X-Git-Url: https://git.hcoop.net/hcoop/portal.git/blobdiff_plain/d5cb549c4142a5952e259caa202764cc2f53c12e..47ea7c948ab73a626681f1f75f42a67921c0ca9f:/sec.mlt diff --git a/sec.mlt b/sec.mlt index f29c9fd..020c0f9 100644 --- a/sec.mlt +++ b/sec.mlt @@ -13,7 +13,6 @@ val uname = case $"uname" of val socks = Sec.socketPerms {node = nodeNum, uname = uname}; val tpe = Sec.isTpe {node = nodeNum, uname = uname}; val cron = Sec.cronAllowed {node = nodeNum, uname = uname}; -val ftp = Sec.ftpAllowed {node = nodeNum, uname = uname}; ref showNormal = true; @@ -55,20 +54,6 @@ elseif $"cmd" = "cron2" then %>

Error sending e-mail notification

<% end %>

Request added

<% - -elseif $"cmd" = "ftp" then - showNormal := false; - val ftp = iff $"ftp" = "yes" then "enabled" else "disabled"; - %>Are you sure you want to request that FTP permissions for <% Web.html uname %> on <% Web.html nodeName %> be <% ftp %>?
- ">Yes, place the request!<% -elseif $"cmd" = "ftp2" then - val ftp = iff $"ftp" = "enabled" then "enable" else "disable"; - val id = Sec.Req.add {usr = you, node = nodeNum, data = String.concat [uname, ": ", ftp, " FTP access"], msg = $"msg"}; - if not (Sec.Req.notifyNew id) then - %>

Error sending e-mail notification

<% - end - %>

Request added

<% - elseif $"cmd" = "rule" then showNormal := false; val rule = $"rule"; @@ -226,135 +211,9 @@ elseif $"mod" <> "" then <% end; -if showNormal then %> - - - - - - - - - - - - -
Machines:
Your users:
- - - -

Request change to your cron permissions

- -
- - - - - - - -
Allowed to use cron?
Reason:
-
- -

Request change to your FTP permissions

- -

Please read our wiki instructions on file transfer before requesting FTP access. Almost everyone should use alternative protocols to FTP that provide superior security benefits.

- -
- - - - - - - -
Allowed to use FTP?
Reason:
-
- -<% val rules = Sec.findFirewallRules {node = nodeNum, uname = uname}; -switch rules of - _::_ => %> -

Your firewall rules

- -<% foreach rule in rules do %> -
- - - - -[Request deletion] - -

-<% end -end%> - -

Request a new firewall rule

- -

You can find a description of rule formats on our wiki. Enter here the rule you want, without the initial user portion. We also allow all members access to some services if they are commonly requested.

- -

When requesting a Server or ProxiedServer rule, use a port above 50000 (there is a list of allocated ports). We may grant Server requests for ports under 50000 if it can be justified, but never for a ProxiedServer.

- -

We very rarely grant requests for Client rules that don't include remote host whitelists. For example, important security concerns make it a bad idea for us to give anybody blanket IRC permissions. Instead, request specific servers. We will refuse such requests that include networks that are popularly considered fronts for illegal activity.

- -
- - - - - - - -
Rule
Reason:
-
- -<% end %> +if showNormal then + @secnormal [("uname", [uname]), + ("nodeNum", [Int.toString nodeNum])]; +end %> <% @footer[] %> \ No newline at end of file