freebsd-skq/contrib/nvi/ex/ex_init.c

431 lines
10 KiB
C

/*-
* Copyright (c) 1992, 1993, 1994
* The Regents of the University of California. All rights reserved.
* Copyright (c) 1992, 1993, 1994, 1995, 1996
* Keith Bostic. All rights reserved.
*
* See the LICENSE file for redistribution information.
*/
#include "config.h"
#ifndef lint
static const char sccsid[] = "$Id: ex_init.c,v 10.33 2012/04/11 19:12:34 zy Exp $";
#endif /* not lint */
#include <sys/types.h>
#include <sys/queue.h>
#include <sys/stat.h>
#include <bitstring.h>
#include <fcntl.h>
#include <limits.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include "../common/common.h"
#include "tag.h"
#include "pathnames.h"
enum rc { NOEXIST, NOPERM, RCOK };
static enum rc exrc_isok(SCR *, struct stat *, char *, int, int);
static int ex_run_file(SCR *, char *);
/*
* ex_screen_copy --
* Copy ex screen.
*
* PUBLIC: int ex_screen_copy(SCR *, SCR *);
*/
int
ex_screen_copy(SCR *orig, SCR *sp)
{
EX_PRIVATE *oexp, *nexp;
/* Create the private ex structure. */
CALLOC_RET(orig, nexp, EX_PRIVATE *, 1, sizeof(EX_PRIVATE));
sp->ex_private = nexp;
/* Initialize queues. */
TAILQ_INIT(nexp->tq);
TAILQ_INIT(nexp->tagfq);
SLIST_INIT(nexp->cscq);
if (orig == NULL) {
} else {
oexp = EXP(orig);
if (oexp->lastbcomm != NULL &&
(nexp->lastbcomm = v_wstrdup(sp, oexp->lastbcomm,
STRLEN(oexp->lastbcomm))) == NULL) {
msgq(sp, M_SYSERR, NULL);
return(1);
}
if (ex_tag_copy(orig, sp))
return (1);
}
return (0);
}
/*
* ex_screen_end --
* End a vi screen.
*
* PUBLIC: int ex_screen_end(SCR *);
*/
int
ex_screen_end(SCR *sp)
{
EX_PRIVATE *exp;
int rval;
if ((exp = EXP(sp)) == NULL)
return (0);
rval = 0;
/* Close down script connections. */
if (F_ISSET(sp, SC_SCRIPT) && sscr_end(sp))
rval = 1;
if (argv_free(sp))
rval = 1;
if (exp->ibp != NULL)
free(exp->ibp);
if (exp->lastbcomm != NULL)
free(exp->lastbcomm);
if (exp->ibcw.bp1.c != NULL)
free(exp->ibcw.bp1.c);
if (ex_tag_free(sp))
rval = 1;
if (cscope_end(sp))
rval = 1;
/* Free private memory. */
free(exp);
sp->ex_private = NULL;
return (rval);
}
/*
* ex_optchange --
* Handle change of options for ex.
*
* PUBLIC: int ex_optchange(SCR *, int, char *, u_long *);
*/
int
ex_optchange(SCR *sp, int offset, char *str, u_long *valp)
{
switch (offset) {
case O_TAGS:
return (ex_tagf_alloc(sp, str));
}
return (0);
}
/*
* ex_exrc --
* Read the EXINIT environment variable and the startup exrc files,
* and execute their commands.
*
* PUBLIC: int ex_exrc(SCR *);
*/
int
ex_exrc(SCR *sp)
{
struct stat hsb, lsb;
char *p, *path;
CHAR_T *wp;
size_t wlen;
/*
* Source the system, environment, $HOME and local .exrc values.
* Vi historically didn't check $HOME/.exrc if the environment
* variable EXINIT was set. This is all done before the file is
* read in, because things in the .exrc information can set, for
* example, the recovery directory.
*
* !!!
* While nvi can handle any of the options settings of historic vi,
* the converse is not true. Since users are going to have to have
* files and environmental variables that work with both, we use nvi
* versions of both the $HOME and local startup files if they exist,
* otherwise the historic ones.
*
* !!!
* For a discussion of permissions and when what .exrc files are
* read, see the comment above the exrc_isok() function below.
*
* !!!
* If the user started the historic of vi in $HOME, vi read the user's
* .exrc file twice, as $HOME/.exrc and as ./.exrc. We avoid this, as
* it's going to make some commands behave oddly, and I can't imagine
* anyone depending on it.
*/
switch (exrc_isok(sp, &hsb, _PATH_SYSEXRC, 1, 0)) {
case NOEXIST:
case NOPERM:
break;
case RCOK:
if (ex_run_file(sp, _PATH_SYSEXRC))
return (1);
break;
}
/* Run the commands. */
if (EXCMD_RUNNING(sp->gp))
(void)ex_cmd(sp);
if (F_ISSET(sp, SC_EXIT | SC_EXIT_FORCE))
return (0);
if ((p = getenv("NEXINIT")) != NULL) {
CHAR2INT(sp, p, strlen(p) + 1, wp, wlen);
if (ex_run_str(sp, "NEXINIT", wp, wlen - 1, 1, 0))
return (1);
} else if ((p = getenv("EXINIT")) != NULL) {
CHAR2INT(sp, p, strlen(p) + 1, wp, wlen);
if (ex_run_str(sp, "EXINIT", wp, wlen - 1, 1, 0))
return (1);
} else if ((p = getenv("HOME")) != NULL && *p) {
int st = 0;
if ((path = join(p, _PATH_NEXRC)) == NULL) {
msgq(sp, M_SYSERR, NULL);
return (1);
}
switch (exrc_isok(sp, &hsb, path, 0, 1)) {
case NOEXIST:
free(path);
if ((path = join(p, _PATH_EXRC)) == NULL) {
msgq(sp, M_SYSERR, NULL);
return (1);
}
if (exrc_isok(sp,
&hsb, path, 0, 1) == RCOK && ex_run_file(sp, path))
st = 1;
break;
case NOPERM:
break;
case RCOK:
if (ex_run_file(sp, path))
st = 1;
break;
}
free(path);
if (st)
return st;
}
/* Run the commands. */
if (EXCMD_RUNNING(sp->gp))
(void)ex_cmd(sp);
if (F_ISSET(sp, SC_EXIT | SC_EXIT_FORCE))
return (0);
/* Previous commands may have set the exrc option. */
if (O_ISSET(sp, O_EXRC)) {
switch (exrc_isok(sp, &lsb, _PATH_NEXRC, 0, 0)) {
case NOEXIST:
if (exrc_isok(sp, &lsb, _PATH_EXRC, 0, 0) == RCOK &&
(lsb.st_dev != hsb.st_dev ||
lsb.st_ino != hsb.st_ino) &&
ex_run_file(sp, _PATH_EXRC))
return (1);
break;
case NOPERM:
break;
case RCOK:
if ((lsb.st_dev != hsb.st_dev ||
lsb.st_ino != hsb.st_ino) &&
ex_run_file(sp, _PATH_NEXRC))
return (1);
break;
}
/* Run the commands. */
if (EXCMD_RUNNING(sp->gp))
(void)ex_cmd(sp);
if (F_ISSET(sp, SC_EXIT | SC_EXIT_FORCE))
return (0);
}
return (0);
}
/*
* ex_run_file --
* Set up a file of ex commands to run.
*/
static int
ex_run_file(SCR *sp, char *name)
{
EXCMD cmd;
CHAR_T *wp;
size_t wlen;
ex_cinit(sp, &cmd, C_SOURCE, 0, OOBLNO, OOBLNO, 0);
CHAR2INT(sp, name, strlen(name)+1, wp, wlen);
argv_exp0(sp, &cmd, wp, wlen - 1);
return (ex_source(sp, &cmd));
}
/*
* ex_run_str --
* Set up a string of ex commands to run.
*
* PUBLIC: int ex_run_str(SCR *, char *, CHAR_T *, size_t, int, int);
*/
int
ex_run_str(SCR *sp, char *name, CHAR_T *str, size_t len, int ex_flags, int nocopy)
{
GS *gp;
EXCMD *ecp;
gp = sp->gp;
if (EXCMD_RUNNING(gp)) {
CALLOC_RET(sp, ecp, EXCMD *, 1, sizeof(EXCMD));
SLIST_INSERT_HEAD(gp->ecq, ecp, q);
} else
ecp = &gp->excmd;
F_INIT(ecp,
ex_flags ? E_BLIGNORE | E_NOAUTO | E_NOPRDEF | E_VLITONLY : 0);
if (nocopy)
ecp->cp = str;
else
if ((ecp->cp = v_wstrdup(sp, str, len)) == NULL)
return (1);
ecp->clen = len;
if (name == NULL)
ecp->if_name = NULL;
else {
if ((ecp->if_name = v_strdup(sp, name, strlen(name))) == NULL)
return (1);
ecp->if_lno = 1;
F_SET(ecp, E_NAMEDISCARD);
}
return (0);
}
/*
* exrc_isok --
* Check a .exrc file for source-ability.
*
* !!!
* Historically, vi read the $HOME and local .exrc files if they were owned
* by the user's real ID, or the "sourceany" option was set, regardless of
* any other considerations. We no longer support the sourceany option as
* it's a security problem of mammoth proportions. We require the system
* .exrc file to be owned by root, the $HOME .exrc file to be owned by the
* user's effective ID (or that the user's effective ID be root) and the
* local .exrc files to be owned by the user's effective ID. In all cases,
* the file cannot be writeable by anyone other than its owner.
*
* In O'Reilly ("Learning the VI Editor", Fifth Ed., May 1992, page 106),
* it notes that System V release 3.2 and later has an option "[no]exrc".
* The behavior is that local .exrc files are read only if the exrc option
* is set. The default for the exrc option was off, so, by default, local
* .exrc files were not read. The problem this was intended to solve was
* that System V permitted users to give away files, so there's no possible
* ownership or writeability test to ensure that the file is safe.
*
* POSIX 1003.2-1992 standardized exrc as an option. It required the exrc
* option to be off by default, thus local .exrc files are not to be read
* by default. The Rationale noted (incorrectly) that this was a change
* to historic practice, but correctly noted that a default of off improves
* system security. POSIX also required that vi check the effective user
* ID instead of the real user ID, which is why we've switched from historic
* practice.
*
* We initialize the exrc variable to off. If it's turned on by the system
* or $HOME .exrc files, and the local .exrc file passes the ownership and
* writeability tests, then we read it. This breaks historic 4BSD practice,
* but it gives us a measure of security on systems where users can give away
* files.
*/
static enum rc
exrc_isok(SCR *sp, struct stat *sbp, char *path, int rootown, int rootid)
{
enum { ROOTOWN, OWN, WRITER } etype;
uid_t euid;
int nf1, nf2;
char *a, *b, *buf;
/* Check for the file's existence. */
if (stat(path, sbp))
return (NOEXIST);
/* Check ownership permissions. */
euid = geteuid();
if (!(rootown && sbp->st_uid == 0) &&
!(rootid && euid == 0) && sbp->st_uid != euid) {
etype = rootown ? ROOTOWN : OWN;
goto denied;
}
/* Check writeability. */
if (sbp->st_mode & (S_IWGRP | S_IWOTH)) {
etype = WRITER;
goto denied;
}
return (RCOK);
denied: a = msg_print(sp, path, &nf1);
if (strchr(path, '/') == NULL && (buf = getcwd(NULL, 0)) != NULL) {
char *p;
b = msg_print(sp, buf, &nf2);
if ((p = join(b, a)) == NULL) {
msgq(sp, M_SYSERR, NULL);
goto err;
}
switch (etype) {
case ROOTOWN:
msgq(sp, M_ERR,
"128|%s: not sourced: not owned by you or root", p);
break;
case OWN:
msgq(sp, M_ERR,
"129|%s: not sourced: not owned by you", p);
break;
case WRITER:
msgq(sp, M_ERR,
"130|%s: not sourced: writeable by a user other than the owner", p);
break;
}
free(p);
err: free(buf);
if (nf2)
FREE_SPACE(sp, b, 0);
} else
switch (etype) {
case ROOTOWN:
msgq(sp, M_ERR,
"128|%s: not sourced: not owned by you or root", a);
break;
case OWN:
msgq(sp, M_ERR,
"129|%s: not sourced: not owned by you", a);
break;
case WRITER:
msgq(sp, M_ERR,
"130|%s: not sourced: writeable by a user other than the owner", a);
break;
}
if (nf1)
FREE_SPACE(sp, a, 0);
return (NOPERM);
}