+ return 1;
+}
+
+static MODCMD_FUNC(cmd_set) {
+ struct handle_info *hi;
+ struct hs_user *hs_user;
+ struct hs_assignment *assignment;
+ struct hs_assignment *assgn;
+ struct hs_toplevel *tlfh;
+ struct hs_secondlevel *slfh;
+ char *fakehost;
+
+ if (!(hi = user->handle_info)) {
+ reply("NSMSG_MUST_AUTH");
+ return 0;
+ }
+ hs_user = hs_get_user(hi, 0);
+ if(!strcmp(argv[1], "*")) {
+ hi->fakehost = NULL;
+ apply_fakehost(hi, NULL);
+ if(hs_user->assignments) {
+ for(assgn = hs_user->assignments; assgn; assgn = assgn->unext) {
+ assgn->active = 0;
+ }
+ }
+ return 1;
+ } else {
+ if(!strchr(argv[1], '.')) {
+ return 0;
+ }
+ fakehost = argv[1];
+ char *slfh_name = fakehost;
+ char *tlfh_name = strchr(fakehost, '.');
+ *tlfh_name = '\0';
+ tlfh_name++;
+ if(strchr(tlfh_name, '.')) {
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+ }
+ for(assignment = hs_user->assignments; assignment; assignment = assignment->unext) {
+ slfh = assignment->secondlevel;
+ tlfh = slfh->toplevel;
+ if(!irccasecmp(slfh_name, slfh->fakehost)) {
+ if(!irccasecmp(tlfh_name, tlfh->fakehost)) {
+ activateAssignment(assignment);
+ reply("HSMSG_FAKEHOST_SET_SUCCESS", slfh->fakehost, tlfh->fakehost);
+ return 1;
+ }
+ }
+ }
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+ }
+}
+
+static MODCMD_FUNC(cmd_assign) {
+ struct handle_info *hi;
+ struct handle_info *hiuser;
+ char *fakehost;
+ if(!strchr(argv[1], '.')) {
+ if (!(hi = modcmd_get_handle_info(user, argv[1])))
+ return 0;
+ fakehost = argv[2];
+ } else {
+ if (!(hi = modcmd_get_handle_info(user, argv[2])))
+ return 0;
+ fakehost = argv[1];
+ }
+ if (!(hiuser = user->handle_info)) {
+ reply("NSMSG_MUST_AUTH");
+ return 0;
+ }
+ if(!fakehost) {
+ reply("HSMSG_ASSIGNED_NONE");
+ return 0;
+ }
+ char *slfh_name = fakehost;
+ char *tlfh_name = strchr(fakehost, '.');
+ if(tlfh_name) {
+ *tlfh_name = '\0';
+ } else {
+ reply("HSMSG_ASSIGNED_NONE");
+ return 0;
+ }
+ tlfh_name++;
+ if(strchr(tlfh_name, '.')) {
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+ }
+ struct hs_toplevel *tlfh;;
+ struct hs_secondlevel *slfh;
+ struct hs_user *hs_user = hs_get_user(hi, 1);
+ for(tlfh = toplevels; tlfh; tlfh = tlfh->next) {
+ if(!irccasecmp(tlfh_name, tlfh->fakehost)) {
+ for(slfh = tlfh->secondlevel; slfh; slfh = slfh->next) {
+ if(!irccasecmp(slfh_name, slfh->fakehost)) {
+ if(check_management_access(hiuser, tlfh, slfh)) {
+ hs_add_assignment(slfh, hs_user);
+ reply("HSMSG_FAKEHOST_ASSIGN_SUCCESS", slfh_name, tlfh_name);
+ return 1;
+ }
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+ }
+ }
+ }
+ }
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+}
+
+static MODCMD_FUNC(cmd_revoke) {
+ struct handle_info *hi;
+ struct handle_info *hiuser;
+ char *fakehost;
+ if(!strchr(argv[1], '.')) {
+ if (!(hi = modcmd_get_handle_info(user, argv[1])))
+ return 0;
+ fakehost = argv[2];
+ } else {
+ if (!(hi = modcmd_get_handle_info(user, argv[2])))
+ return 0;
+ fakehost = argv[1];
+ }
+ if (!(hiuser = user->handle_info)) {
+ reply("NSMSG_MUST_AUTH");
+ return 0;
+ }
+ if(!fakehost) {
+ reply("HSMSG_ASSIGNED_NONE");
+ return 0;
+ }
+ char *slfh_name = fakehost;
+ char *tlfh_name = strchr(fakehost, '.');
+ if(tlfh_name) {
+ *tlfh_name = '\0';
+ } else {
+ reply("HSMSG_ASSIGNED_NONE");
+ return 0;
+ }
+ tlfh_name++;
+ if(strchr(tlfh_name, '.')) {
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+ }
+ struct hs_assignment *assignment;
+ struct hs_user *hs_user = hs_get_user(hi, 0);
+ for(assignment = hs_user->assignments; assignment; assignment = assignment->unext) {
+ if(!irccasecmp(slfh_name, assignment->secondlevel->fakehost)) {
+ if(!irccasecmp(tlfh_name, assignment->secondlevel->toplevel->fakehost)) {
+ if(check_management_access(hi, assignment->secondlevel->toplevel, assignment->secondlevel)) {
+ hs_del_assignment(assignment, 1);
+ reply("HSMSG_FAKEHOST_REVOKE_SUCCESS", slfh_name, tlfh_name);
+ return 1;
+ }
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+ }
+ }
+ }
+ reply("HSMSG_UNKNOWN_FAKEHOST", slfh_name, tlfh_name);
+ return 0;
+}
+
+static void hostserv_conf_read(void)
+{
+ dict_t conf_node;
+ const char *str;
+
+ str = "modules/hostserv";
+ if (!(conf_node = conf_get_data(str, RECDB_OBJECT))) {
+ log_module(HS_LOG, LOG_ERROR, "config node `%s' is missing or has wrong type.", str);
+ return;
+ }
+
+ str = database_get_data(conf_node, "nick", RECDB_QSTRING);
+ if(hostserv_conf.nick && strcmp(hostserv_conf.nick, str)) {
+ //nick changed
+ }
+ hostserv_conf.nick = str;
+
+ str = database_get_data(conf_node, "modes", RECDB_QSTRING);
+ hostserv_conf.modes = (str ? str : NULL);
+
+ str = database_get_data(conf_node, "toplevel_access", RECDB_QSTRING);
+ unsigned int toplevel_access = atoi(str);
+ hostserv_conf.toplevel_access = (toplevel_access ? toplevel_access : 600);
+
+ /*str = database_get_data(conf_node, "description", RECDB_QSTRING);
+ hostserv_conf.description = (str ? str : NULL);*/
+ str = database_get_data(conf_node, KEY_TITLEHOST_SUFFIX, RECDB_QSTRING);
+ title_suffix = str ? str : "example.net";