-
-
Notifications
You must be signed in to change notification settings - Fork 324
Serialize File Content #574
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Just had a thought. We could possibly leave file serialization to HTTP, and handle things on the backend. For example, adding a HTTP endpoint # Uploads are given a unique UUID path to route to
path("_idom/upload/{uuid}") Not really sure how we'd be able to tell the WS side of things when an upload is a complete though... Can't rely on boolean flags due to cross-process compatibility. |
If we do go down this road of serializing via websockets, it's going to be extremely important to stream the file to disk rather than buffer it in memory. Otherwise, this would be a DDOS attack vector. Ideally, "file stuff" should be handled by individual frameworks... but that design of that might not be technologically feasible. |
PyZMQ might be a decent option to communicate between separate ASGI processes. |
The initial implementation should probably use form elements to upload files over HTTP. We can overwrite the default With that said, I have some thoughts on how this could be accomplished via the websocket in a more natural way, but it would require some pretty deep changes to how we send messages between the client and the server. Right now, there is no real messaging protocol - the server always sends layout updates and the client always sends layout events. We'd need to change this in order to allow the client and server to send different types of messages to each other. For example, all messages between the client and server would probably take the form: {
"type": str, # some unique name
"version": str, # allow client and server to sort out compatibility
... # any other data
} |
We are likely going to develop two file upload handlers. For small files, we stream the file directly to memory.
In order to support this without having this become an attack vector, we should implement a few safeguards:
|
We might want to transfer this issue to the |
Right now we don't serialize file content. Just metadata. Along with this we'll want to allow users to configure the max message size to help users protect against large file upload attacks.
See this comment for implementation details.
The text was updated successfully, but these errors were encountered: