5 File::Temp - return name and handle of a temporary file safely
11 This module is designed to be portable across operating systems
12 and it currently supports Unix, VMS, DOS, OS/2 and Windows. When
13 porting to a new OS there are generally three main issues
14 that have to be solved:
20 Can the OS unlink an open file? If it can't then the
21 C<_can_unlink_opened_file> method should be modified.
25 Are the return values from C<stat> reliable? By default all the
26 return values from C<stat> are compared when unlinking a temporary
27 file using the filename and the handle. Operating systems other than
28 unix do not always have valid entries in all fields. If C<unlink0> fails
29 then the C<stat> comparison should be modified accordingly.
33 Security. Systems that can not support a test for the sticky bit
34 on a directory can not use the MEDIUM and HIGH security tests.
35 The C<_can_do_level> method should be modified accordingly.
43 use File::Temp qw/ tempfile tempdir /;
45 $dir = tempdir( CLEANUP => 1 );
46 ($fh, $filename) = tempfile( DIR => $dir );
48 ($fh, $filename) = tempfile( $template, DIR => $dir);
49 ($fh, $filename) = tempfile( $template, SUFFIX => '.dat');
55 use File::Temp qw/ :mktemp /;
57 ($fh, $file) = mkstemp( "tmpfileXXXXX" );
58 ($fh, $file) = mkstemps( "tmpfileXXXXXX", $suffix);
60 $tmpdir = mkdtemp( $template );
62 $unopened_file = mktemp( $template );
66 use File::Temp qw/ :POSIX /;
71 ($fh, $file) = tmpnam();
72 ($fh, $file) = tmpfile();
75 Compatibility functions:
77 $unopened_file = File::Temp::tempnam( $dir, $pfx );
81 Objects (NOT YET IMPLEMENTED):
85 $fh = new File::Temp($template);
86 $fname = $fh->filename;
92 C<File::Temp> can be used to create and open temporary files in a safe way.
93 The tempfile() function can be used to return the name and the open
94 filehandle of a temporary file. The tempdir() function can
95 be used to create a temporary directory.
97 The security aspect of temporary file creation is emphasized such that
98 a filehandle and filename are returned together. This helps guarantee
99 that a race condition can not occur where the temporary file is
100 created by another process between checking for the existence of the
101 file and its opening. Additional security levels are provided to
102 check, for example, that the sticky bit is set on world writable
103 directories. See L<"safe_level"> for more information.
105 For compatibility with popular C library functions, Perl implementations of
106 the mkstemp() family of functions are provided. These are, mkstemp(),
107 mkstemps(), mkdtemp() and mktemp().
109 Additionally, implementations of the standard L<POSIX|POSIX>
110 tmpnam() and tmpfile() functions are provided if required.
112 Implementations of mktemp(), tmpnam(), and tempnam() are provided,
113 but should be used with caution since they return only a filename
114 that was valid when function was called, so cannot guarantee
115 that the file will not exist by the time the caller opens the filename.
119 # 5.6.0 gives us S_IWOTH, S_IWGRP, our and auto-vivifying filehandls
120 # People would like a version on 5.005 so give them what they want :-)
125 use File::Path qw/ rmtree /;
127 use Errno qw( EEXIST ENOENT ENOTDIR EINVAL );
128 require VMS::Stdio if $^O eq 'VMS';
130 # Need the Symbol package if we are running older perl
131 require Symbol if $] < 5.006;
134 # use 'our' on v5.6.0
135 use vars qw($VERSION @EXPORT_OK %EXPORT_TAGS $DEBUG);
139 # We are exporting functions
141 use base qw/Exporter/;
143 # Export list - to allow fine tuning of export table
157 # Groups of functions for export
160 'POSIX' => [qw/ tmpnam tmpfile /],
161 'mktemp' => [qw/ mktemp mkstemp mkstemps mkdtemp/],
164 # add contents of these tags to @EXPORT
165 Exporter::export_tags('POSIX','mktemp');
171 # This is a list of characters that can be used in random filenames
173 my @CHARS = (qw/ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
174 a b c d e f g h i j k l m n o p q r s t u v w x y z
175 0 1 2 3 4 5 6 7 8 9 _
178 # Maximum number of tries to make a temp file before failing
180 use constant MAX_TRIES => 10;
182 # Minimum number of X characters that should be in a template
183 use constant MINX => 4;
185 # Default template when no template supplied
187 use constant TEMPXXX => 'X' x 10;
189 # Constants for the security level
191 use constant STANDARD => 0;
192 use constant MEDIUM => 1;
193 use constant HIGH => 2;
195 # OPENFLAGS. If we defined the flag to use with Sysopen here this gives
196 # us an optimisation when many temporary files are requested
198 my $OPENFLAGS = O_CREAT | O_EXCL | O_RDWR;
200 for my $oflag (qw/ FOLLOW BINARY LARGEFILE EXLOCK NOINHERIT /) {
201 my ($bit, $func) = (0, "Fcntl::O_" . $oflag);
203 $OPENFLAGS |= $bit if eval { $bit = &$func(); 1 };
206 # On some systems the O_TEMPORARY flag can be used to tell the OS
207 # to automatically remove the file when it is closed. This is fine
208 # in most cases but not if tempfile is called with UNLINK=>0 and
209 # the filename is requested -- in the case where the filename is to
210 # be passed to another routine. This happens on windows. We overcome
211 # this by using a second open flags variable
213 my $OPENTEMPFLAGS = $OPENFLAGS;
214 for my $oflag (qw/ TEMPORARY /) {
215 my ($bit, $func) = (0, "Fcntl::O_" . $oflag);
217 $OPENTEMPFLAGS |= $bit if eval { $bit = &$func(); 1 };
221 # INTERNAL ROUTINES - not to be used outside of package
223 # Generic routine for getting a temporary filename
224 # modelled on OpenBSD _gettemp() in mktemp.c
226 # The template must contain X's that are to be replaced
227 # with the random values
231 # TEMPLATE - string containing the XXXXX's that is converted
232 # to a random filename and opened if required
234 # Optionally, a hash can also be supplied containing specific options
235 # "open" => if true open the temp file, else just return the name
237 # "mkdir"=> if true, we are creating a temp directory rather than tempfile
239 # "suffixlen" => number of characters at end of PATH to be ignored.
241 # "unlink_on_close" => indicates that, if possible, the OS should remove
242 # the file as soon as it is closed. Usually indicates
243 # use of the O_TEMPORARY flag to sysopen.
244 # Usually irrelevant on unix
246 # "open" and "mkdir" can not both be true
247 # "unlink_on_close" is not used when "mkdir" is true.
249 # The default options are equivalent to mktemp().
252 # filehandle - open file handle (if called with doopen=1, else undef)
253 # temp name - name of the temp file or directory
256 # ($fh, $name) = _gettemp($template, "open" => 1);
258 # for the current version, failures are associated with
259 # a carp to give the reason whilst debugging
263 croak 'Usage: ($fh, $name) = _gettemp($template, OPTIONS);'
264 unless scalar(@_) >= 1;
271 "unlink_on_close" => 0,
275 my $template = shift;
276 if (ref($template)) {
277 carp "File::Temp::_gettemp: template must not be a reference";
281 # Check that the number of entries on stack are even
282 if (scalar(@_) % 2 != 0) {
283 carp "File::Temp::_gettemp: Must have even number of options";
287 # Read the options and merge with defaults
288 %options = (%options, @_) if @_;
290 # Can not open the file and make a directory in a single call
291 if ($options{"open"} && $options{"mkdir"}) {
292 carp "File::Temp::_gettemp: doopen and domkdir can not both be true\n";
296 # Find the start of the end of the Xs (position of last X)
297 # Substr starts from 0
298 my $start = length($template) - 1 - $options{"suffixlen"};
300 # Check that we have at least MINX x X (eg 'XXXX") at the end of the string
301 # (taking suffixlen into account). Any fewer is insecure.
303 # Do it using substr - no reason to use a pattern match since
304 # we know where we are looking and what we are looking for
306 if (substr($template, $start - MINX + 1, MINX) ne 'X' x MINX) {
307 carp "File::Temp::_gettemp: The template must contain at least ". MINX ." 'X' characters\n";
311 # Replace all the X at the end of the substring with a
312 # random character or just all the XX at the end of a full string.
313 # Do it as an if, since the suffix adjusts which section to replace
314 # and suffixlen=0 returns nothing if used in the substr directly
315 # and generate a full path from the template
317 my $path = _replace_XX($template, $options{"suffixlen"});
320 # Split the path into constituent parts - eventually we need to check
321 # whether the directory exists
322 # We need to know whether we are making a temp directory
325 my ($volume, $directories, $file);
326 my $parent; # parent directory
327 if ($options{"mkdir"}) {
328 # There is no filename at the end
329 ($volume, $directories, $file) = File::Spec->splitpath( $path, 1);
331 # The parent is then $directories without the last directory
332 # Split the directory and put it back together again
333 my @dirs = File::Spec->splitdir($directories);
335 # If @dirs only has one entry that means we are in the current
338 $parent = File::Spec->curdir;
341 if ($^O eq 'VMS') { # need volume to avoid relative dir spec
342 $parent = File::Spec->catdir($volume, @dirs[0..$#dirs-1]);
345 # Put it back together without the last one
346 $parent = File::Spec->catdir(@dirs[0..$#dirs-1]);
348 # ...and attach the volume (no filename)
349 $parent = File::Spec->catpath($volume, $parent, '');
356 # Get rid of the last filename (use File::Basename for this?)
357 ($volume, $directories, $file) = File::Spec->splitpath( $path );
359 # Join up without the file part
360 $parent = File::Spec->catpath($volume,$directories,'');
362 # If $parent is empty replace with curdir
363 $parent = File::Spec->curdir
364 unless $directories ne '';
368 # Check that the parent directories exist
369 # Do this even for the case where we are simply returning a name
370 # not a file -- no point returning a name that includes a directory
371 # that does not exist or is not writable
373 unless (-d $parent && -w _) {
374 carp "File::Temp::_gettemp: Parent directory ($parent) is not a directory"
375 . " or is not writable\n";
379 # Check the stickiness of the directory and chown giveaway if required
380 # If the directory is world writable the sticky bit
383 if (File::Temp->safe_level == MEDIUM) {
384 unless (_is_safe($parent)) {
385 carp "File::Temp::_gettemp: Parent directory ($parent) is not safe (sticky bit not set when world writable?)";
388 } elsif (File::Temp->safe_level == HIGH) {
389 unless (_is_verysafe($parent)) {
390 carp "File::Temp::_gettemp: Parent directory ($parent) is not safe (sticky bit not set when world writable?)";
396 # Now try MAX_TRIES time to open the file
397 for (my $i = 0; $i < MAX_TRIES; $i++) {
399 # Try to open the file if requested
400 if ($options{"open"}) {
403 # If we are running before perl5.6.0 we can not auto-vivify
405 $fh = &Symbol::gensym;
408 # Try to make sure this will be marked close-on-exec
409 # XXX: Win32 doesn't respect this, nor the proper fcntl,
410 # but may have O_NOINHERIT. This may or may not be in Fcntl.
413 # Store callers umask
419 # Attempt to open the file
420 my $open_success = undef;
421 if ( $^O eq 'VMS' and $options{"unlink_on_close"} ) {
422 # make it auto delete on close by setting FAB$V_DLT bit
423 $fh = VMS::Stdio::vmssysopen($path, $OPENFLAGS, 0600, 'fop=dlt');
426 my $flags = ( $options{"unlink_on_close"} ?
429 $open_success = sysopen($fh, $path, $flags, 0600);
431 if ( $open_success ) {
436 # Opened successfully - return file handle and name
443 # Error opening file - abort with error
444 # if the reason was anything but EEXIST
445 unless ($! == EEXIST) {
446 carp "File::Temp: Could not create temp file $path: $!";
450 # Loop round for another try
453 } elsif ($options{"mkdir"}) {
455 # Store callers umask
461 # Open the temp directory
462 if (mkdir( $path, 0700)) {
473 # Abort with error if the reason for failure was anything
475 unless ($! == EEXIST) {
476 carp "File::Temp: Could not create directory $path: $!";
480 # Loop round for another try
486 # Return true if the file can not be found
487 # Directory has been checked previously
489 return (undef, $path) unless -e $path;
491 # Try again until MAX_TRIES
495 # Did not successfully open the tempfile/dir
496 # so try again with a different set of random letters
497 # No point in trying to increment unless we have only
498 # 1 X say and the randomness could come up with the same
499 # file MAX_TRIES in a row.
501 # Store current attempt - in principal this implies that the
502 # 3rd time around the open attempt that the first temp file
503 # name could be generated again. Probably should store each
504 # attempt and make sure that none are repeated
506 my $original = $path;
507 my $counter = 0; # Stop infinite loop
512 # Generate new name from original template
513 $path = _replace_XX($template, $options{"suffixlen"});
517 } until ($path ne $original || $counter > $MAX_GUESS);
519 # Check for out of control looping
520 if ($counter > $MAX_GUESS) {
521 carp "Tried to get a new temp name different to the previous value $MAX_GUESS times.\nSomething wrong with template?? ($template)";
527 # If we get here, we have run out of tries
528 carp "Have exceeded the maximum number of attempts (".MAX_TRIES .
529 ") to open temp file/dir";
535 # Internal routine to return a random character from the
536 # character list. Does not do an srand() since rand()
537 # will do one automatically
539 # No arguments. Return value is the random character
541 # No longer called since _replace_XX runs a few percent faster if
542 # I inline the code. This is important if we are creating thousands of
547 $CHARS[ int( rand( $#CHARS ) ) ];
551 # Internal routine to replace the XXXX... with random characters
552 # This has to be done by _gettemp() every time it fails to
553 # open a temp file/dir
555 # Arguments: $template (the template with XXX),
556 # $ignore (number of characters at end to ignore)
558 # Returns: modified template
562 croak 'Usage: _replace_XX($template, $ignore)'
563 unless scalar(@_) == 2;
565 my ($path, $ignore) = @_;
567 # Do it as an if, since the suffix adjusts which section to replace
568 # and suffixlen=0 returns nothing if used in the substr directly
569 # Alternatively, could simply set $ignore to length($path)-1
570 # Don't want to always use substr when not required though.
573 substr($path, 0, - $ignore) =~ s/X(?=X*\z)/$CHARS[ int( rand( $#CHARS ) ) ]/ge;
575 $path =~ s/X(?=X*\z)/$CHARS[ int( rand( $#CHARS ) ) ]/ge;
581 # internal routine to check to see if the directory is safe
582 # First checks to see if the directory is not owned by the
583 # current user or root. Then checks to see if anyone else
584 # can write to the directory and if so, checks to see if
585 # it has the sticky bit set
587 # Will not work on systems that do not support sticky bit
589 #Args: directory path to check
590 # Returns true if the path is safe and false otherwise.
591 # Returns undef if can not even run stat() on the path
593 # This routine based on version written by Tom Christiansen
595 # Presumably, by the time we actually attempt to create the
596 # file or directory in this directory, it may not be safe
597 # anymore... Have to run _is_safe directly after the open.
604 my @info = stat($path);
605 return 0 unless scalar(@info);
606 return 1 if $^O eq 'VMS'; # owner delete control at file level
608 # Check to see whether owner is neither superuser (or a system uid) nor me
609 # Use the real uid from the $< variable
611 if ( $info[4] > File::Temp->top_system_uid() && $info[4] != $<) {
612 carp "Directory owned neither by root nor the current user";
616 # check whether group or other can write file
617 # use 066 to detect either reading or writing
618 # use 022 to check writability
619 # Do it with S_IWOTH and S_IWGRP for portability (maybe)
621 if (($info[2] & &Fcntl::S_IWGRP) || # Is group writable?
622 ($info[2] & &Fcntl::S_IWOTH) ) { # Is world writable?
623 return 0 unless -d _; # Must be a directory
624 return 0 unless -k _; # Must be sticky
630 # Internal routine to check whether a directory is safe
631 # for temp files. Safer than _is_safe since it checks for
632 # the possibility of chown giveaway and if that is a possibility
633 # checks each directory in the path to see if it is safe (with _is_safe)
635 # If _PC_CHOWN_RESTRICTED is not set, does the full test of each
640 # Need POSIX - but only want to bother if really necessary due to overhead
644 return 1 if $^O eq 'VMS'; # owner delete control at file level
646 # Should Get the value of _PC_CHOWN_RESTRICTED if it is defined
647 # and If it is not there do the extensive test
648 my $chown_restricted;
649 $chown_restricted = &POSIX::_PC_CHOWN_RESTRICTED()
650 if eval { &POSIX::_PC_CHOWN_RESTRICTED(); 1};
652 # If chown_resticted is set to some value we should test it
653 if (defined $chown_restricted) {
655 # Return if the current directory is safe
656 return _is_safe($path) if POSIX::sysconf( $chown_restricted );
660 # To reach this point either, the _PC_CHOWN_RESTRICTED symbol
661 # was not avialable or the symbol was there but chown giveaway
662 # is allowed. Either way, we now have to test the entire tree for
665 # Convert path to an absolute directory if required
666 unless (File::Spec->file_name_is_absolute($path)) {
667 $path = File::Spec->rel2abs($path);
670 # Split directory into components - assume no file
671 my ($volume, $directories, undef) = File::Spec->splitpath( $path, 1);
673 # Slightly less efficient than having a a function in File::Spec
674 # to chop off the end of a directory or even a function that
675 # can handle ../ in a directory tree
676 # Sometimes splitdir() returns a blank at the end
677 # so we will probably check the bottom directory twice in some cases
678 my @dirs = File::Spec->splitdir($directories);
680 # Concatenate one less directory each time around
681 foreach my $pos (0.. $#dirs) {
682 # Get a directory name
683 my $dir = File::Spec->catpath($volume,
684 File::Spec->catdir(@dirs[0.. $#dirs - $pos]),
688 print "TESTING DIR $dir\n" if $DEBUG;
690 # Check the directory
691 return 0 unless _is_safe($dir);
700 # internal routine to determine whether unlink works on this
701 # platform for files that are currently open.
702 # Returns true if we can, false otherwise.
704 # Currently WinNT, OS/2 and VMS can not unlink an opened file
705 # On VMS this is because the O_EXCL flag is used to open the
706 # temporary file. Currently I do not know enough about the issues
707 # on VMS to decide whether O_EXCL is a requirement.
709 sub _can_unlink_opened_file {
711 if ($^O eq 'MSWin32' || $^O eq 'os2' || $^O eq 'VMS' || $^O eq 'dos') {
719 # internal routine to decide which security levels are allowed
720 # see safe_level() for more information on this
722 # Controls whether the supplied security level is allowed
724 # $cando = _can_do_level( $level )
731 # Always have to be able to do STANDARD
732 return 1 if $level == STANDARD;
734 # Currently, the systems that can do HIGH or MEDIUM are identical
735 if ( $^O eq 'MSWin32' || $^O eq 'os2' || $^O eq 'cygwin' || $^O eq 'dos') {
743 # This routine sets up a deferred unlinking of a specified
744 # filename and filehandle. It is used in the following cases:
745 # - Called by unlink0 if an opened file can not be unlinked
746 # - Called by tempfile() if files are to be removed on shutdown
747 # - Called by tempdir() if directories are to be removed on shutdown
750 # _deferred_unlink( $fh, $fname, $isdir );
752 # - filehandle (so that it can be expclicitly closed if open
753 # - filename (the thing we want to remove)
754 # - isdir (flag to indicate that we are being given a directory)
755 # [and hence no filehandle]
757 # Status is not referred to since all the magic is done with an END block
760 # Will set up two lexical variables to contain all the files to be
761 # removed. One array for files, another for directories
762 # They will only exist in this block
763 # This means we only have to set up a single END block to remove all files
764 # @files_to_unlink contains an array ref with the filehandle and filename
765 my (@files_to_unlink, @dirs_to_unlink);
767 # Set up an end block to use these arrays
770 foreach my $file (@files_to_unlink) {
771 # close the filehandle without checking its state
772 # in order to make real sure that this is closed
773 # if its already closed then I dont care about the answer
774 # probably a better way to do this
775 close($file->[0]); # file handle is [0]
777 if (-f $file->[1]) { # file name is [1]
778 unlink $file->[1] or warn "Error removing ".$file->[1];
782 foreach my $dir (@dirs_to_unlink) {
784 rmtree($dir, $DEBUG, 1);
791 # This is the sub called to register a file for deferred unlinking
792 # This could simply store the input parameters and defer everything
793 # until the END block. For now we do a bit of checking at this
794 # point in order to make sure that (1) we have a file/dir to delete
795 # and (2) we have been called with the correct arguments.
796 sub _deferred_unlink {
798 croak 'Usage: _deferred_unlink($fh, $fname, $isdir)'
799 unless scalar(@_) == 3;
801 my ($fh, $fname, $isdir) = @_;
803 warn "Setting up deferred removal of $fname\n"
806 # If we have a directory, check that it is a directory
811 # Directory exists so store it
812 # first on VMS turn []foo into [.foo] for rmtree
813 $fname = VMS::Filespec::vmspath($fname) if $^O eq 'VMS';
814 push (@dirs_to_unlink, $fname);
817 carp "Request to remove directory $fname could not be completed since it does not exist!\n";
824 # file exists so store handle and name for later removal
825 push(@files_to_unlink, [$fh, $fname]);
828 carp "Request to remove file $fname could not be completed since it is not there!\n";
840 This section describes the recommended interface for generating
841 temporary files and directories.
847 This is the basic function to generate temporary files.
848 The behaviour of the file can be changed using various options:
850 ($fh, $filename) = tempfile();
852 Create a temporary file in the directory specified for temporary
853 files, as specified by the tmpdir() function in L<File::Spec>.
855 ($fh, $filename) = tempfile($template);
857 Create a temporary file in the current directory using the supplied
858 template. Trailing `X' characters are replaced with random letters to
859 generate the filename. At least four `X' characters must be present
862 ($fh, $filename) = tempfile($template, SUFFIX => $suffix)
864 Same as previously, except that a suffix is added to the template
865 after the `X' translation. Useful for ensuring that a temporary
866 filename has a particular extension when needed by other applications.
867 But see the WARNING at the end.
869 ($fh, $filename) = tempfile($template, DIR => $dir);
871 Translates the template as before except that a directory name
874 ($fh, $filename) = tempfile($template, UNLINK => 1);
876 Return the filename and filehandle as before except that the file is
877 automatically removed when the program exits. Default is for the file
878 to be removed if a file handle is requested and to be kept if the
879 filename is requested.
881 If the template is not specified, a template is always
882 automatically generated. This temporary file is placed in tmpdir()
883 (L<File::Spec>) unless a directory is specified explicitly with the
886 $fh = tempfile( $template, DIR => $dir );
888 If called in scalar context, only the filehandle is returned
889 and the file will automatically be deleted when closed (see
890 the description of tmpfile() elsewhere in this document).
891 This is the preferred mode of operation, as if you only
892 have a filehandle, you can never create a race condition
893 by fumbling with the filename. On systems that can not unlink
894 an open file (for example, Windows NT) the file is marked for
895 deletion when the program ends (equivalent to setting UNLINK to 1).
897 (undef, $filename) = tempfile($template, OPEN => 0);
899 This will return the filename based on the template but
900 will not open this file. Cannot be used in conjunction with
901 UNLINK set to true. Default is to always open the file
902 to protect from possible race conditions. A warning is issued
903 if warnings are turned on. Consider using the tmpnam()
904 and mktemp() functions described elsewhere in this document
905 if opening the file is not required.
907 Options can be combined as required.
913 # Can not check for argument count since we can have any
918 "DIR" => undef, # Directory prefix
919 "SUFFIX" => '', # Template suffix
920 "UNLINK" => 0, # Do not unlink file on exit
921 "OPEN" => 1, # Open file
924 # Check to see whether we have an odd or even number of arguments
925 my $template = (scalar(@_) % 2 == 1 ? shift(@_) : undef);
927 # Read the options and merge with defaults
928 %options = (%options, @_) if @_;
930 # First decision is whether or not to open the file
931 if (! $options{"OPEN"}) {
933 warn "tempfile(): temporary filename requested but not opened.\nPossibly unsafe, consider using tempfile() with OPEN set to true\n"
938 if ($options{"DIR"} and $^O eq 'VMS') {
940 # on VMS turn []foo into [.foo] for concatenation
941 $options{"DIR"} = VMS::Filespec::vmspath($options{"DIR"});
944 # Construct the template
946 # Have a choice of trying to work around the mkstemp/mktemp/tmpnam etc
947 # functions or simply constructing a template and using _gettemp()
948 # explicitly. Go for the latter
950 # First generate a template if not defined and prefix the directory
951 # If no template must prefix the temp directory
952 if (defined $template) {
953 if ($options{"DIR"}) {
955 $template = File::Spec->catfile($options{"DIR"}, $template);
961 if ($options{"DIR"}) {
963 $template = File::Spec->catfile($options{"DIR"}, TEMPXXX);
967 $template = File::Spec->catfile(File::Spec->tmpdir, TEMPXXX);
974 $template .= $options{"SUFFIX"};
978 croak "Error in tempfile() using $template"
979 unless (($fh, $path) = _gettemp($template,
980 "open" => $options{'OPEN'},
982 "unlink_on_close" => $options{'UNLINK'},
983 "suffixlen" => length($options{'SUFFIX'}),
986 # Set up an exit handler that can do whatever is right for the
987 # system. Do not check return status since this is all done with
989 _deferred_unlink($fh, $path, 0) if $options{"UNLINK"};
994 if ($options{'OPEN'}) {
997 return (undef, $path);
1002 # Unlink the file. It is up to unlink0 to decide what to do with
1003 # this (whether to unlink now or to defer until later)
1004 unlink0($fh, $path) or croak "Error unlinking file $path using unlink0";
1006 # Return just the filehandle.
1015 This is the recommended interface for creation of temporary directories.
1016 The behaviour of the function depends on the arguments:
1018 $tempdir = tempdir();
1020 Create a directory in tmpdir() (see L<File::Spec|File::Spec>).
1022 $tempdir = tempdir( $template );
1024 Create a directory from the supplied template. This template is
1025 similar to that described for tempfile(). `X' characters at the end
1026 of the template are replaced with random letters to construct the
1027 directory name. At least four `X' characters must be in the template.
1029 $tempdir = tempdir ( DIR => $dir );
1031 Specifies the directory to use for the temporary directory.
1032 The temporary directory name is derived from an internal template.
1034 $tempdir = tempdir ( $template, DIR => $dir );
1036 Prepend the supplied directory name to the template. The template
1037 should not include parent directory specifications itself. Any parent
1038 directory specifications are removed from the template before
1039 prepending the supplied directory.
1041 $tempdir = tempdir ( $template, TMPDIR => 1 );
1043 Using the supplied template, creat the temporary directory in
1044 a standard location for temporary files. Equivalent to doing
1046 $tempdir = tempdir ( $template, DIR => File::Spec->tmpdir);
1048 but shorter. Parent directory specifications are stripped from the
1049 template itself. The C<TMPDIR> option is ignored if C<DIR> is set
1050 explicitly. Additionally, C<TMPDIR> is implied if neither a template
1051 nor a directory are supplied.
1053 $tempdir = tempdir( $template, CLEANUP => 1);
1055 Create a temporary directory using the supplied template, but
1056 attempt to remove it (and all files inside it) when the program
1057 exits. Note that an attempt will be made to remove all files from
1058 the directory even if they were not created by this module (otherwise
1059 why ask to clean it up?). The directory removal is made with
1060 the rmtree() function from the L<File::Path|File::Path> module.
1061 Of course, if the template is not specified, the temporary directory
1062 will be created in tmpdir() and will also be removed at program exit.
1070 # Can not check for argument count since we can have any
1075 "CLEANUP" => 0, # Remove directory on exit
1076 "DIR" => '', # Root directory
1077 "TMPDIR" => 0, # Use tempdir with template
1080 # Check to see whether we have an odd or even number of arguments
1081 my $template = (scalar(@_) % 2 == 1 ? shift(@_) : undef );
1083 # Read the options and merge with defaults
1084 %options = (%options, @_) if @_;
1086 # Modify or generate the template
1088 # Deal with the DIR and TMPDIR options
1089 if (defined $template) {
1091 # Need to strip directory path if using DIR or TMPDIR
1092 if ($options{'TMPDIR'} || $options{'DIR'}) {
1094 # Strip parent directory from the filename
1096 # There is no filename at the end
1097 $template = VMS::Filespec::vmspath($template) if $^O eq 'VMS';
1098 my ($volume, $directories, undef) = File::Spec->splitpath( $template, 1);
1100 # Last directory is then our template
1101 $template = (File::Spec->splitdir($directories))[-1];
1103 # Prepend the supplied directory or temp dir
1104 if ($options{"DIR"}) {
1106 $template = File::Spec->catfile($options{"DIR"}, $template);
1108 } elsif ($options{TMPDIR}) {
1111 $template = File::Spec->catdir(File::Spec->tmpdir, $template);
1119 if ($options{"DIR"}) {
1121 $template = File::Spec->catdir($options{"DIR"}, TEMPXXX);
1125 $template = File::Spec->catdir(File::Spec->tmpdir, TEMPXXX);
1131 # Create the directory
1134 if ($^O eq 'VMS') { # dir names can end in delimiters
1135 $template =~ m/([\.\]:>]+)$/;
1136 $suffixlen = length($1);
1138 croak "Error in tempdir() using $template"
1139 unless ((undef, $tempdir) = _gettemp($template,
1142 "suffixlen" => $suffixlen,
1145 # Install exit handler; must be dynamic to get lexical
1146 if ( $options{'CLEANUP'} && -d $tempdir) {
1147 _deferred_unlink(undef, $tempdir, 1);
1150 # Return the dir name
1157 =head1 MKTEMP FUNCTIONS
1159 The following functions are Perl implementations of the
1160 mktemp() family of temp file generation system calls.
1166 Given a template, returns a filehandle to the temporary file and the name
1169 ($fh, $name) = mkstemp( $template );
1171 In scalar context, just the filehandle is returned.
1173 The template may be any filename with some number of X's appended
1174 to it, for example F</tmp/temp.XXXX>. The trailing X's are replaced
1175 with unique alphanumeric combinations.
1183 croak "Usage: mkstemp(template)"
1186 my $template = shift;
1189 croak "Error in mkstemp using $template"
1190 unless (($fh, $path) = _gettemp($template,
1197 return ($fh, $path);
1207 Similar to mkstemp(), except that an extra argument can be supplied
1208 with a suffix to be appended to the template.
1210 ($fh, $name) = mkstemps( $template, $suffix );
1212 For example a template of C<testXXXXXX> and suffix of C<.dat>
1213 would generate a file similar to F<testhGji_w.dat>.
1215 Returns just the filehandle alone when called in scalar context.
1221 croak "Usage: mkstemps(template, suffix)"
1225 my $template = shift;
1228 $template .= $suffix;
1231 croak "Error in mkstemps using $template"
1232 unless (($fh, $path) = _gettemp($template,
1235 "suffixlen" => length($suffix),
1239 return ($fh, $path);
1248 Create a directory from a template. The template must end in
1249 X's that are replaced by the routine.
1251 $tmpdir_name = mkdtemp($template);
1253 Returns the name of the temporary directory created.
1254 Returns undef on failure.
1256 Directory must be removed by the caller.
1264 croak "Usage: mkdtemp(template)"
1267 my $template = shift;
1269 if ($^O eq 'VMS') { # dir names can end in delimiters
1270 $template =~ m/([\.\]:>]+)$/;
1271 $suffixlen = length($1);
1273 my ($junk, $tmpdir);
1274 croak "Error creating temp directory from template $template\n"
1275 unless (($junk, $tmpdir) = _gettemp($template,
1278 "suffixlen" => $suffixlen,
1287 Returns a valid temporary filename but does not guarantee
1288 that the file will not be opened by someone else.
1290 $unopened_file = mktemp($template);
1292 Template is the same as that required by mkstemp().
1298 croak "Usage: mktemp(template)"
1301 my $template = shift;
1303 my ($tmpname, $junk);
1304 croak "Error getting name to temp file from template $template\n"
1305 unless (($junk, $tmpname) = _gettemp($template,
1316 =head1 POSIX FUNCTIONS
1318 This section describes the re-implementation of the tmpnam()
1319 and tmpfile() functions described in L<POSIX>
1320 using the mkstemp() from this module.
1322 Unlike the L<POSIX|POSIX> implementations, the directory used
1323 for the temporary file is not specified in a system include
1324 file (C<P_tmpdir>) but simply depends on the choice of tmpdir()
1325 returned by L<File::Spec|File::Spec>. On some implementations this
1326 location can be set using the C<TMPDIR> environment variable, which
1328 If this is a problem, simply use mkstemp() and specify a template.
1334 When called in scalar context, returns the full name (including path)
1335 of a temporary file (uses mktemp()). The only check is that the file does
1336 not already exist, but there is no guarantee that that condition will
1341 When called in list context, a filehandle to the open file and
1342 a filename are returned. This is achieved by calling mkstemp()
1343 after constructing a suitable template.
1345 ($fh, $file) = tmpnam();
1347 If possible, this form should be used to prevent possible
1350 See L<File::Spec/tmpdir> for information on the choice of temporary
1351 directory for a particular operating system.
1357 # Retrieve the temporary directory name
1358 my $tmpdir = File::Spec->tmpdir;
1360 croak "Error temporary directory is not writable"
1363 # Use a ten character template and append to tmpdir
1364 my $template = File::Spec->catfile($tmpdir, TEMPXXX);
1367 return mkstemp($template);
1369 return mktemp($template);
1376 In scalar context, returns the filehandle of a temporary file.
1380 The file is removed when the filehandle is closed or when the program
1381 exits. No access to the filename is provided.
1387 # Simply call tmpnam() in a list context
1388 my ($fh, $file) = tmpnam();
1390 # Make sure file is removed when filehandle is closed
1391 unlink0($fh, $file) or croak "Unable to unlink temporary file: $!";
1399 =head1 ADDITIONAL FUNCTIONS
1401 These functions are provided for backwards compatibility
1402 with common tempfile generation C library functions.
1404 They are not exported and must be addressed using the full package
1411 Return the name of a temporary file in the specified directory
1412 using a prefix. The file is guaranteed not to exist at the time
1413 the function was called, but such guarantees are good for one
1414 clock tick only. Always use the proper form of C<sysopen>
1415 with C<O_CREAT | O_EXCL> if you must open such a filename.
1417 $filename = File::Temp::tempnam( $dir, $prefix );
1419 Equivalent to running mktemp() with $dir/$prefixXXXXXXXX
1420 (using unix file convention as an example)
1422 Because this function uses mktemp(), it can suffer from race conditions.
1428 croak 'Usage tempnam($dir, $prefix)' unless scalar(@_) == 2;
1430 my ($dir, $prefix) = @_;
1432 # Add a string to the prefix
1433 $prefix .= 'XXXXXXXX';
1435 # Concatenate the directory to the file
1436 my $template = File::Spec->catfile($dir, $prefix);
1438 return mktemp($template);
1444 =head1 UTILITY FUNCTIONS
1446 Useful functions for dealing with the filehandle and filename.
1452 Given an open filehandle and the associated filename, make a safe
1453 unlink. This is achieved by first checking that the filename and
1454 filehandle initially point to the same file and that the number of
1455 links to the file is 1 (all fields returned by stat() are compared).
1456 Then the filename is unlinked and the filehandle checked once again to
1457 verify that the number of links on that file is now 0. This is the
1458 closest you can come to making sure that the filename unlinked was the
1459 same as the file whose descriptor you hold.
1461 unlink0($fh, $path) or die "Error unlinking file $path safely";
1463 Returns false on error. The filehandle is not closed since on some
1464 occasions this is not required.
1466 On some platforms, for example Windows NT, it is not possible to
1467 unlink an open file (the file must be closed first). On those
1468 platforms, the actual unlinking is deferred until the program ends and
1469 good status is returned. A check is still performed to make sure that
1470 the filehandle and filename are pointing to the same thing (but not at
1471 the time the end block is executed since the deferred removal may not
1472 have access to the filehandle).
1474 Additionally, on Windows NT not all the fields returned by stat() can
1475 be compared. For example, the C<dev> and C<rdev> fields seem to be
1476 different. Also, it seems that the size of the file returned by stat()
1477 does not always agree, with C<stat(FH)> being more accurate than
1478 C<stat(filename)>, presumably because of caching issues even when
1479 using autoflush (this is usually overcome by waiting a while after
1480 writing to the tempfile before attempting to C<unlink0> it).
1482 Finally, on NFS file systems the link count of the file handle does
1483 not always go to zero immediately after unlinking. Currently, this
1484 command is expected to fail on NFS disks.
1490 croak 'Usage: unlink0(filehandle, filename)'
1491 unless scalar(@_) == 2;
1494 my ($fh, $path) = @_;
1496 warn "Unlinking $path using unlink0\n"
1499 # Stat the filehandle
1502 if ($fh[3] > 1 && $^W) {
1503 carp "unlink0: fstat found too many links; SB=@fh";
1507 my @path = stat $path;
1510 carp "unlink0: $path is gone already" if $^W;
1514 # this is no longer a file, but may be a directory, or worse
1516 confess "panic: $path is no longer a file: SB=@fh";
1519 # Do comparison of each member of the array
1520 # On WinNT dev and rdev seem to be different
1521 # depending on whether it is a file or a handle.
1522 # Cannot simply compare all members of the stat return
1523 # Select the ones we can use
1524 my @okstat = (0..$#fh); # Use all by default
1525 if ($^O eq 'MSWin32') {
1526 @okstat = (1,2,3,4,5,7,8,9,10);
1527 } elsif ($^O eq 'os2') {
1528 @okstat = (0, 2..$#fh);
1529 } elsif ($^O eq 'VMS') { # device and file ID are sufficient
1531 } elsif ($^O eq 'dos') {
1532 @okstat = (0,2..7,11..$#fh);
1535 # Now compare each entry explicitly by number
1537 print "Comparing: $_ : $fh[$_] and $path[$_]\n" if $DEBUG;
1538 # Use eq rather than == since rdev, blksize, and blocks (6, 11,
1539 # and 12) will be '' on platforms that do not support them. This
1540 # is fine since we are only comparing integers.
1541 unless ($fh[$_] eq $path[$_]) {
1542 warn "Did not match $_ element of stat\n" if $DEBUG;
1547 # attempt remove the file (does not work on some platforms)
1548 if (_can_unlink_opened_file()) {
1549 # XXX: do *not* call this on a directory; possible race
1550 # resulting in recursive removal
1551 croak "unlink0: $path has become a directory!" if -d $path;
1552 unlink($path) or return 0;
1554 # Stat the filehandle
1557 print "Link count = $fh[3] \n" if $DEBUG;
1559 # Make sure that the link count is zero
1560 # - Cygwin provides deferred unlinking, however,
1561 # on Win9x the link count remains 1
1562 return ( $fh[3] == 0 or $^O eq 'cygwin' ? 1 : 0);
1565 _deferred_unlink($fh, $path, 0);
1573 =head1 PACKAGE VARIABLES
1575 These functions control the global state of the package.
1581 Controls the lengths to which the module will go to check the safety of the
1582 temporary file or directory before proceeding.
1589 Do the basic security measures to ensure the directory exists and
1590 is writable, that the umask() is fixed before opening of the file,
1591 that temporary files are opened only if they do not already exist, and
1592 that possible race conditions are avoided. Finally the L<unlink0|"unlink0">
1593 function is used to remove files safely.
1597 In addition to the STANDARD security, the output directory is checked
1598 to make sure that it is owned either by root or the user running the
1599 program. If the directory is writable by group or by other, it is then
1600 checked to make sure that the sticky bit is set.
1602 Will not work on platforms that do not support the C<-k> test
1607 In addition to the MEDIUM security checks, also check for the
1608 possibility of ``chown() giveaway'' using the L<POSIX|POSIX>
1609 sysconf() function. If this is a possibility, each directory in the
1610 path is checked in turn for safeness, recursively walking back to the
1613 For platforms that do not support the L<POSIX|POSIX>
1614 C<_PC_CHOWN_RESTRICTED> symbol (for example, Windows NT) it is
1615 assumed that ``chown() giveaway'' is possible and the recursive test
1620 The level can be changed as follows:
1622 File::Temp->safe_level( File::Temp::HIGH );
1624 The level constants are not exported by the module.
1626 Currently, you must be running at least perl v5.6.0 in order to
1627 run with MEDIUM or HIGH security. This is simply because the
1628 safety tests use functions from L<Fcntl|Fcntl> that are not
1629 available in older versions of perl. The problem is that the version
1630 number for Fcntl is the same in perl 5.6.0 and in 5.005_03 even though
1631 they are different versions.
1633 On systems that do not support the HIGH or MEDIUM safety levels
1634 (for example Win NT or OS/2) any attempt to change the level will
1635 be ignored. The decision to ignore rather than raise an exception
1636 allows portable programs to be written with high security in mind
1637 for the systems that can support this without those programs failing
1638 on systems where the extra tests are irrelevant.
1640 If you really need to see whether the change has been accepted
1641 simply examine the return value of C<safe_level>.
1643 $newlevel = File::Temp->safe_level( File::Temp::HIGH );
1644 die "Could not change to high security"
1645 if $newlevel != File::Temp::HIGH;
1650 # protect from using the variable itself
1651 my $LEVEL = STANDARD;
1656 if (($level != STANDARD) && ($level != MEDIUM) && ($level != HIGH)) {
1657 carp "safe_level: Specified level ($level) not STANDARD, MEDIUM or HIGH - ignoring\n";
1659 # Dont allow this on perl 5.005 or earlier
1660 if ($] < 5.006 && $level != STANDARD) {
1661 # Cant do MEDIUM or HIGH checks
1662 croak "Currently requires perl 5.006 or newer to do the safe checks";
1664 # Check that we are allowed to change level
1665 # Silently ignore if we can not.
1666 $LEVEL = $level if _can_do_level($level);
1675 This is the highest UID on the current system that refers to a root
1676 UID. This is used to make sure that the temporary directory is
1677 owned by a system UID (C<root>, C<bin>, C<sys> etc) rather than
1680 This is required since on many unix systems C</tmp> is not owned
1683 Default is to assume that any UID less than or equal to 10 is a root
1686 File::Temp->top_system_uid(10);
1687 my $topid = File::Temp->top_system_uid;
1689 This value can be adjusted to reduce security checking if required.
1690 The value is only relevant when C<safe_level> is set to MEDIUM or higher.
1697 my $TopSystemUID = 10;
1698 sub top_system_uid {
1702 croak "top_system_uid: UIDs should be numeric"
1703 unless $newuid =~ /^\d+$/s;
1704 $TopSystemUID = $newuid;
1706 return $TopSystemUID;
1712 For maximum security, endeavour always to avoid ever looking at,
1713 touching, or even imputing the existence of the filename. You do not
1714 know that that filename is connected to the same file as the handle
1715 you have, and attempts to check this can only trigger more race
1716 conditions. It's far more secure to use the filehandle alone and
1717 dispense with the filename altogether.
1719 If you need to pass the handle to something that expects a filename
1720 then, on a unix system, use C<"/dev/fd/" . fileno($fh)> for arbitrary
1721 programs, or more generally C<< "+<=&" . fileno($fh) >> for Perl
1722 programs. You will have to clear the close-on-exec bit on that file
1723 descriptor before passing it to another process.
1725 use Fcntl qw/F_SETFD F_GETFD/;
1726 fcntl($tmpfh, F_SETFD, 0)
1727 or die "Can't clear close-on-exec flag on temp fh: $!\n";
1731 Originally began life in May 1999 as an XS interface to the system
1732 mkstemp() function. In March 2000, the OpenBSD mkstemp() code was
1733 translated to Perl for total control of the code's
1734 security checking, to ensure the presence of the function regardless of
1735 operating system and to help with portability.
1739 L<POSIX/tmpnam>, L<POSIX/tmpfile>, L<File::Spec>, L<File::Path>
1741 See L<File::MkTemp> for a different implementation of temporary
1746 Tim Jenness E<lt>t.jenness@jach.hawaii.eduE<gt>
1748 Copyright (C) 1999, 2000 Tim Jenness and the UK Particle Physics and
1749 Astronomy Research Council. All Rights Reserved. This program is free
1750 software; you can redistribute it and/or modify it under the same
1751 terms as Perl itself.
1753 Original Perl implementation loosely based on the OpenBSD C code for
1754 mkstemp(). Thanks to Tom Christiansen for suggesting that this module
1755 should be written and providing ideas for code improvements and
1756 security enhancements.