summaryrefslogtreecommitdiff
path: root/modules/profiles/templates/imagemagick-policy.xml.epp
diff options
context:
space:
mode:
authorHugo Hörnquist <hugo@lysator.liu.se>2022-01-12 02:26:25 +0100
committerHugo Hörnquist <hugo@lysator.liu.se>2022-01-12 02:26:25 +0100
commitdd28dcf3d620a4ac7d0a1532b812213cf094cd3c (patch)
treea3fa8c8ef446de2bcc2f317bceb4bca868f7e0f0 /modules/profiles/templates/imagemagick-policy.xml.epp
parentMove webdav into profiles. (diff)
downloadwebdav_server-dd28dcf3d620a4ac7d0a1532b812213cf094cd3c.tar.gz
webdav_server-dd28dcf3d620a4ac7d0a1532b812213cf094cd3c.tar.xz
Revert "Move webdav into profiles."
It actually reverts the non-need for the nginx module webdav_ext. Since Omnifocus requires PROPFIND. This reverts commit edf6ffe8b399679ba28cc5e558a6838919dd1ee8.
Diffstat (limited to '')
-rw-r--r--modules/profiles/templates/imagemagick-policy.xml.epp89
1 files changed, 0 insertions, 89 deletions
diff --git a/modules/profiles/templates/imagemagick-policy.xml.epp b/modules/profiles/templates/imagemagick-policy.xml.epp
deleted file mode 100644
index cbea9e9..0000000
--- a/modules/profiles/templates/imagemagick-policy.xml.epp
+++ /dev/null
@@ -1,89 +0,0 @@
-<%- | Array[Hash] $policies | -%>
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE policymap [
- <!ELEMENT policymap (policy)*>
- <!ATTLIST policymap xmlns CDATA #FIXED ''>
- <!ELEMENT policy EMPTY>
- <!ATTLIST policy xmlns CDATA #FIXED '' domain NMTOKEN #REQUIRED
- name NMTOKEN #IMPLIED pattern CDATA #IMPLIED rights NMTOKEN #IMPLIED
- stealth NMTOKEN #IMPLIED value CDATA #IMPLIED>
-]>
-<!--
- Configure ImageMagick policies.
-
- Domains include system, delegate, coder, filter, path, or resource.
-
- Rights include none, read, write, execute and all. Use | to combine them,
- for example: "read | write" to permit read from, or write to, a path.
-
- Use a glob expression as a pattern.
-
- Suppose we do not want users to process MPEG video images:
-
- <policy domain="delegate" rights="none" pattern="mpeg:decode" />
-
- Here we do not want users reading images from HTTP:
-
- <policy domain="coder" rights="none" pattern="HTTP" />
-
- The /repository file system is restricted to read only. We use a glob
- expression to match all paths that start with /repository:
-
- <policy domain="path" rights="read" pattern="/repository/*" />
-
- Lets prevent users from executing any image filters:
-
- <policy domain="filter" rights="none" pattern="*" />
-
- Any large image is cached to disk rather than memory:
-
- <policy domain="resource" name="area" value="1GP"/>
-
- Use the default system font unless overwridden by the application:
-
- <policy domain="system" name="font" value="/usr/share/fonts/favorite.ttf"/>
-
- Define arguments for the memory, map, area, width, height and disk resources
- with SI prefixes (.e.g 100MB). In addition, resource policies are maximums
- for each instance of ImageMagick (e.g. policy memory limit 1GB, -limit 2GB
- exceeds policy maximum so memory limit is 1GB).
-
- Rules are processed in order. Here we want to restrict ImageMagick to only
- read or write a small subset of proven web-safe image types:
-
- <policy domain="delegate" rights="none" pattern="*" />
- <policy domain="filter" rights="none" pattern="*" />
- <policy domain="coder" rights="none" pattern="*" />
- <policy domain="coder" rights="read|write" pattern="{GIF,JPEG,PNG,WEBP}" />
--->
-<policymap>
- <!-- Sample policies -->
- <!-- <policy domain="resource" name="temporary-path" value="/tmp"/> -->
- <!-- <policy domain="resource" name="memory" value="2GiB"/> -->
- <!-- <policy domain="resource" name="map" value="4GiB"/> -->
- <!-- <policy domain="resource" name="width" value="10KP"/> -->
- <!-- <policy domain="resource" name="height" value="10KP"/> -->
- <!-- <policy domain="resource" name="list-length" value="128"/> -->
- <!-- <policy domain="resource" name="area" value="100MP"/> -->
- <!-- <policy domain="resource" name="disk" value="16EiB"/> -->
- <!-- <policy domain="resource" name="file" value="768"/> -->
- <!-- <policy domain="resource" name="thread" value="4"/> -->
- <!-- <policy domain="resource" name="throttle" value="0"/> -->
- <!-- <policy domain="resource" name="time" value="3600"/> -->
- <!-- <policy domain="coder" rights="none" pattern="MVG" /> -->
- <!-- <policy domain="module" rights="none" pattern="{PS,PDF,XPS}" /> -->
- <!-- <policy domain="delegate" rights="none" pattern="HTTPS" /> -->
- <!-- <policy domain="path" rights="none" pattern="@*" /> -->
- <!-- <policy domain="cache" name="memory-map" value="anonymous"/> -->
- <!-- <policy domain="cache" name="synchronize" value="True"/> -->
- <!-- <policy domain="cache" name="shared-secret" value="passphrase" stealth="true"/> -->
- <!-- <policy domain="system" name="max-memory-request" value="256MiB"/> -->
- <!-- <policy domain="system" name="shred" value="2"/> -->
- <!-- <policy domain="system" name="precision" value="6"/> -->
- <!-- <policy domain="system" name="font" value="/path/to/unicode-font.ttf"/> -->
- <!-- Below policies generated from puppet -->
- <% $policies.map |$policy| { %>
- <policy domain="<%= $policy['domain'] %>" rights="<%= $policy['rights'] %>" pattern="<%= $policy['pattern'] %>" />
- <%- } %>
-</policymap>
-<!-- NOTE File managed by puppet, any manual changes will be overwritten. -->