mirror of
https://gitlab.com/hashborgir/d2tools.git
synced 2024-11-30 04:26:03 +00:00
82 lines
3.6 KiB
XML
82 lines
3.6 KiB
XML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<!DOCTYPE policymap [
|
|
<!ELEMENT policymap (policy)*>
|
|
<!ATTLIST policymap xmlns CDATA #FIXED ''>
|
|
<!ELEMENT policy EMPTY>
|
|
<!ATTLIST policy xmlns CDATA #FIXED '' domain NMTOKEN #REQUIRED
|
|
name NMTOKEN #IMPLIED pattern CDATA #IMPLIED rights NMTOKEN #IMPLIED
|
|
stealth NMTOKEN #IMPLIED value CDATA #IMPLIED>
|
|
]>
|
|
<!--
|
|
Configure ImageMagick policies.
|
|
|
|
Domains include system, delegate, coder, filter, path, or resource.
|
|
|
|
Rights include none, read, write, execute, and all. Use | to combine them,
|
|
for example: "read | write" to permit read from, or write to, a path.
|
|
|
|
Use a glob expression as a pattern.
|
|
|
|
Suppose we do not want users to process MPEG video images:
|
|
|
|
<policy domain="delegate" rights="none" pattern="mpeg:decode" />
|
|
|
|
Here we do not want users reading images from HTTP:
|
|
|
|
<policy domain="coder" rights="none" pattern="HTTP" />
|
|
|
|
Lets prevent users from executing any image filters:
|
|
|
|
<policy domain="filter" rights="none" pattern="*" />
|
|
|
|
The /repository file system is restricted to read only. We use a glob
|
|
expression to match all paths that start with /repository:
|
|
|
|
<policy domain="path" rights="read" pattern="/repository/*" />
|
|
|
|
Lets prevent users from executing any image filters:
|
|
|
|
<policy domain="filter" rights="none" pattern="*" />
|
|
|
|
Any large image is cached to disk rather than memory:
|
|
|
|
<policy domain="resource" name="area" value="1GB"/>
|
|
|
|
Define arguments for the memory, map, area, width, height and disk resources
|
|
with SI prefixes (.e.g 100MB). In addition, resource policies are maximums
|
|
for each instance of ImageMagick (e.g. policy memory limit 1GB, -limit 2GB
|
|
exceeds policy maximum so memory limit is 1GB).
|
|
|
|
Rules are processed in order. Here we want to restrict ImageMagick to only
|
|
read or write a small subset of proven web-safe image types:
|
|
|
|
<policy domain="delegate" rights="none" pattern="*" />
|
|
<policy domain="coder" rights="none" pattern="*" />
|
|
<policy domain="coder" rights="read|write" pattern="{GIF,JPEG,PNG,WEBP}" />
|
|
-->
|
|
<policymap>
|
|
<!-- <policy domain="resource" name="temporary-path" value="c:\temp"/> -->
|
|
<!-- <policy domain="resource" name="memory" value="2GiB"/> -->
|
|
<!-- <policy domain="resource" name="map" value="4GiB"/> -->
|
|
<!-- <policy domain="resource" name="width" value="10KP"/> -->
|
|
<!-- <policy domain="resource" name="height" value="10KP"/> -->
|
|
<!-- <policy domain="resource" name="list-length" value="128"/> -->
|
|
<!-- <policy domain="resource" name="area" value="100MP"/> -->
|
|
<!-- <policy domain="resource" name="disk" value="16EiB"/> -->
|
|
<!-- <policy domain="resource" name="file" value="768"/> -->
|
|
<!-- <policy domain="resource" name="thread" value="4"/> -->
|
|
<!-- <policy domain="resource" name="throttle" value="0"/> -->
|
|
<!-- <policy domain="resource" name="time" value="3600"/> -->
|
|
<!-- <policy domain="coder" rights="none" pattern="MVG" /> -->
|
|
<!-- <policy domain="module" rights="none" pattern="{PS,PDF,XPS}" /> -->
|
|
<!-- <policy domain="delegate" rights="none" pattern="HTTPS" /> -->
|
|
<!-- <policy domain="path" rights="none" pattern="@*" /> -->
|
|
<!-- <policy domain="cache" name="memory-map" value="anonymous"/> -->
|
|
<!-- <policy domain="cache" name="synchronize" value="True"/> -->
|
|
<!-- <policy domain="cache" name="shared-secret" value="passphrase" stealth="true"/> -->
|
|
<!-- <policy domain="system" name="max-memory-request" value="256MiB"/> -->
|
|
<!-- <policy domain="system" name="shred" value="2"/> -->
|
|
<policy domain="system" name="precision" value="6"/>
|
|
<!-- <policy domain="system" name="font" value="C:\path\to\unicode-font.ttf"/> -->
|
|
</policymap>
|