mirror of https://github.com/Xhofe/alist
251 lines
7.5 KiB
Go
251 lines
7.5 KiB
Go
package net
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"io"
|
|
"mime"
|
|
"mime/multipart"
|
|
"net/http"
|
|
"path/filepath"
|
|
"strconv"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/alist-org/alist/v3/drivers/base"
|
|
"github.com/alist-org/alist/v3/internal/conf"
|
|
"github.com/alist-org/alist/v3/internal/model"
|
|
"github.com/alist-org/alist/v3/pkg/http_range"
|
|
"github.com/alist-org/alist/v3/pkg/utils"
|
|
"github.com/pkg/errors"
|
|
log "github.com/sirupsen/logrus"
|
|
)
|
|
|
|
//this file is inspired by GO_SDK net.http.ServeContent
|
|
|
|
//type RangeReadCloser struct {
|
|
// GetReaderForRange RangeReaderFunc
|
|
//}
|
|
|
|
// ServeHTTP replies to the request using the content in the
|
|
// provided RangeReadCloser. The main benefit of ServeHTTP over io.Copy
|
|
// is that it handles Range requests properly, sets the MIME type, and
|
|
// handles If-Match, If-Unmodified-Since, If-None-Match, If-Modified-Since,
|
|
// and If-Range requests.
|
|
//
|
|
// If the response's Content-Type header is not set, ServeHTTP
|
|
// first tries to deduce the type from name's file extension and,
|
|
// if that fails, falls back to reading the first block of the content
|
|
// and passing it to DetectContentType.
|
|
// The name is otherwise unused; in particular it can be empty and is
|
|
// never sent in the response.
|
|
//
|
|
// If modtime is not the zero time or Unix epoch, ServeHTTP
|
|
// includes it in a Last-Modified header in the response. If the
|
|
// request includes an If-Modified-Since header, ServeHTTP uses
|
|
// modtime to decide whether the content needs to be sent at all.
|
|
//
|
|
// The content's RangeReadCloser method must work: ServeHTTP gives a range,
|
|
// caller will give the reader for that Range.
|
|
//
|
|
// If the caller has set w's ETag header formatted per RFC 7232, section 2.3,
|
|
// ServeHTTP uses it to handle requests using If-Match, If-None-Match, or If-Range.
|
|
func ServeHTTP(w http.ResponseWriter, r *http.Request, name string, modTime time.Time, size int64, RangeReaderFunc model.RangeReaderFunc) {
|
|
setLastModified(w, modTime)
|
|
done, rangeReq := checkPreconditions(w, r, modTime)
|
|
if done {
|
|
return
|
|
}
|
|
|
|
if size < 0 {
|
|
// since too many functions need file size to work,
|
|
// will not implement the support of unknown file size here
|
|
http.Error(w, "negative content size not supported", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
code := http.StatusOK
|
|
|
|
// If Content-Type isn't set, use the file's extension to find it, but
|
|
// if the Content-Type is unset explicitly, do not sniff the type.
|
|
contentTypes, haveType := w.Header()["Content-Type"]
|
|
var contentType string
|
|
if !haveType {
|
|
contentType = mime.TypeByExtension(filepath.Ext(name))
|
|
if contentType == "" {
|
|
// most modern application can handle the default contentType
|
|
contentType = "application/octet-stream"
|
|
}
|
|
w.Header().Set("Content-Type", contentType)
|
|
} else if len(contentTypes) > 0 {
|
|
contentType = contentTypes[0]
|
|
}
|
|
|
|
// handle Content-Range header.
|
|
sendSize := size
|
|
var sendContent io.ReadCloser
|
|
ranges, err := http_range.ParseRange(rangeReq, size)
|
|
switch err {
|
|
case nil:
|
|
case http_range.ErrNoOverlap:
|
|
if size == 0 {
|
|
// Some clients add a Range header to all requests to
|
|
// limit the size of the response. If the file is empty,
|
|
// ignore the range header and respond with a 200 rather
|
|
// than a 416.
|
|
ranges = nil
|
|
break
|
|
}
|
|
w.Header().Set("Content-Range", fmt.Sprintf("bytes */%d", size))
|
|
fallthrough
|
|
default:
|
|
http.Error(w, err.Error(), http.StatusRequestedRangeNotSatisfiable)
|
|
return
|
|
}
|
|
|
|
if sumRangesSize(ranges) > size || size < 0 {
|
|
// The total number of bytes in all the ranges is larger than the size of the file
|
|
// or unknown file size, ignore the range request.
|
|
ranges = nil
|
|
}
|
|
switch {
|
|
case len(ranges) == 0:
|
|
reader, err := RangeReaderFunc(context.Background(), http_range.Range{Length: -1})
|
|
if err != nil {
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
return
|
|
}
|
|
sendContent = reader
|
|
case len(ranges) == 1:
|
|
// RFC 7233, Section 4.1:
|
|
// "If a single part is being transferred, the server
|
|
// generating the 206 response MUST generate a
|
|
// Content-Range header field, describing what range
|
|
// of the selected representation is enclosed, and a
|
|
// payload consisting of the range.
|
|
// ...
|
|
// A server MUST NOT generate a multipart response to
|
|
// a request for a single range, since a client that
|
|
// does not request multiple parts might not support
|
|
// multipart responses."
|
|
ra := ranges[0]
|
|
sendContent, err = RangeReaderFunc(context.Background(), ra)
|
|
if err != nil {
|
|
http.Error(w, err.Error(), http.StatusRequestedRangeNotSatisfiable)
|
|
return
|
|
}
|
|
sendSize = ra.Length
|
|
code = http.StatusPartialContent
|
|
w.Header().Set("Content-Range", ra.ContentRange(size))
|
|
case len(ranges) > 1:
|
|
sendSize, err = rangesMIMESize(ranges, contentType, size)
|
|
if err != nil {
|
|
http.Error(w, err.Error(), http.StatusRequestedRangeNotSatisfiable)
|
|
}
|
|
code = http.StatusPartialContent
|
|
|
|
pr, pw := io.Pipe()
|
|
mw := multipart.NewWriter(pw)
|
|
w.Header().Set("Content-Type", "multipart/byteranges; boundary="+mw.Boundary())
|
|
sendContent = pr
|
|
defer pr.Close() // cause writing goroutine to fail and exit if CopyN doesn't finish.
|
|
go func() {
|
|
for _, ra := range ranges {
|
|
part, err := mw.CreatePart(ra.MimeHeader(contentType, size))
|
|
if err != nil {
|
|
pw.CloseWithError(err)
|
|
return
|
|
}
|
|
reader, err := RangeReaderFunc(context.Background(), ra)
|
|
if err != nil {
|
|
pw.CloseWithError(err)
|
|
return
|
|
}
|
|
if _, err := io.CopyN(part, reader, ra.Length); err != nil {
|
|
pw.CloseWithError(err)
|
|
return
|
|
}
|
|
//defer reader.Close()
|
|
}
|
|
|
|
mw.Close()
|
|
pw.Close()
|
|
}()
|
|
}
|
|
|
|
w.Header().Set("Accept-Ranges", "bytes")
|
|
if w.Header().Get("Content-Encoding") == "" {
|
|
w.Header().Set("Content-Length", strconv.FormatInt(sendSize, 10))
|
|
}
|
|
|
|
w.WriteHeader(code)
|
|
|
|
if r.Method != "HEAD" {
|
|
written, err := io.CopyN(w, sendContent, sendSize)
|
|
if err != nil {
|
|
log.Warnf("ServeHttp error. err: %s ", err)
|
|
if written != sendSize {
|
|
log.Warnf("Maybe size incorrect or reader not giving correct/full data, or connection closed before finish. written bytes: %d ,sendSize:%d, ", written, sendSize)
|
|
}
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
}
|
|
}
|
|
//defer sendContent.Close()
|
|
}
|
|
func ProcessHeader(origin, override http.Header) http.Header {
|
|
result := http.Header{}
|
|
// client header
|
|
for h, val := range origin {
|
|
if utils.SliceContains(conf.SlicesMap[conf.ProxyIgnoreHeaders], strings.ToLower(h)) {
|
|
continue
|
|
}
|
|
result[h] = val
|
|
}
|
|
// needed header
|
|
for h, val := range override {
|
|
result[h] = val
|
|
}
|
|
return result
|
|
}
|
|
|
|
// RequestHttp deal with Header properly then send the request
|
|
func RequestHttp(ctx context.Context, httpMethod string, headerOverride http.Header, URL string) (*http.Response, error) {
|
|
req, err := http.NewRequestWithContext(ctx, httpMethod, URL, nil)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
req.Header = headerOverride
|
|
res, err := HttpClient().Do(req)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
// TODO clean header with blocklist or passlist
|
|
res.Header.Del("set-cookie")
|
|
if res.StatusCode >= 400 {
|
|
all, _ := io.ReadAll(res.Body)
|
|
_ = res.Body.Close()
|
|
msg := string(all)
|
|
log.Debugln(msg)
|
|
return nil, fmt.Errorf("http request [%s] failure,status: %d response:%s", URL, res.StatusCode, msg)
|
|
}
|
|
return res, nil
|
|
}
|
|
|
|
var once sync.Once
|
|
var httpClient *http.Client
|
|
|
|
func HttpClient() *http.Client {
|
|
once.Do(func() {
|
|
httpClient = base.NewHttpClient()
|
|
httpClient.CheckRedirect = func(req *http.Request, via []*http.Request) error {
|
|
if len(via) >= 10 {
|
|
return errors.New("stopped after 10 redirects")
|
|
}
|
|
req.Header.Del("Referer")
|
|
return nil
|
|
}
|
|
})
|
|
return httpClient
|
|
}
|