func (c *cliClient) Start() { oldState, err := terminal.MakeRaw(0) if err != nil { panic(err.Error()) } defer terminal.Restore(0, oldState) signal.Notify(make(chan os.Signal), os.Interrupt) wrapper, interruptChan := NewTerminalWrapper(os.Stdin) wrapper.SetErrorOnInterrupt(true) c.interrupt = interruptChan c.termWrapper = wrapper c.term = terminal.NewTerminal(wrapper, "> ") if width, height, err := terminal.GetSize(0); err == nil { c.term.SetSize(width, height) } c.loadUI() if c.writerChan != nil { c.save() } if c.writerChan != nil { close(c.writerChan) <-c.writerDone } if c.fetchNowChan != nil { close(c.fetchNowChan) } if c.stateLock != nil { c.stateLock.Close() } }
func handleSshConnection(sConn *ssh.ServerConn, msgchan chan<- text.Message, addchan chan<- Client, rmchan chan<- net.Conn) { defer sConn.Close() for { ch, err := sConn.Accept() if err == io.EOF { return } if err != nil { log.Println("handleServerConn Accept:", err) break } if ch.ChannelType() != "session" { ch.Reject(ssh.UnknownChannelType, "unknown channel type") break } log.Println("Client version:", string(sConn.ClientVersion)) // Create terminal term := terminal.NewTerminal(ch, "") serverTerm := &ssh.ServerTerminal{ Term: term, Channel: ch, } ch.Accept() go handleConnection(sConn, serverTerm, term, msgchan, addchan, rmchan) } }
func newServerShell(ch *serverChan, prompt string) *ServerTerminal { term := terminal.NewTerminal(ch, prompt) return &ServerTerminal{ Term: term, Channel: ch, } }
func newTerm() Term { u := new(uterm) var err error u.s, err = terminal.MakeRaw(0) if err != nil { panic(err) } u.t = terminal.NewTerminal(os.Stdin, "lixian >> ") return u }
func handleUser(sConn *ssh.ServerConn) { if err := sConn.Handshake(); err != nil { fmt.Printf("failed to handshake\n") return } // A ServerConn multiplexes several channels, which must // themselves be Accepted. for { // Accept reads from the connection, demultiplexes packets // to their corresponding channels and returns when a new // channel request is seen. Some goroutine must always be // calling Accept; otherwise no messages will be forwarded // to the channels. channel, err := sConn.Accept() if err != nil { fmt.Printf("error from Accept\n") return } // Channels have a type, depending on the application level // protocol intended. In the case of a shell, the type is // "session" and ServerShell may be used to present a simple // terminal interface. if channel.ChannelType() != "session" { channel.Reject(ssh.UnknownChannelType, "unknown channel type") continue } channel.Accept() term := terminal.NewTerminal(channel, "> ") serverTerm := &ssh.ServerTerminal{ Term: term, Channel: channel, } go func() { defer channel.Close() for { line, err := serverTerm.ReadLine() if err != nil { break } fmt.Println(line) } }() } }
func HandleConnection(listener net.Listener) { for { nConn, err := listener.Accept() go func() { if err != nil { panic("failed to accept incoming connection") } // Before use, a handshake must be performed on the incoming // net.Conn. _, chans, _, err := ssh.NewServerConn(nConn, config) if err == io.EOF { return } if err != nil { logfile.Printf("Handshake error: %s", err) } for newChannel := range chans { channel, requests, err := newChannel.Accept() if err != nil { logfile.Println("[fatal] could not accept channel.") continue } var term *terminal.Terminal term = terminal.NewTerminal(channel, "") go HandleSshRequests(channel, requests, term) logfile.Println("[channelType]: " + newChannel.ChannelType()) //newChannel.Reject(ssh.ConnectionFailed, "") // Sessions have out-of-band requests such as "shell", // "pty-req" and "env". if newChannel.ChannelType() == "direct-tcpip" { http_request := make(map[string]string) HandleTcpReading(channel, term, http_request) go SaveHttpRequest(http_request) } else { go HandleTerminalReading(channel, term) } } }() } }
func handleChannel(ch ssh.Channel) { term := terminal.NewTerminal(ch, "> ") serverTerm := &ssh.ServerTerminal{ Term: term, Channel: ch, } ch.Accept() defer ch.Close() for { line, err := serverTerm.ReadLine() if err == io.EOF { return } if err != nil { log.Println("handleChannel readLine err:", err) continue } fmt.Println(line) } }
// NewStartedQShell returns an initialized QShell, ready to Interact() with. // Prints mongo startup message. func NewStartedQShell(driver *strata.Driver, mountPath string, showSize bool, mongodPath, mongoPath string) (*QShell, error) { finished := false sh := QShell{driver: driver, mountPath: mountPath, showSize: showSize, mongodPath: mongodPath, mongoPath: mongoPath} // Put terminal in raw mode var err error sh.stdinFd = int(os.Stdin.Fd()) sh.oldState, err = terminal.MakeRaw(sh.stdinFd) if err != nil { return &sh, err } // Convention seems to be that caller invokes Close() only if there is no error. // But we need to clean up if there is an error. defer func() { if !finished { sh.Close() } }() sh.term = terminal.NewTerminal(&readerWriter{r: os.Stdin, w: os.Stdout}, "\r> ") sh.mongoStateHolder, err = newMongoStateHolder(sh.mongoPath) if err != nil { return &sh, err } if err := sh.print("Wrapper around MongoDB shell with additional commands for querying backups.\n"); err != nil { return &sh, err } if err := sh.printMongoOutput(true); err != nil { return &sh, err } finished = true return &sh, nil }
func main() { w := eval.NewWorld() w.DefineVar("connect", eval.NewFuncType([]eval.Type{}, false, []eval.Type{}), &funcV{&testFunc{}}) fmt.Println(":: welcome to go-eval...\n(hit ^D to exit)") fd := int(os.Stdin.Fd()) oldState, err := terminal.MakeRaw(fd) if err != nil { panic(err) } defer terminal.Restore(fd, oldState) term := terminal.NewTerminal(&shell{r: os.Stdin, w: os.Stdout}, "> ") if term == nil { panic(errors.New("could not create terminal")) } for { line, err := term.ReadLine() if err != nil { break } code, err := w.Compile(fset, line) if err != nil { term.Write([]byte(err.Error() + "\n")) continue } v, err := code.Run() if err != nil { term.Write([]byte(err.Error() + "\n")) continue } if v != nil { term.Write([]byte(v.String() + "\n")) } } }
func ExampleNewServerConn() { // An SSH server is represented by a ServerConfig, which holds // certificate details and handles authentication of ServerConns. config := &ServerConfig{ PasswordCallback: func(c ConnMetadata, pass []byte) (*Permissions, error) { // Should use constant-time compare (or better, salt+hash) in // a production setting. if c.User() == "testuser" && string(pass) == "tiger" { return nil, nil } return nil, fmt.Errorf("password rejected for %q", c.User()) }, } privateBytes, err := ioutil.ReadFile("id_rsa") if err != nil { panic("Failed to load private key") } private, err := ParsePrivateKey(privateBytes) if err != nil { panic("Failed to parse private key") } config.AddHostKey(private) // Once a ServerConfig has been configured, connections can be // accepted. listener, err := net.Listen("tcp", "0.0.0.0:2022") if err != nil { panic("failed to listen for connection") } nConn, err := listener.Accept() if err != nil { panic("failed to accept incoming connection") } // Before use, a handshake must be performed on the incoming // net.Conn. _, chans, reqs, err := NewServerConn(nConn, config) if err != nil { panic("failed to handshake") } // The incoming Request channel must be serviced. go DiscardRequests(reqs) // Service the incoming Channel channel. for newChannel := range chans { // Channels have a type, depending on the application level // protocol intended. In the case of a shell, the type is // "session" and ServerShell may be used to present a simple // terminal interface. if newChannel.ChannelType() != "session" { newChannel.Reject(UnknownChannelType, "unknown channel type") continue } channel, requests, err := newChannel.Accept() if err != nil { panic("could not accept channel.") } // Sessions have out-of-band requests such as "shell", // "pty-req" and "env". Here we handle only the // "shell" request. go func(in <-chan *Request) { for req := range in { ok := false switch req.Type { case "shell": ok = true if len(req.Payload) > 0 { // We don't accept any // commands, only the // default shell. ok = false } } req.Reply(ok, nil) } }(requests) term := terminal.NewTerminal(channel, "> ") go func() { defer channel.Close() for { line, err := term.ReadLine() if err != nil { break } fmt.Println(line) } }() } }
func main() { // An SSH server is represented by a ServerConfig, which holds // certificate details and handles authentication of ServerConns. config := &ssh.ServerConfig{ PasswordCallback: func(conn *ssh.ServerConn, user, pass string) bool { return user == "testuser" && pass == "tiger" }, } privateBytes, err := ioutil.ReadFile("id_rsa") if err != nil { panic("Failed to load private key") } private, err := ssh.ParsePrivateKey(privateBytes) if err != nil { panic("Failed to parse private key") } config.AddHostKey(private) // Once a ServerConfig has been configured, connections can be // accepted. listener, err := ssh.Listen("tcp", "0.0.0.0:2022", config) if err != nil { panic("failed to listen for connection") } sConn, err := listener.Accept() if err != nil { panic("failed to accept incoming connection") } if err := sConn.Handshake(); err != nil { panic("failed to handshake") } // A ServerConn multiplexes several channels, which must // themselves be Accepted. for { // Accept reads from the connection, demultiplexes packets // to their corresponding channels and returns when a new // channel request is seen. Some goroutine must always be // calling Accept; otherwise no messages will be forwarded // to the channels. channel, err := sConn.Accept() if err != nil { panic("error from Accept") } // Channels have a type, depending on the application level // protocol intended. In the case of a shell, the type is // "session" and ServerShell may be used to present a simple // terminal interface. if channel.ChannelType() != "session" { channel.Reject(ssh.UnknownChannelType, "unknown channel type") continue } channel.Accept() term := terminal.NewTerminal(channel, "> ") serverTerm := &ssh.ServerTerminal{ Term: term, Channel: channel, } go func() { defer channel.Close() for { line, err := serverTerm.ReadLine() if err != nil { break } fmt.Println(line) } }() } }
func main() { println("starting ssh server...") err := envconfig.Process("wormhole", &appConfig) if err != nil { log.Fatal(err.Error()) } if appConfig.LocalSSHAddr == "" || appConfig.PrivateKeyPath == "" || appConfig.RemoteSSHAddr == "" || appConfig.RemoteForwardAddress == "" || appConfig.RemoteSSHUser == "" || appConfig.RemotePrivateKeyPath == "" { fmt.Println("Missing config") os.Exit(-1) } // An SSH server is represented by a ServerConfig, which holds // certificate details and handles authentication of ServerConns. config := &ssh.ServerConfig{ PasswordCallback: func(c ssh.ConnMetadata, pass []byte) (*ssh.Permissions, error) { // Should use constant-time compare (or better, salt+hash) in // a production setting. if c.User() == "testuser" && string(pass) == "" { return nil, nil } return nil, fmt.Errorf("password rejected for %q", c.User()) }, } privateBytes, err := ioutil.ReadFile(appConfig.PrivateKeyPath) if err != nil { panic("Failed to load private key") } private, err := ssh.ParsePrivateKey(privateBytes) if err != nil { panic("Failed to parse private key") } config.AddHostKey(private) // Once a ServerConfig has been configured, connections can be // accepted. listener, err := net.Listen("tcp", appConfig.LocalSSHAddr) if err != nil { panic("failed to listen for connection") } for { nConn, err := listener.Accept() if err != nil { panic("failed to accept incoming connection") } conn, chans, reqs, err := ssh.NewServerConn(nConn, config) if err != nil { panic("failed to handshake") } go processRequests(conn, reqs) for newChannel := range chans { if newChannel.ChannelType() != "session" { newChannel.Reject(ssh.UnknownChannelType, "unknown channel type") continue } channel, requests, err := newChannel.Accept() if err != nil { panic("could not accept channel.") } go func(in <-chan *ssh.Request) { for req := range in { ok := false switch req.Type { case "shell": ok = true if len(req.Payload) > 0 { ok = false } } req.Reply(ok, nil) } }(requests) term := terminal.NewTerminal(channel, "> ") go func() { defer channel.Close() for { _, err := term.ReadLine() if err != nil { break } } }() } } }
func newServerShell(ch Channel, in <-chan *Request, prompt string) *terminal.Terminal { term := terminal.NewTerminal(ch, prompt) go handleTerminalRequests(in) return term }
func main() { flag.Parse() oldState, err := terminal.MakeRaw(0) if err != nil { panic(err.Error()) } defer terminal.Restore(0, oldState) term := terminal.NewTerminal(os.Stdin, "> ") updateTerminalSize(term) resizeChan := make(chan os.Signal) go func() { for _ = range resizeChan { updateTerminalSize(term) } }() signal.Notify(resizeChan, syscall.SIGWINCH) if len(*configFile) == 0 { homeDir := os.Getenv("HOME") if len(homeDir) == 0 { alert(term, "$HOME not set. Please either export $HOME or use the -config-file option.\n") return } persistentDir := filepath.Join(homeDir, "Persistent") if stat, err := os.Lstat(persistentDir); err == nil && stat.IsDir() { // Looks like Tails. homeDir = persistentDir } *configFile = filepath.Join(homeDir, ".xmpp-client") } config, err := ParseConfig(*configFile) if err != nil { alert(term, "Failed to parse config file: "+err.Error()) config = new(Config) if !enroll(config, term) { return } config.filename = *configFile config.Save() } password := config.Password if len(password) == 0 { if password, err = term.ReadPassword(fmt.Sprintf("Password for %s (will not be saved to disk): ", config.Account)); err != nil { alert(term, "Failed to read password: "******"@", 2) if len(parts) != 2 { alert(term, "invalid username (want user@domain): "+config.Account) return } user := parts[0] domain := parts[1] var addr string addrTrusted := false if len(config.Server) > 0 && config.Port > 0 { addr = fmt.Sprintf("%s:%d", config.Server, config.Port) addrTrusted = true } else { if len(config.Proxies) > 0 { alert(term, "Cannot connect via a proxy without Server and Port being set in the config file as an SRV lookup would leak information.") return } host, port, err := xmpp.Resolve(domain) if err != nil { alert(term, "Failed to resolve XMPP server: "+err.Error()) return } addr = fmt.Sprintf("%s:%d", host, port) } var dialer proxy.Dialer for i := len(config.Proxies) - 1; i >= 0; i-- { u, err := url.Parse(config.Proxies[i]) if err != nil { alert(term, "Failed to parse "+config.Proxies[i]+" as a URL: "+err.Error()) return } if dialer == nil { dialer = proxy.Direct } if dialer, err = proxy.FromURL(u, dialer); err != nil { alert(term, "Failed to parse "+config.Proxies[i]+" as a proxy: "+err.Error()) return } } var certSHA256 []byte if len(config.ServerCertificateSHA256) > 0 { certSHA256, err = hex.DecodeString(config.ServerCertificateSHA256) if err != nil { alert(term, "Failed to parse ServerCertificateSHA256 (should be hex string): "+err.Error()) return } if len(certSHA256) != 32 { alert(term, "ServerCertificateSHA256 is not 32 bytes long") return } } xmppConfig := &xmpp.Config{ Log: &lineLogger{term, nil}, Create: *createAccount, TrustedAddress: addrTrusted, Archive: false, ServerCertificateSHA256: certSHA256, } if len(config.RawLogFile) > 0 { rawLog, err := os.OpenFile(config.RawLogFile, os.O_CREATE|os.O_WRONLY|os.O_APPEND, 0600) if err != nil { alert(term, "Failed to open raw log file: "+err.Error()) return } lock := new(sync.Mutex) in := rawLogger{ out: rawLog, prefix: []byte("<- "), lock: lock, } out := rawLogger{ out: rawLog, prefix: []byte("-> "), lock: lock, } in.other, out.other = &out, &in xmppConfig.InLog = &in xmppConfig.OutLog = &out defer in.flush() defer out.flush() } if dialer != nil { info(term, "Making connection to "+addr+" via proxy") if xmppConfig.Conn, err = dialer.Dial("tcp", addr); err != nil { alert(term, "Failed to connect via proxy: "+err.Error()) return } } conn, err := xmpp.Dial(addr, user, domain, password, xmppConfig) if err != nil { alert(term, "Failed to connect to XMPP server: "+err.Error()) return } s := Session{ account: config.Account, conn: conn, term: term, conversations: make(map[string]*otr.Conversation), knownStates: make(map[string]string), privateKey: new(otr.PrivateKey), config: config, pendingRosterChan: make(chan *rosterEdit), pendingSubscribes: make(map[string]string), lastActionTime: time.Now(), } info(term, "Fetching roster") //var rosterReply chan xmpp.Stanza rosterReply, _, err := s.conn.RequestRoster() if err != nil { alert(term, "Failed to request roster: "+err.Error()) return } conn.SignalPresence("") s.input = Input{ term: term, uidComplete: new(priorityList), } commandChan := make(chan interface{}) go s.input.ProcessCommands(commandChan) stanzaChan := make(chan xmpp.Stanza) go s.readMessages(stanzaChan) s.privateKey.Parse(config.PrivateKey) s.timeouts = make(map[xmpp.Cookie]time.Time) info(term, fmt.Sprintf("Your fingerprint is %x", s.privateKey.Fingerprint())) ticker := time.NewTicker(1 * time.Second) MainLoop: for { select { case now := <-ticker.C: haveExpired := false for _, expiry := range s.timeouts { if now.After(expiry) { haveExpired = true break } } if !haveExpired { continue } newTimeouts := make(map[xmpp.Cookie]time.Time) for cookie, expiry := range s.timeouts { if now.After(expiry) { s.conn.Cancel(cookie) } else { newTimeouts[cookie] = expiry } } s.timeouts = newTimeouts case edit := <-s.pendingRosterChan: if !edit.isComplete { info(s.term, "Please edit "+edit.fileName+" and run /rostereditdone when complete") s.pendingRosterEdit = edit continue } if s.processEditedRoster(edit) { s.pendingRosterEdit = nil } else { alert(s.term, "Please reedit file and run /rostereditdone again") } case rosterStanza, ok := <-rosterReply: if !ok { alert(s.term, "Failed to read roster: "+err.Error()) return } if s.roster, err = xmpp.ParseRoster(rosterStanza); err != nil { alert(s.term, "Failed to parse roster: "+err.Error()) return } for _, entry := range s.roster { s.input.AddUser(entry.Jid) } info(s.term, "Roster received") case cmd, ok := <-commandChan: if !ok { warn(term, "Exiting because command channel closed") break MainLoop } s.lastActionTime = time.Now() switch cmd := cmd.(type) { case quitCommand: for to, conversation := range s.conversations { msgs := conversation.End() for _, msg := range msgs { s.conn.Send(to, string(msg)) } } break MainLoop case versionCommand: replyChan, cookie, err := s.conn.SendIQ(cmd.User, "get", xmpp.VersionQuery{}) if err != nil { alert(s.term, "Error sending version request: "+err.Error()) continue } s.timeouts[cookie] = time.Now().Add(5 * time.Second) go s.awaitVersionReply(replyChan, cmd.User) case rosterCommand: info(s.term, "Current roster:") maxLen := 0 for _, item := range s.roster { if maxLen < len(item.Jid) { maxLen = len(item.Jid) } } for _, item := range s.roster { state, ok := s.knownStates[item.Jid] line := "" if ok { line += "[*] " } else if cmd.OnlineOnly { continue } else { line += "[ ] " } line += item.Jid numSpaces := 1 + (maxLen - len(item.Jid)) for i := 0; i < numSpaces; i++ { line += " " } line += item.Subscription + "\t" + item.Name if ok { line += "\t" + state } info(s.term, line) } case rosterEditCommand: if s.pendingRosterEdit != nil { warn(s.term, "Aborting previous roster edit") s.pendingRosterEdit = nil } rosterCopy := make([]xmpp.RosterEntry, len(s.roster)) copy(rosterCopy, s.roster) go s.editRoster(rosterCopy) case rosterEditDoneCommand: if s.pendingRosterEdit == nil { warn(s.term, "No roster edit in progress. Use /rosteredit to start one") continue } go s.loadEditedRoster(*s.pendingRosterEdit) case toggleStatusUpdatesCommand: s.config.HideStatusUpdates = !s.config.HideStatusUpdates s.config.Save() // Tell the user the current state of the statuses if s.config.HideStatusUpdates { info(s.term, "Status updated disabled") } else { info(s.term, "Status updates enabled") } case confirmCommand: s.handleConfirmOrDeny(cmd.User, true /* confirm */) case denyCommand: s.handleConfirmOrDeny(cmd.User, false /* deny */) case addCommand: s.conn.SendPresence(cmd.User, "subscribe", "" /* generate id */) case msgCommand: conversation, ok := s.conversations[cmd.to] if (!ok || !conversation.IsEncrypted()) && config.ShouldEncryptTo(cmd.to) { warn(s.term, fmt.Sprintf("Did not send: no encryption established with %s", cmd.to)) continue } var msgs [][]byte message := []byte(cmd.msg) // Automatically tag all outgoing plaintext // messages with a whitespace tag that // indicates that we support OTR. if config.OTRAutoAppendTag && !bytes.Contains(message, []byte("?OTR")) && (!ok || !conversation.IsEncrypted()) { message = append(message, OTRWhitespaceTag...) } if ok { var err error msgs, err = conversation.Send(message) if err != nil { alert(s.term, err.Error()) break } } else { msgs = [][]byte{[]byte(message)} } for _, message := range msgs { s.conn.Send(cmd.to, string(message)) } case otrCommand: s.conn.Send(string(cmd.User), otr.QueryMessage) case otrInfoCommand: info(term, fmt.Sprintf("Your OTR fingerprint is %x", s.privateKey.Fingerprint())) for to, conversation := range s.conversations { if conversation.IsEncrypted() { info(s.term, fmt.Sprintf("Secure session with %s underway:", to)) printConversationInfo(s, to, conversation) } } case endOTRCommand: to := string(cmd.User) conversation, ok := s.conversations[to] if !ok { alert(s.term, "No secure session established") break } msgs := conversation.End() for _, msg := range msgs { s.conn.Send(to, string(msg)) } case authQACommand: to := string(cmd.User) conversation, ok := s.conversations[to] if !ok { alert(s.term, "Can't authenticate without a secure conversation established") break } msgs, err := conversation.Authenticate(cmd.Question, []byte(cmd.Secret)) if err != nil { alert(s.term, "Error while starting authentication with "+to+": "+err.Error()) } for _, msg := range msgs { s.conn.Send(to, string(msg)) } case authOobCommand: fpr, err := hex.DecodeString(cmd.Fingerprint) if err != nil { alert(s.term, fmt.Sprintf("Invalid fingerprint %s - not authenticated", cmd.Fingerprint)) break } existing := s.config.UserIdForFingerprint(fpr) if len(existing) != 0 { alert(s.term, fmt.Sprintf("Fingerprint %s already belongs to %s", cmd.Fingerprint, existing)) break } s.config.KnownFingerprints = append(s.config.KnownFingerprints, KnownFingerprint{fingerprint: fpr, UserId: cmd.User}) s.config.Save() info(s.term, fmt.Sprintf("Saved manually verified fingerprint %s for %s", cmd.Fingerprint, cmd.User)) case awayCommand: s.conn.SignalPresence("away") case chatCommand: s.conn.SignalPresence("chat") case dndCommand: s.conn.SignalPresence("dnd") case xaCommand: s.conn.SignalPresence("xa") case onlineCommand: s.conn.SignalPresence("") } case rawStanza, ok := <-stanzaChan: if !ok { warn(term, "Exiting because channel to server closed") break MainLoop } switch stanza := rawStanza.Value.(type) { case *xmpp.ClientMessage: s.processClientMessage(stanza) case *xmpp.ClientPresence: s.processPresence(stanza) case *xmpp.ClientIQ: if stanza.Type != "get" && stanza.Type != "set" { continue } reply := s.processIQ(stanza) if reply == nil { reply = xmpp.ErrorReply{ Type: "cancel", Error: xmpp.ErrorBadRequest{}, } } if err := s.conn.SendIQReply(stanza.From, "result", stanza.Id, reply); err != nil { alert(term, "Failed to send IQ message: "+err.Error()) } default: info(term, fmt.Sprintf("%s %s", rawStanza.Name, rawStanza.Value)) } } } os.Stdout.Write([]byte("\n")) }
func run() error { fset := twik.NewFileSet() scope := twik.NewDefaultScope(fset) scope.Create("printf", printfFn) scope.Create("list", listFn) if len(os.Args) > 1 { if strings.HasPrefix(os.Args[1], "-") { return fmt.Errorf("usage: twik [<source file>]") } f, err := os.Open(os.Args[1]) if err != nil { return err } defer f.Close() data, err := ioutil.ReadAll(f) if err != nil { return err } node, err := twik.Parse(fset, os.Args[1], data) if err != nil { return err } _, err = scope.Eval(node) return err } state, err := terminal.MakeRaw(1) if err != nil { return err } defer terminal.Restore(1, state) t := terminal.NewTerminal(os.Stdout, "> ") unclosed := "" for { line, err := t.ReadLine() if err == io.EOF { break } if err != nil { return err } if unclosed != "" { line = unclosed + "\n" + line } unclosed = "" t.SetPrompt("> ") node, err := twik.ParseString(fset, "", line) if err != nil { if strings.HasSuffix(err.Error(), "missing )") { unclosed = line t.SetPrompt(". ") continue } fmt.Println(err) continue } value, err := scope.Eval(node) if err != nil { fmt.Println(err) continue } if value != nil { if reflect.TypeOf(value).Kind() == reflect.Func { fmt.Println("#func") } else if v, ok := value.([]interface{}); ok { if len(v) == 0 { fmt.Println("()") } else { fmt.Print("(list") for _, e := range v { fmt.Printf(" %#v", e) } fmt.Println(")") } } else { fmt.Printf("%#v\n", value) } } } fmt.Println() return nil }
func newTerm() Term { w := new(wterm) w.t = terminal.NewTerminal(w, "lixian >> ") return w }
func main() { flag.Parse() w := eval.NewWorld() if *filename != "" { data, err := ioutil.ReadFile(*filename) if err != nil { fmt.Println(err.Error()) os.Exit(1) } file, err := parser.ParseFile(fset, *filename, data, 0) if err != nil { fmt.Println(err.Error()) os.Exit(1) } files := []*ast.File{file} code, err := w.CompilePackage(fset, files, "main") if err != nil { if list, ok := err.(scanner.ErrorList); ok { for _, e := range list { fmt.Println(e.Error()) } } else { fmt.Println(err.Error()) } os.Exit(1) } code, err = w.Compile(fset, "main()") if err != nil { fmt.Println(err.Error()) os.Exit(1) } _, err = code.Run() if err != nil { fmt.Println(err.Error()) os.Exit(1) } os.Exit(0) } fmt.Println(":: welcome to go-eval...\n(hit ^D to exit)") fd := int(os.Stdin.Fd()) oldState, err := terminal.MakeRaw(fd) if err != nil { panic(err) } defer terminal.Restore(fd, oldState) term := terminal.NewTerminal(&shell{r: os.Stdin, w: os.Stdout}, "> ") if term == nil { panic(errors.New("could not create terminal")) } for { line, err := term.ReadLine() if err != nil { break } code, err := w.Compile(fset, line) if err != nil { term.Write([]byte(err.Error() + "\n")) continue } v, err := code.Run() if err != nil { term.Write([]byte(err.Error() + "\n")) continue } if v != nil { term.Write([]byte(v.String() + "\n")) } } }