First public contribution.
1 /* -*- mode: C; c-file-style: "gnu" -*- */
2 /* config-parser.c XML-library-agnostic configuration file parser
4 * Copyright (C) 2003, 2004 Red Hat, Inc.
5 * Portion Copyright © 2008 Nokia Corporation and/or its subsidiary(-ies). All rights reserved.
6 * Licensed under the Academic Free License version 2.1
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
23 #include "config-parser.h"
29 #include <dbus/dbus-list.h>
30 #include <dbus/dbus-internals.h>
32 #include "dbus-list.h"
33 #include "dbus-internals.h"
34 #endif //__SYMBIAN32__
56 ELEMENT_STANDARD_SESSION_SERVICEDIRS
61 /* we ignore policies for unknown groups/users */
76 unsigned int had_content : 1;
82 unsigned int ignore_missing : 1;
83 unsigned int if_selinux_enabled : 1;
84 unsigned int selinux_root_relative : 1;
90 unsigned long gid_uid_or_at_console;
104 * Parser for bus configuration file.
106 struct BusConfigParser
108 int refcount; /**< Reference count */
110 DBusString basedir; /**< Directory we resolve paths relative to */
112 DBusList *stack; /**< stack of Element */
114 char *user; /**< user to run as */
116 char *bus_type; /**< Message bus type */
118 DBusList *listen_on; /**< List of addresses to listen to */
120 DBusList *mechanisms; /**< Auth mechanisms */
122 DBusList *service_dirs; /**< Directories to look for services in */
124 DBusList *conf_dirs; /**< Directories to look for policy configuration in */
126 BusPolicy *policy; /**< Security policy */
128 BusLimits limits; /**< Limits */
130 char *pidfile; /**< PID file */
132 DBusList *included_files; /**< Included files stack */
134 DBusHashTable *service_context_table; /**< Map service names to SELinux contexts */
136 unsigned int fork : 1; /**< TRUE to fork into daemon mode */
138 unsigned int is_toplevel : 1; /**< FALSE if we are a sub-config-file inside another one */
142 element_type_to_name (ElementType type)
148 case ELEMENT_BUSCONFIG:
150 case ELEMENT_INCLUDE:
168 case ELEMENT_PIDFILE:
170 case ELEMENT_STANDARD_SESSION_SERVICEDIRS:
171 return "standard_session_servicedirs";
172 case ELEMENT_SERVICEDIR:
174 case ELEMENT_INCLUDEDIR:
178 case ELEMENT_SELINUX:
180 case ELEMENT_ASSOCIATE:
184 _dbus_assert_not_reached ("bad element type");
190 push_element (BusConfigParser *parser,
195 _dbus_assert (type != ELEMENT_NONE);
197 e = dbus_new0 (Element, 1);
201 if (!_dbus_list_append (&parser->stack, e))
213 element_free (Element *e)
215 if (e->type == ELEMENT_LIMIT)
216 dbus_free (e->d.limit.name);
222 pop_element (BusConfigParser *parser)
226 e = _dbus_list_pop_last (&parser->stack);
232 peek_element (BusConfigParser *parser)
236 e = _dbus_list_get_last (&parser->stack);
242 top_element_type (BusConfigParser *parser)
246 e = _dbus_list_get_last (&parser->stack);
255 merge_service_context_hash (DBusHashTable *dest,
265 _dbus_hash_iter_init (from, &iter);
266 while (_dbus_hash_iter_next (&iter))
268 const char *service = _dbus_hash_iter_get_string_key (&iter);
269 const char *context = _dbus_hash_iter_get_value (&iter);
271 service_copy = _dbus_strdup (service);
272 if (service_copy == NULL)
274 context_copy = _dbus_strdup (context);
275 if (context_copy == NULL)
278 if (!_dbus_hash_table_insert_string (dest, service_copy, context_copy))
289 dbus_free (service_copy);
292 dbus_free (context_copy);
298 service_dirs_find_dir (DBusList **service_dirs,
303 _dbus_assert (dir != NULL);
305 for (link = *service_dirs; link; link = _dbus_list_get_next_link(service_dirs, link))
307 const char *link_dir;
309 link_dir = (const char *)link->data;
310 if (strcmp (dir, link_dir) == 0)
318 service_dirs_append_unique_or_free (DBusList **service_dirs,
321 if (!service_dirs_find_dir (service_dirs, dir))
322 return _dbus_list_append (service_dirs, dir);
329 service_dirs_append_link_unique_or_free (DBusList **service_dirs,
332 if (!service_dirs_find_dir (service_dirs, dir_link->data))
334 _dbus_list_append_link (service_dirs, dir_link);
338 dbus_free (dir_link->data);
339 _dbus_list_free_link (dir_link);
344 merge_included (BusConfigParser *parser,
345 BusConfigParser *included,
350 if (!bus_policy_merge (parser->policy,
357 if (!merge_service_context_hash (parser->service_context_table,
358 included->service_context_table))
364 if (included->user != NULL)
366 dbus_free (parser->user);
367 parser->user = included->user;
368 included->user = NULL;
371 if (included->bus_type != NULL)
373 dbus_free (parser->bus_type);
374 parser->bus_type = included->bus_type;
375 included->bus_type = NULL;
381 if (included->pidfile != NULL)
383 dbus_free (parser->pidfile);
384 parser->pidfile = included->pidfile;
385 included->pidfile = NULL;
388 while ((link = _dbus_list_pop_first_link (&included->listen_on)))
389 _dbus_list_append_link (&parser->listen_on, link);
391 while ((link = _dbus_list_pop_first_link (&included->mechanisms)))
392 _dbus_list_append_link (&parser->mechanisms, link);
394 while ((link = _dbus_list_pop_first_link (&included->service_dirs)))
395 service_dirs_append_link_unique_or_free (&parser->service_dirs, link);
397 while ((link = _dbus_list_pop_first_link (&included->conf_dirs)))
398 _dbus_list_append_link (&parser->conf_dirs, link);
404 seen_include (BusConfigParser *parser,
405 const DBusString *file)
409 iter = parser->included_files;
412 if (! strcmp (_dbus_string_get_const_data (file), iter->data))
415 iter = _dbus_list_get_next_link (&parser->included_files, iter);
422 bus_config_parser_new (const DBusString *basedir,
423 dbus_bool_t is_toplevel,
424 const BusConfigParser *parent)
426 BusConfigParser *parser;
428 parser = dbus_new0 (BusConfigParser, 1);
432 parser->is_toplevel = !!is_toplevel;
434 if (!_dbus_string_init (&parser->basedir))
440 if (((parser->policy = bus_policy_new ()) == NULL) ||
441 !_dbus_string_copy (basedir, 0, &parser->basedir, 0) ||
442 ((parser->service_context_table = _dbus_hash_table_new (DBUS_HASH_STRING,
444 dbus_free)) == NULL))
447 bus_policy_unref (parser->policy);
449 _dbus_string_free (&parser->basedir);
457 /* Initialize the parser's limits from the parent. */
458 parser->limits = parent->limits;
460 /* Use the parent's list of included_files to avoid
461 circular inclusions. */
462 parser->included_files = parent->included_files;
467 /* Make up some numbers! woot! */
468 parser->limits.max_incoming_bytes = _DBUS_ONE_MEGABYTE * 63;
469 parser->limits.max_outgoing_bytes = _DBUS_ONE_MEGABYTE * 63;
470 parser->limits.max_message_size = _DBUS_ONE_MEGABYTE * 32;
472 /* Making this long means the user has to wait longer for an error
473 * message if something screws up, but making it too short means
474 * they might see a false failure.
477 parser->limits.activation_timeout = 250000; /* changed to 250 seconds */
479 parser->limits.activation_timeout = 25000;
481 /* Making this long risks making a DOS attack easier, but too short
482 * and legitimate auth will fail. If interactive auth (ask user for
483 * password) is allowed, then potentially it has to be quite long.
485 parser->limits.auth_timeout = 300000; /* 30 seconds bsr changed to 300 sec*/
487 parser->limits.max_incomplete_connections = 32;
488 parser->limits.max_connections_per_user = 128;
490 /* Note that max_completed_connections / max_connections_per_user
491 * is the number of users that would have to work together to
492 * DOS all the other users.
494 parser->limits.max_completed_connections = 1024;
496 parser->limits.max_pending_activations = 256;
497 parser->limits.max_services_per_connection = 256;
499 parser->limits.max_match_rules_per_connection = 512;
501 parser->limits.reply_timeout = 5 * 60 * 1000; /* 5 minutes */
502 parser->limits.max_replies_per_connection = 32;
506 parser->limits.max_incoming_bytes = 1024 * 1024 * 63;
507 parser->limits.max_outgoing_bytes = 1024 * 1024 * 63;
508 parser->limits.max_message_size = 1024 * 1024 * 32;
509 parser->limits.activation_timeout = 250000;
510 parser->limits.auth_timeout = 300000;
511 parser->limits.max_incomplete_connections = 32;
512 parser->limits.max_connections_per_user = 128;
513 parser->limits.max_completed_connections = 1024;
514 parser->limits.max_pending_activations = 256;
515 parser->limits.max_services_per_connection = 256;
516 parser->limits.max_match_rules_per_connection = 512;
517 parser->limits.reply_timeout = 5 * 60 * 1000;
518 parser->limits.max_replies_per_connection = 32;
525 parser->refcount = 1;
531 bus_config_parser_ref (BusConfigParser *parser)
533 _dbus_assert (parser->refcount > 0);
535 parser->refcount += 1;
541 bus_config_parser_unref (BusConfigParser *parser)
543 _dbus_assert (parser->refcount > 0);
545 parser->refcount -= 1;
547 if (parser->refcount == 0)
549 while (parser->stack != NULL)
550 pop_element (parser);
552 dbus_free (parser->user);
553 dbus_free (parser->bus_type);
554 dbus_free (parser->pidfile);
556 _dbus_list_foreach (&parser->listen_on,
557 (DBusForeachFunction) dbus_free,
560 _dbus_list_clear (&parser->listen_on);
562 _dbus_list_foreach (&parser->service_dirs,
563 (DBusForeachFunction) dbus_free,
566 _dbus_list_clear (&parser->service_dirs);
568 _dbus_list_foreach (&parser->conf_dirs,
569 (DBusForeachFunction) dbus_free,
572 _dbus_list_clear (&parser->conf_dirs);
574 _dbus_list_foreach (&parser->mechanisms,
575 (DBusForeachFunction) dbus_free,
578 _dbus_list_clear (&parser->mechanisms);
580 _dbus_string_free (&parser->basedir);
583 bus_policy_unref (parser->policy);
585 if (parser->service_context_table)
586 _dbus_hash_table_unref (parser->service_context_table);
593 bus_config_parser_check_doctype (BusConfigParser *parser,
597 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
599 if (strcmp (doctype, "busconfig") != 0)
601 dbus_set_error (error,
603 "Configuration file has the wrong document type %s",
618 locate_attributes (BusConfigParser *parser,
619 const char *element_name,
620 const char **attribute_names,
621 const char **attribute_values,
623 const char *first_attribute_name,
624 const char **first_attribute_retloc,
632 LocateAttr attrs[MAX_ATTRS];
636 _dbus_assert (first_attribute_name != NULL);
637 _dbus_assert (first_attribute_retloc != NULL);
642 attrs[0].name = first_attribute_name;
643 attrs[0].retloc = first_attribute_retloc;
644 *first_attribute_retloc = NULL;
646 va_start (args, first_attribute_retloc);
648 name = va_arg (args, const char*);
649 retloc = va_arg (args, const char**);
653 _dbus_assert (retloc != NULL);
654 _dbus_assert (n_attrs < MAX_ATTRS);
656 attrs[n_attrs].name = name;
657 attrs[n_attrs].retloc = retloc;
661 name = va_arg (args, const char*);
662 retloc = va_arg (args, const char**);
671 while (attribute_names[i])
680 if (strcmp (attrs[j].name, attribute_names[i]) == 0)
682 retloc = attrs[j].retloc;
686 dbus_set_error (error, DBUS_ERROR_FAILED,
687 "Attribute \"%s\" repeated twice on the same <%s> element",
688 attrs[j].name, element_name);
693 *retloc = attribute_values[i];
702 dbus_set_error (error, DBUS_ERROR_FAILED,
703 "Attribute \"%s\" is invalid on <%s> element in this context",
704 attribute_names[i], element_name);
717 check_no_attributes (BusConfigParser *parser,
718 const char *element_name,
719 const char **attribute_names,
720 const char **attribute_values,
723 if (attribute_names[0] != NULL)
725 dbus_set_error (error, DBUS_ERROR_FAILED,
726 "Attribute \"%s\" is invalid on <%s> element in this context",
727 attribute_names[0], element_name);
735 start_busconfig_child (BusConfigParser *parser,
736 const char *element_name,
737 const char **attribute_names,
738 const char **attribute_values,
741 if (strcmp (element_name, "user") == 0)
743 if (!check_no_attributes (parser, "user", attribute_names, attribute_values, error))
746 if (push_element (parser, ELEMENT_USER) == NULL)
754 else if (strcmp (element_name, "type") == 0)
756 if (!check_no_attributes (parser, "type", attribute_names, attribute_values, error))
759 if (push_element (parser, ELEMENT_TYPE) == NULL)
767 else if (strcmp (element_name, "fork") == 0)
769 if (!check_no_attributes (parser, "fork", attribute_names, attribute_values, error))
772 if (push_element (parser, ELEMENT_FORK) == NULL)
782 else if (strcmp (element_name, "pidfile") == 0)
784 if (!check_no_attributes (parser, "pidfile", attribute_names, attribute_values, error))
787 if (push_element (parser, ELEMENT_PIDFILE) == NULL)
795 else if (strcmp (element_name, "listen") == 0)
797 if (!check_no_attributes (parser, "listen", attribute_names, attribute_values, error))
800 if (push_element (parser, ELEMENT_LISTEN) == NULL)
808 else if (strcmp (element_name, "auth") == 0)
810 if (!check_no_attributes (parser, "auth", attribute_names, attribute_values, error))
813 if (push_element (parser, ELEMENT_AUTH) == NULL)
821 else if (strcmp (element_name, "includedir") == 0)
823 if (!check_no_attributes (parser, "includedir", attribute_names, attribute_values, error))
826 if (push_element (parser, ELEMENT_INCLUDEDIR) == NULL)
834 else if (strcmp (element_name, "standard_session_servicedirs") == 0)
840 if (!check_no_attributes (parser, "standard_session_servicedirs", attribute_names, attribute_values, error))
843 if (push_element (parser, ELEMENT_STANDARD_SESSION_SERVICEDIRS) == NULL)
849 if (!_dbus_get_standard_session_servicedirs (&dirs))
855 while ((link = _dbus_list_pop_first_link (&dirs)))
856 service_dirs_append_link_unique_or_free (&parser->service_dirs, link);
860 else if (strcmp (element_name, "servicedir") == 0)
862 if (!check_no_attributes (parser, "servicedir", attribute_names, attribute_values, error))
865 if (push_element (parser, ELEMENT_SERVICEDIR) == NULL)
873 else if (strcmp (element_name, "include") == 0)
876 const char *if_selinux_enabled;
877 const char *ignore_missing;
878 const char *selinux_root_relative;
880 if ((e = push_element (parser, ELEMENT_INCLUDE)) == NULL)
886 e->d.include.ignore_missing = FALSE;
887 e->d.include.if_selinux_enabled = FALSE;
888 e->d.include.selinux_root_relative = FALSE;
890 if (!locate_attributes (parser, "include",
894 "ignore_missing", &ignore_missing,
895 "if_selinux_enabled", &if_selinux_enabled,
896 "selinux_root_relative", &selinux_root_relative,
900 if (ignore_missing != NULL)
902 if (strcmp (ignore_missing, "yes") == 0)
903 e->d.include.ignore_missing = TRUE;
904 else if (strcmp (ignore_missing, "no") == 0)
905 e->d.include.ignore_missing = FALSE;
908 dbus_set_error (error, DBUS_ERROR_FAILED,
909 "ignore_missing attribute must have value \"yes\" or \"no\"");
914 if (if_selinux_enabled != NULL)
916 if (strcmp (if_selinux_enabled, "yes") == 0)
917 e->d.include.if_selinux_enabled = TRUE;
918 else if (strcmp (if_selinux_enabled, "no") == 0)
919 e->d.include.if_selinux_enabled = FALSE;
922 dbus_set_error (error, DBUS_ERROR_FAILED,
923 "if_selinux_enabled attribute must have value"
924 " \"yes\" or \"no\"");
929 if (selinux_root_relative != NULL)
931 if (strcmp (selinux_root_relative, "yes") == 0)
932 e->d.include.selinux_root_relative = TRUE;
933 else if (strcmp (selinux_root_relative, "no") == 0)
934 e->d.include.selinux_root_relative = FALSE;
937 dbus_set_error (error, DBUS_ERROR_FAILED,
938 "selinux_root_relative attribute must have value"
939 " \"yes\" or \"no\"");
946 else if (strcmp (element_name, "policy") == 0)
952 const char *at_console;
954 if ((e = push_element (parser, ELEMENT_POLICY)) == NULL)
960 e->d.policy.type = POLICY_IGNORED;
962 if (!locate_attributes (parser, "policy",
969 "at_console", &at_console,
973 if (((context && user) ||
974 (context && group) ||
975 (context && at_console)) ||
977 (user && at_console)) ||
978 (group && at_console) ||
979 !(context || user || group || at_console))
981 dbus_set_error (error, DBUS_ERROR_FAILED,
982 "<policy> element must have exactly one of (context|user|group|at_console) attributes");
988 if (strcmp (context, "default") == 0)
990 e->d.policy.type = POLICY_DEFAULT;
992 else if (strcmp (context, "mandatory") == 0)
994 e->d.policy.type = POLICY_MANDATORY;
998 dbus_set_error (error, DBUS_ERROR_FAILED,
999 "context attribute on <policy> must have the value \"default\" or \"mandatory\", not \"%s\"",
1004 else if (user != NULL)
1006 DBusString username;
1007 _dbus_string_init_const (&username, user);
1009 if (_dbus_get_user_id (&username,
1010 &e->d.policy.gid_uid_or_at_console))
1011 e->d.policy.type = POLICY_USER;
1013 _dbus_warn ("Unknown username \"%s\" in message bus configuration file\n",
1016 else if (group != NULL)
1018 DBusString group_name;
1019 _dbus_string_init_const (&group_name, group);
1021 if (_dbus_get_group_id (&group_name,
1022 &e->d.policy.gid_uid_or_at_console))
1023 e->d.policy.type = POLICY_GROUP;
1025 _dbus_warn ("Unknown group \"%s\" in message bus configuration file\n",
1028 else if (at_console != NULL)
1031 t = (strcmp (at_console, "true") == 0);
1032 if (t || strcmp (at_console, "false") == 0)
1034 e->d.policy.gid_uid_or_at_console = t;
1035 e->d.policy.type = POLICY_CONSOLE;
1039 dbus_set_error (error, DBUS_ERROR_FAILED,
1040 "Unknown value \"%s\" for at_console in message bus configuration file",
1048 _dbus_assert_not_reached ("all <policy> attributes null and we didn't set error");
1053 else if (strcmp (element_name, "limit") == 0)
1058 if ((e = push_element (parser, ELEMENT_LIMIT)) == NULL)
1060 BUS_SET_OOM (error);
1064 if (!locate_attributes (parser, "limit",
1074 dbus_set_error (error, DBUS_ERROR_FAILED,
1075 "<limit> element must have a \"name\" attribute");
1079 e->d.limit.name = _dbus_strdup (name);
1080 if (e->d.limit.name == NULL)
1082 BUS_SET_OOM (error);
1088 else if (strcmp (element_name, "selinux") == 0)
1090 if (!check_no_attributes (parser, "selinux", attribute_names, attribute_values, error))
1093 if (push_element (parser, ELEMENT_SELINUX) == NULL)
1095 BUS_SET_OOM (error);
1103 dbus_set_error (error, DBUS_ERROR_FAILED,
1104 "Element <%s> not allowed inside <%s> in configuration file",
1105 element_name, "busconfig");
1111 append_rule_from_element (BusConfigParser *parser,
1112 const char *element_name,
1113 const char **attribute_names,
1114 const char **attribute_values,
1118 const char *send_interface;
1119 const char *send_member;
1120 const char *send_error;
1121 const char *send_destination;
1122 const char *send_path;
1123 const char *send_type;
1124 const char *receive_interface;
1125 const char *receive_member;
1126 const char *receive_error;
1127 const char *receive_sender;
1128 const char *receive_path;
1129 const char *receive_type;
1130 const char *eavesdrop;
1131 const char *send_requested_reply;
1132 const char *receive_requested_reply;
1137 BusPolicyRule *rule;
1139 if (!locate_attributes (parser, element_name,
1143 "send_interface", &send_interface,
1144 "send_member", &send_member,
1145 "send_error", &send_error,
1146 "send_destination", &send_destination,
1147 "send_path", &send_path,
1148 "send_type", &send_type,
1149 "receive_interface", &receive_interface,
1150 "receive_member", &receive_member,
1151 "receive_error", &receive_error,
1152 "receive_sender", &receive_sender,
1153 "receive_path", &receive_path,
1154 "receive_type", &receive_type,
1155 "eavesdrop", &eavesdrop,
1156 "send_requested_reply", &send_requested_reply,
1157 "receive_requested_reply", &receive_requested_reply,
1164 if (!(send_interface || send_member || send_error || send_destination ||
1165 send_type || send_path ||
1166 receive_interface || receive_member || receive_error || receive_sender ||
1167 receive_type || receive_path || eavesdrop ||
1168 send_requested_reply || receive_requested_reply ||
1169 own || user || group))
1171 dbus_set_error (error, DBUS_ERROR_FAILED,
1172 "Element <%s> must have one or more attributes",
1177 if ((send_member && (send_interface == NULL && send_path == NULL)) ||
1178 (receive_member && (receive_interface == NULL && receive_path == NULL)))
1180 dbus_set_error (error, DBUS_ERROR_FAILED,
1181 "On element <%s>, if you specify a member you must specify an interface or a path. Keep in mind that not all messages have an interface field.",
1186 /* Allowed combinations of elements are:
1188 * base, must be all send or all receive:
1191 * interface + member
1194 * base send_ can combine with send_destination, send_path, send_type, send_requested_reply
1195 * base receive_ with receive_sender, receive_path, receive_type, receive_requested_reply, eavesdrop
1197 * user, group, own must occur alone
1199 * Pretty sure the below stuff is broken, FIXME think about it more.
1202 if (((send_interface && send_error) ||
1203 (send_interface && receive_interface) ||
1204 (send_interface && receive_member) ||
1205 (send_interface && receive_error) ||
1206 (send_interface && receive_sender) ||
1207 (send_interface && eavesdrop) ||
1208 (send_interface && receive_requested_reply) ||
1209 (send_interface && own) ||
1210 (send_interface && user) ||
1211 (send_interface && group)) ||
1213 ((send_member && send_error) ||
1214 (send_member && receive_interface) ||
1215 (send_member && receive_member) ||
1216 (send_member && receive_error) ||
1217 (send_member && receive_sender) ||
1218 (send_member && eavesdrop) ||
1219 (send_member && receive_requested_reply) ||
1220 (send_member && own) ||
1221 (send_member && user) ||
1222 (send_member && group)) ||
1224 ((send_error && receive_interface) ||
1225 (send_error && receive_member) ||
1226 (send_error && receive_error) ||
1227 (send_error && receive_sender) ||
1228 (send_error && eavesdrop) ||
1229 (send_error && receive_requested_reply) ||
1230 (send_error && own) ||
1231 (send_error && user) ||
1232 (send_error && group)) ||
1234 ((send_destination && receive_interface) ||
1235 (send_destination && receive_member) ||
1236 (send_destination && receive_error) ||
1237 (send_destination && receive_sender) ||
1238 (send_destination && eavesdrop) ||
1239 (send_destination && receive_requested_reply) ||
1240 (send_destination && own) ||
1241 (send_destination && user) ||
1242 (send_destination && group)) ||
1244 ((send_type && receive_interface) ||
1245 (send_type && receive_member) ||
1246 (send_type && receive_error) ||
1247 (send_type && receive_sender) ||
1248 (send_type && eavesdrop) ||
1249 (send_type && receive_requested_reply) ||
1250 (send_type && own) ||
1251 (send_type && user) ||
1252 (send_type && group)) ||
1254 ((send_path && receive_interface) ||
1255 (send_path && receive_member) ||
1256 (send_path && receive_error) ||
1257 (send_path && receive_sender) ||
1258 (send_path && eavesdrop) ||
1259 (send_path && receive_requested_reply) ||
1260 (send_path && own) ||
1261 (send_path && user) ||
1262 (send_path && group)) ||
1264 ((send_requested_reply && receive_interface) ||
1265 (send_requested_reply && receive_member) ||
1266 (send_requested_reply && receive_error) ||
1267 (send_requested_reply && receive_sender) ||
1268 (send_requested_reply && eavesdrop) ||
1269 (send_requested_reply && receive_requested_reply) ||
1270 (send_requested_reply && own) ||
1271 (send_requested_reply && user) ||
1272 (send_requested_reply && group)) ||
1274 ((receive_interface && receive_error) ||
1275 (receive_interface && own) ||
1276 (receive_interface && user) ||
1277 (receive_interface && group)) ||
1279 ((receive_member && receive_error) ||
1280 (receive_member && own) ||
1281 (receive_member && user) ||
1282 (receive_member && group)) ||
1284 ((receive_error && own) ||
1285 (receive_error && user) ||
1286 (receive_error && group)) ||
1288 ((eavesdrop && own) ||
1289 (eavesdrop && user) ||
1290 (eavesdrop && group)) ||
1292 ((receive_requested_reply && own) ||
1293 (receive_requested_reply && user) ||
1294 (receive_requested_reply && group)) ||
1301 dbus_set_error (error, DBUS_ERROR_FAILED,
1302 "Invalid combination of attributes on element <%s>",
1309 /* In BusPolicyRule, NULL represents wildcard.
1310 * In the config file, '*' represents it.
1312 #define IS_WILDCARD(str) ((str) && ((str)[0]) == '*' && ((str)[1]) == '\0')
1314 if (send_interface || send_member || send_error || send_destination ||
1315 send_path || send_type || send_requested_reply)
1319 if (IS_WILDCARD (send_interface))
1320 send_interface = NULL;
1321 if (IS_WILDCARD (send_member))
1323 if (IS_WILDCARD (send_error))
1325 if (IS_WILDCARD (send_destination))
1326 send_destination = NULL;
1327 if (IS_WILDCARD (send_path))
1329 if (IS_WILDCARD (send_type))
1332 message_type = DBUS_MESSAGE_TYPE_INVALID;
1333 if (send_type != NULL)
1335 message_type = dbus_message_type_from_string (send_type);
1336 if (message_type == DBUS_MESSAGE_TYPE_INVALID)
1338 dbus_set_error (error, DBUS_ERROR_FAILED,
1339 "Bad message type \"%s\"",
1345 if (send_requested_reply &&
1346 !(strcmp (send_requested_reply, "true") == 0 ||
1347 strcmp (send_requested_reply, "false") == 0))
1349 dbus_set_error (error, DBUS_ERROR_FAILED,
1350 "Bad value \"%s\" for %s attribute, must be true or false",
1351 "send_requested_reply", send_requested_reply);
1355 rule = bus_policy_rule_new (BUS_POLICY_RULE_SEND, allow);
1359 if (send_requested_reply)
1360 rule->d.send.requested_reply = (strcmp (send_requested_reply, "true") == 0);
1362 rule->d.send.message_type = message_type;
1363 rule->d.send.path = _dbus_strdup (send_path);
1364 rule->d.send.interface = _dbus_strdup (send_interface);
1365 rule->d.send.member = _dbus_strdup (send_member);
1366 rule->d.send.error = _dbus_strdup (send_error);
1367 rule->d.send.destination = _dbus_strdup (send_destination);
1368 if (send_path && rule->d.send.path == NULL)
1370 if (send_interface && rule->d.send.interface == NULL)
1372 if (send_member && rule->d.send.member == NULL)
1374 if (send_error && rule->d.send.error == NULL)
1376 if (send_destination && rule->d.send.destination == NULL)
1379 else if (receive_interface || receive_member || receive_error || receive_sender ||
1380 receive_path || receive_type || eavesdrop || receive_requested_reply)
1384 if (IS_WILDCARD (receive_interface))
1385 receive_interface = NULL;
1386 if (IS_WILDCARD (receive_member))
1387 receive_member = NULL;
1388 if (IS_WILDCARD (receive_error))
1389 receive_error = NULL;
1390 if (IS_WILDCARD (receive_sender))
1391 receive_sender = NULL;
1392 if (IS_WILDCARD (receive_path))
1393 receive_path = NULL;
1394 if (IS_WILDCARD (receive_type))
1395 receive_type = NULL;
1397 message_type = DBUS_MESSAGE_TYPE_INVALID;
1398 if (receive_type != NULL)
1400 message_type = dbus_message_type_from_string (receive_type);
1401 if (message_type == DBUS_MESSAGE_TYPE_INVALID)
1403 dbus_set_error (error, DBUS_ERROR_FAILED,
1404 "Bad message type \"%s\"",
1412 !(strcmp (eavesdrop, "true") == 0 ||
1413 strcmp (eavesdrop, "false") == 0))
1415 dbus_set_error (error, DBUS_ERROR_FAILED,
1416 "Bad value \"%s\" for %s attribute, must be true or false",
1417 "eavesdrop", eavesdrop);
1421 if (receive_requested_reply &&
1422 !(strcmp (receive_requested_reply, "true") == 0 ||
1423 strcmp (receive_requested_reply, "false") == 0))
1425 dbus_set_error (error, DBUS_ERROR_FAILED,
1426 "Bad value \"%s\" for %s attribute, must be true or false",
1427 "receive_requested_reply", receive_requested_reply);
1431 rule = bus_policy_rule_new (BUS_POLICY_RULE_RECEIVE, allow);
1436 rule->d.receive.eavesdrop = (strcmp (eavesdrop, "true") == 0);
1438 if (receive_requested_reply)
1439 rule->d.receive.requested_reply = (strcmp (receive_requested_reply, "true") == 0);
1441 rule->d.receive.message_type = message_type;
1442 rule->d.receive.path = _dbus_strdup (receive_path);
1443 rule->d.receive.interface = _dbus_strdup (receive_interface);
1444 rule->d.receive.member = _dbus_strdup (receive_member);
1445 rule->d.receive.error = _dbus_strdup (receive_error);
1446 rule->d.receive.origin = _dbus_strdup (receive_sender);
1448 if (receive_path && rule->d.receive.path == NULL)
1450 if (receive_interface && rule->d.receive.interface == NULL)
1452 if (receive_member && rule->d.receive.member == NULL)
1454 if (receive_error && rule->d.receive.error == NULL)
1456 if (receive_sender && rule->d.receive.origin == NULL)
1461 rule = bus_policy_rule_new (BUS_POLICY_RULE_OWN, allow);
1465 if (IS_WILDCARD (own))
1468 rule->d.own.service_name = _dbus_strdup (own);
1469 if (own && rule->d.own.service_name == NULL)
1474 if (IS_WILDCARD (user))
1476 rule = bus_policy_rule_new (BUS_POLICY_RULE_USER, allow);
1480 rule->d.user.uid = DBUS_UID_UNSET;
1484 DBusString username;
1487 _dbus_string_init_const (&username, user);
1489 if (_dbus_get_user_id (&username, &uid))
1491 rule = bus_policy_rule_new (BUS_POLICY_RULE_USER, allow);
1495 rule->d.user.uid = uid;
1499 _dbus_warn ("Unknown username \"%s\" on element <%s>\n",
1500 user, element_name);
1506 if (IS_WILDCARD (group))
1508 rule = bus_policy_rule_new (BUS_POLICY_RULE_GROUP, allow);
1512 rule->d.group.gid = DBUS_GID_UNSET;
1516 DBusString groupname;
1519 _dbus_string_init_const (&groupname, group);
1521 if (_dbus_get_user_id (&groupname, &gid))
1523 rule = bus_policy_rule_new (BUS_POLICY_RULE_GROUP, allow);
1527 rule->d.group.gid = gid;
1531 _dbus_warn ("Unknown group \"%s\" on element <%s>\n",
1532 group, element_name);
1537 _dbus_assert_not_reached ("Did not handle some combination of attributes on <allow> or <deny>");
1543 pe = peek_element (parser);
1544 _dbus_assert (pe != NULL);
1545 _dbus_assert (pe->type == ELEMENT_POLICY);
1547 switch (pe->d.policy.type)
1549 case POLICY_IGNORED:
1550 /* drop the rule on the floor */
1553 case POLICY_DEFAULT:
1554 if (!bus_policy_append_default_rule (parser->policy, rule))
1557 case POLICY_MANDATORY:
1558 if (!bus_policy_append_mandatory_rule (parser->policy, rule))
1562 if (!BUS_POLICY_RULE_IS_PER_CLIENT (rule))
1564 dbus_set_error (error, DBUS_ERROR_FAILED,
1565 "<%s> rule cannot be per-user because it has bus-global semantics",
1570 if (!bus_policy_append_user_rule (parser->policy, pe->d.policy.gid_uid_or_at_console,
1575 if (!BUS_POLICY_RULE_IS_PER_CLIENT (rule))
1577 dbus_set_error (error, DBUS_ERROR_FAILED,
1578 "<%s> rule cannot be per-group because it has bus-global semantics",
1583 if (!bus_policy_append_group_rule (parser->policy, pe->d.policy.gid_uid_or_at_console,
1589 case POLICY_CONSOLE:
1590 if (!bus_policy_append_console_rule (parser->policy, pe->d.policy.gid_uid_or_at_console,
1596 bus_policy_rule_unref (rule);
1603 BUS_SET_OOM (error);
1606 bus_policy_rule_unref (rule);
1611 start_policy_child (BusConfigParser *parser,
1612 const char *element_name,
1613 const char **attribute_names,
1614 const char **attribute_values,
1617 if (strcmp (element_name, "allow") == 0)
1619 if (!append_rule_from_element (parser, element_name,
1620 attribute_names, attribute_values,
1624 if (push_element (parser, ELEMENT_ALLOW) == NULL)
1626 BUS_SET_OOM (error);
1632 else if (strcmp (element_name, "deny") == 0)
1634 if (!append_rule_from_element (parser, element_name,
1635 attribute_names, attribute_values,
1639 if (push_element (parser, ELEMENT_DENY) == NULL)
1641 BUS_SET_OOM (error);
1649 dbus_set_error (error, DBUS_ERROR_FAILED,
1650 "Element <%s> not allowed inside <%s> in configuration file",
1651 element_name, "policy");
1657 start_selinux_child (BusConfigParser *parser,
1658 const char *element_name,
1659 const char **attribute_names,
1660 const char **attribute_values,
1667 context_copy = NULL;
1669 if (strcmp (element_name, "associate") == 0)
1672 const char *context;
1674 if (!locate_attributes (parser, "associate",
1679 "context", &context,
1683 if (push_element (parser, ELEMENT_ASSOCIATE) == NULL)
1685 BUS_SET_OOM (error);
1689 if (own == NULL || context == NULL)
1691 dbus_set_error (error, DBUS_ERROR_FAILED,
1692 "Element <associate> must have attributes own=\"<servicename>\" and context=\"<selinux context>\"");
1696 own_copy = _dbus_strdup (own);
1697 if (own_copy == NULL)
1699 context_copy = _dbus_strdup (context);
1700 if (context_copy == NULL)
1703 if (!_dbus_hash_table_insert_string (parser->service_context_table,
1704 own_copy, context_copy))
1711 dbus_set_error (error, DBUS_ERROR_FAILED,
1712 "Element <%s> not allowed inside <%s> in configuration file",
1713 element_name, "selinux");
1719 dbus_free (own_copy);
1722 dbus_free (context_copy);
1724 BUS_SET_OOM (error);
1729 bus_config_parser_start_element (BusConfigParser *parser,
1730 const char *element_name,
1731 const char **attribute_names,
1732 const char **attribute_values,
1737 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1739 /* printf ("START: %s\n", element_name); */
1741 t = top_element_type (parser);
1743 if (t == ELEMENT_NONE)
1745 if (strcmp (element_name, "busconfig") == 0)
1747 if (!check_no_attributes (parser, "busconfig", attribute_names, attribute_values, error))
1750 if (push_element (parser, ELEMENT_BUSCONFIG) == NULL)
1752 BUS_SET_OOM (error);
1760 dbus_set_error (error, DBUS_ERROR_FAILED,
1761 "Unknown element <%s> at root of configuration file",
1766 else if (t == ELEMENT_BUSCONFIG)
1768 return start_busconfig_child (parser, element_name,
1769 attribute_names, attribute_values,
1772 else if (t == ELEMENT_POLICY)
1774 return start_policy_child (parser, element_name,
1775 attribute_names, attribute_values,
1778 else if (t == ELEMENT_SELINUX)
1780 return start_selinux_child (parser, element_name,
1781 attribute_names, attribute_values,
1786 dbus_set_error (error, DBUS_ERROR_FAILED,
1787 "Element <%s> is not allowed in this context",
1794 set_limit (BusConfigParser *parser,
1799 dbus_bool_t must_be_positive;
1800 dbus_bool_t must_be_int;
1802 must_be_int = FALSE;
1803 must_be_positive = FALSE;
1805 if (strcmp (name, "max_incoming_bytes") == 0)
1807 must_be_positive = TRUE;
1808 parser->limits.max_incoming_bytes = value;
1810 else if (strcmp (name, "max_outgoing_bytes") == 0)
1812 must_be_positive = TRUE;
1813 parser->limits.max_outgoing_bytes = value;
1815 else if (strcmp (name, "max_message_size") == 0)
1817 must_be_positive = TRUE;
1818 parser->limits.max_message_size = value;
1820 else if (strcmp (name, "service_start_timeout") == 0)
1822 must_be_positive = TRUE;
1824 parser->limits.activation_timeout = value;
1826 else if (strcmp (name, "auth_timeout") == 0)
1828 must_be_positive = TRUE;
1830 parser->limits.auth_timeout = value;
1832 else if (strcmp (name, "reply_timeout") == 0)
1834 must_be_positive = TRUE;
1836 parser->limits.reply_timeout = value;
1838 else if (strcmp (name, "max_completed_connections") == 0)
1840 must_be_positive = TRUE;
1842 parser->limits.max_completed_connections = value;
1844 else if (strcmp (name, "max_incomplete_connections") == 0)
1846 must_be_positive = TRUE;
1848 parser->limits.max_incomplete_connections = value;
1850 else if (strcmp (name, "max_connections_per_user") == 0)
1852 must_be_positive = TRUE;
1854 parser->limits.max_connections_per_user = value;
1856 else if (strcmp (name, "max_pending_service_starts") == 0)
1858 must_be_positive = TRUE;
1860 parser->limits.max_pending_activations = value;
1862 else if (strcmp (name, "max_names_per_connection") == 0)
1864 must_be_positive = TRUE;
1866 parser->limits.max_services_per_connection = value;
1868 else if (strcmp (name, "max_match_rules_per_connection") == 0)
1870 must_be_positive = TRUE;
1872 parser->limits.max_match_rules_per_connection = value;
1874 else if (strcmp (name, "max_replies_per_connection") == 0)
1876 must_be_positive = TRUE;
1878 parser->limits.max_replies_per_connection = value;
1882 dbus_set_error (error, DBUS_ERROR_FAILED,
1883 "There is no limit called \"%s\"\n",
1888 if (must_be_positive && value < 0)
1890 dbus_set_error (error, DBUS_ERROR_FAILED,
1891 "<limit name=\"%s\"> must be a positive number\n",
1897 (value < _DBUS_INT_MIN || value > _DBUS_INT_MAX))
1899 dbus_set_error (error, DBUS_ERROR_FAILED,
1900 "<limit name=\"%s\"> value is too large\n",
1909 bus_config_parser_end_element (BusConfigParser *parser,
1910 const char *element_name,
1917 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1919 /* printf ("END: %s\n", element_name); */
1921 t = top_element_type (parser);
1923 if (t == ELEMENT_NONE)
1925 /* should probably be an assertion failure but
1926 * being paranoid about XML parsers
1928 dbus_set_error (error, DBUS_ERROR_FAILED,
1929 "XML parser ended element with no element on the stack");
1933 n = element_type_to_name (t);
1934 _dbus_assert (n != NULL);
1935 if (strcmp (n, element_name) != 0)
1937 /* should probably be an assertion failure but
1938 * being paranoid about XML parsers
1940 dbus_set_error (error, DBUS_ERROR_FAILED,
1941 "XML element <%s> ended but topmost element on the stack was <%s>",
1946 e = peek_element (parser);
1947 _dbus_assert (e != NULL);
1952 _dbus_assert_not_reached ("element in stack has no type");
1955 case ELEMENT_INCLUDE:
1958 case ELEMENT_LISTEN:
1959 case ELEMENT_PIDFILE:
1961 case ELEMENT_SERVICEDIR:
1962 case ELEMENT_INCLUDEDIR:
1964 if (!e->had_content)
1966 dbus_set_error (error, DBUS_ERROR_FAILED,
1967 "XML element <%s> was expected to have content inside it",
1968 element_type_to_name (e->type));
1972 if (e->type == ELEMENT_LIMIT)
1974 if (!set_limit (parser, e->d.limit.name, e->d.limit.value,
1980 case ELEMENT_BUSCONFIG:
1981 case ELEMENT_POLICY:
1985 case ELEMENT_SELINUX:
1986 case ELEMENT_ASSOCIATE:
1987 case ELEMENT_STANDARD_SESSION_SERVICEDIRS:
1991 pop_element (parser);
1997 all_whitespace (const DBusString *str)
2001 _dbus_string_skip_white (str, 0, &i);
2003 return i == _dbus_string_get_length (str);
2007 make_full_path (const DBusString *basedir,
2008 const DBusString *filename,
2009 DBusString *full_path)
2011 #ifndef __SYMBIAN32__
2012 if (_dbus_path_is_absolute (filename))
2014 return _dbus_string_copy (filename, 0, full_path, 0);
2018 if (!_dbus_string_copy (basedir, 0, full_path, 0))
2021 if (!_dbus_concat_dir_and_file (full_path, filename))
2027 // always give absolute path in config files on symbian
2028 return _dbus_string_copy (filename, 0, full_path, 0);
2033 include_file (BusConfigParser *parser,
2034 const DBusString *filename,
2035 dbus_bool_t ignore_missing,
2038 /* FIXME good test case for this would load each config file in the
2039 * test suite both alone, and as an include, and check
2040 * that the result is the same
2042 BusConfigParser *included;
2043 const char *filename_str;
2044 DBusError tmp_error;
2046 dbus_error_init (&tmp_error);
2048 filename_str = _dbus_string_get_const_data (filename);
2050 /* Check to make sure this file hasn't already been included. */
2051 if (seen_include (parser, filename))
2053 dbus_set_error (error, DBUS_ERROR_FAILED,
2054 "Circular inclusion of file '%s'",
2059 if (! _dbus_list_append (&parser->included_files, (void *) filename_str))
2061 BUS_SET_OOM (error);
2065 /* Since parser is passed in as the parent, included
2066 inherits parser's limits. */
2067 included = bus_config_load (filename, FALSE, parser, &tmp_error);
2069 _dbus_list_pop_last (&parser->included_files);
2071 if (included == NULL)
2073 _DBUS_ASSERT_ERROR_IS_SET (&tmp_error);
2075 if (dbus_error_has_name (&tmp_error, DBUS_ERROR_FILE_NOT_FOUND) &&
2078 dbus_error_free (&tmp_error);
2083 dbus_move_error (&tmp_error, error);
2089 _DBUS_ASSERT_ERROR_IS_CLEAR (&tmp_error);
2091 if (!merge_included (parser, included, error))
2093 bus_config_parser_unref (included);
2097 /* Copy included's limits back to parser. */
2098 parser->limits = included->limits;
2100 bus_config_parser_unref (included);
2106 include_dir (BusConfigParser *parser,
2107 const DBusString *dirname,
2110 DBusString filename;
2112 DBusError tmp_error;
2116 if (!_dbus_string_init (&filename))
2118 BUS_SET_OOM (error);
2124 dir = _dbus_directory_open (dirname, error);
2129 dbus_error_init (&tmp_error);
2130 while (_dbus_directory_get_next_file (dir, &filename, &tmp_error))
2132 DBusString full_path;
2134 if (!_dbus_string_init (&full_path))
2136 BUS_SET_OOM (error);
2140 if (!_dbus_string_copy (dirname, 0, &full_path, 0))
2142 BUS_SET_OOM (error);
2143 _dbus_string_free (&full_path);
2147 if (!_dbus_concat_dir_and_file (&full_path, &filename))
2149 BUS_SET_OOM (error);
2150 _dbus_string_free (&full_path);
2154 if (_dbus_string_ends_with_c_str (&full_path, ".conf"))
2156 if (!include_file (parser, &full_path, TRUE, error))
2158 _dbus_string_free (&full_path);
2163 _dbus_string_free (&full_path);
2166 if (dbus_error_is_set (&tmp_error))
2168 dbus_move_error (&tmp_error, error);
2173 if (!_dbus_string_copy_data (dirname, &s))
2175 BUS_SET_OOM (error);
2179 if (!_dbus_list_append (&parser->conf_dirs, s))
2182 BUS_SET_OOM (error);
2189 _dbus_string_free (&filename);
2192 _dbus_directory_close (dir);
2198 bus_config_parser_content (BusConfigParser *parser,
2199 const DBusString *content,
2204 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
2210 _dbus_string_get_const_data (content, &c_str);
2212 printf ("CONTENT %d bytes: %s\n", _dbus_string_get_length (content), c_str);
2216 e = peek_element (parser);
2219 dbus_set_error (error, DBUS_ERROR_FAILED,
2220 "Text content outside of any XML element in configuration file");
2223 else if (e->had_content)
2225 _dbus_assert_not_reached ("Element had multiple content blocks");
2229 switch (top_element_type (parser))
2232 _dbus_assert_not_reached ("element at top of stack has no type");
2235 case ELEMENT_BUSCONFIG:
2236 case ELEMENT_POLICY:
2240 case ELEMENT_STANDARD_SESSION_SERVICEDIRS:
2241 case ELEMENT_SELINUX:
2242 case ELEMENT_ASSOCIATE:
2243 if (all_whitespace (content))
2247 dbus_set_error (error, DBUS_ERROR_FAILED,
2248 "No text content expected inside XML element %s in configuration file",
2249 element_type_to_name (top_element_type (parser)));
2253 case ELEMENT_PIDFILE:
2257 e->had_content = TRUE;
2259 if (!_dbus_string_copy_data (content, &s))
2262 dbus_free (parser->pidfile);
2263 parser->pidfile = s;
2267 case ELEMENT_INCLUDE:
2269 DBusString full_path, selinux_policy_root;
2271 e->had_content = TRUE;
2273 if (e->d.include.if_selinux_enabled
2274 && !bus_selinux_enabled ())
2277 if (!_dbus_string_init (&full_path))
2280 if (e->d.include.selinux_root_relative)
2282 if (!bus_selinux_get_policy_root ())
2284 dbus_set_error (error, DBUS_ERROR_FAILED,
2285 "Could not determine SELinux policy root for relative inclusion");
2286 _dbus_string_free (&full_path);
2289 _dbus_string_init_const (&selinux_policy_root,
2290 bus_selinux_get_policy_root ());
2291 if (!make_full_path (&selinux_policy_root, content, &full_path))
2293 _dbus_string_free (&full_path);
2297 else if (!make_full_path (&parser->basedir, content, &full_path))
2299 _dbus_string_free (&full_path);
2303 if (!include_file (parser, &full_path,
2304 e->d.include.ignore_missing, error))
2306 _dbus_string_free (&full_path);
2310 _dbus_string_free (&full_path);
2314 case ELEMENT_INCLUDEDIR:
2316 DBusString full_path;
2318 e->had_content = TRUE;
2320 if (!_dbus_string_init (&full_path))
2323 if (!make_full_path (&parser->basedir, content, &full_path))
2325 _dbus_string_free (&full_path);
2329 if (!include_dir (parser, &full_path, error))
2331 _dbus_string_free (&full_path);
2335 _dbus_string_free (&full_path);
2343 e->had_content = TRUE;
2345 if (!_dbus_string_copy_data (content, &s))
2348 dbus_free (parser->user);
2357 e->had_content = TRUE;
2359 if (!_dbus_string_copy_data (content, &s))
2362 dbus_free (parser->bus_type);
2363 parser->bus_type = s;
2367 case ELEMENT_LISTEN:
2371 e->had_content = TRUE;
2373 if (!_dbus_string_copy_data (content, &s))
2376 if (!_dbus_list_append (&parser->listen_on,
2389 e->had_content = TRUE;
2391 if (!_dbus_string_copy_data (content, &s))
2394 if (!_dbus_list_append (&parser->mechanisms,
2403 case ELEMENT_SERVICEDIR:
2406 DBusString full_path;
2408 e->had_content = TRUE;
2410 if (!_dbus_string_init (&full_path))
2413 if (!make_full_path (&parser->basedir, content, &full_path))
2415 _dbus_string_free (&full_path);
2419 if (!_dbus_string_copy_data (&full_path, &s))
2421 _dbus_string_free (&full_path);
2425 if (!service_dirs_append_unique_or_free (&parser->service_dirs, s))
2427 _dbus_string_free (&full_path);
2432 _dbus_string_free (&full_path);
2440 e->had_content = TRUE;
2443 if (!_dbus_string_parse_int (content, 0, &val, NULL))
2445 dbus_set_error (error, DBUS_ERROR_FAILED,
2446 "<limit name=\"%s\"> element has invalid value (could not parse as integer)",
2451 e->d.limit.value = val;
2453 _dbus_verbose ("Loaded value %ld for limit %s\n",
2460 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
2464 BUS_SET_OOM (error);
2469 bus_config_parser_finished (BusConfigParser *parser,
2472 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
2474 if (parser->stack != NULL)
2476 dbus_set_error (error, DBUS_ERROR_FAILED,
2477 "Element <%s> was not closed in configuration file",
2478 element_type_to_name (top_element_type (parser)));
2483 if (parser->is_toplevel && parser->listen_on == NULL)
2485 dbus_set_error (error, DBUS_ERROR_FAILED,
2486 "Configuration file needs one or more <listen> elements giving addresses");
2494 bus_config_parser_get_user (BusConfigParser *parser)
2496 return parser->user;
2500 bus_config_parser_get_type (BusConfigParser *parser)
2502 return parser->bus_type;
2506 bus_config_parser_get_addresses (BusConfigParser *parser)
2508 return &parser->listen_on;
2512 bus_config_parser_get_mechanisms (BusConfigParser *parser)
2514 return &parser->mechanisms;
2518 bus_config_parser_get_service_dirs (BusConfigParser *parser)
2520 return &parser->service_dirs;
2524 bus_config_parser_get_conf_dirs (BusConfigParser *parser)
2526 return &parser->conf_dirs;
2530 bus_config_parser_get_fork (BusConfigParser *parser)
2532 return parser->fork;
2536 bus_config_parser_get_pidfile (BusConfigParser *parser)
2538 return parser->pidfile;
2542 bus_config_parser_steal_policy (BusConfigParser *parser)
2546 _dbus_assert (parser->policy != NULL); /* can only steal the policy 1 time */
2548 policy = parser->policy;
2550 parser->policy = NULL;
2555 /* Overwrite any limits that were set in the configuration file */
2557 bus_config_parser_get_limits (BusConfigParser *parser,
2560 *limits = parser->limits;
2564 bus_config_parser_steal_service_context_table (BusConfigParser *parser)
2566 DBusHashTable *table;
2568 _dbus_assert (parser->service_context_table != NULL); /* can only steal once */
2570 table = parser->service_context_table;
2572 parser->service_context_table = NULL;
2577 #ifdef DBUS_BUILD_TESTS
2588 do_load (const DBusString *full_path,
2590 dbus_bool_t oom_possible)
2592 BusConfigParser *parser;
2595 dbus_error_init (&error);
2597 parser = bus_config_load (full_path, TRUE, NULL, &error);
2600 _DBUS_ASSERT_ERROR_IS_SET (&error);
2603 dbus_error_has_name (&error, DBUS_ERROR_NO_MEMORY))
2605 _dbus_verbose ("Failed to load valid file due to OOM\n");
2606 dbus_error_free (&error);
2609 else if (validity == VALID)
2611 _dbus_warn ("Failed to load valid file but still had memory: %s\n",
2614 dbus_error_free (&error);
2619 dbus_error_free (&error);
2625 _DBUS_ASSERT_ERROR_IS_CLEAR (&error);
2627 bus_config_parser_unref (parser);
2629 if (validity == INVALID)
2631 _dbus_warn ("Accepted invalid file\n");
2641 const DBusString *full_path;
2646 check_loader_oom_func (void *data)
2648 LoaderOomData *d = data;
2650 return do_load (d->full_path, d->validity, TRUE);
2654 process_test_valid_subdir (const DBusString *test_base_dir,
2658 DBusString test_directory;
2659 DBusString filename;
2667 if (!_dbus_string_init (&test_directory))
2668 _dbus_assert_not_reached ("didn't allocate test_directory\n");
2670 _dbus_string_init_const (&filename, subdir);
2672 if (!_dbus_string_copy (test_base_dir, 0,
2673 &test_directory, 0))
2674 _dbus_assert_not_reached ("couldn't copy test_base_dir to test_directory");
2676 if (!_dbus_concat_dir_and_file (&test_directory, &filename))
2677 _dbus_assert_not_reached ("couldn't allocate full path");
2679 _dbus_string_free (&filename);
2680 if (!_dbus_string_init (&filename))
2681 _dbus_assert_not_reached ("didn't allocate filename string\n");
2683 dbus_error_init (&error);
2684 dir = _dbus_directory_open (&test_directory, &error);
2687 _dbus_warn ("Could not open %s: %s\n",
2688 _dbus_string_get_const_data (&test_directory),
2690 dbus_error_free (&error);
2694 if (validity == VALID)
2695 printf ("Testing valid files:\n");
2696 else if (validity == INVALID)
2697 printf ("Testing invalid files:\n");
2699 printf ("Testing unknown files:\n");
2702 while (_dbus_directory_get_next_file (dir, &filename, &error))
2704 DBusString full_path;
2707 if (!_dbus_string_init (&full_path))
2708 _dbus_assert_not_reached ("couldn't init string");
2710 if (!_dbus_string_copy (&test_directory, 0, &full_path, 0))
2711 _dbus_assert_not_reached ("couldn't copy dir to full_path");
2713 if (!_dbus_concat_dir_and_file (&full_path, &filename))
2714 _dbus_assert_not_reached ("couldn't concat file to dir");
2716 if (!_dbus_string_ends_with_c_str (&full_path, ".conf"))
2718 _dbus_verbose ("Skipping non-.conf file %s\n",
2719 _dbus_string_get_const_data (&filename));
2720 _dbus_string_free (&full_path);
2724 printf (" %s\n", _dbus_string_get_const_data (&filename));
2726 _dbus_verbose (" expecting %s\n",
2727 validity == VALID ? "valid" :
2728 (validity == INVALID ? "invalid" :
2729 (validity == UNKNOWN ? "unknown" : "???")));
2731 d.full_path = &full_path;
2732 d.validity = validity;
2734 /* FIXME hackaround for an expat problem, see
2735 * https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124747
2736 * http://freedesktop.org/pipermail/dbus/2004-May/001153.html
2738 /* if (!_dbus_test_oom_handling ("config-loader", check_loader_oom_func, &d)) */
2739 if (!check_loader_oom_func (&d))
2740 _dbus_assert_not_reached ("test failed");
2742 _dbus_string_free (&full_path);
2745 if (dbus_error_is_set (&error))
2747 _dbus_warn ("Could not get next file in %s: %s\n",
2748 _dbus_string_get_const_data (&test_directory),
2750 dbus_error_free (&error);
2759 _dbus_directory_close (dir);
2760 _dbus_string_free (&test_directory);
2761 _dbus_string_free (&filename);
2767 bools_equal (dbus_bool_t a,
2774 strings_equal_or_both_null (const char *a,
2777 if (a == NULL || b == NULL)
2780 return !strcmp (a, b);
2784 elements_equal (const Element *a,
2787 if (a->type != b->type)
2790 if (!bools_equal (a->had_content, b->had_content))
2796 case ELEMENT_INCLUDE:
2797 if (!bools_equal (a->d.include.ignore_missing,
2798 b->d.include.ignore_missing))
2802 case ELEMENT_POLICY:
2803 if (a->d.policy.type != b->d.policy.type)
2805 if (a->d.policy.gid_uid_or_at_console != b->d.policy.gid_uid_or_at_console)
2810 if (strcmp (a->d.limit.name, b->d.limit.name))
2812 if (a->d.limit.value != b->d.limit.value)
2826 lists_of_elements_equal (DBusList *a,
2835 while (ia != NULL && ib != NULL)
2837 if (elements_equal (ia->data, ib->data))
2839 ia = _dbus_list_get_next_link (&a, ia);
2840 ib = _dbus_list_get_next_link (&b, ib);
2843 return ia == NULL && ib == NULL;
2847 lists_of_c_strings_equal (DBusList *a,
2856 while (ia != NULL && ib != NULL)
2858 if (strcmp (ia->data, ib->data))
2860 ia = _dbus_list_get_next_link (&a, ia);
2861 ib = _dbus_list_get_next_link (&b, ib);
2864 return ia == NULL && ib == NULL;
2868 limits_equal (const BusLimits *a,
2872 (a->max_incoming_bytes == b->max_incoming_bytes
2873 || a->max_outgoing_bytes == b->max_outgoing_bytes
2874 || a->max_message_size == b->max_message_size
2875 || a->activation_timeout == b->activation_timeout
2876 || a->auth_timeout == b->auth_timeout
2877 || a->max_completed_connections == b->max_completed_connections
2878 || a->max_incomplete_connections == b->max_incomplete_connections
2879 || a->max_connections_per_user == b->max_connections_per_user
2880 || a->max_pending_activations == b->max_pending_activations
2881 || a->max_services_per_connection == b->max_services_per_connection
2882 || a->max_match_rules_per_connection == b->max_match_rules_per_connection
2883 || a->max_replies_per_connection == b->max_replies_per_connection
2884 || a->reply_timeout == b->reply_timeout);
2888 config_parsers_equal (const BusConfigParser *a,
2889 const BusConfigParser *b)
2891 if (!_dbus_string_equal (&a->basedir, &b->basedir))
2894 if (!lists_of_elements_equal (a->stack, b->stack))
2897 if (!strings_equal_or_both_null (a->user, b->user))
2900 if (!lists_of_c_strings_equal (a->listen_on, b->listen_on))
2903 if (!lists_of_c_strings_equal (a->mechanisms, b->mechanisms))
2906 if (!lists_of_c_strings_equal (a->service_dirs, b->service_dirs))
2909 /* FIXME: compare policy */
2911 /* FIXME: compare service selinux ID table */
2913 if (! limits_equal (&a->limits, &b->limits))
2916 if (!strings_equal_or_both_null (a->pidfile, b->pidfile))
2919 if (! bools_equal (a->fork, b->fork))
2922 if (! bools_equal (a->is_toplevel, b->is_toplevel))
2929 all_are_equiv (const DBusString *target_directory)
2931 DBusString filename;
2933 BusConfigParser *first_parser;
2934 BusConfigParser *parser;
2940 first_parser = NULL;
2944 if (!_dbus_string_init (&filename))
2945 _dbus_assert_not_reached ("didn't allocate filename string");
2947 dbus_error_init (&error);
2948 dir = _dbus_directory_open (target_directory, &error);
2951 _dbus_warn ("Could not open %s: %s\n",
2952 _dbus_string_get_const_data (target_directory),
2954 dbus_error_free (&error);
2958 printf ("Comparing equivalent files:\n");
2961 while (_dbus_directory_get_next_file (dir, &filename, &error))
2963 DBusString full_path;
2965 if (!_dbus_string_init (&full_path))
2966 _dbus_assert_not_reached ("couldn't init string");
2968 if (!_dbus_string_copy (target_directory, 0, &full_path, 0))
2969 _dbus_assert_not_reached ("couldn't copy dir to full_path");
2971 if (!_dbus_concat_dir_and_file (&full_path, &filename))
2972 _dbus_assert_not_reached ("couldn't concat file to dir");
2974 if (!_dbus_string_ends_with_c_str (&full_path, ".conf"))
2976 _dbus_verbose ("Skipping non-.conf file %s\n",
2977 _dbus_string_get_const_data (&filename));
2978 _dbus_string_free (&full_path);
2982 printf (" %s\n", _dbus_string_get_const_data (&filename));
2984 parser = bus_config_load (&full_path, TRUE, NULL, &error);
2988 _dbus_warn ("Could not load file %s: %s\n",
2989 _dbus_string_get_const_data (&full_path),
2991 _dbus_string_free (&full_path);
2992 dbus_error_free (&error);
2995 else if (first_parser == NULL)
2997 _dbus_string_free (&full_path);
2998 first_parser = parser;
3002 _dbus_string_free (&full_path);
3003 equal = config_parsers_equal (first_parser, parser);
3004 bus_config_parser_unref (parser);
3013 _dbus_string_free (&filename);
3015 bus_config_parser_unref (first_parser);
3017 _dbus_directory_close (dir);
3024 process_test_equiv_subdir (const DBusString *test_base_dir,
3027 DBusString test_directory;
3028 DBusString filename;
3037 if (!_dbus_string_init (&test_directory))
3038 _dbus_assert_not_reached ("didn't allocate test_directory");
3040 _dbus_string_init_const (&filename, subdir);
3042 if (!_dbus_string_copy (test_base_dir, 0,
3043 &test_directory, 0))
3044 _dbus_assert_not_reached ("couldn't copy test_base_dir to test_directory");
3046 if (!_dbus_concat_dir_and_file (&test_directory, &filename))
3047 _dbus_assert_not_reached ("couldn't allocate full path");
3049 _dbus_string_free (&filename);
3050 if (!_dbus_string_init (&filename))
3051 _dbus_assert_not_reached ("didn't allocate filename string");
3053 dbus_error_init (&error);
3054 dir = _dbus_directory_open (&test_directory, &error);
3057 _dbus_warn ("Could not open %s: %s\n",
3058 _dbus_string_get_const_data (&test_directory),
3060 dbus_error_free (&error);
3064 while (_dbus_directory_get_next_file (dir, &filename, &error))
3066 DBusString full_path;
3068 /* Skip CVS's magic directories! */
3069 if (_dbus_string_equal_c_str (&filename, "CVS"))
3072 if (!_dbus_string_init (&full_path))
3073 _dbus_assert_not_reached ("couldn't init string");
3075 if (!_dbus_string_copy (&test_directory, 0, &full_path, 0))
3076 _dbus_assert_not_reached ("couldn't copy dir to full_path");
3078 if (!_dbus_concat_dir_and_file (&full_path, &filename))
3079 _dbus_assert_not_reached ("couldn't concat file to dir");
3081 equal = all_are_equiv (&full_path);
3082 _dbus_string_free (&full_path);
3091 _dbus_string_free (&test_directory);
3092 _dbus_string_free (&filename);
3094 _dbus_directory_close (dir);
3100 static const char *test_service_dir_matches[] =
3102 #ifndef __SYMBIAN32__
3103 "/testusr/testlocal/testshare/dbus-1/services",
3104 "/testusr/testshare/dbus-1/services",
3105 DBUS_DATADIR"/dbus-1/services",
3106 "/testhome/foo/.testlocal/testshare/dbus-1/services",
3108 DBUS_DATADIR"\\dbus1\\services",
3109 /* Certain files such as jabber.service are exported and included in the rom builds by other components.
3110 * These are not available for emulator environments and hence added explictly for hardware platforms.
3112 #if (! defined __WINSCW__)
3113 "z:\\data\\dbus\\dbus1\\services",
3121 test_default_session_servicedirs (void)
3129 printf ("Testing retriving the default session service directories\n");
3130 if (!_dbus_get_standard_session_servicedirs (&dirs))
3131 _dbus_assert_not_reached ("couldn't get stardard dirs");
3133 /* make sure our defaults end with share/dbus-1/service */
3134 while ((link = _dbus_list_pop_first_link (&dirs)))
3138 printf (" default service dir: %s\n", (char *)link->data);
3139 _dbus_string_init_const (&path, (char *)link->data);
3140 #ifdef __SYMBIAN32__
3141 if (!_dbus_string_ends_with_c_str (&path, "\\dbus\\dbus1\\services"))
3143 if (!_dbus_string_ends_with_c_str (&path, "share/dbus-1/services"))
3146 printf ("error with default session service directories\n");
3150 dbus_free (link->data);
3151 _dbus_list_free_link (link);
3155 if (!_dbus_setenv ("XDG_DATA_HOME", "/testhome/foo/.testlocal/testshare"))
3156 _dbus_assert_not_reached ("couldn't setenv XDG_DATA_HOME");
3158 if (!_dbus_setenv ("XDG_DATA_DIRS", ":/testusr/testlocal/testshare: :/testusr/testshare:"))
3159 _dbus_assert_not_reached ("couldn't setenv XDG_DATA_DIRS");
3161 if (!_dbus_get_standard_session_servicedirs (&dirs))
3162 _dbus_assert_not_reached ("couldn't get stardard dirs");
3164 /* make sure we read and parse the env variable correctly */
3166 while ((link = _dbus_list_pop_first_link (&dirs)))
3168 printf (" test service dir: %s\n", (char *)link->data);
3169 if (test_service_dir_matches[i] == NULL)
3171 printf ("more directories parsed than in match set\n");
3175 if (strcasecmp (test_service_dir_matches[i],
3176 (char *)link->data) != 0)
3178 printf ("%s directory does not match %s in the match set\n",
3180 test_service_dir_matches[i]);
3186 dbus_free (link->data);
3187 _dbus_list_free_link (link);
3190 if (test_service_dir_matches[i] != NULL)
3192 printf ("extra data %s in the match set was not matched\n",
3193 test_service_dir_matches[i]);
3202 bus_config_parser_test (const DBusString *test_data_dir)
3204 if (test_data_dir == NULL ||
3205 _dbus_string_get_length (test_data_dir) == 0)
3207 printf ("No test data\n");
3211 if (!test_default_session_servicedirs())
3214 if (!process_test_valid_subdir (test_data_dir, "valid-config-files", VALID))
3217 if (!process_test_valid_subdir (test_data_dir, "invalid-config-files", INVALID))
3220 if (!process_test_equiv_subdir (test_data_dir, "equiv-config-files"))
3226 #endif /* DBUS_BUILD_TESTS */