mirror of https://github.com/zulip/zulip.git
uploads: Split out S3 and local file backends into separate files.
The uploads file is large, and conceptually the S3 and local-file backends are separable.
This commit is contained in:
parent
497abc2e48
commit
7c0d414aff
|
@ -21,7 +21,7 @@ from PIL import Image
|
|||
|
||||
from zerver.lib.integrations import INTEGRATIONS
|
||||
from zerver.lib.storage import static_path
|
||||
from zerver.lib.upload import DEFAULT_AVATAR_SIZE, resize_avatar
|
||||
from zerver.lib.upload.base import DEFAULT_AVATAR_SIZE, resize_avatar
|
||||
|
||||
|
||||
def create_square_image(png: bytes) -> bytes:
|
||||
|
|
|
@ -39,7 +39,7 @@ from zerver.data_import.sequencer import NEXT_ID, IdMapper
|
|||
from zerver.data_import.user_handler import UserHandler
|
||||
from zerver.lib.emoji import name_to_codepoint
|
||||
from zerver.lib.markdown import IMAGE_EXTENSIONS
|
||||
from zerver.lib.upload import sanitize_name
|
||||
from zerver.lib.upload.base import sanitize_name
|
||||
from zerver.lib.utils import process_list_in_batches
|
||||
from zerver.models import Reaction, RealmEmoji, Recipient, UserProfile
|
||||
|
||||
|
|
|
@ -33,7 +33,7 @@ from zerver.data_import.sequencer import NEXT_ID, IdMapper
|
|||
from zerver.data_import.user_handler import UserHandler
|
||||
from zerver.lib.emoji import name_to_codepoint
|
||||
from zerver.lib.markdown import IMAGE_EXTENSIONS
|
||||
from zerver.lib.upload import sanitize_name
|
||||
from zerver.lib.upload.base import sanitize_name
|
||||
from zerver.lib.utils import make_safe_digest, process_list_in_batches
|
||||
from zerver.models import Reaction, RealmEmoji, Recipient, UserProfile
|
||||
|
||||
|
|
|
@ -43,7 +43,7 @@ from zerver.data_import.slack_message_conversion import (
|
|||
from zerver.lib.emoji import codepoint_to_name
|
||||
from zerver.lib.export import MESSAGE_BATCH_CHUNK_SIZE
|
||||
from zerver.lib.storage import static_path
|
||||
from zerver.lib.upload import resize_logo, sanitize_name
|
||||
from zerver.lib.upload.base import resize_logo, sanitize_name
|
||||
from zerver.models import (
|
||||
CustomProfileField,
|
||||
CustomProfileFieldValue,
|
||||
|
|
|
@ -8,7 +8,8 @@ from zerver.lib.avatar_hash import (
|
|||
user_avatar_content_hash,
|
||||
user_avatar_path_from_ids,
|
||||
)
|
||||
from zerver.lib.upload import MEDIUM_AVATAR_SIZE, upload_backend
|
||||
from zerver.lib.upload import upload_backend
|
||||
from zerver.lib.upload.base import MEDIUM_AVATAR_SIZE
|
||||
from zerver.lib.url_encoding import append_url_query_string
|
||||
from zerver.models import UserProfile
|
||||
|
||||
|
|
|
@ -29,7 +29,7 @@ from analytics.models import RealmCount, StreamCount, UserCount
|
|||
from scripts.lib.zulip_tools import overwrite_symlink
|
||||
from zerver.lib.avatar_hash import user_avatar_path_from_ids
|
||||
from zerver.lib.pysa import mark_sanitized
|
||||
from zerver.lib.upload import get_bucket
|
||||
from zerver.lib.upload.s3 import get_bucket
|
||||
from zerver.models import (
|
||||
AlertWord,
|
||||
Attachment,
|
||||
|
|
|
@ -29,7 +29,9 @@ from zerver.lib.message import get_last_message_id
|
|||
from zerver.lib.server_initialization import create_internal_realm, server_initialized
|
||||
from zerver.lib.streams import render_stream_description
|
||||
from zerver.lib.timestamp import datetime_to_timestamp
|
||||
from zerver.lib.upload import BadImageError, get_bucket, sanitize_name, upload_backend
|
||||
from zerver.lib.upload import upload_backend
|
||||
from zerver.lib.upload.base import BadImageError, sanitize_name
|
||||
from zerver.lib.upload.s3 import get_bucket
|
||||
from zerver.lib.user_groups import create_system_user_groups_for_realm
|
||||
from zerver.lib.user_message import UserMessageLite, bulk_insert_ums
|
||||
from zerver.lib.utils import generate_api_key, process_list_in_batches
|
||||
|
|
|
@ -46,7 +46,8 @@ from zerver.lib.cache import get_cache_backend
|
|||
from zerver.lib.db import Params, ParamsT, Query, TimeTrackingCursor
|
||||
from zerver.lib.integrations import WEBHOOK_INTEGRATIONS
|
||||
from zerver.lib.request import RequestNotes
|
||||
from zerver.lib.upload import LocalUploadBackend, S3UploadBackend
|
||||
from zerver.lib.upload.local import LocalUploadBackend
|
||||
from zerver.lib.upload.s3 import S3UploadBackend
|
||||
from zerver.models import (
|
||||
Client,
|
||||
Message,
|
||||
|
|
|
@ -9,7 +9,7 @@ from django.core.cache import cache
|
|||
from django.db import connection
|
||||
|
||||
from zerver.lib.avatar_hash import user_avatar_path
|
||||
from zerver.lib.upload import S3UploadBackend, upload_image_to_s3
|
||||
from zerver.lib.upload.s3 import S3UploadBackend, upload_image_to_s3
|
||||
from zerver.models import Attachment, RealmEmoji, UserProfile
|
||||
|
||||
s3backend = S3UploadBackend()
|
||||
|
|
1222
zerver/lib/upload.py
1222
zerver/lib/upload.py
File diff suppressed because it is too large
Load Diff
|
@ -0,0 +1,203 @@
|
|||
import io
|
||||
import logging
|
||||
import urllib
|
||||
from mimetypes import guess_type
|
||||
from typing import IO, Any, Callable, Optional, Tuple
|
||||
from urllib.parse import urljoin
|
||||
|
||||
from django.conf import settings
|
||||
from django.core.files.uploadedfile import UploadedFile
|
||||
from django.utils.translation import gettext as _
|
||||
|
||||
from zerver.lib.exceptions import ErrorCode, JsonableError
|
||||
from zerver.lib.outgoing_http import OutgoingSession
|
||||
from zerver.lib.upload.base import ZulipUploadBackend
|
||||
from zerver.lib.upload.local import LocalUploadBackend
|
||||
from zerver.lib.upload.s3 import S3UploadBackend
|
||||
from zerver.models import Attachment, Message, Realm, RealmEmoji, UserProfile
|
||||
|
||||
|
||||
class RealmUploadQuotaError(JsonableError):
|
||||
code = ErrorCode.REALM_UPLOAD_QUOTA
|
||||
|
||||
|
||||
def check_upload_within_quota(realm: Realm, uploaded_file_size: int) -> None:
|
||||
upload_quota = realm.upload_quota_bytes()
|
||||
if upload_quota is None:
|
||||
return
|
||||
used_space = realm.currently_used_upload_space_bytes()
|
||||
if (used_space + uploaded_file_size) > upload_quota:
|
||||
raise RealmUploadQuotaError(_("Upload would exceed your organization's upload quota."))
|
||||
|
||||
|
||||
def get_file_info(user_file: UploadedFile) -> Tuple[str, str]:
|
||||
uploaded_file_name = user_file.name
|
||||
assert uploaded_file_name is not None
|
||||
|
||||
content_type = user_file.content_type
|
||||
# It appears Django's UploadedFile.content_type defaults to an empty string,
|
||||
# even though the value is documented as `str | None`. So we check for both.
|
||||
if content_type is None or content_type == "":
|
||||
guessed_type = guess_type(uploaded_file_name)[0]
|
||||
if guessed_type is not None:
|
||||
content_type = guessed_type
|
||||
else:
|
||||
# Fallback to application/octet-stream if unable to determine a
|
||||
# different content-type from the filename.
|
||||
content_type = "application/octet-stream"
|
||||
|
||||
uploaded_file_name = urllib.parse.unquote(uploaded_file_name)
|
||||
|
||||
return uploaded_file_name, content_type
|
||||
|
||||
|
||||
# Common and wrappers
|
||||
if settings.LOCAL_UPLOADS_DIR is not None:
|
||||
upload_backend: ZulipUploadBackend = LocalUploadBackend()
|
||||
else:
|
||||
upload_backend = S3UploadBackend() # nocoverage
|
||||
|
||||
|
||||
def get_public_upload_root_url() -> str:
|
||||
return upload_backend.get_public_upload_root_url()
|
||||
|
||||
|
||||
def delete_message_image(path_id: str) -> bool:
|
||||
return upload_backend.delete_message_image(path_id)
|
||||
|
||||
|
||||
def upload_avatar_image(
|
||||
user_file: IO[bytes],
|
||||
acting_user_profile: UserProfile,
|
||||
target_user_profile: UserProfile,
|
||||
content_type: Optional[str] = None,
|
||||
) -> None:
|
||||
upload_backend.upload_avatar_image(
|
||||
user_file, acting_user_profile, target_user_profile, content_type=content_type
|
||||
)
|
||||
|
||||
|
||||
def delete_avatar_image(user_profile: UserProfile) -> None:
|
||||
upload_backend.delete_avatar_image(user_profile)
|
||||
|
||||
|
||||
def copy_avatar(source_profile: UserProfile, target_profile: UserProfile) -> None:
|
||||
upload_backend.copy_avatar(source_profile, target_profile)
|
||||
|
||||
|
||||
def upload_icon_image(user_file: IO[bytes], user_profile: UserProfile) -> None:
|
||||
upload_backend.upload_realm_icon_image(user_file, user_profile)
|
||||
|
||||
|
||||
def upload_logo_image(user_file: IO[bytes], user_profile: UserProfile, night: bool) -> None:
|
||||
upload_backend.upload_realm_logo_image(user_file, user_profile, night)
|
||||
|
||||
|
||||
def upload_emoji_image(
|
||||
emoji_file: IO[bytes], emoji_file_name: str, user_profile: UserProfile
|
||||
) -> bool:
|
||||
return upload_backend.upload_emoji_image(emoji_file, emoji_file_name, user_profile)
|
||||
|
||||
|
||||
def upload_message_file(
|
||||
uploaded_file_name: str,
|
||||
uploaded_file_size: int,
|
||||
content_type: Optional[str],
|
||||
file_data: bytes,
|
||||
user_profile: UserProfile,
|
||||
target_realm: Optional[Realm] = None,
|
||||
) -> str:
|
||||
return upload_backend.upload_message_file(
|
||||
uploaded_file_name,
|
||||
uploaded_file_size,
|
||||
content_type,
|
||||
file_data,
|
||||
user_profile,
|
||||
target_realm=target_realm,
|
||||
)
|
||||
|
||||
|
||||
def claim_attachment(
|
||||
user_profile: UserProfile,
|
||||
path_id: str,
|
||||
message: Message,
|
||||
is_message_realm_public: bool,
|
||||
is_message_web_public: bool = False,
|
||||
) -> Attachment:
|
||||
attachment = Attachment.objects.get(path_id=path_id)
|
||||
attachment.messages.add(message)
|
||||
attachment.is_web_public = attachment.is_web_public or is_message_web_public
|
||||
attachment.is_realm_public = attachment.is_realm_public or is_message_realm_public
|
||||
attachment.save()
|
||||
return attachment
|
||||
|
||||
|
||||
def upload_message_image_from_request(
|
||||
user_file: UploadedFile, user_profile: UserProfile, user_file_size: int
|
||||
) -> str:
|
||||
uploaded_file_name, content_type = get_file_info(user_file)
|
||||
return upload_message_file(
|
||||
uploaded_file_name, user_file_size, content_type, user_file.read(), user_profile
|
||||
)
|
||||
|
||||
|
||||
def upload_export_tarball(
|
||||
realm: Realm, tarball_path: str, percent_callback: Optional[Callable[[Any], None]] = None
|
||||
) -> str:
|
||||
return upload_backend.upload_export_tarball(
|
||||
realm, tarball_path, percent_callback=percent_callback
|
||||
)
|
||||
|
||||
|
||||
def delete_export_tarball(export_path: str) -> Optional[str]:
|
||||
return upload_backend.delete_export_tarball(export_path)
|
||||
|
||||
|
||||
def get_emoji_file_content(
|
||||
session: OutgoingSession, emoji_url: str, emoji_id: int, logger: logging.Logger
|
||||
) -> bytes: # nocoverage
|
||||
original_emoji_url = emoji_url + ".original"
|
||||
|
||||
logger.info("Downloading %s", original_emoji_url)
|
||||
response = session.get(original_emoji_url)
|
||||
if response.status_code == 200:
|
||||
assert type(response.content) == bytes
|
||||
return response.content
|
||||
|
||||
logger.info("Error fetching emoji from URL %s", original_emoji_url)
|
||||
logger.info("Trying %s instead", emoji_url)
|
||||
response = session.get(emoji_url)
|
||||
if response.status_code == 200:
|
||||
assert type(response.content) == bytes
|
||||
return response.content
|
||||
logger.info("Error fetching emoji from URL %s", emoji_url)
|
||||
logger.error("Could not fetch emoji %s", emoji_id)
|
||||
raise AssertionError(f"Could not fetch emoji {emoji_id}")
|
||||
|
||||
|
||||
def handle_reupload_emojis_event(realm: Realm, logger: logging.Logger) -> None: # nocoverage
|
||||
from zerver.lib.emoji import get_emoji_url
|
||||
|
||||
session = OutgoingSession(role="reupload_emoji", timeout=3, max_retries=3)
|
||||
|
||||
query = RealmEmoji.objects.filter(realm=realm).order_by("id")
|
||||
|
||||
for realm_emoji in query:
|
||||
logger.info("Processing emoji %s", realm_emoji.id)
|
||||
emoji_filename = realm_emoji.file_name
|
||||
assert emoji_filename is not None
|
||||
emoji_url = get_emoji_url(emoji_filename, realm_emoji.realm_id)
|
||||
if emoji_url.startswith("/"):
|
||||
emoji_url = urljoin(realm_emoji.realm.uri, emoji_url)
|
||||
|
||||
emoji_file_content = get_emoji_file_content(session, emoji_url, realm_emoji.id, logger)
|
||||
|
||||
emoji_bytes_io = io.BytesIO(emoji_file_content)
|
||||
|
||||
user_profile = realm_emoji.author
|
||||
# When this runs, emojis have already been migrated to always have .author set.
|
||||
assert user_profile is not None
|
||||
|
||||
logger.info("Reuploading emoji %s", realm_emoji.id)
|
||||
realm_emoji.is_animated = upload_emoji_image(emoji_bytes_io, emoji_filename, user_profile)
|
||||
realm_emoji.save(update_fields=["is_animated"])
|
|
@ -0,0 +1,279 @@
|
|||
import io
|
||||
import re
|
||||
import unicodedata
|
||||
from typing import IO, Any, Callable, Optional, Tuple
|
||||
|
||||
from django.utils.translation import gettext as _
|
||||
from markupsafe import Markup
|
||||
from PIL import GifImagePlugin, Image, ImageOps, PngImagePlugin
|
||||
from PIL.Image import DecompressionBombError
|
||||
|
||||
from zerver.lib.exceptions import ErrorCode, JsonableError
|
||||
from zerver.models import Attachment, Realm, UserProfile, is_cross_realm_bot_email
|
||||
|
||||
DEFAULT_AVATAR_SIZE = 100
|
||||
MEDIUM_AVATAR_SIZE = 500
|
||||
DEFAULT_EMOJI_SIZE = 64
|
||||
|
||||
# These sizes were selected based on looking at the maximum common
|
||||
# sizes in a library of animated custom emoji, balanced against the
|
||||
# network cost of very large emoji images.
|
||||
MAX_EMOJI_GIF_SIZE = 128
|
||||
MAX_EMOJI_GIF_FILE_SIZE_BYTES = 128 * 1024 * 1024 # 128 kb
|
||||
|
||||
|
||||
INLINE_MIME_TYPES = [
|
||||
"application/pdf",
|
||||
"image/gif",
|
||||
"image/jpeg",
|
||||
"image/png",
|
||||
"image/webp",
|
||||
# To avoid cross-site scripting attacks, DO NOT add types such
|
||||
# as application/xhtml+xml, application/x-shockwave-flash,
|
||||
# image/svg+xml, text/html, or text/xml.
|
||||
]
|
||||
|
||||
|
||||
def sanitize_name(value: str) -> str:
|
||||
"""
|
||||
Sanitizes a value to be safe to store in a Linux filesystem, in
|
||||
S3, and in a URL. So Unicode is allowed, but not special
|
||||
characters other than ".", "-", and "_".
|
||||
|
||||
This implementation is based on django.utils.text.slugify; it is
|
||||
modified by:
|
||||
* adding '.' to the list of allowed characters.
|
||||
* preserving the case of the value.
|
||||
* not stripping trailing dashes and underscores.
|
||||
"""
|
||||
value = unicodedata.normalize("NFKC", value)
|
||||
value = re.sub(r"[^\w\s.-]", "", value).strip()
|
||||
value = re.sub(r"[-\s]+", "-", value)
|
||||
assert value not in {"", ".", ".."}
|
||||
return Markup(value)
|
||||
|
||||
|
||||
class BadImageError(JsonableError):
|
||||
code = ErrorCode.BAD_IMAGE
|
||||
|
||||
|
||||
def resize_avatar(image_data: bytes, size: int = DEFAULT_AVATAR_SIZE) -> bytes:
|
||||
try:
|
||||
im = Image.open(io.BytesIO(image_data))
|
||||
im = ImageOps.exif_transpose(im)
|
||||
im = ImageOps.fit(im, (size, size), Image.ANTIALIAS)
|
||||
except OSError:
|
||||
raise BadImageError(_("Could not decode image; did you upload an image file?"))
|
||||
except DecompressionBombError:
|
||||
raise BadImageError(_("Image size exceeds limit."))
|
||||
out = io.BytesIO()
|
||||
if im.mode == "CMYK":
|
||||
im = im.convert("RGB")
|
||||
im.save(out, format="png")
|
||||
return out.getvalue()
|
||||
|
||||
|
||||
def resize_logo(image_data: bytes) -> bytes:
|
||||
try:
|
||||
im = Image.open(io.BytesIO(image_data))
|
||||
im = ImageOps.exif_transpose(im)
|
||||
im.thumbnail((8 * DEFAULT_AVATAR_SIZE, DEFAULT_AVATAR_SIZE), Image.ANTIALIAS)
|
||||
except OSError:
|
||||
raise BadImageError(_("Could not decode image; did you upload an image file?"))
|
||||
except DecompressionBombError:
|
||||
raise BadImageError(_("Image size exceeds limit."))
|
||||
out = io.BytesIO()
|
||||
if im.mode == "CMYK":
|
||||
im = im.convert("RGB")
|
||||
im.save(out, format="png")
|
||||
return out.getvalue()
|
||||
|
||||
|
||||
def resize_animated(im: Image.Image, size: int = DEFAULT_EMOJI_SIZE) -> bytes:
|
||||
assert im.n_frames > 1
|
||||
frames = []
|
||||
duration_info = []
|
||||
disposals = []
|
||||
# If 'loop' info is not set then loop for infinite number of times.
|
||||
loop = im.info.get("loop", 0)
|
||||
for frame_num in range(0, im.n_frames):
|
||||
im.seek(frame_num)
|
||||
new_frame = im.copy()
|
||||
new_frame.paste(im, (0, 0), im.convert("RGBA"))
|
||||
new_frame = ImageOps.pad(new_frame, (size, size), Image.ANTIALIAS)
|
||||
frames.append(new_frame)
|
||||
if im.info.get("duration") is None: # nocoverage
|
||||
raise BadImageError(_("Corrupt animated image."))
|
||||
duration_info.append(im.info["duration"])
|
||||
if isinstance(im, GifImagePlugin.GifImageFile):
|
||||
disposals.append(
|
||||
im.disposal_method # type: ignore[attr-defined] # private member missing from stubs
|
||||
)
|
||||
elif isinstance(im, PngImagePlugin.PngImageFile):
|
||||
disposals.append(im.info.get("disposal", PngImagePlugin.APNG_DISPOSE_OP_NONE))
|
||||
else: # nocoverage
|
||||
raise BadImageError(_("Unknown animated image format."))
|
||||
out = io.BytesIO()
|
||||
frames[0].save(
|
||||
out,
|
||||
save_all=True,
|
||||
optimize=False,
|
||||
format=im.format,
|
||||
append_images=frames[1:],
|
||||
duration=duration_info,
|
||||
disposal=disposals,
|
||||
loop=loop,
|
||||
)
|
||||
|
||||
return out.getvalue()
|
||||
|
||||
|
||||
def resize_emoji(
|
||||
image_data: bytes, size: int = DEFAULT_EMOJI_SIZE
|
||||
) -> Tuple[bytes, bool, Optional[bytes]]:
|
||||
# This function returns three values:
|
||||
# 1) Emoji image data.
|
||||
# 2) If emoji is gif i.e animated.
|
||||
# 3) If is animated then return still image data i.e first frame of gif.
|
||||
|
||||
try:
|
||||
im = Image.open(io.BytesIO(image_data))
|
||||
image_format = im.format
|
||||
if getattr(im, "n_frames", 1) > 1:
|
||||
# There are a number of bugs in Pillow which cause results
|
||||
# in resized images being broken. To work around this we
|
||||
# only resize under certain conditions to minimize the
|
||||
# chance of creating ugly images.
|
||||
should_resize = (
|
||||
im.size[0] != im.size[1] # not square
|
||||
or im.size[0] > MAX_EMOJI_GIF_SIZE # dimensions too large
|
||||
or len(image_data) > MAX_EMOJI_GIF_FILE_SIZE_BYTES # filesize too large
|
||||
)
|
||||
|
||||
# Generate a still image from the first frame. Since
|
||||
# we're converting the format to PNG anyway, we resize unconditionally.
|
||||
still_image = im.copy()
|
||||
still_image.seek(0)
|
||||
still_image = ImageOps.exif_transpose(still_image)
|
||||
still_image = ImageOps.fit(still_image, (size, size), Image.ANTIALIAS)
|
||||
out = io.BytesIO()
|
||||
still_image.save(out, format="PNG")
|
||||
still_image_data = out.getvalue()
|
||||
|
||||
if should_resize:
|
||||
image_data = resize_animated(im, size)
|
||||
|
||||
return image_data, True, still_image_data
|
||||
else:
|
||||
# Note that this is essentially duplicated in the
|
||||
# still_image code path, above.
|
||||
im = ImageOps.exif_transpose(im)
|
||||
im = ImageOps.fit(im, (size, size), Image.ANTIALIAS)
|
||||
out = io.BytesIO()
|
||||
im.save(out, format=image_format)
|
||||
return out.getvalue(), False, None
|
||||
except OSError:
|
||||
raise BadImageError(_("Could not decode image; did you upload an image file?"))
|
||||
except DecompressionBombError:
|
||||
raise BadImageError(_("Image size exceeds limit."))
|
||||
|
||||
|
||||
class ZulipUploadBackend:
|
||||
def get_public_upload_root_url(self) -> str:
|
||||
raise NotImplementedError()
|
||||
|
||||
def generate_message_upload_path(self, realm_id: str, uploaded_file_name: str) -> str:
|
||||
raise NotImplementedError()
|
||||
|
||||
def upload_message_file(
|
||||
self,
|
||||
uploaded_file_name: str,
|
||||
uploaded_file_size: int,
|
||||
content_type: Optional[str],
|
||||
file_data: bytes,
|
||||
user_profile: UserProfile,
|
||||
target_realm: Optional[Realm] = None,
|
||||
) -> str:
|
||||
raise NotImplementedError()
|
||||
|
||||
def upload_avatar_image(
|
||||
self,
|
||||
user_file: IO[bytes],
|
||||
acting_user_profile: UserProfile,
|
||||
target_user_profile: UserProfile,
|
||||
content_type: Optional[str] = None,
|
||||
) -> None:
|
||||
raise NotImplementedError()
|
||||
|
||||
def delete_avatar_image(self, user: UserProfile) -> None:
|
||||
raise NotImplementedError()
|
||||
|
||||
def delete_message_image(self, path_id: str) -> bool:
|
||||
raise NotImplementedError()
|
||||
|
||||
def get_avatar_url(self, hash_key: str, medium: bool = False) -> str:
|
||||
raise NotImplementedError()
|
||||
|
||||
def copy_avatar(self, source_profile: UserProfile, target_profile: UserProfile) -> None:
|
||||
raise NotImplementedError()
|
||||
|
||||
def ensure_avatar_image(self, user_profile: UserProfile, is_medium: bool = False) -> None:
|
||||
raise NotImplementedError()
|
||||
|
||||
def upload_realm_icon_image(self, icon_file: IO[bytes], user_profile: UserProfile) -> None:
|
||||
raise NotImplementedError()
|
||||
|
||||
def get_realm_icon_url(self, realm_id: int, version: int) -> str:
|
||||
raise NotImplementedError()
|
||||
|
||||
def upload_realm_logo_image(
|
||||
self, logo_file: IO[bytes], user_profile: UserProfile, night: bool
|
||||
) -> None:
|
||||
raise NotImplementedError()
|
||||
|
||||
def get_realm_logo_url(self, realm_id: int, version: int, night: bool) -> str:
|
||||
raise NotImplementedError()
|
||||
|
||||
def upload_emoji_image(
|
||||
self, emoji_file: IO[bytes], emoji_file_name: str, user_profile: UserProfile
|
||||
) -> bool:
|
||||
raise NotImplementedError()
|
||||
|
||||
def get_emoji_url(self, emoji_file_name: str, realm_id: int, still: bool = False) -> str:
|
||||
raise NotImplementedError()
|
||||
|
||||
def upload_export_tarball(
|
||||
self,
|
||||
realm: Realm,
|
||||
tarball_path: str,
|
||||
percent_callback: Optional[Callable[[Any], None]] = None,
|
||||
) -> str:
|
||||
raise NotImplementedError()
|
||||
|
||||
def delete_export_tarball(self, export_path: str) -> Optional[str]:
|
||||
raise NotImplementedError()
|
||||
|
||||
def get_export_tarball_url(self, realm: Realm, export_path: str) -> str:
|
||||
raise NotImplementedError()
|
||||
|
||||
def realm_avatar_and_logo_path(self, realm: Realm) -> str:
|
||||
raise NotImplementedError()
|
||||
|
||||
|
||||
def create_attachment(
|
||||
file_name: str, path_id: str, user_profile: UserProfile, realm: Realm, file_size: int
|
||||
) -> bool:
|
||||
assert (user_profile.realm_id == realm.id) or is_cross_realm_bot_email(
|
||||
user_profile.delivery_email
|
||||
)
|
||||
attachment = Attachment.objects.create(
|
||||
file_name=file_name,
|
||||
path_id=path_id,
|
||||
owner=user_profile,
|
||||
realm=realm,
|
||||
size=file_size,
|
||||
)
|
||||
from zerver.actions.uploads import notify_attachment_update
|
||||
|
||||
notify_attachment_update(user_profile, "add", attachment.to_dict())
|
||||
return True
|
|
@ -0,0 +1,285 @@
|
|||
import base64
|
||||
import binascii
|
||||
import logging
|
||||
import os
|
||||
import random
|
||||
import secrets
|
||||
import shutil
|
||||
from datetime import timedelta
|
||||
from typing import IO, Any, Callable, Optional
|
||||
|
||||
from django.conf import settings
|
||||
from django.core.signing import BadSignature, TimestampSigner
|
||||
from django.urls import reverse
|
||||
|
||||
from zerver.lib.avatar_hash import user_avatar_path
|
||||
from zerver.lib.upload.base import (
|
||||
MEDIUM_AVATAR_SIZE,
|
||||
ZulipUploadBackend,
|
||||
create_attachment,
|
||||
resize_avatar,
|
||||
resize_emoji,
|
||||
resize_logo,
|
||||
sanitize_name,
|
||||
)
|
||||
from zerver.lib.utils import assert_is_not_none
|
||||
from zerver.models import Realm, RealmEmoji, UserProfile
|
||||
|
||||
|
||||
def write_local_file(type: str, path: str, file_data: bytes) -> None:
|
||||
file_path = os.path.join(assert_is_not_none(settings.LOCAL_UPLOADS_DIR), type, path)
|
||||
|
||||
os.makedirs(os.path.dirname(file_path), exist_ok=True)
|
||||
with open(file_path, "wb") as f:
|
||||
f.write(file_data)
|
||||
|
||||
|
||||
def read_local_file(type: str, path: str) -> bytes:
|
||||
file_path = os.path.join(assert_is_not_none(settings.LOCAL_UPLOADS_DIR), type, path)
|
||||
with open(file_path, "rb") as f:
|
||||
return f.read()
|
||||
|
||||
|
||||
def delete_local_file(type: str, path: str) -> bool:
|
||||
file_path = os.path.join(assert_is_not_none(settings.LOCAL_UPLOADS_DIR), type, path)
|
||||
if os.path.isfile(file_path):
|
||||
# This removes the file but the empty folders still remain.
|
||||
os.remove(file_path)
|
||||
return True
|
||||
file_name = path.split("/")[-1]
|
||||
logging.warning("%s does not exist. Its entry in the database will be removed.", file_name)
|
||||
return False
|
||||
|
||||
|
||||
def get_local_file_path(path_id: str) -> Optional[str]:
|
||||
local_path = os.path.join(assert_is_not_none(settings.LOCAL_UPLOADS_DIR), "files", path_id)
|
||||
if os.path.isfile(local_path):
|
||||
return local_path
|
||||
else:
|
||||
return None
|
||||
|
||||
|
||||
LOCAL_FILE_ACCESS_TOKEN_SALT = "local_file_"
|
||||
|
||||
|
||||
def generate_unauthed_file_access_url(path_id: str) -> str:
|
||||
signed_data = TimestampSigner(salt=LOCAL_FILE_ACCESS_TOKEN_SALT).sign(path_id)
|
||||
token = base64.b16encode(signed_data.encode()).decode()
|
||||
|
||||
filename = path_id.split("/")[-1]
|
||||
return reverse("local_file_unauthed", args=[token, filename])
|
||||
|
||||
|
||||
def get_local_file_path_id_from_token(token: str) -> Optional[str]:
|
||||
signer = TimestampSigner(salt=LOCAL_FILE_ACCESS_TOKEN_SALT)
|
||||
try:
|
||||
signed_data = base64.b16decode(token).decode()
|
||||
path_id = signer.unsign(signed_data, max_age=timedelta(seconds=60))
|
||||
except (BadSignature, binascii.Error):
|
||||
return None
|
||||
|
||||
return path_id
|
||||
|
||||
|
||||
class LocalUploadBackend(ZulipUploadBackend):
|
||||
def get_public_upload_root_url(self) -> str:
|
||||
return "/user_avatars/"
|
||||
|
||||
def generate_message_upload_path(self, realm_id: str, uploaded_file_name: str) -> str:
|
||||
# Split into 256 subdirectories to prevent directories from getting too big
|
||||
return "/".join(
|
||||
[
|
||||
realm_id,
|
||||
format(random.randint(0, 255), "x"),
|
||||
secrets.token_urlsafe(18),
|
||||
sanitize_name(uploaded_file_name),
|
||||
]
|
||||
)
|
||||
|
||||
def upload_message_file(
|
||||
self,
|
||||
uploaded_file_name: str,
|
||||
uploaded_file_size: int,
|
||||
content_type: Optional[str],
|
||||
file_data: bytes,
|
||||
user_profile: UserProfile,
|
||||
target_realm: Optional[Realm] = None,
|
||||
) -> str:
|
||||
if target_realm is None:
|
||||
target_realm = user_profile.realm
|
||||
|
||||
path = self.generate_message_upload_path(str(target_realm.id), uploaded_file_name)
|
||||
|
||||
write_local_file("files", path, file_data)
|
||||
create_attachment(uploaded_file_name, path, user_profile, target_realm, uploaded_file_size)
|
||||
return "/user_uploads/" + path
|
||||
|
||||
def delete_message_image(self, path_id: str) -> bool:
|
||||
return delete_local_file("files", path_id)
|
||||
|
||||
def write_avatar_images(self, file_path: str, image_data: bytes) -> None:
|
||||
write_local_file("avatars", file_path + ".original", image_data)
|
||||
|
||||
resized_data = resize_avatar(image_data)
|
||||
write_local_file("avatars", file_path + ".png", resized_data)
|
||||
|
||||
resized_medium = resize_avatar(image_data, MEDIUM_AVATAR_SIZE)
|
||||
write_local_file("avatars", file_path + "-medium.png", resized_medium)
|
||||
|
||||
def upload_avatar_image(
|
||||
self,
|
||||
user_file: IO[bytes],
|
||||
acting_user_profile: UserProfile,
|
||||
target_user_profile: UserProfile,
|
||||
content_type: Optional[str] = None,
|
||||
) -> None:
|
||||
file_path = user_avatar_path(target_user_profile)
|
||||
|
||||
image_data = user_file.read()
|
||||
self.write_avatar_images(file_path, image_data)
|
||||
|
||||
def delete_avatar_image(self, user: UserProfile) -> None:
|
||||
path_id = user_avatar_path(user)
|
||||
|
||||
delete_local_file("avatars", path_id + ".original")
|
||||
delete_local_file("avatars", path_id + ".png")
|
||||
delete_local_file("avatars", path_id + "-medium.png")
|
||||
|
||||
def get_avatar_url(self, hash_key: str, medium: bool = False) -> str:
|
||||
medium_suffix = "-medium" if medium else ""
|
||||
return f"/user_avatars/{hash_key}{medium_suffix}.png"
|
||||
|
||||
def copy_avatar(self, source_profile: UserProfile, target_profile: UserProfile) -> None:
|
||||
source_file_path = user_avatar_path(source_profile)
|
||||
target_file_path = user_avatar_path(target_profile)
|
||||
|
||||
image_data = read_local_file("avatars", source_file_path + ".original")
|
||||
self.write_avatar_images(target_file_path, image_data)
|
||||
|
||||
def realm_avatar_and_logo_path(self, realm: Realm) -> str:
|
||||
return os.path.join("avatars", str(realm.id), "realm")
|
||||
|
||||
def upload_realm_icon_image(self, icon_file: IO[bytes], user_profile: UserProfile) -> None:
|
||||
upload_path = self.realm_avatar_and_logo_path(user_profile.realm)
|
||||
image_data = icon_file.read()
|
||||
write_local_file(upload_path, "icon.original", image_data)
|
||||
|
||||
resized_data = resize_avatar(image_data)
|
||||
write_local_file(upload_path, "icon.png", resized_data)
|
||||
|
||||
def get_realm_icon_url(self, realm_id: int, version: int) -> str:
|
||||
return f"/user_avatars/{realm_id}/realm/icon.png?version={version}"
|
||||
|
||||
def upload_realm_logo_image(
|
||||
self, logo_file: IO[bytes], user_profile: UserProfile, night: bool
|
||||
) -> None:
|
||||
upload_path = self.realm_avatar_and_logo_path(user_profile.realm)
|
||||
if night:
|
||||
original_file = "night_logo.original"
|
||||
resized_file = "night_logo.png"
|
||||
else:
|
||||
original_file = "logo.original"
|
||||
resized_file = "logo.png"
|
||||
image_data = logo_file.read()
|
||||
write_local_file(upload_path, original_file, image_data)
|
||||
|
||||
resized_data = resize_logo(image_data)
|
||||
write_local_file(upload_path, resized_file, resized_data)
|
||||
|
||||
def get_realm_logo_url(self, realm_id: int, version: int, night: bool) -> str:
|
||||
if night:
|
||||
file_name = "night_logo.png"
|
||||
else:
|
||||
file_name = "logo.png"
|
||||
return f"/user_avatars/{realm_id}/realm/{file_name}?version={version}"
|
||||
|
||||
def ensure_avatar_image(self, user_profile: UserProfile, is_medium: bool = False) -> None:
|
||||
file_extension = "-medium.png" if is_medium else ".png"
|
||||
file_path = user_avatar_path(user_profile)
|
||||
|
||||
output_path = os.path.join(
|
||||
assert_is_not_none(settings.LOCAL_UPLOADS_DIR),
|
||||
"avatars",
|
||||
file_path + file_extension,
|
||||
)
|
||||
if os.path.isfile(output_path):
|
||||
return
|
||||
|
||||
image_path = os.path.join(
|
||||
assert_is_not_none(settings.LOCAL_UPLOADS_DIR), "avatars", file_path + ".original"
|
||||
)
|
||||
with open(image_path, "rb") as f:
|
||||
image_data = f.read()
|
||||
if is_medium:
|
||||
resized_avatar = resize_avatar(image_data, MEDIUM_AVATAR_SIZE)
|
||||
else:
|
||||
resized_avatar = resize_avatar(image_data)
|
||||
write_local_file("avatars", file_path + file_extension, resized_avatar)
|
||||
|
||||
def upload_emoji_image(
|
||||
self, emoji_file: IO[bytes], emoji_file_name: str, user_profile: UserProfile
|
||||
) -> bool:
|
||||
emoji_path = RealmEmoji.PATH_ID_TEMPLATE.format(
|
||||
realm_id=user_profile.realm_id,
|
||||
emoji_file_name=emoji_file_name,
|
||||
)
|
||||
|
||||
image_data = emoji_file.read()
|
||||
write_local_file("avatars", ".".join((emoji_path, "original")), image_data)
|
||||
resized_image_data, is_animated, still_image_data = resize_emoji(image_data)
|
||||
write_local_file("avatars", emoji_path, resized_image_data)
|
||||
if is_animated:
|
||||
assert still_image_data is not None
|
||||
still_path = RealmEmoji.STILL_PATH_ID_TEMPLATE.format(
|
||||
realm_id=user_profile.realm_id,
|
||||
emoji_filename_without_extension=os.path.splitext(emoji_file_name)[0],
|
||||
)
|
||||
write_local_file("avatars", still_path, still_image_data)
|
||||
return is_animated
|
||||
|
||||
def get_emoji_url(self, emoji_file_name: str, realm_id: int, still: bool = False) -> str:
|
||||
if still:
|
||||
return os.path.join(
|
||||
"/user_avatars",
|
||||
RealmEmoji.STILL_PATH_ID_TEMPLATE.format(
|
||||
realm_id=realm_id,
|
||||
emoji_filename_without_extension=os.path.splitext(emoji_file_name)[0],
|
||||
),
|
||||
)
|
||||
else:
|
||||
return os.path.join(
|
||||
"/user_avatars",
|
||||
RealmEmoji.PATH_ID_TEMPLATE.format(
|
||||
realm_id=realm_id, emoji_file_name=emoji_file_name
|
||||
),
|
||||
)
|
||||
|
||||
def upload_export_tarball(
|
||||
self,
|
||||
realm: Realm,
|
||||
tarball_path: str,
|
||||
percent_callback: Optional[Callable[[Any], None]] = None,
|
||||
) -> str:
|
||||
path = os.path.join(
|
||||
"exports",
|
||||
str(realm.id),
|
||||
secrets.token_urlsafe(18),
|
||||
os.path.basename(tarball_path),
|
||||
)
|
||||
abs_path = os.path.join(assert_is_not_none(settings.LOCAL_UPLOADS_DIR), "avatars", path)
|
||||
os.makedirs(os.path.dirname(abs_path), exist_ok=True)
|
||||
shutil.copy(tarball_path, abs_path)
|
||||
public_url = realm.uri + "/user_avatars/" + path
|
||||
return public_url
|
||||
|
||||
def delete_export_tarball(self, export_path: str) -> Optional[str]:
|
||||
# Get the last element of a list in the form ['user_avatars', '<file_path>']
|
||||
assert export_path.startswith("/")
|
||||
file_path = export_path[1:].split("/", 1)[-1]
|
||||
if delete_local_file("avatars", file_path):
|
||||
return export_path
|
||||
return None
|
||||
|
||||
def get_export_tarball_url(self, realm: Realm, export_path: str) -> str:
|
||||
# export_path has a leading `/`
|
||||
return realm.uri + export_path
|
|
@ -0,0 +1,485 @@
|
|||
import logging
|
||||
import os
|
||||
import secrets
|
||||
import urllib
|
||||
from mimetypes import guess_type
|
||||
from typing import IO, Any, Callable, Optional
|
||||
|
||||
import boto3
|
||||
import botocore
|
||||
from boto3.session import Session
|
||||
from botocore.client import Config
|
||||
from django.conf import settings
|
||||
from mypy_boto3_s3.client import S3Client
|
||||
from mypy_boto3_s3.service_resource import Bucket, Object
|
||||
|
||||
from zerver.lib.avatar_hash import user_avatar_path
|
||||
from zerver.lib.upload.base import (
|
||||
INLINE_MIME_TYPES,
|
||||
MEDIUM_AVATAR_SIZE,
|
||||
ZulipUploadBackend,
|
||||
create_attachment,
|
||||
resize_avatar,
|
||||
resize_emoji,
|
||||
resize_logo,
|
||||
sanitize_name,
|
||||
)
|
||||
from zerver.models import Realm, RealmEmoji, UserProfile
|
||||
|
||||
# Duration that the signed upload URLs that we redirect to when
|
||||
# accessing uploaded files are available for clients to fetch before
|
||||
# they expire.
|
||||
SIGNED_UPLOAD_URL_DURATION = 60
|
||||
|
||||
# Performance note:
|
||||
#
|
||||
# For writing files to S3, the file could either be stored in RAM
|
||||
# (if it is less than 2.5MiB or so) or an actual temporary file on disk.
|
||||
#
|
||||
# Because we set FILE_UPLOAD_MAX_MEMORY_SIZE to 0, only the latter case
|
||||
# should occur in practice.
|
||||
#
|
||||
# This is great, because passing the pseudofile object that Django gives
|
||||
# you to boto would be a pain.
|
||||
|
||||
# To come up with a s3 key we randomly generate a "directory". The
|
||||
# "file name" is the original filename provided by the user run
|
||||
# through a sanitization function.
|
||||
|
||||
|
||||
# https://github.com/boto/botocore/issues/2644 means that the IMDS
|
||||
# request _always_ pulls from the environment. Monkey-patch the
|
||||
# `should_bypass_proxies` function if we need to skip them, based
|
||||
# on S3_SKIP_PROXY.
|
||||
if settings.S3_SKIP_PROXY is True: # nocoverage
|
||||
botocore.utils.should_bypass_proxies = lambda url: True
|
||||
|
||||
|
||||
def get_bucket(bucket_name: str, session: Optional[Session] = None) -> Bucket:
|
||||
if session is None:
|
||||
session = Session(settings.S3_KEY, settings.S3_SECRET_KEY)
|
||||
bucket = session.resource(
|
||||
"s3", region_name=settings.S3_REGION, endpoint_url=settings.S3_ENDPOINT_URL
|
||||
).Bucket(bucket_name)
|
||||
return bucket
|
||||
|
||||
|
||||
def upload_image_to_s3(
|
||||
bucket: Bucket,
|
||||
file_name: str,
|
||||
content_type: Optional[str],
|
||||
user_profile: UserProfile,
|
||||
contents: bytes,
|
||||
) -> None:
|
||||
key = bucket.Object(file_name)
|
||||
metadata = {
|
||||
"user_profile_id": str(user_profile.id),
|
||||
"realm_id": str(user_profile.realm_id),
|
||||
}
|
||||
|
||||
content_disposition = ""
|
||||
if content_type is None:
|
||||
content_type = ""
|
||||
if content_type not in INLINE_MIME_TYPES:
|
||||
content_disposition = "attachment"
|
||||
|
||||
key.put(
|
||||
Body=contents,
|
||||
Metadata=metadata,
|
||||
ContentType=content_type,
|
||||
ContentDisposition=content_disposition,
|
||||
)
|
||||
|
||||
|
||||
def get_signed_upload_url(path: str, download: bool = False) -> str:
|
||||
client = boto3.client(
|
||||
"s3",
|
||||
aws_access_key_id=settings.S3_KEY,
|
||||
aws_secret_access_key=settings.S3_SECRET_KEY,
|
||||
region_name=settings.S3_REGION,
|
||||
endpoint_url=settings.S3_ENDPOINT_URL,
|
||||
)
|
||||
params = {
|
||||
"Bucket": settings.S3_AUTH_UPLOADS_BUCKET,
|
||||
"Key": path,
|
||||
}
|
||||
if download:
|
||||
params["ResponseContentDisposition"] = "attachment"
|
||||
|
||||
return client.generate_presigned_url(
|
||||
ClientMethod="get_object",
|
||||
Params=params,
|
||||
ExpiresIn=SIGNED_UPLOAD_URL_DURATION,
|
||||
HttpMethod="GET",
|
||||
)
|
||||
|
||||
|
||||
class S3UploadBackend(ZulipUploadBackend):
|
||||
def __init__(self) -> None:
|
||||
self.session = Session(settings.S3_KEY, settings.S3_SECRET_KEY)
|
||||
self.avatar_bucket = get_bucket(settings.S3_AVATAR_BUCKET, self.session)
|
||||
self.uploads_bucket = get_bucket(settings.S3_AUTH_UPLOADS_BUCKET, self.session)
|
||||
|
||||
self._boto_client: Optional[S3Client] = None
|
||||
self.public_upload_url_base = self.construct_public_upload_url_base()
|
||||
|
||||
def construct_public_upload_url_base(self) -> str:
|
||||
# Return the pattern for public URL for a key in the S3 Avatar bucket.
|
||||
# For Amazon S3 itself, this will return the following:
|
||||
# f"https://{self.avatar_bucket.name}.{network_location}/{key}"
|
||||
#
|
||||
# However, we need this function to properly handle S3 style
|
||||
# file upload backends that Zulip supports, which can have a
|
||||
# different URL format. Configuring no signature and providing
|
||||
# no access key makes `generate_presigned_url` just return the
|
||||
# normal public URL for a key.
|
||||
#
|
||||
# It unfortunately takes 2ms per query to call
|
||||
# generate_presigned_url, even with our cached boto
|
||||
# client. Since we need to potentially compute hundreds of
|
||||
# avatar URLs in single `GET /messages` request, we instead
|
||||
# back-compute the URL pattern here.
|
||||
|
||||
DUMMY_KEY = "dummy_key_ignored"
|
||||
foo_url = self.get_boto_client().generate_presigned_url(
|
||||
ClientMethod="get_object",
|
||||
Params={
|
||||
"Bucket": self.avatar_bucket.name,
|
||||
"Key": DUMMY_KEY,
|
||||
},
|
||||
ExpiresIn=0,
|
||||
)
|
||||
split_url = urllib.parse.urlsplit(foo_url)
|
||||
assert split_url.path.endswith(f"/{DUMMY_KEY}")
|
||||
|
||||
return urllib.parse.urlunsplit(
|
||||
(split_url.scheme, split_url.netloc, split_url.path[: -len(DUMMY_KEY)], "", "")
|
||||
)
|
||||
|
||||
def get_public_upload_url(
|
||||
self,
|
||||
key: str,
|
||||
) -> str:
|
||||
assert not key.startswith("/")
|
||||
return urllib.parse.urljoin(self.public_upload_url_base, key)
|
||||
|
||||
def get_boto_client(self) -> S3Client:
|
||||
"""
|
||||
Creating the client takes a long time so we need to cache it.
|
||||
"""
|
||||
if self._boto_client is None:
|
||||
config = Config(signature_version=botocore.UNSIGNED)
|
||||
self._boto_client = self.session.client(
|
||||
"s3",
|
||||
region_name=settings.S3_REGION,
|
||||
endpoint_url=settings.S3_ENDPOINT_URL,
|
||||
config=config,
|
||||
)
|
||||
return self._boto_client
|
||||
|
||||
def delete_file_from_s3(self, path_id: str, bucket: Bucket) -> bool:
|
||||
key = bucket.Object(path_id)
|
||||
|
||||
try:
|
||||
key.load()
|
||||
except botocore.exceptions.ClientError:
|
||||
file_name = path_id.split("/")[-1]
|
||||
logging.warning(
|
||||
"%s does not exist. Its entry in the database will be removed.", file_name
|
||||
)
|
||||
return False
|
||||
key.delete()
|
||||
return True
|
||||
|
||||
def get_public_upload_root_url(self) -> str:
|
||||
return self.public_upload_url_base
|
||||
|
||||
def generate_message_upload_path(self, realm_id: str, uploaded_file_name: str) -> str:
|
||||
return "/".join(
|
||||
[
|
||||
realm_id,
|
||||
secrets.token_urlsafe(18),
|
||||
sanitize_name(uploaded_file_name),
|
||||
]
|
||||
)
|
||||
|
||||
def upload_message_file(
|
||||
self,
|
||||
uploaded_file_name: str,
|
||||
uploaded_file_size: int,
|
||||
content_type: Optional[str],
|
||||
file_data: bytes,
|
||||
user_profile: UserProfile,
|
||||
target_realm: Optional[Realm] = None,
|
||||
) -> str:
|
||||
if target_realm is None:
|
||||
target_realm = user_profile.realm
|
||||
s3_file_name = self.generate_message_upload_path(str(target_realm.id), uploaded_file_name)
|
||||
url = f"/user_uploads/{s3_file_name}"
|
||||
|
||||
upload_image_to_s3(
|
||||
self.uploads_bucket,
|
||||
s3_file_name,
|
||||
content_type,
|
||||
user_profile,
|
||||
file_data,
|
||||
)
|
||||
|
||||
create_attachment(
|
||||
uploaded_file_name, s3_file_name, user_profile, target_realm, uploaded_file_size
|
||||
)
|
||||
return url
|
||||
|
||||
def delete_message_image(self, path_id: str) -> bool:
|
||||
return self.delete_file_from_s3(path_id, self.uploads_bucket)
|
||||
|
||||
def write_avatar_images(
|
||||
self,
|
||||
s3_file_name: str,
|
||||
target_user_profile: UserProfile,
|
||||
image_data: bytes,
|
||||
content_type: Optional[str],
|
||||
) -> None:
|
||||
upload_image_to_s3(
|
||||
self.avatar_bucket,
|
||||
s3_file_name + ".original",
|
||||
content_type,
|
||||
target_user_profile,
|
||||
image_data,
|
||||
)
|
||||
|
||||
# custom 500px wide version
|
||||
resized_medium = resize_avatar(image_data, MEDIUM_AVATAR_SIZE)
|
||||
upload_image_to_s3(
|
||||
self.avatar_bucket,
|
||||
s3_file_name + "-medium.png",
|
||||
"image/png",
|
||||
target_user_profile,
|
||||
resized_medium,
|
||||
)
|
||||
|
||||
resized_data = resize_avatar(image_data)
|
||||
upload_image_to_s3(
|
||||
self.avatar_bucket,
|
||||
s3_file_name,
|
||||
"image/png",
|
||||
target_user_profile,
|
||||
resized_data,
|
||||
)
|
||||
# See avatar_url in avatar.py for URL. (That code also handles the case
|
||||
# that users use gravatar.)
|
||||
|
||||
def upload_avatar_image(
|
||||
self,
|
||||
user_file: IO[bytes],
|
||||
acting_user_profile: UserProfile,
|
||||
target_user_profile: UserProfile,
|
||||
content_type: Optional[str] = None,
|
||||
) -> None:
|
||||
if content_type is None:
|
||||
content_type = guess_type(user_file.name)[0]
|
||||
s3_file_name = user_avatar_path(target_user_profile)
|
||||
|
||||
image_data = user_file.read()
|
||||
self.write_avatar_images(s3_file_name, target_user_profile, image_data, content_type)
|
||||
|
||||
def delete_avatar_image(self, user: UserProfile) -> None:
|
||||
path_id = user_avatar_path(user)
|
||||
|
||||
self.delete_file_from_s3(path_id + ".original", self.avatar_bucket)
|
||||
self.delete_file_from_s3(path_id + "-medium.png", self.avatar_bucket)
|
||||
self.delete_file_from_s3(path_id, self.avatar_bucket)
|
||||
|
||||
def get_avatar_key(self, file_name: str) -> Object:
|
||||
key = self.avatar_bucket.Object(file_name)
|
||||
return key
|
||||
|
||||
def copy_avatar(self, source_profile: UserProfile, target_profile: UserProfile) -> None:
|
||||
s3_source_file_name = user_avatar_path(source_profile)
|
||||
s3_target_file_name = user_avatar_path(target_profile)
|
||||
|
||||
key = self.get_avatar_key(s3_source_file_name + ".original")
|
||||
image_data = key.get()["Body"].read()
|
||||
content_type = key.content_type
|
||||
|
||||
self.write_avatar_images(s3_target_file_name, target_profile, image_data, content_type)
|
||||
|
||||
def get_avatar_url(self, hash_key: str, medium: bool = False) -> str:
|
||||
medium_suffix = "-medium.png" if medium else ""
|
||||
return self.get_public_upload_url(f"{hash_key}{medium_suffix}")
|
||||
|
||||
def get_export_tarball_url(self, realm: Realm, export_path: str) -> str:
|
||||
# export_path has a leading /
|
||||
return self.get_public_upload_url(export_path[1:])
|
||||
|
||||
def realm_avatar_and_logo_path(self, realm: Realm) -> str:
|
||||
return os.path.join(str(realm.id), "realm")
|
||||
|
||||
def upload_realm_icon_image(self, icon_file: IO[bytes], user_profile: UserProfile) -> None:
|
||||
content_type = guess_type(icon_file.name)[0]
|
||||
s3_file_name = os.path.join(self.realm_avatar_and_logo_path(user_profile.realm), "icon")
|
||||
|
||||
image_data = icon_file.read()
|
||||
upload_image_to_s3(
|
||||
self.avatar_bucket,
|
||||
s3_file_name + ".original",
|
||||
content_type,
|
||||
user_profile,
|
||||
image_data,
|
||||
)
|
||||
|
||||
resized_data = resize_avatar(image_data)
|
||||
upload_image_to_s3(
|
||||
self.avatar_bucket,
|
||||
s3_file_name + ".png",
|
||||
"image/png",
|
||||
user_profile,
|
||||
resized_data,
|
||||
)
|
||||
# See avatar_url in avatar.py for URL. (That code also handles the case
|
||||
# that users use gravatar.)
|
||||
|
||||
def get_realm_icon_url(self, realm_id: int, version: int) -> str:
|
||||
public_url = self.get_public_upload_url(f"{realm_id}/realm/icon.png")
|
||||
return public_url + f"?version={version}"
|
||||
|
||||
def upload_realm_logo_image(
|
||||
self, logo_file: IO[bytes], user_profile: UserProfile, night: bool
|
||||
) -> None:
|
||||
content_type = guess_type(logo_file.name)[0]
|
||||
if night:
|
||||
basename = "night_logo"
|
||||
else:
|
||||
basename = "logo"
|
||||
s3_file_name = os.path.join(self.realm_avatar_and_logo_path(user_profile.realm), basename)
|
||||
|
||||
image_data = logo_file.read()
|
||||
upload_image_to_s3(
|
||||
self.avatar_bucket,
|
||||
s3_file_name + ".original",
|
||||
content_type,
|
||||
user_profile,
|
||||
image_data,
|
||||
)
|
||||
|
||||
resized_data = resize_logo(image_data)
|
||||
upload_image_to_s3(
|
||||
self.avatar_bucket,
|
||||
s3_file_name + ".png",
|
||||
"image/png",
|
||||
user_profile,
|
||||
resized_data,
|
||||
)
|
||||
# See avatar_url in avatar.py for URL. (That code also handles the case
|
||||
# that users use gravatar.)
|
||||
|
||||
def get_realm_logo_url(self, realm_id: int, version: int, night: bool) -> str:
|
||||
if not night:
|
||||
file_name = "logo.png"
|
||||
else:
|
||||
file_name = "night_logo.png"
|
||||
public_url = self.get_public_upload_url(f"{realm_id}/realm/{file_name}")
|
||||
return public_url + f"?version={version}"
|
||||
|
||||
def ensure_avatar_image(self, user_profile: UserProfile, is_medium: bool = False) -> None:
|
||||
# BUG: The else case should be user_avatar_path(user_profile) + ".png".
|
||||
# See #12852 for details on this bug and how to migrate it.
|
||||
file_extension = "-medium.png" if is_medium else ""
|
||||
file_path = user_avatar_path(user_profile)
|
||||
s3_file_name = file_path
|
||||
|
||||
key = self.avatar_bucket.Object(file_path + ".original")
|
||||
image_data = key.get()["Body"].read()
|
||||
|
||||
if is_medium:
|
||||
resized_avatar = resize_avatar(image_data, MEDIUM_AVATAR_SIZE)
|
||||
else:
|
||||
resized_avatar = resize_avatar(image_data)
|
||||
upload_image_to_s3(
|
||||
self.avatar_bucket,
|
||||
s3_file_name + file_extension,
|
||||
"image/png",
|
||||
user_profile,
|
||||
resized_avatar,
|
||||
)
|
||||
|
||||
def upload_emoji_image(
|
||||
self, emoji_file: IO[bytes], emoji_file_name: str, user_profile: UserProfile
|
||||
) -> bool:
|
||||
content_type = guess_type(emoji_file_name)[0]
|
||||
emoji_path = RealmEmoji.PATH_ID_TEMPLATE.format(
|
||||
realm_id=user_profile.realm_id,
|
||||
emoji_file_name=emoji_file_name,
|
||||
)
|
||||
|
||||
image_data = emoji_file.read()
|
||||
upload_image_to_s3(
|
||||
self.avatar_bucket,
|
||||
".".join((emoji_path, "original")),
|
||||
content_type,
|
||||
user_profile,
|
||||
image_data,
|
||||
)
|
||||
|
||||
resized_image_data, is_animated, still_image_data = resize_emoji(image_data)
|
||||
upload_image_to_s3(
|
||||
self.avatar_bucket,
|
||||
emoji_path,
|
||||
content_type,
|
||||
user_profile,
|
||||
resized_image_data,
|
||||
)
|
||||
if is_animated:
|
||||
still_path = RealmEmoji.STILL_PATH_ID_TEMPLATE.format(
|
||||
realm_id=user_profile.realm_id,
|
||||
emoji_filename_without_extension=os.path.splitext(emoji_file_name)[0],
|
||||
)
|
||||
assert still_image_data is not None
|
||||
upload_image_to_s3(
|
||||
self.avatar_bucket,
|
||||
still_path,
|
||||
"image/png",
|
||||
user_profile,
|
||||
still_image_data,
|
||||
)
|
||||
|
||||
return is_animated
|
||||
|
||||
def get_emoji_url(self, emoji_file_name: str, realm_id: int, still: bool = False) -> str:
|
||||
if still:
|
||||
emoji_path = RealmEmoji.STILL_PATH_ID_TEMPLATE.format(
|
||||
realm_id=realm_id,
|
||||
emoji_filename_without_extension=os.path.splitext(emoji_file_name)[0],
|
||||
)
|
||||
return self.get_public_upload_url(emoji_path)
|
||||
else:
|
||||
emoji_path = RealmEmoji.PATH_ID_TEMPLATE.format(
|
||||
realm_id=realm_id, emoji_file_name=emoji_file_name
|
||||
)
|
||||
return self.get_public_upload_url(emoji_path)
|
||||
|
||||
def upload_export_tarball(
|
||||
self,
|
||||
realm: Optional[Realm],
|
||||
tarball_path: str,
|
||||
percent_callback: Optional[Callable[[Any], None]] = None,
|
||||
) -> str:
|
||||
# We use the avatar bucket, because it's world-readable.
|
||||
key = self.avatar_bucket.Object(
|
||||
os.path.join("exports", secrets.token_hex(16), os.path.basename(tarball_path))
|
||||
)
|
||||
|
||||
if percent_callback is None:
|
||||
key.upload_file(Filename=tarball_path)
|
||||
else:
|
||||
key.upload_file(Filename=tarball_path, Callback=percent_callback)
|
||||
|
||||
public_url = self.get_public_upload_url(key.key)
|
||||
return public_url
|
||||
|
||||
def delete_export_tarball(self, export_path: str) -> Optional[str]:
|
||||
assert export_path.startswith("/")
|
||||
path_id = export_path[1:]
|
||||
if self.delete_file_from_s3(path_id, self.avatar_bucket):
|
||||
return export_path
|
||||
return None
|
|
@ -23,7 +23,8 @@ def patched_user_avatar_path(user_profile: UserProfile) -> str:
|
|||
return make_safe_digest(user_key, hashlib.sha1)
|
||||
|
||||
|
||||
@patch("zerver.lib.upload.user_avatar_path", patched_user_avatar_path)
|
||||
@patch("zerver.lib.upload.s3.user_avatar_path", patched_user_avatar_path)
|
||||
@patch("zerver.lib.upload.local.user_avatar_path", patched_user_avatar_path)
|
||||
def verify_medium_avatar_image(apps: StateApps, schema_editor: BaseDatabaseSchemaEditor) -> None:
|
||||
user_profile_model = apps.get_model("zerver", "UserProfile")
|
||||
for user_profile in user_profile_model.objects.filter(avatar_source="U"):
|
||||
|
|
|
@ -86,7 +86,7 @@ from zerver.lib.test_helpers import (
|
|||
use_s3_backend,
|
||||
)
|
||||
from zerver.lib.types import Validator
|
||||
from zerver.lib.upload import DEFAULT_AVATAR_SIZE, MEDIUM_AVATAR_SIZE, resize_avatar
|
||||
from zerver.lib.upload.base import DEFAULT_AVATAR_SIZE, MEDIUM_AVATAR_SIZE, resize_avatar
|
||||
from zerver.lib.users import get_all_api_keys
|
||||
from zerver.lib.utils import assert_is_not_none
|
||||
from zerver.lib.validator import (
|
||||
|
|
|
@ -43,7 +43,7 @@ from zerver.lib.test_classes import ZulipTestCase
|
|||
from zerver.lib.test_helpers import HostRequestMock, get_user_messages, queries_captured
|
||||
from zerver.lib.topic import MATCH_TOPIC, RESOLVED_TOPIC_PREFIX, TOPIC_NAME
|
||||
from zerver.lib.types import DisplayRecipientT
|
||||
from zerver.lib.upload import create_attachment
|
||||
from zerver.lib.upload.base import create_attachment
|
||||
from zerver.lib.url_encoding import near_message_url
|
||||
from zerver.lib.user_topics import set_topic_mutes
|
||||
from zerver.models import (
|
||||
|
|
|
@ -8,7 +8,7 @@ from zerver.actions.users import do_change_user_role
|
|||
from zerver.lib.exceptions import JsonableError
|
||||
from zerver.lib.test_classes import ZulipTestCase
|
||||
from zerver.lib.test_helpers import get_test_image_file
|
||||
from zerver.lib.upload import BadImageError
|
||||
from zerver.lib.upload.base import BadImageError
|
||||
from zerver.models import Realm, RealmEmoji, UserProfile, get_realm
|
||||
|
||||
|
||||
|
@ -339,7 +339,7 @@ class RealmEmojiTest(ZulipTestCase):
|
|||
def test_failed_file_upload(self) -> None:
|
||||
self.login("iago")
|
||||
with mock.patch(
|
||||
"zerver.lib.upload.write_local_file", side_effect=BadImageError(msg="Broken")
|
||||
"zerver.lib.upload.local.write_local_file", side_effect=BadImageError(msg="Broken")
|
||||
):
|
||||
with get_test_image_file("img.png") as fp1:
|
||||
emoji_data = {"f1": fp1}
|
||||
|
|
|
@ -20,7 +20,7 @@ from zerver.lib.retention import (
|
|||
)
|
||||
from zerver.lib.test_classes import ZulipTestCase
|
||||
from zerver.lib.test_helpers import zulip_reaction_info
|
||||
from zerver.lib.upload import create_attachment
|
||||
from zerver.lib.upload.base import create_attachment
|
||||
from zerver.models import (
|
||||
ArchivedAttachment,
|
||||
ArchivedMessage,
|
||||
|
|
|
@ -19,7 +19,8 @@ from zerver.lib.transfer import (
|
|||
transfer_message_files_to_s3,
|
||||
transfer_uploads_to_s3,
|
||||
)
|
||||
from zerver.lib.upload import resize_emoji, upload_message_file
|
||||
from zerver.lib.upload import upload_message_file
|
||||
from zerver.lib.upload.base import resize_emoji
|
||||
from zerver.models import Attachment, RealmEmoji
|
||||
|
||||
|
||||
|
|
|
@ -46,24 +46,24 @@ from zerver.lib.test_helpers import (
|
|||
use_s3_backend,
|
||||
)
|
||||
from zerver.lib.upload import (
|
||||
delete_export_tarball,
|
||||
delete_message_image,
|
||||
upload_emoji_image,
|
||||
upload_export_tarball,
|
||||
upload_message_file,
|
||||
)
|
||||
from zerver.lib.upload.base import (
|
||||
DEFAULT_AVATAR_SIZE,
|
||||
DEFAULT_EMOJI_SIZE,
|
||||
MEDIUM_AVATAR_SIZE,
|
||||
BadImageError,
|
||||
LocalUploadBackend,
|
||||
S3UploadBackend,
|
||||
ZulipUploadBackend,
|
||||
delete_export_tarball,
|
||||
delete_message_image,
|
||||
get_local_file_path,
|
||||
resize_avatar,
|
||||
resize_emoji,
|
||||
sanitize_name,
|
||||
upload_emoji_image,
|
||||
upload_export_tarball,
|
||||
upload_message_file,
|
||||
write_local_file,
|
||||
)
|
||||
from zerver.lib.upload.local import LocalUploadBackend, get_local_file_path, write_local_file
|
||||
from zerver.lib.upload.s3 import S3UploadBackend
|
||||
from zerver.lib.users import get_api_key
|
||||
from zerver.models import (
|
||||
ArchivedAttachment,
|
||||
|
@ -1293,7 +1293,9 @@ class AvatarTest(UploadSerializeMixin, ZulipTestCase):
|
|||
self.assertTrue(os.path.exists(medium_avatar_disk_path))
|
||||
|
||||
# Verify that ensure_medium_avatar_url does not overwrite this file if it exists
|
||||
with mock.patch("zerver.lib.upload.write_local_file") as mock_write_local_file:
|
||||
with mock.patch(
|
||||
"zerver.lib.upload.local.write_local_file"
|
||||
) as mock_write_local_file:
|
||||
zerver.lib.upload.upload_backend.ensure_avatar_image(
|
||||
user_profile, is_medium=True
|
||||
)
|
||||
|
@ -1452,15 +1454,15 @@ class EmojiTest(UploadSerializeMixin, ZulipTestCase):
|
|||
self.assertEqual((50, 50), still_image.size)
|
||||
|
||||
# Test an image larger than max is resized
|
||||
with patch("zerver.lib.upload.MAX_EMOJI_GIF_SIZE", 128):
|
||||
with patch("zerver.lib.upload.base.MAX_EMOJI_GIF_SIZE", 128):
|
||||
test_resize()
|
||||
|
||||
# Test an image file larger than max is resized
|
||||
with patch("zerver.lib.upload.MAX_EMOJI_GIF_FILE_SIZE_BYTES", 3 * 1024 * 1024):
|
||||
with patch("zerver.lib.upload.base.MAX_EMOJI_GIF_FILE_SIZE_BYTES", 3 * 1024 * 1024):
|
||||
test_resize()
|
||||
|
||||
# Test an image smaller than max and smaller than file size max is not resized
|
||||
with patch("zerver.lib.upload.MAX_EMOJI_GIF_SIZE", 512):
|
||||
with patch("zerver.lib.upload.base.MAX_EMOJI_GIF_SIZE", 512):
|
||||
test_resize(size=256)
|
||||
|
||||
# Test a non-animated GIF image which does need to be resized
|
||||
|
|
|
@ -13,15 +13,14 @@ from django_sendfile import sendfile
|
|||
from zerver.context_processors import get_valid_realm_from_request
|
||||
from zerver.lib.exceptions import JsonableError
|
||||
from zerver.lib.response import json_success
|
||||
from zerver.lib.upload import (
|
||||
INLINE_MIME_TYPES,
|
||||
check_upload_within_quota,
|
||||
from zerver.lib.upload import check_upload_within_quota, upload_message_image_from_request
|
||||
from zerver.lib.upload.base import INLINE_MIME_TYPES
|
||||
from zerver.lib.upload.local import (
|
||||
generate_unauthed_file_access_url,
|
||||
get_local_file_path,
|
||||
get_local_file_path_id_from_token,
|
||||
get_signed_upload_url,
|
||||
upload_message_image_from_request,
|
||||
)
|
||||
from zerver.lib.upload.s3 import get_signed_upload_url
|
||||
from zerver.models import UserProfile, validate_attachment_request
|
||||
|
||||
|
||||
|
|
Loading…
Reference in New Issue