mirror of
https://github.com/samsonjs/agate.git
synced 2026-03-25 09:05:50 +00:00
793 lines
29 KiB
Rust
793 lines
29 KiB
Rust
#![forbid(unsafe_code)]
|
|
|
|
mod certificates;
|
|
mod codes;
|
|
mod metadata;
|
|
use codes::*;
|
|
use metadata::{FileOptions, PresetMeta};
|
|
|
|
use {
|
|
once_cell::sync::Lazy,
|
|
percent_encoding::{percent_decode_str, percent_encode, AsciiSet, CONTROLS},
|
|
rcgen::{Certificate, CertificateParams, DnType},
|
|
rustls::server::ServerConfig,
|
|
std::{
|
|
borrow::Cow,
|
|
error::Error,
|
|
ffi::OsStr,
|
|
fmt::Write,
|
|
fs::{self, File},
|
|
io::Write as _,
|
|
net::{IpAddr, Ipv4Addr, Ipv6Addr, SocketAddr},
|
|
path::{self, Component, Path, PathBuf},
|
|
sync::Arc,
|
|
},
|
|
tokio::{
|
|
io::{AsyncReadExt, AsyncWriteExt},
|
|
net::{TcpListener, TcpStream},
|
|
runtime::Runtime,
|
|
sync::Mutex,
|
|
},
|
|
tokio_rustls::{server::TlsStream, TlsAcceptor},
|
|
url::{Host, Url},
|
|
};
|
|
|
|
#[cfg(unix)]
|
|
use {
|
|
std::os::unix::fs::{FileTypeExt, PermissionsExt},
|
|
tokio::net::{UnixListener, UnixStream},
|
|
};
|
|
|
|
static DEFAULT_PORT: u16 = 1965;
|
|
|
|
fn main() {
|
|
env_logger::Builder::from_env(
|
|
// by default only turn on logging for agate
|
|
env_logger::Env::default().default_filter_or("agate=info"),
|
|
)
|
|
.init();
|
|
Runtime::new()
|
|
.expect("could not start tokio runtime")
|
|
.block_on(async {
|
|
let default = PresetMeta::Parameters(
|
|
ARGS.language
|
|
.as_ref()
|
|
.map_or(String::new(), |lang| format!(";lang={lang}")),
|
|
);
|
|
let mimetypes = Arc::new(Mutex::new(FileOptions::new(default)));
|
|
|
|
// some systems automatically listen in dual stack if the IPv6 unspecified
|
|
// address is used, so don't fail if the second unspecified address gets
|
|
// an error when trying to start
|
|
let mut listening_unspecified = false;
|
|
|
|
let mut handles = vec![];
|
|
for addr in &ARGS.addrs {
|
|
let arc = mimetypes.clone();
|
|
|
|
let listener = match TcpListener::bind(addr).await {
|
|
Err(e) => {
|
|
if !(addr.ip().is_unspecified() && listening_unspecified) {
|
|
panic!("Failed to listen on {addr}: {e}")
|
|
} else {
|
|
// already listening on the other unspecified address
|
|
log::warn!("Could not start listener on {}, but already listening on another unspecified address. Probably your system automatically listens in dual stack?", addr);
|
|
continue;
|
|
}
|
|
}
|
|
Ok(listener) => listener,
|
|
};
|
|
listening_unspecified |= addr.ip().is_unspecified();
|
|
|
|
handles.push(tokio::spawn(async move {
|
|
log::info!("Started listener on {}", addr);
|
|
|
|
loop {
|
|
let (stream, _) = listener.accept().await.unwrap_or_else(|e| {
|
|
panic!("could not accept new connection on {addr}: {e}")
|
|
});
|
|
let arc = arc.clone();
|
|
tokio::spawn(async {
|
|
match RequestHandle::new(stream, arc).await {
|
|
Ok(handle) => match handle.handle().await {
|
|
Ok(info) => log::info!("{}", info),
|
|
Err(err) => log::warn!("{}", err),
|
|
},
|
|
Err(log_line) => {
|
|
log::warn!("{}", log_line);
|
|
}
|
|
}
|
|
});
|
|
}
|
|
}))
|
|
};
|
|
|
|
#[cfg(unix)]
|
|
for socketpath in &ARGS.sockets {
|
|
let arc = mimetypes.clone();
|
|
|
|
if socketpath.exists() && socketpath.metadata()
|
|
.expect("Failed to get existing socket metadata")
|
|
.file_type()
|
|
.is_socket() {
|
|
log::warn!("Socket already exists, attempting to remove {}", socketpath.display());
|
|
let _ = std::fs::remove_file(socketpath);
|
|
}
|
|
|
|
let listener = match UnixListener::bind(socketpath) {
|
|
Err(e) => {
|
|
panic!("Failed to listen on {}: {}", socketpath.display(), e)
|
|
}
|
|
Ok(listener) => listener,
|
|
};
|
|
|
|
handles.push(tokio::spawn(async move {
|
|
log::info!("Started listener on {}", socketpath.display());
|
|
|
|
loop {
|
|
let (stream, _) = listener.accept().await.unwrap_or_else(|e| {
|
|
panic!("could not accept new connection on {}: {}", socketpath.display(), e)
|
|
});
|
|
let arc = arc.clone();
|
|
tokio::spawn(async {
|
|
match RequestHandle::new_unix(stream, arc).await {
|
|
Ok(handle) => match handle.handle().await {
|
|
Ok(info) => log::info!("{}", info),
|
|
Err(err) => log::warn!("{}", err),
|
|
},
|
|
Err(log_line) => {
|
|
log::warn!("{}", log_line);
|
|
}
|
|
}
|
|
});
|
|
}
|
|
}))
|
|
};
|
|
|
|
futures_util::future::join_all(handles).await;
|
|
});
|
|
}
|
|
|
|
type Result<T = (), E = Box<dyn Error + Send + Sync>> = std::result::Result<T, E>;
|
|
|
|
static ARGS: Lazy<Args> = Lazy::new(|| {
|
|
args().unwrap_or_else(|s| {
|
|
eprintln!("{s}");
|
|
std::process::exit(1);
|
|
})
|
|
});
|
|
|
|
struct Args {
|
|
addrs: Vec<SocketAddr>,
|
|
#[cfg(unix)]
|
|
sockets: Vec<PathBuf>,
|
|
content_dir: PathBuf,
|
|
certs: Arc<certificates::CertStore>,
|
|
hostnames: Vec<Host>,
|
|
language: Option<String>,
|
|
serve_secret: bool,
|
|
log_ips: bool,
|
|
only_tls13: bool,
|
|
central_config: bool,
|
|
skip_port_check: bool,
|
|
}
|
|
|
|
fn args() -> Result<Args> {
|
|
let args: Vec<String> = std::env::args().collect();
|
|
let mut opts = getopts::Options::new();
|
|
opts.optopt(
|
|
"",
|
|
"content",
|
|
"Root of the content directory (default ./content/)",
|
|
"DIR",
|
|
);
|
|
opts.optopt(
|
|
"",
|
|
"certs",
|
|
"Root of the certificate directory (default ./.certificates/)",
|
|
"DIR",
|
|
);
|
|
opts.optmulti(
|
|
"",
|
|
"addr",
|
|
&format!("Address to listen on (default 0.0.0.0:{DEFAULT_PORT} and [::]:{DEFAULT_PORT}; multiple occurences means listening on multiple interfaces)"),
|
|
"IP:PORT",
|
|
);
|
|
#[cfg(unix)]
|
|
opts.optmulti(
|
|
"",
|
|
"socket",
|
|
"Unix socket to listen on (multiple occurences means listening on multiple sockets)",
|
|
"PATH",
|
|
);
|
|
opts.optmulti(
|
|
"",
|
|
"hostname",
|
|
"Domain name of this Gemini server, enables checking hostname and port in requests. (multiple occurences means basic vhosts)",
|
|
"NAME",
|
|
);
|
|
opts.optopt(
|
|
"",
|
|
"lang",
|
|
"RFC 4646 Language code for text/gemini documents",
|
|
"LANG",
|
|
);
|
|
opts.optflag("h", "help", "Print this help text and exit.");
|
|
opts.optflag("V", "version", "Print version information and exit.");
|
|
opts.optflag(
|
|
"3",
|
|
"only-tls13",
|
|
"Only use TLSv1.3 (default also allows TLSv1.2)",
|
|
);
|
|
opts.optflag(
|
|
"",
|
|
"serve-secret",
|
|
"Enable serving secret files (files/directories starting with a dot)",
|
|
);
|
|
opts.optflag("", "log-ip", "Output the remote IP address when logging.");
|
|
opts.optflag(
|
|
"C",
|
|
"central-conf",
|
|
"Use a central .meta file in the content root directory. Decentral config files will be ignored.",
|
|
);
|
|
opts.optflag(
|
|
"e",
|
|
"ed25519",
|
|
"Generate keys using the Ed25519 signature algorithm instead of the default ECDSA.",
|
|
);
|
|
opts.optflag(
|
|
"",
|
|
"skip-port-check",
|
|
"Skip URL port check even when a hostname is specified.",
|
|
);
|
|
|
|
let matches = opts.parse(&args[1..]).map_err(|f| f.to_string())?;
|
|
|
|
if matches.opt_present("h") {
|
|
eprintln!("{}", opts.usage(&format!("Usage: {} [options]", &args[0])));
|
|
std::process::exit(0);
|
|
}
|
|
|
|
if matches.opt_present("V") {
|
|
eprintln!("agate {}", env!("CARGO_PKG_VERSION"));
|
|
std::process::exit(0);
|
|
}
|
|
|
|
// try to open the certificate directory
|
|
let certs_path = matches.opt_get_default("certs", ".certificates".to_string())?;
|
|
let (certs, certs_path) = match check_path(certs_path.clone()) {
|
|
// the directory exists, try to load certificates
|
|
Ok(certs_path) => match certificates::CertStore::load_from(&certs_path) {
|
|
// all is good
|
|
Ok(certs) => (Some(certs), certs_path),
|
|
// the certificate directory did not contain certificates, but we can generate some
|
|
// because the hostname option was given
|
|
Err(certificates::CertLoadError::Empty) if matches.opt_present("hostname") => {
|
|
(None, certs_path)
|
|
}
|
|
// failed loading certificates or missing hostname to generate them
|
|
Err(e) => return Err(e.into()),
|
|
},
|
|
// the directory does not exist
|
|
Err(_) => {
|
|
// since certificate management should be automated, we are going to create the directory too
|
|
log::info!(
|
|
"The certificate directory {:?} does not exist, creating it.",
|
|
certs_path
|
|
);
|
|
std::fs::create_dir(&certs_path).expect("could not create certificate directory");
|
|
// we just created the directory, skip loading from it
|
|
(None, PathBuf::from(certs_path))
|
|
}
|
|
};
|
|
|
|
// If we have not loaded any certificates yet, we have to try to reload them later.
|
|
// This ensures we get the right error message.
|
|
let mut reload_certs = certs.is_none();
|
|
|
|
let mut hostnames = vec![];
|
|
for s in matches.opt_strs("hostname") {
|
|
// normalize hostname, add punycoding if necessary
|
|
let hostname = Host::parse(&s)?;
|
|
|
|
// check if we have a certificate for that domain
|
|
if let Host::Domain(ref domain) = hostname {
|
|
if !matches!(certs, Some(ref certs) if certs.has_domain(domain)) {
|
|
log::info!("No certificate or key found for {:?}, generating them.", s);
|
|
|
|
let mut cert_params = CertificateParams::new(vec![domain.clone()]);
|
|
cert_params
|
|
.distinguished_name
|
|
.push(DnType::CommonName, domain);
|
|
|
|
// <CertificateParams as Default>::default() already implements a
|
|
// date in the far future from the time of writing: 4096-01-01
|
|
|
|
if matches.opt_present("e") {
|
|
cert_params.alg = &rcgen::PKCS_ED25519;
|
|
}
|
|
|
|
// generate the certificate with the configuration
|
|
let cert = Certificate::from_params(cert_params)?;
|
|
|
|
// make sure the certificate directory exists
|
|
fs::create_dir(certs_path.join(domain))?;
|
|
// write certificate data to disk
|
|
let mut cert_file = File::create(certs_path.join(format!(
|
|
"{}/{}",
|
|
domain,
|
|
certificates::CERT_FILE_NAME
|
|
)))?;
|
|
cert_file.write_all(&cert.serialize_der()?)?;
|
|
// write key data to disk
|
|
let key_file_path =
|
|
certs_path.join(format!("{}/{}", domain, certificates::KEY_FILE_NAME));
|
|
let mut key_file = File::create(&key_file_path)?;
|
|
#[cfg(unix)]
|
|
{
|
|
// set permissions so only owner can read
|
|
match key_file.set_permissions(std::fs::Permissions::from_mode(0o400)) {
|
|
Ok(_) => (),
|
|
Err(_) => log::warn!(
|
|
"could not set permissions for new key file {}",
|
|
key_file_path.display()
|
|
),
|
|
}
|
|
}
|
|
key_file.write_all(&cert.serialize_private_key_der())?;
|
|
|
|
reload_certs = true;
|
|
}
|
|
}
|
|
|
|
hostnames.push(hostname);
|
|
}
|
|
|
|
// if new certificates were generated, reload the certificate store
|
|
let certs = if reload_certs {
|
|
certificates::CertStore::load_from(&certs_path)?
|
|
} else {
|
|
// there must already have been certificates loaded
|
|
certs.unwrap()
|
|
};
|
|
|
|
// parse listening addresses
|
|
let mut addrs = vec![];
|
|
for i in matches.opt_strs("addr") {
|
|
addrs.push(i.parse()?);
|
|
}
|
|
|
|
#[cfg_attr(not(unix), allow(unused_mut))]
|
|
let mut empty = addrs.is_empty();
|
|
|
|
#[cfg(unix)]
|
|
let mut sockets = vec![];
|
|
#[cfg(unix)]
|
|
{
|
|
for i in matches.opt_strs("socket") {
|
|
sockets.push(i.parse()?);
|
|
}
|
|
|
|
empty &= sockets.is_empty();
|
|
}
|
|
|
|
if empty {
|
|
addrs = vec![
|
|
SocketAddr::new(IpAddr::V6(Ipv6Addr::UNSPECIFIED), DEFAULT_PORT),
|
|
SocketAddr::new(IpAddr::V4(Ipv4Addr::UNSPECIFIED), DEFAULT_PORT),
|
|
];
|
|
}
|
|
|
|
Ok(Args {
|
|
addrs,
|
|
#[cfg(unix)]
|
|
sockets,
|
|
content_dir: check_path(matches.opt_get_default("content", "content".into())?)?,
|
|
certs: Arc::new(certs),
|
|
hostnames,
|
|
language: matches.opt_str("lang"),
|
|
serve_secret: matches.opt_present("serve-secret"),
|
|
log_ips: matches.opt_present("log-ip"),
|
|
only_tls13: matches.opt_present("only-tls13"),
|
|
central_config: matches.opt_present("central-conf"),
|
|
skip_port_check: matches.opt_present("skip-port-check"),
|
|
})
|
|
}
|
|
|
|
fn check_path(s: String) -> Result<PathBuf, String> {
|
|
let p = PathBuf::from(s);
|
|
if p.as_path().exists() {
|
|
Ok(p)
|
|
} else {
|
|
Err(format!("No such file: {p:?}"))
|
|
}
|
|
}
|
|
|
|
/// TLS configuration.
|
|
static TLS: Lazy<TlsAcceptor> = Lazy::new(acceptor);
|
|
|
|
fn acceptor() -> TlsAcceptor {
|
|
let config = if ARGS.only_tls13 {
|
|
ServerConfig::builder()
|
|
.with_safe_default_cipher_suites()
|
|
.with_safe_default_kx_groups()
|
|
.with_protocol_versions(&[&rustls::version::TLS13])
|
|
.expect("could not build server config")
|
|
} else {
|
|
ServerConfig::builder().with_safe_defaults()
|
|
}
|
|
.with_no_client_auth()
|
|
.with_cert_resolver(ARGS.certs.clone());
|
|
TlsAcceptor::from(Arc::new(config))
|
|
}
|
|
|
|
struct RequestHandle<T> {
|
|
stream: TlsStream<T>,
|
|
local_port_check: Option<u16>,
|
|
log_line: String,
|
|
metadata: Arc<Mutex<FileOptions>>,
|
|
}
|
|
|
|
impl RequestHandle<TcpStream> {
|
|
/// Creates a new request handle for the given stream. If establishing the TLS
|
|
/// session fails, returns a corresponding log line.
|
|
async fn new(stream: TcpStream, metadata: Arc<Mutex<FileOptions>>) -> Result<Self, String> {
|
|
let local_addr = stream.local_addr().unwrap().to_string();
|
|
|
|
// try to get the remote IP address if desired
|
|
let peer_addr = if ARGS.log_ips {
|
|
stream
|
|
.peer_addr()
|
|
.map_err(|_| {
|
|
format!(
|
|
// use nonexistent status code 01 if peer IP is unknown
|
|
"{local_addr} - \"\" 01 \"IP error\" error:could not get peer address",
|
|
)
|
|
})?
|
|
.ip()
|
|
.to_string()
|
|
} else {
|
|
// Do not log IP address, but something else so columns still line up.
|
|
"-".into()
|
|
};
|
|
|
|
let log_line = format!("{local_addr} {peer_addr}",);
|
|
|
|
let local_port_check = if ARGS.skip_port_check {
|
|
None
|
|
} else {
|
|
Some(stream.local_addr().unwrap().port())
|
|
};
|
|
|
|
match TLS.accept(stream).await {
|
|
Ok(stream) => Ok(Self {
|
|
stream,
|
|
local_port_check,
|
|
log_line,
|
|
metadata,
|
|
}),
|
|
// use nonexistent status code 00 if connection was not established
|
|
Err(e) => Err(format!("{log_line} \"\" 00 \"TLS error\" error:{e}")),
|
|
}
|
|
}
|
|
}
|
|
|
|
#[cfg(unix)]
|
|
impl RequestHandle<UnixStream> {
|
|
async fn new_unix(
|
|
stream: UnixStream,
|
|
metadata: Arc<Mutex<FileOptions>>,
|
|
) -> Result<Self, String> {
|
|
let log_line = format!(
|
|
"unix:{} -",
|
|
stream
|
|
.local_addr()
|
|
.ok()
|
|
.and_then(|addr| Some(addr.as_pathname()?.to_string_lossy().into_owned()))
|
|
.unwrap_or_default()
|
|
);
|
|
|
|
match TLS.accept(stream).await {
|
|
Ok(stream) => Ok(Self {
|
|
stream,
|
|
// TODO add port check for unix sockets, requires extra arg for port
|
|
local_port_check: None,
|
|
log_line,
|
|
metadata,
|
|
}),
|
|
// use nonexistent status code 00 if connection was not established
|
|
Err(e) => Err(format!("{} \"\" 00 \"TLS error\" error:{}", log_line, e)),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl<T> RequestHandle<T>
|
|
where
|
|
T: AsyncWriteExt + AsyncReadExt + Unpin,
|
|
{
|
|
/// Do the necessary actions to handle this request. Returns a corresponding
|
|
/// log line as Err or Ok, depending on if the request finished with or
|
|
/// without errors.
|
|
async fn handle(mut self) -> Result<String, String> {
|
|
// not already in error condition
|
|
let result = match self.parse_request().await {
|
|
Ok(url) => self.send_response(url).await,
|
|
Err((status, msg)) => self.send_header(status, msg).await,
|
|
};
|
|
|
|
let close_result = self.stream.shutdown().await;
|
|
|
|
match (result, close_result) {
|
|
(Err(e), _) => Err(format!("{} error:{}", self.log_line, e)),
|
|
(Ok(_), Err(e)) => Err(format!("{} error:{}", self.log_line, e)),
|
|
(Ok(_), Ok(_)) => Ok(self.log_line),
|
|
}
|
|
}
|
|
|
|
/// Return the URL requested by the client.
|
|
async fn parse_request(&mut self) -> std::result::Result<Url, (u8, &'static str)> {
|
|
// Because requests are limited to 1024 bytes (plus 2 bytes for CRLF), we
|
|
// can use a fixed-sized buffer on the stack, avoiding allocations and
|
|
// copying, and stopping bad clients from making us use too much memory.
|
|
let mut request = [0; 1026];
|
|
let mut buf = &mut request[..];
|
|
let mut len = 0;
|
|
|
|
// Read until CRLF, end-of-stream, or there's no buffer space left.
|
|
//
|
|
// Since neither CR nor LF can be part of a URI according to
|
|
// ISOC-RFC 3986, we could use BufRead::read_line here, but that does
|
|
// not allow us to cap the number of read bytes at 1024+2.
|
|
let result = loop {
|
|
let bytes_read = if let Ok(read) = self.stream.read(buf).await {
|
|
read
|
|
} else {
|
|
break Err((BAD_REQUEST, "Request ended unexpectedly"));
|
|
};
|
|
len += bytes_read;
|
|
if request[..len].ends_with(b"\r\n") {
|
|
break Ok(());
|
|
} else if bytes_read == 0 {
|
|
break Err((BAD_REQUEST, "Request ended unexpectedly"));
|
|
}
|
|
buf = &mut request[len..];
|
|
}
|
|
.and_then(|()| {
|
|
std::str::from_utf8(&request[..len - 2]).or(Err((BAD_REQUEST, "Non-UTF-8 request")))
|
|
});
|
|
|
|
let request = result.map_err(|e| {
|
|
// write empty request to log line for uniformity
|
|
write!(self.log_line, " \"\"").unwrap();
|
|
e
|
|
})?;
|
|
|
|
// log literal request (might be different from or not an actual URL)
|
|
write!(self.log_line, " \"{request}\"").unwrap();
|
|
|
|
let mut url = Url::parse(request).or(Err((BAD_REQUEST, "Invalid URL")))?;
|
|
|
|
// Validate the URL:
|
|
// correct scheme
|
|
if url.scheme() != "gemini" {
|
|
return Err((PROXY_REQUEST_REFUSED, "Unsupported URL scheme"));
|
|
}
|
|
|
|
// no userinfo and no fragment
|
|
if url.password().is_some() || !url.username().is_empty() || url.fragment().is_some() {
|
|
return Err((BAD_REQUEST, "URL contains fragment or userinfo"));
|
|
}
|
|
|
|
// correct host
|
|
if let Some(domain) = url.domain() {
|
|
// because the gemini scheme is not special enough for WHATWG, normalize
|
|
// it ourselves
|
|
let host = Host::parse(
|
|
&percent_decode_str(domain)
|
|
.decode_utf8()
|
|
.or(Err((BAD_REQUEST, "Invalid URL")))?,
|
|
)
|
|
.or(Err((BAD_REQUEST, "Invalid URL")))?;
|
|
// TODO: simplify when <https://github.com/servo/rust-url/issues/586> resolved
|
|
url.set_host(Some(&host.to_string()))
|
|
.expect("invalid domain?");
|
|
// do not use "contains" here since it requires the same type and does
|
|
// not allow to check for Host<&str> if the vec contains Hostname<String>
|
|
if !ARGS.hostnames.is_empty() && !ARGS.hostnames.iter().any(|h| h == &host) {
|
|
return Err((PROXY_REQUEST_REFUSED, "Proxy request refused"));
|
|
}
|
|
} else {
|
|
return Err((BAD_REQUEST, "URL does not contain a domain"));
|
|
}
|
|
|
|
// correct port
|
|
if let Some(expected_port) = self.local_port_check {
|
|
if let Some(port) = url.port() {
|
|
// Validate that the port in the URL is the same as for the stream this request
|
|
// came in on.
|
|
if port != expected_port {
|
|
return Err((PROXY_REQUEST_REFUSED, "Proxy request refused"));
|
|
}
|
|
}
|
|
}
|
|
Ok(url)
|
|
}
|
|
|
|
/// Send the client the file located at the requested URL.
|
|
async fn send_response(&mut self, url: Url) -> Result {
|
|
let mut path = std::path::PathBuf::from(&ARGS.content_dir);
|
|
|
|
if ARGS.hostnames.len() > 1 {
|
|
// basic vhosts, existence of host_str was checked by parse_request already
|
|
path.push(url.host_str().expect("no hostname"));
|
|
}
|
|
|
|
if let Some(mut segments) = url.path_segments() {
|
|
// append percent-decoded path segments
|
|
for segment in segments.clone() {
|
|
// To prevent directory traversal attacks, we need to
|
|
// check that each filesystem path component in the URL
|
|
// path segment is a normal component (not the root
|
|
// directory, the parent directory, a drive label, or
|
|
// another special component). Furthermore, since path
|
|
// separators (e.g. the escaped forward slash %2F) in a
|
|
// single URL path segment are non-structural, the URL
|
|
// path segment should not contain multiple filesystem
|
|
// path components.
|
|
let decoded = percent_decode_str(segment).decode_utf8()?;
|
|
let mut components = Path::new(decoded.as_ref()).components();
|
|
// the first component must be a normal component; if
|
|
// so, push it onto the PathBuf
|
|
match components.next() {
|
|
None => (),
|
|
Some(Component::Normal(c)) => path.push(c),
|
|
Some(_) => return self.send_header(NOT_FOUND, "Not found, sorry.").await,
|
|
}
|
|
// there must not be more than one component
|
|
if components.next().is_some() {
|
|
return self.send_header(NOT_FOUND, "Not found, sorry.").await;
|
|
}
|
|
// even if it's one component, there may be trailing path
|
|
// separators at the end
|
|
if decoded.ends_with(path::is_separator) {
|
|
return self.send_header(NOT_FOUND, "Not found, sorry.").await;
|
|
}
|
|
}
|
|
// check if hiding files is disabled
|
|
if !ARGS.serve_secret
|
|
// there is a configuration for this file, assume it should be served
|
|
&& !self.metadata.lock().await.exists(&path)
|
|
// check if file or directory is hidden
|
|
&& segments.any(|segment| segment.starts_with('.'))
|
|
{
|
|
return self
|
|
.send_header(GONE, "If I told you, it would not be a secret.")
|
|
.await;
|
|
}
|
|
}
|
|
|
|
if let Ok(metadata) = tokio::fs::metadata(&path).await {
|
|
if metadata.is_dir() {
|
|
if url.path().ends_with('/') || url.path().is_empty() {
|
|
// if the path ends with a slash or the path is empty, the links will work the same
|
|
// without a redirect
|
|
// use `push` instead of `join` because the changed path is used later
|
|
path.push("index.gmi");
|
|
if !path.exists() {
|
|
path.pop();
|
|
// try listing directory
|
|
return self.list_directory(&path).await;
|
|
}
|
|
} else {
|
|
// if client is not redirected, links may not work as expected without trailing slash
|
|
let mut url = url;
|
|
url.set_path(&format!("{}/", url.path()));
|
|
return self.send_header(REDIRECT_PERMANENT, url.as_str()).await;
|
|
}
|
|
}
|
|
}
|
|
|
|
let data = self.metadata.lock().await.get(&path);
|
|
|
|
if let PresetMeta::FullHeader(status, meta) = data {
|
|
self.send_header(status, &meta).await?;
|
|
// do not try to access the file
|
|
return Ok(());
|
|
}
|
|
|
|
// Make sure the file opens successfully before sending a success header.
|
|
let mut file = match tokio::fs::File::open(&path).await {
|
|
Ok(file) => file,
|
|
Err(e) => {
|
|
self.send_header(NOT_FOUND, "Not found, sorry.").await?;
|
|
return Err(e.into());
|
|
}
|
|
};
|
|
|
|
// Send header.
|
|
let mime = match data {
|
|
// this was already handled before opening the file
|
|
PresetMeta::FullHeader(..) => unreachable!(),
|
|
// treat this as the full MIME type
|
|
PresetMeta::FullMime(mime) => mime.clone(),
|
|
// guess the MIME type and add the parameters
|
|
PresetMeta::Parameters(params) => {
|
|
if path.extension() == Some(OsStr::new("gmi")) {
|
|
format!("text/gemini{params}")
|
|
} else {
|
|
let mime = mime_guess::from_path(&path).first_or_octet_stream();
|
|
format!("{}{}", mime.essence_str(), params)
|
|
}
|
|
}
|
|
};
|
|
self.send_header(SUCCESS, &mime).await?;
|
|
|
|
// Send body.
|
|
tokio::io::copy(&mut file, &mut self.stream).await?;
|
|
Ok(())
|
|
}
|
|
|
|
async fn list_directory(&mut self, path: &Path) -> Result {
|
|
// https://url.spec.whatwg.org/#path-percent-encode-set
|
|
const ENCODE_SET: AsciiSet = CONTROLS
|
|
.add(b' ')
|
|
.add(b'"')
|
|
.add(b'#')
|
|
.add(b'<')
|
|
.add(b'>')
|
|
.add(b'?')
|
|
.add(b'`')
|
|
.add(b'{')
|
|
.add(b'}');
|
|
|
|
// check if directory listing is enabled by getting preamble
|
|
let preamble = if let Ok(txt) = std::fs::read_to_string(path.join(".directory-listing-ok"))
|
|
{
|
|
txt
|
|
} else {
|
|
self.send_header(NOT_FOUND, "Directory index disabled.")
|
|
.await?;
|
|
return Ok(());
|
|
};
|
|
|
|
log::info!("Listing directory {:?}", path);
|
|
|
|
self.send_header(SUCCESS, "text/gemini").await?;
|
|
self.stream.write_all(preamble.as_bytes()).await?;
|
|
|
|
let mut entries = tokio::fs::read_dir(path).await?;
|
|
let mut lines = vec![];
|
|
while let Some(entry) = entries.next_entry().await? {
|
|
let mut name = entry
|
|
.file_name()
|
|
.into_string()
|
|
.or(Err("Non-Unicode filename"))?;
|
|
if name.starts_with('.') {
|
|
continue;
|
|
}
|
|
if entry.file_type().await?.is_dir() {
|
|
name += "/";
|
|
}
|
|
let line = match percent_encode(name.as_bytes(), &ENCODE_SET).into() {
|
|
Cow::Owned(url) => format!("=> {url} {name}\n"),
|
|
Cow::Borrowed(url) => format!("=> {url}\n"), // url and name are identical
|
|
};
|
|
lines.push(line);
|
|
}
|
|
lines.sort();
|
|
for line in lines {
|
|
self.stream.write_all(line.as_bytes()).await?;
|
|
}
|
|
Ok(())
|
|
}
|
|
|
|
async fn send_header(&mut self, status: u8, meta: &str) -> Result {
|
|
// add response status and response meta
|
|
write!(self.log_line, " {status} \"{meta}\"")?;
|
|
|
|
self.stream
|
|
.write_all(format!("{status} {meta}\r\n").as_bytes())
|
|
.await?;
|
|
Ok(())
|
|
}
|
|
}
|