server+client: add ability to configure allowed file types
This commit is contained in:
parent
7a82e9d581
commit
0709d739df
9 changed files with 116 additions and 36 deletions
|
@ -100,6 +100,10 @@ class Api extends events.EventTarget {
|
||||||
return remoteConfig.contactEmail;
|
return remoteConfig.contactEmail;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
getAllowedExtensions() {
|
||||||
|
return remoteConfig.allowedExtensions;
|
||||||
|
}
|
||||||
|
|
||||||
canSendMails() {
|
canSendMails() {
|
||||||
return !!remoteConfig.canSendMails;
|
return !!remoteConfig.canSendMails;
|
||||||
}
|
}
|
||||||
|
|
|
@ -161,11 +161,14 @@ class PostUploadView extends events.EventTarget {
|
||||||
return this._uploadables.findIndex((u2) => u.key === u2.key);
|
return this._uploadables.findIndex((u2) => u.key === u2.key);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
let allowedExtensions = api.getAllowedExtensions().map(
|
||||||
|
function(e) {return "." + e}
|
||||||
|
);
|
||||||
this._contentFileDropper = new FileDropperControl(
|
this._contentFileDropper = new FileDropperControl(
|
||||||
this._contentInputNode,
|
this._contentInputNode,
|
||||||
{
|
{
|
||||||
extraText:
|
extraText:
|
||||||
"Allowed extensions: .jpg, .png, .gif, .webm, .mp4, .swf, .avif, .heif, .heic",
|
"Allowed extensions: " + allowedExtensions.join(", "),
|
||||||
allowUrls: true,
|
allowUrls: true,
|
||||||
allowMultiple: true,
|
allowMultiple: true,
|
||||||
lock: false,
|
lock: false,
|
||||||
|
|
|
@ -29,6 +29,18 @@ convert:
|
||||||
to_webm: false
|
to_webm: false
|
||||||
to_mp4: false
|
to_mp4: false
|
||||||
|
|
||||||
|
# specify which MIME types are allowed
|
||||||
|
allowed_mime_types:
|
||||||
|
- image/jpeg
|
||||||
|
- image/png
|
||||||
|
- image/gif
|
||||||
|
- video/webm
|
||||||
|
- video/mp4
|
||||||
|
- application/x-shockwave-flash
|
||||||
|
- image/avif
|
||||||
|
- image/heif
|
||||||
|
- image/heic
|
||||||
|
|
||||||
# allow posts to be uploaded even if some image processing errors occur
|
# allow posts to be uploaded even if some image processing errors occur
|
||||||
allow_broken_uploads: false
|
allow_broken_uploads: false
|
||||||
|
|
||||||
|
|
|
@ -3,7 +3,7 @@ from datetime import datetime, timedelta
|
||||||
from typing import Dict, Optional
|
from typing import Dict, Optional
|
||||||
|
|
||||||
from szurubooru import config, rest
|
from szurubooru import config, rest
|
||||||
from szurubooru.func import auth, posts, users, util
|
from szurubooru.func import auth, mime, posts, users, util
|
||||||
|
|
||||||
_cache_time = None # type: Optional[datetime]
|
_cache_time = None # type: Optional[datetime]
|
||||||
_cache_result = None # type: Optional[int]
|
_cache_result = None # type: Optional[int]
|
||||||
|
@ -49,6 +49,11 @@ def get_info(ctx: rest.Context, _params: Dict[str, str] = {}) -> rest.Response:
|
||||||
"privileges": util.snake_case_to_lower_camel_case_keys(
|
"privileges": util.snake_case_to_lower_camel_case_keys(
|
||||||
config.config["privileges"]
|
config.config["privileges"]
|
||||||
),
|
),
|
||||||
|
"allowedExtensions": [
|
||||||
|
mime.MIME_EXTENSIONS_MAP[i]
|
||||||
|
for i in config.config["allowed_mime_types"]
|
||||||
|
if i in mime.MIME_EXTENSIONS_MAP
|
||||||
|
],
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
if auth.has_privilege(ctx.user, "posts:view:featured"):
|
if auth.has_privilege(ctx.user, "posts:view:featured"):
|
||||||
|
|
|
@ -1,6 +1,33 @@
|
||||||
import re
|
import re
|
||||||
|
from collections import ChainMap
|
||||||
from typing import Optional
|
from typing import Optional
|
||||||
|
|
||||||
|
MIME_TYPES_MAP = {
|
||||||
|
"image": {
|
||||||
|
"image/gif": "gif",
|
||||||
|
"image/jpeg": "jpg",
|
||||||
|
"image/png": "png",
|
||||||
|
"image/webp": "webp",
|
||||||
|
"image/bmp": "bmp",
|
||||||
|
"image/avif": "avif",
|
||||||
|
"image/heif": "heif",
|
||||||
|
"image/heic": "heic",
|
||||||
|
},
|
||||||
|
"video": {
|
||||||
|
"application/ogg": None,
|
||||||
|
"video/mp4": "mp4",
|
||||||
|
"video/quicktime": "mov",
|
||||||
|
"video/webm": "webm",
|
||||||
|
},
|
||||||
|
"flash": {
|
||||||
|
"application/x-shockwave-flash": "swf"
|
||||||
|
},
|
||||||
|
"other": {
|
||||||
|
"application/octet-stream": "dat",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
MIME_EXTENSIONS_MAP = ChainMap(*MIME_TYPES_MAP.values())
|
||||||
|
|
||||||
|
|
||||||
def get_mime_type(content: bytes) -> str:
|
def get_mime_type(content: bytes) -> str:
|
||||||
if not content:
|
if not content:
|
||||||
|
@ -46,48 +73,19 @@ def get_mime_type(content: bytes) -> str:
|
||||||
|
|
||||||
|
|
||||||
def get_extension(mime_type: str) -> Optional[str]:
|
def get_extension(mime_type: str) -> Optional[str]:
|
||||||
extension_map = {
|
return MIME_EXTENSIONS_MAP.get((mime_type or "").strip().lower(), None)
|
||||||
"application/x-shockwave-flash": "swf",
|
|
||||||
"image/gif": "gif",
|
|
||||||
"image/jpeg": "jpg",
|
|
||||||
"image/png": "png",
|
|
||||||
"image/webp": "webp",
|
|
||||||
"image/bmp": "bmp",
|
|
||||||
"image/avif": "avif",
|
|
||||||
"image/heif": "heif",
|
|
||||||
"image/heic": "heic",
|
|
||||||
"video/mp4": "mp4",
|
|
||||||
"video/quicktime": "mov",
|
|
||||||
"video/webm": "webm",
|
|
||||||
"application/octet-stream": "dat",
|
|
||||||
}
|
|
||||||
return extension_map.get((mime_type or "").strip().lower(), None)
|
|
||||||
|
|
||||||
|
|
||||||
def is_flash(mime_type: str) -> bool:
|
def is_flash(mime_type: str) -> bool:
|
||||||
return mime_type.lower() == "application/x-shockwave-flash"
|
return mime_type.lower() in MIME_TYPES_MAP["flash"]
|
||||||
|
|
||||||
|
|
||||||
def is_video(mime_type: str) -> bool:
|
def is_video(mime_type: str) -> bool:
|
||||||
return mime_type.lower() in (
|
return mime_type.lower() in MIME_TYPES_MAP["video"]
|
||||||
"application/ogg",
|
|
||||||
"video/mp4",
|
|
||||||
"video/quicktime",
|
|
||||||
"video/webm",
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
def is_image(mime_type: str) -> bool:
|
def is_image(mime_type: str) -> bool:
|
||||||
return mime_type.lower() in (
|
return mime_type.lower() in MIME_TYPES_MAP["image"]
|
||||||
"image/jpeg",
|
|
||||||
"image/png",
|
|
||||||
"image/gif",
|
|
||||||
"image/webp",
|
|
||||||
"image/bmp",
|
|
||||||
"image/avif",
|
|
||||||
"image/heif",
|
|
||||||
"image/heic",
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
def is_animated_gif(content: bytes) -> bool:
|
def is_animated_gif(content: bytes) -> bool:
|
||||||
|
|
|
@ -611,7 +611,11 @@ def update_post_content(post: model.Post, content: Optional[bytes]) -> None:
|
||||||
|
|
||||||
update_signature = False
|
update_signature = False
|
||||||
post.mime_type = mime.get_mime_type(content)
|
post.mime_type = mime.get_mime_type(content)
|
||||||
if mime.is_flash(post.mime_type):
|
if post.mime_type not in config.config["allowed_mime_types"]:
|
||||||
|
raise InvalidPostContentError(
|
||||||
|
"File type not allowed: %r" % post.mime_type
|
||||||
|
)
|
||||||
|
elif mime.is_flash(post.mime_type):
|
||||||
post.type = model.Post.TYPE_FLASH
|
post.type = model.Post.TYPE_FLASH
|
||||||
elif mime.is_image(post.mime_type):
|
elif mime.is_image(post.mime_type):
|
||||||
update_signature = True
|
update_signature = True
|
||||||
|
|
|
@ -34,6 +34,7 @@ def test_info_api(
|
||||||
"smtp": {
|
"smtp": {
|
||||||
"host": "example.com",
|
"host": "example.com",
|
||||||
},
|
},
|
||||||
|
"allowed_mime_types": ["application/octet-stream"],
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
db.session.add_all([post_factory(), post_factory()])
|
db.session.add_all([post_factory(), post_factory()])
|
||||||
|
@ -54,6 +55,7 @@ def test_info_api(
|
||||||
"posts:view:featured": "regular",
|
"posts:view:featured": "regular",
|
||||||
},
|
},
|
||||||
"canSendMails": True,
|
"canSendMails": True,
|
||||||
|
"allowedExtensions": ["dat"],
|
||||||
}
|
}
|
||||||
|
|
||||||
with fake_datetime("2016-01-01 13:00"):
|
with fake_datetime("2016-01-01 13:00"):
|
||||||
|
|
|
@ -343,6 +343,10 @@ def test_errors_not_spending_ids(
|
||||||
"uploads:use_downloader": model.User.RANK_POWER,
|
"uploads:use_downloader": model.User.RANK_POWER,
|
||||||
},
|
},
|
||||||
"secret": "test",
|
"secret": "test",
|
||||||
|
"allowed_mime_types": [
|
||||||
|
"image/png",
|
||||||
|
"image/jpeg",
|
||||||
|
],
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
auth_user = user_factory(rank=model.User.RANK_REGULAR)
|
auth_user = user_factory(rank=model.User.RANK_REGULAR)
|
||||||
|
|
|
@ -489,6 +489,18 @@ def test_update_post_content_for_new_post(
|
||||||
},
|
},
|
||||||
"secret": "test",
|
"secret": "test",
|
||||||
"allow_broken_uploads": False,
|
"allow_broken_uploads": False,
|
||||||
|
"allowed_mime_types": [
|
||||||
|
"image/png",
|
||||||
|
"image/jpeg",
|
||||||
|
"image/gif",
|
||||||
|
"image/bmp",
|
||||||
|
"image/avif",
|
||||||
|
"image/heic",
|
||||||
|
"image/heif",
|
||||||
|
"video/webm",
|
||||||
|
"video/mp4",
|
||||||
|
"application/x-shockwave-flash",
|
||||||
|
],
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
output_file_path = "{}/data/posts/{}".format(tmpdir, output_file_name)
|
output_file_path = "{}/data/posts/{}".format(tmpdir, output_file_name)
|
||||||
|
@ -526,6 +538,7 @@ def test_update_post_content_to_existing_content(
|
||||||
},
|
},
|
||||||
"secret": "test",
|
"secret": "test",
|
||||||
"allow_broken_uploads": False,
|
"allow_broken_uploads": False,
|
||||||
|
"allowed_mime_types": ["image/png"],
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
post = post_factory()
|
post = post_factory()
|
||||||
|
@ -553,6 +566,7 @@ def test_update_post_content_with_broken_content(
|
||||||
},
|
},
|
||||||
"secret": "test",
|
"secret": "test",
|
||||||
"allow_broken_uploads": allow_broken_uploads,
|
"allow_broken_uploads": allow_broken_uploads,
|
||||||
|
"allowed_mime_types": ["image/png"],
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
post = post_factory()
|
post = post_factory()
|
||||||
|
@ -576,6 +590,7 @@ def test_update_post_content_with_invalid_content(
|
||||||
config_injector(
|
config_injector(
|
||||||
{
|
{
|
||||||
"allow_broken_uploads": True,
|
"allow_broken_uploads": True,
|
||||||
|
"allowed_mime_types": ["application/octet-stream"],
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
post = model.Post()
|
post = model.Post()
|
||||||
|
@ -583,6 +598,29 @@ def test_update_post_content_with_invalid_content(
|
||||||
posts.update_post_content(post, input_content)
|
posts.update_post_content(post, input_content)
|
||||||
|
|
||||||
|
|
||||||
|
def test_update_post_content_with_unallowed_mime_type(
|
||||||
|
tmpdir, config_injector, post_factory, read_asset
|
||||||
|
):
|
||||||
|
config_injector(
|
||||||
|
{
|
||||||
|
"data_dir": str(tmpdir.mkdir("data")),
|
||||||
|
"thumbnails": {
|
||||||
|
"post_width": 300,
|
||||||
|
"post_height": 300,
|
||||||
|
},
|
||||||
|
"secret": "test",
|
||||||
|
"allow_broken_uploads": False,
|
||||||
|
"allowed_mime_types": [],
|
||||||
|
}
|
||||||
|
)
|
||||||
|
post = post_factory()
|
||||||
|
db.session.add(post)
|
||||||
|
db.session.flush()
|
||||||
|
content = read_asset("png.png")
|
||||||
|
with pytest.raises(posts.InvalidPostContentError):
|
||||||
|
posts.update_post_content(post, content)
|
||||||
|
|
||||||
|
|
||||||
@pytest.mark.parametrize("is_existing", (True, False))
|
@pytest.mark.parametrize("is_existing", (True, False))
|
||||||
def test_update_post_thumbnail_to_new_one(
|
def test_update_post_thumbnail_to_new_one(
|
||||||
tmpdir, config_injector, read_asset, post_factory, is_existing
|
tmpdir, config_injector, read_asset, post_factory, is_existing
|
||||||
|
@ -596,6 +634,7 @@ def test_update_post_thumbnail_to_new_one(
|
||||||
},
|
},
|
||||||
"secret": "test",
|
"secret": "test",
|
||||||
"allow_broken_uploads": False,
|
"allow_broken_uploads": False,
|
||||||
|
"allowed_mime_types": ["image/png"],
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
post = post_factory(id=1)
|
post = post_factory(id=1)
|
||||||
|
@ -637,6 +676,7 @@ def test_update_post_thumbnail_to_default(
|
||||||
},
|
},
|
||||||
"secret": "test",
|
"secret": "test",
|
||||||
"allow_broken_uploads": False,
|
"allow_broken_uploads": False,
|
||||||
|
"allowed_mime_types": ["image/png"],
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
post = post_factory(id=1)
|
post = post_factory(id=1)
|
||||||
|
@ -677,6 +717,7 @@ def test_update_post_thumbnail_with_broken_thumbnail(
|
||||||
},
|
},
|
||||||
"secret": "test",
|
"secret": "test",
|
||||||
"allow_broken_uploads": False,
|
"allow_broken_uploads": False,
|
||||||
|
"allowed_mime_types": ["image/png"],
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
post = post_factory(id=1)
|
post = post_factory(id=1)
|
||||||
|
@ -721,6 +762,7 @@ def test_update_post_content_leaving_custom_thumbnail(
|
||||||
},
|
},
|
||||||
"secret": "test",
|
"secret": "test",
|
||||||
"allow_broken_uploads": False,
|
"allow_broken_uploads": False,
|
||||||
|
"allowed_mime_types": ["image/png"],
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
post = post_factory(id=1)
|
post = post_factory(id=1)
|
||||||
|
@ -754,6 +796,11 @@ def test_update_post_content_convert_heif_to_png_when_processing(
|
||||||
},
|
},
|
||||||
"secret": "test",
|
"secret": "test",
|
||||||
"allow_broken_uploads": False,
|
"allow_broken_uploads": False,
|
||||||
|
"allowed_mime_types": [
|
||||||
|
"image/avif",
|
||||||
|
"image/heic",
|
||||||
|
"image/heif",
|
||||||
|
],
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
post = post_factory(id=1)
|
post = post_factory(id=1)
|
||||||
|
@ -1176,6 +1223,7 @@ def test_merge_posts_replaces_content(
|
||||||
"post_height": 300,
|
"post_height": 300,
|
||||||
},
|
},
|
||||||
"secret": "test",
|
"secret": "test",
|
||||||
|
"allowed_mime_types": ["image/png"],
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
source_post = post_factory(id=1)
|
source_post = post_factory(id=1)
|
||||||
|
|
Loading…
Reference in a new issue