From 91815ad7093a00384e50978494249da5a5e18c63 Mon Sep 17 00:00:00 2001 From: Paul Chavard Date: Wed, 10 Jul 2019 19:04:10 +0200 Subject: [PATCH] Upload through proxy --- .../service/ds_proxy_service.rb | 32 ++++++++++++++++++- 1 file changed, 31 insertions(+), 1 deletion(-) diff --git a/app/lib/active_storage/service/ds_proxy_service.rb b/app/lib/active_storage/service/ds_proxy_service.rb index fe540d591..bb516d287 100644 --- a/app/lib/active_storage/service/ds_proxy_service.rb +++ b/app/lib/active_storage/service/ds_proxy_service.rb @@ -1,6 +1,7 @@ module ActiveStorage # Wraps an ActiveStorage::Service to route direct upload and direct download URLs through our proxy, - # thus avoiding exposing the storage provider’s URL to our end-users. + # thus avoiding exposing the storage provider’s URL to our end-users. It also overrides upload and + # object_for methods to fetch and put blobs through encryption proxy. class Service::DsProxyService < SimpleDelegator attr_reader :wrapped @@ -23,8 +24,37 @@ module ActiveStorage publicize(url) end + # This method is responsible for writing to object storage. We directly use direct upload + # url to ensure we upload through encryption proxy. + def upload(key, io, checksum: nil, **) + wrapped.send(:instrument, :upload, key: key, checksum: checksum) do + url = url_for_direct_upload(key, expires_in: 1.hour) + data = Fog::Storage.parse_data(io) + + headers = { 'Content-Type' => wrapped.send(:guess_content_type, io) }.merge(data[:headers]) + if checksum + headers['ETag'] = wrapped.send(:convert_base64digest_to_hexdigest, checksum) + end + + response = Typhoeus::Request.new( + url, + method: :put, + body: data[:body].read, + headers: headers + ).run + + if response.success? + response + else + raise ActiveStorage::IntegrityError + end + end + end + private + # This method is responsible for reading from object storage. We use url method + # on the service to ensure we download through encryption proxy. def object_for(key, &block) blob_url = url(key) if block_given?