2010-07-12 09:33:22 +02:00
|
|
|
/**************************************************************************
|
|
|
|
|
**
|
|
|
|
|
** This file is part of Qt Creator
|
|
|
|
|
**
|
2011-01-11 16:28:15 +01:00
|
|
|
** Copyright (c) 2011 Nokia Corporation and/or its subsidiary(-ies).
|
2010-07-12 09:33:22 +02:00
|
|
|
**
|
2011-04-13 08:42:33 +02:00
|
|
|
** Contact: Nokia Corporation (info@qt.nokia.com)
|
2010-07-12 09:33:22 +02:00
|
|
|
**
|
|
|
|
|
**
|
|
|
|
|
** GNU Lesser General Public License Usage
|
|
|
|
|
**
|
2011-04-13 08:42:33 +02:00
|
|
|
** This file may be used under the terms of the GNU Lesser General Public
|
|
|
|
|
** License version 2.1 as published by the Free Software Foundation and
|
|
|
|
|
** appearing in the file LICENSE.LGPL included in the packaging of this file.
|
|
|
|
|
** Please review the following information to ensure the GNU Lesser General
|
|
|
|
|
** Public License version 2.1 requirements will be met:
|
|
|
|
|
** http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html.
|
2010-07-12 09:33:22 +02:00
|
|
|
**
|
2010-12-17 16:01:08 +01:00
|
|
|
** In addition, as a special exception, Nokia gives you certain additional
|
2011-04-13 08:42:33 +02:00
|
|
|
** rights. These rights are described in the Nokia Qt LGPL Exception
|
2010-12-17 16:01:08 +01:00
|
|
|
** version 1.1, included in the file LGPL_EXCEPTION.txt in this package.
|
|
|
|
|
**
|
2011-04-13 08:42:33 +02:00
|
|
|
** Other Usage
|
|
|
|
|
**
|
|
|
|
|
** Alternatively, this file may be used in accordance with the terms and
|
|
|
|
|
** conditions contained in a signed written agreement between you and Nokia.
|
|
|
|
|
**
|
2010-12-17 16:01:08 +01:00
|
|
|
** If you have questions regarding the use of this file, please contact
|
2011-05-06 15:05:37 +02:00
|
|
|
** Nokia at info@qt.nokia.com.
|
2010-07-12 09:33:22 +02:00
|
|
|
**
|
|
|
|
|
**************************************************************************/
|
|
|
|
|
|
|
|
|
|
#include "sshremoteprocess.h"
|
|
|
|
|
#include "sshremoteprocess_p.h"
|
|
|
|
|
|
|
|
|
|
#include "sshincomingpacket_p.h"
|
|
|
|
|
#include "sshsendfacility_p.h"
|
|
|
|
|
|
|
|
|
|
#include <botan/exceptn.h>
|
|
|
|
|
|
2011-04-01 10:08:09 +02:00
|
|
|
#include <utils/qtcassert.h>
|
|
|
|
|
|
2010-08-17 09:22:43 +02:00
|
|
|
#include <QtCore/QTimer>
|
|
|
|
|
|
2011-03-02 17:13:33 +01:00
|
|
|
/*!
|
2011-03-28 14:58:12 +02:00
|
|
|
\class Utils::SshRemoteProcess
|
2011-03-02 17:13:33 +01:00
|
|
|
|
|
|
|
|
\brief This class implements an SSH channel for running a remote process.
|
|
|
|
|
|
|
|
|
|
Objects are created via SshConnection::createRemoteProcess.
|
|
|
|
|
The process is started via the start() member function.
|
|
|
|
|
A closeChannel() function is provided, but rarely useful, because
|
|
|
|
|
|
|
|
|
|
\list
|
|
|
|
|
\i a) when the process ends, the channel is closed automatically, and
|
|
|
|
|
\i b) closing a channel will not necessarily kill the remote process.
|
|
|
|
|
\endlist
|
|
|
|
|
|
|
|
|
|
Therefore, the only sensible use case for calling closeChannel() is to
|
|
|
|
|
get rid of an SshRemoteProces object before the process is actually started.
|
2011-04-01 10:08:09 +02:00
|
|
|
If the process needs a pseudo terminal, you can request one
|
|
|
|
|
via requestTerminal() before calling start().
|
2011-03-02 17:13:33 +01:00
|
|
|
*/
|
|
|
|
|
|
2011-02-14 16:34:17 +01:00
|
|
|
namespace Utils {
|
2010-07-12 09:33:22 +02:00
|
|
|
|
|
|
|
|
const QByteArray SshRemoteProcess::AbrtSignal("ABRT");
|
|
|
|
|
const QByteArray SshRemoteProcess::AlrmSignal("ALRM");
|
|
|
|
|
const QByteArray SshRemoteProcess::FpeSignal("FPE");
|
|
|
|
|
const QByteArray SshRemoteProcess::HupSignal("HUP");
|
|
|
|
|
const QByteArray SshRemoteProcess::IllSignal("ILL");
|
|
|
|
|
const QByteArray SshRemoteProcess::IntSignal("INT");
|
|
|
|
|
const QByteArray SshRemoteProcess::KillSignal("KILL");
|
|
|
|
|
const QByteArray SshRemoteProcess::PipeSignal("PIPE");
|
|
|
|
|
const QByteArray SshRemoteProcess::QuitSignal("QUIT");
|
|
|
|
|
const QByteArray SshRemoteProcess::SegvSignal("SEGV");
|
|
|
|
|
const QByteArray SshRemoteProcess::TermSignal("TERM");
|
|
|
|
|
const QByteArray SshRemoteProcess::Usr1Signal("USR1");
|
|
|
|
|
const QByteArray SshRemoteProcess::Usr2Signal("USR2");
|
|
|
|
|
|
|
|
|
|
SshRemoteProcess::SshRemoteProcess(const QByteArray &command, quint32 channelId,
|
|
|
|
|
Internal::SshSendFacility &sendFacility)
|
|
|
|
|
: d(new Internal::SshRemoteProcessPrivate(command, channelId, sendFacility, this))
|
|
|
|
|
{
|
2010-08-17 12:37:41 +02:00
|
|
|
connect(d, SIGNAL(started()), this, SIGNAL(started()),
|
|
|
|
|
Qt::QueuedConnection);
|
|
|
|
|
connect(d, SIGNAL(outputAvailable(QByteArray)), this,
|
|
|
|
|
SIGNAL(outputAvailable(QByteArray)), Qt::QueuedConnection);
|
|
|
|
|
connect(d, SIGNAL(errorOutputAvailable(QByteArray)), this,
|
|
|
|
|
SIGNAL(errorOutputAvailable(QByteArray)), Qt::QueuedConnection);
|
|
|
|
|
connect(d, SIGNAL(closed(int)), this, SIGNAL(closed(int)),
|
|
|
|
|
Qt::QueuedConnection);
|
2010-07-12 09:33:22 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
SshRemoteProcess::~SshRemoteProcess()
|
|
|
|
|
{
|
|
|
|
|
Q_ASSERT(d->channelState() == Internal::SshRemoteProcessPrivate::Inactive
|
|
|
|
|
|| d->channelState() == Internal::SshRemoteProcessPrivate::CloseRequested
|
|
|
|
|
|| d->channelState() == Internal::SshRemoteProcessPrivate::Closed);
|
|
|
|
|
delete d;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void SshRemoteProcess::addToEnvironment(const QByteArray &var, const QByteArray &value)
|
|
|
|
|
{
|
|
|
|
|
if (d->channelState() == Internal::SshRemoteProcessPrivate::Inactive)
|
|
|
|
|
d->m_env << qMakePair(var, value); // Cached locally and sent on start()
|
|
|
|
|
}
|
|
|
|
|
|
2011-04-01 10:08:09 +02:00
|
|
|
void SshRemoteProcess::requestTerminal(const SshPseudoTerminal &terminal)
|
|
|
|
|
{
|
|
|
|
|
QTC_ASSERT(d->channelState() == Internal::SshRemoteProcessPrivate::Inactive, return);
|
|
|
|
|
d->m_useTerminal = true;
|
|
|
|
|
d->m_terminal = terminal;
|
|
|
|
|
}
|
|
|
|
|
|
2010-07-12 09:33:22 +02:00
|
|
|
void SshRemoteProcess::start()
|
|
|
|
|
{
|
|
|
|
|
if (d->channelState() == Internal::SshRemoteProcessPrivate::Inactive) {
|
|
|
|
|
#ifdef CREATOR_SSH_DEBUG
|
|
|
|
|
qDebug("process start requested, channel id = %u", d->localChannelId());
|
|
|
|
|
#endif
|
|
|
|
|
d->requestSessionStart();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void SshRemoteProcess::sendSignal(const QByteArray &signal)
|
|
|
|
|
{
|
|
|
|
|
try {
|
|
|
|
|
if (isRunning())
|
|
|
|
|
d->m_sendFacility.sendChannelSignalPacket(d->remoteChannel(),
|
|
|
|
|
signal);
|
|
|
|
|
} catch (Botan::Exception &e) {
|
|
|
|
|
d->setError(QString::fromAscii(e.what()));
|
|
|
|
|
d->closeChannel();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void SshRemoteProcess::closeChannel()
|
|
|
|
|
{
|
|
|
|
|
d->closeChannel();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void SshRemoteProcess::sendInput(const QByteArray &data)
|
|
|
|
|
{
|
|
|
|
|
if (isRunning())
|
|
|
|
|
d->sendData(data);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool SshRemoteProcess::isRunning() const
|
|
|
|
|
{
|
|
|
|
|
return d->m_procState == Internal::SshRemoteProcessPrivate::Running;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
QString SshRemoteProcess::errorString() const { return d->errorString(); }
|
|
|
|
|
|
|
|
|
|
int SshRemoteProcess::exitCode() const { return d->m_exitCode; }
|
|
|
|
|
|
|
|
|
|
QByteArray SshRemoteProcess::exitSignal() const { return d->m_signal; }
|
|
|
|
|
|
|
|
|
|
namespace Internal {
|
|
|
|
|
|
|
|
|
|
SshRemoteProcessPrivate::SshRemoteProcessPrivate(const QByteArray &command,
|
|
|
|
|
quint32 channelId, SshSendFacility &sendFacility, SshRemoteProcess *proc)
|
|
|
|
|
: AbstractSshChannel(channelId, sendFacility), m_procState(NotYetStarted),
|
2011-04-01 10:08:09 +02:00
|
|
|
m_wasRunning(false), m_exitCode(0), m_command(command),
|
|
|
|
|
m_useTerminal(false), m_proc(proc)
|
2010-07-12 09:33:22 +02:00
|
|
|
{
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void SshRemoteProcessPrivate::setProcState(ProcessState newState)
|
|
|
|
|
{
|
|
|
|
|
#ifdef CREATOR_SSH_DEBUG
|
|
|
|
|
qDebug("channel: old state = %d,new state = %d", m_procState, newState);
|
|
|
|
|
#endif
|
|
|
|
|
m_procState = newState;
|
|
|
|
|
if (newState == StartFailed) {
|
2010-08-17 12:37:41 +02:00
|
|
|
emit closed(SshRemoteProcess::FailedToStart);
|
2010-07-12 09:33:22 +02:00
|
|
|
} else if (newState == Running) {
|
|
|
|
|
m_wasRunning = true;
|
2010-08-17 12:37:41 +02:00
|
|
|
emit started();
|
2010-07-12 09:33:22 +02:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void SshRemoteProcessPrivate::closeHook()
|
|
|
|
|
{
|
|
|
|
|
if (m_wasRunning) {
|
|
|
|
|
if (!m_signal.isEmpty())
|
2010-08-17 12:37:41 +02:00
|
|
|
emit closed(SshRemoteProcess::KilledBySignal);
|
2010-07-12 09:33:22 +02:00
|
|
|
else
|
2010-08-17 12:37:41 +02:00
|
|
|
emit closed(SshRemoteProcess::ExitedNormally);
|
2010-07-12 09:33:22 +02:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void SshRemoteProcessPrivate::handleOpenSuccessInternal()
|
|
|
|
|
{
|
|
|
|
|
foreach (const EnvVar &envVar, m_env) {
|
|
|
|
|
m_sendFacility.sendEnvPacket(remoteChannel(), envVar.first,
|
|
|
|
|
envVar.second);
|
|
|
|
|
}
|
|
|
|
|
|
2011-04-06 10:26:45 +02:00
|
|
|
if (m_useTerminal)
|
|
|
|
|
m_sendFacility.sendPtyRequestPacket(remoteChannel(), m_terminal);
|
2011-04-01 10:08:09 +02:00
|
|
|
|
2010-07-12 09:33:22 +02:00
|
|
|
m_sendFacility.sendExecPacket(remoteChannel(), m_command);
|
|
|
|
|
setProcState(ExecRequested);
|
2010-08-17 09:22:43 +02:00
|
|
|
m_timeoutTimer->start(ReplyTimeout);
|
2010-07-12 09:33:22 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void SshRemoteProcessPrivate::handleOpenFailureInternal()
|
|
|
|
|
{
|
|
|
|
|
setProcState(StartFailed);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void SshRemoteProcessPrivate::handleChannelSuccess()
|
|
|
|
|
{
|
|
|
|
|
if (m_procState != ExecRequested) {
|
|
|
|
|
throw SSH_SERVER_EXCEPTION(SSH_DISCONNECT_PROTOCOL_ERROR,
|
|
|
|
|
"Unexpected SSH_MSG_CHANNEL_SUCCESS message.");
|
|
|
|
|
}
|
2010-08-17 09:22:43 +02:00
|
|
|
m_timeoutTimer->stop();
|
2010-07-12 09:33:22 +02:00
|
|
|
setProcState(Running);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void SshRemoteProcessPrivate::handleChannelFailure()
|
|
|
|
|
{
|
|
|
|
|
if (m_procState != ExecRequested) {
|
|
|
|
|
throw SSH_SERVER_EXCEPTION(SSH_DISCONNECT_PROTOCOL_ERROR,
|
|
|
|
|
"Unexpected SSH_MSG_CHANNEL_FAILURE message.");
|
|
|
|
|
}
|
2010-08-17 09:22:43 +02:00
|
|
|
m_timeoutTimer->stop();
|
2010-07-12 09:33:22 +02:00
|
|
|
setProcState(StartFailed);
|
|
|
|
|
closeChannel();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void SshRemoteProcessPrivate::handleChannelDataInternal(const QByteArray &data)
|
|
|
|
|
{
|
2010-08-17 12:37:41 +02:00
|
|
|
emit outputAvailable(data);
|
2010-07-12 09:33:22 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void SshRemoteProcessPrivate::handleChannelExtendedDataInternal(quint32 type,
|
|
|
|
|
const QByteArray &data)
|
|
|
|
|
{
|
|
|
|
|
if (type != SSH_EXTENDED_DATA_STDERR)
|
|
|
|
|
qWarning("Unknown extended data type %u", type);
|
|
|
|
|
else
|
2010-08-17 12:37:41 +02:00
|
|
|
emit errorOutputAvailable(data);
|
2010-07-12 09:33:22 +02:00
|
|
|
}
|
|
|
|
|
|
2010-08-19 15:30:54 +02:00
|
|
|
void SshRemoteProcessPrivate::handleExitStatus(const SshChannelExitStatus &exitStatus)
|
2010-07-12 09:33:22 +02:00
|
|
|
{
|
|
|
|
|
#ifdef CREATOR_SSH_DEBUG
|
2010-08-19 15:30:54 +02:00
|
|
|
qDebug("Process exiting with exit code %d", exitStatus.exitStatus);
|
2010-07-12 09:33:22 +02:00
|
|
|
#endif
|
2010-08-19 15:30:54 +02:00
|
|
|
m_exitCode = exitStatus.exitStatus;
|
|
|
|
|
m_procState = Exited;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void SshRemoteProcessPrivate::handleExitSignal(const SshChannelExitSignal &signal)
|
|
|
|
|
{
|
2010-07-12 09:33:22 +02:00
|
|
|
#ifdef CREATOR_SSH_DEBUG
|
2010-08-19 15:30:54 +02:00
|
|
|
qDebug("Exit due to signal %s", signal.signal.data());
|
2010-07-12 09:33:22 +02:00
|
|
|
#endif
|
2010-08-19 15:30:54 +02:00
|
|
|
setError(signal.error);
|
|
|
|
|
m_signal = signal.signal;
|
|
|
|
|
m_procState = Exited;
|
2010-07-12 09:33:22 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
} // namespace Internal
|
2011-02-14 16:34:17 +01:00
|
|
|
} // namespace Utils
|