summaryrefslogtreecommitdiff
path: root/src/network
diff options
context:
space:
mode:
authorPatric Stout <truebrain@openttd.org>2021-04-28 23:09:03 +0200
committerGitHub <noreply@github.com>2021-04-28 23:09:03 +0200
commit96dc0d04ecb12ee83909782b9a2c39f336de7d9a (patch)
tree5d93f7e26b76dfb6f80448932624dd5957e51fb1 /src/network
parent8e9eca6dddf238c77f01d93afcefcca262447e98 (diff)
downloadopenttd-96dc0d04ecb12ee83909782b9a2c39f336de7d9a.tar.xz
Fix b3003dd1: swap SERVER_GAME_INFO with CLIENT_GAME_INFO (#9129)
The idea is that if you query an older server that does not support this packet yet, the client receives an error. The assumption was that on every "illegal packet" the connection would be closed. This turns out to be false. Now CLIENT_GAME_INFO aligns with the old PACKET_CLIENT_NEWGRFS_CHECKED, which does a pre-check (which fails), and an error is sent back and the connection is closed. This is not a nice solution, but it is the best we got.
Diffstat (limited to 'src/network')
-rw-r--r--src/network/core/tcp_game.h2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/network/core/tcp_game.h b/src/network/core/tcp_game.h
index 6dcc0bd01..5fe9cd465 100644
--- a/src/network/core/tcp_game.h
+++ b/src/network/core/tcp_game.h
@@ -43,8 +43,8 @@ enum PacketGameType {
PACKET_SERVER_COMPANY_INFO, ///< Information about a single company.
/* Packets used to get the game info. */
- PACKET_CLIENT_GAME_INFO, ///< Request information about the server.
PACKET_SERVER_GAME_INFO, ///< Information about the server.
+ PACKET_CLIENT_GAME_INFO, ///< Request information about the server.
/*
* Packets after here assume that the client