xtrn.cpp 62 KB
Newer Older
1
/* xtrn.cpp */
rswindell's avatar
rswindell committed
2
// vi: tabstop=4
3
4
5
6
7
8
9
10
11

/* Synchronet external program support routines */

/* $Id$ */

/****************************************************************************
 * @format.tab-size 4		(Plain Text/Source Code File Header)			*
 * @format.use-tabs true	(see http://www.synchro.net/ptsc_hdr.html)		*
 *																			*
rswindell's avatar
rswindell committed
12
 * Copyright Rob Swindell - http://www.synchro.net/copyright.html			*
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
 *																			*
 * This program is free software; you can redistribute it and/or			*
 * modify it under the terms of the GNU General Public License				*
 * as published by the Free Software Foundation; either version 2			*
 * of the License, or (at your option) any later version.					*
 * See the GNU General Public License for more details: gpl.txt or			*
 * http://www.fsf.org/copyleft/gpl.html										*
 *																			*
 * Anonymous FTP access to the most recent released source is available at	*
 * ftp://vert.synchro.net, ftp://cvs.synchro.net and ftp://ftp.synchro.net	*
 *																			*
 * Anonymous CVS access to the development source and modification history	*
 * is available at cvs.synchro.net:/cvsroot/sbbs, example:					*
 * cvs -d :pserver:anonymous@cvs.synchro.net:/cvsroot/sbbs login			*
 *     (just hit return, no password is necessary)							*
 * cvs -d :pserver:anonymous@cvs.synchro.net:/cvsroot/sbbs checkout src		*
 *																			*
 * For Synchronet coding style and modification guidelines, see				*
 * http://www.synchro.net/source.html										*
 *																			*
 * You are encouraged to submit any modifications (preferably in Unix diff	*
 * format) via e-mail to mods@synchro.net									*
 *																			*
 * Note: If this box doesn't appear square, then you need to fix your tabs.	*
 ****************************************************************************/
#include "sbbs.h"
#include "cmdshell.h"
#include "telnet.h"

42
43
#include <signal.h>			// kill()

44
45
46
#ifdef __unix__
	#include <sys/wait.h>	// WEXITSTATUS

deuce's avatar
deuce committed
47
48
	#define TTYDEFCHARS		// needed for ttydefchars definition
	#include <sys/ttydefaults.h>	// Linux - it's motherfucked.
rswindell's avatar
rswindell committed
49
#if defined(__FreeBSD__)
50
	#include <libutil.h>	// forkpty()
deuce's avatar
deuce committed
51
#elif defined(__OpenBSD__) || defined(__NetBSD__) || defined(__DARWIN__)
rswindell's avatar
rswindell committed
52
53
	#include <util.h>
#elif defined(__linux__)
54
	#include <pty.h>
55
#elif defined(__QNX__)
56
#if 0
57
	#include <unix.h>
58
59
60
#else
	#define NEEDS_FORKPTY
#endif
61
#endif
62
63
64
65
66

	#ifdef NEEDS_FORKPTY
	#include <grp.h>
	#endif

67
	#include <termios.h>
68

deuce's avatar
deuce committed
69
70
71
72
/*
 * Control Character Defaults
 */
#ifndef CTRL
73
	#define CTRL(x)	(x&037)
deuce's avatar
deuce committed
74
75
#endif
#ifndef CEOF
76
	#define	CEOF		CTRL('d')
deuce's avatar
deuce committed
77
78
#endif
#ifndef CEOL
79
	#define	CEOL		0xff		/* XXX avoid _POSIX_VDISABLE */
deuce's avatar
deuce committed
80
81
#endif
#ifndef CERASE
82
	#define	CERASE		0177
deuce's avatar
deuce committed
83
84
#endif
#ifndef CERASE2
85
	#define	CERASE2		CTRL('h')
deuce's avatar
deuce committed
86
87
#endif
#ifndef CINTR
88
	#define	CINTR		CTRL('c')
deuce's avatar
deuce committed
89
90
#endif
#ifndef CSTATUS
91
	#define	CSTATUS		CTRL('t')
deuce's avatar
deuce committed
92
93
#endif
#ifndef CKILL
94
	#define	CKILL		CTRL('u')
deuce's avatar
deuce committed
95
96
#endif
#ifndef CMIN
97
	#define	CMIN		1
deuce's avatar
deuce committed
98
99
#endif
#ifndef CQUIT
100
	#define	CQUIT		034		/* FS, ^\ */
deuce's avatar
deuce committed
101
102
#endif
#ifndef CSUSP
103
	#define	CSUSP		CTRL('z')
deuce's avatar
deuce committed
104
105
#endif
#ifndef CTIME
106
	#define	CTIME		0
deuce's avatar
deuce committed
107
108
#endif
#ifndef CDSUSP
109
	#define	CDSUSP		CTRL('y')
deuce's avatar
deuce committed
110
111
#endif
#ifndef CSTART
112
	#define	CSTART		CTRL('q')
deuce's avatar
deuce committed
113
114
#endif
#ifndef CSTOP
115
	#define	CSTOP		CTRL('s')
deuce's avatar
deuce committed
116
117
#endif
#ifndef CLNEXT
118
	#define	CLNEXT		CTRL('v')
deuce's avatar
deuce committed
119
120
#endif
#ifndef CDISCARD
121
	#define	CDISCARD 	CTRL('o')
deuce's avatar
deuce committed
122
123
#endif
#ifndef CWERASE
124
	#define	CWERASE 	CTRL('w')
deuce's avatar
deuce committed
125
126
#endif
#ifndef CREPRINT
127
	#define	CREPRINT 	CTRL('r')
deuce's avatar
deuce committed
128
129
#endif
#ifndef CEOT
130
	#define	CEOT		CEOF
deuce's avatar
deuce committed
131
132
133
#endif
/* compat */
#ifndef CBRK
134
	#define	CBRK		CEOL
deuce's avatar
deuce committed
135
136
#endif
#ifndef CRPRNT
137
	#define CRPRNT		CREPRINT
deuce's avatar
deuce committed
138
139
#endif
#ifndef CFLUSH
140
141
142
	#define	CFLUSH		CDISCARD
#endif

deuce's avatar
deuce committed
143
#ifndef TTYDEF_IFLAG
144
	#define TTYDEF_IFLAG    (BRKINT | ICRNL | IMAXBEL | IXON | IXANY)
deuce's avatar
deuce committed
145
146
#endif
#ifndef TTYDEF_OFLAG
147
	#define TTYDEF_OFLAG    (OPOST | ONLCR)
deuce's avatar
deuce committed
148
149
#endif
#ifndef TTYDEF_LFLAG
150
	#define TTYDEF_LFLAG    (ECHO | ICANON | ISIG | IEXTEN | ECHOE|ECHOKE|ECHOCTL)
deuce's avatar
deuce committed
151
152
#endif
#ifndef TTYDEF_CFLAG
153
	#define TTYDEF_CFLAG    (CREAD | CS8 | HUPCL)
deuce's avatar
deuce committed
154
#endif
deuce's avatar
deuce committed
155
#if defined(__QNX__) || defined(__solaris__) || defined(__NetBSD__)
156
157
158
	static cc_t     ttydefchars[NCCS] = {
        CEOF,   CEOL,   CEOL,   CERASE, CWERASE, CKILL, CREPRINT,
        CERASE2, CINTR, CQUIT,  CSUSP,  CDSUSP, CSTART, CSTOP,  CLNEXT,
deuce's avatar
deuce committed
159
160
161
162
        CDISCARD, CMIN, CTIME,  CSTATUS
#ifndef __solaris__
	, _POSIX_VDISABLE
#endif
163
	};
164
165
#endif

166
167
#endif	/* __unix__ */

168
#define XTRN_IO_BUF_LEN 10000	/* 50% of IO_THREAD_BUF_SIZE */
169

170
171
172
173
174
175
176
177
178
179
/*****************************************************************************/
/* Interrupt routine to expand WWIV Ctrl-C# codes into ANSI escape sequences */
/*****************************************************************************/
BYTE* wwiv_expand(BYTE* buf, ulong buflen, BYTE* outbuf, ulong& newlen
	,ulong user_misc, bool& ctrl_c)
{
    char	ansi_seq[32];
	ulong 	i,j,k;

    for(i=j=0;i<buflen;i++) {
180
        if(buf[i]==CTRL_C) {	/* WWIV color escape char */
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
            ctrl_c=true;
            continue;
        }
        if(!ctrl_c) {
            outbuf[j++]=buf[i];
            continue;
        }
        ctrl_c=false;
        if(user_misc&ANSI) {
            switch(buf[i]) {
                default:
                    strcpy(ansi_seq,"\x1b[0m");          /* low grey */
                    break;
                case '1':
                    strcpy(ansi_seq,"\x1b[0;1;36m");     /* high cyan */
                    break;
                case '2':
                    strcpy(ansi_seq,"\x1b[0;1;33m");     /* high yellow */
                    break;
                case '3':
                    strcpy(ansi_seq,"\x1b[0;35m");       /* low magenta */
                    break;
                case '4':
                    strcpy(ansi_seq,"\x1b[0;1;44m");     /* white on blue */
                    break;
                case '5':
                    strcpy(ansi_seq,"\x1b[0;32m");       /* low green */
                    break;
                case '6':
                    strcpy(ansi_seq,"\x1b[0;1;5;31m");   /* high blinking red */
                    break;
                case '7':
                    strcpy(ansi_seq,"\x1b[0;1;34m");     /* high blue */
                    break;
                case '8':
                    strcpy(ansi_seq,"\x1b[0;34m");       /* low blue */
                    break;
                case '9':
                    strcpy(ansi_seq,"\x1b[0;36m");       /* low cyan */
                    break;
            }
            for(k=0;ansi_seq[k];k++)
                outbuf[j++]=ansi_seq[k];
        }
    }
    newlen=j;
    return(outbuf);
}
229

230
231
232
233
234
235
236
static void petscii_convert(BYTE* buf, ulong len)
{
    for(ulong i=0; i<len; i++) {
		buf[i] = cp437_to_petscii(buf[i]);
	}
}

237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
static bool native_executable(scfg_t* cfg, const char* cmdline, long mode)
{
	char*	p;
	char	str[MAX_PATH+1];
	char	name[64];
	char	base[64];
	unsigned i;

	if(mode&EX_NATIVE)
		return(TRUE);

    SAFECOPY(str,cmdline);				/* Set str to program name only */
	truncstr(str," ");
    SAFECOPY(name,getfname(str));
	SAFECOPY(base,name);
	if((p=getfext(base))!=NULL)
		*p=0;

    for(i=0;i<cfg->total_natvpgms;i++)
        if(stricmp(name,cfg->natvpgm[i]->name)==0
		|| stricmp(base,cfg->natvpgm[i]->name)==0)
            break;
    return(i<cfg->total_natvpgms);
}

262
#define XTRN_LOADABLE_MODULE(cmdline,startup_dir)			\
263
	if(cmdline[0]=='*')		/* Baja module or JavaScript */	\
rswindell's avatar
rswindell committed
264
		return(exec_bin(cmdline+1,&main_csi,startup_dir))
265
#ifdef JAVASCRIPT
266
	#define XTRN_LOADABLE_JS_MODULE(cmdline,startup_dir)	\
267
	if(cmdline[0]=='?') 	/* JavaScript */				\
rswindell's avatar
rswindell committed
268
		return(js_execfile(cmdline+1,startup_dir))
269
270
271
#else
	#define XTRN_LOADABLE_JS_MODULE
#endif
272
273
274

#ifdef _WIN32

275
#include "execvxd.h"	/* DOSXTRN.EXE API */
276
277
278

extern SOCKET node_socket[];

279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
/*****************************************************************************/
// Expands Single CR to CRLF
/*****************************************************************************/
BYTE* cr_expand(BYTE* inbuf, ulong inlen, BYTE* outbuf, ulong& newlen)
{
	ulong	i,j;

	for(i=j=0;i<inlen;i++) {
		outbuf[j++]=inbuf[i];
		if(inbuf[i]=='\r')
			outbuf[j++]='\n';
	}
	newlen=j;
    return(outbuf);
}

295
296
297
298
299
300
301
302
static void add_env_var(str_list_t* list, const char* var, const char* val)
{
	char	str[MAX_PATH*2];
	SetEnvironmentVariable(var,NULL);	/* Delete in current process env */
	SAFEPRINTF2(str,"%s=%s",var,val);
	strListPush(list,str);
}

303
304
305
306
307
308
309
310
/* Clean-up resources while preserving current LastError value */
#define XTRN_CLEANUP												\
	last_error=GetLastError();										\
    if(vxd!=INVALID_HANDLE_VALUE)		CloseHandle(vxd);			\
	if(rdslot!=INVALID_HANDLE_VALUE)	CloseHandle(rdslot);		\
	if(wrslot!=INVALID_HANDLE_VALUE)	CloseHandle(wrslot);		\
	if(start_event!=NULL)				CloseHandle(start_event);	\
	if(hungup_event!=NULL)				CloseHandle(hungup_event);	\
311
	if(hangup_event!=NULL)				CloseHandle(hangup_event);	\
312
313
	SetLastError(last_error)

314
315
316
/****************************************************************************/
/* Runs an external program 												*/
/****************************************************************************/
317
int sbbs_t::external(const char* cmdline, long mode, const char* startup_dir)
318
{
319
320
321
	char	str[MAX_PATH+1];
	char*	env_block=NULL;
	char*	env_strings;
322
	const char* p_startup_dir;
323
	char	path[MAX_PATH+1];
324
325
326
327
    char	fullcmdline[MAX_PATH+1];
	char	realcmdline[MAX_PATH+1];
	char	comspec_str[MAX_PATH+1];
	char	title[MAX_PATH+1];
328
329
	BYTE	buf[XTRN_IO_BUF_LEN],*bp;
    BYTE 	telnet_buf[XTRN_IO_BUF_LEN*2];
330
    BYTE 	output_buf[XTRN_IO_BUF_LEN*2];
331
332
    BYTE 	wwiv_buf[XTRN_IO_BUF_LEN*2];
    bool	wwiv_flag=false;
333
    bool	native=false;			// DOS program by default
334
    bool	was_online=true;
335
	bool	rio_abortable_save=rio_abortable;
336
	bool	use_pipes=false;	// NT-compatible console redirection
337
	BOOL	success;
338
	BOOL	processTerminated=false;
339
	uint	i;
340
341
342
343
    time_t	hungup=0;
	HANDLE	vxd=INVALID_HANDLE_VALUE;
	HANDLE	rdslot=INVALID_HANDLE_VALUE;
	HANDLE	wrslot=INVALID_HANDLE_VALUE;
344
	HANDLE  start_event=NULL;
345
	HANDLE	hungup_event=NULL;
346
	HANDLE	hangup_event=NULL;
347
348
	HANDLE	rdoutpipe;
	HANDLE	wrinpipe;
349
    PROCESS_INFORMATION process_info;
deuce's avatar
deuce committed
350
	unsigned long	rd;
351
    unsigned long	wr;
deuce's avatar
deuce committed
352
    unsigned long	len;
353
    DWORD	avail;
deuce's avatar
deuce committed
354
355
	unsigned long	msglen;
	unsigned long	retval;
356
357
	DWORD	last_error;
	DWORD	loop_since_io=0;
358
	struct	tm tm;
359
	str_list_t	env_list;
360

361
	xtrn_mode = mode;
362
	lprintf(LOG_DEBUG,"Executing external: %s",cmdline);
363

364
365
366
367
368
	if(startup_dir!=NULL && startup_dir[0] && !isdir(startup_dir)) {
		errormsg(WHERE, ERR_CHK, startup_dir, 0);
		return -1;
	}

369
370
	XTRN_LOADABLE_MODULE(cmdline,startup_dir);
	XTRN_LOADABLE_JS_MODULE(cmdline,startup_dir);
371

372
	attr(cfg.color[clr_external]);		/* setup default attributes */
373

374
	native = native_executable(&cfg, cmdline, mode);
375

376
	if(!native && (startup->options&BBS_OPT_NO_DOS)) {
377
		lprintf((mode&EX_OFFLINE) ? LOG_ERR : LOG_WARNING, "DOS programs not supported: %s", cmdline);
378
379
380
381
		bprintf("Sorry, DOS programs are not supported on this node.\r\n");
		return -1;
	}

rswindell's avatar
rswindell committed
382
	if(mode&EX_SH || strcspn(cmdline,"<>|")!=strlen(cmdline))
383
384
385
386
387
388
		sprintf(comspec_str,"%s /C ", comspec);
	else
		comspec_str[0]=0;

    if(startup_dir && cmdline[1]!=':' && cmdline[0]!='/'
    	&& cmdline[0]!='\\' && cmdline[0]!='.')
389
       	SAFEPRINTF3(fullcmdline, "%s%s%s", comspec_str, startup_dir, cmdline);
390
    else
391
    	SAFEPRINTF2(fullcmdline, "%s%s", comspec_str, cmdline);
392

393
	SAFECOPY(realcmdline, fullcmdline);	// for errormsg if failed to execute
394
395

	now=time(NULL);
396
397
	if(localtime_r(&now,&tm)==NULL)
		memset(&tm,0,sizeof(tm));
398

399
	if(native && mode&EX_STDOUT && !(mode&EX_OFFLINE))
400
401
		use_pipes=true;

402
 	if(native) { // Native (32-bit) external
403

404
405
406
407
408
409
		if((env_list=strListInit())==NULL) {
			XTRN_CLEANUP;
        	errormsg(WHERE, ERR_CREATE, "env_list", 0);
            return(errno);
		}

410
		// Current environment passed to child process
rswindell's avatar
rswindell committed
411
		sprintf(str,"%sprotocol.log",cfg.node_dir);
412
413
414
415
416
417
418
		add_env_var(&env_list,"DSZLOG",str);
		add_env_var(&env_list,"SBBSNODE",cfg.node_dir);
		add_env_var(&env_list,"SBBSCTRL",cfg.ctrl_dir);
		add_env_var(&env_list,"SBBSDATA",cfg.data_dir);
		add_env_var(&env_list,"SBBSEXEC",cfg.exec_dir);
		sprintf(str,"%d",cfg.node_num);
		add_env_var(&env_list,"SBBSNNUM",str);
419
		/* date/time env vars */
rswindell's avatar
rswindell committed
420
		sprintf(str,"%02u",tm.tm_mday);
421
422
423
424
425
426
427
		add_env_var(&env_list,"DAY",str);
		add_env_var(&env_list,"WEEKDAY",wday[tm.tm_wday]);
		add_env_var(&env_list,"MONTHNAME",mon[tm.tm_mon]);
		sprintf(str,"%02u",tm.tm_mon+1);
		add_env_var(&env_list,"MONTH",str);
		sprintf(str,"%u",1900+tm.tm_year);
		add_env_var(&env_list,"YEAR",str);
428
429
430
431
432
433
434
435
436
437
438
439

		env_strings=GetEnvironmentStrings();
		env_block=strListCopyBlock(env_strings);
		if(env_strings!=NULL)
			FreeEnvironmentStrings(env_strings);
		env_block=strListAppendBlock(env_block,env_list);
		strListFree(&env_list);
		if(env_block==NULL) {
			XTRN_CLEANUP;
        	errormsg(WHERE, ERR_CREATE, "env_block", 0);
            return(errno);
		}
440
441
442

    } else { // DOS external

443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
		// DOS-compatible (short) paths
		char node_dir[MAX_PATH+1];
		char ctrl_dir[MAX_PATH+1];
		char data_dir[MAX_PATH+1];
		char exec_dir[MAX_PATH+1];

		// in case GetShortPathName fails
		SAFECOPY(node_dir,cfg.node_dir);
		SAFECOPY(ctrl_dir,cfg.ctrl_dir);
		SAFECOPY(data_dir,cfg.data_dir);
		SAFECOPY(exec_dir,cfg.exec_dir);

		GetShortPathName(cfg.node_dir,node_dir,sizeof(node_dir));
		GetShortPathName(cfg.ctrl_dir,ctrl_dir,sizeof(node_dir));
		GetShortPathName(cfg.data_dir,data_dir,sizeof(data_dir));
		GetShortPathName(cfg.exec_dir,exec_dir,sizeof(exec_dir));

460
461
		sprintf(path,"%sDOSXTRN.RET", cfg.node_dir);
		remove(path);
462
463

    	// Create temporary environment file
464
    	sprintf(path,"%sDOSXTRN.ENV", node_dir);
465
        FILE* fp=fopen(path,"w");
466
        if(fp==NULL) {
467
			XTRN_CLEANUP;
468
        	errormsg(WHERE, ERR_CREATE, path, 0);
469
            return(errno);
470
471
        }
        fprintf(fp, "%s\n", fullcmdline);
472
473
474
475
476
		fprintf(fp, "DSZLOG=%sPROTOCOL.LOG\n", node_dir);
        fprintf(fp, "SBBSNODE=%s\n", node_dir);
        fprintf(fp, "SBBSCTRL=%s\n", ctrl_dir);
		fprintf(fp, "SBBSDATA=%s\n", data_dir);
		fprintf(fp, "SBBSEXEC=%s\n", exec_dir);
477
        fprintf(fp, "SBBSNNUM=%d\n", cfg.node_num);
478
		fprintf(fp, "PCBNODE=%d\n", cfg.node_num);
479
480
		fprintf(fp, "PCBDRIVE=%.2s\n", node_dir);
		fprintf(fp, "PCBDIR=%s\n", node_dir + 2);
481
482
483
484
485
486
		/* date/time env vars */
		fprintf(fp, "DAY=%02u\n", tm.tm_mday);
		fprintf(fp, "WEEKDAY=%s\n",wday[tm.tm_wday]);
		fprintf(fp, "MONTHNAME=%s\n",mon[tm.tm_mon]);
		fprintf(fp, "MONTH=%02u\n",tm.tm_mon+1);
		fprintf(fp, "YEAR=%u\n",1900+tm.tm_year);
487
488
        fclose(fp);

489
        SAFEPRINTF2(fullcmdline, "%sDOSXTRN.EXE %s", cfg.exec_dir, path);
490

491
		if(!(mode&EX_OFFLINE)) {
492
			i=SBBSEXEC_MODE_FOSSIL;
493
			if(mode&EX_STDIN)
494
           		i|=SBBSEXEC_MODE_DOS_IN;
495
			if(mode&EX_STDOUT)
496
        		i|=SBBSEXEC_MODE_DOS_OUT;
497
498
			sprintf(str," NT %u %u"
				,cfg.node_num,i);
499
500
501
502
503
504
505
506
507
			strcat(fullcmdline,str);

			sprintf(str,"sbbsexec_hungup%d",cfg.node_num);
			if((hungup_event=CreateEvent(
				 NULL	// pointer to security attributes
				,TRUE	// flag for manual-reset event
				,FALSE  // flag for initial state
				,str	// pointer to event-object name
				))==NULL) {
508
				XTRN_CLEANUP;
509
				errormsg(WHERE, ERR_CREATE, str, 0);
510
511
512
				return(GetLastError());
			}

513
514
515
516
517
518
519
520
521
522
523
524
			sprintf(str,"sbbsexec_hangup%d",cfg.node_num);
			if((hangup_event=CreateEvent(
				 NULL	// pointer to security attributes
				,TRUE	// flag for manual-reset event
				,FALSE  // flag for initial state
				,str	// pointer to event-object name
				))==NULL) {
				XTRN_CLEANUP;
				errormsg(WHERE, ERR_CREATE, str, 0);
				return(GetLastError());
			}

525
526
527
			sprintf(str,"\\\\.\\mailslot\\sbbsexec\\rd%d"
				,cfg.node_num);
			rdslot=CreateMailslot(str
528
				,sizeof(buf)/2			// Maximum message size (0=unlimited)
529
530
531
				,0						// Read time-out
				,NULL);                 // Security
			if(rdslot==INVALID_HANDLE_VALUE) {
532
				XTRN_CLEANUP;
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
				errormsg(WHERE, ERR_CREATE, str, 0);
				return(GetLastError());
			}
		}
    }

	if(startup_dir!=NULL && startup_dir[0])
		p_startup_dir=startup_dir;
	else
		p_startup_dir=NULL;
    STARTUPINFO startup_info={0};
    startup_info.cb=sizeof(startup_info);
	if(mode&EX_OFFLINE)
		startup_info.lpTitle=NULL;
	else {
548
		SAFEPRINTF3(title,"%s running %s on node %d"
549
550
551
552
553
			,useron.number ? useron.alias : "Event"
			,realcmdline
			,cfg.node_num);
		startup_info.lpTitle=title;
	}
554
    if(startup->options&BBS_OPT_XTRN_MINIMIZED) {
555
556
557
    	startup_info.wShowWindow=SW_SHOWMINNOACTIVE;
        startup_info.dwFlags|=STARTF_USESHOWWINDOW;
    }
558
559
560
561
562
563
564
565
	if(use_pipes) {
		// Set up the security attributes struct.
		SECURITY_ATTRIBUTES sa;
		memset(&sa,0,sizeof(sa));
		sa.nLength= sizeof(SECURITY_ATTRIBUTES);
		sa.lpSecurityDescriptor = NULL;
		sa.bInheritHandle = TRUE;

566
567
		// Create the child output pipe (override default 4K buffer size)
		if(!CreatePipe(&rdoutpipe,&startup_info.hStdOutput,&sa,sizeof(buf))) {
568
569
570
571
572
573
			errormsg(WHERE,ERR_CREATE,"stdout pipe",0);
			return(GetLastError());
		}
		startup_info.hStdError=startup_info.hStdOutput;

		// Create the child input pipe.
574
		if(!CreatePipe(&startup_info.hStdInput,&wrinpipe,&sa,sizeof(buf))) {
575
576
577
			errormsg(WHERE,ERR_CREATE,"stdin pipe",0);
			return(GetLastError());
		}
578

579
580
581
582
583
584
585
586
587
588
589
590
591
592
		DuplicateHandle(
			GetCurrentProcess(), rdoutpipe,
			GetCurrentProcess(), &rdslot, 0, FALSE, DUPLICATE_SAME_ACCESS);

		DuplicateHandle(
			GetCurrentProcess(), wrinpipe,
			GetCurrentProcess(), &wrslot, 0, FALSE, DUPLICATE_SAME_ACCESS);

		CloseHandle(rdoutpipe);
		CloseHandle(wrinpipe);

		startup_info.dwFlags|=STARTF_USESTDHANDLES|STARTF_USESHOWWINDOW;
    	startup_info.wShowWindow=SW_HIDE;
	}
593
	if(native && !(mode&EX_OFFLINE)) {
594

595
		if(!(mode&EX_STDIN)) {
596
			if(passthru_thread_running)
597
				passthru_socket_activate(true);
598
599
			else
				pthread_mutex_lock(&input_thread_mutex);
600
		}
601
602
	}

603
    success=CreateProcess(
604
605
606
607
		NULL,			// pointer to name of executable module
		fullcmdline,  	// pointer to command line string
		NULL,  			// process security attributes
		NULL,   		// thread security attributes
608
		native && !(mode&EX_OFFLINE),	 			// handle inheritance flag
609
		CREATE_NEW_CONSOLE/*|CREATE_SEPARATE_WOW_VDM*/, // creation flags
610
        env_block, 		// pointer to new environment block
611
612
613
		p_startup_dir,	// pointer to current directory name
		&startup_info,  // pointer to STARTUPINFO
		&process_info  	// pointer to PROCESS_INFORMATION
614
615
616
617
618
		);

	strListFreeBlock(env_block);

	if(!success) {
619
		XTRN_CLEANUP;
620
621
		if(!(mode&EX_STDIN)) {
			if(passthru_thread_running)
622
				passthru_socket_activate(false);
623
624
625
			else
				pthread_mutex_unlock(&input_thread_mutex);
		}
626
		SetLastError(last_error);	/* Restore LastError */
627
        errormsg(WHERE, ERR_EXEC, realcmdline, mode);
628
		SetLastError(last_error);	/* Restore LastError */
629
630
631
        return(GetLastError());
    }

632
633
634
635
#if 0
	char dbgstr[256];
	sprintf(dbgstr,"Node %d created: hProcess %X hThread %X processID %X threadID %X\n"
		,cfg.node_num
rswindell's avatar
rswindell committed
636
637
638
639
		,process_info.hProcess
		,process_info.hThread
		,process_info.dwProcessId
		,process_info.dwThreadId);
640
641
642
	OutputDebugString(dbgstr);
#endif

643
644
	CloseHandle(process_info.hThread);

645
	/* Disable Ctrl-C checking */
646
	if(!(mode&EX_OFFLINE))
647
		rio_abortable=false;
648

649
    // Executing app in foreground?, monitor
650
    retval=STILL_ACTIVE;
651
    while(!(mode&EX_BG)) {
652
653
		if(mode&EX_CHKTIME)
			gettimeleft();
654
655
        if(!online && !(mode&EX_OFFLINE)) { // Tell VXD/VDD and external that user hung-up
        	if(was_online) {
656
				logline(LOG_NOTICE,"X!","hung-up in external program");
657
658
            	hungup=time(NULL);
				if(!native) {
659
					SetEvent(hungup_event);
660
661
662
				}
	            was_online=false;
            }
663
            if(hungup && time(NULL)-hungup>5 && !processTerminated) {
664
				lprintf(LOG_INFO,"Terminating process from line %d", __LINE__);
665
666
				processTerminated=TerminateProcess(process_info.hProcess, 2112);
			}
667
        }
rswindell's avatar
rswindell committed
668
		if((native && !use_pipes) || mode&EX_OFFLINE) {
669
			/* Monitor for process termination only */
670
671
			if(WaitForSingleObject(process_info.hProcess,1000)==WAIT_OBJECT_0)
				break;
672
673
		} else {

674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
			/* Write to VDD */

			wr=RingBufPeek(&inbuf,buf,sizeof(buf));
			if(wr) {
				if(!use_pipes && wrslot==INVALID_HANDLE_VALUE) {
					sprintf(str,"\\\\.\\mailslot\\sbbsexec\\wr%d"
						,cfg.node_num);
					wrslot=CreateFile(str
						,GENERIC_WRITE
						,FILE_SHARE_READ
						,NULL
						,OPEN_EXISTING
						,FILE_ATTRIBUTE_NORMAL
						,(HANDLE) NULL);
					if(wrslot==INVALID_HANDLE_VALUE)
						lprintf(LOG_DEBUG,"!ERROR %u (%s) opening %s", GetLastError(), strerror(errno), str);
690
					else
691
692
						lprintf(LOG_DEBUG,"CreateFile(%s)=0x%x", str, wrslot);
				}
693

694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
				/* CR expansion */
				if(use_pipes)
					bp=cr_expand(buf,wr,output_buf,wr);
				else
					bp=buf;

				len=0;
				if(wrslot==INVALID_HANDLE_VALUE)
					lprintf(LOG_WARNING,"VDD Open failed (not loaded yet?)");
				else if(!WriteFile(wrslot,bp,wr,&len,NULL)) {
					lprintf(LOG_ERR,"!VDD WriteFile(0x%x, %u) FAILURE (Error=%u)", wrslot, wr, GetLastError());
					if(GetMailslotInfo(wrslot,&wr,NULL,NULL,NULL))
						lprintf(LOG_DEBUG,"!VDD MailSlot max_msg_size=%u", wr);
					else
						lprintf(LOG_DEBUG,"!GetMailslotInfo(0x%x)=%u", wrslot, GetLastError());
				} else {
					if(len!=wr)
						lprintf(LOG_WARNING,"VDD short write (%u instead of %u)", len,wr);
					RingBufRead(&inbuf, NULL, len);
					if(use_pipes && !(mode&EX_NOECHO)) {
						/* echo */
						RingBufWrite(&outbuf, bp, len);
716
					}
717
				}
718
719
				wr=len;
			}
720

721
			/* Read from VDD */
722

723
724
725
			rd=0;
			len=sizeof(buf);
			avail=RingBufFree(&outbuf)/2;	// leave room for wwiv/telnet expansion
726
#if 0
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
			if(avail==0)
				lprintf("Node %d !output buffer full (%u bytes)"
					,cfg.node_num,RingBufFull(&outbuf));
#endif
			if(len>avail)
            	len=avail;

			while(rd<len) {
				unsigned long waiting=0;

				if(use_pipes)
					PeekNamedPipe(
						rdslot,             // handle to pipe to copy from
						NULL,               // pointer to data buffer
						0,					// size, in bytes, of data buffer
						NULL,				// pointer to number of bytes read
						&waiting,			// pointer to total number of bytes available
						NULL				// pointer to unread bytes in this message
						);
				else
					GetMailslotInfo(
						rdslot,				// mailslot handle
 						NULL,				// address of maximum message size
						NULL,				// address of size of next message
						&waiting,			// address of number of messages
 						NULL				// address of read time-out
						);
				if(!waiting)
					break;
				if(ReadFile(rdslot,buf+rd,len-rd,&msglen,NULL)==FALSE || msglen<1)
					break;
				rd+=msglen;
			}
760

761
762
763
764
765
766
767
768
769
			if(rd) {
				if(mode&EX_WWIV) {
                	bp=wwiv_expand(buf, rd, wwiv_buf, rd, useron.misc, wwiv_flag);
					if(rd>sizeof(wwiv_buf))
						lprintf(LOG_ERR,"WWIV_BUF OVERRUN");
				} else if(telnet_mode&TELNET_MODE_OFF) {
					bp=buf;
				} else {
                	rd = telnet_expand(buf, rd, telnet_buf, sizeof(telnet_buf), /* expand_cr: */false, &bp);
770
				}
771
772
773
				if(rd>RingBufFree(&outbuf)) {
					lprintf(LOG_ERR,"output buffer overflow");
					rd=RingBufFree(&outbuf);
774
				}
775
				if(mode&EX_BIN)
776
					RingBufWrite(&outbuf, bp, rd);
777
778
				else
					rputs((char*)bp, rd);
779
			}
780
#if defined(_DEBUG) && 0
781
782
783
784
785
786
			if(rd>1) {
				sprintf(str,"Node %d read %5d bytes from xtrn", cfg.node_num, rd);
				OutputDebugString(str);
			}
#endif
            if((!rd && !wr) || hungup) {
787
788
789
790
791

				loop_since_io++;	/* number of loop iterations with no I/O */

				/* only check process termination after 300 milliseconds of no I/O */
				/* to allow for last minute reception of output from DOS programs */
792
793
				if(loop_since_io>=3) {

794
					if(online && hangup_event!=NULL
795
796
797
798
799
800
801
802
803
						&& WaitForSingleObject(hangup_event,0)==WAIT_OBJECT_0) {
						lprintf(LOG_NOTICE,"Node %d External program requested hangup (dropped DTR)"
							,cfg.node_num);
						hangup();
					}

					if(WaitForSingleObject(process_info.hProcess,0)==WAIT_OBJECT_0)
						break;	/* Process Terminated */
				}
804
805

				/* only check node for interrupt flag every 3 seconds of no I/O */
rswindell's avatar
rswindell committed
806
				if((loop_since_io%30)==0) {
807
808
809
810
811
812
813
					// Check if the node has been interrupted
					getnodedat(cfg.node_num,&thisnode,0);
					if(thisnode.misc&NODE_INTR)
						break;
				}

				/* only send telnet GA every 30 seconds of no I/O */
814
				if((loop_since_io%300)==0) {
815
#if defined(_DEBUG)
816
817
818
819
820
821
822
					sprintf(str,"Node %d xtrn idle\n",cfg.node_num);
					OutputDebugString(str);
#endif
					// Let's make sure the socket is up
					// Sending will trigger a socket d/c detection
					if(!(startup->options&BBS_OPT_NO_TELNET_GA))
						send_telnet_cmd(TELNET_GA,0);
823
				}
824
				sem_trywait_block(&inbuf.sem,100);
825
826
827
828
829
            } else
				loop_since_io=0;
        }
	}

830
    if(!(mode&EX_BG)) {			/* !background execution */
831

832
833
834
        if(GetExitCodeProcess(process_info.hProcess, &retval)==FALSE)
            errormsg(WHERE, ERR_CHK, "ExitCodeProcess",(DWORD)process_info.hProcess);

835
		if(retval==STILL_ACTIVE) {
836
			lprintf(LOG_INFO,"Node %d Terminating process from line %d",cfg.node_num,__LINE__);
837
			TerminateProcess(process_info.hProcess, GetLastError());
rswindell's avatar
rswindell committed
838
		}
839

840
	 	// Get return value
841
842
843
844
845
846
847
		if(!native) {
    		sprintf(str,"%sDOSXTRN.RET", cfg.node_dir);
			FILE* fp=fopen(str,"r");
			if(fp!=NULL) {
				fscanf(fp,"%d",&retval);
				fclose(fp);
			}
848
849
850
		}
	}

851
	XTRN_CLEANUP;
852
	CloseHandle(process_info.hProcess);
853
854
855

	if(!(mode&EX_OFFLINE)) {	/* !off-line execution */

856
		if(native) {
857
858
			if(!(mode&EX_STDIN)) {
				if(passthru_thread_running)
859
					passthru_socket_activate(false);
860
861
862
				else
					pthread_mutex_unlock(&input_thread_mutex);
			}
863
		}
864

865
866
		curatr=~0;			// Can't guarantee current attributes
		attr(LIGHTGRAY);	// Force to "normal"
867

868
		rio_abortable=rio_abortable_save;	// Restore abortable state
869

870
		/* Got back to Text/NVT mode */
871
		request_telnet_opt(TELNET_DONT,TELNET_BINARY_TX);
872
	}
873

874
875
//	lprintf("%s returned %d",realcmdline, retval);

876
	errorlevel = retval; // Baja or JS retrievable error value
877

878
879
880
	return(retval);
}

881
882
#else	/* !WIN32 */

883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
/*****************************************************************************/
// Expands Unix LF to CRLF
/*****************************************************************************/
BYTE* lf_expand(BYTE* inbuf, ulong inlen, BYTE* outbuf, ulong& newlen)
{
	ulong	i,j;

	for(i=j=0;i<inlen;i++) {
		if(inbuf[i]=='\n' && (!i || inbuf[i-1]!='\r'))
			outbuf[j++]='\r';
		outbuf[j++]=inbuf[i];
	}
	newlen=j;
    return(outbuf);
}

899
900
#define MAX_ARGS 1000

deuce's avatar
deuce committed
901
902
903
904
905
906
907
908
909
910
911
#ifdef NEEDS_SETENV
static int setenv(const char *name, const char *value, int overwrite)
{
	char *envstr;
	char *oldenv;
	if(overwrite || getenv(name)==NULL) {
		envstr=(char *)malloc(strlen(name)+strlen(value)+2);
		if(envstr==NULL) {
			errno=ENOMEM;
			return(-1);
		}
deuce's avatar
deuce committed
912
913
		/* Note, on some platforms, this can be free()d... */
		sprintf(envstr,"%s=%s",name,value);
deuce's avatar
deuce committed
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
		putenv(envstr);
	}
	return(0);
}
#endif

#ifdef NEEDS_CFMAKERAW
void
cfmakeraw(struct termios *t)
{
	t->c_iflag &= ~(IMAXBEL|IGNBRK|BRKINT|PARMRK|ISTRIP|INLCR|IGNCR|ICRNL|IXON);
	t->c_oflag &= ~OPOST;
	t->c_lflag &= ~(ECHO|ECHONL|ICANON|ISIG|IEXTEN);
	t->c_cflag &= ~(CSIZE|PARENB);
	t->c_cflag |= CS8;
}
#endif

932
933
934
935
936
937
938
939
940
941
942
943
944
945
#ifdef NEEDS_FORKPTY
static int login_tty(int fd)
{
	(void) setsid();
	if (!isatty(fd))
		return (-1);
	(void) dup2(fd, 0);
	(void) dup2(fd, 1);
	(void) dup2(fd, 2);
	if (fd > 2)
		(void) close(fd);
	return (0);
}

946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
#ifdef NEEDS_DAEMON
/****************************************************************************/
/* Daemonizes the process                                                   */
/****************************************************************************/
int
daemon(int nochdir, int noclose)
{
    int fd;

    switch (fork()) {
    case -1:
        return (-1);
    case 0:
        break;
    default:
        _exit(0);
    }

    if (setsid() == -1)
        return (-1);

    if (!nochdir)
        (void)chdir("/");

    if (!noclose && (fd = open(_PATH_DEVNULL, O_RDWR, 0)) != -1) {
        (void)dup2(fd, STDIN_FILENO);
        (void)dup2(fd, STDOUT_FILENO);
        (void)dup2(fd, STDERR_FILENO);
        if (fd > 2)
            (void)close(fd);
    }
    return (0);
}
#endif

981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
static int openpty(int *amaster, int *aslave, char *name, struct termios *termp, winsize *winp)
{
	char line[] = "/dev/ptyXX";
	const char *cp1, *cp2;
	int master, slave, ttygid;
	struct group *gr;

	if ((gr = getgrnam("tty")) != NULL)
		ttygid = gr->gr_gid;
	else
		ttygid = -1;

	for (cp1 = "pqrsPQRS"; *cp1; cp1++) {
		line[8] = *cp1;
		for (cp2 = "0123456789abcdefghijklmnopqrstuv"; *cp2; cp2++) {
			line[5] = 'p';
			line[9] = *cp2;
			if ((master = open(line, O_RDWR, 0)) == -1) {
				if (errno == ENOENT)
					break; /* try the next pty group */
			} else {
				line[5] = 't';
				(void) chown(line, getuid(), ttygid);
				(void) chmod(line, S_IRUSR|S_IWUSR|S_IWGRP);
				/* Hrm... SunOS doesn't seem to have revoke
				(void) revoke(line); */
				if ((slave = open(line, O_RDWR, 0)) != -1) {
					*amaster = master;
					*aslave = slave;
					if (name)
						strcpy(name, line);
					if (termp)
						(void) tcsetattr(slave,
							TCSAFLUSH, termp);
					if (winp)
						(void) ioctl(slave, TIOCSWINSZ,
							(char *)winp);
					return (0);
				}
				(void) close(master);
			}
		}
	}
	errno = ENOENT;	/* out of ptys */
	return (-1);
}

static int forkpty(int *amaster, char *name, termios *termp, winsize *winp)
{
	int master, slave, pid;

	if (openpty(&master, &slave, name, termp, winp) == -1)
		return (-1);
1034
	switch (pid = FORK()) {
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
	case -1:
		return (-1);
	case 0:
		/*
		 * child
		 */
		(void) close(master);
		login_tty(slave);
		return (0);
	}
	/*
	 * parent
	 */
	*amaster = master;
	(void) close(slave);
	return (pid);
}
#endif /* NEED_FORKPTY */

1054
int sbbs_t::external(const char* cmdline, long mode, const char* startup_dir)
1055
{
1056
1057
	char	str[MAX_PATH+1];
	char	fname[MAX_PATH+1];
1058
	char	fullpath[MAX_PATH+1];
1059
	char	fullcmdline[MAX_PATH+1];
1060
	char*	argv[MAX_ARGS];
1061
1062
1063
	BYTE*	bp;
	BYTE	buf[XTRN_IO_BUF_LEN];
    BYTE 	output_buf[XTRN_IO_BUF_LEN*2];
1064
	ulong	avail;
1065
1066
    ulong	output_len;
	bool	native=false;			// DOS program by default
1067
	bool	rio_abortable_save=rio_abortable;
rswindell's avatar
rswindell committed
1068
	int		i;
1069
	bool	data_waiting;
1070
1071
	int		rd;
	int		wr;
1072
	int		argc;
1073
	pid_t	pid;
1074
1075
	int		in_pipe[2];
	int		out_pipe[2];
1076
	int		err_pipe[2];
1077
	fd_set ibits;
1078
	int	high_fd;
1079
	struct timeval timeout;
1080
1081
    BYTE 	wwiv_buf[XTRN_IO_BUF_LEN*2];
    bool	wwiv_flag=false;
1082
1083
1084
#if defined(__FreeBSD__) || (defined(__linux__) && defined(USE_DOSEMU))
 	char* p;
#endif
1085

1086
	xtrn_mode = mode;
rswindell's avatar
rswindell committed
1087
	lprintf(LOG_DEBUG, "Executing external: %s", cmdline);
1088

1089
1090
1091
1092
1093
	if(startup_dir!=NULL && startup_dir[0] && !isdir(startup_dir)) {
		errormsg(WHERE, ERR_CHK, startup_dir, 0);
		return -1;
	}

1094
1095
	if(startup_dir==NULL)
		startup_dir=nulstr;
1096

1097
1098
	XTRN_LOADABLE_MODULE(cmdline,startup_dir);
	XTRN_LOADABLE_JS_MODULE(cmdline,startup_dir);
1099

1100
	attr(cfg.color[clr_external]);  /* setup default attributes */
1101

1102
1103
	native = native_executable(&cfg, cmdline, mode);

1104
1105
1106
    SAFECOPY(str,cmdline);			/* Set fname to program name only */
	truncstr(str," ");
    SAFECOPY(fname,getfname(str));
1107

1108
1109
	sprintf(fullpath,"%s%s",startup_dir,fname);
	if(startup_dir!=NULL && cmdline[0]!='/' && cmdline[0]!='.' && fexist(fullpath))
1110
1111
1112
		sprintf(fullcmdline,"%s%s",startup_dir,cmdline);
	else
		SAFECOPY(fullcmdline,cmdline);
1113
1114
1115
1116

 	if(native) { // Native (32-bit) external

		// Current environment passed to child process
1117
1118
1119
1120
1121
1122
		sprintf(dszlog,"%sPROTOCOL.LOG",cfg.node_dir);
		setenv("DSZLOG",dszlog,1); 		/* Makes the DSZ LOG active */
		setenv("SBBSNODE",cfg.node_dir,1);
		setenv("SBBSCTRL",cfg.ctrl_dir,1);
		setenv("SBBSDATA",cfg.data_dir,1);
		setenv("SBBSEXEC",cfg.exec_dir,1);
1123
		sprintf(str,"%u",cfg.node_num);
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
		setenv("SBBSNNUM",str,1);

		/* date/time env vars */
		now = time(NULL);
		struct	tm tm;
		if(localtime_r(&now, &tm) == NULL)
			memset(&tm, 0, sizeof(tm));
		sprintf(str," %02u", tm.tm_mday);
		setenv("DAY", str, /* overwrite */TRUE);
		setenv("WEEKDAY", wday[tm.tm_wday], /* overwrite */TRUE);
		setenv("MONTHNAME", mon[tm.tm_mon], /* overwrite */TRUE);
		sprintf(str, "%02u", tm.tm_mon + 1);
		setenv("MONTH", str, /* overwrite */TRUE);
		sprintf(str,"%u", 1900 + tm.tm_year);
		if(setenv("YEAR", str, /* overwrite */TRUE) != 0)
			errormsg(WHERE,ERR_WRITE,"environment",0);
1140
1141

	} else {
1142
		if(startup->options&BBS_OPT_NO_DOS) {
1143
			lprintf((mode&EX_OFFLINE) ? LOG_ERR : LOG_WARNING, "DOS programs not supported: %s", cmdline);
1144
1145
1146
			bprintf("Sorry, DOS programs are not supported on this node.\r\n");
			return -1;
		}
1147
#if defined(__FreeBSD__)
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
		/* ToDo: This seems to work for every door except Iron Ox
		   ToDo: Iron Ox is unique in that it runs perfectly from
		   ToDo: tcsh but not at all from anywhere else, complaining
		   ToDo: about corrupt files.  I've ruled out the possibilty
		   ToDo: of it being a terminal mode issue... no other ideas
		   ToDo: come to mind. */

		FILE * doscmdrc;

		sprintf(str,"%s.doscmdrc",cfg.node_dir);
		if((doscmdrc=fopen(str,"w+"))==NULL)  {
			errormsg(WHERE,ERR_CREATE,str,0);
			return(-1);
		}
		if(startup_dir!=NULL && startup_dir[0])
			fprintf(doscmdrc,"assign C: %s\n",startup_dir);
		else
			fprintf(doscmdrc,"assign C: .\n");

		fprintf(doscmdrc,"assign D: %s\n",cfg.node_dir);
		SAFECOPY(str,cfg.exec_dir);
		if((p=strrchr(str,'/'))!=NULL)
			*p=0;
		if((p=strrchr(str,'/'))!=NULL)
			*p=0;
		fprintf(doscmdrc,"assign E: %s\n",str);
rswindell's avatar
rswindell committed
1174