<html>
    <head>
      <base href="https://bugzilla.icculus.org/" />
    </head>
    <body><span class="vcard"><a class="email" href="mailto:use.less01@gmail.com" title="James Canete <use.less01@gmail.com>"> <span class="fn">James Canete</span></a>
</span> changed
              <a class="bz_bug_link 
          bz_status_NEW "
   title="NEW - Team Arena Single Player broken, always spectator"
   href="https://bugzilla.icculus.org/show_bug.cgi?id=6030">bug 6030</a>
          <br>
             <table border="1" cellspacing="0" cellpadding="8">
          <tr>
            <th>What</th>
            <th>Removed</th>
            <th>Added</th>
          </tr>

         <tr>
           <td style="text-align:right;">Attachment #3387 is obsolete</td>
           <td>
                
           </td>
           <td>1
           </td>
         </tr></table>
      <p>
        <div>
            <b><a class="bz_bug_link 
          bz_status_NEW "
   title="NEW - Team Arena Single Player broken, always spectator"
   href="https://bugzilla.icculus.org/show_bug.cgi?id=6030#c9">Comment # 9</a>
              on <a class="bz_bug_link 
          bz_status_NEW "
   title="NEW - Team Arena Single Player broken, always spectator"
   href="https://bugzilla.icculus.org/show_bug.cgi?id=6030">bug 6030</a>
              from <span class="vcard"><a class="email" href="mailto:use.less01@gmail.com" title="James Canete <use.less01@gmail.com>"> <span class="fn">James Canete</span></a>
</span></b>
        <pre>Created <span class=""><a href="attachment.cgi?id=3575&action=diff" name="attach_3575" title="allow early team command v2">attachment 3575</a> <a href="attachment.cgi?id=3575&action=edit" title="allow early team command v2">[details]</a></span>
allow early team command v2

Well, no-one seems to have thought about this patch for a while, so I decided
to think about it.

It seems safe to me.  The only behavior changed is when a local client requests
a team change when it's technically not connected.  The UDP spoofing protection
in Netchan_Process() in net_chan.c should prevent any spoofed messages from
triggering this code path, and if that's not reliable, all bets are already
off.

The only change I would make is to re-enable the initial connected check and
add an exception for a local client, to avoid always calling the trap_Argv()
syscall.

Changes attached.</pre>
        </div>
      </p>
      <hr>
      <span>You are receiving this mail because:</span>
      
      <ul>
          <li>You are the QA Contact for the bug.</li>
      </ul>
    </body>
</html>