1# Allowed uploadable file extensions and mimetypes are defined here. 2# To extend this file it is recommended to create a mime.local.conf 3# file. Mimetypes that should be downloadable and not be opened in the 4# should be prefixed with a ! 5 6jpg image/jpeg 7jpeg image/jpeg 8gif image/gif 9png image/png 10 11swf application/x-shockwave-flash 12mp3 audio/mpeg 13ogg audio/ogg 14wav audio/wav 15 16tgz !application/octet-stream 17tar !application/x-gtar 18gz !application/octet-stream 19bz2 !application/octet-stream 20zip !application/zip 21rar !application/rar 227z !application/x-7z-compressed 23 24pdf application/pdf 25ps !application/postscript 26 27rpm !application/octet-stream 28deb !application/octet-stream 29 30doc !application/msword 31xls !application/msexcel 32ppt !application/mspowerpoint 33rtf !application/msword 34 35docx !application/vnd.openxmlformats-officedocument.wordprocessingml.document 36xlsx !application/vnd.openxmlformats-officedocument.spreadsheetml.sheet 37pptx !application/vnd.openxmlformats-officedocument.presentationml.presentation 38 39sxw !application/soffice 40sxc !application/soffice 41sxi !application/soffice 42sxd !application/soffice 43 44odc !application/vnd.oasis.opendocument.chart 45odf !application/vnd.oasis.opendocument.formula 46odg !application/vnd.oasis.opendocument.graphics 47odi !application/vnd.oasis.opendocument.image 48odp !application/vnd.oasis.opendocument.presentation 49ods !application/vnd.oasis.opendocument.spreadsheet 50odt !application/vnd.oasis.opendocument.text 51 52# You should enable HTML and Text uploads only for restricted Wikis. 53# Spammers are known to upload spam pages through unprotected Wikis. 54# Note: Enabling HTML opens Cross Site Scripting vulnerabilities 55# through JavaScript. Only enable this with trusted users. You 56# need to disable the iexssprotect option additionally to 57# adding the mime type here 58#html text/html 59#htm text/html 60#txt text/plain 61#conf text/plain 62#xml text/xml 63#csv text/csv 64 65