forked from cybrota/recaller
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathprocess.go
More file actions
187 lines (162 loc) · 4.6 KB
/
process.go
File metadata and controls
187 lines (162 loc) · 4.6 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
// Copyright 2025 Naren Yellavula
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package main
import (
"bufio"
"context"
"fmt"
"io"
"os"
"os/exec"
"os/signal"
"sync"
"syscall"
"time"
"github.com/creack/pty"
)
// ProcessConfig holds configuration for process execution
type ProcessConfig struct {
Timeout time.Duration
MaxOutputSize int64
KillOnTimeout bool
}
// DefaultProcessConfig returns sensible defaults
func DefaultProcessConfig() *ProcessConfig {
return &ProcessConfig{
Timeout: 5 * time.Minute, // 5 minutes default
MaxOutputSize: 10 * 1024 * 1024, // 10MB limit
KillOnTimeout: true,
}
}
// ProcessManager tracks active processes for cleanup
type ProcessManager struct {
processes map[int]*exec.Cmd
mu sync.RWMutex
}
var globalProcessManager = &ProcessManager{
processes: make(map[int]*exec.Cmd),
}
func (pm *ProcessManager) addProcess(cmd *exec.Cmd) {
pm.mu.Lock()
defer pm.mu.Unlock()
if cmd.Process != nil {
pm.processes[cmd.Process.Pid] = cmd
}
}
func (pm *ProcessManager) removeProcess(pid int) {
pm.mu.Lock()
defer pm.mu.Unlock()
delete(pm.processes, pid)
}
func (pm *ProcessManager) killAll() {
pm.mu.RLock()
defer pm.mu.RUnlock()
for _, cmd := range pm.processes {
if cmd.Process != nil {
_ = cmd.Process.Kill()
}
}
}
func execCommandInPTY(command string) {
execCommandInPTYWithConfig(command, DefaultProcessConfig())
}
func execCommandInPTYWithConfig(command string, config *ProcessConfig) {
ctx, cancel := context.WithTimeout(context.Background(), config.Timeout)
defer cancel()
// Use /bin/bash instead of sh, or detect the shell from environment
shell := os.Getenv("SHELL")
if shell == "" {
shell = "/bin/bash" // fallback to bash
}
cmd := exec.CommandContext(ctx, shell, "-c", command)
// Set up process group for better signal handling
cmd.SysProcAttr = &syscall.SysProcAttr{Setpgid: true}
// Set up signal handling BEFORE starting process
sigChan := make(chan os.Signal, 1)
signal.Notify(sigChan, os.Interrupt, syscall.SIGTERM)
defer signal.Stop(sigChan)
// Try to start the command in a pseudo-terminal, fallback to regular execution
ptyFile, err := pty.Start(cmd)
usePTY := err == nil
if !usePTY {
// Fallback to regular execution without PTY
cmd.Stdout = os.Stdout
cmd.Stderr = os.Stderr
cmd.Stdin = os.Stdin
if err := cmd.Start(); err != nil {
fmt.Fprintln(os.Stderr, "Failed to start command:", err)
os.Exit(1)
}
}
// Ensure cleanup happens
var cleanupOnce sync.Once
cleanup := func() {
cleanupOnce.Do(func() {
if usePTY && ptyFile != nil {
ptyFile.Close()
}
if cmd.Process != nil {
globalProcessManager.removeProcess(cmd.Process.Pid)
}
close(sigChan)
})
}
defer cleanup()
// Track the process
globalProcessManager.addProcess(cmd)
// Handle signals in a separate goroutine
go func() {
for sig := range sigChan {
if cmd.Process != nil {
// Forward signal to the entire process group
if err := syscall.Kill(-cmd.Process.Pid, sig.(syscall.Signal)); err != nil {
// Only log unexpected errors
if err != syscall.ESRCH && err != syscall.EPERM {
fmt.Fprintf(os.Stderr, "failed to forward signal %v: %v\n", sig, err)
}
}
}
}
}()
// Copy data between PTY and terminal with size limiting (only if using PTY)
if usePTY {
go func() {
limitedReader := &io.LimitedReader{R: ptyFile, N: config.MaxOutputSize}
_, _ = io.Copy(os.Stdout, limitedReader)
if limitedReader.N == 0 {
fmt.Fprintln(os.Stderr, "\n[WARNING: Output truncated - exceeded size limit]")
}
}()
}
// Wait for command completion or timeout
done := make(chan error, 1)
go func() {
done <- cmd.Wait()
}()
select {
case err := <-done:
if err != nil {
fmt.Fprintln(os.Stderr, "Command error:", err)
}
case <-ctx.Done():
if config.KillOnTimeout && cmd.Process != nil {
fmt.Fprintln(os.Stderr, "\n[TIMEOUT: Command exceeded time limit, killing process]")
_ = cmd.Process.Kill()
}
<-done // Wait for process to actually exit
}
// Now prompt the user
fmt.Print("\nHit <Return/Enter> then <Ctrl/Cmd> + c to exit...")
bufio.NewReader(os.Stdin).ReadString('\n')
}