You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

888 lines
22 KiB

  1. /*
  2. The MIT License (MIT)
  3. Copyright (c) 2014-2017 DutchCoders [https://github.com/dutchcoders/]
  4. Permission is hereby granted, free of charge, to any person obtaining a copy
  5. of this software and associated documentation files (the "Software"), to deal
  6. in the Software without restriction, including without limitation the rights
  7. to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  8. copies of the Software, and to permit persons to whom the Software is
  9. furnished to do so, subject to the following conditions:
  10. The above copyright notice and this permission notice shall be included in
  11. all copies or substantial portions of the Software.
  12. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  13. IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  14. FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  15. AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  16. LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  17. OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  18. THE SOFTWARE.
  19. */
  20. package server
  21. import (
  22. "archive/tar"
  23. "archive/zip"
  24. "bytes"
  25. "compress/gzip"
  26. "encoding/base64"
  27. "errors"
  28. "fmt"
  29. "html"
  30. html_template "html/template"
  31. "io"
  32. "io/ioutil"
  33. "log"
  34. "math/rand"
  35. "mime"
  36. "net/http"
  37. "net/url"
  38. "os"
  39. "path"
  40. "path/filepath"
  41. "strconv"
  42. "strings"
  43. "sync"
  44. text_template "text/template"
  45. "time"
  46. web "github.com/dutchcoders/transfer.sh-web"
  47. "github.com/dutchcoders/transfer.sh/server/storage"
  48. "github.com/gorilla/mux"
  49. "github.com/microcosm-cc/bluemonday"
  50. blackfriday "github.com/russross/blackfriday/v2"
  51. "github.com/skip2/go-qrcode"
  52. )
  53. var (
  54. htmlTemplates = initHTMLTemplates()
  55. textTemplates = initTextTemplates()
  56. )
  57. func stripPrefix(path string) string {
  58. return strings.Replace(path, web.Prefix+"/", "", -1)
  59. }
  60. func initTextTemplates() *text_template.Template {
  61. templateMap := text_template.FuncMap{"format": formatNumber}
  62. // Templates with functions available to them
  63. var templates = text_template.New("").Funcs(templateMap)
  64. return templates
  65. }
  66. func initHTMLTemplates() *html_template.Template {
  67. templateMap := html_template.FuncMap{"format": formatNumber}
  68. // Templates with functions available to them
  69. var templates = html_template.New("").Funcs(templateMap)
  70. return templates
  71. }
  72. // Create a log handler for every request it receives.
  73. func LoveHandler(h http.Handler) http.HandlerFunc {
  74. return func(w http.ResponseWriter, r *http.Request) {
  75. w.Header().Set("x-made-with", "<3 by DutchCoders")
  76. w.Header().Set("x-served-by", "Proudly served by DutchCoders")
  77. w.Header().Set("Server", "Transfer.sh HTTP Server 1.0")
  78. h.ServeHTTP(w, r)
  79. }
  80. }
  81. func IPFilterHandler(h http.Handler, ipFilterOptions *IPFilterOptions) http.HandlerFunc {
  82. return func(w http.ResponseWriter, r *http.Request) {
  83. if ipFilterOptions == nil {
  84. h.ServeHTTP(w, r)
  85. } else {
  86. WrapIPFilter(h, *ipFilterOptions).ServeHTTP(w, r)
  87. }
  88. return
  89. }
  90. }
  91. func (s *Server) RedirectHandler(h http.Handler) http.HandlerFunc {
  92. return func(w http.ResponseWriter, r *http.Request) {
  93. if !s.forceHTTPs {
  94. // we don't want to enforce https
  95. } else if r.URL.Path == "/health.html" {
  96. // health check url won't redirect
  97. } else if strings.HasSuffix(ipAddrFromRemoteAddr(r.Host), ".onion") {
  98. // .onion addresses cannot get a valid certificate, so don't redirect
  99. } else if r.Header.Get("X-Forwarded-Proto") == "https" {
  100. } else if r.URL.Scheme == "https" {
  101. } else {
  102. u := getURL(r)
  103. u.Scheme = "https"
  104. http.Redirect(w, r, u.String(), http.StatusPermanentRedirect)
  105. return
  106. }
  107. h.ServeHTTP(w, r)
  108. }
  109. }
  110. func (s *Server) BasicAuthHandler(h http.Handler) http.HandlerFunc {
  111. return func(w http.ResponseWriter, r *http.Request) {
  112. if s.AuthUser == "" || s.AuthPass == "" {
  113. h.ServeHTTP(w, r)
  114. return
  115. }
  116. w.Header().Set("WWW-Authenticate", "Basic realm=\"Restricted\"")
  117. username, password, authOK := r.BasicAuth()
  118. if authOK == false {
  119. http.Error(w, "Not authorized", 401)
  120. return
  121. }
  122. if username != s.AuthUser || password != s.AuthPass {
  123. http.Error(w, "Not authorized", 401)
  124. return
  125. }
  126. h.ServeHTTP(w, r)
  127. }
  128. }
  129. func (s *Server) healthHandler(w http.ResponseWriter, r *http.Request) {
  130. _, _ = w.Write([]byte("Approaching Neutral Zone, all systems normal and functioning."))
  131. }
  132. // The preview handler will show a preview of the content for browsers (accept type text/html), and referer is not transfer.sh
  133. func (s *Server) previewHandler(w http.ResponseWriter, r *http.Request) {
  134. vars := mux.Vars(r)
  135. token := vars["token"]
  136. filename := vars["filename"]
  137. metadata, err := s.checkMetadata(token, filename, false)
  138. if err != nil {
  139. log.Printf("Error metadata: %s", err.Error())
  140. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  141. return
  142. }
  143. contentType := metadata.ContentType
  144. var templatePath string
  145. var content html_template.HTML
  146. switch {
  147. case strings.HasPrefix(contentType, "image/"):
  148. templatePath = "download.image.html"
  149. case strings.HasPrefix(contentType, "video/"):
  150. templatePath = "download.video.html"
  151. case strings.HasPrefix(contentType, "audio/"):
  152. templatePath = "download.audio.html"
  153. case strings.HasPrefix(contentType, "text/"):
  154. templatePath = "download.markdown.html"
  155. var reader io.ReadCloser
  156. if reader, _, err = s.storage.Get(token, filename); err != nil {
  157. http.Error(w, err.Error(), http.StatusInternalServerError)
  158. return
  159. }
  160. var data []byte
  161. data = make([]byte, _5M)
  162. if _, err = reader.Read(data); err != io.EOF && err != nil {
  163. http.Error(w, err.Error(), http.StatusInternalServerError)
  164. return
  165. }
  166. if strings.HasPrefix(contentType, "text/x-markdown") || strings.HasPrefix(contentType, "text/markdown") {
  167. unsafe := blackfriday.Run(data)
  168. output := bluemonday.UGCPolicy().SanitizeBytes(unsafe)
  169. content = html_template.HTML(output)
  170. } else if strings.HasPrefix(contentType, "text/plain") {
  171. content = html_template.HTML(fmt.Sprintf("<pre>%s</pre>", html.EscapeString(string(data))))
  172. } else {
  173. templatePath = "download.sandbox.html"
  174. }
  175. default:
  176. templatePath = "download.html"
  177. }
  178. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  179. resolvedURL := resolveURL(r, relativeURL)
  180. relativeURLGet, _ := url.Parse(path.Join(s.proxyPath, "get", token, filename))
  181. resolvedURLGet := resolveURL(r, relativeURLGet)
  182. var png []byte
  183. png, err = qrcode.Encode(resolvedURL, qrcode.High, 150)
  184. if err != nil {
  185. http.Error(w, err.Error(), http.StatusInternalServerError)
  186. return
  187. }
  188. qrCode := base64.StdEncoding.EncodeToString(png)
  189. hostname := getURL(r).Host
  190. webAddress := resolveWebAddress(r, s.proxyPath)
  191. data := struct {
  192. ContentType string
  193. Content html_template.HTML
  194. Filename string
  195. Url string
  196. UrlGet string
  197. Hostname string
  198. WebAddress string
  199. ContentLength int64
  200. GAKey string
  201. UserVoiceKey string
  202. QRCode string
  203. }{
  204. contentType,
  205. content,
  206. filename,
  207. resolvedURL,
  208. resolvedURLGet,
  209. hostname,
  210. webAddress,
  211. metadata.ContentLength,
  212. s.gaKey,
  213. s.userVoiceKey,
  214. qrCode,
  215. }
  216. if err := htmlTemplates.ExecuteTemplate(w, templatePath, data); err != nil {
  217. http.Error(w, err.Error(), http.StatusInternalServerError)
  218. return
  219. }
  220. }
  221. // this handler will output html or text, depending on the support of the client (Accept header).
  222. func (s *Server) viewHandler(w http.ResponseWriter, r *http.Request) {
  223. // vars := mux.Vars(r)
  224. hostname := getURL(r).Host
  225. webAddress := resolveWebAddress(r, s.proxyPath)
  226. data := struct {
  227. Hostname string
  228. WebAddress string
  229. GAKey string
  230. UserVoiceKey string
  231. }{
  232. hostname,
  233. webAddress,
  234. s.gaKey,
  235. s.userVoiceKey,
  236. }
  237. if acceptsHTML(r.Header) {
  238. if err := htmlTemplates.ExecuteTemplate(w, "index.html", data); err != nil {
  239. http.Error(w, err.Error(), http.StatusInternalServerError)
  240. return
  241. }
  242. } else {
  243. if err := textTemplates.ExecuteTemplate(w, "index.txt", data); err != nil {
  244. http.Error(w, err.Error(), http.StatusInternalServerError)
  245. return
  246. }
  247. }
  248. }
  249. func (s *Server) notFoundHandler(w http.ResponseWriter, r *http.Request) {
  250. http.Error(w, http.StatusText(404), 404)
  251. }
  252. func (s *Server) postHandler(w http.ResponseWriter, r *http.Request) {
  253. if err := r.ParseMultipartForm(_24K); nil != err {
  254. log.Printf("%s", err.Error())
  255. http.Error(w, "Error occurred copying to output stream", 500)
  256. return
  257. }
  258. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  259. w.Header().Set("Content-Type", "text/plain")
  260. for _, fheaders := range r.MultipartForm.File {
  261. for _, fheader := range fheaders {
  262. filename := sanitize(fheader.Filename)
  263. contentType := fheader.Header.Get("Content-Type")
  264. if contentType == "" {
  265. contentType = mime.TypeByExtension(filepath.Ext(fheader.Filename))
  266. }
  267. var f io.Reader
  268. var err error
  269. if f, err = fheader.Open(); err != nil {
  270. log.Printf("%s", err.Error())
  271. http.Error(w, err.Error(), 500)
  272. return
  273. }
  274. var b bytes.Buffer
  275. n, err := io.CopyN(&b, f, _24K+1)
  276. if err != nil && err != io.EOF {
  277. log.Printf("%s", err.Error())
  278. http.Error(w, err.Error(), 500)
  279. return
  280. }
  281. var file *os.File
  282. var reader io.Reader
  283. if n > _24K {
  284. file, err = ioutil.TempFile(s.tempPath, "transfer-")
  285. if err != nil {
  286. log.Fatal(err)
  287. }
  288. defer cleanTmpFile(file)
  289. n, err = io.Copy(file, io.MultiReader(&b, f))
  290. if err != nil {
  291. log.Printf("%s", err.Error())
  292. http.Error(w, err.Error(), 500)
  293. return
  294. }
  295. reader, err = os.Open(file.Name())
  296. } else {
  297. reader = bytes.NewReader(b.Bytes())
  298. }
  299. metadata := s.metadataForRequest(contentType, n, r)
  300. log.Printf("Uploading %s %s %d %s", token, filename, metadata.ContentLength, metadata.ContentType)
  301. if err = s.storage.Put(token, filename, reader, metadata); err != nil {
  302. log.Printf("Backend storage error: %s", err.Error())
  303. http.Error(w, err.Error(), 500)
  304. return
  305. }
  306. filename = url.PathEscape(filename)
  307. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  308. _, _ = fmt.Fprintln(w, getURL(r).ResolveReference(relativeURL).String())
  309. }
  310. }
  311. }
  312. func (s *Server) putHandler(w http.ResponseWriter, r *http.Request) {
  313. vars := mux.Vars(r)
  314. filename := sanitize(vars["filename"])
  315. contentLength := r.ContentLength
  316. var reader io.Reader
  317. reader = r.Body
  318. defer r.Body.Close()
  319. if contentLength == -1 {
  320. // queue file to disk, because s3 needs content length
  321. var err error
  322. var f io.Reader
  323. f = reader
  324. var b bytes.Buffer
  325. n, err := io.CopyN(&b, f, _24K+1)
  326. if err != nil && err != io.EOF {
  327. log.Printf("Error putting new file: %s", err.Error())
  328. http.Error(w, err.Error(), 500)
  329. return
  330. }
  331. var file *os.File
  332. if n > _24K {
  333. file, err = ioutil.TempFile(s.tempPath, "transfer-")
  334. if err != nil {
  335. log.Printf("%s", err.Error())
  336. http.Error(w, err.Error(), 500)
  337. return
  338. }
  339. defer cleanTmpFile(file)
  340. n, err = io.Copy(file, io.MultiReader(&b, f))
  341. if err != nil {
  342. log.Printf("%s", err.Error())
  343. http.Error(w, err.Error(), 500)
  344. return
  345. }
  346. reader, err = os.Open(file.Name())
  347. } else {
  348. reader = bytes.NewReader(b.Bytes())
  349. }
  350. contentLength = n
  351. }
  352. if contentLength == 0 {
  353. log.Print("Empty content-length")
  354. http.Error(w, errors.New("could not upload empty file").Error(), 400)
  355. return
  356. }
  357. contentType := r.Header.Get("Content-Type")
  358. if contentType == "" {
  359. contentType = mime.TypeByExtension(filepath.Ext(vars["filename"]))
  360. }
  361. token := Encode(10000000 + int64(rand.Intn(1000000000)))
  362. metadata := s.metadataForRequest(contentType, contentLength, r)
  363. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  364. var err error
  365. if err = s.storage.Put(token, filename, reader, metadata); err != nil {
  366. log.Printf("Error putting new file: %s", err.Error())
  367. http.Error(w, errors.New("could not save file").Error(), 500)
  368. return
  369. }
  370. // w.Statuscode = 200
  371. w.Header().Set("Content-Type", "text/plain")
  372. filename = url.PathEscape(filename)
  373. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  374. deleteURL, _ := url.Parse(path.Join(s.proxyPath, token, filename, metadata.DeletionToken))
  375. w.Header().Set("X-Url-Delete", resolveURL(r, deleteURL))
  376. _, _ = fmt.Fprint(w, resolveURL(r, relativeURL))
  377. }
  378. func (s *Server) deleteHandler(w http.ResponseWriter, r *http.Request) {
  379. vars := mux.Vars(r)
  380. token := vars["token"]
  381. filename := vars["filename"]
  382. deletionToken := vars["deletionToken"]
  383. if err := s.checkDeletionToken(deletionToken, token, filename); err != nil {
  384. log.Printf("Error metadata: %s", err.Error())
  385. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  386. return
  387. }
  388. err := s.storage.Delete(token, filename)
  389. if s.storage.IsNotExist(err) {
  390. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  391. return
  392. } else if err != nil {
  393. log.Printf("%s", err.Error())
  394. http.Error(w, "Could not delete file.", 500)
  395. return
  396. }
  397. }
  398. func (s *Server) zipHandler(w http.ResponseWriter, r *http.Request) {
  399. vars := mux.Vars(r)
  400. files := vars["files"]
  401. zipfilename := fmt.Sprintf("transfersh-%d.zip", uint16(time.Now().UnixNano()))
  402. w.Header().Set("Content-Type", "application/zip")
  403. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", zipfilename))
  404. w.Header().Set("Connection", "close")
  405. zw := zip.NewWriter(w)
  406. for _, key := range strings.Split(files, ",") {
  407. key = resolveKey(key, s.proxyPath)
  408. token := strings.Split(key, "/")[0]
  409. filename := sanitize(strings.Split(key, "/")[1])
  410. if _, err := s.checkMetadata(token, filename, true); err != nil {
  411. log.Printf("Error metadata: %s", err.Error())
  412. continue
  413. }
  414. reader, _, err := s.storage.Get(token, filename)
  415. if err != nil {
  416. if s.storage.IsNotExist(err) {
  417. http.Error(w, "File not found", 404)
  418. return
  419. } else {
  420. log.Printf("%s", err.Error())
  421. http.Error(w, "Could not retrieve file.", 500)
  422. return
  423. }
  424. }
  425. defer reader.Close()
  426. header := &zip.FileHeader{
  427. Name: strings.Split(key, "/")[1],
  428. Method: zip.Store,
  429. Modified: time.Now(),
  430. }
  431. fw, err := zw.CreateHeader(header)
  432. if err != nil {
  433. log.Printf("%s", err.Error())
  434. http.Error(w, "Internal server error.", 500)
  435. return
  436. }
  437. if _, err = io.Copy(fw, reader); err != nil {
  438. log.Printf("%s", err.Error())
  439. http.Error(w, "Internal server error.", 500)
  440. return
  441. }
  442. }
  443. if err := zw.Close(); err != nil {
  444. log.Printf("%s", err.Error())
  445. http.Error(w, "Internal server error.", 500)
  446. return
  447. }
  448. }
  449. func (s *Server) tarGzHandler(w http.ResponseWriter, r *http.Request) {
  450. vars := mux.Vars(r)
  451. files := vars["files"]
  452. tarfilename := fmt.Sprintf("transfersh-%d.tar.gz", uint16(time.Now().UnixNano()))
  453. w.Header().Set("Content-Type", "application/x-gzip")
  454. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  455. w.Header().Set("Connection", "close")
  456. writer := gzip.NewWriter(w)
  457. defer writer.Close()
  458. zw := tar.NewWriter(writer)
  459. defer zw.Close()
  460. for _, key := range strings.Split(files, ",") {
  461. key = resolveKey(key, s.proxyPath)
  462. token := strings.Split(key, "/")[0]
  463. filename := sanitize(strings.Split(key, "/")[1])
  464. if _, err := s.checkMetadata(token, filename, true); err != nil {
  465. log.Printf("Error metadata: %s", err.Error())
  466. continue
  467. }
  468. reader, metadata, err := s.storage.Get(token, filename)
  469. if err != nil {
  470. if s.storage.IsNotExist(err) {
  471. http.Error(w, "File not found", 404)
  472. return
  473. } else {
  474. log.Printf("%s", err.Error())
  475. http.Error(w, "Could not retrieve file.", 500)
  476. return
  477. }
  478. }
  479. defer reader.Close()
  480. header := &tar.Header{
  481. Name: strings.Split(key, "/")[1],
  482. Size: metadata.ContentLength,
  483. }
  484. err = zw.WriteHeader(header)
  485. if err != nil {
  486. log.Printf("%s", err.Error())
  487. http.Error(w, "Internal server error.", 500)
  488. return
  489. }
  490. if _, err = io.Copy(zw, reader); err != nil {
  491. log.Printf("%s", err.Error())
  492. http.Error(w, "Internal server error.", 500)
  493. return
  494. }
  495. }
  496. }
  497. func (s *Server) tarHandler(w http.ResponseWriter, r *http.Request) {
  498. vars := mux.Vars(r)
  499. files := vars["files"]
  500. tarfilename := fmt.Sprintf("transfersh-%d.tar", uint16(time.Now().UnixNano()))
  501. w.Header().Set("Content-Type", "application/x-tar")
  502. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  503. w.Header().Set("Connection", "close")
  504. zw := tar.NewWriter(w)
  505. defer zw.Close()
  506. for _, key := range strings.Split(files, ",") {
  507. key = resolveKey(key, s.proxyPath)
  508. token := strings.Split(key, "/")[0]
  509. filename := strings.Split(key, "/")[1]
  510. if _, err := s.checkMetadata(token, filename, true); err != nil {
  511. log.Printf("Error metadata: %s", err.Error())
  512. continue
  513. }
  514. reader, metadata, err := s.storage.Get(token, filename)
  515. if err != nil {
  516. if s.storage.IsNotExist(err) {
  517. http.Error(w, "File not found", 404)
  518. return
  519. } else {
  520. log.Printf("%s", err.Error())
  521. http.Error(w, "Could not retrieve file.", 500)
  522. return
  523. }
  524. }
  525. defer reader.Close()
  526. header := &tar.Header{
  527. Name: strings.Split(key, "/")[1],
  528. Size: metadata.ContentLength,
  529. }
  530. err = zw.WriteHeader(header)
  531. if err != nil {
  532. log.Printf("%s", err.Error())
  533. http.Error(w, "Internal server error.", 500)
  534. return
  535. }
  536. if _, err = io.Copy(zw, reader); err != nil {
  537. log.Printf("%s", err.Error())
  538. http.Error(w, "Internal server error.", 500)
  539. return
  540. }
  541. }
  542. }
  543. func (s *Server) headHandler(w http.ResponseWriter, r *http.Request) {
  544. vars := mux.Vars(r)
  545. token := vars["token"]
  546. filename := vars["filename"]
  547. metadata, err := s.checkMetadata(token, filename, false)
  548. if err != nil {
  549. log.Printf("Error metadata: %s", err.Error())
  550. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  551. return
  552. }
  553. if s.storage.IsNotExist(err) {
  554. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  555. return
  556. } else if err != nil {
  557. log.Printf("%s", err.Error())
  558. http.Error(w, "Could not retrieve file.", 500)
  559. return
  560. }
  561. remainingDownloads, remainingDays := metadata.RemainingLimitHeaderValues()
  562. w.Header().Set("Content-Type", metadata.ContentType)
  563. w.Header().Set("Content-Length", strconv.FormatInt(metadata.ContentLength, 10))
  564. w.Header().Set("Connection", "close")
  565. w.Header().Set("X-Remaining-Downloads", remainingDownloads)
  566. w.Header().Set("X-Remaining-Days", remainingDays)
  567. }
  568. func (s *Server) getHandler(w http.ResponseWriter, r *http.Request) {
  569. vars := mux.Vars(r)
  570. action := vars["action"]
  571. token := vars["token"]
  572. filename := vars["filename"]
  573. metadata, err := s.checkMetadata(token, filename, true)
  574. if err != nil {
  575. log.Printf("Error metadata: %s", err.Error())
  576. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  577. return
  578. }
  579. reader, _, err := s.storage.Get(token, filename)
  580. if s.storage.IsNotExist(err) {
  581. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  582. return
  583. } else if err != nil {
  584. log.Printf("%s", err.Error())
  585. http.Error(w, "Could not retrieve file.", 500)
  586. return
  587. }
  588. defer reader.Close()
  589. var disposition string
  590. if action == "inline" {
  591. disposition = "inline"
  592. } else {
  593. disposition = "attachment"
  594. }
  595. remainingDownloads, remainingDays := metadata.RemainingLimitHeaderValues()
  596. w.Header().Set("Content-Type", metadata.ContentType)
  597. w.Header().Set("Content-Length", strconv.FormatInt(metadata.ContentLength, 10))
  598. w.Header().Set("Content-Disposition", fmt.Sprintf("%s; filename=\"%s\"", disposition, filename))
  599. w.Header().Set("Connection", "keep-alive")
  600. w.Header().Set("X-Remaining-Downloads", remainingDownloads)
  601. w.Header().Set("X-Remaining-Days", remainingDays)
  602. if w.Header().Get("Range") == "" {
  603. if _, err = io.Copy(w, reader); err != nil {
  604. log.Printf("%s", err.Error())
  605. http.Error(w, "Error occurred copying to output stream", 500)
  606. return
  607. }
  608. return
  609. }
  610. file, err := ioutil.TempFile(s.tempPath, "range-")
  611. if err != nil {
  612. log.Printf("%s", err.Error())
  613. http.Error(w, "Error occurred copying to output stream", 500)
  614. return
  615. }
  616. defer cleanTmpFile(file)
  617. tee := io.TeeReader(reader, file)
  618. for {
  619. b := make([]byte, _5M)
  620. _, err = tee.Read(b)
  621. if err == io.EOF {
  622. break
  623. }
  624. if err != nil {
  625. log.Printf("%s", err.Error())
  626. http.Error(w, "Error occurred copying to output stream", 500)
  627. return
  628. }
  629. }
  630. http.ServeContent(w, r, filename, time.Now(), file)
  631. }
  632. func (s *Server) metadataForRequest(contentType string, contentLength int64, r *http.Request) storage.Metadata {
  633. metadata := storage.Metadata{
  634. ContentType: contentType,
  635. ContentLength: contentLength,
  636. MaxDate: time.Now().Add(s.lifetime),
  637. Downloads: 0,
  638. MaxDownloads: -1,
  639. DeletionToken: Encode(10000000+int64(rand.Intn(1000000000))) + Encode(10000000+int64(rand.Intn(1000000000))),
  640. }
  641. if v := r.Header.Get("Max-Downloads"); v == "" {
  642. } else if v, err := strconv.Atoi(v); err != nil {
  643. } else {
  644. metadata.MaxDownloads = v
  645. }
  646. if maxDays := r.Header.Get("Max-Days"); maxDays != "" {
  647. v, err := strconv.Atoi(maxDays)
  648. if err != nil {
  649. return metadata
  650. }
  651. metadata.MaxDate = time.Now().Add(time.Hour * 24 * time.Duration(v))
  652. }
  653. return metadata
  654. }
  655. func (s *Server) checkMetadata(token, filename string, increaseDownload bool) (metadata storage.Metadata, err error) {
  656. s.Lock(token, filename)
  657. defer s.Unlock(token, filename)
  658. metadata, err = s.storage.Head(token, filename)
  659. if s.storage.IsNotExist(err) {
  660. return metadata, nil
  661. } else if err != nil {
  662. return metadata, err
  663. }
  664. if metadata.MaxDownloads != -1 && metadata.Downloads >= metadata.MaxDownloads {
  665. return metadata, errors.New("max downloads exceeded")
  666. } else if !metadata.MaxDate.IsZero() && time.Now().After(metadata.MaxDate) {
  667. return metadata, errors.New("file access expired")
  668. } else {
  669. // update number of downloads
  670. if increaseDownload {
  671. metadata.Downloads++
  672. }
  673. if err := s.storage.Meta(token, filename, metadata); err != nil {
  674. return metadata, errors.New("could not save metadata")
  675. }
  676. }
  677. return metadata, nil
  678. }
  679. func (s *Server) checkDeletionToken(deletionToken, token, filename string) error {
  680. s.Lock(token, filename)
  681. defer s.Unlock(token, filename)
  682. metadata, err := s.storage.Head(token, filename)
  683. if s.storage.IsNotExist(err) {
  684. return nil
  685. }
  686. if err != nil {
  687. return err
  688. }
  689. if metadata.DeletionToken != deletionToken {
  690. return errors.New("deletion token does not match")
  691. }
  692. return nil
  693. }
  694. func (s *Server) Lock(token, filename string) {
  695. key := path.Join(token, filename)
  696. if _, ok := s.locks[key]; !ok {
  697. s.locks[key] = &sync.Mutex{}
  698. }
  699. s.locks[key].Lock()
  700. }
  701. func (s *Server) Unlock(token, filename string) {
  702. key := path.Join(token, filename)
  703. s.locks[key].Unlock()
  704. }