dsIIr4/bin/
dsIIr4/extra/creremote/
dsIIr4/extra/wolfpaw/
dsIIr4/lib/cmds/admins/
dsIIr4/lib/cmds/common/
dsIIr4/lib/cmds/creators/include/
dsIIr4/lib/cmds/creators/include/SCCS/
dsIIr4/lib/daemon/services/
dsIIr4/lib/doc/
dsIIr4/lib/domains/Ylsrim/
dsIIr4/lib/domains/Ylsrim/adm/
dsIIr4/lib/domains/Ylsrim/armor/
dsIIr4/lib/domains/Ylsrim/broken/
dsIIr4/lib/domains/Ylsrim/fish/
dsIIr4/lib/domains/Ylsrim/meal/
dsIIr4/lib/domains/Ylsrim/npc/
dsIIr4/lib/domains/Ylsrim/virtual/
dsIIr4/lib/domains/Ylsrim/weapon/
dsIIr4/lib/domains/campus/adm/
dsIIr4/lib/domains/campus/etc/
dsIIr4/lib/domains/campus/meals/
dsIIr4/lib/domains/campus/npc/
dsIIr4/lib/domains/campus/save/
dsIIr4/lib/domains/campus/txt/
dsIIr4/lib/domains/campus/txt/ai/charles/
dsIIr4/lib/domains/campus/txt/ai/charles/bak2/
dsIIr4/lib/domains/campus/txt/ai/charles/bak2/bak1/
dsIIr4/lib/domains/campus/txt/ai/charly/
dsIIr4/lib/domains/campus/txt/ai/charly/bak/
dsIIr4/lib/domains/campus/txt/jenny/
dsIIr4/lib/domains/default/creator/
dsIIr4/lib/domains/default/doors/
dsIIr4/lib/domains/default/etc/
dsIIr4/lib/domains/default/virtual/
dsIIr4/lib/domains/default/weap/
dsIIr4/lib/domains/town/virtual/
dsIIr4/lib/lib/comp/
dsIIr4/lib/lib/lvs/
dsIIr4/lib/lib/user/
dsIIr4/lib/lib/virtual/
dsIIr4/lib/log/
dsIIr4/lib/obj/book_source/
dsIIr4/lib/obj/include/
dsIIr4/lib/realms/template/
dsIIr4/lib/realms/template/adm/
dsIIr4/lib/realms/template/area/armor/
dsIIr4/lib/realms/template/area/npc/
dsIIr4/lib/realms/template/area/obj/
dsIIr4/lib/realms/template/area/room/
dsIIr4/lib/realms/template/area/weap/
dsIIr4/lib/realms/template/bak/
dsIIr4/lib/realms/template/cmds/
dsIIr4/lib/save/
dsIIr4/lib/save/kills/o/
dsIIr4/lib/secure/cfg/classes/
dsIIr4/lib/secure/cmds/creators/include/
dsIIr4/lib/secure/cmds/players/
dsIIr4/lib/secure/cmds/players/include/
dsIIr4/lib/secure/daemon/include/
dsIIr4/lib/secure/lib/
dsIIr4/lib/secure/lib/include/
dsIIr4/lib/secure/lib/net/include/
dsIIr4/lib/secure/lib/std/
dsIIr4/lib/secure/modules/
dsIIr4/lib/secure/npc/
dsIIr4/lib/secure/obj/include/
dsIIr4/lib/secure/room/
dsIIr4/lib/secure/save/
dsIIr4/lib/secure/save/boards/
dsIIr4/lib/secure/save/players/g/
dsIIr4/lib/secure/tmp/
dsIIr4/lib/secure/verbs/creators/
dsIIr4/lib/shadows/
dsIIr4/lib/spells/
dsIIr4/lib/std/board/
dsIIr4/lib/std/lib/
dsIIr4/lib/tmp/
dsIIr4/lib/verbs/admins/include/
dsIIr4/lib/verbs/common/
dsIIr4/lib/verbs/common/include/
dsIIr4/lib/verbs/creators/include/
dsIIr4/lib/verbs/players/include/SCCS/
dsIIr4/lib/verbs/rooms/
dsIIr4/lib/verbs/rooms/include/
dsIIr4/lib/www/
dsIIr4/v22.2b14-dsouls2/
dsIIr4/v22.2b14-dsouls2/ChangeLog.old/
dsIIr4/v22.2b14-dsouls2/Win32/
dsIIr4/v22.2b14-dsouls2/compat/
dsIIr4/v22.2b14-dsouls2/compat/simuls/
dsIIr4/v22.2b14-dsouls2/include/
dsIIr4/v22.2b14-dsouls2/mudlib/
dsIIr4/v22.2b14-dsouls2/testsuite/
dsIIr4/v22.2b14-dsouls2/testsuite/clone/
dsIIr4/v22.2b14-dsouls2/testsuite/command/
dsIIr4/v22.2b14-dsouls2/testsuite/data/
dsIIr4/v22.2b14-dsouls2/testsuite/etc/
dsIIr4/v22.2b14-dsouls2/testsuite/include/
dsIIr4/v22.2b14-dsouls2/testsuite/inherit/
dsIIr4/v22.2b14-dsouls2/testsuite/inherit/master/
dsIIr4/v22.2b14-dsouls2/testsuite/log/
dsIIr4/v22.2b14-dsouls2/testsuite/single/
dsIIr4/v22.2b14-dsouls2/testsuite/single/tests/compiler/
dsIIr4/v22.2b14-dsouls2/testsuite/single/tests/efuns/
dsIIr4/v22.2b14-dsouls2/testsuite/single/tests/operators/
dsIIr4/v22.2b14-dsouls2/testsuite/u/
dsIIr4/v22.2b14-dsouls2/tmp/
dsIIr4/win32/
#include <lib.h>
#include <daemons.h>

inherit LIB_DAEMON;

mixed cmd(string args) {
    string rep, flag, domain, person;
    string write_perms = read_file("/secure/cfg/write.cfg");
    string *tmp_array = explode(write_perms, "\n");
    string *admin_array = ({});
    mapping DomainsMap = ([]);


    if(!archp(previous_object()) || this_player()->GetForced()){
	return "No.";
    }

    if(!args || args == ""){
	write(this_object()->GetHelp());
	return 1;
    }

    if(sscanf(args,"%s %s %s", flag, domain, person) != 3){
	write(this_object()->GetHelp());
	return 1;
    }

    person = lower_case(person);

    if(!user_exists(person)){
	write("Invalid person.");
	return 1;
    }

    if(!directory_exists("/domains/"+domain)){
	write("Invalid domain.");
	return 1;
    }

    write_perms = replace_string(write_perms, "\n",";\n");

    foreach(string line in tmp_array){
	string where, admins;
	if(sscanf(line,"(/domains/%s/) %s", where, admins)){
	    DomainsMap[where] = admins;
	    if(sizeof(DomainsMap[domain])) admin_array = explode(DomainsMap[domain],":");
	}
    }

    if(flag == "-a"){

	if(member_array(person, admin_array) != -1){
	    write("That person already administers that domain.");
	    return 1;
	}

	else admin_array += ({ person });

	rep = "(/domains/"+domain+"/) "+implode(admin_array, ":");

	if(grepp(write_perms, "(/domains/"+domain+"/)")){
	    write_perms = replace_matching_line(write_perms, "/domains/"+domain, rep);
	    write_perms = replace_string(write_perms, ";\n","\n");
	}
	else{
	    write_perms = replace_string(write_perms, ";\n","\n");
	    write_perms = newline_trim(write_perms);
	    write_perms += "\n(/domains/"+domain+"/) "+person+"\n";
	}
    }

    else if(flag == "-d"){
	if(member_array(person, admin_array) == -1){
	    write("That person does not administer that domain.");
	    return 1;
	}

	else admin_array -= ({ person });

	if(!sizeof(admin_array)){
	    write_perms = remove_matching_line(write_perms, "(/domains/"+domain+"/)",1);
	    write_perms = replace_string(write_perms, ";\n","\n");
	}
	else {
	    rep = "(/domains/"+domain+"/) "+implode(admin_array, ":");
	    write_perms  = replace_matching_line(write_perms, "/domains/"+domain, rep);
	    write_perms = replace_string(write_perms, ";\n","\n");
	}
    }

    else {
	write("Invalid flag.");
	return 1;
    }

    write_file("/secure/cfg/write.cfg", write_perms, 1);
    update("/secure/daemon/master");
    write("Ok.");
    return 1;
}

string GetHelp(string args) {
    return ("Syntax: domainadmin [-a | -d] <domain> <person>\n\n"
      "This command manages the write permissions to a specified "
      "domain. For example, to give a creator named Snuffy write "
      "privileges to /domains/SnuffLand, you would type: "
      "\ndomainadmin -a SnuffLand snuffy\n"
      "To revoke those privileges:\n"
      "\domainadmin -d SnuffLand snuffy\n"
      "This permits the creator to use QCS within the domain's "
      "directories. "
      "Write privileges are listed in /secure/cfg/write.cfg"
      "\n\n"
      "See also: domaincreate, admintool");
}