Files
Gokapi/internal/storage/FileServing.go

425 lines
13 KiB
Go

package storage
/**
Serving and processing uploaded files
*/
import (
"bytes"
"crypto/sha1"
"encoding/hex"
"errors"
"fmt"
"github.com/forceu/gokapi/internal/configuration"
"github.com/forceu/gokapi/internal/configuration/datastorage"
"github.com/forceu/gokapi/internal/encryption"
"github.com/forceu/gokapi/internal/helper"
"github.com/forceu/gokapi/internal/logging"
"github.com/forceu/gokapi/internal/models"
"github.com/forceu/gokapi/internal/storage/cloudstorage/aws"
"github.com/forceu/gokapi/internal/webserver/downloadstatus"
"io"
"io/ioutil"
"log"
"mime/multipart"
"net/http"
"os"
"path/filepath"
"strconv"
"strings"
"time"
)
// NewFile creates a new file in the system. Called after an upload has been completed. If a file with the same sha256 hash
// already exists, it is deduplicated. This function gathers information about the file, creates an ID and saves
// it into the global configuration.
func NewFile(fileContent io.Reader, fileHeader *multipart.FileHeader, uploadRequest models.UploadRequest) (models.File, error) {
if fileHeader.Size > int64(configuration.Get().MaxFileSizeMB)*1024*1024 {
return models.File{}, errors.New("upload limit exceeded")
}
var hasBeenRenamed bool
reader, hash, tempFile, encInfo := generateHash(fileContent, fileHeader, uploadRequest)
defer deleteTempFile(tempFile, &hasBeenRenamed)
id := helper.GenerateRandomString(configuration.Get().LengthId)
file := models.File{
Id: id,
Encryption: encInfo,
Name: fileHeader.Filename,
SHA256: hex.EncodeToString(hash),
Size: helper.ByteCountSI(fileHeader.Size),
ExpireAt: uploadRequest.ExpiryTimestamp,
ExpireAtString: time.Unix(uploadRequest.ExpiryTimestamp, 0).Format("2006-01-02 15:04"),
DownloadsRemaining: uploadRequest.AllowedDownloads,
PasswordHash: configuration.HashPassword(uploadRequest.Password, true),
ContentType: fileHeader.Header.Get("Content-Type"),
UnlimitedTime: uploadRequest.UnlimitedTime,
UnlimitedDownloads: uploadRequest.UnlimitedDownload,
}
if aws.IsAvailable() {
if !configuration.Get().PicturesAlwaysLocal || !isPictureFile(file.Name) {
aws.AddBucketName(&file)
}
}
addHotlink(&file)
filename := configuration.Get().DataDir + "/" + file.SHA256
dataDir := configuration.Get().DataDir
if aws.IsAvailable() {
aws.AddBucketName(&file)
_, err := aws.Upload(reader, file)
if err != nil {
return models.File{}, err
}
datastorage.SaveMetaData(file)
return file, nil
}
fileWithHashExists := helper.FileExists(dataDir + "/" + file.SHA256)
if fileWithHashExists {
encryptionLevel := configuration.Get().Encryption.Level
previousEncryption, ok := getEncInfoFromExistingFile(file.SHA256)
if !ok && encryptionLevel != encryption.NoEncryption && encryptionLevel != encryption.EndToEndEncryption {
err := os.Remove(dataDir + "/" + file.SHA256)
helper.Check(err)
fileWithHashExists = false
} else {
file.Encryption = previousEncryption
}
}
if !fileWithHashExists {
if tempFile != nil {
err := tempFile.Close()
helper.Check(err)
err = os.Rename(tempFile.Name(), dataDir+"/"+file.SHA256)
helper.Check(err)
hasBeenRenamed = true
datastorage.SaveMetaData(file)
return file, nil
}
destinationFile, err := os.OpenFile(filename, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0644)
if err != nil {
return models.File{}, err
}
defer destinationFile.Close()
_, err = io.Copy(destinationFile, reader)
if err != nil {
return models.File{}, err
}
}
datastorage.SaveMetaData(file)
return file, nil
}
func getEncInfoFromExistingFile(hash string) (models.EncryptionInfo, bool) {
encryptionLevel := configuration.Get().Encryption.Level
if encryptionLevel == encryption.NoEncryption || encryptionLevel == encryption.EndToEndEncryption {
return models.EncryptionInfo{}, true
}
allFiles := datastorage.GetAllMetadata()
for _, existingFile := range allFiles {
if existingFile.SHA256 == hash {
return existingFile.Encryption, true
}
}
return models.EncryptionInfo{}, false
}
func deleteTempFile(file *os.File, hasBeenRenamed *bool) {
if file != nil && !*hasBeenRenamed {
err := file.Close()
helper.Check(err)
err = os.Remove(file.Name())
helper.Check(err)
}
}
// DeleteAllEncrypted marks all encrypted files for deletion on next cleanup
func DeleteAllEncrypted() {
files := datastorage.GetAllMetadata()
for _, file := range files {
if file.Encryption.IsEncrypted {
DeleteFile(file.Id, false)
}
}
}
// Generates the SHA1 hash of an uploaded file and returns a reader for the file, the hash and if a temporary file was created the
// reference to that file.
func generateHash(fileContent io.Reader, fileHeader *multipart.FileHeader, uploadRequest models.UploadRequest) (io.Reader, []byte, *os.File, models.EncryptionInfo) {
hash := sha1.New()
encInfo := models.EncryptionInfo{}
if fileHeader.Size <= int64(uploadRequest.MaxMemory)*1024*1024 {
content, err := ioutil.ReadAll(fileContent)
helper.Check(err)
hash.Write(content)
if isEncryptionRequested() {
encContent := new(bytes.Buffer)
err = encryption.Encrypt(&encInfo, bytes.NewReader(content), encContent)
helper.Check(err)
hash.Write([]byte(configuration.Get().Authentication.SaltFiles))
return bytes.NewReader(encContent.Bytes()), hash.Sum(nil), nil, encInfo
}
return bytes.NewReader(content), hash.Sum(nil), nil, encInfo
}
tempFile, err := os.CreateTemp(uploadRequest.DataDir, "upload")
helper.Check(err)
var multiWriter io.Writer
multiWriter = io.MultiWriter(tempFile, hash)
_, err = io.Copy(multiWriter, fileContent)
helper.Check(err)
_, err = tempFile.Seek(0, io.SeekStart)
helper.Check(err)
if isEncryptionRequested() {
tempFileEnc, err := os.CreateTemp(uploadRequest.DataDir, "upload")
helper.Check(err)
encryption.Encrypt(&encInfo, tempFile, tempFileEnc)
err = os.Remove(tempFile.Name())
helper.Check(err)
hash.Write([]byte(configuration.Get().Authentication.SaltFiles))
tempFile = tempFileEnc
}
// Instead of returning a reference to the file as the 3rd result, one could use reflections. However, that would be more expensive.
return tempFile, hash.Sum(nil), tempFile, encInfo
}
func isEncryptionRequested() bool {
switch configuration.Get().Encryption.Level {
case encryption.NoEncryption:
return false
case encryption.LocalEncryptionStored:
fallthrough
case encryption.LocalEncryptionInput:
return !aws.IsAvailable()
case encryption.FullEncryptionStored:
fallthrough
case encryption.FullEncryptionInput:
return true
default:
log.Fatalln("Unknown encryption level requested")
return false
}
}
var imageFileExtensions = []string{".jpg", ".jpeg", ".png", ".gif", ".webp", ".bmp", ".svg"}
// If file is an image, create link for hotlinking
func addHotlink(file *models.File) {
if RequiresClientDecryption(*file) {
return
}
if !isPictureFile(file.Name) {
return
}
link := helper.GenerateRandomString(40) + getFileExtension(file.Name)
file.HotlinkId = link
datastorage.SaveHotlink(*file)
}
func getFileExtension(filename string) string {
return strings.ToLower(filepath.Ext(filename))
}
func isPictureFile(filename string) bool {
extension := getFileExtension(filename)
return helper.IsInArray(imageFileExtensions, extension)
}
// GetFile gets the file by id. Returns (empty File, false) if invalid / expired file
// or (file, true) if valid file
func GetFile(id string) (models.File, bool) {
var emptyResult = models.File{}
if id == "" {
return emptyResult, false
}
file, ok := datastorage.GetMetaDataById(id)
if !ok {
return emptyResult, false
}
if IsExpiredFile(file, time.Now().Unix()) {
return emptyResult, false
}
if !FileExists(file, configuration.Get().DataDir) {
return emptyResult, false
}
return file, true
}
// GetFileByHotlink gets the file by hotlink id. Returns (empty File, false) if invalid / expired file
// or (file, true) if valid file
func GetFileByHotlink(id string) (models.File, bool) {
var emptyResult = models.File{}
if id == "" {
return emptyResult, false
}
fileId, ok := datastorage.GetHotlink(id)
if !ok {
return emptyResult, false
}
return GetFile(fileId)
}
// RequiresClientDecryption checks if the file needs to be decrypted by the client
// (if remote storage or end-to-end encryption)
func RequiresClientDecryption(file models.File) bool {
if !file.Encryption.IsEncrypted {
return false
}
return file.AwsBucket != ""
}
// ServeFile subtracts a download allowance and serves the file to the browser
func ServeFile(file models.File, w http.ResponseWriter, r *http.Request, forceDownload bool) {
file.DownloadsRemaining = file.DownloadsRemaining - 1
datastorage.SaveMetaData(file)
logging.AddDownload(&file, r)
// If file is stored on AWS
if file.AwsBucket != "" {
// We are not setting a download complete status as there is no reliable way to
// confirm that the file has been completely downloaded. It expires automatically after 24 hours.
downloadstatus.SetDownload(file)
err := aws.RedirectToDownload(w, r, file, forceDownload)
helper.Check(err)
return
}
fileData, size := getFileHandler(file, configuration.Get().DataDir)
statusId := downloadstatus.SetDownload(file)
writeDownloadHeaders(file, w, forceDownload)
if file.Encryption.IsEncrypted && !RequiresClientDecryption(file) {
err := encryption.DecryptReader(file.Encryption, fileData, w)
if err != nil {
w.Write([]byte("Error decrypting file"))
panic(err)
}
} else {
w.Header().Set("Content-Length", strconv.FormatInt(size, 10))
http.ServeContent(w, r, file.Name, time.Now(), fileData)
}
downloadstatus.SetComplete(statusId)
}
func writeDownloadHeaders(file models.File, w http.ResponseWriter, forceDownload bool) {
if forceDownload {
w.Header().Set("Content-Disposition", "attachment; filename=\""+file.Name+"\"")
} else {
w.Header().Set("Content-Disposition", "inline; filename=\""+file.Name+"\"")
}
w.Header().Set("Content-Type", file.ContentType)
if file.Encryption.IsEncrypted {
w.Header().Set("Accept-Ranges", "bytes")
w.Header().Set("Last-Modified", time.Now().UTC().Format(http.TimeFormat))
}
}
func getFileHandler(file models.File, dataDir string) (*os.File, int64) {
storageData, err := os.OpenFile(dataDir+"/"+file.SHA256, os.O_RDONLY, 0644)
helper.Check(err)
size, err := helper.GetFileSize(storageData)
helper.Check(err)
return storageData, size
}
// FileExists checks if the file exists locally or in S3
func FileExists(file models.File, dataDir string) bool {
if file.AwsBucket != "" {
result, err := aws.FileExists(file)
if err != nil {
fmt.Println("Warning, cannot check file " + file.Id + ": " + err.Error())
return true
}
return result
}
return helper.FileExists(dataDir + "/" + file.SHA256)
}
// CleanUp removes expired files from the config and from the filesystem if they are not referenced by other files anymore
// Will be called periodically or after a file has been manually deleted in the admin view.
// If parameter periodic is true, this function is recursive and calls itself every hour.
func CleanUp(periodic bool) {
downloadstatus.Clean()
timeNow := time.Now().Unix()
wasItemDeleted := false
for key, element := range datastorage.GetAllMetadata() {
fileExists := FileExists(element, configuration.Get().DataDir)
if !fileExists || isExpiredFileWithoutDownload(element, timeNow) {
deleteFile := true
for _, secondLoopElement := range datastorage.GetAllMetadata() {
if (element.Id != secondLoopElement.Id) && (element.SHA256 == secondLoopElement.SHA256) {
deleteFile = false
}
}
if deleteFile && fileExists {
deleteSource(element, configuration.Get().DataDir)
}
if element.HotlinkId != "" {
datastorage.DeleteHotlink(element.HotlinkId)
}
datastorage.DeleteMetaData(key)
wasItemDeleted = true
}
}
if wasItemDeleted {
CleanUp(false)
}
if periodic {
go func() {
time.Sleep(time.Hour)
CleanUp(periodic)
}()
}
datastorage.RunGarbageCollection()
}
// IsExpiredFile returns true if the file is expired, either due to download count
// or if the provided timestamp is after the expiry timestamp
func IsExpiredFile(file models.File, timeNow int64) bool {
return (file.ExpireAt < timeNow && !file.UnlimitedTime) ||
(file.DownloadsRemaining < 1 && !file.UnlimitedDownloads)
}
func isExpiredFileWithoutDownload(file models.File, timeNow int64) bool {
if downloadstatus.IsCurrentlyDownloading(file) {
return false
}
return IsExpiredFile(file, timeNow)
}
func deleteSource(file models.File, dataDir string) {
var err error
if file.AwsBucket != "" {
_, err = aws.DeleteObject(file)
} else {
err = os.Remove(dataDir + "/" + file.SHA256)
}
if err != nil {
fmt.Println("Warning, cannot delete file " + file.Id + ": " + err.Error())
}
}
// DeleteFile is called when an admin requests deletion of a file
// Returns true if file was deleted or false if ID did not exist
func DeleteFile(keyId string, deleteSource bool) bool {
if keyId == "" {
return false
}
item, ok := datastorage.GetMetaDataById(keyId)
if !ok {
return false
}
item.ExpireAt = 0
item.UnlimitedTime = false
datastorage.SaveMetaData(item)
for _, status := range downloadstatus.GetAll() {
if status.FileId == item.Id {
downloadstatus.SetComplete(status.Id)
}
}
if deleteSource {
go CleanUp(false)
}
return true
}