You've already forked imgproxy
mirror of
https://github.com/imgproxy/imgproxy.git
synced 2025-12-05 23:28:10 +02:00
Support Last-Modified response header and support If-Modified-Since request header. (#1147)
* Always return Last-Modified and support If-Modified-Since. * IMGPROXY_USE_LAST_MODIFIED config setting. IMGPROXY_USE_LAST_MODIFIED (default false) when enabled will return the Last-Modified time of the upstream image and also allow the support of the If-Modified-Since request header (returning a 304 if the image hasn't been modified). If-Modified-Since allows If-None-Match to take precedence. * Fixes based on DarthSim's feedback. 1. Don't worry about nil maps. 2. Fix a test now that we use the config.LastModifiedEnabled (and move it's location it he test file to a more sane place). 3. Update GCS transport code based on the refactoring of DarthSim. In this iteration, we pull the Updated time from the GCS object attributes and format them as a string. We then parse it in the notmodified module. Seems a bit silly to do it this way. If we agree on the approach here, then AWS and Azure can follow. * Support azure, fs, s3, and swift. * Grab the headers for If-Modified-Since and Last-Modified before parsing them. * Add tests for last-modified for fs. * Support Last-Modified being passed when streaming an upstream file. * Tests for Last-Modified for GCS and Azure * Support s3 and swift tests. Sadly fakes3 doesn't support Last-Modified * Test against forked gofakes3
This commit is contained in:
@@ -91,6 +91,14 @@ func setCacheControl(rw http.ResponseWriter, force *time.Time, originHeaders map
|
||||
}
|
||||
}
|
||||
|
||||
func setLastModified(rw http.ResponseWriter, originHeaders map[string]string) {
|
||||
if config.LastModifiedEnabled {
|
||||
if val, ok := originHeaders["Last-Modified"]; ok && len(val) != 0 {
|
||||
rw.Header().Set("Last-Modified", val)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func setVary(rw http.ResponseWriter) {
|
||||
if len(headerVaryValue) > 0 {
|
||||
rw.Header().Set("Vary", headerVaryValue)
|
||||
@@ -118,6 +126,7 @@ func respondWithImage(reqID string, r *http.Request, rw http.ResponseWriter, sta
|
||||
rw.Header().Set("Content-Disposition", contentDisposition)
|
||||
|
||||
setCacheControl(rw, po.Expires, originData.Headers)
|
||||
setLastModified(rw, originData.Headers)
|
||||
setVary(rw)
|
||||
setCanonical(rw, originURL)
|
||||
|
||||
@@ -260,6 +269,12 @@ func handleProcessing(reqID string, rw http.ResponseWriter, r *http.Request) {
|
||||
}
|
||||
}
|
||||
|
||||
if config.LastModifiedEnabled {
|
||||
if modifiedSince := r.Header.Get("If-Modified-Since"); len(modifiedSince) != 0 {
|
||||
imgRequestHeader.Set("If-Modified-Since", modifiedSince)
|
||||
}
|
||||
}
|
||||
|
||||
// The heavy part start here, so we need to restrict concurrency
|
||||
var processingSemToken *semaphore.Token
|
||||
func() {
|
||||
@@ -299,8 +314,10 @@ func handleProcessing(reqID string, rw http.ResponseWriter, r *http.Request) {
|
||||
|
||||
if err == nil {
|
||||
defer originData.Close()
|
||||
} else if nmErr, ok := err.(*imagedata.ErrorNotModified); ok && config.ETagEnabled {
|
||||
rw.Header().Set("ETag", etagHandler.GenerateExpectedETag())
|
||||
} else if nmErr, ok := err.(*imagedata.ErrorNotModified); ok {
|
||||
if config.ETagEnabled && len(etagHandler.ImageEtagExpected()) != 0 {
|
||||
rw.Header().Set("ETag", etagHandler.GenerateExpectedETag())
|
||||
}
|
||||
respondWithNotModified(reqID, r, rw, po, imageURL, nmErr.Headers)
|
||||
return
|
||||
} else {
|
||||
|
||||
Reference in New Issue
Block a user