• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (c) 2006-2011 Christian Plattner. All rights reserved.
3  * Please refer to the LICENSE.txt for licensing details.
4  */
5 package ch.ethz.ssh2;
6 
7 import java.io.IOException;
8 import java.io.InputStream;
9 import java.io.OutputStream;
10 import java.security.SecureRandom;
11 
12 import ch.ethz.ssh2.channel.Channel;
13 import ch.ethz.ssh2.channel.ChannelManager;
14 import ch.ethz.ssh2.channel.X11ServerData;
15 
16 /**
17  * A <code>Session</code> is a remote execution of a program. "Program" means
18  * in this context either a shell, an application or a system command. The
19  * program may or may not have a tty. Only one single program can be started on
20  * a session. However, multiple sessions can be active simultaneously.
21  *
22  * @author Christian Plattner
23  * @version $Id: Session.java 32 2011-05-28 21:56:21Z dkocher@sudo.ch $
24  */
25 public class Session
26 {
27 	private ChannelManager cm;
28 	private Channel cn;
29 
30 	private boolean flag_pty_requested = false;
31 	private boolean flag_x11_requested = false;
32 	private boolean flag_execution_started = false;
33 	private boolean flag_closed = false;
34 
35 	private String x11FakeCookie = null;
36 
37 	private final SecureRandom rnd;
38 
Session(ChannelManager cm, SecureRandom rnd)39 	protected Session(ChannelManager cm, SecureRandom rnd) throws IOException
40 	{
41 		this.cm = cm;
42 		this.cn = cm.openSessionChannel();
43 		this.rnd = rnd;
44 	}
45 
46 	/**
47 	 * Basically just a wrapper for lazy people - identical to calling
48 	 * <code>requestPTY("dumb", 0, 0, 0, 0, null)</code>.
49 	 *
50 	 * @throws IOException
51 	 */
requestDumbPTY()52 	public void requestDumbPTY() throws IOException
53 	{
54 		requestPTY("dumb", 0, 0, 0, 0, null);
55 	}
56 
57 	/**
58 	 * Basically just another wrapper for lazy people - identical to calling
59 	 * <code>requestPTY(term, 0, 0, 0, 0, null)</code>.
60 	 *
61 	 * @throws IOException
62 	 */
requestPTY(String term)63 	public void requestPTY(String term) throws IOException
64 	{
65 		requestPTY(term, 0, 0, 0, 0, null);
66 	}
67 
68 	/**
69 	 * Allocate a pseudo-terminal for this session.
70 	 * <p/>
71 	 * This method may only be called before a program or shell is started in
72 	 * this session.
73 	 * <p/>
74 	 * Different aspects can be specified:
75 	 * <p/>
76 	 * <ul>
77 	 * <li>The TERM environment variable value (e.g., vt100)</li>
78 	 * <li>The terminal's dimensions.</li>
79 	 * <li>The encoded terminal modes.</li>
80 	 * </ul>
81 	 * Zero dimension parameters are ignored. The character/row dimensions
82 	 * override the pixel dimensions (when nonzero). Pixel dimensions refer to
83 	 * the drawable area of the window. The dimension parameters are only
84 	 * informational. The encoding of terminal modes (parameter
85 	 * <code>terminal_modes</code>) is described in RFC4254.
86 	 *
87 	 * @param term The TERM environment variable value (e.g., vt100)
88 	 * @param term_width_characters terminal width, characters (e.g., 80)
89 	 * @param term_height_characters terminal height, rows (e.g., 24)
90 	 * @param term_width_pixels terminal width, pixels (e.g., 640)
91 	 * @param term_height_pixels terminal height, pixels (e.g., 480)
92 	 * @param terminal_modes encoded terminal modes (may be <code>null</code>)
93 	 * @throws IOException
94 	 */
requestPTY(String term, int term_width_characters, int term_height_characters, int term_width_pixels, int term_height_pixels, byte[] terminal_modes)95 	public void requestPTY(String term, int term_width_characters, int term_height_characters, int term_width_pixels,
96 						   int term_height_pixels, byte[] terminal_modes) throws IOException
97 	{
98 		if (term == null)
99 			throw new IllegalArgumentException("TERM cannot be null.");
100 
101 		if ((terminal_modes != null) && (terminal_modes.length > 0))
102 		{
103 			if (terminal_modes[terminal_modes.length - 1] != 0)
104 				throw new IOException("Illegal terminal modes description, does not end in zero byte");
105 		}
106 		else
107 			terminal_modes = new byte[]{0};
108 
109 		synchronized (this)
110 		{
111 			/* The following is just a nicer error, we would catch it anyway later in the channel code */
112 			if (flag_closed)
113 				throw new IOException("This session is closed.");
114 
115 			if (flag_pty_requested)
116 				throw new IOException("A PTY was already requested.");
117 
118 			if (flag_execution_started)
119 				throw new IOException(
120 						"Cannot request PTY at this stage anymore, a remote execution has already started.");
121 
122 			flag_pty_requested = true;
123 		}
124 
125 		cm.requestPTY(cn, term, term_width_characters, term_height_characters, term_width_pixels, term_height_pixels,
126 				terminal_modes);
127 	}
128 
129 	/**
130 	 * Request X11 forwarding for the current session.
131 	 * <p/>
132 	 * You have to supply the name and port of your X-server.
133 	 * <p/>
134 	 * This method may only be called before a program or shell is started in
135 	 * this session.
136 	 *
137 	 * @param hostname the hostname of the real (target) X11 server (e.g., 127.0.0.1)
138 	 * @param port the port of the real (target) X11 server (e.g., 6010)
139 	 * @param cookie if non-null, then present this cookie to the real X11 server
140 	 * @param singleConnection if true, then the server is instructed to only forward one single
141 	 * connection, no more connections shall be forwarded after first, or after the session
142 	 * channel has been closed
143 	 * @throws IOException
144 	 */
requestX11Forwarding(String hostname, int port, byte[] cookie, boolean singleConnection)145 	public void requestX11Forwarding(String hostname, int port, byte[] cookie, boolean singleConnection)
146 			throws IOException
147 	{
148 		if (hostname == null)
149 			throw new IllegalArgumentException("hostname argument may not be null");
150 
151 		synchronized (this)
152 		{
153 			/* The following is just a nicer error, we would catch it anyway later in the channel code */
154 			if (flag_closed)
155 				throw new IOException("This session is closed.");
156 
157 			if (flag_x11_requested)
158 				throw new IOException("X11 forwarding was already requested.");
159 
160 			if (flag_execution_started)
161 				throw new IOException(
162 						"Cannot request X11 forwarding at this stage anymore, a remote execution has already started.");
163 
164 			flag_x11_requested = true;
165 		}
166 
167 		/* X11ServerData - used to store data about the target X11 server */
168 
169 		X11ServerData x11data = new X11ServerData();
170 
171 		x11data.hostname = hostname;
172 		x11data.port = port;
173 		x11data.x11_magic_cookie = cookie; /* if non-null, then present this cookie to the real X11 server */
174 
175 		/* Generate fake cookie - this one is used between remote clients and the ganymed proxy */
176 
177 		byte[] fakeCookie = new byte[16];
178 		String hexEncodedFakeCookie;
179 
180 		/* Make sure that this fake cookie is unique for this connection */
181 
182 		while (true)
183 		{
184 			rnd.nextBytes(fakeCookie);
185 
186 			/* Generate also hex representation of fake cookie */
187 
188 			StringBuilder tmp = new StringBuilder(32);
189 			for (int i = 0; i < fakeCookie.length; i++)
190 			{
191 				String digit2 = Integer.toHexString(fakeCookie[i] & 0xff);
192 				tmp.append((digit2.length() == 2) ? digit2 : "0" + digit2);
193 			}
194 			hexEncodedFakeCookie = tmp.toString();
195 
196 			/* Well, yes, chances are low, but we want to be on the safe side */
197 
198 			if (cm.checkX11Cookie(hexEncodedFakeCookie) == null)
199 				break;
200 		}
201 
202 		/* Ask for X11 forwarding */
203 
204 		cm.requestX11(cn, singleConnection, "MIT-MAGIC-COOKIE-1", hexEncodedFakeCookie, 0);
205 
206 		/* OK, that went fine, get ready to accept X11 connections... */
207 		/* ... but only if the user has not called close() in the meantime =) */
208 
209 		synchronized (this)
210 		{
211 			if (flag_closed == false)
212 			{
213 				this.x11FakeCookie = hexEncodedFakeCookie;
214 				cm.registerX11Cookie(hexEncodedFakeCookie, x11data);
215 			}
216 		}
217 
218 		/* Now it is safe to start remote X11 programs */
219 	}
220 
221 	/**
222 	 * Execute a command on the remote machine.
223 	 *
224 	 * @param cmd The command to execute on the remote host.
225 	 * @throws IOException
226 	 */
execCommand(String cmd)227 	public void execCommand(String cmd) throws IOException
228 	{
229 		this.execCommand(cmd, null);
230 	}
231 
232 	/**
233 	 * Execute a command on the remote machine.
234 	 *
235 	 * @param cmd The command to execute on the remote host.
236 	 * @param charsetName The charset used to convert between Java Unicode Strings and byte encodings
237 	 * @throws IOException
238 	 */
execCommand(String cmd, String charsetName)239 	public void execCommand(String cmd, String charsetName) throws IOException
240 	{
241 		if (cmd == null)
242 			throw new IllegalArgumentException("cmd argument may not be null");
243 
244 		synchronized (this)
245 		{
246 			/* The following is just a nicer error, we would catch it anyway later in the channel code */
247 			if (flag_closed)
248 				throw new IOException("This session is closed.");
249 
250 			if (flag_execution_started)
251 				throw new IOException("A remote execution has already started.");
252 
253 			flag_execution_started = true;
254 		}
255 
256 		cm.requestExecCommand(cn, cmd, charsetName);
257 	}
258 
259 	/**
260 	 * Start a shell on the remote machine.
261 	 *
262 	 * @throws IOException
263 	 */
startShell()264 	public void startShell() throws IOException
265 	{
266 		synchronized (this)
267 		{
268 			/* The following is just a nicer error, we would catch it anyway later in the channel code */
269 			if (flag_closed)
270 				throw new IOException("This session is closed.");
271 
272 			if (flag_execution_started)
273 				throw new IOException("A remote execution has already started.");
274 
275 			flag_execution_started = true;
276 		}
277 
278 		cm.requestShell(cn);
279 	}
280 
281 	/**
282 	 * Start a subsystem on the remote machine.
283 	 * Unless you know what you are doing, you will never need this.
284 	 *
285 	 * @param name the name of the subsystem.
286 	 * @throws IOException
287 	 */
startSubSystem(String name)288 	public void startSubSystem(String name) throws IOException
289 	{
290 		if (name == null)
291 			throw new IllegalArgumentException("name argument may not be null");
292 
293 		synchronized (this)
294 		{
295 			/* The following is just a nicer error, we would catch it anyway later in the channel code */
296 			if (flag_closed)
297 				throw new IOException("This session is closed.");
298 
299 			if (flag_execution_started)
300 				throw new IOException("A remote execution has already started.");
301 
302 			flag_execution_started = true;
303 		}
304 
305 		cm.requestSubSystem(cn, name);
306 	}
307 
getState()308 	public int getState()
309 	{
310 		return cn.getState();
311 	}
312 
getStdout()313 	public InputStream getStdout()
314 	{
315 		return cn.getStdoutStream();
316 	}
317 
getStderr()318 	public InputStream getStderr()
319 	{
320 		return cn.getStderrStream();
321 	}
322 
getStdin()323 	public OutputStream getStdin()
324 	{
325 		return cn.getStdinStream();
326 	}
327 
328 	/**
329 	 * This method blocks until there is more data available on either the
330 	 * stdout or stderr InputStream of this <code>Session</code>. Very useful
331 	 * if you do not want to use two parallel threads for reading from the two
332 	 * InputStreams. One can also specify a timeout. NOTE: do NOT call this
333 	 * method if you use concurrent threads that operate on either of the two
334 	 * InputStreams of this <code>Session</code> (otherwise this method may
335 	 * block, even though more data is available).
336 	 *
337 	 * @param timeout The (non-negative) timeout in <code>ms</code>. <code>0</code> means no
338 	 * timeout, the call may block forever.
339 	 * @return <ul>
340 	 *         <li><code>0</code> if no more data will arrive.</li>
341 	 *         <li><code>1</code> if more data is available.</li>
342 	 *         <li><code>-1</code> if a timeout occurred.</li>
343 	 *         </ul>
344 	 * @throws IOException
345 	 * @deprecated This method has been replaced with a much more powerful wait-for-condition
346 	 *             interface and therefore acts only as a wrapper.
347 	 */
waitUntilDataAvailable(long timeout)348 	public int waitUntilDataAvailable(long timeout) throws IOException
349 	{
350 		if (timeout < 0)
351 			throw new IllegalArgumentException("timeout must not be negative!");
352 
353 		int conditions = cm.waitForCondition(cn, timeout, ChannelCondition.STDOUT_DATA | ChannelCondition.STDERR_DATA
354 				| ChannelCondition.EOF);
355 
356 		if ((conditions & ChannelCondition.TIMEOUT) != 0)
357 			return -1;
358 
359 		if ((conditions & (ChannelCondition.STDOUT_DATA | ChannelCondition.STDERR_DATA)) != 0)
360 			return 1;
361 
362 		/* Here we do not need to check separately for CLOSED, since CLOSED implies EOF */
363 
364 		if ((conditions & ChannelCondition.EOF) != 0)
365 			return 0;
366 
367 		throw new IllegalStateException("Unexpected condition result (" + conditions + ")");
368 	}
369 
370 	/**
371 	 * This method blocks until certain conditions hold true on the underlying SSH-2 channel.
372 	 * <p/>
373 	 * This method returns as soon as one of the following happens:
374 	 * <ul>
375 	 * <li>at least of the specified conditions (see {@link ChannelCondition}) holds true</li>
376 	 * <li>timeout > 0 and a timeout occured (TIMEOUT will be set in result conditions)</a>
377 	 * <li>the underlying channel was closed (CLOSED will be set in result conditions)</a>
378 	 * </ul>
379 	 * <p/>
380 	 * In any case, the result value contains ALL current conditions, which may be more
381 	 * than the specified condition set (i.e., never use the "==" operator to test for conditions
382 	 * in the bitmask, see also comments in {@link ChannelCondition}).
383 	 * <p/>
384 	 * Note: do NOT call this method if you want to wait for STDOUT_DATA or STDERR_DATA and
385 	 * there are concurrent threads (e.g., StreamGobblers) that operate on either of the two
386 	 * InputStreams of this <code>Session</code> (otherwise this method may
387 	 * block, even though more data is available in the StreamGobblers).
388 	 *
389 	 * @param condition_set a bitmask based on {@link ChannelCondition} values
390 	 * @param timeout non-negative timeout in ms, <code>0</code> means no timeout
391 	 * @return all bitmask specifying all current conditions that are true
392 	 */
393 
waitForCondition(int condition_set, long timeout)394 	public int waitForCondition(int condition_set, long timeout)
395 	{
396 		if (timeout < 0)
397 			throw new IllegalArgumentException("timeout must be non-negative!");
398 
399 		return cm.waitForCondition(cn, timeout, condition_set);
400 	}
401 
402 	/**
403 	 * Get the exit code/status from the remote command - if available. Be
404 	 * careful - not all server implementations return this value. It is
405 	 * generally a good idea to call this method only when all data from the
406 	 * remote side has been consumed (see also the <code<WaitForCondition</code> method).
407 	 *
408 	 * @return An <code>Integer</code> holding the exit code, or
409 	 *         <code>null</code> if no exit code is (yet) available.
410 	 */
getExitStatus()411 	public Integer getExitStatus()
412 	{
413 		return cn.getExitStatus();
414 	}
415 
416 	/**
417 	 * Get the name of the signal by which the process on the remote side was
418 	 * stopped - if available and applicable. Be careful - not all server
419 	 * implementations return this value.
420 	 *
421 	 * @return An <code>String</code> holding the name of the signal, or
422 	 *         <code>null</code> if the process exited normally or is still
423 	 *         running (or if the server forgot to send this information).
424 	 */
getExitSignal()425 	public String getExitSignal()
426 	{
427 		return cn.getExitSignal();
428 	}
429 
430 	/**
431 	 * Close this session. NEVER forget to call this method to free up resources -
432 	 * even if you got an exception from one of the other methods (or when
433 	 * getting an Exception on the Input- or OutputStreams). Sometimes these other
434 	 * methods may throw an exception, saying that the underlying channel is
435 	 * closed (this can happen, e.g., if the other server sent a close message.)
436 	 * However, as long as you have not called the <code>close()</code>
437 	 * method, you may be wasting (local) resources.
438 	 */
close()439 	public void close()
440 	{
441 		synchronized (this)
442 		{
443 			if (flag_closed)
444 				return;
445 
446 			flag_closed = true;
447 
448 			if (x11FakeCookie != null)
449 				cm.unRegisterX11Cookie(x11FakeCookie, true);
450 
451 			try
452 			{
453 				cm.closeChannel(cn, "Closed due to user request", true);
454 			}
455 			catch (IOException ignored)
456 			{
457 			}
458 		}
459 	}
460 }
461