2016-11-29 21:56:36 +05:30
// Copyright 2016 The Gitea Authors. All rights reserved.
2022-11-27 23:50:29 +05:30
// SPDX-License-Identifier: MIT
2016-11-29 21:56:36 +05:30
package public
2017-01-29 03:44:56 +05:30
import (
2018-02-04 04:07:05 +05:30
"net/http"
2021-05-30 15:55:11 +05:30
"os"
2018-02-04 04:07:05 +05:30
"path/filepath"
"strings"
2017-01-29 03:44:56 +05:30
2022-10-12 10:48:26 +05:30
"code.gitea.io/gitea/modules/container"
2020-11-18 04:14:52 +05:30
"code.gitea.io/gitea/modules/httpcache"
2021-05-30 15:55:11 +05:30
"code.gitea.io/gitea/modules/log"
2017-01-29 03:44:56 +05:30
"code.gitea.io/gitea/modules/setting"
2023-03-08 17:47:39 +05:30
"code.gitea.io/gitea/modules/util"
2017-01-29 03:44:56 +05:30
)
2021-01-29 21:05:30 +05:30
// Options represents the available options to configure the handler.
2016-11-29 21:56:36 +05:30
type Options struct {
Directory string
2020-11-18 04:14:52 +05:30
Prefix string
2021-05-30 15:55:11 +05:30
CorsHandler func ( http . Handler ) http . Handler
2016-11-29 21:56:36 +05:30
}
2017-01-29 03:44:56 +05:30
2022-01-20 17:11:25 +05:30
// AssetsURLPathPrefix is the path prefix for static asset files
const AssetsURLPathPrefix = "/assets/"
// AssetsHandlerFunc implements the static handler for serving custom or original assets.
func AssetsHandlerFunc ( opts * Options ) http . HandlerFunc {
2022-01-20 23:16:10 +05:30
custPath := filepath . Join ( setting . CustomPath , "public" )
2021-05-30 15:55:11 +05:30
if ! filepath . IsAbs ( custPath ) {
custPath = filepath . Join ( setting . AppWorkPath , custPath )
}
if ! filepath . IsAbs ( opts . Directory ) {
opts . Directory = filepath . Join ( setting . AppWorkPath , opts . Directory )
}
if ! strings . HasSuffix ( opts . Prefix , "/" ) {
opts . Prefix += "/"
2018-02-04 04:07:05 +05:30
}
2022-01-20 17:11:25 +05:30
return func ( resp http . ResponseWriter , req * http . Request ) {
if req . Method != "GET" && req . Method != "HEAD" {
resp . WriteHeader ( http . StatusNotFound )
return
}
2018-02-04 04:07:05 +05:30
2023-03-22 01:32:49 +05:30
var corsSent bool
2022-01-20 17:11:25 +05:30
if opts . CorsHandler != nil {
opts . CorsHandler ( http . HandlerFunc ( func ( http . ResponseWriter , * http . Request ) {
2023-03-22 01:32:49 +05:30
corsSent = true
2022-01-20 17:11:25 +05:30
} ) ) . ServeHTTP ( resp , req )
}
2023-03-22 01:32:49 +05:30
// If CORS is not sent, the response must have been written by other handlers
if ! corsSent {
2022-01-20 17:11:25 +05:30
return
}
2018-02-04 04:07:05 +05:30
2023-03-22 01:32:49 +05:30
file := req . URL . Path [ len ( opts . Prefix ) : ]
2022-01-20 17:11:25 +05:30
// custom files
if opts . handle ( resp , req , http . Dir ( custPath ) , file ) {
return
}
2018-02-04 04:07:05 +05:30
2022-01-20 17:11:25 +05:30
// internal files
if opts . handle ( resp , req , fileSystem ( opts . Directory ) , file ) {
return
}
2021-05-30 15:55:11 +05:30
2022-01-20 17:11:25 +05:30
resp . WriteHeader ( http . StatusNotFound )
2018-02-04 04:07:05 +05:30
}
}
2020-12-24 09:55:17 +05:30
// parseAcceptEncoding parse Accept-Encoding: deflate, gzip;q=1.0, *;q=0.5 as compress methods
2022-10-12 10:48:26 +05:30
func parseAcceptEncoding ( val string ) container . Set [ string ] {
2020-12-24 09:55:17 +05:30
parts := strings . Split ( val , ";" )
2022-10-12 10:48:26 +05:30
types := make ( container . Set [ string ] )
2020-12-24 09:55:17 +05:30
for _ , v := range strings . Split ( parts [ 0 ] , "," ) {
2022-10-12 10:48:26 +05:30
types . Add ( strings . TrimSpace ( v ) )
2020-12-24 09:55:17 +05:30
}
return types
}
2022-01-23 17:49:49 +05:30
// setWellKnownContentType will set the Content-Type if the file is a well-known type.
// See the comments of detectWellKnownMimeType
func setWellKnownContentType ( w http . ResponseWriter , file string ) {
mimeType := detectWellKnownMimeType ( filepath . Ext ( file ) )
if mimeType != "" {
w . Header ( ) . Set ( "Content-Type" , mimeType )
}
}
2021-05-30 15:55:11 +05:30
func ( opts * Options ) handle ( w http . ResponseWriter , req * http . Request , fs http . FileSystem , file string ) bool {
2023-03-22 01:32:49 +05:30
// actually, fs (http.FileSystem) is designed to be a safe interface, relative paths won't bypass its parent directory, it's also fine to do a clean here
f , err := fs . Open ( util . PathJoinRelX ( file ) )
2018-02-04 04:07:05 +05:30
if err != nil {
2021-05-30 15:55:11 +05:30
if os . IsNotExist ( err ) {
return false
2020-04-19 02:31:06 +05:30
}
2021-05-30 15:55:11 +05:30
w . WriteHeader ( http . StatusInternalServerError )
log . Error ( "[Static] Open %q failed: %v" , file , err )
return true
2018-02-04 04:07:05 +05:30
}
defer f . Close ( )
fi , err := f . Stat ( )
if err != nil {
2021-05-30 15:55:11 +05:30
w . WriteHeader ( http . StatusInternalServerError )
log . Error ( "[Static] %q exists, but fails to open: %v" , file , err )
2018-02-04 04:07:05 +05:30
return true
}
// Try to serve index file
if fi . IsDir ( ) {
2021-05-30 15:55:11 +05:30
w . WriteHeader ( http . StatusNotFound )
return true
2018-02-04 04:07:05 +05:30
}
2021-04-12 20:19:26 +05:30
if httpcache . HandleFileETagCache ( req , w , fi ) {
2020-11-18 04:14:52 +05:30
return true
2018-02-04 04:07:05 +05:30
}
2022-01-23 17:49:49 +05:30
setWellKnownContentType ( w , file )
2021-05-30 15:55:11 +05:30
serveContent ( w , req , fi , fi . ModTime ( ) , f )
2018-02-04 04:07:05 +05:30
return true
}