DEV: Rename with_secure_uploads? to should_secure_uploads? on Post (#26549)

This method name is a bit confusing; with_secure_uploads implies
it may return a block or something with the uploads of the post,
and has_secure_uploads implies that it's checking whether the post
is linked to any secure uploads.

should_secure_uploads? communicates the true intent of this method --
which is to say whether uploads attached to this post should be
secure or not.
This commit is contained in:
Martin Brennan 2024-04-09 13:23:11 +10:00 committed by GitHub
parent 84b4e4bddf
commit 0d0dbd391a
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
8 changed files with 29 additions and 29 deletions

View File

@ -326,7 +326,7 @@ class Post < ActiveRecord::Base
options[:user_id] = self.last_editor_id
options[:omit_nofollow] = true if omit_nofollow?
if self.with_secure_uploads?
if self.should_secure_uploads?
each_upload_url do |url|
uri = URI.parse(url)
if FileHelper.is_supported_media?(File.basename(uri.path))
@ -565,7 +565,7 @@ class Post < ActiveRecord::Base
ReviewableFlaggedPost.pending.find_by(target: self)
end
def with_secure_uploads?
def should_secure_uploads?
return false if !SiteSetting.secure_uploads?
topic_including_deleted = Topic.with_deleted.find_by(id: self.topic_id)
return false if topic_including_deleted.blank?

View File

@ -22,7 +22,7 @@ class CookedPostProcessor
@cooking_options = post.cooking_options || opts[:cooking_options] || {}
@cooking_options[:topic_id] = post.topic_id
@cooking_options = @cooking_options.symbolize_keys
@with_secure_uploads = @post.with_secure_uploads?
@should_secure_uploads = @post.should_secure_uploads?
@category_id = @post&.topic&.category_id
cooked = post.cook(post.raw, @cooking_options)
@ -243,16 +243,16 @@ class CookedPostProcessor
resized_h = (h * ratio).to_i
if !cropped && upload.width && resized_w > upload.width
cooked_url = UrlHelper.cook_url(upload.url, secure: @post.with_secure_uploads?)
cooked_url = UrlHelper.cook_url(upload.url, secure: @should_secure_uploads)
srcset << ", #{cooked_url} #{ratio.to_s.sub(/\.0\z/, "")}x"
elsif t = upload.thumbnail(resized_w, resized_h)
cooked_url = UrlHelper.cook_url(t.url, secure: @post.with_secure_uploads?)
cooked_url = UrlHelper.cook_url(t.url, secure: @should_secure_uploads)
srcset << ", #{cooked_url} #{ratio.to_s.sub(/\.0\z/, "")}x"
end
img[
"srcset"
] = "#{UrlHelper.cook_url(img["src"], secure: @post.with_secure_uploads?)}#{srcset}" if srcset.present?
] = "#{UrlHelper.cook_url(img["src"], secure: @should_secure_uploads)}#{srcset}" if srcset.present?
end
end
else
@ -273,7 +273,7 @@ class CookedPostProcessor
# then, the link to our larger image
src_url = Upload.secure_uploads_url?(img["src"]) ? upload&.url : img["src"]
src = UrlHelper.cook_url(src_url || img["src"], secure: @post.with_secure_uploads?)
src = UrlHelper.cook_url(src_url || img["src"], secure: @should_secure_uploads)
a = create_link_node("lightbox", src)
img.add_next_sibling(a)
@ -348,7 +348,7 @@ class CookedPostProcessor
custom_emoji = img["class"]&.include?("emoji-custom") && Emoji.custom?(img["title"])
img[selector] = UrlHelper.cook_url(
img[selector].to_s,
secure: @post.with_secure_uploads? && !custom_emoji,
secure: @should_secure_uploads && !custom_emoji,
)
end
end
@ -415,7 +415,7 @@ class CookedPostProcessor
still_an_image = false
elsif info&.downloaded? && upload = info&.upload
img["src"] = UrlHelper.cook_url(upload.url, secure: @with_secure_uploads)
img["src"] = UrlHelper.cook_url(upload.url, secure: @should_secure_uploads)
img["data-dominant-color"] = upload.dominant_color(calculate_if_missing: true).presence
img.delete(PrettyText::BLOCKED_HOTLINKED_SRC_ATTR)
end

View File

@ -653,7 +653,7 @@ module PrettyText
def self.format_for_email(html, post = nil)
doc = Nokogiri::HTML5.fragment(html)
DiscourseEvent.trigger(:reduce_cooked, doc, post)
strip_secure_uploads(doc) if post&.with_secure_uploads?
strip_secure_uploads(doc) if post&.should_secure_uploads?
strip_image_wrapping(doc)
convert_vimeo_iframes(doc)
make_all_links_absolute(doc)

View File

@ -604,7 +604,7 @@ task "uploads:secure_upload_analyse_and_update" => :environment do
# If secure upload is enabled we need to first set the access control post of
# all post uploads (even uploads that are linked to multiple posts). If the
# upload is not set to secure upload then this has no other effect on the upload,
# but we _must_ know what the access control post is because the with_secure_uploads?
# but we _must_ know what the access control post is because the should_secure_uploads?
# method is on the post, and this knows about the category security & PM status
update_uploads_access_control_post if SiteSetting.secure_uploads?

View File

@ -101,7 +101,7 @@ class UploadSecurity
def secure_context_checks
{
login_required: "login is required",
access_control_post_has_secure_uploads: "access control post dictates security",
access_control_post_should_secure_uploads: "access control post dictates security",
secure_creation_for_modifiers: "one or more creation for_modifiers was satisfied",
uploading_in_composer: "uploading via the composer",
already_secure: "upload is already secure",
@ -112,7 +112,7 @@ class UploadSecurity
# of whether an upload should be secure or not, and thus should be returned
# immediately if there is an access control post.
def priority_check?(check)
check == :access_control_post_has_secure_uploads && access_control_post
check == :access_control_post_should_secure_uploads && access_control_post
end
def perform_check(check)
@ -169,15 +169,15 @@ class UploadSecurity
# Whether the upload should remain secure or not after posting depends on its context,
# which is based on the post it is linked to via access_control_post_id.
#
# If that post is with_secure_uploads? then the upload should also be secure.
# If that post should_secure_uploads? then the upload should also be secure.
#
# This may change to false if the upload was set to secure on upload e.g. in
# a post composer then it turned out that the post itself was not in a secure context.
#
# A post is with secure uploads if it is a private message or in a read restricted
# category. See `Post#with_secure_uploads?` for the full definition.
def access_control_post_has_secure_uploads_check
access_control_post&.with_secure_uploads?
# category. See `Post#should_secure_uploads?` for the full definition.
def access_control_post_should_secure_uploads_check
access_control_post&.should_secure_uploads?
end
def uploading_in_composer_check

View File

@ -8,7 +8,7 @@ module Chat
def initialize(chat_message, opts = {})
@model = chat_message
@previous_cooked = (chat_message.cooked || "").dup
@with_secure_uploads = false
@should_secure_uploads = false
@size_cache = {}
@opts = opts

View File

@ -1160,7 +1160,7 @@ RSpec.describe CookedPostProcessor do
Oneboxer.unstub(:onebox)
end
context "when the post is with_secure_uploads and the upload is secure and secure uploads is enabled" do
context "when the post is should_secure_uploads and the upload is secure and secure uploads is enabled" do
before do
setup_s3
upload.update(secure: true)

View File

@ -148,12 +148,12 @@ RSpec.describe Post do
end
end
describe "with_secure_uploads?" do
describe "should_secure_uploads?" do
let(:topic) { Fabricate(:topic) }
let!(:post) { Fabricate(:post, topic: topic) }
it "returns false if secure uploads is not enabled" do
expect(post.with_secure_uploads?).to eq(false)
expect(post.should_secure_uploads?).to eq(false)
end
context "when secure uploads is enabled" do
@ -167,14 +167,14 @@ RSpec.describe Post do
before { SiteSetting.login_required = true }
it "returns true" do
expect(post.with_secure_uploads?).to eq(true)
expect(post.should_secure_uploads?).to eq(true)
end
context "if secure_uploads_pm_only" do
before { SiteSetting.secure_uploads_pm_only = true }
it "returns false" do
expect(post.with_secure_uploads?).to eq(false)
expect(post.should_secure_uploads?).to eq(false)
end
end
end
@ -184,7 +184,7 @@ RSpec.describe Post do
before { topic.change_category_to_id(category.id) }
it "returns true" do
expect(post.with_secure_uploads?).to eq(true)
expect(post.should_secure_uploads?).to eq(true)
end
context "when the topic is deleted" do
@ -194,7 +194,7 @@ RSpec.describe Post do
end
it "returns true" do
expect(post.with_secure_uploads?).to eq(true)
expect(post.should_secure_uploads?).to eq(true)
end
end
@ -202,7 +202,7 @@ RSpec.describe Post do
before { SiteSetting.secure_uploads_pm_only = true }
it "returns false" do
expect(post.with_secure_uploads?).to eq(false)
expect(post.should_secure_uploads?).to eq(false)
end
end
end
@ -211,14 +211,14 @@ RSpec.describe Post do
let(:topic) { Fabricate(:private_message_topic) }
it "returns true" do
expect(post.with_secure_uploads?).to eq(true)
expect(post.should_secure_uploads?).to eq(true)
end
context "when the topic is deleted" do
before { topic.trash! }
it "returns true" do
expect(post.with_secure_uploads?).to eq(true)
expect(post.should_secure_uploads?).to eq(true)
end
end
@ -226,7 +226,7 @@ RSpec.describe Post do
before { SiteSetting.secure_uploads_pm_only = true }
it "returns true" do
expect(post.with_secure_uploads?).to eq(true)
expect(post.should_secure_uploads?).to eq(true)
end
end
end