1 /* -*- mode: C; c-file-style: "gnu"; indent-tabs-mode: nil; -*- */
2 /* config-parser.c XML-library-agnostic configuration file parser
4 * Copyright (C) 2003, 2004 Red Hat, Inc.
6 * Licensed under the Academic Free License version 2.1
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
25 #include "config-parser-common.h"
26 #include "config-parser.h"
31 #include <dbus/dbus-list.h>
32 #include <dbus/dbus-internals.h>
37 /* we ignore policies for unknown groups/users */
52 unsigned int had_content : 1;
58 unsigned int ignore_missing : 1;
59 unsigned int if_selinux_enabled : 1;
60 unsigned int selinux_root_relative : 1;
66 unsigned long gid_uid_or_at_console;
80 * Parser for bus configuration file.
82 struct BusConfigParser
84 int refcount; /**< Reference count */
86 DBusString basedir; /**< Directory we resolve paths relative to */
88 DBusList *stack; /**< stack of Element */
90 char *user; /**< user to run as */
92 char *servicehelper; /**< location of the setuid helper */
94 char *bus_type; /**< Message bus type */
96 DBusList *listen_on; /**< List of addresses to listen to */
98 DBusList *mechanisms; /**< Auth mechanisms */
100 DBusList *service_dirs; /**< Directories to look for session services in */
102 DBusList *conf_dirs; /**< Directories to look for policy configuration in */
104 BusPolicy *policy; /**< Security policy */
106 BusLimits limits; /**< Limits */
108 char *pidfile; /**< PID file */
110 DBusList *included_files; /**< Included files stack */
112 DBusHashTable *service_context_table; /**< Map service names to SELinux contexts */
114 unsigned int fork : 1; /**< TRUE to fork into daemon mode */
116 unsigned int syslog : 1; /**< TRUE to enable syslog */
117 unsigned int keep_umask : 1; /**< TRUE to keep original umask when forking */
119 unsigned int is_toplevel : 1; /**< FALSE if we are a sub-config-file inside another one */
121 unsigned int allow_anonymous : 1; /**< TRUE to allow anonymous connections */
125 push_element (BusConfigParser *parser,
130 _dbus_assert (type != ELEMENT_NONE);
132 e = dbus_new0 (Element, 1);
136 if (!_dbus_list_append (&parser->stack, e))
148 element_free (Element *e)
150 if (e->type == ELEMENT_LIMIT)
151 dbus_free (e->d.limit.name);
157 pop_element (BusConfigParser *parser)
161 e = _dbus_list_pop_last (&parser->stack);
167 peek_element (BusConfigParser *parser)
171 e = _dbus_list_get_last (&parser->stack);
177 top_element_type (BusConfigParser *parser)
181 e = _dbus_list_get_last (&parser->stack);
190 merge_service_context_hash (DBusHashTable *dest,
200 _dbus_hash_iter_init (from, &iter);
201 while (_dbus_hash_iter_next (&iter))
203 const char *service = _dbus_hash_iter_get_string_key (&iter);
204 const char *context = _dbus_hash_iter_get_value (&iter);
206 service_copy = _dbus_strdup (service);
207 if (service_copy == NULL)
209 context_copy = _dbus_strdup (context);
210 if (context_copy == NULL)
213 if (!_dbus_hash_table_insert_string (dest, service_copy, context_copy))
224 dbus_free (service_copy);
227 dbus_free (context_copy);
233 service_dirs_find_dir (DBusList **service_dirs,
238 _dbus_assert (dir != NULL);
240 for (link = *service_dirs; link; link = _dbus_list_get_next_link(service_dirs, link))
242 const char *link_dir;
244 link_dir = (const char *)link->data;
245 if (strcmp (dir, link_dir) == 0)
253 service_dirs_append_unique_or_free (DBusList **service_dirs,
256 if (!service_dirs_find_dir (service_dirs, dir))
257 return _dbus_list_append (service_dirs, dir);
264 service_dirs_append_link_unique_or_free (DBusList **service_dirs,
267 if (!service_dirs_find_dir (service_dirs, dir_link->data))
269 _dbus_list_append_link (service_dirs, dir_link);
273 dbus_free (dir_link->data);
274 _dbus_list_free_link (dir_link);
279 merge_included (BusConfigParser *parser,
280 BusConfigParser *included,
285 if (!bus_policy_merge (parser->policy,
292 if (!merge_service_context_hash (parser->service_context_table,
293 included->service_context_table))
299 if (included->user != NULL)
301 dbus_free (parser->user);
302 parser->user = included->user;
303 included->user = NULL;
306 if (included->bus_type != NULL)
308 dbus_free (parser->bus_type);
309 parser->bus_type = included->bus_type;
310 included->bus_type = NULL;
316 if (included->keep_umask)
317 parser->keep_umask = TRUE;
319 if (included->pidfile != NULL)
321 dbus_free (parser->pidfile);
322 parser->pidfile = included->pidfile;
323 included->pidfile = NULL;
326 while ((link = _dbus_list_pop_first_link (&included->listen_on)))
327 _dbus_list_append_link (&parser->listen_on, link);
329 while ((link = _dbus_list_pop_first_link (&included->mechanisms)))
330 _dbus_list_append_link (&parser->mechanisms, link);
332 while ((link = _dbus_list_pop_first_link (&included->service_dirs)))
333 service_dirs_append_link_unique_or_free (&parser->service_dirs, link);
335 while ((link = _dbus_list_pop_first_link (&included->conf_dirs)))
336 _dbus_list_append_link (&parser->conf_dirs, link);
342 seen_include (BusConfigParser *parser,
343 const DBusString *file)
347 iter = parser->included_files;
350 if (! strcmp (_dbus_string_get_const_data (file), iter->data))
353 iter = _dbus_list_get_next_link (&parser->included_files, iter);
360 bus_config_parser_new (const DBusString *basedir,
361 dbus_bool_t is_toplevel,
362 const BusConfigParser *parent)
364 BusConfigParser *parser;
366 parser = dbus_new0 (BusConfigParser, 1);
370 parser->is_toplevel = !!is_toplevel;
372 if (!_dbus_string_init (&parser->basedir))
378 if (((parser->policy = bus_policy_new ()) == NULL) ||
379 !_dbus_string_copy (basedir, 0, &parser->basedir, 0) ||
380 ((parser->service_context_table = _dbus_hash_table_new (DBUS_HASH_STRING,
382 dbus_free)) == NULL))
385 bus_policy_unref (parser->policy);
387 _dbus_string_free (&parser->basedir);
395 /* Initialize the parser's limits from the parent. */
396 parser->limits = parent->limits;
398 /* Use the parent's list of included_files to avoid
399 circular inclusions. */
400 parser->included_files = parent->included_files;
405 /* Make up some numbers! woot! */
406 parser->limits.max_incoming_bytes = _DBUS_ONE_MEGABYTE * 127;
407 parser->limits.max_outgoing_bytes = _DBUS_ONE_MEGABYTE * 127;
408 parser->limits.max_message_size = _DBUS_ONE_MEGABYTE * 32;
410 /* We set relatively conservative values here since due to the
411 way SCM_RIGHTS works we need to preallocate an array for the
412 maximum number of file descriptors we can receive. Picking a
413 high value here thus translates directly to more memory
415 parser->limits.max_incoming_unix_fds = 1024*4;
416 parser->limits.max_outgoing_unix_fds = 1024*4;
417 parser->limits.max_message_unix_fds = 1024;
419 /* Making this long means the user has to wait longer for an error
420 * message if something screws up, but making it too short means
421 * they might see a false failure.
423 parser->limits.activation_timeout = 25000; /* 25 seconds */
425 /* Making this long risks making a DOS attack easier, but too short
426 * and legitimate auth will fail. If interactive auth (ask user for
427 * password) is allowed, then potentially it has to be quite long.
429 parser->limits.auth_timeout = 30000; /* 30 seconds */
431 parser->limits.max_incomplete_connections = 64;
432 parser->limits.max_connections_per_user = 256;
434 /* Note that max_completed_connections / max_connections_per_user
435 * is the number of users that would have to work together to
436 * DOS all the other users.
438 parser->limits.max_completed_connections = 2048;
440 parser->limits.max_pending_activations = 512;
441 parser->limits.max_services_per_connection = 512;
443 /* For this one, keep in mind that it isn't only the memory used
444 * by the match rules, but slowdown from linearly walking a big
445 * list of them. A client adding more than this is almost
446 * certainly a bad idea for that reason, and should change to a
447 * smaller number of wider-net match rules - getting every last
448 * message to the bus is probably better than having a thousand
451 parser->limits.max_match_rules_per_connection = 512;
453 parser->limits.reply_timeout = -1; /* never */
455 /* this is effectively a limit on message queue size for messages
456 * that require a reply
458 parser->limits.max_replies_per_connection = 1024*8;
461 parser->refcount = 1;
467 bus_config_parser_ref (BusConfigParser *parser)
469 _dbus_assert (parser->refcount > 0);
471 parser->refcount += 1;
477 bus_config_parser_unref (BusConfigParser *parser)
479 _dbus_assert (parser->refcount > 0);
481 parser->refcount -= 1;
483 if (parser->refcount == 0)
485 while (parser->stack != NULL)
486 pop_element (parser);
488 dbus_free (parser->user);
489 dbus_free (parser->servicehelper);
490 dbus_free (parser->bus_type);
491 dbus_free (parser->pidfile);
493 _dbus_list_foreach (&parser->listen_on,
494 (DBusForeachFunction) dbus_free,
497 _dbus_list_clear (&parser->listen_on);
499 _dbus_list_foreach (&parser->service_dirs,
500 (DBusForeachFunction) dbus_free,
503 _dbus_list_clear (&parser->service_dirs);
505 _dbus_list_foreach (&parser->conf_dirs,
506 (DBusForeachFunction) dbus_free,
509 _dbus_list_clear (&parser->conf_dirs);
511 _dbus_list_foreach (&parser->mechanisms,
512 (DBusForeachFunction) dbus_free,
515 _dbus_list_clear (&parser->mechanisms);
517 _dbus_string_free (&parser->basedir);
520 bus_policy_unref (parser->policy);
522 if (parser->service_context_table)
523 _dbus_hash_table_unref (parser->service_context_table);
530 bus_config_parser_check_doctype (BusConfigParser *parser,
534 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
536 if (strcmp (doctype, "busconfig") != 0)
538 dbus_set_error (error,
540 "Configuration file has the wrong document type %s",
555 locate_attributes (BusConfigParser *parser,
556 const char *element_name,
557 const char **attribute_names,
558 const char **attribute_values,
560 const char *first_attribute_name,
561 const char **first_attribute_retloc,
569 LocateAttr attrs[MAX_ATTRS];
573 _dbus_assert (first_attribute_name != NULL);
574 _dbus_assert (first_attribute_retloc != NULL);
579 attrs[0].name = first_attribute_name;
580 attrs[0].retloc = first_attribute_retloc;
581 *first_attribute_retloc = NULL;
583 va_start (args, first_attribute_retloc);
585 name = va_arg (args, const char*);
586 retloc = va_arg (args, const char**);
590 _dbus_assert (retloc != NULL);
591 _dbus_assert (n_attrs < MAX_ATTRS);
593 attrs[n_attrs].name = name;
594 attrs[n_attrs].retloc = retloc;
598 name = va_arg (args, const char*);
599 retloc = va_arg (args, const char**);
605 while (attribute_names[i])
614 if (strcmp (attrs[j].name, attribute_names[i]) == 0)
616 retloc = attrs[j].retloc;
620 dbus_set_error (error, DBUS_ERROR_FAILED,
621 "Attribute \"%s\" repeated twice on the same <%s> element",
622 attrs[j].name, element_name);
627 *retloc = attribute_values[i];
636 dbus_set_error (error, DBUS_ERROR_FAILED,
637 "Attribute \"%s\" is invalid on <%s> element in this context",
638 attribute_names[i], element_name);
651 check_no_attributes (BusConfigParser *parser,
652 const char *element_name,
653 const char **attribute_names,
654 const char **attribute_values,
657 if (attribute_names[0] != NULL)
659 dbus_set_error (error, DBUS_ERROR_FAILED,
660 "Attribute \"%s\" is invalid on <%s> element in this context",
661 attribute_names[0], element_name);
669 start_busconfig_child (BusConfigParser *parser,
670 const char *element_name,
671 const char **attribute_names,
672 const char **attribute_values,
675 ElementType element_type;
677 element_type = bus_config_parser_element_name_to_type (element_name);
679 if (element_type == ELEMENT_USER)
681 if (!check_no_attributes (parser, "user", attribute_names, attribute_values, error))
684 if (push_element (parser, ELEMENT_USER) == NULL)
692 else if (element_type == ELEMENT_TYPE)
694 if (!check_no_attributes (parser, "type", attribute_names, attribute_values, error))
697 if (push_element (parser, ELEMENT_TYPE) == NULL)
705 else if (element_type == ELEMENT_FORK)
707 if (!check_no_attributes (parser, "fork", attribute_names, attribute_values, error))
710 if (push_element (parser, ELEMENT_FORK) == NULL)
720 else if (element_type == ELEMENT_SYSLOG)
722 if (!check_no_attributes (parser, "syslog", attribute_names, attribute_values, error))
725 if (push_element (parser, ELEMENT_SYSLOG) == NULL)
731 parser->syslog = TRUE;
735 else if (element_type == ELEMENT_KEEP_UMASK)
737 if (!check_no_attributes (parser, "keep_umask", attribute_names, attribute_values, error))
740 if (push_element (parser, ELEMENT_KEEP_UMASK) == NULL)
746 parser->keep_umask = TRUE;
750 else if (element_type == ELEMENT_PIDFILE)
752 if (!check_no_attributes (parser, "pidfile", attribute_names, attribute_values, error))
755 if (push_element (parser, ELEMENT_PIDFILE) == NULL)
763 else if (element_type == ELEMENT_LISTEN)
765 if (!check_no_attributes (parser, "listen", attribute_names, attribute_values, error))
768 if (push_element (parser, ELEMENT_LISTEN) == NULL)
776 else if (element_type == ELEMENT_AUTH)
778 if (!check_no_attributes (parser, "auth", attribute_names, attribute_values, error))
781 if (push_element (parser, ELEMENT_AUTH) == NULL)
789 else if (element_type == ELEMENT_SERVICEHELPER)
791 if (!check_no_attributes (parser, "servicehelper", attribute_names, attribute_values, error))
794 if (push_element (parser, ELEMENT_SERVICEHELPER) == NULL)
802 else if (element_type == ELEMENT_INCLUDEDIR)
804 if (!check_no_attributes (parser, "includedir", attribute_names, attribute_values, error))
807 if (push_element (parser, ELEMENT_INCLUDEDIR) == NULL)
815 else if (element_type == ELEMENT_STANDARD_SESSION_SERVICEDIRS)
821 if (!check_no_attributes (parser, "standard_session_servicedirs", attribute_names, attribute_values, error))
824 if (push_element (parser, ELEMENT_STANDARD_SESSION_SERVICEDIRS) == NULL)
830 if (!_dbus_get_standard_session_servicedirs (&dirs))
836 while ((link = _dbus_list_pop_first_link (&dirs)))
837 service_dirs_append_link_unique_or_free (&parser->service_dirs, link);
841 else if (element_type == ELEMENT_STANDARD_SYSTEM_SERVICEDIRS)
847 if (!check_no_attributes (parser, "standard_system_servicedirs", attribute_names, attribute_values, error))
850 if (push_element (parser, ELEMENT_STANDARD_SYSTEM_SERVICEDIRS) == NULL)
856 if (!_dbus_get_standard_system_servicedirs (&dirs))
862 while ((link = _dbus_list_pop_first_link (&dirs)))
863 service_dirs_append_link_unique_or_free (&parser->service_dirs, link);
867 else if (element_type == ELEMENT_ALLOW_ANONYMOUS)
869 if (!check_no_attributes (parser, "allow_anonymous", attribute_names, attribute_values, error))
872 if (push_element (parser, ELEMENT_ALLOW_ANONYMOUS) == NULL)
878 parser->allow_anonymous = TRUE;
881 else if (element_type == ELEMENT_SERVICEDIR)
883 if (!check_no_attributes (parser, "servicedir", attribute_names, attribute_values, error))
886 if (push_element (parser, ELEMENT_SERVICEDIR) == NULL)
894 else if (element_type == ELEMENT_INCLUDE)
897 const char *if_selinux_enabled;
898 const char *ignore_missing;
899 const char *selinux_root_relative;
901 if ((e = push_element (parser, ELEMENT_INCLUDE)) == NULL)
907 e->d.include.ignore_missing = FALSE;
908 e->d.include.if_selinux_enabled = FALSE;
909 e->d.include.selinux_root_relative = FALSE;
911 if (!locate_attributes (parser, "include",
915 "ignore_missing", &ignore_missing,
916 "if_selinux_enabled", &if_selinux_enabled,
917 "selinux_root_relative", &selinux_root_relative,
921 if (ignore_missing != NULL)
923 if (strcmp (ignore_missing, "yes") == 0)
924 e->d.include.ignore_missing = TRUE;
925 else if (strcmp (ignore_missing, "no") == 0)
926 e->d.include.ignore_missing = FALSE;
929 dbus_set_error (error, DBUS_ERROR_FAILED,
930 "ignore_missing attribute must have value \"yes\" or \"no\"");
935 if (if_selinux_enabled != NULL)
937 if (strcmp (if_selinux_enabled, "yes") == 0)
938 e->d.include.if_selinux_enabled = TRUE;
939 else if (strcmp (if_selinux_enabled, "no") == 0)
940 e->d.include.if_selinux_enabled = FALSE;
943 dbus_set_error (error, DBUS_ERROR_FAILED,
944 "if_selinux_enabled attribute must have value"
945 " \"yes\" or \"no\"");
950 if (selinux_root_relative != NULL)
952 if (strcmp (selinux_root_relative, "yes") == 0)
953 e->d.include.selinux_root_relative = TRUE;
954 else if (strcmp (selinux_root_relative, "no") == 0)
955 e->d.include.selinux_root_relative = FALSE;
958 dbus_set_error (error, DBUS_ERROR_FAILED,
959 "selinux_root_relative attribute must have value"
960 " \"yes\" or \"no\"");
967 else if (element_type == ELEMENT_POLICY)
973 const char *at_console;
975 if ((e = push_element (parser, ELEMENT_POLICY)) == NULL)
981 e->d.policy.type = POLICY_IGNORED;
983 if (!locate_attributes (parser, "policy",
990 "at_console", &at_console,
994 if (((context && user) ||
995 (context && group) ||
996 (context && at_console)) ||
998 (user && at_console)) ||
999 (group && at_console) ||
1000 !(context || user || group || at_console))
1002 dbus_set_error (error, DBUS_ERROR_FAILED,
1003 "<policy> element must have exactly one of (context|user|group|at_console) attributes");
1007 if (context != NULL)
1009 if (strcmp (context, "default") == 0)
1011 e->d.policy.type = POLICY_DEFAULT;
1013 else if (strcmp (context, "mandatory") == 0)
1015 e->d.policy.type = POLICY_MANDATORY;
1019 dbus_set_error (error, DBUS_ERROR_FAILED,
1020 "context attribute on <policy> must have the value \"default\" or \"mandatory\", not \"%s\"",
1025 else if (user != NULL)
1027 DBusString username;
1028 _dbus_string_init_const (&username, user);
1030 if (_dbus_parse_unix_user_from_config (&username,
1031 &e->d.policy.gid_uid_or_at_console))
1032 e->d.policy.type = POLICY_USER;
1034 _dbus_warn ("Unknown username \"%s\" in message bus configuration file\n",
1037 else if (group != NULL)
1039 DBusString group_name;
1040 _dbus_string_init_const (&group_name, group);
1042 if (_dbus_parse_unix_group_from_config (&group_name,
1043 &e->d.policy.gid_uid_or_at_console))
1044 e->d.policy.type = POLICY_GROUP;
1046 _dbus_warn ("Unknown group \"%s\" in message bus configuration file\n",
1049 else if (at_console != NULL)
1052 t = (strcmp (at_console, "true") == 0);
1053 if (t || strcmp (at_console, "false") == 0)
1055 e->d.policy.gid_uid_or_at_console = t;
1056 e->d.policy.type = POLICY_CONSOLE;
1060 dbus_set_error (error, DBUS_ERROR_FAILED,
1061 "Unknown value \"%s\" for at_console in message bus configuration file",
1069 _dbus_assert_not_reached ("all <policy> attributes null and we didn't set error");
1074 else if (element_type == ELEMENT_LIMIT)
1079 if ((e = push_element (parser, ELEMENT_LIMIT)) == NULL)
1081 BUS_SET_OOM (error);
1085 if (!locate_attributes (parser, "limit",
1095 dbus_set_error (error, DBUS_ERROR_FAILED,
1096 "<limit> element must have a \"name\" attribute");
1100 e->d.limit.name = _dbus_strdup (name);
1101 if (e->d.limit.name == NULL)
1103 BUS_SET_OOM (error);
1109 else if (element_type == ELEMENT_SELINUX)
1111 if (!check_no_attributes (parser, "selinux", attribute_names, attribute_values, error))
1114 if (push_element (parser, ELEMENT_SELINUX) == NULL)
1116 BUS_SET_OOM (error);
1124 dbus_set_error (error, DBUS_ERROR_FAILED,
1125 "Element <%s> not allowed inside <%s> in configuration file",
1126 element_name, "busconfig");
1132 append_rule_from_element (BusConfigParser *parser,
1133 const char *element_name,
1134 const char **attribute_names,
1135 const char **attribute_values,
1140 const char *send_interface;
1141 const char *send_member;
1142 const char *send_error;
1143 const char *send_destination;
1144 const char *send_path;
1145 const char *send_type;
1146 const char *receive_interface;
1147 const char *receive_member;
1148 const char *receive_error;
1149 const char *receive_sender;
1150 const char *receive_path;
1151 const char *receive_type;
1152 const char *eavesdrop;
1153 const char *send_requested_reply;
1154 const char *receive_requested_reply;
1159 BusPolicyRule *rule;
1161 if (!locate_attributes (parser, element_name,
1165 "send_interface", &send_interface,
1166 "send_member", &send_member,
1167 "send_error", &send_error,
1168 "send_destination", &send_destination,
1169 "send_path", &send_path,
1170 "send_type", &send_type,
1171 "receive_interface", &receive_interface,
1172 "receive_member", &receive_member,
1173 "receive_error", &receive_error,
1174 "receive_sender", &receive_sender,
1175 "receive_path", &receive_path,
1176 "receive_type", &receive_type,
1177 "eavesdrop", &eavesdrop,
1178 "send_requested_reply", &send_requested_reply,
1179 "receive_requested_reply", &receive_requested_reply,
1187 if (!(send_interface || send_member || send_error || send_destination ||
1188 send_type || send_path ||
1189 receive_interface || receive_member || receive_error || receive_sender ||
1190 receive_type || receive_path || eavesdrop ||
1191 send_requested_reply || receive_requested_reply ||
1192 own || user || group))
1194 dbus_set_error (error, DBUS_ERROR_FAILED,
1195 "Element <%s> must have one or more attributes",
1200 if ((send_member && (send_interface == NULL && send_path == NULL)) ||
1201 (receive_member && (receive_interface == NULL && receive_path == NULL)))
1203 dbus_set_error (error, DBUS_ERROR_FAILED,
1204 "On element <%s>, if you specify a member you must specify an interface or a path. Keep in mind that not all messages have an interface field.",
1209 /* Allowed combinations of elements are:
1211 * base, must be all send or all receive:
1214 * interface + member
1217 * base send_ can combine with send_destination, send_path, send_type, send_requested_reply
1218 * base receive_ with receive_sender, receive_path, receive_type, receive_requested_reply, eavesdrop
1220 * user, group, own must occur alone
1222 * Pretty sure the below stuff is broken, FIXME think about it more.
1225 if (((send_interface && send_error) ||
1226 (send_interface && receive_interface) ||
1227 (send_interface && receive_member) ||
1228 (send_interface && receive_error) ||
1229 (send_interface && receive_sender) ||
1230 (send_interface && receive_requested_reply) ||
1231 (send_interface && own) ||
1232 (send_interface && user) ||
1233 (send_interface && group)) ||
1235 ((send_member && send_error) ||
1236 (send_member && receive_interface) ||
1237 (send_member && receive_member) ||
1238 (send_member && receive_error) ||
1239 (send_member && receive_sender) ||
1240 (send_member && receive_requested_reply) ||
1241 (send_member && own) ||
1242 (send_member && user) ||
1243 (send_member && group)) ||
1245 ((send_error && receive_interface) ||
1246 (send_error && receive_member) ||
1247 (send_error && receive_error) ||
1248 (send_error && receive_sender) ||
1249 (send_error && receive_requested_reply) ||
1250 (send_error && own) ||
1251 (send_error && user) ||
1252 (send_error && group)) ||
1254 ((send_destination && receive_interface) ||
1255 (send_destination && receive_member) ||
1256 (send_destination && receive_error) ||
1257 (send_destination && receive_sender) ||
1258 (send_destination && receive_requested_reply) ||
1259 (send_destination && own) ||
1260 (send_destination && user) ||
1261 (send_destination && group)) ||
1263 ((send_type && receive_interface) ||
1264 (send_type && receive_member) ||
1265 (send_type && receive_error) ||
1266 (send_type && receive_sender) ||
1267 (send_type && receive_requested_reply) ||
1268 (send_type && own) ||
1269 (send_type && user) ||
1270 (send_type && group)) ||
1272 ((send_path && receive_interface) ||
1273 (send_path && receive_member) ||
1274 (send_path && receive_error) ||
1275 (send_path && receive_sender) ||
1276 (send_path && receive_requested_reply) ||
1277 (send_path && own) ||
1278 (send_path && user) ||
1279 (send_path && group)) ||
1281 ((send_requested_reply && receive_interface) ||
1282 (send_requested_reply && receive_member) ||
1283 (send_requested_reply && receive_error) ||
1284 (send_requested_reply && receive_sender) ||
1285 (send_requested_reply && receive_requested_reply) ||
1286 (send_requested_reply && own) ||
1287 (send_requested_reply && user) ||
1288 (send_requested_reply && group)) ||
1290 ((receive_interface && receive_error) ||
1291 (receive_interface && own) ||
1292 (receive_interface && user) ||
1293 (receive_interface && group)) ||
1295 ((receive_member && receive_error) ||
1296 (receive_member && own) ||
1297 (receive_member && user) ||
1298 (receive_member && group)) ||
1300 ((receive_error && own) ||
1301 (receive_error && user) ||
1302 (receive_error && group)) ||
1304 ((eavesdrop && own) ||
1305 (eavesdrop && user) ||
1306 (eavesdrop && group)) ||
1308 ((receive_requested_reply && own) ||
1309 (receive_requested_reply && user) ||
1310 (receive_requested_reply && group)) ||
1317 dbus_set_error (error, DBUS_ERROR_FAILED,
1318 "Invalid combination of attributes on element <%s>",
1325 /* In BusPolicyRule, NULL represents wildcard.
1326 * In the config file, '*' represents it.
1328 #define IS_WILDCARD(str) ((str) && ((str)[0]) == '*' && ((str)[1]) == '\0')
1330 if (send_interface || send_member || send_error || send_destination ||
1331 send_path || send_type || send_requested_reply)
1335 if (IS_WILDCARD (send_interface))
1336 send_interface = NULL;
1337 if (IS_WILDCARD (send_member))
1339 if (IS_WILDCARD (send_error))
1341 if (IS_WILDCARD (send_destination))
1342 send_destination = NULL;
1343 if (IS_WILDCARD (send_path))
1345 if (IS_WILDCARD (send_type))
1348 message_type = DBUS_MESSAGE_TYPE_INVALID;
1349 if (send_type != NULL)
1351 message_type = dbus_message_type_from_string (send_type);
1352 if (message_type == DBUS_MESSAGE_TYPE_INVALID)
1354 dbus_set_error (error, DBUS_ERROR_FAILED,
1355 "Bad message type \"%s\"",
1362 !(strcmp (eavesdrop, "true") == 0 ||
1363 strcmp (eavesdrop, "false") == 0))
1365 dbus_set_error (error, DBUS_ERROR_FAILED,
1366 "Bad value \"%s\" for %s attribute, must be true or false",
1367 "eavesdrop", eavesdrop);
1371 if (send_requested_reply &&
1372 !(strcmp (send_requested_reply, "true") == 0 ||
1373 strcmp (send_requested_reply, "false") == 0))
1375 dbus_set_error (error, DBUS_ERROR_FAILED,
1376 "Bad value \"%s\" for %s attribute, must be true or false",
1377 "send_requested_reply", send_requested_reply);
1381 rule = bus_policy_rule_new (BUS_POLICY_RULE_SEND, allow);
1386 rule->d.send.eavesdrop = (strcmp (eavesdrop, "true") == 0);
1389 rule->d.send.log = (strcmp (log, "true") == 0);
1391 if (send_requested_reply)
1392 rule->d.send.requested_reply = (strcmp (send_requested_reply, "true") == 0);
1394 rule->d.send.message_type = message_type;
1395 rule->d.send.path = _dbus_strdup (send_path);
1396 rule->d.send.interface = _dbus_strdup (send_interface);
1397 rule->d.send.member = _dbus_strdup (send_member);
1398 rule->d.send.error = _dbus_strdup (send_error);
1399 rule->d.send.destination = _dbus_strdup (send_destination);
1400 if (send_path && rule->d.send.path == NULL)
1402 if (send_interface && rule->d.send.interface == NULL)
1404 if (send_member && rule->d.send.member == NULL)
1406 if (send_error && rule->d.send.error == NULL)
1408 if (send_destination && rule->d.send.destination == NULL)
1411 else if (receive_interface || receive_member || receive_error || receive_sender ||
1412 receive_path || receive_type || eavesdrop || receive_requested_reply)
1416 if (IS_WILDCARD (receive_interface))
1417 receive_interface = NULL;
1418 if (IS_WILDCARD (receive_member))
1419 receive_member = NULL;
1420 if (IS_WILDCARD (receive_error))
1421 receive_error = NULL;
1422 if (IS_WILDCARD (receive_sender))
1423 receive_sender = NULL;
1424 if (IS_WILDCARD (receive_path))
1425 receive_path = NULL;
1426 if (IS_WILDCARD (receive_type))
1427 receive_type = NULL;
1429 message_type = DBUS_MESSAGE_TYPE_INVALID;
1430 if (receive_type != NULL)
1432 message_type = dbus_message_type_from_string (receive_type);
1433 if (message_type == DBUS_MESSAGE_TYPE_INVALID)
1435 dbus_set_error (error, DBUS_ERROR_FAILED,
1436 "Bad message type \"%s\"",
1444 !(strcmp (eavesdrop, "true") == 0 ||
1445 strcmp (eavesdrop, "false") == 0))
1447 dbus_set_error (error, DBUS_ERROR_FAILED,
1448 "Bad value \"%s\" for %s attribute, must be true or false",
1449 "eavesdrop", eavesdrop);
1453 if (receive_requested_reply &&
1454 !(strcmp (receive_requested_reply, "true") == 0 ||
1455 strcmp (receive_requested_reply, "false") == 0))
1457 dbus_set_error (error, DBUS_ERROR_FAILED,
1458 "Bad value \"%s\" for %s attribute, must be true or false",
1459 "receive_requested_reply", receive_requested_reply);
1463 rule = bus_policy_rule_new (BUS_POLICY_RULE_RECEIVE, allow);
1468 rule->d.receive.eavesdrop = (strcmp (eavesdrop, "true") == 0);
1470 if (receive_requested_reply)
1471 rule->d.receive.requested_reply = (strcmp (receive_requested_reply, "true") == 0);
1473 rule->d.receive.message_type = message_type;
1474 rule->d.receive.path = _dbus_strdup (receive_path);
1475 rule->d.receive.interface = _dbus_strdup (receive_interface);
1476 rule->d.receive.member = _dbus_strdup (receive_member);
1477 rule->d.receive.error = _dbus_strdup (receive_error);
1478 rule->d.receive.origin = _dbus_strdup (receive_sender);
1480 if (receive_path && rule->d.receive.path == NULL)
1482 if (receive_interface && rule->d.receive.interface == NULL)
1484 if (receive_member && rule->d.receive.member == NULL)
1486 if (receive_error && rule->d.receive.error == NULL)
1488 if (receive_sender && rule->d.receive.origin == NULL)
1493 rule = bus_policy_rule_new (BUS_POLICY_RULE_OWN, allow);
1497 if (IS_WILDCARD (own))
1500 rule->d.own.service_name = _dbus_strdup (own);
1501 if (own && rule->d.own.service_name == NULL)
1506 if (IS_WILDCARD (user))
1508 rule = bus_policy_rule_new (BUS_POLICY_RULE_USER, allow);
1512 rule->d.user.uid = DBUS_UID_UNSET;
1516 DBusString username;
1519 _dbus_string_init_const (&username, user);
1521 if (_dbus_parse_unix_user_from_config (&username, &uid))
1523 rule = bus_policy_rule_new (BUS_POLICY_RULE_USER, allow);
1527 rule->d.user.uid = uid;
1531 _dbus_warn ("Unknown username \"%s\" on element <%s>\n",
1532 user, element_name);
1538 if (IS_WILDCARD (group))
1540 rule = bus_policy_rule_new (BUS_POLICY_RULE_GROUP, allow);
1544 rule->d.group.gid = DBUS_GID_UNSET;
1548 DBusString groupname;
1551 _dbus_string_init_const (&groupname, group);
1553 if (_dbus_parse_unix_group_from_config (&groupname, &gid))
1555 rule = bus_policy_rule_new (BUS_POLICY_RULE_GROUP, allow);
1559 rule->d.group.gid = gid;
1563 _dbus_warn ("Unknown group \"%s\" on element <%s>\n",
1564 group, element_name);
1569 _dbus_assert_not_reached ("Did not handle some combination of attributes on <allow> or <deny>");
1575 pe = peek_element (parser);
1576 _dbus_assert (pe != NULL);
1577 _dbus_assert (pe->type == ELEMENT_POLICY);
1579 switch (pe->d.policy.type)
1581 case POLICY_IGNORED:
1582 /* drop the rule on the floor */
1585 case POLICY_DEFAULT:
1586 if (!bus_policy_append_default_rule (parser->policy, rule))
1589 case POLICY_MANDATORY:
1590 if (!bus_policy_append_mandatory_rule (parser->policy, rule))
1594 if (!BUS_POLICY_RULE_IS_PER_CLIENT (rule))
1596 dbus_set_error (error, DBUS_ERROR_FAILED,
1597 "<%s> rule cannot be per-user because it has bus-global semantics",
1602 if (!bus_policy_append_user_rule (parser->policy, pe->d.policy.gid_uid_or_at_console,
1607 if (!BUS_POLICY_RULE_IS_PER_CLIENT (rule))
1609 dbus_set_error (error, DBUS_ERROR_FAILED,
1610 "<%s> rule cannot be per-group because it has bus-global semantics",
1615 if (!bus_policy_append_group_rule (parser->policy, pe->d.policy.gid_uid_or_at_console,
1621 case POLICY_CONSOLE:
1622 if (!bus_policy_append_console_rule (parser->policy, pe->d.policy.gid_uid_or_at_console,
1628 bus_policy_rule_unref (rule);
1635 BUS_SET_OOM (error);
1638 bus_policy_rule_unref (rule);
1643 start_policy_child (BusConfigParser *parser,
1644 const char *element_name,
1645 const char **attribute_names,
1646 const char **attribute_values,
1649 if (strcmp (element_name, "allow") == 0)
1651 if (!append_rule_from_element (parser, element_name,
1652 attribute_names, attribute_values,
1656 if (push_element (parser, ELEMENT_ALLOW) == NULL)
1658 BUS_SET_OOM (error);
1664 else if (strcmp (element_name, "deny") == 0)
1666 if (!append_rule_from_element (parser, element_name,
1667 attribute_names, attribute_values,
1671 if (push_element (parser, ELEMENT_DENY) == NULL)
1673 BUS_SET_OOM (error);
1681 dbus_set_error (error, DBUS_ERROR_FAILED,
1682 "Element <%s> not allowed inside <%s> in configuration file",
1683 element_name, "policy");
1689 start_selinux_child (BusConfigParser *parser,
1690 const char *element_name,
1691 const char **attribute_names,
1692 const char **attribute_values,
1699 context_copy = NULL;
1701 if (strcmp (element_name, "associate") == 0)
1704 const char *context;
1706 if (!locate_attributes (parser, "associate",
1711 "context", &context,
1715 if (push_element (parser, ELEMENT_ASSOCIATE) == NULL)
1717 BUS_SET_OOM (error);
1721 if (own == NULL || context == NULL)
1723 dbus_set_error (error, DBUS_ERROR_FAILED,
1724 "Element <associate> must have attributes own=\"<servicename>\" and context=\"<selinux context>\"");
1728 own_copy = _dbus_strdup (own);
1729 if (own_copy == NULL)
1731 context_copy = _dbus_strdup (context);
1732 if (context_copy == NULL)
1735 if (!_dbus_hash_table_insert_string (parser->service_context_table,
1736 own_copy, context_copy))
1743 dbus_set_error (error, DBUS_ERROR_FAILED,
1744 "Element <%s> not allowed inside <%s> in configuration file",
1745 element_name, "selinux");
1751 dbus_free (own_copy);
1754 dbus_free (context_copy);
1756 BUS_SET_OOM (error);
1761 bus_config_parser_start_element (BusConfigParser *parser,
1762 const char *element_name,
1763 const char **attribute_names,
1764 const char **attribute_values,
1769 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1771 /* printf ("START: %s\n", element_name); */
1773 t = top_element_type (parser);
1775 if (t == ELEMENT_NONE)
1777 if (strcmp (element_name, "busconfig") == 0)
1779 if (!check_no_attributes (parser, "busconfig", attribute_names, attribute_values, error))
1782 if (push_element (parser, ELEMENT_BUSCONFIG) == NULL)
1784 BUS_SET_OOM (error);
1792 dbus_set_error (error, DBUS_ERROR_FAILED,
1793 "Unknown element <%s> at root of configuration file",
1798 else if (t == ELEMENT_BUSCONFIG)
1800 return start_busconfig_child (parser, element_name,
1801 attribute_names, attribute_values,
1804 else if (t == ELEMENT_POLICY)
1806 return start_policy_child (parser, element_name,
1807 attribute_names, attribute_values,
1810 else if (t == ELEMENT_SELINUX)
1812 return start_selinux_child (parser, element_name,
1813 attribute_names, attribute_values,
1818 dbus_set_error (error, DBUS_ERROR_FAILED,
1819 "Element <%s> is not allowed in this context",
1826 set_limit (BusConfigParser *parser,
1831 dbus_bool_t must_be_positive;
1832 dbus_bool_t must_be_int;
1834 must_be_int = FALSE;
1835 must_be_positive = FALSE;
1837 if (strcmp (name, "max_incoming_bytes") == 0)
1839 must_be_positive = TRUE;
1840 parser->limits.max_incoming_bytes = value;
1842 else if (strcmp (name, "max_incoming_unix_fds") == 0)
1844 must_be_positive = TRUE;
1845 parser->limits.max_incoming_unix_fds = value;
1847 else if (strcmp (name, "max_outgoing_bytes") == 0)
1849 must_be_positive = TRUE;
1850 parser->limits.max_outgoing_bytes = value;
1852 else if (strcmp (name, "max_outgoing_unix_fds") == 0)
1854 must_be_positive = TRUE;
1855 parser->limits.max_outgoing_unix_fds = value;
1857 else if (strcmp (name, "max_message_size") == 0)
1859 must_be_positive = TRUE;
1860 parser->limits.max_message_size = value;
1862 else if (strcmp (name, "max_message_unix_fds") == 0)
1864 must_be_positive = TRUE;
1865 parser->limits.max_message_unix_fds = value;
1867 else if (strcmp (name, "service_start_timeout") == 0)
1869 must_be_positive = TRUE;
1871 parser->limits.activation_timeout = value;
1873 else if (strcmp (name, "auth_timeout") == 0)
1875 must_be_positive = TRUE;
1877 parser->limits.auth_timeout = value;
1879 else if (strcmp (name, "reply_timeout") == 0)
1881 must_be_positive = TRUE;
1883 parser->limits.reply_timeout = value;
1885 else if (strcmp (name, "max_completed_connections") == 0)
1887 must_be_positive = TRUE;
1889 parser->limits.max_completed_connections = value;
1891 else if (strcmp (name, "max_incomplete_connections") == 0)
1893 must_be_positive = TRUE;
1895 parser->limits.max_incomplete_connections = value;
1897 else if (strcmp (name, "max_connections_per_user") == 0)
1899 must_be_positive = TRUE;
1901 parser->limits.max_connections_per_user = value;
1903 else if (strcmp (name, "max_pending_service_starts") == 0)
1905 must_be_positive = TRUE;
1907 parser->limits.max_pending_activations = value;
1909 else if (strcmp (name, "max_names_per_connection") == 0)
1911 must_be_positive = TRUE;
1913 parser->limits.max_services_per_connection = value;
1915 else if (strcmp (name, "max_match_rules_per_connection") == 0)
1917 must_be_positive = TRUE;
1919 parser->limits.max_match_rules_per_connection = value;
1921 else if (strcmp (name, "max_replies_per_connection") == 0)
1923 must_be_positive = TRUE;
1925 parser->limits.max_replies_per_connection = value;
1929 dbus_set_error (error, DBUS_ERROR_FAILED,
1930 "There is no limit called \"%s\"\n",
1935 if (must_be_positive && value < 0)
1937 dbus_set_error (error, DBUS_ERROR_FAILED,
1938 "<limit name=\"%s\"> must be a positive number\n",
1944 (value < _DBUS_INT_MIN || value > _DBUS_INT_MAX))
1946 dbus_set_error (error, DBUS_ERROR_FAILED,
1947 "<limit name=\"%s\"> value is too large\n",
1956 bus_config_parser_end_element (BusConfigParser *parser,
1957 const char *element_name,
1964 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1966 /* printf ("END: %s\n", element_name); */
1968 t = top_element_type (parser);
1970 if (t == ELEMENT_NONE)
1972 /* should probably be an assertion failure but
1973 * being paranoid about XML parsers
1975 dbus_set_error (error, DBUS_ERROR_FAILED,
1976 "XML parser ended element with no element on the stack");
1980 n = bus_config_parser_element_type_to_name (t);
1981 _dbus_assert (n != NULL);
1982 if (strcmp (n, element_name) != 0)
1984 /* should probably be an assertion failure but
1985 * being paranoid about XML parsers
1987 dbus_set_error (error, DBUS_ERROR_FAILED,
1988 "XML element <%s> ended but topmost element on the stack was <%s>",
1993 e = peek_element (parser);
1994 _dbus_assert (e != NULL);
1999 _dbus_assert_not_reached ("element in stack has no type");
2002 case ELEMENT_INCLUDE:
2005 case ELEMENT_LISTEN:
2006 case ELEMENT_PIDFILE:
2008 case ELEMENT_SERVICEDIR:
2009 case ELEMENT_SERVICEHELPER:
2010 case ELEMENT_INCLUDEDIR:
2012 if (!e->had_content)
2014 dbus_set_error (error, DBUS_ERROR_FAILED,
2015 "XML element <%s> was expected to have content inside it",
2016 bus_config_parser_element_type_to_name (e->type));
2020 if (e->type == ELEMENT_LIMIT)
2022 if (!set_limit (parser, e->d.limit.name, e->d.limit.value,
2028 case ELEMENT_BUSCONFIG:
2029 case ELEMENT_POLICY:
2033 case ELEMENT_SYSLOG:
2034 case ELEMENT_KEEP_UMASK:
2035 case ELEMENT_SELINUX:
2036 case ELEMENT_ASSOCIATE:
2037 case ELEMENT_STANDARD_SESSION_SERVICEDIRS:
2038 case ELEMENT_STANDARD_SYSTEM_SERVICEDIRS:
2039 case ELEMENT_ALLOW_ANONYMOUS:
2043 pop_element (parser);
2049 all_whitespace (const DBusString *str)
2053 _dbus_string_skip_white (str, 0, &i);
2055 return i == _dbus_string_get_length (str);
2059 make_full_path (const DBusString *basedir,
2060 const DBusString *filename,
2061 DBusString *full_path)
2063 if (_dbus_path_is_absolute (filename))
2065 return _dbus_string_copy (filename, 0, full_path, 0);
2069 if (!_dbus_string_copy (basedir, 0, full_path, 0))
2072 if (!_dbus_concat_dir_and_file (full_path, filename))
2080 include_file (BusConfigParser *parser,
2081 const DBusString *filename,
2082 dbus_bool_t ignore_missing,
2085 /* FIXME good test case for this would load each config file in the
2086 * test suite both alone, and as an include, and check
2087 * that the result is the same
2089 BusConfigParser *included;
2090 const char *filename_str;
2091 DBusError tmp_error;
2093 dbus_error_init (&tmp_error);
2095 filename_str = _dbus_string_get_const_data (filename);
2097 /* Check to make sure this file hasn't already been included. */
2098 if (seen_include (parser, filename))
2100 dbus_set_error (error, DBUS_ERROR_FAILED,
2101 "Circular inclusion of file '%s'",
2106 if (! _dbus_list_append (&parser->included_files, (void *) filename_str))
2108 BUS_SET_OOM (error);
2112 /* Since parser is passed in as the parent, included
2113 inherits parser's limits. */
2114 included = bus_config_load (filename, FALSE, parser, &tmp_error);
2116 _dbus_list_pop_last (&parser->included_files);
2118 if (included == NULL)
2120 _DBUS_ASSERT_ERROR_IS_SET (&tmp_error);
2122 if (dbus_error_has_name (&tmp_error, DBUS_ERROR_FILE_NOT_FOUND) &&
2125 dbus_error_free (&tmp_error);
2130 dbus_move_error (&tmp_error, error);
2136 _DBUS_ASSERT_ERROR_IS_CLEAR (&tmp_error);
2138 if (!merge_included (parser, included, error))
2140 bus_config_parser_unref (included);
2144 /* Copy included's limits back to parser. */
2145 parser->limits = included->limits;
2147 bus_config_parser_unref (included);
2153 servicehelper_path (BusConfigParser *parser,
2154 const DBusString *filename,
2157 const char *filename_str;
2158 char *servicehelper;
2160 filename_str = _dbus_string_get_const_data (filename);
2162 /* copy to avoid overwriting with NULL on OOM */
2163 servicehelper = _dbus_strdup (filename_str);
2166 if (servicehelper == NULL)
2168 BUS_SET_OOM (error);
2172 /* save the latest servicehelper only if not OOM */
2173 dbus_free (parser->servicehelper);
2174 parser->servicehelper = servicehelper;
2176 /* We don't check whether the helper exists; instead we
2177 * would just fail to ever activate anything if it doesn't.
2178 * This allows an admin to fix the problem if it doesn't exist.
2179 * It also allows the parser test suite to successfully parse
2180 * test cases without installing the helper. ;-)
2187 include_dir (BusConfigParser *parser,
2188 const DBusString *dirname,
2191 DBusString filename;
2193 DBusError tmp_error;
2197 if (!_dbus_string_init (&filename))
2199 BUS_SET_OOM (error);
2205 dir = _dbus_directory_open (dirname, error);
2210 dbus_error_init (&tmp_error);
2211 while (_dbus_directory_get_next_file (dir, &filename, &tmp_error))
2213 DBusString full_path;
2215 if (!_dbus_string_init (&full_path))
2217 BUS_SET_OOM (error);
2221 if (!_dbus_string_copy (dirname, 0, &full_path, 0))
2223 BUS_SET_OOM (error);
2224 _dbus_string_free (&full_path);
2228 if (!_dbus_concat_dir_and_file (&full_path, &filename))
2230 BUS_SET_OOM (error);
2231 _dbus_string_free (&full_path);
2235 if (_dbus_string_ends_with_c_str (&full_path, ".conf"))
2237 if (!include_file (parser, &full_path, TRUE, error))
2239 _dbus_string_free (&full_path);
2244 _dbus_string_free (&full_path);
2247 if (dbus_error_is_set (&tmp_error))
2249 dbus_move_error (&tmp_error, error);
2254 if (!_dbus_string_copy_data (dirname, &s))
2256 BUS_SET_OOM (error);
2260 if (!_dbus_list_append (&parser->conf_dirs, s))
2263 BUS_SET_OOM (error);
2270 _dbus_string_free (&filename);
2273 _dbus_directory_close (dir);
2279 bus_config_parser_content (BusConfigParser *parser,
2280 const DBusString *content,
2285 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
2291 _dbus_string_get_const_data (content, &c_str);
2293 printf ("CONTENT %d bytes: %s\n", _dbus_string_get_length (content), c_str);
2297 e = peek_element (parser);
2300 dbus_set_error (error, DBUS_ERROR_FAILED,
2301 "Text content outside of any XML element in configuration file");
2304 else if (e->had_content)
2306 _dbus_assert_not_reached ("Element had multiple content blocks");
2310 switch (top_element_type (parser))
2313 _dbus_assert_not_reached ("element at top of stack has no type");
2316 case ELEMENT_BUSCONFIG:
2317 case ELEMENT_POLICY:
2321 case ELEMENT_SYSLOG:
2322 case ELEMENT_KEEP_UMASK:
2323 case ELEMENT_STANDARD_SESSION_SERVICEDIRS:
2324 case ELEMENT_STANDARD_SYSTEM_SERVICEDIRS:
2325 case ELEMENT_ALLOW_ANONYMOUS:
2326 case ELEMENT_SELINUX:
2327 case ELEMENT_ASSOCIATE:
2328 if (all_whitespace (content))
2332 dbus_set_error (error, DBUS_ERROR_FAILED,
2333 "No text content expected inside XML element %s in configuration file",
2334 bus_config_parser_element_type_to_name (top_element_type (parser)));
2338 case ELEMENT_PIDFILE:
2342 e->had_content = TRUE;
2344 if (!_dbus_string_copy_data (content, &s))
2347 dbus_free (parser->pidfile);
2348 parser->pidfile = s;
2352 case ELEMENT_INCLUDE:
2354 DBusString full_path, selinux_policy_root;
2356 e->had_content = TRUE;
2358 if (e->d.include.if_selinux_enabled
2359 && !bus_selinux_enabled ())
2362 if (!_dbus_string_init (&full_path))
2365 if (e->d.include.selinux_root_relative)
2367 if (!bus_selinux_get_policy_root ())
2369 dbus_set_error (error, DBUS_ERROR_FAILED,
2370 "Could not determine SELinux policy root for relative inclusion");
2371 _dbus_string_free (&full_path);
2374 _dbus_string_init_const (&selinux_policy_root,
2375 bus_selinux_get_policy_root ());
2376 if (!make_full_path (&selinux_policy_root, content, &full_path))
2378 _dbus_string_free (&full_path);
2382 else if (!make_full_path (&parser->basedir, content, &full_path))
2384 _dbus_string_free (&full_path);
2388 if (!include_file (parser, &full_path,
2389 e->d.include.ignore_missing, error))
2391 _dbus_string_free (&full_path);
2395 _dbus_string_free (&full_path);
2399 case ELEMENT_SERVICEHELPER:
2401 DBusString full_path;
2403 e->had_content = TRUE;
2405 if (!_dbus_string_init (&full_path))
2408 if (!make_full_path (&parser->basedir, content, &full_path))
2410 _dbus_string_free (&full_path);
2414 if (!servicehelper_path (parser, &full_path, error))
2416 _dbus_string_free (&full_path);
2420 _dbus_string_free (&full_path);
2424 case ELEMENT_INCLUDEDIR:
2426 DBusString full_path;
2428 e->had_content = TRUE;
2430 if (!_dbus_string_init (&full_path))
2433 if (!make_full_path (&parser->basedir, content, &full_path))
2435 _dbus_string_free (&full_path);
2439 if (!include_dir (parser, &full_path, error))
2441 _dbus_string_free (&full_path);
2445 _dbus_string_free (&full_path);
2453 e->had_content = TRUE;
2455 if (!_dbus_string_copy_data (content, &s))
2458 dbus_free (parser->user);
2467 e->had_content = TRUE;
2469 if (!_dbus_string_copy_data (content, &s))
2472 dbus_free (parser->bus_type);
2473 parser->bus_type = s;
2477 case ELEMENT_LISTEN:
2481 e->had_content = TRUE;
2483 if (!_dbus_string_copy_data (content, &s))
2486 if (!_dbus_list_append (&parser->listen_on,
2499 e->had_content = TRUE;
2501 if (!_dbus_string_copy_data (content, &s))
2504 if (!_dbus_list_append (&parser->mechanisms,
2513 case ELEMENT_SERVICEDIR:
2516 DBusString full_path;
2518 e->had_content = TRUE;
2520 if (!_dbus_string_init (&full_path))
2523 if (!make_full_path (&parser->basedir, content, &full_path))
2525 _dbus_string_free (&full_path);
2529 if (!_dbus_string_copy_data (&full_path, &s))
2531 _dbus_string_free (&full_path);
2535 /* _only_ extra session directories can be specified */
2536 if (!service_dirs_append_unique_or_free (&parser->service_dirs, s))
2538 _dbus_string_free (&full_path);
2543 _dbus_string_free (&full_path);
2551 e->had_content = TRUE;
2554 if (!_dbus_string_parse_int (content, 0, &val, NULL))
2556 dbus_set_error (error, DBUS_ERROR_FAILED,
2557 "<limit name=\"%s\"> element has invalid value (could not parse as integer)",
2562 e->d.limit.value = val;
2564 _dbus_verbose ("Loaded value %ld for limit %s\n",
2571 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
2575 BUS_SET_OOM (error);
2580 bus_config_parser_finished (BusConfigParser *parser,
2583 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
2585 if (parser->stack != NULL)
2587 dbus_set_error (error, DBUS_ERROR_FAILED,
2588 "Element <%s> was not closed in configuration file",
2589 bus_config_parser_element_type_to_name (top_element_type (parser)));
2594 if (parser->is_toplevel && parser->listen_on == NULL)
2596 dbus_set_error (error, DBUS_ERROR_FAILED,
2597 "Configuration file needs one or more <listen> elements giving addresses");
2605 bus_config_parser_get_user (BusConfigParser *parser)
2607 return parser->user;
2611 bus_config_parser_get_type (BusConfigParser *parser)
2613 return parser->bus_type;
2617 bus_config_parser_get_addresses (BusConfigParser *parser)
2619 return &parser->listen_on;
2623 bus_config_parser_get_mechanisms (BusConfigParser *parser)
2625 return &parser->mechanisms;
2629 bus_config_parser_get_service_dirs (BusConfigParser *parser)
2631 return &parser->service_dirs;
2635 bus_config_parser_get_conf_dirs (BusConfigParser *parser)
2637 return &parser->conf_dirs;
2641 bus_config_parser_get_fork (BusConfigParser *parser)
2643 return parser->fork;
2647 bus_config_parser_get_syslog (BusConfigParser *parser)
2649 return parser->syslog;
2653 bus_config_parser_get_keep_umask (BusConfigParser *parser)
2655 return parser->keep_umask;
2659 bus_config_parser_get_allow_anonymous (BusConfigParser *parser)
2661 return parser->allow_anonymous;
2665 bus_config_parser_get_pidfile (BusConfigParser *parser)
2667 return parser->pidfile;
2671 bus_config_parser_get_servicehelper (BusConfigParser *parser)
2673 return parser->servicehelper;
2677 bus_config_parser_steal_policy (BusConfigParser *parser)
2681 _dbus_assert (parser->policy != NULL); /* can only steal the policy 1 time */
2683 policy = parser->policy;
2685 parser->policy = NULL;
2690 /* Overwrite any limits that were set in the configuration file */
2692 bus_config_parser_get_limits (BusConfigParser *parser,
2695 *limits = parser->limits;
2699 bus_config_parser_steal_service_context_table (BusConfigParser *parser)
2701 DBusHashTable *table;
2703 _dbus_assert (parser->service_context_table != NULL); /* can only steal once */
2705 table = parser->service_context_table;
2707 parser->service_context_table = NULL;
2712 #ifdef DBUS_BUILD_TESTS
2723 do_load (const DBusString *full_path,
2725 dbus_bool_t oom_possible)
2727 BusConfigParser *parser;
2730 dbus_error_init (&error);
2732 parser = bus_config_load (full_path, TRUE, NULL, &error);
2735 _DBUS_ASSERT_ERROR_IS_SET (&error);
2738 dbus_error_has_name (&error, DBUS_ERROR_NO_MEMORY))
2740 _dbus_verbose ("Failed to load valid file due to OOM\n");
2741 dbus_error_free (&error);
2744 else if (validity == VALID)
2746 _dbus_warn ("Failed to load valid file but still had memory: %s\n",
2749 dbus_error_free (&error);
2754 dbus_error_free (&error);
2760 _DBUS_ASSERT_ERROR_IS_CLEAR (&error);
2762 bus_config_parser_unref (parser);
2764 if (validity == INVALID)
2766 _dbus_warn ("Accepted invalid file\n");
2776 const DBusString *full_path;
2781 check_loader_oom_func (void *data)
2783 LoaderOomData *d = data;
2785 return do_load (d->full_path, d->validity, TRUE);
2789 process_test_valid_subdir (const DBusString *test_base_dir,
2793 DBusString test_directory;
2794 DBusString filename;
2802 if (!_dbus_string_init (&test_directory))
2803 _dbus_assert_not_reached ("didn't allocate test_directory\n");
2805 _dbus_string_init_const (&filename, subdir);
2807 if (!_dbus_string_copy (test_base_dir, 0,
2808 &test_directory, 0))
2809 _dbus_assert_not_reached ("couldn't copy test_base_dir to test_directory");
2811 if (!_dbus_concat_dir_and_file (&test_directory, &filename))
2812 _dbus_assert_not_reached ("couldn't allocate full path");
2814 _dbus_string_free (&filename);
2815 if (!_dbus_string_init (&filename))
2816 _dbus_assert_not_reached ("didn't allocate filename string\n");
2818 dbus_error_init (&error);
2819 dir = _dbus_directory_open (&test_directory, &error);
2822 _dbus_warn ("Could not open %s: %s\n",
2823 _dbus_string_get_const_data (&test_directory),
2825 dbus_error_free (&error);
2829 if (validity == VALID)
2830 printf ("Testing valid files:\n");
2831 else if (validity == INVALID)
2832 printf ("Testing invalid files:\n");
2834 printf ("Testing unknown files:\n");
2837 while (_dbus_directory_get_next_file (dir, &filename, &error))
2839 DBusString full_path;
2842 if (!_dbus_string_init (&full_path))
2843 _dbus_assert_not_reached ("couldn't init string");
2845 if (!_dbus_string_copy (&test_directory, 0, &full_path, 0))
2846 _dbus_assert_not_reached ("couldn't copy dir to full_path");
2848 if (!_dbus_concat_dir_and_file (&full_path, &filename))
2849 _dbus_assert_not_reached ("couldn't concat file to dir");
2851 if (!_dbus_string_ends_with_c_str (&full_path, ".conf"))
2853 _dbus_verbose ("Skipping non-.conf file %s\n",
2854 _dbus_string_get_const_data (&filename));
2855 _dbus_string_free (&full_path);
2859 printf (" %s\n", _dbus_string_get_const_data (&filename));
2861 _dbus_verbose (" expecting %s\n",
2862 validity == VALID ? "valid" :
2863 (validity == INVALID ? "invalid" :
2864 (validity == UNKNOWN ? "unknown" : "???")));
2866 d.full_path = &full_path;
2867 d.validity = validity;
2869 /* FIXME hackaround for an expat problem, see
2870 * https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124747
2871 * http://freedesktop.org/pipermail/dbus/2004-May/001153.html
2873 /* if (!_dbus_test_oom_handling ("config-loader", check_loader_oom_func, &d)) */
2874 if (!check_loader_oom_func (&d))
2875 _dbus_assert_not_reached ("test failed");
2877 _dbus_string_free (&full_path);
2880 if (dbus_error_is_set (&error))
2882 _dbus_warn ("Could not get next file in %s: %s\n",
2883 _dbus_string_get_const_data (&test_directory),
2885 dbus_error_free (&error);
2894 _dbus_directory_close (dir);
2895 _dbus_string_free (&test_directory);
2896 _dbus_string_free (&filename);
2902 bools_equal (dbus_bool_t a,
2909 strings_equal_or_both_null (const char *a,
2912 if (a == NULL || b == NULL)
2915 return !strcmp (a, b);
2919 elements_equal (const Element *a,
2922 if (a->type != b->type)
2925 if (!bools_equal (a->had_content, b->had_content))
2931 case ELEMENT_INCLUDE:
2932 if (!bools_equal (a->d.include.ignore_missing,
2933 b->d.include.ignore_missing))
2937 case ELEMENT_POLICY:
2938 if (a->d.policy.type != b->d.policy.type)
2940 if (a->d.policy.gid_uid_or_at_console != b->d.policy.gid_uid_or_at_console)
2945 if (strcmp (a->d.limit.name, b->d.limit.name))
2947 if (a->d.limit.value != b->d.limit.value)
2961 lists_of_elements_equal (DBusList *a,
2970 while (ia != NULL && ib != NULL)
2972 if (elements_equal (ia->data, ib->data))
2974 ia = _dbus_list_get_next_link (&a, ia);
2975 ib = _dbus_list_get_next_link (&b, ib);
2978 return ia == NULL && ib == NULL;
2982 lists_of_c_strings_equal (DBusList *a,
2991 while (ia != NULL && ib != NULL)
2993 if (strcmp (ia->data, ib->data))
2995 ia = _dbus_list_get_next_link (&a, ia);
2996 ib = _dbus_list_get_next_link (&b, ib);
2999 return ia == NULL && ib == NULL;
3003 limits_equal (const BusLimits *a,
3007 (a->max_incoming_bytes == b->max_incoming_bytes
3008 || a->max_incoming_unix_fds == b->max_incoming_unix_fds
3009 || a->max_outgoing_bytes == b->max_outgoing_bytes
3010 || a->max_outgoing_unix_fds == b->max_outgoing_unix_fds
3011 || a->max_message_size == b->max_message_size
3012 || a->max_message_unix_fds == b->max_message_unix_fds
3013 || a->activation_timeout == b->activation_timeout
3014 || a->auth_timeout == b->auth_timeout
3015 || a->max_completed_connections == b->max_completed_connections
3016 || a->max_incomplete_connections == b->max_incomplete_connections
3017 || a->max_connections_per_user == b->max_connections_per_user
3018 || a->max_pending_activations == b->max_pending_activations
3019 || a->max_services_per_connection == b->max_services_per_connection
3020 || a->max_match_rules_per_connection == b->max_match_rules_per_connection
3021 || a->max_replies_per_connection == b->max_replies_per_connection
3022 || a->reply_timeout == b->reply_timeout);
3026 config_parsers_equal (const BusConfigParser *a,
3027 const BusConfigParser *b)
3029 if (!_dbus_string_equal (&a->basedir, &b->basedir))
3032 if (!lists_of_elements_equal (a->stack, b->stack))
3035 if (!strings_equal_or_both_null (a->user, b->user))
3038 if (!lists_of_c_strings_equal (a->listen_on, b->listen_on))
3041 if (!lists_of_c_strings_equal (a->mechanisms, b->mechanisms))
3044 if (!lists_of_c_strings_equal (a->service_dirs, b->service_dirs))
3047 /* FIXME: compare policy */
3049 /* FIXME: compare service selinux ID table */
3051 if (! limits_equal (&a->limits, &b->limits))
3054 if (!strings_equal_or_both_null (a->pidfile, b->pidfile))
3057 if (! bools_equal (a->fork, b->fork))
3060 if (! bools_equal (a->keep_umask, b->keep_umask))
3063 if (! bools_equal (a->is_toplevel, b->is_toplevel))
3070 all_are_equiv (const DBusString *target_directory)
3072 DBusString filename;
3074 BusConfigParser *first_parser;
3075 BusConfigParser *parser;
3081 first_parser = NULL;
3085 if (!_dbus_string_init (&filename))
3086 _dbus_assert_not_reached ("didn't allocate filename string");
3088 dbus_error_init (&error);
3089 dir = _dbus_directory_open (target_directory, &error);
3092 _dbus_warn ("Could not open %s: %s\n",
3093 _dbus_string_get_const_data (target_directory),
3095 dbus_error_free (&error);
3099 printf ("Comparing equivalent files:\n");
3102 while (_dbus_directory_get_next_file (dir, &filename, &error))
3104 DBusString full_path;
3106 if (!_dbus_string_init (&full_path))
3107 _dbus_assert_not_reached ("couldn't init string");
3109 if (!_dbus_string_copy (target_directory, 0, &full_path, 0))
3110 _dbus_assert_not_reached ("couldn't copy dir to full_path");
3112 if (!_dbus_concat_dir_and_file (&full_path, &filename))
3113 _dbus_assert_not_reached ("couldn't concat file to dir");
3115 if (!_dbus_string_ends_with_c_str (&full_path, ".conf"))
3117 _dbus_verbose ("Skipping non-.conf file %s\n",
3118 _dbus_string_get_const_data (&filename));
3119 _dbus_string_free (&full_path);
3123 printf (" %s\n", _dbus_string_get_const_data (&filename));
3125 parser = bus_config_load (&full_path, TRUE, NULL, &error);
3129 _dbus_warn ("Could not load file %s: %s\n",
3130 _dbus_string_get_const_data (&full_path),
3132 _dbus_string_free (&full_path);
3133 dbus_error_free (&error);
3136 else if (first_parser == NULL)
3138 _dbus_string_free (&full_path);
3139 first_parser = parser;
3143 _dbus_string_free (&full_path);
3144 equal = config_parsers_equal (first_parser, parser);
3145 bus_config_parser_unref (parser);
3154 _dbus_string_free (&filename);
3156 bus_config_parser_unref (first_parser);
3158 _dbus_directory_close (dir);
3165 process_test_equiv_subdir (const DBusString *test_base_dir,
3168 DBusString test_directory;
3169 DBusString filename;
3178 if (!_dbus_string_init (&test_directory))
3179 _dbus_assert_not_reached ("didn't allocate test_directory");
3181 _dbus_string_init_const (&filename, subdir);
3183 if (!_dbus_string_copy (test_base_dir, 0,
3184 &test_directory, 0))
3185 _dbus_assert_not_reached ("couldn't copy test_base_dir to test_directory");
3187 if (!_dbus_concat_dir_and_file (&test_directory, &filename))
3188 _dbus_assert_not_reached ("couldn't allocate full path");
3190 _dbus_string_free (&filename);
3191 if (!_dbus_string_init (&filename))
3192 _dbus_assert_not_reached ("didn't allocate filename string");
3194 dbus_error_init (&error);
3195 dir = _dbus_directory_open (&test_directory, &error);
3198 _dbus_warn ("Could not open %s: %s\n",
3199 _dbus_string_get_const_data (&test_directory),
3201 dbus_error_free (&error);
3205 while (_dbus_directory_get_next_file (dir, &filename, &error))
3207 DBusString full_path;
3209 /* Skip CVS's magic directories! */
3210 if (_dbus_string_equal_c_str (&filename, "CVS"))
3213 if (!_dbus_string_init (&full_path))
3214 _dbus_assert_not_reached ("couldn't init string");
3216 if (!_dbus_string_copy (&test_directory, 0, &full_path, 0))
3217 _dbus_assert_not_reached ("couldn't copy dir to full_path");
3219 if (!_dbus_concat_dir_and_file (&full_path, &filename))
3220 _dbus_assert_not_reached ("couldn't concat file to dir");
3222 equal = all_are_equiv (&full_path);
3223 _dbus_string_free (&full_path);
3232 _dbus_string_free (&test_directory);
3233 _dbus_string_free (&filename);
3235 _dbus_directory_close (dir);
3241 static const char *test_session_service_dir_matches[] =
3244 "/testusr/testlocal/testshare/dbus-1/services",
3245 "/testusr/testshare/dbus-1/services",
3247 DBUS_DATADIR"/dbus-1/services",
3249 "/testhome/foo/.testlocal/testshare/dbus-1/services",
3258 test_default_session_servicedirs (void)
3263 const char *common_progs;
3266 /* On Unix we don't actually use this variable, but it's easier to handle the
3267 * deallocation if we always allocate it, whether needed or not */
3268 if (!_dbus_string_init (&progs))
3269 _dbus_assert_not_reached ("OOM allocating progs");
3271 common_progs = _dbus_getenv ("CommonProgramFiles");
3275 if (!_dbus_string_append (&progs, common_progs))
3277 _dbus_string_free (&progs);
3281 if (!_dbus_string_append (&progs, "/dbus-1/services"))
3283 _dbus_string_free (&progs);
3286 test_session_service_dir_matches[1] = _dbus_string_get_const_data(&progs);
3291 printf ("Testing retrieving the default session service directories\n");
3292 if (!_dbus_get_standard_session_servicedirs (&dirs))
3293 _dbus_assert_not_reached ("couldn't get stardard dirs");
3295 /* make sure our defaults end with share/dbus-1/service */
3296 while ((link = _dbus_list_pop_first_link (&dirs)))
3300 printf (" default service dir: %s\n", (char *)link->data);
3301 _dbus_string_init_const (&path, (char *)link->data);
3302 if (!_dbus_string_ends_with_c_str (&path, "dbus-1/services"))
3304 printf ("error with default session service directories\n");
3305 dbus_free (link->data);
3306 _dbus_list_free_link (link);
3307 _dbus_string_free (&progs);
3311 dbus_free (link->data);
3312 _dbus_list_free_link (link);
3316 if (!_dbus_setenv ("XDG_DATA_HOME", "/testhome/foo/.testlocal/testshare"))
3317 _dbus_assert_not_reached ("couldn't setenv XDG_DATA_HOME");
3319 if (!_dbus_setenv ("XDG_DATA_DIRS", ":/testusr/testlocal/testshare: :/testusr/testshare:"))
3320 _dbus_assert_not_reached ("couldn't setenv XDG_DATA_DIRS");
3322 if (!_dbus_get_standard_session_servicedirs (&dirs))
3323 _dbus_assert_not_reached ("couldn't get stardard dirs");
3325 /* make sure we read and parse the env variable correctly */
3327 while ((link = _dbus_list_pop_first_link (&dirs)))
3329 printf (" test service dir: %s\n", (char *)link->data);
3330 if (test_session_service_dir_matches[i] == NULL)
3332 printf ("more directories parsed than in match set\n");
3333 dbus_free (link->data);
3334 _dbus_list_free_link (link);
3335 _dbus_string_free (&progs);
3339 if (strcmp (test_session_service_dir_matches[i],
3340 (char *)link->data) != 0)
3342 printf ("%s directory does not match %s in the match set\n",
3344 test_session_service_dir_matches[i]);
3345 dbus_free (link->data);
3346 _dbus_list_free_link (link);
3347 _dbus_string_free (&progs);
3353 dbus_free (link->data);
3354 _dbus_list_free_link (link);
3357 if (test_session_service_dir_matches[i] != NULL)
3359 printf ("extra data %s in the match set was not matched\n",
3360 test_session_service_dir_matches[i]);
3362 _dbus_string_free (&progs);
3366 _dbus_string_free (&progs);
3370 static const char *test_system_service_dir_matches[] =
3373 "/testusr/testlocal/testshare/dbus-1/system-services",
3374 "/testusr/testshare/dbus-1/system-services",
3376 DBUS_DATADIR"/dbus-1/system-services",
3384 test_default_system_servicedirs (void)
3389 const char *common_progs;
3392 /* On Unix we don't actually use this variable, but it's easier to handle the
3393 * deallocation if we always allocate it, whether needed or not */
3394 if (!_dbus_string_init (&progs))
3395 _dbus_assert_not_reached ("OOM allocating progs");
3397 common_progs = _dbus_getenv ("CommonProgramFiles");
3401 if (!_dbus_string_append (&progs, common_progs))
3403 _dbus_string_free (&progs);
3407 if (!_dbus_string_append (&progs, "/dbus-1/system-services"))
3409 _dbus_string_free (&progs);
3412 test_system_service_dir_matches[1] = _dbus_string_get_const_data(&progs);
3417 printf ("Testing retrieving the default system service directories\n");
3418 if (!_dbus_get_standard_system_servicedirs (&dirs))
3419 _dbus_assert_not_reached ("couldn't get stardard dirs");
3421 /* make sure our defaults end with share/dbus-1/system-service */
3422 while ((link = _dbus_list_pop_first_link (&dirs)))
3426 printf (" default service dir: %s\n", (char *)link->data);
3427 _dbus_string_init_const (&path, (char *)link->data);
3428 if (!_dbus_string_ends_with_c_str (&path, "dbus-1/system-services"))
3430 printf ("error with default system service directories\n");
3431 dbus_free (link->data);
3432 _dbus_list_free_link (link);
3433 _dbus_string_free (&progs);
3437 dbus_free (link->data);
3438 _dbus_list_free_link (link);
3442 if (!_dbus_setenv ("XDG_DATA_HOME", "/testhome/foo/.testlocal/testshare"))
3443 _dbus_assert_not_reached ("couldn't setenv XDG_DATA_HOME");
3445 if (!_dbus_setenv ("XDG_DATA_DIRS", ":/testusr/testlocal/testshare: :/testusr/testshare:"))
3446 _dbus_assert_not_reached ("couldn't setenv XDG_DATA_DIRS");
3448 if (!_dbus_get_standard_system_servicedirs (&dirs))
3449 _dbus_assert_not_reached ("couldn't get stardard dirs");
3451 /* make sure we read and parse the env variable correctly */
3453 while ((link = _dbus_list_pop_first_link (&dirs)))
3455 printf (" test service dir: %s\n", (char *)link->data);
3456 if (test_system_service_dir_matches[i] == NULL)
3458 printf ("more directories parsed than in match set\n");
3459 dbus_free (link->data);
3460 _dbus_list_free_link (link);
3461 _dbus_string_free (&progs);
3465 if (strcmp (test_system_service_dir_matches[i],
3466 (char *)link->data) != 0)
3468 printf ("%s directory does not match %s in the match set\n",
3470 test_system_service_dir_matches[i]);
3471 dbus_free (link->data);
3472 _dbus_list_free_link (link);
3473 _dbus_string_free (&progs);
3479 dbus_free (link->data);
3480 _dbus_list_free_link (link);
3483 if (test_system_service_dir_matches[i] != NULL)
3485 printf ("extra data %s in the match set was not matched\n",
3486 test_system_service_dir_matches[i]);
3488 _dbus_string_free (&progs);
3492 _dbus_string_free (&progs);
3497 bus_config_parser_test (const DBusString *test_data_dir)
3499 if (test_data_dir == NULL ||
3500 _dbus_string_get_length (test_data_dir) == 0)
3502 printf ("No test data\n");
3506 if (!test_default_session_servicedirs())
3510 printf("default system service dir skipped\n");
3512 if (!test_default_system_servicedirs())
3516 if (!process_test_valid_subdir (test_data_dir, "valid-config-files", VALID))
3519 if (!process_test_valid_subdir (test_data_dir, "invalid-config-files", INVALID))
3522 if (!process_test_equiv_subdir (test_data_dir, "equiv-config-files"))
3528 #endif /* DBUS_BUILD_TESTS */