2012-03-12 15:41:55 +01:00
|
|
|
#!/usr/bin/python
|
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
2012-03-18 04:16:10 +01:00
|
|
|
# Licensed under GNU General Public License v3 or later
|
|
|
|
# Written by Sebastian Lohff (seba@seba-geek.de)
|
|
|
|
# http://seba-geek.de/stuff/servefile/
|
2012-03-18 04:53:28 +01:00
|
|
|
|
2012-05-04 15:40:46 +02:00
|
|
|
__version__ = '0.4.1'
|
2012-03-12 15:41:55 +01:00
|
|
|
|
2012-03-18 02:04:58 +01:00
|
|
|
import argparse
|
2012-04-16 16:36:40 +02:00
|
|
|
import base64
|
2012-04-07 02:57:06 +02:00
|
|
|
import cgi
|
2012-03-12 15:41:55 +01:00
|
|
|
import BaseHTTPServer
|
2012-03-18 01:42:03 +01:00
|
|
|
import commands
|
2012-04-09 15:32:57 +02:00
|
|
|
import datetime
|
2012-03-12 15:41:55 +01:00
|
|
|
import urllib
|
2012-03-18 01:42:03 +01:00
|
|
|
import os
|
2012-04-16 18:40:28 +02:00
|
|
|
import re
|
2012-04-16 19:10:36 +02:00
|
|
|
import SimpleHTTPServer
|
2012-03-12 15:41:55 +01:00
|
|
|
import SocketServer
|
|
|
|
import socket
|
2012-03-18 01:42:03 +01:00
|
|
|
from stat import ST_SIZE
|
2012-03-18 05:08:49 +01:00
|
|
|
from subprocess import Popen, PIPE
|
2012-03-18 01:42:03 +01:00
|
|
|
import sys
|
2012-04-07 18:50:24 +02:00
|
|
|
import time
|
2012-03-12 15:41:55 +01:00
|
|
|
|
2012-04-14 22:31:09 +02:00
|
|
|
# only activate SSL if available
|
|
|
|
HAVE_SSL = False
|
|
|
|
try:
|
|
|
|
from OpenSSL import SSL, crypto
|
|
|
|
HAVE_SSL = True
|
|
|
|
except ImportError:
|
|
|
|
pass
|
|
|
|
|
2012-04-09 15:32:57 +02:00
|
|
|
def getDateStrNow():
|
|
|
|
""" Get the current time formatted for HTTP header """
|
|
|
|
now = datetime.datetime.fromtimestamp(time.mktime(time.gmtime()))
|
|
|
|
return now.strftime("%a, %d %b %Y %H:%M:%S GMT")
|
2012-03-12 15:41:55 +01:00
|
|
|
|
2012-04-26 15:45:51 +02:00
|
|
|
class FileBaseHandler(BaseHTTPServer.BaseHTTPRequestHandler):
|
2012-03-12 15:41:55 +01:00
|
|
|
fileName = "Undefined"
|
2012-04-27 03:52:07 +02:00
|
|
|
blockSize = 1024 * 1024
|
2012-06-05 16:33:56 +02:00
|
|
|
server_version = "servefile/" + __version__
|
2012-04-27 03:52:07 +02:00
|
|
|
|
2012-04-09 15:32:57 +02:00
|
|
|
def checkAndDoRedirect(self):
|
|
|
|
""" If request didn't request self.fileName redirect to self.fileName.
|
|
|
|
|
|
|
|
Returns True if a redirect was issued. """
|
2012-03-12 15:41:55 +01:00
|
|
|
if urllib.unquote(self.path) != "/" + self.fileName:
|
|
|
|
self.send_response(302)
|
|
|
|
self.send_header('Location', '/' + self.fileName)
|
|
|
|
self.end_headers()
|
2012-04-09 15:32:57 +02:00
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
2012-04-26 15:45:51 +02:00
|
|
|
class FileHandler(FileBaseHandler):
|
|
|
|
filePath = "/dev/null"
|
|
|
|
fileLength = 0
|
|
|
|
startTime = getDateStrNow()
|
|
|
|
|
2012-04-09 15:32:57 +02:00
|
|
|
def do_HEAD(self):
|
|
|
|
if self.checkAndDoRedirect():
|
2012-03-12 15:41:55 +01:00
|
|
|
return
|
2012-04-09 15:32:57 +02:00
|
|
|
self.send_response(200)
|
|
|
|
self.send_header('Content-Length', self.fileLength)
|
|
|
|
self.send_header('Last-Modified', self.startTime)
|
|
|
|
self.send_header('Content-Type', 'application/octet-stream')
|
2012-04-12 17:38:05 +02:00
|
|
|
self.send_header('Content-Disposition', 'attachment; filename="%s"' % self.fileName)
|
2012-04-09 15:32:57 +02:00
|
|
|
self.end_headers()
|
2012-03-12 15:41:55 +01:00
|
|
|
|
2012-04-09 15:32:57 +02:00
|
|
|
def do_GET(self):
|
2012-04-13 20:17:48 +02:00
|
|
|
if self.checkAndDoRedirect():
|
|
|
|
return
|
2012-03-12 15:41:55 +01:00
|
|
|
myfile = open(self.filePath, 'rb')
|
2012-04-28 17:52:57 +02:00
|
|
|
|
2012-03-12 15:41:55 +01:00
|
|
|
# find out if this is a continuing download
|
|
|
|
fromto = None
|
2012-03-18 00:21:55 +01:00
|
|
|
if "Range" in self.headers:
|
|
|
|
cont = self.headers.get("Range").split("=")
|
2012-03-12 15:41:55 +01:00
|
|
|
if len(cont) > 1 and cont[0] == 'bytes':
|
|
|
|
fromto = cont[1].split('-')
|
|
|
|
if len(fromto) > 1:
|
|
|
|
if fromto[1] == '':
|
|
|
|
fromto[1] = self.fileLength-1
|
|
|
|
fromto[0] = int(fromto[0])
|
|
|
|
fromto[1] = int(fromto[1])
|
|
|
|
if fromto[0] >= self.fileLength or fromto[0] < 0 or fromto[1] >= self.fileLength or fromto[1]-fromto[0] < 0:
|
|
|
|
# oops, already done!
|
|
|
|
self.send_response(416)
|
|
|
|
self.send_header('Content-Range', 'bytes */%s' % self.fileLength)
|
|
|
|
self.end_headers()
|
|
|
|
return
|
|
|
|
# now we can wind the file *brrrrrr*
|
|
|
|
myfile.seek(fromto[0])
|
2012-04-28 17:52:57 +02:00
|
|
|
|
2012-03-12 15:41:55 +01:00
|
|
|
if fromto != None:
|
|
|
|
self.send_response(216)
|
|
|
|
self.send_header('Content-Range', 'bytes %s-%s/%s' % (fromto[0], fromto[1], self.fileLength))
|
|
|
|
self.send_header('Content-Length', fromto[1]-fromto[0]+1)
|
|
|
|
else:
|
|
|
|
self.send_response(200)
|
|
|
|
self.send_header('Content-Length', self.fileLength)
|
|
|
|
self.send_header('Content-Disposition', 'attachment; filename="%s"' % self.fileName)
|
2012-04-09 15:32:57 +02:00
|
|
|
self.send_header('Content-Type', 'application/octet-stream')
|
2012-04-13 20:17:48 +02:00
|
|
|
self.send_header('Content-Transfer-Encoding', 'binary')
|
2012-03-12 15:41:55 +01:00
|
|
|
self.end_headers()
|
|
|
|
block = self.getChunk(myfile, fromto)
|
|
|
|
while block:
|
|
|
|
try:
|
|
|
|
self.wfile.write(block)
|
|
|
|
except socket.error, e:
|
|
|
|
print "%s ABORTED transmission (Reason %s: %s)" % (self.client_address[0], e[0], e[1])
|
|
|
|
return
|
|
|
|
block = self.getChunk(myfile, fromto)
|
|
|
|
myfile.close()
|
|
|
|
print "%s finished downloading" % (self.client_address[0])
|
|
|
|
return
|
2012-04-28 17:52:57 +02:00
|
|
|
|
2012-03-12 15:41:55 +01:00
|
|
|
def getChunk(self, myfile, fromto):
|
2012-03-18 00:21:55 +01:00
|
|
|
if fromto and myfile.tell()+self.blockSize >= fromto[1]:
|
2012-03-12 15:41:55 +01:00
|
|
|
readsize = fromto[1]-myfile.tell()+1
|
|
|
|
else:
|
|
|
|
readsize = self.blockSize
|
|
|
|
return myfile.read(readsize)
|
|
|
|
|
2012-04-27 03:52:07 +02:00
|
|
|
class TarFileHandler(FileBaseHandler):
|
|
|
|
target = None
|
|
|
|
compression = "none"
|
|
|
|
compressionMethods = ("none", "gzip", "bzip2")
|
2012-06-05 16:33:56 +02:00
|
|
|
server_version = "servefile/" + __version__
|
2012-04-27 03:52:07 +02:00
|
|
|
|
|
|
|
def do_HEAD(self):
|
|
|
|
if self.checkAndDoRedirect():
|
|
|
|
return
|
|
|
|
self.send_response(200)
|
|
|
|
self.send_header('Last-Modified', getDateStrNow())
|
|
|
|
self.send_header('Content-Type', 'application/octet-stream')
|
|
|
|
self.send_header('Content-Disposition', 'attachment; filename="%s"' % self.fileName)
|
|
|
|
self.end_headers()
|
|
|
|
|
|
|
|
def do_GET(self):
|
|
|
|
if self.checkAndDoRedirect():
|
|
|
|
return
|
|
|
|
|
|
|
|
tarCmd = Popen(self.getCompressionCmd(), stdout=PIPE)
|
|
|
|
# give the process a short time to find out if it can
|
|
|
|
# pack/compress the file
|
|
|
|
time.sleep(0.05)
|
|
|
|
if tarCmd.poll() != None and tarCmd.poll() != 0:
|
|
|
|
# something went wrong
|
|
|
|
print "Error while compressing '%s'. Aborting request." % self.target
|
|
|
|
self.send_response(500)
|
|
|
|
self.end_headers()
|
|
|
|
return
|
|
|
|
|
|
|
|
self.send_response(200)
|
|
|
|
self.send_header('Last-Modified', getDateStrNow())
|
|
|
|
self.send_header('Content-Type', 'application/octet-stream')
|
|
|
|
self.end_headers()
|
|
|
|
|
|
|
|
block = True
|
|
|
|
while block and block != '':
|
|
|
|
block = tarCmd.stdout.read(self.blockSize)
|
|
|
|
if block and block != '':
|
|
|
|
self.wfile.write(block)
|
2012-04-29 20:58:53 +02:00
|
|
|
print "%s finished downloading" % (self.client_address[0])
|
2012-04-27 03:52:07 +02:00
|
|
|
|
|
|
|
def getCompressionCmd(self):
|
|
|
|
if self.compression == "none":
|
|
|
|
self.fileName += ".tar"
|
|
|
|
cmd = ["tar", "-c"]
|
|
|
|
elif self.compression == "gzip":
|
|
|
|
self.fileName += ".tar.gz"
|
|
|
|
cmd = ["tar", "-cz"]
|
|
|
|
elif self.compression == "bzip2":
|
|
|
|
self.fileName += ".tar.bz2"
|
|
|
|
cmd = ["tar", "-cj"]
|
|
|
|
else:
|
2012-05-04 13:17:40 +02:00
|
|
|
raise ValueError("Unknown compression mode '%s'." % self.compression)
|
2012-04-27 17:39:12 +02:00
|
|
|
|
2012-04-27 03:52:07 +02:00
|
|
|
dirname = os.path.basename(self.target.rstrip("/"))
|
|
|
|
chdirTo = os.path.dirname(self.target.rstrip("/"))
|
|
|
|
if chdirTo != '':
|
|
|
|
cmd.extend(["-C", chdirTo])
|
|
|
|
cmd.append(dirname)
|
|
|
|
return cmd
|
|
|
|
|
2012-04-27 17:39:12 +02:00
|
|
|
@staticmethod
|
|
|
|
def getCompressionExt():
|
|
|
|
if TarFileHandler.compression == "none":
|
|
|
|
return ".tar"
|
|
|
|
elif TarFileHandler.compression == "gzip":
|
|
|
|
return ".tar.gz"
|
|
|
|
elif TarFileHandler.compression == "bzip2":
|
|
|
|
return ".tar.bz2"
|
2012-05-04 13:17:40 +02:00
|
|
|
raise ValueError("Unknown compression mode '%s'." % self.compression)
|
2012-04-27 17:39:12 +02:00
|
|
|
|
2012-04-05 15:56:28 +02:00
|
|
|
class FilePutter(BaseHTTPServer.BaseHTTPRequestHandler):
|
2012-04-12 13:17:55 +02:00
|
|
|
""" Simple HTTP Server which allows uploading to a specified directory
|
|
|
|
either via multipart/form-data or POST/PUT requests containing the file.
|
|
|
|
"""
|
|
|
|
|
2012-04-16 18:40:28 +02:00
|
|
|
targetDir = None
|
|
|
|
maxUploadSize = 0
|
2012-04-07 02:57:06 +02:00
|
|
|
uploadPage = """
|
|
|
|
<!docype html>
|
|
|
|
<html>
|
|
|
|
<form action="/" method="post" enctype="multipart/form-data">
|
|
|
|
<label for="file">Filename:</label>
|
|
|
|
<input type="file" name="file" id="file" />
|
|
|
|
<br />
|
|
|
|
<input type="submit" name="submit" value="Upload" />
|
|
|
|
</form>
|
|
|
|
</html>
|
|
|
|
"""
|
|
|
|
|
2012-04-05 15:56:28 +02:00
|
|
|
def do_GET(self):
|
2012-04-12 13:17:55 +02:00
|
|
|
""" Answer every GET request with the upload form """
|
2012-04-07 02:57:06 +02:00
|
|
|
self.sendResponse(200, self.uploadPage)
|
2012-04-05 15:56:28 +02:00
|
|
|
|
|
|
|
def do_POST(self):
|
2012-04-12 13:17:55 +02:00
|
|
|
""" Upload a file via POST
|
|
|
|
|
|
|
|
If the content-type is multipart/form-data it checks for the file
|
|
|
|
field and saves the data to disk. For other content-types it just
|
|
|
|
calls do_PUT and is handled as such except for the http response code.
|
|
|
|
|
|
|
|
Files can be uploaded with wget --post-file=path/to/file <url> or
|
|
|
|
curl -X POST -d @file <url> .
|
|
|
|
"""
|
2012-04-16 18:40:28 +02:00
|
|
|
length = self.getContentLength()
|
|
|
|
if length < 0:
|
|
|
|
return
|
|
|
|
ctype = self.headers.getheader('Content-Type')
|
2012-04-12 13:17:55 +02:00
|
|
|
|
|
|
|
# check for multipart/form-data.
|
2012-04-07 02:57:06 +02:00
|
|
|
if not (ctype and ctype.lower().startswith("multipart/form-data")):
|
2012-04-07 22:34:34 +02:00
|
|
|
# not a normal multipart request ==> handle as PUT request
|
2012-04-12 13:17:55 +02:00
|
|
|
return self.do_PUT(fromPost=True)
|
2012-04-07 02:57:06 +02:00
|
|
|
|
2012-04-12 13:17:55 +02:00
|
|
|
# create FieldStorage object for multipart parsing
|
|
|
|
env = os.environ
|
|
|
|
env['REQUEST_METHOD'] = "POST"
|
|
|
|
fstorage = cgi.FieldStorage(fp=self.rfile, headers=self.headers, environ=env)
|
2012-04-07 02:57:06 +02:00
|
|
|
if not "file" in fstorage:
|
|
|
|
self.sendResponse(400, "No file found in request.")
|
|
|
|
return
|
2012-04-12 13:17:55 +02:00
|
|
|
|
2012-04-07 18:48:48 +02:00
|
|
|
destFileName = self.getTargetName(fstorage["file"].filename)
|
|
|
|
if destFileName == "":
|
2012-04-12 13:17:55 +02:00
|
|
|
self.sendResponse(400, "Filename was empty or invalid")
|
2012-04-07 02:57:06 +02:00
|
|
|
return
|
2012-04-12 13:17:55 +02:00
|
|
|
|
2012-04-28 17:52:57 +02:00
|
|
|
# write file down to disk, send an
|
2012-04-07 02:57:06 +02:00
|
|
|
target = open(destFileName, "w")
|
2012-04-16 18:40:28 +02:00
|
|
|
target.write(fstorage["file"].file.read(length))
|
2012-04-07 02:57:06 +02:00
|
|
|
target.close()
|
2012-05-04 13:26:25 +02:00
|
|
|
self.sendResponse(200, "OK! Thanks for uploading")
|
|
|
|
print "Received file '%s' from %s." % (destFileName, self.client_address[0])
|
2012-04-07 02:57:06 +02:00
|
|
|
|
2012-04-12 13:17:55 +02:00
|
|
|
def do_PUT(self, fromPost=False):
|
|
|
|
""" Upload a file via PUT
|
|
|
|
|
|
|
|
The request path is used as filename, so uploading a file to the url
|
|
|
|
http://host:8080/testfile will cause the file to be named testfile. If
|
|
|
|
no filename is given, a random name will be generated.
|
|
|
|
|
|
|
|
Files can be uploaded with e.g. curl -X POST -d @file <url> .
|
|
|
|
"""
|
2012-04-16 18:40:28 +02:00
|
|
|
length = self.getContentLength()
|
|
|
|
if length < 0:
|
2012-04-07 18:50:24 +02:00
|
|
|
return
|
|
|
|
|
|
|
|
fileName = urllib.unquote(self.path)
|
|
|
|
if fileName == "/":
|
2012-04-12 13:17:55 +02:00
|
|
|
# if no filename was given we have to generate one
|
2012-04-07 18:50:24 +02:00
|
|
|
fileName = str(time.time())
|
2012-04-12 13:17:55 +02:00
|
|
|
|
2012-04-07 18:50:24 +02:00
|
|
|
cleanFileName = self.getTargetName(fileName)
|
|
|
|
if cleanFileName == "":
|
|
|
|
self.sendResponse(400, "Filename was invalid")
|
|
|
|
return
|
2012-04-12 13:17:55 +02:00
|
|
|
|
|
|
|
# Sometimes clients want to be told to continue with their transfer
|
2012-04-07 18:50:24 +02:00
|
|
|
if self.headers.getheader("Expect") == "100-continue":
|
|
|
|
self.send_response(100)
|
|
|
|
self.end_headers()
|
2012-04-12 13:17:55 +02:00
|
|
|
|
2012-04-07 18:50:24 +02:00
|
|
|
target = open(cleanFileName, "w")
|
|
|
|
target.write(self.rfile.read(int(self.headers['Content-Length'])))
|
|
|
|
target.close()
|
2012-04-12 13:17:55 +02:00
|
|
|
self.sendResponse(fromPost and 200 or 201, "OK!")
|
2012-04-07 18:50:24 +02:00
|
|
|
|
2012-04-16 18:40:28 +02:00
|
|
|
def getContentLength(self):
|
|
|
|
length = 0
|
|
|
|
try:
|
|
|
|
length = int(self.headers['Content-Length'])
|
|
|
|
except (ValueError, KeyError):
|
|
|
|
pass
|
|
|
|
if length <= 0:
|
2012-04-20 04:23:23 +02:00
|
|
|
self.sendResponse(411, "Content-Length was invalid or not set.")
|
2012-04-16 18:40:28 +02:00
|
|
|
return -1
|
2012-04-26 14:52:25 +02:00
|
|
|
if self.maxUploadSize > 0 and length > self.maxUploadSize:
|
2012-04-16 18:40:28 +02:00
|
|
|
self.sendResponse(413, "Your file was too big! Maximum allowed size is %d byte. <a href=\"/\">back</a>" % self.maxUploadSize)
|
|
|
|
return -1
|
|
|
|
return length
|
|
|
|
|
2012-04-07 02:57:06 +02:00
|
|
|
def sendResponse(self, code, msg):
|
2012-05-04 13:17:40 +02:00
|
|
|
""" Send a HTTP response with HTTP statuscode code and message msg,
|
|
|
|
providing the correct content-length.
|
2012-04-12 13:17:55 +02:00
|
|
|
"""
|
2012-04-07 02:57:06 +02:00
|
|
|
self.send_response(code)
|
|
|
|
self.send_header('Content-Type', 'text/html')
|
2012-04-13 20:17:48 +02:00
|
|
|
self.send_header('Content-Length', str(len(msg)))
|
2012-04-05 15:56:28 +02:00
|
|
|
self.end_headers()
|
2012-04-07 02:57:06 +02:00
|
|
|
self.wfile.write(msg)
|
2012-04-07 18:50:24 +02:00
|
|
|
|
2012-04-07 18:48:48 +02:00
|
|
|
def getTargetName(self, fname):
|
2012-04-12 13:17:55 +02:00
|
|
|
""" Generate a clean and secure filename.
|
|
|
|
|
|
|
|
This function takes a filename and strips all the slashes out of it.
|
2012-04-28 17:52:57 +02:00
|
|
|
If the file already exists in the target directory, a (NUM) will be
|
2012-04-12 13:17:55 +02:00
|
|
|
appended, so no file will be overwritten.
|
|
|
|
"""
|
2012-04-07 18:48:48 +02:00
|
|
|
cleanFileName = fname.replace("/", "")
|
|
|
|
if cleanFileName == "":
|
|
|
|
return ""
|
|
|
|
destFileName = self.targetDir + "/" + cleanFileName
|
|
|
|
if not os.path.exists(destFileName):
|
|
|
|
return destFileName
|
|
|
|
else:
|
|
|
|
i = 1
|
|
|
|
extraDestFileName = destFileName + "(%s)" % i
|
|
|
|
while os.path.exists(extraDestFileName):
|
|
|
|
i += 1
|
|
|
|
extraDestFileName = destFileName + "(%s)" % i
|
|
|
|
return extraDestFileName
|
|
|
|
# never reached
|
2012-04-07 02:57:06 +02:00
|
|
|
|
|
|
|
class ThreadedHTTPServer(SocketServer.ThreadingMixIn, BaseHTTPServer.HTTPServer):
|
2012-04-05 15:56:28 +02:00
|
|
|
pass
|
|
|
|
|
2012-04-14 22:31:09 +02:00
|
|
|
def catchSSLErrors(BaseSSLClass):
|
|
|
|
""" Class decorator which catches SSL errors and prints them. """
|
|
|
|
class X(BaseSSLClass):
|
|
|
|
def handle_one_request(self, *args, **kwargs):
|
|
|
|
try:
|
|
|
|
BaseSSLClass.handle_one_request(self, *args, **kwargs)
|
|
|
|
except SSL.Error, e:
|
|
|
|
if str(e) == "":
|
|
|
|
print "%s SSL Error (Empty error message)" % (self.client_address[0],)
|
|
|
|
else:
|
|
|
|
print "%s SSL Error: %s" % (self.client_address[0], e)
|
|
|
|
return X
|
|
|
|
|
|
|
|
class SecureThreadedHTTPServer(ThreadedHTTPServer):
|
|
|
|
def __init__(self, pubKey, privKey, *args, **kwargs):
|
|
|
|
ThreadedHTTPServer.__init__(self, *args, **kwargs)
|
|
|
|
ctx = SSL.Context(SSL.SSLv23_METHOD)
|
2012-04-16 14:51:12 +02:00
|
|
|
if type(pubKey) == crypto.X509 and type(privKey) == crypto.PKey:
|
|
|
|
ctx.use_certificate(pubKey)
|
|
|
|
ctx.use_privatekey(privKey)
|
|
|
|
else:
|
|
|
|
ctx.use_certificate_file(pubKey)
|
|
|
|
ctx.use_privatekey_file(privKey)
|
2012-04-14 22:31:09 +02:00
|
|
|
|
|
|
|
self.bsocket = socket.socket(self.address_family, self.socket_type)
|
|
|
|
self.socket = SSL.Connection(ctx, self.bsocket)
|
|
|
|
|
|
|
|
self.server_bind()
|
|
|
|
self.server_activate()
|
|
|
|
|
|
|
|
def shutdown_request(self, request):
|
|
|
|
request.shutdown()
|
|
|
|
|
|
|
|
class SecureHandler():
|
|
|
|
def setup(self):
|
|
|
|
self.connection = self.request
|
|
|
|
self.rfile = socket._fileobject(self.request, "rb", self.rbufsize)
|
|
|
|
self.wfile = socket._fileobject(self.request, "wb", self.wbufsize)
|
|
|
|
|
2012-04-13 20:17:48 +02:00
|
|
|
class ServeFileException(Exception):
|
|
|
|
pass
|
|
|
|
|
|
|
|
class ServeFile():
|
|
|
|
""" Main class to manage everything. """
|
|
|
|
|
2012-04-27 15:37:35 +02:00
|
|
|
_NUM_MODES = 4
|
|
|
|
(MODE_SINGLE, MODE_SINGLETAR, MODE_UPLOAD, MODE_LISTDIR) = range(_NUM_MODES)
|
2012-04-13 20:17:48 +02:00
|
|
|
|
2012-04-14 22:31:09 +02:00
|
|
|
def __init__(self, target, port=8080, serveMode=0, useSSL=False):
|
2012-04-13 20:17:48 +02:00
|
|
|
self.target = target
|
|
|
|
self.port = port
|
|
|
|
self.serveMode = serveMode
|
|
|
|
self.dirCreated = False
|
2012-04-14 22:31:09 +02:00
|
|
|
self.useSSL = useSSL
|
2012-04-16 14:51:12 +02:00
|
|
|
self.cert = self.key = None
|
2012-04-16 16:36:40 +02:00
|
|
|
self.auth = None
|
2012-04-16 18:40:28 +02:00
|
|
|
self.maxUploadSize = 0
|
2012-04-13 20:17:48 +02:00
|
|
|
|
2012-04-27 15:37:35 +02:00
|
|
|
if self.serveMode not in range(self._NUM_MODES):
|
2012-04-13 20:17:48 +02:00
|
|
|
self.serveMode = None
|
2012-05-04 13:17:40 +02:00
|
|
|
raise ValueError("Unknown serve mode, needs to be MODE_SINGLE, MODE_SINGLETAR, MODE_UPLOAD or MODE_DIRLIST.")
|
2012-04-13 20:17:48 +02:00
|
|
|
|
|
|
|
def getIPs(self):
|
|
|
|
""" Get IPs from all interfaces via ip or ifconfig. """
|
|
|
|
# ip and ifconfig sometimes are located in /sbin/
|
|
|
|
os.environ['PATH'] += ':/sbin:/usr/sbin'
|
|
|
|
proc = Popen(r"ip addr|" + \
|
|
|
|
"sed -n -e 's/.*inet6\? \([0-9.a-fA-F:]\+\)\/.*/\\1/ p'|" + \
|
2012-04-16 16:42:17 +02:00
|
|
|
"grep -v '^fe80\|^127.0.0.1\|^::1'", \
|
|
|
|
shell=True, stdout=PIPE, stderr=PIPE)
|
2012-04-13 20:17:48 +02:00
|
|
|
if proc.wait() != 0:
|
|
|
|
# ip failed somehow, falling back to ifconfig
|
|
|
|
oldLang = os.environ.get("LC_ALL", None)
|
|
|
|
os.environ['LC_ALL'] = "C"
|
|
|
|
proc = Popen(r"ifconfig|" + \
|
|
|
|
"sed -n 's/.*inet6\? addr: \?\([0-9a-fA-F.:]*\).*/" + \
|
|
|
|
"\\1/p'|" + \
|
|
|
|
"grep -v '^fe80\|^127.0.0.1\|^::1'", \
|
|
|
|
shell=True, stdout=PIPE, stderr=PIPE)
|
|
|
|
if oldLang:
|
|
|
|
os.environ['LC_ALL'] = oldLang
|
|
|
|
else:
|
|
|
|
del(os.environ['LC_ALL'])
|
|
|
|
if proc.wait() != 0:
|
2012-04-14 22:31:09 +02:00
|
|
|
# we couldn't find any ip address
|
2012-04-13 20:17:48 +02:00
|
|
|
proc = None
|
|
|
|
if proc:
|
|
|
|
ips = proc.stdout.read().strip().split("\n")
|
|
|
|
# FIXME: When BaseHTTP supports ipv6 properly, delete this line
|
|
|
|
ips = filter(lambda ip: ip.find(":") == -1, ips)
|
|
|
|
return ips
|
|
|
|
return None
|
2012-04-14 22:31:09 +02:00
|
|
|
|
2012-04-16 14:51:12 +02:00
|
|
|
def setSSLKeys(self, cert, key):
|
|
|
|
""" Set SSL cert/key. Can be either path to file or pyssl X509/PKey object. """
|
|
|
|
self.cert = cert
|
|
|
|
self.key = key
|
|
|
|
|
2012-04-16 18:40:28 +02:00
|
|
|
def setMaxUploadSize(self, limit):
|
|
|
|
""" Set the maximum upload size in byte """
|
|
|
|
self.maxUploadSize = limit
|
|
|
|
|
2012-04-27 03:52:07 +02:00
|
|
|
def setCompression(self, compression):
|
|
|
|
""" Set the compression of TarFileHandler """
|
|
|
|
if self.serveMode != self.MODE_SINGLETAR:
|
2012-05-04 13:17:40 +02:00
|
|
|
raise ServeFileException("Compression mode can only be set in tar-mode.")
|
2012-04-27 03:52:07 +02:00
|
|
|
if compression not in TarFileHandler.compressionMethods:
|
2012-05-04 13:17:40 +02:00
|
|
|
raise ServeFileException("Compression mode not available.")
|
2012-04-27 03:52:07 +02:00
|
|
|
TarFileHandler.compression = compression
|
|
|
|
|
2012-04-16 14:51:12 +02:00
|
|
|
def genKeyPair(self):
|
2012-04-16 16:36:31 +02:00
|
|
|
print "Generating SSL certificate...",
|
|
|
|
sys.stdout.flush()
|
|
|
|
|
2012-04-16 14:51:12 +02:00
|
|
|
pkey = crypto.PKey()
|
|
|
|
pkey.generate_key(crypto.TYPE_RSA, 2048)
|
|
|
|
|
|
|
|
req = crypto.X509Req()
|
|
|
|
subj = req.get_subject()
|
|
|
|
subj.CN = "127.0.0.1"
|
|
|
|
subj.O = "servefile laboratories"
|
|
|
|
subj.OU = "servefile"
|
|
|
|
|
|
|
|
# generate altnames
|
|
|
|
altNames = []
|
|
|
|
for ip in self.getIPs() + ["127.0.0.1"]:
|
|
|
|
altNames.append("IP:%s" % ip)
|
|
|
|
altNames.append("DNS:localhost")
|
|
|
|
ext = crypto.X509Extension("subjectAltName", False, ",".join(altNames))
|
|
|
|
req.add_extensions([ext])
|
|
|
|
|
|
|
|
req.set_pubkey(pkey)
|
|
|
|
req.sign(pkey, "sha1")
|
|
|
|
|
|
|
|
cert = crypto.X509()
|
|
|
|
# some browsers complain if they see a cert from the same authority
|
|
|
|
# with the same serial ==> we just use the seconds as serial.
|
|
|
|
cert.set_serial_number(int(time.time()))
|
|
|
|
cert.gmtime_adj_notBefore(0)
|
|
|
|
cert.gmtime_adj_notAfter(365*24*60*60)
|
|
|
|
cert.set_issuer(req.get_subject())
|
|
|
|
cert.set_subject(req.get_subject())
|
|
|
|
cert.add_extensions([ext])
|
|
|
|
cert.set_pubkey(req.get_pubkey())
|
|
|
|
cert.sign(pkey, "sha1")
|
|
|
|
|
|
|
|
self.cert = cert
|
|
|
|
self.key = pkey
|
2012-04-16 16:36:31 +02:00
|
|
|
|
|
|
|
print "done."
|
2012-04-20 04:22:02 +02:00
|
|
|
print "SHA1 fingerprint:", cert.digest("sha1")
|
|
|
|
print "MD5 fingerprint:", cert.digest("md5")
|
2012-04-28 17:52:57 +02:00
|
|
|
|
2012-04-14 22:31:09 +02:00
|
|
|
def _getCert(self):
|
2012-04-16 14:51:12 +02:00
|
|
|
return self.cert
|
2012-04-14 22:31:09 +02:00
|
|
|
|
|
|
|
def _getKey(self):
|
2012-04-16 14:51:12 +02:00
|
|
|
return self.key
|
2012-04-28 17:52:57 +02:00
|
|
|
|
2012-04-16 16:36:40 +02:00
|
|
|
def setAuth(self, user, password):
|
|
|
|
if len(user) == "" or len(password) == "":
|
2012-05-04 13:17:40 +02:00
|
|
|
raise ServeFileException("User and password both need to be at least one character.")
|
2012-04-16 16:36:40 +02:00
|
|
|
self.auth = base64.b64encode("%s:%s" % (user, password))
|
|
|
|
|
2012-04-14 22:31:09 +02:00
|
|
|
def _createServer(self, handler):
|
|
|
|
server = None
|
|
|
|
if self.useSSL:
|
2012-04-16 14:51:12 +02:00
|
|
|
if not self._getKey():
|
|
|
|
self.genKeyPair()
|
2012-04-14 22:31:09 +02:00
|
|
|
server = SecureThreadedHTTPServer(self._getCert(), self._getKey(), ('', self.port), handler)
|
|
|
|
else:
|
|
|
|
server = ThreadedHTTPServer(('', self.port), handler)
|
|
|
|
return server
|
|
|
|
|
2012-04-13 20:17:48 +02:00
|
|
|
def serve(self):
|
|
|
|
self.handler = self._confAndFindHandler()
|
2012-04-14 22:31:09 +02:00
|
|
|
self.server = self._createServer(self.handler)
|
|
|
|
|
2012-04-13 20:17:48 +02:00
|
|
|
if self.serveMode != self.MODE_UPLOAD:
|
2012-05-04 13:17:40 +02:00
|
|
|
print "Serving \"%s\" at port %d." % (self.target, self.port)
|
2012-04-13 20:17:48 +02:00
|
|
|
else:
|
2012-05-04 13:17:40 +02:00
|
|
|
print "Serving \"%s\" for uploads at port %d." % (self.target, self.port)
|
2012-04-13 20:17:48 +02:00
|
|
|
|
|
|
|
# print urls with local network adresses
|
2012-05-04 13:17:40 +02:00
|
|
|
print "\nSome addresses %s will be available at:" % \
|
|
|
|
((self.serveMode != self.MODE_UPLOAD) and "this file" or "the uploadform", )
|
2012-04-13 20:17:48 +02:00
|
|
|
ips = self.getIPs()
|
|
|
|
if not ips or len(ips) == 0 or ips[0] == '':
|
2012-05-04 13:17:40 +02:00
|
|
|
print "Could not find any addresses."
|
2012-04-13 20:17:48 +02:00
|
|
|
else:
|
|
|
|
for ip in ips:
|
2012-05-04 13:17:40 +02:00
|
|
|
print "\thttp%s://%s:%d/" % (self.useSSL and "s" or "", ip, self.port)
|
2012-04-13 20:17:48 +02:00
|
|
|
print ""
|
|
|
|
|
|
|
|
try:
|
2012-04-14 22:31:09 +02:00
|
|
|
self.server.serve_forever()
|
2012-04-13 20:17:48 +02:00
|
|
|
except KeyboardInterrupt:
|
2012-04-14 22:31:09 +02:00
|
|
|
self.server.socket.close()
|
2012-04-13 20:17:48 +02:00
|
|
|
|
|
|
|
# cleanup potential upload directory
|
|
|
|
if self.dirCreated and len(os.listdir(self.target)) == 0:
|
|
|
|
# created upload dir was not used
|
|
|
|
os.rmdir(self.target)
|
|
|
|
|
|
|
|
def _confAndFindHandler(self):
|
|
|
|
handler = None
|
|
|
|
if self.serveMode == self.MODE_SINGLE:
|
|
|
|
try:
|
|
|
|
testit = open(self.target, 'r')
|
|
|
|
testit.close()
|
|
|
|
FileHandler.filePath = self.target
|
|
|
|
FileHandler.fileName = os.path.basename(self.target)
|
|
|
|
FileHandler.fileLength = os.stat(self.target)[ST_SIZE]
|
|
|
|
except IOError:
|
|
|
|
raise ServeFileException("Error: Could not open file!")
|
|
|
|
handler = FileHandler
|
2012-04-27 03:52:07 +02:00
|
|
|
elif self.serveMode == self.MODE_SINGLETAR:
|
2012-04-27 15:43:58 +02:00
|
|
|
self.realTarget = os.path.realpath(self.target)
|
|
|
|
if not os.path.exists(self.realTarget):
|
2012-05-04 13:17:40 +02:00
|
|
|
raise ServeFileException("Error: Could not open file or directory.")
|
2012-04-27 15:43:58 +02:00
|
|
|
TarFileHandler.target = self.realTarget
|
2012-04-27 17:39:12 +02:00
|
|
|
TarFileHandler.fileName = os.path.basename(self.realTarget.rstrip("/")) + TarFileHandler.getCompressionExt()
|
2012-04-27 03:52:07 +02:00
|
|
|
|
|
|
|
handler = TarFileHandler
|
2012-04-13 20:17:48 +02:00
|
|
|
elif self.serveMode == self.MODE_UPLOAD:
|
|
|
|
if os.path.isdir(self.target):
|
2012-05-04 13:17:40 +02:00
|
|
|
print "Warning: Uploading to an already existing directory."
|
2012-04-13 20:17:48 +02:00
|
|
|
elif not os.path.exists(self.target):
|
|
|
|
self.dirCreated = True
|
|
|
|
try:
|
|
|
|
os.mkdir(self.target)
|
|
|
|
except IOError, OSError:
|
2012-05-04 13:17:40 +02:00
|
|
|
raise ServeFileException("Error: Could not create directory '%s' for uploads." % (self.target,) )
|
2012-04-13 20:17:48 +02:00
|
|
|
else:
|
2012-05-04 13:17:40 +02:00
|
|
|
raise ServeFileException("Error: Upload directory already exists and is a file.")
|
2012-04-13 20:17:48 +02:00
|
|
|
FilePutter.targetDir = self.target
|
2012-04-16 18:40:28 +02:00
|
|
|
FilePutter.maxUploadSize = self.maxUploadSize
|
2012-04-13 20:17:48 +02:00
|
|
|
handler = FilePutter
|
2012-04-16 19:10:36 +02:00
|
|
|
elif self.serveMode == self.MODE_LISTDIR:
|
|
|
|
try:
|
|
|
|
os.chdir(self.target)
|
|
|
|
except OSError:
|
2012-05-04 13:17:40 +02:00
|
|
|
raise ServeFileException("Error: Could not change directory to '%s'." % self.target)
|
2012-04-16 19:10:36 +02:00
|
|
|
handler = SimpleHTTPServer.SimpleHTTPRequestHandler
|
2012-04-28 17:52:57 +02:00
|
|
|
|
2012-04-14 22:31:09 +02:00
|
|
|
|
2012-04-16 16:36:40 +02:00
|
|
|
if self.auth:
|
|
|
|
# do authentication
|
|
|
|
AuthenticationHandler.authString = self.auth
|
|
|
|
class AuthenticatedHandler(AuthenticationHandler, handler):
|
|
|
|
pass
|
|
|
|
handler = AuthenticatedHandler
|
|
|
|
|
2012-04-14 22:31:09 +02:00
|
|
|
if self.useSSL:
|
|
|
|
# secure handler
|
|
|
|
@catchSSLErrors
|
|
|
|
class AlreadySecuredHandler(SecureHandler, handler):
|
|
|
|
pass
|
|
|
|
handler = AlreadySecuredHandler
|
2012-04-13 20:17:48 +02:00
|
|
|
return handler
|
|
|
|
|
2012-04-16 16:36:40 +02:00
|
|
|
class AuthenticationHandler():
|
|
|
|
# base64 encoded user:password string for authentication
|
|
|
|
authString = None
|
|
|
|
realm = "Restricted area"
|
|
|
|
|
|
|
|
def handle_one_request(self):
|
|
|
|
""" Overloaded function to handle one request.
|
|
|
|
|
|
|
|
Before calling the responsible do_METHOD function, check credentials
|
|
|
|
"""
|
|
|
|
self.raw_requestline = self.rfile.readline()
|
|
|
|
if not self.raw_requestline:
|
|
|
|
self.close_connection = 1
|
|
|
|
return
|
|
|
|
if not self.parse_request(): # An error code has been sent, just exit
|
|
|
|
return
|
|
|
|
|
|
|
|
authorized = False
|
|
|
|
if "Authorization" in self.headers:
|
|
|
|
if self.headers["Authorization"] == ("Basic " + self.authString):
|
|
|
|
authorized = True
|
|
|
|
if authorized:
|
|
|
|
mname = 'do_' + self.command
|
|
|
|
if not hasattr(self, mname):
|
|
|
|
self.send_error(501, "Unsupported method (%r)" % self.command)
|
|
|
|
return
|
|
|
|
method = getattr(self, mname)
|
|
|
|
method()
|
|
|
|
else:
|
|
|
|
self.send_response(401)
|
|
|
|
self.send_header("WWW-Authenticate", "Basic realm=\"%s\"" % self.realm)
|
|
|
|
|
2012-03-12 15:41:55 +01:00
|
|
|
def main():
|
2012-05-04 13:17:40 +02:00
|
|
|
parser = argparse.ArgumentParser(description='Serve a single file via HTTP.')
|
2012-03-18 04:53:28 +01:00
|
|
|
parser.add_argument('--version', action='version', version='%(prog)s ' + __version__)
|
2012-04-13 20:17:48 +02:00
|
|
|
parser.add_argument('target', metavar='file/directory', type=str)
|
2012-03-18 02:04:58 +01:00
|
|
|
parser.add_argument('-p', '--port', type=int, default=8080, \
|
2012-05-04 13:17:40 +02:00
|
|
|
help='Port to listen on')
|
2012-04-05 15:56:28 +02:00
|
|
|
parser.add_argument('-u', '--upload', action="store_true", default=False, \
|
|
|
|
help="Enable uploads to a given directory")
|
2012-04-16 18:40:28 +02:00
|
|
|
parser.add_argument('-s', '--max-upload-size', type=str, \
|
2012-05-04 13:17:40 +02:00
|
|
|
help="Limit upload size in kB. Size modifiers are allowed, e.g. 2G, 12MB, 1B")
|
2012-04-16 19:10:36 +02:00
|
|
|
parser.add_argument('-l', '--list-dir', action="store_true", default=False, \
|
|
|
|
help="Show directory indexes and allow access to all subdirectories")
|
2012-04-14 22:31:09 +02:00
|
|
|
parser.add_argument('--ssl', action="store_true", default=False, \
|
2012-05-04 13:17:40 +02:00
|
|
|
help="Enable SSL. If no key/cert is specified one will be generated")
|
2012-04-14 22:31:09 +02:00
|
|
|
parser.add_argument('--key', type=str, \
|
|
|
|
help="Keyfile to use for SSL. If no cert is given with --cert the keyfile will also be searched for a cert")
|
|
|
|
parser.add_argument('--cert', type=str, \
|
|
|
|
help="Certfile to use for SSL")
|
2012-04-16 16:36:40 +02:00
|
|
|
parser.add_argument('-a', '--auth', type=str, metavar='user:password', \
|
|
|
|
help="Set user and password for HTTP basic authentication")
|
2012-04-27 03:52:07 +02:00
|
|
|
parser.add_argument('-t', '--tar', action="store_true", default=False, \
|
2012-05-04 13:17:40 +02:00
|
|
|
help="Enable on the fly tar creation for given file or directory. Note: Download continuation will not be available")
|
2012-04-27 03:52:07 +02:00
|
|
|
parser.add_argument('-c', '--compression', type=str, metavar='method', \
|
|
|
|
default="none", \
|
2012-05-04 13:17:40 +02:00
|
|
|
help="Set compression method, only in combination with --tar. Can be one of %s" % ", ".join(TarFileHandler.compressionMethods))
|
2012-04-28 17:52:57 +02:00
|
|
|
|
2012-03-18 02:04:58 +01:00
|
|
|
args = parser.parse_args()
|
2012-04-16 18:40:28 +02:00
|
|
|
maxUploadSize = 0
|
|
|
|
|
|
|
|
# check for invalid option combinations/preparse stuff
|
|
|
|
if args.max_upload_size and not args.upload:
|
2012-05-04 13:17:40 +02:00
|
|
|
print "Error: Maximum upload size can only be specified when in upload mode."
|
2012-04-16 18:40:28 +02:00
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
if args.max_upload_size:
|
|
|
|
sizeRe = re.match("^(\d+(?:[,.]\d+)?)(?:([bkmgtpe])(?:(?<!b)b?)?)?$", args.max_upload_size.lower())
|
|
|
|
if not sizeRe:
|
|
|
|
print "Error: Your max upload size param is broken."
|
|
|
|
sys.exit(1)
|
|
|
|
uploadSize, modifier = sizeRe.groups()
|
|
|
|
uploadSize = float(uploadSize.replace(",", "."))
|
|
|
|
sizes = ["b", "k", "m", "g", "t", "p", "e"]
|
|
|
|
maxUploadSize = int(uploadSize * pow(1024, sizes.index(modifier or "k")))
|
|
|
|
if maxUploadSize < 0:
|
|
|
|
print "Error: Your max upload size can't be negative"
|
|
|
|
sys.exit(1)
|
2012-04-07 02:57:06 +02:00
|
|
|
|
2012-04-14 22:31:09 +02:00
|
|
|
if args.ssl and not HAVE_SSL:
|
2012-05-04 13:17:40 +02:00
|
|
|
print "Error: SSL is not available, please install pyssl (python-openssl)."
|
2012-04-14 22:31:09 +02:00
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
if args.cert and not args.key:
|
2012-05-04 13:17:40 +02:00
|
|
|
print "Error: Please specify a key along with your cert."
|
2012-04-14 22:31:09 +02:00
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
if not args.ssl and (args.cert or args.key):
|
2012-05-04 13:17:40 +02:00
|
|
|
print "Error: You need to enable ssl with --ssl when specifying certs/keys."
|
2012-04-14 22:31:09 +02:00
|
|
|
sys.exit(1)
|
2012-04-13 20:17:48 +02:00
|
|
|
|
2012-04-16 16:36:40 +02:00
|
|
|
if args.auth:
|
|
|
|
dpos = args.auth.find(":")
|
|
|
|
if dpos <= 0 or dpos == (len(args.auth)-1):
|
2012-05-04 13:17:40 +02:00
|
|
|
print "Error: User and password for HTTP basic authentication need to be both at least one character band have to be seperated by a \":\"."
|
2012-04-16 16:36:40 +02:00
|
|
|
sys.exit(1)
|
|
|
|
|
2012-04-27 03:52:07 +02:00
|
|
|
if args.compression != "none" and not args.tar:
|
2012-05-04 13:17:40 +02:00
|
|
|
print "Error: Please use --tar if you want to tar everything."
|
2012-04-27 03:52:07 +02:00
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
if args.tar and args.upload:
|
2012-05-04 13:17:40 +02:00
|
|
|
print "Error: --tar mode will not work with uploads."
|
2012-04-27 03:52:07 +02:00
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
if args.tar and args.list_dir:
|
2012-05-04 13:17:40 +02:00
|
|
|
print "Error: --tar mode will not work with directory listings."
|
2012-04-27 03:52:07 +02:00
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
compression = None
|
|
|
|
if args.compression:
|
|
|
|
if args.compression in TarFileHandler.compressionMethods:
|
|
|
|
compression = args.compression
|
|
|
|
else:
|
2012-05-04 13:17:40 +02:00
|
|
|
print "Error: Compression mode '%s' is unknown." % self.compression
|
2012-04-27 03:52:07 +02:00
|
|
|
sys.exit(1)
|
|
|
|
|
2012-04-13 20:17:48 +02:00
|
|
|
mode = None
|
2012-04-07 03:02:20 +02:00
|
|
|
if args.upload:
|
2012-04-13 20:17:48 +02:00
|
|
|
mode = ServeFile.MODE_UPLOAD
|
2012-04-16 19:10:36 +02:00
|
|
|
elif args.list_dir:
|
|
|
|
mode = ServeFile.MODE_LISTDIR
|
2012-04-27 03:52:07 +02:00
|
|
|
elif args.tar:
|
|
|
|
mode = ServeFile.MODE_SINGLETAR
|
2012-04-07 03:02:20 +02:00
|
|
|
else:
|
2012-04-13 20:17:48 +02:00
|
|
|
mode = ServeFile.MODE_SINGLE
|
2012-03-18 02:04:58 +01:00
|
|
|
|
2012-04-13 20:17:48 +02:00
|
|
|
server = None
|
2012-03-12 15:41:55 +01:00
|
|
|
try:
|
2012-04-14 22:31:09 +02:00
|
|
|
server = ServeFile(args.target, args.port, mode, args.ssl)
|
2012-04-16 18:40:28 +02:00
|
|
|
if maxUploadSize > 0:
|
|
|
|
server.setMaxUploadSize(maxUploadSize)
|
2012-04-14 22:31:09 +02:00
|
|
|
if args.ssl and args.key:
|
|
|
|
cert = args.cert or args.key
|
2012-04-16 14:51:12 +02:00
|
|
|
server.setSSLKeys(cert, args.key)
|
2012-04-16 16:36:40 +02:00
|
|
|
if args.auth:
|
|
|
|
user, password = args.auth.split(":", 1)
|
|
|
|
server.setAuth(user, password)
|
2012-04-27 03:52:07 +02:00
|
|
|
if compression and compression != "none":
|
|
|
|
server.setCompression(compression)
|
2012-04-13 20:17:48 +02:00
|
|
|
server.serve()
|
|
|
|
except ServeFileException, e:
|
|
|
|
print e
|
|
|
|
sys.exit(1)
|
2012-05-04 13:17:40 +02:00
|
|
|
print "Good bye."
|
2012-04-28 17:52:57 +02:00
|
|
|
|
2012-03-12 15:41:55 +01:00
|
|
|
if __name__ == '__main__':
|
|
|
|
main()
|
2012-04-05 15:56:28 +02:00
|
|
|
|