resource.go 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671
  1. package server
  2. import (
  3. "bytes"
  4. "context"
  5. "encoding/json"
  6. "fmt"
  7. "io"
  8. "mime"
  9. "net/http"
  10. "net/url"
  11. "os"
  12. "path"
  13. "path/filepath"
  14. "regexp"
  15. "strconv"
  16. "strings"
  17. "sync/atomic"
  18. "time"
  19. "github.com/disintegration/imaging"
  20. "github.com/labstack/echo/v4"
  21. "github.com/pkg/errors"
  22. "github.com/usememos/memos/api"
  23. "github.com/usememos/memos/common"
  24. "github.com/usememos/memos/common/log"
  25. "github.com/usememos/memos/plugin/storage/s3"
  26. "github.com/usememos/memos/store"
  27. "go.uber.org/zap"
  28. )
  29. const (
  30. // The upload memory buffer is 32 MiB.
  31. // It should be kept low, so RAM usage doesn't get out of control.
  32. // This is unrelated to maximum upload size limit, which is now set through system setting.
  33. maxUploadBufferSizeBytes = 32 << 20
  34. MebiByte = 1024 * 1024
  35. // thumbnailImagePath is the directory to store image thumbnails.
  36. thumbnailImagePath = ".thumbnail_cache"
  37. )
  38. var fileKeyPattern = regexp.MustCompile(`\{[a-z]{1,9}\}`)
  39. func (s *Server) registerResourceRoutes(g *echo.Group) {
  40. g.POST("/resource", func(c echo.Context) error {
  41. ctx := c.Request().Context()
  42. userID, ok := c.Get(getUserIDContextKey()).(int)
  43. if !ok {
  44. return echo.NewHTTPError(http.StatusUnauthorized, "Missing user in session")
  45. }
  46. resourceCreate := &api.ResourceCreate{}
  47. if err := json.NewDecoder(c.Request().Body).Decode(resourceCreate); err != nil {
  48. return echo.NewHTTPError(http.StatusBadRequest, "Malformatted post resource request").SetInternal(err)
  49. }
  50. resourceCreate.CreatorID = userID
  51. if resourceCreate.ExternalLink != "" {
  52. // Only allow those external links scheme with http/https
  53. linkURL, err := url.Parse(resourceCreate.ExternalLink)
  54. if err != nil {
  55. return echo.NewHTTPError(http.StatusBadRequest, "Invalid external link").SetInternal(err)
  56. }
  57. if linkURL.Scheme != "http" && linkURL.Scheme != "https" {
  58. return echo.NewHTTPError(http.StatusBadRequest, "Invalid external link scheme")
  59. }
  60. if resourceCreate.DownloadToLocal {
  61. resp, err := http.Get(linkURL.String())
  62. if err != nil {
  63. return echo.NewHTTPError(http.StatusBadRequest, "Failed to request "+resourceCreate.ExternalLink)
  64. }
  65. defer resp.Body.Close()
  66. blob, err := io.ReadAll(resp.Body)
  67. if err != nil {
  68. return echo.NewHTTPError(http.StatusBadRequest, "Failed to read "+resourceCreate.ExternalLink)
  69. }
  70. resourceCreate.Blob = blob
  71. mediaType, _, err := mime.ParseMediaType(resp.Header.Get("Content-Type"))
  72. if err != nil {
  73. return echo.NewHTTPError(http.StatusBadRequest, "Failed to read mime from "+resourceCreate.ExternalLink)
  74. }
  75. resourceCreate.Type = mediaType
  76. filename := path.Base(linkURL.Path)
  77. if path.Ext(filename) == "" {
  78. extensions, _ := mime.ExtensionsByType(mediaType)
  79. if len(extensions) > 0 {
  80. filename += extensions[0]
  81. }
  82. }
  83. resourceCreate.Filename = filename
  84. resourceCreate.PublicID = common.GenUUID()
  85. resourceCreate.ExternalLink = ""
  86. }
  87. }
  88. resource, err := s.Store.CreateResource(ctx, resourceCreate)
  89. if err != nil {
  90. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to create resource").SetInternal(err)
  91. }
  92. if err := createResourceCreateActivity(c.Request().Context(), s.Store, resource); err != nil {
  93. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to create activity").SetInternal(err)
  94. }
  95. return c.JSON(http.StatusOK, composeResponse(resource))
  96. })
  97. g.POST("/resource/blob", func(c echo.Context) error {
  98. ctx := c.Request().Context()
  99. userID, ok := c.Get(getUserIDContextKey()).(int)
  100. if !ok {
  101. return echo.NewHTTPError(http.StatusUnauthorized, "Missing user in session")
  102. }
  103. // This is the backend default max upload size limit.
  104. maxUploadSetting := s.Store.GetSystemSettingValueOrDefault(&ctx, api.SystemSettingMaxUploadSizeMiBName, "32")
  105. var settingMaxUploadSizeBytes int
  106. if settingMaxUploadSizeMiB, err := strconv.Atoi(maxUploadSetting); err == nil {
  107. settingMaxUploadSizeBytes = settingMaxUploadSizeMiB * MebiByte
  108. } else {
  109. log.Warn("Failed to parse max upload size", zap.Error(err))
  110. settingMaxUploadSizeBytes = 0
  111. }
  112. file, err := c.FormFile("file")
  113. if err != nil {
  114. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to get uploading file").SetInternal(err)
  115. }
  116. if file == nil {
  117. return echo.NewHTTPError(http.StatusBadRequest, "Upload file not found").SetInternal(err)
  118. }
  119. if file.Size > int64(settingMaxUploadSizeBytes) {
  120. message := fmt.Sprintf("File size exceeds allowed limit of %d MiB", settingMaxUploadSizeBytes/MebiByte)
  121. return echo.NewHTTPError(http.StatusBadRequest, message).SetInternal(err)
  122. }
  123. if err := c.Request().ParseMultipartForm(maxUploadBufferSizeBytes); err != nil {
  124. return echo.NewHTTPError(http.StatusBadRequest, "Failed to parse upload data").SetInternal(err)
  125. }
  126. filetype := file.Header.Get("Content-Type")
  127. size := file.Size
  128. sourceFile, err := file.Open()
  129. if err != nil {
  130. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to open file").SetInternal(err)
  131. }
  132. defer sourceFile.Close()
  133. var resourceCreate *api.ResourceCreate
  134. systemSettingStorageServiceID, err := s.Store.FindSystemSetting(ctx, &api.SystemSettingFind{Name: api.SystemSettingStorageServiceIDName})
  135. if err != nil && common.ErrorCode(err) != common.NotFound {
  136. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to find storage").SetInternal(err)
  137. }
  138. storageServiceID := api.DatabaseStorage
  139. if systemSettingStorageServiceID != nil {
  140. err = json.Unmarshal([]byte(systemSettingStorageServiceID.Value), &storageServiceID)
  141. if err != nil {
  142. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to unmarshal storage service id").SetInternal(err)
  143. }
  144. }
  145. publicID := common.GenUUID()
  146. if storageServiceID == api.DatabaseStorage {
  147. fileBytes, err := io.ReadAll(sourceFile)
  148. if err != nil {
  149. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to read file").SetInternal(err)
  150. }
  151. resourceCreate = &api.ResourceCreate{
  152. CreatorID: userID,
  153. Filename: file.Filename,
  154. Type: filetype,
  155. Size: size,
  156. Blob: fileBytes,
  157. }
  158. } else if storageServiceID == api.LocalStorage {
  159. // filepath.Join() should be used for local file paths,
  160. // as it handles the os-specific path separator automatically.
  161. // path.Join() always uses '/' as path separator.
  162. systemSettingLocalStoragePath, err := s.Store.FindSystemSetting(ctx, &api.SystemSettingFind{Name: api.SystemSettingLocalStoragePathName})
  163. if err != nil && common.ErrorCode(err) != common.NotFound {
  164. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to find local storage path setting").SetInternal(err)
  165. }
  166. localStoragePath := "assets/{publicid}"
  167. if systemSettingLocalStoragePath != nil && systemSettingLocalStoragePath.Value != "" {
  168. err = json.Unmarshal([]byte(systemSettingLocalStoragePath.Value), &localStoragePath)
  169. if err != nil {
  170. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to unmarshal local storage path setting").SetInternal(err)
  171. }
  172. }
  173. filePath := filepath.FromSlash(localStoragePath)
  174. if !strings.Contains(filePath, "{publicid}") {
  175. filePath = filepath.Join(filePath, "{publicid}")
  176. }
  177. filePath = filepath.Join(s.Profile.Data, replacePathTemplate(filePath, file.Filename, publicID+filepath.Ext(file.Filename)))
  178. dir := filepath.Dir(filePath)
  179. if err = os.MkdirAll(dir, os.ModePerm); err != nil {
  180. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to create directory").SetInternal(err)
  181. }
  182. dst, err := os.Create(filePath)
  183. if err != nil {
  184. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to create file").SetInternal(err)
  185. }
  186. defer dst.Close()
  187. _, err = io.Copy(dst, sourceFile)
  188. if err != nil {
  189. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to copy file").SetInternal(err)
  190. }
  191. resourceCreate = &api.ResourceCreate{
  192. CreatorID: userID,
  193. Filename: file.Filename,
  194. Type: filetype,
  195. Size: size,
  196. InternalPath: filePath,
  197. }
  198. } else {
  199. storage, err := s.Store.FindStorage(ctx, &api.StorageFind{ID: &storageServiceID})
  200. if err != nil {
  201. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to find storage").SetInternal(err)
  202. }
  203. if storage.Type == api.StorageS3 {
  204. s3Config := storage.Config.S3Config
  205. s3Client, err := s3.NewClient(ctx, &s3.Config{
  206. AccessKey: s3Config.AccessKey,
  207. SecretKey: s3Config.SecretKey,
  208. EndPoint: s3Config.EndPoint,
  209. Region: s3Config.Region,
  210. Bucket: s3Config.Bucket,
  211. URLPrefix: s3Config.URLPrefix,
  212. URLSuffix: s3Config.URLSuffix,
  213. })
  214. if err != nil {
  215. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to new s3 client").SetInternal(err)
  216. }
  217. filePath := s3Config.Path
  218. if !strings.Contains(filePath, "{publicid}") {
  219. filePath = path.Join(filePath, "{publicid}")
  220. }
  221. filePath = replacePathTemplate(filePath, file.Filename, publicID+filepath.Ext(file.Filename))
  222. _, filename := filepath.Split(filePath)
  223. link, err := s3Client.UploadFile(ctx, filePath, filetype, sourceFile)
  224. if err != nil {
  225. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to upload via s3 client").SetInternal(err)
  226. }
  227. resourceCreate = &api.ResourceCreate{
  228. CreatorID: userID,
  229. Filename: filename,
  230. Type: filetype,
  231. Size: size,
  232. ExternalLink: link,
  233. }
  234. } else {
  235. return echo.NewHTTPError(http.StatusInternalServerError, "Unsupported storage type")
  236. }
  237. }
  238. resourceCreate.PublicID = publicID
  239. resource, err := s.Store.CreateResource(ctx, resourceCreate)
  240. if err != nil {
  241. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to create resource").SetInternal(err)
  242. }
  243. if err := createResourceCreateActivity(c.Request().Context(), s.Store, resource); err != nil {
  244. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to create activity").SetInternal(err)
  245. }
  246. return c.JSON(http.StatusOK, composeResponse(resource))
  247. })
  248. g.GET("/resource", func(c echo.Context) error {
  249. ctx := c.Request().Context()
  250. userID, ok := c.Get(getUserIDContextKey()).(int)
  251. if !ok {
  252. return echo.NewHTTPError(http.StatusUnauthorized, "Missing user in session")
  253. }
  254. resourceFind := &api.ResourceFind{
  255. CreatorID: &userID,
  256. }
  257. if limit, err := strconv.Atoi(c.QueryParam("limit")); err == nil {
  258. resourceFind.Limit = &limit
  259. }
  260. if offset, err := strconv.Atoi(c.QueryParam("offset")); err == nil {
  261. resourceFind.Offset = &offset
  262. }
  263. list, err := s.Store.FindResourceList(ctx, resourceFind)
  264. if err != nil {
  265. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to fetch resource list").SetInternal(err)
  266. }
  267. return c.JSON(http.StatusOK, composeResponse(list))
  268. })
  269. g.PATCH("/resource/:resourceId", func(c echo.Context) error {
  270. ctx := c.Request().Context()
  271. userID, ok := c.Get(getUserIDContextKey()).(int)
  272. if !ok {
  273. return echo.NewHTTPError(http.StatusUnauthorized, "Missing user in session")
  274. }
  275. resourceID, err := strconv.Atoi(c.Param("resourceId"))
  276. if err != nil {
  277. return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("ID is not a number: %s", c.Param("resourceId"))).SetInternal(err)
  278. }
  279. resourceFind := &api.ResourceFind{
  280. ID: &resourceID,
  281. }
  282. resource, err := s.Store.FindResource(ctx, resourceFind)
  283. if err != nil {
  284. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to find resource").SetInternal(err)
  285. }
  286. if resource.CreatorID != userID {
  287. return echo.NewHTTPError(http.StatusUnauthorized, "Unauthorized")
  288. }
  289. currentTs := time.Now().Unix()
  290. resourcePatch := &api.ResourcePatch{
  291. UpdatedTs: &currentTs,
  292. }
  293. if err := json.NewDecoder(c.Request().Body).Decode(resourcePatch); err != nil {
  294. return echo.NewHTTPError(http.StatusBadRequest, "Malformatted patch resource request").SetInternal(err)
  295. }
  296. if resourcePatch.ResetPublicID != nil && *resourcePatch.ResetPublicID {
  297. publicID := common.GenUUID()
  298. resourcePatch.PublicID = &publicID
  299. }
  300. resourcePatch.ID = resourceID
  301. resource, err = s.Store.PatchResource(ctx, resourcePatch)
  302. if err != nil {
  303. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to patch resource").SetInternal(err)
  304. }
  305. return c.JSON(http.StatusOK, composeResponse(resource))
  306. })
  307. g.DELETE("/resource/:resourceId", func(c echo.Context) error {
  308. ctx := c.Request().Context()
  309. userID, ok := c.Get(getUserIDContextKey()).(int)
  310. if !ok {
  311. return echo.NewHTTPError(http.StatusUnauthorized, "Missing user in session")
  312. }
  313. resourceID, err := strconv.Atoi(c.Param("resourceId"))
  314. if err != nil {
  315. return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("ID is not a number: %s", c.Param("resourceId"))).SetInternal(err)
  316. }
  317. resource, err := s.Store.FindResource(ctx, &api.ResourceFind{
  318. ID: &resourceID,
  319. CreatorID: &userID,
  320. })
  321. if err != nil {
  322. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to find resource").SetInternal(err)
  323. }
  324. if resource.CreatorID != userID {
  325. return echo.NewHTTPError(http.StatusUnauthorized, "Unauthorized")
  326. }
  327. if resource.InternalPath != "" {
  328. if err := os.Remove(resource.InternalPath); err != nil {
  329. log.Warn(fmt.Sprintf("failed to delete local file with path %s", resource.InternalPath), zap.Error(err))
  330. }
  331. }
  332. ext := filepath.Ext(resource.Filename)
  333. thumbnailPath := path.Join(s.Profile.Data, thumbnailImagePath, fmt.Sprintf("%d-%s%s", resource.ID, resource.PublicID, ext))
  334. if err := os.Remove(thumbnailPath); err != nil {
  335. log.Warn(fmt.Sprintf("failed to delete local thumbnail with path %s", thumbnailPath), zap.Error(err))
  336. }
  337. resourceDelete := &api.ResourceDelete{
  338. ID: resourceID,
  339. }
  340. if err := s.Store.DeleteResource(ctx, resourceDelete); err != nil {
  341. if common.ErrorCode(err) == common.NotFound {
  342. return echo.NewHTTPError(http.StatusNotFound, fmt.Sprintf("Resource ID not found: %d", resourceID))
  343. }
  344. return echo.NewHTTPError(http.StatusInternalServerError, "Failed to delete resource").SetInternal(err)
  345. }
  346. return c.JSON(http.StatusOK, true)
  347. })
  348. }
  349. func (s *Server) registerResourcePublicRoutes(g *echo.Group) {
  350. // (DEPRECATED) use /r/:resourceId/:publicId/:filename instead.
  351. g.GET("/r/:resourceId/:publicId", func(c echo.Context) error {
  352. ctx := c.Request().Context()
  353. resourceID, err := strconv.Atoi(c.Param("resourceId"))
  354. if err != nil {
  355. return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("ID is not a number: %s", c.Param("resourceId"))).SetInternal(err)
  356. }
  357. resourceVisibility, err := CheckResourceVisibility(ctx, s.Store, resourceID)
  358. if err != nil {
  359. return echo.NewHTTPError(http.StatusBadRequest, "Failed to get resource visibility").SetInternal(err)
  360. }
  361. // Protected resource require a logined user
  362. userID, ok := c.Get(getUserIDContextKey()).(int)
  363. if resourceVisibility == store.Protected && (!ok || userID <= 0) {
  364. return echo.NewHTTPError(http.StatusUnauthorized, "Resource visibility not match").SetInternal(err)
  365. }
  366. publicID, err := url.QueryUnescape(c.Param("publicId"))
  367. if err != nil {
  368. return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("publicID is invalid: %s", c.Param("publicId"))).SetInternal(err)
  369. }
  370. resourceFind := &api.ResourceFind{
  371. ID: &resourceID,
  372. PublicID: &publicID,
  373. GetBlob: true,
  374. }
  375. resource, err := s.Store.FindResource(ctx, resourceFind)
  376. if err != nil {
  377. return echo.NewHTTPError(http.StatusInternalServerError, fmt.Sprintf("Failed to find resource by ID: %v", resourceID)).SetInternal(err)
  378. }
  379. // Private resource require logined user is the creator
  380. if resourceVisibility == store.Private && (!ok || userID != resource.CreatorID) {
  381. return echo.NewHTTPError(http.StatusUnauthorized, "Resource visibility not match").SetInternal(err)
  382. }
  383. blob := resource.Blob
  384. if resource.InternalPath != "" {
  385. src, err := os.Open(resource.InternalPath)
  386. if err != nil {
  387. return echo.NewHTTPError(http.StatusInternalServerError, fmt.Sprintf("Failed to open the local resource: %s", resource.InternalPath)).SetInternal(err)
  388. }
  389. defer src.Close()
  390. blob, err = io.ReadAll(src)
  391. if err != nil {
  392. return echo.NewHTTPError(http.StatusInternalServerError, fmt.Sprintf("Failed to read the local resource: %s", resource.InternalPath)).SetInternal(err)
  393. }
  394. }
  395. c.Response().Writer.Header().Set(echo.HeaderCacheControl, "max-age=31536000, immutable")
  396. c.Response().Writer.Header().Set(echo.HeaderContentSecurityPolicy, "default-src 'self'")
  397. resourceType := strings.ToLower(resource.Type)
  398. if strings.HasPrefix(resourceType, "text") {
  399. resourceType = echo.MIMETextPlainCharsetUTF8
  400. } else if strings.HasPrefix(resourceType, "video") || strings.HasPrefix(resourceType, "audio") {
  401. http.ServeContent(c.Response(), c.Request(), resource.Filename, time.Unix(resource.UpdatedTs, 0), bytes.NewReader(blob))
  402. return nil
  403. }
  404. return c.Stream(http.StatusOK, resourceType, bytes.NewReader(blob))
  405. })
  406. g.GET("/r/:resourceId/:publicId/:filename", func(c echo.Context) error {
  407. ctx := c.Request().Context()
  408. resourceID, err := strconv.Atoi(c.Param("resourceId"))
  409. if err != nil {
  410. return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("ID is not a number: %s", c.Param("resourceId"))).SetInternal(err)
  411. }
  412. resourceVisibility, err := CheckResourceVisibility(ctx, s.Store, resourceID)
  413. if err != nil {
  414. return echo.NewHTTPError(http.StatusBadRequest, "Failed to get resource visibility").SetInternal(err)
  415. }
  416. // Protected resource require a logined user
  417. userID, ok := c.Get(getUserIDContextKey()).(int)
  418. if resourceVisibility == store.Protected && (!ok || userID <= 0) {
  419. return echo.NewHTTPError(http.StatusUnauthorized, "Resource visibility not match").SetInternal(err)
  420. }
  421. publicID, err := url.QueryUnescape(c.Param("publicId"))
  422. if err != nil {
  423. return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("publicID is invalid: %s", c.Param("publicId"))).SetInternal(err)
  424. }
  425. filename, err := url.QueryUnescape(c.Param("filename"))
  426. if err != nil {
  427. return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("filename is invalid: %s", c.Param("filename"))).SetInternal(err)
  428. }
  429. resourceFind := &api.ResourceFind{
  430. ID: &resourceID,
  431. PublicID: &publicID,
  432. Filename: &filename,
  433. GetBlob: true,
  434. }
  435. resource, err := s.Store.FindResource(ctx, resourceFind)
  436. if err != nil {
  437. return echo.NewHTTPError(http.StatusInternalServerError, fmt.Sprintf("Failed to find resource by ID: %v", resourceID)).SetInternal(err)
  438. }
  439. // Private resource require logined user is the creator
  440. if resourceVisibility == store.Private && (!ok || userID != resource.CreatorID) {
  441. return echo.NewHTTPError(http.StatusUnauthorized, "Resource visibility not match").SetInternal(err)
  442. }
  443. blob := resource.Blob
  444. if resource.InternalPath != "" {
  445. resourcePath := resource.InternalPath
  446. src, err := os.Open(resourcePath)
  447. if err != nil {
  448. return echo.NewHTTPError(http.StatusInternalServerError, fmt.Sprintf("Failed to open the local resource: %s", resourcePath)).SetInternal(err)
  449. }
  450. defer src.Close()
  451. blob, err = io.ReadAll(src)
  452. if err != nil {
  453. return echo.NewHTTPError(http.StatusInternalServerError, fmt.Sprintf("Failed to read the local resource: %s", resourcePath)).SetInternal(err)
  454. }
  455. }
  456. if c.QueryParam("thumbnail") == "1" && common.HasPrefixes(resource.Type, "image/png", "image/jpeg") {
  457. ext := filepath.Ext(filename)
  458. thumbnailPath := path.Join(s.Profile.Data, thumbnailImagePath, fmt.Sprintf("%d-%s%s", resource.ID, resource.PublicID, ext))
  459. thumbnailBlob, err := getOrGenerateThumbnailImage(blob, thumbnailPath)
  460. if err != nil {
  461. log.Warn(fmt.Sprintf("failed to get or generate local thumbnail with path %s", thumbnailPath), zap.Error(err))
  462. } else {
  463. blob = thumbnailBlob
  464. }
  465. }
  466. c.Response().Writer.Header().Set(echo.HeaderCacheControl, "max-age=31536000, immutable")
  467. c.Response().Writer.Header().Set(echo.HeaderContentSecurityPolicy, "default-src 'self'")
  468. resourceType := strings.ToLower(resource.Type)
  469. if strings.HasPrefix(resourceType, "text") {
  470. resourceType = echo.MIMETextPlainCharsetUTF8
  471. } else if strings.HasPrefix(resourceType, "video") || strings.HasPrefix(resourceType, "audio") {
  472. http.ServeContent(c.Response(), c.Request(), resource.Filename, time.Unix(resource.UpdatedTs, 0), bytes.NewReader(blob))
  473. return nil
  474. }
  475. return c.Stream(http.StatusOK, resourceType, bytes.NewReader(blob))
  476. })
  477. }
  478. func createResourceCreateActivity(ctx context.Context, store *store.Store, resource *api.Resource) error {
  479. payload := api.ActivityResourceCreatePayload{
  480. Filename: resource.Filename,
  481. Type: resource.Type,
  482. Size: resource.Size,
  483. }
  484. payloadBytes, err := json.Marshal(payload)
  485. if err != nil {
  486. return errors.Wrap(err, "failed to marshal activity payload")
  487. }
  488. activity, err := store.CreateActivity(ctx, &api.ActivityCreate{
  489. CreatorID: resource.CreatorID,
  490. Type: api.ActivityResourceCreate,
  491. Level: api.ActivityInfo,
  492. Payload: string(payloadBytes),
  493. })
  494. if err != nil || activity == nil {
  495. return errors.Wrap(err, "failed to create activity")
  496. }
  497. return err
  498. }
  499. func replacePathTemplate(path, filename, publicID string) string {
  500. t := time.Now()
  501. path = fileKeyPattern.ReplaceAllStringFunc(path, func(s string) string {
  502. switch s {
  503. case "{publicid}":
  504. return publicID
  505. case "{filename}":
  506. return filename
  507. case "{timestamp}":
  508. return fmt.Sprintf("%d", t.Unix())
  509. case "{year}":
  510. return fmt.Sprintf("%d", t.Year())
  511. case "{month}":
  512. return fmt.Sprintf("%02d", t.Month())
  513. case "{day}":
  514. return fmt.Sprintf("%02d", t.Day())
  515. case "{hour}":
  516. return fmt.Sprintf("%02d", t.Hour())
  517. case "{minute}":
  518. return fmt.Sprintf("%02d", t.Minute())
  519. case "{second}":
  520. return fmt.Sprintf("%02d", t.Second())
  521. }
  522. return s
  523. })
  524. return path
  525. }
  526. var availableGeneratorAmount int32 = 32
  527. func getOrGenerateThumbnailImage(srcBlob []byte, dstPath string) ([]byte, error) {
  528. if _, err := os.Stat(dstPath); err != nil {
  529. if !errors.Is(err, os.ErrNotExist) {
  530. return nil, errors.Wrap(err, "failed to check thumbnail image stat")
  531. }
  532. if atomic.LoadInt32(&availableGeneratorAmount) <= 0 {
  533. return nil, errors.New("not enough available generator amount")
  534. }
  535. atomic.AddInt32(&availableGeneratorAmount, -1)
  536. defer func() {
  537. atomic.AddInt32(&availableGeneratorAmount, 1)
  538. }()
  539. reader := bytes.NewReader(srcBlob)
  540. src, err := imaging.Decode(reader)
  541. if err != nil {
  542. return nil, errors.Wrap(err, "failed to decode thumbnail image")
  543. }
  544. thumbnailImage := imaging.Resize(src, 512, 0, imaging.Lanczos)
  545. dstDir := path.Dir(dstPath)
  546. if err := os.MkdirAll(dstDir, os.ModePerm); err != nil {
  547. return nil, errors.Wrap(err, "failed to create thumbnail dir")
  548. }
  549. if err := imaging.Save(thumbnailImage, dstPath); err != nil {
  550. return nil, errors.Wrap(err, "failed to resize thumbnail image")
  551. }
  552. }
  553. dstFile, err := os.Open(dstPath)
  554. if err != nil {
  555. return nil, errors.Wrap(err, "failed to open the local resource")
  556. }
  557. defer dstFile.Close()
  558. dstBlob, err := io.ReadAll(dstFile)
  559. if err != nil {
  560. return nil, errors.Wrap(err, "failed to read the local resource")
  561. }
  562. return dstBlob, nil
  563. }
  564. func CheckResourceVisibility(ctx context.Context, s *store.Store, resourceID int) (store.Visibility, error) {
  565. memoResourceFind := &api.MemoResourceFind{
  566. ResourceID: &resourceID,
  567. }
  568. memoResources, err := s.FindMemoResourceList(ctx, memoResourceFind)
  569. if err != nil {
  570. return store.Private, err
  571. }
  572. // If resource is belongs to no memo, it'll always PRIVATE
  573. if len(memoResources) == 0 {
  574. return store.Private, nil
  575. }
  576. memoIDs := make([]int, 0, len(memoResources))
  577. for _, memoResource := range memoResources {
  578. memoIDs = append(memoIDs, memoResource.MemoID)
  579. }
  580. visibilityList, err := s.FindMemosVisibilityList(ctx, memoIDs)
  581. if err != nil {
  582. return store.Private, err
  583. }
  584. var isProtected bool
  585. for _, visibility := range visibilityList {
  586. // If any memo is PUBLIC, resource do
  587. if visibility == store.Public {
  588. return store.Public, nil
  589. }
  590. if visibility == store.Protected {
  591. isProtected = true
  592. }
  593. }
  594. // If no memo is PUBLIC, but any memo is PROTECTED, resource do
  595. if isProtected {
  596. return store.Protected, nil
  597. }
  598. // If all memo is PRIVATE, the resource do
  599. return store.Private, nil
  600. }