xtrn.cpp 64.5 KB
Newer Older
1
2
3
4
5
6
/* Synchronet external program support routines */

/****************************************************************************
 * @format.tab-size 4		(Plain Text/Source Code File Header)			*
 * @format.use-tabs true	(see http://www.synchro.net/ptsc_hdr.html)		*
 *																			*
rswindell's avatar
rswindell committed
7
 * Copyright Rob Swindell - http://www.synchro.net/copyright.html			*
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
 *																			*
 * This program is free software; you can redistribute it and/or			*
 * modify it under the terms of the GNU General Public License				*
 * as published by the Free Software Foundation; either version 2			*
 * of the License, or (at your option) any later version.					*
 * See the GNU General Public License for more details: gpl.txt or			*
 * http://www.fsf.org/copyleft/gpl.html										*
 *																			*
 * For Synchronet coding style and modification guidelines, see				*
 * http://www.synchro.net/source.html										*
 *																			*
 * Note: If this box doesn't appear square, then you need to fix your tabs.	*
 ****************************************************************************/
#include "sbbs.h"
#include "cmdshell.h"
#include "telnet.h"

25
26
#include <signal.h>			// kill()

27
28
29
#ifdef __unix__
	#include <sys/wait.h>	// WEXITSTATUS

deuce's avatar
deuce committed
30
31
	#define TTYDEFCHARS		// needed for ttydefchars definition
	#include <sys/ttydefaults.h>	// Linux - it's motherfucked.
rswindell's avatar
rswindell committed
32
#if defined(__FreeBSD__)
33
	#include <libutil.h>	// forkpty()
deuce's avatar
deuce committed
34
#elif defined(__OpenBSD__) || defined(__NetBSD__) || defined(__DARWIN__)
rswindell's avatar
rswindell committed
35
36
	#include <util.h>
#elif defined(__linux__)
37
	#include <pty.h>
38
#elif defined(__QNX__)
39
#if 0
40
	#include <unix.h>
41
42
43
#else
	#define NEEDS_FORKPTY
#endif
44
#endif
45
46
47
48
49

	#ifdef NEEDS_FORKPTY
	#include <grp.h>
	#endif

50
	#include <termios.h>
51

deuce's avatar
deuce committed
52
53
54
55
/*
 * Control Character Defaults
 */
#ifndef CTRL
56
	#define CTRL(x)	(x&037)
deuce's avatar
deuce committed
57
58
#endif
#ifndef CEOF
59
	#define	CEOF		CTRL('d')
deuce's avatar
deuce committed
60
61
#endif
#ifndef CEOL
62
	#define	CEOL		0xff		/* XXX avoid _POSIX_VDISABLE */
deuce's avatar
deuce committed
63
64
#endif
#ifndef CERASE
65
	#define	CERASE		0177
deuce's avatar
deuce committed
66
67
#endif
#ifndef CERASE2
68
	#define	CERASE2		CTRL('h')
deuce's avatar
deuce committed
69
70
#endif
#ifndef CINTR
71
	#define	CINTR		CTRL('c')
deuce's avatar
deuce committed
72
73
#endif
#ifndef CSTATUS
74
	#define	CSTATUS		CTRL('t')
deuce's avatar
deuce committed
75
76
#endif
#ifndef CKILL
77
	#define	CKILL		CTRL('u')
deuce's avatar
deuce committed
78
79
#endif
#ifndef CMIN
80
	#define	CMIN		1
deuce's avatar
deuce committed
81
82
#endif
#ifndef CQUIT
83
	#define	CQUIT		034		/* FS, ^\ */
deuce's avatar
deuce committed
84
85
#endif
#ifndef CSUSP
86
	#define	CSUSP		CTRL('z')
deuce's avatar
deuce committed
87
88
#endif
#ifndef CTIME
89
	#define	CTIME		0
deuce's avatar
deuce committed
90
91
#endif
#ifndef CDSUSP
92
	#define	CDSUSP		CTRL('y')
deuce's avatar
deuce committed
93
94
#endif
#ifndef CSTART
95
	#define	CSTART		CTRL('q')
deuce's avatar
deuce committed
96
97
#endif
#ifndef CSTOP
98
	#define	CSTOP		CTRL('s')
deuce's avatar
deuce committed
99
100
#endif
#ifndef CLNEXT
101
	#define	CLNEXT		CTRL('v')
deuce's avatar
deuce committed
102
103
#endif
#ifndef CDISCARD
104
	#define	CDISCARD 	CTRL('o')
deuce's avatar
deuce committed
105
106
#endif
#ifndef CWERASE
107
	#define	CWERASE 	CTRL('w')
deuce's avatar
deuce committed
108
109
#endif
#ifndef CREPRINT
110
	#define	CREPRINT 	CTRL('r')
deuce's avatar
deuce committed
111
112
#endif
#ifndef CEOT
113
	#define	CEOT		CEOF
deuce's avatar
deuce committed
114
115
116
#endif
/* compat */
#ifndef CBRK
117
	#define	CBRK		CEOL
deuce's avatar
deuce committed
118
119
#endif
#ifndef CRPRNT
120
	#define CRPRNT		CREPRINT
deuce's avatar
deuce committed
121
122
#endif
#ifndef CFLUSH
123
124
125
	#define	CFLUSH		CDISCARD
#endif

deuce's avatar
deuce committed
126
#ifndef TTYDEF_IFLAG
127
	#define TTYDEF_IFLAG    (BRKINT | ICRNL | IMAXBEL | IXON | IXANY)
deuce's avatar
deuce committed
128
129
#endif
#ifndef TTYDEF_OFLAG
130
	#define TTYDEF_OFLAG    (OPOST | ONLCR)
deuce's avatar
deuce committed
131
132
#endif
#ifndef TTYDEF_LFLAG
133
	#define TTYDEF_LFLAG    (ECHO | ICANON | ISIG | IEXTEN | ECHOE|ECHOKE|ECHOCTL)
deuce's avatar
deuce committed
134
135
#endif
#ifndef TTYDEF_CFLAG
136
	#define TTYDEF_CFLAG    (CREAD | CS8 | HUPCL)
deuce's avatar
deuce committed
137
#endif
deuce's avatar
deuce committed
138
#if defined(__QNX__) || defined(__solaris__) || defined(__NetBSD__)
139
140
141
	static cc_t     ttydefchars[NCCS] = {
        CEOF,   CEOL,   CEOL,   CERASE, CWERASE, CKILL, CREPRINT,
        CERASE2, CINTR, CQUIT,  CSUSP,  CDSUSP, CSTART, CSTOP,  CLNEXT,
deuce's avatar
deuce committed
142
143
144
145
        CDISCARD, CMIN, CTIME,  CSTATUS
#ifndef __solaris__
	, _POSIX_VDISABLE
#endif
146
	};
147
148
#endif

149
150
#endif	/* __unix__ */

151
#define XTRN_IO_BUF_LEN 10000	/* 50% of IO_THREAD_BUF_SIZE */
152

153
154
155
156
157
158
159
160
161
162
/*****************************************************************************/
/* Interrupt routine to expand WWIV Ctrl-C# codes into ANSI escape sequences */
/*****************************************************************************/
BYTE* wwiv_expand(BYTE* buf, ulong buflen, BYTE* outbuf, ulong& newlen
	,ulong user_misc, bool& ctrl_c)
{
    char	ansi_seq[32];
	ulong 	i,j,k;

    for(i=j=0;i<buflen;i++) {
163
        if(buf[i]==CTRL_C) {	/* WWIV color escape char */
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
            ctrl_c=true;
            continue;
        }
        if(!ctrl_c) {
            outbuf[j++]=buf[i];
            continue;
        }
        ctrl_c=false;
        if(user_misc&ANSI) {
            switch(buf[i]) {
                default:
                    strcpy(ansi_seq,"\x1b[0m");          /* low grey */
                    break;
                case '1':
                    strcpy(ansi_seq,"\x1b[0;1;36m");     /* high cyan */
                    break;
                case '2':
                    strcpy(ansi_seq,"\x1b[0;1;33m");     /* high yellow */
                    break;
                case '3':
                    strcpy(ansi_seq,"\x1b[0;35m");       /* low magenta */
                    break;
                case '4':
                    strcpy(ansi_seq,"\x1b[0;1;44m");     /* white on blue */
                    break;
                case '5':
                    strcpy(ansi_seq,"\x1b[0;32m");       /* low green */
                    break;
                case '6':
                    strcpy(ansi_seq,"\x1b[0;1;5;31m");   /* high blinking red */
                    break;
                case '7':
                    strcpy(ansi_seq,"\x1b[0;1;34m");     /* high blue */
                    break;
                case '8':
                    strcpy(ansi_seq,"\x1b[0;34m");       /* low blue */
                    break;
                case '9':
                    strcpy(ansi_seq,"\x1b[0;36m");       /* low cyan */
                    break;
            }
            for(k=0;ansi_seq[k];k++)
                outbuf[j++]=ansi_seq[k];
        }
    }
    newlen=j;
    return(outbuf);
}
212

213
214
215
216
217
218
219
static void petscii_convert(BYTE* buf, ulong len)
{
    for(ulong i=0; i<len; i++) {
		buf[i] = cp437_to_petscii(buf[i]);
	}
}

220
221
222
223
224
225
226
227
228
static bool native_executable(scfg_t* cfg, const char* cmdline, long mode)
{
	char*	p;
	char	str[MAX_PATH+1];
	char	name[64];
	char	base[64];
	unsigned i;

	if(mode&EX_NATIVE)
229
230
231
232
		return true;

	if(*cmdline == '?' || *cmdline == '*')
		return true;
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247

    SAFECOPY(str,cmdline);				/* Set str to program name only */
	truncstr(str," ");
    SAFECOPY(name,getfname(str));
	SAFECOPY(base,name);
	if((p=getfext(base))!=NULL)
		*p=0;

    for(i=0;i<cfg->total_natvpgms;i++)
        if(stricmp(name,cfg->natvpgm[i]->name)==0
		|| stricmp(base,cfg->natvpgm[i]->name)==0)
            break;
    return(i<cfg->total_natvpgms);
}

248
#define XTRN_LOADABLE_MODULE(cmdline,startup_dir)			\
249
	if(cmdline[0]=='*')		/* Baja module or JavaScript */	\
250
		return(exec_bin(cmdline+1,&main_csi,startup_dir));
251
#ifdef JAVASCRIPT
252
	#define XTRN_LOADABLE_JS_MODULE(cmdline,mode,startup_dir)	\
253
	if(cmdline[0]=='?' && (mode&EX_SH))						\
254
		return(js_execxtrn(cmdline+1, startup_dir));		\
255
	if(cmdline[0]=='?')										\
256
		return(js_execfile(cmdline+1,startup_dir));
257
258
259
#else
	#define XTRN_LOADABLE_JS_MODULE
#endif
260
261
262

#ifdef _WIN32

263
#include "execvxd.h"	/* DOSXTRN.EXE API */
264
265
266

extern SOCKET node_socket[];

267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
/*****************************************************************************/
// Expands Single CR to CRLF
/*****************************************************************************/
BYTE* cr_expand(BYTE* inbuf, ulong inlen, BYTE* outbuf, ulong& newlen)
{
	ulong	i,j;

	for(i=j=0;i<inlen;i++) {
		outbuf[j++]=inbuf[i];
		if(inbuf[i]=='\r')
			outbuf[j++]='\n';
	}
	newlen=j;
    return(outbuf);
}

283
284
285
286
287
288
289
290
static void add_env_var(str_list_t* list, const char* var, const char* val)
{
	char	str[MAX_PATH*2];
	SetEnvironmentVariable(var,NULL);	/* Delete in current process env */
	SAFEPRINTF2(str,"%s=%s",var,val);
	strListPush(list,str);
}

291
292
293
294
295
296
297
298
/* Clean-up resources while preserving current LastError value */
#define XTRN_CLEANUP												\
	last_error=GetLastError();										\
    if(vxd!=INVALID_HANDLE_VALUE)		CloseHandle(vxd);			\
	if(rdslot!=INVALID_HANDLE_VALUE)	CloseHandle(rdslot);		\
	if(wrslot!=INVALID_HANDLE_VALUE)	CloseHandle(wrslot);		\
	if(start_event!=NULL)				CloseHandle(start_event);	\
	if(hungup_event!=NULL)				CloseHandle(hungup_event);	\
299
	if(hangup_event!=NULL)				CloseHandle(hangup_event);	\
300
301
	SetLastError(last_error)

302
303
304
/****************************************************************************/
/* Runs an external program 												*/
/****************************************************************************/
305
int sbbs_t::external(const char* cmdline, long mode, const char* startup_dir)
306
{
307
308
309
	char	str[MAX_PATH+1];
	char*	env_block=NULL;
	char*	env_strings;
310
	const char* p_startup_dir;
311
	char	path[MAX_PATH+1];
312
313
314
315
    char	fullcmdline[MAX_PATH+1];
	char	realcmdline[MAX_PATH+1];
	char	comspec_str[MAX_PATH+1];
	char	title[MAX_PATH+1];
316
317
	BYTE	buf[XTRN_IO_BUF_LEN],*bp;
    BYTE 	telnet_buf[XTRN_IO_BUF_LEN*2];
318
    BYTE 	output_buf[XTRN_IO_BUF_LEN*2];
319
320
    BYTE 	wwiv_buf[XTRN_IO_BUF_LEN*2];
    bool	wwiv_flag=false;
321
    bool	native=false;			// DOS program by default
322
    bool	was_online=true;
323
	bool	rio_abortable_save=rio_abortable;
324
	bool	use_pipes=false;	// NT-compatible console redirection
325
	BOOL	success;
326
	BOOL	processTerminated=false;
327
	uint	i;
328
329
330
331
    time_t	hungup=0;
	HANDLE	vxd=INVALID_HANDLE_VALUE;
	HANDLE	rdslot=INVALID_HANDLE_VALUE;
	HANDLE	wrslot=INVALID_HANDLE_VALUE;
332
	HANDLE  start_event=NULL;
333
	HANDLE	hungup_event=NULL;
334
	HANDLE	hangup_event=NULL;
335
336
	HANDLE	rdoutpipe;
	HANDLE	wrinpipe;
337
    PROCESS_INFORMATION process_info;
deuce's avatar
deuce committed
338
	unsigned long	rd;
339
    unsigned long	wr;
deuce's avatar
deuce committed
340
    unsigned long	len;
341
    DWORD	avail;
deuce's avatar
deuce committed
342
343
	unsigned long	msglen;
	unsigned long	retval;
344
345
	DWORD	last_error;
	DWORD	loop_since_io=0;
346
	struct	tm tm;
347
	str_list_t	env_list;
348

349
	xtrn_mode = mode;
350
	lprintf(LOG_DEBUG,"Executing external: %s",cmdline);
351

352
353
354
355
356
	if(startup_dir!=NULL && startup_dir[0] && !isdir(startup_dir)) {
		errormsg(WHERE, ERR_CHK, startup_dir, 0);
		return -1;
	}

357
	XTRN_LOADABLE_MODULE(cmdline,startup_dir);
358
	XTRN_LOADABLE_JS_MODULE(cmdline,mode,startup_dir);
359

360
	attr(cfg.color[clr_external]);		/* setup default attributes */
361

362
	native = native_executable(&cfg, cmdline, mode);
363

364
	if(!native && (startup->options&BBS_OPT_NO_DOS)) {
365
		lprintf((mode&EX_OFFLINE) ? LOG_ERR : LOG_WARNING, "DOS programs not supported: %s", cmdline);
366
367
368
369
		bprintf("Sorry, DOS programs are not supported on this node.\r\n");
		return -1;
	}

rswindell's avatar
rswindell committed
370
	if(mode&EX_SH || strcspn(cmdline,"<>|")!=strlen(cmdline))
371
372
373
374
375
376
		sprintf(comspec_str,"%s /C ", comspec);
	else
		comspec_str[0]=0;

    if(startup_dir && cmdline[1]!=':' && cmdline[0]!='/'
    	&& cmdline[0]!='\\' && cmdline[0]!='.')
377
       	SAFEPRINTF3(fullcmdline, "%s%s%s", comspec_str, startup_dir, cmdline);
378
    else
379
    	SAFEPRINTF2(fullcmdline, "%s%s", comspec_str, cmdline);
380

381
	SAFECOPY(realcmdline, fullcmdline);	// for errormsg if failed to execute
382
383

	now=time(NULL);
384
385
	if(localtime_r(&now,&tm)==NULL)
		memset(&tm,0,sizeof(tm));
386

387
	if(native && mode&EX_STDOUT && !(mode&EX_OFFLINE))
388
389
		use_pipes=true;

390
 	if(native) { // Native (32-bit) external
391

392
393
394
395
396
397
		if((env_list=strListInit())==NULL) {
			XTRN_CLEANUP;
        	errormsg(WHERE, ERR_CREATE, "env_list", 0);
            return(errno);
		}

398
		// Current environment passed to child process
rswindell's avatar
rswindell committed
399
		sprintf(str,"%sprotocol.log",cfg.node_dir);
400
401
402
403
404
405
406
		add_env_var(&env_list,"DSZLOG",str);
		add_env_var(&env_list,"SBBSNODE",cfg.node_dir);
		add_env_var(&env_list,"SBBSCTRL",cfg.ctrl_dir);
		add_env_var(&env_list,"SBBSDATA",cfg.data_dir);
		add_env_var(&env_list,"SBBSEXEC",cfg.exec_dir);
		sprintf(str,"%d",cfg.node_num);
		add_env_var(&env_list,"SBBSNNUM",str);
407
		/* date/time env vars */
rswindell's avatar
rswindell committed
408
		sprintf(str,"%02u",tm.tm_mday);
409
410
411
412
413
414
415
		add_env_var(&env_list,"DAY",str);
		add_env_var(&env_list,"WEEKDAY",wday[tm.tm_wday]);
		add_env_var(&env_list,"MONTHNAME",mon[tm.tm_mon]);
		sprintf(str,"%02u",tm.tm_mon+1);
		add_env_var(&env_list,"MONTH",str);
		sprintf(str,"%u",1900+tm.tm_year);
		add_env_var(&env_list,"YEAR",str);
416
417
418
419
420
421
422
423
424
425
426
427

		env_strings=GetEnvironmentStrings();
		env_block=strListCopyBlock(env_strings);
		if(env_strings!=NULL)
			FreeEnvironmentStrings(env_strings);
		env_block=strListAppendBlock(env_block,env_list);
		strListFree(&env_list);
		if(env_block==NULL) {
			XTRN_CLEANUP;
        	errormsg(WHERE, ERR_CREATE, "env_block", 0);
            return(errno);
		}
428
429
430

    } else { // DOS external

431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
		// DOS-compatible (short) paths
		char node_dir[MAX_PATH+1];
		char ctrl_dir[MAX_PATH+1];
		char data_dir[MAX_PATH+1];
		char exec_dir[MAX_PATH+1];

		// in case GetShortPathName fails
		SAFECOPY(node_dir,cfg.node_dir);
		SAFECOPY(ctrl_dir,cfg.ctrl_dir);
		SAFECOPY(data_dir,cfg.data_dir);
		SAFECOPY(exec_dir,cfg.exec_dir);

		GetShortPathName(cfg.node_dir,node_dir,sizeof(node_dir));
		GetShortPathName(cfg.ctrl_dir,ctrl_dir,sizeof(node_dir));
		GetShortPathName(cfg.data_dir,data_dir,sizeof(data_dir));
		GetShortPathName(cfg.exec_dir,exec_dir,sizeof(exec_dir));

448
449
		sprintf(path,"%sDOSXTRN.RET", cfg.node_dir);
		remove(path);
450
451

    	// Create temporary environment file
452
    	sprintf(path,"%sDOSXTRN.ENV", node_dir);
453
        FILE* fp=fopen(path,"w");
454
        if(fp==NULL) {
455
			XTRN_CLEANUP;
456
        	errormsg(WHERE, ERR_CREATE, path, 0);
457
            return(errno);
458
459
        }
        fprintf(fp, "%s\n", fullcmdline);
460
461
462
463
464
		fprintf(fp, "DSZLOG=%sPROTOCOL.LOG\n", node_dir);
        fprintf(fp, "SBBSNODE=%s\n", node_dir);
        fprintf(fp, "SBBSCTRL=%s\n", ctrl_dir);
		fprintf(fp, "SBBSDATA=%s\n", data_dir);
		fprintf(fp, "SBBSEXEC=%s\n", exec_dir);
465
        fprintf(fp, "SBBSNNUM=%d\n", cfg.node_num);
466
		fprintf(fp, "PCBNODE=%d\n", cfg.node_num);
467
468
		fprintf(fp, "PCBDRIVE=%.2s\n", node_dir);
		fprintf(fp, "PCBDIR=%s\n", node_dir + 2);
469
470
471
472
473
474
		/* date/time env vars */
		fprintf(fp, "DAY=%02u\n", tm.tm_mday);
		fprintf(fp, "WEEKDAY=%s\n",wday[tm.tm_wday]);
		fprintf(fp, "MONTHNAME=%s\n",mon[tm.tm_mon]);
		fprintf(fp, "MONTH=%02u\n",tm.tm_mon+1);
		fprintf(fp, "YEAR=%u\n",1900+tm.tm_year);
475
476
        fclose(fp);

477
        SAFEPRINTF2(fullcmdline, "%sDOSXTRN.EXE %s", cfg.exec_dir, path);
478

479
		if(!(mode&EX_OFFLINE)) {
480
			i=SBBSEXEC_MODE_FOSSIL;
481
			if(mode&EX_STDIN)
482
           		i|=SBBSEXEC_MODE_DOS_IN;
483
			if(mode&EX_STDOUT)
484
        		i|=SBBSEXEC_MODE_DOS_OUT;
485
486
			sprintf(str," NT %u %u"
				,cfg.node_num,i);
487
488
489
490
491
492
493
494
495
			strcat(fullcmdline,str);

			sprintf(str,"sbbsexec_hungup%d",cfg.node_num);
			if((hungup_event=CreateEvent(
				 NULL	// pointer to security attributes
				,TRUE	// flag for manual-reset event
				,FALSE  // flag for initial state
				,str	// pointer to event-object name
				))==NULL) {
496
				XTRN_CLEANUP;
497
				errormsg(WHERE, ERR_CREATE, str, 0);
498
499
500
				return(GetLastError());
			}

501
502
503
504
505
506
507
508
509
510
511
512
			sprintf(str,"sbbsexec_hangup%d",cfg.node_num);
			if((hangup_event=CreateEvent(
				 NULL	// pointer to security attributes
				,TRUE	// flag for manual-reset event
				,FALSE  // flag for initial state
				,str	// pointer to event-object name
				))==NULL) {
				XTRN_CLEANUP;
				errormsg(WHERE, ERR_CREATE, str, 0);
				return(GetLastError());
			}

513
514
515
			sprintf(str,"\\\\.\\mailslot\\sbbsexec\\rd%d"
				,cfg.node_num);
			rdslot=CreateMailslot(str
516
				,sizeof(buf)/2			// Maximum message size (0=unlimited)
517
518
519
				,0						// Read time-out
				,NULL);                 // Security
			if(rdslot==INVALID_HANDLE_VALUE) {
520
				XTRN_CLEANUP;
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
				errormsg(WHERE, ERR_CREATE, str, 0);
				return(GetLastError());
			}
		}
    }

	if(startup_dir!=NULL && startup_dir[0])
		p_startup_dir=startup_dir;
	else
		p_startup_dir=NULL;
    STARTUPINFO startup_info={0};
    startup_info.cb=sizeof(startup_info);
	if(mode&EX_OFFLINE)
		startup_info.lpTitle=NULL;
	else {
536
		SAFEPRINTF3(title,"%s running %s on node %d"
537
538
539
540
541
			,useron.number ? useron.alias : "Event"
			,realcmdline
			,cfg.node_num);
		startup_info.lpTitle=title;
	}
542
    if(startup->options&BBS_OPT_XTRN_MINIMIZED) {
543
544
545
    	startup_info.wShowWindow=SW_SHOWMINNOACTIVE;
        startup_info.dwFlags|=STARTF_USESHOWWINDOW;
    }
546
547
548
549
550
551
552
553
	if(use_pipes) {
		// Set up the security attributes struct.
		SECURITY_ATTRIBUTES sa;
		memset(&sa,0,sizeof(sa));
		sa.nLength= sizeof(SECURITY_ATTRIBUTES);
		sa.lpSecurityDescriptor = NULL;
		sa.bInheritHandle = TRUE;

554
555
		// Create the child output pipe (override default 4K buffer size)
		if(!CreatePipe(&rdoutpipe,&startup_info.hStdOutput,&sa,sizeof(buf))) {
556
557
558
559
560
561
			errormsg(WHERE,ERR_CREATE,"stdout pipe",0);
			return(GetLastError());
		}
		startup_info.hStdError=startup_info.hStdOutput;

		// Create the child input pipe.
562
		if(!CreatePipe(&startup_info.hStdInput,&wrinpipe,&sa,sizeof(buf))) {
563
564
565
			errormsg(WHERE,ERR_CREATE,"stdin pipe",0);
			return(GetLastError());
		}
566

567
568
569
570
571
572
573
574
575
576
577
578
579
580
		DuplicateHandle(
			GetCurrentProcess(), rdoutpipe,
			GetCurrentProcess(), &rdslot, 0, FALSE, DUPLICATE_SAME_ACCESS);

		DuplicateHandle(
			GetCurrentProcess(), wrinpipe,
			GetCurrentProcess(), &wrslot, 0, FALSE, DUPLICATE_SAME_ACCESS);

		CloseHandle(rdoutpipe);
		CloseHandle(wrinpipe);

		startup_info.dwFlags|=STARTF_USESTDHANDLES|STARTF_USESHOWWINDOW;
    	startup_info.wShowWindow=SW_HIDE;
	}
581
	if(native && !(mode&EX_OFFLINE)) {
582

583
		if(!(mode&EX_STDIN)) {
584
			if(passthru_thread_running)
585
				passthru_socket_activate(true);
586
587
			else
				pthread_mutex_lock(&input_thread_mutex);
588
		}
589
590
	}

591
    success=CreateProcess(
592
593
594
595
		NULL,			// pointer to name of executable module
		fullcmdline,  	// pointer to command line string
		NULL,  			// process security attributes
		NULL,   		// thread security attributes
596
		native && !(mode&EX_OFFLINE),	 			// handle inheritance flag
597
		CREATE_NEW_CONSOLE/*|CREATE_SEPARATE_WOW_VDM*/, // creation flags
598
        env_block, 		// pointer to new environment block
599
600
601
		p_startup_dir,	// pointer to current directory name
		&startup_info,  // pointer to STARTUPINFO
		&process_info  	// pointer to PROCESS_INFORMATION
602
603
604
605
606
		);

	strListFreeBlock(env_block);

	if(!success) {
607
		XTRN_CLEANUP;
608
609
		if(!(mode&EX_STDIN)) {
			if(passthru_thread_running)
610
				passthru_socket_activate(false);
611
612
613
			else
				pthread_mutex_unlock(&input_thread_mutex);
		}
614
		SetLastError(last_error);	/* Restore LastError */
615
        errormsg(WHERE, ERR_EXEC, realcmdline, mode);
616
		SetLastError(last_error);	/* Restore LastError */
617
618
619
        return(GetLastError());
    }

620
621
622
623
#if 0
	char dbgstr[256];
	sprintf(dbgstr,"Node %d created: hProcess %X hThread %X processID %X threadID %X\n"
		,cfg.node_num
rswindell's avatar
rswindell committed
624
625
626
627
		,process_info.hProcess
		,process_info.hThread
		,process_info.dwProcessId
		,process_info.dwThreadId);
628
629
630
	OutputDebugString(dbgstr);
#endif

631
632
	CloseHandle(process_info.hThread);

633
	/* Disable Ctrl-C checking */
634
	if(!(mode&EX_OFFLINE))
635
		rio_abortable=false;
636

637
    // Executing app in foreground?, monitor
638
    retval=STILL_ACTIVE;
639
    while(!(mode&EX_BG)) {
640
641
		if(mode&EX_CHKTIME)
			gettimeleft();
642
643
        if(!online && !(mode&EX_OFFLINE)) { // Tell VXD/VDD and external that user hung-up
        	if(was_online) {
644
				logline(LOG_NOTICE,"X!","hung-up in external program");
645
646
            	hungup=time(NULL);
				if(!native) {
647
					SetEvent(hungup_event);
648
649
650
				}
	            was_online=false;
            }
651
            if(hungup && time(NULL)-hungup>5 && !processTerminated) {
652
				lprintf(LOG_INFO,"Terminating process from line %d", __LINE__);
653
654
				processTerminated=TerminateProcess(process_info.hProcess, 2112);
			}
655
        }
rswindell's avatar
rswindell committed
656
		if((native && !use_pipes) || mode&EX_OFFLINE) {
657
			/* Monitor for process termination only */
658
659
			if(WaitForSingleObject(process_info.hProcess,1000)==WAIT_OBJECT_0)
				break;
660
661
		} else {

662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
			/* Write to VDD */

			wr=RingBufPeek(&inbuf,buf,sizeof(buf));
			if(wr) {
				if(!use_pipes && wrslot==INVALID_HANDLE_VALUE) {
					sprintf(str,"\\\\.\\mailslot\\sbbsexec\\wr%d"
						,cfg.node_num);
					wrslot=CreateFile(str
						,GENERIC_WRITE
						,FILE_SHARE_READ
						,NULL
						,OPEN_EXISTING
						,FILE_ATTRIBUTE_NORMAL
						,(HANDLE) NULL);
					if(wrslot==INVALID_HANDLE_VALUE)
						lprintf(LOG_DEBUG,"!ERROR %u (%s) opening %s", GetLastError(), strerror(errno), str);
678
					else
679
680
						lprintf(LOG_DEBUG,"CreateFile(%s)=0x%x", str, wrslot);
				}
681

682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
				/* CR expansion */
				if(use_pipes)
					bp=cr_expand(buf,wr,output_buf,wr);
				else
					bp=buf;

				len=0;
				if(wrslot==INVALID_HANDLE_VALUE)
					lprintf(LOG_WARNING,"VDD Open failed (not loaded yet?)");
				else if(!WriteFile(wrslot,bp,wr,&len,NULL)) {
					lprintf(LOG_ERR,"!VDD WriteFile(0x%x, %u) FAILURE (Error=%u)", wrslot, wr, GetLastError());
					if(GetMailslotInfo(wrslot,&wr,NULL,NULL,NULL))
						lprintf(LOG_DEBUG,"!VDD MailSlot max_msg_size=%u", wr);
					else
						lprintf(LOG_DEBUG,"!GetMailslotInfo(0x%x)=%u", wrslot, GetLastError());
				} else {
					if(len!=wr)
						lprintf(LOG_WARNING,"VDD short write (%u instead of %u)", len,wr);
					RingBufRead(&inbuf, NULL, len);
					if(use_pipes && !(mode&EX_NOECHO)) {
						/* echo */
						RingBufWrite(&outbuf, bp, len);
704
					}
705
				}
706
707
				wr=len;
			}
708

709
			/* Read from VDD */
710

711
712
713
			rd=0;
			len=sizeof(buf);
			avail=RingBufFree(&outbuf)/2;	// leave room for wwiv/telnet expansion
714
#if 0
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
			if(avail==0)
				lprintf("Node %d !output buffer full (%u bytes)"
					,cfg.node_num,RingBufFull(&outbuf));
#endif
			if(len>avail)
            	len=avail;

			while(rd<len) {
				unsigned long waiting=0;

				if(use_pipes)
					PeekNamedPipe(
						rdslot,             // handle to pipe to copy from
						NULL,               // pointer to data buffer
						0,					// size, in bytes, of data buffer
						NULL,				// pointer to number of bytes read
						&waiting,			// pointer to total number of bytes available
						NULL				// pointer to unread bytes in this message
						);
				else
					GetMailslotInfo(
						rdslot,				// mailslot handle
 						NULL,				// address of maximum message size
						NULL,				// address of size of next message
						&waiting,			// address of number of messages
 						NULL				// address of read time-out
						);
				if(!waiting)
					break;
				if(ReadFile(rdslot,buf+rd,len-rd,&msglen,NULL)==FALSE || msglen<1)
					break;
				rd+=msglen;
			}
748

749
750
751
752
753
754
755
756
757
			if(rd) {
				if(mode&EX_WWIV) {
                	bp=wwiv_expand(buf, rd, wwiv_buf, rd, useron.misc, wwiv_flag);
					if(rd>sizeof(wwiv_buf))
						lprintf(LOG_ERR,"WWIV_BUF OVERRUN");
				} else if(telnet_mode&TELNET_MODE_OFF) {
					bp=buf;
				} else {
                	rd = telnet_expand(buf, rd, telnet_buf, sizeof(telnet_buf), /* expand_cr: */false, &bp);
758
				}
759
760
761
				if(rd>RingBufFree(&outbuf)) {
					lprintf(LOG_ERR,"output buffer overflow");
					rd=RingBufFree(&outbuf);
762
				}
763
				if(mode&EX_BIN)
764
					RingBufWrite(&outbuf, bp, rd);
765
766
				else
					rputs((char*)bp, rd);
767
			}
768
#if defined(_DEBUG) && 0
769
770
771
772
773
774
			if(rd>1) {
				sprintf(str,"Node %d read %5d bytes from xtrn", cfg.node_num, rd);
				OutputDebugString(str);
			}
#endif
            if((!rd && !wr) || hungup) {
775
776
777
778
779

				loop_since_io++;	/* number of loop iterations with no I/O */

				/* only check process termination after 300 milliseconds of no I/O */
				/* to allow for last minute reception of output from DOS programs */
780
781
				if(loop_since_io>=3) {

782
					if(online && hangup_event!=NULL
783
784
785
786
787
788
789
790
791
						&& WaitForSingleObject(hangup_event,0)==WAIT_OBJECT_0) {
						lprintf(LOG_NOTICE,"Node %d External program requested hangup (dropped DTR)"
							,cfg.node_num);
						hangup();
					}

					if(WaitForSingleObject(process_info.hProcess,0)==WAIT_OBJECT_0)
						break;	/* Process Terminated */
				}
792
793

				/* only check node for interrupt flag every 3 seconds of no I/O */
rswindell's avatar
rswindell committed
794
				if((loop_since_io%30)==0) {
795
796
797
798
799
800
801
					// Check if the node has been interrupted
					getnodedat(cfg.node_num,&thisnode,0);
					if(thisnode.misc&NODE_INTR)
						break;
				}

				/* only send telnet GA every 30 seconds of no I/O */
802
				if((loop_since_io%300)==0) {
803
#if defined(_DEBUG)
804
805
806
807
808
809
810
					sprintf(str,"Node %d xtrn idle\n",cfg.node_num);
					OutputDebugString(str);
#endif
					// Let's make sure the socket is up
					// Sending will trigger a socket d/c detection
					if(!(startup->options&BBS_OPT_NO_TELNET_GA))
						send_telnet_cmd(TELNET_GA,0);
811
				}
812
				sem_trywait_block(&inbuf.sem,100);
813
814
815
816
817
            } else
				loop_since_io=0;
        }
	}

818
    if(!(mode&EX_BG)) {			/* !background execution */
819

820
821
822
        if(GetExitCodeProcess(process_info.hProcess, &retval)==FALSE)
            errormsg(WHERE, ERR_CHK, "ExitCodeProcess",(DWORD)process_info.hProcess);

823
		if(retval==STILL_ACTIVE) {
824
			lprintf(LOG_INFO,"Node %d Terminating process from line %d",cfg.node_num,__LINE__);
825
			TerminateProcess(process_info.hProcess, GetLastError());
rswindell's avatar
rswindell committed
826
		}
827

828
	 	// Get return value
829
830
831
832
833
834
835
		if(!native) {
    		sprintf(str,"%sDOSXTRN.RET", cfg.node_dir);
			FILE* fp=fopen(str,"r");
			if(fp!=NULL) {
				fscanf(fp,"%d",&retval);
				fclose(fp);
			}
836
837
838
		}
	}

839
	XTRN_CLEANUP;
840
	CloseHandle(process_info.hProcess);
841
842
843

	if(!(mode&EX_OFFLINE)) {	/* !off-line execution */

844
		if(native) {
845
846
			if(!(mode&EX_STDIN)) {
				if(passthru_thread_running)
847
					passthru_socket_activate(false);
848
849
850
				else
					pthread_mutex_unlock(&input_thread_mutex);
			}
851
		}
852

853
854
		curatr=~0;			// Can't guarantee current attributes
		attr(LIGHTGRAY);	// Force to "normal"
855

856
		rio_abortable=rio_abortable_save;	// Restore abortable state
857

858
		/* Got back to Text/NVT mode */
859
		request_telnet_opt(TELNET_DONT,TELNET_BINARY_TX);
860
	}
861

862
863
//	lprintf("%s returned %d",realcmdline, retval);

864
	errorlevel = retval; // Baja or JS retrievable error value
865

866
867
868
	return(retval);
}

869
870
#else	/* !WIN32 */

871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
/*****************************************************************************/
// Expands Unix LF to CRLF
/*****************************************************************************/
BYTE* lf_expand(BYTE* inbuf, ulong inlen, BYTE* outbuf, ulong& newlen)
{
	ulong	i,j;

	for(i=j=0;i<inlen;i++) {
		if(inbuf[i]=='\n' && (!i || inbuf[i-1]!='\r'))
			outbuf[j++]='\r';
		outbuf[j++]=inbuf[i];
	}
	newlen=j;
    return(outbuf);
}

887
888
#define MAX_ARGS 1000

deuce's avatar
deuce committed
889
890
891
892
893
894
895
896
897
898
899
#ifdef NEEDS_SETENV
static int setenv(const char *name, const char *value, int overwrite)
{
	char *envstr;
	char *oldenv;
	if(overwrite || getenv(name)==NULL) {
		envstr=(char *)malloc(strlen(name)+strlen(value)+2);
		if(envstr==NULL) {
			errno=ENOMEM;
			return(-1);
		}
deuce's avatar
deuce committed
900
901
		/* Note, on some platforms, this can be free()d... */
		sprintf(envstr,"%s=%s",name,value);
deuce's avatar
deuce committed
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
		putenv(envstr);
	}
	return(0);
}
#endif

#ifdef NEEDS_CFMAKERAW
void
cfmakeraw(struct termios *t)
{
	t->c_iflag &= ~(IMAXBEL|IGNBRK|BRKINT|PARMRK|ISTRIP|INLCR|IGNCR|ICRNL|IXON);
	t->c_oflag &= ~OPOST;
	t->c_lflag &= ~(ECHO|ECHONL|ICANON|ISIG|IEXTEN);
	t->c_cflag &= ~(CSIZE|PARENB);
	t->c_cflag |= CS8;
}
#endif

920
921
922
923
924
925
926
927
928
929
930
931
932
933
#ifdef NEEDS_FORKPTY
static int login_tty(int fd)
{
	(void) setsid();
	if (!isatty(fd))
		return (-1);
	(void) dup2(fd, 0);
	(void) dup2(fd, 1);
	(void) dup2(fd, 2);
	if (fd > 2)
		(void) close(fd);
	return (0);
}

934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
#ifdef NEEDS_DAEMON
/****************************************************************************/
/* Daemonizes the process                                                   */
/****************************************************************************/
int
daemon(int nochdir, int noclose)
{
    int fd;

    switch (fork()) {
    case -1:
        return (-1);
    case 0:
        break;
    default:
        _exit(0);
    }

    if (setsid() == -1)
        return (-1);

    if (!nochdir)
        (void)chdir("/");

    if (!noclose && (fd = open(_PATH_DEVNULL, O_RDWR, 0)) != -1) {
        (void)dup2(fd, STDIN_FILENO);
        (void)dup2(fd, STDOUT_FILENO);
        (void)dup2(fd, STDERR_FILENO);
        if (fd > 2)
            (void)close(fd);
    }
    return (0);
}
#endif

969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
static int openpty(int *amaster, int *aslave, char *name, struct termios *termp, winsize *winp)
{
	char line[] = "/dev/ptyXX";
	const char *cp1, *cp2;
	int master, slave, ttygid;
	struct group *gr;

	if ((gr = getgrnam("tty")) != NULL)
		ttygid = gr->gr_gid;
	else
		ttygid = -1;

	for (cp1 = "pqrsPQRS"; *cp1; cp1++) {
		line[8] = *cp1;
		for (cp2 = "0123456789abcdefghijklmnopqrstuv"; *cp2; cp2++) {
			line[5] = 'p';
			line[9] = *cp2;
			if ((master = open(line, O_RDWR, 0)) == -1) {
				if (errno == ENOENT)
					break; /* try the next pty group */
			} else {
				line[5] = 't';
				(void) chown(line, getuid(), ttygid);
				(void) chmod(line, S_IRUSR|S_IWUSR|S_IWGRP);
				/* Hrm... SunOS doesn't seem to have revoke
				(void) revoke(line); */
				if ((slave = open(line, O_RDWR, 0)) != -1) {
					*amaster = master;
					*aslave = slave;
					if (name)
						strcpy(name, line);
					if (termp)
						(void) tcsetattr(slave,
							TCSAFLUSH, termp);
					if (winp)
						(void) ioctl(slave, TIOCSWINSZ,
							(char *)winp);
					return (0);
				}
				(void) close(master);
			}
		}
	}
	errno = ENOENT;	/* out of ptys */
	return (-1);
}

static int forkpty(int *amaster, char *name, termios *termp, winsize *winp)
{
	int master, slave, pid;

	if (openpty(&master, &slave, name, termp, winp) == -1)
		return (-1);
1022
	switch (pid = FORK()) {
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
	case -1:
		return (-1);
	case 0:
		/*
		 * child
		 */
		(void) close(master);
		login_tty(slave);
		return (0);
	}
	/*
	 * parent
	 */
	*amaster = master;
	(void) close(slave);
	return (pid);
}
#endif /* NEED_FORKPTY */

1042
int sbbs_t::external(const char* cmdline, long mode, const char* startup_dir)
1043
{
1044
1045
	char	str[MAX_PATH+1];
	char	fname[MAX_PATH+1];
1046
	char	fullpath[MAX_PATH+1];
1047
	char	fullcmdline[MAX_PATH+1];
1048
	char*	argv[MAX_ARGS];
1049
1050
1051
	BYTE*	bp;
	BYTE	buf[XTRN_IO_BUF_LEN];
    BYTE 	output_buf[XTRN_IO_BUF_LEN*2];
1052
	ulong	avail;
1053
1054
    ulong	output_len;
	bool	native=false;			// DOS program by default
1055
	bool	rio_abortable_save=rio_abortable;
rswindell's avatar
rswindell committed
1056
	int		i;
1057
	bool	data_waiting;
1058
1059
	int		rd;
	int		wr;
1060
	int		argc;
1061
	pid_t	pid;
1062
1063
	int		in_pipe[2];
	int		out_pipe[2];
1064
	int		err_pipe[2];
1065
	fd_set ibits;
1066
	int	high_fd;
1067
	struct timeval timeout;
1068
1069
    BYTE 	wwiv_buf[XTRN_IO_BUF_LEN*2];
    bool	wwiv_flag=false;
1070
 	char* p;
1071

1072
	xtrn_mode = mode;
rswindell's avatar
rswindell committed
1073
	lprintf(LOG_DEBUG, "Executing external: %s", cmdline);
1074

1075
1076
1077
1078
1079
	if(startup_dir!=NULL && startup_dir[0] && !isdir(startup_dir)) {
		errormsg(WHERE, ERR_CHK, startup_dir, 0);
		return -1;
	}

1080
1081
	if(startup_dir==NULL)
		startup_dir=nulstr;
1082

1083
	XTRN_LOADABLE_MODULE(cmdline,startup_dir);
1084
	XTRN_LOADABLE_JS_MODULE(cmdline,mode,startup_dir);
1085

1086
	attr(cfg.color[clr_external]);  /* setup default attributes */
1087

1088
1089
	native = native_executable(&cfg, cmdline, mode);

1090
1091
1092
    SAFECOPY(str,cmdline);			/* Set fname to program name only */
	truncstr(str," ");
    SAFECOPY(fname,getfname(str));
1093

1094
1095
	sprintf(fullpath,"%s%s",startup_dir,fname);
	if(startup_dir!=NULL && cmdline[0]!='/' && cmdline[0]!='.' && fexist(fullpath))
1096
1097
1098
		sprintf(fullcmdline,"%s%s",startup_dir,cmdline);
	else
		SAFECOPY(fullcmdline,cmdline);
1099
1100
1101
1102

 	if(native) { // Native (32-bit) external

		// Current environment passed to child process
1103
1104
1105
1106
1107
1108
		sprintf(dszlog,"%sPROTOCOL.LOG",cfg.node_dir);
		setenv("DSZLOG",dszlog,1); 		/* Makes the DSZ LOG active */
		setenv("SBBSNODE",cfg.node_dir,1);
		setenv("SBBSCTRL",cfg.ctrl_dir,1);
		setenv("SBBSDATA",cfg.data_dir,1);
		setenv("SBBSEXEC",cfg.exec_dir,1);
1109
		sprintf(str,"%u",cfg.node_num);
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
		setenv("SBBSNNUM",str,1);

		/* date/time env vars */
		now = time(NULL);
		struct	tm tm;
		if(localtime_r(&now, &tm) == NULL)
			memset(&tm, 0, sizeof(tm));
		sprintf(str," %02u", tm.tm_mday);
		setenv("DAY", str, /* overwrite */TRUE);
		setenv("WEEKDAY", wday[tm.tm_wday], /* overwrite */TRUE);
		setenv("MONTHNAME", mon[tm.tm_mon], /* overwrite */TRUE);
		sprintf(str, "%02u", tm.tm_mon + 1);
		setenv("MONTH", str, /* overwrite */TRUE);
		sprintf(str,"%u", 1900 + tm.tm_year);
		if(setenv("YEAR", str, /* overwrite */TRUE) != 0)
			errormsg(WHERE,ERR_WRITE,"environment",0);
1126
1127

	} else {
1128
		if(startup->options&BBS_OPT_NO_DOS) {
1129
			lprintf((mode&EX_OFFLINE) ? LOG_ERR : LOG_WARNING, "DOS programs not supported: %s", cmdline);
1130
1131
1132
			bprintf("Sorry, DOS programs are not supported on this node.\r\n");
			return -1;
		}
1133
#if defined(__FreeBSD__)
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
		/* ToDo: This seems to work for every door except Iron Ox
		   ToDo: Iron Ox is unique in that it runs perfectly from
		   ToDo: tcsh but not at all from anywhere else, complaining
		   ToDo: about corrupt files.  I've ruled out the possibilty
		   ToDo: of it being a terminal mode issue... no other ideas
		   ToDo: come to mind. */

		FILE * doscmdrc;

		sprintf(str,"%s.doscmdrc",cfg.node_dir);
		if((doscmdrc=fopen(str,"w+"))==NULL)  {
			errormsg(WHERE,ERR_CREATE,str,0);
			return(-1);
		}
		if(startup_dir!=NULL && startup_dir[0])
			fprintf(doscmdrc,"assign C: %s\n",startup_dir);
		else
			fprintf(doscmdrc,"assign C: .\n");

		fprintf(doscmdrc,"assign D: %s\n",cfg.node_dir);
		SAFECOPY(str,cfg.exec_dir);
		if((p=strrchr(str,'/'))!=NULL)
			*p=0;