fixed botwar detection for bot deops
authorpk910 <philipp@zoelle1.de>
Mon, 6 Feb 2012 15:12:46 +0000 (16:12 +0100)
committerpk910 <philipp@zoelle1.de>
Mon, 6 Feb 2012 15:12:46 +0000 (16:12 +0100)
src/event_neonserv_mode.c

index daf55f247ca6f93635a5a621b4b6eaf9a8ad74c0..ef8bf77e77fccaca4f19157d8342dbd062f5ac7e 100644 (file)
@@ -131,7 +131,8 @@ static void neonserv_event_mode_async1(struct ClientSocket *client, struct UserN
                 caccess = getChannelAccess(cuser, chan);
                 if(modes[i] == 'o' && !add && cuser == client->user) {
                     //someone deopped the bot???
-                    requestOp(client->user, chan);
+                    if(!neonserv_cmd_mode_botwar_detect(client, user, chan))
+                                               requestOp(client->user, chan);
                 }
                 if((modes[i] == 'o' || (modes[i] == 'h' && !with_halfops)) && !(add && isBot(cuser))) {
                     if(uaccess < db_canop) {