#define SPAMSERV_MSG_JOINFLOOD "Join flooding the channel"
#define SPAMSERV_MSG_WARNING "%s is against the channel rules"
#define SPAMSERV_MSG_BOTNET "BotNet detected."
+#define SPAMSERV_MSG_CAPS "Using too many chars in UPPER CASE"
+#define SPAMSERV_MSG_DIGIT "Using too many numeric chars"
//EVENTS
#include "event_neonspam_join.c"
MYSQL_RES *res, *res2;
MYSQL_ROW row;
- printf_mysql_query("SELECT `nick`, `ident`, `realname`, `server`, `port`, `pass`, `textbot`, `id` FROM `bots` WHERE `botclass` = '%d' AND `active` = '1'", BOTID);
+ printf_mysql_query("SELECT `nick`, `ident`, `realname`, `server`, `port`, `pass`, `textbot`, `id`, `queue` FROM `bots` WHERE `botclass` = '%d' AND `active` = '1'", BOTID);
res = mysql_use();
while ((row = mysql_fetch_row(res)) != NULL) {
user->flags |= USERFLAG_ISBOT;
client = create_socket(row[3], atoi(row[4]), row[5], user);
client->flags |= (strcmp(row[6], "0") ? SOCKET_FLAG_PREFERRED : 0);
+ client->flags |= (strcmp(row[8], "0") ? SOCKET_FLAG_USE_QUEUE : 0);
client->botid = BOTID;
client->clientid = atoi(row[7]);
connect_socket(client);