1 /* $NetBSD: ex_init.c,v 1.1.1.2 2008/05/18 14:31:16 aymeric Exp $ */
4 * Copyright (c) 1992, 1993, 1994
5 * The Regents of the University of California. All rights reserved.
6 * Copyright (c) 1992, 1993, 1994, 1995, 1996
7 * Keith Bostic. All rights reserved.
9 * See the LICENSE file for redistribution information.
15 static const char sccsid
[] = "Id: ex_init.c,v 10.31 2001/06/25 15:19:16 skimo Exp (Berkeley) Date: 2001/06/25 15:19:16";
18 #include <sys/param.h>
19 #include <sys/types.h> /* XXX: param.h may not have included types.h */
20 #include <sys/queue.h>
23 #include <bitstring.h>
31 #include "../common/common.h"
33 #include "pathnames.h"
35 enum rc
{ NOEXIST
, NOPERM
, RCOK
};
36 static enum rc exrc_isok
__P((SCR
*, struct stat
*, const char *, int, int));
38 static int ex_run_file
__P((SCR
*, const char *));
44 * PUBLIC: int ex_screen_copy __P((SCR *, SCR *));
47 ex_screen_copy(SCR
*orig
, SCR
*sp
)
49 EX_PRIVATE
*oexp
, *nexp
;
51 /* Create the private ex structure. */
52 CALLOC_RET(orig
, nexp
, EX_PRIVATE
*, 1, sizeof(EX_PRIVATE
));
53 sp
->ex_private
= nexp
;
55 /* Initialize queues. */
56 CIRCLEQ_INIT(&nexp
->tq
);
57 TAILQ_INIT(&nexp
->tagfq
);
58 LIST_INIT(&nexp
->cscq
);
64 if (oexp
->lastbcomm
!= NULL
&&
65 (nexp
->lastbcomm
= v_wstrdup(sp
, oexp
->lastbcomm
,
66 STRLEN(oexp
->lastbcomm
))) == NULL
) {
67 msgq(sp
, M_SYSERR
, NULL
);
70 if (ex_tag_copy(orig
, sp
))
80 * PUBLIC: int ex_screen_end __P((SCR *));
83 ex_screen_end(SCR
*sp
)
88 if ((exp
= EXP(sp
)) == NULL
)
93 /* Close down script connections. */
94 if (F_ISSET(sp
, SC_SCRIPT
) && sscr_end(sp
))
100 if (exp
->ibp
!= NULL
)
103 if (exp
->lastbcomm
!= NULL
)
104 free(exp
->lastbcomm
);
109 /* Free private memory. */
111 sp
->ex_private
= NULL
;
118 * Handle change of options for ex.
120 * PUBLIC: int ex_optchange __P((SCR *, int, const char *, u_long *));
123 ex_optchange(SCR
*sp
, int offset
, const char *str
, u_long
*valp
)
127 return (ex_tagf_alloc(sp
, str
));
134 * Read the EXINIT environment variable and the startup exrc files,
135 * and execute their commands.
137 * PUBLIC: int ex_exrc __P((SCR *));
142 struct stat hsb
, lsb
;
143 char *p
, path
[MAXPATHLEN
];
148 * Source the system, environment, $HOME and local .exrc values.
149 * Vi historically didn't check $HOME/.exrc if the environment
150 * variable EXINIT was set. This is all done before the file is
151 * read in, because things in the .exrc information can set, for
152 * example, the recovery directory.
155 * While nvi can handle any of the options settings of historic vi,
156 * the converse is not true. Since users are going to have to have
157 * files and environmental variables that work with both, we use nvi
158 * versions of both the $HOME and local startup files if they exist,
159 * otherwise the historic ones.
162 * For a discussion of permissions and when what .exrc files are
163 * read, see the comment above the exrc_isok() function below.
166 * If the user started the historic of vi in $HOME, vi read the user's
167 * .exrc file twice, as $HOME/.exrc and as ./.exrc. We avoid this, as
168 * it's going to make some commands behave oddly, and I can't imagine
169 * anyone depending on it.
171 switch (exrc_isok(sp
, &hsb
, _PATH_SYSEXRC
, 1, 0)) {
176 if (ex_run_file(sp
, _PATH_SYSEXRC
))
181 /* Run the commands. */
182 if (EXCMD_RUNNING(sp
->wp
))
184 if (F_ISSET(sp
, SC_EXIT
| SC_EXIT_FORCE
))
187 if ((p
= getenv("NEXINIT")) != NULL
) {
188 CHAR2INT(sp
, p
, strlen(p
) + 1, wp
, wlen
);
189 if (ex_run_str(sp
, "NEXINIT", wp
, wlen
- 1, 1, 0))
191 } else if ((p
= getenv("EXINIT")) != NULL
) {
192 CHAR2INT(sp
, p
, strlen(p
) + 1, wp
, wlen
);
193 if (ex_run_str(sp
, "EXINIT", wp
, wlen
- 1, 1, 0))
195 } else if ((p
= getenv("HOME")) != NULL
&& *p
) {
196 (void)snprintf(path
, sizeof(path
), "%s/%s", p
, _PATH_NEXRC
);
197 switch (exrc_isok(sp
, &hsb
, path
, 0, 1)) {
200 sizeof(path
), "%s/%s", p
, _PATH_EXRC
);
202 &hsb
, path
, 0, 1) == RCOK
&& ex_run_file(sp
, path
))
208 if (ex_run_file(sp
, path
))
214 /* Run the commands. */
215 if (EXCMD_RUNNING(sp
->wp
))
217 if (F_ISSET(sp
, SC_EXIT
| SC_EXIT_FORCE
))
220 /* Previous commands may have set the exrc option. */
221 if (O_ISSET(sp
, O_EXRC
)) {
222 switch (exrc_isok(sp
, &lsb
, _PATH_NEXRC
, 0, 0)) {
224 if (exrc_isok(sp
, &lsb
, _PATH_EXRC
, 0, 0) == RCOK
&&
225 (lsb
.st_dev
!= hsb
.st_dev
||
226 lsb
.st_ino
!= hsb
.st_ino
) &&
227 ex_run_file(sp
, _PATH_EXRC
))
233 if ((lsb
.st_dev
!= hsb
.st_dev
||
234 lsb
.st_ino
!= hsb
.st_ino
) &&
235 ex_run_file(sp
, _PATH_NEXRC
))
239 /* Run the commands. */
240 if (EXCMD_RUNNING(sp
->wp
))
242 if (F_ISSET(sp
, SC_EXIT
| SC_EXIT_FORCE
))
251 * Set up a file of ex commands to run.
254 ex_run_file(SCR
*sp
, const char *name
)
260 ex_cinit(sp
, &cmd
, C_SOURCE
, 0, OOBLNO
, OOBLNO
, 0);
261 CHAR2INT(sp
, name
, strlen(name
)+1, wp
, wlen
);
262 argv_exp0(sp
, &cmd
, wp
, wlen
- 1);
263 return (ex_source(sp
, &cmd
));
268 * Set up a string of ex commands to run.
270 * PUBLIC: int ex_run_str __P((SCR *, char *, CHAR_T *, size_t, int, int));
273 ex_run_str(SCR
*sp
, const char *name
, const CHAR_T
*str
, size_t len
, int ex_flags
, int nocopy
)
279 if (EXCMD_RUNNING(wp
)) {
280 CALLOC_RET(sp
, ecp
, EXCMD
*, 1, sizeof(EXCMD
));
281 LIST_INSERT_HEAD(&wp
->ecq
, ecp
, q
);
286 ex_flags
? E_BLIGNORE
| E_NOAUTO
| E_NOPRDEF
| E_VLITONLY
: 0);
289 ecp
->cp
= __UNCONST(str
);
291 if ((ecp
->cp
= v_wstrdup(sp
, str
, len
)) == NULL
)
298 if ((ecp
->if_name
= v_strdup(sp
, name
, strlen(name
))) == NULL
)
301 F_SET(ecp
, E_NAMEDISCARD
);
309 * Check a .exrc file for source-ability.
312 * Historically, vi read the $HOME and local .exrc files if they were owned
313 * by the user's real ID, or the "sourceany" option was set, regardless of
314 * any other considerations. We no longer support the sourceany option as
315 * it's a security problem of mammoth proportions. We require the system
316 * .exrc file to be owned by root, the $HOME .exrc file to be owned by the
317 * user's effective ID (or that the user's effective ID be root) and the
318 * local .exrc files to be owned by the user's effective ID. In all cases,
319 * the file cannot be writeable by anyone other than its owner.
321 * In O'Reilly ("Learning the VI Editor", Fifth Ed., May 1992, page 106),
322 * it notes that System V release 3.2 and later has an option "[no]exrc".
323 * The behavior is that local .exrc files are read only if the exrc option
324 * is set. The default for the exrc option was off, so, by default, local
325 * .exrc files were not read. The problem this was intended to solve was
326 * that System V permitted users to give away files, so there's no possible
327 * ownership or writeability test to ensure that the file is safe.
329 * POSIX 1003.2-1992 standardized exrc as an option. It required the exrc
330 * option to be off by default, thus local .exrc files are not to be read
331 * by default. The Rationale noted (incorrectly) that this was a change
332 * to historic practice, but correctly noted that a default of off improves
333 * system security. POSIX also required that vi check the effective user
334 * ID instead of the real user ID, which is why we've switched from historic
337 * We initialize the exrc variable to off. If it's turned on by the system
338 * or $HOME .exrc files, and the local .exrc file passes the ownership and
339 * writeability tests, then we read it. This breaks historic 4BSD practice,
340 * but it gives us a measure of security on systems where users can give away
344 exrc_isok(SCR
*sp
, struct stat
*sbp
, const char *path
, int rootown
, int rootid
)
346 enum { ROOTOWN
, OWN
, WRITER
} etype
;
349 char *a
, *b
, buf
[MAXPATHLEN
];
351 /* Check for the file's existence. */
355 /* Check ownership permissions. */
357 if (!(rootown
&& sbp
->st_uid
== 0) &&
358 !(rootid
&& euid
== 0) && sbp
->st_uid
!= euid
) {
359 etype
= rootown
? ROOTOWN
: OWN
;
363 /* Check writeability. */
364 if (sbp
->st_mode
& (S_IWGRP
| S_IWOTH
)) {
370 denied
: a
= msg_print(sp
, path
, &nf1
);
371 if (strchr(path
, '/') == NULL
&& getcwd(buf
, sizeof(buf
)) != NULL
) {
372 b
= msg_print(sp
, buf
, &nf2
);
376 "125|%s/%s: not sourced: not owned by you or root",
381 "126|%s/%s: not sourced: not owned by you", b
, a
);
385 "127|%s/%s: not sourced: writeable by a user other than the owner", b
, a
);
389 FREE_SPACE(sp
, b
, 0);
394 "128|%s: not sourced: not owned by you or root", a
);
398 "129|%s: not sourced: not owned by you", a
);
402 "130|%s: not sourced: writeable by a user other than the owner", a
);
407 FREE_SPACE(sp
, a
, 0);