Bad english corrections.
This commit is contained in:
@ -28,7 +28,7 @@ const got = require('got')
|
||||
* - server B: server that follows ours (or used to watch V, without following A)
|
||||
* - user from B connect to the B XMPP server
|
||||
* - server B has server A connection informations (got it using ActivityPub)
|
||||
* - but, when using Websocket S2S, server A needs information from B, that he never receives
|
||||
* - but, when using Websocket S2S, server A needs information from B, that it never receives
|
||||
*
|
||||
* Indeed, the XMPP S2S dialback mecanism will try to connect back to
|
||||
* server A, and transmit a secret key, to ensure that all incomming connection
|
||||
|
@ -41,7 +41,7 @@ function getCheckConfigurationChannelMiddleware (options: RegisterServerOptions)
|
||||
} else if (await isUserAdminOrModerator(options, res)) {
|
||||
logger.debug('Current user is an instance moderator or admin')
|
||||
} else {
|
||||
logger.warn('Current user tries to access a channel for which he has no right.')
|
||||
logger.warn('Current user tries to access a channel for which they has no right.')
|
||||
res.sendStatus(403)
|
||||
return
|
||||
}
|
||||
|
@ -57,7 +57,7 @@ let singleton: LivechatProsodyAuth | undefined
|
||||
*
|
||||
* The livechat tokens password are encrypted in data files.
|
||||
* The associated secret key is in the database.
|
||||
* This is to ensure an additional security level: if an attacker has access to file system, he also must have access
|
||||
* This is to ensure an additional security level: if an attacker has access to file system, they also must have access
|
||||
* to DB to get the secret key and decrypt passwords.
|
||||
*/
|
||||
export class LivechatProsodyAuth {
|
||||
|
@ -85,7 +85,7 @@ async function getProsodyFilePaths (options: RegisterServerOptions): Promise<Pro
|
||||
if (!(await fs.promises.stat(settings['prosody-certificates-dir'] as string)).isDirectory()) {
|
||||
// We can throw an exception here...
|
||||
// Because if the user input a wrong directory, the plugin will not register,
|
||||
// and he will never be able to fix the conf
|
||||
// and they will never be able to fix the conf.
|
||||
logger.error('Certificate directory does not exist or is not a directory')
|
||||
certsDir = undefined
|
||||
} else {
|
||||
|
@ -415,7 +415,7 @@ class ProsodyConfigContent {
|
||||
// Using direct S2S for outgoing connection can be an issue, if the local instance dont allow incomming S2S.
|
||||
// Indeed, the remote instance will not necessarely be able to discover the Websocket Endpoint.
|
||||
// To be sure the remote instance knows the websocket endpoint, we must use Websocket for the firt outgoing connect.
|
||||
// So, we will add a parameter for mod_s2s_peertubelivechat, to tell him not to use outgoint s2s connection.
|
||||
// So, we will add a parameter for mod_s2s_peertubelivechat, to tell them not to use outgoin s2s connection.
|
||||
this.global.set('s2s_peertubelivechat_no_outgoing_directs2s_to_peertube', s2sPort === null)
|
||||
|
||||
this.muc.add('modules_enabled', 'dialback') // This allows s2s connections without certicicates!
|
||||
|
@ -20,7 +20,7 @@ async function initPromoteApiRouter (options: RegisterServerOptions, router: Rou
|
||||
const user = await options.peertubeHelpers.user.getAuthUser(res)
|
||||
|
||||
if (!user || !await isUserAdminOrModerator(options, res)) {
|
||||
logger.warn('Current user tries to access the promote API for which he has no right.')
|
||||
logger.warn('Current user tries to access the promote API for which they has no right.')
|
||||
res.sendStatus(403)
|
||||
return
|
||||
}
|
||||
|
Reference in New Issue
Block a user