File inspection and Mimetype Limits on Document Upload Mutation. #144
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Introduce File Type Checking for Document Uploads
Summary
This PR introduces MIME type and file type checking to the
UploadDocument
mutation. This new feature enhances security and ensures that only allowed file types can be uploaded through our system.Changes
UploadDocument Mutation
filetype
library to detect MIME types of uploaded filesNew Test Case (UploadDocumentMutationTestCase)
UploadDocument
mutationpython-docx
to generate a real DOCX file for accurate testingRationale
File type checking is crucial for:
Implementation Details
filetype
andpython-docx
as new dependenciesio.BytesIO()
for efficient file content handlingsettings.ALLOWED_DOCUMENT_MIMETYPES
Testing
Configuration
ALLOWED_DOCUMENT_MIMETYPES
to settings (currently set to['application/pdf']
)Next Steps
Breaking Changes