2009-06-02 00:58:49 +02:00
|
|
|
/* $OpenBSD$ */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright (c) 2007 Nicholas Marriott <nicm@users.sourceforge.net>
|
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice appear in all copies.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
|
|
* WHATSOEVER RESULTING FROM LOSS OF MIND, USE, DATA OR PROFITS, WHETHER
|
|
|
|
* IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
|
|
|
|
* OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
|
|
|
|
#include <errno.h>
|
2009-11-04 21:50:11 +01:00
|
|
|
#include <event.h>
|
2009-06-02 00:58:49 +02:00
|
|
|
#include <paths.h>
|
|
|
|
#include <pwd.h>
|
|
|
|
#include <signal.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <syslog.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
|
|
|
#include "tmux.h"
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
2009-11-04 13:41:43 +01:00
|
|
|
extern char *malloc_options;
|
2009-06-02 00:58:49 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
char *cfg_file;
|
2009-12-10 10:16:52 +01:00
|
|
|
struct options global_options; /* server options */
|
2009-07-07 21:49:19 +02:00
|
|
|
struct options global_s_options; /* session options */
|
|
|
|
struct options global_w_options; /* window options */
|
2009-08-08 23:52:43 +02:00
|
|
|
struct environ global_environ;
|
2009-06-02 00:58:49 +02:00
|
|
|
|
|
|
|
int debug_level;
|
|
|
|
time_t start_time;
|
|
|
|
char *socket_path;
|
2009-09-02 19:34:57 +02:00
|
|
|
int login_shell;
|
2009-06-02 00:58:49 +02:00
|
|
|
|
|
|
|
__dead void usage(void);
|
2009-10-21 22:11:47 +02:00
|
|
|
void fill_session(struct msg_command_data *);
|
2009-06-02 00:58:49 +02:00
|
|
|
char *makesockpath(const char *);
|
2009-09-23 14:03:30 +02:00
|
|
|
__dead void shell_exec(const char *, const char *);
|
2009-06-02 00:58:49 +02:00
|
|
|
|
2009-11-04 21:50:11 +01:00
|
|
|
struct imsgbuf *main_ibuf;
|
|
|
|
struct event main_ev_sigterm;
|
|
|
|
int main_exitval;
|
|
|
|
|
|
|
|
void main_set_signals(void);
|
|
|
|
void main_clear_signals(void);
|
|
|
|
void main_signal(int, short, unused void *);
|
|
|
|
void main_callback(int, short, void *);
|
|
|
|
void main_dispatch(const char *);
|
|
|
|
|
2009-06-02 00:58:49 +02:00
|
|
|
__dead void
|
|
|
|
usage(void)
|
|
|
|
{
|
2009-06-02 18:53:20 +02:00
|
|
|
fprintf(stderr,
|
2009-10-25 22:11:21 +01:00
|
|
|
"usage: %s [-28lquv] [-c shell-command] [-f file] [-L socket-name]\n"
|
2009-09-02 19:34:57 +02:00
|
|
|
" [-S socket-path] [command [flags]]\n",
|
2009-06-02 00:58:49 +02:00
|
|
|
__progname);
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
logfile(const char *name)
|
|
|
|
{
|
|
|
|
char *path;
|
|
|
|
|
|
|
|
log_close();
|
|
|
|
if (debug_level > 0) {
|
2009-08-12 11:14:25 +02:00
|
|
|
xasprintf(&path, "tmux-%s-%ld.log", name, (long) getpid());
|
2009-06-02 00:58:49 +02:00
|
|
|
log_open_file(debug_level, path);
|
|
|
|
xfree(path);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-09-01 15:09:49 +02:00
|
|
|
const char *
|
|
|
|
getshell(void)
|
|
|
|
{
|
|
|
|
struct passwd *pw;
|
|
|
|
const char *shell;
|
|
|
|
|
|
|
|
shell = getenv("SHELL");
|
|
|
|
if (checkshell(shell))
|
|
|
|
return (shell);
|
|
|
|
|
|
|
|
pw = getpwuid(getuid());
|
|
|
|
if (pw != NULL && checkshell(pw->pw_shell))
|
|
|
|
return (pw->pw_shell);
|
|
|
|
|
|
|
|
return (_PATH_BSHELL);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
checkshell(const char *shell)
|
|
|
|
{
|
|
|
|
if (shell == NULL || *shell == '\0' || areshell(shell))
|
|
|
|
return (0);
|
|
|
|
if (access(shell, X_OK) != 0)
|
|
|
|
return (0);
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
areshell(const char *shell)
|
|
|
|
{
|
|
|
|
const char *progname, *ptr;
|
|
|
|
|
|
|
|
if ((ptr = strrchr(shell, '/')) != NULL)
|
|
|
|
ptr++;
|
|
|
|
else
|
|
|
|
ptr = shell;
|
|
|
|
progname = __progname;
|
|
|
|
if (*progname == '-')
|
|
|
|
progname++;
|
|
|
|
if (strcmp(ptr, progname) == 0)
|
|
|
|
return (1);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2009-10-21 22:11:47 +02:00
|
|
|
void
|
|
|
|
fill_session(struct msg_command_data *data)
|
|
|
|
{
|
|
|
|
char *env, *ptr1, *ptr2, buf[256];
|
|
|
|
size_t len;
|
|
|
|
const char *errstr;
|
|
|
|
long long ll;
|
|
|
|
|
|
|
|
data->pid = -1;
|
|
|
|
if ((env = getenv("TMUX")) == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if ((ptr2 = strrchr(env, ',')) == NULL || ptr2 == env)
|
|
|
|
return;
|
|
|
|
for (ptr1 = ptr2 - 1; ptr1 > env && *ptr1 != ','; ptr1--)
|
|
|
|
;
|
|
|
|
if (*ptr1 != ',')
|
|
|
|
return;
|
|
|
|
ptr1++;
|
|
|
|
ptr2++;
|
|
|
|
|
|
|
|
len = ptr2 - ptr1 - 1;
|
|
|
|
if (len > (sizeof buf) - 1)
|
|
|
|
return;
|
|
|
|
memcpy(buf, ptr1, len);
|
|
|
|
buf[len] = '\0';
|
|
|
|
|
|
|
|
ll = strtonum(buf, 0, LONG_MAX, &errstr);
|
|
|
|
if (errstr != NULL)
|
|
|
|
return;
|
|
|
|
data->pid = ll;
|
|
|
|
|
|
|
|
ll = strtonum(ptr2, 0, UINT_MAX, &errstr);
|
|
|
|
if (errstr != NULL)
|
|
|
|
return;
|
|
|
|
data->idx = ll;
|
|
|
|
}
|
|
|
|
|
2009-06-02 00:58:49 +02:00
|
|
|
char *
|
|
|
|
makesockpath(const char *label)
|
|
|
|
{
|
|
|
|
char base[MAXPATHLEN], *path;
|
|
|
|
struct stat sb;
|
|
|
|
u_int uid;
|
|
|
|
|
|
|
|
uid = getuid();
|
2009-08-12 11:14:25 +02:00
|
|
|
xsnprintf(base, MAXPATHLEN, "%s/tmux-%d", _PATH_TMP, uid);
|
2009-06-02 00:58:49 +02:00
|
|
|
|
|
|
|
if (mkdir(base, S_IRWXU) != 0 && errno != EEXIST)
|
|
|
|
return (NULL);
|
|
|
|
|
|
|
|
if (lstat(base, &sb) != 0)
|
|
|
|
return (NULL);
|
|
|
|
if (!S_ISDIR(sb.st_mode)) {
|
|
|
|
errno = ENOTDIR;
|
|
|
|
return (NULL);
|
|
|
|
}
|
|
|
|
if (sb.st_uid != uid || (sb.st_mode & (S_IRWXG|S_IRWXO)) != 0) {
|
|
|
|
errno = EACCES;
|
|
|
|
return (NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
xasprintf(&path, "%s/%s", base, label);
|
|
|
|
return (path);
|
|
|
|
}
|
|
|
|
|
2009-11-04 21:50:11 +01:00
|
|
|
__dead void
|
|
|
|
shell_exec(const char *shell, const char *shellcmd)
|
|
|
|
{
|
|
|
|
const char *shellname, *ptr;
|
|
|
|
char *argv0;
|
|
|
|
|
|
|
|
ptr = strrchr(shell, '/');
|
|
|
|
if (ptr != NULL && *(ptr + 1) != '\0')
|
|
|
|
shellname = ptr + 1;
|
|
|
|
else
|
|
|
|
shellname = shell;
|
|
|
|
if (login_shell)
|
|
|
|
xasprintf(&argv0, "-%s", shellname);
|
|
|
|
else
|
|
|
|
xasprintf(&argv0, "%s", shellname);
|
|
|
|
setenv("SHELL", shell, 1);
|
|
|
|
|
|
|
|
execl(shell, argv0, "-c", shellcmd, (char *) NULL);
|
|
|
|
fatal("execl failed");
|
|
|
|
}
|
|
|
|
|
2009-06-02 00:58:49 +02:00
|
|
|
int
|
|
|
|
main(int argc, char **argv)
|
|
|
|
{
|
2009-10-22 12:04:07 +02:00
|
|
|
struct cmd_list *cmdlist;
|
2009-12-03 23:50:09 +01:00
|
|
|
struct cmd *cmd;
|
2009-10-22 12:04:07 +02:00
|
|
|
enum msgtype msg;
|
|
|
|
struct passwd *pw;
|
2009-12-10 10:16:52 +01:00
|
|
|
struct options *oo, *so, *wo;
|
2009-10-22 12:04:07 +02:00
|
|
|
struct keylist *keylist;
|
|
|
|
struct msg_command_data cmddata;
|
|
|
|
char *s, *shellcmd, *path, *label, *home, *cause;
|
|
|
|
char cwd[MAXPATHLEN], **var;
|
|
|
|
void *buf;
|
|
|
|
size_t len;
|
2009-12-11 14:58:48 +01:00
|
|
|
int opt, flags, quiet = 0, cmdflags = 0;
|
2009-11-04 21:50:11 +01:00
|
|
|
short events;
|
2009-06-02 00:58:49 +02:00
|
|
|
|
2009-11-04 13:41:43 +01:00
|
|
|
#ifdef DEBUG
|
|
|
|
malloc_options = (char *) "AFGJPX";
|
|
|
|
#endif
|
|
|
|
|
2009-09-23 08:18:47 +02:00
|
|
|
flags = 0;
|
2009-09-23 14:03:30 +02:00
|
|
|
shellcmd = label = path = NULL;
|
2009-09-02 19:34:57 +02:00
|
|
|
login_shell = (**argv == '-');
|
2009-09-23 14:03:30 +02:00
|
|
|
while ((opt = getopt(argc, argv, "28c:df:lL:qS:uUv")) != -1) {
|
2009-09-02 19:34:57 +02:00
|
|
|
switch (opt) {
|
2009-06-02 00:58:49 +02:00
|
|
|
case '2':
|
|
|
|
flags |= IDENTIFY_256COLOURS;
|
|
|
|
flags &= ~IDENTIFY_88COLOURS;
|
|
|
|
break;
|
|
|
|
case '8':
|
|
|
|
flags |= IDENTIFY_88COLOURS;
|
|
|
|
flags &= ~IDENTIFY_256COLOURS;
|
|
|
|
break;
|
2009-09-23 14:03:30 +02:00
|
|
|
case 'c':
|
|
|
|
if (shellcmd != NULL)
|
|
|
|
xfree(shellcmd);
|
|
|
|
shellcmd = xstrdup(optarg);
|
|
|
|
break;
|
2009-06-02 00:58:49 +02:00
|
|
|
case 'f':
|
2009-09-04 17:15:24 +02:00
|
|
|
if (cfg_file != NULL)
|
2009-06-02 12:49:40 +02:00
|
|
|
xfree(cfg_file);
|
2009-06-02 00:58:49 +02:00
|
|
|
cfg_file = xstrdup(optarg);
|
|
|
|
break;
|
2009-09-02 19:34:57 +02:00
|
|
|
case 'l':
|
|
|
|
login_shell = 1;
|
|
|
|
break;
|
2009-06-02 00:58:49 +02:00
|
|
|
case 'L':
|
|
|
|
if (label != NULL)
|
|
|
|
xfree(label);
|
|
|
|
label = xstrdup(optarg);
|
|
|
|
break;
|
2009-09-01 11:00:54 +02:00
|
|
|
case 'q':
|
2009-12-10 10:16:52 +01:00
|
|
|
quiet = 1;
|
2009-09-01 11:00:54 +02:00
|
|
|
break;
|
2009-06-02 00:58:49 +02:00
|
|
|
case 'S':
|
|
|
|
if (path != NULL)
|
|
|
|
xfree(path);
|
|
|
|
path = xstrdup(optarg);
|
|
|
|
break;
|
|
|
|
case 'u':
|
|
|
|
flags |= IDENTIFY_UTF8;
|
|
|
|
break;
|
|
|
|
case 'v':
|
|
|
|
debug_level++;
|
|
|
|
break;
|
2009-10-26 22:42:04 +01:00
|
|
|
default:
|
2009-06-02 00:58:49 +02:00
|
|
|
usage();
|
2009-10-26 22:42:04 +01:00
|
|
|
}
|
|
|
|
}
|
2009-06-02 00:58:49 +02:00
|
|
|
argc -= optind;
|
|
|
|
argv += optind;
|
|
|
|
|
2009-09-23 14:03:30 +02:00
|
|
|
if (shellcmd != NULL && argc != 0)
|
|
|
|
usage();
|
|
|
|
|
2009-06-02 00:58:49 +02:00
|
|
|
log_open_tty(debug_level);
|
|
|
|
|
2009-07-17 15:38:03 +02:00
|
|
|
if (!(flags & IDENTIFY_UTF8)) {
|
|
|
|
/*
|
|
|
|
* If the user has set whichever of LC_ALL, LC_CTYPE or LANG
|
|
|
|
* exist (in that order) to contain UTF-8, it is a safe
|
|
|
|
* assumption that either they are using a UTF-8 terminal, or
|
|
|
|
* if not they know that output from UTF-8-capable programs may
|
|
|
|
* be wrong.
|
|
|
|
*/
|
|
|
|
if ((s = getenv("LC_ALL")) == NULL) {
|
|
|
|
if ((s = getenv("LC_CTYPE")) == NULL)
|
|
|
|
s = getenv("LANG");
|
|
|
|
}
|
2009-08-04 12:31:28 +02:00
|
|
|
if (s != NULL && (strcasestr(s, "UTF-8") != NULL ||
|
|
|
|
strcasestr(s, "UTF8") != NULL))
|
2009-07-17 15:38:03 +02:00
|
|
|
flags |= IDENTIFY_UTF8;
|
|
|
|
}
|
|
|
|
|
2009-09-04 17:15:24 +02:00
|
|
|
environ_init(&global_environ);
|
2009-12-03 23:50:09 +01:00
|
|
|
for (var = environ; *var != NULL; var++)
|
2009-09-04 17:15:24 +02:00
|
|
|
environ_put(&global_environ, *var);
|
|
|
|
|
2009-12-10 10:16:52 +01:00
|
|
|
options_init(&global_options, NULL);
|
|
|
|
oo = &global_options;
|
2009-12-11 14:58:48 +01:00
|
|
|
options_set_number(oo, "quiet", quiet);
|
2009-12-14 11:43:41 +01:00
|
|
|
options_set_number(oo, "escape-time", 500);
|
2009-12-10 10:16:52 +01:00
|
|
|
|
2009-07-07 21:49:19 +02:00
|
|
|
options_init(&global_s_options, NULL);
|
2009-09-04 17:15:24 +02:00
|
|
|
so = &global_s_options;
|
|
|
|
options_set_number(so, "base-index", 0);
|
|
|
|
options_set_number(so, "bell-action", BELL_ANY);
|
|
|
|
options_set_number(so, "buffer-limit", 9);
|
|
|
|
options_set_string(so, "default-command", "%s", "");
|
|
|
|
options_set_string(so, "default-shell", "%s", getshell());
|
|
|
|
options_set_string(so, "default-terminal", "screen");
|
|
|
|
options_set_number(so, "display-panes-colour", 4);
|
|
|
|
options_set_number(so, "display-panes-time", 1000);
|
|
|
|
options_set_number(so, "display-time", 750);
|
|
|
|
options_set_number(so, "history-limit", 2000);
|
|
|
|
options_set_number(so, "lock-after-time", 0);
|
2009-09-23 08:18:47 +02:00
|
|
|
options_set_string(so, "lock-command", "lock -np");
|
2009-10-10 11:46:11 +02:00
|
|
|
options_set_number(so, "lock-server", 1);
|
2009-09-04 17:15:24 +02:00
|
|
|
options_set_number(so, "message-attr", 0);
|
|
|
|
options_set_number(so, "message-bg", 3);
|
|
|
|
options_set_number(so, "message-fg", 0);
|
2009-11-18 14:16:33 +01:00
|
|
|
options_set_number(so, "message-limit", 20);
|
2009-10-10 16:51:16 +02:00
|
|
|
options_set_number(so, "mouse-select-pane", 0);
|
2009-09-04 17:15:24 +02:00
|
|
|
options_set_number(so, "repeat-time", 500);
|
|
|
|
options_set_number(so, "set-remain-on-exit", 0);
|
|
|
|
options_set_number(so, "set-titles", 0);
|
2009-09-18 17:19:27 +02:00
|
|
|
options_set_string(so, "set-titles-string", "#S:#I:#W - \"#T\"");
|
2009-09-04 17:15:24 +02:00
|
|
|
options_set_number(so, "status", 1);
|
|
|
|
options_set_number(so, "status-attr", 0);
|
|
|
|
options_set_number(so, "status-bg", 2);
|
|
|
|
options_set_number(so, "status-fg", 0);
|
|
|
|
options_set_number(so, "status-interval", 15);
|
|
|
|
options_set_number(so, "status-justify", 0);
|
|
|
|
options_set_number(so, "status-keys", MODEKEY_EMACS);
|
|
|
|
options_set_string(so, "status-left", "[#S]");
|
|
|
|
options_set_number(so, "status-left-attr", 0);
|
|
|
|
options_set_number(so, "status-left-bg", 8);
|
|
|
|
options_set_number(so, "status-left-fg", 8);
|
|
|
|
options_set_number(so, "status-left-length", 10);
|
|
|
|
options_set_string(so, "status-right", "\"#22T\" %%H:%%M %%d-%%b-%%y");
|
|
|
|
options_set_number(so, "status-right-attr", 0);
|
|
|
|
options_set_number(so, "status-right-bg", 8);
|
|
|
|
options_set_number(so, "status-right-fg", 8);
|
|
|
|
options_set_number(so, "status-right-length", 40);
|
|
|
|
options_set_string(so, "terminal-overrides",
|
|
|
|
"*88col*:colors=88,*256col*:colors=256");
|
|
|
|
options_set_string(so, "update-environment", "DISPLAY "
|
2009-08-23 20:21:02 +02:00
|
|
|
"WINDOWID SSH_ASKPASS SSH_AUTH_SOCK SSH_AGENT_PID SSH_CONNECTION");
|
2009-09-04 17:15:24 +02:00
|
|
|
options_set_number(so, "visual-activity", 0);
|
|
|
|
options_set_number(so, "visual-bell", 0);
|
|
|
|
options_set_number(so, "visual-content", 0);
|
2009-07-07 21:49:19 +02:00
|
|
|
|
2009-09-22 14:38:10 +02:00
|
|
|
keylist = xmalloc(sizeof *keylist);
|
|
|
|
ARRAY_INIT(keylist);
|
|
|
|
ARRAY_ADD(keylist, '\002');
|
|
|
|
options_set_data(so, "prefix", keylist, xfree);
|
|
|
|
|
2009-07-07 21:49:19 +02:00
|
|
|
options_init(&global_w_options, NULL);
|
2009-09-04 17:15:24 +02:00
|
|
|
wo = &global_w_options;
|
|
|
|
options_set_number(wo, "aggressive-resize", 0);
|
|
|
|
options_set_number(wo, "automatic-rename", 1);
|
|
|
|
options_set_number(wo, "clock-mode-colour", 4);
|
|
|
|
options_set_number(wo, "clock-mode-style", 1);
|
|
|
|
options_set_number(wo, "force-height", 0);
|
|
|
|
options_set_number(wo, "force-width", 0);
|
|
|
|
options_set_number(wo, "main-pane-height", 24);
|
|
|
|
options_set_number(wo, "main-pane-width", 81);
|
|
|
|
options_set_number(wo, "mode-attr", 0);
|
|
|
|
options_set_number(wo, "mode-bg", 3);
|
|
|
|
options_set_number(wo, "mode-fg", 0);
|
|
|
|
options_set_number(wo, "mode-keys", MODEKEY_EMACS);
|
|
|
|
options_set_number(wo, "mode-mouse", 0);
|
|
|
|
options_set_number(wo, "monitor-activity", 0);
|
|
|
|
options_set_string(wo, "monitor-content", "%s", "");
|
|
|
|
options_set_number(wo, "window-status-attr", 0);
|
|
|
|
options_set_number(wo, "window-status-bg", 8);
|
|
|
|
options_set_number(wo, "window-status-current-attr", 0);
|
|
|
|
options_set_number(wo, "window-status-current-bg", 8);
|
|
|
|
options_set_number(wo, "window-status-current-fg", 8);
|
|
|
|
options_set_number(wo, "window-status-fg", 8);
|
2009-11-19 17:22:10 +01:00
|
|
|
options_set_string(wo, "window-status-format", "#I:#W#F");
|
|
|
|
options_set_string(wo, "window-status-current-format", "#I:#W#F");
|
2009-11-19 15:06:33 +01:00
|
|
|
options_set_number(wo, "xterm-keys", 0);
|
2009-12-03 23:50:09 +01:00
|
|
|
options_set_number(wo, "remain-on-exit", 0);
|
2009-10-09 09:27:00 +02:00
|
|
|
options_set_number(wo, "synchronize-panes", 0);
|
2009-09-04 17:15:24 +02:00
|
|
|
|
2009-12-03 23:50:09 +01:00
|
|
|
if (flags & IDENTIFY_UTF8) {
|
2009-09-04 17:15:24 +02:00
|
|
|
options_set_number(so, "status-utf8", 1);
|
|
|
|
options_set_number(wo, "utf8", 1);
|
|
|
|
} else {
|
|
|
|
options_set_number(so, "status-utf8", 0);
|
|
|
|
options_set_number(wo, "utf8", 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (getcwd(cwd, sizeof cwd) == NULL) {
|
|
|
|
pw = getpwuid(getuid());
|
|
|
|
if (pw->pw_dir != NULL && *pw->pw_dir != '\0')
|
|
|
|
strlcpy(cwd, pw->pw_dir, sizeof cwd);
|
|
|
|
else
|
|
|
|
strlcpy(cwd, "/", sizeof cwd);
|
|
|
|
}
|
|
|
|
options_set_string(so, "default-path", "%s", cwd);
|
2009-06-02 00:58:49 +02:00
|
|
|
|
|
|
|
if (cfg_file == NULL) {
|
|
|
|
home = getenv("HOME");
|
|
|
|
if (home == NULL || *home == '\0') {
|
|
|
|
pw = getpwuid(getuid());
|
|
|
|
if (pw != NULL)
|
|
|
|
home = pw->pw_dir;
|
|
|
|
}
|
|
|
|
xasprintf(&cfg_file, "%s/%s", home, DEFAULT_CFG);
|
|
|
|
if (access(cfg_file, R_OK) != 0) {
|
|
|
|
xfree(cfg_file);
|
|
|
|
cfg_file = NULL;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (access(cfg_file, R_OK) != 0) {
|
|
|
|
log_warn("%s", cfg_file);
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
}
|
2009-12-03 23:50:09 +01:00
|
|
|
|
2009-06-02 00:58:49 +02:00
|
|
|
if (label == NULL)
|
|
|
|
label = xstrdup("default");
|
|
|
|
if (path == NULL && (path = makesockpath(label)) == NULL) {
|
|
|
|
log_warn("can't create socket");
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
xfree(label);
|
|
|
|
|
2009-09-23 14:03:30 +02:00
|
|
|
if (shellcmd != NULL) {
|
|
|
|
msg = MSG_SHELL;
|
|
|
|
buf = NULL;
|
|
|
|
len = 0;
|
2009-10-22 12:04:07 +02:00
|
|
|
} else {
|
|
|
|
fill_session(&cmddata);
|
2009-12-03 23:50:09 +01:00
|
|
|
|
2009-10-22 12:04:07 +02:00
|
|
|
cmddata.argc = argc;
|
|
|
|
if (cmd_pack_argv(
|
|
|
|
argc, argv, cmddata.argv, sizeof cmddata.argv) != 0) {
|
|
|
|
log_warnx("command too long");
|
|
|
|
exit(1);
|
|
|
|
}
|
2009-12-03 23:50:09 +01:00
|
|
|
|
2009-10-22 12:04:07 +02:00
|
|
|
msg = MSG_COMMAND;
|
|
|
|
buf = &cmddata;
|
|
|
|
len = sizeof cmddata;
|
|
|
|
}
|
2009-07-26 14:58:44 +02:00
|
|
|
|
2009-09-23 14:03:30 +02:00
|
|
|
if (shellcmd != NULL)
|
|
|
|
cmdflags |= CMD_STARTSERVER;
|
|
|
|
else if (argc == 0) /* new-session is the default */
|
2009-08-10 22:51:29 +02:00
|
|
|
cmdflags |= CMD_STARTSERVER|CMD_SENDENVIRON;
|
2009-07-26 14:58:44 +02:00
|
|
|
else {
|
|
|
|
/*
|
|
|
|
* It sucks parsing the command string twice (in client and
|
|
|
|
* later in server) but it is necessary to get the start server
|
|
|
|
* flag.
|
|
|
|
*/
|
|
|
|
if ((cmdlist = cmd_list_parse(argc, argv, &cause)) == NULL) {
|
|
|
|
log_warnx("%s", cause);
|
|
|
|
exit(1);
|
2009-06-02 00:58:49 +02:00
|
|
|
}
|
2009-07-26 14:58:44 +02:00
|
|
|
cmdflags &= ~CMD_STARTSERVER;
|
2009-06-02 00:58:49 +02:00
|
|
|
TAILQ_FOREACH(cmd, cmdlist, qentry) {
|
2009-08-08 23:52:43 +02:00
|
|
|
if (cmd->entry->flags & CMD_STARTSERVER)
|
2009-07-22 23:58:56 +02:00
|
|
|
cmdflags |= CMD_STARTSERVER;
|
2009-08-08 23:52:43 +02:00
|
|
|
if (cmd->entry->flags & CMD_SENDENVIRON)
|
|
|
|
cmdflags |= CMD_SENDENVIRON;
|
2009-06-02 00:58:49 +02:00
|
|
|
}
|
2009-07-26 14:58:44 +02:00
|
|
|
cmd_list_free(cmdlist);
|
2009-06-02 00:58:49 +02:00
|
|
|
}
|
|
|
|
|
2009-11-04 21:50:11 +01:00
|
|
|
if ((main_ibuf = client_init(path, cmdflags, flags)) == NULL)
|
2009-06-02 00:58:49 +02:00
|
|
|
exit(1);
|
|
|
|
xfree(path);
|
|
|
|
|
2009-11-04 21:50:11 +01:00
|
|
|
event_init();
|
2009-06-02 00:58:49 +02:00
|
|
|
|
2009-12-03 23:50:09 +01:00
|
|
|
imsg_compose(main_ibuf, msg, PROTOCOL_VERSION, -1, -1, buf, len);
|
2009-06-02 00:58:49 +02:00
|
|
|
|
2009-11-04 21:50:11 +01:00
|
|
|
main_set_signals();
|
2009-06-02 00:58:49 +02:00
|
|
|
|
2009-11-04 21:50:11 +01:00
|
|
|
events = EV_READ;
|
|
|
|
if (main_ibuf->w.queued > 0)
|
|
|
|
events |= EV_WRITE;
|
|
|
|
event_once(main_ibuf->fd, events, main_callback, shellcmd, NULL);
|
2009-08-11 19:18:35 +02:00
|
|
|
|
2009-11-04 21:50:11 +01:00
|
|
|
main_exitval = 0;
|
|
|
|
event_dispatch();
|
|
|
|
|
|
|
|
main_clear_signals();
|
|
|
|
|
|
|
|
client_main(); /* doesn't return */
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
main_set_signals(void)
|
|
|
|
{
|
|
|
|
struct sigaction sigact;
|
|
|
|
|
|
|
|
memset(&sigact, 0, sizeof sigact);
|
|
|
|
sigemptyset(&sigact.sa_mask);
|
|
|
|
sigact.sa_flags = SA_RESTART;
|
|
|
|
sigact.sa_handler = SIG_IGN;
|
|
|
|
if (sigaction(SIGINT, &sigact, NULL) != 0)
|
|
|
|
fatal("sigaction failed");
|
|
|
|
if (sigaction(SIGPIPE, &sigact, NULL) != 0)
|
|
|
|
fatal("sigaction failed");
|
|
|
|
if (sigaction(SIGUSR1, &sigact, NULL) != 0)
|
|
|
|
fatal("sigaction failed");
|
|
|
|
if (sigaction(SIGUSR2, &sigact, NULL) != 0)
|
|
|
|
fatal("sigaction failed");
|
|
|
|
if (sigaction(SIGTSTP, &sigact, NULL) != 0)
|
|
|
|
fatal("sigaction failed");
|
2009-12-03 23:50:09 +01:00
|
|
|
|
2009-11-04 21:50:11 +01:00
|
|
|
signal_set(&main_ev_sigterm, SIGTERM, main_signal, NULL);
|
|
|
|
signal_add(&main_ev_sigterm, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
main_clear_signals(void)
|
|
|
|
{
|
|
|
|
struct sigaction sigact;
|
|
|
|
|
|
|
|
memset(&sigact, 0, sizeof sigact);
|
|
|
|
sigemptyset(&sigact.sa_mask);
|
|
|
|
sigact.sa_flags = SA_RESTART;
|
|
|
|
sigact.sa_handler = SIG_DFL;
|
|
|
|
if (sigaction(SIGINT, &sigact, NULL) != 0)
|
|
|
|
fatal("sigaction failed");
|
|
|
|
if (sigaction(SIGPIPE, &sigact, NULL) != 0)
|
|
|
|
fatal("sigaction failed");
|
|
|
|
if (sigaction(SIGUSR1, &sigact, NULL) != 0)
|
|
|
|
fatal("sigaction failed");
|
|
|
|
if (sigaction(SIGUSR2, &sigact, NULL) != 0)
|
|
|
|
fatal("sigaction failed");
|
|
|
|
if (sigaction(SIGTSTP, &sigact, NULL) != 0)
|
|
|
|
fatal("sigaction failed");
|
2009-12-03 23:50:09 +01:00
|
|
|
|
2009-11-04 21:50:11 +01:00
|
|
|
event_del(&main_ev_sigterm);
|
|
|
|
}
|
|
|
|
|
2009-11-26 22:37:13 +01:00
|
|
|
/* ARGSUSED */
|
2009-11-04 21:50:11 +01:00
|
|
|
void
|
|
|
|
main_signal(int sig, unused short events, unused void *data)
|
|
|
|
{
|
|
|
|
switch (sig) {
|
|
|
|
case SIGTERM:
|
|
|
|
exit(1);
|
2009-08-11 19:18:35 +02:00
|
|
|
}
|
2009-11-04 21:50:11 +01:00
|
|
|
}
|
2009-08-11 19:18:35 +02:00
|
|
|
|
2009-11-26 22:37:13 +01:00
|
|
|
/* ARGSUSED */
|
2009-11-04 21:50:11 +01:00
|
|
|
void
|
|
|
|
main_callback(unused int fd, short events, void *data)
|
|
|
|
{
|
|
|
|
char *shellcmd = data;
|
2009-08-11 19:18:35 +02:00
|
|
|
|
2009-11-04 21:50:11 +01:00
|
|
|
if (events & EV_READ)
|
|
|
|
main_dispatch(shellcmd);
|
2009-12-03 23:50:09 +01:00
|
|
|
|
2009-11-04 21:50:11 +01:00
|
|
|
if (events & EV_WRITE) {
|
|
|
|
if (msgbuf_write(&main_ibuf->w) < 0)
|
|
|
|
fatalx("msgbuf_write failed");
|
|
|
|
}
|
|
|
|
|
|
|
|
events = EV_READ;
|
|
|
|
if (main_ibuf->w.queued > 0)
|
|
|
|
events |= EV_WRITE;
|
|
|
|
event_once(main_ibuf->fd, events, main_callback, shellcmd, NULL);
|
2009-08-11 19:18:35 +02:00
|
|
|
}
|
|
|
|
|
2009-11-04 21:50:11 +01:00
|
|
|
void
|
|
|
|
main_dispatch(const char *shellcmd)
|
2009-08-11 19:18:35 +02:00
|
|
|
{
|
|
|
|
struct imsg imsg;
|
|
|
|
ssize_t n, datalen;
|
|
|
|
struct msg_print_data printdata;
|
2009-09-23 14:03:30 +02:00
|
|
|
struct msg_shell_data shelldata;
|
2009-08-11 19:18:35 +02:00
|
|
|
|
2009-11-04 21:50:11 +01:00
|
|
|
if ((n = imsg_read(main_ibuf)) == -1 || n == 0)
|
2009-08-11 19:18:35 +02:00
|
|
|
fatalx("imsg_read failed");
|
|
|
|
|
|
|
|
for (;;) {
|
2009-11-04 21:50:11 +01:00
|
|
|
if ((n = imsg_get(main_ibuf, &imsg)) == -1)
|
2009-08-11 19:18:35 +02:00
|
|
|
fatalx("imsg_get failed");
|
|
|
|
if (n == 0)
|
2009-11-04 21:50:11 +01:00
|
|
|
return;
|
2009-08-11 19:18:35 +02:00
|
|
|
datalen = imsg.hdr.len - IMSG_HEADER_SIZE;
|
2009-06-02 00:58:49 +02:00
|
|
|
|
2009-08-11 19:18:35 +02:00
|
|
|
switch (imsg.hdr.type) {
|
2009-06-02 00:58:49 +02:00
|
|
|
case MSG_EXIT:
|
|
|
|
case MSG_SHUTDOWN:
|
2009-08-11 19:18:35 +02:00
|
|
|
if (datalen != 0)
|
|
|
|
fatalx("bad MSG_EXIT size");
|
|
|
|
|
2009-11-04 21:50:11 +01:00
|
|
|
exit(main_exitval);
|
2009-06-02 00:58:49 +02:00
|
|
|
case MSG_ERROR:
|
|
|
|
case MSG_PRINT:
|
2009-08-11 19:18:35 +02:00
|
|
|
if (datalen != sizeof printdata)
|
2009-06-02 00:58:49 +02:00
|
|
|
fatalx("bad MSG_PRINT size");
|
2009-08-11 19:18:35 +02:00
|
|
|
memcpy(&printdata, imsg.data, sizeof printdata);
|
2009-07-26 14:58:44 +02:00
|
|
|
printdata.msg[(sizeof printdata.msg) - 1] = '\0';
|
2009-08-11 19:18:35 +02:00
|
|
|
|
2009-07-26 14:58:44 +02:00
|
|
|
log_info("%s", printdata.msg);
|
2009-11-04 21:50:11 +01:00
|
|
|
if (imsg.hdr.type == MSG_ERROR)
|
|
|
|
main_exitval = 1;
|
2009-08-11 19:18:35 +02:00
|
|
|
break;
|
2009-06-02 00:58:49 +02:00
|
|
|
case MSG_READY:
|
2009-08-11 19:18:35 +02:00
|
|
|
if (datalen != 0)
|
|
|
|
fatalx("bad MSG_READY size");
|
|
|
|
|
2009-11-04 21:50:11 +01:00
|
|
|
event_loopexit(NULL); /* move to client_main() */
|
|
|
|
break;
|
2009-08-11 19:18:35 +02:00
|
|
|
case MSG_VERSION:
|
|
|
|
if (datalen != 0)
|
|
|
|
fatalx("bad MSG_VERSION size");
|
|
|
|
|
|
|
|
log_warnx("protocol version mismatch (client %u, "
|
|
|
|
"server %u)", PROTOCOL_VERSION, imsg.hdr.peerid);
|
2009-11-04 21:50:11 +01:00
|
|
|
exit(1);
|
2009-09-23 14:03:30 +02:00
|
|
|
case MSG_SHELL:
|
|
|
|
if (datalen != sizeof shelldata)
|
|
|
|
fatalx("bad MSG_SHELL size");
|
|
|
|
memcpy(&shelldata, imsg.data, sizeof shelldata);
|
|
|
|
shelldata.shell[(sizeof shelldata.shell) - 1] = '\0';
|
2009-11-04 21:50:11 +01:00
|
|
|
|
|
|
|
main_clear_signals();
|
|
|
|
|
2009-09-23 14:03:30 +02:00
|
|
|
shell_exec(shelldata.shell, shellcmd);
|
2009-06-02 00:58:49 +02:00
|
|
|
default:
|
2009-08-11 19:18:35 +02:00
|
|
|
fatalx("unexpected message");
|
2009-06-02 00:58:49 +02:00
|
|
|
}
|
|
|
|
|
2009-08-11 19:18:35 +02:00
|
|
|
imsg_free(&imsg);
|
|
|
|
}
|
2009-06-02 00:58:49 +02:00
|
|
|
}
|