data[result] = '\0';
4532 userrec* current = cu;
4533 int currfd = current->fd;
4535 // add the data to the users buffer
4537 if (!current->AddBuffer(data))
4539 // AddBuffer returned false, theres too much data in the user's buffer and theyre up to no good.
4540 if (current->registered == 7)
4542 kill_link(current,"RecvQ exceeded");
4546 WriteOpers("*** Excess flood from %s",current->ip);
4547 log(DEFAULT,"Excess flood from: %s",current->ip);
4548 add_zline(120,ServerName,"Flood from unregistered connection",current->ip);
4553 if (current->recvq.length() > NetBufferSize)
4555 if (current->registered == 7)
4557 kill_link(current,"RecvQ exceeded");
4561 WriteOpers("*** Excess flood from %s",current->ip);
4562 log(DEFAULT,"Excess flood from: %s",current->ip);
4563 add_zline(120,ServerName,"Flood from unregistered connection",current->ip);
4568 // while there are complete lines to process...
4569 while (current->BufferIsReady())
4572 if (TIME > current->reset_due)
4574 current->reset_due = TIME + current->threshold;
4575 current->lines_in = 0;
4577 current->lines_in++;
4578 if (current->lines_in > current->flood)
4580 log(DEFAULT,"Excess flood from: %s!%s@%s",current->nick,current->ident,current->host);
4581 WriteOpers("*** Excess flood from: %s!%s@%s",current->nick,current->ident,current->host);
4582 kill_link(current,"Excess flood");
4585 if ((floodlines > current->flood) && (current->flood != 0))
4587 if (current->registered == 7)
4589 log(DEFAULT,"Excess flood from: %s!%s@%s",current->nick,current->ident,current->host);
4590 WriteOpers("*** Excess flood from: %s!%s@%s",current->nick,current->ident,current->host);
4591 kill_link(current,"Excess flood");
4595 add_zline(120,ServerName,"Flood from unregistered connection",current->ip);
4600 char sanitized[MAXBUF];
4601 // use GetBuffer to copy single lines into the sanitized string
4602 std::string single_line = current->GetBuffer();
4603 current->bytes_in += single_line.length();
4605 if (single_line.length()>512)
4607 log(DEFAULT,"Excess flood from: %s!%s@%s",current->nick,current->ident,current->host);
4608 WriteOpers("*** Excess flood from: %s!%s@%s",current->nick,current->ident,current->host);
4609 kill_link(current,"Excess flood");
4612 strlcpy(sanitized,single_line.c_str(),MAXBUF);
4615 userrec* old_comp = fd_ref_table[currfd];
4616 // we're gonna re-scan to check if the nick is gone, after every
4617 // command - if it has, we're gonna bail
4618 process_buffer(sanitized,current);
4619 // look for the user's record in case it's changed... if theyve quit,
4620 // we cant do anything more with their buffer, so bail.
4621 // there used to be an ugly, slow loop here. Now we have a reference
4622 // table, life is much easier (and FASTER)
4623 userrec* new_comp = fd_ref_table[currfd];
4624 if ((currfd < 0) || (!fd_ref_table[currfd]) || (old_comp != new_comp))
4632 if ((result == -1) && (errno != EAGAIN) && (errno != EINTR))
4634 log(DEBUG,"killing: %s",cu->nick);
4635 kill_link(cu,strerror(errno));
4639 // result EAGAIN means nothing read
4640 if (result == EAGAIN)
4650 log(DEBUG,"InspIRCd: Exited: %s",cu->nick);
4651 kill_link(cu,"Client exited");
4652 // must bail here? kill_link removes the hash, corrupting the iterator
4653 log(DEBUG,"Bailing from client exit");
4659 else if (result > 0)
4664 for (int q = 0; q < total_in_this_set; q++)
4670 #ifdef _POSIX_PRIORITY_SCHEDULING
4675 // set up select call
4676 for (count = 0; count < boundPortCount; count++)
4678 FD_SET (openSockfd[count], &selectFds);
4681 tv.tv_usec = 30000L;
4682 selectResult = select(MAXSOCKS, &selectFds, NULL, NULL, &tv);
4684 /* select is reporting a waiting socket. Poll them all to find out which */
4685 if (selectResult > 0)
4687 for (count = 0; count < boundPortCount; count++)
4689 if (FD_ISSET (openSockfd[count], &selectFds))
4693 ts.tv_nsec = 30000L;
4694 i = kevent(lkq, NULL, 0, ke_list, 32, &ts);
4695 if (i > 0) for (j = 0; j < i; j++)
4697 log(DEBUG,"kqueue: Listening socket event, i=%d, ke.ident=%d",i,ke.ident);
4698 // this isnt as efficient as it could be, we could create a reference table
4699 // to reference bound ports by fd, but this isnt a big bottleneck as the actual
4700 // number of listening ports on the average ircd is a small number (less than 20)
4701 // compared to the number of clients (possibly over 2000)
4702 for (count = 0; count < boundPortCount; count++)
4704 if (ke_list[j].ident == openSockfd[count])
4707 char target[MAXBUF], resolved[MAXBUF];
4708 length = sizeof (client);
4709 incomingSockfd = accept (openSockfd[count], (struct sockaddr *) &client, &length);
4711 strlcpy (target, (char *) inet_ntoa (client.sin_addr), MAXBUF);
4712 strlcpy (resolved, target, MAXBUF);
4714 if (incomingSockfd < 0)
4716 WriteOpers("*** WARNING: Accept failed on port %lu (%s)",(unsigned long)ports[count],target);
4717 log(DEBUG,"InspIRCd: accept failed: %lu",(unsigned long)ports[count]);
4722 FOREACH_MOD OnRawSocketAccept(incomingSockfd, resolved, ports[count]);
4724 AddClient(incomingSockfd, resolved, ports[count], false, inet_ntoa (client.sin_addr));
4725 log(DEBUG,"InspIRCd: adding client on port %lu fd=%lu",(unsigned long)ports[count],(unsigned long)incomingSockfd);
4733 #ifdef _POSIX_PRIORITY_SCHEDULING
4739 close (incomingSockfd);