diff options
| author | Russ Cox <rsc@golang.org> | 2022-01-27 12:59:37 -0500 |
|---|---|---|
| committer | Russ Cox <rsc@golang.org> | 2022-04-29 20:16:31 +0000 |
| commit | 3ce203db80cd1f320f0c597123b918c3b3bb0449 (patch) | |
| tree | b04d8b6179ea82e08f5e39837fb77739f7dc3b35 /src/internal/execabs/execabs.go | |
| parent | 8c5917cd76905b1ab16d41eadc8786e190eeecce (diff) | |
| download | go-3ce203db80cd1f320f0c597123b918c3b3bb0449.tar.xz | |
os/exec: return error when PATH lookup would use current directory
Following discussion on #43724, change os/exec to take the
approach of golang.org/x/sys/execabs, refusing to respect
path entries mentioning relative paths by default.
Code that insists on being able to find executables in relative
directories in the path will need to add a couple lines to override the error.
See the updated package docs in exec.go for more details.
Fixes #43724.
Fixes #43947.
Change-Id: I73c1214f322b60b4167a23e956e933d50470fe13
Reviewed-on: https://go-review.googlesource.com/c/go/+/381374
Reviewed-by: Bryan Mills <bcmills@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Run-TryBot: Bryan Mills <bcmills@google.com>
Diffstat (limited to 'src/internal/execabs/execabs.go')
| -rw-r--r-- | src/internal/execabs/execabs.go | 40 |
1 files changed, 3 insertions, 37 deletions
diff --git a/src/internal/execabs/execabs.go b/src/internal/execabs/execabs.go index 9a05d971da..5f60fbb119 100644 --- a/src/internal/execabs/execabs.go +++ b/src/internal/execabs/execabs.go @@ -12,11 +12,7 @@ package execabs import ( "context" - "fmt" "os/exec" - "path/filepath" - "reflect" - "unsafe" ) var ErrNotFound = exec.ErrNotFound @@ -27,44 +23,14 @@ type ( ExitError = exec.ExitError ) -func relError(file, path string) error { - return fmt.Errorf("%s resolves to executable relative to current directory (.%c%s)", file, filepath.Separator, path) -} - func LookPath(file string) (string, error) { - path, err := exec.LookPath(file) - if err != nil { - return "", err - } - if filepath.Base(file) == file && !filepath.IsAbs(path) { - return "", relError(file, path) - } - return path, nil -} - -func fixCmd(name string, cmd *exec.Cmd) { - if filepath.Base(name) == name && !filepath.IsAbs(cmd.Path) { - // exec.Command was called with a bare binary name and - // exec.LookPath returned a path which is not absolute. - // Set cmd.lookPathErr and clear cmd.Path so that it - // cannot be run. - lookPathErr := (*error)(unsafe.Pointer(reflect.ValueOf(cmd).Elem().FieldByName("lookPathErr").Addr().Pointer())) - if *lookPathErr == nil { - *lookPathErr = relError(name, cmd.Path) - } - cmd.Path = "" - } + return exec.LookPath(file) } func CommandContext(ctx context.Context, name string, arg ...string) *exec.Cmd { - cmd := exec.CommandContext(ctx, name, arg...) - fixCmd(name, cmd) - return cmd - + return exec.CommandContext(ctx, name, arg...) } func Command(name string, arg ...string) *exec.Cmd { - cmd := exec.Command(name, arg...) - fixCmd(name, cmd) - return cmd + return exec.Command(name, arg...) } |
