Blob


1 /*
2 * Copyright (c) 2022 Omar Polo <op@omarpolo.com>
3 * Copyright (c) 2006 - 2015 Reyk Floeter <reyk@openbsd.org>
4 *
5 * Permission to use, copy, modify, and distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
8 *
9 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
10 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
11 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
12 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
13 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
14 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16 */
18 #include <sys/types.h>
19 #include <sys/queue.h>
20 #include <sys/tree.h>
21 #include <sys/socket.h>
22 #include <sys/uio.h>
24 #include <netinet/in.h>
25 #include <arpa/inet.h>
26 #include <netdb.h>
28 #include <asr.h>
29 #include <ctype.h>
30 #include <errno.h>
31 #include <event.h>
32 #include <fnmatch.h>
33 #include <limits.h>
34 #include <stdlib.h>
35 #include <stdint.h>
36 #include <stdio.h>
37 #include <string.h>
38 #include <imsg.h>
39 #include <tls.h>
40 #include <unistd.h>
42 #include "config.h"
43 #include "log.h"
44 #include "proc.h"
45 #include "tmpl.h"
47 #include "galileo.h"
49 #define MINIMUM(a, b) ((a) < (b) ? (a) : (b))
51 #if HAVE_LIBEVENT2
52 # define G_TOUT(t) ((t).tv_sec)
53 #else
54 # define G_TOUT(t) (t)
55 #endif
57 /* provided by OpenBSD' base libevent but not in any header? */
58 extern void bufferevent_read_pressure_cb(struct evbuffer *, size_t,
59 size_t, void *);
61 void proxy_init(struct privsep *, struct privsep_proc *, void *);
62 int proxy_launch(struct galileo *);
63 void proxy_inflight_dec(const char *);
64 int proxy_dispatch_parent(int, struct privsep_proc *, struct imsg *);
65 void proxy_translate_gemtext(struct client *);
66 void proxy_resolved(struct asr_result *, void *);
67 void proxy_connect(int, short, void *);
68 int proxy_start_reply(struct client *, int, const char *);
69 void proxy_read(struct bufferevent *, void *);
70 void proxy_write(struct bufferevent *, void *);
71 void proxy_error(struct bufferevent *, short, void *);
72 int proxy_bufferevent_add(struct event *, int);
73 void proxy_tls_writecb(int, short, void *);
74 void proxy_tls_readcb(int, short, void *);
76 static struct privsep_proc procs[] = {
77 { "parent", PROC_PARENT, proxy_dispatch_parent },
78 };
80 volatile int proxy_clients;
81 volatile int proxy_inflight;
82 uint32_t proxy_fcg_id;
84 void
85 proxy(struct privsep *ps, struct privsep_proc *p)
86 {
87 proc_run(ps, p, procs, nitems(procs), proxy_init, NULL);
88 }
90 void
91 proxy_init(struct privsep *ps, struct privsep_proc *p, void *arg)
92 {
93 if (config_init(ps->ps_env) == -1)
94 fatal("failed to initialize configuration");
96 /* We use a custom shutdown callback */
97 /* p->p_shutdown = proxy_shutdown */
99 if (pledge("stdio recvfd unix inet dns", NULL) == -1)
100 fatal("pledge");
103 int
104 proxy_launch(struct galileo *env)
106 event_add(&env->sc_evsock, NULL);
107 return (0);
110 void
111 proxy_purge(struct proxy *pr)
113 free(pr);
116 void
117 proxy_inflight_dec(const char *why)
119 proxy_inflight--;
120 log_debug("%s: inflight decremented, now %d, %s",
121 __func__, proxy_inflight, why);
124 int
125 proxy_dispatch_parent(int fd, struct privsep_proc *p, struct imsg *imsg)
127 struct privsep *ps = p->p_ps;
128 struct galileo *env = ps->ps_env;
130 switch (imsg->hdr.type) {
131 case IMSG_CFG_SRV:
132 if (config_getproxy(env, imsg) == -1)
133 fatal("config_getproxy");
134 break;
135 case IMSG_CFG_SOCK:
136 /* XXX: improve */
138 env->sc_sock_fd = config_getsock(env, imsg);
139 if (env->sc_sock_fd == -1)
140 fatal("config_getsock");
142 event_set(&env->sc_evsock, env->sc_sock_fd,
143 EV_READ | EV_PERSIST, fcgi_accept, env);
144 evtimer_set(&env->sc_evpause, fcgi_accept, env);
145 break;
146 case IMSG_CFG_DONE:
147 config_getcfg(env, imsg);
148 proxy_launch(env);
149 break;
150 case IMSG_CTL_START:
151 break;
152 case IMSG_CTL_RESET:
153 config_getreset(env, imsg);
154 break;
155 default:
156 return (-1);
159 return (0);
162 static int
163 gemtext_translate_line(struct client *clt, char *line)
165 /* preformatted line / closing */
166 if (clt->clt_translate & TR_PRE) {
167 if (!strncmp(line, "```", 3)) {
168 clt->clt_translate &= ~TR_PRE;
169 return (tp_pre_close(clt->clt_tp));
172 if (tp_htmlescape(clt->clt_tp, line) == -1)
173 return (-1);
174 return (clt_putc(clt, '\n'));
177 /* bullet */
178 if (!strncmp(line, "* ", 2)) {
179 if (clt->clt_translate & TR_NAV) {
180 if (clt_puts(clt, "</ul></nav>") == -1)
181 return (-1);
182 clt->clt_translate &= ~TR_NAV;
185 if (!(clt->clt_translate & TR_LIST)) {
186 if (clt_puts(clt, "<ul>") == -1)
187 return (-1);
188 clt->clt_translate |= TR_LIST;
191 if (clt_puts(clt, "<li>") == -1 ||
192 tp_htmlescape(clt->clt_tp, line + 2) == -1 ||
193 clt_puts(clt, "</li>") == -1)
194 return (-1);
195 return (0);
198 if (clt->clt_translate & TR_LIST) {
199 if (clt_puts(clt, "</ul>") == -1)
200 return (-1);
201 clt->clt_translate &= ~TR_LIST;
204 /* link -- TODO: relativify from SCRIPT_NAME */
205 if (!strncmp(line, "=>", 2)) {
206 char *label;
208 line += 2;
209 line += strspn(line, " \t");
211 label = line + strcspn(line, " \t");
212 if (*label == '\0')
213 label = line;
214 else
215 *label++ = '\0';
217 if (fnmatch("*.jpg", line, 0) == 0 ||
218 fnmatch("*.jpeg", line, 0) == 0 ||
219 fnmatch("*.gif", line, 0) == 0 ||
220 fnmatch("*.png", line, 0) == 0 ||
221 fnmatch("*.svg", line, 0) == 0 ||
222 fnmatch("*.webp", line, 0) == 0) {
223 if (clt->clt_translate & TR_NAV) {
224 if (clt_puts(clt, "</ul></nav>") == -1)
225 return (-1);
226 clt->clt_translate &= ~TR_NAV;
229 if (tp_figure(clt->clt_tp, line, label) == -1)
230 return (-1);
232 return (0);
235 if (!(clt->clt_translate & TR_NAV)) {
236 if (clt_puts(clt, "<nav><ul>") == -1)
237 return (-1);
238 clt->clt_translate |= TR_NAV;
241 if (clt_puts(clt, "<li><a href='") == -1)
242 return (-1);
244 /* XXX: do proper parsing */
245 if (*line == '/' || strstr(line, "//") == NULL) {
246 if (tp_urlescape(clt->clt_tp,
247 clt->clt_script_name) == -1)
248 return (-1);
250 /* skip the first / */
251 line++;
254 if (tp_urlescape(clt->clt_tp, line) == -1 ||
255 clt_puts(clt, "'>") == -1 ||
256 tp_htmlescape(clt->clt_tp, label) == -1 ||
257 clt_puts(clt, "</a></li>") == -1)
258 return (-1);
260 return (0);
263 if (clt->clt_translate & TR_NAV) {
264 if (clt_puts(clt, "</ul></nav>") == -1)
265 return (-1);
266 clt->clt_translate &= ~TR_NAV;
269 /* pre opening */
270 if (!strncmp(line, "```", 3)) {
271 line += 3;
272 line += strspn(line, " \t");
274 clt->clt_translate |= TR_PRE;
275 return (tp_pre_open(clt->clt_tp, line));
278 /* citation block */
279 if (*line == '>') {
280 if (clt_puts(clt, "<blockquote>") == -1 ||
281 tp_htmlescape(clt->clt_tp, line + 1) == -1 ||
282 clt_puts(clt, "</blockquote>") == -1)
283 return (-1);
284 return (0);
287 /* headings */
288 if (!strncmp(line, "###", 3)) {
289 if (clt_puts(clt, "<h3>") == -1 ||
290 tp_htmlescape(clt->clt_tp, line + 3) == -1 ||
291 clt_puts(clt, "</h3>") == -1)
292 return (-1);
293 return (0);
295 if (!strncmp(line, "##", 2)) {
296 if (clt_puts(clt, "<h2>") == -1 ||
297 tp_htmlescape(clt->clt_tp, line + 2) == -1 ||
298 clt_puts(clt, "</h2>") == -1)
299 return (-1);
300 return (0);
302 if (!strncmp(line, "#", 1)) {
303 if (clt_puts(clt, "<h1>") == -1 ||
304 tp_htmlescape(clt->clt_tp, line + 1) == -1 ||
305 clt_puts(clt, "</h1>") == -1)
306 return (-1);
307 return (0);
310 /* Not following strictly the gemini specification... */
311 if (*line == '\0')
312 return (0);
314 /* paragraph */
315 if (clt_puts(clt, "<p>") == -1 ||
316 tp_htmlescape(clt->clt_tp, line) == -1 ||
317 clt_puts(clt, "</p>") == -1)
318 return (-1);
320 return (0);
323 void
324 proxy_translate_gemtext(struct client *clt)
326 struct bufferevent *bev = clt->clt_bev;
327 struct evbuffer *src = EVBUFFER_INPUT(bev);
328 char *line;
329 size_t len;
330 int r;
332 for (;;) {
333 line = evbuffer_readln(src, &len, EVBUFFER_EOL_CRLF);
334 if (line == NULL)
335 return;
337 r = gemtext_translate_line(clt, line);
338 free(line);
339 if (r == -1)
340 return;
344 struct proxy_config *
345 proxy_match(struct galileo *env, const char *name)
347 struct proxy *pr;
349 if (name == NULL)
350 return (NULL);
352 TAILQ_FOREACH(pr, &env->sc_proxies, pr_entry) {
353 if (!strcmp(name, pr->pr_conf.host))
354 return (&pr->pr_conf);
357 return (NULL);
360 int
361 proxy_start_request(struct galileo *env, struct client *clt)
363 struct addrinfo hints;
364 struct asr_query *query;
365 int r;
366 char *url;
368 if (clt->clt_path_info == NULL) {
369 log_warnx("PATH_INFO not defined!");
370 if (proxy_start_reply(clt, 501, "text/html") == -1)
371 return (-1);
372 if (tp_error(clt->clt_tp, -1, "internal server error") == -1)
373 return (-1);
374 return (fcgi_end_request(clt, 1));
377 if ((clt->clt_pc = proxy_match(env, clt->clt_server_name)) == NULL) {
378 if (proxy_start_reply(clt, 501, "text/html") == -1)
379 return (-1);
380 if (tp_error(clt->clt_tp, -1, "unknown server") == -1)
381 return (-1);
382 return (fcgi_end_request(clt, 1));
385 if (clt->clt_bodylen != 0 && clt->clt_body == NULL) {
386 if (proxy_start_reply(clt, 400, "text/html") == -1)
387 return (-1);
388 if (tp_error(clt->clt_tp, -1, "bad request") == -1)
389 return (-1);
390 return (fcgi_end_request(clt, 1));
393 if (clt->clt_body) {
394 r = asprintf(&url, "%s%s?%s", clt->clt_script_name,
395 clt->clt_path_info + 1, clt->clt_body);
396 if (r == -1)
397 return (fcgi_end_request(clt, 1));
399 if (proxy_start_reply(clt, 302, url) == -1 ||
400 fcgi_end_request(clt, 1) == -1) {
401 free(url);
402 return (-1);
404 free(url);
405 return (0);
408 memset(&hints, 0, sizeof(hints));
409 hints.ai_family = AF_UNSPEC;
410 hints.ai_socktype = SOCK_STREAM;
412 query = getaddrinfo_async(clt->clt_pc->proxy_addr,
413 clt->clt_pc->proxy_port, &hints, NULL);
414 if (query == NULL) {
415 log_warn("getaddrinfo_async");
416 return (fcgi_abort_request(clt));
419 clt->clt_evasr = event_asr_run(query, proxy_resolved, clt);
420 if (clt->clt_evasr == NULL) {
421 log_warn("event_asr_run");
422 asr_abort(query);
423 return (fcgi_abort_request(clt));
426 return (0);
429 void
430 proxy_resolved(struct asr_result *res, void *d)
432 struct client *clt = d;
433 struct proxy_config *pc = clt->clt_pc;
435 clt->clt_evasr = NULL;
437 if (res->ar_gai_errno != 0) {
438 log_warnx("failed to resolve %s:%s: %s",
439 pc->proxy_addr, pc->proxy_port,
440 gai_strerror(res->ar_gai_errno));
441 if (proxy_start_reply(clt, 501, "text/html") == -1)
442 return;
443 if (tp_error(clt->clt_tp, -1, "Can't resolve host") == -1)
444 return;
445 fcgi_end_request(clt, 1);
446 return;
449 clt->clt_addrinfo = res->ar_addrinfo;
450 clt->clt_p = clt->clt_addrinfo;
451 proxy_connect(-1, 0, clt);
454 void
455 proxy_connect(int fd, short ev, void *d)
457 struct client *clt = d;
458 struct evbuffer *out;
459 struct addrinfo *p;
460 struct tls_config *conf;
461 struct timeval conntv = {5, 0};
462 int err = 0;
463 socklen_t len = sizeof(err);
465 again:
466 if (clt->clt_p == NULL)
467 goto err;
469 if (clt->clt_fd != -1) {
470 if (getsockopt(clt->clt_fd, SOL_SOCKET, SO_ERROR, &err, &len)
471 == -1)
472 goto err;
473 if (err != 0) {
474 errno = err;
475 goto err;
477 goto done;
480 p = clt->clt_p;
481 clt->clt_fd = socket(p->ai_family, p->ai_socktype | SOCK_NONBLOCK,
482 p->ai_protocol);
483 if (clt->clt_fd == -1) {
484 clt->clt_p = clt->clt_p->ai_next;
485 goto again;
488 if (connect(clt->clt_fd, p->ai_addr, p->ai_addrlen) == 0)
489 goto done;
491 clt->clt_evconn_live = 1;
492 event_set(&clt->clt_evconn, clt->clt_fd, EV_WRITE, proxy_connect, clt);
493 event_add(&clt->clt_evconn, &conntv);
494 return;
496 done:
497 clt->clt_evconn_live = 0;
498 freeaddrinfo(clt->clt_addrinfo);
499 clt->clt_addrinfo = clt->clt_p = NULL;
501 clt->clt_bev = bufferevent_new(clt->clt_fd, proxy_read, proxy_write,
502 proxy_error, clt);
503 if (clt->clt_bev == NULL) {
504 log_warn("bufferevent_new");
505 goto err;
508 if (!clt->clt_pc->no_tls) {
509 /* initialize TLS for Gemini */
510 if ((conf = tls_config_new()) == NULL) {
511 log_warn("tls_config_new failed");
512 goto err;
515 tls_config_insecure_noverifycert(conf);
517 if ((clt->clt_ctx = tls_client()) == NULL) {
518 log_warnx("tls_client failed");
519 tls_config_free(conf);
520 goto err;
523 if (tls_configure(clt->clt_ctx, conf) == -1) {
524 log_warnx("tls_configure failed");
525 tls_config_free(conf);
526 goto err;
529 tls_config_free(conf);
531 if (tls_connect_socket(clt->clt_ctx, clt->clt_fd,
532 clt->clt_pc->proxy_name) == -1) {
533 log_warnx("tls_connect_socket failed");
534 goto err;
537 event_set(&clt->clt_bev->ev_read, clt->clt_fd, EV_READ,
538 proxy_tls_readcb, clt->clt_bev);
539 event_set(&clt->clt_bev->ev_write, clt->clt_fd, EV_WRITE,
540 proxy_tls_writecb, clt->clt_bev);
542 #if HAVE_LIBEVENT2
543 evbuffer_unfreeze(clt->clt_bev->input, 0);
544 evbuffer_unfreeze(clt->clt_bev->output, 1);
545 #endif
548 /* bufferevent_settimeout(); */
549 bufferevent_enable(clt->clt_bev, EV_READ|EV_WRITE);
551 /* TODO: compute the URL */
552 out = EVBUFFER_OUTPUT(clt->clt_bev);
553 if (evbuffer_add_printf(out, "gemini://%s/%s",
554 clt->clt_pc->proxy_name, clt->clt_path_info) == -1) {
555 log_warn("bufferevent_printf failed");
556 goto err;
559 if (clt->clt_query &&
560 evbuffer_add_printf(out, "?%s", clt->clt_query) == -1) {
561 log_warn("bufferevent_printf failed");
562 goto err;
565 if (evbuffer_add(out, "\r\n", 2) == -1) {
566 log_warn("bufferevent_add failed");
567 goto err;
570 return;
572 err:
573 log_warn("failed to connect to %s:%s",
574 clt->clt_pc->proxy_addr, clt->clt_pc->proxy_port);
575 if (proxy_start_reply(clt, 501, "text/html") == -1)
576 return;
577 if (tp_error(clt->clt_tp, -1, "Can't connect") == -1)
578 return;
579 fcgi_end_request(clt, 1);
582 static inline int
583 parse_mime(struct client *clt, char *mime, char *lang, size_t len)
585 char *t, *semi;
587 if (strncmp(mime, "text/gemini", 11) != 0)
588 return (0);
590 clt->clt_translate = TR_ENABLED;
592 if ((mime = strchr(mime, ';')) == NULL)
593 return (0);
595 *mime++ = '\0';
596 while ((t = strsep(&mime, ";")) != NULL) {
597 if (!strncmp(t, "charset=", 8)) {
598 t += 8;
599 if (!strncasecmp(t, "utf8", 4) ||
600 !strncasecmp(t, "utf-8", 5) ||
601 !strncasecmp(t, "ascii", 5)) {
602 log_debug("unknown charset %s", t);
603 return (-1);
605 continue;
608 if (!strncmp(t, "lang=", 5)) {
609 t += 5;
610 if ((semi = strchr(t, ';')) != NULL)
611 *semi = '\0';
613 if (strlcpy(lang, t, len) >= len) {
614 log_debug("lang too long: %s", t);
615 *lang = '\0';
618 if (semi)
619 *semi = ';';
620 continue;
624 return (0);
627 int
628 proxy_start_reply(struct client *clt, int status, const char *ctype)
630 const char *csp;
632 csp = "Content-Security-Policy: default-src 'self'; "
633 "script-src 'none'; object-src 'none';\r\n";
635 if (status != 200 &&
636 clt_printf(clt, "Status: %d\r\n", status) == -1)
637 return (-1);
639 if (clt_puts(clt, csp) == -1)
640 return (-1);
642 if (status == 302) {
643 /* use "ctype" as redirect target */
644 if (clt_printf(clt, "Location: %s\r\n", ctype) == -1)
645 return (-1);
646 if (clt_puts(clt, "\r\n") == -1)
647 return (-1);
648 return (0);
651 if (ctype != NULL) {
652 if (!strcmp(ctype, "text/html"))
653 ctype = "text/html;charset=utf-8";
654 if (clt_printf(clt, "Content-Type: %s\r\n", ctype)
655 == -1)
656 return (-1);
659 if (clt_puts(clt, "\r\n") == -1)
660 return (-1);
662 return (0);
665 void
666 proxy_read(struct bufferevent *bev, void *d)
668 struct client *clt = d;
669 struct evbuffer *src = EVBUFFER_INPUT(bev);
670 const char *ctype;
671 char lang[16];
672 char *hdr, *mime;
673 size_t len;
674 int code;
676 if (clt->clt_headersdone) {
677 if (clt->clt_translate)
678 proxy_translate_gemtext(clt);
679 else
680 clt_write_bufferevent(clt, bev);
681 return;
684 hdr = evbuffer_readln(src, &len, EVBUFFER_EOL_CRLF_STRICT);
685 if (hdr == NULL) {
686 if (EVBUFFER_LENGTH(src) >= 1026)
687 proxy_error(bev, EV_READ, clt);
688 return;
691 if (len < 4 ||
692 !isdigit((unsigned char)hdr[0]) ||
693 !isdigit((unsigned char)hdr[1]) ||
694 hdr[2] != ' ') {
695 log_warnx("invalid ");
696 proxy_error(bev, EV_READ, clt);
697 goto err;
700 code = (hdr[0] - '0') * 10 + (hdr[1] - '0');
702 switch (hdr[0]) {
703 case '1':
704 if (proxy_start_reply(clt, 200, "text/html") == -1)
705 goto err;
706 if (tp_inputpage(clt->clt_tp, &hdr[3]) == -1)
707 goto err;
708 fcgi_end_request(clt, 0);
709 goto err;
710 case '2':
711 /* handled below */
712 break;
713 case '3':
714 /* XXX: do proper parsing */
715 if (hdr[3] == '/' || strstr(&hdr[3], "//") == NULL) {
716 char *url;
718 if (asprintf(&url, "%s%s", clt->clt_script_name,
719 &hdr[3]) == -1)
720 goto err;
722 if (proxy_start_reply(clt, 302, url)) {
723 free(url);
724 goto err;
726 free(url);
727 fcgi_end_request(clt, 0);
728 goto err;
730 /* fallthrough */
731 default:
732 if (proxy_start_reply(clt, 501, "text/html") == -1)
733 goto err;
734 if (tp_error(clt->clt_tp, code, &hdr[3]) == -1)
735 goto err;
736 fcgi_end_request(clt, 1);
737 goto err;
740 mime = hdr + 2 + strspn(hdr + 2, " \t");
741 if (parse_mime(clt, mime, lang, sizeof(lang)) == -1) {
742 if (proxy_start_reply(clt, 501, "text/html") == -1)
743 goto err;
744 if (tp_error(clt->clt_tp, -1, "Bad response") == -1)
745 goto err;
746 fcgi_end_request(clt, 1);
747 goto err;
750 if (clt->clt_translate)
751 ctype = "text/html;charset=utf-8";
752 else
753 ctype = mime;
755 if (clt_printf(clt, "Content-Type: %s\r\n\r\n", ctype) == -1)
756 goto err;
758 clt->clt_headersdone = 1;
760 if (clt->clt_translate &&
761 tp_head(clt->clt_tp, lang, NULL) == -1)
762 goto err;
764 /*
765 * Trigger the read again so we proceed with the response
766 * body, if any.
767 */
768 free(hdr);
769 proxy_read(bev, d);
770 return;
772 err:
773 free(hdr);
776 void
777 proxy_write(struct bufferevent *bev, void *d)
779 return;
782 void
783 proxy_error(struct bufferevent *bev, short err, void *d)
785 struct client *clt = d;
786 int status = !(err & EVBUFFER_EOF);
788 log_debug("proxy error, shutting down the connection (err: %x)",
789 err);
791 if (!clt->clt_headersdone) {
792 if (proxy_start_reply(clt, 501, "text/html") == -1)
793 return;
794 if (tp_error(clt->clt_tp, -1, "Proxy error") == -1)
795 return;
796 } else if (status == 0) {
797 if (clt->clt_translate & TR_PRE) {
798 if (tp_pre_close(clt->clt_tp))
799 return;
800 clt->clt_translate &= ~TR_PRE;
803 if (clt->clt_translate & TR_LIST) {
804 if (clt_puts(clt, "</ul>") == -1)
805 return;
806 clt->clt_translate &= ~TR_LIST;
809 if (clt->clt_translate & TR_NAV) {
810 if (clt_puts(clt, "</ul></nav>") == -1)
811 return;
812 clt->clt_translate &= ~TR_NAV;
815 if (clt->clt_translate &&
816 tp_foot(clt->clt_tp) == -1)
817 return;
820 fcgi_end_request(clt, status);
823 void
824 proxy_tls_readcb(int fd, short event, void *arg)
826 struct bufferevent *bufev = arg;
827 struct client *clt = bufev->cbarg;
828 char rbuf[IBUF_READ_SIZE];
829 int what = EVBUFFER_READ;
830 int howmuch = IBUF_READ_SIZE;
831 ssize_t ret;
832 size_t len;
834 if (event == EV_TIMEOUT) {
835 what |= EVBUFFER_TIMEOUT;
836 goto err;
839 if (bufev->wm_read.high != 0)
840 howmuch = MINIMUM(sizeof(rbuf), bufev->wm_read.high);
842 ret = tls_read(clt->clt_ctx, rbuf, howmuch);
843 if (ret == TLS_WANT_POLLIN || ret == TLS_WANT_POLLOUT) {
844 goto retry;
845 } else if (ret == -1) {
846 what |= EVBUFFER_ERROR;
847 goto err;
849 len = ret;
851 if (len == 0) {
852 what |= EVBUFFER_EOF;
853 goto err;
856 if (evbuffer_add(bufev->input, rbuf, len) == -1) {
857 what |= EVBUFFER_ERROR;
858 goto err;
861 proxy_bufferevent_add(&bufev->ev_read, G_TOUT(bufev->timeout_read));
863 len = EVBUFFER_LENGTH(bufev->input);
864 if (bufev->wm_read.low != 0 && len < bufev->wm_read.low)
865 return;
866 if (bufev->wm_read.high != 0 && len > bufev->wm_read.high) {
867 struct evbuffer *buf = bufev->input;
868 event_del(&bufev->ev_read);
869 evbuffer_setcb(buf, bufferevent_read_pressure_cb, bufev);
870 return;
873 if (bufev->readcb != NULL)
874 (*bufev->readcb)(bufev, bufev->cbarg);
875 return;
877 retry:
878 proxy_bufferevent_add(&bufev->ev_read, G_TOUT(bufev->timeout_read));
879 return;
881 err:
882 (*bufev->errorcb)(bufev, what, bufev->cbarg);
885 int
886 proxy_bufferevent_add(struct event *ev, int timeout)
888 struct timeval tv, *ptv = NULL;
890 if (timeout) {
891 timerclear(&tv);
892 tv.tv_sec = timeout;
893 ptv = &tv;
896 return (event_add(ev, ptv));
899 void
900 proxy_tls_writecb(int fd, short event, void *arg)
902 struct bufferevent *bufev = arg;
903 struct client *clt = bufev->cbarg;
904 ssize_t ret;
905 short what = EVBUFFER_WRITE;
906 size_t len;
908 if (event == EV_TIMEOUT) {
909 what |= EVBUFFER_TIMEOUT;
910 goto err;
913 if (EVBUFFER_LENGTH(bufev->output)) {
914 ret = tls_write(clt->clt_ctx,
915 EVBUFFER_DATA(bufev->output),
916 EVBUFFER_LENGTH(bufev->output));
917 if (ret == TLS_WANT_POLLIN || ret == TLS_WANT_POLLOUT) {
918 goto retry;
919 } else if (ret == -1) {
920 what |= EVBUFFER_ERROR;
921 goto err;
923 len = ret;
924 evbuffer_drain(bufev->output, len);
927 if (EVBUFFER_LENGTH(bufev->output) != 0)
928 proxy_bufferevent_add(&bufev->ev_write,
929 G_TOUT(bufev->timeout_write));
931 if (bufev->writecb != NULL &&
932 EVBUFFER_LENGTH(bufev->output) <= bufev->wm_write.low)
933 (*bufev->writecb)(bufev, bufev->cbarg);
934 return;
936 retry:
937 proxy_bufferevent_add(&bufev->ev_write, G_TOUT(bufev->timeout_write));
938 return;
940 err:
941 (*bufev->errorcb)(bufev, what, bufev->cbarg);
944 void
945 proxy_client_free(struct client *clt)
947 if (clt->clt_evasr)
948 event_asr_abort(clt->clt_evasr);
950 if (clt->clt_addrinfo)
951 freeaddrinfo(clt->clt_addrinfo);
953 if (clt->clt_evconn_live)
954 event_del(&clt->clt_evconn);
956 if (clt->clt_fd != -1)
957 close(clt->clt_fd);
959 if (clt->clt_ctx)
960 tls_free(clt->clt_ctx);
962 if (clt->clt_bev)
963 bufferevent_free(clt->clt_bev);
965 template_free(clt->clt_tp);
967 free(clt->clt_body);
968 free(clt->clt_server_name);
969 free(clt->clt_script_name);
970 free(clt->clt_path_info);
971 free(clt->clt_query);
972 free(clt);