processing_handler_test.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530
  1. package main
  2. import (
  3. "bytes"
  4. "fmt"
  5. "io"
  6. "net/http"
  7. "net/http/httptest"
  8. "os"
  9. "path/filepath"
  10. "regexp"
  11. "strings"
  12. "testing"
  13. "github.com/imgproxy/imgproxy/v3/config"
  14. "github.com/imgproxy/imgproxy/v3/config/configurators"
  15. "github.com/imgproxy/imgproxy/v3/etag"
  16. "github.com/imgproxy/imgproxy/v3/imagedata"
  17. "github.com/imgproxy/imgproxy/v3/imagemeta"
  18. "github.com/imgproxy/imgproxy/v3/imagetype"
  19. "github.com/imgproxy/imgproxy/v3/options"
  20. "github.com/imgproxy/imgproxy/v3/router"
  21. "github.com/imgproxy/imgproxy/v3/svg"
  22. "github.com/imgproxy/imgproxy/v3/vips"
  23. "github.com/sirupsen/logrus"
  24. "github.com/stretchr/testify/require"
  25. "github.com/stretchr/testify/suite"
  26. )
  27. type ProcessingHandlerTestSuite struct {
  28. suite.Suite
  29. router *router.Router
  30. }
  31. func (s *ProcessingHandlerTestSuite) SetupSuite() {
  32. config.Reset()
  33. wd, err := os.Getwd()
  34. require.Nil(s.T(), err)
  35. config.LocalFileSystemRoot = filepath.Join(wd, "/testdata")
  36. err = initialize()
  37. require.Nil(s.T(), err)
  38. logrus.SetOutput(io.Discard)
  39. s.router = buildRouter()
  40. }
  41. func (s *ProcessingHandlerTestSuite) TeardownSuite() {
  42. shutdown()
  43. logrus.SetOutput(os.Stdout)
  44. }
  45. func (s *ProcessingHandlerTestSuite) SetupTest() {
  46. // We don't need config.LocalFileSystemRoot anymore as it is used
  47. // only during initialization
  48. config.Reset()
  49. }
  50. func (s *ProcessingHandlerTestSuite) send(path string, header ...http.Header) *httptest.ResponseRecorder {
  51. req := httptest.NewRequest(http.MethodGet, path, nil)
  52. rw := httptest.NewRecorder()
  53. if len(header) > 0 {
  54. req.Header = header[0]
  55. }
  56. s.router.ServeHTTP(rw, req)
  57. return rw
  58. }
  59. func (s *ProcessingHandlerTestSuite) readTestFile(name string) []byte {
  60. wd, err := os.Getwd()
  61. require.Nil(s.T(), err)
  62. data, err := os.ReadFile(filepath.Join(wd, "testdata", name))
  63. require.Nil(s.T(), err)
  64. return data
  65. }
  66. func (s *ProcessingHandlerTestSuite) readBody(res *http.Response) []byte {
  67. data, err := io.ReadAll(res.Body)
  68. require.Nil(s.T(), err)
  69. return data
  70. }
  71. func (s *ProcessingHandlerTestSuite) sampleETagData(imgETag string) (string, *imagedata.ImageData, string) {
  72. poStr := "rs:fill:4:4"
  73. po := options.NewProcessingOptions()
  74. po.ResizingType = options.ResizeFill
  75. po.Width = 4
  76. po.Height = 4
  77. imgdata := imagedata.ImageData{
  78. Type: imagetype.PNG,
  79. Data: s.readTestFile("test1.png"),
  80. }
  81. if len(imgETag) != 0 {
  82. imgdata.Headers = map[string]string{"ETag": imgETag}
  83. }
  84. var h etag.Handler
  85. h.SetActualProcessingOptions(po)
  86. h.SetActualImageData(&imgdata)
  87. return poStr, &imgdata, h.GenerateActualETag()
  88. }
  89. func (s *ProcessingHandlerTestSuite) TestRequest() {
  90. rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.png")
  91. res := rw.Result()
  92. require.Equal(s.T(), 200, res.StatusCode)
  93. require.Equal(s.T(), "image/png", res.Header.Get("Content-Type"))
  94. meta, err := imagemeta.DecodeMeta(res.Body)
  95. require.Nil(s.T(), err)
  96. require.Equal(s.T(), imagetype.PNG, meta.Format())
  97. require.Equal(s.T(), 4, meta.Width())
  98. require.Equal(s.T(), 4, meta.Height())
  99. }
  100. func (s *ProcessingHandlerTestSuite) TestSignatureValidationFailure() {
  101. config.Keys = [][]byte{[]byte("test-key")}
  102. config.Salts = [][]byte{[]byte("test-salt")}
  103. rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.png")
  104. res := rw.Result()
  105. require.Equal(s.T(), 403, res.StatusCode)
  106. }
  107. func (s *ProcessingHandlerTestSuite) TestSignatureValidationSuccess() {
  108. config.Keys = [][]byte{[]byte("test-key")}
  109. config.Salts = [][]byte{[]byte("test-salt")}
  110. rw := s.send("/My9d3xq_PYpVHsPrCyww0Kh1w5KZeZhIlWhsa4az1TI/rs:fill:4:4/plain/local:///test1.png")
  111. res := rw.Result()
  112. require.Equal(s.T(), 200, res.StatusCode)
  113. }
  114. func (s *ProcessingHandlerTestSuite) TestSourceValidation() {
  115. imagedata.RedirectAllRequestsTo("local:///test1.png")
  116. defer imagedata.StopRedirectingRequests()
  117. tt := []struct {
  118. name string
  119. allowedSources []string
  120. requestPath string
  121. expectedError bool
  122. }{
  123. {
  124. name: "match http URL without wildcard",
  125. allowedSources: []string{"local://", "http://images.dev/"},
  126. requestPath: "/unsafe/plain/http://images.dev/lorem/ipsum.jpg",
  127. expectedError: false,
  128. },
  129. {
  130. name: "match http URL with wildcard in hostname single level",
  131. allowedSources: []string{"local://", "http://*.mycdn.dev/"},
  132. requestPath: "/unsafe/plain/http://a-1.mycdn.dev/lorem/ipsum.jpg",
  133. expectedError: false,
  134. },
  135. {
  136. name: "match http URL with wildcard in hostname multiple levels",
  137. allowedSources: []string{"local://", "http://*.mycdn.dev/"},
  138. requestPath: "/unsafe/plain/http://a-1.b-2.mycdn.dev/lorem/ipsum.jpg",
  139. expectedError: false,
  140. },
  141. {
  142. name: "no match s3 URL with allowed local and http URLs",
  143. allowedSources: []string{"local://", "http://images.dev/"},
  144. requestPath: "/unsafe/plain/s3://images/lorem/ipsum.jpg",
  145. expectedError: true,
  146. },
  147. {
  148. name: "no match http URL with wildcard in hostname including slash",
  149. allowedSources: []string{"local://", "http://*.mycdn.dev/"},
  150. requestPath: "/unsafe/plain/http://other.dev/.mycdn.dev/lorem/ipsum.jpg",
  151. expectedError: true,
  152. },
  153. }
  154. for _, tc := range tt {
  155. s.T().Run(tc.name, func(t *testing.T) {
  156. exps := make([]*regexp.Regexp, len(tc.allowedSources))
  157. for i, pattern := range tc.allowedSources {
  158. exps[i] = configurators.RegexpFromPattern(pattern)
  159. }
  160. config.AllowedSources = exps
  161. rw := s.send(tc.requestPath)
  162. res := rw.Result()
  163. if tc.expectedError {
  164. require.Equal(s.T(), 404, res.StatusCode)
  165. } else {
  166. require.Equal(s.T(), 200, res.StatusCode)
  167. }
  168. })
  169. }
  170. }
  171. func (s *ProcessingHandlerTestSuite) TestSourceFormatNotSupported() {
  172. vips.DisableLoadSupport(imagetype.PNG)
  173. defer vips.ResetLoadSupport()
  174. rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.png")
  175. res := rw.Result()
  176. require.Equal(s.T(), 422, res.StatusCode)
  177. }
  178. func (s *ProcessingHandlerTestSuite) TestResultingFormatNotSupported() {
  179. vips.DisableSaveSupport(imagetype.PNG)
  180. defer vips.ResetSaveSupport()
  181. rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.png@png")
  182. res := rw.Result()
  183. require.Equal(s.T(), 422, res.StatusCode)
  184. }
  185. func (s *ProcessingHandlerTestSuite) TestSkipProcessingConfig() {
  186. config.SkipProcessingFormats = []imagetype.Type{imagetype.PNG}
  187. rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.png")
  188. res := rw.Result()
  189. require.Equal(s.T(), 200, res.StatusCode)
  190. actual := s.readBody(res)
  191. expected := s.readTestFile("test1.png")
  192. require.True(s.T(), bytes.Equal(expected, actual))
  193. }
  194. func (s *ProcessingHandlerTestSuite) TestSkipProcessingPO() {
  195. rw := s.send("/unsafe/rs:fill:4:4/skp:png/plain/local:///test1.png")
  196. res := rw.Result()
  197. require.Equal(s.T(), 200, res.StatusCode)
  198. actual := s.readBody(res)
  199. expected := s.readTestFile("test1.png")
  200. require.True(s.T(), bytes.Equal(expected, actual))
  201. }
  202. func (s *ProcessingHandlerTestSuite) TestSkipProcessingSameFormat() {
  203. config.SkipProcessingFormats = []imagetype.Type{imagetype.PNG}
  204. rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.png@png")
  205. res := rw.Result()
  206. require.Equal(s.T(), 200, res.StatusCode)
  207. actual := s.readBody(res)
  208. expected := s.readTestFile("test1.png")
  209. require.True(s.T(), bytes.Equal(expected, actual))
  210. }
  211. func (s *ProcessingHandlerTestSuite) TestSkipProcessingDifferentFormat() {
  212. config.SkipProcessingFormats = []imagetype.Type{imagetype.PNG}
  213. rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.png@jpg")
  214. res := rw.Result()
  215. require.Equal(s.T(), 200, res.StatusCode)
  216. actual := s.readBody(res)
  217. expected := s.readTestFile("test1.png")
  218. require.False(s.T(), bytes.Equal(expected, actual))
  219. }
  220. func (s *ProcessingHandlerTestSuite) TestSkipProcessingSVG() {
  221. rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.svg")
  222. res := rw.Result()
  223. require.Equal(s.T(), 200, res.StatusCode)
  224. actual := s.readBody(res)
  225. expected, err := svg.Satitize(&imagedata.ImageData{Data: s.readTestFile("test1.svg")})
  226. require.Nil(s.T(), err)
  227. require.True(s.T(), bytes.Equal(expected.Data, actual))
  228. }
  229. func (s *ProcessingHandlerTestSuite) TestNotSkipProcessingSVGToJPG() {
  230. rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.svg@jpg")
  231. res := rw.Result()
  232. require.Equal(s.T(), 200, res.StatusCode)
  233. actual := s.readBody(res)
  234. expected := s.readTestFile("test1.svg")
  235. require.False(s.T(), bytes.Equal(expected, actual))
  236. }
  237. func (s *ProcessingHandlerTestSuite) TestErrorSavingToSVG() {
  238. rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.png@svg")
  239. res := rw.Result()
  240. require.Equal(s.T(), 422, res.StatusCode)
  241. }
  242. func (s *ProcessingHandlerTestSuite) TestCacheControlPassthrough() {
  243. config.CacheControlPassthrough = true
  244. ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
  245. rw.Header().Set("Cache-Control", "fake-cache-control")
  246. rw.Header().Set("Expires", "fake-expires")
  247. rw.WriteHeader(200)
  248. rw.Write(s.readTestFile("test1.png"))
  249. }))
  250. defer ts.Close()
  251. rw := s.send("/unsafe/rs:fill:4:4/plain/" + ts.URL)
  252. res := rw.Result()
  253. require.Equal(s.T(), "fake-cache-control", res.Header.Get("Cache-Control"))
  254. require.Equal(s.T(), "fake-expires", res.Header.Get("Expires"))
  255. }
  256. func (s *ProcessingHandlerTestSuite) TestCacheControlPassthroughDisabled() {
  257. config.CacheControlPassthrough = false
  258. ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
  259. rw.Header().Set("Cache-Control", "fake-cache-control")
  260. rw.Header().Set("Expires", "fake-expires")
  261. rw.WriteHeader(200)
  262. rw.Write(s.readTestFile("test1.png"))
  263. }))
  264. defer ts.Close()
  265. rw := s.send("/unsafe/rs:fill:4:4/plain/" + ts.URL)
  266. res := rw.Result()
  267. require.NotEqual(s.T(), "fake-cache-control", res.Header.Get("Cache-Control"))
  268. require.NotEqual(s.T(), "fake-expires", res.Header.Get("Expires"))
  269. }
  270. func (s *ProcessingHandlerTestSuite) TestETagDisabled() {
  271. config.ETagEnabled = false
  272. rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.png")
  273. res := rw.Result()
  274. require.Equal(s.T(), 200, res.StatusCode)
  275. require.Empty(s.T(), res.Header.Get("ETag"))
  276. }
  277. func (s *ProcessingHandlerTestSuite) TestETagReqNoIfNotModified() {
  278. config.ETagEnabled = true
  279. poStr, imgdata, etag := s.sampleETagData("loremipsumdolor")
  280. ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
  281. require.Empty(s.T(), r.Header.Get("If-None-Match"))
  282. rw.Header().Set("ETag", imgdata.Headers["ETag"])
  283. rw.WriteHeader(200)
  284. rw.Write(s.readTestFile("test1.png"))
  285. }))
  286. defer ts.Close()
  287. rw := s.send(fmt.Sprintf("/unsafe/%s/plain/%s", poStr, ts.URL))
  288. res := rw.Result()
  289. require.Equal(s.T(), 200, res.StatusCode)
  290. require.Equal(s.T(), etag, res.Header.Get("ETag"))
  291. }
  292. func (s *ProcessingHandlerTestSuite) TestETagDataNoIfNotModified() {
  293. config.ETagEnabled = true
  294. poStr, imgdata, etag := s.sampleETagData("")
  295. ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
  296. require.Empty(s.T(), r.Header.Get("If-None-Match"))
  297. rw.WriteHeader(200)
  298. rw.Write(imgdata.Data)
  299. }))
  300. defer ts.Close()
  301. rw := s.send(fmt.Sprintf("/unsafe/%s/plain/%s", poStr, ts.URL))
  302. res := rw.Result()
  303. require.Equal(s.T(), 200, res.StatusCode)
  304. require.Equal(s.T(), etag, res.Header.Get("ETag"))
  305. }
  306. func (s *ProcessingHandlerTestSuite) TestETagReqMatch() {
  307. config.ETagEnabled = true
  308. poStr, imgdata, etag := s.sampleETagData(`"loremipsumdolor"`)
  309. ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
  310. require.Equal(s.T(), imgdata.Headers["ETag"], r.Header.Get("If-None-Match"))
  311. rw.WriteHeader(304)
  312. }))
  313. defer ts.Close()
  314. header := make(http.Header)
  315. header.Set("If-None-Match", etag)
  316. rw := s.send(fmt.Sprintf("/unsafe/%s/plain/%s", poStr, ts.URL), header)
  317. res := rw.Result()
  318. require.Equal(s.T(), 304, res.StatusCode)
  319. require.Equal(s.T(), etag, res.Header.Get("ETag"))
  320. }
  321. func (s *ProcessingHandlerTestSuite) TestETagDataMatch() {
  322. config.ETagEnabled = true
  323. poStr, imgdata, etag := s.sampleETagData("")
  324. ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
  325. require.Empty(s.T(), r.Header.Get("If-None-Match"))
  326. rw.WriteHeader(200)
  327. rw.Write(imgdata.Data)
  328. }))
  329. defer ts.Close()
  330. header := make(http.Header)
  331. header.Set("If-None-Match", etag)
  332. rw := s.send(fmt.Sprintf("/unsafe/%s/plain/%s", poStr, ts.URL), header)
  333. res := rw.Result()
  334. require.Equal(s.T(), 304, res.StatusCode)
  335. require.Equal(s.T(), etag, res.Header.Get("ETag"))
  336. }
  337. func (s *ProcessingHandlerTestSuite) TestETagReqNotMatch() {
  338. config.ETagEnabled = true
  339. poStr, imgdata, actualETag := s.sampleETagData(`"loremipsumdolor"`)
  340. _, _, expectedETag := s.sampleETagData(`"loremipsum"`)
  341. ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
  342. require.Equal(s.T(), `"loremipsum"`, r.Header.Get("If-None-Match"))
  343. rw.Header().Set("ETag", imgdata.Headers["ETag"])
  344. rw.WriteHeader(200)
  345. rw.Write(imgdata.Data)
  346. }))
  347. defer ts.Close()
  348. header := make(http.Header)
  349. header.Set("If-None-Match", expectedETag)
  350. rw := s.send(fmt.Sprintf("/unsafe/%s/plain/%s", poStr, ts.URL), header)
  351. res := rw.Result()
  352. require.Equal(s.T(), 200, res.StatusCode)
  353. require.Equal(s.T(), actualETag, res.Header.Get("ETag"))
  354. }
  355. func (s *ProcessingHandlerTestSuite) TestETagDataNotMatch() {
  356. config.ETagEnabled = true
  357. poStr, imgdata, actualETag := s.sampleETagData("")
  358. // Change the data hash
  359. expectedETag := actualETag[:strings.IndexByte(actualETag, '/')] + "/Dasdbefj"
  360. ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
  361. require.Empty(s.T(), r.Header.Get("If-None-Match"))
  362. rw.WriteHeader(200)
  363. rw.Write(imgdata.Data)
  364. }))
  365. defer ts.Close()
  366. header := make(http.Header)
  367. header.Set("If-None-Match", expectedETag)
  368. rw := s.send(fmt.Sprintf("/unsafe/%s/plain/%s", poStr, ts.URL), header)
  369. res := rw.Result()
  370. require.Equal(s.T(), 200, res.StatusCode)
  371. require.Equal(s.T(), actualETag, res.Header.Get("ETag"))
  372. }
  373. func (s *ProcessingHandlerTestSuite) TestETagProcessingOptionsNotMatch() {
  374. config.ETagEnabled = true
  375. poStr, imgdata, actualETag := s.sampleETagData("")
  376. // Change the processing options hash
  377. expectedETag := "abcdefj" + actualETag[strings.IndexByte(actualETag, '/'):]
  378. ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
  379. require.Empty(s.T(), r.Header.Get("If-None-Match"))
  380. rw.Header().Set("ETag", imgdata.Headers["ETag"])
  381. rw.WriteHeader(200)
  382. rw.Write(imgdata.Data)
  383. }))
  384. defer ts.Close()
  385. header := make(http.Header)
  386. header.Set("If-None-Match", expectedETag)
  387. rw := s.send(fmt.Sprintf("/unsafe/%s/plain/%s", poStr, ts.URL), header)
  388. res := rw.Result()
  389. require.Equal(s.T(), 200, res.StatusCode)
  390. require.Equal(s.T(), actualETag, res.Header.Get("ETag"))
  391. }
  392. func TestProcessingHandler(t *testing.T) {
  393. suite.Run(t, new(ProcessingHandlerTestSuite))
  394. }