server.go 6.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280
  1. package main
  2. import (
  3. "bytes"
  4. "compress/gzip"
  5. "context"
  6. "crypto/subtle"
  7. "encoding/base64"
  8. "errors"
  9. "fmt"
  10. "log"
  11. "net"
  12. "net/http"
  13. "net/url"
  14. "strconv"
  15. "strings"
  16. "time"
  17. nanoid "github.com/matoous/go-nanoid"
  18. "golang.org/x/net/netutil"
  19. )
  20. var mimes = map[imageType]string{
  21. JPEG: "image/jpeg",
  22. PNG: "image/png",
  23. WEBP: "image/webp",
  24. }
  25. type httpHandler struct {
  26. sem chan struct{}
  27. }
  28. func newHTTPHandler() *httpHandler {
  29. return &httpHandler{make(chan struct{}, conf.Concurrency)}
  30. }
  31. func startServer() *http.Server {
  32. l, err := net.Listen("tcp", conf.Bind)
  33. if err != nil {
  34. log.Fatal(err)
  35. }
  36. s := &http.Server{
  37. Handler: newHTTPHandler(),
  38. ReadTimeout: time.Duration(conf.ReadTimeout) * time.Second,
  39. MaxHeaderBytes: 1 << 20,
  40. }
  41. go func() {
  42. log.Printf("Starting server at %s\n", conf.Bind)
  43. log.Fatal(s.Serve(netutil.LimitListener(l, conf.MaxClients)))
  44. }()
  45. return s
  46. }
  47. func shutdownServer(s *http.Server) {
  48. log.Println("Shutting down the server...")
  49. ctx, close := context.WithTimeout(context.Background(), 5*time.Second)
  50. defer close()
  51. s.Shutdown(ctx)
  52. }
  53. func parsePath(r *http.Request) (string, processingOptions, error) {
  54. var po processingOptions
  55. var err error
  56. path := r.URL.Path
  57. parts := strings.Split(strings.TrimPrefix(path, "/"), "/")
  58. if len(parts) < 7 {
  59. return "", po, errors.New("Invalid path")
  60. }
  61. token := parts[0]
  62. if err = validatePath(token, strings.TrimPrefix(path, fmt.Sprintf("/%s", token))); err != nil {
  63. return "", po, err
  64. }
  65. if r, ok := resizeTypes[parts[1]]; ok {
  66. po.Resize = r
  67. } else {
  68. return "", po, fmt.Errorf("Invalid resize type: %s", parts[1])
  69. }
  70. if po.Width, err = strconv.Atoi(parts[2]); err != nil {
  71. return "", po, fmt.Errorf("Invalid width: %s", parts[2])
  72. }
  73. if po.Height, err = strconv.Atoi(parts[3]); err != nil {
  74. return "", po, fmt.Errorf("Invalid height: %s", parts[3])
  75. }
  76. if g, ok := gravityTypes[parts[4]]; ok {
  77. po.Gravity = g
  78. } else {
  79. return "", po, fmt.Errorf("Invalid gravity: %s", parts[4])
  80. }
  81. po.Enlarge = parts[5] != "0"
  82. filenameParts := strings.Split(strings.Join(parts[6:], ""), ".")
  83. if len(filenameParts) < 2 {
  84. po.Format = imageTypes["jpg"]
  85. } else if f, ok := imageTypes[filenameParts[1]]; ok {
  86. po.Format = f
  87. } else {
  88. return "", po, fmt.Errorf("Invalid image format: %s", filenameParts[1])
  89. }
  90. if !vipsTypeSupportSave[po.Format] {
  91. return "", po, errors.New("Resulting image type not supported")
  92. }
  93. filename, err := base64.RawURLEncoding.DecodeString(filenameParts[0])
  94. if err != nil {
  95. return "", po, errors.New("Invalid filename encoding")
  96. }
  97. return string(filename), po, nil
  98. }
  99. func logResponse(status int, msg string) {
  100. var color int
  101. if status >= 500 {
  102. color = 31
  103. } else if status >= 400 {
  104. color = 33
  105. } else {
  106. color = 32
  107. }
  108. log.Printf("|\033[7;%dm %d \033[0m| %s\n", color, status, msg)
  109. }
  110. func writeCORS(rw http.ResponseWriter) {
  111. if len(conf.AllowOrigin) > 0 {
  112. rw.Header().Set("Access-Control-Allow-Origin", conf.AllowOrigin)
  113. rw.Header().Set("Access-Control-Allow-Methods", "GET, OPTIONs")
  114. }
  115. }
  116. func respondWithImage(reqID string, r *http.Request, rw http.ResponseWriter, data []byte, imgURL string, po processingOptions, duration time.Duration) {
  117. gzipped := strings.Contains(r.Header.Get("Accept-Encoding"), "gzip") && conf.GZipCompression > 0
  118. rw.Header().Set("Expires", time.Now().Add(time.Second*time.Duration(conf.TTL)).Format(http.TimeFormat))
  119. rw.Header().Set("Cache-Control", fmt.Sprintf("max-age=%d, public", conf.TTL))
  120. rw.Header().Set("Content-Type", mimes[po.Format])
  121. dataToRespond := data
  122. if gzipped {
  123. var buf bytes.Buffer
  124. gz, _ := gzip.NewWriterLevel(&buf, conf.GZipCompression)
  125. gz.Write(data)
  126. gz.Close()
  127. dataToRespond = buf.Bytes()
  128. rw.Header().Set("Content-Encoding", "gzip")
  129. }
  130. rw.Header().Set("Content-Length", strconv.Itoa(len(dataToRespond)))
  131. rw.WriteHeader(200)
  132. rw.Write(dataToRespond)
  133. logResponse(200, fmt.Sprintf("[%s] Processed in %s: %s; %+v", reqID, duration, imgURL, po))
  134. }
  135. func respondWithError(reqID string, rw http.ResponseWriter, err imgproxyError) {
  136. logResponse(err.StatusCode, fmt.Sprintf("[%s] %s", reqID, err.Message))
  137. rw.WriteHeader(err.StatusCode)
  138. rw.Write([]byte(err.PublicMessage))
  139. }
  140. func respondWithOptions(reqID string, rw http.ResponseWriter) {
  141. logResponse(200, fmt.Sprintf("[%s] Respond with options", reqID))
  142. rw.WriteHeader(200)
  143. }
  144. func checkSecret(s string) bool {
  145. if len(conf.Secret) == 0 {
  146. return true
  147. }
  148. return strings.HasPrefix(s, "Bearer ") && subtle.ConstantTimeCompare([]byte(strings.TrimPrefix(s, "Bearer ")), []byte(conf.Secret)) == 1
  149. }
  150. func (h *httpHandler) lock() {
  151. h.sem <- struct{}{}
  152. }
  153. func (h *httpHandler) unlock() {
  154. <-h.sem
  155. }
  156. func (h *httpHandler) ServeHTTP(rw http.ResponseWriter, r *http.Request) {
  157. reqID, _ := nanoid.Nanoid()
  158. defer func() {
  159. if r := recover(); r != nil {
  160. if err, ok := r.(imgproxyError); ok {
  161. respondWithError(reqID, rw, err)
  162. } else {
  163. respondWithError(reqID, rw, newUnexpectedError(r.(error), 4))
  164. }
  165. }
  166. }()
  167. log.Printf("[%s] %s: %s\n", reqID, r.Method, r.URL.RequestURI())
  168. writeCORS(rw)
  169. if r.Method == http.MethodOptions {
  170. respondWithOptions(reqID, rw)
  171. return
  172. }
  173. if r.Method != http.MethodGet {
  174. panic(invalidMethodErr)
  175. }
  176. if !checkSecret(r.Header.Get("Authorization")) {
  177. panic(invalidSecretErr)
  178. }
  179. h.lock()
  180. defer h.unlock()
  181. if r.URL.Path == "/health" {
  182. rw.WriteHeader(200)
  183. rw.Write([]byte("imgproxy is running"))
  184. return
  185. }
  186. t := startTimer(time.Duration(conf.WriteTimeout)*time.Second, "Processing")
  187. imgURL, procOpt, err := parsePath(r)
  188. if err != nil {
  189. panic(newError(404, err.Error(), "Invalid image url"))
  190. }
  191. if _, err = url.ParseRequestURI(imgURL); err != nil {
  192. panic(newError(404, err.Error(), "Invalid image url"))
  193. }
  194. b, imgtype, err := downloadImage(imgURL)
  195. if err != nil {
  196. panic(newError(404, err.Error(), "Image is unreachable"))
  197. }
  198. t.Check()
  199. if conf.ETagEnabled {
  200. eTag := calcETag(b, &procOpt)
  201. rw.Header().Set("ETag", eTag)
  202. if eTag == r.Header.Get("If-None-Match") {
  203. panic(notModifiedErr)
  204. }
  205. }
  206. t.Check()
  207. b, err = processImage(b, imgtype, procOpt, t)
  208. if err != nil {
  209. panic(newError(500, err.Error(), "Error occurred while processing image"))
  210. }
  211. t.Check()
  212. respondWithImage(reqID, r, rw, b, imgURL, procOpt, t.Since())
  213. }