Blob
Date:
Sat Sep 10 14:29:40 2022
UTC
Message:
specify custom version strings for the various cmds
/** Copyright (c) 2022 Omar Polo <op@omarpolo.com>** Permission to use, copy, modify, and distribute this software for any* purpose with or without fee is hereby granted, provided that the above* copyright notice and this permission notice appear in all copies.** THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.*/#include "gmid.h"#include <sys/stat.h>#include <sys/wait.h>#include <errno.h>#include <fcntl.h>#include <getopt.h>#include <libgen.h>#include <signal.h>#include <string.h>#include <unistd.h>struct imsgbuf ibuf, logibuf;struct conf conf;struct fcgi fcgi[FCGI_MAX]; /* just because it's referenced */struct vhosthead hosts;static const struct option opts[] = {{"help", no_argument, NULL, 'h'},{"version", no_argument, NULL, 'V'},{NULL, 0, NULL, 0},};voidload_local_cert(struct vhost *h, const char *hostname, const char *dir){char *cert, *key;if (asprintf(&cert, "%s/%s.cert.pem", dir, hostname) == -1)errx(1, "asprintf");if (asprintf(&key, "%s/%s.key.pem", dir, hostname) == -1)errx(1, "asprintf");if (access(cert, R_OK) == -1 || access(key, R_OK) == -1)gen_certificate(hostname, cert, key);h->cert = cert;h->key = key;h->domain = hostname;}/* wrapper around dirname(3). dn must be PATH_MAX+1 at least. */static voidpdirname(const char *path, char *dn){char p[PATH_MAX+1];char *t;strlcpy(p, path, sizeof(p));t = dirname(p);memmove(dn, t, strlen(t)+1);}static voidmkdirs(const char *path, mode_t mode){char dname[PATH_MAX+1];pdirname(path, dname);if (!strcmp(dname, "/"))return;mkdirs(dname, mode);if (mkdir(path, mode) != 0 && errno != EEXIST)fatal("can't mkdir %s: %s", path, strerror(errno));}/* $XDG_DATA_HOME/gmid */char *data_dir(void){const char *home, *xdg;char *t;if ((xdg = getenv("XDG_DATA_HOME")) == NULL) {if ((home = getenv("HOME")) == NULL)errx(1, "XDG_DATA_HOME and HOME both empty");if (asprintf(&t, "%s/.local/share/gmid", home) == -1)err(1, "asprintf");} else {if (asprintf(&t, "%s/gmid", xdg) == -1)err(1, "asprintf");}mkdirs(t, 0755);return t;}static voidlogger_init(void){int p[2];if (socketpair(AF_UNIX, SOCK_STREAM, PF_UNSPEC, p) == -1)err(1, "socketpair");switch (fork()) {case -1:err(1, "fork");case 0:close(p[0]);setproctitle("logger");imsg_init(&logibuf, p[1]);_exit(logger_main(p[1], &logibuf));default:close(p[1]);imsg_init(&logibuf, p[0]);return;}}static intserve(const char *host, int port, const char *dir, struct tls *ctx){struct addrinfo hints, *res, *res0;int error, saved_errno, sock = -1;const char *cause = NULL;char service[32];if (snprintf(service, sizeof(service), "%d", port) < 0)fatal("snprintf");memset(&hints, 0, sizeof(hints));hints.ai_family = AF_UNSPEC;hints.ai_socktype = SOCK_STREAM;hints.ai_flags = AI_PASSIVE;error = getaddrinfo(host, service, &hints, &res0);if (error)fatal("%s", gai_strerror(error));for (res = res0; res; res = res->ai_next) {sock = socket(res->ai_family, res->ai_socktype,res->ai_protocol);if (sock == -1) {cause = "socket";continue;}if (bind(sock, res->ai_addr, res->ai_addrlen) == -1) {cause = "bind";saved_errno = errno;close(sock);errno = saved_errno;continue;}if (listen(sock, 5) == -1)fatal("listen");/** for the time being, we're happy as soon as* something binds.*/break;}if (sock == -1)fatal("%s", cause);freeaddrinfo(res0);log_notice(NULL, "serving %s on port %d", dir, port);loop(ctx, sock, -1, NULL);return 0;}static __dead voidusage(void){fprintf(stderr,"Version: " GE_STRING "\n""Usage: %s [-hVv] [-d certs-dir] [-H hostname] [-p port] [dir]\n",getprogname());exit(1);}intmain(int argc, char **argv){struct tls_config *tlsconf;struct tls *ctx;struct vhost *host;struct location *loc;const char *errstr, *certs_dir = NULL, *hostname = "localhost";char path[PATH_MAX];int ch;logger_init();conf.port = 1965;while ((ch = getopt_long(argc, argv, "d:H:hp:Vv", opts, NULL)) != -1) {switch (ch) {case 'd':certs_dir = optarg;break;case 'H':hostname = optarg;break;case 'h':usage();break;case 'p':conf.port = strtonum(optarg, 0, UINT16_MAX, &errstr);if (errstr)fatal("port number is %s: %s", errstr, optarg);break;case 'V':puts("Version: " GE_STRING);return 0;default:usage();break;}}argc -= optind;argv += optind;if (argc > 1)usage();/* prepare the configuration */conf.verbose = 1;init_mime(&conf.mime);if (certs_dir == NULL)certs_dir = data_dir();if (load_default_mime(&conf.mime) == -1)fatal("can't load default mime types");sort_mime(&conf.mime);/* set up the implicit vhost and location */host = xcalloc(1, sizeof(*host));TAILQ_INSERT_HEAD(&hosts, host, vhosts);loc = xcalloc(1, sizeof(*loc));loc->fcgi = -1;TAILQ_INSERT_HEAD(&host->locations, loc, locations);load_local_cert(host, hostname, certs_dir);host->domain = "*";loc->auto_index = 1;loc->match = "*";if (*argv == NULL) {if (getcwd(path, sizeof(path)) == NULL)fatal("getcwd");loc->dir = path;} elseloc->dir = absolutify_path(*argv);if ((loc->dirfd = open(loc->dir, O_RDONLY|O_DIRECTORY)) == -1)fatal("can't open %s", loc->dir);/* setup tls */if ((tlsconf = tls_config_new()) == NULL)fatal("tls_config_new"); /* XXX: fatalx *//* optionally accept client certs but don't try to verify them */tls_config_verify_client_optional(tlsconf);tls_config_insecure_noverifycert(tlsconf);if ((ctx = tls_server()) == NULL)fatal("tls_server failure"); /* XXX: fatalx */if (tls_config_set_keypair_file(tlsconf, host->cert, host->key))fatal("can't load the keypair (%s, %s)",host->cert, host->key);if (tls_configure(ctx, tlsconf) == -1)fatal("tls_configure: %s", tls_error(ctx));/* start the server */signal(SIGPIPE, SIG_IGN);setproctitle("%s", loc->dir);return serve(hostname, conf.port, loc->dir, ctx);}
Omar Polo