# Pleroma: A lightweight social networking server # Copyright © 2017-2020 Pleroma Authors # SPDX-License-Identifier: AGPL-3.0-only defmodule Pleroma.Web.MediaProxy.MediaProxyController do use Pleroma.Web, :controller alias Pleroma.Config alias Pleroma.Helpers.MediaHelper alias Pleroma.ReverseProxy alias Pleroma.Web.MediaProxy def remote(conn, %{"sig" => sig64, "url" => url64}) do with {_, true} <- {:enabled, MediaProxy.enabled?()}, {:ok, url} <- MediaProxy.decode_url(sig64, url64), {_, false} <- {:in_banned_urls, MediaProxy.in_banned_urls(url)}, :ok <- MediaProxy.verify_request_path_and_url(conn, url) do proxy_opts = Config.get([:media_proxy, :proxy_opts], []) ReverseProxy.call(conn, url, proxy_opts) else {:enabled, false} -> send_resp(conn, 404, Plug.Conn.Status.reason_phrase(404)) {:in_banned_urls, true} -> send_resp(conn, 404, Plug.Conn.Status.reason_phrase(404)) {:error, :invalid_signature} -> send_resp(conn, 403, Plug.Conn.Status.reason_phrase(403)) {:wrong_filename, filename} -> redirect(conn, external: MediaProxy.build_url(sig64, url64, filename)) end end def preview(conn, %{"sig" => sig64, "url" => url64}) do with {_, true} <- {:enabled, MediaProxy.preview_enabled?()}, {:ok, url} <- MediaProxy.decode_url(sig64, url64), :ok <- MediaProxy.verify_request_path_and_url(conn, url) do handle_preview(conn, url) else {:enabled, false} -> send_resp(conn, 404, Plug.Conn.Status.reason_phrase(404)) {:error, :invalid_signature} -> send_resp(conn, 403, Plug.Conn.Status.reason_phrase(403)) {:wrong_filename, filename} -> redirect(conn, external: MediaProxy.build_preview_url(sig64, url64, filename)) end end defp handle_preview(conn, url) do with {:ok, %{status: status} = head_response} when status in 200..299 <- Tesla.head(url, opts: [adapter: [timeout: preview_head_request_timeout()]]) do content_type = Tesla.get_header(head_response, "content-type") handle_preview(content_type, conn, url) else {_, %{status: status}} -> send_resp(conn, :failed_dependency, "Can't fetch HTTP headers (HTTP #{status}).") {:error, :recv_response_timeout} -> send_resp(conn, :failed_dependency, "HEAD request timeout.") _ -> send_resp(conn, :failed_dependency, "Can't fetch HTTP headers.") end end defp handle_preview("image/" <> _ = _content_type, conn, url) do handle_image_or_video_preview(conn, url) end defp handle_preview("video/" <> _ = _content_type, conn, url) do handle_image_or_video_preview(conn, url) end defp handle_preview(content_type, conn, _url) do send_resp(conn, :unprocessable_entity, "Unsupported content type: #{content_type}.") end defp handle_image_or_video_preview(%{params: params} = conn, url) do with {thumbnail_max_width, thumbnail_max_height} <- thumbnail_max_dimensions(params), media_proxy_url <- MediaProxy.url(url), {:ok, thumbnail_binary} <- MediaHelper.ffmpeg_resize( media_proxy_url, %{max_width: thumbnail_max_width, max_height: thumbnail_max_height} ) do conn |> put_resp_header("content-type", "image/jpeg") |> send_resp(200, thumbnail_binary) else _ -> send_resp(conn, :failed_dependency, "Can't handle preview.") end end defp thumbnail_max_dimensions(params) do config = Config.get([:media_preview_proxy], []) thumbnail_max_width = if w = params["thumbnail_max_width"] do String.to_integer(w) else Keyword.fetch!(config, :thumbnail_max_width) end thumbnail_max_height = if h = params["thumbnail_max_height"] do String.to_integer(h) else Keyword.fetch!(config, :thumbnail_max_height) end {thumbnail_max_width, thumbnail_max_height} end defp preview_head_request_timeout do Config.get([:media_preview_proxy, :proxy_opts, :head_request_max_read_duration]) || preview_timeout() end defp preview_timeout do Config.get([:media_preview_proxy, :proxy_opts, :max_read_duration]) || Config.get([:media_proxy, :proxy_opts, :max_read_duration]) || ReverseProxy.max_read_duration_default() end end