Add pnm module permission for imagemagick
All checks were successful
continuous-integration/drone/tag Build is passing
continuous-integration/drone/push Build is passing

This commit is contained in:
Aode (lion) 2022-04-03 16:43:14 -05:00
parent 7c9d6ab9e8
commit b972e55587
5 changed files with 7 additions and 7 deletions

2
Cargo.lock generated
View file

@ -1547,7 +1547,7 @@ dependencies = [
[[package]]
name = "pict-rs"
version = "0.3.0"
version = "0.3.1"
dependencies = [
"actix-form-data",
"actix-rt",

View file

@ -1,7 +1,7 @@
[package]
name = "pict-rs"
description = "A simple image hosting service"
version = "0.3.0"
version = "0.3.1"
authors = ["asonix <asonix@asonix.dog>"]
license = "AGPL-3.0"
readme = "README.md"

View file

@ -9,7 +9,7 @@ _a simple image hosting service_
## Usage
### Running
```
pict-rs 0.3.0
pict-rs 0.3.1
USAGE:
pict-rs [FLAGS] [OPTIONS] [SUBCOMMAND]
@ -56,7 +56,7 @@ SUBCOMMANDS:
```
```
pict-rs-file-store 0.3.0
pict-rs-file-store 0.3.1
USAGE:
pict-rs file-store [OPTIONS]
@ -70,7 +70,7 @@ OPTIONS:
```
```
pict-rs-s3-store 0.3.0
pict-rs-s3-store 0.3.1
USAGE:
pict-rs s3-store [OPTIONS] --bucket-name <bucket-name> --region <region>

View file

@ -15,7 +15,7 @@
<policy domain="delegate" rights="execute" pattern="ffmpeg" />
<policy domain="filter" rights="none" pattern="*" />
<policy domain="module" rights="none" pattern="*" />
<policy domain="module" rights="read | write" pattern="{GIF,JPEG,PNG,WEBP,TMP,PAM,VIDEO}" />
<policy domain="module" rights="read | write" pattern="{GIF,JPEG,PNG,WEBP,TMP,PAM,PNM,VIDEO}" />
<!-- indirect reads not permitted -->
<policy domain="system" name="precision" value="6" />
</policymap>

View file

@ -15,7 +15,7 @@
<policy domain="delegate" rights="execute" pattern="ffmpeg" />
<policy domain="filter" rights="none" pattern="*" />
<policy domain="module" rights="none" pattern="*" />
<policy domain="module" rights="read | write" pattern="{GIF,JPEG,PNG,WEBP,TMP,PAM,VIDEO}" />
<policy domain="module" rights="read | write" pattern="{GIF,JPEG,PNG,WEBP,TMP,PAM,PNM,VIDEO}" />
<!-- indirect reads not permitted -->
<policy domain="system" name="precision" value="6" />
</policymap>