xref: /netbsd/usr.sbin/mrouted/cfparse.y (revision bf9ec67e)
1 %{
2 /*	$NetBSD: cfparse.y,v 1.7 2001/08/02 03:41:42 itojun Exp $	*/
3 
4 /*
5  * Configuration file parser for mrouted.
6  *
7  * Written by Bill Fenner, NRL, 1994
8  * Copyright (c) 1994
9  * Naval Research Laboratory (NRL/CCS)
10  *                    and the
11  * Defense Advanced Research Projects Agency (DARPA)
12  *
13  * All Rights Reserved.
14  *
15  * Permission to use, copy, modify and distribute this software and its
16  * documentation is hereby granted, provided that both the copyright notice and
17  * this permission notice appear in all copies of the software, derivative
18  * works or modified versions, and any portions thereof, and that both notices
19  * appear in supporting documentation.
20  *
21  * NRL AND DARPA ALLOW FREE USE OF THIS SOFTWARE IN ITS "AS IS" CONDITION AND
22  * DISCLAIM ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER RESULTING FROM
23  * THE USE OF THIS SOFTWARE.
24  */
25 #include <stdio.h>
26 #ifdef __STDC__
27 #include <stdarg.h>
28 #else
29 #include <string.h>
30 #include <varargs.h>
31 #endif
32 #include "defs.h"
33 #include <netdb.h>
34 
35 /*
36  * Local function declarations
37  */
38 static void		fatal __P((char *fmt, ...))
39     __attribute__((__format__(__printf__, 1, 2)));
40 static void		warn __P((char *fmt, ...))
41         __attribute__((__format__(__printf__, 1, 2)));
42 static void		yyerror __P((char *s));
43 static char *		next_word __P((void));
44 static int		yylex __P((void));
45 static u_int32_t	valid_if __P((char *s));
46 static struct ifreq *	ifconfaddr __P((struct ifconf *ifcp, u_int32_t a));
47 int			yyparse __P((void));
48 
49 static FILE *f __attribute__((__unused__));	/* XXX egcs */
50 extern int udp_socket;
51 char *configfilename = _PATH_MROUTED_CONF;
52 
53 extern int cache_lifetime;
54 extern int max_prune_lifetime;
55 
56 static int lineno;
57 static struct ifreq ifbuf[32];
58 static struct ifconf ifc;
59 
60 static struct uvif *v;
61 
62 static int order;
63 
64 struct addrmask {
65 	u_int32_t	addr;
66 	int	mask;
67 };
68 
69 struct boundnam {
70 	char		*name;
71 	struct addrmask	 bound;
72 };
73 
74 #define MAXBOUNDS 20
75 
76 struct boundnam boundlist[MAXBOUNDS];	/* Max. of 20 named boundaries */
77 int numbounds = 0;			/* Number of named boundaries */
78 
79 %}
80 
81 %union
82 {
83 	int num;
84 	char *ptr;
85 	struct addrmask addrmask;
86 	u_int32_t addr;
87 };
88 
89 %token CACHE_LIFETIME PRUNING
90 %token PHYINT TUNNEL NAME
91 %token DISABLE IGMPV1 SRCRT
92 %token METRIC THRESHOLD RATE_LIMIT BOUNDARY NETMASK ALTNET
93 %token SYSNAM SYSCONTACT SYSVERSION SYSLOCATION
94 %token <num> BOOLEAN
95 %token <num> NUMBER
96 %token <ptr> STRING
97 %token <addrmask> ADDRMASK
98 %token <addr> ADDR
99 
100 %type <addr> interface addrname
101 %type <addrmask> bound boundary addrmask
102 
103 %start conf
104 
105 %%
106 
107 conf	: stmts
108 	;
109 
110 stmts	: /* Empty */
111 	| stmts stmt
112 	;
113 
114 stmt	: error
115 	| PHYINT interface 		{
116 
117 			vifi_t vifi;
118 
119 			if (order)
120 			    fatal("phyints must appear before tunnels");
121 
122 			for (vifi = 0, v = uvifs;
123 			     vifi < numvifs;
124 			     ++vifi, ++v)
125 			    if (!(v->uv_flags & VIFF_TUNNEL) &&
126 				$2 == v->uv_lcl_addr)
127 				break;
128 
129 			if (vifi == numvifs)
130 			    fatal("%s is not a configured interface",
131 				inet_fmt($2,s1));
132 
133 					}
134 		ifmods
135 	| TUNNEL interface addrname	{
136 
137 			struct ifreq *ifr;
138 			struct ifreq ffr;
139 			vifi_t vifi;
140 
141 			order++;
142 
143 			ifr = ifconfaddr(&ifc, $2);
144 			if (ifr == 0)
145 			    fatal("Tunnel local address %s is not mine",
146 				inet_fmt($2, s1));
147 
148 			strncpy(ffr.ifr_name, ifr->ifr_name, IFNAMSIZ);
149 			if (ioctl(udp_socket, SIOCGIFFLAGS, (char *)&ffr)<0)
150 			    fatal("ioctl SIOCGIFFLAGS on %s",ffr.ifr_name);
151 			if (ffr.ifr_flags & IFF_LOOPBACK)
152 			    fatal("Tunnel local address %s is a loopback interface",
153 				inet_fmt($2, s1));
154 
155 			if (ifconfaddr(&ifc, $3) != 0)
156 			    fatal("Tunnel remote address %s is one of mine",
157 				inet_fmt($3, s1));
158 
159 			for (vifi = 0, v = uvifs;
160 			     vifi < numvifs;
161 			     ++vifi, ++v)
162 			    if (v->uv_flags & VIFF_TUNNEL) {
163 				if ($3 == v->uv_rmt_addr)
164 				    fatal("Duplicate tunnel to %s",
165 					inet_fmt($3, s1));
166 			    } else if (!(v->uv_flags & VIFF_DISABLED)) {
167 				if (($3 & v->uv_subnetmask) == v->uv_subnet)
168 				    fatal("Unnecessary tunnel to %s",
169 					inet_fmt($3,s1));
170 			    }
171 
172 			if (numvifs == MAXVIFS)
173 			    fatal("too many vifs");
174 
175 			v = &uvifs[numvifs];
176 			v->uv_flags	= VIFF_TUNNEL;
177 			v->uv_metric	= DEFAULT_METRIC;
178 			v->uv_rate_limit= DEFAULT_TUN_RATE_LIMIT;
179 			v->uv_threshold	= DEFAULT_THRESHOLD;
180 			v->uv_lcl_addr	= $2;
181 			v->uv_rmt_addr	= $3;
182 			v->uv_subnet	= 0;
183 			v->uv_subnetmask= 0;
184 			v->uv_subnetbcast= 0;
185 			strncpy(v->uv_name, ffr.ifr_name, IFNAMSIZ);
186 			v->uv_groups	= NULL;
187 			v->uv_neighbors	= NULL;
188 			v->uv_acl	= NULL;
189 			v->uv_addrs	= NULL;
190 
191 			if (!(ffr.ifr_flags & IFF_UP)) {
192 			    v->uv_flags |= VIFF_DOWN;
193 			    vifs_down = TRUE;
194 			}
195 					}
196 		tunnelmods
197 					{
198 			log(LOG_INFO, 0,
199 			    "installing tunnel from %s to %s as vif #%u - rate=%d",
200 			    inet_fmt($2, s1), inet_fmt($3, s2),
201 			    numvifs, v->uv_rate_limit);
202 
203 			++numvifs;
204 					}
205 	| PRUNING BOOLEAN	    { pruning = $2; }
206 	| CACHE_LIFETIME NUMBER     { cache_lifetime = $2;
207 				      max_prune_lifetime = cache_lifetime * 2;
208 				    }
209 	| NAME STRING boundary	    { if (numbounds >= MAXBOUNDS) {
210 					fatal("Too many named boundaries (max %d)", MAXBOUNDS);
211 				      }
212 
213 				      boundlist[numbounds].name = malloc(strlen($2) + 1);
214 				      strcpy(boundlist[numbounds].name, $2);
215 				      boundlist[numbounds++].bound = $3;
216 				    }
217 	| SYSNAM STRING    {
218 #ifdef SNMP
219 			    set_sysName($2);
220 #endif /* SNMP */
221 			    }
222 	| SYSCONTACT STRING {
223 #ifdef SNMP
224 			    set_sysContact($2);
225 #endif /* SNMP */
226 			    }
227         | SYSVERSION STRING {
228 #ifdef SNMP
229 			    set_sysVersion($2);
230 #endif /* SNMP */
231 			    }
232 	| SYSLOCATION STRING {
233 #ifdef SNMP
234 			    set_sysLocation($2);
235 #endif /* SNMP */
236 			    }
237 	;
238 
239 tunnelmods	: /* empty */
240 	| tunnelmods tunnelmod
241 	;
242 
243 tunnelmod	: mod
244 	| SRCRT			{ fatal("Source-route tunnels not supported"); }
245 	;
246 
247 ifmods	: /* empty */
248 	| ifmods ifmod
249 	;
250 
251 ifmod	: mod
252 	| DISABLE		{ v->uv_flags |= VIFF_DISABLED; }
253 	| IGMPV1		{ v->uv_flags |= VIFF_IGMPV1; }
254 	| NETMASK addrname	{
255 				  u_int32_t subnet, mask;
256 
257 				  mask = $2;
258 				  subnet = v->uv_lcl_addr & mask;
259 				  if (!inet_valid_subnet(subnet, mask))
260 					fatal("Invalid netmask");
261 				  v->uv_subnet = subnet;
262 				  v->uv_subnetmask = mask;
263 				  v->uv_subnetbcast = subnet | ~mask;
264 				}
265 	| NETMASK		{
266 
267 		    warn("Expected address after netmask keyword, ignored");
268 
269 				}
270 	| ALTNET addrmask	{
271 
272 		    struct phaddr *ph;
273 
274 		    ph = (struct phaddr *)malloc(sizeof(struct phaddr));
275 		    if (ph == NULL)
276 			fatal("out of memory");
277 		    if ($2.mask) {
278 			VAL_TO_MASK(ph->pa_subnetmask, $2.mask);
279 		    } else
280 			ph->pa_subnetmask = v->uv_subnetmask;
281 		    ph->pa_subnet = $2.addr & ph->pa_subnetmask;
282 		    ph->pa_subnetbcast = ph->pa_subnet | ~ph->pa_subnetmask;
283 		    if ($2.addr & ~ph->pa_subnetmask)
284 			warn("Extra subnet %s/%d has host bits set",
285 				inet_fmt($2.addr,s1), $2.mask);
286 		    ph->pa_next = v->uv_addrs;
287 		    v->uv_addrs = ph;
288 
289 				}
290 	| ALTNET		{
291 
292 		    warn("Expected address after altnet keyword, ignored");
293 
294 				}
295 	;
296 
297 mod	: THRESHOLD NUMBER	{ if ($2 < 1 || $2 > 255)
298 				    fatal("Invalid threshold %d",$2);
299 				  v->uv_threshold = $2;
300 				}
301 	| THRESHOLD		{
302 
303 		    warn("Expected number after threshold keyword, ignored");
304 
305 				}
306 	| METRIC NUMBER		{ if ($2 < 1 || $2 > UNREACHABLE)
307 				    fatal("Invalid metric %d",$2);
308 				  v->uv_metric = $2;
309 				}
310 	| METRIC		{
311 
312 		    warn("Expected number after metric keyword, ignored");
313 
314 				}
315 	| RATE_LIMIT NUMBER	{ if ($2 > MAX_RATE_LIMIT)
316 				    fatal("Invalid rate_limit %d",$2);
317 				  v->uv_rate_limit = $2;
318 				}
319 	| RATE_LIMIT		{
320 
321 		    warn("Expected number after rate_limit keyword, ignored");
322 
323 				}
324 	| BOUNDARY bound	{
325 
326 		    struct vif_acl *v_acl;
327 
328 		    v_acl = (struct vif_acl *)malloc(sizeof(struct vif_acl));
329 		    if (v_acl == NULL)
330 			fatal("out of memory");
331 		    VAL_TO_MASK(v_acl->acl_mask, $2.mask);
332 		    v_acl->acl_addr = $2.addr & v_acl->acl_mask;
333 		    if ($2.addr & ~v_acl->acl_mask)
334 			warn("Boundary spec %s/%d has host bits set",
335 				inet_fmt($2.addr,s1),$2.mask);
336 		    v_acl->acl_next = v->uv_acl;
337 		    v->uv_acl = v_acl;
338 
339 				}
340 	| BOUNDARY		{
341 
342 		warn("Expected boundary spec after boundary keyword, ignored");
343 
344 				}
345 	;
346 
347 interface	: ADDR		{ $$ = $1; }
348 	| STRING		{
349 				  $$ = valid_if($1);
350 				  if ($$ == 0)
351 					fatal("Invalid interface name %s",$1);
352 				}
353 	;
354 
355 addrname	: ADDR		{ $$ = $1; }
356 	| STRING		{ struct hostent *hp;
357 
358 				  if ((hp = gethostbyname($1)) == NULL)
359 				    fatal("No such host %s", $1);
360 
361 				  if (hp->h_addr_list[1])
362 				    fatal("Hostname %s does not %s",
363 					$1, "map to a unique address");
364 
365 				  bcopy(hp->h_addr_list[0], &$$,
366 					    hp->h_length);
367 				}
368 
369 bound	: boundary		{ $$ = $1; }
370 	| STRING		{ int i;
371 
372 				  for (i=0; i < numbounds; i++) {
373 				    if (!strcmp(boundlist[i].name, $1)) {
374 					$$ = boundlist[i].bound;
375 					break;
376 				    }
377 				  }
378 				  if (i == numbounds) {
379 				    fatal("Invalid boundary name %s",$1);
380 				  }
381 				}
382 	;
383 
384 boundary	: ADDRMASK	{
385 
386 			if ((ntohl($1.addr) & 0xff000000) != 0xef000000) {
387 			    fatal("Boundaries must be 239.x.x.x, not %s/%d",
388 				inet_fmt($1.addr, s1), $1.mask);
389 			}
390 			$$ = $1;
391 
392 				}
393 	;
394 
395 addrmask	: ADDRMASK	{ $$ = $1; }
396 	| ADDR			{ $$.addr = $1; $$.mask = 0; }
397 	;
398 %%
399 #ifdef __STDC__
400 static void
401 fatal(char *fmt, ...)
402 {
403 	va_list ap;
404 	char buf[200];
405 
406 	va_start(ap, fmt);
407 #else
408 /*VARARGS1*/
409 static void
410 fatal(fmt, va_alist)
411 char *fmt;
412 va_dcl
413 {
414 	va_list ap;
415 	char buf[200];
416 
417 	va_start(ap);
418 #endif
419 	vsprintf(buf, fmt, ap);
420 	va_end(ap);
421 
422 	log(LOG_ERR,0,"%s: %s near line %d", configfilename, buf, lineno);
423 }
424 
425 #ifdef __STDC__
426 static void
427 warn(char *fmt, ...)
428 {
429 	va_list ap;
430 	char buf[200];
431 
432 	va_start(ap, fmt);
433 #else
434 /*VARARGS1*/
435 static void
436 warn(fmt, va_alist)
437 char *fmt;
438 va_dcl
439 {
440 	va_list ap;
441 	char buf[200];
442 
443 	va_start(ap);
444 #endif
445 	vsprintf(buf, fmt, ap);
446 	va_end(ap);
447 
448 	log(LOG_WARNING,0,"%s: %s near line %d", configfilename, buf, lineno);
449 }
450 
451 static void
452 yyerror(s)
453 char *s;
454 {
455 	log(LOG_ERR, 0, "%s: %s near line %d", configfilename, s, lineno);
456 }
457 
458 static char *
459 next_word()
460 {
461 	static char buf[1024];
462 	static char *p=NULL;
463 	extern FILE *f;
464 	char *q;
465 
466 	while (1) {
467 	    if (!p || !*p) {
468 		lineno++;
469 		if (fgets(buf, sizeof(buf), f) == NULL)
470 		    return NULL;
471 		p = buf;
472 	    }
473 	    while (*p && (*p == ' ' || *p == '\t'))	/* skip whitespace */
474 		p++;
475 	    if (*p == '#') {
476 		p = NULL;		/* skip comments */
477 		continue;
478 	    }
479 	    q = p;
480 #ifdef SNMP
481        if (*p == '"') {
482           p++;
483 	       while (*p && *p != '"' && *p != '\n')
484 		      p++;		/* find next whitespace */
485           if (*p == '"')
486              p++;
487        } else
488 #endif
489 	    while (*p && *p != ' ' && *p != '\t' && *p != '\n')
490 		p++;		/* find next whitespace */
491 	    *p++ = '\0';	/* null-terminate string */
492 
493 	    if (!*q) {
494 		p = NULL;
495 		continue;	/* if 0-length string, read another line */
496 	    }
497 
498 	    return q;
499 	}
500 }
501 
502 static int
503 yylex()
504 {
505 	int n;
506 	u_int32_t addr;
507 	char *q;
508 
509 	if ((q = next_word()) == NULL) {
510 		return 0;
511 	}
512 
513 	if (!strcmp(q,"cache_lifetime"))
514 		return CACHE_LIFETIME;
515 	if (!strcmp(q,"pruning"))
516 		return PRUNING;
517 	if (!strcmp(q,"phyint"))
518 		return PHYINT;
519 	if (!strcmp(q,"tunnel"))
520 		return TUNNEL;
521 	if (!strcmp(q,"disable"))
522 		return DISABLE;
523 	if (!strcmp(q,"metric"))
524 		return METRIC;
525 	if (!strcmp(q,"threshold"))
526 		return THRESHOLD;
527 	if (!strcmp(q,"rate_limit"))
528 		return RATE_LIMIT;
529 	if (!strcmp(q,"srcrt") || !strcmp(q,"sourceroute"))
530 		return SRCRT;
531 	if (!strcmp(q,"boundary"))
532 		return BOUNDARY;
533 	if (!strcmp(q,"netmask"))
534 		return NETMASK;
535 	if (!strcmp(q,"igmpv1"))
536 		return IGMPV1;
537 	if (!strcmp(q,"altnet"))
538 		return ALTNET;
539 	if (!strcmp(q,"name"))
540 		return NAME;
541 	if (!strcmp(q,"on") || !strcmp(q,"yes")) {
542 		yylval.num = 1;
543 		return BOOLEAN;
544 	}
545 	if (!strcmp(q,"off") || !strcmp(q,"no")) {
546 		yylval.num = 0;
547 		return BOOLEAN;
548 	}
549 	if (sscanf(q,"%[.0-9]/%d%c",s1,&n,s2) == 2) {
550 		if ((addr = inet_parse(s1)) != 0xffffffff) {
551 			yylval.addrmask.mask = n;
552 			yylval.addrmask.addr = addr;
553 			return ADDRMASK;
554 		}
555 		/* fall through to returning STRING */
556 	}
557 	if (sscanf(q,"%[.0-9]%c",s1,s2) == 1) {
558 		if ((addr = inet_parse(s1)) != 0xffffffff &&
559 		    inet_valid_host(addr)) {
560 			yylval.addr = addr;
561 			return ADDR;
562 		}
563 	}
564 	if (sscanf(q,"0x%8x%c",&n,s1) == 1) {
565 		yylval.addr = n;
566 		return ADDR;
567 	}
568 	if (sscanf(q,"%d%c",&n,s1) == 1) {
569 		yylval.num = n;
570 		return NUMBER;
571 	}
572 #ifdef SNMP
573 	if (!strcmp(q,"sysName"))
574 		return SYSNAM;
575 	if (!strcmp(q,"sysContact"))
576 		return SYSCONTACT;
577 	if (!strcmp(q,"sysVersion"))
578 		return SYSVERSION;
579 	if (!strcmp(q,"sysLocation"))
580 		return SYSLOCATION;
581    if (*q=='"') {
582       if (q[ strlen(q)-1 ]=='"')
583          q[ strlen(q)-1 ]='\0'; /* trash trailing quote */
584       yylval.ptr = q+1;
585       return STRING;
586    }
587 #endif
588 	yylval.ptr = q;
589 	return STRING;
590 }
591 
592 void
593 config_vifs_from_file()
594 {
595 	extern FILE *f;
596 
597 	order = 0;
598 	numbounds = 0;
599 	lineno = 0;
600 
601 	if ((f = fopen(configfilename, "r")) == NULL) {
602 	    if (errno != ENOENT)
603 		log(LOG_ERR, errno, "can't open %s", configfilename);
604 	    return;
605 	}
606 
607 	ifc.ifc_buf = (char *)ifbuf;
608 	ifc.ifc_len = sizeof(ifbuf);
609 	if (ioctl(udp_socket, SIOCGIFCONF, (char *)&ifc) < 0)
610 	    log(LOG_ERR, errno, "ioctl SIOCGIFCONF");
611 
612 	yyparse();
613 
614 	fclose(f);
615 }
616 
617 static u_int32_t
618 valid_if(s)
619 char *s;
620 {
621 	register vifi_t vifi;
622 	register struct uvif *v;
623 
624 	for (vifi=0, v=uvifs; vifi<numvifs; vifi++, v++)
625 	    if (!strcmp(v->uv_name, s))
626 		return v->uv_lcl_addr;
627 
628 	return 0;
629 }
630 
631 static struct ifreq *
632 ifconfaddr(ifcp, a)
633     struct ifconf *ifcp;
634     u_int32_t a;
635 {
636     int n;
637     struct ifreq *ifrp = (struct ifreq *)ifcp->ifc_buf;
638     struct ifreq *ifend = (struct ifreq *)((char *)ifrp + ifcp->ifc_len);
639 
640     while (ifrp < ifend) {
641 	    if (ifrp->ifr_addr.sa_family == AF_INET &&
642 		((struct sockaddr_in *)&ifrp->ifr_addr)->sin_addr.s_addr == a)
643 		    return (ifrp);
644 #if (defined(BSD) && (BSD >= 199006))
645 		n = ifrp->ifr_addr.sa_len + sizeof(ifrp->ifr_name);
646 		if (n < sizeof(*ifrp))
647 			++ifrp;
648 		else
649 			ifrp = (struct ifreq *)((char *)ifrp + n);
650 #else
651 		++ifrp;
652 #endif
653     }
654     return (0);
655 }
656