{"id":13409742,"url":"https://github.com/willnorris/imageproxy","last_synced_at":"2025-05-14T13:06:53.187Z","repository":{"id":12346387,"uuid":"14990119","full_name":"willnorris/imageproxy","owner":"willnorris","description":"A caching, resizing image proxy written in Go","archived":false,"fork":false,"pushed_at":"2025-05-05T05:11:04.000Z","size":2157,"stargazers_count":3689,"open_issues_count":74,"forks_count":494,"subscribers_count":70,"default_branch":"main","last_synced_at":"2025-05-09T01:14:09.979Z","etag":null,"topics":["imageproxy"],"latest_commit_sha":null,"homepage":"","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/willnorris.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"docs/contributing.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2013-12-06T18:23:16.000Z","updated_at":"2025-05-08T23:56:00.000Z","dependencies_parsed_at":"2023-02-10T00:00:59.467Z","dependency_job_id":"08382c29-6e9c-4aee-bf45-3959f6c1aefe","html_url":"https://github.com/willnorris/imageproxy","commit_stats":{"total_commits":432,"total_committers":46,"mean_commits":9.391304347826088,"dds":"0.21064814814814814","last_synced_commit":"572ad2db78ed5ad6b892cedb92899ef412144409"},"previous_names":["willnorris/go-imageproxy"],"tags_count":18,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/willnorris%2Fimageproxy","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/willnorris%2Fimageproxy/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/willnorris%2Fimageproxy/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/willnorris%2Fimageproxy/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/willnorris","download_url":"https://codeload.github.com/willnorris/imageproxy/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":254149955,"owners_count":22022851,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["imageproxy"],"created_at":"2024-07-30T20:01:03.124Z","updated_at":"2025-05-14T13:06:48.172Z","avatar_url":"https://github.com/willnorris.png","language":"Go","readme":"# imageproxy\n\n[![GoDoc](https://img.shields.io/badge/godoc-reference-blue)](https://pkg.go.dev/willnorris.com/go/imageproxy)\n[![Test Status](https://github.com/willnorris/imageproxy/workflows/tests/badge.svg)](https://github.com/willnorris/imageproxy/actions?query=workflow%3Atests)\n[![Test Coverage](https://codecov.io/gh/willnorris/imageproxy/branch/main/graph/badge.svg)](https://codecov.io/gh/willnorris/imageproxy)\n[![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/2611/badge)](https://bestpractices.coreinfrastructure.org/projects/2611)\n\nimageproxy is a caching image proxy server written in go. It features:\n\n- basic image adjustments like resizing, cropping, and rotation\n- access control using allowed hosts list or request signing (HMAC-SHA256)\n- support for jpeg, png, webp (decode only), tiff, and gif image formats\n  (including animated gifs)\n- caching in-memory, on disk, or with Amazon S3, Google Cloud Storage, Azure\n  Storage, or Redis\n- easy deployment, since it's pure go\n\nPersonally, I use it primarily to dynamically resize images hosted on my own\nsite (read more in [this post][]). But you can also enable request signing and\nuse it as an SSL proxy for remote images, similar to [atmos/camo][] but with\nadditional image adjustment options.\n\nI aim to keep imageproxy compatible with the two [most recent major go releases][].\nI also keep track of the minimum go version that still works (currently go1.18), but that might change at any time.\nYou can see the go versions that are tested against in [.github/workflows/tests.yml][].\n\n[this post]: https://willnorris.com/2014/01/a-self-hosted-alternative-to-jetpacks-photon-service\n[atmos/camo]: https://github.com/atmos/camo\n[most recent major go releases]: https://golang.org/doc/devel/release.html\n[.github/workflows/tests.yml]: ./.github/workflows/tests.yml\n\n## URL Structure\n\nimageproxy URLs are of the form `http://localhost/{options}/{remote_url}`.\n\n### Options\n\nOptions are available for cropping, resizing, rotation, flipping, and digital\nsignatures among a few others. Options for are specified as a comma delimited\nlist of parameters, which can be supplied in any order. Duplicate parameters\noverwrite previous values.\n\nSee the full list of available options at\n\u003chttps://godoc.org/willnorris.com/go/imageproxy#ParseOptions\u003e.\n\n### Remote URL\n\nThe URL of the original image to load is specified as the remainder of the\npath, without any encoding. For example,\n`http://localhost/200/https://willnorris.com/logo.jpg`.\n\nIn order to [optimize caching][], it is recommended that URLs not contain query\nstrings.\n\n[optimize caching]: http://www.stevesouders.com/blog/2008/08/23/revving-filenames-dont-use-querystring/\n\n### Examples\n\nThe following live examples demonstrate setting different options on [this\nsource image][small-things], which measures 1024 by 678 pixels.\n\n[small-things]: https://willnorris.com/images/imageproxy/small-things.jpg\n\n| Options                | Meaning                                                    | Image                                                                                                                                                                                                                                                                                                |\n| ---------------------- | ---------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |\n| 200x                   | 200px wide, proportional height                            | \u003ca href=\"https://willnorris.com/api/imageproxy/200x/https://willnorris.com/images/imageproxy/small-things.jpg\"\u003e\u003cimg src=\"https://willnorris.com/api/imageproxy/200x/https://willnorris.com/images/imageproxy/small-things.jpg\" alt=\"200x\"\u003e\u003c/a\u003e                                                       |\n| x0.15                  | 15% original height, proportional width                    | \u003ca href=\"https://willnorris.com/api/imageproxy/x0.15/https://willnorris.com/images/imageproxy/small-things.jpg\"\u003e\u003cimg src=\"https://willnorris.com/api/imageproxy/x0.15/https://willnorris.com/images/imageproxy/small-things.jpg\" alt=\"x0.15\"\u003e\u003c/a\u003e                                                    |\n| 100x150                | 100 by 150 pixels, cropping as needed                      | \u003ca href=\"https://willnorris.com/api/imageproxy/100x150/https://willnorris.com/images/imageproxy/small-things.jpg\"\u003e\u003cimg src=\"https://willnorris.com/api/imageproxy/100x150/https://willnorris.com/images/imageproxy/small-things.jpg\" alt=\"100x150\"\u003e\u003c/a\u003e                                              |\n| 100                    | 100px square, cropping as needed                           | \u003ca href=\"https://willnorris.com/api/imageproxy/100/https://willnorris.com/images/imageproxy/small-things.jpg\"\u003e\u003cimg src=\"https://willnorris.com/api/imageproxy/100/https://willnorris.com/images/imageproxy/small-things.jpg\" alt=\"100\"\u003e\u003c/a\u003e                                                          |\n| 150,fit                | scale to fit 150px square, no cropping                     | \u003ca href=\"https://willnorris.com/api/imageproxy/150,fit/https://willnorris.com/images/imageproxy/small-things.jpg\"\u003e\u003cimg src=\"https://willnorris.com/api/imageproxy/150,fit/https://willnorris.com/images/imageproxy/small-things.jpg\" alt=\"150,fit\"\u003e\u003c/a\u003e                                              |\n| 100,r90                | 100px square, rotated 90 degrees                           | \u003ca href=\"https://willnorris.com/api/imageproxy/100,r90/https://willnorris.com/images/imageproxy/small-things.jpg\"\u003e\u003cimg src=\"https://willnorris.com/api/imageproxy/100,r90/https://willnorris.com/images/imageproxy/small-things.jpg\" alt=\"100,r90\"\u003e\u003c/a\u003e                                              |\n| 100,fv,fh              | 100px square, flipped horizontal and vertical              | \u003ca href=\"https://willnorris.com/api/imageproxy/100,fv,fh/https://willnorris.com/images/imageproxy/small-things.jpg\"\u003e\u003cimg src=\"https://willnorris.com/api/imageproxy/100,fv,fh/https://willnorris.com/images/imageproxy/small-things.jpg\" alt=\"100,fv,fh\"\u003e\u003c/a\u003e                                        |\n| 200x,q60               | 200px wide, proportional height, 60% quality               | \u003ca href=\"https://willnorris.com/api/imageproxy/200x,q60/https://willnorris.com/images/imageproxy/small-things.jpg\"\u003e\u003cimg src=\"https://willnorris.com/api/imageproxy/200x,q60/https://willnorris.com/images/imageproxy/small-things.jpg\" alt=\"200x,q60\"\u003e\u003c/a\u003e                                           |\n| 200x,png               | 200px wide, converted to PNG format                        | \u003ca href=\"https://willnorris.com/api/imageproxy/200x,png/https://willnorris.com/images/imageproxy/small-things.jpg\"\u003e\u003cimg src=\"https://willnorris.com/api/imageproxy/200x,png/https://willnorris.com/images/imageproxy/small-things.jpg\" alt=\"200x,png\"\u003e\u003c/a\u003e                                           |\n| cx175,cw400,ch300,100x | crop to 400x300px starting at (175,0), scale to 100px wide | \u003ca href=\"https://willnorris.com/api/imageproxy/cx175,cw400,ch300,100x/https://willnorris.com/images/imageproxy/small-things.jpg\"\u003e\u003cimg src=\"https://willnorris.com/api/imageproxy/cx175,cw400,ch300,100x/https://willnorris.com/images/imageproxy/small-things.jpg\" alt=\"cx175,cw400,ch300,100x\"\u003e\u003c/a\u003e |\n\nThe [smart crop feature](https://godoc.org/willnorris.com/go/imageproxy#hdr-Smart_Crop)\ncan best be seen by comparing crops of [this source image][judah-sheets], with\nand without smart crop enabled.\n\n| Options    | Meaning                  | Image                                                                                                                                                                                                                                     |\n| ---------- | ------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |\n| 150x300    | 150x300px, standard crop | \u003ca href=\"https://willnorris.com/api/imageproxy/150x300/https://judahnorris.com/images/judah-sheets.jpg\"\u003e\u003cimg src=\"https://willnorris.com/api/imageproxy/150x300/https://judahnorris.com/images/judah-sheets.jpg\" alt=\"200x400,sc\"\u003e\u003c/a\u003e    |\n| 150x300,sc | 150x300px, smart crop    | \u003ca href=\"https://willnorris.com/api/imageproxy/150x300,sc/https://judahnorris.com/images/judah-sheets.jpg\"\u003e\u003cimg src=\"https://willnorris.com/api/imageproxy/150x300,sc/https://judahnorris.com/images/judah-sheets.jpg\" alt=\"200x400\"\u003e\u003c/a\u003e |\n\n[judah-sheets]: https://judahnorris.com/images/judah-sheets.jpg\n\nTransformation also works on animated gifs. Here is [this source\nimage][material-animation] resized to 200px square and rotated 270 degrees:\n\n[material-animation]: https://willnorris.com/images/imageproxy/material-animations.gif\n\n\u003ca href=\"https://willnorris.com/api/imageproxy/200,r270/https://willnorris.com/images/imageproxy/material-animations.gif\"\u003e\u003cimg src=\"https://willnorris.com/api/imageproxy/200,r270/https://willnorris.com/images/imageproxy/material-animations.gif\" alt=\"200,r270\"\u003e\u003c/a\u003e\n\n## Getting Started\n\nInstall the package using:\n\n    go install willnorris.com/go/imageproxy/cmd/imageproxy@latest\n\nOnce installed, ensure `$GOPATH/bin` is in your `$PATH`, then run the proxy\nusing:\n\n    imageproxy\n\nThis will start the proxy on port 8080, without any caching and with no allowed\nhost list (meaning any remote URL can be proxied). Test this by navigating to\n\u003chttp://localhost:8080/500/https://octodex.github.com/images/codercat.jpg\u003e and\nyou should see a 500px square coder octocat.\n\n### Cache\n\nBy default, the imageproxy command does not cache responses, but caching can be\nenabled using the `-cache` flag. It supports the following values:\n\n- `memory` - uses an in-memory LRU cache. By default, this is limited to\n  100mb. To customize the size of the cache or the max age for cached items,\n  use the format `memory:size:age` where size is measured in mb and age is a\n  duration. For example, `memory:200:4h` will create a 200mb cache that will\n  cache items no longer than 4 hours.\n- directory on local disk (e.g. `/tmp/imageproxy`) - will cache images\n  on disk\n\n- s3 URL (e.g. `s3://region/bucket-name/optional-path-prefix`) - will cache\n  images on Amazon S3. This requires either an IAM role and instance profile\n  with access to your your bucket or `AWS_ACCESS_KEY_ID` and `AWS_SECRET_KEY`\n  environmental variables be set. (Additional methods of loading credentials\n  are documented in the [aws-sdk-go session\n  package](https://docs.aws.amazon.com/sdk-for-go/api/aws/session/)).\n\n  Additional configuration options ([further documented here][aws-options])\n  may be specified as URL query string parameters, which are mostly useful\n  when working with s3-compatible services:\n\n  - \"endpoint\" - specify an alternate API endpoint\n  - \"disableSSL\" - set to \"1\" to disable SSL when calling the API\n  - \"s3ForcePathStyle\" - set to \"1\" to force the request to use path-style addressing\n\n  For example, when working with [minio](https://minio.io), which doesn't use\n  regions, provide a dummy region value and custom endpoint value:\n\n      s3://fake-region/bucket/folder?endpoint=minio:9000\u0026disableSSL=1\u0026s3ForcePathStyle=1\n\n  Similarly, for [Digital Ocean Spaces](https://www.digitalocean.com/products/spaces/),\n  provide a dummy region value and the appropriate endpoint for your space:\n\n      s3://fake-region/bucket/folder?endpoint=sfo2.digitaloceanspaces.com\n\n  [aws-options]: https://docs.aws.amazon.com/sdk-for-go/api/aws/#Config\n\n- gcs URL (e.g. `gcs://bucket-name/optional-path-prefix`) - will cache images\n  on Google Cloud Storage. Authentication is documented in Google's\n  [Application Default Credentials\n  docs](https://cloud.google.com/docs/authentication/production#providing_credentials_to_your_application).\n- azure URL (e.g. `azure://container-name/`) - will cache images on\n  Azure Storage. This requires `AZURESTORAGE_ACCOUNT_NAME` and\n  `AZURESTORAGE_ACCESS_KEY` environment variables to bet set.\n- redis URL (e.g. `redis://hostname/`) - will cache images on\n  the specified redis host. The full URL syntax is defined by the [redis URI\n  registration](https://www.iana.org/assignments/uri-schemes/prov/redis).\n  Rather than specify password in the URI, use the `REDIS_PASSWORD`\n  environment variable.\n\nFor example, to cache files on disk in the `/tmp/imageproxy` directory:\n\n    imageproxy -cache /tmp/imageproxy\n\nReload the [codercat URL][], and then inspect the contents of\n`/tmp/imageproxy`. Within the subdirectories, there should be two files, one\nfor the original full-size codercat image, and one for the resized 500px\nversion.\n\n[codercat URL]: http://localhost:8080/500/https://octodex.github.com/images/codercat.jpg\n\nMultiple caches can be specified by separating them by spaces or by repeating\nthe `-cache` flag multiple times. The caches will be created in a [tiered\nfashion][]. Typically this is used to put a smaller and faster in-memory cache\nin front of a larger but slower on-disk cache. For example, the following will\nfirst check an in-memory cache for an image, followed by a gcs bucket:\n\n    imageproxy -cache memory -cache gcs://my-bucket/\n\n[tiered fashion]: https://godoc.org/github.com/die-net/lrucache/twotier\n\n### Allowed Referrer List\n\nYou can limit images to only be accessible for certain hosts in the HTTP\nreferrer header, which can help prevent others from hotlinking to images. It can\nbe enabled by running:\n\n    imageproxy  -referrers example.com\n\nReload the [codercat URL][], and you should now get an error message. You can\nspecify multiple hosts as a comma separated list, or prefix a host value with\n`*.` to allow all sub-domains as well.\n\n### Allowed and Denied Hosts List\n\nYou can limit the remote hosts that the proxy will fetch images from using the\n`allowHosts` and `denyHosts` flags. This is useful, for example, for locking\nthe proxy down to your own hosts to prevent others from abusing it. Of course\nif you want to support fetching from any host, leave off these flags.\n\nTry it out by running:\n\n    imageproxy -allowHosts example.com\n\nReload the [codercat URL][], and you should now get an error message.\nAlternately, try running:\n\n    imageproxy -denyHosts octodex.github.com\n\nReloading the [codercat URL][] will still return an error message.\n\nYou can specify multiple hosts as a comma separated list to either flag, or\nprefix a host value with `*.` to allow or deny all sub-domains. You can\nalso specify a netblock in CIDR notation (`127.0.0.0/8`) -- this is useful for\nblocking reserved ranges like `127.0.0.0/8`, `192.168.0.0/16`, etc.\n\nIf a host matches both an allowed and denied host, the request will be denied.\n\n### Allowed Content-Type List\n\nYou can limit what content types can be proxied by using the `contentTypes`\nflag. By default, this is set to `image/*`, meaning that imageproxy will\nprocess any image types. You can specify multiple content types as a comma\nseparated list, and suffix values with `*` to perform a wildcard match. Set the\nflag to an empty string to proxy all requests, regardless of content type.\n\n### Signed Requests\n\nInstead of an allowed host list, you can require that requests be signed. This\nis useful in preventing abuse when you don't have just a static list of hosts\nyou want to allow. Signatures are generated using HMAC-SHA256 against the\nremote URL, and url-safe base64 encoding the result:\n\n    base64urlencode(hmac.New(sha256, \u003ckey\u003e).digest(\u003cremote_url\u003e))\n\nThe HMAC key is specified using the `signatureKey` flag. If this flag\nbegins with an \"@\", the remainder of the value is interpreted as a file on disk\nwhich contains the HMAC key.\n\nTry it out by running:\n\n    imageproxy -signatureKey \"secretkey\"\n\nReload the [codercat URL][], and you should see an error message. Now load a\n[signed codercat URL][] (which contains the [signature option][]) and verify\nthat it loads properly.\n\n[signed codercat URL]: http://localhost:8080/500,sXyMwWKIC5JPCtlYOQ2f4yMBTqpjtUsfI67Sp7huXIYY=/https://octodex.github.com/images/codercat.jpg\n[signature option]: https://godoc.org/willnorris.com/go/imageproxy#hdr-Signature\n\nSome simple code samples for generating signatures in various languages can be\nfound in [docs/url-signing.md](/docs/url-signing.md). Multiple valid signature\nkeys may be provided to support key rotation by repeating the `signatureKey`\nflag multiple times, or by providing a space-separated list of keys. To use a\nkey with a literal space character, load the key from a file using the \"@\"\nprefix documented above.\n\nIf both a whiltelist and signatureKey are specified, requests can match either.\nIn other words, requests that match one of the allowed hosts don't necessarily\nneed to be signed, though they can be.\n\n### Default Base URL\n\nTypically, remote images to be proxied are specified as absolute URLs.\nHowever, if you commonly proxy images from a single source, you can provide a\nbase URL and then specify remote images relative to that base. Try it out by\nrunning:\n\n    imageproxy -baseURL https://octodex.github.com/\n\nThen load the codercat image, specified as a URL relative to that base:\n\u003chttp://localhost:8080/500/images/codercat.jpg\u003e. Note that this is not an\neffective method to mask the true source of the images being proxied; it is\ntrivial to discover the base URL being used. Even when a base URL is\nspecified, you can always provide the absolute URL of the image to be proxied.\n\n### Scaling beyond original size\n\nBy default, the imageproxy won't scale images beyond their original size.\nHowever, you can use the `scaleUp` command-line flag to allow this to happen:\n\n    imageproxy -scaleUp true\n\n### WebP and TIFF support\n\nImageproxy can proxy remote webp images, but they will be served in either jpeg\nor png format (this is because the golang webp library only supports webp\ndecoding) if any transformation is requested. If no format is specified,\nimageproxy will use jpeg by default. If no transformation is requested (for\nexample, if you are just using imageproxy as an SSL proxy) then the original\nwebp image will be served as-is without any format conversion.\n\nBecause so few browsers support tiff images, they will be converted to jpeg by\ndefault if any transformation is requested. To force encoding as tiff, pass the\n\"tiff\" option. Like webp, tiff images will be served as-is without any format\nconversion if no transformation is requested.\n\nRun `imageproxy -help` for a complete list of flags the command accepts. If\nyou want to use a different caching implementation, it's probably easiest to\njust make a copy of `cmd/imageproxy/main.go` and customize it to fit your\nneeds... it's a very simple command.\n\n### Environment Variables\n\nAll configuration flags have equivalent environment variables of the form\n`IMAGEPROXY_$NAME`. For example, an on-disk cache could be configured by calling\n\n    IMAGEPROXY_CACHE=\"/tmp/imageproxy\" imageproxy\n\n## Deploying\n\nIn most cases, you can follow the normal procedure for building a deploying any\ngo application. For example:\n\n- `go build willnorris.com/go/imageproxy/cmd/imageproxy`\n- copy resulting binary to `/usr/local/bin`\n- copy [`etc/imageproxy.service`](etc/imageproxy.service) to\n  `/lib/systemd/system` and enable using `systemctl`.\n\nInstructions have been contributed below for running on other platforms, but I\ndon't have much experience with them personally.\n\n### Heroku\n\nIt's easy to vendorize the dependencies with `Godep` and deploy to Heroku. Take\na look at [this GitHub repo](https://github.com/oreillymedia/prototype-imageproxy/tree/heroku)\n(make sure you use the `heroku` branch).\n\n### AWS Elastic Beanstalk\n\n[O’Reilly Media](https://github.com/oreillymedia) set up [a repository](https://github.com/oreillymedia/prototype-imageproxy)\nwith everything you need to deploy imageproxy to Elastic Beanstalk. Just follow the instructions\nin the [README](https://github.com/oreillymedia/prototype-imageproxy/blob/master/Readme.md).\n\n### Docker\n\nA docker image is available at [`ghcr.io/willnorris/imageproxy`](https://github.com/willnorris/imageproxy/pkgs/container/imageproxy).\n\nYou can run it by\n\n```\ndocker run -p 8080:8080 ghcr.io/willnorris/imageproxy -addr 0.0.0.0:8080\n```\n\nOr in your Dockerfile:\n\n```\nENTRYPOINT [\"/app/imageproxy\", \"-addr 0.0.0.0:8080\"]\n```\n\nIf running imageproxy inside docker with a bind-mounted on-disk cache, make sure\nthe container is running as a user that has write permission to the mounted host\ndirectory. See more details in\n[#198](https://github.com/willnorris/imageproxy/issues/198).\n\nNote that all configuration options can be set using [environment\nvariables](#environment-variables), which is often the preferred approach for\ncontainers.\n\n### nginx\n\nUse the `proxy_pass` directive to send requests to your imageproxy instance.\nFor example, to run imageproxy at the path \"/api/imageproxy/\", set:\n\n```\n  location /api/imageproxy/ {\n    proxy_pass http://localhost:4593/;\n  }\n```\n\nDepending on other directives you may have in your nginx config, you might need\nto alter the precedence order by setting:\n\n```\n  location ^~ /api/imageproxy/ {\n    proxy_pass http://localhost:4593/;\n  }\n```\n\n## Clients\n\n- [Ruby](https://github.com/azolf/imageproxy_ruby)\n\n## License\n\nimageproxy is copyright its respective authors. All of my personal work on\nimageproxy through 2020 (which accounts for the majority of the code) is\ncopyright Google, my employer at the time. It is available under the [Apache\n2.0 License](./LICENSE).\n","funding_links":[],"categories":["Go","Image Processing","others","Programming Languages"],"sub_categories":["Snippets Manager","Go"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fwillnorris%2Fimageproxy","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fwillnorris%2Fimageproxy","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fwillnorris%2Fimageproxy/lists"}