mirror of
https://git.sr.ht/~adnano/go-gemini
synced 2024-12-04 09:18:17 +01:00
221 lines
5.9 KiB
Go
221 lines
5.9 KiB
Go
package gemini
|
|
|
|
import (
|
|
"bufio"
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"errors"
|
|
"net"
|
|
"net/url"
|
|
"strings"
|
|
"time"
|
|
)
|
|
|
|
// Client is a Gemini client.
|
|
//
|
|
// Clients are safe for concurrent use by multiple goroutines.
|
|
type Client struct {
|
|
// KnownHosts is a list of known hosts.
|
|
KnownHosts KnownHostsFile
|
|
|
|
// Timeout specifies a time limit for requests made by this
|
|
// Client. The timeout includes connection time and reading
|
|
// the response body. The timer remains running after
|
|
// Get and Do return and will interrupt reading of the Response.Body.
|
|
//
|
|
// A Timeout of zero means no timeout.
|
|
Timeout time.Duration
|
|
|
|
// InsecureSkipTrust specifies whether the client should trust
|
|
// any certificate it receives without checking KnownHosts
|
|
// or calling TrustCertificate.
|
|
// Use with caution.
|
|
InsecureSkipTrust bool
|
|
|
|
// GetInput is called to retrieve input when the server requests it.
|
|
// If GetInput is nil or returns false, no input will be sent and
|
|
// the response will be returned.
|
|
GetInput func(prompt string, sensitive bool) (input string, ok bool)
|
|
|
|
// CheckRedirect determines whether to follow a redirect.
|
|
// If CheckRedirect is nil, redirects will not be followed.
|
|
CheckRedirect func(req *Request, via []*Request) error
|
|
|
|
// GetCertificate is called to retrieve a certificate upon
|
|
// the request of a server.
|
|
// If GetCertificate is nil or the returned error is not nil,
|
|
// the request will not be sent again and the response will be returned.
|
|
GetCertificate func(scope, path string) (tls.Certificate, error)
|
|
|
|
// TrustCertificate is called to determine whether the client
|
|
// should trust a certificate it has not seen before.
|
|
// If TrustCertificate is nil, the certificate will not be trusted
|
|
// and the connection will be aborted.
|
|
//
|
|
// If TrustCertificate returns TrustOnce, the certificate will be added
|
|
// to the client's list of known hosts.
|
|
// If TrustCertificate returns TrustAlways, the certificate will also be
|
|
// written to the known hosts file.
|
|
TrustCertificate func(hostname string, cert *x509.Certificate) Trust
|
|
}
|
|
|
|
// Get performs a Gemini request for the given url.
|
|
func (c *Client) Get(url string) (*Response, error) {
|
|
req, err := NewRequest(url)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return c.Do(req)
|
|
}
|
|
|
|
// Do performs a Gemini request and returns a Gemini response.
|
|
func (c *Client) Do(req *Request) (*Response, error) {
|
|
return c.do(req, nil)
|
|
}
|
|
|
|
func (c *Client) do(req *Request, via []*Request) (*Response, error) {
|
|
// Extract hostname
|
|
colonPos := strings.LastIndex(req.Host, ":")
|
|
if colonPos == -1 {
|
|
colonPos = len(req.Host)
|
|
}
|
|
hostname := req.Host[:colonPos]
|
|
|
|
// Connect to the host
|
|
config := &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
MinVersion: tls.VersionTLS12,
|
|
GetClientCertificate: func(_ *tls.CertificateRequestInfo) (*tls.Certificate, error) {
|
|
if req.Certificate != nil {
|
|
return req.Certificate, nil
|
|
}
|
|
return &tls.Certificate{}, nil
|
|
},
|
|
VerifyConnection: func(cs tls.ConnectionState) error {
|
|
return c.verifyConnection(req, cs)
|
|
},
|
|
ServerName: hostname,
|
|
}
|
|
netConn, err := (&net.Dialer{}).DialContext(req.Context, "tcp", req.Host)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
conn := tls.Client(netConn, config)
|
|
// Set connection deadline
|
|
if d := c.Timeout; d != 0 {
|
|
conn.SetDeadline(time.Now().Add(d))
|
|
}
|
|
|
|
// Write the request
|
|
w := bufio.NewWriter(conn)
|
|
req.write(w)
|
|
if err := w.Flush(); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Read the response
|
|
resp := &Response{}
|
|
if err := resp.read(conn); err != nil {
|
|
return nil, err
|
|
}
|
|
resp.Request = req
|
|
// Store connection state
|
|
resp.TLS = conn.ConnectionState()
|
|
|
|
switch {
|
|
case resp.Status == StatusCertificateRequired:
|
|
// Check to see if a certificate was already provided to prevent an infinite loop
|
|
if req.Certificate != nil {
|
|
return resp, nil
|
|
}
|
|
|
|
hostname, path := req.URL.Hostname(), strings.TrimSuffix(req.URL.Path, "/")
|
|
if c.GetCertificate != nil {
|
|
cert, err := c.GetCertificate(hostname, path)
|
|
if err != nil {
|
|
return resp, err
|
|
}
|
|
req.Certificate = &cert
|
|
return c.do(req, via)
|
|
}
|
|
return resp, nil
|
|
|
|
case resp.Status.Class() == StatusClassInput:
|
|
if c.GetInput != nil {
|
|
input, ok := c.GetInput(resp.Meta, resp.Status == StatusSensitiveInput)
|
|
if ok {
|
|
req.URL.ForceQuery = true
|
|
req.URL.RawQuery = QueryEscape(input)
|
|
return c.do(req, via)
|
|
}
|
|
}
|
|
return resp, nil
|
|
|
|
case resp.Status.Class() == StatusClassRedirect:
|
|
if via == nil {
|
|
via = []*Request{}
|
|
}
|
|
via = append(via, req)
|
|
|
|
target, err := url.Parse(resp.Meta)
|
|
if err != nil {
|
|
return resp, err
|
|
}
|
|
target = req.URL.ResolveReference(target)
|
|
|
|
redirect := NewRequestFromURL(target)
|
|
redirect.Context = req.Context
|
|
if c.CheckRedirect != nil {
|
|
if err := c.CheckRedirect(redirect, via); err != nil {
|
|
return resp, err
|
|
}
|
|
return c.do(redirect, via)
|
|
}
|
|
}
|
|
|
|
return resp, nil
|
|
}
|
|
|
|
func (c *Client) verifyConnection(req *Request, cs tls.ConnectionState) error {
|
|
// Verify the hostname
|
|
var hostname string
|
|
if host, _, err := net.SplitHostPort(req.Host); err == nil {
|
|
hostname = host
|
|
} else {
|
|
hostname = req.Host
|
|
}
|
|
cert := cs.PeerCertificates[0]
|
|
if err := verifyHostname(cert, hostname); err != nil {
|
|
return err
|
|
}
|
|
if c.InsecureSkipTrust {
|
|
return nil
|
|
}
|
|
|
|
// Check the known hosts
|
|
knownHost, ok := c.KnownHosts.Lookup(hostname)
|
|
if !ok || !time.Now().Before(knownHost.Expires) {
|
|
// See if the client trusts the certificate
|
|
if c.TrustCertificate != nil {
|
|
switch c.TrustCertificate(hostname, cert) {
|
|
case TrustOnce:
|
|
fingerprint := NewFingerprint(cert.Raw, cert.NotAfter)
|
|
c.KnownHosts.Add(hostname, fingerprint)
|
|
return nil
|
|
case TrustAlways:
|
|
fingerprint := NewFingerprint(cert.Raw, cert.NotAfter)
|
|
c.KnownHosts.Add(hostname, fingerprint)
|
|
c.KnownHosts.Write(hostname, fingerprint)
|
|
return nil
|
|
}
|
|
}
|
|
return errors.New("gemini: certificate not trusted")
|
|
}
|
|
|
|
fingerprint := NewFingerprint(cert.Raw, cert.NotAfter)
|
|
if knownHost.Hex == fingerprint.Hex {
|
|
return nil
|
|
}
|
|
return errors.New("gemini: fingerprint does not match")
|
|
}
|