/* * ircd_parser.y: A yacc/bison parser for ircd config files. * This is part of ircu, an Internet Relay Chat server. * The contents of this file are Copyright 2001 Diane Bruce, * Andrew Miller, the ircd-hybrid team and the ircu team. * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, * USA. * $Id: ircd_parser.y 1907 2009-02-09 04:11:04Z entrope $ */ %{ #include "config.h" #include "s_conf.h" #include "class.h" #include "client.h" #include "crule.h" #include "ircd_features.h" #include "fileio.h" #include "gline.h" #include "hash.h" #include "ircd.h" #include "ircd_alloc.h" #include "ircd_chattr.h" #include "ircd_log.h" #include "ircd_reply.h" #include "ircd_snprintf.h" #include "ircd_string.h" #include "list.h" #include "listener.h" #include "match.h" #include "motd.h" #include "numeric.h" #include "numnicks.h" #include "opercmds.h" #include "parse.h" #include "res.h" #include "s_auth.h" #include "s_bsd.h" #include "s_conf.h" #include "s_debug.h" #include "s_misc.h" #include "send.h" #include "struct.h" #include "sys.h" #include #include #include #include #define MAX_STRINGS 80 /* Maximum number of feature params. */ #define USE_IPV4 (1 << 16) #define USE_IPV6 (1 << 17) extern struct LocalConf localConf; extern struct DenyConf* denyConfList; extern struct CRuleConf* cruleConfList; extern struct ServerConf* serverConfList; extern struct s_map* GlobalServiceMapList; extern struct qline* GlobalQuarantineList; int yylex(void); /* Now all the globals we need :/... */ int tping, tconn, maxlinks, sendq, port, invert, stringno, flags, maxchans, iauth_required = 0; char *name, *pass, *host, *ip, *username, *origin, *hub_limit; struct SLink *hosts; char *stringlist[MAX_STRINGS]; struct ListenerFlags listen_flags; struct ConnectionClass *c_class; struct DenyConf *dconf; struct ServerConf *sconf; struct s_map *smap; struct Privs privs; struct Privs privs_dirty; struct webirc_block *webirc; static void parse_error(char *pattern,...) { static char error_buffer[1024]; va_list vl; va_start(vl,pattern); ircd_vsnprintf(NULL, error_buffer, sizeof(error_buffer), pattern, vl); va_end(vl); yyerror(error_buffer); } static void free_slist(struct SLink **link) { struct SLink *next; while (*link != NULL) { next = (*link)->next; MyFree((*link)->value.cp); free_link(*link); *link = next; } } %} %token QSTRING %token NUMBER %token GENERAL %token ADMIN %token LOCATION %token CONTACT %token CONNECT %token CLASS %token CHANNEL %token PINGFREQ %token CONNECTFREQ %token MAXLINKS %token MAXHOPS %token SENDQ %token NAME %token HOST %token IP %token USERNAME %token PASS %token LOCAL %token SECONDS %token MINUTES %token HOURS %token DAYS %token WEEKS %token MONTHS %token YEARS %token DECADES %token BYTES %token KBYTES %token MBYTES %token GBYTES %token TBYTES %token SERVER %token PORT %token MASK %token HUB %token LEAF %token UWORLD %token YES %token NO %token OPER %token VHOST %token HIDDEN %token MOTD %token JUPE %token NICK %token NUMERIC %token DESCRIPTION %token CLIENT %token KILL %token CRULE %token REAL %token REASON %token TFILE %token RULE %token ALL %token FEATURES %token QUARANTINE %token PSEUDO %token PREPEND %token USERMODE %token IAUTH %token TIMEOUT %token FAST %token AUTOCONNECT %token PROGRAM %token TOK_IPV4 TOK_IPV6 %token DNS %token FORWARDS %token SECURE %token WEBIRC %token SPOOF %token MAXCHANS %token REQUIRED %token SSL %token CERT %token CACERT /* and now a lot of privileges... */ %token TPRIV_CHAN_LIMIT TPRIV_MODE_LCHAN TPRIV_DEOP_LCHAN TPRIV_WALK_LCHAN %token TPRIV_LOCAL_KILL TPRIV_REHASH TPRIV_RESTART TPRIV_DIE %token TPRIV_GLINE TPRIV_LOCAL_GLINE TPRIV_LOCAL_JUPE TPRIV_LOCAL_BADCHAN %token TPRIV_LOCAL_OPMODE TPRIV_OPMODE TPRIV_SET TPRIV_WHOX TPRIV_BADCHAN %token TPRIV_SEE_CHAN TPRIV_SHOW_INVIS TPRIV_SHOW_ALL_INVIS TPRIV_PROPAGATE %token TPRIV_UNLIMIT_QUERY TPRIV_DISPLAY TPRIV_SEE_OPERS TPRIV_WIDE_GLINE %token TPRIV_FORCE_OPMODE TPRIV_FORCE_LOCAL_OPMODE TPRIV_APASS_OPMODE %token TPRIV_LIST_CHAN TPRIV_SEE_IDLETIME TPRIV_UMODE_NETSERV %token TPRIV_UMODE_NOCHAN TPRIV_UMODE_NOIDLE TPRIV_UMODE_CHSERV TPRIV_UMODE_XTRAOP %token TPRIV_FLOOD TPRIV_HALFFLOOD TPRIV_UNLIMITED_TARGET TPRIV_UMODE_OVERRIDECC %token TPRIV_HIDE_IDLETIME TPRIV_NOAMSG_OVERRIDE /* and some types... */ %type sizespec %type timespec timefactor factoredtimes factoredtime %type expr yesorno privtype address_family %left '+' '-' %left '*' '/' %union{ char *text; int num; } %% /* Blocks in the config file... */ blocks: blocks block | block; block: adminblock | generalblock | classblock | connectblock | uworldblock | operblock | portblock | jupeblock | clientblock | killblock | cruleblock | motdblock | featuresblock | quarantineblock | pseudoblock | iauthblock | forwardsblock | webircblock | sslblock | error ';'; /* The timespec, sizespec and expr was ripped straight from * ircd-hybrid-7. */ timespec: expr | factoredtimes; factoredtimes: factoredtimes factoredtime { $$ = $1 + $2; } | factoredtime; factoredtime: expr timefactor { $$ = $1 * $2; }; timefactor: SECONDS { $$ = 1; } | MINUTES { $$ = 60; } | HOURS { $$ = 60 * 60; } | DAYS { $$ = 60 * 60 * 24; } | WEEKS { $$ = 60 * 60 * 24 * 7; } | MONTHS { $$ = 60 * 60 * 24 * 7 * 4; } | YEARS { $$ = 60 * 60 * 24 * 365; } | DECADES { $$ = 60 * 60 * 24 * 365 * 10; }; sizespec: expr { $$ = $1; } | expr BYTES { $$ = $1; } | expr KBYTES { $$ = $1 * 1024; } | expr MBYTES { $$ = $1 * 1024 * 1024; } | expr GBYTES { $$ = $1 * 1024 * 1024 * 1024; } | expr TBYTES { $$ = $1 * 1024 * 1024 * 1024; } ; /* this is an arithmetic expression */ expr: NUMBER { $$ = $1; } | expr '+' expr { $$ = $1 + $3; } | expr '-' expr { $$ = $1 - $3; } | expr '*' expr { $$ = $1 * $3; } | expr '/' expr { $$ = $1 / $3; } /* leave this out until we find why it makes BSD yacc dump core -larne | '-' expr %prec NEG { $$ = -$2; } */ | '(' expr ')' { $$ = $2; } ; jupeblock: JUPE '{' jupeitems '}' ';' ; jupeitems: jupeitem jupeitems | jupeitem; jupeitem: jupenick; jupenick: NICK '=' QSTRING ';' { addNickJupes($3); MyFree($3); }; generalblock: GENERAL { /* Zero out the vhost addresses, in case they were removed. */ memset(&VirtualHost_v4.addr, 0, sizeof(VirtualHost_v4.addr)); memset(&VirtualHost_v6.addr, 0, sizeof(VirtualHost_v6.addr)); } '{' generalitems '}' ';' { if (localConf.name == NULL) parse_error("Your General block must contain a name."); if (localConf.numeric == 0) parse_error("Your General block must contain a numeric (between 1 and 4095)."); }; generalitems: generalitem generalitems | generalitem; generalitem: generalnumeric | generalname | generalvhost | generaldesc | generaldnsvhost | generaldnsserver; generalnumeric: NUMERIC '=' NUMBER ';' { if (localConf.numeric == 0) localConf.numeric = $3; else if (localConf.numeric != $3) parse_error("Redefinition of server numeric %i (%i)", $3, localConf.numeric); }; generalname: NAME '=' QSTRING ';' { if (localConf.name == NULL) localConf.name = $3; else { if (strcmp(localConf.name, $3)) parse_error("Redefinition of server name %s (%s)", $3, localConf.name); MyFree($3); } }; generaldesc: DESCRIPTION '=' QSTRING ';' { MyFree(localConf.description); localConf.description = $3; ircd_strncpy(cli_info(&me), $3, REALLEN); }; generalvhost: VHOST '=' QSTRING ';' { struct irc_in_addr addr; char *vhost = $3; if (!strcmp(vhost, "*")) { /* This traditionally meant bind to all interfaces and connect * from the default. */ } else if (!ircd_aton(&addr, vhost)) parse_error("Invalid virtual host '%s'.", vhost); else if (irc_in_addr_is_ipv4(&addr)) memcpy(&VirtualHost_v4.addr, &addr, sizeof(addr)); else memcpy(&VirtualHost_v6.addr, &addr, sizeof(addr)); MyFree(vhost); }; generaldnsvhost: DNS VHOST '=' address_family QSTRING ';' { struct irc_in_addr addr; int families = $4; char *vhost = $5; if (!strcmp(vhost, "*")) { /* Let the operating system assign the default. */ } else if (!ircd_aton(&addr, vhost)) parse_error("Invalid DNS virtual host '%s'.", vhost); else { if ((families & USE_IPV4) || (!families && irc_in_addr_is_ipv4(&addr))) memcpy(&VirtualHost_dns_v4.addr, &addr, sizeof(addr)); if ((families & USE_IPV6) || (!families && !irc_in_addr_is_ipv4(&addr))) memcpy(&VirtualHost_dns_v6.addr, &addr, sizeof(addr)); } MyFree(vhost); }; generaldnsserver: DNS SERVER '=' QSTRING ';' { char *server = $4; add_nameserver(server); MyFree(server); }; adminblock: ADMIN { MyFree(localConf.location1); MyFree(localConf.location2); MyFree(localConf.contact); localConf.location1 = localConf.location2 = localConf.contact = NULL; } '{' adminitems '}' ';' { if (localConf.location1 == NULL) DupString(localConf.location1, ""); if (localConf.location2 == NULL) DupString(localConf.location2, ""); if (localConf.contact == NULL) DupString(localConf.contact, ""); }; adminitems: adminitems adminitem | adminitem; adminitem: adminlocation | admincontact; adminlocation: LOCATION '=' QSTRING ';' { if (localConf.location1 == NULL) localConf.location1 = $3; else if (localConf.location2 == NULL) localConf.location2 = $3; else /* Otherwise just drop it. -A1kmm */ MyFree($3); }; admincontact: CONTACT '=' QSTRING ';' { MyFree(localConf.contact); localConf.contact = $3; }; classblock: CLASS { tping = 90; maxchans = 0; } '{' classitems '}' ';' { if (name != NULL) { struct ConnectionClass *c_class; add_class(name, tping, tconn, maxlinks, sendq, maxchans); c_class = find_class(name); MyFree(c_class->default_umode); c_class->default_umode = pass; memcpy(&c_class->privs, &privs, sizeof(c_class->privs)); memcpy(&c_class->privs_dirty, &privs_dirty, sizeof(c_class->privs_dirty)); } else { parse_error("Missing name in class block"); } name = NULL; pass = NULL; tconn = 0; maxlinks = 0; sendq = 0; memset(&privs, 0, sizeof(privs)); memset(&privs_dirty, 0, sizeof(privs_dirty)); }; classitems: classitem classitems | classitem; classitem: classname | classpingfreq | classconnfreq | classmaxlinks | classsendq | classusermode | priv | maxchans; classname: NAME '=' QSTRING ';' { MyFree(name); name = $3; }; maxchans: MAXCHANS '=' expr ';' { maxchans = $3; }; classpingfreq: PINGFREQ '=' timespec ';' { tping = $3; }; classconnfreq: CONNECTFREQ '=' timespec ';' { tconn = $3; }; classmaxlinks: MAXLINKS '=' expr ';' { maxlinks = $3; }; classsendq: SENDQ '=' sizespec ';' { sendq = $3; }; classusermode: USERMODE '=' QSTRING ';' { MyFree(pass); pass = $3; }; connectblock: CONNECT { flags = CONF_AUTOCONNECT; } '{' connectitems '}' ';' { struct ConfItem *aconf = NULL; if (name == NULL) parse_error("Missing name in connect block"); else if (pass == NULL) parse_error("Missing password in connect block"); else if (strlen(pass) > PASSWDLEN) parse_error("Password too long in connect block"); else if (host == NULL) parse_error("Missing host in connect block"); else if (strchr(host, '*') || strchr(host, '?')) parse_error("Invalid host '%s' in connect block", host); else if (c_class == NULL) parse_error("Missing or non-existent class in connect block"); else { aconf = make_conf(CONF_SERVER); aconf->name = name; aconf->origin_name = origin; aconf->passwd = pass; aconf->conn_class = c_class; aconf->address.port = port; aconf->host = host; /* If the user specified a hub allowance, but not maximum links, * allow an effectively unlimited number of hops. */ aconf->maximum = (hub_limit != NULL && maxlinks == 0) ? 65535 : maxlinks; aconf->hub_limit = hub_limit; aconf->flags = flags; lookup_confhost(aconf); } if (!aconf) { MyFree(name); MyFree(pass); MyFree(host); MyFree(origin); MyFree(hub_limit); } name = pass = host = origin = hub_limit = NULL; c_class = NULL; port = flags = maxlinks = 0; }; connectitems: connectitem connectitems | connectitem; connectitem: connectname | connectpass | connectclass | connecthost | connectport | connectvhost | connectleaf | connecthub | connecthublimit | connectmaxhops | connectauto | connectsecure; connectname: NAME '=' QSTRING ';' { MyFree(name); name = $3; }; connectpass: PASS '=' QSTRING ';' { MyFree(pass); pass = $3; }; connectclass: CLASS '=' QSTRING ';' { c_class = find_class($3); if (!c_class) parse_error("No such connection class '%s' for Connect block", $3); MyFree($3); }; connecthost: HOST '=' QSTRING ';' { MyFree(host); host = $3; }; connectport: PORT '=' NUMBER ';' { port = $3; }; connectvhost: VHOST '=' QSTRING ';' { MyFree(origin); origin = $3; }; connectleaf: LEAF ';' { maxlinks = 0; }; connecthub: HUB ';' { MyFree(hub_limit); DupString(hub_limit, "*"); }; connecthublimit: HUB '=' QSTRING ';' { MyFree(hub_limit); hub_limit = $3; }; connectmaxhops: MAXHOPS '=' expr ';' { maxlinks = $3; }; connectauto: AUTOCONNECT '=' YES ';' { flags |= CONF_AUTOCONNECT; } | AUTOCONNECT '=' NO ';' { flags &= ~CONF_AUTOCONNECT; }; connectsecure: SECURE '=' YES ';' { flags |= CONF_SECURE; } | SECURE '=' NO ';' { flags &= ~CONF_SECURE; }; uworldblock: UWORLD '{' uworlditems '}' ';'; uworlditems: uworlditem uworlditems | uworlditem; uworlditem: uworldname; uworldname: NAME '=' QSTRING ';' { make_conf(CONF_UWORLD)->host = $3; }; operblock: OPER '{' operitems '}' ';' { struct ConfItem *aconf = NULL; struct SLink *link; if (name == NULL) parse_error("Missing name in operator block"); else if (pass == NULL) parse_error("Missing password in operator block"); /* Do not check password length because it may be crypted. */ else if (hosts == NULL) parse_error("Missing host(s) in operator block"); else if (c_class == NULL) parse_error("Invalid or missing class in operator block"); else if (!FlagHas(&privs_dirty, PRIV_PROPAGATE) && !FlagHas(&c_class->privs_dirty, PRIV_PROPAGATE)) parse_error("Operator block for %s and class %s have no LOCAL setting", name, c_class->cc_name); else for (link = hosts; link != NULL; link = link->next) { aconf = make_conf(CONF_OPERATOR); DupString(aconf->name, name); DupString(aconf->passwd, pass); conf_parse_userhost(aconf, link->value.cp); aconf->conn_class = c_class; memcpy(&aconf->privs, &privs, sizeof(aconf->privs)); memcpy(&aconf->privs_dirty, &privs_dirty, sizeof(aconf->privs_dirty)); } MyFree(name); MyFree(pass); free_slist(&hosts); name = pass = NULL; c_class = NULL; memset(&privs, 0, sizeof(privs)); memset(&privs_dirty, 0, sizeof(privs_dirty)); }; operitems: operitem | operitems operitem; operitem: opername | operpass | operhost | operclass | priv; opername: NAME '=' QSTRING ';' { MyFree(name); name = $3; }; operpass: PASS '=' QSTRING ';' { MyFree(pass); pass = $3; }; operhost: HOST '=' QSTRING ';' { struct SLink *link; link = make_link(); if (!strchr($3, '@')) { int uh_len; link->value.cp = (char*) MyMalloc((uh_len = strlen($3)+3)); ircd_snprintf(0, link->value.cp, uh_len, "*@%s", $3); } else DupString(link->value.cp, $3); MyFree($3); link->next = hosts; hosts = link; }; operclass: CLASS '=' QSTRING ';' { c_class = find_class($3); if (!c_class) parse_error("No such connection class '%s' for Operator block", $3); MyFree($3); }; priv: privtype '=' yesorno ';' { FlagSet(&privs_dirty, $1); if (($3 == 1) ^ invert) FlagSet(&privs, $1); else FlagClr(&privs, $1); invert = 0; }; privtype: TPRIV_CHAN_LIMIT { $$ = PRIV_CHAN_LIMIT; } | TPRIV_MODE_LCHAN { $$ = PRIV_MODE_LCHAN; } | TPRIV_DEOP_LCHAN { $$ = PRIV_DEOP_LCHAN; } | TPRIV_WALK_LCHAN { $$ = PRIV_WALK_LCHAN; } | TPRIV_SEE_IDLETIME { $$ = PRIV_SEE_IDLETIME; } | TPRIV_HIDE_IDLETIME { $$ = PRIV_HIDE_IDLETIME; } | TPRIV_UMODE_NOCHAN { $$ = PRIV_UMODE_NOCHAN; } | TPRIV_UMODE_NOIDLE { $$ = PRIV_UMODE_NOIDLE; } | TPRIV_UMODE_CHSERV { $$ = PRIV_UMODE_CHSERV; } | TPRIV_UMODE_XTRAOP { $$ = PRIV_UMODE_XTRAOP; } | TPRIV_UMODE_NETSERV { $$ = PRIV_UMODE_NETSERV; } | TPRIV_FLOOD { $$ = PRIV_FLOOD; } | TPRIV_HALFFLOOD { $$ = PRIV_HALFFLOOD; } | TPRIV_UNLIMITED_TARGET { $$ = PRIV_UNLIMITED_TARGET; } | TPRIV_UMODE_OVERRIDECC { $$ = PRIV_UMODE_OVERRIDECC; } | KILL { $$ = PRIV_KILL; } | TPRIV_LOCAL_KILL { $$ = PRIV_LOCAL_KILL; } | TPRIV_REHASH { $$ = PRIV_REHASH; } | TPRIV_RESTART { $$ = PRIV_RESTART; } | TPRIV_DIE { $$ = PRIV_DIE; } | TPRIV_GLINE { $$ = PRIV_GLINE; } | TPRIV_LOCAL_GLINE { $$ = PRIV_LOCAL_GLINE; } | JUPE { $$ = PRIV_JUPE; } | TPRIV_LOCAL_JUPE { $$ = PRIV_LOCAL_JUPE; } | TPRIV_LOCAL_OPMODE { $$ = PRIV_LOCAL_OPMODE; } | TPRIV_OPMODE { $$ = PRIV_OPMODE; }| TPRIV_SET { $$ = PRIV_SET; } | TPRIV_WHOX { $$ = PRIV_WHOX; } | TPRIV_BADCHAN { $$ = PRIV_BADCHAN; } | TPRIV_LOCAL_BADCHAN { $$ = PRIV_LOCAL_BADCHAN; } | TPRIV_SEE_CHAN { $$ = PRIV_SEE_CHAN; } | TPRIV_SHOW_INVIS { $$ = PRIV_SHOW_INVIS; } | TPRIV_SHOW_ALL_INVIS { $$ = PRIV_SHOW_ALL_INVIS; } | TPRIV_PROPAGATE { $$ = PRIV_PROPAGATE; } | TPRIV_UNLIMIT_QUERY { $$ = PRIV_UNLIMIT_QUERY; } | TPRIV_DISPLAY { $$ = PRIV_DISPLAY; } | TPRIV_SEE_OPERS { $$ = PRIV_SEE_OPERS; } | TPRIV_WIDE_GLINE { $$ = PRIV_WIDE_GLINE; } | TPRIV_LIST_CHAN { $$ = PRIV_LIST_CHAN; } | LOCAL { $$ = PRIV_PROPAGATE; invert = 1; } | TPRIV_FORCE_OPMODE { $$ = PRIV_FORCE_OPMODE; } | TPRIV_FORCE_LOCAL_OPMODE { $$ = PRIV_FORCE_LOCAL_OPMODE; } | TPRIV_NOAMSG_OVERRIDE { $$ = PRIV_NOAMSG_OVERRIDE; } | TPRIV_APASS_OPMODE { $$ = PRIV_APASS_OPMODE; } ; yesorno: YES { $$ = 1; } | NO { $$ = 0; }; /* not a recursive definition because some pedant will just come along * and whine that the parser accepts "ipv4 ipv4 ipv4 ipv4" */ address_family: { $$ = 0; } | TOK_IPV4 { $$ = USE_IPV4; } | TOK_IPV6 { $$ = USE_IPV6; } | TOK_IPV4 TOK_IPV6 { $$ = USE_IPV4 | USE_IPV6; } | TOK_IPV6 TOK_IPV4 { $$ = USE_IPV6 | USE_IPV4; } ; /* The port block... */ portblock: PORT '{' portitems '}' ';' { struct ListenerFlags flags_here; struct SLink *link; if (hosts == NULL) { struct SLink *link; link = make_link(); DupString(link->value.cp, "*"); link->flags = 0; link->next = hosts; hosts = link; } for (link = hosts; link != NULL; link = link->next) { memcpy(&flags_here, &listen_flags, sizeof(&flags_here)); switch (link->flags & (USE_IPV4 | USE_IPV6)) { case USE_IPV4: FlagSet(&flags_here, LISTEN_IPV4); break; case USE_IPV6: FlagSet(&flags_here, LISTEN_IPV6); break; default: /* 0 or USE_IPV4|USE_IPV6 */ FlagSet(&flags_here, LISTEN_IPV4); FlagSet(&flags_here, LISTEN_IPV6); break; } if (link->flags & 65535) port = link->flags & 65535; add_listener(port, link->value.cp, pass, &flags_here); } free_slist(&hosts); MyFree(pass); memset(&listen_flags, 0, sizeof(listen_flags)); pass = NULL; port = 0; }; portitems: portitem portitems | portitem; portitem: portnumber | portvhost | portvhostnumber | portmask | portserver | porthidden | portsecure; portnumber: PORT '=' address_family NUMBER ';' { if ($4 < 1 || $4 > 65535) { parse_error("Port %d is out of range", port); } else { port = $3 | $4; if (hosts && (0 == (hosts->flags & 65535))) hosts->flags = (hosts->flags & ~65535) | port; } }; portvhost: VHOST '=' address_family QSTRING ';' { struct SLink *link; link = make_link(); link->value.cp = $4; link->flags = $3 | port; link->next = hosts; hosts = link; }; portvhostnumber: VHOST '=' address_family QSTRING NUMBER ';' { if ($5 < 1 || $5 > 65535) { parse_error("Port %d is out of range", port); } else { struct SLink *link; link = make_link(); link->value.cp = $4; link->flags = $3 | $5; link->next = hosts; hosts = link; } }; portmask: MASK '=' QSTRING ';' { MyFree(pass); pass = $3; }; portserver: SERVER '=' YES ';' { FlagSet(&listen_flags, LISTEN_SERVER); } | SERVER '=' NO ';' { FlagClr(&listen_flags, LISTEN_SERVER); }; porthidden: HIDDEN '=' YES ';' { FlagSet(&listen_flags, LISTEN_HIDDEN); } | HIDDEN '=' NO ';' { FlagClr(&listen_flags, LISTEN_HIDDEN); }; portsecure: SECURE '=' YES ';' { FlagSet(&listen_flags, LISTEN_SSL); } | SECURE '=' NO ';' { FlagClr(&listen_flags, LISTEN_SSL); }; clientblock: CLIENT { maxlinks = 65535; port = 0; } '{' clientitems '}' ';' { struct ConfItem *aconf = 0; struct irc_in_addr addr; unsigned char addrbits = 0; if (!c_class) parse_error("Invalid or missing class in Client block"); else if (pass && strlen(pass) > PASSWDLEN) parse_error("Password too long in connect block"); else if (ip && !ipmask_parse(ip, &addr, &addrbits)) parse_error("Invalid IP address %s in Client block", ip); else { aconf = make_conf(CONF_CLIENT); aconf->username = username; aconf->host = host; if (ip) memcpy(&aconf->address.addr, &addr, sizeof(aconf->address.addr)); else memset(&aconf->address.addr, 0, sizeof(aconf->address.addr)); aconf->address.port = port; aconf->addrbits = addrbits; aconf->name = ip; aconf->conn_class = c_class; aconf->maximum = maxlinks; aconf->passwd = pass; } if (!aconf) { MyFree(username); MyFree(host); MyFree(ip); MyFree(pass); } host = NULL; username = NULL; c_class = NULL; maxlinks = 0; ip = NULL; pass = NULL; port = 0; }; clientitems: clientitem clientitems | clientitem; clientitem: clienthost | clientip | clientusername | clientclass | clientpass | clientmaxlinks | clientport; clienthost: HOST '=' QSTRING ';' { char *sep = strchr($3, '@'); MyFree(host); if (sep) { *sep++ = '\0'; MyFree(username); DupString(host, sep); username = $3; } else { host = $3; } }; clientip: IP '=' QSTRING ';' { char *sep; sep = strchr($3, '@'); MyFree(ip); if (sep) { *sep++ = '\0'; MyFree(username); DupString(ip, sep); username = $3; } else { ip = $3; } }; clientusername: USERNAME '=' QSTRING ';' { MyFree(username); username = $3; }; clientclass: CLASS '=' QSTRING ';' { c_class = find_class($3); if (!c_class) parse_error("No such connection class '%s' for Client block", $3); MyFree($3); }; clientpass: PASS '=' QSTRING ';' { MyFree(pass); pass = $3; }; clientmaxlinks: MAXLINKS '=' expr ';' { maxlinks = $3; }; clientport: PORT '=' expr ';' { port = $3; }; killblock: KILL { dconf = (struct DenyConf*) MyCalloc(1, sizeof(*dconf)); } '{' killitems '}' ';' { if (dconf->usermask || dconf->hostmask ||dconf->realmask) { dconf->next = denyConfList; denyConfList = dconf; } else { MyFree(dconf->usermask); MyFree(dconf->hostmask); MyFree(dconf->realmask); MyFree(dconf->message); MyFree(dconf); parse_error("Kill block must match on at least one of username, host or realname"); } dconf = NULL; }; killitems: killitem killitems | killitem; killitem: killuhost | killreal | killusername | killreasonfile | killreason; killuhost: HOST '=' QSTRING ';' { char *h; MyFree(dconf->hostmask); MyFree(dconf->usermask); if ((h = strchr($3, '@')) == NULL) { DupString(dconf->usermask, "*"); dconf->hostmask = $3; } else { *h++ = '\0'; DupString(dconf->hostmask, h); dconf->usermask = $3; } ipmask_parse(dconf->hostmask, &dconf->address, &dconf->bits); }; killusername: USERNAME '=' QSTRING ';' { MyFree(dconf->usermask); dconf->usermask = $3; }; killreal: REAL '=' QSTRING ';' { MyFree(dconf->realmask); dconf->realmask = $3; }; killreason: REASON '=' QSTRING ';' { dconf->flags &= ~DENY_FLAGS_FILE; MyFree(dconf->message); dconf->message = $3; }; killreasonfile: TFILE '=' QSTRING ';' { dconf->flags |= DENY_FLAGS_FILE; MyFree(dconf->message); dconf->message = $3; }; cruleblock: CRULE { tconn = CRULE_AUTO; } '{' cruleitems '}' ';' { struct CRuleNode *node = NULL; struct SLink *link; if (hosts == NULL) parse_error("Missing server(s) in crule block"); else if (pass == NULL) parse_error("Missing rule in crule block"); else if ((node = crule_parse(pass)) == NULL) parse_error("Invalid rule '%s' in crule block", pass); else for (link = hosts; link != NULL; link = link->next) { struct CRuleConf *p = (struct CRuleConf*) MyMalloc(sizeof(*p)); if (node == NULL) node = crule_parse(pass); DupString(p->hostmask, link->value.cp); DupString(p->rule, pass); p->type = tconn; p->node = node; node = NULL; p->next = cruleConfList; cruleConfList = p; } free_slist(&hosts); MyFree(pass); pass = NULL; tconn = 0; }; cruleitems: cruleitem cruleitems | cruleitem; cruleitem: cruleserver | crulerule | cruleall; cruleserver: SERVER '=' QSTRING ';' { struct SLink *link; link = make_link(); link->value.cp = $3; link->next = hosts; hosts = link; }; crulerule: RULE '=' QSTRING ';' { MyFree(pass); pass = $3; }; cruleall: ALL '=' YES ';' { tconn = CRULE_ALL; } | ALL '=' NO ';' { tconn = CRULE_AUTO; }; motdblock: MOTD '{' motditems '}' ';' { struct SLink *link; if (pass != NULL) for (link = hosts; link != NULL; link = link->next) motd_add(link->value.cp, pass); free_slist(&hosts); MyFree(pass); pass = NULL; }; motditems: motditem motditems | motditem; motditem: motdhost | motdfile; motdhost: HOST '=' QSTRING ';' { struct SLink *link; link = make_link(); link->value.cp = $3; link->next = hosts; hosts = link; }; motdfile: TFILE '=' QSTRING ';' { MyFree(pass); pass = $3; }; featuresblock: FEATURES '{' featureitems '}' ';'; featureitems: featureitems featureitem | featureitem; featureitem: QSTRING { stringlist[0] = $1; stringno = 1; } '=' stringlist ';' { unsigned int ii; feature_set(NULL, (const char * const *)stringlist, stringno); for (ii = 0; ii < stringno; ++ii) MyFree(stringlist[ii]); }; stringlist: stringlist extrastring | extrastring; extrastring: QSTRING { if (stringno < MAX_STRINGS) stringlist[stringno++] = $1; else MyFree($1); }; quarantineblock: QUARANTINE '{' quarantineitems '}' ';'; quarantineitems: quarantineitems quarantineitem | quarantineitem; quarantineitem: QSTRING '=' QSTRING ';' { struct qline *qconf = MyCalloc(1, sizeof(*qconf)); qconf->chname = $1; qconf->reason = $3; qconf->next = GlobalQuarantineList; GlobalQuarantineList = qconf; }; pseudoblock: PSEUDO QSTRING '{' { smap = MyCalloc(1, sizeof(struct s_map)); smap->command = $2; } pseudoitems '}' ';' { int valid = 0; if (!smap->name) parse_error("Missing name in pseudo %s block", smap->command); else if (!smap->services) parse_error("Missing nick in pseudo %s block", smap->command); else if (!strIsAlpha(smap->command)) parse_error("Pseudo command %s invalid: must all be letters", smap->command); else valid = 1; if (valid && register_mapping(smap)) { smap->next = GlobalServiceMapList; GlobalServiceMapList = smap; } else { free_mapping(smap); } smap = NULL; }; pseudoitems: pseudoitem pseudoitems | pseudoitem; pseudoitem: pseudoname | pseudoprepend | pseudonick | pseudoflags; pseudoname: NAME '=' QSTRING ';' { MyFree(smap->name); smap->name = $3; }; pseudoprepend: PREPEND '=' QSTRING ';' { MyFree(smap->prepend); smap->prepend = $3; }; pseudonick: NICK '=' QSTRING ';' { char *sep = strchr($3, '@'); if (sep != NULL) { size_t slen = strlen($3); struct nick_host *nh = MyMalloc(sizeof(*nh) + slen); memcpy(nh->nick, $3, slen + 1); nh->nicklen = sep - $3; nh->next = smap->services; smap->services = nh; } MyFree($3); }; pseudoflags: FAST ';' { smap->flags |= SMAP_FAST; }; iauthblock: IAUTH '{' iauthitems '}' ';' { auth_spawn(stringno, stringlist, iauth_required); while (stringno > 0) { --stringno; MyFree(stringlist[stringno]); } iauth_required = 0; }; iauthitems: iauthitem iauthitems | iauthitem; iauthitem: iauthprogram | iauthrequired; iauthprogram: PROGRAM '=' { while (stringno > 0) { --stringno; MyFree(stringlist[stringno]); } } stringlist ';'; iauthrequired: REQUIRED '=' yesorno ';' { iauth_required = $3; } forwardsblock: FORWARDS { unsigned int ii; for(ii = 0; ii < 256; ++ii) { MyFree(GlobalForwards[ii]); } } '{' forwarditems '}' ';'; forwarditems: forwarditems forwarditem | forwarditem; forwarditem: QSTRING '=' QSTRING ';' { unsigned char ch = $1[0]; MyFree(GlobalForwards[ch]); GlobalForwards[ch] = $3; MyFree($1); }; webircblock: WEBIRC { /* If we read a new webirc block, we create a new block. */ webirc = webirc_block(); } '{' webircitems '}' ';' { /* check for integrity */ if(!webirc->name[0]) { parse_error("Every WebIRC block needs at least a name entry."); webirc_list_clear(webirc); MyFree(webirc); webirc = NULL; } else { webirc_establish(webirc); webirc = NULL; } }; webircitems: webircitems webircitem | webircitem; webircitem: webircpass | webirchost | webircnhost | webircspoof | webircnspoof | webircname; webircpass: PASS '=' QSTRING ';' { unsigned int len; if((len = strlen($3)) > 0) webirc_set(webirc, WEBIRC_PASS, $3, len, 0); MyFree($3); }; webirchost: HOST '=' QSTRING ';' { unsigned int len; if((len = strlen($3)) > 0) webirc_set(webirc, WEBIRC_HOST, $3, len, 0); MyFree($3); }; webircnhost: HOST '!' '=' QSTRING ';' { unsigned int len; if((len = strlen($4)) > 0) webirc_set(webirc, WEBIRC_HOST, $4, len, 1); MyFree($4); }; webircspoof: SPOOF '=' QSTRING ';' { unsigned int len; if((len = strlen($3)) > 0) webirc_set(webirc, WEBIRC_SPOOF, $3, len, 0); MyFree($3); }; webircnspoof: SPOOF '!' '=' QSTRING ';' { unsigned int len; if((len = strlen($4)) > 0) webirc_set(webirc, WEBIRC_SPOOF, $4, len, 1); MyFree($4); }; webircname: NAME '=' QSTRING ';' { unsigned int len; if(webirc->name[0]) { MyFree($3); parse_error("Only one name entry per WebIRC is allowed."); } else if((len = strlen($3)) > NICKLEN) { MyFree($3); parse_error("WebIRC block name length is limited to NICKLEN."); } else { if((len = strlen($3)) > 0) { strcpy(webirc->name, $3); webirc->name[len] = '\0'; } MyFree($3); } }; sslblock: SSL '{' sslitems '}' ';' ; sslitems: sslitems sslitem | sslitem; sslitem: sslcert | sslcacert; sslcert: CERT '=' QSTRING ';' { ssl_setcert($3); MyFree($3); }; sslcacert: CACERT '=' QSTRING ';' { ssl_addtrust($3); MyFree($3); };