1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.MediaProxy.MediaProxyController do
6 use Pleroma.Web, :controller
9 alias Pleroma.Helpers.MediaHelper
10 alias Pleroma.ReverseProxy
11 alias Pleroma.Web.MediaProxy
13 def remote(conn, %{"sig" => sig64, "url" => url64}) do
14 with {_, true} <- {:enabled, MediaProxy.enabled?()},
15 {:ok, url} <- MediaProxy.decode_url(sig64, url64),
16 {_, false} <- {:in_banned_urls, MediaProxy.in_banned_urls(url)},
17 :ok <- MediaProxy.verify_request_path_and_url(conn, url) do
18 proxy_opts = Config.get([:media_proxy, :proxy_opts], [])
19 ReverseProxy.call(conn, url, proxy_opts)
22 send_resp(conn, 404, Plug.Conn.Status.reason_phrase(404))
24 {:in_banned_urls, true} ->
25 send_resp(conn, 404, Plug.Conn.Status.reason_phrase(404))
27 {:error, :invalid_signature} ->
28 send_resp(conn, 403, Plug.Conn.Status.reason_phrase(403))
30 {:wrong_filename, filename} ->
31 redirect(conn, external: MediaProxy.build_url(sig64, url64, filename))
35 def preview(conn, %{"sig" => sig64, "url" => url64}) do
36 with {_, true} <- {:enabled, MediaProxy.preview_enabled?()},
37 {:ok, url} <- MediaProxy.decode_url(sig64, url64),
38 :ok <- MediaProxy.verify_request_path_and_url(conn, url) do
39 handle_preview(conn, url)
42 send_resp(conn, 404, Plug.Conn.Status.reason_phrase(404))
44 {:error, :invalid_signature} ->
45 send_resp(conn, 403, Plug.Conn.Status.reason_phrase(403))
47 {:wrong_filename, filename} ->
48 redirect(conn, external: MediaProxy.build_preview_url(sig64, url64, filename))
52 defp handle_preview(conn, url) do
53 with {:ok, %{status: status} = head_response} when status in 200..299 <-
54 Tesla.head(url, opts: [adapter: [timeout: preview_head_request_timeout()]]) do
55 content_type = Tesla.get_header(head_response, "content-type")
56 handle_preview(content_type, conn, url)
58 {_, %{status: status}} ->
59 send_resp(conn, :failed_dependency, "Can't fetch HTTP headers (HTTP #{status}).")
61 {:error, :recv_response_timeout} ->
62 send_resp(conn, :failed_dependency, "HEAD request timeout.")
65 send_resp(conn, :failed_dependency, "Can't fetch HTTP headers.")
69 defp thumbnail_max_dimensions(params) do
70 config = Config.get([:media_preview_proxy], [])
73 if w = params["thumbnail_max_width"] do
76 Keyword.fetch!(config, :thumbnail_max_width)
79 thumbnail_max_height =
80 if h = params["thumbnail_max_height"] do
83 Keyword.fetch!(config, :thumbnail_max_height)
86 {thumbnail_max_width, thumbnail_max_height}
89 defp handle_preview("image/" <> _ = _content_type, %{params: params} = conn, url) do
90 with {thumbnail_max_width, thumbnail_max_height} <- thumbnail_max_dimensions(params),
91 media_proxy_url <- MediaProxy.url(url),
92 {:ok, thumbnail_binary} <-
93 MediaHelper.ffmpeg_resize_remote(
95 %{max_width: thumbnail_max_width, max_height: thumbnail_max_height}
98 |> put_resp_header("content-type", "image/jpeg")
99 |> send_resp(200, thumbnail_binary)
102 send_resp(conn, :failed_dependency, "Can't handle image preview.")
106 defp handle_preview(content_type, conn, _url) do
107 send_resp(conn, :unprocessable_entity, "Unsupported content type: #{content_type}.")
110 defp preview_head_request_timeout do
111 Config.get([:media_preview_proxy, :proxy_opts, :head_request_max_read_duration]) ||
115 defp preview_timeout do
116 Config.get([:media_preview_proxy, :proxy_opts, :max_read_duration]) ||
117 Config.get([:media_proxy, :proxy_opts, :max_read_duration]) ||
118 ReverseProxy.max_read_duration_default()