server+client: add ability to configure allowed file types
This commit is contained in:
parent
7a82e9d581
commit
0709d739df
9 changed files with 116 additions and 36 deletions
|
@ -100,6 +100,10 @@ class Api extends events.EventTarget {
|
|||
return remoteConfig.contactEmail;
|
||||
}
|
||||
|
||||
getAllowedExtensions() {
|
||||
return remoteConfig.allowedExtensions;
|
||||
}
|
||||
|
||||
canSendMails() {
|
||||
return !!remoteConfig.canSendMails;
|
||||
}
|
||||
|
|
|
@ -161,11 +161,14 @@ class PostUploadView extends events.EventTarget {
|
|||
return this._uploadables.findIndex((u2) => u.key === u2.key);
|
||||
};
|
||||
|
||||
let allowedExtensions = api.getAllowedExtensions().map(
|
||||
function(e) {return "." + e}
|
||||
);
|
||||
this._contentFileDropper = new FileDropperControl(
|
||||
this._contentInputNode,
|
||||
{
|
||||
extraText:
|
||||
"Allowed extensions: .jpg, .png, .gif, .webm, .mp4, .swf, .avif, .heif, .heic",
|
||||
"Allowed extensions: " + allowedExtensions.join(", "),
|
||||
allowUrls: true,
|
||||
allowMultiple: true,
|
||||
lock: false,
|
||||
|
|
|
@ -29,6 +29,18 @@ convert:
|
|||
to_webm: false
|
||||
to_mp4: false
|
||||
|
||||
# specify which MIME types are allowed
|
||||
allowed_mime_types:
|
||||
- image/jpeg
|
||||
- image/png
|
||||
- image/gif
|
||||
- video/webm
|
||||
- video/mp4
|
||||
- application/x-shockwave-flash
|
||||
- image/avif
|
||||
- image/heif
|
||||
- image/heic
|
||||
|
||||
# allow posts to be uploaded even if some image processing errors occur
|
||||
allow_broken_uploads: false
|
||||
|
||||
|
|
|
@ -3,7 +3,7 @@ from datetime import datetime, timedelta
|
|||
from typing import Dict, Optional
|
||||
|
||||
from szurubooru import config, rest
|
||||
from szurubooru.func import auth, posts, users, util
|
||||
from szurubooru.func import auth, mime, posts, users, util
|
||||
|
||||
_cache_time = None # type: Optional[datetime]
|
||||
_cache_result = None # type: Optional[int]
|
||||
|
@ -49,6 +49,11 @@ def get_info(ctx: rest.Context, _params: Dict[str, str] = {}) -> rest.Response:
|
|||
"privileges": util.snake_case_to_lower_camel_case_keys(
|
||||
config.config["privileges"]
|
||||
),
|
||||
"allowedExtensions": [
|
||||
mime.MIME_EXTENSIONS_MAP[i]
|
||||
for i in config.config["allowed_mime_types"]
|
||||
if i in mime.MIME_EXTENSIONS_MAP
|
||||
],
|
||||
},
|
||||
}
|
||||
if auth.has_privilege(ctx.user, "posts:view:featured"):
|
||||
|
|
|
@ -1,6 +1,33 @@
|
|||
import re
|
||||
from collections import ChainMap
|
||||
from typing import Optional
|
||||
|
||||
MIME_TYPES_MAP = {
|
||||
"image": {
|
||||
"image/gif": "gif",
|
||||
"image/jpeg": "jpg",
|
||||
"image/png": "png",
|
||||
"image/webp": "webp",
|
||||
"image/bmp": "bmp",
|
||||
"image/avif": "avif",
|
||||
"image/heif": "heif",
|
||||
"image/heic": "heic",
|
||||
},
|
||||
"video": {
|
||||
"application/ogg": None,
|
||||
"video/mp4": "mp4",
|
||||
"video/quicktime": "mov",
|
||||
"video/webm": "webm",
|
||||
},
|
||||
"flash": {
|
||||
"application/x-shockwave-flash": "swf"
|
||||
},
|
||||
"other": {
|
||||
"application/octet-stream": "dat",
|
||||
},
|
||||
}
|
||||
MIME_EXTENSIONS_MAP = ChainMap(*MIME_TYPES_MAP.values())
|
||||
|
||||
|
||||
def get_mime_type(content: bytes) -> str:
|
||||
if not content:
|
||||
|
@ -46,48 +73,19 @@ def get_mime_type(content: bytes) -> str:
|
|||
|
||||
|
||||
def get_extension(mime_type: str) -> Optional[str]:
|
||||
extension_map = {
|
||||
"application/x-shockwave-flash": "swf",
|
||||
"image/gif": "gif",
|
||||
"image/jpeg": "jpg",
|
||||
"image/png": "png",
|
||||
"image/webp": "webp",
|
||||
"image/bmp": "bmp",
|
||||
"image/avif": "avif",
|
||||
"image/heif": "heif",
|
||||
"image/heic": "heic",
|
||||
"video/mp4": "mp4",
|
||||
"video/quicktime": "mov",
|
||||
"video/webm": "webm",
|
||||
"application/octet-stream": "dat",
|
||||
}
|
||||
return extension_map.get((mime_type or "").strip().lower(), None)
|
||||
return MIME_EXTENSIONS_MAP.get((mime_type or "").strip().lower(), None)
|
||||
|
||||
|
||||
def is_flash(mime_type: str) -> bool:
|
||||
return mime_type.lower() == "application/x-shockwave-flash"
|
||||
return mime_type.lower() in MIME_TYPES_MAP["flash"]
|
||||
|
||||
|
||||
def is_video(mime_type: str) -> bool:
|
||||
return mime_type.lower() in (
|
||||
"application/ogg",
|
||||
"video/mp4",
|
||||
"video/quicktime",
|
||||
"video/webm",
|
||||
)
|
||||
return mime_type.lower() in MIME_TYPES_MAP["video"]
|
||||
|
||||
|
||||
def is_image(mime_type: str) -> bool:
|
||||
return mime_type.lower() in (
|
||||
"image/jpeg",
|
||||
"image/png",
|
||||
"image/gif",
|
||||
"image/webp",
|
||||
"image/bmp",
|
||||
"image/avif",
|
||||
"image/heif",
|
||||
"image/heic",
|
||||
)
|
||||
return mime_type.lower() in MIME_TYPES_MAP["image"]
|
||||
|
||||
|
||||
def is_animated_gif(content: bytes) -> bool:
|
||||
|
|
|
@ -611,7 +611,11 @@ def update_post_content(post: model.Post, content: Optional[bytes]) -> None:
|
|||
|
||||
update_signature = False
|
||||
post.mime_type = mime.get_mime_type(content)
|
||||
if mime.is_flash(post.mime_type):
|
||||
if post.mime_type not in config.config["allowed_mime_types"]:
|
||||
raise InvalidPostContentError(
|
||||
"File type not allowed: %r" % post.mime_type
|
||||
)
|
||||
elif mime.is_flash(post.mime_type):
|
||||
post.type = model.Post.TYPE_FLASH
|
||||
elif mime.is_image(post.mime_type):
|
||||
update_signature = True
|
||||
|
|
|
@ -34,6 +34,7 @@ def test_info_api(
|
|||
"smtp": {
|
||||
"host": "example.com",
|
||||
},
|
||||
"allowed_mime_types": ["application/octet-stream"],
|
||||
}
|
||||
)
|
||||
db.session.add_all([post_factory(), post_factory()])
|
||||
|
@ -54,6 +55,7 @@ def test_info_api(
|
|||
"posts:view:featured": "regular",
|
||||
},
|
||||
"canSendMails": True,
|
||||
"allowedExtensions": ["dat"],
|
||||
}
|
||||
|
||||
with fake_datetime("2016-01-01 13:00"):
|
||||
|
|
|
@ -343,6 +343,10 @@ def test_errors_not_spending_ids(
|
|||
"uploads:use_downloader": model.User.RANK_POWER,
|
||||
},
|
||||
"secret": "test",
|
||||
"allowed_mime_types": [
|
||||
"image/png",
|
||||
"image/jpeg",
|
||||
],
|
||||
}
|
||||
)
|
||||
auth_user = user_factory(rank=model.User.RANK_REGULAR)
|
||||
|
|
|
@ -489,6 +489,18 @@ def test_update_post_content_for_new_post(
|
|||
},
|
||||
"secret": "test",
|
||||
"allow_broken_uploads": False,
|
||||
"allowed_mime_types": [
|
||||
"image/png",
|
||||
"image/jpeg",
|
||||
"image/gif",
|
||||
"image/bmp",
|
||||
"image/avif",
|
||||
"image/heic",
|
||||
"image/heif",
|
||||
"video/webm",
|
||||
"video/mp4",
|
||||
"application/x-shockwave-flash",
|
||||
],
|
||||
}
|
||||
)
|
||||
output_file_path = "{}/data/posts/{}".format(tmpdir, output_file_name)
|
||||
|
@ -526,6 +538,7 @@ def test_update_post_content_to_existing_content(
|
|||
},
|
||||
"secret": "test",
|
||||
"allow_broken_uploads": False,
|
||||
"allowed_mime_types": ["image/png"],
|
||||
}
|
||||
)
|
||||
post = post_factory()
|
||||
|
@ -553,6 +566,7 @@ def test_update_post_content_with_broken_content(
|
|||
},
|
||||
"secret": "test",
|
||||
"allow_broken_uploads": allow_broken_uploads,
|
||||
"allowed_mime_types": ["image/png"],
|
||||
}
|
||||
)
|
||||
post = post_factory()
|
||||
|
@ -576,6 +590,7 @@ def test_update_post_content_with_invalid_content(
|
|||
config_injector(
|
||||
{
|
||||
"allow_broken_uploads": True,
|
||||
"allowed_mime_types": ["application/octet-stream"],
|
||||
}
|
||||
)
|
||||
post = model.Post()
|
||||
|
@ -583,6 +598,29 @@ def test_update_post_content_with_invalid_content(
|
|||
posts.update_post_content(post, input_content)
|
||||
|
||||
|
||||
def test_update_post_content_with_unallowed_mime_type(
|
||||
tmpdir, config_injector, post_factory, read_asset
|
||||
):
|
||||
config_injector(
|
||||
{
|
||||
"data_dir": str(tmpdir.mkdir("data")),
|
||||
"thumbnails": {
|
||||
"post_width": 300,
|
||||
"post_height": 300,
|
||||
},
|
||||
"secret": "test",
|
||||
"allow_broken_uploads": False,
|
||||
"allowed_mime_types": [],
|
||||
}
|
||||
)
|
||||
post = post_factory()
|
||||
db.session.add(post)
|
||||
db.session.flush()
|
||||
content = read_asset("png.png")
|
||||
with pytest.raises(posts.InvalidPostContentError):
|
||||
posts.update_post_content(post, content)
|
||||
|
||||
|
||||
@pytest.mark.parametrize("is_existing", (True, False))
|
||||
def test_update_post_thumbnail_to_new_one(
|
||||
tmpdir, config_injector, read_asset, post_factory, is_existing
|
||||
|
@ -596,6 +634,7 @@ def test_update_post_thumbnail_to_new_one(
|
|||
},
|
||||
"secret": "test",
|
||||
"allow_broken_uploads": False,
|
||||
"allowed_mime_types": ["image/png"],
|
||||
}
|
||||
)
|
||||
post = post_factory(id=1)
|
||||
|
@ -637,6 +676,7 @@ def test_update_post_thumbnail_to_default(
|
|||
},
|
||||
"secret": "test",
|
||||
"allow_broken_uploads": False,
|
||||
"allowed_mime_types": ["image/png"],
|
||||
}
|
||||
)
|
||||
post = post_factory(id=1)
|
||||
|
@ -677,6 +717,7 @@ def test_update_post_thumbnail_with_broken_thumbnail(
|
|||
},
|
||||
"secret": "test",
|
||||
"allow_broken_uploads": False,
|
||||
"allowed_mime_types": ["image/png"],
|
||||
}
|
||||
)
|
||||
post = post_factory(id=1)
|
||||
|
@ -721,6 +762,7 @@ def test_update_post_content_leaving_custom_thumbnail(
|
|||
},
|
||||
"secret": "test",
|
||||
"allow_broken_uploads": False,
|
||||
"allowed_mime_types": ["image/png"],
|
||||
}
|
||||
)
|
||||
post = post_factory(id=1)
|
||||
|
@ -754,6 +796,11 @@ def test_update_post_content_convert_heif_to_png_when_processing(
|
|||
},
|
||||
"secret": "test",
|
||||
"allow_broken_uploads": False,
|
||||
"allowed_mime_types": [
|
||||
"image/avif",
|
||||
"image/heic",
|
||||
"image/heif",
|
||||
],
|
||||
}
|
||||
)
|
||||
post = post_factory(id=1)
|
||||
|
@ -1176,6 +1223,7 @@ def test_merge_posts_replaces_content(
|
|||
"post_height": 300,
|
||||
},
|
||||
"secret": "test",
|
||||
"allowed_mime_types": ["image/png"],
|
||||
}
|
||||
)
|
||||
source_post = post_factory(id=1)
|
||||
|
|
Loading…
Reference in a new issue