catgirl/chat.c

518 lines
14 KiB
C
Raw Normal View History

/* Copyright (C) 2020 June McEnroe <june@causal.agency>
2020-02-01 06:18:01 +00:00
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <https://www.gnu.org/licenses/>.
*
* Additional permission under GNU GPL version 3 section 7:
*
* If you modify this Program, or any covered work, by linking or
* combining it with OpenSSL (or a modified version of that library),
* containing parts covered by the terms of the OpenSSL License and the
* original SSLeay license, the licensors of this Program grant you
* additional permission to convey the resulting work. Corresponding
* Source for a non-source form of such a combination shall include the
* source code for the parts of OpenSSL used as well as that of the
* covered work.
2020-02-01 06:18:01 +00:00
*/
#include <err.h>
2020-02-04 08:58:56 +00:00
#include <errno.h>
2020-02-09 00:12:05 +00:00
#include <fcntl.h>
#include <inttypes.h>
#include <limits.h>
#include <locale.h>
2020-02-04 08:58:56 +00:00
#include <poll.h>
2020-02-05 00:02:54 +00:00
#include <signal.h>
2020-02-01 06:18:01 +00:00
#include <stdbool.h>
2020-02-10 10:50:28 +00:00
#include <stdint.h>
2020-02-01 06:18:01 +00:00
#include <stdio.h>
#include <stdlib.h>
2020-02-08 22:22:51 +00:00
#include <string.h>
#include <sys/stat.h>
#include <sys/time.h>
2020-02-08 22:22:51 +00:00
#include <sys/wait.h>
2020-02-01 06:18:01 +00:00
#include <sysexits.h>
2021-01-27 05:15:46 +00:00
#include <time.h>
#include <tls.h>
2020-02-01 06:18:01 +00:00
#include <unistd.h>
#ifdef __FreeBSD__
2021-06-28 13:11:02 +00:00
#include <capsicum_helpers.h>
#endif
char *readpassphrase(const char *prompt, char *buf, size_t bufsiz, int flags);
2020-02-01 06:18:01 +00:00
#include "chat.h"
#ifndef OPENSSL_BIN
#define OPENSSL_BIN "openssl"
#endif
static void genCert(const char *path) {
const char *name = strrchr(path, '/');
name = (name ? &name[1] : path);
char subj[4 + NAME_MAX];
snprintf(subj, sizeof(subj), "/CN=%.*s", (int)strcspn(name, "."), name);
umask(0066);
execlp(
OPENSSL_BIN, "openssl", "req",
"-x509", "-new", "-newkey", "rsa:4096", "-sha256", "-days", "3650",
"-nodes", "-subj", subj, "-out", path, "-keyout", path,
NULL
);
err(EX_UNAVAILABLE, "openssl");
}
2020-02-01 07:33:17 +00:00
char *idNames[IDCap] = {
[None] = "<none>",
[Debug] = "<debug>",
[Network] = "<network>",
};
2020-02-02 08:27:50 +00:00
enum Color idColors[IDCap] = {
[None] = Black,
2020-02-05 00:02:54 +00:00
[Debug] = Green,
2020-02-02 08:27:50 +00:00
[Network] = Gray,
};
uint idNext = Network + 1;
2020-02-01 07:33:17 +00:00
struct Network network = { .userLen = 9, .hostLen = 63 };
struct Self self = { .color = Default };
2020-02-01 06:18:01 +00:00
2020-02-11 00:40:13 +00:00
static const char *save;
static void exitSave(void) {
int error = uiSave();
2020-02-11 00:40:13 +00:00
if (error) {
warn("%s", save);
_exit(EX_IOERR);
}
}
uint execID;
2020-02-14 03:22:11 +00:00
int execPipe[2] = { -1, -1 };
int utilPipe[2] = { -1, -1 };
2020-02-08 22:42:19 +00:00
static void execRead(void) {
2020-02-08 22:42:19 +00:00
char buf[1024];
ssize_t len = read(execPipe[0], buf, sizeof(buf) - 1);
2020-02-08 22:42:19 +00:00
if (len < 0) err(EX_IOERR, "read");
if (!len) return;
2020-02-14 03:22:11 +00:00
buf[len] = '\0';
for (char *ptr = buf; ptr;) {
char *line = strsep(&ptr, "\r\n");
if (line[0]) command(execID, line);
2020-02-14 03:22:11 +00:00
}
}
static void utilRead(void) {
2020-02-14 03:22:11 +00:00
char buf[1024];
ssize_t len = read(utilPipe[0], buf, sizeof(buf) - 1);
2020-02-14 03:22:11 +00:00
if (len < 0) err(EX_IOERR, "read");
if (!len) return;
buf[len] = '\0';
for (char *ptr = buf; ptr;) {
char *line = strsep(&ptr, "\r\n");
if (line[0]) uiFormat(Network, Warm, NULL, "%s", line);
2020-02-08 22:42:19 +00:00
}
}
uint32_t hashInit;
uint32_t hashBound = 75;
static void parseHash(char *str) {
hashInit = strtoul(str, &str, 0);
if (*str) hashBound = strtoul(&str[1], NULL, 0);
}
static void parsePlain(char *str) {
self.plainUser = strsep(&str, ":");
if (!str) errx(EX_USAGE, "SASL PLAIN missing colon");
self.plainPass = str;
}
2020-02-05 00:02:54 +00:00
static volatile sig_atomic_t signals[NSIG];
static void signalHandler(int signal) {
signals[signal] = 1;
}
static void sandboxEarly(bool log);
static void sandboxLate(int irc);
#if defined __OpenBSD__
static char *promisesInitial;
static char promises[64] = "stdio tty";
static void sandboxEarly(bool log) {
char *ptr = &promises[strlen(promises)];
char *end = &promises[sizeof(promises)];
if (log) {
2021-10-16 21:03:31 +00:00
char buf[PATH_MAX];
int error = unveil(dataPath(buf, sizeof(buf), "log", 0), "wc");
if (error) err(EX_OSERR, "unveil");
ptr = seprintf(ptr, end, " wpath cpath");
}
if (!self.restricted) {
int error = unveil("/", "x");
if (error) err(EX_OSERR, "unveil");
ptr = seprintf(ptr, end, " proc exec");
}
promisesInitial = ptr;
ptr = seprintf(ptr, end, " inet dns");
int error = pledge(promises, NULL);
if (error) err(EX_OSERR, "pledge");
}
static void sandboxLate(int irc) {
(void)irc;
*promisesInitial = '\0';
int error = pledge(promises, NULL);
if (error) err(EX_OSERR, "pledge");
}
#elif defined __FreeBSD__
static void sandboxEarly(bool log) {
(void)log;
}
static void sandboxLate(int irc) {
if (!self.restricted) return;
// Rights are also limited in uiLoad() and logOpen().
cap_rights_t rights;
int error = 0
|| caph_limit_stdin()
|| caph_rights_limit(
STDOUT_FILENO, cap_rights_init(&rights, CAP_WRITE, CAP_IOCTL)
)
|| caph_limit_stderr()
|| caph_rights_limit(
irc, cap_rights_init(&rights, CAP_SEND, CAP_RECV, CAP_EVENT)
);
if (error) err(EX_OSERR, "cap_rights_limit");
// caph_cache_tzdata(3) doesn't load UTC info, which we need for
// certificate verification. gmtime(3) does.
caph_cache_tzdata();
gmtime(&(time_t) { time(NULL) });
error = cap_enter();
if (error) err(EX_OSERR, "cap_enter");
}
#else
static void sandboxEarly(bool log) {
(void)log;
}
static void sandboxLate(int irc) {
(void)irc;
}
#endif
2020-02-01 06:18:01 +00:00
int main(int argc, char *argv[]) {
setlocale(LC_CTYPE, "");
2020-02-01 06:18:01 +00:00
bool insecure = false;
2021-01-10 23:00:41 +00:00
bool printCert = false;
const char *bind = NULL;
2020-02-01 06:18:01 +00:00
const char *host = NULL;
const char *port = "6697";
const char *trust = NULL;
2020-02-01 06:18:01 +00:00
const char *cert = NULL;
const char *priv = NULL;
bool log = false;
2020-02-01 06:18:01 +00:00
bool sasl = false;
char *pass = NULL;
2020-02-01 06:18:01 +00:00
const char *user = NULL;
const char *real = NULL;
struct option options[] = {
{ .val = '!', .name = "insecure", no_argument },
{ .val = 'C', .name = "copy", required_argument },
{ .val = 'H', .name = "hash", required_argument },
2021-01-16 19:04:53 +00:00
{ .val = 'I', .name = "highlight", required_argument },
{ .val = 'K', .name = "kiosk", no_argument },
{ .val = 'N', .name = "notify", required_argument },
{ .val = 'O', .name = "open", required_argument },
{ .val = 'R', .name = "restrict", no_argument },
{ .val = 'S', .name = "bind", required_argument },
2021-01-27 05:15:46 +00:00
{ .val = 'T', .name = "timestamp", optional_argument },
{ .val = 'a', .name = "sasl-plain", required_argument },
{ .val = 'c', .name = "cert", required_argument },
{ .val = 'e', .name = "sasl-external", no_argument },
{ .val = 'g', .name = "generate", required_argument },
{ .val = 'h', .name = "host", required_argument },
{ .val = 'i', .name = "ignore", required_argument },
{ .val = 'j', .name = "join", required_argument },
{ .val = 'k', .name = "priv", required_argument },
{ .val = 'l', .name = "log", no_argument },
2021-06-18 16:28:09 +00:00
{ .val = 'm', .name = "mode", required_argument },
{ .val = 'n', .name = "nick", required_argument },
2021-01-10 23:00:41 +00:00
{ .val = 'o', .name = "print-chain", no_argument },
{ .val = 'p', .name = "port", required_argument },
{ .val = 'q', .name = "quiet", no_argument },
{ .val = 'r', .name = "real", required_argument },
{ .val = 's', .name = "save", required_argument },
{ .val = 't', .name = "trust", required_argument },
{ .val = 'u', .name = "user", required_argument },
{ .val = 'v', .name = "debug", no_argument },
{ .val = 'w', .name = "pass", required_argument },
{0},
};
char opts[3 * ARRAY_LEN(options)];
for (size_t i = 0, j = 0; i < ARRAY_LEN(options); ++i) {
opts[j++] = options[i].val;
if (options[i].has_arg != no_argument) opts[j++] = ':';
if (options[i].has_arg == optional_argument) opts[j++] = ':';
}
2020-04-02 20:13:23 +00:00
for (int opt; 0 < (opt = getopt_config(argc, argv, opts, options, NULL));) {
2020-02-01 06:18:01 +00:00
switch (opt) {
break; case '!': insecure = true;
break; case 'C': utilPush(&urlCopyUtil, optarg);
break; case 'H': parseHash(optarg);
2021-01-16 19:04:53 +00:00
break; case 'I': filterAdd(Hot, optarg);
break; case 'K': self.kiosk = true;
2020-02-13 01:12:34 +00:00
break; case 'N': utilPush(&uiNotifyUtil, optarg);
break; case 'O': utilPush(&urlOpenUtil, optarg);
2020-02-12 03:39:29 +00:00
break; case 'R': self.restricted = true;
break; case 'S': bind = optarg;
break; case 'T': {
windowTime.enable = true;
if (optarg) windowTime.format = optarg;
}
break; case 'a': sasl = true; parsePlain(optarg);
2020-02-01 06:18:01 +00:00
break; case 'c': cert = optarg;
break; case 'e': sasl = true;
break; case 'g': genCert(optarg);
2020-02-01 06:18:01 +00:00
break; case 'h': host = optarg;
2021-01-16 18:30:59 +00:00
break; case 'i': filterAdd(Ice, optarg);
2020-02-01 06:18:01 +00:00
break; case 'j': self.join = optarg;
break; case 'k': priv = optarg;
break; case 'l': log = true; logOpen();
2021-06-18 16:28:09 +00:00
break; case 'm': self.mode = optarg;
break; case 'n': {
for (uint i = 0; i < ARRAY_LEN(self.nicks); ++i) {
self.nicks[i] = strsep(&optarg, " ");
}
}
break; case 'o': printCert = true;
2020-02-01 06:18:01 +00:00
break; case 'p': port = optarg;
break; case 'q': windowThreshold = Warm;
2020-02-01 06:18:01 +00:00
break; case 'r': real = optarg;
2020-02-11 00:40:13 +00:00
break; case 's': save = optarg;
break; case 't': trust = optarg;
2020-02-01 06:18:01 +00:00
break; case 'u': user = optarg;
2020-02-01 07:26:35 +00:00
break; case 'v': self.debug = true;
2020-02-01 06:18:01 +00:00
break; case 'w': pass = optarg;
2020-02-06 03:51:45 +00:00
break; default: return EX_USAGE;
2020-02-01 06:18:01 +00:00
}
}
if (!host) errx(EX_USAGE, "host required");
if (printCert) {
#ifdef __OpenBSD__
int error = pledge("stdio inet dns", NULL);
if (error) err(EX_OSERR, "pledge");
#endif
ircConfig(true, NULL, NULL, NULL);
ircConnect(bind, host, port);
ircPrintCert();
ircClose();
return EX_OK;
}
if (!self.nicks[0]) self.nicks[0] = getenv("USER");
if (!self.nicks[0]) errx(EX_CONFIG, "USER unset");
if (!user) user = self.nicks[0];
if (!real) real = self.nicks[0];
2020-02-01 06:18:01 +00:00
if (self.kiosk) {
char *hash;
int n = asprintf(&hash, "%08" PRIx32, _hash(user));
if (n < 0) err(EX_OSERR, "asprintf");
user = hash;
}
if (pass && !pass[0]) {
char *buf = malloc(512);
if (!buf) err(EX_OSERR, "malloc");
pass = readpassphrase("Server password: ", buf, 512, 0);
if (!pass) errx(EX_IOERR, "unable to read passphrase");
}
if (self.plainPass && !self.plainPass[0]) {
char *buf = malloc(512);
if (!buf) err(EX_OSERR, "malloc");
self.plainPass = readpassphrase("Account password: ", buf, 512, 0);
if (!self.plainPass) errx(EX_IOERR, "unable to read passphrase");
}
// Modes defined in RFC 1459:
2020-02-15 09:54:53 +00:00
set(&network.chanTypes, "#&");
set(&network.prefixes, "@+");
set(&network.prefixModes, "ov");
set(&network.listModes, "b");
set(&network.paramModes, "k");
set(&network.setParamModes, "l");
set(&network.channelModes, "imnpst");
set(&network.name, host);
set(&self.nick, "*");
2020-03-30 18:56:26 +00:00
2022-07-30 22:47:26 +00:00
inputCache();
ircConfig(insecure, trust, cert, priv);
2022-02-20 01:20:19 +00:00
uiInit();
sig_t cursesWinch = signal(SIGWINCH, signalHandler);
if (save) {
uiLoad(save);
atexit(exitSave);
}
windowShow(windowFor(Network));
2021-07-13 19:39:16 +00:00
uiFormat(
Network, Cold, NULL,
"\3%dcatgirl\3\tis GPLv3 fwee softwawe ^w^ "
"code is avaiwable fwom https://git.causal.agency/catgirl",
Pink
);
uiFormat(Network, Cold, NULL, "Traveling...");
uiDraw();
2021-08-25 21:48:16 +00:00
sandboxEarly(log);
int irc = ircConnect(bind, host, port);
sandboxLate(irc);
ircHandshake();
if (pass) {
ircFormat("PASS :");
ircSend(pass, strlen(pass));
ircFormat("\r\n");
explicit_bzero(pass, strlen(pass));
}
2020-02-01 06:18:01 +00:00
if (sasl) ircFormat("CAP REQ :sasl\r\n");
ircFormat("CAP LS\r\n");
ircFormat("NICK %s\r\n", self.nicks[0]);
2020-02-01 06:18:01 +00:00
ircFormat("USER %s 0 * :%s\r\n", user, real);
2020-02-01 07:26:35 +00:00
2022-02-20 01:20:19 +00:00
// Avoid disabling VINTR until main loop.
inputInit();
2020-02-05 00:02:54 +00:00
signal(SIGHUP, signalHandler);
signal(SIGINT, signalHandler);
signal(SIGALRM, signalHandler);
2020-02-05 00:02:54 +00:00
signal(SIGTERM, signalHandler);
2020-02-08 22:22:51 +00:00
signal(SIGCHLD, signalHandler);
2020-02-05 00:02:54 +00:00
bool pipes = !self.kiosk && !self.restricted;
if (pipes) {
int error = pipe(utilPipe) || pipe(execPipe);
2020-02-14 03:22:11 +00:00
if (error) err(EX_OSERR, "pipe");
fcntl(utilPipe[0], F_SETFD, FD_CLOEXEC);
fcntl(utilPipe[1], F_SETFD, FD_CLOEXEC);
fcntl(execPipe[0], F_SETFD, FD_CLOEXEC);
fcntl(execPipe[1], F_SETFD, FD_CLOEXEC);
}
2020-02-09 00:12:05 +00:00
bool ping = false;
2020-02-14 03:22:11 +00:00
struct pollfd fds[] = {
2020-02-04 08:58:56 +00:00
{ .events = POLLIN, .fd = STDIN_FILENO },
{ .events = POLLIN, .fd = irc },
2020-02-14 02:57:55 +00:00
{ .events = POLLIN, .fd = utilPipe[0] },
2020-02-14 03:22:11 +00:00
{ .events = POLLIN, .fd = execPipe[0] },
2020-02-04 08:58:56 +00:00
};
2020-02-06 02:57:23 +00:00
while (!self.quit) {
int nfds = poll(fds, (pipes ? ARRAY_LEN(fds) : 2), -1);
2020-02-04 08:58:56 +00:00
if (nfds < 0 && errno != EINTR) err(EX_IOERR, "poll");
2020-02-08 22:42:19 +00:00
if (nfds > 0) {
2022-02-20 01:20:19 +00:00
if (fds[0].revents) inputRead();
2020-02-08 22:42:19 +00:00
if (fds[1].revents) ircRecv();
2020-02-14 02:57:55 +00:00
if (fds[2].revents) utilRead();
2020-02-14 03:22:11 +00:00
if (fds[3].revents) execRead();
2020-02-08 22:42:19 +00:00
}
2020-02-04 08:58:56 +00:00
2020-02-06 02:57:23 +00:00
if (signals[SIGHUP]) self.quit = "zzz";
if (signals[SIGINT] || signals[SIGTERM]) break;
2020-02-08 22:22:51 +00:00
if (nfds > 0 && fds[1].revents) {
ping = false;
struct itimerval timer = {
.it_value.tv_sec = 2 * 60,
.it_interval.tv_sec = 30,
};
int error = setitimer(ITIMER_REAL, &timer, NULL);
if (error) err(EX_OSERR, "setitimer");
}
if (signals[SIGALRM]) {
signals[SIGALRM] = 0;
if (ping) {
errx(EX_UNAVAILABLE, "ping timeout");
} else {
ircFormat("PING nyaa\r\n");
ping = true;
}
}
2020-02-08 22:22:51 +00:00
if (signals[SIGCHLD]) {
signals[SIGCHLD] = 0;
for (int status; 0 < waitpid(-1, &status, WNOHANG);) {
2020-02-08 22:22:51 +00:00
if (WIFEXITED(status) && WEXITSTATUS(status)) {
uiFormat(
Network, Warm, NULL,
"Process exits with status %d", WEXITSTATUS(status)
);
} else if (WIFSIGNALED(status)) {
uiFormat(
Network, Warm, NULL,
"Process terminates from %s",
strsignal(WTERMSIG(status))
);
}
}
uiShow();
2020-02-08 22:22:51 +00:00
}
2020-02-05 00:02:54 +00:00
if (signals[SIGWINCH]) {
signals[SIGWINCH] = 0;
cursesWinch(SIGWINCH);
// doupdate(3) needs to be called for KEY_RESIZE to be picked up.
2020-02-05 22:58:49 +00:00
uiDraw();
2022-02-20 01:20:19 +00:00
inputRead();
2020-02-05 00:02:54 +00:00
}
uiDraw();
2020-02-01 07:26:35 +00:00
}
2020-02-05 00:02:54 +00:00
2020-02-06 02:57:23 +00:00
if (self.quit) {
ircFormat("QUIT :%s\r\n", self.quit);
} else {
ircFormat("QUIT\r\n");
}
struct Message msg = {
.nick = self.nick,
.user = self.user,
.cmd = "QUIT",
.params[0] = self.quit,
};
handle(&msg);
ircClose();
logClose();
2020-02-05 00:02:54 +00:00
uiHide();
2020-02-01 06:18:01 +00:00
}