Open andrewandante opened 2 years ago
We could probably do something here as, in the rework, EmbedContainer will look at the returned HTML to determine the type. Can you provide a sample of the returned HTML when it's a recaptcha?
the returned HTML
Yeah it's in the issue description - that piece of HTML is the response you get (except with an actual site key rather than big_ol_string). Response code is 403.
When this happens, it returns a recaptcha/verification widget that is HTML, that should be rendered on the page for the user
Are you sure? Isn’t the challenge being presented to the webserver and not the end user?
Isn’t the challenge being presented to the webserver and not the end user?
I guess sort of? The webserver is the source, it seems - but the user has the power to say "this is legitimate". Should look something like the image in this post when rendered: https://news.ycombinator.com/item?id=23897370
Ah okay - I wasn’t sure if the user would be allowed to solve the captcha given that they’ll be coming from a different IP address, but if they can then that makes sense 😄
Affected Version
4
Description
We are seeing a lot of rate-limited responses to embedded Vimeo videos on SCPS-CCL infrastructure - I believe this is because it treats all requests as coming from the same IP, but that's beside the point. When this happens, it returns a recaptcha/verification widget that is HTML, that should be rendered on the page for the user; instead it is turned into a link that looks like this:
While admittedly that takes the user to the appropriate video, it does fundamentally look terrible and doesn't go away once clicked.
The actual response from Vimeo is something like:
So it would seem that we could pull that out, rather than just pulling out the
<h1>
and using it as the linkSteps to Reproduce
Triggering the rate-limit is hard but it happens on the SCPS-CCL infra every few months.