Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature Request] Expire after reading N times. #51

Open
AbstractUmbra opened this issue May 31, 2024 · 7 comments
Open

[Feature Request] Expire after reading N times. #51

AbstractUmbra opened this issue May 31, 2024 · 7 comments
Assignees

Comments

@AbstractUmbra
Copy link
Collaborator

Niche feature, I know, but good for "secure" pastes you only want to be read once.

We already filter out things like Discord's user agent, so very easy to send a paste over discord, someone views it, it burns.
Or have it read 10 times and it be gone before the 11th.

@EvieePy
Copy link
Member

EvieePy commented May 31, 2024

By view once do you mean once per user? Because this is basically impossible, or do you mean total amount of views?

@AbstractUmbra
Copy link
Collaborator Author

Total views by anyone/thing.

@EvieePy
Copy link
Member

EvieePy commented May 31, 2024

What if bots somehow consume the views?

@EvieePy
Copy link
Member

EvieePy commented May 31, 2024

Or would these pastes always have a password or potentially differnt URL path?

@AbstractUmbra
Copy link
Collaborator Author

A risk to be taken, but this feature is on many other paste services (and personally a favourite of mines haha)

@EvieePy
Copy link
Member

EvieePy commented Jun 15, 2024

To clarify:

If you create the paste on the frontend and you view the paste with your session cookie, does this count? Or does this session cookie get immunity?

Further to the above point, creating the paste on the frontend vs API is currently different, the former always consumes a view automatically, is this considered a view?

Should every self detonating paste require a password?

@AbstractUmbra
Copy link
Collaborator Author

The session cookie would get immunity, yes. Otherwise the "view" just after creation would consume a view from the bucket as it were.

Yes, the paste creation via the frontend consumes a view so ideally this would fall into the above, where the session cookie is present and thus is immune to consuming a view (although a refresh removes that cookie and WOULD consume a view, if my understanding of the current implementation is correct).

A password would be optional I believe, but I'm open to it being a necessity.

@LostLuma LostLuma self-assigned this Oct 16, 2024
@LostLuma LostLuma mentioned this issue Nov 13, 2024
12 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants