doc: Cleanup trailing whitespace
This commit is contained in:
parent
2b535500f9
commit
5c0df0e743
4 changed files with 41 additions and 41 deletions
|
@ -59,7 +59,7 @@ serverinfo {
|
|||
#vhost = "192.0.2.6";
|
||||
/* for IPv6 */
|
||||
#vhost6 = "2001:db8:2::6";
|
||||
|
||||
|
||||
/* ssl_private_key: our ssl private key */
|
||||
ssl_private_key = "etc/ssl.key";
|
||||
|
||||
|
@ -183,7 +183,7 @@ auth {
|
|||
* flags = ...; below if it is.
|
||||
*/
|
||||
password = "letmein";
|
||||
|
||||
|
||||
/* spoof: fake the users user@host to be be this. You may either
|
||||
* specify a host or a user@host to spoof to. This is free-form,
|
||||
* just do everyone a favour and dont abuse it. (OLD I: = flag)
|
||||
|
@ -191,7 +191,7 @@ auth {
|
|||
spoof = "I.still.hate.packets";
|
||||
|
||||
/* Possible flags in auth:
|
||||
*
|
||||
*
|
||||
* encrypted | password is encrypted with mkpasswd
|
||||
* spoof_notice | give a notice when spoofing hosts
|
||||
* exceed_limit (old > flag) | allow user to exceed class user limits
|
||||
|
@ -210,7 +210,7 @@ auth {
|
|||
* need_sasl | require SASL id for user in this class
|
||||
*/
|
||||
flags = kline_exempt, exceed_limit;
|
||||
|
||||
|
||||
/* class: the class the user is placed in */
|
||||
class = "opers";
|
||||
};
|
||||
|
@ -253,13 +253,13 @@ operator "god" {
|
|||
user = "*god@127.0.0.1";
|
||||
|
||||
/* password: the password required to oper. Unless ~encrypted is
|
||||
* contained in flags = ...; this will need to be encrypted using
|
||||
* contained in flags = ...; this will need to be encrypted using
|
||||
* mkpasswd, MD5 is supported
|
||||
*/
|
||||
password = "etcnjl8juSU1E";
|
||||
|
||||
/* rsa key: the public key for this oper when using Challenge.
|
||||
* A password should not be defined when this is used, see
|
||||
* A password should not be defined when this is used, see
|
||||
* doc/challenge.txt for more information.
|
||||
*/
|
||||
#rsa_public_key_file = "/usr/local/ircd/etc/oper.pub";
|
||||
|
@ -400,10 +400,10 @@ serverhide {
|
|||
* as of this writing.
|
||||
*
|
||||
* As of charybdis 3.5, a matches parameter is allowed; if omitted, any result
|
||||
* is considered a match. If included, a comma-separated list of *quoted*
|
||||
* is considered a match. If included, a comma-separated list of *quoted*
|
||||
* strings is allowed to match queries. They may be of the format "0" to "255"
|
||||
* to match the final octet (e.g. 127.0.0.1) or "127.x.y.z" to explicitly match
|
||||
* an A record. The blacklist is only applied if it matches anything in the
|
||||
* an A record. The blacklist is only applied if it matches anything in the
|
||||
* list. You may freely mix full IP's and final octets.
|
||||
*
|
||||
* Consult your blacklist provider for the meaning of these parameters; they
|
||||
|
|
|
@ -28,15 +28,15 @@
|
|||
*
|
||||
* Times/durations are written as:
|
||||
* 12 hours 30 minutes 1 second
|
||||
*
|
||||
*
|
||||
* Valid units of time:
|
||||
* month, week, day, hour, minute, second
|
||||
*
|
||||
* Valid units of size:
|
||||
* megabyte/mbyte/mb, kilobyte/kbyte/kb, byte
|
||||
*
|
||||
* Sizes and times may be singular or plural.
|
||||
*/
|
||||
* Sizes and times may be singular or plural.
|
||||
*/
|
||||
|
||||
/* Extensions:
|
||||
*
|
||||
|
@ -145,7 +145,7 @@ serverinfo {
|
|||
* This should be an ipv6 IP only.
|
||||
*/
|
||||
#vhost6 = "2001:db7:2::6";
|
||||
|
||||
|
||||
/* ssl_private_key: our ssl private key */
|
||||
ssl_private_key = "etc/ssl.key";
|
||||
|
||||
|
@ -247,7 +247,7 @@ class "users" {
|
|||
*/
|
||||
cidr_ipv6_bitlen = 64;
|
||||
|
||||
/* number_per_cidr: Number of connections to allow from a subnet of the
|
||||
/* number_per_cidr: Number of connections to allow from a subnet of the
|
||||
* size given in cidr_ipv4_bitlen/cidr_ipv6_bitlen.
|
||||
* 4 seems to be a good default to me.
|
||||
*/
|
||||
|
@ -309,19 +309,19 @@ listen {
|
|||
/* port: the specific port to listen on. if no host is specified
|
||||
* before, it will listen on all available IPs.
|
||||
*
|
||||
* sslport: the specific port to listen ssl connections on. if no
|
||||
* sslport: the specific port to listen ssl connections on. if no
|
||||
* host is specified before, it will listen on all available IPs.
|
||||
*
|
||||
* ports are seperated via a comma, a range may be specified using ".."
|
||||
*/
|
||||
|
||||
|
||||
/* port: listen on all available IPs, ports 5000 and 6665 to 6669 */
|
||||
port = 5000, 6665 .. 6669;
|
||||
|
||||
|
||||
/* sslport: listen for ssl connections on all available IPs, port 9999 */
|
||||
sslport = 9999;
|
||||
|
||||
/* host: set a specific IP/host the ports after the line will listen
|
||||
/* host: set a specific IP/host the ports after the line will listen
|
||||
* on. This may be ipv4 or ipv6.
|
||||
*/
|
||||
host = "192.0.2.6";
|
||||
|
@ -355,7 +355,7 @@ auth {
|
|||
* flags = ...; below if it is.
|
||||
*/
|
||||
password = "letmein";
|
||||
|
||||
|
||||
/* spoof: fake the users user@host to be be this. You may either
|
||||
* specify a host or a user@host to spoof to. This is free-form,
|
||||
* just do everyone a favour and dont abuse it. (OLD I: = flag)
|
||||
|
@ -363,7 +363,7 @@ auth {
|
|||
spoof = "I.still.hate.packets";
|
||||
|
||||
/* Possible flags in auth:
|
||||
*
|
||||
*
|
||||
* encrypted | password is encrypted with mkpasswd
|
||||
* spoof_notice | give a notice when spoofing hosts
|
||||
* exceed_limit (old > flag) | allow user to exceed class user limits
|
||||
|
@ -383,7 +383,7 @@ auth {
|
|||
* extend_chans | allow this user to join more channels than normal
|
||||
*/
|
||||
flags = kline_exempt, exceed_limit;
|
||||
|
||||
|
||||
/* class: the class the user is placed in */
|
||||
class = "opers";
|
||||
};
|
||||
|
@ -395,7 +395,7 @@ auth {
|
|||
*/
|
||||
redirserv = "irc.example.net";
|
||||
redirport = 6667;
|
||||
|
||||
|
||||
user = "*.example.com";
|
||||
|
||||
/* class: a class is required even though it is not used */
|
||||
|
@ -470,13 +470,13 @@ operator "god" {
|
|||
user = "*@127.0.0.1";
|
||||
|
||||
/* password: the password required to oper. Unless ~encrypted is
|
||||
* contained in flags = ...; this will need to be encrypted using
|
||||
* contained in flags = ...; this will need to be encrypted using
|
||||
* mkpasswd, MD5 is supported
|
||||
*/
|
||||
password = "etcnjl8juSU1E";
|
||||
|
||||
/* rsa key: the public key for this oper when using Challenge.
|
||||
* A password should not be defined when this is used, see
|
||||
* A password should not be defined when this is used, see
|
||||
* doc/challenge.txt for more information.
|
||||
*/
|
||||
#rsa_public_key_file = "/usr/local/ircd/etc/oper.pub";
|
||||
|
@ -765,7 +765,7 @@ channel {
|
|||
default_split_user_count = 0;
|
||||
|
||||
/* split servers: when the amount of servers that have acknowledged
|
||||
* theyve finished bursting is lower than this, consider ourselves
|
||||
* theyve finished bursting is lower than this, consider ourselves
|
||||
* split. this must be set for automatic splitmode
|
||||
*/
|
||||
default_split_server_count = 0;
|
||||
|
@ -880,7 +880,7 @@ serverhide {
|
|||
* to match the final octet (e.g. 127.0.0.1) or "127.x.y.z" to explicitly match
|
||||
* an A record. The blacklist is only applied if it matches anything in the
|
||||
* list. You may freely mix full IP's and final octets.
|
||||
*
|
||||
*
|
||||
* Consult your blacklist provider for the meaning of these parameters; they
|
||||
* are usually used to denote different ban types.
|
||||
*/
|
||||
|
@ -1012,7 +1012,7 @@ general {
|
|||
*/
|
||||
default_floodcount = 10;
|
||||
|
||||
/* failed oper notice: send a notice to all opers on the server when
|
||||
/* failed oper notice: send a notice to all opers on the server when
|
||||
* someone tries to OPER and uses the wrong password, host or ident.
|
||||
*/
|
||||
failed_oper_notice = yes;
|
||||
|
@ -1084,19 +1084,19 @@ general {
|
|||
* displayed unconditionally.
|
||||
*/
|
||||
global_snotices = yes;
|
||||
|
||||
/* dline reason: show the user the dline reason when they connect
|
||||
|
||||
/* dline reason: show the user the dline reason when they connect
|
||||
* and are dlined.
|
||||
*/
|
||||
dline_with_reason = yes;
|
||||
|
||||
|
||||
/* kline delay: delay the checking of klines until a specified time.
|
||||
* Useful if large kline lists are applied often to prevent the
|
||||
* server eating CPU.
|
||||
*/
|
||||
kline_delay = 0 seconds;
|
||||
|
||||
/* kline reason: show the user the reason why they are k/dlined
|
||||
/* kline reason: show the user the reason why they are k/dlined
|
||||
* on exit. may give away who set k/dline when set via tcm.
|
||||
*/
|
||||
kline_with_reason = yes;
|
||||
|
@ -1118,7 +1118,7 @@ general {
|
|||
non_redundant_klines = yes;
|
||||
|
||||
/* warn no nline: warn opers about servers that try to connect but
|
||||
* we dont have a connect {} block for. Twits with misconfigured
|
||||
* we dont have a connect {} block for. Twits with misconfigured
|
||||
* servers can get really annoying with this enabled.
|
||||
*/
|
||||
warn_no_nline = yes;
|
||||
|
@ -1148,7 +1148,7 @@ general {
|
|||
stats_o_oper_only=yes;
|
||||
|
||||
/* stats P oper only: make stats P (ports) oper only
|
||||
* NOTE: users doing stats P will never be given the ips that the
|
||||
* NOTE: users doing stats P will never be given the ips that the
|
||||
* server listens on, simply the ports.
|
||||
*/
|
||||
stats_P_oper_only=no;
|
||||
|
@ -1222,8 +1222,8 @@ general {
|
|||
|
||||
/* REMOVE ME. The following line checks you've been reading. */
|
||||
havent_read_conf = yes;
|
||||
|
||||
/* max targets: the maximum amount of targets in a single
|
||||
|
||||
/* max targets: the maximum amount of targets in a single
|
||||
* PRIVMSG/NOTICE. set to 999 NOT 0 for unlimited.
|
||||
*/
|
||||
max_targets = 4;
|
||||
|
@ -1237,7 +1237,7 @@ general {
|
|||
*
|
||||
* +g - callerid - Server Side Ignore
|
||||
* +D - deaf - Don't see channel messages
|
||||
* +i - invisible - Not shown in NAMES or WHO unless you share a
|
||||
* +i - invisible - Not shown in NAMES or WHO unless you share a
|
||||
* a channel
|
||||
* +l - locops - See LOCOPS messages
|
||||
* +Q - noforward - Unaffected by channel forwarding
|
||||
|
@ -1246,7 +1246,7 @@ general {
|
|||
* +w - wallop - See oper and server generated WALLOPS
|
||||
* +z - operwall - See operwalls
|
||||
*/
|
||||
|
||||
|
||||
/* oper only umodes: usermodes only opers may set */
|
||||
oper_only_umodes = operwall, locops, servnotice;
|
||||
|
||||
|
@ -1258,7 +1258,7 @@ general {
|
|||
oper_snomask = "+s";
|
||||
|
||||
/* compression level: level of compression for compressed links between
|
||||
* servers.
|
||||
* servers.
|
||||
*
|
||||
* values are between: 1 (least compression, fastest)
|
||||
* and: 9 (most compression, slowest).
|
||||
|
@ -1339,7 +1339,7 @@ general {
|
|||
};
|
||||
|
||||
modules {
|
||||
/* module path: paths to search for modules specified below and
|
||||
/* module path: paths to search for modules specified below and
|
||||
* in /modload.
|
||||
*/
|
||||
path = "/usr/local/ircd/modules";
|
||||
|
|
|
@ -6,7 +6,7 @@ contrib/example_module.c, this document simply describes which hooks are
|
|||
available.
|
||||
|
||||
There are various hook structures available that may be passed to hooks:
|
||||
hook_data - struct Client *client; const void *arg1;
|
||||
hook_data - struct Client *client; const void *arg1;
|
||||
const void *arg2;
|
||||
hook_data_int - struct Client *client; const void *arg1; int arg2;
|
||||
hook_data_client - struct Client *client; struct Client *target;
|
||||
|
@ -114,7 +114,7 @@ The following hooks are called during various events related to clients.
|
|||
oldsnomask = new snomask field
|
||||
|
||||
|
||||
The following are for debugging and take struct hook_io_data for arguments.
|
||||
The following are for debugging and take struct hook_io_data for arguments.
|
||||
These can be used for a variety of purposes, but are aimed at the developer
|
||||
community.
|
||||
"iosend"
|
||||
|
|
|
@ -94,7 +94,7 @@ Section 3.3: Initialising and rehashing
|
|||
To initialise, call init_host_hash(). This only needs to be done once on
|
||||
startup.
|
||||
On rehash, to wipe out the old unwanted conf, and free them if there are
|
||||
no references to them, call clear_out_address_conf().
|
||||
no references to them, call clear_out_address_conf().
|
||||
|
||||
Section 3.4: Finding IP/host confs
|
||||
----------------------------------
|
||||
|
|
Loading…
Reference in a new issue