1 /* +------------------------------------+
2 * | Inspire Internet Relay Chat Daemon |
3 * +------------------------------------+
5 * InspIRCd: (C) 2002-2007 InspIRCd Development Team
6 * See: http://www.inspircd.org/wiki/index.php/Credits
8 * This program is free but copyrighted software; see
9 * the file COPYING for details.
11 * ---------------------------------------------------
14 #include "configreader.h"
18 #include "commands/cmd_whois.h"
19 #include "commands/cmd_stats.h"
24 #include "transport.h"
26 #include "socketengine.h"
28 #include "m_spanningtree/main.h"
29 #include "m_spanningtree/utils.h"
30 #include "m_spanningtree/treeserver.h"
31 #include "m_spanningtree/link.h"
32 #include "m_spanningtree/treesocket.h"
33 #include "m_spanningtree/resolvers.h"
34 #include "m_spanningtree/handshaketimer.h"
36 /* $ModDep: m_spanningtree/timesynctimer.h m_spanningtree/resolvers.h m_spanningtree/main.h m_spanningtree/utils.h m_spanningtree/treeserver.h m_spanningtree/link.h m_spanningtree/treesocket.h m_hash.h */
39 /** Because most of the I/O gubbins are encapsulated within
40 * InspSocket, we just call the superclass constructor for
41 * most of the action, and append a few of our own values
44 TreeSocket::TreeSocket(SpanningTreeUtilities* Util, InspIRCd* SI, std::string host, int port, bool listening, unsigned long maxtime, Module* HookMod)
45 : InspSocket(SI, host, port, listening, maxtime), Utils(Util), Hook(HookMod)
48 this->LinkState = LISTENER;
49 theirchallenge = ourchallenge = "";
50 if (listening && Hook)
51 InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();
54 TreeSocket::TreeSocket(SpanningTreeUtilities* Util, InspIRCd* SI, std::string host, int port, bool listening, unsigned long maxtime, const std::string &ServerName, const std::string &bindto, Module* HookMod)
55 : InspSocket(SI, host, port, listening, maxtime, bindto), Utils(Util), Hook(HookMod)
58 theirchallenge = ourchallenge = "";
59 this->LinkState = CONNECTING;
61 InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();
64 /** When a listening socket gives us a new file descriptor,
65 * we must associate it with a socket without creating a new
66 * connection. This constructor is used for this purpose.
68 TreeSocket::TreeSocket(SpanningTreeUtilities* Util, InspIRCd* SI, int newfd, char* ip, Module* HookMod)
69 : InspSocket(SI, newfd, ip), Utils(Util), Hook(HookMod)
71 this->LinkState = WAIT_AUTH_1;
72 theirchallenge = ourchallenge = "";
73 /* If we have a transport module hooked to the parent, hook the same module to this
74 * socket, and set a timer waiting for handshake before we send CAPAB etc.
77 InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();
79 Instance->Timers->AddTimer(new HandshakeTimer(Instance, this, &(Utils->LinkBlocks[0]), this->Utils, 1));
82 ServerState TreeSocket::GetLinkState()
84 return this->LinkState;
87 Module* TreeSocket::GetHook()
92 TreeSocket::~TreeSocket()
95 InspSocketUnhookRequest(this, (Module*)Utils->Creator, Hook).Send();
98 const std::string& TreeSocket::GetOurChallenge()
100 return this->ourchallenge;
103 void TreeSocket::SetOurChallenge(const std::string &c)
105 this->ourchallenge = c;
108 const std::string& TreeSocket::GetTheirChallenge()
110 return this->theirchallenge;
113 void TreeSocket::SetTheirChallenge(const std::string &c)
115 this->theirchallenge = c;
118 std::string TreeSocket::MakePass(const std::string &password, const std::string &challenge)
120 /* This is a simple (maybe a bit hacky?) HMAC algorithm, thanks to jilles for
121 * suggesting the use of HMAC to secure the password against various attacks.
123 * Note: If m_sha256.so is not loaded, we MUST fall back to plaintext with no
124 * HMAC challenge/response.
126 Module* sha256 = Instance->FindModule("m_sha256.so");
127 if (Utils->ChallengeResponse && sha256 && !challenge.empty())
129 /* XXX: This is how HMAC is supposed to be done:
131 * sha256( (pass xor 0x5c) + sha256((pass xor 0x36) + m) )
133 * Note that we are encoding the hex hash, not the binary
134 * output of the hash which is slightly different to standard.
136 * Don't ask me why its always 0x5c and 0x36... it just is.
138 std::string hmac1, hmac2;
140 for (size_t n = 0; n < password.length(); n++)
142 hmac1 += static_cast<char>(password[n] ^ 0x5C);
143 hmac2 += static_cast<char>(password[n] ^ 0x36);
147 HashResetRequest(Utils->Creator, sha256).Send();
148 hmac2 = HashSumRequest(Utils->Creator, sha256, hmac2).Send();
150 HashResetRequest(Utils->Creator, sha256).Send();
151 std::string hmac = hmac1 + hmac2;
152 hmac = HashSumRequest(Utils->Creator, sha256, hmac).Send();
154 return "HMAC-SHA256:"+ hmac;
156 else if (!challenge.empty() && !sha256)
157 Instance->Log(DEFAULT,"Not authenticating to server using SHA256/HMAC because we don't have m_sha256 loaded!");
162 /** When an outbound connection finishes connecting, we receive
163 * this event, and must send our SERVER string to the other
164 * side. If the other side is happy, as outlined in the server
165 * to server docs on the inspircd.org site, the other side
166 * will then send back its own server string.
168 bool TreeSocket::OnConnected()
170 if (this->LinkState == CONNECTING)
172 /* we do not need to change state here. */
173 for (std::vector<Link>::iterator x = Utils->LinkBlocks.begin(); x < Utils->LinkBlocks.end(); x++)
175 if (x->Name == this->myhost)
177 this->Instance->SNO->WriteToSnoMask('l',"Connection to \2"+myhost+"\2["+(x->HiddenFromStats ? "<hidden>" : this->GetIP())+"] started.");
180 InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();
181 this->Instance->SNO->WriteToSnoMask('l',"Connection to \2"+myhost+"\2["+(x->HiddenFromStats ? "<hidden>" : this->GetIP())+"] using transport \2"+x->Hook+"\2");
183 this->OutboundPass = x->SendPass;
185 /* found who we're supposed to be connecting to, send the neccessary gubbins. */
187 Instance->Timers->AddTimer(new HandshakeTimer(Instance, this, &(*x), this->Utils, 1));
189 this->SendCapabilities();
195 /* There is a (remote) chance that between the /CONNECT and the connection
196 * being accepted, some muppet has removed the <link> block and rehashed.
197 * If that happens the connection hangs here until it's closed. Unlikely
198 * and rather harmless.
200 this->Instance->SNO->WriteToSnoMask('l',"Connection to \2"+myhost+"\2 lost link tag(!)");
204 void TreeSocket::OnError(InspSocketError e)
206 /* We don't handle this method, because all our
207 * dirty work is done in OnClose() (see below)
208 * which is still called on error conditions too.
210 if (e == I_ERR_CONNECT)
212 this->Instance->SNO->WriteToSnoMask('l',"Connection failed: Connection to \002"+myhost+"\002 refused");
213 Link* MyLink = Utils->FindLink(myhost);
215 Utils->DoFailOver(MyLink);
219 int TreeSocket::OnDisconnect()
221 /* For the same reason as above, we don't
222 * handle OnDisconnect()
227 /** Recursively send the server tree with distances as hops.
228 * This is used during network burst to inform the other server
229 * (and any of ITS servers too) of what servers we know about.
230 * If at any point any of these servers already exist on the other
231 * end, our connection may be terminated. The hopcounts given
232 * by this function are relative, this doesn't matter so long as
233 * they are all >1, as all the remote servers re-calculate them
234 * to be relative too, with themselves as hop 0.
236 void TreeSocket::SendServers(TreeServer* Current, TreeServer* s, int hops)
239 for (unsigned int q = 0; q < Current->ChildCount(); q++)
241 TreeServer* recursive_server = Current->GetChild(q);
242 if (recursive_server != s)
244 snprintf(command,1024,":%s SERVER %s * %d :%s",Current->GetName().c_str(),recursive_server->GetName().c_str(),hops,recursive_server->GetDesc().c_str());
245 this->WriteLine(command);
246 this->WriteLine(":"+recursive_server->GetName()+" VERSION :"+recursive_server->GetVersion());
247 /* down to next level */
248 this->SendServers(recursive_server, s, hops+1);
253 std::string TreeSocket::MyCapabilities()
255 std::vector<std::string> modlist;
256 std::string capabilities = "";
257 for (int i = 0; i <= this->Instance->GetModuleCount(); i++)
259 if (this->Instance->modules[i]->GetVersion().Flags & VF_COMMON)
260 modlist.push_back(this->Instance->Config->module_names[i]);
262 sort(modlist.begin(),modlist.end());
263 for (unsigned int i = 0; i < modlist.size(); i++)
266 capabilities = capabilities + ",";
267 capabilities = capabilities + modlist[i];
272 std::string TreeSocket::RandString(unsigned int length)
274 char* randombuf = new char[length+1];
276 int fd = open("/dev/urandom", O_RDONLY, 0);
280 read(fd, randombuf, length);
285 for (unsigned int i = 0; i < length; i++)
286 randombuf[i] = rand();
289 for (unsigned int i = 0; i < length; i++)
291 char randchar = static_cast<char>((randombuf[i] & 0x7F) | 0x21);
292 out += (randchar == '=' ? '_' : randchar);
299 void TreeSocket::SendCapabilities()
301 irc::commasepstream modulelist(MyCapabilities());
302 this->WriteLine("CAPAB START");
304 /* Send module names, split at 509 length */
305 std::string item = "*";
306 std::string line = "CAPAB MODULES ";
307 while ((item = modulelist.GetToken()) != "")
309 if (line.length() + item.length() + 1 > 509)
311 this->WriteLine(line);
312 line = "CAPAB MODULES ";
315 if (line != "CAPAB MODULES ")
320 if (line != "CAPAB MODULES ")
321 this->WriteLine(line);
328 #ifdef SUPPORT_IP6LINKS
332 /* Do we have sha256 available? If so, we send a challenge */
333 if (Utils->ChallengeResponse && (Instance->FindModule("m_sha256.so")))
335 this->SetOurChallenge(RandString(20));
336 extra = " CHALLENGE=" + this->GetOurChallenge();
339 this->WriteLine("CAPAB CAPABILITIES :NICKMAX="+ConvToStr(NICKMAX)+" HALFOP="+ConvToStr(this->Instance->Config->AllowHalfop)+" CHANMAX="+ConvToStr(CHANMAX)+" MAXMODES="+ConvToStr(MAXMODES)+" IDENTMAX="+ConvToStr(IDENTMAX)+" MAXQUIT="+ConvToStr(MAXQUIT)+" MAXTOPIC="+ConvToStr(MAXTOPIC)+" MAXKICK="+ConvToStr(MAXKICK)+" MAXGECOS="+ConvToStr(MAXGECOS)+" MAXAWAY="+ConvToStr(MAXAWAY)+" IP6NATIVE="+ConvToStr(ip6)+" IP6SUPPORT="+ConvToStr(ip6support)+" PROTOCOL="+ConvToStr(ProtocolVersion)+extra);
341 this->WriteLine("CAPAB END");
344 /* Check a comma seperated list for an item */
345 bool TreeSocket::HasItem(const std::string &list, const std::string &item)
347 irc::commasepstream seplist(list);
348 std::string item2 = "*";
349 while ((item2 = seplist.GetToken()) != "")
357 /* Isolate and return the elements that are different between two comma seperated lists */
358 std::string TreeSocket::ListDifference(const std::string &one, const std::string &two)
360 irc::commasepstream list_one(one);
361 std::string item = "*";
362 std::string result = "";
363 while ((item = list_one.GetToken()) != "")
365 if (!HasItem(two, item))
374 bool TreeSocket::Capab(const std::deque<std::string> ¶ms)
376 if (params.size() < 1)
378 this->WriteLine("ERROR :Invalid number of parameters for CAPAB - Mismatched version");
381 if (params[0] == "START")
383 this->ModuleList = "";
384 this->CapKeys.clear();
386 else if (params[0] == "END")
388 std::string reason = "";
390 #ifdef SUPPORT_IP6LINKS
393 /* Compare ModuleList and check CapKeys...
394 * Maybe this could be tidier? -- Brain
396 if ((this->ModuleList != this->MyCapabilities()) && (this->ModuleList.length()))
398 std::string diff = ListDifference(this->ModuleList, this->MyCapabilities());
401 diff = "your server:" + ListDifference(this->MyCapabilities(), this->ModuleList);
405 diff = "this server:" + diff;
407 if (diff.length() == 12)
408 reason = "Module list in CAPAB is not alphabetically ordered, cannot compare lists.";
410 reason = "Modules loaded on these servers are not correctly matched, these modules are not loaded on " + diff;
412 if (((this->CapKeys.find("IP6SUPPORT") == this->CapKeys.end()) && (ip6support)) || ((this->CapKeys.find("IP6SUPPORT") != this->CapKeys.end()) && (this->CapKeys.find("IP6SUPPORT")->second != ConvToStr(ip6support))))
413 reason = "We don't both support linking to IPV6 servers";
414 if (((this->CapKeys.find("IP6NATIVE") != this->CapKeys.end()) && (this->CapKeys.find("IP6NATIVE")->second == "1")) && (!ip6support))
415 reason = "The remote server is IPV6 native, and we don't support linking to IPV6 servers";
416 if (((this->CapKeys.find("NICKMAX") == this->CapKeys.end()) || ((this->CapKeys.find("NICKMAX") != this->CapKeys.end()) && (this->CapKeys.find("NICKMAX")->second != ConvToStr(NICKMAX)))))
417 reason = "Maximum nickname lengths differ or remote nickname length not specified";
418 if (((this->CapKeys.find("PROTOCOL") == this->CapKeys.end()) || ((this->CapKeys.find("PROTOCOL") != this->CapKeys.end()) && (this->CapKeys.find("PROTOCOL")->second != ConvToStr(ProtocolVersion)))))
420 if (this->CapKeys.find("PROTOCOL") != this->CapKeys.end())
422 reason = "Mismatched protocol versions "+this->CapKeys.find("PROTOCOL")->second+" and "+ConvToStr(ProtocolVersion);
426 reason = "Protocol version not specified";
429 if (((this->CapKeys.find("HALFOP") == this->CapKeys.end()) && (Instance->Config->AllowHalfop)) || ((this->CapKeys.find("HALFOP") != this->CapKeys.end()) && (this->CapKeys.find("HALFOP")->second != ConvToStr(Instance->Config->AllowHalfop))))
430 reason = "We don't both have halfop support enabled/disabled identically";
431 if (((this->CapKeys.find("IDENTMAX") == this->CapKeys.end()) || ((this->CapKeys.find("IDENTMAX") != this->CapKeys.end()) && (this->CapKeys.find("IDENTMAX")->second != ConvToStr(IDENTMAX)))))
432 reason = "Maximum ident lengths differ or remote ident length not specified";
433 if (((this->CapKeys.find("CHANMAX") == this->CapKeys.end()) || ((this->CapKeys.find("CHANMAX") != this->CapKeys.end()) && (this->CapKeys.find("CHANMAX")->second != ConvToStr(CHANMAX)))))
434 reason = "Maximum channel lengths differ or remote channel length not specified";
435 if (((this->CapKeys.find("MAXMODES") == this->CapKeys.end()) || ((this->CapKeys.find("MAXMODES") != this->CapKeys.end()) && (this->CapKeys.find("MAXMODES")->second != ConvToStr(MAXMODES)))))
436 reason = "Maximum modes per line differ or remote modes per line not specified";
437 if (((this->CapKeys.find("MAXQUIT") == this->CapKeys.end()) || ((this->CapKeys.find("MAXQUIT") != this->CapKeys.end()) && (this->CapKeys.find("MAXQUIT")->second != ConvToStr(MAXQUIT)))))
438 reason = "Maximum quit lengths differ or remote quit length not specified";
439 if (((this->CapKeys.find("MAXTOPIC") == this->CapKeys.end()) || ((this->CapKeys.find("MAXTOPIC") != this->CapKeys.end()) && (this->CapKeys.find("MAXTOPIC")->second != ConvToStr(MAXTOPIC)))))
440 reason = "Maximum topic lengths differ or remote topic length not specified";
441 if (((this->CapKeys.find("MAXKICK") == this->CapKeys.end()) || ((this->CapKeys.find("MAXKICK") != this->CapKeys.end()) && (this->CapKeys.find("MAXKICK")->second != ConvToStr(MAXKICK)))))
442 reason = "Maximum kick lengths differ or remote kick length not specified";
443 if (((this->CapKeys.find("MAXGECOS") == this->CapKeys.end()) || ((this->CapKeys.find("MAXGECOS") != this->CapKeys.end()) && (this->CapKeys.find("MAXGECOS")->second != ConvToStr(MAXGECOS)))))
444 reason = "Maximum GECOS (fullname) lengths differ or remote GECOS length not specified";
445 if (((this->CapKeys.find("MAXAWAY") == this->CapKeys.end()) || ((this->CapKeys.find("MAXAWAY") != this->CapKeys.end()) && (this->CapKeys.find("MAXAWAY")->second != ConvToStr(MAXAWAY)))))
446 reason = "Maximum awaymessage lengths differ or remote awaymessage length not specified";
448 /* Challenge response, store their challenge for our password */
449 std::map<std::string,std::string>::iterator n = this->CapKeys.find("CHALLENGE");
450 if (Utils->ChallengeResponse && (n != this->CapKeys.end()) && (Instance->FindModule("m_sha256.so")))
452 /* Challenge-response is on now */
453 this->SetTheirChallenge(n->second);
454 if (!this->GetTheirChallenge().empty() && (this->LinkState == CONNECTING))
456 this->WriteLine(std::string("SERVER ")+this->Instance->Config->ServerName+" "+this->MakePass(OutboundPass, this->GetTheirChallenge())+" 0 :"+this->Instance->Config->ServerDesc);
461 /* They didnt specify a challenge or we don't have m_sha256.so, we use plaintext */
462 if (this->LinkState == CONNECTING)
463 this->WriteLine(std::string("SERVER ")+this->Instance->Config->ServerName+" "+OutboundPass+" 0 :"+this->Instance->Config->ServerDesc);
468 this->WriteLine("ERROR :CAPAB negotiation failed: "+reason);
472 else if ((params[0] == "MODULES") && (params.size() == 2))
474 if (!this->ModuleList.length())
476 this->ModuleList.append(params[1]);
480 this->ModuleList.append(",");
481 this->ModuleList.append(params[1]);
485 else if ((params[0] == "CAPABILITIES") && (params.size() == 2))
487 irc::tokenstream capabs(params[1]);
490 while ((more = capabs.GetToken(item)))
492 /* Process each key/value pair */
493 std::string::size_type equals = item.rfind('=');
494 if (equals != std::string::npos)
496 std::string var = item.substr(0, equals);
497 std::string value = item.substr(equals+1, item.length());
498 CapKeys[var] = value;
505 /** This function forces this server to quit, removing this server
506 * and any users on it (and servers and users below that, etc etc).
507 * It's very slow and pretty clunky, but luckily unless your network
508 * is having a REAL bad hair day, this function shouldnt be called
509 * too many times a month ;-)
511 void TreeSocket::SquitServer(std::string &from, TreeServer* Current)
513 /* recursively squit the servers attached to 'Current'.
514 * We're going backwards so we don't remove users
515 * while we still need them ;)
517 for (unsigned int q = 0; q < Current->ChildCount(); q++)
519 TreeServer* recursive_server = Current->GetChild(q);
520 this->SquitServer(from,recursive_server);
522 /* Now we've whacked the kids, whack self */
524 num_lost_users += Current->QuitUsers(from);
527 /** This is a wrapper function for SquitServer above, which
528 * does some validation first and passes on the SQUIT to all
529 * other remaining servers.
531 void TreeSocket::Squit(TreeServer* Current, const std::string &reason)
533 if ((Current) && (Current != Utils->TreeRoot))
535 Event rmode((char*)Current->GetName().c_str(), (Module*)Utils->Creator, "lost_server");
536 rmode.Send(Instance);
538 std::deque<std::string> params;
539 params.push_back(Current->GetName());
540 params.push_back(":"+reason);
541 Utils->DoOneToAllButSender(Current->GetParent()->GetName(),"SQUIT",params,Current->GetName());
542 if (Current->GetParent() == Utils->TreeRoot)
544 this->Instance->WriteOpers("Server \002"+Current->GetName()+"\002 split: "+reason);
548 this->Instance->WriteOpers("Server \002"+Current->GetName()+"\002 split from server \002"+Current->GetParent()->GetName()+"\002 with reason: "+reason);
550 num_lost_servers = 0;
552 std::string from = Current->GetParent()->GetName()+" "+Current->GetName();
553 SquitServer(from, Current);
555 Current->GetParent()->DelChild(Current);
557 this->Instance->WriteOpers("Netsplit complete, lost \002%d\002 users on \002%d\002 servers.", num_lost_users, num_lost_servers);
561 Instance->Log(DEFAULT,"Squit from unknown server");
565 /** FMODE command - server mode with timestamp checks */
566 bool TreeSocket::ForceMode(const std::string &source, std::deque<std::string> ¶ms)
568 /* Chances are this is a 1.0 FMODE without TS */
569 if (params.size() < 3)
571 /* No modes were in the command, probably a channel with no modes set on it */
576 std::string sourceserv;
577 /* Are we dealing with an FMODE from a user, or from a server? */
578 userrec* who = this->Instance->FindNick(source);
581 /* FMODE from a user, set sourceserv to the users server name */
582 sourceserv = who->server;
586 /* FMODE from a server, create a fake user to receive mode feedback */
587 who = new userrec(this->Instance);
588 who->SetFd(FD_MAGIC_NUMBER);
589 smode = true; /* Setting this flag tells us we should free the userrec later */
590 sourceserv = source; /* Set sourceserv to the actual source string */
592 const char* modelist[64];
595 memset(&modelist,0,sizeof(modelist));
596 for (unsigned int q = 0; (q < params.size()) && (q < 64); q++)
600 /* The timestamp is in this position.
601 * We don't want to pass that up to the
602 * server->client protocol!
604 TS = atoi(params[q].c_str());
608 /* Everything else is fine to append to the modelist */
609 modelist[n++] = params[q].c_str();
613 /* Extract the TS value of the object, either userrec or chanrec */
614 userrec* dst = this->Instance->FindNick(params[0]);
615 chanrec* chan = NULL;
623 chan = this->Instance->FindChan(params[0]);
629 /* Oops, channel doesnt exist! */
633 /* TS is equal or less: Merge the mode changes into ours and pass on.
639 this->Instance->SendMode(modelist, n, who);
643 this->Instance->CallCommandHandler("MODE", modelist, n, who);
645 /* HOT POTATO! PASS IT ON! */
646 Utils->DoOneToAllButSender(source,"FMODE",params,sourceserv);
648 /* If the TS is greater than ours, we drop the mode and dont pass it anywhere.
657 /** FTOPIC command */
658 bool TreeSocket::ForceTopic(const std::string &source, std::deque<std::string> ¶ms)
660 if (params.size() != 4)
662 time_t ts = atoi(params[1].c_str());
663 std::string nsource = source;
664 chanrec* c = this->Instance->FindChan(params[0]);
667 if ((ts >= c->topicset) || (!*c->topic))
669 std::string oldtopic = c->topic;
670 strlcpy(c->topic,params[3].c_str(),MAXTOPIC);
671 strlcpy(c->setby,params[2].c_str(),127);
673 /* if the topic text is the same as the current topic,
674 * dont bother to send the TOPIC command out, just silently
675 * update the set time and set nick.
677 if (oldtopic != params[3])
679 userrec* user = this->Instance->FindNick(source);
682 c->WriteChannelWithServ(source.c_str(), "TOPIC %s :%s", c->name, c->topic);
686 c->WriteChannel(user, "TOPIC %s :%s", c->name, c->topic);
687 nsource = user->server;
689 /* all done, send it on its way */
690 params[3] = ":" + params[3];
691 Utils->DoOneToAllButSender(source,"FTOPIC",params,nsource);
699 /** FJOIN, similar to TS6 SJOIN, but not quite. */
700 bool TreeSocket::ForceJoin(const std::string &source, std::deque<std::string> ¶ms)
702 /* 1.1 FJOIN works as follows:
704 * Each FJOIN is sent along with a timestamp, and the side with the lowest
705 * timestamp 'wins'. From this point on we will refer to this side as the
706 * winner. The side with the higher timestamp loses, from this point on we
707 * will call this side the loser or losing side. This should be familiar to
708 * anyone who's dealt with dreamforge or TS6 before.
710 * When two sides of a split heal and this occurs, the following things
713 * If the timestamps are exactly equal, both sides merge their privilages
714 * and users, as in InspIRCd 1.0 and ircd2.8. The channels have not been
715 * re-created during a split, this is safe to do.
718 * If the timestamps are NOT equal, the losing side removes all privilage
719 * modes from all of its users that currently exist in the channel, before
720 * introducing new users into the channel which are listed in the FJOIN
721 * command's parameters. This means, all modes +ohv, and privilages added
722 * by modules, such as +qa. The losing side then LOWERS its timestamp value
723 * of the channel to match that of the winning side, and the modes of the
724 * users of the winning side are merged in with the losing side. The loser
725 * then sends out a set of FMODE commands which 'confirm' that it just
726 * removed all privilage modes from its existing users, which allows for
727 * services packages to still work correctly without needing to know the
728 * timestamping rules which InspIRCd follows. In TS6 servers this is always
729 * a problem, and services packages must contain code which explicitly
730 * behaves as TS6 does, removing ops from the losing side of a split where
731 * neccessary within its internal records, as this state information is
732 * not explicitly echoed out in that protocol.
734 * The winning side on the other hand will ignore all user modes from the
735 * losing side, so only its own modes get applied. Life is simple for those
736 * who succeed at internets. :-)
738 * NOTE: Unlike TS6 and dreamforge and other protocols which have SJOIN,
739 * FJOIN does not contain the simple-modes such as +iklmnsp. Why not,
740 * you ask? Well, quite simply because we don't need to. They'll be sent
741 * after the FJOIN by FMODE, and FMODE is timestamped, so in the event
742 * the losing side sends any modes for the channel which shouldnt win,
743 * they wont as their timestamp will be too high :-)
746 if (params.size() < 3)
749 char first[MAXBUF]; /* The first parameter of the mode command */
750 char modestring[MAXBUF]; /* The mode sequence (2nd parameter) of the mode command */
751 char* mode_users[127]; /* The values used by the mode command */
752 memset(&mode_users,0,sizeof(mode_users)); /* Initialize mode parameters */
753 mode_users[0] = first; /* Set this up to be our on-stack value */
754 mode_users[1] = modestring; /* Same here as above */
755 strcpy(modestring,"+"); /* Initialize the mode sequence to just '+' */
756 unsigned int modectr = 2; /* Pointer to the third mode parameter (e.g. the one after the +-sequence) */
758 userrec* who = NULL; /* User we are currently checking */
759 std::string channel = params[0]; /* Channel name, as a string */
760 time_t TS = atoi(params[1].c_str()); /* Timestamp given to us for remote side */
761 std::string nicklist = params[2];
762 bool created = false;
764 /* Try and find the channel */
765 chanrec* chan = this->Instance->FindChan(channel);
767 /* Initialize channel name in the mode parameters */
768 strlcpy(mode_users[0],channel.c_str(),MAXBUF);
770 /* default TS is a high value, which if we dont have this
771 * channel will let the other side apply their modes.
773 time_t ourTS = Instance->Time(true)+600;
774 /* Does this channel exist? if it does, get its REAL timestamp */
778 created = true; /* don't perform deops, and set TS to correct time after processing. */
780 /* do this first, so our mode reversals are correctly received by other servers
781 * if there is a TS collision.
783 params[2] = ":" + params[2];
784 Utils->DoOneToAllButSender(source,"FJOIN",params,source);
786 /* In 1.1, if they have the newer channel, we immediately clear
787 * all status modes from our users. We then accept their modes.
788 * If WE have the newer channel its the other side's job to do this.
789 * Note that this causes the losing server to send out confirming
794 std::deque<std::string> param_list;
795 /* Lower the TS here */
796 if (Utils->AnnounceTSChange && chan)
797 chan->WriteChannelWithServ(Instance->Config->ServerName,
798 "NOTICE %s :TS for %s changed from %lu to %lu", chan->name, chan->name, ourTS, TS);
800 /* Zap all the privilage modes on our side, if the channel exists here */
803 param_list.push_back(channel);
806 this->RemoveStatus(Instance->Config->ServerName, param_list);
809 /* Put the final parameter of the FJOIN into a tokenstream ready to split it */
810 irc::tokenstream users(nicklist);
813 /* Now, process every 'prefixes,nick' pair */
814 while (users.GetToken(item))
817 const char* usr = item.c_str();
818 /* Safety check just to make sure someones not sent us an FJOIN full of spaces
819 * (is this even possible?) */
822 const char* permissions = usr;
824 char* nm = new char[MAXBUF];
826 /* Iterate through all the prefix values, convert them from prefixes
827 * to mode letters, and append them to the mode sequence
829 while ((*permissions) && (*permissions != ',') && (ntimes < MAXBUF))
831 ModeHandler* mh = Instance->Modes->FindPrefix(*permissions);
834 /* This is a valid prefix */
836 *tnm++ = mh->GetModeChar();
840 /* Not a valid prefix...
841 * danger bill bobbertson! (that's will robinsons older brother ;-) ...)
843 this->Instance->WriteOpers("ERROR: We received a user with an unknown prefix '%c'. Closed connection to avoid a desync.",*permissions);
844 this->WriteLine(std::string("ERROR :Invalid prefix '")+(*permissions)+"' in FJOIN");
850 /* Null terminate modes */
852 /* Advance past the comma, to the nick */
854 /* Check the user actually exists */
855 who = this->Instance->FindNick(usr);
858 /* Check that the user's 'direction' is correct
859 * based on the server sending the FJOIN. We must
860 * check each nickname in turn, because the origin of
861 * the FJOIN may be different to the origin of the nicks
862 * in the command itself.
864 TreeServer* route_back_again = Utils->BestRouteTo(who->server);
865 if ((!route_back_again) || (route_back_again->GetSocket() != this))
867 /* Oh dear oh dear. */
872 /* NOTE: Moved this below the fake direction check, so that modes
873 * arent put into the mode list for users that were collided, and
874 * may reconnect from the other side or our side before the split
878 /* Did they get any modes? How many times? */
879 strlcat(modestring, nm, MAXBUF);
880 for (int k = 0; k < ntimes; k++)
881 mode_users[modectr++] = strdup(usr);
882 /* Free temporary buffer used for mode sequence */
885 /* Finally, we can actually place the user into the channel.
886 * We're sure its right. Final answer, phone a friend.
889 chanrec::JoinUser(this->Instance, who, channel.c_str(), true, "", TS);
891 chanrec::JoinUser(this->Instance, who, channel.c_str(), true, "");
892 /* Have we already queued up MAXMODES modes with parameters
893 * (+qaohv) ready to be sent to the server?
895 if (modectr >= (MAXMODES-1))
897 /* Only actually give the users any status if we lost
898 * the FJOIN or drew (equal timestamps).
899 * It isn't actually possible for ourTS to be > TS here,
900 * only possible to actually have ourTS == TS, or
901 * ourTS < TS, because if we lost, we already lowered
902 * our TS above before we entered this loop. We only
903 * check >= as a safety measure, in case someone stuffed
904 * up. If someone DID stuff up, it was most likely me.
905 * Note: I do not like baseball bats in the face...
909 this->Instance->SendMode((const char**)mode_users,modectr,who);
911 /* Something stuffed up, and for some reason, the timestamp is
912 * NOT lowered right now and should be. Lower it. Usually this
913 * code won't be executed, doubtless someone will remove it some
918 Instance->Log(DEFAULT,"Channel TS for %s changed from %lu to %lu",chan->name,ourTS,TS);
924 /* Reset all this back to defaults, and
925 * free any ram we have left allocated.
927 strcpy(mode_users[1],"+");
928 for (unsigned int f = 2; f < modectr; f++)
935 /* Remember to free this */
937 /* If we got here, there's a nick in FJOIN which doesnt exist on this server.
938 * We don't try to process the nickname here (that WOULD cause a segfault because
939 * we'd be playing with null pointers) however, we DO pass the nickname on, just
940 * in case somehow we're desynched, so that other users which might be able to see
941 * the nickname get their fair chance to process it.
943 Instance->Log(SPARSE,"Warning! Invalid user %s in FJOIN to channel %s IGNORED", usr, channel.c_str());
949 /* there werent enough modes built up to flush it during FJOIN,
950 * or, there are a number left over. flush them out.
952 if ((modectr > 2) && (who) && (chan))
956 /* Our channel is newer than theirs. Evil deeds must be afoot. */
957 this->Instance->SendMode((const char**)mode_users,modectr,who);
958 /* Yet again, we can't actually get a true value here, if everything else
959 * is working as it should.
963 Instance->Log(DEFAULT,"Channel TS for %s changed from %lu to %lu",chan->name,ourTS,TS);
969 /* Free anything we have left to free */
970 for (unsigned int f = 2; f < modectr; f++)
973 /* All done. That wasnt so bad was it, you can wipe
974 * the sweat from your forehead now. :-)
980 bool TreeSocket::IntroduceClient(const std::string &source, std::deque<std::string> ¶ms)
982 /** Do we have enough parameters:
983 * NICK age nick host dhost ident +modes ip :gecos
985 if (params.size() != 8)
987 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction ("+params[1]+"?)");
991 time_t age = atoi(params[0].c_str());
992 const char* tempnick = params[1].c_str();
994 /** Check parameters for validity before introducing the client, discovered by dmb.
995 * XXX: Can we make this neater?
999 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction (Invalid TS?)");
1002 else if (params[1].length() > NICKMAX)
1004 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction ("+params[1]+" > NICKMAX?)");
1007 else if (params[2].length() > 64)
1009 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction ("+params[2]+" > 64?)");
1012 else if (params[3].length() > 64)
1014 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction ("+params[3]+" > 64?)");
1017 else if (params[4].length() > IDENTMAX)
1019 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction ("+params[4]+" > IDENTMAX?)");
1022 else if (params[7].length() > MAXGECOS)
1024 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction ("+params[7]+" > MAXGECOS?)");
1028 /** Our client looks ok, lets introduce it now
1030 Instance->Log(DEBUG,"New remote client %s",tempnick);
1031 user_hash::iterator iter = this->Instance->clientlist->find(tempnick);
1033 if (iter != this->Instance->clientlist->end())
1035 /* nick collision */
1036 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+tempnick+" :Nickname collision");
1037 userrec::QuitUser(this->Instance, iter->second, "Nickname collision");
1041 userrec* _new = new userrec(this->Instance);
1042 (*(this->Instance->clientlist))[tempnick] = _new;
1043 _new->SetFd(FD_MAGIC_NUMBER);
1044 strlcpy(_new->nick, tempnick,NICKMAX-1);
1045 strlcpy(_new->host, params[2].c_str(),63);
1046 strlcpy(_new->dhost, params[3].c_str(),63);
1047 _new->server = this->Instance->FindServerNamePtr(source.c_str());
1048 strlcpy(_new->ident, params[4].c_str(),IDENTMAX);
1049 strlcpy(_new->fullname, params[7].c_str(),MAXGECOS);
1050 _new->registered = REG_ALL;
1053 /* we need to remove the + from the modestring, so we can do our stuff */
1054 std::string::size_type pos_after_plus = params[5].find_first_not_of('+');
1055 if (pos_after_plus != std::string::npos)
1056 params[5] = params[5].substr(pos_after_plus);
1058 for (std::string::iterator v = params[5].begin(); v != params[5].end(); v++)
1060 _new->modes[(*v)-65] = 1;
1061 /* For each mode thats set, increase counter */
1062 ModeHandler* mh = Instance->Modes->FindMode(*v, MODETYPE_USER);
1067 /* now we've done with modes processing, put the + back for remote servers */
1068 params[5] = "+" + params[5];
1070 #ifdef SUPPORT_IP6LINKS
1071 if (params[6].find_first_of(":") != std::string::npos)
1072 _new->SetSockAddr(AF_INET6, params[6].c_str(), 0);
1075 _new->SetSockAddr(AF_INET, params[6].c_str(), 0);
1077 Instance->AddGlobalClone(_new);
1079 if (!this->Instance->SilentULine(_new->server))
1080 this->Instance->SNO->WriteToSnoMask('C',"Client connecting at %s: %s!%s@%s [%s]",_new->server,_new->nick,_new->ident,_new->host, _new->GetIPString());
1082 params[7] = ":" + params[7];
1083 Utils->DoOneToAllButSender(source,"NICK", params, source);
1085 // Increment the Source Servers User Count..
1086 TreeServer* SourceServer = Utils->FindServer(source);
1089 SourceServer->AddUserCount();
1092 FOREACH_MOD_I(Instance,I_OnPostConnect,OnPostConnect(_new));
1097 /** Send one or more FJOINs for a channel of users.
1098 * If the length of a single line is more than 480-NICKMAX
1099 * in length, it is split over multiple lines.
1101 void TreeSocket::SendFJoins(TreeServer* Current, chanrec* c)
1105 std::string individual_halfops = std::string(":")+this->Instance->Config->ServerName+" FMODE "+c->name+" "+ConvToStr(c->age);
1107 size_t dlen, curlen;
1108 dlen = curlen = snprintf(list,MAXBUF,":%s FJOIN %s %lu",this->Instance->Config->ServerName,c->name,(unsigned long)c->age);
1110 char* ptr = list + dlen;
1112 CUList *ulist = c->GetUsers();
1113 std::string modes = "";
1114 std::string params = "";
1116 for (CUList::iterator i = ulist->begin(); i != ulist->end(); i++)
1118 // The first parameter gets a : before it
1119 size_t ptrlen = snprintf(ptr, MAXBUF, " %s%s,%s", !numusers ? ":" : "", c->GetAllPrefixChars(i->second), i->second->nick);
1126 if (curlen > (480-NICKMAX))
1128 buffer.append(list).append("\r\n");
1129 dlen = curlen = snprintf(list,MAXBUF,":%s FJOIN %s %lu",this->Instance->Config->ServerName,c->name,(unsigned long)c->age);
1137 buffer.append(list).append("\r\n");
1139 /* Sorry for the hax. Because newly created channels assume +nt,
1140 * if this channel doesnt have +nt, explicitly send -n and -t for the missing modes.
1142 bool inverted = false;
1143 if (!c->IsModeSet('n'))
1148 if (!c->IsModeSet('t'))
1158 buffer.append(":").append(this->Instance->Config->ServerName).append(" FMODE ").append(c->name).append(" ").append(ConvToStr(c->age)).append(" +").append(c->ChanModes(true)).append("\r\n");
1161 for (BanList::iterator b = c->bans.begin(); b != c->bans.end(); b++)
1163 int size = strlen(b->data) + 2;
1164 int currsize = linesize + size;
1165 if (currsize <= 350)
1168 params.append(" ").append(b->data);
1171 if ((params.length() >= MAXMODES) || (currsize > 350))
1173 /* Wrap at MAXMODES */
1174 buffer.append(":").append(this->Instance->Config->ServerName).append(" FMODE ").append(c->name).append(" ").append(ConvToStr(c->age)).append(" +").append(modes).append(params).append("\r\n");
1181 /* Only send these if there are any */
1183 buffer.append(":").append(this->Instance->Config->ServerName).append(" FMODE ").append(c->name).append(" ").append(ConvToStr(c->age)).append(" +").append(modes).append(params);
1185 this->WriteLine(buffer);
1188 /** Send G, Q, Z and E lines */
1189 void TreeSocket::SendXLines(TreeServer* Current)
1193 std::string n = this->Instance->Config->ServerName;
1194 const char* sn = n.c_str();
1195 /* Yes, these arent too nice looking, but they get the job done */
1196 for (std::vector<ZLine*>::iterator i = Instance->XLines->zlines.begin(); i != Instance->XLines->zlines.end(); i++)
1198 snprintf(data,MAXBUF,":%s ADDLINE Z %s %s %lu %lu :%s\r\n",sn,(*i)->ipaddr,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1199 buffer.append(data);
1201 for (std::vector<QLine*>::iterator i = Instance->XLines->qlines.begin(); i != Instance->XLines->qlines.end(); i++)
1203 snprintf(data,MAXBUF,":%s ADDLINE Q %s %s %lu %lu :%s\r\n",sn,(*i)->nick,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1204 buffer.append(data);
1206 for (std::vector<GLine*>::iterator i = Instance->XLines->glines.begin(); i != Instance->XLines->glines.end(); i++)
1208 snprintf(data,MAXBUF,":%s ADDLINE G %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1209 buffer.append(data);
1211 for (std::vector<ELine*>::iterator i = Instance->XLines->elines.begin(); i != Instance->XLines->elines.end(); i++)
1213 snprintf(data,MAXBUF,":%s ADDLINE E %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1214 buffer.append(data);
1216 for (std::vector<ZLine*>::iterator i = Instance->XLines->pzlines.begin(); i != Instance->XLines->pzlines.end(); i++)
1218 snprintf(data,MAXBUF,":%s ADDLINE Z %s %s %lu %lu :%s\r\n",sn,(*i)->ipaddr,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1219 buffer.append(data);
1221 for (std::vector<QLine*>::iterator i = Instance->XLines->pqlines.begin(); i != Instance->XLines->pqlines.end(); i++)
1223 snprintf(data,MAXBUF,":%s ADDLINE Q %s %s %lu %lu :%s\r\n",sn,(*i)->nick,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1224 buffer.append(data);
1226 for (std::vector<GLine*>::iterator i = Instance->XLines->pglines.begin(); i != Instance->XLines->pglines.end(); i++)
1228 snprintf(data,MAXBUF,":%s ADDLINE G %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1229 buffer.append(data);
1231 for (std::vector<ELine*>::iterator i = Instance->XLines->pelines.begin(); i != Instance->XLines->pelines.end(); i++)
1233 snprintf(data,MAXBUF,":%s ADDLINE E %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1234 buffer.append(data);
1237 if (!buffer.empty())
1238 this->WriteLine(buffer);
1241 /** Send channel modes and topics */
1242 void TreeSocket::SendChannelModes(TreeServer* Current)
1245 std::deque<std::string> list;
1246 std::string n = this->Instance->Config->ServerName;
1247 const char* sn = n.c_str();
1248 for (chan_hash::iterator c = this->Instance->chanlist->begin(); c != this->Instance->chanlist->end(); c++)
1250 SendFJoins(Current, c->second);
1251 if (*c->second->topic)
1253 snprintf(data,MAXBUF,":%s FTOPIC %s %lu %s :%s",sn,c->second->name,(unsigned long)c->second->topicset,c->second->setby,c->second->topic);
1254 this->WriteLine(data);
1256 FOREACH_MOD_I(this->Instance,I_OnSyncChannel,OnSyncChannel(c->second,(Module*)Utils->Creator,(void*)this));
1258 c->second->GetExtList(list);
1259 for (unsigned int j = 0; j < list.size(); j++)
1261 FOREACH_MOD_I(this->Instance,I_OnSyncChannelMetaData,OnSyncChannelMetaData(c->second,(Module*)Utils->Creator,(void*)this,list[j]));
1266 /** send all users and their oper state/modes */
1267 void TreeSocket::SendUsers(TreeServer* Current)
1270 std::deque<std::string> list;
1271 std::string dataline;
1272 for (user_hash::iterator u = this->Instance->clientlist->begin(); u != this->Instance->clientlist->end(); u++)
1274 if (u->second->registered == REG_ALL)
1276 snprintf(data,MAXBUF,":%s NICK %lu %s %s %s %s +%s %s :%s",u->second->server,(unsigned long)u->second->age,u->second->nick,u->second->host,u->second->dhost,u->second->ident,u->second->FormatModes(),u->second->GetIPString(),u->second->fullname);
1277 this->WriteLine(data);
1278 if (*u->second->oper)
1280 snprintf(data,MAXBUF,":%s OPERTYPE %s", u->second->nick, u->second->oper);
1281 this->WriteLine(data);
1283 if (*u->second->awaymsg)
1285 snprintf(data,MAXBUF,":%s AWAY :%s", u->second->nick, u->second->awaymsg);
1286 this->WriteLine(data);
1288 FOREACH_MOD_I(this->Instance,I_OnSyncUser,OnSyncUser(u->second,(Module*)Utils->Creator,(void*)this));
1290 u->second->GetExtList(list);
1292 for (unsigned int j = 0; j < list.size(); j++)
1294 FOREACH_MOD_I(this->Instance,I_OnSyncUserMetaData,OnSyncUserMetaData(u->second,(Module*)Utils->Creator,(void*)this,list[j]));
1300 /** This function is called when we want to send a netburst to a local
1301 * server. There is a set order we must do this, because for example
1302 * users require their servers to exist, and channels require their
1303 * users to exist. You get the idea.
1305 void TreeSocket::DoBurst(TreeServer* s)
1307 std::string name = s->GetName();
1308 std::string burst = "BURST "+ConvToStr(Instance->Time(true));
1309 std::string endburst = "ENDBURST";
1310 this->Instance->SNO->WriteToSnoMask('l',"Bursting to \2%s\2 (Authentication: %s).", name.c_str(), this->GetTheirChallenge().empty() ? "plaintext password" : "SHA256-HMAC challenge-response");
1311 this->WriteLine(burst);
1312 /* send our version string */
1313 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" VERSION :"+this->Instance->GetVersionString());
1314 /* Send server tree */
1315 this->SendServers(Utils->TreeRoot,s,1);
1316 /* Send users and their oper status */
1318 /* Send everything else (channel modes, xlines etc) */
1319 this->SendChannelModes(s);
1320 this->SendXLines(s);
1321 FOREACH_MOD_I(this->Instance,I_OnSyncOtherMetaData,OnSyncOtherMetaData((Module*)Utils->Creator,(void*)this));
1322 this->WriteLine(endburst);
1323 this->Instance->SNO->WriteToSnoMask('l',"Finished bursting to \2"+name+"\2.");
1326 /** This function is called when we receive data from a remote
1327 * server. We buffer the data in a std::string (it doesnt stay
1328 * there for long), reading using InspSocket::Read() which can
1329 * read up to 16 kilobytes in one operation.
1331 * IF THIS FUNCTION RETURNS FALSE, THE CORE CLOSES AND DELETES
1332 * THE SOCKET OBJECT FOR US.
1334 bool TreeSocket::OnDataReady()
1336 char* data = this->Read();
1337 /* Check that the data read is a valid pointer and it has some content */
1340 this->in_buffer.append(data);
1341 /* While there is at least one new line in the buffer,
1342 * do something useful (we hope!) with it.
1344 while (in_buffer.find("\n") != std::string::npos)
1346 std::string ret = in_buffer.substr(0,in_buffer.find("\n")-1);
1347 in_buffer = in_buffer.substr(in_buffer.find("\n")+1,in_buffer.length()-in_buffer.find("\n"));
1348 /* Use rfind here not find, as theres more
1349 * chance of the \r being near the end of the
1350 * string, not the start.
1352 if (ret.find("\r") != std::string::npos)
1353 ret = in_buffer.substr(0,in_buffer.find("\r")-1);
1354 /* Process this one, abort if it
1355 * didnt return true.
1357 if (!this->ProcessLine(ret))
1364 /* EAGAIN returns an empty but non-NULL string, so this
1365 * evaluates to TRUE for EAGAIN but to FALSE for EOF.
1367 return (data && !*data);