123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313 |
- package imagedata
- import (
- "compress/gzip"
- "context"
- "fmt"
- "io"
- "net/http"
- "net/http/cookiejar"
- "regexp"
- "strconv"
- "strings"
- "time"
- "github.com/imgproxy/imgproxy/v3/config"
- "github.com/imgproxy/imgproxy/v3/ierrors"
- "github.com/imgproxy/imgproxy/v3/security"
- defaultTransport "github.com/imgproxy/imgproxy/v3/transport"
- azureTransport "github.com/imgproxy/imgproxy/v3/transport/azure"
- transportCommon "github.com/imgproxy/imgproxy/v3/transport/common"
- fsTransport "github.com/imgproxy/imgproxy/v3/transport/fs"
- gcsTransport "github.com/imgproxy/imgproxy/v3/transport/gcs"
- s3Transport "github.com/imgproxy/imgproxy/v3/transport/s3"
- swiftTransport "github.com/imgproxy/imgproxy/v3/transport/swift"
- )
- var (
- downloadClient *http.Client
- enabledSchemes = map[string]struct{}{
- "http": {},
- "https": {},
- }
- imageHeadersToStore = []string{
- "Cache-Control",
- "Expires",
- "ETag",
- "Last-Modified",
- }
- contentRangeRe = regexp.MustCompile(`^bytes ((\d+)-(\d+)|\*)/(\d+|\*)$`)
- // For tests
- redirectAllRequestsTo string
- )
- const msgSourceImageIsUnreachable = "Source image is unreachable"
- type DownloadOptions struct {
- Header http.Header
- CookieJar http.CookieJar
- }
- func initDownloading() error {
- transport, err := defaultTransport.New(true)
- if err != nil {
- return err
- }
- registerProtocol := func(scheme string, rt http.RoundTripper) {
- transport.RegisterProtocol(scheme, rt)
- enabledSchemes[scheme] = struct{}{}
- }
- if config.LocalFileSystemRoot != "" {
- registerProtocol("local", fsTransport.New())
- }
- if config.S3Enabled {
- if t, err := s3Transport.New(); err != nil {
- return err
- } else {
- registerProtocol("s3", t)
- }
- }
- if config.GCSEnabled {
- if t, err := gcsTransport.New(); err != nil {
- return err
- } else {
- registerProtocol("gs", t)
- }
- }
- if config.ABSEnabled {
- if t, err := azureTransport.New(); err != nil {
- return err
- } else {
- registerProtocol("abs", t)
- }
- }
- if config.SwiftEnabled {
- if t, err := swiftTransport.New(); err != nil {
- return err
- } else {
- registerProtocol("swift", t)
- }
- }
- downloadClient = &http.Client{
- Transport: transport,
- CheckRedirect: func(req *http.Request, via []*http.Request) error {
- redirects := len(via)
- if redirects >= config.MaxRedirects {
- return fmt.Errorf("stopped after %d redirects", redirects)
- }
- return nil
- },
- }
- return nil
- }
- func headersToStore(res *http.Response) map[string]string {
- m := make(map[string]string)
- for _, h := range imageHeadersToStore {
- if val := res.Header.Get(h); len(val) != 0 {
- m[h] = val
- }
- }
- return m
- }
- func BuildImageRequest(ctx context.Context, imageURL string, header http.Header, jar http.CookieJar) (*http.Request, context.CancelFunc, error) {
- reqCtx, reqCancel := context.WithTimeout(ctx, time.Duration(config.DownloadTimeout)*time.Second)
- imageURL = transportCommon.EscapeURL(imageURL)
- req, err := http.NewRequestWithContext(reqCtx, "GET", imageURL, nil)
- if err != nil {
- reqCancel()
- return nil, func() {}, newImageRequestError(err)
- }
- if _, ok := enabledSchemes[req.URL.Scheme]; !ok {
- reqCancel()
- return nil, func() {}, newImageRequstSchemeError(req.URL.Scheme)
- }
- if jar != nil {
- for _, cookie := range jar.Cookies(req.URL) {
- req.AddCookie(cookie)
- }
- }
- req.Header.Set("User-Agent", config.UserAgent)
- for k, v := range header {
- if len(v) > 0 {
- req.Header.Set(k, v[0])
- }
- }
- return req, reqCancel, nil
- }
- func SendRequest(req *http.Request) (*http.Response, error) {
- var client *http.Client
- if req.URL.Scheme == "http" || req.URL.Scheme == "https" {
- clientCopy := *downloadClient
- jar, err := cookiejar.New(nil)
- if err != nil {
- return nil, err
- }
- clientCopy.Jar = jar
- client = &clientCopy
- } else {
- client = downloadClient
- }
- for {
- res, err := client.Do(req)
- if err == nil {
- return res, nil
- }
- if res != nil && res.Body != nil {
- res.Body.Close()
- }
- if strings.Contains(err.Error(), "client connection lost") {
- select {
- case <-req.Context().Done():
- return nil, err
- case <-time.After(100 * time.Microsecond):
- continue
- }
- }
- return nil, wrapError(err)
- }
- }
- func requestImage(ctx context.Context, imageURL string, opts DownloadOptions) (*http.Response, context.CancelFunc, error) {
- req, reqCancel, err := BuildImageRequest(ctx, imageURL, opts.Header, opts.CookieJar)
- if err != nil {
- reqCancel()
- return nil, func() {}, err
- }
- res, err := SendRequest(req)
- if err != nil {
- reqCancel()
- return nil, func() {}, err
- }
- if res.StatusCode == http.StatusNotModified {
- res.Body.Close()
- reqCancel()
- return nil, func() {}, newNotModifiedError(headersToStore(res))
- }
- // If the source responds with 206, check if the response contains entire image.
- // If not, return an error.
- if res.StatusCode == http.StatusPartialContent {
- contentRange := res.Header.Get("Content-Range")
- rangeParts := contentRangeRe.FindStringSubmatch(contentRange)
- if len(rangeParts) == 0 {
- res.Body.Close()
- reqCancel()
- return nil, func() {}, newImagePartialResponseError("Partial response with invalid Content-Range header")
- }
- if rangeParts[1] == "*" || rangeParts[2] != "0" {
- res.Body.Close()
- reqCancel()
- return nil, func() {}, newImagePartialResponseError("Partial response with incomplete content")
- }
- contentLengthStr := rangeParts[4]
- if contentLengthStr == "*" {
- contentLengthStr = res.Header.Get("Content-Length")
- }
- contentLength, _ := strconv.Atoi(contentLengthStr)
- rangeEnd, _ := strconv.Atoi(rangeParts[3])
- if contentLength <= 0 || rangeEnd != contentLength-1 {
- res.Body.Close()
- reqCancel()
- return nil, func() {}, newImagePartialResponseError("Partial response with incomplete content")
- }
- } else if res.StatusCode != http.StatusOK {
- var body string
- if strings.HasPrefix(res.Header.Get("Content-Type"), "text/") {
- bbody, _ := io.ReadAll(io.LimitReader(res.Body, 1024))
- body = string(bbody)
- }
- res.Body.Close()
- reqCancel()
- return nil, func() {}, newImageResponseStatusError(res.StatusCode, body)
- }
- return res, reqCancel, nil
- }
- func download(ctx context.Context, imageURL string, opts DownloadOptions, secopts security.Options) (*ImageData, error) {
- // We use this for testing
- if len(redirectAllRequestsTo) > 0 {
- imageURL = redirectAllRequestsTo
- }
- res, reqCancel, err := requestImage(ctx, imageURL, opts)
- defer reqCancel()
- if res != nil {
- defer res.Body.Close()
- }
- if err != nil {
- return nil, err
- }
- body := res.Body
- contentLength := int(res.ContentLength)
- if res.Header.Get("Content-Encoding") == "gzip" {
- gzipBody, errGzip := gzip.NewReader(res.Body)
- if gzipBody != nil {
- defer gzipBody.Close()
- }
- if errGzip != nil {
- return nil, err
- }
- body = gzipBody
- contentLength = 0
- }
- imgdata, err := readAndCheckImage(body, contentLength, secopts)
- if err != nil {
- return nil, ierrors.Wrap(err, 0)
- }
- imgdata.Headers = headersToStore(res)
- return imgdata, nil
- }
- func RedirectAllRequestsTo(u string) {
- redirectAllRequestsTo = u
- }
- func StopRedirectingRequests() {
- redirectAllRequestsTo = ""
- }
|