1
0
Fork 0
molly-brown/handler.go

287 lines
7.1 KiB
Go
Raw Normal View History

2019-11-06 10:08:44 -05:00
package main
import (
"bufio"
"crypto/tls"
2020-06-05 14:13:48 -04:00
"errors"
2019-11-06 10:08:44 -05:00
"fmt"
2019-11-06 15:23:51 -05:00
"io/ioutil"
"log"
"mime"
2019-11-06 10:08:44 -05:00
"net"
"net/url"
2019-11-06 15:23:51 -05:00
"os"
"path/filepath"
"regexp"
2019-11-06 15:23:51 -05:00
"strings"
2019-11-06 11:38:41 -05:00
"time"
2019-11-06 10:08:44 -05:00
)
2019-11-06 11:38:41 -05:00
func handleGeminiRequest(conn net.Conn, config Config, logEntries chan LogEntry) {
2019-11-06 10:08:44 -05:00
defer conn.Close()
var tlsConn (*tls.Conn) = conn.(*tls.Conn)
2019-11-06 11:38:41 -05:00
var log LogEntry
log.Time = time.Now()
log.RemoteAddr = conn.RemoteAddr()
log.RequestURL = "-"
log.Status = 0
2019-11-06 11:50:44 -05:00
defer func() { logEntries <- log }()
2019-11-06 11:38:41 -05:00
2019-11-06 10:08:44 -05:00
// Read request
URL, err := readRequest(conn, &log)
2020-06-05 14:13:48 -04:00
if err != nil {
2019-11-06 10:08:44 -05:00
return
}
clientCerts := tlsConn.ConnectionState().PeerCertificates
// Check validity
// This will fail if any of multiple certs are invalid
// Maybe we should just require one valid?
now := time.Now()
for _, cert := range clientCerts {
if now.Before(cert.NotBefore) {
conn.Write([]byte("64 Client certificate not yet valid!\r\n"))
log.Status = 64
return
} else if now.After(cert.NotAfter) {
conn.Write([]byte("65 Client certificate has expired!\r\n"))
log.Status = 65
return
}
}
// Reject non-gemini schemes
if URL.Scheme != "gemini" {
conn.Write([]byte("53 No proxying to non-Gemini content!\r\n"))
log.Status = 53
return
}
// Reject requests for content from other servers
requestHostname := strings.Split(URL.Host, ":")[0] // Shave off port
if requestHostname != config.Hostname {
conn.Write([]byte("53 No proxying to other hosts!\r\n"))
log.Status = 53
return
}
2019-11-06 15:23:51 -05:00
// Fail if there are dots in the path
if strings.Contains(URL.Path, "..") {
conn.Write([]byte("50 Your directory traversal technique has been defeated!\r\n"))
log.Status = 50
return
}
// Check for redirects
for src, dst := range config.TempRedirects {
if URL.Path == src {
URL.Path = dst
conn.Write([]byte("30 " + URL.String() + "\r\n"))
log.Status = 30
return
}
}
for src, dst := range config.PermRedirects {
if URL.Path == src {
URL.Path = dst
conn.Write([]byte("31 " + URL.String() + "\r\n"))
log.Status = 31
return
}
}
2020-06-04 14:41:40 -04:00
// Check whether this URL is mapped to an SCGI app
for scgi_url, scgi_socket := range config.SCGIPaths {
matched, err := regexp.Match(scgi_url, []byte(URL.Path))
if matched && err == nil {
handleSCGI(scgi_socket, config, URL, &log, conn)
2020-06-04 14:41:40 -04:00
return
}
2019-11-06 15:23:51 -05:00
}
// Resolve URI path to actual filesystem path
path, info, err := resolvePath(URL.Path, config)
// Fail if file does not exist or perms aren't right
2019-11-06 15:23:51 -05:00
if os.IsNotExist(err) || os.IsPermission(err) {
conn.Write([]byte("51 Not found!\r\n"))
log.Status = 51
return
} else if err != nil {
conn.Write([]byte("40 Temporaray failure!\r\n"))
log.Status = 40
return
} else if uint64(info.Mode().Perm())&0444 != 0444 {
conn.Write([]byte("51 Not found!\r\n"))
log.Status = 51
return
2019-11-06 15:23:51 -05:00
}
2020-06-04 17:24:19 -04:00
// Paranoid security measure:
// Fail if the URL has mapped to our TLS files or the log
if path == config.CertPath || path == config.KeyPath || path == config.LogPath {
conn.Write([]byte("51 Not found!\r\n"))
log.Status = 51
return
}
// Handle directories
2019-11-06 15:23:51 -05:00
if info.IsDir() {
// Redirect to add trailing slash if missing
// (otherwise relative links don't work properly)
if !strings.HasSuffix(URL.Path, "/") {
conn.Write([]byte(fmt.Sprintf("31 %s\r\n", URL.String()+"/")))
log.Status = 31
return
}
2020-06-04 15:32:20 -04:00
// Check for index.gmi if path is a directory
index_path := filepath.Join(path, "index.gmi")
index_info, err := os.Stat(index_path)
if err == nil && uint64(index_info.Mode().Perm())&0444 == 0444 {
serveFile(index_path, &log, conn)
// Serve a generated listing
2020-06-04 15:32:20 -04:00
} else {
conn.Write([]byte("20 text/gemini\r\n"))
log.Status = 20
conn.Write([]byte(generateDirectoryListing(path)))
}
2019-11-06 15:23:51 -05:00
return
}
// If this file is executable, get dynamic content
inCGIPath, err := regexp.Match(config.CGIPath, []byte(path))
if inCGIPath && info.Mode().Perm() & 0111 == 0111 {
handleCGI(config, path, URL, &log, conn)
return
}
// Otherwise, serve the file contents
serveFile(path, &log, conn)
return
}
func readRequest(conn net.Conn, log *LogEntry) (*url.URL, error) {
2020-06-05 14:13:48 -04:00
reader := bufio.NewReaderSize(conn, 1024)
request, overflow, err := reader.ReadLine()
if overflow {
conn.Write([]byte("59 Request too long!\r\n"))
log.Status = 59
return nil, errors.New("Request too long")
} else if err != nil {
conn.Write([]byte("40 Unknown error reading request!\r\n"))
log.Status = 40
return nil, errors.New("Error reading request")
}
// Parse request as URL
URL, err := url.Parse(string(request))
if err != nil {
conn.Write([]byte("59 Error parsing URL!\r\n"))
log.Status = 59
return nil, errors.New("Bad URL in request")
}
log.RequestURL = URL.String()
// Set implicit scheme
if URL.Scheme == "" {
URL.Scheme = "gemini"
}
return URL, nil
}
func resolvePath(path string, config Config) (string, os.FileInfo, error) {
// Handle tildes
if strings.HasPrefix(path, "/~") {
bits := strings.Split(path, "/")
username := bits[1][1:]
new_prefix := filepath.Join(config.DocBase, config.HomeDocBase, username)
path = strings.Replace(path, bits[1], new_prefix, 1)
2019-11-06 15:23:51 -05:00
} else {
path = filepath.Join(config.DocBase, path)
}
// Make sure this file exists and is readable
info, err := os.Stat(path)
if err != nil {
return "", nil, err
}
return path, info, nil
2019-11-06 10:08:44 -05:00
}
2019-11-06 15:23:51 -05:00
func generateDirectoryListing(path string) string {
var listing string
files, err := ioutil.ReadDir(path)
if err != nil {
log.Fatal(err)
}
listing = "# Directory listing\n\n"
for _, file := range files {
2019-11-22 14:35:51 -05:00
// Skip dotfiles
if strings.HasPrefix(file.Name(), ".") {
continue
}
2019-11-21 16:03:39 -05:00
// Only list world readable files
if uint64(file.Mode().Perm())&0444 != 0444 {
continue
}
listing += fmt.Sprintf("=> %s %s\n", url.PathEscape(file.Name()), generatePrettyFileLabel(file))
2019-11-06 15:23:51 -05:00
}
return listing
}
func generatePrettyFileLabel(info os.FileInfo) string {
var size string
if info.IsDir() {
size = " "
} else if info.Size() < 1024 {
size = fmt.Sprintf("%4d B", info.Size())
} else if info.Size() < (1024 << 10) {
size = fmt.Sprintf("%4d KiB", info.Size() >> 10)
} else if info.Size() < 1024 << 20 {
size = fmt.Sprintf("%4d MiB", info.Size() >> 20)
} else if info.Size() < 1024 << 30 {
size = fmt.Sprintf("%4d GiB", info.Size() >> 30)
} else if info.Size() < 1024 << 40 {
size = fmt.Sprintf("%4d TiB", info.Size() >> 40)
} else {
size = "GIGANTIC"
}
var name string
if len(info.Name()) > 40 {
name = info.Name()[:36] + "..."
} else {
name = info.Name()
}
if info.IsDir() {
name += "/"
}
return fmt.Sprintf("%-40s %s %v", name, size, info.ModTime().Format("Jan _2 2006"))
}
func serveFile(path string, log *LogEntry, conn net.Conn) {
// Get MIME type of files
ext := filepath.Ext(path)
var mimeType string
if ext == ".gmi" {
mimeType = "text/gemini"
} else {
mimeType = mime.TypeByExtension(ext)
}
// Set a generic MIME type if the extension wasn't recognised
if mimeType == "" {
mimeType = "application/octet-stream"
}
contents, err := ioutil.ReadFile(path)
if err != nil {
conn.Write([]byte("50 Error!\r\n"))
log.Status = 50
}
conn.Write([]byte(fmt.Sprintf("20 %s\r\n", mimeType)))
log.Status = 20
conn.Write(contents)
}