Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[API] Provide correct MIME type when getting a raw text file #8152

Closed
1 of 3 tasks
danielappelt opened this issue Sep 11, 2019 · 3 comments · Fixed by #16304
Closed
1 of 3 tasks

[API] Provide correct MIME type when getting a raw text file #8152

danielappelt opened this issue Sep 11, 2019 · 3 comments · Fixed by #16304
Labels
topic/security Something leaks user information or is otherwise vulnerable. Should be fixed! type/proposal The new feature has not been accepted yet but needs to be discussed first.

Comments

@danielappelt
Copy link

  • Gitea version (or commit ref): 1.10.0+dev-274-g3fd0eec90
  • Can you reproduce the bug at https://try.gitea.io:
    • Yes (provide example URL)
    • No
    • Not relevant

Description

When fetching a raw text file via the API the content type header does not reflect the file's MIME type.
https://try.gitea.io/api/v1/repos/go-gitea/gitea/raw/public/js/draw.js

Content-Type: text/plain; charset=utf-8

Expected result would be:

Content-Type: application/javascript

When fetching an image file via the API, the content type seems to be set correctly though:
https://try.gitea.io/api/v1/repos/go-gitea/gitea/raw/public/img/404.png

Content-Type: image/png

This is related to issue #7620.

@techknowlogick techknowlogick added modifies/api This PR adds API routes or modifies them type/proposal The new feature has not been accepted yet but needs to be discussed first. labels Sep 11, 2019
@silverwind
Copy link
Member

silverwind commented Apr 6, 2021

There are security implications when serving scripts with the proper mime type because that allow browser to load them from <script> tags. If this is implemented, I suggest making the behaviour optional and default off. GitHub also serves as text/plain, FWIW:

$ curl -v https://raw.githubusercontent.com/go-gitea/gitea/master/web_src/js/jquery.js |& grep -i content-type
< content-type: text/plain; charset=utf-8
< x-content-type-options: nosniff

tslocum added a commit to tslocum/gitea that referenced this issue Apr 8, 2021
Resolves go-gitea#8152.

Signed-off-by: Trevor Slocum <trevor@rocketnine.space>
@silverwind
Copy link
Member

silverwind commented Apr 14, 2021

I think we should keep to generic mime types, e.g. text/plain and application/octet-stream for binary data which also matches GitHub's behaviour. SVG is an acceptable exception because we use that on the gitea UI and we serve it with security headers in place.

We could expose a user-configurable config section where they can add their mime type mapping to allow them to serve custom mime types (and potentially lower their security).

[download.mimetype.mapping]
.apk=application/vnd.android.package-archive
.js=application/javascript

@silverwind silverwind added topic/security Something leaks user information or is otherwise vulnerable. Should be fixed! and removed modifies/api This PR adds API routes or modifies them labels Apr 14, 2021
@szatyinadam
Copy link
Contributor

Can anyone check the PR for this issue? #15133

@go-gitea go-gitea locked and limited conversation to collaborators Oct 19, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
topic/security Something leaks user information or is otherwise vulnerable. Should be fixed! type/proposal The new feature has not been accepted yet but needs to be discussed first.
Projects
None yet
4 participants