tg/main.c

688 lines
17 KiB
C
Raw Normal View History

2013-10-23 10:26:17 -04:00
/*
This file is part of telegram-cli.
2013-10-23 10:26:17 -04:00
Telegram-cli is free software: you can redistribute it and/or modify
2013-10-23 10:26:17 -04:00
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 2 of the License, or
(at your option) any later version.
Telegram-cli is distributed in the hope that it will be useful,
2013-10-23 10:26:17 -04:00
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this telegram-cli. If not, see <http://www.gnu.org/licenses/>.
2013-10-23 10:26:17 -04:00
Copyright Vitaly Valtman 2013-2014
2013-10-23 10:26:17 -04:00
*/
#ifdef HAVE_CONFIG_H
#include "config.h"
#endif
2013-10-03 08:38:25 -04:00
#include <stdio.h>
#include <unistd.h>
#include <stdlib.h>
#include <string.h>
#include <pwd.h>
#include <termios.h>
#include <unistd.h>
#include <assert.h>
#if (READLINE == GNU)
2013-10-03 08:38:25 -04:00
#include <readline/readline.h>
#else
#include <editline/readline.h>
#endif
2013-10-03 08:38:25 -04:00
#include <sys/stat.h>
#include <time.h>
#include <fcntl.h>
#ifdef HAVE_EXECINFO_H
2013-10-11 16:52:20 -04:00
#include <execinfo.h>
#endif
2013-10-11 16:52:20 -04:00
#include <signal.h>
#ifdef HAVE_LIBCONFIG
#include <libconfig.h>
2013-11-10 15:35:08 -05:00
#endif
2013-10-03 08:38:25 -04:00
#include <grp.h>
#include "telegram.h"
2013-10-03 08:38:25 -04:00
#include "loop.h"
2013-11-11 13:35:31 -05:00
#include "interface.h"
#include "tools.h"
2013-10-03 08:38:25 -04:00
2014-01-11 19:43:29 -05:00
#ifdef USE_LUA
# include "lua-tg.h"
#endif
2014-08-13 08:56:55 -04:00
#include "tgl.h"
2014-08-13 21:31:24 -04:00
#define PROGNAME "telegram-cli"
#define VERSION "0.07"
2013-10-03 08:38:25 -04:00
#define CONFIG_DIRECTORY "." PROG_NAME
#define CONFIG_FILE "config"
#define AUTH_KEY_FILE "auth"
#define STATE_FILE "state"
#define SECRET_CHAT_FILE "secret"
#define DOWNLOADS_DIRECTORY "downloads"
2013-11-12 16:43:42 -05:00
#define BINLOG_FILE "binlog"
2013-10-03 08:38:25 -04:00
#define CONFIG_DIRECTORY_MODE 0700
#define DEFAULT_CONFIG_CONTENTS \
"# This is an empty config file\n" \
"# Feel free to put something here\n"
2014-08-14 18:16:01 -04:00
int verbosity;
2013-10-03 08:38:25 -04:00
char *default_username;
char *auth_token;
2013-10-25 15:50:10 -04:00
int msg_num_mode;
char *config_filename;
char *prefix;
char *auth_file_name;
char *state_file_name;
char *secret_chat_file_name;
char *downloads_directory;
char *config_directory;
2013-11-12 16:52:30 -05:00
char *binlog_file_name;
2013-11-11 16:59:36 -05:00
int binlog_enabled;
2013-11-15 11:14:25 -05:00
extern int log_level;
int sync_from_start;
int allow_weak_random;
2014-08-21 11:38:51 -04:00
char *lua_file;
2014-08-24 20:11:41 -04:00
int disable_colors;
int readline_disabled;
2014-09-09 13:05:36 -04:00
int disable_output;
2014-09-18 09:57:23 -04:00
int reset_authorization;
2013-10-03 08:38:25 -04:00
void set_default_username (const char *s) {
if (default_username) {
tfree_str (default_username);
2013-10-03 08:38:25 -04:00
}
default_username = tstrdup (s);
2013-10-03 08:38:25 -04:00
}
2013-12-02 12:19:08 -05:00
2013-10-03 08:38:25 -04:00
/* {{{ TERMINAL */
2013-12-02 12:19:08 -05:00
static struct termios term_in, term_out;
static int term_set_in;
static int term_set_out;
2013-10-03 08:38:25 -04:00
void get_terminal_attributes (void) {
2013-12-02 12:19:08 -05:00
if (tcgetattr (STDIN_FILENO, &term_in) < 0) {
} else {
term_set_in = 1;
}
if (tcgetattr (STDOUT_FILENO, &term_out) < 0) {
} else {
term_set_out = 1;
2013-10-03 08:38:25 -04:00
}
}
2013-10-11 16:52:20 -04:00
void set_terminal_attributes (void) {
2013-12-02 12:19:08 -05:00
if (term_set_in) {
if (tcsetattr (STDIN_FILENO, 0, &term_in) < 0) {
perror ("tcsetattr()");
}
}
if (term_set_out) {
if (tcsetattr (STDOUT_FILENO, 0, &term_out) < 0) {
perror ("tcsetattr()");
}
2013-10-11 16:52:20 -04:00
}
}
2013-10-03 08:38:25 -04:00
/* }}} */
char *get_home_directory (void) {
static char *home_directory = NULL;
if (home_directory != NULL) {
return home_directory;
}
2013-10-03 08:38:25 -04:00
struct passwd *current_passwd;
uid_t user_id;
setpwent ();
user_id = getuid ();
while ((current_passwd = getpwent ())) {
if (current_passwd->pw_uid == user_id) {
home_directory = tstrdup (current_passwd->pw_dir);
break;
2013-10-03 08:38:25 -04:00
}
}
endpwent ();
if (home_directory == NULL) {
home_directory = tstrdup (".");
}
return home_directory;
2013-10-03 08:38:25 -04:00
}
char *get_config_directory (void) {
char *config_directory;
tasprintf (&config_directory, "%s/" CONFIG_DIRECTORY, get_home_directory ());
2013-10-03 08:38:25 -04:00
return config_directory;
}
char *get_config_filename (void) {
return config_filename;
}
2013-10-11 16:52:20 -04:00
char *get_auth_key_filename (void) {
return auth_file_name;
2013-10-11 16:52:20 -04:00
}
2013-11-04 12:34:27 -05:00
char *get_state_filename (void) {
return state_file_name;
2013-11-04 12:34:27 -05:00
}
char *get_secret_chat_filename (void) {
return secret_chat_file_name;
2013-11-04 12:34:27 -05:00
}
char *get_downloads_directory (void) {
2013-10-03 08:38:25 -04:00
return downloads_directory;
}
2013-11-12 16:52:30 -05:00
char *get_binlog_file_name (void) {
return binlog_file_name;
}
char *make_full_path (char *s) {
if (*s != '/') {
char *t = s;
tasprintf (&s, "%s/%s", get_home_directory (), s);
tfree_str (t);
}
return s;
}
void check_type_sizes (void) {
if (sizeof (int) != 4u) {
logprintf ("sizeof (int) isn't equal 4.\n");
exit (1);
}
if (sizeof (char) != 1u) {
logprintf ("sizeof (char) isn't equal 1.\n");
2014-01-10 07:30:56 -05:00
exit (1);
}
}
void running_for_first_time (void) {
check_type_sizes ();
if (config_filename) {
return; // Do not create custom config file
}
tasprintf (&config_filename, "%s/%s/%s", get_home_directory (), CONFIG_DIRECTORY, CONFIG_FILE);
config_filename = make_full_path (config_filename);
2013-10-03 08:38:25 -04:00
int config_file_fd;
char *config_directory = get_config_directory ();
//char *downloads_directory = get_downloads_directory ();
2013-10-03 08:38:25 -04:00
if (!mkdir (config_directory, CONFIG_DIRECTORY_MODE)) {
2014-09-09 13:05:36 -04:00
if (!disable_output) {
printf ("[%s] created\n", config_directory);
}
2013-10-03 08:38:25 -04:00
}
tfree_str (config_directory);
config_directory = NULL;
2013-10-03 08:38:25 -04:00
// see if config file is there
if (access (config_filename, R_OK) != 0) {
2013-10-03 08:38:25 -04:00
// config file missing, so touch it
2013-10-26 15:57:22 -04:00
config_file_fd = open (config_filename, O_CREAT | O_RDWR, 0600);
2013-10-03 12:10:53 -04:00
if (config_file_fd == -1) {
perror ("open[config_file]");
exit (EXIT_FAILURE);
}
2013-10-03 08:38:25 -04:00
if (write (config_file_fd, DEFAULT_CONFIG_CONTENTS, strlen (DEFAULT_CONFIG_CONTENTS)) <= 0) {
2013-10-03 12:10:53 -04:00
perror ("write[config_file]");
exit (EXIT_FAILURE);
}
2013-10-03 08:38:25 -04:00
close (config_file_fd);
/*int auth_file_fd = open (get_auth_key_filename (), O_CREAT | O_RDWR, 0600);
2013-10-11 16:52:20 -04:00
int x = -1;
assert (write (auth_file_fd, &x, 4) == 4);
close (auth_file_fd);
printf ("[%s] created\n", config_filename);*/
2013-10-03 08:38:25 -04:00
/* create downloads directory */
/*if (mkdir (downloads_directory, 0755) !=0) {
2013-10-03 12:10:53 -04:00
perror ("creating download directory");
exit (EXIT_FAILURE);
}*/
}
}
#ifdef HAVE_LIBCONFIG
void parse_config_val (config_t *conf, char **s, char *param_name, const char *default_name, const char *path) {
static char buf[1000];
int l = 0;
if (prefix) {
l = strlen (prefix);
memcpy (buf, prefix, l);
buf[l ++] = '.';
}
*s = 0;
const char *r = 0;
strcpy (buf + l, param_name);
config_lookup_string (conf, buf, &r);
if (r) {
if (path) {
tasprintf (s, "%s/%s", path, r);
} else {
*s = tstrdup (r);
}
} else {
2014-08-20 23:24:52 -04:00
if (path && default_name) {
tasprintf (s, "%s/%s", path, default_name);
} else {
2014-08-21 11:38:51 -04:00
*s = default_name ? tstrdup (default_name) : 0;
2013-10-03 12:10:53 -04:00
}
2013-10-03 08:38:25 -04:00
}
}
2013-10-03 08:38:25 -04:00
void parse_config (void) {
2014-09-09 11:10:01 -04:00
//config_filename = make_full_path (config_filename);
config_t conf;
config_init (&conf);
if (config_read_file (&conf, config_filename) != CONFIG_TRUE) {
fprintf (stderr, "Can not read config '%s': error '%s' on the line %d\n", config_filename, config_error_text (&conf), config_error_line (&conf));
exit (2);
}
if (!prefix) {
config_lookup_string (&conf, "default_profile", (void *)&prefix);
}
static char buf[1000];
int l = 0;
if (prefix) {
l = strlen (prefix);
memcpy (buf, prefix, l);
buf[l ++] = '.';
}
2014-08-13 08:56:55 -04:00
2014-08-13 11:55:16 -04:00
int test_mode = 0;
strcpy (buf + l, "test");
2014-08-13 11:55:16 -04:00
config_lookup_bool (&conf, buf, &test_mode);
if (test_mode) {
tgl_set_test_mode ();
}
2013-11-15 11:14:25 -05:00
strcpy (buf + l, "log_level");
2013-12-02 10:11:05 -05:00
long long t = log_level;
config_lookup_int (&conf, buf, (void *)&t);
log_level = t;
2013-11-15 11:14:25 -05:00
if (!msg_num_mode) {
strcpy (buf + l, "msg_num");
config_lookup_bool (&conf, buf, &msg_num_mode);
}
parse_config_val (&conf, &config_directory, "config_directory", CONFIG_DIRECTORY, 0);
config_directory = make_full_path (config_directory);
parse_config_val (&conf, &auth_file_name, "auth_file", AUTH_KEY_FILE, config_directory);
parse_config_val (&conf, &downloads_directory, "downloads", DOWNLOADS_DIRECTORY, config_directory);
2014-08-21 11:38:51 -04:00
if (!lua_file) {
parse_config_val (&conf, &lua_file, "lua_script", 0, config_directory);
}
2013-11-11 16:59:36 -05:00
strcpy (buf + l, "binlog_enabled");
config_lookup_bool (&conf, buf, &binlog_enabled);
2014-09-18 06:11:23 -04:00
int pfs_enabled = 0;
strcpy (buf + l, "pfs_enabled");
config_lookup_bool (&conf, buf, &pfs_enabled);
if (pfs_enabled) {
tgl_enable_pfs ();
}
2014-08-13 21:31:24 -04:00
if (binlog_enabled) {
2014-08-22 07:45:16 -04:00
parse_config_val (&conf, &binlog_file_name, "binlog", BINLOG_FILE, config_directory);
2014-08-13 21:31:24 -04:00
tgl_set_binlog_mode (1);
tgl_set_binlog_path (binlog_file_name);
} else {
tgl_set_binlog_mode (0);
2014-08-22 07:45:16 -04:00
parse_config_val (&conf, &state_file_name, "state_file", STATE_FILE, config_directory);
parse_config_val (&conf, &secret_chat_file_name, "secret", SECRET_CHAT_FILE, config_directory);
//tgl_set_auth_file_path (auth_file_name);
2014-08-13 21:31:24 -04:00
}
tgl_set_download_directory (downloads_directory);
2013-11-11 16:59:36 -05:00
if (!mkdir (config_directory, CONFIG_DIRECTORY_MODE)) {
2014-09-09 13:05:36 -04:00
if (!disable_output) {
printf ("[%s] created\n", config_directory);
}
}
if (!mkdir (downloads_directory, CONFIG_DIRECTORY_MODE)) {
2014-09-09 13:05:36 -04:00
if (!disable_output) {
printf ("[%s] created\n", downloads_directory);
}
}
2013-10-03 08:38:25 -04:00
}
#else
void parse_config (void) {
2014-09-09 13:05:36 -04:00
if (!disable_output) {
printf ("libconfig not enabled\n");
}
tasprintf (&downloads_directory, "%s/%s/%s", get_home_directory (), CONFIG_DIRECTORY, DOWNLOADS_DIRECTORY);
2014-08-13 21:31:24 -04:00
if (binlog_enabled) {
2014-08-22 07:45:16 -04:00
tasprintf (&binlog_file_name, "%s/%s/%s", get_home_directory (), CONFIG_DIRECTORY, BINLOG_FILE);
2014-08-13 21:31:24 -04:00
tgl_set_binlog_mode (1);
tgl_set_binlog_path (binlog_file_name);
} else {
tgl_set_binlog_mode (0);
2014-08-22 07:45:16 -04:00
//tgl_set_auth_file_path (auth_file_name;
tasprintf (&auth_file_name, "%s/%s/%s", get_home_directory (), CONFIG_DIRECTORY, AUTH_KEY_FILE);
tasprintf (&state_file_name, "%s/%s/%s", get_home_directory (), CONFIG_DIRECTORY, STATE_FILE);
tasprintf (&secret_chat_file_name, "%s/%s/%s", get_home_directory (), CONFIG_DIRECTORY, SECRET_CHAT_FILE);
2014-08-13 21:31:24 -04:00
}
tgl_set_download_directory (downloads_directory);
}
#endif
2013-10-03 08:38:25 -04:00
void inner_main (void) {
loop ();
}
void usage (void) {
2014-02-27 04:17:07 -05:00
printf ("%s Usage\n", PROGNAME);
2014-08-24 20:11:41 -04:00
printf (" -u specify username (would not be asked during authorization)\n");
printf (" -k specify location of public key (possible multiple entries)\n");
printf (" -v increase verbosity (0-ERROR 1-WARNIN 2-NOTICE 3+-DEBUG-levels)\n");
printf (" -N message num mode\n");
#ifdef HAVE_LIBCONFIG
printf (" -c config file name\n");
printf (" -p use specified profile\n");
#else
printf (" -B enable binlog\n");
#endif
printf (" -l log level\n");
printf (" -f during authorization fetch all messages since registration\n");
printf (" -E diable auto accept of encrypted chats\n");
#ifdef USE_LUA
printf (" -s lua script file\n");
#endif
printf (" -W send dialog_list query and wait for answer before reading input\n");
printf (" -C disable color output\n");
printf (" -R disable readline\n");
2014-09-09 11:01:27 -04:00
printf (" -d daemon mode\n");
printf (" -L <log-name> log file name\n");
printf (" -U <user-name> change uid after start\n");
printf (" -G <group-name> change gid after start\n");
2014-09-09 13:05:36 -04:00
printf (" -D disable output\n");
2014-02-27 04:17:07 -05:00
2013-10-03 08:38:25 -04:00
exit (1);
}
2014-08-14 14:03:33 -04:00
//extern char *rsa_public_key_name;
//extern int default_dc_num;
2013-10-11 16:52:20 -04:00
2014-09-09 11:01:27 -04:00
2013-12-18 10:21:49 -05:00
char *log_net_file;
FILE *log_net_f;
2013-11-21 14:35:49 -05:00
int register_mode;
2013-12-18 10:21:49 -05:00
int disable_auto_accept;
int wait_dialog_list;
2014-01-11 19:43:29 -05:00
2014-09-09 11:01:27 -04:00
char *logname;
int daemonize;
void reopen_logs (void) {
int fd;
fflush (stdout);
fflush (stderr);
if ((fd = open ("/dev/null", O_RDWR, 0)) != -1) {
dup2 (fd, 0);
dup2 (fd, 1);
dup2 (fd, 2);
if (fd > 2) {
close (fd);
}
}
if (logname && (fd = open (logname, O_WRONLY|O_APPEND|O_CREAT, 0640)) != -1) {
dup2 (fd, 1);
dup2 (fd, 2);
if (fd > 2) {
close (fd);
}
}
}
static void sigusr1_handler (const int sig) {
fprintf(stderr, "got SIGUSR1, rotate logs.\n");
reopen_logs ();
signal (SIGUSR1, sigusr1_handler);
}
static void sighup_handler (const int sig) {
fprintf(stderr, "got SIGHUP.\n");
signal (SIGHUP, sighup_handler);
}
char *set_user_name;
char *set_group_name;
int change_user_group () {
char *username = set_user_name;
char *groupname = set_group_name;
struct passwd *pw;
/* lose root privileges if we have them */
if (getuid() == 0 || geteuid() == 0) {
if (username == 0 || *username == '\0') {
username = "telegramd";
}
if ((pw = getpwnam (username)) == 0) {
fprintf (stderr, "change_user_group: can't find the user %s to switch to\n", username);
return -1;
}
gid_t gid = pw->pw_gid;
if (setgroups (1, &gid) < 0) {
fprintf (stderr, "change_user_group: failed to clear supplementary groups list: %m\n");
return -1;
}
if (groupname) {
struct group *g = getgrnam (groupname);
if (g == NULL) {
fprintf (stderr, "change_user_group: can't find the group %s to switch to\n", groupname);
return -1;
}
gid = g->gr_gid;
}
if (setgid (gid) < 0) {
fprintf (stderr, "change_user_group: setgid (%d) failed. %m\n", (int) gid);
return -1;
}
if (setuid (pw->pw_uid) < 0) {
fprintf (stderr, "change_user_group: failed to assume identity of user %s\n", username);
return -1;
}
}
return 0;
}
2014-01-11 19:43:29 -05:00
2013-10-03 08:38:25 -04:00
void args_parse (int argc, char **argv) {
int opt = 0;
2014-09-18 09:57:23 -04:00
while ((opt = getopt (argc, argv, "u:hk:vNl:fEwWCRdL:DU:G:q"
2014-08-24 20:11:41 -04:00
#ifdef HAVE_LIBCONFIG
"c:p:"
#else
"B"
#endif
#ifdef USE_LUA
2014-08-26 12:30:30 -04:00
"s:"
2014-08-24 20:11:41 -04:00
#endif
)) != -1) {
2013-10-03 08:38:25 -04:00
switch (opt) {
case 'u':
set_default_username (optarg);
break;
2013-10-11 16:52:20 -04:00
case 'k':
2014-08-14 14:03:33 -04:00
//rsa_public_key_name = tstrdup (optarg);
tgl_set_rsa_key (optarg);
2013-10-11 16:52:20 -04:00
break;
case 'v':
2014-08-13 11:55:16 -04:00
tgl_incr_verbosity ();
2014-08-14 18:16:01 -04:00
verbosity ++;
2013-10-11 16:52:20 -04:00
break;
2013-10-25 15:50:10 -04:00
case 'N':
msg_num_mode ++;
break;
2014-08-24 20:11:41 -04:00
#ifdef HAVE_LIBCONFIG
case 'c':
config_filename = tstrdup (optarg);
break;
case 'p':
prefix = tstrdup (optarg);
assert (strlen (prefix) <= 100);
break;
2014-08-24 20:11:41 -04:00
#else
case 'B':
binlog_enabled = 1;
break;
#endif
2013-11-15 11:14:25 -05:00
case 'l':
log_level = atoi (optarg);
break;
case 'f':
sync_from_start = 1;
break;
2013-12-18 10:21:49 -05:00
case 'E':
disable_auto_accept = 1;
break;
case 'w':
allow_weak_random = 1;
break;
2014-08-24 20:11:41 -04:00
#ifdef USE_LUA
2014-01-11 19:43:29 -05:00
case 's':
2014-08-26 12:30:30 -04:00
lua_file = strdup (optarg);
2014-01-11 19:43:29 -05:00
break;
2014-08-24 20:11:41 -04:00
#endif
case 'W':
wait_dialog_list = 1;
break;
2014-08-24 20:11:41 -04:00
case 'C':
disable_colors ++;
break;
case 'R':
readline_disabled ++;
break;
2014-09-09 11:01:27 -04:00
case 'd':
daemonize ++;
break;
case 'L':
logname = optarg;
break;
case 'U':
set_user_name = optarg;
break;
case 'G':
set_group_name = optarg;
break;
2014-09-09 13:05:36 -04:00
case 'D':
disable_output ++;
break;
2014-09-18 09:57:23 -04:00
case 'q':
reset_authorization ++;
break;
2013-10-03 08:38:25 -04:00
case 'h':
default:
usage ();
break;
}
}
}
#ifdef HAVE_EXECINFO_H
2013-10-11 16:52:20 -04:00
void print_backtrace (void) {
void *buffer[255];
const int calls = backtrace (buffer, sizeof (buffer) / sizeof (void *));
backtrace_symbols_fd (buffer, calls, 1);
}
2014-01-30 06:01:16 -05:00
#else
void print_backtrace (void) {
if (write (1, "No libexec. Backtrace disabled\n", 32) < 0) {
// Sad thing
}
2014-01-30 06:01:16 -05:00
}
#endif
2013-10-11 16:52:20 -04:00
void sig_segv_handler (int signum __attribute__ ((unused))) {
2013-10-11 16:52:20 -04:00
set_terminal_attributes ();
2014-02-03 10:26:43 -05:00
if (write (1, "SIGSEGV received\n", 18) < 0) {
// Sad thing
}
2013-10-11 16:52:20 -04:00
print_backtrace ();
exit (EXIT_FAILURE);
2013-10-11 16:52:20 -04:00
}
void sig_abrt_handler (int signum __attribute__ ((unused))) {
set_terminal_attributes ();
2014-02-03 10:26:43 -05:00
if (write (1, "SIGABRT received\n", 18) < 0) {
// Sad thing
}
print_backtrace ();
exit (EXIT_FAILURE);
}
2013-10-11 16:52:20 -04:00
2013-10-03 08:38:25 -04:00
int main (int argc, char **argv) {
change_user_group ();
signal (SIGSEGV, sig_segv_handler);
signal (SIGABRT, sig_abrt_handler);
2013-11-15 11:14:25 -05:00
log_level = 10;
args_parse (argc, argv);
2014-09-09 11:01:27 -04:00
if (daemonize) {
signal (SIGHUP, sighup_handler);
reopen_logs ();
}
2014-09-09 17:01:22 -04:00
signal (SIGUSR1, sigusr1_handler);
2014-09-09 13:05:36 -04:00
if (!disable_output) {
printf (
"Telegram-cli version " TGL_VERSION ", Copyright (C) 2013-2014 Vitaly Valtman\n"
"Telegram-cli comes with ABSOLUTELY NO WARRANTY; for details type `show_license'.\n"
"This is free software, and you are welcome to redistribute it\n"
"under certain conditions; type `show_license' for details.\n"
);
}
running_for_first_time ();
parse_config ();
tgl_set_rsa_key ("/etc/" PROG_NAME "/server.pub");
tgl_set_rsa_key ("tg-server.pub");
2013-10-25 05:28:29 -04:00
2013-10-03 08:38:25 -04:00
get_terminal_attributes ();
2014-01-11 19:43:29 -05:00
#ifdef USE_LUA
if (lua_file) {
lua_init (lua_file);
}
#endif
2013-10-03 08:38:25 -04:00
inner_main ();
return 0;
}