You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

895 lines
23 KiB

  1. /*
  2. The MIT License (MIT)
  3. Copyright (c) 2014-2017 DutchCoders [https://github.com/dutchcoders/]
  4. Permission is hereby granted, free of charge, to any person obtaining a copy
  5. of this software and associated documentation files (the "Software"), to deal
  6. in the Software without restriction, including without limitation the rights
  7. to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  8. copies of the Software, and to permit persons to whom the Software is
  9. furnished to do so, subject to the following conditions:
  10. The above copyright notice and this permission notice shall be included in
  11. all copies or substantial portions of the Software.
  12. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  13. IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  14. FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  15. AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  16. LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  17. OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  18. THE SOFTWARE.
  19. */
  20. package server
  21. import (
  22. "archive/tar"
  23. "archive/zip"
  24. "bytes"
  25. "compress/gzip"
  26. "encoding/base64"
  27. "errors"
  28. "fmt"
  29. "html"
  30. htmlTemplate "html/template"
  31. "io"
  32. "io/ioutil"
  33. "log"
  34. "math/rand"
  35. "mime"
  36. "net/http"
  37. "net/url"
  38. "os"
  39. "path"
  40. "path/filepath"
  41. "strconv"
  42. "strings"
  43. "sync"
  44. textTemplate "text/template"
  45. "time"
  46. web "github.com/dutchcoders/transfer.sh-web"
  47. "github.com/dutchcoders/transfer.sh/server/storage"
  48. "github.com/dutchcoders/transfer.sh/server/utils"
  49. "github.com/gorilla/mux"
  50. "github.com/microcosm-cc/bluemonday"
  51. "github.com/russross/blackfriday/v2"
  52. "github.com/skip2/go-qrcode"
  53. )
  54. var (
  55. htmlTemplates = initHTMLTemplates()
  56. textTemplates = initTextTemplates()
  57. )
  58. func stripPrefix(path string) string {
  59. return strings.Replace(path, web.Prefix+"/", "", -1)
  60. }
  61. func initTextTemplates() *textTemplate.Template {
  62. templateMap := textTemplate.FuncMap{"format": utils.FormatNumber}
  63. // Templates with functions available to them
  64. var templates = textTemplate.New("").Funcs(templateMap)
  65. return templates
  66. }
  67. func initHTMLTemplates() *htmlTemplate.Template {
  68. templateMap := htmlTemplate.FuncMap{"format": utils.FormatNumber}
  69. // Templates with functions available to them
  70. var templates = htmlTemplate.New("").Funcs(templateMap)
  71. return templates
  72. }
  73. // Create a log handler for every request it receives.
  74. func LoveHandler(h http.Handler) http.HandlerFunc {
  75. return func(w http.ResponseWriter, r *http.Request) {
  76. w.Header().Set("x-made-with", "<3 by DutchCoders")
  77. w.Header().Set("x-served-by", "Proudly served by DutchCoders")
  78. w.Header().Set("Server", "Transfer.sh HTTP Server 1.0")
  79. h.ServeHTTP(w, r)
  80. }
  81. }
  82. func IPFilterHandler(h http.Handler, ipFilterOptions *IPFilterOptions) http.HandlerFunc {
  83. return func(w http.ResponseWriter, r *http.Request) {
  84. if ipFilterOptions == nil {
  85. h.ServeHTTP(w, r)
  86. } else {
  87. WrapIPFilter(h, *ipFilterOptions).ServeHTTP(w, r)
  88. }
  89. return
  90. }
  91. }
  92. func (s *Server) RedirectHandler(h http.Handler) http.HandlerFunc {
  93. return func(w http.ResponseWriter, r *http.Request) {
  94. if !s.forceHTTPs {
  95. // we don't want to enforce https
  96. } else if r.URL.Path == "/health.html" {
  97. // health check url won't redirect
  98. } else if strings.HasSuffix(utils.IpAddrFromRemoteAddr(r.Host), ".onion") {
  99. // .onion addresses cannot get a valid certificate, so don't redirect
  100. } else if r.Header.Get("X-Forwarded-Proto") == "https" {
  101. } else if r.URL.Scheme == "https" {
  102. } else {
  103. u := utils.GetURL(r)
  104. u.Scheme = "https"
  105. http.Redirect(w, r, u.String(), http.StatusPermanentRedirect)
  106. return
  107. }
  108. h.ServeHTTP(w, r)
  109. }
  110. }
  111. func (s *Server) BasicAuthHandler(h http.Handler) http.HandlerFunc {
  112. return func(w http.ResponseWriter, r *http.Request) {
  113. if s.AuthUser == "" || s.AuthPass == "" {
  114. h.ServeHTTP(w, r)
  115. return
  116. }
  117. w.Header().Set("WWW-Authenticate", "Basic realm=\"Restricted\"")
  118. username, password, authOK := r.BasicAuth()
  119. if authOK == false {
  120. http.Error(w, "Not authorized", 401)
  121. return
  122. }
  123. if username != s.AuthUser || password != s.AuthPass {
  124. http.Error(w, "Not authorized", 401)
  125. return
  126. }
  127. h.ServeHTTP(w, r)
  128. }
  129. }
  130. func (s *Server) healthHandler(w http.ResponseWriter, r *http.Request) {
  131. _, _ = w.Write([]byte("Approaching Neutral Zone, all systems normal and functioning."))
  132. }
  133. // The preview handler will show a preview of the content for browsers (accept type text/html), and referer is not transfer.sh
  134. func (s *Server) previewHandler(w http.ResponseWriter, r *http.Request) {
  135. vars := mux.Vars(r)
  136. token := vars["token"]
  137. filename := vars["filename"]
  138. metadata, err := s.checkMetadata(token, filename, false)
  139. if err != nil {
  140. log.Printf("Error metadata: %s", err.Error())
  141. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  142. return
  143. }
  144. contentType := metadata.ContentType
  145. var templatePath string
  146. var content htmlTemplate.HTML
  147. switch {
  148. case strings.HasPrefix(contentType, "image/"):
  149. templatePath = "download.image.html"
  150. case strings.HasPrefix(contentType, "video/"):
  151. templatePath = "download.video.html"
  152. case strings.HasPrefix(contentType, "audio/"):
  153. templatePath = "download.audio.html"
  154. case strings.HasPrefix(contentType, "text/"):
  155. templatePath = "download.markdown.html"
  156. var reader io.ReadCloser
  157. if reader, _, err = s.storage.Get(token, filename); err != nil {
  158. http.Error(w, err.Error(), http.StatusInternalServerError)
  159. return
  160. }
  161. var data []byte
  162. data = make([]byte, _5M)
  163. if _, err = reader.Read(data); err != io.EOF && err != nil {
  164. http.Error(w, err.Error(), http.StatusInternalServerError)
  165. return
  166. }
  167. if strings.HasPrefix(contentType, "text/x-markdown") || strings.HasPrefix(contentType, "text/markdown") {
  168. unsafe := blackfriday.Run(data)
  169. output := bluemonday.UGCPolicy().SanitizeBytes(unsafe)
  170. content = htmlTemplate.HTML(output)
  171. } else if strings.HasPrefix(contentType, "text/plain") {
  172. content = htmlTemplate.HTML(fmt.Sprintf("<pre>%s</pre>", html.EscapeString(string(data))))
  173. } else {
  174. templatePath = "download.sandbox.html"
  175. }
  176. default:
  177. templatePath = "download.html"
  178. }
  179. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  180. resolvedURL := utils.ResolveURL(r, relativeURL)
  181. relativeURLGet, _ := url.Parse(path.Join(s.proxyPath, "get", token, filename))
  182. resolvedURLGet := utils.ResolveURL(r, relativeURLGet)
  183. var png []byte
  184. png, err = qrcode.Encode(resolvedURL, qrcode.High, 150)
  185. if err != nil {
  186. http.Error(w, err.Error(), http.StatusInternalServerError)
  187. return
  188. }
  189. qrCode := base64.StdEncoding.EncodeToString(png)
  190. hostname := utils.GetURL(r).Host
  191. webAddress := utils.ResolveWebAddress(r, s.proxyPath)
  192. data := struct {
  193. ContentType string
  194. Content htmlTemplate.HTML
  195. Filename string
  196. Url string
  197. UrlGet string
  198. Hostname string
  199. WebAddress string
  200. ContentLength int64
  201. GAKey string
  202. UserVoiceKey string
  203. QRCode string
  204. }{
  205. contentType,
  206. content,
  207. filename,
  208. resolvedURL,
  209. resolvedURLGet,
  210. hostname,
  211. webAddress,
  212. metadata.ContentLength,
  213. s.gaKey,
  214. s.userVoiceKey,
  215. qrCode,
  216. }
  217. if err := htmlTemplates.ExecuteTemplate(w, templatePath, data); err != nil {
  218. http.Error(w, err.Error(), http.StatusInternalServerError)
  219. return
  220. }
  221. }
  222. // this handler will output html or text, depending on the support of the client (Accept header).
  223. func (s *Server) viewHandler(w http.ResponseWriter, r *http.Request) {
  224. // vars := mux.Vars(r)
  225. hostname := utils.GetURL(r).Host
  226. webAddress := utils.ResolveWebAddress(r, s.proxyPath)
  227. data := struct {
  228. Hostname string
  229. WebAddress string
  230. GAKey string
  231. UserVoiceKey string
  232. }{
  233. hostname,
  234. webAddress,
  235. s.gaKey,
  236. s.userVoiceKey,
  237. }
  238. if utils.AcceptsHTML(r.Header) {
  239. if err := htmlTemplates.ExecuteTemplate(w, "index.html", data); err != nil {
  240. http.Error(w, err.Error(), http.StatusInternalServerError)
  241. return
  242. }
  243. } else {
  244. if err := textTemplates.ExecuteTemplate(w, "index.txt", data); err != nil {
  245. http.Error(w, err.Error(), http.StatusInternalServerError)
  246. return
  247. }
  248. }
  249. }
  250. func (s *Server) notFoundHandler(w http.ResponseWriter, r *http.Request) {
  251. http.Error(w, http.StatusText(404), 404)
  252. }
  253. func (s *Server) postHandler(w http.ResponseWriter, r *http.Request) {
  254. if err := r.ParseMultipartForm(_24K); nil != err {
  255. log.Printf("%s", err.Error())
  256. http.Error(w, "Error occurred copying to output stream", 500)
  257. return
  258. }
  259. token := utils.Encode(10000000 + int64(rand.Intn(1000000000)))
  260. w.Header().Set("Content-Type", "text/plain")
  261. for _, fheaders := range r.MultipartForm.File {
  262. for _, fheader := range fheaders {
  263. filename := utils.Sanitize(fheader.Filename)
  264. contentType := fheader.Header.Get("Content-Type")
  265. if contentType == "" {
  266. contentType = mime.TypeByExtension(filepath.Ext(fheader.Filename))
  267. }
  268. var f io.Reader
  269. var err error
  270. if f, err = fheader.Open(); err != nil {
  271. log.Printf("%s", err.Error())
  272. http.Error(w, err.Error(), 500)
  273. return
  274. }
  275. var b bytes.Buffer
  276. n, err := io.CopyN(&b, f, _24K+1)
  277. if err != nil && err != io.EOF {
  278. log.Printf("%s", err.Error())
  279. http.Error(w, err.Error(), 500)
  280. return
  281. }
  282. var file *os.File
  283. var reader io.Reader
  284. if n > _24K {
  285. file, err = ioutil.TempFile(s.tempPath, "transfer-")
  286. if err != nil {
  287. log.Fatal(err)
  288. }
  289. defer utils.CleanTmpFile(file)
  290. n, err = io.Copy(file, io.MultiReader(&b, f))
  291. if err != nil {
  292. log.Printf("%s", err.Error())
  293. http.Error(w, err.Error(), 500)
  294. return
  295. }
  296. reader, err = os.Open(file.Name())
  297. } else {
  298. reader = bytes.NewReader(b.Bytes())
  299. }
  300. metadata := s.metadataForRequest(contentType, n, r)
  301. log.Printf("Uploading %s %s %d %s", token, filename, metadata.ContentLength, metadata.ContentType)
  302. if err = s.storage.Put(token, filename, reader, metadata); err != nil {
  303. log.Printf("Backend storage error: %s", err.Error())
  304. http.Error(w, err.Error(), 500)
  305. return
  306. }
  307. filename = url.PathEscape(filename)
  308. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  309. deleteURL, _ := url.Parse(path.Join(s.proxyPath, token, filename, metadata.DeletionToken))
  310. w.Header().Set("X-Url-Delete", utils.ResolveURL(r, deleteURL))
  311. _, _ = fmt.Fprintln(w, utils.GetURL(r).ResolveReference(relativeURL).String())
  312. }
  313. }
  314. }
  315. func (s *Server) putHandler(w http.ResponseWriter, r *http.Request) {
  316. vars := mux.Vars(r)
  317. filename := utils.Sanitize(vars["filename"])
  318. contentLength := r.ContentLength
  319. var reader io.Reader
  320. reader = r.Body
  321. defer r.Body.Close()
  322. if contentLength == -1 {
  323. // queue file to disk, because s3 needs content length
  324. var err error
  325. var f io.Reader
  326. f = reader
  327. var b bytes.Buffer
  328. n, err := io.CopyN(&b, f, _24K+1)
  329. if err != nil && err != io.EOF {
  330. log.Printf("Error putting new file: %s", err.Error())
  331. http.Error(w, err.Error(), 500)
  332. return
  333. }
  334. var file *os.File
  335. if n > _24K {
  336. file, err = ioutil.TempFile(s.tempPath, "transfer-")
  337. if err != nil {
  338. log.Printf("%s", err.Error())
  339. http.Error(w, err.Error(), 500)
  340. return
  341. }
  342. defer utils.CleanTmpFile(file)
  343. n, err = io.Copy(file, io.MultiReader(&b, f))
  344. if err != nil {
  345. log.Printf("%s", err.Error())
  346. http.Error(w, err.Error(), 500)
  347. return
  348. }
  349. reader, err = os.Open(file.Name())
  350. } else {
  351. reader = bytes.NewReader(b.Bytes())
  352. }
  353. contentLength = n
  354. }
  355. if contentLength == 0 {
  356. log.Print("Empty content-length")
  357. http.Error(w, errors.New("could not upload empty file").Error(), 400)
  358. return
  359. }
  360. contentType := r.Header.Get("Content-Type")
  361. if contentType == "" {
  362. contentType = mime.TypeByExtension(filepath.Ext(vars["filename"]))
  363. }
  364. token := utils.Encode(10000000 + int64(rand.Intn(1000000000)))
  365. metadata := s.metadataForRequest(contentType, contentLength, r)
  366. log.Printf("Uploading %s %s %d %s", token, filename, contentLength, contentType)
  367. var err error
  368. if err = s.storage.Put(token, filename, reader, metadata); err != nil {
  369. log.Printf("Error putting new file: %s", err.Error())
  370. http.Error(w, errors.New("could not save file").Error(), 500)
  371. return
  372. }
  373. // w.Statuscode = 200
  374. w.Header().Set("Content-Type", "text/plain")
  375. filename = url.PathEscape(filename)
  376. relativeURL, _ := url.Parse(path.Join(s.proxyPath, token, filename))
  377. deleteURL, _ := url.Parse(path.Join(s.proxyPath, token, filename, metadata.DeletionToken))
  378. w.Header().Set("X-Url-Delete", utils.ResolveURL(r, deleteURL))
  379. _, _ = fmt.Fprint(w, utils.ResolveURL(r, relativeURL))
  380. }
  381. func (s *Server) deleteHandler(w http.ResponseWriter, r *http.Request) {
  382. vars := mux.Vars(r)
  383. token := vars["token"]
  384. filename := vars["filename"]
  385. deletionToken := vars["deletionToken"]
  386. if err := s.checkDeletionToken(deletionToken, token, filename); err != nil {
  387. log.Printf("Error metadata: %s", err.Error())
  388. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  389. return
  390. }
  391. err := s.storage.Delete(token, filename)
  392. if s.storage.IsNotExist(err) {
  393. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  394. return
  395. } else if err != nil {
  396. log.Printf("%s", err.Error())
  397. http.Error(w, "Could not delete file.", 500)
  398. return
  399. }
  400. }
  401. func (s *Server) zipHandler(w http.ResponseWriter, r *http.Request) {
  402. vars := mux.Vars(r)
  403. files := vars["files"]
  404. zipfilename := fmt.Sprintf("transfersh-%d.zip", uint16(time.Now().UnixNano()))
  405. w.Header().Set("Content-Type", "application/zip")
  406. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", zipfilename))
  407. w.Header().Set("Connection", "close")
  408. zw := zip.NewWriter(w)
  409. for _, key := range strings.Split(files, ",") {
  410. key = utils.ResolveKey(key, s.proxyPath)
  411. token := strings.Split(key, "/")[0]
  412. filename := utils.Sanitize(strings.Split(key, "/")[1])
  413. if _, err := s.checkMetadata(token, filename, true); err != nil {
  414. log.Printf("Error metadata: %s", err.Error())
  415. continue
  416. }
  417. reader, _, err := s.storage.Get(token, filename)
  418. if err != nil {
  419. if s.storage.IsNotExist(err) {
  420. http.Error(w, "File not found", 404)
  421. return
  422. } else {
  423. log.Printf("%s", err.Error())
  424. http.Error(w, "Could not retrieve file.", 500)
  425. return
  426. }
  427. }
  428. defer reader.Close()
  429. header := &zip.FileHeader{
  430. Name: strings.Split(key, "/")[1],
  431. Method: zip.Store,
  432. Modified: time.Now(),
  433. }
  434. fw, err := zw.CreateHeader(header)
  435. if err != nil {
  436. log.Printf("%s", err.Error())
  437. http.Error(w, "Internal server error.", 500)
  438. return
  439. }
  440. if _, err = io.Copy(fw, reader); err != nil {
  441. log.Printf("%s", err.Error())
  442. http.Error(w, "Internal server error.", 500)
  443. return
  444. }
  445. }
  446. if err := zw.Close(); err != nil {
  447. log.Printf("%s", err.Error())
  448. http.Error(w, "Internal server error.", 500)
  449. return
  450. }
  451. }
  452. func (s *Server) tarGzHandler(w http.ResponseWriter, r *http.Request) {
  453. vars := mux.Vars(r)
  454. files := vars["files"]
  455. tarfilename := fmt.Sprintf("transfersh-%d.tar.gz", uint16(time.Now().UnixNano()))
  456. w.Header().Set("Content-Type", "application/x-gzip")
  457. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  458. w.Header().Set("Connection", "close")
  459. writer := gzip.NewWriter(w)
  460. defer writer.Close()
  461. zw := tar.NewWriter(writer)
  462. defer zw.Close()
  463. for _, key := range strings.Split(files, ",") {
  464. key = utils.ResolveKey(key, s.proxyPath)
  465. token := strings.Split(key, "/")[0]
  466. filename := utils.Sanitize(strings.Split(key, "/")[1])
  467. if _, err := s.checkMetadata(token, filename, true); err != nil {
  468. log.Printf("Error metadata: %s", err.Error())
  469. continue
  470. }
  471. reader, metadata, err := s.storage.Get(token, filename)
  472. if err != nil {
  473. if s.storage.IsNotExist(err) {
  474. http.Error(w, "File not found", 404)
  475. return
  476. } else {
  477. log.Printf("%s", err.Error())
  478. http.Error(w, "Could not retrieve file.", 500)
  479. return
  480. }
  481. }
  482. defer reader.Close()
  483. header := &tar.Header{
  484. Name: strings.Split(key, "/")[1],
  485. Size: metadata.ContentLength,
  486. }
  487. err = zw.WriteHeader(header)
  488. if err != nil {
  489. log.Printf("%s", err.Error())
  490. http.Error(w, "Internal server error.", 500)
  491. return
  492. }
  493. if _, err = io.Copy(zw, reader); err != nil {
  494. log.Printf("%s", err.Error())
  495. http.Error(w, "Internal server error.", 500)
  496. return
  497. }
  498. }
  499. }
  500. func (s *Server) tarHandler(w http.ResponseWriter, r *http.Request) {
  501. vars := mux.Vars(r)
  502. files := vars["files"]
  503. tarfilename := fmt.Sprintf("transfersh-%d.tar", uint16(time.Now().UnixNano()))
  504. w.Header().Set("Content-Type", "application/x-tar")
  505. w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", tarfilename))
  506. w.Header().Set("Connection", "close")
  507. zw := tar.NewWriter(w)
  508. defer zw.Close()
  509. for _, key := range strings.Split(files, ",") {
  510. key = utils.ResolveKey(key, s.proxyPath)
  511. token := strings.Split(key, "/")[0]
  512. filename := strings.Split(key, "/")[1]
  513. if _, err := s.checkMetadata(token, filename, true); err != nil {
  514. log.Printf("Error metadata: %s", err.Error())
  515. continue
  516. }
  517. reader, metadata, err := s.storage.Get(token, filename)
  518. if err != nil {
  519. if s.storage.IsNotExist(err) {
  520. http.Error(w, "File not found", 404)
  521. return
  522. } else {
  523. log.Printf("%s", err.Error())
  524. http.Error(w, "Could not retrieve file.", 500)
  525. return
  526. }
  527. }
  528. defer reader.Close()
  529. header := &tar.Header{
  530. Name: strings.Split(key, "/")[1],
  531. Size: metadata.ContentLength,
  532. }
  533. err = zw.WriteHeader(header)
  534. if err != nil {
  535. log.Printf("%s", err.Error())
  536. http.Error(w, "Internal server error.", 500)
  537. return
  538. }
  539. if _, err = io.Copy(zw, reader); err != nil {
  540. log.Printf("%s", err.Error())
  541. http.Error(w, "Internal server error.", 500)
  542. return
  543. }
  544. }
  545. }
  546. func (s *Server) headHandler(w http.ResponseWriter, r *http.Request) {
  547. vars := mux.Vars(r)
  548. token := vars["token"]
  549. filename := vars["filename"]
  550. metadata, err := s.checkMetadata(token, filename, false)
  551. if err != nil {
  552. log.Printf("Error metadata: %s", err.Error())
  553. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  554. return
  555. }
  556. if s.storage.IsNotExist(err) {
  557. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  558. return
  559. } else if err != nil {
  560. log.Printf("%s", err.Error())
  561. http.Error(w, "Could not retrieve file.", 500)
  562. return
  563. }
  564. remainingDownloads, remainingDays := metadata.RemainingLimitHeaderValues()
  565. w.Header().Set("Content-Type", metadata.ContentType)
  566. w.Header().Set("Content-Length", strconv.FormatInt(metadata.ContentLength, 10))
  567. w.Header().Set("Connection", "close")
  568. w.Header().Set("X-Remaining-Downloads", remainingDownloads)
  569. w.Header().Set("X-Remaining-Days", remainingDays)
  570. }
  571. func (s *Server) getHandler(w http.ResponseWriter, r *http.Request) {
  572. vars := mux.Vars(r)
  573. action := vars["action"]
  574. token := vars["token"]
  575. filename := vars["filename"]
  576. metadata, err := s.checkMetadata(token, filename, true)
  577. if err != nil {
  578. log.Printf("Error metadata: %s", err.Error())
  579. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  580. return
  581. }
  582. reader, _, err := s.storage.Get(token, filename)
  583. if s.storage.IsNotExist(err) {
  584. http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
  585. return
  586. } else if err != nil {
  587. log.Printf("%s", err.Error())
  588. http.Error(w, "Could not retrieve file.", 500)
  589. return
  590. }
  591. defer reader.Close()
  592. var disposition string
  593. if action == "inline" {
  594. disposition = "inline"
  595. } else {
  596. disposition = "attachment"
  597. }
  598. remainingDownloads, remainingDays := metadata.RemainingLimitHeaderValues()
  599. w.Header().Set("Content-Type", metadata.ContentType)
  600. w.Header().Set("Content-Length", strconv.FormatInt(metadata.ContentLength, 10))
  601. w.Header().Set("Content-Disposition", fmt.Sprintf("%s; filename=\"%s\"", disposition, filename))
  602. w.Header().Set("Connection", "keep-alive")
  603. w.Header().Set("X-Remaining-Downloads", remainingDownloads)
  604. w.Header().Set("X-Remaining-Days", remainingDays)
  605. if w.Header().Get("Range") == "" {
  606. if _, err = io.Copy(w, reader); err != nil {
  607. log.Printf("%s", err.Error())
  608. http.Error(w, "Error occurred copying to output stream", 500)
  609. return
  610. }
  611. return
  612. }
  613. file, err := ioutil.TempFile(s.tempPath, "range-")
  614. if err != nil {
  615. log.Printf("%s", err.Error())
  616. http.Error(w, "Error occurred copying to output stream", 500)
  617. return
  618. }
  619. defer utils.CleanTmpFile(file)
  620. tee := io.TeeReader(reader, file)
  621. for {
  622. b := make([]byte, _5M)
  623. _, err = tee.Read(b)
  624. if err == io.EOF {
  625. break
  626. }
  627. if err != nil {
  628. log.Printf("%s", err.Error())
  629. http.Error(w, "Error occurred copying to output stream", 500)
  630. return
  631. }
  632. }
  633. http.ServeContent(w, r, filename, time.Now(), file)
  634. }
  635. func (s *Server) metadataForRequest(contentType string, contentLength int64, r *http.Request) storage.Metadata {
  636. metadata := storage.Metadata{
  637. ContentType: contentType,
  638. ContentLength: contentLength,
  639. MaxDate: time.Now().Add(s.lifetime),
  640. Downloads: 0,
  641. MaxDownloads: -1,
  642. DeletionToken: utils.Encode(10000000+int64(rand.Intn(1000000000))) + utils.Encode(10000000+int64(rand.Intn(1000000000))),
  643. }
  644. if v := r.Header.Get("Max-Downloads"); v == "" {
  645. } else if v, err := strconv.Atoi(v); err != nil {
  646. } else {
  647. metadata.MaxDownloads = v
  648. }
  649. if maxDays := r.Header.Get("Max-Days"); maxDays != "" {
  650. v, err := strconv.Atoi(maxDays)
  651. if err != nil {
  652. return metadata
  653. }
  654. metadata.MaxDate = time.Now().Add(time.Hour * 24 * time.Duration(v))
  655. }
  656. return metadata
  657. }
  658. func (s *Server) checkMetadata(token, filename string, increaseDownload bool) (metadata storage.Metadata, err error) {
  659. s.Lock(token, filename)
  660. defer s.Unlock(token, filename)
  661. file := fmt.Sprintf("%s/%s", token, filename)
  662. metadata, err = s.storage.Head(token, filename)
  663. if s.storage.IsNotExist(err) {
  664. return metadata, nil
  665. } else if err != nil {
  666. return metadata, err
  667. }
  668. if metadata.MaxDownloads != -1 && metadata.Downloads >= metadata.MaxDownloads {
  669. return metadata, errors.New("max downloads exceeded for " + file)
  670. } else if !metadata.MaxDate.IsZero() && time.Now().After(metadata.MaxDate) {
  671. return metadata, errors.New("file access expired for " + file)
  672. } else {
  673. // update number of downloads
  674. if increaseDownload {
  675. metadata.Downloads++
  676. }
  677. if err := s.storage.Meta(token, filename, metadata); err != nil {
  678. return metadata, errors.New("could not save metadata for " + file)
  679. }
  680. }
  681. return metadata, nil
  682. }
  683. func (s *Server) checkDeletionToken(deletionToken, token, filename string) error {
  684. s.Lock(token, filename)
  685. defer s.Unlock(token, filename)
  686. metadata, err := s.storage.Head(token, filename)
  687. if s.storage.IsNotExist(err) {
  688. return nil
  689. }
  690. if err != nil {
  691. return err
  692. }
  693. if metadata.DeletionToken != deletionToken {
  694. return errors.New("deletion token does not match")
  695. }
  696. return nil
  697. }
  698. func (s *Server) Lock(token, filename string) {
  699. key := path.Join(token, filename)
  700. if _, ok := s.locks[key]; !ok {
  701. s.locks[key] = &sync.Mutex{}
  702. }
  703. s.locks[key].Lock()
  704. }
  705. func (s *Server) Unlock(token, filename string) {
  706. key := path.Join(token, filename)
  707. s.locks[key].Unlock()
  708. }