You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

878 lines
22 KiB

  1. /*
  2. The MIT License (MIT)
  3. Copyright (c) 2014-2017 DutchCoders [https://github.com/dutchcoders/]
  4. Permission is hereby granted, free of charge, to any person obtaining a copy
  5. of this software and associated documentation files (the "Software"), to deal
  6. in the Software without restriction, including without limitation the rights
  7. to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  8. copies of the Software, and to permit persons to whom the Software is
  9. furnished to do so, subject to the following conditions:
  10. The above copyright notice and this permission notice shall be included in
  11. all copies or substantial portions of the Software.
  12. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  13. IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  14. FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  15. AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  16. LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  17. OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  18. THE SOFTWARE.
  19. */
  20. package server
  21. import (
  22. // _ "transfer.sh/app/handlers"
  23. // _ "transfer.sh/app/utils"
  24. "archive/tar"
  25. "archive/zip"
  26. "bytes"
  27. "compress/gzip"
  28. "encoding/json"
  29. "errors"
  30. "fmt"
  31. "html"
  32. html_template "html/template"
  33. "io"
  34. "io/ioutil"
  35. "log"
  36. "math/rand"
  37. "mime"
  38. "net/http"
  39. "net/url"
  40. "os"
  41. "path"
  42. "path/filepath"
  43. "strconv"
  44. "strings"
  45. "sync"
  46. text_template "text/template"
  47. "time"
  48. "net"
  49. web "github.com/dutchcoders/transfer.sh-web"
  50. "github.com/gorilla/mux"
  51. "github.com/russross/blackfriday"
  52. qrcode "github.com/skip2/go-qrcode"
  53. "encoding/base64"
  54. )
  55. var (
  56. htmlTemplates = initHTMLTemplates()
  57. textTemplates = initTextTemplates()
  58. )
  59. func stripPrefix(path string) string {
  60. return strings.Replace(path, web.Prefix+"/", "", -1)
  61. }
  62. func initTextTemplates() *text_template.Template {
  63. templateMap := text_template.FuncMap{"format": formatNumber}
  64. // Templates with functions available to them
  65. var templates = text_template.New("").Funcs(templateMap)
  66. return templates
  67. }
  68. func initHTMLTemplates() *html_template.Template {
  69. templateMap := html_template.FuncMap{"format": formatNumber}
  70. // Templates with functions available to them
  71. var templates = html_template.New("").Funcs(templateMap)
  72. return templates
  73. }
  74. func healthHandler(w http.ResponseWriter, r *http.Request) {
  75. fmt.Fprintf(w, "Approaching Neutral Zone, all systems normal and functioning.")
  76. }
  77. /* The preview handler will show a preview of the content for browsers (accept type text/html), and referer is not transfer.sh */
  78. func (s *Server) previewHandler(w http.ResponseWriter, r *http.Request) {
  79. vars := mux.Vars(r)
  80. token := vars["token"]
  81. filename := vars["filename"]
  82. contentType, contentLength, err := s.storage.Head(token, filename)
  83. if err != nil {
  84. http.Error(w, http.StatusText(404), 404)
  85. return
  86. }
  87. var templatePath string
  88. var content html_template.HTML
  89. switch {
  90. case strings.HasPrefix(contentType, "image/"):
  91. templatePath = "download.image.html"
  92. case strings.HasPrefix(contentType, "video/"):
  93. templatePath = "download.video.html"
  94. case strings.HasPrefix(contentType, "audio/"):
  95. templatePath = "download.audio.html"
  96. case strings.HasPrefix(contentType, "text/"):
  97. templatePath = "download.markdown.html"
  98. var reader io.ReadCloser
  99. if reader, _, _, err = s.storage.Get(token, filename); err != nil {
  100. http.Error(w, err.Error(), http.StatusInternalServerError)
  101. return
  102. }
  103. var data []byte
  104. if data, err = ioutil.ReadAll(reader); err != nil {
  105. http.Error(w, err.Error(), http.StatusInternalServerError)
  106. return
  107. }
  108. if strings.HasPrefix(contentType, "text/x-markdown") || strings.HasPrefix(contentType, "text/markdown") {
  109. output := blackfriday.MarkdownCommon(data)
  110. content = html_template.HTML(output)
  111. } else if strings.HasPrefix(contentType, "text/plain") {
  112. content = html_template.HTML(fmt.Sprintf("<pre>%s</pre>", html.EscapeString(string(data))))
  113. } else {
  114. templatePath = "download.sandbox.html"
  115. }
  116. default:
  117. templatePath = "download.html"
  118. }
  119. if err != nil {
  120. http.Error(w, err.Error(), http.StatusInternalServerError)
  121. return
  122. }
  123. var png []byte
  124. png, err = qrcode.Encode(resolveUrl(r, getURL(r).ResolveReference(r.URL), true), qrcode.High, 150)
  125. if err != nil {
  126. http.Error(w, err.Error(), http.StatusInternalServerError)
  127. return
  128. }
  129. qrCode := base64.StdEncoding.EncodeToString(png)
  130. data := struct {
  131. ContentType string
  132. Content html_template.HTML
  133. Filename string
  134. Url string
  135. ContentLength uint64
  136. GAKey string
  137. UserVoiceKey string
  138. QRCode string
  139. }{
  140. contentType,
  141. content,
  142. filename,
  143. r.URL.String(),
  144. contentLength,
  145. s.gaKey,
  146. s.userVoiceKey,
  147. qrCode,
  148. }
  149. if err := htmlTemplates.ExecuteTemplate(w, templatePath, data); err != nil {
  150. http.Error(w, err.Error(), http.StatusInternalServerError)
  151. return
  152. }
  153. }
  154. // this handler will output html or text, depending on the
  155. // support of the client (Accept header).
  156. func (s *Server) viewHandler(w http.ResponseWriter, r *http.Request) {
  157. // vars := mux.Vars(r)
  158. if acceptsHTML(r.Header) {
  159. if err := htmlTemplates.ExecuteTemplate(w, "index.html", nil); err != nil {
  160. http.Error(w, err.Error(), http.StatusInternalServerError)
  161. return
  162. }
  163. } else {
  164. if err := textTemplates.ExecuteTemplate(w, "index.txt", nil); err != nil {
  165. http.Error(w, err.Error(), http.StatusInternalServerError)
  166. return
  167. }
  168. }
  169. }
  170. func (s *Server) notFoundHandler(w http.ResponseWriter, r *http.Request) {
  171. http.Error(w, http.StatusText(404), 404)
  172. }
  173. func sanitize(fileName string) string {
  174. return path.Clean(path.Base(fileName))
  175. }
  176. func (s *Server) postHandler(w http.ResponseWriter, r *http.Request) {
  177. if err := r.ParseMultipartForm(_24K); nil != err {
  178. log.Printf("%s", err.Error())
  179. http.Error(w, "Error occurred copying to output stream", 500)
  180. return
  181. }
  182. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  183. w.Header().Set("Content-Type", "text/plain")
  184. for _, fheaders := range r.MultipartForm.File {
  185. for _, fheader := range fheaders {
  186. filename := sanitize(fheader.Filename)
  187. contentType := fheader.Header.Get("Content-Type")
  188. if contentType == "" {
  189. contentType = mime.TypeByExtension(filepath.Ext(fheader.Filename))
  190. }
  191. var f io.Reader
  192. var err error
  193. if f, err = fheader.Open(); err != nil {
  194. log.Printf("%s", err.Error())
  195. http.Error(w, err.Error(), 500)
  196. return
  197. }
  198. var b bytes.Buffer
  199. n, err := io.CopyN(&b, f, _24K+1)
  200. if err != nil && err != io.EOF {
  201. log.Printf("%s", err.Error())
  202. http.Error(w, err.Error(), 500)
  203. return
  204. }
  205. var reader io.Reader
  206. if n > _24K {
  207. file, err := ioutil.TempFile(s.tempPath, "transfer-")
  208. if err != nil {
  209. log.Fatal(err)
  210. }
  211. defer file.Close()
  212. n, err = io.Copy(file, io.MultiReader(&b, f))
  213. if err != nil {
  214. os.Remove(file.Name())
  215. log.Printf("%s", err.Error())
  216. http.Error(w, err.Error(), 500)
  217. return
  218. }
  219. reader, err = os.Open(file.Name())
  220. } else {
  221. reader = bytes.NewReader(b.Bytes())
  222. }
  223. contentLength := n
  224. metadata := MetadataForRequest(contentType, r)
  225. buffer := &bytes.Buffer{}
  226. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  227. log.Printf("%s", err.Error())
  228. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  229. return
  230. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  231. log.Printf("%s", err.Error())
  232. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  233. return
  234. }
  235. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  236. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  237. log.Printf("Backend storage error: %s", err.Error())
  238. http.Error(w, err.Error(), 500)
  239. return
  240. }
  241. relativeURL, _ := url.Parse(path.Join(token, filename))
  242. fmt.Fprint(w, getURL(r).ResolveReference(relativeURL).String())
  243. }
  244. }
  245. }
  246. type Metadata struct {
  247. // ContentType is the original uploading content type
  248. ContentType string
  249. // Secret as knowledge to delete file
  250. // Secret string
  251. // Downloads is the actual number of downloads
  252. Downloads int
  253. // MaxDownloads contains the maximum numbers of downloads
  254. MaxDownloads int
  255. // MaxDate contains the max age of the file
  256. MaxDate time.Time
  257. // DeletionToken contains the token to match against for deletion
  258. DeletionToken string
  259. }
  260. func MetadataForRequest(contentType string, r *http.Request) Metadata {
  261. metadata := Metadata{
  262. ContentType: contentType,
  263. MaxDate: time.Now().Add(time.Hour * 24 * 365 * 10),
  264. Downloads: 0,
  265. MaxDownloads: 99999999,
  266. DeletionToken: Encode(10000000 + int64(rand.Intn(1000000000))) + Encode(10000000 + int64(rand.Intn(1000000000))),
  267. }
  268. if v := r.Header.Get("Max-Downloads"); v == "" {
  269. } else if v, err := strconv.Atoi(v); err != nil {
  270. } else {
  271. metadata.MaxDownloads = v
  272. }
  273. if v := r.Header.Get("Max-Days"); v == "" {
  274. } else if v, err := strconv.Atoi(v); err != nil {
  275. } else {
  276. metadata.MaxDate = time.Now().Add(time.Hour * 24 * time.Duration(v))
  277. }
  278. return metadata
  279. }
  280. func (s *Server) putHandler(w http.ResponseWriter, r *http.Request) {
  281. vars := mux.Vars(r)
  282. filename := sanitize(vars["filename"])
  283. contentLength := r.ContentLength
  284. var reader io.Reader
  285. reader = r.Body
  286. if contentLength == -1 {
  287. // queue file to disk, because s3 needs content length
  288. var err error
  289. var f io.Reader
  290. f = reader
  291. var b bytes.Buffer
  292. n, err := io.CopyN(&b, f, _24K+1)
  293. if err != nil && err != io.EOF {
  294. log.Printf("Error putting new file: %s", err.Error())
  295. http.Error(w, err.Error(), 500)
  296. return
  297. }
  298. if n > _24K {
  299. file, err := ioutil.TempFile(s.tempPath, "transfer-")
  300. if err != nil {
  301. log.Printf("%s", err.Error())
  302. http.Error(w, err.Error(), 500)
  303. return
  304. }
  305. defer file.Close()
  306. n, err = io.Copy(file, io.MultiReader(&b, f))
  307. if err != nil {
  308. os.Remove(file.Name())
  309. log.Printf("%s", err.Error())
  310. http.Error(w, err.Error(), 500)
  311. return
  312. }
  313. reader, err = os.Open(file.Name())
  314. } else {
  315. reader = bytes.NewReader(b.Bytes())
  316. }
  317. contentLength = n
  318. }
  319. contentType := r.Header.Get("Content-Type")
  320. if contentType == "" {
  321. contentType = mime.TypeByExtension(filepath.Ext(vars["filename"]))
  322. }
  323. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  324. metadata := MetadataForRequest(contentType, r)
  325. buffer := &bytes.Buffer{}
  326. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  327. log.Printf("%s", err.Error())
  328. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  329. return
  330. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  331. log.Printf("%s", err.Error())
  332. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  333. return
  334. }
  335. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  336. var err error
  337. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  338. log.Printf("Error putting new file: %s", err.Error())
  339. http.Error(w, errors.New("Could not save file").Error(), 500)
  340. return
  341. }
  342. // w.Statuscode = 200
  343. w.Header().Set("Content-Type", "text/plain")
  344. relativeURL, _ := url.Parse(path.Join(token, filename))
  345. deleteUrl , _ := url.Parse(path.Join(token, filename, metadata.DeletionToken))
  346. w.Header().Set("X-Url-Delete", resolveUrl(r, deleteUrl, true))
  347. fmt.Fprint(w, resolveUrl(r, relativeURL, false))
  348. }
  349. func resolveUrl(r *http.Request, u *url.URL, absolutePath bool) string {
  350. if u.RawQuery != "" {
  351. u.Path = fmt.Sprintf("%s?%s", u.Path, url.QueryEscape(u.RawQuery))
  352. u.RawQuery = ""
  353. }
  354. if u.Fragment != "" {
  355. u.Path = fmt.Sprintf("%s#%s", u.Path, u.Fragment)
  356. u.Fragment = ""
  357. }
  358. if absolutePath {
  359. r.URL.Path = ""
  360. }
  361. return getURL(r).ResolveReference(u).String()
  362. }
  363. func getURL(r *http.Request) *url.URL {
  364. u := *r.URL
  365. if r.TLS != nil {
  366. u.Scheme = "https"
  367. } else if proto := r.Header.Get("X-Forwarded-Proto"); proto != "" {
  368. u.Scheme = proto
  369. } else {
  370. u.Scheme = "http"
  371. }
  372. if u.Host != "" {
  373. } else if host, port, err := net.SplitHostPort(r.Host); err != nil {
  374. u.Host = r.Host
  375. } else {
  376. if port == "80" && u.Scheme == "http" {
  377. u.Host = host
  378. } else if port == "443" && u.Scheme == "https" {
  379. u.Host = host
  380. } else {
  381. u.Host = net.JoinHostPort(host, port)
  382. }
  383. }
  384. return &u
  385. }
  386. func (s *Server) Lock(token, filename string) error {
  387. key := path.Join(token, filename)
  388. if _, ok := s.locks[key]; !ok {
  389. s.locks[key] = &sync.Mutex{}
  390. }
  391. s.locks[key].Lock()
  392. return nil
  393. }
  394. func (s *Server) Unlock(token, filename string) error {
  395. key := path.Join(token, filename)
  396. s.locks[key].Unlock()
  397. return nil
  398. }
  399. func (s *Server) CheckMetadata(token, filename string) error {
  400. s.Lock(token, filename)
  401. defer s.Unlock(token, filename)
  402. var metadata Metadata
  403. r, _, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  404. if s.storage.IsNotExist(err) {
  405. return nil
  406. } else if err != nil {
  407. return err
  408. }
  409. defer r.Close()
  410. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  411. return err
  412. } else if metadata.Downloads >= metadata.MaxDownloads {
  413. return errors.New("MaxDownloads expired.")
  414. } else if time.Now().After(metadata.MaxDate) {
  415. return errors.New("MaxDate expired.")
  416. } else {
  417. // todo(nl5887): mutex?
  418. // update number of downloads
  419. metadata.Downloads++
  420. buffer := &bytes.Buffer{}
  421. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  422. return errors.New("Could not encode metadata")
  423. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  424. return errors.New("Could not save metadata")
  425. }
  426. }
  427. return nil
  428. }
  429. func (s *Server) CheckDeletionToken(deletionToken, token, filename string) error {
  430. s.Lock(token, filename)
  431. defer s.Unlock(token, filename)
  432. var metadata Metadata
  433. r, _, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  434. if s.storage.IsNotExist(err) {
  435. return nil
  436. } else if err != nil {
  437. return err
  438. }
  439. defer r.Close()
  440. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  441. return err
  442. } else if metadata.DeletionToken != deletionToken {
  443. return errors.New("Deletion token doesn't match.")
  444. }
  445. return nil
  446. }
  447. func (s *Server) deleteHandler(w http.ResponseWriter, r *http.Request) {
  448. vars := mux.Vars(r)
  449. token := vars["token"]
  450. filename := vars["filename"]
  451. deletionToken := vars["deletionToken"]
  452. if err := s.CheckDeletionToken(deletionToken, token, filename); err != nil {
  453. log.Printf("Error metadata: %s", err.Error())
  454. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  455. return
  456. }
  457. err := s.storage.Delete(token, filename)
  458. if s.storage.IsNotExist(err) {
  459. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  460. return
  461. } else if err != nil {
  462. log.Printf("%s", err.Error())
  463. http.Error(w, "Could not delete file.", 500)
  464. return
  465. }
  466. }
  467. func (s *Server) zipHandler(w http.ResponseWriter, r *http.Request) {
  468. vars := mux.Vars(r)
  469. files := vars["files"]
  470. zipfilename := fmt.Sprintf("transfersh-%d.zip", uint16(time.Now().UnixNano()))
  471. w.Header().Set("Content-Type", "application/zip")
  472. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", zipfilename))
  473. w.Header().Set("Connection", "close")
  474. zw := zip.NewWriter(w)
  475. for _, key := range strings.Split(files, ",") {
  476. if strings.HasPrefix(key, "/") {
  477. key = key[1:]
  478. }
  479. key = strings.Replace(key, "\\", "/", -1)
  480. token := strings.Split(key, "/")[0]
  481. filename := sanitize(strings.Split(key, "/")[1])
  482. if err := s.CheckMetadata(token, filename); err != nil {
  483. log.Printf("Error metadata: %s", err.Error())
  484. continue
  485. }
  486. reader, _, _, err := s.storage.Get(token, filename)
  487. if err != nil {
  488. if s.storage.IsNotExist(err) {
  489. http.Error(w, "File not found", 404)
  490. return
  491. } else {
  492. log.Printf("%s", err.Error())
  493. http.Error(w, "Could not retrieve file.", 500)
  494. return
  495. }
  496. }
  497. defer reader.Close()
  498. header := &zip.FileHeader{
  499. Name: strings.Split(key, "/")[1],
  500. Method: zip.Store,
  501. ModifiedTime: uint16(time.Now().UnixNano()),
  502. ModifiedDate: uint16(time.Now().UnixNano()),
  503. }
  504. fw, err := zw.CreateHeader(header)
  505. if err != nil {
  506. log.Printf("%s", err.Error())
  507. http.Error(w, "Internal server error.", 500)
  508. return
  509. }
  510. if _, err = io.Copy(fw, reader); err != nil {
  511. log.Printf("%s", err.Error())
  512. http.Error(w, "Internal server error.", 500)
  513. return
  514. }
  515. }
  516. if err := zw.Close(); err != nil {
  517. log.Printf("%s", err.Error())
  518. http.Error(w, "Internal server error.", 500)
  519. return
  520. }
  521. }
  522. func (s *Server) tarGzHandler(w http.ResponseWriter, r *http.Request) {
  523. vars := mux.Vars(r)
  524. files := vars["files"]
  525. tarfilename := fmt.Sprintf("transfersh-%d.tar.gz", uint16(time.Now().UnixNano()))
  526. w.Header().Set("Content-Type", "application/x-gzip")
  527. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  528. w.Header().Set("Connection", "close")
  529. os := gzip.NewWriter(w)
  530. defer os.Close()
  531. zw := tar.NewWriter(os)
  532. defer zw.Close()
  533. for _, key := range strings.Split(files, ",") {
  534. if strings.HasPrefix(key, "/") {
  535. key = key[1:]
  536. }
  537. key = strings.Replace(key, "\\", "/", -1)
  538. token := strings.Split(key, "/")[0]
  539. filename := sanitize(strings.Split(key, "/")[1])
  540. if err := s.CheckMetadata(token, filename); err != nil {
  541. log.Printf("Error metadata: %s", err.Error())
  542. continue
  543. }
  544. reader, _, contentLength, err := s.storage.Get(token, filename)
  545. if err != nil {
  546. if s.storage.IsNotExist(err) {
  547. http.Error(w, "File not found", 404)
  548. return
  549. } else {
  550. log.Printf("%s", err.Error())
  551. http.Error(w, "Could not retrieve file.", 500)
  552. return
  553. }
  554. }
  555. defer reader.Close()
  556. header := &tar.Header{
  557. Name: strings.Split(key, "/")[1],
  558. Size: int64(contentLength),
  559. }
  560. err = zw.WriteHeader(header)
  561. if err != nil {
  562. log.Printf("%s", err.Error())
  563. http.Error(w, "Internal server error.", 500)
  564. return
  565. }
  566. if _, err = io.Copy(zw, reader); err != nil {
  567. log.Printf("%s", err.Error())
  568. http.Error(w, "Internal server error.", 500)
  569. return
  570. }
  571. }
  572. }
  573. func (s *Server) tarHandler(w http.ResponseWriter, r *http.Request) {
  574. vars := mux.Vars(r)
  575. files := vars["files"]
  576. tarfilename := fmt.Sprintf("transfersh-%d.tar", uint16(time.Now().UnixNano()))
  577. w.Header().Set("Content-Type", "application/x-tar")
  578. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  579. w.Header().Set("Connection", "close")
  580. zw := tar.NewWriter(w)
  581. defer zw.Close()
  582. for _, key := range strings.Split(files, ",") {
  583. token := strings.Split(key, "/")[0]
  584. filename := strings.Split(key, "/")[1]
  585. if err := s.CheckMetadata(token, filename); err != nil {
  586. log.Printf("Error metadata: %s", err.Error())
  587. continue
  588. }
  589. reader, _, contentLength, err := s.storage.Get(token, filename)
  590. if err != nil {
  591. if s.storage.IsNotExist(err) {
  592. http.Error(w, "File not found", 404)
  593. return
  594. } else {
  595. log.Printf("%s", err.Error())
  596. http.Error(w, "Could not retrieve file.", 500)
  597. return
  598. }
  599. }
  600. defer reader.Close()
  601. header := &tar.Header{
  602. Name: strings.Split(key, "/")[1],
  603. Size: int64(contentLength),
  604. }
  605. err = zw.WriteHeader(header)
  606. if err != nil {
  607. log.Printf("%s", err.Error())
  608. http.Error(w, "Internal server error.", 500)
  609. return
  610. }
  611. if _, err = io.Copy(zw, reader); err != nil {
  612. log.Printf("%s", err.Error())
  613. http.Error(w, "Internal server error.", 500)
  614. return
  615. }
  616. }
  617. }
  618. func (s *Server) getHandler(w http.ResponseWriter, r *http.Request) {
  619. vars := mux.Vars(r)
  620. token := vars["token"]
  621. filename := vars["filename"]
  622. if err := s.CheckMetadata(token, filename); err != nil {
  623. log.Printf("Error metadata: %s", err.Error())
  624. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  625. return
  626. }
  627. reader, contentType, contentLength, err := s.storage.Get(token, filename)
  628. if s.storage.IsNotExist(err) {
  629. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  630. return
  631. } else if err != nil {
  632. log.Printf("%s", err.Error())
  633. http.Error(w, "Could not retrieve file.", 500)
  634. return
  635. }
  636. defer reader.Close()
  637. w.Header().Set("Content-Type", contentType)
  638. w.Header().Set("Content-Length", strconv.FormatUint(contentLength, 10))
  639. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", filename))
  640. w.Header().Set("Connection", "close")
  641. if _, err = io.Copy(w, reader); err != nil {
  642. log.Printf("%s", err.Error())
  643. http.Error(w, "Error occurred copying to output stream", 500)
  644. return
  645. }
  646. }
  647. func (s *Server) RedirectHandler(h http.Handler) http.HandlerFunc {
  648. return func(w http.ResponseWriter, r *http.Request) {
  649. if !s.forceHTTPs {
  650. // we don't want to enforce https
  651. } else if r.URL.Path == "/health.html" {
  652. // health check url won't redirect
  653. } else if strings.HasSuffix(ipAddrFromRemoteAddr(r.Host), ".onion") {
  654. // .onion addresses cannot get a valid certificate, so don't redirect
  655. } else if r.Header.Get("X-Forwarded-Proto") == "https" {
  656. } else if r.URL.Scheme == "https" {
  657. } else {
  658. u := getURL(r)
  659. u.Scheme = "https"
  660. http.Redirect(w, r, u.String(), http.StatusPermanentRedirect)
  661. return
  662. }
  663. h.ServeHTTP(w, r)
  664. }
  665. }
  666. // Create a log handler for every request it receives.
  667. func LoveHandler(h http.Handler) http.HandlerFunc {
  668. return func(w http.ResponseWriter, r *http.Request) {
  669. w.Header().Set("x-made-with", "<3 by DutchCoders")
  670. w.Header().Set("x-served-by", "Proudly served by DutchCoders")
  671. w.Header().Set("Server", "Transfer.sh HTTP Server 1.0")
  672. h.ServeHTTP(w, r)
  673. }
  674. }
  675. func (s *Server) BasicAuthHandler(h http.Handler) http.HandlerFunc {
  676. return func(w http.ResponseWriter, r *http.Request) {
  677. if s.AuthUser == "" || s.AuthPass == "" {
  678. h.ServeHTTP(w, r)
  679. return
  680. }
  681. w.Header().Set("WWW-Authenticate", "Basic realm=\"Restricted\"")
  682. username, password, authOK := r.BasicAuth()
  683. if authOK == false {
  684. http.Error(w, "Not authorized", 401)
  685. return
  686. }
  687. if username != s.AuthUser || password != s.AuthPass {
  688. http.Error(w, "Not authorized", 401)
  689. return
  690. }
  691. h.ServeHTTP(w, r)
  692. }
  693. }