You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

1160 lines
29 KiB

  1. /*
  2. The MIT License (MIT)
  3. Copyright (c) 2014-2017 DutchCoders [https://github.com/dutchcoders/]
  4. Permission is hereby granted, free of charge, to any person obtaining a copy
  5. of this software and associated documentation files (the "Software"), to deal
  6. in the Software without restriction, including without limitation the rights
  7. to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  8. copies of the Software, and to permit persons to whom the Software is
  9. furnished to do so, subject to the following conditions:
  10. The above copyright notice and this permission notice shall be included in
  11. all copies or substantial portions of the Software.
  12. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  13. IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  14. FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  15. AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  16. LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  17. OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  18. THE SOFTWARE.
  19. */
  20. package server
  21. import (
  22. // _ "transfer.sh/app/handlers"
  23. // _ "transfer.sh/app/utils"
  24. "archive/tar"
  25. "archive/zip"
  26. "bytes"
  27. "compress/gzip"
  28. "encoding/json"
  29. "errors"
  30. "fmt"
  31. blackfriday "github.com/russross/blackfriday/v2"
  32. "html"
  33. html_template "html/template"
  34. "io"
  35. "io/ioutil"
  36. "log"
  37. "math/rand"
  38. "mime"
  39. "net/http"
  40. "net/url"
  41. "os"
  42. "path"
  43. "path/filepath"
  44. "strconv"
  45. "strings"
  46. "sync"
  47. text_template "text/template"
  48. "time"
  49. "net"
  50. "encoding/base64"
  51. web "github.com/dutchcoders/transfer.sh-web"
  52. "github.com/gorilla/mux"
  53. "github.com/microcosm-cc/bluemonday"
  54. "github.com/skip2/go-qrcode"
  55. "github.com/klauspost/compress/zstd"
  56. )
  57. const getPathPart = "get"
  58. var (
  59. htmlTemplates = initHTMLTemplates()
  60. textTemplates = initTextTemplates()
  61. )
  62. func stripPrefix(path string) string {
  63. return strings.Replace(path, web.Prefix+"/", "", -1)
  64. }
  65. func initTextTemplates() *text_template.Template {
  66. templateMap := text_template.FuncMap{"format": formatNumber}
  67. // Templates with functions available to them
  68. var templates = text_template.New("").Funcs(templateMap)
  69. return templates
  70. }
  71. func initHTMLTemplates() *html_template.Template {
  72. templateMap := html_template.FuncMap{"format": formatNumber}
  73. // Templates with functions available to them
  74. var templates = html_template.New("").Funcs(templateMap)
  75. return templates
  76. }
  77. func healthHandler(w http.ResponseWriter, r *http.Request) {
  78. fmt.Fprintf(w, "Approaching Neutral Zone, all systems normal and functioning.")
  79. }
  80. /* The preview handler will show a preview of the content for browsers (accept type text/html), and referer is not transfer.sh */
  81. func (s *Server) previewHandler(w http.ResponseWriter, r *http.Request) {
  82. vars := mux.Vars(r)
  83. token := vars["token"]
  84. filename := vars["filename"]
  85. metadata, err := s.CheckMetadata(token, filename, false)
  86. if err != nil {
  87. log.Printf("Error metadata: %s", err.Error())
  88. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  89. return
  90. }
  91. contentType := metadata.ContentType
  92. contentLength, err := s.storage.Head(token, filename)
  93. if err != nil {
  94. http.Error(w, http.StatusText(404), 404)
  95. return
  96. }
  97. var templatePath string
  98. var content html_template.HTML
  99. switch {
  100. case strings.HasPrefix(contentType, "image/"):
  101. templatePath = "download.image.html"
  102. case strings.HasPrefix(contentType, "video/"):
  103. templatePath = "download.video.html"
  104. case strings.HasPrefix(contentType, "audio/"):
  105. templatePath = "download.audio.html"
  106. case strings.HasPrefix(contentType, "text/"):
  107. templatePath = "download.markdown.html"
  108. var reader io.ReadCloser
  109. if reader, _, err = s.storage.Get(token, filename); err != nil {
  110. http.Error(w, err.Error(), http.StatusInternalServerError)
  111. return
  112. }
  113. var data []byte
  114. data = make([]byte, _5M)
  115. if _, err = reader.Read(data); err != io.EOF && err != nil {
  116. http.Error(w, err.Error(), http.StatusInternalServerError)
  117. return
  118. }
  119. if strings.HasPrefix(contentType, "text/x-markdown") || strings.HasPrefix(contentType, "text/markdown") {
  120. unsafe := blackfriday.Run(data)
  121. output := bluemonday.UGCPolicy().SanitizeBytes(unsafe)
  122. content = html_template.HTML(output)
  123. } else if strings.HasPrefix(contentType, "text/plain") {
  124. content = html_template.HTML(fmt.Sprintf("<pre>%s</pre>", html.EscapeString(string(data))))
  125. } else {
  126. templatePath = "download.sandbox.html"
  127. }
  128. default:
  129. templatePath = "download.html"
  130. }
  131. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  132. resolvedURL := resolveURL(r, relativeURL, s.proxyPort)
  133. relativeURLGet, _ := url.Parse(path.Join(s.proxyPath, getPathPart, token, filename))
  134. resolvedURLGet := resolveURL(r, relativeURLGet, s.proxyPort)
  135. var png []byte
  136. png, err = qrcode.Encode(resolvedURL, qrcode.High, 150)
  137. if err != nil {
  138. http.Error(w, err.Error(), http.StatusInternalServerError)
  139. return
  140. }
  141. qrCode := base64.StdEncoding.EncodeToString(png)
  142. hostname := getURL(r, s.proxyPort).Host
  143. webAddress := resolveWebAddress(r, s.proxyPath, s.proxyPort)
  144. data := struct {
  145. ContentType string
  146. Content html_template.HTML
  147. Filename string
  148. Url string
  149. UrlGet string
  150. Hostname string
  151. WebAddress string
  152. ContentLength uint64
  153. GAKey string
  154. UserVoiceKey string
  155. QRCode string
  156. }{
  157. contentType,
  158. content,
  159. filename,
  160. resolvedURL,
  161. resolvedURLGet,
  162. hostname,
  163. webAddress,
  164. contentLength,
  165. s.gaKey,
  166. s.userVoiceKey,
  167. qrCode,
  168. }
  169. if err := htmlTemplates.ExecuteTemplate(w, templatePath, data); err != nil {
  170. http.Error(w, err.Error(), http.StatusInternalServerError)
  171. return
  172. }
  173. }
  174. // this handler will output html or text, depending on the
  175. // support of the client (Accept header).
  176. func (s *Server) viewHandler(w http.ResponseWriter, r *http.Request) {
  177. // vars := mux.Vars(r)
  178. hostname := getURL(r, s.proxyPort).Host
  179. webAddress := resolveWebAddress(r, s.proxyPath, s.proxyPort)
  180. data := struct {
  181. Hostname string
  182. WebAddress string
  183. GAKey string
  184. UserVoiceKey string
  185. }{
  186. hostname,
  187. webAddress,
  188. s.gaKey,
  189. s.userVoiceKey,
  190. }
  191. if acceptsHTML(r.Header) {
  192. if err := htmlTemplates.ExecuteTemplate(w, "index.html", data); err != nil {
  193. http.Error(w, err.Error(), http.StatusInternalServerError)
  194. return
  195. }
  196. } else {
  197. if err := textTemplates.ExecuteTemplate(w, "index.txt", data); err != nil {
  198. http.Error(w, err.Error(), http.StatusInternalServerError)
  199. return
  200. }
  201. }
  202. }
  203. func (s *Server) notFoundHandler(w http.ResponseWriter, r *http.Request) {
  204. http.Error(w, http.StatusText(404), 404)
  205. }
  206. func sanitize(fileName string) string {
  207. return path.Clean(path.Base(fileName))
  208. }
  209. func (s *Server) postHandler(w http.ResponseWriter, r *http.Request) {
  210. if err := r.ParseMultipartForm(_24K); nil != err {
  211. log.Printf("%s", err.Error())
  212. http.Error(w, "Error occurred copying to output stream", 500)
  213. return
  214. }
  215. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  216. w.Header().Set("Content-Type", "text/plain")
  217. for _, fheaders := range r.MultipartForm.File {
  218. for _, fheader := range fheaders {
  219. filename := sanitize(fheader.Filename)
  220. contentType := fheader.Header.Get("Content-Type")
  221. if contentType == "" {
  222. contentType = mime.TypeByExtension(filepath.Ext(fheader.Filename))
  223. }
  224. var f io.Reader
  225. var err error
  226. if f, err = fheader.Open(); err != nil {
  227. log.Printf("%s", err.Error())
  228. http.Error(w, err.Error(), 500)
  229. return
  230. }
  231. var b bytes.Buffer
  232. n, err := io.CopyN(&b, f, _24K+1)
  233. if err != nil && err != io.EOF {
  234. log.Printf("%s", err.Error())
  235. http.Error(w, err.Error(), 500)
  236. return
  237. }
  238. var file *os.File
  239. var reader io.Reader
  240. if n > _24K {
  241. file, err = ioutil.TempFile(s.tempPath, "transfer-")
  242. if err != nil {
  243. log.Fatal(err)
  244. }
  245. n, err = io.Copy(file, io.MultiReader(&b, f))
  246. if err != nil {
  247. cleanTmpFile(file)
  248. log.Printf("%s", err.Error())
  249. http.Error(w, err.Error(), 500)
  250. return
  251. }
  252. reader, err = os.Open(file.Name())
  253. } else {
  254. reader = bytes.NewReader(b.Bytes())
  255. }
  256. contentLength := n
  257. if s.maxUploadSize > 0 && contentLength > s.maxUploadSize {
  258. log.Print("Entity too large")
  259. http.Error(w, http.StatusText(http.StatusRequestEntityTooLarge), http.StatusRequestEntityTooLarge)
  260. return
  261. }
  262. metadata := MetadataForRequest(contentType, r)
  263. buffer := &bytes.Buffer{}
  264. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  265. log.Printf("%s", err.Error())
  266. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  267. cleanTmpFile(file)
  268. return
  269. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  270. log.Printf("%s", err.Error())
  271. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  272. cleanTmpFile(file)
  273. return
  274. }
  275. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  276. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  277. log.Printf("Backend storage error: %s", err.Error())
  278. http.Error(w, err.Error(), 500)
  279. return
  280. }
  281. filename = url.PathEscape(filename)
  282. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  283. fmt.Fprintln(w, getURL(r, s.proxyPort).ResolveReference(relativeURL).String())
  284. cleanTmpFile(file)
  285. }
  286. }
  287. }
  288. func cleanTmpFile(f *os.File) {
  289. if f != nil {
  290. err := f.Close()
  291. if err != nil {
  292. log.Printf("Error closing tmpfile: %s (%s)", err, f.Name())
  293. }
  294. err = os.Remove(f.Name())
  295. if err != nil {
  296. log.Printf("Error removing tmpfile: %s (%s)", err, f.Name())
  297. }
  298. }
  299. }
  300. type Metadata struct {
  301. // ContentType is the original uploading content type
  302. ContentType string
  303. // Secret as knowledge to delete file
  304. // Secret string
  305. // Downloads is the actual number of downloads
  306. Downloads int
  307. // MaxDownloads contains the maximum numbers of downloads
  308. MaxDownloads int
  309. // MaxDate contains the max age of the file
  310. MaxDate time.Time
  311. // DeletionToken contains the token to match against for deletion
  312. DeletionToken string
  313. }
  314. func MetadataForRequest(contentType string, r *http.Request) Metadata {
  315. metadata := Metadata{
  316. ContentType: contentType,
  317. MaxDate: time.Time{},
  318. Downloads: 0,
  319. MaxDownloads: -1,
  320. DeletionToken: Encode(10000000+int64(rand.Intn(1000000000))) + Encode(10000000+int64(rand.Intn(1000000000))),
  321. }
  322. if v := r.Header.Get("Max-Downloads"); v == "" {
  323. } else if v, err := strconv.Atoi(v); err != nil {
  324. } else {
  325. metadata.MaxDownloads = v
  326. }
  327. if v := r.Header.Get("Max-Days"); v == "" {
  328. } else if v, err := strconv.Atoi(v); err != nil {
  329. } else {
  330. metadata.MaxDate = time.Now().Add(time.Hour * 24 * time.Duration(v))
  331. }
  332. return metadata
  333. }
  334. func (s *Server) putHandler(w http.ResponseWriter, r *http.Request) {
  335. vars := mux.Vars(r)
  336. filename := sanitize(vars["filename"])
  337. contentLength := r.ContentLength
  338. var reader io.Reader
  339. reader = r.Body
  340. defer r.Body.Close()
  341. if contentLength == -1 {
  342. // queue file to disk, because s3 needs content length
  343. var err error
  344. var f io.Reader
  345. f = reader
  346. var b bytes.Buffer
  347. n, err := io.CopyN(&b, f, _24K+1)
  348. if err != nil && err != io.EOF {
  349. log.Printf("Error putting new file: %s", err.Error())
  350. http.Error(w, err.Error(), 500)
  351. return
  352. }
  353. var file *os.File
  354. if n > _24K {
  355. file, err = ioutil.TempFile(s.tempPath, "transfer-")
  356. if err != nil {
  357. log.Printf("%s", err.Error())
  358. http.Error(w, err.Error(), 500)
  359. return
  360. }
  361. defer cleanTmpFile(file)
  362. n, err = io.Copy(file, io.MultiReader(&b, f))
  363. if err != nil {
  364. log.Printf("%s", err.Error())
  365. http.Error(w, err.Error(), 500)
  366. return
  367. }
  368. reader, err = os.Open(file.Name())
  369. } else {
  370. reader = bytes.NewReader(b.Bytes())
  371. }
  372. contentLength = n
  373. }
  374. if s.maxUploadSize > 0 && contentLength > s.maxUploadSize {
  375. log.Print("Entity too large")
  376. http.Error(w, http.StatusText(http.StatusRequestEntityTooLarge), http.StatusRequestEntityTooLarge)
  377. return
  378. }
  379. if contentLength == 0 {
  380. log.Print("Empty content-length")
  381. http.Error(w, errors.New("Could not upload empty file").Error(), 400)
  382. return
  383. }
  384. contentType := r.Header.Get("Content-Type")
  385. if contentType == "" {
  386. contentType = mime.TypeByExtension(filepath.Ext(vars["filename"]))
  387. }
  388. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  389. metadata := MetadataForRequest(contentType, r)
  390. buffer := &bytes.Buffer{}
  391. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  392. log.Printf("%s", err.Error())
  393. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  394. return
  395. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  396. log.Printf("%s", err.Error())
  397. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  398. return
  399. }
  400. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  401. var err error
  402. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  403. log.Printf("Error putting new file: %s", err.Error())
  404. http.Error(w, errors.New("Could not save file").Error(), 500)
  405. return
  406. }
  407. // w.Statuscode = 200
  408. w.Header().Set("Content-Type", "text/plain")
  409. filename = url.PathEscape(filename)
  410. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  411. deleteURL, _ := url.Parse(path.Join(s.proxyPath, token, filename, metadata.DeletionToken))
  412. w.Header().Set("X-Url-Delete", resolveURL(r, deleteURL, s.proxyPort))
  413. fmt.Fprint(w, resolveURL(r, relativeURL, s.proxyPort))
  414. }
  415. func resolveURL(r *http.Request, u *url.URL, proxyPort string) string {
  416. r.URL.Path = ""
  417. return getURL(r, proxyPort).ResolveReference(u).String()
  418. }
  419. func resolveKey(key, proxyPath string) string {
  420. if strings.HasPrefix(key, "/") {
  421. key = key[1:]
  422. }
  423. if strings.HasPrefix(key, proxyPath) {
  424. key = key[len(proxyPath):]
  425. }
  426. key = strings.Replace(key, "\\", "/", -1)
  427. return key
  428. }
  429. func resolveWebAddress(r *http.Request, proxyPath string, proxyPort string) string {
  430. url := getURL(r, proxyPort)
  431. var webAddress string
  432. if len(proxyPath) == 0 {
  433. webAddress = fmt.Sprintf("%s://%s/",
  434. url.ResolveReference(url).Scheme,
  435. url.ResolveReference(url).Host)
  436. } else {
  437. webAddress = fmt.Sprintf("%s://%s/%s",
  438. url.ResolveReference(url).Scheme,
  439. url.ResolveReference(url).Host,
  440. proxyPath)
  441. }
  442. return webAddress
  443. }
  444. // Similar to the logic found here:
  445. // https://github.com/golang/go/blob/release-branch.go1.14/src/net/http/clone.go#L22-L33
  446. func cloneURL(u *url.URL) *url.URL {
  447. c := &url.URL{}
  448. *c = *u
  449. if u.User != nil {
  450. c.User = &url.Userinfo{}
  451. *c.User = *u.User
  452. }
  453. return c
  454. }
  455. func getURL(r *http.Request, proxyPort string) *url.URL {
  456. u := cloneURL(r.URL)
  457. if r.TLS != nil {
  458. u.Scheme = "https"
  459. } else if proto := r.Header.Get("X-Forwarded-Proto"); proto != "" {
  460. u.Scheme = proto
  461. } else {
  462. u.Scheme = "http"
  463. }
  464. if u.Host == "" {
  465. host, port, err := net.SplitHostPort(r.Host)
  466. if err != nil {
  467. host = r.Host
  468. port = ""
  469. }
  470. if len(proxyPort) != 0 {
  471. port = proxyPort
  472. }
  473. if len(port) == 0 {
  474. u.Host = host
  475. } else {
  476. if port == "80" && u.Scheme == "http" {
  477. u.Host = host
  478. } else if port == "443" && u.Scheme == "https" {
  479. u.Host = host
  480. } else {
  481. u.Host = net.JoinHostPort(host, port)
  482. }
  483. }
  484. }
  485. return u
  486. }
  487. func (metadata Metadata) remainingLimitHeaderValues() (remainingDownloads, remainingDays string) {
  488. if metadata.MaxDate.IsZero() {
  489. remainingDays = "n/a"
  490. } else {
  491. timeDifference := metadata.MaxDate.Sub(time.Now())
  492. remainingDays = strconv.Itoa(int(timeDifference.Hours()/24) + 1)
  493. }
  494. if metadata.MaxDownloads == -1 {
  495. remainingDownloads = "n/a"
  496. } else {
  497. remainingDownloads = strconv.Itoa(metadata.MaxDownloads - metadata.Downloads)
  498. }
  499. return remainingDownloads, remainingDays
  500. }
  501. func (s *Server) Lock(token, filename string) error {
  502. key := path.Join(token, filename)
  503. if _, ok := s.locks[key]; !ok {
  504. s.locks[key] = &sync.Mutex{}
  505. }
  506. s.locks[key].Lock()
  507. return nil
  508. }
  509. func (s *Server) Unlock(token, filename string) error {
  510. key := path.Join(token, filename)
  511. s.locks[key].Unlock()
  512. return nil
  513. }
  514. func (s *Server) CheckMetadata(token, filename string, increaseDownload bool) (Metadata, error) {
  515. s.Lock(token, filename)
  516. defer s.Unlock(token, filename)
  517. var metadata Metadata
  518. r, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  519. if err != nil {
  520. return metadata, err
  521. }
  522. defer r.Close()
  523. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  524. return metadata, err
  525. } else if metadata.MaxDownloads != -1 && metadata.Downloads >= metadata.MaxDownloads {
  526. return metadata, errors.New("MaxDownloads expired.")
  527. } else if !metadata.MaxDate.IsZero() && time.Now().After(metadata.MaxDate) {
  528. return metadata, errors.New("MaxDate expired.")
  529. } else {
  530. // todo(nl5887): mutex?
  531. // update number of downloads
  532. if increaseDownload {
  533. metadata.Downloads++
  534. }
  535. buffer := &bytes.Buffer{}
  536. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  537. return metadata, errors.New("Could not encode metadata")
  538. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  539. return metadata, errors.New("Could not save metadata")
  540. }
  541. }
  542. return metadata, nil
  543. }
  544. func (s *Server) CheckDeletionToken(deletionToken, token, filename string) error {
  545. s.Lock(token, filename)
  546. defer s.Unlock(token, filename)
  547. var metadata Metadata
  548. r, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  549. if s.storage.IsNotExist(err) {
  550. return nil
  551. } else if err != nil {
  552. return err
  553. }
  554. defer r.Close()
  555. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  556. return err
  557. } else if metadata.DeletionToken != deletionToken {
  558. return errors.New("Deletion token doesn't match.")
  559. }
  560. return nil
  561. }
  562. func (s *Server) purgeHandler() {
  563. ticker := time.NewTicker(s.purgeInterval)
  564. go func() {
  565. for {
  566. select {
  567. case <-ticker.C:
  568. err := s.storage.Purge(s.purgeDays)
  569. log.Printf("error cleaning up expired files: %v", err)
  570. }
  571. }
  572. }()
  573. }
  574. func (s *Server) deleteHandler(w http.ResponseWriter, r *http.Request) {
  575. vars := mux.Vars(r)
  576. token := vars["token"]
  577. filename := vars["filename"]
  578. deletionToken := vars["deletionToken"]
  579. if err := s.CheckDeletionToken(deletionToken, token, filename); err != nil {
  580. log.Printf("Error metadata: %s", err.Error())
  581. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  582. return
  583. }
  584. err := s.storage.Delete(token, filename)
  585. if s.storage.IsNotExist(err) {
  586. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  587. return
  588. } else if err != nil {
  589. log.Printf("%s", err.Error())
  590. http.Error(w, "Could not delete file.", 500)
  591. return
  592. }
  593. }
  594. func (s *Server) zipHandler(w http.ResponseWriter, r *http.Request) {
  595. vars := mux.Vars(r)
  596. files := vars["files"]
  597. zipfilename := fmt.Sprintf("transfersh-%d.zip", uint16(time.Now().UnixNano()))
  598. w.Header().Set("Content-Type", "application/zip")
  599. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", zipfilename))
  600. w.Header().Set("Connection", "close")
  601. zw := zip.NewWriter(w)
  602. for _, key := range strings.Split(files, ",") {
  603. key = resolveKey(key, s.proxyPath)
  604. token := strings.Split(key, "/")[0]
  605. filename := sanitize(strings.Split(key, "/")[1])
  606. if _, err := s.CheckMetadata(token, filename, true); err != nil {
  607. log.Printf("Error metadata: %s", err.Error())
  608. continue
  609. }
  610. reader, _, err := s.storage.Get(token, filename)
  611. if err != nil {
  612. if s.storage.IsNotExist(err) {
  613. http.Error(w, "File not found", 404)
  614. return
  615. } else {
  616. log.Printf("%s", err.Error())
  617. http.Error(w, "Could not retrieve file.", 500)
  618. return
  619. }
  620. }
  621. defer reader.Close()
  622. header := &zip.FileHeader{
  623. Name: strings.Split(key, "/")[1],
  624. Method: zip.Store,
  625. ModifiedTime: uint16(time.Now().UnixNano()),
  626. ModifiedDate: uint16(time.Now().UnixNano()),
  627. }
  628. fw, err := zw.CreateHeader(header)
  629. if err != nil {
  630. log.Printf("%s", err.Error())
  631. http.Error(w, "Internal server error.", 500)
  632. return
  633. }
  634. if _, err = io.Copy(fw, reader); err != nil {
  635. log.Printf("%s", err.Error())
  636. http.Error(w, "Internal server error.", 500)
  637. return
  638. }
  639. }
  640. if err := zw.Close(); err != nil {
  641. log.Printf("%s", err.Error())
  642. http.Error(w, "Internal server error.", 500)
  643. return
  644. }
  645. }
  646. func (s *Server) tarGzHandler(w http.ResponseWriter, r *http.Request) {
  647. vars := mux.Vars(r)
  648. files := vars["files"]
  649. tarfilename := fmt.Sprintf("transfersh-%d.tar.gz", uint16(time.Now().UnixNano()))
  650. w.Header().Set("Content-Type", "application/x-gzip")
  651. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  652. w.Header().Set("Connection", "close")
  653. os := gzip.NewWriter(w)
  654. defer os.Close()
  655. zw := tar.NewWriter(os)
  656. defer zw.Close()
  657. for _, key := range strings.Split(files, ",") {
  658. key = resolveKey(key, s.proxyPath)
  659. token := strings.Split(key, "/")[0]
  660. filename := sanitize(strings.Split(key, "/")[1])
  661. if _, err := s.CheckMetadata(token, filename, true); err != nil {
  662. log.Printf("Error metadata: %s", err.Error())
  663. continue
  664. }
  665. reader, contentLength, err := s.storage.Get(token, filename)
  666. if err != nil {
  667. if s.storage.IsNotExist(err) {
  668. http.Error(w, "File not found", 404)
  669. return
  670. } else {
  671. log.Printf("%s", err.Error())
  672. http.Error(w, "Could not retrieve file.", 500)
  673. return
  674. }
  675. }
  676. defer reader.Close()
  677. header := &tar.Header{
  678. Name: strings.Split(key, "/")[1],
  679. Size: int64(contentLength),
  680. }
  681. err = zw.WriteHeader(header)
  682. if err != nil {
  683. log.Printf("%s", err.Error())
  684. http.Error(w, "Internal server error.", 500)
  685. return
  686. }
  687. if _, err = io.Copy(zw, reader); err != nil {
  688. log.Printf("%s", err.Error())
  689. http.Error(w, "Internal server error.", 500)
  690. return
  691. }
  692. }
  693. }
  694. func (s *Server) tarHandler(w http.ResponseWriter, r *http.Request) {
  695. vars := mux.Vars(r)
  696. files := vars["files"]
  697. tarfilename := fmt.Sprintf("transfersh-%d.tar", uint16(time.Now().UnixNano()))
  698. w.Header().Set("Content-Type", "application/x-tar")
  699. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  700. w.Header().Set("Connection", "close")
  701. zw := tar.NewWriter(w)
  702. defer zw.Close()
  703. for _, key := range strings.Split(files, ",") {
  704. key = resolveKey(key, s.proxyPath)
  705. token := strings.Split(key, "/")[0]
  706. filename := strings.Split(key, "/")[1]
  707. if _, err := s.CheckMetadata(token, filename, true); err != nil {
  708. log.Printf("Error metadata: %s", err.Error())
  709. continue
  710. }
  711. reader, contentLength, err := s.storage.Get(token, filename)
  712. if err != nil {
  713. if s.storage.IsNotExist(err) {
  714. http.Error(w, "File not found", 404)
  715. return
  716. } else {
  717. log.Printf("%s", err.Error())
  718. http.Error(w, "Could not retrieve file.", 500)
  719. return
  720. }
  721. }
  722. defer reader.Close()
  723. header := &tar.Header{
  724. Name: strings.Split(key, "/")[1],
  725. Size: int64(contentLength),
  726. }
  727. err = zw.WriteHeader(header)
  728. if err != nil {
  729. log.Printf("%s", err.Error())
  730. http.Error(w, "Internal server error.", 500)
  731. return
  732. }
  733. if _, err = io.Copy(zw, reader); err != nil {
  734. log.Printf("%s", err.Error())
  735. http.Error(w, "Internal server error.", 500)
  736. return
  737. }
  738. }
  739. }
  740. func (s *Server) headHandler(w http.ResponseWriter, r *http.Request) {
  741. vars := mux.Vars(r)
  742. token := vars["token"]
  743. filename := vars["filename"]
  744. realFilename := filename
  745. useZstd := false
  746. metadata, err := s.CheckMetadata(token, filename, false)
  747. var contentType string
  748. if err != nil {
  749. log.Printf("Error metadata: %s; trying .zst", err.Error())
  750. useZstd = true
  751. filename += ".zst"
  752. metadata, err = s.CheckMetadata(token, filename, false)
  753. if err != nil {
  754. log.Printf("Error metadata .zst: %s", err.Error())
  755. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  756. return
  757. }
  758. contentType = mime.TypeByExtension(filepath.Ext(realFilename))
  759. } else {
  760. contentType = metadata.ContentType
  761. }
  762. contentLength, err := s.storage.Head(token, filename)
  763. if s.storage.IsNotExist(err) {
  764. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  765. return
  766. } else if err != nil {
  767. log.Printf("%s", err.Error())
  768. http.Error(w, "Could not retrieve file.", 500)
  769. return
  770. }
  771. remainingDownloads, remainingDays := metadata.remainingLimitHeaderValues()
  772. if contentType != "" {
  773. w.Header().Set("Content-Type", contentType)
  774. }
  775. if !useZstd {
  776. w.Header().Set("Content-Length", strconv.FormatUint(contentLength, 10))
  777. }
  778. w.Header().Set("Connection", "close")
  779. w.Header().Set("X-Remaining-Downloads", remainingDownloads)
  780. w.Header().Set("X-Remaining-Days", remainingDays)
  781. }
  782. func (s *Server) getHandler(w http.ResponseWriter, r *http.Request) {
  783. vars := mux.Vars(r)
  784. action := vars["action"]
  785. token := vars["token"]
  786. filename := vars["filename"]
  787. realFilename := filename
  788. useZstd := false
  789. metadata, err := s.CheckMetadata(token, filename, true)
  790. if err != nil {
  791. log.Printf("Error metadata: %s; trying .zst", err.Error())
  792. useZstd = true
  793. filename += ".zst"
  794. metadata, err = s.CheckMetadata(token, filename, true)
  795. if err != nil {
  796. log.Printf("Error metadata .zst: %s", err.Error())
  797. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  798. return
  799. }
  800. }
  801. contentType := metadata.ContentType
  802. reader, contentLength, err := s.storage.Get(token, filename)
  803. if s.storage.IsNotExist(err) {
  804. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  805. return
  806. } else if err != nil {
  807. log.Printf("%s", err.Error())
  808. http.Error(w, "Could not retrieve file.", 500)
  809. return
  810. }
  811. defer reader.Close()
  812. if useZstd {
  813. contentType = mime.TypeByExtension(filepath.Ext(realFilename))
  814. d, err := zstd.NewReader(reader)
  815. if err != nil {
  816. log.Printf("Failed to create zstd reader: %s", err.Error())
  817. http.Error(w, "Could not retrieve file.", 500)
  818. return
  819. }
  820. defer d.Close()
  821. reader = d.IOReadCloser()
  822. }
  823. var disposition string
  824. if action == "inline" {
  825. disposition = "inline"
  826. } else {
  827. disposition = "attachment"
  828. }
  829. remainingDownloads, remainingDays := metadata.remainingLimitHeaderValues()
  830. if contentType != "" {
  831. w.Header().Set("Content-Type", contentType)
  832. }
  833. if !useZstd {
  834. w.Header().Set("Content-Length", strconv.FormatUint(contentLength, 10))
  835. } else {
  836. w.Header().Set("Transfer-Encoding", "chunked")
  837. }
  838. w.Header().Set("Content-Disposition", fmt.Sprintf("%s; filename=\"%s\"", disposition, realFilename))
  839. w.Header().Set("Connection", "keep-alive")
  840. w.Header().Set("X-Remaining-Downloads", remainingDownloads)
  841. w.Header().Set("X-Remaining-Days", remainingDays)
  842. if w.Header().Get("Range") == "" {
  843. if _, err = io.Copy(w, reader); err != nil {
  844. log.Printf("%s", err.Error())
  845. http.Error(w, "Error occurred copying to output stream", 500)
  846. return
  847. }
  848. return
  849. }
  850. file, err := ioutil.TempFile(s.tempPath, "range-")
  851. if err != nil {
  852. log.Printf("%s", err.Error())
  853. http.Error(w, "Error occurred copying to output stream", 500)
  854. return
  855. }
  856. defer cleanTmpFile(file)
  857. tee := io.TeeReader(reader, file)
  858. for {
  859. b := make([]byte, _5M)
  860. _, err = tee.Read(b)
  861. if err == io.EOF {
  862. break
  863. }
  864. if err != nil {
  865. log.Printf("%s", err.Error())
  866. http.Error(w, "Error occurred copying to output stream", 500)
  867. return
  868. }
  869. }
  870. http.ServeContent(w, r, filename, time.Unix(0, 0), file)
  871. }
  872. func (s *Server) RedirectHandler(h http.Handler) http.HandlerFunc {
  873. return func(w http.ResponseWriter, r *http.Request) {
  874. if !s.forceHTTPs {
  875. // we don't want to enforce https
  876. } else if r.URL.Path == "/health.html" {
  877. // health check url won't redirect
  878. } else if strings.HasSuffix(ipAddrFromRemoteAddr(r.Host), ".onion") {
  879. // .onion addresses cannot get a valid certificate, so don't redirect
  880. } else if r.Header.Get("X-Forwarded-Proto") == "https" {
  881. } else if r.URL.Scheme == "https" {
  882. } else {
  883. u := getURL(r, s.proxyPort)
  884. u.Scheme = "https"
  885. http.Redirect(w, r, u.String(), http.StatusPermanentRedirect)
  886. return
  887. }
  888. h.ServeHTTP(w, r)
  889. }
  890. }
  891. // Create a log handler for every request it receives.
  892. func LoveHandler(h http.Handler) http.HandlerFunc {
  893. return func(w http.ResponseWriter, r *http.Request) {
  894. w.Header().Set("x-made-with", "<3 by DutchCoders")
  895. w.Header().Set("x-served-by", "Proudly served by DutchCoders")
  896. w.Header().Set("Server", "Transfer.sh HTTP Server 1.0")
  897. h.ServeHTTP(w, r)
  898. }
  899. }
  900. func IPFilterHandler(h http.Handler, ipFilterOptions *IPFilterOptions) http.HandlerFunc {
  901. return func(w http.ResponseWriter, r *http.Request) {
  902. if ipFilterOptions == nil {
  903. h.ServeHTTP(w, r)
  904. } else {
  905. WrapIPFilter(h, *ipFilterOptions).ServeHTTP(w, r)
  906. }
  907. return
  908. }
  909. }
  910. func (s *Server) BasicAuthHandler(h http.Handler) http.HandlerFunc {
  911. return func(w http.ResponseWriter, r *http.Request) {
  912. if s.AuthUser == "" || s.AuthPass == "" {
  913. h.ServeHTTP(w, r)
  914. return
  915. }
  916. w.Header().Set("WWW-Authenticate", "Basic realm=\"Restricted\"")
  917. username, password, authOK := r.BasicAuth()
  918. if authOK == false {
  919. http.Error(w, "Not authorized", 401)
  920. return
  921. }
  922. if username != s.AuthUser || password != s.AuthPass {
  923. http.Error(w, "Not authorized", 401)
  924. return
  925. }
  926. h.ServeHTTP(w, r)
  927. }
  928. }