#include "hook.h"
#include "send.h"
#include "s_assert.h"
+#include "s_newconf.h"
static char readBuf[READBUF_SIZE];
static void client_dopacket(struct Client *client_p, char *buffer, size_t length);
/* allow opers 4 times the amount of messages as users. why 4?
* why not. :) --fl_
*/
- if(IsOper(client_p) && ConfigFileEntry.no_oper_flood)
+ if(IsOperGeneral(client_p) && ConfigFileEntry.no_oper_flood)
allow_read *= 4;
/*
* Handle flood protection here - if we exceed our flood limit on
if(client_p->localClient->sent_parsed >= allow_read)
break;
- /* connect_delay hack. Don't process any messages from a new client for $n seconds,
+ /* post_registration_delay hack. Don't process any messages from a new client for $n seconds,
* to allow network bots to do their thing before channels can be joined.
*/
- if (rb_current_time() < client_p->localClient->firsttime + ConfigFileEntry.connect_delay)
+ if (rb_current_time() < client_p->localClient->firsttime + ConfigFileEntry.post_registration_delay)
break;
dolen = rb_linebuf_get(&client_p->localClient->
if(!IsAnyServer(client_p) &&
(rb_linebuf_alloclen(&client_p->localClient->buf_recvq) > ConfigFileEntry.client_flood_max_lines))
{
- if(!(ConfigFileEntry.no_oper_flood && IsOper(client_p)))
+ if(!(ConfigFileEntry.no_oper_flood && IsOperGeneral(client_p)))
{
exit_client(client_p, client_p, client_p, "Excess Flood");
return;