qb_akkoma/lib/pleroma/plugs/uploaded_media.ex

108 lines
2.8 KiB
Elixir
Raw Normal View History

# Pleroma: A lightweight social networking server
2020-03-03 22:44:49 +00:00
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
# SPDX-License-Identifier: AGPL-3.0-only
2018-11-23 16:40:45 +00:00
defmodule Pleroma.Plugs.UploadedMedia do
@moduledoc """
"""
import Plug.Conn
import Pleroma.Web.Gettext
2018-11-23 16:40:45 +00:00
require Logger
2020-06-14 18:02:57 +00:00
alias Pleroma.Web.MediaProxy
2018-11-23 16:40:45 +00:00
@behaviour Plug
# no slashes
@path "media"
@default_cache_control_header "public, max-age=1209600"
2018-11-23 16:40:45 +00:00
def init(_opts) do
static_plug_opts =
[
headers: %{"cache-control" => @default_cache_control_header},
cache_control_for_etags: @default_cache_control_header
]
2018-11-23 16:40:45 +00:00
|> Keyword.put(:from, "__unconfigured_media_plug")
|> Keyword.put(:at, "/__unconfigured_media_plug")
|> Plug.Static.init()
%{static_plug_opts: static_plug_opts}
end
2019-02-06 19:19:39 +00:00
def call(%{request_path: <<"/", @path, "/", file::binary>>} = conn, opts) do
2019-03-12 06:10:19 +00:00
conn =
case fetch_query_params(conn) do
%{query_params: %{"name" => name}} = conn ->
name = String.replace(name, "\"", "\\\"")
2020-06-14 18:02:57 +00:00
put_resp_header(conn, "content-disposition", "filename=\"#{name}\"")
2019-03-12 06:10:19 +00:00
conn ->
conn
end
2020-04-15 10:05:22 +00:00
|> merge_resp_headers([{"content-security-policy", "sandbox"}])
2019-03-12 06:10:19 +00:00
config = Pleroma.Config.get(Pleroma.Upload)
2018-11-23 16:40:45 +00:00
with uploader <- Keyword.fetch!(config, :uploader),
proxy_remote = Keyword.get(config, :proxy_remote, false),
2020-06-14 18:02:57 +00:00
{:ok, get_method} <- uploader.get_file(file),
false <- media_is_banned(conn, get_method) do
2018-11-23 16:40:45 +00:00
get_media(conn, get_method, proxy_remote, opts)
else
_ ->
conn
|> send_resp(:internal_server_error, dgettext("errors", "Failed"))
2018-11-23 16:40:45 +00:00
|> halt()
end
end
def call(conn, _opts), do: conn
defp media_is_banned(%{request_path: path} = _conn, {:static_dir, _}) do
MediaProxy.in_banned_urls(Pleroma.Web.base_url() <> path)
2020-06-14 18:02:57 +00:00
end
defp media_is_banned(_, {:url, url}), do: MediaProxy.in_banned_urls(url)
2020-06-14 18:02:57 +00:00
defp media_is_banned(_, _), do: false
2020-06-14 18:02:57 +00:00
2018-11-23 16:40:45 +00:00
defp get_media(conn, {:static_dir, directory}, _, opts) do
static_opts =
Map.get(opts, :static_plug_opts)
|> Map.put(:at, [@path])
|> Map.put(:from, directory)
conn = Plug.Static.call(conn, static_opts)
if conn.halted do
conn
else
conn
2019-07-10 10:40:34 +00:00
|> send_resp(:not_found, dgettext("errors", "Not found"))
2018-11-23 16:40:45 +00:00
|> halt()
end
end
defp get_media(conn, {:url, url}, true, _) do
conn
|> Pleroma.ReverseProxy.call(url, Pleroma.Config.get([Pleroma.Upload, :proxy_opts], []))
end
defp get_media(conn, {:url, url}, _, _) do
conn
|> Phoenix.Controller.redirect(external: url)
|> halt()
end
defp get_media(conn, unknown, _, _) do
Logger.error("#{__MODULE__}: Unknown get startegy: #{inspect(unknown)}")
conn
2019-07-10 10:40:34 +00:00
|> send_resp(:internal_server_error, dgettext("errors", "Internal Error"))
2018-11-23 16:40:45 +00:00
|> halt()
end
end