xtrn.cpp 61.7 KB
Newer Older
1
/* xtrn.cpp */
rswindell's avatar
rswindell committed
2
// vi: tabstop=4
3
4
5
6
7
8
9
10
11

/* Synchronet external program support routines */

/* $Id$ */

/****************************************************************************
 * @format.tab-size 4		(Plain Text/Source Code File Header)			*
 * @format.use-tabs true	(see http://www.synchro.net/ptsc_hdr.html)		*
 *																			*
rswindell's avatar
rswindell committed
12
 * Copyright Rob Swindell - http://www.synchro.net/copyright.html			*
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
 *																			*
 * This program is free software; you can redistribute it and/or			*
 * modify it under the terms of the GNU General Public License				*
 * as published by the Free Software Foundation; either version 2			*
 * of the License, or (at your option) any later version.					*
 * See the GNU General Public License for more details: gpl.txt or			*
 * http://www.fsf.org/copyleft/gpl.html										*
 *																			*
 * Anonymous FTP access to the most recent released source is available at	*
 * ftp://vert.synchro.net, ftp://cvs.synchro.net and ftp://ftp.synchro.net	*
 *																			*
 * Anonymous CVS access to the development source and modification history	*
 * is available at cvs.synchro.net:/cvsroot/sbbs, example:					*
 * cvs -d :pserver:anonymous@cvs.synchro.net:/cvsroot/sbbs login			*
 *     (just hit return, no password is necessary)							*
 * cvs -d :pserver:anonymous@cvs.synchro.net:/cvsroot/sbbs checkout src		*
 *																			*
 * For Synchronet coding style and modification guidelines, see				*
 * http://www.synchro.net/source.html										*
 *																			*
 * You are encouraged to submit any modifications (preferably in Unix diff	*
 * format) via e-mail to mods@synchro.net									*
 *																			*
 * Note: If this box doesn't appear square, then you need to fix your tabs.	*
 ****************************************************************************/
#include "sbbs.h"
#include "cmdshell.h"
#include "telnet.h"

42
43
#include <signal.h>			// kill()

44
45
46
#ifdef __unix__
	#include <sys/wait.h>	// WEXITSTATUS

deuce's avatar
deuce committed
47
48
	#define TTYDEFCHARS		// needed for ttydefchars definition
	#include <sys/ttydefaults.h>	// Linux - it's motherfucked.
rswindell's avatar
rswindell committed
49
#if defined(__FreeBSD__)
50
	#include <libutil.h>	// forkpty()
deuce's avatar
deuce committed
51
#elif defined(__OpenBSD__) || defined(__NetBSD__) || defined(__DARWIN__)
rswindell's avatar
rswindell committed
52
53
	#include <util.h>
#elif defined(__linux__)
54
	#include <pty.h>
55
#elif defined(__QNX__)
56
#if 0
57
	#include <unix.h>
58
59
60
#else
	#define NEEDS_FORKPTY
#endif
61
#endif
62
63
64
65
66

	#ifdef NEEDS_FORKPTY
	#include <grp.h>
	#endif

67
	#include <termios.h>
68

deuce's avatar
deuce committed
69
70
71
72
/*
 * Control Character Defaults
 */
#ifndef CTRL
73
	#define CTRL(x)	(x&037)
deuce's avatar
deuce committed
74
75
#endif
#ifndef CEOF
76
	#define	CEOF		CTRL('d')
deuce's avatar
deuce committed
77
78
#endif
#ifndef CEOL
79
	#define	CEOL		0xff		/* XXX avoid _POSIX_VDISABLE */
deuce's avatar
deuce committed
80
81
#endif
#ifndef CERASE
82
	#define	CERASE		0177
deuce's avatar
deuce committed
83
84
#endif
#ifndef CERASE2
85
	#define	CERASE2		CTRL('h')
deuce's avatar
deuce committed
86
87
#endif
#ifndef CINTR
88
	#define	CINTR		CTRL('c')
deuce's avatar
deuce committed
89
90
#endif
#ifndef CSTATUS
91
	#define	CSTATUS		CTRL('t')
deuce's avatar
deuce committed
92
93
#endif
#ifndef CKILL
94
	#define	CKILL		CTRL('u')
deuce's avatar
deuce committed
95
96
#endif
#ifndef CMIN
97
	#define	CMIN		1
deuce's avatar
deuce committed
98
99
#endif
#ifndef CQUIT
100
	#define	CQUIT		034		/* FS, ^\ */
deuce's avatar
deuce committed
101
102
#endif
#ifndef CSUSP
103
	#define	CSUSP		CTRL('z')
deuce's avatar
deuce committed
104
105
#endif
#ifndef CTIME
106
	#define	CTIME		0
deuce's avatar
deuce committed
107
108
#endif
#ifndef CDSUSP
109
	#define	CDSUSP		CTRL('y')
deuce's avatar
deuce committed
110
111
#endif
#ifndef CSTART
112
	#define	CSTART		CTRL('q')
deuce's avatar
deuce committed
113
114
#endif
#ifndef CSTOP
115
	#define	CSTOP		CTRL('s')
deuce's avatar
deuce committed
116
117
#endif
#ifndef CLNEXT
118
	#define	CLNEXT		CTRL('v')
deuce's avatar
deuce committed
119
120
#endif
#ifndef CDISCARD
121
	#define	CDISCARD 	CTRL('o')
deuce's avatar
deuce committed
122
123
#endif
#ifndef CWERASE
124
	#define	CWERASE 	CTRL('w')
deuce's avatar
deuce committed
125
126
#endif
#ifndef CREPRINT
127
	#define	CREPRINT 	CTRL('r')
deuce's avatar
deuce committed
128
129
#endif
#ifndef CEOT
130
	#define	CEOT		CEOF
deuce's avatar
deuce committed
131
132
133
#endif
/* compat */
#ifndef CBRK
134
	#define	CBRK		CEOL
deuce's avatar
deuce committed
135
136
#endif
#ifndef CRPRNT
137
	#define CRPRNT		CREPRINT
deuce's avatar
deuce committed
138
139
#endif
#ifndef CFLUSH
140
141
142
	#define	CFLUSH		CDISCARD
#endif

deuce's avatar
deuce committed
143
#ifndef TTYDEF_IFLAG
144
	#define TTYDEF_IFLAG    (BRKINT | ICRNL | IMAXBEL | IXON | IXANY)
deuce's avatar
deuce committed
145
146
#endif
#ifndef TTYDEF_OFLAG
147
	#define TTYDEF_OFLAG    (OPOST | ONLCR)
deuce's avatar
deuce committed
148
149
#endif
#ifndef TTYDEF_LFLAG
150
	#define TTYDEF_LFLAG    (ECHO | ICANON | ISIG | IEXTEN | ECHOE|ECHOKE|ECHOCTL)
deuce's avatar
deuce committed
151
152
#endif
#ifndef TTYDEF_CFLAG
153
	#define TTYDEF_CFLAG    (CREAD | CS8 | HUPCL)
deuce's avatar
deuce committed
154
#endif
deuce's avatar
deuce committed
155
#if defined(__QNX__) || defined(__solaris__) || defined(__NetBSD__)
156
157
158
	static cc_t     ttydefchars[NCCS] = {
        CEOF,   CEOL,   CEOL,   CERASE, CWERASE, CKILL, CREPRINT,
        CERASE2, CINTR, CQUIT,  CSUSP,  CDSUSP, CSTART, CSTOP,  CLNEXT,
deuce's avatar
deuce committed
159
160
161
162
        CDISCARD, CMIN, CTIME,  CSTATUS
#ifndef __solaris__
	, _POSIX_VDISABLE
#endif
163
	};
164
165
#endif

166
167
#endif	/* __unix__ */

168
#define XTRN_IO_BUF_LEN 10000	/* 50% of IO_THREAD_BUF_SIZE */
169

170
171
172
173
174
175
176
177
178
179
/*****************************************************************************/
/* Interrupt routine to expand WWIV Ctrl-C# codes into ANSI escape sequences */
/*****************************************************************************/
BYTE* wwiv_expand(BYTE* buf, ulong buflen, BYTE* outbuf, ulong& newlen
	,ulong user_misc, bool& ctrl_c)
{
    char	ansi_seq[32];
	ulong 	i,j,k;

    for(i=j=0;i<buflen;i++) {
180
        if(buf[i]==CTRL_C) {	/* WWIV color escape char */
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
            ctrl_c=true;
            continue;
        }
        if(!ctrl_c) {
            outbuf[j++]=buf[i];
            continue;
        }
        ctrl_c=false;
        if(user_misc&ANSI) {
            switch(buf[i]) {
                default:
                    strcpy(ansi_seq,"\x1b[0m");          /* low grey */
                    break;
                case '1':
                    strcpy(ansi_seq,"\x1b[0;1;36m");     /* high cyan */
                    break;
                case '2':
                    strcpy(ansi_seq,"\x1b[0;1;33m");     /* high yellow */
                    break;
                case '3':
                    strcpy(ansi_seq,"\x1b[0;35m");       /* low magenta */
                    break;
                case '4':
                    strcpy(ansi_seq,"\x1b[0;1;44m");     /* white on blue */
                    break;
                case '5':
                    strcpy(ansi_seq,"\x1b[0;32m");       /* low green */
                    break;
                case '6':
                    strcpy(ansi_seq,"\x1b[0;1;5;31m");   /* high blinking red */
                    break;
                case '7':
                    strcpy(ansi_seq,"\x1b[0;1;34m");     /* high blue */
                    break;
                case '8':
                    strcpy(ansi_seq,"\x1b[0;34m");       /* low blue */
                    break;
                case '9':
                    strcpy(ansi_seq,"\x1b[0;36m");       /* low cyan */
                    break;
            }
            for(k=0;ansi_seq[k];k++)
                outbuf[j++]=ansi_seq[k];
        }
    }
    newlen=j;
    return(outbuf);
}
229

230
231
232
233
234
235
236
static void petscii_convert(BYTE* buf, ulong len)
{
    for(ulong i=0; i<len; i++) {
		buf[i] = cp437_to_petscii(buf[i]);
	}
}

237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
static bool native_executable(scfg_t* cfg, const char* cmdline, long mode)
{
	char*	p;
	char	str[MAX_PATH+1];
	char	name[64];
	char	base[64];
	unsigned i;

	if(mode&EX_NATIVE)
		return(TRUE);

    SAFECOPY(str,cmdline);				/* Set str to program name only */
	truncstr(str," ");
    SAFECOPY(name,getfname(str));
	SAFECOPY(base,name);
	if((p=getfext(base))!=NULL)
		*p=0;

    for(i=0;i<cfg->total_natvpgms;i++)
        if(stricmp(name,cfg->natvpgm[i]->name)==0
		|| stricmp(base,cfg->natvpgm[i]->name)==0)
            break;
    return(i<cfg->total_natvpgms);
}

262
#define XTRN_LOADABLE_MODULE(cmdline,startup_dir)			\
263
	if(cmdline[0]=='*')		/* Baja module or JavaScript */	\
rswindell's avatar
rswindell committed
264
		return(exec_bin(cmdline+1,&main_csi,startup_dir))
265
#ifdef JAVASCRIPT
266
	#define XTRN_LOADABLE_JS_MODULE(cmdline,startup_dir)	\
267
	if(cmdline[0]=='?') 	/* JavaScript */				\
rswindell's avatar
rswindell committed
268
		return(js_execfile(cmdline+1,startup_dir))
269
270
271
#else
	#define XTRN_LOADABLE_JS_MODULE
#endif
272
273
274

#ifdef _WIN32

275
#include "execvxd.h"	/* DOSXTRN.EXE API */
276
277
278

extern SOCKET node_socket[];

279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
/*****************************************************************************/
// Expands Single CR to CRLF
/*****************************************************************************/
BYTE* cr_expand(BYTE* inbuf, ulong inlen, BYTE* outbuf, ulong& newlen)
{
	ulong	i,j;

	for(i=j=0;i<inlen;i++) {
		outbuf[j++]=inbuf[i];
		if(inbuf[i]=='\r')
			outbuf[j++]='\n';
	}
	newlen=j;
    return(outbuf);
}

295
296
297
298
299
300
301
302
static void add_env_var(str_list_t* list, const char* var, const char* val)
{
	char	str[MAX_PATH*2];
	SetEnvironmentVariable(var,NULL);	/* Delete in current process env */
	SAFEPRINTF2(str,"%s=%s",var,val);
	strListPush(list,str);
}

303
304
305
306
307
308
309
310
/* Clean-up resources while preserving current LastError value */
#define XTRN_CLEANUP												\
	last_error=GetLastError();										\
    if(vxd!=INVALID_HANDLE_VALUE)		CloseHandle(vxd);			\
	if(rdslot!=INVALID_HANDLE_VALUE)	CloseHandle(rdslot);		\
	if(wrslot!=INVALID_HANDLE_VALUE)	CloseHandle(wrslot);		\
	if(start_event!=NULL)				CloseHandle(start_event);	\
	if(hungup_event!=NULL)				CloseHandle(hungup_event);	\
311
	if(hangup_event!=NULL)				CloseHandle(hangup_event);	\
312
313
	SetLastError(last_error)

314
315
316
/****************************************************************************/
/* Runs an external program 												*/
/****************************************************************************/
317
int sbbs_t::external(const char* cmdline, long mode, const char* startup_dir)
318
{
319
320
321
	char	str[MAX_PATH+1];
	char*	env_block=NULL;
	char*	env_strings;
322
	const char* p_startup_dir;
323
	char	path[MAX_PATH+1];
324
325
326
327
    char	fullcmdline[MAX_PATH+1];
	char	realcmdline[MAX_PATH+1];
	char	comspec_str[MAX_PATH+1];
	char	title[MAX_PATH+1];
328
329
	BYTE	buf[XTRN_IO_BUF_LEN],*bp;
    BYTE 	telnet_buf[XTRN_IO_BUF_LEN*2];
330
    BYTE 	output_buf[XTRN_IO_BUF_LEN*2];
331
332
    BYTE 	wwiv_buf[XTRN_IO_BUF_LEN*2];
    bool	wwiv_flag=false;
333
    bool	native=false;			// DOS program by default
334
    bool	was_online=true;
335
	bool	rio_abortable_save=rio_abortable;
336
	bool	use_pipes=false;	// NT-compatible console redirection
337
	BOOL	success;
338
	BOOL	processTerminated=false;
339
	uint	i;
340
341
342
343
    time_t	hungup=0;
	HANDLE	vxd=INVALID_HANDLE_VALUE;
	HANDLE	rdslot=INVALID_HANDLE_VALUE;
	HANDLE	wrslot=INVALID_HANDLE_VALUE;
344
	HANDLE  start_event=NULL;
345
	HANDLE	hungup_event=NULL;
346
	HANDLE	hangup_event=NULL;
347
348
	HANDLE	rdoutpipe;
	HANDLE	wrinpipe;
349
    PROCESS_INFORMATION process_info;
deuce's avatar
deuce committed
350
	unsigned long	rd;
351
    unsigned long	wr;
deuce's avatar
deuce committed
352
    unsigned long	len;
353
    DWORD	avail;
deuce's avatar
deuce committed
354
355
	unsigned long	msglen;
	unsigned long	retval;
356
357
	DWORD	last_error;
	DWORD	loop_since_io=0;
358
	struct	tm tm;
359
	str_list_t	env_list;
360

361
	xtrn_mode = mode;
362
	lprintf(LOG_DEBUG,"Executing external: %s",cmdline);
363

364
365
366
367
368
	if(startup_dir!=NULL && startup_dir[0] && !isdir(startup_dir)) {
		errormsg(WHERE, ERR_CHK, startup_dir, 0);
		return -1;
	}

369
370
	XTRN_LOADABLE_MODULE(cmdline,startup_dir);
	XTRN_LOADABLE_JS_MODULE(cmdline,startup_dir);
371

372
	attr(cfg.color[clr_external]);		/* setup default attributes */
373

374
	native = native_executable(&cfg, cmdline, mode);
375

376
	if(!native && (startup->options&BBS_OPT_NO_DOS)) {
377
		lprintf((mode&EX_OFFLINE) ? LOG_ERR : LOG_WARNING, "DOS programs not supported: %s", cmdline);
378
379
380
381
		bprintf("Sorry, DOS programs are not supported on this node.\r\n");
		return -1;
	}

rswindell's avatar
rswindell committed
382
	if(mode&EX_SH || strcspn(cmdline,"<>|")!=strlen(cmdline))
383
384
385
386
387
388
		sprintf(comspec_str,"%s /C ", comspec);
	else
		comspec_str[0]=0;

    if(startup_dir && cmdline[1]!=':' && cmdline[0]!='/'
    	&& cmdline[0]!='\\' && cmdline[0]!='.')
389
       	SAFEPRINTF3(fullcmdline, "%s%s%s", comspec_str, startup_dir, cmdline);
390
    else
391
    	SAFEPRINTF2(fullcmdline, "%s%s", comspec_str, cmdline);
392

393
	SAFECOPY(realcmdline, fullcmdline);	// for errormsg if failed to execute
394
395

	now=time(NULL);
396
397
	if(localtime_r(&now,&tm)==NULL)
		memset(&tm,0,sizeof(tm));
398

399
	if(native && mode&EX_STDOUT && !(mode&EX_OFFLINE))
400
401
		use_pipes=true;

402
 	if(native) { // Native (32-bit) external
403

404
405
406
407
408
409
		if((env_list=strListInit())==NULL) {
			XTRN_CLEANUP;
        	errormsg(WHERE, ERR_CREATE, "env_list", 0);
            return(errno);
		}

410
		// Current environment passed to child process
rswindell's avatar
rswindell committed
411
		sprintf(str,"%sprotocol.log",cfg.node_dir);
412
413
414
415
416
417
418
		add_env_var(&env_list,"DSZLOG",str);
		add_env_var(&env_list,"SBBSNODE",cfg.node_dir);
		add_env_var(&env_list,"SBBSCTRL",cfg.ctrl_dir);
		add_env_var(&env_list,"SBBSDATA",cfg.data_dir);
		add_env_var(&env_list,"SBBSEXEC",cfg.exec_dir);
		sprintf(str,"%d",cfg.node_num);
		add_env_var(&env_list,"SBBSNNUM",str);
419
		/* date/time env vars */
rswindell's avatar
rswindell committed
420
		sprintf(str,"%02u",tm.tm_mday);
421
422
423
424
425
426
427
		add_env_var(&env_list,"DAY",str);
		add_env_var(&env_list,"WEEKDAY",wday[tm.tm_wday]);
		add_env_var(&env_list,"MONTHNAME",mon[tm.tm_mon]);
		sprintf(str,"%02u",tm.tm_mon+1);
		add_env_var(&env_list,"MONTH",str);
		sprintf(str,"%u",1900+tm.tm_year);
		add_env_var(&env_list,"YEAR",str);
428
429
430
431
432
433
434
435
436
437
438
439

		env_strings=GetEnvironmentStrings();
		env_block=strListCopyBlock(env_strings);
		if(env_strings!=NULL)
			FreeEnvironmentStrings(env_strings);
		env_block=strListAppendBlock(env_block,env_list);
		strListFree(&env_list);
		if(env_block==NULL) {
			XTRN_CLEANUP;
        	errormsg(WHERE, ERR_CREATE, "env_block", 0);
            return(errno);
		}
440
441
442

    } else { // DOS external

443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
		// DOS-compatible (short) paths
		char node_dir[MAX_PATH+1];
		char ctrl_dir[MAX_PATH+1];
		char data_dir[MAX_PATH+1];
		char exec_dir[MAX_PATH+1];

		// in case GetShortPathName fails
		SAFECOPY(node_dir,cfg.node_dir);
		SAFECOPY(ctrl_dir,cfg.ctrl_dir);
		SAFECOPY(data_dir,cfg.data_dir);
		SAFECOPY(exec_dir,cfg.exec_dir);

		GetShortPathName(cfg.node_dir,node_dir,sizeof(node_dir));
		GetShortPathName(cfg.ctrl_dir,ctrl_dir,sizeof(node_dir));
		GetShortPathName(cfg.data_dir,data_dir,sizeof(data_dir));
		GetShortPathName(cfg.exec_dir,exec_dir,sizeof(exec_dir));

460
461
		sprintf(path,"%sDOSXTRN.RET", cfg.node_dir);
		remove(path);
462
463

    	// Create temporary environment file
464
    	sprintf(path,"%sDOSXTRN.ENV", node_dir);
465
        FILE* fp=fopen(path,"w");
466
        if(fp==NULL) {
467
			XTRN_CLEANUP;
468
        	errormsg(WHERE, ERR_CREATE, path, 0);
469
            return(errno);
470
471
        }
        fprintf(fp, "%s\n", fullcmdline);
472
473
474
475
476
		fprintf(fp, "DSZLOG=%sPROTOCOL.LOG\n", node_dir);
        fprintf(fp, "SBBSNODE=%s\n", node_dir);
        fprintf(fp, "SBBSCTRL=%s\n", ctrl_dir);
		fprintf(fp, "SBBSDATA=%s\n", data_dir);
		fprintf(fp, "SBBSEXEC=%s\n", exec_dir);
477
        fprintf(fp, "SBBSNNUM=%d\n", cfg.node_num);
478
		fprintf(fp, "PCBNODE=%d\n", cfg.node_num);
479
480
481
482
483
484
		/* date/time env vars */
		fprintf(fp, "DAY=%02u\n", tm.tm_mday);
		fprintf(fp, "WEEKDAY=%s\n",wday[tm.tm_wday]);
		fprintf(fp, "MONTHNAME=%s\n",mon[tm.tm_mon]);
		fprintf(fp, "MONTH=%02u\n",tm.tm_mon+1);
		fprintf(fp, "YEAR=%u\n",1900+tm.tm_year);
485
486
        fclose(fp);

487
        SAFEPRINTF2(fullcmdline, "%sDOSXTRN.EXE %s", cfg.exec_dir, path);
488

489
		if(!(mode&EX_OFFLINE)) {
490
			i=SBBSEXEC_MODE_FOSSIL;
491
			if(mode&EX_STDIN)
492
           		i|=SBBSEXEC_MODE_DOS_IN;
493
			if(mode&EX_STDOUT)
494
        		i|=SBBSEXEC_MODE_DOS_OUT;
495
496
			sprintf(str," NT %u %u"
				,cfg.node_num,i);
497
498
499
500
501
502
503
504
505
			strcat(fullcmdline,str);

			sprintf(str,"sbbsexec_hungup%d",cfg.node_num);
			if((hungup_event=CreateEvent(
				 NULL	// pointer to security attributes
				,TRUE	// flag for manual-reset event
				,FALSE  // flag for initial state
				,str	// pointer to event-object name
				))==NULL) {
506
				XTRN_CLEANUP;
507
				errormsg(WHERE, ERR_CREATE, str, 0);
508
509
510
				return(GetLastError());
			}

511
512
513
514
515
516
517
518
519
520
521
522
			sprintf(str,"sbbsexec_hangup%d",cfg.node_num);
			if((hangup_event=CreateEvent(
				 NULL	// pointer to security attributes
				,TRUE	// flag for manual-reset event
				,FALSE  // flag for initial state
				,str	// pointer to event-object name
				))==NULL) {
				XTRN_CLEANUP;
				errormsg(WHERE, ERR_CREATE, str, 0);
				return(GetLastError());
			}

523
524
525
			sprintf(str,"\\\\.\\mailslot\\sbbsexec\\rd%d"
				,cfg.node_num);
			rdslot=CreateMailslot(str
526
				,sizeof(buf)/2			// Maximum message size (0=unlimited)
527
528
529
				,0						// Read time-out
				,NULL);                 // Security
			if(rdslot==INVALID_HANDLE_VALUE) {
530
				XTRN_CLEANUP;
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
				errormsg(WHERE, ERR_CREATE, str, 0);
				return(GetLastError());
			}
		}
    }

	if(startup_dir!=NULL && startup_dir[0])
		p_startup_dir=startup_dir;
	else
		p_startup_dir=NULL;
    STARTUPINFO startup_info={0};
    startup_info.cb=sizeof(startup_info);
	if(mode&EX_OFFLINE)
		startup_info.lpTitle=NULL;
	else {
546
		SAFEPRINTF3(title,"%s running %s on node %d"
547
548
549
550
551
			,useron.number ? useron.alias : "Event"
			,realcmdline
			,cfg.node_num);
		startup_info.lpTitle=title;
	}
552
    if(startup->options&BBS_OPT_XTRN_MINIMIZED) {
553
554
555
    	startup_info.wShowWindow=SW_SHOWMINNOACTIVE;
        startup_info.dwFlags|=STARTF_USESHOWWINDOW;
    }
556
557
558
559
560
561
562
563
	if(use_pipes) {
		// Set up the security attributes struct.
		SECURITY_ATTRIBUTES sa;
		memset(&sa,0,sizeof(sa));
		sa.nLength= sizeof(SECURITY_ATTRIBUTES);
		sa.lpSecurityDescriptor = NULL;
		sa.bInheritHandle = TRUE;

564
565
		// Create the child output pipe (override default 4K buffer size)
		if(!CreatePipe(&rdoutpipe,&startup_info.hStdOutput,&sa,sizeof(buf))) {
566
567
568
569
570
571
			errormsg(WHERE,ERR_CREATE,"stdout pipe",0);
			return(GetLastError());
		}
		startup_info.hStdError=startup_info.hStdOutput;

		// Create the child input pipe.
572
		if(!CreatePipe(&startup_info.hStdInput,&wrinpipe,&sa,sizeof(buf))) {
573
574
575
			errormsg(WHERE,ERR_CREATE,"stdin pipe",0);
			return(GetLastError());
		}
576

577
578
579
580
581
582
583
584
585
586
587
588
589
590
		DuplicateHandle(
			GetCurrentProcess(), rdoutpipe,
			GetCurrentProcess(), &rdslot, 0, FALSE, DUPLICATE_SAME_ACCESS);

		DuplicateHandle(
			GetCurrentProcess(), wrinpipe,
			GetCurrentProcess(), &wrslot, 0, FALSE, DUPLICATE_SAME_ACCESS);

		CloseHandle(rdoutpipe);
		CloseHandle(wrinpipe);

		startup_info.dwFlags|=STARTF_USESTDHANDLES|STARTF_USESHOWWINDOW;
    	startup_info.wShowWindow=SW_HIDE;
	}
591
	if(native && !(mode&EX_OFFLINE)) {
592

593
		if(!(mode&EX_STDIN)) {
594
			if(passthru_thread_running)
595
				passthru_socket_activate(true);
596
597
			else
				pthread_mutex_lock(&input_thread_mutex);
598
		}
599
600
	}

601
    success=CreateProcess(
602
603
604
605
		NULL,			// pointer to name of executable module
		fullcmdline,  	// pointer to command line string
		NULL,  			// process security attributes
		NULL,   		// thread security attributes
606
		native && !(mode&EX_OFFLINE),	 			// handle inheritance flag
607
		CREATE_NEW_CONSOLE/*|CREATE_SEPARATE_WOW_VDM*/, // creation flags
608
        env_block, 		// pointer to new environment block
609
610
611
		p_startup_dir,	// pointer to current directory name
		&startup_info,  // pointer to STARTUPINFO
		&process_info  	// pointer to PROCESS_INFORMATION
612
613
614
615
616
		);

	strListFreeBlock(env_block);

	if(!success) {
617
		XTRN_CLEANUP;
618
619
		if(!(mode&EX_STDIN)) {
			if(passthru_thread_running)
620
				passthru_socket_activate(false);
621
622
623
			else
				pthread_mutex_unlock(&input_thread_mutex);
		}
624
		SetLastError(last_error);	/* Restore LastError */
625
        errormsg(WHERE, ERR_EXEC, realcmdline, mode);
626
		SetLastError(last_error);	/* Restore LastError */
627
628
629
        return(GetLastError());
    }

630
631
632
633
#if 0
	char dbgstr[256];
	sprintf(dbgstr,"Node %d created: hProcess %X hThread %X processID %X threadID %X\n"
		,cfg.node_num
rswindell's avatar
rswindell committed
634
635
636
637
		,process_info.hProcess
		,process_info.hThread
		,process_info.dwProcessId
		,process_info.dwThreadId);
638
639
640
	OutputDebugString(dbgstr);
#endif

641
642
	CloseHandle(process_info.hThread);

643
	/* Disable Ctrl-C checking */
644
	if(!(mode&EX_OFFLINE))
645
		rio_abortable=false;
646

647
    // Executing app in foreground?, monitor
648
    retval=STILL_ACTIVE;
649
    while(!(mode&EX_BG)) {
650
651
		if(mode&EX_CHKTIME)
			gettimeleft();
652
653
        if(!online && !(mode&EX_OFFLINE)) { // Tell VXD/VDD and external that user hung-up
        	if(was_online) {
654
				logline(LOG_NOTICE,"X!","hung-up in external program");
655
656
            	hungup=time(NULL);
				if(!native) {
657
					SetEvent(hungup_event);
658
659
660
				}
	            was_online=false;
            }
661
            if(hungup && time(NULL)-hungup>5 && !processTerminated) {
662
				lprintf(LOG_INFO,"Terminating process from line %d", __LINE__);
663
664
				processTerminated=TerminateProcess(process_info.hProcess, 2112);
			}
665
        }
rswindell's avatar
rswindell committed
666
		if((native && !use_pipes) || mode&EX_OFFLINE) {
667
			/* Monitor for process termination only */
668
669
			if(WaitForSingleObject(process_info.hProcess,1000)==WAIT_OBJECT_0)
				break;
670
671
		} else {

672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
			/* Write to VDD */

			wr=RingBufPeek(&inbuf,buf,sizeof(buf));
			if(wr) {
				if(!use_pipes && wrslot==INVALID_HANDLE_VALUE) {
					sprintf(str,"\\\\.\\mailslot\\sbbsexec\\wr%d"
						,cfg.node_num);
					wrslot=CreateFile(str
						,GENERIC_WRITE
						,FILE_SHARE_READ
						,NULL
						,OPEN_EXISTING
						,FILE_ATTRIBUTE_NORMAL
						,(HANDLE) NULL);
					if(wrslot==INVALID_HANDLE_VALUE)
						lprintf(LOG_DEBUG,"!ERROR %u (%s) opening %s", GetLastError(), strerror(errno), str);
688
					else
689
690
						lprintf(LOG_DEBUG,"CreateFile(%s)=0x%x", str, wrslot);
				}
691

692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
				/* CR expansion */
				if(use_pipes)
					bp=cr_expand(buf,wr,output_buf,wr);
				else
					bp=buf;

				len=0;
				if(wrslot==INVALID_HANDLE_VALUE)
					lprintf(LOG_WARNING,"VDD Open failed (not loaded yet?)");
				else if(!WriteFile(wrslot,bp,wr,&len,NULL)) {
					lprintf(LOG_ERR,"!VDD WriteFile(0x%x, %u) FAILURE (Error=%u)", wrslot, wr, GetLastError());
					if(GetMailslotInfo(wrslot,&wr,NULL,NULL,NULL))
						lprintf(LOG_DEBUG,"!VDD MailSlot max_msg_size=%u", wr);
					else
						lprintf(LOG_DEBUG,"!GetMailslotInfo(0x%x)=%u", wrslot, GetLastError());
				} else {
					if(len!=wr)
						lprintf(LOG_WARNING,"VDD short write (%u instead of %u)", len,wr);
					RingBufRead(&inbuf, NULL, len);
					if(use_pipes && !(mode&EX_NOECHO)) {
						/* echo */
						RingBufWrite(&outbuf, bp, len);
714
					}
715
				}
716
717
				wr=len;
			}
718

719
			/* Read from VDD */
720

721
722
723
			rd=0;
			len=sizeof(buf);
			avail=RingBufFree(&outbuf)/2;	// leave room for wwiv/telnet expansion
724
#if 0
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
			if(avail==0)
				lprintf("Node %d !output buffer full (%u bytes)"
					,cfg.node_num,RingBufFull(&outbuf));
#endif
			if(len>avail)
            	len=avail;

			while(rd<len) {
				unsigned long waiting=0;

				if(use_pipes)
					PeekNamedPipe(
						rdslot,             // handle to pipe to copy from
						NULL,               // pointer to data buffer
						0,					// size, in bytes, of data buffer
						NULL,				// pointer to number of bytes read
						&waiting,			// pointer to total number of bytes available
						NULL				// pointer to unread bytes in this message
						);
				else
					GetMailslotInfo(
						rdslot,				// mailslot handle
 						NULL,				// address of maximum message size
						NULL,				// address of size of next message
						&waiting,			// address of number of messages
 						NULL				// address of read time-out
						);
				if(!waiting)
					break;
				if(ReadFile(rdslot,buf+rd,len-rd,&msglen,NULL)==FALSE || msglen<1)
					break;
				rd+=msglen;
			}
758

759
760
761
762
763
764
765
766
767
			if(rd) {
				if(mode&EX_WWIV) {
                	bp=wwiv_expand(buf, rd, wwiv_buf, rd, useron.misc, wwiv_flag);
					if(rd>sizeof(wwiv_buf))
						lprintf(LOG_ERR,"WWIV_BUF OVERRUN");
				} else if(telnet_mode&TELNET_MODE_OFF) {
					bp=buf;
				} else {
                	rd = telnet_expand(buf, rd, telnet_buf, sizeof(telnet_buf), /* expand_cr: */false, &bp);
768
				}
769
770
771
				if(rd>RingBufFree(&outbuf)) {
					lprintf(LOG_ERR,"output buffer overflow");
					rd=RingBufFree(&outbuf);
772
				}
773
				if(mode&EX_BIN)
774
					RingBufWrite(&outbuf, bp, rd);
775
776
				else
					rputs((char*)bp, rd);
777
			}
778
#if defined(_DEBUG) && 0
779
780
781
782
783
784
			if(rd>1) {
				sprintf(str,"Node %d read %5d bytes from xtrn", cfg.node_num, rd);
				OutputDebugString(str);
			}
#endif
            if((!rd && !wr) || hungup) {
785
786
787
788
789

				loop_since_io++;	/* number of loop iterations with no I/O */

				/* only check process termination after 300 milliseconds of no I/O */
				/* to allow for last minute reception of output from DOS programs */
790
791
				if(loop_since_io>=3) {

792
					if(online && hangup_event!=NULL
793
794
795
796
797
798
799
800
801
						&& WaitForSingleObject(hangup_event,0)==WAIT_OBJECT_0) {
						lprintf(LOG_NOTICE,"Node %d External program requested hangup (dropped DTR)"
							,cfg.node_num);
						hangup();
					}

					if(WaitForSingleObject(process_info.hProcess,0)==WAIT_OBJECT_0)
						break;	/* Process Terminated */
				}
802
803

				/* only check node for interrupt flag every 3 seconds of no I/O */
rswindell's avatar
rswindell committed
804
				if((loop_since_io%30)==0) {
805
806
807
808
809
810
811
					// Check if the node has been interrupted
					getnodedat(cfg.node_num,&thisnode,0);
					if(thisnode.misc&NODE_INTR)
						break;
				}

				/* only send telnet GA every 30 seconds of no I/O */
812
				if((loop_since_io%300)==0) {
813
#if defined(_DEBUG)
814
815
816
817
818
819
820
					sprintf(str,"Node %d xtrn idle\n",cfg.node_num);
					OutputDebugString(str);
#endif
					// Let's make sure the socket is up
					// Sending will trigger a socket d/c detection
					if(!(startup->options&BBS_OPT_NO_TELNET_GA))
						send_telnet_cmd(TELNET_GA,0);
821
				}
822
				sem_trywait_block(&inbuf.sem,100);
823
824
825
826
827
            } else
				loop_since_io=0;
        }
	}

828
    if(!(mode&EX_BG)) {			/* !background execution */
829

830
831
832
        if(GetExitCodeProcess(process_info.hProcess, &retval)==FALSE)
            errormsg(WHERE, ERR_CHK, "ExitCodeProcess",(DWORD)process_info.hProcess);

833
		if(retval==STILL_ACTIVE) {
834
			lprintf(LOG_INFO,"Node %d Terminating process from line %d",cfg.node_num,__LINE__);
835
			TerminateProcess(process_info.hProcess, GetLastError());
rswindell's avatar
rswindell committed
836
		}
837

838
	 	// Get return value
839
840
841
842
843
844
845
		if(!native) {
    		sprintf(str,"%sDOSXTRN.RET", cfg.node_dir);
			FILE* fp=fopen(str,"r");
			if(fp!=NULL) {
				fscanf(fp,"%d",&retval);
				fclose(fp);
			}
846
847
848
		}
	}

849
	XTRN_CLEANUP;
850
	CloseHandle(process_info.hProcess);
851
852
853

	if(!(mode&EX_OFFLINE)) {	/* !off-line execution */

854
		if(native) {
855
856
			if(!(mode&EX_STDIN)) {
				if(passthru_thread_running)
857
					passthru_socket_activate(false);
858
859
860
				else
					pthread_mutex_unlock(&input_thread_mutex);
			}
861
		}
862

863
864
		curatr=~0;			// Can't guarantee current attributes
		attr(LIGHTGRAY);	// Force to "normal"
865

866
		rio_abortable=rio_abortable_save;	// Restore abortable state
867

868
		/* Got back to Text/NVT mode */
869
		request_telnet_opt(TELNET_DONT,TELNET_BINARY_TX);
870
	}
871

872
873
//	lprintf("%s returned %d",realcmdline, retval);

874
	errorlevel = retval; // Baja or JS retrievable error value
875

876
877
878
	return(retval);
}

879
880
#else	/* !WIN32 */

881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
/*****************************************************************************/
// Expands Unix LF to CRLF
/*****************************************************************************/
BYTE* lf_expand(BYTE* inbuf, ulong inlen, BYTE* outbuf, ulong& newlen)
{
	ulong	i,j;

	for(i=j=0;i<inlen;i++) {
		if(inbuf[i]=='\n' && (!i || inbuf[i-1]!='\r'))
			outbuf[j++]='\r';
		outbuf[j++]=inbuf[i];
	}
	newlen=j;
    return(outbuf);
}

897
898
#define MAX_ARGS 1000

deuce's avatar
deuce committed
899
900
901
902
903
904
905
906
907
908
909
#ifdef NEEDS_SETENV
static int setenv(const char *name, const char *value, int overwrite)
{
	char *envstr;
	char *oldenv;
	if(overwrite || getenv(name)==NULL) {
		envstr=(char *)malloc(strlen(name)+strlen(value)+2);
		if(envstr==NULL) {
			errno=ENOMEM;
			return(-1);
		}
deuce's avatar
deuce committed
910
911
		/* Note, on some platforms, this can be free()d... */
		sprintf(envstr,"%s=%s",name,value);
deuce's avatar
deuce committed
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
		putenv(envstr);
	}
	return(0);
}
#endif

#ifdef NEEDS_CFMAKERAW
void
cfmakeraw(struct termios *t)
{
	t->c_iflag &= ~(IMAXBEL|IGNBRK|BRKINT|PARMRK|ISTRIP|INLCR|IGNCR|ICRNL|IXON);
	t->c_oflag &= ~OPOST;
	t->c_lflag &= ~(ECHO|ECHONL|ICANON|ISIG|IEXTEN);
	t->c_cflag &= ~(CSIZE|PARENB);
	t->c_cflag |= CS8;
}
#endif

930
931
932
933
934
935
936
937
938
939
940
941
942
943
#ifdef NEEDS_FORKPTY
static int login_tty(int fd)
{
	(void) setsid();
	if (!isatty(fd))
		return (-1);
	(void) dup2(fd, 0);
	(void) dup2(fd, 1);
	(void) dup2(fd, 2);
	if (fd > 2)
		(void) close(fd);
	return (0);
}

944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
#ifdef NEEDS_DAEMON
/****************************************************************************/
/* Daemonizes the process                                                   */
/****************************************************************************/
int
daemon(int nochdir, int noclose)
{
    int fd;

    switch (fork()) {
    case -1:
        return (-1);
    case 0:
        break;
    default:
        _exit(0);
    }

    if (setsid() == -1)
        return (-1);

    if (!nochdir)
        (void)chdir("/");

    if (!noclose && (fd = open(_PATH_DEVNULL, O_RDWR, 0)) != -1) {
        (void)dup2(fd, STDIN_FILENO);
        (void)dup2(fd, STDOUT_FILENO);
        (void)dup2(fd, STDERR_FILENO);
        if (fd > 2)
            (void)close(fd);
    }
    return (0);
}
#endif

979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
static int openpty(int *amaster, int *aslave, char *name, struct termios *termp, winsize *winp)
{
	char line[] = "/dev/ptyXX";
	const char *cp1, *cp2;
	int master, slave, ttygid;
	struct group *gr;

	if ((gr = getgrnam("tty")) != NULL)
		ttygid = gr->gr_gid;
	else
		ttygid = -1;

	for (cp1 = "pqrsPQRS"; *cp1; cp1++) {
		line[8] = *cp1;
		for (cp2 = "0123456789abcdefghijklmnopqrstuv"; *cp2; cp2++) {
			line[5] = 'p';
			line[9] = *cp2;
			if ((master = open(line, O_RDWR, 0)) == -1) {
				if (errno == ENOENT)
					break; /* try the next pty group */
			} else {
				line[5] = 't';
				(void) chown(line, getuid(), ttygid);
				(void) chmod(line, S_IRUSR|S_IWUSR|S_IWGRP);
				/* Hrm... SunOS doesn't seem to have revoke
				(void) revoke(line); */
				if ((slave = open(line, O_RDWR, 0)) != -1) {
					*amaster = master;
					*aslave = slave;
					if (name)
						strcpy(name, line);
					if (termp)
						(void) tcsetattr(slave,
							TCSAFLUSH, termp);
					if (winp)
						(void) ioctl(slave, TIOCSWINSZ,
							(char *)winp);
					return (0);
				}
				(void) close(master);
			}
		}
	}
	errno = ENOENT;	/* out of ptys */
	return (-1);
}

static int forkpty(int *amaster, char *name, termios *termp, winsize *winp)
{
	int master, slave, pid;

	if (openpty(&master, &slave, name, termp, winp) == -1)
		return (-1);
1032
	switch (pid = FORK()) {
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
	case -1:
		return (-1);
	case 0:
		/*
		 * child
		 */
		(void) close(master);
		login_tty(slave);
		return (0);
	}
	/*
	 * parent
	 */
	*amaster = master;
	(void) close(slave);
	return (pid);
}
#endif /* NEED_FORKPTY */

1052
int sbbs_t::external(const char* cmdline, long mode, const char* startup_dir)
1053
{
1054
1055
	char	str[MAX_PATH+1];
	char	fname[MAX_PATH+1];
1056
	char	fullpath[MAX_PATH+1];
1057
	char	fullcmdline[MAX_PATH+1];
1058
	char*	argv[MAX_ARGS];
1059
1060
1061
	BYTE*	bp;
	BYTE	buf[XTRN_IO_BUF_LEN];
    BYTE 	output_buf[XTRN_IO_BUF_LEN*2];
1062
	ulong	avail;
1063
1064
    ulong	output_len;
	bool	native=false;			// DOS program by default
1065
	bool	rio_abortable_save=rio_abortable;
rswindell's avatar
rswindell committed
1066
	int		i;
1067
	bool	data_waiting;
1068
1069
	int		rd;
	int		wr;
1070
	int		argc;
1071
	pid_t	pid;
1072
1073
	int		in_pipe[2];
	int		out_pipe[2];
1074
	int		err_pipe[2];
1075
	fd_set ibits;
1076
	int	high_fd;
1077
	struct timeval timeout;
1078
1079
    BYTE 	wwiv_buf[XTRN_IO_BUF_LEN*2];
    bool	wwiv_flag=false;
1080
1081
1082
#if defined(__FreeBSD__) || (defined(__linux__) && defined(USE_DOSEMU))
 	char* p;
#endif
1083

1084
	xtrn_mode = mode;
rswindell's avatar
rswindell committed
1085
	lprintf(LOG_DEBUG, "Executing external: %s", cmdline);
1086

1087
1088
1089
1090
1091
	if(startup_dir!=NULL && startup_dir[0] && !isdir(startup_dir)) {
		errormsg(WHERE, ERR_CHK, startup_dir, 0);
		return -1;
	}

1092
1093
	if(startup_dir==NULL)
		startup_dir=nulstr;
1094

1095
1096
	XTRN_LOADABLE_MODULE(cmdline,startup_dir);
	XTRN_LOADABLE_JS_MODULE(cmdline,startup_dir);
1097

1098
	attr(cfg.color[clr_external]);  /* setup default attributes */
1099

1100
1101
	native = native_executable(&cfg, cmdline, mode);

1102
1103
1104
    SAFECOPY(str,cmdline);			/* Set fname to program name only */
	truncstr(str," ");
    SAFECOPY(fname,getfname(str));
1105

1106
1107
	sprintf(fullpath,"%s%s",startup_dir,fname);
	if(startup_dir!=NULL && cmdline[0]!='/' && cmdline[0]!='.' && fexist(fullpath))
1108
1109
1110
		sprintf(fullcmdline,"%s%s",startup_dir,cmdline);
	else
		SAFECOPY(fullcmdline,cmdline);
1111
1112
1113
1114

 	if(native) { // Native (32-bit) external

		// Current environment passed to child process
1115
1116
1117
1118
1119
1120
		sprintf(dszlog,"%sPROTOCOL.LOG",cfg.node_dir);
		setenv("DSZLOG",dszlog,1); 		/* Makes the DSZ LOG active */
		setenv("SBBSNODE",cfg.node_dir,1);
		setenv("SBBSCTRL",cfg.ctrl_dir,1);
		setenv("SBBSDATA",cfg.data_dir,1);
		setenv("SBBSEXEC",cfg.exec_dir,1);
1121
		sprintf(str,"%u",cfg.node_num);
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
		setenv("SBBSNNUM",str,1);

		/* date/time env vars */
		now = time(NULL);
		struct	tm tm;
		if(localtime_r(&now, &tm) == NULL)
			memset(&tm, 0, sizeof(tm));
		sprintf(str," %02u", tm.tm_mday);
		setenv("DAY", str, /* overwrite */TRUE);
		setenv("WEEKDAY", wday[tm.tm_wday], /* overwrite */TRUE);
		setenv("MONTHNAME", mon[tm.tm_mon], /* overwrite */TRUE);
		sprintf(str, "%02u", tm.tm_mon + 1);
		setenv("MONTH", str, /* overwrite */TRUE);
		sprintf(str,"%u", 1900 + tm.tm_year);
		if(setenv("YEAR", str, /* overwrite */TRUE) != 0)
			errormsg(WHERE,ERR_WRITE,"environment",0);
1138
1139

	} else {
1140
		if(startup->options&BBS_OPT_NO_DOS) {
1141
			lprintf((mode&EX_OFFLINE) ? LOG_ERR : LOG_WARNING, "DOS programs not supported: %s", cmdline);
1142
1143
1144
			bprintf("Sorry, DOS programs are not supported on this node.\r\n");
			return -1;
		}
1145
#if defined(__FreeBSD__)
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
		/* ToDo: This seems to work for every door except Iron Ox
		   ToDo: Iron Ox is unique in that it runs perfectly from
		   ToDo: tcsh but not at all from anywhere else, complaining
		   ToDo: about corrupt files.  I've ruled out the possibilty
		   ToDo: of it being a terminal mode issue... no other ideas
		   ToDo: come to mind. */

		FILE * doscmdrc;

		sprintf(str,"%s.doscmdrc",cfg.node_dir);
		if((doscmdrc=fopen(str,"w+"))==NULL)  {
			errormsg(WHERE,ERR_CREATE,str,0);
			return(-1);
		}
		if(startup_dir!=NULL && startup_dir[0])
			fprintf(doscmdrc,"assign C: %s\n",startup_dir);
		else
			fprintf(doscmdrc,"assign C: .\n");

		fprintf(doscmdrc,"assign D: %s\n",cfg.node_dir);
		SAFECOPY(str,cfg.exec_dir);
		if((p=strrchr(str,'/'))!=NULL)
			*p=0;
		if((p=strrchr(str,'/'))!=NULL)
			*p=0;
		fprintf(doscmdrc,"assign E: %s\n",str);
rswindell's avatar
rswindell committed
1172

1173
1174
1175
1176
1177
1178
1179