os/ossrv/ofdbus/dbus/bus/policy.c
author sl@SLION-WIN7.fritz.box
Fri, 15 Jun 2012 03:10:57 +0200
changeset 0 bde4ae8d615e
permissions -rw-r--r--
First public contribution.
     1 /* -*- mode: C; c-file-style: "gnu" -*- */
     2 /* policy.c  Bus security policy
     3  *
     4  * Copyright (C) 2003, 2004  Red Hat, Inc.
     5  * Portion Copyright © 2008 Nokia Corporation and/or its subsidiary(-ies). All rights reserved.
     6  * Licensed under the Academic Free License version 2.1
     7  * 
     8  * This program is free software; you can redistribute it and/or modify
     9  * it under the terms of the GNU General Public License as published by
    10  * the Free Software Foundation; either version 2 of the License, or
    11  * (at your option) any later version.
    12  *
    13  * This program is distributed in the hope that it will be useful,
    14  * but WITHOUT ANY WARRANTY; without even the implied warranty of
    15  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    16  * GNU General Public License for more details.
    17  * 
    18  * You should have received a copy of the GNU General Public License
    19  * along with this program; if not, write to the Free Software
    20  * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
    21  *
    22  */
    23 
    24 #include "policy.h"
    25 #include "services.h"
    26 #include "test.h"
    27 #include "utils.h"
    28 #ifndef __SYMBIAN32__
    29 #include <dbus/dbus-list.h>
    30 #include <dbus/dbus-hash.h>
    31 #include <dbus/dbus-internals.h>
    32 #else
    33 #include "dbus-list.h"
    34 #include "dbus-hash.h"
    35 #include "dbus-internals.h"
    36 #endif //__SYMBIAN32__
    37 
    38 BusPolicyRule*
    39 bus_policy_rule_new (BusPolicyRuleType type,
    40                      dbus_bool_t       allow)
    41 {
    42   BusPolicyRule *rule;
    43 
    44   rule = dbus_new0 (BusPolicyRule, 1);
    45   if (rule == NULL)
    46     return NULL;
    47 
    48   rule->type = type;
    49   rule->refcount = 1;
    50   rule->allow = allow;
    51 
    52   switch (rule->type)
    53     {
    54     case BUS_POLICY_RULE_USER:
    55       rule->d.user.uid = DBUS_UID_UNSET;
    56       break;
    57     case BUS_POLICY_RULE_GROUP:
    58       rule->d.group.gid = DBUS_GID_UNSET;
    59       break;
    60     case BUS_POLICY_RULE_SEND:
    61       rule->d.send.message_type = DBUS_MESSAGE_TYPE_INVALID;
    62 
    63       /* allow rules default to TRUE (only requested replies allowed)
    64        * deny rules default to FALSE (only unrequested replies denied)
    65        */
    66       rule->d.send.requested_reply = rule->allow;
    67       break;
    68     case BUS_POLICY_RULE_RECEIVE:
    69       rule->d.receive.message_type = DBUS_MESSAGE_TYPE_INVALID;
    70       /* allow rules default to TRUE (only requested replies allowed)
    71        * deny rules default to FALSE (only unrequested replies denied)
    72        */
    73       rule->d.receive.requested_reply = rule->allow;
    74       break;
    75     case BUS_POLICY_RULE_OWN:
    76       break;
    77     }
    78   
    79   return rule;
    80 }
    81 
    82 BusPolicyRule *
    83 bus_policy_rule_ref (BusPolicyRule *rule)
    84 {
    85   _dbus_assert (rule->refcount > 0);
    86 
    87   rule->refcount += 1;
    88 
    89   return rule;
    90 }
    91 
    92 void
    93 bus_policy_rule_unref (BusPolicyRule *rule)
    94 {
    95   _dbus_assert (rule->refcount > 0);
    96 
    97   rule->refcount -= 1;
    98   
    99   if (rule->refcount == 0)
   100     {
   101       switch (rule->type)
   102         {
   103         case BUS_POLICY_RULE_SEND:
   104           dbus_free (rule->d.send.path);
   105           dbus_free (rule->d.send.interface);
   106           dbus_free (rule->d.send.member);
   107           dbus_free (rule->d.send.error);
   108           dbus_free (rule->d.send.destination);
   109           break;
   110         case BUS_POLICY_RULE_RECEIVE:
   111           dbus_free (rule->d.receive.path);
   112           dbus_free (rule->d.receive.interface);
   113           dbus_free (rule->d.receive.member);
   114           dbus_free (rule->d.receive.error);
   115           dbus_free (rule->d.receive.origin);
   116           break;
   117         case BUS_POLICY_RULE_OWN:
   118           dbus_free (rule->d.own.service_name);
   119           break;
   120         case BUS_POLICY_RULE_USER:
   121           break;
   122         case BUS_POLICY_RULE_GROUP:
   123           break;
   124         }
   125       
   126       dbus_free (rule);
   127     }
   128 }
   129 
   130 struct BusPolicy
   131 {
   132   int refcount;
   133 
   134   DBusList *default_rules;         /**< Default policy rules */
   135   DBusList *mandatory_rules;       /**< Mandatory policy rules */
   136   DBusHashTable *rules_by_uid;     /**< per-UID policy rules */
   137   DBusHashTable *rules_by_gid;     /**< per-GID policy rules */
   138   DBusList *at_console_true_rules; /**< console user policy rules where at_console="true"*/
   139   DBusList *at_console_false_rules; /**< console user policy rules where at_console="false"*/
   140 };
   141 
   142 static void
   143 free_rule_func (void *data,
   144                 void *user_data)
   145 {
   146   BusPolicyRule *rule = data;
   147 
   148   bus_policy_rule_unref (rule);
   149 }
   150 
   151 static void
   152 free_rule_list_func (void *data)
   153 {
   154   DBusList **list = data;
   155 
   156   if (list == NULL) /* DBusHashTable is on crack */
   157     return;
   158   
   159   _dbus_list_foreach (list, free_rule_func, NULL);
   160   
   161   _dbus_list_clear (list);
   162 
   163   dbus_free (list);
   164 }
   165 
   166 BusPolicy*
   167 bus_policy_new (void)
   168 {
   169   BusPolicy *policy;
   170 
   171   policy = dbus_new0 (BusPolicy, 1);
   172   if (policy == NULL)
   173     return NULL;
   174 
   175   policy->refcount = 1;
   176   
   177   policy->rules_by_uid = _dbus_hash_table_new (DBUS_HASH_ULONG,
   178                                                NULL,
   179                                                free_rule_list_func);
   180   if (policy->rules_by_uid == NULL)
   181     goto failed;
   182 
   183   policy->rules_by_gid = _dbus_hash_table_new (DBUS_HASH_ULONG,
   184                                                NULL,
   185                                                free_rule_list_func);
   186   if (policy->rules_by_gid == NULL)
   187     goto failed;
   188 
   189   return policy;
   190   
   191  failed:
   192   bus_policy_unref (policy);
   193   return NULL;
   194 }
   195 
   196 BusPolicy *
   197 bus_policy_ref (BusPolicy *policy)
   198 {
   199   _dbus_assert (policy->refcount > 0);
   200 
   201   policy->refcount += 1;
   202 
   203   return policy;
   204 }
   205 
   206 void
   207 bus_policy_unref (BusPolicy *policy)
   208 {
   209   _dbus_assert (policy->refcount > 0);
   210 
   211   policy->refcount -= 1;
   212 
   213   if (policy->refcount == 0)
   214     {
   215       _dbus_list_foreach (&policy->default_rules, free_rule_func, NULL);
   216       _dbus_list_clear (&policy->default_rules);
   217 
   218       _dbus_list_foreach (&policy->mandatory_rules, free_rule_func, NULL);
   219       _dbus_list_clear (&policy->mandatory_rules);
   220 
   221       _dbus_list_foreach (&policy->at_console_true_rules, free_rule_func, NULL);
   222       _dbus_list_clear (&policy->at_console_true_rules);
   223 
   224       _dbus_list_foreach (&policy->at_console_false_rules, free_rule_func, NULL);
   225       _dbus_list_clear (&policy->at_console_false_rules);
   226 
   227       if (policy->rules_by_uid)
   228         {
   229           _dbus_hash_table_unref (policy->rules_by_uid);
   230           policy->rules_by_uid = NULL;
   231         }
   232 
   233       if (policy->rules_by_gid)
   234         {
   235           _dbus_hash_table_unref (policy->rules_by_gid);
   236           policy->rules_by_gid = NULL;
   237         }
   238       
   239       dbus_free (policy);
   240     }
   241 }
   242 
   243 static dbus_bool_t
   244 add_list_to_client (DBusList        **list,
   245                     BusClientPolicy  *client)
   246 {
   247   DBusList *link;
   248 
   249   link = _dbus_list_get_first_link (list);
   250   while (link != NULL)
   251     {
   252       BusPolicyRule *rule = link->data;
   253       link = _dbus_list_get_next_link (list, link);
   254 
   255       switch (rule->type)
   256         {
   257         case BUS_POLICY_RULE_USER:
   258         case BUS_POLICY_RULE_GROUP:
   259           /* These aren't per-connection policies */
   260           break;
   261 
   262         case BUS_POLICY_RULE_OWN:
   263         case BUS_POLICY_RULE_SEND:
   264         case BUS_POLICY_RULE_RECEIVE:
   265           /* These are per-connection */
   266           if (!bus_client_policy_append_rule (client, rule))
   267             return FALSE;
   268           break;
   269         }
   270     }
   271   
   272   return TRUE;
   273 }
   274 
   275 BusClientPolicy*
   276 bus_policy_create_client_policy (BusPolicy      *policy,
   277                                  DBusConnection *connection,
   278                                  DBusError      *error)
   279 {
   280   BusClientPolicy *client;
   281   dbus_uid_t uid;
   282   dbus_bool_t at_console;
   283 
   284   _dbus_assert (dbus_connection_get_is_authenticated (connection));
   285   _DBUS_ASSERT_ERROR_IS_CLEAR (error);
   286   
   287   client = bus_client_policy_new ();
   288   if (client == NULL)
   289     goto nomem;
   290 
   291   if (!add_list_to_client (&policy->default_rules,
   292                            client))
   293     goto nomem;
   294 
   295   /* we avoid the overhead of looking up user's groups
   296    * if we don't have any group rules anyway
   297    */
   298   if (_dbus_hash_table_get_n_entries (policy->rules_by_gid) > 0)
   299     {
   300       unsigned long *groups;
   301       int n_groups;
   302       int i;
   303       
   304       if (!bus_connection_get_groups (connection, &groups, &n_groups, error))
   305         goto failed;
   306       
   307       i = 0;
   308       while (i < n_groups)
   309         {
   310           DBusList **list;
   311           
   312           list = _dbus_hash_table_lookup_ulong (policy->rules_by_gid,
   313                                                 groups[i]);
   314           
   315           if (list != NULL)
   316             {
   317               if (!add_list_to_client (list, client))
   318                 {
   319                   dbus_free (groups);
   320                   goto nomem;
   321                 }
   322             }
   323           
   324           ++i;
   325         }
   326 
   327       dbus_free (groups);
   328     }
   329 
   330   if (!dbus_connection_get_unix_user (connection, &uid))
   331     {
   332       dbus_set_error (error, DBUS_ERROR_FAILED,
   333                       "No user ID known for connection, cannot determine security policy\n");
   334       goto failed;
   335     }
   336 
   337   if (_dbus_hash_table_get_n_entries (policy->rules_by_uid) > 0)
   338     {
   339       DBusList **list;
   340       
   341       list = _dbus_hash_table_lookup_ulong (policy->rules_by_uid,
   342                                             uid);
   343 
   344       if (list != NULL)
   345         {
   346           if (!add_list_to_client (list, client))
   347             goto nomem;
   348         }
   349     }
   350 
   351   /* Add console rules */
   352   at_console = _dbus_is_console_user (uid, error);
   353 
   354   if (at_console)
   355     {
   356       if (!add_list_to_client (&policy->at_console_true_rules, client))
   357         goto nomem;
   358     }
   359   else if (dbus_error_is_set (error) == TRUE)
   360     {
   361       goto failed;
   362     }
   363   else if (!add_list_to_client (&policy->at_console_false_rules, client))
   364     {
   365       goto nomem;
   366     }
   367 
   368   if (!add_list_to_client (&policy->mandatory_rules,
   369                            client))
   370     goto nomem;
   371 
   372   bus_client_policy_optimize (client);
   373   
   374   return client;
   375 
   376  nomem:
   377   BUS_SET_OOM (error);
   378  failed:
   379   _DBUS_ASSERT_ERROR_IS_SET (error);
   380   if (client)
   381     bus_client_policy_unref (client);
   382   return NULL;
   383 }
   384 
   385 static dbus_bool_t
   386 list_allows_user (dbus_bool_t           def,
   387                   DBusList            **list,
   388                   unsigned long         uid,
   389                   const unsigned long  *group_ids,
   390                   int                   n_group_ids)
   391 {
   392   DBusList *link;
   393   dbus_bool_t allowed;
   394   
   395   allowed = def;
   396 
   397   link = _dbus_list_get_first_link (list);
   398   while (link != NULL)
   399     {
   400       BusPolicyRule *rule = link->data;
   401       link = _dbus_list_get_next_link (list, link);
   402 
   403       if (rule->type == BUS_POLICY_RULE_USER)
   404         {
   405           _dbus_verbose ("List %p user rule uid="DBUS_UID_FORMAT"\n",
   406                          list, rule->d.user.uid);
   407           
   408           if (rule->d.user.uid == DBUS_UID_UNSET)
   409             ; /* '*' wildcard */
   410           else if (rule->d.user.uid != uid)
   411             continue;
   412         }
   413       else if (rule->type == BUS_POLICY_RULE_GROUP)
   414         {
   415           _dbus_verbose ("List %p group rule uid="DBUS_UID_FORMAT"\n",
   416                          list, rule->d.user.uid);
   417           
   418           if (rule->d.group.gid == DBUS_GID_UNSET)
   419             ;  /* '*' wildcard */
   420           else
   421             {
   422               int i;
   423               
   424               i = 0;
   425               while (i < n_group_ids)
   426                 {
   427                   if (rule->d.group.gid == group_ids[i])
   428                     break;
   429                   ++i;
   430                 }
   431               
   432               if (i == n_group_ids)
   433                 continue;
   434             }
   435         }
   436       else
   437         continue;
   438 
   439       allowed = rule->allow;
   440     }
   441   
   442   return allowed;
   443 }
   444 
   445 dbus_bool_t
   446 bus_policy_allow_user (BusPolicy        *policy,
   447                        DBusUserDatabase *user_database,
   448                        unsigned long     uid)
   449 {
   450   dbus_bool_t allowed;
   451   unsigned long *group_ids;
   452   int n_group_ids;
   453 
   454   /* On OOM or error we always reject the user */
   455   if (!_dbus_user_database_get_groups (user_database,
   456                                        uid, &group_ids, &n_group_ids, NULL))
   457     {
   458       _dbus_verbose ("Did not get any groups for UID %lu\n",
   459                      uid);
   460       return FALSE;
   461     }
   462 
   463   /* Default to "user owning bus" or root can connect */
   464   allowed = uid == _dbus_getuid ();
   465 
   466   allowed = list_allows_user (allowed,
   467                               &policy->default_rules,
   468                               uid,
   469                               group_ids, n_group_ids);
   470 
   471   allowed = list_allows_user (allowed,
   472                               &policy->mandatory_rules,
   473                               uid,
   474                               group_ids, n_group_ids);
   475 
   476   dbus_free (group_ids);
   477 
   478   _dbus_verbose ("UID %lu allowed = %d\n", uid, allowed);
   479   
   480   return allowed;
   481 }
   482 
   483 dbus_bool_t
   484 bus_policy_append_default_rule (BusPolicy      *policy,
   485                                 BusPolicyRule  *rule)
   486 {
   487   if (!_dbus_list_append (&policy->default_rules, rule))
   488     return FALSE;
   489 
   490   bus_policy_rule_ref (rule);
   491 
   492   return TRUE;
   493 }
   494 
   495 dbus_bool_t
   496 bus_policy_append_mandatory_rule (BusPolicy      *policy,
   497                                   BusPolicyRule  *rule)
   498 {
   499   if (!_dbus_list_append (&policy->mandatory_rules, rule))
   500     return FALSE;
   501 
   502   bus_policy_rule_ref (rule);
   503 
   504   return TRUE;
   505 }
   506 
   507 
   508 
   509 static DBusList**
   510 get_list (DBusHashTable *hash,
   511           unsigned long  key)
   512 {
   513   DBusList **list;
   514 
   515   list = _dbus_hash_table_lookup_ulong (hash, key);
   516 
   517   if (list == NULL)
   518     {
   519       list = dbus_new0 (DBusList*, 1);
   520       if (list == NULL)
   521         return NULL;
   522 
   523       if (!_dbus_hash_table_insert_ulong (hash, key, list))
   524         {
   525           dbus_free (list);
   526           return NULL;
   527         }
   528     }
   529 
   530   return list;
   531 }
   532 
   533 dbus_bool_t
   534 bus_policy_append_user_rule (BusPolicy      *policy,
   535                              dbus_uid_t      uid,
   536                              BusPolicyRule  *rule)
   537 {
   538   DBusList **list;
   539 
   540   list = get_list (policy->rules_by_uid, uid);
   541 
   542   if (list == NULL)
   543     return FALSE;
   544 
   545   if (!_dbus_list_append (list, rule))
   546     return FALSE;
   547 
   548   bus_policy_rule_ref (rule);
   549 
   550   return TRUE;
   551 }
   552 
   553 dbus_bool_t
   554 bus_policy_append_group_rule (BusPolicy      *policy,
   555                               dbus_gid_t      gid,
   556                               BusPolicyRule  *rule)
   557 {
   558   DBusList **list;
   559 
   560   list = get_list (policy->rules_by_gid, gid);
   561 
   562   if (list == NULL)
   563     return FALSE;
   564 
   565   if (!_dbus_list_append (list, rule))
   566     return FALSE;
   567 
   568   bus_policy_rule_ref (rule);
   569 
   570   return TRUE;
   571 }
   572 
   573 dbus_bool_t
   574 bus_policy_append_console_rule (BusPolicy      *policy,
   575                                 dbus_bool_t     at_console,
   576                                 BusPolicyRule  *rule)
   577 {
   578   if (at_console)
   579     {
   580       if (!_dbus_list_append (&policy->at_console_true_rules, rule))
   581         return FALSE;
   582     }
   583     else
   584     {
   585       if (!_dbus_list_append (&policy->at_console_false_rules, rule))
   586         return FALSE;
   587     }
   588 
   589   bus_policy_rule_ref (rule);
   590 
   591   return TRUE;
   592 
   593 }
   594 
   595 static dbus_bool_t
   596 append_copy_of_policy_list (DBusList **list,
   597                             DBusList **to_append)
   598 {
   599   DBusList *link;
   600   DBusList *tmp_list;
   601 
   602   tmp_list = NULL;
   603 
   604   /* Preallocate all our links */
   605   link = _dbus_list_get_first_link (to_append);
   606   while (link != NULL)
   607     {
   608       if (!_dbus_list_append (&tmp_list, link->data))
   609         {
   610           _dbus_list_clear (&tmp_list);
   611           return FALSE;
   612         }
   613       
   614       link = _dbus_list_get_next_link (to_append, link);
   615     }
   616 
   617   /* Now append them */
   618   while ((link = _dbus_list_pop_first_link (&tmp_list)))
   619     {
   620       bus_policy_rule_ref (link->data);
   621       _dbus_list_append_link (list, link);
   622     }
   623 
   624   return TRUE;
   625 }
   626 
   627 static dbus_bool_t
   628 merge_id_hash (DBusHashTable *dest,
   629                DBusHashTable *to_absorb)
   630 {
   631   DBusHashIter iter;
   632   
   633   _dbus_hash_iter_init (to_absorb, &iter);
   634   while (_dbus_hash_iter_next (&iter))
   635     {
   636       unsigned long id = _dbus_hash_iter_get_ulong_key (&iter);
   637       DBusList **list = _dbus_hash_iter_get_value (&iter);
   638       DBusList **target = get_list (dest, id);
   639 
   640       if (target == NULL)
   641         return FALSE;
   642 
   643       if (!append_copy_of_policy_list (target, list))
   644         return FALSE;
   645     }
   646 
   647   return TRUE;
   648 }
   649 
   650 dbus_bool_t
   651 bus_policy_merge (BusPolicy *policy,
   652                   BusPolicy *to_absorb)
   653 {
   654   /* FIXME Not properly atomic, but as used for configuration files we
   655    * don't rely on it quite so much.
   656    */
   657   
   658   if (!append_copy_of_policy_list (&policy->default_rules,
   659                                    &to_absorb->default_rules))
   660     return FALSE;
   661   
   662   if (!append_copy_of_policy_list (&policy->mandatory_rules,
   663                                    &to_absorb->mandatory_rules))
   664     return FALSE;
   665 
   666   if (!append_copy_of_policy_list (&policy->at_console_true_rules,
   667                                    &to_absorb->at_console_true_rules))
   668     return FALSE;
   669 
   670   if (!append_copy_of_policy_list (&policy->at_console_false_rules,
   671                                    &to_absorb->at_console_false_rules))
   672     return FALSE;
   673 
   674   if (!merge_id_hash (policy->rules_by_uid,
   675                       to_absorb->rules_by_uid))
   676     return FALSE;
   677   
   678   if (!merge_id_hash (policy->rules_by_gid,
   679                       to_absorb->rules_by_gid))
   680     return FALSE;
   681 
   682   return TRUE;
   683 }
   684 
   685 struct BusClientPolicy
   686 {
   687   int refcount;
   688 
   689   DBusList *rules;
   690 };
   691 
   692 BusClientPolicy*
   693 bus_client_policy_new (void)
   694 {
   695   BusClientPolicy *policy;
   696 
   697   policy = dbus_new0 (BusClientPolicy, 1);
   698   if (policy == NULL)
   699     return NULL;
   700 
   701   policy->refcount = 1;
   702 
   703   return policy;
   704 }
   705 
   706 BusClientPolicy *
   707 bus_client_policy_ref (BusClientPolicy *policy)
   708 {
   709   _dbus_assert (policy->refcount > 0);
   710 
   711   policy->refcount += 1;
   712 
   713   return policy;
   714 }
   715 
   716 static void
   717 rule_unref_foreach (void *data,
   718                     void *user_data)
   719 {
   720   BusPolicyRule *rule = data;
   721 
   722   bus_policy_rule_unref (rule);
   723 }
   724 
   725 void
   726 bus_client_policy_unref (BusClientPolicy *policy)
   727 {
   728   _dbus_assert (policy->refcount > 0);
   729 
   730   policy->refcount -= 1;
   731 
   732   if (policy->refcount == 0)
   733     {
   734       _dbus_list_foreach (&policy->rules,
   735                           rule_unref_foreach,
   736                           NULL);
   737 
   738       _dbus_list_clear (&policy->rules);
   739 
   740       dbus_free (policy);
   741     }
   742 }
   743 
   744 static void
   745 remove_rules_by_type_up_to (BusClientPolicy   *policy,
   746                             BusPolicyRuleType  type,
   747                             DBusList          *up_to)
   748 {
   749   DBusList *link;
   750 
   751   link = _dbus_list_get_first_link (&policy->rules);
   752   while (link != up_to)
   753     {
   754       BusPolicyRule *rule = link->data;
   755       DBusList *next = _dbus_list_get_next_link (&policy->rules, link);
   756 
   757       if (rule->type == type)
   758         {
   759           _dbus_list_remove_link (&policy->rules, link);
   760           bus_policy_rule_unref (rule);
   761         }
   762       
   763       link = next;
   764     }
   765 }
   766 
   767 void
   768 bus_client_policy_optimize (BusClientPolicy *policy)
   769 {
   770   DBusList *link;
   771 
   772   /* The idea here is that if we have:
   773    * 
   774    * <allow send_interface="foo.bar"/>
   775    * <deny send_interface="*"/>
   776    *
   777    * (for example) the deny will always override the allow.  So we
   778    * delete the allow. Ditto for deny followed by allow, etc. This is
   779    * a dumb thing to put in a config file, but the <include> feature
   780    * of files allows for an "inheritance and override" pattern where
   781    * it could make sense. If an included file wants to "start over"
   782    * with a blanket deny, no point keeping the rules from the parent
   783    * file.
   784    */
   785 
   786   _dbus_verbose ("Optimizing policy with %d rules\n",
   787                  _dbus_list_get_length (&policy->rules));
   788   
   789   link = _dbus_list_get_first_link (&policy->rules);
   790   while (link != NULL)
   791     {
   792       BusPolicyRule *rule;
   793       DBusList *next;
   794       dbus_bool_t remove_preceding;
   795 
   796       next = _dbus_list_get_next_link (&policy->rules, link);
   797       rule = link->data;
   798       
   799       remove_preceding = FALSE;
   800 
   801       _dbus_assert (rule != NULL);
   802       
   803       switch (rule->type)
   804         {
   805         case BUS_POLICY_RULE_SEND:
   806           remove_preceding =
   807             rule->d.send.message_type == DBUS_MESSAGE_TYPE_INVALID &&
   808             rule->d.send.path == NULL &&
   809             rule->d.send.interface == NULL &&
   810             rule->d.send.member == NULL &&
   811             rule->d.send.error == NULL &&
   812             rule->d.send.destination == NULL;
   813           break;
   814         case BUS_POLICY_RULE_RECEIVE:
   815           remove_preceding =
   816             rule->d.receive.message_type == DBUS_MESSAGE_TYPE_INVALID &&
   817             rule->d.receive.path == NULL &&
   818             rule->d.receive.interface == NULL &&
   819             rule->d.receive.member == NULL &&
   820             rule->d.receive.error == NULL &&
   821             rule->d.receive.origin == NULL;
   822           break;
   823         case BUS_POLICY_RULE_OWN:
   824           remove_preceding =
   825             rule->d.own.service_name == NULL;
   826           break;
   827         case BUS_POLICY_RULE_USER:
   828         case BUS_POLICY_RULE_GROUP:
   829           _dbus_assert_not_reached ("invalid rule");
   830           break;
   831         }
   832 
   833       if (remove_preceding)
   834         remove_rules_by_type_up_to (policy, rule->type,
   835                                     link);
   836       
   837       link = next;
   838     }
   839 
   840   _dbus_verbose ("After optimization, policy has %d rules\n",
   841                  _dbus_list_get_length (&policy->rules));
   842 }
   843 
   844 dbus_bool_t
   845 bus_client_policy_append_rule (BusClientPolicy *policy,
   846                                BusPolicyRule   *rule)
   847 {
   848   _dbus_verbose ("Appending rule %p with type %d to policy %p\n",
   849                  rule, rule->type, policy);
   850   
   851   if (!_dbus_list_append (&policy->rules, rule))
   852     return FALSE;
   853 
   854   bus_policy_rule_ref (rule);
   855 
   856   return TRUE;
   857 }
   858 
   859 dbus_bool_t
   860 bus_client_policy_check_can_send (BusClientPolicy *policy,
   861                                   BusRegistry     *registry,
   862                                   dbus_bool_t      requested_reply,
   863                                   DBusConnection  *receiver,
   864                                   DBusMessage     *message)
   865 {
   866   DBusList *link;
   867   dbus_bool_t allowed;
   868   
   869   /* policy->rules is in the order the rules appeared
   870    * in the config file, i.e. last rule that applies wins
   871    */
   872 
   873   _dbus_verbose ("  (policy) checking send rules\n");
   874   
   875   allowed = FALSE;
   876   link = _dbus_list_get_first_link (&policy->rules);
   877   while (link != NULL)
   878     {
   879       BusPolicyRule *rule = link->data;
   880 
   881       link = _dbus_list_get_next_link (&policy->rules, link);
   882       
   883       /* Rule is skipped if it specifies a different
   884        * message name from the message, or a different
   885        * destination from the message
   886        */
   887       
   888       if (rule->type != BUS_POLICY_RULE_SEND)
   889         {
   890           _dbus_verbose ("  (policy) skipping non-send rule\n");
   891           continue;
   892         }
   893 
   894       if (rule->d.send.message_type != DBUS_MESSAGE_TYPE_INVALID)
   895         {
   896           if (dbus_message_get_type (message) != rule->d.send.message_type)
   897             {
   898               _dbus_verbose ("  (policy) skipping rule for different message type\n");
   899               continue;
   900             }
   901         }
   902 
   903       /* If it's a reply, the requested_reply flag kicks in */
   904       if (dbus_message_get_reply_serial (message) != 0)
   905         {
   906           /* for allow, requested_reply=true means the rule applies
   907            * only when reply was requested. requested_reply=false means
   908            * always allow.
   909            */
   910           if (!requested_reply && rule->allow && rule->d.send.requested_reply)
   911             {
   912               _dbus_verbose ("  (policy) skipping allow rule since it only applies to requested replies\n");
   913               continue;
   914             }
   915 
   916           /* for deny, requested_reply=false means the rule applies only
   917            * when the reply was not requested. requested_reply=true means the
   918            * rule always applies.
   919            */
   920           if (requested_reply && !rule->allow && !rule->d.send.requested_reply)
   921             {
   922               _dbus_verbose ("  (policy) skipping deny rule since it only applies to unrequested replies\n");
   923               continue;
   924             }
   925         }
   926       
   927       if (rule->d.send.path != NULL)
   928         {
   929           if (dbus_message_get_path (message) != NULL &&
   930               strcmp (dbus_message_get_path (message),
   931                       rule->d.send.path) != 0)
   932             {
   933               _dbus_verbose ("  (policy) skipping rule for different path\n");
   934               continue;
   935             }
   936         }
   937       
   938       if (rule->d.send.interface != NULL)
   939         {
   940           if (dbus_message_get_interface (message) != NULL &&
   941               strcmp (dbus_message_get_interface (message),
   942                       rule->d.send.interface) != 0)
   943             {
   944               _dbus_verbose ("  (policy) skipping rule for different interface\n");
   945               continue;
   946             }
   947         }
   948 
   949       if (rule->d.send.member != NULL)
   950         {
   951           if (dbus_message_get_member (message) != NULL &&
   952               strcmp (dbus_message_get_member (message),
   953                       rule->d.send.member) != 0)
   954             {
   955               _dbus_verbose ("  (policy) skipping rule for different member\n");
   956               continue;
   957             }
   958         }
   959 
   960       if (rule->d.send.error != NULL)
   961         {
   962           if (dbus_message_get_error_name (message) != NULL &&
   963               strcmp (dbus_message_get_error_name (message),
   964                       rule->d.send.error) != 0)
   965             {
   966               _dbus_verbose ("  (policy) skipping rule for different error name\n");
   967               continue;
   968             }
   969         }
   970       
   971       if (rule->d.send.destination != NULL)
   972         {
   973           /* receiver can be NULL for messages that are sent to the
   974            * message bus itself, we check the strings in that case as
   975            * built-in services don't have a DBusConnection but messages
   976            * to them have a destination service name.
   977            */
   978           if (receiver == NULL)
   979             {
   980               if (!dbus_message_has_destination (message,
   981                                                  rule->d.send.destination))
   982                 {
   983                   _dbus_verbose ("  (policy) skipping rule because message dest is not %s\n",
   984                                  rule->d.send.destination);
   985                   continue;
   986                 }
   987             }
   988           else
   989             {
   990               DBusString str;
   991               BusService *service;
   992               
   993               _dbus_string_init_const (&str, rule->d.send.destination);
   994               
   995               service = bus_registry_lookup (registry, &str);
   996               if (service == NULL)
   997                 {
   998                   _dbus_verbose ("  (policy) skipping rule because dest %s doesn't exist\n",
   999                                  rule->d.send.destination);
  1000                   continue;
  1001                 }
  1002 
  1003               if (!bus_service_has_owner (service, receiver))
  1004                 {
  1005                   _dbus_verbose ("  (policy) skipping rule because dest %s isn't owned by receiver\n",
  1006                                  rule->d.send.destination);
  1007                   continue;
  1008                 }
  1009             }
  1010         }
  1011 
  1012       /* Use this rule */
  1013       allowed = rule->allow;
  1014 
  1015       _dbus_verbose ("  (policy) used rule, allow now = %d\n",
  1016                      allowed);
  1017     }
  1018 
  1019   return allowed;
  1020 }
  1021 
  1022 /* See docs on what the args mean on bus_context_check_security_policy()
  1023  * comment
  1024  */
  1025 dbus_bool_t
  1026 bus_client_policy_check_can_receive (BusClientPolicy *policy,
  1027                                      BusRegistry     *registry,
  1028                                      dbus_bool_t      requested_reply,
  1029                                      DBusConnection  *sender,
  1030                                      DBusConnection  *addressed_recipient,
  1031                                      DBusConnection  *proposed_recipient,
  1032                                      DBusMessage     *message)
  1033 {
  1034   DBusList *link;
  1035   dbus_bool_t allowed;
  1036   dbus_bool_t eavesdropping;
  1037 
  1038   eavesdropping =
  1039     addressed_recipient != proposed_recipient &&
  1040     dbus_message_get_destination (message) != NULL;
  1041   
  1042   /* policy->rules is in the order the rules appeared
  1043    * in the config file, i.e. last rule that applies wins
  1044    */
  1045 
  1046   _dbus_verbose ("  (policy) checking receive rules, eavesdropping = %d\n", eavesdropping);
  1047   
  1048   allowed = FALSE;
  1049   link = _dbus_list_get_first_link (&policy->rules);
  1050   while (link != NULL)
  1051     {
  1052       BusPolicyRule *rule = link->data;
  1053 
  1054       link = _dbus_list_get_next_link (&policy->rules, link);      
  1055       
  1056       if (rule->type != BUS_POLICY_RULE_RECEIVE)
  1057         {
  1058           _dbus_verbose ("  (policy) skipping non-receive rule\n");
  1059           continue;
  1060         }
  1061 
  1062       if (rule->d.receive.message_type != DBUS_MESSAGE_TYPE_INVALID)
  1063         {
  1064           if (dbus_message_get_type (message) != rule->d.receive.message_type)
  1065             {
  1066               _dbus_verbose ("  (policy) skipping rule for different message type\n");
  1067               continue;
  1068             }
  1069         }
  1070 
  1071       /* for allow, eavesdrop=false means the rule doesn't apply when
  1072        * eavesdropping. eavesdrop=true means always allow.
  1073        */
  1074       if (eavesdropping && rule->allow && !rule->d.receive.eavesdrop)
  1075         {
  1076           _dbus_verbose ("  (policy) skipping allow rule since it doesn't apply to eavesdropping\n");
  1077           continue;
  1078         }
  1079 
  1080       /* for deny, eavesdrop=true means the rule applies only when
  1081        * eavesdropping; eavesdrop=false means always deny.
  1082        */
  1083       if (!eavesdropping && !rule->allow && rule->d.receive.eavesdrop)
  1084         {
  1085           _dbus_verbose ("  (policy) skipping deny rule since it only applies to eavesdropping\n");
  1086           continue;
  1087         }
  1088 
  1089       /* If it's a reply, the requested_reply flag kicks in */
  1090       if (dbus_message_get_reply_serial (message) != 0)
  1091         {
  1092           /* for allow, requested_reply=true means the rule applies
  1093            * only when reply was requested. requested_reply=false means
  1094            * always allow.
  1095            */
  1096           if (!requested_reply && rule->allow && rule->d.receive.requested_reply)
  1097             {
  1098               _dbus_verbose ("  (policy) skipping allow rule since it only applies to requested replies\n");
  1099               continue;
  1100             }
  1101 
  1102           /* for deny, requested_reply=false means the rule applies only
  1103            * when the reply was not requested. requested_reply=true means the
  1104            * rule always applies.
  1105            */
  1106           if (requested_reply && !rule->allow && !rule->d.receive.requested_reply)
  1107             {
  1108               _dbus_verbose ("  (policy) skipping deny rule since it only applies to unrequested replies\n");
  1109               continue;
  1110             }
  1111         }
  1112       
  1113       if (rule->d.receive.path != NULL)
  1114         {
  1115           if (dbus_message_get_path (message) != NULL &&
  1116               strcmp (dbus_message_get_path (message),
  1117                       rule->d.receive.path) != 0)
  1118             {
  1119               _dbus_verbose ("  (policy) skipping rule for different path\n");
  1120               continue;
  1121             }
  1122         }
  1123       
  1124       if (rule->d.receive.interface != NULL)
  1125         {
  1126           if (dbus_message_get_interface (message) != NULL &&
  1127               strcmp (dbus_message_get_interface (message),
  1128                       rule->d.receive.interface) != 0)
  1129             {
  1130               _dbus_verbose ("  (policy) skipping rule for different interface\n");
  1131               continue;
  1132             }
  1133         }      
  1134 
  1135       if (rule->d.receive.member != NULL)
  1136         {
  1137           if (dbus_message_get_member (message) != NULL &&
  1138               strcmp (dbus_message_get_member (message),
  1139                       rule->d.receive.member) != 0)
  1140             {
  1141               _dbus_verbose ("  (policy) skipping rule for different member\n");
  1142               continue;
  1143             }
  1144         }
  1145 
  1146       if (rule->d.receive.error != NULL)
  1147         {
  1148           if (dbus_message_get_error_name (message) != NULL &&
  1149               strcmp (dbus_message_get_error_name (message),
  1150                       rule->d.receive.error) != 0)
  1151             {
  1152               _dbus_verbose ("  (policy) skipping rule for different error name\n");
  1153               continue;
  1154             }
  1155         }
  1156       
  1157       if (rule->d.receive.origin != NULL)
  1158         {          
  1159           /* sender can be NULL for messages that originate from the
  1160            * message bus itself, we check the strings in that case as
  1161            * built-in services don't have a DBusConnection but will
  1162            * still set the sender on their messages.
  1163            */
  1164           if (sender == NULL)
  1165             {
  1166               if (!dbus_message_has_sender (message,
  1167                                             rule->d.receive.origin))
  1168                 {
  1169                   _dbus_verbose ("  (policy) skipping rule because message sender is not %s\n",
  1170                                  rule->d.receive.origin);
  1171                   continue;
  1172                 }
  1173             }
  1174           else
  1175             {
  1176               BusService *service;
  1177               DBusString str;
  1178 
  1179               _dbus_string_init_const (&str, rule->d.receive.origin);
  1180               
  1181               service = bus_registry_lookup (registry, &str);
  1182               
  1183               if (service == NULL)
  1184                 {
  1185                   _dbus_verbose ("  (policy) skipping rule because origin %s doesn't exist\n",
  1186                                  rule->d.receive.origin);
  1187                   continue;
  1188                 }
  1189 
  1190               if (!bus_service_has_owner (service, sender))
  1191                 {
  1192                   _dbus_verbose ("  (policy) skipping rule because origin %s isn't owned by sender\n",
  1193                                  rule->d.receive.origin);
  1194                   continue;
  1195                 }
  1196             }
  1197         }
  1198       
  1199       /* Use this rule */
  1200       allowed = rule->allow;
  1201 
  1202       _dbus_verbose ("  (policy) used rule, allow now = %d\n",
  1203                      allowed);
  1204     }
  1205 
  1206   return allowed;
  1207 }
  1208 
  1209 dbus_bool_t
  1210 bus_client_policy_check_can_own (BusClientPolicy  *policy,
  1211                                  DBusConnection   *connection,
  1212                                  const DBusString *service_name)
  1213 {
  1214   DBusList *link;
  1215   dbus_bool_t allowed;
  1216   
  1217   /* policy->rules is in the order the rules appeared
  1218    * in the config file, i.e. last rule that applies wins
  1219    */
  1220 
  1221   allowed = FALSE;
  1222   link = _dbus_list_get_first_link (&policy->rules);
  1223   while (link != NULL)
  1224     {
  1225       BusPolicyRule *rule = link->data;
  1226 
  1227       link = _dbus_list_get_next_link (&policy->rules, link);
  1228       
  1229       /* Rule is skipped if it specifies a different service name from
  1230        * the desired one.
  1231        */
  1232       
  1233       if (rule->type != BUS_POLICY_RULE_OWN)
  1234         continue;
  1235 
  1236       if (rule->d.own.service_name != NULL)
  1237         {
  1238           if (!_dbus_string_equal_c_str (service_name,
  1239                                          rule->d.own.service_name))
  1240             continue;
  1241         }
  1242 
  1243       /* Use this rule */
  1244       allowed = rule->allow;
  1245     }
  1246 
  1247   return allowed;
  1248 }
  1249 
  1250 #ifdef DBUS_BUILD_TESTS
  1251 
  1252 dbus_bool_t
  1253 bus_policy_test (const DBusString *test_data_dir)
  1254 {
  1255   /* This doesn't do anything for now because I decided to do it in
  1256    * dispatch.c instead by having some of the clients in dispatch.c
  1257    * have particular policies applied to them.
  1258    */
  1259   
  1260   return TRUE;
  1261 }
  1262 
  1263 #endif /* DBUS_BUILD_TESTS */