return $len;
};
+# Takes an escape character with an optional '^' prefix and returns an escape
+# character code.
+my $escapekey_to_char = sub {
+ my ($def) = @_;
+ if ($def =~ /^\^?([a-zA-Z])$/) {
+ return 1 + ord(lc($1)) - ord('a');
+ }
+ die "bad escape key definition: $def\n";
+};
+
__PACKAGE__->register_method ({
name => 'enter',
path => 'enter',
additionalProperties => 0,
properties => {
remote => get_standard_option('pveclient-remote-name'),
- vmid => {
- description => "The container ID",
- type => 'string',
- },
+ vmid => get_standard_option('pve-vmid')
},
},
returns => { type => 'null'},
my $config = PVE::APIClient::Config->load();
my $conn = PVE::APIClient::Config->remote_conn($config, $param->{remote});
+ # FIXME: This should come from $config
+ my $escape_char = $escapekey_to_char->('a');
+
# Get the real node from the resources endpoint
my $resource_list = $conn->get("api2/json/cluster/resources", { type => 'vm'});
my ($resource) = grep { $_->{type} eq "lxc" && $_->{vmid} eq $param->{vmid}} @$resource_list;
# And set it to non-blocking so we can every char with IO::Select.
STDIN->blocking(0);
+ STDOUT->blocking(0);
$web_socket->blocking(0);
$read_select->add($web_socket);
my $input_fh = \*STDIN;
my $output_fh = \*STDOUT;
- my $ctrl_a_pressed_before = 0;
+ my $in_escape_sequence;
my $winch_received = 0;
$SIG{WINCH} = sub { $winch_received = 1; };
my $len = length($$buffer_ref);
my $nr = syswrite($fh, $$buffer_ref);
if (!defined($nr)) {
- next if $! == EINTR || $! == EAGAIN;
+ return if $! == EINTR || $! == EAGAIN;
die "drain buffer - write error - $!\n";
}
return $nr if !$nr;
my $char = ord($buff);
- # check for CTRL-a-q
- return if $ctrl_a_pressed_before == 1 && $char == hex("0x71");
-
- $ctrl_a_pressed_before = ($char == hex("0x01") && $ctrl_a_pressed_before == 0) ? 1 : 0;
+ # Handle escape sequences:
+ if ($in_escape_sequence) {
+ $in_escape_sequence = 0;
+ if ($char == 0x71) {
+ # (escape, 'q')
+ return;
+ } elsif ($char == $escape_char) {
+ # (escape, escape)
+ # Pass this one through as a single escapekey
+ } else {
+ # Unknown escape sequence
+ # We could generate a bell or something...
+ # but for now just skip it
+ next;
+ }
+ } elsif ($char == $escape_char) {
+ $in_escape_sequence = 1;
+ next;
+ }
+ # Pass the key through:
$websock_buffer .= $create_websockt_frame->("0:" . $nr . ":" . $buff);
$write_select->add($web_socket);
}
return undef;
}});
-__PACKAGE__->register_method ({
- name => 'list',
- path => 'list',
- method => 'GET',
- description => "List containers.",
- parameters => {
- additionalProperties => 0,
- properties => {
- remote => get_standard_option('pveclient-remote-name'),
- },
- },
- returns => { type => 'null'},
- code => sub {
- my ($param) = @_;
-
- die "implement me";
-
- }});
-
-
our $cmddef = {
enter => [ __PACKAGE__, 'enter', ['remote', 'vmid']],
- list => [ __PACKAGE__, 'list', ['remote']],
};
1;