2 5e11c00c 2021-03-02 op * Copyright (c) 2021 Omar Polo <op@omarpolo.com>
4 5e11c00c 2021-03-02 op * Permission to use, copy, modify, and distribute this software for any
5 5e11c00c 2021-03-02 op * purpose with or without fee is hereby granted, provided that the above
6 5e11c00c 2021-03-02 op * copyright notice and this permission notice appear in all copies.
8 5e11c00c 2021-03-02 op * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 5e11c00c 2021-03-02 op * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 5e11c00c 2021-03-02 op * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 5e11c00c 2021-03-02 op * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 5e11c00c 2021-03-02 op * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 5e11c00c 2021-03-02 op * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 5e11c00c 2021-03-02 op * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19 5e11c00c 2021-03-02 op * - move the various
20 5e11c00c 2021-03-02 op * imsg_compose(...);
21 5e11c00c 2021-03-02 op * imsg_flush(...);
22 5e11c00c 2021-03-02 op * to something more asynchronous
25 5e11c00c 2021-03-02 op #include <telescope.h>
27 5e11c00c 2021-03-02 op #include <sys/types.h>
28 5e11c00c 2021-03-02 op #include <sys/socket.h>
30 5e11c00c 2021-03-02 op #include <netinet/in.h>
32 5e11c00c 2021-03-02 op #include <assert.h>
33 5e11c00c 2021-03-02 op #include <ctype.h>
34 5e11c00c 2021-03-02 op #include <errno.h>
35 5e11c00c 2021-03-02 op #include <event.h>
36 5e11c00c 2021-03-02 op #include <netdb.h>
37 5e11c00c 2021-03-02 op #include <stdarg.h>
38 5e11c00c 2021-03-02 op #include <stdio.h>
39 5e11c00c 2021-03-02 op #include <stdlib.h>
40 5e11c00c 2021-03-02 op #include <string.h>
41 5e11c00c 2021-03-02 op #include <tls.h>
42 5e11c00c 2021-03-02 op #include <unistd.h>
44 5e11c00c 2021-03-02 op static struct tls_config *tlsconf;
45 5e11c00c 2021-03-02 op static struct imsgbuf *ibuf;
49 5e11c00c 2021-03-02 op static void die(void) __attribute__((__noreturn__));
50 5e11c00c 2021-03-02 op static char *xasprintf(const char*, ...);
51 5e11c00c 2021-03-02 op static int conn_towards(struct url*, char**);
53 5e11c00c 2021-03-02 op static void close_with_err(struct req*, const char *err);
54 5e11c00c 2021-03-02 op static struct req *req_by_id(uint32_t);
56 5e11c00c 2021-03-02 op static void do_handshake(int, short, void*);
57 5e11c00c 2021-03-02 op static void write_request(int, short, void*);
58 5e11c00c 2021-03-02 op static void read_reply(int, short, void*);
59 5e11c00c 2021-03-02 op static void parse_reply(struct req*);
60 5e11c00c 2021-03-02 op static void copy_body(int, short, void*);
62 5e11c00c 2021-03-02 op static void check_special_page(struct req*, const char*);
64 5e11c00c 2021-03-02 op static void handle_get(struct imsg*, size_t);
65 5e11c00c 2021-03-02 op static void handle_cert_status(struct imsg*, size_t);
66 5e11c00c 2021-03-02 op static void handle_stop(struct imsg*, size_t);
67 5e11c00c 2021-03-02 op static void handle_quit(struct imsg*, size_t);
69 5e11c00c 2021-03-02 op static imsg_handlerfn *handlers[] = {
70 5e11c00c 2021-03-02 op [IMSG_GET] = handle_get,
71 5e11c00c 2021-03-02 op [IMSG_CERT_STATUS] = handle_cert_status,
72 5e11c00c 2021-03-02 op [IMSG_STOP] = handle_stop,
73 5e11c00c 2021-03-02 op [IMSG_QUIT] = handle_quit,
76 5e11c00c 2021-03-02 op typedef void (*statefn)(int, short, void*);
78 5e11c00c 2021-03-02 op TAILQ_HEAD(, req) reqhead;
79 5e11c00c 2021-03-02 op /* a pending request */
81 5e11c00c 2021-03-02 op struct event ev;
82 5e11c00c 2021-03-02 op struct url url;
85 5e11c00c 2021-03-02 op struct tls *ctx;
86 5e11c00c 2021-03-02 op char buf[1024];
88 5e11c00c 2021-03-02 op TAILQ_ENTRY(req) reqs;
91 5e11c00c 2021-03-02 op static inline void
92 5e11c00c 2021-03-02 op yield_r(struct req *req, statefn fn, struct timeval *tv)
94 5e11c00c 2021-03-02 op event_once(req->fd, EV_READ, fn, req, tv);
97 5e11c00c 2021-03-02 op static inline void
98 5e11c00c 2021-03-02 op yield_w(struct req *req, statefn fn, struct timeval *tv)
100 5e11c00c 2021-03-02 op event_once(req->fd, EV_WRITE, fn, req, tv);
103 5e11c00c 2021-03-02 op static inline void
104 5e11c00c 2021-03-02 op advance_buf(struct req *req, size_t len)
106 5e11c00c 2021-03-02 op assert(len <= req->off);
108 5e11c00c 2021-03-02 op req->off -= len;
109 5e11c00c 2021-03-02 op memmove(req->buf, req->buf + len, req->off);
112 5e11c00c 2021-03-02 op static void __attribute__((__noreturn__))
115 5e11c00c 2021-03-02 op abort(); /* TODO */
118 5e11c00c 2021-03-02 op static char *
119 5e11c00c 2021-03-02 op xasprintf(const char *fmt, ...)
124 5e11c00c 2021-03-02 op va_start(ap, fmt);
125 5e11c00c 2021-03-02 op if (vasprintf(&s, fmt, ap) == -1)
133 5e11c00c 2021-03-02 op conn_towards(struct url *url, char **err)
135 5e11c00c 2021-03-02 op struct addrinfo hints, *servinfo, *p;
136 5e11c00c 2021-03-02 op int status, sock;
137 5e11c00c 2021-03-02 op const char *proto = "1965";
141 5e11c00c 2021-03-02 op if (*url->port != '\0')
142 5e11c00c 2021-03-02 op proto = url->port;
144 5e11c00c 2021-03-02 op memset(&hints, 0, sizeof(hints));
145 5e11c00c 2021-03-02 op hints.ai_family = AF_UNSPEC;
146 5e11c00c 2021-03-02 op hints.ai_socktype = SOCK_STREAM;
148 5e11c00c 2021-03-02 op if ((status = getaddrinfo(url->host, proto, &hints, &servinfo))) {
149 5e11c00c 2021-03-02 op *err = xasprintf("failed to resolve %s: %s",
150 5e11c00c 2021-03-02 op url->host, gai_strerror(status));
155 5e11c00c 2021-03-02 op for (p = servinfo; p != NULL; p = p->ai_next) {
156 5e11c00c 2021-03-02 op if ((sock = socket(p->ai_family, p->ai_socktype, p->ai_protocol)) == -1)
158 5e11c00c 2021-03-02 op if (connect(sock, p->ai_addr, p->ai_addrlen) != -1)
163 5e11c00c 2021-03-02 op if (sock == -1)
164 5e11c00c 2021-03-02 op *err = xasprintf("couldn't connect to %s", url->host);
166 5e11c00c 2021-03-02 op mark_nonblock(sock);
168 5e11c00c 2021-03-02 op freeaddrinfo(servinfo);
172 5e11c00c 2021-03-02 op static struct req *
173 5e11c00c 2021-03-02 op req_by_id(uint32_t id)
175 5e11c00c 2021-03-02 op struct req *r;
177 5e11c00c 2021-03-02 op TAILQ_FOREACH(r, &reqhead, reqs) {
178 5e11c00c 2021-03-02 op if (r->id == id)
186 5e11c00c 2021-03-02 op close_conn(int fd, short ev, void *d)
188 5e11c00c 2021-03-02 op struct req *req = d;
190 5e11c00c 2021-03-02 op if (req->ctx != NULL) {
191 5e11c00c 2021-03-02 op switch (tls_close(req->ctx)) {
192 5e11c00c 2021-03-02 op case TLS_WANT_POLLIN:
193 5e11c00c 2021-03-02 op yield_r(req, close_conn, NULL);
195 5e11c00c 2021-03-02 op case TLS_WANT_POLLOUT:
196 5e11c00c 2021-03-02 op yield_w(req, close_conn, NULL);
200 5e11c00c 2021-03-02 op tls_free(req->ctx);
203 5e11c00c 2021-03-02 op TAILQ_REMOVE(&reqhead, req, reqs);
204 5e11c00c 2021-03-02 op if (req->fd != -1)
205 5e11c00c 2021-03-02 op close(req->fd);
210 5e11c00c 2021-03-02 op close_with_err(struct req *req, const char *err)
212 5e11c00c 2021-03-02 op imsg_compose(ibuf, IMSG_ERR, req->id, 0, -1, err, strlen(err)+1);
213 5e11c00c 2021-03-02 op imsg_flush(ibuf);
214 5e11c00c 2021-03-02 op close_conn(0, 0, req);
218 5e11c00c 2021-03-02 op do_handshake(int fd, short ev, void *d)
220 5e11c00c 2021-03-02 op struct req *req = d;
221 5e11c00c 2021-03-02 op const char *hash;
223 5e11c00c 2021-03-02 op switch (tls_handshake(req->ctx)) {
224 5e11c00c 2021-03-02 op case TLS_WANT_POLLIN:
225 5e11c00c 2021-03-02 op yield_r(req, do_handshake, NULL);
227 5e11c00c 2021-03-02 op case TLS_WANT_POLLOUT:
228 5e11c00c 2021-03-02 op yield_w(req, do_handshake, NULL);
232 5e11c00c 2021-03-02 op hash = tls_peer_cert_hash(req->ctx);
233 5e11c00c 2021-03-02 op imsg_compose(ibuf, IMSG_CHECK_CERT, req->id, 0, -1, hash, strlen(hash)+1);
234 5e11c00c 2021-03-02 op imsg_flush(ibuf);
238 5e11c00c 2021-03-02 op write_request(int fd, short ev, void *d)
240 5e11c00c 2021-03-02 op struct req *req = d;
243 5e11c00c 2021-03-02 op char buf[1024], *err;
245 5e11c00c 2021-03-02 op strlcpy(buf, "gemini://", sizeof(buf));
246 5e11c00c 2021-03-02 op strlcat(buf, req->url.host, sizeof(buf));
247 5e11c00c 2021-03-02 op strlcat(buf, "/", sizeof(buf));
248 5e11c00c 2021-03-02 op strlcat(buf, req->url.path, sizeof(buf));
250 5e11c00c 2021-03-02 op if (req->url.query[0] != '\0') {
251 5e11c00c 2021-03-02 op strlcat(buf, "?", sizeof(buf));
252 5e11c00c 2021-03-02 op strlcat(buf, req->url.query, sizeof(buf));
255 5e11c00c 2021-03-02 op len = strlcat(buf, "\r\n", sizeof(buf));
257 5e11c00c 2021-03-02 op assert(len <= sizeof(buf));
259 5e11c00c 2021-03-02 op switch (r = tls_write(req->ctx, buf, len)) {
261 5e11c00c 2021-03-02 op err = xasprintf("tls_write: %s", tls_error(req->ctx));
262 5e11c00c 2021-03-02 op close_with_err(req, err);
265 5e11c00c 2021-03-02 op case TLS_WANT_POLLIN:
266 5e11c00c 2021-03-02 op yield_r(req, write_request, NULL);
268 5e11c00c 2021-03-02 op case TLS_WANT_POLLOUT:
269 5e11c00c 2021-03-02 op yield_w(req, write_request, NULL);
272 5e11c00c 2021-03-02 op /* assume r == len */
274 5e11c00c 2021-03-02 op yield_r(req, read_reply, NULL);
280 5e11c00c 2021-03-02 op read_reply(int fd, short ev, void *d)
282 5e11c00c 2021-03-02 op struct req *req = d;
285 5e11c00c 2021-03-02 op char *buf, *e;
287 5e11c00c 2021-03-02 op buf = req->buf + req->off;
288 5e11c00c 2021-03-02 op len = sizeof(req->buf) - req->off;
290 5e11c00c 2021-03-02 op switch (r = tls_read(req->ctx, buf, len)) {
292 5e11c00c 2021-03-02 op e = xasprintf("tls_read: %s", tls_error(req->ctx));
293 5e11c00c 2021-03-02 op close_with_err(req, e);
296 5e11c00c 2021-03-02 op case TLS_WANT_POLLIN:
297 5e11c00c 2021-03-02 op yield_r(req, read_reply, NULL);
299 5e11c00c 2021-03-02 op case TLS_WANT_POLLOUT:
300 5e11c00c 2021-03-02 op yield_w(req, read_reply, NULL);
303 5e11c00c 2021-03-02 op req->off += r;
305 5e11c00c 2021-03-02 op /* TODO: really watch for \r\n not \n alone */
306 5e11c00c 2021-03-02 op if ((e = telescope_strnchr(req->buf, '\n', req->off)) != NULL)
307 5e11c00c 2021-03-02 op parse_reply(req);
308 5e11c00c 2021-03-02 op else if (req->off == sizeof(req->buf))
309 5e11c00c 2021-03-02 op close_with_err(req, "invalid response");
311 5e11c00c 2021-03-02 op yield_r(req, read_reply, NULL);
317 5e11c00c 2021-03-02 op parse_reply(struct req *req)
323 5e11c00c 2021-03-02 op if (req->off < 4)
326 5e11c00c 2021-03-02 op if (!isdigit(req->buf[0]) || !isdigit(req->buf[1]))
329 5e11c00c 2021-03-02 op code = (req->buf[0] - '0')*10 + (req->buf[1] - '0');
331 5e11c00c 2021-03-02 op if (!isspace(req->buf[2]))
334 5e11c00c 2021-03-02 op advance_buf(req, 3);
335 5e11c00c 2021-03-02 op if ((e = telescope_strnchr(req->buf, '\r', req->off)) == NULL)
340 5e11c00c 2021-03-02 op len = e - req->buf;
341 5e11c00c 2021-03-02 op imsg_compose(ibuf, IMSG_GOT_CODE, req->id, 0, -1, &code, sizeof(code));
342 5e11c00c 2021-03-02 op imsg_compose(ibuf, IMSG_GOT_META, req->id, 0, -1,
343 5e11c00c 2021-03-02 op req->buf, len);
344 5e11c00c 2021-03-02 op imsg_flush(ibuf);
346 5e11c00c 2021-03-02 op yield_r(req, copy_body, NULL);
350 5e11c00c 2021-03-02 op close_with_err(req, "malformed request");
354 5e11c00c 2021-03-02 op copy_body(int fd, short ev, void *d)
356 5e11c00c 2021-03-02 op struct req *req = d;
357 5e11c00c 2021-03-02 op char buf[BUFSIZ];
361 5e11c00c 2021-03-02 op switch (r = tls_read(req->ctx, buf, sizeof(buf))) {
362 5e11c00c 2021-03-02 op case TLS_WANT_POLLIN:
363 5e11c00c 2021-03-02 op yield_r(req, copy_body, NULL);
365 5e11c00c 2021-03-02 op case TLS_WANT_POLLOUT:
366 5e11c00c 2021-03-02 op yield_w(req, copy_body, NULL);
370 5e11c00c 2021-03-02 op imsg_compose(ibuf, IMSG_EOF, req->id, 0, -1, NULL, 0);
371 5e11c00c 2021-03-02 op imsg_flush(ibuf);
372 5e11c00c 2021-03-02 op close_conn(0, 0, req);
375 5e11c00c 2021-03-02 op imsg_compose(ibuf, IMSG_BUF, req->id, 0, -1, buf, r);
376 5e11c00c 2021-03-02 op imsg_flush(ibuf);
383 5e11c00c 2021-03-02 op serve_special_page(struct req *req, const char *url)
385 5e11c00c 2021-03-02 op int code = 20;
386 5e11c00c 2021-03-02 op const char *meta = "text/gemini";
388 5e11c00c 2021-03-02 op if (strcmp(url, "about:new"))
391 5e11c00c 2021-03-02 op imsg_compose(ibuf, IMSG_GOT_CODE, req->id, 0, -1, &code, sizeof(code));
392 5e11c00c 2021-03-02 op imsg_compose(ibuf, IMSG_GOT_META, req->id, 0, -1, meta, strlen(meta)+1);
393 5e11c00c 2021-03-02 op imsg_compose(ibuf, IMSG_BUF, req->id, 0, -1, about_new, strlen(about_new));
394 5e11c00c 2021-03-02 op imsg_compose(ibuf, IMSG_EOF, req->id, 0, -1, NULL, 0);
395 5e11c00c 2021-03-02 op imsg_flush(ibuf);
397 5e11c00c 2021-03-02 op /* don't close_page here, since req is not added to requests
404 5e11c00c 2021-03-02 op handle_get(struct imsg *imsg, size_t datalen)
406 5e11c00c 2021-03-02 op struct req *req;
407 5e11c00c 2021-03-02 op const char *e;
408 5e11c00c 2021-03-02 op char *data, *err = NULL;
410 5e11c00c 2021-03-02 op data = imsg->data;
412 5e11c00c 2021-03-02 op if (data[datalen-1] != '\0')
415 5e11c00c 2021-03-02 op if ((req = calloc(1, sizeof(*req))) == NULL)
418 5e11c00c 2021-03-02 op req->id = imsg->hdr.peerid;
420 5e11c00c 2021-03-02 op if (serve_special_page(req, data))
423 5e11c00c 2021-03-02 op if (!url_parse(imsg->data, &req->url, &e)) {
424 5e11c00c 2021-03-02 op fprintf(stderr, "failed to parse url: %s\n", e);
425 5e11c00c 2021-03-02 op close_with_err(req, e);
429 5e11c00c 2021-03-02 op if ((req->fd = conn_towards(&req->url, &err)) == -1)
431 5e11c00c 2021-03-02 op if ((req->ctx = tls_client()) == NULL)
433 5e11c00c 2021-03-02 op if (tls_configure(req->ctx, tlsconf) == -1) {
434 5e11c00c 2021-03-02 op err = xasprintf("tls_configure: %s", tls_error(req->ctx));
437 5e11c00c 2021-03-02 op if (tls_connect_socket(req->ctx, req->fd, req->url.host) == -1) {
438 5e11c00c 2021-03-02 op err = xasprintf("tls_connect_socket: %s", tls_error(req->ctx));
442 5e11c00c 2021-03-02 op TAILQ_INSERT_HEAD(&reqhead, req, reqs);
443 5e11c00c 2021-03-02 op yield_w(req, do_handshake, NULL);
447 5e11c00c 2021-03-02 op close_with_err(req, err);
452 5e11c00c 2021-03-02 op handle_cert_status(struct imsg *imsg, size_t datalen)
454 5e11c00c 2021-03-02 op struct req *req;
457 5e11c00c 2021-03-02 op req = req_by_id(imsg->hdr.peerid);
459 5e11c00c 2021-03-02 op if (datalen < sizeof(is_ok))
461 5e11c00c 2021-03-02 op memcpy(&is_ok, imsg->data, sizeof(is_ok));
464 5e11c00c 2021-03-02 op yield_w(req, write_request, NULL);
466 5e11c00c 2021-03-02 op close_conn(0, 0, req);
470 5e11c00c 2021-03-02 op handle_stop(struct imsg *imsg, size_t datalen)
472 5e11c00c 2021-03-02 op struct req *req;
474 5e11c00c 2021-03-02 op req = req_by_id(imsg->hdr.peerid);
475 5e11c00c 2021-03-02 op close_conn(0, 0, req);
479 5e11c00c 2021-03-02 op handle_quit(struct imsg *imsg, size_t datalen)
481 5e11c00c 2021-03-02 op event_loopbreak();
485 5e11c00c 2021-03-02 op dispatch_imsg(int fd, short ev, void *d)
487 5e11c00c 2021-03-02 op struct imsgbuf *ibuf = d;
488 5e11c00c 2021-03-02 op struct imsg imsg;
490 5e11c00c 2021-03-02 op size_t datalen;
492 5e11c00c 2021-03-02 op if ((n = imsg_read(ibuf)) == -1) {
493 5e11c00c 2021-03-02 op if (errno == EAGAIN || errno == EWOULDBLOCK)
502 5e11c00c 2021-03-02 op if ((n = imsg_get(ibuf, &imsg)) == -1)
506 5e11c00c 2021-03-02 op datalen = imsg.hdr.len - IMSG_HEADER_SIZE;
507 5e11c00c 2021-03-02 op handlers[imsg.hdr.type](&imsg, datalen);
508 5e11c00c 2021-03-02 op imsg_free(&imsg);
513 5e11c00c 2021-03-02 op client_main(struct imsgbuf *b)
517 5e11c00c 2021-03-02 op TAILQ_INIT(&reqhead);
519 5e11c00c 2021-03-02 op if ((tlsconf = tls_config_new()) == NULL)
521 5e11c00c 2021-03-02 op tls_config_insecure_noverifycert(tlsconf);
523 5e11c00c 2021-03-02 op event_init();
525 5e11c00c 2021-03-02 op event_set(&imsgev, ibuf->fd, EV_READ | EV_PERSIST, dispatch_imsg, ibuf);
526 5e11c00c 2021-03-02 op event_add(&imsgev, NULL);
528 5e11c00c 2021-03-02 op event_dispatch();