For file upload stuff
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
Go to file
ZizzyDizzyMC 573c6b8afc
Merge pull request #34 from urandom2/test
4 weeks ago
.github/workflows Fix GH action (again) 4 years ago
auth/apikeys Split and move auth into a separate package (#224) 4 years ago
backends Update s3.go 3 years ago
cleanup Cleanup: Integrate expired files periodic cleanup 4 years ago
expiry Add linx-cleanup tool 7 years ago
helpers Switch to a more comprehensive mimetype detection library (#231) 4 years ago
httputil Add support for conditional requests (#162) 5 years ago
linx-cleanup Cleanup: Integrate expired files periodic cleanup 4 years ago
linx-genkey Remove artifact 9 years ago
static Update 3 years ago
templates Merge pull request #10 from luckman212/add-default-expiry 3 years ago
torrent Add S3 backend (#156) 5 years ago
.gitignore README: Clarify docker usage and example 4 years ago
.travis.yml Travis: Update to 1.14 4 years ago
Dockerfile Dockerfile: Update to 1.14 4 years ago
LICENSE.txt Updated README and license 9 years ago Update 3 years ago
access.go fix domain field in setAccessKeyCookies 4 years ago build for netbsd (#181) 5 years ago
csp.go Switch to Referrer-Policy header (#149) 6 years ago
csp_test.go Allow changing the "selif" path name 5 years ago
csrf.go Cleanup 9 years ago
custom_pages.go Custom pages: Implement adding custom markdown pages to the site navigation 4 years ago
delete.go Update delete.go 3 years ago
display.go Display pages: Add OpenGraph tags for media 4 years ago
expiry.go Add more time options. 3 years ago
fileserve.go Torrent: Ranged requests so torrents work 4 years ago
go.mod Switch to a more comprehensive mimetype detection library (#231) 4 years ago
go.sum Switch to a more comprehensive mimetype detection library (#231) 4 years ago
headers.go Infer site URL from host and headers 8 years ago
linx-server.conf.example README: Clarify docker usage and example 4 years ago
linx-server.service Add Install-section to systemd-service 8 years ago Changing permissions 3 years ago
pages.go add default expiry config parameter 3 years ago Updating the re-worked ShareX Custom Upload export. 3 years ago
server.go add default expiry config parameter 3 years ago
server_test.go remove broken test 2 years ago
templates.go Default Random Filename flag. 3 years ago
torrent.go Add S3 backend (#156) 5 years ago
torrent_test.go Tests: Fix image torrent test 4 years ago
upload.go Merge pull request #14 from BBaoVanC/fix-linx-randomize-put 4 weeks ago
util.go Highlight.js: Update and add languages 4 years ago


Self-hosted file/media sharing website.


You can see what it looks like using the demo:





  • Display common filetypes (image, video, audio, markdown, pdf)
  • Display syntax-highlighted code with in-place editing
  • Documented API with keys for restricting uploads
  • Torrent download of files using web seeding
  • File expiry, deletion key, file access key, and random filename options


Getting started

Using Docker

  1. Create directories files and meta and run chown -R 65534:65534 meta && chown -R 65534:65534 files
  2. Create a config file (example provided in repo), we'll refer to it as linx-server.conf in the following examples

Example running

docker run -p 8080:8080 -v /path/to/linx-server.conf:/data/linx-server.conf -v /path/to/meta:/data/meta -v /path/to/files:/data/files andreimarcu/linx-server -config /data/linx-server.conf

Example with docker-compose

version: '2.2'
    container_name: linx-server
    image: andreimarcu/linx-server
    command: -config /data/linx-server.conf
      - /path/to/files:/data/files
      - /path/to/meta:/data/meta
      - /path/to/linx-server.conf:/data/linx-server.conf
    network_mode: bridge
      - "8080:8080"
    restart: unless-stopped

Ideally, you would use a reverse proxy such as nginx or caddy to handle TLS certificates.

Using a binary release

  1. Grab the latest binary from the releases, then run go install
  2. Run linx-server -config path/to/linx-server.conf



All configuration options are accepted either as arguments or can be placed in a file as such (see example file linx-server.conf.example in repo):

bind =
sitename = myLinx
maxsize = 4294967296
maxexpiry = 86400
# ... etc

...and then run linx-server -config path/to/linx-server.conf


Option Description
bind = what to bind to (default is
sitename = myLinx the site name displayed on top (default is inferred from Host header)
siteurl = the site url (default is inferred from execution context)
selifpath = selif path relative to site base url (the "selif" in where files are accessed directly (default: selif)
maxsize = 4294967296 maximum upload file size in bytes (default 4GB)
maxexpiry = 86400 maximum expiration time in seconds (default is 0, which is no expiry)
allowhotlink = true Allow file hotlinking
contentsecuritypolicy = "..." Content-Security-Policy header for pages (default is "default-src 'self'; img-src 'self' data:; style-src 'self' 'unsafe-inline'; frame-ancestors 'self';")
filecontentsecuritypolicy = "..." Content-Security-Policy header for files (default is "default-src 'none'; img-src 'self'; object-src 'self'; media-src 'self'; style-src 'self' 'unsafe-inline'; frame-ancestors 'self';")
refererpolicy = "..." Referrer-Policy header for pages (default is "same-origin")
filereferrerpolicy = "..." Referrer-Policy header for files (default is "same-origin")
xframeoptions = "..." X-Frame-Options header (default is "SAMEORIGIN")
remoteuploads = true (optionally) enable remote uploads (/upload?url=https://...)
nologs = true (optionally) disable request logs in stdout
force-random-filename = true (optionally) force the use of random filenames
custompagespath = custom_pages/ (optionally) specify path to directory containing markdown pages (must end in .md) that will be added to the site navigation (this can be useful for providing contact/support information and so on). For example, custom_pages/ will become My Page in the site navigation
extra-footer-text = "..." (optionally) Extra text above the footer for notices.
max-duration-time = 0 Time till expiry for files over max-duration-size. (Default is 0 for no-expiry.)
max-duration-size = 4294967296 Size of file before max-duration-time is used to determine expiry max time. (Default is 4GB)
disable-access-key = true Disables access key usage. (Default is false.)
default-random-filename = true Makes it so the random filename is not default if set false. (Default is true.)

Cleaning up expired files

When files expire, access is disabled immediately, but the files and metadata will persist on disk until someone attempts to access them. You can set the following option to run cleanup every few minutes. This can also be done using a separate utility found the linx-cleanup directory.

Option Description
cleanup-every-minutes = 5 How often to clean up expired files in minutes (default is 0, which means files will be cleaned up as they are accessed)

Require API Keys for uploads

Option Description
authfile = path/to/authfile (optionally) require authorization for upload/delete by providing a newline-separated file of scrypted auth keys
remoteauthfile = path/to/remoteauthfile (optionally) require authorization for remote uploads by providing a newline-separated file of scrypted auth keys
basicauth = true (optionally) allow basic authorization to upload or paste files from browser when -authfile is enabled. When uploading, you will be prompted to enter a user and password - leave the user blank and use your auth key as the password

A helper utility linx-genkey is provided which hashes keys to the format required in the auth files.

Storage backends

The following storage backends are available:

Name Notes Options
LocalFS Enabled by default, this backend uses the filesystem filespath = files/ -- Path to store uploads (default is files/)
metapath = meta/ -- Path to store information about uploads (default is meta/)
S3 Use with any S3-compatible provider.
This implementation will stream files through the linx instance (every download will request and stream the file from the S3 bucket). File metadata will be stored as tags on the object in the bucket.

For high-traffic environments, one might consider using an external caching layer such as described in this article.
s3-endpoint = https://... -- S3 endpoint
s3-region = us-east-1 -- S3 region
s3-bucket = mybucket -- S3 bucket to use for files and metadata
s3-force-path-style = true (optional) -- force path-style addresing (e.g.

Environment variables to provide:
AWS_ACCESS_KEY_ID -- the S3 access key
AWS_SECRET_ACCESS_KEY -- the S3 secret key
AWS_SESSION_TOKEN (optional) -- the S3 session token

SSL with built-in server

Option Description
certfile = path/to/your.crt Path to the ssl certificate (required if you want to use the https server)
keyfile = path/to/your.key Path to the ssl key (required if you want to use the https server)

Use with http proxy

Option Description
realip = true let linx-server know you (nginx, etc) are providing the X-Real-IP and/or X-Forwarded-For headers.

Use with fastcgi

Option Description
fastcgi = true serve through fastcgi


Linx-server supports being deployed in a subdirectory (ie. as well as on its own (

1. Using fastcgi

A suggested deployment is running nginx in front of linx-server serving through fastcgi. This allows you to have nginx handle the TLS termination for example.
An example configuration:

server {
    client_max_body_size 4096M;
    location / {
        include fastcgi_params;

And run linx-server with the fastcgi = true option.

2. Using the built-in https server

Run linx-server with the certfile = path/to/cert.file and keyfile = path/to/key.file options.

3. Using the built-in http server

Run linx-server normally.


Any help is welcome, PRs will be reviewed and merged accordingly.
The official IRC channel is #linx on

  1. go get -u
  2. cd $GOPATH/src/
  3. go build && ./linx-server


Copyright (C) 2015 Andrei Marcu

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program. If not, see


Andrei Marcu,