I am using Python's subprocess
module to call some Linux command line functions. The documentation explains the shell=True
argument as
If shell is
True
, the specified command will be executed through the shell
There are two examples, which seem the same to me from a descriptive viewpoint (i.e. both of them call some command-line command), but one of them uses shell=True
and the other does not
>>> subprocess.call(["ls", "-l"])
0
>>> subprocess.call("exit 1", shell=True)
1
My question is:
shell=False
do, in contrast to shell=True
? subprocess.call
and check_call
and check_output
all must execute the argument through the shell. In other words, how can it possibly not execute the argument through the shell?It would also be helpful to get some examples of:
shell=True
that can't be done with
shell=False
and why they can't be done.shell=True
or False
and why it doesn't matterFrom the docs: args is required for all calls and should be a string, or a sequence of program arguments. Providing a sequence of arguments is generally preferred, as it allows the module to take care of any required escaping and quoting of arguments (e.g. to permit spaces in file names).
We should avoid using 'shell=true' in subprocess call to avoid shell injection vulnerabilities. In this call you have to pass a string as a command to the shell. If call_method is user controlled then it can be used to execute any arbitrary command which can affect system.
subprocess-shell-true | Semgrep. Found 'subprocess' function '$FUNC' with 'shell=True'. This is dangerous because this call will spawn the command using a shell process. Doing so propagates current shell settings and variables, which makes it much easier for a malicious actor to execute commands.
DESCRIPTION top. The popen() function opens a process by creating a pipe, forking, and invoking the shell. Since a pipe is by definition unidirectional, the type argument may specify only reading or writing, not both; the resulting stream is correspondingly read- only or write-only.
No, subprocess is perfectly capable of starting a program directly (via an operating system call). It does not need a shell Things that can be done with shell=True that can't be done with shell=False You can use shell=False for any command that simply runs some executable optionally with some specified arguments.
Subprocess intends to replace several other, older modules and functions, like: os.system, os.spawn*, os.popen*, popen2.* commands. Let’s start looking into the different functions of subprocess. Run the command described by “args”.
Subprocess function check_call() in Python. This function runs the command(s) with the given arguments and waits for it to complete. Then it takes the return value of the code. If it is zero, it returns. Or else it raises CalledProcessError. Its syntax is. subprocess.check_call(args, *, stdin=None, stdout=None, stderr=None, shell=False)
Python subprocess.call () works on Windows too. I ask because this question might be made canonical, so it's good to be general. Also better to know about portability issues.
UNIX programs start each other with the following three calls, or derivatives/equivalents thereto:
fork()
- Create a new copy of yourself.exec()
- Replace yourself with a different program (do this if you're the copy!).wait()
- Wait for another process to finish (optional, if not running in background).Thus, with shell=False
, you do just that (as Python-syntax pseudocode below -- exclude the wait()
if not a blocking invocation such as subprocess.call()
):
pid = fork()
if pid == 0: # we're the child process, not the parent
execlp("ls", "ls", "-l", NUL);
else:
retval = wait(pid) # we're the parent; wait for the child to exit & get its exit status
whereas with shell=True
, you do this:
pid = fork()
if pid == 0:
execlp("sh", "sh", "-c", "ls -l", NUL);
else:
retval = wait(pid)
Note that with shell=False
, the command we executed was ls
, whereas with shell=True
, the command we executed was sh
.
That is to say:
subprocess.Popen(foo, shell=True)
is exactly the same as:
subprocess.Popen(
["sh", "-c"] + ([foo] if isinstance(foo, basestring) else foo),
shell=False)
That is to say, you execute a copy of /bin/sh
, and direct that copy of /bin/sh
to parse the string into an argument list and execute ls -l
itself.
So, why would you use shell=True
?
You're invoking a shell builtin.
For instance, the exit
command is actually part of the shell itself, rather than an external command. That said, this is a fairly small set of commands, and it's rare for them to be useful in the context of a shell instance that only exists for the duration of a single subprocess.call()
invocation.
You have some code with shell constructs (ie. redirections) that would be difficult to emulate without it.
If, for instance, your command is cat one two >three
, the syntax >three
is a redirection: It's not an argument to cat
, but an instruction to the shell to set stdout=open('three', 'w')
when running the command ['cat', 'one', 'two']
. If you don't want to deal with redirections and pipelines yourself, you need a shell to do it.
A slightly trickier case is cat foo bar | baz
. To do that without a shell, you need to start both sides of the pipeline yourself: p1 = Popen(['cat', 'foo', 'bar'], stdout=PIPE), p2=Popen(['baz'], stdin=p1.stdout)
.
You don't give a damn about security bugs.
...okay, that's a little bit too strong, but not by much. Using shell=True
is dangerous. You can't do this: Popen('cat -- %s' % (filename,), shell=True)
without a shell injection vulnerability: If your code were ever invoked with a filename
containing $(rm -rf ~)
, you'd have a very bad day. On the other hand, ['cat', '--', filename]
is safe with all possible filenames: The filename is purely data, not parsed as source code by a shell or anything else.
It is possible to write safe scripts in shell, but you need to be careful about it. Consider the following:
filenames = ['file1', 'file2'] # these can be user-provided
subprocess.Popen(['cat -- "$@" | baz', '_'] + filenames, shell=True)
That code is safe (well -- as safe as letting a user read any file they want ever is), because it's passing your filenames out-of-band from your script code -- but it's safe only because the string being passed to the shell is fixed and hardcoded, and the parameterized content is external variables (the filenames
list). And even then, it's "safe" only to a point -- a bug like Shellshock that triggers on shell initialization would impact it as much as anything else.
I was under the impression that subprocess.call and check_call and check_output all must execute the argument through the shell.
No, subprocess is perfectly capable of starting a program directly (via an operating system call). It does not need a shell
Things that can be done with shell=True that can't be done with shell=False
You can use shell=False
for any command that simply runs some executable optionally with some specified arguments.
You must use shell=True
if your command uses shell features. This includes pipelines, |
, or redirections or that contains compound statements combined with ;
or &&
or ||
etc.
Thus, one can use shell=False
for a command like grep string file
. But, a command like grep string file | xargs something
will, because of the |
require shell=True
.
Because the shell has power features that python programmers do not always find intuitive, it is considered better practice to use shell=False
unless you really truly need the shell feature. As an example, pipelines are not really truly needed because they can also be done using subprocess' PIPE feature.
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With