William Pitcock
0343b3c563
Use get_channel_access() for KICK/TOPIC.
2010-12-07 00:14:42 -06:00
William Pitcock
3c52f289b1
Actually make get_channel_access() public.
2010-12-07 00:12:36 -06:00
William Pitcock
a0626e7ce3
Reorder CHFL flags so that they can be used as ranks.
2010-12-07 00:11:53 -06:00
William Pitcock
0aa36c5f0f
Add can_send hook.
2010-12-07 00:09:46 -06:00
William Pitcock
d307688122
override: Allow banwalking too.
2010-12-06 23:55:42 -06:00
William Pitcock
8bb19bd7ab
Make the can_join hook more flexible.
2010-12-06 23:52:44 -06:00
William Pitcock
429cf1b74f
Add oper-override (modehacking only) as a module.
...
I think if you are going to kick someone from a channel.
2010-12-06 23:44:55 -06:00
William Pitcock
749d8c11dd
Add a hook for get_channel_access().
2010-12-06 22:57:28 -06:00
William Pitcock
6ca4dec95a
Extend hook_data_channel_activity moduledata with membership struct.
2010-12-06 22:57:04 -06:00
William Pitcock
83b72f917a
chmode: Remove chm_regonly, a vestige from ratbox which doesn't apply to native charybdis networks.
2010-12-06 22:46:37 -06:00
William Pitcock
8e2cfcdf3d
CREDITS: Move spb up where he belongs.
2010-12-06 22:38:18 -06:00
Jilles Tjoelker
45a27bf8b9
Change max_bans in reference.conf from 25 to 100, like example.conf.
2010-12-05 16:51:48 +01:00
William Pitcock
85a206d3e0
Use %u instead of %d.
2010-12-04 23:13:35 -06:00
William Pitcock
5d21ef5098
blacklist: Remove the sscanf() for the IPv4 blacklist check.
...
From ratbox r27061 (androsyn).
2010-12-04 23:11:04 -06:00
JD Horelick
486436a299
Do not install ban .conf files (like kline.conf, rsv.conf, etc) as they aren't used anymore.
2010-12-04 17:29:01 -05:00
JD Horelick
f26e8b67e2
Remove all the DEFINE's and the random places they were used for the .conf-based ban stuff.
2010-12-04 17:26:14 -05:00
William Pitcock
56c1612ff3
libratbox: Clean up uses of strcpy().
2010-11-23 08:52:18 -06:00
JD Horelick
eac04554fd
Fix some various warnings.
...
Some from ShadowIRCd, one from ircd-seven.
2010-11-14 16:51:27 -05:00
JD Horelick
f1e5a31775
Change the filenames of the generated SSL key/cert to ssl.* instead of test.* so that they're a bit more descriptive.
2010-11-13 16:07:54 -05:00
William Pitcock
1f679bfe7b
Filter bogus CTCP ACTION messages.
2010-11-05 01:16:03 -05:00
William Pitcock
22ab2e2544
Add documentation for proposed JUPE TS6 command.
2010-10-28 13:24:22 -05:00
William Pitcock
819dd2d287
parse(): make reentrant
2010-10-24 21:02:32 -05:00
William Pitcock
5f8934ea22
Added tag charybdis-3.3.0 for changeset 55f974346090
2010-09-28 13:47:33 -05:00
William Pitcock
5a241f5466
Autoreconf.
2010-09-28 13:47:23 -05:00
William Pitcock
fac1dab0d1
Added tag charybdis-3.3.0 for changeset c941077f6d84
2010-09-28 13:46:13 -05:00
William Pitcock
bf98590ac6
Charybdis 3.3.0.
2010-09-28 13:46:09 -05:00
William Pitcock
a48f183c1c
Update NEWS.
2010-09-27 18:00:35 -05:00
William Pitcock
f42c7be6a5
Example configuration: Set the default TLS port to 6697.
2010-09-17 10:48:56 -05:00
Jilles Tjoelker
5a91bbf920
mkpasswd: Default to MD5-based crypt instead of SHA-based.
...
We have own code for MD5-based crypt and can therefore
support this even if the OS does not. The SHA-based crypts
are not ubiquitous yet.
2010-09-16 01:39:06 +02:00
William Pitcock
920cb1dc4a
mkpasswd: Default to SHA512 instead of inherently insecure DES.
2010-09-15 03:44:58 -05:00
Jilles Tjoelker
01b7a527a3
Show the services login name in WHOWAS.
...
The numeric is the same (330) as used in WHOIS.
This takes at most half a megabyte of memory (large network, 30 char nicks).
2010-08-29 22:30:54 +02:00
Jilles Tjoelker
5b383ce060
Move RPL_WHOISLOGGEDIN to sendto_one_numeric().
2010-08-29 22:29:17 +02:00
William Pitcock
a63f7af7bb
Note that can_join() is not remote-user safe.
2010-08-29 14:07:44 -05:00
Jilles Tjoelker
02e655aeac
Provide an error message when a user does /quote ban.
2010-08-29 15:16:47 +02:00
Jilles Tjoelker
717238d2a2
Add target change for channels.
...
This has a separate enabling option channel::channel_target_change.
It applies to PRIVMSG, NOTICE and TOPIC by unvoiced unopped non-opers.
The same slots are used for channels and users.
2010-08-29 01:26:00 +02:00
Stephen Bennett
8a419c6092
Add initial pass at 3.3.x NEWS
2010-08-27 23:11:54 +01:00
Jilles Tjoelker
6917ed0eba
Send only one ERR_MLOCKRESTRICTED per MODE command.
...
This agrees with other error messages from MODE.
2010-08-24 23:03:23 +02:00
Jilles Tjoelker
2fb6379693
Change ERR_MLOCKRESTRICTED to 742 as 735-739 seem for MONITOR extensions.
2010-08-24 22:51:20 +02:00
Jilles Tjoelker
dd9b78dc92
Remove redundant MyClient check, it is already checked above.
2010-08-24 22:46:57 +02:00
Stephen Bennett
51269a8737
Merge backout of 8939a7e03d15
2010-08-24 21:31:55 +01:00
Stephen Bennett
0f1ab797e4
Backed out changeset 8939a7e03d15
...
The code behind this capability was never implemented, and subsequent
discussions have agreed to approach the problem differently. There seems no
reason to continue advertising a capability that does nothing.
2010-08-24 21:30:56 +01:00
William Pitcock
101b7fcb55
Most of this was out of date too.
2010-08-23 23:37:13 -05:00
William Pitcock
1042288434
Clean up documentation.
2010-08-23 23:33:03 -05:00
William Pitcock
6fb6bd15ae
Enforce TS rules on MLOCKs.
2010-08-23 20:22:59 -05:00
William Pitcock
01ed04abaf
Send numeric 735 on MLOCK policy-restricted mode changes that are ignored.
2010-08-23 19:04:46 -05:00
William Pitcock
32de9f4e67
Add ERR_MLOCKRESTRICTED (735) to reflect bounces caused by MLOCK.
2010-08-23 18:59:32 -05:00
William Pitcock
c3665aa9dc
Kill unsupported modules directory.
2010-08-23 17:03:37 -05:00
Elly
3645ce9869
Change oper-up message.
2010-08-22 23:21:38 -04:00
Jilles Tjoelker
f5455d2cd5
Tweak auto-accept:
...
* does not apply to NOTICE (as those may well be automated)
* mirrors +g behaviour so that no useless accept entries are added for services
* respects max_accept, if it would be exceeded the message is dropped with numeric 494
* check moved up so this is checked before floodcount/tgchange
2010-07-04 17:14:56 +02:00
William Pitcock
0770c9936e
Stop griefing through taunting while hiding behind CALLERID.
...
This shouldn't provide any way for a client to get on a CALLERID list
without authorization, as if a client is +g already, a CTCP request, for
example, won't be replied to.
2010-07-03 00:44:55 -05:00