You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

1029 lines
25 KiB

  1. /*
  2. The MIT License (MIT)
  3. Copyright (c) 2014-2017 DutchCoders [https://github.com/dutchcoders/]
  4. Permission is hereby granted, free of charge, to any person obtaining a copy
  5. of this software and associated documentation files (the "Software"), to deal
  6. in the Software without restriction, including without limitation the rights
  7. to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  8. copies of the Software, and to permit persons to whom the Software is
  9. furnished to do so, subject to the following conditions:
  10. The above copyright notice and this permission notice shall be included in
  11. all copies or substantial portions of the Software.
  12. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  13. IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  14. FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  15. AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  16. LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  17. OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  18. THE SOFTWARE.
  19. */
  20. package server
  21. import (
  22. // _ "transfer.sh/app/handlers"
  23. // _ "transfer.sh/app/utils"
  24. "archive/tar"
  25. "archive/zip"
  26. "bytes"
  27. "compress/gzip"
  28. "encoding/json"
  29. "errors"
  30. "fmt"
  31. blackfriday "gopkg.in/russross/blackfriday.v2"
  32. "html"
  33. html_template "html/template"
  34. "io"
  35. "io/ioutil"
  36. "log"
  37. "math/rand"
  38. "mime"
  39. "net/http"
  40. "net/url"
  41. "os"
  42. "path"
  43. "path/filepath"
  44. "strconv"
  45. "strings"
  46. "sync"
  47. text_template "text/template"
  48. "time"
  49. "net"
  50. "encoding/base64"
  51. web "github.com/dutchcoders/transfer.sh-web"
  52. "github.com/gorilla/mux"
  53. "github.com/microcosm-cc/bluemonday"
  54. "github.com/skip2/go-qrcode"
  55. )
  56. const getPathPart = "get"
  57. var (
  58. htmlTemplates = initHTMLTemplates()
  59. textTemplates = initTextTemplates()
  60. )
  61. func stripPrefix(path string) string {
  62. return strings.Replace(path, web.Prefix+"/", "", -1)
  63. }
  64. func initTextTemplates() *text_template.Template {
  65. templateMap := text_template.FuncMap{"format": formatNumber}
  66. // Templates with functions available to them
  67. var templates = text_template.New("").Funcs(templateMap)
  68. return templates
  69. }
  70. func initHTMLTemplates() *html_template.Template {
  71. templateMap := html_template.FuncMap{"format": formatNumber}
  72. // Templates with functions available to them
  73. var templates = html_template.New("").Funcs(templateMap)
  74. return templates
  75. }
  76. func healthHandler(w http.ResponseWriter, r *http.Request) {
  77. fmt.Fprintf(w, "Approaching Neutral Zone, all systems normal and functioning.")
  78. }
  79. /* The preview handler will show a preview of the content for browsers (accept type text/html), and referer is not transfer.sh */
  80. func (s *Server) previewHandler(w http.ResponseWriter, r *http.Request) {
  81. vars := mux.Vars(r)
  82. token := vars["token"]
  83. filename := vars["filename"]
  84. contentType, contentLength, err := s.storage.Head(token, filename)
  85. if err != nil {
  86. http.Error(w, http.StatusText(404), 404)
  87. return
  88. }
  89. var templatePath string
  90. var content html_template.HTML
  91. switch {
  92. case strings.HasPrefix(contentType, "image/"):
  93. templatePath = "download.image.html"
  94. case strings.HasPrefix(contentType, "video/"):
  95. templatePath = "download.video.html"
  96. case strings.HasPrefix(contentType, "audio/"):
  97. templatePath = "download.audio.html"
  98. case strings.HasPrefix(contentType, "text/"):
  99. templatePath = "download.markdown.html"
  100. var reader io.ReadCloser
  101. if reader, _, _, err = s.storage.Get(token, filename); err != nil {
  102. http.Error(w, err.Error(), http.StatusInternalServerError)
  103. return
  104. }
  105. var data []byte
  106. data = make([]byte, _5M)
  107. if _, err = reader.Read(data); err != io.EOF && err != nil {
  108. http.Error(w, err.Error(), http.StatusInternalServerError)
  109. return
  110. }
  111. if strings.HasPrefix(contentType, "text/x-markdown") || strings.HasPrefix(contentType, "text/markdown") {
  112. unsafe := blackfriday.Run(data)
  113. output := bluemonday.UGCPolicy().SanitizeBytes(unsafe)
  114. content = html_template.HTML(output)
  115. } else if strings.HasPrefix(contentType, "text/plain") {
  116. content = html_template.HTML(fmt.Sprintf("<pre>%s</pre>", html.EscapeString(string(data))))
  117. } else {
  118. templatePath = "download.sandbox.html"
  119. }
  120. default:
  121. templatePath = "download.html"
  122. }
  123. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  124. resolvedURL := resolveURL(r, getURL(r).ResolveReference(relativeURL), true)
  125. relativeURLGet, _ := url.Parse(path.Join(s.proxyPath, getPathPart, token, filename))
  126. resolvedURLGet := resolveURL(r, getURL(r).ResolveReference(relativeURLGet), true)
  127. var png []byte
  128. png, err = qrcode.Encode(resolvedURL, qrcode.High, 150)
  129. if err != nil {
  130. http.Error(w, err.Error(), http.StatusInternalServerError)
  131. return
  132. }
  133. qrCode := base64.StdEncoding.EncodeToString(png)
  134. hostname := getURL(r).Host
  135. webAddress := resolveWebAddress(r, s.proxyPath)
  136. data := struct {
  137. ContentType string
  138. Content html_template.HTML
  139. Filename string
  140. Url string
  141. UrlGet string
  142. Hostname string
  143. WebAddress string
  144. ContentLength uint64
  145. GAKey string
  146. UserVoiceKey string
  147. QRCode string
  148. }{
  149. contentType,
  150. content,
  151. filename,
  152. resolvedURL,
  153. resolvedURLGet,
  154. hostname,
  155. webAddress,
  156. contentLength,
  157. s.gaKey,
  158. s.userVoiceKey,
  159. qrCode,
  160. }
  161. if err := htmlTemplates.ExecuteTemplate(w, templatePath, data); err != nil {
  162. http.Error(w, err.Error(), http.StatusInternalServerError)
  163. return
  164. }
  165. }
  166. // this handler will output html or text, depending on the
  167. // support of the client (Accept header).
  168. func (s *Server) viewHandler(w http.ResponseWriter, r *http.Request) {
  169. // vars := mux.Vars(r)
  170. hostname := getURL(r).Host
  171. webAddress := resolveWebAddress(r, s.proxyPath)
  172. data := struct {
  173. Hostname string
  174. WebAddress string
  175. GAKey string
  176. UserVoiceKey string
  177. }{
  178. hostname,
  179. webAddress,
  180. s.gaKey,
  181. s.userVoiceKey,
  182. }
  183. if acceptsHTML(r.Header) {
  184. if err := htmlTemplates.ExecuteTemplate(w, "index.html", data); err != nil {
  185. http.Error(w, err.Error(), http.StatusInternalServerError)
  186. return
  187. }
  188. } else {
  189. if err := textTemplates.ExecuteTemplate(w, "index.txt", data); err != nil {
  190. http.Error(w, err.Error(), http.StatusInternalServerError)
  191. return
  192. }
  193. }
  194. }
  195. func (s *Server) notFoundHandler(w http.ResponseWriter, r *http.Request) {
  196. http.Error(w, http.StatusText(404), 404)
  197. }
  198. func sanitize(fileName string) string {
  199. return path.Clean(path.Base(fileName))
  200. }
  201. func (s *Server) postHandler(w http.ResponseWriter, r *http.Request) {
  202. if err := r.ParseMultipartForm(_24K); nil != err {
  203. log.Printf("%s", err.Error())
  204. http.Error(w, "Error occurred copying to output stream", 500)
  205. return
  206. }
  207. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  208. w.Header().Set("Content-Type", "text/plain")
  209. for _, fheaders := range r.MultipartForm.File {
  210. for _, fheader := range fheaders {
  211. filename := sanitize(fheader.Filename)
  212. contentType := fheader.Header.Get("Content-Type")
  213. if contentType == "" {
  214. contentType = mime.TypeByExtension(filepath.Ext(fheader.Filename))
  215. }
  216. var f io.Reader
  217. var err error
  218. if f, err = fheader.Open(); err != nil {
  219. log.Printf("%s", err.Error())
  220. http.Error(w, err.Error(), 500)
  221. return
  222. }
  223. var b bytes.Buffer
  224. n, err := io.CopyN(&b, f, _24K+1)
  225. if err != nil && err != io.EOF {
  226. log.Printf("%s", err.Error())
  227. http.Error(w, err.Error(), 500)
  228. return
  229. }
  230. var file *os.File
  231. var reader io.Reader
  232. if n > _24K {
  233. file, err = ioutil.TempFile(s.tempPath, "transfer-")
  234. if err != nil {
  235. log.Fatal(err)
  236. }
  237. n, err = io.Copy(file, io.MultiReader(&b, f))
  238. if err != nil {
  239. cleanTmpFile(file)
  240. log.Printf("%s", err.Error())
  241. http.Error(w, err.Error(), 500)
  242. return
  243. }
  244. reader, err = os.Open(file.Name())
  245. } else {
  246. reader = bytes.NewReader(b.Bytes())
  247. }
  248. contentLength := n
  249. metadata := MetadataForRequest(contentType, r)
  250. buffer := &bytes.Buffer{}
  251. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  252. log.Printf("%s", err.Error())
  253. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  254. cleanTmpFile(file)
  255. return
  256. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  257. log.Printf("%s", err.Error())
  258. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  259. cleanTmpFile(file)
  260. return
  261. }
  262. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  263. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  264. log.Printf("Backend storage error: %s", err.Error())
  265. http.Error(w, err.Error(), 500)
  266. return
  267. }
  268. filename = url.QueryEscape(filename)
  269. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  270. fmt.Fprintln(w, getURL(r).ResolveReference(relativeURL).String())
  271. cleanTmpFile(file)
  272. }
  273. }
  274. }
  275. func cleanTmpFile(f *os.File) {
  276. if f != nil {
  277. err := f.Close()
  278. if err != nil {
  279. log.Printf("Error closing tmpfile: %s (%s)", err, f.Name())
  280. }
  281. err = os.Remove(f.Name())
  282. if err != nil {
  283. log.Printf("Error removing tmpfile: %s (%s)", err, f.Name())
  284. }
  285. }
  286. }
  287. type Metadata struct {
  288. // ContentType is the original uploading content type
  289. ContentType string
  290. // Secret as knowledge to delete file
  291. // Secret string
  292. // Downloads is the actual number of downloads
  293. Downloads int
  294. // MaxDownloads contains the maximum numbers of downloads
  295. MaxDownloads int
  296. // MaxDate contains the max age of the file
  297. MaxDate time.Time
  298. // DeletionToken contains the token to match against for deletion
  299. DeletionToken string
  300. }
  301. func MetadataForRequest(contentType string, r *http.Request) Metadata {
  302. metadata := Metadata{
  303. ContentType: contentType,
  304. MaxDate: time.Now().Add(time.Hour * 24 * 365 * 10),
  305. Downloads: 0,
  306. MaxDownloads: 99999999,
  307. DeletionToken: Encode(10000000+int64(rand.Intn(1000000000))) + Encode(10000000+int64(rand.Intn(1000000000))),
  308. }
  309. if v := r.Header.Get("Max-Downloads"); v == "" {
  310. } else if v, err := strconv.Atoi(v); err != nil {
  311. } else {
  312. metadata.MaxDownloads = v
  313. }
  314. if v := r.Header.Get("Max-Days"); v == "" {
  315. } else if v, err := strconv.Atoi(v); err != nil {
  316. } else {
  317. metadata.MaxDate = time.Now().Add(time.Hour * 24 * time.Duration(v))
  318. }
  319. return metadata
  320. }
  321. func (s *Server) putHandler(w http.ResponseWriter, r *http.Request) {
  322. vars := mux.Vars(r)
  323. filename := sanitize(vars["filename"])
  324. contentLength := r.ContentLength
  325. var reader io.Reader
  326. reader = r.Body
  327. defer r.Body.Close()
  328. if contentLength == -1 {
  329. // queue file to disk, because s3 needs content length
  330. var err error
  331. var f io.Reader
  332. f = reader
  333. var b bytes.Buffer
  334. n, err := io.CopyN(&b, f, _24K+1)
  335. if err != nil && err != io.EOF {
  336. log.Printf("Error putting new file: %s", err.Error())
  337. http.Error(w, err.Error(), 500)
  338. return
  339. }
  340. var file *os.File
  341. if n > _24K {
  342. file, err = ioutil.TempFile(s.tempPath, "transfer-")
  343. if err != nil {
  344. log.Printf("%s", err.Error())
  345. http.Error(w, err.Error(), 500)
  346. return
  347. }
  348. defer cleanTmpFile(file)
  349. n, err = io.Copy(file, io.MultiReader(&b, f))
  350. if err != nil {
  351. log.Printf("%s", err.Error())
  352. http.Error(w, err.Error(), 500)
  353. return
  354. }
  355. reader, err = os.Open(file.Name())
  356. } else {
  357. reader = bytes.NewReader(b.Bytes())
  358. }
  359. contentLength = n
  360. }
  361. if contentLength == 0 {
  362. log.Print("Empty content-length")
  363. http.Error(w, errors.New("Could not upload empty file").Error(), 400)
  364. return
  365. }
  366. contentType := r.Header.Get("Content-Type")
  367. if contentType == "" {
  368. contentType = mime.TypeByExtension(filepath.Ext(vars["filename"]))
  369. }
  370. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  371. metadata := MetadataForRequest(contentType, r)
  372. buffer := &bytes.Buffer{}
  373. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  374. log.Printf("%s", err.Error())
  375. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  376. return
  377. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  378. log.Printf("%s", err.Error())
  379. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  380. return
  381. }
  382. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  383. var err error
  384. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  385. log.Printf("Error putting new file: %s", err.Error())
  386. http.Error(w, errors.New("Could not save file").Error(), 500)
  387. return
  388. }
  389. // w.Statuscode = 200
  390. w.Header().Set("Content-Type", "text/plain")
  391. filename = url.QueryEscape(filename)
  392. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  393. deleteURL, _ := url.Parse(path.Join(s.proxyPath, token, filename, metadata.DeletionToken))
  394. w.Header().Set("X-Url-Delete", resolveURL(r, deleteURL, true))
  395. fmt.Fprint(w, resolveURL(r, relativeURL, false))
  396. }
  397. func resolveURL(r *http.Request, u *url.URL, absolutePath bool) string {
  398. if absolutePath {
  399. r.URL.Path = ""
  400. }
  401. return getURL(r).ResolveReference(u).String()
  402. }
  403. func resolveKey(key, proxyPath string) string {
  404. if strings.HasPrefix(key, "/") {
  405. key = key[1:]
  406. }
  407. if strings.HasPrefix(key, proxyPath) {
  408. key = key[len(proxyPath):]
  409. }
  410. key = strings.Replace(key, "\\", "/", -1)
  411. return key
  412. }
  413. func resolveWebAddress(r *http.Request, proxyPath string) string {
  414. url := getURL(r)
  415. var webAddress string
  416. if len(proxyPath) == 0 {
  417. webAddress = fmt.Sprintf("%s://%s/",
  418. url.ResolveReference(url).Scheme,
  419. url.ResolveReference(url).Host)
  420. } else {
  421. webAddress = fmt.Sprintf("%s://%s/%s",
  422. url.ResolveReference(url).Scheme,
  423. url.ResolveReference(url).Host,
  424. proxyPath)
  425. }
  426. return webAddress
  427. }
  428. func getURL(r *http.Request) *url.URL {
  429. u, _ := url.Parse(r.URL.String())
  430. if r.TLS != nil {
  431. u.Scheme = "https"
  432. } else if proto := r.Header.Get("X-Forwarded-Proto"); proto != "" {
  433. u.Scheme = proto
  434. } else {
  435. u.Scheme = "http"
  436. }
  437. if u.Host != "" {
  438. } else if host, port, err := net.SplitHostPort(r.Host); err != nil {
  439. u.Host = r.Host
  440. } else {
  441. if port == "80" && u.Scheme == "http" {
  442. u.Host = host
  443. } else if port == "443" && u.Scheme == "https" {
  444. u.Host = host
  445. } else {
  446. u.Host = net.JoinHostPort(host, port)
  447. }
  448. }
  449. return u
  450. }
  451. func (s *Server) Lock(token, filename string) error {
  452. key := path.Join(token, filename)
  453. if _, ok := s.locks[key]; !ok {
  454. s.locks[key] = &sync.Mutex{}
  455. }
  456. s.locks[key].Lock()
  457. return nil
  458. }
  459. func (s *Server) Unlock(token, filename string) error {
  460. key := path.Join(token, filename)
  461. s.locks[key].Unlock()
  462. return nil
  463. }
  464. func (s *Server) CheckMetadata(token, filename string) error {
  465. s.Lock(token, filename)
  466. defer s.Unlock(token, filename)
  467. var metadata Metadata
  468. r, _, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  469. if s.storage.IsNotExist(err) {
  470. return nil
  471. } else if err != nil {
  472. return err
  473. }
  474. defer r.Close()
  475. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  476. return err
  477. } else if metadata.Downloads >= metadata.MaxDownloads {
  478. return errors.New("MaxDownloads expired.")
  479. } else if time.Now().After(metadata.MaxDate) {
  480. return errors.New("MaxDate expired.")
  481. } else {
  482. // todo(nl5887): mutex?
  483. // update number of downloads
  484. metadata.Downloads++
  485. buffer := &bytes.Buffer{}
  486. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  487. return errors.New("Could not encode metadata")
  488. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  489. return errors.New("Could not save metadata")
  490. }
  491. }
  492. return nil
  493. }
  494. func (s *Server) CheckDeletionToken(deletionToken, token, filename string) error {
  495. s.Lock(token, filename)
  496. defer s.Unlock(token, filename)
  497. var metadata Metadata
  498. r, _, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  499. if s.storage.IsNotExist(err) {
  500. return nil
  501. } else if err != nil {
  502. return err
  503. }
  504. defer r.Close()
  505. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  506. return err
  507. } else if metadata.DeletionToken != deletionToken {
  508. return errors.New("Deletion token doesn't match.")
  509. }
  510. return nil
  511. }
  512. func (s *Server) deleteHandler(w http.ResponseWriter, r *http.Request) {
  513. vars := mux.Vars(r)
  514. token := vars["token"]
  515. filename := vars["filename"]
  516. deletionToken := vars["deletionToken"]
  517. if err := s.CheckDeletionToken(deletionToken, token, filename); err != nil {
  518. log.Printf("Error metadata: %s", err.Error())
  519. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  520. return
  521. }
  522. err := s.storage.Delete(token, filename)
  523. if s.storage.IsNotExist(err) {
  524. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  525. return
  526. } else if err != nil {
  527. log.Printf("%s", err.Error())
  528. http.Error(w, "Could not delete file.", 500)
  529. return
  530. }
  531. }
  532. func (s *Server) zipHandler(w http.ResponseWriter, r *http.Request) {
  533. vars := mux.Vars(r)
  534. files := vars["files"]
  535. zipfilename := fmt.Sprintf("transfersh-%d.zip", uint16(time.Now().UnixNano()))
  536. w.Header().Set("Content-Type", "application/zip")
  537. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", zipfilename))
  538. w.Header().Set("Connection", "close")
  539. zw := zip.NewWriter(w)
  540. for _, key := range strings.Split(files, ",") {
  541. key = resolveKey(key, s.proxyPath)
  542. token := strings.Split(key, "/")[0]
  543. filename := sanitize(strings.Split(key, "/")[1])
  544. if err := s.CheckMetadata(token, filename); err != nil {
  545. log.Printf("Error metadata: %s", err.Error())
  546. continue
  547. }
  548. reader, _, _, err := s.storage.Get(token, filename)
  549. if err != nil {
  550. if s.storage.IsNotExist(err) {
  551. http.Error(w, "File not found", 404)
  552. return
  553. } else {
  554. log.Printf("%s", err.Error())
  555. http.Error(w, "Could not retrieve file.", 500)
  556. return
  557. }
  558. }
  559. defer reader.Close()
  560. header := &zip.FileHeader{
  561. Name: strings.Split(key, "/")[1],
  562. Method: zip.Store,
  563. ModifiedTime: uint16(time.Now().UnixNano()),
  564. ModifiedDate: uint16(time.Now().UnixNano()),
  565. }
  566. fw, err := zw.CreateHeader(header)
  567. if err != nil {
  568. log.Printf("%s", err.Error())
  569. http.Error(w, "Internal server error.", 500)
  570. return
  571. }
  572. if _, err = io.Copy(fw, reader); err != nil {
  573. log.Printf("%s", err.Error())
  574. http.Error(w, "Internal server error.", 500)
  575. return
  576. }
  577. }
  578. if err := zw.Close(); err != nil {
  579. log.Printf("%s", err.Error())
  580. http.Error(w, "Internal server error.", 500)
  581. return
  582. }
  583. }
  584. func (s *Server) tarGzHandler(w http.ResponseWriter, r *http.Request) {
  585. vars := mux.Vars(r)
  586. files := vars["files"]
  587. tarfilename := fmt.Sprintf("transfersh-%d.tar.gz", uint16(time.Now().UnixNano()))
  588. w.Header().Set("Content-Type", "application/x-gzip")
  589. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  590. w.Header().Set("Connection", "close")
  591. os := gzip.NewWriter(w)
  592. defer os.Close()
  593. zw := tar.NewWriter(os)
  594. defer zw.Close()
  595. for _, key := range strings.Split(files, ",") {
  596. key = resolveKey(key, s.proxyPath)
  597. token := strings.Split(key, "/")[0]
  598. filename := sanitize(strings.Split(key, "/")[1])
  599. if err := s.CheckMetadata(token, filename); err != nil {
  600. log.Printf("Error metadata: %s", err.Error())
  601. continue
  602. }
  603. reader, _, contentLength, err := s.storage.Get(token, filename)
  604. if err != nil {
  605. if s.storage.IsNotExist(err) {
  606. http.Error(w, "File not found", 404)
  607. return
  608. } else {
  609. log.Printf("%s", err.Error())
  610. http.Error(w, "Could not retrieve file.", 500)
  611. return
  612. }
  613. }
  614. defer reader.Close()
  615. header := &tar.Header{
  616. Name: strings.Split(key, "/")[1],
  617. Size: int64(contentLength),
  618. }
  619. err = zw.WriteHeader(header)
  620. if err != nil {
  621. log.Printf("%s", err.Error())
  622. http.Error(w, "Internal server error.", 500)
  623. return
  624. }
  625. if _, err = io.Copy(zw, reader); err != nil {
  626. log.Printf("%s", err.Error())
  627. http.Error(w, "Internal server error.", 500)
  628. return
  629. }
  630. }
  631. }
  632. func (s *Server) tarHandler(w http.ResponseWriter, r *http.Request) {
  633. vars := mux.Vars(r)
  634. files := vars["files"]
  635. tarfilename := fmt.Sprintf("transfersh-%d.tar", uint16(time.Now().UnixNano()))
  636. w.Header().Set("Content-Type", "application/x-tar")
  637. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  638. w.Header().Set("Connection", "close")
  639. zw := tar.NewWriter(w)
  640. defer zw.Close()
  641. for _, key := range strings.Split(files, ",") {
  642. key = resolveKey(key, s.proxyPath)
  643. token := strings.Split(key, "/")[0]
  644. filename := strings.Split(key, "/")[1]
  645. if err := s.CheckMetadata(token, filename); err != nil {
  646. log.Printf("Error metadata: %s", err.Error())
  647. continue
  648. }
  649. reader, _, contentLength, err := s.storage.Get(token, filename)
  650. if err != nil {
  651. if s.storage.IsNotExist(err) {
  652. http.Error(w, "File not found", 404)
  653. return
  654. } else {
  655. log.Printf("%s", err.Error())
  656. http.Error(w, "Could not retrieve file.", 500)
  657. return
  658. }
  659. }
  660. defer reader.Close()
  661. header := &tar.Header{
  662. Name: strings.Split(key, "/")[1],
  663. Size: int64(contentLength),
  664. }
  665. err = zw.WriteHeader(header)
  666. if err != nil {
  667. log.Printf("%s", err.Error())
  668. http.Error(w, "Internal server error.", 500)
  669. return
  670. }
  671. if _, err = io.Copy(zw, reader); err != nil {
  672. log.Printf("%s", err.Error())
  673. http.Error(w, "Internal server error.", 500)
  674. return
  675. }
  676. }
  677. }
  678. func (s *Server) headHandler(w http.ResponseWriter, r *http.Request) {
  679. vars := mux.Vars(r)
  680. token := vars["token"]
  681. filename := vars["filename"]
  682. if err := s.CheckMetadata(token, filename); err != nil {
  683. log.Printf("Error metadata: %s", err.Error())
  684. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  685. return
  686. }
  687. contentType, contentLength, err := s.storage.Head(token, filename)
  688. if s.storage.IsNotExist(err) {
  689. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  690. return
  691. } else if err != nil {
  692. log.Printf("%s", err.Error())
  693. http.Error(w, "Could not retrieve file.", 500)
  694. return
  695. }
  696. w.Header().Set("Content-Type", contentType)
  697. w.Header().Set("Content-Length", strconv.FormatUint(contentLength, 10))
  698. w.Header().Set("Connection", "close")
  699. }
  700. func (s *Server) getHandler(w http.ResponseWriter, r *http.Request) {
  701. vars := mux.Vars(r)
  702. action := vars["action"]
  703. token := vars["token"]
  704. filename := vars["filename"]
  705. if err := s.CheckMetadata(token, filename); err != nil {
  706. log.Printf("Error metadata: %s", err.Error())
  707. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  708. return
  709. }
  710. reader, contentType, contentLength, err := s.storage.Get(token, filename)
  711. if s.storage.IsNotExist(err) {
  712. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  713. return
  714. } else if err != nil {
  715. log.Printf("%s", err.Error())
  716. http.Error(w, "Could not retrieve file.", 500)
  717. return
  718. }
  719. defer reader.Close()
  720. var disposition string
  721. if action == "inline" {
  722. disposition = "inline"
  723. } else {
  724. disposition = "attachment"
  725. }
  726. w.Header().Set("Content-Type", contentType)
  727. w.Header().Set("Content-Length", strconv.FormatUint(contentLength, 10))
  728. w.Header().Set("Content-Disposition", fmt.Sprintf("%s; filename=\"%s\"", disposition, filename))
  729. w.Header().Set("Connection", "keep-alive")
  730. if w.Header().Get("Range") == "" {
  731. if _, err = io.Copy(w, reader); err != nil {
  732. log.Printf("%s", err.Error())
  733. http.Error(w, "Error occurred copying to output stream", 500)
  734. return
  735. }
  736. return
  737. }
  738. file, err := ioutil.TempFile(s.tempPath, "range-")
  739. if err != nil {
  740. log.Printf("%s", err.Error())
  741. http.Error(w, "Error occurred copying to output stream", 500)
  742. return
  743. }
  744. defer cleanTmpFile(file)
  745. tee := io.TeeReader(reader, file)
  746. for {
  747. b := make([]byte, _5M)
  748. _, err = tee.Read(b)
  749. if err == io.EOF {
  750. break
  751. }
  752. if err != nil {
  753. log.Printf("%s", err.Error())
  754. http.Error(w, "Error occurred copying to output stream", 500)
  755. return
  756. }
  757. }
  758. http.ServeContent(w, r, filename, time.Now(), file)
  759. }
  760. func (s *Server) RedirectHandler(h http.Handler) http.HandlerFunc {
  761. return func(w http.ResponseWriter, r *http.Request) {
  762. if !s.forceHTTPs {
  763. // we don't want to enforce https
  764. } else if r.URL.Path == "/health.html" {
  765. // health check url won't redirect
  766. } else if strings.HasSuffix(ipAddrFromRemoteAddr(r.Host), ".onion") {
  767. // .onion addresses cannot get a valid certificate, so don't redirect
  768. } else if r.Header.Get("X-Forwarded-Proto") == "https" {
  769. } else if r.URL.Scheme == "https" {
  770. } else {
  771. u := getURL(r)
  772. u.Scheme = "https"
  773. http.Redirect(w, r, u.String(), http.StatusPermanentRedirect)
  774. return
  775. }
  776. h.ServeHTTP(w, r)
  777. }
  778. }
  779. // Create a log handler for every request it receives.
  780. func LoveHandler(h http.Handler) http.HandlerFunc {
  781. return func(w http.ResponseWriter, r *http.Request) {
  782. w.Header().Set("x-made-with", "<3 by DutchCoders")
  783. w.Header().Set("x-served-by", "Proudly served by DutchCoders")
  784. w.Header().Set("Server", "Transfer.sh HTTP Server 1.0")
  785. h.ServeHTTP(w, r)
  786. }
  787. }
  788. func IPFilterHandler(h http.Handler, ipFilterOptions *IPFilterOptions) http.HandlerFunc {
  789. return func(w http.ResponseWriter, r *http.Request) {
  790. if ipFilterOptions == nil {
  791. h.ServeHTTP(w, r)
  792. } else {
  793. WrapIPFilter(h, *ipFilterOptions).ServeHTTP(w, r)
  794. }
  795. return
  796. }
  797. }
  798. func (s *Server) BasicAuthHandler(h http.Handler) http.HandlerFunc {
  799. return func(w http.ResponseWriter, r *http.Request) {
  800. if s.AuthUser == "" || s.AuthPass == "" {
  801. h.ServeHTTP(w, r)
  802. return
  803. }
  804. w.Header().Set("WWW-Authenticate", "Basic realm=\"Restricted\"")
  805. username, password, authOK := r.BasicAuth()
  806. if authOK == false {
  807. http.Error(w, "Not authorized", 401)
  808. return
  809. }
  810. if username != s.AuthUser || password != s.AuthPass {
  811. http.Error(w, "Not authorized", 401)
  812. return
  813. }
  814. h.ServeHTTP(w, r)
  815. }
  816. }