• src/sbbs3/js_user.c

    From Deucе@1:103/705 to Git commit to main/sbbs/master on Sun Mar 30 11:15:10 2025
    https://gitlab.synchro.net/main/sbbs/-/commit/8b40ce01caed5eb0aa91048b
    Modified Files:
    src/sbbs3/js_user.c
    Log Message:
    Workaround crash

    For now, this is a quick hacky fix. The web server does not store
    an sbbs_t in the context private, so we can't use it here.

    This needs further work.
    --- SBBSecho 3.24-Linux
    * Origin: Vertrauen - [vert/cvs/bbs].synchro.net (1:103/705)
  • From Deucе@1:103/705 to Git commit to main/sbbs/master on Sun Mar 30 11:47:39 2025
    https://gitlab.synchro.net/main/sbbs/-/commit/89d2e6c50ea27414e3df4d2f
    Modified Files:
    src/sbbs3/js_user.c
    Log Message:
    Fix terminal update

    We only do this in the terminal server... to detect this, check if the
    global object has a bbs object that is of the BBS class. If it does,
    the context private will be an sbbs_t pointer.
    --- SBBSecho 3.24-Linux
    * Origin: Vertrauen - [vert/cvs/bbs].synchro.net (1:103/705)
  • From Rob Swindell (on Windows 11)@1:103/705 to Git commit to main/sbbs/master on Tue Jun 17 20:17:38 2025
    https://gitlab.synchro.net/main/sbbs/-/commit/24226f351c85dabf3bc71713
    Modified Files:
    src/sbbs3/js_user.c
    Log Message:
    New User class methods: can_access_sub() and can_access_dir()

    Much easier and more accurate way to determine (via JS) if a specific user
    has a particular kind of access to a message sub-board or a file directory. This is accurate because it uses the 'userdat' functions under the hood, which check much more than just a single access requirement string against the user.

    Usage:
    bool can_access_sub(string sub_code or number sub_num
    [,'read', 'post', or 'operator'])
    bool can_access_dir(string dir_code or number dir_num
    [,'download', 'upload', or 'operator'])

    If no access string (second argument) is specified, then just generic "access" (e.g. for listing areas) is checked.

    The existing msg_area.sub[].can_access, can_read, can_post (and similar for file_area.dir[]) are still useful, but only for the current 'user'. If you
    want to check a different user's access to a sub-board or file directory, you really need to use these new User class methods.
    --- SBBSecho 3.28-Linux
    * Origin: Vertrauen - [vert/cvs/bbs].synchro.net (1:103/705)

Novedades:

Servidor de Quake 3 Arena Online! - Conectate a ferchobbs.ddns.net, puerto 27960 y vence con tu equipo!