2019-05-03 06:17:27 +08:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2013-11-06 02:04:47 +08:00
|
|
|
require "digest/sha1"
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
|
|
class Upload < ActiveRecord::Base
|
2019-02-21 10:13:37 +08:00
|
|
|
include ActionView::Helpers::NumberHelper
|
2019-04-09 04:37:35 +08:00
|
|
|
include HasUrl
|
2019-02-21 10:13:37 +08:00
|
|
|
|
2018-09-10 10:10:39 +08:00
|
|
|
SHA1_LENGTH = 40
|
2019-01-02 15:29:17 +08:00
|
|
|
SEEDED_ID_THRESHOLD = 0
|
2020-07-04 01:16:54 +08:00
|
|
|
URL_REGEX ||= /(\/original\/\dX[\/\.\w]*\/(\h+)[\.\w]*)/
|
2021-04-12 11:55:54 +08:00
|
|
|
MAX_IDENTIFY_SECONDS = 5
|
2022-09-20 17:28:17 +08:00
|
|
|
DOMINANT_COLOR_COMMAND_TIMEOUT_SECONDS = 5
|
2018-09-10 10:10:39 +08:00
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
belongs_to :user
|
2020-01-16 11:50:27 +08:00
|
|
|
belongs_to :access_control_post, class_name: 'Post'
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2020-03-03 07:03:58 +08:00
|
|
|
# when we access this post we don't care if the post
|
|
|
|
# is deleted
|
|
|
|
def access_control_post
|
|
|
|
Post.unscoped { super }
|
|
|
|
end
|
|
|
|
|
2022-05-03 20:53:32 +08:00
|
|
|
has_many :post_hotlinked_media, dependent: :destroy, class_name: "PostHotlinkedMedia"
|
2013-06-21 15:34:02 +08:00
|
|
|
has_many :optimized_images, dependent: :destroy
|
2018-09-20 13:33:10 +08:00
|
|
|
has_many :user_uploads, dependent: :destroy
|
2022-06-09 07:24:30 +08:00
|
|
|
has_many :upload_references, dependent: :destroy
|
|
|
|
has_many :posts, through: :upload_references, source: :target, source_type: 'Post'
|
FEATURE: Include optimized thumbnails for topics (#9215)
This introduces new APIs for obtaining optimized thumbnails for topics. There are a few building blocks required for this:
- Introduces new `image_upload_id` columns on the `posts` and `topics` table. This replaces the old `image_url` column, which means that thumbnails are now restricted to uploads. Hotlinked thumbnails are no longer possible. In normal use (with pull_hotlinked_images enabled), this has no noticeable impact
- A migration attempts to match existing urls to upload records. If a match cannot be found then the posts will be queued for rebake
- Optimized thumbnails are generated during post_process_cooked. If thumbnails are missing when serializing a topic list, then a sidekiq job is queued
- Topic lists and topics now include a `thumbnails` key, which includes all the available images:
```
"thumbnails": [
{
"max_width": null,
"max_height": null,
"url": "//example.com/original-image.png",
"width": 1380,
"height": 1840
},
{
"max_width": 1024,
"max_height": 1024,
"url": "//example.com/optimized-image.png",
"width": 768,
"height": 1024
}
]
```
- Themes can request additional thumbnail sizes by using a modifier in their `about.json` file:
```
"modifiers": {
"topic_thumbnail_sizes": [
[200, 200],
[800, 800]
],
...
```
Remember that these are generated asynchronously, so your theme should include logic to fallback to other available thumbnails if your requested size has not yet been generated
- Two new raw plugin outlets are introduced, to improve the customisability of the topic list. `topic-list-before-columns` and `topic-list-before-link`
2020-05-05 16:07:50 +08:00
|
|
|
has_many :topic_thumbnails
|
2013-06-16 16:39:48 +08:00
|
|
|
|
2017-06-13 04:41:29 +08:00
|
|
|
attr_accessor :for_group_message
|
2017-05-10 05:20:28 +08:00
|
|
|
attr_accessor :for_theme
|
2017-06-13 04:41:29 +08:00
|
|
|
attr_accessor :for_private_message
|
2018-04-19 19:30:31 +08:00
|
|
|
attr_accessor :for_export
|
2018-11-14 15:03:02 +08:00
|
|
|
attr_accessor :for_site_setting
|
2019-07-31 11:16:03 +08:00
|
|
|
attr_accessor :for_gravatar
|
2022-11-12 00:56:11 +08:00
|
|
|
attr_accessor :validate_file_size
|
2016-03-01 05:39:24 +08:00
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
validates_presence_of :filesize
|
|
|
|
validates_presence_of :original_filename
|
2022-09-21 18:01:21 +08:00
|
|
|
validates :dominant_color, length: { is: 6 }, allow_blank: true, allow_nil: true
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2019-10-02 12:01:53 +08:00
|
|
|
validates_with UploadValidator
|
2014-04-15 04:55:57 +08:00
|
|
|
|
2020-08-18 08:55:16 +08:00
|
|
|
before_destroy do
|
|
|
|
UserProfile.where(card_background_upload_id: self.id).update_all(card_background_upload_id: nil)
|
|
|
|
UserProfile.where(profile_background_upload_id: self.id).update_all(profile_background_upload_id: nil)
|
|
|
|
end
|
|
|
|
|
2018-08-31 12:46:22 +08:00
|
|
|
after_destroy do
|
|
|
|
User.where(uploaded_avatar_id: self.id).update_all(uploaded_avatar_id: nil)
|
|
|
|
UserAvatar.where(gravatar_upload_id: self.id).update_all(gravatar_upload_id: nil)
|
|
|
|
UserAvatar.where(custom_upload_id: self.id).update_all(custom_upload_id: nil)
|
|
|
|
end
|
|
|
|
|
2019-01-02 15:29:17 +08:00
|
|
|
scope :by_users, -> { where("uploads.id > ?", SEEDED_ID_THRESHOLD) }
|
|
|
|
|
2020-09-17 11:35:29 +08:00
|
|
|
def self.verification_statuses
|
|
|
|
@verification_statuses ||= Enum.new(
|
|
|
|
unchecked: 1,
|
|
|
|
verified: 2,
|
|
|
|
invalid_etag: 3
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2022-02-16 15:00:30 +08:00
|
|
|
def self.add_unused_callback(&block)
|
|
|
|
(@unused_callbacks ||= []) << block
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.unused_callbacks
|
|
|
|
@unused_callbacks
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.reset_unused_callbacks
|
|
|
|
@unused_callbacks = []
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.add_in_use_callback(&block)
|
|
|
|
(@in_use_callbacks ||= []) << block
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.in_use_callbacks
|
|
|
|
@in_use_callbacks
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.reset_in_use_callbacks
|
|
|
|
@in_use_callbacks = []
|
|
|
|
end
|
|
|
|
|
2021-06-24 06:09:40 +08:00
|
|
|
def self.with_no_non_post_relations
|
2022-06-09 07:24:30 +08:00
|
|
|
self
|
|
|
|
.joins("LEFT JOIN upload_references ur ON ur.upload_id = uploads.id AND ur.target_type != 'Post'")
|
|
|
|
.where("ur.upload_id IS NULL")
|
2021-06-24 06:09:40 +08:00
|
|
|
end
|
|
|
|
|
2022-11-12 00:56:11 +08:00
|
|
|
def initialize(*args)
|
|
|
|
super
|
|
|
|
self.validate_file_size = true
|
|
|
|
end
|
|
|
|
|
2018-11-14 15:03:02 +08:00
|
|
|
def to_s
|
|
|
|
self.url
|
|
|
|
end
|
|
|
|
|
2018-08-28 10:48:43 +08:00
|
|
|
def thumbnail(width = self.thumbnail_width, height = self.thumbnail_height)
|
2014-05-06 21:41:59 +08:00
|
|
|
optimized_images.find_by(width: width, height: height)
|
2013-06-17 07:00:25 +08:00
|
|
|
end
|
|
|
|
|
2013-11-06 02:04:47 +08:00
|
|
|
def has_thumbnail?(width, height)
|
2013-09-27 16:55:50 +08:00
|
|
|
thumbnail(width, height).present?
|
2013-06-17 07:00:25 +08:00
|
|
|
end
|
|
|
|
|
2018-12-15 05:50:28 +08:00
|
|
|
def create_thumbnail!(width, height, opts = nil)
|
2013-06-17 07:00:25 +08:00
|
|
|
return unless SiteSetting.create_thumbnails?
|
2018-12-15 05:50:28 +08:00
|
|
|
opts ||= {}
|
2015-09-21 04:01:03 +08:00
|
|
|
|
2018-08-17 12:00:27 +08:00
|
|
|
if get_optimized_image(width, height, opts)
|
2015-06-27 07:26:16 +08:00
|
|
|
save(validate: false)
|
2013-09-27 16:55:50 +08:00
|
|
|
end
|
2013-06-17 07:00:25 +08:00
|
|
|
end
|
|
|
|
|
2018-08-17 12:00:27 +08:00
|
|
|
# this method attempts to correct old incorrect extensions
|
2020-10-16 18:41:27 +08:00
|
|
|
def get_optimized_image(width, height, opts = nil)
|
|
|
|
opts ||= {}
|
|
|
|
|
2018-08-17 12:00:27 +08:00
|
|
|
if (!extension || extension.length == 0)
|
|
|
|
fix_image_extension
|
|
|
|
end
|
|
|
|
|
|
|
|
opts = opts.merge(raise_on_error: true)
|
|
|
|
begin
|
|
|
|
OptimizedImage.create_for(self, width, height, opts)
|
2018-12-15 06:44:38 +08:00
|
|
|
rescue => ex
|
|
|
|
Rails.logger.info ex if Rails.env.development?
|
2018-08-17 12:00:27 +08:00
|
|
|
opts = opts.merge(raise_on_error: false)
|
|
|
|
if fix_image_extension
|
|
|
|
OptimizedImage.create_for(self, width, height, opts)
|
|
|
|
else
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-04-07 05:58:10 +08:00
|
|
|
def content
|
|
|
|
original_path = Discourse.store.path_for(self)
|
|
|
|
external_copy = nil
|
|
|
|
|
|
|
|
if original_path.blank?
|
|
|
|
external_copy = Discourse.store.download(self)
|
|
|
|
original_path = external_copy.path
|
|
|
|
end
|
|
|
|
|
|
|
|
File.read(original_path)
|
|
|
|
ensure
|
|
|
|
if external_copy
|
|
|
|
File.unlink(external_copy.path)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-08-17 12:00:27 +08:00
|
|
|
def fix_image_extension
|
|
|
|
return false if extension == "unknown"
|
|
|
|
|
|
|
|
begin
|
|
|
|
# this is relatively cheap once cached
|
|
|
|
original_path = Discourse.store.path_for(self)
|
|
|
|
if original_path.blank?
|
|
|
|
external_copy = Discourse.store.download(self) rescue nil
|
|
|
|
original_path = external_copy.try(:path)
|
|
|
|
end
|
|
|
|
|
|
|
|
image_info = FastImage.new(original_path) rescue nil
|
|
|
|
new_extension = image_info&.type&.to_s || "unknown"
|
|
|
|
|
|
|
|
if new_extension != self.extension
|
|
|
|
self.update_columns(extension: new_extension)
|
|
|
|
true
|
|
|
|
end
|
|
|
|
rescue
|
|
|
|
self.update_columns(extension: "unknown")
|
|
|
|
true
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-06-21 15:34:02 +08:00
|
|
|
def destroy
|
2013-06-20 03:51:41 +08:00
|
|
|
Upload.transaction do
|
2013-08-14 04:08:29 +08:00
|
|
|
Discourse.store.remove_upload(self)
|
2013-06-20 03:51:41 +08:00
|
|
|
super
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-08-22 23:46:15 +08:00
|
|
|
def short_url
|
2019-05-29 09:00:25 +08:00
|
|
|
"upload://#{short_url_basename}"
|
|
|
|
end
|
|
|
|
|
2022-09-29 07:24:33 +08:00
|
|
|
def uploaded_before_secure_uploads_enabled?
|
2020-04-24 08:29:02 +08:00
|
|
|
original_sha1.blank?
|
|
|
|
end
|
|
|
|
|
|
|
|
def matching_access_control_post?(post)
|
|
|
|
access_control_post_id == post.id
|
|
|
|
end
|
|
|
|
|
|
|
|
def copied_from_other_post?(post)
|
|
|
|
return false if access_control_post_id.blank?
|
|
|
|
!matching_access_control_post?(post)
|
|
|
|
end
|
|
|
|
|
2019-05-29 09:00:25 +08:00
|
|
|
def short_path
|
|
|
|
self.class.short_path(sha1: self.sha1, extension: self.extension)
|
|
|
|
end
|
|
|
|
|
2020-01-29 08:11:38 +08:00
|
|
|
def self.consider_for_reuse(upload, post)
|
2022-09-29 07:24:33 +08:00
|
|
|
return upload if !SiteSetting.secure_uploads? || upload.blank? || post.blank?
|
|
|
|
return nil if !upload.matching_access_control_post?(post) || upload.uploaded_before_secure_uploads_enabled?
|
2020-01-29 08:11:38 +08:00
|
|
|
upload
|
|
|
|
end
|
|
|
|
|
2022-09-29 07:24:33 +08:00
|
|
|
def self.secure_uploads_url?(url)
|
2020-01-30 14:19:14 +08:00
|
|
|
# we do not want to exclude topic links that for whatever reason
|
2022-09-29 07:24:33 +08:00
|
|
|
# have secure-uploads in the URL e.g. /t/secure-uploads-are-cool/223452
|
2020-08-28 09:28:11 +08:00
|
|
|
route = UrlHelper.rails_route_from_url(url)
|
2020-09-30 13:20:00 +08:00
|
|
|
return false if route.blank?
|
2020-08-28 09:28:11 +08:00
|
|
|
route[:action] == "show_secure" && route[:controller] == "uploads" && FileHelper.is_supported_media?(url)
|
|
|
|
rescue ActionController::RoutingError
|
|
|
|
false
|
2020-01-24 09:59:30 +08:00
|
|
|
end
|
|
|
|
|
2022-09-29 07:24:33 +08:00
|
|
|
def self.signed_url_from_secure_uploads_url(url)
|
2020-08-28 09:28:11 +08:00
|
|
|
route = UrlHelper.rails_route_from_url(url)
|
|
|
|
url = Rails.application.routes.url_for(route.merge(only_path: true))
|
|
|
|
secure_upload_s3_path = url[url.index(route[:path])..-1]
|
2020-01-24 09:59:30 +08:00
|
|
|
Discourse.store.signed_url_for_path(secure_upload_s3_path)
|
|
|
|
end
|
|
|
|
|
2022-09-29 07:24:33 +08:00
|
|
|
def self.secure_uploads_url_from_upload_url(url)
|
2020-08-28 09:28:11 +08:00
|
|
|
return url if !url.include?(SiteSetting.Upload.absolute_base_url)
|
|
|
|
uri = URI.parse(url)
|
|
|
|
Rails.application.routes.url_for(
|
|
|
|
controller: "uploads",
|
|
|
|
action: "show_secure",
|
|
|
|
path: uri.path[1..-1],
|
|
|
|
only_path: true
|
|
|
|
)
|
2020-01-24 09:59:30 +08:00
|
|
|
end
|
|
|
|
|
2019-05-29 09:00:25 +08:00
|
|
|
def self.short_path(sha1:, extension:)
|
|
|
|
@url_helpers ||= Rails.application.routes.url_helpers
|
|
|
|
|
|
|
|
@url_helpers.upload_short_path(
|
|
|
|
base62: self.base62_sha1(sha1),
|
|
|
|
extension: extension
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.base62_sha1(sha1)
|
|
|
|
Base62.encode(sha1.hex)
|
|
|
|
end
|
|
|
|
|
|
|
|
def base62_sha1
|
2019-06-04 14:10:46 +08:00
|
|
|
Upload.base62_sha1(self.sha1)
|
2017-08-22 23:46:15 +08:00
|
|
|
end
|
|
|
|
|
2018-08-28 10:48:43 +08:00
|
|
|
def local?
|
|
|
|
!(url =~ /^(https?:)?\/\//)
|
|
|
|
end
|
|
|
|
|
|
|
|
def fix_dimensions!
|
2018-09-10 10:22:45 +08:00
|
|
|
return if !FileHelper.is_supported_image?("image.#{extension}")
|
2018-08-28 10:48:43 +08:00
|
|
|
|
|
|
|
path =
|
|
|
|
if local?
|
|
|
|
Discourse.store.path_for(self)
|
|
|
|
else
|
|
|
|
Discourse.store.download(self).path
|
|
|
|
end
|
|
|
|
|
2018-12-03 23:19:49 +08:00
|
|
|
begin
|
2021-03-02 00:44:00 +08:00
|
|
|
if extension == 'svg'
|
2021-04-12 11:55:54 +08:00
|
|
|
w, h = Discourse::Utils.execute_command("identify", "-format", "%w %h", path, timeout: MAX_IDENTIFY_SECONDS).split(' ') rescue [0, 0]
|
2021-03-02 00:44:00 +08:00
|
|
|
else
|
|
|
|
w, h = FastImage.new(path, raise_on_failure: true).size
|
|
|
|
end
|
2018-12-26 23:17:08 +08:00
|
|
|
|
|
|
|
self.width = w || 0
|
|
|
|
self.height = h || 0
|
|
|
|
|
|
|
|
self.thumbnail_width, self.thumbnail_height = ImageSizer.resize(w, h)
|
|
|
|
|
|
|
|
self.update_columns(
|
|
|
|
width: width,
|
|
|
|
height: height,
|
|
|
|
thumbnail_width: thumbnail_width,
|
|
|
|
thumbnail_height: thumbnail_height
|
|
|
|
)
|
2018-12-03 23:19:49 +08:00
|
|
|
rescue => e
|
|
|
|
Discourse.warn_exception(e, message: "Error getting image dimensions")
|
|
|
|
end
|
2018-08-28 10:48:43 +08:00
|
|
|
nil
|
|
|
|
end
|
|
|
|
|
|
|
|
# on demand image size calculation, this allows us to null out image sizes
|
|
|
|
# and still handle as needed
|
|
|
|
def get_dimension(key)
|
|
|
|
if v = read_attribute(key)
|
|
|
|
return v
|
|
|
|
end
|
|
|
|
fix_dimensions!
|
|
|
|
read_attribute(key)
|
|
|
|
end
|
|
|
|
|
|
|
|
def width
|
|
|
|
get_dimension(:width)
|
|
|
|
end
|
|
|
|
|
|
|
|
def height
|
|
|
|
get_dimension(:height)
|
|
|
|
end
|
|
|
|
|
|
|
|
def thumbnail_width
|
|
|
|
get_dimension(:thumbnail_width)
|
|
|
|
end
|
|
|
|
|
|
|
|
def thumbnail_height
|
|
|
|
get_dimension(:thumbnail_height)
|
|
|
|
end
|
|
|
|
|
2022-09-20 17:28:17 +08:00
|
|
|
def dominant_color(calculate_if_missing: false)
|
|
|
|
val = read_attribute(:dominant_color)
|
|
|
|
if val.nil? && calculate_if_missing
|
|
|
|
calculate_dominant_color!
|
|
|
|
read_attribute(:dominant_color)
|
|
|
|
else
|
|
|
|
val
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def calculate_dominant_color!(local_path = nil)
|
|
|
|
color = nil
|
|
|
|
|
|
|
|
if !FileHelper.is_supported_image?("image.#{extension}") || extension == "svg"
|
|
|
|
color = ""
|
|
|
|
end
|
|
|
|
|
|
|
|
if color.nil?
|
|
|
|
local_path ||=
|
|
|
|
if local?
|
|
|
|
Discourse.store.path_for(self)
|
|
|
|
else
|
2022-10-12 22:50:44 +08:00
|
|
|
begin
|
|
|
|
Discourse.store.download(self)&.path
|
|
|
|
rescue OpenURI::HTTPError => e
|
|
|
|
# Some issue with downloading the image from a remote store.
|
|
|
|
# Assume the upload is broken and save an empty string to prevent re-evaluation
|
|
|
|
nil
|
|
|
|
end
|
2022-09-20 17:28:17 +08:00
|
|
|
end
|
|
|
|
|
2022-09-23 19:42:07 +08:00
|
|
|
if local_path.nil?
|
|
|
|
# Download failed. Could be too large to download, or file could be missing in s3
|
|
|
|
color = ""
|
|
|
|
end
|
|
|
|
|
|
|
|
color ||= begin
|
2022-09-20 17:28:17 +08:00
|
|
|
data = Discourse::Utils.execute_command(
|
|
|
|
"nice",
|
|
|
|
"-n",
|
|
|
|
"10",
|
|
|
|
"convert",
|
|
|
|
local_path,
|
|
|
|
"-resize",
|
|
|
|
"1x1",
|
|
|
|
"-define",
|
|
|
|
"histogram:unique-colors=true",
|
|
|
|
"-format",
|
|
|
|
"%c",
|
|
|
|
"histogram:info:",
|
|
|
|
timeout: DOMINANT_COLOR_COMMAND_TIMEOUT_SECONDS
|
|
|
|
)
|
|
|
|
|
|
|
|
# Output format:
|
|
|
|
# 1: (110.873,116.226,93.8821) #6F745E srgb(43.4798%,45.5789%,36.8165%)
|
|
|
|
|
|
|
|
color = data[/#([0-9A-F]{6})/, 1]
|
|
|
|
|
|
|
|
raise "Calculated dominant color but unable to parse output:\n#{data}" if color.nil?
|
|
|
|
|
|
|
|
color
|
|
|
|
rescue Discourse::Utils::CommandError => e
|
|
|
|
# Timeout or unable to parse image
|
|
|
|
# This can happen due to bad user input - ignore and save
|
|
|
|
# an empty string to prevent re-evaluation
|
|
|
|
""
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
if persisted?
|
|
|
|
self.update_column(:dominant_color, color)
|
|
|
|
else
|
|
|
|
self.dominant_color = color
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-10-24 00:38:28 +08:00
|
|
|
def target_image_quality(local_path, test_quality)
|
2021-04-12 11:55:54 +08:00
|
|
|
@file_quality ||= Discourse::Utils.execute_command("identify", "-format", "%Q", local_path, timeout: MAX_IDENTIFY_SECONDS).to_i rescue 0
|
2020-10-24 00:38:28 +08:00
|
|
|
|
|
|
|
if @file_quality == 0 || @file_quality > test_quality
|
|
|
|
test_quality
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-05-29 09:00:25 +08:00
|
|
|
def self.sha1_from_short_path(path)
|
|
|
|
if path =~ /(\/uploads\/short-url\/)([a-zA-Z0-9]+)(\..*)?/
|
|
|
|
self.sha1_from_base62_encoded($2)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-08-22 23:46:15 +08:00
|
|
|
def self.sha1_from_short_url(url)
|
|
|
|
if url =~ /(upload:\/\/)?([a-zA-Z0-9]+)(\..*)?/
|
2019-05-29 09:00:25 +08:00
|
|
|
self.sha1_from_base62_encoded($2)
|
|
|
|
end
|
|
|
|
end
|
2019-05-28 23:18:21 +08:00
|
|
|
|
2019-05-29 09:00:25 +08:00
|
|
|
def self.sha1_from_base62_encoded(encoded_sha1)
|
|
|
|
sha1 = Base62.decode(encoded_sha1).to_s(16)
|
|
|
|
|
|
|
|
if sha1.length > SHA1_LENGTH
|
|
|
|
nil
|
|
|
|
else
|
|
|
|
sha1.rjust(SHA1_LENGTH, '0')
|
2017-08-22 23:46:15 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-09-02 14:50:13 +08:00
|
|
|
def self.generate_digest(path)
|
|
|
|
Digest::SHA1.file(path).hexdigest
|
|
|
|
end
|
|
|
|
|
2019-02-21 10:13:37 +08:00
|
|
|
def human_filesize
|
|
|
|
number_to_human_size(self.filesize)
|
|
|
|
end
|
|
|
|
|
2019-04-03 12:37:50 +08:00
|
|
|
def rebake_posts_on_old_scheme
|
|
|
|
self.posts.where("cooked LIKE '%/_optimized/%'").find_each(&:rebake!)
|
|
|
|
end
|
|
|
|
|
2021-01-29 07:03:44 +08:00
|
|
|
def update_secure_status(source: "unknown", override: nil)
|
|
|
|
if override.nil?
|
|
|
|
mark_secure, reason = UploadSecurity.new(self).should_be_secure_with_reason
|
|
|
|
else
|
|
|
|
mark_secure = override
|
|
|
|
reason = "manually overridden"
|
|
|
|
end
|
2019-11-18 09:25:42 +08:00
|
|
|
|
2020-01-23 10:01:10 +08:00
|
|
|
secure_status_did_change = self.secure? != mark_secure
|
2021-01-29 07:03:44 +08:00
|
|
|
self.update(secure_params(mark_secure, reason, source))
|
|
|
|
|
2021-07-09 09:31:44 +08:00
|
|
|
if Discourse.store.external?
|
|
|
|
begin
|
|
|
|
Discourse.store.update_upload_ACL(self)
|
|
|
|
rescue Aws::S3::Errors::NotImplemented => err
|
|
|
|
Discourse.warn_exception(err, message: "The file store object storage provider does not support setting ACLs")
|
|
|
|
end
|
|
|
|
end
|
2020-01-23 10:01:10 +08:00
|
|
|
|
|
|
|
secure_status_did_change
|
2019-11-18 09:25:42 +08:00
|
|
|
end
|
|
|
|
|
2021-01-29 07:03:44 +08:00
|
|
|
def secure_params(secure, reason, source = "unknown")
|
|
|
|
{
|
|
|
|
secure: secure,
|
|
|
|
security_last_changed_reason: reason + " | source: #{source}",
|
|
|
|
security_last_changed_at: Time.zone.now
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
2019-04-24 11:56:48 +08:00
|
|
|
def self.migrate_to_new_scheme(limit: nil)
|
2015-06-12 18:02:36 +08:00
|
|
|
problems = []
|
|
|
|
|
2019-04-24 17:07:10 +08:00
|
|
|
DistributedMutex.synchronize("migrate_upload_to_new_scheme") do
|
|
|
|
if SiteSetting.migrate_to_new_scheme
|
|
|
|
max_file_size_kb = [
|
|
|
|
SiteSetting.max_image_size_kb,
|
|
|
|
SiteSetting.max_attachment_size_kb
|
|
|
|
].max.kilobytes
|
2015-06-12 18:02:36 +08:00
|
|
|
|
2019-04-24 17:07:10 +08:00
|
|
|
local_store = FileStore::LocalStore.new
|
|
|
|
db = RailsMultisite::ConnectionManagement.current_db
|
2019-03-14 12:38:16 +08:00
|
|
|
|
2019-04-24 17:07:10 +08:00
|
|
|
scope = Upload.by_users
|
2022-11-02 03:05:13 +08:00
|
|
|
.where("url NOT LIKE '%/original/_X/%' AND url LIKE ?", "%/uploads/#{db}%")
|
2019-04-24 17:07:10 +08:00
|
|
|
.order(id: :desc)
|
2019-04-24 13:59:23 +08:00
|
|
|
|
2019-04-24 17:07:10 +08:00
|
|
|
scope = scope.limit(limit) if limit
|
2019-04-24 13:59:23 +08:00
|
|
|
|
2019-04-24 17:07:10 +08:00
|
|
|
if scope.count == 0
|
|
|
|
SiteSetting.migrate_to_new_scheme = false
|
|
|
|
return problems
|
|
|
|
end
|
2019-03-28 15:58:42 +08:00
|
|
|
|
2019-04-24 17:07:10 +08:00
|
|
|
remap_scope = nil
|
|
|
|
|
|
|
|
scope.each do |upload|
|
|
|
|
begin
|
|
|
|
# keep track of the url
|
|
|
|
previous_url = upload.url.dup
|
|
|
|
# where is the file currently stored?
|
|
|
|
external = previous_url =~ /^\/\//
|
|
|
|
# download if external
|
|
|
|
if external
|
|
|
|
url = SiteSetting.scheme + ":" + previous_url
|
|
|
|
|
|
|
|
begin
|
|
|
|
retries ||= 0
|
|
|
|
|
|
|
|
file = FileHelper.download(
|
|
|
|
url,
|
|
|
|
max_file_size: max_file_size_kb,
|
|
|
|
tmp_file_name: "discourse",
|
|
|
|
follow_redirect: true
|
|
|
|
)
|
|
|
|
rescue OpenURI::HTTPError
|
2020-06-20 01:28:54 +08:00
|
|
|
retry if (retries += 1) < 1
|
2019-04-24 17:07:10 +08:00
|
|
|
next
|
|
|
|
end
|
|
|
|
|
|
|
|
path = file.path
|
|
|
|
else
|
|
|
|
path = local_store.path_for(upload)
|
|
|
|
end
|
|
|
|
# compute SHA if missing
|
|
|
|
if upload.sha1.blank?
|
|
|
|
upload.sha1 = Upload.generate_digest(path)
|
|
|
|
end
|
2019-03-26 15:07:50 +08:00
|
|
|
|
2019-04-24 17:07:10 +08:00
|
|
|
# store to new location & update the filesize
|
|
|
|
File.open(path) do |f|
|
|
|
|
upload.url = Discourse.store.store_upload(f, upload)
|
|
|
|
upload.filesize = f.size
|
|
|
|
upload.save!(validate: false)
|
|
|
|
end
|
|
|
|
# remap the URLs
|
|
|
|
DbHelper.remap(UrlHelper.absolute(previous_url), upload.url) unless external
|
|
|
|
|
|
|
|
DbHelper.remap(
|
|
|
|
previous_url,
|
|
|
|
upload.url,
|
|
|
|
excluded_tables: %w{
|
|
|
|
posts
|
|
|
|
post_search_data
|
2019-04-25 11:55:48 +08:00
|
|
|
incoming_emails
|
|
|
|
notifications
|
|
|
|
single_sign_on_records
|
|
|
|
stylesheet_cache
|
|
|
|
topic_search_data
|
|
|
|
users
|
|
|
|
user_emails
|
|
|
|
draft_sequences
|
|
|
|
optimized_images
|
2019-04-24 17:07:10 +08:00
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
remap_scope ||= begin
|
|
|
|
Post.with_deleted
|
2019-04-24 18:19:25 +08:00
|
|
|
.where("raw ~ '/uploads/#{db}/\\d+/' OR raw ~ '/uploads/#{db}/original/(\\d|[a-z])/'")
|
2019-04-25 14:26:40 +08:00
|
|
|
.select(:id, :raw, :cooked)
|
2019-04-24 17:07:10 +08:00
|
|
|
.all
|
|
|
|
end
|
2019-04-24 11:56:48 +08:00
|
|
|
|
2019-04-24 17:07:10 +08:00
|
|
|
remap_scope.each do |post|
|
|
|
|
post.raw.gsub!(previous_url, upload.url)
|
|
|
|
post.cooked.gsub!(previous_url, upload.url)
|
2019-04-25 14:26:40 +08:00
|
|
|
Post.with_deleted.where(id: post.id).update_all(raw: post.raw, cooked: post.cooked) if post.changed?
|
2019-04-24 17:07:10 +08:00
|
|
|
end
|
2019-04-03 07:38:57 +08:00
|
|
|
|
2019-04-24 17:07:10 +08:00
|
|
|
upload.optimized_images.find_each(&:destroy!)
|
|
|
|
upload.rebake_posts_on_old_scheme
|
|
|
|
# remove the old file (when local)
|
|
|
|
unless external
|
|
|
|
FileUtils.rm(path, force: true)
|
|
|
|
end
|
|
|
|
rescue => e
|
|
|
|
problems << { upload: upload, ex: e }
|
|
|
|
ensure
|
|
|
|
file&.unlink
|
|
|
|
file&.close
|
2015-06-12 18:02:36 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
problems
|
|
|
|
end
|
|
|
|
|
2022-06-09 07:24:30 +08:00
|
|
|
def self.extract_upload_ids(raw)
|
|
|
|
return [] if raw.blank?
|
|
|
|
|
|
|
|
sha1s = []
|
|
|
|
|
|
|
|
raw.scan(/\/(\h{40})/).each do |match|
|
|
|
|
sha1s << match[0]
|
|
|
|
end
|
|
|
|
|
2022-06-14 00:01:27 +08:00
|
|
|
raw.scan(/\/([a-zA-Z0-9]+)/).each do |match|
|
2022-06-09 07:24:30 +08:00
|
|
|
sha1s << Upload.sha1_from_base62_encoded(match[0])
|
|
|
|
end
|
|
|
|
|
|
|
|
Upload.where(sha1: sha1s.uniq).pluck(:id)
|
|
|
|
end
|
|
|
|
|
2022-09-20 17:28:17 +08:00
|
|
|
def self.backfill_dominant_colors!(count)
|
|
|
|
Upload.where(dominant_color: nil).order("id desc").first(count).each do |upload|
|
|
|
|
upload.calculate_dominant_color!
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-05-29 09:00:25 +08:00
|
|
|
private
|
|
|
|
|
|
|
|
def short_url_basename
|
2019-06-19 09:10:50 +08:00
|
|
|
"#{Upload.base62_sha1(sha1)}#{extension.present? ? ".#{extension}" : ""}"
|
2019-05-29 09:00:25 +08:00
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
2013-05-24 10:48:32 +08:00
|
|
|
|
|
|
|
# == Schema Information
|
|
|
|
#
|
|
|
|
# Table name: uploads
|
|
|
|
#
|
2021-01-29 07:03:44 +08:00
|
|
|
# id :integer not null, primary key
|
|
|
|
# user_id :integer not null
|
|
|
|
# original_filename :string not null
|
2021-09-14 10:20:56 +08:00
|
|
|
# filesize :bigint not null
|
2021-01-29 07:03:44 +08:00
|
|
|
# width :integer
|
|
|
|
# height :integer
|
|
|
|
# url :string not null
|
|
|
|
# created_at :datetime not null
|
|
|
|
# updated_at :datetime not null
|
|
|
|
# sha1 :string(40)
|
|
|
|
# origin :string(1000)
|
|
|
|
# retain_hours :integer
|
|
|
|
# extension :string(10)
|
|
|
|
# thumbnail_width :integer
|
|
|
|
# thumbnail_height :integer
|
|
|
|
# etag :string
|
|
|
|
# secure :boolean default(FALSE), not null
|
|
|
|
# access_control_post_id :bigint
|
|
|
|
# original_sha1 :string
|
|
|
|
# animated :boolean
|
2022-09-20 17:28:17 +08:00
|
|
|
# verification_status :integer default(1), not null
|
2021-01-29 07:03:44 +08:00
|
|
|
# security_last_changed_at :datetime
|
|
|
|
# security_last_changed_reason :string
|
2022-09-20 17:28:17 +08:00
|
|
|
# dominant_color :text
|
2013-05-24 10:48:32 +08:00
|
|
|
#
|
|
|
|
# Indexes
|
|
|
|
#
|
2020-10-16 18:41:27 +08:00
|
|
|
# idx_uploads_on_verification_status (verification_status)
|
2020-01-16 11:50:27 +08:00
|
|
|
# index_uploads_on_access_control_post_id (access_control_post_id)
|
|
|
|
# index_uploads_on_etag (etag)
|
|
|
|
# index_uploads_on_extension (lower((extension)::text))
|
2022-09-20 17:28:17 +08:00
|
|
|
# index_uploads_on_id (id) WHERE (dominant_color IS NULL)
|
2020-01-16 11:50:27 +08:00
|
|
|
# index_uploads_on_id_and_url (id,url)
|
|
|
|
# index_uploads_on_original_sha1 (original_sha1)
|
|
|
|
# index_uploads_on_sha1 (sha1) UNIQUE
|
|
|
|
# index_uploads_on_url (url)
|
|
|
|
# index_uploads_on_user_id (user_id)
|
|
|
|
#
|