mirror of
https://github.com/imgproxy/imgproxy.git
synced 2024-11-24 08:12:38 +02:00
275 lines
5.9 KiB
Go
275 lines
5.9 KiB
Go
package main
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"crypto/subtle"
|
|
"fmt"
|
|
"log"
|
|
"net"
|
|
"net/http"
|
|
"strconv"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
nanoid "github.com/matoous/go-nanoid"
|
|
"golang.org/x/net/netutil"
|
|
)
|
|
|
|
const healthPath = "/health"
|
|
|
|
var (
|
|
mimes = map[imageType]string{
|
|
imageTypeJPEG: "image/jpeg",
|
|
imageTypePNG: "image/png",
|
|
imageTypeWEBP: "image/webp",
|
|
}
|
|
|
|
contentDispositions = map[imageType]string{
|
|
imageTypeJPEG: "inline; filename=\"image.jpg\"",
|
|
imageTypePNG: "inline; filename=\"image.png\"",
|
|
imageTypeWEBP: "inline; filename=\"image.webp\"",
|
|
}
|
|
|
|
authHeaderMust []byte
|
|
|
|
imgproxyIsRunningMsg = []byte("imgproxy is running")
|
|
|
|
errInvalidMethod = newError(422, "Invalid request method", "Method doesn't allowed")
|
|
errInvalidSecret = newError(403, "Invalid secret", "Forbidden")
|
|
)
|
|
|
|
var responseBufPool = sync.Pool{
|
|
New: func() interface{} {
|
|
return new(bytes.Buffer)
|
|
},
|
|
}
|
|
|
|
type httpHandler struct {
|
|
sem chan struct{}
|
|
}
|
|
|
|
func newHTTPHandler() *httpHandler {
|
|
return &httpHandler{make(chan struct{}, conf.Concurrency)}
|
|
}
|
|
|
|
func startServer() *http.Server {
|
|
l, err := net.Listen("tcp", conf.Bind)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
s := &http.Server{
|
|
Handler: newHTTPHandler(),
|
|
ReadTimeout: time.Duration(conf.ReadTimeout) * time.Second,
|
|
MaxHeaderBytes: 1 << 20,
|
|
}
|
|
|
|
go func() {
|
|
log.Printf("Starting server at %s\n", conf.Bind)
|
|
if err := s.Serve(netutil.LimitListener(l, conf.MaxClients)); err != nil && err != http.ErrServerClosed {
|
|
log.Fatalln(err)
|
|
}
|
|
}()
|
|
|
|
return s
|
|
}
|
|
|
|
func shutdownServer(s *http.Server) {
|
|
log.Println("Shutting down the server...")
|
|
|
|
ctx, close := context.WithTimeout(context.Background(), 5*time.Second)
|
|
defer close()
|
|
|
|
s.Shutdown(ctx)
|
|
}
|
|
|
|
func logResponse(status int, msg string) {
|
|
var color int
|
|
|
|
if status >= 500 {
|
|
color = 31
|
|
} else if status >= 400 {
|
|
color = 33
|
|
} else {
|
|
color = 32
|
|
}
|
|
|
|
log.Printf("|\033[7;%dm %d \033[0m| %s\n", color, status, msg)
|
|
}
|
|
|
|
func writeCORS(rw http.ResponseWriter) {
|
|
if len(conf.AllowOrigin) > 0 {
|
|
rw.Header().Set("Access-Control-Allow-Origin", conf.AllowOrigin)
|
|
rw.Header().Set("Access-Control-Allow-Methods", "GET, OPTIONs")
|
|
}
|
|
}
|
|
|
|
func respondWithImage(ctx context.Context, reqID string, r *http.Request, rw http.ResponseWriter, data []byte) {
|
|
po := getProcessingOptions(ctx)
|
|
|
|
rw.Header().Set("Expires", time.Now().Add(time.Second*time.Duration(conf.TTL)).Format(http.TimeFormat))
|
|
rw.Header().Set("Cache-Control", fmt.Sprintf("max-age=%d, public", conf.TTL))
|
|
rw.Header().Set("Content-Type", mimes[po.Format])
|
|
rw.Header().Set("Content-Disposition", contentDispositions[po.Format])
|
|
|
|
dataToRespond := data
|
|
|
|
if conf.GZipCompression > 0 && strings.Contains(r.Header.Get("Accept-Encoding"), "gzip") {
|
|
rw.Header().Set("Content-Encoding", "gzip")
|
|
|
|
buf := responseBufPool.Get().(*bytes.Buffer)
|
|
buf.Reset()
|
|
defer responseBufPool.Put(buf)
|
|
|
|
gzipData(data, buf)
|
|
dataToRespond = buf.Bytes()
|
|
}
|
|
|
|
rw.Header().Set("Content-Length", strconv.Itoa(len(dataToRespond)))
|
|
rw.WriteHeader(200)
|
|
rw.Write(dataToRespond)
|
|
|
|
logResponse(200, fmt.Sprintf("[%s] Processed in %s: %s; %+v", reqID, getTimerSince(ctx), getImageURL(ctx), po))
|
|
}
|
|
|
|
func respondWithError(reqID string, rw http.ResponseWriter, err imgproxyError) {
|
|
logResponse(err.StatusCode, fmt.Sprintf("[%s] %s", reqID, err.Message))
|
|
|
|
rw.WriteHeader(err.StatusCode)
|
|
rw.Write([]byte(err.PublicMessage))
|
|
}
|
|
|
|
func respondWithOptions(reqID string, rw http.ResponseWriter) {
|
|
logResponse(200, fmt.Sprintf("[%s] Respond with options", reqID))
|
|
rw.WriteHeader(200)
|
|
}
|
|
|
|
func prepareAuthHeaderMust() []byte {
|
|
if len(authHeaderMust) == 0 {
|
|
authHeaderMust = []byte(fmt.Sprintf("Bearer %s", conf.Secret))
|
|
}
|
|
|
|
return authHeaderMust
|
|
}
|
|
|
|
func checkSecret(r *http.Request) bool {
|
|
if len(conf.Secret) == 0 {
|
|
return true
|
|
}
|
|
|
|
return subtle.ConstantTimeCompare(
|
|
[]byte(r.Header.Get("Authorization")),
|
|
prepareAuthHeaderMust(),
|
|
) == 1
|
|
}
|
|
|
|
func (h *httpHandler) lock() {
|
|
h.sem <- struct{}{}
|
|
}
|
|
|
|
func (h *httpHandler) unlock() {
|
|
<-h.sem
|
|
}
|
|
|
|
func (h *httpHandler) ServeHTTP(rw http.ResponseWriter, r *http.Request) {
|
|
reqID, _ := nanoid.Nanoid()
|
|
|
|
defer func() {
|
|
if r := recover(); r != nil {
|
|
if err, ok := r.(imgproxyError); ok {
|
|
respondWithError(reqID, rw, err)
|
|
} else {
|
|
respondWithError(reqID, rw, newUnexpectedError(r.(error), 4))
|
|
}
|
|
}
|
|
}()
|
|
|
|
log.Printf("[%s] %s: %s\n", reqID, r.Method, r.URL.RequestURI())
|
|
|
|
writeCORS(rw)
|
|
|
|
if r.Method == http.MethodOptions {
|
|
respondWithOptions(reqID, rw)
|
|
return
|
|
}
|
|
|
|
if r.Method != http.MethodGet {
|
|
panic(errInvalidMethod)
|
|
}
|
|
|
|
if !checkSecret(r) {
|
|
panic(errInvalidSecret)
|
|
}
|
|
|
|
ctx := context.Background()
|
|
|
|
if newRelicEnabled {
|
|
var newRelicCancel context.CancelFunc
|
|
ctx, newRelicCancel = startNewRelicTransaction(ctx, rw, r)
|
|
defer newRelicCancel()
|
|
}
|
|
|
|
if prometheusEnabled {
|
|
prometheusRequestsTotal.Inc()
|
|
defer startPrometheusDuration(prometheusRequestDuration)()
|
|
}
|
|
|
|
h.lock()
|
|
defer h.unlock()
|
|
|
|
if r.URL.RequestURI() == healthPath {
|
|
rw.WriteHeader(200)
|
|
rw.Write(imgproxyIsRunningMsg)
|
|
return
|
|
}
|
|
|
|
ctx, timeoutCancel := startTimer(ctx, time.Duration(conf.WriteTimeout)*time.Second)
|
|
defer timeoutCancel()
|
|
|
|
ctx, err := parsePath(ctx, r)
|
|
if err != nil {
|
|
panic(newError(404, err.Error(), "Invalid image url"))
|
|
}
|
|
|
|
ctx, downloadcancel, err := downloadImage(ctx)
|
|
defer downloadcancel()
|
|
if err != nil {
|
|
if newRelicEnabled {
|
|
sendErrorToNewRelic(ctx, err)
|
|
}
|
|
if prometheusEnabled {
|
|
incrementPrometheusErrorsTotal("download")
|
|
}
|
|
panic(newError(404, err.Error(), "Image is unreachable"))
|
|
}
|
|
|
|
checkTimeout(ctx)
|
|
|
|
if conf.ETagEnabled {
|
|
eTag := calcETag(ctx)
|
|
rw.Header().Set("ETag", eTag)
|
|
|
|
if eTag == r.Header.Get("If-None-Match") {
|
|
panic(errNotModified)
|
|
}
|
|
}
|
|
|
|
checkTimeout(ctx)
|
|
|
|
imageData, err := processImage(ctx)
|
|
if err != nil {
|
|
if newRelicEnabled {
|
|
sendErrorToNewRelic(ctx, err)
|
|
}
|
|
if prometheusEnabled {
|
|
incrementPrometheusErrorsTotal("processing")
|
|
}
|
|
panic(newError(500, err.Error(), "Error occurred while processing image"))
|
|
}
|
|
|
|
checkTimeout(ctx)
|
|
|
|
respondWithImage(ctx, reqID, r, rw, imageData)
|
|
}
|