/* * Copyright (c) 2021, 2022, 2023 Omar Polo * * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ #include "gmid.h" #include #include #include #include #include "log.h" struct fcgi_header { unsigned char version; unsigned char type; unsigned char req_id1; unsigned char req_id0; unsigned char content_len1; unsigned char content_len0; unsigned char padding; unsigned char reserved; }; /* * number of bytes in a FCGI_HEADER. Future version of the protocol * will not reduce this number. */ #define FCGI_HEADER_LEN 8 /* * values for the version component */ #define FCGI_VERSION_1 1 /* * values for the type component */ #define FCGI_BEGIN_REQUEST 1 #define FCGI_ABORT_REQUEST 2 #define FCGI_END_REQUEST 3 #define FCGI_PARAMS 4 #define FCGI_STDIN 5 #define FCGI_STDOUT 6 #define FCGI_STDERR 7 #define FCGI_DATA 8 #define FCGI_GET_VALUES 9 #define FCGI_GET_VALUES_RESULT 10 #define FCGI_UNKNOWN_TYPE 11 #define FCGI_MAXTYPE (FCGI_UNKNOWN_TYPE) struct fcgi_begin_req { unsigned char role1; unsigned char role0; unsigned char flags; unsigned char reserved[5]; }; struct fcgi_begin_req_record { struct fcgi_header header; struct fcgi_begin_req body; }; /* * mask for flags; */ #define FCGI_KEEP_CONN 1 /* * values for the role */ #define FCGI_RESPONDER 1 #define FCGI_AUTHORIZER 2 #define FCGI_FILTER 3 struct fcgi_end_req_body { unsigned char app_status3; unsigned char app_status2; unsigned char app_status1; unsigned char app_status0; unsigned char proto_status; unsigned char reserved[3]; }; /* * values for proto_status */ #define FCGI_REQUEST_COMPLETE 0 #define FCGI_CANT_MPX_CONN 1 #define FCGI_OVERLOADED 2 #define FCGI_UNKNOWN_ROLE 3 /* * Variable names for FCGI_GET_VALUES / FCGI_GET_VALUES_RESULT * records. */ #define FCGI_MAX_CONNS "FCGI_MAX_CONNS" #define FCGI_MAX_REQS "FCGI_MAX_REQS" #define FCGI_MPXS_CONNS "FCGI_MPXS_CONNS" static int prepare_header(struct fcgi_header *h, int type, size_t size, size_t padding) { int id = 1; memset(h, 0, sizeof(*h)); h->version = FCGI_VERSION_1; h->type = type; h->req_id1 = (id >> 8); h->req_id0 = (id & 0xFF); h->content_len1 = (size >> 8); h->content_len0 = (size & 0xFF); h->padding = padding; return 0; } static int fcgi_begin_request(struct bufferevent *bev) { struct fcgi_begin_req_record r; memset(&r, 0, sizeof(r)); prepare_header(&r.header, FCGI_BEGIN_REQUEST, sizeof(r.body), 0); assert(sizeof(r.body) == FCGI_HEADER_LEN); r.body.role1 = 0; r.body.role0 = FCGI_RESPONDER; r.body.flags = FCGI_KEEP_CONN; if (bufferevent_write(bev, &r, sizeof(r)) == -1) return -1; return 0; } static int fcgi_send_param(struct bufferevent *bev, const char *name, const char *value) { struct fcgi_header h; uint32_t namlen, vallen, padlen; uint8_t s[8]; size_t size; const char padding[8] = { 0 }; namlen = strlen(name); vallen = strlen(value); size = namlen + vallen + 8; /* 4 for the sizes */ padlen = (8 - (size & 0x7)) & 0x7; s[0] = ( namlen >> 24) | 0x80; s[1] = ((namlen >> 16) & 0xFF); s[2] = ((namlen >> 8) & 0xFF); s[3] = ( namlen & 0xFF); s[4] = ( vallen >> 24) | 0x80; s[5] = ((vallen >> 16) & 0xFF); s[6] = ((vallen >> 8) & 0xFF); s[7] = ( vallen & 0xFF); prepare_header(&h, FCGI_PARAMS, size, padlen); if (bufferevent_write(bev, &h, sizeof(h)) == -1 || bufferevent_write(bev, s, sizeof(s)) == -1 || bufferevent_write(bev, name, namlen) == -1 || bufferevent_write(bev, value, vallen) == -1 || bufferevent_write(bev, padding, padlen) == -1) return -1; return 0; } static int fcgi_end_param(struct bufferevent *bev) { struct fcgi_header h; prepare_header(&h, FCGI_PARAMS, 0, 0); if (bufferevent_write(bev, &h, sizeof(h)) == -1) return -1; prepare_header(&h, FCGI_STDIN, 0, 0); if (bufferevent_write(bev, &h, sizeof(h)) == -1) return -1; return 0; } static inline int recid(struct fcgi_header *h) { return h->req_id0 + (h->req_id1 << 8); } static inline int reclen(struct fcgi_header *h) { return h->content_len0 + (h->content_len1 << 8); } static void fcgi_handle_stdout(struct client *c, struct evbuffer *src, size_t len) { struct bufferevent *bev = c->cgibev; char *t; size_t l; int code; if (c->code == 0) { l = len; if (l > sizeof(c->sbuf) - c->soff) l = sizeof(c->sbuf) - c->soff; memcpy(&c->sbuf[c->soff], EVBUFFER_DATA(src), l); c->soff += l; evbuffer_drain(src, l); len -= l; if ((t = memmem(c->sbuf, c->soff, "\r\n", 2)) == NULL) { if (c->soff == sizeof(c->sbuf)) { log_warnx("FastCGI application is trying to" " send a header that's too long."); fcgi_error(bev, EVBUFFER_ERROR, c); } /* wait a bit */ return; } *t = '\0'; t += 2; /* skip CRLF */ if (!isdigit((unsigned char)c->sbuf[0]) || !isdigit((unsigned char)c->sbuf[1]) || c->sbuf[2] != ' ') { fcgi_error(bev, EVBUFFER_ERROR, c); return; } code = (c->sbuf[0] - '0') * 10 + (c->sbuf[1] - '0'); if (code < 10 || code >= 70) { log_warnx("FastCGI application is trying to send an" " invalid reply code: %d", code); fcgi_error(bev, EVBUFFER_ERROR, c); return; } if (start_reply(c, code, c->sbuf + 3) == -1 || c->code < 20 || c->code > 29) { fcgi_error(bev, EVBUFFER_EOF, c); return; } bufferevent_write(c->bev, t, &c->sbuf[c->soff] - t); } bufferevent_write(c->bev, EVBUFFER_DATA(src), len); evbuffer_drain(src, len); } void fcgi_read(struct bufferevent *bev, void *d) { struct client *c = d; struct evbuffer *src = EVBUFFER_INPUT(bev); struct fcgi_header hdr; struct fcgi_end_req_body end; size_t len; while (c->type != REQUEST_DONE) { if (EVBUFFER_LENGTH(src) < sizeof(hdr)) return; memcpy(&hdr, EVBUFFER_DATA(src), sizeof(hdr)); if (recid(&hdr) != 1) { log_warnx("got invalid client id %d from fcgi backend", recid(&hdr)); goto err; } len = reclen(&hdr); if (EVBUFFER_LENGTH(src) < sizeof(hdr) + len + hdr.padding) return; evbuffer_drain(src, sizeof(hdr)); switch (hdr.type) { case FCGI_END_REQUEST: if (len != sizeof(end)) { log_warnx("got invalid end request" " record size"); goto err; } bufferevent_read(bev, &end, sizeof(end)); /* TODO: do something with the status? */ c->type = REQUEST_DONE; break; case FCGI_STDERR: /* discard stderr (for now) */ evbuffer_drain(src, len); break; case FCGI_STDOUT: fcgi_handle_stdout(c, src, len); break; default: log_warnx("got invalid fcgi record (type=%d)", hdr.type); goto err; } evbuffer_drain(src, hdr.padding); } err: fcgi_error(bev, EVBUFFER_ERROR, c); client_write(c->bev, c); } void fcgi_write(struct bufferevent *bev, void *d) { /* * There's no much use for the write callback. */ return; } void fcgi_error(struct bufferevent *bev, short err, void *d) { struct client *c = d; /* * If we're here it means that some kind of non-recoverable * error happened. * * Don't free bev as we might be called by a function that * still uses it. */ bufferevent_disable(bev, EVBUFFER_READ); close(c->pfd); c->pfd = -1; /* EOF and no header */ if (c->code == 0) { start_reply(c, CGI_ERROR, "CGI error"); return; } c->type = REQUEST_DONE; } static void path_translate(const char *path, struct location *loc, struct location *rloc, char *buf, size_t len) { const char *root, *sufx; buf[0] = '\0'; if (*loc->dir != '\0') root = loc->dir; else if (*rloc->dir != '\0') root = rloc->dir; else return; sufx = ""; if (*root != '\0') sufx = root[strlen(root) - 1] == '/' ? "" : "/"; while (*path == '/') path++; snprintf(buf, len, "%s%s%s", root, sufx, path); } void fcgi_req(struct client *c, struct location *loc) { char buf[22], path[GEMINI_URL_LEN], path_tr[PATH_MAX]; char *scriptname, *qs; const char *stripped, *port; size_t l; time_t tim; struct tm tminfo; struct envlist *p; fcgi_begin_request(c->cgibev); stripped = strip_path(c->iri.path, loc->fcgi_strip); if (*stripped != '/') snprintf(path, sizeof(path), "/%s", stripped); else strlcpy(path, stripped, sizeof(path)); port = c->iri.port; if (port == NULL || *port == '\0') port = "1965"; scriptname = ""; TAILQ_FOREACH(p, &loc->params, envs) { if (!strcmp(p->name, "SCRIPT_NAME")) { scriptname = p->value; break; } } l = strlen(scriptname); while (l > 0 && scriptname[l - 1] == '/') l--; if (!strncmp(scriptname, path, l) && (path[l] == '/' || path[l] == '\0')) { fcgi_send_param(c->cgibev, "PATH_INFO", &path[l]); path_translate(&path[l], loc, TAILQ_FIRST(&c->host->locations), path_tr, sizeof(path_tr)); path[l] = '\0'; fcgi_send_param(c->cgibev, "SCRIPT_NAME", path); } else { path_translate(stripped, loc, TAILQ_FIRST(&c->host->locations), path_tr, sizeof(path_tr)); fcgi_send_param(c->cgibev, "PATH_INFO", stripped); fcgi_send_param(c->cgibev, "SCRIPT_NAME", scriptname); } fcgi_send_param(c->cgibev, "GATEWAY_INTERFACE", "CGI/1.1"); fcgi_send_param(c->cgibev, "PATH_TRANSLATED", path_tr); fcgi_send_param(c->cgibev, "QUERY_STRING", c->iri.query); fcgi_send_param(c->cgibev, "REMOTE_ADDR", c->rhost); fcgi_send_param(c->cgibev, "REMOTE_HOST", c->rhost); fcgi_send_param(c->cgibev, "REQUEST_METHOD", "GET"); fcgi_send_param(c->cgibev, "SERVER_NAME", c->iri.host); fcgi_send_param(c->cgibev, "SERVER_PORT", port); fcgi_send_param(c->cgibev, "SERVER_PROTOCOL", "GEMINI"); fcgi_send_param(c->cgibev, "SERVER_SOFTWARE", GMID_VERSION); fcgi_send_param(c->cgibev, "GEMINI_URL_PATH", c->iri.path); if (*c->iri.query != '\0' && strchr(c->iri.query, '=') == NULL && (qs = strdup(c->iri.query)) != NULL) { pct_decode_str(qs); fcgi_send_param(c->cgibev, "GEMINI_SEARCH_STRING", qs); free(qs); } TAILQ_FOREACH(p, &loc->params, envs) { if (!strcmp(p->name, "SCRIPT_NAME")) continue; fcgi_send_param(c->cgibev, p->name, p->value); } if (tls_peer_cert_provided(c->ctx)) { fcgi_send_param(c->cgibev, "AUTH_TYPE", "CERTIFICATE"); fcgi_send_param(c->cgibev, "REMOTE_USER", tls_peer_cert_subject(c->ctx)); fcgi_send_param(c->cgibev, "TLS_CLIENT_ISSUER", tls_peer_cert_issuer(c->ctx)); fcgi_send_param(c->cgibev, "TLS_CLIENT_HASH", tls_peer_cert_hash(c->ctx)); fcgi_send_param(c->cgibev, "TLS_VERSION", tls_conn_version(c->ctx)); fcgi_send_param(c->cgibev, "TLS_CIPHER", tls_conn_cipher(c->ctx)); snprintf(buf, sizeof(buf), "%d", tls_conn_cipher_strength(c->ctx)); fcgi_send_param(c->cgibev, "TLS_CIPHER_STRENGTH", buf); tim = tls_peer_cert_notbefore(c->ctx); strftime(buf, sizeof(buf), "%FT%TZ", gmtime_r(&tim, &tminfo)); fcgi_send_param(c->cgibev, "TLS_CLIENT_NOT_BEFORE", buf); tim = tls_peer_cert_notafter(c->ctx); strftime(buf, sizeof(buf), "%FT%TZ", gmtime_r(&tim, &tminfo)); fcgi_send_param(c->cgibev, "TLS_CLIENT_NOT_AFTER", buf); } else fcgi_send_param(c->cgibev, "AUTH_TYPE", ""); if (fcgi_end_param(c->cgibev) == -1) fcgi_error(c->cgibev, EVBUFFER_ERROR, c); }