2019-04-29 20:27:42 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-08-16 23:41:30 -04:00
|
|
|
require 'rails_helper'
|
2019-01-04 01:16:22 -05:00
|
|
|
require 'file_store/s3_store'
|
2018-08-16 23:41:30 -04:00
|
|
|
|
|
|
|
RSpec.describe UploadCreator do
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:user) { Fabricate(:user) }
|
2018-08-16 23:41:30 -04:00
|
|
|
|
|
|
|
describe '#create_for' do
|
|
|
|
describe 'when upload is not an image' do
|
|
|
|
before do
|
|
|
|
SiteSetting.authorized_extensions = 'txt'
|
|
|
|
end
|
|
|
|
|
|
|
|
let(:filename) { "utf-8.txt" }
|
|
|
|
let(:file) { file_from_fixtures(filename, "encodings") }
|
|
|
|
|
|
|
|
it 'should store the upload with the right extension' do
|
|
|
|
expect do
|
2018-08-21 12:11:01 -04:00
|
|
|
UploadCreator.new(file, "utf-8\n.txt").create_for(user.id)
|
2018-08-16 23:41:30 -04:00
|
|
|
end.to change { Upload.count }.by(1)
|
|
|
|
|
|
|
|
upload = Upload.last
|
|
|
|
|
|
|
|
expect(upload.extension).to eq('txt')
|
|
|
|
expect(File.extname(upload.url)).to eq('.txt')
|
|
|
|
expect(upload.original_filename).to eq('utf-8.txt')
|
2018-09-20 01:33:10 -04:00
|
|
|
expect(user.user_uploads.count).to eq(1)
|
|
|
|
expect(upload.user_uploads.count).to eq(1)
|
|
|
|
|
|
|
|
user2 = Fabricate(:user)
|
|
|
|
|
|
|
|
expect do
|
|
|
|
UploadCreator.new(file, "utf-8\n.txt").create_for(user2.id)
|
|
|
|
end.to change { Upload.count }.by(0)
|
|
|
|
|
|
|
|
expect(user.user_uploads.count).to eq(1)
|
|
|
|
expect(user2.user_uploads.count).to eq(1)
|
|
|
|
expect(upload.user_uploads.count).to eq(2)
|
2018-08-16 23:41:30 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-11-14 02:03:02 -05:00
|
|
|
describe 'when image is not authorized' do
|
|
|
|
describe 'when image is for site setting' do
|
|
|
|
let(:filename) { 'logo.png' }
|
|
|
|
let(:file) { file_from_fixtures(filename) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
SiteSetting.authorized_extensions = 'jpg'
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should create the right upload' do
|
|
|
|
upload = UploadCreator.new(file, filename,
|
|
|
|
for_site_setting: true
|
|
|
|
).create_for(Discourse.system_user.id)
|
|
|
|
|
|
|
|
expect(upload.persisted?).to eq(true)
|
|
|
|
expect(upload.original_filename).to eq(filename)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-08-16 23:41:30 -04:00
|
|
|
describe 'when image has the wrong extension' do
|
2018-08-19 22:18:49 -04:00
|
|
|
let(:filename) { "png_as.bin" }
|
2018-08-16 23:41:30 -04:00
|
|
|
let(:file) { file_from_fixtures(filename) }
|
|
|
|
|
|
|
|
it 'should store the upload with the right extension' do
|
|
|
|
expect do
|
2018-08-17 03:22:12 -04:00
|
|
|
UploadCreator.new(file, filename,
|
|
|
|
force_optimize: true,
|
|
|
|
type: UploadCreator::TYPES_TO_CROP.first
|
|
|
|
).create_for(user.id)
|
2018-08-16 23:41:30 -04:00
|
|
|
end.to change { Upload.count }.by(1)
|
|
|
|
|
|
|
|
upload = Upload.last
|
|
|
|
|
|
|
|
expect(upload.extension).to eq('png')
|
|
|
|
expect(File.extname(upload.url)).to eq('.png')
|
2018-08-20 02:08:05 -04:00
|
|
|
expect(upload.original_filename).to eq('png_as.png')
|
2018-08-16 23:41:30 -04:00
|
|
|
end
|
2018-09-09 22:49:01 -04:00
|
|
|
|
2020-02-20 22:08:02 -05:00
|
|
|
describe 'for tiff format' do
|
2018-09-09 22:49:01 -04:00
|
|
|
before do
|
2020-02-20 22:08:02 -05:00
|
|
|
SiteSetting.authorized_extensions = '.tiff|.bin'
|
2018-09-09 22:49:01 -04:00
|
|
|
end
|
|
|
|
|
2020-02-20 22:08:02 -05:00
|
|
|
let(:filename) { "tiff_as.bin" }
|
2018-09-09 22:49:01 -04:00
|
|
|
let(:file) { file_from_fixtures(filename) }
|
|
|
|
|
|
|
|
it 'should not correct the coerce filename' do
|
|
|
|
expect do
|
|
|
|
UploadCreator.new(file, filename).create_for(user.id)
|
|
|
|
end.to change { Upload.count }.by(1)
|
|
|
|
|
|
|
|
upload = Upload.last
|
|
|
|
|
|
|
|
expect(upload.extension).to eq('bin')
|
|
|
|
expect(File.extname(upload.url)).to eq('.bin')
|
2020-02-20 22:08:02 -05:00
|
|
|
expect(upload.original_filename).to eq('tiff_as.bin')
|
2018-09-09 22:49:01 -04:00
|
|
|
end
|
|
|
|
end
|
2018-08-16 23:41:30 -04:00
|
|
|
end
|
|
|
|
|
2019-01-02 01:19:52 -05:00
|
|
|
describe 'pngquant' do
|
|
|
|
let(:filename) { "pngquant.png" }
|
|
|
|
let(:file) { file_from_fixtures(filename) }
|
|
|
|
|
|
|
|
it 'should apply pngquant to optimized images' do
|
|
|
|
upload = UploadCreator.new(file, filename,
|
|
|
|
pasted: true,
|
|
|
|
force_optimize: true
|
|
|
|
).create_for(user.id)
|
|
|
|
|
|
|
|
# no optimisation possible without losing details
|
|
|
|
expect(upload.filesize).to eq(9558)
|
|
|
|
|
|
|
|
thumbnail_size = upload.get_optimized_image(upload.width, upload.height, {}).filesize
|
|
|
|
|
|
|
|
# pngquant will lose some colors causing some extra size reduction
|
|
|
|
expect(thumbnail_size).to be < 7500
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
2018-08-16 23:41:30 -04:00
|
|
|
describe 'converting to jpeg' do
|
2018-11-20 19:00:52 -05:00
|
|
|
let(:filename) { "should_be_jpeg.png" }
|
2018-08-16 23:41:30 -04:00
|
|
|
let(:file) { file_from_fixtures(filename) }
|
|
|
|
|
2018-11-20 19:00:52 -05:00
|
|
|
let(:small_filename) { "logo.png" }
|
|
|
|
let(:small_file) { file_from_fixtures(small_filename) }
|
|
|
|
|
2018-08-16 23:41:30 -04:00
|
|
|
before do
|
|
|
|
SiteSetting.png_to_jpg_quality = 1
|
|
|
|
end
|
|
|
|
|
2018-11-20 19:00:52 -05:00
|
|
|
it 'should not store file as jpeg if it does not meet absolute byte saving requirements' do
|
|
|
|
|
|
|
|
# logo.png is 2297 bytes, converting to jpeg saves 30% but does not meet
|
|
|
|
# the absolute savings required of 25_000 bytes, if you save less than that
|
|
|
|
# skip this
|
|
|
|
|
|
|
|
expect do
|
|
|
|
UploadCreator.new(small_file, small_filename,
|
|
|
|
pasted: true,
|
|
|
|
force_optimize: true
|
|
|
|
).create_for(user.id)
|
|
|
|
end.to change { Upload.count }.by(1)
|
|
|
|
|
|
|
|
upload = Upload.last
|
|
|
|
|
|
|
|
expect(upload.extension).to eq('png')
|
|
|
|
expect(File.extname(upload.url)).to eq('.png')
|
|
|
|
expect(upload.original_filename).to eq('logo.png')
|
|
|
|
|
|
|
|
end
|
|
|
|
|
2018-08-16 23:41:30 -04:00
|
|
|
it 'should store the upload with the right extension' do
|
|
|
|
expect do
|
|
|
|
UploadCreator.new(file, filename,
|
|
|
|
pasted: true,
|
|
|
|
force_optimize: true
|
|
|
|
).create_for(user.id)
|
|
|
|
end.to change { Upload.count }.by(1)
|
|
|
|
|
|
|
|
upload = Upload.last
|
|
|
|
|
2020-07-22 21:40:09 -04:00
|
|
|
expect(upload.extension).to eq('jpeg')
|
|
|
|
expect(File.extname(upload.url)).to eq('.jpeg')
|
|
|
|
expect(upload.original_filename).to eq('should_be_jpeg.jpg')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'converting HEIF to jpeg' do
|
|
|
|
let(:filename) { "should_be_jpeg.heic" }
|
|
|
|
let(:file) { file_from_fixtures(filename, "images") }
|
|
|
|
|
|
|
|
before do
|
|
|
|
SiteSetting.convert_heif_to_jpeg = true
|
|
|
|
SiteSetting.authorized_extensions = 'jpg|heic'
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should store the upload with the right extension' do
|
|
|
|
expect do
|
|
|
|
UploadCreator.new(file, filename).create_for(user.id)
|
|
|
|
end.to change { Upload.count }.by(1)
|
|
|
|
|
|
|
|
upload = Upload.last
|
|
|
|
|
2018-08-16 23:41:30 -04:00
|
|
|
expect(upload.extension).to eq('jpeg')
|
|
|
|
expect(File.extname(upload.url)).to eq('.jpeg')
|
2018-11-20 19:00:52 -05:00
|
|
|
expect(upload.original_filename).to eq('should_be_jpeg.jpg')
|
2018-08-16 23:41:30 -04:00
|
|
|
end
|
|
|
|
end
|
2019-01-04 01:16:22 -05:00
|
|
|
|
2019-11-17 20:25:42 -05:00
|
|
|
describe 'secure attachments' do
|
2019-06-05 23:27:24 -04:00
|
|
|
let(:filename) { "small.pdf" }
|
|
|
|
let(:file) { file_from_fixtures(filename, "pdf") }
|
2020-02-20 18:35:16 -05:00
|
|
|
let(:opts) { { type: "composer" } }
|
2019-06-05 23:27:24 -04:00
|
|
|
|
|
|
|
before do
|
2020-02-20 18:35:16 -05:00
|
|
|
enable_s3_uploads
|
|
|
|
SiteSetting.secure_media = true
|
2019-06-05 23:27:24 -04:00
|
|
|
SiteSetting.authorized_extensions = 'pdf|svg|jpg'
|
|
|
|
end
|
|
|
|
|
2019-11-17 20:25:42 -05:00
|
|
|
it 'should mark attachments as secure' do
|
2020-02-20 18:35:16 -05:00
|
|
|
upload = UploadCreator.new(file, filename, opts).create_for(user.id)
|
2019-06-05 23:27:24 -04:00
|
|
|
stored_upload = Upload.last
|
|
|
|
|
2019-11-17 20:25:42 -05:00
|
|
|
expect(stored_upload.secure?).to eq(true)
|
2019-06-05 23:27:24 -04:00
|
|
|
end
|
|
|
|
|
2019-11-17 20:25:42 -05:00
|
|
|
it 'should not mark theme uploads as secure' do
|
2019-06-05 23:27:24 -04:00
|
|
|
fname = "custom-theme-icon-sprite.svg"
|
|
|
|
upload = UploadCreator.new(file_from_fixtures(fname), fname, for_theme: true).create_for(-1)
|
|
|
|
|
2019-11-17 20:25:42 -05:00
|
|
|
expect(upload.secure?).to eq(false)
|
2019-06-05 23:27:24 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-11-17 20:25:42 -05:00
|
|
|
context 'uploading to s3' do
|
2019-01-04 01:16:22 -05:00
|
|
|
let(:filename) { "should_be_jpeg.png" }
|
|
|
|
let(:file) { file_from_fixtures(filename) }
|
2019-06-05 23:27:24 -04:00
|
|
|
let(:pdf_filename) { "small.pdf" }
|
|
|
|
let(:pdf_file) { file_from_fixtures(pdf_filename, "pdf") }
|
2020-02-20 18:35:16 -05:00
|
|
|
let(:opts) { { type: "composer" } }
|
2019-01-04 01:16:22 -05:00
|
|
|
|
|
|
|
before do
|
2020-01-15 22:50:27 -05:00
|
|
|
enable_s3_uploads
|
2019-01-04 01:16:22 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'should store the file and return etag' do
|
|
|
|
expect {
|
|
|
|
UploadCreator.new(file, filename).create_for(user.id)
|
|
|
|
}.to change { Upload.count }.by(1)
|
|
|
|
|
|
|
|
upload = Upload.last
|
|
|
|
|
|
|
|
expect(upload.etag).to eq('ETag')
|
|
|
|
end
|
2019-06-05 23:27:24 -04:00
|
|
|
|
2019-11-17 20:25:42 -05:00
|
|
|
it 'should return signed URL for secure attachments in S3' do
|
2019-06-05 23:27:24 -04:00
|
|
|
SiteSetting.authorized_extensions = 'pdf'
|
2020-02-20 18:35:16 -05:00
|
|
|
SiteSetting.secure_media = true
|
2019-06-05 23:27:24 -04:00
|
|
|
|
2020-02-20 18:35:16 -05:00
|
|
|
upload = UploadCreator.new(pdf_file, pdf_filename, opts).create_for(user.id)
|
2019-06-05 23:27:24 -04:00
|
|
|
stored_upload = Upload.last
|
|
|
|
signed_url = Discourse.store.url_for(stored_upload)
|
|
|
|
|
2019-11-17 20:25:42 -05:00
|
|
|
expect(stored_upload.secure?).to eq(true)
|
2019-06-05 23:27:24 -04:00
|
|
|
expect(stored_upload.url).not_to eq(signed_url)
|
|
|
|
expect(signed_url).to match(/Amz-Credential/)
|
|
|
|
end
|
2019-01-04 01:16:22 -05:00
|
|
|
end
|
2020-01-15 22:50:27 -05:00
|
|
|
|
|
|
|
context "when the upload already exists based on the sha1" do
|
|
|
|
let(:filename) { "small.pdf" }
|
|
|
|
let(:file) { file_from_fixtures(filename, "pdf") }
|
|
|
|
let!(:existing_upload) { Fabricate(:upload, sha1: Upload.generate_digest(file)) }
|
|
|
|
let(:result) { UploadCreator.new(file, filename).create_for(user.id) }
|
|
|
|
|
|
|
|
it "returns the existing upload" do
|
|
|
|
expect(result).to eq(existing_upload)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "does not set an original_sha1 normally" do
|
|
|
|
expect(result.original_sha1).to eq(nil)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "creates a userupload record" do
|
|
|
|
result
|
|
|
|
expect(UserUpload.exists?(user_id: user.id, upload_id: existing_upload.id)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when the existing upload URL is blank (it has failed)" do
|
|
|
|
before do
|
|
|
|
existing_upload.update(url: '')
|
|
|
|
end
|
|
|
|
|
|
|
|
it "destroys the existing upload" do
|
|
|
|
result
|
|
|
|
expect(Upload.find_by(id: existing_upload.id)).to eq(nil)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when SiteSetting.secure_media is enabled" do
|
|
|
|
before do
|
|
|
|
enable_s3_uploads
|
|
|
|
SiteSetting.secure_media = true
|
|
|
|
end
|
|
|
|
|
|
|
|
it "does not return the existing upload, as duplicate uploads are allowed" do
|
|
|
|
expect(result).not_to eq(existing_upload)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "secure media functionality" do
|
|
|
|
let(:filename) { "logo.jpg" }
|
|
|
|
let(:file) { file_from_fixtures(filename) }
|
|
|
|
let(:opts) { {} }
|
|
|
|
let(:result) { UploadCreator.new(file, filename, opts).create_for(user.id) }
|
|
|
|
|
|
|
|
context "when SiteSetting.secure_media enabled" do
|
|
|
|
before do
|
|
|
|
enable_s3_uploads
|
|
|
|
SiteSetting.secure_media = true
|
|
|
|
end
|
|
|
|
|
|
|
|
it "sets an original_sha1 on the upload created because the sha1 column is securerandom in this case" do
|
|
|
|
expect(result.original_sha1).not_to eq(nil)
|
|
|
|
end
|
|
|
|
|
2020-01-16 22:16:27 -05:00
|
|
|
context "when uploading in a public context (theme, site setting, avatar, custom_emoji, profile_background, card_background)" do
|
|
|
|
def expect_no_public_context_uploads_to_be_secure
|
2020-01-15 22:50:27 -05:00
|
|
|
upload = UploadCreator.new(file_from_fixtures(filename), filename, for_site_setting: true).create_for(user.id)
|
|
|
|
expect(upload.secure).to eq(false)
|
|
|
|
upload.destroy!
|
|
|
|
|
2020-01-16 22:16:27 -05:00
|
|
|
upload = UploadCreator.new(file_from_fixtures(filename), filename, for_gravatar: true).create_for(user.id)
|
|
|
|
expect(upload.secure).to eq(false)
|
|
|
|
upload.destroy!
|
|
|
|
|
2020-01-15 22:50:27 -05:00
|
|
|
upload = UploadCreator.new(file_from_fixtures(filename), filename, for_theme: true).create_for(user.id)
|
|
|
|
expect(upload.secure).to eq(false)
|
|
|
|
upload.destroy!
|
|
|
|
|
|
|
|
upload = UploadCreator.new(file_from_fixtures(filename), filename, type: "avatar").create_for(user.id)
|
|
|
|
expect(upload.secure).to eq(false)
|
|
|
|
upload.destroy!
|
2020-01-16 22:16:27 -05:00
|
|
|
|
|
|
|
upload = UploadCreator.new(file_from_fixtures(filename), filename, type: "custom_emoji").create_for(user.id)
|
|
|
|
expect(upload.secure).to eq(false)
|
|
|
|
upload.destroy!
|
|
|
|
|
|
|
|
upload = UploadCreator.new(file_from_fixtures(filename), filename, type: "profile_background").create_for(user.id)
|
|
|
|
expect(upload.secure).to eq(false)
|
|
|
|
upload.destroy!
|
|
|
|
|
|
|
|
upload = UploadCreator.new(file_from_fixtures(filename), filename, type: "card_background").create_for(user.id)
|
|
|
|
expect(upload.secure).to eq(false)
|
|
|
|
upload.destroy!
|
|
|
|
end
|
|
|
|
|
|
|
|
it "does not set the upload to secure" do
|
|
|
|
expect_no_public_context_uploads_to_be_secure
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when login required" do
|
|
|
|
before do
|
|
|
|
SiteSetting.login_required = true
|
|
|
|
end
|
|
|
|
|
|
|
|
it "does not set the upload to secure" do
|
|
|
|
expect_no_public_context_uploads_to_be_secure
|
|
|
|
end
|
2020-01-15 22:50:27 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "if type of upload is in the composer" do
|
|
|
|
let(:opts) { { type: "composer" } }
|
|
|
|
it "sets the upload to secure and sets the original_sha1 column, because we don't know the context of the composer" do
|
|
|
|
expect(result.secure).to eq(true)
|
|
|
|
expect(result.original_sha1).not_to eq(nil)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "if the upload is for a PM" do
|
|
|
|
let(:opts) { { for_private_message: true } }
|
|
|
|
it "sets the upload to secure and sets the original_sha1" do
|
|
|
|
expect(result.secure).to eq(true)
|
|
|
|
expect(result.original_sha1).not_to eq(nil)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-01-16 22:16:27 -05:00
|
|
|
context "if the upload is for a group message" do
|
|
|
|
let(:opts) { { for_group_message: true } }
|
|
|
|
it "sets the upload to secure and sets the original_sha1" do
|
|
|
|
expect(result.secure).to eq(true)
|
|
|
|
expect(result.original_sha1).not_to eq(nil)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "if the upload is for a PM" do
|
|
|
|
let(:opts) { { for_private_message: true } }
|
|
|
|
it "sets the upload to secure and sets the original_sha1" do
|
|
|
|
expect(result.secure).to eq(true)
|
|
|
|
expect(result.original_sha1).not_to eq(nil)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-01-15 22:50:27 -05:00
|
|
|
context "if SiteSetting.login_required" do
|
|
|
|
before do
|
|
|
|
SiteSetting.login_required = true
|
|
|
|
end
|
|
|
|
it "sets the upload to secure and sets the original_sha1" do
|
|
|
|
expect(result.secure).to eq(true)
|
|
|
|
expect(result.original_sha1).not_to eq(nil)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2018-08-16 23:41:30 -04:00
|
|
|
end
|
2019-12-11 09:28:35 -05:00
|
|
|
|
|
|
|
describe '#whitelist_svg!' do
|
2020-07-09 17:02:25 -04:00
|
|
|
let(:b64) do
|
|
|
|
Base64.encode64('<svg onmouseover="alert(alert)" />')
|
|
|
|
end
|
|
|
|
|
2019-12-11 09:28:35 -05:00
|
|
|
let(:file) do
|
|
|
|
file = Tempfile.new
|
|
|
|
file.write(<<~XML)
|
|
|
|
<?xml version="1.0" encoding="UTF-8"?>
|
|
|
|
<svg xmlns="http://www.w3.org/2000/svg" width="200px" height="200px" onload="alert(location)">
|
2020-07-09 17:02:25 -04:00
|
|
|
<defs>
|
|
|
|
<path id="pathdef" d="m0 0h100v100h-77z" stroke="#000" />
|
|
|
|
</defs>
|
|
|
|
<g>
|
|
|
|
<use id="valid-use" x="123" xlink:href="#pathdef" />
|
|
|
|
</g>
|
|
|
|
<use id="invalid-use1" href="https://svg.example.com/evil.svg" />
|
|
|
|
<use id="invalid-use2" xlink:href="data:image/svg+xml;base64,#{b64}" />
|
2019-12-11 09:28:35 -05:00
|
|
|
</svg>
|
|
|
|
XML
|
|
|
|
file.rewind
|
|
|
|
file
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'removes event handlers' do
|
|
|
|
begin
|
|
|
|
UploadCreator.new(file, 'file.svg').whitelist_svg!
|
2020-07-09 17:02:25 -04:00
|
|
|
file_content = file.read
|
|
|
|
expect(file_content).not_to include('onload')
|
|
|
|
expect(file_content).to include('#pathdef')
|
|
|
|
expect(file_content).not_to include('evil.svg')
|
|
|
|
expect(file_content).not_to include(b64)
|
2019-12-11 09:28:35 -05:00
|
|
|
ensure
|
|
|
|
file.unlink
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-01-15 22:50:27 -05:00
|
|
|
|
|
|
|
def enable_s3_uploads
|
|
|
|
SiteSetting.s3_upload_bucket = "s3-upload-bucket"
|
|
|
|
SiteSetting.s3_access_key_id = "s3-access-key-id"
|
|
|
|
SiteSetting.s3_secret_access_key = "s3-secret-access-key"
|
|
|
|
SiteSetting.s3_region = 'us-west-1'
|
|
|
|
SiteSetting.enable_s3_uploads = true
|
|
|
|
|
|
|
|
store = FileStore::S3Store.new
|
|
|
|
s3_helper = store.instance_variable_get(:@s3_helper)
|
|
|
|
client = Aws::S3::Client.new(stub_responses: true)
|
|
|
|
s3_helper.stubs(:s3_client).returns(client)
|
|
|
|
Discourse.stubs(:store).returns(store)
|
|
|
|
end
|
2018-08-16 23:41:30 -04:00
|
|
|
end
|