1 /* -*- mode: C; c-file-style: "gnu"; indent-tabs-mode: nil; -*- */
2 /* config-parser.c XML-library-agnostic configuration file parser
4 * Copyright (C) 2003, 2004 Red Hat, Inc.
6 * Licensed under the Academic Free License version 2.1
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
25 #include "config-parser-common.h"
26 #include "config-parser.h"
31 #include <dbus/dbus-list.h>
32 #include <dbus/dbus-internals.h>
33 #include <dbus/dbus-sysdeps.h>
38 /* we ignore policies for unknown groups/users */
53 unsigned int had_content : 1;
59 unsigned int ignore_missing : 1;
60 unsigned int if_selinux_enabled : 1;
61 unsigned int selinux_root_relative : 1;
67 unsigned long gid_uid_or_at_console;
81 * Parser for bus configuration file.
83 struct BusConfigParser
85 int refcount; /**< Reference count */
87 DBusString basedir; /**< Directory we resolve paths relative to */
89 DBusList *stack; /**< stack of Element */
91 char *user; /**< user to run as */
93 char *servicehelper; /**< location of the setuid helper */
95 char *bus_type; /**< Message bus type */
97 DBusList *listen_on; /**< List of addresses to listen to */
99 DBusList *mechanisms; /**< Auth mechanisms */
101 DBusList *service_dirs; /**< Directories to look for session services in */
103 DBusList *conf_dirs; /**< Directories to look for policy configuration in */
105 BusPolicy *policy; /**< Security policy */
107 BusLimits limits; /**< Limits */
109 char *pidfile; /**< PID file */
111 DBusList *included_files; /**< Included files stack */
113 DBusHashTable *service_context_table; /**< Map service names to SELinux contexts */
115 unsigned int fork : 1; /**< TRUE to fork into daemon mode */
117 unsigned int syslog : 1; /**< TRUE to enable syslog */
118 unsigned int keep_umask : 1; /**< TRUE to keep original umask when forking */
120 unsigned int is_toplevel : 1; /**< FALSE if we are a sub-config-file inside another one */
122 unsigned int allow_anonymous : 1; /**< TRUE to allow anonymous connections */
126 push_element (BusConfigParser *parser,
131 _dbus_assert (type != ELEMENT_NONE);
133 e = dbus_new0 (Element, 1);
137 if (!_dbus_list_append (&parser->stack, e))
149 element_free (Element *e)
151 if (e->type == ELEMENT_LIMIT)
152 dbus_free (e->d.limit.name);
158 pop_element (BusConfigParser *parser)
162 e = _dbus_list_pop_last (&parser->stack);
168 peek_element (BusConfigParser *parser)
172 e = _dbus_list_get_last (&parser->stack);
178 top_element_type (BusConfigParser *parser)
182 e = _dbus_list_get_last (&parser->stack);
191 merge_service_context_hash (DBusHashTable *dest,
201 _dbus_hash_iter_init (from, &iter);
202 while (_dbus_hash_iter_next (&iter))
204 const char *service = _dbus_hash_iter_get_string_key (&iter);
205 const char *context = _dbus_hash_iter_get_value (&iter);
207 service_copy = _dbus_strdup (service);
208 if (service_copy == NULL)
210 context_copy = _dbus_strdup (context);
211 if (context_copy == NULL)
214 if (!_dbus_hash_table_insert_string (dest, service_copy, context_copy))
225 dbus_free (service_copy);
228 dbus_free (context_copy);
234 service_dirs_find_dir (DBusList **service_dirs,
239 _dbus_assert (dir != NULL);
241 for (link = *service_dirs; link; link = _dbus_list_get_next_link(service_dirs, link))
243 const char *link_dir;
245 link_dir = (const char *)link->data;
246 if (strcmp (dir, link_dir) == 0)
254 service_dirs_append_unique_or_free (DBusList **service_dirs,
257 if (!service_dirs_find_dir (service_dirs, dir))
258 return _dbus_list_append (service_dirs, dir);
265 service_dirs_append_link_unique_or_free (DBusList **service_dirs,
268 if (!service_dirs_find_dir (service_dirs, dir_link->data))
270 _dbus_list_append_link (service_dirs, dir_link);
274 dbus_free (dir_link->data);
275 _dbus_list_free_link (dir_link);
280 merge_included (BusConfigParser *parser,
281 BusConfigParser *included,
286 if (!bus_policy_merge (parser->policy,
293 if (!merge_service_context_hash (parser->service_context_table,
294 included->service_context_table))
300 if (included->user != NULL)
302 dbus_free (parser->user);
303 parser->user = included->user;
304 included->user = NULL;
307 if (included->bus_type != NULL)
309 dbus_free (parser->bus_type);
310 parser->bus_type = included->bus_type;
311 included->bus_type = NULL;
317 if (included->keep_umask)
318 parser->keep_umask = TRUE;
320 if (included->pidfile != NULL)
322 dbus_free (parser->pidfile);
323 parser->pidfile = included->pidfile;
324 included->pidfile = NULL;
327 while ((link = _dbus_list_pop_first_link (&included->listen_on)))
328 _dbus_list_append_link (&parser->listen_on, link);
330 while ((link = _dbus_list_pop_first_link (&included->mechanisms)))
331 _dbus_list_append_link (&parser->mechanisms, link);
333 while ((link = _dbus_list_pop_first_link (&included->service_dirs)))
334 service_dirs_append_link_unique_or_free (&parser->service_dirs, link);
336 while ((link = _dbus_list_pop_first_link (&included->conf_dirs)))
337 _dbus_list_append_link (&parser->conf_dirs, link);
343 seen_include (BusConfigParser *parser,
344 const DBusString *file)
348 iter = parser->included_files;
351 if (! strcmp (_dbus_string_get_const_data (file), iter->data))
354 iter = _dbus_list_get_next_link (&parser->included_files, iter);
361 bus_config_parser_new (const DBusString *basedir,
362 dbus_bool_t is_toplevel,
363 const BusConfigParser *parent)
365 BusConfigParser *parser;
367 parser = dbus_new0 (BusConfigParser, 1);
371 parser->is_toplevel = !!is_toplevel;
373 if (!_dbus_string_init (&parser->basedir))
379 if (((parser->policy = bus_policy_new ()) == NULL) ||
380 !_dbus_string_copy (basedir, 0, &parser->basedir, 0) ||
381 ((parser->service_context_table = _dbus_hash_table_new (DBUS_HASH_STRING,
383 dbus_free)) == NULL))
386 bus_policy_unref (parser->policy);
388 _dbus_string_free (&parser->basedir);
396 /* Initialize the parser's limits from the parent. */
397 parser->limits = parent->limits;
399 /* Use the parent's list of included_files to avoid
400 circular inclusions. */
401 parser->included_files = parent->included_files;
406 /* Make up some numbers! woot! */
407 parser->limits.max_incoming_bytes = _DBUS_ONE_MEGABYTE * 127;
408 parser->limits.max_outgoing_bytes = _DBUS_ONE_MEGABYTE * 127;
409 parser->limits.max_message_size = _DBUS_ONE_MEGABYTE * 32;
411 /* We set relatively conservative values here since due to the
412 way SCM_RIGHTS works we need to preallocate an array for the
413 maximum number of file descriptors we can receive. Picking a
414 high value here thus translates directly to more memory
416 parser->limits.max_incoming_unix_fds = 1024*4;
417 parser->limits.max_outgoing_unix_fds = 1024*4;
418 parser->limits.max_message_unix_fds = 1024;
420 /* Making this long means the user has to wait longer for an error
421 * message if something screws up, but making it too short means
422 * they might see a false failure.
424 parser->limits.activation_timeout = 25000; /* 25 seconds */
426 /* Making this long risks making a DOS attack easier, but too short
427 * and legitimate auth will fail. If interactive auth (ask user for
428 * password) is allowed, then potentially it has to be quite long.
430 parser->limits.auth_timeout = 30000; /* 30 seconds */
432 parser->limits.max_incomplete_connections = 64;
433 parser->limits.max_connections_per_user = 256;
435 /* Note that max_completed_connections / max_connections_per_user
436 * is the number of users that would have to work together to
437 * DOS all the other users.
439 parser->limits.max_completed_connections = 2048;
441 parser->limits.max_pending_activations = 512;
442 parser->limits.max_services_per_connection = 512;
444 /* For this one, keep in mind that it isn't only the memory used
445 * by the match rules, but slowdown from linearly walking a big
446 * list of them. A client adding more than this is almost
447 * certainly a bad idea for that reason, and should change to a
448 * smaller number of wider-net match rules - getting every last
449 * message to the bus is probably better than having a thousand
452 parser->limits.max_match_rules_per_connection = 512;
454 parser->limits.reply_timeout = -1; /* never */
456 /* this is effectively a limit on message queue size for messages
457 * that require a reply
459 parser->limits.max_replies_per_connection = 1024*8;
462 parser->refcount = 1;
468 bus_config_parser_ref (BusConfigParser *parser)
470 _dbus_assert (parser->refcount > 0);
472 parser->refcount += 1;
478 bus_config_parser_unref (BusConfigParser *parser)
480 _dbus_assert (parser->refcount > 0);
482 parser->refcount -= 1;
484 if (parser->refcount == 0)
486 while (parser->stack != NULL)
487 pop_element (parser);
489 dbus_free (parser->user);
490 dbus_free (parser->servicehelper);
491 dbus_free (parser->bus_type);
492 dbus_free (parser->pidfile);
494 _dbus_list_foreach (&parser->listen_on,
495 (DBusForeachFunction) dbus_free,
498 _dbus_list_clear (&parser->listen_on);
500 _dbus_list_foreach (&parser->service_dirs,
501 (DBusForeachFunction) dbus_free,
504 _dbus_list_clear (&parser->service_dirs);
506 _dbus_list_foreach (&parser->conf_dirs,
507 (DBusForeachFunction) dbus_free,
510 _dbus_list_clear (&parser->conf_dirs);
512 _dbus_list_foreach (&parser->mechanisms,
513 (DBusForeachFunction) dbus_free,
516 _dbus_list_clear (&parser->mechanisms);
518 _dbus_string_free (&parser->basedir);
521 bus_policy_unref (parser->policy);
523 if (parser->service_context_table)
524 _dbus_hash_table_unref (parser->service_context_table);
531 bus_config_parser_check_doctype (BusConfigParser *parser,
535 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
537 if (strcmp (doctype, "busconfig") != 0)
539 dbus_set_error (error,
541 "Configuration file has the wrong document type %s",
556 locate_attributes (BusConfigParser *parser,
557 const char *element_name,
558 const char **attribute_names,
559 const char **attribute_values,
561 const char *first_attribute_name,
562 const char **first_attribute_retloc,
570 LocateAttr attrs[MAX_ATTRS];
574 _dbus_assert (first_attribute_name != NULL);
575 _dbus_assert (first_attribute_retloc != NULL);
580 attrs[0].name = first_attribute_name;
581 attrs[0].retloc = first_attribute_retloc;
582 *first_attribute_retloc = NULL;
584 va_start (args, first_attribute_retloc);
586 name = va_arg (args, const char*);
587 retloc = va_arg (args, const char**);
591 _dbus_assert (retloc != NULL);
592 _dbus_assert (n_attrs < MAX_ATTRS);
594 attrs[n_attrs].name = name;
595 attrs[n_attrs].retloc = retloc;
599 name = va_arg (args, const char*);
600 retloc = va_arg (args, const char**);
606 while (attribute_names[i])
615 if (strcmp (attrs[j].name, attribute_names[i]) == 0)
617 retloc = attrs[j].retloc;
621 dbus_set_error (error, DBUS_ERROR_FAILED,
622 "Attribute \"%s\" repeated twice on the same <%s> element",
623 attrs[j].name, element_name);
628 *retloc = attribute_values[i];
637 dbus_set_error (error, DBUS_ERROR_FAILED,
638 "Attribute \"%s\" is invalid on <%s> element in this context",
639 attribute_names[i], element_name);
652 check_no_attributes (BusConfigParser *parser,
653 const char *element_name,
654 const char **attribute_names,
655 const char **attribute_values,
658 if (attribute_names[0] != NULL)
660 dbus_set_error (error, DBUS_ERROR_FAILED,
661 "Attribute \"%s\" is invalid on <%s> element in this context",
662 attribute_names[0], element_name);
670 start_busconfig_child (BusConfigParser *parser,
671 const char *element_name,
672 const char **attribute_names,
673 const char **attribute_values,
676 ElementType element_type;
678 element_type = bus_config_parser_element_name_to_type (element_name);
680 if (element_type == ELEMENT_USER)
682 if (!check_no_attributes (parser, "user", attribute_names, attribute_values, error))
685 if (push_element (parser, ELEMENT_USER) == NULL)
693 else if (element_type == ELEMENT_TYPE)
695 if (!check_no_attributes (parser, "type", attribute_names, attribute_values, error))
698 if (push_element (parser, ELEMENT_TYPE) == NULL)
706 else if (element_type == ELEMENT_FORK)
708 if (!check_no_attributes (parser, "fork", attribute_names, attribute_values, error))
711 if (push_element (parser, ELEMENT_FORK) == NULL)
721 else if (element_type == ELEMENT_SYSLOG)
723 if (!check_no_attributes (parser, "syslog", attribute_names, attribute_values, error))
726 if (push_element (parser, ELEMENT_SYSLOG) == NULL)
732 parser->syslog = TRUE;
736 else if (element_type == ELEMENT_KEEP_UMASK)
738 if (!check_no_attributes (parser, "keep_umask", attribute_names, attribute_values, error))
741 if (push_element (parser, ELEMENT_KEEP_UMASK) == NULL)
747 parser->keep_umask = TRUE;
751 else if (element_type == ELEMENT_PIDFILE)
753 if (!check_no_attributes (parser, "pidfile", attribute_names, attribute_values, error))
756 if (push_element (parser, ELEMENT_PIDFILE) == NULL)
764 else if (element_type == ELEMENT_LISTEN)
766 if (!check_no_attributes (parser, "listen", attribute_names, attribute_values, error))
769 if (push_element (parser, ELEMENT_LISTEN) == NULL)
777 else if (element_type == ELEMENT_AUTH)
779 if (!check_no_attributes (parser, "auth", attribute_names, attribute_values, error))
782 if (push_element (parser, ELEMENT_AUTH) == NULL)
790 else if (element_type == ELEMENT_SERVICEHELPER)
792 if (!check_no_attributes (parser, "servicehelper", attribute_names, attribute_values, error))
795 if (push_element (parser, ELEMENT_SERVICEHELPER) == NULL)
803 else if (element_type == ELEMENT_INCLUDEDIR)
805 if (!check_no_attributes (parser, "includedir", attribute_names, attribute_values, error))
808 if (push_element (parser, ELEMENT_INCLUDEDIR) == NULL)
816 else if (element_type == ELEMENT_STANDARD_SESSION_SERVICEDIRS)
822 if (!check_no_attributes (parser, "standard_session_servicedirs", attribute_names, attribute_values, error))
825 if (push_element (parser, ELEMENT_STANDARD_SESSION_SERVICEDIRS) == NULL)
831 if (!_dbus_get_standard_session_servicedirs (&dirs))
837 while ((link = _dbus_list_pop_first_link (&dirs)))
838 service_dirs_append_link_unique_or_free (&parser->service_dirs, link);
842 else if (element_type == ELEMENT_STANDARD_SYSTEM_SERVICEDIRS)
848 if (!check_no_attributes (parser, "standard_system_servicedirs", attribute_names, attribute_values, error))
851 if (push_element (parser, ELEMENT_STANDARD_SYSTEM_SERVICEDIRS) == NULL)
857 if (!_dbus_get_standard_system_servicedirs (&dirs))
863 while ((link = _dbus_list_pop_first_link (&dirs)))
864 service_dirs_append_link_unique_or_free (&parser->service_dirs, link);
868 else if (element_type == ELEMENT_ALLOW_ANONYMOUS)
870 if (!check_no_attributes (parser, "allow_anonymous", attribute_names, attribute_values, error))
873 if (push_element (parser, ELEMENT_ALLOW_ANONYMOUS) == NULL)
879 parser->allow_anonymous = TRUE;
882 else if (element_type == ELEMENT_SERVICEDIR)
884 if (!check_no_attributes (parser, "servicedir", attribute_names, attribute_values, error))
887 if (push_element (parser, ELEMENT_SERVICEDIR) == NULL)
895 else if (element_type == ELEMENT_INCLUDE)
898 const char *if_selinux_enabled;
899 const char *ignore_missing;
900 const char *selinux_root_relative;
902 if ((e = push_element (parser, ELEMENT_INCLUDE)) == NULL)
908 e->d.include.ignore_missing = FALSE;
909 e->d.include.if_selinux_enabled = FALSE;
910 e->d.include.selinux_root_relative = FALSE;
912 if (!locate_attributes (parser, "include",
916 "ignore_missing", &ignore_missing,
917 "if_selinux_enabled", &if_selinux_enabled,
918 "selinux_root_relative", &selinux_root_relative,
922 if (ignore_missing != NULL)
924 if (strcmp (ignore_missing, "yes") == 0)
925 e->d.include.ignore_missing = TRUE;
926 else if (strcmp (ignore_missing, "no") == 0)
927 e->d.include.ignore_missing = FALSE;
930 dbus_set_error (error, DBUS_ERROR_FAILED,
931 "ignore_missing attribute must have value \"yes\" or \"no\"");
936 if (if_selinux_enabled != NULL)
938 if (strcmp (if_selinux_enabled, "yes") == 0)
939 e->d.include.if_selinux_enabled = TRUE;
940 else if (strcmp (if_selinux_enabled, "no") == 0)
941 e->d.include.if_selinux_enabled = FALSE;
944 dbus_set_error (error, DBUS_ERROR_FAILED,
945 "if_selinux_enabled attribute must have value"
946 " \"yes\" or \"no\"");
951 if (selinux_root_relative != NULL)
953 if (strcmp (selinux_root_relative, "yes") == 0)
954 e->d.include.selinux_root_relative = TRUE;
955 else if (strcmp (selinux_root_relative, "no") == 0)
956 e->d.include.selinux_root_relative = FALSE;
959 dbus_set_error (error, DBUS_ERROR_FAILED,
960 "selinux_root_relative attribute must have value"
961 " \"yes\" or \"no\"");
968 else if (element_type == ELEMENT_POLICY)
974 const char *at_console;
976 if ((e = push_element (parser, ELEMENT_POLICY)) == NULL)
982 e->d.policy.type = POLICY_IGNORED;
984 if (!locate_attributes (parser, "policy",
991 "at_console", &at_console,
995 if (((context && user) ||
996 (context && group) ||
997 (context && at_console)) ||
999 (user && at_console)) ||
1000 (group && at_console) ||
1001 !(context || user || group || at_console))
1003 dbus_set_error (error, DBUS_ERROR_FAILED,
1004 "<policy> element must have exactly one of (context|user|group|at_console) attributes");
1008 if (context != NULL)
1010 if (strcmp (context, "default") == 0)
1012 e->d.policy.type = POLICY_DEFAULT;
1014 else if (strcmp (context, "mandatory") == 0)
1016 e->d.policy.type = POLICY_MANDATORY;
1020 dbus_set_error (error, DBUS_ERROR_FAILED,
1021 "context attribute on <policy> must have the value \"default\" or \"mandatory\", not \"%s\"",
1026 else if (user != NULL)
1028 DBusString username;
1029 _dbus_string_init_const (&username, user);
1031 if (_dbus_parse_unix_user_from_config (&username,
1032 &e->d.policy.gid_uid_or_at_console))
1033 e->d.policy.type = POLICY_USER;
1035 _dbus_warn ("Unknown username \"%s\" in message bus configuration file\n",
1038 else if (group != NULL)
1040 DBusString group_name;
1041 _dbus_string_init_const (&group_name, group);
1043 if (_dbus_parse_unix_group_from_config (&group_name,
1044 &e->d.policy.gid_uid_or_at_console))
1045 e->d.policy.type = POLICY_GROUP;
1047 _dbus_warn ("Unknown group \"%s\" in message bus configuration file\n",
1050 else if (at_console != NULL)
1053 t = (strcmp (at_console, "true") == 0);
1054 if (t || strcmp (at_console, "false") == 0)
1056 e->d.policy.gid_uid_or_at_console = t;
1057 e->d.policy.type = POLICY_CONSOLE;
1061 dbus_set_error (error, DBUS_ERROR_FAILED,
1062 "Unknown value \"%s\" for at_console in message bus configuration file",
1070 _dbus_assert_not_reached ("all <policy> attributes null and we didn't set error");
1075 else if (element_type == ELEMENT_LIMIT)
1080 if ((e = push_element (parser, ELEMENT_LIMIT)) == NULL)
1082 BUS_SET_OOM (error);
1086 if (!locate_attributes (parser, "limit",
1096 dbus_set_error (error, DBUS_ERROR_FAILED,
1097 "<limit> element must have a \"name\" attribute");
1101 e->d.limit.name = _dbus_strdup (name);
1102 if (e->d.limit.name == NULL)
1104 BUS_SET_OOM (error);
1110 else if (element_type == ELEMENT_SELINUX)
1112 if (!check_no_attributes (parser, "selinux", attribute_names, attribute_values, error))
1115 if (push_element (parser, ELEMENT_SELINUX) == NULL)
1117 BUS_SET_OOM (error);
1125 dbus_set_error (error, DBUS_ERROR_FAILED,
1126 "Element <%s> not allowed inside <%s> in configuration file",
1127 element_name, "busconfig");
1133 append_rule_from_element (BusConfigParser *parser,
1134 const char *element_name,
1135 const char **attribute_names,
1136 const char **attribute_values,
1141 const char *send_interface;
1142 const char *send_member;
1143 const char *send_error;
1144 const char *send_destination;
1145 const char *send_path;
1146 const char *send_type;
1147 const char *receive_interface;
1148 const char *receive_member;
1149 const char *receive_error;
1150 const char *receive_sender;
1151 const char *receive_path;
1152 const char *receive_type;
1153 const char *eavesdrop;
1154 const char *send_requested_reply;
1155 const char *receive_requested_reply;
1160 BusPolicyRule *rule;
1162 if (!locate_attributes (parser, element_name,
1166 "send_interface", &send_interface,
1167 "send_member", &send_member,
1168 "send_error", &send_error,
1169 "send_destination", &send_destination,
1170 "send_path", &send_path,
1171 "send_type", &send_type,
1172 "receive_interface", &receive_interface,
1173 "receive_member", &receive_member,
1174 "receive_error", &receive_error,
1175 "receive_sender", &receive_sender,
1176 "receive_path", &receive_path,
1177 "receive_type", &receive_type,
1178 "eavesdrop", &eavesdrop,
1179 "send_requested_reply", &send_requested_reply,
1180 "receive_requested_reply", &receive_requested_reply,
1188 if (!(send_interface || send_member || send_error || send_destination ||
1189 send_type || send_path ||
1190 receive_interface || receive_member || receive_error || receive_sender ||
1191 receive_type || receive_path || eavesdrop ||
1192 send_requested_reply || receive_requested_reply ||
1193 own || user || group))
1195 dbus_set_error (error, DBUS_ERROR_FAILED,
1196 "Element <%s> must have one or more attributes",
1201 if ((send_member && (send_interface == NULL && send_path == NULL)) ||
1202 (receive_member && (receive_interface == NULL && receive_path == NULL)))
1204 dbus_set_error (error, DBUS_ERROR_FAILED,
1205 "On element <%s>, if you specify a member you must specify an interface or a path. Keep in mind that not all messages have an interface field.",
1210 /* Allowed combinations of elements are:
1212 * base, must be all send or all receive:
1215 * interface + member
1218 * base send_ can combine with send_destination, send_path, send_type, send_requested_reply
1219 * base receive_ with receive_sender, receive_path, receive_type, receive_requested_reply, eavesdrop
1221 * user, group, own must occur alone
1223 * Pretty sure the below stuff is broken, FIXME think about it more.
1226 if (((send_interface && send_error) ||
1227 (send_interface && receive_interface) ||
1228 (send_interface && receive_member) ||
1229 (send_interface && receive_error) ||
1230 (send_interface && receive_sender) ||
1231 (send_interface && receive_requested_reply) ||
1232 (send_interface && own) ||
1233 (send_interface && user) ||
1234 (send_interface && group)) ||
1236 ((send_member && send_error) ||
1237 (send_member && receive_interface) ||
1238 (send_member && receive_member) ||
1239 (send_member && receive_error) ||
1240 (send_member && receive_sender) ||
1241 (send_member && receive_requested_reply) ||
1242 (send_member && own) ||
1243 (send_member && user) ||
1244 (send_member && group)) ||
1246 ((send_error && receive_interface) ||
1247 (send_error && receive_member) ||
1248 (send_error && receive_error) ||
1249 (send_error && receive_sender) ||
1250 (send_error && receive_requested_reply) ||
1251 (send_error && own) ||
1252 (send_error && user) ||
1253 (send_error && group)) ||
1255 ((send_destination && receive_interface) ||
1256 (send_destination && receive_member) ||
1257 (send_destination && receive_error) ||
1258 (send_destination && receive_sender) ||
1259 (send_destination && receive_requested_reply) ||
1260 (send_destination && own) ||
1261 (send_destination && user) ||
1262 (send_destination && group)) ||
1264 ((send_type && receive_interface) ||
1265 (send_type && receive_member) ||
1266 (send_type && receive_error) ||
1267 (send_type && receive_sender) ||
1268 (send_type && receive_requested_reply) ||
1269 (send_type && own) ||
1270 (send_type && user) ||
1271 (send_type && group)) ||
1273 ((send_path && receive_interface) ||
1274 (send_path && receive_member) ||
1275 (send_path && receive_error) ||
1276 (send_path && receive_sender) ||
1277 (send_path && receive_requested_reply) ||
1278 (send_path && own) ||
1279 (send_path && user) ||
1280 (send_path && group)) ||
1282 ((send_requested_reply && receive_interface) ||
1283 (send_requested_reply && receive_member) ||
1284 (send_requested_reply && receive_error) ||
1285 (send_requested_reply && receive_sender) ||
1286 (send_requested_reply && receive_requested_reply) ||
1287 (send_requested_reply && own) ||
1288 (send_requested_reply && user) ||
1289 (send_requested_reply && group)) ||
1291 ((receive_interface && receive_error) ||
1292 (receive_interface && own) ||
1293 (receive_interface && user) ||
1294 (receive_interface && group)) ||
1296 ((receive_member && receive_error) ||
1297 (receive_member && own) ||
1298 (receive_member && user) ||
1299 (receive_member && group)) ||
1301 ((receive_error && own) ||
1302 (receive_error && user) ||
1303 (receive_error && group)) ||
1305 ((eavesdrop && own) ||
1306 (eavesdrop && user) ||
1307 (eavesdrop && group)) ||
1309 ((receive_requested_reply && own) ||
1310 (receive_requested_reply && user) ||
1311 (receive_requested_reply && group)) ||
1318 dbus_set_error (error, DBUS_ERROR_FAILED,
1319 "Invalid combination of attributes on element <%s>",
1326 /* In BusPolicyRule, NULL represents wildcard.
1327 * In the config file, '*' represents it.
1329 #define IS_WILDCARD(str) ((str) && ((str)[0]) == '*' && ((str)[1]) == '\0')
1331 if (send_interface || send_member || send_error || send_destination ||
1332 send_path || send_type || send_requested_reply)
1336 if (IS_WILDCARD (send_interface))
1337 send_interface = NULL;
1338 if (IS_WILDCARD (send_member))
1340 if (IS_WILDCARD (send_error))
1342 if (IS_WILDCARD (send_destination))
1343 send_destination = NULL;
1344 if (IS_WILDCARD (send_path))
1346 if (IS_WILDCARD (send_type))
1349 message_type = DBUS_MESSAGE_TYPE_INVALID;
1350 if (send_type != NULL)
1352 message_type = dbus_message_type_from_string (send_type);
1353 if (message_type == DBUS_MESSAGE_TYPE_INVALID)
1355 dbus_set_error (error, DBUS_ERROR_FAILED,
1356 "Bad message type \"%s\"",
1363 !(strcmp (eavesdrop, "true") == 0 ||
1364 strcmp (eavesdrop, "false") == 0))
1366 dbus_set_error (error, DBUS_ERROR_FAILED,
1367 "Bad value \"%s\" for %s attribute, must be true or false",
1368 "eavesdrop", eavesdrop);
1372 if (send_requested_reply &&
1373 !(strcmp (send_requested_reply, "true") == 0 ||
1374 strcmp (send_requested_reply, "false") == 0))
1376 dbus_set_error (error, DBUS_ERROR_FAILED,
1377 "Bad value \"%s\" for %s attribute, must be true or false",
1378 "send_requested_reply", send_requested_reply);
1382 rule = bus_policy_rule_new (BUS_POLICY_RULE_SEND, allow);
1387 rule->d.send.eavesdrop = (strcmp (eavesdrop, "true") == 0);
1390 rule->d.send.log = (strcmp (log, "true") == 0);
1392 if (send_requested_reply)
1393 rule->d.send.requested_reply = (strcmp (send_requested_reply, "true") == 0);
1395 rule->d.send.message_type = message_type;
1396 rule->d.send.path = _dbus_strdup (send_path);
1397 rule->d.send.interface = _dbus_strdup (send_interface);
1398 rule->d.send.member = _dbus_strdup (send_member);
1399 rule->d.send.error = _dbus_strdup (send_error);
1400 rule->d.send.destination = _dbus_strdup (send_destination);
1401 if (send_path && rule->d.send.path == NULL)
1403 if (send_interface && rule->d.send.interface == NULL)
1405 if (send_member && rule->d.send.member == NULL)
1407 if (send_error && rule->d.send.error == NULL)
1409 if (send_destination && rule->d.send.destination == NULL)
1412 else if (receive_interface || receive_member || receive_error || receive_sender ||
1413 receive_path || receive_type || eavesdrop || receive_requested_reply)
1417 if (IS_WILDCARD (receive_interface))
1418 receive_interface = NULL;
1419 if (IS_WILDCARD (receive_member))
1420 receive_member = NULL;
1421 if (IS_WILDCARD (receive_error))
1422 receive_error = NULL;
1423 if (IS_WILDCARD (receive_sender))
1424 receive_sender = NULL;
1425 if (IS_WILDCARD (receive_path))
1426 receive_path = NULL;
1427 if (IS_WILDCARD (receive_type))
1428 receive_type = NULL;
1430 message_type = DBUS_MESSAGE_TYPE_INVALID;
1431 if (receive_type != NULL)
1433 message_type = dbus_message_type_from_string (receive_type);
1434 if (message_type == DBUS_MESSAGE_TYPE_INVALID)
1436 dbus_set_error (error, DBUS_ERROR_FAILED,
1437 "Bad message type \"%s\"",
1445 !(strcmp (eavesdrop, "true") == 0 ||
1446 strcmp (eavesdrop, "false") == 0))
1448 dbus_set_error (error, DBUS_ERROR_FAILED,
1449 "Bad value \"%s\" for %s attribute, must be true or false",
1450 "eavesdrop", eavesdrop);
1454 if (receive_requested_reply &&
1455 !(strcmp (receive_requested_reply, "true") == 0 ||
1456 strcmp (receive_requested_reply, "false") == 0))
1458 dbus_set_error (error, DBUS_ERROR_FAILED,
1459 "Bad value \"%s\" for %s attribute, must be true or false",
1460 "receive_requested_reply", receive_requested_reply);
1464 rule = bus_policy_rule_new (BUS_POLICY_RULE_RECEIVE, allow);
1469 rule->d.receive.eavesdrop = (strcmp (eavesdrop, "true") == 0);
1471 if (receive_requested_reply)
1472 rule->d.receive.requested_reply = (strcmp (receive_requested_reply, "true") == 0);
1474 rule->d.receive.message_type = message_type;
1475 rule->d.receive.path = _dbus_strdup (receive_path);
1476 rule->d.receive.interface = _dbus_strdup (receive_interface);
1477 rule->d.receive.member = _dbus_strdup (receive_member);
1478 rule->d.receive.error = _dbus_strdup (receive_error);
1479 rule->d.receive.origin = _dbus_strdup (receive_sender);
1481 if (receive_path && rule->d.receive.path == NULL)
1483 if (receive_interface && rule->d.receive.interface == NULL)
1485 if (receive_member && rule->d.receive.member == NULL)
1487 if (receive_error && rule->d.receive.error == NULL)
1489 if (receive_sender && rule->d.receive.origin == NULL)
1494 rule = bus_policy_rule_new (BUS_POLICY_RULE_OWN, allow);
1498 if (IS_WILDCARD (own))
1501 rule->d.own.service_name = _dbus_strdup (own);
1502 if (own && rule->d.own.service_name == NULL)
1507 if (IS_WILDCARD (user))
1509 rule = bus_policy_rule_new (BUS_POLICY_RULE_USER, allow);
1513 rule->d.user.uid = DBUS_UID_UNSET;
1517 DBusString username;
1520 _dbus_string_init_const (&username, user);
1522 if (_dbus_parse_unix_user_from_config (&username, &uid))
1524 rule = bus_policy_rule_new (BUS_POLICY_RULE_USER, allow);
1528 rule->d.user.uid = uid;
1532 _dbus_warn ("Unknown username \"%s\" on element <%s>\n",
1533 user, element_name);
1539 if (IS_WILDCARD (group))
1541 rule = bus_policy_rule_new (BUS_POLICY_RULE_GROUP, allow);
1545 rule->d.group.gid = DBUS_GID_UNSET;
1549 DBusString groupname;
1552 _dbus_string_init_const (&groupname, group);
1554 if (_dbus_parse_unix_group_from_config (&groupname, &gid))
1556 rule = bus_policy_rule_new (BUS_POLICY_RULE_GROUP, allow);
1560 rule->d.group.gid = gid;
1564 _dbus_warn ("Unknown group \"%s\" on element <%s>\n",
1565 group, element_name);
1570 _dbus_assert_not_reached ("Did not handle some combination of attributes on <allow> or <deny>");
1576 pe = peek_element (parser);
1577 _dbus_assert (pe != NULL);
1578 _dbus_assert (pe->type == ELEMENT_POLICY);
1580 switch (pe->d.policy.type)
1582 case POLICY_IGNORED:
1583 /* drop the rule on the floor */
1586 case POLICY_DEFAULT:
1587 if (!bus_policy_append_default_rule (parser->policy, rule))
1590 case POLICY_MANDATORY:
1591 if (!bus_policy_append_mandatory_rule (parser->policy, rule))
1595 if (!BUS_POLICY_RULE_IS_PER_CLIENT (rule))
1597 dbus_set_error (error, DBUS_ERROR_FAILED,
1598 "<%s> rule cannot be per-user because it has bus-global semantics",
1603 if (!bus_policy_append_user_rule (parser->policy, pe->d.policy.gid_uid_or_at_console,
1608 if (!BUS_POLICY_RULE_IS_PER_CLIENT (rule))
1610 dbus_set_error (error, DBUS_ERROR_FAILED,
1611 "<%s> rule cannot be per-group because it has bus-global semantics",
1616 if (!bus_policy_append_group_rule (parser->policy, pe->d.policy.gid_uid_or_at_console,
1622 case POLICY_CONSOLE:
1623 if (!bus_policy_append_console_rule (parser->policy, pe->d.policy.gid_uid_or_at_console,
1629 bus_policy_rule_unref (rule);
1636 BUS_SET_OOM (error);
1639 bus_policy_rule_unref (rule);
1644 start_policy_child (BusConfigParser *parser,
1645 const char *element_name,
1646 const char **attribute_names,
1647 const char **attribute_values,
1650 if (strcmp (element_name, "allow") == 0)
1652 if (!append_rule_from_element (parser, element_name,
1653 attribute_names, attribute_values,
1657 if (push_element (parser, ELEMENT_ALLOW) == NULL)
1659 BUS_SET_OOM (error);
1665 else if (strcmp (element_name, "deny") == 0)
1667 if (!append_rule_from_element (parser, element_name,
1668 attribute_names, attribute_values,
1672 if (push_element (parser, ELEMENT_DENY) == NULL)
1674 BUS_SET_OOM (error);
1682 dbus_set_error (error, DBUS_ERROR_FAILED,
1683 "Element <%s> not allowed inside <%s> in configuration file",
1684 element_name, "policy");
1690 start_selinux_child (BusConfigParser *parser,
1691 const char *element_name,
1692 const char **attribute_names,
1693 const char **attribute_values,
1700 context_copy = NULL;
1702 if (strcmp (element_name, "associate") == 0)
1705 const char *context;
1707 if (!locate_attributes (parser, "associate",
1712 "context", &context,
1716 if (push_element (parser, ELEMENT_ASSOCIATE) == NULL)
1718 BUS_SET_OOM (error);
1722 if (own == NULL || context == NULL)
1724 dbus_set_error (error, DBUS_ERROR_FAILED,
1725 "Element <associate> must have attributes own=\"<servicename>\" and context=\"<selinux context>\"");
1729 own_copy = _dbus_strdup (own);
1730 if (own_copy == NULL)
1732 context_copy = _dbus_strdup (context);
1733 if (context_copy == NULL)
1736 if (!_dbus_hash_table_insert_string (parser->service_context_table,
1737 own_copy, context_copy))
1744 dbus_set_error (error, DBUS_ERROR_FAILED,
1745 "Element <%s> not allowed inside <%s> in configuration file",
1746 element_name, "selinux");
1752 dbus_free (own_copy);
1755 dbus_free (context_copy);
1757 BUS_SET_OOM (error);
1762 bus_config_parser_start_element (BusConfigParser *parser,
1763 const char *element_name,
1764 const char **attribute_names,
1765 const char **attribute_values,
1770 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1772 /* printf ("START: %s\n", element_name); */
1774 t = top_element_type (parser);
1776 if (t == ELEMENT_NONE)
1778 if (strcmp (element_name, "busconfig") == 0)
1780 if (!check_no_attributes (parser, "busconfig", attribute_names, attribute_values, error))
1783 if (push_element (parser, ELEMENT_BUSCONFIG) == NULL)
1785 BUS_SET_OOM (error);
1793 dbus_set_error (error, DBUS_ERROR_FAILED,
1794 "Unknown element <%s> at root of configuration file",
1799 else if (t == ELEMENT_BUSCONFIG)
1801 return start_busconfig_child (parser, element_name,
1802 attribute_names, attribute_values,
1805 else if (t == ELEMENT_POLICY)
1807 return start_policy_child (parser, element_name,
1808 attribute_names, attribute_values,
1811 else if (t == ELEMENT_SELINUX)
1813 return start_selinux_child (parser, element_name,
1814 attribute_names, attribute_values,
1819 dbus_set_error (error, DBUS_ERROR_FAILED,
1820 "Element <%s> is not allowed in this context",
1827 set_limit (BusConfigParser *parser,
1832 dbus_bool_t must_be_positive;
1833 dbus_bool_t must_be_int;
1835 must_be_int = FALSE;
1836 must_be_positive = FALSE;
1838 if (strcmp (name, "max_incoming_bytes") == 0)
1840 must_be_positive = TRUE;
1841 parser->limits.max_incoming_bytes = value;
1843 else if (strcmp (name, "max_incoming_unix_fds") == 0)
1845 must_be_positive = TRUE;
1846 parser->limits.max_incoming_unix_fds = value;
1848 else if (strcmp (name, "max_outgoing_bytes") == 0)
1850 must_be_positive = TRUE;
1851 parser->limits.max_outgoing_bytes = value;
1853 else if (strcmp (name, "max_outgoing_unix_fds") == 0)
1855 must_be_positive = TRUE;
1856 parser->limits.max_outgoing_unix_fds = value;
1858 else if (strcmp (name, "max_message_size") == 0)
1860 must_be_positive = TRUE;
1861 parser->limits.max_message_size = value;
1863 else if (strcmp (name, "max_message_unix_fds") == 0)
1865 must_be_positive = TRUE;
1866 parser->limits.max_message_unix_fds = value;
1868 else if (strcmp (name, "service_start_timeout") == 0)
1870 must_be_positive = TRUE;
1872 parser->limits.activation_timeout = value;
1874 else if (strcmp (name, "auth_timeout") == 0)
1876 must_be_positive = TRUE;
1878 parser->limits.auth_timeout = value;
1880 else if (strcmp (name, "reply_timeout") == 0)
1882 must_be_positive = TRUE;
1884 parser->limits.reply_timeout = value;
1886 else if (strcmp (name, "max_completed_connections") == 0)
1888 must_be_positive = TRUE;
1890 parser->limits.max_completed_connections = value;
1892 else if (strcmp (name, "max_incomplete_connections") == 0)
1894 must_be_positive = TRUE;
1896 parser->limits.max_incomplete_connections = value;
1898 else if (strcmp (name, "max_connections_per_user") == 0)
1900 must_be_positive = TRUE;
1902 parser->limits.max_connections_per_user = value;
1904 else if (strcmp (name, "max_pending_service_starts") == 0)
1906 must_be_positive = TRUE;
1908 parser->limits.max_pending_activations = value;
1910 else if (strcmp (name, "max_names_per_connection") == 0)
1912 must_be_positive = TRUE;
1914 parser->limits.max_services_per_connection = value;
1916 else if (strcmp (name, "max_match_rules_per_connection") == 0)
1918 must_be_positive = TRUE;
1920 parser->limits.max_match_rules_per_connection = value;
1922 else if (strcmp (name, "max_replies_per_connection") == 0)
1924 must_be_positive = TRUE;
1926 parser->limits.max_replies_per_connection = value;
1930 dbus_set_error (error, DBUS_ERROR_FAILED,
1931 "There is no limit called \"%s\"\n",
1936 if (must_be_positive && value < 0)
1938 dbus_set_error (error, DBUS_ERROR_FAILED,
1939 "<limit name=\"%s\"> must be a positive number\n",
1945 (value < _DBUS_INT_MIN || value > _DBUS_INT_MAX))
1947 dbus_set_error (error, DBUS_ERROR_FAILED,
1948 "<limit name=\"%s\"> value is too large\n",
1957 bus_config_parser_end_element (BusConfigParser *parser,
1958 const char *element_name,
1965 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1967 /* printf ("END: %s\n", element_name); */
1969 t = top_element_type (parser);
1971 if (t == ELEMENT_NONE)
1973 /* should probably be an assertion failure but
1974 * being paranoid about XML parsers
1976 dbus_set_error (error, DBUS_ERROR_FAILED,
1977 "XML parser ended element with no element on the stack");
1981 n = bus_config_parser_element_type_to_name (t);
1982 _dbus_assert (n != NULL);
1983 if (strcmp (n, element_name) != 0)
1985 /* should probably be an assertion failure but
1986 * being paranoid about XML parsers
1988 dbus_set_error (error, DBUS_ERROR_FAILED,
1989 "XML element <%s> ended but topmost element on the stack was <%s>",
1994 e = peek_element (parser);
1995 _dbus_assert (e != NULL);
2000 _dbus_assert_not_reached ("element in stack has no type");
2003 case ELEMENT_INCLUDE:
2006 case ELEMENT_LISTEN:
2007 case ELEMENT_PIDFILE:
2009 case ELEMENT_SERVICEDIR:
2010 case ELEMENT_SERVICEHELPER:
2011 case ELEMENT_INCLUDEDIR:
2013 if (!e->had_content)
2015 dbus_set_error (error, DBUS_ERROR_FAILED,
2016 "XML element <%s> was expected to have content inside it",
2017 bus_config_parser_element_type_to_name (e->type));
2021 if (e->type == ELEMENT_LIMIT)
2023 if (!set_limit (parser, e->d.limit.name, e->d.limit.value,
2029 case ELEMENT_BUSCONFIG:
2030 case ELEMENT_POLICY:
2034 case ELEMENT_SYSLOG:
2035 case ELEMENT_KEEP_UMASK:
2036 case ELEMENT_SELINUX:
2037 case ELEMENT_ASSOCIATE:
2038 case ELEMENT_STANDARD_SESSION_SERVICEDIRS:
2039 case ELEMENT_STANDARD_SYSTEM_SERVICEDIRS:
2040 case ELEMENT_ALLOW_ANONYMOUS:
2044 pop_element (parser);
2050 all_whitespace (const DBusString *str)
2054 _dbus_string_skip_white (str, 0, &i);
2056 return i == _dbus_string_get_length (str);
2060 make_full_path (const DBusString *basedir,
2061 const DBusString *filename,
2062 DBusString *full_path)
2064 if (_dbus_path_is_absolute (filename))
2066 return _dbus_string_copy (filename, 0, full_path, 0);
2070 if (!_dbus_string_copy (basedir, 0, full_path, 0))
2073 if (!_dbus_concat_dir_and_file (full_path, filename))
2081 include_file (BusConfigParser *parser,
2082 const DBusString *filename,
2083 dbus_bool_t ignore_missing,
2086 /* FIXME good test case for this would load each config file in the
2087 * test suite both alone, and as an include, and check
2088 * that the result is the same
2090 BusConfigParser *included;
2091 const char *filename_str;
2092 DBusError tmp_error;
2094 dbus_error_init (&tmp_error);
2096 filename_str = _dbus_string_get_const_data (filename);
2098 /* Check to make sure this file hasn't already been included. */
2099 if (seen_include (parser, filename))
2101 dbus_set_error (error, DBUS_ERROR_FAILED,
2102 "Circular inclusion of file '%s'",
2107 if (! _dbus_list_append (&parser->included_files, (void *) filename_str))
2109 BUS_SET_OOM (error);
2113 /* Since parser is passed in as the parent, included
2114 inherits parser's limits. */
2115 included = bus_config_load (filename, FALSE, parser, &tmp_error);
2117 _dbus_list_pop_last (&parser->included_files);
2119 if (included == NULL)
2121 _DBUS_ASSERT_ERROR_IS_SET (&tmp_error);
2123 if (dbus_error_has_name (&tmp_error, DBUS_ERROR_FILE_NOT_FOUND) &&
2126 dbus_error_free (&tmp_error);
2131 dbus_move_error (&tmp_error, error);
2137 _DBUS_ASSERT_ERROR_IS_CLEAR (&tmp_error);
2139 if (!merge_included (parser, included, error))
2141 bus_config_parser_unref (included);
2145 /* Copy included's limits back to parser. */
2146 parser->limits = included->limits;
2148 bus_config_parser_unref (included);
2154 servicehelper_path (BusConfigParser *parser,
2155 const DBusString *filename,
2158 const char *filename_str;
2159 char *servicehelper;
2161 filename_str = _dbus_string_get_const_data (filename);
2163 /* copy to avoid overwriting with NULL on OOM */
2164 servicehelper = _dbus_strdup (filename_str);
2167 if (servicehelper == NULL)
2169 BUS_SET_OOM (error);
2173 /* save the latest servicehelper only if not OOM */
2174 dbus_free (parser->servicehelper);
2175 parser->servicehelper = servicehelper;
2177 /* We don't check whether the helper exists; instead we
2178 * would just fail to ever activate anything if it doesn't.
2179 * This allows an admin to fix the problem if it doesn't exist.
2180 * It also allows the parser test suite to successfully parse
2181 * test cases without installing the helper. ;-)
2188 include_dir (BusConfigParser *parser,
2189 const DBusString *dirname,
2192 DBusString filename;
2194 DBusError tmp_error;
2198 if (!_dbus_string_init (&filename))
2200 BUS_SET_OOM (error);
2206 dir = _dbus_directory_open (dirname, error);
2211 dbus_error_init (&tmp_error);
2212 while (_dbus_directory_get_next_file (dir, &filename, &tmp_error))
2214 DBusString full_path;
2216 if (!_dbus_string_init (&full_path))
2218 BUS_SET_OOM (error);
2222 if (!_dbus_string_copy (dirname, 0, &full_path, 0))
2224 BUS_SET_OOM (error);
2225 _dbus_string_free (&full_path);
2229 if (!_dbus_concat_dir_and_file (&full_path, &filename))
2231 BUS_SET_OOM (error);
2232 _dbus_string_free (&full_path);
2236 if (_dbus_string_ends_with_c_str (&full_path, ".conf"))
2238 if (!include_file (parser, &full_path, TRUE, error))
2240 _dbus_string_free (&full_path);
2245 _dbus_string_free (&full_path);
2248 if (dbus_error_is_set (&tmp_error))
2250 dbus_move_error (&tmp_error, error);
2255 if (!_dbus_string_copy_data (dirname, &s))
2257 BUS_SET_OOM (error);
2261 if (!_dbus_list_append (&parser->conf_dirs, s))
2264 BUS_SET_OOM (error);
2271 _dbus_string_free (&filename);
2274 _dbus_directory_close (dir);
2280 bus_config_parser_content (BusConfigParser *parser,
2281 const DBusString *content,
2286 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
2292 _dbus_string_get_const_data (content, &c_str);
2294 printf ("CONTENT %d bytes: %s\n", _dbus_string_get_length (content), c_str);
2298 e = peek_element (parser);
2301 dbus_set_error (error, DBUS_ERROR_FAILED,
2302 "Text content outside of any XML element in configuration file");
2305 else if (e->had_content)
2307 _dbus_assert_not_reached ("Element had multiple content blocks");
2311 switch (top_element_type (parser))
2314 _dbus_assert_not_reached ("element at top of stack has no type");
2317 case ELEMENT_BUSCONFIG:
2318 case ELEMENT_POLICY:
2322 case ELEMENT_SYSLOG:
2323 case ELEMENT_KEEP_UMASK:
2324 case ELEMENT_STANDARD_SESSION_SERVICEDIRS:
2325 case ELEMENT_STANDARD_SYSTEM_SERVICEDIRS:
2326 case ELEMENT_ALLOW_ANONYMOUS:
2327 case ELEMENT_SELINUX:
2328 case ELEMENT_ASSOCIATE:
2329 if (all_whitespace (content))
2333 dbus_set_error (error, DBUS_ERROR_FAILED,
2334 "No text content expected inside XML element %s in configuration file",
2335 bus_config_parser_element_type_to_name (top_element_type (parser)));
2339 case ELEMENT_PIDFILE:
2343 e->had_content = TRUE;
2345 if (!_dbus_string_copy_data (content, &s))
2348 dbus_free (parser->pidfile);
2349 parser->pidfile = s;
2353 case ELEMENT_INCLUDE:
2355 DBusString full_path, selinux_policy_root;
2357 e->had_content = TRUE;
2359 if (e->d.include.if_selinux_enabled
2360 && !bus_selinux_enabled ())
2363 if (!_dbus_string_init (&full_path))
2366 if (e->d.include.selinux_root_relative)
2368 if (!bus_selinux_get_policy_root ())
2370 dbus_set_error (error, DBUS_ERROR_FAILED,
2371 "Could not determine SELinux policy root for relative inclusion");
2372 _dbus_string_free (&full_path);
2375 _dbus_string_init_const (&selinux_policy_root,
2376 bus_selinux_get_policy_root ());
2377 if (!make_full_path (&selinux_policy_root, content, &full_path))
2379 _dbus_string_free (&full_path);
2383 else if (!make_full_path (&parser->basedir, content, &full_path))
2385 _dbus_string_free (&full_path);
2389 if (!include_file (parser, &full_path,
2390 e->d.include.ignore_missing, error))
2392 _dbus_string_free (&full_path);
2396 _dbus_string_free (&full_path);
2400 case ELEMENT_SERVICEHELPER:
2402 DBusString full_path;
2404 e->had_content = TRUE;
2406 if (!_dbus_string_init (&full_path))
2409 if (!make_full_path (&parser->basedir, content, &full_path))
2411 _dbus_string_free (&full_path);
2415 if (!servicehelper_path (parser, &full_path, error))
2417 _dbus_string_free (&full_path);
2421 _dbus_string_free (&full_path);
2425 case ELEMENT_INCLUDEDIR:
2427 DBusString full_path;
2429 e->had_content = TRUE;
2431 if (!_dbus_string_init (&full_path))
2434 if (!make_full_path (&parser->basedir, content, &full_path))
2436 _dbus_string_free (&full_path);
2440 if (!include_dir (parser, &full_path, error))
2442 _dbus_string_free (&full_path);
2446 _dbus_string_free (&full_path);
2454 e->had_content = TRUE;
2456 if (!_dbus_string_copy_data (content, &s))
2459 dbus_free (parser->user);
2468 e->had_content = TRUE;
2470 if (!_dbus_string_copy_data (content, &s))
2473 dbus_free (parser->bus_type);
2474 parser->bus_type = s;
2478 case ELEMENT_LISTEN:
2482 e->had_content = TRUE;
2484 if (!_dbus_string_copy_data (content, &s))
2487 if (!_dbus_list_append (&parser->listen_on,
2500 e->had_content = TRUE;
2502 if (!_dbus_string_copy_data (content, &s))
2505 if (!_dbus_list_append (&parser->mechanisms,
2514 case ELEMENT_SERVICEDIR:
2517 DBusString full_path;
2519 e->had_content = TRUE;
2521 if (!_dbus_string_init (&full_path))
2524 if (!make_full_path (&parser->basedir, content, &full_path))
2526 _dbus_string_free (&full_path);
2530 if (!_dbus_string_copy_data (&full_path, &s))
2532 _dbus_string_free (&full_path);
2536 /* _only_ extra session directories can be specified */
2537 if (!service_dirs_append_unique_or_free (&parser->service_dirs, s))
2539 _dbus_string_free (&full_path);
2544 _dbus_string_free (&full_path);
2552 e->had_content = TRUE;
2555 if (!_dbus_string_parse_int (content, 0, &val, NULL))
2557 dbus_set_error (error, DBUS_ERROR_FAILED,
2558 "<limit name=\"%s\"> element has invalid value (could not parse as integer)",
2563 e->d.limit.value = val;
2565 _dbus_verbose ("Loaded value %ld for limit %s\n",
2572 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
2576 BUS_SET_OOM (error);
2581 bus_config_parser_finished (BusConfigParser *parser,
2584 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
2586 if (parser->stack != NULL)
2588 dbus_set_error (error, DBUS_ERROR_FAILED,
2589 "Element <%s> was not closed in configuration file",
2590 bus_config_parser_element_type_to_name (top_element_type (parser)));
2595 if (parser->is_toplevel && parser->listen_on == NULL)
2597 dbus_set_error (error, DBUS_ERROR_FAILED,
2598 "Configuration file needs one or more <listen> elements giving addresses");
2606 bus_config_parser_get_user (BusConfigParser *parser)
2608 return parser->user;
2612 bus_config_parser_get_type (BusConfigParser *parser)
2614 return parser->bus_type;
2618 bus_config_parser_get_addresses (BusConfigParser *parser)
2620 return &parser->listen_on;
2624 bus_config_parser_get_mechanisms (BusConfigParser *parser)
2626 return &parser->mechanisms;
2630 bus_config_parser_get_service_dirs (BusConfigParser *parser)
2632 return &parser->service_dirs;
2636 bus_config_parser_get_conf_dirs (BusConfigParser *parser)
2638 return &parser->conf_dirs;
2642 bus_config_parser_get_fork (BusConfigParser *parser)
2644 return parser->fork;
2648 bus_config_parser_get_syslog (BusConfigParser *parser)
2650 return parser->syslog;
2654 bus_config_parser_get_keep_umask (BusConfigParser *parser)
2656 return parser->keep_umask;
2660 bus_config_parser_get_allow_anonymous (BusConfigParser *parser)
2662 return parser->allow_anonymous;
2666 bus_config_parser_get_pidfile (BusConfigParser *parser)
2668 return parser->pidfile;
2672 bus_config_parser_get_servicehelper (BusConfigParser *parser)
2674 return parser->servicehelper;
2678 bus_config_parser_steal_policy (BusConfigParser *parser)
2682 _dbus_assert (parser->policy != NULL); /* can only steal the policy 1 time */
2684 policy = parser->policy;
2686 parser->policy = NULL;
2691 /* Overwrite any limits that were set in the configuration file */
2693 bus_config_parser_get_limits (BusConfigParser *parser,
2696 *limits = parser->limits;
2700 bus_config_parser_steal_service_context_table (BusConfigParser *parser)
2702 DBusHashTable *table;
2704 _dbus_assert (parser->service_context_table != NULL); /* can only steal once */
2706 table = parser->service_context_table;
2708 parser->service_context_table = NULL;
2713 #ifdef DBUS_BUILD_TESTS
2724 do_load (const DBusString *full_path,
2726 dbus_bool_t oom_possible)
2728 BusConfigParser *parser;
2731 dbus_error_init (&error);
2733 parser = bus_config_load (full_path, TRUE, NULL, &error);
2736 _DBUS_ASSERT_ERROR_IS_SET (&error);
2739 dbus_error_has_name (&error, DBUS_ERROR_NO_MEMORY))
2741 _dbus_verbose ("Failed to load valid file due to OOM\n");
2742 dbus_error_free (&error);
2745 else if (validity == VALID)
2747 _dbus_warn ("Failed to load valid file but still had memory: %s\n",
2750 dbus_error_free (&error);
2755 dbus_error_free (&error);
2761 _DBUS_ASSERT_ERROR_IS_CLEAR (&error);
2763 bus_config_parser_unref (parser);
2765 if (validity == INVALID)
2767 _dbus_warn ("Accepted invalid file\n");
2777 const DBusString *full_path;
2782 check_loader_oom_func (void *data)
2784 LoaderOomData *d = data;
2786 return do_load (d->full_path, d->validity, TRUE);
2790 process_test_valid_subdir (const DBusString *test_base_dir,
2794 DBusString test_directory;
2795 DBusString filename;
2803 if (!_dbus_string_init (&test_directory))
2804 _dbus_assert_not_reached ("didn't allocate test_directory\n");
2806 _dbus_string_init_const (&filename, subdir);
2808 if (!_dbus_string_copy (test_base_dir, 0,
2809 &test_directory, 0))
2810 _dbus_assert_not_reached ("couldn't copy test_base_dir to test_directory");
2812 if (!_dbus_concat_dir_and_file (&test_directory, &filename))
2813 _dbus_assert_not_reached ("couldn't allocate full path");
2815 _dbus_string_free (&filename);
2816 if (!_dbus_string_init (&filename))
2817 _dbus_assert_not_reached ("didn't allocate filename string\n");
2819 dbus_error_init (&error);
2820 dir = _dbus_directory_open (&test_directory, &error);
2823 _dbus_warn ("Could not open %s: %s\n",
2824 _dbus_string_get_const_data (&test_directory),
2826 dbus_error_free (&error);
2830 if (validity == VALID)
2831 printf ("Testing valid files:\n");
2832 else if (validity == INVALID)
2833 printf ("Testing invalid files:\n");
2835 printf ("Testing unknown files:\n");
2838 while (_dbus_directory_get_next_file (dir, &filename, &error))
2840 DBusString full_path;
2843 if (!_dbus_string_init (&full_path))
2844 _dbus_assert_not_reached ("couldn't init string");
2846 if (!_dbus_string_copy (&test_directory, 0, &full_path, 0))
2847 _dbus_assert_not_reached ("couldn't copy dir to full_path");
2849 if (!_dbus_concat_dir_and_file (&full_path, &filename))
2850 _dbus_assert_not_reached ("couldn't concat file to dir");
2852 if (!_dbus_string_ends_with_c_str (&full_path, ".conf"))
2854 _dbus_verbose ("Skipping non-.conf file %s\n",
2855 _dbus_string_get_const_data (&filename));
2856 _dbus_string_free (&full_path);
2860 printf (" %s\n", _dbus_string_get_const_data (&filename));
2862 _dbus_verbose (" expecting %s\n",
2863 validity == VALID ? "valid" :
2864 (validity == INVALID ? "invalid" :
2865 (validity == UNKNOWN ? "unknown" : "???")));
2867 d.full_path = &full_path;
2868 d.validity = validity;
2870 /* FIXME hackaround for an expat problem, see
2871 * https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124747
2872 * http://freedesktop.org/pipermail/dbus/2004-May/001153.html
2874 /* if (!_dbus_test_oom_handling ("config-loader", check_loader_oom_func, &d)) */
2875 if (!check_loader_oom_func (&d))
2876 _dbus_assert_not_reached ("test failed");
2878 _dbus_string_free (&full_path);
2881 if (dbus_error_is_set (&error))
2883 _dbus_warn ("Could not get next file in %s: %s\n",
2884 _dbus_string_get_const_data (&test_directory),
2886 dbus_error_free (&error);
2895 _dbus_directory_close (dir);
2896 _dbus_string_free (&test_directory);
2897 _dbus_string_free (&filename);
2903 bools_equal (dbus_bool_t a,
2910 strings_equal_or_both_null (const char *a,
2913 if (a == NULL || b == NULL)
2916 return !strcmp (a, b);
2920 elements_equal (const Element *a,
2923 if (a->type != b->type)
2926 if (!bools_equal (a->had_content, b->had_content))
2932 case ELEMENT_INCLUDE:
2933 if (!bools_equal (a->d.include.ignore_missing,
2934 b->d.include.ignore_missing))
2938 case ELEMENT_POLICY:
2939 if (a->d.policy.type != b->d.policy.type)
2941 if (a->d.policy.gid_uid_or_at_console != b->d.policy.gid_uid_or_at_console)
2946 if (strcmp (a->d.limit.name, b->d.limit.name))
2948 if (a->d.limit.value != b->d.limit.value)
2962 lists_of_elements_equal (DBusList *a,
2971 while (ia != NULL && ib != NULL)
2973 if (elements_equal (ia->data, ib->data))
2975 ia = _dbus_list_get_next_link (&a, ia);
2976 ib = _dbus_list_get_next_link (&b, ib);
2979 return ia == NULL && ib == NULL;
2983 lists_of_c_strings_equal (DBusList *a,
2992 while (ia != NULL && ib != NULL)
2994 if (strcmp (ia->data, ib->data))
2996 ia = _dbus_list_get_next_link (&a, ia);
2997 ib = _dbus_list_get_next_link (&b, ib);
3000 return ia == NULL && ib == NULL;
3004 limits_equal (const BusLimits *a,
3008 (a->max_incoming_bytes == b->max_incoming_bytes
3009 || a->max_incoming_unix_fds == b->max_incoming_unix_fds
3010 || a->max_outgoing_bytes == b->max_outgoing_bytes
3011 || a->max_outgoing_unix_fds == b->max_outgoing_unix_fds
3012 || a->max_message_size == b->max_message_size
3013 || a->max_message_unix_fds == b->max_message_unix_fds
3014 || a->activation_timeout == b->activation_timeout
3015 || a->auth_timeout == b->auth_timeout
3016 || a->max_completed_connections == b->max_completed_connections
3017 || a->max_incomplete_connections == b->max_incomplete_connections
3018 || a->max_connections_per_user == b->max_connections_per_user
3019 || a->max_pending_activations == b->max_pending_activations
3020 || a->max_services_per_connection == b->max_services_per_connection
3021 || a->max_match_rules_per_connection == b->max_match_rules_per_connection
3022 || a->max_replies_per_connection == b->max_replies_per_connection
3023 || a->reply_timeout == b->reply_timeout);
3027 config_parsers_equal (const BusConfigParser *a,
3028 const BusConfigParser *b)
3030 if (!_dbus_string_equal (&a->basedir, &b->basedir))
3033 if (!lists_of_elements_equal (a->stack, b->stack))
3036 if (!strings_equal_or_both_null (a->user, b->user))
3039 if (!lists_of_c_strings_equal (a->listen_on, b->listen_on))
3042 if (!lists_of_c_strings_equal (a->mechanisms, b->mechanisms))
3045 if (!lists_of_c_strings_equal (a->service_dirs, b->service_dirs))
3048 /* FIXME: compare policy */
3050 /* FIXME: compare service selinux ID table */
3052 if (! limits_equal (&a->limits, &b->limits))
3055 if (!strings_equal_or_both_null (a->pidfile, b->pidfile))
3058 if (! bools_equal (a->fork, b->fork))
3061 if (! bools_equal (a->keep_umask, b->keep_umask))
3064 if (! bools_equal (a->is_toplevel, b->is_toplevel))
3071 all_are_equiv (const DBusString *target_directory)
3073 DBusString filename;
3075 BusConfigParser *first_parser;
3076 BusConfigParser *parser;
3082 first_parser = NULL;
3086 if (!_dbus_string_init (&filename))
3087 _dbus_assert_not_reached ("didn't allocate filename string");
3089 dbus_error_init (&error);
3090 dir = _dbus_directory_open (target_directory, &error);
3093 _dbus_warn ("Could not open %s: %s\n",
3094 _dbus_string_get_const_data (target_directory),
3096 dbus_error_free (&error);
3100 printf ("Comparing equivalent files:\n");
3103 while (_dbus_directory_get_next_file (dir, &filename, &error))
3105 DBusString full_path;
3107 if (!_dbus_string_init (&full_path))
3108 _dbus_assert_not_reached ("couldn't init string");
3110 if (!_dbus_string_copy (target_directory, 0, &full_path, 0))
3111 _dbus_assert_not_reached ("couldn't copy dir to full_path");
3113 if (!_dbus_concat_dir_and_file (&full_path, &filename))
3114 _dbus_assert_not_reached ("couldn't concat file to dir");
3116 if (!_dbus_string_ends_with_c_str (&full_path, ".conf"))
3118 _dbus_verbose ("Skipping non-.conf file %s\n",
3119 _dbus_string_get_const_data (&filename));
3120 _dbus_string_free (&full_path);
3124 printf (" %s\n", _dbus_string_get_const_data (&filename));
3126 parser = bus_config_load (&full_path, TRUE, NULL, &error);
3130 _dbus_warn ("Could not load file %s: %s\n",
3131 _dbus_string_get_const_data (&full_path),
3133 _dbus_string_free (&full_path);
3134 dbus_error_free (&error);
3137 else if (first_parser == NULL)
3139 _dbus_string_free (&full_path);
3140 first_parser = parser;
3144 _dbus_string_free (&full_path);
3145 equal = config_parsers_equal (first_parser, parser);
3146 bus_config_parser_unref (parser);
3155 _dbus_string_free (&filename);
3157 bus_config_parser_unref (first_parser);
3159 _dbus_directory_close (dir);
3166 process_test_equiv_subdir (const DBusString *test_base_dir,
3169 DBusString test_directory;
3170 DBusString filename;
3179 if (!_dbus_string_init (&test_directory))
3180 _dbus_assert_not_reached ("didn't allocate test_directory");
3182 _dbus_string_init_const (&filename, subdir);
3184 if (!_dbus_string_copy (test_base_dir, 0,
3185 &test_directory, 0))
3186 _dbus_assert_not_reached ("couldn't copy test_base_dir to test_directory");
3188 if (!_dbus_concat_dir_and_file (&test_directory, &filename))
3189 _dbus_assert_not_reached ("couldn't allocate full path");
3191 _dbus_string_free (&filename);
3192 if (!_dbus_string_init (&filename))
3193 _dbus_assert_not_reached ("didn't allocate filename string");
3195 dbus_error_init (&error);
3196 dir = _dbus_directory_open (&test_directory, &error);
3199 _dbus_warn ("Could not open %s: %s\n",
3200 _dbus_string_get_const_data (&test_directory),
3202 dbus_error_free (&error);
3206 while (_dbus_directory_get_next_file (dir, &filename, &error))
3208 DBusString full_path;
3210 /* Skip CVS's magic directories! */
3211 if (_dbus_string_equal_c_str (&filename, "CVS"))
3214 if (!_dbus_string_init (&full_path))
3215 _dbus_assert_not_reached ("couldn't init string");
3217 if (!_dbus_string_copy (&test_directory, 0, &full_path, 0))
3218 _dbus_assert_not_reached ("couldn't copy dir to full_path");
3220 if (!_dbus_concat_dir_and_file (&full_path, &filename))
3221 _dbus_assert_not_reached ("couldn't concat file to dir");
3223 equal = all_are_equiv (&full_path);
3224 _dbus_string_free (&full_path);
3233 _dbus_string_free (&test_directory);
3234 _dbus_string_free (&filename);
3236 _dbus_directory_close (dir);
3242 static const char *test_session_service_dir_matches[] =
3245 "/testusr/testlocal/testshare/dbus-1/services",
3246 "/testusr/testshare/dbus-1/services",
3247 DBUS_DATADIR"/dbus-1/services",
3248 "/testhome/foo/.testlocal/testshare/dbus-1/services",
3250 /* will be filled in test_default_session_servicedirs() */
3259 test_default_session_servicedirs (void)
3264 const char *common_progs;
3269 if (_dbus_get_install_root(buffer, sizeof(buffer)))
3271 strcat(buffer,DBUS_DATADIR);
3272 strcat(buffer,"/dbus-1/services");
3273 test_session_service_dir_matches[0] = buffer;
3277 /* On Unix we don't actually use this variable, but it's easier to handle the
3278 * deallocation if we always allocate it, whether needed or not */
3279 if (!_dbus_string_init (&progs))
3280 _dbus_assert_not_reached ("OOM allocating progs");
3282 common_progs = _dbus_getenv ("CommonProgramFiles");
3286 if (!_dbus_string_append (&progs, common_progs))
3288 _dbus_string_free (&progs);
3292 if (!_dbus_string_append (&progs, "/dbus-1/services"))
3294 _dbus_string_free (&progs);
3297 test_session_service_dir_matches[1] = _dbus_string_get_const_data(&progs);
3302 printf ("Testing retrieving the default session service directories\n");
3303 if (!_dbus_get_standard_session_servicedirs (&dirs))
3304 _dbus_assert_not_reached ("couldn't get stardard dirs");
3306 /* make sure our defaults end with share/dbus-1/service */
3307 while ((link = _dbus_list_pop_first_link (&dirs)))
3311 printf (" default service dir: %s\n", (char *)link->data);
3312 _dbus_string_init_const (&path, (char *)link->data);
3313 if (!_dbus_string_ends_with_c_str (&path, "dbus-1/services"))
3315 printf ("error with default session service directories\n");
3316 dbus_free (link->data);
3317 _dbus_list_free_link (link);
3318 _dbus_string_free (&progs);
3322 dbus_free (link->data);
3323 _dbus_list_free_link (link);
3327 if (!_dbus_setenv ("XDG_DATA_HOME", "/testhome/foo/.testlocal/testshare"))
3328 _dbus_assert_not_reached ("couldn't setenv XDG_DATA_HOME");
3330 if (!_dbus_setenv ("XDG_DATA_DIRS", ":/testusr/testlocal/testshare: :/testusr/testshare:"))
3331 _dbus_assert_not_reached ("couldn't setenv XDG_DATA_DIRS");
3333 if (!_dbus_get_standard_session_servicedirs (&dirs))
3334 _dbus_assert_not_reached ("couldn't get stardard dirs");
3336 /* make sure we read and parse the env variable correctly */
3338 while ((link = _dbus_list_pop_first_link (&dirs)))
3340 printf (" test service dir: %s\n", (char *)link->data);
3341 if (test_session_service_dir_matches[i] == NULL)
3343 printf ("more directories parsed than in match set\n");
3344 dbus_free (link->data);
3345 _dbus_list_free_link (link);
3346 _dbus_string_free (&progs);
3350 if (strcmp (test_session_service_dir_matches[i],
3351 (char *)link->data) != 0)
3353 printf ("%s directory does not match %s in the match set\n",
3355 test_session_service_dir_matches[i]);
3356 dbus_free (link->data);
3357 _dbus_list_free_link (link);
3358 _dbus_string_free (&progs);
3364 dbus_free (link->data);
3365 _dbus_list_free_link (link);
3368 if (test_session_service_dir_matches[i] != NULL)
3370 printf ("extra data %s in the match set was not matched\n",
3371 test_session_service_dir_matches[i]);
3373 _dbus_string_free (&progs);
3377 _dbus_string_free (&progs);
3381 static const char *test_system_service_dir_matches[] =
3384 "/testusr/testlocal/testshare/dbus-1/system-services",
3385 "/testusr/testshare/dbus-1/system-services",
3387 DBUS_DATADIR"/dbus-1/system-services",
3395 test_default_system_servicedirs (void)
3400 const char *common_progs;
3403 /* On Unix we don't actually use this variable, but it's easier to handle the
3404 * deallocation if we always allocate it, whether needed or not */
3405 if (!_dbus_string_init (&progs))
3406 _dbus_assert_not_reached ("OOM allocating progs");
3408 common_progs = _dbus_getenv ("CommonProgramFiles");
3412 if (!_dbus_string_append (&progs, common_progs))
3414 _dbus_string_free (&progs);
3418 if (!_dbus_string_append (&progs, "/dbus-1/system-services"))
3420 _dbus_string_free (&progs);
3423 test_system_service_dir_matches[1] = _dbus_string_get_const_data(&progs);
3428 printf ("Testing retrieving the default system service directories\n");
3429 if (!_dbus_get_standard_system_servicedirs (&dirs))
3430 _dbus_assert_not_reached ("couldn't get stardard dirs");
3432 /* make sure our defaults end with share/dbus-1/system-service */
3433 while ((link = _dbus_list_pop_first_link (&dirs)))
3437 printf (" default service dir: %s\n", (char *)link->data);
3438 _dbus_string_init_const (&path, (char *)link->data);
3439 if (!_dbus_string_ends_with_c_str (&path, "dbus-1/system-services"))
3441 printf ("error with default system service directories\n");
3442 dbus_free (link->data);
3443 _dbus_list_free_link (link);
3444 _dbus_string_free (&progs);
3448 dbus_free (link->data);
3449 _dbus_list_free_link (link);
3453 if (!_dbus_setenv ("XDG_DATA_HOME", "/testhome/foo/.testlocal/testshare"))
3454 _dbus_assert_not_reached ("couldn't setenv XDG_DATA_HOME");
3456 if (!_dbus_setenv ("XDG_DATA_DIRS", ":/testusr/testlocal/testshare: :/testusr/testshare:"))
3457 _dbus_assert_not_reached ("couldn't setenv XDG_DATA_DIRS");
3459 if (!_dbus_get_standard_system_servicedirs (&dirs))
3460 _dbus_assert_not_reached ("couldn't get stardard dirs");
3462 /* make sure we read and parse the env variable correctly */
3464 while ((link = _dbus_list_pop_first_link (&dirs)))
3466 printf (" test service dir: %s\n", (char *)link->data);
3467 if (test_system_service_dir_matches[i] == NULL)
3469 printf ("more directories parsed than in match set\n");
3470 dbus_free (link->data);
3471 _dbus_list_free_link (link);
3472 _dbus_string_free (&progs);
3476 if (strcmp (test_system_service_dir_matches[i],
3477 (char *)link->data) != 0)
3479 printf ("%s directory does not match %s in the match set\n",
3481 test_system_service_dir_matches[i]);
3482 dbus_free (link->data);
3483 _dbus_list_free_link (link);
3484 _dbus_string_free (&progs);
3490 dbus_free (link->data);
3491 _dbus_list_free_link (link);
3494 if (test_system_service_dir_matches[i] != NULL)
3496 printf ("extra data %s in the match set was not matched\n",
3497 test_system_service_dir_matches[i]);
3499 _dbus_string_free (&progs);
3503 _dbus_string_free (&progs);
3508 bus_config_parser_test (const DBusString *test_data_dir)
3510 if (test_data_dir == NULL ||
3511 _dbus_string_get_length (test_data_dir) == 0)
3513 printf ("No test data\n");
3517 if (!test_default_session_servicedirs())
3521 printf("default system service dir skipped\n");
3523 if (!test_default_system_servicedirs())
3527 if (!process_test_valid_subdir (test_data_dir, "valid-config-files", VALID))
3530 if (!process_test_valid_subdir (test_data_dir, "invalid-config-files", INVALID))
3533 if (!process_test_equiv_subdir (test_data_dir, "equiv-config-files"))
3539 #endif /* DBUS_BUILD_TESTS */