mirror of
https://we.phorge.it/source/phorge.git
synced 2024-11-24 07:42:40 +01:00
f9836cb646
Summary: Ref T10262. Files have an internal secret key which is partially used to control access to them, and determines part of the URL you need to access them. Scramble (regenerate) the secret when: - the view policy for the file itself changes (and the new policy is not "public" or "all users"); or - the view policy or space for an object the file is attached to changes (and the file policy is not "public" or "all users"). This basically means that when you change the visibility of a task, any old URLs for attached files stop working and new ones are implicitly generated. Test Plan: - Attached a file to a task, used `SELECT * FROM file WHERE id = ...` to inspect the secret. - Set view policy to public, same secret. - Set view policy to me, new secret. - Changed task view policy, new secret. - Changed task space, new secret. - Changed task title, same old secret. - Added and ran unit tests which cover this behavior. Reviewers: chad Reviewed By: chad Maniphest Tasks: T10262 Differential Revision: https://secure.phabricator.com/D15641 |
||
---|---|---|
.. | ||
action | ||
application | ||
applicationpanel | ||
builtin | ||
capability | ||
conduit | ||
config | ||
controller | ||
edge | ||
editor | ||
engine | ||
exception | ||
garbagecollector | ||
iconset | ||
lipsum | ||
management | ||
markup | ||
phid | ||
query | ||
storage | ||
temporarytoken | ||
transform | ||
uploadsource | ||
view | ||
PhabricatorImageTransformer.php |