2009-06-01 22:58:49 +00:00
|
|
|
/* $OpenBSD$ */
|
|
|
|
|
|
|
|
/*
|
2016-01-19 15:59:12 +00:00
|
|
|
* Copyright (c) 2007 Nicholas Marriott <nicholas.marriott@gmail.com>
|
2009-06-01 22:58:49 +00:00
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice appear in all copies.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
|
|
* WHATSOEVER RESULTING FROM LOSS OF MIND, USE, DATA OR PROFITS, WHETHER
|
|
|
|
* IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
|
|
|
|
* OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
2020-01-28 10:44:30 +00:00
|
|
|
#include <sys/utsname.h>
|
2009-06-01 22:58:49 +00:00
|
|
|
|
2015-10-23 16:07:29 +00:00
|
|
|
#include <err.h>
|
2009-06-01 22:58:49 +00:00
|
|
|
#include <errno.h>
|
2009-11-04 20:50:11 +00:00
|
|
|
#include <event.h>
|
2010-10-16 08:42:35 +00:00
|
|
|
#include <fcntl.h>
|
2016-03-05 16:08:38 +00:00
|
|
|
#include <langinfo.h>
|
2013-04-11 21:52:18 +00:00
|
|
|
#include <locale.h>
|
2009-06-01 22:58:49 +00:00
|
|
|
#include <paths.h>
|
|
|
|
#include <pwd.h>
|
2020-04-16 07:28:36 +00:00
|
|
|
#include <signal.h>
|
2009-06-01 22:58:49 +00:00
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
2015-10-27 13:23:24 +00:00
|
|
|
#include <time.h>
|
2009-06-01 22:58:49 +00:00
|
|
|
#include <unistd.h>
|
2017-04-20 17:49:26 +00:00
|
|
|
#include <util.h>
|
2009-06-01 22:58:49 +00:00
|
|
|
|
|
|
|
#include "tmux.h"
|
|
|
|
|
2015-10-27 15:58:42 +00:00
|
|
|
struct options *global_options; /* server options */
|
|
|
|
struct options *global_s_options; /* session options */
|
|
|
|
struct options *global_w_options; /* window options */
|
2015-10-28 09:51:55 +00:00
|
|
|
struct environ *global_environ;
|
2009-06-01 22:58:49 +00:00
|
|
|
|
2015-11-24 21:52:06 +00:00
|
|
|
struct timeval start_time;
|
2015-11-24 22:27:22 +00:00
|
|
|
const char *socket_path;
|
2017-01-23 10:09:43 +00:00
|
|
|
int ptm_fd = -1;
|
2017-07-12 09:21:25 +00:00
|
|
|
const char *shell_command;
|
2010-02-06 18:29:15 +00:00
|
|
|
|
2016-10-10 21:29:23 +00:00
|
|
|
static __dead void usage(void);
|
2018-01-12 10:22:02 +00:00
|
|
|
static char *make_label(const char *, char **);
|
2009-11-04 20:50:11 +00:00
|
|
|
|
2020-03-17 11:10:12 +00:00
|
|
|
static int areshell(const char *);
|
2016-10-11 13:21:59 +00:00
|
|
|
static const char *getshell(void);
|
|
|
|
|
2016-10-10 21:29:23 +00:00
|
|
|
static __dead void
|
2009-06-01 22:58:49 +00:00
|
|
|
usage(void)
|
|
|
|
{
|
2009-06-02 16:53:20 +00:00
|
|
|
fprintf(stderr,
|
2022-11-10 22:58:39 +00:00
|
|
|
"usage: %s [-2CDlNuVv] [-c shell-command] [-f file] [-L socket-name]\n"
|
2020-04-20 13:25:36 +00:00
|
|
|
" [-S socket-path] [-T features] [command [flags]]\n",
|
2016-05-27 17:05:42 +00:00
|
|
|
getprogname());
|
2009-06-01 22:58:49 +00:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
2016-10-11 13:21:59 +00:00
|
|
|
static const char *
|
2009-09-01 13:09:49 +00:00
|
|
|
getshell(void)
|
|
|
|
{
|
|
|
|
struct passwd *pw;
|
|
|
|
const char *shell;
|
|
|
|
|
|
|
|
shell = getenv("SHELL");
|
|
|
|
if (checkshell(shell))
|
|
|
|
return (shell);
|
|
|
|
|
|
|
|
pw = getpwuid(getuid());
|
|
|
|
if (pw != NULL && checkshell(pw->pw_shell))
|
|
|
|
return (pw->pw_shell);
|
|
|
|
|
|
|
|
return (_PATH_BSHELL);
|
|
|
|
}
|
|
|
|
|
2020-03-17 11:10:12 +00:00
|
|
|
int
|
2009-09-01 13:09:49 +00:00
|
|
|
checkshell(const char *shell)
|
|
|
|
{
|
2017-02-16 10:53:25 +00:00
|
|
|
if (shell == NULL || *shell != '/')
|
2011-09-25 18:53:04 +00:00
|
|
|
return (0);
|
|
|
|
if (areshell(shell))
|
2009-09-01 13:09:49 +00:00
|
|
|
return (0);
|
|
|
|
if (access(shell, X_OK) != 0)
|
|
|
|
return (0);
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
2020-03-17 11:10:12 +00:00
|
|
|
static int
|
2009-09-01 13:09:49 +00:00
|
|
|
areshell(const char *shell)
|
|
|
|
{
|
|
|
|
const char *progname, *ptr;
|
|
|
|
|
|
|
|
if ((ptr = strrchr(shell, '/')) != NULL)
|
|
|
|
ptr++;
|
|
|
|
else
|
|
|
|
ptr = shell;
|
2016-05-27 17:05:42 +00:00
|
|
|
progname = getprogname();
|
2009-09-01 13:09:49 +00:00
|
|
|
if (*progname == '-')
|
|
|
|
progname++;
|
|
|
|
if (strcmp(ptr, progname) == 0)
|
|
|
|
return (1);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2020-05-16 14:26:33 +00:00
|
|
|
static char *
|
|
|
|
expand_path(const char *path, const char *home)
|
|
|
|
{
|
|
|
|
char *expanded, *name;
|
|
|
|
const char *end;
|
|
|
|
struct environ_entry *value;
|
|
|
|
|
|
|
|
if (strncmp(path, "~/", 2) == 0) {
|
|
|
|
if (home == NULL)
|
|
|
|
return (NULL);
|
|
|
|
xasprintf(&expanded, "%s%s", home, path + 1);
|
|
|
|
return (expanded);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (*path == '$') {
|
|
|
|
end = strchr(path, '/');
|
|
|
|
if (end == NULL)
|
|
|
|
name = xstrdup(path + 1);
|
|
|
|
else
|
|
|
|
name = xstrndup(path + 1, end - path - 1);
|
|
|
|
value = environ_find(global_environ, name);
|
|
|
|
free(name);
|
|
|
|
if (value == NULL)
|
|
|
|
return (NULL);
|
|
|
|
if (end == NULL)
|
|
|
|
end = "";
|
|
|
|
xasprintf(&expanded, "%s%s", value->value, end);
|
|
|
|
return (expanded);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (xstrdup(path));
|
|
|
|
}
|
|
|
|
|
2021-02-22 08:18:13 +00:00
|
|
|
static void
|
|
|
|
expand_paths(const char *s, char ***paths, u_int *n, int ignore_errors)
|
2020-05-16 14:26:33 +00:00
|
|
|
{
|
|
|
|
const char *home = find_home();
|
|
|
|
char *copy, *next, *tmp, resolved[PATH_MAX], *expanded;
|
2021-02-22 08:18:13 +00:00
|
|
|
char *path;
|
2020-05-16 14:26:33 +00:00
|
|
|
u_int i;
|
|
|
|
|
|
|
|
*paths = NULL;
|
|
|
|
*n = 0;
|
|
|
|
|
|
|
|
copy = tmp = xstrdup(s);
|
|
|
|
while ((next = strsep(&tmp, ":")) != NULL) {
|
|
|
|
expanded = expand_path(next, home);
|
|
|
|
if (expanded == NULL) {
|
|
|
|
log_debug("%s: invalid path: %s", __func__, next);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (realpath(expanded, resolved) == NULL) {
|
|
|
|
log_debug("%s: realpath(\"%s\") failed: %s", __func__,
|
|
|
|
expanded, strerror(errno));
|
2021-02-22 08:18:13 +00:00
|
|
|
if (ignore_errors) {
|
|
|
|
free(expanded);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
path = expanded;
|
|
|
|
} else {
|
|
|
|
path = xstrdup(resolved);
|
2020-05-16 14:26:33 +00:00
|
|
|
free(expanded);
|
|
|
|
}
|
|
|
|
for (i = 0; i < *n; i++) {
|
2021-02-22 08:18:13 +00:00
|
|
|
if (strcmp(path, (*paths)[i]) == 0)
|
2020-05-16 14:26:33 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (i != *n) {
|
2021-02-22 08:18:13 +00:00
|
|
|
log_debug("%s: duplicate path: %s", __func__, path);
|
|
|
|
free(path);
|
2020-05-16 14:26:33 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
*paths = xreallocarray(*paths, (*n) + 1, sizeof *paths);
|
2021-02-22 08:18:13 +00:00
|
|
|
(*paths)[(*n)++] = path;
|
2020-05-16 14:26:33 +00:00
|
|
|
}
|
|
|
|
free(copy);
|
|
|
|
}
|
|
|
|
|
2015-11-24 22:27:22 +00:00
|
|
|
static char *
|
2018-01-12 10:22:02 +00:00
|
|
|
make_label(const char *label, char **cause)
|
2009-06-01 22:58:49 +00:00
|
|
|
{
|
2020-05-16 14:26:33 +00:00
|
|
|
char **paths, *path, *base;
|
|
|
|
u_int i, n;
|
|
|
|
struct stat sb;
|
|
|
|
uid_t uid;
|
2018-01-12 10:22:02 +00:00
|
|
|
|
|
|
|
*cause = NULL;
|
2015-11-24 22:27:22 +00:00
|
|
|
if (label == NULL)
|
|
|
|
label = "default";
|
2009-06-01 22:58:49 +00:00
|
|
|
uid = getuid();
|
2015-11-24 22:27:22 +00:00
|
|
|
|
2021-02-22 08:18:13 +00:00
|
|
|
expand_paths(TMUX_SOCK, &paths, &n, 1);
|
2020-05-16 14:26:33 +00:00
|
|
|
if (n == 0) {
|
|
|
|
xasprintf(cause, "no suitable socket path");
|
|
|
|
return (NULL);
|
2018-01-12 10:22:02 +00:00
|
|
|
}
|
2020-05-16 14:26:33 +00:00
|
|
|
path = paths[0]; /* can only have one socket! */
|
|
|
|
for (i = 1; i < n; i++)
|
|
|
|
free(paths[i]);
|
|
|
|
free(paths);
|
2009-06-01 22:58:49 +00:00
|
|
|
|
2020-05-16 14:26:33 +00:00
|
|
|
xasprintf(&base, "%s/tmux-%ld", path, (long)uid);
|
2021-08-23 11:04:21 +00:00
|
|
|
free(path);
|
2021-07-06 08:26:00 +00:00
|
|
|
if (mkdir(base, S_IRWXU) != 0 && errno != EEXIST) {
|
|
|
|
xasprintf(cause, "couldn't create directory %s (%s)", base,
|
|
|
|
strerror(errno));
|
2018-01-12 10:22:02 +00:00
|
|
|
goto fail;
|
2021-07-06 08:26:00 +00:00
|
|
|
}
|
|
|
|
if (lstat(base, &sb) != 0) {
|
|
|
|
xasprintf(cause, "couldn't read directory %s (%s)", base,
|
|
|
|
strerror(errno));
|
2015-11-24 22:27:22 +00:00
|
|
|
goto fail;
|
2021-07-06 08:26:00 +00:00
|
|
|
}
|
2009-06-01 22:58:49 +00:00
|
|
|
if (!S_ISDIR(sb.st_mode)) {
|
2021-07-06 08:26:00 +00:00
|
|
|
xasprintf(cause, "%s is not a directory", base);
|
2015-11-24 22:27:22 +00:00
|
|
|
goto fail;
|
2009-06-01 22:58:49 +00:00
|
|
|
}
|
2015-01-19 09:58:34 +00:00
|
|
|
if (sb.st_uid != uid || (sb.st_mode & S_IRWXO) != 0) {
|
2021-07-06 08:26:00 +00:00
|
|
|
xasprintf(cause, "directory %s has unsafe permissions", base);
|
2015-11-24 22:27:22 +00:00
|
|
|
goto fail;
|
2009-06-01 22:58:49 +00:00
|
|
|
}
|
2020-05-16 14:26:33 +00:00
|
|
|
xasprintf(&path, "%s/%s", base, label);
|
|
|
|
free(base);
|
2009-06-01 22:58:49 +00:00
|
|
|
return (path);
|
2015-11-24 22:27:22 +00:00
|
|
|
|
|
|
|
fail:
|
2020-05-16 14:26:33 +00:00
|
|
|
free(base);
|
2015-11-24 22:27:22 +00:00
|
|
|
return (NULL);
|
2009-06-01 22:58:49 +00:00
|
|
|
}
|
|
|
|
|
2024-05-15 09:59:12 +00:00
|
|
|
char *
|
|
|
|
shell_argv0(const char *shell, int is_login)
|
|
|
|
{
|
|
|
|
const char *slash, *name;
|
|
|
|
char *argv0;
|
|
|
|
|
|
|
|
slash = strrchr(shell, '/');
|
|
|
|
if (slash != NULL && slash[1] != '\0')
|
|
|
|
name = slash + 1;
|
|
|
|
else
|
|
|
|
name = shell;
|
|
|
|
if (is_login)
|
|
|
|
xasprintf(&argv0, "-%s", name);
|
|
|
|
else
|
|
|
|
xasprintf(&argv0, "%s", name);
|
|
|
|
return (argv0);
|
|
|
|
}
|
|
|
|
|
2011-01-08 01:52:36 +00:00
|
|
|
void
|
|
|
|
setblocking(int fd, int state)
|
|
|
|
{
|
|
|
|
int mode;
|
|
|
|
|
|
|
|
if ((mode = fcntl(fd, F_GETFL)) != -1) {
|
|
|
|
if (!state)
|
|
|
|
mode |= O_NONBLOCK;
|
|
|
|
else
|
|
|
|
mode &= ~O_NONBLOCK;
|
|
|
|
fcntl(fd, F_SETFL, mode);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-02 08:17:27 +00:00
|
|
|
uint64_t
|
|
|
|
get_timer(void)
|
|
|
|
{
|
|
|
|
struct timespec ts;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We want a timestamp in milliseconds suitable for time measurement,
|
|
|
|
* so prefer the monotonic clock.
|
|
|
|
*/
|
|
|
|
if (clock_gettime(CLOCK_MONOTONIC, &ts) != 0)
|
|
|
|
clock_gettime(CLOCK_REALTIME, &ts);
|
|
|
|
return ((ts.tv_sec * 1000ULL) + (ts.tv_nsec / 1000000ULL));
|
|
|
|
}
|
|
|
|
|
2020-04-16 07:28:36 +00:00
|
|
|
const char *
|
|
|
|
sig2name(int signo)
|
|
|
|
{
|
|
|
|
static char s[11];
|
|
|
|
|
|
|
|
if (signo > 0 && signo < NSIG)
|
|
|
|
return (sys_signame[signo]);
|
|
|
|
xsnprintf(s, sizeof s, "%d", signo);
|
|
|
|
return (s);
|
|
|
|
}
|
|
|
|
|
2018-11-22 10:36:40 +00:00
|
|
|
const char *
|
|
|
|
find_cwd(void)
|
|
|
|
{
|
|
|
|
char resolved1[PATH_MAX], resolved2[PATH_MAX];
|
|
|
|
static char cwd[PATH_MAX];
|
|
|
|
const char *pwd;
|
|
|
|
|
|
|
|
if (getcwd(cwd, sizeof cwd) == NULL)
|
|
|
|
return (NULL);
|
|
|
|
if ((pwd = getenv("PWD")) == NULL || *pwd == '\0')
|
|
|
|
return (cwd);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We want to use PWD so that symbolic links are maintained,
|
|
|
|
* but only if it matches the actual working directory.
|
|
|
|
*/
|
|
|
|
if (realpath(pwd, resolved1) == NULL)
|
|
|
|
return (cwd);
|
|
|
|
if (realpath(cwd, resolved2) == NULL)
|
|
|
|
return (cwd);
|
|
|
|
if (strcmp(resolved1, resolved2) != 0)
|
|
|
|
return (cwd);
|
|
|
|
return (pwd);
|
|
|
|
}
|
|
|
|
|
2015-08-30 15:43:40 +00:00
|
|
|
const char *
|
2015-07-20 15:50:04 +00:00
|
|
|
find_home(void)
|
|
|
|
{
|
2015-09-01 10:10:59 +00:00
|
|
|
struct passwd *pw;
|
|
|
|
static const char *home;
|
|
|
|
|
|
|
|
if (home != NULL)
|
|
|
|
return (home);
|
2015-07-20 15:50:04 +00:00
|
|
|
|
|
|
|
home = getenv("HOME");
|
|
|
|
if (home == NULL || *home == '\0') {
|
|
|
|
pw = getpwuid(getuid());
|
|
|
|
if (pw != NULL)
|
|
|
|
home = pw->pw_dir;
|
|
|
|
else
|
|
|
|
home = NULL;
|
|
|
|
}
|
|
|
|
|
2015-08-30 15:43:40 +00:00
|
|
|
return (home);
|
2015-07-20 15:50:04 +00:00
|
|
|
}
|
|
|
|
|
2020-01-28 10:44:30 +00:00
|
|
|
const char *
|
|
|
|
getversion(void)
|
|
|
|
{
|
|
|
|
static char *version;
|
|
|
|
struct utsname u;
|
|
|
|
|
|
|
|
if (version == NULL) {
|
|
|
|
if (uname(&u) < 0)
|
|
|
|
fatalx("uname failed");
|
|
|
|
xasprintf(&version, "openbsd-%s", u.release);
|
|
|
|
}
|
2020-04-09 15:35:27 +00:00
|
|
|
return (version);
|
2020-01-28 10:44:30 +00:00
|
|
|
}
|
|
|
|
|
2009-06-01 22:58:49 +00:00
|
|
|
int
|
|
|
|
main(int argc, char **argv)
|
|
|
|
{
|
2020-04-20 13:25:36 +00:00
|
|
|
char *path = NULL, *label = NULL;
|
|
|
|
char *cause, **var;
|
2021-02-22 08:18:13 +00:00
|
|
|
const char *s, *cwd;
|
2021-06-10 07:52:29 +00:00
|
|
|
int opt, keys, feat = 0, fflag = 0;
|
2020-09-22 05:23:34 +00:00
|
|
|
uint64_t flags = 0;
|
2017-01-15 20:48:41 +00:00
|
|
|
const struct options_table_entry *oe;
|
2021-02-22 08:18:13 +00:00
|
|
|
u_int i;
|
2009-06-01 22:58:49 +00:00
|
|
|
|
2017-07-03 08:08:30 +00:00
|
|
|
if (setlocale(LC_CTYPE, "en_US.UTF-8") == NULL &&
|
|
|
|
setlocale(LC_CTYPE, "C.UTF-8") == NULL) {
|
2016-03-05 16:08:38 +00:00
|
|
|
if (setlocale(LC_CTYPE, "") == NULL)
|
|
|
|
errx(1, "invalid LC_ALL, LC_CTYPE or LANG");
|
|
|
|
s = nl_langinfo(CODESET);
|
2016-05-04 21:29:47 +00:00
|
|
|
if (strcasecmp(s, "UTF-8") != 0 && strcasecmp(s, "UTF8") != 0)
|
2016-03-05 16:08:38 +00:00
|
|
|
errx(1, "need UTF-8 locale (LC_CTYPE) but have %s", s);
|
|
|
|
}
|
2016-03-01 12:02:08 +00:00
|
|
|
|
2016-03-05 07:44:31 +00:00
|
|
|
setlocale(LC_TIME, "");
|
2015-09-14 12:12:24 +00:00
|
|
|
tzset();
|
2013-04-11 21:52:18 +00:00
|
|
|
|
2015-08-30 22:40:25 +00:00
|
|
|
if (**argv == '-')
|
|
|
|
flags = CLIENT_LOGIN;
|
2021-02-22 11:42:50 +00:00
|
|
|
|
|
|
|
global_environ = environ_create();
|
|
|
|
for (var = environ; *var != NULL; var++)
|
|
|
|
environ_put(global_environ, *var, 0);
|
|
|
|
if ((cwd = find_cwd()) != NULL)
|
|
|
|
environ_set(global_environ, "PWD", 0, "%s", cwd);
|
2021-02-22 08:18:13 +00:00
|
|
|
expand_paths(TMUX_CONF, &cfg_files, &cfg_nfiles, 1);
|
2015-08-30 22:40:25 +00:00
|
|
|
|
2021-01-17 16:17:41 +00:00
|
|
|
while ((opt = getopt(argc, argv, "2c:CDdf:lL:NqS:T:uUvV")) != -1) {
|
2009-09-02 17:34:57 +00:00
|
|
|
switch (opt) {
|
2009-06-01 22:58:49 +00:00
|
|
|
case '2':
|
2020-04-20 13:25:36 +00:00
|
|
|
tty_add_features(&feat, "256", ":,");
|
2009-06-01 22:58:49 +00:00
|
|
|
break;
|
2009-09-23 12:03:30 +00:00
|
|
|
case 'c':
|
2017-07-12 09:21:25 +00:00
|
|
|
shell_command = optarg;
|
2009-09-23 12:03:30 +00:00
|
|
|
break;
|
2020-05-16 16:07:55 +00:00
|
|
|
case 'D':
|
|
|
|
flags |= CLIENT_NOFORK;
|
|
|
|
break;
|
2012-06-18 13:16:42 +00:00
|
|
|
case 'C':
|
2013-10-10 12:12:08 +00:00
|
|
|
if (flags & CLIENT_CONTROL)
|
|
|
|
flags |= CLIENT_CONTROLCONTROL;
|
2012-06-18 13:16:42 +00:00
|
|
|
else
|
2013-10-10 12:12:08 +00:00
|
|
|
flags |= CLIENT_CONTROL;
|
2012-06-18 13:16:42 +00:00
|
|
|
break;
|
2009-06-01 22:58:49 +00:00
|
|
|
case 'f':
|
2021-06-10 07:52:29 +00:00
|
|
|
if (!fflag) {
|
|
|
|
fflag = 1;
|
|
|
|
for (i = 0; i < cfg_nfiles; i++)
|
|
|
|
free(cfg_files[i]);
|
|
|
|
cfg_nfiles = 0;
|
|
|
|
}
|
|
|
|
cfg_files = xreallocarray(cfg_files, cfg_nfiles + 1,
|
|
|
|
sizeof *cfg_files);
|
|
|
|
cfg_files[cfg_nfiles++] = xstrdup(optarg);
|
2021-02-22 08:18:13 +00:00
|
|
|
cfg_quiet = 0;
|
2009-06-01 22:58:49 +00:00
|
|
|
break;
|
2020-01-28 10:44:30 +00:00
|
|
|
case 'V':
|
2023-04-17 18:00:19 +00:00
|
|
|
printf("tmux %s\n", getversion());
|
2020-01-28 10:44:30 +00:00
|
|
|
exit(0);
|
2009-09-02 17:34:57 +00:00
|
|
|
case 'l':
|
2015-08-30 22:40:25 +00:00
|
|
|
flags |= CLIENT_LOGIN;
|
2009-09-02 17:34:57 +00:00
|
|
|
break;
|
2009-06-01 22:58:49 +00:00
|
|
|
case 'L':
|
2012-07-10 11:53:01 +00:00
|
|
|
free(label);
|
2009-06-01 22:58:49 +00:00
|
|
|
label = xstrdup(optarg);
|
|
|
|
break;
|
2021-01-17 16:17:41 +00:00
|
|
|
case 'N':
|
|
|
|
flags |= CLIENT_NOSTARTSERVER;
|
|
|
|
break;
|
2009-09-01 09:00:54 +00:00
|
|
|
case 'q':
|
|
|
|
break;
|
2009-06-01 22:58:49 +00:00
|
|
|
case 'S':
|
2012-07-10 11:53:01 +00:00
|
|
|
free(path);
|
2009-06-01 22:58:49 +00:00
|
|
|
path = xstrdup(optarg);
|
|
|
|
break;
|
2020-04-20 13:25:36 +00:00
|
|
|
case 'T':
|
|
|
|
tty_add_features(&feat, optarg, ":,");
|
|
|
|
break;
|
2009-06-01 22:58:49 +00:00
|
|
|
case 'u':
|
2013-10-10 12:12:08 +00:00
|
|
|
flags |= CLIENT_UTF8;
|
2009-06-01 22:58:49 +00:00
|
|
|
break;
|
|
|
|
case 'v':
|
2015-11-24 21:19:46 +00:00
|
|
|
log_add_level();
|
2009-06-01 22:58:49 +00:00
|
|
|
break;
|
2009-10-26 21:42:04 +00:00
|
|
|
default:
|
2009-06-01 22:58:49 +00:00
|
|
|
usage();
|
2009-10-26 21:42:04 +00:00
|
|
|
}
|
|
|
|
}
|
2009-06-01 22:58:49 +00:00
|
|
|
argc -= optind;
|
|
|
|
argv += optind;
|
|
|
|
|
2017-07-12 09:21:25 +00:00
|
|
|
if (shell_command != NULL && argc != 0)
|
2009-09-23 12:03:30 +00:00
|
|
|
usage();
|
2020-05-16 16:07:55 +00:00
|
|
|
if ((flags & CLIENT_NOFORK) && argc != 0)
|
|
|
|
usage();
|
2009-09-23 12:03:30 +00:00
|
|
|
|
2017-04-20 17:49:26 +00:00
|
|
|
if ((ptm_fd = getptmfd()) == -1)
|
|
|
|
err(1, "getptmfd");
|
2015-11-22 19:41:19 +00:00
|
|
|
if (pledge("stdio rpath wpath cpath flock fattr unix getpw sendfd "
|
|
|
|
"recvfd proc exec tty ps", NULL) != 0)
|
2015-10-23 16:07:29 +00:00
|
|
|
err(1, "pledge");
|
|
|
|
|
2015-11-12 11:24:08 +00:00
|
|
|
/*
|
|
|
|
* tmux is a UTF-8 terminal, so if TMUX is set, assume UTF-8.
|
|
|
|
* Otherwise, if the user has set LC_ALL, LC_CTYPE or LANG to contain
|
|
|
|
* UTF-8, it is a safe assumption that either they are using a UTF-8
|
|
|
|
* terminal, or if not they know that output from UTF-8-capable
|
|
|
|
* programs may be wrong.
|
|
|
|
*/
|
|
|
|
if (getenv("TMUX") != NULL)
|
|
|
|
flags |= CLIENT_UTF8;
|
|
|
|
else {
|
|
|
|
s = getenv("LC_ALL");
|
|
|
|
if (s == NULL || *s == '\0')
|
|
|
|
s = getenv("LC_CTYPE");
|
|
|
|
if (s == NULL || *s == '\0')
|
|
|
|
s = getenv("LANG");
|
|
|
|
if (s == NULL || *s == '\0')
|
|
|
|
s = "";
|
|
|
|
if (strcasestr(s, "UTF-8") != NULL ||
|
|
|
|
strcasestr(s, "UTF8") != NULL)
|
2013-10-10 12:12:08 +00:00
|
|
|
flags |= CLIENT_UTF8;
|
2009-07-17 13:38:03 +00:00
|
|
|
}
|
|
|
|
|
2015-10-27 15:58:42 +00:00
|
|
|
global_options = options_create(NULL);
|
|
|
|
global_s_options = options_create(NULL);
|
|
|
|
global_w_options = options_create(NULL);
|
2017-01-15 20:48:41 +00:00
|
|
|
for (oe = options_table; oe->name != NULL; oe++) {
|
2019-06-20 11:59:59 +00:00
|
|
|
if (oe->scope & OPTIONS_TABLE_SERVER)
|
2017-01-15 20:48:41 +00:00
|
|
|
options_default(global_options, oe);
|
2019-06-20 11:59:59 +00:00
|
|
|
if (oe->scope & OPTIONS_TABLE_SESSION)
|
2017-01-15 20:48:41 +00:00
|
|
|
options_default(global_s_options, oe);
|
2019-06-20 11:59:59 +00:00
|
|
|
if (oe->scope & OPTIONS_TABLE_WINDOW)
|
2017-01-15 20:48:41 +00:00
|
|
|
options_default(global_w_options, oe);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The default shell comes from SHELL or from the user's passwd entry
|
|
|
|
* if available.
|
|
|
|
*/
|
2021-02-22 08:18:13 +00:00
|
|
|
options_set_string(global_s_options, "default-shell", 0, "%s",
|
|
|
|
getshell());
|
2011-01-01 16:51:21 +00:00
|
|
|
|
|
|
|
/* Override keys to vi if VISUAL or EDITOR are set. */
|
2010-11-29 19:45:58 +00:00
|
|
|
if ((s = getenv("VISUAL")) != NULL || (s = getenv("EDITOR")) != NULL) {
|
2020-05-16 15:24:28 +00:00
|
|
|
options_set_string(global_options, "editor", 0, "%s", s);
|
2010-11-29 19:45:58 +00:00
|
|
|
if (strrchr(s, '/') != NULL)
|
|
|
|
s = strrchr(s, '/') + 1;
|
|
|
|
if (strstr(s, "vi") != NULL)
|
|
|
|
keys = MODEKEY_VI;
|
2011-01-01 16:51:21 +00:00
|
|
|
else
|
|
|
|
keys = MODEKEY_EMACS;
|
2015-10-27 15:58:42 +00:00
|
|
|
options_set_number(global_s_options, "status-keys", keys);
|
|
|
|
options_set_number(global_w_options, "mode-keys", keys);
|
2010-11-29 19:45:58 +00:00
|
|
|
}
|
|
|
|
|
2010-02-04 18:27:06 +00:00
|
|
|
/*
|
2015-11-24 22:27:22 +00:00
|
|
|
* If socket is specified on the command-line with -S or -L, it is
|
|
|
|
* used. Otherwise, $TMUX is checked and if that fails "default" is
|
|
|
|
* used.
|
2010-02-04 18:27:06 +00:00
|
|
|
*/
|
2015-11-24 22:27:22 +00:00
|
|
|
if (path == NULL && label == NULL) {
|
|
|
|
s = getenv("TMUX");
|
|
|
|
if (s != NULL && *s != '\0' && *s != ',') {
|
|
|
|
path = xstrdup(s);
|
2016-12-09 21:39:27 +00:00
|
|
|
path[strcspn(path, ",")] = '\0';
|
2010-02-04 18:27:06 +00:00
|
|
|
}
|
2009-06-01 22:58:49 +00:00
|
|
|
}
|
2020-03-12 09:26:34 +00:00
|
|
|
if (path == NULL) {
|
|
|
|
if ((path = make_label(label, &cause)) == NULL) {
|
|
|
|
if (cause != NULL) {
|
|
|
|
fprintf(stderr, "%s\n", cause);
|
|
|
|
free(cause);
|
|
|
|
}
|
|
|
|
exit(1);
|
2018-01-12 10:22:02 +00:00
|
|
|
}
|
2020-03-12 09:26:34 +00:00
|
|
|
flags |= CLIENT_DEFAULTSOCKET;
|
2014-01-09 14:05:55 +00:00
|
|
|
}
|
2015-11-24 22:27:22 +00:00
|
|
|
socket_path = path;
|
|
|
|
free(label);
|
2010-05-03 16:06:32 +00:00
|
|
|
|
2010-10-18 20:00:02 +00:00
|
|
|
/* Pass control to the client. */
|
2020-04-20 13:25:36 +00:00
|
|
|
exit(client_main(event_init(), argc, argv, flags, feat));
|
2009-06-01 22:58:49 +00:00
|
|
|
}
|