2 * Copyright (c) 2021 Omar Polo <op@omarpolo.com>
4 * Permission to use, copy, modify, and distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
18 * Handles the data in ~/.telescope
20 * TODO: add some form of locking on the files
26 #include <sys/types.h>
37 #include "telescope.h"
40 static void die(void) __attribute__((__noreturn__));
41 static void send_file(uint32_t, FILE *);
42 static void handle_get(struct imsg*, size_t);
43 static int select_non_dot(const struct dirent *);
44 static int select_non_dotdot(const struct dirent *);
45 static void handle_get_file(struct imsg*, size_t);
46 static void handle_quit(struct imsg*, size_t);
47 static void handle_bookmark_page(struct imsg*, size_t);
48 static void handle_save_cert(struct imsg*, size_t);
49 static void handle_update_cert(struct imsg*, size_t);
50 static void handle_file_open(struct imsg*, size_t);
51 static void handle_session_start(struct imsg*, size_t);
52 static void handle_session_tab(struct imsg*, size_t);
53 static void handle_session_tab_title(struct imsg*, size_t);
54 static void handle_session_end(struct imsg*, size_t);
55 static void handle_dispatch_imsg(int, short, void*);
56 static int fs_send_ui(int, uint32_t, int, const void *, uint16_t);
58 static struct imsgev *iev_ui;
61 static char base_path[PATH_MAX];
62 static char lockfile_path[PATH_MAX];
63 static char bookmark_file[PATH_MAX];
64 static char known_hosts_file[PATH_MAX], known_hosts_tmp[PATH_MAX];
65 static char crashed_file[PATH_MAX];
67 char session_file[PATH_MAX];
69 static imsg_handlerfn *handlers[] = {
70 [IMSG_GET] = handle_get,
71 [IMSG_GET_FILE] = handle_get_file,
72 [IMSG_QUIT] = handle_quit,
73 [IMSG_BOOKMARK_PAGE] = handle_bookmark_page,
74 [IMSG_SAVE_CERT] = handle_save_cert,
75 [IMSG_UPDATE_CERT] = handle_update_cert,
76 [IMSG_FILE_OPEN] = handle_file_open,
77 [IMSG_SESSION_START] = handle_session_start,
78 [IMSG_SESSION_TAB] = handle_session_tab,
79 [IMSG_SESSION_TAB_TITLE] = handle_session_tab_title,
80 [IMSG_SESSION_END] = handle_session_end,
83 static void __attribute__((__noreturn__))
90 send_file(uint32_t peerid, FILE *f)
96 r = fread(buf, 1, sizeof(buf), f);
98 fs_send_ui(IMSG_BUF, peerid, -1, buf, r);
102 fs_send_ui(IMSG_EOF, peerid, -1, NULL, 0);
107 handle_get(struct imsg *imsg, size_t datalen)
109 const char *bpath = "bookmarks.gmi";
112 const char *data, *p;
120 {"about", NULL, about_about, about_about_len},
121 {"blank", NULL, about_blank, about_blank_len},
122 {"bookmarks", bpath, bookmarks, bookmarks_len},
123 {"crash", NULL, about_crash, about_crash_len},
124 {"help", NULL, about_help, about_help_len},
125 {"license", NULL, about_license, about_license_len},
126 {"new", NULL, about_new, about_new_len},
130 if (data[datalen-1] != '\0') /* make sure it's NUL-terminated */
132 if ((data = strchr(data, ':')) == NULL)
136 for (i = 0; i < sizeof(pages)/sizeof(pages[0]); ++i)
137 if (!strcmp(data, pages[i].name)) {
145 strlcpy(path, base_path, sizeof(path));
146 strlcat(path, "/", sizeof(path));
147 if (page->path != NULL)
148 strlcat(path, page->path, sizeof(path));
150 strlcat(path, "pages/about_", sizeof(path));
151 strlcat(path, page->name, sizeof(path));
152 strlcat(path, ".gmi", sizeof(path));
155 if ((f = fopen(path, "r")) == NULL) {
156 fs_send_ui(IMSG_BUF, imsg->hdr.peerid, -1,
157 page->data, page->len);
158 fs_send_ui(IMSG_EOF, imsg->hdr.peerid, -1,
163 send_file(imsg->hdr.peerid, f);
167 p = "# not found!\n";
168 fs_send_ui(IMSG_BUF, imsg->hdr.peerid, -1, p, strlen(p));
169 fs_send_ui(IMSG_EOF, imsg->hdr.peerid, -1, NULL, 0);
173 send_hdr(uint32_t peerid, int code, const char *meta)
175 fs_send_ui(IMSG_GOT_CODE, peerid, -1, &code, sizeof(code));
176 fs_send_ui(IMSG_GOT_META, peerid, -1, meta, strlen(meta)+1);
179 static inline const char *
180 file_type(const char *path)
186 {"diff", "text/x-patch"},
187 {"gemini", "text/gemini"},
188 {"gmi", "text/gemini"},
189 {"markdown", "text/plain"},
190 {"md", "text/plain"},
191 {"patch", "text/x-patch"},
192 {"txt", "text/plain"},
197 if ((dot = strrchr(path, '.')) == NULL)
202 for (m = ms; m->ext != NULL; ++m)
203 if (!strcmp(m->ext, dot))
210 select_non_dot(const struct dirent *d)
212 return strcmp(d->d_name, ".");
216 select_non_dotdot(const struct dirent *d)
218 return strcmp(d->d_name, ".") && strcmp(d->d_name, "..");
222 send_dir(uint32_t peerid, const char *path)
224 struct dirent **names;
227 int (*selector)(const struct dirent *) = select_non_dot;
230 if (!has_suffix(path, "/")) {
231 if (asprintf(&s, "%s/", path) == -1)
233 send_hdr(peerid, 30, s);
238 if (!strcmp(path, "/"))
239 selector = select_non_dotdot;
241 if ((ev = evbuffer_new()) == NULL ||
242 (len = scandir(path, &names, selector, alphasort)) == -1) {
244 send_hdr(peerid, 40, "failure reading the directory");
248 evbuffer_add_printf(ev, "# Index of %s\n\n", path);
249 for (i = 0; i < len; ++i) {
250 evbuffer_add_printf(ev, "=> %s", names[i]->d_name);
251 if (names[i]->d_type == DT_DIR)
252 evbuffer_add(ev, "/", 1);
253 evbuffer_add(ev, "\n", 1);
256 send_hdr(peerid, 20, "text/gemini");
257 fs_send_ui(IMSG_BUF, peerid, -1,
258 EVBUFFER_DATA(ev), EVBUFFER_LENGTH(ev));
259 fs_send_ui(IMSG_EOF, peerid, -1, NULL, 0);
266 handle_get_file(struct imsg *imsg, size_t datalen)
271 const char *meta = NULL;
274 data[datalen-1] = '\0';
276 if ((f = fopen(data, "r")) == NULL) {
277 send_hdr(imsg->hdr.peerid, 51, "can't open the file");
281 if (fstat(fileno(f), &sb) == -1) {
282 send_hdr(imsg->hdr.peerid, 40, "fstat failed");
286 if (S_ISDIR(sb.st_mode)) {
288 send_dir(imsg->hdr.peerid, data);
292 if ((meta = file_type(data)) == NULL) {
294 send_hdr(imsg->hdr.peerid, 51,
295 "don't know how to visualize this file");
299 send_hdr(imsg->hdr.peerid, 20, meta);
300 send_file(imsg->hdr.peerid, f);
304 handle_quit(struct imsg *imsg, size_t datalen)
310 handle_bookmark_page(struct imsg *imsg, size_t datalen)
317 if (data[datalen-1] != '\0')
320 if ((f = fopen(bookmark_file, "a")) == NULL) {
324 fprintf(f, "=> %s\n", data);
329 fs_send_ui(IMSG_BOOKMARK_OK, 0, -1, &res, sizeof(res));
333 handle_save_cert(struct imsg *imsg, size_t datalen)
339 /* TODO: traverse the file to avoid duplications? */
341 if (datalen != sizeof(e))
343 memcpy(&e, imsg->data, datalen);
345 if ((f = fopen(known_hosts_file, "a")) == NULL) {
349 fprintf(f, "%s %s %d\n", e.domain, e.hash, e.verified);
354 fs_send_ui(IMSG_SAVE_CERT_OK, imsg->hdr.peerid, -1,
359 handle_update_cert(struct imsg *imsg, size_t datalen)
362 struct tofu_entry entry;
363 char sfn[PATH_MAX], *line = NULL, *t;
364 size_t l, linesize = 0;
368 if (datalen != sizeof(entry))
370 memcpy(&entry, imsg->data, datalen);
372 strlcpy(sfn, known_hosts_tmp, sizeof(sfn));
373 if ((fd = mkstemp(sfn)) == -1 ||
374 (tmp = fdopen(fd, "w")) == NULL) {
383 if ((f = fopen(known_hosts_file, "r")) == NULL) {
390 l = strlen(entry.domain);
391 while ((linelen = getline(&line, &linesize, f)) != -1) {
392 if ((t = strstr(line, entry.domain)) != NULL &&
393 (line[l] == ' ' || line[l] == '\t'))
395 /* line has a trailing \n */
396 fprintf(tmp, "%s", line);
398 fprintf(tmp, "%s %s %d\n", entry.domain, entry.hash, entry.verified);
412 res = rename(sfn, known_hosts_file) != -1;
415 fs_send_ui(IMSG_UPDATE_CERT_OK, imsg->hdr.peerid, -1,
420 handle_file_open(struct imsg *imsg, size_t datalen)
426 if (path[datalen-1] != '\0')
429 if ((fd = open(path, O_WRONLY | O_TRUNC | O_CREAT, 0644)) == -1) {
431 fs_send_ui(IMSG_FILE_OPENED, imsg->hdr.peerid, -1,
434 fs_send_ui(IMSG_FILE_OPENED, imsg->hdr.peerid, fd,
439 handle_session_start(struct imsg *imsg, size_t datalen)
444 if ((session = fopen(session_file, "w")) == NULL)
449 handle_session_tab(struct imsg *imsg, size_t datalen)
457 flags = imsg->hdr.peerid;
459 if (datalen == 0 || url[datalen-1] != '\0')
461 fprintf(session, "%s", url);
463 if (flags & TAB_CURRENT)
464 fprintf(session, " current ");
466 fprintf(session, " - ");
470 handle_session_tab_title(struct imsg *imsg, size_t datalen)
480 if (title[datalen-1] != '\0')
483 fprintf(session, "%s\n", title);
487 handle_session_end(struct imsg *imsg, size_t datalen)
496 handle_dispatch_imsg(int fd, short ev, void *d)
498 struct imsgev *iev = d;
501 if (dispatch_imsg(iev, ev, handlers, sizeof(handlers)) == -1) {
503 * This should leave a ~/.telescope/crashed file to
504 * trigger about:crash on next run. Unfortunately, if
505 * the main process dies the fs sticks around and
506 * doesn't notice that the fd was closed. Why EV_READ
507 * is not triggered when a fd is closed on the other end?
510 if ((fd = open(crashed_file, O_CREAT|O_TRUNC|O_WRONLY, 0600))
514 errx(1, "connection closed: %s", strerror(e));
519 fs_send_ui(int type, uint32_t peerid, int fd, const void *data,
522 return imsg_compose_event(iev_ui, type, peerid, 0, fd,
529 strlcpy(base_path, getenv("HOME"), sizeof(base_path));
530 strlcat(base_path, "/.telescope", sizeof(base_path));
531 mkdir(base_path, 0700);
533 strlcpy(lockfile_path, base_path, sizeof(lockfile_path));
534 strlcat(lockfile_path, "/lock", sizeof(lockfile_path));
536 strlcpy(bookmark_file, base_path, sizeof(bookmark_file));
537 strlcat(bookmark_file, "/bookmarks.gmi", sizeof(bookmark_file));
539 strlcpy(known_hosts_file, base_path, sizeof(known_hosts_file));
540 strlcat(known_hosts_file, "/known_hosts", sizeof(known_hosts_file));
542 strlcpy(known_hosts_tmp, base_path, sizeof(known_hosts_tmp));
543 strlcat(known_hosts_tmp, "/known_hosts.tmp.XXXXXXXXXX",
544 sizeof(known_hosts_file));
546 strlcpy(session_file, base_path, sizeof(session_file));
547 strlcat(session_file, "/session", sizeof(session_file));
549 strlcpy(crashed_file, base_path, sizeof(crashed_file));
550 strlcat(crashed_file, "/crashed", sizeof(crashed_file));
564 /* Setup pipe and event handler to the main process */
565 if ((iev_ui = malloc(sizeof(*iev_ui))) == NULL)
567 imsg_init(&iev_ui->ibuf, 3);
568 iev_ui->handler = handle_dispatch_imsg;
569 iev_ui->events = EV_READ;
570 event_set(&iev_ui->ev, iev_ui->ibuf.fd, iev_ui->events,
571 iev_ui->handler, iev_ui);
572 event_add(&iev_ui->ev, NULL);
574 sandbox_fs_process();
583 last_time_crashed(void)
587 if ((fd = open(crashed_file, O_RDONLY)) == -1)
591 unlink(crashed_file);
601 if ((fd = open(lockfile_path, O_WRONLY|O_CREAT, 0600)) == -1)
606 lock.l_type = F_WRLCK;
607 lock.l_whence = SEEK_SET;
609 if (fcntl(fd, F_SETLK, &lock) == -1) {
618 parse_khost_line(char *line, char *tmp[3])
622 for (ap = tmp; ap < &tmp[3] &&
623 (*ap = strsep(&line, " \t\n")) != NULL;) {
628 return ap == &tmp[3] && *line == '\0';
632 load_certs(struct ohash *h)
634 char *tmp[3], *line = NULL;
636 size_t lineno = 0, linesize = 0;
639 struct tofu_entry *e;
641 if ((f = fopen(known_hosts_file, "r")) == NULL)
644 while ((linelen = getline(&line, &linesize, f)) != -1) {
645 if ((e = calloc(1, sizeof(*e))) == NULL)
650 if (parse_khost_line(line, tmp)) {
651 strlcpy(e->domain, tmp[0], sizeof(e->domain));
652 strlcpy(e->hash, tmp[1], sizeof(e->hash));
654 e->verified = strtonum(tmp[2], 0, 1, &errstr);
656 errx(1, "%s:%zu verification for %s is %s: %s",
657 known_hosts_file, lineno,
658 e->domain, errstr, tmp[2]);
661 warnx("%s:%zu invalid entry",
662 known_hosts_file, lineno);