diff --git a/irc/connection_limits/limiter.go b/irc/connection_limits/limiter.go index 11d1d666..0a4e3813 100644 --- a/irc/connection_limits/limiter.go +++ b/irc/connection_limits/limiter.go @@ -12,11 +12,12 @@ import ( // LimiterConfig controls the automated connection limits. type LimiterConfig struct { - Enabled bool - CidrLenIPv4 int `yaml:"cidr-len-ipv4"` - CidrLenIPv6 int `yaml:"cidr-len-ipv6"` - IPsPerCidr int `yaml:"ips-per-subnet"` - Exempted []string + Enabled bool + CidrLenIPv4 int `yaml:"cidr-len-ipv4"` + CidrLenIPv6 int `yaml:"cidr-len-ipv6"` + ConnsPerSubnet int `yaml:"connections-per-subnet"` + IPsPerSubnet int `yaml:"ips-per-subnet"` // legacy name for ConnsPerSubnet + Exempted []string } var ( @@ -145,7 +146,11 @@ func (cl *Limiter) ApplyConfig(config LimiterConfig) error { cl.ipv6Mask = net.CIDRMask(config.CidrLenIPv6, 128) // subnetLimit is explicitly NOT capped at a minimum of one. // this is so that CL config can be used to allow ONLY clients from exempted IPs/nets - cl.subnetLimit = config.IPsPerCidr + cl.subnetLimit = config.ConnsPerSubnet + // but: check if the current key was left unset, but the legacy was set: + if cl.subnetLimit == 0 && config.IPsPerSubnet != 0 { + cl.subnetLimit = config.IPsPerSubnet + } cl.exemptedIPs = exemptedIPs cl.exemptedNets = exemptedNets diff --git a/oragono.yaml b/oragono.yaml index d32a50db..d154bc9b 100644 --- a/oragono.yaml +++ b/oragono.yaml @@ -100,8 +100,8 @@ server: # how wide the cidr should be for IPv6 cidr-len-ipv6: 64 - # maximum number of IPs per subnet (defined above by the cird length) - ips-per-subnet: 16 + # maximum concurrent connections per subnet (defined above by the cidr length) + connections-per-subnet: 16 # IPs/networks which are exempted from connection limits exempted: