2 * Copyright (c) 2022 Stefan Sperling <stsp@openbsd.org>
3 * Copyright (c) 2016-2019, 2020-2021 Tracey Emery <tracey@traceyemery.net>
4 * Copyright (c) 2004, 2005 Esben Norby <norby@openbsd.org>
5 * Copyright (c) 2004 Ryan McBride <mcbride@openbsd.org>
6 * Copyright (c) 2002, 2003, 2004 Henning Brauer <henning@openbsd.org>
7 * Copyright (c) 2001 Markus Friedl. All rights reserved.
8 * Copyright (c) 2001 Daniel Hartmeier. All rights reserved.
9 * Copyright (c) 2001 Theo de Raadt. All rights reserved.
11 * Permission to use, copy, modify, and distribute this software for any
12 * purpose with or without fee is hereby granted, provided that the above
13 * copyright notice and this permission notice appear in all copies.
15 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
16 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
17 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
18 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
19 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
20 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
21 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
26 #include <sys/types.h>
27 #include <sys/queue.h>
44 #include "got_error.h"
52 TAILQ_HEAD(files, file) files = TAILQ_HEAD_INITIALIZER(files);
54 TAILQ_ENTRY(file) entry;
60 struct file *newfile(const char *, int);
61 static void closefile(struct file *);
62 int check_file_secrecy(int, const char *);
65 int yyerror(const char *, ...)
66 __attribute__((__format__ (printf, 1, 2)))
67 __attribute__((__nonnull__ (1)));
68 int kw_cmp(const void *, const void *);
74 TAILQ_HEAD(symhead, sym) symhead = TAILQ_HEAD_INITIALIZER(symhead);
76 TAILQ_ENTRY(sym) entry;
83 int symset(const char *, const char *, int);
84 char *symget(const char *);
88 static struct gotd *gotd;
89 static struct gotd_repo *new_repo;
90 static int conf_limit_user_connections(const char *, int);
91 static struct gotd_repo *conf_new_repo(const char *);
92 static void conf_new_access_rule(struct gotd_repo *,
93 enum gotd_access, int, char *);
94 static enum gotd_procid gotd_proc_id;
107 %token PATH ERROR LISTEN ON USER REPOSITORY PERMIT DENY
108 %token RO RW CONNECTION LIMIT REQUEST TIMEOUT
110 %token <v.string> STRING
111 %token <v.number> NUMBER
112 %type <v.number> boolean
120 | grammar repository '\n'
124 if (strcasecmp($1, "1") == 0 ||
125 strcasecmp($1, "yes") == 0 ||
126 strcasecmp($1, "on") == 0)
128 else if (strcasecmp($1, "0") == 0 ||
129 strcasecmp($1, "off") == 0 ||
130 strcasecmp($1, "no") == 0)
133 yyerror("invalid boolean value '%s'", $1);
140 | NUMBER { $$ = $1; }
145 yyerror("invalid timeout: %lld", $1);
153 const char *type = "seconds";
158 yyerror("invalid number of seconds: %s", $1);
164 switch ($1[len - 1]) {
184 $$.tv_sec = strtonum($1, 0, INT_MAX / mul, &errstr);
186 yyerror("number of %s is %s: %s", type,
197 main : LISTEN ON STRING {
198 if (gotd_proc_id == PROC_LISTEN) {
199 if (strlcpy(gotd->unix_socket_path, $3,
200 sizeof(gotd->unix_socket_path)) >=
201 sizeof(gotd->unix_socket_path)) {
202 yyerror("%s: unix socket path too long",
211 if (strlcpy(gotd->user_name, $2,
212 sizeof(gotd->user_name)) >=
213 sizeof(gotd->user_name)) {
214 yyerror("%s: user name too long", __func__);
223 connection : CONNECTION '{' optnl conflags_l '}'
224 | CONNECTION conflags
226 conflags_l : conflags optnl conflags_l
230 conflags : REQUEST TIMEOUT timeout {
231 if ($3.tv_sec <= 0) {
232 yyerror("invalid timeout: %lld", $3.tv_sec);
235 memcpy(&gotd->request_timeout, &$3,
236 sizeof(gotd->request_timeout));
238 | LIMIT USER STRING NUMBER {
239 if (gotd_proc_id == PROC_LISTEN &&
240 conf_limit_user_connections($3, $4) == -1) {
248 repository : REPOSITORY STRING {
249 struct gotd_repo *repo;
251 TAILQ_FOREACH(repo, &gotd->repos, entry) {
252 if (strcmp(repo->name, $2) == 0) {
253 yyerror("duplicate repository '%s'", $2);
259 if (gotd_proc_id == PROC_GOTD ||
260 gotd_proc_id == PROC_AUTH) {
261 new_repo = conf_new_repo($2);
264 } '{' optnl repoopts2 '}' {
268 repoopts1 : PATH STRING {
269 if (gotd_proc_id == PROC_GOTD ||
270 gotd_proc_id == PROC_AUTH) {
271 if (!got_path_is_absolute($2)) {
272 yyerror("%s: path %s is not absolute",
277 if (strlcpy(new_repo->path, $2,
278 sizeof(new_repo->path)) >=
279 sizeof(new_repo->path)) {
280 yyerror("%s: path truncated", __func__);
288 if (gotd_proc_id == PROC_AUTH) {
289 conf_new_access_rule(new_repo,
290 GOTD_ACCESS_PERMITTED, GOTD_AUTH_READ, $3);
294 if (gotd_proc_id == PROC_AUTH) {
295 conf_new_access_rule(new_repo,
296 GOTD_ACCESS_PERMITTED,
297 GOTD_AUTH_READ | GOTD_AUTH_WRITE, $3);
301 if (gotd_proc_id == PROC_AUTH) {
302 conf_new_access_rule(new_repo,
303 GOTD_ACCESS_DENIED, 0, $2);
308 repoopts2 : repoopts2 repoopts1 nl
315 optnl : '\n' optnl /* zero or more newlines */
327 yyerror(const char *fmt, ...)
334 if (vasprintf(&msg, fmt, ap) == -1)
335 fatalx("yyerror vasprintf");
337 logit(LOG_CRIT, "%s:%d: %s", file->name, yylval.lineno, msg);
343 kw_cmp(const void *k, const void *e)
345 return (strcmp(k, ((const struct keywords *)e)->k_name));
351 /* This has to be sorted always. */
352 static const struct keywords keywords[] = {
353 { "connection", CONNECTION },
356 { "listen", LISTEN },
359 { "permit", PERMIT },
360 { "repository", REPOSITORY },
361 { "request", REQUEST },
364 { "timeout", TIMEOUT },
367 const struct keywords *p;
369 p = bsearch(s, keywords, sizeof(keywords)/sizeof(keywords[0]),
370 sizeof(keywords[0]), kw_cmp);
378 #define MAXPUSHBACK 128
380 unsigned char *parsebuf;
382 unsigned char pushback_buffer[MAXPUSHBACK];
383 int pushback_index = 0;
391 /* Read character from the parsebuffer instead of input. */
392 if (parseindex >= 0) {
393 c = parsebuf[parseindex++];
402 return (pushback_buffer[--pushback_index]);
405 c = getc(file->stream);
407 yyerror("reached end of file while parsing "
412 c = getc(file->stream);
414 next = getc(file->stream);
419 yylval.lineno = file->lineno;
421 c = getc(file->stream);
437 if (pushback_index < MAXPUSHBACK-1)
438 return (pushback_buffer[pushback_index++] = c);
450 /* Skip to either EOF or the first real EOL. */
453 c = pushback_buffer[--pushback_index];
469 unsigned char buf[8096];
470 unsigned char *p, *val;
477 while (c == ' ' || c == '\t')
478 c = lgetc(0); /* nothing */
480 yylval.lineno = file->lineno;
483 while (c != '\n' && c != EOF)
484 c = lgetc(0); /* nothing */
486 if (c == '$' && parsebuf == NULL) {
492 if (p + 1 >= buf + sizeof(buf) - 1) {
493 yyerror("string too long");
496 if (isalnum(c) || c == '_') {
506 yyerror("macro '%s' not defined", buf);
525 } else if (c == '\\') {
526 next = lgetc(quotec);
529 if (next == quotec || c == ' ' || c == '\t')
531 else if (next == '\n') {
536 } else if (c == quotec) {
539 } else if (c == '\0') {
540 yyerror("syntax error");
543 if (p + 1 >= buf + sizeof(buf) - 1) {
544 yyerror("string too long");
549 yylval.v.string = strdup(buf);
550 if (yylval.v.string == NULL)
551 err(1, "yylex: strdup");
555 #define allowed_to_end_number(x) \
556 (isspace(x) || x == ')' || x ==',' || x == '/' || x == '}' || x == '=')
558 if (c == '-' || isdigit(c)) {
561 if ((unsigned)(p-buf) >= sizeof(buf)) {
562 yyerror("string too long");
566 } while (c != EOF && isdigit(c));
568 if (p == buf + 1 && buf[0] == '-')
570 if (c == EOF || allowed_to_end_number(c)) {
571 const char *errstr = NULL;
574 yylval.v.number = strtonum(buf, LLONG_MIN,
577 yyerror("\"%s\" invalid number: %s",
592 #define allowed_in_string(x) \
593 (isalnum(x) || (ispunct(x) && x != '(' && x != ')' && \
594 x != '{' && x != '}' && \
595 x != '!' && x != '=' && x != '#' && \
598 if (isalnum(c) || c == ':' || c == '_') {
601 if ((unsigned)(p-buf) >= sizeof(buf)) {
602 yyerror("string too long");
606 } while (c != EOF && (allowed_in_string(c)));
610 if (token == STRING) {
611 yylval.v.string = strdup(buf);
612 if (yylval.v.string == NULL)
613 err(1, "yylex: strdup");
618 yylval.lineno = file->lineno;
627 check_file_secrecy(int fd, const char *fname)
631 if (fstat(fd, &st)) {
632 log_warn("cannot stat %s", fname);
635 if (st.st_uid != 0 && st.st_uid != getuid()) {
636 log_warnx("%s: owner not root or current user", fname);
639 if (st.st_mode & (S_IWGRP | S_IXGRP | S_IRWXO)) {
640 log_warnx("%s: group writable or world read/writable", fname);
647 newfile(const char *name, int secret)
651 nfile = calloc(1, sizeof(struct file));
656 nfile->name = strdup(name);
657 if (nfile->name == NULL) {
662 nfile->stream = fopen(nfile->name, "r");
663 if (nfile->stream == NULL) {
664 /* no warning, we don't require a conf file */
669 check_file_secrecy(fileno(nfile->stream), nfile->name)) {
670 fclose(nfile->stream);
680 closefile(struct file *xfile)
682 fclose(xfile->stream);
688 parse_config(const char *filename, enum gotd_procid proc_id,
691 struct sym *sym, *next;
692 struct gotd_repo *repo;
694 memset(env, 0, sizeof(*env));
697 gotd_proc_id = proc_id;
698 TAILQ_INIT(&gotd->repos);
700 /* Apply default values. */
701 if (strlcpy(gotd->unix_socket_path, GOTD_UNIX_SOCKET,
702 sizeof(gotd->unix_socket_path)) >= sizeof(gotd->unix_socket_path)) {
703 fprintf(stderr, "%s: unix socket path too long", __func__);
706 if (strlcpy(gotd->user_name, GOTD_USER,
707 sizeof(gotd->user_name)) >= sizeof(gotd->user_name)) {
708 fprintf(stderr, "%s: user name too long", __func__);
712 gotd->request_timeout.tv_sec = GOTD_DEFAULT_REQUEST_TIMEOUT;
713 gotd->request_timeout.tv_usec = 0;
715 file = newfile(filename, 0);
717 /* just return, as we don't require a conf file */
722 errors = file->errors;
725 /* Free macros and check which have not been used. */
726 TAILQ_FOREACH_SAFE(sym, &symhead, entry, next) {
727 if ((gotd->verbosity > 1) && !sym->used)
728 fprintf(stderr, "warning: macro '%s' not used\n",
733 TAILQ_REMOVE(&symhead, sym, entry);
741 TAILQ_FOREACH(repo, &gotd->repos, entry) {
742 if (repo->path[0] == '\0') {
743 log_warnx("repository \"%s\": no path provided in "
744 "configuration file", repo->name);
753 uid_connection_limit_cmp(const void *pa, const void *pb)
755 const struct gotd_uid_connection_limit *a = pa, *b = pb;
759 else if (a->uid > b->uid);
766 conf_limit_user_connections(const char *user, int maximum)
769 struct gotd_uid_connection_limit *limit;
773 yyerror("max connections cannot be smaller 1");
776 if (maximum > GOTD_MAXCLIENTS) {
777 yyerror("max connections must be <= %d", GOTD_MAXCLIENTS);
781 if (gotd_auth_parseuid(user, &uid) == -1) {
782 yyerror("%s: no such user", user);
786 limit = gotd_find_uid_connection_limit(gotd->connection_limits,
787 gotd->nconnection_limits, uid);
789 limit->max_connections = maximum;
793 limit = gotd->connection_limits;
794 nlimits = gotd->nconnection_limits + 1;
795 limit = reallocarray(limit, nlimits, sizeof(*limit));
797 fatal("reallocarray");
799 limit[nlimits - 1].uid = uid;
800 limit[nlimits - 1].max_connections = maximum;
802 gotd->connection_limits = limit;
803 gotd->nconnection_limits = nlimits;
804 qsort(gotd->connection_limits, gotd->nconnection_limits,
805 sizeof(gotd->connection_limits[0]), uid_connection_limit_cmp);
810 static struct gotd_repo *
811 conf_new_repo(const char *name)
813 struct gotd_repo *repo;
815 if (name[0] == '\0') {
816 fatalx("syntax error: empty repository name found in %s",
820 if (strchr(name, '\n') != NULL)
821 fatalx("repository names must not contain linefeeds: %s", name);
823 repo = calloc(1, sizeof(*repo));
825 fatalx("%s: calloc", __func__);
827 STAILQ_INIT(&repo->rules);
829 if (strlcpy(repo->name, name, sizeof(repo->name)) >=
831 fatalx("%s: strlcpy", __func__);
833 TAILQ_INSERT_TAIL(&gotd->repos, repo, entry);
840 conf_new_access_rule(struct gotd_repo *repo, enum gotd_access access,
841 int authorization, char *identifier)
843 struct gotd_access_rule *rule;
845 rule = calloc(1, sizeof(*rule));
849 rule->access = access;
850 rule->authorization = authorization;
851 rule->identifier = identifier;
853 STAILQ_INSERT_TAIL(&repo->rules, rule, entry);
857 symset(const char *nam, const char *val, int persist)
861 TAILQ_FOREACH(sym, &symhead, entry) {
862 if (strcmp(nam, sym->nam) == 0)
867 if (sym->persist == 1)
872 TAILQ_REMOVE(&symhead, sym, entry);
876 sym = calloc(1, sizeof(*sym));
880 sym->nam = strdup(nam);
881 if (sym->nam == NULL) {
885 sym->val = strdup(val);
886 if (sym->val == NULL) {
892 sym->persist = persist;
893 TAILQ_INSERT_TAIL(&symhead, sym, entry);
898 symget(const char *nam)
902 TAILQ_FOREACH(sym, &symhead, entry) {
903 if (strcmp(nam, sym->nam) == 0) {