Devendra174's picture
Upload folder using huggingface_hub
1e92f2d verified
package sendit
import (
"context"
"crypto/rand"
"io"
"log"
"net"
"net/http"
"net/http/httputil"
"path"
"strings"
"sync"
)
const (
pathOpen = "/.well-known/sendit/v1/open"
pathClientRead = "/.well-known/sendit/v1/read"
pathClientWrite = "/.well-known/sendit/v1/write"
)
type serverContextValue int
const (
serverContextValueHost = serverContextValue(1)
)
// Server is an http.Handler that can multiplex reverse-proxied requests
// over 2 POST requests from a client.
type Server struct {
http.Handler
proxy *httputil.ReverseProxy
sessionsByID map[string]*session
sessionsByPrefix map[string]*session
mx sync.RWMutex
authSecret []byte
connectSecret []byte
prefix string
}
// NewServer will create a new Server with a global pathPrefix and using
// the provided `authSecret` to require valid tokens for any connecting clients.
func NewServer(authSecret []byte, prefix string) *Server {
prefix = path.Join("/", prefix, "/")
if prefix != "/" {
prefix += "/"
}
mux := http.NewServeMux()
s := &Server{
Handler: http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
mux.ServeHTTP(w, req)
}),
sessionsByPrefix: make(map[string]*session),
sessionsByID: make(map[string]*session),
authSecret: authSecret,
connectSecret: make([]byte, 32),
prefix: prefix,
}
_, err := rand.Read(s.connectSecret)
if err != nil {
panic(err)
}
mux.HandleFunc(path.Join(prefix, pathOpen), s.serveOpen)
mux.HandleFunc(path.Join(prefix, pathClientRead), s.serveClientRead)
mux.HandleFunc(path.Join(prefix, pathClientWrite), s.serveClientWrite)
transport := http.DefaultTransport.(*http.Transport).Clone()
transport.DialContext = s.DialContext
s.proxy = &httputil.ReverseProxy{
Director: func(req *http.Request) {
req.URL.Scheme = "http"
req.URL.Host = req.Context().Value(serverContextValueHost).(string)
if _, ok := req.Header["User-Agent"]; !ok {
// explicitly disable User-Agent so it's not set to default value
req.Header.Set("User-Agent", "")
}
},
Transport: transport,
}
mux.HandleFunc(prefix, s.servePrefix)
if prefix != "/" {
// mux will route all subpaths if the route ends with `/` but not the top-level, so we need to register both.
mux.HandleFunc(strings.TrimSuffix(prefix, "/"), s.servePrefix)
}
return s
}
func (s *Server) sessionByPrefix(prefix string) *session {
s.mx.RLock()
defer s.mx.RUnlock()
return s.sessionsByPrefix[prefix]
}
func (s *Server) sessionByID(id string) *session {
s.mx.RLock()
defer s.mx.RUnlock()
return s.sessionsByID[id]
}
func (s *Server) servePrefix(w http.ResponseWriter, req *http.Request) {
path := strings.TrimPrefix(req.URL.Path, s.prefix)
var prefixValue string
if !strings.Contains(path, "/") {
prefixValue = path
} else {
parts := strings.SplitN(path, "/", 2)
if len(parts) < 2 {
http.NotFound(w, req)
return
}
prefixValue = parts[0]
}
sess := s.sessionByPrefix(prefixValue)
if sess == nil {
http.NotFound(w, req)
return
}
s.proxy.ServeHTTP(w, req.WithContext(
context.WithValue(req.Context(), serverContextValueHost, sess.ID),
))
}
// DialContext will return a new `net.Conn` for the given `addr`. `network` is ignored.
//
// It will only connect to "hosts" that match an active session ID.
func (s *Server) DialContext(ctx context.Context, network, addr string) (net.Conn, error) {
host, _, err := net.SplitHostPort(addr)
if err != nil {
return nil, err
}
sess := s.sessionByID(host)
if sess == nil {
return nil, &net.AddrError{Addr: addr, Err: "unknown host"}
}
return sess.OpenContext(ctx)
}
// serveOpen will perform initial authentication and esablish a tunnel session.
func (s *Server) serveOpen(w http.ResponseWriter, req *http.Request) {
if len(s.authSecret) > 0 {
_, err := TokenSubject(s.authSecret, TokenAudienceAuth, req.FormValue("token"))
if err != nil {
http.Error(w, err.Error(), http.StatusUnauthorized)
return
}
}
sess, err := s.newSession(req.FormValue("prefix"))
if err != nil {
log.Println("ERROR:", err)
http.Error(w, err.Error(), http.StatusBadRequest)
return
}
token, err := GenerateToken(s.connectSecret, TokenAudienceConnect, sess.ID)
if err != nil {
log.Println("ERROR:", err)
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
w.Header().Set("Transfer-Encoding", "chunked")
w.Header().Set("Cache-Control", "private, no-cache, no-store")
_, err = io.WriteString(w, token+"\n")
if err != nil {
log.Println("ERROR:", err)
return
}
w.(http.Flusher).Flush()
select {
case <-req.Context().Done():
log.Println("ERROR: request terminated before session established")
sess.End()
return
case <-sess.stream.Ready():
}
// Session initiated.
log.Printf("Session Started; %s -> %s [%s]", sess.Prefix, req.RemoteAddr, sess.ID)
}
// serveOpen will perform initial authentication and esablish a tunnel session.
func (s *Server) serveClientRead(w http.ResponseWriter, req *http.Request) {
id, err := TokenSubject(s.connectSecret, TokenAudienceConnect, req.URL.Query().Get("token"))
if err != nil {
http.Error(w, err.Error(), http.StatusUnauthorized)
return
}
sess := s.sessionByID(id)
if sess == nil {
http.NotFound(w, req)
return
}
w.Header().Set("Transfer-Encoding", "chunked")
w.Header().Set("Cache-Control", "private, no-cache, no-store")
w.WriteHeader(http.StatusOK)
sess.UseWriter(req.Context(), FlushWriter(w))
}
// serveClientWrite handles connecting.
func (s *Server) serveClientWrite(w http.ResponseWriter, req *http.Request) {
id, err := TokenSubject(s.connectSecret, TokenAudienceConnect, req.URL.Query().Get("token"))
if err != nil {
http.Error(w, err.Error(), http.StatusUnauthorized)
return
}
sess := s.sessionByID(id)
if sess == nil {
http.NotFound(w, req)
return
}
w.Header().Set("Transfer-Encoding", "chunked")
w.Header().Set("Cache-Control", "private, no-cache, no-store")
sess.UseReader(req.Context(), req.Body)
}