rofi/source/dialogs/ssh.c

547 lines
18 KiB
C
Raw Normal View History

2016-01-05 18:49:13 +00:00
/*
2014-03-01 16:27:52 +00:00
* rofi
2014-01-21 09:01:55 +00:00
*
* MIT/X11 License
2017-01-03 16:59:28 +00:00
* Copyright 2013-2017 Qball Cow <qball@gmpclient.org>
2014-01-21 09:01:55 +00:00
*
* Permission is hereby granted, free of charge, to any person obtaining
* a copy of this software and associated documentation files (the
* "Software"), to deal in the Software without restriction, including
* without limitation the rights to use, copy, modify, merge, publish,
* distribute, sublicense, and/or sell copies of the Software, and to
* permit persons to whom the Software is furnished to do so, subject to
* the following conditions:
*
* The above copyright notice and this permission notice shall be
* included in all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
* OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
*
*/
2016-01-05 18:49:13 +00:00
/**
* \ingroup SSHMode
* @{
*/
#include <config.h>
#include <glib.h>
2014-01-21 09:01:55 +00:00
#include <stdlib.h>
#include <stdio.h>
#include <unistd.h>
#include <signal.h>
#include <sys/types.h>
#include <dirent.h>
#include <strings.h>
#include <string.h>
#include <ctype.h>
2014-01-21 13:56:25 +00:00
#include <errno.h>
#include <helper.h>
#include <glob.h>
2014-01-21 09:01:55 +00:00
2014-03-12 07:41:38 +00:00
#include "rofi.h"
2016-01-07 15:01:56 +00:00
#include "settings.h"
#include "history.h"
2015-03-25 07:36:19 +00:00
#include "dialogs/ssh.h"
2014-01-21 09:01:55 +00:00
/**
* Log domain for the ssh modi.
*/
#undef G_LOG_DOMAIN
#define G_LOG_DOMAIN "Dialogs.Ssh"
2016-01-05 18:49:13 +00:00
/**
* Name of the history file where previously choosen hosts are stored.
*/
2016-01-05 20:19:30 +00:00
#define SSH_CACHE_FILE "rofi-2.sshcache"
2014-01-21 09:01:55 +00:00
2016-01-05 18:49:13 +00:00
/**
* Used in get_ssh() when splitting lines from the user's
* SSH config file into tokens.
*/
2015-01-14 21:14:15 +00:00
#define SSH_TOKEN_DELIM "= \t\r\n"
2016-01-05 20:19:30 +00:00
/**
* @param host The host to connect too
*
* SSH into the selected host.
*
* @returns FALSE On failure, TRUE on success
*/
2014-03-22 20:04:19 +00:00
static inline int execshssh ( const char *host )
2014-01-21 09:01:55 +00:00
{
char **args = NULL;
int argsv = 0;
helper_parse_setup ( config.ssh_command, &args, &argsv, "{host}", host, NULL );
2014-08-27 17:44:15 +00:00
GError *error = NULL;
2015-09-19 18:59:50 +00:00
g_spawn_async ( NULL, args, NULL, G_SPAWN_SEARCH_PATH, NULL, NULL, NULL, &error );
if ( error != NULL ) {
2015-09-19 18:59:50 +00:00
char *msg = g_strdup_printf ( "Failed to execute: 'ssh %s'\nError: '%s'", host, error->message );
2016-02-08 08:03:11 +00:00
rofi_view_error_dialog ( msg, FALSE );
g_free ( msg );
2014-08-27 17:44:15 +00:00
// print error.
g_error_free ( error );
2016-01-05 20:19:30 +00:00
g_strfreev ( args );
return FALSE;
2014-08-27 17:44:15 +00:00
}
// Free the args list.
g_strfreev ( args );
2016-01-05 20:19:30 +00:00
return TRUE;
2014-01-21 09:01:55 +00:00
}
2016-01-05 20:19:30 +00:00
/**
* @param host The host to connect too
*
* SSH into the selected host, if successful update history.
*/
static void exec_ssh ( const char *host )
2014-01-21 09:01:55 +00:00
{
2016-01-05 20:19:30 +00:00
if ( !host || !host[0] ) {
return;
2014-03-22 20:04:19 +00:00
}
2014-01-21 09:01:55 +00:00
2016-01-05 20:19:30 +00:00
if ( !execshssh ( host ) ) {
return;
}
2014-01-21 09:01:55 +00:00
2016-01-05 20:19:30 +00:00
// This happens in non-critical time (After launching app)
// It is allowed to be a bit slower.
char *path = g_build_filename ( cache_dir, SSH_CACHE_FILE, NULL );
history_set ( path, host );
g_free ( path );
2014-01-21 09:01:55 +00:00
}
2016-01-05 20:19:30 +00:00
/**
* @param host The host to remove from history
*
* Remove host from history.
*/
static void delete_ssh ( const char *host )
2014-02-01 13:06:08 +00:00
{
2016-01-05 20:19:30 +00:00
if ( !host || !host[0] ) {
2014-03-22 20:04:19 +00:00
return;
}
2016-01-05 20:19:30 +00:00
char *path = g_build_filename ( cache_dir, SSH_CACHE_FILE, NULL );
history_remove ( path, host );
g_free ( path );
2014-02-01 13:06:08 +00:00
}
2015-03-29 10:27:00 +00:00
2015-09-20 14:57:47 +00:00
/**
* @param retv list of hosts
2016-01-05 20:19:30 +00:00
* @param length pointer to length of list [in][out]
2015-09-20 14:57:47 +00:00
*
* Read 'known_hosts' file when entries are not hashsed.
*
2016-01-05 20:19:30 +00:00
* @returns updated list of hosts.
2015-09-20 14:57:47 +00:00
*/
static char **read_known_hosts_file ( char ** retv, unsigned int *length )
{
2017-02-09 07:45:15 +00:00
char *path = g_build_filename ( g_get_home_dir (), ".ssh", "known_hosts", NULL );
2015-09-20 14:57:47 +00:00
FILE *fd = fopen ( path, "r" );
if ( fd != NULL ) {
2016-04-10 12:30:13 +00:00
char *buffer = NULL;
size_t buffer_length = 0;
2015-09-20 14:57:47 +00:00
// Reading one line per time.
2016-04-10 12:30:13 +00:00
while ( getline ( &buffer, &buffer_length, fd ) > 0 ) {
2015-09-20 14:57:47 +00:00
char *sep = strstr ( buffer, "," );
if ( sep != NULL ) {
*sep = '\0';
// Is this host name already in the list?
// We often get duplicates in hosts file, so lets check this.
int found = 0;
for ( unsigned int j = 0; j < ( *length ); j++ ) {
if ( !g_ascii_strcasecmp ( buffer, retv[j] ) ) {
found = 1;
break;
}
}
if ( !found ) {
// Add this host name to the list.
retv = g_realloc ( retv, ( ( *length ) + 2 ) * sizeof ( char* ) );
retv[( *length )] = g_strdup ( buffer );
retv[( *length ) + 1] = NULL;
( *length )++;
}
}
}
2016-04-10 12:30:13 +00:00
if ( buffer != NULL ) {
free ( buffer );
}
2015-09-26 19:06:36 +00:00
if ( fclose ( fd ) != 0 ) {
fprintf ( stderr, "Failed to close hosts file: '%s'\n", strerror ( errno ) );
}
2015-09-20 14:57:47 +00:00
}
g_free ( path );
return retv;
}
2016-01-05 20:19:30 +00:00
2015-03-29 10:27:00 +00:00
/**
2016-01-05 20:19:30 +00:00
* @param retv The list of hosts to update.
* @param length The length of the list retv [in][out]
*
* Read `/etc/hosts` and appends them to the list retv
*
* @returns an updated list with the added hosts.
2015-03-29 10:27:00 +00:00
*/
static char **read_hosts_file ( char ** retv, unsigned int *length )
{
// Read the hosts file.
FILE *fd = fopen ( "/etc/hosts", "r" );
if ( fd != NULL ) {
2016-04-10 12:30:13 +00:00
char *buffer = NULL;
size_t buffer_length = 0;
2015-03-29 10:27:00 +00:00
// Reading one line per time.
2016-04-10 12:30:13 +00:00
while ( getline ( &buffer, &buffer_length, fd ) > 0 ) {
2015-03-29 10:27:00 +00:00
// Evaluate one line.
unsigned int index = 0, ti = 0;
2015-03-29 10:27:00 +00:00
char *token = buffer;
// Tokenize it.
do {
char c = buffer[index];
// Break on space, tab, newline and \0.
if ( c == ' ' || c == '\t' || c == '\n' || c == '\0' || c == '#' ) {
buffer[index] = '\0';
// Ignore empty tokens
if ( token[0] != '\0' ) {
ti++;
// and first token.
if ( ti > 1 ) {
// Is this host name already in the list?
// We often get duplicates in hosts file, so lets check this.
int found = 0;
for ( unsigned int j = 0; j < ( *length ); j++ ) {
if ( !g_ascii_strcasecmp ( token, retv[j] ) ) {
found = 1;
break;
}
}
if ( !found ) {
// Add this host name to the list.
retv = g_realloc ( retv,
( ( *length ) + 2 ) * sizeof ( char* ) );
retv[( *length )] = g_strdup ( token );
retv[( *length ) + 1] = NULL;
( *length )++;
}
}
}
// Set start to next element.
token = &buffer[index + 1];
// Everything after comment ignore.
if ( c == '#' ) {
break;
}
}
// Skip to the next entry.
index++;
} while ( buffer[index] != '\0' && buffer[index] != '#' );
}
2016-04-10 12:30:13 +00:00
if ( buffer != NULL ) {
free ( buffer );
}
if ( fclose ( fd ) != 0 ) {
fprintf ( stderr, "Failed to close hosts file: '%s'\n", strerror ( errno ) );
}
2015-03-29 10:27:00 +00:00
}
return retv;
}
static void parse_ssh_config_file ( const char *filename, char ***retv, unsigned int *length, unsigned int num_favorites )
2014-01-21 09:01:55 +00:00
{
2017-03-17 13:07:11 +00:00
FILE *fd = fopen ( filename, "r" );
2014-01-21 09:01:55 +00:00
g_debug ( "Parsing ssh config file: %s", filename );
2014-06-04 19:29:23 +00:00
if ( fd != NULL ) {
char *buffer = NULL;
size_t buffer_length = 0;
char *strtok_pointer = NULL;
2016-04-10 12:30:13 +00:00
while ( getline ( &buffer, &buffer_length, fd ) > 0 ) {
// Each line is either empty, a comment line starting with a '#'
// character or of the form "keyword [=] arguments", where there may
// be multiple (possibly quoted) arguments separated by whitespace.
// The keyword is separated from its arguments by whitespace OR by
// optional whitespace and a '=' character.
char *token = strtok_r ( buffer, SSH_TOKEN_DELIM, &strtok_pointer );
// Skip empty lines and comment lines. Also skip lines where the
// keyword is not "Host".
if ( !token || *token == '#' ) {
2015-01-10 14:31:13 +00:00
continue;
}
2014-01-21 09:13:42 +00:00
2017-03-17 13:07:11 +00:00
if ( g_strcmp0 ( token, "Include" ) == 0 ) {
token = strtok_r ( NULL, SSH_TOKEN_DELIM, &strtok_pointer );
g_debug ( "Found Include: %s", token );
2017-03-17 13:07:11 +00:00
gchar *path = rofi_expand_path ( token );
gchar *full_path = NULL;
2017-03-17 13:07:11 +00:00
if ( !g_path_is_absolute ( path ) ) {
char *dirname = g_path_get_dirname ( filename );
full_path = g_build_filename ( dirname, path, NULL );
2017-03-17 13:07:11 +00:00
g_free ( dirname );
}
else {
full_path = g_strdup ( path );
2014-03-22 20:04:19 +00:00
}
2017-03-17 13:07:11 +00:00
glob_t globbuf = { 0, };
2014-01-22 09:01:45 +00:00
2017-03-17 13:07:11 +00:00
if ( glob ( full_path, 0, NULL, &globbuf ) == 0 ) {
for ( size_t iter = 0; iter < globbuf.gl_pathc; iter++ ) {
parse_ssh_config_file ( globbuf.gl_pathv[iter], retv, length, num_favorites );
}
}
globfree ( &globbuf );
g_free ( full_path );
g_free ( path );
}
else if ( g_strcmp0 ( token, "Host" ) == 0 ) {
// Now we know that this is a "Host" line.
// The "Host" keyword is followed by one more host names separated
// by whitespace; while host names may be quoted with double quotes
// to represent host names containing spaces, we don't support this
// (how many host names contain spaces?).
while ( ( token = strtok_r ( NULL, SSH_TOKEN_DELIM, &strtok_pointer ) ) ) {
// We do not want to show wildcard entries, as you cannot ssh to them.
const char *const sep = "*?";
if ( *token == '!' || strpbrk ( token, sep ) ) {
continue;
}
// If comment, skip from now on.
if ( *token == '#' ) {
break;
2014-03-22 20:04:19 +00:00
}
2014-01-21 13:56:25 +00:00
// Is this host name already in the history file?
// This is a nice little penalty, but doable? time will tell.
// given num_favorites is max 25.
int found = 0;
for ( unsigned int j = 0; j < num_favorites; j++ ) {
2017-03-17 13:07:11 +00:00
if ( !g_ascii_strcasecmp ( token, ( *retv )[j] ) ) {
found = 1;
break;
}
}
2014-01-21 09:35:59 +00:00
if ( found ) {
continue;
}
// Add this host name to the list.
2017-03-17 13:07:11 +00:00
( *retv ) = g_realloc ( ( *retv ), ( ( *length ) + 2 ) * sizeof ( char* ) );
( *retv )[( *length )] = g_strdup ( token );
( *retv )[( *length ) + 1] = NULL;
( *length )++;
}
2014-01-21 09:01:55 +00:00
}
}
2016-04-10 12:30:13 +00:00
if ( buffer != NULL ) {
free ( buffer );
}
2014-01-21 09:01:55 +00:00
if ( fclose ( fd ) != 0 ) {
fprintf ( stderr, "Failed to close ssh configuration file: '%s'\n", strerror ( errno ) );
}
2014-01-21 09:01:55 +00:00
}
}
/**
* @param length The number of found ssh hosts [out]
*
* Gets the list available SSH hosts.
*
* @return an array of strings containing all the hosts.
*/
static char ** get_ssh ( unsigned int *length )
{
char **retv = NULL;
unsigned int num_favorites = 0;
char *path;
if ( g_get_home_dir () == NULL ) {
return NULL;
}
path = g_build_filename ( cache_dir, SSH_CACHE_FILE, NULL );
retv = history_get_list ( path, length );
g_free ( path );
num_favorites = ( *length );
if ( config.parse_known_hosts == TRUE ) {
retv = read_known_hosts_file ( retv, length );
}
if ( config.parse_hosts == TRUE ) {
retv = read_hosts_file ( retv, length );
}
const char *hd = g_get_home_dir ();
path = g_build_filename ( hd, ".ssh", "config", NULL );
2014-01-21 09:01:55 +00:00
parse_ssh_config_file ( path, &retv, length, num_favorites );
g_free ( path );
2014-01-21 09:01:55 +00:00
return retv;
}
2016-01-05 18:49:13 +00:00
/**
* The internal data structure holding the private data of the SSH Mode.
*/
typedef struct
2014-01-21 09:01:55 +00:00
{
2016-01-05 18:49:13 +00:00
/** List if available ssh hosts.*/
2016-01-05 20:19:30 +00:00
char **hosts_list;
/** Length of the #hosts_list.*/
unsigned int hosts_list_length;
2015-03-27 19:28:53 +00:00
} SSHModePrivateData;
2014-01-21 09:01:55 +00:00
2016-01-05 18:49:13 +00:00
/**
2016-01-05 20:19:30 +00:00
* @param sw Object handle to the SSH Mode object
2016-01-05 18:49:13 +00:00
*
2016-01-05 20:19:30 +00:00
* Initializes the SSH Mode private data object and
2016-01-05 18:49:13 +00:00
* loads the relevant ssh information.
*/
static int ssh_mode_init ( Mode *sw )
2015-03-27 19:28:53 +00:00
{
2016-01-07 20:27:20 +00:00
if ( mode_get_private_data ( sw ) == NULL ) {
2015-03-27 19:28:53 +00:00
SSHModePrivateData *pd = g_malloc0 ( sizeof ( *pd ) );
2016-01-07 20:27:20 +00:00
mode_set_private_data ( sw, (void *) pd );
pd->hosts_list = get_ssh ( &( pd->hosts_list_length ) );
2015-03-27 19:28:53 +00:00
}
return TRUE;
2015-03-27 19:28:53 +00:00
}
2016-01-05 18:49:13 +00:00
/**
2016-01-05 20:19:30 +00:00
* @param sw Object handle to the SSH Mode object
*
2016-01-05 18:49:13 +00:00
* Get the number of SSH entries.
*
* @returns the number of ssh entries.
*/
static unsigned int ssh_mode_get_num_entries ( const Mode *sw )
2015-03-27 19:28:53 +00:00
{
2016-01-07 20:27:20 +00:00
const SSHModePrivateData *rmpd = (const SSHModePrivateData *) mode_get_private_data ( sw );
2016-01-05 20:19:30 +00:00
return rmpd->hosts_list_length;
2015-03-27 19:28:53 +00:00
}
2016-01-05 18:49:13 +00:00
2016-01-05 20:19:30 +00:00
/**
* @param sw Object handle to the SSH Mode object
* @param mretv The menu return value.
* @param input Pointer to the user input string.
* @param selected_line the line selected by the user.
*
* Acts on the user interaction.
*
* @returns the next #ModeMode.
*/
static ModeMode ssh_mode_result ( Mode *sw, int mretv, char **input, unsigned int selected_line )
2015-03-27 19:28:53 +00:00
{
ModeMode retv = MODE_EXIT;
2016-01-07 20:27:20 +00:00
SSHModePrivateData *rmpd = (SSHModePrivateData *) mode_get_private_data ( sw );
2015-03-27 19:28:53 +00:00
if ( mretv & MENU_NEXT ) {
2014-01-22 08:24:31 +00:00
retv = NEXT_DIALOG;
2014-03-22 20:04:19 +00:00
}
2015-03-27 19:28:53 +00:00
else if ( mretv & MENU_PREVIOUS ) {
2014-11-11 20:50:16 +00:00
retv = PREVIOUS_DIALOG;
}
2015-03-27 19:28:53 +00:00
else if ( mretv & MENU_QUICK_SWITCH ) {
retv = ( mretv & MENU_LOWER_MASK );
}
2016-01-05 20:19:30 +00:00
else if ( ( mretv & MENU_OK ) && rmpd->hosts_list[selected_line] != NULL ) {
exec_ssh ( rmpd->hosts_list[selected_line] );
2014-03-22 20:04:19 +00:00
}
2015-03-27 19:28:53 +00:00
else if ( ( mretv & MENU_CUSTOM_INPUT ) && *input != NULL && *input[0] != '\0' ) {
2014-03-22 20:04:19 +00:00
exec_ssh ( *input );
}
2016-01-05 20:19:30 +00:00
else if ( ( mretv & MENU_ENTRY_DELETE ) && rmpd->hosts_list[selected_line] ) {
delete_ssh ( rmpd->hosts_list[selected_line] );
g_strfreev ( rmpd->hosts_list );
rmpd->hosts_list_length = 0;
rmpd->hosts_list = NULL;
2014-02-01 13:39:49 +00:00
// Stay
retv = RELOAD_DIALOG;
2014-01-21 09:01:55 +00:00
}
return retv;
}
2015-03-27 19:28:53 +00:00
2016-01-05 20:19:30 +00:00
/**
* @param sw Object handle to the SSH Mode object
*
* Cleanup the SSH Mode. Free all allocated memory and NULL the private data pointer.
*/
static void ssh_mode_destroy ( Mode *sw )
2015-03-27 19:28:53 +00:00
{
2016-01-07 20:27:20 +00:00
SSHModePrivateData *rmpd = (SSHModePrivateData *) mode_get_private_data ( sw );
2015-03-27 19:28:53 +00:00
if ( rmpd != NULL ) {
2016-01-05 20:19:30 +00:00
g_strfreev ( rmpd->hosts_list );
2015-03-27 19:28:53 +00:00
g_free ( rmpd );
2016-01-07 20:27:20 +00:00
mode_set_private_data ( sw, NULL );
2015-03-27 19:28:53 +00:00
}
}
2016-01-05 20:19:30 +00:00
/**
* @param sw Object handle to the SSH Mode object
* @param selected_line The line to view
* @param state The state of the entry [out]
* @param attr_list List of extra rendering attributes to set [out]
2016-01-05 20:19:30 +00:00
* @param get_entry
*
* Gets the string as it should be displayed and the display state.
* If get_entry is FALSE only the state is set.
*
* @return the string as it should be displayed and the display state.
*/
static char *_get_display_value ( const Mode *sw, unsigned int selected_line, G_GNUC_UNUSED int *state, G_GNUC_UNUSED GList **attr_list, int get_entry )
{
2016-01-07 20:27:20 +00:00
SSHModePrivateData *rmpd = (SSHModePrivateData *) mode_get_private_data ( sw );
2016-01-05 20:19:30 +00:00
return get_entry ? g_strdup ( rmpd->hosts_list[selected_line] ) : NULL;
}
2016-01-05 20:19:30 +00:00
/**
* @param sw Object handle to the SSH Mode object
* @param tokens The set of tokens to match against
* @param index The index of the entry to match
*
* Match entry against the set of tokens.
*
* @returns TRUE if matches
*/
2016-05-22 15:47:34 +00:00
static int ssh_token_match ( const Mode *sw, GRegex **tokens, unsigned int index )
{
2016-01-07 20:27:20 +00:00
SSHModePrivateData *rmpd = (SSHModePrivateData *) mode_get_private_data ( sw );
return helper_token_match ( tokens, rmpd->hosts_list[index] );
}
2016-01-07 20:27:20 +00:00
#include "mode-private.h"
Mode ssh_mode =
2015-03-27 19:28:53 +00:00
{
2016-01-07 20:27:20 +00:00
.name = "ssh",
.cfg_name_key = "display-ssh",
2016-01-07 20:27:20 +00:00
._init = ssh_mode_init,
._get_num_entries = ssh_mode_get_num_entries,
._result = ssh_mode_result,
._destroy = ssh_mode_destroy,
._token_match = ssh_token_match,
._get_display_value = _get_display_value,
._get_completion = NULL,
._preprocess_input = NULL,
2016-01-07 20:27:20 +00:00
.private_data = NULL,
.free = NULL
2015-03-27 19:28:53 +00:00
};
2016-01-05 18:49:13 +00:00
/*@}*/