-
Notifications
You must be signed in to change notification settings - Fork 166
Image proxy #8996
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Image proxy #8996
Changes from 2 commits
Commits
Show all changes
6 commits
Select commit
Hold shift + click to select a range
8c6ba0d
Image proxy
sigurdm 110e843
Remove token commands from dockerfile
sigurdm 1ca50fc
Organize imports
sigurdm 7113f81
timeouts, test for large files
sigurdm 6dc8d84
Better user agent
sigurdm b2f643e
Test that runtimeSDKVersion is used in image proxy dockerfile
sigurdm File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,21 @@ | ||
| # Use latest stable channel SDK. | ||
| FROM dart:3.9.0 AS build | ||
|
|
||
| ENV PUB_ENVIRONMENT="bot" | ||
| ENV PUB_CACHE="/project/.pub-cache" | ||
|
|
||
| # Resolve app dependencies. | ||
| WORKDIR /app | ||
| COPY . . | ||
| RUN dart pub get --enforce-lockfile | ||
| RUN dart compile exe pkg/image_proxy/bin/server.dart -o server | ||
|
|
||
| # Build minimal serving image from AOT-compiled `/server` | ||
| # and the pre-built AOT-runtime in the `/runtime/` directory of the base image. | ||
| FROM scratch | ||
| COPY --from=build /runtime/ / | ||
| COPY --from=build /app/server /app/bin/ | ||
|
|
||
| # Start server. | ||
| EXPOSE 8080 | ||
| CMD ["/app/bin/server"] | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,20 @@ | ||
| # Image proxy for pub.dev. | ||
|
|
||
|
|
||
| Will forward requests to a url, when given a request like: | ||
| ``` | ||
| https://external-image.pub.dev/<base64(hmac(url,hmac_kms(date))>/<date>/<urlencode(url)> | ||
| ``` | ||
|
|
||
| date is a "microsecond after epoch" timestamp of a specific date's midnight. | ||
|
|
||
| hmac_kms is calculated in KMS with the key version at HMAC_KEY_ID. | ||
|
|
||
| ## Development | ||
|
|
||
| To build the docker image (from the repository root): | ||
|
|
||
| ``` | ||
| docker build -t image-proxy-server . --file pkg/image_proxy/Dockerfile | ||
| ``` | ||
|
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,5 @@ | ||
| // Copyright (c) 2025, the Dart project authors. Please see the AUTHORS file | ||
| // for details. All rights reserved. Use of this source code is governed by a | ||
| // BSD-style license that can be found in the LICENSE file. | ||
|
|
||
| export 'package:pub_dev_image_proxy/image_proxy_service.dart' show main; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,284 @@ | ||
| // Copyright (c) 2025, the Dart project authors. Please see the AUTHORS file | ||
| // for details. All rights reserved. Use of this source code is governed by a | ||
| // BSD-style license that can be found in the LICENSE file. | ||
|
|
||
| import 'dart:async'; | ||
| import 'dart:convert'; | ||
| import 'dart:io'; | ||
| import 'dart:typed_data'; | ||
| import 'package:crypto/crypto.dart'; | ||
| import 'package:googleapis_auth/googleapis_auth.dart'; | ||
| import 'package:http/http.dart' as http; | ||
|
|
||
| import 'package:retry/retry.dart'; | ||
| import 'package:shelf/shelf.dart' as shelf; | ||
| import 'package:shelf/shelf_io.dart'; | ||
| import 'package:googleapis/cloudkms/v1.dart' as kms; | ||
| import 'package:googleapis_auth/auth_io.dart' as auth; | ||
|
|
||
| class Config { | ||
| final Uri secretsUrl; | ||
| final int maxFileSize; | ||
| Config({required this.secretsUrl, required this.maxFileSize}); | ||
| } | ||
|
|
||
| bool isTesting = Platform.environment['IMAGE_PROXY_TESTING'] == 'true'; | ||
|
|
||
| /// The keys we currently allow the url to be signed with. | ||
| Map<int, Uint8List> allowedKeys = {}; | ||
|
|
||
| /// Ensure that [allowedKeys] contains keys for today and the two surrounding | ||
| /// days. | ||
| Future<void> updateAllowedKeys() async { | ||
| final now = DateTime.now(); | ||
| final yesterday = DateTime(now.year, now.month, now.day - 1); | ||
| final today = DateTime(now.year, now.month, now.day); | ||
| final tomorrow = DateTime(now.year, now.month, now.day + 1); | ||
|
|
||
| for (final d in [yesterday, today, tomorrow]) { | ||
| if (!allowedKeys.containsKey(d.millisecondsSinceEpoch)) { | ||
| allowedKeys[d.millisecondsSinceEpoch] = isTesting | ||
| ? await getDailySecretMock(d) | ||
| : await getDailySecret(d); | ||
| print('Generating new key for ${d.toIso8601String()}'); | ||
| } | ||
| } | ||
| while (allowedKeys.length > 3) { | ||
| final dates = allowedKeys.keys.toList()..sort(); | ||
| allowedKeys.remove(dates.first); | ||
| } | ||
| assert(allowedKeys.length == 3); | ||
| } | ||
|
|
||
| late auth.AuthClient? _apiClient; | ||
|
|
||
| /// The client used for communicating with the google apis. | ||
| Future<AuthClient> authClient() async { | ||
| return (_apiClient ??= await retry(() async { | ||
| return await auth.clientViaApplicationDefaultCredentials(scopes: []); | ||
| }))!; | ||
| } | ||
|
|
||
| Future<Uint8List> getDailySecretMock(DateTime day) async { | ||
| return hmacSign( | ||
| utf8.encode('fake secret'), | ||
| utf8.encode( | ||
| DateTime(day.year, day.month, day.day).toUtc().toIso8601String(), | ||
| ), | ||
| ); | ||
| } | ||
|
|
||
| /// Requests a derived hmac key corresponding to [day] using. | ||
| Future<Uint8List> getDailySecret(DateTime day) async { | ||
| final api = kms.CloudKMSApi(await authClient()); | ||
| final response = await api | ||
| .projects | ||
| .locations | ||
| .keyRings | ||
| .cryptoKeys | ||
| .cryptoKeyVersions | ||
| .macSign( | ||
| kms.MacSignRequest() | ||
| ..dataAsBytes = utf8.encode( | ||
| DateTime(day.year, day.month, day.day).toUtc().toIso8601String(), | ||
| ), | ||
| Platform.environment['HMAC_KEY_ID']!, | ||
| ); | ||
| return response.macAsBytes as Uint8List; | ||
| } | ||
|
|
||
| bool _constantTimeEquals(Uint8List a, Uint8List b) { | ||
| if (a.length != b.length) return false; | ||
| bool answer = true; | ||
| for (var i = 0; i < a.length; i++) { | ||
| answer &= a[i] == b[i]; | ||
| } | ||
| return answer; | ||
| } | ||
|
|
||
| // The client used for requesting the images. | ||
| // Using raw dart:io client such that we can disable autoUncompress. | ||
| final HttpClient client = HttpClient()..autoUncompress = false; | ||
|
|
||
| final maxImageSize = 1024 * 1024 * 10; // At most 10 MB. | ||
|
|
||
| Future<shelf.Response> handler(shelf.Request request) async { | ||
| try { | ||
| if (request.method != 'GET') { | ||
| return shelf.Response.notFound('Unsupported method'); | ||
| } | ||
| final segments = request.url.pathSegments; | ||
| if (segments.length != 3) { | ||
| return shelf.Response.badRequest( | ||
| body: | ||
| 'malformed request, ${segments.length} should be of the form <base64(hmac(url,daily_secret))>/<date>/<urlencode(url)>', | ||
| ); | ||
| } | ||
| final Uint8List signature; | ||
| try { | ||
| signature = base64Decode(segments[0]); | ||
| } on FormatException catch (_) { | ||
| return shelf.Response.badRequest( | ||
| body: 'malformed request, could not decode mac signature', | ||
| ); | ||
| } | ||
| final date = int.tryParse(segments[1]); | ||
| if (date == null) { | ||
| return shelf.Response.badRequest(body: 'malformed request, missing date'); | ||
| } | ||
| final secret = allowedKeys[date]; | ||
| if (secret == null) { | ||
| return shelf.Response.badRequest( | ||
| body: 'malformed request, proxy url expired', | ||
| ); | ||
| } | ||
|
|
||
| final imageUrl = segments[2]; | ||
| if (imageUrl.length > 1024) { | ||
| return shelf.Response.badRequest(body: 'proxied url too long'); | ||
| } | ||
| final imageUrlBytes = utf8.encode(imageUrl); | ||
|
|
||
| if (_constantTimeEquals(hmacSign(secret, imageUrlBytes), signature)) { | ||
| final Uri parsedImageUrl; | ||
| try { | ||
| parsedImageUrl = Uri.parse(imageUrl); | ||
| } on FormatException catch (e) { | ||
| return shelf.Response.badRequest(body: 'Malformed proxied url $e'); | ||
| } | ||
| if (!(parsedImageUrl.isScheme('http') || | ||
| parsedImageUrl.isScheme('https'))) { | ||
| return shelf.Response.badRequest( | ||
| body: 'Can only proxy http and https urls', | ||
| ); | ||
| } | ||
| if (!parsedImageUrl.isAbsolute) { | ||
| return shelf.Response.badRequest(body: 'Can only proxy absolute urls'); | ||
| } | ||
|
|
||
| int statusCode; | ||
| List<int> bytes; | ||
| String? contentType; | ||
| String? contentEncoding; | ||
| try { | ||
| (statusCode, bytes, contentType, contentEncoding) = await retry( | ||
| maxDelay: isTesting ? Duration(seconds: 1) : Duration(seconds: 8), | ||
| maxAttempts: isTesting ? 2 : 8, | ||
| () async { | ||
| final request = await client.getUrl(parsedImageUrl); | ||
| request.headers.add('user-agent', 'pub-proxy'); | ||
sigurdm marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| request.followRedirects = false; | ||
| var response = await request.close(); | ||
| var redirectCount = 0; | ||
| while (response.isRedirect) { | ||
| await response.drain(); | ||
| redirectCount++; | ||
| if (redirectCount > 10) { | ||
| throw RedirectException('Too many redirects.'); | ||
| } | ||
| final location = response.headers.value( | ||
| HttpHeaders.locationHeader, | ||
| ); | ||
| if (location == null) { | ||
| throw RedirectException('No location header in redirect.'); | ||
| } | ||
| final uri = parsedImageUrl.resolve(location); | ||
| final request = await client.getUrl(uri); | ||
| request.headers.add('user-agent', 'pub-proxy'); | ||
| // Set the body or headers as desired. | ||
| request.followRedirects = false; | ||
| response = await request.close(); | ||
| } | ||
| switch (response.statusCode) { | ||
| case final int statusCode && >= 500 && < 600: | ||
| throw ServerSideException(statusCode: statusCode); | ||
| case final int statusCode && >= 300 && < 400: | ||
| throw ServerSideException(statusCode: statusCode); | ||
| } | ||
| final contentLength = response.contentLength; | ||
| if (contentLength != -1 && contentLength > maxImageSize) { | ||
| throw TooLargeException(); | ||
| } | ||
| return ( | ||
| response.statusCode, | ||
| await readAllBytes( | ||
| response, | ||
| contentLength == -1 ? maxImageSize : contentLength, | ||
| ), | ||
| response.headers.value('content-type'), | ||
| response.headers.value('content-encoding'), | ||
| ); | ||
| }, | ||
| retryIf: (e) => | ||
| e is SocketException || | ||
| e is http.ClientException || | ||
| e is ServerSideException, | ||
| ); | ||
| } on TooLargeException { | ||
| return shelf.Response.badRequest(body: 'Image too large'); | ||
| } on RedirectException catch (e) { | ||
| return shelf.Response.badRequest(body: e.message); | ||
| } on ServerSideException catch (e) { | ||
| return shelf.Response.badRequest( | ||
| body: 'Failed to retrieve image. Status code ${e.statusCode}', | ||
| ); | ||
| } | ||
|
|
||
| return shelf.Response( | ||
| statusCode, | ||
| body: bytes, | ||
| headers: { | ||
| 'Cache-control': 'max-age=180, public', | ||
| 'content-type': ?contentType, | ||
| 'content-encoding': ?contentEncoding, | ||
| }, | ||
| ); | ||
| } else { | ||
| return shelf.Response.unauthorized('Bad hmac'); | ||
| } | ||
| } catch (e, st) { | ||
| stderr.writeln('Uncaught error: $e $st'); | ||
| rethrow; | ||
| } | ||
| } | ||
|
|
||
| void main(List<String> args) async { | ||
| await updateAllowedKeys(); | ||
| Timer.periodic(Duration(hours: 1), (_) => updateAllowedKeys()); | ||
| final server = await serve( | ||
| handler, | ||
| InternetAddress.anyIPv6, | ||
| int.tryParse(Platform.environment['IMAGE_PROXY_PORT'] ?? '') ?? 80, | ||
| ); | ||
| print('Serving image proxy on ${server.address}:${server.port}'); | ||
| } | ||
|
|
||
| class TooLargeException implements Exception { | ||
| TooLargeException(); | ||
| } | ||
|
|
||
| class ServerSideException implements Exception { | ||
| int statusCode; | ||
| ServerSideException({required this.statusCode}); | ||
| } | ||
|
|
||
| class RedirectException implements Exception { | ||
| String message; | ||
| RedirectException(this.message); | ||
| } | ||
|
|
||
| Uint8List hmacSign(Uint8List key, Uint8List imageUrlBytes) { | ||
| return Hmac(sha256, key).convert(imageUrlBytes).bytes as Uint8List; | ||
| } | ||
|
|
||
| Future<Uint8List> readAllBytes(Stream<List<int>> stream, int maxBytes) async { | ||
| final builder = BytesBuilder(); | ||
|
|
||
| await for (final chunk in stream) { | ||
| if (builder.length + chunk.length > maxBytes) { | ||
| throw TooLargeException(); | ||
| } | ||
| builder.add(chunk); | ||
| } | ||
| return builder.takeBytes(); | ||
| } | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,18 @@ | ||
| name: pub_dev_image_proxy | ||
| environment: | ||
| sdk: ^3.9.0-0 | ||
|
|
||
| resolution: workspace | ||
|
|
||
| dependencies: | ||
| shelf: ^1.4.2 | ||
| crypto: ^3.0.6 | ||
| http: ^1.5.0 | ||
| retry: ^3.1.2 | ||
| gcloud: ^0.8.19 | ||
| googleapis_auth: ^2.0.0 | ||
| googleapis: ^14.0.0 | ||
| yaml: ^3.1.3 | ||
| dev_dependencies: | ||
| test: | ||
| lints: |
Oops, something went wrong.
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.