Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-07-24 | squash! Expose expires_at datetime in mastoAPI only for the activity actor | Mike Verdone | |
NOTE: rewrite the commit msg | |||
2019-07-24 | Merge branch 'develop' into feature/digest-email | Roman Chvanikov | |
2019-07-24 | Expose expires_at datetime in mastoAPI only for the activity actor | Mike Verdone | |
In the "pleroma" section of the MastoAPI for status activities you can see an expires_at item that states when the activity will expire, or nothing if the activity will not expire. The expires_at date is only visible to the person who posted the activity. This is the conservative approach in case some attacker decides to write a logger for expiring posts. However, in the future of OCAP, signed requests, and all that stuff, this attack might not be that likely. Some other pleroma dev should remove the restriction in the code at that time, if they're satisfied with the security implications of doing so. | |||
2019-07-24 | Require that ephemeral posts live for at least one hour | Mike Verdone | |
If we didn't put some kind of lifetime requirement on these, I guess you could annoy people by sending large numbers of ephemeral posts that provoke notifications but then disappear before anyone can read them. | |||
2019-07-24 | Add support for activity expiration to common and Masto API | Mike Verdone | |
The "expires_at" parameter accepts an ISO8601-formatted date which defines when the activity will expire. At this point the API will not give you any feedback about if your post will expire or not. | |||
2019-07-24 | Add activity expiration worker | Mike Verdone | |
This is a worker that runs every minute and deletes expired activities. It's based heavily on the scheduled activities worker. | |||
2019-07-24 | Add activity expirations table | Mike Verdone | |
Add a table to store activity expirations. An activity can have zero or one expirations. The expiration has a scheduled_at field which stores the time at which the activity should expire and be deleted. | |||
2019-07-24 | Cleanup: fix a comment | Mike Verdone | |
2019-07-24 | check both item and parent domain blocks | sadposter | |
2019-07-24 | honour domain blocks on streaming notifications | Sadposter | |
2019-07-23 | Merge branch 'feature/admin-api-user-statuses' into 'develop' | kaniini | |
Admin API: Endpoint for fetching latest user's statuses See merge request pleroma/pleroma!1413 | |||
2019-07-23 | rich media: parser: splice the given URL into the result | Ariadne Conill | |
2019-07-24 | Merge branch 'develop' into feature/admin-api-user-statuses | Maxim Filippov | |
2019-07-24 | AdminAPI: Add "godmode" while fetching user statuses (i.e. admin can see ↵ | Maxim Filippov | |
private statuses) | |||
2019-07-23 | Admin config fix | Alexander Strizhakov | |
2019-07-23 | tests for Pleroma.Web.ActivityPub.Publisher | Maksim | |
2019-07-23 | Merge branch 'bugfix/unauthed-liked-by' into 'develop' | kaniini | |
Bugfix: don't error out on unauthorized request to liked/favourited_by See merge request pleroma/pleroma!1474 | |||
2019-07-23 | Merge branch 'fix/subscriber-notifications' into 'develop' | kaniini | |
Do not notify subscribers for messages from users which are replies to others See merge request pleroma/pleroma!1477 | |||
2019-07-23 | Fix test | Mark Felder | |
2019-07-23 | Do not notify subscribers for messages from users which are replies to others | Mark Felder | |
2019-07-23 | signature: properly deduce the actor from misskey key IDs | Ariadne Conill | |
2019-07-23 | fix test names because i cannot type | Sadposter | |
2019-07-23 | actually reblog on the reblog test | Sadposter | |
2019-07-23 | Use correct URL for tests | Sadposter | |
2019-07-23 | Mix format | Sadposter | |
2019-07-23 | add tests for unauthed reqs to liked/reblogged_by | Sadposter | |
2019-07-23 | remove pry | Maxim Filippov | |
2019-07-22 | Exclude tests that use :crypt.crypt/2 on macOS | Sergey Suprunenko | |
2019-07-22 | Feature/1087 wildcard option for blocks | Alexander Strizhakov | |
2019-07-22 | Merge branch 'hardening/stop-misusing-sharedinbox' into 'develop' | Haelwenn | |
activitypub: publisher: align sharedinbox usage with AP specification rules See merge request pleroma/pleroma!1464 | |||
2019-07-22 | Bugfix: muted/blocked user notification streaming | Sadposter | |
2019-07-22 | Add tests for users tasks and PleromaAuthenticator | Sergey Suprunenko | |
2019-07-22 | Hide blocked users from interactions | Sadposter | |
2019-07-22 | activitypub: publisher: align sharedinbox usage with AP specification rules | Ariadne Conill | |
While debugging the follow breakage, I observed that our sharedInbox usage did not match the rules in the specification. Accordingly, I have better aligned our usage of sharedInbox with the rules outlined in the ActivityPub specification. | |||
2019-07-20 | Resolve merge conflicts | rinpatch | |
2019-07-20 | Merge branch 'develop' into feature/digest-email | Roman Chvanikov | |
2019-07-20 | [tests] Mock :crypt.crypt/2 function in AuthenticationPlugTest | Sergey Suprunenko | |
2019-07-20 | Merge develop | Roman Chvanikov | |
2019-07-19 | Merge branch 'feature/richmedia-ttl' into 'develop' | kaniini | |
add the rich media ttl based on image exp time See merge request pleroma/pleroma!1438 | |||
2019-07-19 | Merge branch 'refactor/http-signature-plug' into 'develop' | kaniini | |
http signature plug: separation of concerns See merge request pleroma/pleroma!1449 | |||
2019-07-19 | #1110 fixed /api/pleroma/healthcheck | Maksim | |
2019-07-19 | change the structure of image ttl parsar | Sachin Joshi | |
2019-07-18 | Merge branch 'develop' into feature/admin-api-user-statuses | Maxim Filippov | |
2019-07-18 | mapped signature plug: use `user` assign like authentication plug | Ariadne Conill | |
2019-07-18 | tests for Plugs.AuthenticationPlug | Maksim | |
2019-07-18 | tests: add tests for mapped signature plug | Ariadne Conill | |
2019-07-18 | http signature plug: remove redundant checks handled by HTTPSignatures library | Ariadne Conill | |
the redundant checks assumed a POST request, which will not work for signed GETs. this check was originally needed because the HTTPSignatures adapter assumed that the requests were also POST requests. but now, the adapter has been corrected. | |||
2019-07-18 | Merge branch 'feature/signed-object-fetches' into 'develop' | kaniini | |
signed object fetches See merge request pleroma/pleroma!1446 | |||
2019-07-18 | tests for Uploader with webhook | Maksim | |
2019-07-17 | tests: add tests for signed object fetches | Ariadne Conill | |