mirror of
https://git.sr.ht/~adnano/go-gemini
synced 2024-11-10 00:32:11 +01:00
686 lines
19 KiB
Go
686 lines
19 KiB
Go
package gmi
|
|
|
|
import (
|
|
"bufio"
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"errors"
|
|
"io"
|
|
"log"
|
|
"net"
|
|
"net/url"
|
|
"os"
|
|
"path"
|
|
"path/filepath"
|
|
"sort"
|
|
"strconv"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
)
|
|
|
|
// Server errors.
|
|
var (
|
|
ErrBodyNotAllowed = errors.New("gemini: response status code does not allow for body")
|
|
ErrNotAFile = errors.New("gemini: not a file")
|
|
)
|
|
|
|
// Server is a Gemini server.
|
|
type Server struct {
|
|
// Addr specifies the address that the server should listen on.
|
|
// If Addr is empty, the server will listen on the address ":1965".
|
|
Addr string
|
|
|
|
// Certificate provides a TLS certificate for use by the server.
|
|
// Using a self-signed certificate is recommended.
|
|
Certificate tls.Certificate
|
|
|
|
// Handler specifies the Handler for requests.
|
|
// If Handler is not set, the server will error.
|
|
Handler Handler
|
|
}
|
|
|
|
// ListenAndServe listens for requests at the server's configured address.
|
|
func (s *Server) ListenAndServe() error {
|
|
addr := s.Addr
|
|
if addr == "" {
|
|
addr = ":1965"
|
|
}
|
|
|
|
ln, err := net.Listen("tcp", addr)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer ln.Close()
|
|
|
|
config := &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
MinVersion: tls.VersionTLS12,
|
|
Certificates: []tls.Certificate{s.Certificate},
|
|
ClientAuth: tls.RequestClientCert,
|
|
}
|
|
tlsListener := tls.NewListener(ln, config)
|
|
return s.Serve(tlsListener)
|
|
}
|
|
|
|
// Serve listens for requests on the provided listener.
|
|
func (s *Server) Serve(l net.Listener) error {
|
|
var tempDelay time.Duration // how long to sleep on accept failure
|
|
|
|
for {
|
|
rw, err := l.Accept()
|
|
if err != nil {
|
|
// If this is a temporary error, sleep
|
|
if ne, ok := err.(net.Error); ok && ne.Temporary() {
|
|
if tempDelay == 0 {
|
|
tempDelay = 5 * time.Millisecond
|
|
} else {
|
|
tempDelay *= 2
|
|
}
|
|
if max := 1 * time.Second; tempDelay > max {
|
|
tempDelay = max
|
|
}
|
|
log.Printf("gemini: Accept error: %v; retrying in %v", err, tempDelay)
|
|
time.Sleep(tempDelay)
|
|
continue
|
|
}
|
|
|
|
// Otherwise, return the error
|
|
return err
|
|
}
|
|
|
|
tempDelay = 0
|
|
go s.respond(rw)
|
|
}
|
|
}
|
|
|
|
// ResponseWriter is used by a Gemini handler to construct a Gemini response.
|
|
type ResponseWriter struct {
|
|
w *bufio.Writer
|
|
bodyAllowed bool
|
|
wroteHeader bool
|
|
mimetype string
|
|
}
|
|
|
|
func newResponseWriter(conn net.Conn) *ResponseWriter {
|
|
return &ResponseWriter{
|
|
w: bufio.NewWriter(conn),
|
|
}
|
|
}
|
|
|
|
// WriteHeader writes the response header.
|
|
// If the header has already been written, WriteHeader does nothing.
|
|
//
|
|
// Meta contains more information related to the response status.
|
|
// For successful responses, Meta should contain the mimetype of the response.
|
|
// For failure responses, Meta should contain a short description of the failure.
|
|
// Meta should not be longer than 1024 bytes.
|
|
func (r *ResponseWriter) WriteHeader(status int, meta string) {
|
|
if r.wroteHeader {
|
|
return
|
|
}
|
|
r.w.WriteString(strconv.Itoa(status))
|
|
r.w.WriteByte(' ')
|
|
r.w.WriteString(meta)
|
|
r.w.Write(crlf)
|
|
|
|
// Only allow body to be written on successful status codes.
|
|
if status/10 == StatusClassSuccess {
|
|
r.bodyAllowed = true
|
|
}
|
|
r.wroteHeader = true
|
|
}
|
|
|
|
// SetMimetype sets the mimetype that will be written for a successful response.
|
|
// The provided mimetype will only be used if Write is called without calling
|
|
// WriteHeader.
|
|
// If the mimetype is not set, it will default to "text/gemini".
|
|
func (r *ResponseWriter) SetMimetype(mimetype string) {
|
|
r.mimetype = mimetype
|
|
}
|
|
|
|
// Write writes the response body.
|
|
// If the response status does not allow for a response body, Write returns
|
|
// ErrBodyNotAllowed.
|
|
//
|
|
// If WriteHeader has not yet been called, Write calls
|
|
// WriteHeader(StatusSuccess, mimetype) where mimetype is the mimetype set in
|
|
// SetMimetype. If no mimetype is set, a default of "text/gemini" will be used.
|
|
func (r *ResponseWriter) Write(b []byte) (int, error) {
|
|
if !r.wroteHeader {
|
|
mimetype := r.mimetype
|
|
if mimetype == "" {
|
|
mimetype = "text/gemini"
|
|
}
|
|
r.WriteHeader(StatusSuccess, mimetype)
|
|
}
|
|
if !r.bodyAllowed {
|
|
return 0, ErrBodyNotAllowed
|
|
}
|
|
return r.w.Write(b)
|
|
}
|
|
|
|
// respond responds to a connection.
|
|
func (s *Server) respond(conn net.Conn) {
|
|
r := bufio.NewReader(conn)
|
|
rw := newResponseWriter(conn)
|
|
// Read requested URL
|
|
rawurl, err := r.ReadString('\r')
|
|
if err != nil {
|
|
return
|
|
}
|
|
// Read terminating line feed
|
|
if b, err := r.ReadByte(); err != nil {
|
|
return
|
|
} else if b != '\n' {
|
|
rw.WriteHeader(StatusBadRequest, "Bad request")
|
|
}
|
|
// Trim carriage return
|
|
rawurl = rawurl[:len(rawurl)-1]
|
|
// Ensure URL is valid
|
|
if len(rawurl) > 1024 {
|
|
rw.WriteHeader(StatusBadRequest, "Bad request")
|
|
} else if url, err := url.Parse(rawurl); err != nil || url.User != nil {
|
|
// Note that we return an error status if User is specified in the URL
|
|
rw.WriteHeader(StatusBadRequest, "Bad request")
|
|
} else {
|
|
// Gather information about the request
|
|
req := &Request{
|
|
URL: url,
|
|
RemoteAddr: conn.RemoteAddr(),
|
|
TLS: conn.(*tls.Conn).ConnectionState(),
|
|
}
|
|
s.Handler.Serve(rw, req)
|
|
}
|
|
rw.w.Flush()
|
|
conn.Close()
|
|
}
|
|
|
|
// A Handler responds to a Gemini request.
|
|
type Handler interface {
|
|
// Serve accepts a Request and constructs a Response.
|
|
Serve(*ResponseWriter, *Request)
|
|
}
|
|
|
|
// Input responds to the request with a request for input using the given prompt.
|
|
func Input(rw *ResponseWriter, req *Request, prompt string) {
|
|
rw.WriteHeader(StatusInput, prompt)
|
|
}
|
|
|
|
// InputHandler returns a simple handler that responds to each request with
|
|
// a request for input.
|
|
func InputHandler(prompt string) Handler {
|
|
return HandlerFunc(func(rw *ResponseWriter, req *Request) {
|
|
Input(rw, req, prompt)
|
|
})
|
|
}
|
|
|
|
// WithInput either responds to the request with StatusInput if no input
|
|
// is provided, or calls f with the input when provided.
|
|
func WithInput(rw *ResponseWriter, req *Request, prompt string, f func(string)) {
|
|
input := req.URL.RawQuery
|
|
if input == "" {
|
|
Input(rw, req, prompt)
|
|
return
|
|
}
|
|
f(input)
|
|
}
|
|
|
|
// Sensitive responds to the request with a request for sensitive input
|
|
// using the given prompt.
|
|
func SensitiveInput(rw *ResponseWriter, req *Request, prompt string) {
|
|
rw.WriteHeader(StatusSensitiveInput, prompt)
|
|
}
|
|
|
|
// SensitiveInputHandler returns a simpler handler that responds to each request
|
|
// with a request for sensitive input.
|
|
func SensitiveInputHandler(prompt string) Handler {
|
|
return HandlerFunc(func(rw *ResponseWriter, req *Request) {
|
|
SensitiveInput(rw, req, prompt)
|
|
})
|
|
}
|
|
|
|
// WithSensitiveInput either responds to the request with StatusSensitiveInput
|
|
// if no input is provided, or calls f with the input when provided.
|
|
func WithSensitiveInput(rw *ResponseWriter, req *Request, prompt string, f func(string)) {
|
|
input := req.URL.RawQuery
|
|
if input == "" {
|
|
SensitiveInput(rw, req, prompt)
|
|
return
|
|
}
|
|
f(input)
|
|
}
|
|
|
|
// Redirect replies to the request with a redirect to the given URL.
|
|
func Redirect(rw *ResponseWriter, req *Request, url string) {
|
|
rw.WriteHeader(StatusRedirect, url)
|
|
}
|
|
|
|
// RedirectHandler returns a simple handler that responds to each request with
|
|
// a redirect to the given URL.
|
|
// If permanent is true, the handler will respond with a permanent redirect.
|
|
func RedirectHandler(url string) Handler {
|
|
return HandlerFunc(func(rw *ResponseWriter, req *Request) {
|
|
Redirect(rw, req, url)
|
|
})
|
|
}
|
|
|
|
// PermanentRedirect replies to the request with a permanent redirect to the given URL.
|
|
func PermanentRedirect(rw *ResponseWriter, req *Request, url string) {
|
|
rw.WriteHeader(StatusRedirectPermanent, url)
|
|
}
|
|
|
|
// PermanentRedirectHandler returns a simple handler that responds to each request with
|
|
// a redirect to the given URL.
|
|
// If permanent is true, the handler will respond with a permanent redirect.
|
|
func PermanentRedirectHandler(url string) Handler {
|
|
return HandlerFunc(func(rw *ResponseWriter, req *Request) {
|
|
PermanentRedirect(rw, req, url)
|
|
})
|
|
}
|
|
|
|
// NotFound replies to the request with the NotFound status code.
|
|
func NotFound(rw *ResponseWriter, req *Request) {
|
|
rw.WriteHeader(StatusNotFound, "Not found")
|
|
}
|
|
|
|
// NotFoundHandler returns a simple handler that responds to each request with
|
|
// the status code NotFound.
|
|
func NotFoundHandler() Handler {
|
|
return HandlerFunc(NotFound)
|
|
}
|
|
|
|
// Gone replies to the request with the Gone status code.
|
|
func Gone(rw *ResponseWriter, req *Request) {
|
|
rw.WriteHeader(StatusGone, "Gone")
|
|
}
|
|
|
|
// GoneHandler returns a simple handler that responds to each request with
|
|
// the status code Gone.
|
|
func GoneHandler() Handler {
|
|
return HandlerFunc(Gone)
|
|
}
|
|
|
|
// CertificateRequired responds to the request with the CertificateRequired
|
|
// status code.
|
|
func CertificateRequired(rw *ResponseWriter, req *Request) {
|
|
rw.WriteHeader(StatusCertificateRequired, "Certificate required")
|
|
}
|
|
|
|
// CertificateNotAuthorized responds to the request with
|
|
// the CertificateNotAuthorized status code.
|
|
func CertificateNotAuthorized(rw *ResponseWriter, req *Request) {
|
|
rw.WriteHeader(StatusCertificateNotAuthorized, "Certificate not authorized")
|
|
}
|
|
|
|
// WithCertificate either responds with CertificateRequired if the client did
|
|
// not provide a certificate, or calls f with the first ceritificate provided.
|
|
func WithCertificate(rw *ResponseWriter, req *Request, f func(*x509.Certificate)) {
|
|
if len(req.TLS.PeerCertificates) == 0 {
|
|
CertificateRequired(rw, req)
|
|
return
|
|
}
|
|
cert := req.TLS.PeerCertificates[0]
|
|
f(cert)
|
|
}
|
|
|
|
// CertificateHandler returns a simple handler that requests a certificate from
|
|
// clients if they did not provide one, and calls f with the first certificate
|
|
// if they did.
|
|
func CertificateHandler(f func(*x509.Certificate)) Handler {
|
|
return HandlerFunc(func(rw *ResponseWriter, req *Request) {
|
|
WithCertificate(rw, req, f)
|
|
})
|
|
}
|
|
|
|
// A wrapper around a bare function that implements Handler.
|
|
type HandlerFunc func(*ResponseWriter, *Request)
|
|
|
|
func (f HandlerFunc) Serve(rw *ResponseWriter, req *Request) {
|
|
f(rw, req)
|
|
}
|
|
|
|
// FileServer takes a filesystem and returns a handler which uses that filesystem.
|
|
// The returned Handler rejects requests containing '..' in them.
|
|
func FileServer(fsys FS) Handler {
|
|
return fsHandler{
|
|
fsys,
|
|
}
|
|
}
|
|
|
|
type fsHandler struct {
|
|
FS
|
|
}
|
|
|
|
func (fsys fsHandler) Serve(rw *ResponseWriter, req *Request) {
|
|
// Reject requests with '..' in them
|
|
if containsDotDot(req.URL.Path) {
|
|
NotFound(rw, req)
|
|
return
|
|
}
|
|
f, err := fsys.Open(req.URL.Path)
|
|
if err != nil {
|
|
NotFound(rw, req)
|
|
return
|
|
}
|
|
// TODO: detect mimetype
|
|
rw.SetMimetype("text/gemini")
|
|
// Copy file to response writer
|
|
io.Copy(rw, f)
|
|
}
|
|
|
|
// TODO: replace with fs.FS when available
|
|
type FS interface {
|
|
Open(name string) (File, error)
|
|
}
|
|
|
|
// TODO: replace with fs.File when available
|
|
type File interface {
|
|
Stat() (os.FileInfo, error)
|
|
Read([]byte) (int, error)
|
|
Close() error
|
|
}
|
|
|
|
// Dir implements FS using the native filesystem restricted to a specific directory.
|
|
type Dir string
|
|
|
|
func (d Dir) Open(name string) (File, error) {
|
|
path := filepath.Join(string(d), name)
|
|
f, err := os.OpenFile(path, os.O_RDONLY, 0644)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if stat, err := f.Stat(); err == nil {
|
|
if !stat.Mode().IsRegular() {
|
|
return nil, ErrNotAFile
|
|
}
|
|
}
|
|
return f, nil
|
|
}
|
|
|
|
// The following code is modified from the net/http package.
|
|
|
|
// Copyright 2009 The Go Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
func containsDotDot(v string) bool {
|
|
if !strings.Contains(v, "..") {
|
|
return false
|
|
}
|
|
for _, ent := range strings.FieldsFunc(v, isSlashRune) {
|
|
if ent == ".." {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
func isSlashRune(r rune) bool { return r == '/' || r == '\\' }
|
|
|
|
// ServeMux is a Gemini request multiplexer.
|
|
// It matches the URL of each incoming request against a list of registered
|
|
// patterns and calls the handler for the pattern that
|
|
// most closely matches the URL.
|
|
//
|
|
// Patterns name fixed, rooted paths, like "/favicon.ico",
|
|
// or rooted subtrees, like "/images/" (note the trailing slash).
|
|
// Longer patterns take precedence over shorter ones, so that
|
|
// if there are handlers registered for both "/images/"
|
|
// and "/images/thumbnails/", the latter handler will be
|
|
// called for paths beginning "/images/thumbnails/" and the
|
|
// former will receive requests for any other paths in the
|
|
// "/images/" subtree.
|
|
//
|
|
// Note that since a pattern ending in a slash names a rooted subtree,
|
|
// the pattern "/" matches all paths not matched by other registered
|
|
// patterns, not just the URL with Path == "/".
|
|
//
|
|
// If a subtree has been registered and a request is received naming the
|
|
// subtree root without its trailing slash, ServeMux redirects that
|
|
// request to the subtree root (adding the trailing slash). This behavior can
|
|
// be overridden with a separate registration for the path without
|
|
// the trailing slash. For example, registering "/images/" causes ServeMux
|
|
// to redirect a request for "/images" to "/images/", unless "/images" has
|
|
// been registered separately.
|
|
//
|
|
// Patterns may optionally begin with a host name, restricting matches to
|
|
// URLs on that host only. Host-specific patterns take precedence over
|
|
// general patterns, so that a handler might register for the two patterns
|
|
// "/codesearch" and "codesearch.google.com/" without also taking over
|
|
// requests for "http://www.google.com/".
|
|
//
|
|
// ServeMux also takes care of sanitizing the URL request path and the Host
|
|
// header, stripping the port number and redirecting any request containing . or
|
|
// .. elements or repeated slashes to an equivalent, cleaner URL.
|
|
type ServeMux struct {
|
|
mu sync.RWMutex
|
|
m map[string]muxEntry
|
|
es []muxEntry // slice of entries sorted from longest to shortest.
|
|
hosts bool // whether any patterns contain hostnames
|
|
}
|
|
|
|
type muxEntry struct {
|
|
h Handler
|
|
pattern string
|
|
}
|
|
|
|
// NewServeMux allocates and returns a new ServeMux.
|
|
func NewServeMux() *ServeMux { return new(ServeMux) }
|
|
|
|
// cleanPath returns the canonical path for p, eliminating . and .. elements.
|
|
func cleanPath(p string) string {
|
|
if p == "" {
|
|
return "/"
|
|
}
|
|
if p[0] != '/' {
|
|
p = "/" + p
|
|
}
|
|
np := path.Clean(p)
|
|
// path.Clean removes trailing slash except for root;
|
|
// put the trailing slash back if necessary.
|
|
if p[len(p)-1] == '/' && np != "/" {
|
|
// Fast path for common case of p being the string we want:
|
|
if len(p) == len(np)+1 && strings.HasPrefix(p, np) {
|
|
np = p
|
|
} else {
|
|
np += "/"
|
|
}
|
|
}
|
|
return np
|
|
}
|
|
|
|
// stripHostPort returns h without any trailing ":<port>".
|
|
func stripHostPort(h string) string {
|
|
// If no port on host, return unchanged
|
|
if strings.IndexByte(h, ':') == -1 {
|
|
return h
|
|
}
|
|
host, _, err := net.SplitHostPort(h)
|
|
if err != nil {
|
|
return h // on error, return unchanged
|
|
}
|
|
return host
|
|
}
|
|
|
|
// Find a handler on a handler map given a path string.
|
|
// Most-specific (longest) pattern wins.
|
|
func (mux *ServeMux) match(path string) (h Handler, pattern string) {
|
|
// Check for exact match first.
|
|
v, ok := mux.m[path]
|
|
if ok {
|
|
return v.h, v.pattern
|
|
}
|
|
|
|
// Check for longest valid match. mux.es contains all patterns
|
|
// that end in / sorted from longest to shortest.
|
|
for _, e := range mux.es {
|
|
if strings.HasPrefix(path, e.pattern) {
|
|
return e.h, e.pattern
|
|
}
|
|
}
|
|
return nil, ""
|
|
}
|
|
|
|
// redirectToPathSlash determines if the given path needs appending "/" to it.
|
|
// This occurs when a handler for path + "/" was already registered, but
|
|
// not for path itself. If the path needs appending to, it creates a new
|
|
// URL, setting the path to u.Path + "/" and returning true to indicate so.
|
|
func (mux *ServeMux) redirectToPathSlash(host, path string, u *url.URL) (*url.URL, bool) {
|
|
mux.mu.RLock()
|
|
shouldRedirect := mux.shouldRedirectRLocked(host, path)
|
|
mux.mu.RUnlock()
|
|
if !shouldRedirect {
|
|
return u, false
|
|
}
|
|
path = path + "/"
|
|
u = &url.URL{Path: path, RawQuery: u.RawQuery}
|
|
return u, true
|
|
}
|
|
|
|
// shouldRedirectRLocked reports whether the given path and host should be redirected to
|
|
// path+"/". This should happen if a handler is registered for path+"/" but
|
|
// not path -- see comments at ServeMux.
|
|
func (mux *ServeMux) shouldRedirectRLocked(host, path string) bool {
|
|
p := []string{path, host + path}
|
|
|
|
for _, c := range p {
|
|
if _, exist := mux.m[c]; exist {
|
|
return false
|
|
}
|
|
}
|
|
|
|
n := len(path)
|
|
if n == 0 {
|
|
return false
|
|
}
|
|
for _, c := range p {
|
|
if _, exist := mux.m[c+"/"]; exist {
|
|
return path[n-1] != '/'
|
|
}
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// Handler returns the handler to use for the given request,
|
|
// consulting r.Method, r.Host, and r.URL.Path. It always returns
|
|
// a non-nil handler. If the path is not in its canonical form, the
|
|
// handler will be an internally-generated handler that redirects
|
|
// to the canonical path. If the host contains a port, it is ignored
|
|
// when matching handlers.
|
|
//
|
|
// The path and host are used unchanged for CONNECT requests.
|
|
//
|
|
// Handler also returns the registered pattern that matches the
|
|
// request or, in the case of internally-generated redirects,
|
|
// the pattern that will match after following the redirect.
|
|
//
|
|
// If there is no registered handler that applies to the request,
|
|
// Handler returns a ``page not found'' handler and an empty pattern.
|
|
func (mux *ServeMux) Handler(r *Request) (h Handler, pattern string) {
|
|
// Refuse requests for non-gemini schemes.
|
|
if r.URL.Scheme != "gemini" {
|
|
return NotFoundHandler(), ""
|
|
}
|
|
|
|
// All other requests have any port stripped and path cleaned
|
|
// before passing to mux.handler.
|
|
host := stripHostPort(r.Host)
|
|
path := cleanPath(r.URL.Path)
|
|
|
|
// If the given path is /tree and its handler is not registered,
|
|
// redirect for /tree/.
|
|
if u, ok := mux.redirectToPathSlash(host, path, r.URL); ok {
|
|
return RedirectHandler(u.String()), u.Path
|
|
}
|
|
|
|
if path != r.URL.Path {
|
|
_, pattern = mux.handler(host, path)
|
|
url := *r.URL
|
|
url.Path = path
|
|
return RedirectHandler(url.String()), pattern
|
|
}
|
|
|
|
return mux.handler(host, r.URL.Path)
|
|
}
|
|
|
|
// handler is the main implementation of Handler.
|
|
// The path is known to be in canonical form, except for CONNECT methods.
|
|
func (mux *ServeMux) handler(host, path string) (h Handler, pattern string) {
|
|
mux.mu.RLock()
|
|
defer mux.mu.RUnlock()
|
|
|
|
// Host-specific pattern takes precedence over generic ones
|
|
if mux.hosts {
|
|
h, pattern = mux.match(host + path)
|
|
}
|
|
if h == nil {
|
|
h, pattern = mux.match(path)
|
|
}
|
|
if h == nil {
|
|
h, pattern = NotFoundHandler(), ""
|
|
}
|
|
return
|
|
}
|
|
|
|
// Serve dispatches the request to the handler whose
|
|
// pattern most closely matches the request URL.
|
|
func (mux *ServeMux) Serve(w *ResponseWriter, r *Request) {
|
|
h, _ := mux.Handler(r)
|
|
h.Serve(w, r)
|
|
}
|
|
|
|
// Handle registers the handler for the given pattern.
|
|
// If a handler already exists for pattern, Handle panics.
|
|
func (mux *ServeMux) Handle(pattern string, handler Handler) {
|
|
mux.mu.Lock()
|
|
defer mux.mu.Unlock()
|
|
|
|
if pattern == "" {
|
|
panic("gmi: invalid pattern")
|
|
}
|
|
if handler == nil {
|
|
panic("gmi: nil handler")
|
|
}
|
|
if _, exist := mux.m[pattern]; exist {
|
|
panic("gmi: multiple registrations for " + pattern)
|
|
}
|
|
|
|
if mux.m == nil {
|
|
mux.m = make(map[string]muxEntry)
|
|
}
|
|
e := muxEntry{h: handler, pattern: pattern}
|
|
mux.m[pattern] = e
|
|
if pattern[len(pattern)-1] == '/' {
|
|
mux.es = appendSorted(mux.es, e)
|
|
}
|
|
|
|
if pattern[0] != '/' {
|
|
mux.hosts = true
|
|
}
|
|
}
|
|
|
|
func appendSorted(es []muxEntry, e muxEntry) []muxEntry {
|
|
n := len(es)
|
|
i := sort.Search(n, func(i int) bool {
|
|
return len(es[i].pattern) < len(e.pattern)
|
|
})
|
|
if i == n {
|
|
return append(es, e)
|
|
}
|
|
// we now know that i points at where we want to insert
|
|
es = append(es, muxEntry{}) // try to grow the slice in place, any entry works.
|
|
copy(es[i+1:], es[i:]) // Move shorter entries down
|
|
es[i] = e
|
|
return es
|
|
}
|
|
|
|
// HandleFunc registers the handler function for the given pattern.
|
|
func (mux *ServeMux) HandleFunc(pattern string, handler func(*ResponseWriter, *Request)) {
|
|
if handler == nil {
|
|
panic("gmi: nil handler")
|
|
}
|
|
mux.Handle(pattern, HandlerFunc(handler))
|
|
}
|