do_command.c revision 1.60
1/*	$OpenBSD: do_command.c,v 1.60 2019/06/28 13:32:47 deraadt Exp $	*/
2
3/* Copyright 1988,1990,1993,1994 by Paul Vixie
4 * Copyright (c) 2004 by Internet Systems Consortium, Inc. ("ISC")
5 * Copyright (c) 1997,2000 by Internet Software Consortium, Inc.
6 * Copyright (c) 2018 Job Snijders <job@openbsd.org>
7 *
8 * Permission to use, copy, modify, and distribute this software for any
9 * purpose with or without fee is hereby granted, provided that the above
10 * copyright notice and this permission notice appear in all copies.
11 *
12 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES
13 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
14 * MERCHANTABILITY AND FITNESS.  IN NO EVENT SHALL ISC BE LIABLE FOR
15 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
16 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
18 * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19 */
20
21#include <sys/types.h>
22#include <sys/wait.h>
23
24#include <bitstring.h>		/* for structs.h */
25#include <bsd_auth.h>
26#include <ctype.h>
27#include <err.h>
28#include <errno.h>
29#include <fcntl.h>
30#include <limits.h>
31#include <login_cap.h>
32#include <pwd.h>
33#include <signal.h>
34#include <stdio.h>
35#include <stdlib.h>
36#include <string.h>
37#include <syslog.h>
38#include <time.h>		/* for structs.h */
39#include <unistd.h>
40#include <vis.h>
41
42#include "config.h"
43#include "pathnames.h"
44#include "macros.h"
45#include "structs.h"
46#include "funcs.h"
47
48static void		child_process(entry *, user *);
49
50void
51do_command(entry *e, user *u)
52{
53
54	/* fork to become asynchronous -- parent process is done immediately,
55	 * and continues to run the normal cron code, which means return to
56	 * tick().  the child and grandchild don't leave this function, alive.
57	 *
58	 * vfork() is unsuitable, since we have much to do, and the parent
59	 * needs to be able to run off and fork other processes.
60	 */
61	switch (fork()) {
62	case -1:
63		syslog(LOG_ERR, "(CRON) CAN'T FORK (%m)");
64		break;
65	case 0:
66		/* child process */
67		child_process(e, u);
68		_exit(EXIT_SUCCESS);
69		break;
70	default:
71		/* parent process */
72		break;
73	}
74}
75
76static void
77child_process(entry *e, user *u)
78{
79	FILE *in;
80	int stdin_pipe[2], stdout_pipe[2];
81	char **p, *input_data, *usernm;
82	auth_session_t *as;
83	login_cap_t *lc;
84	extern char **environ;
85
86	/* mark ourselves as different to PS command watchers */
87	setproctitle("running job");
88
89	/* close sockets from parent (i.e. cronSock) */
90	closefrom(3);
91
92	/* discover some useful and important environment settings
93	 */
94	usernm = e->pwd->pw_name;
95
96	/* our parent is watching for our death by catching SIGCHLD.  we
97	 * do not care to watch for our children's deaths this way -- we
98	 * use wait() explicitly.  so we have to reset the signal (which
99	 * was inherited from the parent).
100	 */
101	(void) signal(SIGCHLD, SIG_DFL);
102
103	/* create some pipes to talk to our future child
104	 */
105	if (pipe(stdin_pipe) != 0 || pipe(stdout_pipe) != 0) {
106		syslog(LOG_ERR, "(CRON) PIPE (%m)");
107		_exit(EXIT_FAILURE);
108	}
109
110	/* since we are a forked process, we can diddle the command string
111	 * we were passed -- nobody else is going to use it again, right?
112	 *
113	 * if a % is present in the command, previous characters are the
114	 * command, and subsequent characters are the additional input to
115	 * the command.  An escaped % will have the escape character stripped
116	 * from it.  Subsequent %'s will be transformed into newlines,
117	 * but that happens later.
118	 */
119	/*local*/{
120		int escaped = FALSE;
121		int ch;
122		char *p;
123
124		for (input_data = p = e->cmd;
125		     (ch = *input_data) != '\0';
126		     input_data++, p++) {
127			if (p != input_data)
128				*p = ch;
129			if (escaped) {
130				if (ch == '%')
131					*--p = ch;
132				escaped = FALSE;
133				continue;
134			}
135			if (ch == '\\') {
136				escaped = TRUE;
137				continue;
138			}
139			if (ch == '%') {
140				*input_data++ = '\0';
141				break;
142			}
143		}
144		*p = '\0';
145	}
146
147	/* fork again, this time so we can exec the user's command.
148	 */
149
150	pid_t	jobpid;
151	switch (jobpid = fork()) {
152	case -1:
153		syslog(LOG_ERR, "(CRON) CAN'T FORK (%m)");
154		_exit(EXIT_FAILURE);
155		/*NOTREACHED*/
156	case 0:
157		/* write a log message.  we've waited this long to do it
158		 * because it was not until now that we knew the PID that
159		 * the actual user command shell was going to get and the
160		 * PID is part of the log message.
161		 */
162		if ((e->flags & DONT_LOG) == 0) {
163			char *x;
164			if (stravis(&x, e->cmd, 0) != -1) {
165				syslog(LOG_INFO, "(%s) CMD (%s)", usernm, x);
166				free(x);
167			}
168		}
169
170		/* get new pgrp, void tty, etc.
171		 */
172		(void) setsid();
173
174		/* close the pipe ends that we won't use.  this doesn't affect
175		 * the parent, who has to read and write them; it keeps the
176		 * kernel from recording us as a potential client TWICE --
177		 * which would keep it from sending SIGPIPE in otherwise
178		 * appropriate circumstances.
179		 */
180		close(stdin_pipe[WRITE_PIPE]);
181		close(stdout_pipe[READ_PIPE]);
182
183		/* grandchild process.  make std{in,out} be the ends of
184		 * pipes opened by our daddy; make stderr go to stdout.
185		 */
186		if (stdin_pipe[READ_PIPE] != STDIN_FILENO) {
187			dup2(stdin_pipe[READ_PIPE], STDIN_FILENO);
188			close(stdin_pipe[READ_PIPE]);
189		}
190		if (stdout_pipe[WRITE_PIPE] != STDOUT_FILENO) {
191			dup2(stdout_pipe[WRITE_PIPE], STDOUT_FILENO);
192			close(stdout_pipe[WRITE_PIPE]);
193		}
194		dup2(STDOUT_FILENO, STDERR_FILENO);
195
196		/*
197		 * From this point on, anything written to stderr will be
198		 * mailed to the user as output.
199		 */
200
201		/* XXX - should just pass in a login_cap_t * */
202		if ((lc = login_getclass(e->pwd->pw_class)) == NULL) {
203			warnx("unable to get login class for %s",
204			    e->pwd->pw_name);
205			syslog(LOG_ERR, "(CRON) CAN'T GET LOGIN CLASS (%s)",
206			    e->pwd->pw_name);
207			_exit(EXIT_FAILURE);
208		}
209		if (setusercontext(lc, e->pwd, e->pwd->pw_uid, LOGIN_SETALL) == -1) {
210			warn("setusercontext failed for %s", e->pwd->pw_name);
211			syslog(LOG_ERR, "(%s) SETUSERCONTEXT FAILED (%m)",
212			    e->pwd->pw_name);
213			_exit(EXIT_FAILURE);
214		}
215		as = auth_open();
216		if (as == NULL || auth_setpwd(as, e->pwd) != 0) {
217			warn("auth_setpwd");
218			syslog(LOG_ERR, "(%s) AUTH_SETPWD FAILED (%m)",
219			    e->pwd->pw_name);
220			_exit(EXIT_FAILURE);
221		}
222		if (auth_approval(as, lc, usernm, "cron") <= 0) {
223			warnx("approval failed for %s", e->pwd->pw_name);
224			syslog(LOG_ERR, "(%s) APPROVAL FAILED (cron)",
225			    e->pwd->pw_name);
226			_exit(EXIT_FAILURE);
227		}
228		auth_close(as);
229		login_close(lc);
230
231		/* If no PATH specified in crontab file but
232		 * we just added one via login.conf, add it to
233		 * the crontab environment.
234		 */
235		if (env_get("PATH", e->envp) == NULL && environ != NULL) {
236			for (p = environ; *p; p++) {
237				if (strncmp(*p, "PATH=", 5) == 0) {
238					e->envp = env_set(e->envp, *p);
239					break;
240				}
241			}
242		}
243		chdir(env_get("HOME", e->envp));
244
245		(void) signal(SIGPIPE, SIG_DFL);
246
247		/*
248		 * Exec the command.
249		 */
250		{
251			char	*shell = env_get("SHELL", e->envp);
252
253			execle(shell, shell, "-c", e->cmd, (char *)NULL, e->envp);
254			warn("unable to execute %s", shell);
255			syslog(LOG_ERR, "(%s) CAN'T EXEC (%s: %m)",
256			    e->pwd->pw_name, shell);
257			_exit(EXIT_FAILURE);
258		}
259		break;
260	default:
261		/* parent process */
262		break;
263	}
264
265	/* middle process, child of original cron, parent of process running
266	 * the user's command.
267	 */
268
269	/* close the ends of the pipe that will only be referenced in the
270	 * grandchild process...
271	 */
272	close(stdin_pipe[READ_PIPE]);
273	close(stdout_pipe[WRITE_PIPE]);
274
275	/*
276	 * write, to the pipe connected to child's stdin, any input specified
277	 * after a % in the crontab entry.  while we copy, convert any
278	 * additional %'s to newlines.  when done, if some characters were
279	 * written and the last one wasn't a newline, write a newline.
280	 *
281	 * Note that if the input data won't fit into one pipe buffer (2K
282	 * or 4K on most BSD systems), and the child doesn't read its stdin,
283	 * we would block here.  thus we must fork again.
284	 */
285
286	pid_t	stdinjob;
287	if (*input_data && (stdinjob = fork()) == 0) {
288		FILE *out = fdopen(stdin_pipe[WRITE_PIPE], "w");
289		int need_newline = FALSE;
290		int escaped = FALSE;
291		int ch;
292
293		/* close the pipe we don't use, since we inherited it and
294		 * are part of its reference count now.
295		 */
296		close(stdout_pipe[READ_PIPE]);
297
298		/* translation:
299		 *	\% -> %
300		 *	%  -> \n
301		 *	\x -> \x	for all x != %
302		 */
303		while ((ch = *input_data++) != '\0') {
304			if (escaped) {
305				if (ch != '%')
306					putc('\\', out);
307			} else {
308				if (ch == '%')
309					ch = '\n';
310			}
311
312			if (!(escaped = (ch == '\\'))) {
313				putc(ch, out);
314				need_newline = (ch != '\n');
315			}
316		}
317		if (escaped)
318			putc('\\', out);
319		if (need_newline)
320			putc('\n', out);
321
322		/* close the pipe, causing an EOF condition.  fclose causes
323		 * stdin_pipe[WRITE_PIPE] to be closed, too.
324		 */
325		fclose(out);
326
327		_exit(EXIT_SUCCESS);
328	}
329
330	/* close the pipe to the grandkiddie's stdin, since its wicked uncle
331	 * ernie back there has it open and will close it when he's done.
332	 */
333	close(stdin_pipe[WRITE_PIPE]);
334
335	/*
336	 * read output from the grandchild.  it's stderr has been redirected to
337	 * it's stdout, which has been redirected to our pipe.  if there is any
338	 * output, we'll be mailing it to the user whose crontab this is...
339	 * when the grandchild exits, we'll get EOF.
340	 */
341
342	(void) signal(SIGPIPE, SIG_IGN);
343	in = fdopen(stdout_pipe[READ_PIPE], "r");
344
345	char	*mailto;
346	FILE	*mail = NULL;
347	int	status = 0;
348	pid_t	mailpid;
349	size_t	bytes = 1;
350
351	if (in != NULL) {
352		int	ch = getc(in);
353
354		if (ch != EOF) {
355
356			/* get name of recipient.  this is MAILTO if set to a
357			 * valid local username; USER otherwise.
358			 */
359			mailto = env_get("MAILTO", e->envp);
360			if (!mailto) {
361				/* MAILTO not present, set to USER.
362				 */
363				mailto = usernm;
364			} else if (!*mailto || !safe_p(usernm, mailto)) {
365				mailto = NULL;
366			}
367
368			/* if we are supposed to be mailing, MAILTO will
369			 * be non-NULL.  only in this case should we set
370			 * up the mail command and subjects and stuff...
371			 */
372
373			if (mailto) {
374				char	**env;
375				char	mailcmd[MAX_COMMAND];
376				char	hostname[HOST_NAME_MAX + 1];
377
378				gethostname(hostname, sizeof(hostname));
379				if (snprintf(mailcmd, sizeof mailcmd,  MAILFMT,
380				    MAILARG) >= sizeof mailcmd) {
381					syslog(LOG_ERR,
382					    "(%s) ERROR (mailcmd too long)",
383					    e->pwd->pw_name);
384					(void) _exit(EXIT_FAILURE);
385				}
386				if (!(mail = cron_popen(mailcmd, "w", e->pwd,
387				    &mailpid))) {
388					syslog(LOG_ERR, "(%s) POPEN (%s)",
389					    e->pwd->pw_name, mailcmd);
390					(void) _exit(EXIT_FAILURE);
391				}
392				fprintf(mail, "From: root (Cron Daemon)\n");
393				fprintf(mail, "To: %s\n", mailto);
394				fprintf(mail, "Subject: Cron <%s@%s> %s\n",
395					usernm, first_word(hostname, "."),
396					e->cmd);
397				fprintf(mail, "Auto-Submitted: auto-generated\n");
398				for (env = e->envp;  *env;  env++)
399					fprintf(mail, "X-Cron-Env: <%s>\n",
400						*env);
401				fprintf(mail, "\n");
402
403				/* this was the first char from the pipe
404				 */
405				fputc(ch, mail);
406			}
407
408			/* we have to read the input pipe no matter whether
409			 * we mail or not, but obviously we only write to
410			 * mail pipe if we ARE mailing.
411			 */
412
413			while (EOF != (ch = getc(in))) {
414				bytes++;
415				if (mail)
416					fputc(ch, mail);
417			}
418
419		} /*if data from grandchild*/
420
421		fclose(in);	/* also closes stdout_pipe[READ_PIPE] */
422	}
423
424	/* wait for children to die.
425	 */
426	int waiter;
427	if (jobpid > 0) {
428		while (waitpid(jobpid, &waiter, 0) == -1 && errno == EINTR)
429			;
430
431		/* If everything went well, and -n was set, _and_ we have mail,
432		 * we won't be mailing... so shoot the messenger!
433		 */
434		if (WIFEXITED(waiter) && WEXITSTATUS(waiter) == 0
435		    && (e->flags & MAIL_WHEN_ERR) == MAIL_WHEN_ERR
436		    && mail) {
437			kill(mailpid, SIGKILL);
438			(void)fclose(mail);
439			mail = NULL;
440		}
441
442		/* only close pipe if we opened it -- i.e., we're mailing... */
443		if (mail) {
444			/*
445			 * Note: the pclose will probably see the termination
446			 * of the grandchild in addition to the mail process,
447			 * since it (the grandchild) is likely to exit after
448			 * closing its stdout.
449			 */
450			status = cron_pclose(mail, mailpid);
451		}
452
453		/* if there was output and we could not mail it,
454		 * log the facts so the poor user can figure out
455		 * what's going on.
456		 */
457		if (mail && status) {
458			syslog(LOG_NOTICE, "(%s) MAIL (mailed %zu byte"
459			    "%s of output but got status 0x%04x)", usernm,
460			    bytes, (bytes == 1) ? "" : "s", status);
461		}
462	}
463
464	if (stdinjob > 0)
465		while (waitpid(stdinjob, &waiter, 0) == -1 && errno == EINTR)
466			;
467}
468
469int
470safe_p(const char *usernm, const char *s)
471{
472	static const char safe_delim[] = "@!:%+-.,";     /* conservative! */
473	const char *t;
474	int ch, first;
475
476	for (t = s, first = 1; (ch = (unsigned char)*t++) != '\0'; first = 0) {
477		if (isascii(ch) && isprint(ch) &&
478		    (isalnum(ch) || ch == '_' ||
479		    (!first && strchr(safe_delim, ch))))
480			continue;
481		syslog(LOG_WARNING, "(%s) UNSAFE (%s)", usernm, s);
482		return (FALSE);
483	}
484	return (TRUE);
485}
486