Changeset 542 in code
- Timestamp:
- May 26, 2021, 8:51:02 AM (4 years ago)
- Location:
- trunk
- Files:
-
- 7 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/contrib/znc-import.go
r531 r542 182 182 n.Realname = netRealname 183 183 n.Pass = pass 184 n.Enabled = section.Values.Get("IRCConnectEnabled") != "false" 184 185 185 186 if err := db.StoreNetwork(userID, n); err != nil { -
trunk/db.go
r531 r542 61 61 ConnectCommands []string 62 62 SASL SASL 63 Enabled bool 63 64 } 64 65 -
trunk/db_sqlite.go
r531 r542 35 35 sasl_external_cert BLOB DEFAULT NULL, 36 36 sasl_external_key BLOB DEFAULT NULL, 37 enabled INTEGER NOT NULL DEFAULT 1, 37 38 FOREIGN KEY(user) REFERENCES User(id), 38 39 UNIQUE(user, addr, nick), … … 132 133 `, 133 134 "ALTER TABLE Channel ADD COLUMN detached_internal_msgid VARCHAR(255)", 135 "ALTER TABLE Network ADD COLUMN enabled INTEGER NOT NULL DEFAULT 1", 134 136 } 135 137 … … 313 315 rows, err := db.db.Query(`SELECT id, name, addr, nick, username, realname, pass, 314 316 connect_commands, sasl_mechanism, sasl_plain_username, sasl_plain_password, 315 sasl_external_cert, sasl_external_key 317 sasl_external_cert, sasl_external_key, enabled 316 318 FROM Network 317 319 WHERE user = ?`, … … 329 331 err := rows.Scan(&net.ID, &name, &net.Addr, &net.Nick, &username, &realname, 330 332 &pass, &connectCommands, &saslMechanism, &saslPlainUsername, &saslPlainPassword, 331 &net.SASL.External.CertBlob, &net.SASL.External.PrivKeyBlob )333 &net.SASL.External.CertBlob, &net.SASL.External.PrivKeyBlob, &net.Enabled) 332 334 if err != nil { 333 335 return nil, err … … 383 385 SET name = ?, addr = ?, nick = ?, username = ?, realname = ?, pass = ?, connect_commands = ?, 384 386 sasl_mechanism = ?, sasl_plain_username = ?, sasl_plain_password = ?, 385 sasl_external_cert = ?, sasl_external_key = ? 387 sasl_external_cert = ?, sasl_external_key = ?, enabled = ? 386 388 WHERE id = ?`, 387 389 netName, network.Addr, network.Nick, netUsername, realname, pass, connectCommands, 388 390 saslMechanism, saslPlainUsername, saslPlainPassword, 389 network.SASL.External.CertBlob, network.SASL.External.PrivKeyBlob, 391 network.SASL.External.CertBlob, network.SASL.External.PrivKeyBlob, network.Enabled, 390 392 network.ID) 391 393 } else { … … 393 395 res, err = db.db.Exec(`INSERT INTO Network(user, name, addr, nick, username, 394 396 realname, pass, connect_commands, sasl_mechanism, sasl_plain_username, 395 sasl_plain_password, sasl_external_cert, sasl_external_key )396 VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ? )`,397 sasl_plain_password, sasl_external_cert, sasl_external_key, enabled) 398 VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)`, 397 399 userID, netName, network.Addr, network.Nick, netUsername, realname, pass, connectCommands, 398 400 saslMechanism, saslPlainUsername, saslPlainPassword, network.SASL.External.CertBlob, 399 network.SASL.External.PrivKeyBlob )401 network.SASL.External.PrivKeyBlob, network.Enabled) 400 402 if err != nil { 401 403 return err -
trunk/doc/soju.1.scd
r539 r542 159 159 is used. 160 160 161 *-enabled* true|false 162 Enable or disable the network. If the network is disabled, the bouncer 163 won't connect to it. By default, the network is enabled. 164 161 165 *-connect-command* <command> 162 166 Send the specified command as a raw IRC message right after connecting -
trunk/downstream.go
r540 r542 1002 1002 var err error 1003 1003 network, err = dc.user.createNetwork(&Network{ 1004 Addr: dc.networkName, 1005 Nick: nick, 1004 Addr: dc.networkName, 1005 Nick: nick, 1006 Enabled: true, 1006 1007 }) 1007 1008 if err != nil { … … 2175 2176 Realname: realname, 2176 2177 Pass: pass, 2178 Enabled: true, 2177 2179 } 2178 2180 network, err := dc.user.createNetwork(record) -
trunk/service.go
r539 r542 19 19 "math/big" 20 20 "sort" 21 "strconv" 21 22 "strings" 22 23 "time" … … 150 151 children: serviceCommandSet{ 151 152 "create": { 152 usage: "-addr <addr> [-name name] [-username username] [-pass pass] [-realname realname] [-nick nick] [- connect-command command]...",153 usage: "-addr <addr> [-name name] [-username username] [-pass pass] [-realname realname] [-nick nick] [-enabled enabled] [-connect-command command]...", 153 154 desc: "add a new network", 154 155 handle: handleServiceNetworkCreate, … … 159 160 }, 160 161 "update": { 161 usage: "<name> [-addr addr] [-name name] [-username username] [-pass pass] [-realname realname] [-nick nick] [- connect-command command]...",162 usage: "<name> [-addr addr] [-name name] [-username username] [-pass pass] [-realname realname] [-nick nick] [-enabled enabled] [-connect-command command]...", 162 163 desc: "update a network", 163 164 handle: handleServiceNetworkUpdate, … … 318 319 } 319 320 321 type boolPtrFlag struct { 322 ptr **bool 323 } 324 325 func (f boolPtrFlag) String() string { 326 if f.ptr == nil || *f.ptr == nil { 327 return "<nil>" 328 } 329 return strconv.FormatBool(**f.ptr) 330 } 331 332 func (f boolPtrFlag) Set(s string) error { 333 v, err := strconv.ParseBool(s) 334 if err != nil { 335 return err 336 } 337 *f.ptr = &v 338 return nil 339 } 340 320 341 type networkFlagSet struct { 321 342 *flag.FlagSet 322 343 Addr, Name, Nick, Username, Pass, Realname *string 344 Enabled *bool 323 345 ConnectCommands []string 324 346 } … … 332 354 fs.Var(stringPtrFlag{&fs.Pass}, "pass", "") 333 355 fs.Var(stringPtrFlag{&fs.Realname}, "realname", "") 356 fs.Var(boolPtrFlag{&fs.Enabled}, "enabled", "") 334 357 fs.Var((*stringSliceFlag)(&fs.ConnectCommands), "connect-command", "") 335 358 return fs … … 362 385 if fs.Realname != nil { 363 386 network.Realname = *fs.Realname 387 } 388 if fs.Enabled != nil { 389 network.Enabled = *fs.Enabled 364 390 } 365 391 if fs.ConnectCommands != nil { … … 389 415 390 416 record := &Network{ 391 Addr: *fs.Addr, 392 Nick: dc.nick, 417 Addr: *fs.Addr, 418 Nick: dc.nick, 419 Enabled: true, 393 420 } 394 421 if err := fs.update(record); err != nil { … … 416 443 } 417 444 details = fmt.Sprintf("%v channels", uc.channels.Len()) 445 } else if !net.Enabled { 446 statuses = append(statuses, "disabled") 418 447 } else { 419 448 statuses = append(statuses, "disconnected") -
trunk/user.go
r540 r542 173 173 174 174 func (net *network) run() { 175 if !net.Enabled { 176 return 177 } 178 175 179 var lastTry time.Time 176 180 for {
Note:
See TracChangeset
for help on using the changeset viewer.