-/* +------------------------------------+\r * | Inspire Internet Relay Chat Daemon |\r * +------------------------------------+\r *\r * InspIRCd: (C) 2002-2007 InspIRCd Development Team\r * See: http://www.inspircd.org/wiki/index.php/Credits\r *\r * This program is free but copyrighted software; see\r * the file COPYING for details.\r *\r * ---------------------------------------------------\r */\r\r#include "inspircd.h"\r#include "configreader.h"\r#include "users.h"\r#include "channels.h"\r#include "modules.h"\r#include "commands/cmd_whois.h"\r#include "commands/cmd_stats.h"\r#include "socket.h"\r#include "wildcard.h"\r#include "xline.h"\r#include "transport.h"\r#include "m_hash.h"\r#include "socketengine.h"\r\r#include "m_spanningtree/main.h"\r#include "m_spanningtree/utils.h"\r#include "m_spanningtree/treeserver.h"\r#include "m_spanningtree/link.h"\r#include "m_spanningtree/treesocket.h"\r#include "m_spanningtree/resolvers.h"\r#include "m_spanningtree/handshaketimer.h"\r\r/* $ModDep: m_spanningtree/timesynctimer.h m_spanningtree/resolvers.h m_spanningtree/main.h m_spanningtree/utils.h m_spanningtree/treeserver.h m_spanningtree/link.h m_spanningtree/treesocket.h m_hash.h */\r\r\r/** Because most of the I/O gubbins are encapsulated within\r * InspSocket, we just call the superclass constructor for\r * most of the action, and append a few of our own values\r * to it.\r */\rTreeSocket::TreeSocket(SpanningTreeUtilities* Util, InspIRCd* SI, std::string host, int port, bool listening, unsigned long maxtime, Module* HookMod)\r : InspSocket(SI, host, port, listening, maxtime), Utils(Util), Hook(HookMod)\r{\r myhost = host;\r this->LinkState = LISTENER;\r theirchallenge.clear();\r ourchallenge.clear();\r if (listening && Hook)\r InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();\r}\r\rTreeSocket::TreeSocket(SpanningTreeUtilities* Util, InspIRCd* SI, std::string host, int port, bool listening, unsigned long maxtime, const std::string &ServerName, const std::string &bindto, Module* HookMod)\r : InspSocket(SI, host, port, listening, maxtime, bindto), Utils(Util), Hook(HookMod)\r{\r myhost = ServerName;\r theirchallenge.clear();\r ourchallenge.clear();\r this->LinkState = CONNECTING;\r if (Hook)\r InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();\r}\r\r/** When a listening socket gives us a new file descriptor,\r * we must associate it with a socket without creating a new\r * connection. This constructor is used for this purpose.\r */\rTreeSocket::TreeSocket(SpanningTreeUtilities* Util, InspIRCd* SI, int newfd, char* ip, Module* HookMod)\r : InspSocket(SI, newfd, ip), Utils(Util), Hook(HookMod)\r{\r this->LinkState = WAIT_AUTH_1;\r theirchallenge.clear();\r ourchallenge.clear();\r sentcapab = false;\r /* If we have a transport module hooked to the parent, hook the same module to this\r * socket, and set a timer waiting for handshake before we send CAPAB etc.\r */\r if (Hook)\r InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();\r\r Instance->Timers->AddTimer(new HandshakeTimer(Instance, this, &(Utils->LinkBlocks[0]), this->Utils, 1));\r}\r\rServerState TreeSocket::GetLinkState()\r{\r return this->LinkState;\r}\r\rModule* TreeSocket::GetHook()\r{\r return this->Hook;\r}\r\rTreeSocket::~TreeSocket()\r{\r if (Hook)\r InspSocketUnhookRequest(this, (Module*)Utils->Creator, Hook).Send();\r\r Utils->DelBurstingServer(this);\r}\r\rconst std::string& TreeSocket::GetOurChallenge()\r{\r return this->ourchallenge;\r}\r\rvoid TreeSocket::SetOurChallenge(const std::string &c)\r{\r this->ourchallenge = c;\r}\r\rconst std::string& TreeSocket::GetTheirChallenge()\r{\r return this->theirchallenge;\r}\r\rvoid TreeSocket::SetTheirChallenge(const std::string &c)\r{\r this->theirchallenge = c;\r}\r\rstd::string TreeSocket::MakePass(const std::string &password, const std::string &challenge)\r{\r /* This is a simple (maybe a bit hacky?) HMAC algorithm, thanks to jilles for\r * suggesting the use of HMAC to secure the password against various attacks.\r *\r * Note: If m_sha256.so is not loaded, we MUST fall back to plaintext with no\r * HMAC challenge/response.\r */\r Module* sha256 = Instance->FindModule("m_sha256.so");\r if (Utils->ChallengeResponse && sha256 && !challenge.empty())\r {\r /* XXX: This is how HMAC is supposed to be done:\r *\r * sha256( (pass xor 0x5c) + sha256((pass xor 0x36) + m) )\r *\r * Note that we are encoding the hex hash, not the binary\r * output of the hash which is slightly different to standard.\r *\r * Don't ask me why its always 0x5c and 0x36... it just is.\r */\r std::string hmac1, hmac2;\r\r for (size_t n = 0; n < password.length(); n++)\r {\r hmac1 += static_cast<char>(password[n] ^ 0x5C);\r hmac2 += static_cast<char>(password[n] ^ 0x36);\r }\r\r hmac2 += challenge;\r HashResetRequest(Utils->Creator, sha256).Send();\r hmac2 = HashSumRequest(Utils->Creator, sha256, hmac2).Send();\r\r HashResetRequest(Utils->Creator, sha256).Send();\r std::string hmac = hmac1 + hmac2;\r hmac = HashSumRequest(Utils->Creator, sha256, hmac).Send();\r\r return "HMAC-SHA256:"+ hmac;\r }\r else if (!challenge.empty() && !sha256)\r Instance->Log(DEFAULT,"Not authenticating to server using SHA256/HMAC because we don't have m_sha256 loaded!");\r\r return password;\r}\r\r/** When an outbound connection finishes connecting, we receive\r * this event, and must send our SERVER string to the other\r * side. If the other side is happy, as outlined in the server\r * to server docs on the inspircd.org site, the other side\r * will then send back its own server string.\r */\rbool TreeSocket::OnConnected()\r{\r if (this->LinkState == CONNECTING)\r {\r /* we do not need to change state here. */\r for (std::vector<Link>::iterator x = Utils->LinkBlocks.begin(); x < Utils->LinkBlocks.end(); x++)\r {\r if (x->Name == this->myhost)\r {\r this->Instance->SNO->WriteToSnoMask('l',"Connection to \2"+myhost+"\2["+(x->HiddenFromStats ? "<hidden>" : this->GetIP())+"] started.");\r if (Hook)\r {\r InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();\r this->Instance->SNO->WriteToSnoMask('l',"Connection to \2"+myhost+"\2["+(x->HiddenFromStats ? "<hidden>" : this->GetIP())+"] using transport \2"+x->Hook+"\2");\r }\r this->OutboundPass = x->SendPass;\r sentcapab = false;\r\r /* found who we're supposed to be connecting to, send the neccessary gubbins. */\r if (this->GetHook())\r Instance->Timers->AddTimer(new HandshakeTimer(Instance, this, &(*x), this->Utils, 1));\r else\r this->SendCapabilities();\r\r return true;\r }\r }\r }\r /* There is a (remote) chance that between the /CONNECT and the connection\r * being accepted, some muppet has removed the <link> block and rehashed.\r * If that happens the connection hangs here until it's closed. Unlikely\r * and rather harmless.\r */\r this->Instance->SNO->WriteToSnoMask('l',"Connection to \2"+myhost+"\2 lost link tag(!)");\r return true;\r}\r\rvoid TreeSocket::OnError(InspSocketError e)\r{\r Link* MyLink;\r\r switch (e)\r {\r case I_ERR_CONNECT:\r this->Instance->SNO->WriteToSnoMask('l',"Connection failed: Connection to \002"+myhost+"\002 refused");\r MyLink = Utils->FindLink(myhost);\r if (MyLink)\r Utils->DoFailOver(MyLink);\r break;\r case I_ERR_SOCKET:\r this->Instance->SNO->WriteToSnoMask('l',"Connection failed: Could not create socket");\r break;\r case I_ERR_BIND:\r this->Instance->SNO->WriteToSnoMask('l',"Connection failed: Error binding socket to address or port");\r break;\r case I_ERR_WRITE:\r this->Instance->SNO->WriteToSnoMask('l',"Connection failed: I/O error on connection");\r break;\r case I_ERR_NOMOREFDS:\r this->Instance->SNO->WriteToSnoMask('l',"Connection failed: Operating system is out of file descriptors!");\r break;\r default:\r if ((errno) && (errno != EINPROGRESS) && (errno != EAGAIN))\r {\r std::string errstr = strerror(errno);\r this->Instance->SNO->WriteToSnoMask('l',"Connection to \002"+myhost+"\002 failed with OS error: " + errstr);\r }\r break;\r }\r}\r\rint TreeSocket::OnDisconnect()\r{\r /* For the same reason as above, we don't\r * handle OnDisconnect()\r */\r return true;\r}\r\r/** Recursively send the server tree with distances as hops.\r * This is used during network burst to inform the other server\r * (and any of ITS servers too) of what servers we know about.\r * If at any point any of these servers already exist on the other\r * end, our connection may be terminated. The hopcounts given\r * by this function are relative, this doesn't matter so long as\r * they are all >1, as all the remote servers re-calculate them\r * to be relative too, with themselves as hop 0.\r */\rvoid TreeSocket::SendServers(TreeServer* Current, TreeServer* s, int hops)\r{\r char command[1024];\r for (unsigned int q = 0; q < Current->ChildCount(); q++)\r {\r TreeServer* recursive_server = Current->GetChild(q);\r if (recursive_server != s)\r {\r snprintf(command,1024,":%s SERVER %s * %d :%s",Current->GetName().c_str(),recursive_server->GetName().c_str(),hops,recursive_server->GetDesc().c_str());\r this->WriteLine(command);\r this->WriteLine(":"+recursive_server->GetName()+" VERSION :"+recursive_server->GetVersion());\r /* down to next level */\r this->SendServers(recursive_server, s, hops+1);\r }\r }\r}\r\rstd::string TreeSocket::MyCapabilities()\r{\r std::vector<std::string> modlist;\r std::string capabilities;\r for (int i = 0; i <= this->Instance->GetModuleCount(); i++)\r {\r if (this->Instance->modules[i]->GetVersion().Flags & VF_COMMON)\r modlist.push_back(this->Instance->Config->module_names[i]);\r }\r sort(modlist.begin(),modlist.end());\r for (unsigned int i = 0; i < modlist.size(); i++)\r {\r if (i)\r capabilities = capabilities + ",";\r capabilities = capabilities + modlist[i];\r }\r return capabilities;\r}\r\rstd::string TreeSocket::RandString(unsigned int length)\r{\r char* randombuf = new char[length+1];\r std::string out;\r#ifdef WINDOWS\r int fd = -1;\r#else\r int fd = open("/dev/urandom", O_RDONLY, 0);\r#endif\r\r if (fd >= 0)\r {\r#ifndef WINDOWS\r read(fd, randombuf, length);\r close(fd);\r#endif\r }\r else\r {\r for (unsigned int i = 0; i < length; i++)\r randombuf[i] = rand();\r }\r\r for (unsigned int i = 0; i < length; i++)\r {\r char randchar = static_cast<char>((randombuf[i] & 0x7F) | 0x21);\r out += (randchar == '=' ? '_' : randchar);\r }\r\r delete[] randombuf;\r return out;\r}\r\rvoid TreeSocket::SendCapabilities()\r{\r if (sentcapab)\r return;\r\r sentcapab = true;\r irc::commasepstream modulelist(MyCapabilities());\r this->WriteLine("CAPAB START");\r\r /* Send module names, split at 509 length */\r std::string item = "*";\r std::string line = "CAPAB MODULES ";\r while ((item = modulelist.GetToken()) != "")\r {\r if (line.length() + item.length() + 1 > 509)\r {\r this->WriteLine(line);\r line = "CAPAB MODULES ";\r }\r\r if (line != "CAPAB MODULES ")\r line.append(",");\r\r line.append(item);\r }\r if (line != "CAPAB MODULES ")\r this->WriteLine(line);\r\r int ip6 = 0;\r int ip6support = 0;\r#ifdef IPV6\r ip6 = 1;\r#endif\r#ifdef SUPPORT_IP6LINKS\r ip6support = 1;\r#endif\r std::string extra;\r /* Do we have sha256 available? If so, we send a challenge */\r if (Utils->ChallengeResponse && (Instance->FindModule("m_sha256.so")))\r {\r this->SetOurChallenge(RandString(20));\r extra = " CHALLENGE=" + this->GetOurChallenge();\r }\r\r this->WriteLine("CAPAB CAPABILITIES :NICKMAX="+ConvToStr(NICKMAX)+" HALFOP="+ConvToStr(this->Instance->Config->AllowHalfop)+" CHANMAX="+ConvToStr(CHANMAX)+" MAXMODES="+ConvToStr(MAXMODES)+" IDENTMAX="+ConvToStr(IDENTMAX)+" MAXQUIT="+ConvToStr(MAXQUIT)+" MAXTOPIC="+ConvToStr(MAXTOPIC)+" MAXKICK="+ConvToStr(MAXKICK)+" MAXGECOS="+ConvToStr(MAXGECOS)+" MAXAWAY="+ConvToStr(MAXAWAY)+" IP6NATIVE="+ConvToStr(ip6)+" IP6SUPPORT="+ConvToStr(ip6support)+" PROTOCOL="+ConvToStr(ProtocolVersion)+extra+" PREFIX="+Instance->Modes->BuildPrefixes()+" CHANMODES="+Instance->Modes->ChanModes());\r\r this->WriteLine("CAPAB END");\r}\r\r/* Check a comma seperated list for an item */\rbool TreeSocket::HasItem(const std::string &list, const std::string &item)\r{\r irc::commasepstream seplist(list);\r std::string item2 = "*";\r while ((item2 = seplist.GetToken()) != "")\r {\r if (item2 == item)\r return true;\r }\r return false;\r}\r\r/* Isolate and return the elements that are different between two comma seperated lists */\rstd::string TreeSocket::ListDifference(const std::string &one, const std::string &two)\r{\r irc::commasepstream list_one(one);\r std::string item = "*";\r std::string result;\r while ((item = list_one.GetToken()) != "")\r {\r if (!HasItem(two, item))\r {\r result.append(" ");\r result.append(item);\r }\r }\r return result;\r}\r\rvoid TreeSocket::SendError(const std::string &errormessage)\r{\r /* Display the error locally as well as sending it remotely */\r this->WriteLine("ERROR :"+errormessage);\r this->Instance->SNO->WriteToSnoMask('l',"Sent \2ERROR\2 to "+this->InboundServerName+": "+errormessage);\r /* One last attempt to make sure the error reaches its target */\r this->FlushWriteBuffer();\r}\r\rbool TreeSocket::Capab(const std::deque<std::string> ¶ms)\r{\r if (params.size() < 1)\r {\r this->SendError("Invalid number of parameters for CAPAB - Mismatched version");\r return false;\r }\r if (params[0] == "START")\r {\r this->ModuleList.clear();\r this->CapKeys.clear();\r }\r else if (params[0] == "END")\r {\r std::string reason;\r int ip6support = 0;\r#ifdef SUPPORT_IP6LINKS\r ip6support = 1;\r#endif\r /* Compare ModuleList and check CapKeys...\r * Maybe this could be tidier? -- Brain\r */\r if ((this->ModuleList != this->MyCapabilities()) && (this->ModuleList.length()))\r {\r std::string diff = ListDifference(this->ModuleList, this->MyCapabilities());\r if (!diff.length())\r {\r diff = "your server:" + ListDifference(this->MyCapabilities(), this->ModuleList);\r }\r else\r {\r diff = "this server:" + diff;\r }\r if (diff.length() == 12)\r reason = "Module list in CAPAB is not alphabetically ordered, cannot compare lists.";\r else\r reason = "Modules loaded on these servers are not correctly matched, these modules are not loaded on " + diff;\r }\r\r cap_validation valid_capab[] = { \r {"Maximum nickname lengths differ or remote nickname length not specified", "NICKMAX", NICKMAX},\r {"Maximum ident lengths differ or remote ident length not specified", "IDENTMAX", IDENTMAX},\r {"Maximum channel lengths differ or remote channel length not specified", "CHANMAX", CHANMAX},\r {"Maximum modes per line differ or remote modes per line not specified", "MAXMODES", MAXMODES},\r {"Maximum quit lengths differ or remote quit length not specified", "MAXQUIT", MAXQUIT},\r {"Maximum topic lengths differ or remote topic length not specified", "MAXTOPIC", MAXTOPIC},\r {"Maximum kick lengths differ or remote kick length not specified", "MAXKICK", MAXKICK},\r {"Maximum GECOS (fullname) lengths differ or remote GECOS length not specified", "MAXGECOS", MAXGECOS},\r {"Maximum awaymessage lengths differ or remote awaymessage length not specified", "MAXAWAY", MAXAWAY},\r {"", "", 0}\r };\r\r if (((this->CapKeys.find("IP6SUPPORT") == this->CapKeys.end()) && (ip6support)) || ((this->CapKeys.find("IP6SUPPORT") != this->CapKeys.end()) && (this->CapKeys.find("IP6SUPPORT")->second != ConvToStr(ip6support))))\r reason = "We don't both support linking to IPV6 servers";\r if (((this->CapKeys.find("IP6NATIVE") != this->CapKeys.end()) && (this->CapKeys.find("IP6NATIVE")->second == "1")) && (!ip6support))\r reason = "The remote server is IPV6 native, and we don't support linking to IPV6 servers";\r if (((this->CapKeys.find("PROTOCOL") == this->CapKeys.end()) || ((this->CapKeys.find("PROTOCOL") != this->CapKeys.end()) && (this->CapKeys.find("PROTOCOL")->second != ConvToStr(ProtocolVersion)))))\r {\r if (this->CapKeys.find("PROTOCOL") != this->CapKeys.end())\r reason = "Mismatched protocol versions "+this->CapKeys.find("PROTOCOL")->second+" and "+ConvToStr(ProtocolVersion);\r else\r reason = "Protocol version not specified";\r }\r\r if(this->CapKeys.find("PREFIX") != this->CapKeys.end() && this->CapKeys.find("PREFIX")->second != this->Instance->Modes->BuildPrefixes())\r reason = "One or more of the prefixes on the remote server are invalid on this server.";\r\r if (((this->CapKeys.find("HALFOP") == this->CapKeys.end()) && (Instance->Config->AllowHalfop)) || ((this->CapKeys.find("HALFOP") != this->CapKeys.end()) && (this->CapKeys.find("HALFOP")->second != ConvToStr(Instance->Config->AllowHalfop))))\r reason = "We don't both have halfop support enabled/disabled identically";\r\r for (int x = 0; valid_capab[x].size; ++x)\r {\r if (((this->CapKeys.find(valid_capab[x].key) == this->CapKeys.end()) || ((this->CapKeys.find(valid_capab[x].key) != this->CapKeys.end()) &&\r (this->CapKeys.find(valid_capab[x].key)->second != ConvToStr(valid_capab[x].size)))))\r reason = valid_capab[x].reason;\r }\r \r /* Challenge response, store their challenge for our password */\r std::map<std::string,std::string>::iterator n = this->CapKeys.find("CHALLENGE");\r if (Utils->ChallengeResponse && (n != this->CapKeys.end()) && (Instance->FindModule("m_sha256.so")))\r {\r /* Challenge-response is on now */\r this->SetTheirChallenge(n->second);\r if (!this->GetTheirChallenge().empty() && (this->LinkState == CONNECTING))\r {\r this->WriteLine(std::string("SERVER ")+this->Instance->Config->ServerName+" "+this->MakePass(OutboundPass, this->GetTheirChallenge())+" 0 :"+this->Instance->Config->ServerDesc);\r }\r }\r else\r {\r /* They didnt specify a challenge or we don't have m_sha256.so, we use plaintext */\r if (this->LinkState == CONNECTING)\r this->WriteLine(std::string("SERVER ")+this->Instance->Config->ServerName+" "+OutboundPass+" 0 :"+this->Instance->Config->ServerDesc);\r }\r\r if (reason.length())\r {\r this->SendError("CAPAB negotiation failed: "+reason);\r return false;\r }\r }\r else if ((params[0] == "MODULES") && (params.size() == 2))\r {\r if (!this->ModuleList.length())\r {\r this->ModuleList.append(params[1]);\r }\r else\r {\r this->ModuleList.append(",");\r this->ModuleList.append(params[1]);\r }\r }\r\r else if ((params[0] == "CAPABILITIES") && (params.size() == 2))\r {\r irc::tokenstream capabs(params[1]);\r std::string item;\r bool more = true;\r while ((more = capabs.GetToken(item)))\r {\r /* Process each key/value pair */\r std::string::size_type equals = item.rfind('=');\r if (equals != std::string::npos)\r {\r std::string var = item.substr(0, equals);\r std::string value = item.substr(equals+1, item.length());\r CapKeys[var] = value;\r }\r }\r }\r return true;\r}\r\r/** This function forces this server to quit, removing this server\r * and any users on it (and servers and users below that, etc etc).\r * It's very slow and pretty clunky, but luckily unless your network\r * is having a REAL bad hair day, this function shouldnt be called\r * too many times a month ;-)\r */\rvoid TreeSocket::SquitServer(std::string &from, TreeServer* Current)\r{\r /* recursively squit the servers attached to 'Current'.\r * We're going backwards so we don't remove users\r * while we still need them ;)\r */\r for (unsigned int q = 0; q < Current->ChildCount(); q++)\r {\r TreeServer* recursive_server = Current->GetChild(q);\r this->SquitServer(from,recursive_server);\r }\r /* Now we've whacked the kids, whack self */\r num_lost_servers++;\r num_lost_users += Current->QuitUsers(from);\r}\r\r/** This is a wrapper function for SquitServer above, which\r * does some validation first and passes on the SQUIT to all\r * other remaining servers.\r */\rvoid TreeSocket::Squit(TreeServer* Current, const std::string &reason)\r{\r if ((Current) && (Current != Utils->TreeRoot))\r {\r Event rmode((char*)Current->GetName().c_str(), (Module*)Utils->Creator, "lost_server");\r rmode.Send(Instance);\r\r std::deque<std::string> params;\r params.push_back(Current->GetName());\r params.push_back(":"+reason);\r Utils->DoOneToAllButSender(Current->GetParent()->GetName(),"SQUIT",params,Current->GetName());\r if (Current->GetParent() == Utils->TreeRoot)\r {\r this->Instance->SNO->WriteToSnoMask('l',"Server \002"+Current->GetName()+"\002 split: "+reason);\r }\r else\r {\r this->Instance->SNO->WriteToSnoMask('l',"Server \002"+Current->GetName()+"\002 split from server \002"+Current->GetParent()->GetName()+"\002 with reason: "+reason);\r }\r num_lost_servers = 0;\r num_lost_users = 0;\r std::string from = Current->GetParent()->GetName()+" "+Current->GetName();\r SquitServer(from, Current);\r Current->Tidy();\r Current->GetParent()->DelChild(Current);\r DELETE(Current);\r this->Instance->SNO->WriteToSnoMask('l',"Netsplit complete, lost \002%d\002 users on \002%d\002 servers.", num_lost_users, num_lost_servers);\r }\r else\r Instance->Log(DEFAULT,"Squit from unknown server");\r}\r\r/** FMODE command - server mode with timestamp checks */\rbool TreeSocket::ForceMode(const std::string &source, std::deque<std::string> ¶ms)\r{\r /* Chances are this is a 1.0 FMODE without TS */\r if (params.size() < 3)\r {\r /* No modes were in the command, probably a channel with no modes set on it */\r return true;\r }\r\r bool smode = false;\r std::string sourceserv;\r /* Are we dealing with an FMODE from a user, or from a server? */\r userrec* who = this->Instance->FindNick(source);\r if (who)\r {\r /* FMODE from a user, set sourceserv to the users server name */\r sourceserv = who->server;\r }\r else\r {\r /* FMODE from a server, create a fake user to receive mode feedback */\r who = new userrec(this->Instance);\r who->SetFd(FD_MAGIC_NUMBER);\r smode = true; /* Setting this flag tells us we should free the userrec later */\r sourceserv = source; /* Set sourceserv to the actual source string */\r }\r const char* modelist[64];\r time_t TS = 0;\r int n = 0;\r memset(&modelist,0,sizeof(modelist));\r for (unsigned int q = 0; (q < params.size()) && (q < 64); q++)\r {\r if (q == 1)\r {\r /* The timestamp is in this position.\r * We don't want to pass that up to the\r * server->client protocol!\r */\r TS = atoi(params[q].c_str());\r }\r else\r {\r /* Everything else is fine to append to the modelist */\r modelist[n++] = params[q].c_str();\r }\r\r }\r /* Extract the TS value of the object, either userrec or chanrec */\r userrec* dst = this->Instance->FindNick(params[0]);\r chanrec* chan = NULL;\r time_t ourTS = 0;\r if (dst)\r {\r ourTS = dst->age;\r }\r else\r {\r chan = this->Instance->FindChan(params[0]);\r if (chan)\r {\r ourTS = chan->age;\r }\r else\r /* Oops, channel doesnt exist! */\r return true;\r }\r\r if (!TS)\r {\r Instance->Log(DEFAULT,"*** BUG? *** TS of 0 sent to FMODE. Are some services authors smoking craq, or is it 1970 again?. Dropped.");\r Instance->SNO->WriteToSnoMask('d', "WARNING: The server %s is sending FMODE with a TS of zero. Total craq. Mode was dropped.", sourceserv.c_str());\r return true;\r }\r\r /* TS is equal or less: Merge the mode changes into ours and pass on.\r */\r if (TS <= ourTS)\r {\r if ((TS < ourTS) && (!dst))\r Instance->Log(DEFAULT,"*** BUG *** Channel TS sent in FMODE to %s is %lu which is not equal to %lu!", params[0].c_str(), TS, ourTS);\r\r if (smode)\r {\r this->Instance->SendMode(modelist, n, who);\r }\r else\r {\r this->Instance->CallCommandHandler("MODE", modelist, n, who);\r }\r /* HOT POTATO! PASS IT ON! */\r Utils->DoOneToAllButSender(source,"FMODE",params,sourceserv);\r }\r /* If the TS is greater than ours, we drop the mode and dont pass it anywhere.\r */\r\r if (smode)\r DELETE(who);\r\r return true;\r}\r\r/** FTOPIC command */\rbool TreeSocket::ForceTopic(const std::string &source, std::deque<std::string> ¶ms)\r{\r if (params.size() != 4)\r return true;\r time_t ts = atoi(params[1].c_str());\r std::string nsource = source;\r chanrec* c = this->Instance->FindChan(params[0]);\r if (c)\r {\r if ((ts >= c->topicset) || (!*c->topic))\r {\r std::string oldtopic = c->topic;\r strlcpy(c->topic,params[3].c_str(),MAXTOPIC);\r strlcpy(c->setby,params[2].c_str(),127);\r c->topicset = ts;\r /* if the topic text is the same as the current topic,\r * dont bother to send the TOPIC command out, just silently\r * update the set time and set nick.\r */\r if (oldtopic != params[3])\r {\r userrec* user = this->Instance->FindNick(source);\r if (!user)\r {\r c->WriteChannelWithServ(Instance->Config->ServerName, "TOPIC %s :%s", c->name, c->topic);\r }\r else\r {\r c->WriteChannel(user, "TOPIC %s :%s", c->name, c->topic);\r nsource = user->server;\r }\r /* all done, send it on its way */\r params[3] = ":" + params[3];\r Utils->DoOneToAllButSender(source,"FTOPIC",params,nsource);\r }\r }\r\r }\r return true;\r}\r\r/** FJOIN, similar to TS6 SJOIN, but not quite. */\rbool TreeSocket::ForceJoin(const std::string &source, std::deque<std::string> ¶ms)\r{\r /* 1.1 FJOIN works as follows:\r *\r * Each FJOIN is sent along with a timestamp, and the side with the lowest\r * timestamp 'wins'. From this point on we will refer to this side as the\r * winner. The side with the higher timestamp loses, from this point on we\r * will call this side the loser or losing side. This should be familiar to\r * anyone who's dealt with dreamforge or TS6 before.\r *\r * When two sides of a split heal and this occurs, the following things\r * will happen:\r *\r * If the timestamps are exactly equal, both sides merge their privilages\r * and users, as in InspIRCd 1.0 and ircd2.8. The channels have not been\r * re-created during a split, this is safe to do.\r *\r * If the timestamps are NOT equal, the losing side removes all of its\r * modes from the channel, before introducing new users into the channel\r * which are listed in the FJOIN command's parameters. The losing side then\r * LOWERS its timestamp value of the channel to match that of the winning\r * side, and the modes of the users of the winning side are merged in with\r * the losing side.\r *\r * The winning side on the other hand will ignore all user modes from the\r * losing side, so only its own modes get applied. Life is simple for those\r * who succeed at internets. :-)\r *\r * NOTE: Unlike TS6 and dreamforge and other protocols which have SJOIN,\r * FJOIN does not contain the simple-modes such as +iklmnsp. Why not,\r * you ask? Well, quite simply because we don't need to. They'll be sent\r * after the FJOIN by FMODE, and FMODE is timestamped, so in the event\r * the losing side sends any modes for the channel which shouldnt win,\r * they wont as their timestamp will be too high :-)\r */\r\r if (params.size() < 3)\r return true;\r\r irc::modestacker modestack(true); /* Modes to apply from the users in the user list */\r userrec* who = NULL; /* User we are currently checking */\r std::string channel = params[0]; /* Channel name, as a string */\r time_t TS = atoi(params[1].c_str()); /* Timestamp given to us for remote side */\r irc::tokenstream users(params[2]); /* Users from the user list */\r bool apply_other_sides_modes = true; /* True if we are accepting the other side's modes */\r chanrec* chan = this->Instance->FindChan(channel); /* The channel we're sending joins to */\r time_t ourTS = chan ? chan->age : Instance->Time(true)+600; /* The TS of our side of the link */\r bool created = !chan; /* True if the channel doesnt exist here yet */\r std::string item; /* One item in the list of nicks */\r\r params[2] = ":" + params[2];\r Utils->DoOneToAllButSender(source,"FJOIN",params,source);\r\r if (!TS)\r {\r Instance->Log(DEFAULT,"*** BUG? *** TS of 0 sent to FJOIN. Are some services authors smoking craq, or is it 1970 again?. Dropped.");\r Instance->SNO->WriteToSnoMask('d', "WARNING: The server %s is sending FJOIN with a TS of zero. Total craq. Command was dropped.", source.c_str());\r return true;\r }\r\r /* If our TS is less than theirs, we dont accept their modes */\r if (ourTS < TS)\r apply_other_sides_modes = false;\r\r /* Our TS greater than theirs, clear all our modes from the channel, accept theirs. */\r if (ourTS > TS)\r {\r std::deque<std::string> param_list;\r if (Utils->AnnounceTSChange && chan)\r chan->WriteChannelWithServ(Instance->Config->ServerName, "NOTICE %s :TS for %s changed from %lu to %lu", chan->name, chan->name, ourTS, TS);\r ourTS = TS;\r if (!created)\r {\r chan->age = TS;\r param_list.push_back(channel);\r this->RemoveStatus(Instance->Config->ServerName, param_list);\r }\r }\r\r /* Now, process every 'prefixes,nick' pair */\r while (users.GetToken(item))\r {\r const char* usr = item.c_str();\r if (usr && *usr)\r {\r const char* permissions = usr;\r /* Iterate through all the prefix values, convert them from prefixes to mode letters */\r std::string modes;\r while ((*permissions) && (*permissions != ','))\r {\r ModeHandler* mh = Instance->Modes->FindPrefix(*permissions);\r if (mh)\r modes = modes + mh->GetModeChar();\r else\r {\r this->SendError(std::string("Invalid prefix '")+(*permissions)+"' in FJOIN");\r return false;\r }\r usr++;\r permissions++;\r }\r /* Advance past the comma, to the nick */\r usr++;\r \r /* Check the user actually exists */\r who = this->Instance->FindNick(usr);\r if (who)\r {\r /* Check that the user's 'direction' is correct */\r TreeServer* route_back_again = Utils->BestRouteTo(who->server);\r if ((!route_back_again) || (route_back_again->GetSocket() != this))\r continue;\r\r /* Add any permissions this user had to the mode stack */\r for (std::string::iterator x = modes.begin(); x != modes.end(); ++x)\r modestack.Push(*x, who->nick);\r\r chanrec::JoinUser(this->Instance, who, channel.c_str(), true, "", TS);\r }\r else\r {\r Instance->Log(SPARSE,"Warning! Invalid user %s in FJOIN to channel %s IGNORED", usr, channel.c_str());\r continue;\r }\r }\r }\r\r /* Flush mode stacker if we lost the FJOIN or had equal TS */\r if (apply_other_sides_modes)\r {\r std::deque<std::string> stackresult;\r const char* mode_junk[MAXMODES+2];\r userrec* n = new userrec(Instance);\r n->SetFd(FD_MAGIC_NUMBER);\r mode_junk[0] = channel.c_str();\r\r while (modestack.GetStackedLine(stackresult))\r {\r for (size_t j = 0; j < stackresult.size(); j++)\r {\r mode_junk[j+1] = stackresult[j].c_str();\r }\r Instance->SendMode(mode_junk, stackresult.size() + 1, n);\r }\r\r delete n;\r }\r\r return true;\r}\r\r/** NICK command */\rbool TreeSocket::IntroduceClient(const std::string &source, std::deque<std::string> ¶ms)\r{\r /** Do we have enough parameters:\r * NICK age nick host dhost ident +modes ip :gecos\r */\r if (params.size() != 8)\r {\r this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction ("+params[1]+"?)");\r return true;\r }\r\r time_t age = ConvToInt(params[0]);\r const char* tempnick = params[1].c_str();\r\r cmd_validation valid[] = { {"Nickname", 1, NICKMAX}, {"Hostname", 2, 64}, {"Displayed hostname", 3, 64}, {"Ident", 4, IDENTMAX}, {"GECOS", 7, MAXGECOS}, {"", 0, 0} };\r\r TreeServer* remoteserver = Utils->FindServer(source);\r if (!remoteserver)\r {\r this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction (Unknown server "+source+")");\r return true;\r }\r\r /* Check parameters for validity before introducing the client, discovered by dmb */\r if (!age)\r {\r this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction (Invalid TS?)");\r return true;\r }\r for (size_t x = 0; valid[x].length; ++x)\r {\r if (params[valid[x].param].length() > valid[x].length)\r {\r this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction (" + valid[x].item + " > " + ConvToStr(valid[x].length) + ")");\r return true;\r }\r }\r\r /** Our client looks ok, lets introduce it now\r */\r Instance->Log(DEBUG,"New remote client %s",tempnick);\r user_hash::iterator iter = this->Instance->clientlist->find(tempnick);\r\r if (iter != this->Instance->clientlist->end())\r {\r /* nick collision */\r this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+tempnick+" :Nickname collision");\r userrec::QuitUser(this->Instance, iter->second, "Nickname collision");\r return true;\r }\r\r userrec* _new = new userrec(this->Instance);\r (*(this->Instance->clientlist))[tempnick] = _new;\r _new->SetFd(FD_MAGIC_NUMBER);\r strlcpy(_new->nick, tempnick,NICKMAX-1);\r strlcpy(_new->host, params[2].c_str(),64);\r strlcpy(_new->dhost, params[3].c_str(),64);\r _new->server = this->Instance->FindServerNamePtr(source.c_str());\r strlcpy(_new->ident, params[4].c_str(),IDENTMAX);\r strlcpy(_new->fullname, params[7].c_str(),MAXGECOS);\r _new->registered = REG_ALL;\r _new->signon = age;\r\r /* we need to remove the + from the modestring, so we can do our stuff */\r std::string::size_type pos_after_plus = params[5].find_first_not_of('+');\r if (pos_after_plus != std::string::npos)\r params[5] = params[5].substr(pos_after_plus);\r\r for (std::string::iterator v = params[5].begin(); v != params[5].end(); v++)\r {\r _new->modes[(*v)-65] = 1;\r /* For each mode thats set, increase counter */\r ModeHandler* mh = Instance->Modes->FindMode(*v, MODETYPE_USER);\r if (mh)\r mh->ChangeCount(1);\r }\r\r /* now we've done with modes processing, put the + back for remote servers */\r params[5] = "+" + params[5];\r\r#ifdef SUPPORT_IP6LINKS\r if (params[6].find_first_of(":") != std::string::npos)\r _new->SetSockAddr(AF_INET6, params[6].c_str(), 0);\r else\r#endif\r _new->SetSockAddr(AF_INET, params[6].c_str(), 0);\r\r Instance->AddGlobalClone(_new);\r\r bool dosend = !(((this->Utils->quiet_bursts) && (this->bursting || Utils->FindRemoteBurstServer(remoteserver))) || (this->Instance->SilentULine(_new->server)));\r \r if (dosend)\r this->Instance->SNO->WriteToSnoMask('C',"Client connecting at %s: %s!%s@%s [%s] [%s]",_new->server,_new->nick,_new->ident,_new->host, _new->GetIPString(), _new->fullname);\r\r params[7] = ":" + params[7];\r Utils->DoOneToAllButSender(source,"NICK", params, source);\r\r // Increment the Source Servers User Count..\r TreeServer* SourceServer = Utils->FindServer(source);\r if (SourceServer)\r {\r SourceServer->AddUserCount();\r }\r\r FOREACH_MOD_I(Instance,I_OnPostConnect,OnPostConnect(_new));\r\r return true;\r}\r\r/** Send one or more FJOINs for a channel of users.\r * If the length of a single line is more than 480-NICKMAX\r * in length, it is split over multiple lines.\r */\rvoid TreeSocket::SendFJoins(TreeServer* Current, chanrec* c)\r{\r std::string buffer;\r char list[MAXBUF];\r std::string individual_halfops = std::string(":")+this->Instance->Config->ServerName+" FMODE "+c->name+" "+ConvToStr(c->age);\r\r size_t dlen, curlen;\r dlen = curlen = snprintf(list,MAXBUF,":%s FJOIN %s %lu",this->Instance->Config->ServerName,c->name,(unsigned long)c->age);\r int numusers = 0;\r char* ptr = list + dlen;\r\r CUList *ulist = c->GetUsers();\r std::string modes;\r std::string params;\r\r for (CUList::iterator i = ulist->begin(); i != ulist->end(); i++)\r {\r // The first parameter gets a : before it\r size_t ptrlen = snprintf(ptr, MAXBUF, " %s%s,%s", !numusers ? ":" : "", c->GetAllPrefixChars(i->first), i->first->nick);\r\r curlen += ptrlen;\r ptr += ptrlen;\r\r numusers++;\r\r if (curlen > (480-NICKMAX))\r {\r buffer.append(list).append("\r\n");\r dlen = curlen = snprintf(list,MAXBUF,":%s FJOIN %s %lu",this->Instance->Config->ServerName,c->name,(unsigned long)c->age);\r ptr = list + dlen;\r ptrlen = 0;\r numusers = 0;\r }\r }\r\r if (numusers)\r buffer.append(list).append("\r\n");\r\r buffer.append(":").append(this->Instance->Config->ServerName).append(" FMODE ").append(c->name).append(" ").append(ConvToStr(c->age)).append(" +").append(c->ChanModes(true)).append("\r\n");\r\r int linesize = 1;\r for (BanList::iterator b = c->bans.begin(); b != c->bans.end(); b++)\r {\r int size = strlen(b->data) + 2;\r int currsize = linesize + size;\r if (currsize <= 350)\r {\r modes.append("b");\r params.append(" ").append(b->data);\r linesize += size; \r }\r if ((params.length() >= MAXMODES) || (currsize > 350))\r {\r /* Wrap at MAXMODES */\r buffer.append(":").append(this->Instance->Config->ServerName).append(" FMODE ").append(c->name).append(" ").append(ConvToStr(c->age)).append(" +").append(modes).append(params).append("\r\n");\r modes.clear();\r params.clear();\r linesize = 1;\r }\r }\r\r /* Only send these if there are any */\r if (!modes.empty())\r buffer.append(":").append(this->Instance->Config->ServerName).append(" FMODE ").append(c->name).append(" ").append(ConvToStr(c->age)).append(" +").append(modes).append(params);\r\r this->WriteLine(buffer);\r}\r\r/** Send G, Q, Z and E lines */\rvoid TreeSocket::SendXLines(TreeServer* Current)\r{\r char data[MAXBUF];\r std::string buffer;\r std::string n = this->Instance->Config->ServerName;\r const char* sn = n.c_str();\r /* Yes, these arent too nice looking, but they get the job done */\r for (std::vector<ZLine*>::iterator i = Instance->XLines->zlines.begin(); i != Instance->XLines->zlines.end(); i++)\r {\r snprintf(data,MAXBUF,":%s ADDLINE Z %s %s %lu %lu :%s\r\n",sn,(*i)->ipaddr,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);\r buffer.append(data);\r }\r for (std::vector<QLine*>::iterator i = Instance->XLines->qlines.begin(); i != Instance->XLines->qlines.end(); i++)\r {\r snprintf(data,MAXBUF,":%s ADDLINE Q %s %s %lu %lu :%s\r\n",sn,(*i)->nick,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);\r buffer.append(data);\r }\r for (std::vector<GLine*>::iterator i = Instance->XLines->glines.begin(); i != Instance->XLines->glines.end(); i++)\r {\r snprintf(data,MAXBUF,":%s ADDLINE G %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);\r buffer.append(data);\r }\r for (std::vector<ELine*>::iterator i = Instance->XLines->elines.begin(); i != Instance->XLines->elines.end(); i++)\r {\r snprintf(data,MAXBUF,":%s ADDLINE E %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);\r buffer.append(data);\r }\r for (std::vector<ZLine*>::iterator i = Instance->XLines->pzlines.begin(); i != Instance->XLines->pzlines.end(); i++)\r {\r snprintf(data,MAXBUF,":%s ADDLINE Z %s %s %lu %lu :%s\r\n",sn,(*i)->ipaddr,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);\r buffer.append(data);\r }\r for (std::vector<QLine*>::iterator i = Instance->XLines->pqlines.begin(); i != Instance->XLines->pqlines.end(); i++)\r {\r snprintf(data,MAXBUF,":%s ADDLINE Q %s %s %lu %lu :%s\r\n",sn,(*i)->nick,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);\r buffer.append(data);\r }\r for (std::vector<GLine*>::iterator i = Instance->XLines->pglines.begin(); i != Instance->XLines->pglines.end(); i++)\r {\r snprintf(data,MAXBUF,":%s ADDLINE G %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);\r buffer.append(data);\r }\r for (std::vector<ELine*>::iterator i = Instance->XLines->pelines.begin(); i != Instance->XLines->pelines.end(); i++)\r {\r snprintf(data,MAXBUF,":%s ADDLINE E %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);\r buffer.append(data);\r }\r\r if (!buffer.empty())\r this->WriteLine(buffer);\r}\r\r/** Send channel modes and topics */\rvoid TreeSocket::SendChannelModes(TreeServer* Current)\r{\r char data[MAXBUF];\r std::deque<std::string> list;\r std::string n = this->Instance->Config->ServerName;\r const char* sn = n.c_str();\r Instance->Log(DEBUG,"Sending channels and modes, %d to send", this->Instance->chanlist->size());\r for (chan_hash::iterator c = this->Instance->chanlist->begin(); c != this->Instance->chanlist->end(); c++)\r {\r SendFJoins(Current, c->second);\r if (*c->second->topic)\r {\r snprintf(data,MAXBUF,":%s FTOPIC %s %lu %s :%s",sn,c->second->name,(unsigned long)c->second->topicset,c->second->setby,c->second->topic);\r this->WriteLine(data);\r }\r FOREACH_MOD_I(this->Instance,I_OnSyncChannel,OnSyncChannel(c->second,(Module*)Utils->Creator,(void*)this));\r list.clear();\r c->second->GetExtList(list);\r for (unsigned int j = 0; j < list.size(); j++)\r {\r FOREACH_MOD_I(this->Instance,I_OnSyncChannelMetaData,OnSyncChannelMetaData(c->second,(Module*)Utils->Creator,(void*)this,list[j]));\r }\r }\r}\r\r/** send all users and their oper state/modes */\rvoid TreeSocket::SendUsers(TreeServer* Current)\r{\r char data[MAXBUF];\r std::deque<std::string> list;\r std::string dataline;\r for (user_hash::iterator u = this->Instance->clientlist->begin(); u != this->Instance->clientlist->end(); u++)\r {\r if (u->second->registered == REG_ALL)\r {\r snprintf(data,MAXBUF,":%s NICK %lu %s %s %s %s +%s %s :%s",u->second->server,(unsigned long)u->second->age,u->second->nick,u->second->host,u->second->dhost,u->second->ident,u->second->FormatModes(),u->second->GetIPString(),u->second->fullname);\r this->WriteLine(data);\r if (*u->second->oper)\r {\r snprintf(data,MAXBUF,":%s OPERTYPE %s", u->second->nick, u->second->oper);\r this->WriteLine(data);\r }\r if (*u->second->awaymsg)\r {\r snprintf(data,MAXBUF,":%s AWAY :%s", u->second->nick, u->second->awaymsg);\r this->WriteLine(data);\r }\r }\r }\r for (user_hash::iterator u = this->Instance->clientlist->begin(); u != this->Instance->clientlist->end(); u++)\r {\r FOREACH_MOD_I(this->Instance,I_OnSyncUser,OnSyncUser(u->second,(Module*)Utils->Creator,(void*)this));\r list.clear();\r u->second->GetExtList(list);\r for (unsigned int j = 0; j < list.size(); j++)\r {\r FOREACH_MOD_I(this->Instance,I_OnSyncUserMetaData,OnSyncUserMetaData(u->second,(Module*)Utils->Creator,(void*)this,list[j]));\r }\r }\r}\r\r/** This function is called when we want to send a netburst to a local\r * server. There is a set order we must do this, because for example\r * users require their servers to exist, and channels require their\r * users to exist. You get the idea.\r */\rvoid TreeSocket::DoBurst(TreeServer* s)\r{\r std::string name = s->GetName();\r std::string burst = "BURST "+ConvToStr(Instance->Time(true));\r std::string endburst = "ENDBURST";\r this->Instance->SNO->WriteToSnoMask('l',"Bursting to \2%s\2 (Authentication: %s).", name.c_str(), this->GetTheirChallenge().empty() ? "plaintext password" : "SHA256-HMAC challenge-response");\r this->WriteLine(burst);\r /* send our version string */\r this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" VERSION :"+this->Instance->GetVersionString());\r /* Send server tree */\r this->SendServers(Utils->TreeRoot,s,1);\r /* Send users and their oper status */\r this->SendUsers(s);\r /* Send everything else (channel modes, xlines etc) */\r this->SendChannelModes(s);\r this->SendXLines(s);\r FOREACH_MOD_I(this->Instance,I_OnSyncOtherMetaData,OnSyncOtherMetaData((Module*)Utils->Creator,(void*)this));\r this->WriteLine(endburst);\r this->Instance->SNO->WriteToSnoMask('l',"Finished bursting to \2"+name+"\2.");\r}\r\r/** This function is called when we receive data from a remote\r * server. We buffer the data in a std::string (it doesnt stay\r * there for long), reading using InspSocket::Read() which can\r * read up to 16 kilobytes in one operation.\r *\r * IF THIS FUNCTION RETURNS FALSE, THE CORE CLOSES AND DELETES\r * THE SOCKET OBJECT FOR US.\r */\rbool TreeSocket::OnDataReady()\r{\r char* data = this->Read();\r /* Check that the data read is a valid pointer and it has some content */\r if (data && *data)\r {\r this->in_buffer.append(data);\r /* While there is at least one new line in the buffer,\r * do something useful (we hope!) with it.\r */\r while (in_buffer.find("\n") != std::string::npos)\r {\r std::string ret = in_buffer.substr(0,in_buffer.find("\n")-1);\r in_buffer = in_buffer.substr(in_buffer.find("\n")+1,in_buffer.length()-in_buffer.find("\n"));\r /* Use rfind here not find, as theres more\r * chance of the \r being near the end of the\r * string, not the start.\r */\r if (ret.find("\r") != std::string::npos)\r ret = in_buffer.substr(0,in_buffer.find("\r")-1);\r /* Process this one, abort if it\r * didnt return true.\r */\r if (!this->ProcessLine(ret))\r {\r return false;\r }\r }\r return true;\r }\r /* EAGAIN returns an empty but non-NULL string, so this\r * evaluates to TRUE for EAGAIN but to FALSE for EOF.\r */\r return (data && !*data);\r}\r\r
\ No newline at end of file
+/* +------------------------------------+
+ * | Inspire Internet Relay Chat Daemon |
+ * +------------------------------------+
+ *
+ * InspIRCd: (C) 2002-2007 InspIRCd Development Team
+ * See: http://www.inspircd.org/wiki/index.php/Credits
+ *
+ * This program is free but copyrighted software; see
+ * the file COPYING for details.
+ *
+ * ---------------------------------------------------
+ */
+
+#include "inspircd.h"
+#include "configreader.h"
+#include "users.h"
+#include "channels.h"
+#include "modules.h"
+#include "commands/cmd_whois.h"
+#include "commands/cmd_stats.h"
+#include "socket.h"
+#include "wildcard.h"
+#include "xline.h"
+#include "transport.h"
+#include "m_hash.h"
+#include "socketengine.h"
+
+#include "m_spanningtree/main.h"
+#include "m_spanningtree/utils.h"
+#include "m_spanningtree/treeserver.h"
+#include "m_spanningtree/link.h"
+#include "m_spanningtree/treesocket.h"
+#include "m_spanningtree/resolvers.h"
+#include "m_spanningtree/handshaketimer.h"
+
+/* $ModDep: m_spanningtree/timesynctimer.h m_spanningtree/resolvers.h m_spanningtree/main.h m_spanningtree/utils.h m_spanningtree/treeserver.h m_spanningtree/link.h m_spanningtree/treesocket.h m_hash.h */
+
+
+/** Because most of the I/O gubbins are encapsulated within
+ * InspSocket, we just call the superclass constructor for
+ * most of the action, and append a few of our own values
+ * to it.
+ */
+TreeSocket::TreeSocket(SpanningTreeUtilities* Util, InspIRCd* SI, std::string host, int port, bool listening, unsigned long maxtime, Module* HookMod)
+ : InspSocket(SI, host, port, listening, maxtime), Utils(Util), Hook(HookMod)
+{
+ myhost = host;
+ this->LinkState = LISTENER;
+ theirchallenge.clear();
+ ourchallenge.clear();
+ if (listening && Hook)
+ InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();
+}
+
+TreeSocket::TreeSocket(SpanningTreeUtilities* Util, InspIRCd* SI, std::string host, int port, bool listening, unsigned long maxtime, const std::string &ServerName, const std::string &bindto, Module* HookMod)
+ : InspSocket(SI, host, port, listening, maxtime, bindto), Utils(Util), Hook(HookMod)
+{
+ myhost = ServerName;
+ theirchallenge.clear();
+ ourchallenge.clear();
+ this->LinkState = CONNECTING;
+ if (Hook)
+ InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();
+}
+
+/** When a listening socket gives us a new file descriptor,
+ * we must associate it with a socket without creating a new
+ * connection. This constructor is used for this purpose.
+ */
+TreeSocket::TreeSocket(SpanningTreeUtilities* Util, InspIRCd* SI, int newfd, char* ip, Module* HookMod)
+ : InspSocket(SI, newfd, ip), Utils(Util), Hook(HookMod)
+{
+ this->LinkState = WAIT_AUTH_1;
+ theirchallenge.clear();
+ ourchallenge.clear();
+ sentcapab = false;
+ /* If we have a transport module hooked to the parent, hook the same module to this
+ * socket, and set a timer waiting for handshake before we send CAPAB etc.
+ */
+ if (Hook)
+ InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();
+
+ Instance->Timers->AddTimer(new HandshakeTimer(Instance, this, &(Utils->LinkBlocks[0]), this->Utils, 1));
+}
+
+ServerState TreeSocket::GetLinkState()
+{
+ return this->LinkState;
+}
+
+Module* TreeSocket::GetHook()
+{
+ return this->Hook;
+}
+
+TreeSocket::~TreeSocket()
+{
+ if (Hook)
+ InspSocketUnhookRequest(this, (Module*)Utils->Creator, Hook).Send();
+
+ Utils->DelBurstingServer(this);
+}
+
+const std::string& TreeSocket::GetOurChallenge()
+{
+ return this->ourchallenge;
+}
+
+void TreeSocket::SetOurChallenge(const std::string &c)
+{
+ this->ourchallenge = c;
+}
+
+const std::string& TreeSocket::GetTheirChallenge()
+{
+ return this->theirchallenge;
+}
+
+void TreeSocket::SetTheirChallenge(const std::string &c)
+{
+ this->theirchallenge = c;
+}
+
+std::string TreeSocket::MakePass(const std::string &password, const std::string &challenge)
+{
+ /* This is a simple (maybe a bit hacky?) HMAC algorithm, thanks to jilles for
+ * suggesting the use of HMAC to secure the password against various attacks.
+ *
+ * Note: If m_sha256.so is not loaded, we MUST fall back to plaintext with no
+ * HMAC challenge/response.
+ */
+ Module* sha256 = Instance->FindModule("m_sha256.so");
+ if (Utils->ChallengeResponse && sha256 && !challenge.empty())
+ {
+ /* XXX: This is how HMAC is supposed to be done:
+ *
+ * sha256( (pass xor 0x5c) + sha256((pass xor 0x36) + m) )
+ *
+ * Note that we are encoding the hex hash, not the binary
+ * output of the hash which is slightly different to standard.
+ *
+ * Don't ask me why its always 0x5c and 0x36... it just is.
+ */
+ std::string hmac1, hmac2;
+
+ for (size_t n = 0; n < password.length(); n++)
+ {
+ hmac1 += static_cast<char>(password[n] ^ 0x5C);
+ hmac2 += static_cast<char>(password[n] ^ 0x36);
+ }
+
+ hmac2 += challenge;
+ HashResetRequest(Utils->Creator, sha256).Send();
+ hmac2 = HashSumRequest(Utils->Creator, sha256, hmac2).Send();
+
+ HashResetRequest(Utils->Creator, sha256).Send();
+ std::string hmac = hmac1 + hmac2;
+ hmac = HashSumRequest(Utils->Creator, sha256, hmac).Send();
+
+ return "HMAC-SHA256:"+ hmac;
+ }
+ else if (!challenge.empty() && !sha256)
+ Instance->Log(DEFAULT,"Not authenticating to server using SHA256/HMAC because we don't have m_sha256 loaded!");
+
+ return password;
+}
+
+/** When an outbound connection finishes connecting, we receive
+ * this event, and must send our SERVER string to the other
+ * side. If the other side is happy, as outlined in the server
+ * to server docs on the inspircd.org site, the other side
+ * will then send back its own server string.
+ */
+bool TreeSocket::OnConnected()
+{
+ if (this->LinkState == CONNECTING)
+ {
+ /* we do not need to change state here. */
+ for (std::vector<Link>::iterator x = Utils->LinkBlocks.begin(); x < Utils->LinkBlocks.end(); x++)
+ {
+ if (x->Name == this->myhost)
+ {
+ this->Instance->SNO->WriteToSnoMask('l',"Connection to \2"+myhost+"\2["+(x->HiddenFromStats ? "<hidden>" : this->GetIP())+"] started.");
+ if (Hook)
+ {
+ InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();
+ this->Instance->SNO->WriteToSnoMask('l',"Connection to \2"+myhost+"\2["+(x->HiddenFromStats ? "<hidden>" : this->GetIP())+"] using transport \2"+x->Hook+"\2");
+ }
+ this->OutboundPass = x->SendPass;
+ sentcapab = false;
+
+ /* found who we're supposed to be connecting to, send the neccessary gubbins. */
+ if (this->GetHook())
+ Instance->Timers->AddTimer(new HandshakeTimer(Instance, this, &(*x), this->Utils, 1));
+ else
+ this->SendCapabilities();
+
+ return true;
+ }
+ }
+ }
+ /* There is a (remote) chance that between the /CONNECT and the connection
+ * being accepted, some muppet has removed the <link> block and rehashed.
+ * If that happens the connection hangs here until it's closed. Unlikely
+ * and rather harmless.
+ */
+ this->Instance->SNO->WriteToSnoMask('l',"Connection to \2"+myhost+"\2 lost link tag(!)");
+ return true;
+}
+
+void TreeSocket::OnError(InspSocketError e)
+{
+ Link* MyLink;
+
+ if (this->LinkState == LISTENER)
+ return;
+
+ switch (e)
+ {
+ case I_ERR_CONNECT:
+ this->Instance->SNO->WriteToSnoMask('l',"Connection failed: Connection to \002"+myhost+"\002 refused");
+ MyLink = Utils->FindLink(myhost);
+ if (MyLink)
+ Utils->DoFailOver(MyLink);
+ break;
+ case I_ERR_SOCKET:
+ this->Instance->SNO->WriteToSnoMask('l',"Connection failed: Could not create socket");
+ break;
+ case I_ERR_BIND:
+ this->Instance->SNO->WriteToSnoMask('l',"Connection failed: Error binding socket to address or port");
+ break;
+ case I_ERR_WRITE:
+ this->Instance->SNO->WriteToSnoMask('l',"Connection failed: I/O error on connection");
+ break;
+ case I_ERR_NOMOREFDS:
+ this->Instance->SNO->WriteToSnoMask('l',"Connection failed: Operating system is out of file descriptors!");
+ break;
+ default:
+ if ((errno) && (errno != EINPROGRESS) && (errno != EAGAIN))
+ {
+ std::string errstr = strerror(errno);
+ this->Instance->SNO->WriteToSnoMask('l',"Connection to \002"+myhost+"\002 failed with OS error: " + errstr);
+ }
+ break;
+ }
+}
+
+int TreeSocket::OnDisconnect()
+{
+ /* For the same reason as above, we don't
+ * handle OnDisconnect()
+ */
+ return true;
+}
+
+/** Recursively send the server tree with distances as hops.
+ * This is used during network burst to inform the other server
+ * (and any of ITS servers too) of what servers we know about.
+ * If at any point any of these servers already exist on the other
+ * end, our connection may be terminated. The hopcounts given
+ * by this function are relative, this doesn't matter so long as
+ * they are all >1, as all the remote servers re-calculate them
+ * to be relative too, with themselves as hop 0.
+ */
+void TreeSocket::SendServers(TreeServer* Current, TreeServer* s, int hops)
+{
+ char command[1024];
+ for (unsigned int q = 0; q < Current->ChildCount(); q++)
+ {
+ TreeServer* recursive_server = Current->GetChild(q);
+ if (recursive_server != s)
+ {
+ snprintf(command,1024,":%s SERVER %s * %d :%s",Current->GetName().c_str(),recursive_server->GetName().c_str(),hops,recursive_server->GetDesc().c_str());
+ this->WriteLine(command);
+ this->WriteLine(":"+recursive_server->GetName()+" VERSION :"+recursive_server->GetVersion());
+ /* down to next level */
+ this->SendServers(recursive_server, s, hops+1);
+ }
+ }
+}
+
+std::string TreeSocket::MyCapabilities()
+{
+ std::vector<std::string> modlist;
+ std::string capabilities;
+ for (int i = 0; i <= this->Instance->GetModuleCount(); i++)
+ {
+ if (this->Instance->modules[i]->GetVersion().Flags & VF_COMMON)
+ modlist.push_back(this->Instance->Config->module_names[i]);
+ }
+ sort(modlist.begin(),modlist.end());
+ for (unsigned int i = 0; i < modlist.size(); i++)
+ {
+ if (i)
+ capabilities = capabilities + ",";
+ capabilities = capabilities + modlist[i];
+ }
+ return capabilities;
+}
+
+std::string TreeSocket::RandString(unsigned int length)
+{
+ char* randombuf = new char[length+1];
+ std::string out;
+#ifdef WINDOWS
+ int fd = -1;
+#else
+ int fd = open("/dev/urandom", O_RDONLY, 0);
+#endif
+
+ if (fd >= 0)
+ {
+#ifndef WINDOWS
+ read(fd, randombuf, length);
+ close(fd);
+#endif
+ }
+ else
+ {
+ for (unsigned int i = 0; i < length; i++)
+ randombuf[i] = rand();
+ }
+
+ for (unsigned int i = 0; i < length; i++)
+ {
+ char randchar = static_cast<char>((randombuf[i] & 0x7F) | 0x21);
+ out += (randchar == '=' ? '_' : randchar);
+ }
+
+ delete[] randombuf;
+ return out;
+}
+
+void TreeSocket::SendCapabilities()
+{
+ if (sentcapab)
+ return;
+
+ sentcapab = true;
+ irc::commasepstream modulelist(MyCapabilities());
+ this->WriteLine("CAPAB START");
+
+ /* Send module names, split at 509 length */
+ std::string item = "*";
+ std::string line = "CAPAB MODULES ";
+ while ((item = modulelist.GetToken()) != "")
+ {
+ if (line.length() + item.length() + 1 > 509)
+ {
+ this->WriteLine(line);
+ line = "CAPAB MODULES ";
+ }
+
+ if (line != "CAPAB MODULES ")
+ line.append(",");
+
+ line.append(item);
+ }
+ if (line != "CAPAB MODULES ")
+ this->WriteLine(line);
+
+ int ip6 = 0;
+ int ip6support = 0;
+#ifdef IPV6
+ ip6 = 1;
+#endif
+#ifdef SUPPORT_IP6LINKS
+ ip6support = 1;
+#endif
+ std::string extra;
+ /* Do we have sha256 available? If so, we send a challenge */
+ if (Utils->ChallengeResponse && (Instance->FindModule("m_sha256.so")))
+ {
+ this->SetOurChallenge(RandString(20));
+ extra = " CHALLENGE=" + this->GetOurChallenge();
+ }
+
+ this->WriteLine("CAPAB CAPABILITIES :NICKMAX="+ConvToStr(NICKMAX)+" HALFOP="+ConvToStr(this->Instance->Config->AllowHalfop)+" CHANMAX="+ConvToStr(CHANMAX)+" MAXMODES="+ConvToStr(MAXMODES)+" IDENTMAX="+ConvToStr(IDENTMAX)+" MAXQUIT="+ConvToStr(MAXQUIT)+" MAXTOPIC="+ConvToStr(MAXTOPIC)+" MAXKICK="+ConvToStr(MAXKICK)+" MAXGECOS="+ConvToStr(MAXGECOS)+" MAXAWAY="+ConvToStr(MAXAWAY)+" IP6NATIVE="+ConvToStr(ip6)+" IP6SUPPORT="+ConvToStr(ip6support)+" PROTOCOL="+ConvToStr(ProtocolVersion)+extra+" PREFIX="+Instance->Modes->BuildPrefixes()+" CHANMODES="+Instance->Modes->ChanModes());
+
+ this->WriteLine("CAPAB END");
+}
+
+/* Check a comma seperated list for an item */
+bool TreeSocket::HasItem(const std::string &list, const std::string &item)
+{
+ irc::commasepstream seplist(list);
+ std::string item2 = "*";
+ while ((item2 = seplist.GetToken()) != "")
+ {
+ if (item2 == item)
+ return true;
+ }
+ return false;
+}
+
+/* Isolate and return the elements that are different between two comma seperated lists */
+std::string TreeSocket::ListDifference(const std::string &one, const std::string &two)
+{
+ irc::commasepstream list_one(one);
+ std::string item = "*";
+ std::string result;
+ while ((item = list_one.GetToken()) != "")
+ {
+ if (!HasItem(two, item))
+ {
+ result.append(" ");
+ result.append(item);
+ }
+ }
+ return result;
+}
+
+void TreeSocket::SendError(const std::string &errormessage)
+{
+ /* Display the error locally as well as sending it remotely */
+ this->WriteLine("ERROR :"+errormessage);
+ this->Instance->SNO->WriteToSnoMask('l',"Sent \2ERROR\2 to "+ (this->InboundServerName.empty() ? "<unknown>" : this->InboundServerName) +": "+errormessage);
+ /* One last attempt to make sure the error reaches its target */
+ this->FlushWriteBuffer();
+}
+
+bool TreeSocket::Capab(const std::deque<std::string> ¶ms)
+{
+ if (params.size() < 1)
+ {
+ this->SendError("Invalid number of parameters for CAPAB - Mismatched version");
+ return false;
+ }
+ if (params[0] == "START")
+ {
+ this->ModuleList.clear();
+ this->CapKeys.clear();
+ }
+ else if (params[0] == "END")
+ {
+ std::string reason;
+ int ip6support = 0;
+#ifdef SUPPORT_IP6LINKS
+ ip6support = 1;
+#endif
+ /* Compare ModuleList and check CapKeys...
+ * Maybe this could be tidier? -- Brain
+ */
+ if ((this->ModuleList != this->MyCapabilities()) && (this->ModuleList.length()))
+ {
+ std::string diff = ListDifference(this->ModuleList, this->MyCapabilities());
+ if (!diff.length())
+ {
+ diff = "your server:" + ListDifference(this->MyCapabilities(), this->ModuleList);
+ }
+ else
+ {
+ diff = "this server:" + diff;
+ }
+ if (diff.length() == 12)
+ reason = "Module list in CAPAB is not alphabetically ordered, cannot compare lists.";
+ else
+ reason = "Modules loaded on these servers are not correctly matched, these modules are not loaded on " + diff;
+ }
+
+ cap_validation valid_capab[] = {
+ {"Maximum nickname lengths differ or remote nickname length not specified", "NICKMAX", NICKMAX},
+ {"Maximum ident lengths differ or remote ident length not specified", "IDENTMAX", IDENTMAX},
+ {"Maximum channel lengths differ or remote channel length not specified", "CHANMAX", CHANMAX},
+ {"Maximum modes per line differ or remote modes per line not specified", "MAXMODES", MAXMODES},
+ {"Maximum quit lengths differ or remote quit length not specified", "MAXQUIT", MAXQUIT},
+ {"Maximum topic lengths differ or remote topic length not specified", "MAXTOPIC", MAXTOPIC},
+ {"Maximum kick lengths differ or remote kick length not specified", "MAXKICK", MAXKICK},
+ {"Maximum GECOS (fullname) lengths differ or remote GECOS length not specified", "MAXGECOS", MAXGECOS},
+ {"Maximum awaymessage lengths differ or remote awaymessage length not specified", "MAXAWAY", MAXAWAY},
+ {"", "", 0}
+ };
+
+ if (((this->CapKeys.find("IP6SUPPORT") == this->CapKeys.end()) && (ip6support)) || ((this->CapKeys.find("IP6SUPPORT") != this->CapKeys.end()) && (this->CapKeys.find("IP6SUPPORT")->second != ConvToStr(ip6support))))
+ reason = "We don't both support linking to IPV6 servers";
+ if (((this->CapKeys.find("IP6NATIVE") != this->CapKeys.end()) && (this->CapKeys.find("IP6NATIVE")->second == "1")) && (!ip6support))
+ reason = "The remote server is IPV6 native, and we don't support linking to IPV6 servers";
+ if (((this->CapKeys.find("PROTOCOL") == this->CapKeys.end()) || ((this->CapKeys.find("PROTOCOL") != this->CapKeys.end()) && (this->CapKeys.find("PROTOCOL")->second != ConvToStr(ProtocolVersion)))))
+ {
+ if (this->CapKeys.find("PROTOCOL") != this->CapKeys.end())
+ reason = "Mismatched protocol versions "+this->CapKeys.find("PROTOCOL")->second+" and "+ConvToStr(ProtocolVersion);
+ else
+ reason = "Protocol version not specified";
+ }
+
+ if(this->CapKeys.find("PREFIX") != this->CapKeys.end() && this->CapKeys.find("PREFIX")->second != this->Instance->Modes->BuildPrefixes())
+ reason = "One or more of the prefixes on the remote server are invalid on this server.";
+
+ if (((this->CapKeys.find("HALFOP") == this->CapKeys.end()) && (Instance->Config->AllowHalfop)) || ((this->CapKeys.find("HALFOP") != this->CapKeys.end()) && (this->CapKeys.find("HALFOP")->second != ConvToStr(Instance->Config->AllowHalfop))))
+ reason = "We don't both have halfop support enabled/disabled identically";
+
+ for (int x = 0; valid_capab[x].size; ++x)
+ {
+ if (((this->CapKeys.find(valid_capab[x].key) == this->CapKeys.end()) || ((this->CapKeys.find(valid_capab[x].key) != this->CapKeys.end()) &&
+ (this->CapKeys.find(valid_capab[x].key)->second != ConvToStr(valid_capab[x].size)))))
+ reason = valid_capab[x].reason;
+ }
+
+ /* Challenge response, store their challenge for our password */
+ std::map<std::string,std::string>::iterator n = this->CapKeys.find("CHALLENGE");
+ if (Utils->ChallengeResponse && (n != this->CapKeys.end()) && (Instance->FindModule("m_sha256.so")))
+ {
+ /* Challenge-response is on now */
+ this->SetTheirChallenge(n->second);
+ if (!this->GetTheirChallenge().empty() && (this->LinkState == CONNECTING))
+ {
+ this->WriteLine(std::string("SERVER ")+this->Instance->Config->ServerName+" "+this->MakePass(OutboundPass, this->GetTheirChallenge())+" 0 :"+this->Instance->Config->ServerDesc);
+ }
+ }
+ else
+ {
+ /* They didnt specify a challenge or we don't have m_sha256.so, we use plaintext */
+ if (this->LinkState == CONNECTING)
+ this->WriteLine(std::string("SERVER ")+this->Instance->Config->ServerName+" "+OutboundPass+" 0 :"+this->Instance->Config->ServerDesc);
+ }
+
+ if (reason.length())
+ {
+ this->SendError("CAPAB negotiation failed: "+reason);
+ return false;
+ }
+ }
+ else if ((params[0] == "MODULES") && (params.size() == 2))
+ {
+ if (!this->ModuleList.length())
+ {
+ this->ModuleList.append(params[1]);
+ }
+ else
+ {
+ this->ModuleList.append(",");
+ this->ModuleList.append(params[1]);
+ }
+ }
+
+ else if ((params[0] == "CAPABILITIES") && (params.size() == 2))
+ {
+ irc::tokenstream capabs(params[1]);
+ std::string item;
+ bool more = true;
+ while ((more = capabs.GetToken(item)))
+ {
+ /* Process each key/value pair */
+ std::string::size_type equals = item.rfind('=');
+ if (equals != std::string::npos)
+ {
+ std::string var = item.substr(0, equals);
+ std::string value = item.substr(equals+1, item.length());
+ CapKeys[var] = value;
+ }
+ }
+ }
+ return true;
+}
+
+/** This function forces this server to quit, removing this server
+ * and any users on it (and servers and users below that, etc etc).
+ * It's very slow and pretty clunky, but luckily unless your network
+ * is having a REAL bad hair day, this function shouldnt be called
+ * too many times a month ;-)
+ */
+void TreeSocket::SquitServer(std::string &from, TreeServer* Current)
+{
+ /* recursively squit the servers attached to 'Current'.
+ * We're going backwards so we don't remove users
+ * while we still need them ;)
+ */
+ for (unsigned int q = 0; q < Current->ChildCount(); q++)
+ {
+ TreeServer* recursive_server = Current->GetChild(q);
+ this->SquitServer(from,recursive_server);
+ }
+ /* Now we've whacked the kids, whack self */
+ num_lost_servers++;
+ num_lost_users += Current->QuitUsers(from);
+}
+
+/** This is a wrapper function for SquitServer above, which
+ * does some validation first and passes on the SQUIT to all
+ * other remaining servers.
+ */
+void TreeSocket::Squit(TreeServer* Current, const std::string &reason)
+{
+ if ((Current) && (Current != Utils->TreeRoot))
+ {
+ Event rmode((char*)Current->GetName().c_str(), (Module*)Utils->Creator, "lost_server");
+ rmode.Send(Instance);
+
+ std::deque<std::string> params;
+ params.push_back(Current->GetName());
+ params.push_back(":"+reason);
+ Utils->DoOneToAllButSender(Current->GetParent()->GetName(),"SQUIT",params,Current->GetName());
+ if (Current->GetParent() == Utils->TreeRoot)
+ {
+ this->Instance->SNO->WriteToSnoMask('l',"Server \002"+Current->GetName()+"\002 split: "+reason);
+ }
+ else
+ {
+ this->Instance->SNO->WriteToSnoMask('l',"Server \002"+Current->GetName()+"\002 split from server \002"+Current->GetParent()->GetName()+"\002 with reason: "+reason);
+ }
+ num_lost_servers = 0;
+ num_lost_users = 0;
+ std::string from = Current->GetParent()->GetName()+" "+Current->GetName();
+ SquitServer(from, Current);
+ Current->Tidy();
+ Current->GetParent()->DelChild(Current);
+ DELETE(Current);
+ this->Instance->SNO->WriteToSnoMask('l',"Netsplit complete, lost \002%d\002 users on \002%d\002 servers.", num_lost_users, num_lost_servers);
+ }
+ else
+ Instance->Log(DEFAULT,"Squit from unknown server");
+}
+
+/** FMODE command - server mode with timestamp checks */
+bool TreeSocket::ForceMode(const std::string &source, std::deque<std::string> ¶ms)
+{
+ /* Chances are this is a 1.0 FMODE without TS */
+ if (params.size() < 3)
+ {
+ /* No modes were in the command, probably a channel with no modes set on it */
+ return true;
+ }
+
+ bool smode = false;
+ std::string sourceserv;
+ /* Are we dealing with an FMODE from a user, or from a server? */
+ userrec* who = this->Instance->FindNick(source);
+ if (who)
+ {
+ /* FMODE from a user, set sourceserv to the users server name */
+ sourceserv = who->server;
+ }
+ else
+ {
+ /* FMODE from a server, create a fake user to receive mode feedback */
+ who = new userrec(this->Instance);
+ who->SetFd(FD_MAGIC_NUMBER);
+ smode = true; /* Setting this flag tells us we should free the userrec later */
+ sourceserv = source; /* Set sourceserv to the actual source string */
+ }
+ const char* modelist[64];
+ time_t TS = 0;
+ int n = 0;
+ memset(&modelist,0,sizeof(modelist));
+ for (unsigned int q = 0; (q < params.size()) && (q < 64); q++)
+ {
+ if (q == 1)
+ {
+ /* The timestamp is in this position.
+ * We don't want to pass that up to the
+ * server->client protocol!
+ */
+ TS = atoi(params[q].c_str());
+ }
+ else
+ {
+ /* Everything else is fine to append to the modelist */
+ modelist[n++] = params[q].c_str();
+ }
+
+ }
+ /* Extract the TS value of the object, either userrec or chanrec */
+ userrec* dst = this->Instance->FindNick(params[0]);
+ chanrec* chan = NULL;
+ time_t ourTS = 0;
+ if (dst)
+ {
+ ourTS = dst->age;
+ }
+ else
+ {
+ chan = this->Instance->FindChan(params[0]);
+ if (chan)
+ {
+ ourTS = chan->age;
+ }
+ else
+ /* Oops, channel doesnt exist! */
+ return true;
+ }
+
+ if (!TS)
+ {
+ Instance->Log(DEFAULT,"*** BUG? *** TS of 0 sent to FMODE. Are some services authors smoking craq, or is it 1970 again?. Dropped.");
+ Instance->SNO->WriteToSnoMask('d', "WARNING: The server %s is sending FMODE with a TS of zero. Total craq. Mode was dropped.", sourceserv.c_str());
+ return true;
+ }
+
+ /* TS is equal or less: Merge the mode changes into ours and pass on.
+ */
+ if (TS <= ourTS)
+ {
+ if ((TS < ourTS) && (!dst))
+ Instance->Log(DEFAULT,"*** BUG *** Channel TS sent in FMODE to %s is %lu which is not equal to %lu!", params[0].c_str(), TS, ourTS);
+
+ if (smode)
+ {
+ this->Instance->SendMode(modelist, n, who);
+ }
+ else
+ {
+ this->Instance->CallCommandHandler("MODE", modelist, n, who);
+ }
+ /* HOT POTATO! PASS IT ON! */
+ Utils->DoOneToAllButSender(source,"FMODE",params,sourceserv);
+ }
+ /* If the TS is greater than ours, we drop the mode and dont pass it anywhere.
+ */
+
+ if (smode)
+ DELETE(who);
+
+ return true;
+}
+
+/** FTOPIC command */
+bool TreeSocket::ForceTopic(const std::string &source, std::deque<std::string> ¶ms)
+{
+ if (params.size() != 4)
+ return true;
+ time_t ts = atoi(params[1].c_str());
+ std::string nsource = source;
+ chanrec* c = this->Instance->FindChan(params[0]);
+ if (c)
+ {
+ if ((ts >= c->topicset) || (!*c->topic))
+ {
+ std::string oldtopic = c->topic;
+ strlcpy(c->topic,params[3].c_str(),MAXTOPIC);
+ strlcpy(c->setby,params[2].c_str(),127);
+ c->topicset = ts;
+ /* if the topic text is the same as the current topic,
+ * dont bother to send the TOPIC command out, just silently
+ * update the set time and set nick.
+ */
+ if (oldtopic != params[3])
+ {
+ userrec* user = this->Instance->FindNick(source);
+ if (!user)
+ {
+ c->WriteChannelWithServ(Instance->Config->ServerName, "TOPIC %s :%s", c->name, c->topic);
+ }
+ else
+ {
+ c->WriteChannel(user, "TOPIC %s :%s", c->name, c->topic);
+ nsource = user->server;
+ }
+ /* all done, send it on its way */
+ params[3] = ":" + params[3];
+ Utils->DoOneToAllButSender(source,"FTOPIC",params,nsource);
+ }
+ }
+
+ }
+ return true;
+}
+
+/** FJOIN, similar to TS6 SJOIN, but not quite. */
+bool TreeSocket::ForceJoin(const std::string &source, std::deque<std::string> ¶ms)
+{
+ /* 1.1 FJOIN works as follows:
+ *
+ * Each FJOIN is sent along with a timestamp, and the side with the lowest
+ * timestamp 'wins'. From this point on we will refer to this side as the
+ * winner. The side with the higher timestamp loses, from this point on we
+ * will call this side the loser or losing side. This should be familiar to
+ * anyone who's dealt with dreamforge or TS6 before.
+ *
+ * When two sides of a split heal and this occurs, the following things
+ * will happen:
+ *
+ * If the timestamps are exactly equal, both sides merge their privilages
+ * and users, as in InspIRCd 1.0 and ircd2.8. The channels have not been
+ * re-created during a split, this is safe to do.
+ *
+ * If the timestamps are NOT equal, the losing side removes all of its
+ * modes from the channel, before introducing new users into the channel
+ * which are listed in the FJOIN command's parameters. The losing side then
+ * LOWERS its timestamp value of the channel to match that of the winning
+ * side, and the modes of the users of the winning side are merged in with
+ * the losing side.
+ *
+ * The winning side on the other hand will ignore all user modes from the
+ * losing side, so only its own modes get applied. Life is simple for those
+ * who succeed at internets. :-)
+ *
+ * NOTE: Unlike TS6 and dreamforge and other protocols which have SJOIN,
+ * FJOIN does not contain the simple-modes such as +iklmnsp. Why not,
+ * you ask? Well, quite simply because we don't need to. They'll be sent
+ * after the FJOIN by FMODE, and FMODE is timestamped, so in the event
+ * the losing side sends any modes for the channel which shouldnt win,
+ * they wont as their timestamp will be too high :-)
+ */
+
+ if (params.size() < 3)
+ return true;
+
+ irc::modestacker modestack(true); /* Modes to apply from the users in the user list */
+ userrec* who = NULL; /* User we are currently checking */
+ std::string channel = params[0]; /* Channel name, as a string */
+ time_t TS = atoi(params[1].c_str()); /* Timestamp given to us for remote side */
+ irc::tokenstream users(params[2]); /* Users from the user list */
+ bool apply_other_sides_modes = true; /* True if we are accepting the other side's modes */
+ chanrec* chan = this->Instance->FindChan(channel); /* The channel we're sending joins to */
+ time_t ourTS = chan ? chan->age : Instance->Time(true)+600; /* The TS of our side of the link */
+ bool created = !chan; /* True if the channel doesnt exist here yet */
+ std::string item; /* One item in the list of nicks */
+
+ params[2] = ":" + params[2];
+ Utils->DoOneToAllButSender(source,"FJOIN",params,source);
+
+ if (!TS)
+ {
+ Instance->Log(DEFAULT,"*** BUG? *** TS of 0 sent to FJOIN. Are some services authors smoking craq, or is it 1970 again?. Dropped.");
+ Instance->SNO->WriteToSnoMask('d', "WARNING: The server %s is sending FJOIN with a TS of zero. Total craq. Command was dropped.", source.c_str());
+ return true;
+ }
+
+ /* If our TS is less than theirs, we dont accept their modes */
+ if (ourTS < TS)
+ apply_other_sides_modes = false;
+
+ /* Our TS greater than theirs, clear all our modes from the channel, accept theirs. */
+ if (ourTS > TS)
+ {
+ std::deque<std::string> param_list;
+ if (Utils->AnnounceTSChange && chan)
+ chan->WriteChannelWithServ(Instance->Config->ServerName, "NOTICE %s :TS for %s changed from %lu to %lu", chan->name, chan->name, ourTS, TS);
+ ourTS = TS;
+ if (!created)
+ {
+ chan->age = TS;
+ param_list.push_back(channel);
+ this->RemoveStatus(Instance->Config->ServerName, param_list);
+ }
+ }
+
+ /* Now, process every 'prefixes,nick' pair */
+ while (users.GetToken(item))
+ {
+ const char* usr = item.c_str();
+ if (usr && *usr)
+ {
+ const char* permissions = usr;
+ /* Iterate through all the prefix values, convert them from prefixes to mode letters */
+ std::string modes;
+ while ((*permissions) && (*permissions != ','))
+ {
+ ModeHandler* mh = Instance->Modes->FindPrefix(*permissions);
+ if (mh)
+ modes = modes + mh->GetModeChar();
+ else
+ {
+ this->SendError(std::string("Invalid prefix '")+(*permissions)+"' in FJOIN");
+ return false;
+ }
+ usr++;
+ permissions++;
+ }
+ /* Advance past the comma, to the nick */
+ usr++;
+
+ /* Check the user actually exists */
+ who = this->Instance->FindNick(usr);
+ if (who)
+ {
+ /* Check that the user's 'direction' is correct */
+ TreeServer* route_back_again = Utils->BestRouteTo(who->server);
+ if ((!route_back_again) || (route_back_again->GetSocket() != this))
+ continue;
+
+ /* Add any permissions this user had to the mode stack */
+ for (std::string::iterator x = modes.begin(); x != modes.end(); ++x)
+ modestack.Push(*x, who->nick);
+
+ chanrec::JoinUser(this->Instance, who, channel.c_str(), true, "", TS);
+ }
+ else
+ {
+ Instance->Log(SPARSE,"Warning! Invalid user %s in FJOIN to channel %s IGNORED", usr, channel.c_str());
+ continue;
+ }
+ }
+ }
+
+ /* Flush mode stacker if we lost the FJOIN or had equal TS */
+ if (apply_other_sides_modes)
+ {
+ std::deque<std::string> stackresult;
+ const char* mode_junk[MAXMODES+2];
+ userrec* n = new userrec(Instance);
+ n->SetFd(FD_MAGIC_NUMBER);
+ mode_junk[0] = channel.c_str();
+
+ while (modestack.GetStackedLine(stackresult))
+ {
+ for (size_t j = 0; j < stackresult.size(); j++)
+ {
+ mode_junk[j+1] = stackresult[j].c_str();
+ }
+ Instance->SendMode(mode_junk, stackresult.size() + 1, n);
+ }
+
+ delete n;
+ }
+
+ return true;
+}
+
+/** NICK command */
+bool TreeSocket::IntroduceClient(const std::string &source, std::deque<std::string> ¶ms)
+{
+ /** Do we have enough parameters:
+ * NICK age nick host dhost ident +modes ip :gecos
+ */
+ if (params.size() != 8)
+ {
+ this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction ("+params[1]+"?)");
+ return true;
+ }
+
+ time_t age = ConvToInt(params[0]);
+ const char* tempnick = params[1].c_str();
+ std::string empty;
+
+ cmd_validation valid[] = { {"Nickname", 1, NICKMAX}, {"Hostname", 2, 64}, {"Displayed hostname", 3, 64}, {"Ident", 4, IDENTMAX}, {"GECOS", 7, MAXGECOS}, {"", 0, 0} };
+
+ TreeServer* remoteserver = Utils->FindServer(source);
+ if (!remoteserver)
+ {
+ this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction (Unknown server "+source+")");
+ return true;
+ }
+
+ /* Check parameters for validity before introducing the client, discovered by dmb */
+ if (!age)
+ {
+ this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction (Invalid TS?)");
+ return true;
+ }
+ for (size_t x = 0; valid[x].length; ++x)
+ {
+ if (params[valid[x].param].length() > valid[x].length)
+ {
+ this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[1]+" :Invalid client introduction (" + valid[x].item + " > " + ConvToStr(valid[x].length) + ")");
+ return true;
+ }
+ }
+
+ /** Our client looks ok, lets introduce it now
+ */
+ Instance->Log(DEBUG,"New remote client %s",tempnick);
+ user_hash::iterator iter = this->Instance->clientlist->find(tempnick);
+
+ if (iter != this->Instance->clientlist->end())
+ {
+ /* nick collision */
+ this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+tempnick+" :Nickname collision");
+ userrec::QuitUser(this->Instance, iter->second, "Nickname collision");
+ return true;
+ }
+
+ userrec* _new = new userrec(this->Instance);
+ (*(this->Instance->clientlist))[tempnick] = _new;
+ _new->SetFd(FD_MAGIC_NUMBER);
+ strlcpy(_new->nick, tempnick,NICKMAX-1);
+ strlcpy(_new->host, params[2].c_str(),64);
+ strlcpy(_new->dhost, params[3].c_str(),64);
+ _new->server = this->Instance->FindServerNamePtr(source.c_str());
+ strlcpy(_new->ident, params[4].c_str(),IDENTMAX);
+ strlcpy(_new->fullname, params[7].c_str(),MAXGECOS);
+ _new->registered = REG_ALL;
+ _new->signon = age;
+
+ /* we need to remove the + from the modestring, so we can do our stuff */
+ std::string::size_type pos_after_plus = params[5].find_first_not_of('+');
+ if (pos_after_plus != std::string::npos)
+ params[5] = params[5].substr(pos_after_plus);
+
+ for (std::string::iterator v = params[5].begin(); v != params[5].end(); v++)
+ {
+ /* For each mode thats set, increase counter */
+ ModeHandler* mh = Instance->Modes->FindMode(*v, MODETYPE_USER);
+ if (mh)
+ {
+ mh->OnModeChange(_new, _new, NULL, empty, true);
+ _new->SetMode(*v, true);
+ mh->ChangeCount(1);
+ }
+ }
+
+ /* now we've done with modes processing, put the + back for remote servers */
+ params[5] = "+" + params[5];
+
+#ifdef SUPPORT_IP6LINKS
+ if (params[6].find_first_of(":") != std::string::npos)
+ _new->SetSockAddr(AF_INET6, params[6].c_str(), 0);
+ else
+#endif
+ _new->SetSockAddr(AF_INET, params[6].c_str(), 0);
+
+ Instance->AddGlobalClone(_new);
+
+ bool dosend = !(((this->Utils->quiet_bursts) && (this->bursting || Utils->FindRemoteBurstServer(remoteserver))) || (this->Instance->SilentULine(_new->server)));
+
+ if (dosend)
+ this->Instance->SNO->WriteToSnoMask('C',"Client connecting at %s: %s!%s@%s [%s] [%s]",_new->server,_new->nick,_new->ident,_new->host, _new->GetIPString(), _new->fullname);
+
+ params[7] = ":" + params[7];
+ Utils->DoOneToAllButSender(source,"NICK", params, source);
+
+ // Increment the Source Servers User Count..
+ TreeServer* SourceServer = Utils->FindServer(source);
+ if (SourceServer)
+ {
+ SourceServer->AddUserCount();
+ }
+
+ FOREACH_MOD_I(Instance,I_OnPostConnect,OnPostConnect(_new));
+
+ return true;
+}
+
+/** Send one or more FJOINs for a channel of users.
+ * If the length of a single line is more than 480-NICKMAX
+ * in length, it is split over multiple lines.
+ */
+void TreeSocket::SendFJoins(TreeServer* Current, chanrec* c)
+{
+ std::string buffer;
+ char list[MAXBUF];
+ std::string individual_halfops = std::string(":")+this->Instance->Config->ServerName+" FMODE "+c->name+" "+ConvToStr(c->age);
+
+ size_t dlen, curlen;
+ dlen = curlen = snprintf(list,MAXBUF,":%s FJOIN %s %lu",this->Instance->Config->ServerName,c->name,(unsigned long)c->age);
+ int numusers = 0;
+ char* ptr = list + dlen;
+
+ CUList *ulist = c->GetUsers();
+ std::string modes;
+ std::string params;
+
+ for (CUList::iterator i = ulist->begin(); i != ulist->end(); i++)
+ {
+ // The first parameter gets a : before it
+ size_t ptrlen = snprintf(ptr, MAXBUF, " %s%s,%s", !numusers ? ":" : "", c->GetAllPrefixChars(i->first), i->first->nick);
+
+ curlen += ptrlen;
+ ptr += ptrlen;
+
+ numusers++;
+
+ if (curlen > (480-NICKMAX))
+ {
+ buffer.append(list).append("\r\n");
+ dlen = curlen = snprintf(list,MAXBUF,":%s FJOIN %s %lu",this->Instance->Config->ServerName,c->name,(unsigned long)c->age);
+ ptr = list + dlen;
+ ptrlen = 0;
+ numusers = 0;
+ }
+ }
+
+ if (numusers)
+ buffer.append(list).append("\r\n");
+
+ buffer.append(":").append(this->Instance->Config->ServerName).append(" FMODE ").append(c->name).append(" ").append(ConvToStr(c->age)).append(" +").append(c->ChanModes(true)).append("\r\n");
+
+ int linesize = 1;
+ for (BanList::iterator b = c->bans.begin(); b != c->bans.end(); b++)
+ {
+ int size = strlen(b->data) + 2;
+ int currsize = linesize + size;
+ if (currsize <= 350)
+ {
+ modes.append("b");
+ params.append(" ").append(b->data);
+ linesize += size;
+ }
+ if ((params.length() >= MAXMODES) || (currsize > 350))
+ {
+ /* Wrap at MAXMODES */
+ buffer.append(":").append(this->Instance->Config->ServerName).append(" FMODE ").append(c->name).append(" ").append(ConvToStr(c->age)).append(" +").append(modes).append(params).append("\r\n");
+ modes.clear();
+ params.clear();
+ linesize = 1;
+ }
+ }
+
+ /* Only send these if there are any */
+ if (!modes.empty())
+ buffer.append(":").append(this->Instance->Config->ServerName).append(" FMODE ").append(c->name).append(" ").append(ConvToStr(c->age)).append(" +").append(modes).append(params);
+
+ this->WriteLine(buffer);
+}
+
+/** Send G, Q, Z and E lines */
+void TreeSocket::SendXLines(TreeServer* Current)
+{
+ char data[MAXBUF];
+ std::string buffer;
+ std::string n = this->Instance->Config->ServerName;
+ const char* sn = n.c_str();
+ /* Yes, these arent too nice looking, but they get the job done */
+ for (std::vector<ZLine*>::iterator i = Instance->XLines->zlines.begin(); i != Instance->XLines->zlines.end(); i++)
+ {
+ snprintf(data,MAXBUF,":%s ADDLINE Z %s %s %lu %lu :%s\r\n",sn,(*i)->ipaddr,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
+ buffer.append(data);
+ }
+ for (std::vector<QLine*>::iterator i = Instance->XLines->qlines.begin(); i != Instance->XLines->qlines.end(); i++)
+ {
+ snprintf(data,MAXBUF,":%s ADDLINE Q %s %s %lu %lu :%s\r\n",sn,(*i)->nick,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
+ buffer.append(data);
+ }
+ for (std::vector<GLine*>::iterator i = Instance->XLines->glines.begin(); i != Instance->XLines->glines.end(); i++)
+ {
+ snprintf(data,MAXBUF,":%s ADDLINE G %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
+ buffer.append(data);
+ }
+ for (std::vector<ELine*>::iterator i = Instance->XLines->elines.begin(); i != Instance->XLines->elines.end(); i++)
+ {
+ snprintf(data,MAXBUF,":%s ADDLINE E %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
+ buffer.append(data);
+ }
+ for (std::vector<ZLine*>::iterator i = Instance->XLines->pzlines.begin(); i != Instance->XLines->pzlines.end(); i++)
+ {
+ snprintf(data,MAXBUF,":%s ADDLINE Z %s %s %lu %lu :%s\r\n",sn,(*i)->ipaddr,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
+ buffer.append(data);
+ }
+ for (std::vector<QLine*>::iterator i = Instance->XLines->pqlines.begin(); i != Instance->XLines->pqlines.end(); i++)
+ {
+ snprintf(data,MAXBUF,":%s ADDLINE Q %s %s %lu %lu :%s\r\n",sn,(*i)->nick,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
+ buffer.append(data);
+ }
+ for (std::vector<GLine*>::iterator i = Instance->XLines->pglines.begin(); i != Instance->XLines->pglines.end(); i++)
+ {
+ snprintf(data,MAXBUF,":%s ADDLINE G %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
+ buffer.append(data);
+ }
+ for (std::vector<ELine*>::iterator i = Instance->XLines->pelines.begin(); i != Instance->XLines->pelines.end(); i++)
+ {
+ snprintf(data,MAXBUF,":%s ADDLINE E %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
+ buffer.append(data);
+ }
+
+ if (!buffer.empty())
+ this->WriteLine(buffer);
+}
+
+/** Send channel modes and topics */
+void TreeSocket::SendChannelModes(TreeServer* Current)
+{
+ char data[MAXBUF];
+ std::deque<std::string> list;
+ std::string n = this->Instance->Config->ServerName;
+ const char* sn = n.c_str();
+ Instance->Log(DEBUG,"Sending channels and modes, %d to send", this->Instance->chanlist->size());
+ for (chan_hash::iterator c = this->Instance->chanlist->begin(); c != this->Instance->chanlist->end(); c++)
+ {
+ SendFJoins(Current, c->second);
+ if (*c->second->topic)
+ {
+ snprintf(data,MAXBUF,":%s FTOPIC %s %lu %s :%s",sn,c->second->name,(unsigned long)c->second->topicset,c->second->setby,c->second->topic);
+ this->WriteLine(data);
+ }
+ FOREACH_MOD_I(this->Instance,I_OnSyncChannel,OnSyncChannel(c->second,(Module*)Utils->Creator,(void*)this));
+ list.clear();
+ c->second->GetExtList(list);
+ for (unsigned int j = 0; j < list.size(); j++)
+ {
+ FOREACH_MOD_I(this->Instance,I_OnSyncChannelMetaData,OnSyncChannelMetaData(c->second,(Module*)Utils->Creator,(void*)this,list[j]));
+ }
+ }
+}
+
+/** send all users and their oper state/modes */
+void TreeSocket::SendUsers(TreeServer* Current)
+{
+ char data[MAXBUF];
+ std::deque<std::string> list;
+ std::string dataline;
+ for (user_hash::iterator u = this->Instance->clientlist->begin(); u != this->Instance->clientlist->end(); u++)
+ {
+ if (u->second->registered == REG_ALL)
+ {
+ snprintf(data,MAXBUF,":%s NICK %lu %s %s %s %s +%s %s :%s",u->second->server,(unsigned long)u->second->age,u->second->nick,u->second->host,u->second->dhost,u->second->ident,u->second->FormatModes(),u->second->GetIPString(),u->second->fullname);
+ this->WriteLine(data);
+ if (*u->second->oper)
+ {
+ snprintf(data,MAXBUF,":%s OPERTYPE %s", u->second->nick, u->second->oper);
+ this->WriteLine(data);
+ }
+ if (*u->second->awaymsg)
+ {
+ snprintf(data,MAXBUF,":%s AWAY :%s", u->second->nick, u->second->awaymsg);
+ this->WriteLine(data);
+ }
+ }
+ }
+ for (user_hash::iterator u = this->Instance->clientlist->begin(); u != this->Instance->clientlist->end(); u++)
+ {
+ FOREACH_MOD_I(this->Instance,I_OnSyncUser,OnSyncUser(u->second,(Module*)Utils->Creator,(void*)this));
+ list.clear();
+ u->second->GetExtList(list);
+ for (unsigned int j = 0; j < list.size(); j++)
+ {
+ FOREACH_MOD_I(this->Instance,I_OnSyncUserMetaData,OnSyncUserMetaData(u->second,(Module*)Utils->Creator,(void*)this,list[j]));
+ }
+ }
+}
+
+/** This function is called when we want to send a netburst to a local
+ * server. There is a set order we must do this, because for example
+ * users require their servers to exist, and channels require their
+ * users to exist. You get the idea.
+ */
+void TreeSocket::DoBurst(TreeServer* s)
+{
+ std::string name = s->GetName();
+ std::string burst = "BURST "+ConvToStr(Instance->Time(true));
+ std::string endburst = "ENDBURST";
+ this->Instance->SNO->WriteToSnoMask('l',"Bursting to \2%s\2 (Authentication: %s).", name.c_str(), this->GetTheirChallenge().empty() ? "plaintext password" : "SHA256-HMAC challenge-response");
+ this->WriteLine(burst);
+ /* send our version string */
+ this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" VERSION :"+this->Instance->GetVersionString());
+ /* Send server tree */
+ this->SendServers(Utils->TreeRoot,s,1);
+ /* Send users and their oper status */
+ this->SendUsers(s);
+ /* Send everything else (channel modes, xlines etc) */
+ this->SendChannelModes(s);
+ this->SendXLines(s);
+ FOREACH_MOD_I(this->Instance,I_OnSyncOtherMetaData,OnSyncOtherMetaData((Module*)Utils->Creator,(void*)this));
+ this->WriteLine(endburst);
+ this->Instance->SNO->WriteToSnoMask('l',"Finished bursting to \2"+name+"\2.");
+}
+
+/** This function is called when we receive data from a remote
+ * server. We buffer the data in a std::string (it doesnt stay
+ * there for long), reading using InspSocket::Read() which can
+ * read up to 16 kilobytes in one operation.
+ *
+ * IF THIS FUNCTION RETURNS FALSE, THE CORE CLOSES AND DELETES
+ * THE SOCKET OBJECT FOR US.
+ */
+bool TreeSocket::OnDataReady()
+{
+ char* data = this->Read();
+ /* Check that the data read is a valid pointer and it has some content */
+ if (data && *data)
+ {
+ this->in_buffer.append(data);
+ /* While there is at least one new line in the buffer,
+ * do something useful (we hope!) with it.
+ */
+ while (in_buffer.find("\n") != std::string::npos)
+ {
+ std::string ret = in_buffer.substr(0,in_buffer.find("\n")-1);
+ in_buffer = in_buffer.substr(in_buffer.find("\n")+1,in_buffer.length()-in_buffer.find("\n"));
+ /* Use rfind here not find, as theres more
+ * chance of the \r being near the end of the
+ * string, not the start.
+ */
+ if (ret.find("\r") != std::string::npos)
+ ret = in_buffer.substr(0,in_buffer.find("\r")-1);
+ /* Process this one, abort if it
+ * didnt return true.
+ */
+ if (!this->ProcessLine(ret))
+ {
+ return false;
+ }
+ }
+ return true;
+ }
+ /* EAGAIN returns an empty but non-NULL string, so this
+ * evaluates to TRUE for EAGAIN but to FALSE for EOF.
+ */
+ return (data && !*data);
+}
+