2003-05-06 19:52:31 +00:00
|
|
|
/*
|
|
|
|
* uxproxy.c: Unix implementation of platform_new_connection(),
|
|
|
|
* supporting an OpenSSH-like proxy command.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <assert.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
|
|
|
|
#define DEFINE_PLUG_METHOD_MACROS
|
|
|
|
#include "tree234.h"
|
|
|
|
#include "putty.h"
|
|
|
|
#include "network.h"
|
|
|
|
#include "proxy.h"
|
|
|
|
|
2018-05-27 08:29:33 +00:00
|
|
|
typedef struct LocalProxySocket {
|
2015-11-22 11:50:37 +00:00
|
|
|
int to_cmd, from_cmd, cmd_err; /* fds */
|
2003-05-06 19:52:31 +00:00
|
|
|
|
|
|
|
char *error;
|
|
|
|
|
|
|
|
Plug plug;
|
|
|
|
|
|
|
|
bufchain pending_output_data;
|
|
|
|
bufchain pending_input_data;
|
2015-11-22 11:50:37 +00:00
|
|
|
bufchain pending_error_data;
|
2011-09-13 11:44:03 +00:00
|
|
|
enum { EOF_NO, EOF_PENDING, EOF_SENT } outgoingeof;
|
2018-05-27 08:29:33 +00:00
|
|
|
|
|
|
|
const Socket_vtable *sockvt;
|
|
|
|
} LocalProxySocket;
|
2003-05-06 19:52:31 +00:00
|
|
|
|
2016-05-30 21:52:30 +00:00
|
|
|
static void localproxy_select_result(int fd, int event);
|
2003-05-06 19:52:31 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Trees to look up the pipe fds in.
|
|
|
|
*/
|
2015-11-22 11:50:37 +00:00
|
|
|
static tree234 *localproxy_by_fromfd;
|
|
|
|
static tree234 *localproxy_by_tofd;
|
|
|
|
static tree234 *localproxy_by_errfd;
|
2003-05-06 19:52:31 +00:00
|
|
|
static int localproxy_fromfd_cmp(void *av, void *bv)
|
|
|
|
{
|
2018-05-27 08:29:33 +00:00
|
|
|
LocalProxySocket *a = (LocalProxySocket *)av;
|
|
|
|
LocalProxySocket *b = (LocalProxySocket *)bv;
|
2003-05-06 19:52:31 +00:00
|
|
|
if (a->from_cmd < b->from_cmd)
|
|
|
|
return -1;
|
|
|
|
if (a->from_cmd > b->from_cmd)
|
|
|
|
return +1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
static int localproxy_fromfd_find(void *av, void *bv)
|
|
|
|
{
|
|
|
|
int a = *(int *)av;
|
2018-05-27 08:29:33 +00:00
|
|
|
LocalProxySocket *b = (LocalProxySocket *)bv;
|
2003-05-06 19:52:31 +00:00
|
|
|
if (a < b->from_cmd)
|
|
|
|
return -1;
|
|
|
|
if (a > b->from_cmd)
|
|
|
|
return +1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
static int localproxy_tofd_cmp(void *av, void *bv)
|
|
|
|
{
|
2018-05-27 08:29:33 +00:00
|
|
|
LocalProxySocket *a = (LocalProxySocket *)av;
|
|
|
|
LocalProxySocket *b = (LocalProxySocket *)bv;
|
2003-05-06 19:52:31 +00:00
|
|
|
if (a->to_cmd < b->to_cmd)
|
|
|
|
return -1;
|
|
|
|
if (a->to_cmd > b->to_cmd)
|
|
|
|
return +1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
static int localproxy_tofd_find(void *av, void *bv)
|
|
|
|
{
|
|
|
|
int a = *(int *)av;
|
2018-05-27 08:29:33 +00:00
|
|
|
LocalProxySocket *b = (LocalProxySocket *)bv;
|
2003-05-06 19:52:31 +00:00
|
|
|
if (a < b->to_cmd)
|
|
|
|
return -1;
|
|
|
|
if (a > b->to_cmd)
|
|
|
|
return +1;
|
|
|
|
return 0;
|
|
|
|
}
|
2015-11-22 11:50:37 +00:00
|
|
|
static int localproxy_errfd_cmp(void *av, void *bv)
|
|
|
|
{
|
2018-05-27 08:29:33 +00:00
|
|
|
LocalProxySocket *a = (LocalProxySocket *)av;
|
|
|
|
LocalProxySocket *b = (LocalProxySocket *)bv;
|
2015-11-22 11:50:37 +00:00
|
|
|
if (a->cmd_err < b->cmd_err)
|
|
|
|
return -1;
|
|
|
|
if (a->cmd_err > b->cmd_err)
|
|
|
|
return +1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
static int localproxy_errfd_find(void *av, void *bv)
|
|
|
|
{
|
|
|
|
int a = *(int *)av;
|
2018-05-27 08:29:33 +00:00
|
|
|
LocalProxySocket *b = (LocalProxySocket *)bv;
|
2015-11-22 11:50:37 +00:00
|
|
|
if (a < b->cmd_err)
|
|
|
|
return -1;
|
|
|
|
if (a > b->cmd_err)
|
|
|
|
return +1;
|
|
|
|
return 0;
|
|
|
|
}
|
2003-05-06 19:52:31 +00:00
|
|
|
|
|
|
|
/* basic proxy socket functions */
|
|
|
|
|
|
|
|
static Plug sk_localproxy_plug (Socket s, Plug p)
|
|
|
|
{
|
2018-05-27 08:29:33 +00:00
|
|
|
LocalProxySocket *ps = FROMFIELD(s, LocalProxySocket, sockvt);
|
2003-05-06 19:52:31 +00:00
|
|
|
Plug ret = ps->plug;
|
|
|
|
if (p)
|
|
|
|
ps->plug = p;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void sk_localproxy_close (Socket s)
|
|
|
|
{
|
2018-05-27 08:29:33 +00:00
|
|
|
LocalProxySocket *ps = FROMFIELD(s, LocalProxySocket, sockvt);
|
2003-05-06 19:52:31 +00:00
|
|
|
|
2011-09-13 11:44:03 +00:00
|
|
|
if (ps->to_cmd >= 0) {
|
|
|
|
del234(localproxy_by_tofd, ps);
|
|
|
|
uxsel_del(ps->to_cmd);
|
|
|
|
close(ps->to_cmd);
|
|
|
|
}
|
2003-05-06 19:52:31 +00:00
|
|
|
|
2011-09-13 11:44:03 +00:00
|
|
|
del234(localproxy_by_fromfd, ps);
|
2004-12-10 11:41:14 +00:00
|
|
|
uxsel_del(ps->from_cmd);
|
2003-05-06 19:52:31 +00:00
|
|
|
close(ps->from_cmd);
|
|
|
|
|
2015-11-22 11:50:37 +00:00
|
|
|
del234(localproxy_by_errfd, ps);
|
|
|
|
uxsel_del(ps->cmd_err);
|
|
|
|
close(ps->cmd_err);
|
|
|
|
|
2015-11-22 15:02:14 +00:00
|
|
|
bufchain_clear(&ps->pending_input_data);
|
|
|
|
bufchain_clear(&ps->pending_output_data);
|
2015-11-22 11:50:37 +00:00
|
|
|
bufchain_clear(&ps->pending_error_data);
|
|
|
|
|
2003-05-06 19:52:31 +00:00
|
|
|
sfree(ps);
|
|
|
|
}
|
|
|
|
|
2018-05-27 08:29:33 +00:00
|
|
|
static int localproxy_try_send(LocalProxySocket *ps)
|
2003-05-06 19:52:31 +00:00
|
|
|
{
|
|
|
|
int sent = 0;
|
|
|
|
|
|
|
|
while (bufchain_size(&ps->pending_output_data) > 0) {
|
|
|
|
void *data;
|
|
|
|
int len, ret;
|
|
|
|
|
|
|
|
bufchain_prefix(&ps->pending_output_data, &data, &len);
|
|
|
|
ret = write(ps->to_cmd, data, len);
|
|
|
|
if (ret < 0 && errno != EWOULDBLOCK) {
|
2017-02-22 21:51:03 +00:00
|
|
|
plug_closing(ps->plug, strerror(errno), errno, 0);
|
|
|
|
return 0;
|
2003-05-06 19:52:31 +00:00
|
|
|
} else if (ret <= 0) {
|
|
|
|
break;
|
|
|
|
} else {
|
|
|
|
bufchain_consume(&ps->pending_output_data, ret);
|
|
|
|
sent += ret;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-09-13 11:44:03 +00:00
|
|
|
if (ps->outgoingeof == EOF_PENDING) {
|
|
|
|
del234(localproxy_by_tofd, ps);
|
|
|
|
close(ps->to_cmd);
|
|
|
|
uxsel_del(ps->to_cmd);
|
|
|
|
ps->to_cmd = -1;
|
|
|
|
ps->outgoingeof = EOF_SENT;
|
|
|
|
}
|
|
|
|
|
2003-05-06 19:52:31 +00:00
|
|
|
if (bufchain_size(&ps->pending_output_data) == 0)
|
|
|
|
uxsel_del(ps->to_cmd);
|
|
|
|
else
|
|
|
|
uxsel_set(ps->to_cmd, 2, localproxy_select_result);
|
|
|
|
|
|
|
|
return sent;
|
|
|
|
}
|
|
|
|
|
2018-05-26 07:31:34 +00:00
|
|
|
static int sk_localproxy_write (Socket s, const void *data, int len)
|
2003-05-06 19:52:31 +00:00
|
|
|
{
|
2018-05-27 08:29:33 +00:00
|
|
|
LocalProxySocket *ps = FROMFIELD(s, LocalProxySocket, sockvt);
|
2003-05-06 19:52:31 +00:00
|
|
|
|
2011-09-13 11:44:03 +00:00
|
|
|
assert(ps->outgoingeof == EOF_NO);
|
|
|
|
|
2003-05-06 19:52:31 +00:00
|
|
|
bufchain_add(&ps->pending_output_data, data, len);
|
|
|
|
|
|
|
|
localproxy_try_send(ps);
|
|
|
|
|
|
|
|
return bufchain_size(&ps->pending_output_data);
|
|
|
|
}
|
|
|
|
|
2018-05-26 07:31:34 +00:00
|
|
|
static int sk_localproxy_write_oob (Socket s, const void *data, int len)
|
2003-05-06 19:52:31 +00:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* oob data is treated as inband; nasty, but nothing really
|
|
|
|
* better we can do
|
|
|
|
*/
|
|
|
|
return sk_localproxy_write(s, data, len);
|
|
|
|
}
|
|
|
|
|
2011-09-13 11:44:03 +00:00
|
|
|
static void sk_localproxy_write_eof (Socket s)
|
|
|
|
{
|
2018-05-27 08:29:33 +00:00
|
|
|
LocalProxySocket *ps = FROMFIELD(s, LocalProxySocket, sockvt);
|
2011-09-13 11:44:03 +00:00
|
|
|
|
|
|
|
assert(ps->outgoingeof == EOF_NO);
|
|
|
|
ps->outgoingeof = EOF_PENDING;
|
|
|
|
|
|
|
|
localproxy_try_send(ps);
|
|
|
|
}
|
|
|
|
|
2003-05-06 19:52:31 +00:00
|
|
|
static void sk_localproxy_flush (Socket s)
|
|
|
|
{
|
2018-05-27 08:29:33 +00:00
|
|
|
/* LocalProxySocket *ps = FROMFIELD(s, LocalProxySocket, sockvt); */
|
2003-05-06 19:52:31 +00:00
|
|
|
/* do nothing */
|
|
|
|
}
|
|
|
|
|
|
|
|
static void sk_localproxy_set_frozen (Socket s, int is_frozen)
|
|
|
|
{
|
2018-05-27 08:29:33 +00:00
|
|
|
LocalProxySocket *ps = FROMFIELD(s, LocalProxySocket, sockvt);
|
2003-05-06 19:52:31 +00:00
|
|
|
|
|
|
|
if (is_frozen)
|
|
|
|
uxsel_del(ps->from_cmd);
|
|
|
|
else
|
|
|
|
uxsel_set(ps->from_cmd, 1, localproxy_select_result);
|
|
|
|
}
|
|
|
|
|
|
|
|
static const char * sk_localproxy_socket_error (Socket s)
|
|
|
|
{
|
2018-05-27 08:29:33 +00:00
|
|
|
LocalProxySocket *ps = FROMFIELD(s, LocalProxySocket, sockvt);
|
2003-05-06 19:52:31 +00:00
|
|
|
return ps->error;
|
|
|
|
}
|
|
|
|
|
2016-05-30 21:52:30 +00:00
|
|
|
static void localproxy_select_result(int fd, int event)
|
2003-05-06 19:52:31 +00:00
|
|
|
{
|
2018-05-27 08:29:33 +00:00
|
|
|
LocalProxySocket *s;
|
2003-05-06 19:52:31 +00:00
|
|
|
char buf[20480];
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!(s = find234(localproxy_by_fromfd, &fd, localproxy_fromfd_find)) &&
|
2015-11-22 11:50:37 +00:00
|
|
|
!(s = find234(localproxy_by_fromfd, &fd, localproxy_errfd_find)) &&
|
2003-05-06 19:52:31 +00:00
|
|
|
!(s = find234(localproxy_by_tofd, &fd, localproxy_tofd_find)) )
|
2016-05-30 21:52:30 +00:00
|
|
|
return; /* boggle */
|
2003-05-06 19:52:31 +00:00
|
|
|
|
|
|
|
if (event == 1) {
|
2015-11-22 11:50:37 +00:00
|
|
|
if (fd == s->cmd_err) {
|
|
|
|
ret = read(fd, buf, sizeof(buf));
|
|
|
|
if (ret > 0)
|
|
|
|
log_proxy_stderr(s->plug, &s->pending_error_data, buf, ret);
|
|
|
|
} else {
|
|
|
|
assert(fd == s->from_cmd);
|
|
|
|
ret = read(fd, buf, sizeof(buf));
|
|
|
|
if (ret < 0) {
|
2016-05-30 21:52:30 +00:00
|
|
|
plug_closing(s->plug, strerror(errno), errno, 0);
|
2015-11-22 11:50:37 +00:00
|
|
|
} else if (ret == 0) {
|
2016-05-30 21:52:30 +00:00
|
|
|
plug_closing(s->plug, NULL, 0, 0);
|
2015-11-22 11:50:37 +00:00
|
|
|
} else {
|
2016-05-30 21:52:30 +00:00
|
|
|
plug_receive(s->plug, 0, buf, ret);
|
2015-11-22 11:50:37 +00:00
|
|
|
}
|
|
|
|
}
|
2003-05-06 19:52:31 +00:00
|
|
|
} else if (event == 2) {
|
|
|
|
assert(fd == s->to_cmd);
|
|
|
|
if (localproxy_try_send(s))
|
|
|
|
plug_sent(s->plug, bufchain_size(&s->pending_output_data));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-05-27 08:29:33 +00:00
|
|
|
static const Socket_vtable LocalProxySocket_sockvt = {
|
|
|
|
sk_localproxy_plug,
|
|
|
|
sk_localproxy_close,
|
|
|
|
sk_localproxy_write,
|
|
|
|
sk_localproxy_write_oob,
|
|
|
|
sk_localproxy_write_eof,
|
|
|
|
sk_localproxy_flush,
|
|
|
|
sk_localproxy_set_frozen,
|
|
|
|
sk_localproxy_socket_error,
|
|
|
|
NULL, /* peer_info */
|
|
|
|
};
|
|
|
|
|
2015-05-15 10:15:42 +00:00
|
|
|
Socket platform_new_connection(SockAddr addr, const char *hostname,
|
2003-05-06 19:52:31 +00:00
|
|
|
int port, int privport,
|
2004-06-20 17:07:38 +00:00
|
|
|
int oobinline, int nodelay, int keepalive,
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 18:52:21 +00:00
|
|
|
Plug plug, Conf *conf)
|
2003-05-06 19:52:31 +00:00
|
|
|
{
|
|
|
|
char *cmd;
|
|
|
|
|
2018-05-27 08:29:33 +00:00
|
|
|
LocalProxySocket *ret;
|
2015-11-22 11:50:37 +00:00
|
|
|
int to_cmd_pipe[2], from_cmd_pipe[2], cmd_err_pipe[2], pid, proxytype;
|
2003-05-06 19:52:31 +00:00
|
|
|
|
2015-10-17 13:06:06 +00:00
|
|
|
proxytype = conf_get_int(conf, CONF_proxy_type);
|
|
|
|
if (proxytype != PROXY_CMD && proxytype != PROXY_FUZZ)
|
2003-05-06 19:52:31 +00:00
|
|
|
return NULL;
|
|
|
|
|
2018-05-27 08:29:33 +00:00
|
|
|
ret = snew(LocalProxySocket);
|
|
|
|
ret->sockvt = &LocalProxySocket_sockvt;
|
2003-05-06 19:52:31 +00:00
|
|
|
ret->plug = plug;
|
|
|
|
ret->error = NULL;
|
2011-09-13 11:44:03 +00:00
|
|
|
ret->outgoingeof = EOF_NO;
|
2003-05-06 19:52:31 +00:00
|
|
|
|
|
|
|
bufchain_init(&ret->pending_input_data);
|
|
|
|
bufchain_init(&ret->pending_output_data);
|
2015-11-22 11:50:37 +00:00
|
|
|
bufchain_init(&ret->pending_error_data);
|
2003-05-06 19:52:31 +00:00
|
|
|
|
2015-10-17 13:06:06 +00:00
|
|
|
if (proxytype == PROXY_CMD) {
|
|
|
|
cmd = format_telnet_command(addr, port, conf);
|
|
|
|
|
2015-11-22 11:50:37 +00:00
|
|
|
if (flags & FLAG_STDERR) {
|
|
|
|
/* If we have a sensible stderr, the proxy command can
|
|
|
|
* send its own standard error there, so we won't
|
|
|
|
* interfere. */
|
|
|
|
cmd_err_pipe[0] = cmd_err_pipe[1] = -1;
|
|
|
|
} else {
|
|
|
|
/* If we don't have a sensible stderr, we should catch the
|
|
|
|
* proxy command's standard error to put in our event
|
|
|
|
* log. */
|
|
|
|
cmd_err_pipe[0] = cmd_err_pipe[1] = 0;
|
|
|
|
}
|
|
|
|
|
2015-11-22 12:15:52 +00:00
|
|
|
{
|
|
|
|
char *logmsg = dupprintf("Starting local proxy command: %s", cmd);
|
|
|
|
plug_log(plug, 2, NULL, 0, logmsg, 0);
|
|
|
|
sfree(logmsg);
|
|
|
|
}
|
|
|
|
|
2015-10-17 13:06:06 +00:00
|
|
|
/*
|
|
|
|
* Create the pipes to the proxy command, and spawn the proxy
|
|
|
|
* command process.
|
|
|
|
*/
|
|
|
|
if (pipe(to_cmd_pipe) < 0 ||
|
2015-11-22 11:50:37 +00:00
|
|
|
pipe(from_cmd_pipe) < 0 ||
|
|
|
|
(cmd_err_pipe[0] == 0 && pipe(cmd_err_pipe) < 0)) {
|
2015-10-17 13:06:06 +00:00
|
|
|
ret->error = dupprintf("pipe: %s", strerror(errno));
|
|
|
|
sfree(cmd);
|
2018-05-27 08:29:33 +00:00
|
|
|
return &ret->sockvt;
|
2015-10-17 13:06:06 +00:00
|
|
|
}
|
|
|
|
cloexec(to_cmd_pipe[1]);
|
|
|
|
cloexec(from_cmd_pipe[0]);
|
2015-11-22 11:50:37 +00:00
|
|
|
if (cmd_err_pipe[0] >= 0)
|
|
|
|
cloexec(cmd_err_pipe[0]);
|
2015-10-17 13:06:06 +00:00
|
|
|
|
|
|
|
pid = fork();
|
|
|
|
|
|
|
|
if (pid < 0) {
|
|
|
|
ret->error = dupprintf("fork: %s", strerror(errno));
|
|
|
|
sfree(cmd);
|
2018-05-27 08:29:33 +00:00
|
|
|
return &ret->sockvt;
|
2015-10-17 13:06:06 +00:00
|
|
|
} else if (pid == 0) {
|
|
|
|
close(0);
|
|
|
|
close(1);
|
|
|
|
dup2(to_cmd_pipe[0], 0);
|
|
|
|
dup2(from_cmd_pipe[1], 1);
|
|
|
|
close(to_cmd_pipe[0]);
|
|
|
|
close(from_cmd_pipe[1]);
|
2015-11-22 11:50:37 +00:00
|
|
|
if (cmd_err_pipe[0] >= 0) {
|
|
|
|
dup2(cmd_err_pipe[1], 2);
|
|
|
|
close(cmd_err_pipe[1]);
|
|
|
|
}
|
2015-10-17 13:06:06 +00:00
|
|
|
noncloexec(0);
|
|
|
|
noncloexec(1);
|
|
|
|
execl("/bin/sh", "sh", "-c", cmd, (void *)NULL);
|
|
|
|
_exit(255);
|
|
|
|
}
|
2003-05-06 19:52:31 +00:00
|
|
|
|
2015-10-17 13:06:06 +00:00
|
|
|
sfree(cmd);
|
2009-08-21 21:16:22 +00:00
|
|
|
|
2015-10-17 13:06:06 +00:00
|
|
|
close(to_cmd_pipe[0]);
|
|
|
|
close(from_cmd_pipe[1]);
|
2015-11-22 11:50:37 +00:00
|
|
|
if (cmd_err_pipe[0] >= 0)
|
|
|
|
close(cmd_err_pipe[1]);
|
2003-05-06 19:52:31 +00:00
|
|
|
|
2015-10-17 13:06:06 +00:00
|
|
|
ret->to_cmd = to_cmd_pipe[1];
|
|
|
|
ret->from_cmd = from_cmd_pipe[0];
|
2015-11-22 11:50:37 +00:00
|
|
|
ret->cmd_err = cmd_err_pipe[0];
|
2015-10-17 13:06:06 +00:00
|
|
|
} else {
|
|
|
|
cmd = format_telnet_command(addr, port, conf);
|
|
|
|
ret->to_cmd = open("/dev/null", O_WRONLY);
|
|
|
|
if (ret->to_cmd == -1) {
|
|
|
|
ret->error = dupprintf("/dev/null: %s", strerror(errno));
|
|
|
|
sfree(cmd);
|
2018-05-27 08:29:33 +00:00
|
|
|
return &ret->sockvt;
|
2015-10-17 13:06:06 +00:00
|
|
|
}
|
|
|
|
ret->from_cmd = open(cmd, O_RDONLY);
|
|
|
|
if (ret->from_cmd == -1) {
|
|
|
|
ret->error = dupprintf("%s: %s", cmd, strerror(errno));
|
|
|
|
sfree(cmd);
|
2018-05-27 08:29:33 +00:00
|
|
|
return &ret->sockvt;
|
2015-10-17 13:06:06 +00:00
|
|
|
}
|
|
|
|
sfree(cmd);
|
2015-11-22 11:50:37 +00:00
|
|
|
ret->cmd_err = -1;
|
2015-10-17 13:06:06 +00:00
|
|
|
}
|
2003-05-06 19:52:31 +00:00
|
|
|
|
|
|
|
if (!localproxy_by_fromfd)
|
|
|
|
localproxy_by_fromfd = newtree234(localproxy_fromfd_cmp);
|
|
|
|
if (!localproxy_by_tofd)
|
|
|
|
localproxy_by_tofd = newtree234(localproxy_tofd_cmp);
|
2015-11-22 11:50:37 +00:00
|
|
|
if (!localproxy_by_errfd)
|
|
|
|
localproxy_by_errfd = newtree234(localproxy_errfd_cmp);
|
2003-05-06 19:52:31 +00:00
|
|
|
|
|
|
|
add234(localproxy_by_fromfd, ret);
|
|
|
|
add234(localproxy_by_tofd, ret);
|
2015-11-22 11:50:37 +00:00
|
|
|
if (ret->cmd_err >= 0)
|
|
|
|
add234(localproxy_by_errfd, ret);
|
2003-05-06 19:52:31 +00:00
|
|
|
|
|
|
|
uxsel_set(ret->from_cmd, 1, localproxy_select_result);
|
2015-11-25 18:18:45 +00:00
|
|
|
if (ret->cmd_err >= 0)
|
|
|
|
uxsel_set(ret->cmd_err, 1, localproxy_select_result);
|
2003-05-06 19:52:31 +00:00
|
|
|
|
2003-08-07 16:04:33 +00:00
|
|
|
/* We are responsible for this and don't need it any more */
|
|
|
|
sk_addr_free(addr);
|
|
|
|
|
2018-05-27 08:29:33 +00:00
|
|
|
return &ret->sockvt;
|
2003-05-06 19:52:31 +00:00
|
|
|
}
|