1 /* +------------------------------------+
2 * | Inspire Internet Relay Chat Daemon |
3 * +------------------------------------+
5 * InspIRCd: (C) 2002-2007 InspIRCd Development Team
6 * See: http://www.inspircd.org/wiki/index.php/Credits
8 * This program is free but copyrighted software; see
9 * the file COPYING for details.
11 * ---------------------------------------------------
14 #include "configreader.h"
18 #include "commands/cmd_whois.h"
19 #include "commands/cmd_stats.h"
24 #include "transport.h"
26 #include "socketengine.h"
28 #include "m_spanningtree/main.h"
29 #include "m_spanningtree/utils.h"
30 #include "m_spanningtree/treeserver.h"
31 #include "m_spanningtree/link.h"
32 #include "m_spanningtree/treesocket.h"
33 #include "m_spanningtree/resolvers.h"
34 #include "m_spanningtree/handshaketimer.h"
36 /* $ModDep: m_spanningtree/timesynctimer.h m_spanningtree/resolvers.h m_spanningtree/main.h m_spanningtree/utils.h m_spanningtree/treeserver.h m_spanningtree/link.h m_spanningtree/treesocket.h m_hash.h */
39 /** Because most of the I/O gubbins are encapsulated within
40 * InspSocket, we just call the superclass constructor for
41 * most of the action, and append a few of our own values
44 TreeSocket::TreeSocket(SpanningTreeUtilities* Util, InspIRCd* SI, std::string host, int port, bool listening, unsigned long maxtime, Module* HookMod)
45 : InspSocket(SI, host, port, listening, maxtime), Utils(Util), Hook(HookMod)
48 this->LinkState = LISTENER;
49 theirchallenge = ourchallenge = "";
50 if (listening && Hook)
51 InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();
54 TreeSocket::TreeSocket(SpanningTreeUtilities* Util, InspIRCd* SI, std::string host, int port, bool listening, unsigned long maxtime, const std::string &ServerName, const std::string &bindto, Module* HookMod)
55 : InspSocket(SI, host, port, listening, maxtime, bindto), Utils(Util), Hook(HookMod)
58 theirchallenge = ourchallenge = "";
59 this->LinkState = CONNECTING;
61 InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();
64 /** When a listening socket gives us a new file descriptor,
65 * we must associate it with a socket without creating a new
66 * connection. This constructor is used for this purpose.
68 TreeSocket::TreeSocket(SpanningTreeUtilities* Util, InspIRCd* SI, int newfd, char* ip, Module* HookMod)
69 : InspSocket(SI, newfd, ip), Utils(Util), Hook(HookMod)
71 this->LinkState = WAIT_AUTH_1;
72 theirchallenge = ourchallenge = "";
73 /* If we have a transport module hooked to the parent, hook the same module to this
74 * socket, and set a timer waiting for handshake before we send CAPAB etc.
77 InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();
79 Instance->Timers->AddTimer(new HandshakeTimer(Instance, this, &(Utils->LinkBlocks[0]), this->Utils, 1));
82 ServerState TreeSocket::GetLinkState()
84 return this->LinkState;
87 Module* TreeSocket::GetHook()
92 TreeSocket::~TreeSocket()
95 InspSocketUnhookRequest(this, (Module*)Utils->Creator, Hook).Send();
97 Utils->DelBurstingServer(this);
100 const std::string& TreeSocket::GetOurChallenge()
102 return this->ourchallenge;
105 void TreeSocket::SetOurChallenge(const std::string &c)
107 this->ourchallenge = c;
110 const std::string& TreeSocket::GetTheirChallenge()
112 return this->theirchallenge;
115 void TreeSocket::SetTheirChallenge(const std::string &c)
117 this->theirchallenge = c;
120 std::string TreeSocket::MakePass(const std::string &password, const std::string &challenge)
122 /* This is a simple (maybe a bit hacky?) HMAC algorithm, thanks to jilles for
123 * suggesting the use of HMAC to secure the password against various attacks.
125 * Note: If m_sha256.so is not loaded, we MUST fall back to plaintext with no
126 * HMAC challenge/response.
128 Module* sha256 = Instance->FindModule("m_sha256.so");
129 if (Utils->ChallengeResponse && sha256 && !challenge.empty())
131 /* XXX: This is how HMAC is supposed to be done:
133 * sha256( (pass xor 0x5c) + sha256((pass xor 0x36) + m) )
135 * Note that we are encoding the hex hash, not the binary
136 * output of the hash which is slightly different to standard.
138 * Don't ask me why its always 0x5c and 0x36... it just is.
140 std::string hmac1, hmac2;
142 for (size_t n = 0; n < password.length(); n++)
144 hmac1 += static_cast<char>(password[n] ^ 0x5C);
145 hmac2 += static_cast<char>(password[n] ^ 0x36);
149 HashResetRequest(Utils->Creator, sha256).Send();
150 hmac2 = HashSumRequest(Utils->Creator, sha256, hmac2).Send();
152 HashResetRequest(Utils->Creator, sha256).Send();
153 std::string hmac = hmac1 + hmac2;
154 hmac = HashSumRequest(Utils->Creator, sha256, hmac).Send();
156 return "HMAC-SHA256:"+ hmac;
158 else if (!challenge.empty() && !sha256)
159 Instance->Log(DEFAULT,"Not authenticating to server using SHA256/HMAC because we don't have m_sha256 loaded!");
164 /** When an outbound connection finishes connecting, we receive
165 * this event, and must send our SERVER string to the other
166 * side. If the other side is happy, as outlined in the server
167 * to server docs on the inspircd.org site, the other side
168 * will then send back its own server string.
170 bool TreeSocket::OnConnected()
172 if (this->LinkState == CONNECTING)
174 /* we do not need to change state here. */
175 for (std::vector<Link>::iterator x = Utils->LinkBlocks.begin(); x < Utils->LinkBlocks.end(); x++)
177 if (x->Name == this->myhost)
179 this->Instance->SNO->WriteToSnoMask('l',"Connection to \2"+myhost+"\2["+(x->HiddenFromStats ? "<hidden>" : this->GetIP())+"] started.");
182 InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();
183 this->Instance->SNO->WriteToSnoMask('l',"Connection to \2"+myhost+"\2["+(x->HiddenFromStats ? "<hidden>" : this->GetIP())+"] using transport \2"+x->Hook+"\2");
185 this->OutboundPass = x->SendPass;
187 /* found who we're supposed to be connecting to, send the neccessary gubbins. */
189 Instance->Timers->AddTimer(new HandshakeTimer(Instance, this, &(*x), this->Utils, 1));
191 this->SendCapabilities();
197 /* There is a (remote) chance that between the /CONNECT and the connection
198 * being accepted, some muppet has removed the <link> block and rehashed.
199 * If that happens the connection hangs here until it's closed. Unlikely
200 * and rather harmless.
202 this->Instance->SNO->WriteToSnoMask('l',"Connection to \2"+myhost+"\2 lost link tag(!)");
206 void TreeSocket::OnError(InspSocketError e)
208 /* We don't handle this method, because all our
209 * dirty work is done in OnClose() (see below)
210 * which is still called on error conditions too.
212 if (e == I_ERR_CONNECT)
214 this->Instance->SNO->WriteToSnoMask('l',"Connection failed: Connection to \002"+myhost+"\002 refused");
215 Link* MyLink = Utils->FindLink(myhost);
217 Utils->DoFailOver(MyLink);
221 int TreeSocket::OnDisconnect()
223 /* For the same reason as above, we don't
224 * handle OnDisconnect()
229 /** Recursively send the server tree with distances as hops.
230 * This is used during network burst to inform the other server
231 * (and any of ITS servers too) of what servers we know about.
232 * If at any point any of these servers already exist on the other
233 * end, our connection may be terminated. The hopcounts given
234 * by this function are relative, this doesn't matter so long as
235 * they are all >1, as all the remote servers re-calculate them
236 * to be relative too, with themselves as hop 0.
238 void TreeSocket::SendServers(TreeServer* Current, TreeServer* s, int hops)
241 for (unsigned int q = 0; q < Current->ChildCount(); q++)
243 TreeServer* recursive_server = Current->GetChild(q);
244 if (recursive_server != s)
246 snprintf(command,1024,":%s SERVER %s * %d :%s",Current->GetName().c_str(),recursive_server->GetName().c_str(),hops,recursive_server->GetDesc().c_str());
247 this->WriteLine(command);
248 this->WriteLine(":"+recursive_server->GetName()+" VERSION :"+recursive_server->GetVersion());
249 /* down to next level */
250 this->SendServers(recursive_server, s, hops+1);
255 std::string TreeSocket::MyCapabilities()
257 std::vector<std::string> modlist;
258 std::string capabilities = "";
259 for (int i = 0; i <= this->Instance->GetModuleCount(); i++)
261 if (this->Instance->modules[i]->GetVersion().Flags & VF_COMMON)
262 modlist.push_back(this->Instance->Config->module_names[i]);
264 sort(modlist.begin(),modlist.end());
265 for (unsigned int i = 0; i < modlist.size(); i++)
268 capabilities = capabilities + ",";
269 capabilities = capabilities + modlist[i];
274 std::string TreeSocket::RandString(unsigned int length)
276 char* randombuf = new char[length+1];
278 int fd = open("/dev/urandom", O_RDONLY, 0);
282 read(fd, randombuf, length);
287 for (unsigned int i = 0; i < length; i++)
288 randombuf[i] = rand();
291 for (unsigned int i = 0; i < length; i++)
293 char randchar = static_cast<char>((randombuf[i] & 0x7F) | 0x21);
294 out += (randchar == '=' ? '_' : randchar);
301 void TreeSocket::SendCapabilities()
303 irc::commasepstream modulelist(MyCapabilities());
304 this->WriteLine("CAPAB START");
306 /* Send module names, split at 509 length */
307 std::string item = "*";
308 std::string line = "CAPAB MODULES ";
309 while ((item = modulelist.GetToken()) != "")
311 if (line.length() + item.length() + 1 > 509)
313 this->WriteLine(line);
314 line = "CAPAB MODULES ";
317 if (line != "CAPAB MODULES ")
322 if (line != "CAPAB MODULES ")
323 this->WriteLine(line);
330 #ifdef SUPPORT_IP6LINKS
334 /* Do we have sha256 available? If so, we send a challenge */
335 if (Utils->ChallengeResponse && (Instance->FindModule("m_sha256.so")))
337 this->SetOurChallenge(RandString(20));
338 extra = " CHALLENGE=" + this->GetOurChallenge();
341 this->WriteLine("CAPAB CAPABILITIES :NICKMAX="+ConvToStr(NICKMAX)+" HALFOP="+ConvToStr(this->Instance->Config->AllowHalfop)+" CHANMAX="+ConvToStr(CHANMAX)+" MAXMODES="+ConvToStr(MAXMODES)+" IDENTMAX="+ConvToStr(IDENTMAX)+" MAXQUIT="+ConvToStr(MAXQUIT)+" MAXTOPIC="+ConvToStr(MAXTOPIC)+" MAXKICK="+ConvToStr(MAXKICK)+" MAXGECOS="+ConvToStr(MAXGECOS)+" MAXAWAY="+ConvToStr(MAXAWAY)+" IP6NATIVE="+ConvToStr(ip6)+" IP6SUPPORT="+ConvToStr(ip6support)+" PROTOCOL="+ConvToStr(ProtocolVersion)+extra);
343 this->WriteLine("CAPAB END");
346 /* Check a comma seperated list for an item */
347 bool TreeSocket::HasItem(const std::string &list, const std::string &item)
349 irc::commasepstream seplist(list);
350 std::string item2 = "*";
351 while ((item2 = seplist.GetToken()) != "")
359 /* Isolate and return the elements that are different between two comma seperated lists */
360 std::string TreeSocket::ListDifference(const std::string &one, const std::string &two)
362 irc::commasepstream list_one(one);
363 std::string item = "*";
364 std::string result = "";
365 while ((item = list_one.GetToken()) != "")
367 if (!HasItem(two, item))
376 bool TreeSocket::Capab(const std::deque<std::string> ¶ms)
378 if (params.size() < 1)
380 this->WriteLine("ERROR :Invalid number of parameters for CAPAB - Mismatched version");
383 if (params[0] == "START")
385 this->ModuleList = "";
386 this->CapKeys.clear();
388 else if (params[0] == "END")
390 std::string reason = "";
392 #ifdef SUPPORT_IP6LINKS
395 /* Compare ModuleList and check CapKeys...
396 * Maybe this could be tidier? -- Brain
398 if ((this->ModuleList != this->MyCapabilities()) && (this->ModuleList.length()))
400 std::string diff = ListDifference(this->ModuleList, this->MyCapabilities());
403 diff = "your server:" + ListDifference(this->MyCapabilities(), this->ModuleList);
407 diff = "this server:" + diff;
409 if (diff.length() == 12)
410 reason = "Module list in CAPAB is not alphabetically ordered, cannot compare lists.";
412 reason = "Modules loaded on these servers are not correctly matched, these modules are not loaded on " + diff;
414 if (((this->CapKeys.find("IP6SUPPORT") == this->CapKeys.end()) && (ip6support)) || ((this->CapKeys.find("IP6SUPPORT") != this->CapKeys.end()) && (this->CapKeys.find("IP6SUPPORT")->second != ConvToStr(ip6support))))
415 reason = "We don't both support linking to IPV6 servers";
416 if (((this->CapKeys.find("IP6NATIVE") != this->CapKeys.end()) && (this->CapKeys.find("IP6NATIVE")->second == "1")) && (!ip6support))
417 reason = "The remote server is IPV6 native, and we don't support linking to IPV6 servers";
418 if (((this->CapKeys.find("NICKMAX") == this->CapKeys.end()) || ((this->CapKeys.find("NICKMAX") != this->CapKeys.end()) && (this->CapKeys.find("NICKMAX")->second != ConvToStr(NICKMAX)))))
419 reason = "Maximum nickname lengths differ or remote nickname length not specified";
420 if (((this->CapKeys.find("PROTOCOL") == this->CapKeys.end()) || ((this->CapKeys.find("PROTOCOL") != this->CapKeys.end()) && (this->CapKeys.find("PROTOCOL")->second != ConvToStr(ProtocolVersion)))))
422 if (this->CapKeys.find("PROTOCOL") != this->CapKeys.end())
424 reason = "Mismatched protocol versions "+this->CapKeys.find("PROTOCOL")->second+" and "+ConvToStr(ProtocolVersion);
428 reason = "Protocol version not specified";
431 if (((this->CapKeys.find("HALFOP") == this->CapKeys.end()) && (Instance->Config->AllowHalfop)) || ((this->CapKeys.find("HALFOP") != this->CapKeys.end()) && (this->CapKeys.find("HALFOP")->second != ConvToStr(Instance->Config->AllowHalfop))))
432 reason = "We don't both have halfop support enabled/disabled identically";
433 if (((this->CapKeys.find("IDENTMAX") == this->CapKeys.end()) || ((this->CapKeys.find("IDENTMAX") != this->CapKeys.end()) && (this->CapKeys.find("IDENTMAX")->second != ConvToStr(IDENTMAX)))))
434 reason = "Maximum ident lengths differ or remote ident length not specified";
435 if (((this->CapKeys.find("CHANMAX") == this->CapKeys.end()) || ((this->CapKeys.find("CHANMAX") != this->CapKeys.end()) && (this->CapKeys.find("CHANMAX")->second != ConvToStr(CHANMAX)))))
436 reason = "Maximum channel lengths differ or remote channel length not specified";
437 if (((this->CapKeys.find("MAXMODES") == this->CapKeys.end()) || ((this->CapKeys.find("MAXMODES") != this->CapKeys.end()) && (this->CapKeys.find("MAXMODES")->second != ConvToStr(MAXMODES)))))
438 reason = "Maximum modes per line differ or remote modes per line not specified";
439 if (((this->CapKeys.find("MAXQUIT") == this->CapKeys.end()) || ((this->CapKeys.find("MAXQUIT") != this->CapKeys.end()) && (this->CapKeys.find("MAXQUIT")->second != ConvToStr(MAXQUIT)))))
440 reason = "Maximum quit lengths differ or remote quit length not specified";
441 if (((this->CapKeys.find("MAXTOPIC") == this->CapKeys.end()) || ((this->CapKeys.find("MAXTOPIC") != this->CapKeys.end()) && (this->CapKeys.find("MAXTOPIC")->second != ConvToStr(MAXTOPIC)))))
442 reason = "Maximum topic lengths differ or remote topic length not specified";
443 if (((this->CapKeys.find("MAXKICK") == this->CapKeys.end()) || ((this->CapKeys.find("MAXKICK") != this->CapKeys.end()) && (this->CapKeys.find("MAXKICK")->second != ConvToStr(MAXKICK)))))
444 reason = "Maximum kick lengths differ or remote kick length not specified";
445 if (((this->CapKeys.find("MAXGECOS") == this->CapKeys.end()) || ((this->CapKeys.find("MAXGECOS") != this->CapKeys.end()) && (this->CapKeys.find("MAXGECOS")->second != ConvToStr(MAXGECOS)))))
446 reason = "Maximum GECOS (fullname) lengths differ or remote GECOS length not specified";
447 if (((this->CapKeys.find("MAXAWAY") == this->CapKeys.end()) || ((this->CapKeys.find("MAXAWAY") != this->CapKeys.end()) && (this->CapKeys.find("MAXAWAY")->second != ConvToStr(MAXAWAY)))))
448 reason = "Maximum awaymessage lengths differ or remote awaymessage length not specified";
450 /* Challenge response, store their challenge for our password */
451 std::map<std::string,std::string>::iterator n = this->CapKeys.find("CHALLENGE");
452 if (Utils->ChallengeResponse && (n != this->CapKeys.end()) && (Instance->FindModule("m_sha256.so")))
454 /* Challenge-response is on now */
455 this->SetTheirChallenge(n->second);
456 if (!this->GetTheirChallenge().empty() && (this->LinkState == CONNECTING))
458 this->WriteLine(std::string("SERVER ")+this->Instance->Config->ServerName+" "+this->MakePass(OutboundPass, this->GetTheirChallenge())+" 0 :"+this->Instance->Config->ServerDesc);
463 /* They didnt specify a challenge or we don't have m_sha256.so, we use plaintext */
464 if (this->LinkState == CONNECTING)
465 this->WriteLine(std::string("SERVER ")+this->Instance->Config->ServerName+" "+OutboundPass+" 0 :"+this->Instance->Config->ServerDesc);
470 this->WriteLine("ERROR :CAPAB negotiation failed: "+reason);
474 else if ((params[0] == "MODULES") && (params.size() == 2))
476 if (!this->ModuleList.length())
478 this->ModuleList.append(params[1]);
482 this->ModuleList.append(",");
483 this->ModuleList.append(params[1]);
487 else if ((params[0] == "CAPABILITIES") && (params.size() == 2))
489 irc::tokenstream capabs(params[1]);
492 while ((more = capabs.GetToken(item)))
494 /* Process each key/value pair */
495 std::string::size_type equals = item.rfind('=');
496 if (equals != std::string::npos)
498 std::string var = item.substr(0, equals);
499 std::string value = item.substr(equals+1, item.length());
500 CapKeys[var] = value;
507 /** This function forces this server to quit, removing this server
508 * and any users on it (and servers and users below that, etc etc).
509 * It's very slow and pretty clunky, but luckily unless your network
510 * is having a REAL bad hair day, this function shouldnt be called
511 * too many times a month ;-)
513 void TreeSocket::SquitServer(std::string &from, TreeServer* Current)
515 /* recursively squit the servers attached to 'Current'.
516 * We're going backwards so we don't remove users
517 * while we still need them ;)
519 for (unsigned int q = 0; q < Current->ChildCount(); q++)
521 TreeServer* recursive_server = Current->GetChild(q);
522 this->SquitServer(from,recursive_server);
524 /* Now we've whacked the kids, whack self */
526 num_lost_users += Current->QuitUsers(from);
529 /** This is a wrapper function for SquitServer above, which
530 * does some validation first and passes on the SQUIT to all
531 * other remaining servers.
533 void TreeSocket::Squit(TreeServer* Current, const std::string &reason)
535 if ((Current) && (Current != Utils->TreeRoot))
537 Event rmode((char*)Current->GetName().c_str(), (Module*)Utils->Creator, "lost_server");
538 rmode.Send(Instance);
540 std::deque<std::string> params;
541 params.push_back(Current->GetName());
542 params.push_back(":"+reason);
543 Utils->DoOneToAllButSender(Current->GetParent()->GetName(),"SQUIT",params,Current->GetName());
544 if (Current->GetParent() == Utils->TreeRoot)
546 this->Instance->WriteOpers("Server \002"+Current->GetName()+"\002 split: "+reason);
550 this->Instance->WriteOpers("Server \002"+Current->GetName()+"\002 split from server \002"+Current->GetParent()->GetName()+"\002 with reason: "+reason);
552 num_lost_servers = 0;
554 std::string from = Current->GetParent()->GetName()+" "+Current->GetName();
555 SquitServer(from, Current);
557 Current->GetParent()->DelChild(Current);
559 this->Instance->WriteOpers("Netsplit complete, lost \002%d\002 users on \002%d\002 servers.", num_lost_users, num_lost_servers);
563 Instance->Log(DEFAULT,"Squit from unknown server");
567 /** FMODE command - server mode with timestamp checks */
568 bool TreeSocket::ForceMode(const std::string &source, std::deque<std::string> ¶ms)
570 /* Chances are this is a 1.0 FMODE without TS */
571 if (params.size() < 3)
573 /* No modes were in the command, probably a channel with no modes set on it */
578 std::string sourceserv;
579 /* Are we dealing with an FMODE from a user, or from a server? */
580 userrec* who = this->Instance->FindNick(source);
583 /* FMODE from a user, set sourceserv to the users server name */
584 sourceserv = who->server;
588 /* FMODE from a server, create a fake user to receive mode feedback */
589 who = new userrec(this->Instance);
590 who->SetFd(FD_MAGIC_NUMBER);
591 smode = true; /* Setting this flag tells us we should free the userrec later */
592 sourceserv = source; /* Set sourceserv to the actual source string */
594 const char* modelist[64];
597 memset(&modelist,0,sizeof(modelist));
598 for (unsigned int q = 0; (q < params.size()) && (q < 64); q++)
602 /* The timestamp is in this position.
603 * We don't want to pass that up to the
604 * server->client protocol!
606 TS = atoi(params[q].c_str());
610 /* Everything else is fine to append to the modelist */
611 modelist[n++] = params[q].c_str();
615 /* Extract the TS value of the object, either userrec or chanrec */
616 userrec* dst = this->Instance->FindNick(params[0]);
617 chanrec* chan = NULL;
625 chan = this->Instance->FindChan(params[0]);
631 /* Oops, channel doesnt exist! */
635 /* TS is equal or less: Merge the mode changes into ours and pass on.
641 this->Instance->SendMode(modelist, n, who);
645 this->Instance->CallCommandHandler("MODE", modelist, n, who);
647 /* HOT POTATO! PASS IT ON! */
648 Utils->DoOneToAllButSender(source,"FMODE",params,sourceserv);
650 /* If the TS is greater than ours, we drop the mode and dont pass it anywhere.
659 /** FTOPIC command */
660 bool TreeSocket::ForceTopic(const std::string &source, std::deque<std::string> ¶ms)
662 if (params.size() != 4)
664 time_t ts = atoi(params[1].c_str());
665 std::string nsource = source;
666 chanrec* c = this->Instance->FindChan(params[0]);
669 if ((ts >= c->topicset) || (!*c->topic))
671 std::string oldtopic = c->topic;
672 strlcpy(c->topic,params[3].c_str(),MAXTOPIC);
673 strlcpy(c->setby,params[2].c_str(),127);
675 /* if the topic text is the same as the current topic,
676 * dont bother to send the TOPIC command out, just silently
677 * update the set time and set nick.
679 if (oldtopic != params[3])
681 userrec* user = this->Instance->FindNick(source);
684 c->WriteChannelWithServ(source.c_str(), "TOPIC %s :%s", c->name, c->topic);
688 c->WriteChannel(user, "TOPIC %s :%s", c->name, c->topic);
689 nsource = user->server;
691 /* all done, send it on its way */
692 params[3] = ":" + params[3];
693 Utils->DoOneToAllButSender(source,"FTOPIC",params,nsource);
701 /** FJOIN, similar to TS6 SJOIN, but not quite. */
702 bool TreeSocket::ForceJoin(const std::string &source, std::deque<std::string> ¶ms)
704 /* 1.1 FJOIN works as follows:
706 * Each FJOIN is sent along with a timestamp, and the side with the lowest
707 * timestamp 'wins'. From this point on we will refer to this side as the
708 * winner. The side with the higher timestamp loses, from this point on we
709 * will call this side the loser or losing side. This should be familiar to
710 * anyone who's dealt with dreamforge or TS6 before.
712 * When two sides of a split heal and this occurs, the following things
715 * If the timestamps are exactly equal, both sides merge their privilages
716 * and users, as in InspIRCd 1.0 and ircd2.8. The channels have not been
717 * re-created during a split, this is safe to do.
720 * If the timestamps are NOT equal, the losing side removes all privilage
721 * modes from all of its users that currently exist in the channel, before
722 * introducing new users into the channel which are listed in the FJOIN
723 * command's parameters. This means, all modes +ohv, and privilages added
724 * by modules, such as +qa. The losing side then LOWERS its timestamp value
725 * of the channel to match that of the winning side, and the modes of the
726 * users of the winning side are merged in with the losing side. The loser
727 * then sends out a set of FMODE commands which 'confirm' that it just
728 * removed all privilage modes from its existing users, which allows for
729 * services packages to still work correctly without needing to know the
730 * timestamping rules which InspIRCd follows. In TS6 servers this is always
731 * a problem, and services packages must contain code which explicitly
732 * behaves as TS6 does, removing ops from the losing side of a split where
733 * neccessary within its internal records, as this state information is
734 * not explicitly echoed out in that protocol.
736 * The winning side on the other hand will ignore all user modes from the
737 * losing side, so only its own modes get applied. Life is simple for those
738 * who succeed at internets. :-)
740 * NOTE: Unlike TS6 and dreamforge and other protocols which have SJOIN,
741 * FJOIN does not contain the simple-modes such as +iklmnsp. Why not,
742 * you ask? Well, quite simply because we don't need to. They'll be sent
743 * after the FJOIN by FMODE, and FMODE is timestamped, so in the event
744 * the losing side sends any modes for the channel which shouldnt win,
745 * they wont as their timestamp will be too high :-)
748 if (params.size() < 3)
751 char first[MAXBUF]; /* The first parameter of the mode command */
752 char modestring[MAXBUF]; /* The mode sequence (2nd parameter) of the mode command */
753 char* mode_users[127]; /* The values used by the mode command */
754 memset(&mode_users,0,sizeof(mode_users)); /* Initialize mode parameters */
755 mode_users[0] = first; /* Set this up to be our on-stack value */
756 mode_users[1] = modestring; /* Same here as above */
757 strcpy(modestring,"+"); /* Initialize the mode sequence to just '+' */
758 unsigned int modectr = 2; /* Pointer to the third mode parameter (e.g. the one after the +-sequence) */
760 userrec* who = NULL; /* User we are currently checking */
761 std::string channel = params[0]; /* Channel name, as a string */
762 time_t TS = atoi(params[1].c_str()); /* Timestamp given to us for remote side */
763 std::string nicklist = params[2];
764 bool created = false;
766 /* Try and find the channel */
767 chanrec* chan = this->Instance->FindChan(channel);
769 /* Initialize channel name in the mode parameters */
770 strlcpy(mode_users[0],channel.c_str(),MAXBUF);
772 /* default TS is a high value, which if we dont have this
773 * channel will let the other side apply their modes.
775 time_t ourTS = Instance->Time(true)+600;
776 /* Does this channel exist? if it does, get its REAL timestamp */
780 created = true; /* don't perform deops, and set TS to correct time after processing. */
782 /* do this first, so our mode reversals are correctly received by other servers
783 * if there is a TS collision.
785 params[2] = ":" + params[2];
786 Utils->DoOneToAllButSender(source,"FJOIN",params,source);
788 /* In 1.1, if they have the newer channel, we immediately clear
789 * all status modes from our users. We then accept their modes.
790 * If WE have the newer channel its the other side's job to do this.
791 * Note that this causes the losing server to send out confirming
796 std::deque<std::string> param_list;
797 /* Lower the TS here */
798 if (Utils->AnnounceTSChange && chan)
799 chan->WriteChannelWithServ(Instance->Config->ServerName,
800 "NOTICE %s :TS for %s changed from %lu to %lu", chan->name, chan->name, ourTS, TS);
802 /* Zap all the privilage modes on our side, if the channel exists here */
805 param_list.push_back(channel);
808 this->RemoveStatus(Instance->Config->ServerName, param_list);
811 /* Put the final parameter of the FJOIN into a tokenstream ready to split it */
812 irc::tokenstream users(nicklist);
815 /* Now, process every 'prefixes,nick' pair */
816 while (users.GetToken(item))
819 const char* usr = item.c_str();
820 /* Safety check just to make sure someones not sent us an FJOIN full of spaces
821 * (is this even possible?) */
824 const char* permissions = usr;
826 char* nm = new char[MAXBUF];
828 /* Iterate through all the prefix values, convert them from prefixes
829 * to mode letters, and append them to the mode sequence
831 while ((*permissions) && (*permissions != ',') && (ntimes < MAXBUF))
833 ModeHandler* mh = Instance->Modes->FindPrefix(*permissions);
836 /* This is a valid prefix */
838 *tnm++ = mh->GetModeChar();
842 /* Not a valid prefix...
843 * danger bill bobbertson! (that's will robinsons older brother ;-) ...)
845 this->Instance->WriteOpers("ERROR: We received a user with an unknown prefix '%c'. Closed connection to avoid a desync.",*permissions);
846 this->WriteLine(std::string("ERROR :Invalid prefix '")+(*permissions)+"' in FJOIN");
852 /* Null terminate modes */
854 /* Advance past the comma, to the nick */
856 /* Check the user actually exists */
857 who = this->Instance->FindNick(usr);
860 /* Check that the user's 'direction' is correct
861 * based on the server sending the FJOIN. We must
862 * check each nickname in turn, because the origin of
863 * the FJOIN may be different to the origin of the nicks
864 * in the command itself.
866 TreeServer* route_back_again = Utils->BestRouteTo(who->server);
867 if ((!route_back_again) || (route_back_again->GetSocket() != this))
869 /* Oh dear oh dear. */
874 /* NOTE: Moved this below the fake direction check, so that modes
875 * arent put into the mode list for users that were collided, and
876 * may reconnect from the other side or our side before the split
880 /* Did they get any modes? How many times? */
881 strlcat(modestring, nm, MAXBUF);
882 for (int k = 0; k < ntimes; k++)
883 mode_users[modectr++] = strdup(usr);
884 /* Free temporary buffer used for mode sequence */
887 /* Finally, we can actually place the user into the channel.
888 * We're sure its right. Final answer, phone a friend.
891 chanrec::JoinUser(this->Instance, who, channel.c_str(), true, "", TS);
893 chanrec::JoinUser(this->Instance, who, channel.c_str(), true, "");
894 /* Have we already queued up MAXMODES modes with parameters
895 * (+qaohv) ready to be sent to the server?
897 if (modectr >= (MAXMODES-1))
899 /* Only actually give the users any status if we lost
900 * the FJOIN or drew (equal timestamps).
901 * It isn't actually possible for ourTS to be > TS here,
902 * only possible to actually have ourTS == TS, or
903 * ourTS < TS, because if we lost, we already lowered
904 * our TS above before we entered this loop. We only
905 * check >= as a safety measure, in case someone stuffed
906 * up. If someone DID stuff up, it was most likely me.
907 * Note: I do not like baseball bats in the face...
911 this->Instance->SendMode((const char**)mode_users,modectr,who);
913 /* Something stuffed up, and for some reason, the timestamp is
914 * NOT lowered right now and should be. Lower it. Usually this
915 * code won't be executed, doubtless someone will remove it some
920 Instance->Log(DEFAULT,"Channel TS for %s changed from %lu to %lu",chan->name,ourTS,TS);
926 /* Reset all this back to defaults, and
927 * free any ram we have left allocated.
929 strcpy(mode_users[1],"+");
930 for (unsigned int f = 2; f < modectr; f++)
937 /* Remember to free this */
939 /* If we got here, there's a nick in FJOIN which doesnt exist on this server.
940 * We don't try to process the nickname here (that WOULD cause a segfault because
941 * we'd be playing with null pointers) however, we DO pass the nickname on, just
942 * in case somehow we're desynched, so that other users which might be able to see
943 * the nickname get their fair chance to process it.
945 Instance->Log(SPARSE,"Warning! Invalid user %s in FJOIN to channel %s IGNORED", usr, channel.c_str());
951 /* there werent enough modes built up to flush it during FJOIN,
952 * or, there are a number left over. flush them out.
954 if ((modectr > 2) && (who) && (chan))
958 /* Our channel is newer than theirs. Evil deeds must be afoot. */
959 this->Instance->SendMode((const char**)mode_users,modectr,who);
960 /* Yet again, we can't actually get a true value here, if everything else
961 * is working as it should.
965 Instance->Log(DEFAULT,"Channel TS for %s changed from %lu to %lu",chan->name,ourTS,TS);
971 /* Free anything we have left to free */
972 for (unsigned int f = 2; f < modectr; f++)
975 /* All done. That wasnt so bad was it, you can wipe
976 * the sweat from your forehead now. :-)
982 bool TreeSocket::IntroduceClient(const std::string &source, std::deque<std::string> ¶ms)
984 /** Do we have enough parameters:
985 * NICK age nick host dhost ident +modes ip :gecos
987 if (params.size() != 8)
989 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction ("+params[1]+"?)");
993 time_t age = atoi(params[0].c_str());
994 const char* tempnick = params[1].c_str();
996 /** Check parameters for validity before introducing the client, discovered by dmb.
997 * XXX: Can we make this neater?
1001 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction (Invalid TS?)");
1004 else if (params[1].length() > NICKMAX)
1006 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction ("+params[1]+" > NICKMAX?)");
1009 else if (params[2].length() > 64)
1011 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction ("+params[2]+" > 64?)");
1014 else if (params[3].length() > 64)
1016 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction ("+params[3]+" > 64?)");
1019 else if (params[4].length() > IDENTMAX)
1021 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction ("+params[4]+" > IDENTMAX?)");
1024 else if (params[7].length() > MAXGECOS)
1026 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction ("+params[7]+" > MAXGECOS?)");
1030 /** Our client looks ok, lets introduce it now
1032 Instance->Log(DEBUG,"New remote client %s",tempnick);
1033 user_hash::iterator iter = this->Instance->clientlist->find(tempnick);
1035 if (iter != this->Instance->clientlist->end())
1037 /* nick collision */
1038 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+tempnick+" :Nickname collision");
1039 userrec::QuitUser(this->Instance, iter->second, "Nickname collision");
1043 userrec* _new = new userrec(this->Instance);
1044 (*(this->Instance->clientlist))[tempnick] = _new;
1045 _new->SetFd(FD_MAGIC_NUMBER);
1046 strlcpy(_new->nick, tempnick,NICKMAX-1);
1047 strlcpy(_new->host, params[2].c_str(),63);
1048 strlcpy(_new->dhost, params[3].c_str(),63);
1049 _new->server = this->Instance->FindServerNamePtr(source.c_str());
1050 strlcpy(_new->ident, params[4].c_str(),IDENTMAX);
1051 strlcpy(_new->fullname, params[7].c_str(),MAXGECOS);
1052 _new->registered = REG_ALL;
1055 /* we need to remove the + from the modestring, so we can do our stuff */
1056 std::string::size_type pos_after_plus = params[5].find_first_not_of('+');
1057 if (pos_after_plus != std::string::npos)
1058 params[5] = params[5].substr(pos_after_plus);
1060 for (std::string::iterator v = params[5].begin(); v != params[5].end(); v++)
1062 _new->modes[(*v)-65] = 1;
1063 /* For each mode thats set, increase counter */
1064 ModeHandler* mh = Instance->Modes->FindMode(*v, MODETYPE_USER);
1069 /* now we've done with modes processing, put the + back for remote servers */
1070 params[5] = "+" + params[5];
1072 #ifdef SUPPORT_IP6LINKS
1073 if (params[6].find_first_of(":") != std::string::npos)
1074 _new->SetSockAddr(AF_INET6, params[6].c_str(), 0);
1077 _new->SetSockAddr(AF_INET, params[6].c_str(), 0);
1079 Instance->AddGlobalClone(_new);
1081 if (!this->Instance->SilentULine(_new->server))
1082 this->Instance->SNO->WriteToSnoMask('C',"Client connecting at %s: %s!%s@%s [%s]",_new->server,_new->nick,_new->ident,_new->host, _new->GetIPString());
1084 params[7] = ":" + params[7];
1085 Utils->DoOneToAllButSender(source,"NICK", params, source);
1087 // Increment the Source Servers User Count..
1088 TreeServer* SourceServer = Utils->FindServer(source);
1091 SourceServer->AddUserCount();
1094 FOREACH_MOD_I(Instance,I_OnPostConnect,OnPostConnect(_new));
1099 /** Send one or more FJOINs for a channel of users.
1100 * If the length of a single line is more than 480-NICKMAX
1101 * in length, it is split over multiple lines.
1103 void TreeSocket::SendFJoins(TreeServer* Current, chanrec* c)
1107 std::string individual_halfops = std::string(":")+this->Instance->Config->ServerName+" FMODE "+c->name+" "+ConvToStr(c->age);
1109 size_t dlen, curlen;
1110 dlen = curlen = snprintf(list,MAXBUF,":%s FJOIN %s %lu",this->Instance->Config->ServerName,c->name,(unsigned long)c->age);
1112 char* ptr = list + dlen;
1114 CUList *ulist = c->GetUsers();
1115 std::string modes = "";
1116 std::string params = "";
1118 for (CUList::iterator i = ulist->begin(); i != ulist->end(); i++)
1120 // The first parameter gets a : before it
1121 size_t ptrlen = snprintf(ptr, MAXBUF, " %s%s,%s", !numusers ? ":" : "", c->GetAllPrefixChars(i->second), i->second->nick);
1128 if (curlen > (480-NICKMAX))
1130 buffer.append(list).append("\r\n");
1131 dlen = curlen = snprintf(list,MAXBUF,":%s FJOIN %s %lu",this->Instance->Config->ServerName,c->name,(unsigned long)c->age);
1139 buffer.append(list).append("\r\n");
1141 /* Sorry for the hax. Because newly created channels assume +nt,
1142 * if this channel doesnt have +nt, explicitly send -n and -t for the missing modes.
1144 bool inverted = false;
1145 if (!c->IsModeSet('n'))
1150 if (!c->IsModeSet('t'))
1160 buffer.append(":").append(this->Instance->Config->ServerName).append(" FMODE ").append(c->name).append(" ").append(ConvToStr(c->age)).append(" +").append(c->ChanModes(true)).append("\r\n");
1163 for (BanList::iterator b = c->bans.begin(); b != c->bans.end(); b++)
1165 int size = strlen(b->data) + 2;
1166 int currsize = linesize + size;
1167 if (currsize <= 350)
1170 params.append(" ").append(b->data);
1173 if ((params.length() >= MAXMODES) || (currsize > 350))
1175 /* Wrap at MAXMODES */
1176 buffer.append(":").append(this->Instance->Config->ServerName).append(" FMODE ").append(c->name).append(" ").append(ConvToStr(c->age)).append(" +").append(modes).append(params).append("\r\n");
1183 /* Only send these if there are any */
1185 buffer.append(":").append(this->Instance->Config->ServerName).append(" FMODE ").append(c->name).append(" ").append(ConvToStr(c->age)).append(" +").append(modes).append(params);
1187 this->WriteLine(buffer);
1190 /** Send G, Q, Z and E lines */
1191 void TreeSocket::SendXLines(TreeServer* Current)
1195 std::string n = this->Instance->Config->ServerName;
1196 const char* sn = n.c_str();
1197 /* Yes, these arent too nice looking, but they get the job done */
1198 for (std::vector<ZLine*>::iterator i = Instance->XLines->zlines.begin(); i != Instance->XLines->zlines.end(); i++)
1200 snprintf(data,MAXBUF,":%s ADDLINE Z %s %s %lu %lu :%s\r\n",sn,(*i)->ipaddr,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1201 buffer.append(data);
1203 for (std::vector<QLine*>::iterator i = Instance->XLines->qlines.begin(); i != Instance->XLines->qlines.end(); i++)
1205 snprintf(data,MAXBUF,":%s ADDLINE Q %s %s %lu %lu :%s\r\n",sn,(*i)->nick,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1206 buffer.append(data);
1208 for (std::vector<GLine*>::iterator i = Instance->XLines->glines.begin(); i != Instance->XLines->glines.end(); i++)
1210 snprintf(data,MAXBUF,":%s ADDLINE G %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1211 buffer.append(data);
1213 for (std::vector<ELine*>::iterator i = Instance->XLines->elines.begin(); i != Instance->XLines->elines.end(); i++)
1215 snprintf(data,MAXBUF,":%s ADDLINE E %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1216 buffer.append(data);
1218 for (std::vector<ZLine*>::iterator i = Instance->XLines->pzlines.begin(); i != Instance->XLines->pzlines.end(); i++)
1220 snprintf(data,MAXBUF,":%s ADDLINE Z %s %s %lu %lu :%s\r\n",sn,(*i)->ipaddr,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1221 buffer.append(data);
1223 for (std::vector<QLine*>::iterator i = Instance->XLines->pqlines.begin(); i != Instance->XLines->pqlines.end(); i++)
1225 snprintf(data,MAXBUF,":%s ADDLINE Q %s %s %lu %lu :%s\r\n",sn,(*i)->nick,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1226 buffer.append(data);
1228 for (std::vector<GLine*>::iterator i = Instance->XLines->pglines.begin(); i != Instance->XLines->pglines.end(); i++)
1230 snprintf(data,MAXBUF,":%s ADDLINE G %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1231 buffer.append(data);
1233 for (std::vector<ELine*>::iterator i = Instance->XLines->pelines.begin(); i != Instance->XLines->pelines.end(); i++)
1235 snprintf(data,MAXBUF,":%s ADDLINE E %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1236 buffer.append(data);
1239 if (!buffer.empty())
1240 this->WriteLine(buffer);
1243 /** Send channel modes and topics */
1244 void TreeSocket::SendChannelModes(TreeServer* Current)
1247 std::deque<std::string> list;
1248 std::string n = this->Instance->Config->ServerName;
1249 const char* sn = n.c_str();
1250 for (chan_hash::iterator c = this->Instance->chanlist->begin(); c != this->Instance->chanlist->end(); c++)
1252 SendFJoins(Current, c->second);
1253 if (*c->second->topic)
1255 snprintf(data,MAXBUF,":%s FTOPIC %s %lu %s :%s",sn,c->second->name,(unsigned long)c->second->topicset,c->second->setby,c->second->topic);
1256 this->WriteLine(data);
1258 FOREACH_MOD_I(this->Instance,I_OnSyncChannel,OnSyncChannel(c->second,(Module*)Utils->Creator,(void*)this));
1260 c->second->GetExtList(list);
1261 for (unsigned int j = 0; j < list.size(); j++)
1263 FOREACH_MOD_I(this->Instance,I_OnSyncChannelMetaData,OnSyncChannelMetaData(c->second,(Module*)Utils->Creator,(void*)this,list[j]));
1268 /** send all users and their oper state/modes */
1269 void TreeSocket::SendUsers(TreeServer* Current)
1272 std::deque<std::string> list;
1273 std::string dataline;
1274 for (user_hash::iterator u = this->Instance->clientlist->begin(); u != this->Instance->clientlist->end(); u++)
1276 if (u->second->registered == REG_ALL)
1278 snprintf(data,MAXBUF,":%s NICK %lu %s %s %s %s +%s %s :%s",u->second->server,(unsigned long)u->second->age,u->second->nick,u->second->host,u->second->dhost,u->second->ident,u->second->FormatModes(),u->second->GetIPString(),u->second->fullname);
1279 this->WriteLine(data);
1280 if (*u->second->oper)
1282 snprintf(data,MAXBUF,":%s OPERTYPE %s", u->second->nick, u->second->oper);
1283 this->WriteLine(data);
1285 if (*u->second->awaymsg)
1287 snprintf(data,MAXBUF,":%s AWAY :%s", u->second->nick, u->second->awaymsg);
1288 this->WriteLine(data);
1290 FOREACH_MOD_I(this->Instance,I_OnSyncUser,OnSyncUser(u->second,(Module*)Utils->Creator,(void*)this));
1292 u->second->GetExtList(list);
1294 for (unsigned int j = 0; j < list.size(); j++)
1296 FOREACH_MOD_I(this->Instance,I_OnSyncUserMetaData,OnSyncUserMetaData(u->second,(Module*)Utils->Creator,(void*)this,list[j]));
1302 /** This function is called when we want to send a netburst to a local
1303 * server. There is a set order we must do this, because for example
1304 * users require their servers to exist, and channels require their
1305 * users to exist. You get the idea.
1307 void TreeSocket::DoBurst(TreeServer* s)
1309 std::string name = s->GetName();
1310 std::string burst = "BURST "+ConvToStr(Instance->Time(true));
1311 std::string endburst = "ENDBURST";
1312 this->Instance->SNO->WriteToSnoMask('l',"Bursting to \2%s\2 (Authentication: %s).", name.c_str(), this->GetTheirChallenge().empty() ? "plaintext password" : "SHA256-HMAC challenge-response");
1313 this->WriteLine(burst);
1314 /* send our version string */
1315 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" VERSION :"+this->Instance->GetVersionString());
1316 /* Send server tree */
1317 this->SendServers(Utils->TreeRoot,s,1);
1318 /* Send users and their oper status */
1320 /* Send everything else (channel modes, xlines etc) */
1321 this->SendChannelModes(s);
1322 this->SendXLines(s);
1323 FOREACH_MOD_I(this->Instance,I_OnSyncOtherMetaData,OnSyncOtherMetaData((Module*)Utils->Creator,(void*)this));
1324 this->WriteLine(endburst);
1325 this->Instance->SNO->WriteToSnoMask('l',"Finished bursting to \2"+name+"\2.");
1328 /** This function is called when we receive data from a remote
1329 * server. We buffer the data in a std::string (it doesnt stay
1330 * there for long), reading using InspSocket::Read() which can
1331 * read up to 16 kilobytes in one operation.
1333 * IF THIS FUNCTION RETURNS FALSE, THE CORE CLOSES AND DELETES
1334 * THE SOCKET OBJECT FOR US.
1336 bool TreeSocket::OnDataReady()
1338 char* data = this->Read();
1339 /* Check that the data read is a valid pointer and it has some content */
1342 this->in_buffer.append(data);
1343 /* While there is at least one new line in the buffer,
1344 * do something useful (we hope!) with it.
1346 while (in_buffer.find("\n") != std::string::npos)
1348 std::string ret = in_buffer.substr(0,in_buffer.find("\n")-1);
1349 in_buffer = in_buffer.substr(in_buffer.find("\n")+1,in_buffer.length()-in_buffer.find("\n"));
1350 /* Use rfind here not find, as theres more
1351 * chance of the \r being near the end of the
1352 * string, not the start.
1354 if (ret.find("\r") != std::string::npos)
1355 ret = in_buffer.substr(0,in_buffer.find("\r")-1);
1356 /* Process this one, abort if it
1357 * didnt return true.
1359 if (!this->ProcessLine(ret))
1366 /* EAGAIN returns an empty but non-NULL string, so this
1367 * evaluates to TRUE for EAGAIN but to FALSE for EOF.
1369 return (data && !*data);