vger/main.c

317 lines
7.3 KiB
C
Raw Normal View History

2020-12-05 05:31:13 +11:00
#include <sys/stat.h>
2020-12-04 08:59:39 +11:00
#include <err.h>
#include <errno.h>
#include <limits.h>
2020-12-04 08:59:39 +11:00
#include <pwd.h>
2020-12-05 04:55:31 +11:00
#include <stdarg.h>
2020-12-02 09:39:05 +11:00
#include <stdio.h>
2020-12-04 08:59:39 +11:00
#include <stdlib.h>
2020-12-02 09:39:05 +11:00
#include <string.h>
2020-12-05 04:55:31 +11:00
#include <syslog.h>
2020-12-02 09:39:05 +11:00
#include <unistd.h>
2020-12-05 05:29:44 +11:00
#include "mimes.h"
2020-12-02 09:39:05 +11:00
#define GEMINI_PART 9
#define DEFAULT_LANG "en"
#define DEFAULT_CHROOT "/var/gemini"
#define GEMINI_REQUEST_MAX 1024 /* see https://gemini.circumlunar.space/docs/specification.html */
2020-12-02 09:39:05 +11:00
2020-12-03 05:59:52 +11:00
void display_file(const char *, const char *);
2021-01-02 07:00:40 +11:00
void status(const int, const char *, const char *);
void status_redirect(const int code, const char *url);
void drop_privileges(const char *, const char *);
void eunveil(const char *path, const char *permissions);
2020-12-10 07:12:25 +11:00
size_t estrlcat(char *dst, const char *src, size_t dstsize);
size_t estrlcpy(char *dst, const char *src, size_t dstsize);
void
eunveil(const char *path, const char *permissions)
{
if (unveil(path, permissions) == -1) {
syslog(LOG_DAEMON, "unveil on %s failed", path);
err(1, "unveil");
}
}
2020-12-05 04:55:31 +11:00
size_t
estrlcpy(char *dst, const char *src, size_t dstsize)
{
size_t n = 0;
n = strlcpy(dst, src, dstsize);
if (n >= dstsize) {
err(1, "estrlcpy failed");
}
return n;
}
2020-12-10 07:12:25 +11:00
size_t
estrlcat(char *dst, const char *src, size_t dstsize)
{
size_t size;
if ((size = strlcat(dst, src, dstsize)) >= dstsize)
err(1, "strlcat");
return size;
}
2020-12-02 09:39:05 +11:00
void
drop_privileges(const char *user, const char *path)
2020-12-02 09:39:05 +11:00
{
struct passwd *pw;
int chrooted = 0;
2020-12-06 00:44:59 +11:00
/*
* use chroot() if an user is specified requires root user to be
* running the program to run chroot() and then drop privileges
*/
if (strlen(user) > 0) {
2020-12-06 00:44:59 +11:00
/* is root? */
if (getuid() != 0) {
syslog(LOG_DAEMON, "chroot requires program to be run as root");
2020-12-05 05:31:42 +11:00
errx(1, "chroot requires root user");
}
/* search user uid from name */
if ((pw = getpwnam(user)) == NULL) {
syslog(LOG_DAEMON, "the user %s can't be found on the system", user);
err(1, "finding user");
}
/* chroot worked? */
if (chroot(path) != 0) {
syslog(LOG_DAEMON, "the chroot_dir %s can't be used for chroot", path);
err(1, "chroot");
}
chrooted = 1;
2020-12-05 05:39:16 +11:00
if (chdir("/") == -1) {
syslog(LOG_DAEMON, "failed to chdir(\"/\")");
err(1, "chdir");
}
/* drop privileges */
2020-12-05 05:39:16 +11:00
if (setgroups(1, &pw->pw_gid) ||
setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) ||
setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid)) {
syslog(LOG_DAEMON, "dropping privileges to user %s (uid=%i) failed",
user, pw->pw_uid);
err(1, "Can't drop privileges");
}
}
#ifdef __OpenBSD__
/*
* prevent access to files other than the one in path
*/
if (chrooted) {
eunveil("/", "r");
} else {
eunveil(path, "r");
}
/*
* prevent system calls other parsing queryfor fread file and
* write to stdio
*/
if (pledge("stdio rpath", NULL) == -1) {
syslog(LOG_DAEMON, "pledge call failed");
err(1, "pledge");
}
#endif
2020-12-02 09:39:05 +11:00
}
2020-12-03 05:59:52 +11:00
void
status(const int code, const char *file_mime, const char *lang)
2020-12-03 05:59:52 +11:00
{
printf("%i %s; lang=%s\r\n",
code, file_mime, lang);
2020-12-03 05:59:52 +11:00
}
2020-12-02 09:39:05 +11:00
2021-01-02 07:00:40 +11:00
void
status_redirect(const int code, const char *url)
{
printf("%i %s\r\n",
code, url);
}
2020-12-02 09:39:05 +11:00
void
2020-12-03 05:59:52 +11:00
display_file(const char *path, const char *lang)
2020-12-02 09:39:05 +11:00
{
FILE *fd = NULL;
struct stat sb = {0};
ssize_t nread = 0;
char *buffer[BUFSIZ];
const char *file_mime;
2021-01-02 07:00:40 +11:00
char target[FILENAME_MAX] = "";
2020-12-02 09:39:05 +11:00
2021-01-02 07:00:40 +11:00
/* this is to check if path exists and obtain metadata later */
if (stat(path, &sb) == -1) {
/* check if path is a symbolic link
* if so, redirect using its target */
if (lstat(path, &sb) != -1 && S_ISLNK(sb.st_mode) == 1)
goto redirect;
else
goto err;
}
2020-12-02 09:39:05 +11:00
/* check if directory */
if (S_ISDIR(sb.st_mode) != 0) {
/* look for index.gmi inside dir */
char index_path[GEMINI_REQUEST_MAX] = {'\0'};
estrlcpy(index_path, path, sizeof(index_path));
estrlcat(index_path, "/index.gmi", sizeof(index_path));
display_file(index_path, lang);
} else {
2020-12-02 09:39:05 +11:00
2021-01-02 07:00:40 +11:00
/* open the file requested */
if ((fd = fopen(path, "r")) == NULL) { goto err; }
2021-01-02 07:00:40 +11:00
file_mime = get_file_mime(path);
2020-12-03 05:59:52 +11:00
status(20, file_mime, lang);
2020-12-02 09:39:05 +11:00
/* read the file and write it to stdout */
while ((nread = fread(buffer, sizeof(char), sizeof(buffer), fd)) != 0)
fwrite(buffer, sizeof(char), nread, stdout);
goto closefd;
syslog(LOG_DAEMON, "path served %s", path);
}
2020-12-02 09:39:05 +11:00
return;
2020-12-06 00:44:59 +11:00
err:
/* return an error code and no content */
status(51, "text/gemini", lang);
syslog(LOG_DAEMON, "path invalid %s", path);
goto closefd;
2021-01-02 07:00:40 +11:00
redirect:
/* read symbolic link target to redirect */
if (readlink(path, target, FILENAME_MAX) == -1) {
goto err;
}
status_redirect(30, target);
2021-01-02 07:00:40 +11:00
syslog(LOG_DAEMON, "redirection from %s to %s", path, target);
closefd:
if (S_ISREG(sb.st_mode) != 0) {
2021-01-02 07:00:40 +11:00
fclose(fd);
}
2020-12-02 09:39:05 +11:00
}
int
main(int argc, char **argv)
{
char request [GEMINI_REQUEST_MAX] = {'\0'};
char hostname [GEMINI_REQUEST_MAX] = {'\0'};
char file [GEMINI_REQUEST_MAX] = {'\0'};
char path [GEMINI_REQUEST_MAX] = DEFAULT_CHROOT;
2020-12-03 05:59:52 +11:00
char lang [3] = DEFAULT_LANG;
2020-12-06 00:44:59 +11:00
char user [_SC_LOGIN_NAME_MAX] = "";
int virtualhost = 0;
2020-12-09 07:48:35 +11:00
int option = 0;
2020-12-06 00:44:59 +11:00
int chroot = 0;
2020-12-09 07:48:21 +11:00
char *pos = NULL;
2020-12-04 08:59:39 +11:00
while ((option = getopt(argc, argv, ":d:l:u:v")) != -1) {
switch (option) {
case 'd':
estrlcpy(path, optarg, sizeof(path));
break;
case 'v':
virtualhost = 1;
break;
case 'l':
estrlcpy(lang, optarg, sizeof(lang));
break;
2020-12-04 08:59:39 +11:00
case 'u':
estrlcpy(user, optarg, sizeof(user));
2020-12-06 00:44:59 +11:00
chroot = 1;
2020-12-04 08:59:39 +11:00
break;
}
2020-12-02 09:39:05 +11:00
}
2020-12-03 05:59:52 +11:00
2020-12-04 08:59:39 +11:00
/*
* do chroot if an user is supplied run pledge/unveil if OpenBSD
2020-12-04 08:59:39 +11:00
*/
drop_privileges(user, path);
2020-12-02 09:39:05 +11:00
2020-12-06 00:44:59 +11:00
/* change basedir to / to build the filepath if we use chroot */
if (chroot == 1)
estrlcpy(path, "/", sizeof(path));
2020-12-06 00:44:59 +11:00
2020-12-02 09:39:05 +11:00
/*
* read 1024 chars from stdin
* to get the request
*/
if (fgets(request, GEMINI_REQUEST_MAX, stdin) == NULL){
/*TODO : add error code 5x */
syslog(LOG_DAEMON, "request is too long (1024 max): %s", request);
exit(1);
}
2020-12-02 09:39:05 +11:00
/* remove \r\n at the end of string */
pos = strchr(request, '\r');
if (pos != NULL)
2020-12-05 04:55:31 +11:00
*pos = '\0';
2020-12-02 09:39:05 +11:00
/*
* check if the beginning of the request starts with
* gemini://
*/
if (strncmp(request, "gemini://", GEMINI_PART) != 0) {
2020-12-02 09:39:05 +11:00
/* error code url malformed */
syslog(LOG_DAEMON, "request «%s» doesn't match gemini://",
request);
2020-12-02 09:39:05 +11:00
exit(1);
}
2020-12-05 04:55:31 +11:00
syslog(LOG_DAEMON, "request %s", request);
2020-12-02 09:39:05 +11:00
/* remove the gemini:// part */
memmove(request, request + GEMINI_PART, sizeof(request) - GEMINI_PART);
2020-12-02 09:39:05 +11:00
/*
* look for the first / after the hostname
* in order to split hostname and uri
*/
pos = strchr(request, '/');
if (pos != NULL) {
/* if there is a / found */
/* separate hostname and uri */
estrlcpy(file, pos, strlen(pos)+1);
/* just keep hostname in request */
pos[0] = '\0';
2020-12-02 09:39:05 +11:00
}
/* check if client added :port at end of request */
pos = strchr(request, ':');
if (pos != NULL) {
/* end string at :*/
pos[0] = '\0';
}
/* copy hostname from request */
estrlcpy(hostname, request, sizeof(hostname));
2020-12-02 09:39:05 +11:00
/*
* if virtualhost feature is actived looking under the default path +
* hostname directory gemini://foobar/hello will look for
* path/foobar/hello
*/
if (virtualhost) {
2020-12-10 07:12:25 +11:00
estrlcat(path, hostname, sizeof(path));
estrlcat(path, "/", sizeof(path));
}
2020-12-02 09:39:05 +11:00
/* add the base dir to the file requested */
2020-12-10 07:12:25 +11:00
estrlcat(path, file, sizeof(path));
2020-12-02 09:39:05 +11:00
/* open file and send it to stdout */
display_file(path, lang);
2020-12-02 09:39:05 +11:00
return (0);
2020-12-02 09:39:05 +11:00
}