aboutsummaryrefslogtreecommitdiff
path: root/db
diff options
context:
space:
mode:
authorEugen Rochko <eugen@zeonfederated.com>2020-05-10 18:18:12 +0200
committerGitHub <noreply@github.com>2020-05-10 18:18:12 +0200
commit4b2d9b8a558190f8ccc51cfe67f5e151f2c3342b (patch)
treecbca015e85d901b4caa2ab25a88423b3c20d86b7 /db
parent8012fce727559ae49130a43ba6b44168f0b55d04 (diff)
downloadmastodon-4b2d9b8a558190f8ccc51cfe67f5e151f2c3342b.tar
mastodon-4b2d9b8a558190f8ccc51cfe67f5e151f2c3342b.tar.gz
mastodon-4b2d9b8a558190f8ccc51cfe67f5e151f2c3342b.tar.bz2
mastodon-4b2d9b8a558190f8ccc51cfe67f5e151f2c3342b.zip
Reset secret of web app that could have been exposed by Doorkeeper (#13688)
There are no obvious ways it could be misused, as the secret is not really used for anything, but it is best to secure it for the future Follow-up to #13613
Diffstat (limited to 'db')
-rw-r--r--db/migrate/20200510110808_reset_web_app_secret.rb15
-rw-r--r--db/schema.rb2
2 files changed, 16 insertions, 1 deletions
diff --git a/db/migrate/20200510110808_reset_web_app_secret.rb b/db/migrate/20200510110808_reset_web_app_secret.rb
new file mode 100644
index 000000000..b274844c5
--- /dev/null
+++ b/db/migrate/20200510110808_reset_web_app_secret.rb
@@ -0,0 +1,15 @@
+class ResetWebAppSecret < ActiveRecord::Migration[5.2]
+ disable_ddl_transaction!
+
+ def up
+ web_app = Doorkeeper::Application.find_by(superapp: true)
+
+ return if web_app.nil?
+
+ web_app.renew_secret
+ web_app.save!
+ end
+
+ def down
+ end
+end
diff --git a/db/schema.rb b/db/schema.rb
index 08a2335ee..31f0c96bc 100644
--- a/db/schema.rb
+++ b/db/schema.rb
@@ -10,7 +10,7 @@
#
# It's strongly recommended that you check this file into your version control system.
-ActiveRecord::Schema.define(version: 2020_05_08_212852) do
+ActiveRecord::Schema.define(version: 2020_05_10_110808) do
# These are extensions that must be enabled in order to support this database
enable_extension "plpgsql"