Compare commits

..

38 commits

Author SHA1 Message Date
0d3a660419
[MOD] Modify UserDeactivate and remove UserDeactivateWithInfo. 2023-09-21 08:24:02 +02:00
15d0ffb0f4
[FIX] Do some cosmetic changes to the route(see #36) 2023-09-21 08:05:30 +02:00
2d1c51beca
[FIX] Fix memory leakages when deactivating multiple times. 2023-09-20 08:10:50 +02:00
1550a6ad29 [FIX] Start fixing merging conflicts 2023-09-17 20:50:17 +02:00
5ee6031602 Add change log entry for #35. 2023-09-17 20:47:27 +02:00
9bcf45d8eb [FIX] Fix last commit's mistakes 2023-09-17 20:20:43 +02:00
f15991c737 [FIX] Fix gitignore a bit, and remove man pages 2023-09-17 20:17:54 +02:00
e4ee22fa73
[ADD] Update changelog. 2023-09-17 20:05:59 +02:00
84f96a720f [ADD] Implement #27 2023-09-17 20:03:09 +02:00
6247085df1 Add change log entry for #35. 2023-09-11 11:01:50 -04:00
LoaD Accumulator
0172fa083b Fixes issue #33 related to a memory issue, and format some code. (#35)
Fixes #33.

Co-authored-by: LoaD Accumulator <lda@freetards.xyz>
Reviewed-on: Telodendria/telodendria#35
Co-authored-by: LoaD Accumulator <lda@noreply.git.telodendria.io>
Co-committed-by: LoaD Accumulator <lda@noreply.git.telodendria.io>
2023-09-11 10:57:16 -04:00
0b820b80f7 Convert configuration documentation. 2023-09-09 17:43:43 -04:00
6dcfa7dc02 Remove send-patch and tp. See #20. 2023-09-09 16:58:47 -04:00
024482d4e8 Put the finishing touches on CONTRIBUTING.md. 2023-09-09 16:57:52 -04:00
7a091c5b93 Add contributing documentation. 2023-09-09 16:50:38 -04:00
9e8523d92e Fix issue config. 2023-09-09 15:39:12 -04:00
419017bcc9 Don't allow blank issues. 2023-09-09 15:36:58 -04:00
1a009e87c3 Fix a few small bugs in Gitea templates. 2023-09-09 15:32:43 -04:00
08594e0fb1 Add Gitea issue templates. 2023-09-09 15:28:33 -04:00
56508afe4c Merge branch 'master' of https://git.telodendria.io/telodendria/telodendria 2023-09-09 00:12:07 -04:00
ac3582ddeb Fix table rendering in stats.md 2023-09-09 00:12:00 -04:00
61f7ab1040 Fix table rendering in stats.md 2023-09-09 00:11:32 -04:00
a672c05112 Finish moving over current Administrator API documentation. 2023-09-09 00:03:09 -04:00
09023089f5 Another typo. 2023-09-08 23:27:55 -04:00
6d6fd1645c Fix typo in privileges.md. 2023-09-08 23:27:14 -04:00
043c2e9e33 Add privileges documentation. 2023-09-08 23:26:47 -04:00
9e2f047e82 Fix typo in docs/user/admin/README.md 2023-09-08 17:23:06 -04:00
c78d075a93 Add admin documentation home page. 2023-09-08 17:22:24 -04:00
e4a217550f Add logo and center title. 2023-09-08 16:40:33 -04:00
d50372a91a Add technical rationale document. 2023-09-08 16:34:27 -04:00
fa3b5e95bd Add a nice README which will serve as the basis for the website. 2023-09-08 16:04:48 -04:00
7033a1f0b1 Add repository structure documentation. 2023-09-08 12:12:07 -04:00
f6c54cbc7f Add setup documentation. 2023-09-08 11:58:54 -04:00
3cb04417ff Add porting instructions. 2023-09-07 21:53:22 -04:00
93e6582db5 Add usage and install documentation. 2023-09-07 21:10:46 -04:00
ee62d31c68 Add documentation home page. 2023-09-07 20:23:40 -04:00
4bd527aa9a Remove old change log. 2023-09-07 20:06:12 -04:00
79ce36c860 Add CHANGELOG.md 2023-09-07 19:53:56 -04:00
7 changed files with 176 additions and 5 deletions

View file

@ -24,6 +24,11 @@ The following endpoints were added:
- Fixed a double-free in `RouteUserProfile()` that would cause errors with certain - Fixed a double-free in `RouteUserProfile()` that would cause errors with certain
Matrix clients. (#35) Matrix clients. (#35)
### New Features
Implemented `/_telodendria/admin/deactivate/[localpart]` for admins to be able to
deactivate users.
## v0.3.0 ## v0.3.0
**Saturday, June 10, 2023** **Saturday, June 10, 2023**

View file

@ -86,6 +86,7 @@ RouterBuild(void)
R("/_telodendria/admin/config", RouteConfig); R("/_telodendria/admin/config", RouteConfig);
R("/_telodendria/admin/privileges", RoutePrivileges); R("/_telodendria/admin/privileges", RoutePrivileges);
R("/_telodendria/admin/privileges/(.*)", RoutePrivileges); R("/_telodendria/admin/privileges/(.*)", RoutePrivileges);
R("/_telodendria/admin/deactivate/(.*)", RouteAdminDeactivate);
#undef R #undef R

View file

@ -0,0 +1,117 @@
/*
* Copyright (C) 2022-2023 Jordan Bancino <@jordan:bancino.net>
*
* Permission is hereby granted, free of charge, to any person
* obtaining a copy of this software and associated documentation files
* (the "Software"), to deal in the Software without restriction,
* including without limitation the rights to use, copy, modify, merge,
* publish, distribute, sublicense, and/or sell copies of the Software,
* and to permit persons to whom the Software is furnished to do so,
* subject to the following conditions:
*
* The above copyright notice and this permission notice shall be
* included in all copies or portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
*/
#include <Routes.h>
#include <Json.h>
#include <HashMap.h>
#include <Str.h>
#include <User.h>
#include <Log.h>
ROUTE_IMPL(RouteAdminDeactivate, path, argp)
{
RouteArgs *args = argp;
HashMap *request = NULL;
HashMap *response = NULL;
JsonValue *val;
char *reason = "Deactivated by admin";
char *removedLocalpart = ArrayGet(path, 0);
char *token;
Db *db = args->matrixArgs->db;
User *user = NULL;
User *removed = NULL;
HttpRequestMethod method = HttpRequestMethodGet(args->context);
if ((method != HTTP_DELETE) && (method != HTTP_PUT))
{
char * msg = "Route only supports DELETE and PUT as for now.";
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
return MatrixErrorCreate(M_UNRECOGNIZED, msg);
}
if (method == HTTP_DELETE)
{
request = JsonDecode(HttpServerStream(args->context));
if (!request)
{
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
return MatrixErrorCreate(M_NOT_JSON, NULL);
}
val = HashMapGet(request, "reason");
if (val && JsonValueType(val) == JSON_STRING)
{
reason = JsonValueAsString(val);
}
}
response = MatrixGetAccessToken(args->context, &token);
if (response)
{
goto finish;
}
user = UserAuthenticate(db, token);
removed = UserLock(db, removedLocalpart);
if (!user || !removed)
{
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_UNKNOWN_TOKEN, NULL);
goto finish;
}
if (!(UserGetPrivileges(user) & USER_DEACTIVATE))
{
char * msg = "User doesn't have the DEACTIVATE privilege.";
HttpResponseStatus(args->context, HTTP_FORBIDDEN);
response = MatrixErrorCreate(M_FORBIDDEN, msg);
goto finish;
}
if (method == HTTP_DELETE)
{
UserDeactivate(removed, UserGetName(user), reason);
response = HashMapCreate();
JsonSet(response, JsonValueString(removedLocalpart), 1, "user");
JsonSet(response, JsonValueString(reason), 1, "reason");
JsonSet(response, JsonValueString(UserGetName(user)), 1, "banned_by");
}
else
{
UserReactivate(removed);
HttpResponseStatus(args->context, HTTP_NO_CONTENT);
}
finish:
UserUnlock(user);
UserUnlock(removed);
JsonFree(request);
return response;
}

View file

@ -126,7 +126,7 @@ ROUTE_IMPL(RouteDeactivate, path, argp)
goto finish; goto finish;
} }
if (!UserDeleteTokens(user, NULL) || !UserDeactivate(user)) if (!UserDeleteTokens(user, NULL) || !UserDeactivate(user, NULL, NULL))
{ {
HttpResponseStatus(args->context, HTTP_INTERNAL_SERVER_ERROR); HttpResponseStatus(args->context, HTTP_INTERNAL_SERVER_ERROR);
response = MatrixErrorCreate(M_UNKNOWN, NULL); response = MatrixErrorCreate(M_UNKNOWN, NULL);

View file

@ -429,7 +429,40 @@ UserSetPassword(User * user, char *password)
} }
int int
UserDeactivate(User * user) UserDeactivate(User * user, char * from, char * reason)
{
HashMap *json;
JsonValue *val;
if (!user)
{
return 0;
}
/* By default, it's the target's username */
if (!from)
{
from = UserGetName(user);
}
json = DbJson(user->ref);
JsonValueFree(HashMapSet(json, "deactivated", JsonValueBoolean(1)));
val = JsonValueString(from);
JsonValueFree(JsonSet(json, val, 2, "deactivate", "by"));
if (reason)
{
val = JsonValueString(reason);
JsonValueFree(JsonSet(json, val, 2, "deactivate", "reason"));
}
return 1;
}
int
UserReactivate(User * user)
{ {
HashMap *json; HashMap *json;
@ -440,7 +473,10 @@ UserDeactivate(User * user)
json = DbJson(user->ref); json = DbJson(user->ref);
JsonValueFree(HashMapSet(json, "deactivated", JsonValueBoolean(1)));
JsonValueFree(HashMapSet(json, "deactivated", JsonValueBoolean(0)));
JsonValueFree(HashMapDelete(json, "deactivate"));
return 1; return 1;
} }

View file

@ -103,6 +103,8 @@ ROUTE(RouteCreateRoom);
ROUTE(RouteAliasDirectory); ROUTE(RouteAliasDirectory);
ROUTE(RouteRoomAliases); ROUTE(RouteRoomAliases);
ROUTE(RouteAdminDeactivate);
#undef ROUTE #undef ROUTE
#endif #endif

View file

@ -199,14 +199,24 @@ extern int UserSetPassword(User *, char *);
* is to prevent future users from pretending to be a previous user * is to prevent future users from pretending to be a previous user
* of a given localpart. The user is logged out; all access tokens are * of a given localpart. The user is logged out; all access tokens are
* invalidated. * invalidated.
* Additionally, it stores information on who deactivated the account
* (be it an admin or the user itself), and why. If the user
* responsible for deactivating the target user is NULL, then it is
* set to the target's own name.
*/ */
extern int UserDeactivate(User *); extern int UserDeactivate(User *, char *, char *);
/**
* Reactivates the given user account if it has been deactvated with
* .Fn UserDeactivate ,
* otherwise, it simply doesn't do anything.
*/
extern int UserReactivate(User *);
/** /**
* Return a boolean value indicating whether or not the user was * Return a boolean value indicating whether or not the user was
* deactivated using * deactivated using
* .Fn UserDeactivate . * .Fn UserDeactivate .
* Note that once deactivated, users cannot be reactivated.
*/ */
extern int UserDeactivated(User *); extern int UserDeactivated(User *);