X-Git-Url: https://git.hcoop.net/hcoop/portal.git/blobdiff_plain/308f44e78b673e268c46ec630a05c055494089fd..c1c4be380263b5793c95deb162014930bd8aae6c:/sec.mlt diff --git a/sec.mlt b/sec.mlt index 7afdced..fd0c55e 100644 --- a/sec.mlt +++ b/sec.mlt @@ -2,7 +2,7 @@ val yourname = Init.getUserName (); val nodeNum = case $"node" of - "" => 2 + "" => 4 | node => Web.stoi node; val nodeName = Init.nodeName nodeNum; @@ -132,7 +132,7 @@ elseif $"cmd" = "open" then


- + @@ -153,7 +153,7 @@ elseif $"cmd" = "list" then


By: <% name %>
Time: <% #stamp req %>
Time: <% #stamp req %> (<% Util.diffFromNow (#stamp req) %> ago)
Node: <% Web.html (Init.nodeName (#node req)) %>
Request: <% #data req %>
Msg: <% Web.html (#msg req) %>
- + @@ -177,7 +177,7 @@ elseif $"mod" <> "" then
By: <% name %>
Time: <% #stamp req %>
Time: <% #stamp req %> (<% Util.diffFromNow (#stamp req) %> ago)
Node: <% Web.html (Init.nodeName (#node req)) %>
Request: <% #data req %>
Reason: <% Web.html (#msg req) %>
- + - +
Requestor: <% #name user %>
Time: <% #stamp req %>
Time: <% #stamp req %> (<% Util.diffFromNow (#stamp req) %> ago)
Status:
Node:
Request:
Request:
Message:
@@ -201,10 +201,8 @@ elseif $"mod" <> "" then val oldStatus = #status req; val newStatus = Sec.Req.statusFromInt (Web.stoi ($"status")); Sec.Req.modify {req with node = nodeNum, data = $"req", msg = $"msg", status = newStatus}; - if oldStatus <> newStatus then - if not (Sec.Req.notifyMod {old = oldStatus, new = newStatus, changer = Init.getUserName(), req = id}) then - %>

Error sending e-mail notification

<% - end + if not (Sec.Req.notifyMod {old = oldStatus, new = newStatus, changer = Init.getUserName(), req = id}) then + %>

Error sending e-mail notification

<% end %>

Request modified

Back to: open requests, all requests @@ -249,7 +247,11 @@ if showNormal then %> -

Request socket permissions change

+

Request change to your cron permissions

@@ -336,9 +338,11 @@ end%>

Request a new firewall rule

-

You can find a description of rule formats on our wiki. Enter here the rule you want, without the initial user portion.

+

You can find a description of rule formats on our wiki. Enter here the rule you want, without the initial user portion.

+ +

When requesting a Server or ProxiedServer rule, use a port above 50000 (there is a list of allocated ports). We may grant Server requests for ports under 50000 if it can be justified, but never for a ProxiedServer.

-

Please note that your firewall rule will be useless if you don't first request the corresponding socket privileges at the top of this page.

+

We very rarely grant requests for Client rules that don't include remote host whitelists. For example, important security concerns make it a bad idea for us to give anybody blanket IRC permissions. Instead, request specific servers. We will refuse such requests that include networks that are popularly considered fronts for illegal activity.