-- Leo's gemini proxy
-- Connecting to git.thebackupbox.net:1965...
-- Connected
-- Sending request
-- Meta line: 20 text/gemini
repo: uritools action: blob revision: path_from: ssh_hack revision_from: refs/heads/master: path_to: revision_to:
/ ssh_hack
refs/heads/master:/ssh_hack #!/usr/bin/env bash ### we need to export each of the query string variables ### then send them over ssh uri="$1" q="$(printf "%s\n" "$uri" | uricut -q)" p="$(printf "%s\n" "$uri" | uricut -p)" d="$(printf "%s\n" "$uri" | uricut -d)" P="$(printf "%s\n" "$uri" | uricut -P)" u="$(printf "%s\n" "$uri" | uricut -u)" f="$(printf "%s\n" "$uri" | uricut -f)" #use this for port forwards and extra ssh arguments I guess eval "$(printf '%s\n' "$q" | tr '&' ' ' | grep '[^ ]*=' | sed 's/^/export /g')" if [ "$p" ];then p="$(uriunescape "$p")" fi if [ "$P" ]; then HACK_PORT="-p $P" fi if [ "$u" ];then HACK_USER="$u@" fi set_terminal_title "$uri" if [ "$q" ];then tmpfile=$(mktemp); printf '%s\n' "$q" | tr '&' '\n' | cut -d= -f1 | sed 's/^/SendEnv /g' > "$tmpfile" ssh -F "$tmpfile" -t ${HACK_PORT} ${HACK_USER}${d} ${p} else ssh -t ${HACK_PORT} ${HACK_USER}${d} ${p} fi #ssh -F <(printf '%s\n' "$q" | tr '&' '\n' | cut -d= -f1 | sed 's/^/SendEnv /g') -t ${HACK_PORT} ${HACK_USER}${d} ${p:1} #ssh -F <(printf '%s\n' "$q" | tr '&' '\n' | cut -d= -f1 | sed 's/^/SendEnv /g') -t ${HACK_PORT} ${HACK_USER}${d} ${p:1}
-- Response ended
-- Page fetched on Sun Jun 2 15:02:02 2024