2021-01-15 10:17:43 +01:00
|
|
|
/* -*- mode: fundamental; indent-tabs-mode: t; -*- */
|
|
|
|
%{
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright (c) 2021 Omar Polo <op@omarpolo.com>
|
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice appear in all copies.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
2021-02-10 12:53:05 +01:00
|
|
|
#include <errno.h>
|
2021-02-06 18:22:37 +01:00
|
|
|
#include <stdarg.h>
|
2021-01-15 10:17:43 +01:00
|
|
|
#include <stdio.h>
|
2021-01-28 18:50:22 +01:00
|
|
|
#include <string.h>
|
2021-01-15 10:17:43 +01:00
|
|
|
|
|
|
|
#include "gmid.h"
|
|
|
|
|
|
|
|
/*
|
|
|
|
* #define YYDEBUG 1
|
|
|
|
* int yydebug = 1;
|
|
|
|
*/
|
|
|
|
|
2021-02-04 14:23:15 +01:00
|
|
|
struct vhost *host;
|
|
|
|
struct location *loc;
|
2021-01-24 15:11:40 +01:00
|
|
|
|
2021-01-27 17:45:45 +01:00
|
|
|
int goterror = 0;
|
|
|
|
|
2021-03-31 18:32:18 +02:00
|
|
|
static struct vhost *new_vhost(void);
|
|
|
|
static struct location *new_location(void);
|
|
|
|
|
2021-02-06 18:22:37 +01:00
|
|
|
void yyerror(const char*, ...);
|
2021-01-27 17:45:45 +01:00
|
|
|
int parse_portno(const char*);
|
|
|
|
void parse_conf(const char*);
|
2021-02-01 12:08:57 +01:00
|
|
|
char *ensure_absolute_path(char*);
|
2021-02-06 18:22:37 +01:00
|
|
|
int check_block_code(int);
|
|
|
|
char *check_block_fmt(char*);
|
|
|
|
int check_strip_no(int);
|
2021-02-07 13:05:32 +01:00
|
|
|
int check_prefork_num(int);
|
2021-02-10 17:37:08 +01:00
|
|
|
void advance_loc(void);
|
2021-01-15 10:17:43 +01:00
|
|
|
|
|
|
|
%}
|
|
|
|
|
|
|
|
/* for bison: */
|
|
|
|
/* %define parse.error verbose */
|
|
|
|
|
|
|
|
%union {
|
|
|
|
char *str;
|
|
|
|
int num;
|
|
|
|
}
|
|
|
|
|
2021-01-27 13:04:37 +01:00
|
|
|
%token TIPV6 TPORT TPROTOCOLS TMIME TDEFAULT TTYPE
|
2021-02-07 13:05:32 +01:00
|
|
|
%token TCHROOT TUSER TSERVER TPREFORK
|
2021-04-28 14:43:17 +02:00
|
|
|
%token TLOCATION TCERT TKEY TROOT TCGI TENV TLANG TLOG TINDEX TAUTO
|
2021-02-09 23:30:04 +01:00
|
|
|
%token TSTRIP TBLOCK TRETURN TENTRYPOINT TREQUIRE TCLIENT TCA
|
2021-01-15 10:17:43 +01:00
|
|
|
%token TERR
|
|
|
|
|
|
|
|
%token <str> TSTRING
|
|
|
|
%token <num> TNUM
|
|
|
|
%token <num> TBOOL
|
|
|
|
|
|
|
|
%%
|
|
|
|
|
|
|
|
conf : options vhosts ;
|
|
|
|
|
|
|
|
options : /* empty */
|
|
|
|
| options option
|
|
|
|
;
|
|
|
|
|
2021-02-09 23:38:10 +01:00
|
|
|
option : TCHROOT TSTRING { conf.chroot = $2; }
|
|
|
|
| TIPV6 TBOOL { conf.ipv6 = $2; }
|
|
|
|
| TMIME TSTRING TSTRING { add_mime(&conf.mime, $2, $3); }
|
2021-01-15 10:17:43 +01:00
|
|
|
| TPORT TNUM { conf.port = $2; }
|
2021-02-09 23:38:10 +01:00
|
|
|
| TPREFORK TNUM { conf.prefork = check_prefork_num($2); }
|
2021-01-15 19:55:05 +01:00
|
|
|
| TPROTOCOLS TSTRING {
|
|
|
|
if (tls_config_parse_protocols(&conf.protos, $2) == -1)
|
2021-02-10 12:53:05 +01:00
|
|
|
yyerror("invalid protocols string \"%s\"", $2);
|
2021-01-15 19:55:05 +01:00
|
|
|
}
|
2021-01-25 11:30:07 +01:00
|
|
|
| TUSER TSTRING { conf.user = $2; }
|
2021-01-15 10:17:43 +01:00
|
|
|
;
|
|
|
|
|
|
|
|
vhosts : /* empty */
|
|
|
|
| vhosts vhost
|
|
|
|
;
|
|
|
|
|
2021-03-31 18:32:18 +02:00
|
|
|
vhost : TSERVER TSTRING {
|
|
|
|
host = new_vhost();
|
|
|
|
TAILQ_INSERT_HEAD(&hosts, host, vhosts);
|
|
|
|
|
|
|
|
loc = new_location();
|
|
|
|
TAILQ_INSERT_HEAD(&host->locations, loc, locations);
|
|
|
|
|
|
|
|
loc->match = xstrdup("*");
|
2021-01-15 10:17:43 +01:00
|
|
|
host->domain = $2;
|
|
|
|
|
2021-01-28 17:27:40 +01:00
|
|
|
if (strstr($2, "xn--") != NULL) {
|
|
|
|
warnx("%s:%d \"%s\" looks like punycode: "
|
2021-01-28 17:33:20 +01:00
|
|
|
"you should use the decoded hostname.",
|
|
|
|
config_path, yylineno, $2);
|
2021-01-28 17:27:40 +01:00
|
|
|
}
|
2021-03-31 18:32:18 +02:00
|
|
|
} '{' servopts locations '}' {
|
2021-01-28 17:27:40 +01:00
|
|
|
|
2021-01-15 10:17:43 +01:00
|
|
|
if (host->cert == NULL || host->key == NULL ||
|
|
|
|
host->dir == NULL)
|
2021-02-10 12:53:05 +01:00
|
|
|
yyerror("invalid vhost definition: %s", $2);
|
2021-01-15 10:17:43 +01:00
|
|
|
}
|
|
|
|
| error '}' { yyerror("error in server directive"); }
|
|
|
|
;
|
|
|
|
|
|
|
|
servopts : /* empty */
|
|
|
|
| servopts servopt
|
|
|
|
;
|
|
|
|
|
2021-02-01 12:08:57 +01:00
|
|
|
servopt : TCERT TSTRING { host->cert = ensure_absolute_path($2); }
|
2021-01-15 10:17:43 +01:00
|
|
|
| TCGI TSTRING {
|
|
|
|
/* drop the starting '/', if any */
|
2021-02-04 21:04:12 +01:00
|
|
|
if (*$2 == '/')
|
|
|
|
memmove($2, $2+1, strlen($2));
|
|
|
|
host->cgi = $2;
|
2021-01-19 11:58:29 +01:00
|
|
|
}
|
2021-02-06 19:28:43 +01:00
|
|
|
| TENTRYPOINT TSTRING {
|
|
|
|
if (host->entrypoint != NULL)
|
|
|
|
yyerror("`entrypoint' specified more than once");
|
|
|
|
while (*$2 == '/')
|
|
|
|
memmove($2, $2+1, strlen($2));
|
|
|
|
host->entrypoint = $2;
|
|
|
|
}
|
2021-04-28 14:43:17 +02:00
|
|
|
| TENV TSTRING TSTRING {
|
|
|
|
struct envlist *e;
|
|
|
|
|
|
|
|
e = xcalloc(1, sizeof(*e));
|
|
|
|
e->name = $2;
|
|
|
|
e->value = $3;
|
|
|
|
if (TAILQ_EMPTY(&host->env))
|
|
|
|
TAILQ_INSERT_HEAD(&host->env, e, envs);
|
|
|
|
else
|
|
|
|
TAILQ_INSERT_TAIL(&host->env, e, envs);
|
|
|
|
}
|
2021-02-09 23:38:10 +01:00
|
|
|
| TKEY TSTRING { host->key = ensure_absolute_path($2); }
|
|
|
|
| TROOT TSTRING { host->dir = ensure_absolute_path($2); }
|
2021-01-24 15:11:40 +01:00
|
|
|
| locopt
|
|
|
|
;
|
|
|
|
|
|
|
|
locations : /* empty */
|
|
|
|
| locations location
|
|
|
|
;
|
|
|
|
|
2021-02-10 17:37:08 +01:00
|
|
|
location : TLOCATION { advance_loc(); } TSTRING '{' locopts '}' {
|
|
|
|
/* drop the starting '/' if any */
|
|
|
|
if (*$3 == '/')
|
|
|
|
memmove($3, $3+1, strlen($3));
|
|
|
|
loc->match = $3;
|
2021-01-24 15:11:40 +01:00
|
|
|
}
|
|
|
|
| error '}'
|
|
|
|
;
|
|
|
|
|
|
|
|
locopts : /* empty */
|
|
|
|
| locopts locopt
|
|
|
|
;
|
|
|
|
|
2021-02-09 23:38:10 +01:00
|
|
|
locopt : TAUTO TINDEX TBOOL { loc->auto_index = $3 ? 1 : -1; }
|
2021-02-06 18:22:37 +01:00
|
|
|
| TBLOCK TRETURN TNUM TSTRING {
|
|
|
|
if (loc->block_fmt != NULL)
|
|
|
|
yyerror("`block' rule specified more than once");
|
|
|
|
loc->block_fmt = check_block_fmt($4);
|
|
|
|
loc->block_code = check_block_code($3);
|
|
|
|
}
|
|
|
|
| TBLOCK TRETURN TNUM {
|
|
|
|
if (loc->block_fmt != NULL)
|
|
|
|
yyerror("`block' rule specified more than once");
|
|
|
|
loc->block_fmt = xstrdup("temporary failure");
|
|
|
|
loc->block_code = check_block_code($3);
|
|
|
|
if ($3 >= 30 && $3 < 40)
|
|
|
|
yyerror("missing `meta' for block return %d", $3);
|
|
|
|
}
|
|
|
|
| TBLOCK {
|
|
|
|
if (loc->block_fmt != NULL)
|
|
|
|
yyerror("`block' rule specified more than once");
|
|
|
|
loc->block_fmt = xstrdup("temporary failure");
|
|
|
|
loc->block_code = 40;
|
|
|
|
}
|
2021-02-09 23:38:10 +01:00
|
|
|
| TDEFAULT TTYPE TSTRING {
|
|
|
|
if (loc->default_mime != NULL)
|
|
|
|
yyerror("`default type' specified more than once");
|
|
|
|
loc->default_mime = $3;
|
|
|
|
}
|
|
|
|
| TINDEX TSTRING {
|
|
|
|
if (loc->index != NULL)
|
|
|
|
yyerror("`index' specified more than once");
|
|
|
|
loc->index = $2;
|
|
|
|
}
|
|
|
|
| TLANG TSTRING {
|
|
|
|
if (loc->lang != NULL)
|
|
|
|
yyerror("`lang' specified more than once");
|
|
|
|
loc->lang = $2;
|
|
|
|
}
|
2021-02-22 09:53:14 +01:00
|
|
|
| TLOG TBOOL { loc->disable_log = !$2; }
|
2021-02-09 23:30:04 +01:00
|
|
|
| TREQUIRE TCLIENT TCA TSTRING {
|
|
|
|
if (loc->reqca != NULL)
|
|
|
|
yyerror("`require client ca' specified more than once");
|
|
|
|
if (*$4 != '/')
|
|
|
|
yyerror("path to certificate must be absolute: %s", $4);
|
|
|
|
if ((loc->reqca = load_ca($4)) == NULL)
|
|
|
|
yyerror("couldn't load ca cert: %s", $4);
|
|
|
|
free($4);
|
|
|
|
}
|
2021-02-09 23:38:10 +01:00
|
|
|
| TSTRIP TNUM { loc->strip = check_strip_no($2); }
|
2021-01-15 10:17:43 +01:00
|
|
|
;
|
2021-01-27 17:45:45 +01:00
|
|
|
|
|
|
|
%%
|
|
|
|
|
2021-03-31 18:32:18 +02:00
|
|
|
static struct vhost *
|
|
|
|
new_vhost(void)
|
|
|
|
{
|
|
|
|
return xcalloc(1, sizeof(struct vhost));
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct location *
|
|
|
|
new_location(void)
|
|
|
|
{
|
|
|
|
return xcalloc(1, sizeof(struct location));
|
|
|
|
}
|
|
|
|
|
2021-01-27 17:45:45 +01:00
|
|
|
void
|
2021-02-06 18:22:37 +01:00
|
|
|
yyerror(const char *msg, ...)
|
2021-01-27 17:45:45 +01:00
|
|
|
{
|
2021-02-06 18:22:37 +01:00
|
|
|
va_list ap;
|
|
|
|
|
2021-01-27 17:45:45 +01:00
|
|
|
goterror = 1;
|
2021-02-06 18:22:37 +01:00
|
|
|
|
|
|
|
va_start(ap, msg);
|
|
|
|
fprintf(stderr, "%s:%d: ", config_path, yylineno);
|
|
|
|
vfprintf(stderr, msg, ap);
|
2021-02-07 19:08:50 +01:00
|
|
|
fprintf(stderr, "\n");
|
2021-02-06 18:22:37 +01:00
|
|
|
va_end(ap);
|
2021-01-27 17:45:45 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
parse_portno(const char *p)
|
|
|
|
{
|
|
|
|
const char *errstr;
|
|
|
|
int n;
|
|
|
|
|
|
|
|
n = strtonum(p, 0, UINT16_MAX, &errstr);
|
|
|
|
if (errstr != NULL)
|
2021-02-10 14:13:17 +01:00
|
|
|
yyerror("port number is %s: %s", errstr, p);
|
2021-01-27 17:45:45 +01:00
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
parse_conf(const char *path)
|
|
|
|
{
|
|
|
|
config_path = path;
|
|
|
|
if ((yyin = fopen(path, "r")) == NULL)
|
2021-04-28 14:43:17 +02:00
|
|
|
err(1, "cannot open config: %s", path);
|
2021-01-27 17:45:45 +01:00
|
|
|
yyparse();
|
|
|
|
fclose(yyin);
|
|
|
|
|
|
|
|
if (goterror)
|
|
|
|
exit(1);
|
2021-03-31 18:32:18 +02:00
|
|
|
|
|
|
|
if (TAILQ_FIRST(&hosts)->domain == NULL)
|
2021-04-28 14:43:17 +02:00
|
|
|
errx(1, "no vhost defined in %s", path);
|
2021-01-27 17:45:45 +01:00
|
|
|
}
|
2021-02-01 12:08:57 +01:00
|
|
|
|
|
|
|
char *
|
|
|
|
ensure_absolute_path(char *path)
|
|
|
|
{
|
|
|
|
if (path == NULL || *path != '/')
|
|
|
|
yyerror("not an absolute path");
|
|
|
|
return path;
|
|
|
|
}
|
2021-02-06 18:22:37 +01:00
|
|
|
|
|
|
|
int
|
|
|
|
check_block_code(int n)
|
|
|
|
{
|
|
|
|
if (n < 10 || n >= 70 || (n >= 20 && n <= 29))
|
|
|
|
yyerror("invalid block code %d", n);
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
char *
|
|
|
|
check_block_fmt(char *fmt)
|
|
|
|
{
|
|
|
|
char *s;
|
|
|
|
|
|
|
|
for (s = fmt; *s; ++s) {
|
|
|
|
if (*s != '%')
|
|
|
|
continue;
|
|
|
|
switch (*++s) {
|
|
|
|
case '%':
|
|
|
|
case 'p':
|
|
|
|
case 'q':
|
|
|
|
case 'P':
|
|
|
|
case 'N':
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
yyerror("invalid format specifier %%%c", *s);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return fmt;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
check_strip_no(int n)
|
|
|
|
{
|
|
|
|
if (n <= 0)
|
|
|
|
yyerror("invalid strip number %d", n);
|
|
|
|
return n;
|
|
|
|
}
|
2021-02-07 13:05:32 +01:00
|
|
|
|
|
|
|
int
|
|
|
|
check_prefork_num(int n)
|
|
|
|
{
|
2021-03-03 18:22:01 +01:00
|
|
|
if (n <= 0 || n >= PROC_MAX)
|
2021-02-07 13:05:32 +01:00
|
|
|
yyerror("invalid prefork number %d", n);
|
|
|
|
return n;
|
|
|
|
}
|
2021-02-10 17:37:08 +01:00
|
|
|
|
|
|
|
void
|
|
|
|
advance_loc(void)
|
|
|
|
{
|
2021-03-31 18:32:18 +02:00
|
|
|
loc = new_location();
|
|
|
|
TAILQ_INSERT_TAIL(&host->locations, loc, locations);
|
2021-02-10 17:37:08 +01:00
|
|
|
}
|