2020-10-24 13:15:32 -06:00
|
|
|
package gemini
|
2020-09-25 17:06:56 -06:00
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
|
|
|
"crypto/tls"
|
2020-09-27 23:10:36 -06:00
|
|
|
"crypto/x509"
|
2020-09-25 17:06:56 -06:00
|
|
|
"log"
|
|
|
|
"net"
|
|
|
|
"net/url"
|
2020-09-28 01:15:19 -06:00
|
|
|
"path"
|
2020-09-25 17:06:56 -06:00
|
|
|
"sort"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
2020-09-28 01:15:19 -06:00
|
|
|
"sync"
|
2020-09-25 17:06:56 -06:00
|
|
|
"time"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Server is a Gemini server.
|
|
|
|
type Server struct {
|
|
|
|
// Addr specifies the address that the server should listen on.
|
|
|
|
// If Addr is empty, the server will listen on the address ":1965".
|
|
|
|
Addr string
|
|
|
|
|
2020-10-11 21:48:18 -06:00
|
|
|
// CertificateStore contains the certificates used by the server.
|
|
|
|
CertificateStore CertificateStore
|
|
|
|
|
|
|
|
// GetCertificate, if not nil, will be called to retrieve the certificate
|
|
|
|
// to use for a given hostname.
|
|
|
|
// If the certificate is nil, the connection will be aborted.
|
2020-10-13 12:22:15 -06:00
|
|
|
GetCertificate func(hostname string, store *CertificateStore) *tls.Certificate
|
2020-09-25 17:06:56 -06:00
|
|
|
|
2020-10-21 14:28:50 -06:00
|
|
|
// registered responders
|
|
|
|
responders map[responderKey]Responder
|
2020-10-11 15:53:22 -06:00
|
|
|
}
|
|
|
|
|
2020-10-21 14:28:50 -06:00
|
|
|
type responderKey struct {
|
2020-10-21 11:22:26 -06:00
|
|
|
scheme string
|
|
|
|
hostname string
|
|
|
|
wildcard bool
|
2020-10-12 11:50:07 -06:00
|
|
|
}
|
|
|
|
|
2020-10-21 14:28:50 -06:00
|
|
|
// Register registers a responder for the given pattern.
|
2020-10-21 11:22:26 -06:00
|
|
|
// Patterns must be in the form of scheme://hostname (e.g. gemini://example.com).
|
|
|
|
// If no scheme is specified, a default scheme of gemini:// is assumed.
|
|
|
|
// Wildcard patterns are supported (e.g. *.example.com).
|
2020-10-21 14:28:50 -06:00
|
|
|
func (s *Server) Register(pattern string, responder Responder) {
|
2020-10-21 11:22:26 -06:00
|
|
|
if pattern == "" {
|
2020-10-24 13:15:32 -06:00
|
|
|
panic("gemini: invalid pattern")
|
2020-10-11 16:57:04 -06:00
|
|
|
}
|
2020-10-21 14:28:50 -06:00
|
|
|
if responder == nil {
|
2020-10-24 13:15:32 -06:00
|
|
|
panic("gemini: nil responder")
|
2020-10-11 16:57:04 -06:00
|
|
|
}
|
2020-10-21 14:28:50 -06:00
|
|
|
if s.responders == nil {
|
|
|
|
s.responders = map[responderKey]Responder{}
|
2020-10-12 11:50:07 -06:00
|
|
|
}
|
|
|
|
|
2020-10-21 11:22:26 -06:00
|
|
|
split := strings.SplitN(pattern, "://", 2)
|
2020-10-21 14:28:50 -06:00
|
|
|
var key responderKey
|
2020-10-21 11:22:26 -06:00
|
|
|
if len(split) == 2 {
|
|
|
|
key.scheme = split[0]
|
|
|
|
key.hostname = split[1]
|
|
|
|
} else {
|
|
|
|
key.scheme = "gemini"
|
|
|
|
key.hostname = split[0]
|
|
|
|
}
|
|
|
|
split = strings.SplitN(key.hostname, ".", 2)
|
2020-10-21 14:04:19 -06:00
|
|
|
if len(split) == 2 && split[0] == "*" {
|
|
|
|
key.hostname = split[1]
|
|
|
|
key.wildcard = true
|
2020-10-21 11:22:26 -06:00
|
|
|
}
|
2020-10-11 15:53:22 -06:00
|
|
|
|
2020-10-21 14:28:50 -06:00
|
|
|
s.responders[key] = responder
|
2020-10-11 15:53:22 -06:00
|
|
|
}
|
|
|
|
|
2020-10-21 14:28:50 -06:00
|
|
|
// RegisterFunc registers a responder function for the given pattern.
|
|
|
|
func (s *Server) RegisterFunc(pattern string, responder func(*ResponseWriter, *Request)) {
|
|
|
|
s.Register(pattern, ResponderFunc(responder))
|
2020-09-25 17:06:56 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// ListenAndServe listens for requests at the server's configured address.
|
|
|
|
func (s *Server) ListenAndServe() error {
|
|
|
|
addr := s.Addr
|
|
|
|
if addr == "" {
|
|
|
|
addr = ":1965"
|
|
|
|
}
|
|
|
|
|
|
|
|
ln, err := net.Listen("tcp", addr)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer ln.Close()
|
|
|
|
|
|
|
|
config := &tls.Config{
|
2020-10-13 14:44:46 -06:00
|
|
|
ClientAuth: tls.RequestClientCert,
|
|
|
|
MinVersion: tls.VersionTLS12,
|
2020-10-11 21:48:18 -06:00
|
|
|
GetCertificate: func(h *tls.ClientHelloInfo) (*tls.Certificate, error) {
|
|
|
|
if s.GetCertificate != nil {
|
2020-10-13 12:22:15 -06:00
|
|
|
return s.GetCertificate(h.ServerName, &s.CertificateStore), nil
|
2020-10-11 21:48:18 -06:00
|
|
|
}
|
|
|
|
return s.CertificateStore.Lookup(h.ServerName)
|
|
|
|
},
|
2020-09-25 17:06:56 -06:00
|
|
|
}
|
|
|
|
tlsListener := tls.NewListener(ln, config)
|
|
|
|
return s.Serve(tlsListener)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Serve listens for requests on the provided listener.
|
|
|
|
func (s *Server) Serve(l net.Listener) error {
|
|
|
|
var tempDelay time.Duration // how long to sleep on accept failure
|
|
|
|
|
|
|
|
for {
|
|
|
|
rw, err := l.Accept()
|
|
|
|
if err != nil {
|
|
|
|
// If this is a temporary error, sleep
|
|
|
|
if ne, ok := err.(net.Error); ok && ne.Temporary() {
|
|
|
|
if tempDelay == 0 {
|
|
|
|
tempDelay = 5 * time.Millisecond
|
|
|
|
} else {
|
|
|
|
tempDelay *= 2
|
|
|
|
}
|
|
|
|
if max := 1 * time.Second; tempDelay > max {
|
|
|
|
tempDelay = max
|
|
|
|
}
|
2020-10-24 13:15:32 -06:00
|
|
|
log.Printf("gemini: Accept error: %v; retrying in %v", err, tempDelay)
|
2020-09-25 17:06:56 -06:00
|
|
|
time.Sleep(tempDelay)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise, return the error
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
tempDelay = 0
|
|
|
|
go s.respond(rw)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-10-21 14:28:50 -06:00
|
|
|
// respond responds to a connection.
|
|
|
|
func (s *Server) respond(conn net.Conn) {
|
|
|
|
r := bufio.NewReader(conn)
|
|
|
|
w := newResponseWriter(conn)
|
|
|
|
// Read requested URL
|
|
|
|
rawurl, err := r.ReadString('\r')
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Read terminating line feed
|
|
|
|
if b, err := r.ReadByte(); err != nil {
|
|
|
|
return
|
|
|
|
} else if b != '\n' {
|
|
|
|
w.WriteHeader(StatusBadRequest, "Bad request")
|
|
|
|
}
|
|
|
|
// Trim carriage return
|
|
|
|
rawurl = rawurl[:len(rawurl)-1]
|
|
|
|
// Ensure URL is valid
|
|
|
|
if len(rawurl) > 1024 {
|
|
|
|
w.WriteHeader(StatusBadRequest, "Bad request")
|
|
|
|
} else if url, err := url.Parse(rawurl); err != nil || url.User != nil {
|
|
|
|
// Note that we return an error status if User is specified in the URL
|
|
|
|
w.WriteHeader(StatusBadRequest, "Bad request")
|
|
|
|
} else {
|
|
|
|
// If no scheme is specified, assume a default scheme of gemini://
|
|
|
|
if url.Scheme == "" {
|
|
|
|
url.Scheme = "gemini"
|
|
|
|
}
|
|
|
|
req := &Request{
|
|
|
|
URL: url,
|
|
|
|
RemoteAddr: conn.RemoteAddr(),
|
|
|
|
TLS: conn.(*tls.Conn).ConnectionState(),
|
|
|
|
}
|
|
|
|
s.responder(req).Respond(w, req)
|
|
|
|
}
|
|
|
|
w.b.Flush()
|
|
|
|
conn.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Server) responder(r *Request) Responder {
|
|
|
|
if h, ok := s.responders[responderKey{r.URL.Scheme, r.URL.Hostname(), false}]; ok {
|
|
|
|
return h
|
|
|
|
}
|
|
|
|
wildcard := strings.SplitN(r.URL.Hostname(), ".", 2)
|
|
|
|
if len(wildcard) == 2 {
|
|
|
|
if h, ok := s.responders[responderKey{r.URL.Scheme, wildcard[1], true}]; ok {
|
|
|
|
return h
|
|
|
|
}
|
|
|
|
}
|
2020-10-21 15:34:07 -06:00
|
|
|
return ResponderFunc(NotFound)
|
2020-10-21 14:28:50 -06:00
|
|
|
}
|
|
|
|
|
2020-09-25 17:06:56 -06:00
|
|
|
// ResponseWriter is used by a Gemini handler to construct a Gemini response.
|
|
|
|
type ResponseWriter struct {
|
2020-10-13 19:00:07 -06:00
|
|
|
b *bufio.Writer
|
2020-09-25 17:06:56 -06:00
|
|
|
bodyAllowed bool
|
2020-09-27 19:53:58 -06:00
|
|
|
wroteHeader bool
|
|
|
|
mimetype string
|
2020-09-25 17:06:56 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func newResponseWriter(conn net.Conn) *ResponseWriter {
|
|
|
|
return &ResponseWriter{
|
2020-10-13 19:00:07 -06:00
|
|
|
b: bufio.NewWriter(conn),
|
2020-09-25 17:06:56 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// WriteHeader writes the response header.
|
2020-09-27 19:53:58 -06:00
|
|
|
// If the header has already been written, WriteHeader does nothing.
|
2020-09-25 17:06:56 -06:00
|
|
|
//
|
|
|
|
// Meta contains more information related to the response status.
|
|
|
|
// For successful responses, Meta should contain the mimetype of the response.
|
|
|
|
// For failure responses, Meta should contain a short description of the failure.
|
|
|
|
// Meta should not be longer than 1024 bytes.
|
2020-10-13 19:00:07 -06:00
|
|
|
func (w *ResponseWriter) WriteHeader(status int, meta string) {
|
|
|
|
if w.wroteHeader {
|
2020-09-27 19:53:58 -06:00
|
|
|
return
|
|
|
|
}
|
2020-10-13 19:00:07 -06:00
|
|
|
w.b.WriteString(strconv.Itoa(status))
|
|
|
|
w.b.WriteByte(' ')
|
|
|
|
w.b.WriteString(meta)
|
|
|
|
w.b.Write(crlf)
|
2020-09-25 17:06:56 -06:00
|
|
|
|
|
|
|
// Only allow body to be written on successful status codes.
|
|
|
|
if status/10 == StatusClassSuccess {
|
2020-10-13 19:00:07 -06:00
|
|
|
w.bodyAllowed = true
|
2020-09-25 17:06:56 -06:00
|
|
|
}
|
2020-10-13 19:00:07 -06:00
|
|
|
w.wroteHeader = true
|
2020-09-27 19:53:58 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// SetMimetype sets the mimetype that will be written for a successful response.
|
|
|
|
// The provided mimetype will only be used if Write is called without calling
|
|
|
|
// WriteHeader.
|
|
|
|
// If the mimetype is not set, it will default to "text/gemini".
|
2020-10-13 19:00:07 -06:00
|
|
|
func (w *ResponseWriter) SetMimetype(mimetype string) {
|
|
|
|
w.mimetype = mimetype
|
2020-09-25 17:06:56 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// Write writes the response body.
|
|
|
|
// If the response status does not allow for a response body, Write returns
|
|
|
|
// ErrBodyNotAllowed.
|
2020-09-27 19:53:58 -06:00
|
|
|
//
|
|
|
|
// If WriteHeader has not yet been called, Write calls
|
|
|
|
// WriteHeader(StatusSuccess, mimetype) where mimetype is the mimetype set in
|
|
|
|
// SetMimetype. If no mimetype is set, a default of "text/gemini" will be used.
|
2020-10-13 19:00:07 -06:00
|
|
|
func (w *ResponseWriter) Write(b []byte) (int, error) {
|
|
|
|
if !w.wroteHeader {
|
|
|
|
mimetype := w.mimetype
|
2020-09-27 20:03:09 -06:00
|
|
|
if mimetype == "" {
|
|
|
|
mimetype = "text/gemini"
|
2020-09-27 19:53:58 -06:00
|
|
|
}
|
2020-10-13 19:00:07 -06:00
|
|
|
w.WriteHeader(StatusSuccess, mimetype)
|
2020-09-27 19:53:58 -06:00
|
|
|
}
|
2020-10-13 19:00:07 -06:00
|
|
|
if !w.bodyAllowed {
|
2020-09-25 17:06:56 -06:00
|
|
|
return 0, ErrBodyNotAllowed
|
|
|
|
}
|
2020-10-13 19:00:07 -06:00
|
|
|
return w.b.Write(b)
|
2020-09-25 17:06:56 -06:00
|
|
|
}
|
|
|
|
|
2020-10-21 14:28:50 -06:00
|
|
|
// A Responder responds to a Gemini request.
|
|
|
|
type Responder interface {
|
|
|
|
// Respond accepts a Request and constructs a Response.
|
|
|
|
Respond(*ResponseWriter, *Request)
|
2020-09-25 17:06:56 -06:00
|
|
|
}
|
|
|
|
|
2020-10-21 15:34:07 -06:00
|
|
|
// Input returns the request query.
|
|
|
|
// If no input is provided, it responds with StatusInput.
|
|
|
|
func Input(w *ResponseWriter, r *Request, prompt string) (string, bool) {
|
|
|
|
if r.URL.ForceQuery || r.URL.RawQuery != "" {
|
|
|
|
return r.URL.RawQuery, true
|
2020-09-28 00:05:37 -06:00
|
|
|
}
|
2020-10-21 15:34:07 -06:00
|
|
|
w.WriteHeader(StatusInput, prompt)
|
|
|
|
return "", false
|
2020-09-28 00:05:37 -06:00
|
|
|
}
|
|
|
|
|
2020-10-21 15:34:07 -06:00
|
|
|
// SensitiveInput returns the request query.
|
|
|
|
// If no input is provided, it responds with StatusSensitiveInput.
|
|
|
|
func SensitiveInput(w *ResponseWriter, r *Request, prompt string) (string, bool) {
|
|
|
|
if r.URL.ForceQuery || r.URL.RawQuery != "" {
|
|
|
|
return r.URL.RawQuery, true
|
2020-09-28 00:05:37 -06:00
|
|
|
}
|
2020-10-24 13:15:32 -06:00
|
|
|
w.WriteHeader(StatusSensitiveInput, prompt)
|
2020-10-21 15:34:07 -06:00
|
|
|
return "", false
|
2020-09-28 00:05:37 -06:00
|
|
|
}
|
|
|
|
|
2020-09-27 20:13:50 -06:00
|
|
|
// Redirect replies to the request with a redirect to the given URL.
|
2020-10-13 18:22:12 -06:00
|
|
|
func Redirect(w *ResponseWriter, r *Request, url string) {
|
|
|
|
w.WriteHeader(StatusRedirect, url)
|
2020-09-27 18:52:24 -06:00
|
|
|
}
|
|
|
|
|
2020-09-27 20:06:08 -06:00
|
|
|
// PermanentRedirect replies to the request with a permanent redirect to the given URL.
|
2020-10-13 18:22:12 -06:00
|
|
|
func PermanentRedirect(w *ResponseWriter, r *Request, url string) {
|
|
|
|
w.WriteHeader(StatusRedirectPermanent, url)
|
2020-09-27 18:52:24 -06:00
|
|
|
}
|
|
|
|
|
2020-09-27 20:06:08 -06:00
|
|
|
// NotFound replies to the request with the NotFound status code.
|
2020-10-13 18:22:12 -06:00
|
|
|
func NotFound(w *ResponseWriter, r *Request) {
|
|
|
|
w.WriteHeader(StatusNotFound, "Not found")
|
2020-09-27 20:06:08 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// Gone replies to the request with the Gone status code.
|
2020-10-13 18:22:12 -06:00
|
|
|
func Gone(w *ResponseWriter, r *Request) {
|
|
|
|
w.WriteHeader(StatusGone, "Gone")
|
2020-09-27 20:06:08 -06:00
|
|
|
}
|
|
|
|
|
2020-09-28 00:05:37 -06:00
|
|
|
// CertificateRequired responds to the request with the CertificateRequired
|
|
|
|
// status code.
|
2020-10-13 18:22:12 -06:00
|
|
|
func CertificateRequired(w *ResponseWriter, r *Request) {
|
|
|
|
w.WriteHeader(StatusCertificateRequired, "Certificate required")
|
2020-09-28 00:05:37 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// CertificateNotAuthorized responds to the request with
|
|
|
|
// the CertificateNotAuthorized status code.
|
2020-10-13 18:22:12 -06:00
|
|
|
func CertificateNotAuthorized(w *ResponseWriter, r *Request) {
|
|
|
|
w.WriteHeader(StatusCertificateNotAuthorized, "Certificate not authorized")
|
2020-09-28 00:05:37 -06:00
|
|
|
}
|
|
|
|
|
2020-10-21 15:47:34 -06:00
|
|
|
// Certificate returns the request certificate. If one is not provided,
|
|
|
|
// it returns nil and responds with StatusCertificateRequired.
|
|
|
|
func Certificate(w *ResponseWriter, r *Request) (*x509.Certificate, bool) {
|
2020-10-13 18:22:12 -06:00
|
|
|
if len(r.TLS.PeerCertificates) == 0 {
|
|
|
|
CertificateRequired(w, r)
|
2020-10-21 15:47:34 -06:00
|
|
|
return nil, false
|
2020-09-27 23:10:36 -06:00
|
|
|
}
|
2020-10-21 15:47:34 -06:00
|
|
|
return r.TLS.PeerCertificates[0], true
|
2020-09-27 23:10:36 -06:00
|
|
|
}
|
|
|
|
|
2020-10-21 14:28:50 -06:00
|
|
|
// ResponderFunc is a wrapper around a bare function that implements Handler.
|
|
|
|
type ResponderFunc func(*ResponseWriter, *Request)
|
2020-09-25 17:06:56 -06:00
|
|
|
|
2020-10-21 14:28:50 -06:00
|
|
|
func (f ResponderFunc) Respond(w *ResponseWriter, r *Request) {
|
2020-10-13 18:22:12 -06:00
|
|
|
f(w, r)
|
2020-09-25 17:06:56 -06:00
|
|
|
}
|
2020-09-26 14:38:26 -06:00
|
|
|
|
2020-09-28 01:15:19 -06:00
|
|
|
// The following code is modified from the net/http package.
|
|
|
|
|
2020-10-13 18:36:47 -06:00
|
|
|
// Copyright 2009 The Go Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2020-09-28 01:15:19 -06:00
|
|
|
// ServeMux is a Gemini request multiplexer.
|
|
|
|
// It matches the URL of each incoming request against a list of registered
|
|
|
|
// patterns and calls the handler for the pattern that
|
|
|
|
// most closely matches the URL.
|
|
|
|
//
|
|
|
|
// Patterns name fixed, rooted paths, like "/favicon.ico",
|
|
|
|
// or rooted subtrees, like "/images/" (note the trailing slash).
|
|
|
|
// Longer patterns take precedence over shorter ones, so that
|
|
|
|
// if there are handlers registered for both "/images/"
|
|
|
|
// and "/images/thumbnails/", the latter handler will be
|
|
|
|
// called for paths beginning "/images/thumbnails/" and the
|
|
|
|
// former will receive requests for any other paths in the
|
|
|
|
// "/images/" subtree.
|
|
|
|
//
|
|
|
|
// Note that since a pattern ending in a slash names a rooted subtree,
|
|
|
|
// the pattern "/" matches all paths not matched by other registered
|
|
|
|
// patterns, not just the URL with Path == "/".
|
|
|
|
//
|
|
|
|
// If a subtree has been registered and a request is received naming the
|
|
|
|
// subtree root without its trailing slash, ServeMux redirects that
|
|
|
|
// request to the subtree root (adding the trailing slash). This behavior can
|
|
|
|
// be overridden with a separate registration for the path without
|
|
|
|
// the trailing slash. For example, registering "/images/" causes ServeMux
|
|
|
|
// to redirect a request for "/images" to "/images/", unless "/images" has
|
|
|
|
// been registered separately.
|
|
|
|
//
|
2020-10-11 16:57:04 -06:00
|
|
|
// ServeMux also takes care of sanitizing the URL request path and
|
|
|
|
// redirecting any request containing . or .. elements or repeated slashes
|
|
|
|
// to an equivalent, cleaner URL.
|
2020-09-28 01:15:19 -06:00
|
|
|
type ServeMux struct {
|
2020-10-11 15:53:22 -06:00
|
|
|
mu sync.RWMutex
|
|
|
|
m map[string]muxEntry
|
|
|
|
es []muxEntry // slice of entries sorted from longest to shortest.
|
2020-09-28 01:15:19 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
type muxEntry struct {
|
2020-10-21 15:07:28 -06:00
|
|
|
r Responder
|
2020-09-28 01:15:19 -06:00
|
|
|
pattern string
|
|
|
|
}
|
|
|
|
|
|
|
|
// cleanPath returns the canonical path for p, eliminating . and .. elements.
|
|
|
|
func cleanPath(p string) string {
|
|
|
|
if p == "" {
|
|
|
|
return "/"
|
|
|
|
}
|
|
|
|
if p[0] != '/' {
|
|
|
|
p = "/" + p
|
|
|
|
}
|
|
|
|
np := path.Clean(p)
|
|
|
|
// path.Clean removes trailing slash except for root;
|
|
|
|
// put the trailing slash back if necessary.
|
|
|
|
if p[len(p)-1] == '/' && np != "/" {
|
|
|
|
// Fast path for common case of p being the string we want:
|
|
|
|
if len(p) == len(np)+1 && strings.HasPrefix(p, np) {
|
|
|
|
np = p
|
|
|
|
} else {
|
|
|
|
np += "/"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return np
|
|
|
|
}
|
|
|
|
|
|
|
|
// Find a handler on a handler map given a path string.
|
|
|
|
// Most-specific (longest) pattern wins.
|
2020-10-21 15:07:28 -06:00
|
|
|
func (mux *ServeMux) match(path string) Responder {
|
2020-09-28 01:15:19 -06:00
|
|
|
// Check for exact match first.
|
2020-09-28 14:02:32 -06:00
|
|
|
v, ok := mux.m[path]
|
2020-09-28 01:15:19 -06:00
|
|
|
if ok {
|
2020-10-21 15:07:28 -06:00
|
|
|
return v.r
|
2020-09-28 01:15:19 -06:00
|
|
|
}
|
|
|
|
|
2020-09-28 14:02:32 -06:00
|
|
|
// Check for longest valid match. mux.es contains all patterns
|
2020-09-28 01:15:19 -06:00
|
|
|
// that end in / sorted from longest to shortest.
|
|
|
|
for _, e := range mux.es {
|
2020-09-28 14:02:32 -06:00
|
|
|
if strings.HasPrefix(path, e.pattern) {
|
2020-10-21 15:07:28 -06:00
|
|
|
return e.r
|
2020-09-28 01:15:19 -06:00
|
|
|
}
|
|
|
|
}
|
2020-10-21 15:07:28 -06:00
|
|
|
return nil
|
2020-09-28 01:15:19 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// redirectToPathSlash determines if the given path needs appending "/" to it.
|
|
|
|
// This occurs when a handler for path + "/" was already registered, but
|
|
|
|
// not for path itself. If the path needs appending to, it creates a new
|
|
|
|
// URL, setting the path to u.Path + "/" and returning true to indicate so.
|
2020-10-11 15:53:22 -06:00
|
|
|
func (mux *ServeMux) redirectToPathSlash(path string, u *url.URL) (*url.URL, bool) {
|
2020-09-28 01:15:19 -06:00
|
|
|
mux.mu.RLock()
|
2020-10-11 15:53:22 -06:00
|
|
|
shouldRedirect := mux.shouldRedirectRLocked(path)
|
2020-09-28 01:15:19 -06:00
|
|
|
mux.mu.RUnlock()
|
|
|
|
if !shouldRedirect {
|
|
|
|
return u, false
|
|
|
|
}
|
|
|
|
path = path + "/"
|
|
|
|
u = &url.URL{Path: path, RawQuery: u.RawQuery}
|
|
|
|
return u, true
|
|
|
|
}
|
|
|
|
|
|
|
|
// shouldRedirectRLocked reports whether the given path and host should be redirected to
|
|
|
|
// path+"/". This should happen if a handler is registered for path+"/" but
|
|
|
|
// not path -- see comments at ServeMux.
|
2020-10-11 15:53:22 -06:00
|
|
|
func (mux *ServeMux) shouldRedirectRLocked(path string) bool {
|
|
|
|
if _, exist := mux.m[path]; exist {
|
|
|
|
return false
|
2020-09-28 01:15:19 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
n := len(path)
|
|
|
|
if n == 0 {
|
|
|
|
return false
|
|
|
|
}
|
2020-10-11 15:53:22 -06:00
|
|
|
if _, exist := mux.m[path+"/"]; exist {
|
|
|
|
return path[n-1] != '/'
|
2020-09-28 01:15:19 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2020-10-21 15:07:28 -06:00
|
|
|
// Respond dispatches the request to the responder whose
|
|
|
|
// pattern most closely matches the request URL.
|
|
|
|
func (mux *ServeMux) Respond(w *ResponseWriter, r *Request) {
|
2020-09-28 14:02:32 -06:00
|
|
|
path := cleanPath(r.URL.Path)
|
2020-09-28 01:15:19 -06:00
|
|
|
|
|
|
|
// If the given path is /tree and its handler is not registered,
|
|
|
|
// redirect for /tree/.
|
2020-10-11 15:53:22 -06:00
|
|
|
if u, ok := mux.redirectToPathSlash(path, r.URL); ok {
|
2020-10-21 15:07:28 -06:00
|
|
|
Redirect(w, r, u.String())
|
|
|
|
return
|
2020-09-28 01:15:19 -06:00
|
|
|
}
|
|
|
|
|
2020-09-28 14:02:32 -06:00
|
|
|
if path != r.URL.Path {
|
2020-10-21 15:07:28 -06:00
|
|
|
u := *r.URL
|
|
|
|
u.Path = path
|
|
|
|
Redirect(w, r, u.String())
|
|
|
|
return
|
2020-09-28 01:15:19 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
mux.mu.RLock()
|
|
|
|
defer mux.mu.RUnlock()
|
|
|
|
|
2020-10-21 15:07:28 -06:00
|
|
|
resp := mux.match(path)
|
|
|
|
if resp == nil {
|
|
|
|
NotFound(w, r)
|
|
|
|
return
|
2020-09-28 01:15:19 -06:00
|
|
|
}
|
2020-10-21 15:07:28 -06:00
|
|
|
resp.Respond(w, r)
|
2020-09-28 01:15:19 -06:00
|
|
|
}
|
|
|
|
|
2020-10-21 15:07:28 -06:00
|
|
|
// Handle registers the responder for the given pattern.
|
|
|
|
// If a responder already exists for pattern, Handle panics.
|
|
|
|
func (mux *ServeMux) Handle(pattern string, responder Responder) {
|
2020-09-28 01:15:19 -06:00
|
|
|
mux.mu.Lock()
|
|
|
|
defer mux.mu.Unlock()
|
|
|
|
|
|
|
|
if pattern == "" {
|
2020-10-24 13:15:32 -06:00
|
|
|
panic("gemini: invalid pattern")
|
2020-09-28 01:15:19 -06:00
|
|
|
}
|
2020-10-21 15:07:28 -06:00
|
|
|
if responder == nil {
|
2020-10-24 13:15:32 -06:00
|
|
|
panic("gemini: nil responder")
|
2020-09-28 01:15:19 -06:00
|
|
|
}
|
|
|
|
if _, exist := mux.m[pattern]; exist {
|
2020-10-24 13:15:32 -06:00
|
|
|
panic("gemini: multiple registrations for " + pattern)
|
2020-09-28 01:15:19 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
if mux.m == nil {
|
|
|
|
mux.m = make(map[string]muxEntry)
|
|
|
|
}
|
2020-10-21 15:07:28 -06:00
|
|
|
e := muxEntry{responder, pattern}
|
2020-09-28 01:15:19 -06:00
|
|
|
mux.m[pattern] = e
|
2020-09-28 14:02:32 -06:00
|
|
|
if pattern[len(pattern)-1] == '/' {
|
|
|
|
mux.es = appendSorted(mux.es, e)
|
|
|
|
}
|
2020-09-28 01:15:19 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func appendSorted(es []muxEntry, e muxEntry) []muxEntry {
|
|
|
|
n := len(es)
|
|
|
|
i := sort.Search(n, func(i int) bool {
|
2020-09-28 14:02:32 -06:00
|
|
|
return len(es[i].pattern) < len(e.pattern)
|
2020-09-28 01:15:19 -06:00
|
|
|
})
|
|
|
|
if i == n {
|
|
|
|
return append(es, e)
|
|
|
|
}
|
|
|
|
// we now know that i points at where we want to insert
|
|
|
|
es = append(es, muxEntry{}) // try to grow the slice in place, any entry works.
|
2020-10-11 16:57:04 -06:00
|
|
|
copy(es[i+1:], es[i:]) // move shorter entries down
|
2020-09-28 01:15:19 -06:00
|
|
|
es[i] = e
|
|
|
|
return es
|
|
|
|
}
|
|
|
|
|
2020-10-21 15:07:28 -06:00
|
|
|
// HandleFunc registers the responder function for the given pattern.
|
|
|
|
func (mux *ServeMux) HandleFunc(pattern string, responder func(*ResponseWriter, *Request)) {
|
|
|
|
if responder == nil {
|
2020-10-24 13:15:32 -06:00
|
|
|
panic("gemini: nil responder")
|
2020-09-28 01:15:19 -06:00
|
|
|
}
|
2020-10-21 15:07:28 -06:00
|
|
|
mux.Handle(pattern, ResponderFunc(responder))
|
2020-09-28 01:15:19 -06:00
|
|
|
}
|