1
0
Fork 0
mirror of https://git.sr.ht/~adnano/go-gemini synced 2024-05-18 08:06:04 +02:00
go-gemini/fs.go

201 lines
4.8 KiB
Go
Raw Normal View History

// +build go1.16
2020-10-24 21:15:32 +02:00
package gemini
2020-10-12 00:57:04 +02:00
import (
"context"
2021-02-21 15:56:59 +01:00
"errors"
"fmt"
2020-10-12 00:57:04 +02:00
"io"
2021-02-17 00:53:41 +01:00
"io/fs"
2020-10-12 02:13:53 +02:00
"mime"
"net/url"
2020-10-12 00:57:04 +02:00
"path"
"sort"
"strings"
2020-10-12 00:57:04 +02:00
)
2021-02-15 01:50:38 +01:00
// FileServer returns a handler that serves Gemini requests with the contents
// of the provided file system.
//
2021-02-17 00:53:41 +01:00
// To use the operating system's file system implementation, use os.DirFS:
2021-02-15 01:50:38 +01:00
//
2021-02-17 00:53:41 +01:00
// gemini.FileServer(os.DirFS("/tmp"))
func FileServer(fsys fs.FS) Handler {
2021-02-15 01:50:38 +01:00
return fileServer{fsys}
}
type fileServer struct {
2021-02-17 00:53:41 +01:00
fs.FS
2021-02-15 01:50:38 +01:00
}
func (fs fileServer) ServeGemini(ctx context.Context, w ResponseWriter, r *Request) {
2021-02-21 15:29:21 +01:00
serveFile(w, r, fs, path.Clean(r.URL.Path), true)
2020-10-27 18:32:48 +01:00
}
// ServeFile responds to the request with the contents of the named file
// or directory.
2021-02-15 01:50:38 +01:00
//
// If the provided file or directory name is a relative path, it is interpreted
// relative to the current directory and may ascend to parent directories. If
// the provided name is constructed from user input, it should be sanitized
// before calling ServeFile.
//
// As a precaution, ServeFile will reject requests where r.URL.Path contains a
// ".." path element; this protects against callers who might unsafely use
2021-02-24 00:45:58 +01:00
// path.Join on r.URL.Path without sanitizing it and then use that
// path.Join result as the name argument.
//
// As another special case, ServeFile redirects any request where r.URL.Path
// ends in "/index.gmi" to the same path, without the final "index.gmi". To
// avoid such redirects either modify the path or use ServeContent.
//
// Outside of those two special cases, ServeFile does not use r.URL.Path for
// selecting the file or directory to serve; only the file or directory
// provided in the name argument is used.
func ServeFile(w ResponseWriter, r *Request, fsys fs.FS, name string) {
if containsDotDot(r.URL.Path) {
// Too many programs use r.URL.Path to construct the argument to
// serveFile. Reject the request under the assumption that happened
// here and ".." may not be wanted.
// Note that name might not contain "..", for example if code (still
2021-02-24 00:45:58 +01:00
// incorrectly) used path.Join(myDir, r.URL.Path).
2021-02-17 19:36:16 +01:00
w.WriteHeader(StatusBadRequest, "invalid URL path")
return
}
2021-02-21 15:29:21 +01:00
serveFile(w, r, fsys, name, false)
2021-02-17 07:38:18 +01:00
}
func containsDotDot(v string) bool {
if !strings.Contains(v, "..") {
return false
}
for _, ent := range strings.FieldsFunc(v, isSlashRune) {
if ent == ".." {
return true
}
}
return false
}
func isSlashRune(r rune) bool { return r == '/' || r == '\\' }
func serveFile(w ResponseWriter, r *Request, fsys fs.FS, name string, redirect bool) {
2021-02-17 07:38:18 +01:00
const indexPage = "/index.gmi"
// Redirect .../index.gmi to .../
if strings.HasSuffix(r.URL.Path, indexPage) {
2021-02-17 19:36:16 +01:00
w.WriteHeader(StatusPermanentRedirect, "./")
2021-02-17 07:38:18 +01:00
return
}
if name == "/" {
name = "."
} else {
name = strings.Trim(name, "/")
}
2021-02-15 01:50:38 +01:00
f, err := fsys.Open(name)
2020-10-12 00:57:04 +02:00
if err != nil {
2021-02-21 15:56:59 +01:00
w.WriteHeader(toGeminiError(err))
return
2020-10-12 00:57:04 +02:00
}
defer f.Close()
2020-10-12 00:57:04 +02:00
2021-02-15 01:50:38 +01:00
stat, err := f.Stat()
if err != nil {
2021-02-21 15:56:59 +01:00
w.WriteHeader(toGeminiError(err))
return
2021-02-15 01:50:38 +01:00
}
2021-02-17 07:38:18 +01:00
// Redirect to canonical path
if redirect {
url := r.URL.Path
if stat.IsDir() {
// Add trailing slash
if len(url) != 0 && url[len(url)-1] != '/' {
2021-02-17 19:36:16 +01:00
w.WriteHeader(StatusPermanentRedirect, path.Base(url)+"/")
2021-02-17 07:38:18 +01:00
return
}
} else {
// Remove trailing slash
if len(url) != 0 && url[len(url)-1] == '/' {
2021-02-17 19:36:16 +01:00
w.WriteHeader(StatusPermanentRedirect, "../"+path.Base(url))
2021-02-17 07:38:18 +01:00
return
}
}
}
2021-02-15 01:50:38 +01:00
if stat.IsDir() {
2021-02-17 07:38:18 +01:00
// Redirect if the directory name doesn't end in a slash
url := r.URL.Path
if len(url) != 0 && url[len(url)-1] != '/' {
2021-02-17 19:36:16 +01:00
w.WriteHeader(StatusRedirect, path.Base(url)+"/")
2021-02-17 07:38:18 +01:00
return
}
// Use contents of index.gmi if present
name = path.Join(name, indexPage)
index, err := fsys.Open(name)
if err == nil {
defer index.Close()
istat, err := index.Stat()
if err == nil {
f = index
stat = istat
}
2021-02-15 01:50:38 +01:00
}
}
if stat.IsDir() {
// Failed to find index file
dirList(w, f)
return
}
2021-04-21 17:41:40 +02:00
// Detect mimetype from file extension
ext := path.Ext(name)
mimetype := mime.TypeByExtension(ext)
w.SetMediaType(mimetype)
io.Copy(w, f)
}
func dirList(w ResponseWriter, f fs.File) {
var entries []fs.DirEntry
var err error
d, ok := f.(fs.ReadDirFile)
if ok {
entries, err = d.ReadDir(-1)
}
if !ok || err != nil {
2021-02-17 19:36:16 +01:00
w.WriteHeader(StatusTemporaryFailure, "Error reading directory")
return
}
sort.Slice(entries, func(i, j int) bool {
return entries[i].Name() < entries[j].Name()
})
for _, entry := range entries {
name := entry.Name()
if entry.IsDir() {
name += "/"
2021-02-15 01:50:38 +01:00
}
link := LineLink{
Name: name,
URL: (&url.URL{Path: name}).EscapedPath(),
2020-10-12 00:57:04 +02:00
}
fmt.Fprintln(w, link.String())
2020-10-12 00:57:04 +02:00
}
}
2021-02-21 15:56:59 +01:00
func toGeminiError(err error) (status Status, meta string) {
if errors.Is(err, fs.ErrNotExist) {
return StatusNotFound, "Not found"
}
if errors.Is(err, fs.ErrPermission) {
return StatusNotFound, "Forbidden"
}
return StatusTemporaryFailure, "Internal server error"
}