22 Commits

Author SHA1 Message Date
15b8089e37 version bump: v2.0.2 2026-02-25 22:59:02 +01:00
grialion
dd6760127c fix: launch state off by one bug (#116)
Previously it couldn't find the currect user/session because the last
newline character was present in the field
2026-02-08 17:39:09 +01:00
github-actions[bot]
8e9a222908 Update NixOS module to v2.0.1 (#115)
Co-authored-by: GitHub Actions <actions@github.com>
2026-02-07 18:46:44 +01:00
502d749df6 chore(release): v2.0.1 2026-02-07 18:40:10 +01:00
0b2d0bdf03 fixes: improve login environment handling (#114)
* chore(organization): allow nested header and c files

* feat: add shell login "middleware" & etc:
  * lidm now calls `bash` (or other shells, depends on PACKAGE cfg) in
  login mode as a session wrapper to source most env (can be disabled)
  * this fixes a lot of env problems with all `/etc/profile` and more

Extra:
* implemented a musl compatible version of `execvpe` and now lidm should
  search for PATH everywhere it needs to
* `search_path` now also checks if the found binary is properly
  executable
* lidm now uses `confstr` for a decent PATH default if none is found
* logs are unbuffered for cases where debug logs appear empty (exit
  without handlers moment)

* chore: one-time evaluate certain makefile vars

---------

Co-authored-by: grialion <48643945+grialion@users.noreply.github.com>
2026-02-07 17:12:03 +01:00
c009c6c31c remove: all aur stuff (#113)
there are more contributors now and given the rare releases its much better to manually prepare a release than to automate it

also, the packages now could be updated by any maintainer so not worth it to keep it centralized

and now releases are much less dependant on the scripts, so its not such a hassle
2026-02-07 15:23:30 +01:00
6de3996cf0 git-lfs,media: add lfs for media files and new catpuccin imgs (#111) 2026-02-06 14:57:42 +01:00
Martin Bogdanov
dba9a719d5 make(install): edit systemd service Exec path to include $PERFIX (#104)
* edit systemd service exec path at install time to make it reflect binary install location

* move removal of intermediary service file to clean recipe

* move sed-generated service file to dist
2026-02-05 17:58:30 +01:00
github-actions[bot]
bdad1fa3f8 Update NixOS module to v2.0.0 (#103)
Co-authored-by: GitHub Actions <actions@github.com>
2026-02-05 01:19:14 +01:00
Toria
a84d83ab29 Add catppuccin to lidm themes! (#109)
* Add catppuccin to lidm themes!

Signed-off-by: Toria <ninetailedtori@uwu.gal>

* Push basic theme info, and astylised header - just for fun!

Signed-off-by: Toria <ninetailedtori@uwu.gal>

* Swap green and blue for entry and username!

Signed-off-by: Toria <ninetailedtori@uwu.gal>

---------

Signed-off-by: Toria <ninetailedtori@uwu.gal>
2026-02-05 00:35:01 +01:00
aa2feb3462 fix(cfg): string.opts* not applying to user (#110) 2026-02-04 22:33:17 +01:00
978aaad199 chore: misc (#100) (this makes 2.0.0)
Co-authored-by: grialion <48643945+grialion@users.noreply.github.com>

- Fix license ambiguity (#88)
  - just the only/or-later ambiguity point, not adding SPDX identifyiers unless more people request it
- Better document kmscon (#91)
- Make 2.0.0 already to close #86
- Add a changelog
- Add packagers info (acutally just add them to install guide)
- Add AUR service packages (I'll take care of systemd and dinit, let others package the rest and leave systemd open for someone who actually uses it in docs)
- Make sure all makefile installs to `/usr/local` by default
- Simplify Makefile complexity by several orders
2026-01-20 23:33:28 +01:00
9cf5297205 fix: building with -flto=auto (#102)
I need this to finish the AUR packages at #100.

It probably also broke the current lidm-git package
2026-01-20 22:29:58 +01:00
7e7a297e2e feat: support Xorg & better auth logic (#80)
Co-authored-by: grialion <48643945+grialion@users.noreply.github.com>
2026-01-19 21:17:45 +01:00
Martin Bogdanov
d65bd7a8ee feat: get sessions from /usr/local/share/{x,wayland-}sessions (#99)
Co-authored-by: javalsai <jvssxxi@gmail.com>
2026-01-19 20:35:44 +01:00
Martin Bogdanov
728611aa19 fix: systemd service install recipe & systemd service restart (#96) 2026-01-16 16:18:13 +01:00
Martin Bogdanov
4eca2b056f docs,makefile: put conventional systemd service path (#94)
`/etc/systemd` -> `/usr/local/lib/systemd`
2026-01-15 23:52:46 +01:00
creations
a7a1f42f0a feat: add support for fido yubikeys (#89)
* add support for fido keybind

* add to themes

* fix clang format

* Update ui.c

* docs: add misc stuff about the yubikey

---------

Co-authored-by: javalsai <jvssxxi@gmail.com>
2025-12-13 21:37:58 +01:00
dariuskl
feeba5c41b feat: don't trunc long hostnames if there is space (#87)
Instead of restricting the length of the hostname field to the size of
the column, the hostname is allowed to utilize all space that is not
taken up by the time string.

Co-authored-by: Darius Kellermann <kellermann@pm.me>
2025-11-16 17:29:59 +01:00
ddc38ef27f fix: stupid logic bug
https://github.com/javalsai/lidm/issues/77#issuecomment-3225642519
2025-08-26 22:33:13 +02:00
grialion
b3c8d3cbea feat: exec parser for desktop entries (#78)
Feature-rich Exec= parser implementation for .desktop files
* backslash stripping (e.g '\ ' -> ' ')
* percentage stripping (e.g '%u' -> '', '%%' -> '%')
* quote string handling (e.g 'arg1 "arg 2"' -> "arg1", "arg 2")
The current implementation strips all "percentage codes", instead
of handling them.
Argument count is limited at 100.

---------

Co-authored-by: javalsai <jvssxxi@gmail.com>
2025-08-26 21:19:25 +02:00
5761838112 redo of #69 (#75)
* fix(pkg,aur): sources now are version unique

* build: allow to override git-rev and timestamp build info

* chore: organize and parallelize some checks

* chore: make standard PKGBUIDLs

* pkg(aur): `-bin` only has to depend on the `.so` file

* pkg(feat,aur): multiarch `-bin` pkg

* ci(void): update xbps first, add warning

* pkg(aur): bump pkgrels

* pkg(aur): pkgrel again AND `.SRCINFO` finally

---------

Co-authored-by: grialion <48643945+grialion@users.noreply.github.com>
2025-08-23 00:43:33 +02:00
93 changed files with 2055 additions and 1083 deletions

View File

@@ -16,15 +16,13 @@ Checks: >
readability-*, readability-*,
-readability-braces-around-statements, -readability-braces-around-statements,
WarningsAsErrors: '' WarningsAsErrors: ""
HeaderFilterRegex: '.*' HeaderFilterRegex: ".*"
FormatStyle: file FormatStyle: file
CheckOptions: CheckOptions:
- key: readability-magic-numbers.IgnoredIntegerValues - key: readability-magic-numbers.IgnoredIntegerValues
value: '0;1;2;3;10;255' value: "0;1;2;3;10;255"
# - key: readability-magic-numbers.IgnoredValues
# value: '0;1;2;3;10;255'
- key: readability-identifier-naming.VariableCase - key: readability-identifier-naming.VariableCase
value: lower_case value: lower_case
- key: readability-identifier-naming.ConstantParameterCase - key: readability-identifier-naming.ConstantParameterCase
@@ -32,16 +30,20 @@ CheckOptions:
- key: readability-identifier-naming.ConstantCase - key: readability-identifier-naming.ConstantCase
value: "UPPER_CASE" value: "UPPER_CASE"
- key: readability-identifier-naming.EnumCase
value: "CamelCase"
- key: readability-identifier-naming.FunctionCase
value: "lower_case"
- key: readability-identifier-length.VariableThreshold - key: readability-identifier-length.VariableThreshold
value: '2' value: "2"
- key: readability-identifier-length.ParameterThreshold - key: readability-identifier-length.ParameterThreshold
value: '2' value: "2"
- key: readability-identifier-length.LocalConstantThreshold - key: readability-identifier-length.LocalConstantThreshold
value: '2' value: "2"
- key: readability-identifier-length.MemberThreshold - key: readability-identifier-length.MemberThreshold
value: '2' value: "2"
- key: readability-identifier-length.MinimumParameterNameLength - key: readability-identifier-length.MinimumParameterNameLength
value: '2' value: "2"
- key: readability-identifier-length.MinimumVariableNameLength - key: readability-identifier-length.MinimumVariableNameLength
value: '2' value: "2"

2
.gitattributes vendored Normal file
View File

@@ -0,0 +1,2 @@
*.gif filter=lfs diff=lfs merge=lfs -text
*.png filter=lfs diff=lfs merge=lfs -text

View File

@@ -132,6 +132,7 @@ jobs:
path: lidm-riscv64 path: lidm-riscv64
retention-days: 1 retention-days: 1
# This build job is only symbolic, the behavior of the packaged Void Linux version may differ.
build-linux-amd64-musl: build-linux-amd64-musl:
name: amd64-musl name: amd64-musl
runs-on: ubuntu-24.04 runs-on: ubuntu-24.04
@@ -147,7 +148,7 @@ jobs:
run: | run: |
cd /workspace cd /workspace
xbps-install -Sy xbps-install -Syu xbps && xbps-install -yu
xbps-install -y git pam-devel make gcc bash git xbps-install -y git pam-devel make gcc bash git
ARCH=amd64-musl GITHUB_STEP_SUMMARY=gss.out GITHUB_OUTPUT=go.out assets/github_scripts/build.sh ARCH=amd64-musl GITHUB_STEP_SUMMARY=gss.out GITHUB_OUTPUT=go.out assets/github_scripts/build.sh

View File

@@ -26,7 +26,7 @@ jobs:
with: with:
packages: "shellcheck" packages: "shellcheck"
version: 1.0 version: 1.0
- run: find . -type f -name '*.sh' -not -path './assets/pkg/aur/*/src/*' | xargs shellcheck - run: git ls-files "*.sh" "*/PKGBUILD" | xargs shellcheck --shell=bash
clangcheck: clangcheck:
name: Clang name: Clang

View File

@@ -65,40 +65,6 @@ jobs:
artifactErrorsFailBuild: true artifactErrorsFailBuild: true
body: Release notes not generated yet. body: Release notes not generated yet.
aur-update:
name: Update AUR pkgs
runs-on: ubuntu-24.04
container: archlinux:latest
permissions: write-all
needs: [ release-checks, release ]
steps:
- run: pacman -Sy --noconfirm git github-cli base-devel pacman-contrib
- uses: actions/checkout@v4
- run: |
chage -E -1 nobody
passwd -u nobody
cd "assets/pkg/aur"
chown nobody:nobody . -R
su - -s /bin/bash nobody -c "$PWD/update-pkgs.sh ${{ needs.release-checks.outputs.VERSION }}"
su - -s /bin/bash nobody -c "$PWD/test-makepkg.sh" # This will also update -git pkgver
chown $UID:$(id -g) . -R
- run: |
BRANCH=actions/update-aur-${{ needs.release-checks.outputs.VERSION }}
git config --global --add safe.directory $GITHUB_WORKSPACE
git config user.name "GitHub Actions"
git config user.email "actions@github.com"
git checkout -b $BRANCH
git commit -am "Update AUR pkgs to v${{ needs.release-checks.outputs.VERSION }}"
git push -u origin $BRANCH
gh pr create --head $BRANCH \
--title "[AUR update]: Bump to ${{ needs.release-checks.outputs.VERSION }}" \
--body "*This PR was created automatically*"
env:
GH_TOKEN: ${{ github.token }}
nix-update: nix-update:
name: Update NixOS module name: Update NixOS module
runs-on: ubuntu-24.04 runs-on: ubuntu-24.04

2
.gitignore vendored
View File

@@ -8,5 +8,3 @@ valgrind-out.txt
# nix build result # nix build result
result result
include/version.h

23
CHANGELOG.md Normal file
View File

@@ -0,0 +1,23 @@
<!-- Unspecified dates shall be in CET/CEST -->
<!-- Add only very relevant changes, bottom to top -->
<!-- By "very relevant" I mean big features or something manual packagers should know, like leftover files -->
<!-- Once a release would be opened, group the last bunch of dangling changes, add release version as header and its date -->
# 2.0.2
- fix off-by-one error with launch state save
# 2.0.1
- source and header files can be nested in `src/` and `include/`
- lidm now calls bash for logging in and sourcing profile files, other shells can be configured
- a good PATH default is fetched from `confstr`
- debug logs are now unbuffered
# 2.0.0
- Most stuff (most of `/etc` being a notable exception) now installs to `/usr/local` by default, check [`docs/PACKAGERS.md`](./docs/PACKAGERS.md).
- Added a changelog.
- Finally add proper (experimental) xorg support.
- Systemd service install path changed to `/usr/local/lib/systemd`, there could be a leftover file at `/etc/systemd/system/lidm.service`.

154
Makefile
View File

@@ -1,51 +1,45 @@
VERSION = 1.2.3 VERSION := 2.0.2
.DEFAULT_GOAL := lidm .DEFAULT_GOAL := lidm
CDIR=src CDIR = src
LDIR=lib LDIR = lib
IDIR=include IDIR = include
ODIR=dist ODIR = dist
PREFIX=/usr PREFIX = /usr/local
CC?=gcc INFO_GIT_REV ?= $(shell git describe --long --tags --always || echo '?')
CFLAGS?=-O3 -Wall INFO_GIT_REV := $(INFO_GIT_REV)
INFO_BUILD_TS ?= $(shell date +%s)
INFO_BUILD_TS := $(INFO_BUILD_TS)
CFLAGS ?= -O3 -Wall -Wextra -fdata-sections -ffunction-sections
# C PreProcessor flags, not C Plus Plus # C PreProcessor flags, not C Plus Plus
CPPFLAGS?= CPPFLAGS ?=
ALLFLAGS=$(CFLAGS) $(CPPFLAGS) -I$(IDIR) _DFLAGS?= \
-DLIDM_VERSION=\"$(VERSION)\" \
-DLIDM_GIT_REV=\"$(INFO_GIT_REV)\" \
-DLIDM_BUILD_TS=$(INFO_BUILD_TS)
ALLFLAGS = $(_DFLAGS) $(CFLAGS) $(CPPFLAGS) -I$(IDIR)
LDFLAGS ?= -Wl,--gc-sections
LIBS=-lpam LIBS = -lpam
_DEPS = version.h log.h util.h ui.h ui_state.h config.h desktop.h auth.h ofield.h efield.h keys.h users.h sessions.h chvt.h macros.h launch_state.h # includes all headers in `$(IDIR)` and compiles everything in `$(CDIR)`
DEPS = $(patsubst %,$(IDIR)/%,$(_DEPS)) DEPS = $(wildcard $(IDIR)/*.h $(IDIR)/**/*.h)
_SOURCES = $(wildcard $(CDIR)/*.c) $(wildcard $(CDIR)/**/*.c)
_OBJ = main.o log.o util.o ui.o ui_state.o config.o desktop.o auth.o ofield.o efield.o users.o sessions.o chvt.o launch_state.o OBJ = $(patsubst $(CDIR)/%.c,$(ODIR)/%.o,$(_SOURCES))
OBJ = $(patsubst %,$(ODIR)/%,$(_OBJ))
.git/HEAD:
$(IDIR)/version.h: Makefile .git/HEAD
@tmp=$$(mktemp); \
printf '' > $$tmp; \
echo '#define LIDM_VERSION "'$(VERSION)'"' >> $$tmp; \
echo '#define LIDM_GIT_REV "'$$(git describe --long --tags --always || echo '?')'"' >> $$tmp; \
echo '#define LIDM_BUILD_TS '$$(date +%s) >> $$tmp; \
if ! cmp -s $$tmp $@; then \
mv $$tmp $@; \
fi; \
rm -f $$tmp;
$(ODIR)/%.o: $(CDIR)/%.c $(DEPS) $(ODIR)/%.o: $(CDIR)/%.c $(DEPS)
@mkdir -p $(ODIR) @mkdir -p $(dir $@)
$(CC) -c -o $@ $< $(ALLFLAGS) $(CC) -c -o $@ $< $(ALLFLAGS)
lidm: $(OBJ) lidm: $(OBJ)
$(CC) -o $@ $^ $(ALLFLAGS) $(LIBS) $(CC) -o $@ $^ $(ALLFLAGS) $(LIBS) $(LDFLAGS)
clean: clean:
rm -f $(ODIR)/*.o lidm rm -rf $(ODIR) lidm
# Copy lidm to ${DESTDIR}${PREFIX}/bin (/usr/bin)
install: lidm install: lidm
mkdir -p ${DESTDIR}${PREFIX}/bin ${DESTDIR}${PREFIX}/share/man/man{1,5} mkdir -p ${DESTDIR}${PREFIX}/bin ${DESTDIR}${PREFIX}/share/man/man{1,5}
install -Dm755 ./lidm ${DESTDIR}${PREFIX}/bin/ install -Dm755 ./lidm ${DESTDIR}${PREFIX}/bin/
@@ -53,103 +47,25 @@ install: lidm
install -Dm644 ./assets/man/lidm.1 ${DESTDIR}${PREFIX}/share/man/man1/ install -Dm644 ./assets/man/lidm.1 ${DESTDIR}${PREFIX}/share/man/man1/
install -Dm644 ./assets/man/lidm-config.5 ${DESTDIR}${PREFIX}/share/man/man5/ install -Dm644 ./assets/man/lidm-config.5 ${DESTDIR}${PREFIX}/share/man/man5/
uninstall: uninstall: uninstall-service
rm -rf ${DESTDIR}${PREFIX}/bin/lidm ${DESTDIR}/etc/lidm.ini rm -rf ${DESTDIR}${PREFIX}/bin/lidm ${DESTDIR}/etc/lidm.ini
rm -rf ${DESTDIR}/usr/share/man/man{1/lidm.1,5/lidm-config.5}.gz rm -rf ${DESTDIR}${PREFIX}/share/man/man{1/lidm.1,5/lidm-config.5}.gz
rm -rf ${DESTDIR}/etc/systemd/system/lidm.service ${DESTDIR}/etc/dinit.d/lidm ${DESTDIR}/etc/runit/sv/lidm
install-service: include services.mk
@if command -v systemctl &> /dev/null; then \
make install-service-systemd; \
elif command -v dinitctl &> /dev/null; then \
make install-service-dinit; \
elif command -v sv &> /dev/null; then \
if [ -d /etc/sv ]; then \
make install-service-runit; \
elif [ -d /etc/runit/sv ]; then \
make install-service-runit-etc; \
else \
printf '\033[31m%s\033[0m\n' "Unknown init system structure, skipping service install..." >&2; \
fi \
elif command -v rc-update &> /dev/null; then \
make install-service-openrc; \
elif command -v s6-service &> /dev/null; then \
if [ -d /etc/sv ]; then \
make install-service-s6; \
elif [ -d /etc/r6nit/sv ]; then \
make install-service-s6-etc; \
else \
printf '\033[31m%s\033[0m\n' "Unknown init system structure, skipping service install..." >&2; \
fi \
else \
printf '\033[1;31m%s\033[0m\n' "Unknown init system, skipping service install..." >&2; \
fi
install-service-systemd:
install -m644 ./assets/services/systemd.service ${DESTDIR}/etc/systemd/system/lidm.service
@printf '\033[1m%s\033[0m\n\n' " don't forget to run 'systemctl enable lidm'"
install-service-dinit:
install -m644 ./assets/services/dinit ${DESTDIR}/etc/dinit.d/lidm
@printf '\033[1m%s\033[0m\n\n' " don't forget to run 'dinitctl enable lidm'"
install-service-runit:
@if [ ! -e /etc/sv ] && [ -d /etc/runit/sv ] && [ -z "$FORCE" ]; then \
printf '\033[31m%s\033[0m\n' "/etc/sv doesn't exist but /etc/runit/sv does" >&2; \
printf '\033[31m%s\033[0m\n' "you probably meant to 'make install-service-runit-etc'" >&2; \
exit 1; \
fi
mkdir -p ${DESTDIR}/etc/sv/lidm
cp -r --update=all ./assets/services/runit/* ${DESTDIR}/etc/sv/lidm/
@printf '\033[1m%s\033[0m\n\n' " don't forget to run 'ln -s ${DESTDIR}/etc/sv/lidm /var/service' or your distro equivalent"
install-service-runit-etc:
@if [ ! -e /etc/runit/sv ] && [ -d /etc/sv ] && [ -z "$FORCE" ]; then \
printf '\033[31m%s\033[0m\n' "/etc/runit/sv doesn't exist but /etc/sv does" >&2; \
printf '\033[31m%s\033[0m\n' "you probably meant to 'make install-service-runit'" >&2; \
exit 1; \
fi
mkdir -p ${DESTDIR}/etc/runit/sv/lidm
cp -r --update=all ./assets/services/runit/* ${DESTDIR}/etc/runit/sv/lidm/
@printf '\033[1m%s\033[0m\n\n' " don't forget to run 'ln -s ${DESTDIR}/etc/runit/sv/lidm /run/runit/service' or your distro equivalent"
install-service-openrc:
install -m755 ./assets/services/openrc ${DESTDIR}/etc/init.d/lidm
@printf '\033[1m%s\033[0m\n\n' " don't forget to run 'rc-update add lidm'"
install-service-s6:
@if [ ! -e /etc/sv ] && [ -d /etc/s6/sv ] && [ -z "$FORCE" ]; then \
printf '\033[31m%s\033[0m\n' "/etc/sv doesn't exist but /etc/s6/sv does" >&2; \
printf '\033[31m%s\033[0m\n' "you probably meant to 'make install-service-s6-etc'" >&2; \
exit 1; \
fi
mkdir -p ${DESTDIR}/etc/sv/lidm
cp -r --update=all ./assets/services/s6/* ${DESTDIR}/etc/sv/lidm/
@printf '\033[1m%s\033[0m\n\n' " don't forget to run 's6-service add default lidm' and 's6-db-reload'"
install-service-s6-etc:
@if [ ! -e /etc/s6/sv ] && [ -d /etc/sv ] && [ -z "$FORCE" ]; then \
printf '\033[31m%s\033[0m\n' "/etc/s6/sv doesn't exist but /etc/sv does" >&2; \
printf '\033[31m%s\033[0m\n' "you probably meant to 'make install-service-s6'" >&2; \
exit 1; \
fi
mkdir -p ${DESTDIR}/etc/s6/sv/lidm
cp -r --update=all ./assets/services/s6/* ${DESTDIR}/etc/s6/sv/lidm/
@printf '\033[1m%s\033[0m\n\n' " don't forget to run 's6-service add default lidm' and 's6-db-reload'"
pre-commit: pre-commit:
codespell codespell
prettier --write "**/*.md" prettier -c "**/*.md"
find . -type f -name '*.sh' -not -path './assets/pkg/aur/*/src/*' | xargs shellcheck git ls-files "*.sh" "*/PKGBUILD" | xargs shellcheck --shell=bash
clang-format -i $$(git ls-files "*.c" "*.h") clang-format -i $$(git ls-files "*.c" "*.h")
clang-tidy -p . $$(git ls-files "*.c" "*.h") git ls-files -z "*.c" "*.h" | \
parallel -j$$(nproc) -q0 --no-notice --will-cite --tty clang-tidy -warnings-as-errors=\* --quiet |& \
grep -v "warnings generated." || true
print-version: print-version:
@echo $(VERSION) @echo $(VERSION)
.PHONY: clean \ .PHONY: clean \
install uninstall \ install uninstall \
install-service \
install-service-s6 \
install-service-s6-etc \
install-service-dinit \
install-service-runit \
install-service-runit-etc \
install-service-openrc \
install-service-systemd \
pre-commit \ pre-commit \
print-version print-version

View File

@@ -15,22 +15,27 @@ LiDM is like any [Display Manager](https://en.wikipedia.org/wiki/X_display_manag
shown as in a featured terminal emulator, actual linux console doesn't support as much color and decorations shown as in a featured terminal emulator, actual linux console doesn't support as much color and decorations
</i></summary> </i></summary>
If you want to add fancy color and font support to your TTYs you can wrap lidm in [`kmscon`](https://wiki.archlinux.org/title/KMSCON). (edit appropriate service files). e.g: If you want to add fancy color and font support to your TTYs you can try wrapping lidm in [`kmscon`](https://wiki.archlinux.org/title/KMSCON). (edit appropriate service files). e.g:
```sh ```sh
kmscon -l --vt /dev/tty7 --font-name "Cascadia Code" -- /usr/bin/lidm kmscon -l --vt /dev/tty7 --font-name "Cascadia Code" -- /usr/bin/lidm
``` ```
Kmscon is NOT officially supported so you are on your own when trying this, [according to the arch wiki](https://wiki.archlinux.org/title/KMSCON#Window_managers_cannot_be_started_from_KMS_console) it's not possible to start window managers if you do this.
But [according to farouk](https://github.com/javalsai/lidm/issues/91#issuecomment-3708503568) you can make it work if you tell kmscon to work in `no-drm` mode. There's still input grabbing issues which cause <kbd><kbd>Ctrl</kbd> + <kbd>C</kbd></kbd> to kill lidm, they are likely fixable though.
</details></blockquote> </details></blockquote>
> _however, all colors and strings are fully customizable_ > _however, all colors and strings are fully customizable_
## Features ## Features
- Simple as C, you only need a C compiler and standard unix libraries to build this. - Simple as C, meant to depend only on standard libc and basic unix system headers.
- Fully customizable, from strings, including action keys, to colors (I hope you know ansi escape codes) - Fully customizable: ALL strings, colors (with its ANSI keys) and most behavior.
- Automatically detects xorg and wayland sessions, plus allowing to launch the default user shell (if enabled in config) - Experimental Xorg support[\*](https://github.com/javalsai/lidm/pull/80?#issuecomment-3764073217) and wayland sessions, while supporting the default user shell (if enabled in config)
- Starts with many init systems (systemd, dinit, runit, openrc and s6). - Init agnostinc (systemd, dinit, runit, openrc and s6).
- Supports [fido yubikeys](./docs/yubikey.md) (via pam_u2f).
# Table of Contents # Table of Contents
@@ -43,6 +48,7 @@ kmscon -l --vt /dev/tty7 --font-name "Cascadia Code" -- /usr/bin/lidm
- [Configuring](#configuring) - [Configuring](#configuring)
- [PAM](#pam) - [PAM](#pam)
- [Contributing](#contributing) - [Contributing](#contributing)
- [License](#license)
- [Inspiration](#inspiration) - [Inspiration](#inspiration)
- [Contributors](#contributors) - [Contributors](#contributors)
@@ -116,6 +122,10 @@ When the env variable is empty it defaults to the `login` PAM service or whateve
If you want to contribute check the [contribution guide](docs/CONTRIBUTING.md). If you want to contribute check the [contribution guide](docs/CONTRIBUTING.md).
# License
This project is licensed under the GNU General Public License v3.0 **only**.
# Inspiration # Inspiration
This project was started after facing some issues building [ly](https://github.com/fairyglade/ly) on an ancient laptop, the UI is heavily inspired by it. This project was started after facing some issues building [ly](https://github.com/fairyglade/ly) on an ancient laptop, the UI is heavily inspired by it.

View File

@@ -69,13 +69,13 @@ Characters for the corners of the box (ctl = corner top left, cbr = corner botto
.SS functions .SS functions
All these are of type \fBKEY\fP. All these are of type \fBKEY\fP.
.TP .TP
\fBpoweroff, reboot, refresh\fP \fBpoweroff, reboot, fido, refresh\fP
Function key to use for such action. Function key to use for such action.
.SS strings .SS strings
Display strings to use for some elements. Display strings to use for some elements.
.TP .TP
\fBf_poweroff, f_reboot, f_refresh\fP \fBf_poweroff, f_reboot, f_fido, f_refresh\fP
Text displayed to name such functions at the bottom of the screen. Text displayed to name such functions at the bottom of the screen.
.TP .TP
\fBe_user, e_passwd\fP \fBe_user, e_passwd\fP
@@ -104,6 +104,9 @@ Specify the time format string to be displayed. Check \fBstrftime (3)\fP to know
.TP .TP
\fBrefresh_rate\fP \fBrefresh_rate\fP
Rate (in milliseconds) at which the UI should refresh, affects clock and resize behavior. Rate (in milliseconds) at which the UI should refresh, affects clock and resize behavior.
.TP
\fBbypass_shell_login\fP
Type \fBBOOL\fP, lidm logins through a login shell (e.g. `bash`) in login mode (e.g. `arg0` being `-bash`) to load `/etc/profile/, `/etc/profile.d/` and more. If this option is enabled that's bypassed entirely.
.SH "SEE ALSO" .SH "SEE ALSO"

Binary file not shown.

Before

Width:  |  Height:  |  Size: 205 KiB

After

Width:  |  Height:  |  Size: 131 B

View File

@@ -1,4 +0,0 @@
*/*
!*/.gitignore
!*/PKGBUILD
!*/.SRCINFO

View File

@@ -1,12 +0,0 @@
# AUR Packages
These files are just for reference, I'll manually edit and publish them, at least until I automate it with github actions (like updating version automatically on a release).
There are three packages that follow standard conventions:
- [`lidm`](https://aur.archlinux.org/packages/lidm): Builds latest release (manually updated per release basis)
- [`lidm-bin`](https://aur.archlinux.org/packages/lidm-bin): Fetches latest release binary (compiled by GitHub Actions, also updated per release)
- [`lidm-git`](https://aur.archlinux.org/packages/lidm-git): Fetches latest commit and builds it (should be updated automatically)
> \[!IMPORTANT]
> None of those packages include the service files. [You have to do this yourself](../../services/README.md).

View File

@@ -1,20 +0,0 @@
pkgbase = lidm-bin
pkgdesc = A fully colorful customizable TUI display manager made in C. (release binary)
pkgver = 1.2.3
pkgrel = 1
url = https://github.com/javalsai/lidm
arch = x86_64
license = GPL
depends = pam
provides = lidm
conflicts = lidm
source = lidm::https://github.com/javalsai/lidm/releases/download/v1.2.3/lidm-amd64
source = default-theme.ini::https://raw.githubusercontent.com/javalsai/lidm/v1.2.3/themes/default.ini
source = lidm.1::https://raw.githubusercontent.com/javalsai/lidm/v1.2.3/assets/man/lidm.1
source = lidm-config.5::https://raw.githubusercontent.com/javalsai/lidm/v1.2.3/assets/man/lidm-config.5
sha256sums = a533b5aee3ffe04268f8d3ff8d7eb87f09d31fbe25e1b8b1ed29c42ef465bd4b
sha256sums = ffaa5fe2cf5011bf53c90f81bfec8585158d35f72c0666db0bd4d3866ae041ca
sha256sums = 7f2fb91f55088be1a9b1c93ecf5d6c1e437f369b56df2eacc9d10b00c93c39f8
sha256sums = 0aa5755bdcc60ea80cd9ee0f89233ffaf22c6cee9db9da277274a62c6ed477d9
pkgname = lidm-bin

View File

@@ -1,3 +0,0 @@
*
!PKGBUILD
!.SRCINFO

View File

@@ -1,29 +0,0 @@
# shellcheck disable=SC2034,SC2148,SC2128,SC2154,SC2164
# Maintainer: javalsai <javalsai@proton.me>
pkgname=lidm-bin
pkgver=1.2.3
pkgrel=1
depends=('pam')
pkgdesc="A fully colorful customizable TUI display manager made in C. (release binary)"
arch=('x86_64')
url="https://github.com/javalsai/lidm"
license=('GPL')
provides=('lidm')
conflicts=('lidm')
source=(
"lidm::$url/releases/download/v$pkgver/lidm-amd64"
"default-theme.ini::https://raw.githubusercontent.com/javalsai/lidm/v$pkgver/themes/default.ini"
"lidm.1::https://raw.githubusercontent.com/javalsai/lidm/v$pkgver/assets/man/lidm.1"
"lidm-config.5::https://raw.githubusercontent.com/javalsai/lidm/v$pkgver/assets/man/lidm-config.5"
)
sha256sums=('a533b5aee3ffe04268f8d3ff8d7eb87f09d31fbe25e1b8b1ed29c42ef465bd4b'
'ffaa5fe2cf5011bf53c90f81bfec8585158d35f72c0666db0bd4d3866ae041ca'
'7f2fb91f55088be1a9b1c93ecf5d6c1e437f369b56df2eacc9d10b00c93c39f8'
'0aa5755bdcc60ea80cd9ee0f89233ffaf22c6cee9db9da277274a62c6ed477d9')
package() {
install -Dm755 lidm "${pkgdir}/usr/bin/lidm"
install -Dm644 default-theme.ini "${pkgdir}/etc/lidm.ini"
install -Dm644 lidm.1 "${pkgdir}/usr/share/man/man1/lidm.1"
install -Dm644 lidm-config.5 "${pkgdir}/usr/share/man/man5/lidm-config.5"
}

View File

@@ -1,17 +0,0 @@
pkgbase = lidm-git
pkgdesc = A fully colorful customizable TUI display manager made in C. (last git commit)
pkgver = 0.1.0.r0.g8071694
pkgrel = 1
url = https://github.com/javalsai/lidm
arch = any
license = GPL
makedepends = git
makedepends = make
makedepends = gcc
depends = pam
provides = lidm
conflicts = lidm
source = lidm::git+https://github.com/javalsai/lidm
sha256sums = SKIP
pkgname = lidm-git

View File

@@ -1,3 +0,0 @@
*
!PKGBUILD
!.SRCINFO

View File

@@ -1,31 +0,0 @@
# shellcheck disable=SC2034,SC2148,SC2128,SC2154,SC2164
# Maintainer: javalsai <javalsai@proton.me>
pkgname=lidm-git
pkgver=1.2.3.r0.g7e1ec83
pkgrel=1
depends=('pam')
makedepends=('git' 'make' 'gcc')
pkgdesc="A fully colorful customizable TUI display manager made in C. (last git commit)"
arch=('any')
url="https://github.com/javalsai/lidm"
license=('GPL')
provides=('lidm')
conflicts=('lidm')
source=("lidm::git+https://github.com/javalsai/lidm")
sha256sums=('SKIP')
pkgver() {
cd "lidm"
git describe --long --abbrev=7 --tags | \
sed 's/^v//;s/\([^-]*-g\)/r\1/;s/-/./g'
}
build() {
cd "lidm"
make CFLAGS="-O3"
}
package() {
cd "lidm"
make install DESTDIR="${pkgdir}"
}

View File

@@ -1,14 +0,0 @@
pkgbase = lidm
pkgdesc = A fully colorful customizable TUI display manager made in C. (build latest tag)
pkgver = 1.2.3
pkgrel = 1
url = https://github.com/javalsai/lidm
arch = any
license = GPL
makedepends = git
makedepends = gcc
depends = pam
source = tarball.tar.gz::https://github.com/javalsai/lidm/archive/refs/tags/v1.2.3.tar.gz
sha256sums = 1ce414b510c5bbc3e32ea882f915b4d3958cb82eb1fbb5cf33e62f69c844bf93
pkgname = lidm

View File

@@ -1,3 +0,0 @@
*
!PKGBUILD
!.SRCINFO

View File

@@ -1,25 +0,0 @@
# shellcheck disable=SC2034,SC2148,SC2128,SC2154,SC2164
# Maintainer: javalsai <javalsai@proton.me>
pkgname=lidm
pkgver=1.2.3
pkgrel=1
depends=('pam')
makedepends=('git' 'gcc')
pkgdesc="A fully colorful customizable TUI display manager made in C. (build latest tag)"
arch=('any')
url="https://github.com/javalsai/lidm"
license=('GPL')
source=("tarball.tar.gz::https://github.com/javalsai/lidm/archive/refs/tags/v$pkgver.tar.gz")
sha256sums=('1ce414b510c5bbc3e32ea882f915b4d3958cb82eb1fbb5cf33e62f69c844bf93')
build() {
tar -xzf "tarball.tar.gz"
cd "lidm-$pkgver"
make CFLAGS="-O3"
}
package() {
cd "lidm-$pkgver"
make install DESTDIR="${pkgdir}"
}

View File

@@ -1,12 +0,0 @@
#!/usr/bin/env bash
set -e
MYSELF=$(realpath "$0")
MYDIR=$(dirname "$MYSELF")
for pkg in "$MYDIR"/*/; do
cd "$pkg"
printf "\x1b[1mEntering '%s'\x1b[0m\n" "$pkg"
makepkg --printsrcinfo | tee .SRCINFO
echo
done

View File

@@ -1,21 +0,0 @@
#!/usr/bin/env bash
set -e
MYSELF=$(realpath "$0")
MYDIR=$(dirname "$MYSELF")
for pkg in "$MYDIR"/*/; do
printf "\x1b[1mEntering '%s'\x1b[0m\n" "$pkg"
cd "$pkg"
# shellcheck disable=SC1091
source "PKGBUILD"
for source in "${source[@]}"; do
awk -F'::' '{print $1}' <<<"$source" | xargs rm -rf
done
rm -rf ./*.{gz,zst} src pkg
makepkg -f .
echo
done

View File

@@ -1,29 +0,0 @@
#!/usr/bin/env bash
set -e
MYSELF=$(realpath "$0")
MYDIR=$(dirname "$MYSELF")
if [ -z "$1" ]; then
printf "\x1b[1;31mERR: No version to update provided\x1b[0m\n" >&2
exit 1;
fi
version="$1"
printf "\x1b[34mINF: Using '%s' version\x1b[0m\n" "$version"
for pkg in "$MYDIR"/lidm{,-bin}/; do
cd "$pkg"
printf "\x1b[1mEntering '%s'\x1b[0m\n" "$pkg"
sed -i "s/pkgver=.*/pkgver=$1/" PKGBUILD
sed -i "s/pkgrel=.*/pkgrel=1/" PKGBUILD
grep 'source = ' <.SRCINFO | awk -F'= |::' '{print $2}' | \
while read -r srcfile; do
printf "\x1b[31mDeleting '%s'\x1b[0m\n" "$srcfile"
rm -f "$srcfile"
done
updpkgsums
makepkg --printsrcinfo | tee .SRCINFO
echo
done

View File

@@ -11,7 +11,7 @@ let
dmcfg = config.services.displayManager; dmcfg = config.services.displayManager;
desktops = dmcfg.sessionData.desktops; desktops = dmcfg.sessionData.desktops;
version = "1.2.3"; version = "2.0.1";
lidmPkg = pkgs.callPackage ./lidm.nix { lidmPkg = pkgs.callPackage ./lidm.nix {
inherit pkgs; inherit pkgs;
config = { config = {
@@ -21,7 +21,7 @@ let
owner = "javalsai"; owner = "javalsai";
repo = "lidm"; repo = "lidm";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-eKgBoh+bRcl2Y7oOxW77Kjtb9Ws2Xln1SenknIsGxD4="; sha256 = "sha256-bpUqhD1JSiYRf7w7ylEMXHMvEpnSri1zZSxRQPdZWB4=";
}; };
xsessions = "${desktops}/share/xsessions"; xsessions = "${desktops}/share/xsessions";

View File

@@ -2,18 +2,17 @@
This folder contains the files necessary to set up lidm on start up for the supported init systems, all of them are configured for tty7. This folder contains the files necessary to set up lidm on start up for the supported init systems, all of them are configured for tty7.
If you're using lidm from a packaged source, this should be included with the package. Only read this for manual installations, if you are packaging or if your package exceptionally doesn't include them.
If you don't know what a init system is, you're certainly using `systemd`. If you don't know what a init system is, you're certainly using `systemd`.
There's make scripts to automatically copy the service files to the proper locations, you just have to run `make install-service-$INIT` (or `make install-service-$INIT-etc`). `make install-service` will attempt to detect the init system in use and install for it. There's make scripts to automatically copy the service files to the proper locations, you just have to run `make install-service-$INIT` (or `make install-service-$INIT-etc`). `make install-service` will attempt to detect the init system in use and install for it.
The manual steps for installation are: The manual steps for installation are:
> [!IMPORTANT]
> If you think this should be packaged too, there's [a discussion](https://github.com/javalsai/lidm/discussions/39) to talk about this.
## Systemd ## Systemd
- Copy `systemd.service` to `/etc/systemd/system/lidm.service` - Copy `systemd.service` to `/usr/local/lib/systemd/system/lidm.service` (if the directory doesn't exist, create it first) or `/usr/lib/systemd/system/lidm.service` (if you wish to install along your system files).
- To enable it you can run `systemctl enable lidm` - To enable it you can run `systemctl enable lidm`
## Dinit ## Dinit
@@ -23,8 +22,10 @@ The manual steps for installation are:
## Runit ## Runit
- Copy `runit/` to `/etc/runit/sv/lidm/` Your runit service path can be either `/etc/runit/sv` or `/etc/sv`.
- Add the service with `ln -s /etc/runit/sv/lidm /run/runit/service`
- Copy `runit/` to `runit-path/lidm/`
- Add the service with `ln -s runit-path/lidm /run/runit/service`
- And to enable it `sv enable lidm` - And to enable it `sv enable lidm`
## OpenRC ## OpenRC
@@ -34,7 +35,9 @@ The manual steps for installation are:
## S6 ## S6
- Copy `s6/` to `/etc/s6/sv/lidm/` Your S6 service path can be either `/etc/s6/sv` or `/etc/sv`.
- Copy `s6/` to `s6-path/lidm/`
- Add the service with `s6-service add default lidm` - Add the service with `s6-service add default lidm`
- Reload the database with `s6-db-reload` (you might have to run this every time the service file changes) - Reload the database with `s6-db-reload` (you might have to run this every time the service file changes)

View File

@@ -11,6 +11,7 @@ StandardError=tty
TTYPath=/dev/tty7 TTYPath=/dev/tty7
TTYReset=yes TTYReset=yes
TTYVHangup=yes TTYVHangup=yes
Restart=always
[Install] [Install]
Alias=display-manager.service Alias=display-manager.service

9
debug/lidm-debug Normal file
View File

@@ -0,0 +1,9 @@
type = process
command = /bin/sh -c "LIDM_LOG=/tmp/lidm.debug /sbin/agetty tty8 linux-c -n -l /usr/local/bin/lidm -o 8"
restart = true
depends-on = login.target
termsignal = HUP
smooth-recovery = true
inittab-id = 8
inittab-line = tty8
log-type = buffer

View File

@@ -1,63 +1,72 @@
# Table of Contents # Table of Contents
- [Packages](#packages)
- [Void Linux](#void-linux)
- [Fedora](#fedora)
- [AUR](#aur)
- [Nix Flake](#nix-flake)
- [Nix Module](#nix-module)
- [Installing from Source](#installing-from-source) - [Installing from Source](#installing-from-source)
- [AUR](#aur)
- [Nix Flake](#nix-flake)
- [Nix Module](#nix-module)
> [!CAUTION] # Packages
> I encourage you to read the manual installation steps to understand what will get installed in your computer by this package.
# Installing from Source Lidm relies on its community to package lidm for distributions and make the installation easier for everyone. Please raise any issues on the packages themselves and not the source repository.
Firstly, you'll need to build the package, this also includes man pages, default config, themes and other files you might need. If you packaged lidm for any distribution not listed here or keep your own version of an inactive package, feel free to contact me to be added here. (could be a GitHub discussion or an email if you don't use GitHub)
To build it you only need to have some basic packages (should come pre-installed in almost all distros): `make`, `gcc` or another `gcc`ish compiler, and libpam headers. If it builds, it surely works anyways. These packages just install lidm, once installed you have to enable it. It depends on your init system, but if you're using systemd (most likely), first find your currently active display manager (if any, examples are `sddm`, `gdm`, `ly`) and disable it:
```sh ```sh
git clone https://github.com/javalsai/lidm.git systemctl disable <display manager name here>
cd lidm
make # 👍
``` ```
> [!NOTE] And then enable lidm:
> There's pre-built binaries on the [releases tab](https://github.com/javalsai/lidm/releases) too.
Then you can install the files onto your filesystem with:
```sh ```sh
make install systemctl enable lidm
``` ```
And additionally, to install service files (start-up behavior). <sup>[more docs](../assets/services/README.md)</sup> Lidm now should show on the next boot!
If you are on a TTY and don't wish to reboot, you should be able to use `--now` with both commands. It's likely to kill your current desktop environment if it was launched from it.
## Void Linux
Lidm can be installed from the official Void Linux packages:
```sh ```sh
# automatically detects your init system xbps-install lidm
# and install service file (for tty7)
make install-service
# or if you don't like autodetection
make install-service-systemd # systemd
make install-service-dinit # dinit
make install-service-runit # runit (/etc/sv)
make install-service-runit-etc # runit (/etc/runit/sv)
make install-service-openrc # openrc
make install-service-s6 # s6 (/etc/sv)
make install-service-s6-etc # s6 (/etc/s6/sv)
# For runit and s6, some distros (e.g. Artix) like to put it in /etc/<init>/sv
# to better isolate their packages while other distros (e.g. Void) just put it
# in /etc/sv
``` ```
# AUR To enable the service that starts on boot:
[AUR packages](https://aur.archlinux.org/packages?K=lidm&SeB=n) will automatically install most files. ```sh
ln -s /etc/sv/lidm /var/service/
```
> [!CAUTION] It is recommended to disable any other display managers that are still enabled:
> [service files](../assets/pkg/aur#services) have to be manually installed by now.
# Nix Flake ```sh
touch /etc/sv/lightdm/down # replace lightdm with your previous display manager (e.g., sddm, gdm)
```
## Fedora
Thanks to @KernelFreeze there's a COPR repo available at <https://copr.fedorainfracloud.org/coprs/celestelove/lidm/> to install lidm. (<https://github.com/javalsai/lidm/discussions/92>)
## AUR
There are several [AUR packages](https://aur.archlinux.org/packages?K=lidm&SeB=n) for most things. You only need to install one of the following:
- `lidm`
- `lidm-bin`
- `lidm-git`
Each of those depend on `lidm-service` which is provided by `lidm-systemd` and `lidm-dinit` (you'll have to pick one). I maintain both but I'm open to anyone that actually uses systemd to take the first one.
There's packagers needed for openrc, s6 and runit. If you know how to make AUR packages, feel free to take any of those if you use each init system.
## Nix Flake
You can install by doing You can install by doing
@@ -71,10 +80,7 @@ or try it out without installing by:
nix run github:javalsai/lidm nix run github:javalsai/lidm
``` ```
> [!CAUTION] ## Nix Module
> This doesn't include [service files](../assets/pkg/aur#services) neither
# Nix Module
<details> <details>
<summary>Sidenote</summary> <summary>Sidenote</summary>
@@ -124,5 +130,46 @@ with config.lidm.keysEnum; {
> _it's not necessary to cover all keys and anything can be put there, even if it's not valid config_ > _it's not necessary to cover all keys and anything can be put there, even if it's not valid config_
# Installing from Source
Firstly, you'll need to build the package, this also includes man pages, default config, themes and other files you might need.
To build it you only need to have some basic packages (should come pre-installed in almost all distros): `make`, `gcc` or another `gcc`ish compiler, and libpam headers. If it builds, it surely works anyways.
```sh
git clone https://github.com/javalsai/lidm.git
cd lidm
make # 👍
```
> [!NOTE] > [!NOTE]
> [service files](../assets/pkg/aur#services) **are** included and enabled > There are pre-built binaries on the [releases tab](https://github.com/javalsai/lidm/releases) too.
Then you can install the files onto your filesystem with:
```sh
make install
```
This will install mostly into `/usr/local` by default, this path is mostly unused nowadays (systemd can load services from it but man usually doesn't find manual pages in there) and could feel like lidm didn't install at all. You can add `PREFIX=/usr` to install along the rest of your system packages if you wish.
And additionally, to install service files (start-up behavior). <sup>[more docs](../assets/services/README.md)</sup>
```sh
# automatically detects your init system
# and install service file (for tty7)
make install-service
# or if you don't like autodetection
make install-service-systemd # systemd
make install-service-dinit # dinit
make install-service-runit # runit (/etc/sv)
make install-service-runit-etc # runit (/etc/runit/sv)
make install-service-openrc # openrc
make install-service-s6 # s6 (/etc/sv)
make install-service-s6-etc # s6 (/etc/s6/sv)
# For runit and s6, some distros (e.g. Artix) like to put it in /etc/<init>/sv
# to better isolate their packages while other distros (e.g. Void) just put it
# in /etc/sv
```

View File

@@ -22,11 +22,14 @@ make \
The list of possible `#define`s is: The list of possible `#define`s is:
| Name | Default | Description | Env Override? | | Name | Default | Description | Env Override? |
| ---------------------- | ------------------------------- | -------------------------------------------------------------------------- | ------------------------ | | -------------------------- | ------------------------------------- | -------------------------------------------------------------------------- | ------------------------ |
| `PAM_SERVICE_FALLBACK` | `"login"` | Name of the default PAM module to use. Defaults to the distro's `"login"`. | Yes (`LIDM_PAM_SERVICE`) | | `PAM_SERVICE_FALLBACK` | `"login"` | Name of the default PAM module to use. Defaults to the distro's `"login"`. | Yes (`LIDM_PAM_SERVICE`) |
| `SESSIONS_XSESSIONS` | `"/usr/share/xsessions"` | | No | | `SESSIONS_XSESSIONS` | `"/usr/share/xsessions"` | | No |
| `SESSIONS_XSESSIONS_LOCAL` | `"/usr/local/share/xsessions"` | | No |
| `SESSIONS_WAYLAND` | `"/usr/share/wayland-sessions"` | | No | | `SESSIONS_WAYLAND` | `"/usr/share/wayland-sessions"` | | No |
| `SESSIONS_WAYLAND_LOCAL` | `"/usr/local/share/wayland-sessions"` | | No |
| `LIDM_CONF_PATH` | `"/etc/lidm.ini"` | Path of the default configuration. | Yes (`LIDM_CONF`) | | `LIDM_CONF_PATH` | `"/etc/lidm.ini"` | Path of the default configuration. | Yes (`LIDM_CONF`) |
| `LOGIN_SHELL` | `"bash"` | Login shell name. | No |
# Other Build Settings # Other Build Settings
@@ -38,9 +41,22 @@ Lidm attempts to support being built by `gcc` and `clang` with preference over t
Compiler flags should be passed with `CFLAGS`, its `-O3 -Wall` by default so adding anything will overwrite this. Compiler flags should be passed with `CFLAGS`, its `-O3 -Wall` by default so adding anything will overwrite this.
## Build Metadata
`lidm -v` outputs some information about the build version, this can be weaked with `INFO_GIT_REV` and `INFO_BUILD_TS`, by default they are:
```make
INFO_GIT_REV?=$$(git describe --long --tags --always || echo '?')
INFO_BUILD_TS?=$$(date +%s)
```
But this can be changed by just passing those env variables, for example, in the case git is not applicable in the build environment of the package.
## Target Directory ## Target Directory
`DESTDIR` can be used to for installation recipes to install on alternative root directories. Along with `PREFIX` (defaults to `/usr`) for systems which don't use the common `/usr` structure. e.g. `make install DESTDIR=$out PREFIX=` `DESTDIR` can be used to for installation recipes to install on alternative root directories. Along with `PREFIX` (defaults to `/usr/local`, packaging this you'll probably want to make it `/usr`) for systems which don't use the common `/usr` structure. e.g. `make install DESTDIR=$out PREFIX=`
`/etc` is sometimes in that `PREFIX` and sometimes not, be careful.
```txt ```txt
$ fd -t f . --base-directory $out $ fd -t f . --base-directory $out
@@ -56,7 +72,7 @@ To ease most of the installation process there's several `make` recipes to insta
- `make` / `make lidm`: Builds the app binary. - `make` / `make lidm`: Builds the app binary.
- `make install`: Attempts to install the binary, place a default config file in `/etc/lidm.ini` and install the man pages. - `make install`: Attempts to install the binary, place a default config file in `/etc/lidm.ini` and install the man pages.
- `make install-service-(systemd|dinit|runit|openrc|s6)(|-etc)`: Just check the source, service files for different init systems and `-etc` variants for alternative paths. - `make install-service-(systemd|dinit|runit|openrc|s6)(|-etc)`: Just check the source, service files for different init systems and `-etc` variants for alternative paths. You might need `FORCE=1` in the environment if you are packaging for other init system or scripting.
- `make print-version`: Outputs the current version in the `Makefile` for scripts that might want to extract that info. - `make print-version`: Outputs the current version in the `Makefile` for scripts that might want to extract that info.
You can choose to use these packages or create your own service files / etc. There's are merely suggestions on what to use. You can choose to use these packages or create your own service files / etc. There's are merely suggestions on what to use.

30
docs/yubikey.md Normal file
View File

@@ -0,0 +1,30 @@
# Yubikeys
Quick reference explaining how yubikeys work for now.
# Enable
Yubikeys are disabled by default, to enable them activate a keybinding for it (`[functions] fido`) in the config file.
Note that pressing this configured keybinding has no difference from trying to log in with an empty password, there's virtually no difference.
`pam_u2f` must be configured with a registered key (`pamu2fcfg`).
# Extra
All my yubikey knowledge comes from the [pr that implemented this](https://github.com/javalsai/lidm/pull/89), please refer to it for extra details. Contributions to this documentation are welcome (explaining more in detail, potential issues... really anything that improves this).
Allegedly this pam module configuration should work:
```pam
#%PAM-1.0
auth sufficient pam_u2f.so cue
auth requisite pam_nologin.so
auth include system-local-login
account include system-local-login
session include system-local-login
password include system-local-login
```
Also, I recommend giving the [arch wiki](https://wiki.archlinux.org/title/YubiKey) a read anyways.

View File

@@ -6,7 +6,8 @@
#include "config.h" #include "config.h"
#include "sessions.h" #include "sessions.h"
bool launch(char* user, char* passwd, struct session session, void (*cb)(void), bool launch(char* NNULLABLE user, char* NNULLABLE passwd,
struct config* config); struct session session, void (*NULLABLE cb)(void),
struct config* NNULLABLE config);
#endif #endif

View File

@@ -6,9 +6,9 @@
#include "keys.h" #include "keys.h"
#include "macros.h" #include "macros.h"
#include "util.h" #include "util/vec.h"
enum introspection_type { enum IntrospectionType {
STRING, STRING,
BOOL, BOOL,
NUMBER, NUMBER,
@@ -26,7 +26,7 @@ static const char* NNULLABLE const INTROS_TYS_NAMES[] = {
struct introspection_item { struct introspection_item {
char* NNULLABLE name; char* NNULLABLE name;
size_t offset; size_t offset;
enum introspection_type typ; enum IntrospectionType typ;
}; };
#define INTROS_ITEM(key, table, ty) \ #define INTROS_ITEM(key, table, ty) \
@@ -90,15 +90,17 @@ BUILD(colors, COLORS, TABLE_COLORS);
BUILD(chars, CHARS, TABLE_CHARS); BUILD(chars, CHARS, TABLE_CHARS);
#define TABLE_FUNCTIONS(F, name) \ #define TABLE_FUNCTIONS(F, name) \
F(enum keys, poweroff, KEY, F1, name) \ F(enum Keys, poweroff, KEY, F1, name) \
F(enum keys, reboot, KEY, F2, name) \ F(enum Keys, reboot, KEY, F2, name) \
F(enum keys, refresh, KEY, F5, name) F(enum Keys, fido, KEY, NONE, name) \
F(enum Keys, refresh, KEY, F5, name)
BUILD(functions, FUNCTIONS, TABLE_FUNCTIONS); BUILD(functions, FUNCTIONS, TABLE_FUNCTIONS);
#define TABLE_STRINGS(F, name) \ #define TABLE_STRINGS(F, name) \
F(char* NNULLABLE, f_poweroff, STRING, "poweroff", name) \ F(char* NNULLABLE, f_poweroff, STRING, "poweroff", name) \
F(char* NNULLABLE, f_reboot, STRING, "reboot", name) \ F(char* NNULLABLE, f_reboot, STRING, "reboot", name) \
F(char* NNULLABLE, f_fido, STRING, "fido", name) \
F(char* NNULLABLE, f_refresh, STRING, "refresh", name) \ F(char* NNULLABLE, f_refresh, STRING, "refresh", name) \
F(char* NNULLABLE, e_user, STRING, "user", name) \ F(char* NNULLABLE, e_user, STRING, "user", name) \
F(char* NNULLABLE, e_passwd, STRING, "password", name) \ F(char* NNULLABLE, e_passwd, STRING, "password", name) \
@@ -120,7 +122,8 @@ BUILD(strings, STRINGS, TABLE_STRINGS);
F(struct Vector, source, STRING_ARRAY, NULL_VEC, name) \ F(struct Vector, source, STRING_ARRAY, NULL_VEC, name) \
F(struct Vector, user_source, STRING_ARRAY, NULL_VEC, name) \ F(struct Vector, user_source, STRING_ARRAY, NULL_VEC, name) \
F(char* NNULLABLE, timefmt, STRING, "%X %x", name) \ F(char* NNULLABLE, timefmt, STRING, "%X %x", name) \
F(long long, refresh_rate, NUMBER, 100, name) F(long long, refresh_rate, NUMBER, 100, name) \
F(bool, bypass_shell_login, BOOL, false, name)
BUILD(behavior, BEHAVIOR, TABLE_BEHAVIOR); BUILD(behavior, BEHAVIOR, TABLE_BEHAVIOR);
@@ -150,15 +153,15 @@ struct introspection_table {
static const struct introspection_table CONFIG_INSTROSPECTION[] = { static const struct introspection_table CONFIG_INSTROSPECTION[] = {
{"colors", offsetof(struct config, colors), INTROS_TABLE_COLORS, {"colors", offsetof(struct config, colors), INTROS_TABLE_COLORS,
sizeof(INTROS_TABLE_COLORS) / sizeof(INTROS_TABLE_COLORS[0])}, LEN(INTROS_TABLE_COLORS)},
{"chars", offsetof(struct config, chars), INTROS_TABLE_CHARS, {"chars", offsetof(struct config, chars), INTROS_TABLE_CHARS,
sizeof(INTROS_TABLE_CHARS) / sizeof(INTROS_TABLE_CHARS[0])}, LEN(INTROS_TABLE_CHARS)},
{"functions", offsetof(struct config, functions), INTROS_TABLE_FUNCTIONS, {"functions", offsetof(struct config, functions), INTROS_TABLE_FUNCTIONS,
sizeof(INTROS_TABLE_FUNCTIONS) / sizeof(INTROS_TABLE_FUNCTIONS[0])}, LEN(INTROS_TABLE_FUNCTIONS)},
{"strings", offsetof(struct config, strings), INTROS_TABLE_STRINGS, {"strings", offsetof(struct config, strings), INTROS_TABLE_STRINGS,
sizeof(INTROS_TABLE_STRINGS) / sizeof(INTROS_TABLE_STRINGS[0])}, LEN(INTROS_TABLE_STRINGS)},
{"behavior", offsetof(struct config, behavior), INTROS_TABLE_BEHAVIOR, {"behavior", offsetof(struct config, behavior), INTROS_TABLE_BEHAVIOR,
sizeof(INTROS_TABLE_BEHAVIOR) / sizeof(INTROS_TABLE_BEHAVIOR[0])}, LEN(INTROS_TABLE_BEHAVIOR)},
}; };
//// FUNCTIONS //// FUNCTIONS

14
include/desktop_exec.h Normal file
View File

@@ -0,0 +1,14 @@
// TODO: rewrite properly
// NOLINTBEGIN(clang-diagnostic-nullability-completeness)
#ifndef DESKTOP_EXEC_H_
#define DESKTOP_EXEC_H_
#include "macros.h"
char* NULLABLE desktop_as_cmdline(char** args);
int parse_exec_string(const char* exec_s, int* arg_count, char*** args);
void free_parsed_args(int arg_count, char** args);
#endif
// NOLINTEND(clang-diagnostic-nullability-completeness)

View File

@@ -2,16 +2,17 @@
#define EFIELDH_ #define EFIELDH_
#include <stdbool.h> #include <stdbool.h>
#include <stdint.h>
#include <sys/types.h> #include <sys/types.h>
// holds also the max string buffer in itself, not dynamic // holds also the max string buffer in itself, not dynamic
struct editable_field { struct editable_field {
u_char pos; uint8_t pos;
char content[255]; char content[255];
}; };
struct editable_field efield_new(char* content); struct editable_field efield_new(char* content);
void efield_trim(struct editable_field* self, u_char pos); void efield_trim(struct editable_field* self, uint8_t pos);
void efield_update(struct editable_field* self, char* update); void efield_update(struct editable_field* self, char* update);
bool efield_seek(struct editable_field* self, char seek); bool efield_seek(struct editable_field* self, char seek);

View File

@@ -1,9 +1,12 @@
#ifndef KEYSH_ #ifndef KEYSH_
#define KEYSH_ #define KEYSH_
#include <stdbool.h>
#include <stdint.h>
#include <stdlib.h> #include <stdlib.h>
#include <sys/time.h>
enum keys { enum Keys {
ESC, ESC,
F1, F1,
F2, F2,
@@ -32,9 +35,11 @@ enum keys {
END, END,
PAGE_UP, PAGE_UP,
PAGE_DOWN, PAGE_DOWN,
NONE,
}; };
static const char* const KEY_NAMES[] = { static const char* const KEY_NAMES[] = {
[NONE] = "NONE",
[ESC] = "ESC", [ESC] = "ESC",
[F1] = "F1", [F1] = "F1",
[F2] = "F2", [F2] = "F2",
@@ -66,7 +71,7 @@ static const char* const KEY_NAMES[] = {
}; };
struct key_mapping { struct key_mapping {
enum keys key; enum Keys key;
const char* sequences[3]; const char* sequences[3];
}; };
@@ -101,4 +106,15 @@ static const struct key_mapping KEY_MAPPINGS[] = {
{PAGE_DOWN, {"\x1b[6~", NULL}}, {PAGE_DOWN, {"\x1b[6~", NULL}},
}; };
struct option_keys {
bool is_some;
enum Keys key;
};
int find_keyname(enum Keys* at, const char* name);
struct option_keys find_ansi(const char* seq);
void read_press(uint8_t* length, char* out);
// non blocking, waits up to tv or interrupt, returns true if actually read
bool read_press_nb(uint8_t* length, char* out, struct timeval* tv);
#endif #endif

View File

@@ -7,25 +7,25 @@
#endif #endif
// Do we just replace the compiler with clang?? // Do we just replace the compiler with clang??
#if defined(__clang__) #ifdef __clang__
#define NULLABLE _Nullable #define NULLABLE _Nullable
#else #else
#define NULLABLE #define NULLABLE
#endif #endif
#if defined(__clang__) #ifdef __clang__
#define NNULLABLE _Nonnull #define NNULLABLE _Nonnull
#else #else
#define NNULLABLE #define NNULLABLE
#endif #endif
#if defined(__clang__) #ifdef __clang__
#define UNULLABLE _Null_unspecified #define UNULLABLE _Null_unspecified
#else #else
#define UNULLABLE #define UNULLABLE
#endif #endif
#if defined(__clang__) #ifdef __clang__
#define COMPILER_VERSION __VERSION__ #define COMPILER_VERSION __VERSION__
#elif defined(__GNUC__) #elif defined(__GNUC__)
#define xstr(s) str(s) #define xstr(s) str(s)
@@ -36,5 +36,6 @@
#endif #endif
#define LEN(X) (sizeof(X) / sizeof((X)[0])) #define LEN(X) (sizeof(X) / sizeof((X)[0]))
#define UNUSED(x) ((void)(x))
#endif #endif

View File

@@ -18,6 +18,6 @@ void ofield_kbd_type(struct opts_field* self, char* typed, char* empty_default);
bool ofield_opts_seek(struct opts_field* self, char seek); bool ofield_opts_seek(struct opts_field* self, char seek);
bool ofield_seek(struct opts_field* self, char seek); bool ofield_seek(struct opts_field* self, char seek);
u_char ofield_display_cursor_col(struct opts_field* self, u_char maxlen); uint8_t ofield_display_cursor_col(struct opts_field* self, uint8_t maxlen);
#endif #endif

33
include/pam.h Normal file
View File

@@ -0,0 +1,33 @@
#ifndef PAM_H
#define PAM_H
#include <pwd.h>
#include <security/_pam_types.h>
#include <security/pam_appl.h>
#include <stdbool.h>
#include "macros.h"
#include "sessions.h"
#define PAMH_ERR_NOERR 0
#define PAMH_ERR_ALLOC 1
#define PAMH_ERR_ERRNO 2
#define PAMH_ERR_NOERRNO 3
struct pamh_getenv_status {
char error_flag;
union {
char* NULLABLE* NNULLABLE envlist;
const char* NNULLABLE errfn;
};
};
// Doesn't include `source`s
struct pamh_getenv_status pamh_get_complete_env(pam_handle_t* NNULLABLE handle,
struct passwd* NNULLABLE pw,
enum SessionType session_typ);
void free_envlist(char* NULLABLE* NNULLABLE envlist);
pam_handle_t* NULLABLE get_pamh(char* NNULLABLE user, char* NNULLABLE passwd);
#endif /* PAM_H */

View File

@@ -2,23 +2,64 @@
#define SESSIONSH_ #define SESSIONSH_
#include <sys/types.h> #include <sys/types.h>
#include <unistd.h>
#include "macros.h" #include "macros.h"
#include "util.h" #include "util/vec.h"
enum session_type { enum SessionType {
XORG, XORG,
WAYLAND, WAYLAND,
SHELL, SHELL,
}; };
enum ExecType {
EXEC_SHELL,
EXEC_DESKTOP,
};
struct desktop_exec {
char* NULLABLE* NNULLABLE args;
int arg_count;
};
struct session_exec {
enum ExecType typ;
union {
char* NNULLABLE shell;
struct desktop_exec desktop;
};
};
static inline struct session_exec session_exec_shell(char* NNULLABLE shell) {
return (struct session_exec){
.typ = EXEC_SHELL,
.shell = shell,
};
}
static inline struct session_exec session_exec_desktop(
int arg_count, char* NULLABLE* NNULLABLE args) {
return (struct session_exec){
.typ = EXEC_DESKTOP,
.desktop =
{
.args = args,
.arg_count = arg_count,
},
};
}
struct session { struct session {
char* NNULLABLE name; char* NNULLABLE name;
char* NNULLABLE exec; struct session_exec exec;
char* NULLABLE tryexec; enum SessionType type;
enum session_type type;
}; };
struct Vector get_avaliable_sessions(); struct Vector get_avaliable_sessions();
int session_exec_exec(struct session_exec* NNULLABLE exec,
char* NULLABLE* NNULLABLE envp);
int session_exec_login_through_shell(struct session_exec* NNULLABLE exec,
char* NULLABLE* NNULLABLE envp);
#endif #endif

8
include/signal_handler.h Normal file
View File

@@ -0,0 +1,8 @@
#ifndef SIGNALHANDLERH_
#define SIGNALHANDLERH_
// handle SIGTERM by sending SIGTERM to all children, resulting
// in a graceful graphical shutdown
void setup_sigterm();
#endif /* SIGNALHANDLERH_ */

View File

@@ -3,7 +3,7 @@
#include "config.h" #include "config.h"
#include "ofield.h" #include "ofield.h"
#include "util.h" #include "util/vec.h"
// [box_start] // [box_start]
// ↓ // ↓
@@ -39,15 +39,17 @@
#define VALUES_SEPR 3 #define VALUES_SEPR 3
#define VALUE_MAXLEN (BOX_WIDTH - VALUES_COL + 1 - BOX_HMARGIN - 2) #define VALUE_MAXLEN (BOX_WIDTH - VALUES_COL + 1 - BOX_HMARGIN - 2)
enum input { SESSION, USER, PASSWD }; enum Input { SESSION, USER, PASSWD };
extern const u_char INPUTS_N; extern const uint8_t INPUTS_N;
void setup(struct config* config); void setup(struct config* config);
int load(struct Vector* users, struct Vector* sessions); int load(struct Vector* users, struct Vector* sessions);
void print_err(const char* /*msg*/); void print_err(const char* /*msg*/);
void print_errno(const char* /*descr*/); void print_errno(const char* /*descr*/);
void print_pam_msg(const char* msg, int msg_style);
void clear_pam_msg(void);
void ui_update_field(enum input focused_input); void ui_update_field(enum Input focused_input);
void ui_update_ffield(); void ui_update_ffield();
void ui_update_ofield(struct opts_field* self); void ui_update_ofield(struct opts_field* self);
void ui_update_cursor_focus(); void ui_update_cursor_focus();

View File

@@ -6,7 +6,7 @@
#include "macros.h" #include "macros.h"
#include "ui.h" #include "ui.h"
extern enum input focused_input; extern enum Input focused_input;
extern struct opts_field of_session; extern struct opts_field of_session;
extern struct opts_field of_user; extern struct opts_field of_user;
@@ -15,7 +15,7 @@ extern struct opts_field of_passwd;
extern struct Vector* UNULLABLE gusers; extern struct Vector* UNULLABLE gusers;
extern struct Vector* UNULLABLE gsessions; extern struct Vector* UNULLABLE gsessions;
struct opts_field* NNULLABLE get_opts_field(enum input from); struct opts_field* NNULLABLE get_opts_field(enum Input from);
struct opts_field* NNULLABLE get_opts_ffield(); struct opts_field* NNULLABLE get_opts_ffield();
struct user st_user(); struct user st_user();

View File

@@ -3,7 +3,7 @@
#include <sys/types.h> #include <sys/types.h>
#include "util.h" #include "util/vec.h"
struct user { struct user {
char* shell; char* shell;

View File

@@ -1,44 +0,0 @@
#ifndef UTILH_
#define UTILH_
#include <stdbool.h>
#include <stddef.h>
#include <stdint.h>
#include <stdio.h>
#include <sys/time.h>
#include <sys/types.h>
#include "keys.h"
int find_keyname(enum keys* at, const char* name);
enum keys find_ansi(const char* seq);
void read_press(u_char* length, char* out);
// non blocking, waits up to tv or interrupt, returns true if actually read
bool read_press_nb(u_char* length, char* out, struct timeval* tv);
bool utf8_iscont(char byte);
size_t utf8len(const char* str);
size_t utf8len_until(const char* str, const char* until);
size_t utf8trunc(char* str, size_t n);
const char* utf8back(const char* str);
const char* utf8seek(const char* str);
const char* utf8seekn(const char* str, size_t n);
struct Vector {
uint32_t length;
uint32_t capacity;
void** pages;
};
extern const struct Vector VEC_NEW;
int vec_resize(struct Vector* self, size_t size);
int vec_reserve(struct Vector* self, size_t size);
int vec_reserve_exact(struct Vector* self, size_t size);
int vec_push(struct Vector* self, void* item);
void vec_free(struct Vector* self);
void vec_clear(struct Vector* self);
void vec_reset(struct Vector* self);
void* vec_pop(struct Vector* self); // won't free it, nor shrink vec list space
void* vec_get(struct Vector* self, size_t index);
#endif

10
include/util/path.h Normal file
View File

@@ -0,0 +1,10 @@
#ifndef UTIL_PATH_H
#define UTIL_PATH_H
#include "macros.h"
char* NULLABLE search_path(const char* NNULLABLE for_binary);
int execvpe(const char* NNULLABLE file, char* NULLABLE const argv[NNULLABLE],
char* NULLABLE const envp[NNULLABLE]);
#endif /* UTIL_PATH_H */

15
include/util/utf8.h Normal file
View File

@@ -0,0 +1,15 @@
#ifndef UTIL_UTF8_H
#define UTIL_UTF8_H
#include <stdbool.h>
#include <stddef.h>
bool utf8_iscont(char byte);
size_t utf8len(const char* str);
size_t utf8len_until(const char* str, const char* until);
size_t utf8trunc(char* str, size_t n);
const char* utf8back(const char* str);
const char* utf8seek(const char* str);
const char* utf8seekn(const char* str, size_t n);
#endif /* UTIL_UTF8_H */

26
include/util/vec.h Normal file
View File

@@ -0,0 +1,26 @@
#ifndef UTIL_VEC_H
#define UTIL_VEC_H
#include <stddef.h>
#include <stdint.h>
struct Vector {
uint32_t length;
uint32_t capacity;
void** pages;
};
struct Vector vec_from_raw(void** raw);
void** vec_as_raw(struct Vector self);
extern const struct Vector VEC_NEW;
int vec_resize(struct Vector* self, size_t size);
int vec_reserve(struct Vector* self, size_t size);
int vec_reserve_exact(struct Vector* self, size_t size);
int vec_push(struct Vector* self, void* item);
void vec_free(struct Vector* self);
void vec_clear(struct Vector* self);
void vec_reset(struct Vector* self);
void* vec_pop(struct Vector* self); // won't free it, nor shrink vec list space
void* vec_get(struct Vector* self, size_t index);
#endif /* UTIL_VEC_H */

91
services.mk Normal file
View File

@@ -0,0 +1,91 @@
install-service:
@if command -v systemctl &> /dev/null; then \
make install-service-systemd; \
elif command -v dinitctl &> /dev/null; then \
make install-service-dinit; \
elif command -v sv &> /dev/null; then \
if [ -d /etc/sv ]; then \
make install-service-runit; \
elif [ -d /etc/runit/sv ]; then \
make install-service-runit-etc; \
else \
printf '\033[31m%s\033[0m\n' "Unknown init system structure, skipping service install..." >&2; \
fi \
elif command -v rc-update &> /dev/null; then \
make install-service-openrc; \
elif command -v s6-service &> /dev/null; then \
if [ -d /etc/sv ]; then \
make install-service-s6; \
elif [ -d /etc/r6nit/sv ]; then \
make install-service-s6-etc; \
else \
printf '\033[31m%s\033[0m\n' "Unknown init system structure, skipping service install..." >&2; \
fi \
else \
printf '\033[1;31m%s\033[0m\n' "Unknown init system, skipping service install..." >&2; \
fi
install-service-systemd:
@sed -e 's|ExecStart=/usr/bin/lidm|ExecStart=${DESTDIR}${PREFIX}/bin/lidm|' ./assets/services/systemd.service > ./dist/lidm.service
install -Dm644 ./dist/lidm.service ${DESTDIR}${PREFIX}/lib/systemd/system/lidm.service
@printf '\033[1m%s\033[0m\n\n' " don't forget to run 'systemctl enable lidm'"
install-service-dinit:
install -m644 ./assets/services/dinit ${DESTDIR}/etc/dinit.d/lidm
@printf '\033[1m%s\033[0m\n\n' " don't forget to run 'dinitctl enable lidm'"
install-service-runit:
@if [ ! -e /etc/sv ] && [ -d /etc/runit/sv ] && [ -z "$$FORCE" ]; then \
printf '\033[31m%s\033[0m\n' "/etc/sv doesn't exist but /etc/runit/sv does" >&2; \
printf '\033[31m%s\033[0m\n' "you probably meant to 'make install-service-runit-etc'" >&2; \
exit 1; \
fi
mkdir -p ${DESTDIR}/etc/sv/lidm
cp -r --update=all ./assets/services/runit/* ${DESTDIR}/etc/sv/lidm/
@printf '\033[1m%s\033[0m\n\n' " don't forget to run 'ln -s ${DESTDIR}/etc/sv/lidm /var/service' or your distro equivalent"
install-service-runit-etc:
@if [ ! -e /etc/runit/sv ] && [ -d /etc/sv ] && [ -z "$$FORCE" ]; then \
printf '\033[31m%s\033[0m\n' "/etc/runit/sv doesn't exist but /etc/sv does" >&2; \
printf '\033[31m%s\033[0m\n' "you probably meant to 'make install-service-runit'" >&2; \
exit 1; \
fi
mkdir -p ${DESTDIR}/etc/runit/sv/lidm
cp -r --update=all ./assets/services/runit/* ${DESTDIR}/etc/runit/sv/lidm/
@printf '\033[1m%s\033[0m\n\n' " don't forget to run 'ln -s ${DESTDIR}/etc/runit/sv/lidm /run/runit/service' or your distro equivalent"
install-service-openrc:
install -m755 ./assets/services/openrc ${DESTDIR}/etc/init.d/lidm
@printf '\033[1m%s\033[0m\n\n' " don't forget to run 'rc-update add lidm'"
install-service-s6:
@if [ ! -e /etc/sv ] && [ -d /etc/s6/sv ] && [ -z "$$FORCE" ]; then \
printf '\033[31m%s\033[0m\n' "/etc/sv doesn't exist but /etc/s6/sv does" >&2; \
printf '\033[31m%s\033[0m\n' "you probably meant to 'make install-service-s6-etc'" >&2; \
exit 1; \
fi
mkdir -p ${DESTDIR}/etc/sv/lidm
cp -r --update=all ./assets/services/s6/* ${DESTDIR}/etc/sv/lidm/
@printf '\033[1m%s\033[0m\n\n' " don't forget to run 's6-service add default lidm' and 's6-db-reload'"
install-service-s6-etc:
@if [ ! -e /etc/s6/sv ] && [ -d /etc/sv ] && [ -z "$$FORCE" ]; then \
printf '\033[31m%s\033[0m\n' "/etc/s6/sv doesn't exist but /etc/sv does" >&2; \
printf '\033[31m%s\033[0m\n' "you probably meant to 'make install-service-s6'" >&2; \
exit 1; \
fi
mkdir -p ${DESTDIR}/etc/s6/sv/lidm
cp -r --update=all ./assets/services/s6/* ${DESTDIR}/etc/s6/sv/lidm/
@printf '\033[1m%s\033[0m\n\n' " don't forget to run 's6-service add default lidm' and 's6-db-reload'"
uninstall-service:
rm -rf \
${DESTDIR}${PREFIX}/lib/systemd/system/lidm.service \
${DESTDIR}/etc/dinit.d/lidm \
${DESTDIR}/etc/sv/lidm \
${DESTDIR}/etc/runit/sv/lidm \
${DESTDIR}/etc/init.d/lidm \
${DESTDIR}/etc/s6/sv/lidm
.PHONY: install-service uninstall-service \
install-service-s6 \
install-service-s6-etc \
install-service-dinit \
install-service-runit \
install-service-runit-etc \
install-service-openrc \
install-service-systemd

View File

@@ -1,83 +1,40 @@
// TODO: handle `fork() == -1`
#include <errno.h>
#include <grp.h> #include <grp.h>
#include <pwd.h> #include <pwd.h>
#include <security/pam_misc.h> #include <security/pam_misc.h>
#include <signal.h>
#include <stddef.h>
#include <stdint.h> #include <stdint.h>
#include <stdio.h> #include <stdio.h>
#include <stdlib.h> #include <stdlib.h>
#include <string.h> #include <string.h>
#include <sys/mman.h> #include <sys/mman.h>
#include <sys/stat.h>
#include <sys/wait.h> #include <sys/wait.h>
#include <unistd.h>
#include "auth.h" #include "auth.h"
#include "config.h" #include "config.h"
#include "log.h"
#include "macros.h"
#include "pam.h"
#include "sessions.h" #include "sessions.h"
#include "ui.h" #include "ui.h"
#include "unistd.h" #include "util/path.h"
#include "util.h" #include "util/vec.h"
int pam_conversation(int num_msg, const struct pam_message** msg, #define XORG_MESSAGE_LENGTH 16
struct pam_response** resp, void* appdata_ptr) {
struct pam_response* reply = static void try_source_file(struct Vector* NNULLABLE vec_envlist,
(struct pam_response*)malloc(sizeof(struct pam_response) * num_msg); char* NNULLABLE filepath) {
if (!reply) { log_printf("sourcing %s\n", filepath);
return PAM_BUF_ERR; FILE* file2source = fopen(filepath, "r");
if (file2source == NULL) {
log_printf("error sourcing %s\n", filepath);
return;
} }
for (size_t i = 0; i < num_msg; i++) {
reply[i].resp = NULL;
reply[i].resp_retcode = 0;
if (msg[i]->msg_style == PAM_PROMPT_ECHO_OFF ||
msg[i]->msg_style == PAM_PROMPT_ECHO_ON) {
char* input = (char*)appdata_ptr;
reply[i].resp = strdup(input);
}
}
*resp = reply;
return PAM_SUCCESS;
}
#ifndef PAM_SERVICE_FALLBACK
#define PAM_SERVICE_FALLBACK "login"
#endif
#define CHECK_PAM_RET(call) \
ret = (call); \
if (ret != PAM_SUCCESS) { \
pam_end(pamh, ret); \
return NULL; \
}
void clear_screen() {
printf("\x1b[H\x1b[J");
}
pam_handle_t* get_pamh(char* user, char* passwd) {
pam_handle_t* pamh = NULL;
struct pam_conv pamc = {pam_conversation, (void*)passwd};
int ret;
char* pam_service_override = getenv("LIDM_PAM_SERVICE");
char* pam_service_name =
pam_service_override ? pam_service_override : PAM_SERVICE_FALLBACK;
CHECK_PAM_RET(pam_start(pam_service_name, user, &pamc, &pamh))
CHECK_PAM_RET(pam_authenticate(pamh, 0))
CHECK_PAM_RET(pam_acct_mgmt(pamh, 0))
CHECK_PAM_RET(pam_setcred(pamh, PAM_ESTABLISH_CRED))
CHECK_PAM_RET(pam_open_session(pamh, 0))
CHECK_PAM_RET(pam_setcred(pamh, PAM_REINITIALIZE_CRED))
return pamh;
}
#undef CHECK_PAM_RET
void* shmalloc(size_t size) {
return mmap(NULL, size, PROT_READ | PROT_WRITE, MAP_SHARED | MAP_ANONYMOUS,
-1, 0);
}
void sourceFileTry(char* file) {
FILE* file2source = fopen(file, "r");
if (file2source == NULL) return;
char* line = NULL; char* line = NULL;
size_t len = 0; size_t len = 0;
@@ -87,13 +44,10 @@ void sourceFileTry(char* file) {
if (read == 0 || (read > 0 && *line == '#')) continue; if (read == 0 || (read > 0 && *line == '#')) continue;
if (line[read - 1] == '\n') line[read - 1] = '\0'; if (line[read - 1] == '\n') line[read - 1] = '\0';
/* printf("Retrieved line of length %zu:\n", read); */ for (ssize_t i = 1; i < read; i++) {
/* printf("%s\n", line); */
for (size_t i = 1; i < read; i++) {
if (line[i] == '=') { if (line[i] == '=') {
/* printf("FOUND '='!\n"); */ vec_push(vec_envlist, (void*)line);
line[i] = '\0'; line = NULL;
setenv(line, &line[i + 1], 1);
break; break;
} }
} }
@@ -103,66 +57,239 @@ void sourceFileTry(char* file) {
(void)fclose(file2source); (void)fclose(file2source);
} }
void moarEnv(char* user, struct session session, struct passwd* pw, static void source_paths(struct Vector* NNULLABLE vec_envlist,
struct config* config) { struct Vector* NNULLABLE abs_source,
if (chdir(pw->pw_dir) == -1) print_errno("can't chdir to user home"); const char* NULLABLE user_home,
struct Vector* NNULLABLE user_source) {
setenv("HOME", pw->pw_dir, true); for (size_t i = 0; i < abs_source->length; i++) {
setenv("USER", pw->pw_name, true); char* path = vec_get(abs_source, i);
setenv("SHELL", pw->pw_shell, true); try_source_file(vec_envlist, path);
// TERM
setenv("LOGNAME", pw->pw_name, true);
// MAIL?
// PATH?
char* xdg_session_type = "unknown";
if (session.type == SHELL) xdg_session_type = "tty";
if (session.type == XORG) xdg_session_type = "x11";
if (session.type == WAYLAND) xdg_session_type = "wayland";
setenv("XDG_SESSION_TYPE", xdg_session_type, true);
printf("\n\n\n\n\x1b[1m");
for (size_t i = 0; i < config->behavior.source.length; i++) {
/* printf("DEBUG(source)!!!! %d %s\n", i, (char*)vec_get(&behavior->source,
* i)); */
sourceFileTry((char*)vec_get(&config->behavior.source, i));
} }
/* printf("\n"); */
if (pw->pw_dir) { if (user_home)
const char* home = pw->pw_dir; for (size_t i = 0; i < user_source->length; i++) {
size_t home_len = strlen(home); char* path = NULL;
asprintf(&path, "%s/%s", user_home, (char*)vec_get(user_source, i));
for (size_t i = 0; i < config->behavior.user_source.length; i++) { if (!path) {
const char* filename = (char*)vec_get(&config->behavior.user_source, i); log_puts("alloc failure on user source\n");
size_t filename_len = strlen(filename); continue;
}
size_t path_len = home_len + 1 + filename_len + 1; // nullbyte and slash try_source_file(vec_envlist, path);
char* path = malloc(path_len);
if (!path) continue; // can't bother
memcpy(path, home, home_len);
path[home_len] = '/'; // assume pw_dir doesn't start with '/' :P
memcpy(&path[home_len + 1], filename, filename_len);
path[path_len - 1] = '\0';
sourceFileTry(path);
free(path); free(path);
} }
else {
log_puts("user has no home\n");
}
}
struct child_msg {
char* msg;
int _errno;
bool err;
};
/// block until X returns the display number or an error occurs
static bool x_get_display(const int xorg_pipefd[2], int* display) {
char buffer[XORG_MESSAGE_LENGTH];
bool status;
close(xorg_pipefd[1]);
ssize_t bytes_read = read(xorg_pipefd[0], buffer, sizeof(buffer) - 1);
buffer[bytes_read] = '\0';
if (bytes_read > 0) {
char* endptr;
int val = (int)strtol(buffer, &endptr, 10);
if (endptr == buffer) {
(void)fputs("failed to parse Xorg display response\n", stderr);
status = false;
} else {
*display = val;
status = true;
}
} else if (bytes_read == 0) {
(void)fputs("Xorg pipe closed\n", stderr);
status = false;
} else {
perror("read");
status = false;
} }
/*char *buf;*/ close(xorg_pipefd[0]);
/*size_t bsize = snprintf(NULL, 0, "/run/user/%d", pw->pw_uid) + 1;*/ return status;
/*buf = malloc(bsize);*/
/*snprintf(buf, bsize, "/run/user/%d", pw->pw_uid);*/
/*setenv("XDG_RUNTIME_DIR", buf, true);*/
/*setenv("XDG_SESSION_CLASS", "user", true);*/
/*setenv("XDG_SESSION_ID", "1", true);*/
/*setenv("XDG_SESSION_DESKTOP", , true);*/
/*setenv("XDG_SEAT", "seat0", true);*/
} }
/// small helper to push dyn arr
static void push_dyn_arr(void*** arr, void* item) {
struct Vector vec = vec_from_raw(*arr);
vec_push(&vec, item);
*arr = vec_as_raw(vec);
}
// TODO: properly pass this down
extern int vt;
static void start_xorg_server(struct passwd* pw, char** NNULLABLE envlist,
int xorg_pipefd[2]) {
close(xorg_pipefd[0]);
if (!pw->pw_dir) _exit(EXIT_FAILURE);
// !!!!!!!!!! ATTENTION: this fails silently, of course add failure msgs but
// for now I can't so be careful
if (vt == -1) _exit(EXIT_FAILURE);
// pass the pipe so Xorg can write the DISPLAY value in there
char* fd_str;
asprintf(&fd_str, "%d", xorg_pipefd[1]);
if (!fd_str) _exit(EXIT_FAILURE);
char* vt_path;
asprintf(&vt_path, "vt%d", vt);
if (!vt_path) {
free(fd_str);
_exit(EXIT_FAILURE);
}
char* xorg_path = search_path("Xorg");
if (!xorg_path) {
(void)fputs("couldn't find Xorg binary in PATH, sure it's installed?\n",
stderr);
_exit(EXIT_FAILURE);
}
int exit = execle(xorg_path, xorg_path, "-displayfd", fd_str, vt_path, NULL,
envlist);
perror("exec");
free(vt_path);
free(fd_str);
free(xorg_path);
_exit(exit);
}
// TODO: add error msgs
/// returns on completion
static void launch_with_xorg_server(struct config* config,
struct session_exec* NNULLABLE exec,
struct passwd* pw,
char** NNULLABLE envlist) {
int xorg_pipefd[2];
if (pipe(xorg_pipefd) == -1) _exit(EXIT_FAILURE);
(void)fflush(NULL);
pid_t xorg_pid = fork();
if (xorg_pid == 0) {
start_xorg_server(pw, envlist, xorg_pipefd);
}
int display = 0;
if (!x_get_display(xorg_pipefd, &display)) {
(void)fputs("failed to get X display, aborting\n", stderr);
int status;
waitpid(xorg_pid, &status, 0);
_exit(EXIT_FAILURE);
}
char* display_env;
asprintf(&display_env, "DISPLAY=:%d", display);
if (!display_env) {
(void)fputs("failure allocating memory for DISPLAY string\n", stderr);
_exit(EXIT_FAILURE);
}
// convert back for convenient push-ing
push_dyn_arr((void***)&envlist, display_env);
if (!envlist) {
(void)fputs("failure allocating memory for DISPLAY env\n", stderr);
_exit(EXIT_FAILURE);
}
(void)fflush(NULL);
pid_t xorg_session_pid = fork();
if (xorg_session_pid == 0) {
if (config->behavior.bypass_shell_login)
session_exec_exec(exec, envlist);
else
session_exec_login_through_shell(exec, envlist);
perror("session exec error");
(void)fputs("failure calling session\n", stderr);
_exit(EXIT_FAILURE);
}
// looks weird, waiting on -1 should wait on any child and then just check if
// its xorg server or the session and kill the other waiting on it
pid_t pid;
int status; // not even read for now
while ((pid = waitpid(-1, &status, 0)) > 0) {
if (pid == xorg_pid || pid == xorg_session_pid) {
pid_t pid_to_kill = pid ^ xorg_pid ^ xorg_session_pid;
if (pid == xorg_pid) printf("Xorg server died\n");
if (pid == xorg_session_pid) printf("Xorg session died\n");
kill(pid_to_kill, SIGTERM);
waitpid(pid_to_kill, &status, 0);
break;
}
}
}
#define SEND_MSG(MSG) \
{ \
write(pipefd[1], &(MSG), sizeof(struct child_msg)); \
close(pipefd[1]); \
}
#define SEND_ERR(MSG) \
{ \
write(pipefd[1], \
&(struct child_msg){.msg = (MSG), ._errno = errno, .err = true}, \
sizeof(struct child_msg)); \
close(pipefd[1]); \
_exit(EXIT_FAILURE); \
}
#define DUMMY_READ() \
{ \
char _dummy; \
read(pipefd[0], &_dummy, sizeof(_dummy)); \
}
inline static void forked(struct config* config, int pipefd[2],
struct passwd* pw, char* NNULLABLE user,
struct session* NNULLABLE session,
char** NNULLABLE envlist) {
if (chdir(pw->pw_dir) == -1) SEND_ERR("chdir");
if (setgid(pw->pw_gid) == -1) SEND_ERR("setgid");
if (initgroups(user, pw->pw_gid) == -1) SEND_ERR("initgroups");
if (setuid(pw->pw_uid) == -1) SEND_ERR("setuid");
SEND_MSG((struct child_msg){.err = false});
DUMMY_READ();
close(pipefd[0]);
if (!getenv("PATH")) {
size_t path_size = confstr(_CS_PATH, NULL, 0);
char* path_env = malloc(path_size);
confstr(_CS_PATH, path_env, path_size);
setenv("PATH", path_env, 1);
free(path_env);
}
log_printf(" [I] using shell login?: %s",
config->behavior.bypass_shell_login ? "true" : "false");
if (session->type == XORG) {
launch_with_xorg_server(config, &session->exec, pw, envlist);
_exit(EXIT_SUCCESS);
} else {
if (config->behavior.bypass_shell_login)
session_exec_exec(&session->exec, envlist);
else
session_exec_login_through_shell(&session->exec, envlist);
perror("session exec error");
_exit(EXIT_FAILURE);
}
}
#undef SEND_MSG
#undef SEND_ERR
#undef DUMMY_READ
// NOLINTBEGIN(readability-function-cognitive-complexity) // NOLINTBEGIN(readability-function-cognitive-complexity)
bool launch(char* user, char* passwd, struct session session, void (*cb)(void), bool launch(char* user, char* passwd, struct session session, void (*cb)(void),
struct config* config) { struct config* config) {
@@ -174,93 +301,63 @@ bool launch(char* user, char* passwd, struct session session, void (*cb)(void),
pam_handle_t* pamh = get_pamh(user, passwd); pam_handle_t* pamh = get_pamh(user, passwd);
if (pamh == NULL) { if (pamh == NULL) {
print_err("error on pam authentication"); print_pam_msg("authentication failed", PAM_ERROR_MSG);
return false;
}
clear_pam_msg();
struct pamh_getenv_status env_ret =
pamh_get_complete_env(pamh, pw, session.type);
if (env_ret.error_flag != PAMH_ERR_NOERR) {
if (env_ret.error_flag == PAMH_ERR_ALLOC) {
print_err("allocator error");
} else if (env_ret.error_flag == PAMH_ERR_ERRNO) {
print_errno(env_ret.errfn);
} else if (env_ret.error_flag == PAMH_ERR_NOERRNO) {
print_err(env_ret.errfn);
}
return false; return false;
} }
bool* reach_session = shmalloc(sizeof(bool)); struct Vector envlist_vec = vec_from_raw((void**)env_ret.envlist);
if (reach_session == NULL) {
perror("error allocating shared memory"); source_paths(&envlist_vec, &config->behavior.source, pw->pw_dir,
&config->behavior.user_source);
char** envlist = (char**)vec_as_raw(envlist_vec);
if (!envlist) {
print_err("vec alloc error");
return false; return false;
} }
*reach_session = false;
int pipefd[2];
pipe(pipefd);
uint pid = fork(); uint pid = fork();
if (pid == 0) { // child if (pid == 0)
char* term = NULL; forked(config, pipefd, pw, user, &session, envlist);
char* getterm = getenv("TERM"); else {
// TODO: handle malloc error struct child_msg msg;
if (getterm != NULL) term = strdup(getterm); read(pipefd[0], &msg, sizeof(struct child_msg));
if (clearenv() != 0) { close(pipefd[0]);
print_errno("clearenv"); if (msg.err) {
_exit(EXIT_FAILURE); errno = msg._errno;
print_errno(msg.msg);
return false;
} }
char** envlist = pam_getenvlist(pamh); if (cb) cb();
if (envlist == NULL) { printf("\x1b[0m\x1b[H\x1b[J");
print_errno("pam_getenvlist");
_exit(EXIT_FAILURE);
}
for (size_t i = 0; envlist[i] != NULL; i++) {
putenv(envlist[i]);
}
// FIXME: path hotfix
putenv("PATH=/bin:/usr/bin");
if (term != NULL) {
setenv("TERM", term, true);
free(term);
}
free((void*)envlist);
moarEnv(user, session, pw, config);
// TODO: chown stdin to user
// does it inherit stdin from parent and
// does parent need to reclaim it after
// this dies?
if (setgid(pw->pw_gid) == -1) {
print_errno("setgid");
_exit(EXIT_FAILURE);
}
if (initgroups(user, pw->pw_gid) == -1) {
print_errno("initgroups");
_exit(EXIT_FAILURE);
}
if (setuid(pw->pw_uid) == -1) {
perror("setuid");
_exit(EXIT_FAILURE);
}
if (cb != NULL) cb();
*reach_session = true;
// TODO: these will be different due to TryExec
// and, Exec/TryExec might contain spaces as args
printf("\x1b[0m");
// NOLINTNEXTLINE(bugprone-branch-clone)
if (session.type == SHELL) {
clear_screen();
(void)fflush(stdout); (void)fflush(stdout);
execlp(session.exec, session.exec, NULL); close(pipefd[1]);
} else if (session.type == XORG || session.type == WAYLAND) {
clear_screen(); int exit_code;
(void)fflush(stdout); waitpid((pid_t)pid, &exit_code, 0);
execlp(session.exec, session.exec, NULL);
}
perror("execl error");
(void)fputs("failure calling session\n", stderr);
} else {
pid_t child_pid = (pid_t)pid;
waitpid(child_pid, NULL, 0);
pam_setcred(pamh, PAM_DELETE_CRED); pam_setcred(pamh, PAM_DELETE_CRED);
pam_close_session(pamh, 0); pam_close_session(pamh, 0);
pam_end(pamh, PAM_SUCCESS); pam_end(pamh, PAM_SUCCESS);
if (*reach_session == false) return false; if (exit_code != 0) return false;
exit(0); exit(0);
} }

View File

@@ -4,6 +4,7 @@
#include <stdlib.h> #include <stdlib.h>
#include "chvt.h" #include "chvt.h"
#include "macros.h"
static char* vterms[] = {"/dev/tty", "/dev/tty0", "/dev/vc/0", "/dev/systty", static char* vterms[] = {"/dev/tty", "/dev/tty0", "/dev/vc/0", "/dev/systty",
"/dev/console"}; "/dev/console"};
@@ -23,16 +24,16 @@ int chvt_str(char* str) {
return chvt((int)i); return chvt((int)i);
} }
int vt = -1;
int chvt(int n) { int chvt(int n) {
// NOLINTNEXTLINE(clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling)
(void)fprintf(stderr, "activating vt %d\n", n); (void)fprintf(stderr, "activating vt %d\n", n);
vt = n;
// NOLINTNEXTLINE(readability-identifier-length) // NOLINTNEXTLINE(readability-identifier-length)
char c = 0; char c = 0;
for (size_t i = 0; i < sizeof(vterms) / sizeof(vterms[0]); i++) { for (size_t i = 0; i < LEN(vterms); i++) {
int fd = open(vterms[i], O_RDWR); int fd = open(vterms[i], O_RDWR);
if (fd >= 0 && isatty(fd) && ioctl(fd, KDGKBTYPE, &c) == 0 && c < 3) { if (fd >= 0 && isatty(fd) && ioctl(fd, KDGKBTYPE, &c) == 0 && c < 3) {
if (ioctl(fd, VT_ACTIVATE, n) < 0 || ioctl(fd, VT_WAITACTIVE, n) < 0) { if (ioctl(fd, VT_ACTIVATE, n) < 0 || ioctl(fd, VT_WAITACTIVE, n) < 0) {
// NOLINTNEXTLINE(clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling)
(void)fprintf(stderr, "Couldn't activate vt %d\n", n); (void)fprintf(stderr, "Couldn't activate vt %d\n", n);
return -1; return -1;
} }

View File

@@ -11,14 +11,15 @@
#include "config.h" #include "config.h"
#include "desktop.h" #include "desktop.h"
#include "keys.h"
#include "log.h" #include "log.h"
#include "macros.h" #include "macros.h"
#include "util.h" #include "util/vec.h"
#define UPPER_HALF_BYTE 4 #define UPPER_HALF_BYTE 4
int parse_hex(char* _at, char x1, char x2) { int parse_hex(char* _at, char x1, char x2) {
// make linter happy // make linter happy
u_char* at = (u_char*)_at; uint8_t* at = (uint8_t*)_at;
*at = 0; *at = 0;
@@ -117,12 +118,12 @@ union typ_ptr {
char** string; char** string;
long long* number; long long* number;
bool* boolean; bool* boolean;
enum keys* key; enum Keys* key;
struct Vector* vec; struct Vector* vec;
uintptr_t ptr; uintptr_t ptr;
}; };
struct parser_error parse_key(enum introspection_type typ, union typ_ptr at, struct parser_error parse_key(enum IntrospectionType typ, union typ_ptr at,
char* key, size_t offset) { char* key) {
char* aux_str = NULL; char* aux_str = NULL;
struct parser_error aux_err; struct parser_error aux_err;
@@ -219,7 +220,7 @@ struct status config_line_handler(void* _config, char* table, char* k,
log_printf("[I] parsing [%s.%s] as %s\n", table, k, log_printf("[I] parsing [%s.%s] as %s\n", table, k,
INTROS_TYS_NAMES[this_intros_key->typ]); INTROS_TYS_NAMES[this_intros_key->typ]);
struct parser_error err = parse_key(this_intros_key->typ, k_addr, v, offset); struct parser_error err = parse_key(this_intros_key->typ, k_addr, v);
if (err.msg != NULL) { if (err.msg != NULL) {
log_printf("[E] cfg parser, failed to parse [%s.%s] (%s): %s\n", table, k, log_printf("[E] cfg parser, failed to parse [%s.%s] (%s): %s\n", table, k,
INTROS_TYS_NAMES[this_intros_key->typ], err.msg); INTROS_TYS_NAMES[this_intros_key->typ], err.msg);

View File

@@ -1,4 +1,3 @@
// NOLINTBEGIN(clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling,readability-function-cognitive-complexity)
#include <stdbool.h> #include <stdbool.h>
#include <stdio.h> #include <stdio.h>
#include <stdlib.h> #include <stdlib.h>
@@ -20,6 +19,7 @@ char* trim_str(char* str) {
return str; return str;
} }
// NOLINTNEXTLINE(readability-function-cognitive-complexity)
int read_desktop(FILE* fd, void* ctx, int read_desktop(FILE* fd, void* ctx,
struct status (*cb)(void* ctx, char* table, char* key, struct status (*cb)(void* ctx, char* table, char* key,
char* value)) { char* value)) {
@@ -82,4 +82,3 @@ int read_desktop(FILE* fd, void* ctx,
if (buf != NULL) free(buf); if (buf != NULL) free(buf);
return ret; return ret;
} }
// NOLINTEND(clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling,readability-function-cognitive-complexity)

220
src/desktop_exec.c Normal file
View File

@@ -0,0 +1,220 @@
// TODO: rewrite properly
// NOLINTBEGIN(clang-diagnostic-nullability-completeness)
#include <stddef.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/stat.h>
#include <unistd.h>
#include "desktop_exec.h"
#include "macros.h"
#include "util/path.h"
// constants for exec string parsing
#define MAX_ARGS 100
// ARG_LENGTH is the initial length of a parsed argument
#define ARG_LENGTH 64
char* NULLABLE desktop_as_cmdline(char** args) {
if (args[0] == NULL) return NULL;
size_t fmtd_len = 0;
char** ptr = args;
while (*ptr) {
fmtd_len += strlen(*ptr) + 1;
ptr++;
}
fmtd_len -= 1;
char* fmt_cmdline = malloc(fmtd_len + 1);
if (!fmt_cmdline) return NULL;
size_t fmting_len = 0;
ptr = args;
while (*ptr) {
char* nbyte = stpcpy(&fmt_cmdline[fmting_len], *ptr);
*nbyte = ' ';
fmting_len += nbyte - &fmt_cmdline[fmting_len] + 1;
ptr++;
}
fmt_cmdline[fmting_len - 1] = '\0';
return fmt_cmdline;
}
// parse Exec=/bin/prog arg1 arg2\ with\ spaces
void free_parsed_args(int arg_count, char** args) {
if (!args) return;
for (int i = 0; i < arg_count; i++) {
free(args[i]);
}
free((void*)args);
}
/* small closure-like struct to pass state to helper functions */
struct ctx {
char** pcur;
size_t* pcur_len;
size_t* pcur_cap;
char*** pargv;
int* pargc;
};
/* append_char(state, ch) -> 0 on error, 1 on success */
int append_char(struct ctx* st, char ch) {
char** pcur = st->pcur;
size_t* plen = st->pcur_len;
size_t* pcap = st->pcur_cap;
if (*plen + 1 >= *pcap) {
size_t newcap = *pcap ? (*pcap) * 2 : ARG_LENGTH;
char* cur = (char*)realloc(*pcur, newcap);
if (!cur) return 0;
*pcur = cur;
*pcap = newcap;
}
(*pcur)[(*plen)++] = ch;
return 1;
}
/* push_arg(state) -> 0 on error, 1 on success */
int push_arg(struct ctx* st) {
char** pcur = st->pcur;
size_t* plen = st->pcur_len;
size_t* pcap = st->pcur_cap;
char*** pargv = st->pargv;
int* pargc = st->pargc;
if (*pargc > MAX_ARGS) {
return 1;
}
if (!*pcur) {
char* empty = strdup("");
if (!empty) return 0;
char** na = (char**)realloc((void*)*pargv, sizeof(char*) * ((*pargc) + 1));
if (!na) {
free(empty);
return 0;
}
*pargv = na;
(*pargv)[(*pargc)++] = empty;
return 1;
}
if (!append_char(st, '\0')) return 0;
char* final = (char*)realloc(*pcur, *plen);
if (!final) final = *pcur;
*pcur = NULL;
*plen = 0;
*pcap = 0;
char** na = (char**)realloc((void*)*pargv, sizeof(char*) * ((*pargc) + 1));
if (!na) {
free(final);
return 0;
}
*pargv = na;
(*pargv)[(*pargc)++] = final;
return 1;
}
/* Return codes:
0 = success
1 = bad args
2 = memory
3 = syntax
Important: call free_parsed_args afterwards to free the passed ***args
*/
// NOLINTBEGIN(readability-function-cognitive-complexity)
int parse_exec_string(const char* exec_s, int* arg_count, char*** args) {
if (!exec_s || !args || !arg_count) return 1;
*args = NULL;
*arg_count = 0;
size_t len = strlen(exec_s);
size_t idx = 0;
char* cur = NULL;
size_t cur_len = 0;
size_t cur_cap = 0;
char** argv = NULL;
int argc = 0;
int in_quote = 0;
struct ctx ctx;
ctx.pcur = &cur;
ctx.pcur_len = &cur_len;
ctx.pcur_cap = &cur_cap;
ctx.pargv = &argv;
ctx.pargc = &argc;
while (idx < len) {
char cur_c = exec_s[idx];
if (!in_quote && (cur_c == ' ' || cur_c == '\t' || cur_c == '\n')) {
if (cur_cap) {
if (!push_arg(&ctx)) goto nomem;
}
idx++;
continue;
}
if (!in_quote && cur_c == '"') {
in_quote = 1;
idx++;
continue;
}
if (in_quote && cur_c == '"') {
in_quote = 0;
idx++;
continue;
}
if (cur_c == '\\') {
if (idx + 1 >= len) goto syntax_err;
if (!append_char(&ctx, exec_s[idx + 1])) goto nomem;
idx += 2;
continue;
}
if (cur_c == '%') {
if (idx + 1 >= len) goto syntax_err;
if (exec_s[idx + 1] == '%') {
if (!append_char(&ctx, '%')) goto nomem;
idx += 2;
continue;
}
/* drop any %X */
idx += 2;
continue;
}
if (!append_char(&ctx, cur_c)) goto nomem;
idx++;
}
if (in_quote) goto syntax_err;
if (cur_cap) {
if (!push_arg(&ctx)) goto nomem;
}
char** na = (char**)realloc((void*)argv, sizeof(char*) * (argc + 1));
if (!na) goto nomem;
argv = na;
argv[argc] = NULL;
*args = argv;
*arg_count = argc;
return 0;
nomem:
if (cur) free(cur);
free_parsed_args(argc, argv);
*args = NULL;
*arg_count = 0;
return 2;
syntax_err:
if (cur) free(cur);
free_parsed_args(argc, argv);
*args = NULL;
*arg_count = 0;
return 3;
}
// NOLINTEND(readability-function-cognitive-complexity)
// NOLINTEND(clang-diagnostic-nullability-completeness)

View File

@@ -2,9 +2,7 @@
#include "efield.h" #include "efield.h"
#include "ui.h" #include "ui.h"
#include "util.h" #include "util/utf8.h"
// NOLINTBEGIN(clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling)
struct editable_field efield_new(char* content) { struct editable_field efield_new(char* content) {
struct editable_field efield; struct editable_field efield;
@@ -18,14 +16,14 @@ struct editable_field efield_new(char* content) {
return efield; return efield;
} }
void efield_trim(struct editable_field* self, u_char pos) { void efield_trim(struct editable_field* self, uint8_t pos) {
self->pos = pos; self->pos = pos;
self->content[pos + 1] = '\0'; self->content[pos + 1] = '\0';
} }
#define BACKSPACE_CODE 127 #define BACKSPACE_CODE 127
void efield_update(struct editable_field* self, char* update) { void efield_update(struct editable_field* self, char* update) {
u_char insert_len = strlen(update); uint8_t insert_len = strlen(update);
if (insert_len == 0) return; if (insert_len == 0) return;
if (self->pos > strlen(self->content)) if (self->pos > strlen(self->content))
@@ -63,7 +61,7 @@ bool efield_seek(struct editable_field* self, char seek) {
if (*self->content == '\0') return false; if (*self->content == '\0') return false;
if (seek == 0) return false; if (seek == 0) return false;
u_char count = seek < 0 ? -seek : seek; uint8_t count = seek < 0 ? -seek : seek;
char* ptr = &self->content[self->pos]; char* ptr = &self->content[self->pos];
char* start = ptr; char* start = ptr;
@@ -77,8 +75,6 @@ bool efield_seek(struct editable_field* self, char seek) {
} }
} }
self->pos = (u_char)(ptr - self->content); self->pos = (uint8_t)(ptr - self->content);
return ptr != start; return ptr != start;
} }
// NOLINTEND(clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling)

77
src/keys.c Normal file
View File

@@ -0,0 +1,77 @@
#include <errno.h>
#include <string.h>
#include <unistd.h>
#include "keys.h"
#include "macros.h"
#include "ui.h"
static int selret_magic();
int find_keyname(enum Keys* at, const char* name) {
for (size_t i = 0; i < LEN(KEY_MAPPINGS); i++) {
if (strcmp(KEY_NAMES[i], name) == 0) {
*at = (enum Keys)i;
return 0;
}
}
return -1;
}
struct option_keys find_ansi(const char* seq) {
for (size_t i = 0; i < LEN(KEY_MAPPINGS); i++) {
struct key_mapping mapping = KEY_MAPPINGS[i];
for (size_t j = 0; mapping.sequences[j] != NULL; j++) {
if (strcmp(mapping.sequences[j], seq) == 0) {
return (struct option_keys){
.is_some = true,
.key = (enum Keys)i,
};
}
}
}
return (struct option_keys){.is_some = false};
}
void read_press(uint8_t* length, char* out) {
*length = 0;
while (true) {
if (read(STDIN_FILENO, &out[(*length)++], 1) != 1) {
print_errno("read error");
sleep(3);
exit(1);
}
int selret = selret_magic();
if (selret == -1) {
print_errno("selret error");
} else if (selret != 1) {
out[*length] = '\0';
return;
}
}
}
bool read_press_nb(uint8_t* length, char* out, struct timeval* tv) {
fd_set fds;
FD_ZERO(&fds);
FD_SET(STDIN_FILENO, &fds);
errno = 0;
int ret = select(STDIN_FILENO + 1, &fds, NULL, NULL, tv);
if (errno || ret <= 0) return false;
read_press(length, out);
return true;
}
// https://stackoverflow.com/a/48040042
static int selret_magic() {
fd_set set;
struct timeval timeout;
FD_ZERO(&set);
FD_SET(STDIN_FILENO, &set);
timeout.tv_sec = 0;
timeout.tv_usec = 0;
return select(1, &set, NULL, NULL, &timeout);
}

View File

@@ -21,15 +21,17 @@ int read_launch_state(struct LaunchState* NNULLABLE state) {
}; };
size_t num = 0; size_t num = 0;
if (getline(&state->username, &num, state_fd) < 0) goto fail; ssize_t chars = getline(&state->username, &num, state_fd);
state->username[strcspn(state->username, "\n")] = 0; if (chars <= 0) goto fail;
if (state->username[chars - 1] == '\n') state->username[chars - 1] = 0;
num = 0; num = 0;
if (getline(&state->session_opt, &num, state_fd) < 0) { chars = getline(&state->session_opt, &num, state_fd);
if (chars <= 0) {
free(state->session_opt); free(state->session_opt);
goto fail; goto fail;
} }
state->session_opt[strcspn(state->session_opt, "\n")] = 0; if (state->session_opt[chars - 1] == '\n') state->session_opt[chars - 1] = 0;
(void)fclose(state_fd); (void)fclose(state_fd);
return 0; return 0;

View File

@@ -8,6 +8,7 @@ static FILE* logger_out = NULL;
void log_init(FILE* fd) { void log_init(FILE* fd) {
if (logger_out) (void)fclose(logger_out); if (logger_out) (void)fclose(logger_out);
(void)setvbuf(fd, NULL, _IONBF, 0);
logger_out = fd; logger_out = fd;
} }

View File

@@ -12,12 +12,13 @@
#include "log.h" #include "log.h"
#include "macros.h" #include "macros.h"
#include "sessions.h" #include "sessions.h"
#include "signal_handler.h"
#include "ui.h" #include "ui.h"
#include "users.h" #include "users.h"
#include "util.h" #include "util/vec.h"
#include "version.h"
#define DATESTR_MAXBUFSIZE 0x20 #define DATESTR_MAXBUFSIZE 0x20
int main(int argc, char* argv[]) { int main(int argc, char* argv[]) {
// Logger // Logger
char* log_output = getenv("LIDM_LOG"); char* log_output = getenv("LIDM_LOG");
@@ -30,6 +31,7 @@ int main(int argc, char* argv[]) {
} }
log_init(log_fd); log_init(log_fd);
log_puts("Starting log:");
} }
if (argc == 2) { if (argc == 2) {
@@ -85,6 +87,8 @@ int main(int argc, char* argv[]) {
struct Vector users = get_human_users(); struct Vector users = get_human_users();
struct Vector sessions = get_avaliable_sessions(); struct Vector sessions = get_avaliable_sessions();
setup_sigterm();
int ret = load(&users, &sessions); int ret = load(&users, &sessions);
if (ret == 0) execl(argv[0], argv[0], NULL); if (ret == 0) execl(argv[0], argv[0], NULL);
} }

View File

@@ -1,10 +1,9 @@
#include <stddef.h> #include <stddef.h>
#include "config.h"
#include "efield.h" #include "efield.h"
#include "ofield.h" #include "ofield.h"
#include "ui.h" #include "ui.h"
#include "util.h" #include "util/utf8.h"
struct opts_field ofield_new(size_t opts) { struct opts_field ofield_new(size_t opts) {
if (opts == 0) { if (opts == 0) {
@@ -55,10 +54,10 @@ bool ofield_seek(struct opts_field* self, char seek) {
return true; return true;
} }
u_char ofield_display_cursor_col(struct opts_field* self, u_char maxlen) { uint8_t ofield_display_cursor_col(struct opts_field* self, uint8_t maxlen) {
if (self->current_opt == 0) { if (self->current_opt == 0) {
u_char display_len = utf8len(self->efield.content); uint8_t display_len = utf8len(self->efield.content);
u_char pos = utf8len_until(self->efield.content, uint8_t pos = utf8len_until(self->efield.content,
&self->efield.content[self->efield.pos]); &self->efield.content[self->efield.pos]);
if (display_len > maxlen) { if (display_len > maxlen) {

197
src/pam.c Normal file
View File

@@ -0,0 +1,197 @@
#include <pwd.h>
#include <security/_pam_types.h>
#include <stdbool.h>
#include <stddef.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include "log.h"
#include "macros.h"
#include "pam.h"
#include "sessions.h"
#include "ui.h"
struct envpair {
const char* NNULLABLE name;
char* NULLABLE value;
};
char* NULLABLE make_env_kv(const char* NNULLABLE key, char* NNULLABLE value) {
char* buf = NULL;
asprintf(&buf, "%s=%s", key, value);
return buf;
}
void free_envlist(char** NNULLABLE envlist) {
for (char** ptr = envlist; *ptr; ptr++)
free(*ptr);
free((void*)envlist);
}
// NULL when allocation failure
// in any case, envlist would be freed after this function
char** NULLABLE merge_envlist(char** NNULLABLE envlist, struct envpair extra[],
size_t extra_len) {
size_t envlist_len = 0;
while (envlist[envlist_len])
envlist_len++;
size_t nonnullelems = 0;
for (size_t i = 0; i < extra_len; i++) {
if (extra[i].value) nonnullelems++;
}
size_t new_envlist_len = envlist_len + nonnullelems + 1;
char** new_envlist =
(char**)realloc((void*)envlist, sizeof(char*) * new_envlist_len);
if (!new_envlist) {
free_envlist(envlist);
return NULL;
}
// NOLINTNEXTLINE(readability-identifier-length)
size_t k = 0;
for (size_t i = 0; i < extra_len; i++) {
if (!extra[i].value) continue;
char* env_kv = make_env_kv(extra[i].name, extra[i].value);
if (!env_kv) goto free_new_envlist_extra;
new_envlist[envlist_len + k++] = env_kv;
}
new_envlist[envlist_len + nonnullelems] = NULL;
return new_envlist;
free_new_envlist_extra:
for (size_t j = 0; j < envlist_len + k; j++) {
free(new_envlist[envlist_len + j]);
}
free((void*)new_envlist);
return NULL;
}
char* NULLABLE xdg_ssession_type_str(enum SessionType typ) {
char* xdg_session_type = NULL;
if (typ == SHELL) xdg_session_type = "tty";
if (typ == XORG) xdg_session_type = "x11";
if (typ == WAYLAND) xdg_session_type = "wayland";
return xdg_session_type;
}
#define FAIL_ALLOC() \
{ \
return (struct pamh_getenv_status){.error_flag = PAMH_ERR_ALLOC}; \
}
#define FAIL(ERR, ERRFN) \
{ \
return (struct pamh_getenv_status){.error_flag = (ERR), .errfn = (ERRFN)}; \
}
struct pamh_getenv_status pamh_get_complete_env(pam_handle_t* handle,
struct passwd* NNULLABLE pw,
enum SessionType session_typ) {
char** raw_envlist = pam_getenvlist(handle);
if (!raw_envlist) FAIL(PAMH_ERR_ERRNO, "pam_getenvlist");
char** ptr = raw_envlist;
while (*ptr)
log_printf("[I] got pam env %s\n", *(ptr++));
struct envpair extra_env[] = {
{"TERM", getenv("TERM")},
{"PATH", getenv("PATH")},
{"HOME", pw->pw_dir},
{"USER", pw->pw_name},
{"SHELL", pw->pw_shell},
{"LOGNAME", pw->pw_name},
{"XDG_SESSION_TYPE", xdg_ssession_type_str(session_typ)}};
char** envlist = merge_envlist(raw_envlist, extra_env, LEN(extra_env));
if (!envlist) FAIL_ALLOC();
return (struct pamh_getenv_status){
.error_flag = PAMH_ERR_NOERR,
.envlist = envlist,
};
}
#undef FAIL
#undef FAIL_ALLOC
///////////////
struct pam_conv_data {
char* password;
void (*display_pam_msg)(const char* msg, int msg_style);
};
int pam_conversation(int num_msg, const struct pam_message** msg,
struct pam_response** resp, void* appdata_ptr) {
struct pam_response* reply = malloc(sizeof(struct pam_response) * num_msg);
if (!reply) {
return PAM_BUF_ERR;
}
struct pam_conv_data* conv_data = (struct pam_conv_data*)appdata_ptr;
for (int i = 0; i < num_msg; i++) {
reply[i].resp = NULL;
reply[i].resp_retcode = 0;
switch (msg[i]->msg_style) {
case PAM_PROMPT_ECHO_OFF:
case PAM_PROMPT_ECHO_ON:
reply[i].resp = strdup(conv_data->password);
if (!reply[i].resp) {
for (int j = 0; j < i; j++)
free(reply[j].resp);
free(reply);
return PAM_BUF_ERR;
}
break;
case PAM_TEXT_INFO:
case PAM_ERROR_MSG:
if (conv_data->display_pam_msg && msg[i]->msg) {
conv_data->display_pam_msg(msg[i]->msg, msg[i]->msg_style);
}
break;
default:
break;
}
}
*resp = reply;
return PAM_SUCCESS;
}
#ifndef PAM_SERVICE_FALLBACK
#define PAM_SERVICE_FALLBACK "login"
#endif
#define CHECK_PAM_RET(call) \
ret = (call); \
if (ret != PAM_SUCCESS) { \
pam_end(pamh, ret); \
return NULL; \
}
pam_handle_t* get_pamh(char* user, char* passwd) {
pam_handle_t* pamh = NULL;
struct pam_conv_data conv_data = {.password = passwd,
.display_pam_msg = print_pam_msg};
struct pam_conv pamc = {pam_conversation, (void*)&conv_data};
int ret;
char* pam_service_override = getenv("LIDM_PAM_SERVICE");
char* pam_service_name =
pam_service_override ? pam_service_override : PAM_SERVICE_FALLBACK;
CHECK_PAM_RET(pam_start(pam_service_name, user, &pamc, &pamh))
CHECK_PAM_RET(pam_authenticate(pamh, 0))
CHECK_PAM_RET(pam_acct_mgmt(pamh, 0))
CHECK_PAM_RET(pam_setcred(pamh, PAM_ESTABLISH_CRED))
CHECK_PAM_RET(pam_open_session(pamh, 0))
CHECK_PAM_RET(pam_setcred(pamh, PAM_REINITIALIZE_CRED))
return pamh;
}
#undef CHECK_PAM_RET

View File

@@ -1,3 +1,4 @@
#include <errno.h>
#include <ftw.h> #include <ftw.h>
#include <limits.h> #include <limits.h>
#include <stdbool.h> #include <stdbool.h>
@@ -6,27 +7,38 @@
#include <string.h> #include <string.h>
#include <sys/stat.h> #include <sys/stat.h>
#include <sys/types.h> #include <sys/types.h>
#include <unistd.h>
#include "config.h"
#include "desktop.h" #include "desktop.h"
#include "desktop_exec.h"
#include "log.h" #include "log.h"
#include "macros.h"
#include "sessions.h" #include "sessions.h"
#include "util.h" #include "util/path.h"
#include "util/vec.h"
struct source_dir { struct source_dir {
enum session_type type; enum SessionType type;
char* dir; char* dir;
}; };
#ifndef SESSIONS_XSESSIONS #ifndef SESSIONS_XSESSIONS
#define SESSIONS_XSESSIONS "/usr/share/xsessions" #define SESSIONS_XSESSIONS "/usr/share/xsessions"
#endif #endif
#ifndef SESSIONS_XSESSIONS_LOCAL
#define SESSIONS_XSESSIONS_LOCAL "/usr/local/share/xsessions"
#endif
#ifndef SESSIONS_WAYLAND #ifndef SESSIONS_WAYLAND
#define SESSIONS_WAYLAND "/usr/share/wayland-sessions" #define SESSIONS_WAYLAND "/usr/share/wayland-sessions"
#endif #endif
static const struct source_dir SOURCES[] = { #ifndef SESSIONS_WAYLAND_LOCAL
{XORG, SESSIONS_XSESSIONS}, #define SESSIONS_WAYLAND_LOCAL "/usr/local/share/wayland-sessions"
#endif
static const struct source_dir SOURCES[] = {{XORG, SESSIONS_XSESSIONS},
{XORG, SESSIONS_XSESSIONS_LOCAL},
{WAYLAND, SESSIONS_WAYLAND}, {WAYLAND, SESSIONS_WAYLAND},
}; {WAYLAND, SESSIONS_WAYLAND_LOCAL}};
static struct Vector* cb_sessions = NULL; static struct Vector* cb_sessions = NULL;
@@ -72,9 +84,11 @@ struct status cb(void* _ctx, char* NULLABLE table, char* key, char* value) {
// also, always return 0 or we will break parsing and we don't want a bad // also, always return 0 or we will break parsing and we don't want a bad
// desktop file to break all possible sessions // desktop file to break all possible sessions
static enum session_type session_type; static enum SessionType session_type;
// NOLINTNEXTLINE(readability-function-cognitive-complexity) // NOLINTNEXTLINE(readability-function-cognitive-complexity)
static int fn(const char* fpath, const struct stat* sb, int typeflag) { static int fn(const char* fpath, const struct stat* sb, int typeflag) {
UNUSED(sb);
// guessing symlink behavior // guessing symlink behavior
// - FTW_PHYS if set doesn't follow symlinks, so ftw() has no flags and it // - FTW_PHYS if set doesn't follow symlinks, so ftw() has no flags and it
// follows symlinks, we should never get to handle that // follows symlinks, we should never get to handle that
@@ -95,22 +109,33 @@ static int fn(const char* fpath, const struct stat* sb, int typeflag) {
} }
int ret = read_desktop(fd, &ctx, &cb); int ret = read_desktop(fd, &ctx, &cb);
if (ret < 0) { // any error // any error
log_printf("[E] format error parsing %s", fpath); if (ret < 0) goto err_close;
return 0;
}
(void)fclose(fd); (void)fclose(fd);
// TODO: filter based on tryexec
// https://specifications.freedesktop.org/desktop-entry-spec/latest/recognized-keys.html
free(ctx.tryexec);
// just add this to the list // just add this to the list
if (ctx.name != NULL && ctx.exec != NULL) { if (ctx.name != NULL && ctx.exec != NULL) {
struct session* this_session = malloc(sizeof(struct session)); struct session* this_session = malloc(sizeof(struct session));
if (this_session == NULL) return 0; if (this_session == NULL) return 0;
int arg_count;
char** args;
int parse_status = parse_exec_string(ctx.exec, &arg_count, &args);
if (parse_status != 0 || arg_count == 0 || !args[0]) {
log_printf("[E] parsing exec string '%s': %d\n", ctx.exec, parse_status);
free(this_session);
goto err_parsing;
}
free(ctx.exec);
*this_session = (struct session){ *this_session = (struct session){
.name = ctx.name, .name = ctx.name,
.exec = ctx.exec, .exec = session_exec_desktop(arg_count, args),
.tryexec = ctx.tryexec,
.type = session_type, .type = session_type,
}; };
@@ -118,6 +143,12 @@ static int fn(const char* fpath, const struct stat* sb, int typeflag) {
} }
return 0; return 0;
err_close:
(void)fclose(fd);
err_parsing:
log_printf("[E] format error parsing %s", fpath);
return 0;
} }
// This code is designed to be run purely single threaded // This code is designed to be run purely single threaded
@@ -127,7 +158,7 @@ struct Vector get_avaliable_sessions() {
vec_reserve(&sessions, LIKELY_BOUND_SESSIONS); vec_reserve(&sessions, LIKELY_BOUND_SESSIONS);
cb_sessions = &sessions; cb_sessions = &sessions;
for (size_t i = 0; i < (sizeof(SOURCES) / sizeof(SOURCES[0])); i++) { for (size_t i = 0; i < LEN(SOURCES); i++) {
log_printf("[I] parsing into %s\n", SOURCES[i].dir); log_printf("[I] parsing into %s\n", SOURCES[i].dir);
session_type = SOURCES[i].type; session_type = SOURCES[i].type;
ftw(SOURCES[i].dir, &fn, 1); ftw(SOURCES[i].dir, &fn, 1);
@@ -136,3 +167,54 @@ struct Vector get_avaliable_sessions() {
return sessions; return sessions;
} }
int session_exec_exec(struct session_exec* NNULLABLE exec,
char* NULLABLE* NNULLABLE envp) {
switch (exec->typ) {
case EXEC_SHELL: {
char* argv[] = {exec->shell, NULL};
return execvpe(exec->shell, argv, envp);
}
case EXEC_DESKTOP:
return execvpe(exec->desktop.args[0], exec->desktop.args, envp);
default:
__builtin_unreachable();
}
}
/// So the reason this doesn't use the user shell is because that can really be
/// anything, also assuming it were fish for example, it can't execute posix
/// shell files and that leaves it out of most `/etc/profile.d/` scripts.
///
/// I'll just default to bash for now as it's able to source almost everything
/// and takes most flags. Maybe will try to make this more sophisticated in the
/// future.
///
/// This respects errno. Even also works as any exec family function.
#ifndef LOGIN_SHELL
#define LOGIN_SHELL "bash"
#endif
// This triggers login behavior
#define LOGIN_SHELL_ARG0 "-" LOGIN_SHELL
int session_exec_login_through_shell(struct session_exec* NNULLABLE exec,
char* NULLABLE* NNULLABLE envp) {
switch (exec->typ) {
case EXEC_SHELL: {
char* argv[] = {LOGIN_SHELL_ARG0, "-c", exec->shell, NULL};
return execvpe(LOGIN_SHELL, argv, envp);
}
case EXEC_DESKTOP: {
char* name = desktop_as_cmdline(exec->desktop.args);
if (!name) {
errno = EINVAL;
return -1;
}
char* argv[] = {LOGIN_SHELL_ARG0, "-c", name, NULL};
int ret = execvpe(LOGIN_SHELL, argv, envp);
free(name);
return ret;
}
default:
__builtin_unreachable();
}
}

29
src/signal_handler.c Normal file
View File

@@ -0,0 +1,29 @@
#include <errno.h>
#include <stddef.h>
#include <sys/wait.h>
#include <unistd.h>
#include "signal_handler.h"
static void handle_sigterm(int sig) {
(void)sig;
(void)signal(SIGTERM, SIG_IGN);
kill(-getpgrp(), SIGTERM);
int status;
while (waitpid(-1, &status, 0) > 0 || errno == EINTR) {
}
_exit(0);
}
void setup_sigterm() {
setpgid(0, 0);
struct sigaction sa;
sa.sa_handler = handle_sigterm;
sigemptyset(&sa.sa_mask);
sa.sa_flags = 0;
sigaction(SIGTERM, &sa, NULL);
}

188
src/ui.c
View File

@@ -5,6 +5,7 @@
#include <errno.h> #include <errno.h>
#include <limits.h> #include <limits.h>
#include <pwd.h> #include <pwd.h>
#include <security/pam_appl.h>
#include <signal.h> #include <signal.h>
#include <stdbool.h> #include <stdbool.h>
#include <stddef.h> #include <stddef.h>
@@ -25,14 +26,15 @@
#include "keys.h" #include "keys.h"
#include "launch_state.h" #include "launch_state.h"
#include "log.h" #include "log.h"
#include "macros.h"
#include "ofield.h" #include "ofield.h"
#include "sessions.h" #include "sessions.h"
#include "ui.h" #include "ui.h"
#include "ui_state.h" #include "ui_state.h"
#include "users.h" #include "users.h"
#include "util.h" #include "util/utf8.h"
const u_char INPUTS_N = 3; const uint8_t INPUTS_N = 3;
struct uint_point { struct uint_point {
uint x; uint x;
@@ -61,9 +63,15 @@ struct config* g_config = NULL;
static volatile sig_atomic_t need_resize = 0; static volatile sig_atomic_t need_resize = 0;
static void process_sigwinch(int signal) { static void process_sigwinch(int signal) {
UNUSED(signal);
need_resize = 1; need_resize = 1;
} }
static inline void draw_bg() {
// apply bg color to all screen
printf("\x1b[%sm\x1b[2J", g_config->colors.bg);
}
void setup(struct config* config) { void setup(struct config* config) {
g_config = config; g_config = config;
@@ -73,10 +81,9 @@ void setup(struct config* config) {
term.c_lflag &= ~(ICANON | ECHO); term.c_lflag &= ~(ICANON | ECHO);
tcsetattr(STDOUT_FILENO, TCSANOW, &term); tcsetattr(STDOUT_FILENO, TCSANOW, &term);
// save cursor pos, save screen, set color and reset screen // save cursor pos, save screen
// (applying color to all screen) printf("\x1b[s\x1b[?47h");
printf("\x1b[s\x1b[?47h\x1b[%s;%sm\x1b[2J", g_config->colors.bg, draw_bg();
g_config->colors.fg);
(void)atexit(restore_all); (void)atexit(restore_all);
(void)signal(SIGINT, signal_handler); (void)signal(SIGINT, signal_handler);
@@ -109,8 +116,8 @@ static char* fmt_time(const char* fmt) {
} }
} }
char* trunc_gethostname(const size_t MAXLEN, const char* const ELLIPSIS) { char* trunc_gethostname(size_t maxlen, const char* const ELLIPSIS) {
if (utf8len(ELLIPSIS) > MAXLEN) return NULL; if (utf8len(ELLIPSIS) > maxlen) return NULL;
size_t alloc_size = HOST_NAME_MAX + strlen(ELLIPSIS) + 1; size_t alloc_size = HOST_NAME_MAX + strlen(ELLIPSIS) + 1;
char* buf = malloc(alloc_size); char* buf = malloc(alloc_size);
if (!buf) return NULL; if (!buf) return NULL;
@@ -120,19 +127,19 @@ char* trunc_gethostname(const size_t MAXLEN, const char* const ELLIPSIS) {
return NULL; return NULL;
} }
if (utf8len(buf) > MAXLEN) { if (utf8len(buf) > maxlen) {
size_t end = utf8trunc(buf, MAXLEN - utf8len(ELLIPSIS)); size_t end = utf8trunc(buf, maxlen - utf8len(ELLIPSIS));
strcpy(&buf[end], ELLIPSIS); strcpy(&buf[end], ELLIPSIS);
} }
return buf; return buf;
} }
void ui_update_cursor_focus() { void ui_update_cursor_focus() {
u_char line = box_start.y; uint8_t line = box_start.y;
u_char col = box_start.x + VALUES_COL; uint8_t col = box_start.x + VALUES_COL;
struct opts_field* ofield = get_opts_ffield(); struct opts_field* ofield = get_opts_ffield();
u_char maxlen = VALUE_MAXLEN; uint8_t maxlen = VALUE_MAXLEN;
if (ofield->opts > 1) { if (ofield->opts > 1) {
maxlen -= utf8len(g_config->strings.opts_pre) + maxlen -= utf8len(g_config->strings.opts_pre) +
utf8len(g_config->strings.opts_post); utf8len(g_config->strings.opts_post);
@@ -151,7 +158,7 @@ void ui_update_cursor_focus() {
(void)printf("\x1b[%d;%dH", line, col); (void)printf("\x1b[%d;%dH", line, col);
} }
void ui_update_field(enum input focused_input) { void ui_update_field(enum Input focused_input) {
if (focused_input == PASSWD) { if (focused_input == PASSWD) {
print_passwd(utf8len(of_passwd.efield.content), false); print_passwd(utf8len(of_passwd.efield.content), false);
} else if (focused_input == SESSION) { } else if (focused_input == SESSION) {
@@ -170,7 +177,7 @@ void ui_update_ffield() {
} }
void ui_update_ofield(struct opts_field* NNULLABLE self) { void ui_update_ofield(struct opts_field* NNULLABLE self) {
enum input input; enum Input input;
if (self == &of_session) if (self == &of_session)
input = SESSION; input = SESSION;
else if (self == &of_user) else if (self == &of_user)
@@ -183,6 +190,7 @@ void ui_update_ofield(struct opts_field* NNULLABLE self) {
ui_update_field(input); ui_update_field(input);
} }
/// draw everything
void scratch_print_ui() { void scratch_print_ui() {
ioctl(STDOUT_FILENO, TIOCGWINSZ, &window); ioctl(STDOUT_FILENO, TIOCGWINSZ, &window);
box_start = (struct uint_point){ box_start = (struct uint_point){
@@ -190,15 +198,16 @@ void scratch_print_ui() {
.y = ((window.ws_row - BOX_HEIGHT) / 2), // leave more space under .y = ((window.ws_row - BOX_HEIGHT) / 2), // leave more space under
}; };
if (window.ws_row < BOX_HEIGHT + INNER_BOX_OUT_MARGIN * 2 || if (window.ws_row < BOX_HEIGHT + (INNER_BOX_OUT_MARGIN * 2) ||
window.ws_col < BOX_WIDTH + INNER_BOX_OUT_MARGIN * 2) { window.ws_col < BOX_WIDTH + (INNER_BOX_OUT_MARGIN * 2)) {
printf("\033[2J\033[H"); // Clear screen printf("\033[2J\033[H"); // Clear screen
printf("\x1b[1;31mScreen too small\x1b[0m\n"); printf("\x1b[1;31mScreen too small\x1b[0m\n");
printf("\x1b[%s;%sm\x1b[2J", g_config->colors.bg, g_config->colors.fg); printf("\x1b[%s;%sm\x1b[2J", g_config->colors.bg, g_config->colors.fg);
return; return;
} }
printf("\033[2J\033[H"); // Clear screen printf("\033[2J\033[H\033c"); // Clear screen
draw_bg();
/// PRINTING /// PRINTING
// printf box // printf box
@@ -260,7 +269,7 @@ int load(struct Vector* users, struct Vector* sessions) {
scratch_print_ui(); scratch_print_ui();
/// INTERACTIVE /// INTERACTIVE
u_char len; uint8_t len;
char seq[0xff]; char seq[0xff];
uint esc = 0; uint esc = 0;
while (true) { while (true) {
@@ -280,28 +289,46 @@ int load(struct Vector* users, struct Vector* sessions) {
(void)fflush(stdout); (void)fflush(stdout);
if (!read_press_nb(&len, seq, &tv)) continue; if (!read_press_nb(&len, seq, &tv)) continue;
if (*seq == '\x1b') { if (*seq == '\x1b') {
enum keys ansi_code = find_ansi(seq); struct option_keys ansi_code = find_ansi(seq);
if (ansi_code != -1) { if (ansi_code.is_some) {
if (ansi_code == ESC) { enum Keys ansi_key = ansi_code.key;
if (ansi_key == ESC) {
esc = 2; esc = 2;
} else if (ansi_code == g_config->functions.refresh) { } else if (ansi_key == g_config->functions.refresh) {
restore_all(); restore_all();
return 0; return 0;
} else if (ansi_code == g_config->functions.reboot) { } else if (ansi_key == g_config->functions.reboot) {
restore_all(); restore_all();
reboot(RB_AUTOBOOT); reboot(RB_AUTOBOOT);
exit(0); exit(0);
} else if (ansi_code == g_config->functions.poweroff) { } else if (ansi_key == g_config->functions.poweroff) {
restore_all(); restore_all();
reboot(RB_POWER_OFF); reboot(RB_POWER_OFF);
exit(0); exit(0);
} else if (ansi_code == A_UP || ansi_code == A_DOWN) { } else if (g_config->functions.fido != NONE &&
st_ch_focus(ansi_code == A_DOWN ? 1 : -1); ansi_key == g_config->functions.fido) {
} else if (ansi_code == A_RIGHT || ansi_code == A_LEFT) { bool successful_write = write_launch_state((struct LaunchState){
.username = st_user().username,
.session_opt =
st_session(g_config->behavior.include_defshell).name,
});
if (!successful_write) log_puts("[E] failed to write launch state");
if (!launch(st_user().username, "",
st_session(g_config->behavior.include_defshell),
&restore_all, g_config)) {
print_passwd(utf8len(of_passwd.efield.content), true);
ui_update_cursor_focus();
} else {
scratch_print_ui();
}
} else if (ansi_key == A_UP || ansi_key == A_DOWN) {
st_ch_focus(ansi_key == A_DOWN ? 1 : -1);
} else if (ansi_key == A_RIGHT || ansi_key == A_LEFT) {
if (esc) if (esc)
st_ch_of_opts(ansi_code == A_RIGHT ? 1 : -1); st_ch_of_opts(ansi_key == A_RIGHT ? 1 : -1);
else else
st_ch_ef_col(ansi_code == A_RIGHT ? 1 : -1); st_ch_ef_col(ansi_key == A_RIGHT ? 1 : -1);
} }
} }
} else { } else {
@@ -317,6 +344,8 @@ int load(struct Vector* users, struct Vector* sessions) {
&restore_all, g_config)) { &restore_all, g_config)) {
print_passwd(utf8len(of_passwd.efield.content), true); print_passwd(utf8len(of_passwd.efield.content), true);
ui_update_cursor_focus(); ui_update_cursor_focus();
} else {
scratch_print_ui();
} }
} else } else
st_kbd_type(seq, g_config->behavior.include_defshell); st_kbd_type(seq, g_config->behavior.include_defshell);
@@ -333,33 +362,48 @@ void clean_line(struct uint_point origin, uint line) {
printf("\x1b[%d;%dH%s", origin.y + line, origin.x + 1, line_cleaner); printf("\x1b[%d;%dH%s", origin.y + line, origin.x + 1, line_cleaner);
} }
u_char get_render_pos_offset(struct opts_field* self, u_char maxlen) { uint8_t get_render_pos_offset(struct opts_field* self, uint8_t maxlen) {
if (self->current_opt != 0) return 0; if (self->current_opt != 0) return 0;
u_char pos = utf8len_until(self->efield.content, uint8_t pos = utf8len_until(self->efield.content,
&self->efield.content[self->efield.pos]); &self->efield.content[self->efield.pos]);
return pos - ofield_display_cursor_col(self, maxlen); return pos - ofield_display_cursor_col(self, maxlen);
} }
#define HOSTNAME_SIZE (VALUES_COL - VALUES_SEPR - BOX_HMARGIN - 1)
void print_head() { void print_head() {
// hostname doesn't just change on runtime char* fmtd_time = fmt_time(g_config->behavior.timefmt);
static char* hostname = NULL; size_t len_tm = utf8len(fmtd_time);
if (!hostname)
hostname = trunc_gethostname(HOSTNAME_SIZE, g_config->strings.ellipsis); // calculate the space available for the host name
if (!hostname) hostname = "unknown"; ssize_t hostname_size = BOX_WIDTH - (BOX_HMARGIN * 2) - len_tm - VALUES_SEPR;
if (hostname_size < 0) hostname_size = 0;
// hostname doesn't just change on runtime,
// but the length of the time string might
static char* NULLABLE hostname = NULL;
static ssize_t hostname_calcd_size;
// save the truncated hostname and the length it truncated to,
// if said length changes recalculate this (and free previous str)
if (!hostname || hostname_calcd_size != hostname_size) {
if (hostname) free(hostname);
hostname = trunc_gethostname(hostname_size, g_config->strings.ellipsis);
hostname_calcd_size = hostname_size;
}
clean_line(box_start, HEAD_ROW); clean_line(box_start, HEAD_ROW);
// put hostname // put hostname
printf("\x1b[%dG\x1b[%sm%s\x1b[%sm", if (hostname_size)
box_start.x + VALUES_COL - VALUES_SEPR - (uint)utf8len(hostname), printf("\x1b[%dG\x1b[%sm%s\x1b[%sm", box_start.x + 1 + BOX_HMARGIN,
g_config->colors.e_hostname, hostname, g_config->colors.fg); g_config->colors.e_hostname, hostname ? hostname : "unknown",
g_config->colors.fg);
// put date // put date
char* fmtd_time = fmt_time(g_config->behavior.timefmt);
printf("\x1b[%dG\x1b[%sm%s\x1b[%sm", printf("\x1b[%dG\x1b[%sm%s\x1b[%sm",
box_start.x + BOX_WIDTH - 1 - BOX_HMARGIN - (uint)utf8len(fmtd_time), box_start.x + BOX_WIDTH - 1 - BOX_HMARGIN - (uint)len_tm,
g_config->colors.e_date, fmtd_time, g_config->colors.fg); g_config->colors.e_date, fmtd_time, g_config->colors.fg);
free(fmtd_time); free(fmtd_time);
} }
@@ -395,7 +439,7 @@ void print_session(struct session session, bool multiple) {
char* toprint = session.name; char* toprint = session.name;
if (multiple) { if (multiple) {
u_char maxlen = VALUE_MAXLEN - utf8len(g_config->strings.opts_pre) - uint8_t maxlen = VALUE_MAXLEN - utf8len(g_config->strings.opts_pre) -
utf8len(g_config->strings.opts_post); utf8len(g_config->strings.opts_post);
toprint += get_render_pos_offset(&of_session, maxlen); toprint += get_render_pos_offset(&of_session, maxlen);
size_t printlen = utf8seekn(toprint, maxlen) - toprint; size_t printlen = utf8seekn(toprint, maxlen) - toprint;
@@ -423,13 +467,14 @@ void print_user(struct user user, bool multiple) {
char* toprint = user.display_name; char* toprint = user.display_name;
if (multiple) { if (multiple) {
u_char maxlen = VALUE_MAXLEN - utf8len(g_config->strings.opts_pre) - uint8_t maxlen = VALUE_MAXLEN - utf8len(g_config->strings.opts_pre) -
utf8len(g_config->strings.opts_post); utf8len(g_config->strings.opts_post);
toprint += get_render_pos_offset(&of_session, maxlen); toprint += get_render_pos_offset(&of_session, maxlen);
size_t printlen = utf8seekn(toprint, maxlen) - toprint; size_t printlen = utf8seekn(toprint, maxlen) - toprint;
printf("\r\x1b[%dC< \x1b[%sm%.*s\x1b[%sm >", box_start.x + VALUES_COL - 1, printf("\r\x1b[%dC%s\x1b[%sm%.*s\x1b[%sm%s", box_start.x + VALUES_COL - 1,
user_color, (int)printlen, toprint, g_config->colors.fg); g_config->strings.opts_pre, user_color, (int)printlen, toprint,
g_config->colors.fg, g_config->strings.opts_post);
} else { } else {
toprint += get_render_pos_offset(&of_user, VALUE_MAXLEN); toprint += get_render_pos_offset(&of_user, VALUE_MAXLEN);
size_t printlen = utf8seekn(toprint, VALUE_MAXLEN) - toprint; size_t printlen = utf8seekn(toprint, VALUE_MAXLEN) - toprint;
@@ -494,6 +539,8 @@ static void print_box() {
} }
static void print_footer() { static void print_footer() {
bool fido_enabled = g_config->functions.fido != NONE;
size_t bsize = utf8len(g_config->strings.f_poweroff) + size_t bsize = utf8len(g_config->strings.f_poweroff) +
utf8len(KEY_NAMES[g_config->functions.poweroff]) + utf8len(KEY_NAMES[g_config->functions.poweroff]) +
utf8len(g_config->strings.f_reboot) + utf8len(g_config->strings.f_reboot) +
@@ -501,19 +548,31 @@ static void print_footer() {
utf8len(g_config->strings.f_refresh) + utf8len(g_config->strings.f_refresh) +
utf8len(KEY_NAMES[g_config->functions.refresh]); utf8len(KEY_NAMES[g_config->functions.refresh]);
bsize += 2 * 2 + // 2 wide separators between 3 items bsize += (2 * 2) + (3 * 1);
3 * 1; // 3 thin separators inside every item
if (fido_enabled) {
bsize += utf8len(g_config->strings.f_fido) +
utf8len(KEY_NAMES[g_config->functions.fido]) + 2 + 1;
}
uint row = window.ws_row - 1; uint row = window.ws_row - 1;
uint col = window.ws_col - 2 - bsize; uint col = window.ws_col - 2 - bsize;
printf(
"\x1b[%3$d;%4$dH%8$s \x1b[%1$sm%5$s\x1b[%2$sm %9$s " printf("\x1b[%d;%dH%s \x1b[%sm%s\x1b[%sm %s \x1b[%sm%s\x1b[%sm ", row, col,
"\x1b[%1$sm%6$s\x1b[%2$sm %10$s \x1b[%1$sm%7$s\x1b[%2$sm", g_config->strings.f_poweroff, g_config->colors.e_key,
g_config->colors.e_key, g_config->colors.fg, row, col, KEY_NAMES[g_config->functions.poweroff], g_config->colors.fg,
KEY_NAMES[g_config->functions.poweroff], g_config->strings.f_reboot, g_config->colors.e_key,
KEY_NAMES[g_config->functions.reboot], KEY_NAMES[g_config->functions.reboot], g_config->colors.fg);
KEY_NAMES[g_config->functions.refresh], g_config->strings.f_poweroff,
g_config->strings.f_reboot, g_config->strings.f_refresh); if (fido_enabled) {
printf("%s \x1b[%sm%s\x1b[%sm ", g_config->strings.f_fido,
g_config->colors.e_key, KEY_NAMES[g_config->functions.fido],
g_config->colors.fg);
}
printf("%s \x1b[%sm%s\x1b[%sm", g_config->strings.f_refresh,
g_config->colors.e_key, KEY_NAMES[g_config->functions.refresh],
g_config->colors.fg);
} }
void print_err(const char* msg) { void print_err(const char* msg) {
@@ -521,6 +580,21 @@ void print_err(const char* msg) {
msg, errno, strerror(errno)); msg, errno, strerror(errno));
} }
void print_pam_msg(const char* msg, int msg_style) {
uint row = box_start.y + BOX_HEIGHT + 1;
const char* color =
(msg_style == PAM_ERROR_MSG) ? g_config->colors.err : g_config->colors.fg;
printf("\x1b[%d;%dH\x1b[K\x1b[%sm%.*s\x1b[%sm", row, box_start.x, color,
BOX_WIDTH, msg, g_config->colors.fg);
(void)fflush(stdout);
}
void clear_pam_msg(void) {
uint row = box_start.y + BOX_HEIGHT + 1;
printf("\x1b[%d;%dH\x1b[K", row, box_start.x);
(void)fflush(stdout);
}
void print_errno(const char* descr) { void print_errno(const char* descr) {
if (descr == NULL) if (descr == NULL)
(void)fprintf(stderr, "\x1b[%d;%dH\x1b[%smunknown error(%d): %s", (void)fprintf(stderr, "\x1b[%d;%dH\x1b[%smunknown error(%d): %s",

View File

@@ -4,7 +4,7 @@
#include "ui.h" #include "ui.h"
#include "users.h" #include "users.h"
enum input focused_input = PASSWD; enum Input focused_input = PASSWD;
struct Vector* gusers; struct Vector* gusers;
struct Vector* gsessions; struct Vector* gsessions;
@@ -13,7 +13,7 @@ struct opts_field of_session;
struct opts_field of_user; struct opts_field of_user;
struct opts_field of_passwd; struct opts_field of_passwd;
struct opts_field* NNULLABLE get_opts_field(enum input from) { struct opts_field* NNULLABLE get_opts_field(enum Input from) {
if (from == SESSION) return &of_session; if (from == SESSION) return &of_session;
if (from == USER) return &of_user; if (from == USER) return &of_user;
if (from == PASSWD) return &of_passwd; if (from == PASSWD) return &of_passwd;
@@ -40,7 +40,8 @@ struct session st_session(bool include_defshell) {
if (include_defshell && of_session.current_opt == gsessions->length + 1) { if (include_defshell && of_session.current_opt == gsessions->length + 1) {
struct session shell_session; struct session shell_session;
shell_session.type = SHELL; shell_session.type = SHELL;
shell_session.exec = shell_session.name = st_user().shell; shell_session.exec =
session_exec_shell(shell_session.name = st_user().shell);
return shell_session; return shell_session;
} }
@@ -49,7 +50,8 @@ struct session st_session(bool include_defshell) {
struct session custom_session; struct session custom_session;
custom_session.type = SHELL; custom_session.type = SHELL;
custom_session.name = custom_session.exec = of_session.efield.content; custom_session.exec =
session_exec_shell(custom_session.name = of_session.efield.content);
return custom_session; return custom_session;
} }
@@ -86,7 +88,7 @@ void st_kbd_type(char* text, bool cfg_include_defshell) {
start = st_user().username; start = st_user().username;
if (focused_input == SESSION && of_session.current_opt != 0 && if (focused_input == SESSION && of_session.current_opt != 0 &&
st_session(cfg_include_defshell).type == SHELL) st_session(cfg_include_defshell).type == SHELL)
start = st_session(cfg_include_defshell).exec; start = st_session(cfg_include_defshell).exec.shell;
ofield_kbd_type(field, text, start); ofield_kbd_type(field, text, start);
ui_update_ffield(); ui_update_ffield();

View File

@@ -7,7 +7,7 @@
#include "log.h" #include "log.h"
#include "macros.h" #include "macros.h"
#include "users.h" #include "users.h"
#include "util.h" #include "util/vec.h"
// NOLINTNEXTLINE(readability-identifier-length) // NOLINTNEXTLINE(readability-identifier-length)
int build_user(struct user* NNULLABLE user, struct passwd* p) { int build_user(struct user* NNULLABLE user, struct passwd* p) {

View File

@@ -1,218 +0,0 @@
#include <asm-generic/errno-base.h>
#include <errno.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/types.h>
#include <unistd.h>
#include "keys.h"
#include "ui.h"
#include "util.h"
static int selret_magic();
int find_keyname(enum keys* at, const char* name) {
for (size_t i = 0; i < LEN(KEY_MAPPINGS); i++) {
if (strcmp(KEY_NAMES[i], name) == 0) {
*at = (enum keys)i;
return 0;
}
}
return -1;
}
enum keys find_ansi(const char* seq) {
for (size_t i = 0; i < LEN(KEY_MAPPINGS); i++) {
struct key_mapping mapping = KEY_MAPPINGS[i];
for (size_t j = 0; mapping.sequences[j] != NULL; j++) {
if (strcmp(mapping.sequences[j], seq) == 0) {
return (enum keys)i;
}
}
}
return -1;
}
void read_press(u_char* length, char* out) {
*length = 0;
while (true) {
if (read(STDIN_FILENO, &out[(*length)++], 1) != 1) {
print_errno("read error");
sleep(3);
exit(1);
}
int selret = selret_magic();
if (selret == -1) {
print_errno("selret error");
} else if (selret != 1) {
out[*length] = '\0';
return;
}
}
}
bool read_press_nb(u_char* length, char* out, struct timeval* tv) {
fd_set fds;
FD_ZERO(&fds);
FD_SET(STDIN_FILENO, &fds);
errno = 0;
int ret = select(STDIN_FILENO + 1, &fds, NULL, NULL, tv);
if (errno || ret <= 0) return false;
read_press(length, out);
return true;
}
// https://stackoverflow.com/a/48040042
static int selret_magic() {
fd_set set;
struct timeval timeout;
FD_ZERO(&set);
FD_SET(STDIN_FILENO, &set);
timeout.tv_sec = 0;
timeout.tv_usec = 0;
return select(1, &set, NULL, NULL, &timeout);
}
// UTF-8 shii
#define UTF8_CONT_MSK 0b11000000
#define UTF8_CONT_VAL 0b10000000
bool utf8_iscont(char byte) {
return (byte & UTF8_CONT_MSK) == UTF8_CONT_VAL;
}
size_t utf8len(const char* str) {
size_t len = 0;
while (*str != '\0') {
if (!utf8_iscont(*(str++))) len++;
}
return len;
}
size_t utf8len_until(const char* str, const char* until) {
size_t len = 0;
while (str < until) {
if (!utf8_iscont(*(str++))) len++;
}
return len;
}
size_t utf8trunc(char* str, size_t n) {
size_t bytes = 0;
while (true) {
if (str[bytes] == '\0') break;
if (utf8_iscont(str[bytes])) {
bytes++;
continue;
}
if (n == 0) {
str[bytes] = '\0';
break;
}
bytes++;
n--;
}
return bytes;
}
const char* utf8back(const char* str) {
while (utf8_iscont(*(--str))) {
}
return str;
}
const char* utf8seek(const char* str) {
while (utf8_iscont(*(++str))) {
}
return str;
}
const char* utf8seekn(const char* str, size_t n) {
while (n > 0 && *str != '\0') {
str = utf8seek(str);
n--;
}
return str;
}
// Vector shii
const struct Vector VEC_NEW = {
.length = 0,
.capacity = 0,
.pages = NULL,
};
int vec_resize(struct Vector* self, size_t size) {
void** new_location =
(void**)realloc((void*)self->pages, size * sizeof(void*));
if (new_location != NULL) {
if (self->length > size) self->length = size;
self->capacity = size;
self->pages = new_location;
} else {
return -1;
}
return 0;
}
int vec_reserve(struct Vector* self, size_t size) {
uint32_t new_capacity = self->capacity;
while (self->length + size > new_capacity) {
new_capacity = new_capacity + (new_capacity >> 1) +
1; // cap * 1.5 + 1; 0 1 2 4 7 11...
}
return vec_resize(self, new_capacity);
}
int vec_reserve_exact(struct Vector* self, size_t size) {
uint32_t needed_capacity = self->length + size;
if (self->capacity < needed_capacity) {
return vec_resize(self, needed_capacity);
}
return 0;
}
int vec_push(struct Vector* self, void* item) {
int res_ret = vec_reserve(self, 1);
if (res_ret != 0) return res_ret;
self->pages[self->length++] = item;
return 0;
}
void vec_free(struct Vector* self) {
while (self->length > 0)
free(self->pages[--self->length]);
vec_clear(self);
}
void vec_clear(struct Vector* self) {
free((void*)self->pages);
vec_reset(self);
}
void vec_reset(struct Vector* self) {
*self = (struct Vector){
.length = 0,
.capacity = 0,
.pages = NULL,
};
}
void* vec_pop(struct Vector* self) {
if (self->length == 0) return NULL;
return self->pages[--self->length];
}
void* vec_get(struct Vector* self, size_t index) {
if (index >= self->length) return NULL;
return self->pages[index];
}

64
src/util/path.c Normal file
View File

@@ -0,0 +1,64 @@
#include <errno.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <unistd.h>
#include "util/path.h"
// returns NULL on any error
// otherwise it returns the absolute path of the program that MUST BE FREED
//
// Should be almost completely posix compliant, except it won't resolve empty
// PATH entries relative to the cwd
char* NULLABLE search_path(const char* NNULLABLE for_binary) {
if (strchr(for_binary, '/') != NULL) {
// skip absolute paths
return strdup(for_binary);
}
char* path_env = getenv("PATH");
if (!path_env) return NULL;
char* path = strdup(path_env);
if (!path) return NULL;
char* tok = strtok(path, ":");
while (tok) {
char* bin_path;
asprintf(&bin_path, "%s/%s", tok, for_binary);
if (!bin_path) {
free(path);
return NULL;
}
struct stat stat_buf;
if (stat(bin_path, &stat_buf) == 0 && access(bin_path, X_OK) == 0) {
free(path);
return bin_path;
}
free(bin_path);
tok = strtok(NULL, ":");
}
free(path);
return NULL;
}
// This is present in glibc ONLY with GNU extensions, this aims to provide a
// musl compatible variant.
//
// Respects errno of exec functions family.
int execvpe(const char* NNULLABLE file, char* NULLABLE const argv[NNULLABLE],
char* NULLABLE const envp[NNULLABLE]) {
char* path = search_path(file);
if (!path) {
errno = ENOENT;
return -1;
}
int ret = execve(path, argv, envp);
free(path);
return ret;
}

62
src/util/utf8.c Normal file
View File

@@ -0,0 +1,62 @@
#include "util/utf8.h"
#define UTF8_CONT_MSK 0b11000000
#define UTF8_CONT_VAL 0b10000000
bool utf8_iscont(char byte) {
return (byte & UTF8_CONT_MSK) == UTF8_CONT_VAL;
}
size_t utf8len(const char* str) {
size_t len = 0;
while (*str != '\0') {
if (!utf8_iscont(*(str++))) len++;
}
return len;
}
size_t utf8len_until(const char* str, const char* until) {
size_t len = 0;
while (str < until) {
if (!utf8_iscont(*(str++))) len++;
}
return len;
}
size_t utf8trunc(char* str, size_t n) {
size_t bytes = 0;
while (true) {
if (str[bytes] == '\0') break;
if (utf8_iscont(str[bytes])) {
bytes++;
continue;
}
if (n == 0) {
str[bytes] = '\0';
break;
}
bytes++;
n--;
}
return bytes;
}
const char* utf8back(const char* str) {
while (utf8_iscont(*(--str))) {
}
return str;
}
const char* utf8seek(const char* str) {
while (utf8_iscont(*(++str))) {
}
return str;
}
const char* utf8seekn(const char* str, size_t n) {
while (n > 0 && *str != '\0') {
str = utf8seek(str);
n--;
}
return str;
}

96
src/util/vec.c Normal file
View File

@@ -0,0 +1,96 @@
#include <stdlib.h>
#include "util/vec.h"
const struct Vector VEC_NEW = {
.length = 0,
.capacity = 0,
.pages = NULL,
};
struct Vector vec_from_raw(void** raw) {
size_t len = 0;
while (raw[len])
len++;
return (struct Vector){
.length = len,
.capacity = len,
.pages = raw,
};
}
void** vec_as_raw(struct Vector self) {
if (vec_push(&self, NULL) != 0) return NULL;
return self.pages;
}
int vec_resize(struct Vector* self, size_t size) {
void** new_location =
(void**)realloc((void*)self->pages, size * sizeof(void*));
if (new_location != NULL) {
if (self->length > size) self->length = size;
self->capacity = size;
self->pages = new_location;
} else {
return -1;
}
return 0;
}
int vec_reserve(struct Vector* self, size_t size) {
uint32_t new_capacity = self->capacity;
while (self->length + size > new_capacity) {
new_capacity = new_capacity + (new_capacity >> 1) +
1; // cap * 1.5 + 1; 0 1 2 4 7 11...
}
return vec_resize(self, new_capacity);
}
int vec_reserve_exact(struct Vector* self, size_t size) {
uint32_t needed_capacity = self->length + size;
if (self->capacity < needed_capacity) {
return vec_resize(self, needed_capacity);
}
return 0;
}
int vec_push(struct Vector* self, void* item) {
int res_ret = vec_reserve(self, 1);
if (res_ret != 0) return res_ret;
self->pages[self->length++] = item;
return 0;
}
void vec_free(struct Vector* self) {
while (self->length > 0)
free(self->pages[--self->length]);
vec_clear(self);
}
void vec_clear(struct Vector* self) {
free((void*)self->pages);
vec_reset(self);
}
void vec_reset(struct Vector* self) {
*self = (struct Vector){
.length = 0,
.capacity = 0,
.pages = NULL,
};
}
void* vec_pop(struct Vector* self) {
if (self->length == 0) return NULL;
return self->pages[--self->length];
}
void* vec_get(struct Vector* self, size_t index) {
if (index >= self->length) return NULL;
return self->pages[index];
}

View File

@@ -1,5 +1,21 @@
# Themes # Themes
## catppuccin-frappe.ini
![catppuccin-frappe.ini theme](./screenshots/catppuccin-frappe.png)
## catppuccin-latte.ini
![catppuccin-latte.ini theme](./screenshots/catppuccin-latte.png)
## catppuccin-macchiato.ini
![catppuccin-macchiato.ini theme](./screenshots/catppuccin-macchiato.png)
## catppuccin-mocha.ini
![catppuccin-mocha.ini theme](./screenshots/catppuccin-mocha.png)
## cherry.ini ## cherry.ini
![cherry.ini theme](./screenshots/cherry.png) ![cherry.ini theme](./screenshots/cherry.png)

View File

@@ -0,0 +1,24 @@
##############################################
# #
# Catppuccin Theme #
# #
##############################################
# Catppuccin Frappé
# This theme was created by: Catppuccin Org! <3
[colors]
bg = "23;24;25;48;2;48;52;70"
fg = "22;23;24;25;29;38;2;198;208;245"
err = "1;4;23;24;25;38;2;231;130;132"
s_wayland = "3;22;24;25;38;2;202;158;230"
s_xorg = "3;22;24;25;38;2;202;158;230"
s_shell = "3;22;24;25;38;2;244;184;228"
e_hostname = "1;3;24;25;29;38;2;242;213;207"
e_date = "3;22;24;25;29;38;2;165;173;206"
e_box = "1;23;24;25;29;38;2;115;121;148"
e_header = "1;3;24;25;29;38;2;239;159;118"
e_user = "3;22;24;25;29;38;2;140;170;238"
e_passwd = "1;23;24;25;29;38;2;166;209;137"
e_badpasswd = "1;9;23;24;25;38;2;231;130;132"
e_key = "22;23;24;25;38;2;129;200;190"

View File

@@ -0,0 +1,24 @@
##############################################
# #
# Catppuccin Theme #
# #
##############################################
# Catppuccin Latte
# This theme was created by: Catppuccin Org! <3
[colors]
bg = "23;24;25;48;2;239;241;245"
fg = "22;23;24;25;29;38;2;76;79;105"
err = "1;4;23;24;25;38;2;210;15;57"
s_wayland = "3;22;24;25;38;2;136;57;239"
s_xorg = "3;22;24;25;38;2;136;57;239"
s_shell = "3;22;24;25;38;2;234;118;203"
e_hostname = "1;3;24;25;29;38;2;220;138;120"
e_date = "3;22;24;25;29;38;2;108;111;133"
e_box = "1;23;24;25;29;38;2;156;160;176"
e_header = "1;3;24;25;29;38;2;254;100;11"
e_user = "3;22;24;25;29;38;2;30;102;245"
e_passwd = "1;23;24;25;29;38;2;64;160;43"
e_badpasswd = "1;9;23;24;25;38;2;210;15;57"
e_key = "22;23;24;25;38;2;23;146;153"

View File

@@ -0,0 +1,24 @@
##############################################
# #
# Catppuccin Theme #
# #
##############################################
# Catppuccin Macchiato
# This theme was created by: Catppuccin Org! <3
[colors]
bg = "23;24;25;48;2;36;39;58"
fg = "22;23;24;25;29;38;2;202;211;245"
err = "1;4;23;24;25;38;2;237;135;150"
s_wayland = "3;22;24;25;38;2;198;160;246"
s_xorg = "3;22;24;25;38;2;198;160;246"
s_shell = "3;22;24;25;38;2;245;189;230"
e_hostname = "1;3;24;25;29;38;2;244;219;214"
e_date = "3;22;24;25;29;38;2;165;173;203"
e_box = "1;23;24;25;29;38;2;110;115;141"
e_header = "1;3;24;25;29;38;2;245;169;127"
e_user = "3;22;24;25;29;38;2;138;173;244"
e_passwd = "1;23;24;25;29;38;2;166;218;149"
e_badpasswd = "1;9;23;24;25;38;2;237;135;150"
e_key = "22;23;24;25;38;2;139;213;202"

View File

@@ -0,0 +1,24 @@
##############################################
# #
# Catppuccin Theme #
# #
##############################################
# Catppuccin Mocha
# This theme was created by: Catppuccin Org! <3
[colors]
bg = "23;24;25;48;2;30;30;46"
fg = "22;23;24;25;29;38;2;205;214;244"
err = "1;4;23;24;25;38;2;243;139;168"
s_wayland = "3;22;24;25;38;2;203;166;247"
s_xorg = "3;22;24;25;38;2;203;166;247"
s_shell = "3;22;24;25;38;2;245;194;231"
e_hostname = "1;3;24;25;29;38;2;245;224;220"
e_date = "3;22;24;25;29;38;2;166;173;200"
e_box = "1;23;24;25;29;38;2;108;112;134"
e_header = "1;3;24;25;29;38;2;250;179;135"
e_user = "3;22;24;25;29;38;2;137;180;250"
e_passwd = "1;23;24;25;29;38;2;166;227;161"
e_badpasswd = "1;9;23;24;25;38;2;243;139;168"
e_key = "22;23;24;25;38;2;148;226;213"

35
themes/catppuccin.tera Normal file
View File

@@ -0,0 +1,35 @@
---
whiskers:
version: ^2.5.1
matrix:
- flavor
filename: catppuccin-{{ flavor.identifier }}.ini
---
{%- macro rgb(col) -%}
2;{{ col.rgb.r }};{{ col.rgb.g }};{{ col.rgb.b }}
{%- endmacro rgb -%}
##############################################
# #
# Catppuccin Theme #
# #
##############################################
# Catppuccin {{flavor.name}}
# This theme was created by: Catppuccin Org! <3
[colors]
bg = "23;24;25;48;{{ self::rgb(col=base) }}"
fg = "22;23;24;25;29;38;{{ self::rgb(col=text) }}"
err = "1;4;23;24;25;38;{{ self::rgb(col=red) }}"
s_wayland = "3;22;24;25;38;{{ self::rgb(col=mauve) }}"
s_xorg = "3;22;24;25;38;{{ self::rgb(col=mauve) }}"
s_shell = "3;22;24;25;38;{{ self::rgb(col=pink) }}"
e_hostname = "1;3;24;25;29;38;{{ self::rgb(col=rosewater) }}"
e_date = "3;22;24;25;29;38;{{ self::rgb(col=subtext0) }}"
e_box = "1;23;24;25;29;38;{{ self::rgb(col=overlay0) }}"
e_header = "1;3;24;25;29;38;{{ self::rgb(col=peach) }}"
e_user = "3;22;24;25;29;38;{{ self::rgb(col=blue) }}"
e_passwd = "1;23;24;25;29;38;{{ self::rgb(col=green) }}"
e_badpasswd = "1;9;23;24;25;38;{{ self::rgb(col=red) }}"
e_key = "22;23;24;25;38;{{ self::rgb(col=teal) }}"

View File

@@ -25,11 +25,13 @@
[functions] [functions]
# poweroff = F1 # poweroff = F1
# reboot = F2 # reboot = F2
# fido = NONE
# refresh = F5 # refresh = F5
[strings] [strings]
# f_poweroff = "poweroff" # f_poweroff = "poweroff"
# f_reboot = "reboot" # f_reboot = "reboot"
# f_fido = "fido"
# f_refresh = "refresh" # f_refresh = "refresh"
# e_user = "user" # e_user = "user"
# e_passwd = "password" # e_passwd = "password"

View File

@@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:0704a1aadffee71bc0753c861d8ac8b8588aae76ad8cdcb4f2c2700b98ec095c
size 23814

View File

@@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:58d56d6e16e14f0eddaa8a11e8bf238f2056e784b9c7c46d88aa8ff2d948355e
size 23110

View File

@@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:225dba8cf87de1ae7118bfd98a1966fdb92cc826418dd9ef7dda5ee77ae8d0f3
size 23886

View File

@@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:0c8269cc55fdc26bfff240b3dccd94ffab6400b33c049af23912b74a62247943
size 23826

Binary file not shown.

Before

Width:  |  Height:  |  Size: 17 KiB

After

Width:  |  Height:  |  Size: 130 B

Binary file not shown.

Before

Width:  |  Height:  |  Size: 17 KiB

After

Width:  |  Height:  |  Size: 130 B

Binary file not shown.

Before

Width:  |  Height:  |  Size: 17 KiB

After

Width:  |  Height:  |  Size: 130 B

Binary file not shown.

Before

Width:  |  Height:  |  Size: 17 KiB

After

Width:  |  Height:  |  Size: 130 B

Binary file not shown.

Before

Width:  |  Height:  |  Size: 14 KiB

After

Width:  |  Height:  |  Size: 130 B

Binary file not shown.

Before

Width:  |  Height:  |  Size: 15 KiB

After

Width:  |  Height:  |  Size: 130 B

Binary file not shown.

Before

Width:  |  Height:  |  Size: 15 KiB

After

Width:  |  Height:  |  Size: 130 B

Binary file not shown.

Before

Width:  |  Height:  |  Size: 9.9 KiB

After

Width:  |  Height:  |  Size: 130 B

Binary file not shown.

Before

Width:  |  Height:  |  Size: 14 KiB

After

Width:  |  Height:  |  Size: 130 B

Binary file not shown.

Before

Width:  |  Height:  |  Size: 13 KiB

After

Width:  |  Height:  |  Size: 130 B

View File

@@ -1,4 +1,5 @@
#!/usr/bin/env bash #!/usr/bin/env bash
set -e set -e
MYSELF=$(realpath "$0") MYSELF=$(realpath "$0")
@@ -16,7 +17,7 @@ if [[ -z "$IM_FLOATING" ]]; then
# 12 pts ≈ 16 px # 12 pts ≈ 16 px
exec hyprctl dispatch exec \ exec hyprctl dispatch exec \
"[float; size $((COLS*16)) $((ROWS*16))]" \ "[float; size $((COLS*16)) $((ROWS*16))]" \
"kitty --override font_size=12.0 --override background_opacity=1 --override cursor_trail=0 --override cursor_shape=beam --override cursor_blink_interval=0 bash -c 'cd \"$PWD\" && IM_FLOATING=1 LIDM_PATH=\"$LIDM_PATH\" LIDM_SCR_TTY=\"$(tty)\" LIDM_SESSIONS_N=\"$LIDM_SESSIONS_N\" \"$MYSELF\"'" "kitty --override font_size=12.0 --override background_opacity=1 --override cursor_trail=0 --override cursor_shape=beam --override cursor_blink_interval=0 bash -c 'cd \"$PWD\" && IM_FLOATING=1 LIDM_PATH=\"$LIDM_PATH\" LIDM_SCR_TTY=\"$(tty)\" LIDM_SESSIONS_N=\"$LIDM_SESSIONS_N\" bash -i \"$MYSELF\"'"
fi fi
LIDM_PATH=${LIDM_PATH:-$(command which lidm)} LIDM_PATH=${LIDM_PATH:-$(command which lidm)}
@@ -44,11 +45,11 @@ printf '\033]4;0;rgb:%s\007' "${BG:0:2}/${BG:2:2}/${BG:4:2}"
PRAD=$(hyprctl getoption decoration:rounding | rg int | cut -d' ' -f2) PRAD=$(hyprctl getoption decoration:rounding | rg int | cut -d' ' -f2)
hyprctl keyword decoration:rounding 0 hyprctl keyword decoration:rounding 0
tty=$(tty)
for theme in "$MYDIR"/*.ini; do for theme in "$MYDIR"/*.ini; do
LIDM_CONF="$theme" "$LIDM_PATH" <"$tty" & LIDM_CONF="$theme" "$LIDM_PATH" &
LIDM_PID=$! LIDM_PID=$!
(
sleep .2 sleep .2
for n in $(seq "$LIDM_SESSIONS_N"); do for n in $(seq "$LIDM_SESSIONS_N"); do
GEOMETRY=$( GEOMETRY=$(
@@ -61,6 +62,9 @@ for theme in "$MYDIR"/*.ini; do
sleep .5 sleep .5
done done
kill -15 $LIDM_PID kill -15 $LIDM_PID
) &
fg %-
sleep .5 sleep .5
done done
@@ -68,9 +72,9 @@ gifski \
-Q 95 --fps 4 \ -Q 95 --fps 4 \
-W $((COLS*32)) \ -W $((COLS*32)) \
-o "$MYDIR/../assets/media/lidm.gif" \ -o "$MYDIR/../assets/media/lidm.gif" \
"$MYDIR"/screenshots/*.png &> "$LIDM_SCR_TTY" "$MYDIR"/screenshots/*-?.png &> "$LIDM_SCR_TTY"
for screenshot in "$MYDIR"/screenshots/*"-1.png"; do for screenshot in "$MYDIR"/screenshots/*"-2.png"; do
# shellcheck disable=SC2001 # shellcheck disable=SC2001
mv "$screenshot" "$(sed 's/-[0-9]\.png/.png/' <<<"$screenshot")" mv "$screenshot" "$(sed 's/-[0-9]\.png/.png/' <<<"$screenshot")"