ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/ircd-hybrid/trunk/src/conf_parser.y
Revision: 3473
Committed: Sun May 4 15:40:26 2014 UTC (11 years, 3 months ago) by michael
File size: 76985 byte(s)
Log Message:
- Renamed general::warn_no_nline to warn_no_connect_block

File Contents

# User Rev Content
1 adx 30 /*
2 michael 2916 * ircd-hybrid: an advanced, lightweight Internet Relay Chat Daemon (ircd)
3 adx 30 *
4 michael 2916 * Copyright (c) 2000-2014 ircd-hybrid development team
5 adx 30 *
6     * This program is free software; you can redistribute it and/or modify
7     * it under the terms of the GNU General Public License as published by
8     * the Free Software Foundation; either version 2 of the License, or
9     * (at your option) any later version.
10     *
11     * This program is distributed in the hope that it will be useful,
12     * but WITHOUT ANY WARRANTY; without even the implied warranty of
13     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14     * GNU General Public License for more details.
15     *
16     * You should have received a copy of the GNU General Public License
17     * along with this program; if not, write to the Free Software
18     * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
19     * USA
20     */
21    
22 michael 2916 /*! \file conf_parser.y
23     * \brief Parses the ircd configuration file.
24     * \version $Id$
25     */
26    
27    
28 adx 30 %{
29    
30     #define YY_NO_UNPUT
31     #include <sys/types.h>
32 stu 909 #include <string.h>
33 adx 30
34 michael 1009 #include "config.h"
35 adx 30 #include "stdinc.h"
36     #include "ircd.h"
37     #include "list.h"
38 michael 1309 #include "conf.h"
39 michael 1632 #include "conf_class.h"
40 adx 30 #include "event.h"
41 michael 1309 #include "log.h"
42 adx 30 #include "client.h" /* for UMODE_ALL only */
43     #include "irc_string.h"
44     #include "memory.h"
45     #include "modules.h"
46 michael 3435 #include "server.h"
47 adx 30 #include "hostmask.h"
48     #include "send.h"
49     #include "listener.h"
50     #include "resv.h"
51     #include "numeric.h"
52 michael 3435 #include "user.h"
53 michael 2150 #include "motd.h"
54 adx 30
55     #ifdef HAVE_LIBCRYPTO
56     #include <openssl/rsa.h>
57     #include <openssl/bio.h>
58     #include <openssl/pem.h>
59 michael 1306 #include <openssl/dh.h>
60 adx 30 #endif
61    
62 michael 1752 #include "rsa.h"
63    
64 michael 1329 int yylex(void);
65    
66 michael 1646 static struct
67 michael 593 {
68 michael 3439 struct
69     {
70 michael 1646 dlink_list list;
71     } mask,
72     leaf,
73     hub;
74 adx 30
75 michael 3439 struct
76     {
77 michael 1646 char buf[IRCD_BUFSIZE];
78     } name,
79     user,
80     host,
81     addr,
82 michael 1647 bind,
83 michael 1646 file,
84 michael 1647 ciph,
85 michael 2228 cert,
86 michael 1647 rpass,
87     spass,
88 michael 1646 class;
89    
90 michael 3439 struct
91     {
92 michael 1646 unsigned int value;
93     } flags,
94     modes,
95 michael 1647 size,
96     type,
97 michael 1646 port,
98 michael 1647 aftype,
99 michael 1646 ping_freq,
100     max_perip,
101     con_freq,
102 michael 1783 min_idle,
103     max_idle,
104 michael 1646 max_total,
105     max_global,
106     max_local,
107     max_ident,
108     max_sendq,
109     max_recvq,
110     cidr_bitlen_ipv4,
111     cidr_bitlen_ipv6,
112     number_per_cidr;
113     } block_state;
114    
115 adx 30 static void
116 michael 1646 reset_block_state(void)
117 adx 30 {
118 michael 1646 dlink_node *ptr = NULL, *ptr_next = NULL;
119    
120     DLINK_FOREACH_SAFE(ptr, ptr_next, block_state.mask.list.head)
121     {
122     MyFree(ptr->data);
123     dlinkDelete(ptr, &block_state.mask.list);
124     free_dlink_node(ptr);
125     }
126    
127     DLINK_FOREACH_SAFE(ptr, ptr_next, block_state.leaf.list.head)
128     {
129     MyFree(ptr->data);
130     dlinkDelete(ptr, &block_state.leaf.list);
131     free_dlink_node(ptr);
132     }
133    
134     DLINK_FOREACH_SAFE(ptr, ptr_next, block_state.hub.list.head)
135     {
136     MyFree(ptr->data);
137     dlinkDelete(ptr, &block_state.hub.list);
138     free_dlink_node(ptr);
139     }
140    
141     memset(&block_state, 0, sizeof(block_state));
142 adx 30 }
143    
144     %}
145    
146     %union {
147     int number;
148     char *string;
149     }
150    
151     %token ACCEPT_PASSWORD
152     %token ADMIN
153     %token AFTYPE
154     %token ANTI_NICK_FLOOD
155     %token ANTI_SPAM_EXIT_MESSAGE_TIME
156     %token AUTOCONN
157 michael 1520 %token BYTES KBYTES MBYTES
158 adx 30 %token CALLER_ID_WAIT
159     %token CAN_FLOOD
160     %token CHANNEL
161 michael 2129 %token CIDR_BITLEN_IPV4
162     %token CIDR_BITLEN_IPV6
163 adx 30 %token CLASS
164     %token CONNECT
165     %token CONNECTFREQ
166 michael 2283 %token CYCLE_ON_HOST_CHANGE
167 adx 30 %token DEFAULT_FLOODCOUNT
168     %token DEFAULT_SPLIT_SERVER_COUNT
169     %token DEFAULT_SPLIT_USER_COUNT
170     %token DENY
171     %token DESCRIPTION
172     %token DIE
173     %token DISABLE_AUTH
174 michael 632 %token DISABLE_FAKE_CHANNELS
175 adx 30 %token DISABLE_REMOTE_COMMANDS
176     %token DOTS_IN_IDENT
177     %token EGDPOOL_PATH
178     %token EMAIL
179     %token ENCRYPTED
180     %token EXCEED_LIMIT
181     %token EXEMPT
182     %token FAILED_OPER_NOTICE
183     %token FLATTEN_LINKS
184     %token GECOS
185     %token GENERAL
186     %token GLINE
187 michael 1459 %token GLINE_DURATION
188     %token GLINE_ENABLE
189 adx 30 %token GLINE_EXEMPT
190     %token GLINE_MIN_CIDR
191     %token GLINE_MIN_CIDR6
192 michael 2129 %token GLINE_REQUEST_DURATION
193 adx 30 %token GLOBAL_KILL
194     %token HAVENT_READ_CONF
195     %token HIDDEN
196 michael 2129 %token HIDDEN_NAME
197     %token HIDE_IDLE_FROM_OPERS
198 adx 30 %token HIDE_SERVER_IPS
199     %token HIDE_SERVERS
200 michael 1851 %token HIDE_SERVICES
201 michael 2129 %token HIDE_SPOOF_IPS
202 adx 30 %token HOST
203     %token HUB
204     %token HUB_MASK
205     %token IGNORE_BOGUS_TS
206     %token INVISIBLE_ON_CONNECT
207     %token IP
208 michael 2129 %token IRCD_AUTH
209     %token IRCD_FLAGS
210     %token IRCD_SID
211     %token JOIN_FLOOD_COUNT
212     %token JOIN_FLOOD_TIME
213 adx 30 %token KILL
214 michael 2129 %token KILL_CHASE_TIME_LIMIT
215 adx 30 %token KLINE
216     %token KLINE_EXEMPT
217     %token KNOCK_DELAY
218     %token KNOCK_DELAY_CHANNEL
219     %token LEAF_MASK
220     %token LINKS_DELAY
221     %token LISTEN
222 michael 1858 %token MASK
223 adx 30 %token MAX_ACCEPT
224     %token MAX_BANS
225 michael 1432 %token MAX_CHANS_PER_OPER
226 adx 30 %token MAX_CHANS_PER_USER
227     %token MAX_GLOBAL
228     %token MAX_IDENT
229 michael 2129 %token MAX_IDLE
230 adx 30 %token MAX_LOCAL
231     %token MAX_NICK_CHANGES
232 michael 1751 %token MAX_NICK_LENGTH
233 adx 30 %token MAX_NICK_TIME
234     %token MAX_NUMBER
235     %token MAX_TARGETS
236 michael 1751 %token MAX_TOPIC_LENGTH
237 michael 876 %token MAX_WATCH
238 michael 2129 %token MIN_IDLE
239 adx 30 %token MIN_NONWILDCARD
240     %token MIN_NONWILDCARD_SIMPLE
241     %token MODULE
242     %token MODULES
243 michael 2150 %token MOTD
244 adx 30 %token NAME
245 michael 2129 %token NEED_IDENT
246 adx 30 %token NEED_PASSWORD
247     %token NETWORK_DESC
248     %token NETWORK_NAME
249     %token NICK
250     %token NO_CREATE_ON_SPLIT
251     %token NO_JOIN_ON_SPLIT
252     %token NO_OPER_FLOOD
253     %token NO_TILDE
254     %token NUMBER
255     %token NUMBER_PER_CIDR
256     %token NUMBER_PER_IP
257     %token OPER_ONLY_UMODES
258     %token OPER_PASS_RESV
259     %token OPER_UMODES
260 michael 2129 %token OPERATOR
261     %token OPERS_BYPASS_CALLERID
262 adx 30 %token PACE_WAIT
263     %token PACE_WAIT_SIMPLE
264     %token PASSWORD
265     %token PATH
266     %token PING_COOKIE
267     %token PING_TIME
268     %token PORT
269     %token QSTRING
270 michael 2129 %token RANDOM_IDLE
271 adx 30 %token REASON
272     %token REDIRPORT
273     %token REDIRSERV
274     %token REHASH
275     %token REMOTE
276     %token REMOTEBAN
277 michael 2129 %token RESV
278     %token RESV_EXEMPT
279 adx 30 %token RSA_PRIVATE_KEY_FILE
280     %token RSA_PUBLIC_KEY_FILE
281 michael 1783 %token SECONDS MINUTES HOURS DAYS WEEKS MONTHS YEARS
282 michael 2129 %token SEND_PASSWORD
283 adx 30 %token SENDQ
284     %token SERVERHIDE
285     %token SERVERINFO
286     %token SHORT_MOTD
287     %token SPOOF
288     %token SPOOF_NOTICE
289 michael 2129 %token SQUIT
290     %token SSL_CERTIFICATE_FILE
291 michael 2244 %token SSL_CERTIFICATE_FINGERPRINT
292 michael 2248 %token SSL_CONNECTION_REQUIRED
293 michael 2129 %token SSL_DH_PARAM_FILE
294 michael 584 %token STATS_E_DISABLED
295 adx 30 %token STATS_I_OPER_ONLY
296     %token STATS_K_OPER_ONLY
297     %token STATS_O_OPER_ONLY
298     %token STATS_P_OPER_ONLY
299 michael 2269 %token STATS_U_OPER_ONLY
300 adx 30 %token T_ALL
301     %token T_BOTS
302     %token T_CALLERID
303     %token T_CCONN
304 michael 2129 %token T_CLUSTER
305 adx 30 %token T_DEAF
306     %token T_DEBUG
307 michael 1247 %token T_DLINE
308 adx 30 %token T_EXTERNAL
309 michael 1976 %token T_FARCONNECT
310 michael 2129 %token T_FILE
311 adx 30 %token T_FULL
312 michael 2129 %token T_GLOBOPS
313 adx 30 %token T_INVISIBLE
314     %token T_IPV4
315     %token T_IPV6
316     %token T_LOCOPS
317 michael 2129 %token T_LOG
318 adx 30 %token T_MAX_CLIENTS
319     %token T_NCHANGE
320 michael 1855 %token T_NONONREG
321 adx 30 %token T_OPERWALL
322 michael 1516 %token T_RECVQ
323 adx 30 %token T_REJ
324 michael 2129 %token T_RESTART
325 michael 900 %token T_SERVER
326 michael 2129 %token T_SERVICE
327     %token T_SERVICES_NAME
328 adx 30 %token T_SERVNOTICE
329 michael 1460 %token T_SET
330 michael 2129 %token T_SHARED
331     %token T_SIZE
332 adx 30 %token T_SKILL
333 michael 2129 %token T_SOFTCALLERID
334 adx 30 %token T_SPY
335     %token T_SSL
336 michael 2129 %token T_SSL_CIPHER_LIST
337     %token T_SSL_CLIENT_METHOD
338     %token T_SSL_SERVER_METHOD
339     %token T_SSLV3
340     %token T_TLSV1
341 michael 56 %token T_UMODES
342 adx 30 %token T_UNAUTH
343 michael 1301 %token T_UNDLINE
344 michael 1250 %token T_UNLIMITED
345 adx 30 %token T_UNRESV
346     %token T_UNXLINE
347     %token T_WALLOP
348 michael 2038 %token T_WALLOPS
349 michael 1715 %token T_WEBIRC
350 michael 2129 %token TBOOL
351 adx 30 %token THROTTLE_TIME
352 michael 2129 %token TKLINE_EXPIRE_NOTICES
353     %token TMASKED
354 adx 30 %token TRUE_NO_OPER_FLOOD
355 michael 2129 %token TS_MAX_DELTA
356     %token TS_WARN_DELTA
357     %token TWODOTS
358     %token TYPE
359 adx 30 %token UNKLINE
360     %token USE_EGD
361     %token USE_LOGGING
362 michael 2129 %token USER
363 adx 30 %token VHOST
364     %token VHOST6
365 michael 3473 %token WARN_NO_CONNECT_BLOCK
366 adx 30 %token XLINE
367    
368 michael 2129 %type <string> QSTRING
369     %type <number> NUMBER
370     %type <number> timespec
371     %type <number> timespec_
372     %type <number> sizespec
373     %type <number> sizespec_
374 adx 30
375     %%
376 michael 2916 conf:
377 adx 30 | conf conf_item
378     ;
379    
380     conf_item: admin_entry
381     | logging_entry
382     | oper_entry
383 michael 3439 | channel_entry
384 michael 2916 | class_entry
385 adx 30 | listen_entry
386     | auth_entry
387     | serverinfo_entry
388 michael 3439 | serverhide_entry
389 adx 30 | resv_entry
390 michael 1157 | service_entry
391 adx 30 | shared_entry
392 michael 3439 | cluster_entry
393 adx 30 | connect_entry
394     | kill_entry
395     | deny_entry
396 michael 3439 | exempt_entry
397     | general_entry
398 adx 30 | gecos_entry
399     | modules_entry
400 michael 2150 | motd_entry
401 adx 30 | error ';'
402     | error '}'
403     ;
404    
405    
406     timespec_: { $$ = 0; } | timespec;
407 michael 3439 timespec: NUMBER timespec_ { $$ = $1 + $2; } |
408     NUMBER SECONDS timespec_ { $$ = $1 + $3; } |
409     NUMBER MINUTES timespec_ { $$ = $1 * 60 + $3; } |
410     NUMBER HOURS timespec_ { $$ = $1 * 60 * 60 + $3; } |
411     NUMBER DAYS timespec_ { $$ = $1 * 60 * 60 * 24 + $3; } |
412     NUMBER WEEKS timespec_ { $$ = $1 * 60 * 60 * 24 * 7 + $3; } |
413     NUMBER MONTHS timespec_ { $$ = $1 * 60 * 60 * 24 * 7 * 4 + $3; } |
414     NUMBER YEARS timespec_ { $$ = $1 * 60 * 60 * 24 * 365 + $3; }
415     ;
416 adx 30
417 michael 3439 sizespec_: { $$ = 0; } | sizespec;
418     sizespec: NUMBER sizespec_ { $$ = $1 + $2; } |
419     NUMBER BYTES sizespec_ { $$ = $1 + $3; } |
420     NUMBER KBYTES sizespec_ { $$ = $1 * 1024 + $3; } |
421     NUMBER MBYTES sizespec_ { $$ = $1 * 1024 * 1024 + $3; }
422     ;
423 adx 30
424    
425     /***************************************************************************
426     * section modules
427     ***************************************************************************/
428     modules_entry: MODULES
429     '{' modules_items '}' ';';
430    
431     modules_items: modules_items modules_item | modules_item;
432     modules_item: modules_module | modules_path | error ';' ;
433    
434     modules_module: MODULE '=' QSTRING ';'
435     {
436 michael 967 if (conf_parser_ctx.pass == 2)
437 michael 978 add_conf_module(libio_basename(yylval.string));
438 adx 30 };
439    
440     modules_path: PATH '=' QSTRING ';'
441     {
442 michael 967 if (conf_parser_ctx.pass == 2)
443 adx 30 mod_add_path(yylval.string);
444     };
445    
446    
447 michael 967 serverinfo_entry: SERVERINFO '{' serverinfo_items '}' ';';
448    
449     serverinfo_items: serverinfo_items serverinfo_item | serverinfo_item ;
450 michael 3439 serverinfo_item: serverinfo_name |
451     serverinfo_vhost |
452     serverinfo_hub |
453     serverinfo_description |
454     serverinfo_network_name |
455     serverinfo_network_desc |
456     serverinfo_max_clients |
457     serverinfo_max_nick_length |
458     serverinfo_max_topic_length |
459     serverinfo_ssl_dh_param_file |
460     serverinfo_rsa_private_key_file |
461     serverinfo_vhost6 |
462     serverinfo_sid |
463     serverinfo_ssl_certificate_file |
464     serverinfo_ssl_client_method |
465     serverinfo_ssl_server_method |
466 michael 1316 serverinfo_ssl_cipher_list |
467 michael 3439 error ';' ;
468 adx 30
469 michael 967
470 michael 1316 serverinfo_ssl_client_method: T_SSL_CLIENT_METHOD '=' client_method_types ';' ;
471     serverinfo_ssl_server_method: T_SSL_SERVER_METHOD '=' server_method_types ';' ;
472    
473     client_method_types: client_method_types ',' client_method_type_item | client_method_type_item;
474     client_method_type_item: T_SSLV3
475 michael 967 {
476 michael 1024 #ifdef HAVE_LIBCRYPTO
477 michael 1316 if (conf_parser_ctx.pass == 2 && ServerInfo.client_ctx)
478     SSL_CTX_clear_options(ServerInfo.client_ctx, SSL_OP_NO_SSLv3);
479 michael 1024 #endif
480 michael 1316 } | T_TLSV1
481 michael 967 {
482 michael 1024 #ifdef HAVE_LIBCRYPTO
483 michael 1316 if (conf_parser_ctx.pass == 2 && ServerInfo.client_ctx)
484     SSL_CTX_clear_options(ServerInfo.client_ctx, SSL_OP_NO_TLSv1);
485 michael 1024 #endif
486 michael 967 };
487    
488 michael 1316 server_method_types: server_method_types ',' server_method_type_item | server_method_type_item;
489     server_method_type_item: T_SSLV3
490 michael 967 {
491 michael 1024 #ifdef HAVE_LIBCRYPTO
492 michael 1316 if (conf_parser_ctx.pass == 2 && ServerInfo.server_ctx)
493     SSL_CTX_clear_options(ServerInfo.server_ctx, SSL_OP_NO_SSLv3);
494 michael 1024 #endif
495 michael 967 } | T_TLSV1
496     {
497 michael 1024 #ifdef HAVE_LIBCRYPTO
498 michael 1316 if (conf_parser_ctx.pass == 2 && ServerInfo.server_ctx)
499     SSL_CTX_clear_options(ServerInfo.server_ctx, SSL_OP_NO_TLSv1);
500 michael 1024 #endif
501 michael 967 };
502    
503 adx 30 serverinfo_ssl_certificate_file: SSL_CERTIFICATE_FILE '=' QSTRING ';'
504     {
505     #ifdef HAVE_LIBCRYPTO
506 michael 2916 if (conf_parser_ctx.pass == 2 && ServerInfo.server_ctx)
507 adx 30 {
508     if (!ServerInfo.rsa_private_key_file)
509     {
510 michael 1752 conf_error_report("No rsa_private_key_file specified, SSL disabled");
511 adx 30 break;
512     }
513    
514 michael 967 if (SSL_CTX_use_certificate_file(ServerInfo.server_ctx, yylval.string,
515 michael 1303 SSL_FILETYPE_PEM) <= 0 ||
516     SSL_CTX_use_certificate_file(ServerInfo.client_ctx, yylval.string,
517 michael 967 SSL_FILETYPE_PEM) <= 0)
518 adx 30 {
519 michael 1752 report_crypto_errors();
520     conf_error_report("Could not open/read certificate file");
521 adx 30 break;
522     }
523    
524 michael 967 if (SSL_CTX_use_PrivateKey_file(ServerInfo.server_ctx, ServerInfo.rsa_private_key_file,
525 michael 1303 SSL_FILETYPE_PEM) <= 0 ||
526     SSL_CTX_use_PrivateKey_file(ServerInfo.client_ctx, ServerInfo.rsa_private_key_file,
527 michael 967 SSL_FILETYPE_PEM) <= 0)
528 adx 30 {
529 michael 1752 report_crypto_errors();
530     conf_error_report("Could not read RSA private key");
531 adx 30 break;
532     }
533    
534 michael 1303 if (!SSL_CTX_check_private_key(ServerInfo.server_ctx) ||
535     !SSL_CTX_check_private_key(ServerInfo.client_ctx))
536 adx 30 {
537 michael 1753 report_crypto_errors();
538     conf_error_report("Could not read RSA private key");
539 adx 30 break;
540     }
541     }
542     #endif
543     };
544    
545     serverinfo_rsa_private_key_file: RSA_PRIVATE_KEY_FILE '=' QSTRING ';'
546     {
547     #ifdef HAVE_LIBCRYPTO
548 michael 2129 BIO *file = NULL;
549    
550     if (conf_parser_ctx.pass != 1)
551     break;
552    
553     if (ServerInfo.rsa_private_key)
554 adx 30 {
555 michael 2129 RSA_free(ServerInfo.rsa_private_key);
556     ServerInfo.rsa_private_key = NULL;
557     }
558 adx 30
559 michael 2129 if (ServerInfo.rsa_private_key_file)
560     {
561     MyFree(ServerInfo.rsa_private_key_file);
562     ServerInfo.rsa_private_key_file = NULL;
563     }
564 adx 30
565 michael 2129 ServerInfo.rsa_private_key_file = xstrdup(yylval.string);
566 adx 30
567 michael 2129 if ((file = BIO_new_file(yylval.string, "r")) == NULL)
568     {
569     conf_error_report("File open failed, ignoring");
570     break;
571     }
572 adx 30
573 michael 2129 ServerInfo.rsa_private_key = PEM_read_bio_RSAPrivateKey(file, NULL, 0, NULL);
574 adx 30
575 michael 2129 BIO_set_close(file, BIO_CLOSE);
576     BIO_free(file);
577 adx 30
578 michael 2129 if (ServerInfo.rsa_private_key == NULL)
579     {
580     conf_error_report("Couldn't extract key, ignoring");
581     break;
582     }
583 adx 30
584 michael 2129 if (!RSA_check_key(ServerInfo.rsa_private_key))
585     {
586     RSA_free(ServerInfo.rsa_private_key);
587     ServerInfo.rsa_private_key = NULL;
588 adx 30
589 michael 2129 conf_error_report("Invalid key, ignoring");
590     break;
591     }
592 adx 30
593 michael 2843 if (RSA_size(ServerInfo.rsa_private_key) < 128)
594 michael 2129 {
595     RSA_free(ServerInfo.rsa_private_key);
596     ServerInfo.rsa_private_key = NULL;
597 adx 30
598 michael 2843 conf_error_report("Ignoring serverinfo::rsa_private_key_file -- need at least a 1024 bit key size");
599 adx 30 }
600     #endif
601     };
602    
603 michael 1306 serverinfo_ssl_dh_param_file: SSL_DH_PARAM_FILE '=' QSTRING ';'
604     {
605     /* TBD - XXX: error reporting */
606     #ifdef HAVE_LIBCRYPTO
607     if (conf_parser_ctx.pass == 2 && ServerInfo.server_ctx)
608     {
609     BIO *file = BIO_new_file(yylval.string, "r");
610    
611     if (file)
612     {
613     DH *dh = PEM_read_bio_DHparams(file, NULL, NULL, NULL);
614    
615     BIO_free(file);
616    
617     if (dh)
618     {
619 michael 1352 if (DH_size(dh) < 128)
620 michael 1752 conf_error_report("Ignoring serverinfo::ssl_dh_param_file -- need at least a 1024 bit DH prime size");
621 michael 1352 else
622     SSL_CTX_set_tmp_dh(ServerInfo.server_ctx, dh);
623    
624 michael 1306 DH_free(dh);
625     }
626     }
627     }
628     #endif
629     };
630    
631     serverinfo_ssl_cipher_list: T_SSL_CIPHER_LIST '=' QSTRING ';'
632     {
633     #ifdef HAVE_LIBCRYPTO
634     if (conf_parser_ctx.pass == 2 && ServerInfo.server_ctx)
635     SSL_CTX_set_cipher_list(ServerInfo.server_ctx, yylval.string);
636     #endif
637     };
638    
639 michael 2916 serverinfo_name: NAME '=' QSTRING ';'
640 adx 30 {
641     /* this isn't rehashable */
642 michael 1117 if (conf_parser_ctx.pass == 2 && !ServerInfo.name)
643 adx 30 {
644 michael 1117 if (valid_servname(yylval.string))
645 michael 1646 ServerInfo.name = xstrdup(yylval.string);
646 michael 1117 else
647 adx 30 {
648 michael 1752 conf_error_report("Ignoring serverinfo::name -- invalid name. Aborting.");
649 michael 1117 exit(0);
650 adx 30 }
651     }
652     };
653    
654 michael 2916 serverinfo_sid: IRCD_SID '=' QSTRING ';'
655 adx 30 {
656     /* this isn't rehashable */
657 michael 967 if (conf_parser_ctx.pass == 2 && !ServerInfo.sid)
658 adx 30 {
659 michael 573 if (valid_sid(yylval.string))
660 michael 1646 ServerInfo.sid = xstrdup(yylval.string);
661 adx 30 else
662     {
663 michael 1752 conf_error_report("Ignoring serverinfo::sid -- invalid SID. Aborting.");
664 adx 30 exit(0);
665     }
666     }
667     };
668    
669     serverinfo_description: DESCRIPTION '=' QSTRING ';'
670     {
671 michael 967 if (conf_parser_ctx.pass == 2)
672 adx 30 {
673     MyFree(ServerInfo.description);
674 michael 1646 ServerInfo.description = xstrdup(yylval.string);
675 adx 30 }
676     };
677    
678     serverinfo_network_name: NETWORK_NAME '=' QSTRING ';'
679     {
680 michael 967 if (conf_parser_ctx.pass == 2)
681 adx 30 {
682     char *p;
683    
684 michael 3443 if ((p = strchr(yylval.string, ' ')))
685 adx 30 p = '\0';
686    
687     MyFree(ServerInfo.network_name);
688 michael 1646 ServerInfo.network_name = xstrdup(yylval.string);
689 adx 30 }
690     };
691    
692     serverinfo_network_desc: NETWORK_DESC '=' QSTRING ';'
693     {
694 michael 2129 if (conf_parser_ctx.pass != 2)
695     break;
696    
697     MyFree(ServerInfo.network_desc);
698     ServerInfo.network_desc = xstrdup(yylval.string);
699 adx 30 };
700    
701     serverinfo_vhost: VHOST '=' QSTRING ';'
702     {
703 michael 967 if (conf_parser_ctx.pass == 2 && *yylval.string != '*')
704 adx 30 {
705     struct addrinfo hints, *res;
706    
707     memset(&hints, 0, sizeof(hints));
708    
709     hints.ai_family = AF_UNSPEC;
710     hints.ai_socktype = SOCK_STREAM;
711     hints.ai_flags = AI_PASSIVE | AI_NUMERICHOST;
712    
713 michael 1123 if (getaddrinfo(yylval.string, NULL, &hints, &res))
714 michael 1247 ilog(LOG_TYPE_IRCD, "Invalid netmask for server vhost(%s)", yylval.string);
715 adx 30 else
716     {
717 michael 3443 assert(res);
718 adx 30
719     memcpy(&ServerInfo.ip, res->ai_addr, res->ai_addrlen);
720     ServerInfo.ip.ss.ss_family = res->ai_family;
721     ServerInfo.ip.ss_len = res->ai_addrlen;
722 michael 1123 freeaddrinfo(res);
723 adx 30
724     ServerInfo.specific_ipv4_vhost = 1;
725     }
726     }
727     };
728    
729     serverinfo_vhost6: VHOST6 '=' QSTRING ';'
730     {
731     #ifdef IPV6
732 michael 967 if (conf_parser_ctx.pass == 2 && *yylval.string != '*')
733 adx 30 {
734     struct addrinfo hints, *res;
735    
736     memset(&hints, 0, sizeof(hints));
737    
738     hints.ai_family = AF_UNSPEC;
739     hints.ai_socktype = SOCK_STREAM;
740     hints.ai_flags = AI_PASSIVE | AI_NUMERICHOST;
741    
742 michael 1123 if (getaddrinfo(yylval.string, NULL, &hints, &res))
743 michael 1247 ilog(LOG_TYPE_IRCD, "Invalid netmask for server vhost6(%s)", yylval.string);
744 adx 30 else
745     {
746 michael 3443 assert(res);
747 adx 30
748     memcpy(&ServerInfo.ip6, res->ai_addr, res->ai_addrlen);
749     ServerInfo.ip6.ss.ss_family = res->ai_family;
750     ServerInfo.ip6.ss_len = res->ai_addrlen;
751 michael 1123 freeaddrinfo(res);
752 adx 30
753     ServerInfo.specific_ipv6_vhost = 1;
754     }
755     }
756     #endif
757     };
758    
759     serverinfo_max_clients: T_MAX_CLIENTS '=' NUMBER ';'
760     {
761 michael 1736 if (conf_parser_ctx.pass != 2)
762     break;
763    
764     if ($3 < MAXCLIENTS_MIN)
765 adx 30 {
766 michael 3443 char buf[IRCD_BUFSIZE] = "";
767 adx 30
768 michael 1736 snprintf(buf, sizeof(buf), "MAXCLIENTS too low, setting to %d", MAXCLIENTS_MIN);
769 michael 1752 conf_error_report(buf);
770 michael 1736 ServerInfo.max_clients = MAXCLIENTS_MIN;
771 adx 30 }
772 michael 1736 else if ($3 > MAXCLIENTS_MAX)
773     {
774 michael 3443 char buf[IRCD_BUFSIZE] = "";
775 michael 1736
776     snprintf(buf, sizeof(buf), "MAXCLIENTS too high, setting to %d", MAXCLIENTS_MAX);
777 michael 1752 conf_error_report(buf);
778 michael 1736 ServerInfo.max_clients = MAXCLIENTS_MAX;
779     }
780     else
781     ServerInfo.max_clients = $3;
782 adx 30 };
783    
784 michael 1751 serverinfo_max_nick_length: MAX_NICK_LENGTH '=' NUMBER ';'
785     {
786     if (conf_parser_ctx.pass != 2)
787     break;
788    
789     if ($3 < 9)
790     {
791     conf_error_report("max_nick_length too low, setting to 9");
792     ServerInfo.max_nick_length = 9;
793     }
794     else if ($3 > NICKLEN)
795     {
796 michael 3443 char buf[IRCD_BUFSIZE] = "";
797 michael 1751
798     snprintf(buf, sizeof(buf), "max_nick_length too high, setting to %d", NICKLEN);
799     conf_error_report(buf);
800     ServerInfo.max_nick_length = NICKLEN;
801     }
802     else
803     ServerInfo.max_nick_length = $3;
804     };
805    
806     serverinfo_max_topic_length: MAX_TOPIC_LENGTH '=' NUMBER ';'
807     {
808     if (conf_parser_ctx.pass != 2)
809     break;
810    
811     if ($3 < 80)
812     {
813     conf_error_report("max_topic_length too low, setting to 80");
814     ServerInfo.max_topic_length = 80;
815     }
816     else if ($3 > TOPICLEN)
817     {
818 michael 3443 char buf[IRCD_BUFSIZE] = "";
819 michael 1751
820     snprintf(buf, sizeof(buf), "max_topic_length too high, setting to %d", TOPICLEN);
821     conf_error_report(buf);
822     ServerInfo.max_topic_length = TOPICLEN;
823     }
824     else
825     ServerInfo.max_topic_length = $3;
826     };
827    
828 michael 2916 serverinfo_hub: HUB '=' TBOOL ';'
829 adx 30 {
830 michael 967 if (conf_parser_ctx.pass == 2)
831 michael 1119 ServerInfo.hub = yylval.number;
832 adx 30 };
833    
834     /***************************************************************************
835     * admin section
836     ***************************************************************************/
837     admin_entry: ADMIN '{' admin_items '}' ';' ;
838    
839     admin_items: admin_items admin_item | admin_item;
840 michael 3439 admin_item: admin_name |
841     admin_description |
842     admin_email |
843     error ';' ;
844 adx 30
845 michael 2916 admin_name: NAME '=' QSTRING ';'
846 adx 30 {
847 michael 2129 if (conf_parser_ctx.pass != 2)
848     break;
849    
850     MyFree(AdminInfo.name);
851     AdminInfo.name = xstrdup(yylval.string);
852 adx 30 };
853    
854     admin_email: EMAIL '=' QSTRING ';'
855     {
856 michael 2129 if (conf_parser_ctx.pass != 2)
857     break;
858    
859     MyFree(AdminInfo.email);
860     AdminInfo.email = xstrdup(yylval.string);
861 adx 30 };
862    
863     admin_description: DESCRIPTION '=' QSTRING ';'
864     {
865 michael 2129 if (conf_parser_ctx.pass != 2)
866     break;
867    
868     MyFree(AdminInfo.description);
869     AdminInfo.description = xstrdup(yylval.string);
870 adx 30 };
871    
872     /***************************************************************************
873 michael 2150 * motd section
874     ***************************************************************************/
875 michael 2916 motd_entry: MOTD
876 michael 2150 {
877     if (conf_parser_ctx.pass == 2)
878     reset_block_state();
879     } '{' motd_items '}' ';'
880     {
881     dlink_node *ptr = NULL;
882    
883     if (conf_parser_ctx.pass != 2)
884     break;
885    
886     if (!block_state.file.buf[0])
887     break;
888    
889     DLINK_FOREACH(ptr, block_state.mask.list.head)
890     motd_add(ptr->data, block_state.file.buf);
891     };
892    
893     motd_items: motd_items motd_item | motd_item;
894     motd_item: motd_mask | motd_file | error ';' ;
895    
896 michael 2916 motd_mask: MASK '=' QSTRING ';'
897 michael 2150 {
898     if (conf_parser_ctx.pass == 2)
899     dlinkAdd(xstrdup(yylval.string), make_dlink_node(), &block_state.mask.list);
900     };
901    
902     motd_file: T_FILE '=' QSTRING ';'
903     {
904     if (conf_parser_ctx.pass == 2)
905     strlcpy(block_state.file.buf, yylval.string, sizeof(block_state.file.buf));
906     };
907    
908     /***************************************************************************
909 adx 30 * section logging
910     ***************************************************************************/
911 michael 1247 logging_entry: T_LOG '{' logging_items '}' ';' ;
912     logging_items: logging_items logging_item | logging_item ;
913 adx 30
914 michael 3439 logging_item: logging_use_logging | logging_file_entry |
915     error ';' ;
916 adx 30
917 michael 1247 logging_use_logging: USE_LOGGING '=' TBOOL ';'
918 adx 30 {
919 michael 967 if (conf_parser_ctx.pass == 2)
920 michael 1247 ConfigLoggingEntry.use_logging = yylval.number;
921 adx 30 };
922    
923 michael 1247 logging_file_entry:
924 adx 30 {
925 michael 1647 if (conf_parser_ctx.pass == 2)
926     reset_block_state();
927 michael 1247 } T_FILE '{' logging_file_items '}' ';'
928 adx 30 {
929 michael 1647 if (conf_parser_ctx.pass != 2)
930     break;
931    
932     if (block_state.type.value && block_state.file.buf[0])
933 michael 1831 log_set_file(block_state.type.value, block_state.size.value,
934 michael 1647 block_state.file.buf);
935 adx 30 };
936    
937 michael 1247 logging_file_items: logging_file_items logging_file_item |
938     logging_file_item ;
939 adx 30
940 michael 1247 logging_file_item: logging_file_name | logging_file_type |
941     logging_file_size | error ';' ;
942    
943     logging_file_name: NAME '=' QSTRING ';'
944 adx 30 {
945 michael 1647 if (conf_parser_ctx.pass != 2)
946     break;
947    
948     strlcpy(block_state.file.buf, yylval.string, sizeof(block_state.file.buf));
949 michael 1247 }
950 adx 30
951 michael 1247 logging_file_size: T_SIZE '=' sizespec ';'
952 adx 30 {
953 michael 1647 block_state.size.value = $3;
954 michael 1250 } | T_SIZE '=' T_UNLIMITED ';'
955     {
956 michael 1647 block_state.size.value = 0;
957 adx 30 };
958    
959 michael 1247 logging_file_type: TYPE
960 adx 30 {
961 michael 967 if (conf_parser_ctx.pass == 2)
962 michael 1647 block_state.type.value = 0;
963 michael 1247 } '=' logging_file_type_items ';' ;
964 adx 30
965 michael 1247 logging_file_type_items: logging_file_type_items ',' logging_file_type_item | logging_file_type_item;
966     logging_file_type_item: USER
967 adx 30 {
968 michael 967 if (conf_parser_ctx.pass == 2)
969 michael 1647 block_state.type.value = LOG_TYPE_USER;
970 michael 1247 } | OPERATOR
971 adx 30 {
972 michael 967 if (conf_parser_ctx.pass == 2)
973 michael 1647 block_state.type.value = LOG_TYPE_OPER;
974 michael 1247 } | GLINE
975 adx 30 {
976 michael 967 if (conf_parser_ctx.pass == 2)
977 michael 1647 block_state.type.value = LOG_TYPE_GLINE;
978 michael 2336 } | XLINE
979     {
980     if (conf_parser_ctx.pass == 2)
981     block_state.type.value = LOG_TYPE_XLINE;
982     } | RESV
983     {
984     if (conf_parser_ctx.pass == 2)
985     block_state.type.value = LOG_TYPE_RESV;
986 michael 1247 } | T_DLINE
987 adx 30 {
988 michael 967 if (conf_parser_ctx.pass == 2)
989 michael 1647 block_state.type.value = LOG_TYPE_DLINE;
990 michael 1247 } | KLINE
991 adx 30 {
992 michael 967 if (conf_parser_ctx.pass == 2)
993 michael 1647 block_state.type.value = LOG_TYPE_KLINE;
994 michael 1247 } | KILL
995 adx 30 {
996 michael 967 if (conf_parser_ctx.pass == 2)
997 michael 1647 block_state.type.value = LOG_TYPE_KILL;
998 michael 1247 } | T_DEBUG
999 adx 30 {
1000 michael 967 if (conf_parser_ctx.pass == 2)
1001 michael 1647 block_state.type.value = LOG_TYPE_DEBUG;
1002 adx 30 };
1003    
1004 michael 1247
1005 adx 30 /***************************************************************************
1006     * section oper
1007     ***************************************************************************/
1008 michael 2916 oper_entry: OPERATOR
1009 adx 30 {
1010 michael 1646 if (conf_parser_ctx.pass != 2)
1011     break;
1012    
1013     reset_block_state();
1014     block_state.flags.value |= CONF_FLAGS_ENCRYPTED;
1015 michael 1285 } '{' oper_items '}' ';'
1016 adx 30 {
1017 michael 1646 dlink_node *ptr = NULL;
1018 adx 30
1019 michael 1646 if (conf_parser_ctx.pass != 2)
1020     break;
1021 adx 30
1022 michael 1646 if (!block_state.name.buf[0])
1023     break;
1024     #ifdef HAVE_LIBCRYPTO
1025 michael 2129 if (!block_state.file.buf[0] &&
1026     !block_state.rpass.buf[0])
1027 michael 1646 break;
1028     #else
1029 michael 1647 if (!block_state.rpass.buf[0])
1030 michael 1646 break;
1031     #endif
1032 adx 30
1033 michael 1646 DLINK_FOREACH(ptr, block_state.mask.list.head)
1034     {
1035     struct MaskItem *conf = NULL;
1036     struct split_nuh_item nuh;
1037 adx 30
1038 michael 1646 nuh.nuhmask = ptr->data;
1039     nuh.nickptr = NULL;
1040 michael 1647 nuh.userptr = block_state.user.buf;
1041     nuh.hostptr = block_state.host.buf;
1042 michael 1646 nuh.nicksize = 0;
1043 michael 1647 nuh.usersize = sizeof(block_state.user.buf);
1044     nuh.hostsize = sizeof(block_state.host.buf);
1045 michael 1646 split_nuh(&nuh);
1046 adx 30
1047 michael 2228 conf = conf_make(CONF_OPER);
1048     conf->name = xstrdup(block_state.name.buf);
1049     conf->user = xstrdup(block_state.user.buf);
1050     conf->host = xstrdup(block_state.host.buf);
1051 michael 1285
1052 michael 2228 if (block_state.cert.buf[0])
1053     conf->certfp = xstrdup(block_state.cert.buf);
1054    
1055 michael 1647 if (block_state.rpass.buf[0])
1056     conf->passwd = xstrdup(block_state.rpass.buf);
1057 michael 1285
1058 michael 1646 conf->flags = block_state.flags.value;
1059     conf->modes = block_state.modes.value;
1060     conf->port = block_state.port.value;
1061     conf->htype = parse_netmask(conf->host, &conf->addr, &conf->bits);
1062 adx 30
1063 michael 1646 conf_add_class_to_conf(conf, block_state.class.buf);
1064    
1065 adx 30 #ifdef HAVE_LIBCRYPTO
1066 michael 1646 if (block_state.file.buf[0])
1067     {
1068     BIO *file = NULL;
1069     RSA *pkey = NULL;
1070    
1071     if ((file = BIO_new_file(block_state.file.buf, "r")) == NULL)
1072 adx 30 {
1073 michael 1752 conf_error_report("Ignoring rsa_public_key_file -- file doesn't exist");
1074 michael 1646 break;
1075 adx 30 }
1076    
1077 michael 1646 if ((pkey = PEM_read_bio_RSA_PUBKEY(file, NULL, 0, NULL)) == NULL)
1078 michael 1752 conf_error_report("Ignoring rsa_public_key_file -- Key invalid; check key syntax.");
1079 adx 30
1080 michael 1646 conf->rsa_public_key = pkey;
1081     BIO_set_close(file, BIO_CLOSE);
1082     BIO_free(file);
1083 adx 30 }
1084 michael 1646 #endif /* HAVE_LIBCRYPTO */
1085 adx 30 }
1086 michael 1646 };
1087 adx 30
1088     oper_items: oper_items oper_item | oper_item;
1089 michael 3439 oper_item: oper_name |
1090     oper_user |
1091     oper_password |
1092     oper_umodes |
1093     oper_class |
1094     oper_encrypted |
1095     oper_rsa_public_key_file |
1096     oper_ssl_certificate_fingerprint |
1097     oper_ssl_connection_required |
1098     oper_flags |
1099     error ';' ;
1100 adx 30
1101     oper_name: NAME '=' QSTRING ';'
1102     {
1103 michael 967 if (conf_parser_ctx.pass == 2)
1104 michael 1646 strlcpy(block_state.name.buf, yylval.string, sizeof(block_state.name.buf));
1105 adx 30 };
1106    
1107     oper_user: USER '=' QSTRING ';'
1108     {
1109 michael 967 if (conf_parser_ctx.pass == 2)
1110 michael 1646 dlinkAdd(xstrdup(yylval.string), make_dlink_node(), &block_state.mask.list);
1111 adx 30 };
1112    
1113     oper_password: PASSWORD '=' QSTRING ';'
1114     {
1115 michael 967 if (conf_parser_ctx.pass == 2)
1116 michael 1647 strlcpy(block_state.rpass.buf, yylval.string, sizeof(block_state.rpass.buf));
1117 adx 30 };
1118    
1119     oper_encrypted: ENCRYPTED '=' TBOOL ';'
1120     {
1121 michael 2129 if (conf_parser_ctx.pass != 2)
1122     break;
1123    
1124     if (yylval.number)
1125     block_state.flags.value |= CONF_FLAGS_ENCRYPTED;
1126     else
1127     block_state.flags.value &= ~CONF_FLAGS_ENCRYPTED;
1128 adx 30 };
1129    
1130     oper_rsa_public_key_file: RSA_PUBLIC_KEY_FILE '=' QSTRING ';'
1131     {
1132 michael 967 if (conf_parser_ctx.pass == 2)
1133 michael 1646 strlcpy(block_state.file.buf, yylval.string, sizeof(block_state.file.buf));
1134 adx 30 };
1135    
1136 michael 2244 oper_ssl_certificate_fingerprint: SSL_CERTIFICATE_FINGERPRINT '=' QSTRING ';'
1137 michael 2228 {
1138     if (conf_parser_ctx.pass == 2)
1139 michael 2229 strlcpy(block_state.cert.buf, yylval.string, sizeof(block_state.cert.buf));
1140 michael 2228 };
1141    
1142 michael 2248 oper_ssl_connection_required: SSL_CONNECTION_REQUIRED '=' TBOOL ';'
1143     {
1144     if (conf_parser_ctx.pass != 2)
1145     break;
1146    
1147     if (yylval.number)
1148     block_state.flags.value |= CONF_FLAGS_SSL;
1149     else
1150     block_state.flags.value &= ~CONF_FLAGS_SSL;
1151     };
1152    
1153 adx 30 oper_class: CLASS '=' QSTRING ';'
1154     {
1155 michael 967 if (conf_parser_ctx.pass == 2)
1156 michael 1646 strlcpy(block_state.class.buf, yylval.string, sizeof(block_state.class.buf));
1157 adx 30 };
1158    
1159 michael 56 oper_umodes: T_UMODES
1160     {
1161 michael 967 if (conf_parser_ctx.pass == 2)
1162 michael 1646 block_state.modes.value = 0;
1163 michael 56 } '=' oper_umodes_items ';' ;
1164    
1165     oper_umodes_items: oper_umodes_items ',' oper_umodes_item | oper_umodes_item;
1166     oper_umodes_item: T_BOTS
1167     {
1168 michael 967 if (conf_parser_ctx.pass == 2)
1169 michael 1646 block_state.modes.value |= UMODE_BOTS;
1170 michael 56 } | T_CCONN
1171     {
1172 michael 967 if (conf_parser_ctx.pass == 2)
1173 michael 1646 block_state.modes.value |= UMODE_CCONN;
1174 michael 56 } | T_DEAF
1175     {
1176 michael 967 if (conf_parser_ctx.pass == 2)
1177 michael 1646 block_state.modes.value |= UMODE_DEAF;
1178 michael 56 } | T_DEBUG
1179     {
1180 michael 967 if (conf_parser_ctx.pass == 2)
1181 michael 1646 block_state.modes.value |= UMODE_DEBUG;
1182 michael 56 } | T_FULL
1183     {
1184 michael 967 if (conf_parser_ctx.pass == 2)
1185 michael 1646 block_state.modes.value |= UMODE_FULL;
1186 michael 1294 } | HIDDEN
1187     {
1188     if (conf_parser_ctx.pass == 2)
1189 michael 1646 block_state.modes.value |= UMODE_HIDDEN;
1190 michael 56 } | T_SKILL
1191     {
1192 michael 967 if (conf_parser_ctx.pass == 2)
1193 michael 1646 block_state.modes.value |= UMODE_SKILL;
1194 michael 56 } | T_NCHANGE
1195     {
1196 michael 967 if (conf_parser_ctx.pass == 2)
1197 michael 1646 block_state.modes.value |= UMODE_NCHANGE;
1198 michael 56 } | T_REJ
1199     {
1200 michael 967 if (conf_parser_ctx.pass == 2)
1201 michael 1646 block_state.modes.value |= UMODE_REJ;
1202 michael 56 } | T_UNAUTH
1203     {
1204 michael 967 if (conf_parser_ctx.pass == 2)
1205 michael 1646 block_state.modes.value |= UMODE_UNAUTH;
1206 michael 56 } | T_SPY
1207     {
1208 michael 967 if (conf_parser_ctx.pass == 2)
1209 michael 1646 block_state.modes.value |= UMODE_SPY;
1210 michael 56 } | T_EXTERNAL
1211     {
1212 michael 967 if (conf_parser_ctx.pass == 2)
1213 michael 1646 block_state.modes.value |= UMODE_EXTERNAL;
1214 michael 56 } | T_OPERWALL
1215     {
1216 michael 967 if (conf_parser_ctx.pass == 2)
1217 michael 1646 block_state.modes.value |= UMODE_OPERWALL;
1218 michael 56 } | T_SERVNOTICE
1219     {
1220 michael 967 if (conf_parser_ctx.pass == 2)
1221 michael 1646 block_state.modes.value |= UMODE_SERVNOTICE;
1222 michael 56 } | T_INVISIBLE
1223     {
1224 michael 967 if (conf_parser_ctx.pass == 2)
1225 michael 1646 block_state.modes.value |= UMODE_INVISIBLE;
1226 michael 56 } | T_WALLOP
1227     {
1228 michael 967 if (conf_parser_ctx.pass == 2)
1229 michael 1646 block_state.modes.value |= UMODE_WALLOP;
1230 michael 56 } | T_SOFTCALLERID
1231     {
1232 michael 967 if (conf_parser_ctx.pass == 2)
1233 michael 1646 block_state.modes.value |= UMODE_SOFTCALLERID;
1234 michael 56 } | T_CALLERID
1235     {
1236 michael 967 if (conf_parser_ctx.pass == 2)
1237 michael 1646 block_state.modes.value |= UMODE_CALLERID;
1238 michael 56 } | T_LOCOPS
1239     {
1240 michael 967 if (conf_parser_ctx.pass == 2)
1241 michael 1646 block_state.modes.value |= UMODE_LOCOPS;
1242 michael 1855 } | T_NONONREG
1243     {
1244     if (conf_parser_ctx.pass == 2)
1245     block_state.modes.value |= UMODE_REGONLY;
1246 michael 1976 } | T_FARCONNECT
1247     {
1248     if (conf_parser_ctx.pass == 2)
1249     block_state.modes.value |= UMODE_FARCONNECT;
1250 michael 56 };
1251    
1252 adx 30 oper_flags: IRCD_FLAGS
1253     {
1254 michael 1228 if (conf_parser_ctx.pass == 2)
1255 michael 1646 block_state.port.value = 0;
1256 adx 30 } '=' oper_flags_items ';';
1257    
1258     oper_flags_items: oper_flags_items ',' oper_flags_item | oper_flags_item;
1259 michael 2012 oper_flags_item: KILL ':' REMOTE
1260 adx 30 {
1261 michael 967 if (conf_parser_ctx.pass == 2)
1262 michael 2012 block_state.port.value |= OPER_FLAG_KILL_REMOTE;
1263     } | KILL
1264 adx 30 {
1265 michael 967 if (conf_parser_ctx.pass == 2)
1266 michael 2012 block_state.port.value |= OPER_FLAG_KILL;
1267     } | CONNECT ':' REMOTE
1268     {
1269     if (conf_parser_ctx.pass == 2)
1270     block_state.port.value |= OPER_FLAG_CONNECT_REMOTE;
1271     } | CONNECT
1272     {
1273     if (conf_parser_ctx.pass == 2)
1274     block_state.port.value |= OPER_FLAG_CONNECT;
1275     } | SQUIT ':' REMOTE
1276     {
1277     if (conf_parser_ctx.pass == 2)
1278     block_state.port.value |= OPER_FLAG_SQUIT_REMOTE;
1279     } | SQUIT
1280     {
1281     if (conf_parser_ctx.pass == 2)
1282     block_state.port.value |= OPER_FLAG_SQUIT;
1283 adx 30 } | KLINE
1284     {
1285 michael 967 if (conf_parser_ctx.pass == 2)
1286 michael 1646 block_state.port.value |= OPER_FLAG_K;
1287 adx 30 } | UNKLINE
1288     {
1289 michael 967 if (conf_parser_ctx.pass == 2)
1290 michael 1646 block_state.port.value |= OPER_FLAG_UNKLINE;
1291 michael 1301 } | T_DLINE
1292     {
1293     if (conf_parser_ctx.pass == 2)
1294 michael 1646 block_state.port.value |= OPER_FLAG_DLINE;
1295 michael 1301 } | T_UNDLINE
1296     {
1297     if (conf_parser_ctx.pass == 2)
1298 michael 1646 block_state.port.value |= OPER_FLAG_UNDLINE;
1299 adx 30 } | XLINE
1300     {
1301 michael 967 if (conf_parser_ctx.pass == 2)
1302 michael 2852 block_state.port.value |= OPER_FLAG_XLINE;
1303     } | T_UNXLINE
1304     {
1305     if (conf_parser_ctx.pass == 2)
1306     block_state.port.value |= OPER_FLAG_UNXLINE;
1307 adx 30 } | GLINE
1308     {
1309 michael 967 if (conf_parser_ctx.pass == 2)
1310 michael 1646 block_state.port.value |= OPER_FLAG_GLINE;
1311 adx 30 } | DIE
1312     {
1313 michael 967 if (conf_parser_ctx.pass == 2)
1314 michael 1646 block_state.port.value |= OPER_FLAG_DIE;
1315 michael 1228 } | T_RESTART
1316     {
1317     if (conf_parser_ctx.pass == 2)
1318 michael 1646 block_state.port.value |= OPER_FLAG_RESTART;
1319 adx 30 } | REHASH
1320     {
1321 michael 967 if (conf_parser_ctx.pass == 2)
1322 michael 1646 block_state.port.value |= OPER_FLAG_REHASH;
1323 adx 30 } | ADMIN
1324     {
1325 michael 967 if (conf_parser_ctx.pass == 2)
1326 michael 1646 block_state.port.value |= OPER_FLAG_ADMIN;
1327 adx 30 } | T_OPERWALL
1328     {
1329 michael 967 if (conf_parser_ctx.pass == 2)
1330 michael 1646 block_state.port.value |= OPER_FLAG_OPERWALL;
1331 michael 1216 } | T_GLOBOPS
1332     {
1333     if (conf_parser_ctx.pass == 2)
1334 michael 1646 block_state.port.value |= OPER_FLAG_GLOBOPS;
1335 michael 2038 } | T_WALLOPS
1336     {
1337     if (conf_parser_ctx.pass == 2)
1338     block_state.port.value |= OPER_FLAG_WALLOPS;
1339     } | T_LOCOPS
1340     {
1341     if (conf_parser_ctx.pass == 2)
1342     block_state.port.value |= OPER_FLAG_LOCOPS;
1343 adx 30 } | REMOTEBAN
1344     {
1345 michael 967 if (conf_parser_ctx.pass == 2)
1346 michael 1646 block_state.port.value |= OPER_FLAG_REMOTEBAN;
1347 michael 1460 } | T_SET
1348     {
1349     if (conf_parser_ctx.pass == 2)
1350 michael 1646 block_state.port.value |= OPER_FLAG_SET;
1351 michael 1228 } | MODULE
1352 adx 30 {
1353 michael 967 if (conf_parser_ctx.pass == 2)
1354 michael 1646 block_state.port.value |= OPER_FLAG_MODULE;
1355 adx 30 };
1356    
1357    
1358     /***************************************************************************
1359     * section class
1360     ***************************************************************************/
1361     class_entry: CLASS
1362     {
1363 michael 1651 if (conf_parser_ctx.pass != 1)
1364     break;
1365    
1366     reset_block_state();
1367    
1368     block_state.ping_freq.value = DEFAULT_PINGFREQUENCY;
1369     block_state.con_freq.value = DEFAULT_CONNECTFREQUENCY;
1370     block_state.max_total.value = MAXIMUM_LINKS_DEFAULT;
1371     block_state.max_sendq.value = DEFAULT_SENDQ;
1372     block_state.max_recvq.value = DEFAULT_RECVQ;
1373 michael 1285 } '{' class_items '}' ';'
1374 adx 30 {
1375 michael 1647 struct ClassItem *class = NULL;
1376 adx 30
1377 michael 1647 if (conf_parser_ctx.pass != 1)
1378     break;
1379 adx 30
1380 michael 1647 if (!block_state.class.buf[0])
1381     break;
1382 michael 671
1383 michael 1647 if (!(class = class_find(block_state.class.buf, 0)))
1384     class = class_make();
1385 michael 671
1386 michael 1647 class->active = 1;
1387     MyFree(class->name);
1388     class->name = xstrdup(block_state.class.buf);
1389     class->ping_freq = block_state.ping_freq.value;
1390     class->max_perip = block_state.max_perip.value;
1391     class->con_freq = block_state.con_freq.value;
1392     class->max_total = block_state.max_total.value;
1393     class->max_global = block_state.max_global.value;
1394     class->max_local = block_state.max_local.value;
1395     class->max_ident = block_state.max_ident.value;
1396     class->max_sendq = block_state.max_sendq.value;
1397     class->max_recvq = block_state.max_recvq.value;
1398 michael 671
1399 michael 1785 if (block_state.min_idle.value > block_state.max_idle.value)
1400     {
1401     block_state.min_idle.value = 0;
1402     block_state.max_idle.value = 0;
1403     block_state.flags.value &= ~CLASS_FLAGS_FAKE_IDLE;
1404     }
1405    
1406     class->flags = block_state.flags.value;
1407     class->min_idle = block_state.min_idle.value;
1408     class->max_idle = block_state.max_idle.value;
1409    
1410 michael 1647 if (class->number_per_cidr && block_state.number_per_cidr.value)
1411     if ((class->cidr_bitlen_ipv4 && block_state.cidr_bitlen_ipv4.value) ||
1412     (class->cidr_bitlen_ipv6 && block_state.cidr_bitlen_ipv6.value))
1413     if ((class->cidr_bitlen_ipv4 != block_state.cidr_bitlen_ipv4.value) ||
1414     (class->cidr_bitlen_ipv6 != block_state.cidr_bitlen_ipv6.value))
1415     rebuild_cidr_list(class);
1416 adx 30
1417 michael 1647 class->cidr_bitlen_ipv4 = block_state.cidr_bitlen_ipv4.value;
1418     class->cidr_bitlen_ipv6 = block_state.cidr_bitlen_ipv6.value;
1419     class->number_per_cidr = block_state.number_per_cidr.value;
1420 adx 30 };
1421    
1422     class_items: class_items class_item | class_item;
1423     class_item: class_name |
1424 michael 3439 class_cidr_bitlen_ipv4 |
1425     class_cidr_bitlen_ipv6 |
1426 adx 30 class_ping_time |
1427 michael 3439 class_number_per_cidr |
1428 adx 30 class_number_per_ip |
1429     class_connectfreq |
1430     class_max_number |
1431 michael 3439 class_max_global |
1432     class_max_local |
1433     class_max_ident |
1434 michael 1516 class_sendq | class_recvq |
1435 michael 1783 class_min_idle |
1436     class_max_idle |
1437     class_flags |
1438 michael 3439 error ';' ;
1439 adx 30
1440 michael 2916 class_name: NAME '=' QSTRING ';'
1441 adx 30 {
1442 michael 967 if (conf_parser_ctx.pass == 1)
1443 michael 1647 strlcpy(block_state.class.buf, yylval.string, sizeof(block_state.class.buf));
1444 adx 30 };
1445    
1446     class_ping_time: PING_TIME '=' timespec ';'
1447     {
1448 michael 967 if (conf_parser_ctx.pass == 1)
1449 michael 1647 block_state.ping_freq.value = $3;
1450 adx 30 };
1451    
1452     class_number_per_ip: NUMBER_PER_IP '=' NUMBER ';'
1453     {
1454 michael 967 if (conf_parser_ctx.pass == 1)
1455 michael 1647 block_state.max_perip.value = $3;
1456 adx 30 };
1457    
1458     class_connectfreq: CONNECTFREQ '=' timespec ';'
1459     {
1460 michael 967 if (conf_parser_ctx.pass == 1)
1461 michael 1647 block_state.con_freq.value = $3;
1462 adx 30 };
1463    
1464     class_max_number: MAX_NUMBER '=' NUMBER ';'
1465     {
1466 michael 967 if (conf_parser_ctx.pass == 1)
1467 michael 1647 block_state.max_total.value = $3;
1468 adx 30 };
1469    
1470     class_max_global: MAX_GLOBAL '=' NUMBER ';'
1471     {
1472 michael 967 if (conf_parser_ctx.pass == 1)
1473 michael 1647 block_state.max_global.value = $3;
1474 adx 30 };
1475    
1476     class_max_local: MAX_LOCAL '=' NUMBER ';'
1477     {
1478 michael 967 if (conf_parser_ctx.pass == 1)
1479 michael 1647 block_state.max_local.value = $3;
1480 adx 30 };
1481    
1482     class_max_ident: MAX_IDENT '=' NUMBER ';'
1483     {
1484 michael 967 if (conf_parser_ctx.pass == 1)
1485 michael 1647 block_state.max_ident.value = $3;
1486 adx 30 };
1487    
1488     class_sendq: SENDQ '=' sizespec ';'
1489     {
1490 michael 967 if (conf_parser_ctx.pass == 1)
1491 michael 1647 block_state.max_sendq.value = $3;
1492 adx 30 };
1493    
1494 michael 1516 class_recvq: T_RECVQ '=' sizespec ';'
1495     {
1496     if (conf_parser_ctx.pass == 1)
1497     if ($3 >= CLIENT_FLOOD_MIN && $3 <= CLIENT_FLOOD_MAX)
1498 michael 1647 block_state.max_recvq.value = $3;
1499 michael 1516 };
1500    
1501 adx 30 class_cidr_bitlen_ipv4: CIDR_BITLEN_IPV4 '=' NUMBER ';'
1502     {
1503 michael 967 if (conf_parser_ctx.pass == 1)
1504 michael 1647 block_state.cidr_bitlen_ipv4.value = $3 > 32 ? 32 : $3;
1505 adx 30 };
1506    
1507     class_cidr_bitlen_ipv6: CIDR_BITLEN_IPV6 '=' NUMBER ';'
1508     {
1509 michael 967 if (conf_parser_ctx.pass == 1)
1510 michael 1647 block_state.cidr_bitlen_ipv6.value = $3 > 128 ? 128 : $3;
1511 adx 30 };
1512    
1513     class_number_per_cidr: NUMBER_PER_CIDR '=' NUMBER ';'
1514     {
1515 michael 967 if (conf_parser_ctx.pass == 1)
1516 michael 1647 block_state.number_per_cidr.value = $3;
1517 adx 30 };
1518    
1519 michael 1783 class_min_idle: MIN_IDLE '=' timespec ';'
1520     {
1521 michael 1785 if (conf_parser_ctx.pass != 1)
1522     break;
1523    
1524     block_state.min_idle.value = $3;
1525     block_state.flags.value |= CLASS_FLAGS_FAKE_IDLE;
1526 michael 1783 };
1527    
1528     class_max_idle: MAX_IDLE '=' timespec ';'
1529     {
1530 michael 1785 if (conf_parser_ctx.pass != 1)
1531     break;
1532    
1533     block_state.max_idle.value = $3;
1534     block_state.flags.value |= CLASS_FLAGS_FAKE_IDLE;
1535 michael 1783 };
1536    
1537     class_flags: IRCD_FLAGS
1538     {
1539     if (conf_parser_ctx.pass == 1)
1540 michael 1785 block_state.flags.value &= CLASS_FLAGS_FAKE_IDLE;
1541 michael 1783 } '=' class_flags_items ';';
1542    
1543     class_flags_items: class_flags_items ',' class_flags_item | class_flags_item;
1544     class_flags_item: RANDOM_IDLE
1545     {
1546     if (conf_parser_ctx.pass == 1)
1547     block_state.flags.value |= CLASS_FLAGS_RANDOM_IDLE;
1548     } | HIDE_IDLE_FROM_OPERS
1549     {
1550     if (conf_parser_ctx.pass == 1)
1551     block_state.flags.value |= CLASS_FLAGS_HIDE_IDLE_FROM_OPERS;
1552     };
1553    
1554    
1555 adx 30 /***************************************************************************
1556     * section listen
1557     ***************************************************************************/
1558     listen_entry: LISTEN
1559     {
1560 michael 967 if (conf_parser_ctx.pass == 2)
1561 michael 1646 reset_block_state();
1562     } '{' listen_items '}' ';';
1563 adx 30
1564     listen_flags: IRCD_FLAGS
1565     {
1566 michael 1646 block_state.flags.value = 0;
1567 adx 30 } '=' listen_flags_items ';';
1568    
1569     listen_flags_items: listen_flags_items ',' listen_flags_item | listen_flags_item;
1570     listen_flags_item: T_SSL
1571     {
1572 michael 967 if (conf_parser_ctx.pass == 2)
1573 michael 1646 block_state.flags.value |= LISTENER_SSL;
1574 adx 30 } | HIDDEN
1575     {
1576 michael 967 if (conf_parser_ctx.pass == 2)
1577 michael 1647 block_state.flags.value |= LISTENER_HIDDEN;
1578 michael 900 } | T_SERVER
1579     {
1580 michael 967 if (conf_parser_ctx.pass == 2)
1581 michael 1647 block_state.flags.value |= LISTENER_SERVER;
1582 adx 30 };
1583    
1584     listen_items: listen_items listen_item | listen_item;
1585 michael 440 listen_item: listen_port | listen_flags | listen_address | listen_host | error ';';
1586 adx 30
1587 michael 1648 listen_port: PORT '=' port_items { block_state.flags.value = 0; } ';';
1588 adx 30
1589     port_items: port_items ',' port_item | port_item;
1590    
1591     port_item: NUMBER
1592     {
1593 michael 967 if (conf_parser_ctx.pass == 2)
1594 adx 30 {
1595 michael 1646 if (block_state.flags.value & LISTENER_SSL)
1596 adx 30 #ifdef HAVE_LIBCRYPTO
1597 michael 967 if (!ServerInfo.server_ctx)
1598 adx 30 #endif
1599     {
1600 michael 1752 conf_error_report("SSL not available - port closed");
1601 michael 3439 break;
1602 adx 30 }
1603 michael 1646 add_listener($1, block_state.addr.buf, block_state.flags.value);
1604 adx 30 }
1605     } | NUMBER TWODOTS NUMBER
1606     {
1607 michael 967 if (conf_parser_ctx.pass == 2)
1608 adx 30 {
1609 michael 1646 if (block_state.flags.value & LISTENER_SSL)
1610 adx 30 #ifdef HAVE_LIBCRYPTO
1611 michael 967 if (!ServerInfo.server_ctx)
1612 adx 30 #endif
1613     {
1614 michael 1752 conf_error_report("SSL not available - port closed");
1615 michael 3439 break;
1616 adx 30 }
1617    
1618 michael 3439 for (int i = $1; i <= $3; ++i)
1619 michael 1646 add_listener(i, block_state.addr.buf, block_state.flags.value);
1620 adx 30 }
1621     };
1622    
1623     listen_address: IP '=' QSTRING ';'
1624     {
1625 michael 967 if (conf_parser_ctx.pass == 2)
1626 michael 1646 strlcpy(block_state.addr.buf, yylval.string, sizeof(block_state.addr.buf));
1627 adx 30 };
1628    
1629     listen_host: HOST '=' QSTRING ';'
1630     {
1631 michael 967 if (conf_parser_ctx.pass == 2)
1632 michael 1646 strlcpy(block_state.addr.buf, yylval.string, sizeof(block_state.addr.buf));
1633 adx 30 };
1634    
1635     /***************************************************************************
1636     * section auth
1637     ***************************************************************************/
1638     auth_entry: IRCD_AUTH
1639     {
1640 michael 967 if (conf_parser_ctx.pass == 2)
1641 michael 1646 reset_block_state();
1642 adx 30 } '{' auth_items '}' ';'
1643     {
1644 michael 1646 dlink_node *ptr = NULL;
1645 adx 30
1646 michael 1646 if (conf_parser_ctx.pass != 2)
1647     break;
1648 adx 30
1649 michael 1646 DLINK_FOREACH(ptr, block_state.mask.list.head)
1650     {
1651     struct MaskItem *conf = NULL;
1652     struct split_nuh_item nuh;
1653 adx 30
1654 michael 1646 nuh.nuhmask = ptr->data;
1655     nuh.nickptr = NULL;
1656 michael 1647 nuh.userptr = block_state.user.buf;
1657     nuh.hostptr = block_state.host.buf;
1658 michael 1646 nuh.nicksize = 0;
1659 michael 1647 nuh.usersize = sizeof(block_state.user.buf);
1660     nuh.hostsize = sizeof(block_state.host.buf);
1661 michael 1646 split_nuh(&nuh);
1662 adx 30
1663 michael 1646 conf = conf_make(CONF_CLIENT);
1664 michael 2106 conf->user = xstrdup(block_state.user.buf);
1665     conf->host = xstrdup(block_state.host.buf);
1666 adx 30
1667 michael 1647 if (block_state.rpass.buf[0])
1668     conf->passwd = xstrdup(block_state.rpass.buf);
1669 michael 1646 if (block_state.name.buf[0])
1670 michael 1911 conf->name = xstrdup(block_state.name.buf);
1671 adx 30
1672 michael 1646 conf->flags = block_state.flags.value;
1673     conf->port = block_state.port.value;
1674 adx 30
1675 michael 1646 conf_add_class_to_conf(conf, block_state.class.buf);
1676     add_conf_by_address(CONF_CLIENT, conf);
1677 adx 30 }
1678 michael 2916 };
1679 adx 30
1680     auth_items: auth_items auth_item | auth_item;
1681 michael 3439 auth_item: auth_user |
1682     auth_passwd |
1683     auth_class |
1684     auth_flags |
1685     auth_spoof |
1686 michael 3441 auth_redir_serv |
1687 michael 3439 auth_redir_port |
1688     auth_encrypted |
1689     error ';' ;
1690 adx 30
1691     auth_user: USER '=' QSTRING ';'
1692     {
1693 michael 967 if (conf_parser_ctx.pass == 2)
1694 michael 1646 dlinkAdd(xstrdup(yylval.string), make_dlink_node(), &block_state.mask.list);
1695 adx 30 };
1696    
1697     auth_passwd: PASSWORD '=' QSTRING ';'
1698     {
1699 michael 967 if (conf_parser_ctx.pass == 2)
1700 michael 1647 strlcpy(block_state.rpass.buf, yylval.string, sizeof(block_state.rpass.buf));
1701 adx 30 };
1702    
1703     auth_class: CLASS '=' QSTRING ';'
1704     {
1705 michael 967 if (conf_parser_ctx.pass == 2)
1706 michael 1646 strlcpy(block_state.class.buf, yylval.string, sizeof(block_state.class.buf));
1707 adx 30 };
1708    
1709     auth_encrypted: ENCRYPTED '=' TBOOL ';'
1710     {
1711 michael 967 if (conf_parser_ctx.pass == 2)
1712 adx 30 {
1713     if (yylval.number)
1714 michael 1646 block_state.flags.value |= CONF_FLAGS_ENCRYPTED;
1715 adx 30 else
1716 michael 1646 block_state.flags.value &= ~CONF_FLAGS_ENCRYPTED;
1717 adx 30 }
1718     };
1719    
1720     auth_flags: IRCD_FLAGS
1721     {
1722 michael 1646 if (conf_parser_ctx.pass == 2)
1723 michael 2093 block_state.flags.value &= (CONF_FLAGS_ENCRYPTED | CONF_FLAGS_SPOOF_IP);
1724 adx 30 } '=' auth_flags_items ';';
1725    
1726     auth_flags_items: auth_flags_items ',' auth_flags_item | auth_flags_item;
1727 michael 1228 auth_flags_item: SPOOF_NOTICE
1728 adx 30 {
1729 michael 967 if (conf_parser_ctx.pass == 2)
1730 michael 1646 block_state.flags.value |= CONF_FLAGS_SPOOF_NOTICE;
1731 adx 30 } | EXCEED_LIMIT
1732     {
1733 michael 967 if (conf_parser_ctx.pass == 2)
1734 michael 1646 block_state.flags.value |= CONF_FLAGS_NOLIMIT;
1735 adx 30 } | KLINE_EXEMPT
1736     {
1737 michael 967 if (conf_parser_ctx.pass == 2)
1738 michael 1646 block_state.flags.value |= CONF_FLAGS_EXEMPTKLINE;
1739 adx 30 } | NEED_IDENT
1740     {
1741 michael 967 if (conf_parser_ctx.pass == 2)
1742 michael 1646 block_state.flags.value |= CONF_FLAGS_NEED_IDENTD;
1743 adx 30 } | CAN_FLOOD
1744     {
1745 michael 967 if (conf_parser_ctx.pass == 2)
1746 michael 1646 block_state.flags.value |= CONF_FLAGS_CAN_FLOOD;
1747 adx 30 } | NO_TILDE
1748     {
1749 michael 967 if (conf_parser_ctx.pass == 2)
1750 michael 1646 block_state.flags.value |= CONF_FLAGS_NO_TILDE;
1751 adx 30 } | GLINE_EXEMPT
1752     {
1753 michael 967 if (conf_parser_ctx.pass == 2)
1754 michael 1646 block_state.flags.value |= CONF_FLAGS_EXEMPTGLINE;
1755 adx 30 } | RESV_EXEMPT
1756     {
1757 michael 967 if (conf_parser_ctx.pass == 2)
1758 michael 1646 block_state.flags.value |= CONF_FLAGS_EXEMPTRESV;
1759 michael 1715 } | T_WEBIRC
1760     {
1761     if (conf_parser_ctx.pass == 2)
1762     block_state.flags.value |= CONF_FLAGS_WEBIRC;
1763 adx 30 } | NEED_PASSWORD
1764     {
1765 michael 967 if (conf_parser_ctx.pass == 2)
1766 michael 1646 block_state.flags.value |= CONF_FLAGS_NEED_PASSWORD;
1767 adx 30 };
1768    
1769 michael 2916 auth_spoof: SPOOF '=' QSTRING ';'
1770 adx 30 {
1771 michael 1646 if (conf_parser_ctx.pass != 2)
1772     break;
1773    
1774 michael 3441 if (valid_hostname(yylval.string))
1775 adx 30 {
1776 michael 1646 strlcpy(block_state.name.buf, yylval.string, sizeof(block_state.name.buf));
1777     block_state.flags.value |= CONF_FLAGS_SPOOF_IP;
1778 adx 30 }
1779 michael 1646 else
1780     ilog(LOG_TYPE_IRCD, "Spoof either is too long or contains invalid characters. Ignoring it.");
1781 adx 30 };
1782    
1783     auth_redir_serv: REDIRSERV '=' QSTRING ';'
1784     {
1785 michael 1646 if (conf_parser_ctx.pass != 2)
1786     break;
1787    
1788     strlcpy(block_state.name.buf, yylval.string, sizeof(block_state.name.buf));
1789     block_state.flags.value |= CONF_FLAGS_REDIR;
1790 adx 30 };
1791    
1792     auth_redir_port: REDIRPORT '=' NUMBER ';'
1793     {
1794 michael 1646 if (conf_parser_ctx.pass != 2)
1795     break;
1796 michael 1647
1797 michael 1646 block_state.flags.value |= CONF_FLAGS_REDIR;
1798     block_state.port.value = $3;
1799 adx 30 };
1800    
1801    
1802     /***************************************************************************
1803     * section resv
1804     ***************************************************************************/
1805     resv_entry: RESV
1806     {
1807 michael 1647 if (conf_parser_ctx.pass != 2)
1808     break;
1809 adx 30
1810 michael 1647 reset_block_state();
1811     strlcpy(block_state.rpass.buf, CONF_NOREASON, sizeof(block_state.rpass.buf));
1812 michael 1823 } '{' resv_items '}' ';'
1813     {
1814 michael 1858 if (conf_parser_ctx.pass != 2)
1815     break;
1816    
1817     create_resv(block_state.name.buf, block_state.rpass.buf, &block_state.mask.list);
1818 michael 1823 };
1819 michael 1647
1820 michael 3439 resv_items: resv_items resv_item | resv_item;
1821     resv_item: resv_mask | resv_reason | resv_exempt | error ';' ;
1822 adx 30
1823 michael 1858 resv_mask: MASK '=' QSTRING ';'
1824 adx 30 {
1825 michael 967 if (conf_parser_ctx.pass == 2)
1826 michael 1858 strlcpy(block_state.name.buf, yylval.string, sizeof(block_state.name.buf));
1827 adx 30 };
1828    
1829 michael 1858 resv_reason: REASON '=' QSTRING ';'
1830 adx 30 {
1831 michael 1823 if (conf_parser_ctx.pass == 2)
1832 michael 1858 strlcpy(block_state.rpass.buf, yylval.string, sizeof(block_state.rpass.buf));
1833 adx 30 };
1834    
1835 michael 1858 resv_exempt: EXEMPT '=' QSTRING ';'
1836 adx 30 {
1837 michael 967 if (conf_parser_ctx.pass == 2)
1838 michael 1858 dlinkAdd(xstrdup(yylval.string), make_dlink_node(), &block_state.mask.list);
1839 adx 30 };
1840    
1841 michael 1858
1842 adx 30 /***************************************************************************
1843 michael 1157 * section service
1844     ***************************************************************************/
1845     service_entry: T_SERVICE '{' service_items '}' ';';
1846    
1847     service_items: service_items service_item | service_item;
1848     service_item: service_name | error;
1849    
1850     service_name: NAME '=' QSTRING ';'
1851     {
1852 michael 2129 if (conf_parser_ctx.pass != 2)
1853     break;
1854    
1855     if (valid_servname(yylval.string))
1856 michael 1157 {
1857 michael 2129 struct MaskItem *conf = conf_make(CONF_SERVICE);
1858     conf->name = xstrdup(yylval.string);
1859 michael 1157 }
1860     };
1861    
1862     /***************************************************************************
1863 adx 30 * section shared, for sharing remote klines etc.
1864     ***************************************************************************/
1865     shared_entry: T_SHARED
1866     {
1867 michael 1647 if (conf_parser_ctx.pass != 2)
1868     break;
1869    
1870     reset_block_state();
1871    
1872     strlcpy(block_state.name.buf, "*", sizeof(block_state.name.buf));
1873     strlcpy(block_state.user.buf, "*", sizeof(block_state.user.buf));
1874     strlcpy(block_state.host.buf, "*", sizeof(block_state.host.buf));
1875     block_state.flags.value = SHARED_ALL;
1876 adx 30 } '{' shared_items '}' ';'
1877     {
1878 michael 1647 struct MaskItem *conf = NULL;
1879    
1880     if (conf_parser_ctx.pass != 2)
1881     break;
1882    
1883     conf = conf_make(CONF_ULINE);
1884     conf->flags = block_state.flags.value;
1885     conf->name = xstrdup(block_state.name.buf);
1886     conf->user = xstrdup(block_state.user.buf);
1887 michael 1911 conf->host = xstrdup(block_state.host.buf);
1888 adx 30 };
1889    
1890     shared_items: shared_items shared_item | shared_item;
1891     shared_item: shared_name | shared_user | shared_type | error ';' ;
1892    
1893     shared_name: NAME '=' QSTRING ';'
1894     {
1895 michael 967 if (conf_parser_ctx.pass == 2)
1896 michael 1647 strlcpy(block_state.name.buf, yylval.string, sizeof(block_state.name.buf));
1897 adx 30 };
1898    
1899     shared_user: USER '=' QSTRING ';'
1900     {
1901 michael 967 if (conf_parser_ctx.pass == 2)
1902 adx 30 {
1903 michael 593 struct split_nuh_item nuh;
1904    
1905     nuh.nuhmask = yylval.string;
1906     nuh.nickptr = NULL;
1907 michael 1647 nuh.userptr = block_state.user.buf;
1908     nuh.hostptr = block_state.host.buf;
1909 michael 593
1910     nuh.nicksize = 0;
1911 michael 1647 nuh.usersize = sizeof(block_state.user.buf);
1912     nuh.hostsize = sizeof(block_state.host.buf);
1913 michael 593
1914     split_nuh(&nuh);
1915 adx 30 }
1916     };
1917    
1918     shared_type: TYPE
1919     {
1920 michael 967 if (conf_parser_ctx.pass == 2)
1921 michael 1647 block_state.flags.value = 0;
1922 adx 30 } '=' shared_types ';' ;
1923    
1924     shared_types: shared_types ',' shared_type_item | shared_type_item;
1925     shared_type_item: KLINE
1926     {
1927 michael 967 if (conf_parser_ctx.pass == 2)
1928 michael 1647 block_state.flags.value |= SHARED_KLINE;
1929 michael 1301 } | UNKLINE
1930 adx 30 {
1931 michael 967 if (conf_parser_ctx.pass == 2)
1932 michael 1647 block_state.flags.value |= SHARED_UNKLINE;
1933 michael 1301 } | T_DLINE
1934 adx 30 {
1935 michael 967 if (conf_parser_ctx.pass == 2)
1936 michael 1647 block_state.flags.value |= SHARED_DLINE;
1937 michael 1301 } | T_UNDLINE
1938     {
1939     if (conf_parser_ctx.pass == 2)
1940 michael 1647 block_state.flags.value |= SHARED_UNDLINE;
1941 adx 30 } | XLINE
1942     {
1943 michael 967 if (conf_parser_ctx.pass == 2)
1944 michael 1647 block_state.flags.value |= SHARED_XLINE;
1945 adx 30 } | T_UNXLINE
1946     {
1947 michael 967 if (conf_parser_ctx.pass == 2)
1948 michael 1647 block_state.flags.value |= SHARED_UNXLINE;
1949 adx 30 } | RESV
1950     {
1951 michael 967 if (conf_parser_ctx.pass == 2)
1952 michael 1647 block_state.flags.value |= SHARED_RESV;
1953 adx 30 } | T_UNRESV
1954     {
1955 michael 967 if (conf_parser_ctx.pass == 2)
1956 michael 1647 block_state.flags.value |= SHARED_UNRESV;
1957 adx 30 } | T_LOCOPS
1958     {
1959 michael 967 if (conf_parser_ctx.pass == 2)
1960 michael 1647 block_state.flags.value |= SHARED_LOCOPS;
1961 adx 30 } | T_ALL
1962     {
1963 michael 967 if (conf_parser_ctx.pass == 2)
1964 michael 1647 block_state.flags.value = SHARED_ALL;
1965 adx 30 };
1966    
1967     /***************************************************************************
1968     * section cluster
1969     ***************************************************************************/
1970     cluster_entry: T_CLUSTER
1971     {
1972 michael 1647 if (conf_parser_ctx.pass != 2)
1973     break;
1974    
1975     reset_block_state();
1976    
1977     strlcpy(block_state.name.buf, "*", sizeof(block_state.name.buf));
1978     block_state.flags.value = SHARED_ALL;
1979 adx 30 } '{' cluster_items '}' ';'
1980     {
1981 michael 1647 struct MaskItem *conf = NULL;
1982    
1983     if (conf_parser_ctx.pass != 2)
1984     break;
1985    
1986     conf = conf_make(CONF_CLUSTER);
1987     conf->flags = block_state.flags.value;
1988     conf->name = xstrdup(block_state.name.buf);
1989 adx 30 };
1990    
1991 michael 3439 cluster_items: cluster_items cluster_item | cluster_item;
1992     cluster_item: cluster_name | cluster_type | error ';' ;
1993 adx 30
1994     cluster_name: NAME '=' QSTRING ';'
1995     {
1996 michael 967 if (conf_parser_ctx.pass == 2)
1997 michael 1647 strlcpy(block_state.name.buf, yylval.string, sizeof(block_state.name.buf));
1998 adx 30 };
1999    
2000     cluster_type: TYPE
2001     {
2002 michael 967 if (conf_parser_ctx.pass == 2)
2003 michael 1647 block_state.flags.value = 0;
2004 adx 30 } '=' cluster_types ';' ;
2005    
2006 michael 3439 cluster_types: cluster_types ',' cluster_type_item | cluster_type_item;
2007 adx 30 cluster_type_item: KLINE
2008     {
2009 michael 967 if (conf_parser_ctx.pass == 2)
2010 michael 1647 block_state.flags.value |= SHARED_KLINE;
2011 michael 1301 } | UNKLINE
2012 adx 30 {
2013 michael 967 if (conf_parser_ctx.pass == 2)
2014 michael 1647 block_state.flags.value |= SHARED_UNKLINE;
2015 michael 1301 } | T_DLINE
2016 adx 30 {
2017 michael 967 if (conf_parser_ctx.pass == 2)
2018 michael 1647 block_state.flags.value |= SHARED_DLINE;
2019 michael 1301 } | T_UNDLINE
2020     {
2021     if (conf_parser_ctx.pass == 2)
2022 michael 1647 block_state.flags.value |= SHARED_UNDLINE;
2023 adx 30 } | XLINE
2024     {
2025 michael 967 if (conf_parser_ctx.pass == 2)
2026 michael 1647 block_state.flags.value |= SHARED_XLINE;
2027 adx 30 } | T_UNXLINE
2028     {
2029 michael 967 if (conf_parser_ctx.pass == 2)
2030 michael 1647 block_state.flags.value |= SHARED_UNXLINE;
2031 adx 30 } | RESV
2032     {
2033 michael 967 if (conf_parser_ctx.pass == 2)
2034 michael 1647 block_state.flags.value |= SHARED_RESV;
2035 adx 30 } | T_UNRESV
2036     {
2037 michael 967 if (conf_parser_ctx.pass == 2)
2038 michael 1647 block_state.flags.value |= SHARED_UNRESV;
2039 adx 30 } | T_LOCOPS
2040     {
2041 michael 967 if (conf_parser_ctx.pass == 2)
2042 michael 1647 block_state.flags.value |= SHARED_LOCOPS;
2043 adx 30 } | T_ALL
2044     {
2045 michael 967 if (conf_parser_ctx.pass == 2)
2046 michael 1647 block_state.flags.value = SHARED_ALL;
2047 adx 30 };
2048    
2049     /***************************************************************************
2050     * section connect
2051     ***************************************************************************/
2052 michael 2916 connect_entry: CONNECT
2053 adx 30 {
2054 michael 1265
2055 michael 1647 if (conf_parser_ctx.pass != 2)
2056     break;
2057    
2058     reset_block_state();
2059 michael 2397 block_state.aftype.value = AF_INET;
2060 michael 1647 block_state.port.value = PORTNUM;
2061 michael 1285 } '{' connect_items '}' ';'
2062 adx 30 {
2063 michael 1647 struct MaskItem *conf = NULL;
2064     struct addrinfo hints, *res;
2065    
2066     if (conf_parser_ctx.pass != 2)
2067     break;
2068    
2069 michael 1648 if (!block_state.name.buf[0] ||
2070     !block_state.host.buf[0])
2071 michael 1647 break;
2072    
2073 michael 2126 if (!block_state.rpass.buf[0] ||
2074     !block_state.spass.buf[0])
2075 michael 1647 break;
2076    
2077     if (has_wildcards(block_state.name.buf) ||
2078     has_wildcards(block_state.host.buf))
2079     break;
2080    
2081     conf = conf_make(CONF_SERVER);
2082     conf->port = block_state.port.value;
2083     conf->flags = block_state.flags.value;
2084     conf->aftype = block_state.aftype.value;
2085     conf->host = xstrdup(block_state.host.buf);
2086     conf->name = xstrdup(block_state.name.buf);
2087     conf->passwd = xstrdup(block_state.rpass.buf);
2088     conf->spasswd = xstrdup(block_state.spass.buf);
2089 michael 2228
2090     if (block_state.cert.buf[0])
2091     conf->certfp = xstrdup(block_state.cert.buf);
2092    
2093 michael 2252 if (block_state.ciph.buf[0])
2094     conf->cipher_list = xstrdup(block_state.ciph.buf);
2095 michael 1647
2096     dlinkMoveList(&block_state.leaf.list, &conf->leaf_list);
2097     dlinkMoveList(&block_state.hub.list, &conf->hub_list);
2098    
2099     if (block_state.bind.buf[0])
2100 adx 30 {
2101 michael 1647 memset(&hints, 0, sizeof(hints));
2102    
2103     hints.ai_family = AF_UNSPEC;
2104     hints.ai_socktype = SOCK_STREAM;
2105     hints.ai_flags = AI_PASSIVE | AI_NUMERICHOST;
2106    
2107     if (getaddrinfo(block_state.bind.buf, NULL, &hints, &res))
2108     ilog(LOG_TYPE_IRCD, "Invalid netmask for server vhost(%s)", block_state.bind.buf);
2109 michael 1302 else
2110     {
2111 michael 3443 assert(res);
2112 adx 30
2113 michael 1647 memcpy(&conf->bind, res->ai_addr, res->ai_addrlen);
2114     conf->bind.ss.ss_family = res->ai_family;
2115     conf->bind.ss_len = res->ai_addrlen;
2116     freeaddrinfo(res);
2117 michael 1302 }
2118 michael 1647 }
2119 adx 30
2120 michael 1647 conf_add_class_to_conf(conf, block_state.class.buf);
2121     lookup_confhost(conf);
2122 adx 30 };
2123    
2124     connect_items: connect_items connect_item | connect_item;
2125 michael 3439 connect_item: connect_name |
2126     connect_host |
2127     connect_vhost |
2128     connect_send_password |
2129     connect_accept_password |
2130     connect_ssl_certificate_fingerprint |
2131     connect_aftype |
2132     connect_port |
2133     connect_ssl_cipher_list |
2134     connect_flags |
2135     connect_hub_mask |
2136     connect_leaf_mask |
2137     connect_class |
2138     connect_encrypted |
2139 michael 1076 error ';' ;
2140 adx 30
2141     connect_name: NAME '=' QSTRING ';'
2142     {
2143 michael 967 if (conf_parser_ctx.pass == 2)
2144 michael 1647 strlcpy(block_state.name.buf, yylval.string, sizeof(block_state.name.buf));
2145 adx 30 };
2146    
2147 michael 2916 connect_host: HOST '=' QSTRING ';'
2148 adx 30 {
2149 michael 967 if (conf_parser_ctx.pass == 2)
2150 michael 1647 strlcpy(block_state.host.buf, yylval.string, sizeof(block_state.host.buf));
2151 adx 30 };
2152    
2153 michael 2916 connect_vhost: VHOST '=' QSTRING ';'
2154 adx 30 {
2155 michael 967 if (conf_parser_ctx.pass == 2)
2156 michael 1647 strlcpy(block_state.bind.buf, yylval.string, sizeof(block_state.bind.buf));
2157 adx 30 };
2158 michael 2916
2159 adx 30 connect_send_password: SEND_PASSWORD '=' QSTRING ';'
2160     {
2161 michael 1647 if (conf_parser_ctx.pass != 2)
2162     break;
2163 adx 30
2164 michael 1647 if ($3[0] == ':')
2165 michael 1752 conf_error_report("Server passwords cannot begin with a colon");
2166 michael 3443 else if (strchr($3, ' '))
2167 michael 1752 conf_error_report("Server passwords cannot contain spaces");
2168 michael 1647 else
2169     strlcpy(block_state.spass.buf, yylval.string, sizeof(block_state.spass.buf));
2170 adx 30 };
2171    
2172     connect_accept_password: ACCEPT_PASSWORD '=' QSTRING ';'
2173     {
2174 michael 1647 if (conf_parser_ctx.pass != 2)
2175     break;
2176 adx 30
2177 michael 1647 if ($3[0] == ':')
2178 michael 1752 conf_error_report("Server passwords cannot begin with a colon");
2179 michael 3443 else if (strchr($3, ' '))
2180 michael 1752 conf_error_report("Server passwords cannot contain spaces");
2181 michael 1647 else
2182     strlcpy(block_state.rpass.buf, yylval.string, sizeof(block_state.rpass.buf));
2183 adx 30 };
2184    
2185 michael 2244 connect_ssl_certificate_fingerprint: SSL_CERTIFICATE_FINGERPRINT '=' QSTRING ';'
2186 michael 2228 {
2187     if (conf_parser_ctx.pass == 2)
2188 michael 2229 strlcpy(block_state.cert.buf, yylval.string, sizeof(block_state.cert.buf));
2189 michael 2228 };
2190    
2191 adx 30 connect_port: PORT '=' NUMBER ';'
2192     {
2193 michael 967 if (conf_parser_ctx.pass == 2)
2194 michael 1647 block_state.port.value = $3;
2195 adx 30 };
2196    
2197     connect_aftype: AFTYPE '=' T_IPV4 ';'
2198     {
2199 michael 967 if (conf_parser_ctx.pass == 2)
2200 michael 1647 block_state.aftype.value = AF_INET;
2201 adx 30 } | AFTYPE '=' T_IPV6 ';'
2202     {
2203     #ifdef IPV6
2204 michael 967 if (conf_parser_ctx.pass == 2)
2205 michael 1647 block_state.aftype.value = AF_INET6;
2206 adx 30 #endif
2207     };
2208    
2209     connect_flags: IRCD_FLAGS
2210     {
2211 michael 1648 block_state.flags.value &= CONF_FLAGS_ENCRYPTED;
2212 adx 30 } '=' connect_flags_items ';';
2213    
2214     connect_flags_items: connect_flags_items ',' connect_flags_item | connect_flags_item;
2215 michael 1302 connect_flags_item: AUTOCONN
2216 adx 30 {
2217 michael 967 if (conf_parser_ctx.pass == 2)
2218 michael 1647 block_state.flags.value |= CONF_FLAGS_ALLOW_AUTO_CONN;
2219 michael 1303 } | T_SSL
2220     {
2221     if (conf_parser_ctx.pass == 2)
2222 michael 1647 block_state.flags.value |= CONF_FLAGS_SSL;
2223 michael 1228 };
2224 adx 30
2225     connect_encrypted: ENCRYPTED '=' TBOOL ';'
2226     {
2227 michael 967 if (conf_parser_ctx.pass == 2)
2228 adx 30 {
2229     if (yylval.number)
2230 michael 1647 block_state.flags.value |= CONF_FLAGS_ENCRYPTED;
2231 adx 30 else
2232 michael 1647 block_state.flags.value &= ~CONF_FLAGS_ENCRYPTED;
2233 adx 30 }
2234     };
2235    
2236 michael 2916 connect_hub_mask: HUB_MASK '=' QSTRING ';'
2237 adx 30 {
2238 michael 967 if (conf_parser_ctx.pass == 2)
2239 michael 1647 dlinkAdd(xstrdup(yylval.string), make_dlink_node(), &block_state.hub.list);
2240 adx 30 };
2241    
2242 michael 2916 connect_leaf_mask: LEAF_MASK '=' QSTRING ';'
2243 adx 30 {
2244 michael 967 if (conf_parser_ctx.pass == 2)
2245 michael 1647 dlinkAdd(xstrdup(yylval.string), make_dlink_node(), &block_state.leaf.list);
2246 adx 30 };
2247    
2248     connect_class: CLASS '=' QSTRING ';'
2249     {
2250 michael 967 if (conf_parser_ctx.pass == 2)
2251 michael 1647 strlcpy(block_state.class.buf, yylval.string, sizeof(block_state.class.buf));
2252 adx 30 };
2253    
2254 michael 1306 connect_ssl_cipher_list: T_SSL_CIPHER_LIST '=' QSTRING ';'
2255     {
2256     #ifdef HAVE_LIBCRYPTO
2257     if (conf_parser_ctx.pass == 2)
2258 michael 1647 strlcpy(block_state.ciph.buf, yylval.string, sizeof(block_state.ciph.buf));
2259 michael 1306 #else
2260     if (conf_parser_ctx.pass == 2)
2261 michael 1752 conf_error_report("Ignoring connect::ciphers -- no OpenSSL support");
2262 michael 1306 #endif
2263     };
2264    
2265    
2266 adx 30 /***************************************************************************
2267     * section kill
2268     ***************************************************************************/
2269     kill_entry: KILL
2270     {
2271 michael 967 if (conf_parser_ctx.pass == 2)
2272 michael 1647 reset_block_state();
2273 adx 30 } '{' kill_items '}' ';'
2274     {
2275 michael 1647 struct MaskItem *conf = NULL;
2276    
2277     if (conf_parser_ctx.pass != 2)
2278     break;
2279    
2280     if (!block_state.user.buf[0] ||
2281     !block_state.host.buf[0])
2282     break;
2283    
2284 michael 1921 conf = conf_make(CONF_KLINE);
2285     conf->user = xstrdup(block_state.user.buf);
2286     conf->host = xstrdup(block_state.host.buf);
2287 michael 1647
2288 michael 1921 if (block_state.rpass.buf[0])
2289     conf->reason = xstrdup(block_state.rpass.buf);
2290 michael 1647 else
2291 michael 1921 conf->reason = xstrdup(CONF_NOREASON);
2292     add_conf_by_address(CONF_KLINE, conf);
2293 michael 2916 };
2294 adx 30
2295     kill_items: kill_items kill_item | kill_item;
2296 michael 1921 kill_item: kill_user | kill_reason | error;
2297 adx 30
2298     kill_user: USER '=' QSTRING ';'
2299     {
2300 michael 1647
2301 michael 967 if (conf_parser_ctx.pass == 2)
2302 adx 30 {
2303 michael 593 struct split_nuh_item nuh;
2304 adx 30
2305 michael 593 nuh.nuhmask = yylval.string;
2306     nuh.nickptr = NULL;
2307 michael 1647 nuh.userptr = block_state.user.buf;
2308     nuh.hostptr = block_state.host.buf;
2309 adx 30
2310 michael 593 nuh.nicksize = 0;
2311 michael 1647 nuh.usersize = sizeof(block_state.user.buf);
2312     nuh.hostsize = sizeof(block_state.host.buf);
2313 adx 30
2314 michael 593 split_nuh(&nuh);
2315 adx 30 }
2316     };
2317    
2318 michael 2916 kill_reason: REASON '=' QSTRING ';'
2319 adx 30 {
2320 michael 967 if (conf_parser_ctx.pass == 2)
2321 michael 1647 strlcpy(block_state.rpass.buf, yylval.string, sizeof(block_state.rpass.buf));
2322 adx 30 };
2323    
2324     /***************************************************************************
2325     * section deny
2326     ***************************************************************************/
2327 michael 2916 deny_entry: DENY
2328 adx 30 {
2329 michael 967 if (conf_parser_ctx.pass == 2)
2330 michael 1646 reset_block_state();
2331 adx 30 } '{' deny_items '}' ';'
2332     {
2333 michael 1646 struct MaskItem *conf = NULL;
2334    
2335     if (conf_parser_ctx.pass != 2)
2336     break;
2337    
2338     if (!block_state.addr.buf[0])
2339     break;
2340    
2341     if (parse_netmask(block_state.addr.buf, NULL, NULL) != HM_HOST)
2342 adx 30 {
2343 michael 1646 conf = conf_make(CONF_DLINE);
2344     conf->host = xstrdup(block_state.addr.buf);
2345 michael 1005
2346 michael 1647 if (block_state.rpass.buf[0])
2347     conf->reason = xstrdup(block_state.rpass.buf);
2348 michael 1646 else
2349     conf->reason = xstrdup(CONF_NOREASON);
2350     add_conf_by_address(CONF_DLINE, conf);
2351 adx 30 }
2352 michael 2916 };
2353 adx 30
2354     deny_items: deny_items deny_item | deny_item;
2355     deny_item: deny_ip | deny_reason | error;
2356    
2357     deny_ip: IP '=' QSTRING ';'
2358     {
2359 michael 967 if (conf_parser_ctx.pass == 2)
2360 michael 1646 strlcpy(block_state.addr.buf, yylval.string, sizeof(block_state.addr.buf));
2361 adx 30 };
2362    
2363 michael 2916 deny_reason: REASON '=' QSTRING ';'
2364 adx 30 {
2365 michael 967 if (conf_parser_ctx.pass == 2)
2366 michael 1647 strlcpy(block_state.rpass.buf, yylval.string, sizeof(block_state.rpass.buf));
2367 adx 30 };
2368    
2369     /***************************************************************************
2370     * section exempt
2371     ***************************************************************************/
2372     exempt_entry: EXEMPT '{' exempt_items '}' ';';
2373    
2374     exempt_items: exempt_items exempt_item | exempt_item;
2375     exempt_item: exempt_ip | error;
2376    
2377     exempt_ip: IP '=' QSTRING ';'
2378     {
2379 michael 967 if (conf_parser_ctx.pass == 2)
2380 adx 30 {
2381     if (yylval.string[0] && parse_netmask(yylval.string, NULL, NULL) != HM_HOST)
2382     {
2383 michael 1646 struct MaskItem *conf = conf_make(CONF_EXEMPT);
2384     conf->host = xstrdup(yylval.string);
2385 adx 30
2386 michael 1646 add_conf_by_address(CONF_EXEMPT, conf);
2387 adx 30 }
2388     }
2389     };
2390    
2391     /***************************************************************************
2392     * section gecos
2393     ***************************************************************************/
2394     gecos_entry: GECOS
2395     {
2396 michael 967 if (conf_parser_ctx.pass == 2)
2397 michael 1646 reset_block_state();
2398 adx 30 } '{' gecos_items '}' ';'
2399     {
2400 michael 1646 struct MaskItem *conf = NULL;
2401    
2402     if (conf_parser_ctx.pass != 2)
2403     break;
2404    
2405     if (!block_state.name.buf[0])
2406     break;
2407    
2408 michael 1921 conf = conf_make(CONF_XLINE);
2409 michael 1646 conf->name = xstrdup(block_state.name.buf);
2410 adx 30
2411 michael 1647 if (block_state.rpass.buf[0])
2412     conf->reason = xstrdup(block_state.rpass.buf);
2413 michael 1646 else
2414     conf->reason = xstrdup(CONF_NOREASON);
2415 adx 30 };
2416    
2417     gecos_items: gecos_items gecos_item | gecos_item;
2418 michael 1921 gecos_item: gecos_name | gecos_reason | error;
2419 adx 30
2420 michael 2916 gecos_name: NAME '=' QSTRING ';'
2421 adx 30 {
2422 michael 967 if (conf_parser_ctx.pass == 2)
2423 michael 1646 strlcpy(block_state.name.buf, yylval.string, sizeof(block_state.name.buf));
2424 adx 30 };
2425    
2426 michael 2916 gecos_reason: REASON '=' QSTRING ';'
2427 adx 30 {
2428 michael 967 if (conf_parser_ctx.pass == 2)
2429 michael 1647 strlcpy(block_state.rpass.buf, yylval.string, sizeof(block_state.rpass.buf));
2430 adx 30 };
2431    
2432     /***************************************************************************
2433     * section general
2434     ***************************************************************************/
2435     general_entry: GENERAL
2436     '{' general_items '}' ';';
2437    
2438     general_items: general_items general_item | general_item;
2439 michael 3439 general_item: general_hide_spoof_ips |
2440     general_ignore_bogus_ts |
2441     general_failed_oper_notice |
2442     general_anti_nick_flood |
2443     general_max_nick_time |
2444     general_max_nick_changes |
2445     general_max_accept |
2446     general_anti_spam_exit_message_time |
2447     general_ts_warn_delta |
2448     general_ts_max_delta |
2449 michael 1549 general_kill_chase_time_limit |
2450     general_invisible_on_connect |
2451 michael 3473 general_warn_no_connect_block |
2452 michael 3439 general_dots_in_ident |
2453     general_stats_o_oper_only |
2454     general_stats_k_oper_only |
2455     general_pace_wait |
2456     general_stats_i_oper_only |
2457     general_pace_wait_simple |
2458     general_stats_P_oper_only |
2459 michael 2269 general_stats_u_oper_only |
2460 michael 3439 general_short_motd |
2461     general_no_oper_flood |
2462     general_true_no_oper_flood |
2463     general_oper_pass_resv |
2464     general_oper_only_umodes |
2465     general_max_targets |
2466     general_use_egd |
2467     general_egdpool_path |
2468     general_oper_umodes |
2469     general_caller_id_wait |
2470     general_opers_bypass_callerid |
2471     general_default_floodcount |
2472     general_min_nonwildcard |
2473     general_min_nonwildcard_simple |
2474     general_throttle_time |
2475     general_havent_read_conf |
2476 michael 1072 general_ping_cookie |
2477 michael 2916 general_disable_auth |
2478 michael 3439 general_tkline_expire_notices |
2479     general_gline_enable |
2480     general_gline_duration |
2481     general_gline_request_duration |
2482 michael 1459 general_gline_min_cidr |
2483 michael 1547 general_gline_min_cidr6 |
2484 michael 3439 general_stats_e_disabled |
2485     general_max_watch |
2486     general_services_name |
2487     general_cycle_on_host_change |
2488     error;
2489 adx 30
2490    
2491 michael 876 general_max_watch: MAX_WATCH '=' NUMBER ';'
2492     {
2493     ConfigFileEntry.max_watch = $3;
2494     };
2495 adx 30
2496 michael 2283 general_cycle_on_host_change: CYCLE_ON_HOST_CHANGE '=' TBOOL ';'
2497     {
2498     if (conf_parser_ctx.pass == 2)
2499     ConfigFileEntry.cycle_on_host_change = yylval.number;
2500     };
2501    
2502 michael 1459 general_gline_enable: GLINE_ENABLE '=' TBOOL ';'
2503     {
2504     if (conf_parser_ctx.pass == 2)
2505     ConfigFileEntry.glines = yylval.number;
2506     };
2507    
2508     general_gline_duration: GLINE_DURATION '=' timespec ';'
2509     {
2510     if (conf_parser_ctx.pass == 2)
2511     ConfigFileEntry.gline_time = $3;
2512     };
2513    
2514     general_gline_request_duration: GLINE_REQUEST_DURATION '=' timespec ';'
2515     {
2516     if (conf_parser_ctx.pass == 2)
2517     ConfigFileEntry.gline_request_time = $3;
2518     };
2519    
2520 adx 30 general_gline_min_cidr: GLINE_MIN_CIDR '=' NUMBER ';'
2521     {
2522     ConfigFileEntry.gline_min_cidr = $3;
2523     };
2524    
2525     general_gline_min_cidr6: GLINE_MIN_CIDR6 '=' NUMBER ';'
2526     {
2527     ConfigFileEntry.gline_min_cidr6 = $3;
2528     };
2529    
2530     general_tkline_expire_notices: TKLINE_EXPIRE_NOTICES '=' TBOOL ';'
2531     {
2532     ConfigFileEntry.tkline_expire_notices = yylval.number;
2533     };
2534    
2535 michael 1074 general_kill_chase_time_limit: KILL_CHASE_TIME_LIMIT '=' timespec ';'
2536 adx 30 {
2537     ConfigFileEntry.kill_chase_time_limit = $3;
2538     };
2539    
2540     general_hide_spoof_ips: HIDE_SPOOF_IPS '=' TBOOL ';'
2541     {
2542     ConfigFileEntry.hide_spoof_ips = yylval.number;
2543     };
2544    
2545     general_ignore_bogus_ts: IGNORE_BOGUS_TS '=' TBOOL ';'
2546     {
2547     ConfigFileEntry.ignore_bogus_ts = yylval.number;
2548     };
2549    
2550     general_failed_oper_notice: FAILED_OPER_NOTICE '=' TBOOL ';'
2551     {
2552     ConfigFileEntry.failed_oper_notice = yylval.number;
2553     };
2554    
2555     general_anti_nick_flood: ANTI_NICK_FLOOD '=' TBOOL ';'
2556     {
2557     ConfigFileEntry.anti_nick_flood = yylval.number;
2558     };
2559    
2560     general_max_nick_time: MAX_NICK_TIME '=' timespec ';'
2561     {
2562 michael 2916 ConfigFileEntry.max_nick_time = $3;
2563 adx 30 };
2564    
2565     general_max_nick_changes: MAX_NICK_CHANGES '=' NUMBER ';'
2566     {
2567     ConfigFileEntry.max_nick_changes = $3;
2568     };
2569    
2570     general_max_accept: MAX_ACCEPT '=' NUMBER ';'
2571     {
2572     ConfigFileEntry.max_accept = $3;
2573     };
2574    
2575     general_anti_spam_exit_message_time: ANTI_SPAM_EXIT_MESSAGE_TIME '=' timespec ';'
2576     {
2577     ConfigFileEntry.anti_spam_exit_message_time = $3;
2578     };
2579    
2580     general_ts_warn_delta: TS_WARN_DELTA '=' timespec ';'
2581     {
2582     ConfigFileEntry.ts_warn_delta = $3;
2583     };
2584    
2585     general_ts_max_delta: TS_MAX_DELTA '=' timespec ';'
2586     {
2587 michael 967 if (conf_parser_ctx.pass == 2)
2588 adx 30 ConfigFileEntry.ts_max_delta = $3;
2589     };
2590    
2591     general_havent_read_conf: HAVENT_READ_CONF '=' NUMBER ';'
2592     {
2593 michael 967 if (($3 > 0) && conf_parser_ctx.pass == 1)
2594 adx 30 {
2595 michael 1247 ilog(LOG_TYPE_IRCD, "You haven't read your config file properly.");
2596     ilog(LOG_TYPE_IRCD, "There is a line in the example conf that will kill your server if not removed.");
2597     ilog(LOG_TYPE_IRCD, "Consider actually reading/editing the conf file, and removing this line.");
2598 adx 30 exit(0);
2599     }
2600     };
2601    
2602     general_invisible_on_connect: INVISIBLE_ON_CONNECT '=' TBOOL ';'
2603     {
2604     ConfigFileEntry.invisible_on_connect = yylval.number;
2605     };
2606    
2607 michael 3473 general_warn_no_connect_block: WARN_NO_CONNECT_BLOCK '=' TBOOL ';'
2608 adx 30 {
2609 michael 3473 ConfigFileEntry.warn_no_connect_block = yylval.number;
2610 adx 30 };
2611    
2612 michael 584 general_stats_e_disabled: STATS_E_DISABLED '=' TBOOL ';'
2613     {
2614     ConfigFileEntry.stats_e_disabled = yylval.number;
2615     };
2616    
2617 adx 30 general_stats_o_oper_only: STATS_O_OPER_ONLY '=' TBOOL ';'
2618     {
2619     ConfigFileEntry.stats_o_oper_only = yylval.number;
2620     };
2621    
2622     general_stats_P_oper_only: STATS_P_OPER_ONLY '=' TBOOL ';'
2623     {
2624     ConfigFileEntry.stats_P_oper_only = yylval.number;
2625     };
2626    
2627 michael 2269 general_stats_u_oper_only: STATS_U_OPER_ONLY '=' TBOOL ';'
2628     {
2629     ConfigFileEntry.stats_u_oper_only = yylval.number;
2630     };
2631    
2632 adx 30 general_stats_k_oper_only: STATS_K_OPER_ONLY '=' TBOOL ';'
2633     {
2634     ConfigFileEntry.stats_k_oper_only = 2 * yylval.number;
2635     } | STATS_K_OPER_ONLY '=' TMASKED ';'
2636     {
2637     ConfigFileEntry.stats_k_oper_only = 1;
2638     };
2639    
2640     general_stats_i_oper_only: STATS_I_OPER_ONLY '=' TBOOL ';'
2641     {
2642     ConfigFileEntry.stats_i_oper_only = 2 * yylval.number;
2643     } | STATS_I_OPER_ONLY '=' TMASKED ';'
2644     {
2645     ConfigFileEntry.stats_i_oper_only = 1;
2646     };
2647    
2648     general_pace_wait: PACE_WAIT '=' timespec ';'
2649     {
2650     ConfigFileEntry.pace_wait = $3;
2651     };
2652    
2653     general_caller_id_wait: CALLER_ID_WAIT '=' timespec ';'
2654     {
2655     ConfigFileEntry.caller_id_wait = $3;
2656     };
2657    
2658     general_opers_bypass_callerid: OPERS_BYPASS_CALLERID '=' TBOOL ';'
2659     {
2660     ConfigFileEntry.opers_bypass_callerid = yylval.number;
2661     };
2662    
2663     general_pace_wait_simple: PACE_WAIT_SIMPLE '=' timespec ';'
2664     {
2665     ConfigFileEntry.pace_wait_simple = $3;
2666     };
2667    
2668     general_short_motd: SHORT_MOTD '=' TBOOL ';'
2669     {
2670     ConfigFileEntry.short_motd = yylval.number;
2671     };
2672 michael 2916
2673 adx 30 general_no_oper_flood: NO_OPER_FLOOD '=' TBOOL ';'
2674     {
2675     ConfigFileEntry.no_oper_flood = yylval.number;
2676     };
2677    
2678     general_true_no_oper_flood: TRUE_NO_OPER_FLOOD '=' TBOOL ';'
2679     {
2680     ConfigFileEntry.true_no_oper_flood = yylval.number;
2681     };
2682    
2683     general_oper_pass_resv: OPER_PASS_RESV '=' TBOOL ';'
2684     {
2685     ConfigFileEntry.oper_pass_resv = yylval.number;
2686     };
2687    
2688     general_dots_in_ident: DOTS_IN_IDENT '=' NUMBER ';'
2689     {
2690     ConfigFileEntry.dots_in_ident = $3;
2691     };
2692    
2693     general_max_targets: MAX_TARGETS '=' NUMBER ';'
2694     {
2695     ConfigFileEntry.max_targets = $3;
2696     };
2697    
2698     general_use_egd: USE_EGD '=' TBOOL ';'
2699     {
2700     ConfigFileEntry.use_egd = yylval.number;
2701     };
2702    
2703     general_egdpool_path: EGDPOOL_PATH '=' QSTRING ';'
2704     {
2705 michael 967 if (conf_parser_ctx.pass == 2)
2706 adx 30 {
2707     MyFree(ConfigFileEntry.egdpool_path);
2708 michael 1646 ConfigFileEntry.egdpool_path = xstrdup(yylval.string);
2709 adx 30 }
2710     };
2711    
2712 michael 1176 general_services_name: T_SERVICES_NAME '=' QSTRING ';'
2713 michael 1157 {
2714 michael 1176 if (conf_parser_ctx.pass == 2 && valid_servname(yylval.string))
2715 michael 1157 {
2716     MyFree(ConfigFileEntry.service_name);
2717 michael 1646 ConfigFileEntry.service_name = xstrdup(yylval.string);
2718 michael 1157 }
2719     };
2720    
2721 adx 30 general_ping_cookie: PING_COOKIE '=' TBOOL ';'
2722     {
2723     ConfigFileEntry.ping_cookie = yylval.number;
2724     };
2725    
2726     general_disable_auth: DISABLE_AUTH '=' TBOOL ';'
2727     {
2728     ConfigFileEntry.disable_auth = yylval.number;
2729     };
2730    
2731     general_throttle_time: THROTTLE_TIME '=' timespec ';'
2732     {
2733 michael 3435 ConfigFileEntry.throttle_time = $3;
2734 adx 30 };
2735    
2736     general_oper_umodes: OPER_UMODES
2737     {
2738     ConfigFileEntry.oper_umodes = 0;
2739     } '=' umode_oitems ';' ;
2740    
2741     umode_oitems: umode_oitems ',' umode_oitem | umode_oitem;
2742     umode_oitem: T_BOTS
2743     {
2744     ConfigFileEntry.oper_umodes |= UMODE_BOTS;
2745     } | T_CCONN
2746     {
2747     ConfigFileEntry.oper_umodes |= UMODE_CCONN;
2748     } | T_DEAF
2749     {
2750     ConfigFileEntry.oper_umodes |= UMODE_DEAF;
2751     } | T_DEBUG
2752     {
2753     ConfigFileEntry.oper_umodes |= UMODE_DEBUG;
2754     } | T_FULL
2755     {
2756     ConfigFileEntry.oper_umodes |= UMODE_FULL;
2757 michael 1294 } | HIDDEN
2758     {
2759     ConfigFileEntry.oper_umodes |= UMODE_HIDDEN;
2760 adx 30 } | T_SKILL
2761     {
2762     ConfigFileEntry.oper_umodes |= UMODE_SKILL;
2763     } | T_NCHANGE
2764     {
2765     ConfigFileEntry.oper_umodes |= UMODE_NCHANGE;
2766     } | T_REJ
2767     {
2768     ConfigFileEntry.oper_umodes |= UMODE_REJ;
2769     } | T_UNAUTH
2770     {
2771     ConfigFileEntry.oper_umodes |= UMODE_UNAUTH;
2772     } | T_SPY
2773     {
2774     ConfigFileEntry.oper_umodes |= UMODE_SPY;
2775     } | T_EXTERNAL
2776     {
2777     ConfigFileEntry.oper_umodes |= UMODE_EXTERNAL;
2778     } | T_OPERWALL
2779     {
2780     ConfigFileEntry.oper_umodes |= UMODE_OPERWALL;
2781     } | T_SERVNOTICE
2782     {
2783     ConfigFileEntry.oper_umodes |= UMODE_SERVNOTICE;
2784     } | T_INVISIBLE
2785     {
2786     ConfigFileEntry.oper_umodes |= UMODE_INVISIBLE;
2787     } | T_WALLOP
2788     {
2789     ConfigFileEntry.oper_umodes |= UMODE_WALLOP;
2790     } | T_SOFTCALLERID
2791     {
2792     ConfigFileEntry.oper_umodes |= UMODE_SOFTCALLERID;
2793     } | T_CALLERID
2794     {
2795     ConfigFileEntry.oper_umodes |= UMODE_CALLERID;
2796     } | T_LOCOPS
2797     {
2798     ConfigFileEntry.oper_umodes |= UMODE_LOCOPS;
2799 michael 1979 } | T_NONONREG
2800     {
2801     ConfigFileEntry.oper_umodes |= UMODE_REGONLY;
2802 michael 1976 } | T_FARCONNECT
2803     {
2804     ConfigFileEntry.oper_umodes |= UMODE_FARCONNECT;
2805 adx 30 };
2806    
2807 michael 2916 general_oper_only_umodes: OPER_ONLY_UMODES
2808 adx 30 {
2809     ConfigFileEntry.oper_only_umodes = 0;
2810     } '=' umode_items ';' ;
2811    
2812 michael 3439 umode_items: umode_items ',' umode_item | umode_item;
2813     umode_item: T_BOTS
2814 adx 30 {
2815     ConfigFileEntry.oper_only_umodes |= UMODE_BOTS;
2816     } | T_CCONN
2817     {
2818     ConfigFileEntry.oper_only_umodes |= UMODE_CCONN;
2819     } | T_DEAF
2820     {
2821     ConfigFileEntry.oper_only_umodes |= UMODE_DEAF;
2822     } | T_DEBUG
2823     {
2824     ConfigFileEntry.oper_only_umodes |= UMODE_DEBUG;
2825     } | T_FULL
2826 michael 2916 {
2827 adx 30 ConfigFileEntry.oper_only_umodes |= UMODE_FULL;
2828     } | T_SKILL
2829     {
2830     ConfigFileEntry.oper_only_umodes |= UMODE_SKILL;
2831 michael 1294 } | HIDDEN
2832     {
2833     ConfigFileEntry.oper_only_umodes |= UMODE_HIDDEN;
2834 adx 30 } | T_NCHANGE
2835     {
2836     ConfigFileEntry.oper_only_umodes |= UMODE_NCHANGE;
2837     } | T_REJ
2838     {
2839     ConfigFileEntry.oper_only_umodes |= UMODE_REJ;
2840     } | T_UNAUTH
2841     {
2842     ConfigFileEntry.oper_only_umodes |= UMODE_UNAUTH;
2843     } | T_SPY
2844     {
2845     ConfigFileEntry.oper_only_umodes |= UMODE_SPY;
2846     } | T_EXTERNAL
2847     {
2848     ConfigFileEntry.oper_only_umodes |= UMODE_EXTERNAL;
2849     } | T_OPERWALL
2850     {
2851     ConfigFileEntry.oper_only_umodes |= UMODE_OPERWALL;
2852     } | T_SERVNOTICE
2853     {
2854     ConfigFileEntry.oper_only_umodes |= UMODE_SERVNOTICE;
2855     } | T_INVISIBLE
2856     {
2857     ConfigFileEntry.oper_only_umodes |= UMODE_INVISIBLE;
2858     } | T_WALLOP
2859     {
2860     ConfigFileEntry.oper_only_umodes |= UMODE_WALLOP;
2861     } | T_SOFTCALLERID
2862     {
2863     ConfigFileEntry.oper_only_umodes |= UMODE_SOFTCALLERID;
2864     } | T_CALLERID
2865     {
2866     ConfigFileEntry.oper_only_umodes |= UMODE_CALLERID;
2867     } | T_LOCOPS
2868     {
2869     ConfigFileEntry.oper_only_umodes |= UMODE_LOCOPS;
2870 michael 1855 } | T_NONONREG
2871     {
2872     ConfigFileEntry.oper_only_umodes |= UMODE_REGONLY;
2873 michael 1976 } | T_FARCONNECT
2874     {
2875     ConfigFileEntry.oper_only_umodes |= UMODE_FARCONNECT;
2876 adx 30 };
2877    
2878     general_min_nonwildcard: MIN_NONWILDCARD '=' NUMBER ';'
2879     {
2880     ConfigFileEntry.min_nonwildcard = $3;
2881     };
2882    
2883     general_min_nonwildcard_simple: MIN_NONWILDCARD_SIMPLE '=' NUMBER ';'
2884     {
2885     ConfigFileEntry.min_nonwildcard_simple = $3;
2886     };
2887    
2888     general_default_floodcount: DEFAULT_FLOODCOUNT '=' NUMBER ';'
2889     {
2890     ConfigFileEntry.default_floodcount = $3;
2891     };
2892    
2893    
2894     /***************************************************************************
2895     * section channel
2896     ***************************************************************************/
2897     channel_entry: CHANNEL
2898     '{' channel_items '}' ';';
2899    
2900     channel_items: channel_items channel_item | channel_item;
2901 michael 1495 channel_item: channel_max_bans |
2902 michael 3439 channel_knock_delay |
2903     channel_knock_delay_channel |
2904     channel_max_chans_per_user |
2905     channel_max_chans_per_oper |
2906 michael 1946 channel_default_split_user_count |
2907 adx 201 channel_default_split_server_count |
2908 michael 1858 channel_no_create_on_split |
2909 michael 1401 channel_no_join_on_split |
2910 michael 3439 channel_jflood_count |
2911     channel_jflood_time |
2912     channel_disable_fake_channels |
2913     error;
2914 adx 30
2915 michael 632 channel_disable_fake_channels: DISABLE_FAKE_CHANNELS '=' TBOOL ';'
2916     {
2917     ConfigChannel.disable_fake_channels = yylval.number;
2918     };
2919    
2920 adx 30 channel_knock_delay: KNOCK_DELAY '=' timespec ';'
2921     {
2922     ConfigChannel.knock_delay = $3;
2923     };
2924    
2925     channel_knock_delay_channel: KNOCK_DELAY_CHANNEL '=' timespec ';'
2926     {
2927     ConfigChannel.knock_delay_channel = $3;
2928     };
2929    
2930     channel_max_chans_per_user: MAX_CHANS_PER_USER '=' NUMBER ';'
2931     {
2932     ConfigChannel.max_chans_per_user = $3;
2933     };
2934    
2935 michael 1432 channel_max_chans_per_oper: MAX_CHANS_PER_OPER '=' NUMBER ';'
2936     {
2937     ConfigChannel.max_chans_per_oper = $3;
2938     };
2939    
2940 adx 30 channel_max_bans: MAX_BANS '=' NUMBER ';'
2941     {
2942     ConfigChannel.max_bans = $3;
2943     };
2944    
2945     channel_default_split_user_count: DEFAULT_SPLIT_USER_COUNT '=' NUMBER ';'
2946     {
2947     ConfigChannel.default_split_user_count = $3;
2948     };
2949    
2950     channel_default_split_server_count: DEFAULT_SPLIT_SERVER_COUNT '=' NUMBER ';'
2951     {
2952     ConfigChannel.default_split_server_count = $3;
2953     };
2954    
2955     channel_no_create_on_split: NO_CREATE_ON_SPLIT '=' TBOOL ';'
2956     {
2957     ConfigChannel.no_create_on_split = yylval.number;
2958     };
2959    
2960     channel_no_join_on_split: NO_JOIN_ON_SPLIT '=' TBOOL ';'
2961     {
2962     ConfigChannel.no_join_on_split = yylval.number;
2963     };
2964    
2965     channel_jflood_count: JOIN_FLOOD_COUNT '=' NUMBER ';'
2966     {
2967     GlobalSetOptions.joinfloodcount = yylval.number;
2968     };
2969    
2970     channel_jflood_time: JOIN_FLOOD_TIME '=' timespec ';'
2971     {
2972 michael 3435 GlobalSetOptions.joinfloodtime = $3;
2973 adx 30 };
2974    
2975     /***************************************************************************
2976     * section serverhide
2977     ***************************************************************************/
2978     serverhide_entry: SERVERHIDE
2979     '{' serverhide_items '}' ';';
2980    
2981     serverhide_items: serverhide_items serverhide_item | serverhide_item;
2982 michael 3439 serverhide_item: serverhide_flatten_links |
2983     serverhide_disable_remote_commands |
2984 michael 2196 serverhide_hide_servers |
2985 michael 3439 serverhide_hide_services |
2986     serverhide_links_delay |
2987     serverhide_hidden |
2988     serverhide_hidden_name |
2989     serverhide_hide_server_ips |
2990 adx 30 error;
2991    
2992     serverhide_flatten_links: FLATTEN_LINKS '=' TBOOL ';'
2993     {
2994 michael 967 if (conf_parser_ctx.pass == 2)
2995 adx 30 ConfigServerHide.flatten_links = yylval.number;
2996     };
2997    
2998 michael 2196 serverhide_disable_remote_commands: DISABLE_REMOTE_COMMANDS '=' TBOOL ';'
2999     {
3000     if (conf_parser_ctx.pass == 2)
3001     ConfigServerHide.disable_remote_commands = yylval.number;
3002     };
3003    
3004 adx 30 serverhide_hide_servers: HIDE_SERVERS '=' TBOOL ';'
3005     {
3006 michael 967 if (conf_parser_ctx.pass == 2)
3007 adx 30 ConfigServerHide.hide_servers = yylval.number;
3008     };
3009    
3010 michael 1851 serverhide_hide_services: HIDE_SERVICES '=' TBOOL ';'
3011     {
3012     if (conf_parser_ctx.pass == 2)
3013     ConfigServerHide.hide_services = yylval.number;
3014     };
3015    
3016 adx 30 serverhide_hidden_name: HIDDEN_NAME '=' QSTRING ';'
3017     {
3018 michael 967 if (conf_parser_ctx.pass == 2)
3019 adx 30 {
3020     MyFree(ConfigServerHide.hidden_name);
3021 michael 1646 ConfigServerHide.hidden_name = xstrdup(yylval.string);
3022 adx 30 }
3023     };
3024    
3025     serverhide_links_delay: LINKS_DELAY '=' timespec ';'
3026     {
3027 michael 967 if (conf_parser_ctx.pass == 2)
3028 adx 30 {
3029     if (($3 > 0) && ConfigServerHide.links_disabled == 1)
3030     {
3031     eventAddIsh("write_links_file", write_links_file, NULL, $3);
3032     ConfigServerHide.links_disabled = 0;
3033     }
3034    
3035     ConfigServerHide.links_delay = $3;
3036     }
3037     };
3038    
3039     serverhide_hidden: HIDDEN '=' TBOOL ';'
3040     {
3041 michael 967 if (conf_parser_ctx.pass == 2)
3042 adx 30 ConfigServerHide.hidden = yylval.number;
3043     };
3044    
3045     serverhide_hide_server_ips: HIDE_SERVER_IPS '=' TBOOL ';'
3046     {
3047 michael 967 if (conf_parser_ctx.pass == 2)
3048 adx 30 ConfigServerHide.hide_server_ips = yylval.number;
3049     };

Properties

Name Value
svn:eol-style native
svn:keywords Id Revision