Wiki source code of Attachments

Version 55.4 by Thomas Mortagne on 2024/05/22

Show last authors
1 {{box cssClass="floatinginfobox" title="**Contents**"}}
2 {{toc/}}
3 {{/box}}
4
5 Attachments can be uploaded either through the regular [[upload action>>Documentation.UserGuide.Features.Attachments]], [[Documentation.UserGuide.Features.WebDAV]], [[XML-RPC>>extensions:Extension.XML-RPC Integration]] or [[Rest>>Documentation.UserGuide.Features.XWikiRESTfulAPI]].
6 As an administrator you can set limits on the maximum size of an attachment and where the attachments will be stored.
7
8 = Size Limit =
9
10 The maximum size of an attachment is limited by a configuration parameter in the //XWikiPreferences// document. It is set to 100GB by default (32MB for XWiki < 10.9RC1).
11 To change it follow these steps:
12
13 1. Go to //{{{http://<yourwiki>/xwiki/bin/edit/XWiki/XWikiPreferences?editor=object}}}//
14 1. Click on the line that says ##XWikiPreferences 0## (right below the line that says ##Objects of type XWiki.XWikiPreferences (1)##)
15 1. Scroll down to the field that says ##Maximum Upload Size## and change the number to whatever size you want (it is expressed in bytes)
16 1. Scroll to the bottom and click "Save"
17 1. Repeat for each (sub)wiki for which you need to increase the size, since currrently this configuration has to be set per wiki
18
19 {{warning}}
20 Note that if you've already tried to attach a file and it failed, in order for the new size setting to be taken into account you might need to clear your browser's cache.
21 {{/warning}}
22
23 = Mimetype Restriction =
24
25 See [[Attachent Validation Application>>extensions:Extension.Attachment.Validation.UI.WebHome]].
26
27 = Versions =
28
29 When a user uploads an attachment and then uploads another attachment with the exact same name, you can decide whether or not to keep a version history of the attachments like you do with documents.
30 XWiki stores all document attachment versions by default which costs more storage space. If you need only latest versions of attachments, you can disable attachment version control by editing your [[xwiki.cfg>>Documentation.AdminGuide.Configuration#HSamplexwiki.cfg]] and adding:
31
32 {{code language="none"}}
33 xwiki.store.attachment.versioning=0
34 {{/code}}
35
36 = Deletion =
37
38 Deleted attachments are stored in a recycle bin so that they can be restored along with the document when rolling back or previewing an earlier version where the attachment should be visible. To disable this feature, edit [[xwiki.cfg>>Documentation.AdminGuide.Configuration#HSamplexwiki.cfg]] and add:
39
40 {{code language="none"}}
41 storage.attachment.recyclebin=0
42 {{/code}}
43
44 You can view the list of deleted attachments in your wiki and delete them permanently by going to ##XWiki.DeletedAttachments## in your wiki.
45
46 = Attachment Storage =
47
48 XWiki offers plugin attachment storage mechanisms so you can store your attachments in the database or directly in the filesystem.
49
50 Generally metadata for attachment and deleted attachments stay in the database whatever store is used for the content. The metadata contains the type of store used for the content allowing each attachment to choose a different store. The consequence is that what you configure is the **default** store for a new attachment and not the store used for all attachments.
51
52 == Filesystem Attachment Store ==
53
54 {{version since="10.5"}}
55 The default.
56 {{/version}}
57
58 The Filesystem attachment store saves your attachments in files in a directory tree. This means you will have one more thing to do when you back up your data but it also means you can save larger (over one gigabyte) files. Filesystem attachment store implements a two stage commit mechanism to maintain integrity even if the database fails to commit the attachment meta-data.
59
60 === Filesystem attachment store location ===
61
62 By default the filsystem storage is located in a sub-folder ({{version since="11.0"}}##store/file##{{/version}} or {{version before="11.0"}}##storage##{{/version}}) of the permanent directory (defined with the parameter ##environment.permanentDirectory## in the ##xwiki.properties## file). By default, the permanent directory ends up in the application server work directory, which is intended to be a temporary directory, so unless you are using a package that takes care of it for you (like the Debian package), it's highly recommended to set this value explicitly to be absolutely sure it's located in a safe location.
63
64 For example:
65
66 {{code}}
67 environment.permanentDirectory=/var/lib/xwiki/data
68 {{/code}}
69
70 {{version since="11.4"}}
71 It's possible to set the location of the filesystem store without modifying the general permanent directory using property ##store.file.directory## of the file ##xwiki.properties##.
72
73 {{code}}
74 store.file.directory=/my/custom/location
75 {{/code}}
76 {{/version}}
77
78 === Other considerations ===
79
80 If you are running a [[cluster>>Documentation.AdminGuide.Clustering.WebHome]] you will need to have a synchronized storage directory for each node. You can use NFS or other means to mount the disk on each node in the cluster.
81
82 ==== Directory cleanup ====
83
84 {{version since="6.0"}}
85 It is possible to save time on startup by preventing XWiki from cleaning up empty directories in the Filesystem Attachment Store. To do this, edit ##xwiki.properties## and set **store.fsattach.cleanOnStartup** to false. If you do this, you will be responsible for cleanup of empty directories yourself.
86 {{/version}}
87
88 == Database Attachment Store ==
89
90 {{version before="10.5"}}
91 The default.
92 {{/version}}
93
94 This attachment storage mechanism stores your attachments in database entries in the [[xwikiattachment_content>>Documentation.DevGuide.DsXWikiAttachmentContent]], [[xwikiattachment_archive>>Documentation.DevGuide.XWikiAttachmentArchive]] and [[xwikiattrecyclebin>>Documentation.DevGuide.DsXwikiRecycleBin]] tables. This system allows for easy backup of your attachments by dumping the database and keeping all of your data together, but attachment size is memory constrained since the attachment content and archive must all be held in memory. As a general rule, attachments larger than 30MB are not possible.
95
96 === Switch to database attachment store ===
97
98 These settings should read as follows:
99
100 {{code language="none"}}
101 xwiki.store.attachment.hint = hibernate
102 xwiki.store.attachment.versioning.hint = hibernate
103 xwiki.store.attachment.recyclebin.content.hint=hibernate
104
105 # If you need to use database store for the attachment it's probably true for deleted attachments
106 xwiki.store.recyclebin.content.hint = hibernate
107 {{/code}}
108
109 Also make sure they are not commented out.
110
111 {{info}}
112 When using this attachment store with a MySQL database, you must set the ##max_allowed_packet## to about 3 times the size of your largest attachment since the attachment and its version history must be saved. See the [[MySQL Installation guide>>Documentation.AdminGuide.InstallationMySQL]] for more information.
113 {{/info}}
114
115 = Attachment display or download =
116
117 When possible (see [[Security section>>#HSecurity]] below) attachments are displayed directly in the browser when accessed.
118 It is possible for developers to force-downloading an attachment by adding the parameter ##?force-download=1## in the attachment URL.
119
120 {{version since="12.10"}}
121 it's possible to use a dedicated property in ##xwiki.properties## to always force some attachment mime-types to be downloaded:
122
123 {{code language="none"}}
124 #-# [Since 12.10]
125 #-# Define the kind of attachment that you always want to be downloaded and never displayed inline.
126 #-# By default this list is empty, but you can specify a list of mime-types (coma separated list of values) which
127 #-# should be always downloaded no matter who attached them or what is the whitelist/blacklist configuration.
128 #-#
129 #-# The distinction with the blacklist configuration above is that the blacklist won't affect file attached by a user
130 #-# with programming rights, while this configuration affect any attachment.
131 # attachment.download.forceDownload=
132 {{/code}}
133 {{/version}}
134
135 = Upload summary =
136
137 {{version since="16.3.0RC1"}}
138 You can enable upload summaries in ##xwiki.properties## to let users add descriptions during attachment uploads.
139
140 {{code language="none"}}
141 #-# [Since 16.3.0RC1]
142 #-# Indicate whether or not comments for attachment uploads should be settable from UI, and displayed whenever the
143 #-# attachment revisions are listed. The default is false.
144 # attachment.upload.enableComments=false
145 {{/code}}
146 {{/version}}
147
148 = Security =
149
150 In order to prevent attacks by using attachments, it's possible to control which attachments' can be directly opened on the browser based on their mimetypes.
151 Two properties in ##xwiki.properties## allow to control that independently:
152
153 {{code language="none"}}
154 #-# [Since 5.2M2]
155 #-# Define the kind of attachment that can be displayed inline. You can either choose to do it through a whitelist
156 #-# (only the mimetypes defined in this list would be displayed inline) or a blacklist (every mimetype that is not in
157 #-# this list would be displayed inline if possible).
158 #-# Note that only one configuration is used between the whitelist and the blacklist, and the whitelist always have
159 #-# the priority over the blacklist. Also note that these configurations exist for security reason so they are only
160 #-# impacting attachments added by users who do not have programming rights.
161 #-# If you want to force downloading some attachments types please check the configuration below.
162 #-#
163 #-# By default we use the following whitelist (coma separated list of values).
164 # attachment.download.whitelist=audio/basic,audio/L24,audio/mp4,audio/mpeg,audio/ogg,audio/vorbis,audio/vnd.rn-realaudio,audio/vnd.wave,audio/webm,image/gif,image/jpeg,image/pjpeg,image/png,image/tiff,text/csv,text/plain,text/xml,text/rtf,video/mpeg,video/ogg,video/quicktime,video/webm,video/x-matroska,video/x-ms-wmv,video/x-flv
165 #-#
166 #-# If you prefer to use a blacklist instead, you can define the forbidden types here, as a coma separated list of
167 #-# values. We advise you to forbid at least the following mimetypes : text/html, text/javascript
168 # attachment.download.blacklist=text/html,text/javascript
169 {{/code}}

Get Connected