2017-05-01 23:20:57 +09:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2019-06-20 17:52:36 +09:00
|
|
|
require 'mime/types/columnar'
|
2018-04-23 16:16:38 +09:00
|
|
|
|
2017-05-01 23:20:57 +09:00
|
|
|
module Attachmentable
|
|
|
|
extend ActiveSupport::Concern
|
|
|
|
|
2018-04-23 16:16:38 +09:00
|
|
|
MAX_MATRIX_LIMIT = 16_777_216 # 4096x4096px or approx. 16MB
|
2019-10-03 08:09:12 +09:00
|
|
|
GIF_MATRIX_LIMIT = 921_600 # 1280x720px
|
2018-04-23 16:16:38 +09:00
|
|
|
|
2020-07-01 06:58:02 +09:00
|
|
|
# For some file extensions, there exist different content
|
|
|
|
# type variants, and browsers often send the wrong one,
|
|
|
|
# for example, sending an audio .ogg file as video/ogg,
|
|
|
|
# likewise, MimeMagic also misreports them as such. For
|
|
|
|
# those files, it is necessary to use the output of the
|
|
|
|
# `file` utility instead
|
|
|
|
INCORRECT_CONTENT_TYPES = %w(
|
2021-09-30 06:52:36 +09:00
|
|
|
audio/vorbis
|
2020-07-01 06:58:02 +09:00
|
|
|
video/ogg
|
|
|
|
video/webm
|
|
|
|
).freeze
|
|
|
|
|
2017-05-01 23:20:57 +09:00
|
|
|
included do
|
2021-09-30 06:52:36 +09:00
|
|
|
def self.has_attached_file(name, options = {}) # rubocop:disable Naming/PredicateName
|
|
|
|
super(name, options)
|
2023-07-06 22:05:05 +09:00
|
|
|
|
|
|
|
send(:"before_#{name}_validate") do
|
2021-09-30 06:52:36 +09:00
|
|
|
attachment = send(name)
|
|
|
|
check_image_dimension(attachment)
|
|
|
|
set_file_content_type(attachment)
|
|
|
|
obfuscate_file_name(attachment)
|
|
|
|
set_file_extension(attachment)
|
|
|
|
end
|
|
|
|
end
|
2017-05-01 23:20:57 +09:00
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
2021-09-30 06:52:36 +09:00
|
|
|
def set_file_content_type(attachment) # rubocop:disable Naming/AccessorMethodName
|
|
|
|
return if attachment.blank? || attachment.queued_for_write[:original].blank? || !INCORRECT_CONTENT_TYPES.include?(attachment.instance_read(:content_type))
|
2019-06-22 23:54:06 +09:00
|
|
|
|
2021-09-30 06:52:36 +09:00
|
|
|
attachment.instance_write :content_type, calculated_content_type(attachment)
|
2019-06-22 23:54:06 +09:00
|
|
|
end
|
|
|
|
|
2021-09-30 06:52:36 +09:00
|
|
|
def set_file_extension(attachment) # rubocop:disable Naming/AccessorMethodName
|
|
|
|
return if attachment.blank?
|
2018-04-23 16:16:38 +09:00
|
|
|
|
2021-09-30 06:52:36 +09:00
|
|
|
attachment.instance_write :file_name, [Paperclip::Interpolations.basename(attachment, :original), appropriate_extension(attachment)].delete_if(&:blank?).join('.')
|
2018-04-23 16:16:38 +09:00
|
|
|
end
|
|
|
|
|
2021-09-30 06:52:36 +09:00
|
|
|
def check_image_dimension(attachment)
|
|
|
|
return if attachment.blank? || !/image.*/.match?(attachment.content_type) || attachment.queued_for_write[:original].blank?
|
2018-04-23 16:16:38 +09:00
|
|
|
|
2021-09-30 06:52:36 +09:00
|
|
|
width, height = FastImage.size(attachment.queued_for_write[:original].path)
|
|
|
|
matrix_limit = attachment.content_type == 'image/gif' ? GIF_MATRIX_LIMIT : MAX_MATRIX_LIMIT
|
2018-04-23 16:16:38 +09:00
|
|
|
|
2021-09-30 06:52:36 +09:00
|
|
|
raise Mastodon::DimensionsValidationError, "#{width}x#{height} images are not supported" if width.present? && height.present? && (width * height > matrix_limit)
|
2017-05-01 23:20:57 +09:00
|
|
|
end
|
2018-04-23 16:16:38 +09:00
|
|
|
|
|
|
|
def appropriate_extension(attachment)
|
|
|
|
mime_type = MIME::Types[attachment.content_type]
|
|
|
|
|
|
|
|
extensions_for_mime_type = mime_type.empty? ? [] : mime_type.first.extensions
|
|
|
|
original_extension = Paperclip::Interpolations.extension(attachment, :original)
|
2018-06-19 00:27:05 +09:00
|
|
|
proper_extension = extensions_for_mime_type.first.to_s
|
2018-06-24 20:33:06 +09:00
|
|
|
extension = extensions_for_mime_type.include?(original_extension) ? original_extension : proper_extension
|
|
|
|
extension = 'jpeg' if extension == 'jpe'
|
2018-04-23 16:16:38 +09:00
|
|
|
|
2018-06-24 20:33:06 +09:00
|
|
|
extension
|
2018-04-23 16:16:38 +09:00
|
|
|
end
|
2019-06-22 23:54:06 +09:00
|
|
|
|
|
|
|
def calculated_content_type(attachment)
|
2020-07-01 06:58:02 +09:00
|
|
|
Paperclip.run('file', '-b --mime :file', file: attachment.queued_for_write[:original].path).split(/[:;\s]+/).first.chomp
|
2019-06-22 23:54:06 +09:00
|
|
|
rescue Terrapin::CommandLineError
|
|
|
|
''
|
|
|
|
end
|
2020-01-04 09:54:07 +09:00
|
|
|
|
2021-09-30 06:52:36 +09:00
|
|
|
def obfuscate_file_name(attachment)
|
|
|
|
return if attachment.blank? || attachment.queued_for_write[:original].blank? || attachment.options[:preserve_files]
|
2020-01-04 09:54:07 +09:00
|
|
|
|
2021-09-30 06:52:36 +09:00
|
|
|
attachment.instance_write :file_name, SecureRandom.hex(8) + File.extname(attachment.instance_read(:file_name))
|
2020-01-04 09:54:07 +09:00
|
|
|
end
|
2017-05-01 23:20:57 +09:00
|
|
|
end
|