2 * IRC - Internet Relay Chat, ircd/ircd_auth.c
3 * Copyright 2004 Michael Poole <mdpoole@troilus.org>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2, or (at your option)
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, write to the Free Software
17 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
21 * @brief IAuth client implementation for an IRC server.
27 #include "ircd_alloc.h"
28 #include "ircd_auth.h"
29 #include "ircd_events.h"
30 #include "ircd_features.h"
32 #include "ircd_osdep.h"
33 #include "ircd_snprintf.h"
34 #include "ircd_string.h"
50 #include <sys/socket.h>
51 #include <netinet/in.h>
52 #include <arpa/inet.h>
57 /** Describes state of a single pending IAuth request. */
59 struct IAuthRequest *iar_prev; /**< previous request struct */
60 struct IAuthRequest *iar_next; /**< next request struct */
61 struct Client *iar_client; /**< client being authenticated */
62 char iar_timed; /**< if non-zero, using parent i_request_timer */
65 /** Enumeration of IAuth connection flags. */
68 IAUTH_BLOCKED, /**< socket buffer full */
69 IAUTH_CONNECTED, /**< server greeting/handshake done */
70 IAUTH_ABORT, /**< abort connection asap */
71 IAUTH_ICLASS, /**< tell iauth about all local users */
72 IAUTH_CLOSING, /**< candidate to be disposed */
73 IAUTH_LAST_FLAG /**< total number of flags */
75 /** Declare a bitset structure indexed by IAuthFlag. */
76 DECLARE_FLAGSET(IAuthFlags, IAUTH_LAST_FLAG);
78 /** Describes state of an IAuth connection. */
80 struct IAuthRequest i_list_head; /**< doubly linked list of requests */
81 struct MsgQ i_sendQ; /**< messages queued to send */
82 struct Socket i_socket; /**< connection to server */
83 struct Timer i_reconn_timer; /**< when to reconnect the connection */
84 struct Timer i_request_timer; /**< when the current request times out */
85 struct IAuthFlags i_flags; /**< connection state/status/flags */
86 struct DNSQuery i_query; /**< DNS lookup for iauth server */
87 unsigned int i_recvM; /**< messages received */
88 unsigned int i_sendM; /**< messages sent */
89 unsigned int i_recvK; /**< kilobytes received */
90 unsigned int i_sendK; /**< kilobytes sent */
91 unsigned short i_recvB; /**< bytes received modulo 1024 */
92 unsigned short i_sendB; /**< bytes sent modulo 1024 */
93 time_t i_reconnect; /**< seconds to wait before reconnecting */
94 time_t i_timeout; /**< seconds to wait for a request */
95 unsigned int i_count; /**< characters used in i_buffer */
96 char i_buffer[BUFSIZE+1]; /**< partial unprocessed line from server */
97 char i_passwd[PASSWDLEN+1]; /**< password for connection */
98 char i_host[HOSTLEN+1]; /**< iauth server hostname */
99 struct irc_sockaddr i_addr; /**< iauth server ip address and port */
100 struct IAuth *i_next; /**< next connection in list */
103 /** Return flags element of \a iauth. */
104 #define i_flags(iauth) ((iauth)->i_flags)
105 /** Return whether flag \a flag is set on \a iauth. */
106 #define IAuthGet(iauth, flag) FlagHas(&i_flags(iauth), flag)
107 /** Set flag \a flag on \a iauth. */
108 #define IAuthSet(iauth, flag) FlagSet(&i_flags(iauth), flag)
109 /** Clear flag \a flag from \a iauth. */
110 #define IAuthClr(iauth, flag) FlagClr(&i_flags(iauth), flag)
111 /** Get blocked state for \a iauth. */
112 #define i_GetBlocked(iauth) IAuthGet(iauth, IAUTH_BLOCKED)
113 /** Set blocked state for \a iauth. */
114 #define i_SetBlocked(iauth) IAuthSet(iauth, IAUTH_BLOCKED)
115 /** Clear blocked state for \a iauth. */
116 #define i_ClrBlocked(iauth) IAuthClr(iauth, IAUTH_BLOCKED)
117 /** Get connected flag for \a iauth. */
118 #define i_GetConnected(iauth) IAuthGet(iauth, IAUTH_CONNECTED)
119 /** Set connected flag for \a iauth. */
120 #define i_SetConnected(iauth) IAuthSet(iauth, IAUTH_CONNECTED)
121 /** Clear connected flag for \a iauth. */
122 #define i_ClrConnected(iauth) IAuthClr(iauth, IAUTH_CONNECTED)
123 /** Get abort flag for \a iauth. */
124 #define i_GetAbort(iauth) IAuthGet(iauth, IAUTH_ABORT)
125 /** Set abort flag for \a iauth. */
126 #define i_SetAbort(iauth) IAuthSet(iauth, IAUTH_ABORT)
127 /** Clear abort flag for \a iauth. */
128 #define i_ClrAbort(iauth) IAuthClr(iauth, IAUTH_ABORT)
129 /** Get IClass flag for \a iauth. */
130 #define i_GetIClass(iauth) IAuthGet(iauth, IAUTH_ICLASS)
131 /** Set IClass flag for \a iauth. */
132 #define i_SetIClass(iauth) IAuthSet(iauth, IAUTH_ICLASS)
133 /** Clear IClass flag for \a iauth. */
134 #define i_ClrIClass(iauth) IAuthClr(iauth, IAUTH_ICLASS)
135 /** Get closing flag for \a iauth. */
136 #define i_GetClosing(iauth) IAuthGet(iauth, IAUTH_CLOSING)
137 /** Set closing flag for \a iauth. */
138 #define i_SetClosing(iauth) IAuthSet(iauth, IAUTH_CLOSING)
139 /** Clear closing flag for \a iauth. */
140 #define i_ClrClosing(iauth) IAuthClr(iauth, IAUTH_CLOSING)
142 /** Return head of request linked list for \a iauth. */
143 #define i_list_head(iauth) ((iauth)->i_list_head)
144 /** Return socket event generator for \a iauth. */
145 #define i_socket(iauth) ((iauth)->i_socket)
146 /** Return reconnect timer for \a iauth. */
147 #define i_reconn_timer(iauth) ((iauth)->i_reconn_timer)
148 /** Return request timeout timer for \a iauth. */
149 #define i_request_timer(iauth) ((iauth)->i_request_timer)
150 /** Return DNS query for \a iauth. */
151 #define i_query(iauth) ((iauth)->i_query)
152 /** Return received bytes (modulo 1024) for \a iauth. */
153 #define i_recvB(iauth) ((iauth)->i_recvB)
154 /** Return received kilobytes (modulo 1024) for \a iauth. */
155 #define i_recvK(iauth) ((iauth)->i_recvK)
156 /** Return received megabytes for \a iauth. */
157 #define i_recvM(iauth) ((iauth)->i_recvM)
158 /** Return sent bytes (modulo 1024) for \a iauth. */
159 #define i_sendB(iauth) ((iauth)->i_sendB)
160 /** Return sent kilobytes (modulo 1024) for \a iauth. */
161 #define i_sendK(iauth) ((iauth)->i_sendK)
162 /** Return sent megabytes for \a iauth. */
163 #define i_sendM(iauth) ((iauth)->i_sendM)
164 /** Return outbound message queue for \a iauth. */
165 #define i_sendQ(iauth) ((iauth)->i_sendQ)
166 /** Return reconnection interval for \a iauth. */
167 #define i_reconnect(iauth) ((iauth)->i_reconnect)
168 /** Return request timeout interval for \a iauth. */
169 #define i_timeout(iauth) ((iauth)->i_timeout)
170 /** Return length of unprocessed message data for \a iauth. */
171 #define i_count(iauth) ((iauth)->i_count)
172 /** Return start of unprocessed message data for \a iauth. */
173 #define i_buffer(iauth) ((iauth)->i_buffer)
174 /** Return password we send for \a iauth. */
175 #define i_passwd(iauth) ((iauth)->i_passwd)
176 /** Return server hostname for \a iauth. */
177 #define i_host(iauth) ((iauth)->i_host)
178 /** Return address of IAuth server for \a iauth. */
179 #define i_addr(iauth) ((iauth)->i_addr)
180 /** Return server port for \a iauth. */
181 #define i_port(iauth) ((iauth)->i_addr.port)
182 /** Return next IAuth connection after \a iauth. */
183 #define i_next(iauth) ((iauth)->i_next)
185 /** Command table entry. */
187 const char *iac_name; /**< Name of command. */
188 void (*iac_func)(struct IAuth *iauth, int, char *[]); /**< Handler function. */
191 /** Active %IAuth connection(s). */
192 struct IAuth *iauth_active;
194 static void iauth_write(struct IAuth *iauth);
195 static void iauth_reconnect(struct IAuth *iauth);
196 static void iauth_disconnect(struct IAuth *iauth);
197 static void iauth_sock_callback(struct Event *ev);
198 static void iauth_send_request(struct IAuth *iauth, struct IAuthRequest *iar);
199 static void iauth_dispose_request(struct IAuth *iauth, struct IAuthRequest *iar);
200 static void iauth_cmd_doneauth(struct IAuth *iauth, int argc, char *argv[]);
201 static void iauth_cmd_badauth(struct IAuth *iauth, int argc, char *argv[]);
203 /** Table of responses we might get from the IAuth server. */
204 static const struct IAuthCmd iauth_cmdtab[] = {
205 { "DoneAuth", iauth_cmd_doneauth },
206 { "BadAuth", iauth_cmd_badauth },
210 /** Start (or update) a connection to an %IAuth server.
211 * If a connection already exists for the specified server name and
212 * port, update it with the other parameters; otherwise allocate a new
214 * @param[in] host %IAuth server hostname.
215 * @param[in] port %IAuth server port.
216 * @param[in] passwd Password to send.
217 * @param[in] reconnect Reconnect interval.
218 * @param[in] timeout Request timeout interval.
219 * @return IAuth structure for that connection.
221 struct IAuth *iauth_connect(char *host, unsigned short port, char *passwd, time_t reconnect, time_t timeout)
225 for (iauth = iauth_active; iauth; iauth = i_next(iauth)) {
226 if (!ircd_strncmp(i_host(iauth), host, HOSTLEN)
227 && (i_port(iauth) == port)) {
229 i_reconnect(iauth) = reconnect;
230 if (t_active(&i_reconn_timer(iauth)) && (t_expire(&i_reconn_timer(iauth)) > CurrentTime + i_reconnect(iauth)))
231 timer_chg(&i_reconn_timer(iauth), TT_RELATIVE, i_reconnect(iauth));
236 if (iauth_active && !i_GetClosing(iauth_active)) {
237 log_write(LS_CONFIG, L_WARNING, 0, "Creating extra active IAuth connection to %s:%d.", host, port);
239 iauth = MyCalloc(1, sizeof(*iauth));
240 i_list_head(iauth).iar_prev = &i_list_head(iauth);
241 i_list_head(iauth).iar_next = &i_list_head(iauth);
242 msgq_init(&i_sendQ(iauth));
243 ircd_strncpy(i_host(iauth), host, HOSTLEN);
244 memset(&i_addr(iauth), 0, sizeof(i_addr(iauth)));
245 i_port(iauth) = port;
246 iauth_active = iauth;
247 i_reconnect(iauth) = reconnect;
248 iauth_reconnect(iauth);
251 ircd_strncpy(i_passwd(iauth), passwd, PASSWDLEN);
253 i_passwd(iauth)[0] = '\0';
254 i_timeout(iauth) = timeout;
259 /** Mark all %IAuth connections as closing. */
260 void iauth_mark_closing(void)
263 for (iauth = iauth_active; iauth; iauth = i_next(iauth))
267 /** Close a particular %IAuth connection.
268 * @param[in] iauth %Connection to close.
270 void iauth_close(struct IAuth *iauth)
272 /* Figure out what to do with the closing connection's requests. */
273 if (i_list_head(iauth).iar_next != &i_list_head(iauth)) {
274 struct IAuthRequest *iar;
275 if (iauth_active || i_next(iauth)) {
276 /* If iauth_active != NULL, send requests to it; otherwise if
277 * i_next(iauth) != NULL, we can hope it or some later
278 * connection will be active.
280 struct IAuth *target = iauth_active ? iauth_active : i_next(iauth);
282 /* Append iauth->i_list_head to end of target->i_list_head. */
283 iar = i_list_head(iauth).iar_next;
284 iar->iar_prev = i_list_head(target).iar_prev;
285 i_list_head(target).iar_prev->iar_next = iar;
286 iar = i_list_head(iauth).iar_prev;
287 iar->iar_next = &i_list_head(target);
288 i_list_head(target).iar_prev = iar;
290 /* If the target is not closing, send the requests. */
291 for (iar = i_list_head(iauth).iar_next;
292 iar != &i_list_head(target);
293 iar = iar->iar_next) {
294 if (!i_GetClosing(target))
295 iauth_send_request(target, iar);
298 /* No active connections - approve the requests and drop them. */
299 while ((iar = i_list_head(iauth).iar_next) != &i_list_head(iauth)) {
300 struct Client *client = iar->iar_client;
301 iauth_dispose_request(iauth, iar);
302 register_user(client, client, cli_name(client), cli_username(client));
306 /* Make sure the connection closes with an empty request list. */
307 i_list_head(iauth).iar_prev = &i_list_head(iauth);
308 i_list_head(iauth).iar_next = &i_list_head(iauth);
309 /* Cancel the timer, if it is active. */
310 if (t_active(&i_reconn_timer(iauth)))
311 timer_del(&i_reconn_timer(iauth));
312 if (t_active(&i_request_timer(iauth)))
313 timer_del(&i_request_timer(iauth));
314 /* Disconnect from the server. */
315 if (s_fd(&i_socket(iauth)) != -1)
316 iauth_disconnect(iauth);
321 /** Close all %IAuth connections marked as closing. */
322 void iauth_close_unused(void)
324 struct IAuth *prev, *iauth, *next;
326 for (prev = NULL, iauth = iauth_active; iauth; iauth = next) {
327 next = i_next(iauth);
328 if (i_GetClosing(iauth)) {
329 /* Update iauth_active linked list. */
334 /* Close and destroy the connection. */
342 /** Send a line to an %IAuth server.
343 * @param[in] iauth %Connection to send on.
344 * @param[in] format Format string for message.
346 static void iauth_send(struct IAuth *iauth, const char *format, ...)
351 va_start(vl, format);
352 mb = msgq_vmake(0, format, vl);
354 msgq_add(&i_sendQ(iauth), mb, 0);
358 /** Report a protocol violation from the %IAuth server.
359 * @param[in] iauth %Connection that experienced the violation.
360 * @param[in] format Format string for message to operators.
362 static void iauth_protocol_violation(struct IAuth *iauth, const char *format, ...)
367 vd.vd_format = format;
368 va_start(vd.vd_args, format);
369 sendwallto_group_butone(&me, WALL_DESYNCH, NULL, "IAuth protocol violation: %v", &vd);
373 /** Send on-connect burst to an %IAuth server.
374 * @param[in] iauth %Connection that has completed.
376 static void iauth_on_connect(struct IAuth *iauth)
378 struct IAuthRequest *iar;
379 if (EmptyString(i_passwd(iauth)))
380 iauth_send(iauth, "Server %s", cli_name(&me));
382 iauth_send(iauth, "Server %s %s", cli_name(&me), i_passwd(iauth));
383 if (i_GetIClass(iauth)) {
384 /* TODO: report local users to iauth */
385 iauth_send(iauth, "EndUsers");
387 i_SetConnected(iauth);
388 for (iar = i_list_head(iauth).iar_next;
389 iar != &i_list_head(iauth);
391 iauth_send_request(iauth, iar);
395 /** Complete disconnection of an %IAuth connection.
396 * @param[in] iauth %Connection to fully close.
398 static void iauth_disconnect(struct IAuth *iauth)
400 close(s_fd(&i_socket(iauth)));
401 socket_del(&i_socket(iauth));
402 s_fd(&i_socket(iauth)) = -1;
405 /** DNS completion callback for an %IAuth connection.
406 * @param[in] vptr Pointer to the IAuth struct.
407 * @param[in] he DNS reply parameters.
409 static void iauth_dns_callback(void *vptr, struct DNSReply *he)
411 struct IAuth *iauth = vptr;
413 sendto_opmask_butone(0, SNO_OLDSNO, "IAuth connection to %s failed: host lookup failed", i_host(iauth));
415 memcpy(&i_addr(iauth).addr, &he->addr, sizeof(i_addr(iauth).addr));
416 if (!irc_in_addr_valid(&i_addr(iauth).addr)) {
417 sendto_opmask_butone(0, SNO_OLDSNO, "IAuth connection to %s failed: host came back as unresolved", i_host(iauth));
420 iauth_reconnect(iauth);
424 /** Timer callback for reconnecting to %IAuth.
425 * @param[in] ev Timer event for reconnect.
427 static void iauth_reconnect_ev(struct Event *ev)
429 if (ev_type(ev) == ET_EXPIRE)
430 iauth_reconnect(t_data(ev_timer(ev)));
433 /** Schedule a reconnection for \a iauth.
434 * @param[in] iauth %Connection that needs to be reconnected.
436 static void iauth_schedule_reconnect(struct IAuth *iauth)
439 assert(!t_active(&i_reconn_timer(iauth)));
440 timer = timer_init(&i_reconn_timer(iauth));
441 timer_add(timer, iauth_reconnect_ev, iauth, TT_RELATIVE, i_reconnect(iauth));
444 /** Initiate a (re-)connection to \a iauth.
445 * @param[in] iauth %Connection that should be initiated.
447 static void iauth_reconnect(struct IAuth *iauth)
452 Debug((DEBUG_INFO, "IAuth attempt connection to %s port %p.", i_host(iauth), i_port(iauth)));
453 if (!irc_in_addr_valid(&i_addr(iauth).addr)
454 && !ircd_aton(&i_addr(iauth).addr, i_host(iauth))) {
455 i_query(iauth).vptr = iauth;
456 i_query(iauth).callback = iauth_dns_callback;
457 gethost_byname(i_host(iauth), &i_query(iauth));
460 fd = os_socket(&VirtualHost, SOCK_STREAM, "IAuth");
463 if (!os_set_sockbufs(fd, SERVER_TCP_WINDOW, SERVER_TCP_WINDOW)) {
465 sendto_opmask_butone(0, SNO_OLDSNO, "IAuth reconnect unable to set socket buffers: %s", strerror(errno));
468 result = os_connect_nonb(fd, &i_addr(iauth));
469 if (result == IO_FAILURE) {
471 sendto_opmask_butone(0, SNO_OLDSNO, "IAuth reconnect unable to initiate connection: %s", strerror(errno));
474 if (!socket_add(&i_socket(iauth), iauth_sock_callback, iauth,
475 (result == IO_SUCCESS) ? SS_CONNECTED : SS_CONNECTING,
476 SOCK_EVENT_READABLE | SOCK_EVENT_WRITABLE, fd)) {
478 sendto_opmask_butone(0, SNO_OLDSNO, "IAuth reconnect unable to add socket: %s", strerror(errno));
483 /** Read input from \a iauth.
484 * Reads up to SERVER_TCP_WINDOW bytes per pass.
485 * @param[in] iauth Readable connection.
487 static void iauth_read(struct IAuth *iauth)
489 char *src, *endp, *old_buffer, *argv[MAXPARA + 1];
490 unsigned int length, argc, ii;
491 char readbuf[SERVER_TCP_WINDOW];
494 if (IO_FAILURE == os_recv_nonb(s_fd(&i_socket(iauth)), readbuf, sizeof(readbuf), &length))
496 i_recvB(iauth) += length;
497 if (i_recvB(iauth) > 1023) {
498 i_recvK(iauth) += i_recvB(iauth) >> 10;
499 i_recvB(iauth) &= 1023;
501 old_buffer = i_buffer(iauth);
502 endp = old_buffer + i_count(iauth);
503 for (src = readbuf; length > 0; --length) {
506 /* Skip blank lines. */
507 if (endp == old_buffer)
509 /* NUL-terminate line and split parameters. */
511 for (argc = 0, endp = old_buffer; *endp && (argc < MAXPARA); ) {
518 argv[argc++] = endp + 1;
522 for (; *endp && *endp != ' '; ++endp) ;
525 /* Count line and reset endp to start of buffer. */
528 /* Look up command and try to dispatch. */
530 for (ii = 0; iauth_cmdtab[ii].iac_name; ++ii) {
531 if (!ircd_strcmp(iauth_cmdtab[ii].iac_name, argv[0])) {
532 iauth_cmdtab[ii].iac_func(iauth, argc, argv);
533 if (i_GetAbort(iauth))
534 iauth_disconnect(iauth);
540 else if (endp < old_buffer + BUFSIZE)
543 i_count(iauth) = endp - old_buffer;
546 /** Send queued output to \a iauth.
547 * @param[in] iauth Writable connection with queued data.
549 static void iauth_write(struct IAuth *iauth)
551 unsigned int bytes_tried, bytes_sent;
554 if (i_GetBlocked(iauth))
556 while (MsgQLength(&i_sendQ(iauth)) > 0) {
557 iores = os_sendv_nonb(s_fd(&i_socket(iauth)), &i_sendQ(iauth), &bytes_tried, &bytes_sent);
560 msgq_delete(&i_sendQ(iauth), bytes_sent);
561 i_sendB(iauth) += bytes_sent;
562 if (i_sendB(iauth) > 1023) {
563 i_sendK(iauth) += i_sendB(iauth) >> 10;
564 i_sendB(iauth) &= 1023;
566 if (bytes_tried == bytes_sent)
568 /* If bytes_sent < bytes_tried, fall through to IO_BLOCKED. */
571 socket_events(&i_socket(iauth), SOCK_ACTION_ADD | SOCK_EVENT_WRITABLE);
574 iauth_disconnect(iauth);
578 /* We were able to flush all events, so remove notification. */
579 socket_events(&i_socket(iauth), SOCK_ACTION_DEL | SOCK_EVENT_WRITABLE);
582 /** Handle socket activity for an %IAuth connection.
583 * @param[in] ev &Socket event; the IAuth connection is the user data pointer for the socket.
585 static void iauth_sock_callback(struct Event *ev)
589 assert(0 != ev_socket(ev));
590 iauth = (struct IAuth*) s_data(ev_socket(ev));
593 switch (ev_type(ev)) {
595 socket_state(ev_socket(ev), SS_CONNECTED);
596 iauth_on_connect(iauth);
599 if (!i_GetClosing(iauth))
600 iauth_schedule_reconnect(iauth);
610 iauth_disconnect(iauth);
613 sendto_opmask_butone(0, SNO_OLDSNO, "IAuth socket error: %s", strerror(ev_data(ev)));
614 log_write(LS_SOCKET, L_ERROR, 0, "IAuth socket error: %s", strerror(ev_data(ev)));
615 iauth_disconnect(iauth);
618 assert(0 && "Unrecognized event type");
623 /* Functions related to IAuthRequest structs */
625 /** Handle timeout while waiting for a response.
626 * @param[in] ev Timer event that expired.
628 static void iauth_request_ev(struct Event *ev)
630 /* TODO: this could probably be more intelligent */
631 if (ev_type(ev) == ET_EXPIRE) {
632 sendto_opmask_butone(0, SNO_OLDSNO, "IAuth request timed out; reconnecting");
633 iauth_reconnect(t_data(ev_timer(ev)));
637 /** Send a authorization request to an %IAuth server.
638 * @param[in] iauth %Connection to send request on.
639 * @param[in] iar Request to send.
641 static void iauth_send_request(struct IAuth *iauth, struct IAuthRequest *iar)
643 struct Client *client;
645 /* If iauth is not connected, we must defer the request. */
646 if (!i_GetConnected(iauth)) {
647 Debug((DEBUG_SEND, "IAuth deferring request for %s because we are not connected.", cli_name(iar->iar_client)));
651 /* If no timed request, set up expiration timer. */
652 if (!t_active(&i_request_timer(iauth))) {
653 struct Timer *timer = timer_init(&i_request_timer(iauth));
654 timer_add(timer, iauth_request_ev, iauth, TT_RELATIVE, i_timeout(iauth));
659 /* Send the FullAuth request. */
660 client = iar->iar_client;
661 assert(iar->iar_client != NULL);
662 iauth_send(iauth, "FullAuth %x %s %s %s %s %s :%s",
663 client, cli_name(client), cli_username(client),
664 cli_user(client)->host, cli_sock_ip(client),
665 cli_passwd(client), cli_info(client));
667 /* Write to the socket if we can. */
671 /** Start independent authorization check for a client.
672 * @param[in] iauth %Connection to send request on.
673 * @param[in] cptr Client to check.
674 * @return Zero, or CPTR_KILLED in case of memory allocation failure.
676 int iauth_start_client(struct IAuth *iauth, struct Client *cptr)
678 struct IAuthRequest *iar;
680 /* Allocate and initialize IAuthRequest struct. */
681 if (!(iar = MyCalloc(1, sizeof(*iar))))
682 return exit_client(cptr, cptr, &me, "IAuth memory allocation failed");
683 iar->iar_next = &i_list_head(iauth);
684 iar->iar_prev = i_list_head(iauth).iar_prev;
685 iar->iar_client = cptr;
686 iar->iar_prev->iar_next = iar;
687 iar->iar_next->iar_prev = iar;
690 iauth_send_request(iauth, iar);
695 /** Handle a client that is disconnecting.
696 * If there is a pending %IAuth request for the client, close it.
697 * @param[in] cptr Client that is disconnecting.
699 void iauth_exit_client(struct Client *cptr)
701 if (cli_iauth(cptr)) {
702 iauth_dispose_request(iauth_active, cli_iauth(cptr));
703 cli_iauth(cptr) = NULL;
704 } else if (IsIAuthed(cptr) && i_GetIClass(iauth_active)) {
705 /* TODO: report quit to iauth */
709 /** Find pending request with a particular ID.
710 * @param[in] iauth %Connection context for the ID.
711 * @param[in] id Identifier to look up.
712 * @return IAuthRequest with that ID, or NULL.
714 static struct IAuthRequest *iauth_find_request(struct IAuth *iauth, char *id)
716 struct IAuthRequest *curr;
717 struct Client *target;
718 target = (struct Client*)strtoul(id, NULL, 16);
719 for (curr = i_list_head(iauth).iar_next;
720 curr != &i_list_head(iauth);
721 curr = curr->iar_next) {
722 assert(curr->iar_client != NULL);
723 if (target == curr->iar_client)
729 /** Unlink and free a request.
730 * @param[in] iauth Connection that owns the request.
731 * @param[in] iar Request to free.
733 static void iauth_dispose_request(struct IAuth *iauth, struct IAuthRequest *iar)
735 assert(iar->iar_client != NULL);
737 timer_del(&i_request_timer(iauth));
738 cli_iauth(iar->iar_client) = NULL;
739 iar->iar_prev->iar_next = iar->iar_next;
740 iar->iar_next->iar_prev = iar->iar_prev;
744 /** Handle a DoneAuth response from %IAuth.
745 * THis means the client is authorized, so let them in.
746 * @param[in] iauth Connection that sent the message.
747 * @param[in] argc Argument count.
748 * @param[in] argv Argument list.
750 static void iauth_cmd_doneauth(struct IAuth *iauth, int argc, char *argv[])
752 struct IAuthRequest *iar;
753 struct Client *client;
761 iauth_protocol_violation(iauth, "Only %d parameters for DoneAuth (expected >=5)", argc);
768 account = (argc > 5) ? argv[5] : 0;
769 iar = iauth_find_request(iauth, id);
771 iauth_protocol_violation(iauth, "Got unexpected DoneAuth for id %s", id);
774 client = iar->iar_client;
775 ircd_strncpy(cli_username(client), username, USERLEN);
776 ircd_strncpy(cli_user(client)->host, hostname, HOSTLEN);
778 ircd_strncpy(cli_user(client)->account, account, ACCOUNTLEN);
782 iauth_dispose_request(iauth, iar);
783 register_user(client, client, cli_name(client), username);
786 /** Handle a BadAuth response from %IAuth.
787 * This means the client is not authorized, so dump them.
788 * @param[in] iauth Connection that sent the message.
789 * @param[in] argc Argument count.
790 * @param[in] argv Argument list.
792 static void iauth_cmd_badauth(struct IAuth *iauth, int argc, char *argv[])
794 struct IAuthRequest *iar;
795 struct Client *client;
800 iauth_protocol_violation(iauth, "Only %d parameters for BadAuth (expected >=3)", argc);
805 if (EmptyString(reason)) {
806 iauth_protocol_violation(iauth, "Empty BadAuth reason for id %s", id);
809 iar = iauth_find_request(iauth, id);
811 iauth_protocol_violation(iauth, "Got unexpected BadAuth for id %s", id);
814 client = iar->iar_client;
815 iauth_dispose_request(iauth, iar);
816 exit_client(client, client, &me, reason);