mirror of
				https://codeberg.org/forgejo/forgejo.git
				synced 2025-10-31 14:31:02 +00:00 
			
		
		
		
	`http.ServeFile/ServeContent` handles `If-xxx`, `Content-Length`, `Range` and `Etag` correctly After this PR, storage files (eg: avatar) could be responded with correct Content-Length.
		
			
				
	
	
		
			130 lines
		
	
	
	
		
			3.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			130 lines
		
	
	
	
		
			3.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2016 The Gitea Authors. All rights reserved.
 | ||
| // SPDX-License-Identifier: MIT
 | ||
| 
 | ||
| package public
 | ||
| 
 | ||
| import (
 | ||
| 	"bytes"
 | ||
| 	"io"
 | ||
| 	"net/http"
 | ||
| 	"os"
 | ||
| 	"path"
 | ||
| 	"strings"
 | ||
| 	"time"
 | ||
| 
 | ||
| 	"code.gitea.io/gitea/modules/assetfs"
 | ||
| 	"code.gitea.io/gitea/modules/container"
 | ||
| 	"code.gitea.io/gitea/modules/httpcache"
 | ||
| 	"code.gitea.io/gitea/modules/log"
 | ||
| 	"code.gitea.io/gitea/modules/setting"
 | ||
| 	"code.gitea.io/gitea/modules/util"
 | ||
| )
 | ||
| 
 | ||
| func CustomAssets() *assetfs.Layer {
 | ||
| 	return assetfs.Local("custom", setting.CustomPath, "public")
 | ||
| }
 | ||
| 
 | ||
| func AssetFS() *assetfs.LayeredFS {
 | ||
| 	return assetfs.Layered(CustomAssets(), BuiltinAssets())
 | ||
| }
 | ||
| 
 | ||
| // AssetsHandlerFunc implements the static handler for serving custom or original assets.
 | ||
| func AssetsHandlerFunc(prefix string) http.HandlerFunc {
 | ||
| 	assetFS := AssetFS()
 | ||
| 	prefix = strings.TrimSuffix(prefix, "/") + "/"
 | ||
| 	return func(resp http.ResponseWriter, req *http.Request) {
 | ||
| 		subPath := req.URL.Path
 | ||
| 		if !strings.HasPrefix(subPath, prefix) {
 | ||
| 			return
 | ||
| 		}
 | ||
| 		subPath = strings.TrimPrefix(subPath, prefix)
 | ||
| 
 | ||
| 		if req.Method != "GET" && req.Method != "HEAD" {
 | ||
| 			resp.WriteHeader(http.StatusNotFound)
 | ||
| 			return
 | ||
| 		}
 | ||
| 
 | ||
| 		if handleRequest(resp, req, assetFS, subPath) {
 | ||
| 			return
 | ||
| 		}
 | ||
| 
 | ||
| 		resp.WriteHeader(http.StatusNotFound)
 | ||
| 	}
 | ||
| }
 | ||
| 
 | ||
| // parseAcceptEncoding parse Accept-Encoding: deflate, gzip;q=1.0, *;q=0.5 as compress methods
 | ||
| func parseAcceptEncoding(val string) container.Set[string] {
 | ||
| 	parts := strings.Split(val, ";")
 | ||
| 	types := make(container.Set[string])
 | ||
| 	for _, v := range strings.Split(parts[0], ",") {
 | ||
| 		types.Add(strings.TrimSpace(v))
 | ||
| 	}
 | ||
| 	return types
 | ||
| }
 | ||
| 
 | ||
| // setWellKnownContentType will set the Content-Type if the file is a well-known type.
 | ||
| // See the comments of detectWellKnownMimeType
 | ||
| func setWellKnownContentType(w http.ResponseWriter, file string) {
 | ||
| 	mimeType := detectWellKnownMimeType(path.Ext(file))
 | ||
| 	if mimeType != "" {
 | ||
| 		w.Header().Set("Content-Type", mimeType)
 | ||
| 	}
 | ||
| }
 | ||
| 
 | ||
| func handleRequest(w http.ResponseWriter, req *http.Request, fs http.FileSystem, file string) bool {
 | ||
| 	// actually, fs (http.FileSystem) is designed to be a safe interface, relative paths won't bypass its parent directory, it's also fine to do a clean here
 | ||
| 	f, err := fs.Open(util.PathJoinRelX(file))
 | ||
| 	if err != nil {
 | ||
| 		if os.IsNotExist(err) {
 | ||
| 			return false
 | ||
| 		}
 | ||
| 		w.WriteHeader(http.StatusInternalServerError)
 | ||
| 		log.Error("[Static] Open %q failed: %v", file, err)
 | ||
| 		return true
 | ||
| 	}
 | ||
| 	defer f.Close()
 | ||
| 
 | ||
| 	fi, err := f.Stat()
 | ||
| 	if err != nil {
 | ||
| 		w.WriteHeader(http.StatusInternalServerError)
 | ||
| 		log.Error("[Static] %q exists, but fails to open: %v", file, err)
 | ||
| 		return true
 | ||
| 	}
 | ||
| 
 | ||
| 	// Try to serve index file
 | ||
| 	if fi.IsDir() {
 | ||
| 		w.WriteHeader(http.StatusNotFound)
 | ||
| 		return true
 | ||
| 	}
 | ||
| 
 | ||
| 	serveContent(w, req, fi, fi.ModTime(), f)
 | ||
| 	return true
 | ||
| }
 | ||
| 
 | ||
| type GzipBytesProvider interface {
 | ||
| 	GzipBytes() []byte
 | ||
| }
 | ||
| 
 | ||
| // serveContent serve http content
 | ||
| func serveContent(w http.ResponseWriter, req *http.Request, fi os.FileInfo, modtime time.Time, content io.ReadSeeker) {
 | ||
| 	setWellKnownContentType(w, fi.Name())
 | ||
| 
 | ||
| 	encodings := parseAcceptEncoding(req.Header.Get("Accept-Encoding"))
 | ||
| 	if encodings.Contains("gzip") {
 | ||
| 		// try to provide gzip content directly from bindata (provided by vfsgen۰CompressedFileInfo)
 | ||
| 		if compressed, ok := fi.(GzipBytesProvider); ok {
 | ||
| 			rdGzip := bytes.NewReader(compressed.GzipBytes())
 | ||
| 			// all gzipped static files (from bindata) are managed by Gitea, so we can make sure every file has the correct ext name
 | ||
| 			// then we can get the correct Content-Type, we do not need to do http.DetectContentType on the decompressed data
 | ||
| 			if w.Header().Get("Content-Type") == "" {
 | ||
| 				w.Header().Set("Content-Type", "application/octet-stream")
 | ||
| 			}
 | ||
| 			w.Header().Set("Content-Encoding", "gzip")
 | ||
| 			httpcache.ServeContentWithCacheControl(w, req, fi.Name(), modtime, rdGzip)
 | ||
| 			return
 | ||
| 		}
 | ||
| 	}
 | ||
| 
 | ||
| 	httpcache.ServeContentWithCacheControl(w, req, fi.Name(), modtime, content)
 | ||
| 	return
 | ||
| }
 |