|
@@ -41,12 +41,9 @@ import (
|
|
|
"github.com/ethereum/go-ethereum/metrics"
|
|
"github.com/ethereum/go-ethereum/metrics"
|
|
|
"github.com/ethereum/go-ethereum/swarm/api"
|
|
"github.com/ethereum/go-ethereum/swarm/api"
|
|
|
"github.com/ethereum/go-ethereum/swarm/log"
|
|
"github.com/ethereum/go-ethereum/swarm/log"
|
|
|
- "github.com/ethereum/go-ethereum/swarm/spancontext"
|
|
|
|
|
"github.com/ethereum/go-ethereum/swarm/storage"
|
|
"github.com/ethereum/go-ethereum/swarm/storage"
|
|
|
"github.com/ethereum/go-ethereum/swarm/storage/mru"
|
|
"github.com/ethereum/go-ethereum/swarm/storage/mru"
|
|
|
- opentracing "github.com/opentracing/opentracing-go"
|
|
|
|
|
|
|
|
|
|
- "github.com/pborman/uuid"
|
|
|
|
|
"github.com/rs/cors"
|
|
"github.com/rs/cors"
|
|
|
)
|
|
)
|
|
|
|
|
|
|
@@ -72,6 +69,17 @@ var (
|
|
|
getListFail = metrics.NewRegisteredCounter("api.http.get.list.fail", nil)
|
|
getListFail = metrics.NewRegisteredCounter("api.http.get.list.fail", nil)
|
|
|
)
|
|
)
|
|
|
|
|
|
|
|
|
|
+type methodHandler map[string]http.Handler
|
|
|
|
|
+
|
|
|
|
|
+func (m methodHandler) ServeHTTP(rw http.ResponseWriter, r *http.Request) {
|
|
|
|
|
+ v, ok := m[r.Method]
|
|
|
|
|
+ if ok {
|
|
|
|
|
+ v.ServeHTTP(rw, r)
|
|
|
|
|
+ return
|
|
|
|
|
+ }
|
|
|
|
|
+ rw.WriteHeader(http.StatusMethodNotAllowed)
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
func NewServer(api *api.API, corsString string) *Server {
|
|
func NewServer(api *api.API, corsString string) *Server {
|
|
|
var allowedOrigins []string
|
|
var allowedOrigins []string
|
|
|
for _, domain := range strings.Split(corsString, ",") {
|
|
for _, domain := range strings.Split(corsString, ",") {
|
|
@@ -84,20 +92,79 @@ func NewServer(api *api.API, corsString string) *Server {
|
|
|
AllowedHeaders: []string{"*"},
|
|
AllowedHeaders: []string{"*"},
|
|
|
})
|
|
})
|
|
|
|
|
|
|
|
- mux := http.NewServeMux()
|
|
|
|
|
server := &Server{api: api}
|
|
server := &Server{api: api}
|
|
|
- mux.HandleFunc("/bzz:/", server.WrapHandler(true, server.HandleBzz))
|
|
|
|
|
- mux.HandleFunc("/bzz-raw:/", server.WrapHandler(true, server.HandleBzzRaw))
|
|
|
|
|
- mux.HandleFunc("/bzz-immutable:/", server.WrapHandler(true, server.HandleBzzImmutable))
|
|
|
|
|
- mux.HandleFunc("/bzz-hash:/", server.WrapHandler(true, server.HandleBzzHash))
|
|
|
|
|
- mux.HandleFunc("/bzz-list:/", server.WrapHandler(true, server.HandleBzzList))
|
|
|
|
|
- mux.HandleFunc("/bzz-resource:/", server.WrapHandler(true, server.HandleBzzResource))
|
|
|
|
|
|
|
|
|
|
- mux.HandleFunc("/", server.WrapHandler(false, server.HandleRootPaths))
|
|
|
|
|
- mux.HandleFunc("/robots.txt", server.WrapHandler(false, server.HandleRootPaths))
|
|
|
|
|
- mux.HandleFunc("/favicon.ico", server.WrapHandler(false, server.HandleRootPaths))
|
|
|
|
|
|
|
+ defaultMiddlewares := []Adapter{
|
|
|
|
|
+ RecoverPanic,
|
|
|
|
|
+ SetRequestID,
|
|
|
|
|
+ InitLoggingResponseWriter,
|
|
|
|
|
+ ParseURI,
|
|
|
|
|
+ InstrumentOpenTracing,
|
|
|
|
|
+ }
|
|
|
|
|
|
|
|
|
|
+ mux := http.NewServeMux()
|
|
|
|
|
+ mux.Handle("/bzz:/", methodHandler{
|
|
|
|
|
+ "GET": Adapt(
|
|
|
|
|
+ http.HandlerFunc(server.HandleBzzGet),
|
|
|
|
|
+ defaultMiddlewares...,
|
|
|
|
|
+ ),
|
|
|
|
|
+ "POST": Adapt(
|
|
|
|
|
+ http.HandlerFunc(server.HandlePostFiles),
|
|
|
|
|
+ defaultMiddlewares...,
|
|
|
|
|
+ ),
|
|
|
|
|
+ "DELETE": Adapt(
|
|
|
|
|
+ http.HandlerFunc(server.HandleDelete),
|
|
|
|
|
+ defaultMiddlewares...,
|
|
|
|
|
+ ),
|
|
|
|
|
+ })
|
|
|
|
|
+ mux.Handle("/bzz-raw:/", methodHandler{
|
|
|
|
|
+ "GET": Adapt(
|
|
|
|
|
+ http.HandlerFunc(server.HandleGet),
|
|
|
|
|
+ defaultMiddlewares...,
|
|
|
|
|
+ ),
|
|
|
|
|
+ "POST": Adapt(
|
|
|
|
|
+ http.HandlerFunc(server.HandlePostRaw),
|
|
|
|
|
+ defaultMiddlewares...,
|
|
|
|
|
+ ),
|
|
|
|
|
+ })
|
|
|
|
|
+ mux.Handle("/bzz-immutable:/", methodHandler{
|
|
|
|
|
+ "GET": Adapt(
|
|
|
|
|
+ http.HandlerFunc(server.HandleGet),
|
|
|
|
|
+ defaultMiddlewares...,
|
|
|
|
|
+ ),
|
|
|
|
|
+ })
|
|
|
|
|
+ mux.Handle("/bzz-hash:/", methodHandler{
|
|
|
|
|
+ "GET": Adapt(
|
|
|
|
|
+ http.HandlerFunc(server.HandleGet),
|
|
|
|
|
+ defaultMiddlewares...,
|
|
|
|
|
+ ),
|
|
|
|
|
+ })
|
|
|
|
|
+ mux.Handle("/bzz-list:/", methodHandler{
|
|
|
|
|
+ "GET": Adapt(
|
|
|
|
|
+ http.HandlerFunc(server.HandleGetList),
|
|
|
|
|
+ defaultMiddlewares...,
|
|
|
|
|
+ ),
|
|
|
|
|
+ })
|
|
|
|
|
+ mux.Handle("/bzz-resource:/", methodHandler{
|
|
|
|
|
+ "GET": Adapt(
|
|
|
|
|
+ http.HandlerFunc(server.HandleGetResource),
|
|
|
|
|
+ defaultMiddlewares...,
|
|
|
|
|
+ ),
|
|
|
|
|
+ "POST": Adapt(
|
|
|
|
|
+ http.HandlerFunc(server.HandlePostResource),
|
|
|
|
|
+ defaultMiddlewares...,
|
|
|
|
|
+ ),
|
|
|
|
|
+ })
|
|
|
|
|
+
|
|
|
|
|
+ mux.Handle("/", methodHandler{
|
|
|
|
|
+ "GET": Adapt(
|
|
|
|
|
+ http.HandlerFunc(server.HandleRootPaths),
|
|
|
|
|
+ SetRequestID,
|
|
|
|
|
+ InitLoggingResponseWriter,
|
|
|
|
|
+ ),
|
|
|
|
|
+ })
|
|
|
server.Handler = c.Handler(mux)
|
|
server.Handler = c.Handler(mux)
|
|
|
|
|
+
|
|
|
return server
|
|
return server
|
|
|
}
|
|
}
|
|
|
|
|
|
|
@@ -105,139 +172,6 @@ func (s *Server) ListenAndServe(addr string) error {
|
|
|
return http.ListenAndServe(addr, s)
|
|
return http.ListenAndServe(addr, s)
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
-func (s *Server) HandleRootPaths(w http.ResponseWriter, r *Request) {
|
|
|
|
|
- switch r.Method {
|
|
|
|
|
- case http.MethodGet:
|
|
|
|
|
- if r.RequestURI == "/" {
|
|
|
|
|
- if strings.Contains(r.Header.Get("Accept"), "text/html") {
|
|
|
|
|
- err := landingPageTemplate.Execute(w, nil)
|
|
|
|
|
- if err != nil {
|
|
|
|
|
- log.Error(fmt.Sprintf("error rendering landing page: %s", err))
|
|
|
|
|
- }
|
|
|
|
|
- return
|
|
|
|
|
- }
|
|
|
|
|
- if strings.Contains(r.Header.Get("Accept"), "application/json") {
|
|
|
|
|
- w.Header().Set("Content-Type", "application/json")
|
|
|
|
|
- w.WriteHeader(http.StatusOK)
|
|
|
|
|
- json.NewEncoder(w).Encode("Welcome to Swarm!")
|
|
|
|
|
- return
|
|
|
|
|
- }
|
|
|
|
|
- }
|
|
|
|
|
-
|
|
|
|
|
- if r.URL.Path == "/robots.txt" {
|
|
|
|
|
- w.Header().Set("Last-Modified", time.Now().Format(http.TimeFormat))
|
|
|
|
|
- fmt.Fprintf(w, "User-agent: *\nDisallow: /")
|
|
|
|
|
- return
|
|
|
|
|
- }
|
|
|
|
|
- Respond(w, r, "Bad Request", http.StatusBadRequest)
|
|
|
|
|
- default:
|
|
|
|
|
- Respond(w, r, "Not Found", http.StatusNotFound)
|
|
|
|
|
- }
|
|
|
|
|
-}
|
|
|
|
|
-
|
|
|
|
|
-func (s *Server) HandleBzz(w http.ResponseWriter, r *Request) {
|
|
|
|
|
- switch r.Method {
|
|
|
|
|
- case http.MethodGet:
|
|
|
|
|
- log.Debug("handleGetBzz")
|
|
|
|
|
- if r.Header.Get("Accept") == "application/x-tar" {
|
|
|
|
|
- reader, err := s.api.GetDirectoryTar(r.Context(), r.uri)
|
|
|
|
|
- if err != nil {
|
|
|
|
|
- Respond(w, r, fmt.Sprintf("Had an error building the tarball: %v", err), http.StatusInternalServerError)
|
|
|
|
|
- }
|
|
|
|
|
- defer reader.Close()
|
|
|
|
|
-
|
|
|
|
|
- w.Header().Set("Content-Type", "application/x-tar")
|
|
|
|
|
- w.WriteHeader(http.StatusOK)
|
|
|
|
|
- io.Copy(w, reader)
|
|
|
|
|
- return
|
|
|
|
|
- }
|
|
|
|
|
- s.HandleGetFile(w, r)
|
|
|
|
|
- case http.MethodPost:
|
|
|
|
|
- log.Debug("handlePostFiles")
|
|
|
|
|
- s.HandlePostFiles(w, r)
|
|
|
|
|
- case http.MethodDelete:
|
|
|
|
|
- log.Debug("handleBzzDelete")
|
|
|
|
|
- s.HandleDelete(w, r)
|
|
|
|
|
- default:
|
|
|
|
|
- Respond(w, r, "Method not allowed", http.StatusMethodNotAllowed)
|
|
|
|
|
- }
|
|
|
|
|
-}
|
|
|
|
|
-func (s *Server) HandleBzzRaw(w http.ResponseWriter, r *Request) {
|
|
|
|
|
- switch r.Method {
|
|
|
|
|
- case http.MethodGet:
|
|
|
|
|
- log.Debug("handleGetRaw")
|
|
|
|
|
- s.HandleGet(w, r)
|
|
|
|
|
- case http.MethodPost:
|
|
|
|
|
- log.Debug("handlePostRaw")
|
|
|
|
|
- s.HandlePostRaw(w, r)
|
|
|
|
|
- default:
|
|
|
|
|
- Respond(w, r, "Method not allowed", http.StatusMethodNotAllowed)
|
|
|
|
|
- }
|
|
|
|
|
-}
|
|
|
|
|
-func (s *Server) HandleBzzImmutable(w http.ResponseWriter, r *Request) {
|
|
|
|
|
- switch r.Method {
|
|
|
|
|
- case http.MethodGet:
|
|
|
|
|
- log.Debug("handleGetHash")
|
|
|
|
|
- s.HandleGetList(w, r)
|
|
|
|
|
- default:
|
|
|
|
|
- Respond(w, r, "Method not allowed", http.StatusMethodNotAllowed)
|
|
|
|
|
- }
|
|
|
|
|
-}
|
|
|
|
|
-func (s *Server) HandleBzzHash(w http.ResponseWriter, r *Request) {
|
|
|
|
|
- switch r.Method {
|
|
|
|
|
- case http.MethodGet:
|
|
|
|
|
- log.Debug("handleGetHash")
|
|
|
|
|
- s.HandleGet(w, r)
|
|
|
|
|
- default:
|
|
|
|
|
- Respond(w, r, "Method not allowed", http.StatusMethodNotAllowed)
|
|
|
|
|
- }
|
|
|
|
|
-}
|
|
|
|
|
-func (s *Server) HandleBzzList(w http.ResponseWriter, r *Request) {
|
|
|
|
|
- switch r.Method {
|
|
|
|
|
- case http.MethodGet:
|
|
|
|
|
- log.Debug("handleGetHash")
|
|
|
|
|
- s.HandleGetList(w, r)
|
|
|
|
|
- default:
|
|
|
|
|
- Respond(w, r, "Method not allowed", http.StatusMethodNotAllowed)
|
|
|
|
|
- }
|
|
|
|
|
-}
|
|
|
|
|
-func (s *Server) HandleBzzResource(w http.ResponseWriter, r *Request) {
|
|
|
|
|
- switch r.Method {
|
|
|
|
|
- case http.MethodGet:
|
|
|
|
|
- log.Debug("handleGetResource")
|
|
|
|
|
- s.HandleGetResource(w, r)
|
|
|
|
|
- case http.MethodPost:
|
|
|
|
|
- log.Debug("handlePostResource")
|
|
|
|
|
- s.HandlePostResource(w, r)
|
|
|
|
|
- default:
|
|
|
|
|
- Respond(w, r, "Method not allowed", http.StatusMethodNotAllowed)
|
|
|
|
|
- }
|
|
|
|
|
-}
|
|
|
|
|
-func (s *Server) WrapHandler(parseBzzUri bool, h func(http.ResponseWriter, *Request)) http.HandlerFunc {
|
|
|
|
|
- return http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
|
|
|
|
- defer metrics.GetOrRegisterResettingTimer(fmt.Sprintf("http.request.%s.time", r.Method), nil).UpdateSince(time.Now())
|
|
|
|
|
- req := &Request{Request: *r, ruid: uuid.New()[:8]}
|
|
|
|
|
- metrics.GetOrRegisterCounter(fmt.Sprintf("http.request.%s", r.Method), nil).Inc(1)
|
|
|
|
|
- log.Info("serving request", "ruid", req.ruid, "method", r.Method, "url", r.RequestURI)
|
|
|
|
|
-
|
|
|
|
|
- // wrapping the ResponseWriter, so that we get the response code set by http.ServeContent
|
|
|
|
|
- w := newLoggingResponseWriter(rw)
|
|
|
|
|
- if parseBzzUri {
|
|
|
|
|
- uri, err := api.Parse(strings.TrimLeft(r.URL.Path, "/"))
|
|
|
|
|
- if err != nil {
|
|
|
|
|
- Respond(w, req, fmt.Sprintf("invalid URI %q", r.URL.Path), http.StatusBadRequest)
|
|
|
|
|
- return
|
|
|
|
|
- }
|
|
|
|
|
- req.uri = uri
|
|
|
|
|
-
|
|
|
|
|
- log.Debug("parsed request path", "ruid", req.ruid, "method", req.Method, "uri.Addr", req.uri.Addr, "uri.Path", req.uri.Path, "uri.Scheme", req.uri.Scheme)
|
|
|
|
|
- }
|
|
|
|
|
-
|
|
|
|
|
- h(w, req) // call original
|
|
|
|
|
- log.Info("served response", "ruid", req.ruid, "code", w.statusCode)
|
|
|
|
|
- })
|
|
|
|
|
-}
|
|
|
|
|
-
|
|
|
|
|
// browser API for registering bzz url scheme handlers:
|
|
// browser API for registering bzz url scheme handlers:
|
|
|
// https://developer.mozilla.org/en/docs/Web-based_protocol_handlers
|
|
// https://developer.mozilla.org/en/docs/Web-based_protocol_handlers
|
|
|
// electron (chromium) api for registering bzz url scheme handlers:
|
|
// electron (chromium) api for registering bzz url scheme handlers:
|
|
@@ -247,59 +181,81 @@ type Server struct {
|
|
|
api *api.API
|
|
api *api.API
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
-// Request wraps http.Request and also includes the parsed bzz URI
|
|
|
|
|
-type Request struct {
|
|
|
|
|
- http.Request
|
|
|
|
|
|
|
+func (s *Server) HandleBzzGet(w http.ResponseWriter, r *http.Request) {
|
|
|
|
|
+ log.Debug("handleBzzGet", "ruid", GetRUID(r.Context()))
|
|
|
|
|
+ if r.Header.Get("Accept") == "application/x-tar" {
|
|
|
|
|
+ uri := GetURI(r.Context())
|
|
|
|
|
+ reader, err := s.api.GetDirectoryTar(r.Context(), uri)
|
|
|
|
|
+ if err != nil {
|
|
|
|
|
+ RespondError(w, r, fmt.Sprintf("Had an error building the tarball: %v", err), http.StatusInternalServerError)
|
|
|
|
|
+ }
|
|
|
|
|
+ defer reader.Close()
|
|
|
|
|
+
|
|
|
|
|
+ w.Header().Set("Content-Type", "application/x-tar")
|
|
|
|
|
+ w.WriteHeader(http.StatusOK)
|
|
|
|
|
+ io.Copy(w, reader)
|
|
|
|
|
+ return
|
|
|
|
|
+ }
|
|
|
|
|
+
|
|
|
|
|
+ s.HandleGetFile(w, r)
|
|
|
|
|
+}
|
|
|
|
|
|
|
|
- uri *api.URI
|
|
|
|
|
- ruid string // request unique id
|
|
|
|
|
|
|
+func (s *Server) HandleRootPaths(w http.ResponseWriter, r *http.Request) {
|
|
|
|
|
+ switch r.RequestURI {
|
|
|
|
|
+ case "/":
|
|
|
|
|
+ RespondTemplate(w, r, "landing-page", "Swarm: Please request a valid ENS or swarm hash with the appropriate bzz scheme", 200)
|
|
|
|
|
+ return
|
|
|
|
|
+ case "/robots.txt":
|
|
|
|
|
+ w.Header().Set("Last-Modified", time.Now().Format(http.TimeFormat))
|
|
|
|
|
+ fmt.Fprintf(w, "User-agent: *\nDisallow: /")
|
|
|
|
|
+ case "/favicon.ico":
|
|
|
|
|
+ w.WriteHeader(http.StatusOK)
|
|
|
|
|
+ w.Write(faviconBytes)
|
|
|
|
|
+ default:
|
|
|
|
|
+ RespondError(w, r, "Not Found", http.StatusNotFound)
|
|
|
|
|
+ }
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
// HandlePostRaw handles a POST request to a raw bzz-raw:/ URI, stores the request
|
|
// HandlePostRaw handles a POST request to a raw bzz-raw:/ URI, stores the request
|
|
|
// body in swarm and returns the resulting storage address as a text/plain response
|
|
// body in swarm and returns the resulting storage address as a text/plain response
|
|
|
-func (s *Server) HandlePostRaw(w http.ResponseWriter, r *Request) {
|
|
|
|
|
- log.Debug("handle.post.raw", "ruid", r.ruid)
|
|
|
|
|
|
|
+func (s *Server) HandlePostRaw(w http.ResponseWriter, r *http.Request) {
|
|
|
|
|
+ ruid := GetRUID(r.Context())
|
|
|
|
|
+ log.Debug("handle.post.raw", "ruid", ruid)
|
|
|
|
|
|
|
|
postRawCount.Inc(1)
|
|
postRawCount.Inc(1)
|
|
|
|
|
|
|
|
- ctx := r.Context()
|
|
|
|
|
- var sp opentracing.Span
|
|
|
|
|
- ctx, sp = spancontext.StartSpan(
|
|
|
|
|
- ctx,
|
|
|
|
|
- "http.post.raw")
|
|
|
|
|
- defer sp.Finish()
|
|
|
|
|
-
|
|
|
|
|
toEncrypt := false
|
|
toEncrypt := false
|
|
|
- if r.uri.Addr == "encrypt" {
|
|
|
|
|
|
|
+ uri := GetURI(r.Context())
|
|
|
|
|
+ if uri.Addr == "encrypt" {
|
|
|
toEncrypt = true
|
|
toEncrypt = true
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
- if r.uri.Path != "" {
|
|
|
|
|
|
|
+ if uri.Path != "" {
|
|
|
postRawFail.Inc(1)
|
|
postRawFail.Inc(1)
|
|
|
- Respond(w, r, "raw POST request cannot contain a path", http.StatusBadRequest)
|
|
|
|
|
|
|
+ RespondError(w, r, "raw POST request cannot contain a path", http.StatusBadRequest)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
- if r.uri.Addr != "" && r.uri.Addr != "encrypt" {
|
|
|
|
|
|
|
+ if uri.Addr != "" && uri.Addr != "encrypt" {
|
|
|
postRawFail.Inc(1)
|
|
postRawFail.Inc(1)
|
|
|
- Respond(w, r, "raw POST request addr can only be empty or \"encrypt\"", http.StatusBadRequest)
|
|
|
|
|
|
|
+ RespondError(w, r, "raw POST request addr can only be empty or \"encrypt\"", http.StatusBadRequest)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
if r.Header.Get("Content-Length") == "" {
|
|
if r.Header.Get("Content-Length") == "" {
|
|
|
postRawFail.Inc(1)
|
|
postRawFail.Inc(1)
|
|
|
- Respond(w, r, "missing Content-Length header in request", http.StatusBadRequest)
|
|
|
|
|
|
|
+ RespondError(w, r, "missing Content-Length header in request", http.StatusBadRequest)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
- addr, _, err := s.api.Store(ctx, r.Body, r.ContentLength, toEncrypt)
|
|
|
|
|
|
|
+ addr, _, err := s.api.Store(r.Context(), r.Body, r.ContentLength, toEncrypt)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
postRawFail.Inc(1)
|
|
postRawFail.Inc(1)
|
|
|
- Respond(w, r, err.Error(), http.StatusInternalServerError)
|
|
|
|
|
|
|
+ RespondError(w, r, err.Error(), http.StatusInternalServerError)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
- log.Debug("stored content", "ruid", r.ruid, "key", addr)
|
|
|
|
|
|
|
+ log.Debug("stored content", "ruid", ruid, "key", addr)
|
|
|
|
|
|
|
|
w.Header().Set("Content-Type", "text/plain")
|
|
w.Header().Set("Content-Type", "text/plain")
|
|
|
w.WriteHeader(http.StatusOK)
|
|
w.WriteHeader(http.StatusOK)
|
|
@@ -311,55 +267,49 @@ func (s *Server) HandlePostRaw(w http.ResponseWriter, r *Request) {
|
|
|
// (either a tar archive or multipart form), adds those files either to an
|
|
// (either a tar archive or multipart form), adds those files either to an
|
|
|
// existing manifest or to a new manifest under <path> and returns the
|
|
// existing manifest or to a new manifest under <path> and returns the
|
|
|
// resulting manifest hash as a text/plain response
|
|
// resulting manifest hash as a text/plain response
|
|
|
-func (s *Server) HandlePostFiles(w http.ResponseWriter, r *Request) {
|
|
|
|
|
- log.Debug("handle.post.files", "ruid", r.ruid)
|
|
|
|
|
|
|
+func (s *Server) HandlePostFiles(w http.ResponseWriter, r *http.Request) {
|
|
|
|
|
+ ruid := GetRUID(r.Context())
|
|
|
|
|
+ log.Debug("handle.post.files", "ruid", ruid)
|
|
|
postFilesCount.Inc(1)
|
|
postFilesCount.Inc(1)
|
|
|
|
|
|
|
|
- var sp opentracing.Span
|
|
|
|
|
- ctx := r.Context()
|
|
|
|
|
- ctx, sp = spancontext.StartSpan(
|
|
|
|
|
- ctx,
|
|
|
|
|
- "http.post.files")
|
|
|
|
|
- defer sp.Finish()
|
|
|
|
|
-
|
|
|
|
|
contentType, params, err := mime.ParseMediaType(r.Header.Get("Content-Type"))
|
|
contentType, params, err := mime.ParseMediaType(r.Header.Get("Content-Type"))
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
postFilesFail.Inc(1)
|
|
postFilesFail.Inc(1)
|
|
|
- Respond(w, r, err.Error(), http.StatusBadRequest)
|
|
|
|
|
|
|
+ RespondError(w, r, err.Error(), http.StatusBadRequest)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
toEncrypt := false
|
|
toEncrypt := false
|
|
|
- if r.uri.Addr == "encrypt" {
|
|
|
|
|
|
|
+ uri := GetURI(r.Context())
|
|
|
|
|
+ if uri.Addr == "encrypt" {
|
|
|
toEncrypt = true
|
|
toEncrypt = true
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
var addr storage.Address
|
|
var addr storage.Address
|
|
|
- if r.uri.Addr != "" && r.uri.Addr != "encrypt" {
|
|
|
|
|
- addr, err = s.api.Resolve(r.Context(), r.uri)
|
|
|
|
|
|
|
+ if uri.Addr != "" && uri.Addr != "encrypt" {
|
|
|
|
|
+ addr, err = s.api.Resolve(r.Context(), uri)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
postFilesFail.Inc(1)
|
|
postFilesFail.Inc(1)
|
|
|
- Respond(w, r, fmt.Sprintf("cannot resolve %s: %s", r.uri.Addr, err), http.StatusInternalServerError)
|
|
|
|
|
|
|
+ RespondError(w, r, fmt.Sprintf("cannot resolve %s: %s", uri.Addr, err), http.StatusInternalServerError)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
- log.Debug("resolved key", "ruid", r.ruid, "key", addr)
|
|
|
|
|
|
|
+ log.Debug("resolved key", "ruid", ruid, "key", addr)
|
|
|
} else {
|
|
} else {
|
|
|
addr, err = s.api.NewManifest(r.Context(), toEncrypt)
|
|
addr, err = s.api.NewManifest(r.Context(), toEncrypt)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
postFilesFail.Inc(1)
|
|
postFilesFail.Inc(1)
|
|
|
- Respond(w, r, err.Error(), http.StatusInternalServerError)
|
|
|
|
|
|
|
+ RespondError(w, r, err.Error(), http.StatusInternalServerError)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
- log.Debug("new manifest", "ruid", r.ruid, "key", addr)
|
|
|
|
|
|
|
+ log.Debug("new manifest", "ruid", ruid, "key", addr)
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
- newAddr, err := s.api.UpdateManifest(ctx, addr, func(mw *api.ManifestWriter) error {
|
|
|
|
|
|
|
+ newAddr, err := s.api.UpdateManifest(r.Context(), addr, func(mw *api.ManifestWriter) error {
|
|
|
switch contentType {
|
|
switch contentType {
|
|
|
-
|
|
|
|
|
case "application/x-tar":
|
|
case "application/x-tar":
|
|
|
_, err := s.handleTarUpload(r, mw)
|
|
_, err := s.handleTarUpload(r, mw)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
- Respond(w, r, fmt.Sprintf("error uploading tarball: %v", err), http.StatusInternalServerError)
|
|
|
|
|
|
|
+ RespondError(w, r, fmt.Sprintf("error uploading tarball: %v", err), http.StatusInternalServerError)
|
|
|
return err
|
|
return err
|
|
|
}
|
|
}
|
|
|
return nil
|
|
return nil
|
|
@@ -372,30 +322,31 @@ func (s *Server) HandlePostFiles(w http.ResponseWriter, r *Request) {
|
|
|
})
|
|
})
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
postFilesFail.Inc(1)
|
|
postFilesFail.Inc(1)
|
|
|
- Respond(w, r, fmt.Sprintf("cannot create manifest: %s", err), http.StatusInternalServerError)
|
|
|
|
|
|
|
+ RespondError(w, r, fmt.Sprintf("cannot create manifest: %s", err), http.StatusInternalServerError)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
- log.Debug("stored content", "ruid", r.ruid, "key", newAddr)
|
|
|
|
|
|
|
+ log.Debug("stored content", "ruid", ruid, "key", newAddr)
|
|
|
|
|
|
|
|
w.Header().Set("Content-Type", "text/plain")
|
|
w.Header().Set("Content-Type", "text/plain")
|
|
|
w.WriteHeader(http.StatusOK)
|
|
w.WriteHeader(http.StatusOK)
|
|
|
fmt.Fprint(w, newAddr)
|
|
fmt.Fprint(w, newAddr)
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
-func (s *Server) handleTarUpload(r *Request, mw *api.ManifestWriter) (storage.Address, error) {
|
|
|
|
|
- log.Debug("handle.tar.upload", "ruid", r.ruid)
|
|
|
|
|
|
|
+func (s *Server) handleTarUpload(r *http.Request, mw *api.ManifestWriter) (storage.Address, error) {
|
|
|
|
|
+ log.Debug("handle.tar.upload", "ruid", GetRUID(r.Context()))
|
|
|
|
|
|
|
|
- key, err := s.api.UploadTar(r.Context(), r.Body, r.uri.Path, mw)
|
|
|
|
|
|
|
+ key, err := s.api.UploadTar(r.Context(), r.Body, GetURI(r.Context()).Path, mw)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
return nil, err
|
|
return nil, err
|
|
|
}
|
|
}
|
|
|
return key, nil
|
|
return key, nil
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
-func (s *Server) handleMultipartUpload(req *Request, boundary string, mw *api.ManifestWriter) error {
|
|
|
|
|
- log.Debug("handle.multipart.upload", "ruid", req.ruid)
|
|
|
|
|
- mr := multipart.NewReader(req.Body, boundary)
|
|
|
|
|
|
|
+func (s *Server) handleMultipartUpload(r *http.Request, boundary string, mw *api.ManifestWriter) error {
|
|
|
|
|
+ ruid := GetRUID(r.Context())
|
|
|
|
|
+ log.Debug("handle.multipart.upload", "ruid", ruid)
|
|
|
|
|
+ mr := multipart.NewReader(r.Body, boundary)
|
|
|
for {
|
|
for {
|
|
|
part, err := mr.NextPart()
|
|
part, err := mr.NextPart()
|
|
|
if err == io.EOF {
|
|
if err == io.EOF {
|
|
@@ -435,48 +386,52 @@ func (s *Server) handleMultipartUpload(req *Request, boundary string, mw *api.Ma
|
|
|
if name == "" {
|
|
if name == "" {
|
|
|
name = part.FormName()
|
|
name = part.FormName()
|
|
|
}
|
|
}
|
|
|
- path := path.Join(req.uri.Path, name)
|
|
|
|
|
|
|
+ uri := GetURI(r.Context())
|
|
|
|
|
+ path := path.Join(uri.Path, name)
|
|
|
entry := &api.ManifestEntry{
|
|
entry := &api.ManifestEntry{
|
|
|
Path: path,
|
|
Path: path,
|
|
|
ContentType: part.Header.Get("Content-Type"),
|
|
ContentType: part.Header.Get("Content-Type"),
|
|
|
Size: size,
|
|
Size: size,
|
|
|
ModTime: time.Now(),
|
|
ModTime: time.Now(),
|
|
|
}
|
|
}
|
|
|
- log.Debug("adding path to new manifest", "ruid", req.ruid, "bytes", entry.Size, "path", entry.Path)
|
|
|
|
|
- contentKey, err := mw.AddEntry(req.Context(), reader, entry)
|
|
|
|
|
|
|
+ log.Debug("adding path to new manifest", "ruid", ruid, "bytes", entry.Size, "path", entry.Path)
|
|
|
|
|
+ contentKey, err := mw.AddEntry(r.Context(), reader, entry)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
return fmt.Errorf("error adding manifest entry from multipart form: %s", err)
|
|
return fmt.Errorf("error adding manifest entry from multipart form: %s", err)
|
|
|
}
|
|
}
|
|
|
- log.Debug("stored content", "ruid", req.ruid, "key", contentKey)
|
|
|
|
|
|
|
+ log.Debug("stored content", "ruid", ruid, "key", contentKey)
|
|
|
}
|
|
}
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
-func (s *Server) handleDirectUpload(req *Request, mw *api.ManifestWriter) error {
|
|
|
|
|
- log.Debug("handle.direct.upload", "ruid", req.ruid)
|
|
|
|
|
- key, err := mw.AddEntry(req.Context(), req.Body, &api.ManifestEntry{
|
|
|
|
|
- Path: req.uri.Path,
|
|
|
|
|
- ContentType: req.Header.Get("Content-Type"),
|
|
|
|
|
|
|
+func (s *Server) handleDirectUpload(r *http.Request, mw *api.ManifestWriter) error {
|
|
|
|
|
+ ruid := GetRUID(r.Context())
|
|
|
|
|
+ log.Debug("handle.direct.upload", "ruid", ruid)
|
|
|
|
|
+ key, err := mw.AddEntry(r.Context(), r.Body, &api.ManifestEntry{
|
|
|
|
|
+ Path: GetURI(r.Context()).Path,
|
|
|
|
|
+ ContentType: r.Header.Get("Content-Type"),
|
|
|
Mode: 0644,
|
|
Mode: 0644,
|
|
|
- Size: req.ContentLength,
|
|
|
|
|
|
|
+ Size: r.ContentLength,
|
|
|
ModTime: time.Now(),
|
|
ModTime: time.Now(),
|
|
|
})
|
|
})
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
return err
|
|
return err
|
|
|
}
|
|
}
|
|
|
- log.Debug("stored content", "ruid", req.ruid, "key", key)
|
|
|
|
|
|
|
+ log.Debug("stored content", "ruid", ruid, "key", key)
|
|
|
return nil
|
|
return nil
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
// HandleDelete handles a DELETE request to bzz:/<manifest>/<path>, removes
|
|
// HandleDelete handles a DELETE request to bzz:/<manifest>/<path>, removes
|
|
|
// <path> from <manifest> and returns the resulting manifest hash as a
|
|
// <path> from <manifest> and returns the resulting manifest hash as a
|
|
|
// text/plain response
|
|
// text/plain response
|
|
|
-func (s *Server) HandleDelete(w http.ResponseWriter, r *Request) {
|
|
|
|
|
- log.Debug("handle.delete", "ruid", r.ruid)
|
|
|
|
|
|
|
+func (s *Server) HandleDelete(w http.ResponseWriter, r *http.Request) {
|
|
|
|
|
+ ruid := GetRUID(r.Context())
|
|
|
|
|
+ uri := GetURI(r.Context())
|
|
|
|
|
+ log.Debug("handle.delete", "ruid", ruid)
|
|
|
deleteCount.Inc(1)
|
|
deleteCount.Inc(1)
|
|
|
- newKey, err := s.api.Delete(r.Context(), r.uri.Addr, r.uri.Path)
|
|
|
|
|
|
|
+ newKey, err := s.api.Delete(r.Context(), uri.Addr, uri.Path)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
deleteFail.Inc(1)
|
|
deleteFail.Inc(1)
|
|
|
- Respond(w, r, fmt.Sprintf("could not delete from manifest: %v", err), http.StatusInternalServerError)
|
|
|
|
|
|
|
+ RespondError(w, r, fmt.Sprintf("could not delete from manifest: %v", err), http.StatusInternalServerError)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
|
|
|
|
@@ -519,27 +474,20 @@ func resourcePostMode(path string) (isRaw bool, frequency uint64, err error) {
|
|
|
//
|
|
//
|
|
|
// The POST request admits a JSON structure as defined in the mru package: `mru.updateRequestJSON`
|
|
// The POST request admits a JSON structure as defined in the mru package: `mru.updateRequestJSON`
|
|
|
// The requests can be to a) create a resource, b) update a resource or c) both a+b: create a resource and set the initial content
|
|
// The requests can be to a) create a resource, b) update a resource or c) both a+b: create a resource and set the initial content
|
|
|
-func (s *Server) HandlePostResource(w http.ResponseWriter, r *Request) {
|
|
|
|
|
- log.Debug("handle.post.resource", "ruid", r.ruid)
|
|
|
|
|
-
|
|
|
|
|
- var sp opentracing.Span
|
|
|
|
|
- ctx := r.Context()
|
|
|
|
|
- ctx, sp = spancontext.StartSpan(
|
|
|
|
|
- ctx,
|
|
|
|
|
- "http.post.resource")
|
|
|
|
|
- defer sp.Finish()
|
|
|
|
|
-
|
|
|
|
|
|
|
+func (s *Server) HandlePostResource(w http.ResponseWriter, r *http.Request) {
|
|
|
|
|
+ ruid := GetRUID(r.Context())
|
|
|
|
|
+ log.Debug("handle.post.resource", "ruid", ruid)
|
|
|
var err error
|
|
var err error
|
|
|
|
|
|
|
|
// Creation and update must send mru.updateRequestJSON JSON structure
|
|
// Creation and update must send mru.updateRequestJSON JSON structure
|
|
|
body, err := ioutil.ReadAll(r.Body)
|
|
body, err := ioutil.ReadAll(r.Body)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
- Respond(w, r, err.Error(), http.StatusInternalServerError)
|
|
|
|
|
|
|
+ RespondError(w, r, err.Error(), http.StatusInternalServerError)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
var updateRequest mru.Request
|
|
var updateRequest mru.Request
|
|
|
if err := updateRequest.UnmarshalJSON(body); err != nil { // decodes request JSON
|
|
if err := updateRequest.UnmarshalJSON(body); err != nil { // decodes request JSON
|
|
|
- Respond(w, r, err.Error(), http.StatusBadRequest) //TODO: send different status response depending on error
|
|
|
|
|
|
|
+ RespondError(w, r, err.Error(), http.StatusBadRequest) //TODO: send different status response depending on error
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
|
|
|
|
@@ -548,7 +496,7 @@ func (s *Server) HandlePostResource(w http.ResponseWriter, r *Request) {
|
|
|
// to update this resource
|
|
// to update this resource
|
|
|
// Check this early, to avoid creating a resource and then not being able to set its first update.
|
|
// Check this early, to avoid creating a resource and then not being able to set its first update.
|
|
|
if err = updateRequest.Verify(); err != nil {
|
|
if err = updateRequest.Verify(); err != nil {
|
|
|
- Respond(w, r, err.Error(), http.StatusForbidden)
|
|
|
|
|
|
|
+ RespondError(w, r, err.Error(), http.StatusForbidden)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
}
|
|
}
|
|
@@ -557,7 +505,7 @@ func (s *Server) HandlePostResource(w http.ResponseWriter, r *Request) {
|
|
|
err = s.api.ResourceCreate(r.Context(), &updateRequest)
|
|
err = s.api.ResourceCreate(r.Context(), &updateRequest)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
code, err2 := s.translateResourceError(w, r, "resource creation fail", err)
|
|
code, err2 := s.translateResourceError(w, r, "resource creation fail", err)
|
|
|
- Respond(w, r, err2.Error(), code)
|
|
|
|
|
|
|
+ RespondError(w, r, err2.Error(), code)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
}
|
|
}
|
|
@@ -565,7 +513,7 @@ func (s *Server) HandlePostResource(w http.ResponseWriter, r *Request) {
|
|
|
if updateRequest.IsUpdate() {
|
|
if updateRequest.IsUpdate() {
|
|
|
_, err = s.api.ResourceUpdate(r.Context(), &updateRequest.SignedResourceUpdate)
|
|
_, err = s.api.ResourceUpdate(r.Context(), &updateRequest.SignedResourceUpdate)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
- Respond(w, r, err.Error(), http.StatusInternalServerError)
|
|
|
|
|
|
|
+ RespondError(w, r, err.Error(), http.StatusInternalServerError)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
}
|
|
}
|
|
@@ -579,7 +527,7 @@ func (s *Server) HandlePostResource(w http.ResponseWriter, r *Request) {
|
|
|
// metadata chunk (rootAddr)
|
|
// metadata chunk (rootAddr)
|
|
|
m, err := s.api.NewResourceManifest(r.Context(), updateRequest.RootAddr().Hex())
|
|
m, err := s.api.NewResourceManifest(r.Context(), updateRequest.RootAddr().Hex())
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
- Respond(w, r, fmt.Sprintf("failed to create resource manifest: %v", err), http.StatusInternalServerError)
|
|
|
|
|
|
|
+ RespondError(w, r, fmt.Sprintf("failed to create resource manifest: %v", err), http.StatusInternalServerError)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
|
|
|
|
@@ -589,7 +537,7 @@ func (s *Server) HandlePostResource(w http.ResponseWriter, r *Request) {
|
|
|
// \TODO update manifest key automatically in ENS
|
|
// \TODO update manifest key automatically in ENS
|
|
|
outdata, err := json.Marshal(m)
|
|
outdata, err := json.Marshal(m)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
- Respond(w, r, fmt.Sprintf("failed to create json response: %s", err), http.StatusInternalServerError)
|
|
|
|
|
|
|
+ RespondError(w, r, fmt.Sprintf("failed to create json response: %s", err), http.StatusInternalServerError)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
fmt.Fprint(w, string(outdata))
|
|
fmt.Fprint(w, string(outdata))
|
|
@@ -604,17 +552,19 @@ func (s *Server) HandlePostResource(w http.ResponseWriter, r *Request) {
|
|
|
// bzz-resource://<id>/meta - get metadata and next version information
|
|
// bzz-resource://<id>/meta - get metadata and next version information
|
|
|
// <id> = ens name or hash
|
|
// <id> = ens name or hash
|
|
|
// TODO: Enable pass maxPeriod parameter
|
|
// TODO: Enable pass maxPeriod parameter
|
|
|
-func (s *Server) HandleGetResource(w http.ResponseWriter, r *Request) {
|
|
|
|
|
- log.Debug("handle.get.resource", "ruid", r.ruid)
|
|
|
|
|
|
|
+func (s *Server) HandleGetResource(w http.ResponseWriter, r *http.Request) {
|
|
|
|
|
+ ruid := GetRUID(r.Context())
|
|
|
|
|
+ uri := GetURI(r.Context())
|
|
|
|
|
+ log.Debug("handle.get.resource", "ruid", ruid)
|
|
|
var err error
|
|
var err error
|
|
|
|
|
|
|
|
// resolve the content key.
|
|
// resolve the content key.
|
|
|
- manifestAddr := r.uri.Address()
|
|
|
|
|
|
|
+ manifestAddr := uri.Address()
|
|
|
if manifestAddr == nil {
|
|
if manifestAddr == nil {
|
|
|
- manifestAddr, err = s.api.Resolve(r.Context(), r.uri)
|
|
|
|
|
|
|
+ manifestAddr, err = s.api.Resolve(r.Context(), uri)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
getFail.Inc(1)
|
|
getFail.Inc(1)
|
|
|
- Respond(w, r, fmt.Sprintf("cannot resolve %s: %s", r.uri.Addr, err), http.StatusNotFound)
|
|
|
|
|
|
|
+ RespondError(w, r, fmt.Sprintf("cannot resolve %s: %s", uri.Addr, err), http.StatusNotFound)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
} else {
|
|
} else {
|
|
@@ -625,25 +575,25 @@ func (s *Server) HandleGetResource(w http.ResponseWriter, r *Request) {
|
|
|
rootAddr, err := s.api.ResolveResourceManifest(r.Context(), manifestAddr)
|
|
rootAddr, err := s.api.ResolveResourceManifest(r.Context(), manifestAddr)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
getFail.Inc(1)
|
|
getFail.Inc(1)
|
|
|
- Respond(w, r, fmt.Sprintf("error resolving resource root chunk for %s: %s", r.uri.Addr, err), http.StatusNotFound)
|
|
|
|
|
|
|
+ RespondError(w, r, fmt.Sprintf("error resolving resource root chunk for %s: %s", uri.Addr, err), http.StatusNotFound)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
- log.Debug("handle.get.resource: resolved", "ruid", r.ruid, "manifestkey", manifestAddr, "rootchunk addr", rootAddr)
|
|
|
|
|
|
|
+ log.Debug("handle.get.resource: resolved", "ruid", ruid, "manifestkey", manifestAddr, "rootchunk addr", rootAddr)
|
|
|
|
|
|
|
|
// determine if the query specifies period and version or it is a metadata query
|
|
// determine if the query specifies period and version or it is a metadata query
|
|
|
var params []string
|
|
var params []string
|
|
|
- if len(r.uri.Path) > 0 {
|
|
|
|
|
- if r.uri.Path == "meta" {
|
|
|
|
|
|
|
+ if len(uri.Path) > 0 {
|
|
|
|
|
+ if uri.Path == "meta" {
|
|
|
unsignedUpdateRequest, err := s.api.ResourceNewRequest(r.Context(), rootAddr)
|
|
unsignedUpdateRequest, err := s.api.ResourceNewRequest(r.Context(), rootAddr)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
getFail.Inc(1)
|
|
getFail.Inc(1)
|
|
|
- Respond(w, r, fmt.Sprintf("cannot retrieve resource metadata for rootAddr=%s: %s", rootAddr.Hex(), err), http.StatusNotFound)
|
|
|
|
|
|
|
+ RespondError(w, r, fmt.Sprintf("cannot retrieve resource metadata for rootAddr=%s: %s", rootAddr.Hex(), err), http.StatusNotFound)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
rawResponse, err := unsignedUpdateRequest.MarshalJSON()
|
|
rawResponse, err := unsignedUpdateRequest.MarshalJSON()
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
- Respond(w, r, fmt.Sprintf("cannot encode unsigned UpdateRequest: %v", err), http.StatusInternalServerError)
|
|
|
|
|
|
|
+ RespondError(w, r, fmt.Sprintf("cannot encode unsigned UpdateRequest: %v", err), http.StatusInternalServerError)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
w.Header().Add("Content-type", "application/json")
|
|
w.Header().Add("Content-type", "application/json")
|
|
@@ -653,7 +603,7 @@ func (s *Server) HandleGetResource(w http.ResponseWriter, r *Request) {
|
|
|
|
|
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
- params = strings.Split(r.uri.Path, "/")
|
|
|
|
|
|
|
+ params = strings.Split(uri.Path, "/")
|
|
|
|
|
|
|
|
}
|
|
}
|
|
|
var name string
|
|
var name string
|
|
@@ -689,17 +639,17 @@ func (s *Server) HandleGetResource(w http.ResponseWriter, r *Request) {
|
|
|
// any error from the switch statement will end up here
|
|
// any error from the switch statement will end up here
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
code, err2 := s.translateResourceError(w, r, "mutable resource lookup fail", err)
|
|
code, err2 := s.translateResourceError(w, r, "mutable resource lookup fail", err)
|
|
|
- Respond(w, r, err2.Error(), code)
|
|
|
|
|
|
|
+ RespondError(w, r, err2.Error(), code)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
// All ok, serve the retrieved update
|
|
// All ok, serve the retrieved update
|
|
|
- log.Debug("Found update", "name", name, "ruid", r.ruid)
|
|
|
|
|
|
|
+ log.Debug("Found update", "name", name, "ruid", ruid)
|
|
|
w.Header().Set("Content-Type", "application/octet-stream")
|
|
w.Header().Set("Content-Type", "application/octet-stream")
|
|
|
- http.ServeContent(w, &r.Request, "", now, bytes.NewReader(data))
|
|
|
|
|
|
|
+ http.ServeContent(w, r, "", now, bytes.NewReader(data))
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
-func (s *Server) translateResourceError(w http.ResponseWriter, r *Request, supErr string, err error) (int, error) {
|
|
|
|
|
|
|
+func (s *Server) translateResourceError(w http.ResponseWriter, r *http.Request, supErr string, err error) (int, error) {
|
|
|
code := 0
|
|
code := 0
|
|
|
defaultErr := fmt.Errorf("%s: %v", supErr, err)
|
|
defaultErr := fmt.Errorf("%s: %v", supErr, err)
|
|
|
rsrcErr, ok := err.(*mru.Error)
|
|
rsrcErr, ok := err.(*mru.Error)
|
|
@@ -725,46 +675,41 @@ func (s *Server) translateResourceError(w http.ResponseWriter, r *Request, supEr
|
|
|
// given storage key
|
|
// given storage key
|
|
|
// - bzz-hash://<key> and responds with the hash of the content stored
|
|
// - bzz-hash://<key> and responds with the hash of the content stored
|
|
|
// at the given storage key as a text/plain response
|
|
// at the given storage key as a text/plain response
|
|
|
-func (s *Server) HandleGet(w http.ResponseWriter, r *Request) {
|
|
|
|
|
- log.Debug("handle.get", "ruid", r.ruid, "uri", r.uri)
|
|
|
|
|
|
|
+func (s *Server) HandleGet(w http.ResponseWriter, r *http.Request) {
|
|
|
|
|
+ ruid := GetRUID(r.Context())
|
|
|
|
|
+ uri := GetURI(r.Context())
|
|
|
|
|
+ log.Debug("handle.get", "ruid", ruid, "uri", uri)
|
|
|
getCount.Inc(1)
|
|
getCount.Inc(1)
|
|
|
|
|
|
|
|
- var sp opentracing.Span
|
|
|
|
|
- ctx := r.Context()
|
|
|
|
|
- ctx, sp = spancontext.StartSpan(
|
|
|
|
|
- ctx,
|
|
|
|
|
- "http.get")
|
|
|
|
|
- defer sp.Finish()
|
|
|
|
|
-
|
|
|
|
|
var err error
|
|
var err error
|
|
|
- addr := r.uri.Address()
|
|
|
|
|
|
|
+ addr := uri.Address()
|
|
|
if addr == nil {
|
|
if addr == nil {
|
|
|
- addr, err = s.api.Resolve(r.Context(), r.uri)
|
|
|
|
|
|
|
+ addr, err = s.api.Resolve(r.Context(), uri)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
getFail.Inc(1)
|
|
getFail.Inc(1)
|
|
|
- Respond(w, r, fmt.Sprintf("cannot resolve %s: %s", r.uri.Addr, err), http.StatusNotFound)
|
|
|
|
|
|
|
+ RespondError(w, r, fmt.Sprintf("cannot resolve %s: %s", uri.Addr, err), http.StatusNotFound)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
} else {
|
|
} else {
|
|
|
w.Header().Set("Cache-Control", "max-age=2147483648, immutable") // url was of type bzz://<hex key>/path, so we are sure it is immutable.
|
|
w.Header().Set("Cache-Control", "max-age=2147483648, immutable") // url was of type bzz://<hex key>/path, so we are sure it is immutable.
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
- log.Debug("handle.get: resolved", "ruid", r.ruid, "key", addr)
|
|
|
|
|
|
|
+ log.Debug("handle.get: resolved", "ruid", ruid, "key", addr)
|
|
|
|
|
|
|
|
// if path is set, interpret <key> as a manifest and return the
|
|
// if path is set, interpret <key> as a manifest and return the
|
|
|
// raw entry at the given path
|
|
// raw entry at the given path
|
|
|
- if r.uri.Path != "" {
|
|
|
|
|
|
|
+ if uri.Path != "" {
|
|
|
walker, err := s.api.NewManifestWalker(r.Context(), addr, nil)
|
|
walker, err := s.api.NewManifestWalker(r.Context(), addr, nil)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
getFail.Inc(1)
|
|
getFail.Inc(1)
|
|
|
- Respond(w, r, fmt.Sprintf("%s is not a manifest", addr), http.StatusBadRequest)
|
|
|
|
|
|
|
+ RespondError(w, r, fmt.Sprintf("%s is not a manifest", addr), http.StatusBadRequest)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
var entry *api.ManifestEntry
|
|
var entry *api.ManifestEntry
|
|
|
walker.Walk(func(e *api.ManifestEntry) error {
|
|
walker.Walk(func(e *api.ManifestEntry) error {
|
|
|
// if the entry matches the path, set entry and stop
|
|
// if the entry matches the path, set entry and stop
|
|
|
// the walk
|
|
// the walk
|
|
|
- if e.Path == r.uri.Path {
|
|
|
|
|
|
|
+ if e.Path == uri.Path {
|
|
|
entry = e
|
|
entry = e
|
|
|
// return an error to cancel the walk
|
|
// return an error to cancel the walk
|
|
|
return errors.New("found")
|
|
return errors.New("found")
|
|
@@ -778,7 +723,7 @@ func (s *Server) HandleGet(w http.ResponseWriter, r *Request) {
|
|
|
// if the manifest's path is a prefix of the
|
|
// if the manifest's path is a prefix of the
|
|
|
// requested path, recurse into it by returning
|
|
// requested path, recurse into it by returning
|
|
|
// nil and continuing the walk
|
|
// nil and continuing the walk
|
|
|
- if strings.HasPrefix(r.uri.Path, e.Path) {
|
|
|
|
|
|
|
+ if strings.HasPrefix(uri.Path, e.Path) {
|
|
|
return nil
|
|
return nil
|
|
|
}
|
|
}
|
|
|
|
|
|
|
@@ -786,7 +731,7 @@ func (s *Server) HandleGet(w http.ResponseWriter, r *Request) {
|
|
|
})
|
|
})
|
|
|
if entry == nil {
|
|
if entry == nil {
|
|
|
getFail.Inc(1)
|
|
getFail.Inc(1)
|
|
|
- Respond(w, r, fmt.Sprintf("manifest entry could not be loaded"), http.StatusNotFound)
|
|
|
|
|
|
|
+ RespondError(w, r, fmt.Sprintf("manifest entry could not be loaded"), http.StatusNotFound)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
addr = storage.Address(common.Hex2Bytes(entry.Hash))
|
|
addr = storage.Address(common.Hex2Bytes(entry.Hash))
|
|
@@ -796,23 +741,23 @@ func (s *Server) HandleGet(w http.ResponseWriter, r *Request) {
|
|
|
w.Header().Set("ETag", fmt.Sprintf("%q", etag)) // set etag to manifest key or raw entry key.
|
|
w.Header().Set("ETag", fmt.Sprintf("%q", etag)) // set etag to manifest key or raw entry key.
|
|
|
if noneMatchEtag != "" {
|
|
if noneMatchEtag != "" {
|
|
|
if bytes.Equal(storage.Address(common.Hex2Bytes(noneMatchEtag)), addr) {
|
|
if bytes.Equal(storage.Address(common.Hex2Bytes(noneMatchEtag)), addr) {
|
|
|
- Respond(w, r, "Not Modified", http.StatusNotModified)
|
|
|
|
|
|
|
+ w.WriteHeader(http.StatusNotModified)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
// check the root chunk exists by retrieving the file's size
|
|
// check the root chunk exists by retrieving the file's size
|
|
|
- reader, isEncrypted := s.api.Retrieve(ctx, addr)
|
|
|
|
|
- if _, err := reader.Size(ctx, nil); err != nil {
|
|
|
|
|
|
|
+ reader, isEncrypted := s.api.Retrieve(r.Context(), addr)
|
|
|
|
|
+ if _, err := reader.Size(r.Context(), nil); err != nil {
|
|
|
getFail.Inc(1)
|
|
getFail.Inc(1)
|
|
|
- Respond(w, r, fmt.Sprintf("root chunk not found %s: %s", addr, err), http.StatusNotFound)
|
|
|
|
|
|
|
+ RespondError(w, r, fmt.Sprintf("root chunk not found %s: %s", addr, err), http.StatusNotFound)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set("X-Decrypted", fmt.Sprintf("%v", isEncrypted))
|
|
w.Header().Set("X-Decrypted", fmt.Sprintf("%v", isEncrypted))
|
|
|
|
|
|
|
|
switch {
|
|
switch {
|
|
|
- case r.uri.Raw():
|
|
|
|
|
|
|
+ case uri.Raw():
|
|
|
// allow the request to overwrite the content type using a query
|
|
// allow the request to overwrite the content type using a query
|
|
|
// parameter
|
|
// parameter
|
|
|
contentType := "application/octet-stream"
|
|
contentType := "application/octet-stream"
|
|
@@ -820,8 +765,8 @@ func (s *Server) HandleGet(w http.ResponseWriter, r *Request) {
|
|
|
contentType = typ
|
|
contentType = typ
|
|
|
}
|
|
}
|
|
|
w.Header().Set("Content-Type", contentType)
|
|
w.Header().Set("Content-Type", contentType)
|
|
|
- http.ServeContent(w, &r.Request, "", time.Now(), reader)
|
|
|
|
|
- case r.uri.Hash():
|
|
|
|
|
|
|
+ http.ServeContent(w, r, "", time.Now(), reader)
|
|
|
|
|
+ case uri.Hash():
|
|
|
w.Header().Set("Content-Type", "text/plain")
|
|
w.Header().Set("Content-Type", "text/plain")
|
|
|
w.WriteHeader(http.StatusOK)
|
|
w.WriteHeader(http.StatusOK)
|
|
|
fmt.Fprint(w, addr)
|
|
fmt.Fprint(w, addr)
|
|
@@ -831,35 +776,30 @@ func (s *Server) HandleGet(w http.ResponseWriter, r *Request) {
|
|
|
// HandleGetList handles a GET request to bzz-list:/<manifest>/<path> and returns
|
|
// HandleGetList handles a GET request to bzz-list:/<manifest>/<path> and returns
|
|
|
// a list of all files contained in <manifest> under <path> grouped into
|
|
// a list of all files contained in <manifest> under <path> grouped into
|
|
|
// common prefixes using "/" as a delimiter
|
|
// common prefixes using "/" as a delimiter
|
|
|
-func (s *Server) HandleGetList(w http.ResponseWriter, r *Request) {
|
|
|
|
|
- log.Debug("handle.get.list", "ruid", r.ruid, "uri", r.uri)
|
|
|
|
|
|
|
+func (s *Server) HandleGetList(w http.ResponseWriter, r *http.Request) {
|
|
|
|
|
+ ruid := GetRUID(r.Context())
|
|
|
|
|
+ uri := GetURI(r.Context())
|
|
|
|
|
+ log.Debug("handle.get.list", "ruid", ruid, "uri", uri)
|
|
|
getListCount.Inc(1)
|
|
getListCount.Inc(1)
|
|
|
|
|
|
|
|
- var sp opentracing.Span
|
|
|
|
|
- ctx := r.Context()
|
|
|
|
|
- ctx, sp = spancontext.StartSpan(
|
|
|
|
|
- ctx,
|
|
|
|
|
- "http.get.list")
|
|
|
|
|
- defer sp.Finish()
|
|
|
|
|
-
|
|
|
|
|
// ensure the root path has a trailing slash so that relative URLs work
|
|
// ensure the root path has a trailing slash so that relative URLs work
|
|
|
- if r.uri.Path == "" && !strings.HasSuffix(r.URL.Path, "/") {
|
|
|
|
|
- http.Redirect(w, &r.Request, r.URL.Path+"/", http.StatusMovedPermanently)
|
|
|
|
|
|
|
+ if uri.Path == "" && !strings.HasSuffix(r.URL.Path, "/") {
|
|
|
|
|
+ http.Redirect(w, r, r.URL.Path+"/", http.StatusMovedPermanently)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
- addr, err := s.api.Resolve(r.Context(), r.uri)
|
|
|
|
|
|
|
+ addr, err := s.api.Resolve(r.Context(), uri)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
getListFail.Inc(1)
|
|
getListFail.Inc(1)
|
|
|
- Respond(w, r, fmt.Sprintf("cannot resolve %s: %s", r.uri.Addr, err), http.StatusNotFound)
|
|
|
|
|
|
|
+ RespondError(w, r, fmt.Sprintf("cannot resolve %s: %s", uri.Addr, err), http.StatusNotFound)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
- log.Debug("handle.get.list: resolved", "ruid", r.ruid, "key", addr)
|
|
|
|
|
|
|
+ log.Debug("handle.get.list: resolved", "ruid", ruid, "key", addr)
|
|
|
|
|
|
|
|
- list, err := s.api.GetManifestList(ctx, addr, r.uri.Path)
|
|
|
|
|
|
|
+ list, err := s.api.GetManifestList(r.Context(), addr, uri.Path)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
getListFail.Inc(1)
|
|
getListFail.Inc(1)
|
|
|
- Respond(w, r, err.Error(), http.StatusInternalServerError)
|
|
|
|
|
|
|
+ RespondError(w, r, err.Error(), http.StatusInternalServerError)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
|
|
|
|
@@ -867,11 +807,11 @@ func (s *Server) HandleGetList(w http.ResponseWriter, r *Request) {
|
|
|
// HTML index with relative URLs
|
|
// HTML index with relative URLs
|
|
|
if strings.Contains(r.Header.Get("Accept"), "text/html") {
|
|
if strings.Contains(r.Header.Get("Accept"), "text/html") {
|
|
|
w.Header().Set("Content-Type", "text/html")
|
|
w.Header().Set("Content-Type", "text/html")
|
|
|
- err := htmlListTemplate.Execute(w, &htmlListData{
|
|
|
|
|
|
|
+ err := TemplatesMap["bzz-list"].Execute(w, &htmlListData{
|
|
|
URI: &api.URI{
|
|
URI: &api.URI{
|
|
|
Scheme: "bzz",
|
|
Scheme: "bzz",
|
|
|
- Addr: r.uri.Addr,
|
|
|
|
|
- Path: r.uri.Path,
|
|
|
|
|
|
|
+ Addr: uri.Addr,
|
|
|
|
|
+ Path: uri.Path,
|
|
|
},
|
|
},
|
|
|
List: &list,
|
|
List: &list,
|
|
|
})
|
|
})
|
|
@@ -888,45 +828,40 @@ func (s *Server) HandleGetList(w http.ResponseWriter, r *Request) {
|
|
|
|
|
|
|
|
// HandleGetFile handles a GET request to bzz://<manifest>/<path> and responds
|
|
// HandleGetFile handles a GET request to bzz://<manifest>/<path> and responds
|
|
|
// with the content of the file at <path> from the given <manifest>
|
|
// with the content of the file at <path> from the given <manifest>
|
|
|
-func (s *Server) HandleGetFile(w http.ResponseWriter, r *Request) {
|
|
|
|
|
- log.Debug("handle.get.file", "ruid", r.ruid)
|
|
|
|
|
|
|
+func (s *Server) HandleGetFile(w http.ResponseWriter, r *http.Request) {
|
|
|
|
|
+ ruid := GetRUID(r.Context())
|
|
|
|
|
+ uri := GetURI(r.Context())
|
|
|
|
|
+ log.Debug("handle.get.file", "ruid", ruid)
|
|
|
getFileCount.Inc(1)
|
|
getFileCount.Inc(1)
|
|
|
|
|
|
|
|
- var sp opentracing.Span
|
|
|
|
|
- ctx := r.Context()
|
|
|
|
|
- ctx, sp = spancontext.StartSpan(
|
|
|
|
|
- ctx,
|
|
|
|
|
- "http.get.file")
|
|
|
|
|
- defer sp.Finish()
|
|
|
|
|
-
|
|
|
|
|
// ensure the root path has a trailing slash so that relative URLs work
|
|
// ensure the root path has a trailing slash so that relative URLs work
|
|
|
- if r.uri.Path == "" && !strings.HasSuffix(r.URL.Path, "/") {
|
|
|
|
|
- http.Redirect(w, &r.Request, r.URL.Path+"/", http.StatusMovedPermanently)
|
|
|
|
|
|
|
+ if uri.Path == "" && !strings.HasSuffix(r.URL.Path, "/") {
|
|
|
|
|
+ http.Redirect(w, r, r.URL.Path+"/", http.StatusMovedPermanently)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
var err error
|
|
var err error
|
|
|
- manifestAddr := r.uri.Address()
|
|
|
|
|
|
|
+ manifestAddr := uri.Address()
|
|
|
|
|
|
|
|
if manifestAddr == nil {
|
|
if manifestAddr == nil {
|
|
|
- manifestAddr, err = s.api.Resolve(r.Context(), r.uri)
|
|
|
|
|
|
|
+ manifestAddr, err = s.api.Resolve(r.Context(), uri)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
getFileFail.Inc(1)
|
|
getFileFail.Inc(1)
|
|
|
- Respond(w, r, fmt.Sprintf("cannot resolve %s: %s", r.uri.Addr, err), http.StatusNotFound)
|
|
|
|
|
|
|
+ RespondError(w, r, fmt.Sprintf("cannot resolve %s: %s", uri.Addr, err), http.StatusNotFound)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
} else {
|
|
} else {
|
|
|
w.Header().Set("Cache-Control", "max-age=2147483648, immutable") // url was of type bzz://<hex key>/path, so we are sure it is immutable.
|
|
w.Header().Set("Cache-Control", "max-age=2147483648, immutable") // url was of type bzz://<hex key>/path, so we are sure it is immutable.
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
- log.Debug("handle.get.file: resolved", "ruid", r.ruid, "key", manifestAddr)
|
|
|
|
|
- reader, contentType, status, contentKey, err := s.api.Get(r.Context(), manifestAddr, r.uri.Path)
|
|
|
|
|
|
|
+ log.Debug("handle.get.file: resolved", "ruid", ruid, "key", manifestAddr)
|
|
|
|
|
+ reader, contentType, status, contentKey, err := s.api.Get(r.Context(), manifestAddr, uri.Path)
|
|
|
|
|
|
|
|
etag := common.Bytes2Hex(contentKey)
|
|
etag := common.Bytes2Hex(contentKey)
|
|
|
noneMatchEtag := r.Header.Get("If-None-Match")
|
|
noneMatchEtag := r.Header.Get("If-None-Match")
|
|
|
w.Header().Set("ETag", fmt.Sprintf("%q", etag)) // set etag to actual content key.
|
|
w.Header().Set("ETag", fmt.Sprintf("%q", etag)) // set etag to actual content key.
|
|
|
if noneMatchEtag != "" {
|
|
if noneMatchEtag != "" {
|
|
|
if bytes.Equal(storage.Address(common.Hex2Bytes(noneMatchEtag)), contentKey) {
|
|
if bytes.Equal(storage.Address(common.Hex2Bytes(noneMatchEtag)), contentKey) {
|
|
|
- Respond(w, r, "Not Modified", http.StatusNotModified)
|
|
|
|
|
|
|
+ w.WriteHeader(http.StatusNotModified)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
}
|
|
}
|
|
@@ -935,10 +870,10 @@ func (s *Server) HandleGetFile(w http.ResponseWriter, r *Request) {
|
|
|
switch status {
|
|
switch status {
|
|
|
case http.StatusNotFound:
|
|
case http.StatusNotFound:
|
|
|
getFileNotFound.Inc(1)
|
|
getFileNotFound.Inc(1)
|
|
|
- Respond(w, r, err.Error(), http.StatusNotFound)
|
|
|
|
|
|
|
+ RespondError(w, r, err.Error(), http.StatusNotFound)
|
|
|
default:
|
|
default:
|
|
|
getFileFail.Inc(1)
|
|
getFileFail.Inc(1)
|
|
|
- Respond(w, r, err.Error(), http.StatusInternalServerError)
|
|
|
|
|
|
|
+ RespondError(w, r, err.Error(), http.StatusInternalServerError)
|
|
|
}
|
|
}
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
@@ -946,28 +881,28 @@ func (s *Server) HandleGetFile(w http.ResponseWriter, r *Request) {
|
|
|
//the request results in ambiguous files
|
|
//the request results in ambiguous files
|
|
|
//e.g. /read with readme.md and readinglist.txt available in manifest
|
|
//e.g. /read with readme.md and readinglist.txt available in manifest
|
|
|
if status == http.StatusMultipleChoices {
|
|
if status == http.StatusMultipleChoices {
|
|
|
- list, err := s.api.GetManifestList(ctx, manifestAddr, r.uri.Path)
|
|
|
|
|
|
|
+ list, err := s.api.GetManifestList(r.Context(), manifestAddr, uri.Path)
|
|
|
if err != nil {
|
|
if err != nil {
|
|
|
getFileFail.Inc(1)
|
|
getFileFail.Inc(1)
|
|
|
- Respond(w, r, err.Error(), http.StatusInternalServerError)
|
|
|
|
|
|
|
+ RespondError(w, r, err.Error(), http.StatusInternalServerError)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
- log.Debug(fmt.Sprintf("Multiple choices! --> %v", list), "ruid", r.ruid)
|
|
|
|
|
|
|
+ log.Debug(fmt.Sprintf("Multiple choices! --> %v", list), "ruid", ruid)
|
|
|
//show a nice page links to available entries
|
|
//show a nice page links to available entries
|
|
|
ShowMultipleChoices(w, r, list)
|
|
ShowMultipleChoices(w, r, list)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
// check the root chunk exists by retrieving the file's size
|
|
// check the root chunk exists by retrieving the file's size
|
|
|
- if _, err := reader.Size(ctx, nil); err != nil {
|
|
|
|
|
|
|
+ if _, err := reader.Size(r.Context(), nil); err != nil {
|
|
|
getFileNotFound.Inc(1)
|
|
getFileNotFound.Inc(1)
|
|
|
- Respond(w, r, fmt.Sprintf("file not found %s: %s", r.uri, err), http.StatusNotFound)
|
|
|
|
|
|
|
+ RespondError(w, r, fmt.Sprintf("file not found %s: %s", uri, err), http.StatusNotFound)
|
|
|
return
|
|
return
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
w.Header().Set("Content-Type", contentType)
|
|
w.Header().Set("Content-Type", contentType)
|
|
|
- http.ServeContent(w, &r.Request, "", time.Now(), newBufferedReadSeeker(reader, getFileBufferSize))
|
|
|
|
|
|
|
+ http.ServeContent(w, r, "", time.Now(), newBufferedReadSeeker(reader, getFileBufferSize))
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
// The size of buffer used for bufio.Reader on LazyChunkReader passed to
|
|
// The size of buffer used for bufio.Reader on LazyChunkReader passed to
|