proxy.go 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package ui // import "miniflux.app/v2/internal/ui"
  4. import (
  5. "crypto/hmac"
  6. "crypto/sha256"
  7. "encoding/base64"
  8. "errors"
  9. "log/slog"
  10. "net/http"
  11. "net/url"
  12. "time"
  13. "miniflux.app/v2/internal/config"
  14. "miniflux.app/v2/internal/crypto"
  15. "miniflux.app/v2/internal/http/request"
  16. "miniflux.app/v2/internal/http/response"
  17. "miniflux.app/v2/internal/http/response/html"
  18. )
  19. func (h *handler) mediaProxy(w http.ResponseWriter, r *http.Request) {
  20. // If we receive a "If-None-Match" header, we assume the media is already stored in browser cache.
  21. if r.Header.Get("If-None-Match") != "" {
  22. w.WriteHeader(http.StatusNotModified)
  23. return
  24. }
  25. encodedDigest := request.RouteStringParam(r, "encodedDigest")
  26. encodedURL := request.RouteStringParam(r, "encodedURL")
  27. if encodedURL == "" {
  28. html.BadRequest(w, r, errors.New("no URL provided"))
  29. return
  30. }
  31. decodedDigest, err := base64.URLEncoding.DecodeString(encodedDigest)
  32. if err != nil {
  33. html.BadRequest(w, r, errors.New("unable to decode this digest"))
  34. return
  35. }
  36. decodedURL, err := base64.URLEncoding.DecodeString(encodedURL)
  37. if err != nil {
  38. html.BadRequest(w, r, errors.New("unable to decode this URL"))
  39. return
  40. }
  41. mac := hmac.New(sha256.New, config.Opts.MediaProxyPrivateKey())
  42. mac.Write(decodedURL)
  43. expectedMAC := mac.Sum(nil)
  44. if !hmac.Equal(decodedDigest, expectedMAC) {
  45. html.Forbidden(w, r)
  46. return
  47. }
  48. u, err := url.Parse(string(decodedURL))
  49. if err != nil {
  50. html.BadRequest(w, r, errors.New("invalid URL provided"))
  51. return
  52. }
  53. if u.Scheme != "http" && u.Scheme != "https" {
  54. html.BadRequest(w, r, errors.New("invalid URL provided"))
  55. return
  56. }
  57. if u.Host == "" {
  58. html.BadRequest(w, r, errors.New("invalid URL provided"))
  59. return
  60. }
  61. if !u.IsAbs() {
  62. html.BadRequest(w, r, errors.New("invalid URL provided"))
  63. return
  64. }
  65. mediaURL := string(decodedURL)
  66. slog.Debug("MediaProxy: Fetching remote resource",
  67. slog.String("media_url", mediaURL),
  68. )
  69. req, err := http.NewRequest("GET", mediaURL, nil)
  70. if err != nil {
  71. html.ServerError(w, r, err)
  72. return
  73. }
  74. // Note: User-Agent HTTP header is omitted to avoid being blocked by bot protection mechanisms.
  75. req.Header.Add("Connection", "close")
  76. forwardedRequestHeader := []string{"Range", "Accept", "Accept-Encoding"}
  77. for _, requestHeaderName := range forwardedRequestHeader {
  78. if r.Header.Get(requestHeaderName) != "" {
  79. req.Header.Add(requestHeaderName, r.Header.Get(requestHeaderName))
  80. }
  81. }
  82. clt := &http.Client{
  83. Transport: &http.Transport{
  84. IdleConnTimeout: time.Duration(config.Opts.MediaProxyHTTPClientTimeout()) * time.Second,
  85. },
  86. Timeout: time.Duration(config.Opts.MediaProxyHTTPClientTimeout()) * time.Second,
  87. }
  88. resp, err := clt.Do(req)
  89. if err != nil {
  90. slog.Error("MediaProxy: Unable to initialize HTTP client",
  91. slog.String("media_url", mediaURL),
  92. slog.Any("error", err),
  93. )
  94. http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  95. return
  96. }
  97. defer resp.Body.Close()
  98. if resp.StatusCode == http.StatusRequestedRangeNotSatisfiable {
  99. slog.Warn("MediaProxy: "+http.StatusText(http.StatusRequestedRangeNotSatisfiable),
  100. slog.String("media_url", mediaURL),
  101. slog.Int("status_code", resp.StatusCode),
  102. )
  103. html.RequestedRangeNotSatisfiable(w, r, resp.Header.Get("Content-Range"))
  104. return
  105. }
  106. if resp.StatusCode != http.StatusOK && resp.StatusCode != http.StatusPartialContent {
  107. slog.Warn("MediaProxy: Unexpected response status code",
  108. slog.String("media_url", mediaURL),
  109. slog.Int("status_code", resp.StatusCode),
  110. )
  111. html.NotFound(w, r)
  112. return
  113. }
  114. etag := crypto.HashFromBytes(decodedURL)
  115. response.New(w, r).WithCaching(etag, 72*time.Hour, func(b *response.Builder) {
  116. b.WithStatus(resp.StatusCode)
  117. b.WithHeader("Content-Security-Policy", `default-src 'self'`)
  118. b.WithHeader("Content-Type", resp.Header.Get("Content-Type"))
  119. forwardedResponseHeader := []string{"Content-Encoding", "Content-Type", "Content-Length", "Accept-Ranges", "Content-Range"}
  120. for _, responseHeaderName := range forwardedResponseHeader {
  121. if resp.Header.Get(responseHeaderName) != "" {
  122. b.WithHeader(responseHeaderName, resp.Header.Get(responseHeaderName))
  123. }
  124. }
  125. b.WithBody(resp.Body)
  126. b.WithoutCompression()
  127. b.Write()
  128. })
  129. }