summaryrefslogtreecommitdiffstats
path: root/modules/event.pl
diff options
context:
space:
mode:
authorLibravatarJanik Kleinhoff <janik@kleinhoff.de>2015-03-08 01:45:43 +0400
committerLibravatarJanik Kleinhoff <janik@kleinhoff.de>2015-03-08 01:45:43 +0400
commitd45c28ec36ebe67a632aad27989bb97a697e09fb (patch)
tree5d693a1a25f59a9a7408b559680b66186efbae17 /modules/event.pl
parent1fd649a552dbd8910bb79f83163f4a4fdf832d65 (diff)
Don't trigger splitflood on lots of humans using a single bot command
This essentially allows people who had previously been active to bypass splitflood handling once in certain cases to avoid tons of false positives. (Mostly of interest for channels that heavily involve interaction with some sort of bot.) Actual malicious distributed flood attack detection should be unaffected.
Diffstat (limited to 'modules/event.pl')
-rw-r--r--modules/event.pl2
1 files changed, 1 insertions, 1 deletions
diff --git a/modules/event.pl b/modules/event.pl
index a1f84de..bbc56e1 100644
--- a/modules/event.pl
+++ b/modules/event.pl
@@ -332,7 +332,6 @@ sub on_public
# alarm 200;
my $chan = lc $event->{to}[0];
$chan =~ s/^[+@]//;
- $::sc{$chan}{users}{lc $event->{nick}}{msgtime} = time;
$::log->logg( $event );
$::db->logg( $event );
if ($event->{args}->[0] =~ /(https?:\/\/bitly.com\/\w+|https?:\/\/bit.ly\/\w+|https?:\/\/j.mp\/\w+|https?:\/\/tinyurl.com\/\w+)/i) {
@@ -346,6 +345,7 @@ sub on_public
}
$::inspector->inspect( $conn, $event );
$::commander->command( $conn, $event );
+ $::sc{$chan}{users}{lc $event->{nick}}{msgtime} = time;
}
sub checkHTTP