2019-05-03 06:17:27 +08:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2013-11-06 02:04:47 +08:00
|
|
|
require "digest/sha1"
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
|
|
class Upload < ActiveRecord::Base
|
2019-02-21 10:13:37 +08:00
|
|
|
include ActionView::Helpers::NumberHelper
|
2019-04-09 04:37:35 +08:00
|
|
|
include HasUrl
|
2019-02-21 10:13:37 +08:00
|
|
|
|
2018-09-10 10:10:39 +08:00
|
|
|
SHA1_LENGTH = 40
|
2019-01-02 15:29:17 +08:00
|
|
|
SEEDED_ID_THRESHOLD = 0
|
2020-07-04 01:16:54 +08:00
|
|
|
URL_REGEX ||= /(\/original\/\dX[\/\.\w]*\/(\h+)[\.\w]*)/
|
2020-04-30 14:48:34 +08:00
|
|
|
SECURE_MEDIA_ROUTE = "secure-media-uploads"
|
2018-09-10 10:10:39 +08:00
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
belongs_to :user
|
2020-01-16 11:50:27 +08:00
|
|
|
belongs_to :access_control_post, class_name: 'Post'
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2020-03-03 07:03:58 +08:00
|
|
|
# when we access this post we don't care if the post
|
|
|
|
# is deleted
|
|
|
|
def access_control_post
|
|
|
|
Post.unscoped { super }
|
|
|
|
end
|
|
|
|
|
2013-11-06 02:04:47 +08:00
|
|
|
has_many :post_uploads, dependent: :destroy
|
2013-06-14 05:44:24 +08:00
|
|
|
has_many :posts, through: :post_uploads
|
2013-06-13 07:43:50 +08:00
|
|
|
|
2013-06-21 15:34:02 +08:00
|
|
|
has_many :optimized_images, dependent: :destroy
|
2018-09-20 13:33:10 +08:00
|
|
|
has_many :user_uploads, dependent: :destroy
|
FEATURE: Include optimized thumbnails for topics (#9215)
This introduces new APIs for obtaining optimized thumbnails for topics. There are a few building blocks required for this:
- Introduces new `image_upload_id` columns on the `posts` and `topics` table. This replaces the old `image_url` column, which means that thumbnails are now restricted to uploads. Hotlinked thumbnails are no longer possible. In normal use (with pull_hotlinked_images enabled), this has no noticeable impact
- A migration attempts to match existing urls to upload records. If a match cannot be found then the posts will be queued for rebake
- Optimized thumbnails are generated during post_process_cooked. If thumbnails are missing when serializing a topic list, then a sidekiq job is queued
- Topic lists and topics now include a `thumbnails` key, which includes all the available images:
```
"thumbnails": [
{
"max_width": null,
"max_height": null,
"url": "//example.com/original-image.png",
"width": 1380,
"height": 1840
},
{
"max_width": 1024,
"max_height": 1024,
"url": "//example.com/optimized-image.png",
"width": 768,
"height": 1024
}
]
```
- Themes can request additional thumbnail sizes by using a modifier in their `about.json` file:
```
"modifiers": {
"topic_thumbnail_sizes": [
[200, 200],
[800, 800]
],
...
```
Remember that these are generated asynchronously, so your theme should include logic to fallback to other available thumbnails if your requested size has not yet been generated
- Two new raw plugin outlets are introduced, to improve the customisability of the topic list. `topic-list-before-columns` and `topic-list-before-link`
2020-05-05 16:07:50 +08:00
|
|
|
has_many :topic_thumbnails
|
2013-06-16 16:39:48 +08:00
|
|
|
|
2017-06-13 04:41:29 +08:00
|
|
|
attr_accessor :for_group_message
|
2017-05-10 05:20:28 +08:00
|
|
|
attr_accessor :for_theme
|
2017-06-13 04:41:29 +08:00
|
|
|
attr_accessor :for_private_message
|
2018-04-19 19:30:31 +08:00
|
|
|
attr_accessor :for_export
|
2018-11-14 15:03:02 +08:00
|
|
|
attr_accessor :for_site_setting
|
2019-07-31 11:16:03 +08:00
|
|
|
attr_accessor :for_gravatar
|
2016-03-01 05:39:24 +08:00
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
validates_presence_of :filesize
|
|
|
|
validates_presence_of :original_filename
|
|
|
|
|
2019-10-02 12:01:53 +08:00
|
|
|
validates_with UploadValidator
|
2014-04-15 04:55:57 +08:00
|
|
|
|
2018-08-31 12:46:22 +08:00
|
|
|
after_destroy do
|
|
|
|
User.where(uploaded_avatar_id: self.id).update_all(uploaded_avatar_id: nil)
|
|
|
|
UserAvatar.where(gravatar_upload_id: self.id).update_all(gravatar_upload_id: nil)
|
|
|
|
UserAvatar.where(custom_upload_id: self.id).update_all(custom_upload_id: nil)
|
|
|
|
end
|
|
|
|
|
2019-01-02 15:29:17 +08:00
|
|
|
scope :by_users, -> { where("uploads.id > ?", SEEDED_ID_THRESHOLD) }
|
|
|
|
|
2018-11-14 15:03:02 +08:00
|
|
|
def to_s
|
|
|
|
self.url
|
|
|
|
end
|
|
|
|
|
2018-08-28 10:48:43 +08:00
|
|
|
def thumbnail(width = self.thumbnail_width, height = self.thumbnail_height)
|
2014-05-06 21:41:59 +08:00
|
|
|
optimized_images.find_by(width: width, height: height)
|
2013-06-17 07:00:25 +08:00
|
|
|
end
|
|
|
|
|
2013-11-06 02:04:47 +08:00
|
|
|
def has_thumbnail?(width, height)
|
2013-09-27 16:55:50 +08:00
|
|
|
thumbnail(width, height).present?
|
2013-06-17 07:00:25 +08:00
|
|
|
end
|
|
|
|
|
2018-12-15 05:50:28 +08:00
|
|
|
def create_thumbnail!(width, height, opts = nil)
|
2013-06-17 07:00:25 +08:00
|
|
|
return unless SiteSetting.create_thumbnails?
|
2018-12-15 05:50:28 +08:00
|
|
|
opts ||= {}
|
|
|
|
opts[:allow_animation] = SiteSetting.allow_animated_thumbnails
|
2015-09-21 04:01:03 +08:00
|
|
|
|
2018-08-17 12:00:27 +08:00
|
|
|
if get_optimized_image(width, height, opts)
|
2015-06-27 07:26:16 +08:00
|
|
|
save(validate: false)
|
2013-09-27 16:55:50 +08:00
|
|
|
end
|
2013-06-17 07:00:25 +08:00
|
|
|
end
|
|
|
|
|
2018-08-17 12:00:27 +08:00
|
|
|
# this method attempts to correct old incorrect extensions
|
|
|
|
def get_optimized_image(width, height, opts)
|
|
|
|
if (!extension || extension.length == 0)
|
|
|
|
fix_image_extension
|
|
|
|
end
|
|
|
|
|
|
|
|
opts = opts.merge(raise_on_error: true)
|
|
|
|
begin
|
|
|
|
OptimizedImage.create_for(self, width, height, opts)
|
2018-12-15 06:44:38 +08:00
|
|
|
rescue => ex
|
|
|
|
Rails.logger.info ex if Rails.env.development?
|
2018-08-17 12:00:27 +08:00
|
|
|
opts = opts.merge(raise_on_error: false)
|
|
|
|
if fix_image_extension
|
|
|
|
OptimizedImage.create_for(self, width, height, opts)
|
|
|
|
else
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def fix_image_extension
|
|
|
|
return false if extension == "unknown"
|
|
|
|
|
|
|
|
begin
|
|
|
|
# this is relatively cheap once cached
|
|
|
|
original_path = Discourse.store.path_for(self)
|
|
|
|
if original_path.blank?
|
|
|
|
external_copy = Discourse.store.download(self) rescue nil
|
|
|
|
original_path = external_copy.try(:path)
|
|
|
|
end
|
|
|
|
|
|
|
|
image_info = FastImage.new(original_path) rescue nil
|
|
|
|
new_extension = image_info&.type&.to_s || "unknown"
|
|
|
|
|
|
|
|
if new_extension != self.extension
|
|
|
|
self.update_columns(extension: new_extension)
|
|
|
|
true
|
|
|
|
end
|
|
|
|
rescue
|
|
|
|
self.update_columns(extension: "unknown")
|
|
|
|
true
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-06-21 15:34:02 +08:00
|
|
|
def destroy
|
2013-06-20 03:51:41 +08:00
|
|
|
Upload.transaction do
|
2013-08-14 04:08:29 +08:00
|
|
|
Discourse.store.remove_upload(self)
|
2013-06-20 03:51:41 +08:00
|
|
|
super
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-08-22 23:46:15 +08:00
|
|
|
def short_url
|
2019-05-29 09:00:25 +08:00
|
|
|
"upload://#{short_url_basename}"
|
|
|
|
end
|
|
|
|
|
2020-04-24 08:29:02 +08:00
|
|
|
def uploaded_before_secure_media_enabled?
|
|
|
|
original_sha1.blank?
|
|
|
|
end
|
|
|
|
|
|
|
|
def matching_access_control_post?(post)
|
|
|
|
access_control_post_id == post.id
|
|
|
|
end
|
|
|
|
|
|
|
|
def copied_from_other_post?(post)
|
|
|
|
return false if access_control_post_id.blank?
|
|
|
|
!matching_access_control_post?(post)
|
|
|
|
end
|
|
|
|
|
2019-05-29 09:00:25 +08:00
|
|
|
def short_path
|
|
|
|
self.class.short_path(sha1: self.sha1, extension: self.extension)
|
|
|
|
end
|
|
|
|
|
2020-01-29 08:11:38 +08:00
|
|
|
def self.consider_for_reuse(upload, post)
|
|
|
|
return upload if !SiteSetting.secure_media? || upload.blank? || post.blank?
|
2020-04-24 08:29:02 +08:00
|
|
|
return nil if !upload.matching_access_control_post?(post) || upload.uploaded_before_secure_media_enabled?
|
2020-01-29 08:11:38 +08:00
|
|
|
upload
|
|
|
|
end
|
|
|
|
|
2020-01-24 09:59:30 +08:00
|
|
|
def self.secure_media_url?(url)
|
2020-01-30 14:19:14 +08:00
|
|
|
# we do not want to exclude topic links that for whatever reason
|
|
|
|
# have secure-media-uploads in the URL e.g. /t/secure-media-uploads-are-cool/223452
|
|
|
|
url.include?(SECURE_MEDIA_ROUTE) && !url.include?("/t/") && FileHelper.is_supported_media?(url)
|
2020-01-24 09:59:30 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def self.signed_url_from_secure_media_url(url)
|
|
|
|
secure_upload_s3_path = url.sub(Discourse.base_url, "").sub("/#{SECURE_MEDIA_ROUTE}/", "")
|
|
|
|
Discourse.store.signed_url_for_path(secure_upload_s3_path)
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.secure_media_url_from_upload_url(url)
|
|
|
|
url.sub(SiteSetting.Upload.absolute_base_url, "/#{SECURE_MEDIA_ROUTE}")
|
|
|
|
end
|
|
|
|
|
2019-05-29 09:00:25 +08:00
|
|
|
def self.short_path(sha1:, extension:)
|
|
|
|
@url_helpers ||= Rails.application.routes.url_helpers
|
|
|
|
|
|
|
|
@url_helpers.upload_short_path(
|
|
|
|
base62: self.base62_sha1(sha1),
|
|
|
|
extension: extension
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.base62_sha1(sha1)
|
|
|
|
Base62.encode(sha1.hex)
|
|
|
|
end
|
|
|
|
|
|
|
|
def base62_sha1
|
2019-06-04 14:10:46 +08:00
|
|
|
Upload.base62_sha1(self.sha1)
|
2017-08-22 23:46:15 +08:00
|
|
|
end
|
|
|
|
|
2018-08-28 10:48:43 +08:00
|
|
|
def local?
|
|
|
|
!(url =~ /^(https?:)?\/\//)
|
|
|
|
end
|
|
|
|
|
|
|
|
def fix_dimensions!
|
2018-09-10 10:22:45 +08:00
|
|
|
return if !FileHelper.is_supported_image?("image.#{extension}")
|
2018-08-28 10:48:43 +08:00
|
|
|
|
|
|
|
path =
|
|
|
|
if local?
|
|
|
|
Discourse.store.path_for(self)
|
|
|
|
else
|
|
|
|
Discourse.store.download(self).path
|
|
|
|
end
|
|
|
|
|
2018-12-03 23:19:49 +08:00
|
|
|
begin
|
2018-12-26 23:17:08 +08:00
|
|
|
w, h = FastImage.new(path, raise_on_failure: true).size
|
|
|
|
|
|
|
|
self.width = w || 0
|
|
|
|
self.height = h || 0
|
|
|
|
|
|
|
|
self.thumbnail_width, self.thumbnail_height = ImageSizer.resize(w, h)
|
|
|
|
|
|
|
|
self.update_columns(
|
|
|
|
width: width,
|
|
|
|
height: height,
|
|
|
|
thumbnail_width: thumbnail_width,
|
|
|
|
thumbnail_height: thumbnail_height
|
|
|
|
)
|
2018-12-03 23:19:49 +08:00
|
|
|
rescue => e
|
|
|
|
Discourse.warn_exception(e, message: "Error getting image dimensions")
|
|
|
|
end
|
2018-08-28 10:48:43 +08:00
|
|
|
nil
|
|
|
|
end
|
|
|
|
|
|
|
|
# on demand image size calculation, this allows us to null out image sizes
|
|
|
|
# and still handle as needed
|
|
|
|
def get_dimension(key)
|
|
|
|
if v = read_attribute(key)
|
|
|
|
return v
|
|
|
|
end
|
|
|
|
fix_dimensions!
|
|
|
|
read_attribute(key)
|
|
|
|
end
|
|
|
|
|
|
|
|
def width
|
|
|
|
get_dimension(:width)
|
|
|
|
end
|
|
|
|
|
|
|
|
def height
|
|
|
|
get_dimension(:height)
|
|
|
|
end
|
|
|
|
|
|
|
|
def thumbnail_width
|
|
|
|
get_dimension(:thumbnail_width)
|
|
|
|
end
|
|
|
|
|
|
|
|
def thumbnail_height
|
|
|
|
get_dimension(:thumbnail_height)
|
|
|
|
end
|
|
|
|
|
2019-05-29 09:00:25 +08:00
|
|
|
def self.sha1_from_short_path(path)
|
|
|
|
if path =~ /(\/uploads\/short-url\/)([a-zA-Z0-9]+)(\..*)?/
|
|
|
|
self.sha1_from_base62_encoded($2)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-08-22 23:46:15 +08:00
|
|
|
def self.sha1_from_short_url(url)
|
|
|
|
if url =~ /(upload:\/\/)?([a-zA-Z0-9]+)(\..*)?/
|
2019-05-29 09:00:25 +08:00
|
|
|
self.sha1_from_base62_encoded($2)
|
|
|
|
end
|
|
|
|
end
|
2019-05-28 23:18:21 +08:00
|
|
|
|
2019-05-29 09:00:25 +08:00
|
|
|
def self.sha1_from_base62_encoded(encoded_sha1)
|
|
|
|
sha1 = Base62.decode(encoded_sha1).to_s(16)
|
|
|
|
|
|
|
|
if sha1.length > SHA1_LENGTH
|
|
|
|
nil
|
|
|
|
else
|
|
|
|
sha1.rjust(SHA1_LENGTH, '0')
|
2017-08-22 23:46:15 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-09-02 14:50:13 +08:00
|
|
|
def self.generate_digest(path)
|
|
|
|
Digest::SHA1.file(path).hexdigest
|
|
|
|
end
|
|
|
|
|
2019-02-21 10:13:37 +08:00
|
|
|
def human_filesize
|
|
|
|
number_to_human_size(self.filesize)
|
|
|
|
end
|
|
|
|
|
2019-04-03 12:37:50 +08:00
|
|
|
def rebake_posts_on_old_scheme
|
|
|
|
self.posts.where("cooked LIKE '%/_optimized/%'").find_each(&:rebake!)
|
|
|
|
end
|
|
|
|
|
2019-11-28 05:32:17 +08:00
|
|
|
def update_secure_status(secure_override_value: nil)
|
2020-01-16 11:50:27 +08:00
|
|
|
mark_secure = secure_override_value.nil? ? UploadSecurity.new(self).should_be_secure? : secure_override_value
|
2019-11-18 09:25:42 +08:00
|
|
|
|
2020-01-23 10:01:10 +08:00
|
|
|
secure_status_did_change = self.secure? != mark_secure
|
2019-11-18 09:25:42 +08:00
|
|
|
self.update_column("secure", mark_secure)
|
|
|
|
Discourse.store.update_upload_ACL(self) if Discourse.store.external?
|
2020-01-23 10:01:10 +08:00
|
|
|
|
|
|
|
secure_status_did_change
|
2019-11-18 09:25:42 +08:00
|
|
|
end
|
|
|
|
|
2019-04-24 11:56:48 +08:00
|
|
|
def self.migrate_to_new_scheme(limit: nil)
|
2015-06-12 18:02:36 +08:00
|
|
|
problems = []
|
|
|
|
|
2019-04-24 17:07:10 +08:00
|
|
|
DistributedMutex.synchronize("migrate_upload_to_new_scheme") do
|
|
|
|
if SiteSetting.migrate_to_new_scheme
|
|
|
|
max_file_size_kb = [
|
|
|
|
SiteSetting.max_image_size_kb,
|
|
|
|
SiteSetting.max_attachment_size_kb
|
|
|
|
].max.kilobytes
|
2015-06-12 18:02:36 +08:00
|
|
|
|
2019-04-24 17:07:10 +08:00
|
|
|
local_store = FileStore::LocalStore.new
|
|
|
|
db = RailsMultisite::ConnectionManagement.current_db
|
2019-03-14 12:38:16 +08:00
|
|
|
|
2019-04-24 17:07:10 +08:00
|
|
|
scope = Upload.by_users
|
|
|
|
.where("url NOT LIKE '%/original/_X/%' AND url LIKE '%/uploads/#{db}%'")
|
|
|
|
.order(id: :desc)
|
2019-04-24 13:59:23 +08:00
|
|
|
|
2019-04-24 17:07:10 +08:00
|
|
|
scope = scope.limit(limit) if limit
|
2019-04-24 13:59:23 +08:00
|
|
|
|
2019-04-24 17:07:10 +08:00
|
|
|
if scope.count == 0
|
|
|
|
SiteSetting.migrate_to_new_scheme = false
|
|
|
|
return problems
|
|
|
|
end
|
2019-03-28 15:58:42 +08:00
|
|
|
|
2019-04-24 17:07:10 +08:00
|
|
|
remap_scope = nil
|
|
|
|
|
|
|
|
scope.each do |upload|
|
|
|
|
begin
|
|
|
|
# keep track of the url
|
|
|
|
previous_url = upload.url.dup
|
|
|
|
# where is the file currently stored?
|
|
|
|
external = previous_url =~ /^\/\//
|
|
|
|
# download if external
|
|
|
|
if external
|
|
|
|
url = SiteSetting.scheme + ":" + previous_url
|
|
|
|
|
|
|
|
begin
|
|
|
|
retries ||= 0
|
|
|
|
|
|
|
|
file = FileHelper.download(
|
|
|
|
url,
|
|
|
|
max_file_size: max_file_size_kb,
|
|
|
|
tmp_file_name: "discourse",
|
|
|
|
follow_redirect: true
|
|
|
|
)
|
|
|
|
rescue OpenURI::HTTPError
|
2020-06-20 01:28:54 +08:00
|
|
|
retry if (retries += 1) < 1
|
2019-04-24 17:07:10 +08:00
|
|
|
next
|
|
|
|
end
|
|
|
|
|
|
|
|
path = file.path
|
|
|
|
else
|
|
|
|
path = local_store.path_for(upload)
|
|
|
|
end
|
|
|
|
# compute SHA if missing
|
|
|
|
if upload.sha1.blank?
|
|
|
|
upload.sha1 = Upload.generate_digest(path)
|
|
|
|
end
|
2019-03-26 15:07:50 +08:00
|
|
|
|
2019-04-24 17:07:10 +08:00
|
|
|
# store to new location & update the filesize
|
|
|
|
File.open(path) do |f|
|
|
|
|
upload.url = Discourse.store.store_upload(f, upload)
|
|
|
|
upload.filesize = f.size
|
|
|
|
upload.save!(validate: false)
|
|
|
|
end
|
|
|
|
# remap the URLs
|
|
|
|
DbHelper.remap(UrlHelper.absolute(previous_url), upload.url) unless external
|
|
|
|
|
|
|
|
DbHelper.remap(
|
|
|
|
previous_url,
|
|
|
|
upload.url,
|
|
|
|
excluded_tables: %w{
|
|
|
|
posts
|
|
|
|
post_search_data
|
2019-04-25 11:55:48 +08:00
|
|
|
incoming_emails
|
|
|
|
notifications
|
|
|
|
single_sign_on_records
|
|
|
|
stylesheet_cache
|
|
|
|
topic_search_data
|
|
|
|
users
|
|
|
|
user_emails
|
|
|
|
draft_sequences
|
|
|
|
optimized_images
|
2019-04-24 17:07:10 +08:00
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
remap_scope ||= begin
|
|
|
|
Post.with_deleted
|
2019-04-24 18:19:25 +08:00
|
|
|
.where("raw ~ '/uploads/#{db}/\\d+/' OR raw ~ '/uploads/#{db}/original/(\\d|[a-z])/'")
|
2019-04-25 14:26:40 +08:00
|
|
|
.select(:id, :raw, :cooked)
|
2019-04-24 17:07:10 +08:00
|
|
|
.all
|
|
|
|
end
|
2019-04-24 11:56:48 +08:00
|
|
|
|
2019-04-24 17:07:10 +08:00
|
|
|
remap_scope.each do |post|
|
|
|
|
post.raw.gsub!(previous_url, upload.url)
|
|
|
|
post.cooked.gsub!(previous_url, upload.url)
|
2019-04-25 14:26:40 +08:00
|
|
|
Post.with_deleted.where(id: post.id).update_all(raw: post.raw, cooked: post.cooked) if post.changed?
|
2019-04-24 17:07:10 +08:00
|
|
|
end
|
2019-04-03 07:38:57 +08:00
|
|
|
|
2019-04-24 17:07:10 +08:00
|
|
|
upload.optimized_images.find_each(&:destroy!)
|
|
|
|
upload.rebake_posts_on_old_scheme
|
|
|
|
# remove the old file (when local)
|
|
|
|
unless external
|
|
|
|
FileUtils.rm(path, force: true)
|
|
|
|
end
|
|
|
|
rescue => e
|
|
|
|
problems << { upload: upload, ex: e }
|
|
|
|
ensure
|
|
|
|
file&.unlink
|
|
|
|
file&.close
|
2015-06-12 18:02:36 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
problems
|
|
|
|
end
|
|
|
|
|
2019-05-29 09:00:25 +08:00
|
|
|
private
|
|
|
|
|
|
|
|
def short_url_basename
|
2019-06-19 09:10:50 +08:00
|
|
|
"#{Upload.base62_sha1(sha1)}#{extension.present? ? ".#{extension}" : ""}"
|
2019-05-29 09:00:25 +08:00
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
2013-05-24 10:48:32 +08:00
|
|
|
|
|
|
|
# == Schema Information
|
|
|
|
#
|
|
|
|
# Table name: uploads
|
|
|
|
#
|
2020-01-16 11:50:27 +08:00
|
|
|
# id :integer not null, primary key
|
|
|
|
# user_id :integer not null
|
|
|
|
# original_filename :string not null
|
|
|
|
# filesize :integer not null
|
|
|
|
# width :integer
|
|
|
|
# height :integer
|
|
|
|
# url :string not null
|
|
|
|
# created_at :datetime not null
|
|
|
|
# updated_at :datetime not null
|
|
|
|
# sha1 :string(40)
|
|
|
|
# origin :string(1000)
|
|
|
|
# retain_hours :integer
|
|
|
|
# extension :string(10)
|
|
|
|
# thumbnail_width :integer
|
|
|
|
# thumbnail_height :integer
|
|
|
|
# etag :string
|
|
|
|
# secure :boolean default(FALSE), not null
|
|
|
|
# access_control_post_id :bigint
|
|
|
|
# original_sha1 :string
|
2013-05-24 10:48:32 +08:00
|
|
|
#
|
|
|
|
# Indexes
|
|
|
|
#
|
2020-01-16 11:50:27 +08:00
|
|
|
# index_uploads_on_access_control_post_id (access_control_post_id)
|
|
|
|
# index_uploads_on_etag (etag)
|
|
|
|
# index_uploads_on_extension (lower((extension)::text))
|
|
|
|
# index_uploads_on_id_and_url (id,url)
|
|
|
|
# index_uploads_on_original_sha1 (original_sha1)
|
|
|
|
# index_uploads_on_sha1 (sha1) UNIQUE
|
|
|
|
# index_uploads_on_url (url)
|
|
|
|
# index_uploads_on_user_id (user_id)
|
|
|
|
#
|