+ reply("HSMSG_MANAGER_DELETED", hi->handle, fhinfo.slfh_name, fhinfo.tlfh_name);
+ return 1;
+}
+
+static MODCMD_FUNC(cmd_set) {
+ struct handle_info *hi;
+ struct hs_user *hs_user;
+ struct hs_assignment *assignment;
+ struct hs_toplevel *tlfh;
+ struct hs_secondlevel *slfh;
+
+ if (!(hi = user->handle_info)) {
+ reply("NSMSG_MUST_AUTH");
+ return 0;
+ }
+ hs_user = hs_get_user(hi, 0);
+ if(!hs_user)
+ return 0; //nothing to do here
+ if(!strcmp(argv[1], "*")) {
+ hs_activate_assignment(hs_user, NULL);
+ return 1;
+ } else {
+ struct hs_fakehost_info fhinfo = parse_fakehost_info(argv[1], 1);
+ if(fhinfo.parse_state == HS_FHPARSE_INVALID) {
+ reply("HSMSG_TOPLEVEL_INVALID", argv[1]);
+ return 0;
+ } else if(fhinfo.parse_state == HS_FHPARSE_UNKNOWN) {
+ reply("HSMSG_UNKNOWN_FAKEHOST", fhinfo.slfh_name, fhinfo.tlfh_name);
+ return 0;
+ }
+ for(assignment = hs_user->assignments; assignment; assignment = assignment->unext) {
+ slfh = assignment->secondlevel;
+ tlfh = slfh->toplevel;
+ if(tlfh == fhinfo.tlfh && slfh == fhinfo.slfh) {
+ hs_activate_assignment(hs_user, assignment);
+ reply("HSMSG_FAKEHOST_SET_SUCCESS", slfh->fakehost, tlfh->fakehost);
+ return 1;
+ }
+ }
+ reply("HSMSG_UNKNOWN_FAKEHOST", fhinfo.slfh_name, fhinfo.tlfh_name);
+ return 0;
+ }
+}
+
+static MODCMD_FUNC(cmd_assign) {
+ struct handle_info *hi;
+ char *fakehost;
+ if(!strchr(argv[1], '.')) {
+ if (!(hi = modcmd_get_handle_info(user, argv[1])))
+ return 0;
+ fakehost = argv[2];
+ } else {
+ if (!(hi = modcmd_get_handle_info(user, argv[2])))
+ return 0;
+ fakehost = argv[1];
+ }
+ if (!user->handle_info) {
+ reply("NSMSG_MUST_AUTH");
+ return 0;
+ }
+ struct hs_fakehost_info fhinfo = parse_fakehost_info(fakehost, 1);
+ if(fhinfo.parse_state == HS_FHPARSE_INVALID) {
+ reply("HSMSG_TOPLEVEL_INVALID", fakehost);
+ return 0;
+ } else if(fhinfo.parse_state == HS_FHPARSE_UNKNOWN || !fhinfo.slfh) {
+ reply("HSMSG_UNKNOWN_FAKEHOST", fhinfo.slfh_name, fhinfo.tlfh_name);
+ return 0;
+ }
+ struct hs_user *hs_user = hs_get_user(hi, 1);
+ if(!check_management_access(user->handle_info, fhinfo.tlfh, fhinfo.slfh)) {
+ reply("HSMSG_ACCESS_DENIED");
+ return 0;
+ }
+ if(hs_get_assignment(fhinfo.slfh, hs_user)) {
+ reply("HSMSG_FAKEHOST_ASSIGNED", fhinfo.slfh_name, fhinfo.tlfh_name);
+ return 0;
+ }
+ hs_add_assignment(fhinfo.slfh, hs_user, HS_ASSIGNMENTSTATE_AUTO);
+ reply("HSMSG_FAKEHOST_ASSIGN_SUCCESS", fhinfo.slfh_name, fhinfo.tlfh_name);
+ return 1;
+}
+
+static MODCMD_FUNC(cmd_unassign) {
+ struct handle_info *hi;
+ char *fakehost;
+ if(!strchr(argv[1], '.')) {
+ if (!(hi = modcmd_get_handle_info(user, argv[1])))
+ return 0;
+ fakehost = argv[2];
+ } else {
+ if (!(hi = modcmd_get_handle_info(user, argv[2])))
+ return 0;
+ fakehost = argv[1];
+ }
+ if (!user->handle_info) {
+ reply("NSMSG_MUST_AUTH");
+ return 0;
+ }
+ struct hs_fakehost_info fhinfo = parse_fakehost_info(fakehost, 1);
+ if(fhinfo.parse_state == HS_FHPARSE_INVALID) {
+ reply("HSMSG_TOPLEVEL_INVALID", fakehost);
+ return 0;
+ } else if(fhinfo.parse_state == HS_FHPARSE_UNKNOWN || !fhinfo.slfh) {
+ reply("HSMSG_UNKNOWN_FAKEHOST", fhinfo.slfh_name, fhinfo.tlfh_name);
+ return 0;
+ }
+ struct hs_assignment *assignment;
+ struct hs_user *hs_user = hs_get_user(hi, 0);
+ if(!hs_user) {
+ reply("HSMSG_UNKNOWN_FAKEHOST", fhinfo.slfh_name, fhinfo.tlfh_name);
+ return 0;
+ }
+ if(!check_management_access(user->handle_info, fhinfo.tlfh, fhinfo.slfh)) {
+ reply("HSMSG_ACCESS_DENIED");
+ return 0;
+ }
+ if(!(assignment = hs_get_assignment(fhinfo.slfh, hs_user))) {
+ reply("HSMSG_UNKNOWN_FAKEHOST", fhinfo.slfh_name, fhinfo.tlfh_name);
+ return 0;
+ }
+ hs_del_assignment(assignment, 1);
+ reply("HSMSG_FAKEHOST_UNASSIGN_SUCCESS", fhinfo.slfh_name, fhinfo.tlfh_name);
+ return 1;
+}
+
+static MODCMD_FUNC(cmd_oset) {
+ struct handle_info *hi;
+ char *fakehost;
+ struct hs_assignment *assignment;
+ if(!strchr(argv[1], '.') && strcmp(argv[1], "*")) {
+ if (!(hi = modcmd_get_handle_info(user, argv[1])))
+ return 0;
+ fakehost = argv[2];
+ } else {
+ if (!(hi = modcmd_get_handle_info(user, argv[2])))
+ return 0;
+ fakehost = argv[1];
+ }
+ if (!user->handle_info) {
+ reply("NSMSG_MUST_AUTH");
+ return 0;
+ }
+ struct hs_user *hs_user = hs_get_user(hi, 1);
+ for(assignment = hs_user->assignments; assignment; assignment = assignment->unext) {
+ if(assignment->active)
+ break;
+ }
+ if(assignment && !check_management_access(user->handle_info, (hostserv_conf.manager_toplevel_can_oset ? assignment->secondlevel->toplevel : NULL), (hostserv_conf.manager_secondlevel_can_oset ? assignment->secondlevel : NULL))) {
+ reply("HSMSG_ACCESS_DENIED");
+ return 0;
+ }
+ if(!strcmp(fakehost, "*")) {
+ if(!assignment)
+ return 0; //simply ignore (there is no assignment in use)
+ hs_activate_assignment(hs_user, NULL);
+ return 1;
+ } else {
+ struct hs_fakehost_info fhinfo = parse_fakehost_info(fakehost, 1);
+ if(fhinfo.parse_state == HS_FHPARSE_INVALID) {
+ reply("HSMSG_TOPLEVEL_INVALID", fakehost);
+ return 0;
+ } else if(fhinfo.parse_state == HS_FHPARSE_UNKNOWN || !fhinfo.slfh) {
+ reply("HSMSG_UNKNOWN_FAKEHOST", fhinfo.slfh_name, fhinfo.tlfh_name);
+ return 0;
+ }
+ if(!check_management_access(user->handle_info, (hostserv_conf.manager_toplevel_can_oset ? fhinfo.tlfh : NULL), (hostserv_conf.manager_secondlevel_can_oset ? fhinfo.slfh : NULL))) {
+ reply("HSMSG_ACCESS_DENIED");
+ return 0;
+ }
+ struct hs_toplevel *tlfh;
+ struct hs_secondlevel *slfh;
+ for(assignment = hs_user->assignments; assignment; assignment = assignment->unext) {
+ slfh = assignment->secondlevel;
+ tlfh = slfh->toplevel;
+ if(tlfh == fhinfo.tlfh && slfh == fhinfo.slfh) {
+ hs_activate_assignment(hs_user, assignment);
+ reply("HSMSG_FAKEHOST_SET_SUCCESS", slfh->fakehost, tlfh->fakehost);
+ return 1;
+ }
+ }
+ reply("HSMSG_UNKNOWN_FAKEHOST", fhinfo.slfh_name, fhinfo.tlfh_name);
+ return 0;
+ }
+}
+
+static MODCMD_FUNC(cmd_setdevnull) {
+ struct handle_info *hi;
+ if (!(hi = user->handle_info)) {
+ reply("NSMSG_MUST_AUTH");
+ return 0;
+ }
+ struct hs_fakehost_info fhinfo = parse_fakehost_info(argv[1], 1);
+ if(fhinfo.parse_state == HS_FHPARSE_INVALID) {
+ reply("HSMSG_TOPLEVEL_INVALID", argv[1]);
+ return 0;
+ }
+ if(!fhinfo.have_secondlevel) {
+ reply("HSMSG_FAKEHOST_TLDEVNULL");
+ return 0;
+ } else {
+ if(!fhinfo.tlfh) {
+ reply("HSMSG_UNKNOWN_FAKEHOST", fhinfo.slfh_name, fhinfo.tlfh_name);
+ return 0;
+ }
+ if(!check_management_access(hi, NULL, NULL)) {
+ reply("HSMSG_ACCESS_DENIED");
+ return 0;
+ }
+ char *fakehost_name;
+ if(!strcmp(argv[2], "*")) {
+ fhinfo.slfh->devnull_id = 0;
+ fakehost_name = "-";
+ } else {
+ struct devnull_class *th = devnull_find_name(argv[2]);
+ if(!th) {
+ reply("OSMSG_DEVNULL_NOTFOUND", argv[2]);
+ return 0;
+ }
+ fhinfo.slfh->devnull_id = th->id;
+ fakehost_name = th->name;
+ }
+ reply("HSMSG_DEVNULL_CLASS", fhinfo.slfh_name, fhinfo.tlfh_name, fakehost_name);
+ }
+ return 1;
+}
+
+
+struct devnull_class hostserv_get_user_priv(struct handle_info *hi) {
+ struct devnull_class th;
+ memset(&th, 0, sizeof(th));
+
+ struct hs_user *huser = hs_get_user(hi, 0);
+ if(huser) {
+ struct devnull_class *devc;
+ if(hi->devnull_id != 0) {
+ devc = devnull_find_id(huser->hi->devnull_id);
+ if(devc) {
+ if(DEVNULL_HAS_PRIV(devc, CHANLIMIT) && (!DEVNULL_HAS_PRIV(&th, CHANLIMIT) || th.maxchan < devc->maxchan))
+ th.maxchan = devc->maxchan;
+ if(DEVNULL_HAS_PRIV(devc, MAXSENDQ) && (!DEVNULL_HAS_PRIV(&th, MAXSENDQ) || th.maxsendq < devc->maxsendq))
+ th.maxsendq = devc->maxsendq;
+ th.modes |= devc->modes;
+ if(!th.name)
+ th.name = devc->name;
+ }
+ } else {
+ struct hs_assignment *assignment;
+ struct hs_secondlevel *slfh;
+ for(assignment = huser->assignments; assignment; assignment = assignment->unext) {
+ slfh = assignment->secondlevel;
+ if(slfh->devnull_id) {
+ devc = devnull_find_id(slfh->devnull_id);
+ if(!devc) {
+ slfh->devnull_id = 0;
+ continue;
+ }
+ if(DEVNULL_HAS_PRIV(devc, CHANLIMIT) && (!DEVNULL_HAS_PRIV(&th, CHANLIMIT) || th.maxchan < devc->maxchan))
+ th.maxchan = devc->maxchan;
+ if(DEVNULL_HAS_PRIV(devc, MAXSENDQ) && (!DEVNULL_HAS_PRIV(&th, MAXSENDQ) || th.maxsendq < devc->maxsendq))
+ th.maxsendq = devc->maxsendq;
+ th.modes |= devc->modes;
+ if(!th.name)
+ th.name = devc->name;
+ }
+ }
+ }
+ }
+ return th;
+}
+
+static void hostserv_conf_read(void) {
+ dict_t conf_node;
+ const char *str;
+
+ str = "modules/hostserv";
+ if (!(conf_node = conf_get_data(str, RECDB_OBJECT))) {
+ log_module(HS_LOG, LOG_ERROR, "config node `%s' is missing or has wrong type.", str);
+ return;
+ }
+
+ str = database_get_data(conf_node, "nick", RECDB_QSTRING);
+ if(hostserv_conf.nick && strcmp(hostserv_conf.nick, str)) {
+ //nick changed
+ }
+ hostserv_conf.nick = str;
+
+ str = database_get_data(conf_node, "modes", RECDB_QSTRING);
+ hostserv_conf.modes = (str ? str : NULL);
+
+ str = database_get_data(conf_node, "toplevel_access", RECDB_QSTRING);
+ unsigned int toplevel_access = (str ? atoi(str) : 0);
+ hostserv_conf.toplevel_access = (toplevel_access ? toplevel_access : 600);
+
+ str = database_get_data(conf_node, "fallback_other_assignment", RECDB_QSTRING);
+ hostserv_conf.fallback_other_assignment = (str && atoi(str) ? 1 : 0);
+
+ str = database_get_data(conf_node, "manager_can_del_toplevel", RECDB_QSTRING);
+ hostserv_conf.manager_can_del_toplevel = (str && atoi(str) ? 1 : 0);
+
+ str = database_get_data(conf_node, "manager_can_del_secondlevel", RECDB_QSTRING);
+ hostserv_conf.manager_can_del_secondlevel = (str && atoi(str) ? 1 : 0);
+
+ str = database_get_data(conf_node, "manager_can_rename_toplevel", RECDB_QSTRING);
+ hostserv_conf.manager_can_rename_toplevel = (str && atoi(str) ? 1 : 0);
+
+ str = database_get_data(conf_node, "manager_can_rename_secondlevel", RECDB_QSTRING);
+ hostserv_conf.manager_can_rename_secondlevel = (str && atoi(str) ? 1 : 0);
+
+ str = database_get_data(conf_node, "manager_toplevel_can_oset", RECDB_QSTRING);
+ hostserv_conf.manager_toplevel_can_oset = (str && atoi(str) ? 1 : 0);
+
+ str = database_get_data(conf_node, "manager_secondlevel_can_oset", RECDB_QSTRING);
+ hostserv_conf.manager_secondlevel_can_oset = (str && atoi(str) ? 1 : 0);