r2331: check password script code and example from trunk
[Samba.git] / source / lib / smbrun.c
blob43cb209174e29f9ff2ae0141bd28a8e7c5580e50
1 /*
2 Unix SMB/CIFS implementation.
3 run a command as a specified user
4 Copyright (C) Andrew Tridgell 1992-1998
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
21 #include "includes.h"
23 /* need to move this from here!! need some sleep ... */
24 struct current_user current_user;
26 /****************************************************************************
27 This is a utility function of smbrun().
28 ****************************************************************************/
30 static int setup_out_fd(void)
32 int fd;
33 pstring path;
35 slprintf(path, sizeof(path)-1, "%s/smb.XXXXXX", tmpdir());
37 /* now create the file */
38 fd = smb_mkstemp(path);
40 if (fd == -1) {
41 DEBUG(0,("setup_out_fd: Failed to create file %s. (%s)\n",
42 path, strerror(errno) ));
43 return -1;
46 DEBUG(10,("setup_out_fd: Created tmp file %s\n", path ));
48 /* Ensure file only kept around by open fd. */
49 unlink(path);
50 return fd;
53 /****************************************************************************
54 run a command being careful about uid/gid handling and putting the output in
55 outfd (or discard it if outfd is NULL).
56 ****************************************************************************/
58 int smbrun(char *cmd, int *outfd)
60 pid_t pid;
61 uid_t uid = current_user.uid;
62 gid_t gid = current_user.gid;
65 * Lose any kernel oplock capabilities we may have.
67 oplock_set_capability(False, False);
69 /* point our stdout at the file we want output to go into */
71 if (outfd && ((*outfd = setup_out_fd()) == -1)) {
72 return -1;
75 /* in this method we will exec /bin/sh with the correct
76 arguments, after first setting stdout to point at the file */
79 * We need to temporarily stop CatchChild from eating
80 * SIGCLD signals as it also eats the exit status code. JRA.
83 CatchChildLeaveStatus();
85 if ((pid=sys_fork()) < 0) {
86 DEBUG(0,("smbrun: fork failed with error %s\n", strerror(errno) ));
87 CatchChild();
88 if (outfd) {
89 close(*outfd);
90 *outfd = -1;
92 return errno;
95 if (pid) {
97 * Parent.
99 int status=0;
100 pid_t wpid;
103 /* the parent just waits for the child to exit */
104 while((wpid = sys_waitpid(pid,&status,0)) < 0) {
105 if(errno == EINTR) {
106 errno = 0;
107 continue;
109 break;
112 CatchChild();
114 if (wpid != pid) {
115 DEBUG(2,("waitpid(%d) : %s\n",(int)pid,strerror(errno)));
116 if (outfd) {
117 close(*outfd);
118 *outfd = -1;
120 return -1;
123 /* Reset the seek pointer. */
124 if (outfd) {
125 sys_lseek(*outfd, 0, SEEK_SET);
128 #if defined(WIFEXITED) && defined(WEXITSTATUS)
129 if (WIFEXITED(status)) {
130 return WEXITSTATUS(status);
132 #endif
134 return status;
137 CatchChild();
139 /* we are in the child. we exec /bin/sh to do the work for us. we
140 don't directly exec the command we want because it may be a
141 pipeline or anything else the config file specifies */
143 /* point our stdout at the file we want output to go into */
144 if (outfd) {
145 close(1);
146 if (sys_dup2(*outfd,1) != 1) {
147 DEBUG(2,("Failed to create stdout file descriptor\n"));
148 close(*outfd);
149 exit(80);
153 /* now completely lose our privileges. This is a fairly paranoid
154 way of doing it, but it does work on all systems that I know of */
156 become_user_permanently(uid, gid);
158 if (getuid() != uid || geteuid() != uid ||
159 getgid() != gid || getegid() != gid) {
160 /* we failed to lose our privileges - do not execute
161 the command */
162 exit(81); /* we can't print stuff at this stage,
163 instead use exit codes for debugging */
166 #ifndef __INSURE__
167 /* close all other file descriptors, leaving only 0, 1 and 2. 0 and
168 2 point to /dev/null from the startup code */
170 int fd;
171 for (fd=3;fd<256;fd++) close(fd);
173 #endif
175 execl("/bin/sh","sh","-c",cmd,NULL);
177 /* not reached */
178 exit(82);
179 return 1;
183 /****************************************************************************
184 run a command being careful about uid/gid handling and putting the output in
185 outfd (or discard it if outfd is NULL).
186 sends the provided secret to the child stdin.
187 ****************************************************************************/
189 int smbrunsecret(char *cmd, char *secret)
191 pid_t pid;
192 uid_t uid = current_user.uid;
193 gid_t gid = current_user.gid;
194 int ifd[2];
197 * Lose any kernel oplock capabilities we may have.
199 oplock_set_capability(False, False);
201 /* build up an input pipe */
202 if(pipe(ifd)) {
203 return -1;
206 /* in this method we will exec /bin/sh with the correct
207 arguments, after first setting stdout to point at the file */
210 * We need to temporarily stop CatchChild from eating
211 * SIGCLD signals as it also eats the exit status code. JRA.
214 CatchChildLeaveStatus();
216 if ((pid=sys_fork()) < 0) {
217 DEBUG(0, ("smbrunsecret: fork failed with error %s\n", strerror(errno)));
218 CatchChild();
219 return errno;
222 if (pid) {
224 * Parent.
226 int status = 0;
227 pid_t wpid;
229 close(ifd[0]);
230 /* send the secret */
231 write(ifd[1], secret, strlen(secret));
232 fsync(ifd[1]);
233 close(ifd[1]);
235 /* the parent just waits for the child to exit */
236 while((wpid = sys_waitpid(pid, &status, 0)) < 0) {
237 if(errno == EINTR) {
238 errno = 0;
239 continue;
241 break;
244 CatchChild();
246 if (wpid != pid) {
247 DEBUG(2, ("waitpid(%d) : %s\n", (int)pid, strerror(errno)));
248 return -1;
251 #if defined(WIFEXITED) && defined(WEXITSTATUS)
252 if (WIFEXITED(status)) {
253 return WEXITSTATUS(status);
255 #endif
257 return status;
260 CatchChild();
262 /* we are in the child. we exec /bin/sh to do the work for us. we
263 don't directly exec the command we want because it may be a
264 pipeline or anything else the config file specifies */
266 close(ifd[1]);
267 close(0);
268 if (sys_dup2(ifd[0], 0) != 0) {
269 DEBUG(2,("Failed to create stdin file descriptor\n"));
270 close(ifd[0]);
271 exit(80);
274 /* now completely lose our privileges. This is a fairly paranoid
275 way of doing it, but it does work on all systems that I know of */
277 become_user_permanently(uid, gid);
279 if (getuid() != uid || geteuid() != uid ||
280 getgid() != gid || getegid() != gid) {
281 /* we failed to lose our privileges - do not execute
282 the command */
283 exit(81); /* we can't print stuff at this stage,
284 instead use exit codes for debugging */
287 #ifndef __INSURE__
288 /* close all other file descriptors, leaving only 0, 1 and 2. 0 and
289 2 point to /dev/null from the startup code */
291 int fd;
292 for (fd = 3; fd < 256; fd++) close(fd);
294 #endif
296 execl("/bin/sh", "sh", "-c", cmd, NULL);
298 /* not reached */
299 exit(82);
300 return 1;