Apply the same restrictions to ban forwarding as to +f.
This commit is contained in:
parent
0c7303213e
commit
e1dc9e549f
1 changed files with 10 additions and 3 deletions
13
src/chmode.c
13
src/chmode.c
|
@ -873,9 +873,16 @@ chm_ban(struct Client *source_p, struct Channel *chptr,
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
if(forward != NULL && !ConfigChannel.use_forward &&
|
/* For compatibility, only check the forward channel from
|
||||||
MyClient(source_p))
|
* local clients. Accept any forward channel from servers.
|
||||||
forward = NULL;
|
*/
|
||||||
|
if(forward != NULL && MyClient(source_p))
|
||||||
|
{
|
||||||
|
if(!ConfigChannel.use_forward)
|
||||||
|
forward = NULL;
|
||||||
|
else if(!check_forward(source_p, chptr, forward))
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
/* dont allow local clients to overflow the banlist, dont
|
/* dont allow local clients to overflow the banlist, dont
|
||||||
* let remote servers set duplicate bans
|
* let remote servers set duplicate bans
|
||||||
|
|
Loading…
Reference in a new issue