+ return 1;
+}
+
+static MODCMD_FUNC(cmd_set) {
+ struct handle_info *hi;
+ struct hs_user *hs_user;
+ struct hs_assignment *assignment;
+ struct hs_assignment *assgn;
+ struct hs_toplevel *tlfh;
+ struct hs_secondlevel *slfh;
+ char *fakehost;
+
+ if (!(hi = user->handle_info)) {
+ reply("NSMSG_MUST_AUTH");
+ return 0;
+ }
+ hs_user = hs_get_user(hi, 0);
+ if(!strcmp(argv[1], "*")) {
+ hi->fakehost = NULL;
+ apply_fakehost(hi, NULL);
+ if(hs_user->assignments) {
+ for(assgn = hs_user->assignments; assgn; assgn = assgn->unext) {
+ assgn->active = 0;
+ }
+ }
+ return 1;
+ } else {
+ if(!strchr(argv[1], '.')) {
+ return 0;
+ }
+ fakehost = argv[1];
+ char *slfh_name = fakehost;
+ char *tlfh_name = strchr(fakehost, '.');
+ *tlfh_name = '\0';
+ tlfh_name++;
+ if(strchr(tlfh_name, '.')) {
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+ }
+ for(assignment = hs_user->assignments; assignment; assignment = assignment->unext) {
+ slfh = assignment->secondlevel;
+ tlfh = slfh->toplevel;
+ if(!irccasecmp(slfh_name, slfh->fakehost)) {
+ if(!irccasecmp(tlfh_name, tlfh->fakehost)) {
+ activateAssignment(assignment);
+ reply("HSMSG_FAKEHOST_SET_SUCCESS", slfh->fakehost, tlfh->fakehost);
+ return 1;
+ }
+ }
+ }
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+ }
+}
+
+static MODCMD_FUNC(cmd_assign) {
+ struct handle_info *hi;
+ struct handle_info *hiuser;
+ char *fakehost;
+ if(!strchr(argv[1], '.')) {
+ if (!(hi = modcmd_get_handle_info(user, argv[1])))
+ return 0;
+ fakehost = argv[2];
+ } else {
+ if (!(hi = modcmd_get_handle_info(user, argv[2])))
+ return 0;
+ fakehost = argv[1];
+ }
+ if (!(hiuser = user->handle_info)) {
+ reply("NSMSG_MUST_AUTH");
+ return 0;
+ }
+ if(!fakehost) {
+ reply("HSMSG_ASSIGNED_NONE");
+ return 0;
+ }
+ char *slfh_name = fakehost;
+ char *tlfh_name = strchr(fakehost, '.');
+ if(tlfh_name) {
+ *tlfh_name = '\0';
+ } else {
+ reply("HSMSG_ASSIGNED_NONE");
+ return 0;
+ }
+ tlfh_name++;
+ if(strchr(tlfh_name, '.')) {
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+ }
+ struct hs_toplevel *tlfh;;
+ struct hs_secondlevel *slfh;
+ struct hs_user *hs_user = hs_get_user(hi, 1);
+ for(tlfh = toplevels; tlfh; tlfh = tlfh->next) {
+ if(!irccasecmp(tlfh_name, tlfh->fakehost)) {
+ for(slfh = tlfh->secondlevel; slfh; slfh = slfh->next) {
+ if(!irccasecmp(slfh_name, slfh->fakehost)) {
+ if(check_management_access(hiuser, tlfh, slfh)) {
+ hs_add_assignment(slfh, hs_user);
+ reply("HSMSG_FAKEHOST_ASSIGN_SUCCESS", slfh_name, tlfh_name);
+ return 1;
+ }
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+ }
+ }
+ }
+ }
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+}
+
+static MODCMD_FUNC(cmd_revoke) {
+ struct handle_info *hi;
+ struct handle_info *hiuser;
+ char *fakehost;
+ if(!strchr(argv[1], '.')) {
+ if (!(hi = modcmd_get_handle_info(user, argv[1])))
+ return 0;
+ fakehost = argv[2];
+ } else {
+ if (!(hi = modcmd_get_handle_info(user, argv[2])))
+ return 0;
+ fakehost = argv[1];
+ }
+ if (!(hiuser = user->handle_info)) {
+ reply("NSMSG_MUST_AUTH");
+ return 0;
+ }
+ if(!fakehost) {
+ reply("HSMSG_ASSIGNED_NONE");
+ return 0;
+ }
+ char *slfh_name = fakehost;
+ char *tlfh_name = strchr(fakehost, '.');
+ if(tlfh_name) {
+ *tlfh_name = '\0';
+ } else {
+ reply("HSMSG_ASSIGNED_NONE");
+ return 0;
+ }
+ tlfh_name++;
+ if(strchr(tlfh_name, '.')) {
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+ }
+ struct hs_assignment *assignment;
+ struct hs_user *hs_user = hs_get_user(hi, 0);
+ for(assignment = hs_user->assignments; assignment; assignment = assignment->unext) {
+ if(!irccasecmp(slfh_name, assignment->secondlevel->fakehost)) {
+ if(!irccasecmp(tlfh_name, assignment->secondlevel->toplevel->fakehost)) {
+ if(check_management_access(hi, assignment->secondlevel->toplevel, assignment->secondlevel)) {
+ hs_del_assignment(assignment, 1);
+ reply("HSMSG_FAKEHOST_REVOKE_SUCCESS", slfh_name, tlfh_name);
+ return 1;
+ }
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+ }
+ }
+ }
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+}
+
+static void hostserv_conf_read(void)
+{
+ dict_t conf_node;
+ const char *str;
+
+ str = "modules/hostserv";
+ if (!(conf_node = conf_get_data(str, RECDB_OBJECT))) {
+ log_module(HS_LOG, LOG_ERROR, "config node `%s' is missing or has wrong type.", str);
+ return;
+ }
+
+ str = database_get_data(conf_node, "nick", RECDB_QSTRING);
+ if(hostserv_conf.nick && strcmp(hostserv_conf.nick, str)) {
+ //nick changed
+ }
+ hostserv_conf.nick = str;
+
+ str = database_get_data(conf_node, "modes", RECDB_QSTRING);
+ hostserv_conf.modes = (str ? str : NULL);
+
+ str = database_get_data(conf_node, "toplevel_access", RECDB_QSTRING);
+ unsigned int toplevel_access = atoi(str);
+ hostserv_conf.toplevel_access = (toplevel_access ? toplevel_access : 600);
+
+ /*str = database_get_data(conf_node, "description", RECDB_QSTRING);
+ hostserv_conf.description = (str ? str : NULL);*/
+ str = database_get_data(conf_node, KEY_TITLEHOST_SUFFIX, RECDB_QSTRING);
+ title_suffix = str ? str : "example.net";
+}
+
+static int hostserv_saxdb_read_secondlevel(const char *name, void *data, UNUSED_ARG(void *extra));
+static int hostserv_saxdb_read_assignments(const char *name, void *data, UNUSED_ARG(void *extra));
+
+static int hostserv_saxdb_read_toplevel(const char *name, void *data, UNUSED_ARG(void *extra)) {
+ struct record_data *rd = data;
+ struct hs_toplevel *tlfh;
+ struct hs_manager *managerTL;
+ struct hs_user *user;
+ struct dict *object;
+
+ if (rd->type == RECDB_OBJECT) {
+ dict_t db = GET_RECORD_OBJECT(rd);
+ dict_iterator_t it;
+
+ tlfh = hs_add_toplevel(name);
+
+ if ((object = database_get_data(db, KEY_MANAGERS, RECDB_OBJECT))) {
+ for (it = dict_first(object); it; it = iter_next(it)) {
+ user = hs_get_user(get_handle_info(iter_key(it)), 1);
+ //rd = iter_data(it);
+ /* nothing in here, yet */
+ managerTL = hs_add_manager_toplevel(tlfh, user);
+ if (database_get_data(db, KEY_ACTIVE, RECDB_QSTRING))
+ managerTL->active = 1;
+ else
+ managerTL->active = 0;
+ }
+ }
+
+ if ((object = database_get_data(db, KEY_SECONDLEVEL, RECDB_OBJECT)))
+ dict_foreach(object, hostserv_saxdb_read_secondlevel, tlfh);
+ }
+ return 0;