guacamole-spice-protocol/protocols/ssh/src/ssh_client.c

244 lines
7.5 KiB
C
Raw Normal View History

2011-07-30 22:12:28 +00:00
/* ***** BEGIN LICENSE BLOCK *****
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
*
* The contents of this file are subject to the Mozilla Public License Version
* 1.1 (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
* http://www.mozilla.org/MPL/
*
* Software distributed under the License is distributed on an "AS IS" basis,
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
* for the specific language governing rights and limitations under the
* License.
*
* The Original Code is libguac-client-ssh.
*
* The Initial Developer of the Original Code is
* Michael Jumper.
* Portions created by the Initial Developer are Copyright (C) 2011
* the Initial Developer. All Rights Reserved.
*
* Contributor(s):
* James Muehlner <dagger10k@users.sourceforge.net>
2011-07-30 22:12:28 +00:00
*
* Alternatively, the contents of this file may be used under the terms of
* either the GNU General Public License Version 2 or later (the "GPL"), or
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
* in which case the provisions of the GPL or the LGPL are applicable instead
* of those above. If you wish to allow use of your version of this file only
* under the terms of either the GPL or the LGPL, and not to allow others to
* use your version of this file under the terms of the MPL, indicate your
* decision by deleting the provisions above and replace them with the notice
* and other provisions required by the GPL or the LGPL. If you do not delete
* the provisions above, a recipient may use your version of this file under
* the terms of any one of the MPL, the GPL or the LGPL.
*
* ***** END LICENSE BLOCK ***** */
#include <stdlib.h>
#include <string.h>
#include <libssh/libssh.h>
2011-11-26 23:35:45 +00:00
#include <guacamole/socket.h>
2011-07-30 22:12:28 +00:00
#include <guacamole/protocol.h>
#include <guacamole/client.h>
#include "ssh_client.h"
#include "ssh_handlers.h"
#include "terminal.h"
2013-04-09 21:02:52 +00:00
#include "blank.h"
2013-03-29 10:14:08 +00:00
#include "ibar.h"
2011-08-01 03:51:19 +00:00
/* Client plugin arguments */
const char* GUAC_CLIENT_ARGS[] = {
"hostname",
"user",
"password",
2011-08-01 03:51:19 +00:00
NULL
};
int ssh_guac_client_password_key_handler(guac_client* client, int keysym, int pressed) {
ssh_guac_client_data* client_data = (ssh_guac_client_data*) client->data;
/* If key pressed */
if (pressed) {
/* If simple ASCII key */
if (keysym >= 0x00 && keysym <= 0xFF) {
/* Add to password */
client_data->password[client_data->password_length++] = keysym;
guac_terminal_write(client_data->term, "*", 1);
2011-11-26 23:35:45 +00:00
guac_socket_flush(client->socket);
}
else if (keysym == 0xFF08) {
if (client_data->password_length > 0) {
client_data->password_length--;
/* Backspace */
guac_terminal_write(client_data->term, "\x08\x1B[K", 4);
2011-11-26 23:35:45 +00:00
guac_socket_flush(client->socket);
}
}
else if (keysym == 0xFF0D) {
/* Finish password */
client_data->password[client_data->password_length] = '\0';
/* Clear screen */
guac_terminal_write(client_data->term, "\x1B[2J\x1B[1;1H", 10);
2011-11-26 23:35:45 +00:00
guac_socket_flush(client->socket);
return ssh_guac_client_auth(client, client_data->password);
}
}
return 0;
}
2011-08-01 03:51:19 +00:00
2011-07-30 22:12:28 +00:00
int guac_client_init(guac_client* client, int argc, char** argv) {
2011-11-26 23:35:45 +00:00
guac_socket* socket = client->socket;
2011-08-01 03:51:19 +00:00
ssh_guac_client_data* client_data = malloc(sizeof(ssh_guac_client_data));
guac_terminal* term = guac_terminal_create(client,
2012-10-23 08:38:10 +00:00
client->info.optimal_width, client->info.optimal_height);
2011-08-01 03:51:19 +00:00
/* Init client data */
2011-08-01 03:51:19 +00:00
client->data = client_data;
client_data->term = term;
2011-08-22 06:24:40 +00:00
client_data->mod_ctrl = 0;
client_data->clipboard_data = NULL;
2011-08-01 03:51:19 +00:00
2013-04-09 21:02:52 +00:00
/* Set up I-bar pointer */
2013-04-09 20:54:23 +00:00
client_data->current_cursor =
client_data->ibar_cursor = guac_ssh_create_ibar(client);
2013-04-09 21:02:52 +00:00
/* Set up blank pointer */
client_data->blank_cursor = guac_ssh_create_blank(client);
2011-08-01 03:51:19 +00:00
/* Send name and dimensions */
2011-11-26 23:35:45 +00:00
guac_protocol_send_name(socket, "SSH TEST");
guac_protocol_send_size(socket,
2012-02-12 03:12:40 +00:00
GUAC_DEFAULT_LAYER,
term->char_width * term->term_width,
term->char_height * term->term_height);
2011-08-01 03:51:19 +00:00
2013-03-29 10:14:08 +00:00
/* Send I-bar pointer */
2013-04-09 20:54:23 +00:00
guac_ssh_set_cursor(client, client_data->ibar_cursor);
2013-03-29 10:14:08 +00:00
2011-11-26 23:35:45 +00:00
guac_socket_flush(socket);
2011-08-01 03:51:19 +00:00
/* Open SSH session */
client_data->session = ssh_new();
if (client_data->session == NULL) {
2011-11-26 23:35:45 +00:00
guac_protocol_send_error(socket, "Unable to create SSH session.");
guac_socket_flush(socket);
return 1;
}
/* Set session options */
ssh_options_set(client_data->session, SSH_OPTIONS_HOST, argv[0]);
ssh_options_set(client_data->session, SSH_OPTIONS_USER, argv[1]);
/* Connect */
if (ssh_connect(client_data->session) != SSH_OK) {
2011-11-26 23:35:45 +00:00
guac_protocol_send_error(socket, "Unable to connect via SSH.");
guac_socket_flush(socket);
return 1;
}
/* If password provided, authenticate now */
if (argv[2][0] != '\0')
return ssh_guac_client_auth(client, argv[2]);
/* Otherwise, prompt for password */
else {
client_data->password_length = 0;
guac_terminal_write(client_data->term, "Password: ", 10);
2011-11-26 23:35:45 +00:00
guac_socket_flush(client->socket);
client->key_handler = ssh_guac_client_password_key_handler;
}
/* Success */
return 0;
}
int ssh_guac_client_auth(guac_client* client, const char* password) {
2011-11-26 23:35:45 +00:00
guac_socket* socket = client->socket;
ssh_guac_client_data* client_data = (ssh_guac_client_data*) client->data;
guac_terminal* term = client_data->term;
/* Authenticate */
if (ssh_userauth_password(client_data->session, NULL, password) != SSH_AUTH_SUCCESS) {
2011-11-26 23:35:45 +00:00
guac_protocol_send_error(socket, "SSH auth failed.");
guac_socket_flush(socket);
return 1;
}
/* Open channel for terminal */
client_data->term_channel = channel_new(client_data->session);
if (client_data->term_channel == NULL) {
2011-11-26 23:35:45 +00:00
guac_protocol_send_error(socket, "Unable to open channel.");
guac_socket_flush(socket);
return 1;
}
/* Open session for channel */
if (channel_open_session(client_data->term_channel) != SSH_OK) {
2011-11-26 23:35:45 +00:00
guac_protocol_send_error(socket, "Unable to open channel session.");
guac_socket_flush(socket);
return 1;
}
/* Request PTY */
if (channel_request_pty(client_data->term_channel) != SSH_OK) {
2011-11-26 23:35:45 +00:00
guac_protocol_send_error(socket, "Unable to allocate PTY for channel.");
guac_socket_flush(socket);
return 1;
}
/* Request PTY size */
if (channel_change_pty_size(client_data->term_channel, term->term_width, term->term_height) != SSH_OK) {
2011-11-26 23:35:45 +00:00
guac_protocol_send_error(socket, "Unable to change PTY size.");
guac_socket_flush(socket);
return 1;
}
2011-08-01 03:51:19 +00:00
/* Request shell */
if (channel_request_shell(client_data->term_channel) != SSH_OK) {
2011-11-26 23:35:45 +00:00
guac_protocol_send_error(socket, "Unable to associate shell with PTY.");
guac_socket_flush(socket);
return 1;
}
2011-11-26 23:35:45 +00:00
guac_client_log_info(client, "SSH connection successful.");
/* Set handlers */
client->handle_messages = ssh_guac_client_handle_messages;
client->free_handler = ssh_guac_client_free_handler;
client->mouse_handler = ssh_guac_client_mouse_handler;
client->key_handler = ssh_guac_client_key_handler;
client->clipboard_handler = ssh_guac_client_clipboard_handler;
2011-08-01 03:51:19 +00:00
2011-07-30 22:12:28 +00:00
/* Success */
return 0;
}