proxy.go 3.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package ui // import "miniflux.app/v2/internal/ui"
  4. import (
  5. "crypto/hmac"
  6. "crypto/sha256"
  7. "encoding/base64"
  8. "errors"
  9. "log/slog"
  10. "net/http"
  11. "time"
  12. "miniflux.app/v2/internal/config"
  13. "miniflux.app/v2/internal/crypto"
  14. "miniflux.app/v2/internal/http/request"
  15. "miniflux.app/v2/internal/http/response"
  16. "miniflux.app/v2/internal/http/response/html"
  17. )
  18. func (h *handler) mediaProxy(w http.ResponseWriter, r *http.Request) {
  19. // If we receive a "If-None-Match" header, we assume the media is already stored in browser cache.
  20. if r.Header.Get("If-None-Match") != "" {
  21. w.WriteHeader(http.StatusNotModified)
  22. return
  23. }
  24. encodedDigest := request.RouteStringParam(r, "encodedDigest")
  25. encodedURL := request.RouteStringParam(r, "encodedURL")
  26. if encodedURL == "" {
  27. html.BadRequest(w, r, errors.New("no URL provided"))
  28. return
  29. }
  30. decodedDigest, err := base64.URLEncoding.DecodeString(encodedDigest)
  31. if err != nil {
  32. html.BadRequest(w, r, errors.New("unable to decode this digest"))
  33. return
  34. }
  35. decodedURL, err := base64.URLEncoding.DecodeString(encodedURL)
  36. if err != nil {
  37. html.BadRequest(w, r, errors.New("unable to decode this URL"))
  38. return
  39. }
  40. mac := hmac.New(sha256.New, config.Opts.ProxyPrivateKey())
  41. mac.Write(decodedURL)
  42. expectedMAC := mac.Sum(nil)
  43. if !hmac.Equal(decodedDigest, expectedMAC) {
  44. html.Forbidden(w, r)
  45. return
  46. }
  47. mediaURL := string(decodedURL)
  48. slog.Debug("MediaProxy: Fetching remote resource",
  49. slog.String("media_url", mediaURL),
  50. )
  51. req, err := http.NewRequest("GET", mediaURL, nil)
  52. if err != nil {
  53. html.ServerError(w, r, err)
  54. return
  55. }
  56. // Note: User-Agent HTTP header is omitted to avoid being blocked by bot protection mechanisms.
  57. req.Header.Add("Connection", "close")
  58. forwardedRequestHeader := []string{"Range", "Accept", "Accept-Encoding"}
  59. for _, requestHeaderName := range forwardedRequestHeader {
  60. if r.Header.Get(requestHeaderName) != "" {
  61. req.Header.Add(requestHeaderName, r.Header.Get(requestHeaderName))
  62. }
  63. }
  64. clt := &http.Client{
  65. Transport: &http.Transport{
  66. IdleConnTimeout: time.Duration(config.Opts.ProxyHTTPClientTimeout()) * time.Second,
  67. },
  68. Timeout: time.Duration(config.Opts.ProxyHTTPClientTimeout()) * time.Second,
  69. }
  70. resp, err := clt.Do(req)
  71. if err != nil {
  72. slog.Error("MediaProxy: Unable to initialize HTTP client",
  73. slog.String("media_url", mediaURL),
  74. slog.Any("error", err),
  75. )
  76. http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  77. return
  78. }
  79. defer resp.Body.Close()
  80. if resp.StatusCode == http.StatusRequestedRangeNotSatisfiable {
  81. slog.Warn("MediaProxy: "+http.StatusText(http.StatusRequestedRangeNotSatisfiable),
  82. slog.String("media_url", mediaURL),
  83. slog.Int("status_code", resp.StatusCode),
  84. )
  85. html.RequestedRangeNotSatisfiable(w, r, resp.Header.Get("Content-Range"))
  86. return
  87. }
  88. if resp.StatusCode != http.StatusOK && resp.StatusCode != http.StatusPartialContent {
  89. slog.Warn("MediaProxy: Unexpected response status code",
  90. slog.String("media_url", mediaURL),
  91. slog.Int("status_code", resp.StatusCode),
  92. )
  93. html.NotFound(w, r)
  94. return
  95. }
  96. etag := crypto.HashFromBytes(decodedURL)
  97. response.New(w, r).WithCaching(etag, 72*time.Hour, func(b *response.Builder) {
  98. b.WithStatus(resp.StatusCode)
  99. b.WithHeader("Content-Security-Policy", `default-src 'self'`)
  100. b.WithHeader("Content-Type", resp.Header.Get("Content-Type"))
  101. forwardedResponseHeader := []string{"Content-Encoding", "Content-Type", "Content-Length", "Accept-Ranges", "Content-Range"}
  102. for _, responseHeaderName := range forwardedResponseHeader {
  103. if resp.Header.Get(responseHeaderName) != "" {
  104. b.WithHeader(responseHeaderName, resp.Header.Get(responseHeaderName))
  105. }
  106. }
  107. b.WithBody(resp.Body)
  108. b.WithoutCompression()
  109. b.Write()
  110. })
  111. }