2 * Empire - A multi-player, client/server Internet based war game.
3 * Copyright (C) 1986-2017, Dave Pare, Jeff Bailey, Thomas Ruschak,
4 * Ken Stevens, Steve McClure, Markus Armbruster
6 * Empire is free software: you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation, either version 3 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program. If not, see <http://www.gnu.org/licenses/>.
21 * See files README, COPYING and CREDITS in the root of the source
22 * tree for related information and legal notices. It is expected
23 * that future projects/authors will amend these files as needed.
27 * servercmd.c: Change the state depending on the command from the server.
29 * Known contributors to this file:
32 * Ron Koenderink, 2005
33 * Markus Armbruster, 2005-2017
53 static FILE *redir_fp;
54 static int redir_is_pipe;
57 static void doredir(char *p);
58 static void dopipe(char *p);
59 static int doexecute(char *p);
62 servercmd(int code, char *arg, int len)
64 static int nmin, nbtu, fd;
65 static char the_prompt[1024];
66 static char teles[64];
70 if (sscanf(arg, "%d %d", &nmin, &nbtu) != 2) {
71 fprintf(stderr, "Warning: server sent malformed prompt %s",
74 snprintf(the_prompt, sizeof(the_prompt), "[%d:%d] Command : ",
78 (void)pclose(redir_fp);
80 (void)fclose(redir_fp);
84 prompt(code, the_prompt, teles);
88 snprintf(the_prompt, sizeof(the_prompt), "%.*s", len - 1, arg);
89 prompt(code, the_prompt, teles);
97 printf("Exit: %s", arg);
99 fprintf(auxfp, "Exit: %s", arg);
104 fprintf(auxfp, "\n%s", arg);
107 if (arg[0] != '\n') {
108 snprintf(teles, sizeof(teles), "(%.*s) ", len - 1, arg);
112 prompt(code, the_prompt, teles);
136 for (beg = s; isspace(*(unsigned char *)beg); beg++) ;
137 for (end = beg; !isspace(*(unsigned char *)end); end++) ;
143 common_authorized(char *arg, char *attempt)
146 fprintf(stderr, "Can't %s in restricted mode\n", attempt);
151 fprintf(stderr, "Can't %s in a batch file\n", attempt);
158 redir_authorized(char *arg, char *attempt)
161 fprintf(stderr, "Warning: dropped conflicting %s %s",
166 if (!seen_input(arg)) {
167 fprintf(stderr, "Warning: server attempted to %s %s",
172 return common_authorized(arg, attempt);
176 exec_authorized(char *arg)
178 if (!seen_exec_input(arg)) {
180 "Warning: server attempted to execute batch file %s", arg);
184 return common_authorized(arg, "execute batch file");
193 if (!redir_authorized(p, "redirect to file"))
196 fprintf(stderr, "Warning: dropped weird redirection %s", p);
200 mode = O_WRONLY | O_CREAT;
204 } else if (*p == '!') {
212 fprintf(stderr, "Redirection lacks a file name\n");
217 fd = open(p, mode, 0666);
218 redir_fp = fd < 0 ? NULL : fdopen(fd, "w");
220 fprintf(stderr, "Can't redirect to %s: %s\n",
228 if (!redir_authorized(p, "pipe to shell command"))
231 fprintf(stderr, "Warning: dropped weird pipe %s", p);
235 for (; *p && isspace(*p); p++) ;
237 fprintf(stderr, "Redirection lacks a command\n");
242 p[strlen(p) - 1] = 0;
246 if ((redir_fp = popen(p, "w")) == NULL) {
247 fprintf(stderr, "Can't redirect to pipe %s%s%s\n",
248 p, errno ? ": " : "", errno ? strerror(errno) : "");
257 if (!exec_authorized(p))
262 fprintf(stderr, "Need a file to execute\n");
266 if ((fd = open(p, O_RDONLY)) < 0) {
267 fprintf(stderr, "Can't open batch file %s: %s\n",
282 else if (eight_bit_clean) {
289 } else if (c & 0x80) {