Split sesman/session.c into session.c and session_list.c
This commit is contained in:
parent
84c19e05ce
commit
fb25de0419
@ -33,6 +33,8 @@ xrdp_sesman_SOURCES = \
|
||||
sesman.h \
|
||||
session.c \
|
||||
session.h \
|
||||
session_list.c \
|
||||
session_list.h \
|
||||
sig.c \
|
||||
sig.h \
|
||||
xauth.c \
|
||||
|
@ -31,11 +31,14 @@
|
||||
#include "trans.h"
|
||||
#include "os_calls.h"
|
||||
#include "scp.h"
|
||||
#include "config.h"
|
||||
|
||||
#include "scp_process.h"
|
||||
#include "access.h"
|
||||
#include "auth.h"
|
||||
#include "guid.h"
|
||||
#include "os_calls.h"
|
||||
#include "session_list.h"
|
||||
#include "session.h"
|
||||
#include "sesman.h"
|
||||
#include "string_calls.h"
|
||||
@ -195,6 +198,112 @@ process_set_peername_request(struct sesman_con *sc)
|
||||
return rv;
|
||||
}
|
||||
|
||||
/******************************************************************************/
|
||||
/**
|
||||
* Allocates a chain item and starts the session
|
||||
*/
|
||||
static enum scp_screate_status
|
||||
allocate_and_start_session(struct auth_info *auth_info,
|
||||
const char *username,
|
||||
const char *ip_addr,
|
||||
const struct session_parameters *params)
|
||||
{
|
||||
int pid = 0;
|
||||
struct session_chain *temp = (struct session_chain *)NULL;
|
||||
|
||||
/* check to limit concurrent sessions */
|
||||
if (session_get_count() >= (unsigned int)g_cfg->sess.max_sessions)
|
||||
{
|
||||
LOG(LOG_LEVEL_ERROR, "max concurrent session limit "
|
||||
"exceeded. login for user %s denied", username);
|
||||
return E_SCP_SCREATE_MAX_REACHED;
|
||||
}
|
||||
|
||||
temp = (struct session_chain *)g_malloc(sizeof(struct session_chain), 0);
|
||||
|
||||
if (temp == 0)
|
||||
{
|
||||
LOG(LOG_LEVEL_ERROR, "Out of memory error: cannot create new session "
|
||||
"chain element - user %s", username);
|
||||
return E_SCP_SCREATE_NO_MEMORY;
|
||||
}
|
||||
|
||||
temp->item = (struct session_item *)g_malloc(sizeof(struct session_item), 0);
|
||||
|
||||
if (temp->item == 0)
|
||||
{
|
||||
g_free(temp);
|
||||
LOG(LOG_LEVEL_ERROR, "Out of memory error: cannot create new session "
|
||||
"item - user %s", username);
|
||||
return E_SCP_SCREATE_NO_MEMORY;
|
||||
}
|
||||
|
||||
pid = g_fork();
|
||||
if (pid == -1)
|
||||
{
|
||||
LOG(LOG_LEVEL_ERROR,
|
||||
"[session start] (display %d): Failed to fork for scp with "
|
||||
"errno: %d, description: %s",
|
||||
params->display, g_get_errno(), g_get_strerror());
|
||||
g_free(temp->item);
|
||||
g_free(temp);
|
||||
return E_SCP_SCREATE_GENERAL_ERROR;
|
||||
}
|
||||
|
||||
if (pid == 0)
|
||||
{
|
||||
/**
|
||||
* We're now forked from the main sesman process, so we
|
||||
* can close file descriptors that we no longer need */
|
||||
|
||||
sesman_close_all(0);
|
||||
|
||||
/* Wait objects created in a parent are not valid in a child */
|
||||
g_delete_wait_obj(g_reload_event);
|
||||
g_delete_wait_obj(g_sigchld_event);
|
||||
g_delete_wait_obj(g_term_event);
|
||||
|
||||
session_start(auth_info, params);
|
||||
g_exit(1); /* Should not get here */
|
||||
}
|
||||
|
||||
if (ip_addr[0] != '\0')
|
||||
{
|
||||
LOG(LOG_LEVEL_INFO, "++ created session: username %s, ip %s",
|
||||
username, ip_addr);
|
||||
}
|
||||
else
|
||||
{
|
||||
LOG(LOG_LEVEL_INFO, "++ created session: username %s", username);
|
||||
}
|
||||
|
||||
LOG(LOG_LEVEL_INFO, "Starting session: session_pid %d, "
|
||||
"display :%d.0, width %d, height %d, bpp %d, client ip %s, "
|
||||
"UID %d",
|
||||
pid, params->display, params->width, params->height, params->bpp,
|
||||
ip_addr, params->uid);
|
||||
|
||||
temp->item->pid = pid;
|
||||
temp->item->display = params->display;
|
||||
temp->item->width = params->width;
|
||||
temp->item->height = params->height;
|
||||
temp->item->bpp = params->bpp;
|
||||
temp->item->auth_info = auth_info;
|
||||
g_strncpy(temp->item->start_ip_addr, ip_addr,
|
||||
sizeof(temp->item->start_ip_addr) - 1);
|
||||
temp->item->uid = params->uid;
|
||||
temp->item->guid = params->guid;
|
||||
|
||||
temp->item->start_time = g_time1();
|
||||
|
||||
temp->item->type = params->type;
|
||||
temp->item->status = SESMAN_SESSION_STATUS_ACTIVE;
|
||||
|
||||
session_chain_add(temp);
|
||||
|
||||
return E_SCP_SCREATE_OK;
|
||||
}
|
||||
|
||||
/******************************************************************************/
|
||||
|
||||
static int
|
||||
@ -377,11 +486,14 @@ static int
|
||||
process_create_session_request(struct sesman_con *sc)
|
||||
{
|
||||
int rv;
|
||||
struct session_parameters sp;
|
||||
struct guid guid;
|
||||
int display = 0;
|
||||
// Parameters for a new session (if required). Filled in as
|
||||
// we go along.
|
||||
struct session_parameters sp = {0};
|
||||
enum scp_screate_status status = E_SCP_SCREATE_OK;
|
||||
|
||||
int display = 0;
|
||||
struct guid guid;
|
||||
|
||||
guid_clear(&guid);
|
||||
|
||||
rv = scp_get_create_session_request(sc->t,
|
||||
@ -400,60 +512,68 @@ process_create_session_request(struct sesman_con *sc)
|
||||
"Received request from %s to create a session for user %s",
|
||||
sc->peername, sc->username);
|
||||
|
||||
// Copy over the items we got from the login request,
|
||||
// but which we need to describe the session
|
||||
sp.uid = sc->uid;
|
||||
sp.ip_addr = sc->ip_addr; // Guaranteed to be non-NULL
|
||||
|
||||
struct session_item *s_item = session_get_bydata(&sp);
|
||||
struct session_item *s_item =
|
||||
session_get_bydata(sc->uid, sp.type, sp.width, sp.height,
|
||||
sp.bpp, sc->ip_addr);
|
||||
if (s_item != 0)
|
||||
{
|
||||
// Found an existing session
|
||||
display = s_item->display;
|
||||
guid = s_item->guid;
|
||||
if (sp.ip_addr[0] != '\0')
|
||||
if (sc->ip_addr[0] != '\0')
|
||||
{
|
||||
LOG( LOG_LEVEL_INFO, "++ reconnected session: username %s, "
|
||||
"display :%d.0, session_pid %d, ip %s",
|
||||
sc->username, display, s_item->pid, sp.ip_addr);
|
||||
sc->username, s_item->display, s_item->pid,
|
||||
sc->ip_addr);
|
||||
}
|
||||
else
|
||||
{
|
||||
LOG(LOG_LEVEL_INFO, "++ reconnected session: username %s, "
|
||||
"display :%d.0, session_pid %d",
|
||||
sc->username, display, s_item->pid);
|
||||
sc->username, s_item->display, s_item->pid);
|
||||
}
|
||||
|
||||
session_reconnect(display, sc->uid, sc->auth_info);
|
||||
// Get values for response to SCP client
|
||||
display = s_item->display;
|
||||
guid = s_item->guid;
|
||||
|
||||
session_reconnect(s_item->display, sc->uid, sc->auth_info);
|
||||
}
|
||||
else
|
||||
{
|
||||
// Need to create a new session
|
||||
if (sp.ip_addr[0] != '\0')
|
||||
//
|
||||
// Get the rest of the parameters for the session
|
||||
guid = guid_new();
|
||||
display = session_get_available_display();
|
||||
|
||||
sp.guid = guid;
|
||||
sp.display = display;
|
||||
sp.uid = sc->uid;
|
||||
|
||||
if (display == 0)
|
||||
{
|
||||
LOG(LOG_LEVEL_INFO,
|
||||
"++ created session: username %s, ip %s",
|
||||
sc->username, sp.ip_addr);
|
||||
status = E_SCP_SCREATE_NO_DISPLAY;
|
||||
}
|
||||
else
|
||||
{
|
||||
LOG(LOG_LEVEL_INFO,
|
||||
"++ created session: username %s", sc->username);
|
||||
}
|
||||
// The new session will have a lifetime longer than
|
||||
// the sesman connection, and so needs to own
|
||||
// the auth_info struct.
|
||||
//
|
||||
// Copy the auth_info struct out of the connection and pass
|
||||
// it to the session
|
||||
struct auth_info *auth_info = sc->auth_info;
|
||||
sc->auth_info = NULL;
|
||||
|
||||
// The new session will have a lifetime longer than
|
||||
// the sesman connection, and so needs to own
|
||||
// the auth_info struct.
|
||||
//
|
||||
// Copy the auth_info struct out of the connection and pass
|
||||
// it to the session
|
||||
struct auth_info *auth_info = sc->auth_info;
|
||||
sc->auth_info = NULL;
|
||||
status = session_start(auth_info, &sp, &display, &guid);
|
||||
if (status != E_SCP_SCREATE_OK)
|
||||
{
|
||||
// Close the auth session down as it can't be re-used.
|
||||
auth_end(auth_info);
|
||||
status = allocate_and_start_session(auth_info,
|
||||
sc->username,
|
||||
sc->ip_addr,
|
||||
&sp);
|
||||
if (status != E_SCP_SCREATE_OK)
|
||||
{
|
||||
// Close the auth session down as it can't be re-used.
|
||||
auth_end(auth_info);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
@ -462,7 +582,8 @@ process_create_session_request(struct sesman_con *sc)
|
||||
* connection, and results in automatic closure */
|
||||
sc->close_requested = 1;
|
||||
|
||||
rv = scp_send_create_session_response(sc->t, status, display, &guid);
|
||||
rv = scp_send_create_session_response(sc->t, status,
|
||||
display, &guid);
|
||||
}
|
||||
|
||||
return rv;
|
||||
|
1691
sesman/session.c
1691
sesman/session.c
File diff suppressed because it is too large
Load Diff
142
sesman/session.h
142
sesman/session.h
@ -32,163 +32,39 @@
|
||||
|
||||
#include "guid.h"
|
||||
#include "scp_application_types.h"
|
||||
#include "xrdp_constants.h"
|
||||
|
||||
#define SESMAN_SESSION_STATUS_ACTIVE 0x01
|
||||
#define SESMAN_SESSION_STATUS_IDLE 0x02
|
||||
#define SESMAN_SESSION_STATUS_DISCONNECTED 0x04
|
||||
/* future expansion
|
||||
#define SESMAN_SESSION_STATUS_REMCONTROL 0x08
|
||||
*/
|
||||
#define SESMAN_SESSION_STATUS_ALL 0xFF
|
||||
|
||||
enum session_kill_status
|
||||
{
|
||||
SESMAN_SESSION_KILL_OK = 0,
|
||||
SESMAN_SESSION_KILL_NULLITEM,
|
||||
SESMAN_SESSION_KILL_NOTFOUND
|
||||
};
|
||||
|
||||
struct scp_session_info;
|
||||
|
||||
struct session_item
|
||||
{
|
||||
int uid; /* UID of session */
|
||||
int pid; /* pid of sesman waiting for wm to end */
|
||||
int display;
|
||||
int width;
|
||||
int height;
|
||||
int bpp;
|
||||
struct auth_info *auth_info;
|
||||
|
||||
/* status info */
|
||||
unsigned char status;
|
||||
enum scp_session_type type;
|
||||
|
||||
/* time data */
|
||||
time_t start_time;
|
||||
// struct session_date disconnect_time; // Currently unused
|
||||
// struct session_date idle_time; // Currently unused
|
||||
char start_ip_addr[MAX_PEER_ADDRSTRLEN];
|
||||
struct guid guid;
|
||||
};
|
||||
|
||||
struct session_chain
|
||||
{
|
||||
struct session_chain *next;
|
||||
struct session_item *item;
|
||||
};
|
||||
|
||||
struct auth_info;
|
||||
|
||||
/**
|
||||
* Information used to start or find a session
|
||||
* Information used to start a session
|
||||
*/
|
||||
struct session_parameters
|
||||
{
|
||||
unsigned int display;
|
||||
int uid;
|
||||
struct guid guid;
|
||||
enum scp_session_type type;
|
||||
unsigned short height;
|
||||
unsigned short width;
|
||||
unsigned char bpp;
|
||||
const char *shell;
|
||||
const char *directory;
|
||||
const char *ip_addr;
|
||||
};
|
||||
|
||||
/**
|
||||
*
|
||||
* @brief finds a session matching the supplied parameters
|
||||
* @return session data or 0
|
||||
*
|
||||
*/
|
||||
struct session_item *
|
||||
session_get_bydata(const struct session_parameters *params);
|
||||
#ifndef session_find_item
|
||||
#define session_find_item(a) session_get_bydata(a)
|
||||
#endif
|
||||
|
||||
/**
|
||||
*
|
||||
* @brief starts a session
|
||||
*
|
||||
* This call does not return.
|
||||
*
|
||||
* @return Connection status.
|
||||
*/
|
||||
enum scp_screate_status
|
||||
void
|
||||
session_start(struct auth_info *auth_info,
|
||||
const struct session_parameters *params,
|
||||
int *display,
|
||||
struct guid *guid);
|
||||
const struct session_parameters *s);
|
||||
|
||||
int
|
||||
session_reconnect(int display, int uid,
|
||||
struct auth_info *auth_info);
|
||||
|
||||
/**
|
||||
*
|
||||
* @brief kills a session
|
||||
* @param pid the pid of the session to be killed
|
||||
* @return
|
||||
*
|
||||
*/
|
||||
enum session_kill_status
|
||||
session_kill(int pid);
|
||||
|
||||
/**
|
||||
*
|
||||
* @brief sends sigkill to all sessions
|
||||
* @return
|
||||
*
|
||||
*/
|
||||
void
|
||||
session_sigkill_all(void);
|
||||
|
||||
/**
|
||||
*
|
||||
* @brief retrieves a session's descriptor
|
||||
* @param pid the session pid
|
||||
* @return a pointer to the session descriptor on success, NULL otherwise
|
||||
*
|
||||
*/
|
||||
struct session_item *
|
||||
session_get_bypid(int pid);
|
||||
|
||||
/**
|
||||
*
|
||||
* @brief retrieves session descriptions
|
||||
* @param UID the UID for the descriptions
|
||||
* @return A block of session descriptions
|
||||
*
|
||||
* Pass the return result to free_session_info_list() after use
|
||||
*
|
||||
*/
|
||||
struct scp_session_info *
|
||||
session_get_byuid(int uid, unsigned int *cnt, unsigned char flags);
|
||||
|
||||
/**
|
||||
*
|
||||
* @brief Frees the result of session_get_byuser()
|
||||
* @param sesslist Resuit of session_get_byuser()
|
||||
* @param cnt Number of entries in sess
|
||||
*/
|
||||
void
|
||||
free_session_info_list(struct scp_session_info *sesslist, unsigned int cnt);
|
||||
|
||||
/**
|
||||
*
|
||||
* @brief delete socket files
|
||||
* @param display number
|
||||
* @return non-zero value (number of errors) if failed
|
||||
*/
|
||||
int cleanup_sockets(int display);
|
||||
|
||||
/**
|
||||
* Clone a session_parameters structure
|
||||
*
|
||||
* @param sp Parameters to clone
|
||||
* @return Cloned parameters, or NULL if no memory
|
||||
*
|
||||
* The cloned structure can be free'd with a single call to g_free()
|
||||
*/
|
||||
struct session_parameters *
|
||||
clone_session_params(const struct session_parameters *sp);
|
||||
#endif
|
||||
#endif // SESSION_H
|
||||
|
@ -23,8 +23,8 @@
|
||||
|
||||
/**
|
||||
*
|
||||
* @file session.c
|
||||
* @brief Session management code
|
||||
* @file session_list.c
|
||||
* @brief Session list management code
|
||||
* @author Jay Sorg, Simone Fedele
|
||||
*
|
||||
*/
|
||||
@ -33,70 +33,44 @@
|
||||
#include "config_ac.h"
|
||||
#endif
|
||||
|
||||
#ifdef HAVE_SYS_PRCTL_H
|
||||
#include <sys/prctl.h>
|
||||
#endif
|
||||
|
||||
#include "arch.h"
|
||||
#include "session.h"
|
||||
#include "session_list.h"
|
||||
|
||||
#include "auth.h"
|
||||
#include "config.h"
|
||||
#include "env.h"
|
||||
#include "list.h"
|
||||
#include "log.h"
|
||||
#include "os_calls.h"
|
||||
#include "sesman.h"
|
||||
#include "string_calls.h"
|
||||
#include "xauth.h"
|
||||
#include "xwait.h"
|
||||
#include "xrdp_sockets.h"
|
||||
|
||||
#ifndef PR_SET_NO_NEW_PRIVS
|
||||
#define PR_SET_NO_NEW_PRIVS 38
|
||||
#endif
|
||||
|
||||
static struct session_chain *g_sessions;
|
||||
static int g_session_count;
|
||||
|
||||
/**
|
||||
* Creates a string consisting of all parameters that is hosted in the param list
|
||||
* @param self
|
||||
* @param outstr, allocate this buffer before you use this function
|
||||
* @param len the allocated len for outstr
|
||||
* @return
|
||||
*/
|
||||
char *
|
||||
dumpItemsToString(struct list *self, char *outstr, int len)
|
||||
/******************************************************************************/
|
||||
unsigned int
|
||||
session_get_count(void)
|
||||
{
|
||||
int index;
|
||||
int totalLen = 0;
|
||||
|
||||
g_memset(outstr, 0, len);
|
||||
if (self->count == 0)
|
||||
{
|
||||
LOG_DEVEL(LOG_LEVEL_TRACE, "List is empty");
|
||||
}
|
||||
|
||||
for (index = 0; index < self->count; index++)
|
||||
{
|
||||
/* +1 = one space*/
|
||||
totalLen = totalLen + g_strlen((char *)list_get_item(self, index)) + 1;
|
||||
|
||||
if (len > totalLen)
|
||||
{
|
||||
g_strcat(outstr, (char *)list_get_item(self, index));
|
||||
g_strcat(outstr, " ");
|
||||
}
|
||||
}
|
||||
|
||||
return outstr ;
|
||||
return g_session_count;
|
||||
}
|
||||
|
||||
/******************************************************************************/
|
||||
void
|
||||
session_chain_add(struct session_chain *element)
|
||||
{
|
||||
element->next = g_sessions;
|
||||
g_sessions = element;
|
||||
g_session_count++;
|
||||
}
|
||||
|
||||
/******************************************************************************/
|
||||
struct session_item *
|
||||
session_get_bydata(const struct session_parameters *sp)
|
||||
session_get_bydata(uid_t uid,
|
||||
enum scp_session_type type,
|
||||
unsigned short width,
|
||||
unsigned short height,
|
||||
unsigned char bpp,
|
||||
const char *ip_addr)
|
||||
{
|
||||
char policy_str[64];
|
||||
struct session_chain *tmp;
|
||||
@ -105,7 +79,7 @@ session_get_bydata(const struct session_parameters *sp)
|
||||
if ((policy & SESMAN_CFG_SESS_POLICY_DEFAULT) != 0)
|
||||
{
|
||||
/* In the past (i.e. xrdp before v0.9.14), the default
|
||||
* session policy varied by sp->type. If this is needed again
|
||||
* session policy varied by type. If this is needed again
|
||||
* in the future, here is the place to add it */
|
||||
policy = SESMAN_CFG_SESS_POLICY_U | SESMAN_CFG_SESS_POLICY_B;
|
||||
}
|
||||
@ -115,9 +89,9 @@ session_get_bydata(const struct session_parameters *sp)
|
||||
LOG(LOG_LEVEL_DEBUG,
|
||||
"%s: search policy=%s type=%s U=%d B=%d D=(%dx%d) I=%s",
|
||||
__func__,
|
||||
policy_str, SCP_SESSION_TYPE_TO_STR(sp->type),
|
||||
sp->uid, sp->bpp, sp->width, sp->height,
|
||||
sp->ip_addr);
|
||||
policy_str, SCP_SESSION_TYPE_TO_STR(type),
|
||||
uid, bpp, width, height,
|
||||
ip_addr);
|
||||
|
||||
/* 'Separate' policy never matches */
|
||||
if (policy & SESMAN_CFG_SESS_POLICY_SEPARATE)
|
||||
@ -140,20 +114,20 @@ session_get_bydata(const struct session_parameters *sp)
|
||||
item->width, item->height,
|
||||
item->start_ip_addr);
|
||||
|
||||
if (item->type != sp->type)
|
||||
if (item->type != type)
|
||||
{
|
||||
LOG(LOG_LEVEL_DEBUG, "%s: Type doesn't match", __func__);
|
||||
continue;
|
||||
}
|
||||
|
||||
if ((policy & SESMAN_CFG_SESS_POLICY_U) && sp->uid != item->uid)
|
||||
if ((policy & SESMAN_CFG_SESS_POLICY_U) && (int)uid != item->uid)
|
||||
{
|
||||
LOG(LOG_LEVEL_DEBUG,
|
||||
"%s: UID doesn't match for 'U' policy", __func__);
|
||||
continue;
|
||||
}
|
||||
|
||||
if ((policy & SESMAN_CFG_SESS_POLICY_B) && item->bpp != sp->bpp)
|
||||
if ((policy & SESMAN_CFG_SESS_POLICY_B) && item->bpp != bpp)
|
||||
{
|
||||
LOG(LOG_LEVEL_DEBUG,
|
||||
"%s: bpp doesn't match for 'B' policy", __func__);
|
||||
@ -161,7 +135,7 @@ session_get_bydata(const struct session_parameters *sp)
|
||||
}
|
||||
|
||||
if ((policy & SESMAN_CFG_SESS_POLICY_D) &&
|
||||
(item->width != sp->width || item->height != sp->height))
|
||||
(item->width != width || item->height != height))
|
||||
{
|
||||
LOG(LOG_LEVEL_DEBUG,
|
||||
"%s: Dimensions don't match for 'D' policy", __func__);
|
||||
@ -169,7 +143,7 @@ session_get_bydata(const struct session_parameters *sp)
|
||||
}
|
||||
|
||||
if ((policy & SESMAN_CFG_SESS_POLICY_I) &&
|
||||
g_strcmp(item->start_ip_addr, sp->ip_addr) != 0)
|
||||
g_strcmp(item->start_ip_addr, ip_addr) != 0)
|
||||
{
|
||||
LOG(LOG_LEVEL_DEBUG,
|
||||
"%s: IPs don't match for 'I' policy", __func__);
|
||||
@ -313,9 +287,8 @@ session_is_display_in_chain(int display)
|
||||
}
|
||||
|
||||
/******************************************************************************/
|
||||
/* called with the main thread */
|
||||
static int
|
||||
session_get_avail_display_from_chain(void)
|
||||
int
|
||||
session_get_available_display(void)
|
||||
{
|
||||
int display;
|
||||
|
||||
@ -340,40 +313,6 @@ session_get_avail_display_from_chain(void)
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int
|
||||
session_start_chansrv(int uid, int display)
|
||||
{
|
||||
struct list *chansrv_params;
|
||||
const char *exe_path = XRDP_SBIN_PATH "/xrdp-chansrv";
|
||||
int chansrv_pid;
|
||||
|
||||
chansrv_pid = g_fork();
|
||||
if (chansrv_pid == 0)
|
||||
{
|
||||
chansrv_params = list_create();
|
||||
chansrv_params->auto_free = 1;
|
||||
|
||||
/* building parameters */
|
||||
|
||||
list_add_strdup(chansrv_params, exe_path);
|
||||
|
||||
env_set_user(uid, 0, display,
|
||||
g_cfg->env_names,
|
||||
g_cfg->env_values);
|
||||
|
||||
LOG(LOG_LEVEL_INFO,
|
||||
"Starting the xrdp channel server for display %d", display);
|
||||
|
||||
/* executing chansrv */
|
||||
g_execvp_list(exe_path, chansrv_params);
|
||||
|
||||
/* should not get here */
|
||||
list_delete(chansrv_params);
|
||||
g_exit(1);
|
||||
}
|
||||
return chansrv_pid;
|
||||
}
|
||||
|
||||
/******************************************************************************/
|
||||
/**
|
||||
* Convert a UID to a username
|
||||
@ -401,630 +340,6 @@ username_from_uid(int uid, char *uname, int uname_len)
|
||||
return rv;
|
||||
}
|
||||
|
||||
/******************************************************************************/
|
||||
static void
|
||||
exit_status_to_str(const struct exit_status *e, char buff[], int bufflen)
|
||||
{
|
||||
switch (e->reason)
|
||||
{
|
||||
case E_XR_STATUS_CODE:
|
||||
if (e->val == 0)
|
||||
{
|
||||
g_snprintf(buff, bufflen, "exit code zero");
|
||||
}
|
||||
else
|
||||
{
|
||||
g_snprintf(buff, bufflen, "non-zero exit code %d", e->val);
|
||||
}
|
||||
break;
|
||||
|
||||
case E_XR_SIGNAL:
|
||||
g_snprintf(buff, bufflen, "signal %d", e->val);
|
||||
break;
|
||||
|
||||
default:
|
||||
g_snprintf(buff, bufflen, "an unexpected error");
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
/******************************************************************************/
|
||||
|
||||
enum scp_screate_status
|
||||
session_start(struct auth_info *auth_info,
|
||||
const struct session_parameters *s,
|
||||
int *returned_display,
|
||||
struct guid *guid)
|
||||
{
|
||||
int display = 0;
|
||||
int pid = 0;
|
||||
char geometry[32];
|
||||
char depth[32];
|
||||
char screen[32]; /* display number */
|
||||
char text[256];
|
||||
char username[256];
|
||||
char execvpparams[2048];
|
||||
char *xserver = NULL; /* absolute/relative path to Xorg/Xvnc */
|
||||
char *passwd_file;
|
||||
struct session_chain *temp = (struct session_chain *)NULL;
|
||||
struct list *xserver_params = (struct list *)NULL;
|
||||
char authfile[256]; /* The filename for storing xauth information */
|
||||
int chansrv_pid;
|
||||
int display_pid;
|
||||
int window_manager_pid;
|
||||
|
||||
/* initialize (zero out) local variables: */
|
||||
g_memset(geometry, 0, sizeof(char) * 32);
|
||||
g_memset(depth, 0, sizeof(char) * 32);
|
||||
g_memset(screen, 0, sizeof(char) * 32);
|
||||
g_memset(text, 0, sizeof(char) * 256);
|
||||
|
||||
passwd_file = 0;
|
||||
|
||||
/* Get the username for display purposes */
|
||||
username_from_uid(s->uid, username, sizeof(username));
|
||||
|
||||
/* check to limit concurrent sessions */
|
||||
if (g_session_count >= g_cfg->sess.max_sessions)
|
||||
{
|
||||
LOG(LOG_LEVEL_ERROR, "max concurrent session limit "
|
||||
"exceeded. login for user %s denied", username);
|
||||
return E_SCP_SCREATE_MAX_REACHED;
|
||||
}
|
||||
|
||||
temp = (struct session_chain *)g_malloc(sizeof(struct session_chain), 0);
|
||||
|
||||
if (temp == 0)
|
||||
{
|
||||
LOG(LOG_LEVEL_ERROR, "Out of memory error: cannot create new session "
|
||||
"chain element - user %s", username);
|
||||
return E_SCP_SCREATE_NO_MEMORY;
|
||||
}
|
||||
|
||||
temp->item = (struct session_item *)g_malloc(sizeof(struct session_item), 0);
|
||||
|
||||
if (temp->item == 0)
|
||||
{
|
||||
g_free(temp);
|
||||
LOG(LOG_LEVEL_ERROR, "Out of memory error: cannot create new session "
|
||||
"item - user %s", username);
|
||||
return E_SCP_SCREATE_NO_MEMORY;
|
||||
}
|
||||
|
||||
display = session_get_avail_display_from_chain();
|
||||
|
||||
if (display == 0)
|
||||
{
|
||||
g_free(temp->item);
|
||||
g_free(temp);
|
||||
return E_SCP_SCREATE_NO_DISPLAY;
|
||||
}
|
||||
|
||||
/* Create a GUID for the new session before we fork */
|
||||
*guid = guid_new();
|
||||
*returned_display = display;
|
||||
|
||||
pid = g_fork(); /* parent is fork from tcp accept,
|
||||
child forks X and wm, then becomes scp */
|
||||
|
||||
if (pid == -1)
|
||||
{
|
||||
LOG(LOG_LEVEL_ERROR,
|
||||
"[session start] (display %d): Failed to fork for scp with "
|
||||
"errno: %d, description: %s",
|
||||
display, g_get_errno(), g_get_strerror());
|
||||
g_free(temp->item);
|
||||
g_free(temp);
|
||||
return E_SCP_SCREATE_GENERAL_ERROR;
|
||||
}
|
||||
|
||||
if (pid == 0)
|
||||
{
|
||||
LOG(LOG_LEVEL_INFO,
|
||||
"[session start] (display %d): calling auth_start_session from pid %d",
|
||||
display, g_getpid());
|
||||
|
||||
/* Wait objects created in a parent are not valid in a child */
|
||||
g_delete_wait_obj(g_reload_event);
|
||||
g_delete_wait_obj(g_sigchld_event);
|
||||
g_delete_wait_obj(g_term_event);
|
||||
|
||||
/* Set the secondary groups before starting the session to prevent
|
||||
* problems on PAM-based systems (see Linux pam_setcred(3)).
|
||||
* If we have *BSD setusercontext() this is not done here */
|
||||
#ifndef HAVE_SETUSERCONTEXT
|
||||
if (g_initgroups(username) != 0)
|
||||
{
|
||||
LOG(LOG_LEVEL_ERROR,
|
||||
"Failed to initialise secondary groups for %s: %s",
|
||||
username, g_get_strerror());
|
||||
g_exit(1);
|
||||
}
|
||||
#endif
|
||||
|
||||
sesman_close_all(0);
|
||||
auth_start_session(auth_info, display);
|
||||
g_sprintf(geometry, "%dx%d", s->width, s->height);
|
||||
g_sprintf(depth, "%d", s->bpp);
|
||||
g_sprintf(screen, ":%d", display);
|
||||
#if defined(__FreeBSD__) || defined(__FreeBSD_kernel__)
|
||||
/*
|
||||
* FreeBSD bug
|
||||
* ports/157282: effective login name is not set by xrdp-sesman
|
||||
* http://www.freebsd.org/cgi/query-pr.cgi?pr=157282
|
||||
*
|
||||
* from:
|
||||
* $OpenBSD: session.c,v 1.252 2010/03/07 11:57:13 dtucker Exp $
|
||||
* with some ideas about BSD process grouping to xrdp
|
||||
*/
|
||||
pid_t bsdsespid = g_fork();
|
||||
|
||||
if (bsdsespid == -1)
|
||||
{
|
||||
}
|
||||
else if (bsdsespid == 0) /* BSD session leader */
|
||||
{
|
||||
/**
|
||||
* Create a new session and process group since the 4.4BSD
|
||||
* setlogin() affects the entire process group
|
||||
*/
|
||||
if (g_setsid() < 0)
|
||||
{
|
||||
LOG(LOG_LEVEL_WARNING,
|
||||
"[session start] (display %d): setsid failed - pid %d",
|
||||
display, g_getpid());
|
||||
}
|
||||
|
||||
if (g_setlogin(username) < 0)
|
||||
{
|
||||
LOG(LOG_LEVEL_WARNING,
|
||||
"[session start] (display %d): setlogin failed for user %s - pid %d",
|
||||
display, username, g_getpid());
|
||||
}
|
||||
}
|
||||
|
||||
g_waitpid(bsdsespid);
|
||||
|
||||
if (bsdsespid > 0)
|
||||
{
|
||||
g_exit(0);
|
||||
/*
|
||||
* intermediate sesman should exit here after WM exits.
|
||||
* do not execute the following codes.
|
||||
*/
|
||||
}
|
||||
#endif
|
||||
window_manager_pid = g_fork(); /* parent becomes X,
|
||||
child forks wm, and waits, todo */
|
||||
if (window_manager_pid == -1)
|
||||
{
|
||||
LOG(LOG_LEVEL_ERROR,
|
||||
"Failed to fork for the window manager on display %d", display);
|
||||
}
|
||||
else if (window_manager_pid == 0)
|
||||
{
|
||||
enum xwait_status xws;
|
||||
|
||||
env_set_user(s->uid,
|
||||
0,
|
||||
display,
|
||||
g_cfg->env_names,
|
||||
g_cfg->env_values);
|
||||
xws = wait_for_xserver(display);
|
||||
|
||||
if (xws == XW_STATUS_OK)
|
||||
{
|
||||
auth_set_env(auth_info);
|
||||
if (s->directory != 0)
|
||||
{
|
||||
if (s->directory[0] != 0)
|
||||
{
|
||||
g_set_current_dir(s->directory);
|
||||
}
|
||||
}
|
||||
if (s->shell != 0 && s->shell[0] != 0)
|
||||
{
|
||||
if (g_strchr(s->shell, ' ') != 0 || g_strchr(s->shell, '\t') != 0)
|
||||
{
|
||||
LOG(LOG_LEVEL_INFO,
|
||||
"Starting user requested window manager on "
|
||||
"display %d with embedded arguments using a shell: %s",
|
||||
display, s->shell);
|
||||
const char *argv[] = {"sh", "-c", s->shell, NULL};
|
||||
g_execvp("/bin/sh", (char **)argv);
|
||||
}
|
||||
else
|
||||
{
|
||||
LOG(LOG_LEVEL_INFO,
|
||||
"Starting user requested window manager on "
|
||||
"display %d: %s", display, s->shell);
|
||||
g_execlp3(s->shell, s->shell, 0);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
LOG(LOG_LEVEL_DEBUG, "The user session on display %d did "
|
||||
"not request a specific window manager", display);
|
||||
}
|
||||
|
||||
/* try to execute user window manager if enabled */
|
||||
if (g_cfg->enable_user_wm)
|
||||
{
|
||||
g_sprintf(text, "%s/%s", g_getenv("HOME"), g_cfg->user_wm);
|
||||
if (g_file_exist(text))
|
||||
{
|
||||
LOG(LOG_LEVEL_INFO,
|
||||
"Starting window manager on display %d"
|
||||
" from user home directory: %s", display, text);
|
||||
g_execlp3(text, g_cfg->user_wm, 0);
|
||||
}
|
||||
else
|
||||
{
|
||||
LOG(LOG_LEVEL_DEBUG,
|
||||
"The user home directory window manager configuration "
|
||||
"is enabled but window manager program does not exist: %s",
|
||||
text);
|
||||
}
|
||||
}
|
||||
|
||||
LOG(LOG_LEVEL_INFO,
|
||||
"Starting the default window manager on display %d: %s",
|
||||
display, g_cfg->default_wm);
|
||||
g_execlp3(g_cfg->default_wm, g_cfg->default_wm, 0);
|
||||
|
||||
/* still a problem starting window manager just start xterm */
|
||||
LOG(LOG_LEVEL_WARNING,
|
||||
"No window manager on display %d started, "
|
||||
"so falling back to starting xterm for user debugging",
|
||||
display);
|
||||
g_execlp3("xterm", "xterm", 0);
|
||||
|
||||
/* should not get here */
|
||||
}
|
||||
else
|
||||
{
|
||||
switch (xws)
|
||||
{
|
||||
case XW_STATUS_TIMED_OUT:
|
||||
LOG(LOG_LEVEL_ERROR, "Timed out waiting for X server");
|
||||
break;
|
||||
case XW_STATUS_FAILED_TO_START:
|
||||
LOG(LOG_LEVEL_ERROR, "X server failed to start");
|
||||
break;
|
||||
default:
|
||||
LOG(LOG_LEVEL_ERROR,
|
||||
"An error occurred waiting for the X server");
|
||||
}
|
||||
}
|
||||
|
||||
LOG(LOG_LEVEL_ERROR, "A fatal error has occurred attempting to start "
|
||||
"the window manager on display %d, aborting connection",
|
||||
display);
|
||||
g_exit(0);
|
||||
}
|
||||
else
|
||||
{
|
||||
display_pid = g_fork(); /* parent becomes scp,
|
||||
child becomes X */
|
||||
if (display_pid == -1)
|
||||
{
|
||||
LOG(LOG_LEVEL_ERROR,
|
||||
"Failed to fork for the X server on display %d", display);
|
||||
}
|
||||
else if (display_pid == 0) /* child */
|
||||
{
|
||||
if (s->type == SCP_SESSION_TYPE_XVNC)
|
||||
{
|
||||
env_set_user(s->uid,
|
||||
&passwd_file,
|
||||
display,
|
||||
g_cfg->env_names,
|
||||
g_cfg->env_values);
|
||||
}
|
||||
else
|
||||
{
|
||||
env_set_user(s->uid,
|
||||
0,
|
||||
display,
|
||||
g_cfg->env_names,
|
||||
g_cfg->env_values);
|
||||
}
|
||||
|
||||
/* setting Xserver environment variables */
|
||||
g_snprintf(text, 255, "%d", g_cfg->sess.max_idle_time);
|
||||
g_setenv("XRDP_SESMAN_MAX_IDLE_TIME", text, 1);
|
||||
g_snprintf(text, 255, "%d", g_cfg->sess.max_disc_time);
|
||||
g_setenv("XRDP_SESMAN_MAX_DISC_TIME", text, 1);
|
||||
g_snprintf(text, 255, "%d", g_cfg->sess.kill_disconnected);
|
||||
g_setenv("XRDP_SESMAN_KILL_DISCONNECTED", text, 1);
|
||||
g_setenv("XRDP_SOCKET_PATH", XRDP_SOCKET_PATH, 1);
|
||||
|
||||
/* prepare the Xauthority stuff */
|
||||
if (g_getenv("XAUTHORITY") != NULL)
|
||||
{
|
||||
g_snprintf(authfile, 255, "%s", g_getenv("XAUTHORITY"));
|
||||
}
|
||||
else
|
||||
{
|
||||
g_snprintf(authfile, 255, "%s", ".Xauthority");
|
||||
}
|
||||
|
||||
/* Add the entry in XAUTHORITY file or exit if error */
|
||||
if (add_xauth_cookie(display, authfile) != 0)
|
||||
{
|
||||
LOG(LOG_LEVEL_ERROR,
|
||||
"Error setting the xauth cookie for display %d in file %s",
|
||||
display, authfile);
|
||||
|
||||
LOG(LOG_LEVEL_ERROR, "A fatal error has occurred attempting to start "
|
||||
"the X server on display %d, aborting connection",
|
||||
display);
|
||||
g_exit(1);
|
||||
}
|
||||
|
||||
if (s->type == SCP_SESSION_TYPE_XORG)
|
||||
{
|
||||
#ifdef HAVE_SYS_PRCTL_H
|
||||
/*
|
||||
* Make sure Xorg doesn't run setuid root. Root access is not
|
||||
* needed. Xorg can fail when run as root and the user has no
|
||||
* console permissions.
|
||||
* PR_SET_NO_NEW_PRIVS requires Linux kernel 3.5 and newer.
|
||||
*/
|
||||
if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) < 0)
|
||||
{
|
||||
LOG(LOG_LEVEL_WARNING,
|
||||
"[session start] (display %d): Failed to disable "
|
||||
"setuid on X server: %s",
|
||||
display, g_get_strerror());
|
||||
}
|
||||
#endif
|
||||
|
||||
xserver_params = list_create();
|
||||
xserver_params->auto_free = 1;
|
||||
|
||||
/* get path of Xorg from config */
|
||||
xserver = g_strdup((const char *)list_get_item(g_cfg->xorg_params, 0));
|
||||
|
||||
/* these are the must have parameters */
|
||||
list_add_strdup_multi(xserver_params,
|
||||
xserver, screen,
|
||||
"-auth", authfile,
|
||||
NULL);
|
||||
|
||||
/* additional parameters from sesman.ini file */
|
||||
list_append_list_strdup(g_cfg->xorg_params, xserver_params, 1);
|
||||
|
||||
/* some args are passed via env vars */
|
||||
g_sprintf(geometry, "%d", s->width);
|
||||
g_setenv("XRDP_START_WIDTH", geometry, 1);
|
||||
|
||||
g_sprintf(geometry, "%d", s->height);
|
||||
g_setenv("XRDP_START_HEIGHT", geometry, 1);
|
||||
}
|
||||
else if (s->type == SCP_SESSION_TYPE_XVNC)
|
||||
{
|
||||
char guid_str[GUID_STR_SIZE];
|
||||
guid_to_str(guid, guid_str);
|
||||
env_check_password_file(passwd_file, guid_str);
|
||||
xserver_params = list_create();
|
||||
xserver_params->auto_free = 1;
|
||||
|
||||
/* get path of Xvnc from config */
|
||||
xserver = g_strdup((const char *)list_get_item(g_cfg->vnc_params, 0));
|
||||
|
||||
/* these are the must have parameters */
|
||||
list_add_strdup_multi(xserver_params,
|
||||
xserver, screen,
|
||||
"-auth", authfile,
|
||||
"-geometry", geometry,
|
||||
"-depth", depth,
|
||||
"-rfbauth", passwd_file,
|
||||
NULL);
|
||||
g_free(passwd_file);
|
||||
|
||||
/* additional parameters from sesman.ini file */
|
||||
//config_read_xserver_params(SCP_SESSION_TYPE_XVNC,
|
||||
// xserver_params);
|
||||
list_append_list_strdup(g_cfg->vnc_params, xserver_params, 1);
|
||||
}
|
||||
else
|
||||
{
|
||||
LOG(LOG_LEVEL_ERROR, "Unknown session type: %d",
|
||||
s->type);
|
||||
LOG(LOG_LEVEL_ERROR, "A fatal error has occurred attempting "
|
||||
"to start the X server on display %d, aborting connection",
|
||||
display);
|
||||
g_exit(1);
|
||||
}
|
||||
|
||||
/* fire up X server */
|
||||
LOG(LOG_LEVEL_INFO, "Starting X server on display %d: %s",
|
||||
display, dumpItemsToString(xserver_params, execvpparams, 2048));
|
||||
g_execvp_list(xserver, xserver_params);
|
||||
|
||||
/* should not get here */
|
||||
LOG(LOG_LEVEL_ERROR,
|
||||
"Error starting X server on display %d", display);
|
||||
LOG(LOG_LEVEL_ERROR, "A fatal error has occurred attempting "
|
||||
"to start the X server on display %d, aborting connection",
|
||||
display);
|
||||
|
||||
list_delete(xserver_params);
|
||||
g_exit(1);
|
||||
}
|
||||
else
|
||||
{
|
||||
int wm_wait_time;
|
||||
struct exit_status wm_exit_status;
|
||||
struct exit_status xserver_exit_status;
|
||||
struct exit_status chansrv_exit_status;
|
||||
char reason[128];
|
||||
chansrv_pid = session_start_chansrv(s->uid, display);
|
||||
|
||||
LOG(LOG_LEVEL_INFO,
|
||||
"Session started successfully for user %s on display %d",
|
||||
username, display);
|
||||
|
||||
/* Monitor the amount of time we wait for the
|
||||
* window manager. This is approximately how long the window
|
||||
* manager was running for */
|
||||
LOG(LOG_LEVEL_INFO, "Session in progress on display %d, waiting "
|
||||
"until the window manager (pid %d) exits to end the session",
|
||||
display, window_manager_pid);
|
||||
wm_wait_time = g_time1();
|
||||
wm_exit_status = g_waitpid_status(window_manager_pid);
|
||||
wm_wait_time = g_time1() - wm_wait_time;
|
||||
if (wm_exit_status.reason == E_XR_STATUS_CODE &&
|
||||
wm_exit_status.val == 0)
|
||||
{
|
||||
// Normal exit
|
||||
}
|
||||
else
|
||||
{
|
||||
exit_status_to_str(&wm_exit_status, reason, sizeof(reason));
|
||||
|
||||
LOG(LOG_LEVEL_WARNING,
|
||||
"Window manager (pid %d, display %d) "
|
||||
"exited with %s. This "
|
||||
"could indicate a window manager config problem",
|
||||
window_manager_pid, display, reason);
|
||||
}
|
||||
if (wm_wait_time < 10)
|
||||
{
|
||||
/* This could be a config issue. Log a significant error */
|
||||
LOG(LOG_LEVEL_WARNING, "Window manager (pid %d, display %d) "
|
||||
"exited quickly (%d secs). This could indicate a window "
|
||||
"manager config problem",
|
||||
window_manager_pid, display, wm_wait_time);
|
||||
}
|
||||
else
|
||||
{
|
||||
LOG(LOG_LEVEL_DEBUG, "Window manager (pid %d, display %d) "
|
||||
"was running for %d seconds.",
|
||||
window_manager_pid, display, wm_wait_time);
|
||||
}
|
||||
LOG(LOG_LEVEL_INFO,
|
||||
"Calling auth_stop_session from pid %d",
|
||||
g_getpid());
|
||||
auth_stop_session(auth_info);
|
||||
// auth_end() is called from the main process currently,
|
||||
// as this called auth_start()
|
||||
//auth_end(auth_info);
|
||||
|
||||
LOG(LOG_LEVEL_INFO,
|
||||
"Terminating X server (pid %d) on display %d",
|
||||
display_pid, display);
|
||||
g_sigterm(display_pid);
|
||||
|
||||
LOG(LOG_LEVEL_INFO, "Terminating the xrdp channel server (pid %d) "
|
||||
"on display %d", chansrv_pid, display);
|
||||
g_sigterm(chansrv_pid);
|
||||
|
||||
/* make sure socket cleanup happen after child process exit */
|
||||
xserver_exit_status = g_waitpid_status(display_pid);
|
||||
exit_status_to_str(&xserver_exit_status, reason, sizeof(reason));
|
||||
LOG(LOG_LEVEL_INFO,
|
||||
"X server on display %d (pid %d) exited with %s",
|
||||
display, display_pid, reason);
|
||||
|
||||
chansrv_exit_status = g_waitpid_status(chansrv_pid);
|
||||
exit_status_to_str(&chansrv_exit_status, reason, sizeof(reason));
|
||||
LOG(LOG_LEVEL_INFO,
|
||||
"xrdp channel server for display %d (pid %d)"
|
||||
" exited with %s",
|
||||
display, chansrv_pid, reason);
|
||||
|
||||
cleanup_sockets(display);
|
||||
g_deinit();
|
||||
g_exit(0);
|
||||
}
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
LOG(LOG_LEVEL_INFO, "Starting session: session_pid %d, "
|
||||
"display :%d.0, width %d, height %d, bpp %d, client ip %s, "
|
||||
"UID %d",
|
||||
pid, display, s->width, s->height, s->bpp, s->ip_addr, s->uid);
|
||||
temp->item->pid = pid;
|
||||
temp->item->display = display;
|
||||
temp->item->width = s->width;
|
||||
temp->item->height = s->height;
|
||||
temp->item->bpp = s->bpp;
|
||||
temp->item->auth_info = auth_info;
|
||||
g_strncpy(temp->item->start_ip_addr, s->ip_addr,
|
||||
sizeof(temp->item->start_ip_addr) - 1);
|
||||
temp->item->uid = s->uid;
|
||||
temp->item->guid = *guid;
|
||||
|
||||
temp->item->start_time = g_time1();
|
||||
|
||||
temp->item->type = s->type;
|
||||
temp->item->status = SESMAN_SESSION_STATUS_ACTIVE;
|
||||
|
||||
temp->next = g_sessions;
|
||||
g_sessions = temp;
|
||||
g_session_count++;
|
||||
|
||||
return E_SCP_SCREATE_OK;
|
||||
}
|
||||
|
||||
/* Shouldn't get here */
|
||||
g_free(temp->item);
|
||||
g_free(temp);
|
||||
return E_SCP_SCREATE_GENERAL_ERROR;
|
||||
}
|
||||
|
||||
/******************************************************************************/
|
||||
int
|
||||
session_reconnect(int display, int uid,
|
||||
struct auth_info *auth_info)
|
||||
{
|
||||
int pid;
|
||||
|
||||
pid = g_fork();
|
||||
|
||||
if (pid == -1)
|
||||
{
|
||||
LOG(LOG_LEVEL_ERROR, "Failed to fork for session reconnection script");
|
||||
}
|
||||
else if (pid == 0)
|
||||
{
|
||||
env_set_user(uid,
|
||||
0,
|
||||
display,
|
||||
g_cfg->env_names,
|
||||
g_cfg->env_values);
|
||||
auth_set_env(auth_info);
|
||||
|
||||
if (g_file_exist(g_cfg->reconnect_sh))
|
||||
{
|
||||
LOG(LOG_LEVEL_INFO,
|
||||
"Starting session reconnection script on display %d: %s",
|
||||
display, g_cfg->reconnect_sh);
|
||||
g_execlp3(g_cfg->reconnect_sh, g_cfg->reconnect_sh, 0);
|
||||
|
||||
/* should not get here */
|
||||
LOG(LOG_LEVEL_ERROR,
|
||||
"Error starting session reconnection script on display %d: %s",
|
||||
display, g_cfg->reconnect_sh);
|
||||
}
|
||||
else
|
||||
{
|
||||
LOG(LOG_LEVEL_WARNING,
|
||||
"Session reconnection script file does not exist: %s",
|
||||
g_cfg->reconnect_sh);
|
||||
}
|
||||
|
||||
/* TODO: why is this existing with a success error code when the
|
||||
reconnect script failed to be executed? */
|
||||
g_exit(0);
|
||||
}
|
||||
|
||||
return display;
|
||||
}
|
||||
|
||||
/******************************************************************************/
|
||||
enum session_kill_status
|
||||
session_kill(int pid)
|
||||
@ -1265,98 +580,3 @@ free_session_info_list(struct scp_session_info *sesslist, unsigned int cnt)
|
||||
|
||||
g_free(sesslist);
|
||||
}
|
||||
|
||||
/******************************************************************************/
|
||||
int
|
||||
cleanup_sockets(int display)
|
||||
{
|
||||
LOG(LOG_LEVEL_INFO, "cleanup_sockets:");
|
||||
char file[256];
|
||||
int error;
|
||||
|
||||
error = 0;
|
||||
|
||||
g_snprintf(file, 255, CHANSRV_PORT_OUT_STR, display);
|
||||
if (g_file_exist(file))
|
||||
{
|
||||
LOG(LOG_LEVEL_DEBUG, "cleanup_sockets: deleting %s", file);
|
||||
if (g_file_delete(file) == 0)
|
||||
{
|
||||
LOG(LOG_LEVEL_WARNING,
|
||||
"cleanup_sockets: failed to delete %s (%s)",
|
||||
file, g_get_strerror());
|
||||
error++;
|
||||
}
|
||||
}
|
||||
|
||||
g_snprintf(file, 255, CHANSRV_PORT_IN_STR, display);
|
||||
if (g_file_exist(file))
|
||||
{
|
||||
LOG(LOG_LEVEL_DEBUG, "cleanup_sockets: deleting %s", file);
|
||||
if (g_file_delete(file) == 0)
|
||||
{
|
||||
LOG(LOG_LEVEL_WARNING,
|
||||
"cleanup_sockets: failed to delete %s (%s)",
|
||||
file, g_get_strerror());
|
||||
error++;
|
||||
}
|
||||
}
|
||||
|
||||
g_snprintf(file, 255, XRDP_CHANSRV_STR, display);
|
||||
if (g_file_exist(file))
|
||||
{
|
||||
LOG(LOG_LEVEL_DEBUG, "cleanup_sockets: deleting %s", file);
|
||||
if (g_file_delete(file) == 0)
|
||||
{
|
||||
LOG(LOG_LEVEL_WARNING,
|
||||
"cleanup_sockets: failed to delete %s (%s)",
|
||||
file, g_get_strerror());
|
||||
error++;
|
||||
}
|
||||
}
|
||||
|
||||
g_snprintf(file, 255, CHANSRV_API_STR, display);
|
||||
if (g_file_exist(file))
|
||||
{
|
||||
LOG(LOG_LEVEL_DEBUG, "cleanup_sockets: deleting %s", file);
|
||||
if (g_file_delete(file) == 0)
|
||||
{
|
||||
LOG(LOG_LEVEL_WARNING,
|
||||
"cleanup_sockets: failed to delete %s (%s)",
|
||||
file, g_get_strerror());
|
||||
error++;
|
||||
}
|
||||
}
|
||||
|
||||
/* the following files should be deleted by xorgxrdp
|
||||
* but just in case the deletion failed */
|
||||
|
||||
g_snprintf(file, 255, XRDP_X11RDP_STR, display);
|
||||
if (g_file_exist(file))
|
||||
{
|
||||
LOG(LOG_LEVEL_DEBUG, "cleanup_sockets: deleting %s", file);
|
||||
if (g_file_delete(file) == 0)
|
||||
{
|
||||
LOG(LOG_LEVEL_WARNING,
|
||||
"cleanup_sockets: failed to delete %s (%s)",
|
||||
file, g_get_strerror());
|
||||
error++;
|
||||
}
|
||||
}
|
||||
|
||||
g_snprintf(file, 255, XRDP_DISCONNECT_STR, display);
|
||||
if (g_file_exist(file))
|
||||
{
|
||||
LOG(LOG_LEVEL_DEBUG, "cleanup_sockets: deleting %s", file);
|
||||
if (g_file_delete(file) == 0)
|
||||
{
|
||||
LOG(LOG_LEVEL_WARNING,
|
||||
"cleanup_sockets: failed to delete %s (%s)",
|
||||
file, g_get_strerror());
|
||||
error++;
|
||||
}
|
||||
}
|
||||
|
||||
return error;
|
||||
|
||||
}
|
||||
|
@ -18,15 +18,15 @@
|
||||
|
||||
/**
|
||||
*
|
||||
* @file session.h
|
||||
* @brief Session management definitions
|
||||
* @file session_list.h
|
||||
* @brief Session list management definitions
|
||||
* @author Jay Sorg, Simone Fedele
|
||||
*
|
||||
*/
|
||||
|
||||
|
||||
#ifndef SESSION_H
|
||||
#define SESSION_H
|
||||
#ifndef SESSION_LIST_H
|
||||
#define SESSION_LIST_H
|
||||
|
||||
#include <time.h>
|
||||
|
||||
@ -34,6 +34,8 @@
|
||||
#include "scp_application_types.h"
|
||||
#include "xrdp_constants.h"
|
||||
|
||||
struct session_parameters;
|
||||
|
||||
#define SESMAN_SESSION_STATUS_ACTIVE 0x01
|
||||
#define SESMAN_SESSION_STATUS_IDLE 0x02
|
||||
#define SESMAN_SESSION_STATUS_DISCONNECTED 0x04
|
||||
@ -51,6 +53,9 @@ enum session_kill_status
|
||||
|
||||
struct scp_session_info;
|
||||
|
||||
/**
|
||||
* Object describing a session
|
||||
*/
|
||||
struct session_item
|
||||
{
|
||||
int uid; /* UID of session */
|
||||
@ -79,21 +84,25 @@ struct session_chain
|
||||
struct session_item *item;
|
||||
};
|
||||
|
||||
/**
|
||||
* Returns the number of sessions currently active
|
||||
* @return Session count
|
||||
*/
|
||||
unsigned int
|
||||
session_get_count(void);
|
||||
|
||||
/**
|
||||
* Information used to start or find a session
|
||||
* Adds a new session item to the chain
|
||||
*/
|
||||
struct session_parameters
|
||||
{
|
||||
int uid;
|
||||
enum scp_session_type type;
|
||||
unsigned short height;
|
||||
unsigned short width;
|
||||
unsigned char bpp;
|
||||
const char *shell;
|
||||
const char *directory;
|
||||
const char *ip_addr;
|
||||
};
|
||||
void
|
||||
session_chain_add(struct session_chain *element);
|
||||
|
||||
/**
|
||||
* Get the next available display
|
||||
*/
|
||||
int
|
||||
session_get_available_display(void);
|
||||
|
||||
|
||||
/**
|
||||
*
|
||||
@ -102,26 +111,12 @@ struct session_parameters
|
||||
*
|
||||
*/
|
||||
struct session_item *
|
||||
session_get_bydata(const struct session_parameters *params);
|
||||
#ifndef session_find_item
|
||||
#define session_find_item(a) session_get_bydata(a)
|
||||
#endif
|
||||
|
||||
/**
|
||||
*
|
||||
* @brief starts a session
|
||||
*
|
||||
* @return Connection status.
|
||||
*/
|
||||
enum scp_screate_status
|
||||
session_start(struct auth_info *auth_info,
|
||||
const struct session_parameters *params,
|
||||
int *display,
|
||||
struct guid *guid);
|
||||
|
||||
int
|
||||
session_reconnect(int display, int uid,
|
||||
struct auth_info *auth_info);
|
||||
session_get_bydata(uid_t uid,
|
||||
enum scp_session_type type,
|
||||
unsigned short width,
|
||||
unsigned short height,
|
||||
unsigned char bpp,
|
||||
const char *ip_addr);
|
||||
|
||||
/**
|
||||
*
|
||||
@ -173,22 +168,4 @@ session_get_byuid(int uid, unsigned int *cnt, unsigned char flags);
|
||||
void
|
||||
free_session_info_list(struct scp_session_info *sesslist, unsigned int cnt);
|
||||
|
||||
/**
|
||||
*
|
||||
* @brief delete socket files
|
||||
* @param display number
|
||||
* @return non-zero value (number of errors) if failed
|
||||
*/
|
||||
int cleanup_sockets(int display);
|
||||
|
||||
/**
|
||||
* Clone a session_parameters structure
|
||||
*
|
||||
* @param sp Parameters to clone
|
||||
* @return Cloned parameters, or NULL if no memory
|
||||
*
|
||||
* The cloned structure can be free'd with a single call to g_free()
|
||||
*/
|
||||
struct session_parameters *
|
||||
clone_session_params(const struct session_parameters *sp);
|
||||
#endif
|
||||
#endif // SESSION_LIST_H
|
||||
|
@ -35,7 +35,7 @@
|
||||
#include "log.h"
|
||||
#include "os_calls.h"
|
||||
#include "sesman.h"
|
||||
#include "session.h"
|
||||
#include "session_list.h"
|
||||
#include "string_calls.h"
|
||||
|
||||
/******************************************************************************/
|
||||
|
Loading…
x
Reference in New Issue
Block a user