2020-02-01 06:18:01 +00:00
|
|
|
/* Copyright (C) 2020 C. McEnroe <june@causal.agency>
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
2020-06-08 21:48:07 +00:00
|
|
|
*
|
|
|
|
* Additional permission under GNU GPL version 3 section 7:
|
|
|
|
*
|
|
|
|
* If you modify this Program, or any covered work, by linking or
|
2020-08-04 16:19:14 +00:00
|
|
|
* combining it with OpenSSL (or a modified version of that library),
|
2020-06-08 21:48:07 +00:00
|
|
|
* containing parts covered by the terms of the OpenSSL License and the
|
|
|
|
* original SSLeay license, the licensors of this Program grant you
|
|
|
|
* additional permission to convey the resulting work. Corresponding
|
|
|
|
* Source for a non-source form of such a combination shall include the
|
2020-08-04 16:19:14 +00:00
|
|
|
* source code for the parts of OpenSSL used as well as that of the
|
2020-06-08 21:48:07 +00:00
|
|
|
* covered work.
|
2020-02-01 06:18:01 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <err.h>
|
2020-02-04 08:58:56 +00:00
|
|
|
#include <errno.h>
|
2020-02-09 00:12:05 +00:00
|
|
|
#include <fcntl.h>
|
2021-05-27 15:45:47 +00:00
|
|
|
#include <inttypes.h>
|
2020-02-17 04:05:43 +00:00
|
|
|
#include <limits.h>
|
2020-02-02 00:37:48 +00:00
|
|
|
#include <locale.h>
|
2020-02-04 08:58:56 +00:00
|
|
|
#include <poll.h>
|
2020-02-05 00:02:54 +00:00
|
|
|
#include <signal.h>
|
2020-02-01 06:18:01 +00:00
|
|
|
#include <stdbool.h>
|
2020-02-10 10:50:28 +00:00
|
|
|
#include <stdint.h>
|
2020-02-01 06:18:01 +00:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
2020-02-08 22:22:51 +00:00
|
|
|
#include <string.h>
|
2020-02-13 06:39:25 +00:00
|
|
|
#include <sys/stat.h>
|
2021-06-15 20:59:24 +00:00
|
|
|
#include <sys/time.h>
|
2020-02-08 22:22:51 +00:00
|
|
|
#include <sys/wait.h>
|
2020-02-01 06:18:01 +00:00
|
|
|
#include <sysexits.h>
|
2021-01-27 05:15:46 +00:00
|
|
|
#include <time.h>
|
2021-01-11 00:23:01 +00:00
|
|
|
#include <tls.h>
|
2020-02-01 06:18:01 +00:00
|
|
|
#include <unistd.h>
|
|
|
|
|
2021-06-24 21:05:12 +00:00
|
|
|
#ifdef __FreeBSD__
|
2021-06-28 13:11:02 +00:00
|
|
|
#include <capsicum_helpers.h>
|
2021-06-24 21:05:12 +00:00
|
|
|
#endif
|
|
|
|
|
2020-02-01 06:18:01 +00:00
|
|
|
#include "chat.h"
|
|
|
|
|
2020-02-13 06:39:25 +00:00
|
|
|
#ifndef OPENSSL_BIN
|
|
|
|
#define OPENSSL_BIN "openssl"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static void genCert(const char *path) {
|
|
|
|
const char *name = strrchr(path, '/');
|
|
|
|
name = (name ? &name[1] : path);
|
2020-02-17 04:05:43 +00:00
|
|
|
char subj[4 + NAME_MAX];
|
2020-02-13 06:39:25 +00:00
|
|
|
snprintf(subj, sizeof(subj), "/CN=%.*s", (int)strcspn(name, "."), name);
|
|
|
|
umask(0066);
|
|
|
|
execlp(
|
|
|
|
OPENSSL_BIN, "openssl", "req",
|
|
|
|
"-x509", "-new", "-newkey", "rsa:4096", "-sha256", "-days", "3650",
|
|
|
|
"-nodes", "-subj", subj, "-out", path, "-keyout", path,
|
|
|
|
NULL
|
|
|
|
);
|
|
|
|
err(EX_UNAVAILABLE, "openssl");
|
|
|
|
}
|
|
|
|
|
2020-02-01 07:33:17 +00:00
|
|
|
char *idNames[IDCap] = {
|
|
|
|
[None] = "<none>",
|
|
|
|
[Debug] = "<debug>",
|
|
|
|
[Network] = "<network>",
|
|
|
|
};
|
2020-02-02 08:27:50 +00:00
|
|
|
enum Color idColors[IDCap] = {
|
|
|
|
[None] = Black,
|
2020-02-05 00:02:54 +00:00
|
|
|
[Debug] = Green,
|
2020-02-02 08:27:50 +00:00
|
|
|
[Network] = Gray,
|
|
|
|
};
|
2020-02-16 03:19:55 +00:00
|
|
|
uint idNext = Network + 1;
|
2020-02-01 07:33:17 +00:00
|
|
|
|
2020-03-23 17:13:43 +00:00
|
|
|
struct Network network = { .userLen = 9, .hostLen = 63 };
|
2020-02-05 01:23:55 +00:00
|
|
|
struct Self self = { .color = Default };
|
2020-02-01 06:18:01 +00:00
|
|
|
|
2020-02-11 00:40:13 +00:00
|
|
|
static const char *save;
|
|
|
|
static void exitSave(void) {
|
2021-06-11 12:30:58 +00:00
|
|
|
int error = uiSave();
|
2020-02-11 00:40:13 +00:00
|
|
|
if (error) {
|
|
|
|
warn("%s", save);
|
|
|
|
_exit(EX_IOERR);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-17 04:05:43 +00:00
|
|
|
uint execID;
|
2020-02-14 03:22:11 +00:00
|
|
|
int execPipe[2] = { -1, -1 };
|
2020-02-17 04:05:43 +00:00
|
|
|
int utilPipe[2] = { -1, -1 };
|
2020-02-08 22:42:19 +00:00
|
|
|
|
2020-02-17 04:05:43 +00:00
|
|
|
static void execRead(void) {
|
2020-02-08 22:42:19 +00:00
|
|
|
char buf[1024];
|
2020-02-17 04:05:43 +00:00
|
|
|
ssize_t len = read(execPipe[0], buf, sizeof(buf) - 1);
|
2020-02-08 22:42:19 +00:00
|
|
|
if (len < 0) err(EX_IOERR, "read");
|
|
|
|
if (!len) return;
|
2020-02-14 03:22:11 +00:00
|
|
|
buf[len] = '\0';
|
2020-03-30 23:44:45 +00:00
|
|
|
for (char *ptr = buf; ptr;) {
|
2020-11-25 00:15:57 +00:00
|
|
|
char *line = strsep(&ptr, "\r\n");
|
2020-02-17 04:05:43 +00:00
|
|
|
if (line[0]) command(execID, line);
|
2020-02-14 03:22:11 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-17 04:05:43 +00:00
|
|
|
static void utilRead(void) {
|
2020-02-14 03:22:11 +00:00
|
|
|
char buf[1024];
|
2020-02-17 04:05:43 +00:00
|
|
|
ssize_t len = read(utilPipe[0], buf, sizeof(buf) - 1);
|
2020-02-14 03:22:11 +00:00
|
|
|
if (len < 0) err(EX_IOERR, "read");
|
|
|
|
if (!len) return;
|
|
|
|
buf[len] = '\0';
|
2020-03-30 23:44:45 +00:00
|
|
|
for (char *ptr = buf; ptr;) {
|
2020-11-25 00:15:57 +00:00
|
|
|
char *line = strsep(&ptr, "\r\n");
|
2020-02-17 04:05:43 +00:00
|
|
|
if (line[0]) uiFormat(Network, Warm, NULL, "%s", line);
|
2020-02-08 22:42:19 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-09 22:58:29 +00:00
|
|
|
uint32_t hashInit;
|
|
|
|
uint32_t hashBound = 75;
|
|
|
|
|
|
|
|
static void parseHash(char *str) {
|
|
|
|
hashInit = strtoul(str, &str, 0);
|
|
|
|
if (*str) hashBound = strtoul(&str[1], NULL, 0);
|
|
|
|
}
|
|
|
|
|
2020-02-05 00:02:54 +00:00
|
|
|
static volatile sig_atomic_t signals[NSIG];
|
|
|
|
static void signalHandler(int signal) {
|
|
|
|
signals[signal] = 1;
|
|
|
|
}
|
|
|
|
|
2020-02-01 06:18:01 +00:00
|
|
|
int main(int argc, char *argv[]) {
|
2020-02-02 00:37:48 +00:00
|
|
|
setlocale(LC_CTYPE, "");
|
|
|
|
|
2020-02-01 06:18:01 +00:00
|
|
|
bool insecure = false;
|
2021-01-10 23:00:41 +00:00
|
|
|
bool printCert = false;
|
2020-02-12 01:02:37 +00:00
|
|
|
const char *bind = NULL;
|
2020-02-01 06:18:01 +00:00
|
|
|
const char *host = NULL;
|
|
|
|
const char *port = "6697";
|
2021-01-10 00:11:57 +00:00
|
|
|
const char *trust = NULL;
|
2020-02-01 06:18:01 +00:00
|
|
|
const char *cert = NULL;
|
|
|
|
const char *priv = NULL;
|
|
|
|
|
2021-06-24 20:58:28 +00:00
|
|
|
bool log = false;
|
2020-02-01 06:18:01 +00:00
|
|
|
bool sasl = false;
|
|
|
|
const char *pass = NULL;
|
|
|
|
const char *nick = NULL;
|
|
|
|
const char *user = NULL;
|
|
|
|
const char *real = NULL;
|
|
|
|
|
2020-04-02 18:14:43 +00:00
|
|
|
struct option options[] = {
|
|
|
|
{ .val = '!', .name = "insecure", no_argument },
|
|
|
|
{ .val = 'C', .name = "copy", required_argument },
|
|
|
|
{ .val = 'H', .name = "hash", required_argument },
|
2021-01-16 19:04:53 +00:00
|
|
|
{ .val = 'I', .name = "highlight", required_argument },
|
2021-01-23 05:03:58 +00:00
|
|
|
{ .val = 'K', .name = "kiosk", no_argument },
|
2020-04-02 18:14:43 +00:00
|
|
|
{ .val = 'N', .name = "notify", required_argument },
|
|
|
|
{ .val = 'O', .name = "open", required_argument },
|
|
|
|
{ .val = 'R', .name = "restrict", no_argument },
|
|
|
|
{ .val = 'S', .name = "bind", required_argument },
|
2021-01-27 05:15:46 +00:00
|
|
|
{ .val = 'T', .name = "timestamp", optional_argument },
|
2020-04-02 18:14:43 +00:00
|
|
|
{ .val = 'a', .name = "sasl-plain", required_argument },
|
|
|
|
{ .val = 'c', .name = "cert", required_argument },
|
|
|
|
{ .val = 'e', .name = "sasl-external", no_argument },
|
|
|
|
{ .val = 'g', .name = "generate", required_argument },
|
|
|
|
{ .val = 'h', .name = "host", required_argument },
|
|
|
|
{ .val = 'i', .name = "ignore", required_argument },
|
|
|
|
{ .val = 'j', .name = "join", required_argument },
|
|
|
|
{ .val = 'k', .name = "priv", required_argument },
|
|
|
|
{ .val = 'l', .name = "log", no_argument },
|
2021-06-18 16:28:09 +00:00
|
|
|
{ .val = 'm', .name = "mode", required_argument },
|
2020-04-02 18:14:43 +00:00
|
|
|
{ .val = 'n', .name = "nick", required_argument },
|
2021-01-10 23:00:41 +00:00
|
|
|
{ .val = 'o', .name = "print-chain", no_argument },
|
2020-04-02 18:14:43 +00:00
|
|
|
{ .val = 'p', .name = "port", required_argument },
|
|
|
|
{ .val = 'r', .name = "real", required_argument },
|
|
|
|
{ .val = 's', .name = "save", required_argument },
|
2021-01-10 00:11:57 +00:00
|
|
|
{ .val = 't', .name = "trust", required_argument },
|
2020-04-02 18:14:43 +00:00
|
|
|
{ .val = 'u', .name = "user", required_argument },
|
|
|
|
{ .val = 'v', .name = "debug", no_argument },
|
|
|
|
{ .val = 'w', .name = "pass", required_argument },
|
2020-02-06 03:49:56 +00:00
|
|
|
{0},
|
|
|
|
};
|
2021-06-13 23:39:23 +00:00
|
|
|
char opts[3 * ARRAY_LEN(options)];
|
2020-04-02 18:14:43 +00:00
|
|
|
for (size_t i = 0, j = 0; i < ARRAY_LEN(options); ++i) {
|
|
|
|
opts[j++] = options[i].val;
|
2021-06-13 23:39:23 +00:00
|
|
|
if (options[i].has_arg != no_argument) opts[j++] = ':';
|
|
|
|
if (options[i].has_arg == optional_argument) opts[j++] = ':';
|
2020-04-02 18:14:43 +00:00
|
|
|
}
|
2020-02-06 03:49:56 +00:00
|
|
|
|
2020-04-02 20:13:23 +00:00
|
|
|
for (int opt; 0 < (opt = getopt_config(argc, argv, opts, options, NULL));) {
|
2020-02-01 06:18:01 +00:00
|
|
|
switch (opt) {
|
|
|
|
break; case '!': insecure = true;
|
2020-02-12 05:48:43 +00:00
|
|
|
break; case 'C': utilPush(&urlCopyUtil, optarg);
|
2021-01-09 22:58:29 +00:00
|
|
|
break; case 'H': parseHash(optarg);
|
2021-01-16 19:04:53 +00:00
|
|
|
break; case 'I': filterAdd(Hot, optarg);
|
2021-01-23 05:03:58 +00:00
|
|
|
break; case 'K': self.kiosk = true;
|
2020-02-13 01:12:34 +00:00
|
|
|
break; case 'N': utilPush(&uiNotifyUtil, optarg);
|
2020-02-12 05:48:43 +00:00
|
|
|
break; case 'O': utilPush(&urlOpenUtil, optarg);
|
2020-02-12 03:39:29 +00:00
|
|
|
break; case 'R': self.restricted = true;
|
2020-02-12 01:02:37 +00:00
|
|
|
break; case 'S': bind = optarg;
|
2021-01-27 19:18:20 +00:00
|
|
|
break; case 'T': {
|
|
|
|
uiTime.enable = true;
|
|
|
|
if (optarg) uiTime.format = optarg;
|
|
|
|
}
|
2020-02-01 06:18:01 +00:00
|
|
|
break; case 'a': sasl = true; self.plain = optarg;
|
|
|
|
break; case 'c': cert = optarg;
|
|
|
|
break; case 'e': sasl = true;
|
2020-02-13 06:39:25 +00:00
|
|
|
break; case 'g': genCert(optarg);
|
2020-02-01 06:18:01 +00:00
|
|
|
break; case 'h': host = optarg;
|
2021-01-16 18:30:59 +00:00
|
|
|
break; case 'i': filterAdd(Ice, optarg);
|
2020-02-01 06:18:01 +00:00
|
|
|
break; case 'j': self.join = optarg;
|
|
|
|
break; case 'k': priv = optarg;
|
2021-06-24 20:58:28 +00:00
|
|
|
break; case 'l': log = true; logOpen();
|
2021-06-18 16:28:09 +00:00
|
|
|
break; case 'm': self.mode = optarg;
|
2020-02-01 06:18:01 +00:00
|
|
|
break; case 'n': nick = optarg;
|
2021-01-10 23:00:41 +00:00
|
|
|
break; case 'o': insecure = true; printCert = true;
|
2020-02-01 06:18:01 +00:00
|
|
|
break; case 'p': port = optarg;
|
|
|
|
break; case 'r': real = optarg;
|
2020-02-11 00:40:13 +00:00
|
|
|
break; case 's': save = optarg;
|
2021-01-10 00:11:57 +00:00
|
|
|
break; case 't': trust = optarg;
|
2020-02-01 06:18:01 +00:00
|
|
|
break; case 'u': user = optarg;
|
2020-02-01 07:26:35 +00:00
|
|
|
break; case 'v': self.debug = true;
|
2020-02-01 06:18:01 +00:00
|
|
|
break; case 'w': pass = optarg;
|
2020-02-06 03:51:45 +00:00
|
|
|
break; default: return EX_USAGE;
|
2020-02-01 06:18:01 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!host) errx(EX_USAGE, "host required");
|
|
|
|
|
2021-06-07 23:40:39 +00:00
|
|
|
if (printCert) {
|
2021-06-10 01:32:10 +00:00
|
|
|
ircConfig(insecure, trust, cert, priv);
|
2021-06-07 23:40:39 +00:00
|
|
|
#ifdef __OpenBSD__
|
2021-06-10 01:32:11 +00:00
|
|
|
int error = pledge("stdio inet dns", NULL);
|
2021-06-07 23:40:39 +00:00
|
|
|
if (error) err(EX_OSERR, "pledge");
|
|
|
|
#endif
|
|
|
|
ircConnect(bind, host, port);
|
|
|
|
ircPrintCert();
|
|
|
|
ircClose();
|
|
|
|
return EX_OK;
|
|
|
|
}
|
|
|
|
|
2020-02-01 06:18:01 +00:00
|
|
|
if (!nick) nick = getenv("USER");
|
|
|
|
if (!nick) errx(EX_CONFIG, "USER unset");
|
|
|
|
if (!user) user = nick;
|
|
|
|
if (!real) real = nick;
|
|
|
|
|
2021-05-27 15:45:47 +00:00
|
|
|
if (self.kiosk) {
|
|
|
|
char *hash;
|
2021-06-06 14:24:22 +00:00
|
|
|
int n = asprintf(&hash, "%08" PRIx32, _hash(user));
|
2021-05-27 15:45:47 +00:00
|
|
|
if (n < 0) err(EX_OSERR, "asprintf");
|
|
|
|
user = hash;
|
|
|
|
}
|
|
|
|
|
2020-02-17 04:05:43 +00:00
|
|
|
// Modes defined in RFC 1459:
|
2020-02-15 09:54:53 +00:00
|
|
|
set(&network.chanTypes, "#&");
|
|
|
|
set(&network.prefixes, "@+");
|
2020-02-16 03:59:04 +00:00
|
|
|
set(&network.prefixModes, "ov");
|
|
|
|
set(&network.listModes, "b");
|
|
|
|
set(&network.paramModes, "k");
|
|
|
|
set(&network.setParamModes, "l");
|
|
|
|
set(&network.channelModes, "imnpst");
|
2020-02-17 04:05:43 +00:00
|
|
|
|
|
|
|
set(&network.name, host);
|
2020-02-11 22:52:55 +00:00
|
|
|
set(&self.nick, "*");
|
2020-03-30 18:56:26 +00:00
|
|
|
|
|
|
|
editCompleteAdd();
|
|
|
|
commandCompleteAdd();
|
2020-02-02 22:37:36 +00:00
|
|
|
|
2021-06-07 23:40:40 +00:00
|
|
|
ircConfig(insecure, trust, cert, priv);
|
|
|
|
|
|
|
|
uiInitEarly();
|
2021-06-20 18:50:40 +00:00
|
|
|
sig_t cursesWinch = signal(SIGWINCH, signalHandler);
|
2021-06-11 12:30:56 +00:00
|
|
|
if (save) {
|
|
|
|
uiLoad(save);
|
|
|
|
atexit(exitSave);
|
|
|
|
}
|
2021-06-07 23:40:40 +00:00
|
|
|
|
2021-01-11 00:23:01 +00:00
|
|
|
#ifdef __OpenBSD__
|
2021-06-24 20:58:28 +00:00
|
|
|
if (self.restricted && log) {
|
2021-06-28 13:55:54 +00:00
|
|
|
const char *logdir = dataMkdir("log");
|
2021-06-19 14:57:00 +00:00
|
|
|
int error = unveil(logdir, "wc");
|
|
|
|
if (error) err(EX_OSERR, "unveil");
|
2021-06-10 19:40:45 +00:00
|
|
|
}
|
2021-06-06 23:00:43 +00:00
|
|
|
|
|
|
|
char promises[64] = "stdio tty";
|
2021-06-07 04:09:58 +00:00
|
|
|
char *ptr = &promises[strlen(promises)], *end = &promises[sizeof(promises)];
|
2021-06-24 20:58:28 +00:00
|
|
|
if (log) ptr = seprintf(ptr, end, " wpath cpath");
|
2021-06-07 04:09:58 +00:00
|
|
|
if (!self.restricted) ptr = seprintf(ptr, end, " proc exec");
|
2021-06-06 23:00:43 +00:00
|
|
|
|
2021-06-14 21:37:07 +00:00
|
|
|
char *promisesInitial = ptr;
|
2021-06-06 23:00:43 +00:00
|
|
|
|
2021-06-14 21:37:07 +00:00
|
|
|
ptr = seprintf(ptr, end, " inet dns");
|
2021-06-06 23:00:43 +00:00
|
|
|
int error = pledge(promises, NULL);
|
2021-01-22 21:01:59 +00:00
|
|
|
if (error) err(EX_OSERR, "pledge");
|
2021-01-11 00:23:01 +00:00
|
|
|
#endif
|
|
|
|
|
2020-02-02 08:13:50 +00:00
|
|
|
uiShowID(Network);
|
2020-02-12 00:43:55 +00:00
|
|
|
uiFormat(
|
|
|
|
Network, Cold, NULL,
|
|
|
|
"\3%dcatgirl\3\tis GPLv3 fwee softwawe ^w^ "
|
|
|
|
"code is avaiwable fwom https://git.causal.agency/catgirl",
|
|
|
|
Pink
|
|
|
|
);
|
2020-02-02 08:13:50 +00:00
|
|
|
uiFormat(Network, Cold, NULL, "Traveling...");
|
2020-02-02 00:37:48 +00:00
|
|
|
uiDraw();
|
2020-02-01 06:18:01 +00:00
|
|
|
|
2020-02-12 01:02:37 +00:00
|
|
|
int irc = ircConnect(bind, host, port);
|
2021-01-22 21:02:00 +00:00
|
|
|
|
2021-06-14 13:13:23 +00:00
|
|
|
#ifdef __OpenBSD__
|
2021-06-14 21:37:07 +00:00
|
|
|
*promisesInitial = '\0';
|
|
|
|
error = pledge(promises, NULL);
|
2021-06-14 13:13:23 +00:00
|
|
|
if (error) err(EX_OSERR, "pledge");
|
|
|
|
#endif
|
|
|
|
|
2021-06-24 21:05:12 +00:00
|
|
|
#ifdef __FreeBSD__
|
2021-06-28 13:11:02 +00:00
|
|
|
cap_rights_t rights;
|
|
|
|
caph_stream_rights(&rights, CAPH_WRITE);
|
2021-06-24 22:06:09 +00:00
|
|
|
int error = 0
|
2021-06-28 13:11:02 +00:00
|
|
|
|| caph_limit_stdin()
|
|
|
|
|| caph_rights_limit(STDOUT_FILENO, cap_rights_set(&rights, CAP_IOCTL))
|
|
|
|
|| caph_limit_stderr()
|
|
|
|
|| caph_rights_limit(
|
|
|
|
irc, cap_rights_init(&rights, CAP_SEND, CAP_RECV, CAP_EVENT)
|
|
|
|
);
|
2021-06-24 22:06:09 +00:00
|
|
|
if (error) err(EX_OSERR, "cap_rights_limit");
|
|
|
|
|
2021-06-24 21:05:12 +00:00
|
|
|
if (self.restricted) {
|
2021-06-28 13:11:02 +00:00
|
|
|
// caph_cache_tzdata(3) doesn't load UTC info, which we need for
|
|
|
|
// certificate verification. gmtime(3) does.
|
|
|
|
caph_cache_tzdata();
|
|
|
|
gmtime(&(time_t) { time(NULL) });
|
|
|
|
error = caph_enter();
|
|
|
|
if (error) err(EX_OSERR, "caph_enter");
|
2021-06-24 21:05:12 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2020-02-01 06:18:01 +00:00
|
|
|
if (pass) ircFormat("PASS :%s\r\n", pass);
|
|
|
|
if (sasl) ircFormat("CAP REQ :sasl\r\n");
|
|
|
|
ircFormat("CAP LS\r\n");
|
|
|
|
ircFormat("NICK :%s\r\n", nick);
|
|
|
|
ircFormat("USER %s 0 * :%s\r\n", user, real);
|
2020-02-01 07:26:35 +00:00
|
|
|
|
2020-10-12 23:25:08 +00:00
|
|
|
uiInitLate();
|
2020-02-05 00:02:54 +00:00
|
|
|
signal(SIGHUP, signalHandler);
|
|
|
|
signal(SIGINT, signalHandler);
|
2021-06-15 20:59:24 +00:00
|
|
|
signal(SIGALRM, signalHandler);
|
2020-02-05 00:02:54 +00:00
|
|
|
signal(SIGTERM, signalHandler);
|
2020-02-08 22:22:51 +00:00
|
|
|
signal(SIGCHLD, signalHandler);
|
2020-02-05 00:02:54 +00:00
|
|
|
|
2021-01-23 05:03:58 +00:00
|
|
|
bool pipes = !self.kiosk && !self.restricted;
|
|
|
|
if (pipes) {
|
2021-06-17 22:26:09 +00:00
|
|
|
int error = pipe(utilPipe) || pipe(execPipe);
|
2020-02-14 03:22:11 +00:00
|
|
|
if (error) err(EX_OSERR, "pipe");
|
|
|
|
|
|
|
|
fcntl(utilPipe[0], F_SETFD, FD_CLOEXEC);
|
|
|
|
fcntl(utilPipe[1], F_SETFD, FD_CLOEXEC);
|
|
|
|
fcntl(execPipe[0], F_SETFD, FD_CLOEXEC);
|
|
|
|
fcntl(execPipe[1], F_SETFD, FD_CLOEXEC);
|
|
|
|
}
|
2020-02-09 00:12:05 +00:00
|
|
|
|
2021-06-15 20:59:24 +00:00
|
|
|
bool ping = false;
|
2020-02-14 03:22:11 +00:00
|
|
|
struct pollfd fds[] = {
|
2020-02-04 08:58:56 +00:00
|
|
|
{ .events = POLLIN, .fd = STDIN_FILENO },
|
|
|
|
{ .events = POLLIN, .fd = irc },
|
2020-02-14 02:57:55 +00:00
|
|
|
{ .events = POLLIN, .fd = utilPipe[0] },
|
2020-02-14 03:22:11 +00:00
|
|
|
{ .events = POLLIN, .fd = execPipe[0] },
|
2020-02-04 08:58:56 +00:00
|
|
|
};
|
2020-02-06 02:57:23 +00:00
|
|
|
while (!self.quit) {
|
2021-01-23 05:03:58 +00:00
|
|
|
int nfds = poll(fds, (pipes ? ARRAY_LEN(fds) : 2), -1);
|
2020-02-04 08:58:56 +00:00
|
|
|
if (nfds < 0 && errno != EINTR) err(EX_IOERR, "poll");
|
2020-02-08 22:42:19 +00:00
|
|
|
if (nfds > 0) {
|
|
|
|
if (fds[0].revents) uiRead();
|
|
|
|
if (fds[1].revents) ircRecv();
|
2020-02-14 02:57:55 +00:00
|
|
|
if (fds[2].revents) utilRead();
|
2020-02-14 03:22:11 +00:00
|
|
|
if (fds[3].revents) execRead();
|
2020-02-08 22:42:19 +00:00
|
|
|
}
|
2020-02-04 08:58:56 +00:00
|
|
|
|
2020-02-06 02:57:23 +00:00
|
|
|
if (signals[SIGHUP]) self.quit = "zzz";
|
|
|
|
if (signals[SIGINT] || signals[SIGTERM]) break;
|
2020-02-08 22:22:51 +00:00
|
|
|
|
2021-06-15 20:59:24 +00:00
|
|
|
if (nfds > 0 && fds[1].revents) {
|
|
|
|
ping = false;
|
|
|
|
struct itimerval timer = {
|
|
|
|
.it_value.tv_sec = 2 * 60,
|
|
|
|
.it_interval.tv_sec = 30,
|
|
|
|
};
|
|
|
|
int error = setitimer(ITIMER_REAL, &timer, NULL);
|
|
|
|
if (error) err(EX_OSERR, "setitimer");
|
|
|
|
}
|
|
|
|
if (signals[SIGALRM]) {
|
|
|
|
signals[SIGALRM] = 0;
|
|
|
|
if (ping) {
|
|
|
|
errx(EX_UNAVAILABLE, "ping timeout");
|
|
|
|
} else {
|
|
|
|
ircFormat("PING nyaa\r\n");
|
|
|
|
ping = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-08 22:22:51 +00:00
|
|
|
if (signals[SIGCHLD]) {
|
2020-02-09 19:09:27 +00:00
|
|
|
signals[SIGCHLD] = 0;
|
2020-03-30 23:44:45 +00:00
|
|
|
for (int status; 0 < waitpid(-1, &status, WNOHANG);) {
|
2020-02-08 22:22:51 +00:00
|
|
|
if (WIFEXITED(status) && WEXITSTATUS(status)) {
|
|
|
|
uiFormat(
|
|
|
|
Network, Warm, NULL,
|
|
|
|
"Process exits with status %d", WEXITSTATUS(status)
|
|
|
|
);
|
|
|
|
} else if (WIFSIGNALED(status)) {
|
|
|
|
uiFormat(
|
|
|
|
Network, Warm, NULL,
|
|
|
|
"Process terminates from %s",
|
|
|
|
strsignal(WTERMSIG(status))
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
2020-02-09 19:09:27 +00:00
|
|
|
uiShow();
|
2020-02-08 22:22:51 +00:00
|
|
|
}
|
|
|
|
|
2020-02-05 00:02:54 +00:00
|
|
|
if (signals[SIGWINCH]) {
|
|
|
|
signals[SIGWINCH] = 0;
|
|
|
|
cursesWinch(SIGWINCH);
|
2021-06-21 22:26:32 +00:00
|
|
|
// doupdate(3) needs to be called for KEY_RESIZE to be picked up.
|
2020-02-05 22:58:49 +00:00
|
|
|
uiDraw();
|
2020-02-05 00:06:54 +00:00
|
|
|
uiRead();
|
2020-02-05 00:02:54 +00:00
|
|
|
}
|
|
|
|
|
2020-02-02 00:37:48 +00:00
|
|
|
uiDraw();
|
2020-02-01 07:26:35 +00:00
|
|
|
}
|
2020-02-05 00:02:54 +00:00
|
|
|
|
2020-02-06 02:57:23 +00:00
|
|
|
if (self.quit) {
|
|
|
|
ircFormat("QUIT :%s\r\n", self.quit);
|
|
|
|
} else {
|
|
|
|
ircFormat("QUIT\r\n");
|
|
|
|
}
|
2020-02-11 01:06:25 +00:00
|
|
|
struct Message msg = {
|
|
|
|
.nick = self.nick,
|
|
|
|
.user = self.user,
|
|
|
|
.cmd = "QUIT",
|
|
|
|
.params[0] = self.quit,
|
|
|
|
};
|
2020-06-24 17:36:24 +00:00
|
|
|
handle(&msg);
|
2020-02-11 01:06:25 +00:00
|
|
|
|
2020-02-13 06:01:23 +00:00
|
|
|
ircClose();
|
2020-03-25 22:56:09 +00:00
|
|
|
logClose();
|
2020-02-05 00:02:54 +00:00
|
|
|
uiHide();
|
2020-02-01 06:18:01 +00:00
|
|
|
}
|