agate/src/main.rs
2020-11-20 14:16:14 -08:00

194 lines
6.2 KiB
Rust

use async_std::{
io::prelude::*,
net::{TcpListener, TcpStream},
stream::StreamExt,
task,
};
use async_tls::TlsAcceptor;
use once_cell::sync::Lazy;
use rustls::{
internal::pemfile::{certs, pkcs8_private_keys},
NoClientAuth, ServerConfig,
};
use std::{error::Error, ffi::OsStr, fs::File, io::BufReader, marker::Unpin, sync::Arc};
use url::Url;
fn main() -> Result {
env_logger::Builder::from_env("AGATE_LOG").init();
task::block_on(async {
let listener = TcpListener::bind(&ARGS.sock_addr).await?;
let mut incoming = listener.incoming();
log::info!("Listening on {}...", ARGS.sock_addr);
while let Some(Ok(stream)) = incoming.next().await {
task::spawn(async {
if let Err(e) = handle_request(stream).await {
log::error!("{:?}", e);
}
});
}
Ok(())
})
}
type Result<T = ()> = std::result::Result<T, Box<dyn Error + Send + Sync>>;
static ARGS: Lazy<Args> = Lazy::new(|| {
args().unwrap_or_else(|| {
eprintln!("usage: agate <addr:port> <dir> <cert> <key> [<domain to check>]");
std::process::exit(1);
})
});
struct Args {
sock_addr: String,
content_dir: String,
cert_file: String,
key_file: String,
domain: Option<String>,
}
fn args() -> Option<Args> {
let mut args = std::env::args().skip(1);
Some(Args {
sock_addr: args.next()?,
content_dir: args.next()?,
cert_file: args.next()?,
key_file: args.next()?,
domain: args.next(),
})
}
/// Handle a single client session (request + response).
async fn handle_request(stream: TcpStream) -> Result {
// Perform handshake.
static TLS: Lazy<TlsAcceptor> = Lazy::new(|| acceptor().unwrap());
let stream = &mut TLS.accept(stream).await?;
let url = match parse_request(stream).await {
Ok(url) => url,
Err((status, msg)) => {
respond(stream, &status.to_string(), &[&msg]).await?;
Err(msg)?
}
};
if let Err(e) = send_response(url, stream).await {
respond(stream, "51", &["Not found, sorry."]).await?;
Err(e)
} else {
Ok(())
}
}
/// TLS configuration.
fn acceptor() -> Result<TlsAcceptor> {
let cert_file = File::open(&ARGS.cert_file)?;
let certs = certs(&mut BufReader::new(cert_file)).or(Err("bad cert"))?;
let key_file = File::open(&ARGS.key_file)?;
let mut keys = pkcs8_private_keys(&mut BufReader::new(key_file)).or(Err("bad key"))?;
let mut config = ServerConfig::new(NoClientAuth::new());
config.set_single_cert(certs, keys.remove(0))?;
Ok(TlsAcceptor::from(Arc::new(config)))
}
/// Return the URL requested by the client.
async fn parse_request<R: Read + Unpin>(
stream: &mut R,
) -> std::result::Result<Url, (u8, &'static str)> {
// Because requests are limited to 1024 bytes (plus 2 bytes for CRLF), we
// can use a fixed-sized buffer on the stack, avoiding allocations and
// copying, and stopping bad clients from making us use too much memory.
let mut request = [0; 1026];
let mut buf = &mut request[..];
let mut len = 0;
// Read until CRLF, end-of-stream, or there's no buffer space left.
loop {
let bytes_read = stream
.read(buf)
.await
.map_err(|_| (59, "Request ended unexpectedly"))?;
len += bytes_read;
if request[..len].ends_with(b"\r\n") {
break;
} else if bytes_read == 0 {
return Err((59, "Request ended unexpectedly"));
}
buf = &mut request[len..];
}
let request = std::str::from_utf8(&request[..len - 2]).map_err(|_| (59, "Invalid URL"))?;
// Handle scheme-relative URLs.
let url = if request.starts_with("//") {
Url::parse(&format!("gemini:{}", request)).map_err(|_| (59, "Invalid URL"))?
} else {
Url::parse(request).map_err(|_| (59, "Invalid URL"))?
};
// Validate the URL, host and port.
if url.scheme() != "gemini" {
Err((53, "unsupported URL scheme"))
} else if ARGS.domain.as_ref().map_or(false, |domain| {
url.host().map_or(false, |host| &host.to_string() != domain)
}) {
Err((53, "proxy request refused"))
} else if url.port().map_or(false, |port| {
port != ARGS
.sock_addr
.rsplitn(2, ':')
.next()
.unwrap()
.parse()
.unwrap()
}) {
Err((59, "port did not match"))
} else {
log::info!("Got request for {:?}", url.as_str());
Ok(url)
}
}
/// Send the client the file located at the requested URL.
async fn send_response<W: Write + Unpin>(url: Url, stream: &mut W) -> Result {
let mut path = std::path::PathBuf::from(&ARGS.content_dir);
if let Some(segments) = url.path_segments() {
path.extend(segments);
}
if async_std::fs::metadata(&path).await?.is_dir() {
if url.path().ends_with('/') || url.path().is_empty() {
// if the path ends with a slash or the path is empty, the links will work the same
// without a redirect
path.push("index.gmi");
} else {
// if client is not redirected, links may not work as expected without trailing slash
return respond(stream, "31", &[url.as_str(), "/"]).await;
}
}
// Make sure the file opens successfully before sending the success header.
let mut file = async_std::fs::File::open(&path).await?;
// Send header.
if path.extension() == Some(OsStr::new("gmi")) {
respond(stream, "20", &["text/gemini"]).await?;
} else {
let mime = mime_guess::from_path(&path).first_or_octet_stream();
respond(stream, "20", &[mime.essence_str()]).await?;
}
// Send body.
async_std::io::copy(&mut file, stream).await?;
Ok(())
}
async fn respond<W: Write + Unpin>(stream: &mut W, status: &str, meta: &[&str]) -> Result {
log::info!("Responding with status {} and meta {:?}", status, meta);
stream.write_all(status.as_bytes()).await?;
stream.write_all(b" ").await?;
for m in meta {
stream.write_all(m.as_bytes()).await?;
}
stream.write_all(b"\r\n").await?;
Ok(())
}