session.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733
  1. /******************************************************************************
  2. * This file is part of TinTin++ *
  3. * *
  4. * Copyright 2004-2019 Igor van den Hoven *
  5. * *
  6. * TinTin++ is free software; you can redistribute it and/or modify *
  7. * it under the terms of the GNU General Public License as published by *
  8. * the Free Software Foundation; either version 3 of the License, or *
  9. * (at your option) any later version. *
  10. * *
  11. * This program is distributed in the hope that it will be useful, *
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of *
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
  14. * GNU General Public License for more details. *
  15. * *
  16. * *
  17. * You should have received a copy of the GNU General Public License *
  18. * along with TinTin++. If not, see https://www.gnu.org/licenses. *
  19. ******************************************************************************/
  20. /******************************************************************************
  21. * (T)he K(I)cki(N) (T)ickin D(I)kumud Clie(N)t *
  22. * *
  23. * coded by Peter Unold 1992 *
  24. ******************************************************************************/
  25. #include "tintin.h"
  26. DO_COMMAND(do_all)
  27. {
  28. char arg1[BUFFER_SIZE];
  29. struct session *sesptr;
  30. if (gts->next)
  31. {
  32. sub_arg_in_braces(ses, arg, arg1, GET_ALL, SUB_VAR|SUB_FUN);
  33. for (sesptr = gts->next ; sesptr ; sesptr = gtd->all)
  34. {
  35. gtd->all = sesptr->next;
  36. if (!HAS_BIT(sesptr->flags, SES_FLAG_CLOSED))
  37. {
  38. script_driver(sesptr, LIST_COMMAND, arg1);
  39. }
  40. }
  41. }
  42. else
  43. {
  44. show_error(ses, LIST_COMMAND, "#ALL: THERE AREN'T ANY SESSIONS.");
  45. }
  46. return ses;
  47. }
  48. DO_COMMAND(do_session)
  49. {
  50. char temp[BUFFER_SIZE], arg1[BUFFER_SIZE];
  51. struct session *sesptr;
  52. int cnt;
  53. substitute(ses, arg, temp, SUB_VAR|SUB_FUN);
  54. arg = temp;
  55. arg = get_arg_in_braces(ses, arg, arg1, GET_ONE);
  56. if (*arg1 == 0)
  57. {
  58. tintin_puts(ses, "#THESE SESSIONS HAVE BEEN DEFINED:");
  59. for (sesptr = gts->next ; sesptr ; sesptr = sesptr->next)
  60. {
  61. show_session(ses, sesptr);
  62. }
  63. }
  64. else if (*arg1 && *arg == 0)
  65. {
  66. if (!strncasecmp(arg1, "telnet://", 9))
  67. {
  68. char *pti, *pto;
  69. pto = temp;
  70. pti = arg1 + 9;
  71. while (*pti)
  72. {
  73. if (*pti == '/')
  74. {
  75. break;
  76. }
  77. else if (*pti == ':')
  78. {
  79. pti++;
  80. *pto++ = ' ';
  81. }
  82. else
  83. {
  84. *pto++ = *pti++;
  85. }
  86. }
  87. *pto = 0;
  88. ses = new_session(ses, "telnet", temp, 0, 0);
  89. }
  90. if (*arg1 == '+')
  91. {
  92. return activate_session(ses->next ? ses->next : gts->next ? gts->next : ses);
  93. }
  94. if (*arg1 == '-')
  95. {
  96. return activate_session(ses->prev ? ses->prev : gts->prev ? gts->prev : ses);
  97. }
  98. if (is_number(arg1))
  99. {
  100. for (cnt = 0, sesptr = gts ; sesptr ; cnt++, sesptr = sesptr->next)
  101. {
  102. if (cnt == atoi(arg1))
  103. {
  104. return activate_session(sesptr);
  105. }
  106. }
  107. }
  108. tintin_puts(ses, "#THAT SESSION IS NOT DEFINED.");
  109. }
  110. else
  111. {
  112. ses = new_session(ses, arg1, arg, 0, 0);
  113. }
  114. return ses;
  115. }
  116. DO_COMMAND(do_snoop)
  117. {
  118. struct session *sesptr = ses;
  119. char arg1[BUFFER_SIZE], arg2[BUFFER_SIZE];
  120. arg = sub_arg_in_braces(ses, arg, arg1, GET_ONE, SUB_VAR|SUB_FUN);
  121. arg = sub_arg_in_braces(ses, arg, arg2, GET_ALL, SUB_VAR|SUB_FUN);
  122. if (*arg1)
  123. {
  124. sesptr = find_session(arg1);
  125. if (sesptr == NULL)
  126. {
  127. show_error(ses, LIST_COMMAND, "#SNOOP: THERE'S NO SESSION NAMED {%s}", arg1);
  128. return ses;
  129. }
  130. }
  131. else
  132. {
  133. sesptr = ses;
  134. }
  135. if (*arg2 == 0)
  136. {
  137. if (HAS_BIT(sesptr->flags, SES_FLAG_SNOOP))
  138. {
  139. show_message(ses, LIST_COMMAND, "#SNOOP: NO LONGER SNOOPING SESSION '%s'", sesptr->name);
  140. }
  141. else
  142. {
  143. show_message(ses, LIST_COMMAND, "#SNOOP: SNOOPING SESSION '%s'", sesptr->name);
  144. }
  145. TOG_BIT(sesptr->flags, SES_FLAG_SNOOP);
  146. }
  147. else if (is_abbrev(arg2, "ON"))
  148. {
  149. show_message(ses, LIST_COMMAND, "#SNOOP: SNOOPING SESSION '%s'", sesptr->name);
  150. SET_BIT(sesptr->flags, SES_FLAG_SNOOP);
  151. }
  152. else if (is_abbrev(arg2, "OFF"))
  153. {
  154. show_message(ses, LIST_COMMAND, "#SNOOP: NO LONGER SNOOPING SESSION '%s'", sesptr->name);
  155. DEL_BIT(sesptr->flags, SES_FLAG_SNOOP);
  156. }
  157. else
  158. {
  159. show_error(ses, LIST_COMMAND, "#SYNTAX: #SNOOP {session} {ON|OFF}");
  160. }
  161. return ses;
  162. }
  163. DO_COMMAND(do_zap)
  164. {
  165. struct session *sesptr;
  166. char arg1[BUFFER_SIZE];
  167. push_call("do_zap(%p,%p)",ses,arg);
  168. sub_arg_in_braces(ses, arg, arg1, GET_ALL, SUB_VAR|SUB_FUN);
  169. if (*arg1)
  170. {
  171. sesptr = find_session(arg1);
  172. if (sesptr == NULL)
  173. {
  174. show_error(ses, LIST_COMMAND, "#ZAP: THERE'S NO SESSION WITH THAT NAME!");
  175. pop_call();
  176. return ses;
  177. }
  178. }
  179. else
  180. {
  181. sesptr = ses;
  182. }
  183. tintin_puts(sesptr, "");
  184. tintin_puts(sesptr, "#ZZZZZZZAAAAAAAAPPPP!!!!!!!!! LET'S GET OUTTA HERE!!!!!!!!");
  185. if (sesptr == gts)
  186. {
  187. pop_call();
  188. return do_end(NULL, "");
  189. }
  190. if (ses == sesptr)
  191. {
  192. cleanup_session(sesptr);
  193. pop_call();
  194. return gtd->ses;
  195. }
  196. cleanup_session(sesptr);
  197. pop_call();
  198. return ses;
  199. }
  200. void show_session(struct session *ses, struct session *ptr)
  201. {
  202. char temp[BUFFER_SIZE];
  203. sprintf(temp, "%-10s %18s:%-5s", ptr->name, ptr->session_host, ptr->session_port);
  204. cat_sprintf(temp, " %8s", ptr == gtd->ses ? "(active)" : "");
  205. cat_sprintf(temp, " %10s", ptr->mccp2 ? (ptr->mccp3 ? "(mccp 2+3)" : "(mccp 2) ") : ptr->mccp3 ? "(mccp 3)" : "");
  206. cat_sprintf(temp, " %7s", HAS_BIT(ptr->flags, SES_FLAG_SNOOP) ? "(snoop)" : "");
  207. cat_sprintf(temp, " %5s", ptr->logfile ? "(log)" : "");
  208. cat_sprintf(temp, " %5s", ptr->ssl ? "(ssl)" : "");
  209. tintin_puts2(ses, temp);
  210. }
  211. struct session *find_session(char *name)
  212. {
  213. struct session *ses;
  214. for (ses = gts ; ses ; ses = ses->next)
  215. {
  216. if (!strcmp(ses->name, name))
  217. {
  218. return ses;
  219. }
  220. }
  221. if (!strcmp("ats", name))
  222. {
  223. return gtd->ses;
  224. }
  225. return NULL;
  226. }
  227. // find a session to activate when current session is closed
  228. struct session *newactive_session(void)
  229. {
  230. push_call("newactive_session(void)");
  231. if (gts->next)
  232. {
  233. activate_session(gts->next);
  234. }
  235. else
  236. {
  237. activate_session(gts);
  238. }
  239. pop_call();
  240. return gtd->ses;
  241. }
  242. struct session *activate_session(struct session *ses)
  243. {
  244. check_all_events(gtd->ses, SUB_ARG, 0, 1, "SESSION DEACTIVATED", gtd->ses->name);
  245. gtd->ses = ses;
  246. dirty_screen(ses);
  247. show_message(ses, LIST_COMMAND, "#SESSION '%s' ACTIVATED.", ses->name);
  248. check_all_events(ses, SUB_ARG, 0, 1, "SESSION ACTIVATED", ses->name);
  249. return ses;
  250. }
  251. /**********************/
  252. /* open a new session */
  253. /**********************/
  254. struct session *new_session(struct session *ses, char *name, char *arg, int desc, int ssl)
  255. {
  256. int cnt = 0;
  257. char host[BUFFER_SIZE], port[BUFFER_SIZE], file[BUFFER_SIZE];
  258. struct session *newses;
  259. push_call("new_session(%p,%p,%p,%d,%d)",ses,name,arg,desc,ssl);
  260. if (HAS_BIT(gtd->flags, TINTIN_FLAG_TERMINATE))
  261. {
  262. pop_call();
  263. return ses;
  264. }
  265. arg = sub_arg_in_braces(ses, arg, host, GET_ONE, SUB_VAR|SUB_FUN);
  266. arg = sub_arg_in_braces(ses, arg, port, GET_ONE, SUB_VAR|SUB_FUN);
  267. arg = sub_arg_in_braces(ses, arg, file, GET_ONE, SUB_VAR|SUB_FUN);
  268. if (desc == 0)
  269. {
  270. if (*host == 0)
  271. {
  272. tintin_puts(ses, "#HEY! SPECIFY AN ADDRESS WILL YOU?");
  273. pop_call();
  274. return ses;
  275. }
  276. if (*port == 0)
  277. {
  278. tintin_puts(ses, "#HEY! SPECIFY A PORT NUMBER WILL YOU?");
  279. pop_call();
  280. return ses;
  281. }
  282. }
  283. if (find_session(name))
  284. {
  285. tintin_puts(ses, "#THERE'S A SESSION WITH THAT NAME ALREADY.");
  286. pop_call();
  287. return ses;
  288. }
  289. newses = (struct session *) calloc(1, sizeof(struct session));
  290. newses->name = strdup(name);
  291. newses->session_host = strdup(host);
  292. newses->session_ip = strdup("");
  293. newses->session_port = strdup(port);
  294. newses->created = gtd->time;
  295. newses->group = strdup(gts->group);
  296. newses->flags = gts->flags;
  297. newses->color = gts->color;
  298. newses->logmode = gts->logmode;
  299. newses->charset = gts->charset;
  300. newses->telopts = gts->telopts;
  301. newses->auto_tab = gts->auto_tab;
  302. newses->packet_patch = gts->packet_patch;
  303. newses->tab_width = gts->tab_width;
  304. newses->cmd_color = strdup(gts->cmd_color);
  305. newses->read_max = gts->read_max;
  306. newses->read_buf = (unsigned char *) calloc(1, gts->read_max);
  307. newses->lognext_name = strdup("");
  308. newses->logline_name = strdup("");
  309. newses->rand = utime();
  310. LINK(newses, gts->next, gts->prev);
  311. if (HAS_BIT(gtd->flags, TINTIN_FLAG_INHERITANCE))
  312. {
  313. for (cnt = 0 ; cnt < LIST_MAX ; cnt++)
  314. {
  315. newses->list[cnt] = copy_list(newses, gts->list[cnt], cnt);
  316. }
  317. }
  318. else
  319. {
  320. for (cnt = 0 ; cnt < LIST_MAX ; cnt++)
  321. {
  322. if (cnt == LIST_CONFIG)
  323. {
  324. newses->list[cnt] = copy_list(newses, gts->list[cnt], cnt);
  325. }
  326. else
  327. {
  328. newses->list[cnt] = init_list(newses, cnt, 32);
  329. }
  330. }
  331. }
  332. newses->event_flags = gts->event_flags;
  333. newses->split = calloc(1, sizeof(struct split_data));
  334. memcpy(newses->split, gts->split, sizeof(struct split_data));
  335. newses->cur_row = gts->cur_row;
  336. newses->cur_col = gts->cur_col;
  337. newses->wrap = gts->wrap;
  338. newses->scroll = calloc(1, sizeof(struct scroll_data));
  339. init_buffer(newses, gts->scroll->size);
  340. memcpy(&newses->cur_terminal, &gts->cur_terminal, sizeof(gts->cur_terminal));
  341. if (desc == 0)
  342. {
  343. tintin_printf(ses, "#TRYING TO CONNECT '%s' TO '%s' PORT '%s'.", newses->name, newses->session_host, newses->session_port);
  344. }
  345. else if (desc == -1)
  346. {
  347. // #PORT INITIALIZE {NAME} {PORT} {FILE}
  348. }
  349. else
  350. {
  351. tintin_printf(ses, "#TRYING TO LAUNCH '%s' RUNNING '%s'.", newses->name, newses->session_host);
  352. }
  353. dirty_screen(newses);
  354. if (gtd->level->background == 0)
  355. {
  356. gtd->ses = newses;
  357. }
  358. if (desc == 0)
  359. {
  360. newses = connect_session(newses);
  361. }
  362. else if (desc == -1)
  363. {
  364. SET_BIT(newses->flags, SES_FLAG_PORT);
  365. }
  366. else
  367. {
  368. SET_BIT(newses->flags, SES_FLAG_CONNECTED|SES_FLAG_RUN);
  369. SET_BIT(newses->telopts, TELOPT_FLAG_SGA);
  370. DEL_BIT(newses->telopts, TELOPT_FLAG_ECHO);
  371. newses->socket = desc;
  372. }
  373. if (newses == NULL)
  374. {
  375. pop_call();
  376. return ses;
  377. }
  378. #ifdef HAVE_GNUTLS_H
  379. if (ssl)
  380. {
  381. newses->ssl = ssl_negotiate(newses);
  382. if (newses->ssl == 0)
  383. {
  384. cleanup_session(newses);
  385. pop_call();
  386. return ses;
  387. }
  388. }
  389. #endif
  390. if (*file)
  391. {
  392. newses = do_read(newses, file);
  393. }
  394. check_all_events(newses, SUB_ARG, 0, 4, "SESSION CREATED", newses->name, newses->session_host, newses->session_ip, newses->session_port);
  395. if (gtd->level->background == 0)
  396. {
  397. pop_call();
  398. return newses;
  399. }
  400. pop_call();
  401. return ses;
  402. }
  403. struct session *connect_session(struct session *ses)
  404. {
  405. int sock;
  406. static struct timeval to;
  407. push_call("connect_session(%p)",ses);
  408. ses->connect_retry = utime() + gts->connect_retry;
  409. reconnect:
  410. sock = connect_mud(ses, ses->session_host, ses->session_port);
  411. if (sock == -1)
  412. {
  413. // syserr_printf(ses, "connect_session: connect");
  414. cleanup_session(ses);
  415. pop_call();
  416. return NULL;
  417. }
  418. if (sock)
  419. {
  420. /*
  421. if (fcntl(sock, F_SETFL, O_NDELAY|O_NONBLOCK) == -1)
  422. {
  423. syserr_printf(ses, "connect_session: fcntl O_NDELAY|O_NONBLOCK");
  424. }
  425. */
  426. ses->socket = sock;
  427. ses->connect_retry = 0;
  428. SET_BIT(ses->flags, SES_FLAG_CONNECTED);
  429. tintin_printf2(ses, "");
  430. tintin_printf(ses, "#SESSION '%s' CONNECTED TO '%s' PORT '%s'", ses->name, ses->session_host, ses->session_port);
  431. check_all_events(ses, SUB_ARG, 0, 4, "SESSION CONNECTED", ses->name, ses->session_host, ses->session_ip, ses->session_port);
  432. pop_call();
  433. return ses;
  434. }
  435. if (ses->connect_retry > utime())
  436. {
  437. fd_set readfds;
  438. FD_ZERO(&readfds);
  439. FD_SET(0, &readfds);
  440. if (select(FD_SETSIZE, &readfds, NULL, NULL, &to) <= 0)
  441. {
  442. if (to.tv_sec == 0)
  443. {
  444. to.tv_sec = 1;
  445. tintin_printf(ses, "#SESSION '%s' FAILED TO CONNECT. RETRYING FOR %d SECONDS.", ses->name, (ses->connect_retry - utime()) / 1000000);
  446. }
  447. goto reconnect;
  448. }
  449. }
  450. if (ses->connect_error)
  451. {
  452. to.tv_sec = 0;
  453. tintin_printf(ses, "#SESSION '%s' FAILED TO CONNECT.", ses->name);
  454. }
  455. cleanup_session(ses);
  456. pop_call();
  457. return NULL;
  458. }
  459. /*****************************************************************************/
  460. /* cleanup after session died. if session=gtd->ses, try find new active */
  461. /*****************************************************************************/
  462. void cleanup_session(struct session *ses)
  463. {
  464. push_call("cleanup_session(%p)",ses);
  465. if (HAS_BIT(ses->flags, SES_FLAG_CLOSED))
  466. {
  467. tintin_printf2(NULL, "\n#SESSION '%s' IS ALREADY CLOSED.", ses->name);
  468. dump_stack();
  469. pop_call();
  470. return;
  471. }
  472. if (ses == gtd->update)
  473. {
  474. gtd->update = ses->next;
  475. }
  476. if (ses == gtd->all)
  477. {
  478. gtd->all = ses->next;
  479. }
  480. UNLINK(ses, gts->next, gts->prev);
  481. if (ses->socket)
  482. {
  483. if (close(ses->socket) == -1)
  484. {
  485. syserr_printf(ses, "cleanup_session: close");
  486. }
  487. // else
  488. // {
  489. // int status;
  490. // wait(&status);
  491. // }
  492. // the PID is stored in the session's port.
  493. /*
  494. if (HAS_BIT(ses->flags, SES_FLAG_RUN))
  495. {
  496. kill(atoi(ses->session_port), SIGTERM);
  497. }
  498. */
  499. }
  500. if (ses->port)
  501. {
  502. port_uninitialize(ses, "", "", "");
  503. }
  504. SET_BIT(ses->flags, SES_FLAG_CLOSED);
  505. if (HAS_BIT(ses->flags, SES_FLAG_PORT) || HAS_BIT(ses->flags, SES_FLAG_CONNECTED))
  506. {
  507. DEL_BIT(ses->flags, SES_FLAG_CONNECTED);
  508. check_all_events(ses, SUB_ARG, 0, 4, "SESSION DISCONNECTED", ses->name, ses->session_host, ses->session_ip, ses->session_port);
  509. tintin_printf(gtd->ses, "#SESSION '%s' DIED.", ses->name);
  510. }
  511. else
  512. {
  513. check_all_events(ses, SUB_ARG, 0, 4, "SESSION TIMED OUT", ses->name, ses->session_host, ses->session_ip, ses->session_port);
  514. tintin_printf(gtd->ses, "#SESSION '%s' TIMED OUT.", ses->name);
  515. }
  516. if (ses == gtd->ses)
  517. {
  518. gtd->ses = newactive_session();
  519. }
  520. #ifdef HAVE_GNUTLS_H
  521. if (ses->ssl)
  522. {
  523. gnutls_deinit(ses->ssl);
  524. }
  525. #endif
  526. LINK(ses, gtd->dispose_next, gtd->dispose_prev);
  527. pop_call();
  528. return;
  529. }
  530. void dispose_session(struct session *ses)
  531. {
  532. int index;
  533. push_call("dispose_session(%p)", ses);
  534. UNLINK(ses, gtd->dispose_next, gtd->dispose_prev);
  535. if (ses->logfile)
  536. {
  537. fclose(ses->logfile);
  538. }
  539. if (ses->lognext_file)
  540. {
  541. fclose(ses->lognext_file);
  542. }
  543. if (ses->logline_file)
  544. {
  545. fclose(ses->logline_file);
  546. }
  547. if (ses->map)
  548. {
  549. delete_map(ses);
  550. }
  551. for (index = 0 ; index < LIST_MAX ; index++)
  552. {
  553. free_list(ses->list[index]);
  554. }
  555. client_end_mccp2(ses);
  556. client_end_mccp3(ses);
  557. init_buffer(ses, 0);
  558. free(ses->name);
  559. free(ses->session_host);
  560. free(ses->session_ip);
  561. free(ses->session_port);
  562. free(ses->group);
  563. free(ses->read_buf);
  564. free(ses->cmd_color);
  565. free(ses->lognext_name);
  566. free(ses->logline_name);
  567. free(ses->split);
  568. free(ses);
  569. pop_call();
  570. return;
  571. }