#include "s_stats.h"
#include "tgchange.h"
#include "inline/stringops.h"
+#include "irc_dictionary.h"
static int m_message(int, const char *, struct Client *, struct Client *, int, const char **);
static int m_privmsg(struct Client *, struct Client *, int, const char **);
int contor;
int caps = 0;
int len = 0;
+ struct membership *msptr = find_channel_membership(chptr, source_p);
+ struct Metadata *md;
if(MyClient(source_p))
{
source_p->localClient->last = rb_current_time();
}
- if(chptr->mode.mode & MODE_NOCOLOR)
+ if(chptr->mode.mode & MODE_NOREPEAT)
+ {
+ md = channel_metadata_find(chptr, "NOREPEAT");
+ if(md && (!ConfigChannel.exempt_cmode_K || !is_any_op(msptr)))
+ {
+ if(!(strcmp(md->value, strip_colour(text))))
+ {
+ if(p_or_n != NOTICE)
+ sendto_one_numeric(source_p, ERR_CANNOTSENDTOCHAN,
+ form_str(ERR_CANNOTSENDTOCHAN), chptr->chname);
+ return;
+ }
+ }
+ channel_metadata_delete(chptr, "NOREPEAT", 0);
+ channel_metadata_add(chptr, "NOREPEAT", strip_colour(text), 0);
+ }
+
+ if(chptr->mode.mode & MODE_NOCOLOR && (!ConfigChannel.exempt_cmode_c || !is_any_op(msptr)))
{
rb_strlcpy(text2, text, BUFSIZE);
strip_colour(text2);
if(result == CAN_SEND_OPV ||
!flood_attack_channel(p_or_n, source_p, chptr, chptr->chname))
{
- if (strlen(text) > 10 && chptr->mode.mode & MODE_NOCAPS)
+ if (strlen(text) > 10 && chptr->mode.mode & MODE_NOCAPS && (!ConfigChannel.exempt_cmode_G || !is_any_op(msptr)))
{
for(contor=0; contor < strlen(text); contor++)
{
return;
}
}
- if (p_or_n != PRIVMSG && chptr->mode.mode & MODE_NONOTICE)
+ if (p_or_n != PRIVMSG && chptr->mode.mode & MODE_NONOTICE && (!ConfigChannel.exempt_cmode_T || !is_any_op(msptr)))
{
sendto_one_numeric(source_p, ERR_CANNOTSENDTOCHAN,
form_str(ERR_CANNOTSENDTOCHAN), chptr->chname);
return;
}
if (p_or_n != NOTICE && chptr->mode.mode & MODE_NOACTION &&
- !strncasecmp(text + 1, "ACTION", 6))
+ !strncasecmp(text + 1, "ACTION", 6) &&
+ (!ConfigChannel.exempt_cmode_D || !is_any_op(msptr)))
{
sendto_one_numeric(source_p, ERR_CANNOTSENDTOCHAN,
form_str(ERR_CANNOTSENDTOCHAN), chptr->chname);
if (p_or_n != NOTICE && *text == '\001' &&
strncasecmp(text + 1, "ACTION", 6))
{
- if (chptr->mode.mode & MODE_NOCTCP)
+ if (chptr->mode.mode & MODE_NOCTCP && (!ConfigChannel.exempt_cmode_C || !is_any_op(msptr)))
{
sendto_one_numeric(source_p, ERR_CANNOTSENDTOCHAN,
form_str(ERR_CANNOTSENDTOCHAN), chptr->chname);
struct Client *source_p, struct Client *target_p, const char *text)
{
int do_floodcount = 0;
+ struct Metadata *md;
+ struct DictionaryIter iter;
+ int oaccept = 0;
if(MyClient(source_p))
{
form_str(ERR_NOCTCP),
target_p->name);
}
- /* XXX Controversial? allow opers always to send through a +g */
- else if(!IsServer(source_p) && (IsSetCallerId(target_p) ||
+ /* If opers want to go through +g, they should load oaccept.*/
+ else if(!IsServer(source_p) && !IsService(source_p) && (IsSetCallerId(target_p) ||
+ (IsSetSCallerId(target_p) && !has_common_channel(source_p, target_p)) ||
(IsSetRegOnlyMsg(target_p) && !source_p->user->suser[0])))
{
+ if (IsOper(source_p))
+ {
+ DICTIONARY_FOREACH(md, &iter, target_p->user->metadata)
+ {
+ if(!strcmp(md->value, source_p->id))
+ {
+ oaccept = 1;
+ break;
+ }
+ }
+ }
/* Here is the anti-flood bot/spambot code -db */
- if(accept_message(source_p, target_p) || IsOper(source_p))
+ if(accept_message(source_p, target_p) || oaccept)
{
add_reply_target(target_p, source_p);
sendto_one(target_p, ":%s!%s@%s %s %s :%s",
source_p->name,
source_p->username,
source_p->host, command, target_p->name, text);
- return;
}
- if (IsSetRegOnlyMsg(target_p) && !source_p->user->suser[0])
+ else if (IsSetRegOnlyMsg(target_p) && !source_p->user->suser[0])
{
if (p_or_n != NOTICE)
sendto_one_numeric(source_p, ERR_NONONREG,
form_str(ERR_NONONREG),
target_p->name);
- return;
}
- if (IsSetSCallerId(target_p) && !source_p->user->suser[0])
+ else if (IsSetSCallerId(target_p) && !has_common_channel(source_p, target_p))
{
if (p_or_n != NOTICE)
sendto_one_numeric(source_p, ERR_NOCOMMONCHAN,
form_str(ERR_NOCOMMONCHAN),
target_p->name);
- return;
- }
- /* check for accept, flag recipient incoming message */
- if(p_or_n != NOTICE)
- {
- sendto_one_numeric(source_p, ERR_TARGUMODEG,
- form_str(ERR_TARGUMODEG),
- target_p->name);
}
-
- if((target_p->localClient->last_caller_id_time +
- ConfigFileEntry.caller_id_wait) < rb_current_time())
+ else
{
+ /* check for accept, flag recipient incoming message */
if(p_or_n != NOTICE)
- sendto_one_numeric(source_p, RPL_TARGNOTIFY,
- form_str(RPL_TARGNOTIFY),
+ {
+ sendto_one_numeric(source_p, ERR_TARGUMODEG,
+ form_str(ERR_TARGUMODEG),
target_p->name);
+ }
- add_reply_target(target_p, source_p);
- sendto_one(target_p, form_str(RPL_UMODEGMSG),
- me.name, target_p->name, source_p->name,
- source_p->username, source_p->host);
+ if((target_p->localClient->last_caller_id_time +
+ ConfigFileEntry.caller_id_wait) < rb_current_time())
+ {
+ if(p_or_n != NOTICE)
+ sendto_one_numeric(source_p, RPL_TARGNOTIFY,
+ form_str(RPL_TARGNOTIFY),
+ target_p->name);
- target_p->localClient->last_caller_id_time = rb_current_time();
+ add_reply_target(target_p, source_p);
+ sendto_one(target_p, form_str(RPL_UMODEGMSG),
+ me.name, target_p->name, source_p->name,
+ source_p->username, source_p->host);
+
+ target_p->localClient->last_caller_id_time = rb_current_time();
+ }
}
}
else