Private media for Django. Check the user's authorization before serving files at PRIVATE_MEDIA_URL, uploaded to PRIVATE_MEDIA_ROOT.
Project description
=====
django-private-media
=====
Overview
--------
By default, Django lets you specify a MEDIA_ROOT where your user (or admin)-uploaded media is placed. It is accessible to all at the MEDIA_URL.
Using django-private-media, you can also specify a PRIVATE_MEDIA_ROOT and PRIVATE_MEDIA_URL. Private files or images are uploaded using the provided PrivateMediaStorage() storage class. They are served by a view which checks the user's authorization before serving them.
Currently there are only two options for serving them, a default server useful for development, and Apache's XSendFile. Setting up XSendFile at Webfaction (for example) is covered `here <http://community.webfaction.com/questions/12205/serving-static-files-with-django-using-xsendfile>`_. By adapting code from Stephan Foulis's django-filer it would be easy to add an nginx server.
Motivation
----------
I have long wanted the capability for user uploads to be private, but couldn't find a guide to set it up. When I looked into django-filer's approach to secure file downloads I finally understood how it could be done; however, I have an existing project and do not want to adopt the full functionality of django-filer.
I also wanted to be able to apply it to existing projects without any data migrations; with it, you only need to make sure your media files are relocated from the MEDIA_ROOT to the PRIVATE_MEDIA_ROOT.
Attribution
-----------
Key parts of this code are based on code by Stephan Foulis and contributors from
`django-filer <https://github.com/stefanfoulis/django-filer>`_.
Caveats
-------
Although it works satisfactorily for my purposes so far, this is not a finished project. In particular, it does not have any tests. Yet.
Requirements
--------------
Django 1.4 or later.
Quick start
-----------
To upload to a private location, add to your `settings.py` e.g.::
PRIVATE_MEDIA_URL = '/private/'
if DEBUG:
# dev
import os
PROJECT_PATH = os.path.abspath(os.path.dirname(__file__))
PRIVATE_MEDIA_ROOT = os.path.join(PROJECT_PATH, 'private')
PRIVATE_MEDIA_SERVER = 'private_media.servers.DefaultServer'
else:
# prod
PRIVATE_MEDIA_ROOT = '/home/user/my/path/to/private/media'
PRIVATE_MEDIA_SERVER = 'private_media.servers.ApacheXSendfileServer'
#PRIVATE_MEDIA_SERVER_OPTIONS = {'arg1': 1, ...} # (optional) kwargs to init server
The default permissioning is for authenticated staff members to see all, and no one else.
To generalise this, also add::
PRIVATE_MEDIA_PERMISSIONS = 'myapp.permissions.MyPermissionClass'
PRIVATE_MEDIA_PERMISSIONS_OPTIONS = {'arg1': 1, ...} # (optional) kwargs to init
This permissions class must have the method::
has_read_permission(self, request, path)
which returns True or False.
Add to your `INSTALLED_APPS`::
INSTALLED_APPS = {
...
'private_media',
...
}
Add to `urls.py`::
...
url(r'^', include('private_media.urls')),
In your `models.py`, to upload a specific file or image to a private area, use::
from django.db import models
from private_media.storages import PrivateMediaStorage
class Car(models.Model):
photo = models.ImageField(storage=PrivateMediaStorage())
Because the only information about the file available to the permissions method
is its path, you will need to encode the allowed permissioning into the path on upload.
E.g. you could use this to save the owner's primary key into the path::
import os
from django.db import models
from django.contrib.auth.models import User
from private_media.storages import PrivateMediaStorage
def owner_file_name(instance, filename):
return os.path.join('cars', "{0}".format(instance.user.pk), filename)
class Car(models.Model):
owner = models.ForeignKey(User)
photo = models.ImageField(storage=PrivateMediaStorage(), upload_to=owner_file_name)
And then provide a permissioning class like this (which lets staff and the owner see it)::
import os
from django.http import Http404
class OwnerPkPermissions(object):
def has_read_permission(self, request, path):
user = request.user
if not user.is_authenticated():
return False
elif user.is_superuser:
return True
elif user.is_staff:
return True
else:
try:
owner_pk = int(os.path.split(os.path.split(z)[0])[1])
except ValueError:
raise Http404('File not found')
return (user.pk==owner_pk)
Caveat - I have not tested this yet, and exposing users' primary keys is potentially insecure.
Detailed documentation is in the "docs" directory (pending).
django-private-media
=====
Overview
--------
By default, Django lets you specify a MEDIA_ROOT where your user (or admin)-uploaded media is placed. It is accessible to all at the MEDIA_URL.
Using django-private-media, you can also specify a PRIVATE_MEDIA_ROOT and PRIVATE_MEDIA_URL. Private files or images are uploaded using the provided PrivateMediaStorage() storage class. They are served by a view which checks the user's authorization before serving them.
Currently there are only two options for serving them, a default server useful for development, and Apache's XSendFile. Setting up XSendFile at Webfaction (for example) is covered `here <http://community.webfaction.com/questions/12205/serving-static-files-with-django-using-xsendfile>`_. By adapting code from Stephan Foulis's django-filer it would be easy to add an nginx server.
Motivation
----------
I have long wanted the capability for user uploads to be private, but couldn't find a guide to set it up. When I looked into django-filer's approach to secure file downloads I finally understood how it could be done; however, I have an existing project and do not want to adopt the full functionality of django-filer.
I also wanted to be able to apply it to existing projects without any data migrations; with it, you only need to make sure your media files are relocated from the MEDIA_ROOT to the PRIVATE_MEDIA_ROOT.
Attribution
-----------
Key parts of this code are based on code by Stephan Foulis and contributors from
`django-filer <https://github.com/stefanfoulis/django-filer>`_.
Caveats
-------
Although it works satisfactorily for my purposes so far, this is not a finished project. In particular, it does not have any tests. Yet.
Requirements
--------------
Django 1.4 or later.
Quick start
-----------
To upload to a private location, add to your `settings.py` e.g.::
PRIVATE_MEDIA_URL = '/private/'
if DEBUG:
# dev
import os
PROJECT_PATH = os.path.abspath(os.path.dirname(__file__))
PRIVATE_MEDIA_ROOT = os.path.join(PROJECT_PATH, 'private')
PRIVATE_MEDIA_SERVER = 'private_media.servers.DefaultServer'
else:
# prod
PRIVATE_MEDIA_ROOT = '/home/user/my/path/to/private/media'
PRIVATE_MEDIA_SERVER = 'private_media.servers.ApacheXSendfileServer'
#PRIVATE_MEDIA_SERVER_OPTIONS = {'arg1': 1, ...} # (optional) kwargs to init server
The default permissioning is for authenticated staff members to see all, and no one else.
To generalise this, also add::
PRIVATE_MEDIA_PERMISSIONS = 'myapp.permissions.MyPermissionClass'
PRIVATE_MEDIA_PERMISSIONS_OPTIONS = {'arg1': 1, ...} # (optional) kwargs to init
This permissions class must have the method::
has_read_permission(self, request, path)
which returns True or False.
Add to your `INSTALLED_APPS`::
INSTALLED_APPS = {
...
'private_media',
...
}
Add to `urls.py`::
...
url(r'^', include('private_media.urls')),
In your `models.py`, to upload a specific file or image to a private area, use::
from django.db import models
from private_media.storages import PrivateMediaStorage
class Car(models.Model):
photo = models.ImageField(storage=PrivateMediaStorage())
Because the only information about the file available to the permissions method
is its path, you will need to encode the allowed permissioning into the path on upload.
E.g. you could use this to save the owner's primary key into the path::
import os
from django.db import models
from django.contrib.auth.models import User
from private_media.storages import PrivateMediaStorage
def owner_file_name(instance, filename):
return os.path.join('cars', "{0}".format(instance.user.pk), filename)
class Car(models.Model):
owner = models.ForeignKey(User)
photo = models.ImageField(storage=PrivateMediaStorage(), upload_to=owner_file_name)
And then provide a permissioning class like this (which lets staff and the owner see it)::
import os
from django.http import Http404
class OwnerPkPermissions(object):
def has_read_permission(self, request, path):
user = request.user
if not user.is_authenticated():
return False
elif user.is_superuser:
return True
elif user.is_staff:
return True
else:
try:
owner_pk = int(os.path.split(os.path.split(z)[0])[1])
except ValueError:
raise Http404('File not found')
return (user.pk==owner_pk)
Caveat - I have not tested this yet, and exposing users' primary keys is potentially insecure.
Detailed documentation is in the "docs" directory (pending).
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Close
Hashes for django-private-media-0.1.0.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | ec6011da505bdd27015ac86f44365682ef23769fbec2dd2a1d77eeb2283946a2 |
|
MD5 | 113b2eac224bae2be27f568cd3f3e8d3 |
|
BLAKE2b-256 | 9c27649fa846f0fae5bf22c9e2b780abce2d85a0d30386b55dda8bed0c288787 |
Close
Hashes for django-private-media-0.1.0.macosx-10.7-intel.exe
Algorithm | Hash digest | |
---|---|---|
SHA256 | 46a4879a7af25f371c50778677a5cac692b309d845ba3afd0609e304453fa13d |
|
MD5 | 4b789e3673cc0468c960ead7f003f0d6 |
|
BLAKE2b-256 | 42dbe1fd8e35cb5c4e50fcb26ae353670a775ba5615beca3a7591c6701cea7a6 |