2019-06-30 17:07:58 -05:00
|
|
|
// Copyright 2015 Matthew Holt and The Caddy Authors
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2019-05-20 22:21:33 -05:00
|
|
|
package fileserver
|
2019-03-31 21:41:29 -05:00
|
|
|
|
|
|
|
import (
|
2019-08-08 00:59:02 -05:00
|
|
|
"bytes"
|
2019-05-20 11:59:20 -05:00
|
|
|
"fmt"
|
2019-05-20 16:46:34 -05:00
|
|
|
"html/template"
|
2019-10-28 15:39:37 -05:00
|
|
|
"io"
|
2019-05-20 11:59:20 -05:00
|
|
|
weakrand "math/rand"
|
2019-06-21 15:36:26 -05:00
|
|
|
"mime"
|
2019-03-31 21:41:29 -05:00
|
|
|
"net/http"
|
2019-05-20 11:59:20 -05:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
2019-08-08 00:59:02 -05:00
|
|
|
"sync"
|
2019-05-20 11:59:20 -05:00
|
|
|
"time"
|
2019-03-31 21:41:29 -05:00
|
|
|
|
2019-07-02 13:37:06 -05:00
|
|
|
"github.com/caddyserver/caddy/v2"
|
|
|
|
"github.com/caddyserver/caddy/v2/modules/caddyhttp"
|
2021-03-29 19:47:19 -05:00
|
|
|
"github.com/caddyserver/caddy/v2/modules/caddyhttp/encode"
|
2020-11-26 11:37:42 -05:00
|
|
|
"go.uber.org/zap"
|
2019-03-31 21:41:29 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
2019-05-20 16:46:34 -05:00
|
|
|
weakrand.Seed(time.Now().UnixNano())
|
|
|
|
|
2019-08-21 11:46:35 -05:00
|
|
|
caddy.RegisterModule(FileServer{})
|
2019-03-31 21:41:29 -05:00
|
|
|
}
|
|
|
|
|
2019-05-20 22:21:33 -05:00
|
|
|
// FileServer implements a static file server responder for Caddy.
|
|
|
|
type FileServer struct {
|
2019-12-23 14:45:35 -05:00
|
|
|
// The path to the root of the site. Default is `{http.vars.root}` if set,
|
|
|
|
// or current working directory otherwise.
|
|
|
|
Root string `json:"root,omitempty"`
|
|
|
|
|
|
|
|
// A list of files or folders to hide; the file server will pretend as if
|
2020-11-02 16:20:12 -05:00
|
|
|
// they don't exist. Accepts globular patterns like "*.ext" or "/foo/*/bar"
|
|
|
|
// as well as placeholders. Because site roots can be dynamic, this list
|
|
|
|
// uses file system paths, not request paths. To clarify, the base of
|
|
|
|
// relative paths is the current working directory, NOT the site root.
|
|
|
|
//
|
|
|
|
// Entries without a path separator (`/` or `\` depending on OS) will match
|
|
|
|
// any file or directory of that name regardless of its path. To hide only a
|
|
|
|
// specific file with a name that may not be unique, always use a path
|
|
|
|
// separator. For example, to hide all files or folder trees named "hidden",
|
|
|
|
// put "hidden" in the list. To hide only ./hidden, put "./hidden" in the list.
|
|
|
|
//
|
|
|
|
// When possible, all paths are resolved to their absolute form before
|
|
|
|
// comparisons are made. For maximum clarity and explictness, use complete,
|
|
|
|
// absolute paths; or, for greater portability, use relative paths instead.
|
2019-12-23 14:45:35 -05:00
|
|
|
Hide []string `json:"hide,omitempty"`
|
|
|
|
|
|
|
|
// The names of files to try as index files if a folder is requested.
|
|
|
|
IndexNames []string `json:"index_names,omitempty"`
|
|
|
|
|
|
|
|
// Enables file listings if a directory was requested and no index
|
|
|
|
// file is present.
|
|
|
|
Browse *Browse `json:"browse,omitempty"`
|
|
|
|
|
|
|
|
// Use redirects to enforce trailing slashes for directories, or to
|
|
|
|
// remove trailing slash from URIs for files. Default is true.
|
|
|
|
CanonicalURIs *bool `json:"canonical_uris,omitempty"`
|
|
|
|
|
|
|
|
// If pass-thru mode is enabled and a requested file is not found,
|
|
|
|
// it will invoke the next handler in the chain instead of returning
|
|
|
|
// a 404 error. By default, this is false (disabled).
|
|
|
|
PassThru bool `json:"pass_thru,omitempty"`
|
2020-11-26 11:37:42 -05:00
|
|
|
|
2021-03-29 19:47:19 -05:00
|
|
|
// Selection of encoders to use to check for precompressed files.
|
|
|
|
PrecompressedRaw caddy.ModuleMap `json:"precompressed,omitempty" caddy:"namespace=http.precompressed"`
|
|
|
|
|
|
|
|
// If the client has no strong preference (q-factor), choose these encodings in order.
|
|
|
|
// If no order specified here, the first encoding from the Accept-Encoding header
|
|
|
|
// that both client and server support is used
|
|
|
|
PrecompressedOrder []string `json:"precompressed_order,omitempty"`
|
|
|
|
|
|
|
|
precompressors map[string]encode.Precompressed
|
|
|
|
|
2020-11-26 11:37:42 -05:00
|
|
|
logger *zap.Logger
|
2019-03-31 21:41:29 -05:00
|
|
|
}
|
|
|
|
|
2019-08-21 11:46:35 -05:00
|
|
|
// CaddyModule returns the Caddy module information.
|
|
|
|
func (FileServer) CaddyModule() caddy.ModuleInfo {
|
|
|
|
return caddy.ModuleInfo{
|
2019-12-10 15:36:46 -05:00
|
|
|
ID: "http.handlers.file_server",
|
|
|
|
New: func() caddy.Module { return new(FileServer) },
|
2019-08-21 11:46:35 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-20 11:59:20 -05:00
|
|
|
// Provision sets up the static files responder.
|
2019-06-14 12:58:28 -05:00
|
|
|
func (fsrv *FileServer) Provision(ctx caddy.Context) error {
|
2020-11-26 11:37:42 -05:00
|
|
|
fsrv.logger = ctx.Logger(fsrv)
|
|
|
|
|
2019-09-09 09:21:45 -05:00
|
|
|
if fsrv.Root == "" {
|
|
|
|
fsrv.Root = "{http.vars.root}"
|
|
|
|
}
|
|
|
|
|
2019-05-20 22:21:33 -05:00
|
|
|
if fsrv.IndexNames == nil {
|
|
|
|
fsrv.IndexNames = defaultIndexNames
|
2019-05-20 11:59:20 -05:00
|
|
|
}
|
2019-05-20 16:46:34 -05:00
|
|
|
|
2019-05-20 22:21:33 -05:00
|
|
|
if fsrv.Browse != nil {
|
2019-05-20 16:46:34 -05:00
|
|
|
var tpl *template.Template
|
|
|
|
var err error
|
2019-05-20 22:21:33 -05:00
|
|
|
if fsrv.Browse.TemplateFile != "" {
|
|
|
|
tpl, err = template.ParseFiles(fsrv.Browse.TemplateFile)
|
2019-05-20 16:46:34 -05:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("parsing browse template file: %v", err)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
tpl, err = template.New("default_listing").Parse(defaultBrowseTemplate)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("parsing default browse template: %v", err)
|
|
|
|
}
|
|
|
|
}
|
2019-05-20 22:21:33 -05:00
|
|
|
fsrv.Browse.template = tpl
|
2019-05-20 16:46:34 -05:00
|
|
|
}
|
|
|
|
|
2020-11-02 16:20:12 -05:00
|
|
|
// for hide paths that are static (i.e. no placeholders), we can transform them into
|
|
|
|
// absolute paths before the server starts for very slight performance improvement
|
|
|
|
for i, h := range fsrv.Hide {
|
|
|
|
if !strings.Contains(h, "{") && strings.Contains(h, separator) {
|
|
|
|
if abs, err := filepath.Abs(h); err == nil {
|
|
|
|
fsrv.Hide[i] = abs
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-29 19:47:19 -05:00
|
|
|
mods, err := ctx.LoadModule(fsrv, "PrecompressedRaw")
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("loading encoder modules: %v", err)
|
|
|
|
}
|
|
|
|
for modName, modIface := range mods.(map[string]interface{}) {
|
|
|
|
p, ok := modIface.(encode.Precompressed)
|
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("module %s is not precompressor", modName)
|
|
|
|
}
|
|
|
|
ae := p.AcceptEncoding()
|
|
|
|
if ae == "" {
|
|
|
|
return fmt.Errorf("precompressor does not specify an Accept-Encoding value")
|
|
|
|
}
|
|
|
|
suffix := p.Suffix()
|
|
|
|
if suffix == "" {
|
|
|
|
return fmt.Errorf("precompressor does not specify a Suffix value")
|
|
|
|
}
|
|
|
|
if _, ok := fsrv.precompressors[ae]; ok {
|
|
|
|
return fmt.Errorf("precompressor already added: %s", ae)
|
|
|
|
}
|
|
|
|
if fsrv.precompressors == nil {
|
|
|
|
fsrv.precompressors = make(map[string]encode.Precompressed)
|
|
|
|
}
|
|
|
|
fsrv.precompressors[ae] = p
|
|
|
|
}
|
|
|
|
|
2019-03-31 21:41:29 -05:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-11-15 19:32:13 -05:00
|
|
|
func (fsrv *FileServer) ServeHTTP(w http.ResponseWriter, r *http.Request, next caddyhttp.Handler) error {
|
2019-12-29 15:12:52 -05:00
|
|
|
repl := r.Context().Value(caddy.ReplacerCtxKey).(*caddy.Replacer)
|
2019-05-20 11:59:20 -05:00
|
|
|
|
2019-05-20 22:21:33 -05:00
|
|
|
filesToHide := fsrv.transformHidePaths(repl)
|
|
|
|
|
2019-08-09 13:05:47 -05:00
|
|
|
root := repl.ReplaceAll(fsrv.Root, ".")
|
2021-03-01 15:49:13 -05:00
|
|
|
filename := sanitizedPathJoin(root, r.URL.Path)
|
2019-05-20 11:59:20 -05:00
|
|
|
|
2020-11-26 11:37:42 -05:00
|
|
|
fsrv.logger.Debug("sanitized path join",
|
|
|
|
zap.String("site_root", root),
|
2021-03-01 15:49:13 -05:00
|
|
|
zap.String("request_path", r.URL.Path),
|
2020-11-26 11:37:42 -05:00
|
|
|
zap.String("result", filename))
|
|
|
|
|
2019-05-20 11:59:20 -05:00
|
|
|
// get information about the file
|
|
|
|
info, err := os.Stat(filename)
|
|
|
|
if err != nil {
|
2019-05-20 18:15:38 -05:00
|
|
|
err = mapDirOpenError(err, filename)
|
2019-05-20 11:59:20 -05:00
|
|
|
if os.IsNotExist(err) {
|
2019-11-15 19:32:13 -05:00
|
|
|
return fsrv.notFound(w, r, next)
|
2019-05-20 11:59:20 -05:00
|
|
|
} else if os.IsPermission(err) {
|
|
|
|
return caddyhttp.Error(http.StatusForbidden, err)
|
|
|
|
}
|
|
|
|
// TODO: treat this as resource exhaustion like with os.Open? Or unnecessary here?
|
|
|
|
return caddyhttp.Error(http.StatusInternalServerError, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// if the request mapped to a directory, see if
|
|
|
|
// there is an index file we can serve
|
2019-09-09 09:21:45 -05:00
|
|
|
var implicitIndexFile bool
|
2019-05-20 22:21:33 -05:00
|
|
|
if info.IsDir() && len(fsrv.IndexNames) > 0 {
|
|
|
|
for _, indexPage := range fsrv.IndexNames {
|
2019-05-20 18:15:38 -05:00
|
|
|
indexPath := sanitizedPathJoin(filename, indexPage)
|
2019-05-20 16:46:34 -05:00
|
|
|
if fileHidden(indexPath, filesToHide) {
|
2019-05-20 11:59:20 -05:00
|
|
|
// pretend this file doesn't exist
|
2020-11-26 11:37:42 -05:00
|
|
|
fsrv.logger.Debug("hiding index file",
|
|
|
|
zap.String("filename", indexPath),
|
|
|
|
zap.Strings("files_to_hide", filesToHide))
|
2019-05-20 11:59:20 -05:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
indexInfo, err := os.Stat(indexPath)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-09-09 09:21:45 -05:00
|
|
|
// don't rewrite the request path to append
|
|
|
|
// the index file, because we might need to
|
|
|
|
// do a canonical-URL redirect below based
|
|
|
|
// on the URL as-is
|
2019-05-20 11:59:20 -05:00
|
|
|
|
2019-09-09 09:21:45 -05:00
|
|
|
// we've chosen to use this index file,
|
|
|
|
// so replace the last file info and path
|
|
|
|
// with that of the index file
|
2019-05-20 11:59:20 -05:00
|
|
|
info = indexInfo
|
2019-05-20 16:46:34 -05:00
|
|
|
filename = indexPath
|
2019-09-09 09:21:45 -05:00
|
|
|
implicitIndexFile = true
|
2020-11-26 11:37:42 -05:00
|
|
|
fsrv.logger.Debug("located index file", zap.String("filename", filename))
|
2019-05-20 11:59:20 -05:00
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// if still referencing a directory, delegate
|
|
|
|
// to browse or return an error
|
|
|
|
if info.IsDir() {
|
2020-11-26 11:37:42 -05:00
|
|
|
fsrv.logger.Debug("no index file in directory",
|
|
|
|
zap.String("path", filename),
|
|
|
|
zap.Strings("index_filenames", fsrv.IndexNames))
|
2019-05-20 22:21:33 -05:00
|
|
|
if fsrv.Browse != nil && !fileHidden(filename, filesToHide) {
|
2020-11-24 14:24:44 -05:00
|
|
|
return fsrv.serveBrowse(root, filename, w, r, next)
|
2019-05-20 11:59:20 -05:00
|
|
|
}
|
2019-11-15 19:32:13 -05:00
|
|
|
return fsrv.notFound(w, r, next)
|
2019-05-20 11:59:20 -05:00
|
|
|
}
|
|
|
|
|
2019-05-20 22:21:33 -05:00
|
|
|
// one last check to ensure the file isn't hidden (we might
|
|
|
|
// have changed the filename from when we last checked)
|
|
|
|
if fileHidden(filename, filesToHide) {
|
2020-11-26 11:37:42 -05:00
|
|
|
fsrv.logger.Debug("hiding file",
|
|
|
|
zap.String("filename", filename),
|
|
|
|
zap.Strings("files_to_hide", filesToHide))
|
2019-11-15 19:32:13 -05:00
|
|
|
return fsrv.notFound(w, r, next)
|
2019-05-20 22:21:33 -05:00
|
|
|
}
|
|
|
|
|
2019-09-09 09:21:45 -05:00
|
|
|
// if URL canonicalization is enabled, we need to enforce trailing
|
|
|
|
// slash convention: if a directory, trailing slash; if a file, no
|
|
|
|
// trailing slash - not enforcing this can break relative hrefs
|
|
|
|
// in HTML (see https://github.com/caddyserver/caddy/issues/2741)
|
|
|
|
if fsrv.CanonicalURIs == nil || *fsrv.CanonicalURIs {
|
|
|
|
if implicitIndexFile && !strings.HasSuffix(r.URL.Path, "/") {
|
2020-11-26 11:37:42 -05:00
|
|
|
fsrv.logger.Debug("redirecting to canonical URI (adding trailing slash for directory)", zap.String("path", r.URL.Path))
|
2019-09-09 09:21:45 -05:00
|
|
|
return redirect(w, r, r.URL.Path+"/")
|
|
|
|
} else if !implicitIndexFile && strings.HasSuffix(r.URL.Path, "/") {
|
2020-11-26 11:37:42 -05:00
|
|
|
fsrv.logger.Debug("redirecting to canonical URI (removing trailing slash for file)", zap.String("path", r.URL.Path))
|
2019-09-09 09:21:45 -05:00
|
|
|
return redirect(w, r, r.URL.Path[:len(r.URL.Path)-1])
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-29 19:47:19 -05:00
|
|
|
var file *os.File
|
2020-11-26 11:37:42 -05:00
|
|
|
|
2021-03-29 19:47:19 -05:00
|
|
|
// check for precompressed files
|
|
|
|
for _, ae := range encode.AcceptedEncodings(r, fsrv.PrecompressedOrder) {
|
|
|
|
precompress, ok := fsrv.precompressors[ae]
|
|
|
|
if !ok {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
compressedFilename := filename + precompress.Suffix()
|
|
|
|
compressedInfo, err := os.Stat(compressedFilename)
|
|
|
|
if err != nil || compressedInfo.IsDir() {
|
|
|
|
fsrv.logger.Debug("precompressed file not accessible", zap.String("filename", compressedFilename), zap.Error(err))
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
fsrv.logger.Debug("opening compressed sidecar file", zap.String("filename", compressedFilename), zap.Error(err))
|
|
|
|
file, err = fsrv.openFile(compressedFilename, w)
|
|
|
|
if err != nil {
|
|
|
|
fsrv.logger.Warn("opening precompressed file failed", zap.String("filename", compressedFilename), zap.Error(err))
|
|
|
|
if caddyErr, ok := err.(caddyhttp.HandlerError); ok && caddyErr.StatusCode == http.StatusServiceUnavailable {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
defer file.Close()
|
|
|
|
w.Header().Set("Content-Encoding", ae)
|
|
|
|
w.Header().Del("Accept-Ranges")
|
|
|
|
w.Header().Add("Vary", "Accept-Encoding")
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
// no precompressed file found, use the actual file
|
|
|
|
if file == nil {
|
|
|
|
fsrv.logger.Debug("opening file", zap.String("filename", filename))
|
|
|
|
|
|
|
|
// open the file
|
|
|
|
file, err = fsrv.openFile(filename, w)
|
|
|
|
if err != nil {
|
|
|
|
if herr, ok := err.(caddyhttp.HandlerError); ok &&
|
|
|
|
herr.StatusCode == http.StatusNotFound {
|
|
|
|
return fsrv.notFound(w, r, next)
|
|
|
|
}
|
|
|
|
return err // error is already structured
|
2019-11-15 19:32:13 -05:00
|
|
|
}
|
2021-03-29 19:47:19 -05:00
|
|
|
defer file.Close()
|
2019-05-20 11:59:20 -05:00
|
|
|
}
|
|
|
|
|
2019-06-27 14:09:10 -05:00
|
|
|
// set the ETag - note that a conditional If-None-Match request is handled
|
|
|
|
// by http.ServeContent below, which checks against this ETag value
|
|
|
|
w.Header().Set("ETag", calculateEtag(info))
|
2019-05-20 11:59:20 -05:00
|
|
|
|
2019-06-07 20:59:17 -05:00
|
|
|
if w.Header().Get("Content-Type") == "" {
|
2019-06-21 15:36:26 -05:00
|
|
|
mtyp := mime.TypeByExtension(filepath.Ext(filename))
|
|
|
|
if mtyp == "" {
|
|
|
|
// do not allow Go to sniff the content-type; see
|
|
|
|
// https://www.youtube.com/watch?v=8t8JYpt0egE
|
2019-11-16 12:44:45 -05:00
|
|
|
// TODO: If we want a Content-Type, consider writing a default of application/octet-stream - this is secure but violates spec
|
2019-06-21 15:36:26 -05:00
|
|
|
w.Header()["Content-Type"] = nil
|
|
|
|
} else {
|
|
|
|
w.Header().Set("Content-Type", mtyp)
|
|
|
|
}
|
2019-06-07 20:59:17 -05:00
|
|
|
}
|
2019-05-20 22:21:33 -05:00
|
|
|
|
2019-10-28 15:39:37 -05:00
|
|
|
// if this handler exists in an error context (i.e. is
|
|
|
|
// part of a handler chain that is supposed to handle
|
|
|
|
// a previous error), we have to serve the content
|
|
|
|
// manually in order to write the correct status code
|
|
|
|
if reqErr, ok := r.Context().Value(caddyhttp.ErrorCtxKey).(error); ok {
|
|
|
|
statusCode := http.StatusInternalServerError
|
|
|
|
if handlerErr, ok := reqErr.(caddyhttp.HandlerError); ok {
|
|
|
|
if handlerErr.StatusCode > 0 {
|
|
|
|
statusCode = handlerErr.StatusCode
|
|
|
|
}
|
|
|
|
}
|
|
|
|
w.WriteHeader(statusCode)
|
2020-11-02 16:20:12 -05:00
|
|
|
if r.Method != http.MethodHead {
|
2020-11-22 16:50:29 -05:00
|
|
|
_, _ = io.Copy(w, file)
|
2019-10-28 15:39:37 -05:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-20 11:59:20 -05:00
|
|
|
// let the standard library do what it does best; note, however,
|
|
|
|
// that errors generated by ServeContent are written immediately
|
2019-06-21 15:36:26 -05:00
|
|
|
// to the response, so we cannot handle them (but errors there
|
2019-05-20 16:46:34 -05:00
|
|
|
// are rare)
|
2019-05-20 11:59:20 -05:00
|
|
|
http.ServeContent(w, r, info.Name(), info.ModTime(), file)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-20 16:46:34 -05:00
|
|
|
// openFile opens the file at the given filename. If there was an error,
|
|
|
|
// the response is configured to inform the client how to best handle it
|
|
|
|
// and a well-described handler error is returned (do not wrap the
|
|
|
|
// returned error value).
|
2019-05-20 22:21:33 -05:00
|
|
|
func (fsrv *FileServer) openFile(filename string, w http.ResponseWriter) (*os.File, error) {
|
2019-05-20 16:46:34 -05:00
|
|
|
file, err := os.Open(filename)
|
|
|
|
if err != nil {
|
2019-05-20 18:15:38 -05:00
|
|
|
err = mapDirOpenError(err, filename)
|
2019-05-20 16:46:34 -05:00
|
|
|
if os.IsNotExist(err) {
|
2021-03-19 12:42:26 -05:00
|
|
|
fsrv.logger.Debug("file not found", zap.String("filename", filename), zap.Error(err))
|
2019-05-20 16:46:34 -05:00
|
|
|
return nil, caddyhttp.Error(http.StatusNotFound, err)
|
|
|
|
} else if os.IsPermission(err) {
|
2021-03-19 12:42:26 -05:00
|
|
|
fsrv.logger.Debug("permission denied", zap.String("filename", filename), zap.Error(err))
|
2019-05-20 16:46:34 -05:00
|
|
|
return nil, caddyhttp.Error(http.StatusForbidden, err)
|
|
|
|
}
|
|
|
|
// maybe the server is under load and ran out of file descriptors?
|
|
|
|
// have client wait arbitrary seconds to help prevent a stampede
|
2020-11-22 16:50:29 -05:00
|
|
|
//nolint:gosec
|
2019-05-20 16:46:34 -05:00
|
|
|
backoff := weakrand.Intn(maxBackoff-minBackoff) + minBackoff
|
|
|
|
w.Header().Set("Retry-After", strconv.Itoa(backoff))
|
2021-03-19 12:42:26 -05:00
|
|
|
fsrv.logger.Debug("retry after backoff", zap.String("filename", filename), zap.Int("backoff", backoff), zap.Error(err))
|
2019-05-20 16:46:34 -05:00
|
|
|
return nil, caddyhttp.Error(http.StatusServiceUnavailable, err)
|
|
|
|
}
|
|
|
|
return file, nil
|
|
|
|
}
|
|
|
|
|
2019-05-20 18:15:38 -05:00
|
|
|
// mapDirOpenError maps the provided non-nil error from opening name
|
|
|
|
// to a possibly better non-nil error. In particular, it turns OS-specific errors
|
|
|
|
// about opening files in non-directories into os.ErrNotExist. See golang/go#18984.
|
|
|
|
// Adapted from the Go standard library; originally written by Nathaniel Caza.
|
|
|
|
// https://go-review.googlesource.com/c/go/+/36635/
|
|
|
|
// https://go-review.googlesource.com/c/go/+/36804/
|
|
|
|
func mapDirOpenError(originalErr error, name string) error {
|
|
|
|
if os.IsNotExist(originalErr) || os.IsPermission(originalErr) {
|
|
|
|
return originalErr
|
|
|
|
}
|
|
|
|
|
2020-11-02 16:20:12 -05:00
|
|
|
parts := strings.Split(name, separator)
|
2019-05-20 18:15:38 -05:00
|
|
|
for i := range parts {
|
|
|
|
if parts[i] == "" {
|
|
|
|
continue
|
|
|
|
}
|
2020-11-02 16:20:12 -05:00
|
|
|
fi, err := os.Stat(strings.Join(parts[:i+1], separator))
|
2019-05-20 18:15:38 -05:00
|
|
|
if err != nil {
|
|
|
|
return originalErr
|
|
|
|
}
|
|
|
|
if !fi.IsDir() {
|
|
|
|
return os.ErrNotExist
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return originalErr
|
|
|
|
}
|
|
|
|
|
2020-11-02 16:20:12 -05:00
|
|
|
// transformHidePaths performs replacements for all the elements of fsrv.Hide and
|
|
|
|
// makes them absolute paths (if they contain a path separator), then returns a
|
|
|
|
// new list of the transformed values.
|
2019-12-29 15:12:52 -05:00
|
|
|
func (fsrv *FileServer) transformHidePaths(repl *caddy.Replacer) []string {
|
2019-05-20 22:21:33 -05:00
|
|
|
hide := make([]string, len(fsrv.Hide))
|
|
|
|
for i := range fsrv.Hide {
|
|
|
|
hide[i] = repl.ReplaceAll(fsrv.Hide[i], "")
|
2020-11-02 16:20:12 -05:00
|
|
|
if strings.Contains(hide[i], separator) {
|
|
|
|
abs, err := filepath.Abs(hide[i])
|
|
|
|
if err == nil {
|
|
|
|
hide[i] = abs
|
|
|
|
}
|
|
|
|
}
|
2019-05-20 11:59:20 -05:00
|
|
|
}
|
|
|
|
return hide
|
|
|
|
}
|
|
|
|
|
2019-05-20 18:15:38 -05:00
|
|
|
// sanitizedPathJoin performs filepath.Join(root, reqPath) that
|
|
|
|
// is safe against directory traversal attacks. It uses logic
|
|
|
|
// similar to that in the Go standard library, specifically
|
2019-05-20 22:21:33 -05:00
|
|
|
// in the implementation of http.Dir. The root is assumed to
|
|
|
|
// be a trusted path, but reqPath is not.
|
2019-05-20 18:15:38 -05:00
|
|
|
func sanitizedPathJoin(root, reqPath string) string {
|
|
|
|
// TODO: Caddy 1 uses this:
|
|
|
|
// prevent absolute path access on Windows, e.g. http://localhost:5000/C:\Windows\notepad.exe
|
|
|
|
// if runtime.GOOS == "windows" && len(reqPath) > 0 && filepath.IsAbs(reqPath[1:]) {
|
|
|
|
// TODO.
|
|
|
|
// }
|
|
|
|
|
|
|
|
// TODO: whereas std lib's http.Dir.Open() uses this:
|
|
|
|
// if filepath.Separator != '/' && strings.ContainsRune(name, filepath.Separator) {
|
|
|
|
// return nil, errors.New("http: invalid character in file path")
|
|
|
|
// }
|
|
|
|
|
|
|
|
// TODO: see https://play.golang.org/p/oh77BiVQFti for another thing to consider
|
|
|
|
|
|
|
|
if root == "" {
|
|
|
|
root = "."
|
|
|
|
}
|
2020-09-16 19:09:28 -05:00
|
|
|
|
|
|
|
path := filepath.Join(root, filepath.Clean("/"+reqPath))
|
|
|
|
|
|
|
|
// filepath.Join also cleans the path, and cleaning strips
|
|
|
|
// the trailing slash, so we need to re-add it afterwards.
|
|
|
|
// if the length is 1, then it's a path to the root,
|
|
|
|
// and that should return ".", so we don't append the separator.
|
|
|
|
if strings.HasSuffix(reqPath, "/") && len(reqPath) > 1 {
|
2020-11-02 16:20:12 -05:00
|
|
|
path += separator
|
2020-09-16 19:09:28 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
return path
|
2019-05-20 18:15:38 -05:00
|
|
|
}
|
|
|
|
|
2020-11-02 16:20:12 -05:00
|
|
|
// fileHidden returns true if filename is hidden according to the hide list.
|
|
|
|
// filename must be a relative or absolute file system path, not a request
|
|
|
|
// URI path. It is expected that all the paths in the hide list are absolute
|
|
|
|
// paths or are singular filenames (without a path separator).
|
2019-05-20 16:46:34 -05:00
|
|
|
func fileHidden(filename string, hide []string) bool {
|
2020-11-02 16:20:12 -05:00
|
|
|
if len(hide) == 0 {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// all path comparisons use the complete absolute path if possible
|
|
|
|
filenameAbs, err := filepath.Abs(filename)
|
|
|
|
if err == nil {
|
|
|
|
filename = filenameAbs
|
|
|
|
}
|
|
|
|
|
2020-09-11 13:20:39 -05:00
|
|
|
var components []string
|
2019-05-20 11:59:20 -05:00
|
|
|
|
|
|
|
for _, h := range hide {
|
2020-11-02 16:20:12 -05:00
|
|
|
if !strings.Contains(h, separator) {
|
2020-09-11 13:20:39 -05:00
|
|
|
// if there is no separator in h, then we assume the user
|
|
|
|
// wants to hide any files or folders that match that
|
|
|
|
// name; thus we have to compare against each component
|
|
|
|
// of the filename, e.g. hiding "bar" would hide "/bar"
|
|
|
|
// as well as "/foo/bar/baz" but not "/barstool".
|
|
|
|
if len(components) == 0 {
|
2020-11-02 16:20:12 -05:00
|
|
|
components = strings.Split(filename, separator)
|
2020-09-11 13:20:39 -05:00
|
|
|
}
|
|
|
|
for _, c := range components {
|
2020-11-02 16:20:12 -05:00
|
|
|
if hidden, _ := filepath.Match(h, c); hidden {
|
2020-09-11 13:20:39 -05:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else if strings.HasPrefix(filename, h) {
|
2020-11-02 16:20:12 -05:00
|
|
|
// if there is a separator in h, and filename is exactly
|
|
|
|
// prefixed with h, then we can do a prefix match so that
|
|
|
|
// "/foo" matches "/foo/bar" but not "/foobar".
|
2020-09-11 13:20:39 -05:00
|
|
|
withoutPrefix := strings.TrimPrefix(filename, h)
|
2020-11-02 16:20:12 -05:00
|
|
|
if strings.HasPrefix(withoutPrefix, separator) {
|
2019-05-20 11:59:20 -05:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
2020-09-11 13:20:39 -05:00
|
|
|
|
|
|
|
// in the general case, a glob match will suffice
|
|
|
|
if hidden, _ := filepath.Match(h, filename); hidden {
|
2019-05-20 11:59:20 -05:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-11-15 19:32:13 -05:00
|
|
|
// notFound returns a 404 error or, if pass-thru is enabled,
|
|
|
|
// it calls the next handler in the chain.
|
|
|
|
func (fsrv *FileServer) notFound(w http.ResponseWriter, r *http.Request, next caddyhttp.Handler) error {
|
|
|
|
if fsrv.PassThru {
|
|
|
|
return next.ServeHTTP(w, r)
|
|
|
|
}
|
|
|
|
return caddyhttp.Error(http.StatusNotFound, nil)
|
|
|
|
}
|
|
|
|
|
2019-06-27 14:09:10 -05:00
|
|
|
// calculateEtag produces a strong etag by default, although, for
|
|
|
|
// efficiency reasons, it does not actually consume the contents
|
|
|
|
// of the file to make a hash of all the bytes. ¯\_(ツ)_/¯
|
|
|
|
// Prefix the etag with "W/" to convert it into a weak etag.
|
|
|
|
// See: https://tools.ietf.org/html/rfc7232#section-2.3
|
|
|
|
func calculateEtag(d os.FileInfo) string {
|
|
|
|
t := strconv.FormatInt(d.ModTime().Unix(), 36)
|
|
|
|
s := strconv.FormatInt(d.Size(), 36)
|
|
|
|
return `"` + t + s + `"`
|
|
|
|
}
|
|
|
|
|
2019-09-09 09:21:45 -05:00
|
|
|
func redirect(w http.ResponseWriter, r *http.Request, to string) error {
|
|
|
|
for strings.HasPrefix(to, "//") {
|
|
|
|
// prevent path-based open redirects
|
|
|
|
to = strings.TrimPrefix(to, "/")
|
|
|
|
}
|
|
|
|
http.Redirect(w, r, to, http.StatusPermanentRedirect)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-08-09 13:05:47 -05:00
|
|
|
var defaultIndexNames = []string{"index.html", "index.txt"}
|
2019-05-20 11:59:20 -05:00
|
|
|
|
2019-08-08 00:59:02 -05:00
|
|
|
var bufPool = sync.Pool{
|
|
|
|
New: func() interface{} {
|
|
|
|
return new(bytes.Buffer)
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2020-11-02 16:20:12 -05:00
|
|
|
const (
|
|
|
|
minBackoff, maxBackoff = 2, 5
|
|
|
|
separator = string(filepath.Separator)
|
|
|
|
)
|
2019-05-20 11:59:20 -05:00
|
|
|
|
2019-07-07 15:12:22 -05:00
|
|
|
// Interface guards
|
|
|
|
var (
|
2019-07-09 13:58:39 -05:00
|
|
|
_ caddy.Provisioner = (*FileServer)(nil)
|
|
|
|
_ caddyhttp.MiddlewareHandler = (*FileServer)(nil)
|
2019-07-07 15:12:22 -05:00
|
|
|
)
|