Compare commits
4 Commits
4d9880701d
...
215bca866f
Author | SHA1 | Date |
---|---|---|
neri | 215bca866f | |
neri | 48fa99002a | |
neri | 40fba9992a | |
neri | 701c86f64c |
File diff suppressed because it is too large
Load Diff
|
@ -1,6 +1,6 @@
|
|||
[package]
|
||||
name = "datatrash"
|
||||
version = "2.4.0"
|
||||
version = "2.5.0"
|
||||
authors = ["neri"]
|
||||
edition = "2021"
|
||||
|
||||
|
|
|
@ -14,3 +14,4 @@ ALTER TABLE files ADD COLUMN IF NOT EXISTS content_type varchar(255) not null
|
|||
GENERATED ALWAYS AS (CASE WHEN kind = 'text' THEN 'text/plain' ELSE 'application/octet-stream' END) STORED;
|
||||
ALTER TABLE files ALTER COLUMN content_type DROP EXPRESSION IF EXISTS;
|
||||
ALTER TABLE files DROP COLUMN IF EXISTS kind;
|
||||
ALTER TABLE files ALTER COLUMN file_name DROP NOT NULL;
|
||||
|
|
|
@ -0,0 +1 @@
|
|||
<h2>{file_name}</h2>
|
|
@ -24,7 +24,7 @@ pub(crate) async fn delete_old_files(
|
|||
.fetch(&db);
|
||||
while let Some(row) = rows.try_next().await? {
|
||||
let file_id: String = row.try_get("file_id").expect("we selected this column");
|
||||
delete_content(&file_id, &files_dir).await?
|
||||
delete_content(&file_id, &files_dir).await?;
|
||||
}
|
||||
|
||||
sqlx::query("DELETE FROM files WHERE valid_till < $1")
|
||||
|
|
|
@ -36,10 +36,14 @@ pub async fn download(
|
|||
let path = config.files_dir.join(&file_id);
|
||||
|
||||
let mime = Mime::from_str(&content_type).unwrap_or(APPLICATION_OCTET_STREAM);
|
||||
let computed_file_name = file_name.clone().unwrap_or_else(|| {
|
||||
let extension = mime_relations::get_extension(&mime).unwrap_or("txt");
|
||||
format!("{file_id}.{extension}")
|
||||
});
|
||||
let mut response = match get_view_type(&req, &mime, &path, delete).await {
|
||||
ViewType::Raw => build_file_response(false, &file_name, path, mime, &req),
|
||||
ViewType::Download => build_file_response(true, &file_name, path, mime, &req),
|
||||
ViewType::Html => build_html_response(&path, &config, &req).await,
|
||||
ViewType::Raw => build_file_response(false, &computed_file_name, path, mime, &req),
|
||||
ViewType::Download => build_file_response(true, &computed_file_name, path, mime, &req),
|
||||
ViewType::Html => build_html_response(file_name.as_deref(), &path, &config, &req).await,
|
||||
}?;
|
||||
|
||||
insert_cache_headers(&mut response, valid_till);
|
||||
|
@ -59,7 +63,7 @@ pub async fn download(
|
|||
async fn load_file_info(
|
||||
id: &str,
|
||||
db: &web::Data<sqlx::Pool<sqlx::Postgres>>,
|
||||
) -> Result<(String, String, OffsetDateTime, String, bool), Error> {
|
||||
) -> Result<(String, Option<String>, OffsetDateTime, String, bool), Error> {
|
||||
sqlx::query_as(
|
||||
"SELECT file_id, file_name, valid_till, content_type, delete_on_download from files WHERE file_id = $1",
|
||||
)
|
||||
|
@ -118,6 +122,7 @@ async fn get_file_size(file_path: &Path) -> u64 {
|
|||
}
|
||||
|
||||
async fn build_html_response(
|
||||
file_name: Option<&str>,
|
||||
path: &Path,
|
||||
config: &Config,
|
||||
req: &HttpRequest,
|
||||
|
@ -126,7 +131,7 @@ async fn build_html_response(
|
|||
log::error!("file could not be read {:?}", file_err);
|
||||
error::ErrorInternalServerError("this file should be here but could not be found")
|
||||
})?;
|
||||
let html_view = template::build_html_view_template(&content, req, config);
|
||||
let html_view = template::build_html_view_template(&content, file_name, req, config);
|
||||
Ok(HttpResponse::Ok()
|
||||
.content_type(TEXT_HTML.to_string())
|
||||
.body(html_view))
|
||||
|
@ -172,24 +177,26 @@ fn get_disposition_params(filename: &str) -> Vec<DispositionParam> {
|
|||
parameters
|
||||
}
|
||||
|
||||
const ALLOWED_CONTEXTS: [&str; 6] = ["audio", "document", "empty", "font", "image", "video"];
|
||||
|
||||
fn append_security_headers(response: &mut HttpResponse, req: &HttpRequest) {
|
||||
// if the browser is trying to fetch this resource in a secure context pretend the reponse is
|
||||
// if the browser is trying to fetch this resource in a secure context pretend the response is
|
||||
// just binary data so it won't be executed
|
||||
let sec_fetch_mode = req
|
||||
let sec_fetch_dest = req
|
||||
.headers()
|
||||
.get("sec-fetch-mode")
|
||||
.and_then(|v| v.to_str().ok());
|
||||
if sec_fetch_mode.is_some() && sec_fetch_mode != Some("navigate") {
|
||||
.get("sec-fetch-dest")
|
||||
.map(|v| v.to_str().unwrap_or("unknown"));
|
||||
if sec_fetch_dest.is_some_and(|sec_fetch_dest| !ALLOWED_CONTEXTS.contains(&sec_fetch_dest)) {
|
||||
response.headers_mut().insert(
|
||||
CONTENT_TYPE,
|
||||
HeaderValue::from_str(APPLICATION_OCTET_STREAM.as_ref())
|
||||
.expect("mime type can be encoded to header value"),
|
||||
);
|
||||
}
|
||||
// the reponse varies based on these request headers
|
||||
// the response varies based on these request headers
|
||||
response
|
||||
.headers_mut()
|
||||
.append(VARY, HeaderValue::from_static("sec-fetch-mode"));
|
||||
.append(VARY, HeaderValue::from_static("sec-fetch-dest"));
|
||||
}
|
||||
|
||||
fn insert_cache_headers(response: &mut HttpResponse, valid_till: OffsetDateTime) {
|
||||
|
|
|
@ -16,7 +16,7 @@ use actix_web::{
|
|||
HeaderName, CONTENT_SECURITY_POLICY, PERMISSIONS_POLICY, REFERRER_POLICY,
|
||||
X_CONTENT_TYPE_OPTIONS, X_FRAME_OPTIONS, X_XSS_PROTECTION,
|
||||
},
|
||||
middleware::{self, Condition, DefaultHeaders, Logger},
|
||||
middleware::{self, Condition, DefaultHeaders},
|
||||
web::{self, Data},
|
||||
App, Error, HttpResponse, HttpServer,
|
||||
};
|
||||
|
@ -81,7 +81,6 @@ async fn main() -> std::io::Result<()> {
|
|||
let http_server = HttpServer::new({
|
||||
move || {
|
||||
App::new()
|
||||
.wrap(Logger::new(r#"%{r}a "%r" =%s %bbytes %Tsec"#))
|
||||
.wrap(
|
||||
DefaultHeaders::new()
|
||||
.add(DEFAULT_CONTENT_SECURITY_POLICY)
|
||||
|
|
|
@ -19,11 +19,21 @@ impl KeyExtractor for ForwardedPeerIpKeyExtractor {
|
|||
|
||||
fn extract(&self, req: &ServiceRequest) -> Result<Self::Key, Self::KeyExtractionError> {
|
||||
let forwarded_for = req.headers().get("x-forwarded-for");
|
||||
if self.proxied && forwarded_for.is_some() {
|
||||
read_forwareded_for(forwarded_for).map_err(SimpleKeyExtractionError::new)
|
||||
let mut ip = if self.proxied && forwarded_for.is_some() {
|
||||
read_forwareded_for(forwarded_for).map_err(SimpleKeyExtractionError::new)?
|
||||
} else {
|
||||
PeerIpKeyExtractor.extract(req)
|
||||
PeerIpKeyExtractor.extract(req)?
|
||||
};
|
||||
|
||||
// only keep the first /56 for ipv6 addresses
|
||||
// mask 0xffff_ffff_ffff_ff00_0000_0000_0000_0000
|
||||
if let IpAddr::V6(ipv6) = ip {
|
||||
let mut octets = ipv6.octets();
|
||||
octets[7..16].fill(0);
|
||||
ip = IpAddr::V6(octets.into());
|
||||
}
|
||||
|
||||
Ok(ip)
|
||||
}
|
||||
|
||||
fn exceed_rate_limit_response(
|
||||
|
|
|
@ -11,6 +11,7 @@ const INDEX_HTML: &str = include_str!("../template/index.html");
|
|||
const AUTH_HIDE_JS: &str = include_str!("../template/auth-hide.js");
|
||||
const AUTH_SNIPPET_HTML: &str = include_str!("../snippet/auth.html.snippet");
|
||||
const MAX_SIZE_SNIPPET_HTML: &str = include_str!("../snippet/max_size.html.snippet");
|
||||
const FILE_NAME_SNIPPET_HTML: &str = include_str!("../snippet/file_name.html.snippet");
|
||||
|
||||
const ABUSE_SNIPPET_HTML: &str = include_str!("../snippet/abuse.html.snippet");
|
||||
|
||||
|
@ -46,15 +47,26 @@ pub fn get_file_url(req: &HttpRequest, id: &str, name: Option<&str>) -> String {
|
|||
}
|
||||
}
|
||||
|
||||
pub fn build_html_view_template(content: &str, req: &HttpRequest, config: &Config) -> String {
|
||||
let encoded = htmlescape::encode_minimal(content);
|
||||
pub fn build_html_view_template(
|
||||
content: &str,
|
||||
file_name: Option<&str>,
|
||||
req: &HttpRequest,
|
||||
config: &Config,
|
||||
) -> String {
|
||||
let encoded_content = htmlescape::encode_minimal(content);
|
||||
let name_snippet = file_name
|
||||
.map(htmlescape::encode_minimal)
|
||||
.map(|name| FILE_NAME_SNIPPET_HTML.replace("{file_name}", &name))
|
||||
.unwrap_or_default();
|
||||
let html = if !content.trim().contains(['\n', '\r']) && Url::from_str(content.trim()).is_ok() {
|
||||
let attribute_encoded = htmlescape::encode_attribute(content);
|
||||
let attribute_encoded_content = htmlescape::encode_attribute(content);
|
||||
URL_VIEW_HTML
|
||||
.replace("{link_content}", &encoded)
|
||||
.replace("{link_attribute}", &attribute_encoded)
|
||||
.replace("{link_content}", &encoded_content)
|
||||
.replace("{link_attribute}", &attribute_encoded_content)
|
||||
} else {
|
||||
TEXT_VIEW_HTML.replace("{text}", &encoded)
|
||||
TEXT_VIEW_HTML
|
||||
.replace("{file_name}", &name_snippet)
|
||||
.replace("{text}", &encoded_content)
|
||||
};
|
||||
insert_abuse_template(html, Some(req), config)
|
||||
}
|
||||
|
|
|
@ -2,7 +2,7 @@ use std::io::ErrorKind;
|
|||
|
||||
use crate::config::Config;
|
||||
use crate::multipart::UploadConfig;
|
||||
use crate::{mime_relations, multipart, template};
|
||||
use crate::{multipart, template};
|
||||
use actix_files::NamedFile;
|
||||
use actix_multipart::Multipart;
|
||||
use actix_web::http::header::LOCATION;
|
||||
|
@ -39,18 +39,12 @@ pub async fn upload(
|
|||
})?;
|
||||
|
||||
let upload_config = multipart::parse_multipart(payload, &file_path, &config).await?;
|
||||
let file_name = upload_config.original_name.clone().unwrap_or_else(|| {
|
||||
format!(
|
||||
"{file_id}.{}",
|
||||
mime_relations::get_extension(&upload_config.content_type).unwrap_or("txt")
|
||||
)
|
||||
});
|
||||
let file_name = upload_config.original_name.clone();
|
||||
|
||||
insert_file_metadata(&file_id, file_name, &file_path, &upload_config, db).await?;
|
||||
|
||||
log::info!(
|
||||
"{} create new file {} (valid_till: {}, content_type: {}, delete_on_download: {})",
|
||||
req.connection_info().realip_remote_addr().unwrap_or("-"),
|
||||
"create new file {} (valid_till: {}, content_type: {}, delete_on_download: {})",
|
||||
file_id,
|
||||
upload_config.valid_till,
|
||||
upload_config.content_type,
|
||||
|
@ -68,7 +62,7 @@ pub async fn upload(
|
|||
|
||||
async fn insert_file_metadata(
|
||||
file_id: &String,
|
||||
file_name: String,
|
||||
file_name: Option<String>,
|
||||
file_path: &Path,
|
||||
upload_config: &UploadConfig,
|
||||
db: web::Data<sqlx::Pool<sqlx::Postgres>>,
|
||||
|
@ -78,7 +72,7 @@ async fn insert_file_metadata(
|
|||
VALUES ($1, $2, $3, $4, $5)",
|
||||
)
|
||||
.bind(file_id)
|
||||
.bind(&file_name)
|
||||
.bind(file_name)
|
||||
.bind(&upload_config.content_type.to_string())
|
||||
.bind(upload_config.valid_till)
|
||||
.bind(upload_config.delete_on_download)
|
||||
|
|
|
@ -108,11 +108,11 @@ a:focus-within {
|
|||
|
||||
textarea {
|
||||
width: 100%;
|
||||
height: 30vh;
|
||||
height: 60vh;
|
||||
}
|
||||
|
||||
h1 + textarea {
|
||||
height: 60vh;
|
||||
form > textarea {
|
||||
height: 30vh;
|
||||
}
|
||||
|
||||
.hidden {
|
||||
|
|
|
@ -17,6 +17,7 @@
|
|||
<h1>
|
||||
<a href="/">datatrash<img src="/static/favicon.svg" class="icon" /></a>
|
||||
</h1>
|
||||
{file_name}
|
||||
<textarea id="text" rows="20" cols="120" readonly>{text}</textarea>
|
||||
<br />
|
||||
<a class="main button" href="?dl">herunterladen</a>
|
||||
|
|
Loading…
Reference in New Issue