xtrn.cpp 64.5 KB
Newer Older
1
2
3
4
5
6
/* Synchronet external program support routines */

/****************************************************************************
 * @format.tab-size 4		(Plain Text/Source Code File Header)			*
 * @format.use-tabs true	(see http://www.synchro.net/ptsc_hdr.html)		*
 *																			*
rswindell's avatar
rswindell committed
7
 * Copyright Rob Swindell - http://www.synchro.net/copyright.html			*
8
9
10
11
12
13
14
15
16
17
18
19
20
 *																			*
 * This program is free software; you can redistribute it and/or			*
 * modify it under the terms of the GNU General Public License				*
 * as published by the Free Software Foundation; either version 2			*
 * of the License, or (at your option) any later version.					*
 * See the GNU General Public License for more details: gpl.txt or			*
 * http://www.fsf.org/copyleft/gpl.html										*
 *																			*
 * For Synchronet coding style and modification guidelines, see				*
 * http://www.synchro.net/source.html										*
 *																			*
 * Note: If this box doesn't appear square, then you need to fix your tabs.	*
 ****************************************************************************/
21

22
23
24
25
#include "sbbs.h"
#include "cmdshell.h"
#include "telnet.h"

26
27
#include <signal.h>			// kill()

28
29
30
#ifdef __unix__
	#include <sys/wait.h>	// WEXITSTATUS

deuce's avatar
deuce committed
31
32
	#define TTYDEFCHARS		// needed for ttydefchars definition
	#include <sys/ttydefaults.h>	// Linux - it's motherfucked.
rswindell's avatar
rswindell committed
33
#if defined(__FreeBSD__)
34
	#include <libutil.h>	// forkpty()
deuce's avatar
deuce committed
35
#elif defined(__OpenBSD__) || defined(__NetBSD__) || defined(__DARWIN__)
rswindell's avatar
rswindell committed
36
37
	#include <util.h>
#elif defined(__linux__)
38
	#include <pty.h>
39
#elif defined(__QNX__)
40
#if 0
41
	#include <unix.h>
42
43
44
#else
	#define NEEDS_FORKPTY
#endif
45
#endif
46
47
48
49
50

	#ifdef NEEDS_FORKPTY
	#include <grp.h>
	#endif

51
	#include <termios.h>
52

deuce's avatar
deuce committed
53
54
55
56
/*
 * Control Character Defaults
 */
#ifndef CTRL
57
	#define CTRL(x)	(x&037)
deuce's avatar
deuce committed
58
59
#endif
#ifndef CEOF
60
	#define	CEOF		CTRL('d')
deuce's avatar
deuce committed
61
62
#endif
#ifndef CEOL
63
	#define	CEOL		0xff		/* XXX avoid _POSIX_VDISABLE */
deuce's avatar
deuce committed
64
65
#endif
#ifndef CERASE
66
	#define	CERASE		0177
deuce's avatar
deuce committed
67
68
#endif
#ifndef CERASE2
69
	#define	CERASE2		CTRL('h')
deuce's avatar
deuce committed
70
71
#endif
#ifndef CINTR
72
	#define	CINTR		CTRL('c')
deuce's avatar
deuce committed
73
74
#endif
#ifndef CSTATUS
75
	#define	CSTATUS		CTRL('t')
deuce's avatar
deuce committed
76
77
#endif
#ifndef CKILL
78
	#define	CKILL		CTRL('u')
deuce's avatar
deuce committed
79
80
#endif
#ifndef CMIN
81
	#define	CMIN		1
deuce's avatar
deuce committed
82
83
#endif
#ifndef CQUIT
84
	#define	CQUIT		034		/* FS, ^\ */
deuce's avatar
deuce committed
85
86
#endif
#ifndef CSUSP
87
	#define	CSUSP		CTRL('z')
deuce's avatar
deuce committed
88
89
#endif
#ifndef CTIME
90
	#define	CTIME		0
deuce's avatar
deuce committed
91
92
#endif
#ifndef CDSUSP
93
	#define	CDSUSP		CTRL('y')
deuce's avatar
deuce committed
94
95
#endif
#ifndef CSTART
96
	#define	CSTART		CTRL('q')
deuce's avatar
deuce committed
97
98
#endif
#ifndef CSTOP
99
	#define	CSTOP		CTRL('s')
deuce's avatar
deuce committed
100
101
#endif
#ifndef CLNEXT
102
	#define	CLNEXT		CTRL('v')
deuce's avatar
deuce committed
103
104
#endif
#ifndef CDISCARD
105
	#define	CDISCARD 	CTRL('o')
deuce's avatar
deuce committed
106
107
#endif
#ifndef CWERASE
108
	#define	CWERASE 	CTRL('w')
deuce's avatar
deuce committed
109
110
#endif
#ifndef CREPRINT
111
	#define	CREPRINT 	CTRL('r')
deuce's avatar
deuce committed
112
113
#endif
#ifndef CEOT
114
	#define	CEOT		CEOF
deuce's avatar
deuce committed
115
116
117
#endif
/* compat */
#ifndef CBRK
118
	#define	CBRK		CEOL
deuce's avatar
deuce committed
119
120
#endif
#ifndef CRPRNT
121
	#define CRPRNT		CREPRINT
deuce's avatar
deuce committed
122
123
#endif
#ifndef CFLUSH
124
125
126
	#define	CFLUSH		CDISCARD
#endif

deuce's avatar
deuce committed
127
#ifndef TTYDEF_IFLAG
128
	#define TTYDEF_IFLAG    (BRKINT | ICRNL | IMAXBEL | IXON | IXANY)
deuce's avatar
deuce committed
129
130
#endif
#ifndef TTYDEF_OFLAG
131
	#define TTYDEF_OFLAG    (OPOST | ONLCR)
deuce's avatar
deuce committed
132
133
#endif
#ifndef TTYDEF_LFLAG
134
	#define TTYDEF_LFLAG    (ECHO | ICANON | ISIG | IEXTEN | ECHOE|ECHOKE|ECHOCTL)
deuce's avatar
deuce committed
135
136
#endif
#ifndef TTYDEF_CFLAG
137
	#define TTYDEF_CFLAG    (CREAD | CS8 | HUPCL)
deuce's avatar
deuce committed
138
#endif
deuce's avatar
deuce committed
139
#if defined(__QNX__) || defined(__solaris__) || defined(__NetBSD__)
140
141
142
	static cc_t     ttydefchars[NCCS] = {
        CEOF,   CEOL,   CEOL,   CERASE, CWERASE, CKILL, CREPRINT,
        CERASE2, CINTR, CQUIT,  CSUSP,  CDSUSP, CSTART, CSTOP,  CLNEXT,
deuce's avatar
deuce committed
143
144
145
146
        CDISCARD, CMIN, CTIME,  CSTATUS
#ifndef __solaris__
	, _POSIX_VDISABLE
#endif
147
	};
148
149
#endif

150
151
#endif	/* __unix__ */

152
#define XTRN_IO_BUF_LEN 10000	/* 50% of IO_THREAD_BUF_SIZE */
153

154
155
156
157
158
159
160
161
162
163
/*****************************************************************************/
/* Interrupt routine to expand WWIV Ctrl-C# codes into ANSI escape sequences */
/*****************************************************************************/
BYTE* wwiv_expand(BYTE* buf, ulong buflen, BYTE* outbuf, ulong& newlen
	,ulong user_misc, bool& ctrl_c)
{
    char	ansi_seq[32];
	ulong 	i,j,k;

    for(i=j=0;i<buflen;i++) {
164
        if(buf[i]==CTRL_C) {	/* WWIV color escape char */
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
            ctrl_c=true;
            continue;
        }
        if(!ctrl_c) {
            outbuf[j++]=buf[i];
            continue;
        }
        ctrl_c=false;
        if(user_misc&ANSI) {
            switch(buf[i]) {
                default:
                    strcpy(ansi_seq,"\x1b[0m");          /* low grey */
                    break;
                case '1':
                    strcpy(ansi_seq,"\x1b[0;1;36m");     /* high cyan */
                    break;
                case '2':
                    strcpy(ansi_seq,"\x1b[0;1;33m");     /* high yellow */
                    break;
                case '3':
                    strcpy(ansi_seq,"\x1b[0;35m");       /* low magenta */
                    break;
                case '4':
                    strcpy(ansi_seq,"\x1b[0;1;44m");     /* white on blue */
                    break;
                case '5':
                    strcpy(ansi_seq,"\x1b[0;32m");       /* low green */
                    break;
                case '6':
                    strcpy(ansi_seq,"\x1b[0;1;5;31m");   /* high blinking red */
                    break;
                case '7':
                    strcpy(ansi_seq,"\x1b[0;1;34m");     /* high blue */
                    break;
                case '8':
                    strcpy(ansi_seq,"\x1b[0;34m");       /* low blue */
                    break;
                case '9':
                    strcpy(ansi_seq,"\x1b[0;36m");       /* low cyan */
                    break;
            }
            for(k=0;ansi_seq[k];k++)
                outbuf[j++]=ansi_seq[k];
        }
    }
    newlen=j;
    return(outbuf);
}
213

214
215
216
217
218
219
220
static void petscii_convert(BYTE* buf, ulong len)
{
    for(ulong i=0; i<len; i++) {
		buf[i] = cp437_to_petscii(buf[i]);
	}
}

221
222
223
224
225
226
227
228
229
static bool native_executable(scfg_t* cfg, const char* cmdline, long mode)
{
	char*	p;
	char	str[MAX_PATH+1];
	char	name[64];
	char	base[64];
	unsigned i;

	if(mode&EX_NATIVE)
230
231
232
233
		return true;

	if(*cmdline == '?' || *cmdline == '*')
		return true;
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248

    SAFECOPY(str,cmdline);				/* Set str to program name only */
	truncstr(str," ");
    SAFECOPY(name,getfname(str));
	SAFECOPY(base,name);
	if((p=getfext(base))!=NULL)
		*p=0;

    for(i=0;i<cfg->total_natvpgms;i++)
        if(stricmp(name,cfg->natvpgm[i]->name)==0
		|| stricmp(base,cfg->natvpgm[i]->name)==0)
            break;
    return(i<cfg->total_natvpgms);
}

249
#define XTRN_LOADABLE_MODULE(cmdline,startup_dir)			\
250
	if(cmdline[0]=='*')		/* Baja module or JavaScript */	\
251
		return(exec_bin(cmdline+1,&main_csi,startup_dir));
252
#ifdef JAVASCRIPT
253
	#define XTRN_LOADABLE_JS_MODULE(cmdline,mode,startup_dir)	\
254
	if(cmdline[0]=='?' && (mode&EX_SH))						\
255
		return(js_execxtrn(cmdline+1, startup_dir));		\
256
	if(cmdline[0]=='?')										\
257
		return(js_execfile(cmdline+1,startup_dir));
258
259
260
#else
	#define XTRN_LOADABLE_JS_MODULE
#endif
261
262
263

#ifdef _WIN32

264
#include "execvxd.h"	/* DOSXTRN.EXE API */
265
266
267

extern SOCKET node_socket[];

268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
/*****************************************************************************/
// Expands Single CR to CRLF
/*****************************************************************************/
BYTE* cr_expand(BYTE* inbuf, ulong inlen, BYTE* outbuf, ulong& newlen)
{
	ulong	i,j;

	for(i=j=0;i<inlen;i++) {
		outbuf[j++]=inbuf[i];
		if(inbuf[i]=='\r')
			outbuf[j++]='\n';
	}
	newlen=j;
    return(outbuf);
}

284
285
286
287
288
289
290
291
static void add_env_var(str_list_t* list, const char* var, const char* val)
{
	char	str[MAX_PATH*2];
	SetEnvironmentVariable(var,NULL);	/* Delete in current process env */
	SAFEPRINTF2(str,"%s=%s",var,val);
	strListPush(list,str);
}

292
293
294
295
296
297
298
299
/* Clean-up resources while preserving current LastError value */
#define XTRN_CLEANUP												\
	last_error=GetLastError();										\
    if(vxd!=INVALID_HANDLE_VALUE)		CloseHandle(vxd);			\
	if(rdslot!=INVALID_HANDLE_VALUE)	CloseHandle(rdslot);		\
	if(wrslot!=INVALID_HANDLE_VALUE)	CloseHandle(wrslot);		\
	if(start_event!=NULL)				CloseHandle(start_event);	\
	if(hungup_event!=NULL)				CloseHandle(hungup_event);	\
300
	if(hangup_event!=NULL)				CloseHandle(hangup_event);	\
301
302
	SetLastError(last_error)

303
304
305
/****************************************************************************/
/* Runs an external program 												*/
/****************************************************************************/
306
int sbbs_t::external(const char* cmdline, long mode, const char* startup_dir)
307
{
308
309
310
	char	str[MAX_PATH+1];
	char*	env_block=NULL;
	char*	env_strings;
311
	const char* p_startup_dir;
312
	char	path[MAX_PATH+1];
313
314
315
316
    char	fullcmdline[MAX_PATH+1];
	char	realcmdline[MAX_PATH+1];
	char	comspec_str[MAX_PATH+1];
	char	title[MAX_PATH+1];
317
318
	BYTE	buf[XTRN_IO_BUF_LEN],*bp;
    BYTE 	telnet_buf[XTRN_IO_BUF_LEN*2];
319
    BYTE 	output_buf[XTRN_IO_BUF_LEN*2];
320
321
    BYTE 	wwiv_buf[XTRN_IO_BUF_LEN*2];
    bool	wwiv_flag=false;
322
    bool	native=false;			// DOS program by default
323
    bool	was_online=true;
324
	bool	rio_abortable_save=rio_abortable;
325
	bool	use_pipes=false;	// NT-compatible console redirection
326
	BOOL	success;
327
	BOOL	processTerminated=false;
328
	uint	i;
329
330
331
332
    time_t	hungup=0;
	HANDLE	vxd=INVALID_HANDLE_VALUE;
	HANDLE	rdslot=INVALID_HANDLE_VALUE;
	HANDLE	wrslot=INVALID_HANDLE_VALUE;
333
	HANDLE  start_event=NULL;
334
	HANDLE	hungup_event=NULL;
335
	HANDLE	hangup_event=NULL;
336
337
	HANDLE	rdoutpipe;
	HANDLE	wrinpipe;
338
    PROCESS_INFORMATION process_info;
deuce's avatar
deuce committed
339
	unsigned long	rd;
340
    unsigned long	wr;
deuce's avatar
deuce committed
341
    unsigned long	len;
342
    DWORD	avail;
deuce's avatar
deuce committed
343
344
	unsigned long	msglen;
	unsigned long	retval;
345
346
	DWORD	last_error;
	DWORD	loop_since_io=0;
347
	struct	tm tm;
348
	str_list_t	env_list;
349

350
	xtrn_mode = mode;
351
	lprintf(LOG_DEBUG,"Executing external: %s",cmdline);
352

353
354
355
356
357
	if(startup_dir!=NULL && startup_dir[0] && !isdir(startup_dir)) {
		errormsg(WHERE, ERR_CHK, startup_dir, 0);
		return -1;
	}

358
	XTRN_LOADABLE_MODULE(cmdline,startup_dir);
359
	XTRN_LOADABLE_JS_MODULE(cmdline,mode,startup_dir);
360

361
	attr(cfg.color[clr_external]);		/* setup default attributes */
362

363
	native = native_executable(&cfg, cmdline, mode);
364

365
	if(!native && (startup->options&BBS_OPT_NO_DOS)) {
366
		lprintf((mode&EX_OFFLINE) ? LOG_ERR : LOG_WARNING, "DOS programs not supported: %s", cmdline);
367
368
369
370
		bprintf("Sorry, DOS programs are not supported on this node.\r\n");
		return -1;
	}

rswindell's avatar
rswindell committed
371
	if(mode&EX_SH || strcspn(cmdline,"<>|")!=strlen(cmdline))
372
373
374
375
376
377
		sprintf(comspec_str,"%s /C ", comspec);
	else
		comspec_str[0]=0;

    if(startup_dir && cmdline[1]!=':' && cmdline[0]!='/'
    	&& cmdline[0]!='\\' && cmdline[0]!='.')
378
       	SAFEPRINTF3(fullcmdline, "%s%s%s", comspec_str, startup_dir, cmdline);
379
    else
380
    	SAFEPRINTF2(fullcmdline, "%s%s", comspec_str, cmdline);
381

382
	SAFECOPY(realcmdline, fullcmdline);	// for errormsg if failed to execute
383
384

	now=time(NULL);
385
386
	if(localtime_r(&now,&tm)==NULL)
		memset(&tm,0,sizeof(tm));
387

388
	if(native && mode&EX_STDOUT && !(mode&EX_OFFLINE))
389
390
		use_pipes=true;

391
 	if(native) { // Native (not MS-DOS) external
392

393
394
395
396
397
398
		if((env_list=strListInit())==NULL) {
			XTRN_CLEANUP;
        	errormsg(WHERE, ERR_CREATE, "env_list", 0);
            return(errno);
		}

399
		// Current environment passed to child process
rswindell's avatar
rswindell committed
400
		sprintf(str,"%sprotocol.log",cfg.node_dir);
401
402
403
404
405
406
407
		add_env_var(&env_list,"DSZLOG",str);
		add_env_var(&env_list,"SBBSNODE",cfg.node_dir);
		add_env_var(&env_list,"SBBSCTRL",cfg.ctrl_dir);
		add_env_var(&env_list,"SBBSDATA",cfg.data_dir);
		add_env_var(&env_list,"SBBSEXEC",cfg.exec_dir);
		sprintf(str,"%d",cfg.node_num);
		add_env_var(&env_list,"SBBSNNUM",str);
408
		/* date/time env vars */
rswindell's avatar
rswindell committed
409
		sprintf(str,"%02u",tm.tm_mday);
410
411
412
413
414
415
416
		add_env_var(&env_list,"DAY",str);
		add_env_var(&env_list,"WEEKDAY",wday[tm.tm_wday]);
		add_env_var(&env_list,"MONTHNAME",mon[tm.tm_mon]);
		sprintf(str,"%02u",tm.tm_mon+1);
		add_env_var(&env_list,"MONTH",str);
		sprintf(str,"%u",1900+tm.tm_year);
		add_env_var(&env_list,"YEAR",str);
417
418
419
420
421
422
423
424
425
426
427
428

		env_strings=GetEnvironmentStrings();
		env_block=strListCopyBlock(env_strings);
		if(env_strings!=NULL)
			FreeEnvironmentStrings(env_strings);
		env_block=strListAppendBlock(env_block,env_list);
		strListFree(&env_list);
		if(env_block==NULL) {
			XTRN_CLEANUP;
        	errormsg(WHERE, ERR_CREATE, "env_block", 0);
            return(errno);
		}
429
430
431

    } else { // DOS external

432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
		// DOS-compatible (short) paths
		char node_dir[MAX_PATH+1];
		char ctrl_dir[MAX_PATH+1];
		char data_dir[MAX_PATH+1];
		char exec_dir[MAX_PATH+1];

		// in case GetShortPathName fails
		SAFECOPY(node_dir,cfg.node_dir);
		SAFECOPY(ctrl_dir,cfg.ctrl_dir);
		SAFECOPY(data_dir,cfg.data_dir);
		SAFECOPY(exec_dir,cfg.exec_dir);

		GetShortPathName(cfg.node_dir,node_dir,sizeof(node_dir));
		GetShortPathName(cfg.ctrl_dir,ctrl_dir,sizeof(node_dir));
		GetShortPathName(cfg.data_dir,data_dir,sizeof(data_dir));
		GetShortPathName(cfg.exec_dir,exec_dir,sizeof(exec_dir));

449
450
		SAFEPRINTF(path,"%sDOSXTRN.RET", cfg.node_dir);
		(void)remove(path);
451
452

    	// Create temporary environment file
453
    	SAFEPRINTF(path,"%sDOSXTRN.ENV", node_dir);
454
        FILE* fp=fopen(path,"w");
455
        if(fp==NULL) {
456
			XTRN_CLEANUP;
457
        	errormsg(WHERE, ERR_CREATE, path, 0);
458
            return(errno);
459
460
        }
        fprintf(fp, "%s\n", fullcmdline);
461
462
463
464
465
		fprintf(fp, "DSZLOG=%sPROTOCOL.LOG\n", node_dir);
        fprintf(fp, "SBBSNODE=%s\n", node_dir);
        fprintf(fp, "SBBSCTRL=%s\n", ctrl_dir);
		fprintf(fp, "SBBSDATA=%s\n", data_dir);
		fprintf(fp, "SBBSEXEC=%s\n", exec_dir);
466
        fprintf(fp, "SBBSNNUM=%d\n", cfg.node_num);
467
		fprintf(fp, "PCBNODE=%d\n", cfg.node_num);
468
469
		fprintf(fp, "PCBDRIVE=%.2s\n", node_dir);
		fprintf(fp, "PCBDIR=%s\n", node_dir + 2);
470
471
472
473
474
475
		/* date/time env vars */
		fprintf(fp, "DAY=%02u\n", tm.tm_mday);
		fprintf(fp, "WEEKDAY=%s\n",wday[tm.tm_wday]);
		fprintf(fp, "MONTHNAME=%s\n",mon[tm.tm_mon]);
		fprintf(fp, "MONTH=%02u\n",tm.tm_mon+1);
		fprintf(fp, "YEAR=%u\n",1900+tm.tm_year);
476
477
        fclose(fp);

478
        SAFEPRINTF2(fullcmdline, "%sDOSXTRN.EXE %s", cfg.exec_dir, path);
479

480
		if(!(mode&EX_OFFLINE)) {
481
			i=SBBSEXEC_MODE_FOSSIL;
482
			if(mode&EX_STDIN)
483
           		i|=SBBSEXEC_MODE_DOS_IN;
484
			if(mode&EX_STDOUT)
485
        		i|=SBBSEXEC_MODE_DOS_OUT;
486
487
			sprintf(str," NT %u %u"
				,cfg.node_num,i);
488
489
490
491
492
493
494
495
496
			strcat(fullcmdline,str);

			sprintf(str,"sbbsexec_hungup%d",cfg.node_num);
			if((hungup_event=CreateEvent(
				 NULL	// pointer to security attributes
				,TRUE	// flag for manual-reset event
				,FALSE  // flag for initial state
				,str	// pointer to event-object name
				))==NULL) {
497
				XTRN_CLEANUP;
498
				errormsg(WHERE, ERR_CREATE, str, 0);
499
500
501
				return(GetLastError());
			}

502
503
504
505
506
507
508
509
510
511
512
513
			sprintf(str,"sbbsexec_hangup%d",cfg.node_num);
			if((hangup_event=CreateEvent(
				 NULL	// pointer to security attributes
				,TRUE	// flag for manual-reset event
				,FALSE  // flag for initial state
				,str	// pointer to event-object name
				))==NULL) {
				XTRN_CLEANUP;
				errormsg(WHERE, ERR_CREATE, str, 0);
				return(GetLastError());
			}

514
515
516
			sprintf(str,"\\\\.\\mailslot\\sbbsexec\\rd%d"
				,cfg.node_num);
			rdslot=CreateMailslot(str
517
				,sizeof(buf)/2			// Maximum message size (0=unlimited)
518
519
520
				,0						// Read time-out
				,NULL);                 // Security
			if(rdslot==INVALID_HANDLE_VALUE) {
521
				XTRN_CLEANUP;
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
				errormsg(WHERE, ERR_CREATE, str, 0);
				return(GetLastError());
			}
		}
    }

	if(startup_dir!=NULL && startup_dir[0])
		p_startup_dir=startup_dir;
	else
		p_startup_dir=NULL;
    STARTUPINFO startup_info={0};
    startup_info.cb=sizeof(startup_info);
	if(mode&EX_OFFLINE)
		startup_info.lpTitle=NULL;
	else {
537
		SAFEPRINTF3(title,"%s running %s on node %d"
538
539
540
541
542
			,useron.number ? useron.alias : "Event"
			,realcmdline
			,cfg.node_num);
		startup_info.lpTitle=title;
	}
543
    if(startup->options&BBS_OPT_XTRN_MINIMIZED) {
544
545
546
    	startup_info.wShowWindow=SW_SHOWMINNOACTIVE;
        startup_info.dwFlags|=STARTF_USESHOWWINDOW;
    }
547
548
549
550
551
552
553
554
	if(use_pipes) {
		// Set up the security attributes struct.
		SECURITY_ATTRIBUTES sa;
		memset(&sa,0,sizeof(sa));
		sa.nLength= sizeof(SECURITY_ATTRIBUTES);
		sa.lpSecurityDescriptor = NULL;
		sa.bInheritHandle = TRUE;

555
556
		// Create the child output pipe (override default 4K buffer size)
		if(!CreatePipe(&rdoutpipe,&startup_info.hStdOutput,&sa,sizeof(buf))) {
557
			errormsg(WHERE,ERR_CREATE,"stdout pipe",0);
558
			strListFreeBlock(env_block);
559
560
561
562
563
			return(GetLastError());
		}
		startup_info.hStdError=startup_info.hStdOutput;

		// Create the child input pipe.
564
		if(!CreatePipe(&startup_info.hStdInput,&wrinpipe,&sa,sizeof(buf))) {
565
			errormsg(WHERE,ERR_CREATE,"stdin pipe",0);
566
567
			CloseHandle(rdoutpipe);
			strListFreeBlock(env_block);
568
569
			return(GetLastError());
		}
570

571
572
573
574
575
576
577
578
579
580
581
582
583
584
		DuplicateHandle(
			GetCurrentProcess(), rdoutpipe,
			GetCurrentProcess(), &rdslot, 0, FALSE, DUPLICATE_SAME_ACCESS);

		DuplicateHandle(
			GetCurrentProcess(), wrinpipe,
			GetCurrentProcess(), &wrslot, 0, FALSE, DUPLICATE_SAME_ACCESS);

		CloseHandle(rdoutpipe);
		CloseHandle(wrinpipe);

		startup_info.dwFlags|=STARTF_USESTDHANDLES|STARTF_USESHOWWINDOW;
    	startup_info.wShowWindow=SW_HIDE;
	}
585
	if(native && !(mode&EX_OFFLINE)) {
586

587
		if(!(mode&EX_STDIN)) {
588
			if(passthru_thread_running)
589
				passthru_socket_activate(true);
590
591
			else
				pthread_mutex_lock(&input_thread_mutex);
592
		}
593
594
	}

595
    success=CreateProcess(
596
597
598
599
		NULL,			// pointer to name of executable module
		fullcmdline,  	// pointer to command line string
		NULL,  			// process security attributes
		NULL,   		// thread security attributes
600
		native && !(mode&EX_OFFLINE),	 			// handle inheritance flag
601
		CREATE_NEW_CONSOLE/*|CREATE_SEPARATE_WOW_VDM*/, // creation flags
602
        env_block, 		// pointer to new environment block
603
604
605
		p_startup_dir,	// pointer to current directory name
		&startup_info,  // pointer to STARTUPINFO
		&process_info  	// pointer to PROCESS_INFORMATION
606
607
608
609
610
		);

	strListFreeBlock(env_block);

	if(!success) {
611
		XTRN_CLEANUP;
612
613
		if(!(mode&EX_STDIN)) {
			if(passthru_thread_running)
614
				passthru_socket_activate(false);
615
616
617
			else
				pthread_mutex_unlock(&input_thread_mutex);
		}
618
		SetLastError(last_error);	/* Restore LastError */
619
        errormsg(WHERE, ERR_EXEC, realcmdline, mode);
620
		SetLastError(last_error);	/* Restore LastError */
621
622
623
        return(GetLastError());
    }

624
625
626
627
#if 0
	char dbgstr[256];
	sprintf(dbgstr,"Node %d created: hProcess %X hThread %X processID %X threadID %X\n"
		,cfg.node_num
rswindell's avatar
rswindell committed
628
629
630
631
		,process_info.hProcess
		,process_info.hThread
		,process_info.dwProcessId
		,process_info.dwThreadId);
632
633
634
	OutputDebugString(dbgstr);
#endif

635
636
	CloseHandle(process_info.hThread);

637
	/* Disable Ctrl-C checking */
638
	if(!(mode&EX_OFFLINE))
639
		rio_abortable=false;
640

641
    // Executing app in foreground?, monitor
642
    retval=STILL_ACTIVE;
643
    while(!(mode&EX_BG)) {
644
645
		if(mode&EX_CHKTIME)
			gettimeleft();
646
647
        if(!online && !(mode&EX_OFFLINE)) { // Tell VXD/VDD and external that user hung-up
        	if(was_online) {
648
				logline(LOG_NOTICE,"X!","hung-up in external program");
649
650
            	hungup=time(NULL);
				if(!native) {
651
					SetEvent(hungup_event);
652
653
654
				}
	            was_online=false;
            }
655
            if(hungup && time(NULL)-hungup>5 && !processTerminated) {
656
				lprintf(LOG_INFO,"Terminating process from line %d", __LINE__);
657
658
				processTerminated=TerminateProcess(process_info.hProcess, 2112);
			}
659
        }
rswindell's avatar
rswindell committed
660
		if((native && !use_pipes) || mode&EX_OFFLINE) {
661
			/* Monitor for process termination only */
662
663
			if(WaitForSingleObject(process_info.hProcess,1000)==WAIT_OBJECT_0)
				break;
664
665
		} else {

666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
			/* Write to VDD */

			wr=RingBufPeek(&inbuf,buf,sizeof(buf));
			if(wr) {
				if(!use_pipes && wrslot==INVALID_HANDLE_VALUE) {
					sprintf(str,"\\\\.\\mailslot\\sbbsexec\\wr%d"
						,cfg.node_num);
					wrslot=CreateFile(str
						,GENERIC_WRITE
						,FILE_SHARE_READ
						,NULL
						,OPEN_EXISTING
						,FILE_ATTRIBUTE_NORMAL
						,(HANDLE) NULL);
					if(wrslot==INVALID_HANDLE_VALUE)
						lprintf(LOG_DEBUG,"!ERROR %u (%s) opening %s", GetLastError(), strerror(errno), str);
682
					else
683
684
						lprintf(LOG_DEBUG,"CreateFile(%s)=0x%x", str, wrslot);
				}
685

686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
				/* CR expansion */
				if(use_pipes)
					bp=cr_expand(buf,wr,output_buf,wr);
				else
					bp=buf;

				len=0;
				if(wrslot==INVALID_HANDLE_VALUE)
					lprintf(LOG_WARNING,"VDD Open failed (not loaded yet?)");
				else if(!WriteFile(wrslot,bp,wr,&len,NULL)) {
					lprintf(LOG_ERR,"!VDD WriteFile(0x%x, %u) FAILURE (Error=%u)", wrslot, wr, GetLastError());
					if(GetMailslotInfo(wrslot,&wr,NULL,NULL,NULL))
						lprintf(LOG_DEBUG,"!VDD MailSlot max_msg_size=%u", wr);
					else
						lprintf(LOG_DEBUG,"!GetMailslotInfo(0x%x)=%u", wrslot, GetLastError());
				} else {
					if(len!=wr)
						lprintf(LOG_WARNING,"VDD short write (%u instead of %u)", len,wr);
					RingBufRead(&inbuf, NULL, len);
					if(use_pipes && !(mode&EX_NOECHO)) {
						/* echo */
						RingBufWrite(&outbuf, bp, len);
708
					}
709
				}
710
711
				wr=len;
			}
712

713
			/* Read from VDD */
714

715
716
717
			rd=0;
			len=sizeof(buf);
			avail=RingBufFree(&outbuf)/2;	// leave room for wwiv/telnet expansion
718
#if 0
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
			if(avail==0)
				lprintf("Node %d !output buffer full (%u bytes)"
					,cfg.node_num,RingBufFull(&outbuf));
#endif
			if(len>avail)
            	len=avail;

			while(rd<len) {
				unsigned long waiting=0;

				if(use_pipes)
					PeekNamedPipe(
						rdslot,             // handle to pipe to copy from
						NULL,               // pointer to data buffer
						0,					// size, in bytes, of data buffer
						NULL,				// pointer to number of bytes read
						&waiting,			// pointer to total number of bytes available
						NULL				// pointer to unread bytes in this message
						);
				else
					GetMailslotInfo(
						rdslot,				// mailslot handle
 						NULL,				// address of maximum message size
						NULL,				// address of size of next message
						&waiting,			// address of number of messages
 						NULL				// address of read time-out
						);
				if(!waiting)
					break;
				if(ReadFile(rdslot,buf+rd,len-rd,&msglen,NULL)==FALSE || msglen<1)
					break;
				rd+=msglen;
			}
752

753
754
755
756
757
758
759
760
761
			if(rd) {
				if(mode&EX_WWIV) {
                	bp=wwiv_expand(buf, rd, wwiv_buf, rd, useron.misc, wwiv_flag);
					if(rd>sizeof(wwiv_buf))
						lprintf(LOG_ERR,"WWIV_BUF OVERRUN");
				} else if(telnet_mode&TELNET_MODE_OFF) {
					bp=buf;
				} else {
                	rd = telnet_expand(buf, rd, telnet_buf, sizeof(telnet_buf), /* expand_cr: */false, &bp);
762
				}
763
764
765
				if(rd>RingBufFree(&outbuf)) {
					lprintf(LOG_ERR,"output buffer overflow");
					rd=RingBufFree(&outbuf);
766
				}
767
				if(mode&EX_BIN)
768
					RingBufWrite(&outbuf, bp, rd);
769
770
				else
					rputs((char*)bp, rd);
771
			}
772
#if defined(_DEBUG) && 0
773
774
775
776
777
778
			if(rd>1) {
				sprintf(str,"Node %d read %5d bytes from xtrn", cfg.node_num, rd);
				OutputDebugString(str);
			}
#endif
            if((!rd && !wr) || hungup) {
779
780
781
782
783

				loop_since_io++;	/* number of loop iterations with no I/O */

				/* only check process termination after 300 milliseconds of no I/O */
				/* to allow for last minute reception of output from DOS programs */
784
785
				if(loop_since_io>=3) {

786
					if(online && hangup_event!=NULL
787
788
789
790
791
792
793
794
795
						&& WaitForSingleObject(hangup_event,0)==WAIT_OBJECT_0) {
						lprintf(LOG_NOTICE,"Node %d External program requested hangup (dropped DTR)"
							,cfg.node_num);
						hangup();
					}

					if(WaitForSingleObject(process_info.hProcess,0)==WAIT_OBJECT_0)
						break;	/* Process Terminated */
				}
796
797

				/* only check node for interrupt flag every 3 seconds of no I/O */
rswindell's avatar
rswindell committed
798
				if((loop_since_io%30)==0) {
799
800
801
802
803
804
805
					// Check if the node has been interrupted
					getnodedat(cfg.node_num,&thisnode,0);
					if(thisnode.misc&NODE_INTR)
						break;
				}

				/* only send telnet GA every 30 seconds of no I/O */
806
				if((loop_since_io%300)==0) {
807
#if defined(_DEBUG)
808
809
810
811
812
813
814
					sprintf(str,"Node %d xtrn idle\n",cfg.node_num);
					OutputDebugString(str);
#endif
					// Let's make sure the socket is up
					// Sending will trigger a socket d/c detection
					if(!(startup->options&BBS_OPT_NO_TELNET_GA))
						send_telnet_cmd(TELNET_GA,0);
815
				}
816
				sem_trywait_block(&inbuf.sem,100);
817
818
819
820
821
            } else
				loop_since_io=0;
        }
	}

822
    if(!(mode&EX_BG)) {			/* !background execution */
823

824
825
826
        if(GetExitCodeProcess(process_info.hProcess, &retval)==FALSE)
            errormsg(WHERE, ERR_CHK, "ExitCodeProcess",(DWORD)process_info.hProcess);

827
		if(retval==STILL_ACTIVE) {
828
			lprintf(LOG_INFO,"Node %d Terminating process from line %d",cfg.node_num,__LINE__);
829
			TerminateProcess(process_info.hProcess, GetLastError());
rswindell's avatar
rswindell committed
830
		}
831

832
	 	// Get return value
833
834
835
836
		if(!native) {
    		sprintf(str,"%sDOSXTRN.RET", cfg.node_dir);
			FILE* fp=fopen(str,"r");
			if(fp!=NULL) {
837
838
839
840
				if(fscanf(fp,"%d",&retval) != 1) {
					lprintf(LOG_ERR, "Node %d Error reading return value from %s", cfg.node_num, str);
					retval = -1;
				}
841
842
				fclose(fp);
			}
843
844
845
		}
	}

846
	XTRN_CLEANUP;
847
	CloseHandle(process_info.hProcess);
848
849
850

	if(!(mode&EX_OFFLINE)) {	/* !off-line execution */

851
		if(native) {
852
853
			if(!(mode&EX_STDIN)) {
				if(passthru_thread_running)
854
					passthru_socket_activate(false);
855
856
857
				else
					pthread_mutex_unlock(&input_thread_mutex);
			}
858
		}
859

860
861
		curatr=~0;			// Can't guarantee current attributes
		attr(LIGHTGRAY);	// Force to "normal"
862

863
		rio_abortable=rio_abortable_save;	// Restore abortable state
864

865
		/* Got back to Text/NVT mode */
866
		request_telnet_opt(TELNET_DONT,TELNET_BINARY_TX);
867
	}
868

869
870
//	lprintf("%s returned %d",realcmdline, retval);

871
	errorlevel = retval; // Baja or JS retrievable error value
872

873
874
875
	return(retval);
}

876
877
#else	/* !WIN32 */

878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
/*****************************************************************************/
// Expands Unix LF to CRLF
/*****************************************************************************/
BYTE* lf_expand(BYTE* inbuf, ulong inlen, BYTE* outbuf, ulong& newlen)
{
	ulong	i,j;

	for(i=j=0;i<inlen;i++) {
		if(inbuf[i]=='\n' && (!i || inbuf[i-1]!='\r'))
			outbuf[j++]='\r';
		outbuf[j++]=inbuf[i];
	}
	newlen=j;
    return(outbuf);
}

894
895
#define MAX_ARGS 1000

deuce's avatar
deuce committed
896
897
898
899
900
901
902
903
904
905
906
#ifdef NEEDS_SETENV
static int setenv(const char *name, const char *value, int overwrite)
{
	char *envstr;
	char *oldenv;
	if(overwrite || getenv(name)==NULL) {
		envstr=(char *)malloc(strlen(name)+strlen(value)+2);
		if(envstr==NULL) {
			errno=ENOMEM;
			return(-1);
		}
deuce's avatar
deuce committed
907
908
		/* Note, on some platforms, this can be free()d... */
		sprintf(envstr,"%s=%s",name,value);
deuce's avatar
deuce committed
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
		putenv(envstr);
	}
	return(0);
}
#endif

#ifdef NEEDS_CFMAKERAW
void
cfmakeraw(struct termios *t)
{
	t->c_iflag &= ~(IMAXBEL|IGNBRK|BRKINT|PARMRK|ISTRIP|INLCR|IGNCR|ICRNL|IXON);
	t->c_oflag &= ~OPOST;
	t->c_lflag &= ~(ECHO|ECHONL|ICANON|ISIG|IEXTEN);
	t->c_cflag &= ~(CSIZE|PARENB);
	t->c_cflag |= CS8;
}
#endif

927
928
929
930
931
932
933
934
935
936
937
938
939
940
#ifdef NEEDS_FORKPTY
static int login_tty(int fd)
{
	(void) setsid();
	if (!isatty(fd))
		return (-1);
	(void) dup2(fd, 0);
	(void) dup2(fd, 1);
	(void) dup2(fd, 2);
	if (fd > 2)
		(void) close(fd);
	return (0);
}

941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
#ifdef NEEDS_DAEMON
/****************************************************************************/
/* Daemonizes the process                                                   */
/****************************************************************************/
int
daemon(int nochdir, int noclose)
{
    int fd;

    switch (fork()) {
    case -1:
        return (-1);
    case 0:
        break;
    default:
        _exit(0);
    }

    if (setsid() == -1)
        return (-1);

    if (!nochdir)
        (void)chdir("/");

    if (!noclose && (fd = open(_PATH_DEVNULL, O_RDWR, 0)) != -1) {
        (void)dup2(fd, STDIN_FILENO);
        (void)dup2(fd, STDOUT_FILENO);
        (void)dup2(fd, STDERR_FILENO);
        if (fd > 2)
            (void)close(fd);
    }
    return (0);
}
#endif

976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
static int openpty(int *amaster, int *aslave, char *name, struct termios *termp, winsize *winp)
{
	char line[] = "/dev/ptyXX";
	const char *cp1, *cp2;
	int master, slave, ttygid;
	struct group *gr;

	if ((gr = getgrnam("tty")) != NULL)
		ttygid = gr->gr_gid;
	else
		ttygid = -1;

	for (cp1 = "pqrsPQRS"; *cp1; cp1++) {
		line[8] = *cp1;
		for (cp2 = "0123456789abcdefghijklmnopqrstuv"; *cp2; cp2++) {
			line[5] = 'p';
			line[9] = *cp2;
			if ((master = open(line, O_RDWR, 0)) == -1) {
				if (errno == ENOENT)
					break; /* try the next pty group */
			} else {
				line[5] = 't';
				(void) chown(line, getuid(), ttygid);
				(void) chmod(line, S_IRUSR|S_IWUSR|S_IWGRP);
				/* Hrm... SunOS doesn't seem to have revoke
				(void) revoke(line); */
				if ((slave = open(line, O_RDWR, 0)) != -1) {
					*amaster = master;
					*aslave = slave;
					if (name)
						strcpy(name, line);
					if (termp)
						(void) tcsetattr(slave,
							TCSAFLUSH, termp);
					if (winp)
						(void) ioctl(slave, TIOCSWINSZ,
							(char *)winp);
					return (0);
				}
				(void) close(master);
			}
		}
	}
	errno = ENOENT;	/* out of ptys */
	return (-1);
}

static int forkpty(int *amaster, char *name, termios *termp, winsize *winp)
{
	int master, slave, pid;

	if (openpty(&master, &slave, name, termp, winp) == -1)
		return (-1);
1029
	switch (pid = FORK()) {
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
	case -1:
		return (-1);
	case 0:
		/*
		 * child
		 */
		(void) close(master);
		login_tty(slave);
		return (0);
	}
	/*
	 * parent
	 */
	*amaster = master;
	(void) close(slave);
	return (pid);
}
#endif /* NEED_FORKPTY */

1049
int sbbs_t::external(const char* cmdline, long mode, const char* startup_dir)
1050
{
1051
1052
	char	str[MAX_PATH+1];
	char	fname[MAX_PATH+1];
1053
	char	fullpath[MAX_PATH+1];
1054
	char	fullcmdline[MAX_PATH+1];
1055
	char*	argv[MAX_ARGS + 1];
1056
1057
1058
	BYTE*	bp;
	BYTE	buf[XTRN_IO_BUF_LEN];
    BYTE 	output_buf[XTRN_IO_BUF_LEN*2];
1059
	ulong	avail;
1060
1061
    ulong	output_len;
	bool	native=false;			// DOS program by default
1062
	bool	rio_abortable_save=rio_abortable;
rswindell's avatar
rswindell committed
1063
	int		i;
1064
	bool	data_waiting;
1065
1066
	int		rd;
	int		wr;
1067
	int		argc;
1068
	pid_t	pid;
1069
1070
	int		in_pipe[2];
	int		out_pipe[2];
1071
	int		err_pipe[2];
1072
1073
    BYTE 	wwiv_buf[XTRN_IO_BUF_LEN*2];
    bool	wwiv_flag=false;
1074
 	char* p;
1075
#ifdef PREFER_POLL
Deucе's avatar
Deucе committed
1076
	struct pollfd fds[2];
1077
1078
1079
#else
#error select() implementation was removed in 3971ef4d
#endif
1080

1081
	xtrn_mode = mode;
rswindell's avatar
rswindell committed
1082
	lprintf(LOG_DEBUG, "Executing external: %s", cmdline);
1083

1084
1085
1086
1087
1088
	if(startup_dir!=NULL && startup_dir[0] && !isdir(startup_dir)) {
		errormsg(WHERE, ERR_CHK, startup_dir, 0);
		return -1;
	}

1089
1090
	if(startup_dir==NULL)
		startup_dir=nulstr;
1091

1092
	XTRN_LOADABLE_MODULE(cmdline,startup_dir);
1093
	XTRN_LOADABLE_JS_MODULE(cmdline,mode,startup_dir);
1094

1095
	attr(cfg.color[clr_external]);  /* setup default attributes */
1096

1097
1098
	native = native_executable(&cfg, cmdline, mode);

1099
1100
1101
    SAFECOPY(str,cmdline);			/* Set fname to program name only */
	truncstr(str," ");
    SAFECOPY(fname,getfname(str));
1102

1103
1104
	sprintf(fullpath,"%s%s",startup_dir,fname);
	if(startup_dir!=NULL && cmdline[0]!='/' && cmdline[0]!='.' && fexist(fullpath))
1105
1106
1107
		sprintf(fullcmdline,"%s%s",startup_dir,cmdline);
	else
		SAFECOPY(fullcmdline,cmdline);
1108

1109
 	if(native) { // Native (not MS-DOS) external
1110
1111

		// Current environment passed to child process
1112
1113
1114
1115
1116
1117
		sprintf(dszlog,"%sPROTOCOL.LOG",cfg.node_dir);
		setenv("DSZLOG",dszlog,1); 		/* Makes the DSZ LOG active */
		setenv("SBBSNODE",cfg.node_dir,1);
		setenv("SBBSCTRL",cfg.ctrl_dir,1);
		setenv("SBBSDATA",cfg.data_dir,1);
		setenv("SBBSEXEC",cfg.exec_dir,1);
1118
		sprintf(str,"%u",cfg.node_num);
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
		setenv("SBBSNNUM",str,1);

		/* date/time env vars */
		now = time(NULL);
		struct	tm tm;
		if(localtime_r(&now, &tm) == NULL)
			memset(&tm, 0, sizeof(tm));
		sprintf(str," %02u", tm.tm_mday);
		setenv("DAY", str, /* overwrite */TRUE);
		setenv("WEEKDAY", wday[tm.tm_wday], /* overwrite */TRUE);
		setenv("MONTHNAME", mon[tm.tm_mon], /* overwrite */TRUE);
		sprintf(str, "%02u", tm.tm_mon + 1);
		setenv("MONTH", str, /* overwrite */TRUE);
		sprintf(str,"%u", 1900 + tm.tm_year);
		if(setenv("YEAR", str, /* overwrite */TRUE) != 0)
			errormsg(WHERE,ERR_WRITE,"environment",0);
1135
1136

	} else {