activestorage 0.1 → 5.2.0.beta1
Sign up to get free protection for your applications and to get access to all the features.
Potentially problematic release.
This version of activestorage might be problematic. Click here for more details.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/README.md +94 -25
- data/app/assets/javascripts/activestorage.js +1 -0
- data/app/controllers/active_storage/blobs_controller.rb +16 -0
- data/app/controllers/active_storage/direct_uploads_controller.rb +23 -0
- data/app/controllers/active_storage/disk_controller.rb +51 -0
- data/app/controllers/active_storage/previews_controller.rb +12 -0
- data/app/controllers/active_storage/variants_controller.rb +16 -0
- data/app/javascript/activestorage/blob_record.js +54 -0
- data/app/javascript/activestorage/blob_upload.js +35 -0
- data/app/javascript/activestorage/direct_upload.js +42 -0
- data/app/javascript/activestorage/direct_upload_controller.js +67 -0
- data/app/javascript/activestorage/direct_uploads_controller.js +50 -0
- data/app/javascript/activestorage/file_checksum.js +53 -0
- data/app/javascript/activestorage/helpers.js +42 -0
- data/app/javascript/activestorage/index.js +11 -0
- data/app/javascript/activestorage/ujs.js +75 -0
- data/app/jobs/active_storage/analyze_job.rb +8 -0
- data/app/jobs/active_storage/base_job.rb +5 -0
- data/app/jobs/active_storage/purge_job.rb +11 -0
- data/app/models/active_storage/attachment.rb +35 -0
- data/app/models/active_storage/blob.rb +313 -0
- data/app/models/active_storage/filename.rb +73 -0
- data/app/models/active_storage/filename/parameters.rb +36 -0
- data/app/models/active_storage/preview.rb +90 -0
- data/app/models/active_storage/variant.rb +86 -0
- data/app/models/active_storage/variation.rb +67 -0
- data/config/routes.rb +43 -0
- data/lib/active_storage.rb +37 -2
- data/lib/active_storage/analyzer.rb +33 -0
- data/lib/active_storage/analyzer/image_analyzer.rb +36 -0
- data/lib/active_storage/analyzer/null_analyzer.rb +13 -0
- data/lib/active_storage/analyzer/video_analyzer.rb +79 -0
- data/lib/active_storage/attached.rb +28 -22
- data/lib/active_storage/attached/macros.rb +89 -16
- data/lib/active_storage/attached/many.rb +53 -21
- data/lib/active_storage/attached/one.rb +74 -20
- data/lib/active_storage/downloading.rb +26 -0
- data/lib/active_storage/engine.rb +72 -0
- data/lib/active_storage/gem_version.rb +17 -0
- data/lib/active_storage/log_subscriber.rb +52 -0
- data/lib/active_storage/previewer.rb +58 -0
- data/lib/active_storage/previewer/pdf_previewer.rb +17 -0
- data/lib/active_storage/previewer/video_previewer.rb +23 -0
- data/lib/active_storage/service.rb +112 -24
- data/lib/active_storage/service/azure_storage_service.rb +124 -0
- data/lib/active_storage/service/configurator.rb +32 -0
- data/lib/active_storage/service/disk_service.rb +103 -44
- data/lib/active_storage/service/gcs_service.rb +87 -29
- data/lib/active_storage/service/mirror_service.rb +38 -22
- data/lib/active_storage/service/s3_service.rb +83 -38
- data/lib/active_storage/version.rb +10 -0
- data/lib/tasks/activestorage.rake +4 -15
- metadata +64 -108
- data/.gitignore +0 -1
- data/Gemfile +0 -11
- data/Gemfile.lock +0 -235
- data/Rakefile +0 -11
- data/activestorage.gemspec +0 -21
- data/lib/active_storage/attachment.rb +0 -30
- data/lib/active_storage/blob.rb +0 -80
- data/lib/active_storage/disk_controller.rb +0 -28
- data/lib/active_storage/download.rb +0 -90
- data/lib/active_storage/filename.rb +0 -31
- data/lib/active_storage/migration.rb +0 -28
- data/lib/active_storage/purge_job.rb +0 -10
- data/lib/active_storage/railtie.rb +0 -56
- data/lib/active_storage/storage_services.yml +0 -27
- data/lib/active_storage/verified_key_with_expiration.rb +0 -24
- data/test/attachments_test.rb +0 -95
- data/test/blob_test.rb +0 -28
- data/test/database/create_users_migration.rb +0 -7
- data/test/database/setup.rb +0 -6
- data/test/disk_controller_test.rb +0 -34
- data/test/filename_test.rb +0 -36
- data/test/service/.gitignore +0 -1
- data/test/service/configurations-example.yml +0 -11
- data/test/service/disk_service_test.rb +0 -8
- data/test/service/gcs_service_test.rb +0 -20
- data/test/service/mirror_service_test.rb +0 -50
- data/test/service/s3_service_test.rb +0 -11
- data/test/service/shared_service_tests.rb +0 -68
- data/test/test_helper.rb +0 -28
- data/test/verified_key_with_expiration_test.rb +0 -19
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 1ba6f19b9e27874ec06bfa488894df537ad47722
|
4
|
+
data.tar.gz: 7a1d1ce318e55eb6deac02af35e0de0e59358de9
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 6cc5d8f9519577e145ae516b2f68f9113df17fb59819f0472d03eaae9ff8c7de042d0eb3d6aa1e5c9c740fe52487c90104902cdd79880d0c06ba6992e8153749
|
7
|
+
data.tar.gz: b49ef545a979bcc80b60110278542b9b6f8e42dc87c7e51162d9ca0ec6b5f70f03a87dece236afe62ee09b4672d17bb16bf6bc6771a4408a25d578e120a26391
|
data/CHANGELOG.md
ADDED
data/README.md
CHANGED
@@ -1,8 +1,20 @@
|
|
1
1
|
# Active Storage
|
2
2
|
|
3
|
-
Active Storage makes it simple to upload and reference files in cloud services
|
4
|
-
|
5
|
-
|
3
|
+
Active Storage makes it simple to upload and reference files in cloud services like Amazon S3, Google Cloud Storage, or Microsoft Azure Storage, and attach those files to Active Records. Supports having one main service and mirrors in other services for redundancy. It also provides a disk service for testing or local deployments, but the focus is on cloud storage.
|
4
|
+
|
5
|
+
Files can be uploaded from the server to the cloud or directly from the client to the cloud.
|
6
|
+
|
7
|
+
Image files can furthermore be transformed using on-demand variants for quality, aspect ratio, size, or any other [MiniMagick](https://github.com/minimagick/minimagick) supported transformation.
|
8
|
+
|
9
|
+
## Compared to other storage solutions
|
10
|
+
|
11
|
+
A key difference to how Active Storage works compared to other attachment solutions in Rails is through the use of built-in [Blob](https://github.com/rails/rails/blob/master/activestorage/app/models/active_storage/blob.rb) and [Attachment](https://github.com/rails/rails/blob/master/activestorage/app/models/active_storage/attachment.rb) models (backed by Active Record). This means existing application models do not need to be modified with additional columns to associate with files. Active Storage uses polymorphic associations via the `Attachment` join model, which then connects to the actual `Blob`.
|
12
|
+
|
13
|
+
`Blob` models store attachment metadata (filename, content-type, etc.), and their identifier key in the storage service. Blob models do not store the actual binary data. They are intended to be immutable in spirit. One file, one blob. You can associate the same blob with multiple application models as well. And if you want to do transformations of a given `Blob`, the idea is that you'll simply create a new one, rather than attempt to mutate the existing one (though of course you can delete the previous version later if you don't need it).
|
14
|
+
|
15
|
+
## Installation
|
16
|
+
|
17
|
+
Run `rails active_storage:install` to copy over active_storage migrations.
|
6
18
|
|
7
19
|
## Examples
|
8
20
|
|
@@ -10,19 +22,36 @@ One attachment:
|
|
10
22
|
|
11
23
|
```ruby
|
12
24
|
class User < ApplicationRecord
|
25
|
+
# Associates an attachment and a blob. When the user is destroyed they are
|
26
|
+
# purged by default (models destroyed, and resource files deleted).
|
13
27
|
has_one_attached :avatar
|
14
28
|
end
|
15
29
|
|
16
|
-
|
17
|
-
user.avatar.
|
30
|
+
# Attach an avatar to the user.
|
31
|
+
user.avatar.attach(io: File.open("/path/to/face.jpg"), filename: "face.jpg", content_type: "image/jpg")
|
32
|
+
|
33
|
+
# Does the user have an avatar?
|
34
|
+
user.avatar.attached? # => true
|
18
35
|
|
36
|
+
# Synchronously destroy the avatar and actual resource files.
|
19
37
|
user.avatar.purge
|
20
|
-
user.avatar.exist? # => false
|
21
38
|
|
22
|
-
|
39
|
+
# Destroy the associated models and actual resource files async, via Active Job.
|
40
|
+
user.avatar.purge_later
|
41
|
+
|
42
|
+
# Does the user have an avatar?
|
43
|
+
user.avatar.attached? # => false
|
44
|
+
|
45
|
+
# Generate a permanent URL for the blob that points to the application.
|
46
|
+
# Upon access, a redirect to the actual service endpoint is returned.
|
47
|
+
# This indirection decouples the public URL from the actual one, and
|
48
|
+
# allows for example mirroring attachments in different services for
|
49
|
+
# high-availability. The redirection has an HTTP expiration of 5 min.
|
50
|
+
url_for(user.avatar)
|
23
51
|
|
24
52
|
class AvatarsController < ApplicationController
|
25
53
|
def update
|
54
|
+
# params[:avatar] contains a ActionDispatch::Http::UploadedFile object
|
26
55
|
Current.user.avatar.attach(params.require(:avatar))
|
27
56
|
redirect_to Current.user
|
28
57
|
end
|
@@ -35,41 +64,81 @@ Many attachments:
|
|
35
64
|
class Message < ApplicationRecord
|
36
65
|
has_many_attached :images
|
37
66
|
end
|
67
|
+
```
|
38
68
|
|
39
|
-
|
69
|
+
```erb
|
70
|
+
<%= form_with model: @message, local: true do |form| %>
|
40
71
|
<%= form.text_field :title, placeholder: "Title" %><br>
|
41
72
|
<%= form.text_area :content %><br><br>
|
42
|
-
|
73
|
+
|
43
74
|
<%= form.file_field :images, multiple: true %><br>
|
44
75
|
<%= form.submit %>
|
45
76
|
<% end %>
|
77
|
+
```
|
46
78
|
|
79
|
+
```ruby
|
47
80
|
class MessagesController < ApplicationController
|
81
|
+
def index
|
82
|
+
# Use the built-in with_attached_images scope to avoid N+1
|
83
|
+
@messages = Message.all.with_attached_images
|
84
|
+
end
|
85
|
+
|
48
86
|
def create
|
49
87
|
message = Message.create! params.require(:message).permit(:title, :content)
|
50
88
|
message.images.attach(params[:message][:images])
|
51
89
|
redirect_to message
|
52
90
|
end
|
91
|
+
|
92
|
+
def show
|
93
|
+
@message = Message.find(params[:id])
|
94
|
+
end
|
53
95
|
end
|
54
96
|
```
|
55
97
|
|
56
|
-
|
98
|
+
Variation of image attachment:
|
99
|
+
|
100
|
+
```erb
|
101
|
+
<%# Hitting the variant URL will lazy transform the original blob and then redirect to its new service location %>
|
102
|
+
<%= image_tag user.avatar.variant(resize: "100x100") %>
|
103
|
+
```
|
57
104
|
|
58
|
-
|
59
|
-
|
60
|
-
|
61
|
-
|
62
|
-
|
63
|
-
|
64
|
-
|
65
|
-
|
66
|
-
|
67
|
-
|
68
|
-
|
69
|
-
|
70
|
-
|
71
|
-
|
72
|
-
|
105
|
+
## Direct uploads
|
106
|
+
|
107
|
+
Active Storage, with its included JavaScript library, supports uploading directly from the client to the cloud.
|
108
|
+
|
109
|
+
### Direct upload installation
|
110
|
+
|
111
|
+
1. Include `activestorage.js` in your application's JavaScript bundle.
|
112
|
+
|
113
|
+
Using the asset pipeline:
|
114
|
+
```js
|
115
|
+
//= require activestorage
|
116
|
+
```
|
117
|
+
Using the npm package:
|
118
|
+
```js
|
119
|
+
import * as ActiveStorage from "activestorage"
|
120
|
+
ActiveStorage.start()
|
121
|
+
```
|
122
|
+
2. Annotate file inputs with the direct upload URL.
|
123
|
+
|
124
|
+
```ruby
|
125
|
+
<%= form.file_field :attachments, multiple: true, direct_upload: true %>
|
126
|
+
```
|
127
|
+
3. That's it! Uploads begin upon form submission.
|
128
|
+
|
129
|
+
### Direct upload JavaScript events
|
130
|
+
|
131
|
+
| Event name | Event target | Event data (`event.detail`) | Description |
|
132
|
+
| --- | --- | --- | --- |
|
133
|
+
| `direct-uploads:start` | `<form>` | None | A form containing files for direct upload fields was submitted. |
|
134
|
+
| `direct-upload:initialize` | `<input>` | `{id, file}` | Dispatched for every file after form submission. |
|
135
|
+
| `direct-upload:start` | `<input>` | `{id, file}` | A direct upload is starting. |
|
136
|
+
| `direct-upload:before-blob-request` | `<input>` | `{id, file, xhr}` | Before making a request to your application for direct upload metadata. |
|
137
|
+
| `direct-upload:before-storage-request` | `<input>` | `{id, file, xhr}` | Before making a request to store a file. |
|
138
|
+
| `direct-upload:progress` | `<input>` | `{id, file, progress}` | As requests to store files progress. |
|
139
|
+
| `direct-upload:error` | `<input>` | `{id, file, error}` | An error occurred. An `alert` will display unless this event is canceled. |
|
140
|
+
| `direct-upload:end` | `<input>` | `{id, file}` | A direct upload has ended. |
|
141
|
+
| `direct-uploads:end` | `<form>` | None | All direct uploads have ended. |
|
73
142
|
|
74
143
|
## License
|
75
144
|
|
@@ -0,0 +1 @@
|
|
1
|
+
!function(t,e){"object"==typeof exports&&"object"==typeof module?module.exports=e():"function"==typeof define&&define.amd?define([],e):"object"==typeof exports?exports.ActiveStorage=e():t.ActiveStorage=e()}(this,function(){return function(t){function e(n){if(r[n])return r[n].exports;var i=r[n]={i:n,l:!1,exports:{}};return t[n].call(i.exports,i,i.exports,e),i.l=!0,i.exports}var r={};return e.m=t,e.c=r,e.d=function(t,r,n){e.o(t,r)||Object.defineProperty(t,r,{configurable:!1,enumerable:!0,get:n})},e.n=function(t){var r=t&&t.__esModule?function(){return t.default}:function(){return t};return e.d(r,"a",r),r},e.o=function(t,e){return Object.prototype.hasOwnProperty.call(t,e)},e.p="",e(e.s=2)}([function(t,e,r){"use strict";function n(t){var e=a(document.head,'meta[name="'+t+'"]');if(e)return e.getAttribute("content")}function i(t,e){return"string"==typeof t&&(e=t,t=document),o(t.querySelectorAll(e))}function a(t,e){return"string"==typeof t&&(e=t,t=document),t.querySelector(e)}function u(t,e){var r=arguments.length>2&&void 0!==arguments[2]?arguments[2]:{},n=r.bubbles,i=r.cancelable,a=r.detail,u=document.createEvent("Event");return u.initEvent(e,n||!0,i||!0),u.detail=a||{},t.dispatchEvent(u),u}function o(t){return Array.isArray(t)?t:Array.from?Array.from(t):[].slice.call(t)}e.d=n,e.c=i,e.b=a,e.a=u,e.e=o},function(t,e,r){"use strict";function n(t,e){if(!(t instanceof e))throw new TypeError("Cannot call a class as a function")}function i(t,e){if(t&&"function"==typeof t[e]){for(var r=arguments.length,n=Array(r>2?r-2:0),i=2;i<r;i++)n[i-2]=arguments[i];return t[e].apply(t,n)}}r.d(e,"a",function(){return c});var a=r(6),u=r(8),o=r(9),s=function(){function t(t,e){for(var r=0;r<e.length;r++){var n=e[r];n.enumerable=n.enumerable||!1,n.configurable=!0,"value"in n&&(n.writable=!0),Object.defineProperty(t,n.key,n)}}return function(e,r,n){return r&&t(e.prototype,r),n&&t(e,n),e}}(),f=0,c=function(){function t(e,r,i){n(this,t),this.id=++f,this.file=e,this.url=r,this.delegate=i}return s(t,[{key:"create",value:function(t){var e=this;a.a.create(this.file,function(r,n){var a=new u.a(e.file,n,e.url);i(e.delegate,"directUploadWillCreateBlobWithXHR",a.xhr),a.create(function(r){if(r)t(r);else{var n=new o.a(a);i(e.delegate,"directUploadWillStoreFileWithXHR",n.xhr),n.create(function(e){e?t(e):t(null,a.toJSON())})}})})}}]),t}()},function(t,e,r){"use strict";function n(){window.ActiveStorage&&Object(i.a)()}Object.defineProperty(e,"__esModule",{value:!0});var i=r(3),a=r(1);r.d(e,"start",function(){return i.a}),r.d(e,"DirectUpload",function(){return a.a}),setTimeout(n,1)},function(t,e,r){"use strict";function n(){d||(d=!0,document.addEventListener("submit",i),document.addEventListener("ajax:before",a))}function i(t){u(t)}function a(t){"FORM"==t.target.tagName&&u(t)}function u(t){var e=t.target;if(e.hasAttribute(l))return void t.preventDefault();var r=new c.a(e),n=r.inputs;n.length&&(t.preventDefault(),e.setAttribute(l,""),n.forEach(s),r.start(function(t){e.removeAttribute(l),t?n.forEach(f):o(e)}))}function o(t){var e=Object(h.b)(t,"input[type=submit]");if(e){var r=e,n=r.disabled;e.disabled=!1,e.focus(),e.click(),e.disabled=n}else e=document.createElement("input"),e.type="submit",e.style="display:none",t.appendChild(e),e.click(),t.removeChild(e)}function s(t){t.disabled=!0}function f(t){t.disabled=!1}e.a=n;var c=r(4),h=r(0),l="data-direct-uploads-processing",d=!1},function(t,e,r){"use strict";function n(t,e){if(!(t instanceof e))throw new TypeError("Cannot call a class as a function")}r.d(e,"a",function(){return s});var i=r(5),a=r(0),u=function(){function t(t,e){for(var r=0;r<e.length;r++){var n=e[r];n.enumerable=n.enumerable||!1,n.configurable=!0,"value"in n&&(n.writable=!0),Object.defineProperty(t,n.key,n)}}return function(e,r,n){return r&&t(e.prototype,r),n&&t(e,n),e}}(),o="input[type=file][data-direct-upload-url]:not([disabled])",s=function(){function t(e){n(this,t),this.form=e,this.inputs=Object(a.c)(e,o).filter(function(t){return t.files.length})}return u(t,[{key:"start",value:function(t){var e=this,r=this.createDirectUploadControllers();this.dispatch("start"),function n(){var i=r.shift();i?i.start(function(r){r?(t(r),e.dispatch("end")):n()}):(t(),e.dispatch("end"))}()}},{key:"createDirectUploadControllers",value:function(){var t=[];return this.inputs.forEach(function(e){Object(a.e)(e.files).forEach(function(r){var n=new i.a(e,r);t.push(n)})}),t}},{key:"dispatch",value:function(t){var e=arguments.length>1&&void 0!==arguments[1]?arguments[1]:{};return Object(a.a)(this.form,"direct-uploads:"+t,{detail:e})}}]),t}()},function(t,e,r){"use strict";function n(t,e){if(!(t instanceof e))throw new TypeError("Cannot call a class as a function")}r.d(e,"a",function(){return o});var i=r(1),a=r(0),u=function(){function t(t,e){for(var r=0;r<e.length;r++){var n=e[r];n.enumerable=n.enumerable||!1,n.configurable=!0,"value"in n&&(n.writable=!0),Object.defineProperty(t,n.key,n)}}return function(e,r,n){return r&&t(e.prototype,r),n&&t(e,n),e}}(),o=function(){function t(e,r){n(this,t),this.input=e,this.file=r,this.directUpload=new i.a(this.file,this.url,this),this.dispatch("initialize")}return u(t,[{key:"start",value:function(t){var e=this,r=document.createElement("input");r.type="hidden",r.name=this.input.name,this.input.insertAdjacentElement("beforebegin",r),this.dispatch("start"),this.directUpload.create(function(n,i){n?(r.parentNode.removeChild(r),e.dispatchError(n)):r.value=i.signed_id,e.dispatch("end"),t(n)})}},{key:"uploadRequestDidProgress",value:function(t){var e=t.loaded/t.total*100;e&&this.dispatch("progress",{progress:e})}},{key:"dispatch",value:function(t){var e=arguments.length>1&&void 0!==arguments[1]?arguments[1]:{};return e.file=this.file,e.id=this.directUpload.id,Object(a.a)(this.input,"direct-upload:"+t,{detail:e})}},{key:"dispatchError",value:function(t){this.dispatch("error",{error:t}).defaultPrevented||alert(t)}},{key:"directUploadWillCreateBlobWithXHR",value:function(t){this.dispatch("before-blob-request",{xhr:t})}},{key:"directUploadWillStoreFileWithXHR",value:function(t){var e=this;this.dispatch("before-storage-request",{xhr:t}),t.upload.addEventListener("progress",function(t){return e.uploadRequestDidProgress(t)})}},{key:"url",get:function(){return this.input.getAttribute("data-direct-upload-url")}}]),t}()},function(t,e,r){"use strict";function n(t,e){if(!(t instanceof e))throw new TypeError("Cannot call a class as a function")}r.d(e,"a",function(){return s});var i=r(7),a=r.n(i),u=function(){function t(t,e){for(var r=0;r<e.length;r++){var n=e[r];n.enumerable=n.enumerable||!1,n.configurable=!0,"value"in n&&(n.writable=!0),Object.defineProperty(t,n.key,n)}}return function(e,r,n){return r&&t(e.prototype,r),n&&t(e,n),e}}(),o=File.prototype.slice||File.prototype.mozSlice||File.prototype.webkitSlice,s=function(){function t(e){n(this,t),this.file=e,this.chunkSize=2097152,this.chunkCount=Math.ceil(this.file.size/this.chunkSize),this.chunkIndex=0}return u(t,null,[{key:"create",value:function(e,r){new t(e).create(r)}}]),u(t,[{key:"create",value:function(t){var e=this;this.callback=t,this.md5Buffer=new a.a.ArrayBuffer,this.fileReader=new FileReader,this.fileReader.addEventListener("load",function(t){return e.fileReaderDidLoad(t)}),this.fileReader.addEventListener("error",function(t){return e.fileReaderDidError(t)}),this.readNextChunk()}},{key:"fileReaderDidLoad",value:function(t){if(this.md5Buffer.append(t.target.result),!this.readNextChunk()){var e=this.md5Buffer.end(!0),r=btoa(e);this.callback(null,r)}}},{key:"fileReaderDidError",value:function(t){this.callback("Error reading "+this.file.name)}},{key:"readNextChunk",value:function(){if(this.chunkIndex<this.chunkCount){var t=this.chunkIndex*this.chunkSize,e=Math.min(t+this.chunkSize,this.file.size),r=o.call(this.file,t,e);return this.fileReader.readAsArrayBuffer(r),this.chunkIndex++,!0}return!1}}]),t}()},function(t,e,r){!function(e){t.exports=e()}(function(t){"use strict";function e(t,e){var r=t[0],n=t[1],i=t[2],a=t[3];r+=(n&i|~n&a)+e[0]-680876936|0,r=(r<<7|r>>>25)+n|0,a+=(r&n|~r&i)+e[1]-389564586|0,a=(a<<12|a>>>20)+r|0,i+=(a&r|~a&n)+e[2]+606105819|0,i=(i<<17|i>>>15)+a|0,n+=(i&a|~i&r)+e[3]-1044525330|0,n=(n<<22|n>>>10)+i|0,r+=(n&i|~n&a)+e[4]-176418897|0,r=(r<<7|r>>>25)+n|0,a+=(r&n|~r&i)+e[5]+1200080426|0,a=(a<<12|a>>>20)+r|0,i+=(a&r|~a&n)+e[6]-1473231341|0,i=(i<<17|i>>>15)+a|0,n+=(i&a|~i&r)+e[7]-45705983|0,n=(n<<22|n>>>10)+i|0,r+=(n&i|~n&a)+e[8]+1770035416|0,r=(r<<7|r>>>25)+n|0,a+=(r&n|~r&i)+e[9]-1958414417|0,a=(a<<12|a>>>20)+r|0,i+=(a&r|~a&n)+e[10]-42063|0,i=(i<<17|i>>>15)+a|0,n+=(i&a|~i&r)+e[11]-1990404162|0,n=(n<<22|n>>>10)+i|0,r+=(n&i|~n&a)+e[12]+1804603682|0,r=(r<<7|r>>>25)+n|0,a+=(r&n|~r&i)+e[13]-40341101|0,a=(a<<12|a>>>20)+r|0,i+=(a&r|~a&n)+e[14]-1502002290|0,i=(i<<17|i>>>15)+a|0,n+=(i&a|~i&r)+e[15]+1236535329|0,n=(n<<22|n>>>10)+i|0,r+=(n&a|i&~a)+e[1]-165796510|0,r=(r<<5|r>>>27)+n|0,a+=(r&i|n&~i)+e[6]-1069501632|0,a=(a<<9|a>>>23)+r|0,i+=(a&n|r&~n)+e[11]+643717713|0,i=(i<<14|i>>>18)+a|0,n+=(i&r|a&~r)+e[0]-373897302|0,n=(n<<20|n>>>12)+i|0,r+=(n&a|i&~a)+e[5]-701558691|0,r=(r<<5|r>>>27)+n|0,a+=(r&i|n&~i)+e[10]+38016083|0,a=(a<<9|a>>>23)+r|0,i+=(a&n|r&~n)+e[15]-660478335|0,i=(i<<14|i>>>18)+a|0,n+=(i&r|a&~r)+e[4]-405537848|0,n=(n<<20|n>>>12)+i|0,r+=(n&a|i&~a)+e[9]+568446438|0,r=(r<<5|r>>>27)+n|0,a+=(r&i|n&~i)+e[14]-1019803690|0,a=(a<<9|a>>>23)+r|0,i+=(a&n|r&~n)+e[3]-187363961|0,i=(i<<14|i>>>18)+a|0,n+=(i&r|a&~r)+e[8]+1163531501|0,n=(n<<20|n>>>12)+i|0,r+=(n&a|i&~a)+e[13]-1444681467|0,r=(r<<5|r>>>27)+n|0,a+=(r&i|n&~i)+e[2]-51403784|0,a=(a<<9|a>>>23)+r|0,i+=(a&n|r&~n)+e[7]+1735328473|0,i=(i<<14|i>>>18)+a|0,n+=(i&r|a&~r)+e[12]-1926607734|0,n=(n<<20|n>>>12)+i|0,r+=(n^i^a)+e[5]-378558|0,r=(r<<4|r>>>28)+n|0,a+=(r^n^i)+e[8]-2022574463|0,a=(a<<11|a>>>21)+r|0,i+=(a^r^n)+e[11]+1839030562|0,i=(i<<16|i>>>16)+a|0,n+=(i^a^r)+e[14]-35309556|0,n=(n<<23|n>>>9)+i|0,r+=(n^i^a)+e[1]-1530992060|0,r=(r<<4|r>>>28)+n|0,a+=(r^n^i)+e[4]+1272893353|0,a=(a<<11|a>>>21)+r|0,i+=(a^r^n)+e[7]-155497632|0,i=(i<<16|i>>>16)+a|0,n+=(i^a^r)+e[10]-1094730640|0,n=(n<<23|n>>>9)+i|0,r+=(n^i^a)+e[13]+681279174|0,r=(r<<4|r>>>28)+n|0,a+=(r^n^i)+e[0]-358537222|0,a=(a<<11|a>>>21)+r|0,i+=(a^r^n)+e[3]-722521979|0,i=(i<<16|i>>>16)+a|0,n+=(i^a^r)+e[6]+76029189|0,n=(n<<23|n>>>9)+i|0,r+=(n^i^a)+e[9]-640364487|0,r=(r<<4|r>>>28)+n|0,a+=(r^n^i)+e[12]-421815835|0,a=(a<<11|a>>>21)+r|0,i+=(a^r^n)+e[15]+530742520|0,i=(i<<16|i>>>16)+a|0,n+=(i^a^r)+e[2]-995338651|0,n=(n<<23|n>>>9)+i|0,r+=(i^(n|~a))+e[0]-198630844|0,r=(r<<6|r>>>26)+n|0,a+=(n^(r|~i))+e[7]+1126891415|0,a=(a<<10|a>>>22)+r|0,i+=(r^(a|~n))+e[14]-1416354905|0,i=(i<<15|i>>>17)+a|0,n+=(a^(i|~r))+e[5]-57434055|0,n=(n<<21|n>>>11)+i|0,r+=(i^(n|~a))+e[12]+1700485571|0,r=(r<<6|r>>>26)+n|0,a+=(n^(r|~i))+e[3]-1894986606|0,a=(a<<10|a>>>22)+r|0,i+=(r^(a|~n))+e[10]-1051523|0,i=(i<<15|i>>>17)+a|0,n+=(a^(i|~r))+e[1]-2054922799|0,n=(n<<21|n>>>11)+i|0,r+=(i^(n|~a))+e[8]+1873313359|0,r=(r<<6|r>>>26)+n|0,a+=(n^(r|~i))+e[15]-30611744|0,a=(a<<10|a>>>22)+r|0,i+=(r^(a|~n))+e[6]-1560198380|0,i=(i<<15|i>>>17)+a|0,n+=(a^(i|~r))+e[13]+1309151649|0,n=(n<<21|n>>>11)+i|0,r+=(i^(n|~a))+e[4]-145523070|0,r=(r<<6|r>>>26)+n|0,a+=(n^(r|~i))+e[11]-1120210379|0,a=(a<<10|a>>>22)+r|0,i+=(r^(a|~n))+e[2]+718787259|0,i=(i<<15|i>>>17)+a|0,n+=(a^(i|~r))+e[9]-343485551|0,n=(n<<21|n>>>11)+i|0,t[0]=r+t[0]|0,t[1]=n+t[1]|0,t[2]=i+t[2]|0,t[3]=a+t[3]|0}function r(t){var e,r=[];for(e=0;e<64;e+=4)r[e>>2]=t.charCodeAt(e)+(t.charCodeAt(e+1)<<8)+(t.charCodeAt(e+2)<<16)+(t.charCodeAt(e+3)<<24);return r}function n(t){var e,r=[];for(e=0;e<64;e+=4)r[e>>2]=t[e]+(t[e+1]<<8)+(t[e+2]<<16)+(t[e+3]<<24);return r}function i(t){var n,i,a,u,o,s,f=t.length,c=[1732584193,-271733879,-1732584194,271733878];for(n=64;n<=f;n+=64)e(c,r(t.substring(n-64,n)));for(t=t.substring(n-64),i=t.length,a=[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],n=0;n<i;n+=1)a[n>>2]|=t.charCodeAt(n)<<(n%4<<3);if(a[n>>2]|=128<<(n%4<<3),n>55)for(e(c,a),n=0;n<16;n+=1)a[n]=0;return u=8*f,u=u.toString(16).match(/(.*?)(.{0,8})$/),o=parseInt(u[2],16),s=parseInt(u[1],16)||0,a[14]=o,a[15]=s,e(c,a),c}function a(t){var r,i,a,u,o,s,f=t.length,c=[1732584193,-271733879,-1732584194,271733878];for(r=64;r<=f;r+=64)e(c,n(t.subarray(r-64,r)));for(t=r-64<f?t.subarray(r-64):new Uint8Array(0),i=t.length,a=[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],r=0;r<i;r+=1)a[r>>2]|=t[r]<<(r%4<<3);if(a[r>>2]|=128<<(r%4<<3),r>55)for(e(c,a),r=0;r<16;r+=1)a[r]=0;return u=8*f,u=u.toString(16).match(/(.*?)(.{0,8})$/),o=parseInt(u[2],16),s=parseInt(u[1],16)||0,a[14]=o,a[15]=s,e(c,a),c}function u(t){var e,r="";for(e=0;e<4;e+=1)r+=p[t>>8*e+4&15]+p[t>>8*e&15];return r}function o(t){var e;for(e=0;e<t.length;e+=1)t[e]=u(t[e]);return t.join("")}function s(t){return/[\u0080-\uFFFF]/.test(t)&&(t=unescape(encodeURIComponent(t))),t}function f(t,e){var r,n=t.length,i=new ArrayBuffer(n),a=new Uint8Array(i);for(r=0;r<n;r+=1)a[r]=t.charCodeAt(r);return e?a:i}function c(t){return String.fromCharCode.apply(null,new Uint8Array(t))}function h(t,e,r){var n=new Uint8Array(t.byteLength+e.byteLength);return n.set(new Uint8Array(t)),n.set(new Uint8Array(e),t.byteLength),r?n:n.buffer}function l(t){var e,r=[],n=t.length;for(e=0;e<n-1;e+=2)r.push(parseInt(t.substr(e,2),16));return String.fromCharCode.apply(String,r)}function d(){this.reset()}var p=["0","1","2","3","4","5","6","7","8","9","a","b","c","d","e","f"];return"5d41402abc4b2a76b9719d911017c592"!==o(i("hello"))&&function(t,e){var r=(65535&t)+(65535&e);return(t>>16)+(e>>16)+(r>>16)<<16|65535&r},"undefined"==typeof ArrayBuffer||ArrayBuffer.prototype.slice||function(){function e(t,e){return t=0|t||0,t<0?Math.max(t+e,0):Math.min(t,e)}ArrayBuffer.prototype.slice=function(r,n){var i,a,u,o,s=this.byteLength,f=e(r,s),c=s;return n!==t&&(c=e(n,s)),f>c?new ArrayBuffer(0):(i=c-f,a=new ArrayBuffer(i),u=new Uint8Array(a),o=new Uint8Array(this,f,i),u.set(o),a)}}(),d.prototype.append=function(t){return this.appendBinary(s(t)),this},d.prototype.appendBinary=function(t){this._buff+=t,this._length+=t.length;var n,i=this._buff.length;for(n=64;n<=i;n+=64)e(this._hash,r(this._buff.substring(n-64,n)));return this._buff=this._buff.substring(n-64),this},d.prototype.end=function(t){var e,r,n=this._buff,i=n.length,a=[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0];for(e=0;e<i;e+=1)a[e>>2]|=n.charCodeAt(e)<<(e%4<<3);return this._finish(a,i),r=o(this._hash),t&&(r=l(r)),this.reset(),r},d.prototype.reset=function(){return this._buff="",this._length=0,this._hash=[1732584193,-271733879,-1732584194,271733878],this},d.prototype.getState=function(){return{buff:this._buff,length:this._length,hash:this._hash}},d.prototype.setState=function(t){return this._buff=t.buff,this._length=t.length,this._hash=t.hash,this},d.prototype.destroy=function(){delete this._hash,delete this._buff,delete this._length},d.prototype._finish=function(t,r){var n,i,a,u=r;if(t[u>>2]|=128<<(u%4<<3),u>55)for(e(this._hash,t),u=0;u<16;u+=1)t[u]=0;n=8*this._length,n=n.toString(16).match(/(.*?)(.{0,8})$/),i=parseInt(n[2],16),a=parseInt(n[1],16)||0,t[14]=i,t[15]=a,e(this._hash,t)},d.hash=function(t,e){return d.hashBinary(s(t),e)},d.hashBinary=function(t,e){var r=i(t),n=o(r);return e?l(n):n},d.ArrayBuffer=function(){this.reset()},d.ArrayBuffer.prototype.append=function(t){var r,i=h(this._buff.buffer,t,!0),a=i.length;for(this._length+=t.byteLength,r=64;r<=a;r+=64)e(this._hash,n(i.subarray(r-64,r)));return this._buff=r-64<a?new Uint8Array(i.buffer.slice(r-64)):new Uint8Array(0),this},d.ArrayBuffer.prototype.end=function(t){var e,r,n=this._buff,i=n.length,a=[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0];for(e=0;e<i;e+=1)a[e>>2]|=n[e]<<(e%4<<3);return this._finish(a,i),r=o(this._hash),t&&(r=l(r)),this.reset(),r},d.ArrayBuffer.prototype.reset=function(){return this._buff=new Uint8Array(0),this._length=0,this._hash=[1732584193,-271733879,-1732584194,271733878],this},d.ArrayBuffer.prototype.getState=function(){var t=d.prototype.getState.call(this);return t.buff=c(t.buff),t},d.ArrayBuffer.prototype.setState=function(t){return t.buff=f(t.buff,!0),d.prototype.setState.call(this,t)},d.ArrayBuffer.prototype.destroy=d.prototype.destroy,d.ArrayBuffer.prototype._finish=d.prototype._finish,d.ArrayBuffer.hash=function(t,e){var r=a(new Uint8Array(t)),n=o(r);return e?l(n):n},d})},function(t,e,r){"use strict";function n(t,e){if(!(t instanceof e))throw new TypeError("Cannot call a class as a function")}r.d(e,"a",function(){return u});var i=r(0),a=function(){function t(t,e){for(var r=0;r<e.length;r++){var n=e[r];n.enumerable=n.enumerable||!1,n.configurable=!0,"value"in n&&(n.writable=!0),Object.defineProperty(t,n.key,n)}}return function(e,r,n){return r&&t(e.prototype,r),n&&t(e,n),e}}(),u=function(){function t(e,r,a){var u=this;n(this,t),this.file=e,this.attributes={filename:e.name,content_type:e.type,byte_size:e.size,checksum:r},this.xhr=new XMLHttpRequest,this.xhr.open("POST",a,!0),this.xhr.responseType="json",this.xhr.setRequestHeader("Content-Type","application/json"),this.xhr.setRequestHeader("Accept","application/json"),this.xhr.setRequestHeader("X-Requested-With","XMLHttpRequest"),this.xhr.setRequestHeader("X-CSRF-Token",Object(i.d)("csrf-token")),this.xhr.addEventListener("load",function(t){return u.requestDidLoad(t)}),this.xhr.addEventListener("error",function(t){return u.requestDidError(t)})}return a(t,[{key:"create",value:function(t){this.callback=t,this.xhr.send(JSON.stringify({blob:this.attributes}))}},{key:"requestDidLoad",value:function(t){var e=this.xhr,r=e.status,n=e.response;if(r>=200&&r<300){var i=n.direct_upload;delete n.direct_upload,this.attributes=n,this.directUploadData=i,this.callback(null,this.toJSON())}else this.requestDidError(t)}},{key:"requestDidError",value:function(t){this.callback('Error creating Blob for "'+this.file.name+'". Status: '+this.xhr.status)}},{key:"toJSON",value:function(){var t={};for(var e in this.attributes)t[e]=this.attributes[e];return t}}]),t}()},function(t,e,r){"use strict";function n(t,e){if(!(t instanceof e))throw new TypeError("Cannot call a class as a function")}r.d(e,"a",function(){return a});var i=function(){function t(t,e){for(var r=0;r<e.length;r++){var n=e[r];n.enumerable=n.enumerable||!1,n.configurable=!0,"value"in n&&(n.writable=!0),Object.defineProperty(t,n.key,n)}}return function(e,r,n){return r&&t(e.prototype,r),n&&t(e,n),e}}(),a=function(){function t(e){var r=this;n(this,t),this.blob=e,this.file=e.file;var i=e.directUploadData,a=i.url,u=i.headers;this.xhr=new XMLHttpRequest,this.xhr.open("PUT",a,!0),this.xhr.responseType="text";for(var o in u)this.xhr.setRequestHeader(o,u[o]);this.xhr.addEventListener("load",function(t){return r.requestDidLoad(t)}),this.xhr.addEventListener("error",function(t){return r.requestDidError(t)})}return i(t,[{key:"create",value:function(t){this.callback=t,this.xhr.send(this.file)}},{key:"requestDidLoad",value:function(t){var e=this.xhr,r=e.status,n=e.response;r>=200&&r<300?this.callback(null,n):this.requestDidError(t)}},{key:"requestDidError",value:function(t){this.callback('Error storing "'+this.file.name+'". Status: '+this.xhr.status)}}]),t}()}])});
|
@@ -0,0 +1,16 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Take a signed permanent reference for a blob and turn it into an expiring service URL for download.
|
4
|
+
# Note: These URLs are publicly accessible. If you need to enforce access protection beyond the
|
5
|
+
# security-through-obscurity factor of the signed blob references, you'll need to implement your own
|
6
|
+
# authenticated redirection controller.
|
7
|
+
class ActiveStorage::BlobsController < ActionController::Base
|
8
|
+
def show
|
9
|
+
if blob = ActiveStorage::Blob.find_signed(params[:signed_id])
|
10
|
+
expires_in ActiveStorage::Blob.service.url_expires_in
|
11
|
+
redirect_to blob.service_url(disposition: params[:disposition])
|
12
|
+
else
|
13
|
+
head :not_found
|
14
|
+
end
|
15
|
+
end
|
16
|
+
end
|
@@ -0,0 +1,23 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Creates a new blob on the server side in anticipation of a direct-to-service upload from the client side.
|
4
|
+
# When the client-side upload is completed, the signed_blob_id can be submitted as part of the form to reference
|
5
|
+
# the blob that was created up front.
|
6
|
+
class ActiveStorage::DirectUploadsController < ActionController::Base
|
7
|
+
def create
|
8
|
+
blob = ActiveStorage::Blob.create_before_direct_upload!(blob_args)
|
9
|
+
render json: direct_upload_json(blob)
|
10
|
+
end
|
11
|
+
|
12
|
+
private
|
13
|
+
def blob_args
|
14
|
+
params.require(:blob).permit(:filename, :byte_size, :checksum, :content_type, :metadata).to_h.symbolize_keys
|
15
|
+
end
|
16
|
+
|
17
|
+
def direct_upload_json(blob)
|
18
|
+
blob.as_json(methods: :signed_id).merge(direct_upload: {
|
19
|
+
url: blob.service_url_for_direct_upload,
|
20
|
+
headers: blob.service_headers_for_direct_upload
|
21
|
+
})
|
22
|
+
end
|
23
|
+
end
|
@@ -0,0 +1,51 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Serves files stored with the disk service in the same way that the cloud services do.
|
4
|
+
# This means using expiring, signed URLs that are meant for immediate access, not permanent linking.
|
5
|
+
# Always go through the BlobsController, or your own authenticated controller, rather than directly
|
6
|
+
# to the service url.
|
7
|
+
class ActiveStorage::DiskController < ActionController::Base
|
8
|
+
skip_forgery_protection if default_protect_from_forgery
|
9
|
+
|
10
|
+
def show
|
11
|
+
if key = decode_verified_key
|
12
|
+
send_data disk_service.download(key),
|
13
|
+
disposition: params[:disposition], content_type: params[:content_type]
|
14
|
+
else
|
15
|
+
head :not_found
|
16
|
+
end
|
17
|
+
end
|
18
|
+
|
19
|
+
def update
|
20
|
+
if token = decode_verified_token
|
21
|
+
if acceptable_content?(token)
|
22
|
+
disk_service.upload token[:key], request.body, checksum: token[:checksum]
|
23
|
+
else
|
24
|
+
head :unprocessable_entity
|
25
|
+
end
|
26
|
+
else
|
27
|
+
head :not_found
|
28
|
+
end
|
29
|
+
rescue ActiveStorage::IntegrityError
|
30
|
+
head :unprocessable_entity
|
31
|
+
end
|
32
|
+
|
33
|
+
private
|
34
|
+
def disk_service
|
35
|
+
ActiveStorage::Blob.service
|
36
|
+
end
|
37
|
+
|
38
|
+
|
39
|
+
def decode_verified_key
|
40
|
+
ActiveStorage.verifier.verified(params[:encoded_key], purpose: :blob_key)
|
41
|
+
end
|
42
|
+
|
43
|
+
|
44
|
+
def decode_verified_token
|
45
|
+
ActiveStorage.verifier.verified(params[:encoded_token], purpose: :blob_token)
|
46
|
+
end
|
47
|
+
|
48
|
+
def acceptable_content?(token)
|
49
|
+
token[:content_type] == request.content_type && token[:content_length] == request.content_length
|
50
|
+
end
|
51
|
+
end
|
@@ -0,0 +1,12 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
class ActiveStorage::PreviewsController < ActionController::Base
|
4
|
+
def show
|
5
|
+
if blob = ActiveStorage::Blob.find_signed(params[:signed_blob_id])
|
6
|
+
expires_in ActiveStorage::Blob.service.url_expires_in
|
7
|
+
redirect_to ActiveStorage::Preview.new(blob, params[:variation_key]).processed.service_url(disposition: params[:disposition])
|
8
|
+
else
|
9
|
+
head :not_found
|
10
|
+
end
|
11
|
+
end
|
12
|
+
end
|
@@ -0,0 +1,16 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Take a signed permanent reference for a variant and turn it into an expiring service URL for download.
|
4
|
+
# Note: These URLs are publicly accessible. If you need to enforce access protection beyond the
|
5
|
+
# security-through-obscurity factor of the signed blob and variation reference, you'll need to implement your own
|
6
|
+
# authenticated redirection controller.
|
7
|
+
class ActiveStorage::VariantsController < ActionController::Base
|
8
|
+
def show
|
9
|
+
if blob = ActiveStorage::Blob.find_signed(params[:signed_blob_id])
|
10
|
+
expires_in ActiveStorage::Blob.service.url_expires_in
|
11
|
+
redirect_to ActiveStorage::Variant.new(blob, params[:variation_key]).processed.service_url(disposition: params[:disposition])
|
12
|
+
else
|
13
|
+
head :not_found
|
14
|
+
end
|
15
|
+
end
|
16
|
+
end
|
@@ -0,0 +1,54 @@
|
|
1
|
+
import { getMetaValue } from "./helpers"
|
2
|
+
|
3
|
+
export class BlobRecord {
|
4
|
+
constructor(file, checksum, url) {
|
5
|
+
this.file = file
|
6
|
+
|
7
|
+
this.attributes = {
|
8
|
+
filename: file.name,
|
9
|
+
content_type: file.type,
|
10
|
+
byte_size: file.size,
|
11
|
+
checksum: checksum
|
12
|
+
}
|
13
|
+
|
14
|
+
this.xhr = new XMLHttpRequest
|
15
|
+
this.xhr.open("POST", url, true)
|
16
|
+
this.xhr.responseType = "json"
|
17
|
+
this.xhr.setRequestHeader("Content-Type", "application/json")
|
18
|
+
this.xhr.setRequestHeader("Accept", "application/json")
|
19
|
+
this.xhr.setRequestHeader("X-Requested-With", "XMLHttpRequest")
|
20
|
+
this.xhr.setRequestHeader("X-CSRF-Token", getMetaValue("csrf-token"))
|
21
|
+
this.xhr.addEventListener("load", event => this.requestDidLoad(event))
|
22
|
+
this.xhr.addEventListener("error", event => this.requestDidError(event))
|
23
|
+
}
|
24
|
+
|
25
|
+
create(callback) {
|
26
|
+
this.callback = callback
|
27
|
+
this.xhr.send(JSON.stringify({ blob: this.attributes }))
|
28
|
+
}
|
29
|
+
|
30
|
+
requestDidLoad(event) {
|
31
|
+
const { status, response } = this.xhr
|
32
|
+
if (status >= 200 && status < 300) {
|
33
|
+
const { direct_upload } = response
|
34
|
+
delete response.direct_upload
|
35
|
+
this.attributes = response
|
36
|
+
this.directUploadData = direct_upload
|
37
|
+
this.callback(null, this.toJSON())
|
38
|
+
} else {
|
39
|
+
this.requestDidError(event)
|
40
|
+
}
|
41
|
+
}
|
42
|
+
|
43
|
+
requestDidError(event) {
|
44
|
+
this.callback(`Error creating Blob for "${this.file.name}". Status: ${this.xhr.status}`)
|
45
|
+
}
|
46
|
+
|
47
|
+
toJSON() {
|
48
|
+
const result = {}
|
49
|
+
for (const key in this.attributes) {
|
50
|
+
result[key] = this.attributes[key]
|
51
|
+
}
|
52
|
+
return result
|
53
|
+
}
|
54
|
+
}
|
@@ -0,0 +1,35 @@
|
|
1
|
+
export class BlobUpload {
|
2
|
+
constructor(blob) {
|
3
|
+
this.blob = blob
|
4
|
+
this.file = blob.file
|
5
|
+
|
6
|
+
const { url, headers } = blob.directUploadData
|
7
|
+
|
8
|
+
this.xhr = new XMLHttpRequest
|
9
|
+
this.xhr.open("PUT", url, true)
|
10
|
+
this.xhr.responseType = "text"
|
11
|
+
for (const key in headers) {
|
12
|
+
this.xhr.setRequestHeader(key, headers[key])
|
13
|
+
}
|
14
|
+
this.xhr.addEventListener("load", event => this.requestDidLoad(event))
|
15
|
+
this.xhr.addEventListener("error", event => this.requestDidError(event))
|
16
|
+
}
|
17
|
+
|
18
|
+
create(callback) {
|
19
|
+
this.callback = callback
|
20
|
+
this.xhr.send(this.file)
|
21
|
+
}
|
22
|
+
|
23
|
+
requestDidLoad(event) {
|
24
|
+
const { status, response } = this.xhr
|
25
|
+
if (status >= 200 && status < 300) {
|
26
|
+
this.callback(null, response)
|
27
|
+
} else {
|
28
|
+
this.requestDidError(event)
|
29
|
+
}
|
30
|
+
}
|
31
|
+
|
32
|
+
requestDidError(event) {
|
33
|
+
this.callback(`Error storing "${this.file.name}". Status: ${this.xhr.status}`)
|
34
|
+
}
|
35
|
+
}
|
@@ -0,0 +1,42 @@
|
|
1
|
+
import { FileChecksum } from "./file_checksum"
|
2
|
+
import { BlobRecord } from "./blob_record"
|
3
|
+
import { BlobUpload } from "./blob_upload"
|
4
|
+
|
5
|
+
let id = 0
|
6
|
+
|
7
|
+
export class DirectUpload {
|
8
|
+
constructor(file, url, delegate) {
|
9
|
+
this.id = ++id
|
10
|
+
this.file = file
|
11
|
+
this.url = url
|
12
|
+
this.delegate = delegate
|
13
|
+
}
|
14
|
+
|
15
|
+
create(callback) {
|
16
|
+
FileChecksum.create(this.file, (error, checksum) => {
|
17
|
+
const blob = new BlobRecord(this.file, checksum, this.url)
|
18
|
+
notify(this.delegate, "directUploadWillCreateBlobWithXHR", blob.xhr)
|
19
|
+
blob.create(error => {
|
20
|
+
if (error) {
|
21
|
+
callback(error)
|
22
|
+
} else {
|
23
|
+
const upload = new BlobUpload(blob)
|
24
|
+
notify(this.delegate, "directUploadWillStoreFileWithXHR", upload.xhr)
|
25
|
+
upload.create(error => {
|
26
|
+
if (error) {
|
27
|
+
callback(error)
|
28
|
+
} else {
|
29
|
+
callback(null, blob.toJSON())
|
30
|
+
}
|
31
|
+
})
|
32
|
+
}
|
33
|
+
})
|
34
|
+
})
|
35
|
+
}
|
36
|
+
}
|
37
|
+
|
38
|
+
function notify(object, methodName, ...messages) {
|
39
|
+
if (object && typeof object[methodName] == "function") {
|
40
|
+
return object[methodName](...messages)
|
41
|
+
}
|
42
|
+
}
|