utils.go 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239
  1. // License: GPLv3 Copyright: 2023, Kovid Goyal, <kovid at kovidgoyal.net>
  2. package ssh
  3. import (
  4. "bytes"
  5. "fmt"
  6. "os/exec"
  7. "regexp"
  8. "strconv"
  9. "strings"
  10. "sync"
  11. "kitty"
  12. "kitty/tools/config"
  13. "kitty/tools/utils"
  14. )
  15. var _ = fmt.Print
  16. var SSHExe = sync.OnceValue(func() string {
  17. return utils.FindExe("ssh")
  18. })
  19. var SSHOptions = sync.OnceValue(func() (ssh_options map[string]string) {
  20. defer func() {
  21. if ssh_options == nil {
  22. ssh_options = map[string]string{
  23. "4": "", "6": "", "A": "", "a": "", "C": "", "f": "", "G": "", "g": "", "K": "", "k": "",
  24. "M": "", "N": "", "n": "", "q": "", "s": "", "T": "", "t": "", "V": "", "v": "", "X": "",
  25. "x": "", "Y": "", "y": "", "B": "bind_interface", "b": "bind_address", "c": "cipher_spec",
  26. "D": "[bind_address:]port", "E": "log_file", "e": "escape_char", "F": "configfile", "I": "pkcs11",
  27. "i": "identity_file", "J": "[user@]host[:port]", "L": "address", "l": "login_name", "m": "mac_spec",
  28. "O": "ctl_cmd", "o": "option", "p": "port", "Q": "query_option", "R": "address",
  29. "S": "ctl_path", "W": "host:port", "w": "local_tun[:remote_tun]",
  30. }
  31. }
  32. }()
  33. cmd := exec.Command(SSHExe())
  34. var stdout, stderr bytes.Buffer
  35. cmd.Stdout = &stdout
  36. cmd.Stderr = &stderr
  37. _ = cmd.Run()
  38. text := stderr.String()
  39. if text == "" || strings.Contains(text, "OpenSSL version mismatch.") {
  40. // https://bugzilla.mindrot.org/show_bug.cgi?id=3548
  41. return
  42. }
  43. ssh_options = make(map[string]string, 32)
  44. for {
  45. pos := strings.IndexByte(text, '[')
  46. if pos < 0 {
  47. break
  48. }
  49. num := 1
  50. epos := pos
  51. for num > 0 {
  52. epos++
  53. switch text[epos] {
  54. case '[':
  55. num += 1
  56. case ']':
  57. num -= 1
  58. }
  59. }
  60. q := text[pos+1 : epos]
  61. text = text[epos:]
  62. if len(q) < 2 || !strings.HasPrefix(q, "-") {
  63. continue
  64. }
  65. opt, desc, found := strings.Cut(q, " ")
  66. if found {
  67. ssh_options[opt[1:]] = desc
  68. } else {
  69. for _, ch := range opt[1:] {
  70. ssh_options[string(ch)] = ""
  71. }
  72. }
  73. }
  74. return
  75. })
  76. func GetSSHCLI() (boolean_ssh_args *utils.Set[string], other_ssh_args *utils.Set[string]) {
  77. other_ssh_args, boolean_ssh_args = utils.NewSet[string](32), utils.NewSet[string](32)
  78. for k, v := range SSHOptions() {
  79. k = "-" + k
  80. if v == "" {
  81. boolean_ssh_args.Add(k)
  82. } else {
  83. other_ssh_args.Add(k)
  84. }
  85. }
  86. return
  87. }
  88. func is_extra_arg(arg string, extra_args []string) string {
  89. for _, x := range extra_args {
  90. if arg == x || strings.HasPrefix(arg, x+"=") {
  91. return x
  92. }
  93. }
  94. return ""
  95. }
  96. type ErrInvalidSSHArgs struct {
  97. Msg string
  98. }
  99. func (self *ErrInvalidSSHArgs) Error() string {
  100. return self.Msg
  101. }
  102. func PassthroughArgs() map[string]bool {
  103. return map[string]bool{"-N": true, "-n": true, "-f": true, "-G": true, "-T": true, "-V": true}
  104. }
  105. func ParseSSHArgs(args []string, extra_args ...string) (ssh_args []string, server_args []string, passthrough bool, found_extra_args []string, err error) {
  106. if extra_args == nil {
  107. extra_args = []string{}
  108. }
  109. if len(args) == 0 {
  110. passthrough = true
  111. return
  112. }
  113. passthrough_args := PassthroughArgs()
  114. boolean_ssh_args, other_ssh_args := GetSSHCLI()
  115. ssh_args, server_args, found_extra_args = make([]string, 0, 16), make([]string, 0, 16), make([]string, 0, 16)
  116. expecting_option_val := false
  117. stop_option_processing := false
  118. expecting_extra_val := ""
  119. for _, argument := range args {
  120. if len(server_args) > 1 || stop_option_processing {
  121. server_args = append(server_args, argument)
  122. continue
  123. }
  124. if strings.HasPrefix(argument, "-") && !expecting_option_val {
  125. if argument == "--" {
  126. stop_option_processing = true
  127. continue
  128. }
  129. if len(extra_args) > 0 {
  130. matching_ex := is_extra_arg(argument, extra_args)
  131. if matching_ex != "" {
  132. _, exval, found := strings.Cut(argument, "=")
  133. if found {
  134. found_extra_args = append(found_extra_args, matching_ex, exval)
  135. } else {
  136. expecting_extra_val = matching_ex
  137. expecting_option_val = true
  138. }
  139. continue
  140. }
  141. }
  142. // could be a multi-character option
  143. all_args := []rune(argument[1:])
  144. for i, ch := range all_args {
  145. arg := "-" + string(ch)
  146. if passthrough_args[arg] {
  147. passthrough = true
  148. }
  149. if boolean_ssh_args.Has(arg) {
  150. ssh_args = append(ssh_args, arg)
  151. continue
  152. }
  153. if other_ssh_args.Has(arg) {
  154. ssh_args = append(ssh_args, arg)
  155. if i+1 < len(all_args) {
  156. ssh_args = append(ssh_args, string(all_args[i+1:]))
  157. } else {
  158. expecting_option_val = true
  159. }
  160. break
  161. }
  162. err = &ErrInvalidSSHArgs{Msg: "unknown option -- " + arg[1:]}
  163. return
  164. }
  165. continue
  166. }
  167. if expecting_option_val {
  168. if expecting_extra_val != "" {
  169. found_extra_args = append(found_extra_args, expecting_extra_val, argument)
  170. } else {
  171. ssh_args = append(ssh_args, argument)
  172. }
  173. expecting_option_val = false
  174. continue
  175. }
  176. server_args = append(server_args, argument)
  177. }
  178. if len(server_args) == 0 && !passthrough {
  179. err = &ErrInvalidSSHArgs{Msg: ""}
  180. }
  181. return
  182. }
  183. type SSHVersion struct{ Major, Minor int }
  184. func (self SSHVersion) SupportsAskpassRequire() bool {
  185. return self.Major > 8 || (self.Major == 8 && self.Minor >= 4)
  186. }
  187. var GetSSHVersion = sync.OnceValue(func() SSHVersion {
  188. b, err := exec.Command(SSHExe(), "-V").CombinedOutput()
  189. if err != nil {
  190. return SSHVersion{}
  191. }
  192. m := regexp.MustCompile(`OpenSSH_(\d+).(\d+)`).FindSubmatch(b)
  193. if len(m) == 3 {
  194. maj, _ := strconv.Atoi(utils.UnsafeBytesToString(m[1]))
  195. min, _ := strconv.Atoi(utils.UnsafeBytesToString(m[2]))
  196. return SSHVersion{Major: maj, Minor: min}
  197. }
  198. return SSHVersion{}
  199. })
  200. type KittyOpts struct {
  201. Term, Shell_integration string
  202. }
  203. func read_relevant_kitty_opts(override_conf_path ...string) KittyOpts {
  204. ans := KittyOpts{Term: kitty.KittyConfigDefaults.Term, Shell_integration: kitty.KittyConfigDefaults.Shell_integration}
  205. handle_line := func(key, val string) error {
  206. switch key {
  207. case "term":
  208. ans.Term = strings.TrimSpace(val)
  209. case "shell_integration":
  210. ans.Shell_integration = strings.TrimSpace(val)
  211. }
  212. return nil
  213. }
  214. config.ReadKittyConfig(handle_line, override_conf_path...)
  215. return ans
  216. }
  217. var RelevantKittyOpts = sync.OnceValue(func() KittyOpts {
  218. return read_relevant_kitty_opts()
  219. })