You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Question
Thanks for moving the industry forward on the resumable uploads - tusd's hooks are well designed and quite useful.
The documentation mentions limited support for upload authentication.
Currently, there is no mechanism to ensure that the upload is resumed by the same user that created it.
This could be fine if the file urls are non-deterministic. But if we want to make the URL path deterministic, (say to avoid storing state at client side), then this assumption would not hold.
Is there a 'hook' for validating the PATCH and HEAD requests ? Can this be achieved programmatically with go middlewares ?
Work for such a hook, that checks access to an upload resource, has already began in #1077. You can find a bit more context in #669 (comment) and I hope that we can finish the PR soon.
Question
Thanks for moving the industry forward on the resumable uploads - tusd's hooks are well designed and quite useful.
The documentation mentions limited support for upload authentication.
This could be fine if the file urls are non-deterministic. But if we want to make the URL path deterministic, (say to avoid storing state at client side), then this assumption would not hold.
Is there a 'hook' for validating the PATCH and HEAD requests ? Can this be achieved programmatically with go middlewares ?
Alternatively, can we add "validate" hook for every type of request ?
Random Suggestion
https://tus.github.io/tusd has really good documentation and should be referenced (frequently / significantly) at tus.io
The text was updated successfully, but these errors were encountered: