2018-12-23 21:04:54 +01:00
|
|
|
# Pleroma: A lightweight social networking server
|
2020-03-03 23:44:49 +01:00
|
|
|
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
2018-12-23 21:04:54 +01:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2017-11-22 19:06:07 +01:00
|
|
|
defmodule Pleroma.Web.MediaProxy.MediaProxyController do
|
|
|
|
use Pleroma.Web, :controller
|
2020-04-21 15:29:19 +02:00
|
|
|
|
2020-05-08 22:06:47 +02:00
|
|
|
alias Pleroma.Config
|
|
|
|
alias Pleroma.Helpers.MogrifyHelper
|
2019-02-03 18:44:18 +01:00
|
|
|
alias Pleroma.ReverseProxy
|
|
|
|
alias Pleroma.Web.MediaProxy
|
2017-11-22 19:06:07 +01:00
|
|
|
|
2018-12-07 19:36:44 +01:00
|
|
|
@default_proxy_opts [max_body_length: 25 * 1_048_576, http: [follow_redirect: true]]
|
2018-11-30 17:44:42 +01:00
|
|
|
|
2019-02-03 18:44:18 +01:00
|
|
|
def remote(conn, %{"sig" => sig64, "url" => url64} = params) do
|
2020-05-08 22:06:47 +02:00
|
|
|
with config <- Config.get([:media_proxy], []),
|
|
|
|
{_, true} <- {:enabled, Keyword.get(config, :enabled, false)},
|
2018-11-23 17:40:45 +01:00
|
|
|
{:ok, url} <- MediaProxy.decode_url(sig64, url64),
|
2020-05-08 22:06:47 +02:00
|
|
|
:ok <- MediaProxy.filename_matches(params, conn.request_path, url) do
|
2018-12-02 11:24:02 +01:00
|
|
|
ReverseProxy.call(conn, url, Keyword.get(config, :proxy_opts, @default_proxy_opts))
|
2017-11-28 21:44:25 +01:00
|
|
|
else
|
2020-05-08 22:06:47 +02:00
|
|
|
{:enabled, false} ->
|
2018-11-23 17:40:45 +01:00
|
|
|
send_resp(conn, 404, Plug.Conn.Status.reason_phrase(404))
|
2018-03-30 15:01:53 +02:00
|
|
|
|
|
|
|
{:error, :invalid_signature} ->
|
2018-11-23 17:40:45 +01:00
|
|
|
send_resp(conn, 403, Plug.Conn.Status.reason_phrase(403))
|
2018-03-30 15:01:53 +02:00
|
|
|
|
2018-11-23 17:40:45 +01:00
|
|
|
{:wrong_filename, filename} ->
|
|
|
|
redirect(conn, external: MediaProxy.build_url(sig64, url64, filename))
|
2017-11-22 19:06:07 +01:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-05-08 22:06:47 +02:00
|
|
|
def preview(conn, %{"sig" => sig64, "url" => url64} = params) do
|
|
|
|
with {_, true} <- {:enabled, Config.get([:media_preview_proxy, :enabled], false)},
|
|
|
|
{:ok, url} <- MediaProxy.decode_url(sig64, url64),
|
|
|
|
:ok <- MediaProxy.filename_matches(params, conn.request_path, url) do
|
|
|
|
handle_preview(conn, url)
|
|
|
|
else
|
|
|
|
{:enabled, false} ->
|
|
|
|
send_resp(conn, 404, Plug.Conn.Status.reason_phrase(404))
|
|
|
|
|
|
|
|
{:error, :invalid_signature} ->
|
|
|
|
send_resp(conn, 403, Plug.Conn.Status.reason_phrase(403))
|
|
|
|
|
|
|
|
{:wrong_filename, filename} ->
|
|
|
|
redirect(conn, external: MediaProxy.build_preview_url(sig64, url64, filename))
|
|
|
|
end
|
|
|
|
end
|
2018-03-30 15:01:53 +02:00
|
|
|
|
2020-05-08 22:06:47 +02:00
|
|
|
defp handle_preview(conn, url) do
|
|
|
|
with {:ok, %{status: status} = head_response} when status in 200..299 <- Tesla.head(url),
|
|
|
|
{_, true} <- {:acceptable_content_length, acceptable_body_length?(head_response)} do
|
|
|
|
content_type = Tesla.get_header(head_response, "content-type")
|
|
|
|
handle_preview(content_type, conn, url)
|
2018-12-10 07:39:57 +01:00
|
|
|
else
|
2020-05-08 22:06:47 +02:00
|
|
|
{_, %{status: status}} ->
|
|
|
|
send_resp(conn, :failed_dependency, "Can't fetch HTTP headers (HTTP #{status}).")
|
|
|
|
|
|
|
|
{:acceptable_content_length, false} ->
|
|
|
|
send_resp(conn, :unprocessable_entity, "Source file size exceeds limit.")
|
2017-12-11 02:31:37 +01:00
|
|
|
end
|
|
|
|
end
|
2019-07-12 18:34:30 +02:00
|
|
|
|
2020-05-08 22:06:47 +02:00
|
|
|
defp handle_preview("image/" <> _, %{params: params} = conn, url) do
|
|
|
|
with {:ok, %{status: status, body: body}} when status in 200..299 <- Tesla.get(url),
|
|
|
|
{:ok, path} <- MogrifyHelper.store_as_temporary_file(url, body),
|
|
|
|
resize_dimensions <-
|
|
|
|
Map.get(
|
|
|
|
params,
|
|
|
|
"limit_dimensions",
|
|
|
|
Config.get([:media_preview_proxy, :limit_dimensions])
|
|
|
|
),
|
|
|
|
%Mogrify.Image{} <- MogrifyHelper.in_place_resize_to_limit(path, resize_dimensions) do
|
|
|
|
send_file(conn, 200, path)
|
|
|
|
else
|
|
|
|
{_, %{status: _}} ->
|
|
|
|
send_resp(conn, :failed_dependency, "Can't fetch the image.")
|
|
|
|
|
|
|
|
_ ->
|
|
|
|
send_resp(conn, :failed_dependency, "Can't handle image preview.")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
defp handle_preview(content_type, conn, _url) do
|
|
|
|
send_resp(conn, :unprocessable_entity, "Unsupported content type: #{content_type}.")
|
|
|
|
end
|
|
|
|
|
|
|
|
defp acceptable_body_length?(head_response) do
|
|
|
|
max_body_length = Config.get([:media_preview_proxy, :max_body_length], nil)
|
|
|
|
content_length = Tesla.get_header(head_response, "content-length")
|
|
|
|
content_length = with {int, _} <- Integer.parse(content_length), do: int
|
2019-07-15 17:45:56 +02:00
|
|
|
|
2020-05-08 22:06:47 +02:00
|
|
|
content_length == :error or
|
|
|
|
max_body_length in [nil, :infinity] or
|
|
|
|
content_length <= max_body_length
|
2019-07-12 18:34:30 +02:00
|
|
|
end
|
2017-11-22 19:06:07 +01:00
|
|
|
end
|