mirror of
https://github.com/casjaysdevdocker/vim
synced 2025-01-18 12:34:25 -05:00
68 lines
2.4 KiB
Bash
Executable File
68 lines
2.4 KiB
Bash
Executable File
#!/usr/bin/env bash
|
|
|
|
set -eu
|
|
|
|
cmd_exists() {
|
|
type "$1" &>/dev/null || return 1
|
|
}
|
|
|
|
# get data either form stdin or from file
|
|
buf=$(cat "$@")
|
|
|
|
copy_backend_remote_tunnel_port=$(tmux show-option -gvq "@copy_backend_remote_tunnel_port")
|
|
copy_use_osc52_fallback=$(tmux show-option -gvq "@copy_use_osc52_fallback")
|
|
|
|
# Resolve copy backend: pbcopy (OSX), reattach-to-user-namespace (OSX), xclip/xsel (Linux)
|
|
copy_backend=""
|
|
if cmd_exists pbcopy; then
|
|
copy_backend="pbcopy"
|
|
elif cmd_exists reattach-to-user-namespace; then
|
|
copy_backend="reattach-to-user-namespace pbcopy"
|
|
elif [ -n "${DISPLAY-}" ] && cmd_exists xsel; then
|
|
copy_backend="xsel -i --clipboard"
|
|
elif [ -n "${DISPLAY-}" ] && cmd_exists xclip; then
|
|
copy_backend="xclip -i -f -selection primary | xclip -i -selection clipboard"
|
|
elif [ -n "${copy_backend_remote_tunnel_port-}" ] &&
|
|
(netstat -f inet -nl 2>/dev/null || netstat -4 -nl 2>/dev/null) |
|
|
grep -q "[.:]$copy_backend_remote_tunnel_port"; then
|
|
copy_backend="nc localhost $copy_backend_remote_tunnel_port"
|
|
fi
|
|
|
|
# if copy backend is resolved, copy and exit
|
|
if [ -n "$copy_backend" ]; then
|
|
printf "%s" "$buf" | eval "$copy_backend"
|
|
exit
|
|
fi
|
|
|
|
# If no copy backends were eligible, decide to fallback to OSC 52 escape sequences
|
|
# Note, most terminals do not handle OSC
|
|
if [ "$copy_use_osc52_fallback" == "off" ]; then
|
|
exit
|
|
fi
|
|
|
|
# Copy via OSC 52 ANSI escape sequence to controlling terminal
|
|
buflen=$(printf %s "$buf" | wc -c)
|
|
|
|
# https://sunaku.github.io/tmux-yank-osc52.html
|
|
# The maximum length of an OSC 52 escape sequence is 100_000 bytes, of which
|
|
# 7 bytes are occupied by a "\033]52;c;" header, 1 byte by a "\a" footer, and
|
|
# 99_992 bytes by the base64-encoded result of 74_994 bytes of copyable text
|
|
maxlen=74994
|
|
|
|
# warn if exceeds maxlen
|
|
if [ "$buflen" -gt "$maxlen" ]; then
|
|
printf "input is %d bytes too long" "$((buflen - maxlen))" >&2
|
|
fi
|
|
|
|
# build up OSC 52 ANSI escape sequence
|
|
esc="\033]52;c;$(printf %s "$buf" | head -c $maxlen | base64 | tr -d '\r\n')\a"
|
|
esc="\033Ptmux;\033$esc\033\\"
|
|
|
|
# resolve target terminal to send escape sequence
|
|
# if we are on remote machine, send directly to SSH_TTY to transport escape sequence
|
|
# to terminal on local machine, so data lands in clipboard on our local machine
|
|
pane_active_tty=$(tmux list-panes -F "#{pane_active} #{pane_tty}" | awk '$1=="1" { print $2 }')
|
|
target_tty="${SSH_TTY:-$pane_active_tty}"
|
|
|
|
printf '%s' "$esc" >"$target_tty"
|