2 * Copyright (c) 2008 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 #include "system/filesys.h"
36 #include "system/wait.h"
50 #endif /* STREAMPTY */
56 enum { CMD_EXPECT = 0, CMD_SEND, CMD_PASSWORD } type;
66 static struct command *commands, **next = &commands;
68 static sig_atomic_t alarmset = 0;
70 static int opt_timeout = 10;
71 static int opt_verbose;
75 static char line[256] = { 0 };
77 static void caught_signal(int signo)
83 static void open_pty(void)
86 printf("implement open_pty\n");
89 #if defined(HAVE_OPENPTY) || defined(__linux) || defined(__osf__) /* XXX */
90 if(openpty(&master, &slave, line, 0, 0) == 0)
92 #endif /* HAVE_OPENPTY .... */
104 for(q = clone; *q; q++){
105 master = open(*q, O_RDWR);
113 strlcpy(line, ptsname(master), sizeof(line));
114 slave = open(line, O_RDWR);
116 errx(1, "failed to open slave when using %s", *q);
117 ioctl(slave, I_PUSH, "ptem");
118 ioctl(slave, I_PUSH, "ldterm");
124 #endif /* STREAMSPTY */
126 /* more cases, like open /dev/ptmx, etc */
135 static char *iscmd(const char *buf, const char *s)
137 size_t len = strlen(s);
139 if (strncmp(buf, s, len) != 0) {
143 return strdup(buf + len);
146 /*******************************************************************
147 A write wrapper that will deal with EINTR.
148 ********************************************************************/
150 static ssize_t sys_write(int fd, const void *buf, size_t count)
155 ret = write(fd, buf, count);
156 #if defined(EWOULDBLOCK)
157 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
159 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
164 static void parse_configuration(const char *fn)
169 unsigned int lineno = 0;
172 cmd = fopen(fn, "r");
174 err(1, "open: %s", fn);
176 while (fgets(s, sizeof(s), cmd) != NULL) {
178 s[strcspn(s, "#\n")] = '\0';
181 c = calloc(1, sizeof(*c));
189 if ((str = iscmd(s, "expect ")) != NULL) {
190 c->type = CMD_EXPECT;
192 } else if ((str = iscmd(s, "send ")) != NULL) {
195 } else if ((str = iscmd(s, "password ")) != NULL) {
196 c->type = CMD_PASSWORD;
199 errx(1, "Invalid command on line %d: %s", lineno, s);
205 /* A wrapper to close als file descriptors above the given fd */
206 static int sys_closefrom(int fd)
208 int num = getdtablesize();
214 for (; fd <= num; fd++) {
226 static int eval_parent(pid_t pid)
233 for (c = commands; c != NULL; c = c->next) {
237 printf("[expecting %s]\n", c->str);
241 while((sret = read(master, &in, sizeof(in))) > 0) {
244 if (c->str[len] != in) {
249 if (c->str[len] == '\0') {
254 if (alarmset == SIGALRM) {
255 errx(1, "timeout waiting for %s (line %u)",
257 } else if (alarmset) {
258 errx(1, "got a signal %d waiting for %s (line %u)",
259 (int)alarmset, c->str, c->lineno);
263 errx(1, "end command while waiting for %s (line %u)",
270 const char *msg = (c->type == CMD_PASSWORD) ? "****" : c->str;
273 printf("[send %s]\n", msg);
276 len = strlen(c->str);
279 if (c->str[i] == '\\' && i < len - 1) {
294 "unknown control char %c (line %u)",
298 if (sys_write(master, &ctrl, 1) != 1) {
299 errx(1, "command refused input (line %u)", c->lineno);
302 if (sys_write(master, &c->str[i], 1) != 1) {
303 errx(1, "command refused input (line %u)", c->lineno);
315 while(read(master, &in, sizeof(in)) > 0) {
320 printf("[end of program]\n");
324 * Fetch status from child
329 ret = waitpid(pid, &status, 0);
334 if (WIFEXITED(status) && WEXITSTATUS(status)) {
335 return WEXITSTATUS(status);
336 } else if (WIFSIGNALED(status)) {
337 printf("killed by signal: %d\n", WTERMSIG(status));
348 struct poptOption long_options[] = {
350 {"timeout", 't', POPT_ARG_INT, &opt_timeout, 't'},
351 {"verbose", 'v', POPT_ARG_NONE, &opt_verbose, 'v'},
355 int main(int argc, const char **argv)
360 const char *instruction_file;
363 char * const *program_args;
365 pc = poptGetContext("texpect",
369 POPT_CONTEXT_POSIXMEHARDER);
372 poptPrintHelp(pc, stderr, 0);
376 while ((optidx = poptGetNextOpt(pc)) != -1) {
380 instruction_file = poptGetArg(pc);
381 args = poptGetArgs(pc);
382 program_args = (char * const *)discard_const_p(char *, args);
383 program = program_args[0];
388 printf("Using instruction_file: %s\n", instruction_file);
389 printf("Executing '%s' ", program);
390 for (i = 0; program_args && program_args[i] != NULL; i++) {
391 printf("'%s' ", program_args[i]);
396 parse_configuration(instruction_file);
403 err(1, "Failed to fork");
409 dup2(slave, STDIN_FILENO);
410 dup2(slave, STDOUT_FILENO);
411 dup2(slave, STDERR_FILENO);
413 sys_closefrom(STDERR_FILENO + 1);
415 /* texpect <expect_instructions> <progname> [<args>] */
416 execvp(program, program_args);
417 err(1, "Failed to exec: %s", program);
423 sa.sa_handler = caught_signal;
425 sigemptyset (&sa.sa_mask);
427 sigaction(SIGALRM, &sa, NULL);
430 return eval_parent(pid);