proxy.go 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package ui // import "miniflux.app/v2/internal/ui"
  4. import (
  5. "crypto/hmac"
  6. "crypto/sha256"
  7. "encoding/base64"
  8. "errors"
  9. "log/slog"
  10. "net/http"
  11. "net/url"
  12. "path"
  13. "strconv"
  14. "time"
  15. "miniflux.app/v2/internal/config"
  16. "miniflux.app/v2/internal/crypto"
  17. "miniflux.app/v2/internal/http/request"
  18. "miniflux.app/v2/internal/http/response"
  19. "miniflux.app/v2/internal/http/response/html"
  20. "miniflux.app/v2/internal/reader/fetcher"
  21. "miniflux.app/v2/internal/reader/rewrite"
  22. "miniflux.app/v2/internal/urllib"
  23. )
  24. func (h *handler) mediaProxy(w http.ResponseWriter, r *http.Request) {
  25. // If we receive a "If-None-Match" header, we assume the media is already stored in browser cache.
  26. if r.Header.Get("If-None-Match") != "" {
  27. w.WriteHeader(http.StatusNotModified)
  28. return
  29. }
  30. encodedURL := request.RouteStringParam(r, "encodedURL")
  31. if encodedURL == "" {
  32. html.BadRequest(w, r, errors.New("no URL provided"))
  33. return
  34. }
  35. encodedDigest := request.RouteStringParam(r, "encodedDigest")
  36. decodedDigest, err := base64.URLEncoding.DecodeString(encodedDigest)
  37. if err != nil {
  38. html.BadRequest(w, r, errors.New("unable to decode this digest"))
  39. return
  40. }
  41. decodedURL, err := base64.URLEncoding.DecodeString(encodedURL)
  42. if err != nil {
  43. html.BadRequest(w, r, errors.New("unable to decode this URL"))
  44. return
  45. }
  46. mac := hmac.New(sha256.New, config.Opts.MediaProxyPrivateKey())
  47. mac.Write(decodedURL)
  48. expectedMAC := mac.Sum(nil)
  49. if !hmac.Equal(decodedDigest, expectedMAC) {
  50. html.Forbidden(w, r)
  51. return
  52. }
  53. parsedMediaURL, err := url.Parse(string(decodedURL))
  54. if err != nil {
  55. html.BadRequest(w, r, errors.New("invalid URL provided"))
  56. return
  57. }
  58. if parsedMediaURL.Scheme != "http" && parsedMediaURL.Scheme != "https" {
  59. html.BadRequest(w, r, errors.New("invalid URL provided"))
  60. return
  61. }
  62. if parsedMediaURL.Host == "" {
  63. html.BadRequest(w, r, errors.New("invalid URL provided"))
  64. return
  65. }
  66. if !parsedMediaURL.IsAbs() {
  67. html.BadRequest(w, r, errors.New("invalid URL provided"))
  68. return
  69. }
  70. mediaURL := string(decodedURL)
  71. if !config.Opts.MediaProxyAllowPrivateNetworks() {
  72. if isPrivate, err := urllib.ResolvesToPrivateIP(parsedMediaURL.Hostname()); err != nil {
  73. slog.Warn("MediaProxy: Unable to resolve hostname",
  74. slog.String("media_url", mediaURL),
  75. slog.Any("error", err),
  76. )
  77. html.Forbidden(w, r)
  78. return
  79. } else if isPrivate {
  80. slog.Warn("MediaProxy: Refusing to access private IP address",
  81. slog.String("media_url", mediaURL),
  82. )
  83. html.Forbidden(w, r)
  84. return
  85. }
  86. }
  87. slog.Debug("MediaProxy: Fetching remote resource",
  88. slog.String("media_url", mediaURL),
  89. )
  90. requestBuilder := fetcher.NewRequestBuilder()
  91. requestBuilder.WithTimeout(config.Opts.MediaProxyHTTPClientTimeout())
  92. // Disable compression for the media proxy requests (not implemented).
  93. requestBuilder.WithoutCompression()
  94. if referer := rewrite.GetRefererForURL(mediaURL); referer != "" {
  95. requestBuilder.WithHeader("Referer", referer)
  96. }
  97. forwardedRequestHeader := [...]string{"Range", "Accept", "Accept-Encoding", "User-Agent"}
  98. for _, requestHeaderName := range forwardedRequestHeader {
  99. if r.Header.Get(requestHeaderName) != "" {
  100. requestBuilder.WithHeader(requestHeaderName, r.Header.Get(requestHeaderName))
  101. }
  102. }
  103. resp, err := requestBuilder.ExecuteRequest(mediaURL)
  104. if err != nil {
  105. slog.Error("MediaProxy: Unable to initialize HTTP client",
  106. slog.String("media_url", mediaURL),
  107. slog.Any("error", err),
  108. )
  109. http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  110. return
  111. }
  112. defer resp.Body.Close()
  113. if resp.StatusCode == http.StatusRequestedRangeNotSatisfiable {
  114. slog.Warn("MediaProxy: "+http.StatusText(http.StatusRequestedRangeNotSatisfiable),
  115. slog.String("media_url", mediaURL),
  116. slog.Int("status_code", resp.StatusCode),
  117. )
  118. html.RequestedRangeNotSatisfiable(w, r, resp.Header.Get("Content-Range"))
  119. return
  120. }
  121. if resp.StatusCode != http.StatusOK && resp.StatusCode != http.StatusPartialContent {
  122. slog.Warn("MediaProxy: Unexpected response status code",
  123. slog.String("media_url", mediaURL),
  124. slog.Int("status_code", resp.StatusCode),
  125. )
  126. // Forward the status code from the origin.
  127. http.Error(w, "Origin status code is "+strconv.Itoa(resp.StatusCode), resp.StatusCode)
  128. return
  129. }
  130. etag := crypto.HashFromBytes(decodedURL)
  131. response.New(w, r).WithCaching(etag, 72*time.Hour, func(b *response.Builder) {
  132. b.WithStatus(resp.StatusCode)
  133. b.WithHeader("Content-Security-Policy", response.ContentSecurityPolicyForUntrustedContent)
  134. b.WithHeader("Content-Type", resp.Header.Get("Content-Type"))
  135. if filename := path.Base(parsedMediaURL.Path); filename != "" {
  136. b.WithHeader("Content-Disposition", `inline; filename="`+filename+`"`)
  137. }
  138. forwardedResponseHeader := [...]string{"Content-Encoding", "Content-Type", "Content-Length", "Accept-Ranges", "Content-Range"}
  139. for _, responseHeaderName := range forwardedResponseHeader {
  140. if resp.Header.Get(responseHeaderName) != "" {
  141. b.WithHeader(responseHeaderName, resp.Header.Get(responseHeaderName))
  142. }
  143. }
  144. b.WithBody(resp.Body)
  145. b.WithoutCompression()
  146. b.Write()
  147. })
  148. }