4 /* needed to properly enable crypt() stuff on some systems */
6 /* needed for str[n]casecmp() on some systems if the above is defined */
7 #define _XOPEN_SOURCE_EXTENDED
8 /* needed to enable threads on some systems if the above are defined */
9 #define _POSIX_C_SOURCE 199506L
19 #include <sys/types.h>
31 #include "sysdep_decls.h"
39 #include "dynloader.h"
44 * getuser() - retrieve named user into supplied buffer.
45 * returns 0 on success
47 int getuser(struct usersupp *usbuf, char name[]) {
49 char lowercase_name[32];
51 struct cdbdata *cdbus;
53 memset(usbuf, 0, sizeof(struct usersupp));
54 for (a=0; a<=strlen(name); ++a) {
55 lowercase_name[a] = tolower(name[a]);
58 cdbus = cdb_fetch(CDB_USERSUPP, lowercase_name, strlen(lowercase_name));
60 return(1); /* user not found */
63 memcpy(usbuf, cdbus->ptr,
64 ( (cdbus->len > sizeof(struct usersupp)) ?
65 sizeof(struct usersupp) : cdbus->len) );
72 * lgetuser() - same as getuser() but locks the record
74 int lgetuser(struct usersupp *usbuf, char *name)
78 retcode = getuser(usbuf,name);
80 begin_critical_section(S_USERSUPP);
87 * putuser() - write user buffer into the correct place on disk
89 void putuser(struct usersupp *usbuf, char *name)
91 char lowercase_name[32];
94 for (a=0; a<=strlen(name); ++a) {
95 lowercase_name[a] = tolower(name[a]);
98 cdb_store(CDB_USERSUPP,
99 lowercase_name, strlen(lowercase_name),
100 usbuf, sizeof(struct usersupp));
106 * lputuser() - same as putuser() but locks the record
108 void lputuser(struct usersupp *usbuf, char *name) {
110 end_critical_section(S_USERSUPP);
114 * Index-generating function used by Ctdl[Get|Set]Relationship
116 int GenerateRelationshipIndex( char *IndexBuf,
127 TheIndex.iRoomID = RoomID;
128 TheIndex.iRoomGen = RoomGen;
129 TheIndex.iUserID = UserID;
131 memcpy(IndexBuf, &TheIndex, sizeof(TheIndex));
132 return(sizeof(TheIndex));
136 * Define a relationship between a user and a room
138 void CtdlSetRelationship(struct visit *newvisit,
139 struct usersupp *rel_user,
140 struct quickroom *rel_room) {
145 /* We don't use these in Citadel because they're implicit by the
146 * index, but they must be present if the database is exported.
148 newvisit->v_roomnum = rel_room->QRnumber;
149 newvisit->v_roomgen = rel_room->QRgen;
150 newvisit->v_usernum = rel_user->usernum;
152 /* Generate an index */
153 IndexLen = GenerateRelationshipIndex(IndexBuf,
158 /* Store the record */
159 cdb_store(CDB_VISIT, IndexBuf, IndexLen,
160 newvisit, sizeof(struct visit)
165 * Locate a relationship between a user and a room
167 void CtdlGetRelationship(struct visit *vbuf,
168 struct usersupp *rel_user,
169 struct quickroom *rel_room) {
173 struct cdbdata *cdbvisit;
175 /* Generate an index */
176 IndexLen = GenerateRelationshipIndex(IndexBuf,
181 /* Clear out the buffer */
182 memset(vbuf, 0, sizeof(struct visit));
184 cdbvisit = cdb_fetch(CDB_VISIT, IndexBuf, IndexLen);
185 if (cdbvisit != NULL) {
186 memcpy(vbuf, cdbvisit->ptr,
187 ( (cdbvisit->len > sizeof(struct visit)) ?
188 sizeof(struct visit) : cdbvisit->len) );
195 void MailboxName(char *buf, struct usersupp *who, char *prefix) {
196 sprintf(buf, "%010ld.%s", who->usernum, prefix);
201 * Is the user currently logged in an Aide?
204 if (CC->usersupp.axlevel >= 6) return(1);
210 * Is the user currently logged in an Aide *or* the room aide for this room?
212 int is_room_aide(void) {
213 if ( (CC->usersupp.axlevel >= 6)
214 || (CC->quickroom.QRroomaide == CC->usersupp.usernum) ) {
223 * getuserbynumber() - get user by number
224 * returns 0 if user was found
226 int getuserbynumber(struct usersupp *usbuf, long int number)
228 struct cdbdata *cdbus;
230 cdb_rewind(CDB_USERSUPP);
232 while(cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
233 memset(usbuf, 0, sizeof(struct usersupp));
234 memcpy(usbuf, cdbus->ptr,
235 ( (cdbus->len > sizeof(struct usersupp)) ?
236 sizeof(struct usersupp) : cdbus->len) );
238 if (usbuf->usernum == number) {
249 void cmd_user(char *cmdbuf)
257 extract(username,cmdbuf,0);
261 if ((CC->logged_in)) {
262 cprintf("%d Already logged in.\n",ERROR);
266 found_user = getuser(&CC->usersupp,username);
267 if (found_user != 0) {
268 p = (struct passwd *)getpwnam(username);
270 strcpy(autoname,p->pw_gecos);
271 for (a=0; a<strlen(autoname); ++a)
272 if (autoname[a]==',') autoname[a]=0;
273 found_user = getuser(&CC->usersupp,autoname);
276 if (found_user == 0) {
277 if (((CC->nologin)) && (CC->usersupp.axlevel < 6)) {
278 cprintf("%d %s: Too many users are already online (maximum is %d)\n",
279 ERROR+MAX_SESSIONS_EXCEEDED,
280 config.c_nodename,config.c_maxsessions);
283 strcpy(CC->curr_user,CC->usersupp.fullname);
284 cprintf("%d Password required for %s\n",
285 MORE_DATA,CC->curr_user);
289 cprintf("%d %s not found.\n",ERROR,username);
296 * session startup code which is common to both cmd_pass() and cmd_newu()
298 void session_startup(void) {
299 syslog(LOG_NOTICE,"user <%s> logged in",CC->curr_user);
301 lgetuser(&CC->usersupp,CC->curr_user);
302 ++(CC->usersupp.timescalled);
303 CC->fake_username[0] = '\0';
304 CC->fake_postname[0] = '\0';
305 CC->fake_hostname[0] = '\0';
306 CC->fake_roomname[0] = '\0';
307 time(&CC->usersupp.lastcall);
309 /* If this user's name is the name of the system administrator
310 * (as specified in setup), automatically assign access level 6.
312 if (!strcasecmp(CC->usersupp.fullname, config.c_sysadm)) {
313 CC->usersupp.axlevel = 6;
316 lputuser(&CC->usersupp,CC->curr_user);
318 /* Run any cleanup routines registered by loadable modules */
319 PerformSessionHooks(EVT_LOGIN);
321 cprintf("%d %s|%d|%d|%d|%u|%ld\n",OK,CC->usersupp.fullname,CC->usersupp.axlevel,
322 CC->usersupp.timescalled,CC->usersupp.posted,CC->usersupp.flags,
323 CC->usersupp.usernum);
324 usergoto(BASEROOM,0); /* Enter the lobby */
325 rec_log(CL_LOGIN,CC->curr_user);
330 * misc things to be taken care of when a user is logged out
332 void logout(struct CitContext *who)
335 if (who->download_fp != NULL) {
336 fclose(who->download_fp);
337 who->download_fp = NULL;
339 if (who->upload_fp != NULL) {
343 /* Do modular stuff... */
344 PerformSessionHooks(EVT_LOGOUT);
348 void cmd_pass(char *buf)
354 extract(password,buf,0);
356 if ((CC->logged_in)) {
357 cprintf("%d Already logged in.\n",ERROR);
360 if (!strcmp(CC->curr_user,"")) {
361 cprintf("%d You must send a name with USER first.\n",ERROR);
364 if (getuser(&CC->usersupp,CC->curr_user)) {
365 cprintf("%d Can't find user record!\n",ERROR+INTERNAL_ERROR);
370 if (CC->usersupp.USuid == BBSUID) {
372 strproc(CC->usersupp.password);
373 code = strcasecmp(CC->usersupp.password,password);
376 p = (struct passwd *)getpwuid(CC->usersupp.USuid);
377 #ifdef ENABLE_AUTOLOGIN
379 if (!strcmp(p->pw_passwd,
380 (char *)crypt(password,p->pw_passwd))) {
382 lgetuser(&CC->usersupp, CC->curr_user);
383 strcpy(CC->usersupp.password, password);
384 lputuser(&CC->usersupp, CC->curr_user);
395 cprintf("%d Wrong password.\n",ERROR);
396 rec_log(CL_BADPW,CC->curr_user);
402 * Delete a user record *and* all of its related resources.
404 int purge_user(char pname[]) {
406 char mailboxname[ROOMNAMELEN];
407 struct usersupp usbuf;
408 struct quickroom qrbuf;
409 char lowercase_name[32];
411 struct CitContext *ccptr;
412 int user_is_logged_in = 0;
414 for (a=0; a<=strlen(pname); ++a) {
415 lowercase_name[a] = tolower(pname[a]);
418 if (getuser(&usbuf, pname) != 0) {
419 lprintf(5, "Cannot purge user <%s> - not found\n", pname);
420 return(ERROR+NO_SUCH_USER);
423 /* Don't delete a user who is currently logged in. Instead, just
424 * set the access level to 0, and let the account get swept up
425 * during the next purge.
427 user_is_logged_in = 0;
428 begin_critical_section(S_SESSION_TABLE);
429 for (ccptr=ContextList; ccptr!=NULL; ccptr=ccptr->next) {
430 if (ccptr->usersupp.usernum == usbuf.usernum) {
431 user_is_logged_in = 1;
434 end_critical_section(S_SESSION_TABLE);
435 if (user_is_logged_in == 1) {
436 lprintf(5, "User <%s> is logged in; not deleting.\n", pname);
438 putuser(&usbuf, pname);
442 lprintf(5, "Deleting user <%s>\n", pname);
444 /* Perform any purge functions registered by server extensions */
445 PerformUserHooks(usbuf.fullname, usbuf.usernum, EVT_PURGEUSER);
447 /* delete any existing user/room relationships */
448 cdb_delete(CDB_VISIT, &usbuf.usernum, sizeof(long));
450 /* Delete the user's mailbox and its contents */
451 MailboxName(mailboxname, &usbuf, MAILROOM);
452 if (getroom(&qrbuf, mailboxname)==0) {
456 /* delete the userlog entry */
457 cdb_delete(CDB_USERSUPP, lowercase_name, strlen(lowercase_name));
459 /* remove the user's bio file */
460 sprintf(filename, "./bio/%ld", usbuf.usernum);
463 /* remove the user's picture */
464 sprintf(filename, "./userpics/%ld.gif", usbuf.usernum);
472 * create_user() - back end processing to create a new user
474 int create_user(char *newusername)
476 struct usersupp usbuf;
478 struct passwd *p = NULL;
480 char mailboxname[ROOMNAMELEN];
482 strcpy(username, newusername);
485 #ifdef ENABLE_AUTOLOGIN
486 p = (struct passwd *)getpwnam(username);
489 strcpy(username, p->pw_gecos);
490 for (a=0; a<strlen(username); ++a) {
491 if (username[a] == ',') username[a] = 0;
493 CC->usersupp.USuid = p->pw_uid;
496 CC->usersupp.USuid = BBSUID;
499 if (!getuser(&usbuf,username)) {
500 return(ERROR+ALREADY_EXISTS);
503 strcpy(CC->curr_user,username);
504 strcpy(CC->usersupp.fullname,username);
505 strcpy(CC->usersupp.password,"");
508 /* These are the default flags on new accounts */
510 US_NEEDVALID|US_LASTOLD|US_DISAPPEAR|US_PAGINATOR|US_FLOORS;
512 CC->usersupp.timescalled = 0;
513 CC->usersupp.posted = 0;
514 CC->usersupp.axlevel = config.c_initax;
515 CC->usersupp.USscreenwidth = 80;
516 CC->usersupp.USscreenheight = 24;
517 time(&CC->usersupp.lastcall);
518 strcpy(CC->usersupp.USname, "");
519 strcpy(CC->usersupp.USaddr, "");
520 strcpy(CC->usersupp.UScity, "");
521 strcpy(CC->usersupp.USstate, "");
522 strcpy(CC->usersupp.USzip, "");
523 strcpy(CC->usersupp.USphone, "");
525 /* fetch a new user number */
526 CC->usersupp.usernum = get_new_user_number();
528 if (CC->usersupp.usernum == 1L) {
529 CC->usersupp.axlevel = 6;
532 /* add user to userlog */
533 putuser(&CC->usersupp,CC->curr_user);
534 if (getuser(&CC->usersupp,CC->curr_user)) {
535 return(ERROR+INTERNAL_ERROR);
538 /* give the user a private mailbox */
539 MailboxName(mailboxname, &CC->usersupp, MAILROOM);
540 create_room(mailboxname, 4, "", 0);
542 rec_log(CL_NEWUSER,CC->curr_user);
550 * cmd_newu() - create a new user account
552 void cmd_newu(char *cmdbuf)
557 if ((CC->logged_in)) {
558 cprintf("%d Already logged in.\n",ERROR);
563 cprintf("%d %s: Too many users are already online (maximum is %d)\n",
564 ERROR+MAX_SESSIONS_EXCEEDED,
565 config.c_nodename,config.c_maxsessions);
568 extract(username,cmdbuf,0);
572 if (strlen(username)==0) {
573 cprintf("%d You must supply a user name.\n",ERROR);
577 a = create_user(username);
578 if ((!strcasecmp(username, "bbs")) ||
579 (!strcasecmp(username, "new")) ||
580 (!strcasecmp(username, ".")))
582 cprintf("%d '%s' is an invalid login name.\n", ERROR);
585 if (a==ERROR+ALREADY_EXISTS) {
586 cprintf("%d '%s' already exists.\n",
587 ERROR+ALREADY_EXISTS,username);
590 else if (a==ERROR+INTERNAL_ERROR) {
591 cprintf("%d Internal error - user record disappeared?\n",
592 ERROR+INTERNAL_ERROR);
599 cprintf("%d unknown error\n",ERROR);
601 rec_log(CL_NEWUSER,CC->curr_user);
609 void cmd_setp(char *new_pw)
611 if (!(CC->logged_in)) {
612 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
615 if (CC->usersupp.USuid != BBSUID) {
616 cprintf("%d Not allowed. Use the 'passwd' command.\n",ERROR);
620 if (strlen(new_pw)==0) {
621 cprintf("%d Password unchanged.\n",OK);
624 lgetuser(&CC->usersupp,CC->curr_user);
625 strcpy(CC->usersupp.password,new_pw);
626 lputuser(&CC->usersupp,CC->curr_user);
627 cprintf("%d Password changed.\n",OK);
628 rec_log(CL_PWCHANGE,CC->curr_user);
629 PerformSessionHooks(EVT_SETPASS);
633 * get user parameters
635 void cmd_getu(void) {
636 if (!(CC->logged_in)) {
637 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
640 getuser(&CC->usersupp,CC->curr_user);
641 cprintf("%d %d|%d|%d\n",
643 CC->usersupp.USscreenwidth,
644 CC->usersupp.USscreenheight,
645 (CC->usersupp.flags & US_USER_SET)
650 * set user parameters
652 void cmd_setu(char *new_parms)
655 if (num_parms(new_parms)!=3) {
656 cprintf("%d Usage error.\n",ERROR);
659 if (!(CC->logged_in)) {
660 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
663 lgetuser(&CC->usersupp,CC->curr_user);
664 CC->usersupp.USscreenwidth = extract_int(new_parms,0);
665 CC->usersupp.USscreenheight = extract_int(new_parms,1);
666 CC->usersupp.flags = CC->usersupp.flags & (~US_USER_SET);
667 CC->usersupp.flags = CC->usersupp.flags |
668 (extract_int(new_parms,2) & US_USER_SET);
669 lputuser(&CC->usersupp,CC->curr_user);
670 cprintf("%d Ok\n",OK);
674 * set last read pointer
676 void cmd_slrp(char *new_ptr)
681 if (!(CC->logged_in)) {
682 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
686 if (!strncasecmp(new_ptr,"highest",7)) {
687 newlr = CC->quickroom.QRhighest;
690 newlr = atol(new_ptr);
693 lgetuser(&CC->usersupp, CC->curr_user);
695 CtdlGetRelationship(&vbuf, &CC->usersupp, &CC->quickroom);
696 vbuf.v_lastseen = newlr;
697 CtdlSetRelationship(&vbuf, &CC->usersupp, &CC->quickroom);
699 lputuser(&CC->usersupp, CC->curr_user);
700 cprintf("%d %ld\n",OK,newlr);
705 * INVT and KICK commands
707 void cmd_invt_kick(char *iuser, int op)
709 { /* 1 = invite, 0 = kick out */
710 struct usersupp USscratch;
714 if (!(CC->logged_in)) {
715 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
719 if (is_room_aide()==0) {
720 cprintf("%d Higher access required.\n",
721 ERROR+HIGHER_ACCESS_REQUIRED);
725 if (lgetuser(&USscratch,iuser)!=0) {
726 cprintf("%d No such user.\n",ERROR);
730 CtdlGetRelationship(&vbuf, &USscratch, &CC->quickroom);
733 vbuf.v_flags = vbuf.v_flags & ~V_FORGET & ~V_LOCKOUT;
734 vbuf.v_flags = vbuf.v_flags | V_ACCESS;
738 vbuf.v_flags = vbuf.v_flags & ~V_ACCESS;
739 vbuf.v_flags = vbuf.v_flags | V_FORGET | V_LOCKOUT;
742 CtdlSetRelationship(&vbuf, &USscratch, &CC->quickroom);
744 lputuser(&USscratch,iuser);
746 /* post a message in Aide> saying what we just did */
747 sprintf(bbb,"%s %s %s> by %s",
749 ((op == 1) ? "invited to" : "kicked out of"),
750 CC->quickroom.QRname,
751 CC->usersupp.fullname);
754 cprintf("%d %s %s %s.\n",
756 ((op == 1) ? "invited to" : "kicked out of"),
757 CC->quickroom.QRname);
763 * forget (Zap) the current room
765 void cmd_forg(void) {
768 if (!(CC->logged_in)) {
769 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
774 cprintf("%d Aides cannot forget rooms.\n",ERROR);
778 lgetuser(&CC->usersupp,CC->curr_user);
779 CtdlGetRelationship(&vbuf, &CC->usersupp, &CC->quickroom);
781 vbuf.v_flags = vbuf.v_flags | V_FORGET;
782 vbuf.v_flags = vbuf.v_flags & ~V_ACCESS;
784 CtdlSetRelationship(&vbuf, &CC->usersupp, &CC->quickroom);
785 lputuser(&CC->usersupp,CC->curr_user);
786 cprintf("%d Ok\n",OK);
787 usergoto(BASEROOM, 0);
791 * Get Next Unregistered User
793 void cmd_gnur(void) {
794 struct cdbdata *cdbus;
795 struct usersupp usbuf;
797 if (!(CC->logged_in)) {
798 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
802 if (CC->usersupp.axlevel < 6) {
803 cprintf("%d Higher access required.\n",
804 ERROR+HIGHER_ACCESS_REQUIRED);
808 if ((CitControl.MMflags&MM_VALID)==0) {
809 cprintf("%d There are no unvalidated users.\n",OK);
813 /* There are unvalidated users. Traverse the usersupp database,
814 * and return the first user we find that needs validation.
816 cdb_rewind(CDB_USERSUPP);
817 while (cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
818 memset(&usbuf, 0, sizeof(struct usersupp));
819 memcpy(&usbuf, cdbus->ptr,
820 ( (cdbus->len > sizeof(struct usersupp)) ?
821 sizeof(struct usersupp) : cdbus->len) );
823 if ((usbuf.flags & US_NEEDVALID)
824 &&(usbuf.axlevel > 0)) {
825 cprintf("%d %s\n",MORE_DATA,usbuf.fullname);
830 /* If we get to this point, there are no more unvalidated users.
831 * Therefore we clear the "users need validation" flag.
834 begin_critical_section(S_CONTROL);
836 CitControl.MMflags = CitControl.MMflags&(~MM_VALID);
838 end_critical_section(S_CONTROL);
839 cprintf("%d *** End of registration.\n",OK);
846 * get registration info for a user
848 void cmd_greg(char *who)
850 struct usersupp usbuf;
854 if (!(CC->logged_in)) {
855 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
859 if (!strcasecmp(who,"_SELF_")) strcpy(who,CC->curr_user);
861 if ((CC->usersupp.axlevel < 6) && (strcasecmp(who,CC->curr_user))) {
862 cprintf("%d Higher access required.\n",
863 ERROR+HIGHER_ACCESS_REQUIRED);
867 if (getuser(&usbuf,who) != 0) {
868 cprintf("%d '%s' not found.\n",ERROR+NO_SUCH_USER,who);
872 cprintf("%d %s\n",LISTING_FOLLOWS,usbuf.fullname);
873 cprintf("%ld\n",usbuf.usernum);
874 cprintf("%s\n",usbuf.password);
875 cprintf("%s\n",usbuf.USname);
876 cprintf("%s\n",usbuf.USaddr);
877 cprintf("%s\n%s\n%s\n",
878 usbuf.UScity,usbuf.USstate,usbuf.USzip);
879 strcpy(pbuf,usbuf.USphone);
881 for (a=0; a<strlen(pbuf); ++a) {
882 if ((pbuf[a]>='0')&&(pbuf[a]<='9')) {
883 b=strlen(usbuf.USphone);
884 usbuf.USphone[b]=pbuf[a];
885 usbuf.USphone[b+1]=0;
888 while(strlen(usbuf.USphone)<10) {
889 strcpy(pbuf,usbuf.USphone);
890 strcpy(usbuf.USphone," ");
891 strcat(usbuf.USphone,pbuf);
894 cprintf("(%c%c%c) %c%c%c-%c%c%c%c\n",
895 usbuf.USphone[0],usbuf.USphone[1],
896 usbuf.USphone[2],usbuf.USphone[3],
897 usbuf.USphone[4],usbuf.USphone[5],
898 usbuf.USphone[6],usbuf.USphone[7],
899 usbuf.USphone[8],usbuf.USphone[9]);
901 cprintf("%d\n",usbuf.axlevel);
902 cprintf("%s\n",usbuf.USemail);
909 void cmd_vali(char *v_args)
913 struct usersupp userbuf;
915 extract(user,v_args,0);
916 newax = extract_int(v_args,1);
918 if (!(CC->logged_in)) {
919 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
923 if (CC->usersupp.axlevel < 6) {
924 cprintf("%d Higher access required.\n",
925 ERROR+HIGHER_ACCESS_REQUIRED);
929 if (lgetuser(&userbuf,user)!=0) {
930 cprintf("%d '%s' not found.\n",ERROR+NO_SUCH_USER,user);
934 userbuf.axlevel = newax;
935 userbuf.flags = (userbuf.flags & ~US_NEEDVALID);
937 lputuser(&userbuf,user);
939 /* If the access level was set to zero, delete the user */
941 if (purge_user(user)==0) {
942 cprintf("%d %s Deleted.\n", OK, userbuf.fullname);
947 cprintf("%d ok\n",OK);
953 * Traverse the user file...
955 void ForEachUser(void (*CallBack)(struct usersupp *EachUser)) {
956 struct usersupp usbuf;
957 struct cdbdata *cdbus;
959 cdb_rewind(CDB_USERSUPP);
961 while(cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
962 memset(&usbuf, 0, sizeof(struct usersupp));
963 memcpy(&usbuf, cdbus->ptr,
964 ( (cdbus->len > sizeof(struct usersupp)) ?
965 sizeof(struct usersupp) : cdbus->len) );
973 * List one user (this works with cmd_list)
975 void ListThisUser(struct usersupp *usbuf) {
976 if (usbuf->axlevel > 0) {
977 if ((CC->usersupp.axlevel>=6)
978 ||((usbuf->flags&US_UNLISTED)==0)
979 ||((CC->internal_pgm))) {
980 cprintf("%s|%d|%ld|%ld|%d|%d|",
987 if (CC->usersupp.axlevel >= 6)
988 cprintf("%s",usbuf->password);
997 void cmd_list(void) {
998 cprintf("%d \n",LISTING_FOLLOWS);
999 ForEachUser(ListThisUser);
1005 * enter registration info
1007 void cmd_regi(void) {
1019 if (!(CC->logged_in)) {
1020 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
1027 strcpy(tmpstate,"");
1029 strcpy(tmpphone,"");
1030 strcpy(tmpemail,"");
1032 cprintf("%d Send registration...\n",SEND_LISTING);
1034 while (client_gets(buf), strcmp(buf,"000")) {
1035 if (a==0) strcpy(tmpname,buf);
1036 if (a==1) strcpy(tmpaddr,buf);
1037 if (a==2) strcpy(tmpcity,buf);
1038 if (a==3) strcpy(tmpstate,buf);
1040 for (c=0; c<strlen(buf); ++c) {
1041 if ((buf[c]>='0')&&(buf[c]<='9')) {
1049 for (c=0; c<strlen(buf); ++c) {
1050 if ((buf[c]>='0')&&(buf[c]<='9')) {
1057 if (a==6) strncpy(tmpemail,buf,31);
1069 lgetuser(&CC->usersupp,CC->curr_user);
1070 strcpy(CC->usersupp.USname,tmpname);
1071 strcpy(CC->usersupp.USaddr,tmpaddr);
1072 strcpy(CC->usersupp.UScity,tmpcity);
1073 strcpy(CC->usersupp.USstate,tmpstate);
1074 strcpy(CC->usersupp.USzip,tmpzip);
1075 strcpy(CC->usersupp.USphone,tmpphone);
1076 strcpy(CC->usersupp.USemail,tmpemail);
1077 CC->usersupp.flags=(CC->usersupp.flags|US_REGIS|US_NEEDVALID);
1078 lputuser(&CC->usersupp,CC->curr_user);
1080 /* set global flag calling for validation */
1081 begin_critical_section(S_CONTROL);
1083 CitControl.MMflags = CitControl.MMflags | MM_VALID ;
1085 end_critical_section(S_CONTROL);
1090 * assorted info we need to check at login
1092 void cmd_chek(void) {
1097 if (!(CC->logged_in)) {
1098 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
1102 getuser(&CC->usersupp,CC->curr_user); /* no lock is needed here */
1103 if ((REGISCALL!=0)&&((CC->usersupp.flags&US_REGIS)==0)) regis = 1;
1105 if (CC->usersupp.axlevel >= 6) {
1107 if (CitControl.MMflags&MM_VALID) vali = 1;
1111 /* check for mail */
1112 mail = NewMailCount();
1114 cprintf("%d %d|%d|%d\n",OK,mail,regis,vali);
1119 * check to see if a user exists
1121 void cmd_qusr(char *who)
1123 struct usersupp usbuf;
1125 if (getuser(&usbuf,who) == 0) {
1126 cprintf("%d %s\n",OK,usbuf.fullname);
1129 cprintf("%d No such user.\n",ERROR+NO_SUCH_USER);
1137 void cmd_ebio(void) {
1141 if (!(CC->logged_in)) {
1142 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
1146 sprintf(buf,"./bio/%ld",CC->usersupp.usernum);
1147 fp = fopen(buf,"w");
1149 cprintf("%d Cannot create file\n",ERROR);
1152 cprintf("%d \n",SEND_LISTING);
1153 while(client_gets(buf), strcmp(buf,"000")) {
1154 fprintf(fp,"%s\n",buf);
1162 void cmd_rbio(char *cmdbuf)
1164 struct usersupp ruser;
1168 extract(buf,cmdbuf,0);
1169 if (getuser(&ruser,buf)!=0) {
1170 cprintf("%d No such user.\n",ERROR+NO_SUCH_USER);
1173 sprintf(buf,"./bio/%ld",ruser.usernum);
1175 fp = fopen(buf,"r");
1177 cprintf("%d %s has no bio on file.\n",
1178 ERROR+FILE_NOT_FOUND,ruser.fullname);
1181 cprintf("%d \n",LISTING_FOLLOWS);
1182 while (fgets(buf,256,fp)!=NULL) cprintf("%s",buf);
1188 * list of users who have entered bios
1190 void cmd_lbio(void) {
1193 struct usersupp usbuf;
1195 ls=popen("cd ./bio; ls","r");
1197 cprintf("%d Cannot open listing.\n",ERROR+FILE_NOT_FOUND);
1201 cprintf("%d\n",LISTING_FOLLOWS);
1202 while (fgets(buf,255,ls)!=NULL)
1203 if (getuserbynumber(&usbuf,atol(buf))==0)
1204 cprintf("%s\n",usbuf.fullname);
1211 * Administrative Get User Parameters
1213 void cmd_agup(char *cmdbuf) {
1214 struct usersupp usbuf;
1215 char requested_user[256];
1217 if ( (CC->internal_pgm==0)
1218 && ( (CC->logged_in == 0) || (is_aide()==0) ) ) {
1219 cprintf("%d Higher access required.\n",
1220 ERROR + HIGHER_ACCESS_REQUIRED);
1224 extract(requested_user, cmdbuf, 0);
1225 if (getuser(&usbuf, requested_user) != 0) {
1226 cprintf("%d No such user.\n", ERROR + NO_SUCH_USER);
1230 cprintf("%d %s|%s|%u|%d|%d|%d|%ld|%ld|%d\n",
1246 * Administrative Set User Parameters
1248 void cmd_asup(char *cmdbuf) {
1249 struct usersupp usbuf;
1250 char requested_user[256];
1254 if ( (CC->internal_pgm==0)
1255 && ( (CC->logged_in == 0) || (is_aide()==0) ) ) {
1256 cprintf("%d Higher access required.\n",
1257 ERROR + HIGHER_ACCESS_REQUIRED);
1261 extract(requested_user, cmdbuf, 0);
1262 if (lgetuser(&usbuf, requested_user) != 0) {
1263 cprintf("%d No such user.\n", ERROR + NO_SUCH_USER);
1267 np = num_parms(cmdbuf);
1268 if (np > 1) extract(usbuf.password, cmdbuf, 1);
1269 if (np > 2) usbuf.flags = extract_int(cmdbuf, 2);
1270 if (np > 3) usbuf.timescalled = extract_int(cmdbuf, 3);
1271 if (np > 4) usbuf.posted = extract_int(cmdbuf, 4);
1273 newax = extract_int(cmdbuf, 5);
1274 if ((newax >=0) && (newax <= 6)) {
1275 usbuf.axlevel = extract_int(cmdbuf, 5);
1279 usbuf.lastcall = extract_long(cmdbuf, 7);
1282 usbuf.USuserpurge = extract_int(cmdbuf, 8);
1285 lputuser(&usbuf, requested_user);
1286 if (usbuf.axlevel == 0) {
1287 if (purge_user(requested_user)==0) {
1288 cprintf("%d %s deleted.\n", OK, requested_user);
1291 cprintf("%d Ok\n", OK);
1296 * Count the number of new mail messages the user has
1298 int NewMailCount() {
1299 int num_newmsgs = 0;
1301 char mailboxname[32];
1302 struct quickroom mailbox;
1305 MailboxName(mailboxname, &CC->usersupp, MAILROOM);
1306 if (getroom(&mailbox, mailboxname)!=0) return(0);
1307 CtdlGetRelationship(&vbuf, &CC->usersupp, &mailbox);
1309 get_msglist(&mailbox);
1310 for (a=0; a<CC->num_msgs; ++a) {
1311 if (MessageFromList(a)>0L) {
1312 if (MessageFromList(a) > vbuf.v_lastseen) {
1318 return(num_newmsgs);