package remote import ( "bytes" "context" "encoding/base64" "errors" "fmt" "io" "log" "os" "os/exec" "path" "regexp" "strconv" "strings" "sync" "syscall" "time" "github.com/armon/circbuf" "github.com/creack/pty" "github.com/google/uuid" "github.com/scripthaus-dev/mshell/pkg/base" "github.com/scripthaus-dev/mshell/pkg/packet" "github.com/scripthaus-dev/mshell/pkg/shexec" "github.com/scripthaus-dev/mshell/pkg/statediff" "github.com/scripthaus-dev/sh2-server/pkg/scbase" "github.com/scripthaus-dev/sh2-server/pkg/scpacket" "github.com/scripthaus-dev/sh2-server/pkg/sstore" "golang.org/x/mod/semver" ) const RemoteTypeMShell = "mshell" const DefaultTerm = "xterm-256color" const DefaultMaxPtySize = 1024 * 1024 const CircBufSize = 64 * 1024 const RemoteTermRows = 8 const RemoteTermCols = 80 const PtyReadBufSize = 100 const MShellServerCommandFmt = ` PATH=$PATH:~/.mshell; which mshell-[%VERSION%] > /dev/null; if [[ "$?" -ne 0 ]] then printf "\n##N{\"type\": \"init\", \"notfound\": true, \"uname\": \"%s | %s\"}\n" "$(uname -s)" "$(uname -m)" else mshell-[%VERSION%] --server fi ` func MakeLocalMShellCommandStr(isSudo bool) (string, error) { mshellPath, err := scbase.LocalMShellBinaryPath() if err != nil { return "", err } if isSudo { return fmt.Sprintf("sudo %s --server", mshellPath), nil } else { return fmt.Sprintf("%s --server", mshellPath), nil } } func MakeServerCommandStr() string { return strings.ReplaceAll(MShellServerCommandFmt, "[%VERSION%]", semver.MajorMinor(scbase.MShellVersion)) } const ( StatusConnected = "connected" StatusConnecting = "connecting" StatusDisconnected = "disconnected" StatusError = "error" ) func init() { if scbase.MShellVersion != base.MShellVersion { panic(fmt.Sprintf("sh2-server mshell version must match '%s' vs '%s'", scbase.MShellVersion, base.MShellVersion)) } } var GlobalStore *Store type Store struct { Lock *sync.Mutex Map map[string]*MShellProc // key=remoteid CmdWaitMap map[base.CommandKey][]func() } type MShellProc struct { Lock *sync.Mutex Remote *sstore.RemoteType // runtime RemoteId string // can be read without a lock Status string ServerProc *shexec.ClientProc UName string Err error ControllingPty *os.File PtyBuffer *circbuf.Buffer MakeClientCancelFn context.CancelFunc StateMap map[string]*packet.ShellState // sha1->state CurrentState string // sha1 NumTryConnect int // install InstallStatus string NeedsMShellUpgrade bool InstallCancelFn context.CancelFunc InstallErr error RunningCmds map[base.CommandKey]RunCmdType WaitingCmds []RunCmdType PendingStateCmds map[string]base.CommandKey // key=[remoteinstance name] } type RunCmdType struct { SessionId string WindowId string RemotePtr sstore.RemotePtrType RunPacket *packet.RunPacketType } type RemoteRuntimeState struct { RemoteType string `json:"remotetype"` RemoteId string `json:"remoteid"` PhysicalId string `json:"physicalremoteid"` RemoteAlias string `json:"remotealias,omitempty"` RemoteCanonicalName string `json:"remotecanonicalname"` RemoteVars map[string]string `json:"remotevars"` DefaultFeState *sstore.FeStateType `json:"defaultfestate"` Status string `json:"status"` ErrorStr string `json:"errorstr,omitempty"` InstallStatus string `json:"installstatus"` InstallErrorStr string `json:"installerrorstr,omitempty"` NeedsMShellUpgrade bool `json:"needsmshellupgrade,omitempty"` ConnectMode string `json:"connectmode"` AutoInstall bool `json:"autoinstall"` Archived bool `json:"archived,omitempty"` RemoteIdx int64 `json:"remoteidx"` UName string `json:"uname"` MShellVersion string `json:"mshellversion"` WaitingForPassword bool `json:"waitingforpassword,omitempty"` Local bool `json:"local,omitempty"` RemoteOpts *sstore.RemoteOptsType `json:"remoteopts,omitempty"` } func (state RemoteRuntimeState) IsConnected() bool { return state.Status == StatusConnected } func (msh *MShellProc) GetStatus() string { msh.Lock.Lock() defer msh.Lock.Unlock() return msh.Status } func (msh *MShellProc) GetDefaultState() *packet.ShellState { msh.Lock.Lock() defer msh.Lock.Unlock() return msh.StateMap[msh.CurrentState] } func (msh *MShellProc) GetDefaultStatePtr() *sstore.ShellStatePtr { msh.Lock.Lock() defer msh.Lock.Unlock() if msh.CurrentState == "" { return nil } return &sstore.ShellStatePtr{BaseHash: msh.CurrentState} } func (msh *MShellProc) GetDefaultFeState() *sstore.FeStateType { state := msh.GetDefaultState() return sstore.FeStateFromShellState(state) } func (msh *MShellProc) GetStateByHash(hval string) *packet.ShellState { msh.Lock.Lock() defer msh.Lock.Unlock() return msh.StateMap[hval] } func (msh *MShellProc) GetRemoteId() string { msh.Lock.Lock() defer msh.Lock.Unlock() return msh.Remote.RemoteId } func (msh *MShellProc) GetInstallStatus() string { msh.Lock.Lock() defer msh.Lock.Unlock() return msh.InstallStatus } func (state RemoteRuntimeState) GetBaseDisplayName() string { if state.RemoteAlias != "" { return state.RemoteAlias } return state.RemoteCanonicalName } func (state RemoteRuntimeState) GetDisplayName(rptr *sstore.RemotePtrType) string { baseDisplayName := state.GetBaseDisplayName() if rptr == nil { return baseDisplayName } return rptr.GetDisplayName(baseDisplayName) } func LoadRemotes(ctx context.Context) error { GlobalStore = &Store{ Lock: &sync.Mutex{}, Map: make(map[string]*MShellProc), CmdWaitMap: make(map[base.CommandKey][]func()), } allRemotes, err := sstore.GetAllRemotes(ctx) if err != nil { return err } var numLocal int var numSudoLocal int for _, remote := range allRemotes { msh := MakeMShell(remote) GlobalStore.Map[remote.RemoteId] = msh if remote.ConnectMode == sstore.ConnectModeStartup { go msh.Launch() } if remote.Local { if remote.RemoteSudo { numSudoLocal++ } else { numLocal++ } } } if numLocal == 0 { return fmt.Errorf("no local remote found") } if numLocal > 1 { return fmt.Errorf("multiple local remotes found") } if numSudoLocal > 1 { return fmt.Errorf("multiple local sudo remotes found") } return nil } func LoadRemoteById(ctx context.Context, remoteId string) error { r, err := sstore.GetRemoteById(ctx, remoteId) if err != nil { return err } if r == nil { return fmt.Errorf("remote %s not found", remoteId) } msh := MakeMShell(r) GlobalStore.Lock.Lock() defer GlobalStore.Lock.Unlock() existingRemote := GlobalStore.Map[remoteId] if existingRemote != nil { return fmt.Errorf("cannot add remote %s, already in global map", remoteId) } GlobalStore.Map[r.RemoteId] = msh if r.ConnectMode == sstore.ConnectModeStartup { go msh.Launch() } return nil } func ReadRemotePty(ctx context.Context, remoteId string) (int64, []byte, error) { GlobalStore.Lock.Lock() defer GlobalStore.Lock.Unlock() msh := GlobalStore.Map[remoteId] if msh == nil { return 0, nil, nil } msh.Lock.Lock() defer msh.Lock.Unlock() barr := msh.PtyBuffer.Bytes() offset := msh.PtyBuffer.TotalWritten() - int64(len(barr)) return offset, barr, nil } func AddRemote(ctx context.Context, r *sstore.RemoteType) error { GlobalStore.Lock.Lock() defer GlobalStore.Lock.Unlock() existingRemote := getRemoteByCanonicalName_nolock(r.RemoteCanonicalName) if existingRemote != nil { erCopy := existingRemote.GetRemoteCopy() if !erCopy.Archived { return fmt.Errorf("duplicate canonical name %q: cannot create new remote", r.RemoteCanonicalName) } r.RemoteId = erCopy.RemoteId } if r.Local { return fmt.Errorf("cannot create another local remote (there can be only one)") } err := sstore.UpsertRemote(ctx, r) if err != nil { return fmt.Errorf("cannot create remote %q: %v", r.RemoteCanonicalName, err) } newMsh := MakeMShell(r) GlobalStore.Map[r.RemoteId] = newMsh go newMsh.NotifyRemoteUpdate() if r.ConnectMode == sstore.ConnectModeStartup { go newMsh.Launch() } return nil } func ArchiveRemote(ctx context.Context, remoteId string) error { GlobalStore.Lock.Lock() defer GlobalStore.Lock.Unlock() msh := GlobalStore.Map[remoteId] if msh == nil { return fmt.Errorf("remote not found, cannot archive") } if msh.Status == StatusConnected { return fmt.Errorf("cannot archive connected remote") } if msh.Remote.Local { return fmt.Errorf("cannot archive local remote") } rcopy := msh.GetRemoteCopy() archivedRemote := &sstore.RemoteType{ RemoteId: rcopy.RemoteId, RemoteType: rcopy.RemoteType, RemoteCanonicalName: rcopy.RemoteCanonicalName, ConnectMode: sstore.ConnectModeManual, Archived: true, } err := sstore.UpsertRemote(ctx, archivedRemote) if err != nil { return err } newMsh := MakeMShell(archivedRemote) GlobalStore.Map[remoteId] = newMsh go newMsh.NotifyRemoteUpdate() return nil } var partialUUIDRe = regexp.MustCompile("^[0-9a-f]{8}$") func isPartialUUID(s string) bool { return partialUUIDRe.MatchString(s) } func GetRemoteByArg(arg string) *MShellProc { GlobalStore.Lock.Lock() defer GlobalStore.Lock.Unlock() isPuid := isPartialUUID(arg) for _, msh := range GlobalStore.Map { rcopy := msh.GetRemoteCopy() if rcopy.RemoteAlias == arg || rcopy.RemoteCanonicalName == arg || rcopy.RemoteId == arg { return msh } if isPuid && strings.HasPrefix(rcopy.RemoteId, arg) { return msh } } return nil } func getRemoteByCanonicalName_nolock(name string) *MShellProc { for _, msh := range GlobalStore.Map { rcopy := msh.GetRemoteCopy() if rcopy.RemoteCanonicalName == name { return msh } } return nil } func GetRemoteById(remoteId string) *MShellProc { GlobalStore.Lock.Lock() defer GlobalStore.Lock.Unlock() return GlobalStore.Map[remoteId] } func GetRemoteMap() map[string]*MShellProc { GlobalStore.Lock.Lock() defer GlobalStore.Lock.Unlock() rtn := make(map[string]*MShellProc) for remoteId, msh := range GlobalStore.Map { rtn[remoteId] = msh } return rtn } func GetLocalRemote() *MShellProc { GlobalStore.Lock.Lock() defer GlobalStore.Lock.Unlock() for _, msh := range GlobalStore.Map { if msh.IsLocal() && !msh.IsSudo() { return msh } } return nil } func ResolveRemoteRef(remoteRef string) *RemoteRuntimeState { GlobalStore.Lock.Lock() defer GlobalStore.Lock.Unlock() _, err := uuid.Parse(remoteRef) if err == nil { msh := GlobalStore.Map[remoteRef] if msh != nil { state := msh.GetRemoteRuntimeState() return &state } return nil } for _, msh := range GlobalStore.Map { if msh.Remote.RemoteAlias == remoteRef || msh.Remote.RemoteCanonicalName == remoteRef { state := msh.GetRemoteRuntimeState() return &state } } return nil } func unquoteDQBashString(str string) (string, bool) { if len(str) < 2 { return str, false } if str[0] != '"' || str[len(str)-1] != '"' { return str, false } rtn := make([]byte, 0, len(str)-2) for idx := 1; idx < len(str)-1; idx++ { ch := str[idx] if ch == '"' { return str, false } if ch == '\\' { if idx == len(str)-2 { return str, false } nextCh := str[idx+1] if nextCh == '\n' { idx++ continue } if nextCh == '$' || nextCh == '"' || nextCh == '\\' || nextCh == '`' { idx++ rtn = append(rtn, nextCh) continue } rtn = append(rtn, '\\') continue } else { rtn = append(rtn, ch) } } return string(rtn), true } func makeShortHost(host string) string { dotIdx := strings.Index(host, ".") if dotIdx == -1 { return host } return host[0:dotIdx] } func (msh *MShellProc) IsLocal() bool { msh.Lock.Lock() defer msh.Lock.Unlock() return msh.Remote.Local } func (msh *MShellProc) IsSudo() bool { msh.Lock.Lock() defer msh.Lock.Unlock() return msh.Remote.RemoteSudo } func (msh *MShellProc) GetRemoteRuntimeState() RemoteRuntimeState { msh.Lock.Lock() defer msh.Lock.Unlock() state := RemoteRuntimeState{ RemoteType: msh.Remote.RemoteType, RemoteId: msh.Remote.RemoteId, RemoteAlias: msh.Remote.RemoteAlias, RemoteCanonicalName: msh.Remote.RemoteCanonicalName, PhysicalId: msh.Remote.PhysicalId, Status: msh.Status, ConnectMode: msh.Remote.ConnectMode, AutoInstall: msh.Remote.AutoInstall, Archived: msh.Remote.Archived, RemoteIdx: msh.Remote.RemoteIdx, UName: msh.UName, InstallStatus: msh.InstallStatus, NeedsMShellUpgrade: msh.NeedsMShellUpgrade, Local: msh.Remote.Local, } if msh.Remote.RemoteOpts != nil { optsCopy := *msh.Remote.RemoteOpts state.RemoteOpts = &optsCopy } if msh.Err != nil { state.ErrorStr = msh.Err.Error() } if msh.InstallErr != nil { state.InstallErrorStr = msh.InstallErr.Error() } if msh.Status == StatusConnecting { state.WaitingForPassword = msh.isWaitingForPassword_nolock() } vars := make(map[string]string) vars["user"] = msh.Remote.RemoteUser vars["bestuser"] = vars["user"] vars["host"] = msh.Remote.RemoteHost vars["shorthost"] = makeShortHost(msh.Remote.RemoteHost) vars["alias"] = msh.Remote.RemoteAlias vars["cname"] = msh.Remote.RemoteCanonicalName vars["physicalid"] = msh.Remote.PhysicalId vars["remoteid"] = msh.Remote.RemoteId vars["status"] = msh.Status vars["type"] = msh.Remote.RemoteType if msh.Remote.RemoteSudo { vars["sudo"] = "1" } if msh.Remote.Local { vars["local"] = "1" } vars["port"] = "22" if msh.Remote.SSHOpts != nil { if msh.Remote.SSHOpts.SSHPort != 0 { vars["port"] = strconv.Itoa(msh.Remote.SSHOpts.SSHPort) } } if msh.Remote.RemoteOpts != nil && msh.Remote.RemoteOpts.Color != "" { vars["color"] = msh.Remote.RemoteOpts.Color } if msh.ServerProc != nil && msh.ServerProc.InitPk != nil { state.MShellVersion = msh.ServerProc.InitPk.Version vars["home"] = msh.ServerProc.InitPk.HomeDir vars["remoteuser"] = msh.ServerProc.InitPk.User vars["bestuser"] = vars["remoteuser"] vars["remotehost"] = msh.ServerProc.InitPk.HostName vars["remoteshorthost"] = makeShortHost(msh.ServerProc.InitPk.HostName) vars["besthost"] = vars["remotehost"] vars["bestshorthost"] = vars["remoteshorthost"] } curState := msh.StateMap[msh.CurrentState] if curState != nil { state.DefaultFeState = sstore.FeStateFromShellState(curState) vars["cwd"] = curState.Cwd } if msh.Remote.Local && msh.Remote.RemoteSudo { vars["bestuser"] = "sudo" } else if msh.Remote.RemoteSudo { vars["bestuser"] = "sudo@" + vars["bestuser"] } if msh.Remote.Local { vars["bestname"] = vars["bestuser"] + "@local" vars["bestshortname"] = vars["bestuser"] + "@local" } else { vars["bestname"] = vars["bestuser"] + "@" + vars["besthost"] vars["bestshortname"] = vars["bestuser"] + "@" + vars["bestshorthost"] } state.RemoteVars = vars return state } func (msh *MShellProc) NotifyRemoteUpdate() { rstate := msh.GetRemoteRuntimeState() update := &sstore.ModelUpdate{Remotes: []interface{}{rstate}} sstore.MainBus.SendUpdate("", update) } func GetAllRemoteRuntimeState() []RemoteRuntimeState { GlobalStore.Lock.Lock() defer GlobalStore.Lock.Unlock() var rtn []RemoteRuntimeState for _, proc := range GlobalStore.Map { state := proc.GetRemoteRuntimeState() rtn = append(rtn, state) } return rtn } func GetDefaultRemoteStateById(remoteId string) (*packet.ShellState, error) { remote := GetRemoteById(remoteId) if remote == nil { return nil, fmt.Errorf("remote not found") } if !remote.IsConnected() { return nil, fmt.Errorf("remote not connected") } state := remote.GetDefaultState() if state == nil { return nil, fmt.Errorf("could not get default remote state") } return state, nil } func MakeMShell(r *sstore.RemoteType) *MShellProc { buf, err := circbuf.NewBuffer(CircBufSize) if err != nil { panic(err) // this should never happen (NewBuffer only returns an error if CirBufSize <= 0) } rtn := &MShellProc{ Lock: &sync.Mutex{}, Remote: r, RemoteId: r.RemoteId, Status: StatusDisconnected, PtyBuffer: buf, InstallStatus: StatusDisconnected, RunningCmds: make(map[base.CommandKey]RunCmdType), PendingStateCmds: make(map[string]base.CommandKey), StateMap: make(map[string]*packet.ShellState), } rtn.WriteToPtyBuffer("console for remote [%s]\n", r.GetName()) return rtn } func SendRemoteInput(pk *scpacket.RemoteInputPacketType) error { data, err := base64.StdEncoding.DecodeString(pk.InputData64) if err != nil { return fmt.Errorf("cannot decode base64: %v\n", err) } msh := GetRemoteById(pk.RemoteId) if msh == nil { return fmt.Errorf("remote not found") } var cmdPty *os.File msh.WithLock(func() { cmdPty = msh.ControllingPty }) if cmdPty == nil { return fmt.Errorf("remote has no attached pty") } _, err = cmdPty.Write(data) if err != nil { return fmt.Errorf("writing to pty: %v", err) } return nil } func convertSSHOpts(opts *sstore.SSHOpts) shexec.SSHOpts { if opts == nil || opts.Local { opts = &sstore.SSHOpts{} } return shexec.SSHOpts{ SSHHost: opts.SSHHost, SSHOptsStr: opts.SSHOptsStr, SSHIdentity: opts.SSHIdentity, SSHUser: opts.SSHUser, } } func (msh *MShellProc) addControllingTty(ecmd *exec.Cmd) (*os.File, error) { msh.Lock.Lock() defer msh.Lock.Unlock() cmdPty, cmdTty, err := pty.Open() if err != nil { return nil, err } pty.Setsize(cmdPty, &pty.Winsize{Rows: RemoteTermRows, Cols: RemoteTermCols}) msh.ControllingPty = cmdPty ecmd.ExtraFiles = append(ecmd.ExtraFiles, cmdTty) if ecmd.SysProcAttr == nil { ecmd.SysProcAttr = &syscall.SysProcAttr{} } ecmd.SysProcAttr.Setsid = true ecmd.SysProcAttr.Setctty = true ecmd.SysProcAttr.Ctty = len(ecmd.ExtraFiles) + 3 - 1 return cmdPty, nil } func (msh *MShellProc) setErrorStatus(err error) { msh.Lock.Lock() defer msh.Lock.Unlock() msh.Status = StatusError msh.Err = err go msh.NotifyRemoteUpdate() } func (msh *MShellProc) setInstallErrorStatus(err error) { msh.WriteToPtyBuffer("*error, %s\n", err.Error()) msh.Lock.Lock() defer msh.Lock.Unlock() msh.InstallStatus = StatusError msh.InstallErr = err go msh.NotifyRemoteUpdate() } func (msh *MShellProc) GetRemoteCopy() sstore.RemoteType { msh.Lock.Lock() defer msh.Lock.Unlock() return *msh.Remote } func (msh *MShellProc) GetUName() string { msh.Lock.Lock() defer msh.Lock.Unlock() return msh.UName } func (msh *MShellProc) GetNumRunningCommands() int { msh.Lock.Lock() defer msh.Lock.Unlock() return len(msh.RunningCmds) } func (msh *MShellProc) UpdateRemote(ctx context.Context, editMap map[string]interface{}) error { msh.Lock.Lock() defer msh.Lock.Unlock() updatedRemote, err := sstore.UpdateRemote(ctx, msh.Remote.RemoteId, editMap) if err != nil { return err } if updatedRemote == nil { return fmt.Errorf("no remote returned from UpdateRemote") } msh.Remote = updatedRemote go msh.NotifyRemoteUpdate() return nil } func (msh *MShellProc) Disconnect(force bool) { status := msh.GetStatus() if status != StatusConnected && status != StatusConnecting { msh.WriteToPtyBuffer("remote already disconnected (no action taken)\n") return } numCommands := msh.GetNumRunningCommands() if numCommands > 0 && !force { msh.WriteToPtyBuffer("remote not disconnected, has %d running commands. use force=1 to force disconnection\n", numCommands) return } msh.Lock.Lock() defer msh.Lock.Unlock() if msh.ServerProc != nil { msh.ServerProc.Close() } if msh.MakeClientCancelFn != nil { msh.MakeClientCancelFn() msh.MakeClientCancelFn = nil } } func (msh *MShellProc) CancelInstall() { msh.Lock.Lock() defer msh.Lock.Unlock() if msh.InstallCancelFn != nil { msh.InstallCancelFn() msh.InstallCancelFn = nil } } func (msh *MShellProc) GetRemoteName() string { msh.Lock.Lock() defer msh.Lock.Unlock() return msh.Remote.GetName() } func (msh *MShellProc) WriteToPtyBuffer(strFmt string, args ...interface{}) { msh.Lock.Lock() defer msh.Lock.Unlock() msh.writeToPtyBuffer_nolock(strFmt, args...) } func (msh *MShellProc) writeToPtyBuffer_nolock(strFmt string, args ...interface{}) { // inefficient string manipulation here and read of PtyBuffer, but these messages are rare, nbd realStr := fmt.Sprintf(strFmt, args...) if !strings.HasPrefix(realStr, "~") { realStr = strings.ReplaceAll(realStr, "\n", "\r\n") if !strings.HasSuffix(realStr, "\r\n") { realStr = realStr + "\r\n" } if strings.HasPrefix(realStr, "*") { realStr = "\033[0m\033[31mprompt>\033[0m " + realStr[1:] } else { realStr = "\033[0m\033[32mprompt>\033[0m " + realStr } barr := msh.PtyBuffer.Bytes() if len(barr) > 0 && barr[len(barr)-1] != '\n' { realStr = "\r\n" + realStr } } else { realStr = realStr[1:] } curOffset := msh.PtyBuffer.TotalWritten() data := []byte(realStr) msh.PtyBuffer.Write(data) sendRemotePtyUpdate(msh.Remote.RemoteId, curOffset, data) } func sendRemotePtyUpdate(remoteId string, dataOffset int64, data []byte) { data64 := base64.StdEncoding.EncodeToString(data) update := &sstore.PtyDataUpdate{ RemoteId: remoteId, PtyPos: dataOffset, PtyData64: data64, PtyDataLen: int64(len(data)), } sstore.MainBus.SendUpdate("", update) } func (msh *MShellProc) isWaitingForPassword_nolock() bool { barr := msh.PtyBuffer.Bytes() if len(barr) == 0 { return false } nlIdx := bytes.LastIndex(barr, []byte{'\n'}) var lastLine string if nlIdx == -1 { lastLine = string(barr) } else { lastLine = string(barr[nlIdx+1:]) } pwIdx := strings.Index(lastLine, "assword") return pwIdx != -1 } func (msh *MShellProc) RunPtyReadLoop(cmdPty *os.File) { buf := make([]byte, PtyReadBufSize) var isWaiting bool for { n, readErr := cmdPty.Read(buf) if readErr == io.EOF { break } if readErr != nil { msh.WriteToPtyBuffer("*error reading from controlling-pty: %v\n", readErr) break } var newIsWaiting bool msh.WithLock(func() { curOffset := msh.PtyBuffer.TotalWritten() msh.PtyBuffer.Write(buf[0:n]) sendRemotePtyUpdate(msh.Remote.RemoteId, curOffset, buf[0:n]) newIsWaiting = msh.isWaitingForPassword_nolock() }) if newIsWaiting != isWaiting { isWaiting = newIsWaiting go msh.NotifyRemoteUpdate() } } } func (msh *MShellProc) WaitAndSendPassword(pw string) { var numWaits int for { var isWaiting bool var isConnecting bool msh.WithLock(func() { isWaiting = msh.isWaitingForPassword_nolock() isConnecting = msh.Status == StatusConnecting }) if !isConnecting { break } if !isWaiting { numWaits = 0 time.Sleep(100 * time.Millisecond) continue } numWaits++ if numWaits < 10 { time.Sleep(100 * time.Millisecond) } else { // send password msh.WithLock(func() { if msh.ControllingPty == nil { return } pwBytes := []byte(pw + "\r") msh.writeToPtyBuffer_nolock("~[sent password]\r\n") _, err := msh.ControllingPty.Write(pwBytes) if err != nil { msh.writeToPtyBuffer_nolock("*cannot write password to controlling pty: %v\n", err) } }) break } } } func (msh *MShellProc) RunInstall() { remoteCopy := msh.GetRemoteCopy() if remoteCopy.Archived { msh.WriteToPtyBuffer("*error: cannot install on archived remote\n") return } baseStatus := msh.GetStatus() if baseStatus == StatusConnecting || baseStatus == StatusConnected { msh.WriteToPtyBuffer("*error: cannot install on remote that is connected/connecting, disconnect to install\n") return } curStatus := msh.GetInstallStatus() if curStatus == StatusConnecting { msh.WriteToPtyBuffer("*error: cannot install on remote that is already trying to install, cancel current install to try again\n") return } msh.WriteToPtyBuffer("installing mshell %s to %s...\n", scbase.MShellVersion, remoteCopy.RemoteCanonicalName) sshOpts := convertSSHOpts(remoteCopy.SSHOpts) sshOpts.SSHErrorsToTty = true cmdStr := shexec.MakeInstallCommandStr() ecmd := sshOpts.MakeSSHExecCmd(cmdStr) cmdPty, err := msh.addControllingTty(ecmd) if err != nil { statusErr := fmt.Errorf("cannot attach controlling tty to mshell install command: %w", err) msh.setInstallErrorStatus(statusErr) return } defer func() { if len(ecmd.ExtraFiles) > 0 { ecmd.ExtraFiles[len(ecmd.ExtraFiles)-1].Close() } cmdPty.Close() }() go msh.RunPtyReadLoop(cmdPty) clientCtx, clientCancelFn := context.WithCancel(context.Background()) defer clientCancelFn() msh.WithLock(func() { msh.InstallErr = nil msh.InstallStatus = StatusConnecting msh.InstallCancelFn = clientCancelFn go msh.NotifyRemoteUpdate() }) msgFn := func(msg string) { msh.WriteToPtyBuffer("%s", msg) } err = shexec.RunInstallFromCmd(clientCtx, ecmd, true, nil, scbase.MShellBinaryReader, msgFn) if err == context.Canceled { msh.WriteToPtyBuffer("*install canceled\n") msh.WithLock(func() { msh.InstallStatus = StatusDisconnected go msh.NotifyRemoteUpdate() }) return } if err != nil { statusErr := fmt.Errorf("install failed: %w", err) msh.setInstallErrorStatus(statusErr) return } msh.WithLock(func() { msh.InstallStatus = StatusDisconnected msh.InstallCancelFn = nil msh.NeedsMShellUpgrade = false }) msh.WriteToPtyBuffer("successfully installed mshell %s\n", scbase.MShellVersion) go msh.NotifyRemoteUpdate() return } func (msh *MShellProc) ReInit(ctx context.Context) (*packet.InitPacketType, error) { reinitPk := packet.MakeReInitPacket() reinitPk.ReqId = uuid.New().String() resp, err := msh.PacketRpcRaw(ctx, reinitPk) if err != nil { return nil, err } if resp == nil { return nil, fmt.Errorf("no response") } initPk, ok := resp.(*packet.InitPacketType) if !ok { return nil, fmt.Errorf("invalid reinit response (not an initpacket): %T", resp) } if initPk.State == nil { return nil, fmt.Errorf("invalid reinit response initpk does not contain remote state") } hval := initPk.State.GetHashVal(false) sstore.StoreStateBase(ctx, initPk.State) msh.WithLock(func() { msh.CurrentState = hval msh.StateMap[hval] = initPk.State }) return initPk, nil } func addScVarsToState(state *packet.ShellState) *packet.ShellState { if state == nil { return nil } rtn := *state envMap := shexec.DeclMapFromState(&rtn) envMap["PROMPT"] = &shexec.DeclareDeclType{Name: "PROMPT", Value: "1"} envMap["PROMPT_VERSION"] = &shexec.DeclareDeclType{Name: "PROMPT_VERSION", Value: scbase.PromptVersion} rtn.ShellVars = shexec.SerializeDeclMap(envMap) return &rtn } func stripScVarsFromState(state *packet.ShellState) *packet.ShellState { if state == nil { return nil } rtn := *state rtn.HashVal = "" envMap := shexec.DeclMapFromState(&rtn) delete(envMap, "PROMPT") delete(envMap, "PROMPT_VERSION") rtn.ShellVars = shexec.SerializeDeclMap(envMap) return &rtn } func stripScVarsFromStateDiff(stateDiff *packet.ShellStateDiff) *packet.ShellStateDiff { if stateDiff == nil || len(stateDiff.VarsDiff) == 0 { return stateDiff } rtn := *stateDiff rtn.HashVal = "" var mapDiff statediff.MapDiffType err := mapDiff.Decode(stateDiff.VarsDiff) if err != nil { return stateDiff } delete(mapDiff.ToAdd, "PROMPT") delete(mapDiff.ToAdd, "PROMPT_VERSION") rtn.VarsDiff = mapDiff.Encode() return &rtn } func (msh *MShellProc) Launch() { remoteCopy := msh.GetRemoteCopy() if remoteCopy.Archived { msh.WriteToPtyBuffer("cannot launch archived remote\n") return } curStatus := msh.GetStatus() if curStatus == StatusConnected { msh.WriteToPtyBuffer("remote is already connected (no action taken)\n") return } if curStatus == StatusConnecting { msh.WriteToPtyBuffer("remote is already connecting, disconnect before trying to connect again\n") return } istatus := msh.GetInstallStatus() if istatus == StatusConnecting { msh.WriteToPtyBuffer("remote is trying to install, cancel install before trying to connect again\n") return } msh.WriteToPtyBuffer("connecting to %s...\n", remoteCopy.RemoteCanonicalName) sshOpts := convertSSHOpts(remoteCopy.SSHOpts) sshOpts.SSHErrorsToTty = true if remoteCopy.ConnectMode != sstore.ConnectModeManual && remoteCopy.SSHOpts.SSHPassword == "" { sshOpts.BatchMode = true } var cmdStr string if sshOpts.SSHHost == "" && remoteCopy.Local { var err error cmdStr, err = MakeLocalMShellCommandStr(remoteCopy.RemoteSudo) if err != nil { msh.WriteToPtyBuffer("*error, cannot find local mshell binary: %v\n", err) return } log.Printf("local mshell binary: %s\n", cmdStr) } else { cmdStr = MakeServerCommandStr() } ecmd := sshOpts.MakeSSHExecCmd(cmdStr) cmdPty, err := msh.addControllingTty(ecmd) if err != nil { statusErr := fmt.Errorf("cannot attach controlling tty to mshell command: %w", err) msh.WriteToPtyBuffer("*error, %s\n", statusErr.Error()) msh.setErrorStatus(statusErr) return } defer func() { if len(ecmd.ExtraFiles) > 0 { ecmd.ExtraFiles[len(ecmd.ExtraFiles)-1].Close() } }() go msh.RunPtyReadLoop(cmdPty) if remoteCopy.SSHOpts.SSHPassword != "" { go msh.WaitAndSendPassword(remoteCopy.SSHOpts.SSHPassword) } makeClientCtx, makeClientCancelFn := context.WithCancel(context.Background()) defer makeClientCancelFn() msh.WithLock(func() { msh.Err = nil msh.Status = StatusConnecting msh.MakeClientCancelFn = makeClientCancelFn go msh.NotifyRemoteUpdate() }) cproc, initPk, err := shexec.MakeClientProc(makeClientCtx, ecmd) // TODO check if initPk.State is not nil var mshellVersion string var stateBaseHash string msh.WithLock(func() { msh.MakeClientCancelFn = nil if initPk != nil { msh.UName = initPk.UName mshellVersion = initPk.Version if semver.Compare(mshellVersion, scbase.MShellVersion) < 0 { // only set NeedsMShellUpgrade if we got an InitPk msh.NeedsMShellUpgrade = true } } if initPk != nil && initPk.State != nil { hval := initPk.State.GetHashVal(false) msh.CurrentState = hval msh.StateMap[hval] = initPk.State sstore.StoreStateBase(context.Background(), initPk.State) stateBaseHash = hval } else { msh.CurrentState = "" } // no notify here, because we'll call notify in either case below }) if err == context.Canceled { msh.WriteToPtyBuffer("*forced disconnection\n") msh.WithLock(func() { msh.Status = StatusDisconnected go msh.NotifyRemoteUpdate() }) return } if err == nil && semver.MajorMinor(mshellVersion) != semver.MajorMinor(scbase.MShellVersion) { err = fmt.Errorf("mshell version is not compatible current=%s remote=%s", scbase.MShellVersion, mshellVersion) } if err != nil { msh.setErrorStatus(err) msh.WriteToPtyBuffer("*error connecting to remote: %v\n", err) return } msh.WriteToPtyBuffer("connected state:%s\n", stateBaseHash) msh.WithLock(func() { msh.ServerProc = cproc msh.Status = StatusConnected go msh.NotifyRemoteUpdate() }) go func() { exitErr := cproc.Cmd.Wait() exitCode := shexec.GetExitCode(exitErr) msh.WithLock(func() { if msh.Status == StatusConnected || msh.Status == StatusConnecting { msh.Status = StatusDisconnected go msh.NotifyRemoteUpdate() } }) msh.WriteToPtyBuffer("*disconnected exitcode=%d\n", exitCode) }() go msh.ProcessPackets() return } func (msh *MShellProc) IsConnected() bool { msh.Lock.Lock() defer msh.Lock.Unlock() return msh.Status == StatusConnected } func replaceHomePath(pathStr string, homeDir string) string { if homeDir == "" { return pathStr } if pathStr == homeDir { return "~" } if strings.HasPrefix(pathStr, homeDir+"/") { return "~" + pathStr[len(homeDir):] } return pathStr } func (state RemoteRuntimeState) ExpandHomeDir(pathStr string) (string, error) { if pathStr != "~" && !strings.HasPrefix(pathStr, "~/") { return pathStr, nil } homeDir := state.RemoteVars["home"] if homeDir == "" { return "", fmt.Errorf("remote does not have HOME set, cannot do ~ expansion") } if pathStr == "~" { return homeDir, nil } return path.Join(homeDir, pathStr[2:]), nil } func (msh *MShellProc) IsCmdRunning(ck base.CommandKey) bool { msh.Lock.Lock() defer msh.Lock.Unlock() for runningCk, _ := range msh.RunningCmds { if runningCk == ck { return true } } return false } func (msh *MShellProc) SendInput(dataPk *packet.DataPacketType) error { if !msh.IsConnected() { return fmt.Errorf("remote is not connected, cannot send input") } if !msh.IsCmdRunning(dataPk.CK) { return fmt.Errorf("cannot send input, cmd is not running") } return msh.ServerProc.Input.SendPacket(dataPk) } func (msh *MShellProc) SendSpecialInput(siPk *packet.SpecialInputPacketType) error { if !msh.IsConnected() { return fmt.Errorf("remote is not connected, cannot send input") } if !msh.IsCmdRunning(siPk.CK) { return fmt.Errorf("cannot send input, cmd is not running") } return msh.ServerProc.Input.SendPacket(siPk) } func makeTermOpts(runPk *packet.RunPacketType) sstore.TermOpts { return sstore.TermOpts{Rows: int64(runPk.TermOpts.Rows), Cols: int64(runPk.TermOpts.Cols), FlexRows: true, MaxPtySize: DefaultMaxPtySize} } // returns (ok, currentPSC) func (msh *MShellProc) testAndSetPendingStateCmd(riName string, newCK *base.CommandKey) (bool, *base.CommandKey) { msh.Lock.Lock() defer msh.Lock.Unlock() ck, found := msh.PendingStateCmds[riName] if found { return false, &ck } if newCK != nil { msh.PendingStateCmds[riName] = *newCK } return true, nil } func (msh *MShellProc) removePendingStateCmd(riName string, ck base.CommandKey) { msh.Lock.Lock() defer msh.Lock.Unlock() existingCK, found := msh.PendingStateCmds[riName] if !found { return } if existingCK == ck { delete(msh.PendingStateCmds, riName) } } // returns (cmdtype, allow-updates-callback, err) func RunCommand(ctx context.Context, sessionId string, windowId string, remotePtr sstore.RemotePtrType, runPacket *packet.RunPacketType) (rtnCmd *sstore.CmdType, rtnCallback func(), rtnErr error) { rct := RunCmdType{ SessionId: sessionId, WindowId: windowId, RemotePtr: remotePtr, RunPacket: runPacket, } if remotePtr.OwnerId != "" { return nil, nil, fmt.Errorf("cannot run command against another user's remote '%s'", remotePtr.MakeFullRemoteRef()) } if sessionId != runPacket.CK.GetSessionId() { return nil, nil, fmt.Errorf("run commands sessionids do not match") } msh := GetRemoteById(remotePtr.RemoteId) if msh == nil { return nil, nil, fmt.Errorf("no remote id=%s found", remotePtr.RemoteId) } if !msh.IsConnected() { return nil, nil, fmt.Errorf("remote '%s' is not connected", remotePtr.RemoteId) } if runPacket.State != nil { return nil, nil, fmt.Errorf("runPacket.State should not be set, it is set in RunCommand") } var newPSC *base.CommandKey if runPacket.ReturnState { newPSC = &runPacket.CK } ok, existingPSC := msh.testAndSetPendingStateCmd(remotePtr.Name, newPSC) if !ok { line, _, err := sstore.GetLineCmdByCmdId(ctx, sessionId, windowId, existingPSC.GetCmdId()) if err != nil { return nil, nil, fmt.Errorf("cannot run command while a stateful command is still running: %v", err) } if line == nil { return nil, nil, fmt.Errorf("cannot run command while a stateful command is still running %s", *existingPSC) } return nil, nil, fmt.Errorf("cannot run command while a stateful command (linenum=%d) is still running", line.LineNum) } startCmdWait(runPacket.CK) defer func() { if rtnErr != nil { removeCmdWait(runPacket.CK) if newPSC != nil { msh.removePendingStateCmd(remotePtr.Name, *newPSC) } } }() // get current remote-instance state statePtr, err := sstore.GetRemoteStatePtr(ctx, sessionId, windowId, remotePtr) if err != nil { return nil, nil, fmt.Errorf("cannot get current remote stateptr: %w", err) } if statePtr == nil { statePtr = msh.GetDefaultStatePtr() } if statePtr == nil { return nil, nil, fmt.Errorf("cannot run command, no valid remote stateptr") } currentState, err := sstore.GetFullState(ctx, *statePtr) if err != nil || currentState == nil { return nil, nil, fmt.Errorf("cannot get current remote state: %w", err) } runPacket.State = addScVarsToState(currentState) runPacket.StateComplete = true msh.ServerProc.Output.RegisterRpc(runPacket.ReqId) err = shexec.SendRunPacketAndRunData(ctx, msh.ServerProc.Input, runPacket) if err != nil { return nil, nil, fmt.Errorf("sending run packet to remote: %w", err) } rtnPk := msh.ServerProc.Output.WaitForResponse(ctx, runPacket.ReqId) if rtnPk == nil { return nil, nil, ctx.Err() } startPk, ok := rtnPk.(*packet.CmdStartPacketType) if !ok { respPk, ok := rtnPk.(*packet.ResponsePacketType) if !ok { return nil, nil, fmt.Errorf("invalid response received from server for run packet: %s", packet.AsString(rtnPk)) } if respPk.Error != "" { return nil, nil, errors.New(respPk.Error) } return nil, nil, fmt.Errorf("invalid response received from server for run packet: %s", packet.AsString(rtnPk)) } status := sstore.CmdStatusRunning if runPacket.Detached { status = sstore.CmdStatusDetached } cmd := &sstore.CmdType{ SessionId: runPacket.CK.GetSessionId(), CmdId: runPacket.CK.GetCmdId(), CmdStr: runPacket.Command, Remote: remotePtr, FeState: *sstore.FeStateFromShellState(currentState), StatePtr: *statePtr, TermOpts: makeTermOpts(runPacket), Status: status, StartPk: startPk, DoneInfo: nil, RunOut: nil, RtnState: runPacket.ReturnState, } err = sstore.CreateCmdPtyFile(ctx, cmd.SessionId, cmd.CmdId, cmd.TermOpts.MaxPtySize) if err != nil { // TODO the cmd is running, so this is a tricky error to handle return nil, nil, fmt.Errorf("cannot create local ptyout file for running command: %v", err) } msh.AddRunningCmd(rct) return cmd, func() { removeCmdWait(runPacket.CK) }, nil } func (msh *MShellProc) AddWaitingCmd(rct RunCmdType) { msh.Lock.Lock() defer msh.Lock.Unlock() msh.WaitingCmds = append(msh.WaitingCmds, rct) } func (msh *MShellProc) reExecSingle(rct RunCmdType) { // TODO fixme ctx, cancelFn := context.WithTimeout(context.Background(), 15*time.Second) defer cancelFn() _, callback, _ := RunCommand(ctx, rct.SessionId, rct.WindowId, rct.RemotePtr, rct.RunPacket) if callback != nil { defer callback() } } func (msh *MShellProc) ReExecWaitingCmds() { msh.Lock.Lock() defer msh.Lock.Unlock() for len(msh.WaitingCmds) > 0 { rct := msh.WaitingCmds[0] go msh.reExecSingle(rct) if rct.RunPacket.ReturnState { break } } if len(msh.WaitingCmds) == 0 { msh.WaitingCmds = nil } } func (msh *MShellProc) AddRunningCmd(rct RunCmdType) { msh.Lock.Lock() defer msh.Lock.Unlock() msh.RunningCmds[rct.RunPacket.CK] = rct } func (msh *MShellProc) GetRunningCmd(ck base.CommandKey) *RunCmdType { msh.Lock.Lock() defer msh.Lock.Unlock() rct, found := msh.RunningCmds[ck] if !found { return nil } return &rct } func (msh *MShellProc) RemoveRunningCmd(ck base.CommandKey) { msh.Lock.Lock() defer msh.Lock.Unlock() delete(msh.RunningCmds, ck) for name, pendingCk := range msh.PendingStateCmds { if pendingCk == ck { delete(msh.PendingStateCmds, name) } } } func (msh *MShellProc) PacketRpcRaw(ctx context.Context, pk packet.RpcPacketType) (packet.RpcResponsePacketType, error) { if !msh.IsConnected() { return nil, fmt.Errorf("runner is not connected") } if pk == nil { return nil, fmt.Errorf("PacketRpc passed nil packet") } reqId := pk.GetReqId() msh.ServerProc.Output.RegisterRpc(reqId) defer msh.ServerProc.Output.UnRegisterRpc(reqId) err := msh.ServerProc.Input.SendPacketCtx(ctx, pk) if err != nil { return nil, err } rtnPk := msh.ServerProc.Output.WaitForResponse(ctx, reqId) if rtnPk == nil { return nil, ctx.Err() } return rtnPk, nil } func (msh *MShellProc) PacketRpc(ctx context.Context, pk packet.RpcPacketType) (*packet.ResponsePacketType, error) { rtnPk, err := msh.PacketRpcRaw(ctx, pk) if err != nil { return nil, err } if respPk, ok := rtnPk.(*packet.ResponsePacketType); ok { return respPk, nil } return nil, fmt.Errorf("invalid response packet received: %s", packet.AsString(rtnPk)) } func (msh *MShellProc) WithLock(fn func()) { msh.Lock.Lock() defer msh.Lock.Unlock() fn() } func makeDataAckPacket(ck base.CommandKey, fdNum int, ackLen int, err error) *packet.DataAckPacketType { ack := packet.MakeDataAckPacket() ack.CK = ck ack.FdNum = fdNum ack.AckLen = ackLen if err != nil { ack.Error = err.Error() } return ack } func (msh *MShellProc) notifyHangups_nolock() { for ck, _ := range msh.RunningCmds { cmd, err := sstore.GetCmdById(context.Background(), ck.GetSessionId(), ck.GetCmdId()) if err != nil { continue } update := sstore.ModelUpdate{Cmd: cmd} sstore.MainBus.SendUpdate(ck.GetSessionId(), update) } msh.RunningCmds = make(map[base.CommandKey]RunCmdType) } func (msh *MShellProc) handleCmdDonePacket(donePk *packet.CmdDonePacketType) { // this will remove from RunningCmds and from PendingStateCmds defer msh.RemoveRunningCmd(donePk.CK) if donePk.FinalState != nil { donePk.FinalState = stripScVarsFromState(donePk.FinalState) } if donePk.FinalStateDiff != nil { donePk.FinalStateDiff = stripScVarsFromStateDiff(donePk.FinalStateDiff) } doneInfo := &sstore.CmdDoneInfo{ Ts: donePk.Ts, ExitCode: int64(donePk.ExitCode), DurationMs: donePk.DurationMs, } update, err := sstore.UpdateCmdDoneInfo(context.Background(), donePk.CK, doneInfo) if err != nil { msh.WriteToPtyBuffer("*error updating cmddone: %v\n", err) return } sws, err := sstore.UpdateSWsWithCmdFg(context.Background(), donePk.CK.GetSessionId(), donePk.CK.GetCmdId()) if err != nil { msh.WriteToPtyBuffer("*error trying to update cmd-fg screen windows: %v\n", err) // fall-through (nothing to do) } update.ScreenWindows = sws rct := msh.GetRunningCmd(donePk.CK) var statePtr *sstore.ShellStatePtr if donePk.FinalState != nil && rct != nil { feState := sstore.FeStateFromShellState(donePk.FinalState) remoteInst, err := sstore.UpdateRemoteState(context.Background(), rct.SessionId, rct.WindowId, rct.RemotePtr, *feState, donePk.FinalState, nil) if err != nil { msh.WriteToPtyBuffer("*error trying to update remotestate: %v\n", err) // fall-through (nothing to do) } if remoteInst != nil { update.Sessions = sstore.MakeSessionsUpdateForRemote(rct.SessionId, remoteInst) } statePtr = &sstore.ShellStatePtr{BaseHash: donePk.FinalState.GetHashVal(false)} } else if donePk.FinalStateDiff != nil && rct != nil { feState, err := msh.getFeStateFromDiff(donePk.FinalStateDiff) if err != nil { msh.WriteToPtyBuffer("*error trying to update remotestate: %v\n", err) // fall-through (nothing to do) } else { remoteInst, err := sstore.UpdateRemoteState(context.Background(), rct.SessionId, rct.WindowId, rct.RemotePtr, *feState, nil, donePk.FinalStateDiff) if err != nil { msh.WriteToPtyBuffer("*error trying to update remotestate: %v\n", err) // fall-through (nothing to do) } if remoteInst != nil { update.Sessions = sstore.MakeSessionsUpdateForRemote(rct.SessionId, remoteInst) } diffHashArr := append(([]string)(nil), donePk.FinalStateDiff.DiffHashArr...) diffHashArr = append(diffHashArr, donePk.FinalStateDiff.GetHashVal(false)) statePtr = &sstore.ShellStatePtr{BaseHash: donePk.FinalStateDiff.BaseHash, DiffHashArr: diffHashArr} } } if statePtr != nil { err = sstore.UpdateCmdRtnState(context.Background(), donePk.CK, *statePtr) if err != nil { msh.WriteToPtyBuffer("*error trying to update cmd rtnstate: %v\n", err) // fall-through (nothing to do) } } sstore.MainBus.SendUpdate(donePk.CK.GetSessionId(), update) return } func (msh *MShellProc) handleCmdFinalPacket(finalPk *packet.CmdFinalPacketType) { defer msh.RemoveRunningCmd(finalPk.CK) rtnCmd, err := sstore.GetCmdById(context.Background(), finalPk.CK.GetSessionId(), finalPk.CK.GetCmdId()) if err != nil { log.Printf("error calling GetCmdById in handleCmdFinalPacket: %v\n", err) return } if rtnCmd == nil || rtnCmd.DoneInfo != nil { return } log.Printf("finalpk %s (hangup): %s\n", finalPk.CK, finalPk.Error) sstore.HangupCmd(context.Background(), finalPk.CK) rtnCmd, err = sstore.GetCmdById(context.Background(), finalPk.CK.GetSessionId(), finalPk.CK.GetCmdId()) if err != nil { log.Printf("error getting cmd(2) in handleCmdFinalPacket: %v\n", err) return } if rtnCmd == nil { log.Printf("error getting cmd(2) in handleCmdFinalPacket (not found)\n") return } update := &sstore.ModelUpdate{Cmd: rtnCmd} sstore.MainBus.SendUpdate(finalPk.CK.GetSessionId(), update) } // TODO notify FE about cmd errors func (msh *MShellProc) handleCmdErrorPacket(errPk *packet.CmdErrorPacketType) { err := sstore.AppendCmdErrorPk(context.Background(), errPk) if err != nil { msh.WriteToPtyBuffer("cmderr> [remote %s] [error] adding cmderr: %v\n", msh.GetRemoteName(), err) return } return } func (msh *MShellProc) handleDataPacket(dataPk *packet.DataPacketType, dataPosMap map[base.CommandKey]int64) { realData, err := base64.StdEncoding.DecodeString(dataPk.Data64) if err != nil { ack := makeDataAckPacket(dataPk.CK, dataPk.FdNum, 0, err) msh.ServerProc.Input.SendPacket(ack) return } var ack *packet.DataAckPacketType if len(realData) > 0 { dataPos := dataPosMap[dataPk.CK] update, err := sstore.AppendToCmdPtyBlob(context.Background(), dataPk.CK.GetSessionId(), dataPk.CK.GetCmdId(), realData, dataPos) if err != nil { ack = makeDataAckPacket(dataPk.CK, dataPk.FdNum, 0, err) } else { ack = makeDataAckPacket(dataPk.CK, dataPk.FdNum, len(realData), nil) } dataPosMap[dataPk.CK] += int64(len(realData)) if update != nil { sstore.MainBus.SendUpdate(dataPk.CK.GetSessionId(), update) } } if ack != nil { msh.ServerProc.Input.SendPacket(ack) } // log.Printf("data %s fd=%d len=%d eof=%v err=%v\n", dataPk.CK, dataPk.FdNum, len(realData), dataPk.Eof, dataPk.Error) } func (msh *MShellProc) makeHandleDataPacketClosure(dataPk *packet.DataPacketType, dataPosMap map[base.CommandKey]int64) func() { return func() { msh.handleDataPacket(dataPk, dataPosMap) } } func (msh *MShellProc) makeHandleCmdDonePacketClosure(donePk *packet.CmdDonePacketType) func() { return func() { msh.handleCmdDonePacket(donePk) } } func (msh *MShellProc) makeHandleCmdFinalPacketClosure(finalPk *packet.CmdFinalPacketType) func() { return func() { msh.handleCmdFinalPacket(finalPk) } } func (msh *MShellProc) ProcessPackets() { defer msh.WithLock(func() { if msh.Status == StatusConnected { msh.Status = StatusDisconnected } err := sstore.HangupRunningCmdsByRemoteId(context.Background(), msh.Remote.RemoteId) if err != nil { msh.writeToPtyBuffer_nolock("error calling HUP on cmds %v\n", err) } msh.notifyHangups_nolock() go msh.NotifyRemoteUpdate() }) dataPosMap := make(map[base.CommandKey]int64) for pk := range msh.ServerProc.Output.MainCh { if pk.GetType() == packet.DataPacketStr { dataPk := pk.(*packet.DataPacketType) runCmdUpdateFn(dataPk.CK, msh.makeHandleDataPacketClosure(dataPk, dataPosMap)) continue } if pk.GetType() == packet.DataAckPacketStr { // TODO process ack (need to keep track of buffer size for sending) // this is low priority though since most input is coming from keyboard and won't overflow this buffer continue } if pk.GetType() == packet.CmdDataPacketStr { dataPacket := pk.(*packet.CmdDataPacketType) msh.WriteToPtyBuffer("cmd-data> [remote %s] [%s] pty=%d run=%d\n", msh.GetRemoteName(), dataPacket.CK, dataPacket.PtyDataLen, dataPacket.RunDataLen) continue } if pk.GetType() == packet.CmdDonePacketStr { donePk := pk.(*packet.CmdDonePacketType) runCmdUpdateFn(donePk.CK, msh.makeHandleCmdDonePacketClosure(donePk)) continue } if pk.GetType() == packet.CmdFinalPacketStr { finalPk := pk.(*packet.CmdFinalPacketType) runCmdUpdateFn(finalPk.CK, msh.makeHandleCmdFinalPacketClosure(finalPk)) continue } if pk.GetType() == packet.CmdErrorPacketStr { msh.handleCmdErrorPacket(pk.(*packet.CmdErrorPacketType)) continue } if pk.GetType() == packet.MessagePacketStr { msgPacket := pk.(*packet.MessagePacketType) msh.WriteToPtyBuffer("msg> [remote %s] [%s] %s\n", msh.GetRemoteName(), msgPacket.CK, msgPacket.Message) continue } if pk.GetType() == packet.RawPacketStr { rawPacket := pk.(*packet.RawPacketType) msh.WriteToPtyBuffer("stderr> [remote %s] %s\n", msh.GetRemoteName(), rawPacket.Data) continue } if pk.GetType() == packet.CmdStartPacketStr { startPk := pk.(*packet.CmdStartPacketType) msh.WriteToPtyBuffer("start> [remote %s] reqid=%s (%p)\n", msh.GetRemoteName(), startPk.RespId, msh.ServerProc.Output) continue } msh.WriteToPtyBuffer("MSH> [remote %s] unhandled packet %s\n", msh.GetRemoteName(), packet.AsString(pk)) } } // returns number of chars (including braces) for brace-expr func getBracedStr(runeStr []rune) int { if len(runeStr) < 3 { return 0 } if runeStr[0] != '{' { return 0 } for i := 1; i < len(runeStr); i++ { if runeStr[i] == '}' { if i == 1 { // cannot have {} return 0 } return i + 1 } } return 0 } func isDigit(r rune) bool { return r >= '0' && r <= '9' // just check ascii digits (not unicode) } func EvalPrompt(promptFmt string, vars map[string]string, state *packet.ShellState) string { var buf bytes.Buffer promptRunes := []rune(promptFmt) for i := 0; i < len(promptRunes); i++ { ch := promptRunes[i] if ch == '\\' && i != len(promptRunes)-1 { nextCh := promptRunes[i+1] if nextCh == 'x' || nextCh == 'y' { nr := getBracedStr(promptRunes[i+2:]) if nr > 0 { escCode := string(promptRunes[i+1 : i+1+nr+1]) // start at "x" or "y", extend nr+1 runes escStr := evalPromptEsc(escCode, vars, state) buf.WriteString(escStr) i += nr + 1 continue } else { buf.WriteRune(ch) // invalid escape, so just write ch and move on continue } } else if isDigit(nextCh) { if len(promptRunes) >= i+4 && isDigit(promptRunes[i+2]) && isDigit(promptRunes[i+3]) { i += 3 escStr := evalPromptEsc(string(promptRunes[i+1:i+4]), vars, state) buf.WriteString(escStr) continue } else { buf.WriteRune(ch) // invalid escape, so just write ch and move on continue } } else { i += 1 escStr := evalPromptEsc(string(nextCh), vars, state) buf.WriteString(escStr) continue } } buf.WriteRune(ch) } return buf.String() } func evalPromptEsc(escCode string, vars map[string]string, state *packet.ShellState) string { if strings.HasPrefix(escCode, "x{") && strings.HasSuffix(escCode, "}") { varName := escCode[2 : len(escCode)-1] return vars[varName] } if strings.HasPrefix(escCode, "y{") && strings.HasSuffix(escCode, "}") { if state == nil { return "" } varName := escCode[2 : len(escCode)-1] varMap := shexec.ShellVarMapFromState(state) return varMap[varName] } if escCode == "h" { return vars["remoteshorthost"] } if escCode == "H" { return vars["remotehost"] } if escCode == "s" { return "mshell" } if escCode == "u" { return vars["remoteuser"] } if escCode == "w" { if state == nil { return "?" } return replaceHomePath(state.Cwd, vars["home"]) } if escCode == "W" { if state == nil { return "?" } return path.Base(replaceHomePath(state.Cwd, vars["home"])) } if escCode == "$" { if vars["remoteuser"] == "root" || vars["sudo"] == "1" { return "#" } else { return "$" } } if len(escCode) == 3 { // \nnn escape ival, err := strconv.ParseInt(escCode, 8, 32) if err != nil { return escCode } return string([]byte{byte(ival)}) } if escCode == "e" { return "\033" } if escCode == "n" { return "\n" } if escCode == "r" { return "\r" } if escCode == "a" { return "\007" } if escCode == "\\" { return "\\" } if escCode == "[" { return "" } if escCode == "]" { return "" } // we don't support date/time escapes (d, t, T, @), version escapes (v, V), cmd number (#, !), terminal device (l), jobs (j) return "(" + escCode + ")" } func (msh *MShellProc) getFullState(stateDiff *packet.ShellStateDiff) (*packet.ShellState, error) { baseState := msh.GetStateByHash(stateDiff.BaseHash) if baseState != nil && len(stateDiff.DiffHashArr) == 0 { newState, err := shexec.ApplyShellStateDiff(*baseState, *stateDiff) if err != nil { return nil, err } return &newState, nil } else { fullState, err := sstore.GetFullState(context.Background(), sstore.ShellStatePtr{stateDiff.BaseHash, stateDiff.DiffHashArr}) if err != nil { return nil, err } newState, err := shexec.ApplyShellStateDiff(*fullState, *stateDiff) return &newState, nil } } // internal func, first tries the StateMap, otherwise will fallback on sstore.GetFullState func (msh *MShellProc) getFeStateFromDiff(stateDiff *packet.ShellStateDiff) (*sstore.FeStateType, error) { baseState := msh.GetStateByHash(stateDiff.BaseHash) if baseState != nil && len(stateDiff.DiffHashArr) == 0 { newState, err := shexec.ApplyShellStateDiff(*baseState, *stateDiff) if err != nil { return nil, err } return sstore.FeStateFromShellState(&newState), nil } else { fullState, err := sstore.GetFullState(context.Background(), sstore.ShellStatePtr{stateDiff.BaseHash, stateDiff.DiffHashArr}) if err != nil { return nil, err } newState, err := shexec.ApplyShellStateDiff(*fullState, *stateDiff) if err != nil { return nil, err } return sstore.FeStateFromShellState(&newState), nil } } func (msh *MShellProc) TryAutoConnect() error { if msh.IsConnected() { return nil } rcopy := msh.GetRemoteCopy() if rcopy.ConnectMode == sstore.ConnectModeManual { return nil } var err error msh.WithLock(func() { if msh.NumTryConnect > 5 { err = fmt.Errorf("too many unsuccessful tries") return } msh.NumTryConnect++ }) if err != nil { return err } msh.Launch() if !msh.IsConnected() { return fmt.Errorf("error connecting") } return nil } func (msh *MShellProc) GetDisplayName() string { rcopy := msh.GetRemoteCopy() return rcopy.GetName() }