2016-12-06 19:00:24 +01:00
|
|
|
package http
|
|
|
|
|
|
|
|
import (
|
2020-12-26 21:59:45 +01:00
|
|
|
"io"
|
2016-12-06 19:00:24 +01:00
|
|
|
"net/http"
|
2017-12-06 17:38:19 +01:00
|
|
|
"os"
|
2016-12-06 19:00:24 +01:00
|
|
|
"path"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
2020-05-08 17:15:21 +02:00
|
|
|
"time"
|
2016-12-06 19:00:24 +01:00
|
|
|
|
2019-07-28 19:47:38 +02:00
|
|
|
"github.com/rclone/rclone/cmd"
|
|
|
|
"github.com/rclone/rclone/cmd/serve/httplib"
|
|
|
|
"github.com/rclone/rclone/cmd/serve/httplib/httpflags"
|
|
|
|
"github.com/rclone/rclone/cmd/serve/httplib/serve"
|
|
|
|
"github.com/rclone/rclone/fs"
|
|
|
|
"github.com/rclone/rclone/fs/accounting"
|
|
|
|
"github.com/rclone/rclone/vfs"
|
|
|
|
"github.com/rclone/rclone/vfs/vfsflags"
|
2016-12-06 19:00:24 +01:00
|
|
|
"github.com/spf13/cobra"
|
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
2018-02-15 16:01:19 +01:00
|
|
|
httpflags.AddFlags(Command.Flags())
|
2017-10-27 21:56:31 +02:00
|
|
|
vfsflags.AddFlags(Command.Flags())
|
2016-12-06 19:00:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Command definition for cobra
|
|
|
|
var Command = &cobra.Command{
|
|
|
|
Use: "http remote:path",
|
|
|
|
Short: `Serve the remote over HTTP.`,
|
|
|
|
Long: `rclone serve http implements a basic web server to serve the remote
|
|
|
|
over HTTP. This can be viewed in a web browser or you can make a
|
|
|
|
remote of type http read from it.
|
|
|
|
|
2020-10-13 23:49:58 +02:00
|
|
|
You can use the filter flags (e.g. --include, --exclude) to control what
|
2016-12-06 19:00:24 +01:00
|
|
|
is served.
|
|
|
|
|
|
|
|
The server will log errors. Use -v to see access logs.
|
|
|
|
|
|
|
|
--bwlimit will be respected for file transfers. Use --stats to
|
|
|
|
control the stats printing.
|
2018-02-14 21:39:11 +01:00
|
|
|
` + httplib.Help + vfs.Help,
|
2016-12-06 19:00:24 +01:00
|
|
|
Run: func(command *cobra.Command, args []string) {
|
|
|
|
cmd.CheckArgs(1, 1, command, args)
|
|
|
|
f := cmd.NewFsSrc(args)
|
|
|
|
cmd.Run(false, true, command, func() error {
|
2019-06-13 11:51:16 +02:00
|
|
|
s := newServer(f, &httpflags.Opt)
|
2018-11-01 18:16:31 +01:00
|
|
|
err := s.Serve()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
s.Wait()
|
2016-12-06 19:00:24 +01:00
|
|
|
return nil
|
|
|
|
})
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2019-06-13 11:51:16 +02:00
|
|
|
// server contains everything to run the server
|
|
|
|
type server struct {
|
2018-11-01 18:16:31 +01:00
|
|
|
*httplib.Server
|
2018-02-14 21:39:11 +01:00
|
|
|
f fs.Fs
|
|
|
|
vfs *vfs.VFS
|
2017-10-27 21:56:31 +02:00
|
|
|
}
|
|
|
|
|
2019-06-13 11:51:16 +02:00
|
|
|
func newServer(f fs.Fs, opt *httplib.Options) *server {
|
2018-02-14 21:39:11 +01:00
|
|
|
mux := http.NewServeMux()
|
2019-06-13 11:51:16 +02:00
|
|
|
s := &server{
|
2018-11-01 18:16:31 +01:00
|
|
|
Server: httplib.NewServer(mux, opt),
|
|
|
|
f: f,
|
|
|
|
vfs: vfs.New(f, &vfsflags.Opt),
|
2017-10-27 21:56:31 +02:00
|
|
|
}
|
2019-08-24 10:10:50 +02:00
|
|
|
mux.HandleFunc(s.Opt.BaseURL+"/", s.handler)
|
2017-10-27 21:56:31 +02:00
|
|
|
return s
|
2016-12-06 19:00:24 +01:00
|
|
|
}
|
|
|
|
|
2019-06-13 11:51:16 +02:00
|
|
|
// Serve runs the http server in the background.
|
2018-11-01 18:16:31 +01:00
|
|
|
//
|
2019-06-13 11:51:16 +02:00
|
|
|
// Use s.Close() and s.Wait() to shutdown server
|
|
|
|
func (s *server) Serve() error {
|
2018-11-01 18:16:31 +01:00
|
|
|
err := s.Server.Serve()
|
2018-04-04 15:56:26 +02:00
|
|
|
if err != nil {
|
2018-11-01 18:16:31 +01:00
|
|
|
return err
|
2018-04-04 15:56:26 +02:00
|
|
|
}
|
2018-11-01 18:16:31 +01:00
|
|
|
fs.Logf(s.f, "Serving on %s", s.URL())
|
|
|
|
return nil
|
2016-12-06 19:00:24 +01:00
|
|
|
}
|
|
|
|
|
2019-06-13 11:51:16 +02:00
|
|
|
// handler reads incoming requests and dispatches them
|
|
|
|
func (s *server) handler(w http.ResponseWriter, r *http.Request) {
|
2016-12-06 19:00:24 +01:00
|
|
|
if r.Method != "GET" && r.Method != "HEAD" {
|
|
|
|
http.Error(w, "Method not allowed", http.StatusMethodNotAllowed)
|
|
|
|
return
|
|
|
|
}
|
2017-10-27 21:56:31 +02:00
|
|
|
w.Header().Set("Accept-Ranges", "bytes")
|
2017-10-25 00:17:04 +02:00
|
|
|
w.Header().Set("Server", "rclone/"+fs.Version)
|
|
|
|
|
2019-08-04 11:56:38 +02:00
|
|
|
urlPath, ok := s.Path(w, r)
|
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
2016-12-06 19:00:24 +01:00
|
|
|
isDir := strings.HasSuffix(urlPath, "/")
|
|
|
|
remote := strings.Trim(urlPath, "/")
|
|
|
|
if isDir {
|
|
|
|
s.serveDir(w, r, remote)
|
|
|
|
} else {
|
|
|
|
s.serveFile(w, r, remote)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// serveDir serves a directory index at dirRemote
|
2019-06-13 11:51:16 +02:00
|
|
|
func (s *server) serveDir(w http.ResponseWriter, r *http.Request, dirRemote string) {
|
2016-12-06 19:00:24 +01:00
|
|
|
// List the directory
|
2017-10-27 21:56:31 +02:00
|
|
|
node, err := s.vfs.Stat(dirRemote)
|
|
|
|
if err == vfs.ENOENT {
|
2016-12-06 19:00:24 +01:00
|
|
|
http.Error(w, "Directory not found", http.StatusNotFound)
|
|
|
|
return
|
|
|
|
} else if err != nil {
|
2018-10-28 15:08:20 +01:00
|
|
|
serve.Error(dirRemote, w, "Failed to list directory", err)
|
2016-12-06 19:00:24 +01:00
|
|
|
return
|
|
|
|
}
|
2017-10-27 21:56:31 +02:00
|
|
|
if !node.IsDir() {
|
|
|
|
http.Error(w, "Not a directory", http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
dir := node.(*vfs.Dir)
|
|
|
|
dirEntries, err := dir.ReadDirAll()
|
|
|
|
if err != nil {
|
2018-10-28 15:08:20 +01:00
|
|
|
serve.Error(dirRemote, w, "Failed to list directory", err)
|
2017-10-27 21:56:31 +02:00
|
|
|
return
|
|
|
|
}
|
2016-12-06 19:00:24 +01:00
|
|
|
|
2018-10-28 15:08:20 +01:00
|
|
|
// Make the entries for display
|
2018-12-23 01:16:50 +01:00
|
|
|
directory := serve.NewDirectory(dirRemote, s.HTMLTemplate)
|
2017-10-27 21:56:31 +02:00
|
|
|
for _, node := range dirEntries {
|
2020-05-08 17:15:21 +02:00
|
|
|
if vfsflags.Opt.NoModTime {
|
|
|
|
directory.AddHTMLEntry(node.Path(), node.IsDir(), node.Size(), time.Time{})
|
|
|
|
} else {
|
|
|
|
directory.AddHTMLEntry(node.Path(), node.IsDir(), node.Size(), node.ModTime().UTC())
|
|
|
|
}
|
2016-12-06 19:00:24 +01:00
|
|
|
}
|
|
|
|
|
2020-04-30 20:24:11 +02:00
|
|
|
sortParm := r.URL.Query().Get("sort")
|
|
|
|
orderParm := r.URL.Query().Get("order")
|
|
|
|
directory.ProcessQueryParams(sortParm, orderParm)
|
|
|
|
|
2020-05-05 10:41:08 +02:00
|
|
|
// Set the Last-Modified header to the timestamp
|
|
|
|
w.Header().Set("Last-Modified", dir.ModTime().UTC().Format(http.TimeFormat))
|
|
|
|
|
2018-10-28 15:08:20 +01:00
|
|
|
directory.Serve(w, r)
|
2016-12-06 19:00:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// serveFile serves a file object at remote
|
2019-06-13 11:51:16 +02:00
|
|
|
func (s *server) serveFile(w http.ResponseWriter, r *http.Request, remote string) {
|
2017-10-27 21:56:31 +02:00
|
|
|
node, err := s.vfs.Stat(remote)
|
|
|
|
if err == vfs.ENOENT {
|
2016-12-06 19:00:24 +01:00
|
|
|
fs.Infof(remote, "%s: File not found", r.RemoteAddr)
|
|
|
|
http.Error(w, "File not found", http.StatusNotFound)
|
|
|
|
return
|
|
|
|
} else if err != nil {
|
2018-10-28 15:08:20 +01:00
|
|
|
serve.Error(remote, w, "Failed to find file", err)
|
2016-12-06 19:00:24 +01:00
|
|
|
return
|
|
|
|
}
|
2017-10-27 21:56:31 +02:00
|
|
|
if !node.IsFile() {
|
|
|
|
http.Error(w, "Not a file", http.StatusNotFound)
|
2016-12-06 19:00:24 +01:00
|
|
|
return
|
|
|
|
}
|
2017-11-18 12:47:21 +01:00
|
|
|
entry := node.DirEntry()
|
|
|
|
if entry == nil {
|
|
|
|
http.Error(w, "Can't open file being written", http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
obj := entry.(fs.Object)
|
2017-10-27 21:56:31 +02:00
|
|
|
file := node.(*vfs.File)
|
2016-12-06 19:00:24 +01:00
|
|
|
|
2020-12-26 21:59:45 +01:00
|
|
|
// Set content length if we know how long the object is
|
|
|
|
knownSize := obj.Size() >= 0
|
|
|
|
if knownSize {
|
|
|
|
w.Header().Set("Content-Length", strconv.FormatInt(node.Size(), 10))
|
|
|
|
}
|
2016-12-06 19:00:24 +01:00
|
|
|
|
|
|
|
// Set content type
|
2019-06-17 10:34:30 +02:00
|
|
|
mimeType := fs.MimeType(r.Context(), obj)
|
2016-12-06 19:00:24 +01:00
|
|
|
if mimeType == "application/octet-stream" && path.Ext(remote) == "" {
|
|
|
|
// Leave header blank so http server guesses
|
|
|
|
} else {
|
|
|
|
w.Header().Set("Content-Type", mimeType)
|
|
|
|
}
|
|
|
|
|
2020-05-05 10:41:08 +02:00
|
|
|
// Set the Last-Modified header to the timestamp
|
|
|
|
w.Header().Set("Last-Modified", file.ModTime().UTC().Format(http.TimeFormat))
|
|
|
|
|
2016-12-06 19:00:24 +01:00
|
|
|
// If HEAD no need to read the object since we have set the headers
|
|
|
|
if r.Method == "HEAD" {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// open the object
|
2017-12-06 17:38:19 +01:00
|
|
|
in, err := file.Open(os.O_RDONLY)
|
2016-12-06 19:00:24 +01:00
|
|
|
if err != nil {
|
2018-10-28 15:08:20 +01:00
|
|
|
serve.Error(remote, w, "Failed to open file", err)
|
2016-12-06 19:00:24 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
err := in.Close()
|
|
|
|
if err != nil {
|
|
|
|
fs.Errorf(remote, "Failed to close file: %v", err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Account the transfer
|
2019-07-18 12:13:54 +02:00
|
|
|
tr := accounting.Stats(r.Context()).NewTransfer(obj)
|
2020-11-05 17:59:59 +01:00
|
|
|
defer tr.Done(r.Context(), nil)
|
2017-10-27 21:56:31 +02:00
|
|
|
// FIXME in = fs.NewAccount(in, obj).WithBuffer() // account the transfer
|
2016-12-06 19:00:24 +01:00
|
|
|
|
2017-10-27 21:56:31 +02:00
|
|
|
// Serve the file
|
2020-12-26 21:59:45 +01:00
|
|
|
if knownSize {
|
|
|
|
http.ServeContent(w, r, remote, node.ModTime(), in)
|
|
|
|
} else {
|
|
|
|
// http.ServeContent can't serve unknown length files
|
|
|
|
if rangeRequest := r.Header.Get("Range"); rangeRequest != "" {
|
|
|
|
http.Error(w, "Can't use Range: on files of unknown length", http.StatusRequestedRangeNotSatisfiable)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
n, err := io.Copy(w, in)
|
|
|
|
if err != nil {
|
|
|
|
fs.Errorf(obj, "Didn't finish writing GET request (wrote %d/unknown bytes): %v", n, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-06 19:00:24 +01:00
|
|
|
}
|