Merge atheme and charybdis modules from parameterize
This commit is contained in:
parent
e8c6de331c
commit
f04fc7f5d1
4 changed files with 2446 additions and 0 deletions
121
atheme/manifests/init.pp
Normal file
121
atheme/manifests/init.pp
Normal file
|
@ -0,0 +1,121 @@
|
|||
# Use default values from charybdis if defined.
|
||||
#
|
||||
class atheme::params {
|
||||
|
||||
if $::charybdis::services_name {
|
||||
$services_name = $::charybdis::services_name
|
||||
} else {
|
||||
$services_name = 'ircservices.localdomain'
|
||||
}
|
||||
|
||||
if $::charybdis::network_name {
|
||||
$network_name = $::charybdis::network_name
|
||||
} else {
|
||||
$network_name = 'IRC Network'
|
||||
}
|
||||
|
||||
if $::charybdis::admin_name {
|
||||
$admin_name = $::charybdis::admin_name
|
||||
} else {
|
||||
$admin_name = 'Administrator'
|
||||
}
|
||||
|
||||
if $::charybdis::admin_email {
|
||||
$admin_email = $::charybdis::admin_email
|
||||
} else {
|
||||
$admin_email = 'root@localhost'
|
||||
}
|
||||
|
||||
if $::charybdis::server_name {
|
||||
$uplink_name = $::charybdis::server_name
|
||||
} else {
|
||||
$uplink_name = undef
|
||||
}
|
||||
|
||||
if $::charybdis::port {
|
||||
$uplink_port = $::charybdis::port
|
||||
} else {
|
||||
$uplink_port = '6667'
|
||||
}
|
||||
|
||||
if $::charybdis::services_password {
|
||||
$uplink_password = $::charybdis::services_password
|
||||
} else {
|
||||
$uplink_password = undef
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
# Install Atheme IRC services.
|
||||
#
|
||||
class atheme(
|
||||
$sid='00B',
|
||||
$services_name=$atheme::params::services_name,
|
||||
$services_description='Atheme IRC Services',
|
||||
$network_name=$atheme::params::network_name,
|
||||
$admin_name=$atheme::params::admin_name,
|
||||
$admin_email=$atheme::params::admin_email,
|
||||
$hidehostsuffix='hiddendomain',
|
||||
$uplink_name=$atheme::params::uplink_name,
|
||||
$uplink_port=$atheme::params::uplink_port,
|
||||
$uplink_password=$atheme::params::uplink_password,
|
||||
$operators=[],
|
||||
) inherits atheme::params {
|
||||
|
||||
case $::operatingsystem {
|
||||
'ubuntu': { }
|
||||
default: {
|
||||
fail("atheme not supported on ${::operatingsystem}")
|
||||
}
|
||||
}
|
||||
|
||||
if ! $uplink_name {
|
||||
fail('Must define $uplink_name')
|
||||
}
|
||||
|
||||
if ! $uplink_password {
|
||||
fail('Must define $uplink_password')
|
||||
}
|
||||
|
||||
package { 'atheme-services':
|
||||
ensure => installed,
|
||||
}
|
||||
|
||||
file { '/etc/atheme/atheme.conf':
|
||||
ensure => present,
|
||||
mode => '0644',
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
content => template('atheme/atheme.conf.erb'),
|
||||
require => Package['atheme-services'],
|
||||
notify => Service['atheme-services'],
|
||||
}
|
||||
|
||||
augeas { 'atheme-enable':
|
||||
context => '/files/etc/default/atheme-services',
|
||||
changes => 'set ENABLED 1',
|
||||
notify => Service['atheme-services'],
|
||||
}
|
||||
|
||||
service { 'atheme-services':
|
||||
ensure => running,
|
||||
enable => true,
|
||||
hasstatus => false,
|
||||
}
|
||||
|
||||
file { '/var/log/atheme':
|
||||
ensure => directory,
|
||||
mode => '0640',
|
||||
owner => 'irc',
|
||||
group => 'irc',
|
||||
recurse => true,
|
||||
require => Service['atheme-services'],
|
||||
}
|
||||
|
||||
if defined(Service['charybdis']) {
|
||||
Service['atheme-services'] {
|
||||
require => Service['charybdis'],
|
||||
}
|
||||
}
|
||||
|
||||
}
|
1756
atheme/templates/atheme.conf.erb
Normal file
1756
atheme/templates/atheme.conf.erb
Normal file
File diff suppressed because it is too large
Load diff
134
charybdis/manifests/init.pp
Normal file
134
charybdis/manifests/init.pp
Normal file
|
@ -0,0 +1,134 @@
|
|||
# Install Charybdis IRC server.
|
||||
#
|
||||
class charybdis(
|
||||
$sid='00A',
|
||||
$server_name='irc.localdomain',
|
||||
$server_description='IRC Server',
|
||||
$network_name='IRC',
|
||||
$network_description='IRC Network',
|
||||
$admin_name='Administrator',
|
||||
$admin_description='IRC Administrator',
|
||||
$admin_email='root@localhost',
|
||||
$motd=undef,
|
||||
$motd_source=undef,
|
||||
$port='6667',
|
||||
$sslport='6668',
|
||||
$ssl_dh=undef,
|
||||
$ssl_key=undef,
|
||||
$ssl_cert=undef,
|
||||
$users=['*@*'],
|
||||
$operators=[],
|
||||
$umodes=undef,
|
||||
$cloaking=true,
|
||||
$hub=false,
|
||||
$ident=false,
|
||||
$throttle_count='4',
|
||||
$throttle_duration='60',
|
||||
$services=false,
|
||||
$services_name='ircservices.localdomain',
|
||||
$services_password=undef,
|
||||
) {
|
||||
|
||||
case $::operatingsystem {
|
||||
'ubuntu': { }
|
||||
default: {
|
||||
fail("charybdis not supported on ${::operatingsystem}")
|
||||
}
|
||||
}
|
||||
|
||||
if $services == true and ! $services_password {
|
||||
fail('Must define $services_password')
|
||||
}
|
||||
|
||||
if $umodes {
|
||||
$umodes_real = $umodes
|
||||
} else {
|
||||
if $cloaking == true {
|
||||
$umodes_real = '+ix'
|
||||
} else {
|
||||
$umodes_real = '+i'
|
||||
}
|
||||
}
|
||||
|
||||
package { 'charybdis':
|
||||
ensure => installed,
|
||||
}
|
||||
|
||||
file { '/etc/charybdis/ircd.conf':
|
||||
ensure => present,
|
||||
mode => '0640',
|
||||
owner => 'root',
|
||||
group => 'charybdis',
|
||||
content => template('charybdis/ircd.conf.erb'),
|
||||
require => Package['charybdis'],
|
||||
notify => Service['charybdis'],
|
||||
}
|
||||
|
||||
file { '/etc/charybdis/ircd.motd':
|
||||
ensure => present,
|
||||
mode => '0640',
|
||||
owner => 'root',
|
||||
group => 'charybdis',
|
||||
content => $motd,
|
||||
source => $motd_source,
|
||||
require => Package['charybdis'],
|
||||
notify => Service['charybdis'],
|
||||
}
|
||||
|
||||
if $ssl_key and $ssl_cert {
|
||||
file { '/etc/charybdis/ircd.key':
|
||||
ensure => present,
|
||||
mode => '0640',
|
||||
owner => 'root',
|
||||
group => 'charybdis',
|
||||
source => $ssl_key,
|
||||
require => Package['charybdis'],
|
||||
notify => Service['charybdis'],
|
||||
}
|
||||
|
||||
file { '/etc/charybdis/ircd.crt':
|
||||
ensure => present,
|
||||
mode => '0640',
|
||||
owner => 'root',
|
||||
group => 'charybdis',
|
||||
source => $ssl_cert,
|
||||
require => Package['charybdis'],
|
||||
notify => Service['charybdis'],
|
||||
}
|
||||
|
||||
if $ssl_dh {
|
||||
file { '/etc/charybdis/dh.pem':
|
||||
ensure => present,
|
||||
mode => '0640',
|
||||
owner => 'root',
|
||||
group => 'charybdis',
|
||||
source => $ssl_dh,
|
||||
require => Package['charybdis'],
|
||||
notify => Service['charybdis'],
|
||||
}
|
||||
} else {
|
||||
ssl::dhparam { '/etc/charybdis/dh.pem':
|
||||
mode => '0640',
|
||||
owner => 'root',
|
||||
group => 'charybdis',
|
||||
require => Package['charybdis'],
|
||||
notify => Service['charybdis'],
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
service { 'charybdis':
|
||||
ensure => running,
|
||||
enable => true,
|
||||
}
|
||||
|
||||
file { '/var/log/charybdis':
|
||||
ensure => directory,
|
||||
mode => '0640',
|
||||
owner => 'charybdis',
|
||||
group => 'charybdis',
|
||||
recurse => true,
|
||||
require => Service['charybdis'],
|
||||
}
|
||||
|
||||
}
|
435
charybdis/templates/ircd.conf.erb
Normal file
435
charybdis/templates/ircd.conf.erb
Normal file
|
@ -0,0 +1,435 @@
|
|||
/* doc/example.conf - brief example configuration file
|
||||
*
|
||||
* Copyright (C) 2000-2002 Hybrid Development Team
|
||||
* Copyright (C) 2002-2005 ircd-ratbox development team
|
||||
* Copyright (C) 2005-2006 charybdis development team
|
||||
*
|
||||
* $Id: example.conf 3582 2007-11-17 21:55:48Z jilles $
|
||||
*
|
||||
* See reference.conf for more information.
|
||||
*/
|
||||
|
||||
/* Extensions */
|
||||
#loadmodule "extensions/chm_operonly_compat.so";
|
||||
#loadmodule "extensions/chm_quietunreg_compat.so";
|
||||
#loadmodule "extensions/chm_sslonly_compat.so";
|
||||
#loadmodule "extensions/createauthonly.so";
|
||||
#loadmodule "extensions/extb_account.so";
|
||||
#loadmodule "extensions/extb_canjoin.so";
|
||||
#loadmodule "extensions/extb_channel.so";
|
||||
#loadmodule "extensions/extb_extgecos.so";
|
||||
#loadmodule "extensions/extb_oper.so";
|
||||
#loadmodule "extensions/extb_realname.so";
|
||||
#loadmodule "extensions/extb_server.so";
|
||||
#loadmodule "extensions/extb_ssl.so";
|
||||
#loadmodule "extensions/hurt.so";
|
||||
#loadmodule "extensions/m_findforwards.so";
|
||||
#loadmodule "extensions/m_identify.so";
|
||||
#loadmodule "extensions/no_oper_invis.so";
|
||||
#loadmodule "extensions/sno_farconnect.so";
|
||||
#loadmodule "extensions/sno_globalkline.so";
|
||||
#loadmodule "extensions/sno_globaloper.so";
|
||||
#loadmodule "extensions/sno_whois.so";
|
||||
#loadmodule "extensions/override.so";
|
||||
|
||||
/*
|
||||
* IP cloaking extensions: use ip_cloaking_4.0
|
||||
* if you're linking 3.2 and later, otherwise use
|
||||
* ip_cloaking.so, for compatibility with older 3.x
|
||||
* releases.
|
||||
*/
|
||||
|
||||
<% if @cloaking == true -%>
|
||||
loadmodule "extensions/ip_cloaking_4.0.so";
|
||||
<% end -%>
|
||||
#loadmodule "extensions/ip_cloaking.so";
|
||||
|
||||
serverinfo {
|
||||
sid = "<%= @sid %>";
|
||||
name = "<%= @server_name %>";
|
||||
description = "<%= @server_description %>";
|
||||
network_name = "<%= @network_name %>";
|
||||
network_desc = "<%= @network_description %>";
|
||||
<% if @hub == true -%>
|
||||
hub = yes;
|
||||
<% else -%>
|
||||
hub = no;
|
||||
<% end -%>
|
||||
|
||||
/* On multi-homed hosts you may need the following. These define
|
||||
* the addresses we connect from to other servers. */
|
||||
/* for IPv4 */
|
||||
#vhost = "192.169.0.1";
|
||||
/* for IPv6 */
|
||||
#vhost6 = "3ffe:80e8:546::2";
|
||||
|
||||
<% if @ssl_key and @ssl_cert -%>
|
||||
/* ssl_private_key: our ssl private key */
|
||||
ssl_private_key = "/etc/charybdis/ircd.key";
|
||||
|
||||
/* ssl_cert: certificate for our ssl server */
|
||||
ssl_cert = "/etc/charybdis/ircd.crt";
|
||||
|
||||
/* ssl_dh_params: DH parameters, generate with openssl dhparam -out dh.pem 1024 */
|
||||
ssl_dh_params = "/etc/charybdis/dh.pem";
|
||||
|
||||
/* ssld_count: number of ssld processes you want to start, if you
|
||||
* have a really busy server, using N-1 where N is the number of
|
||||
* cpu/cpu cores you have might be useful. A number greater than one
|
||||
* can also be useful in case of bugs in ssld and because ssld needs
|
||||
* two file descriptors per SSL connection.
|
||||
*/
|
||||
ssld_count = 10;
|
||||
|
||||
<% end -%>
|
||||
/* default max clients: the default maximum number of clients
|
||||
* allowed to connect. This can be changed once ircd has started by
|
||||
* issuing:
|
||||
* /quote set maxclients <limit>
|
||||
*/
|
||||
default_max_clients = 1024;
|
||||
};
|
||||
|
||||
admin {
|
||||
name = "<%= @admin_name %>";
|
||||
description = "<%= @admin_description %>";
|
||||
email = "<%= @admin_email %>";
|
||||
};
|
||||
|
||||
log {
|
||||
fname_userlog = "/var/log/charybdis/userlog";
|
||||
fname_fuserlog = "/var/log/charybdis/fuserlog";
|
||||
fname_operlog = "/var/log/charybdis/operlog";
|
||||
fname_foperlog = "/var/log/charybdis/foperlog";
|
||||
fname_serverlog = "/var/log/charybdis/serverlog";
|
||||
fname_klinelog = "/var/log/charybdis/klinelog";
|
||||
fname_killlog = "/var/log/charybdis/killlog";
|
||||
fname_operspylog = "/var/log/charybdis/operspylog";
|
||||
fname_ioerrorlog = "/var/log/charybdis/ioerror";
|
||||
};
|
||||
|
||||
/* class {} blocks MUST be specified before anything that uses them. That
|
||||
* means they must be defined before auth {} and before connect {}.
|
||||
*/
|
||||
class "users" {
|
||||
ping_time = 2 minutes;
|
||||
number_per_ident = 100;
|
||||
number_per_ip = 100;
|
||||
number_per_ip_global = 100;
|
||||
cidr_ipv4_bitlen = 24;
|
||||
cidr_ipv6_bitlen = 64;
|
||||
number_per_cidr = 200;
|
||||
max_number = 3000;
|
||||
sendq = 400 kbytes;
|
||||
};
|
||||
|
||||
class "opers" {
|
||||
ping_time = 5 minutes;
|
||||
number_per_ip = 100;
|
||||
max_number = 1000;
|
||||
sendq = 1 megabyte;
|
||||
};
|
||||
|
||||
class "server" {
|
||||
ping_time = 5 minutes;
|
||||
connectfreq = 5 minutes;
|
||||
max_number = 1;
|
||||
sendq = 4 megabytes;
|
||||
};
|
||||
|
||||
listen {
|
||||
/* If you want to listen on a specific IP only, specify host.
|
||||
* host definitions apply only to the following port line.
|
||||
*/
|
||||
host = "127.0.0.1";
|
||||
port = <%= @port %>;
|
||||
};
|
||||
|
||||
<% if @ssl_key and @ssl_cert -%>
|
||||
listen {
|
||||
sslport = <%= @sslport %>;
|
||||
};
|
||||
|
||||
<% end -%>
|
||||
/* auth {}: allow users to connect to the ircd (OLD I:)
|
||||
* auth {} blocks MUST be specified in order of precedence. The first one
|
||||
* that matches a user will be used. So place spoofs first, then specials,
|
||||
* then general access, then restricted.
|
||||
*/
|
||||
<% @users.map! { |user| user.split } -%>
|
||||
<% @users.each do |user| -%>
|
||||
auth {
|
||||
user = "<%= user[0] %>";
|
||||
<% if user[1] -%>
|
||||
password = "<%= user[1] %>";
|
||||
flags = encrypted;
|
||||
<% end -%>
|
||||
class = "users";
|
||||
};
|
||||
|
||||
<% end -%>
|
||||
/* privset {} blocks MUST be specified before anything that uses them. That
|
||||
* means they must be defined before operator {}.
|
||||
*/
|
||||
privset "local_op" {
|
||||
privs = oper:local_kill, oper:operwall;
|
||||
};
|
||||
|
||||
privset "server_bot" {
|
||||
extends = "local_op";
|
||||
privs = oper:kline, oper:remoteban, snomask:nick_changes;
|
||||
};
|
||||
|
||||
privset "global_op" {
|
||||
extends = "local_op";
|
||||
privs = oper:global_kill, oper:routing, oper:kline, oper:unkline, oper:xline,
|
||||
oper:resv, oper:mass_notice, oper:remoteban;
|
||||
};
|
||||
|
||||
privset "admin" {
|
||||
extends = "global_op";
|
||||
privs = oper:admin, oper:die, oper:rehash, oper:spy;
|
||||
};
|
||||
|
||||
<% @operators.map! { |oper| oper.split }
|
||||
@operators.each do |oper|
|
||||
scope.function_fail(["Invalid operator '%s'" % oper[0]]) if oper.length != 3 -%>
|
||||
operator "<%= oper[0] %>" {
|
||||
user = "<%= oper[1] %>";
|
||||
password = "<%= oper[2] %>";
|
||||
flags = encrypted;
|
||||
privset = "admin";
|
||||
};
|
||||
|
||||
<% end -%>
|
||||
<% if @services == true -%>
|
||||
connect "<%= @services_name %>" {
|
||||
host = "127.0.0.1";
|
||||
port = <%= @port %>;
|
||||
send_password = "<%= @services_password %>";
|
||||
accept_password = "<%= @services_password %>";
|
||||
hub_mask = "*";
|
||||
class = "server";
|
||||
flags = compressed, topicburst;
|
||||
};
|
||||
|
||||
service {
|
||||
name = "<%= @services_name %>";
|
||||
};
|
||||
|
||||
<% end -%>
|
||||
cluster {
|
||||
name = "*";
|
||||
flags = kline, tkline, unkline, xline, txline, unxline, resv, tresv, unresv;
|
||||
};
|
||||
|
||||
shared {
|
||||
oper = "*@*", "*";
|
||||
flags = all, rehash;
|
||||
};
|
||||
|
||||
/* exempt {}: IPs that are exempt from Dlines and rejectcache. (OLD d:) */
|
||||
exempt {
|
||||
ip = "127.0.0.1";
|
||||
};
|
||||
|
||||
channel {
|
||||
use_invex = yes;
|
||||
use_except = yes;
|
||||
use_forward = yes;
|
||||
use_knock = yes;
|
||||
knock_delay = 5 minutes;
|
||||
knock_delay_channel = 1 minute;
|
||||
max_chans_per_user = 15;
|
||||
max_bans = 100;
|
||||
max_bans_large = 500;
|
||||
default_split_user_count = 0;
|
||||
default_split_server_count = 0;
|
||||
no_create_on_split = no;
|
||||
no_join_on_split = no;
|
||||
burst_topicwho = yes;
|
||||
kick_on_split_riding = no;
|
||||
only_ascii_channels = no;
|
||||
resv_forcepart = yes;
|
||||
channel_target_change = yes;
|
||||
disable_local_channels = no;
|
||||
};
|
||||
|
||||
serverhide {
|
||||
flatten_links = yes;
|
||||
links_delay = 5 minutes;
|
||||
hidden = no;
|
||||
disable_hidden = no;
|
||||
};
|
||||
|
||||
/* These are the blacklist settings.
|
||||
* You can have multiple combinations of host and rejection reasons.
|
||||
* They are used in pairs of one host/rejection reason.
|
||||
*
|
||||
* These settings should be adequate for most networks, and are (presently)
|
||||
* required for use on StaticBox.
|
||||
*
|
||||
* Word to the wise: Do not use blacklists like SPEWS for blocking IRC
|
||||
* connections.
|
||||
*
|
||||
* As of charybdis 2.2, you can do some keyword substitution on the rejection
|
||||
* reason. The available keyword substitutions are:
|
||||
*
|
||||
* ${ip} - the user's IP
|
||||
* ${host} - the user's canonical hostname
|
||||
* ${dnsbl-host} - the dnsbl hostname the lookup was done against
|
||||
* ${nick} - the user's nickname
|
||||
* ${network-name} - the name of the network
|
||||
*
|
||||
* As of charybdis 3.4, a type parameter is supported, which specifies the
|
||||
* address families the blacklist supports. IPv4 and IPv6 are supported.
|
||||
* IPv4 is currently the default as few blacklists support IPv6 operation
|
||||
* as of this writing.
|
||||
*
|
||||
* Note: AHBL (the providers of the below *.ahbl.org BLs) request that they be
|
||||
* contacted, via email, at admins@2mbit.com before using these BLs.
|
||||
* See <http://www.ahbl.org/services.php> for more information.
|
||||
*/
|
||||
blacklist {
|
||||
host = "rbl.efnetrbl.org";
|
||||
type = ipv4;
|
||||
reject_reason = "${nick}, your IP (${ip}) is listed in EFnet's RBL. For assistance, see http://efnetrbl.org/?i=${ip}";
|
||||
|
||||
# host = "ircbl.ahbl.org";
|
||||
# type = ipv4;
|
||||
# reject_reason = "${nick}, your IP (${ip}) is listed in ${dnsbl-host} for having an open proxy. In order to protect ${network-name} from abuse, we are not allowing connections with open proxies to connect.";
|
||||
#
|
||||
# host = "tor.ahbl.org";
|
||||
# type = ipv4;
|
||||
# reject_reason = "${nick}, your IP (${ip}) is listed as a TOR exit node. In order to protect ${network-name} from tor-based abuse, we are not allowing TOR exit nodes to connect to our network.";
|
||||
#
|
||||
/* Example of a blacklist that supports both IPv4 and IPv6 */
|
||||
# host = "foobl.blacklist.invalid";
|
||||
# type = ipv4, ipv6;
|
||||
# reject_reason = "${nick}, your IP (${ip}) is listed in ${dnsbl-host} for some reason. In order to protect ${network-name} from abuse, we are not allowing connections listed in ${dnsbl-host} to connect";
|
||||
};
|
||||
|
||||
alias "NickServ" {
|
||||
target = "NickServ";
|
||||
};
|
||||
|
||||
alias "ChanServ" {
|
||||
target = "ChanServ";
|
||||
};
|
||||
|
||||
alias "OperServ" {
|
||||
target = "OperServ";
|
||||
};
|
||||
|
||||
alias "MemoServ" {
|
||||
target = "MemoServ";
|
||||
};
|
||||
|
||||
alias "NS" {
|
||||
target = "NickServ";
|
||||
};
|
||||
|
||||
alias "CS" {
|
||||
target = "ChanServ";
|
||||
};
|
||||
|
||||
alias "OS" {
|
||||
target = "OperServ";
|
||||
};
|
||||
|
||||
alias "MS" {
|
||||
target = "MemoServ";
|
||||
};
|
||||
|
||||
general {
|
||||
hide_error_messages = opers;
|
||||
hide_spoof_ips = yes;
|
||||
|
||||
/*
|
||||
* default_umodes: umodes to enable on connect.
|
||||
* If you have enabled the new ip_cloaking_4.0 module, and you want
|
||||
* to make use of it, add +x to this option, i.e.:
|
||||
* default_umodes = "+ix";
|
||||
*
|
||||
* If you have enabled the old ip_cloaking module, and you want
|
||||
* to make use of it, add +h to this option, i.e.:
|
||||
* default_umodes = "+ih";
|
||||
*/
|
||||
default_umodes = "<%= @umodes_real %>";
|
||||
|
||||
default_operstring = "is an IRC Operator";
|
||||
default_adminstring = "is a Server Administrator";
|
||||
servicestring = "is a Network Service";
|
||||
disable_fake_channels = no;
|
||||
tkline_expire_notices = no;
|
||||
default_floodcount = 10;
|
||||
failed_oper_notice = yes;
|
||||
dots_in_ident=2;
|
||||
min_nonwildcard = 4;
|
||||
min_nonwildcard_simple = 3;
|
||||
max_accept = 100;
|
||||
max_monitor = 100;
|
||||
anti_nick_flood = yes;
|
||||
max_nick_time = 20 seconds;
|
||||
max_nick_changes = 5;
|
||||
anti_spam_exit_message_time = 5 minutes;
|
||||
ts_warn_delta = 30 seconds;
|
||||
ts_max_delta = 5 minutes;
|
||||
client_exit = yes;
|
||||
collision_fnc = yes;
|
||||
resv_fnc = yes;
|
||||
global_snotices = yes;
|
||||
dline_with_reason = yes;
|
||||
kline_delay = 0 seconds;
|
||||
kline_with_reason = yes;
|
||||
kline_reason = "K-Lined";
|
||||
identify_service = "NickServ@services.int";
|
||||
identify_command = "IDENTIFY";
|
||||
non_redundant_klines = yes;
|
||||
warn_no_nline = yes;
|
||||
use_propagated_bans = yes;
|
||||
stats_e_disabled = no;
|
||||
stats_c_oper_only=no;
|
||||
stats_h_oper_only=no;
|
||||
stats_y_oper_only=no;
|
||||
stats_o_oper_only=yes;
|
||||
stats_P_oper_only=no;
|
||||
stats_i_oper_only=masked;
|
||||
stats_k_oper_only=masked;
|
||||
map_oper_only = no;
|
||||
operspy_admin_only = no;
|
||||
operspy_dont_care_user_info = no;
|
||||
caller_id_wait = 1 minute;
|
||||
pace_wait_simple = 1 second;
|
||||
pace_wait = 10 seconds;
|
||||
short_motd = no;
|
||||
ping_cookie = no;
|
||||
connect_timeout = 30 seconds;
|
||||
default_ident_timeout = 5;
|
||||
<% if @ident == true -%>
|
||||
disable_auth = no;
|
||||
<% else -%>
|
||||
disable_auth = yes;
|
||||
<% end -%>
|
||||
no_oper_flood = yes;
|
||||
max_targets = 4;
|
||||
client_flood_max_lines = 20;
|
||||
use_whois_actually = no;
|
||||
oper_only_umodes = operwall, locops, servnotice;
|
||||
oper_umodes = locops, servnotice, operwall, wallop;
|
||||
oper_snomask = "+s";
|
||||
burst_away = yes;
|
||||
nick_delay = 0 seconds; # 15 minutes if you want to enable this
|
||||
reject_ban_time = 1 minute;
|
||||
reject_after_count = 3;
|
||||
reject_duration = 5 minutes;
|
||||
throttle_duration = <%= @throttle_duration %>;
|
||||
throttle_count = <%= @throttle_count %>;
|
||||
max_ratelimit_tokens = 30;
|
||||
away_interval = 30;
|
||||
};
|
||||
|
||||
modules {
|
||||
path = "modules";
|
||||
path = "modules/autoload";
|
||||
};
|
Loading…
Add table
Reference in a new issue