Ви не можете вибрати більше 25 тем Теми мають розпочинатися з літери або цифри, можуть містити дефіси (-) і не повинні перевищувати 35 символів.

1011 рядки
25 KiB

  1. /*
  2. The MIT License (MIT)
  3. Copyright (c) 2014-2017 DutchCoders [https://github.com/dutchcoders/]
  4. Permission is hereby granted, free of charge, to any person obtaining a copy
  5. of this software and associated documentation files (the "Software"), to deal
  6. in the Software without restriction, including without limitation the rights
  7. to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  8. copies of the Software, and to permit persons to whom the Software is
  9. furnished to do so, subject to the following conditions:
  10. The above copyright notice and this permission notice shall be included in
  11. all copies or substantial portions of the Software.
  12. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  13. IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  14. FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  15. AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  16. LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  17. OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  18. THE SOFTWARE.
  19. */
  20. package server
  21. import (
  22. // _ "transfer.sh/app/handlers"
  23. // _ "transfer.sh/app/utils"
  24. "archive/tar"
  25. "archive/zip"
  26. "bytes"
  27. "compress/gzip"
  28. "encoding/json"
  29. "errors"
  30. "fmt"
  31. "html"
  32. html_template "html/template"
  33. "io"
  34. "io/ioutil"
  35. "log"
  36. "math/rand"
  37. "mime"
  38. "net/http"
  39. "net/url"
  40. "os"
  41. "path"
  42. "path/filepath"
  43. "strconv"
  44. "strings"
  45. "sync"
  46. text_template "text/template"
  47. "time"
  48. "net"
  49. web "github.com/dutchcoders/transfer.sh-web"
  50. "github.com/gorilla/mux"
  51. "github.com/russross/blackfriday"
  52. "encoding/base64"
  53. qrcode "github.com/skip2/go-qrcode"
  54. )
  55. var (
  56. htmlTemplates = initHTMLTemplates()
  57. textTemplates = initTextTemplates()
  58. )
  59. func stripPrefix(path string) string {
  60. return strings.Replace(path, web.Prefix+"/", "", -1)
  61. }
  62. func initTextTemplates() *text_template.Template {
  63. templateMap := text_template.FuncMap{"format": formatNumber}
  64. // Templates with functions available to them
  65. var templates = text_template.New("").Funcs(templateMap)
  66. return templates
  67. }
  68. func initHTMLTemplates() *html_template.Template {
  69. templateMap := html_template.FuncMap{"format": formatNumber}
  70. // Templates with functions available to them
  71. var templates = html_template.New("").Funcs(templateMap)
  72. return templates
  73. }
  74. func healthHandler(w http.ResponseWriter, r *http.Request) {
  75. fmt.Fprintf(w, "Approaching Neutral Zone, all systems normal and functioning.")
  76. }
  77. /* The preview handler will show a preview of the content for browsers (accept type text/html), and referer is not transfer.sh */
  78. func (s *Server) previewHandler(w http.ResponseWriter, r *http.Request) {
  79. vars := mux.Vars(r)
  80. token := vars["token"]
  81. filename := vars["filename"]
  82. contentType, contentLength, err := s.storage.Head(token, filename)
  83. if err != nil {
  84. http.Error(w, http.StatusText(404), 404)
  85. return
  86. }
  87. var templatePath string
  88. var content html_template.HTML
  89. switch {
  90. case strings.HasPrefix(contentType, "image/"):
  91. templatePath = "download.image.html"
  92. case strings.HasPrefix(contentType, "video/"):
  93. templatePath = "download.video.html"
  94. case strings.HasPrefix(contentType, "audio/"):
  95. templatePath = "download.audio.html"
  96. case strings.HasPrefix(contentType, "text/"):
  97. templatePath = "download.markdown.html"
  98. var reader io.ReadCloser
  99. if reader, _, _, err = s.storage.Get(token, filename); err != nil {
  100. http.Error(w, err.Error(), http.StatusInternalServerError)
  101. return
  102. }
  103. var data []byte
  104. data = make([]byte, _5M)
  105. if _, err = reader.Read(data); err != io.EOF && err != nil {
  106. http.Error(w, err.Error(), http.StatusInternalServerError)
  107. return
  108. }
  109. if strings.HasPrefix(contentType, "text/x-markdown") || strings.HasPrefix(contentType, "text/markdown") {
  110. escapedData := html.EscapeString(string(data))
  111. output := blackfriday.MarkdownCommon([]byte(escapedData))
  112. content = html_template.HTML(output)
  113. } else if strings.HasPrefix(contentType, "text/plain") {
  114. content = html_template.HTML(fmt.Sprintf("<pre>%s</pre>", html.EscapeString(string(data))))
  115. } else {
  116. templatePath = "download.sandbox.html"
  117. }
  118. default:
  119. templatePath = "download.html"
  120. }
  121. resolvedUrl := resolveUrl(r, getURL(r).ResolveReference(r.URL), true)
  122. var png []byte
  123. png, err = qrcode.Encode(resolvedUrl, qrcode.High, 150)
  124. if err != nil {
  125. http.Error(w, err.Error(), http.StatusInternalServerError)
  126. return
  127. }
  128. qrCode := base64.StdEncoding.EncodeToString(png)
  129. hostname := getURL(r).Host
  130. webAddress := resolveWebAddress(r, s.proxyPath)
  131. data := struct {
  132. ContentType string
  133. Content html_template.HTML
  134. Filename string
  135. Url string
  136. Hostname string
  137. WebAddress string
  138. ContentLength uint64
  139. GAKey string
  140. UserVoiceKey string
  141. QRCode string
  142. }{
  143. contentType,
  144. content,
  145. filename,
  146. resolvedUrl,
  147. hostname,
  148. webAddress,
  149. contentLength,
  150. s.gaKey,
  151. s.userVoiceKey,
  152. qrCode,
  153. }
  154. if err := htmlTemplates.ExecuteTemplate(w, templatePath, data); err != nil {
  155. http.Error(w, err.Error(), http.StatusInternalServerError)
  156. return
  157. }
  158. }
  159. // this handler will output html or text, depending on the
  160. // support of the client (Accept header).
  161. func (s *Server) viewHandler(w http.ResponseWriter, r *http.Request) {
  162. // vars := mux.Vars(r)
  163. hostname := getURL(r).Host
  164. webAddress := resolveWebAddress(r, s.proxyPath)
  165. data := struct {
  166. Hostname string
  167. WebAddress string
  168. GAKey string
  169. UserVoiceKey string
  170. }{
  171. hostname,
  172. webAddress,
  173. s.gaKey,
  174. s.userVoiceKey,
  175. }
  176. if acceptsHTML(r.Header) {
  177. if err := htmlTemplates.ExecuteTemplate(w, "index.html", data); err != nil {
  178. http.Error(w, err.Error(), http.StatusInternalServerError)
  179. return
  180. }
  181. } else {
  182. if err := textTemplates.ExecuteTemplate(w, "index.txt", data); err != nil {
  183. http.Error(w, err.Error(), http.StatusInternalServerError)
  184. return
  185. }
  186. }
  187. }
  188. func (s *Server) notFoundHandler(w http.ResponseWriter, r *http.Request) {
  189. http.Error(w, http.StatusText(404), 404)
  190. }
  191. func sanitize(fileName string) string {
  192. return path.Clean(path.Base(fileName))
  193. }
  194. func (s *Server) postHandler(w http.ResponseWriter, r *http.Request) {
  195. if err := r.ParseMultipartForm(_24K); nil != err {
  196. log.Printf("%s", err.Error())
  197. http.Error(w, "Error occurred copying to output stream", 500)
  198. return
  199. }
  200. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  201. w.Header().Set("Content-Type", "text/plain")
  202. for _, fheaders := range r.MultipartForm.File {
  203. for _, fheader := range fheaders {
  204. filename := sanitize(fheader.Filename)
  205. contentType := fheader.Header.Get("Content-Type")
  206. if contentType == "" {
  207. contentType = mime.TypeByExtension(filepath.Ext(fheader.Filename))
  208. }
  209. var f io.Reader
  210. var err error
  211. if f, err = fheader.Open(); err != nil {
  212. log.Printf("%s", err.Error())
  213. http.Error(w, err.Error(), 500)
  214. return
  215. }
  216. var b bytes.Buffer
  217. n, err := io.CopyN(&b, f, _24K+1)
  218. if err != nil && err != io.EOF {
  219. log.Printf("%s", err.Error())
  220. http.Error(w, err.Error(), 500)
  221. return
  222. }
  223. var file *os.File
  224. var reader io.Reader
  225. if n > _24K {
  226. file, err = ioutil.TempFile(s.tempPath, "transfer-")
  227. if err != nil {
  228. log.Fatal(err)
  229. }
  230. n, err = io.Copy(file, io.MultiReader(&b, f))
  231. if err != nil {
  232. cleanTmpFile(file)
  233. log.Printf("%s", err.Error())
  234. http.Error(w, err.Error(), 500)
  235. return
  236. }
  237. reader, err = os.Open(file.Name())
  238. } else {
  239. reader = bytes.NewReader(b.Bytes())
  240. }
  241. contentLength := n
  242. metadata := MetadataForRequest(contentType, r)
  243. buffer := &bytes.Buffer{}
  244. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  245. log.Printf("%s", err.Error())
  246. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  247. cleanTmpFile(file)
  248. return
  249. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  250. log.Printf("%s", err.Error())
  251. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  252. cleanTmpFile(file)
  253. return
  254. }
  255. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  256. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  257. log.Printf("Backend storage error: %s", err.Error())
  258. http.Error(w, err.Error(), 500)
  259. return
  260. }
  261. filename = url.QueryEscape(filename)
  262. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  263. fmt.Fprintln(w, getURL(r).ResolveReference(relativeURL).String())
  264. cleanTmpFile(file)
  265. }
  266. }
  267. }
  268. func cleanTmpFile(f *os.File) {
  269. if f != nil {
  270. err := f.Close()
  271. if err != nil {
  272. log.Printf("Error closing tmpfile: %s (%s)", err, f.Name())
  273. }
  274. err = os.Remove(f.Name())
  275. if err != nil {
  276. log.Printf("Error removing tmpfile: %s (%s)", err, f.Name())
  277. }
  278. }
  279. }
  280. type Metadata struct {
  281. // ContentType is the original uploading content type
  282. ContentType string
  283. // Secret as knowledge to delete file
  284. // Secret string
  285. // Downloads is the actual number of downloads
  286. Downloads int
  287. // MaxDownloads contains the maximum numbers of downloads
  288. MaxDownloads int
  289. // MaxDate contains the max age of the file
  290. MaxDate time.Time
  291. // DeletionToken contains the token to match against for deletion
  292. DeletionToken string
  293. }
  294. func MetadataForRequest(contentType string, r *http.Request) Metadata {
  295. metadata := Metadata{
  296. ContentType: contentType,
  297. MaxDate: time.Now().Add(time.Hour * 24 * 365 * 10),
  298. Downloads: 0,
  299. MaxDownloads: 99999999,
  300. DeletionToken: Encode(10000000+int64(rand.Intn(1000000000))) + Encode(10000000+int64(rand.Intn(1000000000))),
  301. }
  302. if v := r.Header.Get("Max-Downloads"); v == "" {
  303. } else if v, err := strconv.Atoi(v); err != nil {
  304. } else {
  305. metadata.MaxDownloads = v
  306. }
  307. if v := r.Header.Get("Max-Days"); v == "" {
  308. } else if v, err := strconv.Atoi(v); err != nil {
  309. } else {
  310. metadata.MaxDate = time.Now().Add(time.Hour * 24 * time.Duration(v))
  311. }
  312. return metadata
  313. }
  314. func (s *Server) putHandler(w http.ResponseWriter, r *http.Request) {
  315. vars := mux.Vars(r)
  316. filename := sanitize(vars["filename"])
  317. contentLength := r.ContentLength
  318. var reader io.Reader
  319. reader = r.Body
  320. defer r.Body.Close()
  321. if contentLength == -1 {
  322. // queue file to disk, because s3 needs content length
  323. var err error
  324. var f io.Reader
  325. f = reader
  326. var b bytes.Buffer
  327. n, err := io.CopyN(&b, f, _24K+1)
  328. if err != nil && err != io.EOF {
  329. log.Printf("Error putting new file: %s", err.Error())
  330. http.Error(w, err.Error(), 500)
  331. return
  332. }
  333. var file *os.File
  334. if n > _24K {
  335. file, err = ioutil.TempFile(s.tempPath, "transfer-")
  336. if err != nil {
  337. log.Printf("%s", err.Error())
  338. http.Error(w, err.Error(), 500)
  339. return
  340. }
  341. defer cleanTmpFile(file)
  342. n, err = io.Copy(file, io.MultiReader(&b, f))
  343. if err != nil {
  344. log.Printf("%s", err.Error())
  345. http.Error(w, err.Error(), 500)
  346. return
  347. }
  348. reader, err = os.Open(file.Name())
  349. } else {
  350. reader = bytes.NewReader(b.Bytes())
  351. }
  352. contentLength = n
  353. }
  354. if contentLength == 0 {
  355. log.Print("Empty content-length")
  356. http.Error(w, errors.New("Could not upload empty file").Error(), 400)
  357. return
  358. }
  359. contentType := r.Header.Get("Content-Type")
  360. if contentType == "" {
  361. contentType = mime.TypeByExtension(filepath.Ext(vars["filename"]))
  362. }
  363. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  364. metadata := MetadataForRequest(contentType, r)
  365. buffer := &bytes.Buffer{}
  366. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  367. log.Printf("%s", err.Error())
  368. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  369. return
  370. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  371. log.Printf("%s", err.Error())
  372. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  373. return
  374. }
  375. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  376. var err error
  377. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  378. log.Printf("Error putting new file: %s", err.Error())
  379. http.Error(w, errors.New("Could not save file").Error(), 500)
  380. return
  381. }
  382. // w.Statuscode = 200
  383. w.Header().Set("Content-Type", "text/plain")
  384. filename = url.QueryEscape(filename)
  385. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  386. deleteUrl, _ := url.Parse(path.Join(s.proxyPath, token, filename, metadata.DeletionToken))
  387. w.Header().Set("X-Url-Delete", resolveUrl(r, deleteUrl, true))
  388. fmt.Fprint(w, resolveUrl(r, relativeURL, false))
  389. }
  390. func resolveUrl(r *http.Request, u *url.URL, absolutePath bool) string {
  391. if absolutePath {
  392. r.URL.Path = ""
  393. }
  394. return getURL(r).ResolveReference(u).String()
  395. }
  396. func resolveKey(key, proxyPath string) string {
  397. if strings.HasPrefix(key, "/") {
  398. key = key[1:]
  399. }
  400. if strings.HasPrefix(key, proxyPath) {
  401. key = key[len(proxyPath):]
  402. }
  403. key = strings.Replace(key, "\\", "/", -1)
  404. return key
  405. }
  406. func resolveWebAddress(r *http.Request, proxyPath string) string {
  407. url := getURL(r)
  408. var webAddress string
  409. if len(proxyPath) == 0 {
  410. webAddress = fmt.Sprintf("%s://%s/",
  411. url.ResolveReference(url).Scheme,
  412. url.ResolveReference(url).Host)
  413. } else {
  414. webAddress = fmt.Sprintf("%s://%s/%s",
  415. url.ResolveReference(url).Scheme,
  416. url.ResolveReference(url).Host,
  417. proxyPath)
  418. }
  419. return webAddress
  420. }
  421. func getURL(r *http.Request) *url.URL {
  422. u, _ := url.Parse(r.URL.String())
  423. if r.TLS != nil {
  424. u.Scheme = "https"
  425. } else if proto := r.Header.Get("X-Forwarded-Proto"); proto != "" {
  426. u.Scheme = proto
  427. } else {
  428. u.Scheme = "http"
  429. }
  430. if u.Host != "" {
  431. } else if host, port, err := net.SplitHostPort(r.Host); err != nil {
  432. u.Host = r.Host
  433. } else {
  434. if port == "80" && u.Scheme == "http" {
  435. u.Host = host
  436. } else if port == "443" && u.Scheme == "https" {
  437. u.Host = host
  438. } else {
  439. u.Host = net.JoinHostPort(host, port)
  440. }
  441. }
  442. return u
  443. }
  444. func (s *Server) Lock(token, filename string) error {
  445. key := path.Join(token, filename)
  446. if _, ok := s.locks[key]; !ok {
  447. s.locks[key] = &sync.Mutex{}
  448. }
  449. s.locks[key].Lock()
  450. return nil
  451. }
  452. func (s *Server) Unlock(token, filename string) error {
  453. key := path.Join(token, filename)
  454. s.locks[key].Unlock()
  455. return nil
  456. }
  457. func (s *Server) CheckMetadata(token, filename string) error {
  458. s.Lock(token, filename)
  459. defer s.Unlock(token, filename)
  460. var metadata Metadata
  461. r, _, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  462. if s.storage.IsNotExist(err) {
  463. return nil
  464. } else if err != nil {
  465. return err
  466. }
  467. defer r.Close()
  468. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  469. return err
  470. } else if metadata.Downloads >= metadata.MaxDownloads {
  471. return errors.New("MaxDownloads expired.")
  472. } else if time.Now().After(metadata.MaxDate) {
  473. return errors.New("MaxDate expired.")
  474. } else {
  475. // todo(nl5887): mutex?
  476. // update number of downloads
  477. metadata.Downloads++
  478. buffer := &bytes.Buffer{}
  479. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  480. return errors.New("Could not encode metadata")
  481. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  482. return errors.New("Could not save metadata")
  483. }
  484. }
  485. return nil
  486. }
  487. func (s *Server) CheckDeletionToken(deletionToken, token, filename string) error {
  488. s.Lock(token, filename)
  489. defer s.Unlock(token, filename)
  490. var metadata Metadata
  491. r, _, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  492. if s.storage.IsNotExist(err) {
  493. return nil
  494. } else if err != nil {
  495. return err
  496. }
  497. defer r.Close()
  498. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  499. return err
  500. } else if metadata.DeletionToken != deletionToken {
  501. return errors.New("Deletion token doesn't match.")
  502. }
  503. return nil
  504. }
  505. func (s *Server) deleteHandler(w http.ResponseWriter, r *http.Request) {
  506. vars := mux.Vars(r)
  507. token := vars["token"]
  508. filename := vars["filename"]
  509. deletionToken := vars["deletionToken"]
  510. if err := s.CheckDeletionToken(deletionToken, token, filename); err != nil {
  511. log.Printf("Error metadata: %s", err.Error())
  512. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  513. return
  514. }
  515. err := s.storage.Delete(token, filename)
  516. if s.storage.IsNotExist(err) {
  517. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  518. return
  519. } else if err != nil {
  520. log.Printf("%s", err.Error())
  521. http.Error(w, "Could not delete file.", 500)
  522. return
  523. }
  524. }
  525. func (s *Server) zipHandler(w http.ResponseWriter, r *http.Request) {
  526. vars := mux.Vars(r)
  527. files := vars["files"]
  528. zipfilename := fmt.Sprintf("transfersh-%d.zip", uint16(time.Now().UnixNano()))
  529. w.Header().Set("Content-Type", "application/zip")
  530. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", zipfilename))
  531. w.Header().Set("Connection", "close")
  532. zw := zip.NewWriter(w)
  533. for _, key := range strings.Split(files, ",") {
  534. key = resolveKey(key, s.proxyPath)
  535. token := strings.Split(key, "/")[0]
  536. filename := sanitize(strings.Split(key, "/")[1])
  537. if err := s.CheckMetadata(token, filename); err != nil {
  538. log.Printf("Error metadata: %s", err.Error())
  539. continue
  540. }
  541. reader, _, _, err := s.storage.Get(token, filename)
  542. if err != nil {
  543. if s.storage.IsNotExist(err) {
  544. http.Error(w, "File not found", 404)
  545. return
  546. } else {
  547. log.Printf("%s", err.Error())
  548. http.Error(w, "Could not retrieve file.", 500)
  549. return
  550. }
  551. }
  552. defer reader.Close()
  553. header := &zip.FileHeader{
  554. Name: strings.Split(key, "/")[1],
  555. Method: zip.Store,
  556. ModifiedTime: uint16(time.Now().UnixNano()),
  557. ModifiedDate: uint16(time.Now().UnixNano()),
  558. }
  559. fw, err := zw.CreateHeader(header)
  560. if err != nil {
  561. log.Printf("%s", err.Error())
  562. http.Error(w, "Internal server error.", 500)
  563. return
  564. }
  565. if _, err = io.Copy(fw, reader); err != nil {
  566. log.Printf("%s", err.Error())
  567. http.Error(w, "Internal server error.", 500)
  568. return
  569. }
  570. }
  571. if err := zw.Close(); err != nil {
  572. log.Printf("%s", err.Error())
  573. http.Error(w, "Internal server error.", 500)
  574. return
  575. }
  576. }
  577. func (s *Server) tarGzHandler(w http.ResponseWriter, r *http.Request) {
  578. vars := mux.Vars(r)
  579. files := vars["files"]
  580. tarfilename := fmt.Sprintf("transfersh-%d.tar.gz", uint16(time.Now().UnixNano()))
  581. w.Header().Set("Content-Type", "application/x-gzip")
  582. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  583. w.Header().Set("Connection", "close")
  584. os := gzip.NewWriter(w)
  585. defer os.Close()
  586. zw := tar.NewWriter(os)
  587. defer zw.Close()
  588. for _, key := range strings.Split(files, ",") {
  589. key = resolveKey(key, s.proxyPath)
  590. token := strings.Split(key, "/")[0]
  591. filename := sanitize(strings.Split(key, "/")[1])
  592. if err := s.CheckMetadata(token, filename); err != nil {
  593. log.Printf("Error metadata: %s", err.Error())
  594. continue
  595. }
  596. reader, _, contentLength, err := s.storage.Get(token, filename)
  597. if err != nil {
  598. if s.storage.IsNotExist(err) {
  599. http.Error(w, "File not found", 404)
  600. return
  601. } else {
  602. log.Printf("%s", err.Error())
  603. http.Error(w, "Could not retrieve file.", 500)
  604. return
  605. }
  606. }
  607. defer reader.Close()
  608. header := &tar.Header{
  609. Name: strings.Split(key, "/")[1],
  610. Size: int64(contentLength),
  611. }
  612. err = zw.WriteHeader(header)
  613. if err != nil {
  614. log.Printf("%s", err.Error())
  615. http.Error(w, "Internal server error.", 500)
  616. return
  617. }
  618. if _, err = io.Copy(zw, reader); err != nil {
  619. log.Printf("%s", err.Error())
  620. http.Error(w, "Internal server error.", 500)
  621. return
  622. }
  623. }
  624. }
  625. func (s *Server) tarHandler(w http.ResponseWriter, r *http.Request) {
  626. vars := mux.Vars(r)
  627. files := vars["files"]
  628. tarfilename := fmt.Sprintf("transfersh-%d.tar", uint16(time.Now().UnixNano()))
  629. w.Header().Set("Content-Type", "application/x-tar")
  630. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  631. w.Header().Set("Connection", "close")
  632. zw := tar.NewWriter(w)
  633. defer zw.Close()
  634. for _, key := range strings.Split(files, ",") {
  635. key = resolveKey(key, s.proxyPath)
  636. token := strings.Split(key, "/")[0]
  637. filename := strings.Split(key, "/")[1]
  638. if err := s.CheckMetadata(token, filename); err != nil {
  639. log.Printf("Error metadata: %s", err.Error())
  640. continue
  641. }
  642. reader, _, contentLength, err := s.storage.Get(token, filename)
  643. if err != nil {
  644. if s.storage.IsNotExist(err) {
  645. http.Error(w, "File not found", 404)
  646. return
  647. } else {
  648. log.Printf("%s", err.Error())
  649. http.Error(w, "Could not retrieve file.", 500)
  650. return
  651. }
  652. }
  653. defer reader.Close()
  654. header := &tar.Header{
  655. Name: strings.Split(key, "/")[1],
  656. Size: int64(contentLength),
  657. }
  658. err = zw.WriteHeader(header)
  659. if err != nil {
  660. log.Printf("%s", err.Error())
  661. http.Error(w, "Internal server error.", 500)
  662. return
  663. }
  664. if _, err = io.Copy(zw, reader); err != nil {
  665. log.Printf("%s", err.Error())
  666. http.Error(w, "Internal server error.", 500)
  667. return
  668. }
  669. }
  670. }
  671. func (s *Server) headHandler(w http.ResponseWriter, r *http.Request) {
  672. vars := mux.Vars(r)
  673. token := vars["token"]
  674. filename := vars["filename"]
  675. if err := s.CheckMetadata(token, filename); err != nil {
  676. log.Printf("Error metadata: %s", err.Error())
  677. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  678. return
  679. }
  680. contentType, contentLength, err := s.storage.Head(token, filename)
  681. if s.storage.IsNotExist(err) {
  682. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  683. return
  684. } else if err != nil {
  685. log.Printf("%s", err.Error())
  686. http.Error(w, "Could not retrieve file.", 500)
  687. return
  688. }
  689. w.Header().Set("Content-Type", contentType)
  690. w.Header().Set("Content-Length", strconv.FormatUint(contentLength, 10))
  691. w.Header().Set("Connection", "close")
  692. }
  693. func (s *Server) getHandler(w http.ResponseWriter, r *http.Request) {
  694. vars := mux.Vars(r)
  695. action := vars["action"]
  696. token := vars["token"]
  697. filename := vars["filename"]
  698. if err := s.CheckMetadata(token, filename); err != nil {
  699. log.Printf("Error metadata: %s", err.Error())
  700. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  701. return
  702. }
  703. reader, contentType, contentLength, err := s.storage.Get(token, filename)
  704. if s.storage.IsNotExist(err) {
  705. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  706. return
  707. } else if err != nil {
  708. log.Printf("%s", err.Error())
  709. http.Error(w, "Could not retrieve file.", 500)
  710. return
  711. }
  712. defer reader.Close()
  713. var disposition string
  714. if action == "inline" {
  715. disposition = "inline"
  716. } else {
  717. disposition = "attachment"
  718. }
  719. w.Header().Set("Content-Type", contentType)
  720. w.Header().Set("Content-Length", strconv.FormatUint(contentLength, 10))
  721. w.Header().Set("Content-Disposition", fmt.Sprintf("%s; filename=\"%s\"", disposition, filename))
  722. w.Header().Set("Connection", "keep-alive")
  723. if w.Header().Get("Range") == "" {
  724. if _, err = io.Copy(w, reader); err != nil {
  725. log.Printf("%s", err.Error())
  726. http.Error(w, "Error occurred copying to output stream", 500)
  727. return
  728. }
  729. return
  730. }
  731. file, err := ioutil.TempFile(s.tempPath, "range-")
  732. if err != nil {
  733. log.Printf("%s", err.Error())
  734. http.Error(w, "Error occurred copying to output stream", 500)
  735. return
  736. }
  737. defer cleanTmpFile(file)
  738. tee := io.TeeReader(reader, file)
  739. for {
  740. b := make([]byte, _5M)
  741. _, err = tee.Read(b)
  742. if err == io.EOF {
  743. break
  744. }
  745. if err != nil {
  746. log.Printf("%s", err.Error())
  747. http.Error(w, "Error occurred copying to output stream", 500)
  748. return
  749. }
  750. }
  751. http.ServeContent(w, r, filename, time.Now(), file)
  752. }
  753. func (s *Server) RedirectHandler(h http.Handler) http.HandlerFunc {
  754. return func(w http.ResponseWriter, r *http.Request) {
  755. if !s.forceHTTPs {
  756. // we don't want to enforce https
  757. } else if r.URL.Path == "/health.html" {
  758. // health check url won't redirect
  759. } else if strings.HasSuffix(ipAddrFromRemoteAddr(r.Host), ".onion") {
  760. // .onion addresses cannot get a valid certificate, so don't redirect
  761. } else if r.Header.Get("X-Forwarded-Proto") == "https" {
  762. } else if r.URL.Scheme == "https" {
  763. } else {
  764. u := getURL(r)
  765. u.Scheme = "https"
  766. http.Redirect(w, r, u.String(), http.StatusPermanentRedirect)
  767. return
  768. }
  769. h.ServeHTTP(w, r)
  770. }
  771. }
  772. // Create a log handler for every request it receives.
  773. func LoveHandler(h http.Handler) http.HandlerFunc {
  774. return func(w http.ResponseWriter, r *http.Request) {
  775. w.Header().Set("x-made-with", "<3 by DutchCoders")
  776. w.Header().Set("x-served-by", "Proudly served by DutchCoders")
  777. w.Header().Set("Server", "Transfer.sh HTTP Server 1.0")
  778. h.ServeHTTP(w, r)
  779. }
  780. }
  781. func (s *Server) BasicAuthHandler(h http.Handler) http.HandlerFunc {
  782. return func(w http.ResponseWriter, r *http.Request) {
  783. if s.AuthUser == "" || s.AuthPass == "" {
  784. h.ServeHTTP(w, r)
  785. return
  786. }
  787. w.Header().Set("WWW-Authenticate", "Basic realm=\"Restricted\"")
  788. username, password, authOK := r.BasicAuth()
  789. if authOK == false {
  790. http.Error(w, "Not authorized", 401)
  791. return
  792. }
  793. if username != s.AuthUser || password != s.AuthPass {
  794. http.Error(w, "Not authorized", 401)
  795. return
  796. }
  797. h.ServeHTTP(w, r)
  798. }
  799. }