1 /* exec.c - generic call-a-program code
2 * Copyright (C) 2001, 2002, 2003, 2004, 2005 Free Software Foundation, Inc.
4 * This file is part of GnuPG.
6 * GnuPG is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 3 of the License, or
9 * (at your option) any later version.
11 * GnuPG is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, see <http://www.gnu.org/licenses/>.
21 FIXME: We should replace most code in this module by our
22 spawn implementation from common/exechelp.c.
31 #include <sys/types.h>
32 #ifndef EXEC_TEMPFILE_ONLY
35 #ifdef HAVE_DOSISH_SYSTEM
48 #include "mkdtemp.h" /* From gnulib. */
54 exec_write(struct exec_info
**info
,const char *program
,
55 const char *args_in
,const char *name
,int writeonly
,int binary
)
57 log_error(_("no remote program execution supported\n"));
58 return G10ERR_GENERAL
;
62 exec_read(struct exec_info
*info
) { return G10ERR_GENERAL
; }
64 exec_finish(struct exec_info
*info
) { return G10ERR_GENERAL
; }
66 set_exec_path(const char *path
) { return G10ERR_GENERAL
; }
71 /* This is a nicer system() for windows that waits for programs to
72 return before returning control to the caller. I hate helpful
75 w32_system(const char *command
)
77 PROCESS_INFORMATION pi
;
81 /* We must use a copy of the command as CreateProcess modifies this
83 string
=xstrdup(command
);
85 memset(&pi
,0,sizeof(pi
));
86 memset(&si
,0,sizeof(si
));
89 if(!CreateProcess(NULL
,string
,NULL
,NULL
,FALSE
,
94 /* Wait for the child to exit */
95 WaitForSingleObject(pi
.hProcess
,INFINITE
);
97 CloseHandle(pi
.hProcess
);
98 CloseHandle(pi
.hThread
);
105 /* Replaces current $PATH */
107 set_exec_path(const char *path
)
111 p
=xmalloc(5+strlen(path
)+1);
116 log_debug("set_exec_path: %s\n",p
);
118 /* Notice that path is never freed. That is intentional due to the
119 way putenv() works. This leaks a few bytes if we call
120 set_exec_path multiple times. */
123 return G10ERR_GENERAL
;
128 /* Makes a temp directory and filenames */
130 make_tempdir(struct exec_info
*info
)
132 char *tmp
=opt
.temp_dir
,*namein
=info
->name
,*nameout
;
135 namein
=info
->flags
.binary
?"tempin" EXTSEP_S
"bin":"tempin" EXTSEP_S
"txt";
137 nameout
=info
->flags
.binary
?"tempout" EXTSEP_S
"bin":"tempout" EXTSEP_S
"txt";
139 /* Make up the temp dir and files in case we need them */
146 tmp
=xmalloc(MAX_PATH
+2);
147 err
=GetTempPath(MAX_PATH
+1,tmp
);
148 if(err
==0 || err
>MAX_PATH
+1)
149 strcpy(tmp
,"c:\\windows\\temp");
154 /* GetTempPath may return with \ on the end */
155 while(len
>0 && tmp
[len
-1]=='\\')
161 #else /* More unixish systems */
162 tmp
=getenv("TMPDIR");
169 tmp
="<Wimp$ScrapDir>.GnuPG";
170 mkdir(tmp
,0700); /* Error checks occur later on */
179 info
->tempdir
=xmalloc(strlen(tmp
)+strlen(DIRSEP_S
)+10+1);
181 sprintf(info
->tempdir
,"%s" DIRSEP_S
"gpg-XXXXXX",tmp
);
187 if(mkdtemp(info
->tempdir
)==NULL
)
188 log_error(_("can't create directory `%s': %s\n"),
189 info
->tempdir
,strerror(errno
));
192 info
->flags
.madedir
=1;
194 info
->tempfile_in
=xmalloc(strlen(info
->tempdir
)+
195 strlen(DIRSEP_S
)+strlen(namein
)+1);
196 sprintf(info
->tempfile_in
,"%s" DIRSEP_S
"%s",info
->tempdir
,namein
);
198 if(!info
->flags
.writeonly
)
200 info
->tempfile_out
=xmalloc(strlen(info
->tempdir
)+
201 strlen(DIRSEP_S
)+strlen(nameout
)+1);
202 sprintf(info
->tempfile_out
,"%s" DIRSEP_S
"%s",info
->tempdir
,nameout
);
206 return info
->flags
.madedir
?0:G10ERR_GENERAL
;
209 /* Expands %i and %o in the args to the full temp files within the
212 expand_args(struct exec_info
*info
,const char *args_in
)
214 const char *ch
= args_in
;
217 info
->flags
.use_temp_files
=0;
218 info
->flags
.keep_temp_files
=0;
221 log_debug("expanding string \"%s\"\n",args_in
);
223 init_membuf (&command
, 100);
236 info
->flags
.keep_temp_files
=1;
240 if(!info
->flags
.madedir
)
242 if(make_tempdir(info
))
245 append
=info
->tempfile_out
;
246 info
->flags
.use_temp_files
=1;
250 info
->flags
.keep_temp_files
=1;
254 if(!info
->flags
.madedir
)
256 if(make_tempdir(info
))
259 append
=info
->tempfile_in
;
260 info
->flags
.use_temp_files
=1;
269 put_membuf_str (&command
, append
);
272 put_membuf (&command
, ch
, 1);
277 put_membuf (&command
, "", 1); /* Terminate string. */
279 info
->command
= get_membuf (&command
, NULL
);
281 return gpg_error_from_syserror ();
284 log_debug("args expanded to \"%s\", use %u, keep %u\n",info
->command
,
285 info
->flags
.use_temp_files
,info
->flags
.keep_temp_files
);
290 xfree (get_membuf (&command
, NULL
));
291 return G10ERR_GENERAL
;
294 /* Either handles the tempfile creation, or the fork/exec. If it
295 returns ok, then info->tochild is a FILE * that can be written to.
296 The rules are: if there are no args, then it's a fork/exec/pipe.
297 If there are args, but no tempfiles, then it's a fork/exec/pipe via
298 shell -c. If there are tempfiles, then it's a system. */
301 exec_write(struct exec_info
**info
,const char *program
,
302 const char *args_in
,const char *name
,int writeonly
,int binary
)
304 int ret
=G10ERR_GENERAL
;
306 if(opt
.exec_disable
&& !opt
.no_perm_warn
)
308 log_info(_("external program calls are disabled due to unsafe "
309 "options file permissions\n"));
314 #if defined(HAVE_GETUID) && defined(HAVE_GETEUID)
315 /* There should be no way to get to this spot while still carrying
316 setuid privs. Just in case, bomb out if we are. */
317 if ( getuid () != geteuid ())
321 if(program
==NULL
&& args_in
==NULL
)
324 *info
=xmalloc_clear(sizeof(struct exec_info
));
327 (*info
)->name
=xstrdup(name
);
328 (*info
)->flags
.binary
=binary
;
329 (*info
)->flags
.writeonly
=writeonly
;
331 /* Expand the args, if any */
332 if(args_in
&& expand_args(*info
,args_in
))
335 #ifdef EXEC_TEMPFILE_ONLY
336 if(!(*info
)->flags
.use_temp_files
)
338 log_error(_("this platform requires temporary files when calling"
339 " external programs\n"));
343 #else /* !EXEC_TEMPFILE_ONLY */
345 /* If there are no args, or there are args, but no temp files, we
346 can use fork/exec/pipe */
347 if(args_in
==NULL
|| (*info
)->flags
.use_temp_files
==0)
361 if(((*info
)->child
=fork())==-1)
370 if((*info
)->child
==0)
372 char *shell
=getenv("SHELL");
379 /* If the program isn't going to respond back, they get to
380 keep their stdout/stderr */
381 if(!(*info
)->flags
.writeonly
)
383 /* implied close of STDERR */
384 if(dup2(STDOUT_FILENO
,STDERR_FILENO
)==-1)
387 /* implied close of STDOUT */
389 if(dup2(from
[1],STDOUT_FILENO
)==-1)
393 /* implied close of STDIN */
395 if(dup2(to
[0],STDIN_FILENO
)==-1)
401 log_debug("execlp: %s\n",program
);
403 execlp(program
,program
,(void *)NULL
);
408 log_debug("execlp: %s -c %s\n",shell
,(*info
)->command
);
410 execlp(shell
,shell
,"-c",(*info
)->command
,(void *)NULL
);
413 /* If we get this far the exec failed. Clean up and return. */
416 log_error(_("unable to execute program `%s': %s\n"),
417 program
,strerror(errno
));
419 log_error(_("unable to execute shell `%s': %s\n"),
420 shell
,strerror(errno
));
422 /* This mimics the POSIX sh behavior - 127 means "not found"
434 (*info
)->tochild
=fdopen(to
[1],binary
?"wb":"w");
435 if((*info
)->tochild
==NULL
)
437 ret
= gpg_error_from_syserror ();
444 (*info
)->fromchild
=iobuf_fdopen(from
[0],"r");
445 if((*info
)->fromchild
==NULL
)
447 ret
= gpg_error_from_syserror ();
452 /* fd iobufs are cached?! */
453 iobuf_ioctl((*info
)->fromchild
,3,1,NULL
);
457 #endif /* !EXEC_TEMPFILE_ONLY */
460 log_debug("using temp file `%s'\n",(*info
)->tempfile_in
);
462 /* It's not fork/exec/pipe, so create a temp file */
463 if( is_secured_filename ((*info
)->tempfile_in
) )
465 (*info
)->tochild
= NULL
;
469 (*info
)->tochild
=fopen((*info
)->tempfile_in
,binary
?"wb":"w");
470 if((*info
)->tochild
==NULL
)
472 ret
= gpg_error_from_syserror ();
473 log_error(_("can't create `%s': %s\n"),
474 (*info
)->tempfile_in
,strerror(errno
));
490 exec_read(struct exec_info
*info
)
492 int ret
=G10ERR_GENERAL
;
494 fclose(info
->tochild
);
497 if(info
->flags
.use_temp_files
)
500 log_debug("system() command is %s\n",info
->command
);
503 info
->progreturn
=w32_system(info
->command
);
505 info
->progreturn
=system(info
->command
);
508 if(info
->progreturn
==-1)
510 log_error(_("system error while calling external program: %s\n"),
512 info
->progreturn
=127;
516 #if defined(WIFEXITED) && defined(WEXITSTATUS)
517 if(WIFEXITED(info
->progreturn
))
518 info
->progreturn
=WEXITSTATUS(info
->progreturn
);
521 log_error(_("unnatural exit of external program\n"));
522 info
->progreturn
=127;
526 /* If we don't have the macros, do the best we can. */
527 info
->progreturn
= (info
->progreturn
& 0xff00) >> 8;
530 /* 127 is the magic value returned from system() to indicate
531 that the shell could not be executed, or from /bin/sh to
532 indicate that the program could not be executed. */
534 if(info
->progreturn
==127)
536 log_error(_("unable to execute external program\n"));
540 if(!info
->flags
.writeonly
)
542 info
->fromchild
=iobuf_open(info
->tempfile_out
);
544 && is_secured_file (iobuf_get_fd (info
->fromchild
)))
546 iobuf_close (info
->fromchild
);
547 info
->fromchild
= NULL
;
550 if(info
->fromchild
==NULL
)
552 ret
= gpg_error_from_syserror ();
553 log_error(_("unable to read external program response: %s\n"),
558 /* Do not cache this iobuf on close */
559 iobuf_ioctl(info
->fromchild
,3,1,NULL
);
570 exec_finish(struct exec_info
*info
)
572 int ret
=info
->progreturn
;
575 iobuf_close(info
->fromchild
);
578 fclose(info
->tochild
);
580 #ifndef EXEC_TEMPFILE_ONLY
583 if(waitpid(info
->child
,&info
->progreturn
,0)!=0 &&
584 WIFEXITED(info
->progreturn
))
585 ret
=WEXITSTATUS(info
->progreturn
);
588 log_error(_("unnatural exit of external program\n"));
594 if(info
->flags
.madedir
&& !info
->flags
.keep_temp_files
)
596 if(info
->tempfile_in
)
598 if(unlink(info
->tempfile_in
)==-1)
599 log_info(_("WARNING: unable to remove tempfile (%s) `%s': %s\n"),
600 "in",info
->tempfile_in
,strerror(errno
));
603 if(info
->tempfile_out
)
605 if(unlink(info
->tempfile_out
)==-1)
606 log_info(_("WARNING: unable to remove tempfile (%s) `%s': %s\n"),
607 "out",info
->tempfile_out
,strerror(errno
));
610 if(rmdir(info
->tempdir
)==-1)
611 log_info(_("WARNING: unable to remove temp directory `%s': %s\n"),
612 info
->tempdir
,strerror(errno
));
615 xfree(info
->command
);
617 xfree(info
->tempdir
);
618 xfree(info
->tempfile_in
);
619 xfree(info
->tempfile_out
);
624 #endif /* ! NO_EXEC */