2003-06-05 09:14:21 +02:00
|
|
|
/* exec.c - generic call-a-program code
|
2006-04-19 13:26:11 +02:00
|
|
|
* Copyright (C) 2001, 2002, 2003, 2004, 2005 Free Software Foundation, Inc.
|
2003-06-05 09:14:21 +02:00
|
|
|
*
|
|
|
|
* This file is part of GnuPG.
|
|
|
|
*
|
|
|
|
* GnuPG is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
2007-07-04 21:49:40 +02:00
|
|
|
* the Free Software Foundation; either version 3 of the License, or
|
2003-06-05 09:14:21 +02:00
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* GnuPG is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2007-07-04 21:49:40 +02:00
|
|
|
* along with this program; if not, see <http://www.gnu.org/licenses/>.
|
2003-06-05 09:14:21 +02:00
|
|
|
*/
|
|
|
|
|
2011-02-04 12:57:53 +01:00
|
|
|
/*
|
2009-07-13 19:36:02 +02:00
|
|
|
FIXME: We should replace most code in this module by our
|
|
|
|
spawn implementation from common/exechelp.c.
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
2003-06-05 09:14:21 +02:00
|
|
|
#include <config.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <stdarg.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#ifndef EXEC_TEMPFILE_ONLY
|
|
|
|
#include <sys/wait.h>
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_DOSISH_SYSTEM
|
2014-03-07 09:46:44 +01:00
|
|
|
# ifdef HAVE_WINSOCK2_H
|
|
|
|
# include <winsock2.h>
|
|
|
|
# endif
|
|
|
|
# include <windows.h>
|
2003-06-05 09:14:21 +02:00
|
|
|
#endif
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
2006-04-19 13:26:11 +02:00
|
|
|
|
|
|
|
#include "gpg.h"
|
2003-06-05 09:14:21 +02:00
|
|
|
#include "options.h"
|
|
|
|
#include "i18n.h"
|
|
|
|
#include "iobuf.h"
|
|
|
|
#include "util.h"
|
2009-07-13 19:36:02 +02:00
|
|
|
#include "membuf.h"
|
2014-11-11 15:14:31 +01:00
|
|
|
#include "sysutils.h"
|
2003-06-05 09:14:21 +02:00
|
|
|
#include "exec.h"
|
|
|
|
|
|
|
|
#ifdef NO_EXEC
|
2011-02-04 12:57:53 +01:00
|
|
|
int
|
2009-07-13 19:36:02 +02:00
|
|
|
exec_write(struct exec_info **info,const char *program,
|
2003-06-05 09:14:21 +02:00
|
|
|
const char *args_in,const char *name,int writeonly,int binary)
|
|
|
|
{
|
|
|
|
log_error(_("no remote program execution supported\n"));
|
2015-01-22 12:06:11 +01:00
|
|
|
return GPG_ERR_GENERAL;
|
2003-06-05 09:14:21 +02:00
|
|
|
}
|
|
|
|
|
2009-07-13 19:36:02 +02:00
|
|
|
int
|
2015-01-22 12:06:11 +01:00
|
|
|
exec_read(struct exec_info *info) { return GPG_ERR_GENERAL; }
|
2009-07-13 19:36:02 +02:00
|
|
|
int
|
2015-01-22 12:06:11 +01:00
|
|
|
exec_finish(struct exec_info *info) { return GPG_ERR_GENERAL; }
|
2009-07-13 19:36:02 +02:00
|
|
|
int
|
2015-01-22 12:06:11 +01:00
|
|
|
set_exec_path(const char *path) { return GPG_ERR_GENERAL; }
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
#else /* ! NO_EXEC */
|
|
|
|
|
2003-09-23 19:48:33 +02:00
|
|
|
#if defined (_WIN32)
|
2003-06-05 09:14:21 +02:00
|
|
|
/* This is a nicer system() for windows that waits for programs to
|
|
|
|
return before returning control to the caller. I hate helpful
|
|
|
|
computers. */
|
2011-02-04 12:57:53 +01:00
|
|
|
static int
|
2009-07-13 19:36:02 +02:00
|
|
|
w32_system(const char *command)
|
2003-06-05 09:14:21 +02:00
|
|
|
{
|
2010-04-14 16:39:16 +02:00
|
|
|
#ifdef HAVE_W32CE_SYSTEM
|
|
|
|
#warning Change this code to use common/exechelp.c
|
|
|
|
#else
|
2003-06-05 09:14:21 +02:00
|
|
|
PROCESS_INFORMATION pi;
|
|
|
|
STARTUPINFO si;
|
|
|
|
char *string;
|
|
|
|
|
|
|
|
/* We must use a copy of the command as CreateProcess modifies this
|
|
|
|
argument. */
|
2006-04-19 13:26:11 +02:00
|
|
|
string=xstrdup(command);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
memset(&pi,0,sizeof(pi));
|
|
|
|
memset(&si,0,sizeof(si));
|
|
|
|
si.cb=sizeof(si);
|
|
|
|
|
2009-07-13 19:36:02 +02:00
|
|
|
if(!CreateProcess(NULL,string,NULL,NULL,FALSE,
|
|
|
|
DETACHED_PROCESS,
|
|
|
|
NULL,NULL,&si,&pi))
|
2003-06-05 09:14:21 +02:00
|
|
|
return -1;
|
|
|
|
|
|
|
|
/* Wait for the child to exit */
|
|
|
|
WaitForSingleObject(pi.hProcess,INFINITE);
|
|
|
|
|
|
|
|
CloseHandle(pi.hProcess);
|
|
|
|
CloseHandle(pi.hThread);
|
2006-04-19 13:26:11 +02:00
|
|
|
xfree(string);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
return 0;
|
2010-04-14 16:39:16 +02:00
|
|
|
#endif
|
2003-06-05 09:14:21 +02:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
/* Replaces current $PATH */
|
2011-02-04 12:57:53 +01:00
|
|
|
int
|
2009-07-13 19:36:02 +02:00
|
|
|
set_exec_path(const char *path)
|
2003-06-05 09:14:21 +02:00
|
|
|
{
|
2010-04-14 16:39:16 +02:00
|
|
|
#ifdef HAVE_W32CE_SYSTEM
|
|
|
|
#warning Change this code to use common/exechelp.c
|
|
|
|
#else
|
2006-04-19 13:26:11 +02:00
|
|
|
char *p;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
p=xmalloc(5+strlen(path)+1);
|
2003-06-05 09:14:21 +02:00
|
|
|
strcpy(p,"PATH=");
|
|
|
|
strcat(p,path);
|
|
|
|
|
|
|
|
if(DBG_EXTPROG)
|
2006-04-19 13:26:11 +02:00
|
|
|
log_debug("set_exec_path: %s\n",p);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
/* Notice that path is never freed. That is intentional due to the
|
|
|
|
way putenv() works. This leaks a few bytes if we call
|
|
|
|
set_exec_path multiple times. */
|
|
|
|
|
|
|
|
if(putenv(p)!=0)
|
2015-01-22 12:06:11 +01:00
|
|
|
return GPG_ERR_GENERAL;
|
2003-06-05 09:14:21 +02:00
|
|
|
else
|
|
|
|
return 0;
|
2010-04-14 16:39:16 +02:00
|
|
|
#endif
|
2003-06-05 09:14:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Makes a temp directory and filenames */
|
2011-02-04 12:57:53 +01:00
|
|
|
static int
|
2009-07-13 19:36:02 +02:00
|
|
|
make_tempdir(struct exec_info *info)
|
2003-06-05 09:14:21 +02:00
|
|
|
{
|
|
|
|
char *tmp=opt.temp_dir,*namein=info->name,*nameout;
|
|
|
|
|
|
|
|
if(!namein)
|
2006-04-19 13:26:11 +02:00
|
|
|
namein=info->flags.binary?"tempin" EXTSEP_S "bin":"tempin" EXTSEP_S "txt";
|
2003-06-05 09:14:21 +02:00
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
nameout=info->flags.binary?"tempout" EXTSEP_S "bin":"tempout" EXTSEP_S "txt";
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
/* Make up the temp dir and files in case we need them */
|
|
|
|
|
|
|
|
if(tmp==NULL)
|
|
|
|
{
|
2003-09-23 19:48:33 +02:00
|
|
|
#if defined (_WIN32)
|
2006-06-27 16:30:59 +02:00
|
|
|
int err;
|
|
|
|
|
|
|
|
tmp=xmalloc(MAX_PATH+2);
|
|
|
|
err=GetTempPath(MAX_PATH+1,tmp);
|
|
|
|
if(err==0 || err>MAX_PATH+1)
|
2003-06-05 09:14:21 +02:00
|
|
|
strcpy(tmp,"c:\\windows\\temp");
|
|
|
|
else
|
|
|
|
{
|
|
|
|
int len=strlen(tmp);
|
|
|
|
|
|
|
|
/* GetTempPath may return with \ on the end */
|
|
|
|
while(len>0 && tmp[len-1]=='\\')
|
|
|
|
{
|
|
|
|
tmp[len-1]='\0';
|
|
|
|
len--;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#else /* More unixish systems */
|
|
|
|
tmp=getenv("TMPDIR");
|
|
|
|
if(tmp==NULL)
|
|
|
|
{
|
|
|
|
tmp=getenv("TMP");
|
|
|
|
if(tmp==NULL)
|
|
|
|
{
|
|
|
|
#ifdef __riscos__
|
|
|
|
tmp="<Wimp$ScrapDir>.GnuPG";
|
|
|
|
mkdir(tmp,0700); /* Error checks occur later on */
|
|
|
|
#else
|
|
|
|
tmp="/tmp";
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
info->tempdir=xmalloc(strlen(tmp)+strlen(DIRSEP_S)+10+1);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
sprintf(info->tempdir,"%s" DIRSEP_S "gpg-XXXXXX",tmp);
|
|
|
|
|
2003-09-23 19:48:33 +02:00
|
|
|
#if defined (_WIN32)
|
2006-04-19 13:26:11 +02:00
|
|
|
xfree(tmp);
|
2003-06-05 09:14:21 +02:00
|
|
|
#endif
|
|
|
|
|
2014-11-11 15:14:31 +01:00
|
|
|
if (!gnupg_mkdtemp(info->tempdir))
|
2012-06-05 19:29:22 +02:00
|
|
|
log_error(_("can't create directory '%s': %s\n"),
|
2003-06-05 09:14:21 +02:00
|
|
|
info->tempdir,strerror(errno));
|
|
|
|
else
|
|
|
|
{
|
2006-04-19 13:26:11 +02:00
|
|
|
info->flags.madedir=1;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
info->tempfile_in=xmalloc(strlen(info->tempdir)+
|
2003-06-05 09:14:21 +02:00
|
|
|
strlen(DIRSEP_S)+strlen(namein)+1);
|
|
|
|
sprintf(info->tempfile_in,"%s" DIRSEP_S "%s",info->tempdir,namein);
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
if(!info->flags.writeonly)
|
2003-06-05 09:14:21 +02:00
|
|
|
{
|
2006-04-19 13:26:11 +02:00
|
|
|
info->tempfile_out=xmalloc(strlen(info->tempdir)+
|
2003-06-05 09:14:21 +02:00
|
|
|
strlen(DIRSEP_S)+strlen(nameout)+1);
|
|
|
|
sprintf(info->tempfile_out,"%s" DIRSEP_S "%s",info->tempdir,nameout);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-22 12:06:11 +01:00
|
|
|
return info->flags.madedir? 0 : GPG_ERR_GENERAL;
|
2003-06-05 09:14:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Expands %i and %o in the args to the full temp files within the
|
|
|
|
temp directory. */
|
2011-02-04 12:57:53 +01:00
|
|
|
static int
|
2009-07-13 19:36:02 +02:00
|
|
|
expand_args(struct exec_info *info,const char *args_in)
|
2003-06-05 09:14:21 +02:00
|
|
|
{
|
2009-07-13 19:36:02 +02:00
|
|
|
const char *ch = args_in;
|
|
|
|
membuf_t command;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
info->flags.use_temp_files=0;
|
|
|
|
info->flags.keep_temp_files=0;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
if(DBG_EXTPROG)
|
|
|
|
log_debug("expanding string \"%s\"\n",args_in);
|
|
|
|
|
2009-07-13 19:36:02 +02:00
|
|
|
init_membuf (&command, 100);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
while(*ch!='\0')
|
|
|
|
{
|
|
|
|
if(*ch=='%')
|
|
|
|
{
|
|
|
|
char *append=NULL;
|
|
|
|
|
|
|
|
ch++;
|
|
|
|
|
|
|
|
switch(*ch)
|
|
|
|
{
|
|
|
|
case 'O':
|
2006-04-19 13:26:11 +02:00
|
|
|
info->flags.keep_temp_files=1;
|
2003-06-05 09:14:21 +02:00
|
|
|
/* fall through */
|
|
|
|
|
|
|
|
case 'o': /* out */
|
2006-04-19 13:26:11 +02:00
|
|
|
if(!info->flags.madedir)
|
2003-06-05 09:14:21 +02:00
|
|
|
{
|
|
|
|
if(make_tempdir(info))
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
append=info->tempfile_out;
|
2006-04-19 13:26:11 +02:00
|
|
|
info->flags.use_temp_files=1;
|
2003-06-05 09:14:21 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
case 'I':
|
2006-04-19 13:26:11 +02:00
|
|
|
info->flags.keep_temp_files=1;
|
2003-06-05 09:14:21 +02:00
|
|
|
/* fall through */
|
|
|
|
|
|
|
|
case 'i': /* in */
|
2006-04-19 13:26:11 +02:00
|
|
|
if(!info->flags.madedir)
|
2003-06-05 09:14:21 +02:00
|
|
|
{
|
|
|
|
if(make_tempdir(info))
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
append=info->tempfile_in;
|
2006-04-19 13:26:11 +02:00
|
|
|
info->flags.use_temp_files=1;
|
2003-06-05 09:14:21 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
case '%':
|
|
|
|
append="%";
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(append)
|
2009-07-13 19:36:02 +02:00
|
|
|
put_membuf_str (&command, append);
|
2003-06-05 09:14:21 +02:00
|
|
|
}
|
|
|
|
else
|
2009-07-13 19:36:02 +02:00
|
|
|
put_membuf (&command, ch, 1);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
ch++;
|
|
|
|
}
|
|
|
|
|
2009-07-13 19:36:02 +02:00
|
|
|
put_membuf (&command, "", 1); /* Terminate string. */
|
|
|
|
|
|
|
|
info->command = get_membuf (&command, NULL);
|
|
|
|
if (!info->command)
|
|
|
|
return gpg_error_from_syserror ();
|
|
|
|
|
2003-06-05 09:14:21 +02:00
|
|
|
if(DBG_EXTPROG)
|
2006-04-19 13:26:11 +02:00
|
|
|
log_debug("args expanded to \"%s\", use %u, keep %u\n",info->command,
|
|
|
|
info->flags.use_temp_files,info->flags.keep_temp_files);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
fail:
|
2009-07-13 19:36:02 +02:00
|
|
|
xfree (get_membuf (&command, NULL));
|
2015-01-22 12:06:11 +01:00
|
|
|
return GPG_ERR_GENERAL;
|
2003-06-05 09:14:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Either handles the tempfile creation, or the fork/exec. If it
|
|
|
|
returns ok, then info->tochild is a FILE * that can be written to.
|
|
|
|
The rules are: if there are no args, then it's a fork/exec/pipe.
|
|
|
|
If there are args, but no tempfiles, then it's a fork/exec/pipe via
|
|
|
|
shell -c. If there are tempfiles, then it's a system. */
|
|
|
|
|
2011-02-04 12:57:53 +01:00
|
|
|
int
|
2009-07-13 19:36:02 +02:00
|
|
|
exec_write(struct exec_info **info,const char *program,
|
|
|
|
const char *args_in,const char *name,int writeonly,int binary)
|
2003-06-05 09:14:21 +02:00
|
|
|
{
|
2015-01-22 12:06:11 +01:00
|
|
|
int ret = GPG_ERR_GENERAL;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
if(opt.exec_disable && !opt.no_perm_warn)
|
|
|
|
{
|
|
|
|
log_info(_("external program calls are disabled due to unsafe "
|
|
|
|
"options file permissions\n"));
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(HAVE_GETUID) && defined(HAVE_GETEUID)
|
|
|
|
/* There should be no way to get to this spot while still carrying
|
2008-07-17 21:49:51 +02:00
|
|
|
setuid privs. Just in case, bomb out if we are. */
|
|
|
|
if ( getuid () != geteuid ())
|
2008-07-17 21:40:53 +02:00
|
|
|
BUG ();
|
2003-06-05 09:14:21 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
if(program==NULL && args_in==NULL)
|
|
|
|
BUG();
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
*info=xmalloc_clear(sizeof(struct exec_info));
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
if(name)
|
2006-04-19 13:26:11 +02:00
|
|
|
(*info)->name=xstrdup(name);
|
|
|
|
(*info)->flags.binary=binary;
|
|
|
|
(*info)->flags.writeonly=writeonly;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
/* Expand the args, if any */
|
|
|
|
if(args_in && expand_args(*info,args_in))
|
|
|
|
goto fail;
|
|
|
|
|
|
|
|
#ifdef EXEC_TEMPFILE_ONLY
|
2006-04-19 13:26:11 +02:00
|
|
|
if(!(*info)->flags.use_temp_files)
|
2003-06-05 09:14:21 +02:00
|
|
|
{
|
2006-04-19 13:26:11 +02:00
|
|
|
log_error(_("this platform requires temporary files when calling"
|
|
|
|
" external programs\n"));
|
2003-06-05 09:14:21 +02:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
#else /* !EXEC_TEMPFILE_ONLY */
|
|
|
|
|
|
|
|
/* If there are no args, or there are args, but no temp files, we
|
|
|
|
can use fork/exec/pipe */
|
2006-04-19 13:26:11 +02:00
|
|
|
if(args_in==NULL || (*info)->flags.use_temp_files==0)
|
2003-06-05 09:14:21 +02:00
|
|
|
{
|
|
|
|
int to[2],from[2];
|
|
|
|
|
|
|
|
if(pipe(to)==-1)
|
|
|
|
goto fail;
|
|
|
|
|
|
|
|
if(pipe(from)==-1)
|
|
|
|
{
|
|
|
|
close(to[0]);
|
|
|
|
close(to[1]);
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(((*info)->child=fork())==-1)
|
|
|
|
{
|
|
|
|
close(to[0]);
|
|
|
|
close(to[1]);
|
|
|
|
close(from[0]);
|
|
|
|
close(from[1]);
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
if((*info)->child==0)
|
|
|
|
{
|
|
|
|
char *shell=getenv("SHELL");
|
|
|
|
|
|
|
|
if(shell==NULL)
|
|
|
|
shell="/bin/sh";
|
|
|
|
|
|
|
|
/* I'm the child */
|
|
|
|
|
|
|
|
/* If the program isn't going to respond back, they get to
|
|
|
|
keep their stdout/stderr */
|
2006-04-19 13:26:11 +02:00
|
|
|
if(!(*info)->flags.writeonly)
|
2003-06-05 09:14:21 +02:00
|
|
|
{
|
|
|
|
/* implied close of STDERR */
|
|
|
|
if(dup2(STDOUT_FILENO,STDERR_FILENO)==-1)
|
|
|
|
_exit(1);
|
|
|
|
|
|
|
|
/* implied close of STDOUT */
|
|
|
|
close(from[0]);
|
|
|
|
if(dup2(from[1],STDOUT_FILENO)==-1)
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* implied close of STDIN */
|
|
|
|
close(to[1]);
|
|
|
|
if(dup2(to[0],STDIN_FILENO)==-1)
|
|
|
|
_exit(1);
|
|
|
|
|
|
|
|
if(args_in==NULL)
|
|
|
|
{
|
|
|
|
if(DBG_EXTPROG)
|
|
|
|
log_debug("execlp: %s\n",program);
|
|
|
|
|
|
|
|
execlp(program,program,(void *)NULL);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if(DBG_EXTPROG)
|
|
|
|
log_debug("execlp: %s -c %s\n",shell,(*info)->command);
|
|
|
|
|
|
|
|
execlp(shell,shell,"-c",(*info)->command,(void *)NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If we get this far the exec failed. Clean up and return. */
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
if(args_in==NULL)
|
2012-06-05 19:29:22 +02:00
|
|
|
log_error(_("unable to execute program '%s': %s\n"),
|
2006-04-19 13:26:11 +02:00
|
|
|
program,strerror(errno));
|
|
|
|
else
|
2012-06-05 19:29:22 +02:00
|
|
|
log_error(_("unable to execute shell '%s': %s\n"),
|
2006-04-19 13:26:11 +02:00
|
|
|
shell,strerror(errno));
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
/* This mimics the POSIX sh behavior - 127 means "not found"
|
|
|
|
from the shell. */
|
|
|
|
if(errno==ENOENT)
|
|
|
|
_exit(127);
|
|
|
|
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* I'm the parent */
|
|
|
|
|
|
|
|
close(to[0]);
|
|
|
|
|
|
|
|
(*info)->tochild=fdopen(to[1],binary?"wb":"w");
|
|
|
|
if((*info)->tochild==NULL)
|
|
|
|
{
|
2006-09-14 18:50:33 +02:00
|
|
|
ret = gpg_error_from_syserror ();
|
2003-06-05 09:14:21 +02:00
|
|
|
close(to[1]);
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
close(from[1]);
|
|
|
|
|
|
|
|
(*info)->fromchild=iobuf_fdopen(from[0],"r");
|
|
|
|
if((*info)->fromchild==NULL)
|
|
|
|
{
|
2006-09-14 18:50:33 +02:00
|
|
|
ret = gpg_error_from_syserror ();
|
2003-06-05 09:14:21 +02:00
|
|
|
close(from[0]);
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
2010-03-08 18:05:37 +01:00
|
|
|
/* fd iobufs are cached! */
|
|
|
|
iobuf_ioctl((*info)->fromchild, IOBUF_IOCTL_NO_CACHE, 1, NULL);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif /* !EXEC_TEMPFILE_ONLY */
|
|
|
|
|
|
|
|
if(DBG_EXTPROG)
|
2012-06-05 19:29:22 +02:00
|
|
|
log_debug("using temp file '%s'\n",(*info)->tempfile_in);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
/* It's not fork/exec/pipe, so create a temp file */
|
2006-04-19 13:26:11 +02:00
|
|
|
if( is_secured_filename ((*info)->tempfile_in) )
|
|
|
|
{
|
|
|
|
(*info)->tochild = NULL;
|
2010-04-01 15:24:55 +02:00
|
|
|
gpg_err_set_errno (EPERM);
|
2006-04-19 13:26:11 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
(*info)->tochild=fopen((*info)->tempfile_in,binary?"wb":"w");
|
2003-06-05 09:14:21 +02:00
|
|
|
if((*info)->tochild==NULL)
|
|
|
|
{
|
2006-09-14 18:50:33 +02:00
|
|
|
ret = gpg_error_from_syserror ();
|
2012-06-05 19:29:22 +02:00
|
|
|
log_error(_("can't create '%s': %s\n"),
|
2003-06-05 09:14:21 +02:00
|
|
|
(*info)->tempfile_in,strerror(errno));
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret=0;
|
|
|
|
|
|
|
|
fail:
|
2009-07-13 19:36:02 +02:00
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
xfree (*info);
|
|
|
|
*info = NULL;
|
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2009-07-13 19:36:02 +02:00
|
|
|
int
|
|
|
|
exec_read(struct exec_info *info)
|
2003-06-05 09:14:21 +02:00
|
|
|
{
|
2015-01-22 12:06:11 +01:00
|
|
|
int ret = GPG_ERR_GENERAL;
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
fclose(info->tochild);
|
|
|
|
info->tochild=NULL;
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
if(info->flags.use_temp_files)
|
2003-06-05 09:14:21 +02:00
|
|
|
{
|
|
|
|
if(DBG_EXTPROG)
|
|
|
|
log_debug("system() command is %s\n",info->command);
|
|
|
|
|
2003-09-23 19:48:33 +02:00
|
|
|
#if defined (_WIN32)
|
2006-04-19 13:26:11 +02:00
|
|
|
info->progreturn=w32_system(info->command);
|
2003-06-05 09:14:21 +02:00
|
|
|
#else
|
|
|
|
info->progreturn=system(info->command);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if(info->progreturn==-1)
|
|
|
|
{
|
|
|
|
log_error(_("system error while calling external program: %s\n"),
|
|
|
|
strerror(errno));
|
|
|
|
info->progreturn=127;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(WIFEXITED) && defined(WEXITSTATUS)
|
|
|
|
if(WIFEXITED(info->progreturn))
|
|
|
|
info->progreturn=WEXITSTATUS(info->progreturn);
|
|
|
|
else
|
|
|
|
{
|
|
|
|
log_error(_("unnatural exit of external program\n"));
|
|
|
|
info->progreturn=127;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
/* If we don't have the macros, do the best we can. */
|
|
|
|
info->progreturn = (info->progreturn & 0xff00) >> 8;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* 127 is the magic value returned from system() to indicate
|
|
|
|
that the shell could not be executed, or from /bin/sh to
|
|
|
|
indicate that the program could not be executed. */
|
|
|
|
|
|
|
|
if(info->progreturn==127)
|
|
|
|
{
|
|
|
|
log_error(_("unable to execute external program\n"));
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
if(!info->flags.writeonly)
|
2003-06-05 09:14:21 +02:00
|
|
|
{
|
|
|
|
info->fromchild=iobuf_open(info->tempfile_out);
|
2006-04-19 13:26:11 +02:00
|
|
|
if (info->fromchild
|
|
|
|
&& is_secured_file (iobuf_get_fd (info->fromchild)))
|
|
|
|
{
|
|
|
|
iobuf_close (info->fromchild);
|
|
|
|
info->fromchild = NULL;
|
2010-04-01 15:24:55 +02:00
|
|
|
gpg_err_set_errno (EPERM);
|
2006-04-19 13:26:11 +02:00
|
|
|
}
|
2003-06-05 09:14:21 +02:00
|
|
|
if(info->fromchild==NULL)
|
|
|
|
{
|
2006-09-14 18:50:33 +02:00
|
|
|
ret = gpg_error_from_syserror ();
|
2003-06-05 09:14:21 +02:00
|
|
|
log_error(_("unable to read external program response: %s\n"),
|
|
|
|
strerror(errno));
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Do not cache this iobuf on close */
|
2010-03-08 18:05:37 +01:00
|
|
|
iobuf_ioctl(info->fromchild, IOBUF_IOCTL_NO_CACHE, 1, NULL);
|
2003-06-05 09:14:21 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ret=0;
|
|
|
|
|
|
|
|
fail:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2009-07-13 19:36:02 +02:00
|
|
|
int
|
|
|
|
exec_finish(struct exec_info *info)
|
2003-06-05 09:14:21 +02:00
|
|
|
{
|
|
|
|
int ret=info->progreturn;
|
|
|
|
|
|
|
|
if(info->fromchild)
|
|
|
|
iobuf_close(info->fromchild);
|
|
|
|
|
|
|
|
if(info->tochild)
|
|
|
|
fclose(info->tochild);
|
|
|
|
|
|
|
|
#ifndef EXEC_TEMPFILE_ONLY
|
|
|
|
if(info->child>0)
|
|
|
|
{
|
|
|
|
if(waitpid(info->child,&info->progreturn,0)!=0 &&
|
|
|
|
WIFEXITED(info->progreturn))
|
|
|
|
ret=WEXITSTATUS(info->progreturn);
|
|
|
|
else
|
|
|
|
{
|
|
|
|
log_error(_("unnatural exit of external program\n"));
|
|
|
|
ret=127;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
if(info->flags.madedir && !info->flags.keep_temp_files)
|
2003-06-05 09:14:21 +02:00
|
|
|
{
|
|
|
|
if(info->tempfile_in)
|
|
|
|
{
|
|
|
|
if(unlink(info->tempfile_in)==-1)
|
2012-06-05 19:29:22 +02:00
|
|
|
log_info(_("WARNING: unable to remove tempfile (%s) '%s': %s\n"),
|
2003-06-05 09:14:21 +02:00
|
|
|
"in",info->tempfile_in,strerror(errno));
|
|
|
|
}
|
2011-02-04 12:57:53 +01:00
|
|
|
|
2003-06-05 09:14:21 +02:00
|
|
|
if(info->tempfile_out)
|
|
|
|
{
|
|
|
|
if(unlink(info->tempfile_out)==-1)
|
2012-06-05 19:29:22 +02:00
|
|
|
log_info(_("WARNING: unable to remove tempfile (%s) '%s': %s\n"),
|
2003-06-05 09:14:21 +02:00
|
|
|
"out",info->tempfile_out,strerror(errno));
|
|
|
|
}
|
|
|
|
|
|
|
|
if(rmdir(info->tempdir)==-1)
|
2012-06-05 19:29:22 +02:00
|
|
|
log_info(_("WARNING: unable to remove temp directory '%s': %s\n"),
|
2003-06-05 09:14:21 +02:00
|
|
|
info->tempdir,strerror(errno));
|
|
|
|
}
|
|
|
|
|
2006-04-19 13:26:11 +02:00
|
|
|
xfree(info->command);
|
|
|
|
xfree(info->name);
|
|
|
|
xfree(info->tempdir);
|
|
|
|
xfree(info->tempfile_in);
|
|
|
|
xfree(info->tempfile_out);
|
|
|
|
xfree(info);
|
2003-06-05 09:14:21 +02:00
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
#endif /* ! NO_EXEC */
|