/* $OpenBSD: parse.y,v 1.125 2021/04/10 10:10:07 claudio Exp $ */ /* * Copyright (c) 2020 Matthias Pressfreund * Copyright (c) 2007 - 2015 Reyk Floeter * Copyright (c) 2008 Gilles Chehade * Copyright (c) 2006 Pierre-Yves Ritschard * Copyright (c) 2004, 2005 Esben Norby * Copyright (c) 2004 Ryan McBride * Copyright (c) 2002, 2003, 2004 Henning Brauer * Copyright (c) 2001 Markus Friedl. All rights reserved. * Copyright (c) 2001 Daniel Hartmeier. All rights reserved. * Copyright (c) 2001 Theo de Raadt. All rights reserved. * * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ %{ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "httpd.h" #include "http.h" TAILQ_HEAD(files, file) files = TAILQ_HEAD_INITIALIZER(files); static struct file { TAILQ_ENTRY(file) entry; FILE *stream; char *name; size_t ungetpos; size_t ungetsize; u_char *ungetbuf; int eof_reached; int lineno; int errors; } *file, *topfile; struct file *pushfile(const char *, int); int popfile(void); int check_file_secrecy(int, const char *); int yyparse(void); int yylex(void); int yyerror(const char *, ...) __attribute__((__format__ (printf, 1, 2))) __attribute__((__nonnull__ (1))); int kw_cmp(const void *, const void *); int lookup(char *); int igetc(void); int lgetc(int); void lungetc(int); int findeol(void); TAILQ_HEAD(symhead, sym) symhead = TAILQ_HEAD_INITIALIZER(symhead); struct sym { TAILQ_ENTRY(sym) entry; int used; int persist; char *nam; char *val; }; int symset(const char *, const char *, int); char *symget(const char *); struct httpd *conf = NULL; static int errors = 0; static int loadcfg = 0; uint32_t last_server_id = 0; uint32_t last_auth_id = 0; static struct server *srv = NULL, *parentsrv = NULL; static struct server_config *srv_conf = NULL; struct serverlist servers; struct media_type media; struct address *host_v4(const char *); struct address *host_v6(const char *); int host_dns(const char *, struct addresslist *, int, struct portrange *, const char *, int); int host_if(const char *, struct addresslist *, int, struct portrange *, const char *, int); int host(const char *, struct addresslist *, int, struct portrange *, const char *, int); struct server *server_inherit(struct server *, struct server_config *, struct server_config *); int listen_on(const char *, int, struct portrange *); int getservice(char *); int is_if_in_group(const char *, const char *); int get_fastcgi_dest(struct server_config *, const char *, char *); void remove_locations(struct server_config *); typedef struct { union { int64_t number; char *string; struct timeval tv; struct portrange port; struct auth auth; } v; int lineno; } YYSTYPE; %} %token ACCESS ALIAS AUTO BACKLOG BODY BUFFER CERTIFICATE CHROOT CIPHERS COMMON %token COMBINED CONNECTION DHE DIRECTORY ECDHE ERR FCGI INDEX IP KEY LIFETIME %token LISTEN LOCATION LOG LOGDIR MATCH MAXIMUM NO NODELAY OCSP ON PORT PREFORK %token PROTOCOLS REQUESTS ROOT SACK SERVER SOCKET STRIP STYLE SYSLOG TCP TICKET %token TIMEOUT TLS TYPE TYPES HSTS MAXAGE SUBDOMAINS DEFAULT PRELOAD REQUEST %token ERROR INCLUDE AUTHENTICATE WITH BLOCK DROP RETURN PASS REWRITE %token CA CLIENT CRL OPTIONAL PARAM FORWARDED FOUND NOT %token STRING %token NUMBER %type port %type fcgiport %type opttls optmatch optfound %type timeout %type numberstring optstring %type authopts %% grammar : /* empty */ | grammar include '\n' | grammar '\n' | grammar varset '\n' | grammar main '\n' | grammar server '\n' | grammar types '\n' | grammar error '\n' { file->errors++; } ; include : INCLUDE STRING { struct file *nfile; if ((nfile = pushfile($2, 0)) == NULL) { yyerror("failed to include file %s", $2); free($2); YYERROR; } free($2); file = nfile; lungetc('\n'); } ; varset : STRING '=' STRING { char *s = $1; while (*s++) { if (isspace((unsigned char)*s)) { yyerror("macro name cannot contain " "whitespace"); free($1); free($3); YYERROR; } } if (symset($1, $3, 0) == -1) fatal("cannot store variable"); free($1); free($3); } ; opttls : /*empty*/ { $$ = 0; } | TLS { $$ = 1; } ; main : PREFORK NUMBER { if (loadcfg) break; if ($2 <= 0 || $2 > PROC_MAX_INSTANCES) { yyerror("invalid number of preforked " "servers: %lld", $2); YYERROR; } conf->sc_prefork_server = $2; } | CHROOT STRING { conf->sc_chroot = $2; } | LOGDIR STRING { conf->sc_logdir = $2; } | DEFAULT TYPE mediastring { memcpy(&conf->sc_default_type, &media, sizeof(struct media_type)); } ; server : SERVER optmatch STRING { struct server *s; struct sockaddr_un *sun; if (!loadcfg) { free($3); YYACCEPT; } if ((s = calloc(1, sizeof (*s))) == NULL) fatal("out of memory"); if (strlcpy(s->srv_conf.name, $3, sizeof(s->srv_conf.name)) >= sizeof(s->srv_conf.name)) { yyerror("server name truncated"); free($3); free(s); YYERROR; } free($3); strlcpy(s->srv_conf.root, HTTPD_DOCROOT, sizeof(s->srv_conf.root)); strlcpy(s->srv_conf.index, HTTPD_INDEX, sizeof(s->srv_conf.index)); strlcpy(s->srv_conf.accesslog, HTTPD_ACCESS_LOG, sizeof(s->srv_conf.accesslog)); strlcpy(s->srv_conf.errorlog, HTTPD_ERROR_LOG, sizeof(s->srv_conf.errorlog)); s->srv_conf.id = ++last_server_id; s->srv_conf.parent_id = s->srv_conf.id; s->srv_s = -1; s->srv_conf.timeout.tv_sec = SERVER_TIMEOUT; s->srv_conf.requesttimeout.tv_sec = SERVER_REQUESTTIMEOUT; s->srv_conf.maxrequests = SERVER_MAXREQUESTS; s->srv_conf.maxrequestbody = SERVER_MAXREQUESTBODY; s->srv_conf.flags = SRVFLAG_LOG; if ($2) s->srv_conf.flags |= SRVFLAG_SERVER_MATCH; s->srv_conf.logformat = LOG_FORMAT_COMMON; s->srv_conf.tls_protocols = TLS_PROTOCOLS_DEFAULT; if ((s->srv_conf.tls_cert_file = strdup(HTTPD_TLS_CERT)) == NULL) fatal("out of memory"); if ((s->srv_conf.tls_key_file = strdup(HTTPD_TLS_KEY)) == NULL) fatal("out of memory"); strlcpy(s->srv_conf.tls_ciphers, HTTPD_TLS_CIPHERS, sizeof(s->srv_conf.tls_ciphers)); strlcpy(s->srv_conf.tls_dhe_params, HTTPD_TLS_DHE_PARAMS, sizeof(s->srv_conf.tls_dhe_params)); strlcpy(s->srv_conf.tls_ecdhe_curves, HTTPD_TLS_ECDHE_CURVES, sizeof(s->srv_conf.tls_ecdhe_curves)); sun = (struct sockaddr_un *)&s->srv_conf.fastcgi_ss; sun->sun_family = AF_UNIX; (void)strlcpy(sun->sun_path, HTTPD_FCGI_SOCKET, sizeof(sun->sun_path)); sun->sun_len = sizeof(struct sockaddr_un); s->srv_conf.hsts_max_age = SERVER_HSTS_DEFAULT_AGE; if (last_server_id == INT_MAX) { yyerror("too many servers defined"); free(s); YYERROR; } srv = s; srv_conf = &srv->srv_conf; SPLAY_INIT(&srv->srv_clients); TAILQ_INIT(&srv->srv_hosts); TAILQ_INIT(&srv_conf->fcgiparams); TAILQ_INSERT_TAIL(&srv->srv_hosts, srv_conf, entry); } '{' optnl serveropts_l '}' { struct server *s, *sn; struct server_config *a, *b; srv_conf = &srv->srv_conf; /* Check if the new server already exists. */ if (server_match(srv, 1) != NULL) { yyerror("server \"%s\" defined twice", srv->srv_conf.name); serverconfig_free(srv_conf); free(srv); YYABORT; } if (srv->srv_conf.ss.ss_family == AF_UNSPEC) { yyerror("listen address not specified"); serverconfig_free(srv_conf); free(srv); YYERROR; } if ((s = server_match(srv, 0)) != NULL) { if ((s->srv_conf.flags & SRVFLAG_TLS) != (srv->srv_conf.flags & SRVFLAG_TLS)) { yyerror("server \"%s\": tls and " "non-tls on same address/port", srv->srv_conf.name); serverconfig_free(srv_conf); free(srv); YYERROR; } if (srv->srv_conf.flags & SRVFLAG_TLS && server_tls_cmp(s, srv) != 0) { yyerror("server \"%s\": tls " "configuration mismatch on same " "address/port", srv->srv_conf.name); serverconfig_free(srv_conf); free(srv); YYERROR; } } if ((srv->srv_conf.flags & SRVFLAG_TLS) && srv->srv_conf.tls_protocols == 0) { yyerror("server \"%s\": no tls protocols", srv->srv_conf.name); serverconfig_free(srv_conf); free(srv); YYERROR; } if (server_tls_load_keypair(srv) == -1) { /* Soft fail as there may be no certificate. */ log_warnx("%s:%d: server \"%s\": failed to " "load public/private keys", file->name, yylval.lineno, srv->srv_conf.name); remove_locations(srv_conf); serverconfig_free(srv_conf); srv_conf = NULL; free(srv); srv = NULL; break; } if (server_tls_load_ca(srv) == -1) { yyerror("server \"%s\": failed to load " "ca cert(s)", srv->srv_conf.name); serverconfig_free(srv_conf); free(srv); YYERROR; } if (server_tls_load_crl(srv) == -1) { yyerror("server \"%s\": failed to load crl(s)", srv->srv_conf.name); serverconfig_free(srv_conf); free(srv); YYERROR; } if (server_tls_load_ocsp(srv) == -1) { yyerror("server \"%s\": failed to load " "ocsp staple", srv->srv_conf.name); serverconfig_free(srv_conf); free(srv); YYERROR; } DPRINTF("adding server \"%s[%u]\"", srv->srv_conf.name, srv->srv_conf.id); TAILQ_INSERT_TAIL(conf->sc_servers, srv, srv_entry); /* * Add aliases and additional listen addresses as * individual servers. */ TAILQ_FOREACH(a, &srv->srv_hosts, entry) { /* listen address */ if (a->ss.ss_family == AF_UNSPEC) continue; TAILQ_FOREACH(b, &srv->srv_hosts, entry) { /* alias name */ if (*b->name == '\0' || (b == &srv->srv_conf && b == a)) continue; if ((sn = server_inherit(srv, b, a)) == NULL) { serverconfig_free(srv_conf); free(srv); YYABORT; } DPRINTF("adding server \"%s[%u]\"", sn->srv_conf.name, sn->srv_conf.id); TAILQ_INSERT_TAIL(conf->sc_servers, sn, srv_entry); } } /* Remove temporary aliases */ TAILQ_FOREACH_SAFE(a, &srv->srv_hosts, entry, b) { TAILQ_REMOVE(&srv->srv_hosts, a, entry); if (a == &srv->srv_conf) continue; serverconfig_free(a); free(a); } srv = NULL; srv_conf = NULL; } ; serveropts_l : serveropts_l serveroptsl nl | serveroptsl optnl ; serveroptsl : LISTEN ON STRING opttls port { if (listen_on($3, $4, &$5) == -1) { free($3); YYERROR; } free($3); } | ALIAS optmatch STRING { struct server_config *alias; if (parentsrv != NULL) { yyerror("alias inside location"); free($3); YYERROR; } if ((alias = calloc(1, sizeof(*alias))) == NULL) fatal("out of memory"); if (strlcpy(alias->name, $3, sizeof(alias->name)) >= sizeof(alias->name)) { yyerror("server alias truncated"); free($3); free(alias); YYERROR; } free($3); if ($2) alias->flags |= SRVFLAG_SERVER_MATCH; TAILQ_INSERT_TAIL(&srv->srv_hosts, alias, entry); } | tcpip { if (parentsrv != NULL) { yyerror("tcp flags inside location"); YYERROR; } } | connection { if (parentsrv != NULL) { yyerror("connection options inside location"); YYERROR; } } | tls { struct server_config *sc; int tls_flag = 0; if (parentsrv != NULL) { yyerror("tls configuration inside location"); YYERROR; } /* Ensure that at least one server has TLS enabled. */ TAILQ_FOREACH(sc, &srv->srv_hosts, entry) { tls_flag |= (sc->flags & SRVFLAG_TLS); } if (tls_flag == 0) { yyerror("tls options without tls listener"); YYERROR; } } | request | root | directory | logformat | fastcgi | authenticate | filter | LOCATION optfound optmatch STRING { struct server *s; struct sockaddr_un *sun; if (srv->srv_conf.ss.ss_family == AF_UNSPEC) { yyerror("listen address not specified"); free($4); YYERROR; } if (parentsrv != NULL) { yyerror("location %s inside location", $4); free($4); YYERROR; } if (!loadcfg) { free($4); YYACCEPT; } if ((s = calloc(1, sizeof (*s))) == NULL) fatal("out of memory"); if (strlcpy(s->srv_conf.location, $4, sizeof(s->srv_conf.location)) >= sizeof(s->srv_conf.location)) { yyerror("server location truncated"); free($4); free(s); YYERROR; } free($4); if (strlcpy(s->srv_conf.name, srv->srv_conf.name, sizeof(s->srv_conf.name)) >= sizeof(s->srv_conf.name)) { yyerror("server name truncated"); free(s); YYERROR; } sun = (struct sockaddr_un *)&s->srv_conf.fastcgi_ss; sun->sun_family = AF_UNIX; (void)strlcpy(sun->sun_path, HTTPD_FCGI_SOCKET, sizeof(sun->sun_path)); sun->sun_len = sizeof(struct sockaddr_un); s->srv_conf.id = ++last_server_id; /* A location entry uses the parent id */ s->srv_conf.parent_id = srv->srv_conf.id; s->srv_conf.flags = SRVFLAG_LOCATION; if ($2 == 1) { s->srv_conf.flags &= ~SRVFLAG_LOCATION_NOT_FOUND; s->srv_conf.flags |= SRVFLAG_LOCATION_FOUND; } else if ($2 == -1) { s->srv_conf.flags &= ~SRVFLAG_LOCATION_FOUND; s->srv_conf.flags |= SRVFLAG_LOCATION_NOT_FOUND; } if ($3) s->srv_conf.flags |= SRVFLAG_LOCATION_MATCH; s->srv_s = -1; memcpy(&s->srv_conf.ss, &srv->srv_conf.ss, sizeof(s->srv_conf.ss)); s->srv_conf.port = srv->srv_conf.port; s->srv_conf.prefixlen = srv->srv_conf.prefixlen; s->srv_conf.tls_flags = srv->srv_conf.tls_flags; if (last_server_id == INT_MAX) { yyerror("too many servers/locations defined"); free(s); YYERROR; } parentsrv = srv; srv = s; srv_conf = &srv->srv_conf; SPLAY_INIT(&srv->srv_clients); } '{' optnl serveropts_l '}' { struct server *s = NULL; uint32_t f; f = SRVFLAG_LOCATION_FOUND | SRVFLAG_LOCATION_NOT_FOUND; TAILQ_FOREACH(s, conf->sc_servers, srv_entry) { /* Compare locations of same parent server */ if ((s->srv_conf.flags & SRVFLAG_LOCATION) && s->srv_conf.parent_id == srv_conf->parent_id && (s->srv_conf.flags & f) == (srv_conf->flags & f) && strcmp(s->srv_conf.location, srv_conf->location) == 0) break; } if (s != NULL) { yyerror("location \"%s\" defined twice", srv->srv_conf.location); serverconfig_free(srv_conf); free(srv); YYABORT; } DPRINTF("adding location \"%s\" for \"%s[%u]\"", srv->srv_conf.location, srv->srv_conf.name, srv->srv_conf.id); TAILQ_INSERT_TAIL(conf->sc_servers, srv, srv_entry); srv = parentsrv; srv_conf = &parentsrv->srv_conf; parentsrv = NULL; } | DEFAULT TYPE mediastring { srv_conf->flags |= SRVFLAG_DEFAULT_TYPE; memcpy(&srv_conf->default_type, &media, sizeof(struct media_type)); } | include | hsts { if (parentsrv != NULL) { yyerror("hsts inside location"); YYERROR; } srv->srv_conf.flags |= SRVFLAG_SERVER_HSTS; } ; optfound : /* empty */ { $$ = 0; } | FOUND { $$ = 1; } | NOT FOUND { $$ = -1; } ; hsts : HSTS '{' optnl hstsflags_l '}' | HSTS hstsflags | HSTS ; hstsflags_l : hstsflags optcommanl hstsflags_l | hstsflags optnl ; hstsflags : MAXAGE NUMBER { if ($2 < 0 || $2 > INT_MAX) { yyerror("invalid number of seconds: %lld", $2); YYERROR; } srv_conf->hsts_max_age = $2; } | SUBDOMAINS { srv->srv_conf.hsts_flags |= HSTSFLAG_SUBDOMAINS; } | PRELOAD { srv->srv_conf.hsts_flags |= HSTSFLAG_PRELOAD; } ; fastcgi : NO FCGI { srv_conf->flags &= ~SRVFLAG_FCGI; srv_conf->flags |= SRVFLAG_NO_FCGI; } | FCGI { srv_conf->flags &= ~SRVFLAG_NO_FCGI; srv_conf->flags |= SRVFLAG_FCGI; } | FCGI { srv_conf->flags &= ~SRVFLAG_NO_FCGI; srv_conf->flags |= SRVFLAG_FCGI; } '{' optnl fcgiflags_l '}' | FCGI { srv_conf->flags &= ~SRVFLAG_NO_FCGI; srv_conf->flags |= SRVFLAG_FCGI; } fcgiflags ; fcgiflags_l : fcgiflags optcommanl fcgiflags_l | fcgiflags optnl ; fcgiflags : SOCKET STRING { struct sockaddr_un *sun; sun = (struct sockaddr_un *)&srv_conf->fastcgi_ss; memset(sun, 0, sizeof(*sun)); sun->sun_family = AF_UNIX; if (strlcpy(sun->sun_path, $2, sizeof(sun->sun_path)) >= sizeof(sun->sun_path)) { yyerror("socket path too long"); free($2); YYERROR; } srv_conf->fastcgi_ss.ss_len = sizeof(struct sockaddr_un); free($2); } | SOCKET TCP STRING { if (get_fastcgi_dest(srv_conf, $3, FCGI_DEFAULT_PORT) == -1) { free($3); YYERROR; } free($3); } | SOCKET TCP STRING fcgiport { if (get_fastcgi_dest(srv_conf, $3, $4) == -1) { free($3); free($4); YYERROR; } free($3); free($4); } | PARAM STRING STRING { struct fastcgi_param *param; if ((param = calloc(1, sizeof(*param))) == NULL) fatal("out of memory"); if (strlcpy(param->name, $2, sizeof(param->name)) >= sizeof(param->name)) { yyerror("fastcgi_param name truncated"); free($2); free($3); free(param); YYERROR; } if (strlcpy(param->value, $3, sizeof(param->value)) >= sizeof(param->value)) { yyerror("fastcgi_param value truncated"); free($2); free($3); free(param); YYERROR; } free($2); free($3); DPRINTF("[%s,%s,%d]: adding param \"%s\" value \"%s\"", srv_conf->location, srv_conf->name, srv_conf->id, param->name, param->value); TAILQ_INSERT_HEAD(&srv_conf->fcgiparams, param, entry); } | STRIP NUMBER { if ($2 < 0 || $2 > INT_MAX) { yyerror("invalid fastcgi strip number"); YYERROR; } srv_conf->fcgistrip = $2; } ; connection : CONNECTION '{' optnl conflags_l '}' | CONNECTION conflags ; conflags_l : conflags optcommanl conflags_l | conflags optnl ; conflags : TIMEOUT timeout { memcpy(&srv_conf->timeout, &$2, sizeof(struct timeval)); } | REQUEST TIMEOUT timeout { memcpy(&srv_conf->requesttimeout, &$3, sizeof(struct timeval)); } | MAXIMUM REQUESTS NUMBER { srv_conf->maxrequests = $3; } | MAXIMUM REQUEST BODY NUMBER { srv_conf->maxrequestbody = $4; } ; tls : TLS '{' optnl tlsopts_l '}' | TLS tlsopts ; tlsopts_l : tlsopts optcommanl tlsopts_l | tlsopts optnl ; tlsopts : CERTIFICATE STRING { free(srv_conf->tls_cert_file); if ((srv_conf->tls_cert_file = strdup($2)) == NULL) fatal("out of memory"); free($2); } | KEY STRING { free(srv_conf->tls_key_file); if ((srv_conf->tls_key_file = strdup($2)) == NULL) fatal("out of memory"); free($2); } | OCSP STRING { free(srv_conf->tls_ocsp_staple_file); if ((srv_conf->tls_ocsp_staple_file = strdup($2)) == NULL) fatal("out of memory"); free($2); } | CIPHERS STRING { if (strlcpy(srv_conf->tls_ciphers, $2, sizeof(srv_conf->tls_ciphers)) >= sizeof(srv_conf->tls_ciphers)) { yyerror("ciphers too long"); free($2); YYERROR; } free($2); } | CLIENT CA STRING tlsclientopt { srv_conf->tls_flags |= TLSFLAG_CA; free(srv_conf->tls_ca_file); if ((srv_conf->tls_ca_file = strdup($3)) == NULL) fatal("out of memory"); free($3); } | DHE STRING { if (strlcpy(srv_conf->tls_dhe_params, $2, sizeof(srv_conf->tls_dhe_params)) >= sizeof(srv_conf->tls_dhe_params)) { yyerror("dhe too long"); free($2); YYERROR; } free($2); } | ECDHE STRING { if (strlcpy(srv_conf->tls_ecdhe_curves, $2, sizeof(srv_conf->tls_ecdhe_curves)) >= sizeof(srv_conf->tls_ecdhe_curves)) { yyerror("ecdhe too long"); free($2); YYERROR; } free($2); } | PROTOCOLS STRING { if (tls_config_parse_protocols( &srv_conf->tls_protocols, $2) != 0) { yyerror("invalid tls protocols"); free($2); YYERROR; } free($2); } | TICKET LIFETIME DEFAULT { srv_conf->tls_ticket_lifetime = SERVER_DEF_TLS_LIFETIME; } | TICKET LIFETIME NUMBER { if ($3 != 0 && $3 < SERVER_MIN_TLS_LIFETIME) { yyerror("ticket lifetime too small"); YYERROR; } if ($3 > SERVER_MAX_TLS_LIFETIME) { yyerror("ticket lifetime too large"); YYERROR; } srv_conf->tls_ticket_lifetime = $3; } | NO TICKET { srv_conf->tls_ticket_lifetime = 0; } ; tlsclientopt : /* empty */ | tlsclientopt CRL STRING { srv_conf->tls_flags = TLSFLAG_CRL; free(srv_conf->tls_crl_file); if ((srv_conf->tls_crl_file = strdup($3)) == NULL) fatal("out of memory"); free($3); } | tlsclientopt OPTIONAL { srv_conf->tls_flags |= TLSFLAG_OPTIONAL; } ; root : ROOT rootflags | ROOT '{' optnl rootflags_l '}' ; rootflags_l : rootflags optcommanl rootflags_l | rootflags optnl ; rootflags : STRING { if (strlcpy(srv->srv_conf.root, $1, sizeof(srv->srv_conf.root)) >= sizeof(srv->srv_conf.root)) { yyerror("document root too long"); free($1); YYERROR; } free($1); srv->srv_conf.flags |= SRVFLAG_ROOT; } ; request : REQUEST requestflags | REQUEST '{' optnl requestflags_l '}' ; requestflags_l : requestflags optcommanl requestflags_l | requestflags optnl ; requestflags : REWRITE STRING { if (strlcpy(srv->srv_conf.path, $2, sizeof(srv->srv_conf.path)) >= sizeof(srv->srv_conf.path)) { yyerror("request path too long"); free($2); YYERROR; } free($2); srv->srv_conf.flags |= SRVFLAG_PATH_REWRITE; srv->srv_conf.flags &= ~SRVFLAG_NO_PATH_REWRITE; } | NO REWRITE { srv->srv_conf.flags |= SRVFLAG_NO_PATH_REWRITE; srv->srv_conf.flags &= ~SRVFLAG_PATH_REWRITE; } | STRIP NUMBER { if ($2 < 0 || $2 > INT_MAX) { yyerror("invalid strip number"); YYERROR; } srv->srv_conf.strip = $2; } ; authenticate : NO AUTHENTICATE { srv->srv_conf.flags |= SRVFLAG_NO_AUTH; } | AUTHENTICATE authopts { struct auth *auth; if ((auth = auth_add(conf->sc_auth, &$2)) == NULL) { yyerror("failed to add auth"); YYERROR; } if (auth->auth_id == 0) { /* New htpasswd, get new Id */ auth->auth_id = ++last_auth_id; if (last_auth_id == INT_MAX) { yyerror("too many auth ids defined"); auth_free(conf->sc_auth, auth); YYERROR; } } srv->srv_conf.auth_id = auth->auth_id; srv->srv_conf.flags |= SRVFLAG_AUTH; } ; authopts : STRING WITH STRING { if (strlcpy(srv->srv_conf.auth_realm, $1, sizeof(srv->srv_conf.auth_realm)) >= sizeof(srv->srv_conf.auth_realm)) { yyerror("basic auth realm name too long"); free($1); YYERROR; } free($1); if (strlcpy($$.auth_htpasswd, $3, sizeof($$.auth_htpasswd)) >= sizeof($$.auth_htpasswd)) { yyerror("password file name too long"); free($3); YYERROR; } free($3); } | WITH STRING { if (strlcpy($$.auth_htpasswd, $2, sizeof($$.auth_htpasswd)) >= sizeof($$.auth_htpasswd)) { yyerror("password file name too long"); free($2); YYERROR; } free($2); }; directory : DIRECTORY dirflags | DIRECTORY '{' optnl dirflags_l '}' ; dirflags_l : dirflags optcommanl dirflags_l | dirflags optnl ; dirflags : INDEX STRING { if (strlcpy(srv_conf->index, $2, sizeof(srv_conf->index)) >= sizeof(srv_conf->index)) { yyerror("index file too long"); free($2); YYERROR; } srv_conf->flags &= ~SRVFLAG_NO_INDEX; srv_conf->flags |= SRVFLAG_INDEX; free($2); } | NO INDEX { srv_conf->flags &= ~SRVFLAG_INDEX; srv_conf->flags |= SRVFLAG_NO_INDEX; } | AUTO INDEX { srv_conf->flags &= ~SRVFLAG_NO_AUTO_INDEX; srv_conf->flags |= SRVFLAG_AUTO_INDEX; } | NO AUTO INDEX { srv_conf->flags &= ~SRVFLAG_AUTO_INDEX; srv_conf->flags |= SRVFLAG_NO_AUTO_INDEX; } ; logformat : LOG logflags | LOG '{' optnl logflags_l '}' | NO LOG { srv_conf->flags &= ~SRVFLAG_LOG; srv_conf->flags |= SRVFLAG_NO_LOG; } ; logflags_l : logflags optcommanl logflags_l | logflags optnl ; logflags : STYLE logstyle | SYSLOG { srv_conf->flags &= ~SRVFLAG_NO_SYSLOG; srv_conf->flags |= SRVFLAG_SYSLOG; } | NO SYSLOG { srv_conf->flags &= ~SRVFLAG_SYSLOG; srv_conf->flags |= SRVFLAG_NO_SYSLOG; } | ACCESS STRING { if (strlcpy(srv_conf->accesslog, $2, sizeof(srv_conf->accesslog)) >= sizeof(srv_conf->accesslog)) { yyerror("access log name too long"); free($2); YYERROR; } free($2); srv_conf->flags |= SRVFLAG_ACCESS_LOG; } | ERR STRING { if (strlcpy(srv_conf->errorlog, $2, sizeof(srv_conf->errorlog)) >= sizeof(srv_conf->errorlog)) { yyerror("error log name too long"); free($2); YYERROR; } free($2); srv_conf->flags |= SRVFLAG_ERROR_LOG; } ; logstyle : COMMON { srv_conf->flags &= ~SRVFLAG_NO_LOG; srv_conf->flags |= SRVFLAG_LOG; srv_conf->logformat = LOG_FORMAT_COMMON; } | COMBINED { srv_conf->flags &= ~SRVFLAG_NO_LOG; srv_conf->flags |= SRVFLAG_LOG; srv_conf->logformat = LOG_FORMAT_COMBINED; } | CONNECTION { srv_conf->flags &= ~SRVFLAG_NO_LOG; srv_conf->flags |= SRVFLAG_LOG; srv_conf->logformat = LOG_FORMAT_CONNECTION; } | FORWARDED { srv_conf->flags &= ~SRVFLAG_NO_LOG; srv_conf->flags |= SRVFLAG_LOG; srv_conf->logformat = LOG_FORMAT_FORWARDED; } ; filter : block RETURN NUMBER optstring { if ($3 <= 0 || server_httperror_byid($3) == NULL) { yyerror("invalid return code: %lld", $3); free($4); YYERROR; } srv_conf->return_code = $3; if ($4 != NULL) { /* Only for 3xx redirection headers */ if ($3 < 300 || $3 > 399) { yyerror("invalid return code for " "location URI"); free($4); YYERROR; } srv_conf->return_uri = $4; srv_conf->return_uri_len = strlen($4) + 1; } } | block DROP { /* No return code, silently drop the connection */ srv_conf->return_code = 0; } | block { /* Forbidden */ srv_conf->return_code = 403; } | PASS { srv_conf->flags &= ~SRVFLAG_BLOCK; srv_conf->flags |= SRVFLAG_NO_BLOCK; } ; block : BLOCK { srv_conf->flags &= ~SRVFLAG_NO_BLOCK; srv_conf->flags |= SRVFLAG_BLOCK; } ; optmatch : /* empty */ { $$ = 0; } | MATCH { $$ = 1; } ; optstring : /* empty */ { $$ = NULL; } | STRING { $$ = $1; } ; fcgiport : NUMBER { if ($1 <= 0 || $1 > (int)USHRT_MAX) { yyerror("invalid port: %lld", $1); YYERROR; } if (asprintf(&$$, "%lld", $1) == -1) { yyerror("out of memory"); YYERROR; } } | STRING { if (getservice($1) <= 0) { yyerror("invalid port: %s", $1); free($1); YYERROR; } $$ = $1; } ; tcpip : TCP '{' optnl tcpflags_l '}' | TCP tcpflags ; tcpflags_l : tcpflags optcommanl tcpflags_l | tcpflags optnl ; tcpflags : SACK { srv_conf->tcpflags |= TCPFLAG_SACK; } | NO SACK { srv_conf->tcpflags |= TCPFLAG_NSACK; } | NODELAY { srv_conf->tcpflags |= TCPFLAG_NODELAY; } | NO NODELAY { srv_conf->tcpflags |= TCPFLAG_NNODELAY; } | BACKLOG NUMBER { if ($2 < 0 || $2 > SERVER_MAX_CLIENTS) { yyerror("invalid backlog: %lld", $2); YYERROR; } srv_conf->tcpbacklog = $2; } | SOCKET BUFFER NUMBER { srv_conf->tcpflags |= TCPFLAG_BUFSIZ; if ((srv_conf->tcpbufsiz = $3) < 0) { yyerror("invalid socket buffer size: %lld", $3); YYERROR; } } | IP STRING NUMBER { if ($3 < 0) { yyerror("invalid ttl: %lld", $3); free($2); YYERROR; } if (strcasecmp("ttl", $2) == 0) { srv_conf->tcpflags |= TCPFLAG_IPTTL; srv_conf->tcpipttl = $3; } else if (strcasecmp("minttl", $2) == 0) { srv_conf->tcpflags |= TCPFLAG_IPMINTTL; srv_conf->tcpipminttl = $3; } else { yyerror("invalid TCP/IP flag: %s", $2); free($2); YYERROR; } free($2); } ; types : TYPES '{' optnl mediaopts_l '}' ; mediaopts_l : mediaopts_l mediaoptsl nl | mediaoptsl nl ; mediaoptsl : mediastring medianames_l optsemicolon | include ; mediastring : STRING '/' STRING { if (strlcpy(media.media_type, $1, sizeof(media.media_type)) >= sizeof(media.media_type) || strlcpy(media.media_subtype, $3, sizeof(media.media_subtype)) >= sizeof(media.media_subtype)) { yyerror("media type too long"); free($1); free($3); YYERROR; } free($1); free($3); } ; medianames_l : medianames_l medianamesl | medianamesl ; medianamesl : numberstring { if (strlcpy(media.media_name, $1, sizeof(media.media_name)) >= sizeof(media.media_name)) { yyerror("media name too long"); free($1); YYERROR; } free($1); if (!loadcfg) break; if (media_add(conf->sc_mediatypes, &media) == NULL) { yyerror("failed to add media type"); YYERROR; } } ; port : PORT NUMBER { if ($2 <= 0 || $2 > (int)USHRT_MAX) { yyerror("invalid port: %lld", $2); YYERROR; } $$.val[0] = htons($2); $$.op = 1; } | PORT STRING { int val; if ((val = getservice($2)) == -1) { yyerror("invalid port: %s", $2); free($2); YYERROR; } free($2); $$.val[0] = val; $$.op = 1; } ; timeout : NUMBER { if ($1 < 0) { yyerror("invalid timeout: %lld", $1); YYERROR; } $$.tv_sec = $1; $$.tv_usec = 0; } ; numberstring : NUMBER { char *s; if (asprintf(&s, "%lld", $1) == -1) { yyerror("asprintf: number"); YYERROR; } $$ = s; } | STRING ; optsemicolon : ';' | ; optnl : '\n' optnl | ; optcommanl : ',' optnl | nl ; nl : '\n' optnl ; %% struct keywords { const char *k_name; int k_val; }; int yyerror(const char *fmt, ...) { va_list ap; char *msg; file->errors++; va_start(ap, fmt); if (vasprintf(&msg, fmt, ap) == -1) fatalx("yyerror vasprintf"); va_end(ap); logit(LOG_CRIT, "%s:%d: %s", file->name, yylval.lineno, msg); free(msg); return (0); } int kw_cmp(const void *k, const void *e) { return (strcmp(k, ((const struct keywords *)e)->k_name)); } int lookup(char *s) { /* this has to be sorted always */ static const struct keywords keywords[] = { { "access", ACCESS }, { "alias", ALIAS }, { "authenticate", AUTHENTICATE}, { "auto", AUTO }, { "backlog", BACKLOG }, { "block", BLOCK }, { "body", BODY }, { "buffer", BUFFER }, { "ca", CA }, { "certificate", CERTIFICATE }, { "chroot", CHROOT }, { "ciphers", CIPHERS }, { "client", CLIENT }, { "combined", COMBINED }, { "common", COMMON }, { "connection", CONNECTION }, { "crl", CRL }, { "default", DEFAULT }, { "dhe", DHE }, { "directory", DIRECTORY }, { "drop", DROP }, { "ecdhe", ECDHE }, { "error", ERR }, { "fastcgi", FCGI }, { "forwarded", FORWARDED }, { "found", FOUND }, { "hsts", HSTS }, { "include", INCLUDE }, { "index", INDEX }, { "ip", IP }, { "key", KEY }, { "lifetime", LIFETIME }, { "listen", LISTEN }, { "location", LOCATION }, { "log", LOG }, { "logdir", LOGDIR }, { "match", MATCH }, { "max", MAXIMUM }, { "max-age", MAXAGE }, { "no", NO }, { "nodelay", NODELAY }, { "not", NOT }, { "ocsp", OCSP }, { "on", ON }, { "optional", OPTIONAL }, { "param", PARAM }, { "pass", PASS }, { "port", PORT }, { "prefork", PREFORK }, { "preload", PRELOAD }, { "protocols", PROTOCOLS }, { "request", REQUEST }, { "requests", REQUESTS }, { "return", RETURN }, { "rewrite", REWRITE }, { "root", ROOT }, { "sack", SACK }, { "server", SERVER }, { "socket", SOCKET }, { "strip", STRIP }, { "style", STYLE }, { "subdomains", SUBDOMAINS }, { "syslog", SYSLOG }, { "tcp", TCP }, { "ticket", TICKET }, { "timeout", TIMEOUT }, { "tls", TLS }, { "type", TYPE }, { "types", TYPES }, { "with", WITH } }; const struct keywords *p; p = bsearch(s, keywords, sizeof(keywords)/sizeof(keywords[0]), sizeof(keywords[0]), kw_cmp); if (p) return (p->k_val); else return (STRING); } #define START_EXPAND 1 #define DONE_EXPAND 2 static int expanding; int igetc(void) { int c; while (1) { if (file->ungetpos > 0) c = file->ungetbuf[--file->ungetpos]; else c = getc(file->stream); if (c == START_EXPAND) expanding = 1; else if (c == DONE_EXPAND) expanding = 0; else break; } return (c); } int lgetc(int quotec) { int c, next; if (quotec) { if ((c = igetc()) == EOF) { yyerror("reached end of file while parsing " "quoted string"); if (file == topfile || popfile() == EOF) return (EOF); return (quotec); } return (c); } while ((c = igetc()) == '\\') { next = igetc(); if (next != '\n') { c = next; break; } yylval.lineno = file->lineno; file->lineno++; } if (c == EOF) { /* * Fake EOL when hit EOF for the first time. This gets line * count right if last line in included file is syntactically * invalid and has no newline. */ if (file->eof_reached == 0) { file->eof_reached = 1; return ('\n'); } while (c == EOF) { if (file == topfile || popfile() == EOF) return (EOF); c = igetc(); } } return (c); } void lungetc(int c) { if (c == EOF) return; if (file->ungetpos >= file->ungetsize) { void *p = reallocarray(file->ungetbuf, file->ungetsize, 2); if (p == NULL) err(1, "%s", __func__); file->ungetbuf = p; file->ungetsize *= 2; } file->ungetbuf[file->ungetpos++] = c; } int findeol(void) { int c; /* skip to either EOF or the first real EOL */ while (1) { c = lgetc(0); if (c == '\n') { file->lineno++; break; } if (c == EOF) break; } return (ERROR); } int yylex(void) { unsigned char buf[8096]; unsigned char *p, *val; int quotec, next, c; int token; top: p = buf; while ((c = lgetc(0)) == ' ' || c == '\t') ; /* nothing */ yylval.lineno = file->lineno; if (c == '#') while ((c = lgetc(0)) != '\n' && c != EOF) ; /* nothing */ if (c == '$' && !expanding) { while (1) { if ((c = lgetc(0)) == EOF) return (0); if (p + 1 >= buf + sizeof(buf) - 1) { yyerror("string too long"); return (findeol()); } if (isalnum(c) || c == '_') { *p++ = c; continue; } *p = '\0'; lungetc(c); break; } val = symget(buf); if (val == NULL) { yyerror("macro '%s' not defined", buf); return (findeol()); } p = val + strlen(val) - 1; lungetc(DONE_EXPAND); while (p >= val) { lungetc(*p); p--; } lungetc(START_EXPAND); goto top; } switch (c) { case '\'': case '"': quotec = c; while (1) { if ((c = lgetc(quotec)) == EOF) return (0); if (c == '\n') { file->lineno++; continue; } else if (c == '\\') { if ((next = lgetc(quotec)) == EOF) return (0); if (next == quotec || next == ' ' || next == '\t') c = next; else if (next == '\n') { file->lineno++; continue; } else lungetc(next); } else if (c == quotec) { *p = '\0'; break; } else if (c == '\0') { yyerror("syntax error"); return (findeol()); } if (p + 1 >= buf + sizeof(buf) - 1) { yyerror("string too long"); return (findeol()); } *p++ = c; } yylval.v.string = strdup(buf); if (yylval.v.string == NULL) err(1, "%s", __func__); return (STRING); } #define allowed_to_end_number(x) \ (isspace(x) || x == ')' || x ==',' || x == '/' || x == '}' || x == '=') if (c == '-' || isdigit(c)) { do { *p++ = c; if ((size_t)(p-buf) >= sizeof(buf)) { yyerror("string too long"); return (findeol()); } } while ((c = lgetc(0)) != EOF && isdigit(c)); lungetc(c); if (p == buf + 1 && buf[0] == '-') goto nodigits; if (c == EOF || allowed_to_end_number(c)) { const char *errstr = NULL; *p = '\0'; yylval.v.number = strtonum(buf, LLONG_MIN, LLONG_MAX, &errstr); if (errstr) { yyerror("\"%s\" invalid number: %s", buf, errstr); return (findeol()); } return (NUMBER); } else { nodigits: while (p > buf + 1) lungetc(*--p); c = *--p; if (c == '-') return (c); } } #define allowed_in_string(x) \ (isalnum(x) || (ispunct(x) && x != '(' && x != ')' && \ x != '{' && x != '}' && x != '<' && x != '>' && \ x != '!' && x != '=' && x != '#' && \ x != ',' && x != ';' && x != '/')) if (isalnum(c) || c == ':' || c == '_' || c == '*') { do { *p++ = c; if ((size_t)(p-buf) >= sizeof(buf)) { yyerror("string too long"); return (findeol()); } } while ((c = lgetc(0)) != EOF && (allowed_in_string(c))); lungetc(c); *p = '\0'; if ((token = lookup(buf)) == STRING) if ((yylval.v.string = strdup(buf)) == NULL) err(1, "%s", __func__); return (token); } if (c == '\n') { yylval.lineno = file->lineno; file->lineno++; } if (c == EOF) return (0); return (c); } int check_file_secrecy(int fd, const char *fname) { struct stat st; if (fstat(fd, &st)) { log_warn("cannot stat %s", fname); return (-1); } if (st.st_uid != 0 && st.st_uid != getuid()) { log_warnx("%s: owner not root or current user", fname); return (-1); } if (st.st_mode & (S_IWGRP | S_IXGRP | S_IRWXO)) { log_warnx("%s: group writable or world read/writable", fname); return (-1); } return (0); } struct file * pushfile(const char *name, int secret) { struct file *nfile; if ((nfile = calloc(1, sizeof(struct file))) == NULL) { log_warn("%s", __func__); return (NULL); } if ((nfile->name = strdup(name)) == NULL) { log_warn("%s", __func__); free(nfile); return (NULL); } if ((nfile->stream = fopen(nfile->name, "r")) == NULL) { log_warn("%s: %s", __func__, nfile->name); free(nfile->name); free(nfile); return (NULL); } else if (secret && check_file_secrecy(fileno(nfile->stream), nfile->name)) { fclose(nfile->stream); free(nfile->name); free(nfile); return (NULL); } nfile->lineno = TAILQ_EMPTY(&files) ? 1 : 0; nfile->ungetsize = 16; nfile->ungetbuf = malloc(nfile->ungetsize); if (nfile->ungetbuf == NULL) { log_warn("%s", __func__); fclose(nfile->stream); free(nfile->name); free(nfile); return (NULL); } TAILQ_INSERT_TAIL(&files, nfile, entry); return (nfile); } int popfile(void) { struct file *prev; if ((prev = TAILQ_PREV(file, files, entry)) != NULL) prev->errors += file->errors; TAILQ_REMOVE(&files, file, entry); fclose(file->stream); free(file->name); free(file->ungetbuf); free(file); file = prev; return (file ? 0 : EOF); } int parse_config(const char *filename, struct httpd *x_conf) { struct sym *sym, *next; struct media_type dflt = HTTPD_DEFAULT_TYPE; conf = x_conf; if (config_init(conf) == -1) { log_warn("%s: cannot initialize configuration", __func__); return (-1); } /* Set default media type */ memcpy(&conf->sc_default_type, &dflt, sizeof(struct media_type)); errors = 0; if ((file = pushfile(filename, 0)) == NULL) return (-1); topfile = file; setservent(1); yyparse(); errors = file->errors; while (popfile() != EOF) ; endservent(); endprotoent(); /* Free macros */ TAILQ_FOREACH_SAFE(sym, &symhead, entry, next) { if (!sym->persist) { free(sym->nam); free(sym->val); TAILQ_REMOVE(&symhead, sym, entry); free(sym); } } return (errors ? -1 : 0); } int load_config(const char *filename, struct httpd *x_conf) { struct sym *sym, *next; struct http_mediatype mediatypes[] = MEDIA_TYPES; struct media_type m; int i; conf = x_conf; conf->sc_flags = 0; loadcfg = 1; errors = 0; last_server_id = 0; last_auth_id = 0; srv = NULL; if ((file = pushfile(filename, 0)) == NULL) return (-1); topfile = file; setservent(1); yyparse(); errors = file->errors; popfile(); endservent(); endprotoent(); /* Free macros and check which have not been used. */ for (sym = TAILQ_FIRST(&symhead); sym != NULL; sym = next) { next = TAILQ_NEXT(sym, entry); if ((conf->sc_opts & HTTPD_OPT_VERBOSE) && !sym->used) fprintf(stderr, "warning: macro '%s' not " "used\n", sym->nam); if (!sym->persist) { free(sym->nam); free(sym->val); TAILQ_REMOVE(&symhead, sym, entry); free(sym); } } if (TAILQ_EMPTY(conf->sc_servers)) { log_warnx("no actions, nothing to do"); errors++; } if (RB_EMPTY(conf->sc_mediatypes)) { /* Add default media types */ for (i = 0; mediatypes[i].media_name != NULL; i++) { (void)strlcpy(m.media_name, mediatypes[i].media_name, sizeof(m.media_name)); (void)strlcpy(m.media_type, mediatypes[i].media_type, sizeof(m.media_type)); (void)strlcpy(m.media_subtype, mediatypes[i].media_subtype, sizeof(m.media_subtype)); m.media_encoding = NULL; if (media_add(conf->sc_mediatypes, &m) == NULL) { log_warnx("failed to add default media \"%s\"", m.media_name); errors++; } } } return (errors ? -1 : 0); } int symset(const char *nam, const char *val, int persist) { struct sym *sym; TAILQ_FOREACH(sym, &symhead, entry) { if (strcmp(nam, sym->nam) == 0) break; } if (sym != NULL) { if (sym->persist == 1) return (0); else { free(sym->nam); free(sym->val); TAILQ_REMOVE(&symhead, sym, entry); free(sym); } } if ((sym = calloc(1, sizeof(*sym))) == NULL) return (-1); sym->nam = strdup(nam); if (sym->nam == NULL) { free(sym); return (-1); } sym->val = strdup(val); if (sym->val == NULL) { free(sym->nam); free(sym); return (-1); } sym->used = 0; sym->persist = persist; TAILQ_INSERT_TAIL(&symhead, sym, entry); return (0); } int cmdline_symset(char *s) { char *sym, *val; int ret; if ((val = strrchr(s, '=')) == NULL) return (-1); sym = strndup(s, val - s); if (sym == NULL) errx(1, "%s: strndup", __func__); ret = symset(sym, val + 1, 1); free(sym); return (ret); } char * symget(const char *nam) { struct sym *sym; TAILQ_FOREACH(sym, &symhead, entry) { if (strcmp(nam, sym->nam) == 0) { sym->used = 1; return (sym->val); } } return (NULL); } struct address * host_v4(const char *s) { struct in_addr ina; struct sockaddr_in *sain; struct address *h; memset(&ina, 0, sizeof(ina)); if (inet_pton(AF_INET, s, &ina) != 1) return (NULL); if ((h = calloc(1, sizeof(*h))) == NULL) fatal(__func__); sain = (struct sockaddr_in *)&h->ss; sain->sin_len = sizeof(struct sockaddr_in); sain->sin_family = AF_INET; sain->sin_addr.s_addr = ina.s_addr; if (sain->sin_addr.s_addr == INADDR_ANY) h->prefixlen = 0; /* 0.0.0.0 address */ else h->prefixlen = -1; /* host address */ return (h); } struct address * host_v6(const char *s) { struct addrinfo hints, *res; struct sockaddr_in6 *sa_in6; struct address *h = NULL; memset(&hints, 0, sizeof(hints)); hints.ai_family = AF_INET6; hints.ai_socktype = SOCK_DGRAM; /* dummy */ hints.ai_flags = AI_NUMERICHOST; if (getaddrinfo(s, "0", &hints, &res) == 0) { if ((h = calloc(1, sizeof(*h))) == NULL) fatal(__func__); sa_in6 = (struct sockaddr_in6 *)&h->ss; sa_in6->sin6_len = sizeof(struct sockaddr_in6); sa_in6->sin6_family = AF_INET6; memcpy(&sa_in6->sin6_addr, &((struct sockaddr_in6 *)res->ai_addr)->sin6_addr, sizeof(sa_in6->sin6_addr)); sa_in6->sin6_scope_id = ((struct sockaddr_in6 *)res->ai_addr)->sin6_scope_id; if (memcmp(&sa_in6->sin6_addr, &in6addr_any, sizeof(sa_in6->sin6_addr)) == 0) h->prefixlen = 0; /* any address */ else h->prefixlen = -1; /* host address */ freeaddrinfo(res); } return (h); } int host_dns(const char *s, struct addresslist *al, int max, struct portrange *port, const char *ifname, int ipproto) { struct addrinfo hints, *res0, *res; int error, cnt = 0; struct sockaddr_in *sain; struct sockaddr_in6 *sin6; struct address *h; if ((cnt = host_if(s, al, max, port, ifname, ipproto)) != 0) return (cnt); memset(&hints, 0, sizeof(hints)); hints.ai_family = PF_UNSPEC; hints.ai_socktype = SOCK_DGRAM; /* DUMMY */ hints.ai_flags = AI_ADDRCONFIG; error = getaddrinfo(s, NULL, &hints, &res0); if (error == EAI_AGAIN || error == EAI_NODATA || error == EAI_NONAME) return (0); if (error) { log_warnx("%s: could not parse \"%s\": %s", __func__, s, gai_strerror(error)); return (-1); } for (res = res0; res && cnt < max; res = res->ai_next) { if (res->ai_family != AF_INET && res->ai_family != AF_INET6) continue; if ((h = calloc(1, sizeof(*h))) == NULL) fatal(__func__); if (port != NULL) memcpy(&h->port, port, sizeof(h->port)); if (ifname != NULL) { if (strlcpy(h->ifname, ifname, sizeof(h->ifname)) >= sizeof(h->ifname)) log_warnx("%s: interface name truncated", __func__); freeaddrinfo(res0); free(h); return (-1); } if (ipproto != -1) h->ipproto = ipproto; h->ss.ss_family = res->ai_family; h->prefixlen = -1; /* host address */ if (res->ai_family == AF_INET) { sain = (struct sockaddr_in *)&h->ss; sain->sin_len = sizeof(struct sockaddr_in); sain->sin_addr.s_addr = ((struct sockaddr_in *) res->ai_addr)->sin_addr.s_addr; } else { sin6 = (struct sockaddr_in6 *)&h->ss; sin6->sin6_len = sizeof(struct sockaddr_in6); memcpy(&sin6->sin6_addr, &((struct sockaddr_in6 *) res->ai_addr)->sin6_addr, sizeof(struct in6_addr)); } TAILQ_INSERT_HEAD(al, h, entry); cnt++; } if (cnt == max && res) { log_warnx("%s: %s resolves to more than %d hosts", __func__, s, max); } freeaddrinfo(res0); return (cnt); } int host_if(const char *s, struct addresslist *al, int max, struct portrange *port, const char *ifname, int ipproto) { struct ifaddrs *ifap, *p; struct sockaddr_in *sain; struct sockaddr_in6 *sin6; struct address *h; int cnt = 0, af; if (getifaddrs(&ifap) == -1) fatal("getifaddrs"); /* First search for IPv4 addresses */ af = AF_INET; nextaf: for (p = ifap; p != NULL && cnt < max; p = p->ifa_next) { if (p->ifa_addr == NULL || p->ifa_addr->sa_family != af || (strcmp(s, p->ifa_name) != 0 && !is_if_in_group(p->ifa_name, s))) continue; if ((h = calloc(1, sizeof(*h))) == NULL) fatal("calloc"); if (port != NULL) memcpy(&h->port, port, sizeof(h->port)); if (ifname != NULL) { if (strlcpy(h->ifname, ifname, sizeof(h->ifname)) >= sizeof(h->ifname)) log_warnx("%s: interface name truncated", __func__); freeifaddrs(ifap); free(h); return (-1); } if (ipproto != -1) h->ipproto = ipproto; h->ss.ss_family = af; h->prefixlen = -1; /* host address */ if (af == AF_INET) { sain = (struct sockaddr_in *)&h->ss; sain->sin_len = sizeof(struct sockaddr_in); sain->sin_addr.s_addr = ((struct sockaddr_in *) p->ifa_addr)->sin_addr.s_addr; } else { sin6 = (struct sockaddr_in6 *)&h->ss; sin6->sin6_len = sizeof(struct sockaddr_in6); memcpy(&sin6->sin6_addr, &((struct sockaddr_in6 *) p->ifa_addr)->sin6_addr, sizeof(struct in6_addr)); sin6->sin6_scope_id = ((struct sockaddr_in6 *) p->ifa_addr)->sin6_scope_id; } TAILQ_INSERT_HEAD(al, h, entry); cnt++; } if (af == AF_INET) { /* Next search for IPv6 addresses */ af = AF_INET6; goto nextaf; } if (cnt > max) { log_warnx("%s: %s resolves to more than %d hosts", __func__, s, max); } freeifaddrs(ifap); return (cnt); } int host(const char *s, struct addresslist *al, int max, struct portrange *port, const char *ifname, int ipproto) { struct address *h; h = host_v4(s); /* IPv6 address? */ if (h == NULL) h = host_v6(s); if (h != NULL) { if (port != NULL) memcpy(&h->port, port, sizeof(h->port)); if (ifname != NULL) { if (strlcpy(h->ifname, ifname, sizeof(h->ifname)) >= sizeof(h->ifname)) { log_warnx("%s: interface name truncated", __func__); free(h); return (-1); } } if (ipproto != -1) h->ipproto = ipproto; TAILQ_INSERT_HEAD(al, h, entry); return (1); } return (host_dns(s, al, max, port, ifname, ipproto)); } struct server * server_inherit(struct server *src, struct server_config *alias, struct server_config *addr) { struct server *dst, *s, *dstl; if ((dst = calloc(1, sizeof(*dst))) == NULL) fatal("out of memory"); /* Copy the source server and assign a new Id */ memcpy(&dst->srv_conf, &src->srv_conf, sizeof(dst->srv_conf)); if ((dst->srv_conf.tls_cert_file = strdup(src->srv_conf.tls_cert_file)) == NULL) fatal("out of memory"); if ((dst->srv_conf.tls_key_file = strdup(src->srv_conf.tls_key_file)) == NULL) fatal("out of memory"); if (src->srv_conf.tls_ocsp_staple_file != NULL) { if ((dst->srv_conf.tls_ocsp_staple_file = strdup(src->srv_conf.tls_ocsp_staple_file)) == NULL) fatal("out of memory"); } if (src->srv_conf.return_uri != NULL && (dst->srv_conf.return_uri = strdup(src->srv_conf.return_uri)) == NULL) fatal("out of memory"); dst->srv_conf.id = ++last_server_id; dst->srv_conf.parent_id = dst->srv_conf.id; dst->srv_s = -1; if (last_server_id == INT_MAX) { yyerror("too many servers defined"); serverconfig_free(&dst->srv_conf); free(dst); return (NULL); } /* Now set alias and listen address */ strlcpy(dst->srv_conf.name, alias->name, sizeof(dst->srv_conf.name)); memcpy(&dst->srv_conf.ss, &addr->ss, sizeof(dst->srv_conf.ss)); dst->srv_conf.port = addr->port; dst->srv_conf.prefixlen = addr->prefixlen; if (addr->flags & SRVFLAG_TLS) dst->srv_conf.flags |= SRVFLAG_TLS; else dst->srv_conf.flags &= ~SRVFLAG_TLS; /* Don't inherit the "match" option, use it from the alias */ dst->srv_conf.flags &= ~SRVFLAG_SERVER_MATCH; dst->srv_conf.flags |= (alias->flags & SRVFLAG_SERVER_MATCH); if (server_tls_load_keypair(dst) == -1) log_warnx("%s:%d: server \"%s\": failed to " "load public/private keys", file->name, yylval.lineno, dst->srv_conf.name); if (server_tls_load_ca(dst) == -1) { yyerror("failed to load ca cert(s) for server %s", dst->srv_conf.name); serverconfig_free(&dst->srv_conf); return NULL; } if (server_tls_load_crl(dst) == -1) { yyerror("failed to load crl(s) for server %s", dst->srv_conf.name); serverconfig_free(&dst->srv_conf); free(dst); return NULL; } if (server_tls_load_ocsp(dst) == -1) { yyerror("failed to load ocsp staple " "for server %s", dst->srv_conf.name); serverconfig_free(&dst->srv_conf); free(dst); return (NULL); } /* Check if the new server already exists */ if (server_match(dst, 1) != NULL) { yyerror("server \"%s\" defined twice", dst->srv_conf.name); serverconfig_free(&dst->srv_conf); free(dst); return (NULL); } /* Copy all the locations of the source server */ TAILQ_FOREACH(s, conf->sc_servers, srv_entry) { if (!(s->srv_conf.flags & SRVFLAG_LOCATION && s->srv_conf.parent_id == src->srv_conf.parent_id)) continue; if ((dstl = calloc(1, sizeof(*dstl))) == NULL) fatal("out of memory"); memcpy(&dstl->srv_conf, &s->srv_conf, sizeof(dstl->srv_conf)); strlcpy(dstl->srv_conf.name, alias->name, sizeof(dstl->srv_conf.name)); /* Copy the new Id and listen address */ dstl->srv_conf.id = ++last_server_id; dstl->srv_conf.parent_id = dst->srv_conf.id; memcpy(&dstl->srv_conf.ss, &addr->ss, sizeof(dstl->srv_conf.ss)); dstl->srv_conf.port = addr->port; dstl->srv_conf.prefixlen = addr->prefixlen; dstl->srv_s = -1; DPRINTF("adding location \"%s\" for \"%s[%u]\"", dstl->srv_conf.location, dstl->srv_conf.name, dstl->srv_conf.id); TAILQ_INSERT_TAIL(conf->sc_servers, dstl, srv_entry); } return (dst); } int listen_on(const char *addr, int tls, struct portrange *port) { struct addresslist al; struct address *h; struct server_config *s_conf, *alias = NULL; if (parentsrv != NULL) { yyerror("listen %s inside location", addr); return (-1); } TAILQ_INIT(&al); if (strcmp("*", addr) == 0) { if (host("0.0.0.0", &al, 1, port, NULL, -1) <= 0) { yyerror("invalid listen ip: %s", "0.0.0.0"); return (-1); } if (host("::", &al, 1, port, NULL, -1) <= 0) { yyerror("invalid listen ip: %s", "::"); return (-1); } } else { if (host(addr, &al, HTTPD_MAX_ALIAS_IP, port, NULL, -1) <= 0) { yyerror("invalid listen ip: %s", addr); return (-1); } } while ((h = TAILQ_FIRST(&al)) != NULL) { if (srv->srv_conf.ss.ss_family != AF_UNSPEC) { if ((alias = calloc(1, sizeof(*alias))) == NULL) fatal("out of memory"); /* Add as an IP-based alias. */ s_conf = alias; } else s_conf = &srv->srv_conf; memcpy(&s_conf->ss, &h->ss, sizeof(s_conf->ss)); s_conf->prefixlen = h->prefixlen; /* Set the default port to 80 or 443 */ if (!h->port.op) s_conf->port = htons(tls ? HTTPS_PORT : HTTP_PORT); else s_conf->port = h->port.val[0]; if (tls) s_conf->flags |= SRVFLAG_TLS; if (alias != NULL) { /* * IP-based; use name match flags from * parent */ alias->flags &= ~SRVFLAG_SERVER_MATCH; alias->flags |= srv->srv_conf.flags & SRVFLAG_SERVER_MATCH; TAILQ_INSERT_TAIL(&srv->srv_hosts, alias, entry); } TAILQ_REMOVE(&al, h, entry); free(h); } return (0); } int getservice(char *n) { struct servent *s; const char *errstr; long long llval; llval = strtonum(n, 0, UINT16_MAX, &errstr); if (errstr) { s = getservbyname(n, "tcp"); if (s == NULL) s = getservbyname(n, "udp"); if (s == NULL) return (-1); return (s->s_port); } return (htons((unsigned short)llval)); } int is_if_in_group(const char *ifname, const char *groupname) { unsigned int len; struct ifgroupreq ifgr; struct ifg_req *ifg; int s; int ret = 0; if ((s = socket(AF_INET, SOCK_DGRAM, 0)) == -1) err(1, "socket"); memset(&ifgr, 0, sizeof(ifgr)); if (strlcpy(ifgr.ifgr_name, ifname, IFNAMSIZ) >= IFNAMSIZ) err(1, "IFNAMSIZ"); if (ioctl(s, SIOCGIFGROUP, (caddr_t)&ifgr) == -1) { if (errno == EINVAL || errno == ENOTTY) goto end; err(1, "SIOCGIFGROUP"); } len = ifgr.ifgr_len; ifgr.ifgr_groups = calloc(len / sizeof(struct ifg_req), sizeof(struct ifg_req)); if (ifgr.ifgr_groups == NULL) err(1, "getifgroups"); if (ioctl(s, SIOCGIFGROUP, (caddr_t)&ifgr) == -1) err(1, "SIOCGIFGROUP"); ifg = ifgr.ifgr_groups; for (; ifg && len >= sizeof(struct ifg_req); ifg++) { len -= sizeof(struct ifg_req); if (strcmp(ifg->ifgrq_group, groupname) == 0) { ret = 1; break; } } free(ifgr.ifgr_groups); end: close(s); return (ret); } int get_fastcgi_dest(struct server_config *xsrv_conf, const char *node, char *port) { struct addrinfo hints, *res; int s; memset(&hints, 0, sizeof(hints)); hints.ai_family = AF_UNSPEC; hints.ai_socktype = SOCK_STREAM; if ((s = getaddrinfo(node, port, &hints, &res)) != 0) { yyerror("getaddrinfo: %s\n", gai_strerror(s)); return -1; } memset(&(xsrv_conf)->fastcgi_ss, 0, sizeof(xsrv_conf->fastcgi_ss)); memcpy(&(xsrv_conf)->fastcgi_ss, res->ai_addr, res->ai_addrlen); freeaddrinfo(res); return (0); } void remove_locations(struct server_config *xsrv_conf) { struct server *s, *next; TAILQ_FOREACH_SAFE(s, conf->sc_servers, srv_entry, next) { if (!(s->srv_conf.flags & SRVFLAG_LOCATION && s->srv_conf.parent_id == xsrv_conf->parent_id)) continue; TAILQ_REMOVE(conf->sc_servers, s, srv_entry); serverconfig_free(&s->srv_conf); free(s); } }