class ActiveStorage::DiskController

to the service URL.
Always go through the BlobsController, or your own authenticated controller, rather than directly
This means using expiring, signed URLs that are meant for immediate access, not permanent linking.
Serves files stored with the disk service in the same way that the cloud services do.

def acceptable_content?(token)

def acceptable_content?(token)
  token[:content_type] == request.content_mime_type && token[:content_length] == request.content_length
end

def decode_verified_key

def decode_verified_key
  ActiveStorage.verifier.verified(params[:encoded_key], purpose: :blob_key)
end

def decode_verified_token

def decode_verified_token
  ActiveStorage.verifier.verified(params[:encoded_token], purpose: :blob_token)
end

def disk_service

def disk_service
  ActiveStorage::Blob.service
end

def serve_file(path, content_type:, disposition:)

def serve_file(path, content_type:, disposition:)
  Rack::File.new(nil).serving(request, path).tap do |(status, headers, body)|
    self.status = status
    self.response_body = body
    headers.each do |name, value|
      response.headers[name] = value
    end
    response.headers["Content-Type"] = content_type || DEFAULT_SEND_FILE_TYPE
    response.headers["Content-Disposition"] = disposition || DEFAULT_SEND_FILE_DISPOSITION
  end
end

def show

def show
  if key = decode_verified_key
    serve_file disk_service.path_for(key[:key]), content_type: key[:content_type], disposition: key[:disposition]
  else
    head :not_found
  end
rescue Errno::ENOENT
  head :not_found
end

def update

def update
  if token = decode_verified_token
    if acceptable_content?(token)
      disk_service.upload token[:key], request.body, checksum: token[:checksum]
    else
      head :unprocessable_entity
    end
  else
    head :not_found
  end
rescue ActiveStorage::IntegrityError
  head :unprocessable_entity
end