defmodule Pleroma.Web.MediaProxy do
alias Pleroma.Config
+ alias Pleroma.Helpers.UriHelper
alias Pleroma.Upload
alias Pleroma.Web
alias Pleroma.Web.MediaProxy.Invalidation
@base64_opts [padding: false]
+ @cache_table :banned_urls_cache
+
+ def cache_table, do: @cache_table
@spec in_banned_urls(String.t()) :: boolean()
- def in_banned_urls(url), do: elem(Cachex.exists?(:banned_urls_cache, url(url)), 1)
+ def in_banned_urls(url), do: elem(Cachex.exists?(@cache_table, url(url)), 1)
def remove_from_banned_urls(urls) when is_list(urls) do
- Cachex.execute!(:banned_urls_cache, fn cache ->
+ Cachex.execute!(@cache_table, fn cache ->
Enum.each(Invalidation.prepare_urls(urls), &Cachex.del(cache, &1))
end)
end
def remove_from_banned_urls(url) when is_binary(url) do
- Cachex.del(:banned_urls_cache, url(url))
+ Cachex.del(@cache_table, url(url))
end
def put_in_banned_urls(urls) when is_list(urls) do
- Cachex.execute!(:banned_urls_cache, fn cache ->
+ Cachex.execute!(@cache_table, fn cache ->
Enum.each(Invalidation.prepare_urls(urls), &Cachex.put(cache, &1, true))
end)
end
def put_in_banned_urls(url) when is_binary(url) do
- Cachex.put(:banned_urls_cache, url(url), true)
+ Cachex.put(@cache_table, url(url), true)
end
def url(url) when is_nil(url) or url == "", do: nil
def url("/" <> _ = url), do: url
def url(url) do
- if not enabled?() or not url_proxiable?(url) do
- url
- else
+ if enabled?() and url_proxiable?(url) do
encode_url(url)
+ else
+ url
end
end
@spec url_proxiable?(String.t()) :: boolean()
def url_proxiable?(url) do
- if local?(url) or whitelisted?(url) do
- false
- else
- true
- end
+ not local?(url) and not whitelisted?(url)
end
- # Note: routing all URLs to preview handler (even local and whitelisted).
- # Preview handler will call url/1 on decoded URLs, and applicable ones will detour media proxy.
- def preview_url(url) do
+ def preview_url(url, preview_params \\ []) do
if preview_enabled?() do
- encode_preview_url(url)
+ encode_preview_url(url, preview_params)
else
- url
+ url(url)
end
end
# Note: media proxy must be enabled for media preview proxy in order to load all
# non-local non-whitelisted URLs through it and be sure that body size constraint is preserved.
- def preview_enabled?, do: enabled?() and Config.get([:media_preview_proxy, :enabled], false)
+ def preview_enabled?, do: enabled?() and !!Config.get([:media_preview_proxy, :enabled])
def local?(url), do: String.starts_with?(url, Pleroma.Web.base_url())
build_url(sig64, base64, filename(url))
end
- def encode_preview_url(url) do
+ def encode_preview_url(url, preview_params \\ []) do
{base64, sig64} = base64_sig64(url)
- build_preview_url(sig64, base64, filename(url))
+ build_preview_url(sig64, base64, filename(url), preview_params)
end
def decode_url(sig, url) do
if path = URI.parse(url_or_path).path, do: Path.basename(path)
end
+ def base_url do
+ Config.get([:media_proxy, :base_url], Web.base_url())
+ end
+
defp proxy_url(path, sig_base64, url_base64, filename) do
[
- Config.get([:media_proxy, :base_url], Web.base_url()),
+ base_url(),
path,
sig_base64,
url_base64,
proxy_url("proxy", sig_base64, url_base64, filename)
end
- def build_preview_url(sig_base64, url_base64, filename \\ nil) do
- proxy_url("proxy/preview", sig_base64, url_base64, filename)
+ def build_preview_url(sig_base64, url_base64, filename \\ nil, preview_params \\ []) do
+ uri = proxy_url("proxy/preview", sig_base64, url_base64, filename)
+
+ UriHelper.modify_uri_params(uri, preview_params)
end
def verify_request_path_and_url(