超好用的图片处理工具,可配合minio实现如阿里云的图片处理查询
|
há 8 anos atrás | |
---|---|---|
vendor | há 8 anos atrás | |
.dockerignore | há 8 anos atrás | |
.gitignore | há 8 anos atrás | |
Dockerfile | há 8 anos atrás | |
LICENSE | há 8 anos atrás | |
README.md | há 8 anos atrás | |
config.go | há 8 anos atrás | |
crypt.go | há 8 anos atrás | |
download.go | há 8 anos atrás | |
glide.lock | há 8 anos atrás | |
glide.yaml | há 8 anos atrás | |
main.go | há 8 anos atrás | |
process.go | há 8 anos atrás | |
server.go | há 8 anos atrás |
Fast and secure micro-service for resizing and converting remote images.
Imgproxy does one thing, and it does it well: resizing of remote images. It works great when you need to resize some images on the fly to make them look good on your web page. The main principles of Imgproxy are simplicity, speed, and security.
One of the things I believe in is: "The best feature is the one you don't need to implement." That's why I implemented only features that most of us need. Rotation, flip, flop, etc. are cool, but I don't think that you want to process your web page images that ways, especially when you can do this with CSS.
Imgproxy uses probably the most efficient image processing library - libvips. It's fast and requires low memory footprint. Thus it allows processing a massive amount of images on the fly.
Also, imgproxy uses native Go's net/http routing for an absolute speed.
Processing of remote images is a quite vulnerable thing. There are many ways to attack you, so it's a good idea to take measures to prevent attacks. There is what imgproxy does:
It checks image type and dimensions while downloading, so the image won't be fully downloaded if it has an unknown format or too big dimensions. Thus imgproxy protects you from image bombs like https://www.bamsoftware.com/hacks/deflate.html
Imgproxy protects its URL path with a signature, so it can't be easily compromised by an attacker. Thus imgproxy doesn't allow to use itself by third-party applications.
Imgproxy supports authorization by HTTP header. This prevents using imgproxy directly by an attacker but allows to use it through CDN or a caching server.
Install vips. On macOS you can do:
$ brew tap homebrew/science
$ brew install vips
Install imgproxy itself
$ go get github.com/DarthSim/imgproxy
Imgproxy is 12factor-ready and can be configured with env variables:
You can also specify paths to a files with hex-encoded key and salt:
imgproxy -keypath /path/to/file/with/key -salt /path/to/file/with/salt
Here is a short ruby sample which shows how to generate url path for imgproxy.
require 'openssl'
require 'base64'
# Key and salt. Since they're hex-encoded, we should decode it.
key = ['943b421c9eb07c830af81030552c86009268de4e532ba2ee2eab8247c6da0881'].pack("H*")
salt = ['520f986b998545b4785e0defbc4f3c1203f22de2374a3d53cb7a7fe9fea309c5'].pack("H*")
# This is remote url with requested image
url = "http://img.example.com/pretty/image.jpg"
# Url should be encoded with base64 and could be splitted
encodedUrl = Base64.urlsafe_encode64(url).tr("=", "").scan(/.{1,16}/).join("/")
# Allowed values for resize are: fill, fit, crop and resize
resize = 'fill'
width = 300
height = 300
# Allowed values for gravity are: no (north), so (south), ea (east), we (west)
# ce (center) and sm (smart). "sm" works correctly only with resize == crop.
gravity = 'no'
# Should we enlarge small images? 1 for yes, and 0 for no.
enlarge = 1
# Allowed extensions are png and jpg/jpeg.
extension = 'png'
path = "/#{resize}/#{width}/#{height}/#{gravity}/#{enlarge}/#{encodedUrl}.#{extension}"
# Now we need to sign path with HMAC (SHA256)
digest = OpenSSL::Digest.new('sha256')
hmac = Base64.urlsafe_encode64(OpenSSL::HMAC.digest(digest, key, "#{salt}#{path}")).tr('=', '')
signed_path = "/#{hmac}#{path}"