45 |
|
#include "rng_mt.h" |
46 |
|
#include "s_auth.h" |
47 |
|
#include "s_bsd.h" |
48 |
< |
#include "s_conf.h" |
49 |
< |
#include "s_log.h" |
48 |
> |
#include "conf.h" |
49 |
> |
#include "log.h" |
50 |
|
#include "s_misc.h" |
51 |
|
#include "s_serv.h" /* try_connections */ |
52 |
|
#include "send.h" |
72 |
|
struct admin_info AdminInfo = { NULL, NULL, NULL }; |
73 |
|
struct Counter Count = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 }; |
74 |
|
struct ServerState_t server_state = { 0 }; |
75 |
< |
struct logging_entry ConfigLoggingEntry = { 1, 1 }; |
75 |
> |
struct logging_entry ConfigLoggingEntry = { .use_logging = 1 }; |
76 |
|
struct ServerStatistics ServerStats; |
77 |
|
struct timeval SystemTime; |
78 |
|
struct Client me; /* That's me */ |
82 |
|
const char *pidFileName = PPATH; |
83 |
|
|
84 |
|
char **myargv; |
85 |
– |
char ircd_platform[PLATFORMLEN]; |
85 |
|
|
86 |
|
int dorehash = 0; |
87 |
|
int doremotd = 0; |
90 |
|
* initialize_server_capabs |
91 |
|
*/ |
92 |
|
int default_server_capabs = 0; |
94 |
– |
|
95 |
– |
#ifdef HAVE_LIBCRYPTO |
96 |
– |
int bio_spare_fd = -1; |
97 |
– |
#endif |
98 |
– |
|
93 |
|
unsigned int splitmode; |
94 |
|
unsigned int splitchecking; |
95 |
|
unsigned int split_users; |
141 |
|
|
142 |
|
static int printVersion = 0; |
143 |
|
|
144 |
< |
struct lgetopt myopts[] = { |
144 |
> |
static struct lgetopt myopts[] = { |
145 |
|
{"dlinefile", &ConfigFileEntry.dlinefile, |
146 |
|
STRING, "File to use for dline.conf"}, |
147 |
|
{"configfile", &ConfigFileEntry.configfile, |
298 |
|
initialize_message_files(void) |
299 |
|
{ |
300 |
|
init_message_file(USER_MOTD, MPATH, &ConfigFileEntry.motd); |
307 |
– |
init_message_file(OPER_MOTD, OPATH, &ConfigFileEntry.opermotd); |
301 |
|
init_message_file(USER_LINKS, LIPATH, &ConfigFileEntry.linksfile); |
302 |
|
|
303 |
|
read_message_file(&ConfigFileEntry.motd); |
311 |
– |
read_message_file(&ConfigFileEntry.opermotd); |
304 |
|
read_message_file(&ConfigFileEntry.linksfile); |
305 |
|
|
306 |
|
init_isupport(); |
317 |
|
add_capability("QS", CAP_QS, 1); |
318 |
|
add_capability("EOB", CAP_EOB, 1); |
319 |
|
add_capability("TS6", CAP_TS6, 0); |
328 |
– |
add_capability("ZIP", CAP_ZIP, 0); |
320 |
|
add_capability("CLUSTER", CAP_CLUSTER, 1); |
321 |
|
add_capability("SVS", CAP_SVS, 1); |
322 |
|
#ifdef HALFOPS |
333 |
|
static void |
334 |
|
write_pidfile(const char *filename) |
335 |
|
{ |
336 |
< |
FBFILE *fb; |
336 |
> |
FILE *fb; |
337 |
|
|
338 |
< |
if ((fb = fbopen(filename, "w"))) |
338 |
> |
if ((fb = fopen(filename, "w"))) |
339 |
|
{ |
340 |
|
char buff[32]; |
341 |
|
unsigned int pid = (unsigned int)getpid(); |
351 |
– |
size_t nbytes = snprintf(buff, sizeof(buff), "%u\n", pid); |
342 |
|
|
343 |
< |
if ((fbputs(buff, fb, nbytes) == -1)) |
343 |
> |
snprintf(buff, sizeof(buff), "%u\n", pid); |
344 |
> |
|
345 |
> |
if ((fputs(buff, fb) == -1)) |
346 |
|
ilog(LOG_TYPE_IRCD, "Error writing %u to pid file %s (%s)", |
347 |
|
pid, filename, strerror(errno)); |
348 |
|
|
349 |
< |
fbclose(fb); |
358 |
< |
return; |
349 |
> |
fclose(fb); |
350 |
|
} |
351 |
|
else |
352 |
|
{ |
365 |
|
static void |
366 |
|
check_pidfile(const char *filename) |
367 |
|
{ |
368 |
< |
FBFILE *fb; |
368 |
> |
FILE *fb; |
369 |
|
char buff[32]; |
370 |
|
pid_t pidfromfile; |
371 |
|
|
372 |
|
/* Don't do logging here, since we don't have log() initialised */ |
373 |
< |
if ((fb = fbopen(filename, "r"))) |
373 |
> |
if ((fb = fopen(filename, "r"))) |
374 |
|
{ |
375 |
< |
if (fbgets(buff, 20, fb) == NULL) |
375 |
> |
if (fgets(buff, 20, fb) == NULL) |
376 |
|
{ |
377 |
|
/* log(L_ERROR, "Error reading from pid file %s (%s)", filename, |
378 |
|
* strerror(errno)); |
390 |
|
} |
391 |
|
} |
392 |
|
|
393 |
< |
fbclose(fb); |
393 |
> |
fclose(fb); |
394 |
|
} |
395 |
|
else if (errno != ENOENT) |
396 |
|
{ |
437 |
|
{ |
438 |
|
const char *s; |
439 |
|
|
440 |
< |
fprintf(stderr, "ERROR: Could not initialize the SSL context -- %s\n", |
440 |
> |
fprintf(stderr, "ERROR: Could not initialize the SSL Server context -- %s\n", |
441 |
|
s = ERR_lib_error_string(ERR_get_error())); |
442 |
< |
ilog(LOG_TYPE_IRCD, "ERROR: Could not initialize the SSL context -- %s\n", s); |
442 |
> |
ilog(LOG_TYPE_IRCD, "ERROR: Could not initialize the SSL Server context -- %s\n", s); |
443 |
|
} |
444 |
|
|
445 |
< |
SSL_CTX_set_options(ServerInfo.server_ctx, SSL_OP_NO_SSLv2); |
445 |
> |
SSL_CTX_set_options(ServerInfo.server_ctx, SSL_OP_NO_SSLv2|SSL_OP_NO_SSLv3|SSL_OP_NO_TLSv1); |
446 |
|
SSL_CTX_set_options(ServerInfo.server_ctx, SSL_OP_TLS_ROLLBACK_BUG|SSL_OP_ALL); |
447 |
|
SSL_CTX_set_verify(ServerInfo.server_ctx, SSL_VERIFY_NONE, NULL); |
448 |
|
|
449 |
< |
bio_spare_fd = save_spare_fd("SSL private key validation"); |
449 |
> |
if ((ServerInfo.client_ctx = SSL_CTX_new(SSLv23_client_method())) == NULL) |
450 |
> |
{ |
451 |
> |
const char *s; |
452 |
> |
|
453 |
> |
fprintf(stderr, "ERROR: Could not initialize the SSL Client context -- %s\n", |
454 |
> |
s = ERR_lib_error_string(ERR_get_error())); |
455 |
> |
ilog(LOG_TYPE_IRCD, "ERROR: Could not initialize the SSL Client context -- %s\n", s); |
456 |
> |
} |
457 |
> |
|
458 |
> |
SSL_CTX_set_options(ServerInfo.client_ctx, SSL_OP_NO_SSLv2|SSL_OP_NO_SSLv3|SSL_OP_NO_TLSv1); |
459 |
> |
SSL_CTX_set_options(ServerInfo.client_ctx, SSL_OP_TLS_ROLLBACK_BUG|SSL_OP_ALL); |
460 |
> |
SSL_CTX_set_verify(ServerInfo.client_ctx, SSL_VERIFY_NONE, NULL); |
461 |
|
#endif /* HAVE_LIBCRYPTO */ |
462 |
|
} |
463 |
|
|
472 |
|
{ |
473 |
|
iorecv_cb = register_callback("iorecv", iorecv_default); |
474 |
|
iosend_cb = register_callback("iosend", iosend_default); |
473 |
– |
iorecvctrl_cb = register_callback("iorecvctrl", NULL); |
474 |
– |
iosendctrl_cb = register_callback("iosendctrl", NULL); |
475 |
|
} |
476 |
|
|
477 |
|
int |
508 |
|
ConfigFileEntry.rxlinefile = RXPATH; /* Server regex xline file */ |
509 |
|
ConfigFileEntry.rklinefile = RKPATH; /* Server regex kline file */ |
510 |
|
ConfigFileEntry.dlinefile = DLPATH; /* dline file */ |
511 |
– |
ConfigFileEntry.glinefile = GPATH; /* gline log file */ |
511 |
|
ConfigFileEntry.cresvfile = CRESVPATH; /* channel resv file */ |
512 |
|
ConfigFileEntry.nresvfile = NRESVPATH; /* nick resv file */ |
513 |
|
myargv = argv; |
539 |
|
|
540 |
|
setup_signals(); |
541 |
|
|
543 |
– |
get_ircd_platform(ircd_platform); |
544 |
– |
|
542 |
|
/* Init the event subsystem */ |
543 |
|
eventInit(); |
544 |
|
/* We need this to initialise the fd array before anything else */ |
557 |
|
init_hash(); |
558 |
|
init_ip_hash_table(); /* client host ip hash table */ |
559 |
|
init_host_hash(); /* Host-hashtable. */ |
563 |
– |
clear_tree_parse(); |
560 |
|
init_client(); |
561 |
|
init_class(); |
562 |
< |
init_whowas(); |
562 |
> |
whowas_init(); |
563 |
|
watch_init(); |
564 |
|
init_auth(); /* Initialise the auth code */ |
565 |
|
init_resolver(); /* Needs to be setup before the io loop */ |
566 |
+ |
modules_init(); |
567 |
|
read_conf_files(1); /* cold start init conf files */ |
568 |
|
init_uid(); |
569 |
|
initialize_server_capabs(); /* Set up default_server_capabs */ |
644 |
|
/* No, 'cause after a restart it would cause all sorts of nick collides */ |
645 |
|
eventAddIsh("try_connections", try_connections, NULL, STARTUP_CONNECTIONS_TIME); |
646 |
|
|
650 |
– |
eventAddIsh("collect_zipstats", collect_zipstats, NULL, ZIPSTATS_TIME); |
651 |
– |
|
647 |
|
/* Setup the timeout check. I'll shift it later :) -- adrian */ |
648 |
|
eventAddIsh("comm_checktimeouts", comm_checktimeouts, NULL, 1); |
649 |
|
|