client.c 32.3 KB
Newer Older
Niels Möller's avatar
Niels Möller committed
1
/* client.c
2
3
4
5
6
 *
 * $Id$ */

/* lsh, an implementation of the ssh protocol
 *
7
 * Copyright (C) 1998, 1999, 2000 Niels Mller
8
9
10
11
12
13
14
15
16
17
18
19
20
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of the GNU General Public License as
 * published by the Free Software Foundation; either version 2 of the
 * License, or (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
J.H.M. Dassen's avatar
J.H.M. Dassen committed
21
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
Niels Möller's avatar
Niels Möller committed
22
23
24
 */

#include "client.h"
25

Niels Möller's avatar
Niels Möller committed
26
#include "abstract_io.h"
27
#include "channel.h"
28
#include "channel_commands.h"
29
#include "connection.h"
30
31
32
#include "format.h"
#include "interact.h"
#include "io.h"
Niels Möller's avatar
Niels Möller committed
33
#include "pad.h"
34
35
#include "parse.h"
#include "ssh.h"
36
#include "suspend.h"
37
#include "tcpforward_commands.h"
Niels Möller's avatar
Niels Möller committed
38
#include "translate_signal.h"
39
40
#include "werror.h"
#include "xalloc.h"
41
#include "io.h"
Niels Möller's avatar
Niels Möller committed
42

43
#include <assert.h>
44
#include <string.h>
Niels Möller's avatar
Niels Möller committed
45

46
47
48
49
50
51
52
53
54
55
56
57
#include <signal.h>

#if HAVE_UNISTD_H
#include <unistd.h>
#endif

#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>

#include "lsh_argp.h"

58
59
60
61
#define GABA_DEFINE
#include "client.h.x"
#undef GABA_DEFINE

62
63
#include "client.c.x"

64
65
#define DEFAULT_ESCAPE_CHAR '~'

66
67
68
69
70
71
static struct lsh_string *
format_service_request(int name)
{
  return ssh_format("%c%a", SSH_MSG_SERVICE_REQUEST, name);
}

72
73
/* Start a service that the server has accepted (for instance
 * ssh-userauth). */
74
/* GABA:
75
76
77
78
   (class
     (name accept_service_handler)
     (super packet_handler)
     (vars
Niels Möller's avatar
Niels Möller committed
79
       (service . int)
80
       (c object command_continuation)))
81
82
*/

Niels Möller's avatar
Niels Möller committed
83
84
85
86
static void
do_accept_service(struct packet_handler *c,
		  struct ssh_connection *connection,
		  struct lsh_string *packet)
87
{
88
  CAST(accept_service_handler, closure, c);
89
90

  struct simple_buffer buffer;
91
  unsigned msg_number;
Niels Möller's avatar
Niels Möller committed
92
  int name;
93

94
95
  simple_buffer_init(&buffer, packet->length, packet->data);
  
96
97
  if (parse_uint8(&buffer, &msg_number)
      && (msg_number == SSH_MSG_SERVICE_ACCEPT)
98
99
100
101
102
103
104
105
106
      && (
#if DATAFELLOWS_WORKAROUNDS
	  (connection->peer_flags & PEER_SERVICE_ACCEPT_KLUDGE)
#else
	  0
#endif
	  || (parse_atom(&buffer, &name)
	      && (name == closure->service)))
      && parse_eod(&buffer))
107
    {
108
      connection->dispatch[SSH_MSG_SERVICE_ACCEPT] = &connection_fail_handler;
109
      
Niels Möller's avatar
Niels Möller committed
110
      COMMAND_RETURN(closure->c, connection);
111
    }
Niels Möller's avatar
Niels Möller committed
112
  else
113
    PROTOCOL_ERROR(connection->e, "Invalid SSH_MSG_SERVICE_ACCEPT message");
114
115
}

116
struct packet_handler *
117
make_accept_service_handler(UINT32 service,
118
			    struct command_continuation *c)
119
{
120
  NEW(accept_service_handler, closure);
121

Niels Möller's avatar
Niels Möller committed
122
  closure->super.handler = do_accept_service;
123
  closure->service = service;
124
  closure->c = c;
125
  
126
127
128
  return &closure->super;
}

129
void
Niels Möller's avatar
Niels Möller committed
130
131
132
do_request_service(struct command *s,
		   struct lsh_object *x,
		   struct command_continuation *c,
133
		   struct exception_handler *e UNUSED)
134
{
135
136
  CAST(request_service, self, s);
  CAST(ssh_connection, connection, x);
137
138
139

  /* NOTE: Uses the connection's exception handler, not the one passed
   * in. */
Niels Möller's avatar
Niels Möller committed
140
  connection->dispatch[SSH_MSG_SERVICE_ACCEPT]
141
    = make_accept_service_handler(self->service, c);
Niels Möller's avatar
Niels Möller committed
142
  
Niels Möller's avatar
Niels Möller committed
143
144
  C_WRITE(connection,
	  format_service_request(self->service));
145
146
}

147
148
struct command *
make_request_service(int service)
149
{
150
  NEW(request_service, closure);
151

152
  closure->super.call = do_request_service;
153
154
155
156
157
  closure->service = service;

  return &closure->super;
}

158

159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
/* GABA:
   (class
     (name detach_callback)
     (super lsh_callback)
     (vars 
       (channel_flag . int)
       (fd_flag . int)
       (exit_status . "int *")))
*/

/* GABA:
   (class
     (name detach_resource)
     (super resource)
     (vars
       (c object detach_callback)))
*/

static void 
do_detach_res_kill(struct resource *r)
{
  CAST(detach_resource,self,r);

  trace("client.c:do_detach_res\n");
  self->c->channel_flag = 1;

  if (self->c->channel_flag && self->c->fd_flag)
    /* If the fd_flag is set, the callback should be changed */
    io_callout(&self->c->super, 0);
}

static struct resource*
make_detach_resource(struct lsh_callback *c)
{
   NEW(detach_resource, self);
   CAST(detach_callback, cb, c);

   trace("client.c:make_detach_resource\n");
   init_resource(&self->super, do_detach_res_kill);

   self->c = cb;

   return &self->super;
}


static void 
206
do_detach_cb(struct lsh_callback *c)
207
208
209
{
  CAST(detach_callback,self,c);

210
  trace("client.c: do_detach_cb\n");
211
  
212
  if (!self->fd_flag) /* First time around? */
213
    {
214
      self->fd_flag = 1; /* Note */
215
      
216
217
218
    if (self->channel_flag && self->fd_flag)
      /* If the fd is closed already, asked to be called from the main loop */ 
      io_callout(c, 0);
219
220

    }
221
222
223
  else
    {
      int pid = fork();
224

225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
      /* Ignore any errors, what can we do? */
      
      switch(pid)
	{
	case -1: /* Fork failed, this we can handle by doing nothing */
	  werror("Fork failed, not detaching.\n");
	  break;
	  
	case 0:
	  /* Detach, lsh doesn't actually use these fds but dup(2)s them */
	  
	  close(STDIN_FILENO); 
	  close(STDOUT_FILENO); 
	  close(STDERR_FILENO); 
	  
	  /* Make sure they aren't used by any file lsh opens */
	  
	  open("/dev/null", O_RDONLY);
	  open("/dev/null", O_RDONLY);
	  open("/dev/null", O_RDONLY);
	  break;
	  
	default:
	  /* It's a good idea to reset std* to blocking mode. */
	  io_set_blocking(STDIN_FILENO);
	  io_set_blocking(STDOUT_FILENO);
	  io_set_blocking(STDERR_FILENO);
	  
	  exit(*self->exit_status);
	}
    }
256
257
258
259
260
261
262
}

static struct lsh_callback* 
make_detach_callback(int *exit_status)
{
   NEW(detach_callback, self);

263
   self->super.f = do_detach_cb;
264
265
266
267
268
269
270
   self->exit_status = exit_status;
   self->fd_flag = 0;
   self->channel_flag = 0;

   return &self->super;
}

271
/* GABA:
272
273
274
275
   (class
     (name exit_handler)
     (super channel_request)
     (vars
Niels Möller's avatar
Niels Möller committed
276
       (exit_status . "int *")))
277
278
*/

Niels Möller's avatar
Niels Möller committed
279
280
281
static void
do_exit_status(struct channel_request *c,
	       struct ssh_channel *channel,
Niels Möller's avatar
Niels Möller committed
282
	       struct channel_request_info *info,
283
284
285
	       struct simple_buffer *args,
	       struct command_continuation *s,
	       struct exception_handler *e)
Niels Möller's avatar
Niels Möller committed
286
{
287
  CAST(exit_handler, closure, c);
288
  UINT32 status;
Niels Möller's avatar
Niels Möller committed
289

Niels Möller's avatar
Niels Möller committed
290
  if (!info->want_reply
Niels Möller's avatar
Niels Möller committed
291
292
293
      && parse_uint32(args, &status)
      && parse_eod(args))
    {
294
295
      verbose("client.c: Receiving exit-status %i on channel %i\n",
	      status, channel->channel_number);
Niels Möller's avatar
Niels Möller committed
296

297
      *closure->exit_status = status;
298
299
      ALIST_SET(channel->request_types, ATOM_EXIT_STATUS, NULL);
      ALIST_SET(channel->request_types, ATOM_EXIT_SIGNAL, NULL);
300
      
301
      COMMAND_RETURN(s, NULL);
Niels Möller's avatar
Niels Möller committed
302
    }
Niels Möller's avatar
Niels Möller committed
303
304
  else
    /* Invalid request */
305
    PROTOCOL_ERROR(e, "Invalid exit-status message");
Niels Möller's avatar
Niels Möller committed
306
307
}

Niels Möller's avatar
Niels Möller committed
308
309
310
static void
do_exit_signal(struct channel_request *c,
	       struct ssh_channel *channel,
Niels Möller's avatar
Niels Möller committed
311
	       struct channel_request_info *info,
312
313
314
	       struct simple_buffer *args,
	       struct command_continuation *s,
	       struct exception_handler *e)
Niels Möller's avatar
Niels Möller committed
315
{
316
317
  CAST(exit_handler, closure, c);

318
  UINT32 signal;
Niels Möller's avatar
Niels Möller committed
319
320
  int core;

Niels Möller's avatar
Niels Möller committed
321
  const UINT8 *msg;
Niels Möller's avatar
Niels Möller committed
322
323
  UINT32 length;

Niels Möller's avatar
Niels Möller committed
324
  const UINT8 *language;
Niels Möller's avatar
Niels Möller committed
325
326
  UINT32 language_length;
  
Niels Möller's avatar
Niels Möller committed
327
  if (!info->want_reply
328
      && parse_atom(args, &signal)
Niels Möller's avatar
Niels Möller committed
329
330
331
332
333
334
335
336
337
338
      && parse_boolean(args, &core)
      && parse_string(args, &length, &msg)
      && parse_string(args, &language_length, &language)
      && parse_eod(args))
    {
      /* FIXME: What exit status should be returned when the remote
       * process dies violently? */

      *closure->exit_status = 7;

339
340
      werror("Remote process was killed by signal: %ups %z\n",
	     length, msg,
341
	     core ? "(core dumped remotely)\n": "");
342
      
343
344
      ALIST_SET(channel->request_types, ATOM_EXIT_STATUS, NULL);
      ALIST_SET(channel->request_types, ATOM_EXIT_SIGNAL, NULL);
Niels Möller's avatar
Niels Möller committed
345

346
      COMMAND_RETURN(s, NULL);
Niels Möller's avatar
Niels Möller committed
347
    }
Niels Möller's avatar
Niels Möller committed
348
349
  else
    /* Invalid request */
350
    PROTOCOL_ERROR(e, "Invalid exit-signal message");
Niels Möller's avatar
Niels Möller committed
351
352
}

353
354
struct channel_request *
make_handle_exit_status(int *exit_status)
Niels Möller's avatar
Niels Möller committed
355
{
356
  NEW(exit_handler, self);
Niels Möller's avatar
Niels Möller committed
357
358
359
360
361
362
363
364

  self->super.handler = do_exit_status;

  self->exit_status = exit_status;

  return &self->super;
}

365
366
struct channel_request *
make_handle_exit_signal(int *exit_status)
Niels Möller's avatar
Niels Möller committed
367
{
368
  NEW(exit_handler, self);
Niels Möller's avatar
Niels Möller committed
369
370
371
372
373
374
375
376

  self->super.handler = do_exit_signal;

  self->exit_status = exit_status;

  return &self->super;
}

377
378
379
380
381
382
383
/* GABA:
   (class
     (name session_open_command)
     (super channel_open_command)
     (vars
       ; This command can only be executed once,
       ; so we can allocate the session object in advance.
384
       (session object ssh_channel)))
385
386
387
388
389
*/

static struct ssh_channel *
new_session(struct channel_open_command *s,
	    struct ssh_connection *connection,
390
	    UINT32 local_channel_number,
391
392
393
394
	    struct lsh_string **request)
{
  CAST(session_open_command, self, s);
  struct ssh_channel *res;
395

396
  self->session->connection = connection;
397
  
398
399
400
  *request = format_channel_open(ATOM_SESSION,
				 local_channel_number,
				 self->session, "");
401
  
402
  res = self->session;
403
404
405
406
407
408
409

  /* Make sure this command can not be invoked again */
  self->session = NULL;

  return res;
}

410
411
struct command *
make_open_session_command(struct ssh_channel *session)
412
413
414
415
416
{
  NEW(session_open_command, self);
  self->super.super.call = do_channel_open_command;
  self->super.new_channel = new_session;
  self->session = session;
417
418

  return &self->super.super;
419
420
}

421
422
423
424
425
426
427
428

static struct lsh_string *
do_format_shell_request(struct channel_request_command *s UNUSED,
			struct ssh_channel *channel,
			struct command_continuation **c)
{
  return format_channel_request(ATOM_SHELL, channel, !!*c, "");
}
429

430
431
struct channel_request_command request_shell =
{ { STATIC_HEADER, do_channel_request_command }, do_format_shell_request };
432

433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465

/* GABA:
   (class
     (name exec_request)
     (super channel_request_command)
     (vars
       (command string)))
*/

static struct lsh_string *
do_format_exec_request(struct channel_request_command *s,
		       struct ssh_channel *channel,
		       struct command_continuation **c)
{
  CAST(exec_request, self, s);

  verbose("lsh: Requesting remote exec.\n");

  return format_channel_request(ATOM_EXEC, channel,
				!!*c, "%S", self->command);
}

struct command *
make_exec_request(struct lsh_string *command)
{
  NEW(exec_request, req);

  req->super.format_request = do_format_exec_request;
  req->super.super.call = do_channel_request_command;
  req->command = command;

  return &req->super.super;
}
466

467

468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
/* GABA:
   (class
     (name subsystem_request)
     (super channel_request_command)
     (vars
       (subsystem string)))
*/

static struct lsh_string *
do_format_subsystem_request(struct channel_request_command *s,
			    struct ssh_channel *channel,
			    struct command_continuation **c)
{
  CAST(subsystem_request, self, s);

  verbose("lsh: Requesting remote subsystem.\n");

  return format_channel_request(ATOM_SUBSYSTEM, channel,
				!!*c, "%S", self->subsystem);
}

struct command *
make_subsystem_request(struct lsh_string *subsystem)
{
  NEW(subsystem_request, req);

  req->super.format_request = do_format_subsystem_request;
  req->super.super.call = do_channel_request_command;
  req->subsystem = subsystem;

  return &req->super.super;
}


502
/* Handling of options and operations shared by the plain lsh client
503
 * and lshg. */
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525

/* Forward declaration */

static struct ssh_channel *
make_client_session(struct client_options *options);

/* Block size for stdout and stderr buffers */
#define BLOCK_SIZE 32768

/* Window size for the session channel
 *
 * NOTE: Large windows seem to trig a bug in sshd2. */
#define WINDOW_SIZE 10000

#define ARG_NOT 0x400

#define OPT_STDIN 0x210
#define OPT_STDOUT 0x211
#define OPT_STDERR 0x212

#define OPT_FORK_STDIO 0x213

526
#define OPT_SUBSYSTEM 0x214
527
#define OPT_DETACH 0x215
528

529
530
void
init_client_options(struct client_options *self,
531
		    struct randomness *random,
532
533
534
		    struct exception_handler *handler,
		    int *exit_code)			 
{
535
536
  self->random = random;
  
537
  self->tty = make_unix_interact();
538
539
  self->escape = -1;
  
540
541
542
543
544
  self->handler = handler;

  self->exit_code = exit_code;
  
  self->not = 0;
545
  self->port = NULL;
546
547
548
549
550
551
  self->remote = NULL;

  self->local_user = self->user = getenv("LOGNAME");

  self->with_remote_peers = 0; 
  self->with_pty = -1;
552
553
  self->with_x11 = 0;
    
554
555
556
557
558
559
  self->stdin_file = NULL;
  self->stdout_file = NULL;
  self->stderr_file = NULL;

  self->stdin_fork = 0;
  self->stdout_fork = 0;
560
  self->stderr_fork = 1;
561
562
563

  self->used_stdin = 0;
  self->used_pty = 0;
564
565
  self->used_x11 = 0;
  
566
  self->detach_end = 0;
567
  self->start_shell = 1;
568
  self->remote_forward = 0;
569
570
571
572
573

  object_queue_init(&self->actions);  
}

/* Host to connect to */
574
575
576
577
578
DEFINE_COMMAND(client_options2remote)
     (struct command *s UNUSED,
      struct lsh_object *a,
      struct command_continuation *c,
      struct exception_handler *e UNUSED)
579
580
581
582
{
  CAST_SUBTYPE(client_options, options, a);
  trace("client.c: client_options2remote\n");
  
583
  COMMAND_RETURN(c, options->remote);
584
585
586
}

/* Host to connect to */
587
588
589
590
591
DEFINE_COMMAND(client_options2actions)
     (struct command *s UNUSED,
      struct lsh_object *a,
      struct command_continuation *c,
      struct exception_handler *e UNUSED)
592
593
594
595
596
597
{
  CAST_SUBTYPE(client_options, options, a);

  trace("client.c: client_options2actions, %i actions\n",
	options->actions.length);
  
598
  COMMAND_RETURN(c, queue_to_list(&options->actions));
599
600
601
602
603
604
605
606
607
608
609
}

static const struct argp_option
client_options[] =
{
  /* Name, key, arg-name, flags, doc, group */
  { "port", 'p', "Port", 0, "Connect to this port.", 0 },
  { "user", 'l', "User name", 0, "Login as this user.", 0 },

  { NULL, 0, NULL, 0, "Actions:", CLIENT_ARGP_ACTION_GROUP },
  { "forward-local-port", 'L', "local-port:target-host:target-port", 0, "", 0 },
610
#if 0
611
612
613
614
  { "forward-remote-port", 'R', "remote-port:target-host:target-port", 0, "", 0 },
#endif
  { "nop", 'N', NULL, 0, "No operation (suppresses the default action, "
    "which is to spawn a remote shell)", 0 },
615
  { "background", 'B', NULL, 0, "Put process into the background. Implies -N.", 0 },
616
617
  { "execute", 'E', "command", 0, "Execute a command on the remote machine", 0 },
  { "shell", 'S', "command", 0, "Spawn a remote shell", 0 },
618
  { "subsystem", OPT_SUBSYSTEM, "subsystem-name", 0,
619
#if WITH_PTY_SUPPORT 
620
    "Connect to given subsystem. Implies --no-pty.",
621
#else
622
    "Connect to given subsystem.",
623
#endif
624
    0 },
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
  /* { "gateway", 'G', NULL, 0, "Setup a local gateway", 0 }, */
  { NULL, 0, NULL, 0, "Universal not:", 0 },
  { "no", 'n', NULL, 0, "Inverts the effect of the next modifier", 0 },

  { NULL, 0, NULL, 0, "Modifiers that apply to port forwarding:",
    CLIENT_ARGP_MODIFIER_GROUP - 10 },
  { "remote-peers", 'g', NULL, 0, "Allow remote access to forwarded ports", 0 },
  { "no-remote-peers", 'g' | ARG_NOT, NULL, 0, 
    "Disallow remote access to forwarded ports (default).", 0 },

  { NULL, 0, NULL, 0, "Modifiers that apply to remote execution:", 0 },
  { "stdin", OPT_STDIN, "Filename", 0, "Redirect stdin", 0},
  { "no-stdin", OPT_STDIN | ARG_NOT, NULL, 0, "Redirect stdin from /dev/null", 0}, 
  { "stdout", OPT_STDOUT, "Filename", 0, "Redirect stdout", 0},
  { "no-stdout", OPT_STDOUT | ARG_NOT, NULL, 0, "Redirect stdout to /dev/null", 0}, 
  { "stderr", OPT_STDERR, "Filename", 0, "Redirect stderr", 0},
  { "no-stderr", OPT_STDERR | ARG_NOT, NULL, 0, "Redirect stderr to /dev/null", 0}, 
642

643
  { "cvs-workaround", OPT_FORK_STDIO, "i?o?e?", OPTION_ARG_OPTIONAL,
644
645
646
647
648
649
    "Avoid setting one or more of the stdio file descriptors into "
    "non-blocking mode. If no argument is provided, the workaround is "
    "applied to all three file descriptors. By default, the workaround "
    "is applied to stderr only.", 0 },
  { "no-cvs-workaround", OPT_FORK_STDIO | ARG_NOT, NULL, 0,
    "Disable the cvs workaround.", 0 },
650
651
652
  { "detach", OPT_DETACH, NULL, 0, "Detach from terminal at session end.", 0},
  { "no-detach", OPT_DETACH | ARG_NOT, NULL, 0, "Do not detach session at end," 
    " wait for all open channels (default).", 0},
653

654
655
656
657
#if WITH_PTY_SUPPORT
  { "pty", 't', NULL, 0, "Request a remote pty (default).", 0 },
  { "no-pty", 't' | ARG_NOT, NULL, 0, "Don't request a remote pty.", 0 },
#endif /* WITH_PTY_SUPPORT */
658
659
  { "escape-char", 'e', "Character", 0, "Escape char. `none' means disable. "
    "Default is to use `~' if we have a tty, otherwise none.", 0 },
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
  { NULL, 0, NULL, 0, NULL, 0 }
};


/* GABA:
   (expr
     (name make_start_session)
     (params
       (open_session object command)
       (requests object object_list))
     (expr (lambda (connection)
       ((progn requests)
         ; Create a "session" channel
         (open_session connection)))))
*/
675

676
677
678
679
680
681
682
683
684
/* Requests a shell or command, and connects the channel to our stdio. */
/* GABA:
   (expr
     (name client_start_session)
     (params
       (request object command))
     (expr
       (lambda (session)
          (client_start_io (request session)))))
685
686
*/

687
688
689
690
691
692
693
static struct command *
make_client_start_session(struct command *request)
{
  CAST_SUBTYPE(command, r, client_start_session(request));
  return r;
}

694
695
static void
client_maybe_pty(struct client_options *options,
696
		 int default_pty,
697
		 struct object_queue *q)
698
699
{
#if WITH_PTY_SUPPORT
700
701
702
703
704
  int with_pty = options->with_pty;
  if (with_pty < 0)
    with_pty = default_pty;
  
  if (with_pty && !options->used_pty)
705
706
707
708
709
    {
      options->used_pty = 1;
      
      if (options->tty && INTERACT_IS_TTY(options->tty))
	{
710
711
712
713
714
715
716
717
718
719
720
	  struct command *get_pty = make_pty_request(options->tty);

	  if (get_pty)
	    object_queue_add_tail(q,
				  /* Ignore EXC_CHANNEL_REQUEST for the pty allocation call. */
				  &make_catch_apply
				  (make_catch_handler_info(EXC_ALL, EXC_CHANNEL_REQUEST,
							   0, NULL),
				   get_pty)->super);
	  else
	    werror("lsh: Can't use tty (probably getattr or atexit failed).\n");
721
722
	}
      else
723
724
725
726
727
728
729
730
731
732
733
734
	werror("lsh: No tty available.\n");
    }
#endif
}

static void
client_maybe_x11(struct client_options *options,
		 struct object_queue *q)
{
  if (options->with_x11)
    {
      char *display = getenv("DISPLAY");
735
736
      struct command *request = NULL;
      
737
      assert(options->random);
738
      if (display)
739
	request = make_forward_x11(display, options->random);
740
	  
741
742
743
744
      if (request)
	{
	  object_queue_add_tail(q, &request->super);
	  options->used_x11 = 1;
745
	}
746
747
      else
	werror("Can't find any local X11 display to forward.\n");
748
    }
749
}
750

751
752
753
754
755
/* Create an interactive session */
static struct command *
client_shell_session(struct client_options *options)
{
  struct ssh_channel *session = make_client_session(options);
756
  
757
758
759
  if (session)
    {
      struct object_queue session_requests;
760

761
      object_queue_init(&session_requests);
762

763
      client_maybe_pty(options, 1, &session_requests);
764
765
766
767
768
769
770
771
772
773
774
775
776
      client_maybe_x11(options, &session_requests);
  
      object_queue_add_tail(&session_requests,
			    &make_client_start_session(&request_shell.super)->super);
  
      {
	CAST_SUBTYPE(command, r,
		     make_start_session
		     (make_open_session_command(session),
		      queue_to_list_and_kill(&session_requests)));
	return r;
      }
    }
777
  else
778
    return NULL;
779
780
}

781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
/* Create a session for a subsystem */
static struct command *
client_subsystem_session(struct client_options *options,
		       struct lsh_string *subsystem)
{
  struct ssh_channel *session = make_client_session(options);
  
  if (session)
    {
      CAST_SUBTYPE(command, r,
		   make_start_session
		   (make_open_session_command(session),
		    make_object_list(1,
				     make_client_start_session
				     (make_subsystem_request(subsystem)),
				     -1)));
      return r;
    }
  
  return NULL;
}

803
804
805
806
/* Create a session executing a command line */
static struct command *
client_command_session(struct client_options *options,
		       struct lsh_string *command)
807
{
808
  struct ssh_channel *session = make_client_session(options);
809
  
810
811
  if (session)
    {
812
813
814
815
      struct object_queue session_requests;
    
      object_queue_init(&session_requests);
  
816
817
      /* NOTE: Doesn't ask for a pty by default. That's traditional
       * behaviour, although perhaps not the Right Thing. */
818
      
819
      client_maybe_pty(options, 0, &session_requests);
820
821
822
823
824
825
826
827
828
829
830
      client_maybe_x11(options, &session_requests);

      object_queue_add_tail(&session_requests,
			    &make_client_start_session(make_exec_request(command))->super);
      {
	CAST_SUBTYPE(command, r,
		     make_start_session
		     (make_open_session_command(session),
		      queue_to_list_and_kill(&session_requests)));
	return r;
      }
831
832
    }
  
833
834
835
  return NULL;
}

836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
struct command *
client_add_action(struct client_options *options,
		  struct command *action)
{
  if (action)
    object_queue_add_tail(&options->actions, &action->super);

  return action;
}

/* NOTE: Some of the original quoting is lost here. */
static struct lsh_string *
rebuild_command_line(unsigned argc, char **argv)
{
  unsigned length;
  unsigned i;
  unsigned pos;
  struct lsh_string *r;
  unsigned *alengths = alloca(sizeof(unsigned) * argc);
  
  assert (argc);
  length = argc - 1; /* Number of separating spaces. */

  for (i = 0; i<argc; i++)
    {
      alengths[i] = strlen(argv[i]);
      length += alengths[i];
    }

  r = lsh_string_alloc(length);
  memcpy(r->data, argv[0], alengths[0]);
  pos = alengths[0];
  for (i = 1; i<argc; i++)
    {
      r->data[pos++] = ' ';
      memcpy(r->data + pos, argv[i], alengths[i]);
      pos += alengths[i];
    }

  assert(pos == r->length);

  return r;
}

static int
fork_input(int in)
{
  /* pipe[0] for reading, pipe[1] for writing. */
  int pipe[2];

  if (!lsh_make_pipe(pipe))
    return -1;

  switch (fork())
    {
    case -1:
      /* Error */
      return -1;
    case 0:
      close(pipe[0]);
      if (lsh_copy_file(in, pipe[1]))
	_exit(EXIT_SUCCESS);
      else
	_exit(EXIT_FAILURE);
    default:
      /* Parent */
      close(pipe[1]);
      return pipe[0];
    }
}

static int
fork_output(int out)
{
  /* pipe[0] for reading, pipe[1] for writing. */
  int pipe[2];

  if (!lsh_make_pipe(pipe))
    return -1;

  switch (fork())
    {
    case -1:
      /* Error */
      return -1;
    case 0:
      close(pipe[1]);
      if (lsh_copy_file(pipe[0], out))
	_exit(EXIT_SUCCESS);
      else
	_exit(EXIT_FAILURE);
    default:
      /* Parent */
      close(pipe[0]);
      return pipe[1];
    }
}

934
935
936
937
938
939
/* FIXME: Use const? */

#define DEFINE_CALLBACK(name) \
static void do_##name(struct lsh_callback *self); \
static struct lsh_callback \
name = { STATIC_HEADER, do_##name }; \
940
static void do_##name(struct lsh_callback *self UNUSED)
941

942
/* A callback that exits the process immediately. */
943
DEFINE_CALLBACK(exit_callback)
944
945
946
947
{
  exit(EXIT_SUCCESS);
}

948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
DEFINE_CALLBACK(verbose_callback)
{
  verbose_flag = !verbose_flag;
  if (verbose_flag)
    verbose("Enabling verbose messages\n");
}

DEFINE_CALLBACK(debug_callback)
{
  debug_flag = !debug_flag;
  if (debug_flag)
    debug("Enabling debug messages\n");
}

DEFINE_CALLBACK(quiet_callback)
{
  quiet_flag = !quiet_flag;
  if (!quiet_flag)
    werror("Enabling warning messages\n");
}
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984

DEFINE_COMMAND(background_process)
     (struct command *s UNUSED,
      struct lsh_object *a,
      struct command_continuation *c,
      struct exception_handler *e UNUSED)
{
  switch (fork())
    {
    case 0:
      /* Child */
      /* FIXME: Should we create a new process group, close our tty
       * and stdio, etc? */
      COMMAND_RETURN(c, a);
      break;
    case -1:
      /* Error */
985
      werror("background_process: fork failed %e\n", errno);
986
987
988
989
990
991
992
      COMMAND_RETURN(c, a);
      break;
    default:
      /* Parent */
      _exit(EXIT_SUCCESS);
    }
}
993

994
995
996
997
998
/* Create a session object. stdout and stderr are shared (although
 * with independent lsh_fd objects). stdin can be used by only one
 * session (until something "session-control"/"job-control" is added).
 * */
static struct ssh_channel *
999
make_client_session(struct client_options *options)
1000
{
For faster browsing, not all history is shown. View entire blame