1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.MediaProxy.MediaProxyController do
6 use Pleroma.Web, :controller
9 alias Pleroma.Helpers.MediaHelper
10 alias Pleroma.Helpers.UriHelper
11 alias Pleroma.ReverseProxy
12 alias Pleroma.Web.MediaProxy
15 @min_content_length_for_preview 100 * 1024
17 def remote(conn, %{"sig" => sig64, "url" => url64}) do
18 with {_, true} <- {:enabled, MediaProxy.enabled?()},
19 {:ok, url} <- MediaProxy.decode_url(sig64, url64),
20 {_, false} <- {:in_banned_urls, MediaProxy.in_banned_urls(url)},
21 :ok <- MediaProxy.verify_request_path_and_url(conn, url) do
22 ReverseProxy.call(conn, url, media_proxy_opts())
25 send_resp(conn, 404, Conn.Status.reason_phrase(404))
27 {:in_banned_urls, true} ->
28 send_resp(conn, 404, Conn.Status.reason_phrase(404))
30 {:error, :invalid_signature} ->
31 send_resp(conn, 403, Conn.Status.reason_phrase(403))
33 {:wrong_filename, filename} ->
34 redirect(conn, external: MediaProxy.build_url(sig64, url64, filename))
38 def preview(%Conn{} = conn, %{"sig" => sig64, "url" => url64}) do
39 with {_, true} <- {:enabled, MediaProxy.preview_enabled?()},
40 {:ok, url} <- MediaProxy.decode_url(sig64, url64) do
41 handle_preview(conn, url)
44 send_resp(conn, 404, Conn.Status.reason_phrase(404))
46 {:error, :invalid_signature} ->
47 send_resp(conn, 403, Conn.Status.reason_phrase(403))
49 {:wrong_filename, filename} ->
50 redirect(conn, external: MediaProxy.build_preview_url(sig64, url64, filename))
54 defp handle_preview(conn, url) do
55 media_proxy_url = MediaProxy.url(url)
57 with {:ok, %{status: status} = head_response} when status in 200..299 <-
58 Pleroma.HTTP.request("head", media_proxy_url, [], [], pool: :media) do
59 content_type = Tesla.get_header(head_response, "content-type")
60 content_length = Tesla.get_header(head_response, "content-length")
61 content_length = content_length && String.to_integer(content_length)
63 handle_preview(content_type, content_length, conn, media_proxy_url)
65 # If HEAD failed, redirecting to media proxy URI doesn't make much sense; returning an error
66 {_, %{status: status}} ->
67 send_resp(conn, :failed_dependency, "Can't fetch HTTP headers (HTTP #{status}).")
69 {:error, :recv_response_timeout} ->
70 send_resp(conn, :failed_dependency, "HEAD request timeout.")
73 send_resp(conn, :failed_dependency, "Can't fetch HTTP headers.")
78 "image/gif" = _content_type,
80 %{params: %{"static" => static}} = conn,
83 when static in ["true", true] do
84 handle_jpeg_preview(conn, media_proxy_url)
90 %{params: %{"static" => static}} = conn,
93 when static in ["true", true] do
94 uri_without_static_param = UriHelper.modify_uri_params(current_url(conn), %{}, ["static"])
95 redirect(conn, external: uri_without_static_param)
98 defp handle_preview("image/gif" = _content_type, _content_length, conn, media_proxy_url) do
99 redirect(conn, external: media_proxy_url)
102 defp handle_preview("image/" <> _ = _content_type, content_length, conn, media_proxy_url)
103 when is_integer(content_length) and content_length > 0 and
104 content_length < @min_content_length_for_preview do
105 redirect(conn, external: media_proxy_url)
108 defp handle_preview("image/png" <> _ = _content_type, _content_length, conn, media_proxy_url) do
109 handle_png_preview(conn, media_proxy_url)
112 defp handle_preview("image/" <> _ = _content_type, _content_length, conn, media_proxy_url) do
113 handle_jpeg_preview(conn, media_proxy_url)
116 defp handle_preview("video/" <> _ = _content_type, _content_length, conn, media_proxy_url) do
117 handle_video_preview(conn, media_proxy_url)
120 defp handle_preview(_unsupported_content_type, _content_length, conn, media_proxy_url) do
121 fallback_on_preview_error(conn, media_proxy_url)
124 defp handle_png_preview(conn, media_proxy_url) do
125 quality = Config.get!([:media_preview_proxy, :image_quality])
127 with {thumbnail_max_width, thumbnail_max_height} <- thumbnail_max_dimensions(),
128 {:ok, thumbnail_binary} <-
129 MediaHelper.image_resize(
132 max_width: thumbnail_max_width,
133 max_height: thumbnail_max_height,
139 |> put_preview_response_headers(["image/png", "preview.png"])
140 |> send_resp(200, thumbnail_binary)
143 fallback_on_preview_error(conn, media_proxy_url)
147 defp handle_jpeg_preview(conn, media_proxy_url) do
148 quality = Config.get!([:media_preview_proxy, :image_quality])
150 with {thumbnail_max_width, thumbnail_max_height} <- thumbnail_max_dimensions(),
151 {:ok, thumbnail_binary} <-
152 MediaHelper.image_resize(
154 %{max_width: thumbnail_max_width, max_height: thumbnail_max_height, quality: quality}
157 |> put_preview_response_headers()
158 |> send_resp(200, thumbnail_binary)
161 fallback_on_preview_error(conn, media_proxy_url)
165 defp handle_video_preview(conn, media_proxy_url) do
166 with {:ok, thumbnail_binary} <-
167 MediaHelper.video_framegrab(media_proxy_url) do
169 |> put_preview_response_headers()
170 |> send_resp(200, thumbnail_binary)
173 fallback_on_preview_error(conn, media_proxy_url)
177 defp fallback_on_preview_error(conn, media_proxy_url) do
178 redirect(conn, external: media_proxy_url)
181 defp put_preview_response_headers(
183 [content_type, filename] = _content_info \\ ["image/jpeg", "preview.jpg"]
186 |> put_resp_header("content-type", content_type)
187 |> put_resp_header("content-disposition", "inline; filename=\"#{filename}\"")
188 |> put_resp_header("cache-control", ReverseProxy.default_cache_control_header())
191 defp thumbnail_max_dimensions do
192 config = Config.get([:media_preview_proxy], [])
194 thumbnail_max_width = Keyword.fetch!(config, :thumbnail_max_width)
195 thumbnail_max_height = Keyword.fetch!(config, :thumbnail_max_height)
197 {thumbnail_max_width, thumbnail_max_height}
200 defp media_proxy_opts do
201 Config.get([:media_proxy, :proxy_opts], [])