2 * Copyright (c) 2021 Omar Polo <op@omarpolo.com>
4 * Permission to use, copy, modify, and distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
18 * Handles the data in ~/.telescope
20 * TODO: add some form of locking on the files
35 #include "telescope.h"
38 static void die(void) __attribute__((__noreturn__));
39 static void handle_get(struct imsg*, size_t);
40 static void handle_quit(struct imsg*, size_t);
41 static void handle_bookmark_page(struct imsg*, size_t);
42 static void handle_save_cert(struct imsg*, size_t);
43 static void handle_update_cert(struct imsg*, size_t);
44 static void handle_file_open(struct imsg*, size_t);
45 static void handle_session_start(struct imsg*, size_t);
46 static void handle_session_tab(struct imsg*, size_t);
47 static void handle_session_tab_title(struct imsg*, size_t);
48 static void handle_session_end(struct imsg*, size_t);
49 static void handle_dispatch_imsg(int, short, void*);
50 static int fs_send_ui(int, uint32_t, int, const void *, uint16_t);
52 static struct imsgev *iev_ui;
55 static char base_path[PATH_MAX];
56 static char lockfile_path[PATH_MAX];
57 static char bookmark_file[PATH_MAX];
58 static char known_hosts_file[PATH_MAX], known_hosts_tmp[PATH_MAX];
59 static char crashed_file[PATH_MAX];
61 char session_file[PATH_MAX];
63 static imsg_handlerfn *handlers[] = {
64 [IMSG_GET] = handle_get,
65 [IMSG_QUIT] = handle_quit,
66 [IMSG_BOOKMARK_PAGE] = handle_bookmark_page,
67 [IMSG_SAVE_CERT] = handle_save_cert,
68 [IMSG_UPDATE_CERT] = handle_update_cert,
69 [IMSG_FILE_OPEN] = handle_file_open,
70 [IMSG_SESSION_START] = handle_session_start,
71 [IMSG_SESSION_TAB] = handle_session_tab,
72 [IMSG_SESSION_TAB_TITLE] = handle_session_tab_title,
73 [IMSG_SESSION_END] = handle_session_end,
76 static void __attribute__((__noreturn__))
83 handle_get(struct imsg *imsg, size_t datalen)
85 const char *bpath = "bookmarks.gmi";
86 char path[PATH_MAX], buf[BUFSIZ];
97 {"about", NULL, about_about, about_about_len},
98 {"blank", NULL, about_blank, about_blank_len},
99 {"bookmarks", bpath, bookmarks, bookmarks_len},
100 {"crash", NULL, about_crash, about_crash_len},
101 {"help", NULL, about_help, about_help_len},
102 {"license", NULL, about_license, about_license_len},
103 {"new", NULL, about_new, about_new_len},
107 if (data[datalen-1] != '\0') /* make sure it's NUL-terminated */
109 if ((data = strchr(data, ':')) == NULL)
113 for (i = 0; i < sizeof(pages)/sizeof(pages[0]); ++i)
114 if (!strcmp(data, pages[i].name)) {
122 strlcpy(path, base_path, sizeof(path));
123 strlcat(path, "/", sizeof(path));
124 if (page->path != NULL)
125 strlcat(path, page->path, sizeof(path));
127 strlcat(path, "pages/about_", sizeof(path));
128 strlcat(path, page->name, sizeof(path));
129 strlcat(path, ".gmi", sizeof(path));
132 if ((f = fopen(path, "r")) == NULL) {
133 fs_send_ui(IMSG_BUF, imsg->hdr.peerid, -1,
134 page->data, page->len);
135 fs_send_ui(IMSG_EOF, imsg->hdr.peerid, -1,
141 r = fread(buf, 1, sizeof(buf), f);
142 fs_send_ui(IMSG_BUF, imsg->hdr.peerid, -1, buf, r);
143 if (r != sizeof(buf))
146 fs_send_ui(IMSG_EOF, imsg->hdr.peerid, -1, NULL, 0);
151 p = "# not found!\n";
152 fs_send_ui(IMSG_BUF, imsg->hdr.peerid, -1, p, strlen(p));
153 fs_send_ui(IMSG_EOF, imsg->hdr.peerid, -1, NULL, 0);
157 handle_quit(struct imsg *imsg, size_t datalen)
163 handle_bookmark_page(struct imsg *imsg, size_t datalen)
170 if (data[datalen-1] != '\0')
173 if ((f = fopen(bookmark_file, "a")) == NULL) {
177 fprintf(f, "=> %s\n", data);
182 fs_send_ui(IMSG_BOOKMARK_OK, 0, -1, &res, sizeof(res));
186 handle_save_cert(struct imsg *imsg, size_t datalen)
192 /* TODO: traverse the file to avoid duplications? */
194 if (datalen != sizeof(e))
196 memcpy(&e, imsg->data, datalen);
198 if ((f = fopen(known_hosts_file, "a")) == NULL) {
202 fprintf(f, "%s %s %d\n", e.domain, e.hash, e.verified);
207 fs_send_ui(IMSG_SAVE_CERT_OK, imsg->hdr.peerid, -1,
212 handle_update_cert(struct imsg *imsg, size_t datalen)
215 struct tofu_entry entry;
216 char sfn[PATH_MAX], *line = NULL, *t;
217 size_t l, linesize = 0;
221 if (datalen != sizeof(entry))
223 memcpy(&entry, imsg->data, datalen);
225 strlcpy(sfn, known_hosts_tmp, sizeof(sfn));
226 if ((fd = mkstemp(sfn)) == -1 ||
227 (tmp = fdopen(fd, "w")) == NULL) {
236 if ((f = fopen(known_hosts_file, "r")) == NULL) {
243 l = strlen(entry.domain);
244 while ((linelen = getline(&line, &linesize, f)) != -1) {
245 if ((t = strstr(line, entry.domain)) != NULL &&
246 (line[l] == ' ' || line[l] == '\t'))
248 /* line has a trailing \n */
249 fprintf(tmp, "%s", line);
251 fprintf(tmp, "%s %s %d\n", entry.domain, entry.hash, entry.verified);
265 res = rename(sfn, known_hosts_file) != -1;
268 fs_send_ui(IMSG_UPDATE_CERT_OK, imsg->hdr.peerid, -1,
273 handle_file_open(struct imsg *imsg, size_t datalen)
279 if (path[datalen-1] != '\0')
282 if ((fd = open(path, O_WRONLY | O_TRUNC | O_CREAT, 0644)) == -1) {
284 fs_send_ui(IMSG_FILE_OPENED, imsg->hdr.peerid, -1,
287 fs_send_ui(IMSG_FILE_OPENED, imsg->hdr.peerid, fd,
292 handle_session_start(struct imsg *imsg, size_t datalen)
297 if ((session = fopen(session_file, "w")) == NULL)
302 handle_session_tab(struct imsg *imsg, size_t datalen)
310 flags = imsg->hdr.peerid;
312 if (datalen == 0 || url[datalen-1] != '\0')
314 fprintf(session, "%s", url);
316 if (flags & TAB_CURRENT)
317 fprintf(session, " current ");
319 fprintf(session, " - ");
323 handle_session_tab_title(struct imsg *imsg, size_t datalen)
333 if (title[datalen-1] != '\0')
336 fprintf(session, "%s\n", title);
340 handle_session_end(struct imsg *imsg, size_t datalen)
349 handle_dispatch_imsg(int fd, short ev, void *d)
351 struct imsgev *iev = d;
354 if (dispatch_imsg(iev, ev, handlers, sizeof(handlers)) == -1) {
356 * This should leave a ~/.telescope/crashed file to
357 * trigger about:crash on next run. Unfortunately, if
358 * the main process dies the fs sticks around and
359 * doesn't notice that the fd was closed. Why EV_READ
360 * is not triggered when a fd is closed on the other end?
363 if ((fd = open(crashed_file, O_CREAT|O_TRUNC|O_WRONLY, 0600))
367 errx(1, "connection closed: %s", strerror(e));
372 fs_send_ui(int type, uint32_t peerid, int fd, const void *data,
375 return imsg_compose_event(iev_ui, type, peerid, 0, fd,
382 strlcpy(base_path, getenv("HOME"), sizeof(base_path));
383 strlcat(base_path, "/.telescope", sizeof(base_path));
384 mkdir(base_path, 0700);
386 strlcpy(lockfile_path, base_path, sizeof(lockfile_path));
387 strlcat(lockfile_path, "/lock", sizeof(lockfile_path));
389 strlcpy(bookmark_file, base_path, sizeof(bookmark_file));
390 strlcat(bookmark_file, "/bookmarks.gmi", sizeof(bookmark_file));
392 strlcpy(known_hosts_file, base_path, sizeof(known_hosts_file));
393 strlcat(known_hosts_file, "/known_hosts", sizeof(known_hosts_file));
395 strlcpy(known_hosts_tmp, base_path, sizeof(known_hosts_tmp));
396 strlcat(known_hosts_tmp, "/known_hosts.tmp.XXXXXXXXXX",
397 sizeof(known_hosts_file));
399 strlcpy(session_file, base_path, sizeof(session_file));
400 strlcat(session_file, "/session", sizeof(session_file));
402 strlcpy(crashed_file, base_path, sizeof(crashed_file));
403 strlcat(crashed_file, "/crashed", sizeof(crashed_file));
417 /* Setup pipe and event handler to the main process */
418 if ((iev_ui = malloc(sizeof(*iev_ui))) == NULL)
420 imsg_init(&iev_ui->ibuf, 3);
421 iev_ui->handler = handle_dispatch_imsg;
422 iev_ui->events = EV_READ;
423 event_set(&iev_ui->ev, iev_ui->ibuf.fd, iev_ui->events,
424 iev_ui->handler, iev_ui);
425 event_add(&iev_ui->ev, NULL);
427 sandbox_fs_process();
436 last_time_crashed(void)
440 if ((fd = open(crashed_file, O_RDONLY)) == -1)
444 unlink(crashed_file);
454 if ((fd = open(lockfile_path, O_WRONLY|O_CREAT, 0600)) == -1)
459 lock.l_type = F_WRLCK;
460 lock.l_whence = SEEK_SET;
462 if (fcntl(fd, F_SETLK, &lock) == -1) {
471 parse_khost_line(char *line, char *tmp[3])
475 for (ap = tmp; ap < &tmp[3] &&
476 (*ap = strsep(&line, " \t\n")) != NULL;) {
481 return ap == &tmp[3] && *line == '\0';
485 load_certs(struct ohash *h)
487 char *tmp[3], *line = NULL;
489 size_t lineno = 0, linesize = 0;
492 struct tofu_entry *e;
494 if ((f = fopen(known_hosts_file, "r")) == NULL)
497 while ((linelen = getline(&line, &linesize, f)) != -1) {
498 if ((e = calloc(1, sizeof(*e))) == NULL)
503 if (parse_khost_line(line, tmp)) {
504 strlcpy(e->domain, tmp[0], sizeof(e->domain));
505 strlcpy(e->hash, tmp[1], sizeof(e->hash));
507 e->verified = strtonum(tmp[2], 0, 1, &errstr);
509 errx(1, "%s:%zu verification for %s is %s: %s",
510 known_hosts_file, lineno,
511 e->domain, errstr, tmp[2]);
514 warnx("%s:%zu invalid entry",
515 known_hosts_file, lineno);