2 35e1f40a 2021-03-14 op * Copyright (c) 2021 Omar Polo <op@omarpolo.com>
4 35e1f40a 2021-03-14 op * Permission to use, copy, modify, and distribute this software for any
5 35e1f40a 2021-03-14 op * purpose with or without fee is hereby granted, provided that the above
6 35e1f40a 2021-03-14 op * copyright notice and this permission notice appear in all copies.
8 35e1f40a 2021-03-14 op * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 35e1f40a 2021-03-14 op * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 35e1f40a 2021-03-14 op * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 35e1f40a 2021-03-14 op * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 35e1f40a 2021-03-14 op * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 35e1f40a 2021-03-14 op * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 35e1f40a 2021-03-14 op * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
18 740f578b 2021-03-15 op * Handles the data in ~/.telescope
20 3a227e9a 2021-03-18 op * TODO: add some form of locking on the files
23 786e6deb 2021-07-21 op #include "compat.h"
25 6cd6a9e1 2021-03-20 op #include <sys/stat.h>
26 65124267 2021-08-13 op #include <sys/types.h>
28 65124267 2021-08-13 op #include <dirent.h>
29 35e1f40a 2021-03-14 op #include <errno.h>
30 de2a69bb 2021-05-17 op #include <fcntl.h>
31 35e1f40a 2021-03-14 op #include <limits.h>
32 35e1f40a 2021-03-14 op #include <stdio.h>
33 35e1f40a 2021-03-14 op #include <stdlib.h>
34 35e1f40a 2021-03-14 op #include <string.h>
35 35e1f40a 2021-03-14 op #include <unistd.h>
37 4913b479 2021-07-12 op #include "telescope.h"
38 5a824be4 2021-07-13 op #include "pages.h"
40 35e1f40a 2021-03-14 op static void die(void) __attribute__((__noreturn__));
41 fb4dc49f 2021-08-13 op static void send_file(uint32_t, FILE *);
42 35e1f40a 2021-03-14 op static void handle_get(struct imsg*, size_t);
43 fb4dc49f 2021-08-13 op static void handle_get_file(struct imsg*, size_t);
44 35e1f40a 2021-03-14 op static void handle_quit(struct imsg*, size_t);
45 740f578b 2021-03-15 op static void handle_bookmark_page(struct imsg*, size_t);
46 3a227e9a 2021-03-18 op static void handle_save_cert(struct imsg*, size_t);
47 288fd238 2021-04-25 op static void handle_update_cert(struct imsg*, size_t);
48 de2a69bb 2021-05-17 op static void handle_file_open(struct imsg*, size_t);
49 c7107cec 2021-04-01 op static void handle_session_start(struct imsg*, size_t);
50 c7107cec 2021-04-01 op static void handle_session_tab(struct imsg*, size_t);
51 2f524b17 2021-07-17 op static void handle_session_tab_title(struct imsg*, size_t);
52 c7107cec 2021-04-01 op static void handle_session_end(struct imsg*, size_t);
53 1304bbdd 2021-03-15 op static void handle_dispatch_imsg(int, short, void*);
54 bc10f6a5 2021-07-12 op static int fs_send_ui(int, uint32_t, int, const void *, uint16_t);
56 bc10f6a5 2021-07-12 op static struct imsgev *iev_ui;
57 c7107cec 2021-04-01 op static FILE *session;
59 56e7efb4 2021-07-21 op static char base_path[PATH_MAX];
60 d0fd368a 2021-07-15 op static char lockfile_path[PATH_MAX];
61 740f578b 2021-03-15 op static char bookmark_file[PATH_MAX];
62 288fd238 2021-04-25 op static char known_hosts_file[PATH_MAX], known_hosts_tmp[PATH_MAX];
63 ea080950 2021-07-20 op static char crashed_file[PATH_MAX];
65 87e3e801 2021-07-17 op char session_file[PATH_MAX];
67 35e1f40a 2021-03-14 op static imsg_handlerfn *handlers[] = {
68 35e1f40a 2021-03-14 op [IMSG_GET] = handle_get,
69 fb4dc49f 2021-08-13 op [IMSG_GET_FILE] = handle_get_file,
70 35e1f40a 2021-03-14 op [IMSG_QUIT] = handle_quit,
71 740f578b 2021-03-15 op [IMSG_BOOKMARK_PAGE] = handle_bookmark_page,
72 3a227e9a 2021-03-18 op [IMSG_SAVE_CERT] = handle_save_cert,
73 288fd238 2021-04-25 op [IMSG_UPDATE_CERT] = handle_update_cert,
74 de2a69bb 2021-05-17 op [IMSG_FILE_OPEN] = handle_file_open,
75 c7107cec 2021-04-01 op [IMSG_SESSION_START] = handle_session_start,
76 c7107cec 2021-04-01 op [IMSG_SESSION_TAB] = handle_session_tab,
77 2f524b17 2021-07-17 op [IMSG_SESSION_TAB_TITLE] = handle_session_tab_title,
78 c7107cec 2021-04-01 op [IMSG_SESSION_END] = handle_session_end,
81 35e1f40a 2021-03-14 op static void __attribute__((__noreturn__))
84 35e1f40a 2021-03-14 op abort(); /* TODO */
88 fb4dc49f 2021-08-13 op send_file(uint32_t peerid, FILE *f)
91 fb4dc49f 2021-08-13 op char buf[BUFSIZ];
94 fb4dc49f 2021-08-13 op r = fread(buf, 1, sizeof(buf), f);
96 fb4dc49f 2021-08-13 op fs_send_ui(IMSG_BUF, peerid, -1, buf, r);
97 fb4dc49f 2021-08-13 op if (r != sizeof(buf))
100 fb4dc49f 2021-08-13 op fs_send_ui(IMSG_EOF, peerid, -1, NULL, 0);
105 35e1f40a 2021-03-14 op handle_get(struct imsg *imsg, size_t datalen)
107 56e7efb4 2021-07-21 op const char *bpath = "bookmarks.gmi";
108 fb4dc49f 2021-08-13 op char path[PATH_MAX];
110 a2728733 2021-07-18 op const char *data, *p;
112 a2728733 2021-07-18 op struct page {
113 a2728733 2021-07-18 op const char *name;
114 56e7efb4 2021-07-21 op const char *path;
115 a2728733 2021-07-18 op const uint8_t *data;
117 a2728733 2021-07-18 op } pages[] = {
118 56e7efb4 2021-07-21 op {"about", NULL, about_about, about_about_len},
119 56e7efb4 2021-07-21 op {"blank", NULL, about_blank, about_blank_len},
120 56e7efb4 2021-07-21 op {"bookmarks", bpath, bookmarks, bookmarks_len},
121 56e7efb4 2021-07-21 op {"crash", NULL, about_crash, about_crash_len},
122 56e7efb4 2021-07-21 op {"help", NULL, about_help, about_help_len},
123 56e7efb4 2021-07-21 op {"license", NULL, about_license, about_license_len},
124 56e7efb4 2021-07-21 op {"new", NULL, about_new, about_new_len},
125 56e7efb4 2021-07-21 op }, *page = NULL;
127 35e1f40a 2021-03-14 op data = imsg->data;
128 56e7efb4 2021-07-21 op if (data[datalen-1] != '\0') /* make sure it's NUL-terminated */
130 56e7efb4 2021-07-21 op if ((data = strchr(data, ':')) == NULL)
131 56e7efb4 2021-07-21 op goto notfound;
134 56e7efb4 2021-07-21 op for (i = 0; i < sizeof(pages)/sizeof(pages[0]); ++i)
135 56e7efb4 2021-07-21 op if (!strcmp(data, pages[i].name)) {
136 56e7efb4 2021-07-21 op page = &pages[i];
140 56e7efb4 2021-07-21 op if (page == NULL)
141 56e7efb4 2021-07-21 op goto notfound;
143 56e7efb4 2021-07-21 op strlcpy(path, base_path, sizeof(path));
144 56e7efb4 2021-07-21 op strlcat(path, "/", sizeof(path));
145 56e7efb4 2021-07-21 op if (page->path != NULL)
146 56e7efb4 2021-07-21 op strlcat(path, page->path, sizeof(path));
148 56e7efb4 2021-07-21 op strlcat(path, "pages/about_", sizeof(path));
149 56e7efb4 2021-07-21 op strlcat(path, page->name, sizeof(path));
150 56e7efb4 2021-07-21 op strlcat(path, ".gmi", sizeof(path));
153 56e7efb4 2021-07-21 op if ((f = fopen(path, "r")) == NULL) {
154 56e7efb4 2021-07-21 op fs_send_ui(IMSG_BUF, imsg->hdr.peerid, -1,
155 56e7efb4 2021-07-21 op page->data, page->len);
156 56e7efb4 2021-07-21 op fs_send_ui(IMSG_EOF, imsg->hdr.peerid, -1,
161 fb4dc49f 2021-08-13 op send_file(imsg->hdr.peerid, f);
165 a2728733 2021-07-18 op p = "# not found!\n";
166 a2728733 2021-07-18 op fs_send_ui(IMSG_BUF, imsg->hdr.peerid, -1, p, strlen(p));
167 a2728733 2021-07-18 op fs_send_ui(IMSG_EOF, imsg->hdr.peerid, -1, NULL, 0);
170 fb4dc49f 2021-08-13 op static inline void
171 fb4dc49f 2021-08-13 op send_hdr(uint32_t peerid, int code, const char *meta)
173 fb4dc49f 2021-08-13 op fs_send_ui(IMSG_GOT_CODE, peerid, -1, &code, sizeof(code));
174 fb4dc49f 2021-08-13 op fs_send_ui(IMSG_GOT_META, peerid, -1, meta, strlen(meta)+1);
177 65124267 2021-08-13 op static inline const char *
178 65124267 2021-08-13 op file_type(const char *path)
180 fb4dc49f 2021-08-13 op struct mapping {
181 fb4dc49f 2021-08-13 op const char *ext;
182 fb4dc49f 2021-08-13 op const char *mime;
184 fb4dc49f 2021-08-13 op {"diff", "text/x-patch"},
185 fb4dc49f 2021-08-13 op {"gemini", "text/gemini"},
186 fb4dc49f 2021-08-13 op {"gmi", "text/gemini"},
187 fb4dc49f 2021-08-13 op {"markdown", "text/plain"},
188 fb4dc49f 2021-08-13 op {"md", "text/plain"},
189 fb4dc49f 2021-08-13 op {"patch", "text/x-patch"},
190 fb4dc49f 2021-08-13 op {"txt", "text/plain"},
191 fb4dc49f 2021-08-13 op {NULL, NULL},
195 65124267 2021-08-13 op if ((dot = strrchr(path, '.')) == NULL)
200 65124267 2021-08-13 op for (m = ms; m->ext != NULL; ++m)
201 65124267 2021-08-13 op if (!strcmp(m->ext, dot))
202 65124267 2021-08-13 op return m->mime;
207 65124267 2021-08-13 op static inline void
208 65124267 2021-08-13 op send_dir(uint32_t peerid, const char *path)
210 65124267 2021-08-13 op struct dirent **names;
211 65124267 2021-08-13 op struct evbuffer *ev;
214 65124267 2021-08-13 op if ((ev = evbuffer_new()) == NULL ||
215 65124267 2021-08-13 op (len = scandir(path, &names, NULL, alphasort)) == -1) {
216 65124267 2021-08-13 op evbuffer_free(ev);
217 65124267 2021-08-13 op send_hdr(peerid, 40, "failure reading the directory");
221 65124267 2021-08-13 op evbuffer_add_printf(ev, "# Index of %s\n\n", path);
222 65124267 2021-08-13 op for (i = 0; i < len; ++i) {
223 65124267 2021-08-13 op evbuffer_add_printf(ev, "=> %s", names[i]->d_name);
224 65124267 2021-08-13 op if (names[i]->d_type == DT_DIR)
225 65124267 2021-08-13 op evbuffer_add(ev, "/", 1);
226 65124267 2021-08-13 op evbuffer_add(ev, "\n", 1);
229 65124267 2021-08-13 op send_hdr(peerid, 20, "text/gemini");
230 65124267 2021-08-13 op fs_send_ui(IMSG_BUF, peerid, -1,
231 65124267 2021-08-13 op EVBUFFER_DATA(ev), EVBUFFER_LENGTH(ev));
232 65124267 2021-08-13 op fs_send_ui(IMSG_EOF, peerid, -1, NULL, 0);
234 65124267 2021-08-13 op evbuffer_free(ev);
239 65124267 2021-08-13 op handle_get_file(struct imsg *imsg, size_t datalen)
241 65124267 2021-08-13 op struct stat sb;
244 fb4dc49f 2021-08-13 op const char *meta = NULL;
246 fb4dc49f 2021-08-13 op data = imsg->data;
247 fb4dc49f 2021-08-13 op data[datalen-1] = '\0';
249 65124267 2021-08-13 op if ((f = fopen(data, "r")) == NULL) {
250 65124267 2021-08-13 op send_hdr(imsg->hdr.peerid, 51, "can't open the file");
254 65124267 2021-08-13 op if (fstat(fileno(f), &sb) == -1) {
255 65124267 2021-08-13 op send_hdr(imsg->hdr.peerid, 40, "fstat failed");
259 65124267 2021-08-13 op if (S_ISDIR(sb.st_mode)) {
261 65124267 2021-08-13 op send_dir(imsg->hdr.peerid, data);
265 65124267 2021-08-13 op if ((meta = file_type(data)) == NULL) {
267 65124267 2021-08-13 op send_hdr(imsg->hdr.peerid, 51,
268 65124267 2021-08-13 op "don't know how to visualize this file");
272 fb4dc49f 2021-08-13 op send_hdr(imsg->hdr.peerid, 20, meta);
273 fb4dc49f 2021-08-13 op send_file(imsg->hdr.peerid, f);
277 35e1f40a 2021-03-14 op handle_quit(struct imsg *imsg, size_t datalen)
279 35e1f40a 2021-03-14 op event_loopbreak();
283 740f578b 2021-03-15 op handle_bookmark_page(struct imsg *imsg, size_t datalen)
289 740f578b 2021-03-15 op data = imsg->data;
290 740f578b 2021-03-15 op if (data[datalen-1] != '\0')
293 740f578b 2021-03-15 op if ((f = fopen(bookmark_file, "a")) == NULL) {
297 740f578b 2021-03-15 op fprintf(f, "=> %s\n", data);
302 bc10f6a5 2021-07-12 op fs_send_ui(IMSG_BOOKMARK_OK, 0, -1, &res, sizeof(res));
306 3a227e9a 2021-03-18 op handle_save_cert(struct imsg *imsg, size_t datalen)
308 3a227e9a 2021-03-18 op struct tofu_entry e;
312 3a227e9a 2021-03-18 op /* TODO: traverse the file to avoid duplications? */
314 3a227e9a 2021-03-18 op if (datalen != sizeof(e))
316 3a227e9a 2021-03-18 op memcpy(&e, imsg->data, datalen);
318 3a227e9a 2021-03-18 op if ((f = fopen(known_hosts_file, "a")) == NULL) {
322 3a227e9a 2021-03-18 op fprintf(f, "%s %s %d\n", e.domain, e.hash, e.verified);
327 bc10f6a5 2021-07-12 op fs_send_ui(IMSG_SAVE_CERT_OK, imsg->hdr.peerid, -1,
328 288fd238 2021-04-25 op &res, sizeof(res));
332 288fd238 2021-04-25 op handle_update_cert(struct imsg *imsg, size_t datalen)
334 288fd238 2021-04-25 op FILE *tmp, *f;
335 288fd238 2021-04-25 op struct tofu_entry entry;
336 288fd238 2021-04-25 op char sfn[PATH_MAX], *line = NULL, *t;
337 288fd238 2021-04-25 op size_t l, linesize = 0;
338 288fd238 2021-04-25 op ssize_t linelen;
339 288fd238 2021-04-25 op int fd, e, res = 0;
341 288fd238 2021-04-25 op if (datalen != sizeof(entry))
343 288fd238 2021-04-25 op memcpy(&entry, imsg->data, datalen);
345 288fd238 2021-04-25 op strlcpy(sfn, known_hosts_tmp, sizeof(sfn));
346 288fd238 2021-04-25 op if ((fd = mkstemp(sfn)) == -1 ||
347 288fd238 2021-04-25 op (tmp = fdopen(fd, "w")) == NULL) {
348 288fd238 2021-04-25 op if (fd != -1) {
356 288fd238 2021-04-25 op if ((f = fopen(known_hosts_file, "r")) == NULL) {
363 288fd238 2021-04-25 op l = strlen(entry.domain);
364 288fd238 2021-04-25 op while ((linelen = getline(&line, &linesize, f)) != -1) {
365 288fd238 2021-04-25 op if ((t = strstr(line, entry.domain)) != NULL &&
366 288fd238 2021-04-25 op (line[l] == ' ' || line[l] == '\t'))
368 288fd238 2021-04-25 op /* line has a trailing \n */
369 288fd238 2021-04-25 op fprintf(tmp, "%s", line);
371 288fd238 2021-04-25 op fprintf(tmp, "%s %s %d\n", entry.domain, entry.hash, entry.verified);
374 288fd238 2021-04-25 op e = ferror(tmp);
385 288fd238 2021-04-25 op res = rename(sfn, known_hosts_file) != -1;
388 bc10f6a5 2021-07-12 op fs_send_ui(IMSG_UPDATE_CERT_OK, imsg->hdr.peerid, -1,
389 3a227e9a 2021-03-18 op &res, sizeof(res));
393 de2a69bb 2021-05-17 op handle_file_open(struct imsg *imsg, size_t datalen)
395 de2a69bb 2021-05-17 op char *path, *e;
398 de2a69bb 2021-05-17 op path = imsg->data;
399 de2a69bb 2021-05-17 op if (path[datalen-1] != '\0')
402 de2a69bb 2021-05-17 op if ((fd = open(path, O_WRONLY | O_TRUNC | O_CREAT, 0644)) == -1) {
403 de2a69bb 2021-05-17 op e = strerror(errno);
404 bc10f6a5 2021-07-12 op fs_send_ui(IMSG_FILE_OPENED, imsg->hdr.peerid, -1,
405 de2a69bb 2021-05-17 op e, strlen(e)+1);
407 bc10f6a5 2021-07-12 op fs_send_ui(IMSG_FILE_OPENED, imsg->hdr.peerid, fd,
412 c7107cec 2021-04-01 op handle_session_start(struct imsg *imsg, size_t datalen)
414 c7107cec 2021-04-01 op if (datalen != 0)
417 c7107cec 2021-04-01 op if ((session = fopen(session_file, "w")) == NULL)
422 c7107cec 2021-04-01 op handle_session_tab(struct imsg *imsg, size_t datalen)
425 87e3e801 2021-07-17 op uint32_t flags;
427 c7107cec 2021-04-01 op if (session == NULL)
430 87e3e801 2021-07-17 op flags = imsg->hdr.peerid;
431 58df4f47 2021-07-17 op url = imsg->data;
432 58df4f47 2021-07-17 op if (datalen == 0 || url[datalen-1] != '\0')
434 58df4f47 2021-07-17 op fprintf(session, "%s", url);
436 87e3e801 2021-07-17 op if (flags & TAB_CURRENT)
437 2f524b17 2021-07-17 op fprintf(session, " current ");
439 2f524b17 2021-07-17 op fprintf(session, " - ");
443 2f524b17 2021-07-17 op handle_session_tab_title(struct imsg *imsg, size_t datalen)
445 2f524b17 2021-07-17 op const char *title;
447 2f524b17 2021-07-17 op title = imsg->data;
448 2f524b17 2021-07-17 op if (title == NULL) {
453 2f524b17 2021-07-17 op if (title[datalen-1] != '\0')
456 2f524b17 2021-07-17 op fprintf(session, "%s\n", title);
460 c7107cec 2021-04-01 op handle_session_end(struct imsg *imsg, size_t datalen)
462 c7107cec 2021-04-01 op if (session == NULL)
464 c7107cec 2021-04-01 op fclose(session);
465 c7107cec 2021-04-01 op session = NULL;
469 1304bbdd 2021-03-15 op handle_dispatch_imsg(int fd, short ev, void *d)
471 bc10f6a5 2021-07-12 op struct imsgev *iev = d;
474 ea080950 2021-07-20 op if (dispatch_imsg(iev, ev, handlers, sizeof(handlers)) == -1) {
476 ea080950 2021-07-20 op * This should leave a ~/.telescope/crashed file to
477 ea080950 2021-07-20 op * trigger about:crash on next run. Unfortunately, if
478 ea080950 2021-07-20 op * the main process dies the fs sticks around and
479 ea080950 2021-07-20 op * doesn't notice that the fd was closed. Why EV_READ
480 ea080950 2021-07-20 op * is not triggered when a fd is closed on the other end?
483 ea080950 2021-07-20 op if ((fd = open(crashed_file, O_CREAT|O_TRUNC|O_WRONLY, 0600))
485 ea080950 2021-07-20 op err(1, "open");
487 ea080950 2021-07-20 op errx(1, "connection closed: %s", strerror(e));
492 bc10f6a5 2021-07-12 op fs_send_ui(int type, uint32_t peerid, int fd, const void *data,
493 bc10f6a5 2021-07-12 op uint16_t datalen)
495 bc10f6a5 2021-07-12 op return imsg_compose_event(iev_ui, type, peerid, 0, fd,
496 bc10f6a5 2021-07-12 op data, datalen);
500 3a227e9a 2021-03-18 op fs_init(void)
502 56e7efb4 2021-07-21 op strlcpy(base_path, getenv("HOME"), sizeof(base_path));
503 56e7efb4 2021-07-21 op strlcat(base_path, "/.telescope", sizeof(base_path));
504 56e7efb4 2021-07-21 op mkdir(base_path, 0700);
506 56e7efb4 2021-07-21 op strlcpy(lockfile_path, base_path, sizeof(lockfile_path));
507 56e7efb4 2021-07-21 op strlcat(lockfile_path, "/lock", sizeof(lockfile_path));
509 56e7efb4 2021-07-21 op strlcpy(bookmark_file, base_path, sizeof(bookmark_file));
510 56e7efb4 2021-07-21 op strlcat(bookmark_file, "/bookmarks.gmi", sizeof(bookmark_file));
512 56e7efb4 2021-07-21 op strlcpy(known_hosts_file, base_path, sizeof(known_hosts_file));
513 56e7efb4 2021-07-21 op strlcat(known_hosts_file, "/known_hosts", sizeof(known_hosts_file));
515 56e7efb4 2021-07-21 op strlcpy(known_hosts_tmp, base_path, sizeof(known_hosts_tmp));
516 56e7efb4 2021-07-21 op strlcat(known_hosts_tmp, "/known_hosts.tmp.XXXXXXXXXX",
517 288fd238 2021-04-25 op sizeof(known_hosts_file));
519 56e7efb4 2021-07-21 op strlcpy(session_file, base_path, sizeof(session_file));
520 56e7efb4 2021-07-21 op strlcat(session_file, "/session", sizeof(session_file));
522 56e7efb4 2021-07-21 op strlcpy(crashed_file, base_path, sizeof(crashed_file));
523 56e7efb4 2021-07-21 op strlcat(crashed_file, "/crashed", sizeof(crashed_file));
529 6cc5fcfe 2021-07-08 op fs_main(void)
531 6cc5fcfe 2021-07-08 op setproctitle("fs");
535 35e1f40a 2021-03-14 op event_init();
537 bc10f6a5 2021-07-12 op /* Setup pipe and event handler to the main process */
538 bc10f6a5 2021-07-12 op if ((iev_ui = malloc(sizeof(*iev_ui))) == NULL)
540 bc10f6a5 2021-07-12 op imsg_init(&iev_ui->ibuf, 3);
541 bc10f6a5 2021-07-12 op iev_ui->handler = handle_dispatch_imsg;
542 bc10f6a5 2021-07-12 op iev_ui->events = EV_READ;
543 bc10f6a5 2021-07-12 op event_set(&iev_ui->ev, iev_ui->ibuf.fd, iev_ui->events,
544 bc10f6a5 2021-07-12 op iev_ui->handler, iev_ui);
545 bc10f6a5 2021-07-12 op event_add(&iev_ui->ev, NULL);
547 35e1f40a 2021-03-14 op sandbox_fs_process();
549 35e1f40a 2021-03-14 op event_dispatch();
556 b6171794 2021-07-20 op last_time_crashed(void)
560 b6171794 2021-07-20 op if ((fd = open(crashed_file, O_RDONLY)) == -1)
564 b6171794 2021-07-20 op unlink(crashed_file);
569 d0fd368a 2021-07-15 op lock_session(void)
571 d0fd368a 2021-07-15 op struct flock lock;
574 d0fd368a 2021-07-15 op if ((fd = open(lockfile_path, O_WRONLY|O_CREAT, 0600)) == -1)
577 d0fd368a 2021-07-15 op lock.l_start = 0;
578 d0fd368a 2021-07-15 op lock.l_len = 0;
579 d0fd368a 2021-07-15 op lock.l_type = F_WRLCK;
580 d0fd368a 2021-07-15 op lock.l_whence = SEEK_SET;
582 d0fd368a 2021-07-15 op if (fcntl(fd, F_SETLK, &lock) == -1) {
591 c6d03cf5 2021-04-25 op parse_khost_line(char *line, char *tmp[3])
595 c6d03cf5 2021-04-25 op for (ap = tmp; ap < &tmp[3] &&
596 c6d03cf5 2021-04-25 op (*ap = strsep(&line, " \t\n")) != NULL;) {
597 c6d03cf5 2021-04-25 op if (**ap != '\0')
601 c6d03cf5 2021-04-25 op return ap == &tmp[3] && *line == '\0';
605 3a227e9a 2021-03-18 op load_certs(struct ohash *h)
607 c6d03cf5 2021-04-25 op char *tmp[3], *line = NULL;
608 6cd6a9e1 2021-03-20 op const char *errstr;
609 ec1fa0b0 2021-04-25 op size_t lineno = 0, linesize = 0;
610 3a227e9a 2021-03-18 op ssize_t linelen;
612 3a227e9a 2021-03-18 op struct tofu_entry *e;
614 3a227e9a 2021-03-18 op if ((f = fopen(known_hosts_file, "r")) == NULL)
617 3a227e9a 2021-03-18 op while ((linelen = getline(&line, &linesize, f)) != -1) {
618 3a227e9a 2021-03-18 op if ((e = calloc(1, sizeof(*e))) == NULL)
623 c6d03cf5 2021-04-25 op if (parse_khost_line(line, tmp)) {
624 c6d03cf5 2021-04-25 op strlcpy(e->domain, tmp[0], sizeof(e->domain));
625 c6d03cf5 2021-04-25 op strlcpy(e->hash, tmp[1], sizeof(e->hash));
627 c6d03cf5 2021-04-25 op e->verified = strtonum(tmp[2], 0, 1, &errstr);
628 c6d03cf5 2021-04-25 op if (errstr != NULL)
629 c6d03cf5 2021-04-25 op errx(1, "%s:%zu verification for %s is %s: %s",
630 c6d03cf5 2021-04-25 op known_hosts_file, lineno,
631 c6d03cf5 2021-04-25 op e->domain, errstr, tmp[2]);
632 c6d03cf5 2021-04-25 op tofu_add(h, e);
634 ec1fa0b0 2021-04-25 op warnx("%s:%zu invalid entry",
635 ec1fa0b0 2021-04-25 op known_hosts_file, lineno);
641 3a227e9a 2021-03-18 op return ferror(f);