proxy.go 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package ui // import "miniflux.app/v2/internal/ui"
  4. import (
  5. "crypto/hmac"
  6. "crypto/sha256"
  7. "encoding/base64"
  8. "errors"
  9. "net/http"
  10. "time"
  11. "miniflux.app/v2/internal/config"
  12. "miniflux.app/v2/internal/crypto"
  13. "miniflux.app/v2/internal/http/request"
  14. "miniflux.app/v2/internal/http/response"
  15. "miniflux.app/v2/internal/http/response/html"
  16. "miniflux.app/v2/internal/logger"
  17. )
  18. func (h *handler) mediaProxy(w http.ResponseWriter, r *http.Request) {
  19. // If we receive a "If-None-Match" header, we assume the media is already stored in browser cache.
  20. if r.Header.Get("If-None-Match") != "" {
  21. w.WriteHeader(http.StatusNotModified)
  22. return
  23. }
  24. encodedDigest := request.RouteStringParam(r, "encodedDigest")
  25. encodedURL := request.RouteStringParam(r, "encodedURL")
  26. if encodedURL == "" {
  27. html.BadRequest(w, r, errors.New("No URL provided"))
  28. return
  29. }
  30. decodedDigest, err := base64.URLEncoding.DecodeString(encodedDigest)
  31. if err != nil {
  32. html.BadRequest(w, r, errors.New("Unable to decode this Digest"))
  33. return
  34. }
  35. decodedURL, err := base64.URLEncoding.DecodeString(encodedURL)
  36. if err != nil {
  37. html.BadRequest(w, r, errors.New("Unable to decode this URL"))
  38. return
  39. }
  40. mac := hmac.New(sha256.New, config.Opts.ProxyPrivateKey())
  41. mac.Write(decodedURL)
  42. expectedMAC := mac.Sum(nil)
  43. if !hmac.Equal(decodedDigest, expectedMAC) {
  44. html.Forbidden(w, r)
  45. return
  46. }
  47. mediaURL := string(decodedURL)
  48. logger.Debug(`[Proxy] Fetching %q`, mediaURL)
  49. req, err := http.NewRequest("GET", mediaURL, nil)
  50. if err != nil {
  51. html.ServerError(w, r, err)
  52. return
  53. }
  54. // Note: User-Agent HTTP header is omitted to avoid being blocked by bot protection mechanisms.
  55. req.Header.Add("Connection", "close")
  56. forwardedRequestHeader := []string{"Range", "Accept", "Accept-Encoding"}
  57. for _, requestHeaderName := range forwardedRequestHeader {
  58. if r.Header.Get(requestHeaderName) != "" {
  59. req.Header.Add(requestHeaderName, r.Header.Get(requestHeaderName))
  60. }
  61. }
  62. clt := &http.Client{
  63. Transport: &http.Transport{
  64. IdleConnTimeout: time.Duration(config.Opts.ProxyHTTPClientTimeout()) * time.Second,
  65. },
  66. Timeout: time.Duration(config.Opts.ProxyHTTPClientTimeout()) * time.Second,
  67. }
  68. resp, err := clt.Do(req)
  69. if err != nil {
  70. logger.Error(`[Proxy] Unable to initialize HTTP client: %v`, err)
  71. http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  72. return
  73. }
  74. defer resp.Body.Close()
  75. if resp.StatusCode == http.StatusRequestedRangeNotSatisfiable {
  76. logger.Error(`[Proxy] Status Code is %d for URL %q`, resp.StatusCode, mediaURL)
  77. html.RequestedRangeNotSatisfiable(w, r, resp.Header.Get("Content-Range"))
  78. return
  79. }
  80. if resp.StatusCode != http.StatusOK && resp.StatusCode != http.StatusPartialContent {
  81. logger.Error(`[Proxy] Status Code is %d for URL %q`, resp.StatusCode, mediaURL)
  82. html.NotFound(w, r)
  83. return
  84. }
  85. etag := crypto.HashFromBytes(decodedURL)
  86. response.New(w, r).WithCaching(etag, 72*time.Hour, func(b *response.Builder) {
  87. b.WithStatus(resp.StatusCode)
  88. b.WithHeader("Content-Security-Policy", `default-src 'self'`)
  89. b.WithHeader("Content-Type", resp.Header.Get("Content-Type"))
  90. forwardedResponseHeader := []string{"Content-Encoding", "Content-Type", "Content-Length", "Accept-Ranges", "Content-Range"}
  91. for _, responseHeaderName := range forwardedResponseHeader {
  92. if resp.Header.Get(responseHeaderName) != "" {
  93. b.WithHeader(responseHeaderName, resp.Header.Get(responseHeaderName))
  94. }
  95. }
  96. b.WithBody(resp.Body)
  97. b.WithoutCompression()
  98. b.Write()
  99. })
  100. }