gmid/parse.y

425 lines
8.7 KiB
Plaintext
Raw Normal View History

/* -*- mode: fundamental; indent-tabs-mode: t; -*- */
%{
/*
* Copyright (c) 2021 Omar Polo <op@omarpolo.com>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
2021-02-10 12:53:05 +01:00
#include <errno.h>
#include <stdarg.h>
#include <stdio.h>
#include <string.h>
#include "gmid.h"
/*
* #define YYDEBUG 1
* int yydebug = 1;
*/
2021-02-04 14:23:15 +01:00
struct vhost *host;
struct location *loc;
2021-01-24 15:11:40 +01:00
2021-01-27 17:45:45 +01:00
int goterror = 0;
static struct vhost *new_vhost(void);
static struct location *new_location(void);
void yyerror(const char*, ...);
2021-01-27 17:45:45 +01:00
int parse_portno(const char*);
void parse_conf(const char*);
2021-02-01 12:08:57 +01:00
char *ensure_absolute_path(char*);
int check_block_code(int);
char *check_block_fmt(char*);
int check_strip_no(int);
2021-02-07 13:05:32 +01:00
int check_prefork_num(int);
void advance_loc(void);
void only_once(const void*, const char*);
void only_oncei(int, const char*);
int fastcgi_conf(char *, char *, char *);
%}
/* for bison: */
/* %define parse.error verbose */
%union {
char *str;
int num;
}
2021-04-29 21:13:16 +02:00
%token TIPV6 TPORT TPROTOCOLS TMIME TDEFAULT TTYPE TCHROOT TUSER TSERVER
%token TPREFORK TLOCATION TCERT TKEY TROOT TCGI TENV TLANG TLOG TINDEX TAUTO
%token TSTRIP TBLOCK TRETURN TENTRYPOINT TREQUIRE TCLIENT TCA TALIAS TTCP
%token TFASTCGI TSPAWN
2021-04-29 21:13:16 +02:00
%token TERR
%token <str> TSTRING
%token <num> TNUM
%token <num> TBOOL
%%
conf : options vhosts ;
options : /* empty */
| options option
;
2021-02-09 23:38:10 +01:00
option : TCHROOT TSTRING { conf.chroot = $2; }
| TIPV6 TBOOL { conf.ipv6 = $2; }
| TMIME TSTRING TSTRING { add_mime(&conf.mime, $2, $3); }
| TPORT TNUM { conf.port = $2; }
2021-02-09 23:38:10 +01:00
| TPREFORK TNUM { conf.prefork = check_prefork_num($2); }
2021-01-15 19:55:05 +01:00
| TPROTOCOLS TSTRING {
if (tls_config_parse_protocols(&conf.protos, $2) == -1)
2021-02-10 12:53:05 +01:00
yyerror("invalid protocols string \"%s\"", $2);
2021-01-15 19:55:05 +01:00
}
2021-01-25 11:30:07 +01:00
| TUSER TSTRING { conf.user = $2; }
;
vhosts : /* empty */
| vhosts vhost
;
vhost : TSERVER TSTRING {
host = new_vhost();
TAILQ_INSERT_HEAD(&hosts, host, vhosts);
loc = new_location();
TAILQ_INSERT_HEAD(&host->locations, loc, locations);
loc->match = xstrdup("*");
host->domain = $2;
if (strstr($2, "xn--") != NULL) {
warnx("%s:%d \"%s\" looks like punycode: "
2021-01-28 17:33:20 +01:00
"you should use the decoded hostname.",
config_path, yylineno, $2);
}
} '{' servopts locations '}' {
if (host->cert == NULL || host->key == NULL)
2021-02-10 12:53:05 +01:00
yyerror("invalid vhost definition: %s", $2);
}
| error '}' { yyerror("error in server directive"); }
;
servopts : /* empty */
| servopts servopt
;
servopt : TALIAS TSTRING {
struct alist *a;
a = xcalloc(1, sizeof(*a));
a->alias = $2;
if (TAILQ_EMPTY(&host->aliases))
TAILQ_INSERT_HEAD(&host->aliases, a, aliases);
else
TAILQ_INSERT_TAIL(&host->aliases, a, aliases);
}
| TCERT TSTRING {
only_once(host->cert, "cert");
host->cert = ensure_absolute_path($2);
}
| TCGI TSTRING {
only_once(host->cgi, "cgi");
/* drop the starting '/', if any */
if (*$2 == '/')
memmove($2, $2+1, strlen($2));
host->cgi = $2;
2021-01-19 11:58:29 +01:00
}
2021-02-06 19:28:43 +01:00
| TENTRYPOINT TSTRING {
only_once(host->entrypoint, "entrypoint");
2021-02-06 19:28:43 +01:00
while (*$2 == '/')
memmove($2, $2+1, strlen($2));
host->entrypoint = $2;
}
| TENV TSTRING TSTRING {
struct envlist *e;
e = xcalloc(1, sizeof(*e));
e->name = $2;
e->value = $3;
if (TAILQ_EMPTY(&host->env))
TAILQ_INSERT_HEAD(&host->env, e, envs);
else
TAILQ_INSERT_TAIL(&host->env, e, envs);
}
| TKEY TSTRING {
only_once(host->key, "key");
host->key = ensure_absolute_path($2);
}
2021-01-24 15:11:40 +01:00
| locopt
;
locations : /* empty */
| locations location
;
location : TLOCATION { advance_loc(); } TSTRING '{' locopts '}' {
/* drop the starting '/' if any */
if (*$3 == '/')
memmove($3, $3+1, strlen($3));
loc->match = $3;
2021-01-24 15:11:40 +01:00
}
| error '}'
;
locopts : /* empty */
| locopts locopt
;
2021-02-09 23:38:10 +01:00
locopt : TAUTO TINDEX TBOOL { loc->auto_index = $3 ? 1 : -1; }
| TBLOCK TRETURN TNUM TSTRING {
only_once(loc->block_fmt, "block");
loc->block_fmt = check_block_fmt($4);
loc->block_code = check_block_code($3);
}
| TBLOCK TRETURN TNUM {
only_once(loc->block_fmt, "block");
loc->block_fmt = xstrdup("temporary failure");
loc->block_code = check_block_code($3);
if ($3 >= 30 && $3 < 40)
yyerror("missing `meta' for block return %d", $3);
}
| TBLOCK {
only_once(loc->block_fmt, "block");
loc->block_fmt = xstrdup("temporary failure");
loc->block_code = 40;
}
2021-02-09 23:38:10 +01:00
| TDEFAULT TTYPE TSTRING {
only_once(loc->default_mime, "default type");
2021-02-09 23:38:10 +01:00
loc->default_mime = $3;
}
2021-05-24 11:09:10 +02:00
| TFASTCGI fastcgi
2021-02-09 23:38:10 +01:00
| TINDEX TSTRING {
only_once(loc->index, "index");
2021-02-09 23:38:10 +01:00
loc->index = $2;
}
| TLANG TSTRING {
only_once(loc->lang, "lang");
2021-02-09 23:38:10 +01:00
loc->lang = $2;
}
| TLOG TBOOL { loc->disable_log = !$2; }
| TREQUIRE TCLIENT TCA TSTRING {
only_once(loc->reqca, "require client ca");
ensure_absolute_path($4);
if ((loc->reqca = load_ca($4)) == NULL)
yyerror("couldn't load ca cert: %s", $4);
free($4);
}
| TROOT TSTRING {
only_once(loc->dir, "root");
loc->dir = ensure_absolute_path($2);
}
2021-02-09 23:38:10 +01:00
| TSTRIP TNUM { loc->strip = check_strip_no($2); }
;
2021-01-27 17:45:45 +01:00
2021-05-24 11:09:10 +02:00
fastcgi : TSPAWN TSTRING {
only_oncei(loc->fcgi, "fastcgi");
loc->fcgi = fastcgi_conf(NULL, NULL, $2);
}
| TSTRING {
only_oncei(loc->fcgi, "fastcgi");
loc->fcgi = fastcgi_conf($1, NULL, NULL);
}
| TTCP TSTRING TNUM {
char *c;
if (asprintf(&c, "%d", $3) == -1)
err(1, "asprintf");
only_oncei(loc->fcgi, "fastcgi");
loc->fcgi = fastcgi_conf($2, c, NULL);
}
| TTCP TSTRING {
only_oncei(loc->fcgi, "fastcgi");
loc->fcgi = fastcgi_conf($2, xstrdup("9000"), NULL);
}
| TTCP TSTRING TSTRING {
only_oncei(loc->fcgi, "fastcgi");
loc->fcgi = fastcgi_conf($2, $3, NULL);
}
;
2021-01-27 17:45:45 +01:00
%%
static struct vhost *
new_vhost(void)
{
return xcalloc(1, sizeof(struct vhost));
}
static struct location *
new_location(void)
{
struct location *l;
l = xcalloc(1, sizeof(*l));
l->dirfd = -1;
l->fcgi = -1;
return l;
}
2021-01-27 17:45:45 +01:00
void
yyerror(const char *msg, ...)
2021-01-27 17:45:45 +01:00
{
va_list ap;
2021-01-27 17:45:45 +01:00
goterror = 1;
va_start(ap, msg);
fprintf(stderr, "%s:%d: ", config_path, yylineno);
vfprintf(stderr, msg, ap);
2021-02-07 19:08:50 +01:00
fprintf(stderr, "\n");
va_end(ap);
2021-01-27 17:45:45 +01:00
}
int
parse_portno(const char *p)
{
const char *errstr;
int n;
n = strtonum(p, 0, UINT16_MAX, &errstr);
if (errstr != NULL)
2021-02-10 14:13:17 +01:00
yyerror("port number is %s: %s", errstr, p);
2021-01-27 17:45:45 +01:00
return n;
}
void
parse_conf(const char *path)
{
config_path = path;
if ((yyin = fopen(path, "r")) == NULL)
err(1, "cannot open config: %s", path);
2021-01-27 17:45:45 +01:00
yyparse();
fclose(yyin);
if (goterror)
exit(1);
if (TAILQ_FIRST(&hosts)->domain == NULL)
errx(1, "no vhost defined in %s", path);
2021-01-27 17:45:45 +01:00
}
2021-02-01 12:08:57 +01:00
char *
ensure_absolute_path(char *path)
{
if (path == NULL || *path != '/')
yyerror("not an absolute path: %s", path);
2021-02-01 12:08:57 +01:00
return path;
}
int
check_block_code(int n)
{
if (n < 10 || n >= 70 || (n >= 20 && n <= 29))
yyerror("invalid block code %d", n);
return n;
}
char *
check_block_fmt(char *fmt)
{
char *s;
for (s = fmt; *s; ++s) {
if (*s != '%')
continue;
switch (*++s) {
case '%':
case 'p':
case 'q':
case 'P':
case 'N':
break;
default:
yyerror("invalid format specifier %%%c", *s);
}
}
return fmt;
}
int
check_strip_no(int n)
{
if (n <= 0)
yyerror("invalid strip number %d", n);
return n;
}
2021-02-07 13:05:32 +01:00
int
check_prefork_num(int n)
{
if (n <= 0 || n >= PROC_MAX)
2021-02-07 13:05:32 +01:00
yyerror("invalid prefork number %d", n);
return n;
}
void
advance_loc(void)
{
loc = new_location();
TAILQ_INSERT_TAIL(&host->locations, loc, locations);
}
void
only_once(const void *ptr, const char *name)
{
if (ptr != NULL)
yyerror("`%s' specified more than once", name);
}
void
only_oncei(int i, const char *name)
{
if (i != -1)
yyerror("`%s' specified more than once", name);
}
int
fastcgi_conf(char *path, char *port, char *prog)
{
struct fcgi *f;
int i;
for (i = 0; i < FCGI_MAX; ++i) {
f = &fcgi[i];
if (f->path == NULL) {
f->id = i;
f->path = path;
f->port = port;
f->prog = prog;
return i;
}
/* XXX: what to do with prog? */
if (!strcmp(f->path, path) &&
((port == NULL && f->port == NULL) ||
!strcmp(f->port, port))) {
free(path);
free(port);
return i;
}
}
yyerror("too much `fastcgi' rules defined.");
return -1;
}