Compare commits
16 Commits
v0.1
...
feature-is
Author | SHA1 | Date | |
---|---|---|---|
0b22731076
|
|||
9f2c7c2b88
|
|||
3fcdaa2b10
|
|||
4309225185
|
|||
065296f84a
|
|||
841bb513d3
|
|||
f0bb30a747 | |||
7fce3f57e9 | |||
a587040809 | |||
8a95dbb0fa | |||
a5a22b7c88
|
|||
7ccaafc6c6
|
|||
797bebb1a1
|
|||
08f9e13da0 | |||
3d1304b3b0 | |||
4b624f3fed
|
3
.gitignore
vendored
3
.gitignore
vendored
@ -132,3 +132,6 @@ dmypy.json
|
|||||||
uploadkeys
|
uploadkeys
|
||||||
savelog.log
|
savelog.log
|
||||||
uwsgi.log
|
uwsgi.log
|
||||||
|
settings.py
|
||||||
|
functions.py
|
||||||
|
secret.key
|
||||||
|
26
README.md
26
README.md
@ -1,4 +1,26 @@
|
|||||||
# imgupload
|
# imgupload
|
||||||
Python Flask uWSGI application to receive and save images over POST requests.
|
     
|
||||||
|
|
||||||
This project is still in development. Use at your own risk!
|
### What is imgupload?
|
||||||
|
imgupload is a Flask + uWSGI application to serve as an all-purpose image/file uploader over POST requests.
|
||||||
|
|
||||||
|
### Installation
|
||||||
|
1. Clone the repository: `git clone https://github.com/BBaoVanC/imgupload.git`
|
||||||
|
2. Enter the imgupload directory: `cd imgupload`
|
||||||
|
3. Create a virtualenv: `python3 -m venv env`
|
||||||
|
4. Enter the virtualenv: `source env/bin/activate`
|
||||||
|
5. Install dependencies: `python3 -m pip install -r requirements.txt`
|
||||||
|
6. Run the Flask app
|
||||||
|
|
||||||
|
## Running the Flask app
|
||||||
|
### Using uWSGI
|
||||||
|
[https://uwsgi-docs.readthedocs.io/en/latest/Configuration.html](https://uwsgi-docs.readthedocs.io/en/latest/Configuration.html)
|
||||||
|
|
||||||
|
Instructions specific to imgupload are coming soon
|
||||||
|
|
||||||
|
### Using Flask development server
|
||||||
|
```shell
|
||||||
|
$ source env/bin/activate # if you haven't already entered the virtualenv
|
||||||
|
$ export FLASK_APP=imgupload.py
|
||||||
|
$ flask run
|
||||||
|
```
|
||||||
|
@ -9,8 +9,8 @@ defaults = {
|
|||||||
"ROOTURL": "https://img.bbaovanc.com/",
|
"ROOTURL": "https://img.bbaovanc.com/",
|
||||||
"SAVELOG": "savelog.log",
|
"SAVELOG": "savelog.log",
|
||||||
"SAVELOG_CHMOD": "0o644",
|
"SAVELOG_CHMOD": "0o644",
|
||||||
"UPLOADKEYS_CHMOD": "0o400",
|
|
||||||
"SAVELOG_KEYPREFIX": 4,
|
"SAVELOG_KEYPREFIX": 4,
|
||||||
|
"ENCKEY_PATH": "secret.key"
|
||||||
}
|
}
|
||||||
|
|
||||||
deftypes = {
|
deftypes = {
|
||||||
@ -19,8 +19,8 @@ deftypes = {
|
|||||||
"ROOTURL": str,
|
"ROOTURL": str,
|
||||||
"SAVELOG": str,
|
"SAVELOG": str,
|
||||||
"SAVELOG_CHMOD": int,
|
"SAVELOG_CHMOD": int,
|
||||||
"UPLOADKEYS_CHMOD": int,
|
|
||||||
"SAVELOG_KEYPREFIX": int,
|
"SAVELOG_KEYPREFIX": int,
|
||||||
|
"ENCKEY_PATH": str,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@ -94,6 +94,16 @@ if "ROOTURL" in checksettings:
|
|||||||
print("[" + u"\u2713" + "] ROOTURL is good!")
|
print("[" + u"\u2713" + "] ROOTURL is good!")
|
||||||
|
|
||||||
|
|
||||||
|
# Check if ENCKEY_PATH exists
|
||||||
|
enckey_exists = True
|
||||||
|
if "ENCKEY_PATH" in checksettings:
|
||||||
|
if not os.path.isfile(settings.ENCKEY_PATH):
|
||||||
|
enckey_exists = False
|
||||||
|
print("[!] The path set in ENCKEY_PATH ('{0}') doesn't exist!".format(settings.ENCKEY_PATH))
|
||||||
|
else:
|
||||||
|
print("[" + u"\u2713" + "] ENCKEY_PATH exists!")
|
||||||
|
|
||||||
|
|
||||||
# Ask the user if SAVELOG is the intended filename
|
# Ask the user if SAVELOG is the intended filename
|
||||||
if "SAVELOG" in checksettings:
|
if "SAVELOG" in checksettings:
|
||||||
print("[*] SAVELOG was interpreted to be {0}".format(settings.SAVELOG))
|
print("[*] SAVELOG was interpreted to be {0}".format(settings.SAVELOG))
|
||||||
@ -126,6 +136,10 @@ if not uploadfolder_exists:
|
|||||||
summarygood = False
|
summarygood = False
|
||||||
print("UPLOAD_FOLDER ({0}) does not exist!".format(settings.UPLOAD_FOLDER))
|
print("UPLOAD_FOLDER ({0}) does not exist!".format(settings.UPLOAD_FOLDER))
|
||||||
|
|
||||||
|
if not enckey_exists:
|
||||||
|
summarygood = False
|
||||||
|
print("ENCKEY_PATH ({0}) does not exist!".format(settings.ENCKEY_PATH))
|
||||||
|
|
||||||
if not rooturl_good:
|
if not rooturl_good:
|
||||||
summarygood = False
|
summarygood = False
|
||||||
print("ROOTURL may cause issues!")
|
print("ROOTURL may cause issues!")
|
||||||
|
8
functions.py.default
Normal file
8
functions.py.default
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
import string
|
||||||
|
import random
|
||||||
|
|
||||||
|
|
||||||
|
def generate_name():
|
||||||
|
chars = string.ascii_letters + string.digits # uppercase, lowercase, and numbers
|
||||||
|
name = ''.join((random.choice(chars) for i in range(8))) # generate name
|
||||||
|
return name
|
46
imgupload.py
46
imgupload.py
@ -1,15 +1,13 @@
|
|||||||
from flask import Flask, request, jsonify, abort, Response
|
from flask import Flask, request, jsonify, abort, Response
|
||||||
|
from cryptography.fernet import Fernet
|
||||||
from flask_api import status
|
from flask_api import status
|
||||||
from pathlib import Path
|
from pathlib import Path
|
||||||
import string
|
|
||||||
import random
|
import random
|
||||||
import os
|
import os
|
||||||
import datetime
|
import datetime
|
||||||
|
|
||||||
import settings # app settings (such as allowed extensions)
|
import settings # app settings (such as allowed extensions)
|
||||||
|
import functions # custom functions
|
||||||
|
|
||||||
ALPHANUMERIC = string.ascii_letters + string.digits # uppercase, lowercase, and numbers
|
|
||||||
|
|
||||||
app = Flask(__name__) # app is the app
|
app = Flask(__name__) # app is the app
|
||||||
|
|
||||||
@ -21,15 +19,6 @@ def allowed_extension(testext):
|
|||||||
return False
|
return False
|
||||||
|
|
||||||
|
|
||||||
def generate_name(extension):
|
|
||||||
namefound = False
|
|
||||||
while not namefound:
|
|
||||||
fname = ''.join((random.choice(ALPHANUMERIC) for i in range(8))) + str(extension)
|
|
||||||
if not Path(fname).is_file():
|
|
||||||
namefound = True
|
|
||||||
return fname
|
|
||||||
|
|
||||||
|
|
||||||
def log_savelog(key, ip, savedname):
|
def log_savelog(key, ip, savedname):
|
||||||
if settings.SAVELOG_KEYPREFIX > 0:
|
if settings.SAVELOG_KEYPREFIX > 0:
|
||||||
with open(settings.SAVELOG, "a+") as slogf:
|
with open(settings.SAVELOG, "a+") as slogf:
|
||||||
@ -40,30 +29,31 @@ def log_savelog(key, ip, savedname):
|
|||||||
slogf.write("[{0}] {1} - {2}\n".format(datetime.datetime.now(), ip, savedname))
|
slogf.write("[{0}] {1} - {2}\n".format(datetime.datetime.now(), ip, savedname))
|
||||||
os.chmod(settings.SAVELOG, settings.SAVELOG_CHMOD)
|
os.chmod(settings.SAVELOG, settings.SAVELOG_CHMOD)
|
||||||
|
|
||||||
|
|
||||||
@app.route("/upload", methods = ["POST"])
|
@app.route("/upload", methods = ["POST"])
|
||||||
def upload():
|
def upload():
|
||||||
if request.method == "POST": # sanity check: make sure it's a POST request
|
if request.method == "POST": # sanity check: make sure it's a POST request
|
||||||
print("Request method was POST!")
|
print("Request method was POST!")
|
||||||
|
|
||||||
os.chmod("uploadkeys", settings.UPLOADKEYS_CHMOD)
|
with open(settings.ENCKEY_PATH,"rb") as enckey: # load encryption key
|
||||||
print("Changed permissions of `uploadkeys`")
|
key = enckey.read()
|
||||||
with open("uploadkeys", "r") as keyfile: # load valid keys
|
f = Fernet(key)
|
||||||
validkeys = keyfile.readlines()
|
|
||||||
validkeys = [x.strip("\n") for x in validkeys]
|
with open("uploadkeys", "rb") as keyfile:
|
||||||
|
encrypted_data = keyfile.read()
|
||||||
|
decrypted_data = str(f.decrypt(encrypted_data).decode('utf-8'))
|
||||||
|
decrypted_data = decrypted_data.splitlines()
|
||||||
|
|
||||||
|
validkeys = [x.strip("\n") for x in decrypted_data]
|
||||||
while "" in validkeys:
|
while "" in validkeys:
|
||||||
validkeys.remove("")
|
validkeys.remove("")
|
||||||
print("removed blank key")
|
print("Removed blank key(s)")
|
||||||
print("Valid keys: {0}".format(validkeys))
|
|
||||||
print("Loaded validkeys")
|
print("Loaded validkeys")
|
||||||
|
|
||||||
if "uploadKey" in request.form: # if an uploadKey was provided
|
if "uploadKey" in request.form: # if an uploadKey was provided
|
||||||
if request.form["uploadKey"] in validkeys: # check if uploadKey is valid
|
if request.form["uploadKey"] in validkeys: # check if uploadKey is valid
|
||||||
print("Key is valid!")
|
print("Key is valid!")
|
||||||
|
|
||||||
if "imageUpload" in request.files: # check if image to upload was provided
|
if "imageUpload" in request.files: # check if image to upload was provided
|
||||||
f = request.files["imageUpload"] # f is the image to upload
|
f = request.files["imageUpload"] # f is the image to upload
|
||||||
print("Found uploaded image")
|
|
||||||
else:
|
else:
|
||||||
print("No image upload was found!")
|
print("No image upload was found!")
|
||||||
return jsonify({'status': 'error', 'error': 'NO_IMAGE_UPLOADED'}), status.HTTP_400_BAD_REQUEST
|
return jsonify({'status': 'error', 'error': 'NO_IMAGE_UPLOADED'}), status.HTTP_400_BAD_REQUEST
|
||||||
@ -73,23 +63,23 @@ def upload():
|
|||||||
return jsonify({'status': 'error', 'error': 'FILENAME_BLANK'}), status.HTTP_400_BAD_REQUEST
|
return jsonify({'status': 'error', 'error': 'FILENAME_BLANK'}), status.HTTP_400_BAD_REQUEST
|
||||||
|
|
||||||
fext = Path(f.filename).suffix # get the uploaded extension
|
fext = Path(f.filename).suffix # get the uploaded extension
|
||||||
print("Uploaded file extensions is {0}".format(fext))
|
|
||||||
if allowed_extension(fext): # if the extension is allowed
|
if allowed_extension(fext): # if the extension is allowed
|
||||||
fname = generate_name(fext) # generate file name
|
print("Generating file with extension {0}".format(fext))
|
||||||
|
fname = functions.generate_name() + fext # generate file name
|
||||||
print("Generated name: {0}".format(fname))
|
print("Generated name: {0}".format(fname))
|
||||||
|
|
||||||
if f: # if the uploaded image exists
|
if f: # if the uploaded image exists
|
||||||
print("Uploaded image exists, obviously.")
|
print("Uploaded image exists")
|
||||||
f.save(os.path.join(settings.UPLOAD_FOLDER, fname)) # save the image
|
f.save(os.path.join(settings.UPLOAD_FOLDER, fname)) # save the image
|
||||||
print("Saved to {0}".format(fname))
|
print("Saved to {0}".format(fname))
|
||||||
url = settings.ROOTURL + fname # construct the url to the image
|
url = settings.ROOTURL + fname # construct the url to the image
|
||||||
if settings.SAVELOG != "/dev/null":
|
if settings.SAVELOG != "/dev/null":
|
||||||
|
print("Saving to savelog")
|
||||||
log_savelog(request.form["uploadKey"], request.remote_addr, fname)
|
log_savelog(request.form["uploadKey"], request.remote_addr, fname)
|
||||||
print("Logged message to savelog")
|
|
||||||
print("Returning json response")
|
print("Returning json response")
|
||||||
return jsonify({'status': 'success', 'url': url, 'name': fname, 'uploadedName': f.filename}), status.HTTP_201_CREATED
|
return jsonify({'status': 'success', 'url': url, 'name': fname, 'uploadedName': f.filename}), status.HTTP_201_CREATED
|
||||||
else: # this shouldn't happen
|
else: # this shouldn't happen
|
||||||
print("Um... uploaded image is nonexistent..? Please report this error!")
|
print("Um... uploaded image... is nonexistent? Please report this error!")
|
||||||
return jsonify({'status': 'error', 'error': 'UPLOADED_IMAGE_FAILED_SANITY_CHECK_1'}), status.HTTP_400_BAD_REQUEST
|
return jsonify({'status': 'error', 'error': 'UPLOADED_IMAGE_FAILED_SANITY_CHECK_1'}), status.HTTP_400_BAD_REQUEST
|
||||||
|
|
||||||
else: # if the extension was invalid
|
else: # if the extension was invalid
|
||||||
|
108
keygen.py
Normal file
108
keygen.py
Normal file
@ -0,0 +1,108 @@
|
|||||||
|
from cryptography.fernet import Fernet
|
||||||
|
from cryptography.fernet import InvalidToken
|
||||||
|
from pathlib import Path
|
||||||
|
import settings
|
||||||
|
import string
|
||||||
|
import secrets
|
||||||
|
import sys
|
||||||
|
import os
|
||||||
|
|
||||||
|
|
||||||
|
# Load secret
|
||||||
|
def load_secret():
|
||||||
|
with open(settings.ENCKEY_PATH, "rb") as sf:
|
||||||
|
secret = sf.read()
|
||||||
|
return secret
|
||||||
|
|
||||||
|
|
||||||
|
# Encrypting and storing of key
|
||||||
|
def append_uploadkey(akey):
|
||||||
|
with open('uploadkeys', 'a+') as uploadkeysf:
|
||||||
|
print(str(akey), file=uploadkeysf)
|
||||||
|
|
||||||
|
|
||||||
|
def decrypt_uploadkeys():
|
||||||
|
with open("uploadkeys", "rb") as uploadkeysf:
|
||||||
|
uploadkeys_data = uploadkeysf.read()
|
||||||
|
|
||||||
|
try:
|
||||||
|
secret = load_secret()
|
||||||
|
secretf = Fernet(secret)
|
||||||
|
decrypted_data = secretf.decrypt(uploadkeys_data) # decrypt data
|
||||||
|
with open("uploadkeys", "wb") as ukf:
|
||||||
|
ukf.write(decrypted_data) # write the original file
|
||||||
|
print("Done decrypting") # debug
|
||||||
|
return True
|
||||||
|
except InvalidToken:
|
||||||
|
print("InvalidToken") # debug
|
||||||
|
print("The encrypted key data is invalid and cannot be read.")
|
||||||
|
print("It may be necessary to clear the file entirely, which will invalidate all tokens.")
|
||||||
|
proceed = ask_yn("Do you wish to proceed to clearing the uploadkeys file? [y/n] ")
|
||||||
|
|
||||||
|
if proceed:
|
||||||
|
os.remove("uploadkeys")
|
||||||
|
print("Removed uploadkeys file.")
|
||||||
|
proceed2 = ask_yn("Would you like to continue and generate a new key? [y/n] ")
|
||||||
|
if not proceed2:
|
||||||
|
return False
|
||||||
|
else:
|
||||||
|
return True
|
||||||
|
else:
|
||||||
|
return False
|
||||||
|
|
||||||
|
|
||||||
|
def encrypt_uploadkeys():
|
||||||
|
with open("uploadkeys", "rb") as uploadkeysf:
|
||||||
|
uploadkeys_data = uploadkeysf.read()
|
||||||
|
|
||||||
|
secret = load_secret()
|
||||||
|
secretf = Fernet(secret)
|
||||||
|
encrypted_data = secretf.encrypt(uploadkeys_data)
|
||||||
|
|
||||||
|
with open("uploadkeys", "wb") as uploadkeysf:
|
||||||
|
uploadkeysf.write(encrypted_data)
|
||||||
|
|
||||||
|
|
||||||
|
def ask_yn(msg):
|
||||||
|
resps = {"y": True, "n": False}
|
||||||
|
ask = True
|
||||||
|
while ask:
|
||||||
|
proceedraw = input(msg)
|
||||||
|
if proceedraw.lower() in resps.keys():
|
||||||
|
proceed = resps[proceedraw]
|
||||||
|
ask = False
|
||||||
|
else:
|
||||||
|
print("Invalid response.")
|
||||||
|
return proceed
|
||||||
|
|
||||||
|
|
||||||
|
# Check if encryption secret already exists
|
||||||
|
if Path(settings.ENCKEY_PATH).is_file():
|
||||||
|
print("Encryption secret found.")
|
||||||
|
else:
|
||||||
|
print("Encryption secret not found.")
|
||||||
|
print("Generating secret...")
|
||||||
|
newsecret = Fernet.generate_key()
|
||||||
|
with open(settings.ENCKEY_PATH, "wb") as secret_file:
|
||||||
|
secret_file.write(newsecret)
|
||||||
|
print("Encryption secret generated and stored in {0}".format(settings.ENCKEY_PATH))
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
start = ask_yn("Have you run this program as the correct user (for example, nginx uses www-data)? [y/n] ")
|
||||||
|
if not start:
|
||||||
|
print("Please run this as the correct user with: sudo su [user] -s /bin/sh -c 'python3 keygen.py'")
|
||||||
|
|
||||||
|
else:
|
||||||
|
uploadkeysp = Path("uploadkeys")
|
||||||
|
if not uploadkeysp.is_file():
|
||||||
|
uploadkeysp.touch()
|
||||||
|
|
||||||
|
if decrypt_uploadkeys(): # Decrypt the file
|
||||||
|
N = 64 # Size of key
|
||||||
|
key = ''.join(secrets.choice(string.ascii_letters + string.digits) for i in range(N))
|
||||||
|
print("Your new key is: " + str(key)) # Print key
|
||||||
|
append_uploadkey(key) # Save the new key to file unencrypted
|
||||||
|
encrypt_uploadkeys() # Encrypt the uploadkeys file
|
||||||
|
else:
|
||||||
|
print("Exiting.")
|
3
requirements.txt
Normal file
3
requirements.txt
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
Flask_API==2.0
|
||||||
|
cryptography==3.1
|
||||||
|
Flask==1.1.2
|
@ -1,7 +1,7 @@
|
|||||||
UPLOAD_FOLDER = "/var/www/img"
|
UPLOAD_FOLDER = "/path/to/images"
|
||||||
ALLOWED_EXTENSIONS = [".png", ".jpg", ".jpeg", ".svg", ".bmp", ".gif", ".ico", ".webp"]
|
ALLOWED_EXTENSIONS = [".png", ".jpg", ".jpeg", ".svg", ".bmp", ".gif", ".ico", ".webp"]
|
||||||
ROOTURL = "https://img.bbaovanc.com/"
|
ROOTURL = "https://example.com/"
|
||||||
SAVELOG = "savelog.log"
|
SAVELOG = "savelog.log"
|
||||||
SAVELOG_CHMOD = 0o644
|
SAVELOG_CHMOD = 0o644
|
||||||
UPLOADKEYS_CHMOD = 0o600
|
|
||||||
SAVELOG_KEYPREFIX = 4
|
SAVELOG_KEYPREFIX = 4
|
||||||
|
ENCKEY_PATH = "secret.key"
|
Reference in New Issue
Block a user