Change default settings for more privacy

This commit is contained in:
Mike Macgirvin 2023-12-20 09:49:54 +11:00
parent d7a3d8a083
commit fffbb3b789
9 changed files with 14 additions and 13 deletions

View file

@ -885,7 +885,7 @@ class Activity
$activity['directMessage'] = true;
}
$actor = self::encode_person(($item['author'], false);
$actor = self::encode_person($item['author'], false);
if ($actor) {
$activity['actor'] = $actor;
} else {

View file

@ -151,7 +151,7 @@ class Security
'$title' => t('Administration'),
'$page' => t('Security'),
'$form_security_token' => get_form_security_token('admin_security'),
'$require_authenticated_fetch' => ['require_authenticated_fetch', t('Require signed fetch requests'), Config::Get('system','require_authenticated_fetch'), ''],
'$require_authenticated_fetch' => ['require_authenticated_fetch', t('Require signed fetch requests'), Config::Get('system','require_authenticated_fetch', true), ''],
'$accept_unsigned_relay' => ['accept_unsigned_relay', t('Accept unsigned relayed activities'), Config::Get('system','accept_unsigned_relay'),''],
'$block_public_search' => array('block_public_search', t("Block public search"), get_config('system', 'block_public_search', 1), t("Prevent access to search content unless you are currently authenticated.")),
'$block_public_dir' => ['block_public_directory', t('Block directory from visitors'), get_config('system', 'block_public_directory', true), t('Only allow authenticated access to directory.')],

View file

@ -34,7 +34,7 @@ class Album extends Controller
http_status_exit(403, 'Permission denied');
}
observer_auth($portable_id);
} elseif (Config::get('system', 'require_authenticated_fetch', false)) {
} elseif (Config::Get('system', 'require_authenticated_fetch', true)) {
http_status_exit(403, 'Permission denied');
}

View file

@ -149,7 +149,7 @@ class Channel extends Controller
observer_auth($portable_id);
}
elseif (Config::Get('system', 'require_authenticated_fetch', false)) {
elseif (Config::Get('system', 'require_authenticated_fetch', true)) {
http_status_exit(403, 'Permission denied');
}
@ -184,8 +184,9 @@ class Channel extends Controller
if ($s && $s[0]['hubloc_sitekey'] && $s[0]['site_crypto']) {
$data = json_encode(Crypto::encapsulate($data, $s[0]['hubloc_sitekey'], Libzot::best_algorithm($s[0]['site_crypto'])));
}
} else {
if (Config::Get('system', 'require_authenticated_fetch', false)) {
}
else {
if (Config::Get('system', 'require_authenticated_fetch', true)) {
http_status_exit(403, 'Permission denied');
}
$data = json_encode(Libzot::zotinfo(['guid_hash' => $channel['channel_hash']]));

View file

@ -99,7 +99,7 @@ class Item extends Controller
dbesc($r[0]['parent_mid']),
dbesc($portable_id)
);
} elseif (Config::Get('system', 'require_authenticated_fetch', false)) {
} elseif (Config::Get('system', 'require_authenticated_fetch', true)) {
http_status_exit(403, 'Permission denied');
}
// if we don't have a parent id belonging to the signer see if we can obtain one as a visitor that we have permission to access
@ -249,7 +249,7 @@ class Item extends Controller
dbesc($portable_id)
);
}
elseif (Config::Get('system', 'require_authenticated_fetch', false)) {
elseif (Config::Get('system', 'require_authenticated_fetch', true)) {
http_status_exit(403, 'Permission denied');
}

View file

@ -56,7 +56,7 @@ class Lists extends Controller
http_status_exit(403, 'Permission denied');
}
observer_auth($portable_id);
} elseif (Config::Get('system', 'require_authenticated_fetch')) {
} elseif (Config::Get('system', 'require_authenticated_fetch', true)) {
http_status_exit(403, 'Permission denied');
}

View file

@ -155,7 +155,7 @@ class New_channel extends Controller
intval($aid)
);
if ($r && (!intval($r[0]['total']))) {
$default_role = get_config('system', 'default_permissions_role', 'social');
$default_role = get_config('system', 'default_permissions_role', 'social_restricted');
}
$limit = ServiceClass::account_fetch(get_account_id(), 'total_identities');
@ -187,7 +187,7 @@ class New_channel extends Controller
$name = ['name', t('Channel name'), ((x($_REQUEST, 'name')) ? $_REQUEST['name'] : ''), $name_help, "*"];
$nickname = ['nickname', t('Choose a short nickname'), ((x($_REQUEST, 'nickname')) ? $_REQUEST['nickname'] : ''), $nick_help, "*"];
$role = ['permissions_role', t('Channel role and privacy'), ($privacy_role) ?: 'social', t('Select a channel permission role compatible with your usage needs and privacy requirements.'), $perm_roles];
$role = ['permissions_role', t('Channel role and privacy'), ($privacy_role) ?: 'social_restricted', t('Select a channel permission role compatible with your usage needs and privacy requirements.'), $perm_roles];
return replace_macros(Theme::get_template('new_channel.tpl'), [
'$title' => t('Create a Channel'),

View file

@ -229,7 +229,7 @@ class Outbox extends Controller
http_status_exit(403, 'Permission denied');
}
observer_auth($portable_id);
} elseif (Config::Get('system', 'require_authenticated_fetch', false)) {
} elseif (Config::Get('system', 'require_authenticated_fetch', true)) {
http_status_exit(403, 'Permission denied');
}
$observer_hash = get_observer_hash();

View file

@ -33,7 +33,7 @@ class Photo extends Controller
http_status_exit(403, 'Permission denied');
}
observer_auth($portable_id);
} elseif (Config::Get('system', 'require_authenticated_fetch', false)) {
} elseif (Config::Get('system', 'require_authenticated_fetch', true)) {
http_status_exit(403, 'Permission denied');
}