1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
|
/*
* get_sandbox_log.c
*
* Util functions.
*
* Copyright 1999-2008 Gentoo Foundation
* Licensed under the GPL-2
*
* Some parts might have Copyright:
* Copyright (C) 2002 Brad House <brad@mainstreetsoftworks.com>
*/
#include "headers.h"
#include "sbutil.h"
static void _get_sb_log(char *path, const char *tmpdir, const char *env, const char *prefix)
{
char *sandbox_log_env = NULL;
save_errno();
sandbox_log_env = getenv(env);
if (sandbox_log_env) {
/* If the env is viable, roll with it. We aren't really
* about people breaking the security of the sandbox by
* exporting SANDBOX_LOG=/dev/null.
*/
strncpy(path, sandbox_log_env, SB_PATH_MAX);
} else {
/* If running as a user w/out write access to /var/log, don't
* shit ourselves.
*/
const char *sb_log_dir = SANDBOX_LOG_LOCATION;
if (tmpdir && access(sb_log_dir, W_OK))
sb_log_dir = tmpdir;
snprintf(path, SB_PATH_MAX, "%s%s%s%s%d%s",
sb_log_dir, prefix,
(sandbox_log_env == NULL ? "" : sandbox_log_env),
(sandbox_log_env == NULL ? "" : "-"),
getpid(), LOG_FILE_EXT);
}
restore_errno();
}
void get_sandbox_log(char *path, const char *tmpdir)
{
_get_sb_log(path, tmpdir, ENV_SANDBOX_LOG, LOG_FILE_PREFIX);
}
void get_sandbox_debug_log(char *path, const char *tmpdir)
{
_get_sb_log(path, tmpdir, ENV_SANDBOX_DEBUG_LOG, DEBUG_LOG_FILE_PREFIX);
}
void get_sandbox_message_path(char *path)
{
_get_sb_log(path, NULL, ENV_SANDBOX_MESSAGE_PATH, DEBUG_LOG_FILE_PREFIX);
}
|