2019-05-02 17:17:27 -05:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2017-06-13 06:27:05 -05:00
|
|
|
require "mini_mime"
|
2017-05-10 17:16:57 -05:00
|
|
|
|
2013-02-05 13:16:51 -06:00
|
|
|
class UploadsController < ApplicationController
|
2020-03-25 16:16:02 -05:00
|
|
|
requires_login except: [:show, :show_short, :show_secure]
|
2018-01-31 22:17:59 -06:00
|
|
|
|
2019-11-17 19:25:42 -06:00
|
|
|
skip_before_action :preload_json, :check_xhr, :redirect_to_login_if_required, only: [:show, :show_short, :show_secure]
|
2019-10-13 23:40:33 -05:00
|
|
|
protect_from_forgery except: :show
|
2013-04-02 18:17:17 -05:00
|
|
|
|
2019-11-17 23:56:20 -06:00
|
|
|
before_action :is_asset_path, only: [:show, :show_short, :show_secure]
|
|
|
|
|
2020-05-18 09:00:41 -05:00
|
|
|
SECURE_REDIRECT_GRACE_SECONDS = 5
|
|
|
|
|
2013-02-05 13:16:51 -06:00
|
|
|
def create
|
2017-11-23 00:28:18 -06:00
|
|
|
# capture current user for block later on
|
|
|
|
me = current_user
|
|
|
|
|
2017-05-18 05:13:13 -05:00
|
|
|
# 50 characters ought to be enough for the upload type
|
2017-08-30 23:06:56 -05:00
|
|
|
type = params.require(:type).parameterize(separator: "_")[0..50]
|
2015-05-19 18:39:58 -05:00
|
|
|
|
2018-12-05 06:35:59 -06:00
|
|
|
if type == "avatar" && !me.admin? && (SiteSetting.sso_overrides_avatar || !SiteSetting.allow_uploaded_avatars)
|
2017-05-10 17:16:57 -05:00
|
|
|
return render json: failed_json, status: 422
|
2015-11-12 03:26:45 -06:00
|
|
|
end
|
|
|
|
|
2017-06-23 05:13:48 -05:00
|
|
|
url = params[:url]
|
|
|
|
file = params[:file] || params[:files]&.first
|
|
|
|
pasted = params[:pasted] == "true"
|
|
|
|
for_private_message = params[:for_private_message] == "true"
|
2018-11-14 01:03:02 -06:00
|
|
|
for_site_setting = params[:for_site_setting] == "true"
|
2017-11-26 19:43:18 -06:00
|
|
|
is_api = is_api?
|
|
|
|
retain_hours = params[:retain_hours].to_i
|
|
|
|
|
|
|
|
# note, atm hijack is processed in its own context and has not access to controller
|
|
|
|
# longer term we may change this
|
|
|
|
hijack do
|
2017-12-27 09:33:25 -06:00
|
|
|
begin
|
|
|
|
info = UploadsController.create_upload(
|
|
|
|
current_user: me,
|
|
|
|
file: file,
|
|
|
|
url: url,
|
|
|
|
type: type,
|
|
|
|
for_private_message: for_private_message,
|
2018-11-14 01:03:02 -06:00
|
|
|
for_site_setting: for_site_setting,
|
2017-12-27 09:33:25 -06:00
|
|
|
pasted: pasted,
|
|
|
|
is_api: is_api,
|
|
|
|
retain_hours: retain_hours
|
|
|
|
)
|
|
|
|
rescue => e
|
|
|
|
render json: failed_json.merge(message: e.message&.split("\n")&.first), status: 422
|
|
|
|
else
|
|
|
|
render json: UploadsController.serialize_upload(info), status: Upload === info ? 200 : 422
|
|
|
|
end
|
2014-09-23 00:50:26 -05:00
|
|
|
end
|
2013-02-05 13:16:51 -06:00
|
|
|
end
|
2013-06-04 17:34:53 -05:00
|
|
|
|
2017-08-22 15:40:01 -05:00
|
|
|
def lookup_urls
|
|
|
|
params.permit(short_urls: [])
|
|
|
|
uploads = []
|
|
|
|
|
|
|
|
if (params[:short_urls] && params[:short_urls].length > 0)
|
2019-05-28 20:00:25 -05:00
|
|
|
PrettyText::Helpers.lookup_upload_urls(params[:short_urls]).each do |short_url, paths|
|
|
|
|
uploads << {
|
|
|
|
short_url: short_url,
|
|
|
|
url: paths[:url],
|
|
|
|
short_path: paths[:short_path]
|
|
|
|
}
|
2017-08-22 15:40:01 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
render json: uploads.to_json
|
|
|
|
end
|
|
|
|
|
2013-09-06 12:18:42 -05:00
|
|
|
def show
|
2019-06-26 09:02:55 -05:00
|
|
|
# do not serve uploads requested via XHR to prevent XSS
|
2019-06-27 04:13:44 -05:00
|
|
|
return xhr_not_allowed if request.xhr?
|
2019-06-26 09:02:55 -05:00
|
|
|
|
2014-05-13 19:51:09 -05:00
|
|
|
return render_404 if !RailsMultisite::ConnectionManagement.has_db?(params[:site])
|
|
|
|
|
2014-03-24 18:37:31 -05:00
|
|
|
RailsMultisite::ConnectionManagement.with_connection(params[:site]) do |db|
|
2014-09-09 11:40:11 -05:00
|
|
|
return render_404 if SiteSetting.prevent_anons_from_downloading_files && current_user.nil?
|
2013-09-06 12:18:42 -05:00
|
|
|
|
2015-05-20 08:32:31 -05:00
|
|
|
if upload = Upload.find_by(sha1: params[:sha]) || Upload.find_by(id: params[:id], url: request.env["PATH_INFO"])
|
2019-05-14 15:36:54 -05:00
|
|
|
unless Discourse.store.internal?
|
|
|
|
local_store = FileStore::LocalStore.new
|
|
|
|
return render_404 unless local_store.has_been_uploaded?(upload.url)
|
|
|
|
end
|
|
|
|
|
2019-05-28 20:00:25 -05:00
|
|
|
send_file_local_upload(upload)
|
|
|
|
else
|
|
|
|
render_404
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2019-01-29 15:47:25 -06:00
|
|
|
|
2019-05-28 20:00:25 -05:00
|
|
|
def show_short
|
2019-06-26 09:02:55 -05:00
|
|
|
# do not serve uploads requested via XHR to prevent XSS
|
2019-06-27 04:13:44 -05:00
|
|
|
return xhr_not_allowed if request.xhr?
|
2019-06-26 09:02:55 -05:00
|
|
|
|
2019-05-28 20:00:25 -05:00
|
|
|
if SiteSetting.prevent_anons_from_downloading_files && current_user.nil?
|
|
|
|
return render_404
|
|
|
|
end
|
2019-05-28 10:18:21 -05:00
|
|
|
|
2019-05-28 20:00:25 -05:00
|
|
|
sha1 = Upload.sha1_from_base62_encoded(params[:base62])
|
|
|
|
|
|
|
|
if upload = Upload.find_by(sha1: sha1)
|
2020-03-15 20:54:14 -05:00
|
|
|
if upload.secure? && SiteSetting.secure_media?
|
|
|
|
return handle_secure_upload_request(upload)
|
|
|
|
end
|
2020-01-15 21:50:27 -06:00
|
|
|
|
2019-05-28 20:00:25 -05:00
|
|
|
if Discourse.store.internal?
|
|
|
|
send_file_local_upload(upload)
|
2014-04-14 15:55:57 -05:00
|
|
|
else
|
2020-09-28 21:12:03 -05:00
|
|
|
redirect_to Discourse.store.url_for(upload, force_download: force_download?)
|
2014-04-14 15:55:57 -05:00
|
|
|
end
|
2019-05-28 20:00:25 -05:00
|
|
|
else
|
|
|
|
render_404
|
2014-03-24 18:37:31 -05:00
|
|
|
end
|
2013-09-06 12:18:42 -05:00
|
|
|
end
|
|
|
|
|
2019-11-17 19:25:42 -06:00
|
|
|
def show_secure
|
|
|
|
# do not serve uploads requested via XHR to prevent XSS
|
|
|
|
return xhr_not_allowed if request.xhr?
|
2020-01-06 20:27:24 -06:00
|
|
|
return render_404 if !Discourse.store.external?
|
|
|
|
|
|
|
|
path_with_ext = "#{params[:path]}.#{params[:extension]}"
|
|
|
|
|
|
|
|
sha1 = File.basename(path_with_ext, File.extname(path_with_ext))
|
|
|
|
# this takes care of optimized image requests
|
|
|
|
sha1 = sha1.partition("_").first if sha1.include?("_")
|
|
|
|
|
|
|
|
upload = Upload.find_by(sha1: sha1)
|
|
|
|
return render_404 if upload.blank?
|
2019-11-17 19:25:42 -06:00
|
|
|
|
2020-03-25 16:16:02 -05:00
|
|
|
return render_404 if SiteSetting.prevent_anons_from_downloading_files && current_user.nil?
|
2020-01-15 21:50:27 -06:00
|
|
|
return handle_secure_upload_request(upload, path_with_ext) if SiteSetting.secure_media?
|
2020-01-06 20:27:24 -06:00
|
|
|
|
|
|
|
# we don't want to 404 here if secure media gets disabled
|
|
|
|
# because all posts with secure uploads will show broken media
|
|
|
|
# until rebaked, which could take some time
|
2020-01-06 22:02:17 -06:00
|
|
|
#
|
|
|
|
# if the upload is still secure, that means the ACL is probably still
|
|
|
|
# private, so we don't want to go to the CDN url just yet otherwise we
|
|
|
|
# will get a 403. if the upload is not secure we assume the ACL is public
|
2020-03-15 20:54:14 -05:00
|
|
|
signed_secure_url = Discourse.store.signed_url_for_path(path_with_ext)
|
2020-01-06 22:02:17 -06:00
|
|
|
redirect_to upload.secure? ? signed_secure_url : Discourse.store.cdn_url(upload.url)
|
2019-11-17 19:25:42 -06:00
|
|
|
end
|
|
|
|
|
2020-03-15 20:54:14 -05:00
|
|
|
def handle_secure_upload_request(upload, path_with_ext = nil)
|
2020-01-15 21:50:27 -06:00
|
|
|
if upload.access_control_post_id.present?
|
|
|
|
raise Discourse::InvalidAccess if !guardian.can_see?(upload.access_control_post)
|
2020-03-25 16:16:02 -05:00
|
|
|
else
|
|
|
|
return render_404 if current_user.nil?
|
2020-01-15 21:50:27 -06:00
|
|
|
end
|
|
|
|
|
2020-07-02 22:42:36 -05:00
|
|
|
# defaults to public: false, so only cached by the client browser
|
2020-05-18 09:00:41 -05:00
|
|
|
cache_seconds = S3Helper::DOWNLOAD_URL_EXPIRES_AFTER_SECONDS - SECURE_REDIRECT_GRACE_SECONDS
|
2020-07-02 22:42:36 -05:00
|
|
|
expires_in cache_seconds.seconds
|
2020-05-18 09:00:41 -05:00
|
|
|
|
2020-03-15 20:54:14 -05:00
|
|
|
# url_for figures out the full URL, handling multisite DBs,
|
|
|
|
# and will return a presigned URL for the upload
|
|
|
|
if path_with_ext.blank?
|
2020-09-28 21:12:03 -05:00
|
|
|
return redirect_to Discourse.store.url_for(upload, force_download: force_download?)
|
2020-03-15 20:54:14 -05:00
|
|
|
end
|
|
|
|
|
2020-07-02 22:42:36 -05:00
|
|
|
redirect_to Discourse.store.signed_url_for_path(
|
2020-09-28 21:12:03 -05:00
|
|
|
path_with_ext,
|
|
|
|
expires_in: S3Helper::DOWNLOAD_URL_EXPIRES_AFTER_SECONDS,
|
|
|
|
force_download: force_download?
|
2020-07-02 22:42:36 -05:00
|
|
|
)
|
2020-01-15 21:50:27 -06:00
|
|
|
end
|
|
|
|
|
2019-02-20 20:13:37 -06:00
|
|
|
def metadata
|
|
|
|
params.require(:url)
|
|
|
|
upload = Upload.get_from_url(params[:url])
|
|
|
|
raise Discourse::NotFound unless upload
|
|
|
|
|
|
|
|
render json: {
|
|
|
|
original_filename: upload.original_filename,
|
|
|
|
width: upload.width,
|
|
|
|
height: upload.height,
|
|
|
|
human_filesize: upload.human_filesize
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
2014-05-13 19:51:09 -05:00
|
|
|
protected
|
|
|
|
|
2020-09-28 21:12:03 -05:00
|
|
|
def force_download?
|
|
|
|
params[:dl] == "1"
|
|
|
|
end
|
|
|
|
|
2019-06-27 04:13:44 -05:00
|
|
|
def xhr_not_allowed
|
|
|
|
raise Discourse::InvalidParameters.new("XHR not allowed")
|
|
|
|
end
|
|
|
|
|
2017-11-26 19:43:18 -06:00
|
|
|
def render_404
|
|
|
|
raise Discourse::NotFound
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.serialize_upload(data)
|
2017-08-22 15:40:01 -05:00
|
|
|
# as_json.as_json is not a typo... as_json in AM serializer returns keys as symbols, we need them
|
|
|
|
# as strings here
|
|
|
|
serialized = UploadSerializer.new(data, root: nil).as_json.as_json if Upload === data
|
|
|
|
serialized ||= (data || {}).as_json
|
|
|
|
end
|
|
|
|
|
2018-11-14 01:03:02 -06:00
|
|
|
def self.create_upload(current_user:,
|
|
|
|
file:,
|
|
|
|
url:,
|
|
|
|
type:,
|
|
|
|
for_private_message:,
|
|
|
|
for_site_setting:,
|
|
|
|
pasted:,
|
|
|
|
is_api:,
|
|
|
|
retain_hours:)
|
|
|
|
|
2017-05-10 17:16:57 -05:00
|
|
|
if file.nil?
|
2017-11-26 19:43:18 -06:00
|
|
|
if url.present? && is_api
|
2017-05-10 17:16:57 -05:00
|
|
|
maximum_upload_size = [SiteSetting.max_image_size_kb, SiteSetting.max_attachment_size_kb].max.kilobytes
|
2017-05-24 12:42:52 -05:00
|
|
|
tempfile = FileHelper.download(
|
|
|
|
url,
|
2019-05-27 19:28:57 -05:00
|
|
|
follow_redirect: true,
|
2017-05-24 12:42:52 -05:00
|
|
|
max_file_size: maximum_upload_size,
|
|
|
|
tmp_file_name: "discourse-upload-#{type}"
|
|
|
|
) rescue nil
|
2017-05-10 17:16:57 -05:00
|
|
|
filename = File.basename(URI.parse(url).path)
|
2015-08-12 11:33:13 -05:00
|
|
|
end
|
2017-05-10 17:16:57 -05:00
|
|
|
else
|
|
|
|
tempfile = file.tempfile
|
|
|
|
filename = file.original_filename
|
|
|
|
end
|
2015-08-12 11:33:13 -05:00
|
|
|
|
2017-05-10 17:16:57 -05:00
|
|
|
return { errors: [I18n.t("upload.file_missing")] } if tempfile.nil?
|
2015-06-15 09:12:15 -05:00
|
|
|
|
2017-06-23 05:13:48 -05:00
|
|
|
opts = {
|
|
|
|
type: type,
|
|
|
|
for_private_message: for_private_message,
|
2018-11-14 01:03:02 -06:00
|
|
|
for_site_setting: for_site_setting,
|
2017-06-23 05:13:48 -05:00
|
|
|
pasted: pasted,
|
|
|
|
}
|
2017-06-12 15:41:29 -05:00
|
|
|
|
|
|
|
upload = UploadCreator.new(tempfile, filename, opts).create_for(current_user.id)
|
2015-06-15 09:12:15 -05:00
|
|
|
|
2017-05-10 17:16:57 -05:00
|
|
|
if upload.errors.empty? && current_user.admin?
|
|
|
|
upload.update_columns(retain_hours: retain_hours) if retain_hours > 0
|
2015-06-15 09:12:15 -05:00
|
|
|
end
|
|
|
|
|
2019-04-30 01:58:18 -05:00
|
|
|
upload.errors.empty? ? upload : { errors: upload.errors.to_hash.values.flatten }
|
2017-05-10 17:16:57 -05:00
|
|
|
ensure
|
2018-03-28 03:20:08 -05:00
|
|
|
tempfile&.close!
|
2016-06-20 05:35:07 -05:00
|
|
|
end
|
|
|
|
|
2019-05-28 20:00:25 -05:00
|
|
|
private
|
|
|
|
|
|
|
|
def send_file_local_upload(upload)
|
|
|
|
opts = {
|
|
|
|
filename: upload.original_filename,
|
|
|
|
content_type: MiniMime.lookup_by_filename(upload.original_filename)&.content_type
|
|
|
|
}
|
|
|
|
|
2020-07-08 22:31:48 -05:00
|
|
|
if !FileHelper.is_inline_image?(upload.original_filename)
|
2019-05-28 20:00:25 -05:00
|
|
|
opts[:disposition] = "attachment"
|
2019-12-11 07:21:41 -06:00
|
|
|
elsif params[:inline]
|
|
|
|
opts[:disposition] = "inline"
|
2019-05-28 20:00:25 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
file_path = Discourse.store.path_for(upload)
|
|
|
|
return render_404 unless file_path
|
|
|
|
|
|
|
|
send_file(file_path, opts)
|
|
|
|
end
|
|
|
|
|
2013-02-05 13:16:51 -06:00
|
|
|
end
|