/*
-tofuproxy -- flexible HTTP proxy, TLS terminator, X.509 certificates
- manager, WARC/Gemini browser
-Copyright (C) 2021 Sergey Matveev <stargrave@stargrave.org>
+tofuproxy -- flexible HTTP/HTTPS proxy, TLS terminator, X.509 TOFU
+ manager, WARC/geminispace browser
+Copyright (C) 2021-2022 Sergey Matveev <stargrave@stargrave.org>
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
}
paths := strings.Split(strings.TrimPrefix(req.URL.Path, "/"), "/")
host, paths = paths[0], paths[1:]
+ if host == "gemini:" {
+ http.Redirect(w, req, strings.Join(
+ append([]string{GeminiEntrypoint}, paths[1:]...), "/",
+ ), http.StatusTemporaryRedirect)
+ return false, nil
+ }
hostWithPort := host
if !strings.Contains(hostWithPort, ":") {
hostWithPort += GeminiPort
log.Printf("%s: can not dial: %+v\n", req.URL, err)
return false, err
}
- _, err = fmt.Fprintf(
- conn, "%s%s/%s\r\n",
- SchemeGemini, host, strings.Join(paths, "/"),
- )
- if err != nil {
+ query := fmt.Sprintf("%s%s/%s", SchemeGemini, host, strings.Join(paths, "/"))
+ if req.URL.RawQuery != "" {
+ query += "?" + req.URL.RawQuery
+ }
+ if _, err = conn.Write([]byte(query + "\r\n")); err != nil {
log.Printf("%s: can not send request: %+v\n", req.URL, err)
return false, err
}
fmt.Sprintf(
`<!DOCTYPE html>
<html><head><title>%d (%s) redirection</title></head>
-<body>Redirection to <a href="%s">%s</a></body></html>`,
+<body><a href="%s">%s</a></body></html>`,
code, codeName, u, u,
)))
fifos.LogRedir <- fmt.Sprintf(
)
return false, nil
}
+ msg := fmt.Sprintf(
+ "%s %s\t%d (%s)\t%s",
+ req.Method, req.URL,
+ code, codeName,
+ cols[1],
+ )
if 40 <= code && code <= 49 {
w.Header().Add("Content-Type", "text/plain")
w.WriteHeader(http.StatusBadGateway)
fmt.Fprintf(w, "%s\n%d (%s)\n", cols[1], code, codeName)
+ fifos.LogNonOK <- msg
return false, nil
}
if 50 <= code && code <= 59 {
w.Header().Add("Content-Type", "text/plain")
w.WriteHeader(http.StatusBadGateway)
fmt.Fprintf(w, "%s\n%d (%s)\n", cols[1], code, codeName)
+ fifos.LogNonOK <- msg
return false, nil
}
if 60 <= code && code <= 69 {
w.Header().Add("Content-Type", "text/plain")
w.WriteHeader(http.StatusUnauthorized)
fmt.Fprintf(w, "%s\n%d (%s)\n", cols[1], code, codeName)
+ fifos.LogNonOK <- msg
return false, nil
}
if !(20 <= code && code <= 29) {
err = fmt.Errorf("unknown response code: %d", code)
log.Printf("%s: %s\n", req.URL, err)
+ fifos.LogNonOK <- msg
return false, err
}
contentType := strings.Split(strings.TrimRight(cols[1], "\r\n"), ";")[0]
}
buf.WriteString("</body></html>\n")
_, err = w.Write(buf.Bytes())
+ fifos.LogOK <- msg
return false, err
}
w.Header().Add("Content-Type", contentType)
if err != nil {
log.Printf("%s: can not read response body: %+v\n", req.URL, err)
}
+ fifos.LogOK <- msg
return false, err
}