2 * Copyright (c) 2021 Omar Polo <op@omarpolo.com>
4 * Permission to use, copy, modify, and distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
22 * to something more asynchronous
25 #include <telescope.h>
27 #include <sys/types.h>
28 #include <sys/socket.h>
30 #include <netinet/in.h>
47 static struct event imsgev;
48 static struct tls_config *tlsconf;
49 static struct imsgbuf *ibuf;
53 static void die(void) __attribute__((__noreturn__));
56 static void try_to_connect(int, short, void*);
57 static void query_done(struct asr_result*, void*);
58 static void async_conn_towards(struct req*);
60 static char *xasprintf(const char*, ...);
61 static int blocking_conn_towards(struct url*, char**);
64 static void close_with_err(struct req*, const char*);
65 static void close_with_errf(struct req*, const char*, ...) __attribute__((format(printf, 2, 3)));
66 static struct req *req_by_id(uint32_t);
67 static struct req *req_by_id_try(uint32_t);
69 static void setup_tls(struct req*);
70 static void do_handshake(int, short, void*);
71 static void write_request(int, short, void*);
72 static void read_reply(int, short, void*);
73 static void parse_reply(struct req*);
74 static void copy_body(int, short, void*);
76 static void handle_get(struct imsg*, size_t);
77 static void handle_cert_status(struct imsg*, size_t);
78 static void handle_proceed(struct imsg*, size_t);
79 static void handle_stop(struct imsg*, size_t);
80 static void handle_quit(struct imsg*, size_t);
81 static void handle_dispatch_imsg(int, short, void*);
83 /* TODO: making this customizable */
84 struct timeval timeout_for_handshake = { 5, 0 };
86 static imsg_handlerfn *handlers[] = {
87 [IMSG_GET] = handle_get,
88 [IMSG_CERT_STATUS] = handle_cert_status,
89 [IMSG_PROCEED] = handle_proceed,
90 [IMSG_STOP] = handle_stop,
91 [IMSG_QUIT] = handle_quit,
94 typedef void (*statefn)(int, short, void*);
96 TAILQ_HEAD(, req) reqhead;
97 /* a pending request */
108 struct addrinfo hints, *servinfo, *p;
109 struct event_asr *asrev;
112 TAILQ_ENTRY(req) reqs;
116 yield_r(struct req *req, statefn fn, struct timeval *tv)
118 event_once(req->fd, EV_READ, fn, req, tv);
122 yield_w(struct req *req, statefn fn, struct timeval *tv)
124 event_once(req->fd, EV_WRITE, fn, req, tv);
128 advance_buf(struct req *req, size_t len)
130 assert(len <= req->off);
133 memmove(req->buf, req->buf + len, req->off);
136 static void __attribute__((__noreturn__))
144 try_to_connect(int fd, short ev, void *d)
148 socklen_t len = sizeof(error);
154 if (getsockopt(req->fd, SOL_SOCKET, SO_ERROR, &error, &len) == -1)
163 req->fd = socket(req->p->ai_family, req->p->ai_socktype, req->p->ai_protocol);
165 req->p = req->p->ai_next;
166 try_to_connect(fd, ev, req);
168 mark_nonblock(req->fd);
169 if (connect(req->fd, req->p->ai_addr, req->p->ai_addrlen) == 0)
171 yield_w(req, try_to_connect, NULL);
176 freeaddrinfo(req->servinfo);
177 close_with_errf(req, "failed to connect to %s",
182 freeaddrinfo(req->servinfo);
187 query_done(struct asr_result *res, void *d)
192 if (res->ar_gai_errno != 0) {
193 close_with_errf(req, "failed to resolve %s: %s",
194 req->url.host, gai_strerror(res->ar_gai_errno));
199 req->servinfo = res->ar_addrinfo;
200 req->p = res->ar_addrinfo;
201 try_to_connect(0, 0, req);
205 async_conn_towards(struct req *req)
208 const char *proto = "1965";
210 if (*req->url.port != '\0')
211 proto = req->url.port;
213 req->hints.ai_family = AF_UNSPEC;
214 req->hints.ai_socktype = SOCK_STREAM;
215 q = getaddrinfo_async(req->url.host, proto, &req->hints, NULL);
216 req->asrev = event_asr_run(q, query_done, req);
220 xasprintf(const char *fmt, ...)
226 if (vasprintf(&s, fmt, ap) == -1)
234 blocking_conn_towards(struct url *url, char **err)
236 struct addrinfo hints, *servinfo, *p;
238 const char *proto = "1965";
242 if (*url->port != '\0')
245 memset(&hints, 0, sizeof(hints));
246 hints.ai_family = AF_UNSPEC;
247 hints.ai_socktype = SOCK_STREAM;
249 if ((status = getaddrinfo(url->host, proto, &hints, &servinfo))) {
250 *err = xasprintf("failed to resolve %s: %s",
251 url->host, gai_strerror(status));
256 for (p = servinfo; p != NULL; p = p->ai_next) {
257 if ((sock = socket(p->ai_family, p->ai_socktype, p->ai_protocol)) == -1)
259 if (connect(sock, p->ai_addr, p->ai_addrlen) != -1)
265 *err = xasprintf("couldn't connect to %s", url->host);
269 freeaddrinfo(servinfo);
275 req_by_id(uint32_t id)
279 if ((r = req_by_id_try(id)) == NULL)
285 req_by_id_try(uint32_t id)
289 TAILQ_FOREACH(r, &reqhead, reqs) {
298 close_conn(int fd, short ev, void *d)
303 if (req->asrev != NULL)
304 event_asr_abort(req->asrev);
307 if (req->ctx != NULL) {
308 switch (tls_close(req->ctx)) {
309 case TLS_WANT_POLLIN:
310 yield_r(req, close_conn, NULL);
312 case TLS_WANT_POLLOUT:
313 yield_w(req, close_conn, NULL);
320 TAILQ_REMOVE(&reqhead, req, reqs);
327 close_with_err(struct req *req, const char *err)
329 imsg_compose(ibuf, IMSG_ERR, req->id, 0, -1, err, strlen(err)+1);
331 close_conn(0, 0, req);
335 close_with_errf(struct req *req, const char *fmt, ...)
341 if (vasprintf(&s, fmt, ap) == -1)
345 close_with_err(req, s);
350 setup_tls(struct req *req)
352 if ((req->ctx = tls_client()) == NULL) {
353 close_with_errf(req, "tls_client: %s", strerror(errno));
356 if (tls_configure(req->ctx, tlsconf) == -1) {
357 close_with_errf(req, "tls_configure: %s", tls_error(req->ctx));
360 if (tls_connect_socket(req->ctx, req->fd, req->url.host) == -1) {
361 close_with_errf(req, "tls_connect_socket: %s", tls_error(req->ctx));
364 yield_w(req, do_handshake, &timeout_for_handshake);
368 do_handshake(int fd, short ev, void *d)
373 if (ev == EV_TIMEOUT) {
374 close_with_err(req, "Timeout loading page");
378 switch (tls_handshake(req->ctx)) {
379 case TLS_WANT_POLLIN:
380 yield_r(req, do_handshake, NULL);
382 case TLS_WANT_POLLOUT:
383 yield_w(req, do_handshake, NULL);
387 hash = tls_peer_cert_hash(req->ctx);
389 close_with_errf(req, "handshake failed: %s", tls_error(req->ctx));
392 imsg_compose(ibuf, IMSG_CHECK_CERT, req->id, 0, -1, hash, strlen(hash)+1);
397 write_request(int fd, short ev, void *d)
404 strlcpy(buf, "gemini://", sizeof(buf));
405 strlcat(buf, req->url.host, sizeof(buf));
406 strlcat(buf, "/", sizeof(buf));
407 strlcat(buf, req->url.path, sizeof(buf));
409 if (req->url.query[0] != '\0') {
410 strlcat(buf, "?", sizeof(buf));
411 strlcat(buf, req->url.query, sizeof(buf));
414 len = strlcat(buf, "\r\n", sizeof(buf));
416 assert(len <= sizeof(buf));
418 switch (r = tls_write(req->ctx, buf, len)) {
420 close_with_errf(req, "tls_write: %s", tls_error(req->ctx));
422 case TLS_WANT_POLLIN:
423 yield_r(req, write_request, NULL);
425 case TLS_WANT_POLLOUT:
426 yield_w(req, write_request, NULL);
429 /* assume r == len */
431 yield_r(req, read_reply, NULL);
437 read_reply(int fd, short ev, void *d)
444 buf = req->buf + req->off;
445 len = sizeof(req->buf) - req->off;
447 switch (r = tls_read(req->ctx, buf, len)) {
449 close_with_errf(req, "tls_read: %s", tls_error(req->ctx));
451 case TLS_WANT_POLLIN:
452 yield_r(req, read_reply, NULL);
454 case TLS_WANT_POLLOUT:
455 yield_w(req, read_reply, NULL);
460 if (memmem(req->buf, req->off, "\r\n", 2) != NULL)
462 else if (req->off == sizeof(req->buf))
463 close_with_err(req, "invalid response");
465 yield_r(req, read_reply, NULL);
471 parse_reply(struct req *req)
480 if (!isdigit(req->buf[0]) || !isdigit(req->buf[1]))
483 code = (req->buf[0] - '0')*10 + (req->buf[1] - '0');
485 if (!isspace(req->buf[2]))
489 if ((e = memmem(req->buf, req->off, "\r\n", 2)) == NULL)
495 imsg_compose(ibuf, IMSG_GOT_CODE, req->id, 0, -1, &code, sizeof(code));
496 imsg_compose(ibuf, IMSG_GOT_META, req->id, 0, -1,
501 close_conn(0, 0, req);
503 advance_buf(req, len+1); /* skip \n too */
508 close_with_err(req, "malformed request");
512 copy_body(int fd, short ev, void *d)
519 imsg_compose(ibuf, IMSG_BUF, req->id, 0, -1,
525 switch (r = tls_read(req->ctx, req->buf, sizeof(req->buf))) {
526 case TLS_WANT_POLLIN:
527 yield_r(req, copy_body, NULL);
529 case TLS_WANT_POLLOUT:
530 yield_w(req, copy_body, NULL);
533 imsg_compose(ibuf, IMSG_EOF, req->id, 0, -1, NULL, 0);
535 close_conn(0, 0, req);
544 handle_get(struct imsg *imsg, size_t datalen)
552 if (data[datalen-1] != '\0')
555 if ((req = calloc(1, sizeof(*req))) == NULL)
558 req->id = imsg->hdr.peerid;
559 TAILQ_INSERT_HEAD(&reqhead, req, reqs);
561 if (!url_parse(imsg->data, &req->url, &e)) {
562 close_with_err(req, e);
567 async_conn_towards(req);
572 if ((req->fd = blocking_conn_towards(&req->url, &err)) == -1) {
573 close_with_err(req, err);
583 handle_cert_status(struct imsg *imsg, size_t datalen)
588 req = req_by_id(imsg->hdr.peerid);
590 if (datalen < sizeof(is_ok))
592 memcpy(&is_ok, imsg->data, sizeof(is_ok));
595 yield_w(req, write_request, NULL);
597 close_conn(0, 0, req);
601 handle_proceed(struct imsg *imsg, size_t datalen)
603 yield_r(req_by_id(imsg->hdr.peerid),
608 handle_stop(struct imsg *imsg, size_t datalen)
612 if ((req = req_by_id_try(imsg->hdr.peerid)) == NULL)
614 close_conn(0, 0, req);
618 handle_quit(struct imsg *imsg, size_t datalen)
624 handle_dispatch_imsg(int fd, short ev, void *d)
626 struct imsgbuf *ibuf = d;
627 dispatch_imsg(ibuf, handlers, sizeof(handlers));
631 client_main(struct imsgbuf *b)
635 TAILQ_INIT(&reqhead);
637 if ((tlsconf = tls_config_new()) == NULL)
639 tls_config_insecure_noverifycert(tlsconf);
640 tls_config_insecure_noverifyname(tlsconf);
644 event_set(&imsgev, ibuf->fd, EV_READ | EV_PERSIST, handle_dispatch_imsg, ibuf);
645 event_add(&imsgev, NULL);
647 sandbox_network_process();