aboutsummaryrefslogblamecommitdiffstats
path: root/lib/ssh/doc/src/ssh_channel.xml
blob: c2b7aa94a5a9d2f739d33801ad6fdba3d746332b (plain) (tree)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520







































































































































































































































































































































































































































































































































                                                                                         
<?xml version="1.0" encoding="latin1" ?>
<!DOCTYPE erlref SYSTEM "erlref.dtd">

<erlref>
  <header>
    <copyright>
      <year>2009</year>
      <year>2009</year>
      <holder>Ericsson AB, All Rights Reserved</holder>
    </copyright>
    <legalnotice>
      The contents of this file are subject to the Erlang Public License,
      Version 1.1, (the "License"); you may not use this file except in
      compliance with the License. You should have received a copy of the
      Erlang Public License along with this software. If not, it can be
      retrieved online at http://www.erlang.org/.

      Software distributed under the License is distributed on an "AS IS"
      basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See
      the License for the specific language governing rights and limitations
      under the License.

      The Initial Developer of the Original Code is Ericsson AB.
    </legalnotice>

    <title>ssh_channel</title>
    <prepared>Ingela Anderton Andin</prepared>
    <responsible></responsible>
    <docno></docno>
    <approved></approved>
    <checked></checked>
    <date></date>
    <rev></rev>
  </header>
  <module>ssh_channel</module>
  <modulesummary>Generic Ssh Channel Behavior
  </modulesummary>
  <description>
    <p>Ssh services are implemented as channels that are multiplexed
    over an ssh connection and communicates via the ssh connection
    protocol.  This module provides a callback API that takes care of
    generic channel aspects such as flow control and close messages
    and lets the callback functions take care of the service specific
    parts.
    </p>
  </description>

  <section>
    <title>COMMON DATA TYPES </title>

    <p>Type definitions that are used more than once in this module
    and/or abstractions to indicate the intended use of the data
    type:</p>
    
    <p><c>boolean() = true | false </c></p>
    <p><c>string() = list of ASCII characters</c></p>
    <p><c>timeout() =  infinity | integer() - in milliseconds.</c></p>
    <p><c>ssh_connection_ref() - opaque to the user returned by
    ssh:connect/3 or sent to a ssh channel process</c></p>
    <p><c>ssh_channel_id() = integer() </c></p>
    <p><c>ssh_data_type_code() = 1 ("stderr") | 0 ("normal") are
    currently valid values see RFC 4254 section 5.2.</c></p>
  </section>

  <funcs>
    <func>
      <name>call(ChannelRef, Msg) -></name>
      <name>call(ChannelRef, Msg, Timeout) -> Reply | {error, Reason}</name>
      <fsummary> Makes a synchronous call to a channel.</fsummary>
      <type>
	<v>ChannelRef = pid() </v>
	<d>As returned by start_link/4 </d>
	<v>Msg = term() </v>
	<v>Timeout = timeout() </v>
	<v>Reply = term() </v>
	<v>Reason = closed | timeout </v>
      </type>
      <desc>
	<p>Makes a synchronous call to the channel process by sending
	a message and waiting until a reply arrives or a timeout
	occurs. The channel will call
	<c>CallbackModule:handle_call/3</c> to handle the message.
	If the channel process does not exist <c>{error, closed}</c> is returned.
	</p>
      </desc>
    </func>
    
    <func>
      <name>cast(ChannelRef, Msg) -> ok </name>
      <fsummary>Sends an asynchronous message to the channel
	ChannelRef and returns ok.</fsummary>
      <type>
	<v>ChannelRef = pid() </v>
	<d>As returned by start_link/4 </d>
	<v>Msg = term() </v>
      </type>
      <desc>
	<p>Sends an asynchronous message to the channel process and
	returns ok immediately, ignoring if the destination node or
	channel process does not exist. The channel will call
	<c>CallbackModule:handle_cast/2</c> to handle the message.
	</p>
      </desc>
    </func>

       <func>
      <name>enter_loop(State) -> _ </name>
      <fsummary> Makes an existing process into a ssh_channel process. </fsummary>
      <type>
	<v> State = term() - as returned by  ssh_channel:init/1</v>
      </type>
      <desc>
	<p> Makes an existing process into a <c>ssh_channel</c>
	process. Does not return, instead the calling process will
	enter the <c>ssh_channel</c> process receive loop and become a
	<c>ssh_channel process.</c> The process must have been started using
	one of the start functions in proc_lib, see <seealso
	marker="stdlib:proc_lib">proc_lib(3)</seealso>. The
	user is responsible for any initialization of the process
	and needs to call ssh_channel:init/1.
	</p>
      </desc>
    </func>
    
    <func>
      <name>init(Options) -> {ok, State} |  {ok, State, Timeout} | {stop, Reason} </name>
      <fsummary> Initiates a ssh_channel process.</fsummary>
      <type>
	<v> Options = [{Option, Value}]</v>
      </type>
      <desc>
	<p>
	  The following options must be present:
	</p>
	  <taglist>
	  <tag><c><![CDATA[{channel_cb, atom()}]]></c></tag>
	  <item>The module that implements the channel behavior.</item>
	  
	  <tag><c><![CDATA[{init_args(), list()}]]></c></tag>
	  <item> The list of arguments to the callback modules
	  init function.</item>

	  <tag><c><![CDATA[{cm, connection_ref()}]]></c></tag>
	  <item> Reference to the ssh connection.</item>
	  
	  <tag><c><![CDATA[{channel_id, channel_id()}]]></c></tag>
	  <item> Id of the ssh channel.</item>
	  
	  </taglist>

	  <note><p>This function is normally not called by the user, it is
	  only needed if for some reason the channel process needs
	  to be started with help of <c>proc_lib</c> instead calling
	  <c>ssh_channel:start/4</c> or <c>ssh_channel:start_link/4</c> </p>
	  </note>
      </desc>
    </func>

    <func>
      <name>reply(Client, Reply) -> _</name>
      <fsummary>Send a reply to a client.</fsummary>
      <type>
        <v>Client - opaque to the user, see explanation below</v>
        <v>Reply = term()</v>
      </type>
      <desc>
        <p>This function can be used by a channel to explicitly send a
        reply to a client that called <c>call/[2,3]</c> when the reply
        cannot be defined in the return value of
        <c>CallbackModule:handle_call/3</c>.</p>
        <p><c>Client</c> must be the <c>From</c> argument provided to
          the callback function <c>handle_call/3</c>.
	  <c>Reply</c> is an arbitrary term,
          which will be given back to the client as the return value of
          <c>ssh_channel:call/[2,3].</c></p>
      </desc>
    </func>
    
    <func>
      <name>start(SshConnection, ChannelId, ChannelCb, CbInitArgs) -> </name>
      <name>start_link(SshConnection, ChannelId, ChannelCb, CbInitArgs) ->
      {ok, ChannelRef} | {error, Reason}</name>
      <fsummary> Starts a processes that handles a ssh channel. </fsummary>
      <type>
	<v>SshConnection = ssh_connection_ref()</v>
	<v>ChannelId = ssh_channel_id() </v>
	<d> As returned by ssh_connection:session_channel/[2,4]</d>
	<v>ChannelCb = atom()</v>
	<d> The name of the module implementing the service specific parts
	of the channel.</d>
	<v>CbInitArgs = [term()]</v>
	<d>Argument  list for the init function in the callback module. </d>
	<v>ChannelRef = pid()</v>
      </type>
      <desc>
	<p>Starts a processes that handles a ssh channel. Will be
	called internally by the ssh daemon or explicitly by the ssh
	client implementations. A channel process traps exit signals
	by default.
	</p>
      </desc>
    </func>
    
  </funcs>
  
  <section>
    <title>CALLBACK FUNCTIONS</title>
    
    <p>The functions init/1, terminate/2, handle_ssh_msg/2 and
    handle_msg/2 are the functions that are required to provide the
    implementation for a server side channel, such as a ssh subsystem
    channel that can be plugged into the erlang ssh daemon see
    <seealso marker="ssh">ssh:daemon/[2, 3]</seealso>. The
    handle_call/3, handle_cast/2 code_change/3 and enter_loop/1
    functions are only relevant when implementing a client side
    channel.</p>
  </section>
 
  <section>
    <marker id="cb_timeouts"></marker>
    <title> CALLBACK TIMEOUTS</title>
    <p> If an integer timeout value is provided in a return value of
    one of the callback functions, a timeout will occur unless a
    message is received within <c>Timeout</c> milliseconds. A timeout
    is represented by the atom <c>timeout</c> which should be handled
    by the <seealso marker="#handle_msg">handle_msg/2</seealso>
    callback function. The atom infinity can be used to wait
    indefinitely, this is the default value. </p>
  </section>

  <funcs>
    <func>
      <name>CallbackModule:code_change(OldVsn, State, Extra) -> {ok,
      NewState}</name>
      <fsummary> Converts process state when code is changed.</fsummary>
      <type>
	<v> Converts process state when code is changed.</v>
      </type>
      <desc>
	  <p>This function is called by a client side channel when it
	  should update its internal state during a release
	  upgrade/downgrade, i.e. when the instruction
	  <c>{update,Module,Change,...}</c> where
	  <c>Change={advanced,Extra}</c> is given in the <c>appup</c>
	  file. See <seealso
	  marker="doc/design_principles:release_handling#instr">OTP
	  Design Principles</seealso> for more information. Any new
	  connection will benefit from a server side upgrade but
	  already started connections on the server side will not be
	  affected.
	  </p>

	  <note><p>If there are long lived ssh connections and more
	  than one upgrade in a short time this may cause the old
	  connections to fail as only two versions of the code may
	  be loaded simultaneously.</p></note>
	  
        <p>In the case of an upgrade, <c>OldVsn</c> is <c>Vsn</c>, and
          in the case of a downgrade, <c>OldVsn</c> is
          <c>{down,Vsn}</c>. <c>Vsn</c> is defined by the <c>vsn</c>
          attribute(s) of the old version of the callback module
          <c>Module</c>. If no such attribute is defined, the version
          is the checksum of the BEAM file.</p>
        <p><c>State</c> is the internal state of the channel.</p>
        <p><c>Extra</c> is passed as-is from the <c>{advanced,Extra}</c>
          part of the update instruction.</p>
        <p>The function should return the updated internal state.</p>
      </desc>
    </func>
    
    <func>
      <name>CallbackModule:init(Args) -> {ok, State} | {ok, State, Timeout} |
      {stop, Reason}</name>
      <fsummary> Makes necessary initializations and returns the
      initial channel state if the initializations succeed.</fsummary>
      <type>
	<v> Args = term() </v>
	<d> Last argument to ssh_channel:start_link/4.</d>
	<v> State = term() </v>
	<v>Timeout = timeout() </v>
	<v> Reason = term() </v>
      </type>
      <desc>
	<p> Makes necessary initializations and returns the initial channel
	state if the initializations succeed.
	</p>
	<p>For more detailed information on timeouts see the section 
	<seealso marker="#cb_timeouts">CALLBACK TIMEOUTS</seealso>. </p>
      </desc>
    </func>
   
    <func>
      <name>CallbackModule:handle_call(Msg, From, State) -> Result</name>
      <fsummary> Handles messages sent by calling
      <c>ssh_channel:call/[2,3]</c></fsummary>
      <type>
	<v>Msg = term()</v>
	<v>From = opaque to the user should be used as argument to
	ssh_channel:reply/2</v>
	<v>State = term()</v>
	<v>Result = {reply, Reply, NewState} | {reply, Reply, NewState, Timeout}
	| {noreply, NewState} | {noreply , NewState, Timeout}
	| {stop, Reason, Reply, NewState} | {stop, Reason, NewState} </v>
	<v>Reply = term() - will be the return value of ssh_channel:call/[2,3]</v>
	<v>Timeout = timeout() </v>
	<v>NewState = term() - a possible updated version of State</v>
	<v>Reason = term()</v>
      </type>
      <desc>
	<p>Handles messages sent by calling
	<c>ssh_channel:call/[2,3]</c>	
	</p>
	<p>For more detailed information on timeouts see the section 
	<seealso marker="#cb_timeouts">CALLBACK TIMEOUTS</seealso>. </p>
      </desc>
    </func>

    <func>
      <name>CallbackModule:handle_cast(Msg, State) -> Result</name>
      <fsummary> Handles messages sent by calling
      <c>ssh_channel:cact/2</c></fsummary>
      <type>
	<v>Msg = term()</v>
	<v>State = term()</v>
	<v>Result = {noreply, NewState} | {noreply, NewState, Timeout}
	| {stop, Reason, NewState}</v>
	<v>NewState = term() - a possible updated version of State</v>
	<v>Timeout = timeout() </v>
	<v>Reason = term()</v>
      </type>
      <desc>
	<p> Handles messages sent by calling
	<c>ssh_channel:cast/2</c>
	</p>
	<p>For more detailed information on timeouts see the section 
	<seealso marker="#cb_timeouts">CALLBACK TIMEOUTS</seealso>. </p>
	<marker id="handle_msg"></marker>
      </desc>
    </func>
 
    <func>
      <name>CallbackModule:handle_msg(Msg, State) -> {ok, State} |
      {stop, ChannelId, State}</name>

      <fsummary> Handle other messages than ssh connection protocol,
      call or cast messages sent to the channel.</fsummary>
      <type>
	<v>Msg = timeout | term()</v>
	<v>State = term() </v>
      </type>
      <desc>
	<p>Handle other messages than ssh connection protocol, call or
	cast messages sent to the channel. 
	</p>

	<p> Possible erlang 'EXIT'-messages should be handled by this
	function and all channels should handle the following message.</p>
	
	<taglist>
	  <tag><c><![CDATA[{ssh_channel_up, ssh_channel_id(), 
	  ssh_connection_ref()}]]></c></tag>
	  <item>This is the first messages that will be received
	  by the channel, it is sent just before
	  the ssh_channel:init/1 function returns successfully.
	  This is especially useful if the server wants
	  to send a message to the client without first receiving
	  a message from the client. If the message is not useful
	  for your particular problem just ignore it by immediately
	  returning {ok, State}.
	  </item>
	</taglist>
      </desc>
    </func>

    <func>
      <name>CallbackModule:handle_ssh_msg(Msg, State) -> {ok, State} | {stop,
      ssh_channel_id(), State}</name>
      <fsummary> Handles ssh connection protocol messages. </fsummary>
      <type>
	<v>Msg = {ssh_cm, ssh_connection_ref(), SshMsg}</v>
	<v> SshMsg = tuple() - see message list below</v>
	<v>State = term()</v>
      </type>
      <desc>
	<p> Handles ssh connection protocol messages that may need
	service specific attention.
	</p>

	<p> All channels should handle the following messages.  For
	channels implementing subsystems the handle_ssh_msg-callback
	will not be called for any other messages. </p>
	
	<taglist>
	  <tag><c><![CDATA[{ssh_cm, ssh_connection_ref(), {data, ssh_channel_id(),
	  ssh_data_type_code(), binary() = Data}}]]></c></tag>
	  <item> Data has arrived on the channel.  When the callback
	  for this message returns the channel behavior will adjust
	  the ssh flow control window.</item>
	  
	  <tag><c><![CDATA[{ssh_cm, ssh_connection_ref(), {eof,
	  ssh_channel_id()}}]]></c></tag>
	  <item>Indicteas that the other side will not send any more
	  data.</item>
	  
	  <tag><c><![CDATA[{ssh_cm, ssh_connection_ref(), {signal,
	  ssh_channel_id(), ssh_signal()}} ]]></c></tag>
	  <item>A signal can be delivered to the remote
	  process/service using the following message.  Some systems
	  may not implement signals, in which case they should ignore
	  this message.</item>
	  
	  <tag><c><![CDATA[{ssh_cm, ssh_connection_ref(),
	  {exit_signal, ssh_channel_id(), string() = exit_signal,
	  string() = ErrorMsg, string() =
	  LanguageString}}]]></c></tag>
	  <item>A remote execution may terminate violently due to a
	  signal then this message may be received. For details on valid string
	  values see RFC 4254 section 6.10</item>
	  
	  <tag><c><![CDATA[{ssh_cm,  ssh_connection_ref(), {exit_status,
	  ssh_channel_id(), integer() = ExitStatus}}]]></c></tag>
	  <item> When the command running at the other end terminates,
	  the following message can be sent to return the exit status
	  of the command. A zero 'exit_status' usually means that the
	  command terminated successfully.</item>
	</taglist>

	<p> Channels implementing a shell and command execution on the server side
	should also handle the following messages. </p>
	
	<taglist>
	  <tag><c><![CDATA[{ssh_cm, ssh_connection_ref(), {env, ssh_channel_id(),
	  boolean() = WantReply, string() = Var, string() = Value}}]]></c></tag>
	  <item> Environment variables may be passed to the
	  shell/command to be started later. Note that before the
	  callback returns it should call the function
	  ssh_connection:reply_request/4 with the boolean value of <c>
	  WantReply</c> as the second argument.
	  </item>
	  
	  <tag><c><![CDATA[{ssh_cm, ConnectionRef, {exec, ssh_channel_id(),
	  boolean() = WantReply, string() = Cmd}}]]></c></tag>
	  <item> This message will request that the server start the
	  execution of the given command. Note that before the
	  callback returns it should call the function
	  ssh_connection:reply_request/4 with the boolean value of <c>
	  WantReply</c> as the second argument.</item>
	  
	  <tag><c><![CDATA[{ssh_cm, ssh_connection_ref(), {pty, ssh_channel_id(),
	  boolean() = WantReply, {string() = Terminal, integer() = CharWidth,
	  integer() = RowHeight, integer() = PixelWidth, integer() = PixelHight,
	  [{atom() | integer() = Opcode,
	  integer() = Value}] = TerminalModes}}}]]></c></tag>
	  <item>A pseudo-terminal has been requested for the
	  session. Terminal is the value of the TERM environment
	  variable value (e.g., vt100). Zero dimension parameters must
	  be ignored.  The character/row dimensions override the pixel
	  dimensions (when nonzero).  Pixel dimensions refer to the
	  drawable area of the window. The <c>Opcode</c> in the
	  <c>TerminalModes</c> list is the mnemonic name, represented
	  as an lowercase erlang atom, defined in RFC 4254 section 8,
	  or the opcode if the mnemonic name is not listed in the
	  RFC. Example <c>OP code: 53, mnemonic name ECHO erlang atom:
	  echo</c>. Note that before the callback returns it should
	  call the function ssh_connection:reply_request/4 with the
	  boolean value of <c> WantReply</c> as the second
	  argument.</item>
	  
	  <tag><c><![CDATA[{ssh_cm, ConnectionRef, {shell, boolean() =
	  WantReply}}]]></c></tag>
	  <item> This message will request that the user's default
	  shell be started at the other end.  Note that before the
	  callback returns it should call the function
	  ssh_connection:reply_request/4 with the value of <c>
	  WantReply</c> as the second argument.
	  </item>

	  <tag><c><![CDATA[ {ssh_cm, ssh_connection_ref(), {window_change,
	  ssh_channel_id(), integer() = CharWidth, integer() = RowHeight,
	  integer() = PixWidth, integer() = PixHeight}}]]></c></tag>
	  <item> When the window (terminal) size changes on the client
	  side, it MAY send a message to the other side to inform it
	  of the new dimensions.</item>
	</taglist>
	
	<p> The following message is completely taken care of by the
	ssh channel behavior</p>
	
	<taglist>
	  <tag><c><![CDATA[{ssh_cm, ssh_connection_ref(), {closed,
	  ssh_channel_id()}}]]></c></tag>
	  <item> The channel behavior will send a close message to the
	  other side if such a message has not already been sent and
	  then terminate the channel with reason normal.</item>
	</taglist>
      </desc>
    </func>

    <func>
      <name>CallbackModule:terminate(Reason, State) -> _</name>
      <fsummary> </fsummary>
      <type>
	<v>Reason = term()</v>
	<v>State = term()</v>
      </type>
      <desc>
	<p>This function is called by a channel process when it is
	about to terminate. Before this function is called ssh_connection:close/2
	will be called if it has not been called earlier.
	This function should be the opposite of <c>CallbackModule:init/1</c>
	and do any necessary cleaning up. When it returns, the
	channel process terminates with reason <c>Reason</c>. The return value is
	ignored.
	</p>
      </desc>
    </func>
    
  </funcs>
  
</erlref>