You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

921 lines
23 KiB

  1. /*
  2. The MIT License (MIT)
  3. Copyright (c) 2014-2017 DutchCoders [https://github.com/dutchcoders/]
  4. Permission is hereby granted, free of charge, to any person obtaining a copy
  5. of this software and associated documentation files (the "Software"), to deal
  6. in the Software without restriction, including without limitation the rights
  7. to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  8. copies of the Software, and to permit persons to whom the Software is
  9. furnished to do so, subject to the following conditions:
  10. The above copyright notice and this permission notice shall be included in
  11. all copies or substantial portions of the Software.
  12. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  13. IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  14. FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  15. AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  16. LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  17. OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  18. THE SOFTWARE.
  19. */
  20. package server
  21. import (
  22. // _ "transfer.sh/app/handlers"
  23. // _ "transfer.sh/app/utils"
  24. "archive/tar"
  25. "archive/zip"
  26. "bytes"
  27. "compress/gzip"
  28. "encoding/json"
  29. "errors"
  30. "fmt"
  31. "html"
  32. html_template "html/template"
  33. "io"
  34. "io/ioutil"
  35. "log"
  36. "math/rand"
  37. "mime"
  38. "net/http"
  39. "net/url"
  40. "os"
  41. "path"
  42. "path/filepath"
  43. "strconv"
  44. "strings"
  45. "sync"
  46. text_template "text/template"
  47. "time"
  48. "net"
  49. web "github.com/dutchcoders/transfer.sh-web"
  50. "github.com/gorilla/mux"
  51. "github.com/russross/blackfriday"
  52. "encoding/base64"
  53. qrcode "github.com/skip2/go-qrcode"
  54. )
  55. var (
  56. htmlTemplates = initHTMLTemplates()
  57. textTemplates = initTextTemplates()
  58. )
  59. func stripPrefix(path string) string {
  60. return strings.Replace(path, web.Prefix+"/", "", -1)
  61. }
  62. func initTextTemplates() *text_template.Template {
  63. templateMap := text_template.FuncMap{"format": formatNumber}
  64. // Templates with functions available to them
  65. var templates = text_template.New("").Funcs(templateMap)
  66. return templates
  67. }
  68. func initHTMLTemplates() *html_template.Template {
  69. templateMap := html_template.FuncMap{"format": formatNumber}
  70. // Templates with functions available to them
  71. var templates = html_template.New("").Funcs(templateMap)
  72. return templates
  73. }
  74. func healthHandler(w http.ResponseWriter, r *http.Request) {
  75. fmt.Fprintf(w, "Approaching Neutral Zone, all systems normal and functioning.")
  76. }
  77. /* The preview handler will show a preview of the content for browsers (accept type text/html), and referer is not transfer.sh */
  78. func (s *Server) previewHandler(w http.ResponseWriter, r *http.Request) {
  79. vars := mux.Vars(r)
  80. token := vars["token"]
  81. filename := vars["filename"]
  82. contentType, contentLength, err := s.storage.Head(token, filename)
  83. if err != nil {
  84. http.Error(w, http.StatusText(404), 404)
  85. return
  86. }
  87. var templatePath string
  88. var content html_template.HTML
  89. switch {
  90. case strings.HasPrefix(contentType, "image/"):
  91. templatePath = "download.image.html"
  92. case strings.HasPrefix(contentType, "video/"):
  93. templatePath = "download.video.html"
  94. case strings.HasPrefix(contentType, "audio/"):
  95. templatePath = "download.audio.html"
  96. case strings.HasPrefix(contentType, "text/"):
  97. templatePath = "download.markdown.html"
  98. var reader io.ReadCloser
  99. if reader, _, _, err = s.storage.Get(token, filename); err != nil {
  100. http.Error(w, err.Error(), http.StatusInternalServerError)
  101. return
  102. }
  103. var data []byte
  104. if data, err = ioutil.ReadAll(reader); err != nil {
  105. http.Error(w, err.Error(), http.StatusInternalServerError)
  106. return
  107. }
  108. if strings.HasPrefix(contentType, "text/x-markdown") || strings.HasPrefix(contentType, "text/markdown") {
  109. escapedData := html.EscapeString(string(data))
  110. output := blackfriday.MarkdownCommon([]byte(escapedData))
  111. content = html_template.HTML(output)
  112. } else if strings.HasPrefix(contentType, "text/plain") {
  113. content = html_template.HTML(fmt.Sprintf("<pre>%s</pre>", html.EscapeString(string(data))))
  114. } else {
  115. templatePath = "download.sandbox.html"
  116. }
  117. default:
  118. templatePath = "download.html"
  119. }
  120. if err != nil {
  121. http.Error(w, err.Error(), http.StatusInternalServerError)
  122. return
  123. }
  124. resolvedUrl := resolveUrl(r, getURL(r).ResolveReference(r.URL), true)
  125. var png []byte
  126. png, err = qrcode.Encode(resolvedUrl, qrcode.High, 150)
  127. if err != nil {
  128. http.Error(w, err.Error(), http.StatusInternalServerError)
  129. return
  130. }
  131. qrCode := base64.StdEncoding.EncodeToString(png)
  132. data := struct {
  133. ContentType string
  134. Content html_template.HTML
  135. Filename string
  136. Url string
  137. ContentLength uint64
  138. GAKey string
  139. UserVoiceKey string
  140. QRCode string
  141. }{
  142. contentType,
  143. content,
  144. filename,
  145. resolvedUrl,
  146. contentLength,
  147. s.gaKey,
  148. s.userVoiceKey,
  149. qrCode,
  150. }
  151. if err := htmlTemplates.ExecuteTemplate(w, templatePath, data); err != nil {
  152. http.Error(w, err.Error(), http.StatusInternalServerError)
  153. return
  154. }
  155. }
  156. // this handler will output html or text, depending on the
  157. // support of the client (Accept header).
  158. func (s *Server) viewHandler(w http.ResponseWriter, r *http.Request) {
  159. // vars := mux.Vars(r)
  160. if acceptsHTML(r.Header) {
  161. if err := htmlTemplates.ExecuteTemplate(w, "index.html", nil); err != nil {
  162. http.Error(w, err.Error(), http.StatusInternalServerError)
  163. return
  164. }
  165. } else {
  166. if err := textTemplates.ExecuteTemplate(w, "index.txt", nil); err != nil {
  167. http.Error(w, err.Error(), http.StatusInternalServerError)
  168. return
  169. }
  170. }
  171. }
  172. func (s *Server) notFoundHandler(w http.ResponseWriter, r *http.Request) {
  173. http.Error(w, http.StatusText(404), 404)
  174. }
  175. func sanitize(fileName string) string {
  176. return path.Clean(path.Base(fileName))
  177. }
  178. func (s *Server) postHandler(w http.ResponseWriter, r *http.Request) {
  179. if err := r.ParseMultipartForm(_24K); nil != err {
  180. log.Printf("%s", err.Error())
  181. http.Error(w, "Error occurred copying to output stream", 500)
  182. return
  183. }
  184. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  185. w.Header().Set("Content-Type", "text/plain")
  186. for _, fheaders := range r.MultipartForm.File {
  187. for _, fheader := range fheaders {
  188. filename := sanitize(fheader.Filename)
  189. contentType := fheader.Header.Get("Content-Type")
  190. if contentType == "" {
  191. contentType = mime.TypeByExtension(filepath.Ext(fheader.Filename))
  192. }
  193. var f io.Reader
  194. var err error
  195. if f, err = fheader.Open(); err != nil {
  196. log.Printf("%s", err.Error())
  197. http.Error(w, err.Error(), 500)
  198. return
  199. }
  200. var b bytes.Buffer
  201. n, err := io.CopyN(&b, f, _24K+1)
  202. if err != nil && err != io.EOF {
  203. log.Printf("%s", err.Error())
  204. http.Error(w, err.Error(), 500)
  205. return
  206. }
  207. var reader io.Reader
  208. if n > _24K {
  209. file, err := ioutil.TempFile(s.tempPath, "transfer-")
  210. if err != nil {
  211. log.Fatal(err)
  212. }
  213. defer file.Close()
  214. n, err = io.Copy(file, io.MultiReader(&b, f))
  215. if err != nil {
  216. os.Remove(file.Name())
  217. log.Printf("%s", err.Error())
  218. http.Error(w, err.Error(), 500)
  219. return
  220. }
  221. reader, err = os.Open(file.Name())
  222. } else {
  223. reader = bytes.NewReader(b.Bytes())
  224. }
  225. contentLength := n
  226. metadata := MetadataForRequest(contentType, r)
  227. buffer := &bytes.Buffer{}
  228. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  229. log.Printf("%s", err.Error())
  230. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  231. return
  232. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  233. log.Printf("%s", err.Error())
  234. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  235. return
  236. }
  237. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  238. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  239. log.Printf("Backend storage error: %s", err.Error())
  240. http.Error(w, err.Error(), 500)
  241. return
  242. }
  243. relativeURL, _ := url.Parse(path.Join(token, filename))
  244. fmt.Fprintln(w, getURL(r).ResolveReference(relativeURL).String())
  245. }
  246. }
  247. }
  248. type Metadata struct {
  249. // ContentType is the original uploading content type
  250. ContentType string
  251. // Secret as knowledge to delete file
  252. // Secret string
  253. // Downloads is the actual number of downloads
  254. Downloads int
  255. // MaxDownloads contains the maximum numbers of downloads
  256. MaxDownloads int
  257. // MaxDate contains the max age of the file
  258. MaxDate time.Time
  259. // DeletionToken contains the token to match against for deletion
  260. DeletionToken string
  261. }
  262. func MetadataForRequest(contentType string, r *http.Request) Metadata {
  263. metadata := Metadata{
  264. ContentType: contentType,
  265. MaxDate: time.Now().Add(time.Hour * 24 * 365 * 10),
  266. Downloads: 0,
  267. MaxDownloads: 99999999,
  268. DeletionToken: Encode(10000000+int64(rand.Intn(1000000000))) + Encode(10000000+int64(rand.Intn(1000000000))),
  269. }
  270. if v := r.Header.Get("Max-Downloads"); v == "" {
  271. } else if v, err := strconv.Atoi(v); err != nil {
  272. } else {
  273. metadata.MaxDownloads = v
  274. }
  275. if v := r.Header.Get("Max-Days"); v == "" {
  276. } else if v, err := strconv.Atoi(v); err != nil {
  277. } else {
  278. metadata.MaxDate = time.Now().Add(time.Hour * 24 * time.Duration(v))
  279. }
  280. return metadata
  281. }
  282. func (s *Server) putHandler(w http.ResponseWriter, r *http.Request) {
  283. vars := mux.Vars(r)
  284. filename := sanitize(vars["filename"])
  285. contentLength := r.ContentLength
  286. var reader io.Reader
  287. reader = r.Body
  288. if contentLength == -1 {
  289. // queue file to disk, because s3 needs content length
  290. var err error
  291. var f io.Reader
  292. f = reader
  293. var b bytes.Buffer
  294. n, err := io.CopyN(&b, f, _24K+1)
  295. if err != nil && err != io.EOF {
  296. log.Printf("Error putting new file: %s", err.Error())
  297. http.Error(w, err.Error(), 500)
  298. return
  299. }
  300. if n > _24K {
  301. file, err := ioutil.TempFile(s.tempPath, "transfer-")
  302. if err != nil {
  303. log.Printf("%s", err.Error())
  304. http.Error(w, err.Error(), 500)
  305. return
  306. }
  307. defer file.Close()
  308. n, err = io.Copy(file, io.MultiReader(&b, f))
  309. if err != nil {
  310. os.Remove(file.Name())
  311. log.Printf("%s", err.Error())
  312. http.Error(w, err.Error(), 500)
  313. return
  314. }
  315. reader, err = os.Open(file.Name())
  316. } else {
  317. reader = bytes.NewReader(b.Bytes())
  318. }
  319. contentLength = n
  320. }
  321. if contentLength == 0 {
  322. log.Print("Empty content-length")
  323. http.Error(w, errors.New("Could not uplpoad empty file").Error(), 400)
  324. return
  325. }
  326. contentType := r.Header.Get("Content-Type")
  327. if contentType == "" {
  328. contentType = mime.TypeByExtension(filepath.Ext(vars["filename"]))
  329. }
  330. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  331. metadata := MetadataForRequest(contentType, r)
  332. buffer := &bytes.Buffer{}
  333. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  334. log.Printf("%s", err.Error())
  335. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  336. return
  337. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  338. log.Printf("%s", err.Error())
  339. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  340. return
  341. }
  342. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  343. var err error
  344. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  345. log.Printf("Error putting new file: %s", err.Error())
  346. http.Error(w, errors.New("Could not save file").Error(), 500)
  347. return
  348. }
  349. // w.Statuscode = 200
  350. w.Header().Set("Content-Type", "text/plain")
  351. relativeURL, _ := url.Parse(path.Join(token, filename))
  352. deleteUrl, _ := url.Parse(path.Join(token, filename, metadata.DeletionToken))
  353. w.Header().Set("X-Url-Delete", resolveUrl(r, deleteUrl, true))
  354. fmt.Fprint(w, resolveUrl(r, relativeURL, false))
  355. }
  356. func resolveUrl(r *http.Request, u *url.URL, absolutePath bool) string {
  357. if u.RawQuery != "" {
  358. u.Path = fmt.Sprintf("%s?%s", u.Path, url.QueryEscape(u.RawQuery))
  359. u.RawQuery = ""
  360. }
  361. if u.Fragment != "" {
  362. u.Path = fmt.Sprintf("%s#%s", u.Path, u.Fragment)
  363. u.Fragment = ""
  364. }
  365. if absolutePath {
  366. r.URL.Path = ""
  367. }
  368. return getURL(r).ResolveReference(u).String()
  369. }
  370. func getURL(r *http.Request) *url.URL {
  371. u := *r.URL
  372. if r.TLS != nil {
  373. u.Scheme = "https"
  374. } else if proto := r.Header.Get("X-Forwarded-Proto"); proto != "" {
  375. u.Scheme = proto
  376. } else {
  377. u.Scheme = "http"
  378. }
  379. if u.Host != "" {
  380. } else if host, port, err := net.SplitHostPort(r.Host); err != nil {
  381. u.Host = r.Host
  382. } else {
  383. if port == "80" && u.Scheme == "http" {
  384. u.Host = host
  385. } else if port == "443" && u.Scheme == "https" {
  386. u.Host = host
  387. } else {
  388. u.Host = net.JoinHostPort(host, port)
  389. }
  390. }
  391. return &u
  392. }
  393. func (s *Server) Lock(token, filename string) error {
  394. key := path.Join(token, filename)
  395. if _, ok := s.locks[key]; !ok {
  396. s.locks[key] = &sync.Mutex{}
  397. }
  398. s.locks[key].Lock()
  399. return nil
  400. }
  401. func (s *Server) Unlock(token, filename string) error {
  402. key := path.Join(token, filename)
  403. s.locks[key].Unlock()
  404. return nil
  405. }
  406. func (s *Server) CheckMetadata(token, filename string) error {
  407. s.Lock(token, filename)
  408. defer s.Unlock(token, filename)
  409. var metadata Metadata
  410. r, _, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  411. if s.storage.IsNotExist(err) {
  412. return nil
  413. } else if err != nil {
  414. return err
  415. }
  416. defer r.Close()
  417. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  418. return err
  419. } else if metadata.Downloads >= metadata.MaxDownloads {
  420. return errors.New("MaxDownloads expired.")
  421. } else if time.Now().After(metadata.MaxDate) {
  422. return errors.New("MaxDate expired.")
  423. } else {
  424. // todo(nl5887): mutex?
  425. // update number of downloads
  426. metadata.Downloads++
  427. buffer := &bytes.Buffer{}
  428. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  429. return errors.New("Could not encode metadata")
  430. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  431. return errors.New("Could not save metadata")
  432. }
  433. }
  434. return nil
  435. }
  436. func (s *Server) CheckDeletionToken(deletionToken, token, filename string) error {
  437. s.Lock(token, filename)
  438. defer s.Unlock(token, filename)
  439. var metadata Metadata
  440. r, _, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  441. if s.storage.IsNotExist(err) {
  442. return nil
  443. } else if err != nil {
  444. return err
  445. }
  446. defer r.Close()
  447. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  448. return err
  449. } else if metadata.DeletionToken != deletionToken {
  450. return errors.New("Deletion token doesn't match.")
  451. }
  452. return nil
  453. }
  454. func (s *Server) deleteHandler(w http.ResponseWriter, r *http.Request) {
  455. vars := mux.Vars(r)
  456. token := vars["token"]
  457. filename := vars["filename"]
  458. deletionToken := vars["deletionToken"]
  459. if err := s.CheckDeletionToken(deletionToken, token, filename); err != nil {
  460. log.Printf("Error metadata: %s", err.Error())
  461. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  462. return
  463. }
  464. err := s.storage.Delete(token, filename)
  465. if s.storage.IsNotExist(err) {
  466. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  467. return
  468. } else if err != nil {
  469. log.Printf("%s", err.Error())
  470. http.Error(w, "Could not delete file.", 500)
  471. return
  472. }
  473. }
  474. func (s *Server) zipHandler(w http.ResponseWriter, r *http.Request) {
  475. vars := mux.Vars(r)
  476. files := vars["files"]
  477. zipfilename := fmt.Sprintf("transfersh-%d.zip", uint16(time.Now().UnixNano()))
  478. w.Header().Set("Content-Type", "application/zip")
  479. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", zipfilename))
  480. w.Header().Set("Connection", "close")
  481. zw := zip.NewWriter(w)
  482. for _, key := range strings.Split(files, ",") {
  483. if strings.HasPrefix(key, "/") {
  484. key = key[1:]
  485. }
  486. key = strings.Replace(key, "\\", "/", -1)
  487. token := strings.Split(key, "/")[0]
  488. filename := sanitize(strings.Split(key, "/")[1])
  489. if err := s.CheckMetadata(token, filename); err != nil {
  490. log.Printf("Error metadata: %s", err.Error())
  491. continue
  492. }
  493. reader, _, _, err := s.storage.Get(token, filename)
  494. if err != nil {
  495. if s.storage.IsNotExist(err) {
  496. http.Error(w, "File not found", 404)
  497. return
  498. } else {
  499. log.Printf("%s", err.Error())
  500. http.Error(w, "Could not retrieve file.", 500)
  501. return
  502. }
  503. }
  504. defer reader.Close()
  505. header := &zip.FileHeader{
  506. Name: strings.Split(key, "/")[1],
  507. Method: zip.Store,
  508. ModifiedTime: uint16(time.Now().UnixNano()),
  509. ModifiedDate: uint16(time.Now().UnixNano()),
  510. }
  511. fw, err := zw.CreateHeader(header)
  512. if err != nil {
  513. log.Printf("%s", err.Error())
  514. http.Error(w, "Internal server error.", 500)
  515. return
  516. }
  517. if _, err = io.Copy(fw, reader); err != nil {
  518. log.Printf("%s", err.Error())
  519. http.Error(w, "Internal server error.", 500)
  520. return
  521. }
  522. }
  523. if err := zw.Close(); err != nil {
  524. log.Printf("%s", err.Error())
  525. http.Error(w, "Internal server error.", 500)
  526. return
  527. }
  528. }
  529. func (s *Server) tarGzHandler(w http.ResponseWriter, r *http.Request) {
  530. vars := mux.Vars(r)
  531. files := vars["files"]
  532. tarfilename := fmt.Sprintf("transfersh-%d.tar.gz", uint16(time.Now().UnixNano()))
  533. w.Header().Set("Content-Type", "application/x-gzip")
  534. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  535. w.Header().Set("Connection", "close")
  536. os := gzip.NewWriter(w)
  537. defer os.Close()
  538. zw := tar.NewWriter(os)
  539. defer zw.Close()
  540. for _, key := range strings.Split(files, ",") {
  541. if strings.HasPrefix(key, "/") {
  542. key = key[1:]
  543. }
  544. key = strings.Replace(key, "\\", "/", -1)
  545. token := strings.Split(key, "/")[0]
  546. filename := sanitize(strings.Split(key, "/")[1])
  547. if err := s.CheckMetadata(token, filename); err != nil {
  548. log.Printf("Error metadata: %s", err.Error())
  549. continue
  550. }
  551. reader, _, contentLength, err := s.storage.Get(token, filename)
  552. if err != nil {
  553. if s.storage.IsNotExist(err) {
  554. http.Error(w, "File not found", 404)
  555. return
  556. } else {
  557. log.Printf("%s", err.Error())
  558. http.Error(w, "Could not retrieve file.", 500)
  559. return
  560. }
  561. }
  562. defer reader.Close()
  563. header := &tar.Header{
  564. Name: strings.Split(key, "/")[1],
  565. Size: int64(contentLength),
  566. }
  567. err = zw.WriteHeader(header)
  568. if err != nil {
  569. log.Printf("%s", err.Error())
  570. http.Error(w, "Internal server error.", 500)
  571. return
  572. }
  573. if _, err = io.Copy(zw, reader); err != nil {
  574. log.Printf("%s", err.Error())
  575. http.Error(w, "Internal server error.", 500)
  576. return
  577. }
  578. }
  579. }
  580. func (s *Server) tarHandler(w http.ResponseWriter, r *http.Request) {
  581. vars := mux.Vars(r)
  582. files := vars["files"]
  583. tarfilename := fmt.Sprintf("transfersh-%d.tar", uint16(time.Now().UnixNano()))
  584. w.Header().Set("Content-Type", "application/x-tar")
  585. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  586. w.Header().Set("Connection", "close")
  587. zw := tar.NewWriter(w)
  588. defer zw.Close()
  589. for _, key := range strings.Split(files, ",") {
  590. token := strings.Split(key, "/")[0]
  591. filename := strings.Split(key, "/")[1]
  592. if err := s.CheckMetadata(token, filename); err != nil {
  593. log.Printf("Error metadata: %s", err.Error())
  594. continue
  595. }
  596. reader, _, contentLength, err := s.storage.Get(token, filename)
  597. if err != nil {
  598. if s.storage.IsNotExist(err) {
  599. http.Error(w, "File not found", 404)
  600. return
  601. } else {
  602. log.Printf("%s", err.Error())
  603. http.Error(w, "Could not retrieve file.", 500)
  604. return
  605. }
  606. }
  607. defer reader.Close()
  608. header := &tar.Header{
  609. Name: strings.Split(key, "/")[1],
  610. Size: int64(contentLength),
  611. }
  612. err = zw.WriteHeader(header)
  613. if err != nil {
  614. log.Printf("%s", err.Error())
  615. http.Error(w, "Internal server error.", 500)
  616. return
  617. }
  618. if _, err = io.Copy(zw, reader); err != nil {
  619. log.Printf("%s", err.Error())
  620. http.Error(w, "Internal server error.", 500)
  621. return
  622. }
  623. }
  624. }
  625. func (s *Server) headHandler(w http.ResponseWriter, r *http.Request) {
  626. vars := mux.Vars(r)
  627. token := vars["token"]
  628. filename := vars["filename"]
  629. if err := s.CheckMetadata(token, filename); err != nil {
  630. log.Printf("Error metadata: %s", err.Error())
  631. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  632. return
  633. }
  634. contentType, contentLength, err := s.storage.Head(token, filename)
  635. if s.storage.IsNotExist(err) {
  636. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  637. return
  638. } else if err != nil {
  639. log.Printf("%s", err.Error())
  640. http.Error(w, "Could not retrieve file.", 500)
  641. return
  642. }
  643. w.Header().Set("Content-Type", contentType)
  644. w.Header().Set("Content-Length", strconv.FormatUint(contentLength, 10))
  645. w.Header().Set("Connection", "close")
  646. }
  647. func (s *Server) getHandler(w http.ResponseWriter, r *http.Request) {
  648. vars := mux.Vars(r)
  649. action := vars["action"]
  650. token := vars["token"]
  651. filename := vars["filename"]
  652. if err := s.CheckMetadata(token, filename); err != nil {
  653. log.Printf("Error metadata: %s", err.Error())
  654. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  655. return
  656. }
  657. reader, contentType, contentLength, err := s.storage.Get(token, filename)
  658. if s.storage.IsNotExist(err) {
  659. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  660. return
  661. } else if err != nil {
  662. log.Printf("%s", err.Error())
  663. http.Error(w, "Could not retrieve file.", 500)
  664. return
  665. }
  666. defer reader.Close()
  667. var disposition string
  668. if action == "inline" {
  669. disposition = "inline"
  670. } else {
  671. disposition = "attachment"
  672. }
  673. w.Header().Set("Content-Type", contentType)
  674. w.Header().Set("Content-Length", strconv.FormatUint(contentLength, 10))
  675. w.Header().Set("Content-Disposition", fmt.Sprintf("%s; filename=\"%s\"", disposition, filename))
  676. w.Header().Set("Connection", "keep-alive")
  677. if _, err = io.Copy(w, reader); err != nil {
  678. log.Printf("%s", err.Error())
  679. http.Error(w, "Error occurred copying to output stream", 500)
  680. return
  681. }
  682. }
  683. func (s *Server) RedirectHandler(h http.Handler) http.HandlerFunc {
  684. return func(w http.ResponseWriter, r *http.Request) {
  685. if !s.forceHTTPs {
  686. // we don't want to enforce https
  687. } else if r.URL.Path == "/health.html" {
  688. // health check url won't redirect
  689. } else if strings.HasSuffix(ipAddrFromRemoteAddr(r.Host), ".onion") {
  690. // .onion addresses cannot get a valid certificate, so don't redirect
  691. } else if r.Header.Get("X-Forwarded-Proto") == "https" {
  692. } else if r.URL.Scheme == "https" {
  693. } else {
  694. u := getURL(r)
  695. u.Scheme = "https"
  696. http.Redirect(w, r, u.String(), http.StatusPermanentRedirect)
  697. return
  698. }
  699. h.ServeHTTP(w, r)
  700. }
  701. }
  702. // Create a log handler for every request it receives.
  703. func LoveHandler(h http.Handler) http.HandlerFunc {
  704. return func(w http.ResponseWriter, r *http.Request) {
  705. w.Header().Set("x-made-with", "<3 by DutchCoders")
  706. w.Header().Set("x-served-by", "Proudly served by DutchCoders")
  707. w.Header().Set("Server", "Transfer.sh HTTP Server 1.0")
  708. h.ServeHTTP(w, r)
  709. }
  710. }
  711. func (s *Server) BasicAuthHandler(h http.Handler) http.HandlerFunc {
  712. return func(w http.ResponseWriter, r *http.Request) {
  713. if s.AuthUser == "" || s.AuthPass == "" {
  714. h.ServeHTTP(w, r)
  715. return
  716. }
  717. w.Header().Set("WWW-Authenticate", "Basic realm=\"Restricted\"")
  718. username, password, authOK := r.BasicAuth()
  719. if authOK == false {
  720. http.Error(w, "Not authorized", 401)
  721. return
  722. }
  723. if username != s.AuthUser || password != s.AuthPass {
  724. http.Error(w, "Not authorized", 401)
  725. return
  726. }
  727. h.ServeHTTP(w, r)
  728. }
  729. }