mirror of
https://codeberg.org/forgejo/forgejo
synced 2024-11-27 12:16:10 +01:00
e81ccc406b
Change all license headers to comply with REUSE specification. Fix #16132 Co-authored-by: flynnnnnnnnnn <flynnnnnnnnnn@github> Co-authored-by: John Olheiser <john.olheiser@gmail.com>
117 lines
3 KiB
Go
117 lines
3 KiB
Go
// Copyright 2021 The Gitea Authors. All rights reserved.
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
package common
|
|
|
|
import (
|
|
"io"
|
|
"path"
|
|
"path/filepath"
|
|
"strings"
|
|
"time"
|
|
|
|
charsetModule "code.gitea.io/gitea/modules/charset"
|
|
"code.gitea.io/gitea/modules/context"
|
|
"code.gitea.io/gitea/modules/git"
|
|
"code.gitea.io/gitea/modules/httpcache"
|
|
"code.gitea.io/gitea/modules/log"
|
|
"code.gitea.io/gitea/modules/setting"
|
|
"code.gitea.io/gitea/modules/typesniffer"
|
|
"code.gitea.io/gitea/modules/util"
|
|
)
|
|
|
|
// ServeBlob download a git.Blob
|
|
func ServeBlob(ctx *context.Context, blob *git.Blob, lastModified time.Time) error {
|
|
if httpcache.HandleGenericETagTimeCache(ctx.Req, ctx.Resp, `"`+blob.ID.String()+`"`, lastModified) {
|
|
return nil
|
|
}
|
|
|
|
dataRc, err := blob.DataAsync()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer func() {
|
|
if err = dataRc.Close(); err != nil {
|
|
log.Error("ServeBlob: Close: %v", err)
|
|
}
|
|
}()
|
|
|
|
return ServeData(ctx, ctx.Repo.TreePath, blob.Size(), dataRc)
|
|
}
|
|
|
|
// ServeData download file from io.Reader
|
|
func ServeData(ctx *context.Context, filePath string, size int64, reader io.Reader) error {
|
|
buf := make([]byte, 1024)
|
|
n, err := util.ReadAtMost(reader, buf)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if n >= 0 {
|
|
buf = buf[:n]
|
|
}
|
|
|
|
opts := &context.ServeHeaderOptions{
|
|
Filename: path.Base(filePath),
|
|
}
|
|
|
|
if size >= 0 {
|
|
opts.ContentLength = &size
|
|
} else {
|
|
log.Error("ServeData called to serve data: %s with size < 0: %d", filePath, size)
|
|
}
|
|
|
|
sniffedType := typesniffer.DetectContentType(buf)
|
|
isPlain := sniffedType.IsText() || ctx.FormBool("render")
|
|
|
|
if setting.MimeTypeMap.Enabled {
|
|
fileExtension := strings.ToLower(filepath.Ext(filePath))
|
|
opts.ContentType = setting.MimeTypeMap.Map[fileExtension]
|
|
}
|
|
|
|
if opts.ContentType == "" {
|
|
if sniffedType.IsBrowsableBinaryType() {
|
|
opts.ContentType = sniffedType.GetMimeType()
|
|
} else if isPlain {
|
|
opts.ContentType = "text/plain"
|
|
} else {
|
|
opts.ContentType = typesniffer.ApplicationOctetStream
|
|
}
|
|
}
|
|
|
|
if isPlain {
|
|
var charset string
|
|
charset, err = charsetModule.DetectEncoding(buf)
|
|
if err != nil {
|
|
log.Error("Detect raw file %s charset failed: %v, using by default utf-8", filePath, err)
|
|
charset = "utf-8"
|
|
}
|
|
opts.ContentTypeCharset = strings.ToLower(charset)
|
|
}
|
|
|
|
isSVG := sniffedType.IsSvgImage()
|
|
|
|
// serve types that can present a security risk with CSP
|
|
if isSVG {
|
|
ctx.Resp.Header().Set("Content-Security-Policy", "default-src 'none'; style-src 'unsafe-inline'; sandbox")
|
|
} else if sniffedType.IsPDF() {
|
|
// no sandbox attribute for pdf as it breaks rendering in at least safari. this
|
|
// should generally be safe as scripts inside PDF can not escape the PDF document
|
|
// see https://bugs.chromium.org/p/chromium/issues/detail?id=413851 for more discussion
|
|
ctx.Resp.Header().Set("Content-Security-Policy", "default-src 'none'; style-src 'unsafe-inline'")
|
|
}
|
|
|
|
opts.Disposition = "inline"
|
|
if isSVG && !setting.UI.SVG.Enabled {
|
|
opts.Disposition = "attachment"
|
|
}
|
|
|
|
ctx.SetServeHeaders(opts)
|
|
|
|
_, err = ctx.Resp.Write(buf)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
_, err = io.Copy(ctx.Resp, reader)
|
|
return err
|
|
}
|