[BACK]Return to atrun.c CVS log [TXT][DIR] Up to [cvs.NetBSD.org] / src / libexec / atrun

File: [cvs.NetBSD.org] / src / libexec / atrun / atrun.c (download)

Revision 1.19, Sat Apr 5 20:17:37 2008 UTC (12 years, 5 months ago) by christos
Branch: MAIN
CVS Tags: yamt-pf42-baseX, yamt-pf42-base4, yamt-pf42-base3, yamt-pf42-base2, yamt-pf42-base, yamt-pf42, wrstuden-revivesa-base-3, wrstuden-revivesa-base-2, wrstuden-revivesa-base-1, wrstuden-revivesa-base, wrstuden-revivesa, netbsd-5-base, netbsd-5-2-RELEASE, netbsd-5-2-RC1, netbsd-5-2-3-RELEASE, netbsd-5-2-2-RELEASE, netbsd-5-2-1-RELEASE, netbsd-5-2, netbsd-5-1-RELEASE, netbsd-5-1-RC4, netbsd-5-1-RC3, netbsd-5-1-RC2, netbsd-5-1-RC1, netbsd-5-1-5-RELEASE, netbsd-5-1-4-RELEASE, netbsd-5-1-3-RELEASE, netbsd-5-1-2-RELEASE, netbsd-5-1-1-RELEASE, netbsd-5-1, netbsd-5-0-RELEASE, netbsd-5-0-RC4, netbsd-5-0-RC3, netbsd-5-0-RC2, netbsd-5-0-RC1, netbsd-5-0-2-RELEASE, netbsd-5-0-1-RELEASE, netbsd-5-0, netbsd-5, matt-premerge-20091211, matt-nb5-pq3-base, matt-nb5-pq3, matt-nb5-mips64-u2-k2-k4-k7-k8-k9, matt-nb5-mips64-u1-k1-k5, matt-nb5-mips64-premerge-20101231, matt-nb5-mips64-premerge-20091211, matt-nb5-mips64-k15, matt-nb5-mips64, matt-nb4-mips64-k7-u2a-k9b, matt-mips64-premerge-20101231, matt-mips64-base2, jym-xensuspend-nbase, jym-xensuspend-base, jym-xensuspend, hpcarm-cleanup-nbase, cherry-xenmp-base, cherry-xenmp, bouyer-quota2-nbase, bouyer-quota2-base, bouyer-quota2
Changes since 1.18: +22 -22 lines

Fix build from dieter roelants

/*	$NetBSD: atrun.c,v 1.19 2008/04/05 20:17:37 christos Exp $	*/

/*
 *  atrun.c - run jobs queued by at; run with root privileges.
 *  Copyright (C) 1993, 1994 Thomas Koenig
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the above copyright
 *    notice, this list of conditions and the following disclaimer.
 * 2. The name of the author(s) may not be used to endorse or promote
 *    products derived from this software without specific prior written
 *    permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 * THEORY OF LIABILITY, WETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 */

/* System Headers */
#include <sys/cdefs.h>
#include <sys/types.h>
#include <sys/wait.h>

#include <ctype.h>
#include <errno.h>
#include <dirent.h>
#include <fcntl.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <limits.h>
#include <time.h>
#include <unistd.h>
#include <syslog.h>
#include <pwd.h>
#include <grp.h>
#include <err.h>
#include <paths.h>
#include <stdarg.h>

/* Local headers */

#define MAIN
#include "privs.h"
#include "pathnames.h"
#include "atrun.h"

/* File scope variables */

#if 0
static char rcsid[] = "$OpenBSD: atrun.c,v 1.7 1997/09/08 22:12:10 millert Exp $";
#else
__RCSID("$NetBSD: atrun.c,v 1.19 2008/04/05 20:17:37 christos Exp $");
#endif

static int debug = 0;

/* Local functions */
static void perr(const char *, ...) __dead;
static void perrx(const char *, ...) __dead;
static int write_string(int, const char *);
static void run_file(const char *, uid_t, gid_t);
static void become_user(struct passwd *, uid_t);

static const char nobody[] = "nobody";

static void
perr(const char *fmt, ...)
{
	char buf[2048];
	va_list ap;

	va_start(ap, fmt);
	(void)vsnprintf(buf, sizeof(buf), fmt, ap);
	va_end(ap);

	if (debug)
		warn("%s", buf);
	else
		syslog(LOG_ERR, "%s: %m", buf);

	exit(EXIT_FAILURE);
}

static void
perrx(const char *fmt, ...)
{
	va_list ap;

	va_start(ap, fmt);

	if (debug)
		vwarnx(fmt, ap);
	else
		vsyslog(LOG_ERR, fmt, ap);

	va_end(ap);

	exit(EXIT_FAILURE);
}

static int
write_string(int fd, const char *a)
{
	return write(fd, a, strlen(a));
}

static void
become_user(struct passwd *pentry, uid_t uid)
{
	if (initgroups(pentry->pw_name, pentry->pw_gid) == -1)
		perr("Cannot init group list for `%s'", pentry->pw_name);

	if (setegid(pentry->pw_gid) == -1 || setgid(pentry->pw_gid) == -1)
		perr("Cannot change primary group to %lu",
		    (unsigned long)pentry->pw_gid);

	if (setsid() == -1)
		perr("Cannot create a session");

	if (setlogin(pentry->pw_name) == -1)
		perr("Cannot set login name to `%s'", pentry->pw_name);

	if (setuid(uid) == -1 || seteuid(uid) == -1)
		perr("Cannot set user id to %lu", (unsigned long)uid);

	if (chdir(pentry->pw_dir) == -1)
		(void)chdir("/");
}

static void
run_file(const char *filename, uid_t uid, gid_t gid)
{
	/*
	 * Run a file by by spawning off a process which redirects I/O,
	 * spawns a subshell, then waits for it to complete and spawns another
	 * process to send mail to the user.
	 */
	pid_t pid;
	int fd_out, fd_in;
	int queue;
	char mailbuf[LOGIN_NAME_MAX], fmt[49];
	char *mailname = NULL;
	FILE *stream;
	int send_mail = 0;
	struct stat buf, lbuf;
	off_t size;
	struct passwd *pentry;
	int fflags;
	uid_t nuid;
	gid_t ngid;
	int serrno;

	PRIV_START;

	if (chmod(filename, S_IRUSR) == -1)
		perr("Cannot change file permissions to `%s'", filename);

	PRIV_END;

	pid = fork();
	if (pid == -1)
		perr("Cannot fork");
	else if (pid != 0)
		return;

	/*
	 * Let's see who we mail to.  Hopefully, we can read it from the
	 * command file; if not, send it to the owner, or, failing that, to
	 * root.
	 */

	pentry = getpwuid(uid);
	if (pentry == NULL)
		perrx("Userid %lu not found - aborting job `%s'",
		    (unsigned long)uid, filename);

	PRIV_START;

	stream = fopen(filename, "r");
	serrno = errno;

	PRIV_END;

	if (stream == NULL) {
		errno = serrno;
		perr("Cannot open input file");
	}

	if (pentry->pw_expire && time(NULL) >= pentry->pw_expire)
		perrx("Userid %lu has expired - aborting job `%s'",
		    (unsigned long)uid, filename);

	if ((fd_in = dup(fileno(stream))) == -1)
		perr("Error duplicating input file descriptor");

	if (fstat(fd_in, &buf) == -1)
		perr("Error in fstat of input file descriptor");

	PRIV_START;

	if (lstat(filename, &lbuf) == -1)
		perr("Error in lstat of `%s'", filename);

	PRIV_END;

	if (S_ISLNK(lbuf.st_mode))
		perrx("Symbolic link encountered in job `%s' - aborting",
		    filename);

	if ((lbuf.st_dev != buf.st_dev) || (lbuf.st_ino != buf.st_ino) ||
	    (lbuf.st_uid != buf.st_uid) || (lbuf.st_gid != buf.st_gid) ||
	    (lbuf.st_size!=buf.st_size))
		perrx("Somebody changed files from under us for job `%s' "
		    "- aborting", filename);

	if (buf.st_nlink > 1)
		perrx("Somebody is trying to run a linked script for job `%s'",
		    filename);

	if ((fflags = fcntl(fd_in, F_GETFD)) < 0)
		perr("Error in fcntl");

	(void)fcntl(fd_in, F_SETFD, fflags & ~FD_CLOEXEC);

	(void)snprintf(fmt, sizeof(fmt),
	    "#!/bin/sh\n# atrun uid=%%u gid=%%u\n# mail %%%ds %%d",
	    LOGIN_NAME_MAX);

	if (fscanf(stream, fmt, &nuid, &ngid, mailbuf, &send_mail) != 4)
		perrx("File `%s' is in wrong format - aborting", filename);

	if (mailbuf[0] == '-')
		perrx("Illegal mail name `%s' in `%s'", mailbuf, filename);

	mailname = mailbuf;
	if (nuid != uid)
		perrx("Job `%s' - userid %lu does not match file uid %lu",
		    filename, (unsigned long)nuid, (unsigned long)uid);

	if (ngid != gid)
		perrx("Job `%s' - groupid %lu does not match file gid %lu",
		    filename, (unsigned long)ngid, (unsigned long)gid);

	(void)fclose(stream);

	PRIV_START;

	if (chdir(_PATH_ATSPOOL) == -1)
		perr("Cannot chdir to `%s'", _PATH_ATSPOOL);

	/*
	 * Create a file to hold the output of the job we are  about to
	 * run. Write the mail header.
	 */

	if ((fd_out = open(filename,
		    O_WRONLY | O_CREAT | O_EXCL, S_IWUSR | S_IRUSR)) == -1)
		perr("Cannot create output file `%s'", filename);

	PRIV_END;

	write_string(fd_out, "To: ");
	write_string(fd_out, mailname);
	write_string(fd_out, "\nSubject: Output from your job ");
	write_string(fd_out, filename);
	write_string(fd_out, "\n\n");
	if (fstat(fd_out, &buf) == -1)
		perr("Error in fstat of output file descriptor");
	size = buf.st_size;

	(void)close(STDIN_FILENO);
	(void)close(STDOUT_FILENO);
	(void)close(STDERR_FILENO);

	pid = fork();
	if (pid < 0)
		perr("Error in fork");
	else if (pid == 0) {
		char *nul = NULL;
		char **nenvp = &nul;

		/*
		 * Set up things for the child; we want standard input from
		 * the input file, and standard output and error sent to
		 * our output file.
		 */
		if (lseek(fd_in, (off_t) 0, SEEK_SET) == (off_t)-1)
			perr("Error in lseek");

		if (dup(fd_in) != STDIN_FILENO)
			perr("Error in I/O redirection");

		if (dup(fd_out) != STDOUT_FILENO)
			perr("Error in I/O redirection");

		if (dup(fd_out) != STDERR_FILENO)
			perr("Error in I/O redirection");

		(void)close(fd_in);
		(void)close(fd_out);

		PRIV_START;

		if (chdir(_PATH_ATJOBS) == -1)
			perr("Cannot chdir to `%s'", _PATH_ATJOBS);

		queue = *filename;

		if (queue > 'b')
		    nice(queue - 'b');

		become_user(pentry, uid);

		(void)execle("/bin/sh", "sh", (char *)NULL, nenvp);
		perr("Exec failed for /bin/sh");
	}
	/* We're the parent.  Let's wait. */
	(void)close(fd_in);
	(void)close(fd_out);
	(void)waitpid(pid, (int *)NULL, 0);

	/*
	 * Send mail.  Unlink the output file first, so it is deleted
	 * after the run.
	 */
	PRIV_START;

	if (stat(filename, &buf) == -1)
		perr("Error in stat of output file `%s'", filename);
	if (open(filename, O_RDONLY) != STDIN_FILENO)
		perr("Open of jobfile `%s' failed", filename);

	(void)unlink(filename);

	PRIV_END;

	if ((buf.st_size != size) || send_mail) {
		/* Fork off a child for sending mail */

		PRIV_START;

		become_user(pentry, uid);

		execl(_PATH_SENDMAIL, "sendmail", "-F", "Atrun Service",
		    "-odi", "-oem", "-t", (char *) NULL);
		perr("Exec failed for mail command `%s'", _PATH_SENDMAIL);

		PRIV_END;
	}
	exit(EXIT_SUCCESS);
}

/* Global functions */

int
main(int argc, char *argv[])
{
	/*
	 * Browse through  _PATH_ATJOBS, checking all the jobfiles wether
	 * they should be executed and or deleted. The queue is coded into
	 * the first byte of the job filename, the date (in minutes since
	 * Eon) as a hex number in the following eight bytes, followed by
	 * a dot and a serial number.  A file which has not been executed
	 * yet is denoted by its execute - bit set.  For those files which
	 * are to be executed, run_file() is called, which forks off a
	 * child which takes care of I/O redirection, forks off another
	 * child for execution and yet another one, optionally, for sending
	 * mail.  Files which already have run are removed during the
	 * next invocation.
	 */
	DIR *spool;
	struct dirent *dirent;
	struct stat buf;
	unsigned long ctm;
	int jobno;
	char queue;
	time_t now, run_time;
	char batch_name[] = "Z2345678901234";
	uid_t batch_uid;
	gid_t batch_gid;
	int c;
	int run_batch;
	double la, load_avg = ATRUN_MAXLOAD;
	struct group *grp;
	struct passwd *pwd;

	openlog("atrun", LOG_PID, LOG_CRON);

	if ((grp = getgrnam(nobody)) == NULL)
		perrx("Cannot get gid for `%s'", nobody);

	if ((pwd = getpwnam(nobody)) == NULL)
		perrx("Cannot get uid for `%s'", nobody);

	/*
	 * We don't need root privileges all the time; running under uid
	 * and gid nobody is fine except for privileged operations.
	 */
	RELINQUISH_PRIVS_ROOT(pwd->pw_uid, grp->gr_gid);

	opterr = 0;
	errno = 0;
	while ((c = getopt(argc, argv, "dl:")) != -1) {
		switch (c) {
		case 'l':
			if (sscanf(optarg, "%lf", &load_avg) != 1)
				perrx("Bad argument to option -l: ", optarg);
			if (load_avg <= 0)
				load_avg = ATRUN_MAXLOAD;
			break;

		case 'd':
			debug++;
			break;

		case '?':
			perrx("Usage: %s [-l <loadav>] [-d]", getprogname());
			/*NOTREACHED*/

		default:
			perrx("Invalid option: %c", c);
			/*NOTREACHED*/
		}
	}

	PRIV_START;

	if (chdir(_PATH_ATJOBS) == -1)
		perr("Cannot change directory to `%s'", _PATH_ATJOBS);

	/*
	 * Main loop. Open spool directory for reading and look over all
	 * the files in there. If the filename indicates that the job
	 * should be run and the x bit is set, fork off a child which sets
	 * its user and group id to that of the files and exec a /bin/sh
	 * which executes the shell script. Unlink older files if they
	 * should no longer be run.  For deletion, their r bit has to be
	 * turned on.
	 *
	 * Also, pick the oldest batch job to run, at most one per
	 * invocation of atrun.
	 */
	if ((spool = opendir(".")) == NULL)
		perr("Cannot open `%s'", _PATH_ATJOBS);

	PRIV_END;

	now = time(NULL);
	run_batch = 0;
	batch_uid = (uid_t) -1;
	batch_gid = (gid_t) -1;

	while ((dirent = readdir(spool)) != NULL) {
		PRIV_START;

		if (stat(dirent->d_name, &buf) == -1)
			perr("Cannot stat `%s' in `%s'", dirent->d_name,
			    _PATH_ATJOBS);

		PRIV_END;

		/* We don't want directories */
		if (!S_ISREG(buf.st_mode))
			continue;

		if (sscanf(dirent->d_name, "%c%5x%8lx", &queue, &jobno,
		    &ctm) != 3)
			continue;

		run_time = (time_t) ctm * 60;

		if ((S_IXUSR & buf.st_mode) && (run_time <= now)) {
			if (isupper((unsigned char)queue) &&
			    (strcmp(batch_name, dirent->d_name) > 0)) {
				run_batch = 1;
				(void)strlcpy(batch_name, dirent->d_name,
				    sizeof(batch_name));
				batch_uid = buf.st_uid;
				batch_gid = buf.st_gid;
			}

			/* The file is executable and old enough */
			if (islower((unsigned char)queue))
				run_file(dirent->d_name, buf.st_uid,
				    buf.st_gid);
		}

		/* Delete older files */
		if ((run_time < now) && !(S_IXUSR & buf.st_mode) &&
		    (S_IRUSR & buf.st_mode)) {
			PRIV_START;

			(void)unlink(dirent->d_name);

			PRIV_END;
		}
	}

	/* Run the single batch file, if any */
	if (run_batch && ((getloadavg(&la, 1) == 1) && la < load_avg))
		run_file(batch_name, batch_uid, batch_gid);

	closelog();
	return EXIT_SUCCESS;
}