geforkt von mirrored/vaultwarden
Remove patched multer-rs
Dieser Commit ist enthalten in:
Ursprung
5964dc95f0
Commit
7c739dd58e
4 geänderte Dateien mit 2 neuen und 46 gelöschten Zeilen
3
Cargo.lock
generiert
3
Cargo.lock
generiert
|
@ -1516,7 +1516,8 @@ dependencies = [
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "multer"
|
name = "multer"
|
||||||
version = "2.0.4"
|
version = "2.0.4"
|
||||||
source = "git+https://github.com/BlackDex/multer-rs?rev=477d16b7fa0f361b5c2a5ba18a5b28bec6d26a8a#477d16b7fa0f361b5c2a5ba18a5b28bec6d26a8a"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "6ed4198ce7a4cbd2a57af78d28c6fbb57d81ac5f1d6ad79ac6c5587419cbdf22"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"bytes",
|
"bytes",
|
||||||
"encoding_rs",
|
"encoding_rs",
|
||||||
|
|
|
@ -152,12 +152,6 @@ semver = "1.0.14"
|
||||||
# Mainly used for the musl builds, since the default musl malloc is very slow
|
# Mainly used for the musl builds, since the default musl malloc is very slow
|
||||||
mimalloc = { version = "0.1.32", features = ["secure"], default-features = false, optional = true }
|
mimalloc = { version = "0.1.32", features = ["secure"], default-features = false, optional = true }
|
||||||
|
|
||||||
[patch.crates-io]
|
|
||||||
# Using a patched version of multer-rs (Used by Rocket) to fix attachment/send file uploads
|
|
||||||
# Issue: https://github.com/dani-garcia/vaultwarden/issues/2644
|
|
||||||
# Patch: https://github.com/BlackDex/multer-rs/commit/477d16b7fa0f361b5c2a5ba18a5b28bec6d26a8a
|
|
||||||
multer = { git = "https://github.com/BlackDex/multer-rs", rev = "477d16b7fa0f361b5c2a5ba18a5b28bec6d26a8a" }
|
|
||||||
|
|
||||||
# Strip debuginfo from the release builds
|
# Strip debuginfo from the release builds
|
||||||
# Also enable thin LTO for some optimizations
|
# Also enable thin LTO for some optimizations
|
||||||
[profile.release]
|
[profile.release]
|
||||||
|
|
|
@ -999,19 +999,6 @@ async fn save_attachment(
|
||||||
|
|
||||||
let mut data = data.into_inner();
|
let mut data = data.into_inner();
|
||||||
|
|
||||||
// There is a bug regarding uploading attachments/sends using the Mobile clients
|
|
||||||
// See: https://github.com/dani-garcia/vaultwarden/issues/2644 && https://github.com/bitwarden/mobile/issues/2018
|
|
||||||
// This has been fixed via a PR: https://github.com/bitwarden/mobile/pull/2031, but hasn't landed in a new release yet.
|
|
||||||
// On the vaultwarden side this is temporarily fixed by using a custom multer library
|
|
||||||
// See: https://github.com/dani-garcia/vaultwarden/pull/2675
|
|
||||||
// In any case we will match TempFile::File and not TempFile::Buffered, since Buffered will alter the contents.
|
|
||||||
if let TempFile::Buffered {
|
|
||||||
content: _,
|
|
||||||
} = &data.data
|
|
||||||
{
|
|
||||||
err!("Error reading attachment data. Please try an other client.");
|
|
||||||
}
|
|
||||||
|
|
||||||
if let Some(size_limit) = size_limit {
|
if let Some(size_limit) = size_limit {
|
||||||
if data.data.len() > size_limit {
|
if data.data.len() > size_limit {
|
||||||
err!("Attachment storage limit exceeded with this file");
|
err!("Attachment storage limit exceeded with this file");
|
||||||
|
|
|
@ -228,19 +228,6 @@ async fn post_send_file(data: Form<UploadData<'_>>, headers: Headers, mut conn:
|
||||||
err!("Send content is not a file");
|
err!("Send content is not a file");
|
||||||
}
|
}
|
||||||
|
|
||||||
// There is a bug regarding uploading attachments/sends using the Mobile clients
|
|
||||||
// See: https://github.com/dani-garcia/vaultwarden/issues/2644 && https://github.com/bitwarden/mobile/issues/2018
|
|
||||||
// This has been fixed via a PR: https://github.com/bitwarden/mobile/pull/2031, but hasn't landed in a new release yet.
|
|
||||||
// On the vaultwarden side this is temporarily fixed by using a custom multer library
|
|
||||||
// See: https://github.com/dani-garcia/vaultwarden/pull/2675
|
|
||||||
// In any case we will match TempFile::File and not TempFile::Buffered, since Buffered will alter the contents.
|
|
||||||
if let TempFile::Buffered {
|
|
||||||
content: _,
|
|
||||||
} = &data
|
|
||||||
{
|
|
||||||
err!("Error reading send file data. Please try an other client.");
|
|
||||||
}
|
|
||||||
|
|
||||||
let size = data.len();
|
let size = data.len();
|
||||||
if size > size_limit {
|
if size > size_limit {
|
||||||
err!("Attachment storage limit exceeded with this file");
|
err!("Attachment storage limit exceeded with this file");
|
||||||
|
@ -339,19 +326,6 @@ async fn post_send_file_v2_data(
|
||||||
|
|
||||||
let mut data = data.into_inner();
|
let mut data = data.into_inner();
|
||||||
|
|
||||||
// There is a bug regarding uploading attachments/sends using the Mobile clients
|
|
||||||
// See: https://github.com/dani-garcia/vaultwarden/issues/2644 && https://github.com/bitwarden/mobile/issues/2018
|
|
||||||
// This has been fixed via a PR: https://github.com/bitwarden/mobile/pull/2031, but hasn't landed in a new release yet.
|
|
||||||
// On the vaultwarden side this is temporarily fixed by using a custom multer library
|
|
||||||
// See: https://github.com/dani-garcia/vaultwarden/pull/2675
|
|
||||||
// In any case we will match TempFile::File and not TempFile::Buffered, since Buffered will alter the contents.
|
|
||||||
if let TempFile::Buffered {
|
|
||||||
content: _,
|
|
||||||
} = &data.data
|
|
||||||
{
|
|
||||||
err!("Error reading attachment data. Please try an other client.");
|
|
||||||
}
|
|
||||||
|
|
||||||
if let Some(send) = Send::find_by_uuid(&send_uuid, &mut conn).await {
|
if let Some(send) = Send::find_by_uuid(&send_uuid, &mut conn).await {
|
||||||
let folder_path = tokio::fs::canonicalize(&CONFIG.sends_folder()).await?.join(&send_uuid);
|
let folder_path = tokio::fs::canonicalize(&CONFIG.sends_folder()).await?.join(&send_uuid);
|
||||||
let file_path = folder_path.join(&file_id);
|
let file_path = folder_path.join(&file_id);
|
||||||
|
|
Laden …
In neuem Issue referenzieren