You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

864 lines
22 KiB

  1. /*
  2. The MIT License (MIT)
  3. Copyright (c) 2014-2017 DutchCoders [https://github.com/dutchcoders/]
  4. Permission is hereby granted, free of charge, to any person obtaining a copy
  5. of this software and associated documentation files (the "Software"), to deal
  6. in the Software without restriction, including without limitation the rights
  7. to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  8. copies of the Software, and to permit persons to whom the Software is
  9. furnished to do so, subject to the following conditions:
  10. The above copyright notice and this permission notice shall be included in
  11. all copies or substantial portions of the Software.
  12. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  13. IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  14. FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  15. AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  16. LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  17. OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  18. THE SOFTWARE.
  19. */
  20. package server
  21. import (
  22. // _ "transfer.sh/app/handlers"
  23. // _ "transfer.sh/app/utils"
  24. "archive/tar"
  25. "archive/zip"
  26. "bytes"
  27. "compress/gzip"
  28. "encoding/json"
  29. "errors"
  30. "fmt"
  31. "html"
  32. html_template "html/template"
  33. "io"
  34. "io/ioutil"
  35. "log"
  36. "math/rand"
  37. "mime"
  38. "net/http"
  39. "net/url"
  40. "os"
  41. "path"
  42. "path/filepath"
  43. "strconv"
  44. "strings"
  45. "sync"
  46. text_template "text/template"
  47. "time"
  48. "net"
  49. web "github.com/dutchcoders/transfer.sh-web"
  50. "github.com/gorilla/mux"
  51. "github.com/russross/blackfriday"
  52. )
  53. var (
  54. htmlTemplates = initHTMLTemplates()
  55. textTemplates = initTextTemplates()
  56. )
  57. func stripPrefix(path string) string {
  58. return strings.Replace(path, web.Prefix+"/", "", -1)
  59. }
  60. func initTextTemplates() *text_template.Template {
  61. templateMap := text_template.FuncMap{"format": formatNumber}
  62. // Templates with functions available to them
  63. var templates = text_template.New("").Funcs(templateMap)
  64. return templates
  65. }
  66. func initHTMLTemplates() *html_template.Template {
  67. templateMap := html_template.FuncMap{"format": formatNumber}
  68. // Templates with functions available to them
  69. var templates = html_template.New("").Funcs(templateMap)
  70. return templates
  71. }
  72. func healthHandler(w http.ResponseWriter, r *http.Request) {
  73. fmt.Fprintf(w, "Approaching Neutral Zone, all systems normal and functioning.")
  74. }
  75. /* The preview handler will show a preview of the content for browsers (accept type text/html), and referer is not transfer.sh */
  76. func (s *Server) previewHandler(w http.ResponseWriter, r *http.Request) {
  77. vars := mux.Vars(r)
  78. token := vars["token"]
  79. filename := vars["filename"]
  80. contentType, contentLength, err := s.storage.Head(token, filename)
  81. if err != nil {
  82. http.Error(w, http.StatusText(404), 404)
  83. return
  84. }
  85. var templatePath string
  86. var content html_template.HTML
  87. switch {
  88. case strings.HasPrefix(contentType, "image/"):
  89. templatePath = "download.image.html"
  90. case strings.HasPrefix(contentType, "video/"):
  91. templatePath = "download.video.html"
  92. case strings.HasPrefix(contentType, "audio/"):
  93. templatePath = "download.audio.html"
  94. case strings.HasPrefix(contentType, "text/"):
  95. templatePath = "download.markdown.html"
  96. var reader io.ReadCloser
  97. if reader, _, _, err = s.storage.Get(token, filename); err != nil {
  98. http.Error(w, err.Error(), http.StatusInternalServerError)
  99. return
  100. }
  101. var data []byte
  102. if data, err = ioutil.ReadAll(reader); err != nil {
  103. http.Error(w, err.Error(), http.StatusInternalServerError)
  104. return
  105. }
  106. if strings.HasPrefix(contentType, "text/x-markdown") || strings.HasPrefix(contentType, "text/markdown") {
  107. output := blackfriday.MarkdownCommon(data)
  108. content = html_template.HTML(output)
  109. } else if strings.HasPrefix(contentType, "text/plain") {
  110. content = html_template.HTML(fmt.Sprintf("<pre>%s</pre>", html.EscapeString(string(data))))
  111. } else {
  112. templatePath = "download.sandbox.html"
  113. }
  114. default:
  115. templatePath = "download.html"
  116. }
  117. if err != nil {
  118. http.Error(w, err.Error(), http.StatusInternalServerError)
  119. return
  120. }
  121. data := struct {
  122. ContentType string
  123. Content html_template.HTML
  124. Filename string
  125. Url string
  126. ContentLength uint64
  127. GAKey string
  128. UserVoiceKey string
  129. }{
  130. contentType,
  131. content,
  132. filename,
  133. r.URL.String(),
  134. contentLength,
  135. s.gaKey,
  136. s.userVoiceKey,
  137. }
  138. if err := htmlTemplates.ExecuteTemplate(w, templatePath, data); err != nil {
  139. http.Error(w, err.Error(), http.StatusInternalServerError)
  140. return
  141. }
  142. }
  143. // this handler will output html or text, depending on the
  144. // support of the client (Accept header).
  145. func (s *Server) viewHandler(w http.ResponseWriter, r *http.Request) {
  146. // vars := mux.Vars(r)
  147. if acceptsHTML(r.Header) {
  148. if err := htmlTemplates.ExecuteTemplate(w, "index.html", nil); err != nil {
  149. http.Error(w, err.Error(), http.StatusInternalServerError)
  150. return
  151. }
  152. } else {
  153. if err := textTemplates.ExecuteTemplate(w, "index.txt", nil); err != nil {
  154. http.Error(w, err.Error(), http.StatusInternalServerError)
  155. return
  156. }
  157. }
  158. }
  159. func (s *Server) notFoundHandler(w http.ResponseWriter, r *http.Request) {
  160. http.Error(w, http.StatusText(404), 404)
  161. }
  162. func sanitize(fileName string) string {
  163. return path.Clean(path.Base(fileName))
  164. }
  165. func (s *Server) postHandler(w http.ResponseWriter, r *http.Request) {
  166. if err := r.ParseMultipartForm(_24K); nil != err {
  167. log.Printf("%s", err.Error())
  168. http.Error(w, "Error occurred copying to output stream", 500)
  169. return
  170. }
  171. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  172. w.Header().Set("Content-Type", "text/plain")
  173. for _, fheaders := range r.MultipartForm.File {
  174. for _, fheader := range fheaders {
  175. filename := sanitize(fheader.Filename)
  176. contentType := fheader.Header.Get("Content-Type")
  177. if contentType == "" {
  178. contentType = mime.TypeByExtension(filepath.Ext(fheader.Filename))
  179. }
  180. var f io.Reader
  181. var err error
  182. if f, err = fheader.Open(); err != nil {
  183. log.Printf("%s", err.Error())
  184. http.Error(w, err.Error(), 500)
  185. return
  186. }
  187. var b bytes.Buffer
  188. n, err := io.CopyN(&b, f, _24K+1)
  189. if err != nil && err != io.EOF {
  190. log.Printf("%s", err.Error())
  191. http.Error(w, err.Error(), 500)
  192. return
  193. }
  194. var reader io.Reader
  195. if n > _24K {
  196. file, err := ioutil.TempFile(s.tempPath, "transfer-")
  197. if err != nil {
  198. log.Fatal(err)
  199. }
  200. defer file.Close()
  201. n, err = io.Copy(file, io.MultiReader(&b, f))
  202. if err != nil {
  203. os.Remove(file.Name())
  204. log.Printf("%s", err.Error())
  205. http.Error(w, err.Error(), 500)
  206. return
  207. }
  208. reader, err = os.Open(file.Name())
  209. } else {
  210. reader = bytes.NewReader(b.Bytes())
  211. }
  212. contentLength := n
  213. metadata := MetadataForRequest(contentType, r)
  214. buffer := &bytes.Buffer{}
  215. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  216. log.Printf("%s", err.Error())
  217. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  218. return
  219. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  220. log.Printf("%s", err.Error())
  221. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  222. return
  223. }
  224. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  225. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  226. log.Printf("Backend storage error: %s", err.Error())
  227. http.Error(w, err.Error(), 500)
  228. return
  229. }
  230. relativeURL, _ := url.Parse(path.Join(token, filename))
  231. fmt.Fprint(w, getURL(r).ResolveReference(relativeURL).String())
  232. }
  233. }
  234. }
  235. type Metadata struct {
  236. // ContentType is the original uploading content type
  237. ContentType string
  238. // Secret as knowledge to delete file
  239. // Secret string
  240. // Downloads is the actual number of downloads
  241. Downloads int
  242. // MaxDownloads contains the maximum numbers of downloads
  243. MaxDownloads int
  244. // MaxDate contains the max age of the file
  245. MaxDate time.Time
  246. // DeletionToken contains the token to match against for deletion
  247. DeletionToken string
  248. }
  249. func MetadataForRequest(contentType string, r *http.Request) Metadata {
  250. metadata := Metadata{
  251. ContentType: contentType,
  252. MaxDate: time.Now().Add(time.Hour * 24 * 365 * 10),
  253. Downloads: 0,
  254. MaxDownloads: 99999999,
  255. DeletionToken: Encode(10000000 + int64(rand.Intn(1000000000))) + Encode(10000000 + int64(rand.Intn(1000000000))),
  256. }
  257. if v := r.Header.Get("Max-Downloads"); v == "" {
  258. } else if v, err := strconv.Atoi(v); err != nil {
  259. } else {
  260. metadata.MaxDownloads = v
  261. }
  262. if v := r.Header.Get("Max-Days"); v == "" {
  263. } else if v, err := strconv.Atoi(v); err != nil {
  264. } else {
  265. metadata.MaxDate = time.Now().Add(time.Hour * 24 * time.Duration(v))
  266. }
  267. return metadata
  268. }
  269. func (s *Server) putHandler(w http.ResponseWriter, r *http.Request) {
  270. vars := mux.Vars(r)
  271. filename := sanitize(vars["filename"])
  272. contentLength := r.ContentLength
  273. var reader io.Reader
  274. reader = r.Body
  275. if contentLength == -1 {
  276. // queue file to disk, because s3 needs content length
  277. var err error
  278. var f io.Reader
  279. f = reader
  280. var b bytes.Buffer
  281. n, err := io.CopyN(&b, f, _24K+1)
  282. if err != nil && err != io.EOF {
  283. log.Printf("Error putting new file: %s", err.Error())
  284. http.Error(w, err.Error(), 500)
  285. return
  286. }
  287. if n > _24K {
  288. file, err := ioutil.TempFile(s.tempPath, "transfer-")
  289. if err != nil {
  290. log.Printf("%s", err.Error())
  291. http.Error(w, err.Error(), 500)
  292. return
  293. }
  294. defer file.Close()
  295. n, err = io.Copy(file, io.MultiReader(&b, f))
  296. if err != nil {
  297. os.Remove(file.Name())
  298. log.Printf("%s", err.Error())
  299. http.Error(w, err.Error(), 500)
  300. return
  301. }
  302. reader, err = os.Open(file.Name())
  303. } else {
  304. reader = bytes.NewReader(b.Bytes())
  305. }
  306. contentLength = n
  307. }
  308. contentType := r.Header.Get("Content-Type")
  309. if contentType == "" {
  310. contentType = mime.TypeByExtension(filepath.Ext(vars["filename"]))
  311. }
  312. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  313. metadata := MetadataForRequest(contentType, r)
  314. buffer := &bytes.Buffer{}
  315. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  316. log.Printf("%s", err.Error())
  317. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  318. return
  319. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  320. log.Printf("%s", err.Error())
  321. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  322. return
  323. }
  324. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  325. var err error
  326. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  327. log.Printf("Error putting new file: %s", err.Error())
  328. http.Error(w, errors.New("Could not save file").Error(), 500)
  329. return
  330. }
  331. // w.Statuscode = 200
  332. w.Header().Set("Content-Type", "text/plain")
  333. relativeURL, _ := url.Parse(path.Join(token, filename))
  334. deleteUrl , _ := url.Parse(path.Join(token, filename, metadata.DeletionToken))
  335. w.Header().Set("X-Url-Delete", resolveUrl(r, deleteUrl, true))
  336. fmt.Fprint(w, resolveUrl(r, relativeURL, false))
  337. }
  338. func resolveUrl(r *http.Request, u *url.URL, absolutePath bool) string {
  339. if u.RawQuery != "" {
  340. u.Path = fmt.Sprintf("%s?%s", u.Path, url.QueryEscape(u.RawQuery))
  341. u.RawQuery = ""
  342. }
  343. if u.Fragment != "" {
  344. u.Path = fmt.Sprintf("%s#%s", u.Path, u.Fragment)
  345. u.Fragment = ""
  346. }
  347. if absolutePath {
  348. r.URL.Path = ""
  349. }
  350. return getURL(r).ResolveReference(u).String()
  351. }
  352. func getURL(r *http.Request) *url.URL {
  353. u := *r.URL
  354. if r.TLS != nil {
  355. u.Scheme = "https"
  356. } else if proto := r.Header.Get("X-Forwarded-Proto"); proto != "" {
  357. u.Scheme = proto
  358. } else {
  359. u.Scheme = "http"
  360. }
  361. if u.Host != "" {
  362. } else if host, port, err := net.SplitHostPort(r.Host); err != nil {
  363. u.Host = r.Host
  364. } else {
  365. if port == "80" && u.Scheme == "http" {
  366. u.Host = host
  367. } else if port == "443" && u.Scheme == "https" {
  368. u.Host = host
  369. } else {
  370. u.Host = net.JoinHostPort(host, port)
  371. }
  372. }
  373. return &u
  374. }
  375. func (s *Server) Lock(token, filename string) error {
  376. key := path.Join(token, filename)
  377. if _, ok := s.locks[key]; !ok {
  378. s.locks[key] = &sync.Mutex{}
  379. }
  380. s.locks[key].Lock()
  381. return nil
  382. }
  383. func (s *Server) Unlock(token, filename string) error {
  384. key := path.Join(token, filename)
  385. s.locks[key].Unlock()
  386. return nil
  387. }
  388. func (s *Server) CheckMetadata(token, filename string) error {
  389. s.Lock(token, filename)
  390. defer s.Unlock(token, filename)
  391. var metadata Metadata
  392. r, _, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  393. if s.storage.IsNotExist(err) {
  394. return nil
  395. } else if err != nil {
  396. return err
  397. }
  398. defer r.Close()
  399. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  400. return err
  401. } else if metadata.Downloads >= metadata.MaxDownloads {
  402. return errors.New("MaxDownloads expired.")
  403. } else if time.Now().After(metadata.MaxDate) {
  404. return errors.New("MaxDate expired.")
  405. } else {
  406. // todo(nl5887): mutex?
  407. // update number of downloads
  408. metadata.Downloads++
  409. buffer := &bytes.Buffer{}
  410. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  411. return errors.New("Could not encode metadata")
  412. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  413. return errors.New("Could not save metadata")
  414. }
  415. }
  416. return nil
  417. }
  418. func (s *Server) CheckDeletionToken(deletionToken, token, filename string) error {
  419. s.Lock(token, filename)
  420. defer s.Unlock(token, filename)
  421. var metadata Metadata
  422. r, _, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  423. if s.storage.IsNotExist(err) {
  424. return nil
  425. } else if err != nil {
  426. return err
  427. }
  428. defer r.Close()
  429. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  430. return err
  431. } else if metadata.DeletionToken != deletionToken {
  432. return errors.New("Deletion token doesn't match.")
  433. }
  434. return nil
  435. }
  436. func (s *Server) deleteHandler(w http.ResponseWriter, r *http.Request) {
  437. vars := mux.Vars(r)
  438. token := vars["token"]
  439. filename := vars["filename"]
  440. deletionToken := vars["deletionToken"]
  441. if err := s.CheckDeletionToken(deletionToken, token, filename); err != nil {
  442. log.Printf("Error metadata: %s", err.Error())
  443. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  444. return
  445. }
  446. err := s.storage.Delete(token, filename)
  447. if s.storage.IsNotExist(err) {
  448. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  449. return
  450. } else if err != nil {
  451. log.Printf("%s", err.Error())
  452. http.Error(w, "Could not delete file.", 500)
  453. return
  454. }
  455. }
  456. func (s *Server) zipHandler(w http.ResponseWriter, r *http.Request) {
  457. vars := mux.Vars(r)
  458. files := vars["files"]
  459. zipfilename := fmt.Sprintf("transfersh-%d.zip", uint16(time.Now().UnixNano()))
  460. w.Header().Set("Content-Type", "application/zip")
  461. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", zipfilename))
  462. w.Header().Set("Connection", "close")
  463. zw := zip.NewWriter(w)
  464. for _, key := range strings.Split(files, ",") {
  465. if strings.HasPrefix(key, "/") {
  466. key = key[1:]
  467. }
  468. key = strings.Replace(key, "\\", "/", -1)
  469. token := strings.Split(key, "/")[0]
  470. filename := sanitize(strings.Split(key, "/")[1])
  471. if err := s.CheckMetadata(token, filename); err != nil {
  472. log.Printf("Error metadata: %s", err.Error())
  473. continue
  474. }
  475. reader, _, _, err := s.storage.Get(token, filename)
  476. if err != nil {
  477. if s.storage.IsNotExist(err) {
  478. http.Error(w, "File not found", 404)
  479. return
  480. } else {
  481. log.Printf("%s", err.Error())
  482. http.Error(w, "Could not retrieve file.", 500)
  483. return
  484. }
  485. }
  486. defer reader.Close()
  487. header := &zip.FileHeader{
  488. Name: strings.Split(key, "/")[1],
  489. Method: zip.Store,
  490. ModifiedTime: uint16(time.Now().UnixNano()),
  491. ModifiedDate: uint16(time.Now().UnixNano()),
  492. }
  493. fw, err := zw.CreateHeader(header)
  494. if err != nil {
  495. log.Printf("%s", err.Error())
  496. http.Error(w, "Internal server error.", 500)
  497. return
  498. }
  499. if _, err = io.Copy(fw, reader); err != nil {
  500. log.Printf("%s", err.Error())
  501. http.Error(w, "Internal server error.", 500)
  502. return
  503. }
  504. }
  505. if err := zw.Close(); err != nil {
  506. log.Printf("%s", err.Error())
  507. http.Error(w, "Internal server error.", 500)
  508. return
  509. }
  510. }
  511. func (s *Server) tarGzHandler(w http.ResponseWriter, r *http.Request) {
  512. vars := mux.Vars(r)
  513. files := vars["files"]
  514. tarfilename := fmt.Sprintf("transfersh-%d.tar.gz", uint16(time.Now().UnixNano()))
  515. w.Header().Set("Content-Type", "application/x-gzip")
  516. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  517. w.Header().Set("Connection", "close")
  518. os := gzip.NewWriter(w)
  519. defer os.Close()
  520. zw := tar.NewWriter(os)
  521. defer zw.Close()
  522. for _, key := range strings.Split(files, ",") {
  523. if strings.HasPrefix(key, "/") {
  524. key = key[1:]
  525. }
  526. key = strings.Replace(key, "\\", "/", -1)
  527. token := strings.Split(key, "/")[0]
  528. filename := sanitize(strings.Split(key, "/")[1])
  529. if err := s.CheckMetadata(token, filename); err != nil {
  530. log.Printf("Error metadata: %s", err.Error())
  531. continue
  532. }
  533. reader, _, contentLength, err := s.storage.Get(token, filename)
  534. if err != nil {
  535. if s.storage.IsNotExist(err) {
  536. http.Error(w, "File not found", 404)
  537. return
  538. } else {
  539. log.Printf("%s", err.Error())
  540. http.Error(w, "Could not retrieve file.", 500)
  541. return
  542. }
  543. }
  544. defer reader.Close()
  545. header := &tar.Header{
  546. Name: strings.Split(key, "/")[1],
  547. Size: int64(contentLength),
  548. }
  549. err = zw.WriteHeader(header)
  550. if err != nil {
  551. log.Printf("%s", err.Error())
  552. http.Error(w, "Internal server error.", 500)
  553. return
  554. }
  555. if _, err = io.Copy(zw, reader); err != nil {
  556. log.Printf("%s", err.Error())
  557. http.Error(w, "Internal server error.", 500)
  558. return
  559. }
  560. }
  561. }
  562. func (s *Server) tarHandler(w http.ResponseWriter, r *http.Request) {
  563. vars := mux.Vars(r)
  564. files := vars["files"]
  565. tarfilename := fmt.Sprintf("transfersh-%d.tar", uint16(time.Now().UnixNano()))
  566. w.Header().Set("Content-Type", "application/x-tar")
  567. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  568. w.Header().Set("Connection", "close")
  569. zw := tar.NewWriter(w)
  570. defer zw.Close()
  571. for _, key := range strings.Split(files, ",") {
  572. token := strings.Split(key, "/")[0]
  573. filename := strings.Split(key, "/")[1]
  574. if err := s.CheckMetadata(token, filename); err != nil {
  575. log.Printf("Error metadata: %s", err.Error())
  576. continue
  577. }
  578. reader, _, contentLength, err := s.storage.Get(token, filename)
  579. if err != nil {
  580. if s.storage.IsNotExist(err) {
  581. http.Error(w, "File not found", 404)
  582. return
  583. } else {
  584. log.Printf("%s", err.Error())
  585. http.Error(w, "Could not retrieve file.", 500)
  586. return
  587. }
  588. }
  589. defer reader.Close()
  590. header := &tar.Header{
  591. Name: strings.Split(key, "/")[1],
  592. Size: int64(contentLength),
  593. }
  594. err = zw.WriteHeader(header)
  595. if err != nil {
  596. log.Printf("%s", err.Error())
  597. http.Error(w, "Internal server error.", 500)
  598. return
  599. }
  600. if _, err = io.Copy(zw, reader); err != nil {
  601. log.Printf("%s", err.Error())
  602. http.Error(w, "Internal server error.", 500)
  603. return
  604. }
  605. }
  606. }
  607. func (s *Server) getHandler(w http.ResponseWriter, r *http.Request) {
  608. vars := mux.Vars(r)
  609. token := vars["token"]
  610. filename := vars["filename"]
  611. if err := s.CheckMetadata(token, filename); err != nil {
  612. log.Printf("Error metadata: %s", err.Error())
  613. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  614. return
  615. }
  616. reader, contentType, contentLength, err := s.storage.Get(token, filename)
  617. if s.storage.IsNotExist(err) {
  618. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  619. return
  620. } else if err != nil {
  621. log.Printf("%s", err.Error())
  622. http.Error(w, "Could not retrieve file.", 500)
  623. return
  624. }
  625. defer reader.Close()
  626. w.Header().Set("Content-Type", contentType)
  627. w.Header().Set("Content-Length", strconv.FormatUint(contentLength, 10))
  628. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", filename))
  629. w.Header().Set("Connection", "close")
  630. if _, err = io.Copy(w, reader); err != nil {
  631. log.Printf("%s", err.Error())
  632. http.Error(w, "Error occurred copying to output stream", 500)
  633. return
  634. }
  635. }
  636. func (s *Server) RedirectHandler(h http.Handler) http.HandlerFunc {
  637. return func(w http.ResponseWriter, r *http.Request) {
  638. if !s.forceHTTPs {
  639. // we don't want to enforce https
  640. } else if r.URL.Path == "/health.html" {
  641. // health check url won't redirect
  642. } else if strings.HasSuffix(ipAddrFromRemoteAddr(r.Host), ".onion") {
  643. // .onion addresses cannot get a valid certificate, so don't redirect
  644. } else if r.Header.Get("X-Forwarded-Proto") == "https" {
  645. } else if r.URL.Scheme == "https" {
  646. } else {
  647. u := getURL(r)
  648. u.Scheme = "https"
  649. http.Redirect(w, r, u.String(), http.StatusPermanentRedirect)
  650. return
  651. }
  652. h.ServeHTTP(w, r)
  653. }
  654. }
  655. // Create a log handler for every request it receives.
  656. func LoveHandler(h http.Handler) http.HandlerFunc {
  657. return func(w http.ResponseWriter, r *http.Request) {
  658. w.Header().Set("x-made-with", "<3 by DutchCoders")
  659. w.Header().Set("x-served-by", "Proudly served by DutchCoders")
  660. w.Header().Set("Server", "Transfer.sh HTTP Server 1.0")
  661. h.ServeHTTP(w, r)
  662. }
  663. }
  664. func (s *Server) BasicAuthHandler(h http.Handler) http.HandlerFunc {
  665. return func(w http.ResponseWriter, r *http.Request) {
  666. if s.AuthUser == "" || s.AuthPass == "" {
  667. h.ServeHTTP(w, r)
  668. return
  669. }
  670. w.Header().Set("WWW-Authenticate", "Basic realm=\"Restricted\"")
  671. username, password, authOK := r.BasicAuth()
  672. if authOK == false {
  673. http.Error(w, "Not authorized", 401)
  674. return
  675. }
  676. if username != s.AuthUser || password != s.AuthPass {
  677. http.Error(w, "Not authorized", 401)
  678. return
  679. }
  680. h.ServeHTTP(w, r)
  681. }
  682. }