use async_std::{ io::prelude::*, net::{TcpListener, TcpStream}, stream::StreamExt, task, }; use async_tls::TlsAcceptor; use once_cell::sync::Lazy; use rustls::{ internal::pemfile::{certs, pkcs8_private_keys}, NoClientAuth, ServerConfig, }; use std::{error::Error, ffi::OsStr, fs::File, io::BufReader, marker::Unpin, sync::Arc}; use url::{Host, Url}; fn main() -> Result { env_logger::Builder::from_env("AGATE_LOG").init(); task::block_on(async { let listener = TcpListener::bind(&ARGS.sock_addr).await?; let mut incoming = listener.incoming(); log::info!("Listening on {}...", ARGS.sock_addr); while let Some(Ok(stream)) = incoming.next().await { task::spawn(async { if let Err(e) = handle_request(stream).await { log::error!("{:?}", e); } }); } Ok(()) }) } type Result = std::result::Result>; static ARGS: Lazy = Lazy::new(|| { args().unwrap_or_else(|| { eprintln!("usage: agate []"); std::process::exit(1); }) }); struct Args { sock_addr: String, content_dir: String, cert_file: String, key_file: String, domain: Option, } fn args() -> Option { let mut args = std::env::args().skip(1); Some(Args { sock_addr: args.next()?, content_dir: args.next()?, cert_file: args.next()?, key_file: args.next()?, domain: args.next().and_then(|s| Host::parse(&s).ok()), }) } /// Handle a single client session (request + response). async fn handle_request(stream: TcpStream) -> Result { // Perform handshake. static TLS: Lazy = Lazy::new(|| acceptor().unwrap()); let stream = &mut TLS.accept(stream).await?; let url = match parse_request(stream).await { Ok(url) => url, Err((status, msg)) => { respond(stream, &status.to_string(), &[&msg]).await?; Err(msg)? } }; if let Err(e) = send_response(url, stream).await { respond(stream, "51", &["Not found, sorry."]).await?; Err(e)? } Ok(()) } /// TLS configuration. fn acceptor() -> Result { let cert_file = File::open(&ARGS.cert_file)?; let certs = certs(&mut BufReader::new(cert_file)).or(Err("bad cert"))?; let key_file = File::open(&ARGS.key_file)?; let mut keys = pkcs8_private_keys(&mut BufReader::new(key_file)).or(Err("bad key"))?; let mut config = ServerConfig::new(NoClientAuth::new()); config.set_single_cert(certs, keys.remove(0))?; Ok(TlsAcceptor::from(Arc::new(config))) } /// Return the URL requested by the client. async fn parse_request( stream: &mut R, ) -> std::result::Result { // Because requests are limited to 1024 bytes (plus 2 bytes for CRLF), we // can use a fixed-sized buffer on the stack, avoiding allocations and // copying, and stopping bad clients from making us use too much memory. let mut request = [0; 1026]; let mut buf = &mut request[..]; let mut len = 0; // Read until CRLF, end-of-stream, or there's no buffer space left. loop { let bytes_read = stream .read(buf) .await .map_err(|_| (59, "Request ended unexpectedly"))?; len += bytes_read; if request[..len].ends_with(b"\r\n") { break; } else if bytes_read == 0 { return Err((59, "Request ended unexpectedly")); } buf = &mut request[len..]; } let request = std::str::from_utf8(&request[..len - 2]).map_err(|_| (59, "Invalid URL"))?; log::info!("Got request for {:?}", request); // Handle scheme-relative URLs. let url = if request.starts_with("//") { Url::parse(&format!("gemini:{}", request)).map_err(|_| (59, "Invalid URL"))? } else { Url::parse(request).map_err(|_| (59, "Invalid URL"))? }; // Validate the URL, host and port. if url.scheme() != "gemini" { return Err((53, "unsupported URL scheme")); } // TODO: Can be simplified by https://github.com/servo/rust-url/pull/651 if let (Some(Host::Domain(domain)), Some(Host::Domain(host))) = (&ARGS.domain, url.host()) { if domain != host { return Err((53, "proxy request refused")); } } if let Some(port) = url.port() { if !ARGS.sock_addr.ends_with(&format!(":{}", port)) { return Err((53, "proxy request refused")); } } Ok(url) } /// Send the client the file located at the requested URL. async fn send_response(url: Url, stream: &mut W) -> Result { let mut path = std::path::PathBuf::from(&ARGS.content_dir); if let Some(segments) = url.path_segments() { path.extend(segments); } if async_std::fs::metadata(&path).await?.is_dir() { if url.path().ends_with('/') || url.path().is_empty() { // if the path ends with a slash or the path is empty, the links will work the same // without a redirect path.push("index.gmi"); } else { // if client is not redirected, links may not work as expected without trailing slash return respond(stream, "31", &[url.as_str(), "/"]).await; } } // Make sure the file opens successfully before sending the success header. let mut file = async_std::fs::File::open(&path).await?; // Send header. if path.extension() == Some(OsStr::new("gmi")) { respond(stream, "20", &["text/gemini"]).await?; } else { let mime = mime_guess::from_path(&path).first_or_octet_stream(); respond(stream, "20", &[mime.essence_str()]).await?; } // Send body. async_std::io::copy(&mut file, stream).await?; Ok(()) } async fn respond(stream: &mut W, status: &str, meta: &[&str]) -> Result { log::info!("Responding with status {} and meta {:?}", status, meta); stream.write_all(status.as_bytes()).await?; stream.write_all(b" ").await?; for m in meta { stream.write_all(m.as_bytes()).await?; } stream.write_all(b"\r\n").await?; Ok(()) }