]> git.netwichtig.de Git - user/henk/code/inspircd.git/blob - src/modules/m_spanningtree/resolvers.cpp
Change CacheRefreshTimer tick time back to 5 minutes
[user/henk/code/inspircd.git] / src / modules / m_spanningtree / resolvers.cpp
1 /*
2  * InspIRCd -- Internet Relay Chat Daemon
3  *
4  *   Copyright (C) 2007 Dennis Friis <peavey@inspircd.org>
5  *   Copyright (C) 2007 Craig Edwards <craigedwards@brainbox.cc>
6  *
7  * This file is part of InspIRCd.  InspIRCd is free software: you can
8  * redistribute it and/or modify it under the terms of the GNU General Public
9  * License as published by the Free Software Foundation, version 2.
10  *
11  * This program is distributed in the hope that it will be useful, but WITHOUT
12  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
13  * FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more
14  * details.
15  *
16  * You should have received a copy of the GNU General Public License
17  * along with this program.  If not, see <http://www.gnu.org/licenses/>.
18  */
19
20
21 #include "inspircd.h"
22
23 #include "cachetimer.h"
24 #include "resolvers.h"
25 #include "main.h"
26 #include "utils.h"
27 #include "treeserver.h"
28 #include "link.h"
29 #include "treesocket.h"
30
31 /* $ModDep: m_spanningtree/resolvers.h m_spanningtree/main.h m_spanningtree/utils.h m_spanningtree/treeserver.h m_spanningtree/link.h m_spanningtree/treesocket.h */
32
33 /** This class is used to resolve server hostnames during /connect and autoconnect.
34  * As of 1.1, the resolver system is seperated out from BufferedSocket, so we must do this
35  * resolver step first ourselves if we need it. This is totally nonblocking, and will
36  * callback to OnLookupComplete or OnError when completed. Once it has completed we
37  * will have an IP address which we can then use to continue our connection.
38  */
39 ServernameResolver::ServernameResolver(SpanningTreeUtilities* Util, DNS::Manager *mgr, const std::string &hostname, Link* x, DNS::QueryType qt, Autoconnect* myac)
40         : DNS::Request(mgr, Util->Creator, hostname, qt), Utils(Util), query(qt), host(hostname), MyLink(x), myautoconnect(myac)
41 {
42 }
43
44 void ServernameResolver::OnLookupComplete(const DNS::Query *r)
45 {
46         const DNS::ResourceRecord &ans_record = r->answers[0];
47
48         /* Initiate the connection, now that we have an IP to use.
49          * Passing a hostname directly to BufferedSocket causes it to
50          * just bail and set its FD to -1.
51          */
52         TreeServer* CheckDupe = Utils->FindServer(MyLink->Name.c_str());
53         if (!CheckDupe) /* Check that nobody tried to connect it successfully while we were resolving */
54         {
55                 TreeSocket* newsocket = new TreeSocket(Utils, MyLink, myautoconnect, ans_record.rdata);
56                 if (newsocket->GetFd() > -1)
57                 {
58                         /* We're all OK */
59                 }
60                 else
61                 {
62                         /* Something barfed, show the opers */
63                         ServerInstance->SNO->WriteToSnoMask('l', "CONNECT: Error connecting \002%s\002: %s.",
64                                 MyLink->Name.c_str(), newsocket->getError().c_str());
65                         ServerInstance->GlobalCulls.AddItem(newsocket);
66                 }
67         }
68 }
69
70 void ServernameResolver::OnError(const DNS::Query *r)
71 {
72         /* Ooops! */
73         if (query == DNS::QUERY_AAAA)
74         {
75                 ServernameResolver* snr = new ServernameResolver(Utils, this->manager, host, MyLink, DNS::QUERY_A, myautoconnect);
76                 try
77                 {
78                         this->manager->Process(snr);
79                         return;
80                 }
81                 catch (DNS::Exception &)
82                 {
83                         delete snr;
84                 }
85         }
86
87         ServerInstance->SNO->WriteToSnoMask('l', "CONNECT: Error connecting \002%s\002: Unable to resolve hostname - %s", MyLink->Name.c_str(), this->manager->GetErrorStr(r->error).c_str());
88         Utils->Creator->ConnectServer(myautoconnect, false);
89 }
90
91 SecurityIPResolver::SecurityIPResolver(Module* me, SpanningTreeUtilities* U, DNS::Manager *mgr, const std::string &hostname, Link* x, DNS::QueryType qt)
92                 : DNS::Request(mgr, me, hostname, qt), MyLink(x), Utils(U), mine(me), host(hostname), query(qt)
93 {
94 }
95
96 void SecurityIPResolver::OnLookupComplete(const DNS::Query *r)
97 {
98         const DNS::ResourceRecord &ans_record = r->answers[0];
99
100         for (std::vector<reference<Link> >::iterator i = Utils->LinkBlocks.begin(); i != Utils->LinkBlocks.end(); ++i)
101         {
102                 Link* L = *i;
103                 if (L->IPAddr == host)
104                 {
105                         Utils->ValidIPs.push_back(ans_record.rdata);
106                         break;
107                 }
108         }
109 }
110
111 void SecurityIPResolver::OnError(const DNS::Query *r)
112 {
113         if (query == DNS::QUERY_AAAA)
114         {
115                 SecurityIPResolver* res = new SecurityIPResolver(mine, Utils, this->manager, host, MyLink, DNS::QUERY_A);
116                 try
117                 {
118                         this->manager->Process(res);
119                         return;
120                 }
121                 catch (DNS::Exception &)
122                 {
123                         delete res;
124                 }
125         }
126         ServerInstance->Logs->Log("m_spanningtree", LOG_DEFAULT, "Could not resolve IP associated with Link '%s': %s",
127                 MyLink->Name.c_str(), this->manager->GetErrorStr(r->error).c_str());
128 }
129
130 CacheRefreshTimer::CacheRefreshTimer(SpanningTreeUtilities* Util)
131         : Timer(3600, ServerInstance->Time(), true), Utils(Util)
132 {
133 }
134
135 bool CacheRefreshTimer::Tick(time_t TIME)
136 {
137         Utils->RefreshIPCache();
138         return true;
139 }