1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.MediaProxy.MediaProxyController do
6 use Pleroma.Web, :controller
9 alias Pleroma.Helpers.MediaHelper
10 alias Pleroma.ReverseProxy
11 alias Pleroma.Web.MediaProxy
13 def remote(conn, %{"sig" => sig64, "url" => url64}) do
14 with {_, true} <- {:enabled, MediaProxy.enabled?()},
15 {:ok, url} <- MediaProxy.decode_url(sig64, url64),
16 {_, false} <- {:in_banned_urls, MediaProxy.in_banned_urls(url)},
17 :ok <- MediaProxy.verify_request_path_and_url(conn, url) do
18 ReverseProxy.call(conn, url, media_proxy_opts())
21 send_resp(conn, 404, Plug.Conn.Status.reason_phrase(404))
23 {:in_banned_urls, true} ->
24 send_resp(conn, 404, Plug.Conn.Status.reason_phrase(404))
26 {:error, :invalid_signature} ->
27 send_resp(conn, 403, Plug.Conn.Status.reason_phrase(403))
29 {:wrong_filename, filename} ->
30 redirect(conn, external: MediaProxy.build_url(sig64, url64, filename))
34 def preview(conn, %{"sig" => sig64, "url" => url64}) do
35 with {_, true} <- {:enabled, MediaProxy.preview_enabled?()},
36 {:ok, url} <- MediaProxy.decode_url(sig64, url64),
37 :ok <- MediaProxy.verify_request_path_and_url(conn, url) do
38 handle_preview(conn, url)
41 send_resp(conn, 404, Plug.Conn.Status.reason_phrase(404))
43 {:error, :invalid_signature} ->
44 send_resp(conn, 403, Plug.Conn.Status.reason_phrase(403))
46 {:wrong_filename, filename} ->
47 redirect(conn, external: MediaProxy.build_preview_url(sig64, url64, filename))
51 defp handle_preview(conn, url) do
52 with {:ok, %{status: status} = head_response} when status in 200..299 <-
54 opts: [adapter: [timeout: preview_head_request_timeout(), follow_redirect: true]]
56 content_type = Tesla.get_header(head_response, "content-type")
57 handle_preview(content_type, conn, url)
59 {_, %{status: status}} ->
60 send_resp(conn, :failed_dependency, "Can't fetch HTTP headers (HTTP #{status}).")
62 {:error, :recv_response_timeout} ->
63 send_resp(conn, :failed_dependency, "HEAD request timeout.")
66 send_resp(conn, :failed_dependency, "Can't fetch HTTP headers.")
70 # TODO: find a workaround so avatar_static and header_static can work.
71 # Those only permit GIFs for animation, so we have to permit a way to
72 # allow those to get real static variants.
73 defp handle_preview("image/gif" = _content_type, conn, url) do
74 mediaproxy_url = url |> MediaProxy.url()
76 redirect(conn, external: mediaproxy_url)
79 defp handle_preview("image/png" <> _ = _content_type, conn, url) do
80 handle_png_preview(conn, url)
83 defp handle_preview("image/" <> _ = _content_type, conn, url) do
84 handle_jpeg_preview(conn, url)
87 defp handle_preview("video/" <> _ = _content_type, conn, url) do
88 handle_video_preview(conn, url)
91 defp handle_preview(content_type, conn, _url) do
92 send_resp(conn, :unprocessable_entity, "Unsupported content type: #{content_type}.")
95 defp handle_png_preview(%{params: params} = conn, url) do
96 quality = Config.get!([:media_preview_proxy, :image_quality])
98 with {thumbnail_max_width, thumbnail_max_height} <- thumbnail_max_dimensions(params),
99 {:ok, thumbnail_binary} <-
100 MediaHelper.image_resize(
103 max_width: thumbnail_max_width,
104 max_height: thumbnail_max_height,
110 |> put_preview_response_headers("image/png", "preview.png")
111 |> send_resp(200, thumbnail_binary)
114 send_resp(conn, :failed_dependency, "Can't handle preview.")
118 defp handle_jpeg_preview(%{params: params} = conn, url) do
119 quality = Config.get!([:media_preview_proxy, :image_quality])
121 with {thumbnail_max_width, thumbnail_max_height} <- thumbnail_max_dimensions(params),
122 {:ok, thumbnail_binary} <-
123 MediaHelper.image_resize(
125 %{max_width: thumbnail_max_width, max_height: thumbnail_max_height, quality: quality}
128 |> put_preview_response_headers()
129 |> send_resp(200, thumbnail_binary)
132 send_resp(conn, :failed_dependency, "Can't handle preview.")
136 defp handle_video_preview(conn, url) do
137 with {:ok, thumbnail_binary} <-
138 MediaHelper.video_framegrab(url) do
140 |> put_preview_response_headers()
141 |> send_resp(200, thumbnail_binary)
144 send_resp(conn, :failed_dependency, "Can't handle preview.")
148 defp put_preview_response_headers(conn, content_type \\ "image/jpeg", filename \\ "preview.jpg") do
150 |> put_resp_header("content-type", content_type)
151 |> put_resp_header("content-disposition", "inline; filename=\"#{filename}\"")
152 |> put_resp_header("cache-control", "max-age=0, private, must-revalidate")
155 defp thumbnail_max_dimensions(params) do
156 config = Config.get([:media_preview_proxy], [])
158 thumbnail_max_width =
159 if w = params["thumbnail_max_width"] do
162 Keyword.fetch!(config, :thumbnail_max_width)
165 thumbnail_max_height =
166 if h = params["thumbnail_max_height"] do
169 Keyword.fetch!(config, :thumbnail_max_height)
172 {thumbnail_max_width, thumbnail_max_height}
175 defp preview_head_request_timeout do
176 Keyword.get(media_preview_proxy_opts(), :head_request_max_read_duration) ||
177 Keyword.get(media_proxy_opts(), :max_read_duration) ||
178 ReverseProxy.max_read_duration_default()
181 defp media_proxy_opts do
182 Config.get([:media_proxy, :proxy_opts], [])
185 defp media_preview_proxy_opts do
186 Config.get([:media_preview_proxy, :proxy_opts], [])