Fixes the banned IP check not being applied when fetching the remote file size. This allowed one to trick Danbooru into sending HEAD requests to private IPs: http://danbooru.donmai.us/uploads/new?url=http://127.0.0.1/test.jpg
99 lines
3.0 KiB
Ruby
99 lines
3.0 KiB
Ruby
module Downloads
|
|
class File
|
|
include ActiveModel::Validations
|
|
class Error < Exception ; end
|
|
|
|
RETRIABLE_ERRORS = [Errno::ECONNRESET, Errno::ETIMEDOUT, Errno::EIO, Errno::EHOSTUNREACH, Errno::ECONNREFUSED, Timeout::Error, IOError]
|
|
|
|
delegate :data, to: :strategy
|
|
attr_reader :url, :referer
|
|
|
|
validate :validate_url
|
|
validate :validate_local_hosts
|
|
|
|
# Prevent Cloudflare from potentially mangling the image. See issue #3528.
|
|
def self.uncached_url(url, headers = {})
|
|
url = Addressable::URI.parse(url)
|
|
|
|
if is_cloudflare?(url, headers)
|
|
url.query_values = (url.query_values || {}).merge(danbooru_no_cache: SecureRandom.uuid)
|
|
end
|
|
|
|
url
|
|
end
|
|
|
|
def self.is_cloudflare?(url, headers = {})
|
|
Cache.get("is_cloudflare:#{url.origin}", 4.hours) do
|
|
res = HTTParty.head(url, { headers: headers }.deep_merge(Danbooru.config.httparty_options))
|
|
raise Error.new("HTTP error code: #{res.code} #{res.message}") unless res.success?
|
|
|
|
res.key?("CF-Ray")
|
|
end
|
|
end
|
|
|
|
def initialize(url, referer=nil)
|
|
@url = Addressable::URI.parse(url) rescue nil
|
|
@referer = referer
|
|
end
|
|
|
|
def size
|
|
validate!
|
|
options = { timeout: 3, headers: strategy.headers }.deep_merge(Danbooru.config.httparty_options)
|
|
|
|
res = HTTParty.head(strategy.file_url, options)
|
|
|
|
if res.success?
|
|
res.content_length
|
|
else
|
|
raise HTTParty::ResponseError.new(res)
|
|
end
|
|
end
|
|
|
|
def download!(tries: 3, **options)
|
|
validate!
|
|
url = self.class.uncached_url(strategy.file_url, strategy.headers)
|
|
|
|
Retriable.retriable(on: RETRIABLE_ERRORS, tries: tries, base_interval: 0) do
|
|
file = http_get_streaming(url, headers: strategy.headers, **options)
|
|
return [file, strategy]
|
|
end
|
|
end
|
|
|
|
def validate_local_hosts
|
|
ip_addr = IPAddr.new(Resolv.getaddress(url.hostname))
|
|
if Danbooru.config.banned_ip_for_download?(ip_addr)
|
|
errors[:base] << "Downloads from #{ip_addr} are not allowed"
|
|
end
|
|
end
|
|
|
|
def validate_url
|
|
errors[:base] << "URL must not be blank" if url.blank?
|
|
errors[:base] << "'#{url}' is not a valid url" if !url.host.present?
|
|
errors[:base] << "'#{url}' is not a valid url. Did you mean 'http://#{url}'?" if !url.scheme.in?(%w[http https])
|
|
end
|
|
|
|
def http_get_streaming(url, file: Tempfile.new(binmode: true), headers: {}, max_size: Danbooru.config.max_file_size)
|
|
size = 0
|
|
options = { stream_body: true, timeout: 10, headers: headers }
|
|
|
|
res = HTTParty.get(url, options.deep_merge(Danbooru.config.httparty_options)) do |chunk|
|
|
size += chunk.size
|
|
raise Error.new("File is too large (max size: #{max_size})") if size > max_size && max_size > 0
|
|
|
|
file.write(chunk)
|
|
end
|
|
|
|
if res.success?
|
|
file.rewind
|
|
return file
|
|
else
|
|
raise Error.new("HTTP error code: #{res.code} #{res.message}")
|
|
end
|
|
end # def
|
|
|
|
def strategy
|
|
@strategy ||= Sources::Strategies.find(url.to_s, referer)
|
|
end
|
|
end
|
|
end
|