TUS 1.0.0 resumable upload server - ASGI middleware with filesystem storage
Project description
tussi
A TUS 1.0.0 resumable upload server for Python. ASGI-native, filesystem storage, no framework lock-in.
Linux only. Tussi uses posix_fallocate for pre-allocation and fcntl.flock for safe worker coordination.
Install
pip install tussi
Core dependencies (anyio, pydantic, starlette) are installed automatically. Optional extras:
| Extra | Installs | When you need it |
|---|---|---|
tussi[cli] |
fastapi, rich, uvicorn, requests |
tussi-server and tussi-upload CLI tools |
tussi[test] |
pytest, httpx, anyio[trio] |
Running the test suite |
Quick start
from pathlib import Path
from tussi import TUSApp, FilesystemStorage
tus = TUSApp(
storage=FilesystemStorage(directory=Path('./uploads')),
completed_dir=Path('./completed'),
)
tus is a standard ASGI callable. Run it with any ASGI server:
uvicorn myapp:tus
FastAPI integration
tussi does not require FastAPI, but integrates cleanly via get_response:
from pathlib import Path
from fastapi import FastAPI, Request
from starlette.responses import Response
from tussi import TUSApp, FilesystemStorage
tus = TUSApp(
storage=FilesystemStorage(directory=Path('./uploads')),
completed_dir=Path('./completed'),
)
app = FastAPI()
@app.api_route(
'/files/{path:path}',
methods=['HEAD', 'PATCH', 'POST', 'OPTIONS'],
include_in_schema=False,
)
async def tus_handler(request: Request) -> Response:
return await tus.get_response(request.scope, request.receive)
See tussi/_demo_server.py for a full example including auth dependency, lifespan worker, and janitor.
Processing completed uploads
wait_for_file is an async context manager that blocks until a completed upload
is available, claims it with an exclusive lock, and cleans up on exit. Safe to
call from multiple concurrent workers, because each worker claims exactly one file.
# tus = TUSApp(...) - from "Quick start" above
async with tus.wait_for_file(timeout=3600) as upload:
filename = upload.meta.get('filename', upload.name)
upload.save(Path('./dest') / filename)
upload.save_meta(Path('./dest') / f'{filename}.meta')
Raises TimeoutError if no upload is available within timeout seconds.
Metadata
Clients pass metadata via the Upload-Metadata header as a comma-separated list of
key base64(value) pairs per the TUS spec. Tussi decodes this into a dict[str, str]
available as upload.meta inside wait_for_file.
Constraints:
- Keys must match
[a-zA-Z0-9_-]+(one or more characters). Pairs with invalid keys are silently ignored - The total header size is limited by
max_metadata_size(default4096bytes) - The
filenamekey, if present, must contain only printable ASCII (0x20-0x7E), otherwise the upload is rejected with400 Bad Request
How you use the metadata afterwards is up to your application. The snippet above uses
filename as the destination filename.
Tussi never uses filename for storage. Uploads are always stored under a UUID. Therefore path traversal via metadata is not possible.
Event hooks
Pass on_event to react to upload lifecycle events:
from tussi import TUSApp, TUSEvent, UploadCompletedEvent
async def on_event(event: TUSEvent) -> None:
if isinstance(event, UploadCompletedEvent):
print(f'upload complete: {event.upload_info.upload_id}')
tus = TUSApp(
storage=FilesystemStorage(directory=Path('./uploads')),
completed_dir=Path('./completed'),
on_event=on_event,
)
Available events: UploadCreatedEvent, UploadProgressEvent,
UploadCompletedEvent, UploadFailedEvent.
Security
Tussi has no built-in authentication. Protect the upload endpoint by placing auth in front of it either as ASGI middleware wrapping the whole app, or as a FastAPI dependency on the route:
async def require_auth(request: Request) -> None:
if request.headers.get('Authorization') != f'Bearer {SECRET}':
raise HTTPException(status_code=401)
@app.api_route('/files/{path:path}', ..., dependencies=[Depends(require_auth)])
async def tus_handler(request: Request) -> Response:
return await tus.get_response(request.scope, request.receive)
Other considerations:
- Set
max_sizeandmax_chunk_sizeto prevent clients from uploading arbitrarily large files - Uploads are stored under UUIDs, never under the client-supplied
filename. Path traversal via metadata is not possible - The uploads and completed directories should not be served as static files
Configuration
| Parameter | Default | Description | Type |
|---|---|---|---|
storage |
required | Storage instance (e.g. FilesystemStorage) |
tussi.storage.Storage |
completed_dir |
required | Directory for finalized uploads | pathlib.Path | str |
on_event |
None |
Async callback for lifecycle events | Callable[[TUSEvent], Awaitable[None]] | None |
max_size |
None |
Max upload size in bytes | int | None |
max_chunk_size |
10485760 |
Max PATCH body size in bytes | int | None |
max_metadata_size |
4096 |
Max Upload-Metadata header size in bytes |
int |
FilesystemStorage
| Parameter | Default | Description | Type |
|---|---|---|---|
directory |
required | Upload staging directory | pathlib.Path | str |
directory_mode |
0o755 |
Mode for directory creation | int |
fsync |
True |
fsync data to disk before updating offset in meta file. Disable for higher throughput at the cost of durability |
bool |
Storage layout
uploads/ # Storage directory for in-progress uploads
{uuid} # pre-allocated buffer file (posix_fallocate)
{uuid}.meta # upload metadata (JSON)
completed/ # completed_dir for finalized uploads
{uuid} # completed file (moved atomically from uploads/)
{uuid}.meta # upload metadata (JSON)
Demo server
The tussi-server command starts an interactive server with prompts for upload and destination directories. It can be used for testing.
The optional dependency
cliis required in order for thetussi-servercommand to be registered.
pip install 'tussi[cli]'
tussi-server
Demo upload
The tussi-upload tool provides a CLI for uploading a file to a TUS 1.0.0 instance. Call it with --help for additional params e.g. a file to upload. If no file is submitted, it just creates some random data, stores it in a temp file and uploads it then.
The optional dependency
cliis required in order for thetussi-uploadcommand to be registered.
pip install 'tussi[cli]'
tussi-upload
Protocol
Implements TUS 1.0.0 core + creation extension.
| Method | Path | Description |
|---|---|---|
| OPTIONS | /files/ |
Server capabilities |
| POST | /files/ |
Create upload |
| HEAD | /files/{id} |
Query offset |
| PATCH | /files/{id} |
Send chunk |
Release
# 1. bump version in pyproject.toml
# 2. commit and tag
git commit -am 'bump version to 0.x.y'
git tag v0.x.y
git push && git push --tags
# CI runs tests, builds, and publishes to PyPI automatically
License
MIT
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file tussi-0.1.0.tar.gz.
File metadata
- Download URL: tussi-0.1.0.tar.gz
- Upload date:
- Size: 27.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
51f2fbf07ac2490195d17299401b22707e9e6d085e900f57f340299c9f821c9e
|
|
| MD5 |
d96e6193b09dd233f9e03a84bcb44062
|
|
| BLAKE2b-256 |
6517e40cadd87935e8aaa914d61a823fc5ff83809dae68c56ce1549b5a1e492d
|
Provenance
The following attestation bundles were made for tussi-0.1.0.tar.gz:
Publisher:
publish.yml on bartscherer/tussi
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
tussi-0.1.0.tar.gz -
Subject digest:
51f2fbf07ac2490195d17299401b22707e9e6d085e900f57f340299c9f821c9e - Sigstore transparency entry: 1536632618
- Sigstore integration time:
-
Permalink:
bartscherer/tussi@d4aa3ddd804b39faf94b22f86220c1e5f001f4c7 -
Branch / Tag:
refs/tags/v0.1.0 - Owner: https://github.com/bartscherer
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@d4aa3ddd804b39faf94b22f86220c1e5f001f4c7 -
Trigger Event:
push
-
Statement type:
File details
Details for the file tussi-0.1.0-py3-none-any.whl.
File metadata
- Download URL: tussi-0.1.0-py3-none-any.whl
- Upload date:
- Size: 24.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
5914bf920c44e6fabb302a7f3363c3ec6bf58b385d61734529efd9d6d2683272
|
|
| MD5 |
b4b101f8a4f3dab8cb4359405ef84bd5
|
|
| BLAKE2b-256 |
0241142c9d2e7ffe9881ceed0cf67bd25725e5e648292e0986efc38df9c79a80
|
Provenance
The following attestation bundles were made for tussi-0.1.0-py3-none-any.whl:
Publisher:
publish.yml on bartscherer/tussi
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
tussi-0.1.0-py3-none-any.whl -
Subject digest:
5914bf920c44e6fabb302a7f3363c3ec6bf58b385d61734529efd9d6d2683272 - Sigstore transparency entry: 1536632710
- Sigstore integration time:
-
Permalink:
bartscherer/tussi@d4aa3ddd804b39faf94b22f86220c1e5f001f4c7 -
Branch / Tag:
refs/tags/v0.1.0 - Owner: https://github.com/bartscherer
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@d4aa3ddd804b39faf94b22f86220c1e5f001f4c7 -
Trigger Event:
push
-
Statement type: