os/ossrv/ofdbus/dbus/bus/config-parser.c
changeset 0 bde4ae8d615e
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/os/ossrv/ofdbus/dbus/bus/config-parser.c	Fri Jun 15 03:10:57 2012 +0200
     1.3 @@ -0,0 +1,3227 @@
     1.4 +/* -*- mode: C; c-file-style: "gnu" -*- */
     1.5 +/* config-parser.c  XML-library-agnostic configuration file parser
     1.6 + *
     1.7 + * Copyright (C) 2003, 2004 Red Hat, Inc.
     1.8 + * Portion Copyright © 2008 Nokia Corporation and/or its subsidiary(-ies). All rights reserved.
     1.9 + * Licensed under the Academic Free License version 2.1
    1.10 + *
    1.11 + * This program is free software; you can redistribute it and/or modify
    1.12 + * it under the terms of the GNU General Public License as published by
    1.13 + * the Free Software Foundation; either version 2 of the License, or
    1.14 + * (at your option) any later version.
    1.15 + *
    1.16 + * This program is distributed in the hope that it will be useful,
    1.17 + * but WITHOUT ANY WARRANTY; without even the implied warranty of
    1.18 + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    1.19 + * GNU General Public License for more details.
    1.20 + *
    1.21 + * You should have received a copy of the GNU General Public License
    1.22 + * along with this program; if not, write to the Free Software
    1.23 + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
    1.24 + *
    1.25 + */
    1.26 +#include "config-parser.h"
    1.27 +#include "test.h"
    1.28 +#include "utils.h"
    1.29 +#include "policy.h"
    1.30 +#include "selinux.h"
    1.31 +#ifndef __SYMBIAN32__
    1.32 +#include <dbus/dbus-list.h>
    1.33 +#include <dbus/dbus-internals.h>
    1.34 +#else
    1.35 +#include "dbus-list.h"
    1.36 +#include "dbus-internals.h"
    1.37 +#endif //__SYMBIAN32__
    1.38 +#include <string.h>
    1.39 +
    1.40 +typedef enum
    1.41 +{
    1.42 +  ELEMENT_NONE,
    1.43 +  ELEMENT_BUSCONFIG,
    1.44 +  ELEMENT_INCLUDE,
    1.45 +  ELEMENT_USER,
    1.46 +  ELEMENT_LISTEN,
    1.47 +  ELEMENT_AUTH,
    1.48 +  ELEMENT_POLICY,
    1.49 +  ELEMENT_LIMIT,
    1.50 +  ELEMENT_ALLOW,
    1.51 +  ELEMENT_DENY,
    1.52 +  ELEMENT_FORK,
    1.53 +  ELEMENT_PIDFILE,
    1.54 +  ELEMENT_SERVICEDIR,
    1.55 +  ELEMENT_INCLUDEDIR,
    1.56 +  ELEMENT_TYPE,
    1.57 +  ELEMENT_SELINUX,
    1.58 +  ELEMENT_ASSOCIATE,
    1.59 +  ELEMENT_STANDARD_SESSION_SERVICEDIRS
    1.60 +} ElementType;
    1.61 +
    1.62 +typedef enum
    1.63 +{
    1.64 +  /* we ignore policies for unknown groups/users */
    1.65 +  POLICY_IGNORED,
    1.66 +
    1.67 +  /* non-ignored */
    1.68 +  POLICY_DEFAULT,
    1.69 +  POLICY_MANDATORY,
    1.70 +  POLICY_USER,
    1.71 +  POLICY_GROUP,
    1.72 +  POLICY_CONSOLE
    1.73 +} PolicyType;
    1.74 +
    1.75 +typedef struct
    1.76 +{
    1.77 +  ElementType type;
    1.78 +
    1.79 +  unsigned int had_content : 1;
    1.80 +
    1.81 +  union
    1.82 +  {
    1.83 +    struct
    1.84 +    {
    1.85 +      unsigned int ignore_missing : 1;
    1.86 +      unsigned int if_selinux_enabled : 1;
    1.87 +      unsigned int selinux_root_relative : 1;
    1.88 +    } include;
    1.89 +
    1.90 +    struct
    1.91 +    {
    1.92 +      PolicyType type;
    1.93 +      unsigned long gid_uid_or_at_console;      
    1.94 +    } policy;
    1.95 +
    1.96 +    struct
    1.97 +    {
    1.98 +      char *name;
    1.99 +      long value;
   1.100 +    } limit;
   1.101 +    
   1.102 +  } d;
   1.103 +
   1.104 +} Element;
   1.105 +
   1.106 +/**
   1.107 + * Parser for bus configuration file. 
   1.108 + */
   1.109 +struct BusConfigParser
   1.110 +{
   1.111 +  int refcount;        /**< Reference count */
   1.112 +
   1.113 +  DBusString basedir;  /**< Directory we resolve paths relative to */
   1.114 +  
   1.115 +  DBusList *stack;     /**< stack of Element */
   1.116 +
   1.117 +  char *user;          /**< user to run as */
   1.118 +
   1.119 +  char *bus_type;          /**< Message bus type */
   1.120 +  
   1.121 +  DBusList *listen_on; /**< List of addresses to listen to */
   1.122 +
   1.123 +  DBusList *mechanisms; /**< Auth mechanisms */
   1.124 +
   1.125 +  DBusList *service_dirs; /**< Directories to look for services in */
   1.126 +
   1.127 +  DBusList *conf_dirs;   /**< Directories to look for policy configuration in */
   1.128 +
   1.129 +  BusPolicy *policy;     /**< Security policy */
   1.130 +
   1.131 +  BusLimits limits;      /**< Limits */
   1.132 +
   1.133 +  char *pidfile;         /**< PID file */
   1.134 +
   1.135 +  DBusList *included_files;  /**< Included files stack */
   1.136 +
   1.137 +  DBusHashTable *service_context_table; /**< Map service names to SELinux contexts */
   1.138 +
   1.139 +  unsigned int fork : 1; /**< TRUE to fork into daemon mode */
   1.140 +
   1.141 +  unsigned int is_toplevel : 1; /**< FALSE if we are a sub-config-file inside another one */
   1.142 +};
   1.143 +
   1.144 +static const char*
   1.145 +element_type_to_name (ElementType type)
   1.146 +{
   1.147 +  switch (type)
   1.148 +    {
   1.149 +    case ELEMENT_NONE:
   1.150 +      return NULL;
   1.151 +    case ELEMENT_BUSCONFIG:
   1.152 +      return "busconfig";
   1.153 +    case ELEMENT_INCLUDE:
   1.154 +      return "include";
   1.155 +    case ELEMENT_USER:
   1.156 +      return "user";
   1.157 +    case ELEMENT_LISTEN:
   1.158 +      return "listen";
   1.159 +    case ELEMENT_AUTH:
   1.160 +      return "auth";
   1.161 +    case ELEMENT_POLICY:
   1.162 +      return "policy";
   1.163 +    case ELEMENT_LIMIT:
   1.164 +      return "limit";
   1.165 +    case ELEMENT_ALLOW:
   1.166 +      return "allow";
   1.167 +    case ELEMENT_DENY:
   1.168 +      return "deny";
   1.169 +    case ELEMENT_FORK:
   1.170 +      return "fork";
   1.171 +    case ELEMENT_PIDFILE:
   1.172 +      return "pidfile";
   1.173 +    case ELEMENT_STANDARD_SESSION_SERVICEDIRS:
   1.174 +      return "standard_session_servicedirs";
   1.175 +    case ELEMENT_SERVICEDIR:
   1.176 +      return "servicedir";
   1.177 +    case ELEMENT_INCLUDEDIR:
   1.178 +      return "includedir";
   1.179 +    case ELEMENT_TYPE:
   1.180 +      return "type";
   1.181 +    case ELEMENT_SELINUX:
   1.182 +      return "selinux";
   1.183 +    case ELEMENT_ASSOCIATE:
   1.184 +      return "associate";
   1.185 +    }
   1.186 +
   1.187 +  _dbus_assert_not_reached ("bad element type");
   1.188 +
   1.189 +  return NULL;
   1.190 +}
   1.191 +
   1.192 +static Element*
   1.193 +push_element (BusConfigParser *parser,
   1.194 +              ElementType      type)
   1.195 +{
   1.196 +  Element *e;
   1.197 +
   1.198 +  _dbus_assert (type != ELEMENT_NONE);
   1.199 +  
   1.200 +  e = dbus_new0 (Element, 1);
   1.201 +  if (e == NULL)
   1.202 +    return NULL;
   1.203 +
   1.204 +  if (!_dbus_list_append (&parser->stack, e))
   1.205 +    {
   1.206 +      dbus_free (e);
   1.207 +      return NULL;
   1.208 +    }
   1.209 +  
   1.210 +  e->type = type;
   1.211 +
   1.212 +  return e;
   1.213 +}
   1.214 +
   1.215 +static void
   1.216 +element_free (Element *e)
   1.217 +{
   1.218 +  if (e->type == ELEMENT_LIMIT)
   1.219 +    dbus_free (e->d.limit.name);
   1.220 +  
   1.221 +  dbus_free (e);
   1.222 +}
   1.223 +
   1.224 +static void
   1.225 +pop_element (BusConfigParser *parser)
   1.226 +{
   1.227 +  Element *e;
   1.228 +
   1.229 +  e = _dbus_list_pop_last (&parser->stack);
   1.230 +  
   1.231 +  element_free (e);
   1.232 +}
   1.233 +
   1.234 +static Element*
   1.235 +peek_element (BusConfigParser *parser)
   1.236 +{
   1.237 +  Element *e;
   1.238 +
   1.239 +  e = _dbus_list_get_last (&parser->stack);
   1.240 +
   1.241 +  return e;
   1.242 +}
   1.243 +
   1.244 +static ElementType
   1.245 +top_element_type (BusConfigParser *parser)
   1.246 +{
   1.247 +  Element *e;
   1.248 +
   1.249 +  e = _dbus_list_get_last (&parser->stack);
   1.250 +
   1.251 +  if (e)
   1.252 +    return e->type;
   1.253 +  else
   1.254 +    return ELEMENT_NONE;
   1.255 +}
   1.256 +
   1.257 +static dbus_bool_t
   1.258 +merge_service_context_hash (DBusHashTable *dest,
   1.259 +			    DBusHashTable *from)
   1.260 +{
   1.261 +  DBusHashIter iter;
   1.262 +  char *service_copy;
   1.263 +  char *context_copy;
   1.264 +
   1.265 +  service_copy = NULL;
   1.266 +  context_copy = NULL;
   1.267 +
   1.268 +  _dbus_hash_iter_init (from, &iter);
   1.269 +  while (_dbus_hash_iter_next (&iter))
   1.270 +    {
   1.271 +      const char *service = _dbus_hash_iter_get_string_key (&iter);
   1.272 +      const char *context = _dbus_hash_iter_get_value (&iter);
   1.273 +
   1.274 +      service_copy = _dbus_strdup (service);
   1.275 +      if (service_copy == NULL)
   1.276 +        goto fail;
   1.277 +      context_copy = _dbus_strdup (context);
   1.278 +      if (context_copy == NULL)
   1.279 +        goto fail; 
   1.280 +      
   1.281 +      if (!_dbus_hash_table_insert_string (dest, service_copy, context_copy))
   1.282 +        goto fail;
   1.283 +
   1.284 +      service_copy = NULL;
   1.285 +      context_copy = NULL;    
   1.286 +    }
   1.287 +
   1.288 +  return TRUE;
   1.289 +
   1.290 + fail:
   1.291 +  if (service_copy)
   1.292 +    dbus_free (service_copy);
   1.293 +
   1.294 +  if (context_copy)
   1.295 +    dbus_free (context_copy);
   1.296 +
   1.297 +  return FALSE;
   1.298 +}
   1.299 +
   1.300 +static dbus_bool_t
   1.301 +service_dirs_find_dir (DBusList **service_dirs,
   1.302 +                       const char *dir)
   1.303 +{
   1.304 +  DBusList *link;
   1.305 +
   1.306 +  _dbus_assert (dir != NULL);
   1.307 +
   1.308 +  for (link = *service_dirs; link; link = _dbus_list_get_next_link(service_dirs, link))
   1.309 +    {
   1.310 +      const char *link_dir;
   1.311 +      
   1.312 +      link_dir = (const char *)link->data;
   1.313 +      if (strcmp (dir, link_dir) == 0)
   1.314 +        return TRUE;
   1.315 +    }
   1.316 +
   1.317 +  return FALSE;
   1.318 +}
   1.319 +
   1.320 +static dbus_bool_t
   1.321 +service_dirs_append_unique_or_free (DBusList **service_dirs,
   1.322 +                                    char *dir)
   1.323 +{
   1.324 +  if (!service_dirs_find_dir (service_dirs, dir))
   1.325 +    return _dbus_list_append (service_dirs, dir);  
   1.326 +
   1.327 +  dbus_free (dir);
   1.328 +  return TRUE;
   1.329 +}
   1.330 +
   1.331 +static void 
   1.332 +service_dirs_append_link_unique_or_free (DBusList **service_dirs,
   1.333 +                                         DBusList *dir_link)
   1.334 +{
   1.335 +  if (!service_dirs_find_dir (service_dirs, dir_link->data))
   1.336 +    {
   1.337 +      _dbus_list_append_link (service_dirs, dir_link);
   1.338 +    }
   1.339 +  else
   1.340 +    {
   1.341 +      dbus_free (dir_link->data);
   1.342 +      _dbus_list_free_link (dir_link);
   1.343 +    }
   1.344 +}
   1.345 +
   1.346 +static dbus_bool_t
   1.347 +merge_included (BusConfigParser *parser,
   1.348 +                BusConfigParser *included,
   1.349 +                DBusError       *error)
   1.350 +{
   1.351 +  DBusList *link;
   1.352 +
   1.353 +  if (!bus_policy_merge (parser->policy,
   1.354 +                         included->policy))
   1.355 +    {
   1.356 +      BUS_SET_OOM (error);
   1.357 +      return FALSE;
   1.358 +    }
   1.359 +
   1.360 +  if (!merge_service_context_hash (parser->service_context_table,
   1.361 +				   included->service_context_table))
   1.362 +    {
   1.363 +      BUS_SET_OOM (error);
   1.364 +      return FALSE;
   1.365 +    }
   1.366 +  
   1.367 +  if (included->user != NULL)
   1.368 +    {
   1.369 +      dbus_free (parser->user);
   1.370 +      parser->user = included->user;
   1.371 +      included->user = NULL;
   1.372 +    }
   1.373 +
   1.374 +  if (included->bus_type != NULL)
   1.375 +    {
   1.376 +      dbus_free (parser->bus_type);
   1.377 +      parser->bus_type = included->bus_type;
   1.378 +      included->bus_type = NULL;
   1.379 +    }
   1.380 +  
   1.381 +  if (included->fork)
   1.382 +    parser->fork = TRUE;
   1.383 +
   1.384 +  if (included->pidfile != NULL)
   1.385 +    {
   1.386 +      dbus_free (parser->pidfile);
   1.387 +      parser->pidfile = included->pidfile;
   1.388 +      included->pidfile = NULL;
   1.389 +    }
   1.390 +  
   1.391 +  while ((link = _dbus_list_pop_first_link (&included->listen_on)))
   1.392 +    _dbus_list_append_link (&parser->listen_on, link);
   1.393 +
   1.394 +  while ((link = _dbus_list_pop_first_link (&included->mechanisms)))
   1.395 +    _dbus_list_append_link (&parser->mechanisms, link);
   1.396 +
   1.397 +  while ((link = _dbus_list_pop_first_link (&included->service_dirs)))
   1.398 +    service_dirs_append_link_unique_or_free (&parser->service_dirs, link);
   1.399 +
   1.400 +  while ((link = _dbus_list_pop_first_link (&included->conf_dirs)))
   1.401 +    _dbus_list_append_link (&parser->conf_dirs, link);
   1.402 +  
   1.403 +  return TRUE;
   1.404 +}
   1.405 +
   1.406 +static dbus_bool_t
   1.407 +seen_include (BusConfigParser  *parser,
   1.408 +	      const DBusString *file)
   1.409 +{
   1.410 +  DBusList *iter;
   1.411 +
   1.412 +  iter = parser->included_files;
   1.413 +  while (iter != NULL)
   1.414 +    {
   1.415 +      if (! strcmp (_dbus_string_get_const_data (file), iter->data))
   1.416 +	return TRUE;
   1.417 +
   1.418 +      iter = _dbus_list_get_next_link (&parser->included_files, iter);
   1.419 +    }
   1.420 +
   1.421 +  return FALSE;
   1.422 +}
   1.423 +
   1.424 +BusConfigParser*
   1.425 +bus_config_parser_new (const DBusString      *basedir,
   1.426 +                       dbus_bool_t            is_toplevel,
   1.427 +                       const BusConfigParser *parent)
   1.428 +{
   1.429 +  BusConfigParser *parser;
   1.430 +
   1.431 +  parser = dbus_new0 (BusConfigParser, 1);
   1.432 +  if (parser == NULL)
   1.433 +    return NULL;
   1.434 +
   1.435 +  parser->is_toplevel = !!is_toplevel;
   1.436 +  
   1.437 +  if (!_dbus_string_init (&parser->basedir))
   1.438 +    {
   1.439 +      dbus_free (parser);
   1.440 +      return NULL;
   1.441 +    }
   1.442 +
   1.443 +  if (((parser->policy = bus_policy_new ()) == NULL) ||
   1.444 +      !_dbus_string_copy (basedir, 0, &parser->basedir, 0) ||
   1.445 +      ((parser->service_context_table = _dbus_hash_table_new (DBUS_HASH_STRING,
   1.446 +							      dbus_free,
   1.447 +							      dbus_free)) == NULL))
   1.448 +    {
   1.449 +      if (parser->policy)
   1.450 +        bus_policy_unref (parser->policy);
   1.451 +      
   1.452 +      _dbus_string_free (&parser->basedir);
   1.453 +
   1.454 +      dbus_free (parser);
   1.455 +      return NULL;
   1.456 +    }
   1.457 +
   1.458 +  if (parent != NULL)
   1.459 +    {
   1.460 +      /* Initialize the parser's limits from the parent. */
   1.461 +      parser->limits = parent->limits;
   1.462 +
   1.463 +      /* Use the parent's list of included_files to avoid
   1.464 +	 circular inclusions. */
   1.465 +      parser->included_files = parent->included_files;
   1.466 +    }
   1.467 +  else
   1.468 +    {
   1.469 +
   1.470 +      /* Make up some numbers! woot! */
   1.471 +      parser->limits.max_incoming_bytes = _DBUS_ONE_MEGABYTE * 63;
   1.472 +      parser->limits.max_outgoing_bytes = _DBUS_ONE_MEGABYTE * 63;
   1.473 +      parser->limits.max_message_size = _DBUS_ONE_MEGABYTE * 32;
   1.474 +      
   1.475 +      /* Making this long means the user has to wait longer for an error
   1.476 +       * message if something screws up, but making it too short means
   1.477 +       * they might see a false failure.
   1.478 +       */
   1.479 +#ifdef __SYMBIAN32__
   1.480 +      parser->limits.activation_timeout = 250000; /*  changed to 250 seconds */
   1.481 +#else
   1.482 +      parser->limits.activation_timeout = 25000; 
   1.483 +#endif
   1.484 +      /* Making this long risks making a DOS attack easier, but too short
   1.485 +       * and legitimate auth will fail.  If interactive auth (ask user for
   1.486 +       * password) is allowed, then potentially it has to be quite long.
   1.487 +       */
   1.488 +      parser->limits.auth_timeout = 300000; /* 30 seconds bsr changed to 300 sec*/
   1.489 +      
   1.490 +      parser->limits.max_incomplete_connections = 32;
   1.491 +      parser->limits.max_connections_per_user = 128;
   1.492 +      
   1.493 +      /* Note that max_completed_connections / max_connections_per_user
   1.494 +       * is the number of users that would have to work together to
   1.495 +       * DOS all the other users.
   1.496 +       */
   1.497 +      parser->limits.max_completed_connections = 1024;
   1.498 +      
   1.499 +      parser->limits.max_pending_activations = 256;
   1.500 +      parser->limits.max_services_per_connection = 256;
   1.501 +      
   1.502 +      parser->limits.max_match_rules_per_connection = 512;
   1.503 +      
   1.504 +      parser->limits.reply_timeout = 5 * 60 * 1000; /* 5 minutes */
   1.505 +      parser->limits.max_replies_per_connection = 32;
   1.506 +      
   1.507 +      
   1.508 +      /*
   1.509 +      parser->limits.max_incoming_bytes = 1024 * 1024 * 63;
   1.510 +      parser->limits.max_outgoing_bytes = 1024 * 1024 * 63;
   1.511 +      parser->limits.max_message_size = 1024 * 1024 * 32;
   1.512 +      parser->limits.activation_timeout = 250000;
   1.513 +      parser->limits.auth_timeout = 300000;
   1.514 +      parser->limits.max_incomplete_connections = 32;
   1.515 +      parser->limits.max_connections_per_user = 128;
   1.516 +      parser->limits.max_completed_connections = 1024;
   1.517 +      parser->limits.max_pending_activations = 256;
   1.518 +      parser->limits.max_services_per_connection = 256;
   1.519 +      parser->limits.max_match_rules_per_connection = 512;
   1.520 +      parser->limits.reply_timeout = 5 * 60 * 1000;
   1.521 +      parser->limits.max_replies_per_connection = 32;
   1.522 +      */
   1.523 +      
   1.524 +      
   1.525 +      
   1.526 +    }
   1.527 +      
   1.528 +  parser->refcount = 1;
   1.529 +      
   1.530 +  return parser;
   1.531 +}
   1.532 +
   1.533 +BusConfigParser *
   1.534 +bus_config_parser_ref (BusConfigParser *parser)
   1.535 +{
   1.536 +  _dbus_assert (parser->refcount > 0);
   1.537 +
   1.538 +  parser->refcount += 1;
   1.539 +
   1.540 +  return parser;
   1.541 +}
   1.542 +
   1.543 +void
   1.544 +bus_config_parser_unref (BusConfigParser *parser)
   1.545 +{
   1.546 +  _dbus_assert (parser->refcount > 0);
   1.547 +
   1.548 +  parser->refcount -= 1;
   1.549 +
   1.550 +  if (parser->refcount == 0)
   1.551 +    {
   1.552 +      while (parser->stack != NULL)
   1.553 +        pop_element (parser);
   1.554 +
   1.555 +      dbus_free (parser->user);
   1.556 +      dbus_free (parser->bus_type);
   1.557 +      dbus_free (parser->pidfile);
   1.558 +      
   1.559 +      _dbus_list_foreach (&parser->listen_on,
   1.560 +                          (DBusForeachFunction) dbus_free,
   1.561 +                          NULL);
   1.562 +
   1.563 +      _dbus_list_clear (&parser->listen_on);
   1.564 +
   1.565 +      _dbus_list_foreach (&parser->service_dirs,
   1.566 +                          (DBusForeachFunction) dbus_free,
   1.567 +                          NULL);
   1.568 +
   1.569 +      _dbus_list_clear (&parser->service_dirs);
   1.570 +
   1.571 +      _dbus_list_foreach (&parser->conf_dirs,
   1.572 +                          (DBusForeachFunction) dbus_free,
   1.573 +                          NULL);
   1.574 +
   1.575 +      _dbus_list_clear (&parser->conf_dirs);
   1.576 +
   1.577 +      _dbus_list_foreach (&parser->mechanisms,
   1.578 +                          (DBusForeachFunction) dbus_free,
   1.579 +                          NULL);
   1.580 +
   1.581 +      _dbus_list_clear (&parser->mechanisms);
   1.582 +      
   1.583 +      _dbus_string_free (&parser->basedir);
   1.584 +
   1.585 +      if (parser->policy)
   1.586 +        bus_policy_unref (parser->policy);
   1.587 +
   1.588 +      if (parser->service_context_table)
   1.589 +        _dbus_hash_table_unref (parser->service_context_table);
   1.590 +      
   1.591 +      dbus_free (parser);
   1.592 +    }
   1.593 +}
   1.594 +
   1.595 +dbus_bool_t
   1.596 +bus_config_parser_check_doctype (BusConfigParser   *parser,
   1.597 +                                 const char        *doctype,
   1.598 +                                 DBusError         *error)
   1.599 +{
   1.600 +  _DBUS_ASSERT_ERROR_IS_CLEAR (error);
   1.601 +
   1.602 +  if (strcmp (doctype, "busconfig") != 0)
   1.603 +    {
   1.604 +      dbus_set_error (error,
   1.605 +                      DBUS_ERROR_FAILED,
   1.606 +                      "Configuration file has the wrong document type %s",
   1.607 +                      doctype);
   1.608 +      return FALSE;
   1.609 +    }
   1.610 +  else
   1.611 +    return TRUE;
   1.612 +}
   1.613 +
   1.614 +typedef struct
   1.615 +{
   1.616 +  const char  *name;
   1.617 +  const char **retloc;
   1.618 +} LocateAttr;
   1.619 +
   1.620 +static dbus_bool_t
   1.621 +locate_attributes (BusConfigParser  *parser,
   1.622 +                   const char       *element_name,
   1.623 +                   const char      **attribute_names,
   1.624 +                   const char      **attribute_values,
   1.625 +                   DBusError        *error,
   1.626 +                   const char       *first_attribute_name,
   1.627 +                   const char      **first_attribute_retloc,
   1.628 +                   ...)
   1.629 +{
   1.630 +  va_list args;
   1.631 +  const char *name;
   1.632 +  const char **retloc;
   1.633 +  int n_attrs;
   1.634 +#define MAX_ATTRS 24
   1.635 +  LocateAttr attrs[MAX_ATTRS];
   1.636 +  dbus_bool_t retval;
   1.637 +  int i;
   1.638 +
   1.639 +  _dbus_assert (first_attribute_name != NULL);
   1.640 +  _dbus_assert (first_attribute_retloc != NULL);
   1.641 +
   1.642 +  retval = TRUE;
   1.643 +
   1.644 +  n_attrs = 1;
   1.645 +  attrs[0].name = first_attribute_name;
   1.646 +  attrs[0].retloc = first_attribute_retloc;
   1.647 +  *first_attribute_retloc = NULL;
   1.648 +
   1.649 +  va_start (args, first_attribute_retloc);
   1.650 +
   1.651 +  name = va_arg (args, const char*);
   1.652 +  retloc = va_arg (args, const char**);
   1.653 +
   1.654 +  while (name != NULL)
   1.655 +    {
   1.656 +      _dbus_assert (retloc != NULL);
   1.657 +      _dbus_assert (n_attrs < MAX_ATTRS);
   1.658 +
   1.659 +      attrs[n_attrs].name = name;
   1.660 +      attrs[n_attrs].retloc = retloc;
   1.661 +      n_attrs += 1;
   1.662 +      *retloc = NULL;
   1.663 +
   1.664 +      name = va_arg (args, const char*);
   1.665 +      retloc = va_arg (args, const char**);
   1.666 +    }
   1.667 +
   1.668 +  va_end (args);
   1.669 +
   1.670 +  if (!retval)
   1.671 +    return retval;
   1.672 +
   1.673 +  i = 0;
   1.674 +  while (attribute_names[i])
   1.675 +    {
   1.676 +      int j;
   1.677 +      dbus_bool_t found;
   1.678 +      
   1.679 +      found = FALSE;
   1.680 +      j = 0;
   1.681 +      while (j < n_attrs)
   1.682 +        {
   1.683 +          if (strcmp (attrs[j].name, attribute_names[i]) == 0)
   1.684 +            {
   1.685 +              retloc = attrs[j].retloc;
   1.686 +
   1.687 +              if (*retloc != NULL)
   1.688 +                {
   1.689 +                  dbus_set_error (error, DBUS_ERROR_FAILED,
   1.690 +                                  "Attribute \"%s\" repeated twice on the same <%s> element",
   1.691 +                                  attrs[j].name, element_name);
   1.692 +                  retval = FALSE;
   1.693 +                  goto out;
   1.694 +                }
   1.695 +
   1.696 +              *retloc = attribute_values[i];
   1.697 +              found = TRUE;
   1.698 +            }
   1.699 +
   1.700 +          ++j;
   1.701 +        }
   1.702 +
   1.703 +      if (!found)
   1.704 +        {
   1.705 +          dbus_set_error (error, DBUS_ERROR_FAILED,
   1.706 +                          "Attribute \"%s\" is invalid on <%s> element in this context",
   1.707 +                          attribute_names[i], element_name);
   1.708 +          retval = FALSE;
   1.709 +          goto out;
   1.710 +        }
   1.711 +
   1.712 +      ++i;
   1.713 +    }
   1.714 +
   1.715 + out:
   1.716 +  return retval;
   1.717 +}
   1.718 +
   1.719 +static dbus_bool_t
   1.720 +check_no_attributes (BusConfigParser  *parser,
   1.721 +                     const char       *element_name,
   1.722 +                     const char      **attribute_names,
   1.723 +                     const char      **attribute_values,
   1.724 +                     DBusError        *error)
   1.725 +{
   1.726 +  if (attribute_names[0] != NULL)
   1.727 +    {
   1.728 +      dbus_set_error (error, DBUS_ERROR_FAILED,
   1.729 +                      "Attribute \"%s\" is invalid on <%s> element in this context",
   1.730 +                      attribute_names[0], element_name);
   1.731 +      return FALSE;
   1.732 +    }
   1.733 +
   1.734 +  return TRUE;
   1.735 +}
   1.736 +
   1.737 +static dbus_bool_t
   1.738 +start_busconfig_child (BusConfigParser   *parser,
   1.739 +                       const char        *element_name,
   1.740 +                       const char       **attribute_names,
   1.741 +                       const char       **attribute_values,
   1.742 +                       DBusError         *error)
   1.743 +{
   1.744 +  if (strcmp (element_name, "user") == 0)
   1.745 +    {
   1.746 +      if (!check_no_attributes (parser, "user", attribute_names, attribute_values, error))
   1.747 +        return FALSE;
   1.748 +
   1.749 +      if (push_element (parser, ELEMENT_USER) == NULL)
   1.750 +        {
   1.751 +          BUS_SET_OOM (error);
   1.752 +          return FALSE;
   1.753 +        }
   1.754 +
   1.755 +      return TRUE;
   1.756 +    }
   1.757 +  else if (strcmp (element_name, "type") == 0)
   1.758 +    {
   1.759 +      if (!check_no_attributes (parser, "type", attribute_names, attribute_values, error))
   1.760 +        return FALSE;
   1.761 +
   1.762 +      if (push_element (parser, ELEMENT_TYPE) == NULL)
   1.763 +        {
   1.764 +          BUS_SET_OOM (error);
   1.765 +          return FALSE;
   1.766 +        }
   1.767 +
   1.768 +      return TRUE;
   1.769 +    }
   1.770 +  else if (strcmp (element_name, "fork") == 0)
   1.771 +    {
   1.772 +      if (!check_no_attributes (parser, "fork", attribute_names, attribute_values, error))
   1.773 +        return FALSE;
   1.774 +
   1.775 +      if (push_element (parser, ELEMENT_FORK) == NULL)
   1.776 +        {
   1.777 +          BUS_SET_OOM (error);
   1.778 +          return FALSE;
   1.779 +        }
   1.780 +
   1.781 +      parser->fork = TRUE;
   1.782 +      
   1.783 +      return TRUE;
   1.784 +    }
   1.785 +  else if (strcmp (element_name, "pidfile") == 0)
   1.786 +    {
   1.787 +      if (!check_no_attributes (parser, "pidfile", attribute_names, attribute_values, error))
   1.788 +        return FALSE;
   1.789 +
   1.790 +      if (push_element (parser, ELEMENT_PIDFILE) == NULL)
   1.791 +        {
   1.792 +          BUS_SET_OOM (error);
   1.793 +          return FALSE;
   1.794 +        }
   1.795 +
   1.796 +      return TRUE;
   1.797 +    }
   1.798 +  else if (strcmp (element_name, "listen") == 0)
   1.799 +    {
   1.800 +      if (!check_no_attributes (parser, "listen", attribute_names, attribute_values, error))
   1.801 +        return FALSE;
   1.802 +
   1.803 +      if (push_element (parser, ELEMENT_LISTEN) == NULL)
   1.804 +        {
   1.805 +          BUS_SET_OOM (error);
   1.806 +          return FALSE;
   1.807 +        }
   1.808 +
   1.809 +      return TRUE;
   1.810 +    }
   1.811 +  else if (strcmp (element_name, "auth") == 0)
   1.812 +    {
   1.813 +      if (!check_no_attributes (parser, "auth", attribute_names, attribute_values, error))
   1.814 +        return FALSE;
   1.815 +
   1.816 +      if (push_element (parser, ELEMENT_AUTH) == NULL)
   1.817 +        {
   1.818 +          BUS_SET_OOM (error);
   1.819 +          return FALSE;
   1.820 +        }
   1.821 +      
   1.822 +      return TRUE;
   1.823 +    }
   1.824 +  else if (strcmp (element_name, "includedir") == 0)
   1.825 +    {
   1.826 +      if (!check_no_attributes (parser, "includedir", attribute_names, attribute_values, error))
   1.827 +        return FALSE;
   1.828 +
   1.829 +      if (push_element (parser, ELEMENT_INCLUDEDIR) == NULL)
   1.830 +        {
   1.831 +          BUS_SET_OOM (error);
   1.832 +          return FALSE;
   1.833 +        }
   1.834 +
   1.835 +      return TRUE;
   1.836 +    }
   1.837 +  else if (strcmp (element_name, "standard_session_servicedirs") == 0)
   1.838 +    {
   1.839 +      DBusList *link;
   1.840 +      DBusList *dirs;
   1.841 +      dirs = NULL;
   1.842 +
   1.843 +      if (!check_no_attributes (parser, "standard_session_servicedirs", attribute_names, attribute_values, error))
   1.844 +        return FALSE;
   1.845 +
   1.846 +      if (push_element (parser, ELEMENT_STANDARD_SESSION_SERVICEDIRS) == NULL)
   1.847 +        {
   1.848 +          BUS_SET_OOM (error);
   1.849 +          return FALSE;
   1.850 +        }
   1.851 +
   1.852 +      if (!_dbus_get_standard_session_servicedirs (&dirs))
   1.853 +        {
   1.854 +          BUS_SET_OOM (error);
   1.855 +          return FALSE;
   1.856 +        }
   1.857 +
   1.858 +        while ((link = _dbus_list_pop_first_link (&dirs)))
   1.859 +          service_dirs_append_link_unique_or_free (&parser->service_dirs, link);
   1.860 +
   1.861 +      return TRUE;
   1.862 +    }
   1.863 +  else if (strcmp (element_name, "servicedir") == 0)
   1.864 +    {
   1.865 +      if (!check_no_attributes (parser, "servicedir", attribute_names, attribute_values, error))
   1.866 +        return FALSE;
   1.867 +
   1.868 +      if (push_element (parser, ELEMENT_SERVICEDIR) == NULL)
   1.869 +        {
   1.870 +          BUS_SET_OOM (error);
   1.871 +          return FALSE;
   1.872 +        }
   1.873 +
   1.874 +      return TRUE;
   1.875 +    }
   1.876 +  else if (strcmp (element_name, "include") == 0)
   1.877 +    {
   1.878 +      Element *e;
   1.879 +      const char *if_selinux_enabled;
   1.880 +      const char *ignore_missing;
   1.881 +      const char *selinux_root_relative;
   1.882 +
   1.883 +      if ((e = push_element (parser, ELEMENT_INCLUDE)) == NULL)
   1.884 +        {
   1.885 +          BUS_SET_OOM (error);
   1.886 +          return FALSE;
   1.887 +        }
   1.888 +
   1.889 +      e->d.include.ignore_missing = FALSE;
   1.890 +      e->d.include.if_selinux_enabled = FALSE;
   1.891 +      e->d.include.selinux_root_relative = FALSE;
   1.892 +
   1.893 +      if (!locate_attributes (parser, "include",
   1.894 +                              attribute_names,
   1.895 +                              attribute_values,
   1.896 +                              error,
   1.897 +                              "ignore_missing", &ignore_missing,
   1.898 +                              "if_selinux_enabled", &if_selinux_enabled,
   1.899 +                              "selinux_root_relative", &selinux_root_relative,
   1.900 +                              NULL))
   1.901 +        return FALSE;
   1.902 +
   1.903 +      if (ignore_missing != NULL)
   1.904 +        {
   1.905 +          if (strcmp (ignore_missing, "yes") == 0)
   1.906 +            e->d.include.ignore_missing = TRUE;
   1.907 +          else if (strcmp (ignore_missing, "no") == 0)
   1.908 +            e->d.include.ignore_missing = FALSE;
   1.909 +          else
   1.910 +            {
   1.911 +              dbus_set_error (error, DBUS_ERROR_FAILED,
   1.912 +                              "ignore_missing attribute must have value \"yes\" or \"no\"");
   1.913 +              return FALSE;
   1.914 +            }
   1.915 +        }
   1.916 +
   1.917 +      if (if_selinux_enabled != NULL)
   1.918 +        {
   1.919 +          if (strcmp (if_selinux_enabled, "yes") == 0)
   1.920 +            e->d.include.if_selinux_enabled = TRUE;
   1.921 +          else if (strcmp (if_selinux_enabled, "no") == 0)
   1.922 +            e->d.include.if_selinux_enabled = FALSE;
   1.923 +          else
   1.924 +            {
   1.925 +              dbus_set_error (error, DBUS_ERROR_FAILED,
   1.926 +                              "if_selinux_enabled attribute must have value"
   1.927 +                              " \"yes\" or \"no\"");
   1.928 +              return FALSE;
   1.929 +	    }
   1.930 +        }
   1.931 +      
   1.932 +      if (selinux_root_relative != NULL)
   1.933 +        {
   1.934 +          if (strcmp (selinux_root_relative, "yes") == 0)
   1.935 +            e->d.include.selinux_root_relative = TRUE;
   1.936 +          else if (strcmp (selinux_root_relative, "no") == 0)
   1.937 +            e->d.include.selinux_root_relative = FALSE;
   1.938 +          else
   1.939 +            {
   1.940 +              dbus_set_error (error, DBUS_ERROR_FAILED,
   1.941 +                              "selinux_root_relative attribute must have value"
   1.942 +                              " \"yes\" or \"no\"");
   1.943 +              return FALSE;
   1.944 +	    }
   1.945 +        }
   1.946 +
   1.947 +      return TRUE;
   1.948 +    }
   1.949 +  else if (strcmp (element_name, "policy") == 0)
   1.950 +    {
   1.951 +      Element *e;
   1.952 +      const char *context;
   1.953 +      const char *user;
   1.954 +      const char *group;
   1.955 +      const char *at_console;
   1.956 +
   1.957 +      if ((e = push_element (parser, ELEMENT_POLICY)) == NULL)
   1.958 +        {
   1.959 +          BUS_SET_OOM (error);
   1.960 +          return FALSE;
   1.961 +        }
   1.962 +
   1.963 +      e->d.policy.type = POLICY_IGNORED;
   1.964 +      
   1.965 +      if (!locate_attributes (parser, "policy",
   1.966 +                              attribute_names,
   1.967 +                              attribute_values,
   1.968 +                              error,
   1.969 +                              "context", &context,
   1.970 +                              "user", &user,
   1.971 +                              "group", &group,
   1.972 +                              "at_console", &at_console,
   1.973 +                              NULL))
   1.974 +        return FALSE;
   1.975 +
   1.976 +      if (((context && user) ||
   1.977 +           (context && group) ||
   1.978 +           (context && at_console)) ||
   1.979 +           ((user && group) ||
   1.980 +           (user && at_console)) ||
   1.981 +           (group && at_console) ||
   1.982 +          !(context || user || group || at_console))
   1.983 +        {
   1.984 +          dbus_set_error (error, DBUS_ERROR_FAILED,
   1.985 +                          "<policy> element must have exactly one of (context|user|group|at_console) attributes");
   1.986 +          return FALSE;
   1.987 +        }
   1.988 +
   1.989 +      if (context != NULL)
   1.990 +        {
   1.991 +          if (strcmp (context, "default") == 0)
   1.992 +            {
   1.993 +              e->d.policy.type = POLICY_DEFAULT;
   1.994 +            }
   1.995 +          else if (strcmp (context, "mandatory") == 0)
   1.996 +            {
   1.997 +              e->d.policy.type = POLICY_MANDATORY;
   1.998 +            }
   1.999 +          else
  1.1000 +            {
  1.1001 +              dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1002 +                              "context attribute on <policy> must have the value \"default\" or \"mandatory\", not \"%s\"",
  1.1003 +                              context);
  1.1004 +              return FALSE;
  1.1005 +            }
  1.1006 +        }
  1.1007 +      else if (user != NULL)
  1.1008 +        {
  1.1009 +          DBusString username;
  1.1010 +          _dbus_string_init_const (&username, user);
  1.1011 +
  1.1012 +          if (_dbus_get_user_id (&username,
  1.1013 +                                 &e->d.policy.gid_uid_or_at_console))
  1.1014 +            e->d.policy.type = POLICY_USER;
  1.1015 +          else
  1.1016 +            _dbus_warn ("Unknown username \"%s\" in message bus configuration file\n",
  1.1017 +                        user);
  1.1018 +        }
  1.1019 +      else if (group != NULL)
  1.1020 +        {
  1.1021 +          DBusString group_name;
  1.1022 +          _dbus_string_init_const (&group_name, group);
  1.1023 +
  1.1024 +          if (_dbus_get_group_id (&group_name,
  1.1025 +                                  &e->d.policy.gid_uid_or_at_console))
  1.1026 +            e->d.policy.type = POLICY_GROUP;
  1.1027 +          else
  1.1028 +            _dbus_warn ("Unknown group \"%s\" in message bus configuration file\n",
  1.1029 +                        group);          
  1.1030 +        }
  1.1031 +      else if (at_console != NULL)
  1.1032 +        {
  1.1033 +           dbus_bool_t t;
  1.1034 +           t = (strcmp (at_console, "true") == 0);
  1.1035 +           if (t || strcmp (at_console, "false") == 0)
  1.1036 +             {
  1.1037 +               e->d.policy.gid_uid_or_at_console = t; 
  1.1038 +               e->d.policy.type = POLICY_CONSOLE;
  1.1039 +             }  
  1.1040 +           else
  1.1041 +             {
  1.1042 +               dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1043 +                              "Unknown value \"%s\" for at_console in message bus configuration file",
  1.1044 +                              at_console);
  1.1045 +
  1.1046 +               return FALSE;
  1.1047 +             }
  1.1048 +        }
  1.1049 +      else
  1.1050 +        {
  1.1051 +          _dbus_assert_not_reached ("all <policy> attributes null and we didn't set error");
  1.1052 +        }
  1.1053 +      
  1.1054 +      return TRUE;
  1.1055 +    }
  1.1056 +  else if (strcmp (element_name, "limit") == 0)
  1.1057 +    {
  1.1058 +      Element *e;
  1.1059 +      const char *name;
  1.1060 +
  1.1061 +      if ((e = push_element (parser, ELEMENT_LIMIT)) == NULL)
  1.1062 +        {
  1.1063 +          BUS_SET_OOM (error);
  1.1064 +          return FALSE;
  1.1065 +        }
  1.1066 +      
  1.1067 +      if (!locate_attributes (parser, "limit",
  1.1068 +                              attribute_names,
  1.1069 +                              attribute_values,
  1.1070 +                              error,
  1.1071 +                              "name", &name,
  1.1072 +                              NULL))
  1.1073 +        return FALSE;
  1.1074 +
  1.1075 +      if (name == NULL)
  1.1076 +        {
  1.1077 +          dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1078 +                          "<limit> element must have a \"name\" attribute");
  1.1079 +          return FALSE;
  1.1080 +        }
  1.1081 +
  1.1082 +      e->d.limit.name = _dbus_strdup (name);
  1.1083 +      if (e->d.limit.name == NULL)
  1.1084 +        {
  1.1085 +          BUS_SET_OOM (error);
  1.1086 +          return FALSE;
  1.1087 +        }
  1.1088 +
  1.1089 +      return TRUE;
  1.1090 +    }
  1.1091 +  else if (strcmp (element_name, "selinux") == 0)
  1.1092 +    {
  1.1093 +      if (!check_no_attributes (parser, "selinux", attribute_names, attribute_values, error))
  1.1094 +        return FALSE;
  1.1095 +
  1.1096 +      if (push_element (parser, ELEMENT_SELINUX) == NULL)
  1.1097 +        {
  1.1098 +          BUS_SET_OOM (error);
  1.1099 +          return FALSE;
  1.1100 +        }
  1.1101 +
  1.1102 +      return TRUE;
  1.1103 +    }
  1.1104 +  else
  1.1105 +    {
  1.1106 +      dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1107 +                      "Element <%s> not allowed inside <%s> in configuration file",
  1.1108 +                      element_name, "busconfig");
  1.1109 +      return FALSE;
  1.1110 +    }
  1.1111 +}
  1.1112 +
  1.1113 +static dbus_bool_t
  1.1114 +append_rule_from_element (BusConfigParser   *parser,
  1.1115 +                          const char        *element_name,
  1.1116 +                          const char       **attribute_names,
  1.1117 +                          const char       **attribute_values,
  1.1118 +                          dbus_bool_t        allow,
  1.1119 +                          DBusError         *error)
  1.1120 +{
  1.1121 +  const char *send_interface;
  1.1122 +  const char *send_member;
  1.1123 +  const char *send_error;
  1.1124 +  const char *send_destination;
  1.1125 +  const char *send_path;
  1.1126 +  const char *send_type;
  1.1127 +  const char *receive_interface;
  1.1128 +  const char *receive_member;
  1.1129 +  const char *receive_error;
  1.1130 +  const char *receive_sender;
  1.1131 +  const char *receive_path;
  1.1132 +  const char *receive_type;
  1.1133 +  const char *eavesdrop;
  1.1134 +  const char *send_requested_reply;
  1.1135 +  const char *receive_requested_reply;
  1.1136 +  const char *own;
  1.1137 +  const char *user;
  1.1138 +  const char *group;
  1.1139 +
  1.1140 +  BusPolicyRule *rule;
  1.1141 +  
  1.1142 +  if (!locate_attributes (parser, element_name,
  1.1143 +                          attribute_names,
  1.1144 +                          attribute_values,
  1.1145 +                          error,
  1.1146 +                          "send_interface", &send_interface,
  1.1147 +                          "send_member", &send_member,
  1.1148 +                          "send_error", &send_error,
  1.1149 +                          "send_destination", &send_destination,
  1.1150 +                          "send_path", &send_path,
  1.1151 +                          "send_type", &send_type,
  1.1152 +                          "receive_interface", &receive_interface,
  1.1153 +                          "receive_member", &receive_member,
  1.1154 +                          "receive_error", &receive_error,
  1.1155 +                          "receive_sender", &receive_sender,
  1.1156 +                          "receive_path", &receive_path,
  1.1157 +                          "receive_type", &receive_type,
  1.1158 +                          "eavesdrop", &eavesdrop,
  1.1159 +                          "send_requested_reply", &send_requested_reply,
  1.1160 +                          "receive_requested_reply", &receive_requested_reply,
  1.1161 +                          "own", &own,
  1.1162 +                          "user", &user,
  1.1163 +                          "group", &group,
  1.1164 +                          NULL))
  1.1165 +    return FALSE;
  1.1166 +
  1.1167 +  if (!(send_interface || send_member || send_error || send_destination ||
  1.1168 +        send_type || send_path ||
  1.1169 +        receive_interface || receive_member || receive_error || receive_sender ||
  1.1170 +        receive_type || receive_path || eavesdrop ||
  1.1171 +        send_requested_reply || receive_requested_reply ||
  1.1172 +        own || user || group))
  1.1173 +    {
  1.1174 +      dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1175 +                      "Element <%s> must have one or more attributes",
  1.1176 +                      element_name);
  1.1177 +      return FALSE;
  1.1178 +    }
  1.1179 +
  1.1180 +  if ((send_member && (send_interface == NULL && send_path == NULL)) ||
  1.1181 +      (receive_member && (receive_interface == NULL && receive_path == NULL)))
  1.1182 +    {
  1.1183 +      dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1184 +                      "On element <%s>, if you specify a member you must specify an interface or a path. Keep in mind that not all messages have an interface field.",
  1.1185 +                      element_name);
  1.1186 +      return FALSE;
  1.1187 +    }
  1.1188 +  
  1.1189 +  /* Allowed combinations of elements are:
  1.1190 +   *
  1.1191 +   *   base, must be all send or all receive:
  1.1192 +   *     nothing
  1.1193 +   *     interface
  1.1194 +   *     interface + member
  1.1195 +   *     error
  1.1196 +   * 
  1.1197 +   *   base send_ can combine with send_destination, send_path, send_type, send_requested_reply
  1.1198 +   *   base receive_ with receive_sender, receive_path, receive_type, receive_requested_reply, eavesdrop
  1.1199 +   *
  1.1200 +   *   user, group, own must occur alone
  1.1201 +   *
  1.1202 +   * Pretty sure the below stuff is broken, FIXME think about it more.
  1.1203 +   */
  1.1204 +
  1.1205 +  if (((send_interface && send_error) ||
  1.1206 +       (send_interface && receive_interface) ||
  1.1207 +       (send_interface && receive_member) ||
  1.1208 +       (send_interface && receive_error) ||
  1.1209 +       (send_interface && receive_sender) ||
  1.1210 +       (send_interface && eavesdrop) ||
  1.1211 +       (send_interface && receive_requested_reply) ||
  1.1212 +       (send_interface && own) ||
  1.1213 +       (send_interface && user) ||
  1.1214 +       (send_interface && group)) ||
  1.1215 +
  1.1216 +      ((send_member && send_error) ||
  1.1217 +       (send_member && receive_interface) ||
  1.1218 +       (send_member && receive_member) ||
  1.1219 +       (send_member && receive_error) ||
  1.1220 +       (send_member && receive_sender) ||
  1.1221 +       (send_member && eavesdrop) ||
  1.1222 +       (send_member && receive_requested_reply) ||
  1.1223 +       (send_member && own) ||
  1.1224 +       (send_member && user) ||
  1.1225 +       (send_member && group)) ||
  1.1226 +      
  1.1227 +      ((send_error && receive_interface) ||
  1.1228 +       (send_error && receive_member) ||
  1.1229 +       (send_error && receive_error) ||
  1.1230 +       (send_error && receive_sender) ||
  1.1231 +       (send_error && eavesdrop) ||
  1.1232 +       (send_error && receive_requested_reply) ||
  1.1233 +       (send_error && own) ||
  1.1234 +       (send_error && user) ||
  1.1235 +       (send_error && group)) ||
  1.1236 +
  1.1237 +      ((send_destination && receive_interface) ||
  1.1238 +       (send_destination && receive_member) ||
  1.1239 +       (send_destination && receive_error) ||
  1.1240 +       (send_destination && receive_sender) ||
  1.1241 +       (send_destination && eavesdrop) ||
  1.1242 +       (send_destination && receive_requested_reply) ||
  1.1243 +       (send_destination && own) ||
  1.1244 +       (send_destination && user) ||
  1.1245 +       (send_destination && group)) ||
  1.1246 +
  1.1247 +      ((send_type && receive_interface) ||
  1.1248 +       (send_type && receive_member) ||
  1.1249 +       (send_type && receive_error) ||
  1.1250 +       (send_type && receive_sender) ||
  1.1251 +       (send_type && eavesdrop) ||
  1.1252 +       (send_type && receive_requested_reply) ||
  1.1253 +       (send_type && own) ||
  1.1254 +       (send_type && user) ||
  1.1255 +       (send_type && group)) ||
  1.1256 +
  1.1257 +      ((send_path && receive_interface) ||
  1.1258 +       (send_path && receive_member) ||
  1.1259 +       (send_path && receive_error) ||
  1.1260 +       (send_path && receive_sender) ||
  1.1261 +       (send_path && eavesdrop) ||
  1.1262 +       (send_path && receive_requested_reply) ||
  1.1263 +       (send_path && own) ||
  1.1264 +       (send_path && user) ||
  1.1265 +       (send_path && group)) ||
  1.1266 +
  1.1267 +      ((send_requested_reply && receive_interface) ||
  1.1268 +       (send_requested_reply && receive_member) ||
  1.1269 +       (send_requested_reply && receive_error) ||
  1.1270 +       (send_requested_reply && receive_sender) ||
  1.1271 +       (send_requested_reply && eavesdrop) ||
  1.1272 +       (send_requested_reply && receive_requested_reply) ||
  1.1273 +       (send_requested_reply && own) ||
  1.1274 +       (send_requested_reply && user) ||
  1.1275 +       (send_requested_reply && group)) ||
  1.1276 +      
  1.1277 +      ((receive_interface && receive_error) ||
  1.1278 +       (receive_interface && own) ||
  1.1279 +       (receive_interface && user) ||
  1.1280 +       (receive_interface && group)) ||
  1.1281 +
  1.1282 +      ((receive_member && receive_error) ||
  1.1283 +       (receive_member && own) ||
  1.1284 +       (receive_member && user) ||
  1.1285 +       (receive_member && group)) ||
  1.1286 +      
  1.1287 +      ((receive_error && own) ||
  1.1288 +       (receive_error && user) ||
  1.1289 +       (receive_error && group)) ||
  1.1290 +
  1.1291 +      ((eavesdrop && own) ||
  1.1292 +       (eavesdrop && user) ||
  1.1293 +       (eavesdrop && group)) ||
  1.1294 +
  1.1295 +      ((receive_requested_reply && own) ||
  1.1296 +       (receive_requested_reply && user) ||
  1.1297 +       (receive_requested_reply && group)) ||
  1.1298 +      
  1.1299 +      ((own && user) ||
  1.1300 +       (own && group)) ||
  1.1301 +
  1.1302 +      ((user && group)))
  1.1303 +    {
  1.1304 +      dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1305 +                      "Invalid combination of attributes on element <%s>",
  1.1306 +                      element_name);
  1.1307 +      return FALSE;
  1.1308 +    }
  1.1309 +  
  1.1310 +  rule = NULL;
  1.1311 +
  1.1312 +  /* In BusPolicyRule, NULL represents wildcard.
  1.1313 +   * In the config file, '*' represents it.
  1.1314 +   */
  1.1315 +#define IS_WILDCARD(str) ((str) && ((str)[0]) == '*' && ((str)[1]) == '\0')
  1.1316 +
  1.1317 +  if (send_interface || send_member || send_error || send_destination ||
  1.1318 +      send_path || send_type || send_requested_reply)
  1.1319 +    {
  1.1320 +      int message_type;
  1.1321 +      
  1.1322 +      if (IS_WILDCARD (send_interface))
  1.1323 +        send_interface = NULL;
  1.1324 +      if (IS_WILDCARD (send_member))
  1.1325 +        send_member = NULL;
  1.1326 +      if (IS_WILDCARD (send_error))
  1.1327 +        send_error = NULL;
  1.1328 +      if (IS_WILDCARD (send_destination))
  1.1329 +        send_destination = NULL;
  1.1330 +      if (IS_WILDCARD (send_path))
  1.1331 +        send_path = NULL;
  1.1332 +      if (IS_WILDCARD (send_type))
  1.1333 +        send_type = NULL;
  1.1334 +
  1.1335 +      message_type = DBUS_MESSAGE_TYPE_INVALID;
  1.1336 +      if (send_type != NULL)
  1.1337 +        {
  1.1338 +          message_type = dbus_message_type_from_string (send_type);
  1.1339 +          if (message_type == DBUS_MESSAGE_TYPE_INVALID)
  1.1340 +            {
  1.1341 +              dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1342 +                              "Bad message type \"%s\"",
  1.1343 +                              send_type);
  1.1344 +              return FALSE;
  1.1345 +            }
  1.1346 +        }
  1.1347 +
  1.1348 +      if (send_requested_reply &&
  1.1349 +          !(strcmp (send_requested_reply, "true") == 0 ||
  1.1350 +            strcmp (send_requested_reply, "false") == 0))
  1.1351 +        {
  1.1352 +          dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1353 +                          "Bad value \"%s\" for %s attribute, must be true or false",
  1.1354 +                          "send_requested_reply", send_requested_reply);
  1.1355 +          return FALSE;
  1.1356 +        }
  1.1357 +      
  1.1358 +      rule = bus_policy_rule_new (BUS_POLICY_RULE_SEND, allow); 
  1.1359 +      if (rule == NULL)
  1.1360 +        goto nomem;
  1.1361 +      
  1.1362 +      if (send_requested_reply)
  1.1363 +        rule->d.send.requested_reply = (strcmp (send_requested_reply, "true") == 0);
  1.1364 +      
  1.1365 +      rule->d.send.message_type = message_type;
  1.1366 +      rule->d.send.path = _dbus_strdup (send_path);
  1.1367 +      rule->d.send.interface = _dbus_strdup (send_interface);
  1.1368 +      rule->d.send.member = _dbus_strdup (send_member);
  1.1369 +      rule->d.send.error = _dbus_strdup (send_error);
  1.1370 +      rule->d.send.destination = _dbus_strdup (send_destination);
  1.1371 +      if (send_path && rule->d.send.path == NULL)
  1.1372 +        goto nomem;
  1.1373 +      if (send_interface && rule->d.send.interface == NULL)
  1.1374 +        goto nomem;
  1.1375 +      if (send_member && rule->d.send.member == NULL)
  1.1376 +        goto nomem;
  1.1377 +      if (send_error && rule->d.send.error == NULL)
  1.1378 +        goto nomem;
  1.1379 +      if (send_destination && rule->d.send.destination == NULL)
  1.1380 +        goto nomem;
  1.1381 +    }
  1.1382 +  else if (receive_interface || receive_member || receive_error || receive_sender ||
  1.1383 +           receive_path || receive_type || eavesdrop || receive_requested_reply)
  1.1384 +    {
  1.1385 +      int message_type;
  1.1386 +      
  1.1387 +      if (IS_WILDCARD (receive_interface))
  1.1388 +        receive_interface = NULL;
  1.1389 +      if (IS_WILDCARD (receive_member))
  1.1390 +        receive_member = NULL;
  1.1391 +      if (IS_WILDCARD (receive_error))
  1.1392 +        receive_error = NULL;
  1.1393 +      if (IS_WILDCARD (receive_sender))
  1.1394 +        receive_sender = NULL;
  1.1395 +      if (IS_WILDCARD (receive_path))
  1.1396 +        receive_path = NULL;
  1.1397 +      if (IS_WILDCARD (receive_type))
  1.1398 +        receive_type = NULL;
  1.1399 +
  1.1400 +      message_type = DBUS_MESSAGE_TYPE_INVALID;
  1.1401 +      if (receive_type != NULL)
  1.1402 +        {
  1.1403 +          message_type = dbus_message_type_from_string (receive_type);
  1.1404 +          if (message_type == DBUS_MESSAGE_TYPE_INVALID)
  1.1405 +            {
  1.1406 +              dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1407 +                              "Bad message type \"%s\"",
  1.1408 +                              receive_type);
  1.1409 +              return FALSE;
  1.1410 +            }
  1.1411 +        }
  1.1412 +
  1.1413 +
  1.1414 +      if (eavesdrop &&
  1.1415 +          !(strcmp (eavesdrop, "true") == 0 ||
  1.1416 +            strcmp (eavesdrop, "false") == 0))
  1.1417 +        {
  1.1418 +          dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1419 +                          "Bad value \"%s\" for %s attribute, must be true or false",
  1.1420 +                          "eavesdrop", eavesdrop);
  1.1421 +          return FALSE;
  1.1422 +        }
  1.1423 +
  1.1424 +      if (receive_requested_reply &&
  1.1425 +          !(strcmp (receive_requested_reply, "true") == 0 ||
  1.1426 +            strcmp (receive_requested_reply, "false") == 0))
  1.1427 +        {
  1.1428 +          dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1429 +                          "Bad value \"%s\" for %s attribute, must be true or false",
  1.1430 +                          "receive_requested_reply", receive_requested_reply);
  1.1431 +          return FALSE;
  1.1432 +        }
  1.1433 +      
  1.1434 +      rule = bus_policy_rule_new (BUS_POLICY_RULE_RECEIVE, allow); 
  1.1435 +      if (rule == NULL)
  1.1436 +        goto nomem;
  1.1437 +
  1.1438 +      if (eavesdrop)
  1.1439 +        rule->d.receive.eavesdrop = (strcmp (eavesdrop, "true") == 0);
  1.1440 +
  1.1441 +      if (receive_requested_reply)
  1.1442 +        rule->d.receive.requested_reply = (strcmp (receive_requested_reply, "true") == 0);
  1.1443 +      
  1.1444 +      rule->d.receive.message_type = message_type;
  1.1445 +      rule->d.receive.path = _dbus_strdup (receive_path);
  1.1446 +      rule->d.receive.interface = _dbus_strdup (receive_interface);
  1.1447 +      rule->d.receive.member = _dbus_strdup (receive_member);
  1.1448 +      rule->d.receive.error = _dbus_strdup (receive_error);
  1.1449 +      rule->d.receive.origin = _dbus_strdup (receive_sender);
  1.1450 +
  1.1451 +      if (receive_path && rule->d.receive.path == NULL)
  1.1452 +        goto nomem;
  1.1453 +      if (receive_interface && rule->d.receive.interface == NULL)
  1.1454 +        goto nomem;
  1.1455 +      if (receive_member && rule->d.receive.member == NULL)
  1.1456 +        goto nomem;
  1.1457 +      if (receive_error && rule->d.receive.error == NULL)
  1.1458 +        goto nomem;
  1.1459 +      if (receive_sender && rule->d.receive.origin == NULL)
  1.1460 +        goto nomem;
  1.1461 +    }
  1.1462 +  else if (own)
  1.1463 +    {
  1.1464 +      rule = bus_policy_rule_new (BUS_POLICY_RULE_OWN, allow); 
  1.1465 +      if (rule == NULL)
  1.1466 +        goto nomem;
  1.1467 +
  1.1468 +      if (IS_WILDCARD (own))
  1.1469 +        own = NULL;
  1.1470 +      
  1.1471 +      rule->d.own.service_name = _dbus_strdup (own);
  1.1472 +      if (own && rule->d.own.service_name == NULL)
  1.1473 +        goto nomem;
  1.1474 +    }
  1.1475 +  else if (user)
  1.1476 +    {      
  1.1477 +      if (IS_WILDCARD (user))
  1.1478 +        {
  1.1479 +          rule = bus_policy_rule_new (BUS_POLICY_RULE_USER, allow); 
  1.1480 +          if (rule == NULL)
  1.1481 +            goto nomem;
  1.1482 +
  1.1483 +          rule->d.user.uid = DBUS_UID_UNSET;
  1.1484 +        }
  1.1485 +      else
  1.1486 +        {
  1.1487 +          DBusString username;
  1.1488 +          dbus_uid_t uid;
  1.1489 +          
  1.1490 +          _dbus_string_init_const (&username, user);
  1.1491 +      
  1.1492 +          if (_dbus_get_user_id (&username, &uid))
  1.1493 +            {
  1.1494 +              rule = bus_policy_rule_new (BUS_POLICY_RULE_USER, allow); 
  1.1495 +              if (rule == NULL)
  1.1496 +                goto nomem;
  1.1497 +
  1.1498 +              rule->d.user.uid = uid;
  1.1499 +            }
  1.1500 +          else
  1.1501 +            {
  1.1502 +              _dbus_warn ("Unknown username \"%s\" on element <%s>\n",
  1.1503 +                          user, element_name);
  1.1504 +            }
  1.1505 +        }
  1.1506 +    }
  1.1507 +  else if (group)
  1.1508 +    {
  1.1509 +      if (IS_WILDCARD (group))
  1.1510 +        {
  1.1511 +          rule = bus_policy_rule_new (BUS_POLICY_RULE_GROUP, allow); 
  1.1512 +          if (rule == NULL)
  1.1513 +            goto nomem;
  1.1514 +
  1.1515 +          rule->d.group.gid = DBUS_GID_UNSET;
  1.1516 +        }
  1.1517 +      else
  1.1518 +        {
  1.1519 +          DBusString groupname;
  1.1520 +          dbus_gid_t gid;
  1.1521 +          
  1.1522 +          _dbus_string_init_const (&groupname, group);
  1.1523 +          
  1.1524 +          if (_dbus_get_user_id (&groupname, &gid))
  1.1525 +            {
  1.1526 +              rule = bus_policy_rule_new (BUS_POLICY_RULE_GROUP, allow); 
  1.1527 +              if (rule == NULL)
  1.1528 +                goto nomem;
  1.1529 +
  1.1530 +              rule->d.group.gid = gid;
  1.1531 +            }
  1.1532 +          else
  1.1533 +            {
  1.1534 +              _dbus_warn ("Unknown group \"%s\" on element <%s>\n",
  1.1535 +                          group, element_name);
  1.1536 +            }
  1.1537 +        }
  1.1538 +    }
  1.1539 +  else
  1.1540 +    _dbus_assert_not_reached ("Did not handle some combination of attributes on <allow> or <deny>");
  1.1541 +
  1.1542 +  if (rule != NULL)
  1.1543 +    {
  1.1544 +      Element *pe;
  1.1545 +      
  1.1546 +      pe = peek_element (parser);      
  1.1547 +      _dbus_assert (pe != NULL);
  1.1548 +      _dbus_assert (pe->type == ELEMENT_POLICY);
  1.1549 +
  1.1550 +      switch (pe->d.policy.type)
  1.1551 +        {
  1.1552 +        case POLICY_IGNORED:
  1.1553 +          /* drop the rule on the floor */
  1.1554 +          break;
  1.1555 +          
  1.1556 +        case POLICY_DEFAULT:
  1.1557 +          if (!bus_policy_append_default_rule (parser->policy, rule))
  1.1558 +            goto nomem;
  1.1559 +          break;
  1.1560 +        case POLICY_MANDATORY:
  1.1561 +          if (!bus_policy_append_mandatory_rule (parser->policy, rule))
  1.1562 +            goto nomem;
  1.1563 +          break;
  1.1564 +        case POLICY_USER:
  1.1565 +          if (!BUS_POLICY_RULE_IS_PER_CLIENT (rule))
  1.1566 +            {
  1.1567 +              dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1568 +                              "<%s> rule cannot be per-user because it has bus-global semantics",
  1.1569 +                              element_name);
  1.1570 +              goto failed;
  1.1571 +            }
  1.1572 +          
  1.1573 +          if (!bus_policy_append_user_rule (parser->policy, pe->d.policy.gid_uid_or_at_console,
  1.1574 +                                            rule))
  1.1575 +            goto nomem;
  1.1576 +          break;
  1.1577 +        case POLICY_GROUP:
  1.1578 +          if (!BUS_POLICY_RULE_IS_PER_CLIENT (rule))
  1.1579 +            {
  1.1580 +              dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1581 +                              "<%s> rule cannot be per-group because it has bus-global semantics",
  1.1582 +                              element_name);
  1.1583 +              goto failed;
  1.1584 +            }
  1.1585 +          
  1.1586 +          if (!bus_policy_append_group_rule (parser->policy, pe->d.policy.gid_uid_or_at_console,
  1.1587 +                                             rule))
  1.1588 +            goto nomem;
  1.1589 +          break;
  1.1590 +        
  1.1591 +
  1.1592 +        case POLICY_CONSOLE:
  1.1593 +          if (!bus_policy_append_console_rule (parser->policy, pe->d.policy.gid_uid_or_at_console,
  1.1594 +                                             rule))
  1.1595 +            goto nomem;
  1.1596 +          break;
  1.1597 +        }
  1.1598 + 
  1.1599 +      bus_policy_rule_unref (rule);
  1.1600 +      rule = NULL;
  1.1601 +    }
  1.1602 +  
  1.1603 +  return TRUE;
  1.1604 +
  1.1605 + nomem:
  1.1606 +  BUS_SET_OOM (error);
  1.1607 + failed:
  1.1608 +  if (rule)
  1.1609 +    bus_policy_rule_unref (rule);
  1.1610 +  return FALSE;
  1.1611 +}
  1.1612 +
  1.1613 +static dbus_bool_t
  1.1614 +start_policy_child (BusConfigParser   *parser,
  1.1615 +                    const char        *element_name,
  1.1616 +                    const char       **attribute_names,
  1.1617 +                    const char       **attribute_values,
  1.1618 +                    DBusError         *error)
  1.1619 +{
  1.1620 +  if (strcmp (element_name, "allow") == 0)
  1.1621 +    {
  1.1622 +      if (!append_rule_from_element (parser, element_name,
  1.1623 +                                     attribute_names, attribute_values,
  1.1624 +                                     TRUE, error))
  1.1625 +        return FALSE;
  1.1626 +      
  1.1627 +      if (push_element (parser, ELEMENT_ALLOW) == NULL)
  1.1628 +        {
  1.1629 +          BUS_SET_OOM (error);
  1.1630 +          return FALSE;
  1.1631 +        }
  1.1632 +      
  1.1633 +      return TRUE;
  1.1634 +    }
  1.1635 +  else if (strcmp (element_name, "deny") == 0)
  1.1636 +    {
  1.1637 +      if (!append_rule_from_element (parser, element_name,
  1.1638 +                                     attribute_names, attribute_values,
  1.1639 +                                     FALSE, error))
  1.1640 +        return FALSE;
  1.1641 +      
  1.1642 +      if (push_element (parser, ELEMENT_DENY) == NULL)
  1.1643 +        {
  1.1644 +          BUS_SET_OOM (error);
  1.1645 +          return FALSE;
  1.1646 +        }
  1.1647 +      
  1.1648 +      return TRUE;
  1.1649 +    }
  1.1650 +  else
  1.1651 +    {
  1.1652 +      dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1653 +                      "Element <%s> not allowed inside <%s> in configuration file",
  1.1654 +                      element_name, "policy");
  1.1655 +      return FALSE;
  1.1656 +    }
  1.1657 +}
  1.1658 +
  1.1659 +static dbus_bool_t
  1.1660 +start_selinux_child (BusConfigParser   *parser,
  1.1661 +                     const char        *element_name,
  1.1662 +                     const char       **attribute_names,
  1.1663 +                     const char       **attribute_values,
  1.1664 +                     DBusError         *error)
  1.1665 +{
  1.1666 +  char *own_copy;
  1.1667 +  char *context_copy;
  1.1668 +
  1.1669 +  own_copy = NULL;
  1.1670 +  context_copy = NULL;
  1.1671 +
  1.1672 +  if (strcmp (element_name, "associate") == 0)
  1.1673 +    {
  1.1674 +      const char *own;
  1.1675 +      const char *context;
  1.1676 +      
  1.1677 +      if (!locate_attributes (parser, "associate",
  1.1678 +                              attribute_names,
  1.1679 +                              attribute_values,
  1.1680 +                              error,
  1.1681 +                              "own", &own,
  1.1682 +                              "context", &context,
  1.1683 +                              NULL))
  1.1684 +        return FALSE;
  1.1685 +      
  1.1686 +      if (push_element (parser, ELEMENT_ASSOCIATE) == NULL)
  1.1687 +        {
  1.1688 +          BUS_SET_OOM (error);
  1.1689 +          return FALSE;
  1.1690 +        }
  1.1691 +
  1.1692 +      if (own == NULL || context == NULL)
  1.1693 +        {
  1.1694 +          dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1695 +                          "Element <associate> must have attributes own=\"<servicename>\" and context=\"<selinux context>\"");
  1.1696 +          return FALSE;
  1.1697 +        }
  1.1698 +
  1.1699 +      own_copy = _dbus_strdup (own);
  1.1700 +      if (own_copy == NULL)
  1.1701 +        goto oom;
  1.1702 +      context_copy = _dbus_strdup (context);
  1.1703 +      if (context_copy == NULL)
  1.1704 +        goto oom;
  1.1705 +
  1.1706 +      if (!_dbus_hash_table_insert_string (parser->service_context_table,
  1.1707 +					   own_copy, context_copy))
  1.1708 +        goto oom;
  1.1709 +
  1.1710 +      return TRUE;
  1.1711 +    }
  1.1712 +  else
  1.1713 +    {
  1.1714 +      dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1715 +                      "Element <%s> not allowed inside <%s> in configuration file",
  1.1716 +                      element_name, "selinux");
  1.1717 +      return FALSE;
  1.1718 +    }
  1.1719 +
  1.1720 + oom:
  1.1721 +  if (own_copy)
  1.1722 +    dbus_free (own_copy);
  1.1723 +
  1.1724 +  if (context_copy)  
  1.1725 +    dbus_free (context_copy);
  1.1726 +
  1.1727 +  BUS_SET_OOM (error);
  1.1728 +  return FALSE;
  1.1729 +}
  1.1730 +
  1.1731 +dbus_bool_t
  1.1732 +bus_config_parser_start_element (BusConfigParser   *parser,
  1.1733 +                                 const char        *element_name,
  1.1734 +                                 const char       **attribute_names,
  1.1735 +                                 const char       **attribute_values,
  1.1736 +                                 DBusError         *error)
  1.1737 +{
  1.1738 +  ElementType t;
  1.1739 +
  1.1740 +  _DBUS_ASSERT_ERROR_IS_CLEAR (error);
  1.1741 +
  1.1742 +  /* printf ("START: %s\n", element_name); */
  1.1743 +  
  1.1744 +  t = top_element_type (parser);
  1.1745 +
  1.1746 +  if (t == ELEMENT_NONE)
  1.1747 +    {
  1.1748 +      if (strcmp (element_name, "busconfig") == 0)
  1.1749 +        {
  1.1750 +          if (!check_no_attributes (parser, "busconfig", attribute_names, attribute_values, error))
  1.1751 +            return FALSE;
  1.1752 +          
  1.1753 +          if (push_element (parser, ELEMENT_BUSCONFIG) == NULL)
  1.1754 +            {
  1.1755 +              BUS_SET_OOM (error);
  1.1756 +              return FALSE;
  1.1757 +            }
  1.1758 +
  1.1759 +          return TRUE;
  1.1760 +        }
  1.1761 +      else
  1.1762 +        {
  1.1763 +          dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1764 +                          "Unknown element <%s> at root of configuration file",
  1.1765 +                          element_name);
  1.1766 +          return FALSE;
  1.1767 +        }
  1.1768 +    }
  1.1769 +  else if (t == ELEMENT_BUSCONFIG)
  1.1770 +    {
  1.1771 +      return start_busconfig_child (parser, element_name,
  1.1772 +                                    attribute_names, attribute_values,
  1.1773 +                                    error);
  1.1774 +    }
  1.1775 +  else if (t == ELEMENT_POLICY)
  1.1776 +    {
  1.1777 +      return start_policy_child (parser, element_name,
  1.1778 +                                 attribute_names, attribute_values,
  1.1779 +                                 error);
  1.1780 +    }
  1.1781 +  else if (t == ELEMENT_SELINUX)
  1.1782 +    {
  1.1783 +      return start_selinux_child (parser, element_name,
  1.1784 +                                  attribute_names, attribute_values,
  1.1785 +                                  error);
  1.1786 +    }
  1.1787 +  else
  1.1788 +    {
  1.1789 +      dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1790 +                      "Element <%s> is not allowed in this context",
  1.1791 +                      element_name);
  1.1792 +      return FALSE;
  1.1793 +    }  
  1.1794 +}
  1.1795 +
  1.1796 +static dbus_bool_t
  1.1797 +set_limit (BusConfigParser *parser,
  1.1798 +           const char      *name,
  1.1799 +           long             value,
  1.1800 +           DBusError       *error)
  1.1801 +{
  1.1802 +  dbus_bool_t must_be_positive;
  1.1803 +  dbus_bool_t must_be_int;
  1.1804 +
  1.1805 +  must_be_int = FALSE;
  1.1806 +  must_be_positive = FALSE;
  1.1807 +  
  1.1808 +  if (strcmp (name, "max_incoming_bytes") == 0)
  1.1809 +    {
  1.1810 +      must_be_positive = TRUE;
  1.1811 +      parser->limits.max_incoming_bytes = value;
  1.1812 +    }
  1.1813 +  else if (strcmp (name, "max_outgoing_bytes") == 0)
  1.1814 +    {
  1.1815 +      must_be_positive = TRUE;
  1.1816 +      parser->limits.max_outgoing_bytes = value;
  1.1817 +    }
  1.1818 +  else if (strcmp (name, "max_message_size") == 0)
  1.1819 +    {
  1.1820 +      must_be_positive = TRUE;
  1.1821 +      parser->limits.max_message_size = value;
  1.1822 +    }
  1.1823 +  else if (strcmp (name, "service_start_timeout") == 0)
  1.1824 +    {
  1.1825 +      must_be_positive = TRUE;
  1.1826 +      must_be_int = TRUE;
  1.1827 +      parser->limits.activation_timeout = value;
  1.1828 +    }
  1.1829 +  else if (strcmp (name, "auth_timeout") == 0)
  1.1830 +    {
  1.1831 +      must_be_positive = TRUE;
  1.1832 +      must_be_int = TRUE;
  1.1833 +      parser->limits.auth_timeout = value;
  1.1834 +    }
  1.1835 +  else if (strcmp (name, "reply_timeout") == 0)
  1.1836 +    {
  1.1837 +      must_be_positive = TRUE;
  1.1838 +      must_be_int = TRUE;
  1.1839 +      parser->limits.reply_timeout = value;
  1.1840 +    }
  1.1841 +  else if (strcmp (name, "max_completed_connections") == 0)
  1.1842 +    {
  1.1843 +      must_be_positive = TRUE;
  1.1844 +      must_be_int = TRUE;
  1.1845 +      parser->limits.max_completed_connections = value;
  1.1846 +    }
  1.1847 +  else if (strcmp (name, "max_incomplete_connections") == 0)
  1.1848 +    {
  1.1849 +      must_be_positive = TRUE;
  1.1850 +      must_be_int = TRUE;
  1.1851 +      parser->limits.max_incomplete_connections = value;
  1.1852 +    }
  1.1853 +  else if (strcmp (name, "max_connections_per_user") == 0)
  1.1854 +    {
  1.1855 +      must_be_positive = TRUE;
  1.1856 +      must_be_int = TRUE;
  1.1857 +      parser->limits.max_connections_per_user = value;
  1.1858 +    }
  1.1859 +  else if (strcmp (name, "max_pending_service_starts") == 0)
  1.1860 +    {
  1.1861 +      must_be_positive = TRUE;
  1.1862 +      must_be_int = TRUE;
  1.1863 +      parser->limits.max_pending_activations = value;
  1.1864 +    }
  1.1865 +  else if (strcmp (name, "max_names_per_connection") == 0)
  1.1866 +    {
  1.1867 +      must_be_positive = TRUE;
  1.1868 +      must_be_int = TRUE;
  1.1869 +      parser->limits.max_services_per_connection = value;
  1.1870 +    }
  1.1871 +  else if (strcmp (name, "max_match_rules_per_connection") == 0)
  1.1872 +    {
  1.1873 +      must_be_positive = TRUE;
  1.1874 +      must_be_int = TRUE;
  1.1875 +      parser->limits.max_match_rules_per_connection = value;
  1.1876 +    }
  1.1877 +  else if (strcmp (name, "max_replies_per_connection") == 0)
  1.1878 +    {
  1.1879 +      must_be_positive = TRUE;
  1.1880 +      must_be_int = TRUE;
  1.1881 +      parser->limits.max_replies_per_connection = value;
  1.1882 +    }
  1.1883 +  else
  1.1884 +    {
  1.1885 +      dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1886 +                      "There is no limit called \"%s\"\n",
  1.1887 +                      name);
  1.1888 +      return FALSE;
  1.1889 +    }
  1.1890 +  
  1.1891 +  if (must_be_positive && value < 0)
  1.1892 +    {
  1.1893 +      dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1894 +                      "<limit name=\"%s\"> must be a positive number\n",
  1.1895 +                      name);
  1.1896 +      return FALSE;
  1.1897 +    }
  1.1898 +
  1.1899 +  if (must_be_int &&
  1.1900 +      (value < _DBUS_INT_MIN || value > _DBUS_INT_MAX))
  1.1901 +    {
  1.1902 +      dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1903 +                      "<limit name=\"%s\"> value is too large\n",
  1.1904 +                      name);
  1.1905 +      return FALSE;
  1.1906 +    }
  1.1907 +
  1.1908 +  return TRUE;  
  1.1909 +}
  1.1910 +
  1.1911 +dbus_bool_t
  1.1912 +bus_config_parser_end_element (BusConfigParser   *parser,
  1.1913 +                               const char        *element_name,
  1.1914 +                               DBusError         *error)
  1.1915 +{
  1.1916 +  ElementType t;
  1.1917 +  const char *n;
  1.1918 +  Element *e;
  1.1919 +
  1.1920 +  _DBUS_ASSERT_ERROR_IS_CLEAR (error);
  1.1921 +
  1.1922 +  /* printf ("END: %s\n", element_name); */
  1.1923 +  
  1.1924 +  t = top_element_type (parser);
  1.1925 +
  1.1926 +  if (t == ELEMENT_NONE)
  1.1927 +    {
  1.1928 +      /* should probably be an assertion failure but
  1.1929 +       * being paranoid about XML parsers
  1.1930 +       */
  1.1931 +      dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1932 +                      "XML parser ended element with no element on the stack");
  1.1933 +      return FALSE;
  1.1934 +    }
  1.1935 +
  1.1936 +  n = element_type_to_name (t);
  1.1937 +  _dbus_assert (n != NULL);
  1.1938 +  if (strcmp (n, element_name) != 0)
  1.1939 +    {
  1.1940 +      /* should probably be an assertion failure but
  1.1941 +       * being paranoid about XML parsers
  1.1942 +       */
  1.1943 +      dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1944 +                      "XML element <%s> ended but topmost element on the stack was <%s>",
  1.1945 +                      element_name, n);
  1.1946 +      return FALSE;
  1.1947 +    }
  1.1948 +
  1.1949 +  e = peek_element (parser);
  1.1950 +  _dbus_assert (e != NULL);
  1.1951 +
  1.1952 +  switch (e->type)
  1.1953 +    {
  1.1954 +    case ELEMENT_NONE:
  1.1955 +      _dbus_assert_not_reached ("element in stack has no type");
  1.1956 +      break;
  1.1957 +
  1.1958 +    case ELEMENT_INCLUDE:
  1.1959 +    case ELEMENT_USER:
  1.1960 +    case ELEMENT_TYPE:
  1.1961 +    case ELEMENT_LISTEN:
  1.1962 +    case ELEMENT_PIDFILE:
  1.1963 +    case ELEMENT_AUTH:
  1.1964 +    case ELEMENT_SERVICEDIR:
  1.1965 +    case ELEMENT_INCLUDEDIR:
  1.1966 +    case ELEMENT_LIMIT:
  1.1967 +      if (!e->had_content)
  1.1968 +        {
  1.1969 +          dbus_set_error (error, DBUS_ERROR_FAILED,
  1.1970 +                          "XML element <%s> was expected to have content inside it",
  1.1971 +                          element_type_to_name (e->type));
  1.1972 +          return FALSE;
  1.1973 +        }
  1.1974 +
  1.1975 +      if (e->type == ELEMENT_LIMIT)
  1.1976 +        {
  1.1977 +          if (!set_limit (parser, e->d.limit.name, e->d.limit.value,
  1.1978 +                          error))
  1.1979 +            return FALSE;
  1.1980 +        }
  1.1981 +      break;
  1.1982 +
  1.1983 +    case ELEMENT_BUSCONFIG:
  1.1984 +    case ELEMENT_POLICY:
  1.1985 +    case ELEMENT_ALLOW:
  1.1986 +    case ELEMENT_DENY:
  1.1987 +    case ELEMENT_FORK:
  1.1988 +    case ELEMENT_SELINUX:
  1.1989 +    case ELEMENT_ASSOCIATE:
  1.1990 +    case ELEMENT_STANDARD_SESSION_SERVICEDIRS:
  1.1991 +      break;
  1.1992 +    }
  1.1993 +
  1.1994 +  pop_element (parser);
  1.1995 +
  1.1996 +  return TRUE;
  1.1997 +}
  1.1998 +
  1.1999 +static dbus_bool_t
  1.2000 +all_whitespace (const DBusString *str)
  1.2001 +{
  1.2002 +  int i;
  1.2003 +
  1.2004 +  _dbus_string_skip_white (str, 0, &i);
  1.2005 +
  1.2006 +  return i == _dbus_string_get_length (str);
  1.2007 +}
  1.2008 +
  1.2009 +static dbus_bool_t
  1.2010 +make_full_path (const DBusString *basedir,
  1.2011 +                const DBusString *filename,
  1.2012 +                DBusString       *full_path)
  1.2013 +{
  1.2014 +#ifndef __SYMBIAN32__
  1.2015 +  if (_dbus_path_is_absolute (filename))
  1.2016 +    {
  1.2017 +      return _dbus_string_copy (filename, 0, full_path, 0);
  1.2018 +    }
  1.2019 +  else
  1.2020 +    {
  1.2021 +      if (!_dbus_string_copy (basedir, 0, full_path, 0))
  1.2022 +        return FALSE;
  1.2023 +      
  1.2024 +      if (!_dbus_concat_dir_and_file (full_path, filename))
  1.2025 +        return FALSE;
  1.2026 +
  1.2027 +      return TRUE;
  1.2028 +    }
  1.2029 +#else    
  1.2030 +  // always give absolute path in config files on symbian
  1.2031 +     return _dbus_string_copy (filename, 0, full_path, 0);
  1.2032 +#endif
  1.2033 +}
  1.2034 +
  1.2035 +static dbus_bool_t
  1.2036 +include_file (BusConfigParser   *parser,
  1.2037 +              const DBusString  *filename,
  1.2038 +              dbus_bool_t        ignore_missing,
  1.2039 +              DBusError         *error)
  1.2040 +{
  1.2041 +  /* FIXME good test case for this would load each config file in the
  1.2042 +   * test suite both alone, and as an include, and check
  1.2043 +   * that the result is the same
  1.2044 +   */
  1.2045 +  BusConfigParser *included;
  1.2046 +  const char *filename_str;
  1.2047 +  DBusError tmp_error;
  1.2048 +        
  1.2049 +  dbus_error_init (&tmp_error);
  1.2050 +
  1.2051 +  filename_str = _dbus_string_get_const_data (filename);
  1.2052 +
  1.2053 +  /* Check to make sure this file hasn't already been included. */
  1.2054 +  if (seen_include (parser, filename))
  1.2055 +    {
  1.2056 +      dbus_set_error (error, DBUS_ERROR_FAILED,
  1.2057 +		      "Circular inclusion of file '%s'",
  1.2058 +		      filename_str);
  1.2059 +      return FALSE;
  1.2060 +    }
  1.2061 +  
  1.2062 +  if (! _dbus_list_append (&parser->included_files, (void *) filename_str))
  1.2063 +    {
  1.2064 +      BUS_SET_OOM (error);
  1.2065 +      return FALSE;
  1.2066 +    }
  1.2067 +
  1.2068 +  /* Since parser is passed in as the parent, included
  1.2069 +     inherits parser's limits. */
  1.2070 +  included = bus_config_load (filename, FALSE, parser, &tmp_error);
  1.2071 +
  1.2072 +  _dbus_list_pop_last (&parser->included_files);
  1.2073 +
  1.2074 +  if (included == NULL)
  1.2075 +    {
  1.2076 +      _DBUS_ASSERT_ERROR_IS_SET (&tmp_error);
  1.2077 +
  1.2078 +      if (dbus_error_has_name (&tmp_error, DBUS_ERROR_FILE_NOT_FOUND) &&
  1.2079 +          ignore_missing)
  1.2080 +        {
  1.2081 +          dbus_error_free (&tmp_error);
  1.2082 +          return TRUE;
  1.2083 +        }
  1.2084 +      else
  1.2085 +        {
  1.2086 +          dbus_move_error (&tmp_error, error);
  1.2087 +          return FALSE;
  1.2088 +        }
  1.2089 +    }
  1.2090 +  else
  1.2091 +    {
  1.2092 +      _DBUS_ASSERT_ERROR_IS_CLEAR (&tmp_error);
  1.2093 +
  1.2094 +      if (!merge_included (parser, included, error))
  1.2095 +        {
  1.2096 +          bus_config_parser_unref (included);
  1.2097 +          return FALSE;
  1.2098 +        }
  1.2099 +
  1.2100 +      /* Copy included's limits back to parser. */
  1.2101 +      parser->limits = included->limits;
  1.2102 +
  1.2103 +      bus_config_parser_unref (included);
  1.2104 +      return TRUE;
  1.2105 +    }
  1.2106 +}
  1.2107 +
  1.2108 +static dbus_bool_t
  1.2109 +include_dir (BusConfigParser   *parser,
  1.2110 +             const DBusString  *dirname,
  1.2111 +             DBusError         *error)
  1.2112 +{
  1.2113 +  DBusString filename;
  1.2114 +  dbus_bool_t retval;
  1.2115 +  DBusError tmp_error;
  1.2116 +  DBusDirIter *dir;
  1.2117 +  char *s;
  1.2118 +  
  1.2119 +  if (!_dbus_string_init (&filename))
  1.2120 +    {
  1.2121 +      BUS_SET_OOM (error);
  1.2122 +      return FALSE;
  1.2123 +    }
  1.2124 +
  1.2125 +  retval = FALSE;
  1.2126 +  
  1.2127 +  dir = _dbus_directory_open (dirname, error);
  1.2128 +
  1.2129 +  if (dir == NULL)
  1.2130 +    goto failed;
  1.2131 +
  1.2132 +  dbus_error_init (&tmp_error);
  1.2133 +  while (_dbus_directory_get_next_file (dir, &filename, &tmp_error))
  1.2134 +    {
  1.2135 +      DBusString full_path;
  1.2136 +
  1.2137 +      if (!_dbus_string_init (&full_path))
  1.2138 +        {
  1.2139 +          BUS_SET_OOM (error);
  1.2140 +          goto failed;
  1.2141 +        }
  1.2142 +
  1.2143 +      if (!_dbus_string_copy (dirname, 0, &full_path, 0))
  1.2144 +        {
  1.2145 +          BUS_SET_OOM (error);
  1.2146 +          _dbus_string_free (&full_path);
  1.2147 +          goto failed;
  1.2148 +        }      
  1.2149 +
  1.2150 +      if (!_dbus_concat_dir_and_file (&full_path, &filename))
  1.2151 +        {
  1.2152 +          BUS_SET_OOM (error);
  1.2153 +          _dbus_string_free (&full_path);
  1.2154 +          goto failed;
  1.2155 +        }
  1.2156 +      
  1.2157 +      if (_dbus_string_ends_with_c_str (&full_path, ".conf"))
  1.2158 +        {
  1.2159 +          if (!include_file (parser, &full_path, TRUE, error))
  1.2160 +            {
  1.2161 +              _dbus_string_free (&full_path);
  1.2162 +              goto failed;
  1.2163 +            }
  1.2164 +        }
  1.2165 +
  1.2166 +      _dbus_string_free (&full_path);
  1.2167 +    }
  1.2168 +
  1.2169 +  if (dbus_error_is_set (&tmp_error))
  1.2170 +    {
  1.2171 +      dbus_move_error (&tmp_error, error);
  1.2172 +      goto failed;
  1.2173 +    }
  1.2174 +
  1.2175 +
  1.2176 +  if (!_dbus_string_copy_data (dirname, &s))
  1.2177 +    {
  1.2178 +      BUS_SET_OOM (error);
  1.2179 +      goto failed;
  1.2180 +    }
  1.2181 +
  1.2182 +  if (!_dbus_list_append (&parser->conf_dirs, s))
  1.2183 +    {
  1.2184 +      dbus_free (s);
  1.2185 +      BUS_SET_OOM (error);
  1.2186 +      goto failed;
  1.2187 +    }
  1.2188 +
  1.2189 +  retval = TRUE;
  1.2190 +  
  1.2191 + failed:
  1.2192 +  _dbus_string_free (&filename);
  1.2193 +  
  1.2194 +  if (dir)
  1.2195 +    _dbus_directory_close (dir);
  1.2196 +
  1.2197 +  return retval;
  1.2198 +}
  1.2199 +
  1.2200 +dbus_bool_t
  1.2201 +bus_config_parser_content (BusConfigParser   *parser,
  1.2202 +                           const DBusString  *content,
  1.2203 +                           DBusError         *error)
  1.2204 +{
  1.2205 +  Element *e;
  1.2206 +
  1.2207 +  _DBUS_ASSERT_ERROR_IS_CLEAR (error);
  1.2208 +
  1.2209 +#if 0
  1.2210 +  {
  1.2211 +    const char *c_str;
  1.2212 +    
  1.2213 +    _dbus_string_get_const_data (content, &c_str);
  1.2214 +
  1.2215 +    printf ("CONTENT %d bytes: %s\n", _dbus_string_get_length (content), c_str);
  1.2216 +  }
  1.2217 +#endif
  1.2218 +  
  1.2219 +  e = peek_element (parser);
  1.2220 +  if (e == NULL)
  1.2221 +    {
  1.2222 +      dbus_set_error (error, DBUS_ERROR_FAILED,
  1.2223 +                      "Text content outside of any XML element in configuration file");
  1.2224 +      return FALSE;
  1.2225 +    }
  1.2226 +  else if (e->had_content)
  1.2227 +    {
  1.2228 +      _dbus_assert_not_reached ("Element had multiple content blocks");
  1.2229 +      return FALSE;
  1.2230 +    }
  1.2231 +
  1.2232 +  switch (top_element_type (parser))
  1.2233 +    {
  1.2234 +    case ELEMENT_NONE:
  1.2235 +      _dbus_assert_not_reached ("element at top of stack has no type");
  1.2236 +      return FALSE;
  1.2237 +
  1.2238 +    case ELEMENT_BUSCONFIG:
  1.2239 +    case ELEMENT_POLICY:
  1.2240 +    case ELEMENT_ALLOW:
  1.2241 +    case ELEMENT_DENY:
  1.2242 +    case ELEMENT_FORK:
  1.2243 +    case ELEMENT_STANDARD_SESSION_SERVICEDIRS:    
  1.2244 +    case ELEMENT_SELINUX:
  1.2245 +    case ELEMENT_ASSOCIATE:
  1.2246 +      if (all_whitespace (content))
  1.2247 +        return TRUE;
  1.2248 +      else
  1.2249 +        {
  1.2250 +          dbus_set_error (error, DBUS_ERROR_FAILED,
  1.2251 +                          "No text content expected inside XML element %s in configuration file",
  1.2252 +                          element_type_to_name (top_element_type (parser)));
  1.2253 +          return FALSE;
  1.2254 +        }
  1.2255 +
  1.2256 +    case ELEMENT_PIDFILE:
  1.2257 +      {
  1.2258 +        char *s;
  1.2259 +
  1.2260 +        e->had_content = TRUE;
  1.2261 +        
  1.2262 +        if (!_dbus_string_copy_data (content, &s))
  1.2263 +          goto nomem;
  1.2264 +          
  1.2265 +        dbus_free (parser->pidfile);
  1.2266 +        parser->pidfile = s;
  1.2267 +      }
  1.2268 +      break;
  1.2269 +
  1.2270 +    case ELEMENT_INCLUDE:
  1.2271 +      {
  1.2272 +        DBusString full_path, selinux_policy_root;
  1.2273 +
  1.2274 +        e->had_content = TRUE;
  1.2275 +
  1.2276 +	if (e->d.include.if_selinux_enabled
  1.2277 +	    && !bus_selinux_enabled ())
  1.2278 +	  break;
  1.2279 +
  1.2280 +        if (!_dbus_string_init (&full_path))
  1.2281 +          goto nomem;
  1.2282 +
  1.2283 +        if (e->d.include.selinux_root_relative)
  1.2284 +	  {
  1.2285 +            if (!bus_selinux_get_policy_root ())
  1.2286 +	      {
  1.2287 +		dbus_set_error (error, DBUS_ERROR_FAILED,
  1.2288 +				"Could not determine SELinux policy root for relative inclusion");
  1.2289 +		_dbus_string_free (&full_path);
  1.2290 +		return FALSE;
  1.2291 +	      }
  1.2292 +            _dbus_string_init_const (&selinux_policy_root,
  1.2293 +                                     bus_selinux_get_policy_root ());
  1.2294 +            if (!make_full_path (&selinux_policy_root, content, &full_path))
  1.2295 +              {
  1.2296 +                _dbus_string_free (&full_path);
  1.2297 +                goto nomem;
  1.2298 +              }
  1.2299 +          }
  1.2300 +        else if (!make_full_path (&parser->basedir, content, &full_path))
  1.2301 +          {
  1.2302 +            _dbus_string_free (&full_path);
  1.2303 +            goto nomem;
  1.2304 +          }
  1.2305 +
  1.2306 +        if (!include_file (parser, &full_path,
  1.2307 +                           e->d.include.ignore_missing, error))
  1.2308 +          {
  1.2309 +            _dbus_string_free (&full_path);
  1.2310 +            return FALSE;
  1.2311 +          }
  1.2312 +
  1.2313 +        _dbus_string_free (&full_path);
  1.2314 +      }
  1.2315 +      break;
  1.2316 +
  1.2317 +    case ELEMENT_INCLUDEDIR:
  1.2318 +      {
  1.2319 +        DBusString full_path;
  1.2320 +        
  1.2321 +        e->had_content = TRUE;
  1.2322 +
  1.2323 +        if (!_dbus_string_init (&full_path))
  1.2324 +          goto nomem;
  1.2325 +        
  1.2326 +        if (!make_full_path (&parser->basedir, content, &full_path))
  1.2327 +          {
  1.2328 +            _dbus_string_free (&full_path);
  1.2329 +            goto nomem;
  1.2330 +          }
  1.2331 +        
  1.2332 +        if (!include_dir (parser, &full_path, error))
  1.2333 +          {
  1.2334 +            _dbus_string_free (&full_path);
  1.2335 +            return FALSE;
  1.2336 +          }
  1.2337 +
  1.2338 +        _dbus_string_free (&full_path);
  1.2339 +      }
  1.2340 +      break;
  1.2341 +      
  1.2342 +    case ELEMENT_USER:
  1.2343 +      {
  1.2344 +        char *s;
  1.2345 +
  1.2346 +        e->had_content = TRUE;
  1.2347 +        
  1.2348 +        if (!_dbus_string_copy_data (content, &s))
  1.2349 +          goto nomem;
  1.2350 +          
  1.2351 +        dbus_free (parser->user);
  1.2352 +        parser->user = s;
  1.2353 +      }
  1.2354 +      break;
  1.2355 +
  1.2356 +    case ELEMENT_TYPE:
  1.2357 +      {
  1.2358 +        char *s;
  1.2359 +
  1.2360 +        e->had_content = TRUE;
  1.2361 +
  1.2362 +        if (!_dbus_string_copy_data (content, &s))
  1.2363 +          goto nomem;
  1.2364 +        
  1.2365 +        dbus_free (parser->bus_type);
  1.2366 +        parser->bus_type = s;
  1.2367 +      }
  1.2368 +      break;
  1.2369 +      
  1.2370 +    case ELEMENT_LISTEN:
  1.2371 +      {
  1.2372 +        char *s;
  1.2373 +
  1.2374 +        e->had_content = TRUE;
  1.2375 +        
  1.2376 +        if (!_dbus_string_copy_data (content, &s))
  1.2377 +          goto nomem;
  1.2378 +
  1.2379 +        if (!_dbus_list_append (&parser->listen_on,
  1.2380 +                                s))
  1.2381 +          {
  1.2382 +            dbus_free (s);
  1.2383 +            goto nomem;
  1.2384 +          }
  1.2385 +      }
  1.2386 +      break;
  1.2387 +
  1.2388 +    case ELEMENT_AUTH:
  1.2389 +      {
  1.2390 +        char *s;
  1.2391 +        
  1.2392 +        e->had_content = TRUE;
  1.2393 +
  1.2394 +        if (!_dbus_string_copy_data (content, &s))
  1.2395 +          goto nomem;
  1.2396 +
  1.2397 +        if (!_dbus_list_append (&parser->mechanisms,
  1.2398 +                                s))
  1.2399 +          {
  1.2400 +            dbus_free (s);
  1.2401 +            goto nomem;
  1.2402 +          }
  1.2403 +      }
  1.2404 +      break;
  1.2405 +
  1.2406 +    case ELEMENT_SERVICEDIR:
  1.2407 +      {
  1.2408 +        char *s;
  1.2409 +        DBusString full_path;
  1.2410 +        
  1.2411 +        e->had_content = TRUE;
  1.2412 +
  1.2413 +        if (!_dbus_string_init (&full_path))
  1.2414 +          goto nomem;
  1.2415 +        
  1.2416 +        if (!make_full_path (&parser->basedir, content, &full_path))
  1.2417 +          {
  1.2418 +            _dbus_string_free (&full_path);
  1.2419 +            goto nomem;
  1.2420 +          }
  1.2421 +        
  1.2422 +        if (!_dbus_string_copy_data (&full_path, &s))
  1.2423 +          {
  1.2424 +            _dbus_string_free (&full_path);
  1.2425 +            goto nomem;
  1.2426 +          }
  1.2427 +
  1.2428 +        if (!service_dirs_append_unique_or_free (&parser->service_dirs, s))
  1.2429 +          {
  1.2430 +            _dbus_string_free (&full_path);
  1.2431 +            dbus_free (s);
  1.2432 +            goto nomem;
  1.2433 +          }
  1.2434 +
  1.2435 +        _dbus_string_free (&full_path);
  1.2436 +      }
  1.2437 +      break;
  1.2438 +
  1.2439 +    case ELEMENT_LIMIT:
  1.2440 +      {
  1.2441 +        long val;
  1.2442 +
  1.2443 +        e->had_content = TRUE;
  1.2444 +
  1.2445 +        val = 0;
  1.2446 +        if (!_dbus_string_parse_int (content, 0, &val, NULL))
  1.2447 +          {
  1.2448 +            dbus_set_error (error, DBUS_ERROR_FAILED,
  1.2449 +                            "<limit name=\"%s\"> element has invalid value (could not parse as integer)",
  1.2450 +                            e->d.limit.name);
  1.2451 +            return FALSE;
  1.2452 +          }
  1.2453 +
  1.2454 +        e->d.limit.value = val;
  1.2455 +
  1.2456 +        _dbus_verbose ("Loaded value %ld for limit %s\n",
  1.2457 +                       e->d.limit.value,
  1.2458 +                       e->d.limit.name);
  1.2459 +      }
  1.2460 +      break;
  1.2461 +    }
  1.2462 +
  1.2463 +  _DBUS_ASSERT_ERROR_IS_CLEAR (error);
  1.2464 +  return TRUE;
  1.2465 +
  1.2466 + nomem:
  1.2467 +  BUS_SET_OOM (error);
  1.2468 +  return FALSE;
  1.2469 +}
  1.2470 +
  1.2471 +dbus_bool_t
  1.2472 +bus_config_parser_finished (BusConfigParser   *parser,
  1.2473 +                            DBusError         *error)
  1.2474 +{
  1.2475 +  _DBUS_ASSERT_ERROR_IS_CLEAR (error);
  1.2476 +
  1.2477 +  if (parser->stack != NULL)
  1.2478 +    {
  1.2479 +      dbus_set_error (error, DBUS_ERROR_FAILED,
  1.2480 +                      "Element <%s> was not closed in configuration file",
  1.2481 +                      element_type_to_name (top_element_type (parser)));
  1.2482 +
  1.2483 +      return FALSE;
  1.2484 +    }
  1.2485 +
  1.2486 +  if (parser->is_toplevel && parser->listen_on == NULL)
  1.2487 +    {
  1.2488 +      dbus_set_error (error, DBUS_ERROR_FAILED,
  1.2489 +                      "Configuration file needs one or more <listen> elements giving addresses"); 
  1.2490 +      return FALSE;
  1.2491 +    }
  1.2492 +  
  1.2493 +  return TRUE;
  1.2494 +}
  1.2495 +
  1.2496 +const char*
  1.2497 +bus_config_parser_get_user (BusConfigParser *parser)
  1.2498 +{
  1.2499 +  return parser->user;
  1.2500 +}
  1.2501 +
  1.2502 +const char*
  1.2503 +bus_config_parser_get_type (BusConfigParser *parser)
  1.2504 +{
  1.2505 +  return parser->bus_type;
  1.2506 +}
  1.2507 +
  1.2508 +DBusList**
  1.2509 +bus_config_parser_get_addresses (BusConfigParser *parser)
  1.2510 +{
  1.2511 +  return &parser->listen_on;
  1.2512 +}
  1.2513 +
  1.2514 +DBusList**
  1.2515 +bus_config_parser_get_mechanisms (BusConfigParser *parser)
  1.2516 +{
  1.2517 +  return &parser->mechanisms;
  1.2518 +}
  1.2519 +
  1.2520 +DBusList**
  1.2521 +bus_config_parser_get_service_dirs (BusConfigParser *parser)
  1.2522 +{
  1.2523 +  return &parser->service_dirs;
  1.2524 +}
  1.2525 +
  1.2526 +DBusList**
  1.2527 +bus_config_parser_get_conf_dirs (BusConfigParser *parser)
  1.2528 +{
  1.2529 +  return &parser->conf_dirs;
  1.2530 +}
  1.2531 +
  1.2532 +dbus_bool_t
  1.2533 +bus_config_parser_get_fork (BusConfigParser   *parser)
  1.2534 +{
  1.2535 +  return parser->fork;
  1.2536 +}
  1.2537 +
  1.2538 +const char *
  1.2539 +bus_config_parser_get_pidfile (BusConfigParser   *parser)
  1.2540 +{
  1.2541 +  return parser->pidfile;
  1.2542 +}
  1.2543 +
  1.2544 +BusPolicy*
  1.2545 +bus_config_parser_steal_policy (BusConfigParser *parser)
  1.2546 +{
  1.2547 +  BusPolicy *policy;
  1.2548 +
  1.2549 +  _dbus_assert (parser->policy != NULL); /* can only steal the policy 1 time */
  1.2550 +  
  1.2551 +  policy = parser->policy;
  1.2552 +
  1.2553 +  parser->policy = NULL;
  1.2554 +
  1.2555 +  return policy;
  1.2556 +}
  1.2557 +
  1.2558 +/* Overwrite any limits that were set in the configuration file */
  1.2559 +void
  1.2560 +bus_config_parser_get_limits (BusConfigParser *parser,
  1.2561 +                              BusLimits       *limits)
  1.2562 +{
  1.2563 +  *limits = parser->limits;
  1.2564 +}
  1.2565 +
  1.2566 +DBusHashTable*
  1.2567 +bus_config_parser_steal_service_context_table (BusConfigParser *parser)
  1.2568 +{
  1.2569 +  DBusHashTable *table;
  1.2570 +
  1.2571 +  _dbus_assert (parser->service_context_table != NULL); /* can only steal once */
  1.2572 +
  1.2573 +  table = parser->service_context_table;
  1.2574 +
  1.2575 +  parser->service_context_table = NULL;
  1.2576 +
  1.2577 +  return table;
  1.2578 +}
  1.2579 +
  1.2580 +#ifdef DBUS_BUILD_TESTS
  1.2581 +#include <stdio.h>
  1.2582 +
  1.2583 +typedef enum
  1.2584 +{
  1.2585 +  VALID,
  1.2586 +  INVALID,
  1.2587 +  UNKNOWN
  1.2588 +} Validity;
  1.2589 +
  1.2590 +static dbus_bool_t
  1.2591 +do_load (const DBusString *full_path,
  1.2592 +         Validity          validity,
  1.2593 +         dbus_bool_t       oom_possible)
  1.2594 +{
  1.2595 +  BusConfigParser *parser;
  1.2596 +  DBusError error;
  1.2597 +
  1.2598 +  dbus_error_init (&error);
  1.2599 +
  1.2600 +  parser = bus_config_load (full_path, TRUE, NULL, &error);
  1.2601 +  if (parser == NULL)
  1.2602 +    {
  1.2603 +      _DBUS_ASSERT_ERROR_IS_SET (&error);
  1.2604 +
  1.2605 +      if (oom_possible &&
  1.2606 +          dbus_error_has_name (&error, DBUS_ERROR_NO_MEMORY))
  1.2607 +        {
  1.2608 +          _dbus_verbose ("Failed to load valid file due to OOM\n");
  1.2609 +          dbus_error_free (&error);
  1.2610 +          return TRUE;
  1.2611 +        }
  1.2612 +      else if (validity == VALID)
  1.2613 +        {
  1.2614 +          _dbus_warn ("Failed to load valid file but still had memory: %s\n",
  1.2615 +                      error.message);
  1.2616 +
  1.2617 +          dbus_error_free (&error);
  1.2618 +          return FALSE;
  1.2619 +        }
  1.2620 +      else
  1.2621 +        {
  1.2622 +          dbus_error_free (&error);
  1.2623 +          return TRUE;
  1.2624 +        }
  1.2625 +    }
  1.2626 +  else
  1.2627 +    {
  1.2628 +      _DBUS_ASSERT_ERROR_IS_CLEAR (&error);
  1.2629 +
  1.2630 +      bus_config_parser_unref (parser);
  1.2631 +
  1.2632 +      if (validity == INVALID)
  1.2633 +        {
  1.2634 +          _dbus_warn ("Accepted invalid file\n");
  1.2635 +          return FALSE;
  1.2636 +        }
  1.2637 +
  1.2638 +      return TRUE;
  1.2639 +    }
  1.2640 +}
  1.2641 +
  1.2642 +typedef struct
  1.2643 +{
  1.2644 +  const DBusString *full_path;
  1.2645 +  Validity          validity;
  1.2646 +} LoaderOomData;
  1.2647 +
  1.2648 +static dbus_bool_t
  1.2649 +check_loader_oom_func (void *data)
  1.2650 +{
  1.2651 +  LoaderOomData *d = data;
  1.2652 +
  1.2653 +  return do_load (d->full_path, d->validity, TRUE);
  1.2654 +}
  1.2655 +
  1.2656 +static dbus_bool_t
  1.2657 +process_test_valid_subdir (const DBusString *test_base_dir,
  1.2658 +                           const char       *subdir,
  1.2659 +                           Validity          validity)
  1.2660 +{
  1.2661 +  DBusString test_directory;
  1.2662 +  DBusString filename;
  1.2663 +  DBusDirIter *dir;
  1.2664 +  dbus_bool_t retval;
  1.2665 +  DBusError error;
  1.2666 +
  1.2667 +  retval = FALSE;
  1.2668 +  dir = NULL;
  1.2669 +
  1.2670 +  if (!_dbus_string_init (&test_directory))
  1.2671 +    _dbus_assert_not_reached ("didn't allocate test_directory\n");
  1.2672 +
  1.2673 +  _dbus_string_init_const (&filename, subdir);
  1.2674 +
  1.2675 +  if (!_dbus_string_copy (test_base_dir, 0,
  1.2676 +                          &test_directory, 0))
  1.2677 +    _dbus_assert_not_reached ("couldn't copy test_base_dir to test_directory");
  1.2678 +
  1.2679 +  if (!_dbus_concat_dir_and_file (&test_directory, &filename))
  1.2680 +    _dbus_assert_not_reached ("couldn't allocate full path");
  1.2681 +
  1.2682 +  _dbus_string_free (&filename);
  1.2683 +  if (!_dbus_string_init (&filename))
  1.2684 +    _dbus_assert_not_reached ("didn't allocate filename string\n");
  1.2685 +
  1.2686 +  dbus_error_init (&error);
  1.2687 +  dir = _dbus_directory_open (&test_directory, &error);
  1.2688 +  if (dir == NULL)
  1.2689 +    {
  1.2690 +      _dbus_warn ("Could not open %s: %s\n",
  1.2691 +                  _dbus_string_get_const_data (&test_directory),
  1.2692 +                  error.message);
  1.2693 +      dbus_error_free (&error);
  1.2694 +      goto failed;
  1.2695 +    }
  1.2696 +
  1.2697 +  if (validity == VALID)
  1.2698 +    printf ("Testing valid files:\n");
  1.2699 +  else if (validity == INVALID)
  1.2700 +    printf ("Testing invalid files:\n");
  1.2701 +  else
  1.2702 +    printf ("Testing unknown files:\n");
  1.2703 +
  1.2704 + next:
  1.2705 +  while (_dbus_directory_get_next_file (dir, &filename, &error))
  1.2706 +    {
  1.2707 +      DBusString full_path;
  1.2708 +      LoaderOomData d;
  1.2709 +
  1.2710 +      if (!_dbus_string_init (&full_path))
  1.2711 +        _dbus_assert_not_reached ("couldn't init string");
  1.2712 +
  1.2713 +      if (!_dbus_string_copy (&test_directory, 0, &full_path, 0))
  1.2714 +        _dbus_assert_not_reached ("couldn't copy dir to full_path");
  1.2715 +
  1.2716 +      if (!_dbus_concat_dir_and_file (&full_path, &filename))
  1.2717 +        _dbus_assert_not_reached ("couldn't concat file to dir");
  1.2718 +
  1.2719 +      if (!_dbus_string_ends_with_c_str (&full_path, ".conf"))
  1.2720 +        {
  1.2721 +          _dbus_verbose ("Skipping non-.conf file %s\n",
  1.2722 +                         _dbus_string_get_const_data (&filename));
  1.2723 +          _dbus_string_free (&full_path);
  1.2724 +          goto next;
  1.2725 +        }
  1.2726 +
  1.2727 +      printf ("    %s\n", _dbus_string_get_const_data (&filename));
  1.2728 +
  1.2729 +      _dbus_verbose (" expecting %s\n",
  1.2730 +                     validity == VALID ? "valid" :
  1.2731 +                     (validity == INVALID ? "invalid" :
  1.2732 +                      (validity == UNKNOWN ? "unknown" : "???")));
  1.2733 +
  1.2734 +      d.full_path = &full_path;
  1.2735 +      d.validity = validity;
  1.2736 +
  1.2737 +      /* FIXME hackaround for an expat problem, see
  1.2738 +       * https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124747
  1.2739 +       * http://freedesktop.org/pipermail/dbus/2004-May/001153.html
  1.2740 +       */
  1.2741 +      /* if (!_dbus_test_oom_handling ("config-loader", check_loader_oom_func, &d)) */
  1.2742 +      if (!check_loader_oom_func (&d))
  1.2743 +        _dbus_assert_not_reached ("test failed");
  1.2744 +      
  1.2745 +      _dbus_string_free (&full_path);
  1.2746 +    }
  1.2747 +
  1.2748 +  if (dbus_error_is_set (&error))
  1.2749 +    {
  1.2750 +      _dbus_warn ("Could not get next file in %s: %s\n",
  1.2751 +                  _dbus_string_get_const_data (&test_directory),
  1.2752 +                  error.message);
  1.2753 +      dbus_error_free (&error);
  1.2754 +      goto failed;
  1.2755 +    }
  1.2756 +
  1.2757 +  retval = TRUE;
  1.2758 +
  1.2759 + failed:
  1.2760 +
  1.2761 +  if (dir)
  1.2762 +    _dbus_directory_close (dir);
  1.2763 +  _dbus_string_free (&test_directory);
  1.2764 +  _dbus_string_free (&filename);
  1.2765 +
  1.2766 +  return retval;
  1.2767 +}
  1.2768 +
  1.2769 +static dbus_bool_t
  1.2770 +bools_equal (dbus_bool_t a,
  1.2771 +	     dbus_bool_t b)
  1.2772 +{
  1.2773 +  return a ? b : !b;
  1.2774 +}
  1.2775 +
  1.2776 +static dbus_bool_t
  1.2777 +strings_equal_or_both_null (const char *a,
  1.2778 +                            const char *b)
  1.2779 +{
  1.2780 +  if (a == NULL || b == NULL)
  1.2781 +    return a == b;
  1.2782 +  else
  1.2783 +    return !strcmp (a, b);
  1.2784 +}
  1.2785 +
  1.2786 +static dbus_bool_t
  1.2787 +elements_equal (const Element *a,
  1.2788 +		const Element *b)
  1.2789 +{
  1.2790 +  if (a->type != b->type)
  1.2791 +    return FALSE;
  1.2792 +
  1.2793 +  if (!bools_equal (a->had_content, b->had_content))
  1.2794 +    return FALSE;
  1.2795 +
  1.2796 +  switch (a->type)
  1.2797 +    {
  1.2798 +
  1.2799 +    case ELEMENT_INCLUDE:
  1.2800 +      if (!bools_equal (a->d.include.ignore_missing,
  1.2801 +			b->d.include.ignore_missing))
  1.2802 +	return FALSE;
  1.2803 +      break;
  1.2804 +
  1.2805 +    case ELEMENT_POLICY:
  1.2806 +      if (a->d.policy.type != b->d.policy.type)
  1.2807 +	return FALSE;
  1.2808 +      if (a->d.policy.gid_uid_or_at_console != b->d.policy.gid_uid_or_at_console)
  1.2809 +	return FALSE;
  1.2810 +      break;
  1.2811 +
  1.2812 +    case ELEMENT_LIMIT:
  1.2813 +      if (strcmp (a->d.limit.name, b->d.limit.name))
  1.2814 +	return FALSE;
  1.2815 +      if (a->d.limit.value != b->d.limit.value)
  1.2816 +	return FALSE;
  1.2817 +      break;
  1.2818 +
  1.2819 +    default:
  1.2820 +      /* do nothing */
  1.2821 +      break;
  1.2822 +    }
  1.2823 +
  1.2824 +  return TRUE;
  1.2825 +
  1.2826 +}
  1.2827 +
  1.2828 +static dbus_bool_t
  1.2829 +lists_of_elements_equal (DBusList *a,
  1.2830 +			 DBusList *b)
  1.2831 +{
  1.2832 +  DBusList *ia;
  1.2833 +  DBusList *ib;
  1.2834 +
  1.2835 +  ia = a;
  1.2836 +  ib = b;
  1.2837 +  
  1.2838 +  while (ia != NULL && ib != NULL)
  1.2839 +    {
  1.2840 +      if (elements_equal (ia->data, ib->data))
  1.2841 +	return FALSE;
  1.2842 +      ia = _dbus_list_get_next_link (&a, ia);
  1.2843 +      ib = _dbus_list_get_next_link (&b, ib);
  1.2844 +    }
  1.2845 +
  1.2846 +  return ia == NULL && ib == NULL;
  1.2847 +}
  1.2848 +
  1.2849 +static dbus_bool_t
  1.2850 +lists_of_c_strings_equal (DBusList *a,
  1.2851 +			  DBusList *b)
  1.2852 +{
  1.2853 +  DBusList *ia;
  1.2854 +  DBusList *ib;
  1.2855 +
  1.2856 +  ia = a;
  1.2857 +  ib = b;
  1.2858 +  
  1.2859 +  while (ia != NULL && ib != NULL)
  1.2860 +    {
  1.2861 +      if (strcmp (ia->data, ib->data))
  1.2862 +	return FALSE;
  1.2863 +      ia = _dbus_list_get_next_link (&a, ia);
  1.2864 +      ib = _dbus_list_get_next_link (&b, ib);
  1.2865 +    }
  1.2866 +
  1.2867 +  return ia == NULL && ib == NULL;
  1.2868 +}
  1.2869 +
  1.2870 +static dbus_bool_t
  1.2871 +limits_equal (const BusLimits *a,
  1.2872 +	      const BusLimits *b)
  1.2873 +{
  1.2874 +  return
  1.2875 +    (a->max_incoming_bytes == b->max_incoming_bytes
  1.2876 +     || a->max_outgoing_bytes == b->max_outgoing_bytes
  1.2877 +     || a->max_message_size == b->max_message_size
  1.2878 +     || a->activation_timeout == b->activation_timeout
  1.2879 +     || a->auth_timeout == b->auth_timeout
  1.2880 +     || a->max_completed_connections == b->max_completed_connections
  1.2881 +     || a->max_incomplete_connections == b->max_incomplete_connections
  1.2882 +     || a->max_connections_per_user == b->max_connections_per_user
  1.2883 +     || a->max_pending_activations == b->max_pending_activations
  1.2884 +     || a->max_services_per_connection == b->max_services_per_connection
  1.2885 +     || a->max_match_rules_per_connection == b->max_match_rules_per_connection
  1.2886 +     || a->max_replies_per_connection == b->max_replies_per_connection
  1.2887 +     || a->reply_timeout == b->reply_timeout);
  1.2888 +}
  1.2889 +
  1.2890 +static dbus_bool_t
  1.2891 +config_parsers_equal (const BusConfigParser *a,
  1.2892 +                      const BusConfigParser *b)
  1.2893 +{
  1.2894 +  if (!_dbus_string_equal (&a->basedir, &b->basedir))
  1.2895 +    return FALSE;
  1.2896 +
  1.2897 +  if (!lists_of_elements_equal (a->stack, b->stack))
  1.2898 +    return FALSE;
  1.2899 +
  1.2900 +  if (!strings_equal_or_both_null (a->user, b->user))
  1.2901 +    return FALSE;
  1.2902 +
  1.2903 +  if (!lists_of_c_strings_equal (a->listen_on, b->listen_on))
  1.2904 +    return FALSE;
  1.2905 +
  1.2906 +  if (!lists_of_c_strings_equal (a->mechanisms, b->mechanisms))
  1.2907 +    return FALSE;
  1.2908 +
  1.2909 +  if (!lists_of_c_strings_equal (a->service_dirs, b->service_dirs))
  1.2910 +    return FALSE;
  1.2911 +  
  1.2912 +  /* FIXME: compare policy */
  1.2913 +
  1.2914 +  /* FIXME: compare service selinux ID table */
  1.2915 +
  1.2916 +  if (! limits_equal (&a->limits, &b->limits))
  1.2917 +    return FALSE;
  1.2918 +
  1.2919 +  if (!strings_equal_or_both_null (a->pidfile, b->pidfile))
  1.2920 +    return FALSE;
  1.2921 +
  1.2922 +  if (! bools_equal (a->fork, b->fork))
  1.2923 +    return FALSE;
  1.2924 +
  1.2925 +  if (! bools_equal (a->is_toplevel, b->is_toplevel))
  1.2926 +    return FALSE;
  1.2927 +
  1.2928 +  return TRUE;
  1.2929 +}
  1.2930 +
  1.2931 +static dbus_bool_t
  1.2932 +all_are_equiv (const DBusString *target_directory)
  1.2933 +{
  1.2934 +  DBusString filename;
  1.2935 +  DBusDirIter *dir;
  1.2936 +  BusConfigParser *first_parser;
  1.2937 +  BusConfigParser *parser;
  1.2938 +  DBusError error;
  1.2939 +  dbus_bool_t equal;
  1.2940 +  dbus_bool_t retval;
  1.2941 +
  1.2942 +  dir = NULL;
  1.2943 +  first_parser = NULL;
  1.2944 +  parser = NULL;
  1.2945 +  retval = FALSE;
  1.2946 +
  1.2947 +  if (!_dbus_string_init (&filename))
  1.2948 +    _dbus_assert_not_reached ("didn't allocate filename string");
  1.2949 +
  1.2950 +  dbus_error_init (&error);
  1.2951 +  dir = _dbus_directory_open (target_directory, &error);
  1.2952 +  if (dir == NULL)
  1.2953 +    {
  1.2954 +      _dbus_warn ("Could not open %s: %s\n",
  1.2955 +		  _dbus_string_get_const_data (target_directory),
  1.2956 +		  error.message);
  1.2957 +      dbus_error_free (&error);
  1.2958 +      goto finished;
  1.2959 +    }
  1.2960 +
  1.2961 +  printf ("Comparing equivalent files:\n");
  1.2962 +
  1.2963 + next:
  1.2964 +  while (_dbus_directory_get_next_file (dir, &filename, &error))
  1.2965 +    {
  1.2966 +      DBusString full_path;
  1.2967 +
  1.2968 +      if (!_dbus_string_init (&full_path))
  1.2969 +	_dbus_assert_not_reached ("couldn't init string");
  1.2970 +
  1.2971 +      if (!_dbus_string_copy (target_directory, 0, &full_path, 0))
  1.2972 +        _dbus_assert_not_reached ("couldn't copy dir to full_path");
  1.2973 +
  1.2974 +      if (!_dbus_concat_dir_and_file (&full_path, &filename))
  1.2975 +        _dbus_assert_not_reached ("couldn't concat file to dir");
  1.2976 +
  1.2977 +      if (!_dbus_string_ends_with_c_str (&full_path, ".conf"))
  1.2978 +        {
  1.2979 +          _dbus_verbose ("Skipping non-.conf file %s\n",
  1.2980 +                         _dbus_string_get_const_data (&filename));
  1.2981 +	  _dbus_string_free (&full_path);
  1.2982 +          goto next;
  1.2983 +        }
  1.2984 +
  1.2985 +      printf ("    %s\n", _dbus_string_get_const_data (&filename));
  1.2986 +
  1.2987 +      parser = bus_config_load (&full_path, TRUE, NULL, &error);
  1.2988 +
  1.2989 +      if (parser == NULL)
  1.2990 +	{
  1.2991 +	  _dbus_warn ("Could not load file %s: %s\n",
  1.2992 +		      _dbus_string_get_const_data (&full_path),
  1.2993 +		      error.message);
  1.2994 +          _dbus_string_free (&full_path);
  1.2995 +	  dbus_error_free (&error);
  1.2996 +	  goto finished;
  1.2997 +	}
  1.2998 +      else if (first_parser == NULL)
  1.2999 +	{
  1.3000 +          _dbus_string_free (&full_path);
  1.3001 +	  first_parser = parser;
  1.3002 +	}
  1.3003 +      else
  1.3004 +	{
  1.3005 +          _dbus_string_free (&full_path);
  1.3006 +	  equal = config_parsers_equal (first_parser, parser);
  1.3007 +	  bus_config_parser_unref (parser);
  1.3008 +	  if (! equal)
  1.3009 +	    goto finished;
  1.3010 +	}
  1.3011 +    }
  1.3012 +
  1.3013 +  retval = TRUE;
  1.3014 +
  1.3015 + finished:
  1.3016 +  _dbus_string_free (&filename);
  1.3017 +  if (first_parser)
  1.3018 +    bus_config_parser_unref (first_parser);
  1.3019 +  if (dir)
  1.3020 +    _dbus_directory_close (dir);
  1.3021 +
  1.3022 +  return retval;
  1.3023 +  
  1.3024 +}
  1.3025 +
  1.3026 +static dbus_bool_t
  1.3027 +process_test_equiv_subdir (const DBusString *test_base_dir,
  1.3028 +			   const char       *subdir)
  1.3029 +{
  1.3030 +  DBusString test_directory;
  1.3031 +  DBusString filename;
  1.3032 +  DBusDirIter *dir;
  1.3033 +  DBusError error;
  1.3034 +  dbus_bool_t equal;
  1.3035 +  dbus_bool_t retval;
  1.3036 +
  1.3037 +  dir = NULL;
  1.3038 +  retval = FALSE;
  1.3039 +
  1.3040 +  if (!_dbus_string_init (&test_directory))
  1.3041 +    _dbus_assert_not_reached ("didn't allocate test_directory");
  1.3042 +
  1.3043 +  _dbus_string_init_const (&filename, subdir);
  1.3044 +
  1.3045 +  if (!_dbus_string_copy (test_base_dir, 0,
  1.3046 +			  &test_directory, 0))
  1.3047 +    _dbus_assert_not_reached ("couldn't copy test_base_dir to test_directory");
  1.3048 +
  1.3049 +  if (!_dbus_concat_dir_and_file (&test_directory, &filename))
  1.3050 +    _dbus_assert_not_reached ("couldn't allocate full path");
  1.3051 +
  1.3052 +  _dbus_string_free (&filename);
  1.3053 +  if (!_dbus_string_init (&filename))
  1.3054 +    _dbus_assert_not_reached ("didn't allocate filename string");
  1.3055 +
  1.3056 +  dbus_error_init (&error);
  1.3057 +  dir = _dbus_directory_open (&test_directory, &error);
  1.3058 +  if (dir == NULL)
  1.3059 +    {
  1.3060 +      _dbus_warn ("Could not open %s: %s\n",
  1.3061 +		  _dbus_string_get_const_data (&test_directory),
  1.3062 +		  error.message);
  1.3063 +      dbus_error_free (&error);
  1.3064 +      goto finished;
  1.3065 +    }
  1.3066 +
  1.3067 +  while (_dbus_directory_get_next_file (dir, &filename, &error))
  1.3068 +    {
  1.3069 +      DBusString full_path;
  1.3070 +
  1.3071 +      /* Skip CVS's magic directories! */
  1.3072 +      if (_dbus_string_equal_c_str (&filename, "CVS"))
  1.3073 +	continue;
  1.3074 +
  1.3075 +      if (!_dbus_string_init (&full_path))
  1.3076 +	_dbus_assert_not_reached ("couldn't init string");
  1.3077 +
  1.3078 +      if (!_dbus_string_copy (&test_directory, 0, &full_path, 0))
  1.3079 +        _dbus_assert_not_reached ("couldn't copy dir to full_path");
  1.3080 +
  1.3081 +      if (!_dbus_concat_dir_and_file (&full_path, &filename))
  1.3082 +        _dbus_assert_not_reached ("couldn't concat file to dir");
  1.3083 +      
  1.3084 +      equal = all_are_equiv (&full_path);
  1.3085 +      _dbus_string_free (&full_path);
  1.3086 +
  1.3087 +      if (!equal)
  1.3088 +	goto finished;
  1.3089 +    }
  1.3090 +
  1.3091 +  retval = TRUE;
  1.3092 +
  1.3093 + finished:
  1.3094 +  _dbus_string_free (&test_directory);
  1.3095 +  _dbus_string_free (&filename);
  1.3096 +  if (dir)
  1.3097 +    _dbus_directory_close (dir);
  1.3098 +
  1.3099 +  return retval;
  1.3100 +  
  1.3101 +}
  1.3102 +
  1.3103 +static const char *test_service_dir_matches[] = 
  1.3104 +        {
  1.3105 +#ifndef __SYMBIAN32__
  1.3106 +         "/testusr/testlocal/testshare/dbus-1/services",
  1.3107 +         "/testusr/testshare/dbus-1/services",
  1.3108 +         DBUS_DATADIR"/dbus-1/services",
  1.3109 +         "/testhome/foo/.testlocal/testshare/dbus-1/services",         
  1.3110 +#else
  1.3111 +DBUS_DATADIR"\\dbus1\\services",
  1.3112 +/*   Certain files such as jabber.service are exported and included in the rom builds by other components. 
  1.3113 + *   These are not available for emulator environments and hence added explictly for hardware platforms.
  1.3114 + */
  1.3115 +#if (! defined __WINSCW__)
  1.3116 +"z:\\data\\dbus\\dbus1\\services",
  1.3117 +#endif
  1.3118 +
  1.3119 +#endif         
  1.3120 +         NULL
  1.3121 +        };
  1.3122 +
  1.3123 +static dbus_bool_t
  1.3124 +test_default_session_servicedirs (void)
  1.3125 +{
  1.3126 +  DBusList *dirs;
  1.3127 +  DBusList *link;
  1.3128 +  int i;
  1.3129 +
  1.3130 +  dirs = NULL;
  1.3131 +
  1.3132 +  printf ("Testing retriving the default session service directories\n");
  1.3133 +  if (!_dbus_get_standard_session_servicedirs (&dirs))
  1.3134 +    _dbus_assert_not_reached ("couldn't get stardard dirs");
  1.3135 +
  1.3136 +  /* make sure our defaults end with share/dbus-1/service */
  1.3137 +  while ((link = _dbus_list_pop_first_link (&dirs)))
  1.3138 +    {
  1.3139 +      DBusString path;
  1.3140 +      
  1.3141 +      printf ("    default service dir: %s\n", (char *)link->data);
  1.3142 +      _dbus_string_init_const (&path, (char *)link->data);
  1.3143 +#ifdef __SYMBIAN32__
  1.3144 +      if (!_dbus_string_ends_with_c_str (&path, "\\dbus\\dbus1\\services"))
  1.3145 +#else
  1.3146 +      if (!_dbus_string_ends_with_c_str (&path, "share/dbus-1/services"))
  1.3147 +#endif      
  1.3148 +        {
  1.3149 +          printf ("error with default session service directories\n");
  1.3150 +          return FALSE;
  1.3151 +        }
  1.3152 + 
  1.3153 +      dbus_free (link->data);
  1.3154 +      _dbus_list_free_link (link);
  1.3155 +    }
  1.3156 +
  1.3157 +#if 1
  1.3158 +  if (!_dbus_setenv ("XDG_DATA_HOME", "/testhome/foo/.testlocal/testshare"))
  1.3159 +    _dbus_assert_not_reached ("couldn't setenv XDG_DATA_HOME");
  1.3160 +
  1.3161 +  if (!_dbus_setenv ("XDG_DATA_DIRS", ":/testusr/testlocal/testshare: :/testusr/testshare:"))
  1.3162 +    _dbus_assert_not_reached ("couldn't setenv XDG_DATA_DIRS");
  1.3163 +
  1.3164 +  if (!_dbus_get_standard_session_servicedirs (&dirs))
  1.3165 +    _dbus_assert_not_reached ("couldn't get stardard dirs");
  1.3166 +
  1.3167 +  /* make sure we read and parse the env variable correctly */
  1.3168 +  i = 0;
  1.3169 +  while ((link = _dbus_list_pop_first_link (&dirs)))
  1.3170 +    {
  1.3171 +      printf ("    test service dir: %s\n", (char *)link->data);
  1.3172 +      if (test_service_dir_matches[i] == NULL)
  1.3173 +        {
  1.3174 +          printf ("more directories parsed than in match set\n");
  1.3175 +          return FALSE;
  1.3176 +        }
  1.3177 + 
  1.3178 +      if (strcasecmp (test_service_dir_matches[i], 
  1.3179 +                  (char *)link->data) != 0)
  1.3180 +        {
  1.3181 +          printf ("%s directory does not match %s in the match set\n", 
  1.3182 +                  (char *)link->data,
  1.3183 +                  test_service_dir_matches[i]);
  1.3184 +          return FALSE;
  1.3185 +        }
  1.3186 +
  1.3187 +      ++i;
  1.3188 +
  1.3189 +      dbus_free (link->data);
  1.3190 +      _dbus_list_free_link (link);
  1.3191 +    }
  1.3192 +  
  1.3193 +  if (test_service_dir_matches[i] != NULL)
  1.3194 +    {
  1.3195 +      printf ("extra data %s in the match set was not matched\n",
  1.3196 +              test_service_dir_matches[i]);
  1.3197 +
  1.3198 +      return FALSE;
  1.3199 +    }
  1.3200 +#endif    
  1.3201 +  return TRUE;
  1.3202 +}
  1.3203 +			   
  1.3204 +dbus_bool_t
  1.3205 +bus_config_parser_test (const DBusString *test_data_dir)
  1.3206 +{
  1.3207 +  if (test_data_dir == NULL ||
  1.3208 +      _dbus_string_get_length (test_data_dir) == 0)
  1.3209 +    {
  1.3210 +      printf ("No test data\n");
  1.3211 +      return TRUE;
  1.3212 +    }
  1.3213 +
  1.3214 +  if (!test_default_session_servicedirs())
  1.3215 +    return FALSE;
  1.3216 +
  1.3217 +  if (!process_test_valid_subdir (test_data_dir, "valid-config-files", VALID))
  1.3218 +    return FALSE;
  1.3219 +
  1.3220 +  if (!process_test_valid_subdir (test_data_dir, "invalid-config-files", INVALID))
  1.3221 +    return FALSE;
  1.3222 +
  1.3223 +  if (!process_test_equiv_subdir (test_data_dir, "equiv-config-files"))
  1.3224 +    return FALSE;
  1.3225 +
  1.3226 +  return TRUE;
  1.3227 +}
  1.3228 +
  1.3229 +#endif /* DBUS_BUILD_TESTS */
  1.3230 +