You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

438 lines
10 KiB

  1. package cmd
  2. import (
  3. "fmt"
  4. "log"
  5. "os"
  6. "strings"
  7. "github.com/dutchcoders/transfer.sh/server"
  8. "github.com/fatih/color"
  9. "github.com/urfave/cli"
  10. "google.golang.org/api/googleapi"
  11. )
  12. var Version = "1.1.7"
  13. var helpTemplate = `NAME:
  14. {{.Name}} - {{.Usage}}
  15. DESCRIPTION:
  16. {{.Description}}
  17. USAGE:
  18. {{.Name}} {{if .Flags}}[flags] {{end}}command{{if .Flags}}{{end}} [arguments...]
  19. COMMANDS:
  20. {{range .Commands}}{{join .Names ", "}}{{ "\t" }}{{.Usage}}
  21. {{end}}{{if .Flags}}
  22. FLAGS:
  23. {{range .Flags}}{{.}}
  24. {{end}}{{end}}
  25. VERSION:
  26. ` + Version +
  27. `{{ "\n"}}`
  28. var globalFlags = []cli.Flag{
  29. cli.StringFlag{
  30. Name: "listener",
  31. Usage: "127.0.0.1:8080",
  32. Value: "127.0.0.1:8080",
  33. EnvVar: "LISTENER",
  34. },
  35. // redirect to https?
  36. // hostnames
  37. cli.StringFlag{
  38. Name: "profile-listener",
  39. Usage: "127.0.0.1:6060",
  40. Value: "",
  41. EnvVar: "PROFILE_LISTENER",
  42. },
  43. cli.BoolFlag{
  44. Name: "force-https",
  45. Usage: "",
  46. EnvVar: "FORCE_HTTPS",
  47. },
  48. cli.StringFlag{
  49. Name: "tls-listener",
  50. Usage: "127.0.0.1:8443",
  51. Value: "",
  52. EnvVar: "TLS_LISTENER",
  53. },
  54. cli.BoolFlag{
  55. Name: "tls-listener-only",
  56. Usage: "",
  57. EnvVar: "TLS_LISTENER_ONLY",
  58. },
  59. cli.StringFlag{
  60. Name: "tls-cert-file",
  61. Value: "",
  62. EnvVar: "TLS_CERT_FILE",
  63. },
  64. cli.StringFlag{
  65. Name: "tls-private-key",
  66. Value: "",
  67. EnvVar: "TLS_PRIVATE_KEY",
  68. },
  69. cli.StringFlag{
  70. Name: "temp-path",
  71. Usage: "path to temp files",
  72. Value: os.TempDir(),
  73. EnvVar: "TEMP_PATH",
  74. },
  75. cli.StringFlag{
  76. Name: "web-path",
  77. Usage: "path to static web files",
  78. Value: "",
  79. EnvVar: "WEB_PATH",
  80. },
  81. cli.StringFlag{
  82. Name: "proxy-path",
  83. Usage: "path prefix when service is run behind a proxy",
  84. Value: "",
  85. EnvVar: "PROXY_PATH",
  86. },
  87. cli.StringFlag{
  88. Name: "proxy-port",
  89. Usage: "port of the proxy when the service is run behind a proxy",
  90. Value: "",
  91. EnvVar: "PROXY_PORT",
  92. },
  93. cli.StringFlag{
  94. Name: "ga-key",
  95. Usage: "key for google analytics (front end)",
  96. Value: "",
  97. EnvVar: "GA_KEY",
  98. },
  99. cli.StringFlag{
  100. Name: "uservoice-key",
  101. Usage: "key for user voice (front end)",
  102. Value: "",
  103. EnvVar: "USERVOICE_KEY",
  104. },
  105. cli.StringFlag{
  106. Name: "provider",
  107. Usage: "s3|gdrive|local",
  108. Value: "",
  109. EnvVar: "PROVIDER",
  110. },
  111. cli.StringFlag{
  112. Name: "s3-endpoint",
  113. Usage: "",
  114. Value: "",
  115. EnvVar: "S3_ENDPOINT",
  116. },
  117. cli.StringFlag{
  118. Name: "s3-region",
  119. Usage: "",
  120. Value: "eu-west-1",
  121. EnvVar: "S3_REGION",
  122. },
  123. cli.StringFlag{
  124. Name: "aws-access-key",
  125. Usage: "",
  126. Value: "",
  127. EnvVar: "AWS_ACCESS_KEY",
  128. },
  129. cli.StringFlag{
  130. Name: "aws-secret-key",
  131. Usage: "",
  132. Value: "",
  133. EnvVar: "AWS_SECRET_KEY",
  134. },
  135. cli.StringFlag{
  136. Name: "bucket",
  137. Usage: "",
  138. Value: "",
  139. EnvVar: "BUCKET",
  140. },
  141. cli.BoolFlag{
  142. Name: "s3-no-multipart",
  143. Usage: "Disables S3 Multipart Puts",
  144. EnvVar: "S3_NO_MULTIPART",
  145. },
  146. cli.BoolFlag{
  147. Name: "s3-path-style",
  148. Usage: "Forces path style URLs, required for Minio.",
  149. EnvVar: "S3_PATH_STYLE",
  150. },
  151. cli.StringFlag{
  152. Name: "gdrive-client-json-filepath",
  153. Usage: "",
  154. Value: "",
  155. EnvVar: "GDRIVE_CLIENT_JSON_FILEPATH",
  156. },
  157. cli.StringFlag{
  158. Name: "gdrive-local-config-path",
  159. Usage: "",
  160. Value: "",
  161. EnvVar: "GDRIVE_LOCAL_CONFIG_PATH",
  162. },
  163. cli.IntFlag{
  164. Name: "gdrive-chunk-size",
  165. Usage: "",
  166. Value: googleapi.DefaultUploadChunkSize / 1024 / 1024,
  167. EnvVar: "GDRIVE_CHUNK_SIZE",
  168. },
  169. cli.IntFlag{
  170. Name: "rate-limit",
  171. Usage: "requests per minute",
  172. Value: 0,
  173. EnvVar: "RATE_LIMIT",
  174. },
  175. cli.StringFlag{
  176. Name: "lets-encrypt-hosts",
  177. Usage: "host1, host2",
  178. Value: "",
  179. EnvVar: "HOSTS",
  180. },
  181. cli.StringFlag{
  182. Name: "log",
  183. Usage: "/var/log/transfersh.log",
  184. Value: "",
  185. EnvVar: "LOG",
  186. },
  187. cli.StringFlag{
  188. Name: "basedir",
  189. Usage: "path to storage",
  190. Value: "",
  191. EnvVar: "BASEDIR",
  192. },
  193. cli.StringFlag{
  194. Name: "clamav-host",
  195. Usage: "clamav-host",
  196. Value: "",
  197. EnvVar: "CLAMAV_HOST",
  198. },
  199. cli.StringFlag{
  200. Name: "virustotal-key",
  201. Usage: "virustotal-key",
  202. Value: "",
  203. EnvVar: "VIRUSTOTAL_KEY",
  204. },
  205. cli.BoolFlag{
  206. Name: "profiler",
  207. Usage: "enable profiling",
  208. EnvVar: "PROFILER",
  209. },
  210. cli.StringFlag{
  211. Name: "http-auth-user",
  212. Usage: "user for http basic auth",
  213. Value: "",
  214. EnvVar: "HTTP_AUTH_USER",
  215. },
  216. cli.StringFlag{
  217. Name: "http-auth-pass",
  218. Usage: "pass for http basic auth",
  219. Value: "",
  220. EnvVar: "HTTP_AUTH_PASS",
  221. },
  222. cli.StringFlag{
  223. Name: "ip-whitelist",
  224. Usage: "comma separated list of ips allowed to connect to the service",
  225. Value: "",
  226. EnvVar: "IP_WHITELIST",
  227. },
  228. cli.StringFlag{
  229. Name: "ip-blacklist",
  230. Usage: "comma separated list of ips not allowed to connect to the service",
  231. Value: "",
  232. EnvVar: "IP_BLACKLIST",
  233. },
  234. cli.StringFlag{
  235. Name: "cors-domains",
  236. Usage: "comma separated list of domains allowed for CORS requests",
  237. Value: "",
  238. EnvVar: "CORS_DOMAINS",
  239. },
  240. }
  241. type Cmd struct {
  242. *cli.App
  243. }
  244. func VersionAction(c *cli.Context) {
  245. fmt.Println(color.YellowString(fmt.Sprintf("transfer.sh: Easy file sharing from the command line")))
  246. }
  247. func New() *Cmd {
  248. logger := log.New(os.Stdout, "[transfer.sh]", log.LstdFlags)
  249. app := cli.NewApp()
  250. app.Name = "transfer.sh"
  251. app.Author = ""
  252. app.Usage = "transfer.sh"
  253. app.Description = `Easy file sharing from the command line`
  254. app.Version = Version
  255. app.Flags = globalFlags
  256. app.CustomAppHelpTemplate = helpTemplate
  257. app.Commands = []cli.Command{
  258. {
  259. Name: "version",
  260. Action: VersionAction,
  261. },
  262. }
  263. app.Before = func(c *cli.Context) error {
  264. return nil
  265. }
  266. app.Action = func(c *cli.Context) {
  267. options := []server.OptionFn{}
  268. if v := c.String("listener"); v != "" {
  269. options = append(options, server.Listener(v))
  270. }
  271. if v := c.String("cors-domains"); v != "" {
  272. options = append(options, server.CorsDomains(v))
  273. }
  274. if v := c.String("tls-listener"); v == "" {
  275. } else if c.Bool("tls-listener-only") {
  276. options = append(options, server.TLSListener(v, true))
  277. } else {
  278. options = append(options, server.TLSListener(v, false))
  279. }
  280. if v := c.String("profile-listener"); v != "" {
  281. options = append(options, server.ProfileListener(v))
  282. }
  283. if v := c.String("web-path"); v != "" {
  284. options = append(options, server.WebPath(v))
  285. }
  286. if v := c.String("proxy-path"); v != "" {
  287. options = append(options, server.ProxyPath(v))
  288. }
  289. if v := c.String("proxy-port"); v != "" {
  290. options = append(options, server.ProxyPort(v))
  291. }
  292. if v := c.String("ga-key"); v != "" {
  293. options = append(options, server.GoogleAnalytics(v))
  294. }
  295. if v := c.String("uservoice-key"); v != "" {
  296. options = append(options, server.UserVoice(v))
  297. }
  298. if v := c.String("temp-path"); v != "" {
  299. options = append(options, server.TempPath(v))
  300. }
  301. if v := c.String("log"); v != "" {
  302. options = append(options, server.LogFile(logger, v))
  303. } else {
  304. options = append(options, server.Logger(logger))
  305. }
  306. if v := c.String("lets-encrypt-hosts"); v != "" {
  307. options = append(options, server.UseLetsEncrypt(strings.Split(v, ",")))
  308. }
  309. if v := c.String("virustotal-key"); v != "" {
  310. options = append(options, server.VirustotalKey(v))
  311. }
  312. if v := c.String("clamav-host"); v != "" {
  313. options = append(options, server.ClamavHost(v))
  314. }
  315. if v := c.Int("rate-limit"); v > 0 {
  316. options = append(options, server.RateLimit(v))
  317. }
  318. if cert := c.String("tls-cert-file"); cert == "" {
  319. } else if pk := c.String("tls-private-key"); pk == "" {
  320. } else {
  321. options = append(options, server.TLSConfig(cert, pk))
  322. }
  323. if c.Bool("profiler") {
  324. options = append(options, server.EnableProfiler())
  325. }
  326. if c.Bool("force-https") {
  327. options = append(options, server.ForceHTTPs())
  328. }
  329. if httpAuthUser := c.String("http-auth-user"); httpAuthUser == "" {
  330. } else if httpAuthPass := c.String("http-auth-pass"); httpAuthPass == "" {
  331. } else {
  332. options = append(options, server.HttpAuthCredentials(httpAuthUser, httpAuthPass))
  333. }
  334. applyIPFilter := false
  335. ipFilterOptions := server.IPFilterOptions{}
  336. if ipWhitelist := c.String("ip-whitelist"); ipWhitelist != "" {
  337. applyIPFilter = true
  338. ipFilterOptions.AllowedIPs = strings.Split(ipWhitelist, ",")
  339. ipFilterOptions.BlockByDefault = true
  340. }
  341. if ipBlacklist := c.String("ip-blacklist"); ipBlacklist != "" {
  342. applyIPFilter = true
  343. ipFilterOptions.BlockedIPs = strings.Split(ipBlacklist, ",")
  344. }
  345. if applyIPFilter {
  346. options = append(options, server.FilterOptions(ipFilterOptions))
  347. }
  348. switch provider := c.String("provider"); provider {
  349. case "s3":
  350. if accessKey := c.String("aws-access-key"); accessKey == "" {
  351. panic("access-key not set.")
  352. } else if secretKey := c.String("aws-secret-key"); secretKey == "" {
  353. panic("secret-key not set.")
  354. } else if bucket := c.String("bucket"); bucket == "" {
  355. panic("bucket not set.")
  356. } else if storage, err := server.NewS3Storage(accessKey, secretKey, bucket, c.String("s3-region"), c.String("s3-endpoint"), logger, c.Bool("s3-no-multipart"), c.Bool("s3-path-style")); err != nil {
  357. panic(err)
  358. } else {
  359. options = append(options, server.UseStorage(storage))
  360. }
  361. case "gdrive":
  362. chunkSize := c.Int("gdrive-chunk-size")
  363. if clientJsonFilepath := c.String("gdrive-client-json-filepath"); clientJsonFilepath == "" {
  364. panic("client-json-filepath not set.")
  365. } else if localConfigPath := c.String("gdrive-local-config-path"); localConfigPath == "" {
  366. panic("local-config-path not set.")
  367. } else if basedir := c.String("basedir"); basedir == "" {
  368. panic("basedir not set.")
  369. } else if storage, err := server.NewGDriveStorage(clientJsonFilepath, localConfigPath, basedir, chunkSize, logger); err != nil {
  370. panic(err)
  371. } else {
  372. options = append(options, server.UseStorage(storage))
  373. }
  374. case "local":
  375. if v := c.String("basedir"); v == "" {
  376. panic("basedir not set.")
  377. } else if storage, err := server.NewLocalStorage(v, logger); err != nil {
  378. panic(err)
  379. } else {
  380. options = append(options, server.UseStorage(storage))
  381. }
  382. default:
  383. panic("Provider not set or invalid.")
  384. }
  385. srvr, err := server.New(
  386. options...,
  387. )
  388. if err != nil {
  389. logger.Println(color.RedString("Error starting server: %s", err.Error()))
  390. return
  391. }
  392. srvr.Run()
  393. }
  394. return &Cmd{
  395. App: app,
  396. }
  397. }