/* -*- mode: C; c-file-style: "gnu" -*- */ /* config-parser.c XML-library-agnostic configuration file parser * * Copyright (C) 2003, 2004 Red Hat, Inc. * * Licensed under the Academic Free License version 2.1 * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA * */ #include "config-parser.h" #include "test.h" #include "utils.h" #include "policy.h" #include "selinux.h" #include #include #include typedef enum { ELEMENT_NONE, ELEMENT_BUSCONFIG, ELEMENT_INCLUDE, ELEMENT_USER, ELEMENT_LISTEN, ELEMENT_AUTH, ELEMENT_POLICY, ELEMENT_LIMIT, ELEMENT_ALLOW, ELEMENT_DENY, ELEMENT_FORK, ELEMENT_PIDFILE, ELEMENT_SERVICEDIR, ELEMENT_INCLUDEDIR, ELEMENT_TYPE, ELEMENT_SELINUX, ELEMENT_ASSOCIATE } ElementType; typedef enum { /* we ignore policies for unknown groups/users */ POLICY_IGNORED, /* non-ignored */ POLICY_DEFAULT, POLICY_MANDATORY, POLICY_USER, POLICY_GROUP, POLICY_CONSOLE } PolicyType; typedef struct { ElementType type; unsigned int had_content : 1; union { struct { unsigned int ignore_missing : 1; unsigned int if_selinux_enabled : 1; unsigned int selinux_root_relative : 1; } include; struct { PolicyType type; unsigned long gid_uid_or_at_console; } policy; struct { char *name; long value; } limit; } d; } Element; /** * Parser for bus configuration file. */ struct BusConfigParser { int refcount; /**< Reference count */ DBusString basedir; /**< Directory we resolve paths relative to */ DBusList *stack; /**< stack of Element */ char *user; /**< user to run as */ char *bus_type; /**< Message bus type */ DBusList *listen_on; /**< List of addresses to listen to */ DBusList *mechanisms; /**< Auth mechanisms */ DBusList *service_dirs; /**< Directories to look for services in */ DBusList *conf_dirs; /**< Directories to look for policy configuration in */ BusPolicy *policy; /**< Security policy */ BusLimits limits; /**< Limits */ char *pidfile; /**< PID file */ DBusList *included_files; /**< Included files stack */ DBusHashTable *service_context_table; /**< Map service names to SELinux contexts */ unsigned int fork : 1; /**< TRUE to fork into daemon mode */ unsigned int is_toplevel : 1; /**< FALSE if we are a sub-config-file inside another one */ }; static const char* element_type_to_name (ElementType type) { switch (type) { case ELEMENT_NONE: return NULL; case ELEMENT_BUSCONFIG: return "busconfig"; case ELEMENT_INCLUDE: return "include"; case ELEMENT_USER: return "user"; case ELEMENT_LISTEN: return "listen"; case ELEMENT_AUTH: return "auth"; case ELEMENT_POLICY: return "policy"; case ELEMENT_LIMIT: return "limit"; case ELEMENT_ALLOW: return "allow"; case ELEMENT_DENY: return "deny"; case ELEMENT_FORK: return "fork"; case ELEMENT_PIDFILE: return "pidfile"; case ELEMENT_SERVICEDIR: return "servicedir"; case ELEMENT_INCLUDEDIR: return "includedir"; case ELEMENT_TYPE: return "type"; case ELEMENT_SELINUX: return "selinux"; case ELEMENT_ASSOCIATE: return "associate"; } _dbus_assert_not_reached ("bad element type"); return NULL; } static Element* push_element (BusConfigParser *parser, ElementType type) { Element *e; _dbus_assert (type != ELEMENT_NONE); e = dbus_new0 (Element, 1); if (e == NULL) return NULL; if (!_dbus_list_append (&parser->stack, e)) { dbus_free (e); return NULL; } e->type = type; return e; } static void element_free (Element *e) { if (e->type == ELEMENT_LIMIT) dbus_free (e->d.limit.name); dbus_free (e); } static void pop_element (BusConfigParser *parser) { Element *e; e = _dbus_list_pop_last (&parser->stack); element_free (e); } static Element* peek_element (BusConfigParser *parser) { Element *e; e = _dbus_list_get_last (&parser->stack); return e; } static ElementType top_element_type (BusConfigParser *parser) { Element *e; e = _dbus_list_get_last (&parser->stack); if (e) return e->type; else return ELEMENT_NONE; } static dbus_bool_t merge_service_context_hash (DBusHashTable *dest, DBusHashTable *from) { DBusHashIter iter; _dbus_hash_iter_init (from, &iter); while (_dbus_hash_iter_next (&iter)) { const char *service = _dbus_hash_iter_get_string_key (&iter); const char *context = _dbus_hash_iter_get_value (&iter); char *service_copy; char *context_copy; service_copy = _dbus_strdup (service); if (service_copy == NULL) return FALSE; context_copy = _dbus_strdup (context); if (context_copy == NULL) return FALSE; if (!_dbus_hash_table_insert_string (dest, service_copy, context_copy)) return FALSE; } return TRUE; } static dbus_bool_t merge_included (BusConfigParser *parser, BusConfigParser *included, DBusError *error) { DBusList *link; if (!bus_policy_merge (parser->policy, included->policy)) { BUS_SET_OOM (error); return FALSE; } if (!merge_service_context_hash (parser->service_context_table, included->service_context_table)) { BUS_SET_OOM (error); return FALSE; } if (included->user != NULL) { dbus_free (parser->user); parser->user = included->user; included->user = NULL; } if (included->bus_type != NULL) { dbus_free (parser->bus_type); parser->bus_type = included->bus_type; included->bus_type = NULL; } if (included->fork) parser->fork = TRUE; if (included->pidfile != NULL) { dbus_free (parser->pidfile); parser->pidfile = included->pidfile; included->pidfile = NULL; } while ((link = _dbus_list_pop_first_link (&included->listen_on))) _dbus_list_append_link (&parser->listen_on, link); while ((link = _dbus_list_pop_first_link (&included->mechanisms))) _dbus_list_append_link (&parser->mechanisms, link); while ((link = _dbus_list_pop_first_link (&included->service_dirs))) _dbus_list_append_link (&parser->service_dirs, link); while ((link = _dbus_list_pop_first_link (&included->conf_dirs))) _dbus_list_append_link (&parser->conf_dirs, link); return TRUE; } static dbus_bool_t seen_include (BusConfigParser *parser, const DBusString *file) { DBusList *iter; iter = parser->included_files; while (iter != NULL) { if (! strcmp (_dbus_string_get_const_data (file), iter->data)) return TRUE; iter = _dbus_list_get_next_link (&parser->included_files, iter); } return FALSE; } BusConfigParser* bus_config_parser_new (const DBusString *basedir, dbus_bool_t is_toplevel, const BusConfigParser *parent) { BusConfigParser *parser; parser = dbus_new0 (BusConfigParser, 1); if (parser == NULL) return NULL; parser->is_toplevel = !!is_toplevel; if (!_dbus_string_init (&parser->basedir)) { dbus_free (parser); return NULL; } if (((parser->policy = bus_policy_new ()) == NULL) || !_dbus_string_copy (basedir, 0, &parser->basedir, 0) || ((parser->service_context_table = _dbus_hash_table_new (DBUS_HASH_STRING, dbus_free, dbus_free)) == NULL)) { if (parser->policy) bus_policy_unref (parser->policy); _dbus_string_free (&parser->basedir); dbus_free (parser); return NULL; } if (parent != NULL) { /* Initialize the parser's limits from the parent. */ parser->limits = parent->limits; /* Use the parent's list of included_files to avoid circular inclusions. */ parser->included_files = parent->included_files; } else { /* Make up some numbers! woot! */ parser->limits.max_incoming_bytes = _DBUS_ONE_MEGABYTE * 63; parser->limits.max_outgoing_bytes = _DBUS_ONE_MEGABYTE * 63; parser->limits.max_message_size = _DBUS_ONE_MEGABYTE * 32; /* Making this long means the user has to wait longer for an error * message if something screws up, but making it too short means * they might see a false failure. */ parser->limits.activation_timeout = 25000; /* 25 seconds */ /* Making this long risks making a DOS attack easier, but too short * and legitimate auth will fail. If interactive auth (ask user for * password) is allowed, then potentially it has to be quite long. */ parser->limits.auth_timeout = 30000; /* 30 seconds */ parser->limits.max_incomplete_connections = 32; parser->limits.max_connections_per_user = 128; /* Note that max_completed_connections / max_connections_per_user * is the number of users that would have to work together to * DOS all the other users. */ parser->limits.max_completed_connections = 1024; parser->limits.max_pending_activations = 256; parser->limits.max_services_per_connection = 256; parser->limits.max_match_rules_per_connection = 512; parser->limits.reply_timeout = 5 * 60 * 1000; /* 5 minutes */ parser->limits.max_replies_per_connection = 32; } parser->refcount = 1; return parser; } BusConfigParser * bus_config_parser_ref (BusConfigParser *parser) { _dbus_assert (parser->refcount > 0); parser->refcount += 1; return parser; } void bus_config_parser_unref (BusConfigParser *parser) { _dbus_assert (parser->refcount > 0); parser->refcount -= 1; if (parser->refcount == 0) { while (parser->stack != NULL) pop_element (parser); dbus_free (parser->user); dbus_free (parser->bus_type); dbus_free (parser->pidfile); _dbus_list_foreach (&parser->listen_on, (DBusForeachFunction) dbus_free, NULL); _dbus_list_clear (&parser->listen_on); _dbus_list_foreach (&parser->service_dirs, (DBusForeachFunction) dbus_free, NULL); _dbus_list_clear (&parser->service_dirs); _dbus_list_foreach (&parser->conf_dirs, (DBusForeachFunction) dbus_free, NULL); _dbus_list_clear (&parser->conf_dirs); _dbus_list_foreach (&parser->mechanisms, (DBusForeachFunction) dbus_free, NULL); _dbus_list_clear (&parser->mechanisms); _dbus_string_free (&parser->basedir); if (parser->policy) bus_policy_unref (parser->policy); if (parser->service_context_table) _dbus_hash_table_unref (parser->service_context_table); dbus_free (parser); } } dbus_bool_t bus_config_parser_check_doctype (BusConfigParser *parser, const char *doctype, DBusError *error) { _DBUS_ASSERT_ERROR_IS_CLEAR (error); if (strcmp (doctype, "busconfig") != 0) { dbus_set_error (error, DBUS_ERROR_FAILED, "Configuration file has the wrong document type %s", doctype); return FALSE; } else return TRUE; } typedef struct { const char *name; const char **retloc; } LocateAttr; static dbus_bool_t locate_attributes (BusConfigParser *parser, const char *element_name, const char **attribute_names, const char **attribute_values, DBusError *error, const char *first_attribute_name, const char **first_attribute_retloc, ...) { va_list args; const char *name; const char **retloc; int n_attrs; #define MAX_ATTRS 24 LocateAttr attrs[MAX_ATTRS]; dbus_bool_t retval; int i; _dbus_assert (first_attribute_name != NULL); _dbus_assert (first_attribute_retloc != NULL); retval = TRUE; n_attrs = 1; attrs[0].name = first_attribute_name; attrs[0].retloc = first_attribute_retloc; *first_attribute_retloc = NULL; va_start (args, first_attribute_retloc); name = va_arg (args, const char*); retloc = va_arg (args, const char**); while (name != NULL) { _dbus_assert (retloc != NULL); _dbus_assert (n_attrs < MAX_ATTRS); attrs[n_attrs].name = name; attrs[n_attrs].retloc = retloc; n_attrs += 1; *retloc = NULL; name = va_arg (args, const char*); retloc = va_arg (args, const char**); } va_end (args); if (!retval) return retval; i = 0; while (attribute_names[i]) { int j; dbus_bool_t found; found = FALSE; j = 0; while (j < n_attrs) { if (strcmp (attrs[j].name, attribute_names[i]) == 0) { retloc = attrs[j].retloc; if (*retloc != NULL) { dbus_set_error (error, DBUS_ERROR_FAILED, "Attribute \"%s\" repeated twice on the same <%s> element", attrs[j].name, element_name); retval = FALSE; goto out; } *retloc = attribute_values[i]; found = TRUE; } ++j; } if (!found) { dbus_set_error (error, DBUS_ERROR_FAILED, "Attribute \"%s\" is invalid on <%s> element in this context", attribute_names[i], element_name); retval = FALSE; goto out; } ++i; } out: return retval; } static dbus_bool_t check_no_attributes (BusConfigParser *parser, const char *element_name, const char **attribute_names, const char **attribute_values, DBusError *error) { if (attribute_names[0] != NULL) { dbus_set_error (error, DBUS_ERROR_FAILED, "Attribute \"%s\" is invalid on <%s> element in this context", attribute_names[0], element_name); return FALSE; } return TRUE; } static dbus_bool_t start_busconfig_child (BusConfigParser *parser, const char *element_name, const char **attribute_names, const char **attribute_values, DBusError *error) { if (strcmp (element_name, "user") == 0) { if (!check_no_attributes (parser, "user", attribute_names, attribute_values, error)) return FALSE; if (push_element (parser, ELEMENT_USER) == NULL) { BUS_SET_OOM (error); return FALSE; } return TRUE; } else if (strcmp (element_name, "type") == 0) { if (!check_no_attributes (parser, "type", attribute_names, attribute_values, error)) return FALSE; if (push_element (parser, ELEMENT_TYPE) == NULL) { BUS_SET_OOM (error); return FALSE; } return TRUE; } else if (strcmp (element_name, "fork") == 0) { if (!check_no_attributes (parser, "fork", attribute_names, attribute_values, error)) return FALSE; if (push_element (parser, ELEMENT_FORK) == NULL) { BUS_SET_OOM (error); return FALSE; } parser->fork = TRUE; return TRUE; } else if (strcmp (element_name, "pidfile") == 0) { if (!check_no_attributes (parser, "pidfile", attribute_names, attribute_values, error)) return FALSE; if (push_element (parser, ELEMENT_PIDFILE) == NULL) { BUS_SET_OOM (error); return FALSE; } return TRUE; } else if (strcmp (element_name, "listen") == 0) { if (!check_no_attributes (parser, "listen", attribute_names, attribute_values, error)) return FALSE; if (push_element (parser, ELEMENT_LISTEN) == NULL) { BUS_SET_OOM (error); return FALSE; } return TRUE; } else if (strcmp (element_name, "auth") == 0) { if (!check_no_attributes (parser, "auth", attribute_names, attribute_values, error)) return FALSE; if (push_element (parser, ELEMENT_AUTH) == NULL) { BUS_SET_OOM (error); return FALSE; } return TRUE; } else if (strcmp (element_name, "includedir") == 0) { if (!check_no_attributes (parser, "includedir", attribute_names, attribute_values, error)) return FALSE; if (push_element (parser, ELEMENT_INCLUDEDIR) == NULL) { BUS_SET_OOM (error); return FALSE; } return TRUE; } else if (strcmp (element_name, "servicedir") == 0) { if (!check_no_attributes (parser, "servicedir", attribute_names, attribute_values, error)) return FALSE; if (push_element (parser, ELEMENT_SERVICEDIR) == NULL) { BUS_SET_OOM (error); return FALSE; } return TRUE; } else if (strcmp (element_name, "include") == 0) { Element *e; const char *if_selinux_enabled; const char *ignore_missing; const char *selinux_root_relative; if ((e = push_element (parser, ELEMENT_INCLUDE)) == NULL) { BUS_SET_OOM (error); return FALSE; } e->d.include.ignore_missing = FALSE; e->d.include.if_selinux_enabled = FALSE; e->d.include.selinux_root_relative = FALSE; if (!locate_attributes (parser, "include", attribute_names, attribute_values, error, "ignore_missing", &ignore_missing, "if_selinux_enabled", &if_selinux_enabled, "selinux_root_relative", &selinux_root_relative, NULL)) return FALSE; if (ignore_missing != NULL) { if (strcmp (ignore_missing, "yes") == 0) e->d.include.ignore_missing = TRUE; else if (strcmp (ignore_missing, "no") == 0) e->d.include.ignore_missing = FALSE; else { dbus_set_error (error, DBUS_ERROR_FAILED, "ignore_missing attribute must have value \"yes\" or \"no\""); return FALSE; } } if (if_selinux_enabled != NULL) { if (strcmp (if_selinux_enabled, "yes") == 0) e->d.include.if_selinux_enabled = TRUE; else if (strcmp (if_selinux_enabled, "no") == 0) e->d.include.if_selinux_enabled = FALSE; else { dbus_set_error (error, DBUS_ERROR_FAILED, "if_selinux_enabled attribute must have value" " \"yes\" or \"no\""); return FALSE; } } if (selinux_root_relative != NULL) { if (strcmp (selinux_root_relative, "yes") == 0) e->d.include.selinux_root_relative = TRUE; else if (strcmp (selinux_root_relative, "no") == 0) e->d.include.selinux_root_relative = FALSE; else { dbus_set_error (error, DBUS_ERROR_FAILED, "selinux_root_relative attribute must have value" " \"yes\" or \"no\""); return FALSE; } } return TRUE; } else if (strcmp (element_name, "policy") == 0) { Element *e; const char *context; const char *user; const char *group; const char *at_console; if ((e = push_element (parser, ELEMENT_POLICY)) == NULL) { BUS_SET_OOM (error); return FALSE; } e->d.policy.type = POLICY_IGNORED; if (!locate_attributes (parser, "policy", attribute_names, attribute_values, error, "context", &context, "user", &user, "group", &group, "at_console", &at_console, NULL)) return FALSE; if (((context && user) || (context && group) || (context && at_console)) || ((user && group) || (user && at_console)) || (group && at_console) || !(context || user || group || at_console)) { dbus_set_error (error, DBUS_ERROR_FAILED, " element must have exactly one of (context|user|group|at_console) attributes"); return FALSE; } if (context != NULL) { if (strcmp (context, "default") == 0) { e->d.policy.type = POLICY_DEFAULT; } else if (strcmp (context, "mandatory") == 0) { e->d.policy.type = POLICY_MANDATORY; } else { dbus_set_error (error, DBUS_ERROR_FAILED, "context attribute on must have the value \"default\" or \"mandatory\", not \"%s\"", context); return FALSE; } } else if (user != NULL) { DBusString username; _dbus_string_init_const (&username, user); if (_dbus_get_user_id (&username, &e->d.policy.gid_uid_or_at_console)) e->d.policy.type = POLICY_USER; else _dbus_warn ("Unknown username \"%s\" in message bus configuration file\n", user); } else if (group != NULL) { DBusString group_name; _dbus_string_init_const (&group_name, group); if (_dbus_get_group_id (&group_name, &e->d.policy.gid_uid_or_at_console)) e->d.policy.type = POLICY_GROUP; else _dbus_warn ("Unknown group \"%s\" in message bus configuration file\n", group); } else if (at_console != NULL) { dbus_bool_t t; t = (strcmp (at_console, "true") == 0); if (t || strcmp (at_console, "false") == 0) { e->d.policy.gid_uid_or_at_console = t; e->d.policy.type = POLICY_CONSOLE; } else { dbus_set_error (error, DBUS_ERROR_FAILED, "Unknown value \"%s\" for at_console in message bus configuration file", at_console); return FALSE; } } else { _dbus_assert_not_reached ("all attributes null and we didn't set error"); } return TRUE; } else if (strcmp (element_name, "limit") == 0) { Element *e; const char *name; if ((e = push_element (parser, ELEMENT_LIMIT)) == NULL) { BUS_SET_OOM (error); return FALSE; } if (!locate_attributes (parser, "limit", attribute_names, attribute_values, error, "name", &name, NULL)) return FALSE; if (name == NULL) { dbus_set_error (error, DBUS_ERROR_FAILED, " element must have a \"name\" attribute"); return FALSE; } e->d.limit.name = _dbus_strdup (name); if (e->d.limit.name == NULL) { BUS_SET_OOM (error); return FALSE; } return TRUE; } else if (strcmp (element_name, "selinux") == 0) { if (!check_no_attributes (parser, "selinux", attribute_names, attribute_values, error)) return FALSE; if (push_element (parser, ELEMENT_SELINUX) == NULL) { BUS_SET_OOM (error); return FALSE; } return TRUE; } else { dbus_set_error (error, DBUS_ERROR_FAILED, "Element <%s> not allowed inside <%s> in configuration file", element_name, "busconfig"); return FALSE; } } static dbus_bool_t append_rule_from_element (BusConfigParser *parser, const char *element_name, const char **attribute_names, const char **attribute_values, dbus_bool_t allow, DBusError *error) { const char *send_interface; const char *send_member; const char *send_error; const char *send_destination; const char *send_path; const char *send_type; const char *receive_interface; const char *receive_member; const char *receive_error; const char *receive_sender; const char *receive_path; const char *receive_type; const char *eavesdrop; const char *send_requested_reply; const char *receive_requested_reply; const char *own; const char *user; const char *group; BusPolicyRule *rule; if (!locate_attributes (parser, element_name, attribute_names, attribute_values, error, "send_interface", &send_interface, "send_member", &send_member, "send_error", &send_error, "send_destination", &send_destination, "send_path", &send_path, "send_type", &send_type, "receive_interface", &receive_interface, "receive_member", &receive_member, "receive_error", &receive_error, "receive_sender", &receive_sender, "receive_path", &receive_path, "receive_type", &receive_type, "eavesdrop", &eavesdrop, "send_requested_reply", &send_requested_reply, "receive_requested_reply", &receive_requested_reply, "own", &own, "user", &user, "group", &group, NULL)) return FALSE; if (!(send_interface || send_member || send_error || send_destination || send_type || send_path || receive_interface || receive_member || receive_error || receive_sender || receive_type || receive_path || eavesdrop || send_requested_reply || receive_requested_reply || own || user || group)) { dbus_set_error (error, DBUS_ERROR_FAILED, "Element <%s> must have one or more attributes", element_name); return FALSE; } if ((send_member && (send_interface == NULL && send_path == NULL)) || (receive_member && (receive_interface == NULL && receive_path == NULL))) { dbus_set_error (error, DBUS_ERROR_FAILED, "On element <%s>, if you specify a member you must specify an interface or a path. Keep in mind that not all messages have an interface field.", element_name); return FALSE; } /* Allowed combinations of elements are: * * base, must be all send or all receive: * nothing * interface * interface + member * error * * base send_ can combine with send_destination, send_path, send_type, send_requested_reply * base receive_ with receive_sender, receive_path, receive_type, receive_requested_reply, eavesdrop * * user, group, own must occur alone * * Pretty sure the below stuff is broken, FIXME think about it more. */ if (((send_interface && send_error) || (send_interface && receive_interface) || (send_interface && receive_member) || (send_interface && receive_error) || (send_interface && receive_sender) || (send_interface && eavesdrop) || (send_interface && receive_requested_reply) || (send_interface && own) || (send_interface && user) || (send_interface && group)) || ((send_member && send_error) || (send_member && receive_interface) || (send_member && receive_member) || (send_member && receive_error) || (send_member && receive_sender) || (send_member && eavesdrop) || (send_member && receive_requested_reply) || (send_member && own) || (send_member && user) || (send_member && group)) || ((send_error && receive_interface) || (send_error && receive_member) || (send_error && receive_error) || (send_error && receive_sender) || (send_error && eavesdrop) || (send_error && receive_requested_reply) || (send_error && own) || (send_error && user) || (send_error && group)) || ((send_destination && receive_interface) || (send_destination && receive_member) || (send_destination && receive_error) || (send_destination && receive_sender) || (send_destination && eavesdrop) || (send_destination && receive_requested_reply) || (send_destination && own) || (send_destination && user) || (send_destination && group)) || ((send_type && receive_interface) || (send_type && receive_member) || (send_type && receive_error) || (send_type && receive_sender) || (send_type && eavesdrop) || (send_type && receive_requested_reply) || (send_type && own) || (send_type && user) || (send_type && group)) || ((send_path && receive_interface) || (send_path && receive_member) || (send_path && receive_error) || (send_path && receive_sender) || (send_path && eavesdrop) || (send_path && receive_requested_reply) || (send_path && own) || (send_path && user) || (send_path && group)) || ((send_requested_reply && receive_interface) || (send_requested_reply && receive_member) || (send_requested_reply && receive_error) || (send_requested_reply && receive_sender) || (send_requested_reply && eavesdrop) || (send_requested_reply && receive_requested_reply) || (send_requested_reply && own) || (send_requested_reply && user) || (send_requested_reply && group)) || ((receive_interface && receive_error) || (receive_interface && own) || (receive_interface && user) || (receive_interface && group)) || ((receive_member && receive_error) || (receive_member && own) || (receive_member && user) || (receive_member && group)) || ((receive_error && own) || (receive_error && user) || (receive_error && group)) || ((eavesdrop && own) || (eavesdrop && user) || (eavesdrop && group)) || ((receive_requested_reply && own) || (receive_requested_reply && user) || (receive_requested_reply && group)) || ((own && user) || (own && group)) || ((user && group))) { dbus_set_error (error, DBUS_ERROR_FAILED, "Invalid combination of attributes on element <%s>", element_name); return FALSE; } rule = NULL; /* In BusPolicyRule, NULL represents wildcard. * In the config file, '*' represents it. */ #define IS_WILDCARD(str) ((str) && ((str)[0]) == '*' && ((str)[1]) == '\0') if (send_interface || send_member || send_error || send_destination || send_path || send_type || send_requested_reply) { int message_type; if (IS_WILDCARD (send_interface)) send_interface = NULL; if (IS_WILDCARD (send_member)) send_member = NULL; if (IS_WILDCARD (send_error)) send_error = NULL; if (IS_WILDCARD (send_destination)) send_destination = NULL; if (IS_WILDCARD (send_path)) send_path = NULL; if (IS_WILDCARD (send_type)) send_type = NULL; message_type = DBUS_MESSAGE_TYPE_INVALID; if (send_type != NULL) { message_type = dbus_message_type_from_string (send_type); if (message_type == DBUS_MESSAGE_TYPE_INVALID) { dbus_set_error (error, DBUS_ERROR_FAILED, "Bad message type \"%s\"", send_type); return FALSE; } } if (send_requested_reply && !(strcmp (send_requested_reply, "true") == 0 || strcmp (send_requested_reply, "false") == 0)) { dbus_set_error (error, DBUS_ERROR_FAILED, "Bad value \"%s\" for %s attribute, must be true or false", "send_requested_reply", send_requested_reply); return FALSE; } rule = bus_policy_rule_new (BUS_POLICY_RULE_SEND, allow); if (rule == NULL) goto nomem; if (send_requested_reply) rule->d.send.requested_reply = (strcmp (send_requested_reply, "true") == 0); rule->d.send.message_type = message_type; rule->d.send.path = _dbus_strdup (send_path); rule->d.send.interface = _dbus_strdup (send_interface); rule->d.send.member = _dbus_strdup (send_member); rule->d.send.error = _dbus_strdup (send_error); rule->d.send.destination = _dbus_strdup (send_destination); if (send_path && rule->d.send.path == NULL) goto nomem; if (send_interface && rule->d.send.interface == NULL) goto nomem; if (send_member && rule->d.send.member == NULL) goto nomem; if (send_error && rule->d.send.error == NULL) goto nomem; if (send_destination && rule->d.send.destination == NULL) goto nomem; } else if (receive_interface || receive_member || receive_error || receive_sender || receive_path || receive_type || eavesdrop || receive_requested_reply) { int message_type; if (IS_WILDCARD (receive_interface)) receive_interface = NULL; if (IS_WILDCARD (receive_member)) receive_member = NULL; if (IS_WILDCARD (receive_error)) receive_error = NULL; if (IS_WILDCARD (receive_sender)) receive_sender = NULL; if (IS_WILDCARD (receive_path)) receive_path = NULL; if (IS_WILDCARD (receive_type)) receive_type = NULL; message_type = DBUS_MESSAGE_TYPE_INVALID; if (receive_type != NULL) { message_type = dbus_message_type_from_string (receive_type); if (message_type == DBUS_MESSAGE_TYPE_INVALID) { dbus_set_error (error, DBUS_ERROR_FAILED, "Bad message type \"%s\"", receive_type); return FALSE; } } if (eavesdrop && !(strcmp (eavesdrop, "true") == 0 || strcmp (eavesdrop, "false") == 0)) { dbus_set_error (error, DBUS_ERROR_FAILED, "Bad value \"%s\" for %s attribute, must be true or false", "eavesdrop", eavesdrop); return FALSE; } if (receive_requested_reply && !(strcmp (receive_requested_reply, "true") == 0 || strcmp (receive_requested_reply, "false") == 0)) { dbus_set_error (error, DBUS_ERROR_FAILED, "Bad value \"%s\" for %s attribute, must be true or false", "receive_requested_reply", receive_requested_reply); return FALSE; } rule = bus_policy_rule_new (BUS_POLICY_RULE_RECEIVE, allow); if (rule == NULL) goto nomem; if (eavesdrop) rule->d.receive.eavesdrop = (strcmp (eavesdrop, "true") == 0); if (receive_requested_reply) rule->d.receive.requested_reply = (strcmp (receive_requested_reply, "true") == 0); rule->d.receive.message_type = message_type; rule->d.receive.path = _dbus_strdup (receive_path); rule->d.receive.interface = _dbus_strdup (receive_interface); rule->d.receive.member = _dbus_strdup (receive_member); rule->d.receive.error = _dbus_strdup (receive_error); rule->d.receive.origin = _dbus_strdup (receive_sender); if (receive_path && rule->d.receive.path == NULL) goto nomem; if (receive_interface && rule->d.receive.interface == NULL) goto nomem; if (receive_member && rule->d.receive.member == NULL) goto nomem; if (receive_error && rule->d.receive.error == NULL) goto nomem; if (receive_sender && rule->d.receive.origin == NULL) goto nomem; } else if (own) { rule = bus_policy_rule_new (BUS_POLICY_RULE_OWN, allow); if (rule == NULL) goto nomem; if (IS_WILDCARD (own)) own = NULL; rule->d.own.service_name = _dbus_strdup (own); if (own && rule->d.own.service_name == NULL) goto nomem; } else if (user) { if (IS_WILDCARD (user)) { rule = bus_policy_rule_new (BUS_POLICY_RULE_USER, allow); if (rule == NULL) goto nomem; rule->d.user.uid = DBUS_UID_UNSET; } else { DBusString username; dbus_uid_t uid; _dbus_string_init_const (&username, user); if (_dbus_get_user_id (&username, &uid)) { rule = bus_policy_rule_new (BUS_POLICY_RULE_USER, allow); if (rule == NULL) goto nomem; rule->d.user.uid = uid; } else { _dbus_warn ("Unknown username \"%s\" on element <%s>\n", user, element_name); } } } else if (group) { if (IS_WILDCARD (group)) { rule = bus_policy_rule_new (BUS_POLICY_RULE_GROUP, allow); if (rule == NULL) goto nomem; rule->d.group.gid = DBUS_GID_UNSET; } else { DBusString groupname; dbus_gid_t gid; _dbus_string_init_const (&groupname, group); if (_dbus_get_user_id (&groupname, &gid)) { rule = bus_policy_rule_new (BUS_POLICY_RULE_GROUP, allow); if (rule == NULL) goto nomem; rule->d.group.gid = gid; } else { _dbus_warn ("Unknown group \"%s\" on element <%s>\n", group, element_name); } } } else _dbus_assert_not_reached ("Did not handle some combination of attributes on or "); if (rule != NULL) { Element *pe; pe = peek_element (parser); _dbus_assert (pe != NULL); _dbus_assert (pe->type == ELEMENT_POLICY); switch (pe->d.policy.type) { case POLICY_IGNORED: /* drop the rule on the floor */ break; case POLICY_DEFAULT: if (!bus_policy_append_default_rule (parser->policy, rule)) goto nomem; break; case POLICY_MANDATORY: if (!bus_policy_append_mandatory_rule (parser->policy, rule)) goto nomem; break; case POLICY_USER: if (!BUS_POLICY_RULE_IS_PER_CLIENT (rule)) { dbus_set_error (error, DBUS_ERROR_FAILED, "<%s> rule cannot be per-user because it has bus-global semantics", element_name); goto failed; } if (!bus_policy_append_user_rule (parser->policy, pe->d.policy.gid_uid_or_at_console, rule)) goto nomem; break; case POLICY_GROUP: if (!BUS_POLICY_RULE_IS_PER_CLIENT (rule)) { dbus_set_error (error, DBUS_ERROR_FAILED, "<%s> rule cannot be per-group because it has bus-global semantics", element_name); goto failed; } if (!bus_policy_append_group_rule (parser->policy, pe->d.policy.gid_uid_or_at_console, rule)) goto nomem; break; case POLICY_CONSOLE: if (!bus_policy_append_console_rule (parser->policy, pe->d.policy.gid_uid_or_at_console, rule)) goto nomem; break; } bus_policy_rule_unref (rule); rule = NULL; } return TRUE; nomem: BUS_SET_OOM (error); failed: if (rule) bus_policy_rule_unref (rule); return FALSE; } static dbus_bool_t start_policy_child (BusConfigParser *parser, const char *element_name, const char **attribute_names, const char **attribute_values, DBusError *error) { if (strcmp (element_name, "allow") == 0) { if (!append_rule_from_element (parser, element_name, attribute_names, attribute_values, TRUE, error)) return FALSE; if (push_element (parser, ELEMENT_ALLOW) == NULL) { BUS_SET_OOM (error); return FALSE; } return TRUE; } else if (strcmp (element_name, "deny") == 0) { if (!append_rule_from_element (parser, element_name, attribute_names, attribute_values, FALSE, error)) return FALSE; if (push_element (parser, ELEMENT_DENY) == NULL) { BUS_SET_OOM (error); return FALSE; } return TRUE; } else { dbus_set_error (error, DBUS_ERROR_FAILED, "Element <%s> not allowed inside <%s> in configuration file", element_name, "policy"); return FALSE; } } static dbus_bool_t start_selinux_child (BusConfigParser *parser, const char *element_name, const char **attribute_names, const char **attribute_values, DBusError *error) { if (strcmp (element_name, "associate") == 0) { const char *own; const char *context; char *own_copy; char *context_copy; if (!locate_attributes (parser, "associate", attribute_names, attribute_values, error, "own", &own, "context", &context, NULL)) return FALSE; if (push_element (parser, ELEMENT_ASSOCIATE) == NULL) { BUS_SET_OOM (error); return FALSE; } if (own == NULL || context == NULL) { dbus_set_error (error, DBUS_ERROR_FAILED, "Element must have attributes own=\"\" and context=\"\""); return FALSE; } own_copy = _dbus_strdup (own); if (own_copy == NULL) return FALSE; context_copy = _dbus_strdup (context); if (context_copy == NULL) return FALSE; if (!_dbus_hash_table_insert_string (parser->service_context_table, own_copy, context_copy)) { BUS_SET_OOM (error); return FALSE; } return TRUE; } else { dbus_set_error (error, DBUS_ERROR_FAILED, "Element <%s> not allowed inside <%s> in configuration file", element_name, "selinux"); return FALSE; } } dbus_bool_t bus_config_parser_start_element (BusConfigParser *parser, const char *element_name, const char **attribute_names, const char **attribute_values, DBusError *error) { ElementType t; _DBUS_ASSERT_ERROR_IS_CLEAR (error); /* printf ("START: %s\n", element_name); */ t = top_element_type (parser); if (t == ELEMENT_NONE) { if (strcmp (element_name, "busconfig") == 0) { if (!check_no_attributes (parser, "busconfig", attribute_names, attribute_values, error)) return FALSE; if (push_element (parser, ELEMENT_BUSCONFIG) == NULL) { BUS_SET_OOM (error); return FALSE; } return TRUE; } else { dbus_set_error (error, DBUS_ERROR_FAILED, "Unknown element <%s> at root of configuration file", element_name); return FALSE; } } else if (t == ELEMENT_BUSCONFIG) { return start_busconfig_child (parser, element_name, attribute_names, attribute_values, error); } else if (t == ELEMENT_POLICY) { return start_policy_child (parser, element_name, attribute_names, attribute_values, error); } else if (t == ELEMENT_SELINUX) { return start_selinux_child (parser, element_name, attribute_names, attribute_values, error); } else { dbus_set_error (error, DBUS_ERROR_FAILED, "Element <%s> is not allowed in this context", element_name); return FALSE; } } static dbus_bool_t set_limit (BusConfigParser *parser, const char *name, long value, DBusError *error) { dbus_bool_t must_be_positive; dbus_bool_t must_be_int; must_be_int = FALSE; must_be_positive = FALSE; if (strcmp (name, "max_incoming_bytes") == 0) { must_be_positive = TRUE; parser->limits.max_incoming_bytes = value; } else if (strcmp (name, "max_outgoing_bytes") == 0) { must_be_positive = TRUE; parser->limits.max_outgoing_bytes = value; } else if (strcmp (name, "max_message_size") == 0) { must_be_positive = TRUE; parser->limits.max_message_size = value; } else if (strcmp (name, "service_start_timeout") == 0) { must_be_positive = TRUE; must_be_int = TRUE; parser->limits.activation_timeout = value; } else if (strcmp (name, "auth_timeout") == 0) { must_be_positive = TRUE; must_be_int = TRUE; parser->limits.auth_timeout = value; } else if (strcmp (name, "reply_timeout") == 0) { must_be_positive = TRUE; must_be_int = TRUE; parser->limits.reply_timeout = value; } else if (strcmp (name, "max_completed_connections") == 0) { must_be_positive = TRUE; must_be_int = TRUE; parser->limits.max_completed_connections = value; } else if (strcmp (name, "max_incomplete_connections") == 0) { must_be_positive = TRUE; must_be_int = TRUE; parser->limits.max_incomplete_connections = value; } else if (strcmp (name, "max_connections_per_user") == 0) { must_be_positive = TRUE; must_be_int = TRUE; parser->limits.max_connections_per_user = value; } else if (strcmp (name, "max_pending_service_starts") == 0) { must_be_positive = TRUE; must_be_int = TRUE; parser->limits.max_pending_activations = value; } else if (strcmp (name, "max_names_per_connection") == 0) { must_be_positive = TRUE; must_be_int = TRUE; parser->limits.max_services_per_connection = value; } else if (strcmp (name, "max_match_rules_per_connection") == 0) { must_be_positive = TRUE; must_be_int = TRUE; parser->limits.max_match_rules_per_connection = value; } else if (strcmp (name, "max_replies_per_connection") == 0) { must_be_positive = TRUE; must_be_int = TRUE; parser->limits.max_replies_per_connection = value; } else { dbus_set_error (error, DBUS_ERROR_FAILED, "There is no limit called \"%s\"\n", name); return FALSE; } if (must_be_positive && value < 0) { dbus_set_error (error, DBUS_ERROR_FAILED, " must be a positive number\n", name); return FALSE; } if (must_be_int && (value < _DBUS_INT_MIN || value > _DBUS_INT_MAX)) { dbus_set_error (error, DBUS_ERROR_FAILED, " value is too large\n", name); return FALSE; } return TRUE; } dbus_bool_t bus_config_parser_end_element (BusConfigParser *parser, const char *element_name, DBusError *error) { ElementType t; const char *n; Element *e; _DBUS_ASSERT_ERROR_IS_CLEAR (error); /* printf ("END: %s\n", element_name); */ t = top_element_type (parser); if (t == ELEMENT_NONE) { /* should probably be an assertion failure but * being paranoid about XML parsers */ dbus_set_error (error, DBUS_ERROR_FAILED, "XML parser ended element with no element on the stack"); return FALSE; } n = element_type_to_name (t); _dbus_assert (n != NULL); if (strcmp (n, element_name) != 0) { /* should probably be an assertion failure but * being paranoid about XML parsers */ dbus_set_error (error, DBUS_ERROR_FAILED, "XML element <%s> ended but topmost element on the stack was <%s>", element_name, n); return FALSE; } e = peek_element (parser); _dbus_assert (e != NULL); switch (e->type) { case ELEMENT_NONE: _dbus_assert_not_reached ("element in stack has no type"); break; case ELEMENT_INCLUDE: case ELEMENT_USER: case ELEMENT_TYPE: case ELEMENT_LISTEN: case ELEMENT_PIDFILE: case ELEMENT_AUTH: case ELEMENT_SERVICEDIR: case ELEMENT_INCLUDEDIR: case ELEMENT_LIMIT: if (!e->had_content) { dbus_set_error (error, DBUS_ERROR_FAILED, "XML element <%s> was expected to have content inside it", element_type_to_name (e->type)); return FALSE; } if (e->type == ELEMENT_LIMIT) { if (!set_limit (parser, e->d.limit.name, e->d.limit.value, error)) return FALSE; } break; case ELEMENT_BUSCONFIG: case ELEMENT_POLICY: case ELEMENT_ALLOW: case ELEMENT_DENY: case ELEMENT_FORK: case ELEMENT_SELINUX: case ELEMENT_ASSOCIATE: break; } pop_element (parser); return TRUE; } static dbus_bool_t all_whitespace (const DBusString *str) { int i; _dbus_string_skip_white (str, 0, &i); return i == _dbus_string_get_length (str); } static dbus_bool_t make_full_path (const DBusString *basedir, const DBusString *filename, DBusString *full_path) { if (_dbus_path_is_absolute (filename)) { return _dbus_string_copy (filename, 0, full_path, 0); } else { if (!_dbus_string_copy (basedir, 0, full_path, 0)) return FALSE; if (!_dbus_concat_dir_and_file (full_path, filename)) return FALSE; return TRUE; } } static dbus_bool_t include_file (BusConfigParser *parser, const DBusString *filename, dbus_bool_t ignore_missing, DBusError *error) { /* FIXME good test case for this would load each config file in the * test suite both alone, and as an include, and check * that the result is the same */ BusConfigParser *included; const char *filename_str; DBusError tmp_error; dbus_error_init (&tmp_error); filename_str = _dbus_string_get_const_data (filename); /* Check to make sure this file hasn't already been included. */ if (seen_include (parser, filename)) { dbus_set_error (error, DBUS_ERROR_FAILED, "Circular inclusion of file '%s'", filename_str); return FALSE; } if (! _dbus_list_append (&parser->included_files, (void *) filename_str)) { BUS_SET_OOM (error); return FALSE; } /* Since parser is passed in as the parent, included inherits parser's limits. */ included = bus_config_load (filename, FALSE, parser, &tmp_error); _dbus_list_pop_last (&parser->included_files); if (included == NULL) { _DBUS_ASSERT_ERROR_IS_SET (&tmp_error); if (dbus_error_has_name (&tmp_error, DBUS_ERROR_FILE_NOT_FOUND) && ignore_missing) { dbus_error_free (&tmp_error); return TRUE; } else { dbus_move_error (&tmp_error, error); return FALSE; } } else { _DBUS_ASSERT_ERROR_IS_CLEAR (&tmp_error); if (!merge_included (parser, included, error)) { bus_config_parser_unref (included); return FALSE; } /* Copy included's limits back to parser. */ parser->limits = included->limits; bus_config_parser_unref (included); return TRUE; } } static dbus_bool_t include_dir (BusConfigParser *parser, const DBusString *dirname, DBusError *error) { DBusString filename; dbus_bool_t retval; DBusError tmp_error; DBusDirIter *dir; char *s; if (!_dbus_string_init (&filename)) { BUS_SET_OOM (error); return FALSE; } retval = FALSE; dir = _dbus_directory_open (dirname, error); if (dir == NULL) goto failed; dbus_error_init (&tmp_error); while (_dbus_directory_get_next_file (dir, &filename, &tmp_error)) { DBusString full_path; if (!_dbus_string_init (&full_path)) { BUS_SET_OOM (error); goto failed; } if (!_dbus_string_copy (dirname, 0, &full_path, 0)) { BUS_SET_OOM (error); _dbus_string_free (&full_path); goto failed; } if (!_dbus_concat_dir_and_file (&full_path, &filename)) { BUS_SET_OOM (error); _dbus_string_free (&full_path); goto failed; } if (_dbus_string_ends_with_c_str (&full_path, ".conf")) { if (!include_file (parser, &full_path, TRUE, error)) { _dbus_string_free (&full_path); goto failed; } } _dbus_string_free (&full_path); } if (dbus_error_is_set (&tmp_error)) { dbus_move_error (&tmp_error, error); goto failed; } if (!_dbus_string_copy_data (dirname, &s)) { BUS_SET_OOM (error); goto failed; } if (!_dbus_list_append (&parser->conf_dirs, s)) { dbus_free (s); BUS_SET_OOM (error); goto failed; } retval = TRUE; failed: _dbus_string_free (&filename); if (dir) _dbus_directory_close (dir); return retval; } dbus_bool_t bus_config_parser_content (BusConfigParser *parser, const DBusString *content, DBusError *error) { Element *e; _DBUS_ASSERT_ERROR_IS_CLEAR (error); #if 0 { const char *c_str; _dbus_string_get_const_data (content, &c_str); printf ("CONTENT %d bytes: %s\n", _dbus_string_get_length (content), c_str); } #endif e = peek_element (parser); if (e == NULL) { dbus_set_error (error, DBUS_ERROR_FAILED, "Text content outside of any XML element in configuration file"); return FALSE; } else if (e->had_content) { _dbus_assert_not_reached ("Element had multiple content blocks"); return FALSE; } switch (top_element_type (parser)) { case ELEMENT_NONE: _dbus_assert_not_reached ("element at top of stack has no type"); return FALSE; case ELEMENT_BUSCONFIG: case ELEMENT_POLICY: case ELEMENT_ALLOW: case ELEMENT_DENY: case ELEMENT_FORK: case ELEMENT_SELINUX: case ELEMENT_ASSOCIATE: if (all_whitespace (content)) return TRUE; else { dbus_set_error (error, DBUS_ERROR_FAILED, "No text content expected inside XML element %s in configuration file", element_type_to_name (top_element_type (parser))); return FALSE; } case ELEMENT_PIDFILE: { char *s; e->had_content = TRUE; if (!_dbus_string_copy_data (content, &s)) goto nomem; dbus_free (parser->pidfile); parser->pidfile = s; } break; case ELEMENT_INCLUDE: { DBusString full_path, selinux_policy_root; e->had_content = TRUE; if (e->d.include.if_selinux_enabled && !bus_selinux_enabled ()) break; if (!_dbus_string_init (&full_path)) goto nomem; if (e->d.include.selinux_root_relative) { if (!bus_selinux_get_policy_root ()) { dbus_set_error (error, DBUS_ERROR_FAILED, "Could not determine SELinux policy root for relative inclusion"); _dbus_string_free (&full_path); return FALSE; } _dbus_string_init_const (&selinux_policy_root, bus_selinux_get_policy_root ()); if (!make_full_path (&selinux_policy_root, content, &full_path)) { _dbus_string_free (&full_path); goto nomem; } } else if (!make_full_path (&parser->basedir, content, &full_path)) { _dbus_string_free (&full_path); goto nomem; } if (!include_file (parser, &full_path, e->d.include.ignore_missing, error)) { _dbus_string_free (&full_path); return FALSE; } _dbus_string_free (&full_path); } break; case ELEMENT_INCLUDEDIR: { DBusString full_path; e->had_content = TRUE; if (!_dbus_string_init (&full_path)) goto nomem; if (!make_full_path (&parser->basedir, content, &full_path)) { _dbus_string_free (&full_path); goto nomem; } if (!include_dir (parser, &full_path, error)) { _dbus_string_free (&full_path); return FALSE; } _dbus_string_free (&full_path); } break; case ELEMENT_USER: { char *s; e->had_content = TRUE; if (!_dbus_string_copy_data (content, &s)) goto nomem; dbus_free (parser->user); parser->user = s; } break; case ELEMENT_TYPE: { char *s; e->had_content = TRUE; if (!_dbus_string_copy_data (content, &s)) goto nomem; dbus_free (parser->bus_type); parser->bus_type = s; } break; case ELEMENT_LISTEN: { char *s; e->had_content = TRUE; if (!_dbus_string_copy_data (content, &s)) goto nomem; if (!_dbus_list_append (&parser->listen_on, s)) { dbus_free (s); goto nomem; } } break; case ELEMENT_AUTH: { char *s; e->had_content = TRUE; if (!_dbus_string_copy_data (content, &s)) goto nomem; if (!_dbus_list_append (&parser->mechanisms, s)) { dbus_free (s); goto nomem; } } break; case ELEMENT_SERVICEDIR: { char *s; DBusString full_path; e->had_content = TRUE; if (!_dbus_string_init (&full_path)) goto nomem; if (!make_full_path (&parser->basedir, content, &full_path)) { _dbus_string_free (&full_path); goto nomem; } if (!_dbus_string_copy_data (&full_path, &s)) { _dbus_string_free (&full_path); goto nomem; } if (!_dbus_list_append (&parser->service_dirs, s)) { _dbus_string_free (&full_path); dbus_free (s); goto nomem; } _dbus_string_free (&full_path); } break; case ELEMENT_LIMIT: { long val; e->had_content = TRUE; val = 0; if (!_dbus_string_parse_int (content, 0, &val, NULL)) { dbus_set_error (error, DBUS_ERROR_FAILED, " element has invalid value (could not parse as integer)", e->d.limit.name); return FALSE; } e->d.limit.value = val; _dbus_verbose ("Loaded value %ld for limit %s\n", e->d.limit.value, e->d.limit.name); } break; } _DBUS_ASSERT_ERROR_IS_CLEAR (error); return TRUE; nomem: BUS_SET_OOM (error); return FALSE; } dbus_bool_t bus_config_parser_finished (BusConfigParser *parser, DBusError *error) { _DBUS_ASSERT_ERROR_IS_CLEAR (error); if (parser->stack != NULL) { dbus_set_error (error, DBUS_ERROR_FAILED, "Element <%s> was not closed in configuration file", element_type_to_name (top_element_type (parser))); return FALSE; } if (parser->is_toplevel && parser->listen_on == NULL) { dbus_set_error (error, DBUS_ERROR_FAILED, "Configuration file needs one or more elements giving addresses"); return FALSE; } return TRUE; } const char* bus_config_parser_get_user (BusConfigParser *parser) { return parser->user; } const char* bus_config_parser_get_type (BusConfigParser *parser) { return parser->bus_type; } DBusList** bus_config_parser_get_addresses (BusConfigParser *parser) { return &parser->listen_on; } DBusList** bus_config_parser_get_mechanisms (BusConfigParser *parser) { return &parser->mechanisms; } DBusList** bus_config_parser_get_service_dirs (BusConfigParser *parser) { return &parser->service_dirs; } DBusList** bus_config_parser_get_conf_dirs (BusConfigParser *parser) { return &parser->conf_dirs; } dbus_bool_t bus_config_parser_get_fork (BusConfigParser *parser) { return parser->fork; } const char * bus_config_parser_get_pidfile (BusConfigParser *parser) { return parser->pidfile; } BusPolicy* bus_config_parser_steal_policy (BusConfigParser *parser) { BusPolicy *policy; _dbus_assert (parser->policy != NULL); /* can only steal the policy 1 time */ policy = parser->policy; parser->policy = NULL; return policy; } /* Overwrite any limits that were set in the configuration file */ void bus_config_parser_get_limits (BusConfigParser *parser, BusLimits *limits) { *limits = parser->limits; } DBusHashTable* bus_config_parser_steal_service_context_table (BusConfigParser *parser) { DBusHashTable *table; _dbus_assert (parser->service_context_table != NULL); /* can only steal once */ table = parser->service_context_table; parser->service_context_table = NULL; return table; } #ifdef DBUS_BUILD_TESTS #include typedef enum { VALID, INVALID, UNKNOWN } Validity; static dbus_bool_t do_load (const DBusString *full_path, Validity validity, dbus_bool_t oom_possible) { BusConfigParser *parser; DBusError error; dbus_error_init (&error); parser = bus_config_load (full_path, TRUE, NULL, &error); if (parser == NULL) { _DBUS_ASSERT_ERROR_IS_SET (&error); if (oom_possible && dbus_error_has_name (&error, DBUS_ERROR_NO_MEMORY)) { _dbus_verbose ("Failed to load valid file due to OOM\n"); dbus_error_free (&error); return TRUE; } else if (validity == VALID) { _dbus_warn ("Failed to load valid file but still had memory: %s\n", error.message); dbus_error_free (&error); return FALSE; } else { dbus_error_free (&error); return TRUE; } } else { _DBUS_ASSERT_ERROR_IS_CLEAR (&error); bus_config_parser_unref (parser); if (validity == INVALID) { _dbus_warn ("Accepted invalid file\n"); return FALSE; } return TRUE; } } typedef struct { const DBusString *full_path; Validity validity; } LoaderOomData; static dbus_bool_t check_loader_oom_func (void *data) { LoaderOomData *d = data; return do_load (d->full_path, d->validity, TRUE); } static dbus_bool_t process_test_valid_subdir (const DBusString *test_base_dir, const char *subdir, Validity validity) { DBusString test_directory; DBusString filename; DBusDirIter *dir; dbus_bool_t retval; DBusError error; retval = FALSE; dir = NULL; if (!_dbus_string_init (&test_directory)) _dbus_assert_not_reached ("didn't allocate test_directory\n"); _dbus_string_init_const (&filename, subdir); if (!_dbus_string_copy (test_base_dir, 0, &test_directory, 0)) _dbus_assert_not_reached ("couldn't copy test_base_dir to test_directory"); if (!_dbus_concat_dir_and_file (&test_directory, &filename)) _dbus_assert_not_reached ("couldn't allocate full path"); _dbus_string_free (&filename); if (!_dbus_string_init (&filename)) _dbus_assert_not_reached ("didn't allocate filename string\n"); dbus_error_init (&error); dir = _dbus_directory_open (&test_directory, &error); if (dir == NULL) { _dbus_warn ("Could not open %s: %s\n", _dbus_string_get_const_data (&test_directory), error.message); dbus_error_free (&error); goto failed; } if (validity == VALID) printf ("Testing valid files:\n"); else if (validity == INVALID) printf ("Testing invalid files:\n"); else printf ("Testing unknown files:\n"); next: while (_dbus_directory_get_next_file (dir, &filename, &error)) { DBusString full_path; LoaderOomData d; if (!_dbus_string_init (&full_path)) _dbus_assert_not_reached ("couldn't init string"); if (!_dbus_string_copy (&test_directory, 0, &full_path, 0)) _dbus_assert_not_reached ("couldn't copy dir to full_path"); if (!_dbus_concat_dir_and_file (&full_path, &filename)) _dbus_assert_not_reached ("couldn't concat file to dir"); if (!_dbus_string_ends_with_c_str (&full_path, ".conf")) { _dbus_verbose ("Skipping non-.conf file %s\n", _dbus_string_get_const_data (&filename)); _dbus_string_free (&full_path); goto next; } printf (" %s\n", _dbus_string_get_const_data (&filename)); _dbus_verbose (" expecting %s\n", validity == VALID ? "valid" : (validity == INVALID ? "invalid" : (validity == UNKNOWN ? "unknown" : "???"))); d.full_path = &full_path; d.validity = validity; /* FIXME hackaround for an expat problem, see * https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124747 * http://freedesktop.org/pipermail/dbus/2004-May/001153.html */ /* if (!_dbus_test_oom_handling ("config-loader", check_loader_oom_func, &d)) */ if (!check_loader_oom_func (&d)) _dbus_assert_not_reached ("test failed"); _dbus_string_free (&full_path); } if (dbus_error_is_set (&error)) { _dbus_warn ("Could not get next file in %s: %s\n", _dbus_string_get_const_data (&test_directory), error.message); dbus_error_free (&error); goto failed; } retval = TRUE; failed: if (dir) _dbus_directory_close (dir); _dbus_string_free (&test_directory); _dbus_string_free (&filename); return retval; } static dbus_bool_t bools_equal (dbus_bool_t a, dbus_bool_t b) { return a ? b : !b; } static dbus_bool_t strings_equal_or_both_null (const char *a, const char *b) { if (a == NULL || b == NULL) return a == b; else return !strcmp (a, b); } static dbus_bool_t elements_equal (const Element *a, const Element *b) { if (a->type != b->type) return FALSE; if (!bools_equal (a->had_content, b->had_content)) return FALSE; switch (a->type) { case ELEMENT_INCLUDE: if (!bools_equal (a->d.include.ignore_missing, b->d.include.ignore_missing)) return FALSE; break; case ELEMENT_POLICY: if (a->d.policy.type != b->d.policy.type) return FALSE; if (a->d.policy.gid_uid_or_at_console != b->d.policy.gid_uid_or_at_console) return FALSE; break; case ELEMENT_LIMIT: if (strcmp (a->d.limit.name, b->d.limit.name)) return FALSE; if (a->d.limit.value != b->d.limit.value) return FALSE; break; default: /* do nothing */ break; } return TRUE; } static dbus_bool_t lists_of_elements_equal (DBusList *a, DBusList *b) { DBusList *ia; DBusList *ib; ia = a; ib = b; while (ia != NULL && ib != NULL) { if (elements_equal (ia->data, ib->data)) return FALSE; ia = _dbus_list_get_next_link (&a, ia); ib = _dbus_list_get_next_link (&b, ib); } return ia == NULL && ib == NULL; } static dbus_bool_t lists_of_c_strings_equal (DBusList *a, DBusList *b) { DBusList *ia; DBusList *ib; ia = a; ib = b; while (ia != NULL && ib != NULL) { if (strcmp (ia->data, ib->data)) return FALSE; ia = _dbus_list_get_next_link (&a, ia); ib = _dbus_list_get_next_link (&b, ib); } return ia == NULL && ib == NULL; } static dbus_bool_t limits_equal (const BusLimits *a, const BusLimits *b) { return (a->max_incoming_bytes == b->max_incoming_bytes || a->max_outgoing_bytes == b->max_outgoing_bytes || a->max_message_size == b->max_message_size || a->activation_timeout == b->activation_timeout || a->auth_timeout == b->auth_timeout || a->max_completed_connections == b->max_completed_connections || a->max_incomplete_connections == b->max_incomplete_connections || a->max_connections_per_user == b->max_connections_per_user || a->max_pending_activations == b->max_pending_activations || a->max_services_per_connection == b->max_services_per_connection || a->max_match_rules_per_connection == b->max_match_rules_per_connection || a->max_replies_per_connection == b->max_replies_per_connection || a->reply_timeout == b->reply_timeout); } static dbus_bool_t config_parsers_equal (const BusConfigParser *a, const BusConfigParser *b) { if (!_dbus_string_equal (&a->basedir, &b->basedir)) return FALSE; if (!lists_of_elements_equal (a->stack, b->stack)) return FALSE; if (!strings_equal_or_both_null (a->user, b->user)) return FALSE; if (!lists_of_c_strings_equal (a->listen_on, b->listen_on)) return FALSE; if (!lists_of_c_strings_equal (a->mechanisms, b->mechanisms)) return FALSE; if (!lists_of_c_strings_equal (a->service_dirs, b->service_dirs)) return FALSE; /* FIXME: compare policy */ /* FIXME: compare service selinux ID table */ if (! limits_equal (&a->limits, &b->limits)) return FALSE; if (!strings_equal_or_both_null (a->pidfile, b->pidfile)) return FALSE; if (! bools_equal (a->fork, b->fork)) return FALSE; if (! bools_equal (a->is_toplevel, b->is_toplevel)) return FALSE; return TRUE; } static dbus_bool_t all_are_equiv (const DBusString *target_directory) { DBusString filename; DBusDirIter *dir; BusConfigParser *first_parser; BusConfigParser *parser; DBusError error; dbus_bool_t equal; dbus_bool_t retval; dir = NULL; first_parser = NULL; parser = NULL; retval = FALSE; if (!_dbus_string_init (&filename)) _dbus_assert_not_reached ("didn't allocate filename string"); dbus_error_init (&error); dir = _dbus_directory_open (target_directory, &error); if (dir == NULL) { _dbus_warn ("Could not open %s: %s\n", _dbus_string_get_const_data (target_directory), error.message); dbus_error_free (&error); goto finished; } printf ("Comparing equivalent files:\n"); next: while (_dbus_directory_get_next_file (dir, &filename, &error)) { DBusString full_path; if (!_dbus_string_init (&full_path)) _dbus_assert_not_reached ("couldn't init string"); if (!_dbus_string_copy (target_directory, 0, &full_path, 0)) _dbus_assert_not_reached ("couldn't copy dir to full_path"); if (!_dbus_concat_dir_and_file (&full_path, &filename)) _dbus_assert_not_reached ("couldn't concat file to dir"); if (!_dbus_string_ends_with_c_str (&full_path, ".conf")) { _dbus_verbose ("Skipping non-.conf file %s\n", _dbus_string_get_const_data (&filename)); _dbus_string_free (&full_path); goto next; } printf (" %s\n", _dbus_string_get_const_data (&filename)); parser = bus_config_load (&full_path, TRUE, NULL, &error); if (parser == NULL) { _dbus_warn ("Could not load file %s: %s\n", _dbus_string_get_const_data (&full_path), error.message); _dbus_string_free (&full_path); dbus_error_free (&error); goto finished; } else if (first_parser == NULL) { _dbus_string_free (&full_path); first_parser = parser; } else { _dbus_string_free (&full_path); equal = config_parsers_equal (first_parser, parser); bus_config_parser_unref (parser); if (! equal) goto finished; } } retval = TRUE; finished: _dbus_string_free (&filename); if (first_parser) bus_config_parser_unref (first_parser); if (dir) _dbus_directory_close (dir); return retval; } static dbus_bool_t process_test_equiv_subdir (const DBusString *test_base_dir, const char *subdir) { DBusString test_directory; DBusString filename; DBusDirIter *dir; DBusError error; dbus_bool_t equal; dbus_bool_t retval; dir = NULL; retval = FALSE; if (!_dbus_string_init (&test_directory)) _dbus_assert_not_reached ("didn't allocate test_directory"); _dbus_string_init_const (&filename, subdir); if (!_dbus_string_copy (test_base_dir, 0, &test_directory, 0)) _dbus_assert_not_reached ("couldn't copy test_base_dir to test_directory"); if (!_dbus_concat_dir_and_file (&test_directory, &filename)) _dbus_assert_not_reached ("couldn't allocate full path"); _dbus_string_free (&filename); if (!_dbus_string_init (&filename)) _dbus_assert_not_reached ("didn't allocate filename string"); dbus_error_init (&error); dir = _dbus_directory_open (&test_directory, &error); if (dir == NULL) { _dbus_warn ("Could not open %s: %s\n", _dbus_string_get_const_data (&test_directory), error.message); dbus_error_free (&error); goto finished; } while (_dbus_directory_get_next_file (dir, &filename, &error)) { DBusString full_path; /* Skip CVS's magic directories! */ if (_dbus_string_equal_c_str (&filename, "CVS")) continue; if (!_dbus_string_init (&full_path)) _dbus_assert_not_reached ("couldn't init string"); if (!_dbus_string_copy (&test_directory, 0, &full_path, 0)) _dbus_assert_not_reached ("couldn't copy dir to full_path"); if (!_dbus_concat_dir_and_file (&full_path, &filename)) _dbus_assert_not_reached ("couldn't concat file to dir"); equal = all_are_equiv (&full_path); _dbus_string_free (&full_path); if (!equal) goto finished; } retval = TRUE; finished: _dbus_string_free (&test_directory); _dbus_string_free (&filename); if (dir) _dbus_directory_close (dir); return retval; } dbus_bool_t bus_config_parser_test (const DBusString *test_data_dir) { if (test_data_dir == NULL || _dbus_string_get_length (test_data_dir) == 0) { printf ("No test data\n"); return TRUE; } if (!process_test_valid_subdir (test_data_dir, "valid-config-files", VALID)) return FALSE; if (!process_test_valid_subdir (test_data_dir, "invalid-config-files", INVALID)) return FALSE; if (!process_test_equiv_subdir (test_data_dir, "equiv-config-files")) return FALSE; return TRUE; } #endif /* DBUS_BUILD_TESTS */