1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
|
using System.Net.Http.Headers;
using System.Text.Json;
using MatrixMediaGate;
using MatrixMediaGate.Services;
using Microsoft.AspNetCore.Http.Extensions;
var builder = WebApplication.CreateBuilder(args);
builder.Host.UseSystemd();
builder.Services.AddSingleton<ProxyConfiguration>();
builder.Services.AddSingleton<AuthValidator>();
builder.Services.AddSingleton<HttpClient>(services => {
var cfg = services.GetRequiredService<ProxyConfiguration>();
return new HttpClient() {
BaseAddress = new Uri(cfg.Upstream),
MaxResponseContentBufferSize = 1 * 1024 * 1024 // 1MB
};
});
var app = builder.Build();
async Task Proxy(HttpClient hc, ProxyConfiguration cfg, HttpContext ctx, ILogger<Program> logger) {
var path = ctx.Request.GetEncodedPathAndQuery();
if (path.StartsWith('/'))
path = path[1..];
var method = new HttpMethod(ctx.Request.Method);
using var req = new HttpRequestMessage(method, path);
foreach (var header in ctx.Request.Headers) {
if (header.Key != "Accept-Encoding" && header.Key != "Content-Type" && header.Key != "Content-Length")
req.Headers.Add(header.Key, header.Value.ToArray());
}
req.Headers.Host = cfg.Host;
if (ctx.Request.ContentLength > 0) {
req.Content = new StreamContent(ctx.Request.Body);
if (ctx.Request.ContentType != null) req.Content.Headers.ContentType = new MediaTypeHeaderValue(ctx.Request.ContentType);
if (ctx.Request.ContentLength != null) req.Content.Headers.ContentLength = ctx.Request.ContentLength;
}
logger.LogInformation("Proxying {method} {path} to {target}", method, path, hc.BaseAddress + path);
using var response = await hc.SendAsync(req, HttpCompletionOption.ResponseHeadersRead);
ctx.Response.Headers.Clear();
foreach (var header in response.Headers) {
if (header.Key != "Transfer-Encoding")
ctx.Response.Headers[header.Key] = header.Value.ToArray();
}
ctx.Response.StatusCode = (int)response.StatusCode;
ctx.Response.ContentType = response.Content.Headers.ContentType?.ToString() ?? "application/json";
if (response.Content.Headers.ContentLength != null) ctx.Response.ContentLength = response.Content.Headers.ContentLength;
await ctx.Response.StartAsync();
await using var content = await response.Content.ReadAsStreamAsync();
await content.CopyToAsync(ctx.Response.Body);
await ctx.Response.Body.FlushAsync();
await ctx.Response.CompleteAsync();
}
async Task ProxyMaybeAuth(HttpClient hc, ProxyConfiguration cfg, AuthValidator auth, HttpContext ctx, ILogger<Program> logger) {
await auth.UpdateAuth(ctx);
await Proxy(hc, cfg, ctx, logger);
}
async Task ProxyMedia(string serverName, ProxyConfiguration cfg, HttpClient hc, AuthValidator auth, HttpContext ctx, ILogger<Program> logger) {
// Some clients may send Authorization header, so we handle this last...
if (cfg.TrustedServers.Contains(serverName) || auth.ValidateAuth(ctx) || await auth.UpdateAuth(ctx)) {
await Proxy(hc, cfg, ctx, logger);
}
else {
ctx.Response.StatusCode = 403;
ctx.Response.ContentType = "application/json";
await ctx.Response.StartAsync();
await JsonSerializer.SerializeAsync(ctx.Response.Body, new { errcode = "M_FORBIDDEN", error = "Unauthenticated access to remote media has been disabled on this server." });
await ctx.Response.Body.FlushAsync();
await ctx.Response.CompleteAsync();
}
}
app.Map("{*_}", ProxyMaybeAuth);
app.Map("/_matrix/federation/{*_}", Proxy); // Don't bother with auth for federation
foreach (var route in (string[]) [ // Require recent auth for these routes
"/_matrix/media/{version}/download/{serverName}/{mediaId}",
"/_matrix/media/{version}/download/{serverName}/{mediaId}/{fileName}",
"/_matrix/media/{version}/thumbnail/{serverName}/{mediaId}",
])
app.Map(route, ProxyMedia);
app.Run();
|