Index: third_party/twisted_8_1/twisted/conch/scripts/conch.py |
diff --git a/third_party/twisted_8_1/twisted/conch/scripts/conch.py b/third_party/twisted_8_1/twisted/conch/scripts/conch.py |
deleted file mode 100644 |
index cc7b8033cc5f5c2c73896a072f96907baf64e64e..0000000000000000000000000000000000000000 |
--- a/third_party/twisted_8_1/twisted/conch/scripts/conch.py |
+++ /dev/null |
@@ -1,525 +0,0 @@ |
-# -*- test-case-name: twisted.conch.test.test_conch -*- |
-# |
-# Copyright (c) 2001-2004 Twisted Matrix Laboratories. |
-# See LICENSE for details. |
- |
-# |
-# $Id: conch.py,v 1.65 2004/03/11 00:29:14 z3p Exp $ |
- |
-#""" Implementation module for the `conch` command. |
-#""" |
-from twisted.conch.client import agent, connect, default, options |
-from twisted.conch.error import ConchError |
-from twisted.conch.ssh import connection, common |
-from twisted.conch.ssh import session, forwarding, channel |
-from twisted.internet import reactor, stdio, defer, task |
-from twisted.python import log, usage |
- |
-import os, sys, getpass, struct, tty, fcntl, base64, signal, stat, errno |
- |
-class ClientOptions(options.ConchOptions): |
- |
- synopsis = """Usage: conch [options] host [command] |
-""" |
- |
- optParameters = [['escape', 'e', '~'], |
- ['localforward', 'L', None, 'listen-port:host:port Forward local port to remote address'], |
- ['remoteforward', 'R', None, 'listen-port:host:port Forward remote port to local address'], |
- ] |
- |
- optFlags = [['null', 'n', 'Redirect input from /dev/null.'], |
- ['fork', 'f', 'Fork to background after authentication.'], |
- ['tty', 't', 'Tty; allocate a tty even if command is given.'], |
- ['notty', 'T', 'Do not allocate a tty.'], |
- ['noshell', 'N', 'Do not execute a shell or command.'], |
- ['subsystem', 's', 'Invoke command (mandatory) as SSH2 subsystem.'], |
- ] |
- |
- #zsh_altArgDescr = {"foo":"use this description for foo instead"} |
- #zsh_multiUse = ["foo", "bar"] |
- #zsh_mutuallyExclusive = [("foo", "bar"), ("bar", "baz")] |
- #zsh_actions = {"foo":'_files -g "*.foo"', "bar":"(one two three)"} |
- zsh_actionDescr = {"localforward":"listen-port:host:port", |
- "remoteforward":"listen-port:host:port"} |
- zsh_extras = ["*:command: "] |
- |
- localForwards = [] |
- remoteForwards = [] |
- |
- def opt_escape(self, esc): |
- "Set escape character; ``none'' = disable" |
- if esc == 'none': |
- self['escape'] = None |
- elif esc[0] == '^' and len(esc) == 2: |
- self['escape'] = chr(ord(esc[1])-64) |
- elif len(esc) == 1: |
- self['escape'] = esc |
- else: |
- sys.exit("Bad escape character '%s'." % esc) |
- |
- def opt_localforward(self, f): |
- "Forward local port to remote address (lport:host:port)" |
- localPort, remoteHost, remotePort = f.split(':') # doesn't do v6 yet |
- localPort = int(localPort) |
- remotePort = int(remotePort) |
- self.localForwards.append((localPort, (remoteHost, remotePort))) |
- |
- def opt_remoteforward(self, f): |
- """Forward remote port to local address (rport:host:port)""" |
- remotePort, connHost, connPort = f.split(':') # doesn't do v6 yet |
- remotePort = int(remotePort) |
- connPort = int(connPort) |
- self.remoteForwards.append((remotePort, (connHost, connPort))) |
- |
- def parseArgs(self, host, *command): |
- self['host'] = host |
- self['command'] = ' '.join(command) |
- |
-# Rest of code in "run" |
-options = None |
-conn = None |
-exitStatus = 0 |
-old = None |
-_inRawMode = 0 |
-_savedRawMode = None |
- |
-def run(): |
- global options, old |
- args = sys.argv[1:] |
- if '-l' in args: # cvs is an idiot |
- i = args.index('-l') |
- args = args[i:i+2]+args |
- del args[i+2:i+4] |
- for arg in args[:]: |
- try: |
- i = args.index(arg) |
- if arg[:2] == '-o' and args[i+1][0]!='-': |
- args[i:i+2] = [] # suck on it scp |
- except ValueError: |
- pass |
- options = ClientOptions() |
- try: |
- options.parseOptions(args) |
- except usage.UsageError, u: |
- print 'ERROR: %s' % u |
- options.opt_help() |
- sys.exit(1) |
- if options['log']: |
- if options['logfile']: |
- if options['logfile'] == '-': |
- f = sys.stdout |
- else: |
- f = file(options['logfile'], 'a+') |
- else: |
- f = sys.stderr |
- realout = sys.stdout |
- log.startLogging(f) |
- sys.stdout = realout |
- else: |
- log.discardLogs() |
- doConnect() |
- fd = sys.stdin.fileno() |
- try: |
- old = tty.tcgetattr(fd) |
- except: |
- old = None |
- try: |
- oldUSR1 = signal.signal(signal.SIGUSR1, lambda *a: reactor.callLater(0, reConnect)) |
- except: |
- oldUSR1 = None |
- try: |
- reactor.run() |
- finally: |
- if old: |
- tty.tcsetattr(fd, tty.TCSANOW, old) |
- if oldUSR1: |
- signal.signal(signal.SIGUSR1, oldUSR1) |
- if (options['command'] and options['tty']) or not options['notty']: |
- signal.signal(signal.SIGWINCH, signal.SIG_DFL) |
- if sys.stdout.isatty() and not options['command']: |
- print 'Connection to %s closed.' % options['host'] |
- sys.exit(exitStatus) |
- |
-def handleError(): |
- from twisted.python import failure |
- global exitStatus |
- exitStatus = 2 |
- reactor.callLater(0.01, _stopReactor) |
- log.err(failure.Failure()) |
- raise |
- |
-def _stopReactor(): |
- try: |
- reactor.stop() |
- except: pass |
- |
-def doConnect(): |
-# log.deferr = handleError # HACK |
- if '@' in options['host']: |
- options['user'], options['host'] = options['host'].split('@',1) |
- if not options.identitys: |
- options.identitys = ['~/.ssh/id_rsa', '~/.ssh/id_dsa'] |
- host = options['host'] |
- if not options['user']: |
- options['user'] = getpass.getuser() |
- if not options['port']: |
- options['port'] = 22 |
- else: |
- options['port'] = int(options['port']) |
- host = options['host'] |
- port = options['port'] |
- vhk = default.verifyHostKey |
- uao = default.SSHUserAuthClient(options['user'], options, SSHConnection()) |
- connect.connect(host, port, options, vhk, uao).addErrback(_ebExit) |
- |
-def _ebExit(f): |
- global exitStatus |
- if hasattr(f.value, 'value'): |
- s = f.value.value |
- else: |
- s = str(f) |
- exitStatus = "conch: exiting with error %s" % f |
- reactor.callLater(0.1, _stopReactor) |
- |
-def onConnect(): |
-# if keyAgent and options['agent']: |
-# cc = protocol.ClientCreator(reactor, SSHAgentForwardingLocal, conn) |
-# cc.connectUNIX(os.environ['SSH_AUTH_SOCK']) |
- if hasattr(conn.transport, 'sendIgnore'): |
- _KeepAlive(conn) |
- if options.localForwards: |
- for localPort, hostport in options.localForwards: |
- s = reactor.listenTCP(localPort, |
- forwarding.SSHListenForwardingFactory(conn, |
- hostport, |
- SSHListenClientForwardingChannel)) |
- conn.localForwards.append(s) |
- if options.remoteForwards: |
- for remotePort, hostport in options.remoteForwards: |
- log.msg('asking for remote forwarding for %s:%s' % |
- (remotePort, hostport)) |
- conn.requestRemoteForwarding(remotePort, hostport) |
- reactor.addSystemEventTrigger('before', 'shutdown', beforeShutdown) |
- if not options['noshell'] or options['agent']: |
- conn.openChannel(SSHSession()) |
- if options['fork']: |
- if os.fork(): |
- os._exit(0) |
- os.setsid() |
- for i in range(3): |
- try: |
- os.close(i) |
- except OSError, e: |
- import errno |
- if e.errno != errno.EBADF: |
- raise |
- |
-def reConnect(): |
- beforeShutdown() |
- conn.transport.transport.loseConnection() |
- |
-def beforeShutdown(): |
- remoteForwards = options.remoteForwards |
- for remotePort, hostport in remoteForwards: |
- log.msg('cancelling %s:%s' % (remotePort, hostport)) |
- conn.cancelRemoteForwarding(remotePort) |
- |
-def stopConnection(): |
- if not options['reconnect']: |
- reactor.callLater(0.1, _stopReactor) |
- |
-class _KeepAlive: |
- |
- def __init__(self, conn): |
- self.conn = conn |
- self.globalTimeout = None |
- self.lc = task.LoopingCall(self.sendGlobal) |
- self.lc.start(300) |
- |
- def sendGlobal(self): |
- d = self.conn.sendGlobalRequest("conch-keep-alive@twistedmatrix.com", |
- "", wantReply = 1) |
- d.addBoth(self._cbGlobal) |
- self.globalTimeout = reactor.callLater(30, self._ebGlobal) |
- |
- def _cbGlobal(self, res): |
- if self.globalTimeout: |
- self.globalTimeout.cancel() |
- self.globalTimeout = None |
- |
- def _ebGlobal(self): |
- if self.globalTimeout: |
- self.globalTimeout = None |
- self.conn.transport.loseConnection() |
- |
-class SSHConnection(connection.SSHConnection): |
- def serviceStarted(self): |
- global conn |
- conn = self |
- self.localForwards = [] |
- self.remoteForwards = {} |
- if not isinstance(self, connection.SSHConnection): |
- # make these fall through |
- del self.__class__.requestRemoteForwarding |
- del self.__class__.cancelRemoteForwarding |
- onConnect() |
- |
- def serviceStopped(self): |
- lf = self.localForwards |
- self.localForwards = [] |
- for s in lf: |
- s.loseConnection() |
- stopConnection() |
- |
- def requestRemoteForwarding(self, remotePort, hostport): |
- data = forwarding.packGlobal_tcpip_forward(('0.0.0.0', remotePort)) |
- d = self.sendGlobalRequest('tcpip-forward', data, |
- wantReply=1) |
- log.msg('requesting remote forwarding %s:%s' %(remotePort, hostport)) |
- d.addCallback(self._cbRemoteForwarding, remotePort, hostport) |
- d.addErrback(self._ebRemoteForwarding, remotePort, hostport) |
- |
- def _cbRemoteForwarding(self, result, remotePort, hostport): |
- log.msg('accepted remote forwarding %s:%s' % (remotePort, hostport)) |
- self.remoteForwards[remotePort] = hostport |
- log.msg(repr(self.remoteForwards)) |
- |
- def _ebRemoteForwarding(self, f, remotePort, hostport): |
- log.msg('remote forwarding %s:%s failed' % (remotePort, hostport)) |
- log.msg(f) |
- |
- def cancelRemoteForwarding(self, remotePort): |
- data = forwarding.packGlobal_tcpip_forward(('0.0.0.0', remotePort)) |
- self.sendGlobalRequest('cancel-tcpip-forward', data) |
- log.msg('cancelling remote forwarding %s' % remotePort) |
- try: |
- del self.remoteForwards[remotePort] |
- except: |
- pass |
- log.msg(repr(self.remoteForwards)) |
- |
- def channel_forwarded_tcpip(self, windowSize, maxPacket, data): |
- log.msg('%s %s' % ('FTCP', repr(data))) |
- remoteHP, origHP = forwarding.unpackOpen_forwarded_tcpip(data) |
- log.msg(self.remoteForwards) |
- log.msg(remoteHP) |
- if self.remoteForwards.has_key(remoteHP[1]): |
- connectHP = self.remoteForwards[remoteHP[1]] |
- log.msg('connect forwarding %s' % (connectHP,)) |
- return SSHConnectForwardingChannel(connectHP, |
- remoteWindow = windowSize, |
- remoteMaxPacket = maxPacket, |
- conn = self) |
- else: |
- raise ConchError(connection.OPEN_CONNECT_FAILED, "don't know about that port") |
- |
-# def channel_auth_agent_openssh_com(self, windowSize, maxPacket, data): |
-# if options['agent'] and keyAgent: |
-# return agent.SSHAgentForwardingChannel(remoteWindow = windowSize, |
-# remoteMaxPacket = maxPacket, |
-# conn = self) |
-# else: |
-# return connection.OPEN_CONNECT_FAILED, "don't have an agent" |
- |
- def channelClosed(self, channel): |
- log.msg('connection closing %s' % channel) |
- log.msg(self.channels) |
- if len(self.channels) == 1 and not (options['noshell'] and not options['nocache']): # just us left |
- log.msg('stopping connection') |
- stopConnection() |
- else: |
- # because of the unix thing |
- self.__class__.__bases__[0].channelClosed(self, channel) |
- |
-class SSHSession(channel.SSHChannel): |
- |
- name = 'session' |
- |
- def channelOpen(self, foo): |
- log.msg('session %s open' % self.id) |
- if options['agent']: |
- d = self.conn.sendRequest(self, 'auth-agent-req@openssh.com', '', wantReply=1) |
- d.addBoth(lambda x:log.msg(x)) |
- if options['noshell']: return |
- if (options['command'] and options['tty']) or not options['notty']: |
- _enterRawMode() |
- c = session.SSHSessionClient() |
- if options['escape'] and not options['notty']: |
- self.escapeMode = 1 |
- c.dataReceived = self.handleInput |
- else: |
- c.dataReceived = self.write |
- c.connectionLost = lambda x=None,s=self:s.sendEOF() |
- self.stdio = stdio.StandardIO(c) |
- fd = 0 |
- if options['subsystem']: |
- self.conn.sendRequest(self, 'subsystem', \ |
- common.NS(options['command'])) |
- elif options['command']: |
- if options['tty']: |
- term = os.environ['TERM'] |
- winsz = fcntl.ioctl(fd, tty.TIOCGWINSZ, '12345678') |
- winSize = struct.unpack('4H', winsz) |
- ptyReqData = session.packRequest_pty_req(term, winSize, '') |
- self.conn.sendRequest(self, 'pty-req', ptyReqData) |
- signal.signal(signal.SIGWINCH, self._windowResized) |
- self.conn.sendRequest(self, 'exec', \ |
- common.NS(options['command'])) |
- else: |
- if not options['notty']: |
- term = os.environ['TERM'] |
- winsz = fcntl.ioctl(fd, tty.TIOCGWINSZ, '12345678') |
- winSize = struct.unpack('4H', winsz) |
- ptyReqData = session.packRequest_pty_req(term, winSize, '') |
- self.conn.sendRequest(self, 'pty-req', ptyReqData) |
- signal.signal(signal.SIGWINCH, self._windowResized) |
- self.conn.sendRequest(self, 'shell', '') |
- #if hasattr(conn.transport, 'transport'): |
- # conn.transport.transport.setTcpNoDelay(1) |
- |
- def handleInput(self, char): |
- #log.msg('handling %s' % repr(char)) |
- if char in ('\n', '\r'): |
- self.escapeMode = 1 |
- self.write(char) |
- elif self.escapeMode == 1 and char == options['escape']: |
- self.escapeMode = 2 |
- elif self.escapeMode == 2: |
- self.escapeMode = 1 # so we can chain escapes together |
- if char == '.': # disconnect |
- log.msg('disconnecting from escape') |
- stopConnection() |
- return |
- elif char == '\x1a': # ^Z, suspend |
- def _(): |
- _leaveRawMode() |
- sys.stdout.flush() |
- sys.stdin.flush() |
- os.kill(os.getpid(), signal.SIGTSTP) |
- _enterRawMode() |
- reactor.callLater(0, _) |
- return |
- elif char == 'R': # rekey connection |
- log.msg('rekeying connection') |
- self.conn.transport.sendKexInit() |
- return |
- elif char == '#': # display connections |
- self.stdio.write('\r\nThe following connections are open:\r\n') |
- channels = self.conn.channels.keys() |
- channels.sort() |
- for channelId in channels: |
- self.stdio.write(' #%i %s\r\n' % (channelId, str(self.conn.channels[channelId]))) |
- return |
- self.write('~' + char) |
- else: |
- self.escapeMode = 0 |
- self.write(char) |
- |
- def dataReceived(self, data): |
- self.stdio.write(data) |
- |
- def extReceived(self, t, data): |
- if t==connection.EXTENDED_DATA_STDERR: |
- log.msg('got %s stderr data' % len(data)) |
- sys.stderr.write(data) |
- |
- def eofReceived(self): |
- log.msg('got eof') |
- self.stdio.closeStdin() |
- |
- def closeReceived(self): |
- log.msg('remote side closed %s' % self) |
- self.conn.sendClose(self) |
- |
- def closed(self): |
- global old |
- log.msg('closed %s' % self) |
- log.msg(repr(self.conn.channels)) |
- if not options['nocache']: # fork into the background |
- if os.fork(): |
- if old: |
- fd = sys.stdin.fileno() |
- tty.tcsetattr(fd, tty.TCSANOW, old) |
- if (options['command'] and options['tty']) or \ |
- not options['notty']: |
- signal.signal(signal.SIGWINCH, signal.SIG_DFL) |
- os._exit(0) |
- os.setsid() |
- for i in range(3): |
- try: |
- os.close(i) |
- except OSError, e: |
- import errno |
- if e.errno != errno.EBADF: |
- raise |
- |
- def request_exit_status(self, data): |
- global exitStatus |
- exitStatus = int(struct.unpack('>L', data)[0]) |
- log.msg('exit status: %s' % exitStatus) |
- |
- def sendEOF(self): |
- self.conn.sendEOF(self) |
- |
- def stopWriting(self): |
- self.stdio.pauseProducing() |
- |
- def startWriting(self): |
- self.stdio.resumeProducing() |
- |
- def _windowResized(self, *args): |
- winsz = fcntl.ioctl(0, tty.TIOCGWINSZ, '12345678') |
- winSize = struct.unpack('4H', winsz) |
- newSize = winSize[1], winSize[0], winSize[2], winSize[3] |
- self.conn.sendRequest(self, 'window-change', struct.pack('!4L', *newSize)) |
- |
- |
-class SSHListenClientForwardingChannel(forwarding.SSHListenClientForwardingChannel): pass |
-class SSHConnectForwardingChannel(forwarding.SSHConnectForwardingChannel): pass |
- |
-def _leaveRawMode(): |
- global _inRawMode |
- if not _inRawMode: |
- return |
- fd = sys.stdin.fileno() |
- tty.tcsetattr(fd, tty.TCSANOW, _savedMode) |
- _inRawMode = 0 |
- |
-def _enterRawMode(): |
- global _inRawMode, _savedMode |
- if _inRawMode: |
- return |
- fd = sys.stdin.fileno() |
- try: |
- old = tty.tcgetattr(fd) |
- new = old[:] |
- except: |
- log.msg('not a typewriter!') |
- else: |
- # iflage |
- new[0] = new[0] | tty.IGNPAR |
- new[0] = new[0] & ~(tty.ISTRIP | tty.INLCR | tty.IGNCR | tty.ICRNL | |
- tty.IXON | tty.IXANY | tty.IXOFF) |
- if hasattr(tty, 'IUCLC'): |
- new[0] = new[0] & ~tty.IUCLC |
- |
- # lflag |
- new[3] = new[3] & ~(tty.ISIG | tty.ICANON | tty.ECHO | tty.ECHO | |
- tty.ECHOE | tty.ECHOK | tty.ECHONL) |
- if hasattr(tty, 'IEXTEN'): |
- new[3] = new[3] & ~tty.IEXTEN |
- |
- #oflag |
- new[1] = new[1] & ~tty.OPOST |
- |
- new[6][tty.VMIN] = 1 |
- new[6][tty.VTIME] = 0 |
- |
- _savedMode = old |
- tty.tcsetattr(fd, tty.TCSANOW, new) |
- #tty.setraw(fd) |
- _inRawMode = 1 |
- |
-if __name__ == '__main__': |
- run() |
- |