2018-12-23 20:04:54 +00:00
|
|
|
# Pleroma: A lightweight social networking server
|
2023-01-02 20:38:50 +00:00
|
|
|
# Copyright © 2017-2022 Pleroma Authors <https://pleroma.social/>
|
2018-12-23 20:04:54 +00:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2017-11-22 18:06:07 +00:00
|
|
|
defmodule Pleroma.Web.MediaProxy.MediaProxyController do
|
|
|
|
use Pleroma.Web, :controller
|
2020-04-21 13:29:19 +00:00
|
|
|
|
2020-05-08 20:06:47 +00:00
|
|
|
alias Pleroma.Config
|
2020-05-20 17:26:43 +00:00
|
|
|
alias Pleroma.Helpers.MediaHelper
|
2020-09-16 19:30:42 +00:00
|
|
|
alias Pleroma.Helpers.UriHelper
|
2019-02-03 17:44:18 +00:00
|
|
|
alias Pleroma.ReverseProxy
|
|
|
|
alias Pleroma.Web.MediaProxy
|
2020-09-10 18:28:07 +00:00
|
|
|
alias Plug.Conn
|
2017-11-22 18:06:07 +00:00
|
|
|
|
2023-05-29 17:59:51 +00:00
|
|
|
plug(:validate_host)
|
2023-05-26 16:08:50 +00:00
|
|
|
plug(:sandbox)
|
|
|
|
|
2020-05-11 20:21:53 +00:00
|
|
|
def remote(conn, %{"sig" => sig64, "url" => url64}) do
|
|
|
|
with {_, true} <- {:enabled, MediaProxy.enabled?()},
|
2018-11-23 16:40:45 +00:00
|
|
|
{:ok, url} <- MediaProxy.decode_url(sig64, url64),
|
2020-07-05 16:02:43 +00:00
|
|
|
{_, false} <- {:in_banned_urls, MediaProxy.in_banned_urls(url)},
|
2020-05-11 20:21:53 +00:00
|
|
|
:ok <- MediaProxy.verify_request_path_and_url(conn, url) do
|
2020-08-19 18:36:26 +00:00
|
|
|
ReverseProxy.call(conn, url, media_proxy_opts())
|
2017-11-28 20:44:25 +00:00
|
|
|
else
|
2020-05-08 20:06:47 +00:00
|
|
|
{:enabled, false} ->
|
2020-09-10 18:28:07 +00:00
|
|
|
send_resp(conn, 404, Conn.Status.reason_phrase(404))
|
2018-03-30 13:01:53 +00:00
|
|
|
|
2020-07-02 13:36:54 +00:00
|
|
|
{:in_banned_urls, true} ->
|
2020-09-10 18:28:07 +00:00
|
|
|
send_resp(conn, 404, Conn.Status.reason_phrase(404))
|
2018-03-30 13:01:53 +00:00
|
|
|
|
|
|
|
{:error, :invalid_signature} ->
|
2020-09-10 18:28:07 +00:00
|
|
|
send_resp(conn, 403, Conn.Status.reason_phrase(403))
|
2018-03-30 13:01:53 +00:00
|
|
|
|
2018-11-23 16:40:45 +00:00
|
|
|
{:wrong_filename, filename} ->
|
|
|
|
redirect(conn, external: MediaProxy.build_url(sig64, url64, filename))
|
2017-11-22 18:06:07 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-09-10 18:28:07 +00:00
|
|
|
def preview(%Conn{} = conn, %{"sig" => sig64, "url" => url64}) do
|
2020-05-11 20:21:53 +00:00
|
|
|
with {_, true} <- {:enabled, MediaProxy.preview_enabled?()},
|
2020-09-17 14:13:40 +00:00
|
|
|
{:ok, url} <- MediaProxy.decode_url(sig64, url64),
|
|
|
|
:ok <- MediaProxy.verify_request_path_and_url(conn, url) do
|
2020-05-08 20:06:47 +00:00
|
|
|
handle_preview(conn, url)
|
|
|
|
else
|
|
|
|
{:enabled, false} ->
|
2020-09-10 18:28:07 +00:00
|
|
|
send_resp(conn, 404, Conn.Status.reason_phrase(404))
|
2020-05-08 20:06:47 +00:00
|
|
|
|
|
|
|
{:error, :invalid_signature} ->
|
2020-09-10 18:28:07 +00:00
|
|
|
send_resp(conn, 403, Conn.Status.reason_phrase(403))
|
2020-05-08 20:06:47 +00:00
|
|
|
|
|
|
|
{:wrong_filename, filename} ->
|
|
|
|
redirect(conn, external: MediaProxy.build_preview_url(sig64, url64, filename))
|
|
|
|
end
|
|
|
|
end
|
2018-03-30 13:01:53 +00:00
|
|
|
|
2020-05-08 20:06:47 +00:00
|
|
|
defp handle_preview(conn, url) do
|
2020-09-05 13:16:35 +00:00
|
|
|
media_proxy_url = MediaProxy.url(url)
|
|
|
|
|
2020-05-11 20:21:53 +00:00
|
|
|
with {:ok, %{status: status} = head_response} when status in 200..299 <-
|
2022-08-10 21:09:58 +00:00
|
|
|
Pleroma.HTTP.request("HEAD", media_proxy_url, [], [], pool: :media) do
|
2020-05-08 20:06:47 +00:00
|
|
|
content_type = Tesla.get_header(head_response, "content-type")
|
2020-09-12 08:20:41 +00:00
|
|
|
content_length = Tesla.get_header(head_response, "content-length")
|
|
|
|
content_length = content_length && String.to_integer(content_length)
|
2020-09-17 14:13:40 +00:00
|
|
|
static = conn.params["static"] in ["true", true]
|
|
|
|
|
|
|
|
cond do
|
|
|
|
static and content_type == "image/gif" ->
|
|
|
|
handle_jpeg_preview(conn, media_proxy_url)
|
2020-09-12 08:20:41 +00:00
|
|
|
|
2020-09-17 14:13:40 +00:00
|
|
|
static ->
|
|
|
|
drop_static_param_and_redirect(conn)
|
|
|
|
|
|
|
|
content_type == "image/gif" ->
|
|
|
|
redirect(conn, external: media_proxy_url)
|
|
|
|
|
|
|
|
min_content_length_for_preview() > 0 and content_length > 0 and
|
|
|
|
content_length < min_content_length_for_preview() ->
|
|
|
|
redirect(conn, external: media_proxy_url)
|
|
|
|
|
|
|
|
true ->
|
|
|
|
handle_preview(content_type, conn, media_proxy_url)
|
|
|
|
end
|
2018-12-10 06:39:57 +00:00
|
|
|
else
|
2020-09-12 08:20:41 +00:00
|
|
|
# If HEAD failed, redirecting to media proxy URI doesn't make much sense; returning an error
|
2020-05-08 20:06:47 +00:00
|
|
|
{_, %{status: status}} ->
|
|
|
|
send_resp(conn, :failed_dependency, "Can't fetch HTTP headers (HTTP #{status}).")
|
|
|
|
|
2020-05-11 20:21:53 +00:00
|
|
|
{:error, :recv_response_timeout} ->
|
|
|
|
send_resp(conn, :failed_dependency, "HEAD request timeout.")
|
|
|
|
|
|
|
|
_ ->
|
|
|
|
send_resp(conn, :failed_dependency, "Can't fetch HTTP headers.")
|
2017-12-11 01:31:37 +00:00
|
|
|
end
|
|
|
|
end
|
2019-07-12 16:34:30 +00:00
|
|
|
|
2020-09-17 14:13:40 +00:00
|
|
|
defp handle_preview("image/png" <> _ = _content_type, conn, media_proxy_url) do
|
2020-09-05 13:16:35 +00:00
|
|
|
handle_png_preview(conn, media_proxy_url)
|
2020-08-30 14:17:24 +00:00
|
|
|
end
|
|
|
|
|
2020-09-17 14:13:40 +00:00
|
|
|
defp handle_preview("image/" <> _ = _content_type, conn, media_proxy_url) do
|
2020-09-05 13:16:35 +00:00
|
|
|
handle_jpeg_preview(conn, media_proxy_url)
|
2020-08-18 15:23:27 +00:00
|
|
|
end
|
2020-05-14 17:18:31 +00:00
|
|
|
|
2020-09-17 14:13:40 +00:00
|
|
|
defp handle_preview("video/" <> _ = _content_type, conn, media_proxy_url) do
|
2020-09-05 13:16:35 +00:00
|
|
|
handle_video_preview(conn, media_proxy_url)
|
2020-08-25 22:31:55 +00:00
|
|
|
end
|
|
|
|
|
2020-09-17 14:13:40 +00:00
|
|
|
defp handle_preview(_unsupported_content_type, conn, media_proxy_url) do
|
2020-09-12 07:33:42 +00:00
|
|
|
fallback_on_preview_error(conn, media_proxy_url)
|
2020-05-14 17:18:31 +00:00
|
|
|
end
|
|
|
|
|
2020-09-10 18:28:07 +00:00
|
|
|
defp handle_png_preview(conn, media_proxy_url) do
|
2020-08-30 14:17:24 +00:00
|
|
|
quality = Config.get!([:media_preview_proxy, :image_quality])
|
2020-09-17 14:13:40 +00:00
|
|
|
{thumbnail_max_width, thumbnail_max_height} = thumbnail_max_dimensions()
|
2020-08-30 14:17:24 +00:00
|
|
|
|
2020-09-17 14:13:40 +00:00
|
|
|
with {:ok, thumbnail_binary} <-
|
2020-08-30 14:17:24 +00:00
|
|
|
MediaHelper.image_resize(
|
2020-09-05 13:16:35 +00:00
|
|
|
media_proxy_url,
|
2020-08-30 14:17:24 +00:00
|
|
|
%{
|
|
|
|
max_width: thumbnail_max_width,
|
|
|
|
max_height: thumbnail_max_height,
|
|
|
|
quality: quality,
|
|
|
|
format: "png"
|
|
|
|
}
|
|
|
|
) do
|
|
|
|
conn
|
2020-09-05 13:16:35 +00:00
|
|
|
|> put_preview_response_headers(["image/png", "preview.png"])
|
2020-08-30 14:17:24 +00:00
|
|
|
|> send_resp(200, thumbnail_binary)
|
|
|
|
else
|
|
|
|
_ ->
|
2020-09-12 07:33:42 +00:00
|
|
|
fallback_on_preview_error(conn, media_proxy_url)
|
2020-08-30 14:17:24 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-09-10 18:28:07 +00:00
|
|
|
defp handle_jpeg_preview(conn, media_proxy_url) do
|
2020-08-25 22:18:22 +00:00
|
|
|
quality = Config.get!([:media_preview_proxy, :image_quality])
|
2020-09-17 14:13:40 +00:00
|
|
|
{thumbnail_max_width, thumbnail_max_height} = thumbnail_max_dimensions()
|
2020-08-21 05:59:08 +00:00
|
|
|
|
2020-09-17 14:13:40 +00:00
|
|
|
with {:ok, thumbnail_binary} <-
|
2020-08-25 22:18:22 +00:00
|
|
|
MediaHelper.image_resize(
|
2020-09-05 13:16:35 +00:00
|
|
|
media_proxy_url,
|
2020-08-21 05:59:08 +00:00
|
|
|
%{max_width: thumbnail_max_width, max_height: thumbnail_max_height, quality: quality}
|
2020-05-20 17:26:43 +00:00
|
|
|
) do
|
2020-05-11 20:21:53 +00:00
|
|
|
conn
|
2020-08-31 10:08:50 +00:00
|
|
|
|> put_preview_response_headers()
|
2020-05-14 17:18:31 +00:00
|
|
|
|> send_resp(200, thumbnail_binary)
|
2020-05-08 20:06:47 +00:00
|
|
|
else
|
2020-08-27 17:31:55 +00:00
|
|
|
_ ->
|
2020-09-12 07:33:42 +00:00
|
|
|
fallback_on_preview_error(conn, media_proxy_url)
|
2020-08-27 17:31:55 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-09-05 13:16:35 +00:00
|
|
|
defp handle_video_preview(conn, media_proxy_url) do
|
2020-08-27 17:31:55 +00:00
|
|
|
with {:ok, thumbnail_binary} <-
|
2020-09-05 13:16:35 +00:00
|
|
|
MediaHelper.video_framegrab(media_proxy_url) do
|
2020-08-27 17:31:55 +00:00
|
|
|
conn
|
2020-08-31 10:08:50 +00:00
|
|
|
|> put_preview_response_headers()
|
2020-08-27 17:31:55 +00:00
|
|
|
|> send_resp(200, thumbnail_binary)
|
|
|
|
else
|
2020-05-08 20:06:47 +00:00
|
|
|
_ ->
|
2020-09-12 07:33:42 +00:00
|
|
|
fallback_on_preview_error(conn, media_proxy_url)
|
2020-05-08 20:06:47 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-09-17 14:13:40 +00:00
|
|
|
defp drop_static_param_and_redirect(conn) do
|
|
|
|
uri_without_static_param =
|
|
|
|
conn
|
|
|
|
|> current_url()
|
|
|
|
|> UriHelper.modify_uri_params(%{}, ["static"])
|
|
|
|
|
|
|
|
redirect(conn, external: uri_without_static_param)
|
|
|
|
end
|
|
|
|
|
2020-09-12 07:33:42 +00:00
|
|
|
defp fallback_on_preview_error(conn, media_proxy_url) do
|
|
|
|
redirect(conn, external: media_proxy_url)
|
|
|
|
end
|
|
|
|
|
2020-09-05 13:16:35 +00:00
|
|
|
defp put_preview_response_headers(
|
|
|
|
conn,
|
|
|
|
[content_type, filename] = _content_info \\ ["image/jpeg", "preview.jpg"]
|
|
|
|
) do
|
2020-08-31 10:08:50 +00:00
|
|
|
conn
|
2020-09-01 18:21:58 +00:00
|
|
|
|> put_resp_header("content-type", content_type)
|
|
|
|
|> put_resp_header("content-disposition", "inline; filename=\"#{filename}\"")
|
2020-09-05 17:19:09 +00:00
|
|
|
|> put_resp_header("cache-control", ReverseProxy.default_cache_control_header())
|
2020-08-31 10:08:50 +00:00
|
|
|
end
|
|
|
|
|
2020-09-10 18:54:26 +00:00
|
|
|
defp thumbnail_max_dimensions do
|
2020-09-17 14:13:40 +00:00
|
|
|
config = media_preview_proxy_config()
|
2020-08-18 15:23:27 +00:00
|
|
|
|
2020-09-10 18:28:07 +00:00
|
|
|
thumbnail_max_width = Keyword.fetch!(config, :thumbnail_max_width)
|
|
|
|
thumbnail_max_height = Keyword.fetch!(config, :thumbnail_max_height)
|
2020-08-18 15:23:27 +00:00
|
|
|
|
|
|
|
{thumbnail_max_width, thumbnail_max_height}
|
2020-05-08 20:06:47 +00:00
|
|
|
end
|
|
|
|
|
2020-09-17 14:13:40 +00:00
|
|
|
defp min_content_length_for_preview do
|
|
|
|
Keyword.get(media_preview_proxy_config(), :min_content_length, 0)
|
|
|
|
end
|
|
|
|
|
|
|
|
defp media_preview_proxy_config do
|
|
|
|
Config.get!([:media_preview_proxy])
|
|
|
|
end
|
|
|
|
|
2020-08-19 18:36:26 +00:00
|
|
|
defp media_proxy_opts do
|
|
|
|
Config.get([:media_proxy, :proxy_opts], [])
|
|
|
|
end
|
2023-05-26 16:08:50 +00:00
|
|
|
|
2023-05-29 17:59:51 +00:00
|
|
|
defp validate_host(conn, _params) do
|
2023-05-30 20:56:09 +00:00
|
|
|
%{scheme: proxy_scheme, host: proxy_host, port: proxy_port} =
|
|
|
|
MediaProxy.base_url() |> URI.parse()
|
2023-05-29 17:59:51 +00:00
|
|
|
|
|
|
|
if match?(^proxy_host, conn.host) do
|
|
|
|
conn
|
|
|
|
else
|
2023-05-30 20:56:09 +00:00
|
|
|
redirect_url =
|
|
|
|
%URI{
|
|
|
|
scheme: proxy_scheme,
|
|
|
|
host: proxy_host,
|
|
|
|
port: proxy_port,
|
|
|
|
path: conn.request_path,
|
|
|
|
query: conn.query_string
|
|
|
|
}
|
|
|
|
|> URI.to_string()
|
|
|
|
|> String.trim_trailing("?")
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> Phoenix.Controller.redirect(external: redirect_url)
|
2023-05-29 17:59:51 +00:00
|
|
|
|> halt()
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-05-26 16:08:50 +00:00
|
|
|
defp sandbox(conn, _params) do
|
|
|
|
conn
|
|
|
|
|> merge_resp_headers([{"content-security-policy", "sandbox;"}])
|
|
|
|
end
|
2017-11-22 18:06:07 +00:00
|
|
|
end
|