mirror of https://github.com/go-gitea/gitea.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
117 lines
3.1 KiB
117 lines
3.1 KiB
// Copyright 2021 The Gitea Authors. All rights reserved. |
|
// Use of this source code is governed by a MIT-style |
|
// license that can be found in the LICENSE file. |
|
|
|
package common |
|
|
|
import ( |
|
"io" |
|
"path" |
|
"path/filepath" |
|
"strings" |
|
"time" |
|
|
|
charsetModule "code.gitea.io/gitea/modules/charset" |
|
"code.gitea.io/gitea/modules/context" |
|
"code.gitea.io/gitea/modules/git" |
|
"code.gitea.io/gitea/modules/httpcache" |
|
"code.gitea.io/gitea/modules/log" |
|
"code.gitea.io/gitea/modules/setting" |
|
"code.gitea.io/gitea/modules/typesniffer" |
|
"code.gitea.io/gitea/modules/util" |
|
) |
|
|
|
// ServeBlob download a git.Blob |
|
func ServeBlob(ctx *context.Context, blob *git.Blob, lastModified time.Time) error { |
|
if httpcache.HandleGenericETagTimeCache(ctx.Req, ctx.Resp, `"`+blob.ID.String()+`"`, lastModified) { |
|
return nil |
|
} |
|
|
|
dataRc, err := blob.DataAsync() |
|
if err != nil { |
|
return err |
|
} |
|
defer func() { |
|
if err = dataRc.Close(); err != nil { |
|
log.Error("ServeBlob: Close: %v", err) |
|
} |
|
}() |
|
|
|
return ServeData(ctx, ctx.Repo.TreePath, blob.Size(), dataRc) |
|
} |
|
|
|
// ServeData download file from io.Reader |
|
func ServeData(ctx *context.Context, filePath string, size int64, reader io.Reader) error { |
|
buf := make([]byte, 1024) |
|
n, err := util.ReadAtMost(reader, buf) |
|
if err != nil { |
|
return err |
|
} |
|
if n >= 0 { |
|
buf = buf[:n] |
|
} |
|
|
|
opts := &context.ServeHeaderOptions{ |
|
Filename: path.Base(filePath), |
|
} |
|
|
|
if size >= 0 { |
|
opts.ContentLength = &size |
|
} else { |
|
log.Error("ServeData called to serve data: %s with size < 0: %d", filePath, size) |
|
} |
|
|
|
sniffedType := typesniffer.DetectContentType(buf) |
|
isPlain := sniffedType.IsText() || ctx.FormBool("render") |
|
|
|
if setting.MimeTypeMap.Enabled { |
|
fileExtension := strings.ToLower(filepath.Ext(filePath)) |
|
opts.ContentType = setting.MimeTypeMap.Map[fileExtension] |
|
} |
|
|
|
if opts.ContentType == "" { |
|
if sniffedType.IsBrowsableBinaryType() { |
|
opts.ContentType = sniffedType.GetMimeType() |
|
} else if isPlain { |
|
opts.ContentType = "text/plain" |
|
} else { |
|
opts.ContentType = typesniffer.ApplicationOctetStream |
|
} |
|
} |
|
|
|
if isPlain { |
|
var charset string |
|
charset, err = charsetModule.DetectEncoding(buf) |
|
if err != nil { |
|
log.Error("Detect raw file %s charset failed: %v, using by default utf-8", filePath, err) |
|
charset = "utf-8" |
|
} |
|
opts.ContentTypeCharset = strings.ToLower(charset) |
|
} |
|
|
|
isSVG := sniffedType.IsSvgImage() |
|
|
|
// serve types that can present a security risk with CSP |
|
if isSVG { |
|
ctx.Resp.Header().Set("Content-Security-Policy", "default-src 'none'; style-src 'unsafe-inline'; sandbox") |
|
} else if sniffedType.IsPDF() { |
|
// no sandbox attribute for pdf as it breaks rendering in at least safari. this |
|
// should generally be safe as scripts inside PDF can not escape the PDF document |
|
// see https://bugs.chromium.org/p/chromium/issues/detail?id=413851 for more discussion |
|
ctx.Resp.Header().Set("Content-Security-Policy", "default-src 'none'; style-src 'unsafe-inline'") |
|
} |
|
|
|
opts.Disposition = "inline" |
|
if isSVG && !setting.UI.SVG.Enabled { |
|
opts.Disposition = "attachment" |
|
} |
|
|
|
ctx.SetServeHeaders(opts) |
|
|
|
_, err = ctx.Resp.Write(buf) |
|
if err != nil { |
|
return err |
|
} |
|
_, err = io.Copy(ctx.Resp, reader) |
|
return err |
|
}
|
|
|