2 * Copyright (c) 2021 Omar Polo <op@omarpolo.com>
4 * Permission to use, copy, modify, and distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
22 * to something more asynchronous
25 #include <telescope.h>
27 #include <sys/types.h>
28 #include <sys/socket.h>
30 #include <netinet/in.h>
44 static struct tls_config *tlsconf;
45 static struct imsgbuf *ibuf;
49 static void die(void) __attribute__((__noreturn__));
50 static char *xasprintf(const char*, ...);
51 static int conn_towards(struct url*, char**);
53 static void close_with_err(struct req*, const char *err);
54 static struct req *req_by_id(uint32_t);
55 static struct req *req_by_id_try(uint32_t);
57 static void do_handshake(int, short, void*);
58 static void write_request(int, short, void*);
59 static void read_reply(int, short, void*);
60 static void parse_reply(struct req*);
61 static void copy_body(int, short, void*);
63 static void check_special_page(struct req*, const char*);
65 static void handle_get(struct imsg*, size_t);
66 static void handle_cert_status(struct imsg*, size_t);
67 static void handle_proceed(struct imsg*, size_t);
68 static void handle_stop(struct imsg*, size_t);
69 static void handle_quit(struct imsg*, size_t);
71 /* TODO: making this customizable */
72 struct timeval timeout_for_handshake = { 5, 0 };
74 static imsg_handlerfn *handlers[] = {
75 [IMSG_GET] = handle_get,
76 [IMSG_CERT_STATUS] = handle_cert_status,
77 [IMSG_PROCEED] = handle_proceed,
78 [IMSG_STOP] = handle_stop,
79 [IMSG_QUIT] = handle_quit,
82 typedef void (*statefn)(int, short, void*);
84 TAILQ_HEAD(, req) reqhead;
85 /* a pending request */
94 TAILQ_ENTRY(req) reqs;
98 yield_r(struct req *req, statefn fn, struct timeval *tv)
100 event_once(req->fd, EV_READ, fn, req, tv);
104 yield_w(struct req *req, statefn fn, struct timeval *tv)
106 event_once(req->fd, EV_WRITE, fn, req, tv);
110 advance_buf(struct req *req, size_t len)
112 assert(len <= req->off);
115 memmove(req->buf, req->buf + len, req->off);
118 static void __attribute__((__noreturn__))
125 xasprintf(const char *fmt, ...)
131 if (vasprintf(&s, fmt, ap) == -1)
139 conn_towards(struct url *url, char **err)
141 struct addrinfo hints, *servinfo, *p;
143 const char *proto = "1965";
147 if (*url->port != '\0')
150 memset(&hints, 0, sizeof(hints));
151 hints.ai_family = AF_UNSPEC;
152 hints.ai_socktype = SOCK_STREAM;
154 if ((status = getaddrinfo(url->host, proto, &hints, &servinfo))) {
155 *err = xasprintf("failed to resolve %s: %s",
156 url->host, gai_strerror(status));
161 for (p = servinfo; p != NULL; p = p->ai_next) {
162 if ((sock = socket(p->ai_family, p->ai_socktype, p->ai_protocol)) == -1)
164 if (connect(sock, p->ai_addr, p->ai_addrlen) != -1)
170 *err = xasprintf("couldn't connect to %s", url->host);
174 freeaddrinfo(servinfo);
179 req_by_id(uint32_t id)
183 if ((r = req_by_id_try(id)) == NULL)
189 req_by_id_try(uint32_t id)
193 TAILQ_FOREACH(r, &reqhead, reqs) {
202 close_conn(int fd, short ev, void *d)
206 if (req->ctx != NULL) {
207 switch (tls_close(req->ctx)) {
208 case TLS_WANT_POLLIN:
209 yield_r(req, close_conn, NULL);
211 case TLS_WANT_POLLOUT:
212 yield_w(req, close_conn, NULL);
219 TAILQ_REMOVE(&reqhead, req, reqs);
226 close_with_err(struct req *req, const char *err)
228 imsg_compose(ibuf, IMSG_ERR, req->id, 0, -1, err, strlen(err)+1);
230 close_conn(0, 0, req);
234 do_handshake(int fd, short ev, void *d)
239 if (ev == EV_TIMEOUT) {
240 close_with_err(req, "Timeout loading page");
244 switch (tls_handshake(req->ctx)) {
245 case TLS_WANT_POLLIN:
246 yield_r(req, do_handshake, NULL);
248 case TLS_WANT_POLLOUT:
249 yield_w(req, do_handshake, NULL);
253 hash = tls_peer_cert_hash(req->ctx);
254 imsg_compose(ibuf, IMSG_CHECK_CERT, req->id, 0, -1, hash, strlen(hash)+1);
259 write_request(int fd, short ev, void *d)
264 char buf[1024], *err;
266 strlcpy(buf, "gemini://", sizeof(buf));
267 strlcat(buf, req->url.host, sizeof(buf));
268 strlcat(buf, "/", sizeof(buf));
269 strlcat(buf, req->url.path, sizeof(buf));
271 if (req->url.query[0] != '\0') {
272 strlcat(buf, "?", sizeof(buf));
273 strlcat(buf, req->url.query, sizeof(buf));
276 len = strlcat(buf, "\r\n", sizeof(buf));
278 assert(len <= sizeof(buf));
280 switch (r = tls_write(req->ctx, buf, len)) {
282 err = xasprintf("tls_write: %s", tls_error(req->ctx));
283 close_with_err(req, err);
286 case TLS_WANT_POLLIN:
287 yield_r(req, write_request, NULL);
289 case TLS_WANT_POLLOUT:
290 yield_w(req, write_request, NULL);
293 /* assume r == len */
295 yield_r(req, read_reply, NULL);
301 read_reply(int fd, short ev, void *d)
308 buf = req->buf + req->off;
309 len = sizeof(req->buf) - req->off;
311 switch (r = tls_read(req->ctx, buf, len)) {
313 e = xasprintf("tls_read: %s", tls_error(req->ctx));
314 close_with_err(req, e);
317 case TLS_WANT_POLLIN:
318 yield_r(req, read_reply, NULL);
320 case TLS_WANT_POLLOUT:
321 yield_w(req, read_reply, NULL);
326 /* TODO: really watch for \r\n not \n alone */
327 if ((e = telescope_strnchr(req->buf, '\n', req->off)) != NULL)
329 else if (req->off == sizeof(req->buf))
330 close_with_err(req, "invalid response");
332 yield_r(req, read_reply, NULL);
338 parse_reply(struct req *req)
347 if (!isdigit(req->buf[0]) || !isdigit(req->buf[1]))
350 code = (req->buf[0] - '0')*10 + (req->buf[1] - '0');
352 if (!isspace(req->buf[2]))
356 if ((e = telescope_strnchr(req->buf, '\r', req->off)) == NULL)
362 imsg_compose(ibuf, IMSG_GOT_CODE, req->id, 0, -1, &code, sizeof(code));
363 imsg_compose(ibuf, IMSG_GOT_META, req->id, 0, -1,
368 close_conn(0, 0, req);
369 advance_buf(req, len+1); /* skip \n too */
374 close_with_err(req, "malformed request");
378 copy_body(int fd, short ev, void *d)
385 imsg_compose(ibuf, IMSG_BUF, req->id, 0, -1,
390 switch (r = tls_read(req->ctx, req->buf, sizeof(req->buf))) {
391 case TLS_WANT_POLLIN:
392 yield_r(req, copy_body, NULL);
394 case TLS_WANT_POLLOUT:
395 yield_w(req, copy_body, NULL);
398 imsg_compose(ibuf, IMSG_EOF, req->id, 0, -1, NULL, 0);
400 close_conn(0, 0, req);
409 handle_get(struct imsg *imsg, size_t datalen)
413 char *data, *err = NULL;
417 if (data[datalen-1] != '\0')
420 if ((req = calloc(1, sizeof(*req))) == NULL)
423 req->id = imsg->hdr.peerid;
424 TAILQ_INSERT_HEAD(&reqhead, req, reqs);
426 if (!url_parse(imsg->data, &req->url, &e)) {
427 fprintf(stderr, "failed to parse url: %s\n", e);
428 close_with_err(req, e);
432 if ((req->fd = conn_towards(&req->url, &err)) == -1)
434 if ((req->ctx = tls_client()) == NULL)
436 if (tls_configure(req->ctx, tlsconf) == -1) {
437 err = xasprintf("tls_configure: %s", tls_error(req->ctx));
440 if (tls_connect_socket(req->ctx, req->fd, req->url.host) == -1) {
441 err = xasprintf("tls_connect_socket: %s", tls_error(req->ctx));
445 yield_w(req, do_handshake, &timeout_for_handshake);
449 close_with_err(req, err);
454 handle_cert_status(struct imsg *imsg, size_t datalen)
459 req = req_by_id(imsg->hdr.peerid);
461 if (datalen < sizeof(is_ok))
463 memcpy(&is_ok, imsg->data, sizeof(is_ok));
466 yield_w(req, write_request, NULL);
468 close_conn(0, 0, req);
472 handle_proceed(struct imsg *imsg, size_t datalen)
476 req = req_by_id(imsg->hdr.peerid);
477 yield_r(req, copy_body, NULL);
481 handle_stop(struct imsg *imsg, size_t datalen)
485 if ((req = req_by_id_try(imsg->hdr.peerid)) == NULL)
487 close_conn(0, 0, req);
491 handle_quit(struct imsg *imsg, size_t datalen)
497 dispatch_imsg(int fd, short ev, void *d)
499 struct imsgbuf *ibuf = d;
504 if ((n = imsg_read(ibuf)) == -1) {
505 if (errno == EAGAIN || errno == EWOULDBLOCK)
514 if ((n = imsg_get(ibuf, &imsg)) == -1)
518 datalen = imsg.hdr.len - IMSG_HEADER_SIZE;
519 handlers[imsg.hdr.type](&imsg, datalen);
525 client_main(struct imsgbuf *b)
529 TAILQ_INIT(&reqhead);
531 if ((tlsconf = tls_config_new()) == NULL)
533 tls_config_insecure_noverifycert(tlsconf);
537 event_set(&imsgev, ibuf->fd, EV_READ | EV_PERSIST, dispatch_imsg, ibuf);
538 event_add(&imsgev, NULL);
540 sandbox_network_process();