summaryrefslogtreecommitdiffstats
path: root/routers/common/repo.go
diff options
context:
space:
mode:
authorKN4CK3R <admin@oldschoolhack.me>2022-11-17 18:55:15 +0100
committerGitHub <noreply@github.com>2022-11-18 01:55:15 +0800
commit43ab9324c579a393f778d6842c577a872d0e4265 (patch)
tree0895b0e0e6d7e4182fd193459d0ac3ee0a30fb40 /routers/common/repo.go
parentc144942b23eb6e05a60526cc6d2b88b488ca75dd (diff)
downloadgitea-43ab9324c579a393f778d6842c577a872d0e4265.tar.gz
gitea-43ab9324c579a393f778d6842c577a872d0e4265.zip
Fix setting HTTP headers after write (#21833)
The headers can't be modified after it was send to the client.
Diffstat (limited to 'routers/common/repo.go')
-rw-r--r--routers/common/repo.go41
1 files changed, 15 insertions, 26 deletions
diff --git a/routers/common/repo.go b/routers/common/repo.go
index a9e80fad48..f4b813d6b4 100644
--- a/routers/common/repo.go
+++ b/routers/common/repo.go
@@ -7,7 +7,6 @@ package common
import (
"fmt"
"io"
- "net/url"
"path"
"path/filepath"
"strings"
@@ -53,50 +52,44 @@ func ServeData(ctx *context.Context, filePath string, size int64, reader io.Read
buf = buf[:n]
}
- httpcache.AddCacheControlToHeader(ctx.Resp.Header(), 5*time.Minute)
-
if size >= 0 {
ctx.Resp.Header().Set("Content-Length", fmt.Sprintf("%d", size))
} else {
log.Error("ServeData called to serve data: %s with size < 0: %d", filePath, size)
}
- fileName := path.Base(filePath)
+ opts := &context.ServeHeaderOptions{
+ Filename: path.Base(filePath),
+ }
+
sniffedType := typesniffer.DetectContentType(buf)
isPlain := sniffedType.IsText() || ctx.FormBool("render")
- mimeType := ""
- charset := ""
if setting.MimeTypeMap.Enabled {
- fileExtension := strings.ToLower(filepath.Ext(fileName))
- mimeType = setting.MimeTypeMap.Map[fileExtension]
+ fileExtension := strings.ToLower(filepath.Ext(filePath))
+ opts.ContentType = setting.MimeTypeMap.Map[fileExtension]
}
- if mimeType == "" {
+ if opts.ContentType == "" {
if sniffedType.IsBrowsableBinaryType() {
- mimeType = sniffedType.GetMimeType()
+ opts.ContentType = sniffedType.GetMimeType()
} else if isPlain {
- mimeType = "text/plain"
+ opts.ContentType = "text/plain"
} else {
- mimeType = typesniffer.ApplicationOctetStream
+ opts.ContentType = typesniffer.ApplicationOctetStream
}
}
if isPlain {
+ var charset string
charset, err = charsetModule.DetectEncoding(buf)
if err != nil {
log.Error("Detect raw file %s charset failed: %v, using by default utf-8", filePath, err)
charset = "utf-8"
}
+ opts.ContentTypeCharset = strings.ToLower(charset)
}
- if charset != "" {
- ctx.Resp.Header().Set("Content-Type", mimeType+"; charset="+strings.ToLower(charset))
- } else {
- ctx.Resp.Header().Set("Content-Type", mimeType)
- }
- ctx.Resp.Header().Set("X-Content-Type-Options", "nosniff")
-
isSVG := sniffedType.IsSvgImage()
// serve types that can present a security risk with CSP
@@ -109,16 +102,12 @@ func ServeData(ctx *context.Context, filePath string, size int64, reader io.Read
ctx.Resp.Header().Set("Content-Security-Policy", "default-src 'none'; style-src 'unsafe-inline'")
}
- disposition := "inline"
+ opts.Disposition = "inline"
if isSVG && !setting.UI.SVG.Enabled {
- disposition = "attachment"
+ opts.Disposition = "attachment"
}
- // encode filename per https://datatracker.ietf.org/doc/html/rfc5987
- encodedFileName := `filename*=UTF-8''` + url.PathEscape(fileName)
-
- ctx.Resp.Header().Set("Content-Disposition", disposition+"; "+encodedFileName)
- ctx.Resp.Header().Set("Access-Control-Expose-Headers", "Content-Disposition")
+ ctx.SetServeHeaders(opts)
_, err = ctx.Resp.Write(buf)
if err != nil {