mirror of
				https://gitee.com/gitea/gitea
				synced 2025-11-04 16:40:24 +08:00 
			
		
		
		
	
		
			
				
	
	
		
			119 lines
		
	
	
		
			3.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			119 lines
		
	
	
		
			3.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2021 The Gitea Authors. All rights reserved.
 | 
						|
// Use of this source code is governed by a MIT-style
 | 
						|
// license that can be found in the LICENSE file.
 | 
						|
 | 
						|
package common
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"io"
 | 
						|
	"path"
 | 
						|
	"path/filepath"
 | 
						|
	"strings"
 | 
						|
	"time"
 | 
						|
 | 
						|
	charsetModule "code.gitea.io/gitea/modules/charset"
 | 
						|
	"code.gitea.io/gitea/modules/context"
 | 
						|
	"code.gitea.io/gitea/modules/git"
 | 
						|
	"code.gitea.io/gitea/modules/httpcache"
 | 
						|
	"code.gitea.io/gitea/modules/log"
 | 
						|
	"code.gitea.io/gitea/modules/setting"
 | 
						|
	"code.gitea.io/gitea/modules/typesniffer"
 | 
						|
	"code.gitea.io/gitea/modules/util"
 | 
						|
)
 | 
						|
 | 
						|
// ServeBlob download a git.Blob
 | 
						|
func ServeBlob(ctx *context.Context, blob *git.Blob, lastModified time.Time) error {
 | 
						|
	if httpcache.HandleGenericETagTimeCache(ctx.Req, ctx.Resp, `"`+blob.ID.String()+`"`, lastModified) {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	dataRc, err := blob.DataAsync()
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	defer func() {
 | 
						|
		if err = dataRc.Close(); err != nil {
 | 
						|
			log.Error("ServeBlob: Close: %v", err)
 | 
						|
		}
 | 
						|
	}()
 | 
						|
 | 
						|
	return ServeData(ctx, ctx.Repo.TreePath, blob.Size(), dataRc)
 | 
						|
}
 | 
						|
 | 
						|
// ServeData download file from io.Reader
 | 
						|
func ServeData(ctx *context.Context, filePath string, size int64, reader io.Reader) error {
 | 
						|
	buf := make([]byte, 1024)
 | 
						|
	n, err := util.ReadAtMost(reader, buf)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	if n >= 0 {
 | 
						|
		buf = buf[:n]
 | 
						|
	}
 | 
						|
 | 
						|
	if size >= 0 {
 | 
						|
		ctx.Resp.Header().Set("Content-Length", fmt.Sprintf("%d", size))
 | 
						|
	} else {
 | 
						|
		log.Error("ServeData called to serve data: %s with size < 0: %d", filePath, size)
 | 
						|
	}
 | 
						|
 | 
						|
	opts := &context.ServeHeaderOptions{
 | 
						|
		Filename: path.Base(filePath),
 | 
						|
	}
 | 
						|
 | 
						|
	sniffedType := typesniffer.DetectContentType(buf)
 | 
						|
	isPlain := sniffedType.IsText() || ctx.FormBool("render")
 | 
						|
 | 
						|
	if setting.MimeTypeMap.Enabled {
 | 
						|
		fileExtension := strings.ToLower(filepath.Ext(filePath))
 | 
						|
		opts.ContentType = setting.MimeTypeMap.Map[fileExtension]
 | 
						|
	}
 | 
						|
 | 
						|
	if opts.ContentType == "" {
 | 
						|
		if sniffedType.IsBrowsableBinaryType() {
 | 
						|
			opts.ContentType = sniffedType.GetMimeType()
 | 
						|
		} else if isPlain {
 | 
						|
			opts.ContentType = "text/plain"
 | 
						|
		} else {
 | 
						|
			opts.ContentType = typesniffer.ApplicationOctetStream
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if isPlain {
 | 
						|
		var charset string
 | 
						|
		charset, err = charsetModule.DetectEncoding(buf)
 | 
						|
		if err != nil {
 | 
						|
			log.Error("Detect raw file %s charset failed: %v, using by default utf-8", filePath, err)
 | 
						|
			charset = "utf-8"
 | 
						|
		}
 | 
						|
		opts.ContentTypeCharset = strings.ToLower(charset)
 | 
						|
	}
 | 
						|
 | 
						|
	isSVG := sniffedType.IsSvgImage()
 | 
						|
 | 
						|
	// serve types that can present a security risk with CSP
 | 
						|
	if isSVG {
 | 
						|
		ctx.Resp.Header().Set("Content-Security-Policy", "default-src 'none'; style-src 'unsafe-inline'; sandbox")
 | 
						|
	} else if sniffedType.IsPDF() {
 | 
						|
		// no sandbox attribute for pdf as it breaks rendering in at least safari. this
 | 
						|
		// should generally be safe as scripts inside PDF can not escape the PDF document
 | 
						|
		// see https://bugs.chromium.org/p/chromium/issues/detail?id=413851 for more discussion
 | 
						|
		ctx.Resp.Header().Set("Content-Security-Policy", "default-src 'none'; style-src 'unsafe-inline'")
 | 
						|
	}
 | 
						|
 | 
						|
	opts.Disposition = "inline"
 | 
						|
	if isSVG && !setting.UI.SVG.Enabled {
 | 
						|
		opts.Disposition = "attachment"
 | 
						|
	}
 | 
						|
 | 
						|
	ctx.SetServeHeaders(opts)
 | 
						|
 | 
						|
	_, err = ctx.Resp.Write(buf)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	_, err = io.Copy(ctx.Resp, reader)
 | 
						|
	return err
 | 
						|
}
 |