You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

1022 lines
25 KiB

  1. /*
  2. The MIT License (MIT)
  3. Copyright (c) 2014-2017 DutchCoders [https://github.com/dutchcoders/]
  4. Permission is hereby granted, free of charge, to any person obtaining a copy
  5. of this software and associated documentation files (the "Software"), to deal
  6. in the Software without restriction, including without limitation the rights
  7. to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  8. copies of the Software, and to permit persons to whom the Software is
  9. furnished to do so, subject to the following conditions:
  10. The above copyright notice and this permission notice shall be included in
  11. all copies or substantial portions of the Software.
  12. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  13. IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  14. FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  15. AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  16. LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  17. OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  18. THE SOFTWARE.
  19. */
  20. package server
  21. import (
  22. // _ "transfer.sh/app/handlers"
  23. // _ "transfer.sh/app/utils"
  24. "archive/tar"
  25. "archive/zip"
  26. "bytes"
  27. "compress/gzip"
  28. "encoding/json"
  29. "errors"
  30. "fmt"
  31. blackfriday "gopkg.in/russross/blackfriday.v2"
  32. "html"
  33. html_template "html/template"
  34. "io"
  35. "io/ioutil"
  36. "log"
  37. "math/rand"
  38. "mime"
  39. "net/http"
  40. "net/url"
  41. "os"
  42. "path"
  43. "path/filepath"
  44. "strconv"
  45. "strings"
  46. "sync"
  47. text_template "text/template"
  48. "time"
  49. "net"
  50. "encoding/base64"
  51. web "github.com/dutchcoders/transfer.sh-web"
  52. "github.com/gorilla/mux"
  53. "github.com/microcosm-cc/bluemonday"
  54. "github.com/skip2/go-qrcode"
  55. )
  56. var (
  57. htmlTemplates = initHTMLTemplates()
  58. textTemplates = initTextTemplates()
  59. )
  60. func stripPrefix(path string) string {
  61. return strings.Replace(path, web.Prefix+"/", "", -1)
  62. }
  63. func initTextTemplates() *text_template.Template {
  64. templateMap := text_template.FuncMap{"format": formatNumber}
  65. // Templates with functions available to them
  66. var templates = text_template.New("").Funcs(templateMap)
  67. return templates
  68. }
  69. func initHTMLTemplates() *html_template.Template {
  70. templateMap := html_template.FuncMap{"format": formatNumber}
  71. // Templates with functions available to them
  72. var templates = html_template.New("").Funcs(templateMap)
  73. return templates
  74. }
  75. func healthHandler(w http.ResponseWriter, r *http.Request) {
  76. fmt.Fprintf(w, "Approaching Neutral Zone, all systems normal and functioning.")
  77. }
  78. /* The preview handler will show a preview of the content for browsers (accept type text/html), and referer is not transfer.sh */
  79. func (s *Server) previewHandler(w http.ResponseWriter, r *http.Request) {
  80. vars := mux.Vars(r)
  81. token := vars["token"]
  82. filename := vars["filename"]
  83. contentType, contentLength, err := s.storage.Head(token, filename)
  84. if err != nil {
  85. http.Error(w, http.StatusText(404), 404)
  86. return
  87. }
  88. var templatePath string
  89. var content html_template.HTML
  90. switch {
  91. case strings.HasPrefix(contentType, "image/"):
  92. templatePath = "download.image.html"
  93. case strings.HasPrefix(contentType, "video/"):
  94. templatePath = "download.video.html"
  95. case strings.HasPrefix(contentType, "audio/"):
  96. templatePath = "download.audio.html"
  97. case strings.HasPrefix(contentType, "text/"):
  98. templatePath = "download.markdown.html"
  99. var reader io.ReadCloser
  100. if reader, _, _, err = s.storage.Get(token, filename); err != nil {
  101. http.Error(w, err.Error(), http.StatusInternalServerError)
  102. return
  103. }
  104. var data []byte
  105. data = make([]byte, _5M)
  106. if _, err = reader.Read(data); err != io.EOF && err != nil {
  107. http.Error(w, err.Error(), http.StatusInternalServerError)
  108. return
  109. }
  110. if strings.HasPrefix(contentType, "text/x-markdown") || strings.HasPrefix(contentType, "text/markdown") {
  111. unsafe := blackfriday.Run(data)
  112. output := bluemonday.UGCPolicy().SanitizeBytes(unsafe)
  113. content = html_template.HTML(output)
  114. } else if strings.HasPrefix(contentType, "text/plain") {
  115. content = html_template.HTML(fmt.Sprintf("<pre>%s</pre>", html.EscapeString(string(data))))
  116. } else {
  117. templatePath = "download.sandbox.html"
  118. }
  119. default:
  120. templatePath = "download.html"
  121. }
  122. resolvedUrl := resolveUrl(r, getURL(r).ResolveReference(r.URL), true)
  123. var png []byte
  124. png, err = qrcode.Encode(resolvedUrl, qrcode.High, 150)
  125. if err != nil {
  126. http.Error(w, err.Error(), http.StatusInternalServerError)
  127. return
  128. }
  129. qrCode := base64.StdEncoding.EncodeToString(png)
  130. hostname := getURL(r).Host
  131. webAddress := resolveWebAddress(r, s.proxyPath)
  132. data := struct {
  133. ContentType string
  134. Content html_template.HTML
  135. Filename string
  136. Url string
  137. Hostname string
  138. WebAddress string
  139. ContentLength uint64
  140. GAKey string
  141. UserVoiceKey string
  142. QRCode string
  143. }{
  144. contentType,
  145. content,
  146. filename,
  147. resolvedUrl,
  148. hostname,
  149. webAddress,
  150. contentLength,
  151. s.gaKey,
  152. s.userVoiceKey,
  153. qrCode,
  154. }
  155. if err := htmlTemplates.ExecuteTemplate(w, templatePath, data); err != nil {
  156. http.Error(w, err.Error(), http.StatusInternalServerError)
  157. return
  158. }
  159. }
  160. // this handler will output html or text, depending on the
  161. // support of the client (Accept header).
  162. func (s *Server) viewHandler(w http.ResponseWriter, r *http.Request) {
  163. // vars := mux.Vars(r)
  164. hostname := getURL(r).Host
  165. webAddress := resolveWebAddress(r, s.proxyPath)
  166. data := struct {
  167. Hostname string
  168. WebAddress string
  169. GAKey string
  170. UserVoiceKey string
  171. }{
  172. hostname,
  173. webAddress,
  174. s.gaKey,
  175. s.userVoiceKey,
  176. }
  177. if acceptsHTML(r.Header) {
  178. if err := htmlTemplates.ExecuteTemplate(w, "index.html", data); err != nil {
  179. http.Error(w, err.Error(), http.StatusInternalServerError)
  180. return
  181. }
  182. } else {
  183. if err := textTemplates.ExecuteTemplate(w, "index.txt", data); err != nil {
  184. http.Error(w, err.Error(), http.StatusInternalServerError)
  185. return
  186. }
  187. }
  188. }
  189. func (s *Server) notFoundHandler(w http.ResponseWriter, r *http.Request) {
  190. http.Error(w, http.StatusText(404), 404)
  191. }
  192. func sanitize(fileName string) string {
  193. return path.Clean(path.Base(fileName))
  194. }
  195. func (s *Server) postHandler(w http.ResponseWriter, r *http.Request) {
  196. if err := r.ParseMultipartForm(_24K); nil != err {
  197. log.Printf("%s", err.Error())
  198. http.Error(w, "Error occurred copying to output stream", 500)
  199. return
  200. }
  201. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  202. w.Header().Set("Content-Type", "text/plain")
  203. for _, fheaders := range r.MultipartForm.File {
  204. for _, fheader := range fheaders {
  205. filename := sanitize(fheader.Filename)
  206. contentType := fheader.Header.Get("Content-Type")
  207. if contentType == "" {
  208. contentType = mime.TypeByExtension(filepath.Ext(fheader.Filename))
  209. }
  210. var f io.Reader
  211. var err error
  212. if f, err = fheader.Open(); err != nil {
  213. log.Printf("%s", err.Error())
  214. http.Error(w, err.Error(), 500)
  215. return
  216. }
  217. var b bytes.Buffer
  218. n, err := io.CopyN(&b, f, _24K+1)
  219. if err != nil && err != io.EOF {
  220. log.Printf("%s", err.Error())
  221. http.Error(w, err.Error(), 500)
  222. return
  223. }
  224. var file *os.File
  225. var reader io.Reader
  226. if n > _24K {
  227. file, err = ioutil.TempFile(s.tempPath, "transfer-")
  228. if err != nil {
  229. log.Fatal(err)
  230. }
  231. n, err = io.Copy(file, io.MultiReader(&b, f))
  232. if err != nil {
  233. cleanTmpFile(file)
  234. log.Printf("%s", err.Error())
  235. http.Error(w, err.Error(), 500)
  236. return
  237. }
  238. reader, err = os.Open(file.Name())
  239. } else {
  240. reader = bytes.NewReader(b.Bytes())
  241. }
  242. contentLength := n
  243. metadata := MetadataForRequest(contentType, r)
  244. buffer := &bytes.Buffer{}
  245. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  246. log.Printf("%s", err.Error())
  247. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  248. cleanTmpFile(file)
  249. return
  250. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  251. log.Printf("%s", err.Error())
  252. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  253. cleanTmpFile(file)
  254. return
  255. }
  256. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  257. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  258. log.Printf("Backend storage error: %s", err.Error())
  259. http.Error(w, err.Error(), 500)
  260. return
  261. }
  262. filename = url.QueryEscape(filename)
  263. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  264. fmt.Fprintln(w, getURL(r).ResolveReference(relativeURL).String())
  265. cleanTmpFile(file)
  266. }
  267. }
  268. }
  269. func cleanTmpFile(f *os.File) {
  270. if f != nil {
  271. err := f.Close()
  272. if err != nil {
  273. log.Printf("Error closing tmpfile: %s (%s)", err, f.Name())
  274. }
  275. err = os.Remove(f.Name())
  276. if err != nil {
  277. log.Printf("Error removing tmpfile: %s (%s)", err, f.Name())
  278. }
  279. }
  280. }
  281. type Metadata struct {
  282. // ContentType is the original uploading content type
  283. ContentType string
  284. // Secret as knowledge to delete file
  285. // Secret string
  286. // Downloads is the actual number of downloads
  287. Downloads int
  288. // MaxDownloads contains the maximum numbers of downloads
  289. MaxDownloads int
  290. // MaxDate contains the max age of the file
  291. MaxDate time.Time
  292. // DeletionToken contains the token to match against for deletion
  293. DeletionToken string
  294. }
  295. func MetadataForRequest(contentType string, r *http.Request) Metadata {
  296. metadata := Metadata{
  297. ContentType: contentType,
  298. MaxDate: time.Now().Add(time.Hour * 24 * 365 * 10),
  299. Downloads: 0,
  300. MaxDownloads: 99999999,
  301. DeletionToken: Encode(10000000+int64(rand.Intn(1000000000))) + Encode(10000000+int64(rand.Intn(1000000000))),
  302. }
  303. if v := r.Header.Get("Max-Downloads"); v == "" {
  304. } else if v, err := strconv.Atoi(v); err != nil {
  305. } else {
  306. metadata.MaxDownloads = v
  307. }
  308. if v := r.Header.Get("Max-Days"); v == "" {
  309. } else if v, err := strconv.Atoi(v); err != nil {
  310. } else {
  311. metadata.MaxDate = time.Now().Add(time.Hour * 24 * time.Duration(v))
  312. }
  313. return metadata
  314. }
  315. func (s *Server) putHandler(w http.ResponseWriter, r *http.Request) {
  316. vars := mux.Vars(r)
  317. filename := sanitize(vars["filename"])
  318. contentLength := r.ContentLength
  319. var reader io.Reader
  320. reader = r.Body
  321. defer r.Body.Close()
  322. if contentLength == -1 {
  323. // queue file to disk, because s3 needs content length
  324. var err error
  325. var f io.Reader
  326. f = reader
  327. var b bytes.Buffer
  328. n, err := io.CopyN(&b, f, _24K+1)
  329. if err != nil && err != io.EOF {
  330. log.Printf("Error putting new file: %s", err.Error())
  331. http.Error(w, err.Error(), 500)
  332. return
  333. }
  334. var file *os.File
  335. if n > _24K {
  336. file, err = ioutil.TempFile(s.tempPath, "transfer-")
  337. if err != nil {
  338. log.Printf("%s", err.Error())
  339. http.Error(w, err.Error(), 500)
  340. return
  341. }
  342. defer cleanTmpFile(file)
  343. n, err = io.Copy(file, io.MultiReader(&b, f))
  344. if err != nil {
  345. log.Printf("%s", err.Error())
  346. http.Error(w, err.Error(), 500)
  347. return
  348. }
  349. reader, err = os.Open(file.Name())
  350. } else {
  351. reader = bytes.NewReader(b.Bytes())
  352. }
  353. contentLength = n
  354. }
  355. if contentLength == 0 {
  356. log.Print("Empty content-length")
  357. http.Error(w, errors.New("Could not upload empty file").Error(), 400)
  358. return
  359. }
  360. contentType := r.Header.Get("Content-Type")
  361. if contentType == "" {
  362. contentType = mime.TypeByExtension(filepath.Ext(vars["filename"]))
  363. }
  364. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  365. metadata := MetadataForRequest(contentType, r)
  366. buffer := &bytes.Buffer{}
  367. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  368. log.Printf("%s", err.Error())
  369. http.Error(w, errors.New("Could not encode metadata").Error(), 500)
  370. return
  371. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  372. log.Printf("%s", err.Error())
  373. http.Error(w, errors.New("Could not save metadata").Error(), 500)
  374. return
  375. }
  376. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  377. var err error
  378. if err = s.storage.Put(token, filename, reader, contentType, uint64(contentLength)); err != nil {
  379. log.Printf("Error putting new file: %s", err.Error())
  380. http.Error(w, errors.New("Could not save file").Error(), 500)
  381. return
  382. }
  383. // w.Statuscode = 200
  384. w.Header().Set("Content-Type", "text/plain")
  385. filename = url.QueryEscape(filename)
  386. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  387. deleteUrl, _ := url.Parse(path.Join(s.proxyPath, token, filename, metadata.DeletionToken))
  388. w.Header().Set("X-Url-Delete", resolveUrl(r, deleteUrl, true))
  389. fmt.Fprint(w, resolveUrl(r, relativeURL, false))
  390. }
  391. func resolveUrl(r *http.Request, u *url.URL, absolutePath bool) string {
  392. if absolutePath {
  393. r.URL.Path = ""
  394. }
  395. return getURL(r).ResolveReference(u).String()
  396. }
  397. func resolveKey(key, proxyPath string) string {
  398. if strings.HasPrefix(key, "/") {
  399. key = key[1:]
  400. }
  401. if strings.HasPrefix(key, proxyPath) {
  402. key = key[len(proxyPath):]
  403. }
  404. key = strings.Replace(key, "\\", "/", -1)
  405. return key
  406. }
  407. func resolveWebAddress(r *http.Request, proxyPath string) string {
  408. url := getURL(r)
  409. var webAddress string
  410. if len(proxyPath) == 0 {
  411. webAddress = fmt.Sprintf("%s://%s/",
  412. url.ResolveReference(url).Scheme,
  413. url.ResolveReference(url).Host)
  414. } else {
  415. webAddress = fmt.Sprintf("%s://%s/%s",
  416. url.ResolveReference(url).Scheme,
  417. url.ResolveReference(url).Host,
  418. proxyPath)
  419. }
  420. return webAddress
  421. }
  422. func getURL(r *http.Request) *url.URL {
  423. u, _ := url.Parse(r.URL.String())
  424. if r.TLS != nil {
  425. u.Scheme = "https"
  426. } else if proto := r.Header.Get("X-Forwarded-Proto"); proto != "" {
  427. u.Scheme = proto
  428. } else {
  429. u.Scheme = "http"
  430. }
  431. if u.Host != "" {
  432. } else if host, port, err := net.SplitHostPort(r.Host); err != nil {
  433. u.Host = r.Host
  434. } else {
  435. if port == "80" && u.Scheme == "http" {
  436. u.Host = host
  437. } else if port == "443" && u.Scheme == "https" {
  438. u.Host = host
  439. } else {
  440. u.Host = net.JoinHostPort(host, port)
  441. }
  442. }
  443. return u
  444. }
  445. func (s *Server) Lock(token, filename string) error {
  446. key := path.Join(token, filename)
  447. if _, ok := s.locks[key]; !ok {
  448. s.locks[key] = &sync.Mutex{}
  449. }
  450. s.locks[key].Lock()
  451. return nil
  452. }
  453. func (s *Server) Unlock(token, filename string) error {
  454. key := path.Join(token, filename)
  455. s.locks[key].Unlock()
  456. return nil
  457. }
  458. func (s *Server) CheckMetadata(token, filename string) error {
  459. s.Lock(token, filename)
  460. defer s.Unlock(token, filename)
  461. var metadata Metadata
  462. r, _, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  463. if s.storage.IsNotExist(err) {
  464. return nil
  465. } else if err != nil {
  466. return err
  467. }
  468. defer r.Close()
  469. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  470. return err
  471. } else if metadata.Downloads >= metadata.MaxDownloads {
  472. return errors.New("MaxDownloads expired.")
  473. } else if time.Now().After(metadata.MaxDate) {
  474. return errors.New("MaxDate expired.")
  475. } else {
  476. // todo(nl5887): mutex?
  477. // update number of downloads
  478. metadata.Downloads++
  479. buffer := &bytes.Buffer{}
  480. if err := json.NewEncoder(buffer).Encode(metadata); err != nil {
  481. return errors.New("Could not encode metadata")
  482. } else if err := s.storage.Put(token, fmt.Sprintf("%s.metadata", filename), buffer, "text/json", uint64(buffer.Len())); err != nil {
  483. return errors.New("Could not save metadata")
  484. }
  485. }
  486. return nil
  487. }
  488. func (s *Server) CheckDeletionToken(deletionToken, token, filename string) error {
  489. s.Lock(token, filename)
  490. defer s.Unlock(token, filename)
  491. var metadata Metadata
  492. r, _, _, err := s.storage.Get(token, fmt.Sprintf("%s.metadata", filename))
  493. if s.storage.IsNotExist(err) {
  494. return nil
  495. } else if err != nil {
  496. return err
  497. }
  498. defer r.Close()
  499. if err := json.NewDecoder(r).Decode(&metadata); err != nil {
  500. return err
  501. } else if metadata.DeletionToken != deletionToken {
  502. return errors.New("Deletion token doesn't match.")
  503. }
  504. return nil
  505. }
  506. func (s *Server) deleteHandler(w http.ResponseWriter, r *http.Request) {
  507. vars := mux.Vars(r)
  508. token := vars["token"]
  509. filename := vars["filename"]
  510. deletionToken := vars["deletionToken"]
  511. if err := s.CheckDeletionToken(deletionToken, token, filename); err != nil {
  512. log.Printf("Error metadata: %s", err.Error())
  513. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  514. return
  515. }
  516. err := s.storage.Delete(token, filename)
  517. if s.storage.IsNotExist(err) {
  518. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  519. return
  520. } else if err != nil {
  521. log.Printf("%s", err.Error())
  522. http.Error(w, "Could not delete file.", 500)
  523. return
  524. }
  525. }
  526. func (s *Server) zipHandler(w http.ResponseWriter, r *http.Request) {
  527. vars := mux.Vars(r)
  528. files := vars["files"]
  529. zipfilename := fmt.Sprintf("transfersh-%d.zip", uint16(time.Now().UnixNano()))
  530. w.Header().Set("Content-Type", "application/zip")
  531. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", zipfilename))
  532. w.Header().Set("Connection", "close")
  533. zw := zip.NewWriter(w)
  534. for _, key := range strings.Split(files, ",") {
  535. key = resolveKey(key, s.proxyPath)
  536. token := strings.Split(key, "/")[0]
  537. filename := sanitize(strings.Split(key, "/")[1])
  538. if err := s.CheckMetadata(token, filename); err != nil {
  539. log.Printf("Error metadata: %s", err.Error())
  540. continue
  541. }
  542. reader, _, _, err := s.storage.Get(token, filename)
  543. if err != nil {
  544. if s.storage.IsNotExist(err) {
  545. http.Error(w, "File not found", 404)
  546. return
  547. } else {
  548. log.Printf("%s", err.Error())
  549. http.Error(w, "Could not retrieve file.", 500)
  550. return
  551. }
  552. }
  553. defer reader.Close()
  554. header := &zip.FileHeader{
  555. Name: strings.Split(key, "/")[1],
  556. Method: zip.Store,
  557. ModifiedTime: uint16(time.Now().UnixNano()),
  558. ModifiedDate: uint16(time.Now().UnixNano()),
  559. }
  560. fw, err := zw.CreateHeader(header)
  561. if err != nil {
  562. log.Printf("%s", err.Error())
  563. http.Error(w, "Internal server error.", 500)
  564. return
  565. }
  566. if _, err = io.Copy(fw, reader); err != nil {
  567. log.Printf("%s", err.Error())
  568. http.Error(w, "Internal server error.", 500)
  569. return
  570. }
  571. }
  572. if err := zw.Close(); err != nil {
  573. log.Printf("%s", err.Error())
  574. http.Error(w, "Internal server error.", 500)
  575. return
  576. }
  577. }
  578. func (s *Server) tarGzHandler(w http.ResponseWriter, r *http.Request) {
  579. vars := mux.Vars(r)
  580. files := vars["files"]
  581. tarfilename := fmt.Sprintf("transfersh-%d.tar.gz", uint16(time.Now().UnixNano()))
  582. w.Header().Set("Content-Type", "application/x-gzip")
  583. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  584. w.Header().Set("Connection", "close")
  585. os := gzip.NewWriter(w)
  586. defer os.Close()
  587. zw := tar.NewWriter(os)
  588. defer zw.Close()
  589. for _, key := range strings.Split(files, ",") {
  590. key = resolveKey(key, s.proxyPath)
  591. token := strings.Split(key, "/")[0]
  592. filename := sanitize(strings.Split(key, "/")[1])
  593. if err := s.CheckMetadata(token, filename); err != nil {
  594. log.Printf("Error metadata: %s", err.Error())
  595. continue
  596. }
  597. reader, _, contentLength, err := s.storage.Get(token, filename)
  598. if err != nil {
  599. if s.storage.IsNotExist(err) {
  600. http.Error(w, "File not found", 404)
  601. return
  602. } else {
  603. log.Printf("%s", err.Error())
  604. http.Error(w, "Could not retrieve file.", 500)
  605. return
  606. }
  607. }
  608. defer reader.Close()
  609. header := &tar.Header{
  610. Name: strings.Split(key, "/")[1],
  611. Size: int64(contentLength),
  612. }
  613. err = zw.WriteHeader(header)
  614. if err != nil {
  615. log.Printf("%s", err.Error())
  616. http.Error(w, "Internal server error.", 500)
  617. return
  618. }
  619. if _, err = io.Copy(zw, reader); err != nil {
  620. log.Printf("%s", err.Error())
  621. http.Error(w, "Internal server error.", 500)
  622. return
  623. }
  624. }
  625. }
  626. func (s *Server) tarHandler(w http.ResponseWriter, r *http.Request) {
  627. vars := mux.Vars(r)
  628. files := vars["files"]
  629. tarfilename := fmt.Sprintf("transfersh-%d.tar", uint16(time.Now().UnixNano()))
  630. w.Header().Set("Content-Type", "application/x-tar")
  631. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  632. w.Header().Set("Connection", "close")
  633. zw := tar.NewWriter(w)
  634. defer zw.Close()
  635. for _, key := range strings.Split(files, ",") {
  636. key = resolveKey(key, s.proxyPath)
  637. token := strings.Split(key, "/")[0]
  638. filename := strings.Split(key, "/")[1]
  639. if err := s.CheckMetadata(token, filename); err != nil {
  640. log.Printf("Error metadata: %s", err.Error())
  641. continue
  642. }
  643. reader, _, contentLength, err := s.storage.Get(token, filename)
  644. if err != nil {
  645. if s.storage.IsNotExist(err) {
  646. http.Error(w, "File not found", 404)
  647. return
  648. } else {
  649. log.Printf("%s", err.Error())
  650. http.Error(w, "Could not retrieve file.", 500)
  651. return
  652. }
  653. }
  654. defer reader.Close()
  655. header := &tar.Header{
  656. Name: strings.Split(key, "/")[1],
  657. Size: int64(contentLength),
  658. }
  659. err = zw.WriteHeader(header)
  660. if err != nil {
  661. log.Printf("%s", err.Error())
  662. http.Error(w, "Internal server error.", 500)
  663. return
  664. }
  665. if _, err = io.Copy(zw, reader); err != nil {
  666. log.Printf("%s", err.Error())
  667. http.Error(w, "Internal server error.", 500)
  668. return
  669. }
  670. }
  671. }
  672. func (s *Server) headHandler(w http.ResponseWriter, r *http.Request) {
  673. vars := mux.Vars(r)
  674. token := vars["token"]
  675. filename := vars["filename"]
  676. if err := s.CheckMetadata(token, filename); err != nil {
  677. log.Printf("Error metadata: %s", err.Error())
  678. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  679. return
  680. }
  681. contentType, contentLength, err := s.storage.Head(token, filename)
  682. if s.storage.IsNotExist(err) {
  683. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  684. return
  685. } else if err != nil {
  686. log.Printf("%s", err.Error())
  687. http.Error(w, "Could not retrieve file.", 500)
  688. return
  689. }
  690. w.Header().Set("Content-Type", contentType)
  691. w.Header().Set("Content-Length", strconv.FormatUint(contentLength, 10))
  692. w.Header().Set("Connection", "close")
  693. }
  694. func (s *Server) getHandler(w http.ResponseWriter, r *http.Request) {
  695. vars := mux.Vars(r)
  696. action := vars["action"]
  697. token := vars["token"]
  698. filename := vars["filename"]
  699. if err := s.CheckMetadata(token, filename); err != nil {
  700. log.Printf("Error metadata: %s", err.Error())
  701. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  702. return
  703. }
  704. reader, contentType, contentLength, err := s.storage.Get(token, filename)
  705. if s.storage.IsNotExist(err) {
  706. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  707. return
  708. } else if err != nil {
  709. log.Printf("%s", err.Error())
  710. http.Error(w, "Could not retrieve file.", 500)
  711. return
  712. }
  713. defer reader.Close()
  714. var disposition string
  715. if action == "inline" {
  716. disposition = "inline"
  717. } else {
  718. disposition = "attachment"
  719. }
  720. w.Header().Set("Content-Type", contentType)
  721. w.Header().Set("Content-Length", strconv.FormatUint(contentLength, 10))
  722. w.Header().Set("Content-Disposition", fmt.Sprintf("%s; filename=\"%s\"", disposition, filename))
  723. w.Header().Set("Connection", "keep-alive")
  724. if w.Header().Get("Range") == "" {
  725. if _, err = io.Copy(w, reader); err != nil {
  726. log.Printf("%s", err.Error())
  727. http.Error(w, "Error occurred copying to output stream", 500)
  728. return
  729. }
  730. return
  731. }
  732. file, err := ioutil.TempFile(s.tempPath, "range-")
  733. if err != nil {
  734. log.Printf("%s", err.Error())
  735. http.Error(w, "Error occurred copying to output stream", 500)
  736. return
  737. }
  738. defer cleanTmpFile(file)
  739. tee := io.TeeReader(reader, file)
  740. for {
  741. b := make([]byte, _5M)
  742. _, err = tee.Read(b)
  743. if err == io.EOF {
  744. break
  745. }
  746. if err != nil {
  747. log.Printf("%s", err.Error())
  748. http.Error(w, "Error occurred copying to output stream", 500)
  749. return
  750. }
  751. }
  752. http.ServeContent(w, r, filename, time.Now(), file)
  753. }
  754. func (s *Server) RedirectHandler(h http.Handler) http.HandlerFunc {
  755. return func(w http.ResponseWriter, r *http.Request) {
  756. if !s.forceHTTPs {
  757. // we don't want to enforce https
  758. } else if r.URL.Path == "/health.html" {
  759. // health check url won't redirect
  760. } else if strings.HasSuffix(ipAddrFromRemoteAddr(r.Host), ".onion") {
  761. // .onion addresses cannot get a valid certificate, so don't redirect
  762. } else if r.Header.Get("X-Forwarded-Proto") == "https" {
  763. } else if r.URL.Scheme == "https" {
  764. } else {
  765. u := getURL(r)
  766. u.Scheme = "https"
  767. http.Redirect(w, r, u.String(), http.StatusPermanentRedirect)
  768. return
  769. }
  770. h.ServeHTTP(w, r)
  771. }
  772. }
  773. // Create a log handler for every request it receives.
  774. func LoveHandler(h http.Handler) http.HandlerFunc {
  775. return func(w http.ResponseWriter, r *http.Request) {
  776. w.Header().Set("x-made-with", "<3 by DutchCoders")
  777. w.Header().Set("x-served-by", "Proudly served by DutchCoders")
  778. w.Header().Set("Server", "Transfer.sh HTTP Server 1.0")
  779. h.ServeHTTP(w, r)
  780. }
  781. }
  782. func IPFilterHandler(h http.Handler, ipFilterOptions *IPFilterOptions) http.HandlerFunc {
  783. return func(w http.ResponseWriter, r *http.Request) {
  784. if ipFilterOptions == nil {
  785. h.ServeHTTP(w, r)
  786. } else {
  787. WrapIPFilter(h, *ipFilterOptions).ServeHTTP(w, r)
  788. }
  789. return
  790. }
  791. }
  792. func (s *Server) BasicAuthHandler(h http.Handler) http.HandlerFunc {
  793. return func(w http.ResponseWriter, r *http.Request) {
  794. if s.AuthUser == "" || s.AuthPass == "" {
  795. h.ServeHTTP(w, r)
  796. return
  797. }
  798. w.Header().Set("WWW-Authenticate", "Basic realm=\"Restricted\"")
  799. username, password, authOK := r.BasicAuth()
  800. if authOK == false {
  801. http.Error(w, "Not authorized", 401)
  802. return
  803. }
  804. if username != s.AuthUser || password != s.AuthPass {
  805. http.Error(w, "Not authorized", 401)
  806. return
  807. }
  808. h.ServeHTTP(w, r)
  809. }
  810. }