2009-06-02 00:58:49 +02:00
|
|
|
/* $OpenBSD$ */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright (c) 2007 Nicholas Marriott <nicm@users.sourceforge.net>
|
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice appear in all copies.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
|
|
* WHATSOEVER RESULTING FROM LOSS OF MIND, USE, DATA OR PROFITS, WHETHER
|
|
|
|
* IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
|
|
|
|
* OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
|
2015-10-23 18:07:29 +02:00
|
|
|
#include <err.h>
|
2009-06-02 00:58:49 +02:00
|
|
|
#include <errno.h>
|
2009-11-04 21:50:11 +01:00
|
|
|
#include <event.h>
|
2010-10-16 10:42:35 +02:00
|
|
|
#include <fcntl.h>
|
2014-10-21 01:27:14 +02:00
|
|
|
#include <getopt.h>
|
2013-04-11 23:52:18 +02:00
|
|
|
#include <locale.h>
|
2009-06-02 00:58:49 +02:00
|
|
|
#include <paths.h>
|
|
|
|
#include <pwd.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
|
|
|
#include "tmux.h"
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
2009-11-04 13:41:43 +01:00
|
|
|
extern char *malloc_options;
|
2009-06-02 00:58:49 +02:00
|
|
|
#endif
|
|
|
|
|
2009-12-10 10:16:52 +01:00
|
|
|
struct options global_options; /* server options */
|
2009-07-07 21:49:19 +02:00
|
|
|
struct options global_s_options; /* session options */
|
|
|
|
struct options global_w_options; /* window options */
|
2009-08-08 23:52:43 +02:00
|
|
|
struct environ global_environ;
|
2009-06-02 00:58:49 +02:00
|
|
|
|
2010-10-18 22:00:02 +02:00
|
|
|
char *shell_cmd;
|
2009-06-02 00:58:49 +02:00
|
|
|
int debug_level;
|
|
|
|
time_t start_time;
|
2014-10-21 01:27:14 +02:00
|
|
|
char socket_path[PATH_MAX];
|
2010-02-06 19:29:15 +01:00
|
|
|
|
2009-06-02 00:58:49 +02:00
|
|
|
__dead void usage(void);
|
2010-10-18 22:00:02 +02:00
|
|
|
char *makesocketpath(const char *);
|
2009-11-04 21:50:11 +01:00
|
|
|
|
2009-06-02 00:58:49 +02:00
|
|
|
__dead void
|
|
|
|
usage(void)
|
|
|
|
{
|
2009-06-02 18:53:20 +02:00
|
|
|
fprintf(stderr,
|
2015-06-04 22:34:22 +02:00
|
|
|
"usage: %s [-2Cluv] [-c shell-command] [-f file] [-L socket-name]\n"
|
2009-09-02 19:34:57 +02:00
|
|
|
" [-S socket-path] [command [flags]]\n",
|
2009-06-02 00:58:49 +02:00
|
|
|
__progname);
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
logfile(const char *name)
|
|
|
|
{
|
|
|
|
char *path;
|
|
|
|
|
|
|
|
if (debug_level > 0) {
|
2009-08-12 11:14:25 +02:00
|
|
|
xasprintf(&path, "tmux-%s-%ld.log", name, (long) getpid());
|
2014-03-31 23:42:45 +02:00
|
|
|
log_open(path);
|
2012-07-10 13:53:01 +02:00
|
|
|
free(path);
|
2009-06-02 00:58:49 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-09-01 15:09:49 +02:00
|
|
|
const char *
|
|
|
|
getshell(void)
|
|
|
|
{
|
|
|
|
struct passwd *pw;
|
|
|
|
const char *shell;
|
|
|
|
|
|
|
|
shell = getenv("SHELL");
|
|
|
|
if (checkshell(shell))
|
|
|
|
return (shell);
|
|
|
|
|
|
|
|
pw = getpwuid(getuid());
|
|
|
|
if (pw != NULL && checkshell(pw->pw_shell))
|
|
|
|
return (pw->pw_shell);
|
|
|
|
|
|
|
|
return (_PATH_BSHELL);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
checkshell(const char *shell)
|
|
|
|
{
|
2011-09-25 20:53:04 +02:00
|
|
|
if (shell == NULL || *shell == '\0' || *shell != '/')
|
|
|
|
return (0);
|
|
|
|
if (areshell(shell))
|
2009-09-01 15:09:49 +02:00
|
|
|
return (0);
|
|
|
|
if (access(shell, X_OK) != 0)
|
|
|
|
return (0);
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
areshell(const char *shell)
|
|
|
|
{
|
|
|
|
const char *progname, *ptr;
|
|
|
|
|
|
|
|
if ((ptr = strrchr(shell, '/')) != NULL)
|
|
|
|
ptr++;
|
|
|
|
else
|
|
|
|
ptr = shell;
|
|
|
|
progname = __progname;
|
|
|
|
if (*progname == '-')
|
|
|
|
progname++;
|
|
|
|
if (strcmp(ptr, progname) == 0)
|
|
|
|
return (1);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2009-06-02 00:58:49 +02:00
|
|
|
char *
|
2010-10-18 22:00:02 +02:00
|
|
|
makesocketpath(const char *label)
|
2009-06-02 00:58:49 +02:00
|
|
|
{
|
2014-10-21 01:27:14 +02:00
|
|
|
char base[PATH_MAX], realbase[PATH_MAX], *path, *s;
|
2009-06-02 00:58:49 +02:00
|
|
|
struct stat sb;
|
|
|
|
u_int uid;
|
|
|
|
|
|
|
|
uid = getuid();
|
2013-03-27 12:24:18 +01:00
|
|
|
if ((s = getenv("TMUX_TMPDIR")) != NULL && *s != '\0')
|
2015-01-19 10:58:34 +01:00
|
|
|
xsnprintf(base, sizeof base, "%s/tmux-%u", s, uid);
|
2013-03-27 12:24:18 +01:00
|
|
|
else
|
|
|
|
xsnprintf(base, sizeof base, "%s/tmux-%u", _PATH_TMP, uid);
|
2009-06-02 00:58:49 +02:00
|
|
|
|
|
|
|
if (mkdir(base, S_IRWXU) != 0 && errno != EEXIST)
|
|
|
|
return (NULL);
|
|
|
|
|
|
|
|
if (lstat(base, &sb) != 0)
|
|
|
|
return (NULL);
|
|
|
|
if (!S_ISDIR(sb.st_mode)) {
|
|
|
|
errno = ENOTDIR;
|
|
|
|
return (NULL);
|
|
|
|
}
|
2015-01-19 10:58:34 +01:00
|
|
|
if (sb.st_uid != uid || (sb.st_mode & S_IRWXO) != 0) {
|
2009-06-02 00:58:49 +02:00
|
|
|
errno = EACCES;
|
|
|
|
return (NULL);
|
|
|
|
}
|
|
|
|
|
2012-11-26 12:35:28 +01:00
|
|
|
if (realpath(base, realbase) == NULL)
|
|
|
|
strlcpy(realbase, base, sizeof realbase);
|
|
|
|
|
|
|
|
xasprintf(&path, "%s/%s", realbase, label);
|
2009-06-02 00:58:49 +02:00
|
|
|
return (path);
|
|
|
|
}
|
|
|
|
|
2011-01-08 02:52:36 +01:00
|
|
|
void
|
|
|
|
setblocking(int fd, int state)
|
|
|
|
{
|
|
|
|
int mode;
|
|
|
|
|
|
|
|
if ((mode = fcntl(fd, F_GETFL)) != -1) {
|
|
|
|
if (!state)
|
|
|
|
mode |= O_NONBLOCK;
|
|
|
|
else
|
|
|
|
mode &= ~O_NONBLOCK;
|
|
|
|
fcntl(fd, F_SETFL, mode);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-30 17:43:40 +02:00
|
|
|
const char *
|
2015-07-20 17:50:04 +02:00
|
|
|
find_home(void)
|
|
|
|
{
|
2015-09-01 12:10:59 +02:00
|
|
|
struct passwd *pw;
|
|
|
|
static const char *home;
|
|
|
|
|
|
|
|
if (home != NULL)
|
|
|
|
return (home);
|
2015-07-20 17:50:04 +02:00
|
|
|
|
|
|
|
home = getenv("HOME");
|
|
|
|
if (home == NULL || *home == '\0') {
|
|
|
|
pw = getpwuid(getuid());
|
|
|
|
if (pw != NULL)
|
|
|
|
home = pw->pw_dir;
|
|
|
|
else
|
|
|
|
home = NULL;
|
|
|
|
}
|
|
|
|
|
2015-08-30 17:43:40 +02:00
|
|
|
return (home);
|
2015-07-20 17:50:04 +02:00
|
|
|
}
|
|
|
|
|
2009-06-02 00:58:49 +02:00
|
|
|
int
|
|
|
|
main(int argc, char **argv)
|
|
|
|
{
|
2015-09-01 12:10:59 +02:00
|
|
|
char *s, *path, *label, **var, tmp[PATH_MAX];
|
|
|
|
int opt, flags, keys;
|
2009-06-02 00:58:49 +02:00
|
|
|
|
2009-11-04 13:41:43 +01:00
|
|
|
#ifdef DEBUG
|
|
|
|
malloc_options = (char *) "AFGJPX";
|
|
|
|
#endif
|
|
|
|
|
2013-04-11 23:52:18 +02:00
|
|
|
setlocale(LC_TIME, "");
|
2015-09-14 14:12:24 +02:00
|
|
|
tzset();
|
2013-04-11 23:52:18 +02:00
|
|
|
|
2015-08-31 00:40:25 +02:00
|
|
|
if (**argv == '-')
|
|
|
|
flags = CLIENT_LOGIN;
|
|
|
|
else
|
|
|
|
flags = 0;
|
|
|
|
|
2010-10-18 22:00:02 +02:00
|
|
|
label = path = NULL;
|
2013-03-27 12:24:18 +01:00
|
|
|
while ((opt = getopt(argc, argv, "2c:Cdf:lL:qS:uUv")) != -1) {
|
2009-09-02 19:34:57 +02:00
|
|
|
switch (opt) {
|
2009-06-02 00:58:49 +02:00
|
|
|
case '2':
|
2013-10-10 14:12:08 +02:00
|
|
|
flags |= CLIENT_256COLOURS;
|
2009-06-02 00:58:49 +02:00
|
|
|
break;
|
2009-09-23 14:03:30 +02:00
|
|
|
case 'c':
|
2012-07-10 13:53:01 +02:00
|
|
|
free(shell_cmd);
|
2010-10-18 22:00:02 +02:00
|
|
|
shell_cmd = xstrdup(optarg);
|
2009-09-23 14:03:30 +02:00
|
|
|
break;
|
2012-06-18 15:16:42 +02:00
|
|
|
case 'C':
|
2013-10-10 14:12:08 +02:00
|
|
|
if (flags & CLIENT_CONTROL)
|
|
|
|
flags |= CLIENT_CONTROLCONTROL;
|
2012-06-18 15:16:42 +02:00
|
|
|
else
|
2013-10-10 14:12:08 +02:00
|
|
|
flags |= CLIENT_CONTROL;
|
2012-06-18 15:16:42 +02:00
|
|
|
break;
|
2009-06-02 00:58:49 +02:00
|
|
|
case 'f':
|
2015-09-01 12:10:59 +02:00
|
|
|
set_cfg_file(optarg);
|
2009-06-02 00:58:49 +02:00
|
|
|
break;
|
2009-09-02 19:34:57 +02:00
|
|
|
case 'l':
|
2015-08-31 00:40:25 +02:00
|
|
|
flags |= CLIENT_LOGIN;
|
2009-09-02 19:34:57 +02:00
|
|
|
break;
|
2009-06-02 00:58:49 +02:00
|
|
|
case 'L':
|
2012-07-10 13:53:01 +02:00
|
|
|
free(label);
|
2009-06-02 00:58:49 +02:00
|
|
|
label = xstrdup(optarg);
|
|
|
|
break;
|
2009-09-01 11:00:54 +02:00
|
|
|
case 'q':
|
|
|
|
break;
|
2009-06-02 00:58:49 +02:00
|
|
|
case 'S':
|
2012-07-10 13:53:01 +02:00
|
|
|
free(path);
|
2009-06-02 00:58:49 +02:00
|
|
|
path = xstrdup(optarg);
|
|
|
|
break;
|
|
|
|
case 'u':
|
2013-10-10 14:12:08 +02:00
|
|
|
flags |= CLIENT_UTF8;
|
2009-06-02 00:58:49 +02:00
|
|
|
break;
|
|
|
|
case 'v':
|
|
|
|
debug_level++;
|
|
|
|
break;
|
2009-10-26 22:42:04 +01:00
|
|
|
default:
|
2009-06-02 00:58:49 +02:00
|
|
|
usage();
|
2009-10-26 22:42:04 +01:00
|
|
|
}
|
|
|
|
}
|
2009-06-02 00:58:49 +02:00
|
|
|
argc -= optind;
|
|
|
|
argv += optind;
|
|
|
|
|
2010-10-18 22:00:02 +02:00
|
|
|
if (shell_cmd != NULL && argc != 0)
|
2009-09-23 14:03:30 +02:00
|
|
|
usage();
|
|
|
|
|
2015-10-23 18:07:29 +02:00
|
|
|
if (pledge("stdio rpath wpath cpath flock fattr unix sendfd recvfd "
|
|
|
|
"proc exec tty ps", NULL) != 0)
|
|
|
|
err(1, "pledge");
|
|
|
|
|
2013-10-10 14:12:08 +02:00
|
|
|
if (!(flags & CLIENT_UTF8)) {
|
2009-07-17 15:38:03 +02:00
|
|
|
/*
|
|
|
|
* If the user has set whichever of LC_ALL, LC_CTYPE or LANG
|
|
|
|
* exist (in that order) to contain UTF-8, it is a safe
|
|
|
|
* assumption that either they are using a UTF-8 terminal, or
|
|
|
|
* if not they know that output from UTF-8-capable programs may
|
|
|
|
* be wrong.
|
|
|
|
*/
|
2011-10-23 10:03:27 +02:00
|
|
|
if ((s = getenv("LC_ALL")) == NULL || *s == '\0') {
|
|
|
|
if ((s = getenv("LC_CTYPE")) == NULL || *s == '\0')
|
2009-07-17 15:38:03 +02:00
|
|
|
s = getenv("LANG");
|
|
|
|
}
|
2009-08-04 12:31:28 +02:00
|
|
|
if (s != NULL && (strcasestr(s, "UTF-8") != NULL ||
|
|
|
|
strcasestr(s, "UTF8") != NULL))
|
2013-10-10 14:12:08 +02:00
|
|
|
flags |= CLIENT_UTF8;
|
2009-07-17 15:38:03 +02:00
|
|
|
}
|
|
|
|
|
2009-09-04 17:15:24 +02:00
|
|
|
environ_init(&global_environ);
|
2009-12-03 23:50:09 +01:00
|
|
|
for (var = environ; *var != NULL; var++)
|
2009-09-04 17:15:24 +02:00
|
|
|
environ_put(&global_environ, *var);
|
2013-10-10 14:26:34 +02:00
|
|
|
if (getcwd(tmp, sizeof tmp) != NULL)
|
|
|
|
environ_set(&global_environ, "PWD", tmp);
|
2009-09-04 17:15:24 +02:00
|
|
|
|
2009-12-10 10:16:52 +01:00
|
|
|
options_init(&global_options, NULL);
|
2011-01-01 17:51:21 +01:00
|
|
|
options_table_populate_tree(server_options_table, &global_options);
|
2009-12-10 10:16:52 +01:00
|
|
|
|
2009-07-07 21:49:19 +02:00
|
|
|
options_init(&global_s_options, NULL);
|
2011-01-01 17:51:21 +01:00
|
|
|
options_table_populate_tree(session_options_table, &global_s_options);
|
2014-04-17 09:55:43 +02:00
|
|
|
options_set_string(&global_s_options, "default-shell", "%s",
|
|
|
|
getshell());
|
2009-07-07 21:49:19 +02:00
|
|
|
|
2011-01-01 17:51:21 +01:00
|
|
|
options_init(&global_w_options, NULL);
|
|
|
|
options_table_populate_tree(window_options_table, &global_w_options);
|
|
|
|
|
|
|
|
/* Enable UTF-8 if the first client is on UTF-8 terminal. */
|
2013-10-10 14:12:08 +02:00
|
|
|
if (flags & CLIENT_UTF8) {
|
2011-01-01 17:51:21 +01:00
|
|
|
options_set_number(&global_s_options, "status-utf8", 1);
|
2011-01-04 00:35:21 +01:00
|
|
|
options_set_number(&global_s_options, "mouse-utf8", 1);
|
2011-01-01 17:51:21 +01:00
|
|
|
options_set_number(&global_w_options, "utf8", 1);
|
2009-09-04 17:15:24 +02:00
|
|
|
}
|
|
|
|
|
2011-01-01 17:51:21 +01:00
|
|
|
/* Override keys to vi if VISUAL or EDITOR are set. */
|
2010-11-29 20:45:58 +01:00
|
|
|
if ((s = getenv("VISUAL")) != NULL || (s = getenv("EDITOR")) != NULL) {
|
|
|
|
if (strrchr(s, '/') != NULL)
|
|
|
|
s = strrchr(s, '/') + 1;
|
|
|
|
if (strstr(s, "vi") != NULL)
|
|
|
|
keys = MODEKEY_VI;
|
2011-01-01 17:51:21 +01:00
|
|
|
else
|
|
|
|
keys = MODEKEY_EMACS;
|
|
|
|
options_set_number(&global_s_options, "status-keys", keys);
|
|
|
|
options_set_number(&global_w_options, "mode-keys", keys);
|
2010-11-29 20:45:58 +01:00
|
|
|
}
|
|
|
|
|
2010-02-04 19:27:06 +01:00
|
|
|
/*
|
2010-10-18 22:00:02 +02:00
|
|
|
* Figure out the socket path. If specified on the command-line with -S
|
|
|
|
* or -L, use it, otherwise try $TMUX or assume -L default.
|
2010-02-04 19:27:06 +01:00
|
|
|
*/
|
|
|
|
if (path == NULL) {
|
2010-10-18 22:00:02 +02:00
|
|
|
/* If no -L, use the environment. */
|
2010-02-04 19:27:06 +01:00
|
|
|
if (label == NULL) {
|
2015-08-31 00:56:36 +02:00
|
|
|
s = getenv("TMUX");
|
|
|
|
if (s != NULL) {
|
|
|
|
path = xstrdup(s);
|
|
|
|
path[strcspn (path, ",")] = '\0';
|
|
|
|
if (*path == '\0') {
|
|
|
|
free(path);
|
|
|
|
label = xstrdup("default");
|
|
|
|
}
|
2015-09-03 16:30:23 +02:00
|
|
|
} else
|
2010-02-04 19:27:06 +01:00
|
|
|
label = xstrdup("default");
|
|
|
|
}
|
|
|
|
|
|
|
|
/* -L or default set. */
|
|
|
|
if (label != NULL) {
|
2010-10-18 22:00:02 +02:00
|
|
|
if ((path = makesocketpath(label)) == NULL) {
|
2013-10-10 14:03:22 +02:00
|
|
|
fprintf(stderr, "can't create socket: %s\n",
|
2015-08-31 00:56:36 +02:00
|
|
|
strerror(errno));
|
2010-02-04 19:27:06 +01:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
}
|
2009-06-02 00:58:49 +02:00
|
|
|
}
|
2012-07-10 13:53:01 +02:00
|
|
|
free(label);
|
2014-01-09 15:05:55 +01:00
|
|
|
|
2015-08-31 00:56:36 +02:00
|
|
|
if (strlcpy(socket_path, path, sizeof socket_path) >=
|
|
|
|
sizeof socket_path) {
|
2014-01-09 15:05:55 +01:00
|
|
|
fprintf(stderr, "socket path too long: %s\n", path);
|
|
|
|
exit(1);
|
|
|
|
}
|
2012-07-10 13:53:01 +02:00
|
|
|
free(path);
|
2010-05-03 18:06:32 +02:00
|
|
|
|
2010-10-18 22:00:02 +02:00
|
|
|
/* Set process title. */
|
|
|
|
setproctitle("%s (%s)", __progname, socket_path);
|
2009-11-04 21:50:11 +01:00
|
|
|
|
2010-10-18 22:00:02 +02:00
|
|
|
/* Pass control to the client. */
|
2015-08-31 00:19:07 +02:00
|
|
|
exit(client_main(event_init(), argc, argv, flags));
|
2009-06-02 00:58:49 +02:00
|
|
|
}
|