projects
/
akkoma
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Add unit test for Pleroma API app controller
[akkoma]
/
lib
/
pleroma
/
web
/
media_proxy.ex
diff --git
a/lib/pleroma/web/media_proxy.ex
b/lib/pleroma/web/media_proxy.ex
index 8656b8cad31eb12910d10556ee58f741c34f48a8..0b232f14b583854e2e13990ea094f8d5dfba6192 100644
(file)
--- a/
lib/pleroma/web/media_proxy.ex
+++ b/
lib/pleroma/web/media_proxy.ex
@@
-1,40
+1,42
@@
# Pleroma: A lightweight social networking server
# Pleroma: A lightweight social networking server
-# Copyright © 2017-202
0
Pleroma Authors <https://pleroma.social/>
+# Copyright © 2017-202
1
Pleroma Authors <https://pleroma.social/>
# SPDX-License-Identifier: AGPL-3.0-only
defmodule Pleroma.Web.MediaProxy do
alias Pleroma.Config
alias Pleroma.Helpers.UriHelper
alias Pleroma.Upload
# SPDX-License-Identifier: AGPL-3.0-only
defmodule Pleroma.Web.MediaProxy do
alias Pleroma.Config
alias Pleroma.Helpers.UriHelper
alias Pleroma.Upload
- alias Pleroma.Web
+ alias Pleroma.Web
.Endpoint
alias Pleroma.Web.MediaProxy.Invalidation
@base64_opts [padding: false]
@cache_table :banned_urls_cache
alias Pleroma.Web.MediaProxy.Invalidation
@base64_opts [padding: false]
@cache_table :banned_urls_cache
+ @cachex Pleroma.Config.get([:cachex, :provider], Cachex)
+
def cache_table, do: @cache_table
@spec in_banned_urls(String.t()) :: boolean()
def cache_table, do: @cache_table
@spec in_banned_urls(String.t()) :: boolean()
- def in_banned_urls(url), do: elem(
C
achex.exists?(@cache_table, url(url)), 1)
+ def in_banned_urls(url), do: elem(
@c
achex.exists?(@cache_table, url(url)), 1)
def remove_from_banned_urls(urls) when is_list(urls) do
def remove_from_banned_urls(urls) when is_list(urls) do
-
C
achex.execute!(@cache_table, fn cache ->
- Enum.each(Invalidation.prepare_urls(urls), &
C
achex.del(cache, &1))
+
@c
achex.execute!(@cache_table, fn cache ->
+ Enum.each(Invalidation.prepare_urls(urls), &
@c
achex.del(cache, &1))
end)
end
def remove_from_banned_urls(url) when is_binary(url) do
end)
end
def remove_from_banned_urls(url) when is_binary(url) do
-
C
achex.del(@cache_table, url(url))
+
@c
achex.del(@cache_table, url(url))
end
def put_in_banned_urls(urls) when is_list(urls) do
end
def put_in_banned_urls(urls) when is_list(urls) do
-
C
achex.execute!(@cache_table, fn cache ->
- Enum.each(Invalidation.prepare_urls(urls), &
C
achex.put(cache, &1, true))
+
@c
achex.execute!(@cache_table, fn cache ->
+ Enum.each(Invalidation.prepare_urls(urls), &
@c
achex.put(cache, &1, true))
end)
end
def put_in_banned_urls(url) when is_binary(url) do
end)
end
def put_in_banned_urls(url) when is_binary(url) do
-
C
achex.put(@cache_table, url(url), true)
+
@c
achex.put(@cache_table, url(url), true)
end
def url(url) when is_nil(url) or url == "", do: nil
end
def url(url) when is_nil(url) or url == "", do: nil
@@
-67,7
+69,7
@@
defmodule Pleroma.Web.MediaProxy do
# non-local non-whitelisted URLs through it and be sure that body size constraint is preserved.
def preview_enabled?, do: enabled?() and !!Config.get([:media_preview_proxy, :enabled])
# non-local non-whitelisted URLs through it and be sure that body size constraint is preserved.
def preview_enabled?, do: enabled?() and !!Config.get([:media_preview_proxy, :enabled])
- def local?(url), do: String.starts_with?(url,
Pleroma.Web.base_
url())
+ def local?(url), do: String.starts_with?(url,
Endpoint.
url())
def whitelisted?(url) do
%{host: domain} = URI.parse(url)
def whitelisted?(url) do
%{host: domain} = URI.parse(url)
@@
-75,17
+77,10
@@
defmodule Pleroma.Web.MediaProxy do
mediaproxy_whitelist_domains =
[:media_proxy, :whitelist]
|> Config.get()
mediaproxy_whitelist_domains =
[:media_proxy, :whitelist]
|> Config.get()
+ |> Kernel.++(["#{Upload.base_url()}"])
|> Enum.map(&maybe_get_domain_from_url/1)
|> Enum.map(&maybe_get_domain_from_url/1)
- whitelist_domains =
- if base_url = Config.get([Upload, :base_url]) do
- %{host: base_domain} = URI.parse(base_url)
- [base_domain | mediaproxy_whitelist_domains]
- else
- mediaproxy_whitelist_domains
- end
-
- domain in whitelist_domains
+ domain in mediaproxy_whitelist_domains
end
defp maybe_get_domain_from_url("http" <> _ = url) do
end
defp maybe_get_domain_from_url("http" <> _ = url) do
@@
-126,8
+121,13
@@
defmodule Pleroma.Web.MediaProxy do
end
end
end
end
+ def decode_url(encoded) do
+ [_, "proxy", sig, base64 | _] = URI.parse(encoded).path |> String.split("/")
+ decode_url(sig, base64)
+ end
+
defp signed_url(url) do
defp signed_url(url) do
- :crypto.
hmac(:sha, Config.get([Web.
Endpoint, :secret_key_base]), url)
+ :crypto.
mac(:hmac, :sha, Config.get([
Endpoint, :secret_key_base]), url)
end
def filename(url_or_path) do
end
def filename(url_or_path) do
@@
-135,7
+135,7
@@
defmodule Pleroma.Web.MediaProxy do
end
def base_url do
end
def base_url do
- Config.get([:media_proxy, :base_url],
Web.base_
url())
+ Config.get([:media_proxy, :base_url],
Endpoint.
url())
end
defp proxy_url(path, sig_base64, url_base64, filename) do
end
defp proxy_url(path, sig_base64, url_base64, filename) do