2007-01-25 06:40:21 +00:00
|
|
|
/*
|
|
|
|
* ircd-ratbox: an advanced Internet Relay Chat Daemon(ircd).
|
|
|
|
* s_newconf.c - code for dealing with conf stuff
|
|
|
|
*
|
|
|
|
* Copyright (C) 2004 Lee Hardy <lee@leeh.co.uk>
|
|
|
|
* Copyright (C) 2004-2005 ircd-ratbox development team
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions are
|
|
|
|
* met:
|
|
|
|
*
|
|
|
|
* 1.Redistributions of source code must retain the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer.
|
|
|
|
* 2.Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3.The name of the author may not be used to endorse or promote products
|
|
|
|
* derived from this software without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
|
|
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
|
|
* DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
|
|
|
|
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
|
|
|
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
|
|
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
|
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
|
|
|
|
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "stdinc.h"
|
|
|
|
#include "ircd_defs.h"
|
|
|
|
#include "s_conf.h"
|
|
|
|
#include "s_newconf.h"
|
|
|
|
#include "client.h"
|
|
|
|
#include "s_serv.h"
|
|
|
|
#include "send.h"
|
|
|
|
#include "hostmask.h"
|
|
|
|
#include "newconf.h"
|
|
|
|
#include "hash.h"
|
2016-03-06 20:17:19 +00:00
|
|
|
#include "rb_dictionary.h"
|
|
|
|
#include "rb_radixtree.h"
|
2013-09-10 05:35:56 +00:00
|
|
|
#include "s_assert.h"
|
|
|
|
#include "logger.h"
|
2016-01-08 12:31:08 +00:00
|
|
|
#include "dns.h"
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlink_list cluster_conf_list;
|
|
|
|
rb_dlink_list oper_conf_list;
|
|
|
|
rb_dlink_list server_conf_list;
|
|
|
|
rb_dlink_list xline_conf_list;
|
|
|
|
rb_dlink_list resv_conf_list; /* nicks only! */
|
|
|
|
rb_dlink_list nd_list; /* nick delay */
|
|
|
|
rb_dlink_list tgchange_list;
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2008-04-01 21:11:11 +00:00
|
|
|
rb_patricia_tree_t *tgchange_tree;
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2008-04-02 00:28:05 +00:00
|
|
|
static rb_bh *nd_heap = NULL;
|
2007-01-25 06:40:21 +00:00
|
|
|
|
|
|
|
static void expire_temp_rxlines(void *unused);
|
|
|
|
static void expire_nd_entries(void *unused);
|
|
|
|
|
2008-04-02 01:34:02 +00:00
|
|
|
struct ev_entry *expire_nd_entries_ev = NULL;
|
|
|
|
struct ev_entry *expire_temp_rxlines_ev = NULL;
|
|
|
|
|
2007-01-25 06:40:21 +00:00
|
|
|
void
|
|
|
|
init_s_newconf(void)
|
|
|
|
{
|
2008-04-02 01:34:02 +00:00
|
|
|
tgchange_tree = rb_new_patricia(PATRICIA_BITS);
|
|
|
|
nd_heap = rb_bh_create(sizeof(struct nd_entry), ND_HEAP_SIZE, "nd_heap");
|
|
|
|
expire_nd_entries_ev = rb_event_addish("expire_nd_entries", expire_nd_entries, NULL, 30);
|
|
|
|
expire_temp_rxlines_ev = rb_event_addish("expire_temp_rxlines", expire_temp_rxlines, NULL, 60);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
clear_s_newconf(void)
|
|
|
|
{
|
|
|
|
struct server_conf *server_p;
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlink_node *ptr;
|
2008-04-01 22:47:17 +00:00
|
|
|
rb_dlink_node *next_ptr;
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2008-04-01 22:47:17 +00:00
|
|
|
RB_DLINK_FOREACH_SAFE(ptr, next_ptr, cluster_conf_list.head)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlinkDelete(ptr, &cluster_conf_list);
|
2007-01-25 06:40:21 +00:00
|
|
|
free_remote_conf(ptr->data);
|
|
|
|
}
|
|
|
|
|
2008-04-01 22:47:17 +00:00
|
|
|
RB_DLINK_FOREACH_SAFE(ptr, next_ptr, oper_conf_list.head)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
free_oper_conf(ptr->data);
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlinkDestroy(ptr, &oper_conf_list);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
2008-04-01 22:47:17 +00:00
|
|
|
RB_DLINK_FOREACH_SAFE(ptr, next_ptr, server_conf_list.head)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
server_p = ptr->data;
|
|
|
|
|
|
|
|
if(!server_p->servers)
|
|
|
|
{
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlinkDelete(ptr, &server_conf_list);
|
2007-01-25 06:40:21 +00:00
|
|
|
free_server_conf(ptr->data);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
server_p->flags |= SERVER_ILLEGAL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
clear_s_newconf_bans(void)
|
|
|
|
{
|
|
|
|
struct ConfItem *aconf;
|
2008-04-01 22:47:17 +00:00
|
|
|
rb_dlink_node *ptr, *next_ptr;
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2008-04-01 22:47:17 +00:00
|
|
|
RB_DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
aconf = ptr->data;
|
|
|
|
|
|
|
|
if(aconf->hold)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
free_conf(aconf);
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlinkDestroy(ptr, &xline_conf_list);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
2008-04-01 22:47:17 +00:00
|
|
|
RB_DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
aconf = ptr->data;
|
|
|
|
|
|
|
|
/* temporary resv */
|
|
|
|
if(aconf->hold)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
free_conf(aconf);
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlinkDestroy(ptr, &resv_conf_list);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
clear_resv_hash();
|
|
|
|
}
|
|
|
|
|
|
|
|
struct remote_conf *
|
|
|
|
make_remote_conf(void)
|
|
|
|
{
|
2008-04-01 23:07:29 +00:00
|
|
|
struct remote_conf *remote_p = rb_malloc(sizeof(struct remote_conf));
|
2007-01-25 06:40:21 +00:00
|
|
|
return remote_p;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
free_remote_conf(struct remote_conf *remote_p)
|
|
|
|
{
|
|
|
|
s_assert(remote_p != NULL);
|
|
|
|
if(remote_p == NULL)
|
|
|
|
return;
|
|
|
|
|
2008-04-01 22:47:17 +00:00
|
|
|
rb_free(remote_p->username);
|
|
|
|
rb_free(remote_p->host);
|
|
|
|
rb_free(remote_p->server);
|
|
|
|
rb_free(remote_p);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
propagate_generic(struct Client *source_p, const char *command,
|
|
|
|
const char *target, int cap, const char *format, ...)
|
|
|
|
{
|
|
|
|
char buffer[BUFSIZE];
|
|
|
|
va_list args;
|
|
|
|
|
|
|
|
va_start(args, format);
|
2016-02-10 01:25:32 +00:00
|
|
|
vsnprintf(buffer, sizeof(buffer), format, args);
|
2007-01-25 06:40:21 +00:00
|
|
|
va_end(args);
|
|
|
|
|
|
|
|
sendto_match_servs(source_p, target, cap, NOCAPS,
|
|
|
|
"%s %s %s",
|
|
|
|
command, target, buffer);
|
|
|
|
sendto_match_servs(source_p, target, CAP_ENCAP, cap,
|
|
|
|
"ENCAP %s %s %s",
|
|
|
|
target, command, buffer);
|
|
|
|
}
|
2014-03-03 04:25:47 +00:00
|
|
|
|
2007-01-25 06:40:21 +00:00
|
|
|
void
|
|
|
|
cluster_generic(struct Client *source_p, const char *command,
|
|
|
|
int cltype, int cap, const char *format, ...)
|
|
|
|
{
|
|
|
|
char buffer[BUFSIZE];
|
|
|
|
struct remote_conf *shared_p;
|
|
|
|
va_list args;
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlink_node *ptr;
|
2007-01-25 06:40:21 +00:00
|
|
|
|
|
|
|
va_start(args, format);
|
2016-02-10 01:25:32 +00:00
|
|
|
vsnprintf(buffer, sizeof(buffer), format, args);
|
2007-01-25 06:40:21 +00:00
|
|
|
va_end(args);
|
|
|
|
|
2008-04-01 20:43:10 +00:00
|
|
|
RB_DLINK_FOREACH(ptr, cluster_conf_list.head)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
shared_p = ptr->data;
|
|
|
|
|
|
|
|
if(!(shared_p->flags & cltype))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
sendto_match_servs(source_p, shared_p->server, cap, NOCAPS,
|
|
|
|
"%s %s %s",
|
|
|
|
command, shared_p->server, buffer);
|
|
|
|
sendto_match_servs(source_p, shared_p->server, CAP_ENCAP, cap,
|
|
|
|
"ENCAP %s %s %s",
|
|
|
|
shared_p->server, command, buffer);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
struct oper_conf *
|
|
|
|
make_oper_conf(void)
|
|
|
|
{
|
2008-04-01 23:07:29 +00:00
|
|
|
struct oper_conf *oper_p = rb_malloc(sizeof(struct oper_conf));
|
2007-01-25 06:40:21 +00:00
|
|
|
return oper_p;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
free_oper_conf(struct oper_conf *oper_p)
|
|
|
|
{
|
|
|
|
s_assert(oper_p != NULL);
|
|
|
|
if(oper_p == NULL)
|
|
|
|
return;
|
|
|
|
|
2008-04-01 22:47:17 +00:00
|
|
|
rb_free(oper_p->username);
|
|
|
|
rb_free(oper_p->host);
|
|
|
|
rb_free(oper_p->name);
|
2011-01-24 23:39:07 +00:00
|
|
|
rb_free(oper_p->certfp);
|
2007-01-25 06:40:21 +00:00
|
|
|
|
|
|
|
if(oper_p->passwd)
|
|
|
|
{
|
|
|
|
memset(oper_p->passwd, 0, strlen(oper_p->passwd));
|
2008-04-01 22:47:17 +00:00
|
|
|
rb_free(oper_p->passwd);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef HAVE_LIBCRYPTO
|
2008-04-01 22:47:17 +00:00
|
|
|
rb_free(oper_p->rsa_pubkey_file);
|
2007-01-25 06:40:21 +00:00
|
|
|
|
|
|
|
if(oper_p->rsa_pubkey)
|
|
|
|
RSA_free(oper_p->rsa_pubkey);
|
|
|
|
#endif
|
|
|
|
|
2008-04-01 22:47:17 +00:00
|
|
|
rb_free(oper_p);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
struct oper_conf *
|
|
|
|
find_oper_conf(const char *username, const char *host, const char *locip, const char *name)
|
|
|
|
{
|
|
|
|
struct oper_conf *oper_p;
|
2008-04-02 15:57:37 +00:00
|
|
|
struct rb_sockaddr_storage ip, cip;
|
2007-01-25 06:40:21 +00:00
|
|
|
char addr[HOSTLEN+1];
|
|
|
|
int bits, cbits;
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlink_node *ptr;
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2015-04-20 05:55:20 +00:00
|
|
|
parse_netmask(locip, &cip, &cbits);
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2008-04-01 20:43:10 +00:00
|
|
|
RB_DLINK_FOREACH(ptr, oper_conf_list.head)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
oper_p = ptr->data;
|
|
|
|
|
|
|
|
/* name/username doesnt match.. */
|
|
|
|
if(irccmp(oper_p->name, name) || !match(oper_p->username, username))
|
|
|
|
continue;
|
|
|
|
|
2008-04-20 04:40:40 +00:00
|
|
|
rb_strlcpy(addr, oper_p->host, sizeof(addr));
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2015-04-20 05:55:20 +00:00
|
|
|
if(parse_netmask(addr, &ip, &bits) != HM_HOST)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
2016-03-20 06:54:24 +00:00
|
|
|
if(GET_SS_FAMILY(&ip) == GET_SS_FAMILY(&cip) &&
|
2007-01-25 06:40:21 +00:00
|
|
|
comp_with_mask_sock((struct sockaddr *)&ip, (struct sockaddr *)&cip, bits))
|
|
|
|
return oper_p;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* we have to compare against the host as well, because its
|
|
|
|
* valid to set a spoof to an IP, which if we only compare
|
|
|
|
* in ip form to sockhost will not necessarily match --anfl
|
|
|
|
*/
|
|
|
|
if(match(oper_p->host, host))
|
|
|
|
return oper_p;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct server_conf *
|
|
|
|
make_server_conf(void)
|
|
|
|
{
|
2008-04-01 23:07:29 +00:00
|
|
|
struct server_conf *server_p = rb_malloc(sizeof(struct server_conf));
|
2016-04-24 16:05:05 +00:00
|
|
|
|
|
|
|
SET_SS_FAMILY(&server_p->connect4, AF_UNSPEC);
|
|
|
|
SET_SS_LEN(&server_p->connect4, sizeof(struct sockaddr_in));
|
|
|
|
|
|
|
|
SET_SS_FAMILY(&server_p->bind4, AF_UNSPEC);
|
|
|
|
SET_SS_LEN(&server_p->bind4, sizeof(struct sockaddr_in));
|
|
|
|
|
|
|
|
SET_SS_FAMILY(&server_p->connect6, AF_UNSPEC);
|
|
|
|
SET_SS_LEN(&server_p->connect6, sizeof(struct sockaddr_in6));
|
|
|
|
|
|
|
|
SET_SS_FAMILY(&server_p->bind6, AF_UNSPEC);
|
|
|
|
SET_SS_LEN(&server_p->bind6, sizeof(struct sockaddr_in6));
|
|
|
|
|
|
|
|
server_p->aftype = AF_UNSPEC;
|
|
|
|
|
2016-07-16 18:26:38 +00:00
|
|
|
return server_p;
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
free_server_conf(struct server_conf *server_p)
|
|
|
|
{
|
|
|
|
s_assert(server_p != NULL);
|
|
|
|
if(server_p == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if(!EmptyString(server_p->passwd))
|
|
|
|
{
|
|
|
|
memset(server_p->passwd, 0, strlen(server_p->passwd));
|
2008-04-01 22:47:17 +00:00
|
|
|
rb_free(server_p->passwd);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if(!EmptyString(server_p->spasswd))
|
|
|
|
{
|
|
|
|
memset(server_p->spasswd, 0, strlen(server_p->spasswd));
|
2008-04-01 22:47:17 +00:00
|
|
|
rb_free(server_p->spasswd);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
2008-04-01 22:47:17 +00:00
|
|
|
rb_free(server_p->name);
|
2016-04-24 16:05:05 +00:00
|
|
|
rb_free(server_p->connect_host);
|
|
|
|
rb_free(server_p->bind_host);
|
2008-04-01 22:47:17 +00:00
|
|
|
rb_free(server_p->class_name);
|
2016-10-30 11:45:56 +00:00
|
|
|
rb_free(server_p->certfp);
|
2008-04-01 22:47:17 +00:00
|
|
|
rb_free(server_p);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
2016-01-08 12:31:08 +00:00
|
|
|
/*
|
2016-04-24 16:05:05 +00:00
|
|
|
* conf_connect_dns_callback
|
|
|
|
* inputs - pointer to struct ConfItem
|
|
|
|
* - pointer to adns reply
|
|
|
|
* output - none
|
|
|
|
* side effects - called when resolver query finishes
|
|
|
|
* if the query resulted in a successful search, hp will contain
|
|
|
|
* a non-null pointer, otherwise hp will be null.
|
|
|
|
* if successful save hp in the conf item it was called with
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
conf_connect_dns_callback(const char *result, int status, int aftype, void *data)
|
|
|
|
{
|
|
|
|
struct server_conf *server_p = data;
|
|
|
|
|
|
|
|
if(aftype == AF_INET)
|
|
|
|
{
|
|
|
|
if(status == 1)
|
2019-08-31 15:10:50 +00:00
|
|
|
rb_inet_pton_sock(result, &server_p->connect4);
|
2016-04-24 16:05:05 +00:00
|
|
|
|
|
|
|
server_p->dns_query_connect4 = 0;
|
|
|
|
}
|
|
|
|
else if(aftype == AF_INET6)
|
|
|
|
{
|
|
|
|
if(status == 1)
|
2019-08-31 15:10:50 +00:00
|
|
|
rb_inet_pton_sock(result, &server_p->connect6);
|
2016-04-24 16:05:05 +00:00
|
|
|
|
|
|
|
server_p->dns_query_connect6 = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* conf_bind_dns_callback
|
2016-01-08 12:31:08 +00:00
|
|
|
* inputs - pointer to struct ConfItem
|
|
|
|
* - pointer to adns reply
|
|
|
|
* output - none
|
|
|
|
* side effects - called when resolver query finishes
|
|
|
|
* if the query resulted in a successful search, hp will contain
|
|
|
|
* a non-null pointer, otherwise hp will be null.
|
|
|
|
* if successful save hp in the conf item it was called with
|
|
|
|
*/
|
|
|
|
static void
|
2016-04-24 16:05:05 +00:00
|
|
|
conf_bind_dns_callback(const char *result, int status, int aftype, void *data)
|
2016-01-08 12:31:08 +00:00
|
|
|
{
|
|
|
|
struct server_conf *server_p = data;
|
|
|
|
|
2016-04-24 16:05:05 +00:00
|
|
|
if(aftype == AF_INET)
|
|
|
|
{
|
|
|
|
if(status == 1)
|
2019-08-31 15:10:50 +00:00
|
|
|
rb_inet_pton_sock(result, &server_p->bind4);
|
2016-01-08 12:31:08 +00:00
|
|
|
|
2016-04-24 16:05:05 +00:00
|
|
|
server_p->dns_query_bind4 = 0;
|
|
|
|
}
|
|
|
|
else if(aftype == AF_INET6)
|
|
|
|
{
|
|
|
|
if(status == 1)
|
2019-08-31 15:10:50 +00:00
|
|
|
rb_inet_pton_sock(result, &server_p->bind6);
|
2016-04-24 16:05:05 +00:00
|
|
|
|
|
|
|
server_p->dns_query_bind6 = 0;
|
|
|
|
}
|
2016-01-08 12:31:08 +00:00
|
|
|
}
|
|
|
|
|
2007-01-25 06:40:21 +00:00
|
|
|
void
|
|
|
|
add_server_conf(struct server_conf *server_p)
|
|
|
|
{
|
|
|
|
if(EmptyString(server_p->class_name))
|
|
|
|
{
|
2008-04-01 23:26:34 +00:00
|
|
|
server_p->class_name = rb_strdup("default");
|
2007-01-25 06:40:21 +00:00
|
|
|
server_p->class = default_class;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
server_p->class = find_class(server_p->class_name);
|
|
|
|
|
|
|
|
if(server_p->class == default_class)
|
|
|
|
{
|
|
|
|
conf_report_error("Warning connect::class invalid for %s",
|
|
|
|
server_p->name);
|
|
|
|
|
2008-04-01 22:47:17 +00:00
|
|
|
rb_free(server_p->class_name);
|
2008-04-01 23:26:34 +00:00
|
|
|
server_p->class_name = rb_strdup("default");
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
2016-04-24 16:05:05 +00:00
|
|
|
if(server_p->connect_host && !strpbrk(server_p->connect_host, "*?"))
|
|
|
|
{
|
|
|
|
server_p->dns_query_connect4 =
|
|
|
|
lookup_hostname(server_p->connect_host, AF_INET, conf_connect_dns_callback, server_p);
|
|
|
|
server_p->dns_query_connect6 =
|
|
|
|
lookup_hostname(server_p->connect_host, AF_INET6, conf_connect_dns_callback, server_p);
|
|
|
|
}
|
2016-01-08 12:31:08 +00:00
|
|
|
|
2016-04-24 16:05:05 +00:00
|
|
|
if(server_p->bind_host)
|
|
|
|
{
|
|
|
|
server_p->dns_query_bind4 =
|
|
|
|
lookup_hostname(server_p->bind_host, AF_INET, conf_bind_dns_callback, server_p);
|
|
|
|
server_p->dns_query_bind6 =
|
|
|
|
lookup_hostname(server_p->bind_host, AF_INET6, conf_bind_dns_callback, server_p);
|
|
|
|
}
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
struct server_conf *
|
|
|
|
find_server_conf(const char *name)
|
|
|
|
{
|
|
|
|
struct server_conf *server_p;
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlink_node *ptr;
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2008-04-01 20:43:10 +00:00
|
|
|
RB_DLINK_FOREACH(ptr, server_conf_list.head)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
server_p = ptr->data;
|
|
|
|
|
|
|
|
if(ServerConfIllegal(server_p))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if(match(name, server_p->name))
|
|
|
|
return server_p;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
attach_server_conf(struct Client *client_p, struct server_conf *server_p)
|
|
|
|
{
|
|
|
|
/* already have an attached conf */
|
|
|
|
if(client_p->localClient->att_sconf)
|
|
|
|
{
|
|
|
|
/* short circuit this special case :) */
|
|
|
|
if(client_p->localClient->att_sconf == server_p)
|
|
|
|
return;
|
|
|
|
|
|
|
|
detach_server_conf(client_p);
|
|
|
|
}
|
|
|
|
|
|
|
|
CurrUsers(server_p->class)++;
|
|
|
|
|
|
|
|
client_p->localClient->att_sconf = server_p;
|
|
|
|
server_p->servers++;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
detach_server_conf(struct Client *client_p)
|
|
|
|
{
|
|
|
|
struct server_conf *server_p = client_p->localClient->att_sconf;
|
|
|
|
|
|
|
|
if(server_p == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
client_p->localClient->att_sconf = NULL;
|
|
|
|
server_p->servers--;
|
|
|
|
CurrUsers(server_p->class)--;
|
|
|
|
|
|
|
|
if(ServerConfIllegal(server_p) && !server_p->servers)
|
|
|
|
{
|
|
|
|
/* the class this one is using may need destroying too */
|
|
|
|
if(MaxUsers(server_p->class) < 0 && CurrUsers(server_p->class) <= 0)
|
|
|
|
free_class(server_p->class);
|
|
|
|
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlinkDelete(&server_p->node, &server_conf_list);
|
2007-01-25 06:40:21 +00:00
|
|
|
free_server_conf(server_p);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2008-06-10 22:28:08 +00:00
|
|
|
set_server_conf_autoconn(struct Client *source_p, const char *name, int newval)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
struct server_conf *server_p;
|
|
|
|
|
|
|
|
if((server_p = find_server_conf(name)) != NULL)
|
|
|
|
{
|
|
|
|
if(newval)
|
|
|
|
server_p->flags |= SERVER_AUTOCONN;
|
|
|
|
else
|
|
|
|
server_p->flags &= ~SERVER_AUTOCONN;
|
|
|
|
|
2020-11-08 19:30:41 +00:00
|
|
|
sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
|
2007-01-25 06:40:21 +00:00
|
|
|
"%s has changed AUTOCONN for %s to %i",
|
|
|
|
get_oper_name(source_p), name, newval);
|
|
|
|
}
|
|
|
|
else
|
2007-01-25 07:23:01 +00:00
|
|
|
sendto_one_notice(source_p, ":Can't find %s", name);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
2009-02-05 22:43:07 +00:00
|
|
|
void
|
|
|
|
disable_server_conf_autoconn(const char *name)
|
|
|
|
{
|
|
|
|
struct server_conf *server_p;
|
|
|
|
|
|
|
|
server_p = find_server_conf(name);
|
|
|
|
if(server_p != NULL && server_p->flags & SERVER_AUTOCONN)
|
|
|
|
{
|
|
|
|
server_p->flags &= ~SERVER_AUTOCONN;
|
|
|
|
|
2020-11-08 19:30:41 +00:00
|
|
|
sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
|
2009-02-05 22:43:07 +00:00
|
|
|
"Disabling AUTOCONN for %s because of error",
|
|
|
|
name);
|
|
|
|
ilog(L_SERVER, "Disabling AUTOCONN for %s because of error",
|
|
|
|
name);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-01-25 06:40:21 +00:00
|
|
|
struct ConfItem *
|
|
|
|
find_xline(const char *gecos, int counter)
|
|
|
|
{
|
|
|
|
struct ConfItem *aconf;
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlink_node *ptr;
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2008-04-01 20:43:10 +00:00
|
|
|
RB_DLINK_FOREACH(ptr, xline_conf_list.head)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
aconf = ptr->data;
|
|
|
|
|
2010-01-08 17:46:29 +00:00
|
|
|
if(match_esc(aconf->host, gecos))
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
if(counter)
|
|
|
|
aconf->port++;
|
|
|
|
return aconf;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2007-11-25 17:18:07 +00:00
|
|
|
struct ConfItem *
|
|
|
|
find_xline_mask(const char *gecos)
|
|
|
|
{
|
|
|
|
struct ConfItem *aconf;
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlink_node *ptr;
|
2007-11-25 17:18:07 +00:00
|
|
|
|
2008-04-01 20:43:10 +00:00
|
|
|
RB_DLINK_FOREACH(ptr, xline_conf_list.head)
|
2007-11-25 17:18:07 +00:00
|
|
|
{
|
|
|
|
aconf = ptr->data;
|
|
|
|
|
2010-01-08 17:46:29 +00:00
|
|
|
if(!irccmp(aconf->host, gecos))
|
2007-11-25 17:18:07 +00:00
|
|
|
return aconf;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2007-01-25 06:40:21 +00:00
|
|
|
struct ConfItem *
|
|
|
|
find_nick_resv(const char *name)
|
|
|
|
{
|
|
|
|
struct ConfItem *aconf;
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlink_node *ptr;
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2008-04-01 20:43:10 +00:00
|
|
|
RB_DLINK_FOREACH(ptr, resv_conf_list.head)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
aconf = ptr->data;
|
|
|
|
|
2010-01-08 17:46:29 +00:00
|
|
|
if(match_esc(aconf->host, name))
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
aconf->port++;
|
|
|
|
return aconf;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2007-11-25 17:18:07 +00:00
|
|
|
struct ConfItem *
|
|
|
|
find_nick_resv_mask(const char *name)
|
|
|
|
{
|
|
|
|
struct ConfItem *aconf;
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlink_node *ptr;
|
2007-11-25 17:18:07 +00:00
|
|
|
|
2008-04-01 20:43:10 +00:00
|
|
|
RB_DLINK_FOREACH(ptr, resv_conf_list.head)
|
2007-11-25 17:18:07 +00:00
|
|
|
{
|
|
|
|
aconf = ptr->data;
|
|
|
|
|
2010-01-08 17:46:29 +00:00
|
|
|
if(!irccmp(aconf->host, name))
|
2007-11-25 17:18:07 +00:00
|
|
|
return aconf;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2007-01-25 06:40:21 +00:00
|
|
|
/* clean_resv_nick()
|
|
|
|
*
|
|
|
|
* inputs - nick
|
|
|
|
* outputs - 1 if nick is vaild resv, 0 otherwise
|
|
|
|
* side effects -
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
clean_resv_nick(const char *nick)
|
|
|
|
{
|
|
|
|
char tmpch;
|
|
|
|
int as = 0;
|
|
|
|
int q = 0;
|
|
|
|
int ch = 0;
|
|
|
|
|
|
|
|
if(*nick == '-' || IsDigit(*nick))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
while ((tmpch = *nick++))
|
|
|
|
{
|
|
|
|
if(tmpch == '?' || tmpch == '@' || tmpch == '#')
|
|
|
|
q++;
|
|
|
|
else if(tmpch == '*')
|
|
|
|
as++;
|
|
|
|
else if(IsNickChar(tmpch))
|
|
|
|
ch++;
|
|
|
|
else
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!ch && as)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* valid_wild_card_simple()
|
|
|
|
*
|
|
|
|
* inputs - "thing" to test
|
|
|
|
* outputs - 1 if enough wildcards, else 0
|
|
|
|
* side effects -
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
valid_wild_card_simple(const char *data)
|
|
|
|
{
|
|
|
|
const char *p;
|
|
|
|
char tmpch;
|
|
|
|
int nonwild = 0;
|
2007-06-04 16:04:49 +00:00
|
|
|
int wild = 0;
|
2007-01-25 06:40:21 +00:00
|
|
|
|
|
|
|
/* check the string for minimum number of nonwildcard chars */
|
|
|
|
p = data;
|
|
|
|
|
|
|
|
while((tmpch = *p++))
|
|
|
|
{
|
|
|
|
/* found an escape, p points to the char after it, so skip
|
|
|
|
* that and move on.
|
|
|
|
*/
|
2007-06-04 16:04:49 +00:00
|
|
|
if(tmpch == '\\' && *p)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
p++;
|
2007-06-04 16:04:49 +00:00
|
|
|
if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
|
|
|
|
return 1;
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
else if(!IsMWildChar(tmpch))
|
|
|
|
{
|
|
|
|
/* if we have enough nonwildchars, return */
|
|
|
|
if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
|
|
|
|
return 1;
|
|
|
|
}
|
2007-06-04 16:04:49 +00:00
|
|
|
else
|
|
|
|
wild++;
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
2007-06-04 16:04:49 +00:00
|
|
|
/* strings without wilds are also ok */
|
|
|
|
return wild == 0;
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
time_t
|
|
|
|
valid_temp_time(const char *p)
|
|
|
|
{
|
|
|
|
time_t result = 0;
|
2021-04-07 21:41:52 +00:00
|
|
|
long current = 0;
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2022-03-18 18:13:31 +00:00
|
|
|
time_t max_time = (uintmax_t) (~(time_t)0) >> 1;
|
|
|
|
|
2022-03-06 16:44:45 +00:00
|
|
|
while (*p) {
|
|
|
|
char *endp;
|
2022-03-18 18:13:31 +00:00
|
|
|
int mul;
|
2022-03-06 16:44:45 +00:00
|
|
|
|
|
|
|
errno = 0;
|
|
|
|
current = strtol(p, &endp, 10);
|
|
|
|
|
2021-04-07 21:41:52 +00:00
|
|
|
if (errno == ERANGE)
|
2007-01-25 06:40:21 +00:00
|
|
|
return -1;
|
2022-03-06 16:44:45 +00:00
|
|
|
if (endp == p)
|
|
|
|
return -1;
|
2022-03-18 18:13:24 +00:00
|
|
|
if (current < 0)
|
|
|
|
return -1;
|
2022-03-06 16:44:45 +00:00
|
|
|
|
|
|
|
switch (*endp) {
|
|
|
|
case '\0': /* No unit was given so send it back as minutes */
|
|
|
|
case 'm':
|
2022-03-18 18:13:31 +00:00
|
|
|
mul = 60;
|
2022-03-06 16:44:45 +00:00
|
|
|
break;
|
|
|
|
case 'h':
|
2022-03-18 18:13:31 +00:00
|
|
|
mul = 3600;
|
2022-03-06 16:44:45 +00:00
|
|
|
break;
|
|
|
|
case 'd':
|
2022-03-18 18:13:31 +00:00
|
|
|
mul = 86400;
|
2022-03-06 16:44:45 +00:00
|
|
|
break;
|
|
|
|
case 'w':
|
2022-03-18 18:13:31 +00:00
|
|
|
mul = 604800;
|
2022-03-06 16:44:45 +00:00
|
|
|
break;
|
|
|
|
default:
|
2021-04-07 21:41:52 +00:00
|
|
|
return -1;
|
|
|
|
}
|
2022-03-06 16:44:45 +00:00
|
|
|
|
2022-03-18 18:13:31 +00:00
|
|
|
if (current > LONG_MAX / mul)
|
|
|
|
return MAX_TEMP_TIME;
|
|
|
|
|
|
|
|
current *= mul;
|
|
|
|
|
|
|
|
if (current > max_time - result)
|
|
|
|
return MAX_TEMP_TIME;
|
|
|
|
|
|
|
|
result += current;
|
|
|
|
|
2022-03-06 16:44:45 +00:00
|
|
|
if (*endp == '\0')
|
|
|
|
break;
|
|
|
|
|
|
|
|
p = endp + 1;
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
2022-03-06 16:44:45 +00:00
|
|
|
|
2022-03-18 18:13:31 +00:00
|
|
|
return MIN(result, MAX_TEMP_TIME);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
2010-03-03 23:21:22 +00:00
|
|
|
/* Propagated bans are expired elsewhere. */
|
2007-01-25 06:40:21 +00:00
|
|
|
static void
|
|
|
|
expire_temp_rxlines(void *unused)
|
|
|
|
{
|
|
|
|
struct ConfItem *aconf;
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlink_node *ptr;
|
2008-04-01 22:47:17 +00:00
|
|
|
rb_dlink_node *next_ptr;
|
2016-03-23 13:32:22 +00:00
|
|
|
rb_radixtree_iteration_state state;
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2016-03-06 20:17:19 +00:00
|
|
|
RB_RADIXTREE_FOREACH(aconf, &state, resv_tree)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
2010-03-03 23:21:22 +00:00
|
|
|
if(aconf->lifetime != 0)
|
|
|
|
continue;
|
2008-04-01 23:53:20 +00:00
|
|
|
if(aconf->hold && aconf->hold <= rb_current_time())
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
if(ConfigFileEntry.tkline_expire_notices)
|
|
|
|
sendto_realops_snomask(SNO_GENERAL, L_ALL,
|
|
|
|
"Temporary RESV for [%s] expired",
|
2010-01-08 17:46:29 +00:00
|
|
|
aconf->host);
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2016-03-06 20:17:19 +00:00
|
|
|
rb_radixtree_delete(resv_tree, aconf->host);
|
2007-01-25 06:40:21 +00:00
|
|
|
free_conf(aconf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-04-01 22:47:17 +00:00
|
|
|
RB_DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
aconf = ptr->data;
|
|
|
|
|
2010-03-03 23:21:22 +00:00
|
|
|
if(aconf->lifetime != 0)
|
|
|
|
continue;
|
2008-04-01 23:53:20 +00:00
|
|
|
if(aconf->hold && aconf->hold <= rb_current_time())
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
if(ConfigFileEntry.tkline_expire_notices)
|
|
|
|
sendto_realops_snomask(SNO_GENERAL, L_ALL,
|
|
|
|
"Temporary RESV for [%s] expired",
|
2010-01-08 17:46:29 +00:00
|
|
|
aconf->host);
|
2007-01-25 06:40:21 +00:00
|
|
|
free_conf(aconf);
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlinkDestroy(ptr, &resv_conf_list);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-04-01 22:47:17 +00:00
|
|
|
RB_DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
aconf = ptr->data;
|
|
|
|
|
2010-03-03 23:21:22 +00:00
|
|
|
if(aconf->lifetime != 0)
|
|
|
|
continue;
|
2008-04-01 23:53:20 +00:00
|
|
|
if(aconf->hold && aconf->hold <= rb_current_time())
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
if(ConfigFileEntry.tkline_expire_notices)
|
|
|
|
sendto_realops_snomask(SNO_GENERAL, L_ALL,
|
|
|
|
"Temporary X-line for [%s] expired",
|
2010-01-08 17:46:29 +00:00
|
|
|
aconf->host);
|
2007-01-25 06:40:21 +00:00
|
|
|
free_conf(aconf);
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlinkDestroy(ptr, &xline_conf_list);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
unsigned long
|
|
|
|
get_nd_count(void)
|
|
|
|
{
|
2008-04-01 20:41:52 +00:00
|
|
|
return(rb_dlink_list_length(&nd_list));
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
add_nd_entry(const char *name)
|
|
|
|
{
|
|
|
|
struct nd_entry *nd;
|
|
|
|
|
2016-03-06 20:17:19 +00:00
|
|
|
if(rb_dictionary_find(nd_dict, name) != NULL)
|
2007-01-25 06:40:21 +00:00
|
|
|
return;
|
|
|
|
|
2008-04-02 00:28:05 +00:00
|
|
|
nd = rb_bh_alloc(nd_heap);
|
2014-03-03 04:25:47 +00:00
|
|
|
|
2008-04-20 04:40:40 +00:00
|
|
|
rb_strlcpy(nd->name, name, sizeof(nd->name));
|
2008-04-01 23:53:20 +00:00
|
|
|
nd->expire = rb_current_time() + ConfigFileEntry.nick_delay;
|
2007-01-25 06:40:21 +00:00
|
|
|
|
|
|
|
/* this list is ordered */
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlinkAddTail(nd, &nd->lnode, &nd_list);
|
2007-12-03 16:59:25 +00:00
|
|
|
|
2016-03-06 20:17:19 +00:00
|
|
|
rb_dictionary_add(nd_dict, nd->name, nd);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
free_nd_entry(struct nd_entry *nd)
|
|
|
|
{
|
2016-03-06 20:17:19 +00:00
|
|
|
rb_dictionary_delete(nd_dict, nd->name);
|
2007-12-03 16:59:25 +00:00
|
|
|
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlinkDelete(&nd->lnode, &nd_list);
|
2008-04-02 00:28:05 +00:00
|
|
|
rb_bh_free(nd_heap, nd);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
expire_nd_entries(void *unused)
|
|
|
|
{
|
|
|
|
struct nd_entry *nd;
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlink_node *ptr;
|
2008-04-01 22:47:17 +00:00
|
|
|
rb_dlink_node *next_ptr;
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2008-04-01 22:47:17 +00:00
|
|
|
RB_DLINK_FOREACH_SAFE(ptr, next_ptr, nd_list.head)
|
2007-01-25 06:40:21 +00:00
|
|
|
{
|
|
|
|
nd = ptr->data;
|
|
|
|
|
|
|
|
/* this list is ordered - we can stop when we hit the first
|
|
|
|
* entry that doesnt expire..
|
|
|
|
*/
|
2008-04-01 23:53:20 +00:00
|
|
|
if(nd->expire > rb_current_time())
|
2007-01-25 06:40:21 +00:00
|
|
|
return;
|
|
|
|
|
|
|
|
free_nd_entry(nd);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
add_tgchange(const char *host)
|
|
|
|
{
|
|
|
|
tgchange *target;
|
2008-04-02 01:34:02 +00:00
|
|
|
rb_patricia_node_t *pnode;
|
2007-01-25 06:40:21 +00:00
|
|
|
|
|
|
|
if(find_tgchange(host))
|
|
|
|
return;
|
|
|
|
|
2008-04-01 23:07:29 +00:00
|
|
|
target = rb_malloc(sizeof(tgchange));
|
2007-01-25 06:40:21 +00:00
|
|
|
pnode = make_and_lookup(tgchange_tree, host);
|
|
|
|
|
|
|
|
pnode->data = target;
|
|
|
|
target->pnode = pnode;
|
|
|
|
|
2008-04-01 23:26:34 +00:00
|
|
|
target->ip = rb_strdup(host);
|
2008-04-01 23:53:20 +00:00
|
|
|
target->expiry = rb_current_time() + (60*60*12);
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2008-04-01 20:41:52 +00:00
|
|
|
rb_dlinkAdd(target, &target->node, &tgchange_list);
|
2007-01-25 06:40:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
tgchange *
|
|
|
|
find_tgchange(const char *host)
|
|
|
|
{
|
2008-04-02 01:34:02 +00:00
|
|
|
rb_patricia_node_t *pnode;
|
2007-01-25 06:40:21 +00:00
|
|
|
|
2008-04-02 01:34:02 +00:00
|
|
|
if((pnode = rb_match_exact_string(tgchange_tree, host)))
|
2007-01-25 06:40:21 +00:00
|
|
|
return pnode->data;
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|