2023-06-19 17:42:47 -04:00
|
|
|
// SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
|
|
|
|
// SPDX-License-Identifier: Apache-2.0
|
2017-11-20 00:10:04 -05:00
|
|
|
|
2018-10-07 21:42:43 -04:00
|
|
|
package ui // import "miniflux.app/ui"
|
2017-11-20 00:10:04 -05:00
|
|
|
|
|
|
|
import (
|
2022-10-15 02:17:17 -04:00
|
|
|
"crypto/hmac"
|
|
|
|
"crypto/sha256"
|
2017-11-20 00:10:04 -05:00
|
|
|
"encoding/base64"
|
|
|
|
"errors"
|
2018-04-29 19:35:04 -04:00
|
|
|
"net/http"
|
2017-11-20 00:10:04 -05:00
|
|
|
"time"
|
2017-11-22 02:09:01 -05:00
|
|
|
|
2019-08-14 11:54:02 -04:00
|
|
|
"miniflux.app/config"
|
2018-08-25 00:51:50 -04:00
|
|
|
"miniflux.app/crypto"
|
|
|
|
"miniflux.app/http/request"
|
|
|
|
"miniflux.app/http/response"
|
|
|
|
"miniflux.app/http/response/html"
|
2019-09-22 14:17:15 -04:00
|
|
|
"miniflux.app/logger"
|
2017-11-20 00:10:04 -05:00
|
|
|
)
|
|
|
|
|
2023-02-25 03:36:19 -05:00
|
|
|
func (h *handler) mediaProxy(w http.ResponseWriter, r *http.Request) {
|
|
|
|
// If we receive a "If-None-Match" header, we assume the media is already stored in browser cache.
|
2018-04-29 19:35:04 -04:00
|
|
|
if r.Header.Get("If-None-Match") != "" {
|
2018-10-07 21:42:43 -04:00
|
|
|
w.WriteHeader(http.StatusNotModified)
|
2017-11-22 02:09:01 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-10-15 02:17:17 -04:00
|
|
|
encodedDigest := request.RouteStringParam(r, "encodedDigest")
|
2018-09-24 00:02:26 -04:00
|
|
|
encodedURL := request.RouteStringParam(r, "encodedURL")
|
2017-11-20 00:10:04 -05:00
|
|
|
if encodedURL == "" {
|
2018-10-07 21:42:43 -04:00
|
|
|
html.BadRequest(w, r, errors.New("No URL provided"))
|
2017-11-20 00:10:04 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-10-15 02:17:17 -04:00
|
|
|
decodedDigest, err := base64.URLEncoding.DecodeString(encodedDigest)
|
|
|
|
if err != nil {
|
|
|
|
html.BadRequest(w, r, errors.New("Unable to decode this Digest"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-12-18 21:06:53 -05:00
|
|
|
decodedURL, err := base64.URLEncoding.DecodeString(encodedURL)
|
2017-11-20 00:10:04 -05:00
|
|
|
if err != nil {
|
2018-10-07 21:42:43 -04:00
|
|
|
html.BadRequest(w, r, errors.New("Unable to decode this URL"))
|
2017-11-20 00:10:04 -05:00
|
|
|
return
|
2022-10-15 02:17:17 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
mac := hmac.New(sha256.New, config.Opts.ProxyPrivateKey())
|
|
|
|
mac.Write(decodedURL)
|
|
|
|
expectedMAC := mac.Sum(nil)
|
|
|
|
|
|
|
|
if !hmac.Equal(decodedDigest, expectedMAC) {
|
|
|
|
html.Forbidden(w, r)
|
|
|
|
return
|
2017-11-20 00:10:04 -05:00
|
|
|
}
|
|
|
|
|
2023-02-25 03:36:19 -05:00
|
|
|
mediaURL := string(decodedURL)
|
|
|
|
logger.Debug(`[Proxy] Fetching %q`, mediaURL)
|
2019-09-22 14:17:15 -04:00
|
|
|
|
2023-02-25 03:36:19 -05:00
|
|
|
req, err := http.NewRequest("GET", mediaURL, nil)
|
2017-11-20 00:10:04 -05:00
|
|
|
if err != nil {
|
2018-10-07 21:42:43 -04:00
|
|
|
html.ServerError(w, r, err)
|
2017-11-20 00:10:04 -05:00
|
|
|
return
|
|
|
|
}
|
2022-01-09 23:18:08 -05:00
|
|
|
|
|
|
|
// Note: User-Agent HTTP header is omitted to avoid being blocked by bot protection mechanisms.
|
2019-08-14 11:54:02 -04:00
|
|
|
req.Header.Add("Connection", "close")
|
2017-11-20 00:10:04 -05:00
|
|
|
|
2023-02-25 03:36:19 -05:00
|
|
|
forwardedRequestHeader := []string{"Range", "Accept", "Accept-Encoding"}
|
|
|
|
for _, requestHeaderName := range forwardedRequestHeader {
|
|
|
|
if r.Header.Get(requestHeaderName) != "" {
|
|
|
|
req.Header.Add(requestHeaderName, r.Header.Get(requestHeaderName))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-14 11:54:02 -04:00
|
|
|
clt := &http.Client{
|
2023-02-25 03:36:19 -05:00
|
|
|
Transport: &http.Transport{
|
|
|
|
IdleConnTimeout: time.Duration(config.Opts.ProxyHTTPClientTimeout()) * time.Second,
|
|
|
|
},
|
|
|
|
Timeout: time.Duration(config.Opts.ProxyHTTPClientTimeout()) * time.Second,
|
2019-08-14 11:54:02 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := clt.Do(req)
|
|
|
|
if err != nil {
|
2023-03-13 01:15:43 -04:00
|
|
|
logger.Error(`[Proxy] Unable to initialize HTTP client: %v`, err)
|
|
|
|
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
2019-08-14 11:54:02 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
2023-02-25 03:36:19 -05:00
|
|
|
if resp.StatusCode == http.StatusRequestedRangeNotSatisfiable {
|
|
|
|
logger.Error(`[Proxy] Status Code is %d for URL %q`, resp.StatusCode, mediaURL)
|
|
|
|
html.RequestedRangeNotSatisfiable(w, r, resp.Header.Get("Content-Range"))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if resp.StatusCode != http.StatusOK && resp.StatusCode != http.StatusPartialContent {
|
|
|
|
logger.Error(`[Proxy] Status Code is %d for URL %q`, resp.StatusCode, mediaURL)
|
2018-10-07 21:42:43 -04:00
|
|
|
html.NotFound(w, r)
|
2017-11-20 00:10:04 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-08-14 11:54:02 -04:00
|
|
|
etag := crypto.HashFromBytes(decodedURL)
|
2017-11-20 00:10:04 -05:00
|
|
|
|
2019-08-14 11:54:02 -04:00
|
|
|
response.New(w, r).WithCaching(etag, 72*time.Hour, func(b *response.Builder) {
|
2023-02-25 03:36:19 -05:00
|
|
|
b.WithStatus(resp.StatusCode)
|
2022-01-02 20:24:49 -05:00
|
|
|
b.WithHeader("Content-Security-Policy", `default-src 'self'`)
|
2019-08-14 11:54:02 -04:00
|
|
|
b.WithHeader("Content-Type", resp.Header.Get("Content-Type"))
|
2023-02-25 03:36:19 -05:00
|
|
|
forwardedResponseHeader := []string{"Content-Encoding", "Content-Type", "Content-Length", "Accept-Ranges", "Content-Range"}
|
|
|
|
for _, responseHeaderName := range forwardedResponseHeader {
|
|
|
|
if resp.Header.Get(responseHeaderName) != "" {
|
|
|
|
b.WithHeader(responseHeaderName, resp.Header.Get(responseHeaderName))
|
|
|
|
}
|
|
|
|
}
|
2019-08-14 11:54:02 -04:00
|
|
|
b.WithBody(resp.Body)
|
2018-10-07 21:42:43 -04:00
|
|
|
b.WithoutCompression()
|
|
|
|
b.Write()
|
|
|
|
})
|
2017-11-20 00:10:04 -05:00
|
|
|
}
|