4 * Copyright (c) 2007 Nicholas Marriott <nicm@users.sourceforge.net>
6 * Permission to use, copy, modify, and distribute this software for any
7 * purpose with or without fee is hereby granted, provided that the above
8 * copyright notice and this permission notice appear in all copies.
10 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14 * WHATSOEVER RESULTING FROM LOSS OF MIND, USE, DATA OR PROFITS, WHETHER
15 * IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
16 * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19 #include <sys/types.h>
20 #include <sys/socket.h>
35 struct imsgbuf client_ibuf
;
36 struct event client_event
;
37 const char *client_exitmsg
;
39 enum msgtype client_exittype
;
42 int client_connect(char *, int);
43 void client_send_identify(int);
44 void client_send_environ(void);
45 void client_write_server(enum msgtype
, void *, size_t);
46 void client_update_event(void);
47 void client_signal(int, short, void *);
48 void client_callback(int, short, void *);
49 int client_dispatch_attached(void);
50 int client_dispatch_wait(void *);
52 /* Connect client to server. */
54 client_connect(char *path
, int start_server
)
56 struct sockaddr_un sa
;
60 memset(&sa
, 0, sizeof sa
);
61 sa
.sun_family
= AF_UNIX
;
62 size
= strlcpy(sa
.sun_path
, path
, sizeof sa
.sun_path
);
63 if (size
>= sizeof sa
.sun_path
) {
68 if ((fd
= socket(AF_UNIX
, SOCK_STREAM
, 0)) == -1)
69 fatal("socket failed");
71 if (connect(fd
, (struct sockaddr
*) &sa
, SUN_LEN(&sa
)) == -1) {
76 if (unlink(path
) != 0)
80 if ((fd
= server_start()) == -1)
96 /* Client main loop. */
98 client_main(int argc
, char **argv
, int flags
)
101 struct cmd_list
*cmdlist
;
102 struct msg_command_data cmddata
;
108 /* Set up the initial command. */
110 if (shell_cmd
!= NULL
) {
112 cmdflags
= CMD_STARTSERVER
;
113 } else if (argc
== 0) {
115 cmdflags
= CMD_STARTSERVER
|CMD_SENDENVIRON
|CMD_CANTNEST
;
120 * It sucks parsing the command string twice (in client and
121 * later in server) but it is necessary to get the start server
124 if ((cmdlist
= cmd_list_parse(argc
, argv
, &cause
)) == NULL
) {
125 log_warnx("%s", cause
);
128 cmdflags
&= ~CMD_STARTSERVER
;
129 TAILQ_FOREACH(cmd
, &cmdlist
->list
, qentry
) {
130 if (cmd
->entry
->flags
& CMD_STARTSERVER
)
131 cmdflags
|= CMD_STARTSERVER
;
132 if (cmd
->entry
->flags
& CMD_SENDENVIRON
)
133 cmdflags
|= CMD_SENDENVIRON
;
134 if (cmd
->entry
->flags
& CMD_CANTNEST
)
135 cmdflags
|= CMD_CANTNEST
;
137 cmd_list_free(cmdlist
);
141 * Check if this could be a nested session, if the command can't nest:
142 * if the socket path matches $TMUX, this is probably the same server.
144 if (shell_cmd
== NULL
&& environ_path
!= NULL
&&
145 cmdflags
& CMD_CANTNEST
&& strcmp(socket_path
, environ_path
) == 0) {
146 log_warnx("sessions should be nested with care. "
147 "unset $TMUX to force.");
151 /* Initialise the client socket and start the server. */
152 fd
= client_connect(socket_path
, cmdflags
& CMD_STARTSERVER
);
154 log_warn("failed to connect to server");
158 /* Set process title, log and signals now this is the client. */
159 setproctitle("client (%s)", socket_path
);
163 imsg_init(&client_ibuf
, fd
);
164 event_set(&client_event
, fd
, EV_READ
, client_callback
, shell_cmd
);
166 /* Establish signal handlers. */
167 set_signals(client_signal
);
169 /* Send initial environment. */
170 if (cmdflags
& CMD_SENDENVIRON
)
171 client_send_environ();
172 client_send_identify(flags
);
174 /* Send first command. */
175 if (msg
== MSG_COMMAND
) {
176 /* Fill in command line arguments. */
177 cmddata
.pid
= environ_pid
;
178 cmddata
.idx
= environ_idx
;
180 /* Prepare command for server. */
183 argc
, argv
, cmddata
.argv
, sizeof cmddata
.argv
) != 0) {
184 log_warnx("command too long");
188 client_write_server(msg
, &cmddata
, sizeof cmddata
);
189 } else if (msg
== MSG_SHELL
)
190 client_write_server(msg
, NULL
, 0);
192 /* Set the event and dispatch. */
193 client_update_event();
196 /* Print the exit message, if any, and exit. */
197 if (client_attached
) {
198 if (client_exitmsg
!= NULL
&& !login_shell
)
199 printf("[%s]\n", client_exitmsg
);
202 if (client_exittype
== MSG_DETACHKILL
&& ppid
> 1)
205 return (client_exitval
);
208 /* Send identify message to server with the file descriptors. */
210 client_send_identify(int flags
)
212 struct msg_identify_data data
;
218 if (getcwd(data
.cwd
, sizeof data
.cwd
) == NULL
)
221 term
= getenv("TERM");
223 strlcpy(data
.term
, term
, sizeof data
.term
) >= sizeof data
.term
)
226 if ((fd
= dup(STDIN_FILENO
)) == -1)
228 imsg_compose(&client_ibuf
,
229 MSG_IDENTIFY
, PROTOCOL_VERSION
, -1, fd
, &data
, sizeof data
);
231 if ((fd
= dup(STDOUT_FILENO
)) == -1)
233 imsg_compose(&client_ibuf
,
234 MSG_STDOUT
, PROTOCOL_VERSION
, -1, fd
, NULL
, 0);
236 if ((fd
= dup(STDERR_FILENO
)) == -1)
238 imsg_compose(&client_ibuf
,
239 MSG_STDERR
, PROTOCOL_VERSION
, -1, fd
, NULL
, 0);
242 /* Forward entire environment to server. */
244 client_send_environ(void)
246 struct msg_environ_data data
;
249 for (var
= environ
; *var
!= NULL
; var
++) {
250 if (strlcpy(data
.var
, *var
, sizeof data
.var
) >= sizeof data
.var
)
252 client_write_server(MSG_ENVIRON
, &data
, sizeof data
);
256 /* Write a message to the server without a file descriptor. */
258 client_write_server(enum msgtype type
, void *buf
, size_t len
)
260 imsg_compose(&client_ibuf
, type
, PROTOCOL_VERSION
, -1, -1, buf
, len
);
263 /* Update client event based on whether it needs to read or read and write. */
265 client_update_event(void)
269 event_del(&client_event
);
271 if (client_ibuf
.w
.queued
> 0)
274 &client_event
, client_ibuf
.fd
, events
, client_callback
, shell_cmd
);
275 event_add(&client_event
, NULL
);
278 /* Callback to handle signals in the client. */
281 client_signal(int sig
, unused
short events
, unused
void *data
)
283 struct sigaction sigact
;
286 if (!client_attached
) {
289 waitpid(WAIT_ANY
, &status
, WNOHANG
);
292 event_loopexit(NULL
);
298 client_exitmsg
= "lost tty";
300 client_write_server(MSG_EXITING
, NULL
, 0);
303 client_exitmsg
= "terminated";
305 client_write_server(MSG_EXITING
, NULL
, 0);
308 client_write_server(MSG_RESIZE
, NULL
, 0);
311 memset(&sigact
, 0, sizeof sigact
);
312 sigemptyset(&sigact
.sa_mask
);
313 sigact
.sa_flags
= SA_RESTART
;
314 sigact
.sa_handler
= SIG_IGN
;
315 if (sigaction(SIGTSTP
, &sigact
, NULL
) != 0)
316 fatal("sigaction failed");
317 client_write_server(MSG_WAKEUP
, NULL
, 0);
322 client_update_event();
325 /* Callback for client imsg read events. */
328 client_callback(unused
int fd
, short events
, void *data
)
333 if (events
& EV_READ
) {
334 if ((n
= imsg_read(&client_ibuf
)) == -1 || n
== 0)
337 retval
= client_dispatch_attached();
339 retval
= client_dispatch_wait(data
);
341 event_loopexit(NULL
);
346 if (events
& EV_WRITE
) {
347 if (msgbuf_write(&client_ibuf
.w
) < 0)
351 client_update_event();
355 client_exitmsg
= "lost server";
357 event_loopexit(NULL
);
360 /* Dispatch imsgs when in wait state (before MSG_READY). */
362 client_dispatch_wait(void *data
)
366 struct msg_shell_data shelldata
;
367 struct msg_exit_data exitdata
;
368 const char *shellcmd
= data
;
370 if ((n
= imsg_read(&client_ibuf
)) == -1 || n
== 0)
371 fatalx("imsg_read failed");
374 if ((n
= imsg_get(&client_ibuf
, &imsg
)) == -1)
375 fatalx("imsg_get failed");
378 datalen
= imsg
.hdr
.len
- IMSG_HEADER_SIZE
;
380 switch (imsg
.hdr
.type
) {
383 if (datalen
!= sizeof exitdata
) {
385 fatalx("bad MSG_EXIT size");
387 memcpy(&exitdata
, imsg
.data
, sizeof exitdata
);
388 client_exitval
= exitdata
.retcode
;
394 fatalx("bad MSG_READY size");
400 fatalx("bad MSG_VERSION size");
402 log_warnx("protocol version mismatch (client %u, "
403 "server %u)", PROTOCOL_VERSION
, imsg
.hdr
.peerid
);
409 if (datalen
!= sizeof shelldata
)
410 fatalx("bad MSG_SHELL size");
411 memcpy(&shelldata
, imsg
.data
, sizeof shelldata
);
412 shelldata
.shell
[(sizeof shelldata
.shell
) - 1] = '\0';
416 shell_exec(shelldata
.shell
, shellcmd
);
419 fatalx("unexpected message");
426 /* Dispatch imsgs in attached state (after MSG_READY). */
429 client_dispatch_attached(void)
432 struct msg_lock_data lockdata
;
433 struct sigaction sigact
;
437 if ((n
= imsg_get(&client_ibuf
, &imsg
)) == -1)
438 fatalx("imsg_get failed");
441 datalen
= imsg
.hdr
.len
- IMSG_HEADER_SIZE
;
443 log_debug("client got %d", imsg
.hdr
.type
);
444 switch (imsg
.hdr
.type
) {
448 fatalx("bad MSG_DETACH size");
450 client_exittype
= imsg
.hdr
.type
;
451 if (imsg
.hdr
.type
== MSG_DETACHKILL
)
452 client_exitmsg
= "detached and SIGHUP";
454 client_exitmsg
= "detached";
455 client_write_server(MSG_EXITING
, NULL
, 0);
459 datalen
!= sizeof (struct msg_exit_data
))
460 fatalx("bad MSG_EXIT size");
462 client_write_server(MSG_EXITING
, NULL
, 0);
463 client_exitmsg
= "exited";
467 fatalx("bad MSG_EXITED size");
473 fatalx("bad MSG_SHUTDOWN size");
475 client_write_server(MSG_EXITING
, NULL
, 0);
476 client_exitmsg
= "server exited";
481 fatalx("bad MSG_SUSPEND size");
483 memset(&sigact
, 0, sizeof sigact
);
484 sigemptyset(&sigact
.sa_mask
);
485 sigact
.sa_flags
= SA_RESTART
;
486 sigact
.sa_handler
= SIG_DFL
;
487 if (sigaction(SIGTSTP
, &sigact
, NULL
) != 0)
488 fatal("sigaction failed");
489 kill(getpid(), SIGTSTP
);
492 if (datalen
!= sizeof lockdata
)
493 fatalx("bad MSG_LOCK size");
494 memcpy(&lockdata
, imsg
.data
, sizeof lockdata
);
496 lockdata
.cmd
[(sizeof lockdata
.cmd
) - 1] = '\0';
497 system(lockdata
.cmd
);
498 client_write_server(MSG_UNLOCK
, NULL
, 0);
501 fatalx("unexpected message");