Archived
2
0
This repository has been archived on 2024-06-24. You can view files and clone it, but cannot push or open issues or pull requests.
neko-custom/server/internal/http/http.go

247 lines
6.4 KiB
Go
Raw Normal View History

2020-01-19 12:30:09 +13:00
package http
import (
"context"
2021-03-20 09:33:49 +13:00
"encoding/json"
2022-10-31 14:06:05 +13:00
"fmt"
2022-09-18 04:17:04 +12:00
"image/jpeg"
2020-01-19 12:30:09 +13:00
"net/http"
"os"
2022-10-31 14:06:05 +13:00
"regexp"
2022-09-18 04:17:04 +12:00
"strconv"
2020-01-19 12:30:09 +13:00
"github.com/go-chi/chi"
2021-10-06 10:13:44 +13:00
"github.com/go-chi/chi/middleware"
2020-01-19 12:30:09 +13:00
"github.com/rs/zerolog"
"github.com/rs/zerolog/log"
2022-09-13 08:18:18 +12:00
"m1k1o/neko/internal/config"
2021-10-06 09:38:24 +13:00
"m1k1o/neko/internal/types"
2020-01-19 12:30:09 +13:00
)
2022-10-31 14:06:05 +13:00
const FILE_UPLOAD_BUF_SIZE = 65000
2020-01-19 12:30:09 +13:00
type Server struct {
logger zerolog.Logger
router *chi.Mux
http *http.Server
conf *config.Server
}
2022-09-18 04:17:04 +12:00
func New(conf *config.Server, webSocketHandler types.WebSocketHandler, desktop types.DesktopManager) *Server {
2021-03-20 09:33:49 +13:00
logger := log.With().Str("module", "http").Logger()
2020-01-19 12:30:09 +13:00
router := chi.NewRouter()
router.Use(middleware.RequestID) // Create a request ID for each request
2021-10-06 10:13:44 +13:00
router.Use(middleware.RequestLogger(&logformatter{logger}))
router.Use(middleware.Recoverer) // Recover from panics without crashing server
2022-11-12 14:27:15 +13:00
router.Use(middleware.Compress(5, "application/octet-stream"))
2020-01-19 12:30:09 +13:00
2022-09-02 04:22:01 +12:00
if conf.PathPrefix != "/" {
router.Use(func(h http.Handler) http.Handler {
return http.StripPrefix(conf.PathPrefix, h)
})
}
2020-01-19 12:30:09 +13:00
router.Get("/ws", func(w http.ResponseWriter, r *http.Request) {
2021-10-06 10:10:10 +13:00
err := webSocketHandler.Upgrade(w, r)
if err != nil {
logger.Warn().Err(err).Msg("failed to upgrade websocket conection")
}
2020-01-19 12:30:09 +13:00
})
2021-03-20 09:33:49 +13:00
router.Get("/stats", func(w http.ResponseWriter, r *http.Request) {
password := r.URL.Query().Get("pwd")
isAdmin, err := webSocketHandler.IsAdmin(password)
if err != nil {
2021-10-06 10:10:10 +13:00
http.Error(w, err.Error(), http.StatusForbidden)
2021-03-20 09:33:49 +13:00
return
}
if !isAdmin {
2021-10-06 10:10:10 +13:00
http.Error(w, "bad authorization", http.StatusUnauthorized)
2021-03-20 09:33:49 +13:00
return
}
w.Header().Set("Content-Type", "application/json")
2021-03-20 10:06:40 +13:00
stats := webSocketHandler.Stats()
if err := json.NewEncoder(w).Encode(stats); err != nil {
2021-03-20 09:33:49 +13:00
logger.Warn().Err(err).Msg("failed writing json error response")
}
})
2022-09-18 04:17:04 +12:00
router.Get("/screenshot.jpg", func(w http.ResponseWriter, r *http.Request) {
password := r.URL.Query().Get("pwd")
isAdmin, err := webSocketHandler.IsAdmin(password)
if err != nil {
http.Error(w, err.Error(), http.StatusForbidden)
return
}
if !isAdmin {
http.Error(w, "bad authorization", http.StatusUnauthorized)
return
}
if webSocketHandler.IsLocked("login") {
http.Error(w, "room is locked", http.StatusLocked)
return
}
quality, err := strconv.Atoi(r.URL.Query().Get("quality"))
if err != nil {
quality = 90
}
w.Header().Set("Cache-Control", "no-cache, no-store, must-revalidate")
w.Header().Set("Content-Type", "image/jpeg")
img := desktop.GetScreenshotImage()
if err := jpeg.Encode(w, img, &jpeg.Options{Quality: quality}); err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
})
2022-10-31 14:06:05 +13:00
router.Get("/file", func(w http.ResponseWriter, r *http.Request) {
password := r.URL.Query().Get("pwd")
isAuthorized, err := webSocketHandler.CanTransferFiles(password)
if err != nil {
http.Error(w, err.Error(), http.StatusForbidden)
return
}
if !isAuthorized {
http.Error(w, "bad authorization", http.StatusUnauthorized)
return
}
filename := r.URL.Query().Get("filename")
badChars, _ := regexp.MatchString(`(?m)\.\.(?:\/|$)`, filename)
if filename == "" || badChars {
http.Error(w, "bad filename", http.StatusBadRequest)
return
}
path := webSocketHandler.MakeFilePath(filename)
f, err := os.Open(path)
if err != nil {
http.Error(w, "not found or unable to open", http.StatusNotFound)
return
}
defer f.Close()
fileinfo, err := f.Stat()
if err != nil {
http.Error(w, "unable to stat file", http.StatusInternalServerError)
return
}
buffer := make([]byte, fileinfo.Size())
_, err = f.Read(buffer)
if err != nil {
http.Error(w, "error reading file", http.StatusInternalServerError)
return
}
w.Header().Set("Content-Type", "application/octet-stream")
w.Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=\"%s\"", filename))
w.Write(buffer)
})
router.Post("/file", func(w http.ResponseWriter, r *http.Request) {
password := r.URL.Query().Get("pwd")
isAuthorized, err := webSocketHandler.CanTransferFiles(password)
if err != nil {
http.Error(w, err.Error(), http.StatusForbidden)
return
}
if !isAuthorized {
http.Error(w, "bad authorization", http.StatusUnauthorized)
return
}
r.ParseMultipartForm(32 << 20)
buffer := make([]byte, FILE_UPLOAD_BUF_SIZE)
for _, formheader := range r.MultipartForm.File["files"] {
formfile, err := formheader.Open()
if err != nil {
logger.Warn().Err(err).Msg("failed to open formdata file")
http.Error(w, "error writing file", http.StatusInternalServerError)
return
}
f, err := os.OpenFile(webSocketHandler.MakeFilePath(formheader.Filename), os.O_WRONLY|os.O_CREATE, 0644)
if err != nil {
http.Error(w, "unable to open file for writing", http.StatusInternalServerError)
return
}
var copied int64 = 0
for copied < formheader.Size {
var limit int64 = int64(len(buffer))
if limit > formheader.Size-copied {
limit = formheader.Size - copied
}
bytesRead, err := formfile.ReadAt(buffer[:limit], copied)
if err != nil {
logger.Warn().Err(err).Msg("failed copying file in upload")
http.Error(w, "error writing file", http.StatusInternalServerError)
return
}
f.Write(buffer[:bytesRead])
copied += int64(bytesRead)
}
formfile.Close()
f.Close()
}
})
2021-03-20 02:42:54 +13:00
router.Get("/health", func(w http.ResponseWriter, r *http.Request) {
2021-10-06 10:10:10 +13:00
_, _ = w.Write([]byte("true"))
2021-03-20 02:42:54 +13:00
})
2020-01-19 12:30:09 +13:00
fs := http.FileServer(http.Dir(conf.Static))
router.Get("/*", func(w http.ResponseWriter, r *http.Request) {
2021-03-11 10:52:41 +13:00
if _, err := os.Stat(conf.Static + r.URL.Path); !os.IsNotExist(err) {
2020-01-19 12:30:09 +13:00
fs.ServeHTTP(w, r)
2021-03-11 10:08:04 +13:00
} else {
2021-10-06 10:10:10 +13:00
http.NotFound(w, r)
2020-01-19 12:30:09 +13:00
}
})
server := &http.Server{
Addr: conf.Bind,
Handler: router,
}
return &Server{
logger: logger,
router: router,
http: server,
conf: conf,
}
}
func (s *Server) Start() {
if s.conf.Cert != "" && s.conf.Key != "" {
go func() {
if err := s.http.ListenAndServeTLS(s.conf.Cert, s.conf.Key); err != http.ErrServerClosed {
s.logger.Panic().Err(err).Msg("unable to start https server")
}
}()
s.logger.Info().Msgf("https listening on %s", s.http.Addr)
} else {
go func() {
if err := s.http.ListenAndServe(); err != http.ErrServerClosed {
s.logger.Panic().Err(err).Msg("unable to start http server")
}
}()
s.logger.Warn().Msgf("http listening on %s", s.http.Addr)
}
}
func (s *Server) Shutdown() error {
return s.http.Shutdown(context.Background())
}