2016-08-29 22:18:00 +03:00
|
|
|
// Copyright 2016 The go-ethereum Authors
|
|
|
|
// This file is part of the go-ethereum library.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
/*
|
|
|
|
A simple http server interface to Swarm
|
|
|
|
*/
|
|
|
|
package http
|
|
|
|
|
|
|
|
import (
|
2017-04-07 01:22:22 +03:00
|
|
|
"archive/tar"
|
|
|
|
"encoding/json"
|
|
|
|
"errors"
|
2017-02-22 15:10:07 +03:00
|
|
|
"fmt"
|
2016-08-29 22:18:00 +03:00
|
|
|
"io"
|
2017-04-07 01:22:22 +03:00
|
|
|
"io/ioutil"
|
|
|
|
"mime"
|
|
|
|
"mime/multipart"
|
2016-08-29 22:18:00 +03:00
|
|
|
"net/http"
|
2017-04-07 01:22:22 +03:00
|
|
|
"os"
|
|
|
|
"path"
|
|
|
|
"strconv"
|
2017-01-05 13:57:41 +03:00
|
|
|
"strings"
|
2016-08-29 22:18:00 +03:00
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/ethereum/go-ethereum/common"
|
2017-02-22 15:10:07 +03:00
|
|
|
"github.com/ethereum/go-ethereum/log"
|
2016-08-29 22:18:00 +03:00
|
|
|
"github.com/ethereum/go-ethereum/swarm/api"
|
2017-01-26 22:33:39 +03:00
|
|
|
"github.com/ethereum/go-ethereum/swarm/storage"
|
2017-01-05 13:57:41 +03:00
|
|
|
"github.com/rs/cors"
|
2016-08-29 22:18:00 +03:00
|
|
|
)
|
|
|
|
|
2017-04-05 01:20:07 +03:00
|
|
|
// ServerConfig is the basic configuration needed for the HTTP server and also
|
2017-01-05 13:57:41 +03:00
|
|
|
// includes CORS settings.
|
2017-04-05 01:20:07 +03:00
|
|
|
type ServerConfig struct {
|
2017-01-05 13:57:41 +03:00
|
|
|
Addr string
|
|
|
|
CorsString string
|
|
|
|
}
|
|
|
|
|
2016-08-29 22:18:00 +03:00
|
|
|
// browser API for registering bzz url scheme handlers:
|
|
|
|
// https://developer.mozilla.org/en/docs/Web-based_protocol_handlers
|
|
|
|
// electron (chromium) api for registering bzz url scheme handlers:
|
|
|
|
// https://github.com/atom/electron/blob/master/docs/api/protocol.md
|
|
|
|
|
|
|
|
// starts up http server
|
2017-04-05 01:20:07 +03:00
|
|
|
func StartHttpServer(api *api.Api, config *ServerConfig) {
|
2017-01-05 13:57:41 +03:00
|
|
|
var allowedOrigins []string
|
2017-04-05 01:20:07 +03:00
|
|
|
for _, domain := range strings.Split(config.CorsString, ",") {
|
2017-01-05 13:57:41 +03:00
|
|
|
allowedOrigins = append(allowedOrigins, strings.TrimSpace(domain))
|
|
|
|
}
|
|
|
|
c := cors.New(cors.Options{
|
|
|
|
AllowedOrigins: allowedOrigins,
|
|
|
|
AllowedMethods: []string{"POST", "GET", "DELETE", "PATCH", "PUT"},
|
|
|
|
MaxAge: 600,
|
2017-03-16 06:34:08 +03:00
|
|
|
AllowedHeaders: []string{"*"},
|
2017-01-05 13:57:41 +03:00
|
|
|
})
|
2017-04-05 01:20:07 +03:00
|
|
|
hdlr := c.Handler(NewServer(api))
|
|
|
|
|
|
|
|
go http.ListenAndServe(config.Addr, hdlr)
|
|
|
|
}
|
2017-01-05 13:57:41 +03:00
|
|
|
|
2017-04-05 01:20:07 +03:00
|
|
|
func NewServer(api *api.Api) *Server {
|
|
|
|
return &Server{api}
|
|
|
|
}
|
|
|
|
|
|
|
|
type Server struct {
|
|
|
|
api *api.Api
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
|
|
|
|
2017-04-07 01:22:22 +03:00
|
|
|
// Request wraps http.Request and also includes the parsed bzz URI
|
|
|
|
type Request struct {
|
|
|
|
http.Request
|
|
|
|
|
|
|
|
uri *api.URI
|
|
|
|
}
|
2016-08-29 22:18:00 +03:00
|
|
|
|
2017-04-07 01:22:22 +03:00
|
|
|
// HandlePostRaw handles a POST request to a raw bzzr:/ URI, stores the request
|
|
|
|
// body in swarm and returns the resulting storage key as a text/plain response
|
|
|
|
func (s *Server) HandlePostRaw(w http.ResponseWriter, r *Request) {
|
|
|
|
if r.uri.Path != "" {
|
|
|
|
s.BadRequest(w, r, "raw POST request cannot contain a path")
|
2017-02-22 15:10:07 +03:00
|
|
|
return
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
2017-04-07 01:22:22 +03:00
|
|
|
|
|
|
|
if r.Header.Get("Content-Length") == "" {
|
|
|
|
s.BadRequest(w, r, "missing Content-Length header in request")
|
|
|
|
return
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
|
|
|
|
2017-04-07 01:22:22 +03:00
|
|
|
key, err := s.api.Store(r.Body, r.ContentLength, nil)
|
|
|
|
if err != nil {
|
|
|
|
s.Error(w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
s.logDebug("content for %s stored", key.Log())
|
|
|
|
|
|
|
|
w.Header().Set("Content-Type", "text/plain")
|
|
|
|
w.WriteHeader(http.StatusOK)
|
|
|
|
fmt.Fprint(w, key)
|
|
|
|
}
|
|
|
|
|
|
|
|
// HandlePostFiles handles a POST request (or deprecated PUT request) to
|
|
|
|
// bzz:/<hash>/<path> which contains either a single file or multiple files
|
|
|
|
// (either a tar archive or multipart form), adds those files either to an
|
|
|
|
// existing manifest or to a new manifest under <path> and returns the
|
|
|
|
// resulting manifest hash as a text/plain response
|
|
|
|
func (s *Server) HandlePostFiles(w http.ResponseWriter, r *Request) {
|
|
|
|
contentType, params, err := mime.ParseMediaType(r.Header.Get("Content-Type"))
|
|
|
|
if err != nil {
|
|
|
|
s.BadRequest(w, r, err.Error())
|
|
|
|
return
|
|
|
|
}
|
2016-08-29 22:18:00 +03:00
|
|
|
|
2017-04-07 01:22:22 +03:00
|
|
|
var key storage.Key
|
|
|
|
if r.uri.Addr != "" {
|
|
|
|
key, err = s.api.Resolve(r.uri)
|
|
|
|
if err != nil {
|
|
|
|
s.Error(w, r, fmt.Errorf("error resolving %s: %s", r.uri.Addr, err))
|
2016-11-10 23:14:17 +03:00
|
|
|
return
|
|
|
|
}
|
2017-04-07 01:22:22 +03:00
|
|
|
} else {
|
|
|
|
key, err = s.api.NewManifest()
|
|
|
|
if err != nil {
|
|
|
|
s.Error(w, r, err)
|
2016-08-29 22:18:00 +03:00
|
|
|
return
|
|
|
|
}
|
2017-04-07 01:22:22 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
newKey, err := s.updateManifest(key, func(mw *api.ManifestWriter) error {
|
|
|
|
switch contentType {
|
|
|
|
|
|
|
|
case "application/x-tar":
|
|
|
|
return s.handleTarUpload(r, mw)
|
|
|
|
|
|
|
|
case "multipart/form-data":
|
|
|
|
return s.handleMultipartUpload(r, params["boundary"], mw)
|
|
|
|
|
|
|
|
default:
|
|
|
|
return s.handleDirectUpload(r, mw)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
s.Error(w, r, fmt.Errorf("error creating manifest: %s", err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set("Content-Type", "text/plain")
|
|
|
|
w.WriteHeader(http.StatusOK)
|
|
|
|
fmt.Fprint(w, newKey)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) handleTarUpload(req *Request, mw *api.ManifestWriter) error {
|
|
|
|
tr := tar.NewReader(req.Body)
|
|
|
|
for {
|
|
|
|
hdr, err := tr.Next()
|
|
|
|
if err == io.EOF {
|
|
|
|
return nil
|
|
|
|
} else if err != nil {
|
|
|
|
return fmt.Errorf("error reading tar stream: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// only store regular files
|
|
|
|
if !hdr.FileInfo().Mode().IsRegular() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// add the entry under the path from the request
|
|
|
|
path := path.Join(req.uri.Path, hdr.Name)
|
|
|
|
entry := &api.ManifestEntry{
|
|
|
|
Path: path,
|
|
|
|
ContentType: hdr.Xattrs["user.swarm.content-type"],
|
|
|
|
Mode: hdr.Mode,
|
|
|
|
Size: hdr.Size,
|
|
|
|
ModTime: hdr.ModTime,
|
|
|
|
}
|
|
|
|
s.logDebug("adding %s (%d bytes) to new manifest", entry.Path, entry.Size)
|
|
|
|
contentKey, err := mw.AddEntry(tr, entry)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error adding manifest entry from tar stream: %s", err)
|
|
|
|
}
|
|
|
|
s.logDebug("content for %s stored", contentKey.Log())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) handleMultipartUpload(req *Request, boundary string, mw *api.ManifestWriter) error {
|
|
|
|
mr := multipart.NewReader(req.Body, boundary)
|
|
|
|
for {
|
|
|
|
part, err := mr.NextPart()
|
|
|
|
if err == io.EOF {
|
|
|
|
return nil
|
|
|
|
} else if err != nil {
|
|
|
|
return fmt.Errorf("error reading multipart form: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var size int64
|
|
|
|
var reader io.Reader = part
|
|
|
|
if contentLength := part.Header.Get("Content-Length"); contentLength != "" {
|
|
|
|
size, err = strconv.ParseInt(contentLength, 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error parsing multipart content length: %s", err)
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
2017-04-07 01:22:22 +03:00
|
|
|
reader = part
|
2016-08-29 22:18:00 +03:00
|
|
|
} else {
|
2017-04-07 01:22:22 +03:00
|
|
|
// copy the part to a tmp file to get its size
|
|
|
|
tmp, err := ioutil.TempFile("", "swarm-multipart")
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
2017-04-07 01:22:22 +03:00
|
|
|
defer os.Remove(tmp.Name())
|
|
|
|
defer tmp.Close()
|
|
|
|
size, err = io.Copy(tmp, part)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error copying multipart content: %s", err)
|
|
|
|
}
|
|
|
|
if _, err := tmp.Seek(0, os.SEEK_SET); err != nil {
|
|
|
|
return fmt.Errorf("error copying multipart content: %s", err)
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
2017-04-07 01:22:22 +03:00
|
|
|
reader = tmp
|
|
|
|
}
|
|
|
|
|
|
|
|
// add the entry under the path from the request
|
|
|
|
name := part.FileName()
|
|
|
|
if name == "" {
|
|
|
|
name = part.FormName()
|
|
|
|
}
|
|
|
|
path := path.Join(req.uri.Path, name)
|
|
|
|
entry := &api.ManifestEntry{
|
|
|
|
Path: path,
|
|
|
|
ContentType: part.Header.Get("Content-Type"),
|
|
|
|
Size: size,
|
|
|
|
ModTime: time.Now(),
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
2017-04-07 01:22:22 +03:00
|
|
|
s.logDebug("adding %s (%d bytes) to new manifest", entry.Path, entry.Size)
|
|
|
|
contentKey, err := mw.AddEntry(reader, entry)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error adding manifest entry from multipart form: %s", err)
|
|
|
|
}
|
|
|
|
s.logDebug("content for %s stored", contentKey.Log())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) handleDirectUpload(req *Request, mw *api.ManifestWriter) error {
|
|
|
|
key, err := mw.AddEntry(req.Body, &api.ManifestEntry{
|
|
|
|
Path: req.uri.Path,
|
|
|
|
ContentType: req.Header.Get("Content-Type"),
|
|
|
|
Mode: 0644,
|
|
|
|
Size: req.ContentLength,
|
|
|
|
ModTime: time.Now(),
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
s.logDebug("content for %s stored", key.Log())
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// HandleDelete handles a DELETE request to bzz:/<manifest>/<path>, removes
|
|
|
|
// <path> from <manifest> and returns the resulting manifest hash as a
|
|
|
|
// text/plain response
|
|
|
|
func (s *Server) HandleDelete(w http.ResponseWriter, r *Request) {
|
|
|
|
key, err := s.api.Resolve(r.uri)
|
|
|
|
if err != nil {
|
|
|
|
s.Error(w, r, fmt.Errorf("error resolving %s: %s", r.uri.Addr, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
newKey, err := s.updateManifest(key, func(mw *api.ManifestWriter) error {
|
|
|
|
s.logDebug("removing %s from manifest %s", r.uri.Path, key.Log())
|
|
|
|
return mw.RemoveEntry(r.uri.Path)
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
s.Error(w, r, fmt.Errorf("error updating manifest: %s", err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set("Content-Type", "text/plain")
|
|
|
|
w.WriteHeader(http.StatusOK)
|
|
|
|
fmt.Fprint(w, newKey)
|
|
|
|
}
|
|
|
|
|
|
|
|
// HandleGetRaw handles a GET request to bzzr://<key> and responds with
|
|
|
|
// the raw content stored at the given storage key
|
|
|
|
func (s *Server) HandleGetRaw(w http.ResponseWriter, r *Request) {
|
|
|
|
key, err := s.api.Resolve(r.uri)
|
|
|
|
if err != nil {
|
|
|
|
s.Error(w, r, fmt.Errorf("error resolving %s: %s", r.uri.Addr, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// if path is set, interpret <key> as a manifest and return the
|
|
|
|
// raw entry at the given path
|
|
|
|
if r.uri.Path != "" {
|
|
|
|
walker, err := s.api.NewManifestWalker(key, nil)
|
|
|
|
if err != nil {
|
|
|
|
s.BadRequest(w, r, fmt.Sprintf("%s is not a manifest", key))
|
2017-01-26 22:33:39 +03:00
|
|
|
return
|
|
|
|
}
|
2017-04-07 01:22:22 +03:00
|
|
|
var entry *api.ManifestEntry
|
|
|
|
walker.Walk(func(e *api.ManifestEntry) error {
|
|
|
|
// if the entry matches the path, set entry and stop
|
|
|
|
// the walk
|
|
|
|
if e.Path == r.uri.Path {
|
|
|
|
entry = e
|
|
|
|
// return an error to cancel the walk
|
|
|
|
return errors.New("found")
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
|
|
|
|
2017-04-07 01:22:22 +03:00
|
|
|
// ignore non-manifest files
|
|
|
|
if e.ContentType != api.ManifestType {
|
|
|
|
return nil
|
2016-12-22 02:35:05 +03:00
|
|
|
}
|
2016-08-29 22:18:00 +03:00
|
|
|
|
2017-04-07 01:22:22 +03:00
|
|
|
// if the manifest's path is a prefix of the
|
|
|
|
// requested path, recurse into it by returning
|
|
|
|
// nil and continuing the walk
|
|
|
|
if strings.HasPrefix(r.uri.Path, e.Path) {
|
|
|
|
return nil
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
|
|
|
|
2017-04-07 01:22:22 +03:00
|
|
|
return api.SkipManifest
|
|
|
|
})
|
|
|
|
if entry == nil {
|
|
|
|
http.NotFound(w, &r.Request)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
key = storage.Key(common.Hex2Bytes(entry.Hash))
|
|
|
|
}
|
2016-08-29 22:18:00 +03:00
|
|
|
|
2017-04-07 01:22:22 +03:00
|
|
|
// check the root chunk exists by retrieving the file's size
|
|
|
|
reader := s.api.Retrieve(key)
|
|
|
|
if _, err := reader.Size(nil); err != nil {
|
|
|
|
s.logDebug("key not found %s: %s", key, err)
|
|
|
|
http.NotFound(w, &r.Request)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// allow the request to overwrite the content type using a query
|
|
|
|
// parameter
|
|
|
|
contentType := "application/octet-stream"
|
|
|
|
if typ := r.URL.Query().Get("content_type"); typ != "" {
|
|
|
|
contentType = typ
|
|
|
|
}
|
|
|
|
w.Header().Set("Content-Type", contentType)
|
|
|
|
|
|
|
|
http.ServeContent(w, &r.Request, "", time.Now(), reader)
|
|
|
|
}
|
|
|
|
|
|
|
|
// HandleGetFiles handles a GET request to bzz:/<manifest> with an Accept
|
|
|
|
// header of "application/x-tar" and returns a tar stream of all files
|
|
|
|
// contained in the manifest
|
|
|
|
func (s *Server) HandleGetFiles(w http.ResponseWriter, r *Request) {
|
|
|
|
if r.uri.Path != "" {
|
|
|
|
s.BadRequest(w, r, "files request cannot contain a path")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
key, err := s.api.Resolve(r.uri)
|
|
|
|
if err != nil {
|
|
|
|
s.Error(w, r, fmt.Errorf("error resolving %s: %s", r.uri.Addr, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
walker, err := s.api.NewManifestWalker(key, nil)
|
|
|
|
if err != nil {
|
|
|
|
s.Error(w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
tw := tar.NewWriter(w)
|
|
|
|
defer tw.Close()
|
|
|
|
w.Header().Set("Content-Type", "application/x-tar")
|
|
|
|
w.WriteHeader(http.StatusOK)
|
|
|
|
|
|
|
|
err = walker.Walk(func(entry *api.ManifestEntry) error {
|
|
|
|
// ignore manifests (walk will recurse into them)
|
|
|
|
if entry.ContentType == api.ManifestType {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// retrieve the entry's key and size
|
|
|
|
reader := s.api.Retrieve(storage.Key(common.Hex2Bytes(entry.Hash)))
|
|
|
|
size, err := reader.Size(nil)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// write a tar header for the entry
|
|
|
|
hdr := &tar.Header{
|
|
|
|
Name: entry.Path,
|
|
|
|
Mode: entry.Mode,
|
|
|
|
Size: size,
|
|
|
|
ModTime: entry.ModTime,
|
|
|
|
Xattrs: map[string]string{
|
|
|
|
"user.swarm.content-type": entry.ContentType,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if err := tw.WriteHeader(hdr); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// copy the file into the tar stream
|
|
|
|
n, err := io.Copy(tw, io.LimitReader(reader, hdr.Size))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if n != size {
|
|
|
|
return fmt.Errorf("error writing %s: expected %d bytes but sent %d", entry.Path, size, n)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
s.logError("error generating tar stream: %s", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// HandleGetList handles a GET request to bzz:/<manifest>/<path> which has
|
|
|
|
// the "list" query parameter set to "true" and returns a list of all files
|
|
|
|
// contained in <manifest> under <path> grouped into common prefixes using
|
|
|
|
// "/" as a delimiter
|
|
|
|
func (s *Server) HandleGetList(w http.ResponseWriter, r *Request) {
|
|
|
|
// ensure the root path has a trailing slash so that relative URLs work
|
|
|
|
if r.uri.Path == "" && !strings.HasSuffix(r.URL.Path, "/") {
|
|
|
|
http.Redirect(w, &r.Request, r.URL.Path+"/?list=true", http.StatusMovedPermanently)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
key, err := s.api.Resolve(r.uri)
|
|
|
|
if err != nil {
|
|
|
|
s.Error(w, r, fmt.Errorf("error resolving %s: %s", r.uri.Addr, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
walker, err := s.api.NewManifestWalker(key, nil)
|
|
|
|
if err != nil {
|
|
|
|
s.Error(w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var list api.ManifestList
|
|
|
|
prefix := r.uri.Path
|
|
|
|
err = walker.Walk(func(entry *api.ManifestEntry) error {
|
|
|
|
// handle non-manifest files
|
|
|
|
if entry.ContentType != api.ManifestType {
|
|
|
|
// ignore the file if it doesn't have the specified prefix
|
|
|
|
if !strings.HasPrefix(entry.Path, prefix) {
|
|
|
|
return nil
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
2017-04-07 01:22:22 +03:00
|
|
|
|
|
|
|
// if the path after the prefix contains a slash, add a
|
|
|
|
// common prefix to the list, otherwise add the entry
|
|
|
|
suffix := strings.TrimPrefix(entry.Path, prefix)
|
|
|
|
if index := strings.Index(suffix, "/"); index > -1 {
|
|
|
|
list.CommonPrefixes = append(list.CommonPrefixes, prefix+suffix[:index+1])
|
|
|
|
return nil
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
2017-04-07 01:22:22 +03:00
|
|
|
if entry.Path == "" {
|
|
|
|
entry.Path = "/"
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
2017-04-07 01:22:22 +03:00
|
|
|
list.Entries = append(list.Entries, entry)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// if the manifest's path is a prefix of the specified prefix
|
|
|
|
// then just recurse into the manifest by returning nil and
|
|
|
|
// continuing the walk
|
|
|
|
if strings.HasPrefix(prefix, entry.Path) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// if the manifest's path has the specified prefix, then if the
|
|
|
|
// path after the prefix contains a slash, add a common prefix
|
|
|
|
// to the list and skip the manifest, otherwise recurse into
|
|
|
|
// the manifest by returning nil and continuing the walk
|
|
|
|
if strings.HasPrefix(entry.Path, prefix) {
|
|
|
|
suffix := strings.TrimPrefix(entry.Path, prefix)
|
|
|
|
if index := strings.Index(suffix, "/"); index > -1 {
|
|
|
|
list.CommonPrefixes = append(list.CommonPrefixes, prefix+suffix[:index+1])
|
|
|
|
return api.SkipManifest
|
2016-12-22 02:35:05 +03:00
|
|
|
}
|
2017-04-07 01:22:22 +03:00
|
|
|
return nil
|
|
|
|
}
|
2016-08-29 22:18:00 +03:00
|
|
|
|
2017-04-07 01:22:22 +03:00
|
|
|
// the manifest neither has the prefix or needs recursing in to
|
|
|
|
// so just skip it
|
|
|
|
return api.SkipManifest
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
s.Error(w, r, err)
|
|
|
|
return
|
|
|
|
}
|
2016-08-29 22:18:00 +03:00
|
|
|
|
2017-04-07 01:22:22 +03:00
|
|
|
// if the client wants HTML (e.g. a browser) then render the list as a
|
|
|
|
// HTML index with relative URLs
|
|
|
|
if strings.Contains(r.Header.Get("Accept"), "text/html") {
|
|
|
|
w.Header().Set("Content-Type", "text/html")
|
|
|
|
err := htmlListTemplate.Execute(w, &htmlListData{
|
|
|
|
URI: r.uri,
|
|
|
|
List: &list,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
s.logError("error rendering list HTML: %s", err)
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
2017-04-07 01:22:22 +03:00
|
|
|
return
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
2017-04-07 01:22:22 +03:00
|
|
|
|
|
|
|
w.Header().Set("Content-Type", "application/json")
|
|
|
|
json.NewEncoder(w).Encode(&list)
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
|
|
|
|
2017-04-07 01:22:22 +03:00
|
|
|
// HandleGetFile handles a GET request to bzz://<manifest>/<path> and responds
|
|
|
|
// with the content of the file at <path> from the given <manifest>
|
|
|
|
func (s *Server) HandleGetFile(w http.ResponseWriter, r *Request) {
|
2017-07-25 12:51:26 +03:00
|
|
|
// ensure the root path has a trailing slash so that relative URLs work
|
|
|
|
if r.uri.Path == "" && !strings.HasSuffix(r.URL.Path, "/") {
|
|
|
|
http.Redirect(w, &r.Request, r.URL.Path+"/", http.StatusMovedPermanently)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-04-07 01:22:22 +03:00
|
|
|
key, err := s.api.Resolve(r.uri)
|
|
|
|
if err != nil {
|
|
|
|
s.Error(w, r, fmt.Errorf("error resolving %s: %s", r.uri.Addr, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
reader, contentType, _, err := s.api.Get(key, r.uri.Path)
|
|
|
|
if err != nil {
|
|
|
|
s.Error(w, r, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// check the root chunk exists by retrieving the file's size
|
|
|
|
if _, err := reader.Size(nil); err != nil {
|
|
|
|
s.logDebug("file not found %s: %s", r.uri, err)
|
|
|
|
http.NotFound(w, &r.Request)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set("Content-Type", contentType)
|
|
|
|
|
|
|
|
http.ServeContent(w, &r.Request, "", time.Now(), reader)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
|
|
s.logDebug("HTTP %s request URL: '%s', Host: '%s', Path: '%s', Referer: '%s', Accept: '%s'", r.Method, r.RequestURI, r.URL.Host, r.URL.Path, r.Referer(), r.Header.Get("Accept"))
|
|
|
|
|
|
|
|
uri, err := api.Parse(strings.TrimLeft(r.URL.Path, "/"))
|
|
|
|
if err != nil {
|
|
|
|
s.logError("Invalid URI %q: %s", r.URL.Path, err)
|
|
|
|
http.Error(w, fmt.Sprintf("Invalid bzz URI: %s", err), http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
s.logDebug("%s request received for %s", r.Method, uri)
|
|
|
|
|
|
|
|
req := &Request{Request: *r, uri: uri}
|
|
|
|
switch r.Method {
|
|
|
|
case "POST":
|
|
|
|
if uri.Raw() {
|
|
|
|
s.HandlePostRaw(w, req)
|
|
|
|
} else {
|
|
|
|
s.HandlePostFiles(w, req)
|
|
|
|
}
|
|
|
|
|
|
|
|
case "PUT":
|
|
|
|
// DEPRECATED:
|
|
|
|
// clients should send a POST request (the request creates a
|
|
|
|
// new manifest leaving the existing one intact, so it isn't
|
|
|
|
// strictly a traditional PUT request which replaces content
|
|
|
|
// at a URI, and POST is more ubiquitous)
|
|
|
|
if uri.Raw() {
|
|
|
|
http.Error(w, fmt.Sprintf("No PUT to %s allowed.", uri), http.StatusBadRequest)
|
2016-08-29 22:18:00 +03:00
|
|
|
return
|
2017-04-07 01:22:22 +03:00
|
|
|
} else {
|
|
|
|
s.HandlePostFiles(w, req)
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
2017-04-07 01:22:22 +03:00
|
|
|
|
|
|
|
case "DELETE":
|
|
|
|
if uri.Raw() {
|
|
|
|
http.Error(w, fmt.Sprintf("No DELETE to %s allowed.", uri), http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
s.HandleDelete(w, req)
|
|
|
|
|
|
|
|
case "GET":
|
|
|
|
if uri.Raw() {
|
|
|
|
s.HandleGetRaw(w, req)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if r.Header.Get("Accept") == "application/x-tar" {
|
|
|
|
s.HandleGetFiles(w, req)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if r.URL.Query().Get("list") == "true" {
|
|
|
|
s.HandleGetList(w, req)
|
|
|
|
return
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
2017-04-07 01:22:22 +03:00
|
|
|
|
|
|
|
s.HandleGetFile(w, req)
|
|
|
|
|
|
|
|
default:
|
|
|
|
http.Error(w, "Method "+r.Method+" is not supported.", http.StatusMethodNotAllowed)
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) updateManifest(key storage.Key, update func(mw *api.ManifestWriter) error) (storage.Key, error) {
|
|
|
|
mw, err := s.api.NewManifestWriter(key, nil)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := update(mw); err != nil {
|
|
|
|
return nil, err
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
2017-04-07 01:22:22 +03:00
|
|
|
|
|
|
|
key, err = mw.Store()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|
2017-04-07 01:22:22 +03:00
|
|
|
s.logDebug("generated manifest %s", key)
|
|
|
|
return key, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) logDebug(format string, v ...interface{}) {
|
|
|
|
log.Debug(fmt.Sprintf("[BZZ] HTTP: "+format, v...))
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) logError(format string, v ...interface{}) {
|
|
|
|
log.Error(fmt.Sprintf("[BZZ] HTTP: "+format, v...))
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) BadRequest(w http.ResponseWriter, r *Request, reason string) {
|
|
|
|
s.logDebug("bad request %s %s: %s", r.Method, r.uri, reason)
|
|
|
|
http.Error(w, reason, http.StatusBadRequest)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) Error(w http.ResponseWriter, r *Request, err error) {
|
|
|
|
s.logError("error serving %s %s: %s", r.Method, r.uri, err)
|
|
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
2016-08-29 22:18:00 +03:00
|
|
|
}
|