You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

978 lines
24 KiB

  1. /*
  2. The MIT License (MIT)
  3. Copyright (c) 2014-2017 DutchCoders [https://github.com/dutchcoders/]
  4. Permission is hereby granted, free of charge, to any person obtaining a copy
  5. of this software and associated documentation files (the "Software"), to deal
  6. in the Software without restriction, including without limitation the rights
  7. to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  8. copies of the Software, and to permit persons to whom the Software is
  9. furnished to do so, subject to the following conditions:
  10. The above copyright notice and this permission notice shall be included in
  11. all copies or substantial portions of the Software.
  12. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  13. IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  14. FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  15. AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  16. LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  17. OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  18. THE SOFTWARE.
  19. */
  20. package server
  21. import (
  22. // _ "transfer.sh/app/handlers"
  23. // _ "transfer.sh/app/utils"
  24. "archive/tar"
  25. "archive/zip"
  26. "bytes"
  27. "compress/gzip"
  28. "encoding/json"
  29. "errors"
  30. "fmt"
  31. "html"
  32. html_template "html/template"
  33. "io"
  34. "io/ioutil"
  35. "log"
  36. "math/rand"
  37. "mime"
  38. "net/http"
  39. "net/url"
  40. "os"
  41. "path"
  42. "path/filepath"
  43. "strconv"
  44. "strings"
  45. "sync"
  46. text_template "text/template"
  47. "time"
  48. "net"
  49. web "github.com/dutchcoders/transfer.sh-web"
  50. "github.com/gorilla/mux"
  51. "github.com/russross/blackfriday"
  52. "encoding/base64"
  53. qrcode "github.com/skip2/go-qrcode"
  54. )
  55. var (
  56. htmlTemplates = initHTMLTemplates()
  57. textTemplates = initTextTemplates()
  58. )
  59. func stripPrefix(path string) string {
  60. return strings.Replace(path, web.Prefix+"/", "", -1)
  61. }
  62. func initTextTemplates() *text_template.Template {
  63. templateMap := text_template.FuncMap{"format": formatNumber}
  64. // Templates with functions available to them
  65. var templates = text_template.New("").Funcs(templateMap)
  66. return templates
  67. }
  68. func initHTMLTemplates() *html_template.Template {
  69. templateMap := html_template.FuncMap{"format": formatNumber}
  70. // Templates with functions available to them
  71. var templates = html_template.New("").Funcs(templateMap)
  72. return templates
  73. }
  74. func healthHandler(w http.ResponseWriter, r *http.Request) {
  75. fmt.Fprintf(w, "Approaching Neutral Zone, all systems normal and functioning.")
  76. }
  77. /* The preview handler will show a preview of the content for browsers (accept type text/html), and referer is not transfer.sh */
  78. func (s *Server) previewHandler(w http.ResponseWriter, r *http.Request) {
  79. vars := mux.Vars(r)
  80. token := vars["token"]
  81. filename := vars["filename"]
  82. contentType, contentLength, err := s.storage.Head(token, filename)
  83. if err != nil {
  84. http.Error(w, http.StatusText(404), 404)
  85. return
  86. }
  87. var templatePath string
  88. var content html_template.HTML
  89. switch {
  90. case strings.HasPrefix(contentType, "image/"):
  91. templatePath = "download.image.html"
  92. case strings.HasPrefix(contentType, "video/"):
  93. templatePath = "download.video.html"
  94. case strings.HasPrefix(contentType, "audio/"):
  95. templatePath = "download.audio.html"
  96. case strings.HasPrefix(contentType, "text/"):
  97. templatePath = "download.markdown.html"
  98. var reader io.ReadCloser
  99. if reader, _, _, err = s.storage.Get(token, filename); err != nil {
  100. http.Error(w, err.Error(), http.StatusInternalServerError)
  101. return
  102. }
  103. var data []byte
  104. if data, err = ioutil.ReadAll(reader); err != nil {
  105. http.Error(w, err.Error(), http.StatusInternalServerError)
  106. return
  107. }
  108. if strings.HasPrefix(contentType, "text/x-markdown") || strings.HasPrefix(contentType, "text/markdown") {
  109. escapedData := html.EscapeString(string(data))
  110. output := blackfriday.MarkdownCommon([]byte(escapedData))
  111. content = html_template.HTML(output)
  112. } else if strings.HasPrefix(contentType, "text/plain") {
  113. content = html_template.HTML(fmt.Sprintf("<pre>%s</pre>", html.EscapeString(string(data))))
  114. } else {
  115. templatePath = "download.sandbox.html"
  116. }
  117. default:
  118. templatePath = "download.html"
  119. }
  120. if err != nil {
  121. http.Error(w, err.Error(), http.StatusInternalServerError)
  122. return
  123. }
  124. resolvedUrl := resolveUrl(r, getURL(r).ResolveReference(r.URL), true)
  125. var png []byte
  126. png, err = qrcode.Encode(resolvedUrl, qrcode.High, 150)
  127. if err != nil {
  128. http.Error(w, err.Error(), http.StatusInternalServerError)
  129. return
  130. }
  131. qrCode := base64.StdEncoding.EncodeToString(png)
  132. hostname := getURL(r).Host
  133. webAddress := resolveWebAddress(r)
  134. data := struct {
  135. ContentType string
  136. Content html_template.HTML
  137. Filename string
  138. Url string
  139. Hostname string
  140. WebAddress string
  141. ContentLength uint64
  142. GAKey string
  143. UserVoiceKey string
  144. QRCode string
  145. }{
  146. contentType,
  147. content,
  148. filename,
  149. resolvedUrl,
  150. hostname,
  151. webAddress,
  152. contentLength,
  153. s.gaKey,
  154. s.userVoiceKey,
  155. qrCode,
  156. }
  157. if err := htmlTemplates.ExecuteTemplate(w, templatePath, data); err != nil {
  158. http.Error(w, err.Error(), http.StatusInternalServerError)
  159. return
  160. }
  161. }
  162. // this handler will output html or text, depending on the
  163. // support of the client (Accept header).
  164. func (s *Server) viewHandler(w http.ResponseWriter, r *http.Request) {
  165. // vars := mux.Vars(r)
  166. hostname := getURL(r).Host
  167. webAddress := resolveWebAddress(r)
  168. data := struct {
  169. Hostname string
  170. WebAddress string
  171. GAKey string
  172. UserVoiceKey string
  173. }{
  174. hostname,
  175. webAddress,
  176. s.gaKey,
  177. s.userVoiceKey,
  178. }
  179. if acceptsHTML(r.Header) {
  180. if err := htmlTemplates.ExecuteTemplate(w, "index.html", data); err != nil {
  181. http.Error(w, err.Error(), http.StatusInternalServerError)
  182. return
  183. }
  184. } else {
  185. if err := textTemplates.ExecuteTemplate(w, "index.txt", data); err != nil {
  186. http.Error(w, err.Error(), http.StatusInternalServerError)
  187. return
  188. }
  189. }
  190. }
  191. func (s *Server) notFoundHandler(w http.ResponseWriter, r *http.Request) {
  192. http.Error(w, http.StatusText(404), 404)
  193. }
  194. func sanitize(fileName string) string {
  195. return path.Clean(path.Base(fileName))
  196. }
  197. func (s *Server) postHandler(w http.ResponseWriter, r *http.Request) {
  198. if err := r.ParseMultipartForm(_24K); nil != err {
  199. log.Printf("%s", err.Error())
  200. http.Error(w, "Error occurred copying to output stream", 500)
  201. return
  202. }
  203. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  204. w.Header().Set("Content-Type", "text/plain")
  205. for _, fheaders := range r.MultipartForm.File {
  206. for _, fheader := range fheaders {
  207. filename := sanitize(fheader.Filename)
  208. contentType := fheader.Header.Get("Content-Type")
  209. if contentType == "" {
  210. contentType = mime.TypeByExtension(filepath.Ext(fheader.Filename))
  211. }
  212. var f io.Reader
  213. var err error
  214. if f, err = fheader.Open(); err != nil {
  215. log.Printf("%s", err.Error())
  216. http.Error(w, err.Error(), 500)
  217. return
  218. }
  219. var b bytes.Buffer
  220. n, err := io.CopyN(&b, f, _24K+1)
  221. if err != nil && err != io.EOF {
  222. log.Printf("%s", err.Error())
  223. http.Error(w, err.Error(), 500)
  224. return
  225. }
  226. var file *os.File
  227. var reader io.Reader
  228. if n > _24K {
  229. file, err = ioutil.TempFile(s.tempPath, "transfer-")
  230. if err != nil {
  231. log.Fatal(err)
  232. }
  233. n, err = io.Copy(file, io.MultiReader(&b, f))
  234. if err != nil {
  235. cleanTmpFile(file)
  236. log.Printf("%s", err.Error())
  237. http.Error(w, err.Error(), 500)
  238. return
  239. }
  240. reader, err = os.Open(file.Name())
  241. } else {
  242. reader = bytes.NewReader(b.Bytes())
  243. }
  244. contentLength := n
  245. metadata := MetadataForRequest(contentType, r)
  246. buffer := &bytes.Buffer{}
  247. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  248. log.Printf("%s", err.Error())
  249. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  250. cleanTmpFile(file)
  251. return
  252. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  253. log.Printf("%s", err.Error())
  254. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  255. cleanTmpFile(file)
  256. return
  257. }
  258. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  259. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  260. log.Printf("Backend storage error: %s", err.Error())
  261. http.Error(w, err.Error(), 500)
  262. return
  263. }
  264. relativeURL, _ := url.Parse(path.Join(token, filename))
  265. fmt.Fprintln(w, getURL(r).ResolveReference(relativeURL).String())
  266. cleanTmpFile(file)
  267. }
  268. }
  269. }
  270. func cleanTmpFile(f *os.File) {
  271. if f != nil {
  272. f.Close()
  273. os.Remove(f.Name())
  274. }
  275. }
  276. type Metadata struct {
  277. // ContentType is the original uploading content type
  278. ContentType string
  279. // Secret as knowledge to delete file
  280. // Secret string
  281. // Downloads is the actual number of downloads
  282. Downloads int
  283. // MaxDownloads contains the maximum numbers of downloads
  284. MaxDownloads int
  285. // MaxDate contains the max age of the file
  286. MaxDate time.Time
  287. // DeletionToken contains the token to match against for deletion
  288. DeletionToken string
  289. }
  290. func MetadataForRequest(contentType string, r *http.Request) Metadata {
  291. metadata := Metadata{
  292. ContentType: contentType,
  293. MaxDate: time.Now().Add(time.Hour * 24 * 365 * 10),
  294. Downloads: 0,
  295. MaxDownloads: 99999999,
  296. DeletionToken: Encode(10000000+int64(rand.Intn(1000000000))) + Encode(10000000+int64(rand.Intn(1000000000))),
  297. }
  298. if v := r.Header.Get("Max-Downloads"); v == "" {
  299. } else if v, err := strconv.Atoi(v); err != nil {
  300. } else {
  301. metadata.MaxDownloads = v
  302. }
  303. if v := r.Header.Get("Max-Days"); v == "" {
  304. } else if v, err := strconv.Atoi(v); err != nil {
  305. } else {
  306. metadata.MaxDate = time.Now().Add(time.Hour * 24 * time.Duration(v))
  307. }
  308. return metadata
  309. }
  310. func (s *Server) putHandler(w http.ResponseWriter, r *http.Request) {
  311. vars := mux.Vars(r)
  312. filename := sanitize(vars["filename"])
  313. contentLength := r.ContentLength
  314. var reader io.Reader
  315. reader = r.Body
  316. defer r.Body.Close()
  317. if contentLength == -1 {
  318. // queue file to disk, because s3 needs content length
  319. var err error
  320. var f io.Reader
  321. f = reader
  322. var b bytes.Buffer
  323. n, err := io.CopyN(&b, f, _24K+1)
  324. if err != nil && err != io.EOF {
  325. log.Printf("Error putting new file: %s", err.Error())
  326. http.Error(w, err.Error(), 500)
  327. return
  328. }
  329. var file *os.File
  330. if n > _24K {
  331. file, err = ioutil.TempFile(s.tempPath, "transfer-")
  332. if err != nil {
  333. log.Printf("%s", err.Error())
  334. http.Error(w, err.Error(), 500)
  335. return
  336. }
  337. defer cleanTmpFile(file)
  338. n, err = io.Copy(file, io.MultiReader(&b, f))
  339. if err != nil {
  340. log.Printf("%s", err.Error())
  341. http.Error(w, err.Error(), 500)
  342. return
  343. }
  344. reader, err = os.Open(file.Name())
  345. } else {
  346. reader = bytes.NewReader(b.Bytes())
  347. }
  348. contentLength = n
  349. }
  350. if contentLength == 0 {
  351. log.Print("Empty content-length")
  352. http.Error(w, errors.New("Could not upload empty file").Error(), 400)
  353. return
  354. }
  355. contentType := r.Header.Get("Content-Type")
  356. if contentType == "" {
  357. contentType = mime.TypeByExtension(filepath.Ext(vars["filename"]))
  358. }
  359. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  360. metadata := MetadataForRequest(contentType, r)
  361. buffer := &bytes.Buffer{}
  362. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  363. log.Printf("%s", err.Error())
  364. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  365. return
  366. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  367. log.Printf("%s", err.Error())
  368. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  369. return
  370. }
  371. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  372. var err error
  373. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  374. log.Printf("Error putting new file: %s", err.Error())
  375. http.Error(w, errors.New("Could not save file").Error(), 500)
  376. return
  377. }
  378. // w.Statuscode = 200
  379. w.Header().Set("Content-Type", "text/plain")
  380. relativeURL, _ := url.Parse(path.Join(token, filename))
  381. deleteUrl, _ := url.Parse(path.Join(token, filename, metadata.DeletionToken))
  382. w.Header().Set("X-Url-Delete", resolveUrl(r, deleteUrl, true))
  383. fmt.Fprint(w, resolveUrl(r, relativeURL, false))
  384. }
  385. func resolveUrl(r *http.Request, u *url.URL, absolutePath bool) string {
  386. if u.RawQuery != "" {
  387. u.Path = fmt.Sprintf("%s?%s", u.Path, url.QueryEscape(u.RawQuery))
  388. u.RawQuery = ""
  389. }
  390. if u.Fragment != "" {
  391. u.Path = fmt.Sprintf("%s#%s", u.Path, u.Fragment)
  392. u.Fragment = ""
  393. }
  394. if absolutePath {
  395. r.URL.Path = ""
  396. }
  397. return getURL(r).ResolveReference(u).String()
  398. }
  399. func resolveWebAddress(r *http.Request) string {
  400. url := getURL(r)
  401. return fmt.Sprintf("%s://%s", url.ResolveReference(url).Scheme, url.ResolveReference(url).Host)
  402. }
  403. func getURL(r *http.Request) *url.URL {
  404. u, _ := url.Parse(r.URL.String())
  405. if r.TLS != nil {
  406. u.Scheme = "https"
  407. } else if proto := r.Header.Get("X-Forwarded-Proto"); proto != "" {
  408. u.Scheme = proto
  409. } else {
  410. u.Scheme = "http"
  411. }
  412. if u.Host != "" {
  413. } else if host, port, err := net.SplitHostPort(r.Host); err != nil {
  414. u.Host = r.Host
  415. } else {
  416. if port == "80" && u.Scheme == "http" {
  417. u.Host = host
  418. } else if port == "443" && u.Scheme == "https" {
  419. u.Host = host
  420. } else {
  421. u.Host = net.JoinHostPort(host, port)
  422. }
  423. }
  424. return u
  425. }
  426. func (s *Server) Lock(token, filename string) error {
  427. key := path.Join(token, filename)
  428. if _, ok := s.locks[key]; !ok {
  429. s.locks[key] = &sync.Mutex{}
  430. }
  431. s.locks[key].Lock()
  432. return nil
  433. }
  434. func (s *Server) Unlock(token, filename string) error {
  435. key := path.Join(token, filename)
  436. s.locks[key].Unlock()
  437. return nil
  438. }
  439. func (s *Server) CheckMetadata(token, filename string) error {
  440. s.Lock(token, filename)
  441. defer s.Unlock(token, filename)
  442. var metadata Metadata
  443. r, _, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  444. if s.storage.IsNotExist(err) {
  445. return nil
  446. } else if err != nil {
  447. return err
  448. }
  449. defer r.Close()
  450. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  451. return err
  452. } else if metadata.Downloads >= metadata.MaxDownloads {
  453. return errors.New("MaxDownloads expired.")
  454. } else if time.Now().After(metadata.MaxDate) {
  455. return errors.New("MaxDate expired.")
  456. } else {
  457. // todo(nl5887): mutex?
  458. // update number of downloads
  459. metadata.Downloads++
  460. buffer := &bytes.Buffer{}
  461. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  462. return errors.New("Could not encode metadata")
  463. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  464. return errors.New("Could not save metadata")
  465. }
  466. }
  467. return nil
  468. }
  469. func (s *Server) CheckDeletionToken(deletionToken, token, filename string) error {
  470. s.Lock(token, filename)
  471. defer s.Unlock(token, filename)
  472. var metadata Metadata
  473. r, _, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  474. if s.storage.IsNotExist(err) {
  475. return nil
  476. } else if err != nil {
  477. return err
  478. }
  479. defer r.Close()
  480. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  481. return err
  482. } else if metadata.DeletionToken != deletionToken {
  483. return errors.New("Deletion token doesn't match.")
  484. }
  485. return nil
  486. }
  487. func (s *Server) deleteHandler(w http.ResponseWriter, r *http.Request) {
  488. vars := mux.Vars(r)
  489. token := vars["token"]
  490. filename := vars["filename"]
  491. deletionToken := vars["deletionToken"]
  492. if err := s.CheckDeletionToken(deletionToken, token, filename); err != nil {
  493. log.Printf("Error metadata: %s", err.Error())
  494. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  495. return
  496. }
  497. err := s.storage.Delete(token, filename)
  498. if s.storage.IsNotExist(err) {
  499. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  500. return
  501. } else if err != nil {
  502. log.Printf("%s", err.Error())
  503. http.Error(w, "Could not delete file.", 500)
  504. return
  505. }
  506. }
  507. func (s *Server) zipHandler(w http.ResponseWriter, r *http.Request) {
  508. vars := mux.Vars(r)
  509. files := vars["files"]
  510. zipfilename := fmt.Sprintf("transfersh-%d.zip", uint16(time.Now().UnixNano()))
  511. w.Header().Set("Content-Type", "application/zip")
  512. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", zipfilename))
  513. w.Header().Set("Connection", "close")
  514. zw := zip.NewWriter(w)
  515. for _, key := range strings.Split(files, ",") {
  516. if strings.HasPrefix(key, "/") {
  517. key = key[1:]
  518. }
  519. key = strings.Replace(key, "\\", "/", -1)
  520. token := strings.Split(key, "/")[0]
  521. filename := sanitize(strings.Split(key, "/")[1])
  522. if err := s.CheckMetadata(token, filename); err != nil {
  523. log.Printf("Error metadata: %s", err.Error())
  524. continue
  525. }
  526. reader, _, _, err := s.storage.Get(token, filename)
  527. if err != nil {
  528. if s.storage.IsNotExist(err) {
  529. http.Error(w, "File not found", 404)
  530. return
  531. } else {
  532. log.Printf("%s", err.Error())
  533. http.Error(w, "Could not retrieve file.", 500)
  534. return
  535. }
  536. }
  537. defer reader.Close()
  538. header := &zip.FileHeader{
  539. Name: strings.Split(key, "/")[1],
  540. Method: zip.Store,
  541. ModifiedTime: uint16(time.Now().UnixNano()),
  542. ModifiedDate: uint16(time.Now().UnixNano()),
  543. }
  544. fw, err := zw.CreateHeader(header)
  545. if err != nil {
  546. log.Printf("%s", err.Error())
  547. http.Error(w, "Internal server error.", 500)
  548. return
  549. }
  550. if _, err = io.Copy(fw, reader); err != nil {
  551. log.Printf("%s", err.Error())
  552. http.Error(w, "Internal server error.", 500)
  553. return
  554. }
  555. }
  556. if err := zw.Close(); err != nil {
  557. log.Printf("%s", err.Error())
  558. http.Error(w, "Internal server error.", 500)
  559. return
  560. }
  561. }
  562. func (s *Server) tarGzHandler(w http.ResponseWriter, r *http.Request) {
  563. vars := mux.Vars(r)
  564. files := vars["files"]
  565. tarfilename := fmt.Sprintf("transfersh-%d.tar.gz", uint16(time.Now().UnixNano()))
  566. w.Header().Set("Content-Type", "application/x-gzip")
  567. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  568. w.Header().Set("Connection", "close")
  569. os := gzip.NewWriter(w)
  570. defer os.Close()
  571. zw := tar.NewWriter(os)
  572. defer zw.Close()
  573. for _, key := range strings.Split(files, ",") {
  574. if strings.HasPrefix(key, "/") {
  575. key = key[1:]
  576. }
  577. key = strings.Replace(key, "\\", "/", -1)
  578. token := strings.Split(key, "/")[0]
  579. filename := sanitize(strings.Split(key, "/")[1])
  580. if err := s.CheckMetadata(token, filename); err != nil {
  581. log.Printf("Error metadata: %s", err.Error())
  582. continue
  583. }
  584. reader, _, contentLength, err := s.storage.Get(token, filename)
  585. if err != nil {
  586. if s.storage.IsNotExist(err) {
  587. http.Error(w, "File not found", 404)
  588. return
  589. } else {
  590. log.Printf("%s", err.Error())
  591. http.Error(w, "Could not retrieve file.", 500)
  592. return
  593. }
  594. }
  595. defer reader.Close()
  596. header := &tar.Header{
  597. Name: strings.Split(key, "/")[1],
  598. Size: int64(contentLength),
  599. }
  600. err = zw.WriteHeader(header)
  601. if err != nil {
  602. log.Printf("%s", err.Error())
  603. http.Error(w, "Internal server error.", 500)
  604. return
  605. }
  606. if _, err = io.Copy(zw, reader); err != nil {
  607. log.Printf("%s", err.Error())
  608. http.Error(w, "Internal server error.", 500)
  609. return
  610. }
  611. }
  612. }
  613. func (s *Server) tarHandler(w http.ResponseWriter, r *http.Request) {
  614. vars := mux.Vars(r)
  615. files := vars["files"]
  616. tarfilename := fmt.Sprintf("transfersh-%d.tar", uint16(time.Now().UnixNano()))
  617. w.Header().Set("Content-Type", "application/x-tar")
  618. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  619. w.Header().Set("Connection", "close")
  620. zw := tar.NewWriter(w)
  621. defer zw.Close()
  622. for _, key := range strings.Split(files, ",") {
  623. token := strings.Split(key, "/")[0]
  624. filename := strings.Split(key, "/")[1]
  625. if err := s.CheckMetadata(token, filename); err != nil {
  626. log.Printf("Error metadata: %s", err.Error())
  627. continue
  628. }
  629. reader, _, contentLength, err := s.storage.Get(token, filename)
  630. if err != nil {
  631. if s.storage.IsNotExist(err) {
  632. http.Error(w, "File not found", 404)
  633. return
  634. } else {
  635. log.Printf("%s", err.Error())
  636. http.Error(w, "Could not retrieve file.", 500)
  637. return
  638. }
  639. }
  640. defer reader.Close()
  641. header := &tar.Header{
  642. Name: strings.Split(key, "/")[1],
  643. Size: int64(contentLength),
  644. }
  645. err = zw.WriteHeader(header)
  646. if err != nil {
  647. log.Printf("%s", err.Error())
  648. http.Error(w, "Internal server error.", 500)
  649. return
  650. }
  651. if _, err = io.Copy(zw, reader); err != nil {
  652. log.Printf("%s", err.Error())
  653. http.Error(w, "Internal server error.", 500)
  654. return
  655. }
  656. }
  657. }
  658. func (s *Server) headHandler(w http.ResponseWriter, r *http.Request) {
  659. vars := mux.Vars(r)
  660. token := vars["token"]
  661. filename := vars["filename"]
  662. if err := s.CheckMetadata(token, filename); err != nil {
  663. log.Printf("Error metadata: %s", err.Error())
  664. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  665. return
  666. }
  667. contentType, contentLength, err := s.storage.Head(token, filename)
  668. if s.storage.IsNotExist(err) {
  669. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  670. return
  671. } else if err != nil {
  672. log.Printf("%s", err.Error())
  673. http.Error(w, "Could not retrieve file.", 500)
  674. return
  675. }
  676. w.Header().Set("Content-Type", contentType)
  677. w.Header().Set("Content-Length", strconv.FormatUint(contentLength, 10))
  678. w.Header().Set("Connection", "close")
  679. }
  680. func (s *Server) getHandler(w http.ResponseWriter, r *http.Request) {
  681. vars := mux.Vars(r)
  682. action := vars["action"]
  683. token := vars["token"]
  684. filename := vars["filename"]
  685. if err := s.CheckMetadata(token, filename); err != nil {
  686. log.Printf("Error metadata: %s", err.Error())
  687. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  688. return
  689. }
  690. reader, contentType, contentLength, err := s.storage.Get(token, filename)
  691. if s.storage.IsNotExist(err) {
  692. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  693. return
  694. } else if err != nil {
  695. log.Printf("%s", err.Error())
  696. http.Error(w, "Could not retrieve file.", 500)
  697. return
  698. }
  699. defer reader.Close()
  700. var disposition string
  701. if action == "inline" {
  702. disposition = "inline"
  703. } else {
  704. disposition = "attachment"
  705. }
  706. w.Header().Set("Content-Type", contentType)
  707. w.Header().Set("Content-Length", strconv.FormatUint(contentLength, 10))
  708. w.Header().Set("Content-Disposition", fmt.Sprintf("%s; filename=\"%s\"", disposition, filename))
  709. w.Header().Set("Connection", "keep-alive")
  710. file, err := ioutil.TempFile(s.tempPath, "range-")
  711. if err != nil {
  712. log.Printf("%s", err.Error())
  713. http.Error(w, "Error occurred copying to output stream", 500)
  714. return
  715. }
  716. defer cleanTmpFile(file)
  717. tee := io.TeeReader(reader, file)
  718. _, err = ioutil.ReadAll(tee)
  719. if err != nil {
  720. log.Printf("%s", err.Error())
  721. http.Error(w, "Error occurred copying to output stream", 500)
  722. return
  723. }
  724. http.ServeContent(w, r, filename, time.Now(), file)
  725. }
  726. func (s *Server) RedirectHandler(h http.Handler) http.HandlerFunc {
  727. return func(w http.ResponseWriter, r *http.Request) {
  728. if !s.forceHTTPs {
  729. // we don't want to enforce https
  730. } else if r.URL.Path == "/health.html" {
  731. // health check url won't redirect
  732. } else if strings.HasSuffix(ipAddrFromRemoteAddr(r.Host), ".onion") {
  733. // .onion addresses cannot get a valid certificate, so don't redirect
  734. } else if r.Header.Get("X-Forwarded-Proto") == "https" {
  735. } else if r.URL.Scheme == "https" {
  736. } else {
  737. u := getURL(r)
  738. u.Scheme = "https"
  739. http.Redirect(w, r, u.String(), http.StatusPermanentRedirect)
  740. return
  741. }
  742. h.ServeHTTP(w, r)
  743. }
  744. }
  745. // Create a log handler for every request it receives.
  746. func LoveHandler(h http.Handler) http.HandlerFunc {
  747. return func(w http.ResponseWriter, r *http.Request) {
  748. w.Header().Set("x-made-with", "<3 by DutchCoders")
  749. w.Header().Set("x-served-by", "Proudly served by DutchCoders")
  750. w.Header().Set("Server", "Transfer.sh HTTP Server 1.0")
  751. h.ServeHTTP(w, r)
  752. }
  753. }
  754. func (s *Server) BasicAuthHandler(h http.Handler) http.HandlerFunc {
  755. return func(w http.ResponseWriter, r *http.Request) {
  756. if s.AuthUser == "" || s.AuthPass == "" {
  757. h.ServeHTTP(w, r)
  758. return
  759. }
  760. w.Header().Set("WWW-Authenticate", "Basic realm=\"Restricted\"")
  761. username, password, authOK := r.BasicAuth()
  762. if authOK == false {
  763. http.Error(w, "Not authorized", 401)
  764. return
  765. }
  766. if username != s.AuthUser || password != s.AuthPass {
  767. http.Error(w, "Not authorized", 401)
  768. return
  769. }
  770. h.ServeHTTP(w, r)
  771. }
  772. }