mirror of https://github.com/Xhofe/alist
				
				
				
			
		
			
				
	
	
		
			142 lines
		
	
	
		
			3.6 KiB
		
	
	
	
		
			Go
		
	
	
			
		
		
	
	
			142 lines
		
	
	
		
			3.6 KiB
		
	
	
	
		
			Go
		
	
	
package handles
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"io"
 | 
						|
	stdpath "path"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"github.com/alist-org/alist/v3/internal/conf"
 | 
						|
	"github.com/alist-org/alist/v3/internal/driver"
 | 
						|
	"github.com/alist-org/alist/v3/internal/fs"
 | 
						|
	"github.com/alist-org/alist/v3/internal/model"
 | 
						|
	"github.com/alist-org/alist/v3/internal/setting"
 | 
						|
	"github.com/alist-org/alist/v3/internal/sign"
 | 
						|
	"github.com/alist-org/alist/v3/pkg/utils"
 | 
						|
	"github.com/alist-org/alist/v3/server/common"
 | 
						|
	"github.com/gin-gonic/gin"
 | 
						|
	log "github.com/sirupsen/logrus"
 | 
						|
)
 | 
						|
 | 
						|
func Down(c *gin.Context) {
 | 
						|
	rawPath := c.MustGet("path").(string)
 | 
						|
	filename := stdpath.Base(rawPath)
 | 
						|
	storage, err := fs.GetStorage(rawPath, &fs.GetStoragesArgs{})
 | 
						|
	if err != nil {
 | 
						|
		common.ErrorResp(c, err, 500)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	if common.ShouldProxy(storage, filename) {
 | 
						|
		Proxy(c)
 | 
						|
		return
 | 
						|
	} else {
 | 
						|
		link, _, err := fs.Link(c, rawPath, model.LinkArgs{
 | 
						|
			IP:      c.ClientIP(),
 | 
						|
			Header:  c.Request.Header,
 | 
						|
			Type:    c.Query("type"),
 | 
						|
			HttpReq: c.Request,
 | 
						|
		})
 | 
						|
		if err != nil {
 | 
						|
			common.ErrorResp(c, err, 500)
 | 
						|
			return
 | 
						|
		}
 | 
						|
		if link.MFile != nil {
 | 
						|
			defer func(ReadSeekCloser io.ReadCloser) {
 | 
						|
				err := ReadSeekCloser.Close()
 | 
						|
				if err != nil {
 | 
						|
					log.Errorf("close data error: %s", err)
 | 
						|
				}
 | 
						|
			}(link.MFile)
 | 
						|
		}
 | 
						|
		c.Header("Referrer-Policy", "no-referrer")
 | 
						|
		c.Header("Cache-Control", "max-age=0, no-cache, no-store, must-revalidate")
 | 
						|
		if setting.GetBool(conf.ForwardDirectLinkParams) {
 | 
						|
			query := c.Request.URL.Query()
 | 
						|
			for _, v := range conf.SlicesMap[conf.IgnoreDirectLinkParams] {
 | 
						|
				query.Del(v)
 | 
						|
			}
 | 
						|
			link.URL, err = utils.InjectQuery(link.URL, query)
 | 
						|
			if err != nil {
 | 
						|
				common.ErrorResp(c, err, 500)
 | 
						|
				return
 | 
						|
			}
 | 
						|
		}
 | 
						|
		c.Redirect(302, link.URL)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func Proxy(c *gin.Context) {
 | 
						|
	rawPath := c.MustGet("path").(string)
 | 
						|
	filename := stdpath.Base(rawPath)
 | 
						|
	storage, err := fs.GetStorage(rawPath, &fs.GetStoragesArgs{})
 | 
						|
	if err != nil {
 | 
						|
		common.ErrorResp(c, err, 500)
 | 
						|
		return
 | 
						|
	}
 | 
						|
	if canProxy(storage, filename) {
 | 
						|
		downProxyUrl := storage.GetStorage().DownProxyUrl
 | 
						|
		if downProxyUrl != "" {
 | 
						|
			_, ok := c.GetQuery("d")
 | 
						|
			if !ok {
 | 
						|
				URL := fmt.Sprintf("%s%s?sign=%s",
 | 
						|
					strings.Split(downProxyUrl, "\n")[0],
 | 
						|
					utils.EncodePath(rawPath, true),
 | 
						|
					sign.Sign(rawPath))
 | 
						|
				c.Redirect(302, URL)
 | 
						|
				return
 | 
						|
			}
 | 
						|
		}
 | 
						|
		link, file, err := fs.Link(c, rawPath, model.LinkArgs{
 | 
						|
			Header:  c.Request.Header,
 | 
						|
			Type:    c.Query("type"),
 | 
						|
			HttpReq: c.Request,
 | 
						|
		})
 | 
						|
		if err != nil {
 | 
						|
			common.ErrorResp(c, err, 500)
 | 
						|
			return
 | 
						|
		}
 | 
						|
		if link.URL != "" && setting.GetBool(conf.ForwardDirectLinkParams) {
 | 
						|
			query := c.Request.URL.Query()
 | 
						|
			for _, v := range conf.SlicesMap[conf.IgnoreDirectLinkParams] {
 | 
						|
				query.Del(v)
 | 
						|
			}
 | 
						|
			link.URL, err = utils.InjectQuery(link.URL, query)
 | 
						|
			if err != nil {
 | 
						|
				common.ErrorResp(c, err, 500)
 | 
						|
				return
 | 
						|
			}
 | 
						|
		}
 | 
						|
		if storage.GetStorage().ProxyRange {
 | 
						|
			common.ProxyRange(link, file.GetSize())
 | 
						|
		}
 | 
						|
		err = common.Proxy(c.Writer, c.Request, link, file)
 | 
						|
		if err != nil {
 | 
						|
			common.ErrorResp(c, err, 500, true)
 | 
						|
			return
 | 
						|
		}
 | 
						|
	} else {
 | 
						|
		common.ErrorStrResp(c, "proxy not allowed", 403)
 | 
						|
		return
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// TODO need optimize
 | 
						|
// when can be proxy?
 | 
						|
// 1. text file
 | 
						|
// 2. config.MustProxy()
 | 
						|
// 3. storage.WebProxy
 | 
						|
// 4. proxy_types
 | 
						|
// solution: text_file + shouldProxy()
 | 
						|
func canProxy(storage driver.Driver, filename string) bool {
 | 
						|
	if storage.Config().MustProxy() || storage.GetStorage().WebProxy || storage.GetStorage().WebdavProxy() {
 | 
						|
		return true
 | 
						|
	}
 | 
						|
	if utils.SliceContains(conf.SlicesMap[conf.ProxyTypes], utils.Ext(filename)) {
 | 
						|
		return true
 | 
						|
	}
 | 
						|
	if utils.SliceContains(conf.SlicesMap[conf.TextTypes], utils.Ext(filename)) {
 | 
						|
		return true
 | 
						|
	}
 | 
						|
	return false
 | 
						|
}
 |