mirror of https://github.com/Jackett/Jackett
105 lines
4.0 KiB
C#
105 lines
4.0 KiB
C#
using System;
|
|
using System.IO;
|
|
using System.Text;
|
|
using System.Threading.Tasks;
|
|
using Jackett.Common.Models.Config;
|
|
using Jackett.Common.Services.Interfaces;
|
|
using Jackett.Common.Utils;
|
|
using Microsoft.AspNetCore.Authorization;
|
|
using Microsoft.AspNetCore.Mvc;
|
|
using Microsoft.AspNetCore.WebUtilities;
|
|
using Newtonsoft.Json.Linq;
|
|
using NLog;
|
|
|
|
namespace Jackett.Server.Controllers
|
|
{
|
|
[AllowAnonymous]
|
|
[ResponseCache(Location = ResponseCacheLocation.None, NoStore = true)]
|
|
[Route("bh/{indexerID}")]
|
|
public class BlackholeController : Controller
|
|
{
|
|
private Logger logger;
|
|
private IIndexerManagerService indexerService;
|
|
private ServerConfig serverConfig;
|
|
private IProtectionService protectionService;
|
|
|
|
public BlackholeController(IIndexerManagerService i, Logger l, ServerConfig sConfig, IProtectionService ps)
|
|
{
|
|
logger = l;
|
|
indexerService = i;
|
|
serverConfig = sConfig;
|
|
protectionService = ps;
|
|
}
|
|
|
|
[HttpGet]
|
|
public async Task<IActionResult> Blackhole(string indexerID, string path, string jackett_apikey, string file)
|
|
{
|
|
var jsonReply = new JObject();
|
|
try
|
|
{
|
|
if (serverConfig.APIKey != jackett_apikey)
|
|
return Unauthorized();
|
|
|
|
var indexer = indexerService.GetWebIndexer(indexerID);
|
|
if (!indexer.IsConfigured)
|
|
{
|
|
logger.Warn(string.Format("Rejected a request to {0} which is unconfigured.", indexer.DisplayName));
|
|
throw new Exception("This indexer is not configured.");
|
|
}
|
|
|
|
path = Encoding.UTF8.GetString(WebEncoders.Base64UrlDecode(path));
|
|
path = protectionService.UnProtect(path);
|
|
var remoteFile = new Uri(path, UriKind.RelativeOrAbsolute);
|
|
var fileExtension = ".torrent";
|
|
|
|
byte[] downloadBytes;
|
|
if (remoteFile.OriginalString.StartsWith("magnet"))
|
|
downloadBytes = Encoding.UTF8.GetBytes(remoteFile.OriginalString);
|
|
else
|
|
downloadBytes = await indexer.Download(remoteFile);
|
|
|
|
// handle magnet URLs
|
|
if (downloadBytes.Length >= 7
|
|
&& downloadBytes[0] == 0x6d // m
|
|
&& downloadBytes[1] == 0x61 // a
|
|
&& downloadBytes[2] == 0x67 // g
|
|
&& downloadBytes[3] == 0x6e // n
|
|
&& downloadBytes[4] == 0x65 // e
|
|
&& downloadBytes[5] == 0x74 // t
|
|
&& downloadBytes[6] == 0x3a // :
|
|
)
|
|
{
|
|
fileExtension = ".magnet";
|
|
}
|
|
|
|
if (string.IsNullOrWhiteSpace(serverConfig.BlackholeDir))
|
|
{
|
|
throw new Exception("Blackhole directory not set!");
|
|
}
|
|
|
|
if (!Directory.Exists(serverConfig.BlackholeDir))
|
|
{
|
|
throw new Exception("Blackhole directory does not exist: " + serverConfig.BlackholeDir);
|
|
}
|
|
|
|
var fileName = DateTime.Now.Ticks.ToString() + "-" + StringUtil.MakeValidFileName(indexer.DisplayName, '_', false);
|
|
if (string.IsNullOrWhiteSpace(file))
|
|
fileName += fileExtension;
|
|
else
|
|
fileName += "-" + StringUtil.MakeValidFileName(file + fileExtension, '_', false); // call MakeValidFileName() again to avoid any possibility of path traversal attacks
|
|
|
|
System.IO.File.WriteAllBytes(Path.Combine(serverConfig.BlackholeDir, fileName), downloadBytes);
|
|
jsonReply["result"] = "success";
|
|
}
|
|
catch (Exception ex)
|
|
{
|
|
logger.Error(ex, "Error downloading to blackhole " + indexerID + " " + path);
|
|
jsonReply["result"] = "error";
|
|
jsonReply["error"] = ex.Message;
|
|
}
|
|
|
|
return Json(jsonReply);
|
|
}
|
|
}
|
|
}
|