2022-08-19 15:59:36 +02:00
|
|
|
// Copyright (C) 2016 The Qt Company Ltd.
|
|
|
|
// SPDX-License-Identifier: LicenseRef-Qt-Commercial OR GPL-3.0+ OR GPL-3.0 WITH Qt-GPL-exception-1.0
|
2012-04-24 15:49:09 +02:00
|
|
|
|
2012-07-27 13:31:13 +02:00
|
|
|
#include "linuxdevice.h"
|
2011-05-31 12:47:53 +02:00
|
|
|
|
2012-04-06 18:28:16 +02:00
|
|
|
#include "genericlinuxdeviceconfigurationwidget.h"
|
2019-02-20 19:13:28 +01:00
|
|
|
#include "genericlinuxdeviceconfigurationwizard.h"
|
2013-06-27 17:12:08 +02:00
|
|
|
#include "linuxdevicetester.h"
|
2022-04-29 13:18:42 +02:00
|
|
|
#include "linuxprocessinterface.h"
|
2012-04-06 18:28:16 +02:00
|
|
|
#include "publickeydeploymentdialog.h"
|
2011-07-25 11:55:00 +02:00
|
|
|
#include "remotelinux_constants.h"
|
2016-04-06 13:56:32 +02:00
|
|
|
#include "remotelinuxenvironmentreader.h"
|
2022-07-15 12:20:23 +02:00
|
|
|
#include "remotelinuxsignaloperation.h"
|
|
|
|
#include "remotelinuxtr.h"
|
2022-02-14 18:37:56 +01:00
|
|
|
#include "sshprocessinterface.h"
|
2011-07-25 11:55:00 +02:00
|
|
|
|
2019-02-20 19:13:28 +01:00
|
|
|
#include <coreplugin/icore.h>
|
2019-01-10 12:58:04 +01:00
|
|
|
#include <coreplugin/messagemanager.h>
|
2019-03-13 08:06:08 +01:00
|
|
|
|
2022-05-20 17:53:20 +02:00
|
|
|
#include <projectexplorer/devicesupport/filetransfer.h>
|
|
|
|
#include <projectexplorer/devicesupport/filetransferinterface.h>
|
2012-08-02 14:45:27 +02:00
|
|
|
#include <projectexplorer/devicesupport/sshdeviceprocesslist.h>
|
2022-05-13 01:08:44 +02:00
|
|
|
#include <projectexplorer/devicesupport/sshparameters.h>
|
|
|
|
#include <projectexplorer/devicesupport/sshsettings.h>
|
2019-03-13 08:06:08 +01:00
|
|
|
|
2014-06-16 18:25:52 +04:00
|
|
|
#include <utils/algorithm.h>
|
2022-10-10 17:32:56 +02:00
|
|
|
#include <utils/devicefileaccess.h>
|
2022-05-17 10:07:27 +02:00
|
|
|
#include <utils/deviceshell.h>
|
2019-05-21 18:15:29 +02:00
|
|
|
#include <utils/environment.h>
|
2019-01-10 12:58:04 +01:00
|
|
|
#include <utils/hostosinfo.h>
|
2016-04-19 16:43:30 +02:00
|
|
|
#include <utils/port.h>
|
2022-02-24 18:42:47 +01:00
|
|
|
#include <utils/processinfo.h>
|
2012-02-15 14:47:45 -08:00
|
|
|
#include <utils/qtcassert.h>
|
2022-05-05 01:51:22 +02:00
|
|
|
#include <utils/qtcprocess.h>
|
2020-06-17 06:35:31 +02:00
|
|
|
#include <utils/stringutils.h>
|
2021-07-27 09:50:43 +02:00
|
|
|
#include <utils/temporaryfile.h>
|
|
|
|
|
|
|
|
#include <QDateTime>
|
|
|
|
#include <QLoggingCategory>
|
|
|
|
#include <QMutex>
|
|
|
|
#include <QRegularExpression>
|
2022-03-17 02:14:41 +01:00
|
|
|
#include <QScopeGuard>
|
2022-02-14 18:37:56 +01:00
|
|
|
#include <QTemporaryDir>
|
2021-07-27 09:50:43 +02:00
|
|
|
#include <QThread>
|
2022-02-14 18:37:56 +01:00
|
|
|
#include <QTimer>
|
2011-08-02 12:20:16 +02:00
|
|
|
|
2012-07-26 16:23:20 +02:00
|
|
|
using namespace ProjectExplorer;
|
2019-06-20 17:19:12 +02:00
|
|
|
using namespace Utils;
|
2012-07-26 16:23:20 +02:00
|
|
|
|
2011-05-31 12:47:53 +02:00
|
|
|
namespace RemoteLinux {
|
2011-08-02 12:20:16 +02:00
|
|
|
|
2022-02-14 18:37:56 +01:00
|
|
|
const QByteArray s_pidMarker = "__qtc";
|
|
|
|
|
2012-07-26 17:41:52 +02:00
|
|
|
const char Delimiter0[] = "x--";
|
|
|
|
const char Delimiter1[] = "---";
|
|
|
|
|
2022-10-07 13:56:02 +02:00
|
|
|
static Q_LOGGING_CATEGORY(linuxDeviceLog, "qtc.remotelinux.device", QtWarningMsg);
|
|
|
|
#define DEBUG(x) qCDebug(linuxDeviceLog) << x << '\n'
|
2021-07-27 09:50:43 +02:00
|
|
|
|
2022-02-14 18:37:56 +01:00
|
|
|
class SshSharedConnection : public QObject
|
|
|
|
{
|
|
|
|
Q_OBJECT
|
|
|
|
|
|
|
|
public:
|
2022-05-12 18:43:44 +02:00
|
|
|
explicit SshSharedConnection(const SshParameters &sshParameters, QObject *parent = nullptr);
|
2022-02-14 18:37:56 +01:00
|
|
|
~SshSharedConnection() override;
|
|
|
|
|
2022-05-12 18:43:44 +02:00
|
|
|
SshParameters sshParameters() const { return m_sshParameters; }
|
2022-02-14 18:37:56 +01:00
|
|
|
void ref();
|
|
|
|
void deref();
|
|
|
|
void makeStale();
|
|
|
|
|
|
|
|
void connectToHost();
|
|
|
|
void disconnectFromHost();
|
|
|
|
|
|
|
|
QProcess::ProcessState state() const;
|
|
|
|
QString socketFilePath() const
|
|
|
|
{
|
|
|
|
QTC_ASSERT(m_masterSocketDir, return QString());
|
|
|
|
return m_masterSocketDir->path() + "/cs";
|
|
|
|
}
|
|
|
|
|
|
|
|
signals:
|
|
|
|
void connected(const QString &socketFilePath);
|
|
|
|
void disconnected(const ProcessResultData &result);
|
|
|
|
|
|
|
|
void autoDestructRequested();
|
|
|
|
|
|
|
|
private:
|
|
|
|
void emitConnected();
|
2022-04-22 16:02:03 +02:00
|
|
|
void emitError(QProcess::ProcessError processError, const QString &errorString);
|
|
|
|
void emitDisconnected();
|
2022-05-03 23:38:14 +02:00
|
|
|
QString fullProcessError() const;
|
2022-05-11 17:58:24 +02:00
|
|
|
QStringList connectionArgs(const FilePath &binary) const;
|
2022-02-14 18:37:56 +01:00
|
|
|
|
2022-05-12 18:43:44 +02:00
|
|
|
const SshParameters m_sshParameters;
|
2022-02-14 18:37:56 +01:00
|
|
|
std::unique_ptr<QtcProcess> m_masterProcess;
|
|
|
|
std::unique_ptr<QTemporaryDir> m_masterSocketDir;
|
|
|
|
QTimer m_timer;
|
|
|
|
int m_ref = 0;
|
|
|
|
bool m_stale = false;
|
2022-04-22 16:02:03 +02:00
|
|
|
QProcess::ProcessState m_state = QProcess::NotRunning;
|
2022-02-14 18:37:56 +01:00
|
|
|
};
|
|
|
|
|
2022-05-12 18:43:44 +02:00
|
|
|
SshSharedConnection::SshSharedConnection(const SshParameters &sshParameters, QObject *parent)
|
2022-02-14 18:37:56 +01:00
|
|
|
: QObject(parent), m_sshParameters(sshParameters)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
SshSharedConnection::~SshSharedConnection()
|
|
|
|
{
|
|
|
|
QTC_CHECK(m_ref == 0);
|
|
|
|
disconnect();
|
|
|
|
disconnectFromHost();
|
|
|
|
}
|
|
|
|
|
|
|
|
void SshSharedConnection::ref()
|
|
|
|
{
|
|
|
|
++m_ref;
|
|
|
|
m_timer.stop();
|
|
|
|
}
|
|
|
|
|
|
|
|
void SshSharedConnection::deref()
|
|
|
|
{
|
|
|
|
QTC_ASSERT(m_ref, return);
|
|
|
|
if (--m_ref)
|
|
|
|
return;
|
|
|
|
if (m_stale) // no one uses it
|
|
|
|
deleteLater();
|
|
|
|
// not stale, so someone may reuse it
|
|
|
|
m_timer.start(SshSettings::connectionSharingTimeout() * 1000 * 60);
|
|
|
|
}
|
|
|
|
|
|
|
|
void SshSharedConnection::makeStale()
|
|
|
|
{
|
|
|
|
m_stale = true;
|
|
|
|
if (!m_ref) // no one uses it
|
|
|
|
deleteLater();
|
|
|
|
}
|
|
|
|
|
|
|
|
void SshSharedConnection::connectToHost()
|
|
|
|
{
|
|
|
|
if (state() != QProcess::NotRunning)
|
|
|
|
return;
|
|
|
|
|
|
|
|
const FilePath sshBinary = SshSettings::sshFilePath();
|
|
|
|
if (!sshBinary.exists()) {
|
2022-07-15 12:20:23 +02:00
|
|
|
emitError(QProcess::FailedToStart, Tr::tr("Cannot establish SSH connection: ssh binary "
|
2022-02-14 18:37:56 +01:00
|
|
|
"\"%1\" does not exist.").arg(sshBinary.toUserOutput()));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
m_masterSocketDir.reset(new QTemporaryDir);
|
|
|
|
if (!m_masterSocketDir->isValid()) {
|
2022-07-15 12:20:23 +02:00
|
|
|
emitError(QProcess::FailedToStart,
|
|
|
|
Tr::tr("Cannot establish SSH connection: Failed to create temporary "
|
|
|
|
"directory for control socket: %1")
|
2022-02-14 18:37:56 +01:00
|
|
|
.arg(m_masterSocketDir->errorString()));
|
|
|
|
m_masterSocketDir.reset();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
m_masterProcess.reset(new QtcProcess);
|
2022-05-12 18:43:44 +02:00
|
|
|
SshParameters::setupSshEnvironment(m_masterProcess.get());
|
2022-02-14 18:37:56 +01:00
|
|
|
m_timer.setSingleShot(true);
|
|
|
|
connect(&m_timer, &QTimer::timeout, this, &SshSharedConnection::autoDestructRequested);
|
|
|
|
connect(m_masterProcess.get(), &QtcProcess::readyReadStandardOutput, [this] {
|
|
|
|
const QByteArray reply = m_masterProcess->readAllStandardOutput();
|
|
|
|
if (reply == "\n")
|
|
|
|
emitConnected();
|
2022-04-22 16:02:03 +02:00
|
|
|
// TODO: otherwise emitError and finish master process?
|
2022-02-14 18:37:56 +01:00
|
|
|
});
|
2022-04-22 16:02:03 +02:00
|
|
|
// TODO: in case of refused connection we are getting the following on stdErr:
|
|
|
|
// ssh: connect to host 127.0.0.1 port 22: Connection refused\r\n
|
2022-02-14 18:37:56 +01:00
|
|
|
connect(m_masterProcess.get(), &QtcProcess::done, [this] {
|
2022-05-03 23:38:14 +02:00
|
|
|
const ProcessResult result = m_masterProcess->result();
|
|
|
|
const ProcessResultData resultData = m_masterProcess->resultData();
|
|
|
|
if (result == ProcessResult::StartFailed) {
|
2022-07-15 12:20:23 +02:00
|
|
|
emitError(QProcess::FailedToStart, Tr::tr("Cannot establish SSH connection.\n"
|
|
|
|
"Control process failed to start."));
|
2022-02-14 18:37:56 +01:00
|
|
|
return;
|
2022-05-03 23:38:14 +02:00
|
|
|
} else if (result == ProcessResult::FinishedWithError) {
|
|
|
|
emitError(resultData.m_error, fullProcessError());
|
2022-02-14 18:37:56 +01:00
|
|
|
return;
|
|
|
|
}
|
2022-05-03 23:38:14 +02:00
|
|
|
emit disconnected(resultData);
|
2022-02-14 18:37:56 +01:00
|
|
|
});
|
|
|
|
|
|
|
|
QStringList args = QStringList{"-M", "-N", "-o", "ControlPersist=no",
|
|
|
|
"-o", "PermitLocalCommand=yes", // Enable local command
|
|
|
|
"-o", "LocalCommand=echo"} // Local command is executed after successfully
|
|
|
|
// connecting to the server. "echo" will print "\n"
|
|
|
|
// on the process output if everything went fine.
|
|
|
|
<< connectionArgs(sshBinary);
|
|
|
|
if (!m_sshParameters.x11DisplayName.isEmpty()) {
|
|
|
|
args.prepend("-X");
|
|
|
|
Environment env = m_masterProcess->environment();
|
|
|
|
env.set("DISPLAY", m_sshParameters.x11DisplayName);
|
|
|
|
m_masterProcess->setEnvironment(env);
|
|
|
|
}
|
|
|
|
m_masterProcess->setCommand(CommandLine(sshBinary, args));
|
|
|
|
m_masterProcess->start();
|
|
|
|
}
|
|
|
|
|
|
|
|
void SshSharedConnection::disconnectFromHost()
|
|
|
|
{
|
|
|
|
m_masterProcess.reset();
|
|
|
|
m_masterSocketDir.reset();
|
|
|
|
}
|
|
|
|
|
|
|
|
QProcess::ProcessState SshSharedConnection::state() const
|
|
|
|
{
|
2022-04-22 16:02:03 +02:00
|
|
|
return m_state;
|
2022-02-14 18:37:56 +01:00
|
|
|
}
|
|
|
|
|
2022-04-22 16:02:03 +02:00
|
|
|
void SshSharedConnection::emitConnected()
|
|
|
|
{
|
|
|
|
m_state = QProcess::Running;
|
|
|
|
emit connected(socketFilePath());
|
|
|
|
}
|
|
|
|
|
2022-02-14 18:37:56 +01:00
|
|
|
void SshSharedConnection::emitError(QProcess::ProcessError error, const QString &errorString)
|
|
|
|
{
|
2022-04-22 16:02:03 +02:00
|
|
|
m_state = QProcess::NotRunning;
|
2022-05-03 23:38:14 +02:00
|
|
|
ProcessResultData resultData = m_masterProcess->resultData();
|
|
|
|
resultData.m_error = error;
|
|
|
|
resultData.m_errorString = errorString;
|
|
|
|
emit disconnected(resultData);
|
2022-02-14 18:37:56 +01:00
|
|
|
}
|
|
|
|
|
2022-04-22 16:02:03 +02:00
|
|
|
void SshSharedConnection::emitDisconnected()
|
2022-02-14 18:37:56 +01:00
|
|
|
{
|
2022-04-22 16:02:03 +02:00
|
|
|
m_state = QProcess::NotRunning;
|
|
|
|
emit disconnected(m_masterProcess->resultData());
|
2022-02-14 18:37:56 +01:00
|
|
|
}
|
|
|
|
|
2022-05-03 23:38:14 +02:00
|
|
|
QString SshSharedConnection::fullProcessError() const
|
2022-02-14 18:37:56 +01:00
|
|
|
{
|
2022-05-03 23:38:14 +02:00
|
|
|
const QString errorString = m_masterProcess->exitStatus() == QProcess::CrashExit
|
|
|
|
? m_masterProcess->errorString() : QString();
|
2022-06-17 14:17:14 +02:00
|
|
|
const QString standardError = m_masterProcess->cleanedStdErr();
|
2022-05-03 23:38:14 +02:00
|
|
|
const QString errorPrefix = errorString.isEmpty() && standardError.isEmpty()
|
2022-07-15 12:20:23 +02:00
|
|
|
? Tr::tr("SSH connection failure.") : Tr::tr("SSH connection failure:");
|
2022-05-03 23:38:14 +02:00
|
|
|
QStringList allErrors {errorPrefix, errorString, standardError};
|
|
|
|
allErrors.removeAll({});
|
|
|
|
return allErrors.join('\n');
|
2022-02-14 18:37:56 +01:00
|
|
|
}
|
|
|
|
|
2022-05-11 17:58:24 +02:00
|
|
|
QStringList SshSharedConnection::connectionArgs(const FilePath &binary) const
|
|
|
|
{
|
|
|
|
return m_sshParameters.connectionOptions(binary) << "-o" << ("ControlPath=" + socketFilePath())
|
|
|
|
<< m_sshParameters.host();
|
|
|
|
}
|
|
|
|
|
2022-02-14 18:37:56 +01:00
|
|
|
// SshConnectionHandle
|
|
|
|
|
|
|
|
class SshConnectionHandle : public QObject
|
|
|
|
{
|
|
|
|
Q_OBJECT
|
|
|
|
public:
|
|
|
|
SshConnectionHandle(const IDevice::ConstPtr &device) : m_device(device) {}
|
|
|
|
~SshConnectionHandle() override { emit detachFromSharedConnection(); }
|
|
|
|
|
|
|
|
signals:
|
|
|
|
// direction: connection -> caller
|
|
|
|
void connected(const QString &socketFilePath);
|
|
|
|
void disconnected(const ProcessResultData &result);
|
|
|
|
// direction: caller -> connection
|
|
|
|
void detachFromSharedConnection();
|
|
|
|
|
|
|
|
private:
|
|
|
|
// Store the IDevice::ConstPtr in order to extend the lifetime of device for as long
|
|
|
|
// as this object is alive.
|
|
|
|
IDevice::ConstPtr m_device;
|
|
|
|
};
|
|
|
|
|
2012-07-26 17:41:52 +02:00
|
|
|
static QString visualizeNull(QString s)
|
|
|
|
{
|
|
|
|
return s.replace(QLatin1Char('\0'), QLatin1String("<null>"));
|
|
|
|
}
|
|
|
|
|
2012-08-02 14:45:27 +02:00
|
|
|
class LinuxDeviceProcessList : public SshDeviceProcessList
|
2012-08-01 16:26:27 +02:00
|
|
|
{
|
2012-08-02 14:45:27 +02:00
|
|
|
public:
|
|
|
|
LinuxDeviceProcessList(const IDevice::ConstPtr &device, QObject *parent)
|
|
|
|
: SshDeviceProcessList(device, parent)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
2018-11-24 17:06:01 +01:00
|
|
|
QString listProcessesCommandLine() const override
|
2012-08-02 14:45:27 +02:00
|
|
|
{
|
|
|
|
return QString::fromLatin1(
|
2012-08-01 16:26:27 +02:00
|
|
|
"for dir in `ls -d /proc/[0123456789]*`; do "
|
|
|
|
"test -d $dir || continue;" // Decrease the likelihood of a race condition.
|
|
|
|
"echo $dir;"
|
|
|
|
"cat $dir/cmdline;echo;" // cmdline does not end in newline
|
|
|
|
"cat $dir/stat;"
|
|
|
|
"readlink $dir/exe;"
|
2014-05-02 14:32:00 +02:00
|
|
|
"printf '%1''%2';"
|
2012-11-26 14:41:39 +02:00
|
|
|
"done").arg(QLatin1String(Delimiter0)).arg(QLatin1String(Delimiter1));
|
2012-08-02 14:45:27 +02:00
|
|
|
}
|
2012-08-01 16:26:27 +02:00
|
|
|
|
2022-02-24 18:42:47 +01:00
|
|
|
QList<ProcessInfo> buildProcessList(const QString &listProcessesReply) const override
|
2012-08-02 14:45:27 +02:00
|
|
|
{
|
2022-02-24 18:42:47 +01:00
|
|
|
QList<ProcessInfo> processes;
|
2012-08-02 14:45:27 +02:00
|
|
|
const QStringList lines = listProcessesReply.split(QString::fromLatin1(Delimiter0)
|
2020-07-21 10:19:36 +02:00
|
|
|
+ QString::fromLatin1(Delimiter1), Qt::SkipEmptyParts);
|
2022-02-24 18:42:47 +01:00
|
|
|
for (const QString &line : lines) {
|
2012-08-02 14:45:27 +02:00
|
|
|
const QStringList elements = line.split(QLatin1Char('\n'));
|
|
|
|
if (elements.count() < 4) {
|
|
|
|
qDebug("%s: Expected four list elements, got %d. Line was '%s'.", Q_FUNC_INFO,
|
2020-07-21 15:47:35 +02:00
|
|
|
int(elements.count()), qPrintable(visualizeNull(line)));
|
2012-08-01 16:26:27 +02:00
|
|
|
continue;
|
2012-08-02 14:45:27 +02:00
|
|
|
}
|
|
|
|
bool ok;
|
2020-09-18 13:15:18 +02:00
|
|
|
const int pid = elements.first().mid(6).toInt(&ok);
|
2012-08-02 14:45:27 +02:00
|
|
|
if (!ok) {
|
|
|
|
qDebug("%s: Expected number in %s. Line was '%s'.", Q_FUNC_INFO,
|
|
|
|
qPrintable(elements.first()), qPrintable(visualizeNull(line)));
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
QString command = elements.at(1);
|
|
|
|
command.replace(QLatin1Char('\0'), QLatin1Char(' '));
|
|
|
|
if (command.isEmpty()) {
|
|
|
|
const QString &statString = elements.at(2);
|
|
|
|
const int openParenPos = statString.indexOf(QLatin1Char('('));
|
|
|
|
const int closedParenPos = statString.indexOf(QLatin1Char(')'), openParenPos);
|
|
|
|
if (openParenPos == -1 || closedParenPos == -1)
|
|
|
|
continue;
|
|
|
|
command = QLatin1Char('[')
|
|
|
|
+ statString.mid(openParenPos + 1, closedParenPos - openParenPos - 1)
|
|
|
|
+ QLatin1Char(']');
|
|
|
|
}
|
|
|
|
|
2022-02-24 18:42:47 +01:00
|
|
|
ProcessInfo process;
|
|
|
|
process.processId = pid;
|
|
|
|
process.commandLine = command;
|
|
|
|
process.executable = elements.at(3);
|
2012-08-02 14:45:27 +02:00
|
|
|
processes.append(process);
|
2012-08-01 16:26:27 +02:00
|
|
|
}
|
|
|
|
|
2014-06-16 18:25:52 +04:00
|
|
|
Utils::sort(processes);
|
2012-08-02 14:45:27 +02:00
|
|
|
return processes;
|
2012-08-01 16:26:27 +02:00
|
|
|
}
|
2012-08-02 14:45:27 +02:00
|
|
|
};
|
2012-08-01 16:26:27 +02:00
|
|
|
|
|
|
|
|
2022-02-14 18:37:56 +01:00
|
|
|
// LinuxDevicePrivate
|
|
|
|
|
|
|
|
class ShellThreadHandler;
|
2022-10-10 17:32:56 +02:00
|
|
|
class LinuxDevicePrivate;
|
|
|
|
|
|
|
|
class LinuxDeviceFileAccess : public UnixDeviceFileAccess
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
LinuxDeviceFileAccess(LinuxDevicePrivate *dev)
|
|
|
|
: m_dev(dev)
|
|
|
|
{}
|
|
|
|
|
2022-10-14 13:39:16 +02:00
|
|
|
RunResult runInShell(const CommandLine &cmdLine,
|
2022-10-10 17:32:56 +02:00
|
|
|
const QByteArray &stdInData) const override;
|
|
|
|
|
|
|
|
LinuxDevicePrivate *m_dev;
|
|
|
|
};
|
2022-02-14 18:37:56 +01:00
|
|
|
|
|
|
|
class LinuxDevicePrivate
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
explicit LinuxDevicePrivate(LinuxDevice *parent);
|
|
|
|
~LinuxDevicePrivate();
|
|
|
|
|
|
|
|
bool setupShell();
|
2022-10-07 16:54:27 +02:00
|
|
|
RunResult runInShell(const CommandLine &cmd, const QByteArray &stdInData = {});
|
|
|
|
|
2022-02-14 18:37:56 +01:00
|
|
|
void attachToSharedConnection(SshConnectionHandle *connectionHandle,
|
2022-05-12 18:43:44 +02:00
|
|
|
const SshParameters &sshParameters);
|
2022-02-14 18:37:56 +01:00
|
|
|
|
|
|
|
LinuxDevice *q = nullptr;
|
|
|
|
QThread m_shellThread;
|
|
|
|
ShellThreadHandler *m_handler = nullptr;
|
|
|
|
mutable QMutex m_shellMutex;
|
2022-04-28 21:11:20 +02:00
|
|
|
QList<QtcProcess *> m_terminals;
|
2022-10-10 17:32:56 +02:00
|
|
|
LinuxDeviceFileAccess m_fileAccess{this};
|
2022-02-14 18:37:56 +01:00
|
|
|
};
|
|
|
|
|
2022-10-14 13:39:16 +02:00
|
|
|
RunResult LinuxDeviceFileAccess::runInShell(const CommandLine &cmdLine,
|
2022-10-10 17:32:56 +02:00
|
|
|
const QByteArray &stdInData) const
|
|
|
|
{
|
2022-10-14 13:39:16 +02:00
|
|
|
return m_dev->runInShell(cmdLine, stdInData);
|
2022-10-10 17:32:56 +02:00
|
|
|
}
|
|
|
|
|
2022-02-14 18:37:56 +01:00
|
|
|
// SshProcessImpl
|
|
|
|
|
|
|
|
class SshProcessInterfacePrivate : public QObject
|
|
|
|
{
|
|
|
|
Q_OBJECT
|
|
|
|
|
|
|
|
public:
|
|
|
|
SshProcessInterfacePrivate(SshProcessInterface *sshInterface, LinuxDevicePrivate *devicePrivate);
|
|
|
|
|
|
|
|
void start();
|
|
|
|
|
|
|
|
void handleConnected(const QString &socketFilePath);
|
|
|
|
void handleDisconnected(const ProcessResultData &result);
|
|
|
|
|
|
|
|
void handleStarted();
|
|
|
|
void handleDone();
|
|
|
|
void handleReadyReadStandardOutput();
|
|
|
|
void handleReadyReadStandardError();
|
|
|
|
|
|
|
|
void clearForStart();
|
|
|
|
void doStart();
|
|
|
|
CommandLine fullLocalCommandLine() const;
|
|
|
|
|
|
|
|
SshProcessInterface *q = nullptr;
|
|
|
|
|
|
|
|
qint64 m_processId = 0;
|
|
|
|
// Store the IDevice::ConstPtr in order to extend the lifetime of device for as long
|
|
|
|
// as this object is alive.
|
|
|
|
IDevice::ConstPtr m_device;
|
|
|
|
std::unique_ptr<SshConnectionHandle> m_connectionHandle;
|
2022-04-29 13:18:42 +02:00
|
|
|
QtcProcess m_process;
|
|
|
|
LinuxDevicePrivate *m_devicePrivate = nullptr;
|
2022-02-14 18:37:56 +01:00
|
|
|
|
|
|
|
QString m_socketFilePath;
|
2022-05-12 18:43:44 +02:00
|
|
|
SshParameters m_sshParameters;
|
2022-02-14 18:37:56 +01:00
|
|
|
bool m_connecting = false;
|
2022-04-29 13:18:42 +02:00
|
|
|
bool m_killed = false;
|
2022-02-14 18:37:56 +01:00
|
|
|
|
|
|
|
ProcessResultData m_result;
|
|
|
|
};
|
|
|
|
|
|
|
|
SshProcessInterface::SshProcessInterface(const LinuxDevice *linuxDevice)
|
|
|
|
: d(new SshProcessInterfacePrivate(this, linuxDevice->d))
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
SshProcessInterface::~SshProcessInterface()
|
|
|
|
{
|
|
|
|
delete d;
|
|
|
|
}
|
|
|
|
|
|
|
|
void SshProcessInterface::handleStarted(qint64 processId)
|
|
|
|
{
|
|
|
|
emitStarted(processId);
|
|
|
|
}
|
|
|
|
|
2022-05-25 20:08:12 +02:00
|
|
|
void SshProcessInterface::handleDone(const ProcessResultData &resultData)
|
|
|
|
{
|
|
|
|
emit done(resultData);
|
|
|
|
}
|
|
|
|
|
2022-02-14 18:37:56 +01:00
|
|
|
void SshProcessInterface::handleReadyReadStandardOutput(const QByteArray &outputData)
|
|
|
|
{
|
|
|
|
emit readyRead(outputData, {});
|
|
|
|
}
|
|
|
|
|
2022-05-04 13:09:22 +02:00
|
|
|
void SshProcessInterface::handleReadyReadStandardError(const QByteArray &errorData)
|
|
|
|
{
|
|
|
|
emit readyRead({}, errorData);
|
|
|
|
}
|
|
|
|
|
2022-02-14 18:37:56 +01:00
|
|
|
void SshProcessInterface::emitStarted(qint64 processId)
|
|
|
|
{
|
|
|
|
d->m_processId = processId;
|
|
|
|
emit started(processId);
|
|
|
|
}
|
|
|
|
|
|
|
|
void SshProcessInterface::killIfRunning()
|
|
|
|
{
|
2022-04-29 13:18:42 +02:00
|
|
|
if (d->m_killed || d->m_process.state() != QProcess::Running)
|
|
|
|
return;
|
|
|
|
sendControlSignal(ControlSignal::Kill);
|
|
|
|
d->m_killed = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
qint64 SshProcessInterface::processId() const
|
|
|
|
{
|
|
|
|
return d->m_processId;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool SshProcessInterface::runInShell(const CommandLine &command, const QByteArray &data)
|
|
|
|
{
|
2022-10-10 17:32:56 +02:00
|
|
|
return d->m_devicePrivate->runInShell(command, data).exitCode == 0;
|
2022-02-14 18:37:56 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void SshProcessInterface::start()
|
|
|
|
{
|
|
|
|
d->start();
|
|
|
|
}
|
|
|
|
|
|
|
|
qint64 SshProcessInterface::write(const QByteArray &data)
|
|
|
|
{
|
2022-04-22 16:02:03 +02:00
|
|
|
return d->m_process.writeRaw(data);
|
2022-02-14 18:37:56 +01:00
|
|
|
}
|
|
|
|
|
2022-04-29 13:18:42 +02:00
|
|
|
LinuxProcessInterface::LinuxProcessInterface(const LinuxDevice *linuxDevice)
|
|
|
|
: SshProcessInterface(linuxDevice)
|
2022-02-14 18:37:56 +01:00
|
|
|
{
|
2022-04-29 13:18:42 +02:00
|
|
|
}
|
2022-02-14 18:37:56 +01:00
|
|
|
|
2022-04-29 13:18:42 +02:00
|
|
|
LinuxProcessInterface::~LinuxProcessInterface()
|
|
|
|
{
|
|
|
|
killIfRunning();
|
|
|
|
}
|
2022-02-14 18:37:56 +01:00
|
|
|
|
2022-04-29 13:18:42 +02:00
|
|
|
void LinuxProcessInterface::sendControlSignal(ControlSignal controlSignal)
|
2022-02-14 18:37:56 +01:00
|
|
|
{
|
2022-04-29 13:18:42 +02:00
|
|
|
QTC_ASSERT(controlSignal != ControlSignal::KickOff, return);
|
|
|
|
const qint64 pid = processId();
|
|
|
|
QTC_ASSERT(pid, return); // TODO: try sending a signal based on process name
|
2022-08-17 14:40:26 +02:00
|
|
|
const QString args = QString::fromLatin1("-%1 -%2")
|
2022-04-29 13:18:42 +02:00
|
|
|
.arg(controlSignalToInt(controlSignal)).arg(pid);
|
2022-08-17 14:40:26 +02:00
|
|
|
const CommandLine command = { "kill", args, CommandLine::Raw };
|
2022-04-29 13:18:42 +02:00
|
|
|
// Note: This blocking call takes up to 2 ms for local remote.
|
|
|
|
runInShell(command);
|
2022-02-14 18:37:56 +01:00
|
|
|
}
|
|
|
|
|
2022-04-29 13:18:42 +02:00
|
|
|
QString LinuxProcessInterface::fullCommandLine(const CommandLine &commandLine) const
|
2022-02-14 18:37:56 +01:00
|
|
|
{
|
|
|
|
CommandLine cmd;
|
|
|
|
|
2022-04-28 21:11:20 +02:00
|
|
|
if (!commandLine.isEmpty()) {
|
|
|
|
const QStringList rcFilesToSource = {"/etc/profile", "$HOME/.profile"};
|
|
|
|
for (const QString &filePath : rcFilesToSource) {
|
|
|
|
cmd.addArgs({"test", "-f", filePath});
|
|
|
|
cmd.addArgs("&&", CommandLine::Raw);
|
|
|
|
cmd.addArgs({".", filePath});
|
|
|
|
cmd.addArgs(";", CommandLine::Raw);
|
|
|
|
}
|
2022-02-14 18:37:56 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!m_setup.m_workingDirectory.isEmpty()) {
|
|
|
|
cmd.addArgs({"cd", m_setup.m_workingDirectory.path()});
|
|
|
|
cmd.addArgs("&&", CommandLine::Raw);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (m_setup.m_terminalMode == TerminalMode::Off)
|
|
|
|
cmd.addArgs(QString("echo ") + s_pidMarker + "$$" + s_pidMarker + " && ", CommandLine::Raw);
|
|
|
|
|
2022-05-09 15:02:23 +02:00
|
|
|
const Environment &env = m_setup.m_environment;
|
2022-02-14 18:37:56 +01:00
|
|
|
for (auto it = env.constBegin(); it != env.constEnd(); ++it)
|
|
|
|
cmd.addArgs(env.key(it) + "='" + env.expandedValueForKey(env.key(it)) + '\'', CommandLine::Raw);
|
|
|
|
|
|
|
|
if (m_setup.m_terminalMode == TerminalMode::Off)
|
|
|
|
cmd.addArg("exec");
|
|
|
|
|
2022-04-28 21:11:20 +02:00
|
|
|
if (!commandLine.isEmpty())
|
|
|
|
cmd.addCommandLineAsArgs(commandLine, CommandLine::Raw);
|
2022-02-14 18:37:56 +01:00
|
|
|
return cmd.arguments();
|
|
|
|
}
|
|
|
|
|
2022-04-29 13:18:42 +02:00
|
|
|
void LinuxProcessInterface::handleStarted(qint64 processId)
|
2022-02-14 18:37:56 +01:00
|
|
|
{
|
|
|
|
// Don't emit started() when terminal is off,
|
|
|
|
// it's being done later inside handleReadyReadStandardOutput().
|
|
|
|
if (m_setup.m_terminalMode == TerminalMode::Off)
|
|
|
|
return;
|
|
|
|
|
2022-04-22 16:02:03 +02:00
|
|
|
m_pidParsed = true;
|
2022-02-14 18:37:56 +01:00
|
|
|
emitStarted(processId);
|
|
|
|
}
|
|
|
|
|
2022-05-25 20:08:12 +02:00
|
|
|
void LinuxProcessInterface::handleDone(const ProcessResultData &resultData)
|
|
|
|
{
|
|
|
|
ProcessResultData finalData = resultData;
|
|
|
|
if (!m_pidParsed) {
|
|
|
|
finalData.m_error = QProcess::FailedToStart;
|
|
|
|
if (!m_error.isEmpty()) {
|
|
|
|
if (!finalData.m_errorString.isEmpty())
|
|
|
|
finalData.m_errorString += "\n";
|
|
|
|
finalData.m_errorString += QString::fromLocal8Bit(m_error);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
emit done(finalData);
|
|
|
|
}
|
|
|
|
|
2022-04-29 13:18:42 +02:00
|
|
|
void LinuxProcessInterface::handleReadyReadStandardOutput(const QByteArray &outputData)
|
2022-02-14 18:37:56 +01:00
|
|
|
{
|
2022-04-22 16:02:03 +02:00
|
|
|
if (m_pidParsed) {
|
2022-02-14 18:37:56 +01:00
|
|
|
emit readyRead(outputData, {});
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
m_output.append(outputData);
|
|
|
|
|
|
|
|
static const QByteArray endMarker = s_pidMarker + '\n';
|
|
|
|
const int endMarkerOffset = m_output.indexOf(endMarker);
|
|
|
|
if (endMarkerOffset == -1)
|
|
|
|
return;
|
|
|
|
const int startMarkerOffset = m_output.indexOf(s_pidMarker);
|
|
|
|
if (startMarkerOffset == endMarkerOffset) // Only theoretically possible.
|
|
|
|
return;
|
|
|
|
const int pidStart = startMarkerOffset + s_pidMarker.length();
|
|
|
|
const QByteArray pidString = m_output.mid(pidStart, endMarkerOffset - pidStart);
|
|
|
|
m_pidParsed = true;
|
|
|
|
const qint64 processId = pidString.toLongLong();
|
|
|
|
|
|
|
|
// We don't want to show output from e.g. /etc/profile.
|
|
|
|
m_output = m_output.mid(endMarkerOffset + endMarker.length());
|
|
|
|
|
|
|
|
emitStarted(processId);
|
|
|
|
|
2022-05-04 13:09:22 +02:00
|
|
|
if (!m_output.isEmpty() || !m_error.isEmpty())
|
|
|
|
emit readyRead(m_output, m_error);
|
2022-02-14 18:37:56 +01:00
|
|
|
|
|
|
|
m_output.clear();
|
2022-05-04 13:09:22 +02:00
|
|
|
m_error.clear();
|
|
|
|
}
|
|
|
|
|
|
|
|
void LinuxProcessInterface::handleReadyReadStandardError(const QByteArray &errorData)
|
|
|
|
{
|
|
|
|
if (m_pidParsed) {
|
|
|
|
emit readyRead({}, errorData);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
m_error.append(errorData);
|
2022-02-14 18:37:56 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
SshProcessInterfacePrivate::SshProcessInterfacePrivate(SshProcessInterface *sshInterface,
|
|
|
|
LinuxDevicePrivate *devicePrivate)
|
|
|
|
: QObject(sshInterface)
|
|
|
|
, q(sshInterface)
|
2022-04-29 13:18:42 +02:00
|
|
|
, m_device(devicePrivate->q->sharedFromThis())
|
2022-05-02 14:00:42 +02:00
|
|
|
, m_process(this)
|
2022-02-14 18:37:56 +01:00
|
|
|
, m_devicePrivate(devicePrivate)
|
|
|
|
{
|
|
|
|
connect(&m_process, &QtcProcess::started, this, &SshProcessInterfacePrivate::handleStarted);
|
|
|
|
connect(&m_process, &QtcProcess::done, this, &SshProcessInterfacePrivate::handleDone);
|
|
|
|
connect(&m_process, &QtcProcess::readyReadStandardOutput,
|
|
|
|
this, &SshProcessInterfacePrivate::handleReadyReadStandardOutput);
|
|
|
|
connect(&m_process, &QtcProcess::readyReadStandardError,
|
|
|
|
this, &SshProcessInterfacePrivate::handleReadyReadStandardError);
|
|
|
|
}
|
|
|
|
|
|
|
|
void SshProcessInterfacePrivate::start()
|
|
|
|
{
|
|
|
|
clearForStart();
|
|
|
|
|
|
|
|
m_sshParameters = m_devicePrivate->q->sshParameters();
|
|
|
|
// TODO: Do we really need it for master process?
|
|
|
|
m_sshParameters.x11DisplayName
|
|
|
|
= q->m_setup.m_extraData.value("Ssh.X11ForwardToDisplay").toString();
|
|
|
|
if (SshSettings::connectionSharingEnabled()) {
|
|
|
|
m_connecting = true;
|
|
|
|
m_connectionHandle.reset(new SshConnectionHandle(m_devicePrivate->q->sharedFromThis()));
|
2022-05-02 14:00:42 +02:00
|
|
|
m_connectionHandle->setParent(this);
|
2022-02-14 18:37:56 +01:00
|
|
|
connect(m_connectionHandle.get(), &SshConnectionHandle::connected,
|
|
|
|
this, &SshProcessInterfacePrivate::handleConnected);
|
|
|
|
connect(m_connectionHandle.get(), &SshConnectionHandle::disconnected,
|
|
|
|
this, &SshProcessInterfacePrivate::handleDisconnected);
|
|
|
|
m_devicePrivate->attachToSharedConnection(m_connectionHandle.get(), m_sshParameters);
|
|
|
|
} else {
|
|
|
|
doStart();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void SshProcessInterfacePrivate::handleConnected(const QString &socketFilePath)
|
|
|
|
{
|
|
|
|
m_connecting = false;
|
|
|
|
m_socketFilePath = socketFilePath;
|
|
|
|
doStart();
|
|
|
|
}
|
|
|
|
|
|
|
|
void SshProcessInterfacePrivate::handleDisconnected(const ProcessResultData &result)
|
|
|
|
{
|
|
|
|
ProcessResultData resultData = result;
|
|
|
|
if (m_connecting)
|
|
|
|
resultData.m_error = QProcess::FailedToStart;
|
|
|
|
|
|
|
|
m_connecting = false;
|
|
|
|
if (m_connectionHandle) // TODO: should it disconnect from signals first?
|
|
|
|
m_connectionHandle.release()->deleteLater();
|
|
|
|
|
2022-05-03 23:38:14 +02:00
|
|
|
if (resultData.m_error != QProcess::UnknownError || m_process.state() != QProcess::NotRunning)
|
2022-02-14 18:37:56 +01:00
|
|
|
emit q->done(resultData); // TODO: don't emit done() on process finished afterwards
|
|
|
|
}
|
|
|
|
|
|
|
|
void SshProcessInterfacePrivate::handleStarted()
|
|
|
|
{
|
|
|
|
const qint64 processId = m_process.usesTerminal() ? m_process.processId() : 0;
|
|
|
|
// By default emits started signal, Linux impl doesn't emit it when terminal is off.
|
|
|
|
q->handleStarted(processId);
|
|
|
|
}
|
|
|
|
|
|
|
|
void SshProcessInterfacePrivate::handleDone()
|
|
|
|
{
|
2022-05-25 20:08:12 +02:00
|
|
|
if (m_connectionHandle) // TODO: should it disconnect from signals first?
|
|
|
|
m_connectionHandle.release()->deleteLater();
|
|
|
|
q->handleDone(m_process.resultData());
|
2022-02-14 18:37:56 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void SshProcessInterfacePrivate::handleReadyReadStandardOutput()
|
|
|
|
{
|
2022-05-04 13:09:22 +02:00
|
|
|
// By default emits signal. LinuxProcessImpl does custom parsing for processId
|
|
|
|
// and emits delayed start() - only when terminal is off.
|
|
|
|
q->handleReadyReadStandardOutput(m_process.readAllStandardOutput());
|
2022-02-14 18:37:56 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void SshProcessInterfacePrivate::handleReadyReadStandardError()
|
|
|
|
{
|
2022-05-04 13:09:22 +02:00
|
|
|
// By default emits signal. LinuxProcessImpl buffers the error channel until
|
|
|
|
// it emits delayed start() - only when terminal is off.
|
|
|
|
q->handleReadyReadStandardError(m_process.readAllStandardError());
|
2022-02-14 18:37:56 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void SshProcessInterfacePrivate::clearForStart()
|
|
|
|
{
|
|
|
|
m_result = {};
|
|
|
|
}
|
|
|
|
|
|
|
|
void SshProcessInterfacePrivate::doStart()
|
|
|
|
{
|
|
|
|
m_process.setProcessImpl(q->m_setup.m_processImpl);
|
|
|
|
m_process.setProcessMode(q->m_setup.m_processMode);
|
|
|
|
m_process.setTerminalMode(q->m_setup.m_terminalMode);
|
2022-06-03 14:28:30 +02:00
|
|
|
m_process.setReaperTimeout(q->m_setup.m_reaperTimeout);
|
2022-04-22 16:02:03 +02:00
|
|
|
m_process.setWriteData(q->m_setup.m_writeData);
|
2022-02-14 18:37:56 +01:00
|
|
|
// TODO: what about other fields from m_setup?
|
2022-05-12 18:43:44 +02:00
|
|
|
SshParameters::setupSshEnvironment(&m_process);
|
2022-02-14 18:37:56 +01:00
|
|
|
if (!m_sshParameters.x11DisplayName.isEmpty()) {
|
2022-05-09 15:02:23 +02:00
|
|
|
Environment env = m_process.controlEnvironment();
|
2022-02-14 18:37:56 +01:00
|
|
|
// Note: it seems this is no-op when shared connection is used.
|
|
|
|
// In this case the display is taken from master process.
|
|
|
|
env.set("DISPLAY", m_sshParameters.x11DisplayName);
|
2022-05-09 15:02:23 +02:00
|
|
|
m_process.setControlEnvironment(env);
|
2022-02-14 18:37:56 +01:00
|
|
|
}
|
|
|
|
m_process.setCommand(fullLocalCommandLine());
|
|
|
|
m_process.start();
|
|
|
|
}
|
|
|
|
|
|
|
|
CommandLine SshProcessInterfacePrivate::fullLocalCommandLine() const
|
|
|
|
{
|
2022-05-17 10:07:27 +02:00
|
|
|
CommandLine cmd{SshSettings::sshFilePath()};
|
2022-02-14 18:37:56 +01:00
|
|
|
|
|
|
|
if (!m_sshParameters.x11DisplayName.isEmpty())
|
|
|
|
cmd.addArg("-X");
|
|
|
|
if (q->m_setup.m_terminalMode != TerminalMode::Off)
|
|
|
|
cmd.addArg("-tt");
|
|
|
|
|
|
|
|
cmd.addArg("-q");
|
|
|
|
|
|
|
|
QStringList options = m_sshParameters.connectionOptions(SshSettings::sshFilePath());
|
|
|
|
if (!m_socketFilePath.isEmpty())
|
|
|
|
options << "-o" << ("ControlPath=" + m_socketFilePath);
|
|
|
|
options << m_sshParameters.host();
|
|
|
|
cmd.addArgs(options);
|
|
|
|
|
|
|
|
CommandLine remoteWithLocalPath = q->m_setup.m_commandLine;
|
2022-08-04 15:00:24 +02:00
|
|
|
FilePath executable = FilePath::fromParts({}, {}, remoteWithLocalPath.executable().path());
|
2022-02-14 18:37:56 +01:00
|
|
|
remoteWithLocalPath.setExecutable(executable);
|
|
|
|
|
|
|
|
cmd.addArg(q->fullCommandLine(remoteWithLocalPath));
|
|
|
|
return cmd;
|
|
|
|
}
|
|
|
|
|
2021-07-27 09:50:43 +02:00
|
|
|
// ShellThreadHandler
|
|
|
|
|
2022-05-12 18:43:44 +02:00
|
|
|
static SshParameters displayless(const SshParameters &sshParameters)
|
2022-02-14 18:37:56 +01:00
|
|
|
{
|
2022-05-12 18:43:44 +02:00
|
|
|
SshParameters parameters = sshParameters;
|
2022-02-14 18:37:56 +01:00
|
|
|
parameters.x11DisplayName.clear();
|
|
|
|
return parameters;
|
|
|
|
}
|
|
|
|
|
2021-07-27 09:50:43 +02:00
|
|
|
class ShellThreadHandler : public QObject
|
2012-04-06 18:28:16 +02:00
|
|
|
{
|
2022-05-17 10:07:27 +02:00
|
|
|
class LinuxDeviceShell : public DeviceShell
|
|
|
|
{
|
|
|
|
public:
|
2022-08-10 14:38:06 +02:00
|
|
|
LinuxDeviceShell(const CommandLine &cmdLine, const FilePath &devicePath)
|
2022-05-17 10:07:27 +02:00
|
|
|
: m_cmdLine(cmdLine)
|
2022-08-10 14:38:06 +02:00
|
|
|
, m_devicePath(devicePath)
|
2022-05-17 10:07:27 +02:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
void setupShellProcess(QtcProcess *shellProcess) override
|
|
|
|
{
|
|
|
|
SshParameters::setupSshEnvironment(shellProcess);
|
|
|
|
shellProcess->setCommand(m_cmdLine);
|
|
|
|
}
|
|
|
|
|
2022-08-10 14:38:06 +02:00
|
|
|
CommandLine createFallbackCommand(const CommandLine &cmdLine) override
|
|
|
|
{
|
|
|
|
CommandLine result = cmdLine;
|
|
|
|
result.setExecutable(cmdLine.executable().onDevice(m_devicePath));
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2022-05-17 10:07:27 +02:00
|
|
|
private:
|
|
|
|
const CommandLine m_cmdLine;
|
2022-08-10 14:38:06 +02:00
|
|
|
const FilePath m_devicePath;
|
2022-05-17 10:07:27 +02:00
|
|
|
};
|
|
|
|
|
2021-07-27 09:50:43 +02:00
|
|
|
public:
|
|
|
|
~ShellThreadHandler()
|
|
|
|
{
|
2022-04-22 16:02:03 +02:00
|
|
|
closeShell();
|
2022-02-14 18:37:56 +01:00
|
|
|
qDeleteAll(m_connections);
|
2021-07-27 09:50:43 +02:00
|
|
|
}
|
|
|
|
|
2022-04-22 16:02:03 +02:00
|
|
|
void closeShell()
|
2022-01-13 12:56:24 +01:00
|
|
|
{
|
2022-02-14 18:37:56 +01:00
|
|
|
m_shell.reset();
|
2022-01-13 12:56:24 +01:00
|
|
|
}
|
|
|
|
|
2022-04-22 16:02:03 +02:00
|
|
|
// Call me with shell mutex locked
|
2022-05-12 18:43:44 +02:00
|
|
|
bool start(const SshParameters ¶meters)
|
2021-07-27 09:50:43 +02:00
|
|
|
{
|
2022-04-22 16:02:03 +02:00
|
|
|
closeShell();
|
|
|
|
setSshParameters(parameters);
|
2022-04-28 15:42:09 +02:00
|
|
|
|
|
|
|
const FilePath sshPath = SshSettings::sshFilePath();
|
|
|
|
CommandLine cmd { sshPath };
|
|
|
|
cmd.addArg("-q");
|
|
|
|
cmd.addArgs(m_displaylessSshParameters.connectionOptions(sshPath)
|
|
|
|
<< m_displaylessSshParameters.host());
|
|
|
|
cmd.addArg("/bin/sh");
|
|
|
|
|
2022-08-10 14:38:06 +02:00
|
|
|
m_shell.reset(new LinuxDeviceShell(cmd, FilePath::fromString(QString("ssh://%1/").arg(parameters.userAtHost()))));
|
2022-09-21 10:59:59 +02:00
|
|
|
connect(m_shell.get(), &DeviceShell::done, this, [this] {
|
|
|
|
m_shell.release()->deleteLater();
|
|
|
|
});
|
2022-05-17 10:07:27 +02:00
|
|
|
return m_shell->start();
|
2021-07-27 09:50:43 +02:00
|
|
|
}
|
|
|
|
|
2022-04-22 16:02:03 +02:00
|
|
|
// Call me with shell mutex locked
|
2022-10-07 16:54:27 +02:00
|
|
|
RunResult runInShell(const CommandLine &cmd, const QByteArray &data = {})
|
2021-07-27 09:50:43 +02:00
|
|
|
{
|
|
|
|
QTC_ASSERT(m_shell, return {});
|
2022-10-07 16:54:27 +02:00
|
|
|
return m_shell->runInShell(cmd, data);
|
2021-07-27 09:50:43 +02:00
|
|
|
}
|
|
|
|
|
2022-05-12 18:43:44 +02:00
|
|
|
void setSshParameters(const SshParameters &sshParameters)
|
2022-02-14 18:37:56 +01:00
|
|
|
{
|
2022-04-22 16:02:03 +02:00
|
|
|
QMutexLocker locker(&m_mutex);
|
2022-05-12 18:43:44 +02:00
|
|
|
const SshParameters displaylessSshParameters = displayless(sshParameters);
|
2021-07-27 09:50:43 +02:00
|
|
|
|
2022-02-14 18:37:56 +01:00
|
|
|
if (m_displaylessSshParameters == displaylessSshParameters)
|
|
|
|
return;
|
2021-07-27 09:50:43 +02:00
|
|
|
|
2022-02-14 18:37:56 +01:00
|
|
|
// If displayless sshParameters don't match the old connections' sshParameters, then stale
|
|
|
|
// old connections (don't delete, as the last deref() to each one will delete them).
|
2022-10-07 14:46:06 +02:00
|
|
|
for (SshSharedConnection *connection : std::as_const(m_connections))
|
2022-02-14 18:37:56 +01:00
|
|
|
connection->makeStale();
|
|
|
|
m_connections.clear();
|
|
|
|
m_displaylessSshParameters = displaylessSshParameters;
|
|
|
|
}
|
2021-07-27 09:50:43 +02:00
|
|
|
|
2022-02-14 18:37:56 +01:00
|
|
|
QString attachToSharedConnection(SshConnectionHandle *connectionHandle,
|
2022-05-12 18:43:44 +02:00
|
|
|
const SshParameters &sshParameters)
|
2022-02-14 18:37:56 +01:00
|
|
|
{
|
|
|
|
setSshParameters(sshParameters);
|
2021-07-27 09:50:43 +02:00
|
|
|
|
2022-02-14 18:37:56 +01:00
|
|
|
SshSharedConnection *matchingConnection = nullptr;
|
|
|
|
|
|
|
|
// Find the matching connection
|
2022-10-07 14:46:06 +02:00
|
|
|
for (SshSharedConnection *connection : std::as_const(m_connections)) {
|
2022-02-14 18:37:56 +01:00
|
|
|
if (connection->sshParameters() == sshParameters) {
|
|
|
|
matchingConnection = connection;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// If no matching connection has been found, create a new one
|
|
|
|
if (!matchingConnection) {
|
|
|
|
matchingConnection = new SshSharedConnection(sshParameters);
|
|
|
|
connect(matchingConnection, &SshSharedConnection::autoDestructRequested,
|
|
|
|
this, [this, matchingConnection] {
|
|
|
|
// This slot is just for removing the matchingConnection from the connection list.
|
|
|
|
// The SshSharedConnection could have deleted itself otherwise.
|
|
|
|
m_connections.removeOne(matchingConnection);
|
|
|
|
matchingConnection->deleteLater();
|
|
|
|
});
|
|
|
|
m_connections.append(matchingConnection);
|
|
|
|
}
|
|
|
|
|
|
|
|
matchingConnection->ref();
|
|
|
|
|
|
|
|
connect(matchingConnection, &SshSharedConnection::connected,
|
|
|
|
connectionHandle, &SshConnectionHandle::connected);
|
|
|
|
connect(matchingConnection, &SshSharedConnection::disconnected,
|
|
|
|
connectionHandle, &SshConnectionHandle::disconnected);
|
|
|
|
|
|
|
|
connect(connectionHandle, &SshConnectionHandle::detachFromSharedConnection,
|
|
|
|
matchingConnection, &SshSharedConnection::deref,
|
|
|
|
Qt::BlockingQueuedConnection); // Ensure the signal is delivered before sender's
|
|
|
|
// destruction, otherwise we may get out of sync
|
|
|
|
// with ref count.
|
|
|
|
|
|
|
|
if (matchingConnection->state() == QProcess::Running)
|
|
|
|
return matchingConnection->socketFilePath();
|
|
|
|
|
|
|
|
if (matchingConnection->state() == QProcess::NotRunning)
|
|
|
|
matchingConnection->connectToHost();
|
|
|
|
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
|
2022-04-22 16:02:03 +02:00
|
|
|
// Call me with shell mutex locked, called from other thread
|
2022-05-12 18:43:44 +02:00
|
|
|
bool isRunning(const SshParameters &sshParameters) const
|
2022-04-22 16:02:03 +02:00
|
|
|
{
|
|
|
|
if (!m_shell)
|
|
|
|
return false;
|
|
|
|
QMutexLocker locker(&m_mutex);
|
|
|
|
if (m_displaylessSshParameters != displayless(sshParameters))
|
|
|
|
return false;
|
|
|
|
return true;
|
|
|
|
}
|
2022-02-14 18:37:56 +01:00
|
|
|
private:
|
2022-04-22 16:02:03 +02:00
|
|
|
mutable QMutex m_mutex;
|
2022-05-12 18:43:44 +02:00
|
|
|
SshParameters m_displaylessSshParameters;
|
2022-02-14 18:37:56 +01:00
|
|
|
QList<SshSharedConnection *> m_connections;
|
2022-05-17 10:07:27 +02:00
|
|
|
std::unique_ptr<LinuxDeviceShell> m_shell;
|
2021-07-27 09:50:43 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
// LinuxDevice
|
2012-04-06 18:28:16 +02:00
|
|
|
|
2019-01-15 08:51:13 +01:00
|
|
|
LinuxDevice::LinuxDevice()
|
2021-07-27 09:50:43 +02:00
|
|
|
: d(new LinuxDevicePrivate(this))
|
2019-01-11 14:50:08 +01:00
|
|
|
{
|
2022-10-10 17:32:56 +02:00
|
|
|
setFileAccess(&d->m_fileAccess);
|
2022-07-15 12:20:23 +02:00
|
|
|
setDisplayType(Tr::tr("Remote Linux"));
|
|
|
|
setDefaultDisplayName(Tr::tr("Remote Linux Device"));
|
2019-08-16 10:17:45 +02:00
|
|
|
setOsType(OsTypeLinux);
|
|
|
|
|
2022-07-15 12:20:23 +02:00
|
|
|
addDeviceAction({Tr::tr("Deploy Public Key..."), [](const IDevice::Ptr &device, QWidget *parent) {
|
2019-01-11 14:50:08 +01:00
|
|
|
if (auto d = PublicKeyDeploymentDialog::createDialog(device, parent)) {
|
|
|
|
d->exec();
|
|
|
|
delete d;
|
|
|
|
}
|
|
|
|
}});
|
|
|
|
|
2021-08-02 18:02:10 +02:00
|
|
|
setOpenTerminal([this](const Environment &env, const FilePath &workingDir) {
|
2022-04-28 21:11:20 +02:00
|
|
|
QtcProcess * const proc = new QtcProcess;
|
|
|
|
d->m_terminals.append(proc);
|
|
|
|
QObject::connect(proc, &QtcProcess::done, [this, proc] {
|
2022-04-14 13:02:16 +02:00
|
|
|
if (proc->error() != QProcess::UnknownError) {
|
|
|
|
const QString errorString = proc->errorString();
|
|
|
|
QString message;
|
|
|
|
if (proc->error() == QProcess::FailedToStart)
|
2022-07-15 12:20:23 +02:00
|
|
|
message = Tr::tr("Error starting remote shell.");
|
2022-04-14 13:02:16 +02:00
|
|
|
else if (errorString.isEmpty())
|
2022-07-15 12:20:23 +02:00
|
|
|
message = Tr::tr("Error running remote shell.");
|
2022-04-14 13:02:16 +02:00
|
|
|
else
|
2022-07-15 12:20:23 +02:00
|
|
|
message = Tr::tr("Error running remote shell: %1").arg(errorString);
|
2022-04-14 13:02:16 +02:00
|
|
|
Core::MessageManager::writeDisrupting(message);
|
2019-06-13 17:11:00 +02:00
|
|
|
}
|
|
|
|
proc->deleteLater();
|
2022-04-28 21:11:20 +02:00
|
|
|
d->m_terminals.removeOne(proc);
|
2019-06-13 17:11:00 +02:00
|
|
|
});
|
|
|
|
|
2022-05-10 15:45:34 +02:00
|
|
|
proc->setCommand({filePath({}), {}});
|
2022-02-18 00:56:14 +01:00
|
|
|
proc->setTerminalMode(TerminalMode::On);
|
2022-02-11 17:38:16 +01:00
|
|
|
proc->setEnvironment(env);
|
|
|
|
proc->setWorkingDirectory(workingDir);
|
|
|
|
proc->start();
|
2019-06-13 17:11:00 +02:00
|
|
|
});
|
|
|
|
|
2022-07-15 12:20:23 +02:00
|
|
|
addDeviceAction({Tr::tr("Open Remote Shell"), [](const IDevice::Ptr &device, QWidget *) {
|
2022-03-18 11:49:31 +01:00
|
|
|
device->openTerminal(Environment(), FilePath());
|
|
|
|
}});
|
2019-01-11 14:50:08 +01:00
|
|
|
}
|
|
|
|
|
2021-07-27 09:50:43 +02:00
|
|
|
LinuxDevice::~LinuxDevice()
|
|
|
|
{
|
|
|
|
delete d;
|
|
|
|
}
|
|
|
|
|
|
|
|
IDeviceWidget *LinuxDevice::createWidget()
|
|
|
|
{
|
2022-07-14 17:02:19 +02:00
|
|
|
return new Internal::GenericLinuxDeviceConfigurationWidget(sharedFromThis());
|
2021-07-27 09:50:43 +02:00
|
|
|
}
|
|
|
|
|
2013-04-18 09:31:22 +02:00
|
|
|
bool LinuxDevice::canAutoDetectPorts() const
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2022-05-10 12:53:27 +02:00
|
|
|
PortsGatheringMethod LinuxDevice::portsGatheringMethod() const
|
2012-07-26 17:41:52 +02:00
|
|
|
{
|
2022-05-10 12:53:27 +02:00
|
|
|
return {
|
|
|
|
[this](QAbstractSocket::NetworkLayerProtocol protocol) -> CommandLine {
|
|
|
|
// We might encounter the situation that protocol is given IPv6
|
|
|
|
// but the consumer of the free port information decides to open
|
|
|
|
// an IPv4(only) port. As a result the next IPv6 scan will
|
|
|
|
// report the port again as open (in IPv6 namespace), while the
|
|
|
|
// same port in IPv4 namespace might still be blocked, and
|
|
|
|
// re-use of this port fails.
|
|
|
|
// GDBserver behaves exactly like this.
|
|
|
|
|
|
|
|
Q_UNUSED(protocol)
|
|
|
|
|
|
|
|
// /proc/net/tcp* covers /proc/net/tcp and /proc/net/tcp6
|
|
|
|
return {filePath("sed"),
|
|
|
|
"-e 's/.*: [[:xdigit:]]*:\\([[:xdigit:]]\\{4\\}\\).*/\\1/g' /proc/net/tcp*",
|
|
|
|
CommandLine::Raw};
|
|
|
|
},
|
|
|
|
|
2022-05-12 08:42:51 +02:00
|
|
|
&Port::parseFromSedOutput
|
2022-05-10 12:53:27 +02:00
|
|
|
};
|
2012-07-26 17:41:52 +02:00
|
|
|
}
|
|
|
|
|
2012-08-02 14:45:27 +02:00
|
|
|
DeviceProcessList *LinuxDevice::createProcessListModel(QObject *parent) const
|
|
|
|
{
|
|
|
|
return new LinuxDeviceProcessList(sharedFromThis(), parent);
|
|
|
|
}
|
|
|
|
|
2013-06-27 17:12:08 +02:00
|
|
|
DeviceTester *LinuxDevice::createDeviceTester() const
|
2013-05-30 13:53:28 +02:00
|
|
|
{
|
|
|
|
return new GenericLinuxDeviceTester;
|
|
|
|
}
|
|
|
|
|
2013-09-16 15:30:30 +02:00
|
|
|
DeviceProcessSignalOperation::Ptr LinuxDevice::signalOperation() const
|
|
|
|
{
|
2022-05-03 16:30:25 +02:00
|
|
|
return DeviceProcessSignalOperation::Ptr(new RemoteLinuxSignalOperation(sharedFromThis()));
|
2013-09-16 15:30:30 +02:00
|
|
|
}
|
|
|
|
|
2016-04-06 13:56:32 +02:00
|
|
|
class LinuxDeviceEnvironmentFetcher : public DeviceEnvironmentFetcher
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
LinuxDeviceEnvironmentFetcher(const IDevice::ConstPtr &device)
|
|
|
|
: m_reader(device)
|
|
|
|
{
|
|
|
|
connect(&m_reader, &Internal::RemoteLinuxEnvironmentReader::finished,
|
|
|
|
this, &LinuxDeviceEnvironmentFetcher::readerFinished);
|
|
|
|
connect(&m_reader, &Internal::RemoteLinuxEnvironmentReader::error,
|
|
|
|
this, &LinuxDeviceEnvironmentFetcher::readerError);
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
void start() override { m_reader.start(); }
|
|
|
|
void readerFinished() { emit finished(m_reader.remoteEnvironment(), true); }
|
2022-05-17 10:07:27 +02:00
|
|
|
void readerError() { emit finished(Environment(), false); }
|
2016-04-06 13:56:32 +02:00
|
|
|
|
|
|
|
Internal::RemoteLinuxEnvironmentReader m_reader;
|
|
|
|
};
|
|
|
|
|
|
|
|
DeviceEnvironmentFetcher::Ptr LinuxDevice::environmentFetcher() const
|
|
|
|
{
|
|
|
|
return DeviceEnvironmentFetcher::Ptr(new LinuxDeviceEnvironmentFetcher(sharedFromThis()));
|
|
|
|
}
|
|
|
|
|
2022-10-04 08:09:44 +02:00
|
|
|
bool LinuxDevice::usableAsBuildDevice() const
|
|
|
|
{
|
2022-10-13 16:36:48 +02:00
|
|
|
return true;
|
2022-10-04 08:09:44 +02:00
|
|
|
}
|
|
|
|
|
2021-07-27 09:50:43 +02:00
|
|
|
QString LinuxDevice::userAtHost() const
|
|
|
|
{
|
2022-02-03 13:20:15 +01:00
|
|
|
return sshParameters().userAtHost();
|
2021-07-27 09:50:43 +02:00
|
|
|
}
|
|
|
|
|
2022-08-04 13:35:42 +02:00
|
|
|
FilePath LinuxDevice::rootPath() const
|
2022-05-31 11:16:44 +02:00
|
|
|
{
|
2022-08-04 15:00:24 +02:00
|
|
|
return FilePath::fromParts(u"ssh", userAtHost(), u"/");
|
2022-05-31 11:16:44 +02:00
|
|
|
}
|
|
|
|
|
2021-07-27 09:50:43 +02:00
|
|
|
bool LinuxDevice::handlesFile(const FilePath &filePath) const
|
|
|
|
{
|
2022-08-04 13:35:42 +02:00
|
|
|
if (filePath.scheme() == u"device" && filePath.host() == id().toString())
|
2022-03-25 10:35:17 +01:00
|
|
|
return true;
|
2022-08-04 13:35:42 +02:00
|
|
|
if (filePath.scheme() == u"ssh" && filePath.host() == userAtHost())
|
2022-03-25 10:35:17 +01:00
|
|
|
return true;
|
|
|
|
return false;
|
2021-07-27 09:50:43 +02:00
|
|
|
}
|
|
|
|
|
2022-02-14 18:37:56 +01:00
|
|
|
ProcessInterface *LinuxDevice::createProcessInterface() const
|
2021-07-27 09:50:43 +02:00
|
|
|
{
|
2022-04-29 13:18:42 +02:00
|
|
|
return new LinuxProcessInterface(this);
|
2021-07-27 09:50:43 +02:00
|
|
|
}
|
|
|
|
|
2022-05-09 15:02:23 +02:00
|
|
|
Environment LinuxDevice::systemEnvironment() const
|
|
|
|
{
|
|
|
|
return {}; // FIXME. See e.g. Docker implementation.
|
|
|
|
}
|
|
|
|
|
2021-07-27 09:50:43 +02:00
|
|
|
LinuxDevicePrivate::LinuxDevicePrivate(LinuxDevice *parent)
|
|
|
|
: q(parent)
|
|
|
|
{
|
2022-08-10 14:38:06 +02:00
|
|
|
m_shellThread.setObjectName("LinuxDeviceShell");
|
2021-07-27 09:50:43 +02:00
|
|
|
m_handler = new ShellThreadHandler();
|
|
|
|
m_handler->moveToThread(&m_shellThread);
|
|
|
|
QObject::connect(&m_shellThread, &QThread::finished, m_handler, &QObject::deleteLater);
|
|
|
|
m_shellThread.start();
|
|
|
|
}
|
|
|
|
|
|
|
|
LinuxDevicePrivate::~LinuxDevicePrivate()
|
|
|
|
{
|
2022-04-28 21:11:20 +02:00
|
|
|
qDeleteAll(m_terminals);
|
2022-02-14 18:37:56 +01:00
|
|
|
auto closeShell = [this] {
|
|
|
|
m_shellThread.quit();
|
|
|
|
m_shellThread.wait();
|
|
|
|
};
|
|
|
|
if (QThread::currentThread() == m_shellThread.thread())
|
|
|
|
closeShell();
|
|
|
|
else // We might be in a non-main thread now due to extended lifetime of IDevice::Ptr
|
|
|
|
QMetaObject::invokeMethod(&m_shellThread, closeShell, Qt::BlockingQueuedConnection);
|
2021-07-27 09:50:43 +02:00
|
|
|
}
|
|
|
|
|
2022-04-22 16:02:03 +02:00
|
|
|
// Call me with shell mutex locked
|
2021-07-27 09:50:43 +02:00
|
|
|
bool LinuxDevicePrivate::setupShell()
|
|
|
|
{
|
2022-05-12 18:43:44 +02:00
|
|
|
const SshParameters sshParameters = q->sshParameters();
|
2022-04-22 16:02:03 +02:00
|
|
|
if (m_handler->isRunning(sshParameters))
|
|
|
|
return true;
|
|
|
|
|
2021-07-27 09:50:43 +02:00
|
|
|
bool ok = false;
|
2022-04-22 16:02:03 +02:00
|
|
|
QMetaObject::invokeMethod(m_handler, [this, sshParameters] {
|
|
|
|
return m_handler->start(sshParameters);
|
2021-07-27 09:50:43 +02:00
|
|
|
}, Qt::BlockingQueuedConnection, &ok);
|
|
|
|
return ok;
|
|
|
|
}
|
|
|
|
|
2022-10-07 16:54:27 +02:00
|
|
|
RunResult LinuxDevicePrivate::runInShell(const CommandLine &cmd, const QByteArray &data)
|
2021-07-27 09:50:43 +02:00
|
|
|
{
|
|
|
|
QMutexLocker locker(&m_shellMutex);
|
|
|
|
DEBUG(cmd.toUserOutput());
|
2022-04-22 16:02:03 +02:00
|
|
|
QTC_ASSERT(setupShell(), return {});
|
2021-07-27 09:50:43 +02:00
|
|
|
|
2022-10-07 16:54:27 +02:00
|
|
|
return m_handler->runInShell(cmd, data);
|
2021-07-27 09:50:43 +02:00
|
|
|
}
|
|
|
|
|
2022-02-14 18:37:56 +01:00
|
|
|
void LinuxDevicePrivate::attachToSharedConnection(SshConnectionHandle *connectionHandle,
|
2022-05-12 18:43:44 +02:00
|
|
|
const SshParameters &sshParameters)
|
2022-02-14 18:37:56 +01:00
|
|
|
{
|
|
|
|
QString socketFilePath;
|
2022-08-10 14:38:06 +02:00
|
|
|
|
|
|
|
Qt::ConnectionType connectionType = QThread::currentThread() == m_handler->thread() ? Qt::DirectConnection : Qt::BlockingQueuedConnection;
|
|
|
|
|
2022-04-22 16:02:03 +02:00
|
|
|
QMetaObject::invokeMethod(m_handler, [this, connectionHandle, sshParameters] {
|
|
|
|
return m_handler->attachToSharedConnection(connectionHandle, sshParameters);
|
2022-08-10 14:38:06 +02:00
|
|
|
}, connectionType, &socketFilePath);
|
|
|
|
|
2022-02-14 18:37:56 +01:00
|
|
|
if (!socketFilePath.isEmpty())
|
|
|
|
emit connectionHandle->connected(socketFilePath);
|
|
|
|
}
|
|
|
|
|
2022-05-10 10:36:34 +02:00
|
|
|
static FilePaths dirsToCreate(const FilesToTransfer &files)
|
|
|
|
{
|
|
|
|
FilePaths dirs;
|
|
|
|
for (const FileToTransfer &file : files) {
|
|
|
|
FilePath parentDir = file.m_target.parentDir();
|
|
|
|
while (true) {
|
|
|
|
if (dirs.contains(parentDir) || QDir(parentDir.path()).isRoot())
|
|
|
|
break;
|
|
|
|
dirs << parentDir;
|
|
|
|
parentDir = parentDir.parentDir();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
sort(dirs);
|
|
|
|
return dirs;
|
|
|
|
}
|
|
|
|
|
2022-05-20 17:53:20 +02:00
|
|
|
static QByteArray transferCommand(const FileTransferDirection direction, bool link)
|
2022-05-10 10:36:34 +02:00
|
|
|
{
|
2022-05-20 17:53:20 +02:00
|
|
|
if (direction == FileTransferDirection::Upload)
|
2022-05-10 10:36:34 +02:00
|
|
|
return link ? "ln -s" : "put";
|
2022-05-20 17:53:20 +02:00
|
|
|
if (direction == FileTransferDirection::Download)
|
2022-05-10 10:36:34 +02:00
|
|
|
return "get";
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
|
2022-05-20 17:53:20 +02:00
|
|
|
class SshTransferInterface : public FileTransferInterface
|
2022-05-10 10:36:34 +02:00
|
|
|
{
|
|
|
|
Q_OBJECT
|
|
|
|
|
2022-05-11 19:23:43 +02:00
|
|
|
protected:
|
2022-05-20 17:53:20 +02:00
|
|
|
SshTransferInterface(const FileTransferSetupData &setup, LinuxDevicePrivate *devicePrivate)
|
|
|
|
: FileTransferInterface(setup)
|
|
|
|
, m_device(devicePrivate->q->sharedFromThis())
|
|
|
|
, m_devicePrivate(devicePrivate)
|
2022-05-11 19:23:43 +02:00
|
|
|
, m_process(this)
|
|
|
|
{
|
2022-05-20 17:53:20 +02:00
|
|
|
m_direction = m_setup.m_files.isEmpty() ? FileTransferDirection::Invalid
|
|
|
|
: m_setup.m_files.first().direction();
|
2022-05-12 18:43:44 +02:00
|
|
|
SshParameters::setupSshEnvironment(&m_process);
|
2022-05-11 19:23:43 +02:00
|
|
|
connect(&m_process, &QtcProcess::readyReadStandardOutput, this, [this] {
|
|
|
|
emit progress(QString::fromLocal8Bit(m_process.readAllStandardOutput()));
|
|
|
|
});
|
2022-05-20 17:53:20 +02:00
|
|
|
connect(&m_process, &QtcProcess::done, this, &SshTransferInterface::doneImpl);
|
2022-05-11 19:23:43 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
bool handleError()
|
|
|
|
{
|
|
|
|
ProcessResultData resultData = m_process.resultData();
|
|
|
|
if (resultData.m_error == QProcess::FailedToStart) {
|
2022-07-15 12:20:23 +02:00
|
|
|
resultData.m_errorString = Tr::tr("\"%1\" failed to start: %2")
|
2022-05-20 17:53:20 +02:00
|
|
|
.arg(FileTransfer::transferMethodName(m_setup.m_method), resultData.m_errorString);
|
2022-05-11 19:23:43 +02:00
|
|
|
} else if (resultData.m_exitStatus != QProcess::NormalExit) {
|
2022-07-15 12:20:23 +02:00
|
|
|
resultData.m_errorString = Tr::tr("\"%1\" crashed.")
|
2022-05-20 17:53:20 +02:00
|
|
|
.arg(FileTransfer::transferMethodName(m_setup.m_method));
|
2022-05-11 19:23:43 +02:00
|
|
|
} else if (resultData.m_exitCode != 0) {
|
|
|
|
resultData.m_errorString = QString::fromLocal8Bit(m_process.readAllStandardError());
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
2022-05-19 22:40:37 +02:00
|
|
|
emit done(resultData);
|
2022-05-11 19:23:43 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void handleDone()
|
|
|
|
{
|
|
|
|
if (!handleError())
|
|
|
|
emit done(m_process.resultData());
|
|
|
|
}
|
2022-05-10 10:36:34 +02:00
|
|
|
|
2022-05-17 00:04:48 +02:00
|
|
|
QStringList fullConnectionOptions() const
|
|
|
|
{
|
|
|
|
QStringList options = m_sshParameters.connectionOptions(SshSettings::sshFilePath());
|
|
|
|
if (!m_socketFilePath.isEmpty())
|
|
|
|
options << "-o" << ("ControlPath=" + m_socketFilePath);
|
|
|
|
return options;
|
|
|
|
}
|
|
|
|
|
|
|
|
QString host() const { return m_sshParameters.host(); }
|
|
|
|
QString userAtHost() const { return m_sshParameters.userName() + '@' + m_sshParameters.host(); }
|
|
|
|
|
|
|
|
QtcProcess &process() { return m_process; }
|
2022-05-20 17:53:20 +02:00
|
|
|
FileTransferDirection direction() const { return m_direction; }
|
2022-05-11 19:23:43 +02:00
|
|
|
|
|
|
|
private:
|
|
|
|
virtual void startImpl() = 0;
|
|
|
|
virtual void doneImpl() = 0;
|
2022-05-17 00:04:48 +02:00
|
|
|
|
2022-05-20 17:53:20 +02:00
|
|
|
void start() final
|
|
|
|
{
|
|
|
|
m_sshParameters = displayless(m_device->sshParameters());
|
|
|
|
if (SshSettings::connectionSharingEnabled()) {
|
|
|
|
m_connecting = true;
|
|
|
|
m_connectionHandle.reset(new SshConnectionHandle(m_device));
|
|
|
|
m_connectionHandle->setParent(this);
|
|
|
|
connect(m_connectionHandle.get(), &SshConnectionHandle::connected,
|
|
|
|
this, &SshTransferInterface::handleConnected);
|
|
|
|
connect(m_connectionHandle.get(), &SshConnectionHandle::disconnected,
|
|
|
|
this, &SshTransferInterface::handleDisconnected);
|
|
|
|
m_devicePrivate->attachToSharedConnection(m_connectionHandle.get(), m_sshParameters);
|
|
|
|
} else {
|
|
|
|
startImpl();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-05-17 00:04:48 +02:00
|
|
|
void handleConnected(const QString &socketFilePath)
|
|
|
|
{
|
|
|
|
m_connecting = false;
|
|
|
|
m_socketFilePath = socketFilePath;
|
|
|
|
startImpl();
|
|
|
|
}
|
|
|
|
|
|
|
|
void handleDisconnected(const ProcessResultData &result)
|
|
|
|
{
|
|
|
|
ProcessResultData resultData = result;
|
|
|
|
if (m_connecting)
|
|
|
|
resultData.m_error = QProcess::FailedToStart;
|
|
|
|
|
|
|
|
m_connecting = false;
|
|
|
|
if (m_connectionHandle) // TODO: should it disconnect from signals first?
|
|
|
|
m_connectionHandle.release()->deleteLater();
|
|
|
|
|
|
|
|
if (resultData.m_error != QProcess::UnknownError || m_process.state() != QProcess::NotRunning)
|
|
|
|
emit done(resultData); // TODO: don't emit done() on process finished afterwards
|
|
|
|
}
|
|
|
|
|
|
|
|
IDevice::ConstPtr m_device;
|
|
|
|
LinuxDevicePrivate *m_devicePrivate = nullptr;
|
2022-05-20 17:53:20 +02:00
|
|
|
SshParameters m_sshParameters;
|
|
|
|
FileTransferDirection m_direction = FileTransferDirection::Invalid; // helper
|
|
|
|
|
|
|
|
// ssh shared connection related
|
2022-05-17 00:04:48 +02:00
|
|
|
std::unique_ptr<SshConnectionHandle> m_connectionHandle;
|
|
|
|
QString m_socketFilePath;
|
|
|
|
bool m_connecting = false;
|
2022-05-20 17:53:20 +02:00
|
|
|
|
|
|
|
QtcProcess m_process;
|
2022-05-10 10:36:34 +02:00
|
|
|
};
|
|
|
|
|
2022-05-20 17:53:20 +02:00
|
|
|
class SftpTransferImpl : public SshTransferInterface
|
2022-05-10 10:36:34 +02:00
|
|
|
{
|
2022-05-11 19:23:43 +02:00
|
|
|
public:
|
2022-05-20 17:53:20 +02:00
|
|
|
SftpTransferImpl(const FileTransferSetupData &setup, LinuxDevicePrivate *devicePrivate)
|
|
|
|
: SshTransferInterface(setup, devicePrivate) { }
|
2022-05-10 10:36:34 +02:00
|
|
|
|
2022-05-11 19:23:43 +02:00
|
|
|
private:
|
2022-05-17 00:04:48 +02:00
|
|
|
void startImpl() final
|
2022-05-11 19:23:43 +02:00
|
|
|
{
|
|
|
|
const FilePath sftpBinary = SshSettings::sftpFilePath();
|
|
|
|
if (!sftpBinary.exists()) {
|
2022-07-15 12:20:23 +02:00
|
|
|
startFailed(Tr::tr("\"sftp\" binary \"%1\" does not exist.")
|
2022-06-24 13:19:04 +02:00
|
|
|
.arg(sftpBinary.toUserOutput()));
|
2022-05-11 19:23:43 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2022-09-14 10:01:41 +02:00
|
|
|
QByteArray batchData;
|
2022-05-11 19:23:43 +02:00
|
|
|
|
2022-05-20 17:53:20 +02:00
|
|
|
const FilePaths dirs = dirsToCreate(m_setup.m_files);
|
2022-05-11 19:23:43 +02:00
|
|
|
for (const FilePath &dir : dirs) {
|
2022-05-20 17:53:20 +02:00
|
|
|
if (direction() == FileTransferDirection::Upload) {
|
2022-09-14 10:01:41 +02:00
|
|
|
batchData += "-mkdir " + ProcessArgs::quoteArgUnix(dir.path()).toLocal8Bit() + '\n';
|
2022-05-20 17:53:20 +02:00
|
|
|
} else if (direction() == FileTransferDirection::Download) {
|
2022-05-11 19:23:43 +02:00
|
|
|
if (!QDir::root().mkpath(dir.path())) {
|
2022-07-15 12:20:23 +02:00
|
|
|
startFailed(Tr::tr("Failed to create local directory \"%1\".")
|
2022-06-24 13:19:04 +02:00
|
|
|
.arg(QDir::toNativeSeparators(dir.path())));
|
2022-05-11 19:23:43 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-05-20 17:53:20 +02:00
|
|
|
for (const FileToTransfer &file : m_setup.m_files) {
|
2022-05-11 19:23:43 +02:00
|
|
|
FilePath sourceFileOrLinkTarget = file.m_source;
|
|
|
|
bool link = false;
|
2022-05-20 17:53:20 +02:00
|
|
|
if (direction() == FileTransferDirection::Upload) {
|
2022-05-11 19:23:43 +02:00
|
|
|
const QFileInfo fi(file.m_source.toFileInfo());
|
|
|
|
if (fi.isSymLink()) {
|
|
|
|
link = true;
|
2022-09-14 10:01:41 +02:00
|
|
|
batchData += "-rm " + ProcessArgs::quoteArgUnix(
|
|
|
|
file.m_target.path()).toLocal8Bit() + '\n';
|
2022-05-11 19:23:43 +02:00
|
|
|
// see QTBUG-5817.
|
2022-08-04 15:00:24 +02:00
|
|
|
sourceFileOrLinkTarget =
|
|
|
|
sourceFileOrLinkTarget.withNewPath(fi.dir().relativeFilePath(fi.symLinkTarget()));
|
2022-05-11 19:23:43 +02:00
|
|
|
}
|
|
|
|
}
|
2022-09-14 10:01:41 +02:00
|
|
|
batchData += transferCommand(direction(), link) + ' '
|
|
|
|
+ ProcessArgs::quoteArgUnix(sourceFileOrLinkTarget.path()).toLocal8Bit() + ' '
|
|
|
|
+ ProcessArgs::quoteArgUnix(file.m_target.path()).toLocal8Bit() + '\n';
|
2022-05-11 19:23:43 +02:00
|
|
|
}
|
2022-09-14 10:01:41 +02:00
|
|
|
process().setCommand({sftpBinary, fullConnectionOptions() << "-b" << "-" << host()});
|
|
|
|
process().setWriteData(batchData);
|
2022-05-17 00:04:48 +02:00
|
|
|
process().start();
|
2022-05-11 19:23:43 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void doneImpl() final { handleDone(); }
|
|
|
|
};
|
|
|
|
|
2022-05-20 17:53:20 +02:00
|
|
|
class RsyncTransferImpl : public SshTransferInterface
|
2022-05-10 10:36:34 +02:00
|
|
|
{
|
2022-05-11 19:23:43 +02:00
|
|
|
public:
|
2022-05-20 17:53:20 +02:00
|
|
|
RsyncTransferImpl(const FileTransferSetupData &setup, LinuxDevicePrivate *devicePrivate)
|
|
|
|
: SshTransferInterface(setup, devicePrivate)
|
2022-05-11 19:23:43 +02:00
|
|
|
{ }
|
2022-05-10 10:36:34 +02:00
|
|
|
|
2022-05-11 19:23:43 +02:00
|
|
|
private:
|
2022-05-17 00:04:48 +02:00
|
|
|
void startImpl() final
|
2022-05-12 12:32:55 +02:00
|
|
|
{
|
|
|
|
m_currentIndex = 0;
|
|
|
|
startNextFile();
|
|
|
|
}
|
|
|
|
|
2022-05-17 00:04:48 +02:00
|
|
|
void doneImpl() final
|
2022-05-12 12:32:55 +02:00
|
|
|
{
|
2022-05-20 17:53:20 +02:00
|
|
|
if (m_setup.m_files.size() == 0 || m_currentIndex == m_setup.m_files.size() - 1)
|
2022-05-12 12:32:55 +02:00
|
|
|
return handleDone();
|
|
|
|
|
|
|
|
if (handleError())
|
|
|
|
return;
|
|
|
|
|
|
|
|
++m_currentIndex;
|
|
|
|
startNextFile();
|
|
|
|
}
|
|
|
|
|
|
|
|
void startNextFile()
|
|
|
|
{
|
2022-05-17 00:04:48 +02:00
|
|
|
process().close();
|
2022-05-12 12:32:55 +02:00
|
|
|
|
|
|
|
const QString sshCmdLine = ProcessArgs::joinArgs(
|
2022-05-17 00:04:48 +02:00
|
|
|
QStringList{SshSettings::sshFilePath().toUserOutput()}
|
|
|
|
<< fullConnectionOptions(), OsTypeLinux);
|
2022-05-20 17:53:20 +02:00
|
|
|
QStringList options{"-e", sshCmdLine, m_setup.m_rsyncFlags};
|
2022-05-12 12:32:55 +02:00
|
|
|
|
2022-05-20 17:53:20 +02:00
|
|
|
if (!m_setup.m_files.isEmpty()) { // NormalRun
|
|
|
|
const FileToTransfer file = m_setup.m_files.at(m_currentIndex);
|
2022-05-16 17:24:36 +02:00
|
|
|
const FileToTransfer fixedFile = fixLocalFileOnWindows(file, options);
|
2022-05-17 00:04:48 +02:00
|
|
|
const auto fixedPaths = fixPaths(fixedFile, userAtHost());
|
2022-05-12 12:32:55 +02:00
|
|
|
|
2022-05-17 00:04:48 +02:00
|
|
|
options << fixedPaths.first << fixedPaths.second;
|
2022-05-16 17:24:36 +02:00
|
|
|
} else { // TestRun
|
2022-05-17 00:04:48 +02:00
|
|
|
options << "-n" << "--exclude=*" << (userAtHost() + ":/tmp");
|
2022-05-16 17:24:36 +02:00
|
|
|
}
|
2022-05-12 12:32:55 +02:00
|
|
|
// TODO: Get rsync location from settings?
|
2022-05-17 00:04:48 +02:00
|
|
|
process().setCommand(CommandLine("rsync", options));
|
|
|
|
process().start();
|
2022-05-12 12:32:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// On Windows, rsync is either from msys or cygwin. Neither work with the other's ssh.exe.
|
2022-05-19 22:40:37 +02:00
|
|
|
FileToTransfer fixLocalFileOnWindows(const FileToTransfer &file, const QStringList &options) const
|
2022-05-12 12:32:55 +02:00
|
|
|
{
|
|
|
|
if (!HostOsInfo::isWindowsHost())
|
|
|
|
return file;
|
|
|
|
|
2022-05-20 17:53:20 +02:00
|
|
|
QString localFilePath = direction() == FileTransferDirection::Upload
|
2022-05-12 12:32:55 +02:00
|
|
|
? file.m_source.path() : file.m_target.path();
|
|
|
|
localFilePath = '/' + localFilePath.at(0) + localFilePath.mid(2);
|
|
|
|
if (anyOf(options, [](const QString &opt) {
|
|
|
|
return opt.contains("cygwin", Qt::CaseInsensitive); })) {
|
|
|
|
localFilePath.prepend("/cygdrive");
|
|
|
|
}
|
|
|
|
|
|
|
|
FileToTransfer fixedFile = file;
|
2022-08-04 15:00:24 +02:00
|
|
|
if (direction() == FileTransferDirection::Upload)
|
|
|
|
fixedFile.m_source = fixedFile.m_source.withNewPath(localFilePath);
|
|
|
|
else
|
|
|
|
fixedFile.m_target = fixedFile.m_target.withNewPath(localFilePath);
|
2022-05-12 12:32:55 +02:00
|
|
|
return fixedFile;
|
|
|
|
}
|
|
|
|
|
2022-05-19 22:40:37 +02:00
|
|
|
QPair<QString, QString> fixPaths(const FileToTransfer &file, const QString &remoteHost) const
|
2022-05-12 12:32:55 +02:00
|
|
|
{
|
|
|
|
FilePath localPath;
|
|
|
|
FilePath remotePath;
|
2022-05-20 17:53:20 +02:00
|
|
|
if (direction() == FileTransferDirection::Upload) {
|
2022-05-12 12:32:55 +02:00
|
|
|
localPath = file.m_source;
|
|
|
|
remotePath = file.m_target;
|
|
|
|
} else {
|
|
|
|
remotePath = file.m_source;
|
|
|
|
localPath = file.m_target;
|
|
|
|
}
|
|
|
|
const QString local = (localPath.isDir() && localPath.path().back() != '/')
|
|
|
|
? localPath.path() + '/' : localPath.path();
|
|
|
|
const QString remote = remoteHost + ':' + remotePath.path();
|
|
|
|
|
2022-05-20 17:53:20 +02:00
|
|
|
return direction() == FileTransferDirection::Upload ? qMakePair(local, remote)
|
|
|
|
: qMakePair(remote, local);
|
2022-05-12 12:32:55 +02:00
|
|
|
}
|
2022-05-11 19:23:43 +02:00
|
|
|
|
2022-05-12 12:32:55 +02:00
|
|
|
int m_currentIndex = 0;
|
2022-05-11 19:23:43 +02:00
|
|
|
};
|
|
|
|
|
2022-10-14 10:06:21 +02:00
|
|
|
class GenericTransferImpl : public FileTransferInterface
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
GenericTransferImpl(const FileTransferSetupData &setup, LinuxDevicePrivate *)
|
|
|
|
: FileTransferInterface(setup)
|
|
|
|
{}
|
|
|
|
|
|
|
|
private:
|
|
|
|
void start() final
|
|
|
|
{
|
|
|
|
m_fileCount = m_setup.m_files.size();
|
|
|
|
m_currentIndex = 0;
|
|
|
|
m_checkedDirectories.clear();
|
|
|
|
nextFile();
|
|
|
|
}
|
|
|
|
|
|
|
|
void nextFile()
|
|
|
|
{
|
|
|
|
ProcessResultData result;
|
|
|
|
if (m_currentIndex >= m_fileCount) {
|
|
|
|
emit done(result);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
const FileToTransfer &file = m_setup.m_files.at(m_currentIndex);
|
|
|
|
const FilePath &source = file.m_source;
|
|
|
|
const FilePath &target = file.m_target;
|
|
|
|
++m_currentIndex;
|
|
|
|
|
|
|
|
const FilePath targetDir = target.parentDir();
|
|
|
|
if (!m_checkedDirectories.contains(targetDir)) {
|
|
|
|
emit progress(tr("Creating directory: %1")
|
|
|
|
.arg(targetDir.toUserOutput()));
|
|
|
|
if (!targetDir.ensureWritableDir()) {
|
|
|
|
result.m_errorString = tr("Failed.");
|
|
|
|
result.m_exitCode = -1; // Random pick
|
|
|
|
emit done(result);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
m_checkedDirectories.insert(targetDir);
|
|
|
|
}
|
|
|
|
|
|
|
|
emit progress(tr("Copying %1/%2: %3 -> %4")
|
|
|
|
.arg(m_currentIndex).arg(m_fileCount).arg(source.toUserOutput(), target.toUserOutput()));
|
|
|
|
if (!source.copyFile(target)) {
|
|
|
|
result.m_errorString = tr("Failed.");
|
|
|
|
result.m_exitCode = -1; // Random pick
|
|
|
|
emit done(result);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// FIXME: Use asyncCopyFile instead
|
|
|
|
nextFile();
|
|
|
|
}
|
|
|
|
|
|
|
|
int m_currentIndex = 0;
|
|
|
|
int m_fileCount = 0;
|
|
|
|
QSet<FilePath> m_checkedDirectories;
|
|
|
|
};
|
|
|
|
|
2022-05-20 17:53:20 +02:00
|
|
|
FileTransferInterface *LinuxDevice::createFileTransferInterface(
|
|
|
|
const FileTransferSetupData &setup) const
|
2022-05-11 19:23:43 +02:00
|
|
|
{
|
2022-05-20 17:53:20 +02:00
|
|
|
switch (setup.m_method) {
|
|
|
|
case FileTransferMethod::Sftp: return new SftpTransferImpl(setup, d);
|
|
|
|
case FileTransferMethod::Rsync: return new RsyncTransferImpl(setup, d);
|
2022-10-14 10:06:21 +02:00
|
|
|
case FileTransferMethod::GenericCopy: return new GenericTransferImpl(setup, d);
|
2022-05-16 20:07:57 +02:00
|
|
|
}
|
|
|
|
QTC_CHECK(false);
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
|
2019-02-20 19:13:28 +01:00
|
|
|
namespace Internal {
|
|
|
|
|
|
|
|
// Factory
|
|
|
|
|
|
|
|
LinuxDeviceFactory::LinuxDeviceFactory()
|
|
|
|
: IDeviceFactory(Constants::GenericLinuxOsType)
|
|
|
|
{
|
2022-07-15 12:20:23 +02:00
|
|
|
setDisplayName(Tr::tr("Remote Linux Device"));
|
2019-02-20 19:13:28 +01:00
|
|
|
setIcon(QIcon());
|
|
|
|
setConstructionFunction(&LinuxDevice::create);
|
2022-01-26 09:05:35 +01:00
|
|
|
setCreator([] {
|
|
|
|
GenericLinuxDeviceConfigurationWizard wizard(Core::ICore::dialogParent());
|
|
|
|
if (wizard.exec() != QDialog::Accepted)
|
|
|
|
return IDevice::Ptr();
|
|
|
|
return wizard.device();
|
|
|
|
});
|
2019-02-20 19:13:28 +01:00
|
|
|
}
|
|
|
|
|
2022-01-26 09:05:35 +01:00
|
|
|
} // namespace Internal
|
2011-05-31 12:47:53 +02:00
|
|
|
} // namespace RemoteLinux
|
2022-02-14 18:37:56 +01:00
|
|
|
|
|
|
|
#include "linuxdevice.moc"
|