mirror of https://github.com/Xhofe/alist
133 lines
3.2 KiB
Go
133 lines
3.2 KiB
Go
package handles
|
|
|
|
import (
|
|
"fmt"
|
|
"io"
|
|
stdpath "path"
|
|
"strings"
|
|
|
|
"github.com/alist-org/alist/v3/internal/conf"
|
|
"github.com/alist-org/alist/v3/internal/driver"
|
|
"github.com/alist-org/alist/v3/internal/fs"
|
|
"github.com/alist-org/alist/v3/internal/model"
|
|
"github.com/alist-org/alist/v3/internal/setting"
|
|
"github.com/alist-org/alist/v3/internal/sign"
|
|
"github.com/alist-org/alist/v3/pkg/utils"
|
|
"github.com/alist-org/alist/v3/server/common"
|
|
"github.com/gin-gonic/gin"
|
|
log "github.com/sirupsen/logrus"
|
|
)
|
|
|
|
func Down(c *gin.Context) {
|
|
rawPath := c.MustGet("path").(string)
|
|
filename := stdpath.Base(rawPath)
|
|
storage, err := fs.GetStorage(rawPath)
|
|
if err != nil {
|
|
common.ErrorResp(c, err, 500)
|
|
return
|
|
}
|
|
if common.ShouldProxy(storage, filename) {
|
|
Proxy(c)
|
|
return
|
|
} else {
|
|
link, _, err := fs.Link(c, rawPath, model.LinkArgs{
|
|
IP: c.ClientIP(),
|
|
Header: c.Request.Header,
|
|
Type: c.Query("type"),
|
|
})
|
|
if err != nil {
|
|
common.ErrorResp(c, err, 500)
|
|
return
|
|
}
|
|
if link.Data != nil {
|
|
defer func(Data io.ReadCloser) {
|
|
err := Data.Close()
|
|
if err != nil {
|
|
log.Errorf("close data error: %s", err)
|
|
}
|
|
}(link.Data)
|
|
}
|
|
c.Header("Referrer-Policy", "no-referrer")
|
|
c.Header("Cache-Control", "max-age=0, no-cache, no-store, must-revalidate")
|
|
if setting.GetBool(conf.ForwardDirectLinkParams) {
|
|
query := c.Request.URL.Query()
|
|
query.Del("sign")
|
|
link.URL, err = utils.InjectQuery(link.URL, query)
|
|
if err != nil {
|
|
common.ErrorResp(c, err, 500)
|
|
return
|
|
}
|
|
}
|
|
c.Redirect(302, link.URL)
|
|
}
|
|
}
|
|
|
|
func Proxy(c *gin.Context) {
|
|
rawPath := c.MustGet("path").(string)
|
|
filename := stdpath.Base(rawPath)
|
|
storage, err := fs.GetStorage(rawPath)
|
|
if err != nil {
|
|
common.ErrorResp(c, err, 500)
|
|
return
|
|
}
|
|
if canProxy(storage, filename) {
|
|
downProxyUrl := storage.GetStorage().DownProxyUrl
|
|
if downProxyUrl != "" {
|
|
_, ok := c.GetQuery("d")
|
|
if !ok {
|
|
URL := fmt.Sprintf("%s%s?sign=%s",
|
|
strings.Split(downProxyUrl, "\n")[0],
|
|
utils.EncodePath(rawPath, true),
|
|
sign.Sign(rawPath))
|
|
c.Redirect(302, URL)
|
|
return
|
|
}
|
|
}
|
|
link, file, err := fs.Link(c, rawPath, model.LinkArgs{
|
|
Header: c.Request.Header,
|
|
Type: c.Query("type"),
|
|
})
|
|
if err != nil {
|
|
common.ErrorResp(c, err, 500)
|
|
return
|
|
}
|
|
if link.URL != "" && setting.GetBool(conf.ForwardDirectLinkParams) {
|
|
query := c.Request.URL.Query()
|
|
query.Del("sign")
|
|
link.URL, err = utils.InjectQuery(link.URL, query)
|
|
if err != nil {
|
|
common.ErrorResp(c, err, 500)
|
|
return
|
|
}
|
|
}
|
|
err = common.Proxy(c.Writer, c.Request, link, file)
|
|
if err != nil {
|
|
common.ErrorResp(c, err, 500, true)
|
|
return
|
|
}
|
|
} else {
|
|
common.ErrorStrResp(c, "proxy not allowed", 403)
|
|
return
|
|
}
|
|
}
|
|
|
|
// TODO need optimize
|
|
// when can be proxy?
|
|
// 1. text file
|
|
// 2. config.MustProxy()
|
|
// 3. storage.WebProxy
|
|
// 4. proxy_types
|
|
// solution: text_file + shouldProxy()
|
|
func canProxy(storage driver.Driver, filename string) bool {
|
|
if storage.Config().MustProxy() || storage.GetStorage().WebProxy || storage.GetStorage().WebdavProxy() {
|
|
return true
|
|
}
|
|
if utils.SliceContains(conf.SlicesMap[conf.ProxyTypes], utils.Ext(filename)) {
|
|
return true
|
|
}
|
|
if utils.SliceContains(conf.SlicesMap[conf.TextTypes], utils.Ext(filename)) {
|
|
return true
|
|
}
|
|
return false
|
|
}
|