utils.go 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245
  1. // License: GPLv3 Copyright: 2023, Kovid Goyal, <kovid at kovidgoyal.net>
  2. package ssh
  3. import (
  4. "fmt"
  5. "io"
  6. "os/exec"
  7. "regexp"
  8. "strconv"
  9. "strings"
  10. "sync"
  11. "kitty"
  12. "kitty/tools/config"
  13. "kitty/tools/utils"
  14. )
  15. var _ = fmt.Print
  16. var SSHExe = sync.OnceValue(func() string {
  17. return utils.FindExe("ssh")
  18. })
  19. var SSHOptions = sync.OnceValue(func() (ssh_options map[string]string) {
  20. defer func() {
  21. if ssh_options == nil {
  22. ssh_options = map[string]string{
  23. "4": "", "6": "", "A": "", "a": "", "C": "", "f": "", "G": "", "g": "", "K": "", "k": "",
  24. "M": "", "N": "", "n": "", "q": "", "s": "", "T": "", "t": "", "V": "", "v": "", "X": "",
  25. "x": "", "Y": "", "y": "", "B": "bind_interface", "b": "bind_address", "c": "cipher_spec",
  26. "D": "[bind_address:]port", "E": "log_file", "e": "escape_char", "F": "configfile", "I": "pkcs11",
  27. "i": "identity_file", "J": "[user@]host[:port]", "L": "address", "l": "login_name", "m": "mac_spec",
  28. "O": "ctl_cmd", "o": "option", "p": "port", "Q": "query_option", "R": "address",
  29. "S": "ctl_path", "W": "host:port", "w": "local_tun[:remote_tun]",
  30. }
  31. }
  32. }()
  33. cmd := exec.Command(SSHExe())
  34. stderr, err := cmd.StderrPipe()
  35. if err != nil {
  36. return
  37. }
  38. if err = cmd.Start(); err != nil {
  39. return
  40. }
  41. raw, err := io.ReadAll(stderr)
  42. if err != nil {
  43. return
  44. }
  45. text := utils.UnsafeBytesToString(raw)
  46. if strings.Contains(text, "OpenSSL version mismatch.") {
  47. // https://bugzilla.mindrot.org/show_bug.cgi?id=3548
  48. return
  49. }
  50. ssh_options = make(map[string]string, 32)
  51. for {
  52. pos := strings.IndexByte(text, '[')
  53. if pos < 0 {
  54. break
  55. }
  56. num := 1
  57. epos := pos
  58. for num > 0 {
  59. epos++
  60. switch text[epos] {
  61. case '[':
  62. num += 1
  63. case ']':
  64. num -= 1
  65. }
  66. }
  67. q := text[pos+1 : epos]
  68. text = text[epos:]
  69. if len(q) < 2 || !strings.HasPrefix(q, "-") {
  70. continue
  71. }
  72. opt, desc, found := strings.Cut(q, " ")
  73. if found {
  74. ssh_options[opt[1:]] = desc
  75. } else {
  76. for _, ch := range opt[1:] {
  77. ssh_options[string(ch)] = ""
  78. }
  79. }
  80. }
  81. return
  82. })
  83. func GetSSHCLI() (boolean_ssh_args *utils.Set[string], other_ssh_args *utils.Set[string]) {
  84. other_ssh_args, boolean_ssh_args = utils.NewSet[string](32), utils.NewSet[string](32)
  85. for k, v := range SSHOptions() {
  86. k = "-" + k
  87. if v == "" {
  88. boolean_ssh_args.Add(k)
  89. } else {
  90. other_ssh_args.Add(k)
  91. }
  92. }
  93. return
  94. }
  95. func is_extra_arg(arg string, extra_args []string) string {
  96. for _, x := range extra_args {
  97. if arg == x || strings.HasPrefix(arg, x+"=") {
  98. return x
  99. }
  100. }
  101. return ""
  102. }
  103. type ErrInvalidSSHArgs struct {
  104. Msg string
  105. }
  106. func (self *ErrInvalidSSHArgs) Error() string {
  107. return self.Msg
  108. }
  109. func PassthroughArgs() map[string]bool {
  110. return map[string]bool{"-N": true, "-n": true, "-f": true, "-G": true, "-T": true, "-V": true}
  111. }
  112. func ParseSSHArgs(args []string, extra_args ...string) (ssh_args []string, server_args []string, passthrough bool, found_extra_args []string, err error) {
  113. if extra_args == nil {
  114. extra_args = []string{}
  115. }
  116. if len(args) == 0 {
  117. passthrough = true
  118. return
  119. }
  120. passthrough_args := PassthroughArgs()
  121. boolean_ssh_args, other_ssh_args := GetSSHCLI()
  122. ssh_args, server_args, found_extra_args = make([]string, 0, 16), make([]string, 0, 16), make([]string, 0, 16)
  123. expecting_option_val := false
  124. stop_option_processing := false
  125. expecting_extra_val := ""
  126. for _, argument := range args {
  127. if len(server_args) > 1 || stop_option_processing {
  128. server_args = append(server_args, argument)
  129. continue
  130. }
  131. if strings.HasPrefix(argument, "-") && !expecting_option_val {
  132. if argument == "--" {
  133. stop_option_processing = true
  134. continue
  135. }
  136. if len(extra_args) > 0 {
  137. matching_ex := is_extra_arg(argument, extra_args)
  138. if matching_ex != "" {
  139. _, exval, found := strings.Cut(argument, "=")
  140. if found {
  141. found_extra_args = append(found_extra_args, matching_ex, exval)
  142. } else {
  143. expecting_extra_val = matching_ex
  144. expecting_option_val = true
  145. }
  146. continue
  147. }
  148. }
  149. // could be a multi-character option
  150. all_args := []rune(argument[1:])
  151. for i, ch := range all_args {
  152. arg := "-" + string(ch)
  153. if passthrough_args[arg] {
  154. passthrough = true
  155. }
  156. if boolean_ssh_args.Has(arg) {
  157. ssh_args = append(ssh_args, arg)
  158. continue
  159. }
  160. if other_ssh_args.Has(arg) {
  161. ssh_args = append(ssh_args, arg)
  162. if i+1 < len(all_args) {
  163. ssh_args = append(ssh_args, string(all_args[i+1:]))
  164. } else {
  165. expecting_option_val = true
  166. }
  167. break
  168. }
  169. err = &ErrInvalidSSHArgs{Msg: "unknown option -- " + arg[1:]}
  170. return
  171. }
  172. continue
  173. }
  174. if expecting_option_val {
  175. if expecting_extra_val != "" {
  176. found_extra_args = append(found_extra_args, expecting_extra_val, argument)
  177. } else {
  178. ssh_args = append(ssh_args, argument)
  179. }
  180. expecting_option_val = false
  181. continue
  182. }
  183. server_args = append(server_args, argument)
  184. }
  185. if len(server_args) == 0 && !passthrough {
  186. err = &ErrInvalidSSHArgs{Msg: ""}
  187. }
  188. return
  189. }
  190. type SSHVersion struct{ Major, Minor int }
  191. func (self SSHVersion) SupportsAskpassRequire() bool {
  192. return self.Major > 8 || (self.Major == 8 && self.Minor >= 4)
  193. }
  194. var GetSSHVersion = sync.OnceValue(func() SSHVersion {
  195. b, err := exec.Command(SSHExe(), "-V").CombinedOutput()
  196. if err != nil {
  197. return SSHVersion{}
  198. }
  199. m := regexp.MustCompile(`OpenSSH_(\d+).(\d+)`).FindSubmatch(b)
  200. if len(m) == 3 {
  201. maj, _ := strconv.Atoi(utils.UnsafeBytesToString(m[1]))
  202. min, _ := strconv.Atoi(utils.UnsafeBytesToString(m[2]))
  203. return SSHVersion{Major: maj, Minor: min}
  204. }
  205. return SSHVersion{}
  206. })
  207. type KittyOpts struct {
  208. Term, Shell_integration string
  209. }
  210. func read_relevant_kitty_opts(override_conf_path ...string) KittyOpts {
  211. ans := KittyOpts{Term: kitty.KittyConfigDefaults.Term, Shell_integration: kitty.KittyConfigDefaults.Shell_integration}
  212. handle_line := func(key, val string) error {
  213. switch key {
  214. case "term":
  215. ans.Term = strings.TrimSpace(val)
  216. case "shell_integration":
  217. ans.Shell_integration = strings.TrimSpace(val)
  218. }
  219. return nil
  220. }
  221. config.ReadKittyConfig(handle_line, override_conf_path...)
  222. return ans
  223. }
  224. var RelevantKittyOpts = sync.OnceValue(func() KittyOpts {
  225. return read_relevant_kitty_opts()
  226. })