2011-12-16 22:51:26 +08:00
|
|
|
package storage
|
|
|
|
|
|
|
|
import (
|
2011-12-22 12:04:47 +08:00
|
|
|
"encoding/hex"
|
2011-12-19 13:59:37 +08:00
|
|
|
"io"
|
2011-12-16 22:51:26 +08:00
|
|
|
"io/ioutil"
|
|
|
|
"http"
|
|
|
|
"log"
|
|
|
|
"strings"
|
|
|
|
)
|
|
|
|
|
2011-12-19 13:59:37 +08:00
|
|
|
type Needle struct {
|
2011-12-20 17:00:01 +08:00
|
|
|
Cookie uint32 "random number to mitigate brute force lookups"
|
|
|
|
Key uint64 "file id"
|
|
|
|
Size uint32 "Data size"
|
|
|
|
Data []byte "The actual file data"
|
|
|
|
Checksum int32 "CRC32 to check integrity"
|
|
|
|
Padding []byte "Aligned to 8 bytes"
|
2011-12-16 22:51:26 +08:00
|
|
|
}
|
|
|
|
|
2011-12-19 13:59:37 +08:00
|
|
|
func NewNeedle(r *http.Request) (n *Needle) {
|
|
|
|
n = new(Needle)
|
|
|
|
form, fe := r.MultipartReader()
|
|
|
|
if fe != nil {
|
|
|
|
log.Fatalf("MultipartReader [ERROR] %s\n", fe)
|
|
|
|
}
|
|
|
|
part, _ := form.NextPart()
|
|
|
|
data, _ := ioutil.ReadAll(part)
|
|
|
|
n.Data = data
|
2011-12-16 22:51:26 +08:00
|
|
|
|
2011-12-22 12:04:47 +08:00
|
|
|
commaSep := strings.LastIndex(r.URL.Path, ",")
|
|
|
|
dotSep := strings.LastIndex(r.URL.Path, ".")
|
|
|
|
fid := r.URL.Path[commaSep+1:]
|
|
|
|
if dotSep > 0 {
|
|
|
|
fid = r.URL.Path[commaSep+1:dotSep]
|
|
|
|
}
|
|
|
|
|
|
|
|
n.ParsePath(fid)
|
2011-12-19 13:59:37 +08:00
|
|
|
|
|
|
|
return
|
2011-12-16 22:51:26 +08:00
|
|
|
}
|
2011-12-22 12:04:47 +08:00
|
|
|
func (n *Needle) ParsePath(fid string) {
|
|
|
|
length := len(fid)
|
|
|
|
if length <= 8 {
|
|
|
|
log.Println("Invalid fid", fid, "length", length)
|
2011-12-20 17:00:01 +08:00
|
|
|
return
|
|
|
|
}
|
2011-12-22 12:04:47 +08:00
|
|
|
n.Key, n.Cookie = ParseKeyHash(fid)
|
2011-12-16 22:51:26 +08:00
|
|
|
}
|
2011-12-19 13:59:37 +08:00
|
|
|
func (n *Needle) Append(w io.Writer) {
|
2011-12-20 10:34:53 +08:00
|
|
|
header := make([]byte, 16)
|
2011-12-20 17:00:01 +08:00
|
|
|
Uint32toBytes(header[0:4], n.Cookie)
|
|
|
|
Uint64toBytes(header[4:12], n.Key)
|
2011-12-19 13:59:37 +08:00
|
|
|
n.Size = uint32(len(n.Data))
|
2011-12-20 17:00:01 +08:00
|
|
|
Uint32toBytes(header[12:16], n.Size)
|
2011-12-19 13:59:37 +08:00
|
|
|
w.Write(header)
|
|
|
|
w.Write(n.Data)
|
2011-12-20 10:34:53 +08:00
|
|
|
rest := 8 - ((n.Size + 16 + 4) % 8)
|
2011-12-20 17:00:01 +08:00
|
|
|
Uint32toBytes(header[0:4], uint32(n.Checksum))
|
2011-12-19 13:59:37 +08:00
|
|
|
w.Write(header[0 : rest+4])
|
2011-12-16 22:51:26 +08:00
|
|
|
}
|
2011-12-19 13:59:37 +08:00
|
|
|
func (n *Needle) Read(r io.Reader, size uint32) {
|
2011-12-20 10:34:53 +08:00
|
|
|
bytes := make([]byte, size+16+4)
|
2011-12-19 13:59:37 +08:00
|
|
|
r.Read(bytes)
|
2011-12-20 17:00:01 +08:00
|
|
|
n.Cookie = BytesToUint32(bytes[0:4])
|
|
|
|
n.Key = BytesToUint64(bytes[4:12])
|
|
|
|
n.Size = BytesToUint32(bytes[12:16])
|
2011-12-20 10:34:53 +08:00
|
|
|
n.Data = bytes[16 : 16+size]
|
2011-12-20 17:00:01 +08:00
|
|
|
n.Checksum = int32(BytesToUint32(bytes[16+size : 16+size+4]))
|
2011-12-16 22:51:26 +08:00
|
|
|
}
|
2011-12-22 12:04:47 +08:00
|
|
|
func ParseKeyHash(key_hash_string string)(uint64,uint32) {
|
|
|
|
key_hash_bytes, khe := hex.DecodeString(key_hash_string)
|
|
|
|
key_hash_len := len(key_hash_bytes)
|
|
|
|
if khe != nil || key_hash_len <= 4 {
|
|
|
|
log.Println("Invalid key_hash", key_hash_string, "length:", key_hash_len, "error", khe)
|
|
|
|
return 0, 0
|
|
|
|
}
|
|
|
|
key := BytesToUint64(key_hash_bytes[0 : key_hash_len-4])
|
|
|
|
hash := BytesToUint32(key_hash_bytes[key_hash_len-4 : key_hash_len])
|
|
|
|
return key, hash
|
|
|
|
}
|