| # <@LICENSE> |
| # Licensed to the Apache Software Foundation (ASF) under one or more |
| # contributor license agreements. See the NOTICE file distributed with |
| # this work for additional information regarding copyright ownership. |
| # The ASF licenses this file to you under the Apache License, Version 2.0 |
| # (the "License"); you may not use this file except in compliance with |
| # the License. You may obtain a copy of the License at: |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| # </@LICENSE> |
| |
| =head1 NAME |
| |
| Mail::SpamAssassin::Util - utility functions |
| |
| =head1 DESCRIPTION |
| |
| A general class for utility functions. Please use this for functions that |
| stand alone, without requiring a $self object, Portability functions |
| especially. |
| |
| NOTE: The functions in this module are to be considered private. Their API may |
| change at any point, and it's expected that they'll only be used by other |
| Mail::SpamAssassin modules. (TODO: we should probably revisit this if |
| it's useful for plugin development.) |
| |
| =over 4 |
| |
| =cut |
| |
| package Mail::SpamAssassin::Util; |
| |
| use strict; |
| use warnings; |
| use bytes; |
| |
| use Mail::SpamAssassin::Logger; |
| |
| use vars qw ( |
| @ISA @EXPORT |
| $AM_TAINTED |
| ); |
| |
| require Exporter; |
| |
| @ISA = qw(Exporter); |
| @EXPORT = qw(local_tz base64_decode); |
| |
| use Mail::SpamAssassin; |
| use Mail::SpamAssassin::Util::RegistrarBoundaries; |
| |
| use Config; |
| use File::Spec; |
| use Time::Local; |
| use Sys::Hostname (); # don't import hostname() into this namespace! |
| use Fcntl; |
| use POSIX (); # don't import anything unless we ask explicitly! |
| use Text::Wrap (); |
| use Errno qw(EEXIST); |
| |
| ########################################################################### |
| |
| use constant HAS_MIME_BASE64 => eval { require MIME::Base64; }; |
| use constant RUNNING_ON_WINDOWS => ($^O =~ /^(?:mswin|dos|os2)/oi); |
| |
| ########################################################################### |
| |
| # find an executable in the current $PATH (or whatever for that platform) |
| { |
| # Show the PATH we're going to explore only once. |
| my $displayed_path = 0; |
| |
| sub find_executable_in_env_path { |
| my ($filename) = @_; |
| |
| clean_path_in_taint_mode(); |
| if ( !$displayed_path++ ) { |
| dbg("util: current PATH is: ".join($Config{'path_sep'},File::Spec->path())); |
| } |
| foreach my $path (File::Spec->path()) { |
| my $fname = File::Spec->catfile ($path, $filename); |
| if ( -f $fname ) { |
| if (-x $fname) { |
| dbg("util: executable for $filename was found at $fname"); |
| return $fname; |
| } |
| else { |
| dbg("util: $filename was found at $fname, but isn't executable"); |
| } |
| } |
| } |
| return undef; |
| } |
| } |
| |
| ########################################################################### |
| |
| # taint mode: delete more unsafe vars for exec, as per perlsec |
| { |
| # We only need to clean the environment once, it stays clean ... |
| my $cleaned_taint_path = 0; |
| |
| sub clean_path_in_taint_mode { |
| return if ($cleaned_taint_path++); |
| return unless am_running_in_taint_mode(); |
| |
| dbg("util: taint mode: deleting unsafe environment variables, resetting PATH"); |
| |
| if (RUNNING_ON_WINDOWS) { |
| dbg("util: running on Win32, skipping PATH cleaning"); |
| return; |
| } |
| |
| delete @ENV{qw(IFS CDPATH ENV BASH_ENV)}; |
| |
| # Go through and clean the PATH out |
| my @path = (); |
| my @stat; |
| foreach my $dir (File::Spec->path()) { |
| next unless $dir; |
| |
| $dir =~ /^(.+)$/; # untaint, then clean ( 'foo/./bar' -> 'foo/bar', etc. ) |
| $dir = File::Spec->canonpath($1); |
| |
| if (!File::Spec->file_name_is_absolute($dir)) { |
| dbg("util: PATH included '$dir', which is not absolute, dropping"); |
| next; |
| } |
| elsif (!(@stat=stat($dir))) { |
| dbg("util: PATH included '$dir', which doesn't exist, dropping"); |
| next; |
| } |
| elsif (!-d _) { |
| dbg("util: PATH included '$dir', which isn't a directory, dropping"); |
| next; |
| } |
| elsif (($stat[2]&2) != 0) { |
| # World-Writable directories are considered insecure. |
| # We could be more paranoid and check all of the parent directories as well, |
| # but it's good for now. |
| dbg("util: PATH included '$dir', which is world writable, dropping"); |
| next; |
| } |
| |
| dbg("util: PATH included '$dir', keeping"); |
| push(@path, $dir); |
| } |
| |
| $ENV{'PATH'} = join($Config{'path_sep'}, @path); |
| dbg("util: final PATH set to: ".$ENV{'PATH'}); |
| } |
| } |
| |
| # taint mode: are we running in taint mode? 1 for yes, 0 for no. |
| sub am_running_in_taint_mode { |
| return $AM_TAINTED if defined $AM_TAINTED; |
| |
| if ($] >= 5.008) { |
| # perl 5.8 and above, ${^TAINT} is a syntax violation in 5.005 |
| $AM_TAINTED = eval q(no warnings q(syntax); ${^TAINT}); |
| } |
| else { |
| # older versions |
| my $blank; |
| for my $d ((File::Spec->curdir, File::Spec->rootdir, File::Spec->tmpdir)) { |
| opendir(TAINT, $d) || next; |
| $blank = readdir(TAINT); |
| closedir(TAINT); |
| last; |
| } |
| if (!(defined $blank && $blank)) { |
| # these are sometimes untainted, so this is less preferable than readdir |
| $blank = join('', values %ENV, $0, @ARGV); |
| } |
| $blank = substr($blank, 0, 0); |
| # seriously mind-bending perl |
| $AM_TAINTED = not eval { eval "1 || $blank" || 1 }; |
| } |
| dbg("util: running in taint mode? ". ($AM_TAINTED ? "yes" : "no")); |
| return $AM_TAINTED; |
| } |
| |
| ########################################################################### |
| |
| sub am_running_on_windows { |
| return RUNNING_ON_WINDOWS; |
| } |
| |
| ########################################################################### |
| |
| # untaint a path to a file, e.g. "/home/jm/.spamassassin/foo", |
| # "C:\Program Files\SpamAssassin\tmp\foo", "/home/õüt/etc". |
| # |
| # TODO: this does *not* handle locales well. We cannot use "use locale" |
| # and \w, since that will not detaint the data. So instead just allow the |
| # high-bit chars from ISO-8859-1, none of which have special metachar |
| # meanings (as far as I know). |
| # |
| sub untaint_file_path { |
| my ($path) = @_; |
| |
| return unless defined($path); |
| return '' if ($path eq ''); |
| |
| # Barry Jaspan: allow ~ and spaces, good for Windows. Also return '' |
| # if input is '', as it is a safe path. |
| my $chars = '-_A-Za-z\xA0-\xFF0-9\.\%\@\=\+\,\/\\\:'; |
| my $re = qr/^\s*([$chars][${chars}~ ]*)$/o; |
| |
| if ($path =~ $re) { |
| return $1; |
| } else { |
| warn "util: cannot untaint path: \"$path\"\n"; |
| return $path; |
| } |
| } |
| |
| sub untaint_hostname { |
| my ($host) = @_; |
| |
| return unless defined($host); |
| return '' if ($host eq ''); |
| |
| # from RFC 1035, but allowing domains starting with numbers: |
| # $label = q/[A-Za-z\d](?:[A-Za-z\d-]{0,61}[A-Za-z\d])?/; |
| # $domain = qq<$label(?:\.$label)*>; |
| # length($host) <= 255 && $host =~ /^($domain)$/ |
| # expanded (no variables in the re) because of a tainting bug in Perl 5.8.0 |
| if (length($host) <= 255 && $host =~ /^([a-z\d](?:[a-z\d-]{0,61}[a-z\d])?(?:\.[a-z\d](?:[a-z\d-]{0,61}[a-z\d])?)*)$/i) { |
| return $1; |
| } |
| else { |
| warn "util: cannot untaint hostname: \"$host\"\n"; |
| return $host; |
| } |
| } |
| |
| # This sub takes a scalar or a reference to an array, hash, scalar or another |
| # reference and recursively untaints all its values (and keys if it's a |
| # reference to a hash). It should be used with caution as blindly untainting |
| # values subverts the purpose of working in taint mode. It will return the |
| # untainted value if requested but to avoid unnecessary copying, the return |
| # value should be ignored when working on lists. |
| # Bad: |
| # %ENV = untaint_var(\%ENV); |
| # Better: |
| # untaint_var(\%ENV); |
| # |
| sub untaint_var { |
| local ($_) = @_; |
| return undef unless defined; |
| |
| unless (ref) { |
| /^(.*)$/s; |
| return $1; |
| } |
| elsif (ref eq 'ARRAY') { |
| @{$_} = map { $_ = untaint_var($_) } @{$_}; |
| return @{$_} if wantarray; |
| } |
| elsif (ref eq 'HASH') { |
| while (my ($k, $v) = each %{$_}) { |
| if (!defined $v && $_ == \%ENV) { |
| delete ${$_}{$k}; |
| next; |
| } |
| ${$_}{untaint_var($k)} = untaint_var($v); |
| } |
| return %{$_} if wantarray; |
| } |
| elsif (ref eq 'SCALAR' or ref eq 'REF') { |
| ${$_} = untaint_var(${$_}); |
| } |
| else { |
| warn "util: can't untaint a " . ref($_) . "!\n"; |
| } |
| return $_; |
| } |
| |
| ########################################################################### |
| |
| # timezone mappings: in case of conflicts, use RFC 2822, then most |
| # common and least conflicting mapping |
| my %TZ = ( |
| # standard |
| 'UT' => '+0000', |
| 'UTC' => '+0000', |
| # US and Canada |
| 'NDT' => '-0230', |
| 'AST' => '-0400', |
| 'ADT' => '-0300', |
| 'NST' => '-0330', |
| 'EST' => '-0500', |
| 'EDT' => '-0400', |
| 'CST' => '-0600', |
| 'CDT' => '-0500', |
| 'MST' => '-0700', |
| 'MDT' => '-0600', |
| 'PST' => '-0800', |
| 'PDT' => '-0700', |
| 'HST' => '-1000', |
| 'AKST' => '-0900', |
| 'AKDT' => '-0800', |
| 'HADT' => '-0900', |
| 'HAST' => '-1000', |
| # Europe |
| 'GMT' => '+0000', |
| 'BST' => '+0100', |
| 'IST' => '+0100', |
| 'WET' => '+0000', |
| 'WEST' => '+0100', |
| 'CET' => '+0100', |
| 'CEST' => '+0200', |
| 'EET' => '+0200', |
| 'EEST' => '+0300', |
| 'MSK' => '+0300', |
| 'MSD' => '+0400', |
| 'MET' => '+0100', |
| 'MEZ' => '+0100', |
| 'MEST' => '+0200', |
| 'MESZ' => '+0200', |
| # South America |
| 'BRST' => '-0200', |
| 'BRT' => '-0300', |
| # Australia |
| 'AEST' => '+1000', |
| 'AEDT' => '+1100', |
| 'ACST' => '+0930', |
| 'ACDT' => '+1030', |
| 'AWST' => '+0800', |
| # New Zealand |
| 'NZST' => '+1200', |
| 'NZDT' => '+1300', |
| # Asia |
| 'JST' => '+0900', |
| 'KST' => '+0900', |
| 'HKT' => '+0800', |
| 'SGT' => '+0800', |
| 'PHT' => '+0800', |
| # Middle East |
| 'IDT' => '+0300', |
| ); |
| |
| # month mappings |
| my %MONTH = (jan => 1, feb => 2, mar => 3, apr => 4, may => 5, jun => 6, |
| jul => 7, aug => 8, sep => 9, oct => 10, nov => 11, dec => 12); |
| |
| my $LOCALTZ; |
| |
| sub local_tz { |
| return $LOCALTZ if defined($LOCALTZ); |
| |
| # standard method for determining local timezone |
| my $time = time; |
| my @g = gmtime($time); |
| my @t = localtime($time); |
| my $z = $t[1]-$g[1]+($t[2]-$g[2])*60+($t[7]-$g[7])*1440+($t[5]-$g[5])*525600; |
| $LOCALTZ = sprintf("%+.2d%.2d", $z/60, $z%60); |
| return $LOCALTZ; |
| } |
| |
| sub parse_rfc822_date { |
| my ($date) = @_; |
| local ($_); |
| my ($yyyy, $mmm, $dd, $hh, $mm, $ss, $mon, $tzoff); |
| |
| # make it a bit easier to match |
| $_ = " $date "; s/, */ /gs; s/\s+/ /gs; |
| |
| # now match it in parts. Date part first: |
| if (s/ (\d+) (Jan|Feb|Mar|Apr|May|Jun|Jul|Aug|Sep|Oct|Nov|Dec) (\d{4}) / /i) { |
| $dd = $1; $mon = lc($2); $yyyy = $3; |
| } elsif (s/ (Jan|Feb|Mar|Apr|May|Jun|Jul|Aug|Sep|Oct|Nov|Dec) +(\d+) \d+:\d+:\d+ (\d{4}) / /i) { |
| $dd = $2; $mon = lc($1); $yyyy = $3; |
| } elsif (s/ (\d+) (Jan|Feb|Mar|Apr|May|Jun|Jul|Aug|Sep|Oct|Nov|Dec) (\d{2,3}) / /i) { |
| $dd = $1; $mon = lc($2); $yyyy = $3; |
| } else { |
| dbg("util: time cannot be parsed: $date"); |
| return undef; |
| } |
| |
| # handle two and three digit dates as specified by RFC 2822 |
| if (defined $yyyy) { |
| if (length($yyyy) == 2 && $yyyy < 50) { |
| $yyyy += 2000; |
| } |
| elsif (length($yyyy) != 4) { |
| # three digit years and two digit years with values between 50 and 99 |
| $yyyy += 1900; |
| } |
| } |
| |
| # hh:mm:ss |
| if (s/ (\d?\d):(\d\d)(:(\d\d))? / /) { |
| $hh = $1; $mm = $2; $ss = $4 || 0; |
| } |
| |
| # numeric timezones |
| if (s/ ([-+]\d{4}) / /) { |
| $tzoff = $1; |
| } |
| # common timezones |
| elsif (s/\b([A-Z]{2,4}(?:-DST)?)\b/ / && exists $TZ{$1}) { |
| $tzoff = $TZ{$1}; |
| } |
| # all other timezones are considered equivalent to "-0000" |
| $tzoff ||= '-0000'; |
| |
| # months |
| if (exists $MONTH{$mon}) { |
| $mmm = $MONTH{$mon}; |
| } |
| |
| $hh ||= 0; $mm ||= 0; $ss ||= 0; $dd ||= 0; $mmm ||= 0; $yyyy ||= 0; |
| |
| # Fudge invalid times so that we get a usable date. |
| if ($ss > 59) { |
| dbg("util: second after supported range, forcing second to 59: $date"); |
| $ss = 59; |
| } |
| |
| if ($mm > 59) { |
| dbg("util: minute after supported range, forcing minute to 59: $date"); |
| $mm = 59; |
| } |
| |
| if ($hh > 23) { |
| dbg("util: hour after supported range, forcing hour to 23: $date"); |
| $hh = 23; |
| } |
| |
| my $max_dd = 31; |
| if ($mmm == 4 || $mmm == 6 || $mmm == 9 || $mmm == 11) { |
| $max_dd = 30; |
| } |
| elsif ($mmm == 2) { |
| $max_dd = (!($yyyy % 4) && (($yyyy % 100) || !($yyyy % 400))) ? 29 : 28; |
| } |
| if ($dd > $max_dd) { |
| dbg("util: day is too high, incrementing date to next valid date: $date"); |
| $dd = 1; |
| $mmm++; |
| if ($mmm > 12) { |
| $mmm = 1; |
| $yyyy++; |
| } |
| } |
| |
| # Time::Local (v1.10 at least) throws warnings when the dates cause |
| # a 32-bit overflow. So force a min/max for year. |
| if ($yyyy > 2037) { |
| dbg("util: year after supported range, forcing year to 2037: $date"); |
| $yyyy = 2037; |
| } |
| elsif ($yyyy < 1970) { |
| dbg("util: year before supported range, forcing year to 1970: $date"); |
| $yyyy = 1971; |
| } |
| |
| my $time; |
| eval { # could croak |
| $time = timegm($ss, $mm, $hh, $dd, $mmm-1, $yyyy); |
| }; |
| |
| if ($@) { |
| dbg("util: time cannot be parsed: $date, $yyyy-$mmm-$dd $hh:$mm:$ss"); |
| return undef; |
| } |
| |
| if ($tzoff =~ /([-+])(\d\d)(\d\d)$/) # convert to seconds difference |
| { |
| $tzoff = (($2 * 60) + $3) * 60; |
| if ($1 eq '-') { |
| $time += $tzoff; |
| } else { |
| $time -= $tzoff; |
| } |
| } |
| |
| return $time; |
| } |
| |
| sub time_to_rfc822_date { |
| my($time) = @_; |
| |
| my @days = qw/Sun Mon Tue Wed Thu Fri Sat/; |
| my @months = qw/Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec/; |
| my @localtime = localtime($time || time); |
| $localtime[5]+=1900; |
| |
| sprintf("%s, %02d %s %4d %02d:%02d:%02d %s", $days[$localtime[6]], $localtime[3], |
| $months[$localtime[4]], @localtime[5,2,1,0], local_tz()); |
| } |
| |
| ########################################################################### |
| |
| # This is a wrapper for the Text::Wrap::wrap routine which makes its usage |
| # a bit safer. It accepts values for almost all options which can be set |
| # in Text::Wrap. All parameters are optional (leaving away the first one |
| # probably doesn't make too much sense though), either a missing or a false |
| # value will fall back to the default. Note that the parameter order and |
| # default values aren't always the isame as in Text::Wrap itself. |
| # |
| # The parameters are: |
| # 1st: The string to wrap. Only one string is allowed (unlike the original |
| # wrap() routine). (default: "") |
| # 2nd: The prefix to be put in front of all lines except the first one. |
| # (default: "") |
| # 3rd: The prefix for the first line. (default: "") |
| # 4th: The number of columns available (no line will be longer than this |
| # parameter minus one). See $Text::Wrap::columns. (default: 77) |
| # 5th: Enable or disable overflow mode. A false value is 'overflow', a |
| # true one 'wrap'; see $Text::Wrap::huge. (default: 0) |
| # 6th: The sequence/expression to wrap at. See $Text::Wrap::break |
| # (default: '\s'); |
| # 7th: The string to join the lines again. See $Text::Wrap::separator. |
| # (default: "\n") |
| # 8th: All tabs (except any in the prefix strings) are first replaced |
| # with 8 spaces. This parameter controls if any 8-space sequence |
| # is replaced with tabs again later. See $Text::Wrap::unexpand but |
| # note that we use a different default value. (default: 0) |
| |
| sub wrap { |
| local($Text::Wrap::columns) = $_[3] || 77; |
| local($Text::Wrap::huge) = $_[4] ? 'overflow' : 'wrap'; |
| local($Text::Wrap::break) = $_[5] || '\s'; |
| local($Text::Wrap::separator) = $_[6] || "\n"; |
| local($Text::Wrap::unexpand) = $_[7] || 0; |
| # There's a die() in there which "shouldn't happen", but better be |
| # paranoid. We'll return the unwrapped string if anything went wrong. |
| my $text = $_[0] || ""; |
| |
| # Text::Wrap produces spurious warnings: |
| # [23409] warn: (?:(?<=[\s,]))* matches null string many times in regex; marked by <-- HERE in m/\G(?:(?<=[\s,]))* <-- HERE \Z/ at /usr/local/perl594/lib/5.9.4/Text/Wrap.pm line 46. |
| # trap and ignore them. Why do so many of the core modules do this |
| # kind of crap? :( use a $SIG{__WARN__} to trap it. |
| |
| eval { |
| local $SIG{__WARN__} = sub { |
| ($_[0] =~ /matches null string many times/) or CORE::warn(@_); |
| }; |
| $text = Text::Wrap::wrap($_[2] || "", $_[1] || "", $text); |
| }; |
| return $text; |
| } |
| |
| ########################################################################### |
| |
| # Some base64 decoders will remove intermediate "=" characters, others |
| # will stop decoding on the first "=" character, this one translates "=" |
| # characters to null. |
| sub base64_decode { |
| local $_ = shift; |
| my $decoded_length = shift; |
| |
| s/\s+//g; |
| if (HAS_MIME_BASE64 && (length($_) % 4 == 0) && |
| m|^(?:[A-Za-z0-9+/=]{2,}={0,2})$|s) |
| { |
| # only use MIME::Base64 when the XS and Perl are both correct and quiet |
| s/(=+)(?!=*$)/'A' x length($1)/ge; |
| |
| # If only a certain number of bytes are requested, truncate the encoded |
| # version down to the appropriate size and return the requested bytes |
| if (defined $decoded_length) { |
| $_ = substr $_, 0, 4 * (int($decoded_length/3) + 1); |
| my $decoded = MIME::Base64::decode_base64($_); |
| return substr $decoded, 0, $decoded_length; |
| } |
| |
| # otherwise, just decode the whole thing and return it |
| return MIME::Base64::decode_base64($_); |
| } |
| tr{A-Za-z0-9+/=}{}cd; # remove non-base64 characters |
| s/=+$//; # remove terminating padding |
| tr{A-Za-z0-9+/=}{ -_`}; # translate to uuencode |
| s/.$// if (length($_) % 4 == 1); # unpack cannot cope with extra byte |
| |
| my $length; |
| my $out = ''; |
| while ($_) { |
| $length = (length >= 84) ? 84 : length; |
| $out .= unpack("u", chr(32 + $length * 3/4) . substr($_, 0, $length, '')); |
| last if (defined $decoded_length && length $out >= $decoded_length); |
| } |
| |
| # If only a certain number of bytes are requested, truncate the encoded |
| # version down to the appropriate size and return the requested bytes |
| if (defined $decoded_length) { |
| return substr $out, 0, $decoded_length; |
| } |
| |
| return $out; |
| } |
| |
| sub qp_decode { |
| local $_ = shift; |
| |
| s/\=\r?\n//gs; |
| s/\=([0-9a-fA-F]{2})/chr(hex($1))/ge; |
| return $_; |
| } |
| |
| sub base64_encode { |
| local $_ = shift; |
| |
| if (HAS_MIME_BASE64) { |
| return MIME::Base64::encode_base64($_); |
| } |
| |
| $_ = pack("u57", $_); |
| s/^.//mg; |
| tr| -_`|A-Za-z0-9+/A|; # -> #`# <- kluge against vim syntax issues |
| s/(A+)$/'=' x length $1/e; |
| return $_; |
| } |
| |
| ########################################################################### |
| |
| sub portable_getpwuid { |
| if (defined &Mail::SpamAssassin::Util::_getpwuid_wrapper) { |
| return Mail::SpamAssassin::Util::_getpwuid_wrapper(@_); |
| } |
| |
| if (!RUNNING_ON_WINDOWS) { |
| eval ' sub _getpwuid_wrapper { getpwuid($_[0]); } '; |
| } else { |
| dbg("util: defining getpwuid() wrapper using 'unknown' as username"); |
| eval ' sub _getpwuid_wrapper { _fake_getpwuid($_[0]); } '; |
| } |
| |
| if ($@) { |
| warn "util: failed to define getpwuid() wrapper: $@\n"; |
| } else { |
| return Mail::SpamAssassin::Util::_getpwuid_wrapper(@_); |
| } |
| } |
| |
| sub _fake_getpwuid { |
| return ( |
| 'unknown', # name, |
| 'x', # passwd, |
| $_[0], # uid, |
| 0, # gid, |
| '', # quota, |
| '', # comment, |
| '', # gcos, |
| '/', # dir, |
| '', # shell, |
| '', # expire |
| ); |
| } |
| |
| ########################################################################### |
| |
| # Given a string, extract an IPv4 address from it. Required, since |
| # we currently have no way to portably unmarshal an IPv4 address from |
| # an IPv6 one without kludging elsewhere. |
| # |
| sub extract_ipv4_addr_from_string { |
| my ($str) = @_; |
| |
| return unless defined($str); |
| |
| if ($str =~ /\b( |
| (?:1\d\d|2[0-4]\d|25[0-5]|\d\d|\d)\. |
| (?:1\d\d|2[0-4]\d|25[0-5]|\d\d|\d)\. |
| (?:1\d\d|2[0-4]\d|25[0-5]|\d\d|\d)\. |
| (?:1\d\d|2[0-4]\d|25[0-5]|\d\d|\d) |
| )\b/ix) |
| { |
| if (defined $1) { return $1; } |
| } |
| |
| # ignore native IPv6 addresses; currently we have no way to deal with |
| # these if we could extract them, as the DNSBLs don't provide a way |
| # to query them! TODO, eventually, once IPv6 spam starts to appear ;) |
| return; |
| } |
| |
| ########################################################################### |
| { |
| my($hostname, $fq_hostname); |
| |
| # get the current host's unqalified domain name (better: return whatever |
| # Sys::Hostname thinks our hostname is, might also be a full qualified one) |
| sub hostname { |
| return $hostname if defined($hostname); |
| |
| # Sys::Hostname isn't taint safe and might fall back to `hostname`. So we've |
| # got to clean PATH before we may call it. |
| clean_path_in_taint_mode(); |
| $hostname = Sys::Hostname::hostname(); |
| |
| return $hostname; |
| } |
| |
| # get the current host's fully-qualified domain name, if possible. If |
| # not possible, return the unqualified hostname. |
| sub fq_hostname { |
| return $fq_hostname if defined($fq_hostname); |
| |
| $fq_hostname = hostname(); |
| if ($fq_hostname !~ /\./) { # hostname doesn't contain a dot, so it can't be a FQDN |
| my @names = grep(/^\Q${fq_hostname}.\E/o, # grep only FQDNs |
| map { split } (gethostbyname($fq_hostname))[0 .. 1] # from all aliases |
| ); |
| $fq_hostname = $names[0] if (@names); # take the first FQDN, if any |
| } |
| |
| return $fq_hostname; |
| } |
| } |
| |
| ########################################################################### |
| |
| sub ips_match_in_16_mask { |
| my ($ipset1, $ipset2) = @_; |
| my ($b1, $b2); |
| |
| foreach my $ip1 (@{$ipset1}) { |
| foreach my $ip2 (@{$ipset2}) { |
| next unless defined $ip1; |
| next unless defined $ip2; |
| next unless ($ip1 =~ /^(\d+\.\d+\.)/); $b1 = $1; |
| next unless ($ip2 =~ /^(\d+\.\d+\.)/); $b2 = $1; |
| if ($b1 eq $b2) { return 1; } |
| } |
| } |
| |
| return 0; |
| } |
| |
| sub ips_match_in_24_mask { |
| my ($ipset1, $ipset2) = @_; |
| my ($b1, $b2); |
| |
| foreach my $ip1 (@{$ipset1}) { |
| foreach my $ip2 (@{$ipset2}) { |
| next unless defined $ip1; |
| next unless defined $ip2; |
| next unless ($ip1 =~ /^(\d+\.\d+\.\d+\.)/); $b1 = $1; |
| next unless ($ip2 =~ /^(\d+\.\d+\.\d+\.)/); $b2 = $1; |
| if ($b1 eq $b2) { return 1; } |
| } |
| } |
| |
| return 0; |
| } |
| |
| ########################################################################### |
| |
| sub my_inet_aton { unpack("N", pack("C4", split(/\./, $_[0]))) } |
| |
| ########################################################################### |
| |
| sub parse_content_type { |
| # This routine is typically called by passing a |
| # get_header("content-type") which passes all content-type headers |
| # (array context). If there are multiple Content-type headers (invalid, |
| # but it happens), MUAs seem to take the last one and so that's what we |
| # should do here. |
| # |
| my $ct = $_[-1] || 'text/plain; charset=us-ascii'; |
| |
| # This could be made a bit more rigid ... |
| # the actual ABNF, BTW (RFC 1521, section 7.2.1): |
| # boundary := 0*69<bchars> bcharsnospace |
| # bchars := bcharsnospace / " " |
| # bcharsnospace := DIGIT / ALPHA / "'" / "(" / ")" / "+" /"_" |
| # / "," / "-" / "." / "/" / ":" / "=" / "?" |
| # |
| # The boundary may be surrounded by double quotes. |
| # "the boundary parameter, which consists of 1 to 70 characters from |
| # a set of characters known to be very robust through email gateways, |
| # and NOT ending with white space. (If a boundary appears to end with |
| # white space, the white space must be presumed to have been added by |
| # a gateway, and must be deleted.)" |
| # |
| # In practice: |
| # - MUAs accept whitespace before and after the "=" character |
| # - only an opening double quote seems to be needed |
| # - non-quoted boundaries should be followed by space, ";", or end of line |
| # - blank boundaries seem to not work |
| # |
| my($boundary) = $ct =~ m!\bboundary\s*=\s*("[^"]+|[^\s";]+(?=[\s;]|$))!i; |
| |
| # remove double-quotes in boundary (should only be at start and end) |
| # |
| $boundary =~ tr/"//d if defined $boundary; |
| |
| # Parse out the charset and name, if they exist. |
| # |
| my($charset) = $ct =~ /\bcharset\s*=\s*["']?(.*?)["']?(?:;|$)/i; |
| my($name) = $ct =~ /\b(?:file)?name\s*=\s*["']?(.*?)["']?(?:;|$)/i; |
| |
| # Get the actual MIME type out ... |
| # Note: the header content may not be whitespace unfolded, so make sure the |
| # REs do /s when appropriate. |
| # correct: |
| # Content-type: text/plain; charset=us-ascii |
| # missing a semi-colon, CT shouldn't have whitespace anyway: |
| # Content-type: text/plain charset=us-ascii |
| # |
| $ct =~ s/^\s+//; # strip leading whitespace |
| $ct =~ s/;.*$//s; # strip everything after first ';' |
| $ct =~ s@^([^/]+(?:/[^/\s]*)?).*$@$1@s; # only something/something ... |
| # strip inappropriate chars |
| $ct =~ tr/\000-\040\177-\377\042\050\051\054\056\072-\077\100\133-\135//d; |
| $ct = lc $ct; |
| |
| # bug 4298: If at this point we don't have a content-type, assume text/plain |
| # also, if the content-type is simply "text" or "text/", assume text/plain |
| if (!$ct || $ct =~ /^text\/?$/) { |
| $ct = "text/plain"; |
| } |
| |
| # Now that the header has been parsed, return the requested information. |
| # In scalar context, just the MIME type, in array context the |
| # four important data parts (type, boundary, charset, and filename). |
| # |
| return wantarray ? ($ct,$boundary,$charset,$name) : $ct; |
| } |
| |
| ########################################################################### |
| |
| sub url_encode { |
| my ($url) = @_; |
| my (@characters) = split(/(\%[0-9a-fA-F]{2})/, $url); |
| my (@unencoded) = (); |
| my (@encoded) = (); |
| |
| foreach (@characters) { |
| # escaped character set ... |
| if (/\%[0-9a-fA-F]{2}/) { |
| # IF it is in the range of 0x00-0x20 or 0x7f-0xff |
| # or it is one of "<", ">", """, "#", "%", |
| # ";", "/", "?", ":", "@", "=" or "&" |
| # THEN preserve its encoding |
| unless (/(20|7f|[0189a-fA-F][0-9a-fA-F])/i) { |
| s/\%([2-7][0-9a-fA-F])/sprintf "%c", hex($1)/e; |
| push(@unencoded, $_); |
| } |
| } |
| # other stuff |
| else { |
| # 0x00-0x20, 0x7f-0xff, ", %, <, > |
| s/([\000-\040\177-\377\042\045\074\076]) |
| /push(@encoded, $1) && sprintf "%%%02x", unpack("C",$1)/egx; |
| } |
| } |
| if (wantarray) { |
| return(join("", @characters), join("", @unencoded), join("", @encoded)); |
| } |
| else { |
| return join("", @characters); |
| } |
| } |
| |
| ########################################################################### |
| |
| =item $module = first_available_module (@module_list) |
| |
| Return the name of the first module that can be successfully loaded with |
| C<require> from the list. Returns C<undef> if none are available. |
| |
| This is used instead of C<AnyDBM_File> as follows: |
| |
| my $module = Mail::SpamAssassin::Util::first_available_module |
| (qw(DB_File GDBM_File NDBM_File SDBM_File)); |
| tie %hash, $module, $path, [... args]; |
| |
| Note that C<SDBM_File> is guaranteed to be present, since it comes |
| with Perl. |
| |
| =cut |
| |
| sub first_available_module { |
| my (@packages) = @_; |
| foreach my $mod (@packages) { |
| if (eval 'require '.$mod.'; 1; ') { |
| return $mod; |
| } |
| } |
| undef; |
| } |
| |
| ########################################################################### |
| |
| =item my ($filepath, $filehandle) = secure_tmpfile(); |
| |
| Generates a filename for a temporary file, opens it exclusively and |
| securely, and returns a filehandle to the open file (opened O_RDWR). |
| |
| If it cannot open a file after 20 tries, it returns C<undef>. |
| |
| =cut |
| |
| # thanks to http://www2.picante.com:81/~gtaylor/autobuse/ for this code |
| sub secure_tmpfile { |
| my $tmpdir = Mail::SpamAssassin::Util::untaint_file_path(File::Spec->tmpdir()); |
| |
| if (!$tmpdir) { |
| # Note: we would prefer to keep this fatal, as not being able to |
| # find a writable tmpdir is a big deal for the calling code too. |
| # That would be quite a psychotic case, also. |
| warn "util: cannot find a temporary directory, set TMP or TMPDIR in environment"; |
| return; |
| } |
| |
| my ($reportfile, $tmpfile); |
| my $umask = umask 077; |
| |
| for (my $retries = 20; $retries > 0; $retries--) { |
| # we do not rely on the obscurity of this name for security, |
| # we use a average-quality PRG since this is all we need |
| my $suffix = join('', (0..9,'A'..'Z','a'..'z')[rand 62, rand 62, rand 62, |
| rand 62, rand 62, rand 62]); |
| $reportfile = File::Spec->catfile($tmpdir,".spamassassin${$}${suffix}tmp"); |
| |
| # instead, we require O_EXCL|O_CREAT to guarantee us proper |
| # ownership of our file, read the open(2) man page |
| if (sysopen($tmpfile, $reportfile, O_RDWR|O_CREAT|O_EXCL, 0600)) { |
| last; |
| } |
| |
| if ($!{EEXIST}) { |
| # it is acceptable if $tmpfile already exists, try another |
| next; |
| } |
| |
| # error, maybe "out of quota" or "too many open files" (bug 4017) |
| warn "util: secure_tmpfile failed to create file '$reportfile': $!\n"; |
| |
| # ensure the file handle is not semi-open in some way |
| if ($tmpfile) { |
| close $tmpfile; |
| } |
| } |
| |
| umask $umask; |
| |
| if (!$tmpfile) { |
| warn "util: secure_tmpfile failed to create file, giving up"; |
| return; # undef |
| } |
| |
| return ($reportfile, $tmpfile); |
| } |
| |
| =item my ($dirpath) = secure_tmpdir(); |
| |
| Generates a directory for temporary files. Creates it securely and |
| returns the path to the directory. |
| |
| If it cannot create a directory after 20 tries, it returns C<undef>. |
| |
| =cut |
| |
| # stolen from secure_tmpfile() |
| sub secure_tmpdir { |
| my $tmpdir = Mail::SpamAssassin::Util::untaint_file_path(File::Spec->tmpdir()); |
| |
| if (!$tmpdir) { |
| # Note: we would prefer to keep this fatal, as not being able to |
| # find a writable tmpdir is a big deal for the calling code too. |
| # That would be quite a psychotic case, also. |
| warn "util: cannot find a temporary directory, set TMP or TMPDIR in environment"; |
| return; |
| } |
| |
| my ($reportpath, $tmppath); |
| my $umask = umask 077; |
| |
| for (my $retries = 20; $retries > 0; $retries--) { |
| # we do not rely on the obscurity of this name for security, |
| # we use a average-quality PRG since this is all we need |
| my $suffix = join('', (0..9,'A'..'Z','a'..'z')[rand 62, rand 62, rand 62, |
| rand 62, rand 62, rand 62]); |
| $reportpath = File::Spec->catfile($tmpdir,".spamassassin${$}${suffix}tmp"); |
| |
| # instead, we require O_EXCL|O_CREAT to guarantee us proper |
| # ownership of our file, read the open(2) man page |
| if (mkdir $reportpath, 0700) { |
| $tmppath = $reportpath; |
| last; |
| } |
| |
| if ($!{EEXIST}) { |
| # it is acceptable if $reportpath already exists, try another |
| next; |
| } |
| |
| # error, maybe "out of quota" or "too many open files" (bug 4017) |
| warn "util: secure_tmpdir failed to create file '$reportpath': $!\n"; |
| } |
| |
| umask $umask; |
| |
| warn "util: secure_tmpdir failed to create a directory, giving up" if (!$tmppath); |
| |
| return $tmppath; |
| } |
| |
| |
| ########################################################################### |
| |
| sub uri_to_domain { |
| my ($uri) = @_; |
| |
| # Javascript is not going to help us, so return. |
| return if ($uri =~ /^javascript:/i); |
| |
| $uri =~ s,#.*$,,gs; # drop fragment |
| $uri =~ s#^[a-z]+:/{0,2}##gsi; # drop the protocol |
| $uri =~ s,^[^/]*\@,,gs; # username/passwd |
| |
| # strip path and CGI params. note: bug 4213 shows that "&" should |
| # *not* be likewise stripped here -- it's permitted in hostnames by |
| # some common MUAs! |
| $uri =~ s,[/\?].*$,,gs; |
| |
| $uri =~ s,:\d*$,,gs; # port, bug 4191: sometimes the # is missing |
| |
| # skip undecoded URIs if the encoded bits shouldn't be. |
| # we'll see the decoded version as well. see url_encode() |
| return if $uri =~ /\%(?:2[1-9a-fA-F]|[3-6][0-9a-fA-f]|7[0-9a-eA-E])/; |
| |
| # keep IPs intact |
| if ($uri !~ /^\d+\.\d+\.\d+\.\d+$/) { |
| # get rid of hostname part of domain, understanding delegation |
| $uri = Mail::SpamAssassin::Util::RegistrarBoundaries::trim_domain($uri); |
| |
| # ignore invalid domains |
| return unless |
| (Mail::SpamAssassin::Util::RegistrarBoundaries::is_domain_valid($uri)); |
| } |
| |
| # $uri is now the domain only |
| return lc $uri; |
| } |
| |
| sub uri_list_canonify { |
| my($redirector_patterns, @uris) = @_; |
| |
| # make sure we catch bad encoding tricks |
| my @nuris = (); |
| for my $uri (@uris) { |
| # we're interested in http:// and so on, skip mailto: and |
| # email addresses with no protocol |
| next if $uri =~ /^mailto:/i || $uri =~ /^[^:]*\@/; |
| |
| # sometimes we catch URLs on multiple lines |
| $uri =~ s/\n//g; |
| |
| # URLs won't have leading/trailing whitespace |
| $uri =~ s/^\s+//; |
| $uri =~ s/\s+$//; |
| |
| # CRs just confuse things down below, so trash them now |
| $uri =~ s/\r//g; |
| |
| # Make a copy so we don't trash the original in the array |
| my $nuri = $uri; |
| |
| # bug 4390: certain MUAs treat back slashes as front slashes. |
| # since backslashes are supposed to be encoded in a URI, swap non-encoded |
| # ones with front slashes. |
| $nuri =~ tr@\\@/@; |
| |
| # http:www.foo.biz -> http://www.foo.biz |
| $nuri =~ s#^(https?:)/{0,2}#$1//#i; |
| |
| # *always* make a dup with all %-encoding decoded, since |
| # important parts of the URL may be encoded (such as the |
| # scheme). (bug 4213) |
| if ($nuri =~ /\%[0-9a-fA-F]{2}/) { |
| $nuri = Mail::SpamAssassin::Util::url_encode($nuri); |
| } |
| |
| # www.foo.biz -> http://www.foo.biz |
| # unschemed URIs: assume default of "http://" as most MUAs do |
| if ($nuri !~ /^[-_a-z0-9]+:/i) { |
| if ($nuri =~ /^ftp\./) { |
| $nuri =~ s@^@ftp://@g; |
| } |
| else { |
| $nuri =~ s@^@http://@g; |
| } |
| } |
| |
| # http://www.foo.biz?id=3 -> http://www.foo.biz/?id=3 |
| $nuri =~ s@^(https?://[^/?]+)\?@$1/?@i; |
| |
| # deal with encoding of chars, this is just the set of printable |
| # chars minus ' ' (that is, dec 33-126, hex 21-7e) |
| $nuri =~ s/\&\#0*(3[3-9]|[4-9]\d|1[01]\d|12[0-6]);/sprintf "%c",$1/ge; |
| $nuri =~ s/\&\#x0*(2[1-9]|[3-6][a-fA-F0-9]|7[0-9a-eA-E]);/sprintf "%c",hex($1)/ge; |
| |
| # put the new URI on the new list if it's different |
| if ($nuri ne $uri) { |
| push(@nuris, $nuri); |
| } |
| |
| # deal with wierd hostname parts, remove user/pass, etc. |
| if ($nuri =~ m{^(https?://)([^/]+?)((?::\d*)?\/.*)?$}i) { |
| my($proto, $host, $rest) = ($1,$2,$3); |
| |
| # not required |
| $rest ||= ''; |
| |
| # bug 4146: deal with non-US ASCII 7-bit chars in the host portion |
| # of the URI according to RFC 1738 that's invalid, and the tested |
| # browsers (Firefox, IE) remove them before usage... |
| if ($host =~ tr/\000-\040\200-\377//d) { |
| push(@nuris, join ('', $proto, $host, $rest)); |
| } |
| |
| # deal with http redirectors. strip off one level of redirector |
| # and add back to the array. the foreach loop will go over those |
| # and deal appropriately. |
| # bug 3308: redirectors like yahoo only need one '/' ... <grrr> |
| if ($rest =~ m{(https?:/{0,2}.+)$}i) { |
| push(@uris, $1); |
| } |
| |
| # resort to redirector pattern matching if the generic https? check |
| # doesn't result in a match -- bug 4176 |
| else { |
| foreach (@{$redirector_patterns}) { |
| if ("$proto$host$rest" =~ $_) { |
| next unless defined $1; |
| dbg("uri: parsed uri pattern: $_"); |
| dbg("uri: parsed uri found: $1 in redirector: $proto$host$rest"); |
| push (@uris, $1); |
| last; |
| } |
| } |
| } |
| |
| ######################## |
| ## TVD: known issue, if host has multiple combinations of the following, |
| ## all permutations will be put onto @nuris. shouldn't be an issue. |
| |
| # Get rid of cruft that could cause confusion for rules... |
| |
| # remove "www.fakehostname.com@" username part |
| if ($host =~ s/^[^\@]+\@//gs) { |
| push(@nuris, join ('', $proto, $host, $rest)); |
| } |
| |
| # bug 3186: If in a sentence, we might pick up odd characters ... |
| # ie: "visit http://example.biz." or "visit http://example.biz!!!" |
| # the host portion should end in some form of alpha-numeric, strip off |
| # the rest. |
| if ($host =~ s/[^0-9A-Za-z]+$//) { |
| push(@nuris, join ('', $proto, $host, $rest)); |
| } |
| |
| ######################## |
| |
| # deal with hosts which are IPs |
| # also handle things like: |
| # http://89.0x00000000000000000000068.0000000000000000000000160.0x00000000000011 |
| # both hex (0x) and oct (0+) encoded octets, etc. |
| |
| if ($host =~ /^ |
| ((?:0x[0-9a-f]{2,}|\d+)\.) |
| ((?:0x[0-9a-f]{2,}|\d+)\.) |
| ((?:0x[0-9a-f]{2,}|\d+)\.) |
| (0x[0-9a-f]{2,}|\d+) |
| $/ix) { |
| my @chunk = ($1,$2,$3,$4); |
| foreach my $octet (@chunk) { |
| $octet =~ s/^0x0*([0-9a-f][0-9a-f])/sprintf "%d",hex($1)/gei; |
| $octet =~ s/^0+([1-3][0-7]{0,2}|[4-7][0-7]?)\b/sprintf "%d",oct($1)/ge; |
| $octet =~ s/^0+//; |
| } |
| push(@nuris, join ('', $proto, @chunk, $rest)); |
| } |
| |
| # "http://0x7f000001/" |
| elsif ($host =~ /^0x[0-9a-f]+$/i) { |
| # only take last 4 octets |
| $host =~ s/^0x[0-9a-f]*?([0-9a-f]{1,8})$/sprintf "%d",hex($1)/gei; |
| push(@nuris, join ('', $proto, decode_ulong_to_ip($host), $rest)); |
| } |
| |
| # "http://1113343453/" |
| elsif ($host =~ /^[0-9]+$/) { |
| push(@nuris, join ('', $proto, decode_ulong_to_ip($host), $rest)); |
| } |
| |
| } |
| } |
| |
| # remove duplicates, merge nuris and uris |
| my %uris = map { $_ => 1 } @uris, @nuris; |
| |
| return keys %uris; |
| } |
| |
| sub decode_ulong_to_ip { |
| return join(".", unpack("CCCC",pack("H*", sprintf "%08lx", $_[0]))); |
| } |
| |
| ########################################################################### |
| |
| sub first_date { |
| my (@strings) = @_; |
| |
| foreach my $string (@strings) { |
| my $time = parse_rfc822_date($string); |
| return $time if defined($time) && $time; |
| } |
| return undef; |
| } |
| |
| sub receive_date { |
| my ($header) = @_; |
| |
| $header ||= ''; |
| $header =~ s/\n[ \t]+/ /gs; # fix continuation lines |
| |
| my @rcvd = ($header =~ /^Received:(.*)/img); |
| my @local; |
| my $time; |
| |
| if (@rcvd) { |
| if ($rcvd[0] =~ /qmail \d+ invoked by uid \d+/ || |
| $rcvd[0] =~ /\bfrom (?:localhost\s|(?:\S+ ){1,2}\S*\b127\.0\.0\.1\b)/) |
| { |
| push @local, (shift @rcvd); |
| } |
| if (@rcvd && ($rcvd[0] =~ m/\bby localhost with \w+ \(fetchmail-[\d.]+/)) { |
| push @local, (shift @rcvd); |
| } |
| elsif (@local) { |
| unshift @rcvd, (shift @local); |
| } |
| } |
| |
| if (@rcvd) { |
| $time = first_date(shift @rcvd); |
| return $time if defined($time); |
| } |
| if (@local) { |
| $time = first_date(@local); |
| return $time if defined($time); |
| } |
| if ($header =~ /^(?:From|X-From-Line:)\s+(.+)$/im) { |
| my $string = $1; |
| $string .= " ".local_tz() unless $string =~ /(?:[-+]\d{4}|\b[A-Z]{2,4}\b)/; |
| $time = first_date($string); |
| return $time if defined($time); |
| } |
| if (@rcvd) { |
| $time = first_date(@rcvd); |
| return $time if defined($time); |
| } |
| if ($header =~ /^Resent-Date:\s*(.+)$/im) { |
| $time = first_date($1); |
| return $time if defined($time); |
| } |
| if ($header =~ /^Date:\s*(.+)$/im) { |
| $time = first_date($1); |
| return $time if defined($time); |
| } |
| |
| return time; |
| } |
| |
| ########################################################################### |
| |
| sub setuid_to_euid { |
| return if (RUNNING_ON_WINDOWS); |
| |
| # remember the target uid, the first number is the important one |
| my $touid = $>; |
| |
| if ($< != $touid) { |
| dbg("util: changing real uid from $< to match effective uid $touid"); |
| $< = $touid; # try the simple method first |
| |
| # bug 3586: Some perl versions, typically those on a BSD-based |
| # platform, require RUID==EUID (and presumably == 0) before $< |
| # can be changed. So this is a kluge for us to get around the |
| # typical spamd-ish behavior of: $< = 0, $> = someuid ... |
| if ( $< != $touid ) { |
| dbg("util: initial attempt to change real uid failed, trying BSD workaround"); |
| |
| $> = $<; # revert euid to ruid |
| $< = $touid; # change ruid to target |
| $> = $touid; # change euid back to target |
| } |
| |
| # Check that we have now accomplished the setuid |
| if ($< != $touid) { |
| # keep this fatal: it's a serious security problem if it fails |
| die "util: setuid $< to $touid failed!"; |
| } |
| } |
| } |
| |
| # helper app command-line open |
| sub helper_app_pipe_open { |
| if (RUNNING_ON_WINDOWS) { |
| return helper_app_pipe_open_windows (@_); |
| } else { |
| return helper_app_pipe_open_unix (@_); |
| } |
| } |
| |
| sub helper_app_pipe_open_windows { |
| my ($fh, $stdinfile, $duperr2out, @cmdline) = @_; |
| |
| # use a traditional open(FOO, "cmd |") |
| my $cmd = join(' ', @cmdline); |
| if ($stdinfile) { $cmd .= qq/ < "$stdinfile"/; } |
| if ($duperr2out) { $cmd .= " 2>&1"; } |
| return open ($fh, $cmd.'|'); |
| } |
| |
| sub force_die { |
| my ($msg) = @_; |
| |
| # note use of eval { } scope in logging -- paranoia to ensure that a broken |
| # $SIG{__WARN__} implementation will not interfere with the flow of control |
| # here, where we *have* to die. |
| eval { warn $msg; }; |
| |
| POSIX::_exit(1); # avoid END and destructor processing |
| kill('KILL',$$); # still kicking? die! |
| } |
| |
| sub helper_app_pipe_open_unix { |
| my ($fh, $stdinfile, $duperr2out, @cmdline) = @_; |
| |
| # do a fork-open, so we can setuid() back |
| my $pid = open ($fh, '-|'); |
| if (!defined $pid) { |
| # acceptable to die() here, calling code catches it |
| die "util: cannot fork: $!"; |
| } |
| |
| if ($pid != 0) { |
| return $pid; # parent process; return the child pid |
| } |
| |
| # else, child process. |
| # from now on, we cannot die(), as a parent-process eval { } scope |
| # could intercept it! use force_die() instead (bug 4370, cmt 2) |
| |
| # go setuid... |
| setuid_to_euid(); |
| dbg("util: setuid: ruid=$< euid=$>"); |
| |
| # now set up the fds. due to some wierdness, we may have to ensure that we |
| # *really* close the correct fd number, since some other code may have |
| # redirected the meaning of STDOUT/STDIN/STDERR it seems... (bug 3649). use |
| # POSIX::close() for that. it's safe to call close() and POSIX::close() on |
| # the same fd; the latter is a no-op in that case. |
| |
| if (!$stdinfile) { # < $tmpfile |
| # ensure we have *some* kind of fd 0. |
| $stdinfile = "/dev/null"; |
| } |
| |
| my $f = fileno(STDIN); |
| close STDIN; |
| |
| # sanity: was that the *real* STDIN? if not, close that one too ;) |
| if ($f != 0) { |
| POSIX::close(0); |
| } |
| |
| open (STDIN, "<$stdinfile") or force_die "util: cannot open $stdinfile: $!"; |
| |
| # this should be impossible; if we just closed fd 0, UNIX |
| # fd behaviour dictates that the next fd opened (the new STDIN) |
| # will be the lowest unused fd number, which should be 0. |
| # so die with a useful error if this somehow isn't the case. |
| if (fileno(STDIN) != 0) { |
| force_die "util: setuid: oops: fileno(STDIN) [".fileno(STDIN)."] != 0"; |
| } |
| |
| # ensure STDOUT is open. since we just created a pipe to ensure this, it has |
| # to be open to that pipe, and if it isn't, something's seriously screwy. |
| # Update: actually, this fails! see bug 3649 comment 37. For some reason, |
| # fileno(STDOUT) can be 0; possibly because open("-|") didn't change the fh |
| # named STDOUT, instead changing fileno(1) directly. So this is now |
| # commented. |
| # if (fileno(STDOUT) != 1) { |
| # die "setuid: oops: fileno(STDOUT) [".fileno(STDOUT)."] != 1"; |
| # } |
| |
| if ($duperr2out) { # 2>&1 |
| my $f = fileno(STDERR); |
| close STDERR; |
| |
| # sanity: was that the *real* STDERR? if not, close that one too ;) |
| if ($f != 2) { |
| POSIX::close(2); |
| } |
| |
| open (STDERR, ">&STDOUT") or force_die "util: dup STDOUT failed: $!"; |
| |
| # STDERR must be fd 2 to be useful to subprocesses! (bug 3649) |
| if (fileno(STDERR) != 2) { |
| force_die "util: oops: fileno(STDERR) [".fileno(STDERR)."] != 2"; |
| } |
| } |
| |
| exec @cmdline; |
| warn "util: exec failed: $!"; |
| |
| # bug 4370: we really have to exit here; break any eval traps |
| POSIX::_exit(1); # avoid END and destructor processing |
| kill('KILL',$$); # still kicking? die! |
| die; # must be a die() otherwise -w will complain |
| } |
| |
| ########################################################################### |
| |
| # As "perldoc perlvar" notes, in perl 5.8.0, the concept of "safe" signal |
| # handling was added, which means that signals cannot interrupt a running OP. |
| # unfortunately, a regexp match is a single OP, so a psychotic m// can |
| # effectively "hang" the interpreter as a result, and a $SIG{ALRM} handler |
| # will never get called. |
| # |
| # However, by using "unsafe" signals, we can still interrupt that -- and |
| # POSIX::sigaction can create an unsafe handler on 5.8.x. So this function |
| # provides a portable way to do that. |
| |
| sub trap_sigalrm_fully { |
| my ($handler) = @_; |
| if ($] < 5.008) { |
| # signals are always unsafe, just use %SIG |
| $SIG{ALRM} = $handler; |
| } else { |
| # may be using "safe" signals with %SIG; use POSIX to avoid it |
| POSIX::sigaction POSIX::SIGALRM(), new POSIX::SigAction $handler; |
| } |
| } |
| |
| ########################################################################### |
| |
| # Removes any normal perl-style regexp delimiters at |
| # the start and end, and modifiers at the end (if present). |
| # If modifiers are found, they are inserted into the pattern using |
| # the /(?i)/ idiom. |
| |
| sub regexp_remove_delimiters { |
| my ($re) = @_; |
| |
| my $delim; |
| if (!defined $re || $re eq '') { |
| warn "cannot remove delimiters from null regexp"; |
| return undef; # invalid |
| } |
| elsif ($re =~ s/^m{//) { # m{foo/bar} |
| $delim = '}'; |
| } |
| elsif ($re =~ s/^m\(//) { # m(foo/bar) |
| $delim = ')'; |
| } |
| elsif ($re =~ s/^m<//) { # m<foo/bar> |
| $delim = '>'; |
| } |
| elsif ($re =~ s/^m(\W)//) { # m#foo/bar# |
| $delim = $1; |
| } else { # /foo\/bar/ or !foo/bar! |
| $re =~ s/^(\W)//; $delim = $1; |
| } |
| |
| $re =~ s/\Q${delim}\E([imsx]*)$// or warn "unbalanced re: $re"; |
| |
| my $mods = $1; |
| if ($mods) { |
| $re = "(?".$mods.")".$re; |
| } |
| |
| return $re; |
| } |
| |
| # turn "/foobar/i" into qr/(?i)foobar/ |
| |
| sub make_qr { |
| my ($re) = @_; |
| $re = regexp_remove_delimiters($re); |
| return qr/$re/; |
| } |
| |
| ########################################################################### |
| |
| sub get_my_locales { |
| my ($ok_locales) = @_; |
| |
| my @locales = split(' ', $ok_locales); |
| my $lang = $ENV{'LC_ALL'}; |
| $lang ||= $ENV{'LANGUAGE'}; |
| $lang ||= $ENV{'LC_MESSAGES'}; |
| $lang ||= $ENV{'LANG'}; |
| push (@locales, $lang) if defined($lang); |
| return @locales; |
| } |
| |
| ########################################################################### |
| |
| 1; |
| |
| =back |
| |
| =cut |