doco
This commit is contained in:
parent
4415ed7820
commit
5c98d5eaae
@ -15,6 +15,24 @@ class RedInode implements DAV\INode {
|
|||||||
function delete() {
|
function delete() {
|
||||||
if(! perm_is_allowed($this->channel_id,'','view_storage'))
|
if(! perm_is_allowed($this->channel_id,'','view_storage'))
|
||||||
return;
|
return;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Since I don't believe this is documented elsewhere -
|
||||||
|
* ATTACH_FLAG_OS means that the file contents are stored in the OS
|
||||||
|
* rather than in the DB - as is the case for attachments.
|
||||||
|
* Exactly how they are stored (what path and filename) are still
|
||||||
|
* TBD. We will probably not be using the original filename but
|
||||||
|
* instead the attachment 'hash' as this will prevent folks from
|
||||||
|
* uploading PHP code onto misconfigured servers and executing it.
|
||||||
|
* It's easy to misconfigure servers because we can provide a
|
||||||
|
* rule for Apache, but folks using nginx will then be susceptible.
|
||||||
|
* Then there are those who don't understand these kinds of exploits
|
||||||
|
* and don't have any idea allowing uploaded PHP files to be executed
|
||||||
|
* by the server could be a problem. We also don't have any idea what
|
||||||
|
* executable types are served on their system - like .py, .pyc, .pl, .sh
|
||||||
|
* .cgi, .exe, .bat, .net, whatever.
|
||||||
|
*/
|
||||||
|
|
||||||
if($this->attach['flags'] & ATTACH_FLAG_OS) {
|
if($this->attach['flags'] & ATTACH_FLAG_OS) {
|
||||||
// FIXME delete physical file
|
// FIXME delete physical file
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user