mime.conf 2.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475
  1. # Allowed uploadable file extensions and mimetypes are defined here.
  2. # To extend this file it is recommended to create a mime.local.conf
  3. # file. Mimetypes that should be downloadable and not be opened in the
  4. # should be prefixed with a !
  5. jpg image/jpeg
  6. jpeg image/jpeg
  7. gif image/gif
  8. png image/png
  9. webp image/webp
  10. ico image/vnd.microsoft.icon
  11. mp3 audio/mpeg
  12. ogg audio/ogg
  13. wav audio/wav
  14. webm video/webm
  15. ogv video/ogg
  16. mp4 video/mp4
  17. vtt text/vtt
  18. tgz !application/octet-stream
  19. tar !application/x-gtar
  20. gz !application/octet-stream
  21. bz2 !application/octet-stream
  22. zip !application/zip
  23. rar !application/rar
  24. 7z !application/x-7z-compressed
  25. pdf application/pdf
  26. ps !application/postscript
  27. rpm !application/octet-stream
  28. deb !application/octet-stream
  29. doc !application/msword
  30. xls !application/msexcel
  31. ppt !application/mspowerpoint
  32. rtf !application/msword
  33. docx !application/vnd.openxmlformats-officedocument.wordprocessingml.document
  34. xlsx !application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
  35. pptx !application/vnd.openxmlformats-officedocument.presentationml.presentation
  36. sxw !application/soffice
  37. sxc !application/soffice
  38. sxi !application/soffice
  39. sxd !application/soffice
  40. odc !application/vnd.oasis.opendocument.chart
  41. odf !application/vnd.oasis.opendocument.formula
  42. odg !application/vnd.oasis.opendocument.graphics
  43. odi !application/vnd.oasis.opendocument.image
  44. odp !application/vnd.oasis.opendocument.presentation
  45. ods !application/vnd.oasis.opendocument.spreadsheet
  46. odt !application/vnd.oasis.opendocument.text
  47. svg image/svg+xml
  48. # You should enable HTML and Text uploads only for restricted Wikis.
  49. # Spammers are known to upload spam pages through unprotected Wikis.
  50. # Note: Enabling HTML opens Cross Site Scripting vulnerabilities
  51. # through JavaScript. Only enable this with trusted users. You
  52. # need to disable the iexssprotect option additionally to
  53. # adding the mime type here
  54. #html text/html
  55. #htm text/html
  56. #txt text/plain
  57. #conf text/plain
  58. #xml text/xml
  59. #csv text/csv
  60. # Also flash may be able to execute arbitrary scripts in the website's
  61. # context
  62. #swf application/x-shockwave-flash