1 /* Copyright 2021, Martin Bays <mbays@sdf.org>
2 * SPDX-License-Identifier: GPL-3.0-or-later */
7 #include <sys/socket.h>
14 /* Decode percent-escapes in place */
15 static void urldecode(char *p
) {
23 if (sscanf(p
, "%2hhx", w
) == 1) {
36 #define MAX_REQUEST_SZ 4096
37 /* Parse SCGI request with null body from fd s and place gemini-relevant
38 * header values in request_info.
39 * Return false on failure. */
40 static bool parse_SCGI(int s
, Request_Info
*request_info
)
42 char buf
[MAX_REQUEST_SZ
];
45 int r2
= read(s
, buf
+ r
, MAX_REQUEST_SZ
- r
);
53 if (sscanf(buf
, "%u:", &sz
) == 1) {
55 snprintf(buf2
, 16, "%u:,", sz
);
56 const int full_sz
= sz
+ strlen(buf2
);
58 if (full_sz
> MAX_REQUEST_SZ
) {
59 fprintf(stderr
, "Bad request: Oversized, %u\n", sz
);
68 fprintf(stderr
, "Bad request: non-empty body.\n");
74 const char* end
= &buf
[r
-1];
78 } else if (buf
[r
-1] != ',' || buf
[r
-2] != 0) {
79 fprintf(stderr
, "Bad request: improperly terminated header.\n");
84 while (*p
!= ':') p
++;
92 fprintf(stderr
, "Bad request: key with no value.\n");
100 if (strcmp(key
, "QUERY_STRING") == 0) {
102 request_info
->query_string_decoded
= val
;
103 } else if (strcmp(key
, "SCRIPT_PATH") == 0) {
104 request_info
->script_path
= val
;
105 } else if (strcmp(key
, "PATH_INFO") == 0) {
106 request_info
->path_info
= val
;
107 } else if (strcmp(key
, "SERVER_NAME") == 0) {
108 request_info
->server_name
= val
;
109 } else if (strcmp(key
, "SERVER_PORT") == 0) {
110 request_info
->server_port
= val
;
111 } else if (strcmp(key
, "REMOTE_ADDR") == 0) {
112 request_info
->remote_addr
= val
;
113 } else if (strcmp(key
, "TLS_CLIENT_ISSUER") == 0) {
114 request_info
->tls_client_issuer
= val
;
115 } else if (strcmp(key
, "TLS_CLIENT_ISSUER_CN") == 0) {
116 request_info
->tls_client_issuer_cn
= val
;
117 } else if (strcmp(key
, "TLS_CLIENT_SUBJECT") == 0) {
118 request_info
->tls_client_subject
= val
;
119 } else if (strcmp(key
, "TLS_CLIENT_SUBJECT_CN") == 0) {
120 request_info
->tls_client_subject_cn
= val
;
121 } else if (strcmp(key
, "TLS_CLIENT_HASH") == 0) {
122 if (strncmp(val
, "SHA256:", 7) == 0) val
+= 7;
123 request_info
->tls_client_hash
= val
;
131 void runSCGI(const char *socket_path
, respond_cb respond
, void *respond_object
)
133 // Unix socket gubbins based on
134 // https://beej.us/guide/bgipc/html/multi/unixsock.html
136 const int s
= socket(AF_UNIX
, SOCK_STREAM
, 0);
142 struct sockaddr_un local
;
143 local
.sun_family
= AF_UNIX
;
144 strcpy(local
.sun_path
, socket_path
);
145 unlink(local
.sun_path
);
146 if (bind(s
, (struct sockaddr
*)&local
,
147 strlen(local
.sun_path
) + sizeof(local
.sun_family
)) == -1) {
152 if (listen(s
, 20) == -1) {
158 const int s2
= accept(s
, NULL
, NULL
);
165 Request_Info request_info
= { };
166 if (parse_SCGI(s2
, &request_info
)) {
167 respond(respond_object
, &request_info
, s2
);