2004-04-23 18:16:08 +03:00
|
|
|
#include "config.h"
|
|
|
|
|
2006-08-04 19:01:26 +03:00
|
|
|
#ifdef __CYGWIN__
|
|
|
|
#include <windows.h>
|
|
|
|
#endif
|
|
|
|
|
2003-06-16 16:33:38 +03:00
|
|
|
#include <iostream>
|
2003-09-11 11:31:29 +03:00
|
|
|
#include <cerrno>
|
|
|
|
#include <cstdio>
|
2004-03-22 22:53:49 +02:00
|
|
|
#include <sstream>
|
2003-06-16 16:33:38 +03:00
|
|
|
|
2003-06-23 17:40:49 +03:00
|
|
|
#include <sys/stat.h>
|
2004-06-22 12:51:44 +03:00
|
|
|
#include <sys/wait.h>
|
2003-11-22 17:58:34 +02:00
|
|
|
#include <fcntl.h>
|
2003-06-23 17:40:49 +03:00
|
|
|
|
2003-05-26 16:45:00 +03:00
|
|
|
#include "util.hh"
|
|
|
|
|
|
|
|
|
2006-09-05 00:06:23 +03:00
|
|
|
namespace nix {
|
|
|
|
|
|
|
|
|
2003-06-27 17:56:12 +03:00
|
|
|
Error::Error(const format & f)
|
|
|
|
{
|
|
|
|
err = f.str();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-03-08 16:11:19 +02:00
|
|
|
Error & Error::addPrefix(const format & f)
|
|
|
|
{
|
|
|
|
err = f.str() + err;
|
|
|
|
return *this;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-06-27 17:56:12 +03:00
|
|
|
SysError::SysError(const format & f)
|
|
|
|
: Error(format("%1%: %2%") % f.str() % strerror(errno))
|
2003-06-16 16:33:38 +03:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2003-05-26 16:45:00 +03:00
|
|
|
|
2004-05-12 12:35:51 +03:00
|
|
|
string getEnv(const string & key, const string & def)
|
|
|
|
{
|
|
|
|
char * value = getenv(key.c_str());
|
|
|
|
return value ? string(value) : def;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-07 17:37:41 +03:00
|
|
|
Path absPath(Path path, Path dir)
|
2003-05-26 16:45:00 +03:00
|
|
|
{
|
2003-06-16 16:33:38 +03:00
|
|
|
if (path[0] != '/') {
|
2003-05-26 16:45:00 +03:00
|
|
|
if (dir == "") {
|
|
|
|
char buf[PATH_MAX];
|
|
|
|
if (!getcwd(buf, sizeof(buf)))
|
2003-06-16 16:33:38 +03:00
|
|
|
throw SysError("cannot get cwd");
|
2003-05-26 16:45:00 +03:00
|
|
|
dir = buf;
|
|
|
|
}
|
2003-06-16 16:33:38 +03:00
|
|
|
path = dir + "/" + path;
|
2003-05-26 16:45:00 +03:00
|
|
|
}
|
2003-07-07 12:25:26 +03:00
|
|
|
return canonPath(path);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-01-08 19:16:03 +02:00
|
|
|
Path canonPath(const Path & path, bool resolveSymlinks)
|
2003-07-07 12:25:26 +03:00
|
|
|
{
|
2003-07-08 22:58:41 +03:00
|
|
|
string s;
|
|
|
|
|
|
|
|
if (path[0] != '/')
|
|
|
|
throw Error(format("not an absolute path: `%1%'") % path);
|
|
|
|
|
|
|
|
string::const_iterator i = path.begin(), end = path.end();
|
2006-01-08 19:16:03 +02:00
|
|
|
string temp;
|
|
|
|
|
|
|
|
/* Count the number of times we follow a symlink and stop at some
|
|
|
|
arbitrary (but high) limit to prevent infinite loops. */
|
|
|
|
unsigned int followCount = 0, maxFollow = 1024;
|
2003-07-08 22:58:41 +03:00
|
|
|
|
|
|
|
while (1) {
|
|
|
|
|
|
|
|
/* Skip slashes. */
|
|
|
|
while (i != end && *i == '/') i++;
|
|
|
|
if (i == end) break;
|
|
|
|
|
|
|
|
/* Ignore `.'. */
|
|
|
|
if (*i == '.' && (i + 1 == end || i[1] == '/'))
|
|
|
|
i++;
|
|
|
|
|
|
|
|
/* If `..', delete the last component. */
|
|
|
|
else if (*i == '.' && i + 1 < end && i[1] == '.' &&
|
|
|
|
(i + 2 == end || i[2] == '/'))
|
|
|
|
{
|
|
|
|
if (!s.empty()) s.erase(s.rfind('/'));
|
|
|
|
i += 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Normal component; copy it. */
|
|
|
|
else {
|
|
|
|
s += '/';
|
|
|
|
while (i != end && *i != '/') s += *i++;
|
2006-01-08 19:16:03 +02:00
|
|
|
|
|
|
|
/* If s points to a symlink, resolve it and restart (since
|
|
|
|
the symlink target might contain new symlinks). */
|
|
|
|
if (resolveSymlinks && isLink(s)) {
|
|
|
|
followCount++;
|
|
|
|
if (followCount >= maxFollow)
|
|
|
|
throw Error(format("infinite symlink recursion in path `%1%'") % path);
|
|
|
|
temp = absPath(readLink(s), dirOf(s))
|
|
|
|
+ string(i, end);
|
|
|
|
i = temp.begin(); /* restart */
|
|
|
|
end = temp.end();
|
|
|
|
s = "";
|
|
|
|
/* !!! potential for infinite loop */
|
|
|
|
}
|
2003-07-08 22:58:41 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return s.empty() ? "/" : s;
|
2003-06-16 16:33:38 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-07 17:37:41 +03:00
|
|
|
Path dirOf(const Path & path)
|
2003-06-16 16:33:38 +03:00
|
|
|
{
|
2006-05-11 05:19:43 +03:00
|
|
|
Path::size_type pos = path.rfind('/');
|
2003-07-04 15:18:06 +03:00
|
|
|
if (pos == string::npos)
|
|
|
|
throw Error(format("invalid file name: %1%") % path);
|
2006-01-09 16:52:46 +02:00
|
|
|
return pos == 0 ? "/" : Path(path, 0, pos);
|
2003-05-26 16:45:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-07 17:37:41 +03:00
|
|
|
string baseNameOf(const Path & path)
|
2003-05-26 16:45:00 +03:00
|
|
|
{
|
2006-05-11 05:19:43 +03:00
|
|
|
Path::size_type pos = path.rfind('/');
|
2003-07-04 15:18:06 +03:00
|
|
|
if (pos == string::npos)
|
|
|
|
throw Error(format("invalid file name %1% ") % path);
|
2003-06-16 16:33:38 +03:00
|
|
|
return string(path, pos + 1);
|
2003-05-26 16:45:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-07 17:37:41 +03:00
|
|
|
bool pathExists(const Path & path)
|
2003-07-08 16:22:08 +03:00
|
|
|
{
|
|
|
|
int res;
|
|
|
|
struct stat st;
|
2004-02-06 12:59:06 +02:00
|
|
|
res = lstat(path.c_str(), &st);
|
2003-07-08 16:22:08 +03:00
|
|
|
if (!res) return true;
|
2004-08-04 12:25:21 +03:00
|
|
|
if (errno != ENOENT && errno != ENOTDIR)
|
2003-07-08 16:22:08 +03:00
|
|
|
throw SysError(format("getting status of %1%") % path);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-01-05 18:26:43 +02:00
|
|
|
Path readLink(const Path & path)
|
|
|
|
{
|
|
|
|
struct stat st;
|
|
|
|
if (lstat(path.c_str(), &st))
|
|
|
|
throw SysError(format("getting status of `%1%'") % path);
|
|
|
|
if (!S_ISLNK(st.st_mode))
|
|
|
|
throw Error(format("`%1%' is not a symlink") % path);
|
|
|
|
char buf[st.st_size];
|
|
|
|
if (readlink(path.c_str(), buf, st.st_size) != st.st_size)
|
|
|
|
throw SysError(format("reading symbolic link `%1%'") % path);
|
|
|
|
return string(buf, st.st_size);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-02-01 15:48:46 +02:00
|
|
|
bool isLink(const Path & path)
|
|
|
|
{
|
|
|
|
struct stat st;
|
|
|
|
if (lstat(path.c_str(), &st))
|
|
|
|
throw SysError(format("getting status of `%1%'") % path);
|
|
|
|
return S_ISLNK(st.st_mode);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-11-19 19:27:16 +02:00
|
|
|
Strings readDirectory(const Path & path)
|
|
|
|
{
|
|
|
|
Strings names;
|
|
|
|
|
|
|
|
AutoCloseDir dir = opendir(path.c_str());
|
|
|
|
if (!dir) throw SysError(format("opening directory `%1%'") % path);
|
|
|
|
|
|
|
|
struct dirent * dirent;
|
|
|
|
while (errno = 0, dirent = readdir(dir)) { /* sic */
|
2004-01-15 22:23:55 +02:00
|
|
|
checkInterrupt();
|
2003-11-19 19:27:16 +02:00
|
|
|
string name = dirent->d_name;
|
|
|
|
if (name == "." || name == "..") continue;
|
|
|
|
names.push_back(name);
|
|
|
|
}
|
|
|
|
if (errno) throw SysError(format("reading directory `%1%'") % path);
|
|
|
|
|
|
|
|
return names;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-02-02 00:07:48 +02:00
|
|
|
string readFile(int fd)
|
|
|
|
{
|
|
|
|
struct stat st;
|
|
|
|
if (fstat(fd, &st) == -1)
|
|
|
|
throw SysError("statting file");
|
|
|
|
unsigned char buf[st.st_size]; /* !!! stack space */
|
|
|
|
readFull(fd, buf, st.st_size);
|
|
|
|
|
|
|
|
return string((char *) buf, st.st_size);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
string readFile(const Path & path)
|
|
|
|
{
|
|
|
|
AutoCloseFD fd = open(path.c_str(), O_RDONLY);
|
|
|
|
if (fd == -1)
|
|
|
|
throw SysError(format("opening file `%1%'") % path);
|
|
|
|
return readFile(fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-02-09 11:50:29 +02:00
|
|
|
void writeFile(const Path & path, const string & s)
|
|
|
|
{
|
|
|
|
AutoCloseFD fd = open(path.c_str(), O_WRONLY | O_TRUNC | O_CREAT, 0666);
|
|
|
|
if (fd == -1)
|
|
|
|
throw SysError(format("opening file `%1%'") % path);
|
|
|
|
writeFull(fd, (unsigned char *) s.c_str(), s.size());
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-12-15 23:11:39 +02:00
|
|
|
static void _deletePath(const Path & path, unsigned long long & bytesFreed)
|
2003-06-23 17:40:49 +03:00
|
|
|
{
|
2004-01-15 22:23:55 +02:00
|
|
|
checkInterrupt();
|
|
|
|
|
2004-03-22 23:42:28 +02:00
|
|
|
printMsg(lvlVomit, format("%1%") % path);
|
2003-08-08 17:55:56 +03:00
|
|
|
|
2003-06-23 17:40:49 +03:00
|
|
|
struct stat st;
|
|
|
|
if (lstat(path.c_str(), &st))
|
2003-08-22 23:12:44 +03:00
|
|
|
throw SysError(format("getting attributes of path `%1%'") % path);
|
2003-06-23 17:40:49 +03:00
|
|
|
|
2005-12-15 23:11:39 +02:00
|
|
|
bytesFreed += st.st_size;
|
|
|
|
|
2003-06-23 17:40:49 +03:00
|
|
|
if (S_ISDIR(st.st_mode)) {
|
2003-11-19 19:27:16 +02:00
|
|
|
Strings names = readDirectory(path);
|
2003-08-08 17:55:56 +03:00
|
|
|
|
2003-08-22 23:12:44 +03:00
|
|
|
/* Make the directory writable. */
|
|
|
|
if (!(st.st_mode & S_IWUSR)) {
|
|
|
|
if (chmod(path.c_str(), st.st_mode | S_IWUSR) == -1)
|
2004-11-08 17:20:52 +02:00
|
|
|
throw SysError(format("making `%1%' writable") % path);
|
2003-08-22 23:12:44 +03:00
|
|
|
}
|
|
|
|
|
2003-11-19 19:27:16 +02:00
|
|
|
for (Strings::iterator i = names.begin(); i != names.end(); ++i)
|
2005-12-15 23:11:39 +02:00
|
|
|
_deletePath(path + "/" + *i, bytesFreed);
|
2003-06-23 17:40:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (remove(path.c_str()) == -1)
|
2003-08-22 23:12:44 +03:00
|
|
|
throw SysError(format("cannot unlink `%1%'") % path);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-03-22 23:42:28 +02:00
|
|
|
void deletePath(const Path & path)
|
2005-12-15 23:11:39 +02:00
|
|
|
{
|
|
|
|
unsigned long long dummy;
|
|
|
|
deletePath(path, dummy);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void deletePath(const Path & path, unsigned long long & bytesFreed)
|
2004-03-22 23:42:28 +02:00
|
|
|
{
|
|
|
|
startNest(nest, lvlDebug,
|
|
|
|
format("recursively deleting path `%1%'") % path);
|
2005-12-15 23:11:39 +02:00
|
|
|
bytesFreed = 0;
|
|
|
|
_deletePath(path, bytesFreed);
|
2004-03-22 23:42:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-07 17:37:41 +03:00
|
|
|
void makePathReadOnly(const Path & path)
|
2003-08-22 23:12:44 +03:00
|
|
|
{
|
2004-01-15 22:23:55 +02:00
|
|
|
checkInterrupt();
|
|
|
|
|
2003-08-22 23:12:44 +03:00
|
|
|
struct stat st;
|
|
|
|
if (lstat(path.c_str(), &st))
|
|
|
|
throw SysError(format("getting attributes of path `%1%'") % path);
|
|
|
|
|
2003-08-28 13:51:14 +03:00
|
|
|
if (!S_ISLNK(st.st_mode) && (st.st_mode & S_IWUSR)) {
|
2003-08-22 23:12:44 +03:00
|
|
|
if (chmod(path.c_str(), st.st_mode & ~S_IWUSR) == -1)
|
2003-08-28 13:51:14 +03:00
|
|
|
throw SysError(format("making `%1%' read-only") % path);
|
2003-08-22 23:12:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (S_ISDIR(st.st_mode)) {
|
2003-11-19 19:27:16 +02:00
|
|
|
Strings names = readDirectory(path);
|
|
|
|
for (Strings::iterator i = names.begin(); i != names.end(); ++i)
|
|
|
|
makePathReadOnly(path + "/" + *i);
|
2003-08-22 23:12:44 +03:00
|
|
|
}
|
2003-07-04 15:18:06 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-07 17:37:41 +03:00
|
|
|
static Path tempName()
|
2003-10-02 14:55:38 +03:00
|
|
|
{
|
|
|
|
static int counter = 0;
|
2006-01-08 19:16:03 +02:00
|
|
|
Path tmpRoot = canonPath(getEnv("TMPDIR", "/tmp"), true);
|
2003-10-02 14:55:38 +03:00
|
|
|
return (format("%1%/nix-%2%-%3%") % tmpRoot % getpid() % counter++).str();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-07 17:37:41 +03:00
|
|
|
Path createTempDir()
|
2003-10-02 14:55:38 +03:00
|
|
|
{
|
|
|
|
while (1) {
|
2004-01-15 22:23:55 +02:00
|
|
|
checkInterrupt();
|
2003-10-07 17:37:41 +03:00
|
|
|
Path tmpDir = tempName();
|
2006-06-14 14:53:55 +03:00
|
|
|
if (mkdir(tmpDir.c_str(), 0777) == 0) {
|
|
|
|
/* Explicitly set the group of the directory. This is to
|
|
|
|
work around around problems caused by BSD's group
|
|
|
|
ownership semantics (directories inherit the group of
|
|
|
|
the parent). For instance, the group of /tmp on
|
|
|
|
FreeBSD is "wheel", so all directories created in /tmp
|
|
|
|
will be owned by "wheel"; but if the user is not in
|
|
|
|
"wheel", then "tar" will fail to unpack archives that
|
|
|
|
have the setgid bit set on directories. */
|
|
|
|
if (chown(tmpDir.c_str(), (uid_t) -1, getegid()) != 0)
|
|
|
|
throw SysError(format("setting group of directory `%1%'") % tmpDir);
|
|
|
|
return tmpDir;
|
|
|
|
}
|
2003-10-02 14:55:38 +03:00
|
|
|
if (errno != EEXIST)
|
|
|
|
throw SysError(format("creating directory `%1%'") % tmpDir);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-03-24 19:46:38 +02:00
|
|
|
void createDirs(const Path & path)
|
|
|
|
{
|
2006-01-09 16:52:46 +02:00
|
|
|
if (path == "/") return;
|
2005-03-24 19:46:38 +02:00
|
|
|
createDirs(dirOf(path));
|
|
|
|
if (!pathExists(path))
|
|
|
|
if (mkdir(path.c_str(), 0777) == -1)
|
|
|
|
throw SysError(format("creating directory `%1%'") % path);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-11-22 17:58:34 +02:00
|
|
|
void writeStringToFile(const Path & path, const string & s)
|
|
|
|
{
|
2005-01-31 12:27:25 +02:00
|
|
|
AutoCloseFD fd(open(path.c_str(),
|
|
|
|
O_CREAT | O_EXCL | O_WRONLY, 0666));
|
2003-11-22 17:58:34 +02:00
|
|
|
if (fd == -1)
|
|
|
|
throw SysError(format("creating file `%1%'") % path);
|
|
|
|
writeFull(fd, (unsigned char *) s.c_str(), s.size());
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-03-22 22:53:49 +02:00
|
|
|
LogType logType = ltPretty;
|
2004-08-18 15:19:06 +03:00
|
|
|
Verbosity verbosity = lvlInfo;
|
2003-07-24 11:53:43 +03:00
|
|
|
|
2003-07-04 15:18:06 +03:00
|
|
|
static int nestingLevel = 0;
|
|
|
|
|
|
|
|
|
2003-11-09 12:35:45 +02:00
|
|
|
Nest::Nest()
|
2003-07-04 15:18:06 +03:00
|
|
|
{
|
2003-11-09 12:35:45 +02:00
|
|
|
nest = false;
|
2003-07-04 15:18:06 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Nest::~Nest()
|
|
|
|
{
|
2004-03-22 23:42:28 +02:00
|
|
|
close();
|
2004-03-22 22:53:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static string escVerbosity(Verbosity level)
|
|
|
|
{
|
2006-08-26 19:48:01 +03:00
|
|
|
return int2String((int) level);
|
2003-07-04 15:18:06 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-11-09 12:35:45 +02:00
|
|
|
void Nest::open(Verbosity level, const format & f)
|
|
|
|
{
|
|
|
|
if (level <= verbosity) {
|
2004-03-22 22:53:49 +02:00
|
|
|
if (logType == ltEscapes)
|
2006-09-05 00:06:23 +03:00
|
|
|
std::cerr << "\033[" << escVerbosity(level) << "p"
|
|
|
|
<< f.str() << "\n";
|
2004-03-22 23:42:28 +02:00
|
|
|
else
|
|
|
|
printMsg_(level, f);
|
2003-11-09 12:35:45 +02:00
|
|
|
nest = true;
|
|
|
|
nestingLevel++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-03-22 23:42:28 +02:00
|
|
|
void Nest::close()
|
|
|
|
{
|
|
|
|
if (nest) {
|
|
|
|
nestingLevel--;
|
|
|
|
if (logType == ltEscapes)
|
2006-09-05 00:06:23 +03:00
|
|
|
std::cerr << "\033[q";
|
2004-03-27 17:33:19 +02:00
|
|
|
nest = false;
|
2004-03-22 23:42:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-11-09 12:35:45 +02:00
|
|
|
void printMsg_(Verbosity level, const format & f)
|
2003-07-04 15:18:06 +03:00
|
|
|
{
|
2004-01-15 22:23:55 +02:00
|
|
|
checkInterrupt();
|
2003-07-24 11:53:43 +03:00
|
|
|
if (level > verbosity) return;
|
2004-03-22 22:53:49 +02:00
|
|
|
string prefix;
|
|
|
|
if (logType == ltPretty)
|
|
|
|
for (int i = 0; i < nestingLevel; i++)
|
|
|
|
prefix += "| ";
|
|
|
|
else if (logType == ltEscapes && level != lvlInfo)
|
|
|
|
prefix = "\033[" + escVerbosity(level) + "s";
|
2006-06-19 17:37:35 +03:00
|
|
|
string s = (format("%1%%2%\n") % prefix % f.str()).str();
|
|
|
|
writeFull(STDERR_FILENO, (const unsigned char *) s.c_str(), s.size());
|
2003-06-23 17:40:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-08-29 18:29:38 +03:00
|
|
|
void warnOnce(bool & haveWarned, const format & f)
|
|
|
|
{
|
|
|
|
if (!haveWarned) {
|
|
|
|
printMsg(lvlError, format("warning: %1%") % f.str());
|
|
|
|
haveWarned = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-07-21 00:11:43 +03:00
|
|
|
void readFull(int fd, unsigned char * buf, size_t count)
|
|
|
|
{
|
|
|
|
while (count) {
|
2004-01-15 22:23:55 +02:00
|
|
|
checkInterrupt();
|
2003-07-21 00:11:43 +03:00
|
|
|
ssize_t res = read(fd, (char *) buf, count);
|
2004-05-11 16:48:25 +03:00
|
|
|
if (res == -1) {
|
|
|
|
if (errno == EINTR) continue;
|
|
|
|
throw SysError("reading from file");
|
|
|
|
}
|
2003-07-21 00:11:43 +03:00
|
|
|
if (res == 0) throw Error("unexpected end-of-file");
|
|
|
|
count -= res;
|
|
|
|
buf += res;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void writeFull(int fd, const unsigned char * buf, size_t count)
|
|
|
|
{
|
|
|
|
while (count) {
|
2004-01-15 22:23:55 +02:00
|
|
|
checkInterrupt();
|
2003-07-21 00:11:43 +03:00
|
|
|
ssize_t res = write(fd, (char *) buf, count);
|
2004-05-11 16:48:25 +03:00
|
|
|
if (res == -1) {
|
|
|
|
if (errno == EINTR) continue;
|
|
|
|
throw SysError("writing to file");
|
|
|
|
}
|
2003-07-21 00:11:43 +03:00
|
|
|
count -= res;
|
|
|
|
buf += res;
|
|
|
|
}
|
|
|
|
}
|
2003-10-22 13:48:22 +03:00
|
|
|
|
|
|
|
|
2006-07-20 15:17:25 +03:00
|
|
|
string drainFD(int fd)
|
|
|
|
{
|
|
|
|
string result;
|
|
|
|
unsigned char buffer[4096];
|
|
|
|
while (1) {
|
|
|
|
ssize_t rd = read(fd, buffer, sizeof buffer);
|
|
|
|
if (rd == -1) {
|
|
|
|
if (errno != EINTR)
|
|
|
|
throw SysError("reading from file");
|
|
|
|
}
|
|
|
|
else if (rd == 0) break;
|
|
|
|
else result.append((char *) buffer, rd);
|
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-22 12:51:44 +03:00
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
2003-10-22 13:48:22 +03:00
|
|
|
AutoDelete::AutoDelete(const string & p) : path(p)
|
|
|
|
{
|
|
|
|
del = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
AutoDelete::~AutoDelete()
|
|
|
|
{
|
|
|
|
if (del) deletePath(path);
|
|
|
|
}
|
|
|
|
|
|
|
|
void AutoDelete::cancel()
|
|
|
|
{
|
|
|
|
del = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-22 12:51:44 +03:00
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
2003-10-22 13:48:22 +03:00
|
|
|
AutoCloseFD::AutoCloseFD()
|
|
|
|
{
|
|
|
|
fd = -1;
|
|
|
|
}
|
|
|
|
|
2004-06-22 12:51:44 +03:00
|
|
|
|
2003-10-22 13:48:22 +03:00
|
|
|
AutoCloseFD::AutoCloseFD(int fd)
|
|
|
|
{
|
|
|
|
this->fd = fd;
|
|
|
|
}
|
|
|
|
|
2004-06-22 12:51:44 +03:00
|
|
|
|
2005-01-31 12:27:25 +02:00
|
|
|
AutoCloseFD::AutoCloseFD(const AutoCloseFD & fd)
|
|
|
|
{
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-10-22 13:48:22 +03:00
|
|
|
AutoCloseFD::~AutoCloseFD()
|
|
|
|
{
|
2004-06-15 16:49:42 +03:00
|
|
|
try {
|
|
|
|
close();
|
|
|
|
} catch (Error & e) {
|
|
|
|
printMsg(lvlError, format("error (ignored): %1%") % e.msg());
|
|
|
|
}
|
2003-10-22 13:48:22 +03:00
|
|
|
}
|
|
|
|
|
2004-06-22 12:51:44 +03:00
|
|
|
|
2003-10-22 13:48:22 +03:00
|
|
|
void AutoCloseFD::operator =(int fd)
|
|
|
|
{
|
2004-06-15 16:49:42 +03:00
|
|
|
if (this->fd != fd) close();
|
2003-10-22 13:48:22 +03:00
|
|
|
this->fd = fd;
|
|
|
|
}
|
|
|
|
|
2004-06-22 12:51:44 +03:00
|
|
|
|
2005-01-31 12:27:25 +02:00
|
|
|
AutoCloseFD::operator int() const
|
2003-10-22 13:48:22 +03:00
|
|
|
{
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
2004-06-22 12:51:44 +03:00
|
|
|
|
2004-06-15 16:49:42 +03:00
|
|
|
void AutoCloseFD::close()
|
|
|
|
{
|
|
|
|
if (fd != -1) {
|
|
|
|
if (::close(fd) == -1)
|
|
|
|
/* This should never happen. */
|
|
|
|
throw SysError("closing file descriptor");
|
|
|
|
fd = -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-06-22 12:51:44 +03:00
|
|
|
|
2004-06-15 16:49:42 +03:00
|
|
|
bool AutoCloseFD::isOpen()
|
|
|
|
{
|
|
|
|
return fd != -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-01-27 14:19:25 +02:00
|
|
|
/* Pass responsibility for closing this fd to the caller. */
|
|
|
|
int AutoCloseFD::borrow()
|
|
|
|
{
|
|
|
|
int oldFD = fd;
|
|
|
|
fd = -1;
|
|
|
|
return oldFD;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-15 16:49:42 +03:00
|
|
|
void Pipe::create()
|
|
|
|
{
|
|
|
|
int fds[2];
|
|
|
|
if (pipe(fds) != 0) throw SysError("creating pipe");
|
|
|
|
readSide = fds[0];
|
|
|
|
writeSide = fds[1];
|
|
|
|
}
|
|
|
|
|
2003-10-22 13:48:22 +03:00
|
|
|
|
2004-06-22 12:51:44 +03:00
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
2003-10-22 13:48:22 +03:00
|
|
|
AutoCloseDir::AutoCloseDir()
|
|
|
|
{
|
|
|
|
dir = 0;
|
|
|
|
}
|
|
|
|
|
2004-06-22 12:51:44 +03:00
|
|
|
|
2003-10-22 13:48:22 +03:00
|
|
|
AutoCloseDir::AutoCloseDir(DIR * dir)
|
|
|
|
{
|
|
|
|
this->dir = dir;
|
|
|
|
}
|
|
|
|
|
2004-06-22 12:51:44 +03:00
|
|
|
|
2003-10-22 13:48:22 +03:00
|
|
|
AutoCloseDir::~AutoCloseDir()
|
|
|
|
{
|
|
|
|
if (dir) closedir(dir);
|
|
|
|
}
|
|
|
|
|
2004-06-22 12:51:44 +03:00
|
|
|
|
2003-10-22 13:48:22 +03:00
|
|
|
void AutoCloseDir::operator =(DIR * dir)
|
|
|
|
{
|
|
|
|
this->dir = dir;
|
|
|
|
}
|
|
|
|
|
2004-06-22 12:51:44 +03:00
|
|
|
|
2003-10-22 13:48:22 +03:00
|
|
|
AutoCloseDir::operator DIR *()
|
|
|
|
{
|
|
|
|
return dir;
|
|
|
|
}
|
|
|
|
|
2004-01-15 22:23:55 +02:00
|
|
|
|
2004-06-22 12:51:44 +03:00
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
|
Pid::Pid()
|
|
|
|
{
|
|
|
|
pid = -1;
|
|
|
|
separatePG = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Pid::~Pid()
|
|
|
|
{
|
|
|
|
kill();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Pid::operator =(pid_t pid)
|
|
|
|
{
|
|
|
|
if (this->pid != pid) kill();
|
|
|
|
this->pid = pid;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Pid::operator pid_t()
|
|
|
|
{
|
|
|
|
return pid;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Pid::kill()
|
|
|
|
{
|
|
|
|
if (pid == -1) return;
|
|
|
|
|
2004-06-25 18:36:09 +03:00
|
|
|
printMsg(lvlError, format("killing process %1%") % pid);
|
2004-06-22 12:51:44 +03:00
|
|
|
|
|
|
|
/* Send a KILL signal to the child. If it has its own process
|
|
|
|
group, send the signal to every process in the child process
|
|
|
|
group (which hopefully includes *all* its children). */
|
|
|
|
if (::kill(separatePG ? -pid : pid, SIGKILL) != 0)
|
2004-06-25 18:36:09 +03:00
|
|
|
printMsg(lvlError, (SysError(format("killing process %1%") % pid).msg()));
|
|
|
|
|
|
|
|
/* Wait until the child dies, disregarding the exit status. */
|
|
|
|
int status;
|
|
|
|
while (waitpid(pid, &status, 0) == -1)
|
|
|
|
if (errno != EINTR) printMsg(lvlError,
|
|
|
|
(SysError(format("waiting for process %1%") % pid).msg()));
|
2004-06-22 12:51:44 +03:00
|
|
|
|
|
|
|
pid = -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int Pid::wait(bool block)
|
|
|
|
{
|
|
|
|
while (1) {
|
|
|
|
int status;
|
|
|
|
int res = waitpid(pid, &status, block ? 0 : WNOHANG);
|
|
|
|
if (res == pid) {
|
|
|
|
pid = -1;
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
if (res == 0 && !block) return -1;
|
|
|
|
if (errno != EINTR)
|
|
|
|
throw SysError("cannot get child exit status");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Pid::setSeparatePG(bool separatePG)
|
|
|
|
{
|
|
|
|
this->separatePG = separatePG;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
2006-07-20 15:17:25 +03:00
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
|
string runProgram(Path program)
|
|
|
|
{
|
|
|
|
/* Create a pipe. */
|
|
|
|
Pipe pipe;
|
|
|
|
pipe.create();
|
|
|
|
|
|
|
|
/* Fork. */
|
|
|
|
Pid pid;
|
|
|
|
pid = fork();
|
|
|
|
switch (pid) {
|
|
|
|
|
|
|
|
case -1:
|
|
|
|
throw SysError("unable to fork");
|
|
|
|
|
|
|
|
case 0: /* child */
|
|
|
|
try {
|
|
|
|
pipe.readSide.close();
|
|
|
|
|
|
|
|
if (dup2(pipe.writeSide, STDOUT_FILENO) == -1)
|
|
|
|
throw SysError("dupping from-hook write side");
|
|
|
|
|
|
|
|
execl(program.c_str(), program.c_str(), (char *) 0);
|
|
|
|
throw SysError(format("executing `%1%'") % program);
|
|
|
|
|
2006-09-05 00:06:23 +03:00
|
|
|
} catch (std::exception & e) {
|
|
|
|
std::cerr << "error: " << e.what() << std::endl;
|
2006-07-20 15:17:25 +03:00
|
|
|
}
|
|
|
|
quickExit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Parent. */
|
|
|
|
|
|
|
|
pipe.writeSide.close();
|
|
|
|
|
|
|
|
string result = drainFD(pipe.readSide);
|
|
|
|
|
|
|
|
/* Wait for the child to finish. */
|
|
|
|
int status = pid.wait(true);
|
|
|
|
if (!statusOk(status))
|
|
|
|
throw Error(format("program `%1% %2%")
|
|
|
|
% program % statusToString(status));
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void quickExit(int status)
|
|
|
|
{
|
|
|
|
#ifdef __CYGWIN__
|
|
|
|
/* Hack for Cygwin: _exit() doesn't seem to work quite right,
|
|
|
|
since some Berkeley DB code appears to be called when a child
|
|
|
|
exits through _exit() (e.g., because execve() failed). So call
|
|
|
|
the Windows API directly. */
|
|
|
|
ExitProcess(status);
|
|
|
|
#else
|
|
|
|
_exit(status);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-22 12:51:44 +03:00
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
2004-01-15 22:23:55 +02:00
|
|
|
volatile sig_atomic_t _isInterrupted = 0;
|
|
|
|
|
|
|
|
void _interrupted()
|
|
|
|
{
|
2004-05-11 16:48:25 +03:00
|
|
|
/* Block user interrupts while an exception is being handled.
|
|
|
|
Throwing an exception while another exception is being handled
|
|
|
|
kills the program! */
|
2006-09-05 00:06:23 +03:00
|
|
|
if (!std::uncaught_exception()) {
|
2004-05-11 16:48:25 +03:00
|
|
|
_isInterrupted = 0;
|
|
|
|
throw Error("interrupted by the user");
|
|
|
|
}
|
2004-01-15 22:23:55 +02:00
|
|
|
}
|
2004-06-20 16:37:51 +03:00
|
|
|
|
|
|
|
|
2004-06-22 12:51:44 +03:00
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
2004-06-20 16:37:51 +03:00
|
|
|
string packStrings(const Strings & strings)
|
|
|
|
{
|
|
|
|
string d;
|
|
|
|
for (Strings::const_iterator i = strings.begin();
|
|
|
|
i != strings.end(); ++i)
|
|
|
|
{
|
|
|
|
unsigned int len = i->size();
|
|
|
|
d += len & 0xff;
|
|
|
|
d += (len >> 8) & 0xff;
|
|
|
|
d += (len >> 16) & 0xff;
|
|
|
|
d += (len >> 24) & 0xff;
|
|
|
|
d += *i;
|
|
|
|
}
|
|
|
|
return d;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Strings unpackStrings(const string & s)
|
|
|
|
{
|
|
|
|
Strings strings;
|
|
|
|
|
|
|
|
string::const_iterator i = s.begin();
|
|
|
|
|
|
|
|
while (i != s.end()) {
|
|
|
|
|
|
|
|
if (i + 4 > s.end())
|
|
|
|
throw Error(format("short db entry: `%1%'") % s);
|
|
|
|
|
|
|
|
unsigned int len;
|
|
|
|
len = (unsigned char) *i++;
|
|
|
|
len |= ((unsigned char) *i++) << 8;
|
|
|
|
len |= ((unsigned char) *i++) << 16;
|
|
|
|
len |= ((unsigned char) *i++) << 24;
|
2005-01-20 16:10:19 +02:00
|
|
|
|
|
|
|
if (len == 0xffffffff) return strings; /* explicit end-of-list */
|
2004-06-20 16:37:51 +03:00
|
|
|
|
|
|
|
if (i + len > s.end())
|
|
|
|
throw Error(format("short db entry: `%1%'") % s);
|
|
|
|
|
|
|
|
strings.push_back(string(i, i + len));
|
|
|
|
i += len;
|
|
|
|
}
|
|
|
|
|
|
|
|
return strings;
|
|
|
|
}
|
2004-06-22 11:50:25 +03:00
|
|
|
|
|
|
|
|
2005-09-22 18:43:22 +03:00
|
|
|
Strings tokenizeString(const string & s, const string & separators)
|
|
|
|
{
|
|
|
|
Strings result;
|
|
|
|
string::size_type pos = s.find_first_not_of(separators, 0);
|
|
|
|
while (pos != string::npos) {
|
|
|
|
string::size_type end = s.find_first_of(separators, pos + 1);
|
|
|
|
if (end == string::npos) end = s.size();
|
|
|
|
string token(s, pos, end - pos);
|
|
|
|
result.push_back(token);
|
|
|
|
pos = s.find_first_not_of(separators, end);
|
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-06-22 11:50:25 +03:00
|
|
|
string statusToString(int status)
|
|
|
|
{
|
|
|
|
if (!WIFEXITED(status) || WEXITSTATUS(status) != 0) {
|
|
|
|
if (WIFEXITED(status))
|
2004-06-22 20:04:10 +03:00
|
|
|
return (format("failed with exit code %1%") % WEXITSTATUS(status)).str();
|
2004-06-22 11:50:25 +03:00
|
|
|
else if (WIFSIGNALED(status))
|
2004-06-22 20:04:10 +03:00
|
|
|
return (format("failed due to signal %1%") % WTERMSIG(status)).str();
|
2004-06-22 11:50:25 +03:00
|
|
|
else
|
|
|
|
return "died abnormally";
|
|
|
|
} else return "succeeded";
|
|
|
|
}
|
2004-06-22 14:03:41 +03:00
|
|
|
|
|
|
|
|
|
|
|
bool statusOk(int status)
|
|
|
|
{
|
|
|
|
return WIFEXITED(status) && WEXITSTATUS(status) == 0;
|
|
|
|
}
|
2004-09-10 16:32:08 +03:00
|
|
|
|
|
|
|
|
2006-08-26 19:48:01 +03:00
|
|
|
string int2String(int n)
|
|
|
|
{
|
2006-09-05 00:06:23 +03:00
|
|
|
std::ostringstream str;
|
2006-08-26 19:48:01 +03:00
|
|
|
str << n;
|
|
|
|
return str.str();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-09-10 16:32:08 +03:00
|
|
|
bool string2Int(const string & s, int & n)
|
|
|
|
{
|
2006-09-05 00:06:23 +03:00
|
|
|
std::istringstream str(s);
|
2004-09-10 16:32:08 +03:00
|
|
|
str >> n;
|
2005-05-04 19:29:44 +03:00
|
|
|
return str && str.get() == EOF;
|
2004-09-10 16:32:08 +03:00
|
|
|
}
|
2006-09-05 00:06:23 +03:00
|
|
|
|
|
|
|
|
2006-09-05 01:55:28 +03:00
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
|
|
|
|
|
|
static bool haveSwitched;
|
|
|
|
static uid_t savedUid, nixUid;
|
|
|
|
static gid_t savedGid, nixGid;
|
|
|
|
|
|
|
|
|
|
|
|
#if HAVE_SETRESUID
|
|
|
|
#define _setuid(uid) setresuid(uid, uid, savedUid)
|
|
|
|
#define _setgid(gid) setresgid(gid, gid, savedGid)
|
|
|
|
#else
|
|
|
|
/* Only works properly when run by root. */
|
|
|
|
#define _setuid(uid) setuid(uid)
|
|
|
|
#define _setgid(gid) setgid(gid)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
SwitchToOriginalUser::SwitchToOriginalUser()
|
|
|
|
{
|
|
|
|
#if SETUID_HACK && HAVE_SETRESUID
|
|
|
|
/* Temporarily switch the effective uid/gid back to the saved
|
|
|
|
uid/gid (which is the uid/gid of the user that executed the Nix
|
|
|
|
program; it's *not* the real uid/gid, since we changed that to
|
|
|
|
the Nix user in switchToNixUser()). */
|
|
|
|
if (haveSwitched) {
|
|
|
|
if (setuid(savedUid) == -1)
|
|
|
|
throw SysError(format("temporarily restoring uid to `%1%'") % savedUid);
|
|
|
|
if (setgid(savedGid) == -1)
|
|
|
|
throw SysError(format("temporarily restoring gid to `%1%'") % savedGid);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
SwitchToOriginalUser::~SwitchToOriginalUser()
|
|
|
|
{
|
|
|
|
#if SETUID_HACK && HAVE_SETRESUID
|
|
|
|
/* Switch the effective uid/gid back to the Nix user. */
|
|
|
|
if (haveSwitched) {
|
|
|
|
if (setuid(nixUid) == -1)
|
|
|
|
throw SysError(format("restoring uid to `%1%'") % nixUid);
|
|
|
|
if (setgid(nixGid) == -1)
|
|
|
|
throw SysError(format("restoring gid to `%1%'") % nixGid);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void switchToNixUser()
|
|
|
|
{
|
|
|
|
#if SETUID_HACK
|
|
|
|
|
|
|
|
/* Don't do anything if this is not a setuid binary. */
|
|
|
|
if (getuid() == geteuid() && getgid() == getegid()) return;
|
|
|
|
|
|
|
|
/* Here we set the uid and gid to the Nix user and group,
|
|
|
|
respectively, IF the current (real) user is a member of the Nix
|
|
|
|
group. Otherwise we just drop all privileges. */
|
|
|
|
|
|
|
|
/* Lookup the Nix gid. */
|
|
|
|
struct group * gr = getgrnam(NIX_GROUP);
|
|
|
|
if (!gr) {
|
|
|
|
cerr << format("missing group `%1%'\n") % NIX_GROUP;
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get the supplementary group IDs for the current user. */
|
|
|
|
int maxGids = 512, nrGids;
|
|
|
|
gid_t gids[maxGids];
|
|
|
|
if ((nrGids = getgroups(maxGids, gids)) == -1) {
|
|
|
|
cerr << format("unable to query gids\n");
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* !!! Apparently it is unspecified whether getgroups() includes
|
|
|
|
the effective gid. In that case the following test is always
|
|
|
|
true *if* the program is installed setgid (which we do when we
|
|
|
|
have setresuid()). On Linux this doesn't appear to be the
|
|
|
|
case, but we should switch to the real gid before doing this
|
|
|
|
test, and then switch back to the saved gid. */
|
|
|
|
|
|
|
|
/* Check that the current user is a member of the Nix group. */
|
|
|
|
bool found = false;
|
|
|
|
for (int i = 0; i < nrGids; ++i)
|
|
|
|
if (gids[i] == gr->gr_gid) {
|
|
|
|
found = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!found) {
|
|
|
|
/* Not in the Nix group - drop all root/Nix privileges. */
|
|
|
|
_setgid(getgid());
|
|
|
|
_setuid(getuid());
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
savedUid = getuid();
|
|
|
|
savedGid = getgid();
|
|
|
|
|
|
|
|
/* Set the real, effective and saved gids to gr->gr_gid. Also
|
|
|
|
make very sure that this succeeded. We switch the gid first
|
|
|
|
because we cannot do it after we have dropped root uid. */
|
|
|
|
nixGid = gr->gr_gid;
|
|
|
|
if (_setgid(nixGid) != 0 || getgid() != nixGid || getegid() != nixGid) {
|
|
|
|
cerr << format("unable to set gid to `%1%'\n") % NIX_GROUP;
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Lookup the Nix uid. */
|
|
|
|
struct passwd * pw = getpwnam(NIX_USER);
|
|
|
|
if (!pw) {
|
|
|
|
cerr << format("missing user `%1%'\n") % NIX_USER;
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* This will drop all root privileges, setting the real, effective
|
|
|
|
and saved uids to pw->pw_uid. Also make very sure that this
|
|
|
|
succeeded.*/
|
|
|
|
nixUid = pw->pw_uid;
|
|
|
|
if (_setuid(nixUid) != 0 || getuid() != nixUid || geteuid() != nixUid) {
|
|
|
|
cerr << format("unable to set uid to `%1%'\n") % NIX_USER;
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* !!! for setuid operation, we should: 1) wipe the environment;
|
|
|
|
2) verify file descriptors 0, 1, 2; 3) etc.
|
|
|
|
See: http://www.daemon-systems.org/man/setuid.7.html
|
|
|
|
*/
|
|
|
|
|
|
|
|
haveSwitched = true;
|
|
|
|
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-09-05 00:06:23 +03:00
|
|
|
}
|