Samx Here
n1udSecurity


Server : Apache
System : Linux ks5.tuic.fr 6.1.0-18-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.76-1 (2024-02-01) x86_64
User : pragmatice ( 1003)
PHP Version : 8.2.24
Disable Function : NONE
Directory :  /tmp/tsx-1023/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //tmp/tsx-1023/17180-eddf06787e39ef261061b7dfde477dce7e37fddb
{"code":"(()=>{\n\"use strict\";var __defProp=Object.defineProperty;var __name=(target,value)=>__defProp(target,\"name\",{value,configurable:true});const authorManager=require(\"./AuthorManager\");const hooks=require(\"../../static/js/pluginfw/hooks.js\");const padManager=require(\"./PadManager\");const readOnlyManager=require(\"./ReadOnlyManager\");const sessionManager=require(\"./SessionManager\");const settings=require(\"../utils/Settings\");const webaccess=require(\"../hooks/express/webaccess\");const log4js=require(\"log4js\");const authLogger=log4js.getLogger(\"auth\");const{padutils}=require(\"../../static/js/pad_utils\");const DENY=Object.freeze({accessStatus:\"deny\"});exports.checkAccess=async(padID,sessionCookie,token,userSettings)=>{if(!padID){authLogger.debug(\"access denied: missing padID\");return DENY}let canCreate=!settings.editOnly;if(readOnlyManager.isReadOnlyId(padID)){canCreate=false;padID=await readOnlyManager.getPadId(padID);if(padID==null){authLogger.debug(\"access denied: read-only pad ID for a pad that does not exist\");return DENY}}if(settings.loadTest){console.warn(\"bypassing socket.io authentication and authorization checks due to settings.loadTest\")}else if(settings.requireAuthentication){if(userSettings==null){authLogger.debug(\"access denied: authentication is required\");return DENY}if(userSettings.canCreate!=null&&!userSettings.canCreate)canCreate=false;if(userSettings.readOnly)canCreate=false;const padAuthzs=userSettings.padAuthorizations||{};const level=webaccess.normalizeAuthzLevel(padAuthzs[padID]);if(!level){authLogger.debug(\"access denied: unauthorized\");return DENY}if(level!==\"create\")canCreate=false}const isFalse=__name(x=>x===false,\"isFalse\");if(hooks.callAll(\"onAccessCheck\",{padID,token,sessionCookie}).some(isFalse)){authLogger.debug(\"access denied: an onAccessCheck hook function returned false\");return DENY}const padExists=await padManager.doesPadExist(padID);if(!padExists&&!canCreate){authLogger.debug(\"access denied: user attempted to create a pad, which is prohibited\");return DENY}const sessionAuthorID=await sessionManager.findAuthorID(padID.split(\"$\")[0],sessionCookie);if(settings.requireSession&&!sessionAuthorID){authLogger.debug(\"access denied: HTTP API session is required\");return DENY}if(!sessionAuthorID&&token!=null&&!padutils.isValidAuthorToken(token)){authLogger.debug(\"access denied: invalid author token\");return DENY}const grant={accessStatus:\"grant\",authorID:sessionAuthorID||await authorManager.getAuthorId(token,userSettings)};if(!padID.includes(\"$\")){return grant}if(!padExists){if(sessionAuthorID==null){authLogger.debug(\"access denied: must have an HTTP API session to create a group pad\");return DENY}return grant}const pad=await padManager.getPad(padID);if(!pad.getPublicStatus()&&sessionAuthorID==null){authLogger.debug(\"access denied: must have an HTTP API session to access private group pads\");return DENY}return grant};\n})()\n","warnings":[],"map":{"version":3,"mappings":";+HAuBA,MAAM,cAAgB,QAAQ,iBAAiB,EAC/C,MAAM,MAAQ,QAAQ,mCAAmC,EACzD,MAAM,WAAa,QAAQ,cAAc,EACzC,MAAM,gBAAkB,QAAQ,mBAAmB,EACnD,MAAM,eAAiB,QAAQ,kBAAkB,EACjD,MAAM,SAAW,QAAQ,mBAAmB,EAC5C,MAAM,UAAY,QAAQ,4BAA4B,EACtD,MAAM,OAAS,QAAQ,QAAQ,EAC/B,MAAM,WAAa,OAAO,UAAU,MAAM,EAC1C,KAAM,CAAC,QAAQ,EAAI,QAAQ,2BAA2B,EAEtD,MAAM,KAAO,OAAO,OAAO,CAAC,aAAc,MAAM,CAAC,EAyBjD,QAAQ,YAAc,MAAO,MAAc,cAAsB,MAAc,eAAoC,CACjH,GAAI,CAAC,MAAO,CACV,WAAW,MAAM,8BAA8B,EAC/C,OAAO,IACT,CAEA,IAAI,UAAY,CAAC,SAAS,SAE1B,GAAI,gBAAgB,aAAa,KAAK,EAAG,CACvC,UAAY,MACZ,MAAQ,MAAM,gBAAgB,SAAS,KAAK,EAC5C,GAAI,OAAS,KAAM,CACjB,WAAW,MAAM,+DAA+D,EAChF,OAAO,IACT,CACF,CAGA,GAAI,SAAS,SAAU,CACrB,QAAQ,KACJ,sFAAsF,CAC5F,SAAW,SAAS,sBAAuB,CACzC,GAAI,cAAgB,KAAM,CACxB,WAAW,MAAM,2CAA2C,EAC5D,OAAO,IACT,CACA,GAAI,aAAa,WAAa,MAAQ,CAAC,aAAa,UAAW,UAAY,MAC3E,GAAI,aAAa,SAAU,UAAY,MAGvC,MAAM,UAAY,aAAa,mBAAqB,CAAC,EACrD,MAAM,MAAQ,UAAU,oBAAoB,UAAU,KAAK,CAAC,EAC5D,GAAI,CAAC,MAAO,CACV,WAAW,MAAM,6BAA6B,EAC9C,OAAO,IACT,CACA,GAAI,QAAU,SAAU,UAAY,KACtC,CAGA,MAAM,QAAU,OAAC,GAAc,IAAM,MAArB,WAChB,GAAI,MAAM,QAAQ,gBAAiB,CAAC,MAAO,MAAO,aAAa,CAAC,EAAE,KAAK,OAAO,EAAG,CAC/E,WAAW,MAAM,8DAA8D,EAC/E,OAAO,IACT,CAEA,MAAM,UAAY,MAAM,WAAW,aAAa,KAAK,EACrD,GAAI,CAAC,WAAa,CAAC,UAAW,CAC5B,WAAW,MAAM,oEAAoE,EACrF,OAAO,IACT,CAEA,MAAM,gBAAkB,MAAM,eAAe,aAAa,MAAM,MAAM,GAAG,EAAE,CAAC,EAAG,aAAa,EAC5F,GAAI,SAAS,gBAAkB,CAAC,gBAAiB,CAC/C,WAAW,MAAM,6CAA6C,EAC9D,OAAO,IACT,CACA,GAAI,CAAC,iBAAmB,OAAS,MAAQ,CAAC,SAAS,mBAAmB,KAAK,EAAG,CAE5E,WAAW,MAAM,qCAAqC,EACtD,OAAO,IACT,CAEA,MAAM,MAAQ,CACZ,aAAc,QACd,SAAU,iBAAmB,MAAM,cAAc,YAAY,MAAO,YAAY,CAClF,EAEA,GAAI,CAAC,MAAM,SAAS,GAAG,EAAG,CAExB,OAAO,KACT,CAEA,GAAI,CAAC,UAAW,CACd,GAAI,iBAAmB,KAAM,CAC3B,WAAW,MAAM,oEAAoE,EACrF,OAAO,IACT,CAEA,OAAO,KACT,CAEA,MAAM,IAAM,MAAM,WAAW,OAAO,KAAK,EAEzC,GAAI,CAAC,IAAI,gBAAgB,GAAK,iBAAmB,KAAM,CACrD,WAAW,MAAM,2EAA2E,EAC5F,OAAO,IACT,CAEA,OAAO,KACT","names":[],"ignoreList":[],"sources":["/home/etherpad/src/node/db/SecurityManager.ts"],"sourcesContent":[null]}}

SAMX