proxy.go 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package ui // import "miniflux.app/v2/internal/ui"
  4. import (
  5. "crypto/hmac"
  6. "crypto/sha256"
  7. "encoding/base64"
  8. "errors"
  9. "fmt"
  10. "log/slog"
  11. "net/http"
  12. "net/url"
  13. "path"
  14. "time"
  15. "miniflux.app/v2/internal/config"
  16. "miniflux.app/v2/internal/crypto"
  17. "miniflux.app/v2/internal/http/request"
  18. "miniflux.app/v2/internal/http/response"
  19. "miniflux.app/v2/internal/http/response/html"
  20. "miniflux.app/v2/internal/reader/rewrite"
  21. )
  22. func (h *handler) mediaProxy(w http.ResponseWriter, r *http.Request) {
  23. // If we receive a "If-None-Match" header, we assume the media is already stored in browser cache.
  24. if r.Header.Get("If-None-Match") != "" {
  25. w.WriteHeader(http.StatusNotModified)
  26. return
  27. }
  28. encodedDigest := request.RouteStringParam(r, "encodedDigest")
  29. encodedURL := request.RouteStringParam(r, "encodedURL")
  30. if encodedURL == "" {
  31. html.BadRequest(w, r, errors.New("no URL provided"))
  32. return
  33. }
  34. decodedDigest, err := base64.URLEncoding.DecodeString(encodedDigest)
  35. if err != nil {
  36. html.BadRequest(w, r, errors.New("unable to decode this digest"))
  37. return
  38. }
  39. decodedURL, err := base64.URLEncoding.DecodeString(encodedURL)
  40. if err != nil {
  41. html.BadRequest(w, r, errors.New("unable to decode this URL"))
  42. return
  43. }
  44. mac := hmac.New(sha256.New, config.Opts.MediaProxyPrivateKey())
  45. mac.Write(decodedURL)
  46. expectedMAC := mac.Sum(nil)
  47. if !hmac.Equal(decodedDigest, expectedMAC) {
  48. html.Forbidden(w, r)
  49. return
  50. }
  51. parsedMediaURL, err := url.Parse(string(decodedURL))
  52. if err != nil {
  53. html.BadRequest(w, r, errors.New("invalid URL provided"))
  54. return
  55. }
  56. if parsedMediaURL.Scheme != "http" && parsedMediaURL.Scheme != "https" {
  57. html.BadRequest(w, r, errors.New("invalid URL provided"))
  58. return
  59. }
  60. if parsedMediaURL.Host == "" {
  61. html.BadRequest(w, r, errors.New("invalid URL provided"))
  62. return
  63. }
  64. if !parsedMediaURL.IsAbs() {
  65. html.BadRequest(w, r, errors.New("invalid URL provided"))
  66. return
  67. }
  68. mediaURL := string(decodedURL)
  69. slog.Debug("MediaProxy: Fetching remote resource",
  70. slog.String("media_url", mediaURL),
  71. )
  72. req, err := http.NewRequest("GET", mediaURL, nil)
  73. if err != nil {
  74. html.ServerError(w, r, err)
  75. return
  76. }
  77. req.Header.Set("Connection", "close")
  78. if referer := rewrite.GetRefererForURL(mediaURL); referer != "" {
  79. req.Header.Set("Referer", referer)
  80. }
  81. forwardedRequestHeader := []string{"Range", "Accept", "Accept-Encoding", "User-Agent"}
  82. for _, requestHeaderName := range forwardedRequestHeader {
  83. if r.Header.Get(requestHeaderName) != "" {
  84. req.Header.Set(requestHeaderName, r.Header.Get(requestHeaderName))
  85. }
  86. }
  87. clt := &http.Client{
  88. Transport: &http.Transport{
  89. IdleConnTimeout: time.Duration(config.Opts.MediaProxyHTTPClientTimeout()) * time.Second,
  90. },
  91. Timeout: time.Duration(config.Opts.MediaProxyHTTPClientTimeout()) * time.Second,
  92. }
  93. resp, err := clt.Do(req)
  94. if err != nil {
  95. slog.Error("MediaProxy: Unable to initialize HTTP client",
  96. slog.String("media_url", mediaURL),
  97. slog.Any("error", err),
  98. )
  99. http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
  100. return
  101. }
  102. defer resp.Body.Close()
  103. if resp.StatusCode == http.StatusRequestedRangeNotSatisfiable {
  104. slog.Warn("MediaProxy: "+http.StatusText(http.StatusRequestedRangeNotSatisfiable),
  105. slog.String("media_url", mediaURL),
  106. slog.Int("status_code", resp.StatusCode),
  107. )
  108. html.RequestedRangeNotSatisfiable(w, r, resp.Header.Get("Content-Range"))
  109. return
  110. }
  111. if resp.StatusCode != http.StatusOK && resp.StatusCode != http.StatusPartialContent {
  112. slog.Warn("MediaProxy: Unexpected response status code",
  113. slog.String("media_url", mediaURL),
  114. slog.Int("status_code", resp.StatusCode),
  115. )
  116. // Forward the status code from the origin.
  117. http.Error(w, fmt.Sprintf("Origin status code is %d", resp.StatusCode), resp.StatusCode)
  118. return
  119. }
  120. etag := crypto.HashFromBytes(decodedURL)
  121. response.New(w, r).WithCaching(etag, 72*time.Hour, func(b *response.Builder) {
  122. b.WithStatus(resp.StatusCode)
  123. b.WithHeader("Content-Security-Policy", response.ContentSecurityPolicyForUntrustedContent)
  124. b.WithHeader("Content-Type", resp.Header.Get("Content-Type"))
  125. if filename := path.Base(parsedMediaURL.Path); filename != "" {
  126. b.WithHeader("Content-Disposition", fmt.Sprintf(`inline; filename="%s"`, filename))
  127. }
  128. forwardedResponseHeader := []string{"Content-Encoding", "Content-Type", "Content-Length", "Accept-Ranges", "Content-Range"}
  129. for _, responseHeaderName := range forwardedResponseHeader {
  130. if resp.Header.Get(responseHeaderName) != "" {
  131. b.WithHeader(responseHeaderName, resp.Header.Get(responseHeaderName))
  132. }
  133. }
  134. b.WithBody(resp.Body)
  135. b.WithoutCompression()
  136. b.Write()
  137. })
  138. }