+ return 1;
+}
+
+static MODCMD_FUNC(cmd_set) {
+ struct handle_info *hi;
+ struct hs_user *hs_user;
+ struct hs_assignment *assignment;
+ struct hs_toplevel *tlfh;
+ struct hs_secondlevel *slfh;
+ char *fakehost;
+
+ if (!(hi = user->handle_info)) {
+ reply("NSMSG_MUST_AUTH");
+ return 0;
+ }
+ hs_user = hs_get_user(hi, 0);
+ if(!hs_user)
+ return 0; //nothing to do here
+ if(!strcmp(argv[1], "*")) {
+ hs_activate_assignment(hs_user, NULL);
+ return 1;
+ } else {
+ fakehost = argv[1];
+ char *slfh_name = fakehost;
+ char *tlfh_name = strchr(fakehost, '.');
+ if(tlfh_name) {
+ *tlfh_name = '\0';
+ tlfh_name++;
+ }
+ if(!tlfh_name || strchr(tlfh_name, '.')) {
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, (tlfh_name ? tlfh_name : ""));
+ return 0;
+ }
+ for(assignment = hs_user->assignments; assignment; assignment = assignment->unext) {
+ slfh = assignment->secondlevel;
+ tlfh = slfh->toplevel;
+ if(!irccasecmp(tlfh_name, tlfh->fakehost) && !irccasecmp(slfh_name, slfh->fakehost)) {
+ hs_activate_assignment(hs_user, assignment);
+ reply("HSMSG_FAKEHOST_SET_SUCCESS", slfh->fakehost, tlfh->fakehost);
+ return 1;
+ }
+ }
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+ }
+}
+
+static MODCMD_FUNC(cmd_assign) {
+ struct handle_info *hi;
+ char *fakehost;
+ if(!strchr(argv[1], '.')) {
+ if (!(hi = modcmd_get_handle_info(user, argv[1])))
+ return 0;
+ fakehost = argv[2];
+ } else {
+ if (!(hi = modcmd_get_handle_info(user, argv[2])))
+ return 0;
+ fakehost = argv[1];
+ }
+ if (!user->handle_info) {
+ reply("NSMSG_MUST_AUTH");
+ return 0;
+ }
+ char *slfh_name = fakehost;
+ char *tlfh_name = strchr(fakehost, '.');
+ if(!tlfh_name) {
+ reply("HSMSG_TOPLEVEL_INVALID", slfh_name);
+ return 0;
+ }
+ tlfh_name++;
+ if(strchr(tlfh_name, '.')) {
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+ }
+ struct hs_toplevel *tlfh;
+ struct hs_secondlevel *slfh;
+ struct hs_user *hs_user = hs_get_user(hi, 1);
+ for(tlfh = toplevels; tlfh; tlfh = tlfh->next) {
+ if(!irccasecmp(tlfh_name, tlfh->fakehost)) {
+ for(slfh = tlfh->secondlevel; slfh; slfh = slfh->next) {
+ if(!irccasecmp(slfh_name, slfh->fakehost)) {
+ if(!check_management_access(user->handle_info, tlfh, slfh)) {
+ reply("HSMSG_ACCESS_DENIED");
+ return 0;
+ }
+ if(hs_get_assignment(slfh, hs_user)) {
+ reply("HSMSG_FAKEHOST_ASSIGNED", slfh_name, tlfh_name);
+ return 0;
+ }
+ hs_add_assignment(slfh, hs_user, HS_ASSIGNMENTSTATE_AUTO);
+ reply("HSMSG_FAKEHOST_ASSIGN_SUCCESS", slfh_name, tlfh_name);
+ return 1;
+ }
+ }
+ }
+ }
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+}
+
+static MODCMD_FUNC(cmd_unassign) {
+ struct handle_info *hi;
+ char *fakehost;
+ if(!strchr(argv[1], '.')) {
+ if (!(hi = modcmd_get_handle_info(user, argv[1])))
+ return 0;
+ fakehost = argv[2];
+ } else {
+ if (!(hi = modcmd_get_handle_info(user, argv[2])))
+ return 0;
+ fakehost = argv[1];
+ }
+ if (!user->handle_info) {
+ reply("NSMSG_MUST_AUTH");
+ return 0;
+ }
+ char *slfh_name = fakehost;
+ char *tlfh_name = strchr(fakehost, '.');
+ if(!tlfh_name) {
+ reply("HSMSG_TOPLEVEL_INVALID", slfh_name);
+ return 0;
+ }
+ tlfh_name++;
+ if(strchr(tlfh_name, '.')) {
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+ }
+ struct hs_assignment *assignment;
+ struct hs_user *hs_user = hs_get_user(hi, 0);
+ if(!hs_user) {
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+ }
+ for(assignment = hs_user->assignments; assignment; assignment = assignment->unext) {
+ if(!irccasecmp(slfh_name, assignment->secondlevel->fakehost)) {
+ if(!irccasecmp(tlfh_name, assignment->secondlevel->toplevel->fakehost)) {
+ if(!check_management_access(user->handle_info, assignment->secondlevel->toplevel, assignment->secondlevel)) {
+ reply("HSMSG_ACCESS_DENIED");
+ return 0;
+ }
+ hs_del_assignment(assignment, 1);
+ reply("HSMSG_FAKEHOST_UNASSIGN_SUCCESS", slfh_name, tlfh_name);
+ return 1;
+ }
+ }
+ }
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+}
+
+static void hostserv_conf_read(void) {
+ dict_t conf_node;
+ const char *str;
+
+ str = "modules/hostserv";
+ if (!(conf_node = conf_get_data(str, RECDB_OBJECT))) {
+ log_module(HS_LOG, LOG_ERROR, "config node `%s' is missing or has wrong type.", str);
+ return;
+ }
+
+ str = database_get_data(conf_node, "nick", RECDB_QSTRING);
+ if(hostserv_conf.nick && strcmp(hostserv_conf.nick, str)) {
+ //nick changed
+ }
+ hostserv_conf.nick = str;
+
+ str = database_get_data(conf_node, "modes", RECDB_QSTRING);
+ hostserv_conf.modes = (str ? str : NULL);
+
+ str = database_get_data(conf_node, "toplevel_access", RECDB_QSTRING);
+ unsigned int toplevel_access = atoi(str);
+ hostserv_conf.toplevel_access = (toplevel_access ? toplevel_access : 600);
+
+ str = database_get_data(conf_node, "fallback_other_assignment", RECDB_QSTRING);
+ hostserv_conf.fallback_other_assignment = (atoi(str) ? 1 : 0);
+
+ str = database_get_data(conf_node, "manager_can_del_toplevel", RECDB_QSTRING);
+ hostserv_conf.manager_can_del_toplevel = (atoi(str) ? 1 : 0);
+
+ str = database_get_data(conf_node, "manager_can_del_secondlevel", RECDB_QSTRING);
+ hostserv_conf.manager_can_del_secondlevel = (atoi(str) ? 1 : 0);
+
+ str = database_get_data(conf_node, "manager_can_rename_toplevel", RECDB_QSTRING);
+ hostserv_conf.manager_can_rename_toplevel = (atoi(str) ? 1 : 0);
+
+ str = database_get_data(conf_node, "manager_can_rename_secondlevel", RECDB_QSTRING);
+ hostserv_conf.manager_can_rename_secondlevel = (atoi(str) ? 1 : 0);
+
+ /*str = database_get_data(conf_node, "description", RECDB_QSTRING);
+ hostserv_conf.description = (str ? str : NULL);*/
+}
+
+static int hostserv_saxdb_read_secondlevel(const char *name, void *data, UNUSED_ARG(void *extra));
+static int hostserv_saxdb_read_assignments(const char *name, void *data, UNUSED_ARG(void *extra));
+
+static int hostserv_saxdb_read_toplevel(const char *name, void *data, UNUSED_ARG(void *extra)) {
+ struct record_data *rd = data;
+ struct hs_toplevel *tlfh;
+ struct hs_manager *managerTL;
+ struct hs_user *user;
+ struct dict *object;
+
+ if (rd->type == RECDB_OBJECT) {
+ dict_t db = GET_RECORD_OBJECT(rd);
+ dict_iterator_t it;
+
+ tlfh = hs_add_toplevel(name);
+
+ if ((object = database_get_data(db, KEY_MANAGERS, RECDB_OBJECT))) {
+ for (it = dict_first(object); it; it = iter_next(it)) {
+ user = hs_get_user(get_handle_info(iter_key(it)), 1);
+ //rd = iter_data(it);
+ /* nothing in here, yet */
+ managerTL = hs_add_manager_toplevel(tlfh, user);
+ if (database_get_data(db, KEY_ACTIVE, RECDB_QSTRING))
+ managerTL->active = 1;
+ else
+ managerTL->active = 0;
+ }
+ }
+
+ if ((object = database_get_data(db, KEY_SECONDLEVEL, RECDB_OBJECT)))
+ dict_foreach(object, hostserv_saxdb_read_secondlevel, tlfh);
+ }
+ return 0;
+}
+
+static int hostserv_saxdb_read_secondlevel(const char *name, void *data, UNUSED_ARG(void *extra)) {
+ struct record_data *rd = data;
+ struct hs_toplevel *tlfh = extra;
+ struct hs_secondlevel *slfh;
+ struct hs_manager *managerSL;
+ struct hs_user *user;
+ struct dict *object;
+
+ if (rd->type == RECDB_OBJECT) {
+ dict_t db = GET_RECORD_OBJECT(rd);
+ dict_iterator_t it;
+
+ slfh = hs_add_secondlevel(tlfh, name);
+
+ if ((object = database_get_data(db, KEY_MANAGERS, RECDB_OBJECT))) {
+ for (it = dict_first(object); it; it = iter_next(it)) {
+ user = hs_get_user(get_handle_info(iter_key(it)), 1);
+ //rd = iter_data(it);
+ /* nothing in here, yet */
+ managerSL = hs_add_manager_secondlevel(slfh, user);
+ if (database_get_data(db, KEY_ACTIVE, RECDB_QSTRING))
+ managerSL->active = 1;
+ else
+ managerSL->active = 0;
+ }
+ }
+
+ if ((object = database_get_data(db, KEY_ASSIGNMENTS, RECDB_OBJECT)))
+ dict_foreach(object, hostserv_saxdb_read_assignments, slfh);
+ }
+ return 0;
+}
+
+static int hostserv_saxdb_read_assignments(const char *name, void *data, UNUSED_ARG(void *extra)) {
+ struct record_data *rd = data;
+ struct hs_secondlevel *slfh = extra;
+ struct hs_user *user;
+ int active;
+
+ if (rd->type == RECDB_OBJECT) {
+ dict_t db = GET_RECORD_OBJECT(rd);
+
+ user = hs_get_user(get_handle_info(name), 1);
+ active = (database_get_data(db, KEY_ACTIVE, RECDB_QSTRING) ? HS_ASSIGNMENTSTATE_ON : HS_ASSIGNMENTSTATE_OFF);
+
+ hs_add_assignment(slfh, user, active);
+ }
+
+ return 0;