session.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686
  1. /******************************************************************************
  2. * This file is part of TinTin++ *
  3. * *
  4. * Copyright 2004-2019 Igor van den Hoven *
  5. * *
  6. * TinTin++ is free software; you can redistribute it and/or modify *
  7. * it under the terms of the GNU General Public License as published by *
  8. * the Free Software Foundation; either version 3 of the License, or *
  9. * (at your option) any later version. *
  10. * *
  11. * This program is distributed in the hope that it will be useful, *
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of *
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
  14. * GNU General Public License for more details. *
  15. * *
  16. * *
  17. * You should have received a copy of the GNU General Public License *
  18. * along with TinTin++. If not, see https://www.gnu.org/licenses. *
  19. ******************************************************************************/
  20. /******************************************************************************
  21. * (T)he K(I)cki(N) (T)ickin D(I)kumud Clie(N)t *
  22. * *
  23. * coded by Peter Unold 1992 *
  24. ******************************************************************************/
  25. #include "tintin.h"
  26. DO_COMMAND(do_all)
  27. {
  28. char arg1[BUFFER_SIZE];
  29. struct session *sesptr;
  30. if (gts->next)
  31. {
  32. sub_arg_in_braces(ses, arg, arg1, GET_ALL, SUB_VAR|SUB_FUN);
  33. for (sesptr = gts->next ; sesptr ; sesptr = gtd->all)
  34. {
  35. gtd->all = sesptr->next;
  36. if (!HAS_BIT(sesptr->flags, SES_FLAG_CLOSED))
  37. {
  38. script_driver(sesptr, LIST_COMMAND, arg1);
  39. }
  40. }
  41. }
  42. else
  43. {
  44. show_error(ses, LIST_COMMAND, "#ALL: THERE AREN'T ANY SESSIONS.");
  45. }
  46. return ses;
  47. }
  48. DO_COMMAND(do_session)
  49. {
  50. char temp[BUFFER_SIZE], arg1[BUFFER_SIZE];
  51. struct session *sesptr;
  52. int cnt;
  53. substitute(ses, arg, temp, SUB_VAR|SUB_FUN);
  54. arg = temp;
  55. arg = get_arg_in_braces(ses, arg, arg1, GET_ONE);
  56. if (*arg1 == 0)
  57. {
  58. tintin_puts(ses, "#THESE SESSIONS HAVE BEEN DEFINED:");
  59. for (sesptr = gts->next ; sesptr ; sesptr = sesptr->next)
  60. {
  61. show_session(ses, sesptr);
  62. }
  63. }
  64. else if (*arg1 && *arg == 0)
  65. {
  66. if (*arg1 == '+')
  67. {
  68. return activate_session(ses->next ? ses->next : gts->next ? gts->next : ses);
  69. }
  70. if (*arg1 == '-')
  71. {
  72. return activate_session(ses->prev ? ses->prev : gts->prev ? gts->prev : ses);
  73. }
  74. if (is_number(arg1))
  75. {
  76. for (cnt = 0, sesptr = gts ; sesptr ; cnt++, sesptr = sesptr->next)
  77. {
  78. if (cnt == atoi(arg1))
  79. {
  80. return activate_session(sesptr);
  81. }
  82. }
  83. }
  84. tintin_puts(ses, "#THAT SESSION IS NOT DEFINED.");
  85. }
  86. else
  87. {
  88. ses = new_session(ses, arg1, arg, 0, 0);
  89. }
  90. return ses;
  91. }
  92. DO_COMMAND(do_snoop)
  93. {
  94. struct session *sesptr = ses;
  95. char arg1[BUFFER_SIZE], arg2[BUFFER_SIZE];
  96. arg = sub_arg_in_braces(ses, arg, arg1, GET_ONE, SUB_VAR|SUB_FUN);
  97. arg = sub_arg_in_braces(ses, arg, arg2, GET_ALL, SUB_VAR|SUB_FUN);
  98. if (*arg1)
  99. {
  100. sesptr = find_session(arg1);
  101. if (sesptr == NULL)
  102. {
  103. show_error(ses, LIST_COMMAND, "#SNOOP: THERE'S NO SESSION NAMED {%s}", arg1);
  104. return ses;
  105. }
  106. }
  107. else
  108. {
  109. sesptr = ses;
  110. }
  111. if (*arg2 == 0)
  112. {
  113. if (HAS_BIT(sesptr->flags, SES_FLAG_SNOOP))
  114. {
  115. show_message(ses, LIST_COMMAND, "#SNOOP: NO LONGER SNOOPING SESSION '%s'", sesptr->name);
  116. }
  117. else
  118. {
  119. show_message(ses, LIST_COMMAND, "#SNOOP: SNOOPING SESSION '%s'", sesptr->name);
  120. }
  121. TOG_BIT(sesptr->flags, SES_FLAG_SNOOP);
  122. }
  123. else if (is_abbrev(arg2, "ON"))
  124. {
  125. show_message(ses, LIST_COMMAND, "#SNOOP: SNOOPING SESSION '%s'", sesptr->name);
  126. SET_BIT(sesptr->flags, SES_FLAG_SNOOP);
  127. }
  128. else if (is_abbrev(arg2, "OFF"))
  129. {
  130. show_message(ses, LIST_COMMAND, "#SNOOP: NO LONGER SNOOPING SESSION '%s'", sesptr->name);
  131. DEL_BIT(sesptr->flags, SES_FLAG_SNOOP);
  132. }
  133. else
  134. {
  135. show_error(ses, LIST_COMMAND, "#SYNTAX: #SNOOP {session} {ON|OFF}");
  136. }
  137. return ses;
  138. }
  139. DO_COMMAND(do_zap)
  140. {
  141. struct session *sesptr;
  142. char arg1[BUFFER_SIZE];
  143. push_call("do_zap(%p,%p)",ses,arg);
  144. sub_arg_in_braces(ses, arg, arg1, GET_ALL, SUB_VAR|SUB_FUN);
  145. if (*arg1)
  146. {
  147. sesptr = find_session(arg1);
  148. if (sesptr == NULL)
  149. {
  150. show_error(ses, LIST_COMMAND, "#ZAP: THERE'S NO SESSION WITH THAT NAME!");
  151. pop_call();
  152. return ses;
  153. }
  154. }
  155. else
  156. {
  157. sesptr = ses;
  158. }
  159. tintin_puts(sesptr, "");
  160. tintin_puts(sesptr, "#ZZZZZZZAAAAAAAAPPPP!!!!!!!!! LET'S GET OUTTA HERE!!!!!!!!");
  161. if (sesptr == gts)
  162. {
  163. pop_call();
  164. return do_end(NULL, "");
  165. }
  166. if (ses == sesptr)
  167. {
  168. cleanup_session(sesptr);
  169. pop_call();
  170. return gtd->ses;
  171. }
  172. cleanup_session(sesptr);
  173. pop_call();
  174. return ses;
  175. }
  176. void show_session(struct session *ses, struct session *ptr)
  177. {
  178. char temp[BUFFER_SIZE];
  179. sprintf(temp, "%-10s %18s:%-5s", ptr->name, ptr->session_host, ptr->session_port);
  180. cat_sprintf(temp, " %8s", ptr == gtd->ses ? "(active)" : "");
  181. cat_sprintf(temp, " %10s", ptr->mccp ? ptr->mccp3 ? "(mccp 2+3)" : "(mccp 2) " : "");
  182. cat_sprintf(temp, " %7s", HAS_BIT(ptr->flags, SES_FLAG_SNOOP) ? "(snoop)" : "");
  183. cat_sprintf(temp, " %5s", ptr->logfile ? "(log)" : "");
  184. cat_sprintf(temp, " %5s", ptr->ssl ? "(ssl)" : "");
  185. tintin_puts2(ses, temp);
  186. }
  187. struct session *find_session(char *name)
  188. {
  189. struct session *ses;
  190. for (ses = gts ; ses ; ses = ses->next)
  191. {
  192. if (!strcmp(ses->name, name))
  193. {
  194. return ses;
  195. }
  196. }
  197. if (!strcmp("ats", name))
  198. {
  199. return gtd->ses;
  200. }
  201. return NULL;
  202. }
  203. // find a session to activate when current session is closed
  204. struct session *newactive_session(void)
  205. {
  206. push_call("newactive_session(void)");
  207. if (gts->next)
  208. {
  209. activate_session(gts->next);
  210. }
  211. else
  212. {
  213. activate_session(gts);
  214. }
  215. pop_call();
  216. return gtd->ses;
  217. }
  218. struct session *activate_session(struct session *ses)
  219. {
  220. check_all_events(gtd->ses, SUB_ARG, 0, 1, "SESSION DEACTIVATED", gtd->ses->name);
  221. gtd->ses = ses;
  222. dirty_screen(ses);
  223. tintin_printf(ses, "#SESSION '%s' ACTIVATED.", ses->name);
  224. check_all_events(ses, SUB_ARG, 0, 1, "SESSION ACTIVATED", ses->name);
  225. return ses;
  226. }
  227. /**********************/
  228. /* open a new session */
  229. /**********************/
  230. struct session *new_session(struct session *ses, char *name, char *arg, int desc, int ssl)
  231. {
  232. int cnt = 0;
  233. char host[BUFFER_SIZE], port[BUFFER_SIZE], file[BUFFER_SIZE];
  234. struct session *newses;
  235. push_call("new_session(%p,%p,%p,%d,%d)",ses,name,arg,desc,ssl);
  236. if (HAS_BIT(gtd->flags, TINTIN_FLAG_TERMINATE))
  237. {
  238. pop_call();
  239. return ses;
  240. }
  241. arg = sub_arg_in_braces(ses, arg, host, GET_ONE, SUB_VAR|SUB_FUN);
  242. arg = sub_arg_in_braces(ses, arg, port, GET_ONE, SUB_VAR|SUB_FUN);
  243. arg = sub_arg_in_braces(ses, arg, file, GET_ONE, SUB_VAR|SUB_FUN);
  244. if (desc == 0)
  245. {
  246. if (*host == 0)
  247. {
  248. tintin_puts(ses, "#HEY! SPECIFY AN ADDRESS WILL YOU?");
  249. pop_call();
  250. return ses;
  251. }
  252. if (*port == 0)
  253. {
  254. tintin_puts(ses, "#HEY! SPECIFY A PORT NUMBER WILL YOU?");
  255. pop_call();
  256. return ses;
  257. }
  258. }
  259. if (find_session(name))
  260. {
  261. tintin_puts(ses, "#THERE'S A SESSION WITH THAT NAME ALREADY.");
  262. pop_call();
  263. return ses;
  264. }
  265. newses = (struct session *) calloc(1, sizeof(struct session));
  266. newses->name = strdup(name);
  267. newses->session_host = strdup(host);
  268. newses->session_ip = strdup("");
  269. newses->session_port = strdup(port);
  270. newses->created = gtd->time;
  271. newses->group = strdup(gts->group);
  272. newses->flags = gts->flags;
  273. newses->telopts = gts->telopts;
  274. newses->auto_tab = gts->auto_tab;
  275. newses->cmd_color = strdup(gts->cmd_color);
  276. newses->read_max = gts->read_max;
  277. newses->read_buf = (unsigned char *) calloc(1, gts->read_max);
  278. newses->lognext_name = strdup("");
  279. newses->logline_name = strdup("");
  280. newses->rand = utime();
  281. LINK(newses, gts->next, gts->prev);
  282. if (HAS_BIT(gtd->flags, TINTIN_FLAG_INHERITANCE))
  283. {
  284. for (cnt = 0 ; cnt < LIST_MAX ; cnt++)
  285. {
  286. newses->list[cnt] = copy_list(newses, gts->list[cnt], cnt);
  287. }
  288. }
  289. else
  290. {
  291. for (cnt = 0 ; cnt < LIST_MAX ; cnt++)
  292. {
  293. if (cnt == LIST_CONFIG)
  294. {
  295. newses->list[cnt] = copy_list(newses, gts->list[cnt], cnt);
  296. }
  297. else
  298. {
  299. newses->list[cnt] = init_list(newses, cnt, 32);
  300. }
  301. }
  302. }
  303. newses->top_row = gts->top_row;
  304. newses->bot_row = gts->bot_row;
  305. init_buffer(newses, -1);
  306. memcpy(&newses->cur_terminal, &gts->cur_terminal, sizeof(gts->cur_terminal));
  307. if (desc == 0)
  308. {
  309. tintin_printf(ses, "#TRYING TO CONNECT '%s' TO '%s' PORT '%s'.", newses->name, newses->session_host, newses->session_port);
  310. }
  311. else if (desc == -1)
  312. {
  313. // #PORT INITIALIZE {NAME} {PORT} {FILE}
  314. }
  315. else
  316. {
  317. tintin_printf(ses, "#TRYING TO LAUNCH '%s' RUNNING '%s'.", newses->name, newses->session_host);
  318. }
  319. gtd->ses = newses;
  320. dirty_screen(newses);
  321. if (desc == 0)
  322. {
  323. newses = connect_session(newses);
  324. }
  325. else if (desc == -1)
  326. {
  327. SET_BIT(newses->flags, SES_FLAG_PORT);
  328. }
  329. else
  330. {
  331. SET_BIT(newses->flags, SES_FLAG_CONNECTED|SES_FLAG_RUN);
  332. SET_BIT(newses->telopts, TELOPT_FLAG_SGA);
  333. DEL_BIT(newses->telopts, TELOPT_FLAG_ECHO);
  334. newses->socket = desc;
  335. }
  336. if (newses == NULL)
  337. {
  338. pop_call();
  339. return gtd->ses;
  340. }
  341. #ifdef HAVE_GNUTLS_H
  342. if (ssl)
  343. {
  344. newses->ssl = ssl_negotiate(newses);
  345. if (newses->ssl == 0)
  346. {
  347. cleanup_session(newses);
  348. pop_call();
  349. return ses;
  350. }
  351. }
  352. #endif
  353. gtd->ses = newses;
  354. if (*file)
  355. {
  356. gtd->ses = do_read(newses, file);
  357. }
  358. check_all_events(newses, SUB_ARG, 0, 4, "SESSION CREATED", newses->name, newses->session_host, newses->session_ip, newses->session_port);
  359. pop_call();
  360. return gtd->ses;
  361. }
  362. struct session *connect_session(struct session *ses)
  363. {
  364. int sock;
  365. static struct timeval to;
  366. push_call("connect_session(%p)",ses);
  367. ses->connect_retry = utime() + gts->connect_retry;
  368. reconnect:
  369. sock = connect_mud(ses, ses->session_host, ses->session_port);
  370. if (sock == -1)
  371. {
  372. syserr_printf(ses, "connect_session: connect");
  373. cleanup_session(ses);
  374. pop_call();
  375. return NULL;
  376. }
  377. if (sock)
  378. {
  379. /*
  380. if (fcntl(sock, F_SETFL, O_NDELAY|O_NONBLOCK) == -1)
  381. {
  382. syserr_printf(ses, "connect_session: fcntl O_NDELAY|O_NONBLOCK");
  383. }
  384. */
  385. ses->socket = sock;
  386. ses->connect_retry = 0;
  387. SET_BIT(ses->flags, SES_FLAG_CONNECTED);
  388. tintin_printf2(ses, "");
  389. tintin_printf(ses, "#SESSION '%s' CONNECTED TO '%s' PORT '%s'", ses->name, ses->session_host, ses->session_port);
  390. check_all_events(ses, SUB_ARG, 0, 4, "SESSION CONNECTED", ses->name, ses->session_host, ses->session_ip, ses->session_port);
  391. pop_call();
  392. return ses;
  393. }
  394. if (ses->connect_retry > utime())
  395. {
  396. fd_set readfds;
  397. FD_ZERO(&readfds);
  398. FD_SET(0, &readfds);
  399. if (select(FD_SETSIZE, &readfds, NULL, NULL, &to) <= 0)
  400. {
  401. if (to.tv_sec == 0)
  402. {
  403. to.tv_sec = 1;
  404. tintin_printf(ses, "#SESSION '%s' FAILED TO CONNECT. RETRYING FOR %d SECONDS.", ses->name, (ses->connect_retry - utime()) / 1000000);
  405. }
  406. goto reconnect;
  407. }
  408. }
  409. if (ses->connect_error)
  410. {
  411. to.tv_sec = 0;
  412. tintin_printf(ses, "#SESSION '%s' FAILED TO CONNECT.", ses->name);
  413. }
  414. cleanup_session(ses);
  415. pop_call();
  416. return NULL;
  417. }
  418. /*****************************************************************************/
  419. /* cleanup after session died. if session=gtd->ses, try find new active */
  420. /*****************************************************************************/
  421. void cleanup_session(struct session *ses)
  422. {
  423. push_call("cleanup_session(%p)",ses);
  424. if (HAS_BIT(ses->flags, SES_FLAG_CLOSED))
  425. {
  426. tintin_printf2(NULL, "\n#SESSION '%s' IS ALREADY CLOSED.", ses->name);
  427. dump_stack();
  428. pop_call();
  429. return;
  430. }
  431. if (ses == gtd->update)
  432. {
  433. gtd->update = ses->next;
  434. }
  435. if (ses == gtd->all)
  436. {
  437. gtd->all = ses->next;
  438. }
  439. UNLINK(ses, gts->next, gts->prev);
  440. if (ses->socket)
  441. {
  442. if (close(ses->socket) == -1)
  443. {
  444. syserr_printf(ses, "cleanup_session: close");
  445. }
  446. // else
  447. // {
  448. // int status;
  449. // wait(&status);
  450. // }
  451. // the PID is stored in the session's port.
  452. /*
  453. if (HAS_BIT(ses->flags, SES_FLAG_RUN))
  454. {
  455. kill(atoi(ses->session_port), SIGTERM);
  456. }
  457. */
  458. }
  459. if (ses->port)
  460. {
  461. port_uninitialize(ses, "", "", "");
  462. }
  463. SET_BIT(ses->flags, SES_FLAG_CLOSED);
  464. if (HAS_BIT(ses->flags, SES_FLAG_PORT) || HAS_BIT(ses->flags, SES_FLAG_CONNECTED))
  465. {
  466. DEL_BIT(ses->flags, SES_FLAG_CONNECTED);
  467. check_all_events(ses, SUB_ARG, 0, 4, "SESSION DISCONNECTED", ses->name, ses->session_host, ses->session_ip, ses->session_port);
  468. tintin_printf(gtd->ses, "#SESSION '%s' DIED.", ses->name);
  469. }
  470. else
  471. {
  472. check_all_events(ses, SUB_ARG, 0, 4, "SESSION TIMED OUT", ses->name, ses->session_host, ses->session_ip, ses->session_port);
  473. tintin_printf(gtd->ses, "#SESSION '%s' TIMED OUT.", ses->name);
  474. }
  475. if (ses == gtd->ses)
  476. {
  477. gtd->ses = newactive_session();
  478. }
  479. #ifdef HAVE_GNUTLS_H
  480. if (ses->ssl)
  481. {
  482. gnutls_deinit(ses->ssl);
  483. }
  484. #endif
  485. LINK(ses, gtd->dispose_next, gtd->dispose_prev);
  486. pop_call();
  487. return;
  488. }
  489. void dispose_session(struct session *ses)
  490. {
  491. int index;
  492. push_call("dispose_session(%p)", ses);
  493. UNLINK(ses, gtd->dispose_next, gtd->dispose_prev);
  494. if (ses->logfile)
  495. {
  496. fclose(ses->logfile);
  497. }
  498. if (ses->lognext_file)
  499. {
  500. fclose(ses->lognext_file);
  501. }
  502. if (ses->logline_file)
  503. {
  504. fclose(ses->logline_file);
  505. }
  506. for (index = 0 ; index < LIST_MAX ; index++)
  507. {
  508. free_list(ses->list[index]);
  509. }
  510. if (ses->map)
  511. {
  512. delete_map(ses);
  513. }
  514. if (ses->mccp)
  515. {
  516. inflateEnd(ses->mccp);
  517. free(ses->mccp);
  518. }
  519. init_buffer(ses, 0);
  520. free(ses->name);
  521. free(ses->session_host);
  522. free(ses->session_ip);
  523. free(ses->session_port);
  524. free(ses->group);
  525. free(ses->read_buf);
  526. free(ses->cmd_color);
  527. free(ses->lognext_name);
  528. free(ses->logline_name);
  529. free(ses);
  530. pop_call();
  531. return;
  532. }