1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000
1.2 +++ b/os/ossrv/ofdbus/dbus/bus/config-parser.c Fri Jun 15 03:10:57 2012 +0200
1.3 @@ -0,0 +1,3227 @@
1.4 +/* -*- mode: C; c-file-style: "gnu" -*- */
1.5 +/* config-parser.c XML-library-agnostic configuration file parser
1.6 + *
1.7 + * Copyright (C) 2003, 2004 Red Hat, Inc.
1.8 + * Portion Copyright © 2008 Nokia Corporation and/or its subsidiary(-ies). All rights reserved.
1.9 + * Licensed under the Academic Free License version 2.1
1.10 + *
1.11 + * This program is free software; you can redistribute it and/or modify
1.12 + * it under the terms of the GNU General Public License as published by
1.13 + * the Free Software Foundation; either version 2 of the License, or
1.14 + * (at your option) any later version.
1.15 + *
1.16 + * This program is distributed in the hope that it will be useful,
1.17 + * but WITHOUT ANY WARRANTY; without even the implied warranty of
1.18 + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
1.19 + * GNU General Public License for more details.
1.20 + *
1.21 + * You should have received a copy of the GNU General Public License
1.22 + * along with this program; if not, write to the Free Software
1.23 + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
1.24 + *
1.25 + */
1.26 +#include "config-parser.h"
1.27 +#include "test.h"
1.28 +#include "utils.h"
1.29 +#include "policy.h"
1.30 +#include "selinux.h"
1.31 +#ifndef __SYMBIAN32__
1.32 +#include <dbus/dbus-list.h>
1.33 +#include <dbus/dbus-internals.h>
1.34 +#else
1.35 +#include "dbus-list.h"
1.36 +#include "dbus-internals.h"
1.37 +#endif //__SYMBIAN32__
1.38 +#include <string.h>
1.39 +
1.40 +typedef enum
1.41 +{
1.42 + ELEMENT_NONE,
1.43 + ELEMENT_BUSCONFIG,
1.44 + ELEMENT_INCLUDE,
1.45 + ELEMENT_USER,
1.46 + ELEMENT_LISTEN,
1.47 + ELEMENT_AUTH,
1.48 + ELEMENT_POLICY,
1.49 + ELEMENT_LIMIT,
1.50 + ELEMENT_ALLOW,
1.51 + ELEMENT_DENY,
1.52 + ELEMENT_FORK,
1.53 + ELEMENT_PIDFILE,
1.54 + ELEMENT_SERVICEDIR,
1.55 + ELEMENT_INCLUDEDIR,
1.56 + ELEMENT_TYPE,
1.57 + ELEMENT_SELINUX,
1.58 + ELEMENT_ASSOCIATE,
1.59 + ELEMENT_STANDARD_SESSION_SERVICEDIRS
1.60 +} ElementType;
1.61 +
1.62 +typedef enum
1.63 +{
1.64 + /* we ignore policies for unknown groups/users */
1.65 + POLICY_IGNORED,
1.66 +
1.67 + /* non-ignored */
1.68 + POLICY_DEFAULT,
1.69 + POLICY_MANDATORY,
1.70 + POLICY_USER,
1.71 + POLICY_GROUP,
1.72 + POLICY_CONSOLE
1.73 +} PolicyType;
1.74 +
1.75 +typedef struct
1.76 +{
1.77 + ElementType type;
1.78 +
1.79 + unsigned int had_content : 1;
1.80 +
1.81 + union
1.82 + {
1.83 + struct
1.84 + {
1.85 + unsigned int ignore_missing : 1;
1.86 + unsigned int if_selinux_enabled : 1;
1.87 + unsigned int selinux_root_relative : 1;
1.88 + } include;
1.89 +
1.90 + struct
1.91 + {
1.92 + PolicyType type;
1.93 + unsigned long gid_uid_or_at_console;
1.94 + } policy;
1.95 +
1.96 + struct
1.97 + {
1.98 + char *name;
1.99 + long value;
1.100 + } limit;
1.101 +
1.102 + } d;
1.103 +
1.104 +} Element;
1.105 +
1.106 +/**
1.107 + * Parser for bus configuration file.
1.108 + */
1.109 +struct BusConfigParser
1.110 +{
1.111 + int refcount; /**< Reference count */
1.112 +
1.113 + DBusString basedir; /**< Directory we resolve paths relative to */
1.114 +
1.115 + DBusList *stack; /**< stack of Element */
1.116 +
1.117 + char *user; /**< user to run as */
1.118 +
1.119 + char *bus_type; /**< Message bus type */
1.120 +
1.121 + DBusList *listen_on; /**< List of addresses to listen to */
1.122 +
1.123 + DBusList *mechanisms; /**< Auth mechanisms */
1.124 +
1.125 + DBusList *service_dirs; /**< Directories to look for services in */
1.126 +
1.127 + DBusList *conf_dirs; /**< Directories to look for policy configuration in */
1.128 +
1.129 + BusPolicy *policy; /**< Security policy */
1.130 +
1.131 + BusLimits limits; /**< Limits */
1.132 +
1.133 + char *pidfile; /**< PID file */
1.134 +
1.135 + DBusList *included_files; /**< Included files stack */
1.136 +
1.137 + DBusHashTable *service_context_table; /**< Map service names to SELinux contexts */
1.138 +
1.139 + unsigned int fork : 1; /**< TRUE to fork into daemon mode */
1.140 +
1.141 + unsigned int is_toplevel : 1; /**< FALSE if we are a sub-config-file inside another one */
1.142 +};
1.143 +
1.144 +static const char*
1.145 +element_type_to_name (ElementType type)
1.146 +{
1.147 + switch (type)
1.148 + {
1.149 + case ELEMENT_NONE:
1.150 + return NULL;
1.151 + case ELEMENT_BUSCONFIG:
1.152 + return "busconfig";
1.153 + case ELEMENT_INCLUDE:
1.154 + return "include";
1.155 + case ELEMENT_USER:
1.156 + return "user";
1.157 + case ELEMENT_LISTEN:
1.158 + return "listen";
1.159 + case ELEMENT_AUTH:
1.160 + return "auth";
1.161 + case ELEMENT_POLICY:
1.162 + return "policy";
1.163 + case ELEMENT_LIMIT:
1.164 + return "limit";
1.165 + case ELEMENT_ALLOW:
1.166 + return "allow";
1.167 + case ELEMENT_DENY:
1.168 + return "deny";
1.169 + case ELEMENT_FORK:
1.170 + return "fork";
1.171 + case ELEMENT_PIDFILE:
1.172 + return "pidfile";
1.173 + case ELEMENT_STANDARD_SESSION_SERVICEDIRS:
1.174 + return "standard_session_servicedirs";
1.175 + case ELEMENT_SERVICEDIR:
1.176 + return "servicedir";
1.177 + case ELEMENT_INCLUDEDIR:
1.178 + return "includedir";
1.179 + case ELEMENT_TYPE:
1.180 + return "type";
1.181 + case ELEMENT_SELINUX:
1.182 + return "selinux";
1.183 + case ELEMENT_ASSOCIATE:
1.184 + return "associate";
1.185 + }
1.186 +
1.187 + _dbus_assert_not_reached ("bad element type");
1.188 +
1.189 + return NULL;
1.190 +}
1.191 +
1.192 +static Element*
1.193 +push_element (BusConfigParser *parser,
1.194 + ElementType type)
1.195 +{
1.196 + Element *e;
1.197 +
1.198 + _dbus_assert (type != ELEMENT_NONE);
1.199 +
1.200 + e = dbus_new0 (Element, 1);
1.201 + if (e == NULL)
1.202 + return NULL;
1.203 +
1.204 + if (!_dbus_list_append (&parser->stack, e))
1.205 + {
1.206 + dbus_free (e);
1.207 + return NULL;
1.208 + }
1.209 +
1.210 + e->type = type;
1.211 +
1.212 + return e;
1.213 +}
1.214 +
1.215 +static void
1.216 +element_free (Element *e)
1.217 +{
1.218 + if (e->type == ELEMENT_LIMIT)
1.219 + dbus_free (e->d.limit.name);
1.220 +
1.221 + dbus_free (e);
1.222 +}
1.223 +
1.224 +static void
1.225 +pop_element (BusConfigParser *parser)
1.226 +{
1.227 + Element *e;
1.228 +
1.229 + e = _dbus_list_pop_last (&parser->stack);
1.230 +
1.231 + element_free (e);
1.232 +}
1.233 +
1.234 +static Element*
1.235 +peek_element (BusConfigParser *parser)
1.236 +{
1.237 + Element *e;
1.238 +
1.239 + e = _dbus_list_get_last (&parser->stack);
1.240 +
1.241 + return e;
1.242 +}
1.243 +
1.244 +static ElementType
1.245 +top_element_type (BusConfigParser *parser)
1.246 +{
1.247 + Element *e;
1.248 +
1.249 + e = _dbus_list_get_last (&parser->stack);
1.250 +
1.251 + if (e)
1.252 + return e->type;
1.253 + else
1.254 + return ELEMENT_NONE;
1.255 +}
1.256 +
1.257 +static dbus_bool_t
1.258 +merge_service_context_hash (DBusHashTable *dest,
1.259 + DBusHashTable *from)
1.260 +{
1.261 + DBusHashIter iter;
1.262 + char *service_copy;
1.263 + char *context_copy;
1.264 +
1.265 + service_copy = NULL;
1.266 + context_copy = NULL;
1.267 +
1.268 + _dbus_hash_iter_init (from, &iter);
1.269 + while (_dbus_hash_iter_next (&iter))
1.270 + {
1.271 + const char *service = _dbus_hash_iter_get_string_key (&iter);
1.272 + const char *context = _dbus_hash_iter_get_value (&iter);
1.273 +
1.274 + service_copy = _dbus_strdup (service);
1.275 + if (service_copy == NULL)
1.276 + goto fail;
1.277 + context_copy = _dbus_strdup (context);
1.278 + if (context_copy == NULL)
1.279 + goto fail;
1.280 +
1.281 + if (!_dbus_hash_table_insert_string (dest, service_copy, context_copy))
1.282 + goto fail;
1.283 +
1.284 + service_copy = NULL;
1.285 + context_copy = NULL;
1.286 + }
1.287 +
1.288 + return TRUE;
1.289 +
1.290 + fail:
1.291 + if (service_copy)
1.292 + dbus_free (service_copy);
1.293 +
1.294 + if (context_copy)
1.295 + dbus_free (context_copy);
1.296 +
1.297 + return FALSE;
1.298 +}
1.299 +
1.300 +static dbus_bool_t
1.301 +service_dirs_find_dir (DBusList **service_dirs,
1.302 + const char *dir)
1.303 +{
1.304 + DBusList *link;
1.305 +
1.306 + _dbus_assert (dir != NULL);
1.307 +
1.308 + for (link = *service_dirs; link; link = _dbus_list_get_next_link(service_dirs, link))
1.309 + {
1.310 + const char *link_dir;
1.311 +
1.312 + link_dir = (const char *)link->data;
1.313 + if (strcmp (dir, link_dir) == 0)
1.314 + return TRUE;
1.315 + }
1.316 +
1.317 + return FALSE;
1.318 +}
1.319 +
1.320 +static dbus_bool_t
1.321 +service_dirs_append_unique_or_free (DBusList **service_dirs,
1.322 + char *dir)
1.323 +{
1.324 + if (!service_dirs_find_dir (service_dirs, dir))
1.325 + return _dbus_list_append (service_dirs, dir);
1.326 +
1.327 + dbus_free (dir);
1.328 + return TRUE;
1.329 +}
1.330 +
1.331 +static void
1.332 +service_dirs_append_link_unique_or_free (DBusList **service_dirs,
1.333 + DBusList *dir_link)
1.334 +{
1.335 + if (!service_dirs_find_dir (service_dirs, dir_link->data))
1.336 + {
1.337 + _dbus_list_append_link (service_dirs, dir_link);
1.338 + }
1.339 + else
1.340 + {
1.341 + dbus_free (dir_link->data);
1.342 + _dbus_list_free_link (dir_link);
1.343 + }
1.344 +}
1.345 +
1.346 +static dbus_bool_t
1.347 +merge_included (BusConfigParser *parser,
1.348 + BusConfigParser *included,
1.349 + DBusError *error)
1.350 +{
1.351 + DBusList *link;
1.352 +
1.353 + if (!bus_policy_merge (parser->policy,
1.354 + included->policy))
1.355 + {
1.356 + BUS_SET_OOM (error);
1.357 + return FALSE;
1.358 + }
1.359 +
1.360 + if (!merge_service_context_hash (parser->service_context_table,
1.361 + included->service_context_table))
1.362 + {
1.363 + BUS_SET_OOM (error);
1.364 + return FALSE;
1.365 + }
1.366 +
1.367 + if (included->user != NULL)
1.368 + {
1.369 + dbus_free (parser->user);
1.370 + parser->user = included->user;
1.371 + included->user = NULL;
1.372 + }
1.373 +
1.374 + if (included->bus_type != NULL)
1.375 + {
1.376 + dbus_free (parser->bus_type);
1.377 + parser->bus_type = included->bus_type;
1.378 + included->bus_type = NULL;
1.379 + }
1.380 +
1.381 + if (included->fork)
1.382 + parser->fork = TRUE;
1.383 +
1.384 + if (included->pidfile != NULL)
1.385 + {
1.386 + dbus_free (parser->pidfile);
1.387 + parser->pidfile = included->pidfile;
1.388 + included->pidfile = NULL;
1.389 + }
1.390 +
1.391 + while ((link = _dbus_list_pop_first_link (&included->listen_on)))
1.392 + _dbus_list_append_link (&parser->listen_on, link);
1.393 +
1.394 + while ((link = _dbus_list_pop_first_link (&included->mechanisms)))
1.395 + _dbus_list_append_link (&parser->mechanisms, link);
1.396 +
1.397 + while ((link = _dbus_list_pop_first_link (&included->service_dirs)))
1.398 + service_dirs_append_link_unique_or_free (&parser->service_dirs, link);
1.399 +
1.400 + while ((link = _dbus_list_pop_first_link (&included->conf_dirs)))
1.401 + _dbus_list_append_link (&parser->conf_dirs, link);
1.402 +
1.403 + return TRUE;
1.404 +}
1.405 +
1.406 +static dbus_bool_t
1.407 +seen_include (BusConfigParser *parser,
1.408 + const DBusString *file)
1.409 +{
1.410 + DBusList *iter;
1.411 +
1.412 + iter = parser->included_files;
1.413 + while (iter != NULL)
1.414 + {
1.415 + if (! strcmp (_dbus_string_get_const_data (file), iter->data))
1.416 + return TRUE;
1.417 +
1.418 + iter = _dbus_list_get_next_link (&parser->included_files, iter);
1.419 + }
1.420 +
1.421 + return FALSE;
1.422 +}
1.423 +
1.424 +BusConfigParser*
1.425 +bus_config_parser_new (const DBusString *basedir,
1.426 + dbus_bool_t is_toplevel,
1.427 + const BusConfigParser *parent)
1.428 +{
1.429 + BusConfigParser *parser;
1.430 +
1.431 + parser = dbus_new0 (BusConfigParser, 1);
1.432 + if (parser == NULL)
1.433 + return NULL;
1.434 +
1.435 + parser->is_toplevel = !!is_toplevel;
1.436 +
1.437 + if (!_dbus_string_init (&parser->basedir))
1.438 + {
1.439 + dbus_free (parser);
1.440 + return NULL;
1.441 + }
1.442 +
1.443 + if (((parser->policy = bus_policy_new ()) == NULL) ||
1.444 + !_dbus_string_copy (basedir, 0, &parser->basedir, 0) ||
1.445 + ((parser->service_context_table = _dbus_hash_table_new (DBUS_HASH_STRING,
1.446 + dbus_free,
1.447 + dbus_free)) == NULL))
1.448 + {
1.449 + if (parser->policy)
1.450 + bus_policy_unref (parser->policy);
1.451 +
1.452 + _dbus_string_free (&parser->basedir);
1.453 +
1.454 + dbus_free (parser);
1.455 + return NULL;
1.456 + }
1.457 +
1.458 + if (parent != NULL)
1.459 + {
1.460 + /* Initialize the parser's limits from the parent. */
1.461 + parser->limits = parent->limits;
1.462 +
1.463 + /* Use the parent's list of included_files to avoid
1.464 + circular inclusions. */
1.465 + parser->included_files = parent->included_files;
1.466 + }
1.467 + else
1.468 + {
1.469 +
1.470 + /* Make up some numbers! woot! */
1.471 + parser->limits.max_incoming_bytes = _DBUS_ONE_MEGABYTE * 63;
1.472 + parser->limits.max_outgoing_bytes = _DBUS_ONE_MEGABYTE * 63;
1.473 + parser->limits.max_message_size = _DBUS_ONE_MEGABYTE * 32;
1.474 +
1.475 + /* Making this long means the user has to wait longer for an error
1.476 + * message if something screws up, but making it too short means
1.477 + * they might see a false failure.
1.478 + */
1.479 +#ifdef __SYMBIAN32__
1.480 + parser->limits.activation_timeout = 250000; /* changed to 250 seconds */
1.481 +#else
1.482 + parser->limits.activation_timeout = 25000;
1.483 +#endif
1.484 + /* Making this long risks making a DOS attack easier, but too short
1.485 + * and legitimate auth will fail. If interactive auth (ask user for
1.486 + * password) is allowed, then potentially it has to be quite long.
1.487 + */
1.488 + parser->limits.auth_timeout = 300000; /* 30 seconds bsr changed to 300 sec*/
1.489 +
1.490 + parser->limits.max_incomplete_connections = 32;
1.491 + parser->limits.max_connections_per_user = 128;
1.492 +
1.493 + /* Note that max_completed_connections / max_connections_per_user
1.494 + * is the number of users that would have to work together to
1.495 + * DOS all the other users.
1.496 + */
1.497 + parser->limits.max_completed_connections = 1024;
1.498 +
1.499 + parser->limits.max_pending_activations = 256;
1.500 + parser->limits.max_services_per_connection = 256;
1.501 +
1.502 + parser->limits.max_match_rules_per_connection = 512;
1.503 +
1.504 + parser->limits.reply_timeout = 5 * 60 * 1000; /* 5 minutes */
1.505 + parser->limits.max_replies_per_connection = 32;
1.506 +
1.507 +
1.508 + /*
1.509 + parser->limits.max_incoming_bytes = 1024 * 1024 * 63;
1.510 + parser->limits.max_outgoing_bytes = 1024 * 1024 * 63;
1.511 + parser->limits.max_message_size = 1024 * 1024 * 32;
1.512 + parser->limits.activation_timeout = 250000;
1.513 + parser->limits.auth_timeout = 300000;
1.514 + parser->limits.max_incomplete_connections = 32;
1.515 + parser->limits.max_connections_per_user = 128;
1.516 + parser->limits.max_completed_connections = 1024;
1.517 + parser->limits.max_pending_activations = 256;
1.518 + parser->limits.max_services_per_connection = 256;
1.519 + parser->limits.max_match_rules_per_connection = 512;
1.520 + parser->limits.reply_timeout = 5 * 60 * 1000;
1.521 + parser->limits.max_replies_per_connection = 32;
1.522 + */
1.523 +
1.524 +
1.525 +
1.526 + }
1.527 +
1.528 + parser->refcount = 1;
1.529 +
1.530 + return parser;
1.531 +}
1.532 +
1.533 +BusConfigParser *
1.534 +bus_config_parser_ref (BusConfigParser *parser)
1.535 +{
1.536 + _dbus_assert (parser->refcount > 0);
1.537 +
1.538 + parser->refcount += 1;
1.539 +
1.540 + return parser;
1.541 +}
1.542 +
1.543 +void
1.544 +bus_config_parser_unref (BusConfigParser *parser)
1.545 +{
1.546 + _dbus_assert (parser->refcount > 0);
1.547 +
1.548 + parser->refcount -= 1;
1.549 +
1.550 + if (parser->refcount == 0)
1.551 + {
1.552 + while (parser->stack != NULL)
1.553 + pop_element (parser);
1.554 +
1.555 + dbus_free (parser->user);
1.556 + dbus_free (parser->bus_type);
1.557 + dbus_free (parser->pidfile);
1.558 +
1.559 + _dbus_list_foreach (&parser->listen_on,
1.560 + (DBusForeachFunction) dbus_free,
1.561 + NULL);
1.562 +
1.563 + _dbus_list_clear (&parser->listen_on);
1.564 +
1.565 + _dbus_list_foreach (&parser->service_dirs,
1.566 + (DBusForeachFunction) dbus_free,
1.567 + NULL);
1.568 +
1.569 + _dbus_list_clear (&parser->service_dirs);
1.570 +
1.571 + _dbus_list_foreach (&parser->conf_dirs,
1.572 + (DBusForeachFunction) dbus_free,
1.573 + NULL);
1.574 +
1.575 + _dbus_list_clear (&parser->conf_dirs);
1.576 +
1.577 + _dbus_list_foreach (&parser->mechanisms,
1.578 + (DBusForeachFunction) dbus_free,
1.579 + NULL);
1.580 +
1.581 + _dbus_list_clear (&parser->mechanisms);
1.582 +
1.583 + _dbus_string_free (&parser->basedir);
1.584 +
1.585 + if (parser->policy)
1.586 + bus_policy_unref (parser->policy);
1.587 +
1.588 + if (parser->service_context_table)
1.589 + _dbus_hash_table_unref (parser->service_context_table);
1.590 +
1.591 + dbus_free (parser);
1.592 + }
1.593 +}
1.594 +
1.595 +dbus_bool_t
1.596 +bus_config_parser_check_doctype (BusConfigParser *parser,
1.597 + const char *doctype,
1.598 + DBusError *error)
1.599 +{
1.600 + _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1.601 +
1.602 + if (strcmp (doctype, "busconfig") != 0)
1.603 + {
1.604 + dbus_set_error (error,
1.605 + DBUS_ERROR_FAILED,
1.606 + "Configuration file has the wrong document type %s",
1.607 + doctype);
1.608 + return FALSE;
1.609 + }
1.610 + else
1.611 + return TRUE;
1.612 +}
1.613 +
1.614 +typedef struct
1.615 +{
1.616 + const char *name;
1.617 + const char **retloc;
1.618 +} LocateAttr;
1.619 +
1.620 +static dbus_bool_t
1.621 +locate_attributes (BusConfigParser *parser,
1.622 + const char *element_name,
1.623 + const char **attribute_names,
1.624 + const char **attribute_values,
1.625 + DBusError *error,
1.626 + const char *first_attribute_name,
1.627 + const char **first_attribute_retloc,
1.628 + ...)
1.629 +{
1.630 + va_list args;
1.631 + const char *name;
1.632 + const char **retloc;
1.633 + int n_attrs;
1.634 +#define MAX_ATTRS 24
1.635 + LocateAttr attrs[MAX_ATTRS];
1.636 + dbus_bool_t retval;
1.637 + int i;
1.638 +
1.639 + _dbus_assert (first_attribute_name != NULL);
1.640 + _dbus_assert (first_attribute_retloc != NULL);
1.641 +
1.642 + retval = TRUE;
1.643 +
1.644 + n_attrs = 1;
1.645 + attrs[0].name = first_attribute_name;
1.646 + attrs[0].retloc = first_attribute_retloc;
1.647 + *first_attribute_retloc = NULL;
1.648 +
1.649 + va_start (args, first_attribute_retloc);
1.650 +
1.651 + name = va_arg (args, const char*);
1.652 + retloc = va_arg (args, const char**);
1.653 +
1.654 + while (name != NULL)
1.655 + {
1.656 + _dbus_assert (retloc != NULL);
1.657 + _dbus_assert (n_attrs < MAX_ATTRS);
1.658 +
1.659 + attrs[n_attrs].name = name;
1.660 + attrs[n_attrs].retloc = retloc;
1.661 + n_attrs += 1;
1.662 + *retloc = NULL;
1.663 +
1.664 + name = va_arg (args, const char*);
1.665 + retloc = va_arg (args, const char**);
1.666 + }
1.667 +
1.668 + va_end (args);
1.669 +
1.670 + if (!retval)
1.671 + return retval;
1.672 +
1.673 + i = 0;
1.674 + while (attribute_names[i])
1.675 + {
1.676 + int j;
1.677 + dbus_bool_t found;
1.678 +
1.679 + found = FALSE;
1.680 + j = 0;
1.681 + while (j < n_attrs)
1.682 + {
1.683 + if (strcmp (attrs[j].name, attribute_names[i]) == 0)
1.684 + {
1.685 + retloc = attrs[j].retloc;
1.686 +
1.687 + if (*retloc != NULL)
1.688 + {
1.689 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.690 + "Attribute \"%s\" repeated twice on the same <%s> element",
1.691 + attrs[j].name, element_name);
1.692 + retval = FALSE;
1.693 + goto out;
1.694 + }
1.695 +
1.696 + *retloc = attribute_values[i];
1.697 + found = TRUE;
1.698 + }
1.699 +
1.700 + ++j;
1.701 + }
1.702 +
1.703 + if (!found)
1.704 + {
1.705 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.706 + "Attribute \"%s\" is invalid on <%s> element in this context",
1.707 + attribute_names[i], element_name);
1.708 + retval = FALSE;
1.709 + goto out;
1.710 + }
1.711 +
1.712 + ++i;
1.713 + }
1.714 +
1.715 + out:
1.716 + return retval;
1.717 +}
1.718 +
1.719 +static dbus_bool_t
1.720 +check_no_attributes (BusConfigParser *parser,
1.721 + const char *element_name,
1.722 + const char **attribute_names,
1.723 + const char **attribute_values,
1.724 + DBusError *error)
1.725 +{
1.726 + if (attribute_names[0] != NULL)
1.727 + {
1.728 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.729 + "Attribute \"%s\" is invalid on <%s> element in this context",
1.730 + attribute_names[0], element_name);
1.731 + return FALSE;
1.732 + }
1.733 +
1.734 + return TRUE;
1.735 +}
1.736 +
1.737 +static dbus_bool_t
1.738 +start_busconfig_child (BusConfigParser *parser,
1.739 + const char *element_name,
1.740 + const char **attribute_names,
1.741 + const char **attribute_values,
1.742 + DBusError *error)
1.743 +{
1.744 + if (strcmp (element_name, "user") == 0)
1.745 + {
1.746 + if (!check_no_attributes (parser, "user", attribute_names, attribute_values, error))
1.747 + return FALSE;
1.748 +
1.749 + if (push_element (parser, ELEMENT_USER) == NULL)
1.750 + {
1.751 + BUS_SET_OOM (error);
1.752 + return FALSE;
1.753 + }
1.754 +
1.755 + return TRUE;
1.756 + }
1.757 + else if (strcmp (element_name, "type") == 0)
1.758 + {
1.759 + if (!check_no_attributes (parser, "type", attribute_names, attribute_values, error))
1.760 + return FALSE;
1.761 +
1.762 + if (push_element (parser, ELEMENT_TYPE) == NULL)
1.763 + {
1.764 + BUS_SET_OOM (error);
1.765 + return FALSE;
1.766 + }
1.767 +
1.768 + return TRUE;
1.769 + }
1.770 + else if (strcmp (element_name, "fork") == 0)
1.771 + {
1.772 + if (!check_no_attributes (parser, "fork", attribute_names, attribute_values, error))
1.773 + return FALSE;
1.774 +
1.775 + if (push_element (parser, ELEMENT_FORK) == NULL)
1.776 + {
1.777 + BUS_SET_OOM (error);
1.778 + return FALSE;
1.779 + }
1.780 +
1.781 + parser->fork = TRUE;
1.782 +
1.783 + return TRUE;
1.784 + }
1.785 + else if (strcmp (element_name, "pidfile") == 0)
1.786 + {
1.787 + if (!check_no_attributes (parser, "pidfile", attribute_names, attribute_values, error))
1.788 + return FALSE;
1.789 +
1.790 + if (push_element (parser, ELEMENT_PIDFILE) == NULL)
1.791 + {
1.792 + BUS_SET_OOM (error);
1.793 + return FALSE;
1.794 + }
1.795 +
1.796 + return TRUE;
1.797 + }
1.798 + else if (strcmp (element_name, "listen") == 0)
1.799 + {
1.800 + if (!check_no_attributes (parser, "listen", attribute_names, attribute_values, error))
1.801 + return FALSE;
1.802 +
1.803 + if (push_element (parser, ELEMENT_LISTEN) == NULL)
1.804 + {
1.805 + BUS_SET_OOM (error);
1.806 + return FALSE;
1.807 + }
1.808 +
1.809 + return TRUE;
1.810 + }
1.811 + else if (strcmp (element_name, "auth") == 0)
1.812 + {
1.813 + if (!check_no_attributes (parser, "auth", attribute_names, attribute_values, error))
1.814 + return FALSE;
1.815 +
1.816 + if (push_element (parser, ELEMENT_AUTH) == NULL)
1.817 + {
1.818 + BUS_SET_OOM (error);
1.819 + return FALSE;
1.820 + }
1.821 +
1.822 + return TRUE;
1.823 + }
1.824 + else if (strcmp (element_name, "includedir") == 0)
1.825 + {
1.826 + if (!check_no_attributes (parser, "includedir", attribute_names, attribute_values, error))
1.827 + return FALSE;
1.828 +
1.829 + if (push_element (parser, ELEMENT_INCLUDEDIR) == NULL)
1.830 + {
1.831 + BUS_SET_OOM (error);
1.832 + return FALSE;
1.833 + }
1.834 +
1.835 + return TRUE;
1.836 + }
1.837 + else if (strcmp (element_name, "standard_session_servicedirs") == 0)
1.838 + {
1.839 + DBusList *link;
1.840 + DBusList *dirs;
1.841 + dirs = NULL;
1.842 +
1.843 + if (!check_no_attributes (parser, "standard_session_servicedirs", attribute_names, attribute_values, error))
1.844 + return FALSE;
1.845 +
1.846 + if (push_element (parser, ELEMENT_STANDARD_SESSION_SERVICEDIRS) == NULL)
1.847 + {
1.848 + BUS_SET_OOM (error);
1.849 + return FALSE;
1.850 + }
1.851 +
1.852 + if (!_dbus_get_standard_session_servicedirs (&dirs))
1.853 + {
1.854 + BUS_SET_OOM (error);
1.855 + return FALSE;
1.856 + }
1.857 +
1.858 + while ((link = _dbus_list_pop_first_link (&dirs)))
1.859 + service_dirs_append_link_unique_or_free (&parser->service_dirs, link);
1.860 +
1.861 + return TRUE;
1.862 + }
1.863 + else if (strcmp (element_name, "servicedir") == 0)
1.864 + {
1.865 + if (!check_no_attributes (parser, "servicedir", attribute_names, attribute_values, error))
1.866 + return FALSE;
1.867 +
1.868 + if (push_element (parser, ELEMENT_SERVICEDIR) == NULL)
1.869 + {
1.870 + BUS_SET_OOM (error);
1.871 + return FALSE;
1.872 + }
1.873 +
1.874 + return TRUE;
1.875 + }
1.876 + else if (strcmp (element_name, "include") == 0)
1.877 + {
1.878 + Element *e;
1.879 + const char *if_selinux_enabled;
1.880 + const char *ignore_missing;
1.881 + const char *selinux_root_relative;
1.882 +
1.883 + if ((e = push_element (parser, ELEMENT_INCLUDE)) == NULL)
1.884 + {
1.885 + BUS_SET_OOM (error);
1.886 + return FALSE;
1.887 + }
1.888 +
1.889 + e->d.include.ignore_missing = FALSE;
1.890 + e->d.include.if_selinux_enabled = FALSE;
1.891 + e->d.include.selinux_root_relative = FALSE;
1.892 +
1.893 + if (!locate_attributes (parser, "include",
1.894 + attribute_names,
1.895 + attribute_values,
1.896 + error,
1.897 + "ignore_missing", &ignore_missing,
1.898 + "if_selinux_enabled", &if_selinux_enabled,
1.899 + "selinux_root_relative", &selinux_root_relative,
1.900 + NULL))
1.901 + return FALSE;
1.902 +
1.903 + if (ignore_missing != NULL)
1.904 + {
1.905 + if (strcmp (ignore_missing, "yes") == 0)
1.906 + e->d.include.ignore_missing = TRUE;
1.907 + else if (strcmp (ignore_missing, "no") == 0)
1.908 + e->d.include.ignore_missing = FALSE;
1.909 + else
1.910 + {
1.911 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.912 + "ignore_missing attribute must have value \"yes\" or \"no\"");
1.913 + return FALSE;
1.914 + }
1.915 + }
1.916 +
1.917 + if (if_selinux_enabled != NULL)
1.918 + {
1.919 + if (strcmp (if_selinux_enabled, "yes") == 0)
1.920 + e->d.include.if_selinux_enabled = TRUE;
1.921 + else if (strcmp (if_selinux_enabled, "no") == 0)
1.922 + e->d.include.if_selinux_enabled = FALSE;
1.923 + else
1.924 + {
1.925 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.926 + "if_selinux_enabled attribute must have value"
1.927 + " \"yes\" or \"no\"");
1.928 + return FALSE;
1.929 + }
1.930 + }
1.931 +
1.932 + if (selinux_root_relative != NULL)
1.933 + {
1.934 + if (strcmp (selinux_root_relative, "yes") == 0)
1.935 + e->d.include.selinux_root_relative = TRUE;
1.936 + else if (strcmp (selinux_root_relative, "no") == 0)
1.937 + e->d.include.selinux_root_relative = FALSE;
1.938 + else
1.939 + {
1.940 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.941 + "selinux_root_relative attribute must have value"
1.942 + " \"yes\" or \"no\"");
1.943 + return FALSE;
1.944 + }
1.945 + }
1.946 +
1.947 + return TRUE;
1.948 + }
1.949 + else if (strcmp (element_name, "policy") == 0)
1.950 + {
1.951 + Element *e;
1.952 + const char *context;
1.953 + const char *user;
1.954 + const char *group;
1.955 + const char *at_console;
1.956 +
1.957 + if ((e = push_element (parser, ELEMENT_POLICY)) == NULL)
1.958 + {
1.959 + BUS_SET_OOM (error);
1.960 + return FALSE;
1.961 + }
1.962 +
1.963 + e->d.policy.type = POLICY_IGNORED;
1.964 +
1.965 + if (!locate_attributes (parser, "policy",
1.966 + attribute_names,
1.967 + attribute_values,
1.968 + error,
1.969 + "context", &context,
1.970 + "user", &user,
1.971 + "group", &group,
1.972 + "at_console", &at_console,
1.973 + NULL))
1.974 + return FALSE;
1.975 +
1.976 + if (((context && user) ||
1.977 + (context && group) ||
1.978 + (context && at_console)) ||
1.979 + ((user && group) ||
1.980 + (user && at_console)) ||
1.981 + (group && at_console) ||
1.982 + !(context || user || group || at_console))
1.983 + {
1.984 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.985 + "<policy> element must have exactly one of (context|user|group|at_console) attributes");
1.986 + return FALSE;
1.987 + }
1.988 +
1.989 + if (context != NULL)
1.990 + {
1.991 + if (strcmp (context, "default") == 0)
1.992 + {
1.993 + e->d.policy.type = POLICY_DEFAULT;
1.994 + }
1.995 + else if (strcmp (context, "mandatory") == 0)
1.996 + {
1.997 + e->d.policy.type = POLICY_MANDATORY;
1.998 + }
1.999 + else
1.1000 + {
1.1001 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1002 + "context attribute on <policy> must have the value \"default\" or \"mandatory\", not \"%s\"",
1.1003 + context);
1.1004 + return FALSE;
1.1005 + }
1.1006 + }
1.1007 + else if (user != NULL)
1.1008 + {
1.1009 + DBusString username;
1.1010 + _dbus_string_init_const (&username, user);
1.1011 +
1.1012 + if (_dbus_get_user_id (&username,
1.1013 + &e->d.policy.gid_uid_or_at_console))
1.1014 + e->d.policy.type = POLICY_USER;
1.1015 + else
1.1016 + _dbus_warn ("Unknown username \"%s\" in message bus configuration file\n",
1.1017 + user);
1.1018 + }
1.1019 + else if (group != NULL)
1.1020 + {
1.1021 + DBusString group_name;
1.1022 + _dbus_string_init_const (&group_name, group);
1.1023 +
1.1024 + if (_dbus_get_group_id (&group_name,
1.1025 + &e->d.policy.gid_uid_or_at_console))
1.1026 + e->d.policy.type = POLICY_GROUP;
1.1027 + else
1.1028 + _dbus_warn ("Unknown group \"%s\" in message bus configuration file\n",
1.1029 + group);
1.1030 + }
1.1031 + else if (at_console != NULL)
1.1032 + {
1.1033 + dbus_bool_t t;
1.1034 + t = (strcmp (at_console, "true") == 0);
1.1035 + if (t || strcmp (at_console, "false") == 0)
1.1036 + {
1.1037 + e->d.policy.gid_uid_or_at_console = t;
1.1038 + e->d.policy.type = POLICY_CONSOLE;
1.1039 + }
1.1040 + else
1.1041 + {
1.1042 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1043 + "Unknown value \"%s\" for at_console in message bus configuration file",
1.1044 + at_console);
1.1045 +
1.1046 + return FALSE;
1.1047 + }
1.1048 + }
1.1049 + else
1.1050 + {
1.1051 + _dbus_assert_not_reached ("all <policy> attributes null and we didn't set error");
1.1052 + }
1.1053 +
1.1054 + return TRUE;
1.1055 + }
1.1056 + else if (strcmp (element_name, "limit") == 0)
1.1057 + {
1.1058 + Element *e;
1.1059 + const char *name;
1.1060 +
1.1061 + if ((e = push_element (parser, ELEMENT_LIMIT)) == NULL)
1.1062 + {
1.1063 + BUS_SET_OOM (error);
1.1064 + return FALSE;
1.1065 + }
1.1066 +
1.1067 + if (!locate_attributes (parser, "limit",
1.1068 + attribute_names,
1.1069 + attribute_values,
1.1070 + error,
1.1071 + "name", &name,
1.1072 + NULL))
1.1073 + return FALSE;
1.1074 +
1.1075 + if (name == NULL)
1.1076 + {
1.1077 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1078 + "<limit> element must have a \"name\" attribute");
1.1079 + return FALSE;
1.1080 + }
1.1081 +
1.1082 + e->d.limit.name = _dbus_strdup (name);
1.1083 + if (e->d.limit.name == NULL)
1.1084 + {
1.1085 + BUS_SET_OOM (error);
1.1086 + return FALSE;
1.1087 + }
1.1088 +
1.1089 + return TRUE;
1.1090 + }
1.1091 + else if (strcmp (element_name, "selinux") == 0)
1.1092 + {
1.1093 + if (!check_no_attributes (parser, "selinux", attribute_names, attribute_values, error))
1.1094 + return FALSE;
1.1095 +
1.1096 + if (push_element (parser, ELEMENT_SELINUX) == NULL)
1.1097 + {
1.1098 + BUS_SET_OOM (error);
1.1099 + return FALSE;
1.1100 + }
1.1101 +
1.1102 + return TRUE;
1.1103 + }
1.1104 + else
1.1105 + {
1.1106 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1107 + "Element <%s> not allowed inside <%s> in configuration file",
1.1108 + element_name, "busconfig");
1.1109 + return FALSE;
1.1110 + }
1.1111 +}
1.1112 +
1.1113 +static dbus_bool_t
1.1114 +append_rule_from_element (BusConfigParser *parser,
1.1115 + const char *element_name,
1.1116 + const char **attribute_names,
1.1117 + const char **attribute_values,
1.1118 + dbus_bool_t allow,
1.1119 + DBusError *error)
1.1120 +{
1.1121 + const char *send_interface;
1.1122 + const char *send_member;
1.1123 + const char *send_error;
1.1124 + const char *send_destination;
1.1125 + const char *send_path;
1.1126 + const char *send_type;
1.1127 + const char *receive_interface;
1.1128 + const char *receive_member;
1.1129 + const char *receive_error;
1.1130 + const char *receive_sender;
1.1131 + const char *receive_path;
1.1132 + const char *receive_type;
1.1133 + const char *eavesdrop;
1.1134 + const char *send_requested_reply;
1.1135 + const char *receive_requested_reply;
1.1136 + const char *own;
1.1137 + const char *user;
1.1138 + const char *group;
1.1139 +
1.1140 + BusPolicyRule *rule;
1.1141 +
1.1142 + if (!locate_attributes (parser, element_name,
1.1143 + attribute_names,
1.1144 + attribute_values,
1.1145 + error,
1.1146 + "send_interface", &send_interface,
1.1147 + "send_member", &send_member,
1.1148 + "send_error", &send_error,
1.1149 + "send_destination", &send_destination,
1.1150 + "send_path", &send_path,
1.1151 + "send_type", &send_type,
1.1152 + "receive_interface", &receive_interface,
1.1153 + "receive_member", &receive_member,
1.1154 + "receive_error", &receive_error,
1.1155 + "receive_sender", &receive_sender,
1.1156 + "receive_path", &receive_path,
1.1157 + "receive_type", &receive_type,
1.1158 + "eavesdrop", &eavesdrop,
1.1159 + "send_requested_reply", &send_requested_reply,
1.1160 + "receive_requested_reply", &receive_requested_reply,
1.1161 + "own", &own,
1.1162 + "user", &user,
1.1163 + "group", &group,
1.1164 + NULL))
1.1165 + return FALSE;
1.1166 +
1.1167 + if (!(send_interface || send_member || send_error || send_destination ||
1.1168 + send_type || send_path ||
1.1169 + receive_interface || receive_member || receive_error || receive_sender ||
1.1170 + receive_type || receive_path || eavesdrop ||
1.1171 + send_requested_reply || receive_requested_reply ||
1.1172 + own || user || group))
1.1173 + {
1.1174 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1175 + "Element <%s> must have one or more attributes",
1.1176 + element_name);
1.1177 + return FALSE;
1.1178 + }
1.1179 +
1.1180 + if ((send_member && (send_interface == NULL && send_path == NULL)) ||
1.1181 + (receive_member && (receive_interface == NULL && receive_path == NULL)))
1.1182 + {
1.1183 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1184 + "On element <%s>, if you specify a member you must specify an interface or a path. Keep in mind that not all messages have an interface field.",
1.1185 + element_name);
1.1186 + return FALSE;
1.1187 + }
1.1188 +
1.1189 + /* Allowed combinations of elements are:
1.1190 + *
1.1191 + * base, must be all send or all receive:
1.1192 + * nothing
1.1193 + * interface
1.1194 + * interface + member
1.1195 + * error
1.1196 + *
1.1197 + * base send_ can combine with send_destination, send_path, send_type, send_requested_reply
1.1198 + * base receive_ with receive_sender, receive_path, receive_type, receive_requested_reply, eavesdrop
1.1199 + *
1.1200 + * user, group, own must occur alone
1.1201 + *
1.1202 + * Pretty sure the below stuff is broken, FIXME think about it more.
1.1203 + */
1.1204 +
1.1205 + if (((send_interface && send_error) ||
1.1206 + (send_interface && receive_interface) ||
1.1207 + (send_interface && receive_member) ||
1.1208 + (send_interface && receive_error) ||
1.1209 + (send_interface && receive_sender) ||
1.1210 + (send_interface && eavesdrop) ||
1.1211 + (send_interface && receive_requested_reply) ||
1.1212 + (send_interface && own) ||
1.1213 + (send_interface && user) ||
1.1214 + (send_interface && group)) ||
1.1215 +
1.1216 + ((send_member && send_error) ||
1.1217 + (send_member && receive_interface) ||
1.1218 + (send_member && receive_member) ||
1.1219 + (send_member && receive_error) ||
1.1220 + (send_member && receive_sender) ||
1.1221 + (send_member && eavesdrop) ||
1.1222 + (send_member && receive_requested_reply) ||
1.1223 + (send_member && own) ||
1.1224 + (send_member && user) ||
1.1225 + (send_member && group)) ||
1.1226 +
1.1227 + ((send_error && receive_interface) ||
1.1228 + (send_error && receive_member) ||
1.1229 + (send_error && receive_error) ||
1.1230 + (send_error && receive_sender) ||
1.1231 + (send_error && eavesdrop) ||
1.1232 + (send_error && receive_requested_reply) ||
1.1233 + (send_error && own) ||
1.1234 + (send_error && user) ||
1.1235 + (send_error && group)) ||
1.1236 +
1.1237 + ((send_destination && receive_interface) ||
1.1238 + (send_destination && receive_member) ||
1.1239 + (send_destination && receive_error) ||
1.1240 + (send_destination && receive_sender) ||
1.1241 + (send_destination && eavesdrop) ||
1.1242 + (send_destination && receive_requested_reply) ||
1.1243 + (send_destination && own) ||
1.1244 + (send_destination && user) ||
1.1245 + (send_destination && group)) ||
1.1246 +
1.1247 + ((send_type && receive_interface) ||
1.1248 + (send_type && receive_member) ||
1.1249 + (send_type && receive_error) ||
1.1250 + (send_type && receive_sender) ||
1.1251 + (send_type && eavesdrop) ||
1.1252 + (send_type && receive_requested_reply) ||
1.1253 + (send_type && own) ||
1.1254 + (send_type && user) ||
1.1255 + (send_type && group)) ||
1.1256 +
1.1257 + ((send_path && receive_interface) ||
1.1258 + (send_path && receive_member) ||
1.1259 + (send_path && receive_error) ||
1.1260 + (send_path && receive_sender) ||
1.1261 + (send_path && eavesdrop) ||
1.1262 + (send_path && receive_requested_reply) ||
1.1263 + (send_path && own) ||
1.1264 + (send_path && user) ||
1.1265 + (send_path && group)) ||
1.1266 +
1.1267 + ((send_requested_reply && receive_interface) ||
1.1268 + (send_requested_reply && receive_member) ||
1.1269 + (send_requested_reply && receive_error) ||
1.1270 + (send_requested_reply && receive_sender) ||
1.1271 + (send_requested_reply && eavesdrop) ||
1.1272 + (send_requested_reply && receive_requested_reply) ||
1.1273 + (send_requested_reply && own) ||
1.1274 + (send_requested_reply && user) ||
1.1275 + (send_requested_reply && group)) ||
1.1276 +
1.1277 + ((receive_interface && receive_error) ||
1.1278 + (receive_interface && own) ||
1.1279 + (receive_interface && user) ||
1.1280 + (receive_interface && group)) ||
1.1281 +
1.1282 + ((receive_member && receive_error) ||
1.1283 + (receive_member && own) ||
1.1284 + (receive_member && user) ||
1.1285 + (receive_member && group)) ||
1.1286 +
1.1287 + ((receive_error && own) ||
1.1288 + (receive_error && user) ||
1.1289 + (receive_error && group)) ||
1.1290 +
1.1291 + ((eavesdrop && own) ||
1.1292 + (eavesdrop && user) ||
1.1293 + (eavesdrop && group)) ||
1.1294 +
1.1295 + ((receive_requested_reply && own) ||
1.1296 + (receive_requested_reply && user) ||
1.1297 + (receive_requested_reply && group)) ||
1.1298 +
1.1299 + ((own && user) ||
1.1300 + (own && group)) ||
1.1301 +
1.1302 + ((user && group)))
1.1303 + {
1.1304 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1305 + "Invalid combination of attributes on element <%s>",
1.1306 + element_name);
1.1307 + return FALSE;
1.1308 + }
1.1309 +
1.1310 + rule = NULL;
1.1311 +
1.1312 + /* In BusPolicyRule, NULL represents wildcard.
1.1313 + * In the config file, '*' represents it.
1.1314 + */
1.1315 +#define IS_WILDCARD(str) ((str) && ((str)[0]) == '*' && ((str)[1]) == '\0')
1.1316 +
1.1317 + if (send_interface || send_member || send_error || send_destination ||
1.1318 + send_path || send_type || send_requested_reply)
1.1319 + {
1.1320 + int message_type;
1.1321 +
1.1322 + if (IS_WILDCARD (send_interface))
1.1323 + send_interface = NULL;
1.1324 + if (IS_WILDCARD (send_member))
1.1325 + send_member = NULL;
1.1326 + if (IS_WILDCARD (send_error))
1.1327 + send_error = NULL;
1.1328 + if (IS_WILDCARD (send_destination))
1.1329 + send_destination = NULL;
1.1330 + if (IS_WILDCARD (send_path))
1.1331 + send_path = NULL;
1.1332 + if (IS_WILDCARD (send_type))
1.1333 + send_type = NULL;
1.1334 +
1.1335 + message_type = DBUS_MESSAGE_TYPE_INVALID;
1.1336 + if (send_type != NULL)
1.1337 + {
1.1338 + message_type = dbus_message_type_from_string (send_type);
1.1339 + if (message_type == DBUS_MESSAGE_TYPE_INVALID)
1.1340 + {
1.1341 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1342 + "Bad message type \"%s\"",
1.1343 + send_type);
1.1344 + return FALSE;
1.1345 + }
1.1346 + }
1.1347 +
1.1348 + if (send_requested_reply &&
1.1349 + !(strcmp (send_requested_reply, "true") == 0 ||
1.1350 + strcmp (send_requested_reply, "false") == 0))
1.1351 + {
1.1352 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1353 + "Bad value \"%s\" for %s attribute, must be true or false",
1.1354 + "send_requested_reply", send_requested_reply);
1.1355 + return FALSE;
1.1356 + }
1.1357 +
1.1358 + rule = bus_policy_rule_new (BUS_POLICY_RULE_SEND, allow);
1.1359 + if (rule == NULL)
1.1360 + goto nomem;
1.1361 +
1.1362 + if (send_requested_reply)
1.1363 + rule->d.send.requested_reply = (strcmp (send_requested_reply, "true") == 0);
1.1364 +
1.1365 + rule->d.send.message_type = message_type;
1.1366 + rule->d.send.path = _dbus_strdup (send_path);
1.1367 + rule->d.send.interface = _dbus_strdup (send_interface);
1.1368 + rule->d.send.member = _dbus_strdup (send_member);
1.1369 + rule->d.send.error = _dbus_strdup (send_error);
1.1370 + rule->d.send.destination = _dbus_strdup (send_destination);
1.1371 + if (send_path && rule->d.send.path == NULL)
1.1372 + goto nomem;
1.1373 + if (send_interface && rule->d.send.interface == NULL)
1.1374 + goto nomem;
1.1375 + if (send_member && rule->d.send.member == NULL)
1.1376 + goto nomem;
1.1377 + if (send_error && rule->d.send.error == NULL)
1.1378 + goto nomem;
1.1379 + if (send_destination && rule->d.send.destination == NULL)
1.1380 + goto nomem;
1.1381 + }
1.1382 + else if (receive_interface || receive_member || receive_error || receive_sender ||
1.1383 + receive_path || receive_type || eavesdrop || receive_requested_reply)
1.1384 + {
1.1385 + int message_type;
1.1386 +
1.1387 + if (IS_WILDCARD (receive_interface))
1.1388 + receive_interface = NULL;
1.1389 + if (IS_WILDCARD (receive_member))
1.1390 + receive_member = NULL;
1.1391 + if (IS_WILDCARD (receive_error))
1.1392 + receive_error = NULL;
1.1393 + if (IS_WILDCARD (receive_sender))
1.1394 + receive_sender = NULL;
1.1395 + if (IS_WILDCARD (receive_path))
1.1396 + receive_path = NULL;
1.1397 + if (IS_WILDCARD (receive_type))
1.1398 + receive_type = NULL;
1.1399 +
1.1400 + message_type = DBUS_MESSAGE_TYPE_INVALID;
1.1401 + if (receive_type != NULL)
1.1402 + {
1.1403 + message_type = dbus_message_type_from_string (receive_type);
1.1404 + if (message_type == DBUS_MESSAGE_TYPE_INVALID)
1.1405 + {
1.1406 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1407 + "Bad message type \"%s\"",
1.1408 + receive_type);
1.1409 + return FALSE;
1.1410 + }
1.1411 + }
1.1412 +
1.1413 +
1.1414 + if (eavesdrop &&
1.1415 + !(strcmp (eavesdrop, "true") == 0 ||
1.1416 + strcmp (eavesdrop, "false") == 0))
1.1417 + {
1.1418 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1419 + "Bad value \"%s\" for %s attribute, must be true or false",
1.1420 + "eavesdrop", eavesdrop);
1.1421 + return FALSE;
1.1422 + }
1.1423 +
1.1424 + if (receive_requested_reply &&
1.1425 + !(strcmp (receive_requested_reply, "true") == 0 ||
1.1426 + strcmp (receive_requested_reply, "false") == 0))
1.1427 + {
1.1428 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1429 + "Bad value \"%s\" for %s attribute, must be true or false",
1.1430 + "receive_requested_reply", receive_requested_reply);
1.1431 + return FALSE;
1.1432 + }
1.1433 +
1.1434 + rule = bus_policy_rule_new (BUS_POLICY_RULE_RECEIVE, allow);
1.1435 + if (rule == NULL)
1.1436 + goto nomem;
1.1437 +
1.1438 + if (eavesdrop)
1.1439 + rule->d.receive.eavesdrop = (strcmp (eavesdrop, "true") == 0);
1.1440 +
1.1441 + if (receive_requested_reply)
1.1442 + rule->d.receive.requested_reply = (strcmp (receive_requested_reply, "true") == 0);
1.1443 +
1.1444 + rule->d.receive.message_type = message_type;
1.1445 + rule->d.receive.path = _dbus_strdup (receive_path);
1.1446 + rule->d.receive.interface = _dbus_strdup (receive_interface);
1.1447 + rule->d.receive.member = _dbus_strdup (receive_member);
1.1448 + rule->d.receive.error = _dbus_strdup (receive_error);
1.1449 + rule->d.receive.origin = _dbus_strdup (receive_sender);
1.1450 +
1.1451 + if (receive_path && rule->d.receive.path == NULL)
1.1452 + goto nomem;
1.1453 + if (receive_interface && rule->d.receive.interface == NULL)
1.1454 + goto nomem;
1.1455 + if (receive_member && rule->d.receive.member == NULL)
1.1456 + goto nomem;
1.1457 + if (receive_error && rule->d.receive.error == NULL)
1.1458 + goto nomem;
1.1459 + if (receive_sender && rule->d.receive.origin == NULL)
1.1460 + goto nomem;
1.1461 + }
1.1462 + else if (own)
1.1463 + {
1.1464 + rule = bus_policy_rule_new (BUS_POLICY_RULE_OWN, allow);
1.1465 + if (rule == NULL)
1.1466 + goto nomem;
1.1467 +
1.1468 + if (IS_WILDCARD (own))
1.1469 + own = NULL;
1.1470 +
1.1471 + rule->d.own.service_name = _dbus_strdup (own);
1.1472 + if (own && rule->d.own.service_name == NULL)
1.1473 + goto nomem;
1.1474 + }
1.1475 + else if (user)
1.1476 + {
1.1477 + if (IS_WILDCARD (user))
1.1478 + {
1.1479 + rule = bus_policy_rule_new (BUS_POLICY_RULE_USER, allow);
1.1480 + if (rule == NULL)
1.1481 + goto nomem;
1.1482 +
1.1483 + rule->d.user.uid = DBUS_UID_UNSET;
1.1484 + }
1.1485 + else
1.1486 + {
1.1487 + DBusString username;
1.1488 + dbus_uid_t uid;
1.1489 +
1.1490 + _dbus_string_init_const (&username, user);
1.1491 +
1.1492 + if (_dbus_get_user_id (&username, &uid))
1.1493 + {
1.1494 + rule = bus_policy_rule_new (BUS_POLICY_RULE_USER, allow);
1.1495 + if (rule == NULL)
1.1496 + goto nomem;
1.1497 +
1.1498 + rule->d.user.uid = uid;
1.1499 + }
1.1500 + else
1.1501 + {
1.1502 + _dbus_warn ("Unknown username \"%s\" on element <%s>\n",
1.1503 + user, element_name);
1.1504 + }
1.1505 + }
1.1506 + }
1.1507 + else if (group)
1.1508 + {
1.1509 + if (IS_WILDCARD (group))
1.1510 + {
1.1511 + rule = bus_policy_rule_new (BUS_POLICY_RULE_GROUP, allow);
1.1512 + if (rule == NULL)
1.1513 + goto nomem;
1.1514 +
1.1515 + rule->d.group.gid = DBUS_GID_UNSET;
1.1516 + }
1.1517 + else
1.1518 + {
1.1519 + DBusString groupname;
1.1520 + dbus_gid_t gid;
1.1521 +
1.1522 + _dbus_string_init_const (&groupname, group);
1.1523 +
1.1524 + if (_dbus_get_user_id (&groupname, &gid))
1.1525 + {
1.1526 + rule = bus_policy_rule_new (BUS_POLICY_RULE_GROUP, allow);
1.1527 + if (rule == NULL)
1.1528 + goto nomem;
1.1529 +
1.1530 + rule->d.group.gid = gid;
1.1531 + }
1.1532 + else
1.1533 + {
1.1534 + _dbus_warn ("Unknown group \"%s\" on element <%s>\n",
1.1535 + group, element_name);
1.1536 + }
1.1537 + }
1.1538 + }
1.1539 + else
1.1540 + _dbus_assert_not_reached ("Did not handle some combination of attributes on <allow> or <deny>");
1.1541 +
1.1542 + if (rule != NULL)
1.1543 + {
1.1544 + Element *pe;
1.1545 +
1.1546 + pe = peek_element (parser);
1.1547 + _dbus_assert (pe != NULL);
1.1548 + _dbus_assert (pe->type == ELEMENT_POLICY);
1.1549 +
1.1550 + switch (pe->d.policy.type)
1.1551 + {
1.1552 + case POLICY_IGNORED:
1.1553 + /* drop the rule on the floor */
1.1554 + break;
1.1555 +
1.1556 + case POLICY_DEFAULT:
1.1557 + if (!bus_policy_append_default_rule (parser->policy, rule))
1.1558 + goto nomem;
1.1559 + break;
1.1560 + case POLICY_MANDATORY:
1.1561 + if (!bus_policy_append_mandatory_rule (parser->policy, rule))
1.1562 + goto nomem;
1.1563 + break;
1.1564 + case POLICY_USER:
1.1565 + if (!BUS_POLICY_RULE_IS_PER_CLIENT (rule))
1.1566 + {
1.1567 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1568 + "<%s> rule cannot be per-user because it has bus-global semantics",
1.1569 + element_name);
1.1570 + goto failed;
1.1571 + }
1.1572 +
1.1573 + if (!bus_policy_append_user_rule (parser->policy, pe->d.policy.gid_uid_or_at_console,
1.1574 + rule))
1.1575 + goto nomem;
1.1576 + break;
1.1577 + case POLICY_GROUP:
1.1578 + if (!BUS_POLICY_RULE_IS_PER_CLIENT (rule))
1.1579 + {
1.1580 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1581 + "<%s> rule cannot be per-group because it has bus-global semantics",
1.1582 + element_name);
1.1583 + goto failed;
1.1584 + }
1.1585 +
1.1586 + if (!bus_policy_append_group_rule (parser->policy, pe->d.policy.gid_uid_or_at_console,
1.1587 + rule))
1.1588 + goto nomem;
1.1589 + break;
1.1590 +
1.1591 +
1.1592 + case POLICY_CONSOLE:
1.1593 + if (!bus_policy_append_console_rule (parser->policy, pe->d.policy.gid_uid_or_at_console,
1.1594 + rule))
1.1595 + goto nomem;
1.1596 + break;
1.1597 + }
1.1598 +
1.1599 + bus_policy_rule_unref (rule);
1.1600 + rule = NULL;
1.1601 + }
1.1602 +
1.1603 + return TRUE;
1.1604 +
1.1605 + nomem:
1.1606 + BUS_SET_OOM (error);
1.1607 + failed:
1.1608 + if (rule)
1.1609 + bus_policy_rule_unref (rule);
1.1610 + return FALSE;
1.1611 +}
1.1612 +
1.1613 +static dbus_bool_t
1.1614 +start_policy_child (BusConfigParser *parser,
1.1615 + const char *element_name,
1.1616 + const char **attribute_names,
1.1617 + const char **attribute_values,
1.1618 + DBusError *error)
1.1619 +{
1.1620 + if (strcmp (element_name, "allow") == 0)
1.1621 + {
1.1622 + if (!append_rule_from_element (parser, element_name,
1.1623 + attribute_names, attribute_values,
1.1624 + TRUE, error))
1.1625 + return FALSE;
1.1626 +
1.1627 + if (push_element (parser, ELEMENT_ALLOW) == NULL)
1.1628 + {
1.1629 + BUS_SET_OOM (error);
1.1630 + return FALSE;
1.1631 + }
1.1632 +
1.1633 + return TRUE;
1.1634 + }
1.1635 + else if (strcmp (element_name, "deny") == 0)
1.1636 + {
1.1637 + if (!append_rule_from_element (parser, element_name,
1.1638 + attribute_names, attribute_values,
1.1639 + FALSE, error))
1.1640 + return FALSE;
1.1641 +
1.1642 + if (push_element (parser, ELEMENT_DENY) == NULL)
1.1643 + {
1.1644 + BUS_SET_OOM (error);
1.1645 + return FALSE;
1.1646 + }
1.1647 +
1.1648 + return TRUE;
1.1649 + }
1.1650 + else
1.1651 + {
1.1652 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1653 + "Element <%s> not allowed inside <%s> in configuration file",
1.1654 + element_name, "policy");
1.1655 + return FALSE;
1.1656 + }
1.1657 +}
1.1658 +
1.1659 +static dbus_bool_t
1.1660 +start_selinux_child (BusConfigParser *parser,
1.1661 + const char *element_name,
1.1662 + const char **attribute_names,
1.1663 + const char **attribute_values,
1.1664 + DBusError *error)
1.1665 +{
1.1666 + char *own_copy;
1.1667 + char *context_copy;
1.1668 +
1.1669 + own_copy = NULL;
1.1670 + context_copy = NULL;
1.1671 +
1.1672 + if (strcmp (element_name, "associate") == 0)
1.1673 + {
1.1674 + const char *own;
1.1675 + const char *context;
1.1676 +
1.1677 + if (!locate_attributes (parser, "associate",
1.1678 + attribute_names,
1.1679 + attribute_values,
1.1680 + error,
1.1681 + "own", &own,
1.1682 + "context", &context,
1.1683 + NULL))
1.1684 + return FALSE;
1.1685 +
1.1686 + if (push_element (parser, ELEMENT_ASSOCIATE) == NULL)
1.1687 + {
1.1688 + BUS_SET_OOM (error);
1.1689 + return FALSE;
1.1690 + }
1.1691 +
1.1692 + if (own == NULL || context == NULL)
1.1693 + {
1.1694 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1695 + "Element <associate> must have attributes own=\"<servicename>\" and context=\"<selinux context>\"");
1.1696 + return FALSE;
1.1697 + }
1.1698 +
1.1699 + own_copy = _dbus_strdup (own);
1.1700 + if (own_copy == NULL)
1.1701 + goto oom;
1.1702 + context_copy = _dbus_strdup (context);
1.1703 + if (context_copy == NULL)
1.1704 + goto oom;
1.1705 +
1.1706 + if (!_dbus_hash_table_insert_string (parser->service_context_table,
1.1707 + own_copy, context_copy))
1.1708 + goto oom;
1.1709 +
1.1710 + return TRUE;
1.1711 + }
1.1712 + else
1.1713 + {
1.1714 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1715 + "Element <%s> not allowed inside <%s> in configuration file",
1.1716 + element_name, "selinux");
1.1717 + return FALSE;
1.1718 + }
1.1719 +
1.1720 + oom:
1.1721 + if (own_copy)
1.1722 + dbus_free (own_copy);
1.1723 +
1.1724 + if (context_copy)
1.1725 + dbus_free (context_copy);
1.1726 +
1.1727 + BUS_SET_OOM (error);
1.1728 + return FALSE;
1.1729 +}
1.1730 +
1.1731 +dbus_bool_t
1.1732 +bus_config_parser_start_element (BusConfigParser *parser,
1.1733 + const char *element_name,
1.1734 + const char **attribute_names,
1.1735 + const char **attribute_values,
1.1736 + DBusError *error)
1.1737 +{
1.1738 + ElementType t;
1.1739 +
1.1740 + _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1.1741 +
1.1742 + /* printf ("START: %s\n", element_name); */
1.1743 +
1.1744 + t = top_element_type (parser);
1.1745 +
1.1746 + if (t == ELEMENT_NONE)
1.1747 + {
1.1748 + if (strcmp (element_name, "busconfig") == 0)
1.1749 + {
1.1750 + if (!check_no_attributes (parser, "busconfig", attribute_names, attribute_values, error))
1.1751 + return FALSE;
1.1752 +
1.1753 + if (push_element (parser, ELEMENT_BUSCONFIG) == NULL)
1.1754 + {
1.1755 + BUS_SET_OOM (error);
1.1756 + return FALSE;
1.1757 + }
1.1758 +
1.1759 + return TRUE;
1.1760 + }
1.1761 + else
1.1762 + {
1.1763 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1764 + "Unknown element <%s> at root of configuration file",
1.1765 + element_name);
1.1766 + return FALSE;
1.1767 + }
1.1768 + }
1.1769 + else if (t == ELEMENT_BUSCONFIG)
1.1770 + {
1.1771 + return start_busconfig_child (parser, element_name,
1.1772 + attribute_names, attribute_values,
1.1773 + error);
1.1774 + }
1.1775 + else if (t == ELEMENT_POLICY)
1.1776 + {
1.1777 + return start_policy_child (parser, element_name,
1.1778 + attribute_names, attribute_values,
1.1779 + error);
1.1780 + }
1.1781 + else if (t == ELEMENT_SELINUX)
1.1782 + {
1.1783 + return start_selinux_child (parser, element_name,
1.1784 + attribute_names, attribute_values,
1.1785 + error);
1.1786 + }
1.1787 + else
1.1788 + {
1.1789 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1790 + "Element <%s> is not allowed in this context",
1.1791 + element_name);
1.1792 + return FALSE;
1.1793 + }
1.1794 +}
1.1795 +
1.1796 +static dbus_bool_t
1.1797 +set_limit (BusConfigParser *parser,
1.1798 + const char *name,
1.1799 + long value,
1.1800 + DBusError *error)
1.1801 +{
1.1802 + dbus_bool_t must_be_positive;
1.1803 + dbus_bool_t must_be_int;
1.1804 +
1.1805 + must_be_int = FALSE;
1.1806 + must_be_positive = FALSE;
1.1807 +
1.1808 + if (strcmp (name, "max_incoming_bytes") == 0)
1.1809 + {
1.1810 + must_be_positive = TRUE;
1.1811 + parser->limits.max_incoming_bytes = value;
1.1812 + }
1.1813 + else if (strcmp (name, "max_outgoing_bytes") == 0)
1.1814 + {
1.1815 + must_be_positive = TRUE;
1.1816 + parser->limits.max_outgoing_bytes = value;
1.1817 + }
1.1818 + else if (strcmp (name, "max_message_size") == 0)
1.1819 + {
1.1820 + must_be_positive = TRUE;
1.1821 + parser->limits.max_message_size = value;
1.1822 + }
1.1823 + else if (strcmp (name, "service_start_timeout") == 0)
1.1824 + {
1.1825 + must_be_positive = TRUE;
1.1826 + must_be_int = TRUE;
1.1827 + parser->limits.activation_timeout = value;
1.1828 + }
1.1829 + else if (strcmp (name, "auth_timeout") == 0)
1.1830 + {
1.1831 + must_be_positive = TRUE;
1.1832 + must_be_int = TRUE;
1.1833 + parser->limits.auth_timeout = value;
1.1834 + }
1.1835 + else if (strcmp (name, "reply_timeout") == 0)
1.1836 + {
1.1837 + must_be_positive = TRUE;
1.1838 + must_be_int = TRUE;
1.1839 + parser->limits.reply_timeout = value;
1.1840 + }
1.1841 + else if (strcmp (name, "max_completed_connections") == 0)
1.1842 + {
1.1843 + must_be_positive = TRUE;
1.1844 + must_be_int = TRUE;
1.1845 + parser->limits.max_completed_connections = value;
1.1846 + }
1.1847 + else if (strcmp (name, "max_incomplete_connections") == 0)
1.1848 + {
1.1849 + must_be_positive = TRUE;
1.1850 + must_be_int = TRUE;
1.1851 + parser->limits.max_incomplete_connections = value;
1.1852 + }
1.1853 + else if (strcmp (name, "max_connections_per_user") == 0)
1.1854 + {
1.1855 + must_be_positive = TRUE;
1.1856 + must_be_int = TRUE;
1.1857 + parser->limits.max_connections_per_user = value;
1.1858 + }
1.1859 + else if (strcmp (name, "max_pending_service_starts") == 0)
1.1860 + {
1.1861 + must_be_positive = TRUE;
1.1862 + must_be_int = TRUE;
1.1863 + parser->limits.max_pending_activations = value;
1.1864 + }
1.1865 + else if (strcmp (name, "max_names_per_connection") == 0)
1.1866 + {
1.1867 + must_be_positive = TRUE;
1.1868 + must_be_int = TRUE;
1.1869 + parser->limits.max_services_per_connection = value;
1.1870 + }
1.1871 + else if (strcmp (name, "max_match_rules_per_connection") == 0)
1.1872 + {
1.1873 + must_be_positive = TRUE;
1.1874 + must_be_int = TRUE;
1.1875 + parser->limits.max_match_rules_per_connection = value;
1.1876 + }
1.1877 + else if (strcmp (name, "max_replies_per_connection") == 0)
1.1878 + {
1.1879 + must_be_positive = TRUE;
1.1880 + must_be_int = TRUE;
1.1881 + parser->limits.max_replies_per_connection = value;
1.1882 + }
1.1883 + else
1.1884 + {
1.1885 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1886 + "There is no limit called \"%s\"\n",
1.1887 + name);
1.1888 + return FALSE;
1.1889 + }
1.1890 +
1.1891 + if (must_be_positive && value < 0)
1.1892 + {
1.1893 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1894 + "<limit name=\"%s\"> must be a positive number\n",
1.1895 + name);
1.1896 + return FALSE;
1.1897 + }
1.1898 +
1.1899 + if (must_be_int &&
1.1900 + (value < _DBUS_INT_MIN || value > _DBUS_INT_MAX))
1.1901 + {
1.1902 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1903 + "<limit name=\"%s\"> value is too large\n",
1.1904 + name);
1.1905 + return FALSE;
1.1906 + }
1.1907 +
1.1908 + return TRUE;
1.1909 +}
1.1910 +
1.1911 +dbus_bool_t
1.1912 +bus_config_parser_end_element (BusConfigParser *parser,
1.1913 + const char *element_name,
1.1914 + DBusError *error)
1.1915 +{
1.1916 + ElementType t;
1.1917 + const char *n;
1.1918 + Element *e;
1.1919 +
1.1920 + _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1.1921 +
1.1922 + /* printf ("END: %s\n", element_name); */
1.1923 +
1.1924 + t = top_element_type (parser);
1.1925 +
1.1926 + if (t == ELEMENT_NONE)
1.1927 + {
1.1928 + /* should probably be an assertion failure but
1.1929 + * being paranoid about XML parsers
1.1930 + */
1.1931 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1932 + "XML parser ended element with no element on the stack");
1.1933 + return FALSE;
1.1934 + }
1.1935 +
1.1936 + n = element_type_to_name (t);
1.1937 + _dbus_assert (n != NULL);
1.1938 + if (strcmp (n, element_name) != 0)
1.1939 + {
1.1940 + /* should probably be an assertion failure but
1.1941 + * being paranoid about XML parsers
1.1942 + */
1.1943 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1944 + "XML element <%s> ended but topmost element on the stack was <%s>",
1.1945 + element_name, n);
1.1946 + return FALSE;
1.1947 + }
1.1948 +
1.1949 + e = peek_element (parser);
1.1950 + _dbus_assert (e != NULL);
1.1951 +
1.1952 + switch (e->type)
1.1953 + {
1.1954 + case ELEMENT_NONE:
1.1955 + _dbus_assert_not_reached ("element in stack has no type");
1.1956 + break;
1.1957 +
1.1958 + case ELEMENT_INCLUDE:
1.1959 + case ELEMENT_USER:
1.1960 + case ELEMENT_TYPE:
1.1961 + case ELEMENT_LISTEN:
1.1962 + case ELEMENT_PIDFILE:
1.1963 + case ELEMENT_AUTH:
1.1964 + case ELEMENT_SERVICEDIR:
1.1965 + case ELEMENT_INCLUDEDIR:
1.1966 + case ELEMENT_LIMIT:
1.1967 + if (!e->had_content)
1.1968 + {
1.1969 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.1970 + "XML element <%s> was expected to have content inside it",
1.1971 + element_type_to_name (e->type));
1.1972 + return FALSE;
1.1973 + }
1.1974 +
1.1975 + if (e->type == ELEMENT_LIMIT)
1.1976 + {
1.1977 + if (!set_limit (parser, e->d.limit.name, e->d.limit.value,
1.1978 + error))
1.1979 + return FALSE;
1.1980 + }
1.1981 + break;
1.1982 +
1.1983 + case ELEMENT_BUSCONFIG:
1.1984 + case ELEMENT_POLICY:
1.1985 + case ELEMENT_ALLOW:
1.1986 + case ELEMENT_DENY:
1.1987 + case ELEMENT_FORK:
1.1988 + case ELEMENT_SELINUX:
1.1989 + case ELEMENT_ASSOCIATE:
1.1990 + case ELEMENT_STANDARD_SESSION_SERVICEDIRS:
1.1991 + break;
1.1992 + }
1.1993 +
1.1994 + pop_element (parser);
1.1995 +
1.1996 + return TRUE;
1.1997 +}
1.1998 +
1.1999 +static dbus_bool_t
1.2000 +all_whitespace (const DBusString *str)
1.2001 +{
1.2002 + int i;
1.2003 +
1.2004 + _dbus_string_skip_white (str, 0, &i);
1.2005 +
1.2006 + return i == _dbus_string_get_length (str);
1.2007 +}
1.2008 +
1.2009 +static dbus_bool_t
1.2010 +make_full_path (const DBusString *basedir,
1.2011 + const DBusString *filename,
1.2012 + DBusString *full_path)
1.2013 +{
1.2014 +#ifndef __SYMBIAN32__
1.2015 + if (_dbus_path_is_absolute (filename))
1.2016 + {
1.2017 + return _dbus_string_copy (filename, 0, full_path, 0);
1.2018 + }
1.2019 + else
1.2020 + {
1.2021 + if (!_dbus_string_copy (basedir, 0, full_path, 0))
1.2022 + return FALSE;
1.2023 +
1.2024 + if (!_dbus_concat_dir_and_file (full_path, filename))
1.2025 + return FALSE;
1.2026 +
1.2027 + return TRUE;
1.2028 + }
1.2029 +#else
1.2030 + // always give absolute path in config files on symbian
1.2031 + return _dbus_string_copy (filename, 0, full_path, 0);
1.2032 +#endif
1.2033 +}
1.2034 +
1.2035 +static dbus_bool_t
1.2036 +include_file (BusConfigParser *parser,
1.2037 + const DBusString *filename,
1.2038 + dbus_bool_t ignore_missing,
1.2039 + DBusError *error)
1.2040 +{
1.2041 + /* FIXME good test case for this would load each config file in the
1.2042 + * test suite both alone, and as an include, and check
1.2043 + * that the result is the same
1.2044 + */
1.2045 + BusConfigParser *included;
1.2046 + const char *filename_str;
1.2047 + DBusError tmp_error;
1.2048 +
1.2049 + dbus_error_init (&tmp_error);
1.2050 +
1.2051 + filename_str = _dbus_string_get_const_data (filename);
1.2052 +
1.2053 + /* Check to make sure this file hasn't already been included. */
1.2054 + if (seen_include (parser, filename))
1.2055 + {
1.2056 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.2057 + "Circular inclusion of file '%s'",
1.2058 + filename_str);
1.2059 + return FALSE;
1.2060 + }
1.2061 +
1.2062 + if (! _dbus_list_append (&parser->included_files, (void *) filename_str))
1.2063 + {
1.2064 + BUS_SET_OOM (error);
1.2065 + return FALSE;
1.2066 + }
1.2067 +
1.2068 + /* Since parser is passed in as the parent, included
1.2069 + inherits parser's limits. */
1.2070 + included = bus_config_load (filename, FALSE, parser, &tmp_error);
1.2071 +
1.2072 + _dbus_list_pop_last (&parser->included_files);
1.2073 +
1.2074 + if (included == NULL)
1.2075 + {
1.2076 + _DBUS_ASSERT_ERROR_IS_SET (&tmp_error);
1.2077 +
1.2078 + if (dbus_error_has_name (&tmp_error, DBUS_ERROR_FILE_NOT_FOUND) &&
1.2079 + ignore_missing)
1.2080 + {
1.2081 + dbus_error_free (&tmp_error);
1.2082 + return TRUE;
1.2083 + }
1.2084 + else
1.2085 + {
1.2086 + dbus_move_error (&tmp_error, error);
1.2087 + return FALSE;
1.2088 + }
1.2089 + }
1.2090 + else
1.2091 + {
1.2092 + _DBUS_ASSERT_ERROR_IS_CLEAR (&tmp_error);
1.2093 +
1.2094 + if (!merge_included (parser, included, error))
1.2095 + {
1.2096 + bus_config_parser_unref (included);
1.2097 + return FALSE;
1.2098 + }
1.2099 +
1.2100 + /* Copy included's limits back to parser. */
1.2101 + parser->limits = included->limits;
1.2102 +
1.2103 + bus_config_parser_unref (included);
1.2104 + return TRUE;
1.2105 + }
1.2106 +}
1.2107 +
1.2108 +static dbus_bool_t
1.2109 +include_dir (BusConfigParser *parser,
1.2110 + const DBusString *dirname,
1.2111 + DBusError *error)
1.2112 +{
1.2113 + DBusString filename;
1.2114 + dbus_bool_t retval;
1.2115 + DBusError tmp_error;
1.2116 + DBusDirIter *dir;
1.2117 + char *s;
1.2118 +
1.2119 + if (!_dbus_string_init (&filename))
1.2120 + {
1.2121 + BUS_SET_OOM (error);
1.2122 + return FALSE;
1.2123 + }
1.2124 +
1.2125 + retval = FALSE;
1.2126 +
1.2127 + dir = _dbus_directory_open (dirname, error);
1.2128 +
1.2129 + if (dir == NULL)
1.2130 + goto failed;
1.2131 +
1.2132 + dbus_error_init (&tmp_error);
1.2133 + while (_dbus_directory_get_next_file (dir, &filename, &tmp_error))
1.2134 + {
1.2135 + DBusString full_path;
1.2136 +
1.2137 + if (!_dbus_string_init (&full_path))
1.2138 + {
1.2139 + BUS_SET_OOM (error);
1.2140 + goto failed;
1.2141 + }
1.2142 +
1.2143 + if (!_dbus_string_copy (dirname, 0, &full_path, 0))
1.2144 + {
1.2145 + BUS_SET_OOM (error);
1.2146 + _dbus_string_free (&full_path);
1.2147 + goto failed;
1.2148 + }
1.2149 +
1.2150 + if (!_dbus_concat_dir_and_file (&full_path, &filename))
1.2151 + {
1.2152 + BUS_SET_OOM (error);
1.2153 + _dbus_string_free (&full_path);
1.2154 + goto failed;
1.2155 + }
1.2156 +
1.2157 + if (_dbus_string_ends_with_c_str (&full_path, ".conf"))
1.2158 + {
1.2159 + if (!include_file (parser, &full_path, TRUE, error))
1.2160 + {
1.2161 + _dbus_string_free (&full_path);
1.2162 + goto failed;
1.2163 + }
1.2164 + }
1.2165 +
1.2166 + _dbus_string_free (&full_path);
1.2167 + }
1.2168 +
1.2169 + if (dbus_error_is_set (&tmp_error))
1.2170 + {
1.2171 + dbus_move_error (&tmp_error, error);
1.2172 + goto failed;
1.2173 + }
1.2174 +
1.2175 +
1.2176 + if (!_dbus_string_copy_data (dirname, &s))
1.2177 + {
1.2178 + BUS_SET_OOM (error);
1.2179 + goto failed;
1.2180 + }
1.2181 +
1.2182 + if (!_dbus_list_append (&parser->conf_dirs, s))
1.2183 + {
1.2184 + dbus_free (s);
1.2185 + BUS_SET_OOM (error);
1.2186 + goto failed;
1.2187 + }
1.2188 +
1.2189 + retval = TRUE;
1.2190 +
1.2191 + failed:
1.2192 + _dbus_string_free (&filename);
1.2193 +
1.2194 + if (dir)
1.2195 + _dbus_directory_close (dir);
1.2196 +
1.2197 + return retval;
1.2198 +}
1.2199 +
1.2200 +dbus_bool_t
1.2201 +bus_config_parser_content (BusConfigParser *parser,
1.2202 + const DBusString *content,
1.2203 + DBusError *error)
1.2204 +{
1.2205 + Element *e;
1.2206 +
1.2207 + _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1.2208 +
1.2209 +#if 0
1.2210 + {
1.2211 + const char *c_str;
1.2212 +
1.2213 + _dbus_string_get_const_data (content, &c_str);
1.2214 +
1.2215 + printf ("CONTENT %d bytes: %s\n", _dbus_string_get_length (content), c_str);
1.2216 + }
1.2217 +#endif
1.2218 +
1.2219 + e = peek_element (parser);
1.2220 + if (e == NULL)
1.2221 + {
1.2222 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.2223 + "Text content outside of any XML element in configuration file");
1.2224 + return FALSE;
1.2225 + }
1.2226 + else if (e->had_content)
1.2227 + {
1.2228 + _dbus_assert_not_reached ("Element had multiple content blocks");
1.2229 + return FALSE;
1.2230 + }
1.2231 +
1.2232 + switch (top_element_type (parser))
1.2233 + {
1.2234 + case ELEMENT_NONE:
1.2235 + _dbus_assert_not_reached ("element at top of stack has no type");
1.2236 + return FALSE;
1.2237 +
1.2238 + case ELEMENT_BUSCONFIG:
1.2239 + case ELEMENT_POLICY:
1.2240 + case ELEMENT_ALLOW:
1.2241 + case ELEMENT_DENY:
1.2242 + case ELEMENT_FORK:
1.2243 + case ELEMENT_STANDARD_SESSION_SERVICEDIRS:
1.2244 + case ELEMENT_SELINUX:
1.2245 + case ELEMENT_ASSOCIATE:
1.2246 + if (all_whitespace (content))
1.2247 + return TRUE;
1.2248 + else
1.2249 + {
1.2250 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.2251 + "No text content expected inside XML element %s in configuration file",
1.2252 + element_type_to_name (top_element_type (parser)));
1.2253 + return FALSE;
1.2254 + }
1.2255 +
1.2256 + case ELEMENT_PIDFILE:
1.2257 + {
1.2258 + char *s;
1.2259 +
1.2260 + e->had_content = TRUE;
1.2261 +
1.2262 + if (!_dbus_string_copy_data (content, &s))
1.2263 + goto nomem;
1.2264 +
1.2265 + dbus_free (parser->pidfile);
1.2266 + parser->pidfile = s;
1.2267 + }
1.2268 + break;
1.2269 +
1.2270 + case ELEMENT_INCLUDE:
1.2271 + {
1.2272 + DBusString full_path, selinux_policy_root;
1.2273 +
1.2274 + e->had_content = TRUE;
1.2275 +
1.2276 + if (e->d.include.if_selinux_enabled
1.2277 + && !bus_selinux_enabled ())
1.2278 + break;
1.2279 +
1.2280 + if (!_dbus_string_init (&full_path))
1.2281 + goto nomem;
1.2282 +
1.2283 + if (e->d.include.selinux_root_relative)
1.2284 + {
1.2285 + if (!bus_selinux_get_policy_root ())
1.2286 + {
1.2287 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.2288 + "Could not determine SELinux policy root for relative inclusion");
1.2289 + _dbus_string_free (&full_path);
1.2290 + return FALSE;
1.2291 + }
1.2292 + _dbus_string_init_const (&selinux_policy_root,
1.2293 + bus_selinux_get_policy_root ());
1.2294 + if (!make_full_path (&selinux_policy_root, content, &full_path))
1.2295 + {
1.2296 + _dbus_string_free (&full_path);
1.2297 + goto nomem;
1.2298 + }
1.2299 + }
1.2300 + else if (!make_full_path (&parser->basedir, content, &full_path))
1.2301 + {
1.2302 + _dbus_string_free (&full_path);
1.2303 + goto nomem;
1.2304 + }
1.2305 +
1.2306 + if (!include_file (parser, &full_path,
1.2307 + e->d.include.ignore_missing, error))
1.2308 + {
1.2309 + _dbus_string_free (&full_path);
1.2310 + return FALSE;
1.2311 + }
1.2312 +
1.2313 + _dbus_string_free (&full_path);
1.2314 + }
1.2315 + break;
1.2316 +
1.2317 + case ELEMENT_INCLUDEDIR:
1.2318 + {
1.2319 + DBusString full_path;
1.2320 +
1.2321 + e->had_content = TRUE;
1.2322 +
1.2323 + if (!_dbus_string_init (&full_path))
1.2324 + goto nomem;
1.2325 +
1.2326 + if (!make_full_path (&parser->basedir, content, &full_path))
1.2327 + {
1.2328 + _dbus_string_free (&full_path);
1.2329 + goto nomem;
1.2330 + }
1.2331 +
1.2332 + if (!include_dir (parser, &full_path, error))
1.2333 + {
1.2334 + _dbus_string_free (&full_path);
1.2335 + return FALSE;
1.2336 + }
1.2337 +
1.2338 + _dbus_string_free (&full_path);
1.2339 + }
1.2340 + break;
1.2341 +
1.2342 + case ELEMENT_USER:
1.2343 + {
1.2344 + char *s;
1.2345 +
1.2346 + e->had_content = TRUE;
1.2347 +
1.2348 + if (!_dbus_string_copy_data (content, &s))
1.2349 + goto nomem;
1.2350 +
1.2351 + dbus_free (parser->user);
1.2352 + parser->user = s;
1.2353 + }
1.2354 + break;
1.2355 +
1.2356 + case ELEMENT_TYPE:
1.2357 + {
1.2358 + char *s;
1.2359 +
1.2360 + e->had_content = TRUE;
1.2361 +
1.2362 + if (!_dbus_string_copy_data (content, &s))
1.2363 + goto nomem;
1.2364 +
1.2365 + dbus_free (parser->bus_type);
1.2366 + parser->bus_type = s;
1.2367 + }
1.2368 + break;
1.2369 +
1.2370 + case ELEMENT_LISTEN:
1.2371 + {
1.2372 + char *s;
1.2373 +
1.2374 + e->had_content = TRUE;
1.2375 +
1.2376 + if (!_dbus_string_copy_data (content, &s))
1.2377 + goto nomem;
1.2378 +
1.2379 + if (!_dbus_list_append (&parser->listen_on,
1.2380 + s))
1.2381 + {
1.2382 + dbus_free (s);
1.2383 + goto nomem;
1.2384 + }
1.2385 + }
1.2386 + break;
1.2387 +
1.2388 + case ELEMENT_AUTH:
1.2389 + {
1.2390 + char *s;
1.2391 +
1.2392 + e->had_content = TRUE;
1.2393 +
1.2394 + if (!_dbus_string_copy_data (content, &s))
1.2395 + goto nomem;
1.2396 +
1.2397 + if (!_dbus_list_append (&parser->mechanisms,
1.2398 + s))
1.2399 + {
1.2400 + dbus_free (s);
1.2401 + goto nomem;
1.2402 + }
1.2403 + }
1.2404 + break;
1.2405 +
1.2406 + case ELEMENT_SERVICEDIR:
1.2407 + {
1.2408 + char *s;
1.2409 + DBusString full_path;
1.2410 +
1.2411 + e->had_content = TRUE;
1.2412 +
1.2413 + if (!_dbus_string_init (&full_path))
1.2414 + goto nomem;
1.2415 +
1.2416 + if (!make_full_path (&parser->basedir, content, &full_path))
1.2417 + {
1.2418 + _dbus_string_free (&full_path);
1.2419 + goto nomem;
1.2420 + }
1.2421 +
1.2422 + if (!_dbus_string_copy_data (&full_path, &s))
1.2423 + {
1.2424 + _dbus_string_free (&full_path);
1.2425 + goto nomem;
1.2426 + }
1.2427 +
1.2428 + if (!service_dirs_append_unique_or_free (&parser->service_dirs, s))
1.2429 + {
1.2430 + _dbus_string_free (&full_path);
1.2431 + dbus_free (s);
1.2432 + goto nomem;
1.2433 + }
1.2434 +
1.2435 + _dbus_string_free (&full_path);
1.2436 + }
1.2437 + break;
1.2438 +
1.2439 + case ELEMENT_LIMIT:
1.2440 + {
1.2441 + long val;
1.2442 +
1.2443 + e->had_content = TRUE;
1.2444 +
1.2445 + val = 0;
1.2446 + if (!_dbus_string_parse_int (content, 0, &val, NULL))
1.2447 + {
1.2448 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.2449 + "<limit name=\"%s\"> element has invalid value (could not parse as integer)",
1.2450 + e->d.limit.name);
1.2451 + return FALSE;
1.2452 + }
1.2453 +
1.2454 + e->d.limit.value = val;
1.2455 +
1.2456 + _dbus_verbose ("Loaded value %ld for limit %s\n",
1.2457 + e->d.limit.value,
1.2458 + e->d.limit.name);
1.2459 + }
1.2460 + break;
1.2461 + }
1.2462 +
1.2463 + _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1.2464 + return TRUE;
1.2465 +
1.2466 + nomem:
1.2467 + BUS_SET_OOM (error);
1.2468 + return FALSE;
1.2469 +}
1.2470 +
1.2471 +dbus_bool_t
1.2472 +bus_config_parser_finished (BusConfigParser *parser,
1.2473 + DBusError *error)
1.2474 +{
1.2475 + _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1.2476 +
1.2477 + if (parser->stack != NULL)
1.2478 + {
1.2479 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.2480 + "Element <%s> was not closed in configuration file",
1.2481 + element_type_to_name (top_element_type (parser)));
1.2482 +
1.2483 + return FALSE;
1.2484 + }
1.2485 +
1.2486 + if (parser->is_toplevel && parser->listen_on == NULL)
1.2487 + {
1.2488 + dbus_set_error (error, DBUS_ERROR_FAILED,
1.2489 + "Configuration file needs one or more <listen> elements giving addresses");
1.2490 + return FALSE;
1.2491 + }
1.2492 +
1.2493 + return TRUE;
1.2494 +}
1.2495 +
1.2496 +const char*
1.2497 +bus_config_parser_get_user (BusConfigParser *parser)
1.2498 +{
1.2499 + return parser->user;
1.2500 +}
1.2501 +
1.2502 +const char*
1.2503 +bus_config_parser_get_type (BusConfigParser *parser)
1.2504 +{
1.2505 + return parser->bus_type;
1.2506 +}
1.2507 +
1.2508 +DBusList**
1.2509 +bus_config_parser_get_addresses (BusConfigParser *parser)
1.2510 +{
1.2511 + return &parser->listen_on;
1.2512 +}
1.2513 +
1.2514 +DBusList**
1.2515 +bus_config_parser_get_mechanisms (BusConfigParser *parser)
1.2516 +{
1.2517 + return &parser->mechanisms;
1.2518 +}
1.2519 +
1.2520 +DBusList**
1.2521 +bus_config_parser_get_service_dirs (BusConfigParser *parser)
1.2522 +{
1.2523 + return &parser->service_dirs;
1.2524 +}
1.2525 +
1.2526 +DBusList**
1.2527 +bus_config_parser_get_conf_dirs (BusConfigParser *parser)
1.2528 +{
1.2529 + return &parser->conf_dirs;
1.2530 +}
1.2531 +
1.2532 +dbus_bool_t
1.2533 +bus_config_parser_get_fork (BusConfigParser *parser)
1.2534 +{
1.2535 + return parser->fork;
1.2536 +}
1.2537 +
1.2538 +const char *
1.2539 +bus_config_parser_get_pidfile (BusConfigParser *parser)
1.2540 +{
1.2541 + return parser->pidfile;
1.2542 +}
1.2543 +
1.2544 +BusPolicy*
1.2545 +bus_config_parser_steal_policy (BusConfigParser *parser)
1.2546 +{
1.2547 + BusPolicy *policy;
1.2548 +
1.2549 + _dbus_assert (parser->policy != NULL); /* can only steal the policy 1 time */
1.2550 +
1.2551 + policy = parser->policy;
1.2552 +
1.2553 + parser->policy = NULL;
1.2554 +
1.2555 + return policy;
1.2556 +}
1.2557 +
1.2558 +/* Overwrite any limits that were set in the configuration file */
1.2559 +void
1.2560 +bus_config_parser_get_limits (BusConfigParser *parser,
1.2561 + BusLimits *limits)
1.2562 +{
1.2563 + *limits = parser->limits;
1.2564 +}
1.2565 +
1.2566 +DBusHashTable*
1.2567 +bus_config_parser_steal_service_context_table (BusConfigParser *parser)
1.2568 +{
1.2569 + DBusHashTable *table;
1.2570 +
1.2571 + _dbus_assert (parser->service_context_table != NULL); /* can only steal once */
1.2572 +
1.2573 + table = parser->service_context_table;
1.2574 +
1.2575 + parser->service_context_table = NULL;
1.2576 +
1.2577 + return table;
1.2578 +}
1.2579 +
1.2580 +#ifdef DBUS_BUILD_TESTS
1.2581 +#include <stdio.h>
1.2582 +
1.2583 +typedef enum
1.2584 +{
1.2585 + VALID,
1.2586 + INVALID,
1.2587 + UNKNOWN
1.2588 +} Validity;
1.2589 +
1.2590 +static dbus_bool_t
1.2591 +do_load (const DBusString *full_path,
1.2592 + Validity validity,
1.2593 + dbus_bool_t oom_possible)
1.2594 +{
1.2595 + BusConfigParser *parser;
1.2596 + DBusError error;
1.2597 +
1.2598 + dbus_error_init (&error);
1.2599 +
1.2600 + parser = bus_config_load (full_path, TRUE, NULL, &error);
1.2601 + if (parser == NULL)
1.2602 + {
1.2603 + _DBUS_ASSERT_ERROR_IS_SET (&error);
1.2604 +
1.2605 + if (oom_possible &&
1.2606 + dbus_error_has_name (&error, DBUS_ERROR_NO_MEMORY))
1.2607 + {
1.2608 + _dbus_verbose ("Failed to load valid file due to OOM\n");
1.2609 + dbus_error_free (&error);
1.2610 + return TRUE;
1.2611 + }
1.2612 + else if (validity == VALID)
1.2613 + {
1.2614 + _dbus_warn ("Failed to load valid file but still had memory: %s\n",
1.2615 + error.message);
1.2616 +
1.2617 + dbus_error_free (&error);
1.2618 + return FALSE;
1.2619 + }
1.2620 + else
1.2621 + {
1.2622 + dbus_error_free (&error);
1.2623 + return TRUE;
1.2624 + }
1.2625 + }
1.2626 + else
1.2627 + {
1.2628 + _DBUS_ASSERT_ERROR_IS_CLEAR (&error);
1.2629 +
1.2630 + bus_config_parser_unref (parser);
1.2631 +
1.2632 + if (validity == INVALID)
1.2633 + {
1.2634 + _dbus_warn ("Accepted invalid file\n");
1.2635 + return FALSE;
1.2636 + }
1.2637 +
1.2638 + return TRUE;
1.2639 + }
1.2640 +}
1.2641 +
1.2642 +typedef struct
1.2643 +{
1.2644 + const DBusString *full_path;
1.2645 + Validity validity;
1.2646 +} LoaderOomData;
1.2647 +
1.2648 +static dbus_bool_t
1.2649 +check_loader_oom_func (void *data)
1.2650 +{
1.2651 + LoaderOomData *d = data;
1.2652 +
1.2653 + return do_load (d->full_path, d->validity, TRUE);
1.2654 +}
1.2655 +
1.2656 +static dbus_bool_t
1.2657 +process_test_valid_subdir (const DBusString *test_base_dir,
1.2658 + const char *subdir,
1.2659 + Validity validity)
1.2660 +{
1.2661 + DBusString test_directory;
1.2662 + DBusString filename;
1.2663 + DBusDirIter *dir;
1.2664 + dbus_bool_t retval;
1.2665 + DBusError error;
1.2666 +
1.2667 + retval = FALSE;
1.2668 + dir = NULL;
1.2669 +
1.2670 + if (!_dbus_string_init (&test_directory))
1.2671 + _dbus_assert_not_reached ("didn't allocate test_directory\n");
1.2672 +
1.2673 + _dbus_string_init_const (&filename, subdir);
1.2674 +
1.2675 + if (!_dbus_string_copy (test_base_dir, 0,
1.2676 + &test_directory, 0))
1.2677 + _dbus_assert_not_reached ("couldn't copy test_base_dir to test_directory");
1.2678 +
1.2679 + if (!_dbus_concat_dir_and_file (&test_directory, &filename))
1.2680 + _dbus_assert_not_reached ("couldn't allocate full path");
1.2681 +
1.2682 + _dbus_string_free (&filename);
1.2683 + if (!_dbus_string_init (&filename))
1.2684 + _dbus_assert_not_reached ("didn't allocate filename string\n");
1.2685 +
1.2686 + dbus_error_init (&error);
1.2687 + dir = _dbus_directory_open (&test_directory, &error);
1.2688 + if (dir == NULL)
1.2689 + {
1.2690 + _dbus_warn ("Could not open %s: %s\n",
1.2691 + _dbus_string_get_const_data (&test_directory),
1.2692 + error.message);
1.2693 + dbus_error_free (&error);
1.2694 + goto failed;
1.2695 + }
1.2696 +
1.2697 + if (validity == VALID)
1.2698 + printf ("Testing valid files:\n");
1.2699 + else if (validity == INVALID)
1.2700 + printf ("Testing invalid files:\n");
1.2701 + else
1.2702 + printf ("Testing unknown files:\n");
1.2703 +
1.2704 + next:
1.2705 + while (_dbus_directory_get_next_file (dir, &filename, &error))
1.2706 + {
1.2707 + DBusString full_path;
1.2708 + LoaderOomData d;
1.2709 +
1.2710 + if (!_dbus_string_init (&full_path))
1.2711 + _dbus_assert_not_reached ("couldn't init string");
1.2712 +
1.2713 + if (!_dbus_string_copy (&test_directory, 0, &full_path, 0))
1.2714 + _dbus_assert_not_reached ("couldn't copy dir to full_path");
1.2715 +
1.2716 + if (!_dbus_concat_dir_and_file (&full_path, &filename))
1.2717 + _dbus_assert_not_reached ("couldn't concat file to dir");
1.2718 +
1.2719 + if (!_dbus_string_ends_with_c_str (&full_path, ".conf"))
1.2720 + {
1.2721 + _dbus_verbose ("Skipping non-.conf file %s\n",
1.2722 + _dbus_string_get_const_data (&filename));
1.2723 + _dbus_string_free (&full_path);
1.2724 + goto next;
1.2725 + }
1.2726 +
1.2727 + printf (" %s\n", _dbus_string_get_const_data (&filename));
1.2728 +
1.2729 + _dbus_verbose (" expecting %s\n",
1.2730 + validity == VALID ? "valid" :
1.2731 + (validity == INVALID ? "invalid" :
1.2732 + (validity == UNKNOWN ? "unknown" : "???")));
1.2733 +
1.2734 + d.full_path = &full_path;
1.2735 + d.validity = validity;
1.2736 +
1.2737 + /* FIXME hackaround for an expat problem, see
1.2738 + * https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124747
1.2739 + * http://freedesktop.org/pipermail/dbus/2004-May/001153.html
1.2740 + */
1.2741 + /* if (!_dbus_test_oom_handling ("config-loader", check_loader_oom_func, &d)) */
1.2742 + if (!check_loader_oom_func (&d))
1.2743 + _dbus_assert_not_reached ("test failed");
1.2744 +
1.2745 + _dbus_string_free (&full_path);
1.2746 + }
1.2747 +
1.2748 + if (dbus_error_is_set (&error))
1.2749 + {
1.2750 + _dbus_warn ("Could not get next file in %s: %s\n",
1.2751 + _dbus_string_get_const_data (&test_directory),
1.2752 + error.message);
1.2753 + dbus_error_free (&error);
1.2754 + goto failed;
1.2755 + }
1.2756 +
1.2757 + retval = TRUE;
1.2758 +
1.2759 + failed:
1.2760 +
1.2761 + if (dir)
1.2762 + _dbus_directory_close (dir);
1.2763 + _dbus_string_free (&test_directory);
1.2764 + _dbus_string_free (&filename);
1.2765 +
1.2766 + return retval;
1.2767 +}
1.2768 +
1.2769 +static dbus_bool_t
1.2770 +bools_equal (dbus_bool_t a,
1.2771 + dbus_bool_t b)
1.2772 +{
1.2773 + return a ? b : !b;
1.2774 +}
1.2775 +
1.2776 +static dbus_bool_t
1.2777 +strings_equal_or_both_null (const char *a,
1.2778 + const char *b)
1.2779 +{
1.2780 + if (a == NULL || b == NULL)
1.2781 + return a == b;
1.2782 + else
1.2783 + return !strcmp (a, b);
1.2784 +}
1.2785 +
1.2786 +static dbus_bool_t
1.2787 +elements_equal (const Element *a,
1.2788 + const Element *b)
1.2789 +{
1.2790 + if (a->type != b->type)
1.2791 + return FALSE;
1.2792 +
1.2793 + if (!bools_equal (a->had_content, b->had_content))
1.2794 + return FALSE;
1.2795 +
1.2796 + switch (a->type)
1.2797 + {
1.2798 +
1.2799 + case ELEMENT_INCLUDE:
1.2800 + if (!bools_equal (a->d.include.ignore_missing,
1.2801 + b->d.include.ignore_missing))
1.2802 + return FALSE;
1.2803 + break;
1.2804 +
1.2805 + case ELEMENT_POLICY:
1.2806 + if (a->d.policy.type != b->d.policy.type)
1.2807 + return FALSE;
1.2808 + if (a->d.policy.gid_uid_or_at_console != b->d.policy.gid_uid_or_at_console)
1.2809 + return FALSE;
1.2810 + break;
1.2811 +
1.2812 + case ELEMENT_LIMIT:
1.2813 + if (strcmp (a->d.limit.name, b->d.limit.name))
1.2814 + return FALSE;
1.2815 + if (a->d.limit.value != b->d.limit.value)
1.2816 + return FALSE;
1.2817 + break;
1.2818 +
1.2819 + default:
1.2820 + /* do nothing */
1.2821 + break;
1.2822 + }
1.2823 +
1.2824 + return TRUE;
1.2825 +
1.2826 +}
1.2827 +
1.2828 +static dbus_bool_t
1.2829 +lists_of_elements_equal (DBusList *a,
1.2830 + DBusList *b)
1.2831 +{
1.2832 + DBusList *ia;
1.2833 + DBusList *ib;
1.2834 +
1.2835 + ia = a;
1.2836 + ib = b;
1.2837 +
1.2838 + while (ia != NULL && ib != NULL)
1.2839 + {
1.2840 + if (elements_equal (ia->data, ib->data))
1.2841 + return FALSE;
1.2842 + ia = _dbus_list_get_next_link (&a, ia);
1.2843 + ib = _dbus_list_get_next_link (&b, ib);
1.2844 + }
1.2845 +
1.2846 + return ia == NULL && ib == NULL;
1.2847 +}
1.2848 +
1.2849 +static dbus_bool_t
1.2850 +lists_of_c_strings_equal (DBusList *a,
1.2851 + DBusList *b)
1.2852 +{
1.2853 + DBusList *ia;
1.2854 + DBusList *ib;
1.2855 +
1.2856 + ia = a;
1.2857 + ib = b;
1.2858 +
1.2859 + while (ia != NULL && ib != NULL)
1.2860 + {
1.2861 + if (strcmp (ia->data, ib->data))
1.2862 + return FALSE;
1.2863 + ia = _dbus_list_get_next_link (&a, ia);
1.2864 + ib = _dbus_list_get_next_link (&b, ib);
1.2865 + }
1.2866 +
1.2867 + return ia == NULL && ib == NULL;
1.2868 +}
1.2869 +
1.2870 +static dbus_bool_t
1.2871 +limits_equal (const BusLimits *a,
1.2872 + const BusLimits *b)
1.2873 +{
1.2874 + return
1.2875 + (a->max_incoming_bytes == b->max_incoming_bytes
1.2876 + || a->max_outgoing_bytes == b->max_outgoing_bytes
1.2877 + || a->max_message_size == b->max_message_size
1.2878 + || a->activation_timeout == b->activation_timeout
1.2879 + || a->auth_timeout == b->auth_timeout
1.2880 + || a->max_completed_connections == b->max_completed_connections
1.2881 + || a->max_incomplete_connections == b->max_incomplete_connections
1.2882 + || a->max_connections_per_user == b->max_connections_per_user
1.2883 + || a->max_pending_activations == b->max_pending_activations
1.2884 + || a->max_services_per_connection == b->max_services_per_connection
1.2885 + || a->max_match_rules_per_connection == b->max_match_rules_per_connection
1.2886 + || a->max_replies_per_connection == b->max_replies_per_connection
1.2887 + || a->reply_timeout == b->reply_timeout);
1.2888 +}
1.2889 +
1.2890 +static dbus_bool_t
1.2891 +config_parsers_equal (const BusConfigParser *a,
1.2892 + const BusConfigParser *b)
1.2893 +{
1.2894 + if (!_dbus_string_equal (&a->basedir, &b->basedir))
1.2895 + return FALSE;
1.2896 +
1.2897 + if (!lists_of_elements_equal (a->stack, b->stack))
1.2898 + return FALSE;
1.2899 +
1.2900 + if (!strings_equal_or_both_null (a->user, b->user))
1.2901 + return FALSE;
1.2902 +
1.2903 + if (!lists_of_c_strings_equal (a->listen_on, b->listen_on))
1.2904 + return FALSE;
1.2905 +
1.2906 + if (!lists_of_c_strings_equal (a->mechanisms, b->mechanisms))
1.2907 + return FALSE;
1.2908 +
1.2909 + if (!lists_of_c_strings_equal (a->service_dirs, b->service_dirs))
1.2910 + return FALSE;
1.2911 +
1.2912 + /* FIXME: compare policy */
1.2913 +
1.2914 + /* FIXME: compare service selinux ID table */
1.2915 +
1.2916 + if (! limits_equal (&a->limits, &b->limits))
1.2917 + return FALSE;
1.2918 +
1.2919 + if (!strings_equal_or_both_null (a->pidfile, b->pidfile))
1.2920 + return FALSE;
1.2921 +
1.2922 + if (! bools_equal (a->fork, b->fork))
1.2923 + return FALSE;
1.2924 +
1.2925 + if (! bools_equal (a->is_toplevel, b->is_toplevel))
1.2926 + return FALSE;
1.2927 +
1.2928 + return TRUE;
1.2929 +}
1.2930 +
1.2931 +static dbus_bool_t
1.2932 +all_are_equiv (const DBusString *target_directory)
1.2933 +{
1.2934 + DBusString filename;
1.2935 + DBusDirIter *dir;
1.2936 + BusConfigParser *first_parser;
1.2937 + BusConfigParser *parser;
1.2938 + DBusError error;
1.2939 + dbus_bool_t equal;
1.2940 + dbus_bool_t retval;
1.2941 +
1.2942 + dir = NULL;
1.2943 + first_parser = NULL;
1.2944 + parser = NULL;
1.2945 + retval = FALSE;
1.2946 +
1.2947 + if (!_dbus_string_init (&filename))
1.2948 + _dbus_assert_not_reached ("didn't allocate filename string");
1.2949 +
1.2950 + dbus_error_init (&error);
1.2951 + dir = _dbus_directory_open (target_directory, &error);
1.2952 + if (dir == NULL)
1.2953 + {
1.2954 + _dbus_warn ("Could not open %s: %s\n",
1.2955 + _dbus_string_get_const_data (target_directory),
1.2956 + error.message);
1.2957 + dbus_error_free (&error);
1.2958 + goto finished;
1.2959 + }
1.2960 +
1.2961 + printf ("Comparing equivalent files:\n");
1.2962 +
1.2963 + next:
1.2964 + while (_dbus_directory_get_next_file (dir, &filename, &error))
1.2965 + {
1.2966 + DBusString full_path;
1.2967 +
1.2968 + if (!_dbus_string_init (&full_path))
1.2969 + _dbus_assert_not_reached ("couldn't init string");
1.2970 +
1.2971 + if (!_dbus_string_copy (target_directory, 0, &full_path, 0))
1.2972 + _dbus_assert_not_reached ("couldn't copy dir to full_path");
1.2973 +
1.2974 + if (!_dbus_concat_dir_and_file (&full_path, &filename))
1.2975 + _dbus_assert_not_reached ("couldn't concat file to dir");
1.2976 +
1.2977 + if (!_dbus_string_ends_with_c_str (&full_path, ".conf"))
1.2978 + {
1.2979 + _dbus_verbose ("Skipping non-.conf file %s\n",
1.2980 + _dbus_string_get_const_data (&filename));
1.2981 + _dbus_string_free (&full_path);
1.2982 + goto next;
1.2983 + }
1.2984 +
1.2985 + printf (" %s\n", _dbus_string_get_const_data (&filename));
1.2986 +
1.2987 + parser = bus_config_load (&full_path, TRUE, NULL, &error);
1.2988 +
1.2989 + if (parser == NULL)
1.2990 + {
1.2991 + _dbus_warn ("Could not load file %s: %s\n",
1.2992 + _dbus_string_get_const_data (&full_path),
1.2993 + error.message);
1.2994 + _dbus_string_free (&full_path);
1.2995 + dbus_error_free (&error);
1.2996 + goto finished;
1.2997 + }
1.2998 + else if (first_parser == NULL)
1.2999 + {
1.3000 + _dbus_string_free (&full_path);
1.3001 + first_parser = parser;
1.3002 + }
1.3003 + else
1.3004 + {
1.3005 + _dbus_string_free (&full_path);
1.3006 + equal = config_parsers_equal (first_parser, parser);
1.3007 + bus_config_parser_unref (parser);
1.3008 + if (! equal)
1.3009 + goto finished;
1.3010 + }
1.3011 + }
1.3012 +
1.3013 + retval = TRUE;
1.3014 +
1.3015 + finished:
1.3016 + _dbus_string_free (&filename);
1.3017 + if (first_parser)
1.3018 + bus_config_parser_unref (first_parser);
1.3019 + if (dir)
1.3020 + _dbus_directory_close (dir);
1.3021 +
1.3022 + return retval;
1.3023 +
1.3024 +}
1.3025 +
1.3026 +static dbus_bool_t
1.3027 +process_test_equiv_subdir (const DBusString *test_base_dir,
1.3028 + const char *subdir)
1.3029 +{
1.3030 + DBusString test_directory;
1.3031 + DBusString filename;
1.3032 + DBusDirIter *dir;
1.3033 + DBusError error;
1.3034 + dbus_bool_t equal;
1.3035 + dbus_bool_t retval;
1.3036 +
1.3037 + dir = NULL;
1.3038 + retval = FALSE;
1.3039 +
1.3040 + if (!_dbus_string_init (&test_directory))
1.3041 + _dbus_assert_not_reached ("didn't allocate test_directory");
1.3042 +
1.3043 + _dbus_string_init_const (&filename, subdir);
1.3044 +
1.3045 + if (!_dbus_string_copy (test_base_dir, 0,
1.3046 + &test_directory, 0))
1.3047 + _dbus_assert_not_reached ("couldn't copy test_base_dir to test_directory");
1.3048 +
1.3049 + if (!_dbus_concat_dir_and_file (&test_directory, &filename))
1.3050 + _dbus_assert_not_reached ("couldn't allocate full path");
1.3051 +
1.3052 + _dbus_string_free (&filename);
1.3053 + if (!_dbus_string_init (&filename))
1.3054 + _dbus_assert_not_reached ("didn't allocate filename string");
1.3055 +
1.3056 + dbus_error_init (&error);
1.3057 + dir = _dbus_directory_open (&test_directory, &error);
1.3058 + if (dir == NULL)
1.3059 + {
1.3060 + _dbus_warn ("Could not open %s: %s\n",
1.3061 + _dbus_string_get_const_data (&test_directory),
1.3062 + error.message);
1.3063 + dbus_error_free (&error);
1.3064 + goto finished;
1.3065 + }
1.3066 +
1.3067 + while (_dbus_directory_get_next_file (dir, &filename, &error))
1.3068 + {
1.3069 + DBusString full_path;
1.3070 +
1.3071 + /* Skip CVS's magic directories! */
1.3072 + if (_dbus_string_equal_c_str (&filename, "CVS"))
1.3073 + continue;
1.3074 +
1.3075 + if (!_dbus_string_init (&full_path))
1.3076 + _dbus_assert_not_reached ("couldn't init string");
1.3077 +
1.3078 + if (!_dbus_string_copy (&test_directory, 0, &full_path, 0))
1.3079 + _dbus_assert_not_reached ("couldn't copy dir to full_path");
1.3080 +
1.3081 + if (!_dbus_concat_dir_and_file (&full_path, &filename))
1.3082 + _dbus_assert_not_reached ("couldn't concat file to dir");
1.3083 +
1.3084 + equal = all_are_equiv (&full_path);
1.3085 + _dbus_string_free (&full_path);
1.3086 +
1.3087 + if (!equal)
1.3088 + goto finished;
1.3089 + }
1.3090 +
1.3091 + retval = TRUE;
1.3092 +
1.3093 + finished:
1.3094 + _dbus_string_free (&test_directory);
1.3095 + _dbus_string_free (&filename);
1.3096 + if (dir)
1.3097 + _dbus_directory_close (dir);
1.3098 +
1.3099 + return retval;
1.3100 +
1.3101 +}
1.3102 +
1.3103 +static const char *test_service_dir_matches[] =
1.3104 + {
1.3105 +#ifndef __SYMBIAN32__
1.3106 + "/testusr/testlocal/testshare/dbus-1/services",
1.3107 + "/testusr/testshare/dbus-1/services",
1.3108 + DBUS_DATADIR"/dbus-1/services",
1.3109 + "/testhome/foo/.testlocal/testshare/dbus-1/services",
1.3110 +#else
1.3111 +DBUS_DATADIR"\\dbus1\\services",
1.3112 +/* Certain files such as jabber.service are exported and included in the rom builds by other components.
1.3113 + * These are not available for emulator environments and hence added explictly for hardware platforms.
1.3114 + */
1.3115 +#if (! defined __WINSCW__)
1.3116 +"z:\\data\\dbus\\dbus1\\services",
1.3117 +#endif
1.3118 +
1.3119 +#endif
1.3120 + NULL
1.3121 + };
1.3122 +
1.3123 +static dbus_bool_t
1.3124 +test_default_session_servicedirs (void)
1.3125 +{
1.3126 + DBusList *dirs;
1.3127 + DBusList *link;
1.3128 + int i;
1.3129 +
1.3130 + dirs = NULL;
1.3131 +
1.3132 + printf ("Testing retriving the default session service directories\n");
1.3133 + if (!_dbus_get_standard_session_servicedirs (&dirs))
1.3134 + _dbus_assert_not_reached ("couldn't get stardard dirs");
1.3135 +
1.3136 + /* make sure our defaults end with share/dbus-1/service */
1.3137 + while ((link = _dbus_list_pop_first_link (&dirs)))
1.3138 + {
1.3139 + DBusString path;
1.3140 +
1.3141 + printf (" default service dir: %s\n", (char *)link->data);
1.3142 + _dbus_string_init_const (&path, (char *)link->data);
1.3143 +#ifdef __SYMBIAN32__
1.3144 + if (!_dbus_string_ends_with_c_str (&path, "\\dbus\\dbus1\\services"))
1.3145 +#else
1.3146 + if (!_dbus_string_ends_with_c_str (&path, "share/dbus-1/services"))
1.3147 +#endif
1.3148 + {
1.3149 + printf ("error with default session service directories\n");
1.3150 + return FALSE;
1.3151 + }
1.3152 +
1.3153 + dbus_free (link->data);
1.3154 + _dbus_list_free_link (link);
1.3155 + }
1.3156 +
1.3157 +#if 1
1.3158 + if (!_dbus_setenv ("XDG_DATA_HOME", "/testhome/foo/.testlocal/testshare"))
1.3159 + _dbus_assert_not_reached ("couldn't setenv XDG_DATA_HOME");
1.3160 +
1.3161 + if (!_dbus_setenv ("XDG_DATA_DIRS", ":/testusr/testlocal/testshare: :/testusr/testshare:"))
1.3162 + _dbus_assert_not_reached ("couldn't setenv XDG_DATA_DIRS");
1.3163 +
1.3164 + if (!_dbus_get_standard_session_servicedirs (&dirs))
1.3165 + _dbus_assert_not_reached ("couldn't get stardard dirs");
1.3166 +
1.3167 + /* make sure we read and parse the env variable correctly */
1.3168 + i = 0;
1.3169 + while ((link = _dbus_list_pop_first_link (&dirs)))
1.3170 + {
1.3171 + printf (" test service dir: %s\n", (char *)link->data);
1.3172 + if (test_service_dir_matches[i] == NULL)
1.3173 + {
1.3174 + printf ("more directories parsed than in match set\n");
1.3175 + return FALSE;
1.3176 + }
1.3177 +
1.3178 + if (strcasecmp (test_service_dir_matches[i],
1.3179 + (char *)link->data) != 0)
1.3180 + {
1.3181 + printf ("%s directory does not match %s in the match set\n",
1.3182 + (char *)link->data,
1.3183 + test_service_dir_matches[i]);
1.3184 + return FALSE;
1.3185 + }
1.3186 +
1.3187 + ++i;
1.3188 +
1.3189 + dbus_free (link->data);
1.3190 + _dbus_list_free_link (link);
1.3191 + }
1.3192 +
1.3193 + if (test_service_dir_matches[i] != NULL)
1.3194 + {
1.3195 + printf ("extra data %s in the match set was not matched\n",
1.3196 + test_service_dir_matches[i]);
1.3197 +
1.3198 + return FALSE;
1.3199 + }
1.3200 +#endif
1.3201 + return TRUE;
1.3202 +}
1.3203 +
1.3204 +dbus_bool_t
1.3205 +bus_config_parser_test (const DBusString *test_data_dir)
1.3206 +{
1.3207 + if (test_data_dir == NULL ||
1.3208 + _dbus_string_get_length (test_data_dir) == 0)
1.3209 + {
1.3210 + printf ("No test data\n");
1.3211 + return TRUE;
1.3212 + }
1.3213 +
1.3214 + if (!test_default_session_servicedirs())
1.3215 + return FALSE;
1.3216 +
1.3217 + if (!process_test_valid_subdir (test_data_dir, "valid-config-files", VALID))
1.3218 + return FALSE;
1.3219 +
1.3220 + if (!process_test_valid_subdir (test_data_dir, "invalid-config-files", INVALID))
1.3221 + return FALSE;
1.3222 +
1.3223 + if (!process_test_equiv_subdir (test_data_dir, "equiv-config-files"))
1.3224 + return FALSE;
1.3225 +
1.3226 + return TRUE;
1.3227 +}
1.3228 +
1.3229 +#endif /* DBUS_BUILD_TESTS */
1.3230 +