Browse Source

Fix OEmbed leaking information about existence of non-public statuses (#12930)

master^2
Eugen Rochko 4 years ago
committed by GitHub
parent
commit
c4c315ea40
No known key found for this signature in database GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 13 additions and 5 deletions
  1. +11
    -3
      app/controllers/api/oembed_controller.rb
  2. +2
    -2
      app/controllers/statuses_controller.rb

+ 11
- 3
app/controllers/api/oembed_controller.rb View File

@@ -1,17 +1,25 @@
# frozen_string_literal: true

class Api::OEmbedController < Api::BaseController
respond_to :json

skip_before_action :require_authenticated_user!

before_action :set_status
before_action :require_public_status!

def show
@status = status_finder.status
render json: @status, serializer: OEmbedSerializer, width: maxwidth_or_default, height: maxheight_or_default
end

private

def set_status
@status = status_finder.status
end

def require_public_status!
not_found if @status.hidden?
end

def status_finder
StatusFinder.new(params[:url])
end


+ 2
- 2
app/controllers/statuses_controller.rb View File

@@ -46,7 +46,7 @@ class StatusesController < ApplicationController
end

def embed
raise ActiveRecord::RecordNotFound if @status.hidden?
return not_found if @status.hidden?

expires_in 180, public: true
response.headers['X-Frame-Options'] = 'ALLOWALL'
@@ -68,7 +68,7 @@ class StatusesController < ApplicationController
@status = @account.statuses.find(params[:id])
authorize @status, :show?
rescue Mastodon::NotPermittedError
raise ActiveRecord::RecordNotFound
not_found
end

def set_instance_presenter


Loading…
Cancel
Save