2014-07-09 01:54:50 +02:00
|
|
|
/*
|
|
|
|
* common.c: common functionality
|
|
|
|
*
|
2015-05-01 23:41:22 +02:00
|
|
|
* Copyright (c) 2014 - 2015, Přemysl Janouch <p.janouch@gmail.com>
|
2014-07-09 01:54:50 +02:00
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and/or distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice appear in all copies.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
|
|
|
|
* SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
|
|
|
|
* OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
|
|
|
|
* CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2015-02-28 20:07:37 +01:00
|
|
|
#define LIBERTY_WANT_SSL
|
|
|
|
#define LIBERTY_WANT_POLLER
|
2015-03-29 03:46:13 +02:00
|
|
|
#define LIBERTY_WANT_PROTO_IRC
|
2014-07-09 01:54:50 +02:00
|
|
|
|
2015-04-11 21:12:56 +02:00
|
|
|
#ifdef WANT_SYSLOG_LOGGING
|
|
|
|
#define print_fatal_data ((void *) LOG_ERR)
|
|
|
|
#define print_error_data ((void *) LOG_ERR)
|
|
|
|
#define print_warning_data ((void *) LOG_WARNING)
|
|
|
|
#define print_status_data ((void *) LOG_INFO)
|
|
|
|
#define print_debug_data ((void *) LOG_DEBUG)
|
|
|
|
#endif // WANT_SYSLOG_LOGGING
|
2014-07-09 01:54:50 +02:00
|
|
|
|
2015-02-28 20:07:37 +01:00
|
|
|
#include "liberty/liberty.c"
|
2015-05-01 15:24:42 +02:00
|
|
|
#include <setjmp.h>
|
2015-05-01 20:58:46 +02:00
|
|
|
#include <inttypes.h>
|
2015-04-11 21:09:06 +02:00
|
|
|
#include <arpa/inet.h>
|
2015-11-22 02:12:52 +01:00
|
|
|
#include <netinet/tcp.h>
|
2014-07-09 01:54:50 +02:00
|
|
|
|
2015-05-02 03:43:29 +02:00
|
|
|
/// Shorthand to set an error and return failure from the function
|
|
|
|
#define FAIL(...) \
|
|
|
|
BLOCK_START \
|
|
|
|
error_set (e, __VA_ARGS__); \
|
2015-11-19 14:23:10 +01:00
|
|
|
return 0; \
|
2015-05-02 03:43:29 +02:00
|
|
|
BLOCK_END
|
|
|
|
|
2015-11-21 15:15:49 +01:00
|
|
|
#define CONTAINER_OF(pointer, type, member) \
|
|
|
|
(type *) ((char *) pointer - offsetof (type, member))
|
|
|
|
|
2015-05-08 23:29:09 +02:00
|
|
|
// --- To be moved to liberty --------------------------------------------------
|
|
|
|
|
|
|
|
static void
|
2015-11-15 15:56:10 +01:00
|
|
|
split_str (const char *s, const char *delimiters, struct str_vector *out)
|
2015-05-08 23:29:09 +02:00
|
|
|
{
|
|
|
|
const char *begin = s, *end;
|
2015-11-15 15:56:10 +01:00
|
|
|
while ((end = strpbrk (begin, delimiters)))
|
2015-05-08 23:29:09 +02:00
|
|
|
{
|
|
|
|
str_vector_add_owned (out, xstrndup (begin, end - begin));
|
|
|
|
begin = ++end;
|
|
|
|
}
|
|
|
|
str_vector_add (out, begin);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t
|
|
|
|
str_vector_find (const struct str_vector *v, const char *s)
|
|
|
|
{
|
|
|
|
for (size_t i = 0; i < v->len; i++)
|
|
|
|
if (!strcmp (v->vector[i], s))
|
|
|
|
return i;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-02-28 20:07:37 +01:00
|
|
|
// --- Logging -----------------------------------------------------------------
|
2014-07-13 04:30:23 +02:00
|
|
|
|
|
|
|
static void
|
2015-02-28 20:07:37 +01:00
|
|
|
log_message_syslog (void *user_data, const char *quote, const char *fmt,
|
|
|
|
va_list ap)
|
2014-07-13 04:30:23 +02:00
|
|
|
{
|
2015-02-28 20:07:37 +01:00
|
|
|
int prio = (int) (intptr_t) user_data;
|
2014-07-13 04:30:23 +02:00
|
|
|
|
2015-02-28 20:07:37 +01:00
|
|
|
va_list va;
|
|
|
|
va_copy (va, ap);
|
|
|
|
int size = vsnprintf (NULL, 0, fmt, va);
|
|
|
|
va_end (va);
|
|
|
|
if (size < 0)
|
|
|
|
return;
|
2014-07-13 04:30:23 +02:00
|
|
|
|
2015-02-28 20:07:37 +01:00
|
|
|
char buf[size + 1];
|
|
|
|
if (vsnprintf (buf, sizeof buf, fmt, ap) >= 0)
|
|
|
|
syslog (prio, "%s%s", quote, buf);
|
2014-07-13 04:30:23 +02:00
|
|
|
}
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
// --- SOCKS 5/4a --------------------------------------------------------------
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
// Asynchronous SOCKS connector. Adds more stuff on top of the regular one.
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
// Note that the `username' is used differently in SOCKS 4a and 5. In the
|
|
|
|
// former version, it is the username that you can get ident'ed against.
|
|
|
|
// In the latter version, it forms a pair with the password field and doesn't
|
|
|
|
// need to be an actual user on your machine.
|
2015-04-11 21:09:06 +02:00
|
|
|
|
|
|
|
struct socks_addr
|
|
|
|
{
|
|
|
|
enum socks_addr_type
|
|
|
|
{
|
|
|
|
SOCKS_IPV4 = 1, ///< IPv4 address
|
|
|
|
SOCKS_DOMAIN = 3, ///< Domain name to be resolved
|
|
|
|
SOCKS_IPV6 = 4 ///< IPv6 address
|
|
|
|
}
|
|
|
|
type; ///< The type of this address
|
|
|
|
union
|
|
|
|
{
|
|
|
|
uint8_t ipv4[4]; ///< IPv4 address, network octet order
|
2015-07-20 23:31:26 +02:00
|
|
|
char *domain; ///< Domain name
|
2015-04-11 21:09:06 +02:00
|
|
|
uint8_t ipv6[16]; ///< IPv6 address, network octet order
|
|
|
|
}
|
|
|
|
data; ///< The address itself
|
|
|
|
};
|
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
static void
|
|
|
|
socks_addr_free (struct socks_addr *self)
|
|
|
|
{
|
|
|
|
if (self->type == SOCKS_DOMAIN)
|
|
|
|
free (self->data.domain);
|
|
|
|
}
|
|
|
|
|
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
struct socks_target
|
2015-04-11 21:09:06 +02:00
|
|
|
{
|
2015-07-20 23:31:26 +02:00
|
|
|
LIST_HEADER (struct socks_target)
|
|
|
|
|
2015-07-23 04:17:15 +02:00
|
|
|
char *address_str; ///< Target address as a string
|
2015-04-11 21:09:06 +02:00
|
|
|
struct socks_addr address; ///< Target address
|
2015-07-20 23:31:26 +02:00
|
|
|
uint16_t port; ///< Target service port
|
|
|
|
};
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
enum socks_protocol
|
|
|
|
{
|
|
|
|
SOCKS_5, ///< SOCKS5
|
|
|
|
SOCKS_4A, ///< SOCKS4A
|
|
|
|
SOCKS_MAX ///< End of protocol
|
|
|
|
};
|
|
|
|
|
2015-07-23 04:22:56 +02:00
|
|
|
static inline const char *
|
|
|
|
socks_protocol_to_string (enum socks_protocol self)
|
|
|
|
{
|
|
|
|
switch (self)
|
|
|
|
{
|
|
|
|
case SOCKS_5: return "SOCKS5";
|
|
|
|
case SOCKS_4A: return "SOCKS4A";
|
|
|
|
default: return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
struct socks_connector
|
|
|
|
{
|
|
|
|
struct connector *connector; ///< Proxy server iterator (effectively)
|
|
|
|
enum socks_protocol protocol_iter; ///< Protocol iterator
|
|
|
|
struct socks_target *targets_iter; ///< Targets iterator
|
|
|
|
|
|
|
|
// Negotiation:
|
|
|
|
|
2015-07-22 00:34:27 +02:00
|
|
|
struct poller_timer timeout; ///< Timeout timer
|
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
int socket_fd; ///< Current socket file descriptor
|
|
|
|
struct poller_fd socket_event; ///< Socket can be read from/written to
|
|
|
|
struct str read_buffer; ///< Read buffer
|
|
|
|
struct str write_buffer; ///< Write buffer
|
|
|
|
|
2015-07-22 00:34:27 +02:00
|
|
|
bool done; ///< Tunnel succesfully established
|
2015-07-20 23:31:26 +02:00
|
|
|
uint8_t bound_address_len; ///< Length of domain name
|
2015-07-22 00:34:27 +02:00
|
|
|
size_t data_needed; ///< How much data "on_data" needs
|
2015-07-20 23:31:26 +02:00
|
|
|
|
|
|
|
/// Process incoming data if there's enough of it available
|
2015-07-21 23:56:05 +02:00
|
|
|
bool (*on_data) (struct socks_connector *, struct msg_unpacker *);
|
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
// Configuration:
|
|
|
|
|
2015-07-23 04:07:30 +02:00
|
|
|
char *hostname; ///< SOCKS server hostname
|
|
|
|
char *service; ///< SOCKS server service name or port
|
2015-07-20 23:31:26 +02:00
|
|
|
|
2015-07-23 04:07:30 +02:00
|
|
|
char *username; ///< Username for authentication
|
|
|
|
char *password; ///< Password for authentication
|
2015-07-20 23:31:26 +02:00
|
|
|
|
|
|
|
struct socks_target *targets; ///< Targets
|
|
|
|
struct socks_target *targets_tail; ///< Tail of targets
|
|
|
|
|
|
|
|
void *user_data; ///< User data for callbacks
|
|
|
|
|
2015-07-22 00:34:27 +02:00
|
|
|
// Additional results:
|
|
|
|
|
|
|
|
struct socks_addr bound_address; ///< Bound address at the server
|
|
|
|
uint16_t bound_port; ///< Bound port at the server
|
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
// You may destroy the connector object in these two main callbacks:
|
|
|
|
|
|
|
|
/// Connection has been successfully established
|
|
|
|
void (*on_connected) (void *user_data, int socket);
|
|
|
|
/// Failed to establish a connection to either target
|
|
|
|
void (*on_failure) (void *user_data);
|
|
|
|
|
|
|
|
// Optional:
|
|
|
|
|
|
|
|
/// Connecting to a new address
|
|
|
|
void (*on_connecting) (void *user_data,
|
|
|
|
const char *address, const char *via, const char *version);
|
|
|
|
/// Connecting to the last address has failed
|
|
|
|
void (*on_error) (void *user_data, const char *error);
|
2015-04-11 21:09:06 +02:00
|
|
|
};
|
|
|
|
|
2015-07-22 00:34:27 +02:00
|
|
|
// I've tried to make the actual protocol handlers as simple as possible
|
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
#define SOCKS_FAIL(...) \
|
|
|
|
BLOCK_START \
|
|
|
|
char *error = xstrdup_printf (__VA_ARGS__); \
|
|
|
|
if (self->on_error) \
|
|
|
|
self->on_error (self->user_data, error); \
|
|
|
|
free (error); \
|
|
|
|
return false; \
|
|
|
|
BLOCK_END
|
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
#define SOCKS_DATA_CB(name) static bool name \
|
|
|
|
(struct socks_connector *self, struct msg_unpacker *unpacker)
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-22 00:11:20 +02:00
|
|
|
#define SOCKS_GO(name, data_needed_) \
|
|
|
|
self->on_data = name; \
|
|
|
|
self->data_needed = data_needed_; \
|
|
|
|
return true
|
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
SOCKS_DATA_CB (socks_4a_finish)
|
2015-04-11 21:09:06 +02:00
|
|
|
{
|
2015-07-20 23:31:26 +02:00
|
|
|
uint8_t null, status;
|
2015-07-21 23:56:05 +02:00
|
|
|
hard_assert (msg_unpacker_u8 (unpacker, &null));
|
|
|
|
hard_assert (msg_unpacker_u8 (unpacker, &status));
|
2015-07-20 23:31:26 +02:00
|
|
|
|
|
|
|
if (null != 0)
|
|
|
|
SOCKS_FAIL ("protocol error");
|
|
|
|
|
|
|
|
switch (status)
|
|
|
|
{
|
|
|
|
case 90:
|
2015-07-21 00:31:19 +02:00
|
|
|
self->done = true;
|
|
|
|
return false;
|
2015-07-20 23:31:26 +02:00
|
|
|
case 91:
|
|
|
|
SOCKS_FAIL ("request rejected or failed");
|
|
|
|
case 92:
|
|
|
|
SOCKS_FAIL ("%s: %s", "request rejected",
|
|
|
|
"SOCKS server cannot connect to identd on the client");
|
|
|
|
case 93:
|
|
|
|
SOCKS_FAIL ("%s: %s", "request rejected",
|
|
|
|
"identd reports different user-id");
|
|
|
|
default:
|
|
|
|
SOCKS_FAIL ("protocol error");
|
|
|
|
}
|
|
|
|
}
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
static bool
|
|
|
|
socks_4a_start (struct socks_connector *self)
|
|
|
|
{
|
|
|
|
struct socks_target *target = self->targets_iter;
|
2015-04-11 21:09:06 +02:00
|
|
|
const void *dest_ipv4 = "\x00\x00\x00\x01";
|
|
|
|
const char *dest_domain = NULL;
|
|
|
|
|
|
|
|
char buf[INET6_ADDRSTRLEN];
|
2015-07-20 23:31:26 +02:00
|
|
|
switch (target->address.type)
|
2015-04-11 21:09:06 +02:00
|
|
|
{
|
|
|
|
case SOCKS_IPV4:
|
2015-07-20 23:31:26 +02:00
|
|
|
dest_ipv4 = target->address.data.ipv4;
|
2015-04-11 21:09:06 +02:00
|
|
|
break;
|
|
|
|
case SOCKS_IPV6:
|
|
|
|
// About the best thing we can do, not sure if it works anywhere at all
|
2015-07-20 23:31:26 +02:00
|
|
|
if (!inet_ntop (AF_INET6, &target->address.data.ipv6, buf, sizeof buf))
|
2015-04-11 21:09:06 +02:00
|
|
|
SOCKS_FAIL ("%s: %s", "inet_ntop", strerror (errno));
|
|
|
|
dest_domain = buf;
|
|
|
|
break;
|
|
|
|
case SOCKS_DOMAIN:
|
2015-07-20 23:31:26 +02:00
|
|
|
dest_domain = target->address.data.domain;
|
2015-04-11 21:09:06 +02:00
|
|
|
}
|
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
struct str *wb = &self->write_buffer;
|
|
|
|
str_init (wb);
|
2015-08-06 21:32:01 +02:00
|
|
|
str_pack_u8 (wb, 4); // version
|
|
|
|
str_pack_u8 (wb, 1); // connect
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-08-06 21:32:01 +02:00
|
|
|
str_pack_u16 (wb, target->port); // port
|
|
|
|
str_append_data (wb, dest_ipv4, 4); // destination address
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
if (self->username)
|
|
|
|
str_append (wb, self->username);
|
|
|
|
str_append_c (wb, '\0');
|
2015-04-11 21:09:06 +02:00
|
|
|
|
|
|
|
if (dest_domain)
|
|
|
|
{
|
2015-07-20 23:31:26 +02:00
|
|
|
str_append (wb, dest_domain);
|
|
|
|
str_append_c (wb, '\0');
|
2015-04-11 21:09:06 +02:00
|
|
|
}
|
|
|
|
|
2015-07-22 00:11:20 +02:00
|
|
|
SOCKS_GO (socks_4a_finish, 8);
|
2015-07-20 23:31:26 +02:00
|
|
|
}
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
SOCKS_DATA_CB (socks_5_request_port)
|
2015-07-20 23:31:26 +02:00
|
|
|
{
|
2015-07-21 23:56:05 +02:00
|
|
|
hard_assert (msg_unpacker_u16 (unpacker, &self->bound_port));
|
2015-07-21 00:31:19 +02:00
|
|
|
self->done = true;
|
|
|
|
return false;
|
2015-04-11 21:09:06 +02:00
|
|
|
}
|
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
SOCKS_DATA_CB (socks_5_request_ipv4)
|
2015-07-20 23:31:26 +02:00
|
|
|
{
|
2015-07-22 00:11:20 +02:00
|
|
|
memcpy (self->bound_address.data.ipv4, unpacker->data, unpacker->len);
|
|
|
|
SOCKS_GO (socks_5_request_port, 2);
|
2015-07-20 23:31:26 +02:00
|
|
|
}
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
SOCKS_DATA_CB (socks_5_request_ipv6)
|
2015-04-11 21:09:06 +02:00
|
|
|
{
|
2015-07-22 00:11:20 +02:00
|
|
|
memcpy (self->bound_address.data.ipv6, unpacker->data, unpacker->len);
|
|
|
|
SOCKS_GO (socks_5_request_port, 2);
|
2015-07-20 23:31:26 +02:00
|
|
|
}
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
SOCKS_DATA_CB (socks_5_request_domain_data)
|
2015-07-20 23:31:26 +02:00
|
|
|
{
|
2015-07-22 00:11:20 +02:00
|
|
|
self->bound_address.data.domain = xstrndup (unpacker->data, unpacker->len);
|
|
|
|
SOCKS_GO (socks_5_request_port, 2);
|
2015-04-11 21:09:06 +02:00
|
|
|
}
|
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
SOCKS_DATA_CB (socks_5_request_domain)
|
2015-04-11 21:09:06 +02:00
|
|
|
{
|
2015-07-21 23:56:05 +02:00
|
|
|
hard_assert (msg_unpacker_u8 (unpacker, &self->bound_address_len));
|
2015-07-22 00:11:20 +02:00
|
|
|
SOCKS_GO (socks_5_request_domain_data, self->bound_address_len);
|
2015-07-20 23:31:26 +02:00
|
|
|
}
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
SOCKS_DATA_CB (socks_5_request_finish)
|
2015-07-20 23:31:26 +02:00
|
|
|
{
|
|
|
|
uint8_t version, status, reserved, type;
|
2015-07-21 23:56:05 +02:00
|
|
|
hard_assert (msg_unpacker_u8 (unpacker, &version));
|
|
|
|
hard_assert (msg_unpacker_u8 (unpacker, &status));
|
|
|
|
hard_assert (msg_unpacker_u8 (unpacker, &reserved));
|
|
|
|
hard_assert (msg_unpacker_u8 (unpacker, &type));
|
2015-07-20 23:31:26 +02:00
|
|
|
|
|
|
|
if (version != 0x05)
|
2015-04-11 21:09:06 +02:00
|
|
|
SOCKS_FAIL ("protocol error");
|
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
switch (status)
|
2015-04-11 21:09:06 +02:00
|
|
|
{
|
|
|
|
case 0x00:
|
|
|
|
break;
|
2015-07-20 23:31:26 +02:00
|
|
|
case 0x01: SOCKS_FAIL ("general SOCKS server failure");
|
|
|
|
case 0x02: SOCKS_FAIL ("connection not allowed by ruleset");
|
|
|
|
case 0x03: SOCKS_FAIL ("network unreachable");
|
|
|
|
case 0x04: SOCKS_FAIL ("host unreachable");
|
|
|
|
case 0x05: SOCKS_FAIL ("connection refused");
|
|
|
|
case 0x06: SOCKS_FAIL ("TTL expired");
|
|
|
|
case 0x07: SOCKS_FAIL ("command not supported");
|
|
|
|
case 0x08: SOCKS_FAIL ("address type not supported");
|
|
|
|
default: SOCKS_FAIL ("protocol error");
|
|
|
|
}
|
|
|
|
|
|
|
|
switch ((self->bound_address.type = type))
|
|
|
|
{
|
2015-07-21 23:56:05 +02:00
|
|
|
case SOCKS_IPV4:
|
2015-07-22 00:11:20 +02:00
|
|
|
SOCKS_GO (socks_5_request_ipv4, sizeof self->bound_address.data.ipv4);
|
2015-07-21 23:56:05 +02:00
|
|
|
case SOCKS_IPV6:
|
2015-07-22 00:11:20 +02:00
|
|
|
SOCKS_GO (socks_5_request_ipv6, sizeof self->bound_address.data.ipv6);
|
2015-07-21 23:56:05 +02:00
|
|
|
case SOCKS_DOMAIN:
|
2015-07-22 00:11:20 +02:00
|
|
|
SOCKS_GO (socks_5_request_domain, 1);
|
2015-07-21 23:56:05 +02:00
|
|
|
default:
|
|
|
|
SOCKS_FAIL ("protocol error");
|
2015-04-11 21:09:06 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool
|
2015-07-20 23:31:26 +02:00
|
|
|
socks_5_request_start (struct socks_connector *self)
|
2015-04-11 21:09:06 +02:00
|
|
|
{
|
2015-07-20 23:31:26 +02:00
|
|
|
struct socks_target *target = self->targets_iter;
|
|
|
|
struct str *wb = &self->write_buffer;
|
2015-08-06 21:32:01 +02:00
|
|
|
str_pack_u8 (wb, 0x05); // version
|
|
|
|
str_pack_u8 (wb, 0x01); // connect
|
|
|
|
str_pack_u8 (wb, 0x00); // reserved
|
|
|
|
str_pack_u8 (wb, target->address.type);
|
2015-07-20 23:31:26 +02:00
|
|
|
|
|
|
|
switch (target->address.type)
|
2015-04-11 21:09:06 +02:00
|
|
|
{
|
|
|
|
case SOCKS_IPV4:
|
2015-07-20 23:31:26 +02:00
|
|
|
str_append_data (wb,
|
|
|
|
target->address.data.ipv4, sizeof target->address.data.ipv4);
|
2015-04-11 21:09:06 +02:00
|
|
|
break;
|
|
|
|
case SOCKS_DOMAIN:
|
|
|
|
{
|
2015-07-20 23:31:26 +02:00
|
|
|
size_t dlen = strlen (target->address.data.domain);
|
2015-04-11 21:09:06 +02:00
|
|
|
if (dlen > 255)
|
|
|
|
dlen = 255;
|
|
|
|
|
2015-08-06 21:32:01 +02:00
|
|
|
str_pack_u8 (wb, dlen);
|
2015-07-20 23:31:26 +02:00
|
|
|
str_append_data (wb, target->address.data.domain, dlen);
|
2015-04-11 21:09:06 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case SOCKS_IPV6:
|
2015-07-20 23:31:26 +02:00
|
|
|
str_append_data (wb,
|
|
|
|
target->address.data.ipv6, sizeof target->address.data.ipv6);
|
2015-04-11 21:09:06 +02:00
|
|
|
break;
|
|
|
|
}
|
2015-08-06 21:32:01 +02:00
|
|
|
str_pack_u16 (wb, target->port);
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-22 00:11:20 +02:00
|
|
|
SOCKS_GO (socks_5_request_finish, 4);
|
2015-07-20 23:31:26 +02:00
|
|
|
}
|
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
SOCKS_DATA_CB (socks_5_userpass_finish)
|
2015-07-20 23:31:26 +02:00
|
|
|
{
|
|
|
|
uint8_t version, status;
|
2015-07-21 23:56:05 +02:00
|
|
|
hard_assert (msg_unpacker_u8 (unpacker, &version));
|
|
|
|
hard_assert (msg_unpacker_u8 (unpacker, &status));
|
2015-07-20 23:31:26 +02:00
|
|
|
|
|
|
|
if (version != 0x01)
|
|
|
|
SOCKS_FAIL ("protocol error");
|
|
|
|
if (status != 0x00)
|
|
|
|
SOCKS_FAIL ("authentication failure");
|
2015-07-22 00:11:20 +02:00
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
return socks_5_request_start (self);
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool
|
|
|
|
socks_5_userpass_start (struct socks_connector *self)
|
|
|
|
{
|
|
|
|
size_t ulen = strlen (self->username);
|
|
|
|
if (ulen > 255)
|
|
|
|
ulen = 255;
|
|
|
|
|
|
|
|
size_t plen = strlen (self->password);
|
|
|
|
if (plen > 255)
|
|
|
|
plen = 255;
|
|
|
|
|
|
|
|
struct str *wb = &self->write_buffer;
|
2015-08-06 21:32:01 +02:00
|
|
|
str_pack_u8 (wb, 0x01); // version
|
|
|
|
str_pack_u8 (wb, ulen); // username length
|
2015-07-20 23:31:26 +02:00
|
|
|
str_append_data (wb, self->username, ulen);
|
2015-08-06 21:32:01 +02:00
|
|
|
str_pack_u8 (wb, plen); // password length
|
2015-07-20 23:31:26 +02:00
|
|
|
str_append_data (wb, self->password, plen);
|
|
|
|
|
2015-07-22 00:11:20 +02:00
|
|
|
SOCKS_GO (socks_5_userpass_finish, 2);
|
2015-04-11 21:09:06 +02:00
|
|
|
}
|
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
SOCKS_DATA_CB (socks_5_auth_finish)
|
2015-04-11 21:09:06 +02:00
|
|
|
{
|
2015-07-20 23:31:26 +02:00
|
|
|
uint8_t version, method;
|
2015-07-21 23:56:05 +02:00
|
|
|
hard_assert (msg_unpacker_u8 (unpacker, &version));
|
|
|
|
hard_assert (msg_unpacker_u8 (unpacker, &method));
|
2015-07-20 23:31:26 +02:00
|
|
|
|
|
|
|
if (version != 0x05)
|
2015-04-11 21:09:06 +02:00
|
|
|
SOCKS_FAIL ("protocol error");
|
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
bool can_auth = self->username && self->password;
|
|
|
|
|
|
|
|
switch (method)
|
2015-04-11 21:09:06 +02:00
|
|
|
{
|
2015-07-20 23:31:26 +02:00
|
|
|
case 0x02:
|
|
|
|
if (!can_auth)
|
|
|
|
SOCKS_FAIL ("protocol error");
|
|
|
|
|
|
|
|
return socks_5_userpass_start (self);
|
2015-04-11 21:09:06 +02:00
|
|
|
case 0x00:
|
2015-07-20 23:31:26 +02:00
|
|
|
return socks_5_request_start (self);
|
|
|
|
case 0xFF:
|
|
|
|
SOCKS_FAIL ("no acceptable authentication methods");
|
|
|
|
default:
|
|
|
|
SOCKS_FAIL ("protocol error");
|
2015-04-11 21:09:06 +02:00
|
|
|
}
|
2015-07-20 23:31:26 +02:00
|
|
|
}
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
static bool
|
|
|
|
socks_5_auth_start (struct socks_connector *self)
|
|
|
|
{
|
|
|
|
bool can_auth = self->username && self->password;
|
|
|
|
|
|
|
|
struct str *wb = &self->write_buffer;
|
2015-08-06 21:32:01 +02:00
|
|
|
str_pack_u8 (wb, 0x05); // version
|
|
|
|
str_pack_u8 (wb, 1 + can_auth); // number of authentication methods
|
|
|
|
str_pack_u8 (wb, 0x00); // no authentication required
|
2015-07-21 00:57:16 +02:00
|
|
|
if (can_auth)
|
2015-08-06 21:32:01 +02:00
|
|
|
str_pack_u8 (wb, 0x02); // username/password
|
2015-07-20 23:31:26 +02:00
|
|
|
|
2015-07-22 00:11:20 +02:00
|
|
|
SOCKS_GO (socks_5_auth_finish, 2);
|
2015-07-20 23:31:26 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
static void socks_connector_start (struct socks_connector *self);
|
|
|
|
|
|
|
|
static void
|
2015-07-22 00:34:27 +02:00
|
|
|
socks_connector_destroy_connector (struct socks_connector *self)
|
2015-07-21 23:56:05 +02:00
|
|
|
{
|
2015-07-22 00:34:27 +02:00
|
|
|
if (self->connector)
|
|
|
|
{
|
|
|
|
connector_free (self->connector);
|
|
|
|
free (self->connector);
|
|
|
|
self->connector = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
socks_connector_cancel_events (struct socks_connector *self)
|
|
|
|
{
|
|
|
|
// Before calling the final callbacks, we should cancel events that
|
|
|
|
// could potentially fire; caller should destroy us immediately, though
|
2015-07-21 23:56:05 +02:00
|
|
|
poller_fd_reset (&self->socket_event);
|
2015-07-22 00:34:27 +02:00
|
|
|
poller_timer_reset (&self->timeout);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
socks_connector_fail (struct socks_connector *self)
|
|
|
|
{
|
|
|
|
socks_connector_cancel_events (self);
|
2015-07-21 23:56:05 +02:00
|
|
|
self->on_failure (self->user_data);
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool
|
|
|
|
socks_connector_step_iterators (struct socks_connector *self)
|
|
|
|
{
|
2015-07-22 00:34:27 +02:00
|
|
|
// At the lowest level we iterate over all addresses for the SOCKS server
|
|
|
|
// and just try to connect; this is done automatically by the connector
|
2015-07-21 23:56:05 +02:00
|
|
|
|
|
|
|
// Then we iterate over available protocols
|
|
|
|
if (++self->protocol_iter != SOCKS_MAX)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
// At the highest level we iterate over possible targets
|
|
|
|
self->protocol_iter = 0;
|
|
|
|
if (self->targets_iter && (self->targets_iter = self->targets_iter->next))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
socks_connector_step (struct socks_connector *self)
|
|
|
|
{
|
|
|
|
if (self->socket_fd != -1)
|
|
|
|
{
|
|
|
|
poller_fd_reset (&self->socket_event);
|
|
|
|
xclose (self->socket_fd);
|
|
|
|
self->socket_fd = -1;
|
|
|
|
}
|
|
|
|
|
2015-07-22 00:34:27 +02:00
|
|
|
socks_connector_destroy_connector (self);
|
2015-07-21 23:56:05 +02:00
|
|
|
if (socks_connector_step_iterators (self))
|
|
|
|
socks_connector_start (self);
|
|
|
|
else
|
|
|
|
socks_connector_fail (self);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
socks_connector_on_timeout (struct socks_connector *self)
|
|
|
|
{
|
|
|
|
if (self->on_error)
|
|
|
|
self->on_error (self->user_data, "timeout");
|
|
|
|
|
2015-07-22 00:34:27 +02:00
|
|
|
socks_connector_destroy_connector (self);
|
2015-07-21 23:56:05 +02:00
|
|
|
socks_connector_fail (self);
|
|
|
|
}
|
|
|
|
|
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
2015-07-20 23:31:26 +02:00
|
|
|
|
|
|
|
static void
|
|
|
|
socks_connector_on_connected (void *user_data, int socket_fd)
|
|
|
|
{
|
|
|
|
set_blocking (socket_fd, false);
|
|
|
|
|
|
|
|
struct socks_connector *self = user_data;
|
|
|
|
self->socket_fd = socket_fd;
|
|
|
|
self->socket_event.fd = socket_fd;
|
|
|
|
poller_fd_set (&self->socket_event, POLLIN | POLLOUT);
|
|
|
|
str_reset (&self->read_buffer);
|
|
|
|
str_reset (&self->write_buffer);
|
|
|
|
|
2015-07-22 00:34:27 +02:00
|
|
|
if (!(self->protocol_iter == SOCKS_5 && socks_5_auth_start (self))
|
|
|
|
&& !(self->protocol_iter == SOCKS_4A && socks_4a_start (self)))
|
|
|
|
socks_connector_fail (self);
|
2015-07-20 23:31:26 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
socks_connector_on_failure (void *user_data)
|
|
|
|
{
|
|
|
|
struct socks_connector *self = user_data;
|
|
|
|
// TODO: skip SOCKS server on connection failure
|
|
|
|
socks_connector_step (self);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
socks_connector_on_connecting (void *user_data, const char *via)
|
|
|
|
{
|
|
|
|
struct socks_connector *self = user_data;
|
|
|
|
if (!self->on_connecting)
|
|
|
|
return;
|
|
|
|
|
2015-07-23 04:17:15 +02:00
|
|
|
struct socks_target *target = self->targets_iter;
|
|
|
|
char *port = xstrdup_printf ("%u", target->port);
|
|
|
|
char *address = format_host_port_pair (target->address_str, port);
|
|
|
|
free (port);
|
2015-07-20 23:31:26 +02:00
|
|
|
self->on_connecting (self->user_data, address, via,
|
2015-07-23 04:22:56 +02:00
|
|
|
socks_protocol_to_string (self->protocol_iter));
|
2015-07-20 23:31:26 +02:00
|
|
|
free (address);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
socks_connector_on_error (void *user_data, const char *error)
|
|
|
|
{
|
|
|
|
struct socks_connector *self = user_data;
|
|
|
|
// TODO: skip protocol on protocol failure
|
2015-07-23 04:07:30 +02:00
|
|
|
if (self->on_error)
|
|
|
|
self->on_error (self->user_data, error);
|
2015-07-20 23:31:26 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
socks_connector_start (struct socks_connector *self)
|
|
|
|
{
|
2015-07-23 04:07:30 +02:00
|
|
|
hard_assert (!self->connector);
|
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
struct connector *connector =
|
|
|
|
self->connector = xcalloc (1, sizeof *connector);
|
|
|
|
connector_init (connector, self->socket_event.poller);
|
|
|
|
|
|
|
|
connector->user_data = self;
|
|
|
|
connector->on_connected = socks_connector_on_connected;
|
|
|
|
connector->on_connecting = socks_connector_on_connecting;
|
|
|
|
connector->on_error = socks_connector_on_error;
|
|
|
|
connector->on_failure = socks_connector_on_failure;
|
|
|
|
|
2015-07-23 04:07:30 +02:00
|
|
|
struct error *e = NULL;
|
|
|
|
if (!connector_add_target (connector, self->hostname, self->service, &e))
|
|
|
|
{
|
|
|
|
if (self->on_error)
|
|
|
|
self->on_error (self->user_data, e->message);
|
|
|
|
error_free (e);
|
|
|
|
|
|
|
|
socks_connector_destroy_connector (self);
|
|
|
|
socks_connector_fail (self);
|
|
|
|
return;
|
|
|
|
}
|
2015-07-20 23:31:26 +02:00
|
|
|
|
|
|
|
poller_timer_set (&self->timeout, 60 * 1000);
|
2015-07-22 00:34:27 +02:00
|
|
|
connector_step (connector);
|
2015-07-21 00:31:19 +02:00
|
|
|
self->done = false;
|
2015-07-22 00:34:27 +02:00
|
|
|
|
|
|
|
self->bound_port = 0;
|
|
|
|
socks_addr_free (&self->bound_address);
|
|
|
|
memset (&self->bound_address, 0, sizeof self->bound_address);
|
2015-07-20 23:31:26 +02:00
|
|
|
}
|
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
static bool
|
|
|
|
socks_try_fill_read_buffer (struct socks_connector *self, size_t n)
|
2015-07-20 23:31:26 +02:00
|
|
|
{
|
2015-07-21 23:56:05 +02:00
|
|
|
ssize_t remains = (ssize_t) n - (ssize_t) self->read_buffer.len;
|
|
|
|
if (remains <= 0)
|
|
|
|
return true;
|
2015-07-21 00:31:19 +02:00
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
ssize_t received;
|
|
|
|
str_ensure_space (&self->read_buffer, remains);
|
|
|
|
do
|
|
|
|
received = recv (self->socket_fd,
|
|
|
|
self->read_buffer.str + self->read_buffer.len, remains, 0);
|
|
|
|
while ((received == -1) && errno == EINTR);
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
if (received == 0)
|
|
|
|
SOCKS_FAIL ("%s: %s", "protocol error", "unexpected EOF");
|
|
|
|
if (received == -1 && errno != EAGAIN)
|
|
|
|
SOCKS_FAIL ("%s: %s", "recv", strerror (errno));
|
|
|
|
if (received > 0)
|
|
|
|
self->read_buffer.len += received;
|
|
|
|
return true;
|
|
|
|
}
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
static bool
|
|
|
|
socks_call_on_data (struct socks_connector *self)
|
|
|
|
{
|
|
|
|
size_t to_consume = self->data_needed;
|
|
|
|
if (!socks_try_fill_read_buffer (self, to_consume))
|
|
|
|
return false;
|
|
|
|
if (self->read_buffer.len < to_consume)
|
|
|
|
return true;
|
2015-07-20 23:31:26 +02:00
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
struct msg_unpacker unpacker;
|
|
|
|
msg_unpacker_init (&unpacker, self->read_buffer.str, self->read_buffer.len);
|
|
|
|
bool result = self->on_data (self, &unpacker);
|
|
|
|
str_remove_slice (&self->read_buffer, 0, to_consume);
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool
|
|
|
|
socks_try_flush_write_buffer (struct socks_connector *self)
|
|
|
|
{
|
|
|
|
struct str *wb = &self->write_buffer;
|
|
|
|
ssize_t n_written;
|
|
|
|
|
|
|
|
while (wb->len)
|
2015-07-20 23:31:26 +02:00
|
|
|
{
|
2015-07-21 23:56:05 +02:00
|
|
|
n_written = send (self->socket_fd, wb->str, wb->len, 0);
|
|
|
|
if (n_written >= 0)
|
|
|
|
{
|
|
|
|
str_remove_slice (wb, 0, n_written);
|
|
|
|
continue;
|
|
|
|
}
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
if (errno == EAGAIN)
|
|
|
|
break;
|
|
|
|
if (errno == EINTR)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
SOCKS_FAIL ("%s: %s", "send", strerror (errno));
|
|
|
|
}
|
|
|
|
return true;
|
2015-04-11 21:09:06 +02:00
|
|
|
}
|
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
static void
|
|
|
|
socks_connector_on_ready
|
|
|
|
(const struct pollfd *pfd, struct socks_connector *self)
|
2015-04-11 21:09:06 +02:00
|
|
|
{
|
2015-07-20 23:31:26 +02:00
|
|
|
(void) pfd;
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-21 23:56:05 +02:00
|
|
|
if (socks_call_on_data (self) && socks_try_flush_write_buffer (self))
|
2015-07-20 23:31:26 +02:00
|
|
|
{
|
|
|
|
poller_fd_set (&self->socket_event,
|
|
|
|
self->write_buffer.len ? (POLLIN | POLLOUT) : POLLIN);
|
2015-04-11 21:09:06 +02:00
|
|
|
}
|
2015-07-21 00:31:19 +02:00
|
|
|
else if (self->done)
|
|
|
|
{
|
2015-07-22 00:34:27 +02:00
|
|
|
socks_connector_cancel_events (self);
|
|
|
|
|
2015-07-21 00:31:19 +02:00
|
|
|
int fd = self->socket_fd;
|
|
|
|
self->socket_fd = -1;
|
|
|
|
set_blocking (fd, true);
|
|
|
|
self->on_connected (self->user_data, fd);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
// We've failed this target, let's try to move on
|
|
|
|
socks_connector_step (self);
|
2015-07-20 23:31:26 +02:00
|
|
|
}
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
static void
|
|
|
|
socks_connector_init (struct socks_connector *self, struct poller *poller)
|
2015-04-11 21:09:06 +02:00
|
|
|
{
|
2015-07-20 23:31:26 +02:00
|
|
|
memset (self, 0, sizeof *self);
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
poller_fd_init (&self->socket_event, poller, (self->socket_fd = -1));
|
|
|
|
self->socket_event.dispatcher = (poller_fd_fn) socks_connector_on_ready;
|
|
|
|
self->socket_event.user_data = self;
|
|
|
|
|
|
|
|
poller_timer_init (&self->timeout, poller);
|
|
|
|
self->timeout.dispatcher = (poller_timer_fn) socks_connector_on_timeout;
|
|
|
|
self->timeout.user_data = self;
|
|
|
|
|
|
|
|
str_init (&self->read_buffer);
|
|
|
|
str_init (&self->write_buffer);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
socks_connector_free (struct socks_connector *self)
|
|
|
|
{
|
2015-07-22 00:34:27 +02:00
|
|
|
socks_connector_destroy_connector (self);
|
|
|
|
socks_connector_cancel_events (self);
|
2015-07-20 23:31:26 +02:00
|
|
|
|
|
|
|
if (self->socket_fd != -1)
|
|
|
|
xclose (self->socket_fd);
|
|
|
|
|
|
|
|
str_free (&self->read_buffer);
|
|
|
|
str_free (&self->write_buffer);
|
|
|
|
|
2015-07-23 04:07:30 +02:00
|
|
|
free (self->hostname);
|
|
|
|
free (self->service);
|
|
|
|
free (self->username);
|
|
|
|
free (self->password);
|
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
LIST_FOR_EACH (struct socks_target, iter, self->targets)
|
2015-04-11 21:09:06 +02:00
|
|
|
{
|
2015-07-20 23:31:26 +02:00
|
|
|
socks_addr_free (&iter->address);
|
2015-07-23 04:17:15 +02:00
|
|
|
free (iter->address_str);
|
2015-07-20 23:31:26 +02:00
|
|
|
free (iter);
|
2015-04-11 21:09:06 +02:00
|
|
|
}
|
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
socks_addr_free (&self->bound_address);
|
|
|
|
}
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
static bool
|
|
|
|
socks_connector_add_target (struct socks_connector *self,
|
|
|
|
const char *host, const char *service, struct error **e)
|
|
|
|
{
|
|
|
|
unsigned long port;
|
|
|
|
const struct servent *serv;
|
|
|
|
if ((serv = getservbyname (service, "tcp")))
|
|
|
|
port = (uint16_t) ntohs (serv->s_port);
|
|
|
|
else if (!xstrtoul (&port, service, 10) || !port || port > UINT16_MAX)
|
|
|
|
{
|
|
|
|
error_set (e, "invalid port number");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct socks_target *target = xcalloc (1, sizeof *target);
|
|
|
|
if (inet_pton (AF_INET, host, &target->address.data.ipv4) == 1)
|
|
|
|
target->address.type = SOCKS_IPV4;
|
|
|
|
else if (inet_pton (AF_INET6, host, &target->address.data.ipv6) == 1)
|
|
|
|
target->address.type = SOCKS_IPV6;
|
2015-04-11 21:09:06 +02:00
|
|
|
else
|
|
|
|
{
|
2015-07-20 23:31:26 +02:00
|
|
|
target->address.type = SOCKS_DOMAIN;
|
|
|
|
target->address.data.domain = xstrdup (host);
|
2015-04-11 21:09:06 +02:00
|
|
|
}
|
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
target->port = port;
|
2015-07-23 04:17:15 +02:00
|
|
|
target->address_str = xstrdup (host);
|
2015-07-20 23:31:26 +02:00
|
|
|
LIST_APPEND_WITH_TAIL (self->targets, self->targets_tail, target);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2015-07-23 04:07:30 +02:00
|
|
|
socks_connector_run (struct socks_connector *self,
|
|
|
|
const char *host, const char *service,
|
|
|
|
const char *username, const char *password)
|
2015-07-20 23:31:26 +02:00
|
|
|
{
|
|
|
|
hard_assert (self->targets);
|
2015-07-23 04:07:30 +02:00
|
|
|
hard_assert (host && service);
|
|
|
|
|
|
|
|
self->hostname = xstrdup (host);
|
|
|
|
self->service = xstrdup (service);
|
|
|
|
|
|
|
|
if (username) self->username = xstrdup (username);
|
|
|
|
if (password) self->password = xstrdup (password);
|
2015-04-11 21:09:06 +02:00
|
|
|
|
2015-07-20 23:31:26 +02:00
|
|
|
self->targets_iter = self->targets;
|
|
|
|
self->protocol_iter = 0;
|
2015-07-23 04:07:30 +02:00
|
|
|
// XXX: this can fail immediately from an error creating the connector
|
2015-07-20 23:31:26 +02:00
|
|
|
socks_connector_start (self);
|
2015-04-11 21:09:06 +02:00
|
|
|
}
|
2015-05-01 15:24:42 +02:00
|
|
|
|
2015-05-04 02:17:55 +02:00
|
|
|
// --- CTCP decoding -----------------------------------------------------------
|
|
|
|
|
|
|
|
#define CTCP_M_QUOTE '\020'
|
|
|
|
#define CTCP_X_DELIM '\001'
|
|
|
|
#define CTCP_X_QUOTE '\\'
|
|
|
|
|
|
|
|
struct ctcp_chunk
|
|
|
|
{
|
|
|
|
LIST_HEADER (struct ctcp_chunk)
|
|
|
|
|
|
|
|
bool is_extended; ///< Is this a tagged extended message?
|
2015-07-19 23:57:36 +02:00
|
|
|
bool is_partial; ///< Unterminated extended message
|
2015-05-04 02:17:55 +02:00
|
|
|
struct str tag; ///< The tag, if any
|
|
|
|
struct str text; ///< Message contents
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct ctcp_chunk *
|
|
|
|
ctcp_chunk_new (void)
|
|
|
|
{
|
|
|
|
struct ctcp_chunk *self = xcalloc (1, sizeof *self);
|
|
|
|
str_init (&self->tag);
|
|
|
|
str_init (&self->text);
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ctcp_chunk_destroy (struct ctcp_chunk *self)
|
|
|
|
{
|
|
|
|
str_free (&self->tag);
|
|
|
|
str_free (&self->text);
|
|
|
|
free (self);
|
|
|
|
}
|
|
|
|
|
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
static void
|
|
|
|
ctcp_low_level_decode (const char *message, struct str *output)
|
|
|
|
{
|
|
|
|
bool escape = false;
|
|
|
|
for (const char *p = message; *p; p++)
|
|
|
|
{
|
|
|
|
if (escape)
|
|
|
|
{
|
|
|
|
switch (*p)
|
|
|
|
{
|
|
|
|
case '0': str_append_c (output, '\0'); break;
|
|
|
|
case 'r': str_append_c (output, '\r'); break;
|
|
|
|
case 'n': str_append_c (output, '\n'); break;
|
|
|
|
default: str_append_c (output, *p);
|
|
|
|
}
|
|
|
|
escape = false;
|
|
|
|
}
|
|
|
|
else if (*p == CTCP_M_QUOTE)
|
|
|
|
escape = true;
|
|
|
|
else
|
|
|
|
str_append_c (output, *p);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ctcp_intra_decode (const char *chunk, size_t len, struct str *output)
|
|
|
|
{
|
|
|
|
bool escape = false;
|
|
|
|
for (size_t i = 0; i < len; i++)
|
|
|
|
{
|
|
|
|
char c = chunk[i];
|
|
|
|
if (escape)
|
|
|
|
{
|
|
|
|
if (c == 'a')
|
|
|
|
str_append_c (output, CTCP_X_DELIM);
|
|
|
|
else
|
|
|
|
str_append_c (output, c);
|
|
|
|
escape = false;
|
|
|
|
}
|
|
|
|
else if (c == CTCP_X_QUOTE)
|
|
|
|
escape = true;
|
|
|
|
else
|
|
|
|
str_append_c (output, c);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ctcp_parse_tagged (const char *chunk, size_t len, struct ctcp_chunk *output)
|
|
|
|
{
|
|
|
|
// We may search for the space before doing the higher level decoding,
|
|
|
|
// as it doesn't concern space characters at all
|
|
|
|
size_t tag_end = len;
|
|
|
|
for (size_t i = 0; i < len; i++)
|
|
|
|
if (chunk[i] == ' ')
|
|
|
|
{
|
|
|
|
tag_end = i;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
output->is_extended = true;
|
|
|
|
ctcp_intra_decode (chunk, tag_end, &output->tag);
|
|
|
|
if (tag_end++ != len)
|
|
|
|
ctcp_intra_decode (chunk + tag_end, len - tag_end, &output->text);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct ctcp_chunk *
|
|
|
|
ctcp_parse (const char *message)
|
|
|
|
{
|
|
|
|
struct str m;
|
|
|
|
str_init (&m);
|
|
|
|
ctcp_low_level_decode (message, &m);
|
|
|
|
|
|
|
|
struct ctcp_chunk *result = NULL, *result_tail = NULL;
|
|
|
|
|
2015-07-19 23:57:36 +02:00
|
|
|
// According to the original CTCP specification we should use
|
|
|
|
// ctcp_intra_decode() on all parts, however no one seems to
|
|
|
|
// use that and it breaks normal text with backslashes
|
2015-05-04 02:17:55 +02:00
|
|
|
size_t start = 0;
|
|
|
|
bool in_ctcp = false;
|
|
|
|
for (size_t i = 0; i < m.len; i++)
|
|
|
|
{
|
|
|
|
char c = m.str[i];
|
|
|
|
if (c != CTCP_X_DELIM)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
// Remember the current state
|
|
|
|
size_t my_start = start;
|
|
|
|
bool my_is_ctcp = in_ctcp;
|
|
|
|
|
|
|
|
start = i + 1;
|
|
|
|
in_ctcp = !in_ctcp;
|
|
|
|
|
|
|
|
// Skip empty chunks
|
|
|
|
if (my_start == i)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
struct ctcp_chunk *chunk = ctcp_chunk_new ();
|
|
|
|
if (my_is_ctcp)
|
|
|
|
ctcp_parse_tagged (m.str + my_start, i - my_start, chunk);
|
|
|
|
else
|
2015-07-04 00:24:34 +02:00
|
|
|
str_append_data (&chunk->text, m.str + my_start, i - my_start);
|
2015-05-04 02:17:55 +02:00
|
|
|
LIST_APPEND_WITH_TAIL (result, result_tail, chunk);
|
|
|
|
}
|
|
|
|
|
2015-07-19 23:57:36 +02:00
|
|
|
// Finish the last part. Unended tagged chunks are marked as such.
|
|
|
|
if (start != m.len)
|
2015-05-04 02:17:55 +02:00
|
|
|
{
|
|
|
|
struct ctcp_chunk *chunk = ctcp_chunk_new ();
|
2015-07-19 23:57:36 +02:00
|
|
|
if (in_ctcp)
|
|
|
|
{
|
|
|
|
ctcp_parse_tagged (m.str + start, m.len - start, chunk);
|
|
|
|
chunk->is_partial = true;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
str_append_data (&chunk->text, m.str + start, m.len - start);
|
2015-05-04 02:17:55 +02:00
|
|
|
LIST_APPEND_WITH_TAIL (result, result_tail, chunk);
|
|
|
|
}
|
|
|
|
|
|
|
|
str_free (&m);
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ctcp_destroy (struct ctcp_chunk *list)
|
|
|
|
{
|
|
|
|
LIST_FOR_EACH (struct ctcp_chunk, iter, list)
|
|
|
|
ctcp_chunk_destroy (iter);
|
|
|
|
}
|
|
|
|
|
2015-05-01 15:24:42 +02:00
|
|
|
// --- Advanced configuration --------------------------------------------------
|
|
|
|
|
|
|
|
// This is a new configuration format, superseding the one currently present
|
|
|
|
// in liberty. It's just a lot more complicated and allows key-value maps.
|
|
|
|
// We need it in degesch to provide non-sucking user experience.
|
|
|
|
|
|
|
|
enum config_item_type
|
|
|
|
{
|
|
|
|
CONFIG_ITEM_NULL, ///< No value
|
|
|
|
CONFIG_ITEM_OBJECT, ///< Key-value map
|
|
|
|
CONFIG_ITEM_BOOLEAN, ///< Truth value
|
|
|
|
CONFIG_ITEM_INTEGER, ///< Integer
|
|
|
|
CONFIG_ITEM_STRING, ///< Arbitrary string of characters
|
|
|
|
CONFIG_ITEM_STRING_ARRAY ///< Comma-separated list of strings
|
|
|
|
};
|
|
|
|
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item
|
2015-05-01 15:24:42 +02:00
|
|
|
{
|
|
|
|
enum config_item_type type; ///< Type of the item
|
|
|
|
union
|
|
|
|
{
|
|
|
|
struct str_map object; ///< Key-value data
|
|
|
|
bool boolean; ///< Boolean data
|
|
|
|
int64_t integer; ///< Integer data
|
|
|
|
struct str string; ///< String data
|
|
|
|
}
|
|
|
|
value; ///< The value of this item
|
|
|
|
|
|
|
|
struct config_schema *schema; ///< Schema describing this value
|
|
|
|
void *user_data; ///< User value attached by schema owner
|
|
|
|
};
|
|
|
|
|
|
|
|
struct config_schema
|
|
|
|
{
|
|
|
|
const char *name; ///< Name of the item
|
|
|
|
const char *comment; ///< User-readable description
|
|
|
|
|
|
|
|
enum config_item_type type; ///< Required type
|
|
|
|
const char *default_; ///< Default as a configuration snippet
|
|
|
|
|
|
|
|
/// Check if the new value can be accepted.
|
2015-05-02 21:10:39 +02:00
|
|
|
/// In addition to this, "type" and having a default is considered.
|
2015-08-17 00:08:19 +02:00
|
|
|
bool (*validate) (const struct config_item *, struct error **e);
|
2015-05-01 15:24:42 +02:00
|
|
|
|
2015-05-02 21:10:39 +02:00
|
|
|
/// The value has changed
|
2015-08-17 00:08:19 +02:00
|
|
|
void (*on_change) (struct config_item *);
|
2015-05-01 15:24:42 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
2015-05-01 21:48:43 +02:00
|
|
|
static const char *
|
|
|
|
config_item_type_name (enum config_item_type type)
|
2015-05-01 15:24:42 +02:00
|
|
|
{
|
2015-05-01 21:48:43 +02:00
|
|
|
switch (type)
|
|
|
|
{
|
|
|
|
case CONFIG_ITEM_NULL: return "null";
|
|
|
|
case CONFIG_ITEM_BOOLEAN: return "boolean";
|
|
|
|
case CONFIG_ITEM_INTEGER: return "integer";
|
|
|
|
case CONFIG_ITEM_STRING: return "string";
|
|
|
|
case CONFIG_ITEM_STRING_ARRAY: return "string array";
|
|
|
|
|
|
|
|
default:
|
|
|
|
hard_assert (!"invalid config item type value");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool
|
|
|
|
config_item_type_is_string (enum config_item_type type)
|
|
|
|
{
|
|
|
|
return type == CONFIG_ITEM_STRING
|
|
|
|
|| type == CONFIG_ITEM_STRING_ARRAY;
|
|
|
|
}
|
2015-05-01 15:24:42 +02:00
|
|
|
|
2015-05-01 21:48:43 +02:00
|
|
|
static void
|
2015-08-17 00:08:19 +02:00
|
|
|
config_item_free (struct config_item *self)
|
2015-05-01 21:48:43 +02:00
|
|
|
{
|
2015-05-01 15:24:42 +02:00
|
|
|
switch (self->type)
|
|
|
|
{
|
|
|
|
case CONFIG_ITEM_STRING:
|
|
|
|
case CONFIG_ITEM_STRING_ARRAY:
|
|
|
|
str_free (&self->value.string);
|
|
|
|
break;
|
|
|
|
case CONFIG_ITEM_OBJECT:
|
|
|
|
str_map_free (&self->value.object);
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
2015-05-01 21:48:43 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2015-08-17 00:08:19 +02:00
|
|
|
config_item_destroy (struct config_item *self)
|
2015-05-01 21:48:43 +02:00
|
|
|
{
|
|
|
|
config_item_free (self);
|
2015-05-01 15:24:42 +02:00
|
|
|
free (self);
|
|
|
|
}
|
|
|
|
|
2015-05-01 21:48:43 +02:00
|
|
|
/// Doesn't do any validations or handle schemas, just moves source data
|
|
|
|
/// to the target item and destroys the source item
|
|
|
|
static void
|
2015-08-17 00:08:19 +02:00
|
|
|
config_item_move (struct config_item *self, struct config_item *source)
|
2015-05-01 21:48:43 +02:00
|
|
|
{
|
|
|
|
// Not quite sure how to handle that
|
|
|
|
hard_assert (!source->schema);
|
|
|
|
|
|
|
|
config_item_free (self);
|
|
|
|
self->type = source->type;
|
|
|
|
memcpy (&self->value, &source->value, sizeof source->value);
|
|
|
|
free (source);
|
|
|
|
}
|
|
|
|
|
2015-08-17 00:08:19 +02:00
|
|
|
static struct config_item *
|
2015-05-01 15:24:42 +02:00
|
|
|
config_item_new (enum config_item_type type)
|
|
|
|
{
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *self = xcalloc (1, sizeof *self);
|
2015-05-01 15:24:42 +02:00
|
|
|
self->type = type;
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
2015-08-17 00:08:19 +02:00
|
|
|
static struct config_item *
|
2015-05-01 15:24:42 +02:00
|
|
|
config_item_null (void)
|
|
|
|
{
|
|
|
|
return config_item_new (CONFIG_ITEM_NULL);
|
|
|
|
}
|
|
|
|
|
2015-08-17 00:08:19 +02:00
|
|
|
static struct config_item *
|
2015-05-01 15:24:42 +02:00
|
|
|
config_item_boolean (bool b)
|
|
|
|
{
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *self = config_item_new (CONFIG_ITEM_BOOLEAN);
|
2015-05-01 15:24:42 +02:00
|
|
|
self->value.boolean = b;
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
2015-08-17 00:08:19 +02:00
|
|
|
static struct config_item *
|
2015-05-01 15:24:42 +02:00
|
|
|
config_item_integer (int64_t i)
|
|
|
|
{
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *self = config_item_new (CONFIG_ITEM_INTEGER);
|
2015-05-01 15:24:42 +02:00
|
|
|
self->value.integer = i;
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
2015-08-17 00:08:19 +02:00
|
|
|
static struct config_item *
|
2015-05-01 15:24:42 +02:00
|
|
|
config_item_string (const struct str *s)
|
|
|
|
{
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *self = config_item_new (CONFIG_ITEM_STRING);
|
2015-05-01 15:24:42 +02:00
|
|
|
str_init (&self->value.string);
|
2015-05-02 15:06:31 +02:00
|
|
|
hard_assert (utf8_validate
|
|
|
|
(self->value.string.str, self->value.string.len));
|
2015-05-01 15:24:42 +02:00
|
|
|
if (s) str_append_str (&self->value.string, s);
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
2015-08-17 00:08:19 +02:00
|
|
|
static struct config_item *
|
2015-07-11 03:27:17 +02:00
|
|
|
config_item_string_from_cstr (const char *s)
|
|
|
|
{
|
|
|
|
struct str tmp;
|
|
|
|
str_init (&tmp);
|
|
|
|
str_append (&tmp, s);
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *self = config_item_string (&tmp);
|
2015-07-11 03:27:17 +02:00
|
|
|
str_free (&tmp);
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
2015-08-17 00:08:19 +02:00
|
|
|
static struct config_item *
|
2015-05-01 15:24:42 +02:00
|
|
|
config_item_string_array (const struct str *s)
|
|
|
|
{
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *self = config_item_string (s);
|
2015-05-01 15:24:42 +02:00
|
|
|
self->type = CONFIG_ITEM_STRING_ARRAY;
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
2015-08-17 00:08:19 +02:00
|
|
|
static struct config_item *
|
2015-05-01 15:24:42 +02:00
|
|
|
config_item_object (void)
|
|
|
|
{
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *self = config_item_new (CONFIG_ITEM_OBJECT);
|
2015-05-01 15:24:42 +02:00
|
|
|
str_map_init (&self->value.object);
|
|
|
|
self->value.object.free = (void (*)(void *)) config_item_destroy;
|
|
|
|
return self;
|
|
|
|
}
|
|
|
|
|
2015-05-01 21:48:43 +02:00
|
|
|
static bool
|
|
|
|
config_schema_accepts_type
|
|
|
|
(struct config_schema *self, enum config_item_type type)
|
2015-05-01 15:24:42 +02:00
|
|
|
{
|
2015-05-01 21:48:43 +02:00
|
|
|
if (self->type == type)
|
|
|
|
return true;
|
|
|
|
// This is a bit messy but it has its purpose
|
|
|
|
if (config_item_type_is_string (self->type)
|
|
|
|
&& config_item_type_is_string (type))
|
|
|
|
return true;
|
2015-05-02 03:44:31 +02:00
|
|
|
return !self->default_ && type == CONFIG_ITEM_NULL;
|
2015-05-01 15:24:42 +02:00
|
|
|
}
|
|
|
|
|
2015-05-02 20:43:01 +02:00
|
|
|
static bool
|
2015-08-17 00:08:19 +02:00
|
|
|
config_item_validate_by_schema (struct config_item *self,
|
2015-05-02 21:10:39 +02:00
|
|
|
struct config_schema *schema, struct error **e)
|
2015-05-02 20:43:01 +02:00
|
|
|
{
|
2015-05-02 21:10:39 +02:00
|
|
|
struct error *error = NULL;
|
|
|
|
if (!config_schema_accepts_type (schema, self->type))
|
2015-05-02 20:43:01 +02:00
|
|
|
error_set (e, "invalid type of value, expected: %s%s",
|
|
|
|
config_item_type_name (schema->type),
|
|
|
|
!schema->default_ ? " (or null)" : "");
|
2015-05-02 21:10:39 +02:00
|
|
|
else if (schema->validate && !schema->validate (self, &error))
|
|
|
|
{
|
|
|
|
error_set (e, "%s: %s", "invalid value", error->message);
|
|
|
|
error_free (error);
|
|
|
|
}
|
2015-05-02 20:43:01 +02:00
|
|
|
else
|
|
|
|
return true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2015-05-01 15:24:42 +02:00
|
|
|
static bool
|
2015-08-17 00:08:19 +02:00
|
|
|
config_item_set_from (struct config_item *self, struct config_item *source,
|
2015-05-01 21:48:43 +02:00
|
|
|
struct error **e)
|
2015-05-01 15:24:42 +02:00
|
|
|
{
|
2015-05-01 21:48:43 +02:00
|
|
|
struct config_schema *schema = self->schema;
|
|
|
|
if (!schema)
|
|
|
|
{
|
|
|
|
// Easy, we don't know what this item is
|
|
|
|
config_item_move (self, source);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2015-05-02 21:10:39 +02:00
|
|
|
if (!config_item_validate_by_schema (source, schema, e))
|
2015-05-01 21:48:43 +02:00
|
|
|
return false;
|
|
|
|
|
|
|
|
// Make sure the string subtype fits the schema
|
2015-05-03 19:18:13 +02:00
|
|
|
if (config_item_type_is_string (source->type)
|
|
|
|
&& config_item_type_is_string (schema->type))
|
|
|
|
source->type = schema->type;
|
2015-05-01 21:48:43 +02:00
|
|
|
|
|
|
|
config_item_move (self, source);
|
|
|
|
|
|
|
|
// Notify owner about the change so that they can apply it
|
2015-05-02 21:19:12 +02:00
|
|
|
if (schema->on_change)
|
|
|
|
schema->on_change (self);
|
2015-05-01 21:48:43 +02:00
|
|
|
return true;
|
2015-05-01 15:24:42 +02:00
|
|
|
}
|
|
|
|
|
2015-08-17 00:08:19 +02:00
|
|
|
static struct config_item *
|
|
|
|
config_item_get (struct config_item *self, const char *path, struct error **e)
|
2015-05-01 15:24:42 +02:00
|
|
|
{
|
|
|
|
hard_assert (self->type == CONFIG_ITEM_OBJECT);
|
2015-05-01 23:26:30 +02:00
|
|
|
|
|
|
|
struct str_vector v;
|
|
|
|
str_vector_init (&v);
|
2015-11-15 15:56:10 +01:00
|
|
|
split_str (path, ".", &v);
|
2015-05-01 23:26:30 +02:00
|
|
|
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *result = NULL;
|
2015-05-01 23:26:30 +02:00
|
|
|
size_t i = 0;
|
|
|
|
while (true)
|
|
|
|
{
|
|
|
|
const char *key = v.vector[i];
|
|
|
|
if (!*key)
|
|
|
|
error_set (e, "empty path element");
|
|
|
|
else if (!(self = str_map_find (&self->value.object, key)))
|
|
|
|
error_set (e, "`%s' not found in object", key);
|
|
|
|
else if (++i == v.len)
|
|
|
|
result = self;
|
|
|
|
else if (self->type != CONFIG_ITEM_OBJECT)
|
|
|
|
error_set (e, "`%s' is not an object", key);
|
|
|
|
else
|
|
|
|
continue;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
str_vector_free (&v);
|
|
|
|
return result;
|
2015-05-01 15:24:42 +02:00
|
|
|
}
|
|
|
|
|
2015-05-01 20:58:46 +02:00
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
struct config_writer
|
|
|
|
{
|
|
|
|
struct str *output;
|
|
|
|
unsigned indent;
|
|
|
|
};
|
|
|
|
|
|
|
|
static void config_item_write_object_innards
|
2015-08-17 00:08:19 +02:00
|
|
|
(struct config_writer *self, struct config_item *object);
|
2015-05-01 20:58:46 +02:00
|
|
|
|
2015-05-02 04:02:23 +02:00
|
|
|
static void
|
|
|
|
config_item_write_string (struct str *output, const struct str *s)
|
|
|
|
{
|
|
|
|
str_append_c (output, '"');
|
|
|
|
for (size_t i = 0; i < s->len; i++)
|
|
|
|
{
|
|
|
|
unsigned char c = s->str[i];
|
|
|
|
if (c == '\n') str_append (output, "\\n");
|
|
|
|
else if (c == '\r') str_append (output, "\\r");
|
|
|
|
else if (c == '\t') str_append (output, "\\t");
|
|
|
|
else if (c == '\\') str_append (output, "\\\\");
|
|
|
|
else if (c == '"') str_append (output, "\\\"");
|
|
|
|
else if (c < 32) str_append_printf (output, "\\x%02x", c);
|
|
|
|
else str_append_c (output, c);
|
|
|
|
}
|
|
|
|
str_append_c (output, '"');
|
|
|
|
}
|
|
|
|
|
2015-07-10 01:24:06 +02:00
|
|
|
static void
|
|
|
|
config_item_write_object
|
2015-08-17 00:08:19 +02:00
|
|
|
(struct config_writer *self, struct config_item *value)
|
2015-07-10 01:24:06 +02:00
|
|
|
{
|
|
|
|
char indent[self->indent + 1];
|
|
|
|
memset (indent, '\t', self->indent);
|
|
|
|
indent[self->indent] = 0;
|
|
|
|
|
|
|
|
str_append_c (self->output, '{');
|
|
|
|
if (value->value.object.len)
|
|
|
|
{
|
|
|
|
self->indent++;
|
|
|
|
str_append_c (self->output, '\n');
|
|
|
|
config_item_write_object_innards (self, value);
|
|
|
|
self->indent--;
|
|
|
|
str_append (self->output, indent);
|
|
|
|
}
|
|
|
|
str_append_c (self->output, '}');
|
|
|
|
}
|
|
|
|
|
2015-05-01 15:24:42 +02:00
|
|
|
static void
|
2015-08-17 00:08:19 +02:00
|
|
|
config_item_write_value (struct config_writer *self, struct config_item *value)
|
2015-05-01 15:24:42 +02:00
|
|
|
{
|
2015-05-01 20:58:46 +02:00
|
|
|
switch (value->type)
|
|
|
|
{
|
|
|
|
case CONFIG_ITEM_NULL:
|
|
|
|
str_append (self->output, "null");
|
|
|
|
break;
|
|
|
|
case CONFIG_ITEM_BOOLEAN:
|
|
|
|
str_append (self->output, value->value.boolean ? "on" : "off");
|
|
|
|
break;
|
|
|
|
case CONFIG_ITEM_INTEGER:
|
|
|
|
str_append_printf (self->output, "%" PRIi64, value->value.integer);
|
|
|
|
break;
|
|
|
|
case CONFIG_ITEM_STRING:
|
|
|
|
case CONFIG_ITEM_STRING_ARRAY:
|
2015-05-02 04:02:23 +02:00
|
|
|
config_item_write_string (self->output, &value->value.string);
|
2015-05-01 20:58:46 +02:00
|
|
|
break;
|
|
|
|
case CONFIG_ITEM_OBJECT:
|
2015-07-10 01:24:06 +02:00
|
|
|
config_item_write_object (self, value);
|
2015-05-01 20:58:46 +02:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
hard_assert (!"invalid item type");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
config_item_write_kv_pair (struct config_writer *self,
|
2015-08-17 00:08:19 +02:00
|
|
|
const char *key, struct config_item *value)
|
2015-05-01 20:58:46 +02:00
|
|
|
{
|
|
|
|
char indent[self->indent + 1];
|
|
|
|
memset (indent, '\t', self->indent);
|
|
|
|
indent[self->indent] = 0;
|
|
|
|
|
|
|
|
if (value->schema && value->schema->comment)
|
|
|
|
str_append_printf (self->output,
|
|
|
|
"%s# %s\n", indent, value->schema->comment);
|
|
|
|
|
|
|
|
str_append_printf (self->output, "%s%s = ", indent, key);
|
|
|
|
config_item_write_value (self, value);
|
|
|
|
str_append_c (self->output, '\n');
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
config_item_write_object_innards
|
2015-08-17 00:08:19 +02:00
|
|
|
(struct config_writer *self, struct config_item *object)
|
2015-05-01 20:58:46 +02:00
|
|
|
{
|
|
|
|
hard_assert (object->type == CONFIG_ITEM_OBJECT);
|
|
|
|
|
|
|
|
struct str_map_iter iter;
|
|
|
|
str_map_iter_init (&iter, &object->value.object);
|
|
|
|
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *value;
|
2015-05-01 20:58:46 +02:00
|
|
|
while ((value = str_map_iter_next (&iter)))
|
|
|
|
config_item_write_kv_pair (self, iter.link->key, value);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2015-08-17 00:08:19 +02:00
|
|
|
config_item_write (struct config_item *value,
|
2015-05-01 20:58:46 +02:00
|
|
|
bool object_innards, struct str *output)
|
|
|
|
{
|
|
|
|
struct config_writer writer = { .output = output, .indent = 0 };
|
|
|
|
if (object_innards)
|
|
|
|
config_item_write_object_innards (&writer, value);
|
|
|
|
else
|
|
|
|
config_item_write_value (&writer, value);
|
2015-05-01 15:24:42 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
enum config_token
|
|
|
|
{
|
|
|
|
CONFIG_T_ABORT, ///< EOF or error
|
|
|
|
|
|
|
|
CONFIG_T_WORD, ///< [a-zA-Z0-9_]+
|
|
|
|
CONFIG_T_EQUALS, ///< Equal sign
|
|
|
|
CONFIG_T_LBRACE, ///< Left curly bracket
|
|
|
|
CONFIG_T_RBRACE, ///< Right curly bracket
|
|
|
|
CONFIG_T_NEWLINE, ///< New line
|
|
|
|
|
|
|
|
CONFIG_T_NULL, ///< CONFIG_ITEM_NULL
|
|
|
|
CONFIG_T_BOOLEAN, ///< CONFIG_ITEM_BOOLEAN
|
|
|
|
CONFIG_T_INTEGER, ///< CONFIG_ITEM_INTEGER
|
|
|
|
CONFIG_T_STRING ///< CONFIG_ITEM_STRING{,_LIST}
|
|
|
|
};
|
|
|
|
|
2015-05-01 18:39:38 +02:00
|
|
|
static const char *
|
|
|
|
config_token_name (enum config_token token)
|
|
|
|
{
|
|
|
|
switch (token)
|
|
|
|
{
|
|
|
|
case CONFIG_T_ABORT: return "end of input";
|
|
|
|
|
|
|
|
case CONFIG_T_WORD: return "word";
|
|
|
|
case CONFIG_T_EQUALS: return "equal sign";
|
|
|
|
case CONFIG_T_LBRACE: return "left brace";
|
|
|
|
case CONFIG_T_RBRACE: return "right brace";
|
|
|
|
case CONFIG_T_NEWLINE: return "newline";
|
|
|
|
|
|
|
|
case CONFIG_T_NULL: return "null value";
|
|
|
|
case CONFIG_T_BOOLEAN: return "boolean";
|
|
|
|
case CONFIG_T_INTEGER: return "integer";
|
|
|
|
case CONFIG_T_STRING: return "string";
|
|
|
|
|
|
|
|
default:
|
|
|
|
hard_assert (!"invalid token value");
|
2015-05-07 19:00:08 +02:00
|
|
|
return NULL;
|
2015-05-01 18:39:38 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
2015-05-01 15:24:42 +02:00
|
|
|
struct config_tokenizer
|
|
|
|
{
|
2015-05-01 18:39:38 +02:00
|
|
|
const char *p; ///< Current position in input
|
|
|
|
size_t len; ///< How many bytes of input are left
|
2015-05-01 15:24:42 +02:00
|
|
|
|
2015-05-01 18:39:38 +02:00
|
|
|
bool report_line; ///< Whether to count lines at all
|
|
|
|
unsigned line; ///< Current line
|
|
|
|
unsigned column; ///< Current column
|
2015-05-01 15:24:42 +02:00
|
|
|
|
2015-05-01 18:39:38 +02:00
|
|
|
int64_t integer; ///< Parsed boolean or integer value
|
|
|
|
struct str string; ///< Parsed string value
|
2015-05-01 15:24:42 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
/// Input has to be null-terminated anyway
|
|
|
|
static void
|
|
|
|
config_tokenizer_init (struct config_tokenizer *self, const char *p, size_t len)
|
|
|
|
{
|
|
|
|
memset (self, 0, sizeof *self);
|
|
|
|
self->p = p;
|
|
|
|
self->len = len;
|
2015-05-01 18:39:38 +02:00
|
|
|
self->report_line = true;
|
2015-05-01 15:24:42 +02:00
|
|
|
str_init (&self->string);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
config_tokenizer_free (struct config_tokenizer *self)
|
|
|
|
{
|
|
|
|
str_free (&self->string);
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool
|
|
|
|
config_tokenizer_is_word_char (int c)
|
|
|
|
{
|
|
|
|
return isalnum_ascii (c) || c == '_';
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
config_tokenizer_advance (struct config_tokenizer *self)
|
|
|
|
{
|
|
|
|
int c = *self->p++;
|
2015-05-01 18:39:38 +02:00
|
|
|
if (c == '\n' && self->report_line)
|
2015-05-01 15:24:42 +02:00
|
|
|
{
|
|
|
|
self->column = 0;
|
|
|
|
self->line++;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
self->column++;
|
|
|
|
|
|
|
|
self->len--;
|
|
|
|
return c;
|
|
|
|
}
|
|
|
|
|
2015-05-01 18:39:38 +02:00
|
|
|
static void config_tokenizer_error (struct config_tokenizer *self,
|
|
|
|
struct error **e, const char *format, ...) ATTRIBUTE_PRINTF (3, 4);
|
|
|
|
|
2015-05-01 15:24:42 +02:00
|
|
|
static void
|
|
|
|
config_tokenizer_error (struct config_tokenizer *self,
|
2015-05-01 18:39:38 +02:00
|
|
|
struct error **e, const char *format, ...)
|
2015-05-01 15:24:42 +02:00
|
|
|
{
|
2015-05-01 18:39:38 +02:00
|
|
|
struct str description;
|
|
|
|
str_init (&description);
|
|
|
|
|
|
|
|
va_list ap;
|
|
|
|
va_start (ap, format);
|
|
|
|
str_append_vprintf (&description, format, ap);
|
|
|
|
va_end (ap);
|
|
|
|
|
|
|
|
if (self->report_line)
|
|
|
|
error_set (e, "near line %u, column %u: %s",
|
|
|
|
self->line + 1, self->column + 1, description.str);
|
2015-05-03 17:00:58 +02:00
|
|
|
else if (self->len)
|
2015-05-01 18:39:38 +02:00
|
|
|
error_set (e, "near character %u: %s",
|
|
|
|
self->column + 1, description.str);
|
2015-05-03 17:00:58 +02:00
|
|
|
else
|
|
|
|
error_set (e, "near end: %s", description.str);
|
2015-05-01 18:39:38 +02:00
|
|
|
|
|
|
|
str_free (&description);
|
2015-05-01 15:24:42 +02:00
|
|
|
}
|
|
|
|
|
2015-05-02 04:58:08 +02:00
|
|
|
static bool
|
|
|
|
config_tokenizer_hexa_escape (struct config_tokenizer *self, struct str *output)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
unsigned char code = 0;
|
|
|
|
|
|
|
|
for (i = 0; self->len && i < 2; i++)
|
|
|
|
{
|
|
|
|
unsigned char c = tolower_ascii (*self->p);
|
|
|
|
if (c >= '0' && c <= '9')
|
|
|
|
code = (code << 4) | (c - '0');
|
|
|
|
else if (c >= 'a' && c <= 'f')
|
|
|
|
code = (code << 4) | (c - 'a' + 10);
|
|
|
|
else
|
|
|
|
break;
|
|
|
|
|
|
|
|
config_tokenizer_advance (self);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!i)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
str_append_c (output, code);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool
|
|
|
|
config_tokenizer_octal_escape
|
|
|
|
(struct config_tokenizer *self, struct str *output)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
unsigned char code = 0;
|
|
|
|
|
|
|
|
for (i = 0; self->len && i < 3; i++)
|
|
|
|
{
|
|
|
|
unsigned char c = *self->p;
|
|
|
|
if (c >= '0' && c <= '7')
|
|
|
|
code = (code << 3) | (c - '0');
|
|
|
|
else
|
|
|
|
break;
|
|
|
|
|
|
|
|
config_tokenizer_advance (self);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!i)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
str_append_c (output, code);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool
|
|
|
|
config_tokenizer_escape_sequence
|
|
|
|
(struct config_tokenizer *self, struct str *output, struct error **e)
|
|
|
|
{
|
|
|
|
if (!self->len)
|
|
|
|
{
|
|
|
|
config_tokenizer_error (self, e, "premature end of escape sequence");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
unsigned char c;
|
|
|
|
switch ((c = *self->p))
|
|
|
|
{
|
|
|
|
case '"': break;
|
|
|
|
case '\\': break;
|
|
|
|
case 'a': c = '\a'; break;
|
|
|
|
case 'b': c = '\b'; break;
|
|
|
|
case 'f': c = '\f'; break;
|
|
|
|
case 'n': c = '\n'; break;
|
|
|
|
case 'r': c = '\r'; break;
|
|
|
|
case 't': c = '\t'; break;
|
|
|
|
case 'v': c = '\v'; break;
|
|
|
|
|
|
|
|
case 'x':
|
|
|
|
case 'X':
|
|
|
|
config_tokenizer_advance (self);
|
|
|
|
if (config_tokenizer_hexa_escape (self, output))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
config_tokenizer_error (self, e, "invalid hexadecimal escape");
|
|
|
|
return false;
|
|
|
|
|
|
|
|
default:
|
|
|
|
if (config_tokenizer_octal_escape (self, output))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
config_tokenizer_error (self, e, "unknown escape sequence");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
str_append_c (output, c);
|
|
|
|
config_tokenizer_advance (self);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool
|
|
|
|
config_tokenizer_string
|
|
|
|
(struct config_tokenizer *self, struct str *output, struct error **e)
|
|
|
|
{
|
|
|
|
unsigned char c;
|
|
|
|
while (self->len)
|
|
|
|
{
|
|
|
|
if ((c = config_tokenizer_advance (self)) == '"')
|
|
|
|
return true;
|
|
|
|
if (c != '\\')
|
|
|
|
str_append_c (output, c);
|
|
|
|
else if (!config_tokenizer_escape_sequence (self, output, e))
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
config_tokenizer_error (self, e, "premature end of string");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2015-05-01 15:24:42 +02:00
|
|
|
static enum config_token
|
|
|
|
config_tokenizer_next (struct config_tokenizer *self, struct error **e)
|
|
|
|
{
|
|
|
|
// Skip over any whitespace between tokens
|
|
|
|
while (self->len && isspace_ascii (*self->p) && *self->p != '\n')
|
|
|
|
config_tokenizer_advance (self);
|
|
|
|
if (!self->len)
|
|
|
|
return CONFIG_T_ABORT;
|
|
|
|
|
|
|
|
switch (*self->p)
|
|
|
|
{
|
|
|
|
case '\n': config_tokenizer_advance (self); return CONFIG_T_NEWLINE;
|
|
|
|
case '=': config_tokenizer_advance (self); return CONFIG_T_EQUALS;
|
|
|
|
case '{': config_tokenizer_advance (self); return CONFIG_T_LBRACE;
|
|
|
|
case '}': config_tokenizer_advance (self); return CONFIG_T_RBRACE;
|
|
|
|
|
|
|
|
case '#':
|
|
|
|
// Comments go until newline
|
|
|
|
while (self->len)
|
|
|
|
if (config_tokenizer_advance (self) == '\n')
|
|
|
|
return CONFIG_T_NEWLINE;
|
|
|
|
return CONFIG_T_ABORT;
|
|
|
|
|
|
|
|
case '"':
|
2015-05-02 04:58:08 +02:00
|
|
|
config_tokenizer_advance (self);
|
|
|
|
str_reset (&self->string);
|
|
|
|
if (!config_tokenizer_string (self, &self->string, e))
|
|
|
|
return CONFIG_T_ABORT;
|
|
|
|
if (!utf8_validate (self->string.str, self->string.len))
|
|
|
|
{
|
|
|
|
config_tokenizer_error (self, e, "not a valid UTF-8 string");
|
|
|
|
return CONFIG_T_ABORT;
|
|
|
|
}
|
2015-05-02 22:49:51 +02:00
|
|
|
return CONFIG_T_STRING;
|
2015-05-01 15:24:42 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
char *end;
|
|
|
|
errno = 0;
|
|
|
|
self->integer = strtoll (self->p, &end, 10);
|
|
|
|
if (errno == ERANGE)
|
|
|
|
{
|
|
|
|
config_tokenizer_error (self, e, "integer out of range");
|
|
|
|
return CONFIG_T_ABORT;
|
|
|
|
}
|
|
|
|
if (end != self->p)
|
|
|
|
{
|
|
|
|
self->len -= end - self->p;
|
|
|
|
self->p = end;
|
|
|
|
return CONFIG_T_INTEGER;
|
|
|
|
}
|
|
|
|
|
2015-05-02 21:56:05 +02:00
|
|
|
if (!config_tokenizer_is_word_char (*self->p))
|
|
|
|
{
|
|
|
|
config_tokenizer_error (self, e, "invalid input");
|
|
|
|
return CONFIG_T_ABORT;
|
|
|
|
}
|
|
|
|
|
|
|
|
str_reset (&self->string);
|
|
|
|
do
|
|
|
|
str_append_c (&self->string, config_tokenizer_advance (self));
|
|
|
|
while (config_tokenizer_is_word_char (*self->p));
|
|
|
|
|
|
|
|
if (!strcmp (self->string.str, "null"))
|
|
|
|
return CONFIG_T_NULL;
|
|
|
|
|
|
|
|
bool boolean;
|
|
|
|
if (!set_boolean_if_valid (&boolean, self->string.str))
|
|
|
|
return CONFIG_T_WORD;
|
|
|
|
|
|
|
|
self->integer = boolean;
|
|
|
|
return CONFIG_T_BOOLEAN;
|
2015-05-01 15:24:42 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
struct config_parser
|
|
|
|
{
|
|
|
|
struct config_tokenizer tokenizer; ///< Tokenizer
|
|
|
|
|
|
|
|
struct error *error; ///< Tokenizer error
|
|
|
|
enum config_token token; ///< Current token in the tokenizer
|
|
|
|
bool replace_token; ///< Replace the token
|
|
|
|
};
|
|
|
|
|
|
|
|
static void
|
|
|
|
config_parser_init (struct config_parser *self, const char *script, size_t len)
|
|
|
|
{
|
|
|
|
memset (self, 0, sizeof *self);
|
|
|
|
config_tokenizer_init (&self->tokenizer, script, len);
|
|
|
|
|
|
|
|
// As reading in tokens may cause exceptions, we wait for the first peek()
|
|
|
|
// to replace the initial CONFIG_T_ABORT.
|
|
|
|
self->replace_token = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
config_parser_free (struct config_parser *self)
|
|
|
|
{
|
|
|
|
config_tokenizer_free (&self->tokenizer);
|
|
|
|
if (self->error)
|
|
|
|
error_free (self->error);
|
|
|
|
}
|
|
|
|
|
|
|
|
static enum config_token
|
|
|
|
config_parser_peek (struct config_parser *self, jmp_buf out)
|
|
|
|
{
|
|
|
|
if (self->replace_token)
|
|
|
|
{
|
|
|
|
self->token = config_tokenizer_next (&self->tokenizer, &self->error);
|
|
|
|
if (self->error)
|
|
|
|
longjmp (out, 1);
|
|
|
|
self->replace_token = false;
|
|
|
|
}
|
|
|
|
return self->token;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool
|
|
|
|
config_parser_accept
|
|
|
|
(struct config_parser *self, enum config_token token, jmp_buf out)
|
|
|
|
{
|
|
|
|
return self->replace_token = (config_parser_peek (self, out) == token);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
config_parser_expect
|
|
|
|
(struct config_parser *self, enum config_token token, jmp_buf out)
|
|
|
|
{
|
|
|
|
if (config_parser_accept (self, token, out))
|
|
|
|
return;
|
|
|
|
|
|
|
|
config_tokenizer_error (&self->tokenizer, &self->error,
|
2015-05-01 18:39:38 +02:00
|
|
|
"unexpected `%s', expected `%s'",
|
|
|
|
config_token_name (self->token),
|
|
|
|
config_token_name (token));
|
2015-05-01 15:24:42 +02:00
|
|
|
longjmp (out, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
// We don't need no generator, but a few macros will come in handy.
|
|
|
|
// From time to time C just doesn't have the right features.
|
|
|
|
|
|
|
|
#define PEEK() config_parser_peek (self, err)
|
|
|
|
#define ACCEPT(token) config_parser_accept (self, token, err)
|
|
|
|
#define EXPECT(token) config_parser_expect (self, token, err)
|
|
|
|
#define SKIP_NL() do {} while (ACCEPT (CONFIG_T_NEWLINE))
|
|
|
|
|
2015-08-17 00:08:19 +02:00
|
|
|
static struct config_item *config_parser_parse_object
|
2015-05-01 15:24:42 +02:00
|
|
|
(struct config_parser *self, jmp_buf out);
|
|
|
|
|
2015-08-17 00:08:19 +02:00
|
|
|
static struct config_item *
|
2015-05-01 15:24:42 +02:00
|
|
|
config_parser_parse_value (struct config_parser *self, jmp_buf out)
|
|
|
|
{
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *volatile result = NULL;
|
2015-05-01 15:24:42 +02:00
|
|
|
jmp_buf err;
|
|
|
|
|
|
|
|
if (setjmp (err))
|
|
|
|
{
|
|
|
|
if (result)
|
|
|
|
config_item_destroy (result);
|
|
|
|
longjmp (out, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ACCEPT (CONFIG_T_LBRACE))
|
|
|
|
{
|
|
|
|
result = config_parser_parse_object (self, out);
|
2015-05-01 20:59:09 +02:00
|
|
|
SKIP_NL ();
|
2015-05-01 15:24:42 +02:00
|
|
|
EXPECT (CONFIG_T_RBRACE);
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
if (ACCEPT (CONFIG_T_NULL))
|
|
|
|
return config_item_null ();
|
|
|
|
if (ACCEPT (CONFIG_T_BOOLEAN))
|
|
|
|
return config_item_boolean (self->tokenizer.integer);
|
|
|
|
if (ACCEPT (CONFIG_T_INTEGER))
|
|
|
|
return config_item_integer (self->tokenizer.integer);
|
|
|
|
if (ACCEPT (CONFIG_T_STRING))
|
|
|
|
return config_item_string (&self->tokenizer.string);
|
|
|
|
|
|
|
|
config_tokenizer_error (&self->tokenizer, &self->error,
|
2015-05-01 18:39:38 +02:00
|
|
|
"unexpected `%s', expected a value",
|
|
|
|
config_token_name (self->token));
|
2015-05-01 15:24:42 +02:00
|
|
|
longjmp (out, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Parse a single "key = value" assignment into @a object
|
|
|
|
static bool
|
|
|
|
config_parser_parse_kv_pair (struct config_parser *self,
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *object, jmp_buf out)
|
2015-05-01 15:24:42 +02:00
|
|
|
{
|
|
|
|
char *volatile key = NULL;
|
|
|
|
jmp_buf err;
|
|
|
|
|
|
|
|
if (setjmp (err))
|
|
|
|
{
|
|
|
|
free (key);
|
|
|
|
longjmp (out, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
SKIP_NL ();
|
|
|
|
|
|
|
|
// Either this object's closing right brace if called recursively,
|
|
|
|
// or end of file when called on a whole configuration file
|
|
|
|
if (PEEK () == CONFIG_T_RBRACE
|
|
|
|
|| PEEK () == CONFIG_T_ABORT)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
EXPECT (CONFIG_T_WORD);
|
|
|
|
key = xstrdup (self->tokenizer.string.str);
|
|
|
|
SKIP_NL ();
|
|
|
|
|
|
|
|
EXPECT (CONFIG_T_EQUALS);
|
|
|
|
SKIP_NL ();
|
|
|
|
|
|
|
|
str_map_set (&object->value.object, key,
|
|
|
|
config_parser_parse_value (self, err));
|
|
|
|
|
|
|
|
free (key);
|
|
|
|
key = NULL;
|
|
|
|
|
|
|
|
if (PEEK () == CONFIG_T_RBRACE
|
|
|
|
|| PEEK () == CONFIG_T_ABORT)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
EXPECT (CONFIG_T_NEWLINE);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Parse the inside of an object definition
|
2015-08-17 00:08:19 +02:00
|
|
|
static struct config_item *
|
2015-05-01 15:24:42 +02:00
|
|
|
config_parser_parse_object (struct config_parser *self, jmp_buf out)
|
|
|
|
{
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *volatile object = config_item_object ();
|
2015-05-01 15:24:42 +02:00
|
|
|
jmp_buf err;
|
|
|
|
|
|
|
|
if (setjmp (err))
|
|
|
|
{
|
|
|
|
config_item_destroy (object);
|
|
|
|
longjmp (out, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
while (config_parser_parse_kv_pair (self, object, err))
|
|
|
|
;
|
|
|
|
return object;
|
|
|
|
}
|
|
|
|
|
|
|
|
#undef PEEK
|
|
|
|
#undef ACCEPT
|
|
|
|
#undef EXPECT
|
|
|
|
#undef SKIP_NL
|
|
|
|
|
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
/// Parse a configuration snippet either as an object or a bare value.
|
|
|
|
/// If it's the latter (@a single_value_only), no newlines may follow.
|
2015-08-17 00:08:19 +02:00
|
|
|
static struct config_item *
|
2015-05-01 15:24:42 +02:00
|
|
|
config_item_parse (const char *script, size_t len,
|
|
|
|
bool single_value_only, struct error **e)
|
|
|
|
{
|
|
|
|
struct config_parser parser;
|
|
|
|
config_parser_init (&parser, script, len);
|
|
|
|
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *volatile object = NULL;
|
2015-05-01 15:24:42 +02:00
|
|
|
jmp_buf err;
|
|
|
|
|
|
|
|
if (setjmp (err))
|
|
|
|
{
|
|
|
|
if (object)
|
|
|
|
{
|
|
|
|
config_item_destroy (object);
|
|
|
|
object = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
error_propagate (e, parser.error);
|
|
|
|
parser.error = NULL;
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (single_value_only)
|
2015-05-01 18:39:38 +02:00
|
|
|
{
|
|
|
|
// This is really only intended for in-program configuration
|
|
|
|
// and telling the line number would look awkward
|
|
|
|
parser.tokenizer.report_line = false;
|
2015-05-01 15:24:42 +02:00
|
|
|
object = config_parser_parse_value (&parser, err);
|
2015-05-01 18:39:38 +02:00
|
|
|
}
|
2015-05-01 15:24:42 +02:00
|
|
|
else
|
|
|
|
object = config_parser_parse_object (&parser, err);
|
|
|
|
config_parser_expect (&parser, CONFIG_T_ABORT, err);
|
|
|
|
end:
|
|
|
|
config_parser_free (&parser);
|
|
|
|
return object;
|
|
|
|
}
|
|
|
|
|
2015-05-03 19:11:57 +02:00
|
|
|
/// Clone an item. Schema assignments aren't retained.
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *
|
|
|
|
config_item_clone (struct config_item *self)
|
2015-05-03 19:11:57 +02:00
|
|
|
{
|
|
|
|
// Oh well, it saves code
|
|
|
|
struct str tmp;
|
|
|
|
str_init (&tmp);
|
|
|
|
config_item_write (self, false, &tmp);
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *result =
|
2015-05-03 19:11:57 +02:00
|
|
|
config_item_parse (tmp.str, tmp.len, true, NULL);
|
|
|
|
str_free (&tmp);
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2015-05-01 15:24:42 +02:00
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
2015-05-02 20:43:01 +02:00
|
|
|
|
|
|
|
static void
|
2015-07-05 02:13:15 +02:00
|
|
|
config_schema_initialize_item (struct config_schema *schema,
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *parent, void *user_data)
|
2015-05-02 20:43:01 +02:00
|
|
|
{
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *item =
|
2015-07-05 02:13:15 +02:00
|
|
|
str_map_find (&parent->value.object, schema->name);
|
2015-05-02 20:43:01 +02:00
|
|
|
|
2015-05-02 21:10:39 +02:00
|
|
|
bool replace = true;
|
|
|
|
if (item)
|
|
|
|
{
|
2015-05-08 23:26:42 +02:00
|
|
|
// FIXME: either do this silently or tell about it via a callback
|
|
|
|
// or just store it in an output vector; don't print it directly
|
2015-05-02 21:10:39 +02:00
|
|
|
struct error *e = NULL;
|
|
|
|
replace = !config_item_validate_by_schema (item, schema, &e);
|
|
|
|
if (e)
|
2015-05-02 20:43:01 +02:00
|
|
|
{
|
2015-05-02 21:10:39 +02:00
|
|
|
print_error ("resetting configuration item "
|
|
|
|
"`%s' to default: %s", schema->name, e->message);
|
|
|
|
error_free (e);
|
2015-05-02 20:43:01 +02:00
|
|
|
}
|
2015-05-02 21:10:39 +02:00
|
|
|
}
|
2015-05-02 20:43:01 +02:00
|
|
|
|
2015-05-02 21:10:39 +02:00
|
|
|
if (replace)
|
|
|
|
{
|
|
|
|
struct error *e = NULL;
|
2015-05-02 21:56:05 +02:00
|
|
|
if (schema->default_)
|
|
|
|
item = config_item_parse
|
|
|
|
(schema->default_, strlen (schema->default_), true, &e);
|
|
|
|
else
|
|
|
|
item = config_item_null ();
|
|
|
|
|
|
|
|
if (e || !config_item_validate_by_schema (item, schema, &e))
|
2015-05-02 21:10:39 +02:00
|
|
|
exit_fatal ("invalid default for `%s': %s",
|
|
|
|
schema->name, e->message);
|
|
|
|
|
2015-05-02 21:56:05 +02:00
|
|
|
// This will free the old item if there was any
|
2015-07-05 02:13:15 +02:00
|
|
|
str_map_set (&parent->value.object, schema->name, item);
|
2015-05-02 21:10:39 +02:00
|
|
|
}
|
2015-05-02 20:43:01 +02:00
|
|
|
|
2015-05-02 21:10:39 +02:00
|
|
|
// Make sure the string subtype fits the schema
|
|
|
|
if (config_item_type_is_string (item->type)
|
|
|
|
&& config_item_type_is_string (schema->type))
|
2015-05-02 20:43:01 +02:00
|
|
|
item->type = schema->type;
|
|
|
|
|
2015-05-02 21:10:39 +02:00
|
|
|
item->schema = schema;
|
2015-07-05 01:56:00 +02:00
|
|
|
item->user_data = user_data;
|
2015-05-02 21:10:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2015-07-05 01:56:00 +02:00
|
|
|
config_schema_apply_to_object (struct config_schema *schema_array,
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *object, void *user_data)
|
2015-05-02 21:10:39 +02:00
|
|
|
{
|
|
|
|
hard_assert (object->type == CONFIG_ITEM_OBJECT);
|
|
|
|
while (schema_array->name)
|
2015-07-05 02:13:15 +02:00
|
|
|
config_schema_initialize_item (schema_array++, object, user_data);
|
2015-05-02 20:43:01 +02:00
|
|
|
}
|
|
|
|
|
2015-07-05 15:57:53 +02:00
|
|
|
static void
|
2015-08-17 00:08:19 +02:00
|
|
|
config_schema_call_changed (struct config_item *item)
|
2015-07-05 15:57:53 +02:00
|
|
|
{
|
|
|
|
if (item->type == CONFIG_ITEM_OBJECT)
|
|
|
|
{
|
|
|
|
struct str_map_iter iter;
|
|
|
|
str_map_iter_init (&iter, &item->value.object);
|
|
|
|
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *child;
|
2015-07-05 15:57:53 +02:00
|
|
|
while ((child = str_map_iter_next (&iter)))
|
|
|
|
config_schema_call_changed (child);
|
|
|
|
}
|
|
|
|
else if (item->schema && item->schema->on_change)
|
|
|
|
item->schema->on_change (item);
|
|
|
|
}
|
|
|
|
|
2015-05-02 20:43:01 +02:00
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
2015-05-01 15:24:42 +02:00
|
|
|
|
2015-12-11 01:11:09 +01:00
|
|
|
// XXX: the callbacks may be overdesigned and of little to no practical use
|
2015-05-02 03:45:23 +02:00
|
|
|
|
2015-05-01 15:24:42 +02:00
|
|
|
typedef void (*config_module_load_fn)
|
2015-08-17 00:08:19 +02:00
|
|
|
(struct config_item *subtree, void *user_data);
|
2015-05-01 15:24:42 +02:00
|
|
|
|
|
|
|
struct config_module
|
|
|
|
{
|
|
|
|
char *name; ///< Name of the subtree
|
|
|
|
config_module_load_fn loader; ///< Module config subtree loader
|
|
|
|
void *user_data; ///< User data
|
|
|
|
};
|
|
|
|
|
2015-05-02 03:45:23 +02:00
|
|
|
static void
|
|
|
|
config_module_destroy (struct config_module *self)
|
|
|
|
{
|
|
|
|
free (self->name);
|
|
|
|
free (self);
|
|
|
|
}
|
|
|
|
|
2015-05-01 15:24:42 +02:00
|
|
|
struct config
|
|
|
|
{
|
|
|
|
struct str_map modules; ///< Toplevel modules
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *root; ///< CONFIG_ITEM_OBJECT
|
2015-05-01 15:24:42 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
static void
|
|
|
|
config_init (struct config *self)
|
|
|
|
{
|
2015-05-02 03:45:23 +02:00
|
|
|
memset (self, 0, sizeof *self);
|
|
|
|
str_map_init (&self->modules);
|
2015-12-11 01:11:09 +01:00
|
|
|
self->modules.free = (str_map_free_fn) config_module_destroy;
|
2015-05-01 15:24:42 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
config_free (struct config *self)
|
|
|
|
{
|
2015-05-02 03:45:23 +02:00
|
|
|
str_map_free (&self->modules);
|
|
|
|
if (self->root)
|
|
|
|
config_item_destroy (self->root);
|
2015-05-01 15:24:42 +02:00
|
|
|
}
|
|
|
|
|
2015-05-02 03:45:23 +02:00
|
|
|
static void
|
|
|
|
config_register_module (struct config *self,
|
|
|
|
const char *name, config_module_load_fn loader, void *user_data)
|
2015-05-01 15:24:42 +02:00
|
|
|
{
|
2015-12-11 01:11:09 +01:00
|
|
|
struct config_module *module = xcalloc (1, sizeof *module);
|
2015-05-02 03:45:23 +02:00
|
|
|
module->name = xstrdup (name);
|
|
|
|
module->loader = loader;
|
|
|
|
module->user_data = user_data;
|
|
|
|
|
|
|
|
str_map_set (&self->modules, name, module);
|
2015-05-01 15:24:42 +02:00
|
|
|
}
|
|
|
|
|
2015-05-02 15:07:14 +02:00
|
|
|
static void
|
2015-08-17 00:08:19 +02:00
|
|
|
config_load (struct config *self, struct config_item *root)
|
2015-05-01 15:24:42 +02:00
|
|
|
{
|
2015-05-02 15:07:14 +02:00
|
|
|
hard_assert (root->type == CONFIG_ITEM_OBJECT);
|
2015-12-11 01:11:09 +01:00
|
|
|
if (self->root)
|
|
|
|
config_item_destroy (self->root);
|
2015-05-02 21:56:05 +02:00
|
|
|
self->root = root;
|
2015-05-02 15:07:14 +02:00
|
|
|
|
|
|
|
struct str_map_iter iter;
|
|
|
|
str_map_iter_init (&iter, &self->modules);
|
|
|
|
|
|
|
|
struct config_module *module;
|
|
|
|
while ((module = str_map_iter_next (&iter)))
|
|
|
|
{
|
2015-08-17 00:08:19 +02:00
|
|
|
struct config_item *subtree = str_map_find
|
2015-05-02 15:07:14 +02:00
|
|
|
(&root->value.object, module->name);
|
|
|
|
// Silently fix inputs that only a lunatic user could create
|
|
|
|
if (!subtree || subtree->type != CONFIG_ITEM_OBJECT)
|
|
|
|
{
|
|
|
|
subtree = config_item_object ();
|
|
|
|
str_map_set (&root->value.object, module->name, subtree);
|
|
|
|
}
|
2015-07-05 01:11:20 +02:00
|
|
|
if (module->loader)
|
|
|
|
module->loader (subtree, module->user_data);
|
2015-05-02 15:07:14 +02:00
|
|
|
}
|
2015-05-01 15:24:42 +02:00
|
|
|
}
|