1 |
/* |
2 |
* ircd-hybrid: an advanced Internet Relay Chat Daemon(ircd). |
3 |
* m_stats.c: Sends the user statistics or config information. |
4 |
* |
5 |
* Copyright (C) 2002 by the past and present ircd coders, and others. |
6 |
* |
7 |
* This program is free software; you can redistribute it and/or modify |
8 |
* it under the terms of the GNU General Public License as published by |
9 |
* the Free Software Foundation; either version 2 of the License, or |
10 |
* (at your option) any later version. |
11 |
* |
12 |
* This program is distributed in the hope that it will be useful, |
13 |
* but WITHOUT ANY WARRANTY; without even the implied warranty of |
14 |
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
15 |
* GNU General Public License for more details. |
16 |
* |
17 |
* You should have received a copy of the GNU General Public License |
18 |
* along with this program; if not, write to the Free Software |
19 |
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 |
20 |
* USA |
21 |
* |
22 |
* $Id$ |
23 |
*/ |
24 |
|
25 |
#include "stdinc.h" |
26 |
#include "list.h" /* dlink_node/dlink_list */ |
27 |
#include "client.h" /* Client */ |
28 |
#include "irc_string.h" |
29 |
#include "ircd.h" /* me */ |
30 |
#include "listener.h" /* show_ports */ |
31 |
#include "s_gline.h" |
32 |
#include "conf.h" |
33 |
#include "conf_class.h" |
34 |
#include "hostmask.h" |
35 |
#include "numeric.h" /* ERR_xxx */ |
36 |
#include "send.h" /* sendto_one */ |
37 |
#include "fdlist.h" /* PF and friends */ |
38 |
#include "s_bsd.h" /* highest_fd */ |
39 |
#include "s_misc.h" /* serv_info */ |
40 |
#include "s_serv.h" /* hunt_server */ |
41 |
#include "s_user.h" /* show_opers */ |
42 |
#include "event.h" /* events */ |
43 |
#include "dbuf.h" |
44 |
#include "hook.h" |
45 |
#include "parse.h" |
46 |
#include "modules.h" |
47 |
#include "resv.h" /* report_resv */ |
48 |
#include "whowas.h" |
49 |
#include "watch.h" |
50 |
#include "irc_res.h" |
51 |
|
52 |
|
53 |
const char *from, *to; |
54 |
|
55 |
/* |
56 |
* This is part of the STATS replies. There is no offical numeric for this |
57 |
* since this isnt an official command, in much the same way as HASH isnt. |
58 |
* It is also possible that some systems wont support this call or have |
59 |
* different field names for "struct rusage". |
60 |
* -avalon |
61 |
*/ |
62 |
static void |
63 |
stats_usage(struct Client *source_p, int parc, char *parv[]) |
64 |
{ |
65 |
struct rusage rus; |
66 |
time_t secs; |
67 |
time_t rup; |
68 |
#ifdef hz |
69 |
# define hzz hz |
70 |
#else |
71 |
# ifdef HZ |
72 |
# define hzz HZ |
73 |
# else |
74 |
int hzz = 1; |
75 |
# endif |
76 |
#endif |
77 |
|
78 |
if (getrusage(RUSAGE_SELF, &rus) == -1) |
79 |
{ |
80 |
sendto_one(source_p, ":%s NOTICE %s :Getruseage error: %s", |
81 |
me.name, source_p->name, strerror(errno)); |
82 |
return; |
83 |
} |
84 |
|
85 |
secs = rus.ru_utime.tv_sec + rus.ru_stime.tv_sec; |
86 |
|
87 |
if (secs == 0) |
88 |
secs = 1; |
89 |
|
90 |
rup = (CurrentTime - me.localClient->since) * hzz; |
91 |
|
92 |
if (rup == 0) |
93 |
rup = 1; |
94 |
|
95 |
sendto_one(source_p, |
96 |
":%s %d %s R :CPU Secs %d:%d User %d:%d System %d:%d", |
97 |
me.name, RPL_STATSDEBUG, source_p->name, (int)(secs/60), (int)(secs%60), |
98 |
(int)(rus.ru_utime.tv_sec/60), (int)(rus.ru_utime.tv_sec%60), |
99 |
(int)(rus.ru_stime.tv_sec/60), (int)(rus.ru_stime.tv_sec%60)); |
100 |
sendto_one(source_p, ":%s %d %s R :RSS %ld ShMem %ld Data %ld Stack %ld", |
101 |
me.name, RPL_STATSDEBUG, source_p->name, rus.ru_maxrss, |
102 |
(rus.ru_ixrss / rup), (rus.ru_idrss / rup), |
103 |
(rus.ru_isrss / rup)); |
104 |
sendto_one(source_p, ":%s %d %s R :Swaps %d Reclaims %d Faults %d", |
105 |
me.name, RPL_STATSDEBUG, source_p->name, (int)rus.ru_nswap, |
106 |
(int)rus.ru_minflt, (int)rus.ru_majflt); |
107 |
sendto_one(source_p, ":%s %d %s R :Block in %d out %d", |
108 |
me.name, RPL_STATSDEBUG, source_p->name, (int)rus.ru_inblock, |
109 |
(int)rus.ru_oublock); |
110 |
sendto_one(source_p, ":%s %d %s R :Msg Rcv %d Send %d", |
111 |
me.name, RPL_STATSDEBUG, source_p->name, (int)rus.ru_msgrcv, |
112 |
(int)rus.ru_msgsnd); |
113 |
sendto_one(source_p, ":%s %d %s R :Signals %d Context Vol. %d Invol %d", |
114 |
me.name, RPL_STATSDEBUG, source_p->name, (int)rus.ru_nsignals, |
115 |
(int)rus.ru_nvcsw, (int)rus.ru_nivcsw); |
116 |
} |
117 |
|
118 |
static void |
119 |
stats_memory(struct Client *source_p, int parc, char *parv[]) |
120 |
{ |
121 |
const dlink_node *gptr = NULL; |
122 |
const dlink_node *dlink = NULL; |
123 |
|
124 |
unsigned int local_client_conf_count = 0; /* local client conf links */ |
125 |
unsigned int users_counted = 0; /* user structs */ |
126 |
|
127 |
unsigned int channel_members = 0; |
128 |
unsigned int channel_invites = 0; |
129 |
unsigned int channel_bans = 0; |
130 |
unsigned int channel_except = 0; |
131 |
unsigned int channel_invex = 0; |
132 |
|
133 |
unsigned int wwu = 0; /* whowas users */ |
134 |
unsigned int class_count = 0; /* classes */ |
135 |
unsigned int aways_counted = 0; |
136 |
unsigned int number_ips_stored; /* number of ip addresses hashed */ |
137 |
|
138 |
uint64_t channel_memory = 0; |
139 |
uint64_t channel_ban_memory = 0; |
140 |
uint64_t channel_except_memory = 0; |
141 |
uint64_t channel_invex_memory = 0; |
142 |
|
143 |
unsigned int safelist_count = 0; |
144 |
uint64_t safelist_memory = 0; |
145 |
|
146 |
uint64_t wwm = 0; /* whowas array memory used */ |
147 |
uint64_t conf_memory = 0; /* memory used by conf lines */ |
148 |
uint64_t mem_ips_stored; /* memory used by ip address hash */ |
149 |
|
150 |
uint64_t total_channel_memory = 0; |
151 |
uint64_t totww = 0; |
152 |
|
153 |
unsigned int local_client_count = 0; |
154 |
unsigned int remote_client_count = 0; |
155 |
|
156 |
uint64_t local_client_memory_used = 0; |
157 |
uint64_t remote_client_memory_used = 0; |
158 |
|
159 |
uint64_t total_memory = 0; |
160 |
unsigned int topic_count = 0; |
161 |
|
162 |
unsigned int watch_list_headers = 0; /* watchlist headers */ |
163 |
unsigned int watch_list_entries = 0; /* watchlist entries */ |
164 |
uint64_t watch_list_memory = 0; /* watchlist memory used */ |
165 |
|
166 |
|
167 |
DLINK_FOREACH(gptr, global_client_list.head) |
168 |
{ |
169 |
struct Client *target_p = gptr->data; |
170 |
|
171 |
if (MyConnect(target_p)) |
172 |
{ |
173 |
++local_client_count; |
174 |
local_client_conf_count += dlink_list_length(&target_p->localClient->confs); |
175 |
watch_list_entries += dlink_list_length(&target_p->localClient->watches); |
176 |
} |
177 |
else |
178 |
++remote_client_count; |
179 |
|
180 |
if (IsClient(target_p)) |
181 |
{ |
182 |
++users_counted; |
183 |
|
184 |
if (target_p->away[0]) |
185 |
++aways_counted; |
186 |
} |
187 |
} |
188 |
|
189 |
/* Count up all channels, ban lists, except lists, Invex lists */ |
190 |
channel_memory = dlink_list_length(&global_channel_list) * |
191 |
sizeof(struct Channel); |
192 |
DLINK_FOREACH(gptr, global_channel_list.head) |
193 |
{ |
194 |
const struct Ban *actualBan; |
195 |
const struct Channel *chptr = gptr->data; |
196 |
|
197 |
channel_members += dlink_list_length(&chptr->members); |
198 |
channel_invites += dlink_list_length(&chptr->invites); |
199 |
|
200 |
if (chptr->topic[0]) |
201 |
++topic_count; |
202 |
|
203 |
channel_bans += dlink_list_length(&chptr->banlist); |
204 |
channel_ban_memory += dlink_list_length(&chptr->banlist) * sizeof(struct Ban); |
205 |
|
206 |
DLINK_FOREACH(dlink, chptr->banlist.head) |
207 |
{ |
208 |
actualBan = dlink->data; |
209 |
assert(actualBan->who); |
210 |
|
211 |
channel_ban_memory += actualBan->len + 1; |
212 |
channel_ban_memory += strlen(actualBan->who) + 1; |
213 |
} |
214 |
|
215 |
channel_except += dlink_list_length(&chptr->exceptlist); |
216 |
channel_except_memory += dlink_list_length(&chptr->exceptlist) * sizeof(struct Ban); |
217 |
|
218 |
DLINK_FOREACH(dlink, chptr->exceptlist.head) |
219 |
{ |
220 |
actualBan = dlink->data; |
221 |
assert(actualBan->who); |
222 |
|
223 |
channel_except_memory += actualBan->len + 1; |
224 |
channel_except_memory += strlen(actualBan->who) + 1; |
225 |
} |
226 |
|
227 |
channel_invex += dlink_list_length(&chptr->invexlist); |
228 |
channel_invex_memory += dlink_list_length(&chptr->invexlist) * sizeof(struct Ban); |
229 |
|
230 |
DLINK_FOREACH(dlink, chptr->invexlist.head) |
231 |
{ |
232 |
actualBan = dlink->data; |
233 |
assert(actualBan->who); |
234 |
|
235 |
channel_invex_memory += actualBan->len + 1; |
236 |
channel_invex_memory += strlen(actualBan->who) + 1; |
237 |
} |
238 |
} |
239 |
|
240 |
if ((safelist_count = dlink_list_length(&listing_client_list))) |
241 |
{ |
242 |
safelist_memory = safelist_count * sizeof(struct ListTask); |
243 |
DLINK_FOREACH(gptr, listing_client_list.head) |
244 |
{ |
245 |
const struct Client *acptr = gptr->data; |
246 |
|
247 |
DLINK_FOREACH(dlink, acptr->localClient->list_task->show_mask.head) |
248 |
safelist_memory += strlen(dlink->data); |
249 |
|
250 |
DLINK_FOREACH(dlink, acptr->localClient->list_task->hide_mask.head) |
251 |
safelist_memory += strlen(dlink->data); |
252 |
} |
253 |
} |
254 |
|
255 |
#if 0 |
256 |
/* XXX THIS has to be fixed !!!! -db */ |
257 |
/* count up all config items */ |
258 |
DLINK_FOREACH(dlink, ConfigItemList.head) |
259 |
{ |
260 |
aconf = dlink->data; |
261 |
conf_memory += aconf->host ? strlen(aconf->host)+1 : 0; |
262 |
conf_memory += aconf->passwd ? strlen(aconf->passwd)+1 : 0; |
263 |
conf_memory += aconf->name ? strlen(aconf->name)+1 : 0; |
264 |
conf_memory += sizeof(struct AccessItem); |
265 |
} |
266 |
#endif |
267 |
/* count up all classes */ |
268 |
class_count = dlink_list_length(class_get_list()); |
269 |
|
270 |
count_whowas_memory(&wwu, &wwm); |
271 |
watch_count_memory(&watch_list_headers, &watch_list_memory); |
272 |
|
273 |
sendto_one(source_p, ":%s %d %s z :WATCH headers %u(%llu) entries %d(%u)", |
274 |
me.name, RPL_STATSDEBUG, source_p->name, watch_list_headers, |
275 |
watch_list_memory, watch_list_entries, |
276 |
watch_list_entries * sizeof(dlink_node) * 2); |
277 |
|
278 |
sendto_one(source_p, ":%s %d %s z :Clients %u(%u)", |
279 |
me.name, RPL_STATSDEBUG, source_p->name, users_counted, |
280 |
(users_counted * sizeof(struct Client))); |
281 |
|
282 |
sendto_one(source_p, ":%s %d %s z :User aways %u", |
283 |
me.name, RPL_STATSDEBUG, source_p->name, |
284 |
aways_counted); |
285 |
|
286 |
sendto_one(source_p, ":%s %d %s z :Attached confs %u(%llu)", |
287 |
me.name, RPL_STATSDEBUG, source_p->name, |
288 |
local_client_conf_count, |
289 |
(unsigned long long)(local_client_conf_count * sizeof(dlink_node))); |
290 |
|
291 |
sendto_one(source_p, ":%s %d %s z :Resv channels %u(%lu) nicks %u(%lu)", |
292 |
me.name, RPL_STATSDEBUG, source_p->name, |
293 |
dlink_list_length(&resv_channel_list), |
294 |
dlink_list_length(&resv_channel_list) * sizeof(struct MaskItem), |
295 |
dlink_list_length(&nresv_items), |
296 |
dlink_list_length(&nresv_items) * sizeof(struct MaskItem)); |
297 |
|
298 |
sendto_one(source_p, ":%s %d %s z :Classes %u(%llu)", |
299 |
me.name, RPL_STATSDEBUG, source_p->name, |
300 |
class_count, (unsigned long long)(class_count * sizeof(struct ClassItem))); |
301 |
|
302 |
sendto_one(source_p, ":%s %d %s z :Channels %u(%llu) Topics %u(%u)", |
303 |
me.name, RPL_STATSDEBUG, source_p->name, |
304 |
dlink_list_length(&global_channel_list), |
305 |
channel_memory, topic_count, topic_count * |
306 |
(TOPICLEN + 1 + USERHOST_REPLYLEN)); |
307 |
|
308 |
sendto_one(source_p, ":%s %d %s z :Bans %u(%llu)", |
309 |
me.name, RPL_STATSDEBUG, source_p->name, |
310 |
channel_bans, channel_ban_memory); |
311 |
|
312 |
sendto_one(source_p, ":%s %d %s z :Exceptions %u(%llu)", |
313 |
me.name, RPL_STATSDEBUG, source_p->name, |
314 |
channel_except, channel_except_memory); |
315 |
|
316 |
sendto_one(source_p, ":%s %d %s z :Invex %u(%llu)", |
317 |
me.name, RPL_STATSDEBUG, source_p->name, |
318 |
channel_invex, channel_invex_memory); |
319 |
|
320 |
sendto_one(source_p, ":%s %d %s z :Channel members %u(%llu) invites %u(%llu)", |
321 |
me.name, RPL_STATSDEBUG, source_p->name, channel_members, |
322 |
(unsigned long long)(channel_members * sizeof(struct Membership)), |
323 |
channel_invites, (unsigned long long)channel_invites * |
324 |
sizeof(dlink_node) * 2); |
325 |
|
326 |
total_channel_memory = channel_memory + channel_ban_memory + |
327 |
channel_members * sizeof(struct Membership) + |
328 |
(channel_invites * sizeof(dlink_node)*2); |
329 |
|
330 |
sendto_one(source_p, ":%s %d %s z :Safelist %u(%llu)", |
331 |
me.name, RPL_STATSDEBUG, source_p->name, |
332 |
safelist_count, safelist_memory); |
333 |
|
334 |
sendto_one(source_p, ":%s %d %s z :Whowas users %u(%llu)", |
335 |
me.name, RPL_STATSDEBUG, source_p->name, |
336 |
wwu, (unsigned long long)(wwu * sizeof(struct Client))); |
337 |
|
338 |
sendto_one(source_p, ":%s %d %s z :Whowas array %u(%llu)", |
339 |
me.name, RPL_STATSDEBUG, source_p->name, |
340 |
NICKNAMEHISTORYLENGTH, wwm); |
341 |
|
342 |
totww = wwu * sizeof(struct Client) + wwm; |
343 |
|
344 |
count_ip_hash(&number_ips_stored,&mem_ips_stored); |
345 |
sendto_one(source_p, ":%s %d %s z :iphash %u(%llu)", |
346 |
me.name, RPL_STATSDEBUG, source_p->name, |
347 |
number_ips_stored, mem_ips_stored); |
348 |
|
349 |
total_memory = totww + total_channel_memory + conf_memory + class_count * |
350 |
sizeof(struct ClassItem); |
351 |
sendto_one(source_p, ":%s %d %s z :Total: whowas %llu channel %llu conf %llu", |
352 |
me.name, RPL_STATSDEBUG, source_p->name, totww, |
353 |
total_channel_memory, conf_memory); |
354 |
|
355 |
local_client_memory_used = local_client_count*(sizeof(struct Client) + sizeof(struct LocalUser)); |
356 |
total_memory += local_client_memory_used; |
357 |
sendto_one(source_p, ":%s %d %s z :Local client Memory in use: %u(%llu)", |
358 |
me.name, RPL_STATSDEBUG, source_p->name, local_client_count, |
359 |
local_client_memory_used); |
360 |
|
361 |
remote_client_memory_used = remote_client_count * sizeof(struct Client); |
362 |
total_memory += remote_client_memory_used; |
363 |
sendto_one(source_p, ":%s %d %s z :Remote client Memory in use: %u(%llu)", |
364 |
me.name, RPL_STATSDEBUG, source_p->name, remote_client_count, |
365 |
remote_client_memory_used); |
366 |
|
367 |
sendto_one(source_p, |
368 |
":%s %d %s z :TOTAL: %llu", |
369 |
me.name, RPL_STATSDEBUG, source_p->name, |
370 |
total_memory); |
371 |
} |
372 |
|
373 |
static void |
374 |
stats_dns_servers(struct Client *source_p) |
375 |
{ |
376 |
report_dns_servers(source_p); |
377 |
} |
378 |
|
379 |
static void |
380 |
stats_connect(struct Client *source_p, int parc, char *parv[]) |
381 |
{ |
382 |
report_confitem_types(source_p, CONF_SERVER); |
383 |
} |
384 |
|
385 |
/* stats_deny() |
386 |
* |
387 |
* input - client to report to |
388 |
* output - none |
389 |
* side effects - client is given dline list. |
390 |
*/ |
391 |
static void |
392 |
stats_deny(struct Client *source_p, int parc, char *parv[]) |
393 |
{ |
394 |
struct MaskItem *conf; |
395 |
dlink_node *ptr = NULL; |
396 |
unsigned int i = 0; |
397 |
|
398 |
|
399 |
for (i = 0; i < ATABLE_SIZE; ++i) |
400 |
{ |
401 |
DLINK_FOREACH(ptr, atable[i].head) |
402 |
{ |
403 |
struct AddressRec *arec = ptr->data; |
404 |
|
405 |
if (arec->type != CONF_DLINE) |
406 |
continue; |
407 |
|
408 |
conf = arec->conf; |
409 |
|
410 |
/* dont report a tdline as a dline */ |
411 |
if (conf->until) |
412 |
continue; |
413 |
|
414 |
sendto_one(source_p, form_str(RPL_STATSDLINE), |
415 |
from, to, 'D', conf->host, conf->reason); |
416 |
} |
417 |
} |
418 |
} |
419 |
|
420 |
/* stats_tdeny() |
421 |
* |
422 |
* input - client to report to |
423 |
* output - none |
424 |
* side effects - client is given dline list. |
425 |
*/ |
426 |
static void |
427 |
stats_tdeny(struct Client *source_p, int parc, char *parv[]) |
428 |
{ |
429 |
struct MaskItem *conf = NULL; |
430 |
dlink_node *ptr = NULL; |
431 |
unsigned int i = 0; |
432 |
|
433 |
|
434 |
for (i = 0; i < ATABLE_SIZE; ++i) |
435 |
{ |
436 |
DLINK_FOREACH(ptr, atable[i].head) |
437 |
{ |
438 |
struct AddressRec *arec = ptr->data; |
439 |
|
440 |
if (arec->type != CONF_DLINE) |
441 |
continue; |
442 |
|
443 |
conf = arec->conf; |
444 |
|
445 |
/* dont report a permanent dline as a tdline */ |
446 |
if (!conf->until) |
447 |
continue; |
448 |
|
449 |
sendto_one(source_p, form_str(RPL_STATSDLINE), |
450 |
from, to, 'd', conf->host, conf->reason); |
451 |
} |
452 |
} |
453 |
} |
454 |
|
455 |
/* stats_exempt() |
456 |
* |
457 |
* input - client to report to |
458 |
* output - none |
459 |
* side effects - client is given list of exempt blocks |
460 |
*/ |
461 |
static void |
462 |
stats_exempt(struct Client *source_p, int parc, char *parv[]) |
463 |
{ |
464 |
struct MaskItem *conf; |
465 |
dlink_node *ptr = NULL; |
466 |
unsigned int i = 0; |
467 |
|
468 |
if (ConfigFileEntry.stats_e_disabled) |
469 |
{ |
470 |
sendto_one(source_p, form_str(ERR_NOPRIVILEGES), |
471 |
from, to); |
472 |
return; |
473 |
} |
474 |
|
475 |
|
476 |
for (i = 0; i < ATABLE_SIZE; ++i) |
477 |
{ |
478 |
DLINK_FOREACH(ptr, atable[i].head) |
479 |
{ |
480 |
struct AddressRec *arec = ptr->data; |
481 |
|
482 |
if (arec->type != CONF_EXEMPT) |
483 |
continue; |
484 |
|
485 |
conf = arec->conf; |
486 |
|
487 |
sendto_one(source_p, form_str(RPL_STATSDLINE), from, to, 'e', |
488 |
conf->host, ""); |
489 |
} |
490 |
} |
491 |
} |
492 |
|
493 |
static void |
494 |
stats_events(struct Client *source_p, int parc, char *parv[]) |
495 |
{ |
496 |
show_events(source_p); |
497 |
} |
498 |
|
499 |
/* stats_pending_glines() |
500 |
* |
501 |
* input - client pointer |
502 |
* output - none |
503 |
* side effects - client is shown list of pending glines |
504 |
*/ |
505 |
static void |
506 |
stats_pending_glines(struct Client *source_p, int parc, char *parv[]) |
507 |
{ |
508 |
const dlink_node *dn_ptr = NULL; |
509 |
const struct gline_pending *glp_ptr = NULL; |
510 |
char timebuffer[MAX_DATE_STRING] = { '\0' }; |
511 |
struct tm *tmptr = NULL; |
512 |
|
513 |
if (!ConfigFileEntry.glines) |
514 |
{ |
515 |
sendto_one(source_p, ":%s NOTICE %s :This server does not support G-Lines", |
516 |
from, to); |
517 |
return; |
518 |
} |
519 |
|
520 |
if (dlink_list_length(&pending_glines[GLINE_PENDING_ADD_TYPE]) > 0) |
521 |
sendto_one(source_p, ":%s NOTICE %s :Pending G-lines", |
522 |
from, to); |
523 |
|
524 |
DLINK_FOREACH(dn_ptr, pending_glines[GLINE_PENDING_ADD_TYPE].head) |
525 |
{ |
526 |
glp_ptr = dn_ptr->data; |
527 |
tmptr = localtime(&glp_ptr->vote_1.time_request); |
528 |
strftime(timebuffer, MAX_DATE_STRING, "%Y/%m/%d %H:%M:%S", tmptr); |
529 |
|
530 |
sendto_one(source_p, |
531 |
":%s NOTICE %s :1) %s!%s@%s on %s requested gline at %s for %s@%s [%s]", |
532 |
from, to, glp_ptr->vote_1.oper_nick, |
533 |
glp_ptr->vote_1.oper_user, glp_ptr->vote_1.oper_host, |
534 |
glp_ptr->vote_1.oper_server, timebuffer, |
535 |
glp_ptr->user, glp_ptr->host, glp_ptr->vote_1.reason); |
536 |
|
537 |
if (glp_ptr->vote_2.oper_nick[0] != '\0') |
538 |
{ |
539 |
tmptr = localtime(&glp_ptr->vote_2.time_request); |
540 |
strftime(timebuffer, MAX_DATE_STRING, "%Y/%m/%d %H:%M:%S", tmptr); |
541 |
sendto_one(source_p, |
542 |
":%s NOTICE %s :2) %s!%s@%s on %s requested gline at %s for %s@%s [%s]", |
543 |
from, to, glp_ptr->vote_2.oper_nick, |
544 |
glp_ptr->vote_2.oper_user, glp_ptr->vote_2.oper_host, |
545 |
glp_ptr->vote_2.oper_server, timebuffer, |
546 |
glp_ptr->user, glp_ptr->host, glp_ptr->vote_2.reason); |
547 |
} |
548 |
} |
549 |
|
550 |
sendto_one(source_p, ":%s NOTICE %s :End of Pending G-lines", |
551 |
from, to); |
552 |
|
553 |
if (dlink_list_length(&pending_glines[GLINE_PENDING_DEL_TYPE]) > 0) |
554 |
sendto_one(source_p, ":%s NOTICE %s :Pending UNG-lines", |
555 |
from, to); |
556 |
|
557 |
DLINK_FOREACH(dn_ptr, pending_glines[GLINE_PENDING_DEL_TYPE].head) |
558 |
{ |
559 |
glp_ptr = dn_ptr->data; |
560 |
tmptr = localtime(&glp_ptr->vote_1.time_request); |
561 |
strftime(timebuffer, MAX_DATE_STRING, "%Y/%m/%d %H:%M:%S", tmptr); |
562 |
|
563 |
sendto_one(source_p, |
564 |
":%s NOTICE %s :1) %s!%s@%s on %s requested ungline at %s for %s@%s [%s]", |
565 |
from, to, glp_ptr->vote_1.oper_nick, |
566 |
glp_ptr->vote_1.oper_user, glp_ptr->vote_1.oper_host, |
567 |
glp_ptr->vote_1.oper_server, timebuffer, |
568 |
glp_ptr->user, glp_ptr->host, glp_ptr->vote_1.reason); |
569 |
|
570 |
if (glp_ptr->vote_2.oper_nick[0] != '\0') |
571 |
{ |
572 |
tmptr = localtime(&glp_ptr->vote_2.time_request); |
573 |
strftime(timebuffer, MAX_DATE_STRING, "%Y/%m/%d %H:%M:%S", tmptr); |
574 |
sendto_one(source_p, |
575 |
":%s NOTICE %s :2) %s!%s@%s on %s requested ungline at %s for %s@%s [%s]", |
576 |
from, to, glp_ptr->vote_2.oper_nick, |
577 |
glp_ptr->vote_2.oper_user, glp_ptr->vote_2.oper_host, |
578 |
glp_ptr->vote_2.oper_server, timebuffer, |
579 |
glp_ptr->user, glp_ptr->host, glp_ptr->vote_2.reason); |
580 |
|
581 |
} |
582 |
} |
583 |
|
584 |
sendto_one(source_p, ":%s NOTICE %s :End of Pending UNG-lines", |
585 |
from, to); |
586 |
} |
587 |
|
588 |
/* stats_glines() |
589 |
* |
590 |
* input - client pointer |
591 |
* output - none |
592 |
* side effects - client is shown list of glines |
593 |
*/ |
594 |
static void |
595 |
stats_glines(struct Client *source_p, int parc, char *parv[]) |
596 |
{ |
597 |
dlink_node *ptr = NULL; |
598 |
unsigned int i = 0; |
599 |
|
600 |
if (!ConfigFileEntry.glines) |
601 |
{ |
602 |
sendto_one(source_p, ":%s NOTICE %s :This server does not support G-Lines", |
603 |
from, to); |
604 |
return; |
605 |
} |
606 |
|
607 |
for (i = 0; i < ATABLE_SIZE; ++i) |
608 |
{ |
609 |
DLINK_FOREACH(ptr, atable[i].head) |
610 |
{ |
611 |
const struct AddressRec *arec = ptr->data; |
612 |
|
613 |
if (arec->type == CONF_GLINE) |
614 |
{ |
615 |
const struct MaskItem *conf = arec->conf; |
616 |
|
617 |
sendto_one(source_p, form_str(RPL_STATSKLINE), |
618 |
from, to, "G", |
619 |
conf->host ? conf->host : "*", |
620 |
conf->user ? conf->user : "*", |
621 |
conf->reason ? conf->reason : CONF_NOREASON); |
622 |
} |
623 |
} |
624 |
} |
625 |
} |
626 |
|
627 |
static void |
628 |
stats_hubleaf(struct Client *source_p, int parc, char *parv[]) |
629 |
{ |
630 |
report_confitem_types(source_p, CONF_HUB); |
631 |
} |
632 |
|
633 |
/* |
634 |
* show_iline_prefix() |
635 |
* |
636 |
* inputs - pointer to struct Client requesting output |
637 |
* - pointer to struct MaskItem |
638 |
* - name to which iline prefix will be prefixed to |
639 |
* output - pointer to static string with prefixes listed in ascii form |
640 |
* side effects - NONE |
641 |
*/ |
642 |
static const char * |
643 |
show_iline_prefix(const struct Client *sptr, const struct MaskItem *conf) |
644 |
{ |
645 |
static char prefix_of_host[USERLEN + 15]; |
646 |
char *prefix_ptr = prefix_of_host; |
647 |
|
648 |
if (IsConfWebIRC(conf)) |
649 |
*prefix_ptr++ = '<'; |
650 |
if (IsNoTilde(conf)) |
651 |
*prefix_ptr++ = '-'; |
652 |
if (IsLimitIp(conf)) |
653 |
*prefix_ptr++ = '!'; |
654 |
if (IsNeedIdentd(conf)) |
655 |
*prefix_ptr++ = '+'; |
656 |
if (!IsNeedPassword(conf)) |
657 |
*prefix_ptr++ = '&'; |
658 |
if (IsConfExemptResv(conf)) |
659 |
*prefix_ptr++ = '$'; |
660 |
if (IsNoMatchIp(conf)) |
661 |
*prefix_ptr++ = '%'; |
662 |
if (IsConfDoSpoofIp(conf)) |
663 |
*prefix_ptr++ = '='; |
664 |
if (MyOper(sptr) && IsConfExemptKline(conf)) |
665 |
*prefix_ptr++ = '^'; |
666 |
if (MyOper(sptr) && IsConfExemptGline(conf)) |
667 |
*prefix_ptr++ = '_'; |
668 |
if (MyOper(sptr) && IsConfExemptLimits(conf)) |
669 |
*prefix_ptr++ = '>'; |
670 |
if (IsConfCanFlood(conf)) |
671 |
*prefix_ptr++ = '|'; |
672 |
|
673 |
strlcpy(prefix_ptr, conf->user, USERLEN+1); |
674 |
|
675 |
return prefix_of_host; |
676 |
} |
677 |
|
678 |
static void |
679 |
report_auth(struct Client *client_p, int parc, char *parv[]) |
680 |
{ |
681 |
struct MaskItem *conf = NULL; |
682 |
dlink_node *ptr = NULL; |
683 |
unsigned int i; |
684 |
|
685 |
|
686 |
for (i = 0; i < ATABLE_SIZE; ++i) |
687 |
{ |
688 |
DLINK_FOREACH(ptr, atable[i].head) |
689 |
{ |
690 |
struct AddressRec *arec = ptr->data; |
691 |
|
692 |
if (arec->type != CONF_CLIENT) |
693 |
continue; |
694 |
|
695 |
conf = arec->conf; |
696 |
|
697 |
if (!MyOper(client_p) && IsConfDoSpoofIp(conf)) |
698 |
continue; |
699 |
|
700 |
/* We are doing a partial list, based on what matches the u@h of the |
701 |
* sender, so prepare the strings for comparing --fl_ |
702 |
*/ |
703 |
if (ConfigFileEntry.hide_spoof_ips) |
704 |
sendto_one(client_p, form_str(RPL_STATSILINE), me.name, |
705 |
client_p->name, 'I', |
706 |
conf->name == NULL ? "*" : conf->name, |
707 |
show_iline_prefix(client_p, conf), |
708 |
IsConfDoSpoofIp(conf) ? "255.255.255.255" : |
709 |
conf->host, conf->port, |
710 |
conf->class ? conf->class->name : "<default>"); |
711 |
|
712 |
else |
713 |
sendto_one(client_p, form_str(RPL_STATSILINE), me.name, |
714 |
client_p->name, 'I', |
715 |
conf->name == NULL ? "*" : conf->name, |
716 |
show_iline_prefix(client_p, conf), |
717 |
conf->host, conf->port, |
718 |
conf->class ? conf->class->name : "<default>"); |
719 |
} |
720 |
} |
721 |
} |
722 |
|
723 |
static void |
724 |
stats_auth(struct Client *source_p, int parc, char *parv[]) |
725 |
{ |
726 |
/* Oper only, if unopered, return ERR_NOPRIVILEGES */ |
727 |
if ((ConfigFileEntry.stats_i_oper_only == 2) && !HasUMode(source_p, UMODE_OPER)) |
728 |
sendto_one(source_p, form_str(ERR_NOPRIVILEGES), |
729 |
from, to); |
730 |
|
731 |
/* If unopered, Only return matching auth blocks */ |
732 |
else if ((ConfigFileEntry.stats_i_oper_only == 1) && !HasUMode(source_p, UMODE_OPER)) |
733 |
{ |
734 |
struct MaskItem *conf; |
735 |
|
736 |
if (MyConnect(source_p)) |
737 |
conf = find_conf_by_address(source_p->host, |
738 |
&source_p->localClient->ip, |
739 |
CONF_CLIENT, |
740 |
source_p->localClient->aftype, |
741 |
source_p->username, |
742 |
source_p->localClient->passwd, 1); |
743 |
else |
744 |
conf = find_conf_by_address(source_p->host, NULL, CONF_CLIENT, |
745 |
0, source_p->username, NULL, 1); |
746 |
|
747 |
if (conf == NULL) |
748 |
return; |
749 |
|
750 |
sendto_one(source_p, form_str(RPL_STATSILINE), from, |
751 |
to, 'I', |
752 |
"*", show_iline_prefix(source_p, conf), |
753 |
conf->host, conf->port, |
754 |
conf->class ? conf->class->name : "<default>"); |
755 |
} |
756 |
/* They are opered, or allowed to see all auth blocks */ |
757 |
else |
758 |
report_auth(source_p, 0, NULL); |
759 |
} |
760 |
|
761 |
/* report_Klines() |
762 |
* Inputs: Client to report to, |
763 |
* type(==0 for perm, !=0 for temporary) |
764 |
* mask |
765 |
* Output: None |
766 |
* Side effects: Reports configured K(or k)-lines to client_p. |
767 |
*/ |
768 |
static void |
769 |
report_Klines(struct Client *client_p, int tkline) |
770 |
{ |
771 |
struct MaskItem *conf = NULL; |
772 |
unsigned int i = 0; |
773 |
const char *p = NULL; |
774 |
dlink_node *ptr = NULL; |
775 |
|
776 |
if (tkline) |
777 |
p = "k"; |
778 |
else |
779 |
p = "K"; |
780 |
|
781 |
for (i = 0; i < ATABLE_SIZE; ++i) |
782 |
{ |
783 |
DLINK_FOREACH(ptr, atable[i].head) |
784 |
{ |
785 |
struct AddressRec *arec = ptr->data; |
786 |
|
787 |
if (arec->type != CONF_KLINE) |
788 |
continue; |
789 |
|
790 |
conf = arec->conf; |
791 |
|
792 |
if ((!tkline && conf->until) || |
793 |
(tkline && !conf->until)) |
794 |
continue; |
795 |
|
796 |
if (HasUMode(client_p, UMODE_OPER)) |
797 |
sendto_one(client_p, form_str(RPL_STATSKLINE), me.name, |
798 |
client_p->name, p, conf->host, conf->user, |
799 |
conf->reason); |
800 |
else |
801 |
sendto_one(client_p, form_str(RPL_STATSKLINE), me.name, |
802 |
client_p->name, p, conf->host, conf->user, |
803 |
conf->reason); |
804 |
} |
805 |
} |
806 |
} |
807 |
|
808 |
static void |
809 |
stats_tklines(struct Client *source_p, int parc, char *parv[]) |
810 |
{ |
811 |
/* Oper only, if unopered, return ERR_NOPRIVILEGES */ |
812 |
if ((ConfigFileEntry.stats_k_oper_only == 2) && !HasUMode(source_p, UMODE_OPER)) |
813 |
sendto_one(source_p, form_str(ERR_NOPRIVILEGES), |
814 |
from, to); |
815 |
|
816 |
/* If unopered, Only return matching klines */ |
817 |
else if ((ConfigFileEntry.stats_k_oper_only == 1) && !HasUMode(source_p, UMODE_OPER)) |
818 |
{ |
819 |
struct MaskItem *conf = NULL; |
820 |
|
821 |
if (MyConnect(source_p)) |
822 |
conf = find_conf_by_address(source_p->host, |
823 |
&source_p->localClient->ip, |
824 |
CONF_KLINE, |
825 |
source_p->localClient->aftype, |
826 |
source_p->username, NULL, 1); |
827 |
else |
828 |
conf = find_conf_by_address(source_p->host, NULL, CONF_KLINE, |
829 |
0, source_p->username, NULL, 1); |
830 |
|
831 |
if (!conf) |
832 |
return; |
833 |
|
834 |
/* dont report a permanent kline as a tkline */ |
835 |
if (!conf->until) |
836 |
return; |
837 |
|
838 |
sendto_one(source_p, form_str(RPL_STATSKLINE), from, |
839 |
to, "k", conf->host, conf->user, conf->reason); |
840 |
} |
841 |
/* Theyre opered, or allowed to see all klines */ |
842 |
else { |
843 |
report_Klines(source_p, 1); |
844 |
} |
845 |
} |
846 |
|
847 |
static void |
848 |
stats_klines(struct Client *source_p, int parc, char *parv[]) |
849 |
{ |
850 |
/* Oper only, if unopered, return ERR_NOPRIVILEGES */ |
851 |
if ((ConfigFileEntry.stats_k_oper_only == 2) && !HasUMode(source_p, UMODE_OPER)) |
852 |
sendto_one(source_p, form_str(ERR_NOPRIVILEGES), |
853 |
from, to); |
854 |
|
855 |
/* If unopered, Only return matching klines */ |
856 |
else if ((ConfigFileEntry.stats_k_oper_only == 1) && !HasUMode(source_p, UMODE_OPER)) |
857 |
{ |
858 |
struct MaskItem *conf = NULL; |
859 |
|
860 |
/* search for a kline */ |
861 |
if (MyConnect(source_p)) |
862 |
conf = find_conf_by_address(source_p->host, |
863 |
&source_p->localClient->ip, |
864 |
CONF_KLINE, |
865 |
source_p->localClient->aftype, |
866 |
source_p->username, NULL, 0); |
867 |
else |
868 |
conf = find_conf_by_address(source_p->host, NULL, CONF_KLINE, |
869 |
0, source_p->username, NULL, 0); |
870 |
|
871 |
if (!conf) |
872 |
return; |
873 |
|
874 |
/* dont report a tkline as a kline */ |
875 |
if (conf->until) |
876 |
return; |
877 |
|
878 |
sendto_one(source_p, form_str(RPL_STATSKLINE), from, |
879 |
to, "K", conf->host, conf->user, conf->reason); |
880 |
} |
881 |
/* Theyre opered, or allowed to see all klines */ |
882 |
else { |
883 |
report_Klines(source_p, 0); |
884 |
report_confitem_types(source_p, CONF_RKLINE); |
885 |
} |
886 |
} |
887 |
|
888 |
static void |
889 |
stats_messages(struct Client *source_p, int parc, char *parv[]) |
890 |
{ |
891 |
report_messages(source_p); |
892 |
} |
893 |
|
894 |
static void |
895 |
stats_oper(struct Client *source_p, int parc, char *parv[]) |
896 |
{ |
897 |
if (!HasUMode(source_p, UMODE_OPER) && ConfigFileEntry.stats_o_oper_only) |
898 |
sendto_one(source_p, form_str(ERR_NOPRIVILEGES), |
899 |
from, to); |
900 |
else |
901 |
report_confitem_types(source_p, CONF_OPER); |
902 |
} |
903 |
|
904 |
/* stats_operedup() |
905 |
* |
906 |
* input - client pointer |
907 |
* output - none |
908 |
* side effects - client is shown a list of active opers |
909 |
*/ |
910 |
static void |
911 |
stats_operedup(struct Client *source_p, int parc, char *parv[]) |
912 |
{ |
913 |
dlink_node *ptr; |
914 |
|
915 |
DLINK_FOREACH(ptr, oper_list.head) |
916 |
{ |
917 |
const struct Client *target_p = ptr->data; |
918 |
|
919 |
if (HasUMode(target_p, UMODE_HIDDEN) && !HasUMode(source_p, UMODE_OPER)) |
920 |
continue; |
921 |
|
922 |
if (MyClient(source_p) && HasUMode(source_p, UMODE_OPER)) |
923 |
sendto_one(source_p, ":%s %d %s p :[%c][%s] %s (%s@%s) Idle: %u", |
924 |
from, RPL_STATSDEBUG, to, |
925 |
HasUMode(target_p, UMODE_ADMIN) ? 'A' : 'O', |
926 |
oper_privs_as_string(target_p->localClient->operflags), |
927 |
target_p->name, target_p->username, target_p->host, |
928 |
idle_time_get(source_p, target_p)); |
929 |
else |
930 |
sendto_one(source_p, ":%s %d %s p :[%c] %s (%s@%s) Idle: %u", |
931 |
from, RPL_STATSDEBUG, to, |
932 |
HasUMode(target_p, UMODE_ADMIN) ? 'A' : 'O', |
933 |
target_p->name, target_p->username, target_p->host, |
934 |
idle_time_get(source_p, target_p)); |
935 |
} |
936 |
|
937 |
sendto_one(source_p, ":%s %d %s p :%u OPER(s)", |
938 |
from, RPL_STATSDEBUG, to, dlink_list_length(&oper_list)); |
939 |
} |
940 |
|
941 |
static void |
942 |
stats_ports(struct Client *source_p, int parc, char *parv[]) |
943 |
{ |
944 |
if (!HasUMode(source_p, UMODE_OPER) && ConfigFileEntry.stats_P_oper_only) |
945 |
sendto_one(source_p, form_str(ERR_NOPRIVILEGES), |
946 |
from, to); |
947 |
else |
948 |
show_ports(source_p); |
949 |
} |
950 |
|
951 |
static void |
952 |
stats_resv(struct Client *source_p, int parc, char *parv[]) |
953 |
{ |
954 |
report_resv(source_p); |
955 |
} |
956 |
|
957 |
static void |
958 |
stats_service(struct Client *source_p, int parc, char *parv[]) |
959 |
{ |
960 |
report_confitem_types(source_p, CONF_SERVICE); |
961 |
} |
962 |
|
963 |
static void |
964 |
stats_tstats(struct Client *source_p, int parc, char *parv[]) |
965 |
{ |
966 |
const struct Client *target_p = NULL; |
967 |
const dlink_node *ptr = NULL; |
968 |
struct ServerStatistics tmp; |
969 |
struct ServerStatistics *sp = &tmp; |
970 |
|
971 |
memcpy(sp, &ServerStats, sizeof(struct ServerStatistics)); |
972 |
|
973 |
/* |
974 |
* must use the += operator. is_sv is not the number of currently |
975 |
* active server connections. Note the incrementation in |
976 |
* s_bsd.c:close_connection. |
977 |
*/ |
978 |
sp->is_sv += dlink_list_length(&serv_list); |
979 |
|
980 |
DLINK_FOREACH(ptr, serv_list.head) |
981 |
{ |
982 |
target_p = ptr->data; |
983 |
|
984 |
sp->is_sbs += target_p->localClient->send.bytes; |
985 |
sp->is_sbr += target_p->localClient->recv.bytes; |
986 |
sp->is_sti += CurrentTime - target_p->localClient->firsttime; |
987 |
} |
988 |
|
989 |
sp->is_cl += dlink_list_length(&local_client_list); |
990 |
|
991 |
DLINK_FOREACH(ptr, local_client_list.head) |
992 |
{ |
993 |
target_p = ptr->data; |
994 |
|
995 |
sp->is_cbs += target_p->localClient->send.bytes; |
996 |
sp->is_cbr += target_p->localClient->recv.bytes; |
997 |
sp->is_cti += CurrentTime - target_p->localClient->firsttime; |
998 |
} |
999 |
|
1000 |
sp->is_ni += dlink_list_length(&unknown_list); |
1001 |
|
1002 |
sendto_one(source_p, ":%s %d %s T :accepts %u refused %u", |
1003 |
me.name, RPL_STATSDEBUG, source_p->name, sp->is_ac, sp->is_ref); |
1004 |
sendto_one(source_p, ":%s %d %s T :unknown commands %u prefixes %u", |
1005 |
me.name, RPL_STATSDEBUG, source_p->name, sp->is_unco, sp->is_unpf); |
1006 |
sendto_one(source_p, ":%s %d %s T :nick collisions %u unknown closes %u", |
1007 |
me.name, RPL_STATSDEBUG, source_p->name, sp->is_kill, sp->is_ni); |
1008 |
sendto_one(source_p, ":%s %d %s T :wrong direction %u empty %u", |
1009 |
me.name, RPL_STATSDEBUG, source_p->name, sp->is_wrdi, sp->is_empt); |
1010 |
sendto_one(source_p, ":%s %d %s T :numerics seen %u", |
1011 |
me.name, RPL_STATSDEBUG, source_p->name, sp->is_num); |
1012 |
sendto_one(source_p, ":%s %d %s T :auth successes %u fails %u", |
1013 |
me.name, RPL_STATSDEBUG, source_p->name, sp->is_asuc, sp->is_abad); |
1014 |
sendto_one(source_p, ":%s %d %s T :Client Server", |
1015 |
me.name, RPL_STATSDEBUG, source_p->name); |
1016 |
|
1017 |
sendto_one(source_p, ":%s %d %s T :connected %u %u", |
1018 |
me.name, RPL_STATSDEBUG, source_p->name, |
1019 |
(unsigned int)sp->is_cl, |
1020 |
(unsigned int)sp->is_sv); |
1021 |
sendto_one(source_p, ":%s %d %s T :bytes sent %llu %llu", |
1022 |
me.name, RPL_STATSDEBUG, source_p->name, |
1023 |
sp->is_cbs, sp->is_sbs); |
1024 |
sendto_one(source_p, ":%s %d %s T :bytes recv %llu %llu", |
1025 |
me.name, RPL_STATSDEBUG, source_p->name, |
1026 |
sp->is_cbr, sp->is_sbr); |
1027 |
sendto_one(source_p, ":%s %d %s T :time connected %u %u", |
1028 |
me.name, RPL_STATSDEBUG, source_p->name, |
1029 |
(unsigned int)sp->is_cti, |
1030 |
(unsigned int)sp->is_sti); |
1031 |
} |
1032 |
|
1033 |
static void |
1034 |
stats_uptime(struct Client *source_p, int parc, char *parv[]) |
1035 |
{ |
1036 |
time_t now = CurrentTime - me.localClient->since; |
1037 |
|
1038 |
sendto_one(source_p, form_str(RPL_STATSUPTIME), from, to, |
1039 |
now / 86400, (now / 3600) % 24, (now / 60) % 60, now % 60); |
1040 |
|
1041 |
if (!ConfigFileEntry.disable_remote || HasUMode(source_p, UMODE_OPER)) |
1042 |
sendto_one(source_p, form_str(RPL_STATSCONN), from, to, |
1043 |
Count.max_loc_con, Count.max_loc_cli, Count.totalrestartcount); |
1044 |
} |
1045 |
|
1046 |
static void |
1047 |
stats_shared(struct Client *source_p, int parc, char *parv[]) |
1048 |
{ |
1049 |
report_confitem_types(source_p, CONF_ULINE); |
1050 |
} |
1051 |
|
1052 |
/* stats_servers() |
1053 |
* |
1054 |
* input - client pointer |
1055 |
* output - none |
1056 |
* side effects - client is shown lists of who connected servers |
1057 |
*/ |
1058 |
static void |
1059 |
stats_servers(struct Client *source_p, int parc, char *parv[]) |
1060 |
{ |
1061 |
dlink_node *ptr = NULL; |
1062 |
|
1063 |
DLINK_FOREACH(ptr, serv_list.head) |
1064 |
{ |
1065 |
const struct Client *target_p = ptr->data; |
1066 |
|
1067 |
sendto_one(source_p, ":%s %d %s v :%s (%s!%s@%s) Idle: %d", |
1068 |
from, RPL_STATSDEBUG, to, target_p->name, |
1069 |
(target_p->serv->by[0] ? target_p->serv->by : "Remote."), |
1070 |
"*", "*", (int)(CurrentTime - target_p->localClient->lasttime)); |
1071 |
} |
1072 |
|
1073 |
sendto_one(source_p, ":%s %d %s v :%u Server(s)", |
1074 |
from, RPL_STATSDEBUG, to, dlink_list_length(&serv_list)); |
1075 |
} |
1076 |
|
1077 |
static void |
1078 |
stats_gecos(struct Client *source_p, int parc, char *parv[]) |
1079 |
{ |
1080 |
report_confitem_types(source_p, CONF_XLINE); |
1081 |
report_confitem_types(source_p, CONF_RXLINE); |
1082 |
} |
1083 |
|
1084 |
static void |
1085 |
stats_class(struct Client *source_p, int parc, char *parv[]) |
1086 |
{ |
1087 |
report_confitem_types(source_p, CONF_CLASS); |
1088 |
} |
1089 |
|
1090 |
static void |
1091 |
stats_servlinks(struct Client *source_p, int parc, char *parv[]) |
1092 |
{ |
1093 |
uint64_t sendB = 0, recvB = 0; |
1094 |
time_t uptime = 0; |
1095 |
dlink_node *ptr = NULL; |
1096 |
|
1097 |
if (ConfigServerHide.flatten_links && !HasUMode(source_p, UMODE_OPER)) |
1098 |
{ |
1099 |
sendto_one(source_p, form_str(ERR_NOPRIVILEGES), |
1100 |
from, to); |
1101 |
return; |
1102 |
} |
1103 |
|
1104 |
DLINK_FOREACH(ptr, serv_list.head) |
1105 |
{ |
1106 |
struct Client *target_p = ptr->data; |
1107 |
|
1108 |
if (HasFlag(target_p, FLAGS_SERVICE) && ConfigServerHide.hide_services) |
1109 |
if (!HasUMode(source_p, UMODE_OPER)) |
1110 |
continue; |
1111 |
|
1112 |
sendB += target_p->localClient->send.bytes; |
1113 |
recvB += target_p->localClient->recv.bytes; |
1114 |
|
1115 |
/* ":%s 211 %s %s %u %u %llu %u %llu :%u %u %s" */ |
1116 |
sendto_one(source_p, form_str(RPL_STATSLINKINFO), |
1117 |
from, to, |
1118 |
get_client_name(target_p, HasUMode(source_p, UMODE_ADMIN) ? SHOW_IP : MASK_IP), |
1119 |
dbuf_length(&target_p->localClient->buf_sendq), |
1120 |
target_p->localClient->send.messages, |
1121 |
target_p->localClient->send.bytes >> 10, |
1122 |
target_p->localClient->recv.messages, |
1123 |
target_p->localClient->recv.bytes >> 10, |
1124 |
(unsigned)(CurrentTime - target_p->localClient->firsttime), |
1125 |
(CurrentTime > target_p->localClient->since) ? (unsigned)(CurrentTime - target_p->localClient->since): 0, |
1126 |
HasUMode(source_p, UMODE_OPER) ? show_capabilities(target_p) : "TS"); |
1127 |
} |
1128 |
|
1129 |
sendB >>= 10; |
1130 |
recvB >>= 10; |
1131 |
|
1132 |
sendto_one(source_p, ":%s %d %s ? :%u total server(s)", |
1133 |
from, RPL_STATSDEBUG, to, dlink_list_length(&serv_list)); |
1134 |
sendto_one(source_p, ":%s %d %s ? :Sent total : %7.2f %s", |
1135 |
from, RPL_STATSDEBUG, to, |
1136 |
_GMKv(sendB), _GMKs(sendB)); |
1137 |
sendto_one(source_p, ":%s %d %s ? :Recv total : %7.2f %s", |
1138 |
from, RPL_STATSDEBUG, to, |
1139 |
_GMKv(recvB), _GMKs(recvB)); |
1140 |
|
1141 |
uptime = (CurrentTime - me.localClient->since); |
1142 |
|
1143 |
sendto_one(source_p, ":%s %d %s ? :Server send: %7.2f %s (%4.1f K/s)", |
1144 |
from, RPL_STATSDEBUG, to, |
1145 |
_GMKv((me.localClient->send.bytes>>10)), |
1146 |
_GMKs((me.localClient->send.bytes>>10)), |
1147 |
(float)((float)((me.localClient->send.bytes) >> 10) / |
1148 |
(float)uptime)); |
1149 |
sendto_one(source_p, ":%s %d %s ? :Server recv: %7.2f %s (%4.1f K/s)", |
1150 |
from, RPL_STATSDEBUG, to, |
1151 |
_GMKv((me.localClient->recv.bytes>>10)), |
1152 |
_GMKs((me.localClient->recv.bytes>>10)), |
1153 |
(float)((float)((me.localClient->recv.bytes) >> 10) / |
1154 |
(float)uptime)); |
1155 |
} |
1156 |
|
1157 |
/* parse_stats_args() |
1158 |
* |
1159 |
* inputs - arg count |
1160 |
* - args |
1161 |
* - doall flag |
1162 |
* - wild card or not |
1163 |
* output - pointer to name to use |
1164 |
* side effects - |
1165 |
* common parse routine for m_stats args |
1166 |
* |
1167 |
*/ |
1168 |
static char * |
1169 |
parse_stats_args(int parc, char *parv[], int *doall, int *wilds) |
1170 |
{ |
1171 |
char *name; |
1172 |
|
1173 |
if (parc > 2) |
1174 |
{ |
1175 |
name = parv[2]; |
1176 |
|
1177 |
if (!irccmp(name, from)) |
1178 |
*doall = 2; |
1179 |
else if (!match(name, from)) |
1180 |
*doall = 1; |
1181 |
|
1182 |
*wilds = has_wildcards(name); |
1183 |
|
1184 |
return name; |
1185 |
} |
1186 |
|
1187 |
return NULL; |
1188 |
} |
1189 |
|
1190 |
static void |
1191 |
stats_L_list(struct Client *source_p,char *name, int doall, int wilds, |
1192 |
dlink_list *list,char statchar) |
1193 |
{ |
1194 |
dlink_node *ptr; |
1195 |
struct Client *target_p; |
1196 |
|
1197 |
/* |
1198 |
* send info about connections which match, or all if the |
1199 |
* mask matches from. Only restrictions are on those who |
1200 |
* are invisible not being visible to 'foreigners' who use |
1201 |
* a wild card based search to list it. |
1202 |
*/ |
1203 |
DLINK_FOREACH(ptr, list->head) |
1204 |
{ |
1205 |
target_p = ptr->data; |
1206 |
|
1207 |
if (HasUMode(target_p, UMODE_INVISIBLE) && (doall || wilds) && |
1208 |
!(MyConnect(source_p) && HasUMode(source_p, UMODE_OPER)) && |
1209 |
!HasUMode(target_p, UMODE_OPER) && (target_p != source_p)) |
1210 |
continue; |
1211 |
if (!doall && wilds && match(name, target_p->name)) |
1212 |
continue; |
1213 |
if (!(doall || wilds) && irccmp(name, target_p->name)) |
1214 |
continue; |
1215 |
|
1216 |
/* This basically shows ips for our opers if its not a server/admin, or |
1217 |
* its one of our admins. */ |
1218 |
if(MyClient(source_p) && HasUMode(source_p, UMODE_OPER) && |
1219 |
(HasUMode(source_p, UMODE_ADMIN) || |
1220 |
(!IsServer(target_p) && !HasUMode(target_p, UMODE_ADMIN) && |
1221 |
!IsHandshake(target_p) && !IsConnecting(target_p)))) |
1222 |
{ |
1223 |
sendto_one(source_p, form_str(RPL_STATSLINKINFO), |
1224 |
from, to, |
1225 |
(IsUpper(statchar)) ? |
1226 |
get_client_name(target_p, SHOW_IP) : |
1227 |
get_client_name(target_p, HIDE_IP), |
1228 |
dbuf_length(&target_p->localClient->buf_sendq), |
1229 |
target_p->localClient->send.messages, |
1230 |
target_p->localClient->send.bytes>>10, |
1231 |
target_p->localClient->recv.messages, |
1232 |
target_p->localClient->recv.bytes>>10, |
1233 |
(unsigned)(CurrentTime - target_p->localClient->firsttime), |
1234 |
(CurrentTime > target_p->localClient->since) ? (unsigned)(CurrentTime - target_p->localClient->since):0, |
1235 |
IsServer(target_p) ? show_capabilities(target_p) : "-"); |
1236 |
} |
1237 |
else |
1238 |
{ |
1239 |
/* If its a hidden ip, an admin, or a server, mask the real IP */ |
1240 |
if(IsIPSpoof(target_p) || IsServer(target_p) || HasUMode(target_p, UMODE_ADMIN) |
1241 |
|| IsHandshake(target_p) || IsConnecting(target_p)) |
1242 |
sendto_one(source_p, form_str(RPL_STATSLINKINFO), |
1243 |
from, to, |
1244 |
get_client_name(target_p, MASK_IP), |
1245 |
dbuf_length(&target_p->localClient->buf_sendq), |
1246 |
target_p->localClient->send.messages, |
1247 |
target_p->localClient->send.bytes>>10, |
1248 |
target_p->localClient->recv.messages, |
1249 |
target_p->localClient->recv.bytes>>10, |
1250 |
(unsigned)(CurrentTime - target_p->localClient->firsttime), |
1251 |
(CurrentTime > target_p->localClient->since) ? (unsigned)(CurrentTime - target_p->localClient->since):0, |
1252 |
IsServer(target_p) ? show_capabilities(target_p) : "-"); |
1253 |
else /* show the real IP */ |
1254 |
sendto_one(source_p, form_str(RPL_STATSLINKINFO), |
1255 |
from, to, |
1256 |
(IsUpper(statchar)) ? |
1257 |
get_client_name(target_p, SHOW_IP) : |
1258 |
get_client_name(target_p, HIDE_IP), |
1259 |
dbuf_length(&target_p->localClient->buf_sendq), |
1260 |
target_p->localClient->send.messages, |
1261 |
target_p->localClient->send.bytes>>10, |
1262 |
target_p->localClient->recv.messages, |
1263 |
target_p->localClient->recv.bytes>>10, |
1264 |
(unsigned)(CurrentTime - target_p->localClient->firsttime), |
1265 |
(CurrentTime > target_p->localClient->since) ? (unsigned)(CurrentTime - target_p->localClient->since):0, |
1266 |
IsServer(target_p) ? show_capabilities(target_p) : "-"); |
1267 |
} |
1268 |
} |
1269 |
} |
1270 |
|
1271 |
/* |
1272 |
* stats_L |
1273 |
* |
1274 |
* inputs - pointer to client to report to |
1275 |
* - doall flag |
1276 |
* - wild card or not |
1277 |
* output - NONE |
1278 |
* side effects - |
1279 |
*/ |
1280 |
static void |
1281 |
stats_L(struct Client *source_p,char *name,int doall, |
1282 |
int wilds,char statchar) |
1283 |
{ |
1284 |
stats_L_list(source_p, name, doall, wilds, &unknown_list, statchar); |
1285 |
stats_L_list(source_p, name, doall, wilds, &local_client_list, statchar); |
1286 |
stats_L_list(source_p, name, doall, wilds, &serv_list, statchar); |
1287 |
} |
1288 |
|
1289 |
static void |
1290 |
stats_ltrace(struct Client *source_p, int parc, char *parv[]) |
1291 |
{ |
1292 |
int doall = 0; |
1293 |
int wilds = 0; |
1294 |
char *name = NULL; |
1295 |
char statchar; |
1296 |
|
1297 |
if ((name = parse_stats_args(parc, parv, &doall, &wilds)) != NULL) |
1298 |
{ |
1299 |
statchar = parv[1][0]; |
1300 |
|
1301 |
stats_L(source_p, name, doall, wilds, statchar); |
1302 |
} |
1303 |
else |
1304 |
sendto_one(source_p, form_str(ERR_NEEDMOREPARAMS), |
1305 |
from, to, "STATS"); |
1306 |
} |
1307 |
|
1308 |
static const struct StatsStruct |
1309 |
{ |
1310 |
const unsigned char letter; |
1311 |
void (*handler)(); |
1312 |
const unsigned int need_oper; |
1313 |
const unsigned int need_admin; |
1314 |
} stats_cmd_table[] = { |
1315 |
/* letter function need_oper need_admin */ |
1316 |
{ 'a', stats_dns_servers, 1, 1 }, |
1317 |
{ 'A', stats_dns_servers, 1, 1 }, |
1318 |
{ 'c', stats_connect, 1, 0 }, |
1319 |
{ 'C', stats_connect, 1, 0 }, |
1320 |
{ 'd', stats_tdeny, 1, 0 }, |
1321 |
{ 'D', stats_deny, 1, 0 }, |
1322 |
{ 'e', stats_exempt, 1, 0 }, |
1323 |
{ 'E', stats_events, 1, 1 }, |
1324 |
{ 'f', fd_dump, 1, 1 }, |
1325 |
{ 'F', fd_dump, 1, 1 }, |
1326 |
{ 'g', stats_pending_glines, 1, 0 }, |
1327 |
{ 'G', stats_glines, 1, 0 }, |
1328 |
{ 'h', stats_hooks, 1, 1 }, |
1329 |
{ 'H', stats_hubleaf, 1, 0 }, |
1330 |
{ 'i', stats_auth, 0, 0 }, |
1331 |
{ 'I', stats_auth, 0, 0 }, |
1332 |
{ 'k', stats_tklines, 0, 0 }, |
1333 |
{ 'K', stats_klines, 0, 0 }, |
1334 |
{ 'l', stats_ltrace, 1, 0 }, |
1335 |
{ 'L', stats_ltrace, 1, 0 }, |
1336 |
{ 'm', stats_messages, 0, 0 }, |
1337 |
{ 'M', stats_messages, 0, 0 }, |
1338 |
{ 'o', stats_oper, 0, 0 }, |
1339 |
{ 'O', stats_oper, 0, 0 }, |
1340 |
{ 'p', stats_operedup, 0, 0 }, |
1341 |
{ 'P', stats_ports, 0, 0 }, |
1342 |
{ 'q', stats_resv, 1, 0 }, |
1343 |
{ 'Q', stats_resv, 1, 0 }, |
1344 |
{ 'r', stats_usage, 1, 0 }, |
1345 |
{ 'R', stats_usage, 1, 0 }, |
1346 |
{ 'S', stats_service, 1, 0 }, |
1347 |
{ 't', stats_tstats, 1, 0 }, |
1348 |
{ 'T', stats_tstats, 1, 0 }, |
1349 |
{ 'u', stats_uptime, 0, 0 }, |
1350 |
{ 'U', stats_shared, 1, 0 }, |
1351 |
{ 'v', stats_servers, 1, 0 }, |
1352 |
{ 'x', stats_gecos, 1, 0 }, |
1353 |
{ 'X', stats_gecos, 1, 0 }, |
1354 |
{ 'y', stats_class, 1, 0 }, |
1355 |
{ 'Y', stats_class, 1, 0 }, |
1356 |
{ 'z', stats_memory, 1, 0 }, |
1357 |
{ '?', stats_servlinks, 0, 0 }, |
1358 |
{ '\0', NULL, 0, 0 } |
1359 |
}; |
1360 |
|
1361 |
static void |
1362 |
do_stats(struct Client *source_p, int parc, char *parv[]) |
1363 |
{ |
1364 |
const struct StatsStruct *tab = stats_cmd_table; |
1365 |
const char statchar = *parv[1]; |
1366 |
|
1367 |
if (statchar == '\0') |
1368 |
{ |
1369 |
sendto_one(source_p, form_str(RPL_ENDOFSTATS), |
1370 |
from, to, '*'); |
1371 |
return; |
1372 |
} |
1373 |
|
1374 |
for (; tab->handler; ++tab) |
1375 |
{ |
1376 |
if (tab->letter == statchar) |
1377 |
{ |
1378 |
/* The stats table says what privs are needed, so check --fl_ */ |
1379 |
if ((tab->need_admin && !HasUMode(source_p, UMODE_ADMIN)) || |
1380 |
(tab->need_oper && !HasUMode(source_p, UMODE_OPER))) |
1381 |
{ |
1382 |
sendto_one(source_p, form_str(ERR_NOPRIVILEGES), |
1383 |
from, to); |
1384 |
break; |
1385 |
} |
1386 |
|
1387 |
sendto_realops_flags(UMODE_SPY, L_ALL, SEND_NOTICE, |
1388 |
"STATS %c requested by %s (%s@%s) [%s]", |
1389 |
statchar, source_p->name, source_p->username, |
1390 |
source_p->host, source_p->servptr->name); |
1391 |
tab->handler(source_p, parc, parv); |
1392 |
break; |
1393 |
} |
1394 |
} |
1395 |
|
1396 |
sendto_one(source_p, form_str(RPL_ENDOFSTATS), |
1397 |
from, to, statchar); |
1398 |
} |
1399 |
|
1400 |
/* |
1401 |
* m_stats() |
1402 |
* parv[0] = sender prefix |
1403 |
* parv[1] = stat letter/command |
1404 |
* parv[2] = (if present) server/mask in stats L |
1405 |
* |
1406 |
* This will search the tables for the appropriate stats letter/command, |
1407 |
* if found execute it. |
1408 |
*/ |
1409 |
static void |
1410 |
m_stats(struct Client *client_p, struct Client *source_p, |
1411 |
int parc, char *parv[]) |
1412 |
{ |
1413 |
static time_t last_used = 0; |
1414 |
|
1415 |
/* Is the stats meant for us? */ |
1416 |
if (!ConfigFileEntry.disable_remote) |
1417 |
if (hunt_server(client_p, source_p, ":%s STATS %s :%s", 2, |
1418 |
parc, parv) != HUNTED_ISME) |
1419 |
return; |
1420 |
|
1421 |
if (!MyClient(source_p) && IsCapable(source_p->from, CAP_TS6) && HasID(source_p)) |
1422 |
{ |
1423 |
from = me.id; |
1424 |
to = source_p->id; |
1425 |
} |
1426 |
else |
1427 |
{ |
1428 |
from = me.name; |
1429 |
to = source_p->name; |
1430 |
} |
1431 |
|
1432 |
/* Check the user is actually allowed to do /stats, and isnt flooding */ |
1433 |
if ((last_used + ConfigFileEntry.pace_wait) > CurrentTime) |
1434 |
{ |
1435 |
sendto_one(source_p,form_str(RPL_LOAD2HI), |
1436 |
from, to); |
1437 |
return; |
1438 |
} |
1439 |
|
1440 |
last_used = CurrentTime; |
1441 |
|
1442 |
do_stats(source_p, parc, parv); |
1443 |
} |
1444 |
|
1445 |
/* |
1446 |
* mo_stats() |
1447 |
* parv[0] = sender prefix |
1448 |
* parv[1] = stat letter/command |
1449 |
* parv[2] = (if present) server/mask in stats L, or target |
1450 |
* |
1451 |
* This will search the tables for the appropriate stats letter, |
1452 |
* if found execute it. |
1453 |
*/ |
1454 |
static void |
1455 |
mo_stats(struct Client *client_p, struct Client *source_p, |
1456 |
int parc, char *parv[]) |
1457 |
{ |
1458 |
if (hunt_server(client_p, source_p, ":%s STATS %s :%s", 2, |
1459 |
parc, parv) != HUNTED_ISME) |
1460 |
return; |
1461 |
|
1462 |
if (!MyClient(source_p) && IsCapable(source_p->from, CAP_TS6) && HasID(source_p)) |
1463 |
{ |
1464 |
from = me.id; |
1465 |
to = source_p->id; |
1466 |
} |
1467 |
else |
1468 |
{ |
1469 |
from = me.name; |
1470 |
to = source_p->name; |
1471 |
} |
1472 |
|
1473 |
do_stats(source_p, parc, parv); |
1474 |
} |
1475 |
|
1476 |
/* |
1477 |
* ms_stats - STATS message handler |
1478 |
* parv[0] = sender prefix |
1479 |
* parv[1] = statistics selector (defaults to Message frequency) |
1480 |
* parv[2] = server name (current server defaulted, if omitted) |
1481 |
*/ |
1482 |
static void |
1483 |
ms_stats(struct Client *client_p, struct Client *source_p, |
1484 |
int parc, char *parv[]) |
1485 |
{ |
1486 |
if (hunt_server(client_p, source_p, ":%s STATS %s :%s", 2, |
1487 |
parc, parv) != HUNTED_ISME) |
1488 |
return; |
1489 |
|
1490 |
if (IsClient(source_p)) |
1491 |
mo_stats(client_p, source_p, parc, parv); |
1492 |
} |
1493 |
|
1494 |
static struct Message stats_msgtab = { |
1495 |
"STATS", 0, 0, 2, MAXPARA, MFLG_SLOW, 0, |
1496 |
{ m_unregistered, m_stats, ms_stats, m_ignore, mo_stats, m_ignore } |
1497 |
}; |
1498 |
|
1499 |
static void |
1500 |
module_init(void) |
1501 |
{ |
1502 |
mod_add_cmd(&stats_msgtab); |
1503 |
} |
1504 |
|
1505 |
static void |
1506 |
module_exit(void) |
1507 |
{ |
1508 |
mod_del_cmd(&stats_msgtab); |
1509 |
} |
1510 |
|
1511 |
struct module module_entry = { |
1512 |
.node = { NULL, NULL, NULL }, |
1513 |
.name = NULL, |
1514 |
.version = "$Revision$", |
1515 |
.handle = NULL, |
1516 |
.modinit = module_init, |
1517 |
.modexit = module_exit, |
1518 |
.flags = 0 |
1519 |
}; |