374bd88d10
The only functional changes in this patch are a removal of use of Xtrans internals -- replaced by xcb, which doesn't seem to be used elsewhere in the server? Pity. Also, a fix to make all X11 windows pop to the front of the display when the X11.app icon is clicked -- currently takes two clicks, not sure why.
902 lines
20 KiB
C
902 lines
20 KiB
C
/* bundle-main.c -- X server launcher
|
|
|
|
Copyright (c) 2002-2007 Apple Inc. All rights reserved.
|
|
|
|
Permission is hereby granted, free of charge, to any person
|
|
obtaining a copy of this software and associated documentation files
|
|
(the "Software"), to deal in the Software without restriction,
|
|
including without limitation the rights to use, copy, modify, merge,
|
|
publish, distribute, sublicense, and/or sell copies of the Software,
|
|
and to permit persons to whom the Software is furnished to do so,
|
|
subject to the following conditions:
|
|
|
|
The above copyright notice and this permission notice shall be
|
|
included in all copies or substantial portions of the Software.
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
NONINFRINGEMENT. IN NO EVENT SHALL THE ABOVE LISTED COPYRIGHT
|
|
HOLDER(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
|
|
WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
|
DEALINGS IN THE SOFTWARE.
|
|
|
|
Except as contained in this notice, the name(s) of the above
|
|
copyright holders shall not be used in advertising or otherwise to
|
|
promote the sale, use or other dealings in this Software without
|
|
prior written authorization.
|
|
|
|
Parts of this file are derived from xdm, which has this copyright:
|
|
|
|
Copyright 1988, 1998 The Open Group
|
|
|
|
Permission to use, copy, modify, distribute, and sell this software
|
|
and its documentation for any purpose is hereby granted without fee,
|
|
provided that the above copyright notice appear in all copies and
|
|
that both that copyright notice and this permission notice appear in
|
|
supporting documentation.
|
|
|
|
The above copyright notice and this permission notice shall be
|
|
included in all copies or substantial portions of the Software.
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
NONINFRINGEMENT. IN NO EVENT SHALL THE OPEN GROUP BE LIABLE FOR ANY
|
|
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
|
|
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
|
|
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
Except as contained in this notice, the name of The Open Group shall
|
|
not be used in advertising or otherwise to promote the sale, use or
|
|
other dealings in this Software without prior written authorization
|
|
from The Open Group. */
|
|
|
|
#include <stdio.h>
|
|
#include <unistd.h>
|
|
#include <stdlib.h>
|
|
#include <fcntl.h>
|
|
#include <errno.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/utsname.h>
|
|
#include <ifaddrs.h>
|
|
#include <netdb.h>
|
|
#include <netinet/in.h>
|
|
#include <time.h>
|
|
#include <sys/wait.h>
|
|
#include <setjmp.h>
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <X11/Xlib.h>
|
|
#include <X11/Xauth.h>
|
|
#ifdef USE_XCB
|
|
#include <xcb/xcb.h>
|
|
#endif
|
|
#include <CoreFoundation/CoreFoundation.h>
|
|
#include <SystemConfiguration/SystemConfiguration.h>
|
|
|
|
#define X_SERVER "/usr/X11/bin/Xquartz"
|
|
#define XTERM_PATH "/usr/X11/bin/xterm"
|
|
#define WM_PATH "/usr/bin/quartz-wm"
|
|
#define DEFAULT_XINITRC "/usr/X11/lib/X11/xinit/xinitrc"
|
|
#define DEFAULT_PATH "/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/X11/bin"
|
|
|
|
/* what xinit does */
|
|
#ifndef SHELL
|
|
# define SHELL "sh"
|
|
#endif
|
|
|
|
#undef FALSE
|
|
#define FALSE 0
|
|
#undef TRUE
|
|
#define TRUE 1
|
|
|
|
#define MAX_DISPLAYS 64
|
|
|
|
static int server_pid = -1, client_pid = -1;
|
|
static int xinit_kills_server = FALSE;
|
|
static jmp_buf exit_continuation;
|
|
static const char *server_name = NULL;
|
|
static Display *server_dpy;
|
|
|
|
static char *auth_file;
|
|
|
|
typedef struct addr_list_struct addr_list;
|
|
|
|
struct addr_list_struct {
|
|
addr_list *next;
|
|
Xauth auth;
|
|
};
|
|
|
|
static addr_list *addresses;
|
|
|
|
|
|
/* Utility functions. */
|
|
|
|
/* Return the current host name. Matches what Xlib does. */
|
|
static char *
|
|
host_name (void)
|
|
{
|
|
#ifdef NEED_UTSNAME
|
|
static struct utsname name;
|
|
|
|
uname(&name);
|
|
|
|
return name.nodename;
|
|
#else
|
|
static char buf[100];
|
|
|
|
gethostname(buf, sizeof(buf));
|
|
|
|
return buf;
|
|
#endif
|
|
}
|
|
|
|
static int
|
|
read_boolean_pref (CFStringRef name, int default_)
|
|
{
|
|
int value;
|
|
Boolean ok;
|
|
|
|
value = CFPreferencesGetAppBooleanValue (name,
|
|
CFSTR ("com.apple.x11"), &ok);
|
|
return ok ? value : default_;
|
|
}
|
|
|
|
static inline int
|
|
binary_equal (const void *a, const void *b, int length)
|
|
{
|
|
return memcmp (a, b, length) == 0;
|
|
}
|
|
|
|
static inline void *
|
|
binary_dup (const void *a, int length)
|
|
{
|
|
void *b = malloc (length);
|
|
if (b != NULL)
|
|
memcpy (b, a, length);
|
|
return b;
|
|
}
|
|
|
|
static inline void
|
|
binary_free (void *data, int length)
|
|
{
|
|
if (data != NULL)
|
|
free (data);
|
|
}
|
|
|
|
|
|
/* Functions for managing the authentication entries. */
|
|
|
|
/* Returns true if something matching AUTH is in our list of auth items */
|
|
static int
|
|
check_auth_item (Xauth *auth)
|
|
{
|
|
addr_list *a;
|
|
|
|
for (a = addresses; a != NULL; a = a->next)
|
|
{
|
|
if (a->auth.family == auth->family
|
|
&& a->auth.address_length == auth->address_length
|
|
&& binary_equal (a->auth.address, auth->address, auth->address_length)
|
|
&& a->auth.number_length == auth->number_length
|
|
&& binary_equal (a->auth.number, auth->number, auth->number_length)
|
|
&& a->auth.name_length == auth->name_length
|
|
&& binary_equal (a->auth.name, auth->name, auth->name_length))
|
|
{
|
|
return TRUE;
|
|
}
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
/* Add one item to our list of auth items. */
|
|
static void
|
|
add_auth_item (Xauth *auth)
|
|
{
|
|
addr_list *a = malloc (sizeof (addr_list));
|
|
|
|
a->auth.family = auth->family;
|
|
a->auth.address_length = auth->address_length;
|
|
a->auth.address = binary_dup (auth->address, auth->address_length);
|
|
a->auth.number_length = auth->number_length;
|
|
a->auth.number = binary_dup (auth->number, auth->number_length);
|
|
a->auth.name_length = auth->name_length;
|
|
a->auth.name = binary_dup (auth->name, auth->name_length);
|
|
a->auth.data_length = auth->data_length;
|
|
a->auth.data = binary_dup (auth->data, auth->data_length);
|
|
|
|
a->next = addresses;
|
|
addresses = a;
|
|
}
|
|
|
|
/* Free all allocated auth items. */
|
|
static void
|
|
free_auth_items (void)
|
|
{
|
|
addr_list *a;
|
|
|
|
while ((a = addresses) != NULL)
|
|
{
|
|
addresses = a->next;
|
|
|
|
binary_free (a->auth.address, a->auth.address_length);
|
|
binary_free (a->auth.number, a->auth.number_length);
|
|
binary_free (a->auth.name, a->auth.name_length);
|
|
binary_free (a->auth.data, a->auth.data_length);
|
|
free (a);
|
|
}
|
|
}
|
|
|
|
/* Add the unix domain auth item. */
|
|
static void
|
|
define_local (Xauth *auth)
|
|
{
|
|
char *host = host_name ();
|
|
|
|
#ifdef DEBUG
|
|
fprintf (stderr, "x11: hostname is %s\n", host);
|
|
#endif
|
|
|
|
auth->family = FamilyLocal;
|
|
auth->address_length = strlen (host);
|
|
auth->address = host;
|
|
|
|
add_auth_item (auth);
|
|
}
|
|
|
|
/* Add the tcp auth item. */
|
|
static void
|
|
define_named (Xauth *auth, const char *name)
|
|
{
|
|
struct ifaddrs *addrs, *ptr;
|
|
|
|
if (getifaddrs (&addrs) != 0)
|
|
return;
|
|
|
|
for (ptr = addrs; ptr != NULL; ptr = ptr->ifa_next)
|
|
{
|
|
if (ptr->ifa_addr->sa_family != AF_INET)
|
|
continue;
|
|
|
|
auth->family = FamilyInternet;
|
|
auth->address_length = sizeof (struct in_addr);
|
|
auth->address = (char *) &(((struct sockaddr_in *) ptr->ifa_addr)->sin_addr);
|
|
|
|
#ifdef DEBUG
|
|
fprintf (stderr, "x11: ipaddr is %d.%d.%d.%d\n",
|
|
(unsigned char) auth->address[0],
|
|
(unsigned char) auth->address[1],
|
|
(unsigned char) auth->address[2],
|
|
(unsigned char) auth->address[3]);
|
|
#endif
|
|
|
|
add_auth_item (auth);
|
|
}
|
|
|
|
freeifaddrs (addrs);
|
|
}
|
|
|
|
/* Parse the display number from NAME and add it to AUTH. */
|
|
static void
|
|
set_auth_number (Xauth *auth, const char *name)
|
|
{
|
|
char *colon;
|
|
char *dot, *number;
|
|
|
|
colon = strrchr(name, ':');
|
|
if (colon != NULL)
|
|
{
|
|
colon++;
|
|
dot = strchr(colon, '.');
|
|
|
|
if (dot != NULL)
|
|
auth->number_length = dot - colon;
|
|
else
|
|
auth->number_length = strlen (colon);
|
|
|
|
number = malloc (auth->number_length + 1);
|
|
if (number != NULL)
|
|
{
|
|
strncpy (number, colon, auth->number_length);
|
|
number[auth->number_length] = '\0';
|
|
}
|
|
else
|
|
{
|
|
auth->number_length = 0;
|
|
}
|
|
|
|
auth->number = number;
|
|
}
|
|
}
|
|
|
|
/* Put 128 bits of random data into DATA. If possible, it will be "high
|
|
quality" */
|
|
static int
|
|
generate_mit_magic_cookie (char data[16])
|
|
{
|
|
int fd, ret, i;
|
|
long *ldata = (long *) data;
|
|
|
|
fd = open ("/dev/random", O_RDONLY);
|
|
if (fd > 0) {
|
|
ret = read (fd, data, 16);
|
|
close (fd);
|
|
if (ret == 16) return TRUE;
|
|
}
|
|
|
|
/* fall back to the usual crappy rng */
|
|
|
|
srand48 (getpid () ^ time (NULL));
|
|
|
|
for (i = 0; i < 4; i++)
|
|
ldata[i] = lrand48 ();
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/* Create the keys we'll be using for the display named NAME. */
|
|
static int
|
|
make_auth_keys (const char *name)
|
|
{
|
|
Xauth auth;
|
|
char key[16];
|
|
|
|
if (auth_file == NULL)
|
|
return FALSE;
|
|
|
|
auth.name = "MIT-MAGIC-COOKIE-1";
|
|
auth.name_length = strlen (auth.name);
|
|
|
|
if (!generate_mit_magic_cookie (key))
|
|
{
|
|
auth_file = NULL;
|
|
return FALSE;
|
|
}
|
|
|
|
auth.data = key;
|
|
auth.data_length = 16;
|
|
|
|
set_auth_number (&auth, name);
|
|
|
|
define_named (&auth, host_name ());
|
|
define_local (&auth);
|
|
|
|
free (auth.number);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/* If ADD-ENTRIES is true, merge our auth entries into the existing
|
|
Xauthority file. If ADD-ENTRIES is false, remove our entries. */
|
|
static int
|
|
write_auth_file (int add_entries)
|
|
{
|
|
char *home, newname[1024];
|
|
int fd, ret;
|
|
FILE *new_fh, *old_fh;
|
|
addr_list *addr;
|
|
Xauth *auth;
|
|
|
|
if (auth_file == NULL)
|
|
return FALSE;
|
|
|
|
home = getenv ("HOME");
|
|
if (home == NULL)
|
|
{
|
|
auth_file = NULL;
|
|
return FALSE;
|
|
}
|
|
|
|
snprintf (newname, sizeof (newname), "%s/.XauthorityXXXXXX", home);
|
|
mktemp (newname);
|
|
|
|
if (XauLockAuth (auth_file, 1, 2, 10) != LOCK_SUCCESS)
|
|
{
|
|
/* FIXME: do something here? */
|
|
|
|
auth_file = NULL;
|
|
return FALSE;
|
|
}
|
|
|
|
fd = open (newname, O_WRONLY | O_CREAT | O_TRUNC, 0600);
|
|
if (fd >= 0)
|
|
{
|
|
new_fh = fdopen (fd, "w");
|
|
if (new_fh != NULL)
|
|
{
|
|
if (add_entries)
|
|
{
|
|
for (addr = addresses; addr != NULL; addr = addr->next)
|
|
{
|
|
XauWriteAuth (new_fh, &addr->auth);
|
|
}
|
|
}
|
|
|
|
old_fh = fopen (auth_file, "r");
|
|
if (old_fh != NULL)
|
|
{
|
|
while ((auth = XauReadAuth (old_fh)) != NULL)
|
|
{
|
|
if (!check_auth_item (auth))
|
|
XauWriteAuth (new_fh, auth);
|
|
XauDisposeAuth (auth);
|
|
}
|
|
fclose (old_fh);
|
|
}
|
|
|
|
fclose (new_fh);
|
|
unlink (auth_file);
|
|
|
|
ret = rename (newname, auth_file);
|
|
|
|
if (ret != 0)
|
|
auth_file = NULL;
|
|
|
|
XauUnlockAuth (auth_file);
|
|
return ret == 0;
|
|
}
|
|
|
|
close (fd);
|
|
}
|
|
|
|
XauUnlockAuth (auth_file);
|
|
auth_file = NULL;
|
|
return FALSE;
|
|
}
|
|
|
|
|
|
/* Subprocess management functions. */
|
|
|
|
static int
|
|
start_server (char **xargv)
|
|
{
|
|
int child;
|
|
|
|
child = fork ();
|
|
|
|
switch (child)
|
|
{
|
|
case -1: /* error */
|
|
perror ("fork");
|
|
return FALSE;
|
|
|
|
case 0: /* child */
|
|
execv (X_SERVER, xargv);
|
|
perror ("Couldn't exec " X_SERVER);
|
|
_exit (1);
|
|
|
|
default: /* parent */
|
|
server_pid = child;
|
|
return TRUE;
|
|
}
|
|
}
|
|
|
|
static int
|
|
wait_for_server (void)
|
|
{
|
|
int count = 100;
|
|
|
|
while (count-- > 0)
|
|
{
|
|
int status;
|
|
|
|
server_dpy = XOpenDisplay (server_name);
|
|
if (server_dpy != NULL)
|
|
return TRUE;
|
|
|
|
if (waitpid (server_pid, &status, WNOHANG) == server_pid)
|
|
return FALSE;
|
|
|
|
sleep (1);
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
static int
|
|
start_client (void)
|
|
{
|
|
int child;
|
|
|
|
child = fork();
|
|
|
|
switch (child) {
|
|
char *temp, buf[1024];
|
|
|
|
case -1: /* error */
|
|
perror("fork");
|
|
return FALSE;
|
|
|
|
case 0: /* child */
|
|
/* Setup environment */
|
|
temp = getenv("DISPLAY");
|
|
if (temp != NULL && temp[0] != 0)
|
|
setenv("DISPLAY", server_name, TRUE);
|
|
|
|
temp = getenv("PATH");
|
|
if (temp == NULL || temp[0] == 0)
|
|
setenv ("PATH", DEFAULT_PATH, TRUE);
|
|
else if (strnstr(temp, "/usr/X11/bin", sizeof(temp)) == NULL) {
|
|
snprintf(buf, sizeof(buf), "%s:/usr/X11/bin", temp);
|
|
setenv("PATH", buf, TRUE);
|
|
}
|
|
|
|
/* First try value of $XINITRC, if set. */
|
|
temp = getenv("XINITRC");
|
|
if (temp != NULL && temp[0] != 0 && access(temp, R_OK) == 0)
|
|
execlp (SHELL, SHELL, temp, NULL);
|
|
|
|
/* Then look for .xinitrc in user's home directory. */
|
|
temp = getenv("HOME");
|
|
if (temp != NULL && temp[0] != 0) {
|
|
chdir(temp);
|
|
snprintf (buf, sizeof (buf), "%s/.xinitrc", temp);
|
|
if (access(buf, R_OK) == 0)
|
|
execlp(SHELL, SHELL, buf, NULL);
|
|
}
|
|
|
|
/* Then try the default xinitrc in the lib directory. */
|
|
|
|
if (access(DEFAULT_XINITRC, R_OK) == 0)
|
|
execlp(SHELL, SHELL, DEFAULT_XINITRC, NULL);
|
|
|
|
/* Then fallback to hardcoding an xterm and the window manager. */
|
|
|
|
// system(XTERM_PATH " &");
|
|
execl(WM_PATH, WM_PATH, NULL);
|
|
|
|
perror("exec");
|
|
_exit(1);
|
|
|
|
default: /* parent */
|
|
client_pid = child;
|
|
return TRUE;
|
|
}
|
|
}
|
|
|
|
static void
|
|
sigchld_handler (int sig)
|
|
{
|
|
int pid, status;
|
|
|
|
again:
|
|
pid = waitpid (WAIT_ANY, &status, WNOHANG);
|
|
|
|
if (pid > 0)
|
|
{
|
|
if (pid == server_pid)
|
|
{
|
|
server_pid = -1;
|
|
|
|
if (client_pid >= 0)
|
|
kill (client_pid, SIGTERM);
|
|
}
|
|
else if (pid == client_pid)
|
|
{
|
|
client_pid = -1;
|
|
|
|
if (server_pid >= 0 && xinit_kills_server)
|
|
kill (server_pid, SIGTERM);
|
|
}
|
|
goto again;
|
|
}
|
|
|
|
if (server_pid == -1 && client_pid == -1)
|
|
longjmp (exit_continuation, 1);
|
|
|
|
signal (SIGCHLD, sigchld_handler);
|
|
}
|
|
|
|
|
|
/* Server utilities. */
|
|
|
|
static Boolean
|
|
display_exists_p (int number)
|
|
{
|
|
char buf[64];
|
|
#ifdef USE_XCB
|
|
xcb_connection_t *conn;
|
|
#endif
|
|
|
|
/* Since connecting to the display waits for a few seconds if the
|
|
display doesn't exist, check for trivial non-existence - if the
|
|
socket in /tmp exists or not.. (note: if the socket exists, the
|
|
server may still not, so we need to try to connect in that case..) */
|
|
|
|
sprintf (buf, "/tmp/.X11-unix/X%d", number);
|
|
if (access (buf, F_OK) != 0) return FALSE;
|
|
|
|
#ifdef USE_XCB
|
|
sprintf (buf, ":%d", number);
|
|
conn = xcb_connect(buf, NULL);
|
|
if (conn == NULL) return FALSE;
|
|
xcb_disconnect(conn);
|
|
#endif
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
/* Monitoring when the system's ip addresses change. */
|
|
|
|
static Boolean pending_timer;
|
|
|
|
static void
|
|
timer_callback (CFRunLoopTimerRef timer, void *info)
|
|
{
|
|
pending_timer = FALSE;
|
|
|
|
/* Update authentication names. Need to write .Xauthority file first
|
|
without the existing entries, then again with the new entries.. */
|
|
|
|
write_auth_file (FALSE);
|
|
|
|
free_auth_items ();
|
|
make_auth_keys (server_name);
|
|
|
|
write_auth_file (TRUE);
|
|
}
|
|
|
|
/* This function is called when the system's ip addresses may have changed. */
|
|
static void
|
|
ipaddr_callback (SCDynamicStoreRef store, CFArrayRef changed_keys, void *info)
|
|
{
|
|
#if DEBUG
|
|
if (changed_keys != NULL) {
|
|
fprintf (stderr, "x11: changed sc keys: ");
|
|
CFShow (changed_keys);
|
|
}
|
|
#endif
|
|
|
|
if (auth_file != NULL && !pending_timer)
|
|
{
|
|
CFRunLoopTimerRef timer;
|
|
|
|
timer = CFRunLoopTimerCreate (NULL, CFAbsoluteTimeGetCurrent () + 1.0,
|
|
0.0, 0, 0, timer_callback, NULL);
|
|
CFRunLoopAddTimer (CFRunLoopGetCurrent (), timer,
|
|
kCFRunLoopDefaultMode);
|
|
CFRelease (timer);
|
|
|
|
pending_timer = TRUE;
|
|
}
|
|
}
|
|
|
|
/* This code adapted from "Living in a Dynamic TCP/IP Environment" technote. */
|
|
static Boolean
|
|
install_ipaddr_source (void)
|
|
{
|
|
CFRunLoopSourceRef source = NULL;
|
|
|
|
SCDynamicStoreContext context = {0};
|
|
SCDynamicStoreRef ref;
|
|
|
|
ref = SCDynamicStoreCreate (NULL,
|
|
CFSTR ("AddIPAddressListChangeCallbackSCF"),
|
|
ipaddr_callback, &context);
|
|
|
|
if (ref != NULL)
|
|
{
|
|
const void *keys[4], *patterns[2];
|
|
int i;
|
|
|
|
keys[0] = SCDynamicStoreKeyCreateNetworkGlobalEntity (NULL, kSCDynamicStoreDomainState, kSCEntNetIPv4);
|
|
keys[1] = SCDynamicStoreKeyCreateNetworkGlobalEntity (NULL, kSCDynamicStoreDomainState, kSCEntNetIPv6);
|
|
keys[2] = SCDynamicStoreKeyCreateComputerName (NULL);
|
|
keys[3] = SCDynamicStoreKeyCreateHostNames (NULL);
|
|
|
|
patterns[0] = SCDynamicStoreKeyCreateNetworkInterfaceEntity (NULL, kSCDynamicStoreDomainState, kSCCompAnyRegex, kSCEntNetIPv4);
|
|
patterns[1] = SCDynamicStoreKeyCreateNetworkInterfaceEntity (NULL, kSCDynamicStoreDomainState, kSCCompAnyRegex, kSCEntNetIPv6);
|
|
|
|
if (keys[0] != NULL && keys[1] != NULL && keys[2] != NULL
|
|
&& keys[3] != NULL && patterns[0] != NULL && patterns[1] != NULL)
|
|
{
|
|
CFArrayRef key_array, pattern_array;
|
|
|
|
key_array = CFArrayCreate (NULL, keys, 4, &kCFTypeArrayCallBacks);
|
|
pattern_array = CFArrayCreate (NULL, patterns, 2, &kCFTypeArrayCallBacks);
|
|
|
|
if (key_array != NULL || pattern_array != NULL)
|
|
{
|
|
SCDynamicStoreSetNotificationKeys (ref, key_array, pattern_array);
|
|
source = SCDynamicStoreCreateRunLoopSource (NULL, ref, 0);
|
|
}
|
|
|
|
if (key_array != NULL)
|
|
CFRelease (key_array);
|
|
if (pattern_array != NULL)
|
|
CFRelease (pattern_array);
|
|
}
|
|
|
|
|
|
for (i = 0; i < 4; i++)
|
|
if (keys[i] != NULL)
|
|
CFRelease (keys[i]);
|
|
for (i = 0; i < 2; i++)
|
|
if (patterns[i] != NULL)
|
|
CFRelease (patterns[i]);
|
|
|
|
CFRelease (ref);
|
|
}
|
|
|
|
if (source != NULL)
|
|
{
|
|
CFRunLoopAddSource (CFRunLoopGetCurrent (),
|
|
source, kCFRunLoopDefaultMode);
|
|
CFRelease (source);
|
|
}
|
|
|
|
return source != NULL;
|
|
}
|
|
|
|
|
|
/* Entrypoint. */
|
|
|
|
void
|
|
termination_signal_handler (int unused_sig)
|
|
{
|
|
signal (SIGTERM, SIG_DFL);
|
|
signal (SIGHUP, SIG_DFL);
|
|
signal (SIGINT, SIG_DFL);
|
|
signal (SIGQUIT, SIG_DFL);
|
|
|
|
longjmp (exit_continuation, 1);
|
|
}
|
|
|
|
int
|
|
main (int argc, char **argv)
|
|
{
|
|
char **xargv;
|
|
int i, j;
|
|
int fd;
|
|
|
|
xargv = alloca (sizeof (char *) * (argc + 32));
|
|
|
|
if (!read_boolean_pref (CFSTR ("no_auth"), FALSE))
|
|
auth_file = XauFileName ();
|
|
|
|
/* The standard X11 behaviour is for the server to quit when the first
|
|
client exits. But it can be useful for debugging (and to mimic our
|
|
behaviour in the beta releases) to not do that. */
|
|
|
|
xinit_kills_server = read_boolean_pref (CFSTR ("xinit_kills_server"), TRUE);
|
|
|
|
for (i = 1; i < argc; i++)
|
|
{
|
|
if (argv[i][0] == ':')
|
|
server_name = argv[i];
|
|
}
|
|
|
|
if (server_name == NULL)
|
|
{
|
|
static char name[8];
|
|
|
|
/* No display number specified, so search for the first unused.
|
|
|
|
There's a big old race condition here if two servers start at
|
|
the same time, but that's fairly unlikely. We could create
|
|
lockfiles or something, but that's seems more likely to cause
|
|
problems than the race condition itself.. */
|
|
|
|
for (i = 0; i < MAX_DISPLAYS; i++)
|
|
{
|
|
if (!display_exists_p (i))
|
|
break;
|
|
}
|
|
|
|
if (i == MAX_DISPLAYS)
|
|
{
|
|
fprintf (stderr, "%s: couldn't allocate a display number", argv[0]);
|
|
exit (1);
|
|
}
|
|
|
|
sprintf (name, ":%d", i);
|
|
server_name = name;
|
|
}
|
|
|
|
if (auth_file != NULL)
|
|
{
|
|
/* Create new Xauth keys and add them to the .Xauthority file */
|
|
|
|
make_auth_keys (server_name);
|
|
write_auth_file (TRUE);
|
|
}
|
|
|
|
/* Construct our new argv */
|
|
|
|
i = j = 0;
|
|
|
|
xargv[i++] = argv[j++];
|
|
|
|
if (auth_file != NULL)
|
|
{
|
|
xargv[i++] = "-auth";
|
|
xargv[i++] = auth_file;
|
|
}
|
|
|
|
/* By default, don't listen on tcp sockets if Xauth is disabled. */
|
|
|
|
if (read_boolean_pref (CFSTR ("nolisten_tcp"), auth_file == NULL))
|
|
{
|
|
xargv[i++] = "-nolisten";
|
|
xargv[i++] = "tcp";
|
|
}
|
|
|
|
while (j < argc)
|
|
{
|
|
if (argv[j++][0] != ':')
|
|
xargv[i++] = argv[j-1];
|
|
}
|
|
|
|
xargv[i++] = (char *) server_name;
|
|
xargv[i++] = NULL;
|
|
|
|
/* Detach from any controlling terminal and connect stdin to /dev/null */
|
|
|
|
#ifdef TIOCNOTTY
|
|
fd = open ("/dev/tty", O_RDONLY);
|
|
if (fd != -1)
|
|
{
|
|
ioctl (fd, TIOCNOTTY, 0);
|
|
close (fd);
|
|
}
|
|
#endif
|
|
|
|
fd = open ("/dev/null", O_RDWR, 0);
|
|
if (fd >= 0)
|
|
{
|
|
dup2 (fd, 0);
|
|
if (fd > 0)
|
|
close (fd);
|
|
}
|
|
|
|
if (!start_server (xargv))
|
|
return 1;
|
|
|
|
if (!wait_for_server ())
|
|
{
|
|
kill (server_pid, SIGTERM);
|
|
return 1;
|
|
}
|
|
|
|
if (!start_client ())
|
|
{
|
|
kill (server_pid, SIGTERM);
|
|
return 1;
|
|
}
|
|
|
|
signal (SIGCHLD, sigchld_handler);
|
|
|
|
signal (SIGTERM, termination_signal_handler);
|
|
signal (SIGHUP, termination_signal_handler);
|
|
signal (SIGINT, termination_signal_handler);
|
|
signal (SIGQUIT, termination_signal_handler);
|
|
|
|
if (setjmp (exit_continuation) == 0)
|
|
{
|
|
if (install_ipaddr_source ())
|
|
CFRunLoopRun ();
|
|
else
|
|
while (1) pause ();
|
|
}
|
|
|
|
signal (SIGCHLD, SIG_IGN);
|
|
|
|
if (client_pid >= 0) kill (client_pid, SIGTERM);
|
|
if (server_pid >= 0) kill (server_pid, SIGTERM);
|
|
|
|
if (auth_file != NULL)
|
|
{
|
|
/* Remove our Xauth keys */
|
|
|
|
write_auth_file (FALSE);
|
|
}
|
|
|
|
free_auth_items ();
|
|
|
|
return 0;
|
|
}
|