You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

1066 lines
26 KiB

  1. /*
  2. The MIT License (MIT)
  3. Copyright (c) 2014-2017 DutchCoders [https://github.com/dutchcoders/]
  4. Permission is hereby granted, free of charge, to any person obtaining a copy
  5. of this software and associated documentation files (the "Software"), to deal
  6. in the Software without restriction, including without limitation the rights
  7. to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  8. copies of the Software, and to permit persons to whom the Software is
  9. furnished to do so, subject to the following conditions:
  10. The above copyright notice and this permission notice shall be included in
  11. all copies or substantial portions of the Software.
  12. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  13. IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  14. FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  15. AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  16. LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  17. OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  18. THE SOFTWARE.
  19. */
  20. package server
  21. import (
  22. // _ "transfer.sh/app/handlers"
  23. // _ "transfer.sh/app/utils"
  24. "archive/tar"
  25. "archive/zip"
  26. "bytes"
  27. "compress/gzip"
  28. "encoding/json"
  29. "errors"
  30. "fmt"
  31. blackfriday "gopkg.in/russross/blackfriday.v2"
  32. "html"
  33. html_template "html/template"
  34. "io"
  35. "io/ioutil"
  36. "log"
  37. "math/rand"
  38. "mime"
  39. "net/http"
  40. "net/url"
  41. "os"
  42. "path"
  43. "path/filepath"
  44. "strconv"
  45. "strings"
  46. "sync"
  47. text_template "text/template"
  48. "time"
  49. "net"
  50. "encoding/base64"
  51. web "github.com/dutchcoders/transfer.sh-web"
  52. "github.com/gorilla/mux"
  53. "github.com/microcosm-cc/bluemonday"
  54. "github.com/skip2/go-qrcode"
  55. )
  56. const getPathPart = "get"
  57. var (
  58. htmlTemplates = initHTMLTemplates()
  59. textTemplates = initTextTemplates()
  60. )
  61. func stripPrefix(path string) string {
  62. return strings.Replace(path, web.Prefix+"/", "", -1)
  63. }
  64. func initTextTemplates() *text_template.Template {
  65. templateMap := text_template.FuncMap{"format": formatNumber}
  66. // Templates with functions available to them
  67. var templates = text_template.New("").Funcs(templateMap)
  68. return templates
  69. }
  70. func initHTMLTemplates() *html_template.Template {
  71. templateMap := html_template.FuncMap{"format": formatNumber}
  72. // Templates with functions available to them
  73. var templates = html_template.New("").Funcs(templateMap)
  74. return templates
  75. }
  76. func healthHandler(w http.ResponseWriter, r *http.Request) {
  77. fmt.Fprintf(w, "Approaching Neutral Zone, all systems normal and functioning.")
  78. }
  79. /* The preview handler will show a preview of the content for browsers (accept type text/html), and referer is not transfer.sh */
  80. func (s *Server) previewHandler(w http.ResponseWriter, r *http.Request) {
  81. vars := mux.Vars(r)
  82. token := vars["token"]
  83. filename := vars["filename"]
  84. _, err := s.CheckMetadata(token, filename, false)
  85. if err != nil {
  86. log.Printf("Error metadata: %s", err.Error())
  87. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  88. return
  89. }
  90. contentType, contentLength, err := s.storage.Head(token, filename)
  91. if err != nil {
  92. http.Error(w, http.StatusText(404), 404)
  93. return
  94. }
  95. var templatePath string
  96. var content html_template.HTML
  97. switch {
  98. case strings.HasPrefix(contentType, "image/"):
  99. templatePath = "download.image.html"
  100. case strings.HasPrefix(contentType, "video/"):
  101. templatePath = "download.video.html"
  102. case strings.HasPrefix(contentType, "audio/"):
  103. templatePath = "download.audio.html"
  104. case strings.HasPrefix(contentType, "text/"):
  105. templatePath = "download.markdown.html"
  106. var reader io.ReadCloser
  107. if reader, _, _, err = s.storage.Get(token, filename); err != nil {
  108. http.Error(w, err.Error(), http.StatusInternalServerError)
  109. return
  110. }
  111. var data []byte
  112. data = make([]byte, _5M)
  113. if _, err = reader.Read(data); err != io.EOF && err != nil {
  114. http.Error(w, err.Error(), http.StatusInternalServerError)
  115. return
  116. }
  117. if strings.HasPrefix(contentType, "text/x-markdown") || strings.HasPrefix(contentType, "text/markdown") {
  118. unsafe := blackfriday.Run(data)
  119. output := bluemonday.UGCPolicy().SanitizeBytes(unsafe)
  120. content = html_template.HTML(output)
  121. } else if strings.HasPrefix(contentType, "text/plain") {
  122. content = html_template.HTML(fmt.Sprintf("<pre>%s</pre>", html.EscapeString(string(data))))
  123. } else {
  124. templatePath = "download.sandbox.html"
  125. }
  126. default:
  127. templatePath = "download.html"
  128. }
  129. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  130. resolvedURL := resolveURL(r, relativeURL)
  131. relativeURLGet, _ := url.Parse(path.Join(s.proxyPath, getPathPart, token, filename))
  132. resolvedURLGet := resolveURL(r, relativeURLGet)
  133. var png []byte
  134. png, err = qrcode.Encode(resolvedURL, qrcode.High, 150)
  135. if err != nil {
  136. http.Error(w, err.Error(), http.StatusInternalServerError)
  137. return
  138. }
  139. qrCode := base64.StdEncoding.EncodeToString(png)
  140. hostname := getURL(r).Host
  141. webAddress := resolveWebAddress(r, s.proxyPath)
  142. data := struct {
  143. ContentType string
  144. Content html_template.HTML
  145. Filename string
  146. Url string
  147. UrlGet string
  148. Hostname string
  149. WebAddress string
  150. ContentLength uint64
  151. GAKey string
  152. UserVoiceKey string
  153. QRCode string
  154. }{
  155. contentType,
  156. content,
  157. filename,
  158. resolvedURL,
  159. resolvedURLGet,
  160. hostname,
  161. webAddress,
  162. contentLength,
  163. s.gaKey,
  164. s.userVoiceKey,
  165. qrCode,
  166. }
  167. if err := htmlTemplates.ExecuteTemplate(w, templatePath, data); err != nil {
  168. http.Error(w, err.Error(), http.StatusInternalServerError)
  169. return
  170. }
  171. }
  172. // this handler will output html or text, depending on the
  173. // support of the client (Accept header).
  174. func (s *Server) viewHandler(w http.ResponseWriter, r *http.Request) {
  175. // vars := mux.Vars(r)
  176. hostname := getURL(r).Host
  177. webAddress := resolveWebAddress(r, s.proxyPath)
  178. data := struct {
  179. Hostname string
  180. WebAddress string
  181. GAKey string
  182. UserVoiceKey string
  183. }{
  184. hostname,
  185. webAddress,
  186. s.gaKey,
  187. s.userVoiceKey,
  188. }
  189. if acceptsHTML(r.Header) {
  190. if err := htmlTemplates.ExecuteTemplate(w, "index.html", data); err != nil {
  191. http.Error(w, err.Error(), http.StatusInternalServerError)
  192. return
  193. }
  194. } else {
  195. if err := textTemplates.ExecuteTemplate(w, "index.txt", data); err != nil {
  196. http.Error(w, err.Error(), http.StatusInternalServerError)
  197. return
  198. }
  199. }
  200. }
  201. func (s *Server) notFoundHandler(w http.ResponseWriter, r *http.Request) {
  202. http.Error(w, http.StatusText(404), 404)
  203. }
  204. func sanitize(fileName string) string {
  205. return path.Clean(path.Base(fileName))
  206. }
  207. func (s *Server) postHandler(w http.ResponseWriter, r *http.Request) {
  208. if err := r.ParseMultipartForm(_24K); nil != err {
  209. log.Printf("%s", err.Error())
  210. http.Error(w, "Error occurred copying to output stream", 500)
  211. return
  212. }
  213. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  214. w.Header().Set("Content-Type", "text/plain")
  215. for _, fheaders := range r.MultipartForm.File {
  216. for _, fheader := range fheaders {
  217. filename := sanitize(fheader.Filename)
  218. contentType := fheader.Header.Get("Content-Type")
  219. if contentType == "" {
  220. contentType = mime.TypeByExtension(filepath.Ext(fheader.Filename))
  221. }
  222. var f io.Reader
  223. var err error
  224. if f, err = fheader.Open(); err != nil {
  225. log.Printf("%s", err.Error())
  226. http.Error(w, err.Error(), 500)
  227. return
  228. }
  229. var b bytes.Buffer
  230. n, err := io.CopyN(&b, f, _24K+1)
  231. if err != nil && err != io.EOF {
  232. log.Printf("%s", err.Error())
  233. http.Error(w, err.Error(), 500)
  234. return
  235. }
  236. var file *os.File
  237. var reader io.Reader
  238. if n > _24K {
  239. file, err = ioutil.TempFile(s.tempPath, "transfer-")
  240. if err != nil {
  241. log.Fatal(err)
  242. }
  243. n, err = io.Copy(file, io.MultiReader(&b, f))
  244. if err != nil {
  245. cleanTmpFile(file)
  246. log.Printf("%s", err.Error())
  247. http.Error(w, err.Error(), 500)
  248. return
  249. }
  250. reader, err = os.Open(file.Name())
  251. } else {
  252. reader = bytes.NewReader(b.Bytes())
  253. }
  254. contentLength := n
  255. metadata := MetadataForRequest(contentType, r)
  256. buffer := &bytes.Buffer{}
  257. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  258. log.Printf("%s", err.Error())
  259. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  260. cleanTmpFile(file)
  261. return
  262. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  263. log.Printf("%s", err.Error())
  264. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  265. cleanTmpFile(file)
  266. return
  267. }
  268. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  269. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  270. log.Printf("Backend storage error: %s", err.Error())
  271. http.Error(w, err.Error(), 500)
  272. return
  273. }
  274. filename = url.PathEscape(filename)
  275. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  276. fmt.Fprintln(w, getURL(r).ResolveReference(relativeURL).String())
  277. cleanTmpFile(file)
  278. }
  279. }
  280. }
  281. func cleanTmpFile(f *os.File) {
  282. if f != nil {
  283. err := f.Close()
  284. if err != nil {
  285. log.Printf("Error closing tmpfile: %s (%s)", err, f.Name())
  286. }
  287. err = os.Remove(f.Name())
  288. if err != nil {
  289. log.Printf("Error removing tmpfile: %s (%s)", err, f.Name())
  290. }
  291. }
  292. }
  293. type Metadata struct {
  294. // ContentType is the original uploading content type
  295. ContentType string
  296. // Secret as knowledge to delete file
  297. // Secret string
  298. // Downloads is the actual number of downloads
  299. Downloads int
  300. // MaxDownloads contains the maximum numbers of downloads
  301. MaxDownloads int
  302. // MaxDate contains the max age of the file
  303. MaxDate time.Time
  304. // DeletionToken contains the token to match against for deletion
  305. DeletionToken string
  306. }
  307. func MetadataForRequest(contentType string, r *http.Request) Metadata {
  308. metadata := Metadata{
  309. ContentType: contentType,
  310. MaxDate: time.Time{},
  311. Downloads: 0,
  312. MaxDownloads: -1,
  313. DeletionToken: Encode(10000000+int64(rand.Intn(1000000000))) + Encode(10000000+int64(rand.Intn(1000000000))),
  314. }
  315. if v := r.Header.Get("Max-Downloads"); v == "" {
  316. } else if v, err := strconv.Atoi(v); err != nil {
  317. } else {
  318. metadata.MaxDownloads = v
  319. }
  320. if v := r.Header.Get("Max-Days"); v == "" {
  321. } else if v, err := strconv.Atoi(v); err != nil {
  322. } else {
  323. metadata.MaxDate = time.Now().Add(time.Hour * 24 * time.Duration(v))
  324. }
  325. return metadata
  326. }
  327. func (s *Server) putHandler(w http.ResponseWriter, r *http.Request) {
  328. vars := mux.Vars(r)
  329. filename := sanitize(vars["filename"])
  330. contentLength := r.ContentLength
  331. var reader io.Reader
  332. reader = r.Body
  333. defer r.Body.Close()
  334. if contentLength == -1 {
  335. // queue file to disk, because s3 needs content length
  336. var err error
  337. var f io.Reader
  338. f = reader
  339. var b bytes.Buffer
  340. n, err := io.CopyN(&b, f, _24K+1)
  341. if err != nil && err != io.EOF {
  342. log.Printf("Error putting new file: %s", err.Error())
  343. http.Error(w, err.Error(), 500)
  344. return
  345. }
  346. var file *os.File
  347. if n > _24K {
  348. file, err = ioutil.TempFile(s.tempPath, "transfer-")
  349. if err != nil {
  350. log.Printf("%s", err.Error())
  351. http.Error(w, err.Error(), 500)
  352. return
  353. }
  354. defer cleanTmpFile(file)
  355. n, err = io.Copy(file, io.MultiReader(&b, f))
  356. if err != nil {
  357. log.Printf("%s", err.Error())
  358. http.Error(w, err.Error(), 500)
  359. return
  360. }
  361. reader, err = os.Open(file.Name())
  362. } else {
  363. reader = bytes.NewReader(b.Bytes())
  364. }
  365. contentLength = n
  366. }
  367. if contentLength == 0 {
  368. log.Print("Empty content-length")
  369. http.Error(w, errors.New("Could not upload empty file").Error(), 400)
  370. return
  371. }
  372. contentType := r.Header.Get("Content-Type")
  373. if contentType == "" {
  374. contentType = mime.TypeByExtension(filepath.Ext(vars["filename"]))
  375. }
  376. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  377. metadata := MetadataForRequest(contentType, r)
  378. buffer := &bytes.Buffer{}
  379. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  380. log.Printf("%s", err.Error())
  381. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  382. return
  383. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  384. log.Printf("%s", err.Error())
  385. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  386. return
  387. }
  388. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  389. var err error
  390. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  391. log.Printf("Error putting new file: %s", err.Error())
  392. http.Error(w, errors.New("Could not save file").Error(), 500)
  393. return
  394. }
  395. // w.Statuscode = 200
  396. w.Header().Set("Content-Type", "text/plain")
  397. filename = url.PathEscape(filename)
  398. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  399. deleteURL, _ := url.Parse(path.Join(s.proxyPath, token, filename, metadata.DeletionToken))
  400. w.Header().Set("X-Url-Delete", resolveURL(r, deleteURL))
  401. fmt.Fprint(w, resolveURL(r, relativeURL))
  402. }
  403. func resolveURL(r *http.Request, u *url.URL) string {
  404. r.URL.Path = ""
  405. return getURL(r).ResolveReference(u).String()
  406. }
  407. func resolveKey(key, proxyPath string) string {
  408. if strings.HasPrefix(key, "/") {
  409. key = key[1:]
  410. }
  411. if strings.HasPrefix(key, proxyPath) {
  412. key = key[len(proxyPath):]
  413. }
  414. key = strings.Replace(key, "\\", "/", -1)
  415. return key
  416. }
  417. func resolveWebAddress(r *http.Request, proxyPath string) string {
  418. url := getURL(r)
  419. var webAddress string
  420. if len(proxyPath) == 0 {
  421. webAddress = fmt.Sprintf("%s://%s/",
  422. url.ResolveReference(url).Scheme,
  423. url.ResolveReference(url).Host)
  424. } else {
  425. webAddress = fmt.Sprintf("%s://%s/%s",
  426. url.ResolveReference(url).Scheme,
  427. url.ResolveReference(url).Host,
  428. proxyPath)
  429. }
  430. return webAddress
  431. }
  432. func getURL(r *http.Request) *url.URL {
  433. u, _ := url.Parse(r.URL.String())
  434. if r.TLS != nil {
  435. u.Scheme = "https"
  436. } else if proto := r.Header.Get("X-Forwarded-Proto"); proto != "" {
  437. u.Scheme = proto
  438. } else {
  439. u.Scheme = "http"
  440. }
  441. if u.Host != "" {
  442. } else if host, port, err := net.SplitHostPort(r.Host); err != nil {
  443. u.Host = r.Host
  444. } else {
  445. if port == "80" && u.Scheme == "http" {
  446. u.Host = host
  447. } else if port == "443" && u.Scheme == "https" {
  448. u.Host = host
  449. } else {
  450. u.Host = net.JoinHostPort(host, port)
  451. }
  452. }
  453. return u
  454. }
  455. func (metadata Metadata) remainingLimitHeaderValues() (remainingDownloads, remainingDays string) {
  456. if metadata.MaxDate.IsZero() {
  457. remainingDays = "n/a"
  458. } else {
  459. timeDifference := metadata.MaxDate.Sub(time.Now())
  460. remainingDays = strconv.Itoa(int(timeDifference.Hours()/24) + 1)
  461. }
  462. if metadata.MaxDownloads == -1 {
  463. remainingDownloads = "n/a"
  464. } else {
  465. remainingDownloads = strconv.Itoa(metadata.MaxDownloads - metadata.Downloads)
  466. }
  467. return remainingDownloads, remainingDays
  468. }
  469. func (s *Server) Lock(token, filename string) error {
  470. key := path.Join(token, filename)
  471. if _, ok := s.locks[key]; !ok {
  472. s.locks[key] = &sync.Mutex{}
  473. }
  474. s.locks[key].Lock()
  475. return nil
  476. }
  477. func (s *Server) Unlock(token, filename string) error {
  478. key := path.Join(token, filename)
  479. s.locks[key].Unlock()
  480. return nil
  481. }
  482. func (s *Server) CheckMetadata(token, filename string, increaseDownload bool) (Metadata, error) {
  483. s.Lock(token, filename)
  484. defer s.Unlock(token, filename)
  485. var metadata Metadata
  486. r, _, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  487. if s.storage.IsNotExist(err) {
  488. return metadata, nil
  489. } else if err != nil {
  490. return metadata, err
  491. }
  492. defer r.Close()
  493. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  494. return metadata, err
  495. } else if metadata.MaxDownloads != -1 && metadata.Downloads >= metadata.MaxDownloads {
  496. return metadata, errors.New("MaxDownloads expired.")
  497. } else if !metadata.MaxDate.IsZero() && time.Now().After(metadata.MaxDate) {
  498. return metadata, errors.New("MaxDate expired.")
  499. } else {
  500. // todo(nl5887): mutex?
  501. // update number of downloads
  502. if increaseDownload {
  503. metadata.Downloads++
  504. }
  505. buffer := &bytes.Buffer{}
  506. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  507. return metadata, errors.New("Could not encode metadata")
  508. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  509. return metadata, errors.New("Could not save metadata")
  510. }
  511. }
  512. return metadata, nil
  513. }
  514. func (s *Server) CheckDeletionToken(deletionToken, token, filename string) error {
  515. s.Lock(token, filename)
  516. defer s.Unlock(token, filename)
  517. var metadata Metadata
  518. r, _, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  519. if s.storage.IsNotExist(err) {
  520. return nil
  521. } else if err != nil {
  522. return err
  523. }
  524. defer r.Close()
  525. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  526. return err
  527. } else if metadata.DeletionToken != deletionToken {
  528. return errors.New("Deletion token doesn't match.")
  529. }
  530. return nil
  531. }
  532. func (s *Server) deleteHandler(w http.ResponseWriter, r *http.Request) {
  533. vars := mux.Vars(r)
  534. token := vars["token"]
  535. filename := vars["filename"]
  536. deletionToken := vars["deletionToken"]
  537. if err := s.CheckDeletionToken(deletionToken, token, filename); err != nil {
  538. log.Printf("Error metadata: %s", err.Error())
  539. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  540. return
  541. }
  542. err := s.storage.Delete(token, filename)
  543. if s.storage.IsNotExist(err) {
  544. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  545. return
  546. } else if err != nil {
  547. log.Printf("%s", err.Error())
  548. http.Error(w, "Could not delete file.", 500)
  549. return
  550. }
  551. }
  552. func (s *Server) zipHandler(w http.ResponseWriter, r *http.Request) {
  553. vars := mux.Vars(r)
  554. files := vars["files"]
  555. zipfilename := fmt.Sprintf("transfersh-%d.zip", uint16(time.Now().UnixNano()))
  556. w.Header().Set("Content-Type", "application/zip")
  557. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", zipfilename))
  558. w.Header().Set("Connection", "close")
  559. zw := zip.NewWriter(w)
  560. for _, key := range strings.Split(files, ",") {
  561. key = resolveKey(key, s.proxyPath)
  562. token := strings.Split(key, "/")[0]
  563. filename := sanitize(strings.Split(key, "/")[1])
  564. if _, err := s.CheckMetadata(token, filename, true); err != nil {
  565. log.Printf("Error metadata: %s", err.Error())
  566. continue
  567. }
  568. reader, _, _, err := s.storage.Get(token, filename)
  569. if err != nil {
  570. if s.storage.IsNotExist(err) {
  571. http.Error(w, "File not found", 404)
  572. return
  573. } else {
  574. log.Printf("%s", err.Error())
  575. http.Error(w, "Could not retrieve file.", 500)
  576. return
  577. }
  578. }
  579. defer reader.Close()
  580. header := &zip.FileHeader{
  581. Name: strings.Split(key, "/")[1],
  582. Method: zip.Store,
  583. ModifiedTime: uint16(time.Now().UnixNano()),
  584. ModifiedDate: uint16(time.Now().UnixNano()),
  585. }
  586. fw, err := zw.CreateHeader(header)
  587. if err != nil {
  588. log.Printf("%s", err.Error())
  589. http.Error(w, "Internal server error.", 500)
  590. return
  591. }
  592. if _, err = io.Copy(fw, reader); err != nil {
  593. log.Printf("%s", err.Error())
  594. http.Error(w, "Internal server error.", 500)
  595. return
  596. }
  597. }
  598. if err := zw.Close(); err != nil {
  599. log.Printf("%s", err.Error())
  600. http.Error(w, "Internal server error.", 500)
  601. return
  602. }
  603. }
  604. func (s *Server) tarGzHandler(w http.ResponseWriter, r *http.Request) {
  605. vars := mux.Vars(r)
  606. files := vars["files"]
  607. tarfilename := fmt.Sprintf("transfersh-%d.tar.gz", uint16(time.Now().UnixNano()))
  608. w.Header().Set("Content-Type", "application/x-gzip")
  609. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  610. w.Header().Set("Connection", "close")
  611. os := gzip.NewWriter(w)
  612. defer os.Close()
  613. zw := tar.NewWriter(os)
  614. defer zw.Close()
  615. for _, key := range strings.Split(files, ",") {
  616. key = resolveKey(key, s.proxyPath)
  617. token := strings.Split(key, "/")[0]
  618. filename := sanitize(strings.Split(key, "/")[1])
  619. if _, err := s.CheckMetadata(token, filename, true); err != nil {
  620. log.Printf("Error metadata: %s", err.Error())
  621. continue
  622. }
  623. reader, _, contentLength, err := s.storage.Get(token, filename)
  624. if err != nil {
  625. if s.storage.IsNotExist(err) {
  626. http.Error(w, "File not found", 404)
  627. return
  628. } else {
  629. log.Printf("%s", err.Error())
  630. http.Error(w, "Could not retrieve file.", 500)
  631. return
  632. }
  633. }
  634. defer reader.Close()
  635. header := &tar.Header{
  636. Name: strings.Split(key, "/")[1],
  637. Size: int64(contentLength),
  638. }
  639. err = zw.WriteHeader(header)
  640. if err != nil {
  641. log.Printf("%s", err.Error())
  642. http.Error(w, "Internal server error.", 500)
  643. return
  644. }
  645. if _, err = io.Copy(zw, reader); err != nil {
  646. log.Printf("%s", err.Error())
  647. http.Error(w, "Internal server error.", 500)
  648. return
  649. }
  650. }
  651. }
  652. func (s *Server) tarHandler(w http.ResponseWriter, r *http.Request) {
  653. vars := mux.Vars(r)
  654. files := vars["files"]
  655. tarfilename := fmt.Sprintf("transfersh-%d.tar", uint16(time.Now().UnixNano()))
  656. w.Header().Set("Content-Type", "application/x-tar")
  657. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  658. w.Header().Set("Connection", "close")
  659. zw := tar.NewWriter(w)
  660. defer zw.Close()
  661. for _, key := range strings.Split(files, ",") {
  662. key = resolveKey(key, s.proxyPath)
  663. token := strings.Split(key, "/")[0]
  664. filename := strings.Split(key, "/")[1]
  665. if _, err := s.CheckMetadata(token, filename, true); err != nil {
  666. log.Printf("Error metadata: %s", err.Error())
  667. continue
  668. }
  669. reader, _, contentLength, err := s.storage.Get(token, filename)
  670. if err != nil {
  671. if s.storage.IsNotExist(err) {
  672. http.Error(w, "File not found", 404)
  673. return
  674. } else {
  675. log.Printf("%s", err.Error())
  676. http.Error(w, "Could not retrieve file.", 500)
  677. return
  678. }
  679. }
  680. defer reader.Close()
  681. header := &tar.Header{
  682. Name: strings.Split(key, "/")[1],
  683. Size: int64(contentLength),
  684. }
  685. err = zw.WriteHeader(header)
  686. if err != nil {
  687. log.Printf("%s", err.Error())
  688. http.Error(w, "Internal server error.", 500)
  689. return
  690. }
  691. if _, err = io.Copy(zw, reader); err != nil {
  692. log.Printf("%s", err.Error())
  693. http.Error(w, "Internal server error.", 500)
  694. return
  695. }
  696. }
  697. }
  698. func (s *Server) headHandler(w http.ResponseWriter, r *http.Request) {
  699. vars := mux.Vars(r)
  700. token := vars["token"]
  701. filename := vars["filename"]
  702. metadata, err := s.CheckMetadata(token, filename, false)
  703. if err != nil {
  704. log.Printf("Error metadata: %s", err.Error())
  705. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  706. return
  707. }
  708. contentType, contentLength, err := s.storage.Head(token, filename)
  709. if s.storage.IsNotExist(err) {
  710. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  711. return
  712. } else if err != nil {
  713. log.Printf("%s", err.Error())
  714. http.Error(w, "Could not retrieve file.", 500)
  715. return
  716. }
  717. remainingDownloads, remainingDays := metadata.remainingLimitHeaderValues()
  718. w.Header().Set("Content-Type", contentType)
  719. w.Header().Set("Content-Length", strconv.FormatUint(contentLength, 10))
  720. w.Header().Set("Connection", "close")
  721. w.Header().Set("X-Remaining-Downloads", remainingDownloads)
  722. w.Header().Set("X-Remaining-Days", remainingDays)
  723. }
  724. func (s *Server) getHandler(w http.ResponseWriter, r *http.Request) {
  725. vars := mux.Vars(r)
  726. action := vars["action"]
  727. token := vars["token"]
  728. filename := vars["filename"]
  729. metadata, err := s.CheckMetadata(token, filename, true)
  730. if err != nil {
  731. log.Printf("Error metadata: %s", err.Error())
  732. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  733. return
  734. }
  735. reader, contentType, contentLength, err := s.storage.Get(token, filename)
  736. if s.storage.IsNotExist(err) {
  737. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  738. return
  739. } else if err != nil {
  740. log.Printf("%s", err.Error())
  741. http.Error(w, "Could not retrieve file.", 500)
  742. return
  743. }
  744. defer reader.Close()
  745. var disposition string
  746. if action == "inline" {
  747. disposition = "inline"
  748. } else {
  749. disposition = "attachment"
  750. }
  751. remainingDownloads, remainingDays := metadata.remainingLimitHeaderValues()
  752. w.Header().Set("Content-Type", contentType)
  753. w.Header().Set("Content-Length", strconv.FormatUint(contentLength, 10))
  754. w.Header().Set("Content-Disposition", fmt.Sprintf("%s; filename=\"%s\"", disposition, filename))
  755. w.Header().Set("Connection", "keep-alive")
  756. w.Header().Set("X-Remaining-Downloads", remainingDownloads)
  757. w.Header().Set("X-Remaining-Days", remainingDays)
  758. if w.Header().Get("Range") == "" {
  759. if _, err = io.Copy(w, reader); err != nil {
  760. log.Printf("%s", err.Error())
  761. http.Error(w, "Error occurred copying to output stream", 500)
  762. return
  763. }
  764. return
  765. }
  766. file, err := ioutil.TempFile(s.tempPath, "range-")
  767. if err != nil {
  768. log.Printf("%s", err.Error())
  769. http.Error(w, "Error occurred copying to output stream", 500)
  770. return
  771. }
  772. defer cleanTmpFile(file)
  773. tee := io.TeeReader(reader, file)
  774. for {
  775. b := make([]byte, _5M)
  776. _, err = tee.Read(b)
  777. if err == io.EOF {
  778. break
  779. }
  780. if err != nil {
  781. log.Printf("%s", err.Error())
  782. http.Error(w, "Error occurred copying to output stream", 500)
  783. return
  784. }
  785. }
  786. http.ServeContent(w, r, filename, time.Now(), file)
  787. }
  788. func (s *Server) RedirectHandler(h http.Handler) http.HandlerFunc {
  789. return func(w http.ResponseWriter, r *http.Request) {
  790. if !s.forceHTTPs {
  791. // we don't want to enforce https
  792. } else if r.URL.Path == "/health.html" {
  793. // health check url won't redirect
  794. } else if strings.HasSuffix(ipAddrFromRemoteAddr(r.Host), ".onion") {
  795. // .onion addresses cannot get a valid certificate, so don't redirect
  796. } else if r.Header.Get("X-Forwarded-Proto") == "https" {
  797. } else if r.URL.Scheme == "https" {
  798. } else {
  799. u := getURL(r)
  800. u.Scheme = "https"
  801. http.Redirect(w, r, u.String(), http.StatusPermanentRedirect)
  802. return
  803. }
  804. h.ServeHTTP(w, r)
  805. }
  806. }
  807. // Create a log handler for every request it receives.
  808. func LoveHandler(h http.Handler) http.HandlerFunc {
  809. return func(w http.ResponseWriter, r *http.Request) {
  810. w.Header().Set("x-made-with", "<3 by DutchCoders")
  811. w.Header().Set("x-served-by", "Proudly served by DutchCoders")
  812. w.Header().Set("Server", "Transfer.sh HTTP Server 1.0")
  813. h.ServeHTTP(w, r)
  814. }
  815. }
  816. func IPFilterHandler(h http.Handler, ipFilterOptions *IPFilterOptions) http.HandlerFunc {
  817. return func(w http.ResponseWriter, r *http.Request) {
  818. if ipFilterOptions == nil {
  819. h.ServeHTTP(w, r)
  820. } else {
  821. WrapIPFilter(h, *ipFilterOptions).ServeHTTP(w, r)
  822. }
  823. return
  824. }
  825. }
  826. func (s *Server) BasicAuthHandler(h http.Handler) http.HandlerFunc {
  827. return func(w http.ResponseWriter, r *http.Request) {
  828. if s.AuthUser == "" || s.AuthPass == "" {
  829. h.ServeHTTP(w, r)
  830. return
  831. }
  832. w.Header().Set("WWW-Authenticate", "Basic realm=\"Restricted\"")
  833. username, password, authOK := r.BasicAuth()
  834. if authOK == false {
  835. http.Error(w, "Not authorized", 401)
  836. return
  837. }
  838. if username != s.AuthUser || password != s.AuthPass {
  839. http.Error(w, "Not authorized", 401)
  840. return
  841. }
  842. h.ServeHTTP(w, r)
  843. }
  844. }