You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

1115 lines
28 KiB

  1. /*
  2. The MIT License (MIT)
  3. Copyright (c) 2014-2017 DutchCoders [https://github.com/dutchcoders/]
  4. Permission is hereby granted, free of charge, to any person obtaining a copy
  5. of this software and associated documentation files (the "Software"), to deal
  6. in the Software without restriction, including without limitation the rights
  7. to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  8. copies of the Software, and to permit persons to whom the Software is
  9. furnished to do so, subject to the following conditions:
  10. The above copyright notice and this permission notice shall be included in
  11. all copies or substantial portions of the Software.
  12. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  13. IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  14. FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  15. AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  16. LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  17. OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  18. THE SOFTWARE.
  19. */
  20. package server
  21. import (
  22. // _ "transfer.sh/app/handlers"
  23. // _ "transfer.sh/app/utils"
  24. "archive/tar"
  25. "archive/zip"
  26. "bytes"
  27. "compress/gzip"
  28. "encoding/json"
  29. "errors"
  30. "fmt"
  31. blackfriday "github.com/russross/blackfriday/v2"
  32. "html"
  33. html_template "html/template"
  34. "io"
  35. "io/ioutil"
  36. "log"
  37. "math/rand"
  38. "mime"
  39. "net/http"
  40. "net/url"
  41. "os"
  42. "path"
  43. "path/filepath"
  44. "strconv"
  45. "strings"
  46. "sync"
  47. text_template "text/template"
  48. "time"
  49. "net"
  50. "encoding/base64"
  51. web "github.com/dutchcoders/transfer.sh-web"
  52. "github.com/gorilla/mux"
  53. "github.com/microcosm-cc/bluemonday"
  54. "github.com/skip2/go-qrcode"
  55. )
  56. const getPathPart = "get"
  57. var (
  58. htmlTemplates = initHTMLTemplates()
  59. textTemplates = initTextTemplates()
  60. )
  61. func stripPrefix(path string) string {
  62. return strings.Replace(path, web.Prefix+"/", "", -1)
  63. }
  64. func initTextTemplates() *text_template.Template {
  65. templateMap := text_template.FuncMap{"format": formatNumber}
  66. // Templates with functions available to them
  67. var templates = text_template.New("").Funcs(templateMap)
  68. return templates
  69. }
  70. func initHTMLTemplates() *html_template.Template {
  71. templateMap := html_template.FuncMap{"format": formatNumber}
  72. // Templates with functions available to them
  73. var templates = html_template.New("").Funcs(templateMap)
  74. return templates
  75. }
  76. func healthHandler(w http.ResponseWriter, r *http.Request) {
  77. fmt.Fprintf(w, "Approaching Neutral Zone, all systems normal and functioning.")
  78. }
  79. /* The preview handler will show a preview of the content for browsers (accept type text/html), and referer is not transfer.sh */
  80. func (s *Server) previewHandler(w http.ResponseWriter, r *http.Request) {
  81. vars := mux.Vars(r)
  82. token := vars["token"]
  83. filename := vars["filename"]
  84. metadata, err := s.CheckMetadata(token, filename, false)
  85. if err != nil {
  86. log.Printf("Error metadata: %s", err.Error())
  87. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  88. return
  89. }
  90. contentType := metadata.ContentType
  91. contentLength, err := s.storage.Head(token, filename)
  92. if err != nil {
  93. http.Error(w, http.StatusText(404), 404)
  94. return
  95. }
  96. var templatePath string
  97. var content html_template.HTML
  98. switch {
  99. case strings.HasPrefix(contentType, "image/"):
  100. templatePath = "download.image.html"
  101. case strings.HasPrefix(contentType, "video/"):
  102. templatePath = "download.video.html"
  103. case strings.HasPrefix(contentType, "audio/"):
  104. templatePath = "download.audio.html"
  105. case strings.HasPrefix(contentType, "text/"):
  106. templatePath = "download.markdown.html"
  107. var reader io.ReadCloser
  108. if reader, _, err = s.storage.Get(token, filename); err != nil {
  109. http.Error(w, err.Error(), http.StatusInternalServerError)
  110. return
  111. }
  112. var data []byte
  113. data = make([]byte, _5M)
  114. if _, err = reader.Read(data); err != io.EOF && err != nil {
  115. http.Error(w, err.Error(), http.StatusInternalServerError)
  116. return
  117. }
  118. if strings.HasPrefix(contentType, "text/x-markdown") || strings.HasPrefix(contentType, "text/markdown") {
  119. unsafe := blackfriday.Run(data)
  120. output := bluemonday.UGCPolicy().SanitizeBytes(unsafe)
  121. content = html_template.HTML(output)
  122. } else if strings.HasPrefix(contentType, "text/plain") {
  123. content = html_template.HTML(fmt.Sprintf("<pre>%s</pre>", html.EscapeString(string(data))))
  124. } else {
  125. templatePath = "download.sandbox.html"
  126. }
  127. default:
  128. templatePath = "download.html"
  129. }
  130. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  131. resolvedURL := resolveURL(r, relativeURL, s.proxyPort)
  132. relativeURLGet, _ := url.Parse(path.Join(s.proxyPath, getPathPart, token, filename))
  133. resolvedURLGet := resolveURL(r, relativeURLGet, s.proxyPort)
  134. var png []byte
  135. png, err = qrcode.Encode(resolvedURL, qrcode.High, 150)
  136. if err != nil {
  137. http.Error(w, err.Error(), http.StatusInternalServerError)
  138. return
  139. }
  140. qrCode := base64.StdEncoding.EncodeToString(png)
  141. hostname := getURL(r, s.proxyPort).Host
  142. webAddress := resolveWebAddress(r, s.proxyPath, s.proxyPort)
  143. data := struct {
  144. ContentType string
  145. Content html_template.HTML
  146. Filename string
  147. Url string
  148. UrlGet string
  149. Hostname string
  150. WebAddress string
  151. ContentLength uint64
  152. GAKey string
  153. UserVoiceKey string
  154. QRCode string
  155. }{
  156. contentType,
  157. content,
  158. filename,
  159. resolvedURL,
  160. resolvedURLGet,
  161. hostname,
  162. webAddress,
  163. contentLength,
  164. s.gaKey,
  165. s.userVoiceKey,
  166. qrCode,
  167. }
  168. if err := htmlTemplates.ExecuteTemplate(w, templatePath, data); err != nil {
  169. http.Error(w, err.Error(), http.StatusInternalServerError)
  170. return
  171. }
  172. }
  173. // this handler will output html or text, depending on the
  174. // support of the client (Accept header).
  175. func (s *Server) viewHandler(w http.ResponseWriter, r *http.Request) {
  176. // vars := mux.Vars(r)
  177. hostname := getURL(r, s.proxyPort).Host
  178. webAddress := resolveWebAddress(r, s.proxyPath, s.proxyPort)
  179. data := struct {
  180. Hostname string
  181. WebAddress string
  182. GAKey string
  183. UserVoiceKey string
  184. }{
  185. hostname,
  186. webAddress,
  187. s.gaKey,
  188. s.userVoiceKey,
  189. }
  190. if acceptsHTML(r.Header) {
  191. if err := htmlTemplates.ExecuteTemplate(w, "index.html", data); err != nil {
  192. http.Error(w, err.Error(), http.StatusInternalServerError)
  193. return
  194. }
  195. } else {
  196. if err := textTemplates.ExecuteTemplate(w, "index.txt", data); err != nil {
  197. http.Error(w, err.Error(), http.StatusInternalServerError)
  198. return
  199. }
  200. }
  201. }
  202. func (s *Server) notFoundHandler(w http.ResponseWriter, r *http.Request) {
  203. http.Error(w, http.StatusText(404), 404)
  204. }
  205. func sanitize(fileName string) string {
  206. return path.Clean(path.Base(fileName))
  207. }
  208. func (s *Server) postHandler(w http.ResponseWriter, r *http.Request) {
  209. if err := r.ParseMultipartForm(_24K); nil != err {
  210. log.Printf("%s", err.Error())
  211. http.Error(w, "Error occurred copying to output stream", 500)
  212. return
  213. }
  214. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  215. w.Header().Set("Content-Type", "text/plain")
  216. for _, fheaders := range r.MultipartForm.File {
  217. for _, fheader := range fheaders {
  218. filename := sanitize(fheader.Filename)
  219. contentType := fheader.Header.Get("Content-Type")
  220. if contentType == "" {
  221. contentType = mime.TypeByExtension(filepath.Ext(fheader.Filename))
  222. }
  223. var f io.Reader
  224. var err error
  225. if f, err = fheader.Open(); err != nil {
  226. log.Printf("%s", err.Error())
  227. http.Error(w, err.Error(), 500)
  228. return
  229. }
  230. var b bytes.Buffer
  231. n, err := io.CopyN(&b, f, _24K+1)
  232. if err != nil && err != io.EOF {
  233. log.Printf("%s", err.Error())
  234. http.Error(w, err.Error(), 500)
  235. return
  236. }
  237. var file *os.File
  238. var reader io.Reader
  239. if n > _24K {
  240. file, err = ioutil.TempFile(s.tempPath, "transfer-")
  241. if err != nil {
  242. log.Fatal(err)
  243. }
  244. n, err = io.Copy(file, io.MultiReader(&b, f))
  245. if err != nil {
  246. cleanTmpFile(file)
  247. log.Printf("%s", err.Error())
  248. http.Error(w, err.Error(), 500)
  249. return
  250. }
  251. reader, err = os.Open(file.Name())
  252. } else {
  253. reader = bytes.NewReader(b.Bytes())
  254. }
  255. contentLength := n
  256. if s.maxUploadSize > 0 && contentLength > s.maxUploadSize {
  257. log.Print("Entity too large")
  258. http.Error(w, http.StatusText(http.StatusRequestEntityTooLarge), http.StatusRequestEntityTooLarge)
  259. return
  260. }
  261. metadata := MetadataForRequest(contentType, r)
  262. buffer := &bytes.Buffer{}
  263. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  264. log.Printf("%s", err.Error())
  265. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  266. cleanTmpFile(file)
  267. return
  268. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  269. log.Printf("%s", err.Error())
  270. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  271. cleanTmpFile(file)
  272. return
  273. }
  274. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  275. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  276. log.Printf("Backend storage error: %s", err.Error())
  277. http.Error(w, err.Error(), 500)
  278. return
  279. }
  280. filename = url.PathEscape(filename)
  281. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  282. fmt.Fprintln(w, getURL(r, s.proxyPort).ResolveReference(relativeURL).String())
  283. cleanTmpFile(file)
  284. }
  285. }
  286. }
  287. func cleanTmpFile(f *os.File) {
  288. if f != nil {
  289. err := f.Close()
  290. if err != nil {
  291. log.Printf("Error closing tmpfile: %s (%s)", err, f.Name())
  292. }
  293. err = os.Remove(f.Name())
  294. if err != nil {
  295. log.Printf("Error removing tmpfile: %s (%s)", err, f.Name())
  296. }
  297. }
  298. }
  299. type Metadata struct {
  300. // ContentType is the original uploading content type
  301. ContentType string
  302. // Secret as knowledge to delete file
  303. // Secret string
  304. // Downloads is the actual number of downloads
  305. Downloads int
  306. // MaxDownloads contains the maximum numbers of downloads
  307. MaxDownloads int
  308. // MaxDate contains the max age of the file
  309. MaxDate time.Time
  310. // DeletionToken contains the token to match against for deletion
  311. DeletionToken string
  312. }
  313. func MetadataForRequest(contentType string, r *http.Request) Metadata {
  314. metadata := Metadata{
  315. ContentType: contentType,
  316. MaxDate: time.Time{},
  317. Downloads: 0,
  318. MaxDownloads: -1,
  319. DeletionToken: Encode(10000000+int64(rand.Intn(1000000000))) + Encode(10000000+int64(rand.Intn(1000000000))),
  320. }
  321. if v := r.Header.Get("Max-Downloads"); v == "" {
  322. } else if v, err := strconv.Atoi(v); err != nil {
  323. } else {
  324. metadata.MaxDownloads = v
  325. }
  326. if v := r.Header.Get("Max-Days"); v == "" {
  327. } else if v, err := strconv.Atoi(v); err != nil {
  328. } else {
  329. metadata.MaxDate = time.Now().Add(time.Hour * 24 * time.Duration(v))
  330. }
  331. return metadata
  332. }
  333. func (s *Server) putHandler(w http.ResponseWriter, r *http.Request) {
  334. vars := mux.Vars(r)
  335. filename := sanitize(vars["filename"])
  336. contentLength := r.ContentLength
  337. var reader io.Reader
  338. reader = r.Body
  339. defer r.Body.Close()
  340. if contentLength == -1 {
  341. // queue file to disk, because s3 needs content length
  342. var err error
  343. var f io.Reader
  344. f = reader
  345. var b bytes.Buffer
  346. n, err := io.CopyN(&b, f, _24K+1)
  347. if err != nil && err != io.EOF {
  348. log.Printf("Error putting new file: %s", err.Error())
  349. http.Error(w, err.Error(), 500)
  350. return
  351. }
  352. var file *os.File
  353. if n > _24K {
  354. file, err = ioutil.TempFile(s.tempPath, "transfer-")
  355. if err != nil {
  356. log.Printf("%s", err.Error())
  357. http.Error(w, err.Error(), 500)
  358. return
  359. }
  360. defer cleanTmpFile(file)
  361. n, err = io.Copy(file, io.MultiReader(&b, f))
  362. if err != nil {
  363. log.Printf("%s", err.Error())
  364. http.Error(w, err.Error(), 500)
  365. return
  366. }
  367. reader, err = os.Open(file.Name())
  368. } else {
  369. reader = bytes.NewReader(b.Bytes())
  370. }
  371. contentLength = n
  372. }
  373. if s.maxUploadSize > 0 && contentLength > s.maxUploadSize {
  374. log.Print("Entity too large")
  375. http.Error(w, http.StatusText(http.StatusRequestEntityTooLarge), http.StatusRequestEntityTooLarge)
  376. return
  377. }
  378. if contentLength == 0 {
  379. log.Print("Empty content-length")
  380. http.Error(w, errors.New("Could not upload empty file").Error(), 400)
  381. return
  382. }
  383. contentType := r.Header.Get("Content-Type")
  384. if contentType == "" {
  385. contentType = mime.TypeByExtension(filepath.Ext(vars["filename"]))
  386. }
  387. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  388. metadata := MetadataForRequest(contentType, r)
  389. buffer := &bytes.Buffer{}
  390. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  391. log.Printf("%s", err.Error())
  392. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  393. return
  394. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  395. log.Printf("%s", err.Error())
  396. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  397. return
  398. }
  399. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  400. var err error
  401. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  402. log.Printf("Error putting new file: %s", err.Error())
  403. http.Error(w, errors.New("Could not save file").Error(), 500)
  404. return
  405. }
  406. // w.Statuscode = 200
  407. w.Header().Set("Content-Type", "text/plain")
  408. filename = url.PathEscape(filename)
  409. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  410. deleteURL, _ := url.Parse(path.Join(s.proxyPath, token, filename, metadata.DeletionToken))
  411. w.Header().Set("X-Url-Delete", resolveURL(r, deleteURL, s.proxyPort))
  412. fmt.Fprint(w, resolveURL(r, relativeURL, s.proxyPort))
  413. }
  414. func resolveURL(r *http.Request, u *url.URL, proxyPort string) string {
  415. r.URL.Path = ""
  416. return getURL(r, proxyPort).ResolveReference(u).String()
  417. }
  418. func resolveKey(key, proxyPath string) string {
  419. if strings.HasPrefix(key, "/") {
  420. key = key[1:]
  421. }
  422. if strings.HasPrefix(key, proxyPath) {
  423. key = key[len(proxyPath):]
  424. }
  425. key = strings.Replace(key, "\\", "/", -1)
  426. return key
  427. }
  428. func resolveWebAddress(r *http.Request, proxyPath string, proxyPort string) string {
  429. url := getURL(r, proxyPort)
  430. var webAddress string
  431. if len(proxyPath) == 0 {
  432. webAddress = fmt.Sprintf("%s://%s/",
  433. url.ResolveReference(url).Scheme,
  434. url.ResolveReference(url).Host)
  435. } else {
  436. webAddress = fmt.Sprintf("%s://%s/%s",
  437. url.ResolveReference(url).Scheme,
  438. url.ResolveReference(url).Host,
  439. proxyPath)
  440. }
  441. return webAddress
  442. }
  443. // Similar to the logic found here:
  444. // https://github.com/golang/go/blob/release-branch.go1.14/src/net/http/clone.go#L22-L33
  445. func cloneURL(u *url.URL) *url.URL {
  446. c := &url.URL{}
  447. *c = *u
  448. if u.User != nil {
  449. c.User = &url.Userinfo{}
  450. *c.User = *u.User
  451. }
  452. return c
  453. }
  454. func getURL(r *http.Request, proxyPort string) *url.URL {
  455. u := cloneURL(r.URL)
  456. if r.TLS != nil {
  457. u.Scheme = "https"
  458. } else if proto := r.Header.Get("X-Forwarded-Proto"); proto != "" {
  459. u.Scheme = proto
  460. } else {
  461. u.Scheme = "http"
  462. }
  463. if u.Host == "" {
  464. host, port, err := net.SplitHostPort(r.Host)
  465. if err != nil {
  466. host = r.Host
  467. port = ""
  468. }
  469. if len(proxyPort) != 0 {
  470. port = proxyPort
  471. }
  472. if len(port) == 0 {
  473. u.Host = host
  474. } else {
  475. if port == "80" && u.Scheme == "http" {
  476. u.Host = host
  477. } else if port == "443" && u.Scheme == "https" {
  478. u.Host = host
  479. } else {
  480. u.Host = net.JoinHostPort(host, port)
  481. }
  482. }
  483. }
  484. return u
  485. }
  486. func (metadata Metadata) remainingLimitHeaderValues() (remainingDownloads, remainingDays string) {
  487. if metadata.MaxDate.IsZero() {
  488. remainingDays = "n/a"
  489. } else {
  490. timeDifference := metadata.MaxDate.Sub(time.Now())
  491. remainingDays = strconv.Itoa(int(timeDifference.Hours()/24) + 1)
  492. }
  493. if metadata.MaxDownloads == -1 {
  494. remainingDownloads = "n/a"
  495. } else {
  496. remainingDownloads = strconv.Itoa(metadata.MaxDownloads - metadata.Downloads)
  497. }
  498. return remainingDownloads, remainingDays
  499. }
  500. func (s *Server) Lock(token, filename string) error {
  501. key := path.Join(token, filename)
  502. if _, ok := s.locks[key]; !ok {
  503. s.locks[key] = &sync.Mutex{}
  504. }
  505. s.locks[key].Lock()
  506. return nil
  507. }
  508. func (s *Server) Unlock(token, filename string) error {
  509. key := path.Join(token, filename)
  510. s.locks[key].Unlock()
  511. return nil
  512. }
  513. func (s *Server) CheckMetadata(token, filename string, increaseDownload bool) (Metadata, error) {
  514. s.Lock(token, filename)
  515. defer s.Unlock(token, filename)
  516. var metadata Metadata
  517. r, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  518. if err != nil {
  519. return metadata, err
  520. }
  521. defer r.Close()
  522. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  523. return metadata, err
  524. } else if metadata.MaxDownloads != -1 && metadata.Downloads >= metadata.MaxDownloads {
  525. return metadata, errors.New("MaxDownloads expired.")
  526. } else if !metadata.MaxDate.IsZero() && time.Now().After(metadata.MaxDate) {
  527. return metadata, errors.New("MaxDate expired.")
  528. } else {
  529. // todo(nl5887): mutex?
  530. // update number of downloads
  531. if increaseDownload {
  532. metadata.Downloads++
  533. }
  534. buffer := &bytes.Buffer{}
  535. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  536. return metadata, errors.New("Could not encode metadata")
  537. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  538. return metadata, errors.New("Could not save metadata")
  539. }
  540. }
  541. return metadata, nil
  542. }
  543. func (s *Server) CheckDeletionToken(deletionToken, token, filename string) error {
  544. s.Lock(token, filename)
  545. defer s.Unlock(token, filename)
  546. var metadata Metadata
  547. r, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  548. if s.storage.IsNotExist(err) {
  549. return nil
  550. } else if err != nil {
  551. return err
  552. }
  553. defer r.Close()
  554. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  555. return err
  556. } else if metadata.DeletionToken != deletionToken {
  557. return errors.New("Deletion token doesn't match.")
  558. }
  559. return nil
  560. }
  561. func (s *Server) purgeHandler() {
  562. ticker := time.NewTicker(s.purgeInterval)
  563. go func() {
  564. for {
  565. select {
  566. case <-ticker.C:
  567. err := s.storage.Purge(s.purgeDays)
  568. log.Printf("error cleaning up expired files: %v", err)
  569. }
  570. }
  571. }()
  572. }
  573. func (s *Server) deleteHandler(w http.ResponseWriter, r *http.Request) {
  574. vars := mux.Vars(r)
  575. token := vars["token"]
  576. filename := vars["filename"]
  577. deletionToken := vars["deletionToken"]
  578. if err := s.CheckDeletionToken(deletionToken, token, filename); err != nil {
  579. log.Printf("Error metadata: %s", err.Error())
  580. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  581. return
  582. }
  583. err := s.storage.Delete(token, filename)
  584. if s.storage.IsNotExist(err) {
  585. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  586. return
  587. } else if err != nil {
  588. log.Printf("%s", err.Error())
  589. http.Error(w, "Could not delete file.", 500)
  590. return
  591. }
  592. }
  593. func (s *Server) zipHandler(w http.ResponseWriter, r *http.Request) {
  594. vars := mux.Vars(r)
  595. files := vars["files"]
  596. zipfilename := fmt.Sprintf("transfersh-%d.zip", uint16(time.Now().UnixNano()))
  597. w.Header().Set("Content-Type", "application/zip")
  598. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", zipfilename))
  599. w.Header().Set("Connection", "close")
  600. zw := zip.NewWriter(w)
  601. for _, key := range strings.Split(files, ",") {
  602. key = resolveKey(key, s.proxyPath)
  603. token := strings.Split(key, "/")[0]
  604. filename := sanitize(strings.Split(key, "/")[1])
  605. if _, err := s.CheckMetadata(token, filename, true); err != nil {
  606. log.Printf("Error metadata: %s", err.Error())
  607. continue
  608. }
  609. reader, _, err := s.storage.Get(token, filename)
  610. if err != nil {
  611. if s.storage.IsNotExist(err) {
  612. http.Error(w, "File not found", 404)
  613. return
  614. } else {
  615. log.Printf("%s", err.Error())
  616. http.Error(w, "Could not retrieve file.", 500)
  617. return
  618. }
  619. }
  620. defer reader.Close()
  621. header := &zip.FileHeader{
  622. Name: strings.Split(key, "/")[1],
  623. Method: zip.Store,
  624. ModifiedTime: uint16(time.Now().UnixNano()),
  625. ModifiedDate: uint16(time.Now().UnixNano()),
  626. }
  627. fw, err := zw.CreateHeader(header)
  628. if err != nil {
  629. log.Printf("%s", err.Error())
  630. http.Error(w, "Internal server error.", 500)
  631. return
  632. }
  633. if _, err = io.Copy(fw, reader); err != nil {
  634. log.Printf("%s", err.Error())
  635. http.Error(w, "Internal server error.", 500)
  636. return
  637. }
  638. }
  639. if err := zw.Close(); err != nil {
  640. log.Printf("%s", err.Error())
  641. http.Error(w, "Internal server error.", 500)
  642. return
  643. }
  644. }
  645. func (s *Server) tarGzHandler(w http.ResponseWriter, r *http.Request) {
  646. vars := mux.Vars(r)
  647. files := vars["files"]
  648. tarfilename := fmt.Sprintf("transfersh-%d.tar.gz", uint16(time.Now().UnixNano()))
  649. w.Header().Set("Content-Type", "application/x-gzip")
  650. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  651. w.Header().Set("Connection", "close")
  652. os := gzip.NewWriter(w)
  653. defer os.Close()
  654. zw := tar.NewWriter(os)
  655. defer zw.Close()
  656. for _, key := range strings.Split(files, ",") {
  657. key = resolveKey(key, s.proxyPath)
  658. token := strings.Split(key, "/")[0]
  659. filename := sanitize(strings.Split(key, "/")[1])
  660. if _, err := s.CheckMetadata(token, filename, true); err != nil {
  661. log.Printf("Error metadata: %s", err.Error())
  662. continue
  663. }
  664. reader, contentLength, err := s.storage.Get(token, filename)
  665. if err != nil {
  666. if s.storage.IsNotExist(err) {
  667. http.Error(w, "File not found", 404)
  668. return
  669. } else {
  670. log.Printf("%s", err.Error())
  671. http.Error(w, "Could not retrieve file.", 500)
  672. return
  673. }
  674. }
  675. defer reader.Close()
  676. header := &tar.Header{
  677. Name: strings.Split(key, "/")[1],
  678. Size: int64(contentLength),
  679. }
  680. err = zw.WriteHeader(header)
  681. if err != nil {
  682. log.Printf("%s", err.Error())
  683. http.Error(w, "Internal server error.", 500)
  684. return
  685. }
  686. if _, err = io.Copy(zw, reader); err != nil {
  687. log.Printf("%s", err.Error())
  688. http.Error(w, "Internal server error.", 500)
  689. return
  690. }
  691. }
  692. }
  693. func (s *Server) tarHandler(w http.ResponseWriter, r *http.Request) {
  694. vars := mux.Vars(r)
  695. files := vars["files"]
  696. tarfilename := fmt.Sprintf("transfersh-%d.tar", uint16(time.Now().UnixNano()))
  697. w.Header().Set("Content-Type", "application/x-tar")
  698. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  699. w.Header().Set("Connection", "close")
  700. zw := tar.NewWriter(w)
  701. defer zw.Close()
  702. for _, key := range strings.Split(files, ",") {
  703. key = resolveKey(key, s.proxyPath)
  704. token := strings.Split(key, "/")[0]
  705. filename := strings.Split(key, "/")[1]
  706. if _, err := s.CheckMetadata(token, filename, true); err != nil {
  707. log.Printf("Error metadata: %s", err.Error())
  708. continue
  709. }
  710. reader, contentLength, err := s.storage.Get(token, filename)
  711. if err != nil {
  712. if s.storage.IsNotExist(err) {
  713. http.Error(w, "File not found", 404)
  714. return
  715. } else {
  716. log.Printf("%s", err.Error())
  717. http.Error(w, "Could not retrieve file.", 500)
  718. return
  719. }
  720. }
  721. defer reader.Close()
  722. header := &tar.Header{
  723. Name: strings.Split(key, "/")[1],
  724. Size: int64(contentLength),
  725. }
  726. err = zw.WriteHeader(header)
  727. if err != nil {
  728. log.Printf("%s", err.Error())
  729. http.Error(w, "Internal server error.", 500)
  730. return
  731. }
  732. if _, err = io.Copy(zw, reader); err != nil {
  733. log.Printf("%s", err.Error())
  734. http.Error(w, "Internal server error.", 500)
  735. return
  736. }
  737. }
  738. }
  739. func (s *Server) headHandler(w http.ResponseWriter, r *http.Request) {
  740. vars := mux.Vars(r)
  741. token := vars["token"]
  742. filename := vars["filename"]
  743. metadata, err := s.CheckMetadata(token, filename, false)
  744. if err != nil {
  745. log.Printf("Error metadata: %s", err.Error())
  746. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  747. return
  748. }
  749. contentType := metadata.ContentType
  750. contentLength, err := s.storage.Head(token, filename)
  751. if s.storage.IsNotExist(err) {
  752. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  753. return
  754. } else if err != nil {
  755. log.Printf("%s", err.Error())
  756. http.Error(w, "Could not retrieve file.", 500)
  757. return
  758. }
  759. remainingDownloads, remainingDays := metadata.remainingLimitHeaderValues()
  760. w.Header().Set("Content-Type", contentType)
  761. w.Header().Set("Content-Length", strconv.FormatUint(contentLength, 10))
  762. w.Header().Set("Connection", "close")
  763. w.Header().Set("X-Remaining-Downloads", remainingDownloads)
  764. w.Header().Set("X-Remaining-Days", remainingDays)
  765. }
  766. func (s *Server) getHandler(w http.ResponseWriter, r *http.Request) {
  767. vars := mux.Vars(r)
  768. action := vars["action"]
  769. token := vars["token"]
  770. filename := vars["filename"]
  771. metadata, err := s.CheckMetadata(token, filename, true)
  772. if err != nil {
  773. log.Printf("Error metadata: %s", err.Error())
  774. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  775. return
  776. }
  777. contentType := metadata.ContentType
  778. reader, contentLength, err := s.storage.Get(token, filename)
  779. if s.storage.IsNotExist(err) {
  780. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  781. return
  782. } else if err != nil {
  783. log.Printf("%s", err.Error())
  784. http.Error(w, "Could not retrieve file.", 500)
  785. return
  786. }
  787. defer reader.Close()
  788. var disposition string
  789. if action == "inline" {
  790. disposition = "inline"
  791. } else {
  792. disposition = "attachment"
  793. }
  794. remainingDownloads, remainingDays := metadata.remainingLimitHeaderValues()
  795. w.Header().Set("Content-Type", contentType)
  796. w.Header().Set("Content-Length", strconv.FormatUint(contentLength, 10))
  797. w.Header().Set("Content-Disposition", fmt.Sprintf("%s; filename=\"%s\"", disposition, filename))
  798. w.Header().Set("Connection", "keep-alive")
  799. w.Header().Set("X-Remaining-Downloads", remainingDownloads)
  800. w.Header().Set("X-Remaining-Days", remainingDays)
  801. if w.Header().Get("Range") == "" {
  802. if _, err = io.Copy(w, reader); err != nil {
  803. log.Printf("%s", err.Error())
  804. http.Error(w, "Error occurred copying to output stream", 500)
  805. return
  806. }
  807. return
  808. }
  809. file, err := ioutil.TempFile(s.tempPath, "range-")
  810. if err != nil {
  811. log.Printf("%s", err.Error())
  812. http.Error(w, "Error occurred copying to output stream", 500)
  813. return
  814. }
  815. defer cleanTmpFile(file)
  816. tee := io.TeeReader(reader, file)
  817. for {
  818. b := make([]byte, _5M)
  819. _, err = tee.Read(b)
  820. if err == io.EOF {
  821. break
  822. }
  823. if err != nil {
  824. log.Printf("%s", err.Error())
  825. http.Error(w, "Error occurred copying to output stream", 500)
  826. return
  827. }
  828. }
  829. http.ServeContent(w, r, filename, time.Now(), file)
  830. }
  831. func (s *Server) RedirectHandler(h http.Handler) http.HandlerFunc {
  832. return func(w http.ResponseWriter, r *http.Request) {
  833. if !s.forceHTTPs {
  834. // we don't want to enforce https
  835. } else if r.URL.Path == "/health.html" {
  836. // health check url won't redirect
  837. } else if strings.HasSuffix(ipAddrFromRemoteAddr(r.Host), ".onion") {
  838. // .onion addresses cannot get a valid certificate, so don't redirect
  839. } else if r.Header.Get("X-Forwarded-Proto") == "https" {
  840. } else if r.URL.Scheme == "https" {
  841. } else {
  842. u := getURL(r, s.proxyPort)
  843. u.Scheme = "https"
  844. http.Redirect(w, r, u.String(), http.StatusPermanentRedirect)
  845. return
  846. }
  847. h.ServeHTTP(w, r)
  848. }
  849. }
  850. // Create a log handler for every request it receives.
  851. func LoveHandler(h http.Handler) http.HandlerFunc {
  852. return func(w http.ResponseWriter, r *http.Request) {
  853. w.Header().Set("x-made-with", "<3 by DutchCoders")
  854. w.Header().Set("x-served-by", "Proudly served by DutchCoders")
  855. w.Header().Set("Server", "Transfer.sh HTTP Server 1.0")
  856. h.ServeHTTP(w, r)
  857. }
  858. }
  859. func IPFilterHandler(h http.Handler, ipFilterOptions *IPFilterOptions) http.HandlerFunc {
  860. return func(w http.ResponseWriter, r *http.Request) {
  861. if ipFilterOptions == nil {
  862. h.ServeHTTP(w, r)
  863. } else {
  864. WrapIPFilter(h, *ipFilterOptions).ServeHTTP(w, r)
  865. }
  866. return
  867. }
  868. }
  869. func (s *Server) BasicAuthHandler(h http.Handler) http.HandlerFunc {
  870. return func(w http.ResponseWriter, r *http.Request) {
  871. if s.AuthUser == "" || s.AuthPass == "" {
  872. h.ServeHTTP(w, r)
  873. return
  874. }
  875. w.Header().Set("WWW-Authenticate", "Basic realm=\"Restricted\"")
  876. username, password, authOK := r.BasicAuth()
  877. if authOK == false {
  878. http.Error(w, "Not authorized", 401)
  879. return
  880. }
  881. if username != s.AuthUser || password != s.AuthPass {
  882. http.Error(w, "Not authorized", 401)
  883. return
  884. }
  885. h.ServeHTTP(w, r)
  886. }
  887. }