2019-04-29 20:27:42 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2015-10-11 05:41:23 -04:00
|
|
|
require 'rails_helper'
|
2013-02-05 14:16:51 -05:00
|
|
|
|
|
|
|
describe Upload do
|
2013-06-16 04:39:48 -04:00
|
|
|
|
2013-07-13 17:42:19 -04:00
|
|
|
let(:upload) { build(:upload) }
|
2013-04-07 11:52:46 -04:00
|
|
|
|
2013-07-13 17:42:19 -04:00
|
|
|
let(:user_id) { 1 }
|
2013-04-07 11:52:46 -04:00
|
|
|
|
2014-07-14 11:34:23 -04:00
|
|
|
let(:image_filename) { "logo.png" }
|
2014-11-03 13:54:10 -05:00
|
|
|
let(:image) { file_from_fixtures(image_filename) }
|
2013-07-13 17:42:19 -04:00
|
|
|
|
2014-11-03 13:54:10 -05:00
|
|
|
let(:image_svg_filename) { "image.svg" }
|
|
|
|
let(:image_svg) { file_from_fixtures(image_svg_filename) }
|
|
|
|
|
2017-01-11 17:37:12 -05:00
|
|
|
let(:huge_image_filename) { "huge.jpg" }
|
|
|
|
let(:huge_image) { file_from_fixtures(huge_image_filename) }
|
|
|
|
|
2014-04-14 16:55:57 -04:00
|
|
|
let(:attachment_path) { __FILE__ }
|
|
|
|
let(:attachment) { File.new(attachment_path) }
|
2013-07-23 18:54:18 -04:00
|
|
|
|
2013-07-13 17:42:19 -04:00
|
|
|
context ".create_thumbnail!" do
|
|
|
|
|
|
|
|
it "does not create a thumbnail when disabled" do
|
2017-07-07 02:09:14 -04:00
|
|
|
SiteSetting.create_thumbnails = false
|
2013-07-31 17:26:34 -04:00
|
|
|
OptimizedImage.expects(:create_for).never
|
2013-09-27 04:55:50 -04:00
|
|
|
upload.create_thumbnail!(100, 100)
|
2013-07-13 17:42:19 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "creates a thumbnail" do
|
|
|
|
upload = Fabricate(:upload)
|
|
|
|
thumbnail = Fabricate(:optimized_image, upload: upload)
|
|
|
|
SiteSetting.expects(:create_thumbnails?).returns(true)
|
|
|
|
OptimizedImage.expects(:create_for).returns(thumbnail)
|
2013-09-27 04:55:50 -04:00
|
|
|
upload.create_thumbnail!(100, 100)
|
2013-07-13 17:42:19 -04:00
|
|
|
upload.reload
|
2014-12-31 09:55:03 -05:00
|
|
|
expect(upload.optimized_images.count).to eq(1)
|
2013-07-13 17:42:19 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-02-07 06:09:06 -05:00
|
|
|
it "supports <style> element in SVG" do
|
|
|
|
SiteSetting.authorized_extensions = "svg"
|
|
|
|
|
|
|
|
upload = UploadCreator.new(image_svg, image_svg_filename).create_for(user_id)
|
|
|
|
expect(upload.valid?).to eq(true)
|
|
|
|
|
|
|
|
path = Discourse.store.path_for(upload)
|
|
|
|
expect(File.read(path)).to match(/<style>/)
|
|
|
|
end
|
|
|
|
|
2018-08-27 22:48:43 -04:00
|
|
|
it "can reconstruct dimensions on demand" do
|
|
|
|
upload = UploadCreator.new(huge_image, "image.png").create_for(user_id)
|
|
|
|
|
|
|
|
upload.update_columns(width: nil, height: nil, thumbnail_width: nil, thumbnail_height: nil)
|
|
|
|
|
|
|
|
upload = Upload.find(upload.id)
|
|
|
|
|
|
|
|
expect(upload.width).to eq(64250)
|
|
|
|
expect(upload.height).to eq(64250)
|
|
|
|
|
2018-12-26 10:17:08 -05:00
|
|
|
upload.reload
|
|
|
|
expect(upload.read_attribute(:width)).to eq(64250)
|
|
|
|
|
2018-08-27 22:48:43 -04:00
|
|
|
upload.update_columns(width: nil, height: nil, thumbnail_width: nil, thumbnail_height: nil)
|
|
|
|
|
|
|
|
expect(upload.thumbnail_width).to eq(500)
|
|
|
|
expect(upload.thumbnail_height).to eq(500)
|
|
|
|
end
|
|
|
|
|
2018-12-03 10:19:49 -05:00
|
|
|
it "dimension calculation returns nil on missing image" do
|
|
|
|
upload = UploadCreator.new(huge_image, "image.png").create_for(user_id)
|
|
|
|
upload.update_columns(width: nil, height: nil, thumbnail_width: nil, thumbnail_height: nil)
|
|
|
|
|
|
|
|
missing_url = "wrong_folder#{upload.url}"
|
|
|
|
upload.update_columns(url: missing_url)
|
|
|
|
expect(upload.thumbnail_height).to eq(nil)
|
|
|
|
expect(upload.thumbnail_width).to eq(nil)
|
|
|
|
end
|
|
|
|
|
2017-07-04 11:50:08 -04:00
|
|
|
it "extracts file extension" do
|
|
|
|
created_upload = UploadCreator.new(image, image_filename).create_for(user_id)
|
|
|
|
expect(created_upload.extension).to eq("png")
|
|
|
|
end
|
|
|
|
|
2017-12-13 15:51:09 -05:00
|
|
|
it "should create an invalid upload when the filename is blank" do
|
|
|
|
SiteSetting.authorized_extensions = "*"
|
2018-08-19 22:41:46 -04:00
|
|
|
created_upload = UploadCreator.new(attachment, nil).create_for(user_id)
|
2017-12-13 15:51:09 -05:00
|
|
|
expect(created_upload.valid?).to eq(false)
|
|
|
|
end
|
|
|
|
|
2019-04-08 16:55:26 -04:00
|
|
|
context ".extract_url" do
|
|
|
|
let(:url) { 'https://example.com/uploads/default/original/1X/d1c2d40ab994e8410c.png' }
|
|
|
|
|
|
|
|
it 'should return the right part of url' do
|
|
|
|
expect(Upload.extract_url(url).to_s).to eq('/original/1X/d1c2d40ab994e8410c.png')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-07-13 17:42:19 -04:00
|
|
|
context ".get_from_url" do
|
2018-09-06 02:29:45 -04:00
|
|
|
let(:sha1) { "10f73034616a796dfd70177dc54b6def44c4ba6f" }
|
2018-09-14 01:42:59 -04:00
|
|
|
let(:upload) { Fabricate(:upload, sha1: sha1) }
|
2013-07-13 17:42:19 -04:00
|
|
|
|
2013-07-21 18:37:23 -04:00
|
|
|
it "works when the file has been uploaded" do
|
2016-10-18 03:58:45 -04:00
|
|
|
expect(Upload.get_from_url(upload.url)).to eq(upload)
|
2013-07-21 18:37:23 -04:00
|
|
|
end
|
|
|
|
|
2018-09-12 03:12:14 -04:00
|
|
|
describe 'for an extensionless url' do
|
2018-09-14 01:42:59 -04:00
|
|
|
before do
|
|
|
|
upload.update!(url: upload.url.sub('.png', ''))
|
|
|
|
upload.reload
|
|
|
|
end
|
2018-09-12 03:12:14 -04:00
|
|
|
|
|
|
|
it 'should return the right upload' do
|
|
|
|
expect(Upload.get_from_url(upload.url)).to eq(upload)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-04-23 22:15:47 -04:00
|
|
|
it "should return the right upload as long as the upload's URL matches" do
|
|
|
|
upload.update!(url: "/uploads/default/12345/971308e535305c51.png")
|
|
|
|
|
|
|
|
expect(Upload.get_from_url(upload.url)).to eq(upload)
|
2019-04-23 22:20:42 -04:00
|
|
|
|
|
|
|
expect(Upload.get_from_url("/uploads/default/123131/971308e535305c51.png"))
|
|
|
|
.to eq(nil)
|
2019-04-23 22:15:47 -04:00
|
|
|
end
|
|
|
|
|
2018-09-14 01:42:59 -04:00
|
|
|
describe 'for a url a tree' do
|
|
|
|
before do
|
|
|
|
upload.update!(url:
|
|
|
|
Discourse.store.get_path_for(
|
|
|
|
"original",
|
|
|
|
16001,
|
|
|
|
upload.sha1,
|
|
|
|
".#{upload.extension}"
|
|
|
|
)
|
|
|
|
)
|
|
|
|
end
|
2018-09-12 02:48:25 -04:00
|
|
|
|
|
|
|
it 'should return the right upload' do
|
|
|
|
expect(Upload.get_from_url(upload.url)).to eq(upload)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-07-21 18:37:23 -04:00
|
|
|
it "works when using a cdn" do
|
2016-10-18 01:39:16 -04:00
|
|
|
begin
|
|
|
|
original_asset_host = Rails.configuration.action_controller.asset_host
|
|
|
|
Rails.configuration.action_controller.asset_host = 'http://my.cdn.com'
|
2016-10-18 03:58:45 -04:00
|
|
|
|
|
|
|
expect(Upload.get_from_url(
|
|
|
|
URI.join("http://my.cdn.com", upload.url).to_s
|
|
|
|
)).to eq(upload)
|
2016-10-18 01:39:16 -04:00
|
|
|
ensure
|
|
|
|
Rails.configuration.action_controller.asset_host = original_asset_host
|
|
|
|
end
|
2013-07-21 18:37:23 -04:00
|
|
|
end
|
2016-10-18 03:58:45 -04:00
|
|
|
|
|
|
|
it "should return the right upload when using the full URL" do
|
|
|
|
expect(Upload.get_from_url(
|
|
|
|
URI.join("http://discourse.some.com:3000/", upload.url).to_s
|
|
|
|
)).to eq(upload)
|
|
|
|
end
|
|
|
|
|
2016-10-20 06:34:42 -04:00
|
|
|
it "doesn't blow up with an invalid URI" do
|
|
|
|
expect { Upload.get_from_url("http://ip:port/index.html") }.not_to raise_error
|
2018-05-17 03:13:30 -04:00
|
|
|
expect { Upload.get_from_url("mailto:admin%40example.com") }.not_to raise_error
|
2018-05-18 08:31:36 -04:00
|
|
|
expect { Upload.get_from_url("mailto:example") }.not_to raise_error
|
2016-10-20 06:34:42 -04:00
|
|
|
end
|
|
|
|
|
2016-10-18 03:58:45 -04:00
|
|
|
describe "s3 store" do
|
2018-09-14 01:42:59 -04:00
|
|
|
let(:upload) { Fabricate(:upload_s3) }
|
|
|
|
let(:path) { upload.url.sub(SiteSetting.Upload.s3_base_url, '') }
|
2016-10-18 03:58:45 -04:00
|
|
|
|
|
|
|
before do
|
|
|
|
SiteSetting.enable_s3_uploads = true
|
|
|
|
SiteSetting.s3_upload_bucket = "s3-upload-bucket"
|
|
|
|
SiteSetting.s3_access_key_id = "some key"
|
|
|
|
SiteSetting.s3_secret_access_key = "some secret key"
|
|
|
|
end
|
|
|
|
|
2018-06-05 09:19:06 -04:00
|
|
|
it "should return the right upload when using base url (not CDN) for s3" do
|
|
|
|
upload
|
2018-09-14 01:42:59 -04:00
|
|
|
expect(Upload.get_from_url(upload.url)).to eq(upload)
|
2018-06-05 09:19:06 -04:00
|
|
|
end
|
|
|
|
|
2018-07-05 23:36:29 -04:00
|
|
|
describe 'when using a cdn' do
|
|
|
|
let(:s3_cdn_url) { 'https://mycdn.slowly.net' }
|
|
|
|
|
|
|
|
before do
|
|
|
|
SiteSetting.s3_cdn_url = s3_cdn_url
|
|
|
|
end
|
2016-10-18 03:58:45 -04:00
|
|
|
|
2018-07-05 23:36:29 -04:00
|
|
|
it "should return the right upload" do
|
|
|
|
upload
|
|
|
|
expect(Upload.get_from_url(URI.join(s3_cdn_url, path).to_s)).to eq(upload)
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'when upload bucket contains subfolder' do
|
|
|
|
before do
|
|
|
|
SiteSetting.s3_upload_bucket = "s3-upload-bucket/path/path2"
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should return the right upload" do
|
|
|
|
upload
|
|
|
|
expect(Upload.get_from_url(URI.join(s3_cdn_url, path).to_s)).to eq(upload)
|
|
|
|
end
|
|
|
|
end
|
2016-10-18 03:58:45 -04:00
|
|
|
end
|
2018-01-11 22:08:15 -05:00
|
|
|
|
|
|
|
it "should return the right upload when using one CDN for both s3 and assets" do
|
|
|
|
begin
|
|
|
|
original_asset_host = Rails.configuration.action_controller.asset_host
|
|
|
|
cdn_url = 'http://my.cdn.com'
|
|
|
|
Rails.configuration.action_controller.asset_host = cdn_url
|
|
|
|
SiteSetting.s3_cdn_url = cdn_url
|
|
|
|
upload
|
|
|
|
|
|
|
|
expect(Upload.get_from_url(
|
|
|
|
URI.join(cdn_url, path).to_s
|
|
|
|
)).to eq(upload)
|
|
|
|
ensure
|
|
|
|
Rails.configuration.action_controller.asset_host = original_asset_host
|
|
|
|
end
|
|
|
|
end
|
2016-10-18 03:58:45 -04:00
|
|
|
end
|
2013-07-13 17:42:19 -04:00
|
|
|
end
|
|
|
|
|
2016-09-02 02:50:13 -04:00
|
|
|
describe '.generate_digest' do
|
|
|
|
it "should return the right digest" do
|
|
|
|
expect(Upload.generate_digest(image.path)).to eq('bc975735dfc6409c1c2aa5ebf2239949bcbdbd65')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-08-22 11:46:15 -04:00
|
|
|
describe '.short_url' do
|
|
|
|
it "should generate a correct short url" do
|
|
|
|
upload = Upload.new(sha1: 'bda2c513e1da04f7b4e99230851ea2aafeb8cc4e', extension: 'png')
|
|
|
|
expect(upload.short_url).to eq('upload://r3AYqESanERjladb4vBB7VsMBm6.png')
|
2019-06-18 21:10:50 -04:00
|
|
|
|
|
|
|
upload.extension = nil
|
|
|
|
expect(upload.short_url).to eq('upload://r3AYqESanERjladb4vBB7VsMBm6')
|
2017-08-22 11:46:15 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '.sha1_from_short_url' do
|
|
|
|
it "should be able to look up sha1" do
|
|
|
|
sha1 = 'bda2c513e1da04f7b4e99230851ea2aafeb8cc4e'
|
|
|
|
|
|
|
|
expect(Upload.sha1_from_short_url('upload://r3AYqESanERjladb4vBB7VsMBm6.png')).to eq(sha1)
|
|
|
|
expect(Upload.sha1_from_short_url('upload://r3AYqESanERjladb4vBB7VsMBm6')).to eq(sha1)
|
|
|
|
expect(Upload.sha1_from_short_url('r3AYqESanERjladb4vBB7VsMBm6')).to eq(sha1)
|
|
|
|
end
|
2017-08-23 11:08:18 -04:00
|
|
|
|
|
|
|
it "should be able to look up sha1 even with leading zeros" do
|
|
|
|
sha1 = '0000c513e1da04f7b4e99230851ea2aafeb8cc4e'
|
|
|
|
expect(Upload.sha1_from_short_url('upload://1Eg9p8rrCURq4T3a6iJUk0ri6.png')).to eq(sha1)
|
|
|
|
end
|
2017-08-22 11:46:15 -04:00
|
|
|
end
|
|
|
|
|
2019-06-04 02:10:46 -04:00
|
|
|
describe '#base62_sha1' do
|
|
|
|
it 'should return the right value' do
|
|
|
|
upload.update!(sha1: "0000c513e1da04f7b4e99230851ea2aafeb8cc4e")
|
|
|
|
expect(upload.base62_sha1).to eq("1Eg9p8rrCURq4T3a6iJUk0ri6")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-05-28 21:00:25 -04:00
|
|
|
describe '.sha1_from_short_path' do
|
|
|
|
it "should be able to lookup sha1" do
|
|
|
|
path = "/uploads/short-url/3UjQ4jHoyeoQndk5y3qHzm3QVTQ.png"
|
|
|
|
sha1 = "1b6453892473a467d07372d45eb05abc2031647a"
|
|
|
|
|
|
|
|
expect(Upload.sha1_from_short_path(path)).to eq(sha1)
|
|
|
|
expect(Upload.sha1_from_short_path(path.sub(".png", ""))).to eq(sha1)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-11-14 02:03:02 -05:00
|
|
|
describe '#to_s' do
|
|
|
|
it 'should return the right value' do
|
|
|
|
expect(upload.to_s).to eq(upload.url)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-03-14 00:38:16 -04:00
|
|
|
describe '.migrate_to_new_scheme' do
|
|
|
|
it 'should not migrate system uploads' do
|
|
|
|
SiteSetting.migrate_to_new_scheme = true
|
|
|
|
|
|
|
|
expect { Upload.migrate_to_new_scheme }
|
|
|
|
.to_not change { Upload.pluck(:url) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-11-17 20:25:42 -05:00
|
|
|
describe '.update_secure_status' do
|
2019-11-27 16:32:17 -05:00
|
|
|
it "respects the secure_override_value parameter if provided" do
|
|
|
|
upload.update!(secure: true)
|
|
|
|
|
|
|
|
upload.update_secure_status(secure_override_value: true)
|
|
|
|
|
|
|
|
expect(upload.secure).to eq(true)
|
|
|
|
|
|
|
|
upload.update_secure_status(secure_override_value: false)
|
|
|
|
|
|
|
|
expect(upload.secure).to eq(false)
|
|
|
|
end
|
|
|
|
|
2019-11-17 20:25:42 -05:00
|
|
|
it 'marks a local upload as not secure with default settings' do
|
|
|
|
upload.update!(secure: true)
|
|
|
|
expect { upload.update_secure_status }
|
|
|
|
.to change { upload.secure }
|
|
|
|
|
|
|
|
expect(upload.secure).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'marks a local attachment as secure if prevent_anons_from_downloading_files is enabled' do
|
|
|
|
SiteSetting.prevent_anons_from_downloading_files = true
|
|
|
|
SiteSetting.authorized_extensions = "pdf"
|
|
|
|
upload.update!(original_filename: "small.pdf", extension: "pdf")
|
|
|
|
|
|
|
|
expect { upload.update_secure_status }
|
|
|
|
.to change { upload.secure }
|
|
|
|
|
|
|
|
expect(upload.secure).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'marks a local attachment as not secure if prevent_anons_from_downloading_files is disabled' do
|
|
|
|
SiteSetting.prevent_anons_from_downloading_files = false
|
|
|
|
SiteSetting.authorized_extensions = "pdf"
|
|
|
|
upload.update!(original_filename: "small.pdf", extension: "pdf", secure: true)
|
|
|
|
|
|
|
|
expect { upload.update_secure_status }
|
|
|
|
.to change { upload.secure }
|
|
|
|
|
|
|
|
expect(upload.secure).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not change secure status of a non-attachment when prevent_anons_from_downloading_files is enabled' do
|
|
|
|
SiteSetting.prevent_anons_from_downloading_files = true
|
|
|
|
SiteSetting.authorized_extensions = "mp4"
|
|
|
|
upload.update!(original_filename: "small.mp4", extension: "mp4")
|
|
|
|
|
|
|
|
expect { upload.update_secure_status }
|
|
|
|
.not_to change { upload.secure }
|
|
|
|
|
|
|
|
expect(upload.secure).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
context "secure media enabled" do
|
|
|
|
before do
|
|
|
|
SiteSetting.enable_s3_uploads = true
|
|
|
|
SiteSetting.s3_upload_bucket = "s3-upload-bucket"
|
|
|
|
SiteSetting.s3_access_key_id = "some key"
|
2019-12-11 09:13:17 -05:00
|
|
|
SiteSetting.s3_secret_access_key = "some secrets3_region key"
|
2019-11-17 20:25:42 -05:00
|
|
|
SiteSetting.secure_media = true
|
|
|
|
|
2019-12-11 14:26:52 -05:00
|
|
|
stub_request(:head, "https://#{SiteSetting.s3_upload_bucket}.s3.amazonaws.com/")
|
2019-11-17 20:25:42 -05:00
|
|
|
|
|
|
|
stub_request(
|
|
|
|
:put,
|
2019-12-11 14:26:52 -05:00
|
|
|
"https://#{SiteSetting.s3_upload_bucket}.s3.amazonaws.com/original/1X/#{upload.sha1}.#{upload.extension}?acl"
|
2019-11-17 20:25:42 -05:00
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'marks an image upload as not secure when not associated with a post' do
|
|
|
|
upload.update!(secure: true)
|
|
|
|
expect { upload.update_secure_status }
|
|
|
|
.to change { upload.secure }
|
|
|
|
|
|
|
|
expect(upload.secure).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'marks an image upload as secure if login_required is enabled' do
|
|
|
|
SiteSetting.login_required = true
|
|
|
|
upload.update!(secure: false)
|
|
|
|
|
|
|
|
expect { upload.update_secure_status }
|
|
|
|
.to change { upload.secure }
|
|
|
|
|
|
|
|
expect(upload.secure).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-08-21 04:23:20 -04:00
|
|
|
describe '.reset_unknown_extensions!' do
|
|
|
|
it 'should reset the extension of uploads when it is "unknown"' do
|
|
|
|
upload1 = Fabricate(:upload, extension: "unknown")
|
|
|
|
upload2 = Fabricate(:upload, extension: "png")
|
|
|
|
|
|
|
|
Upload.reset_unknown_extensions!
|
|
|
|
|
|
|
|
expect(upload1.reload.extension).to eq(nil)
|
|
|
|
expect(upload2.reload.extension).to eq("png")
|
|
|
|
end
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|