2 conf.c -- configuration code
3 Copyright (C) 1998 Robert van der Meulen
4 1998-2002 Ivo Timmermans <itimmermans@bigfoot.com>
5 2000-2002 Guus Sliepen <guus@sliepen.warande.net>
6 2000 Cris van Pelt <tribbel@arise.dhs.org>
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
22 $Id: conf.c,v 1.9.4.52 2002/02/10 21:57:53 guus Exp $
35 #include <sys/types.h>
41 #include <utils.h> /* for cp */
45 #include "netutl.h" /* for str2address */
49 avl_tree_t *config_tree;
52 int pingtimeout = 0; /* seconds before timeout */
53 char *confbase = NULL; /* directory in which all config files are */
54 char *netname = NULL; /* name of the vpn network */
56 int config_compare(config_t *a, config_t *b)
60 result = strcmp(a->variable, b->variable);
65 result = a->line - b->line;
70 return strcmp(a->file, b->file);
73 void init_configuration(avl_tree_t **config_tree)
76 *config_tree = avl_alloc_tree((avl_compare_t)config_compare, (avl_action_t)free_config);
80 void exit_configuration(avl_tree_t **config_tree)
83 avl_delete_tree(*config_tree);
88 config_t *new_config(void)
92 cfg = (config_t *)xmalloc_and_zero(sizeof(*cfg));
97 void free_config(config_t *cfg)
110 void config_add(avl_tree_t *config_tree, config_t *cfg)
113 avl_insert(config_tree, cfg);
117 config_t *lookup_config(avl_tree_t *config_tree, char *variable)
119 config_t cfg, *found;
121 cfg.variable = variable;
125 found = avl_search_closest_greater(config_tree, &cfg);
130 if(strcmp(found->variable, variable))
136 config_t *lookup_config_next(avl_tree_t *config_tree, config_t *cfg)
141 node = avl_search_node(config_tree, cfg);
147 found = (config_t *)node->next->data;
148 if(!strcmp(found->variable, cfg->variable))
156 int get_config_bool(config_t *cfg, int *result)
162 if(!strcasecmp(cfg->value, "yes"))
167 else if(!strcasecmp(cfg->value, "no"))
173 syslog(LOG_ERR, _("\"yes\" or \"no\" expected for configuration variable %s in %s line %d"),
174 cfg->variable, cfg->file, cfg->line);
179 int get_config_int(config_t *cfg, int *result)
185 if(sscanf(cfg->value, "%d", result) == 1)
188 syslog(LOG_ERR, _("Integer expected for configuration variable %s in %s line %d"),
189 cfg->variable, cfg->file, cfg->line);
193 int get_config_string(config_t *cfg, char **result)
199 *result = cfg->value;
203 int get_config_address(config_t *cfg, ipv4_t **result)
210 ip = xmalloc(sizeof(*ip));
211 *ip = str2address(cfg->value);
219 syslog(LOG_ERR, _("IP address expected for configuration variable %s in %s line %d"),
220 cfg->variable, cfg->file, cfg->line);
224 int get_config_port(config_t *cfg, port_t *result)
230 if(sscanf(cfg->value, "%hu", result) == 1)
233 syslog(LOG_ERR, _("Port number expected for configuration variable %s in %s line %d"),
234 cfg->variable, cfg->file, cfg->line);
238 int get_config_subnet(config_t *cfg, subnet_t **result)
245 subnet = str2net(cfg->value);
249 syslog(LOG_ERR, _("Subnet expected for configuration variable %s in %s line %d"),
250 cfg->variable, cfg->file, cfg->line);
254 /* Teach newbies what subnets are... */
256 if(subnet->type == SUBNET_IPV4)
257 if((subnet->net.ipv4.address & subnet->net.ipv4.mask) != subnet->net.ipv4.address)
259 syslog(LOG_ERR, _("Network address and mask length do not match for configuration variable %s in %s line %d"),
260 cfg->variable, cfg->file, cfg->line);
271 Read exactly one line and strip the trailing newline if any. If the
272 file was on EOF, return NULL. Otherwise, return all the data in a
273 dynamically allocated buffer.
275 If line is non-NULL, it will be used as an initial buffer, to avoid
276 unnecessary mallocing each time this function is called. If buf is
277 given, and buf needs to be expanded, the var pointed to by buflen
280 char *readline(FILE *fp, char **buf, size_t *buflen)
282 char *newline = NULL;
284 char *line; /* The array that contains everything that has been read
286 char *idx; /* Read into this pointer, which points to an offset
288 size_t size, newsize; /* The size of the current array pointed to by
290 size_t maxlen; /* Maximum number of characters that may be read with
291 fgets. This is newsize - oldsize. */
296 if((buf != NULL) && (buflen != NULL))
304 line = xmalloc(size);
313 p = fgets(idx, maxlen, fp);
314 if(p == NULL) /* EOF or error */
319 /* otherwise: error; let the calling function print an error
320 message if applicable */
325 newline = strchr(p, '\n');
327 /* We haven't yet read everything to the end of the line */
330 line = xrealloc(line, newsize);
331 idx = &line[size - 1];
332 maxlen = newsize - size + 1;
337 *newline = '\0'; /* kill newline */
342 if((buf != NULL) && (buflen != NULL))
351 Parse a configuration file and put the results in the configuration tree
354 int read_config_file(avl_tree_t *config_tree, const char *fname)
356 int err = -2; /* Parse error */
359 char *variable, *value;
360 int lineno = 0, ignore = 0;
365 if((fp = fopen (fname, "r")) == NULL)
367 syslog(LOG_ERR, _("Cannot open config file %s: %m"), fname);
372 buffer = xmalloc(bufsize);
376 if((line = readline(fp, &buffer, &bufsize)) == NULL)
390 if((variable = strtok(line, "\t =")) == NULL)
391 continue; /* no tokens on this line */
393 if(variable[0] == '#')
394 continue; /* comment: ignore */
396 if(!strcmp(variable, "-----BEGIN"))
401 if(((value = strtok(NULL, "\t\n\r =")) == NULL) || value[0] == '#')
403 syslog(LOG_ERR, _("No value for variable `%s' on line %d while reading config file %s"),
404 variable, lineno, fname);
409 cfg->variable = xstrdup(variable);
410 cfg->value = xstrdup(value);
411 cfg->file = xstrdup(fname);
414 config_add(config_tree, cfg);
417 if(!strcmp(variable, "-----END"))
427 int read_server_config()
432 asprintf(&fname, "%s/tinc.conf", confbase);
433 x = read_config_file(config_tree, fname);
434 if(x == -1) /* System error: complain */
436 syslog(LOG_ERR, _("Failed to read `%s': %m"),
444 int isadir(const char* f)
451 return S_ISDIR(s.st_mode);
454 int is_safe_path(const char *file)
464 syslog(LOG_ERR, _("`%s' is not an absolute path"), file);
468 p = strrchr(file, '/');
470 if(p == file) /* It's in the root */
480 syslog(LOG_ERR, _("Couldn't stat `%s': %m"),
485 if(s.st_uid != geteuid())
487 syslog(LOG_ERR, _("`%s' is owned by UID %d instead of %d"),
488 f, s.st_uid, geteuid());
492 if(S_ISLNK(s.st_mode))
494 syslog(LOG_WARNING, _("Warning: `%s' is a symlink"),
497 if(readlink(f, l, MAXBUFSIZE) < 0)
499 syslog(LOG_ERR, _("Unable to read symbolic link `%s': %m"), f);
511 if(lstat(f, &s) < 0 && errno != ENOENT)
513 syslog(LOG_ERR, _("Couldn't stat `%s': %m"),
521 if(s.st_uid != geteuid())
523 syslog(LOG_ERR, _("`%s' is owned by UID %d instead of %d"),
524 f, s.st_uid, geteuid());
528 if(S_ISLNK(s.st_mode))
530 syslog(LOG_WARNING, _("Warning: `%s' is a symlink"),
533 if(readlink(f, l, MAXBUFSIZE) < 0)
535 syslog(LOG_ERR, _("Unable to read symbolic link `%s': %m"), f);
545 /* Accessible by others */
546 syslog(LOG_ERR, _("`%s' has unsecure permissions"),
554 FILE *ask_and_safe_open(const char* filename, const char* what, const char* mode)
560 /* Check stdin and stdout */
561 if(!isatty(0) || !isatty(1))
563 /* Argh, they are running us from a script or something. Write
564 the files to the current directory and let them burn in hell
566 fn = xstrdup(filename);
570 /* Ask for a file and/or directory name. */
571 fprintf(stdout, _("Please enter a file to save %s to [%s]: "),
575 if((fn = readline(stdin, NULL, NULL)) == NULL)
577 fprintf(stderr, _("Error while reading stdin: %s\n"), strerror(errno));
582 /* User just pressed enter. */
583 fn = xstrdup(filename);
586 if((strchr(fn, '/') == NULL) || (fn[0] != '/'))
588 /* The directory is a relative path or a filename. */
591 directory = get_current_dir_name();
592 asprintf(&p, "%s/%s", directory, fn);
598 umask(0077); /* Disallow everything for group and other */
600 /* Open it first to keep the inode busy */
601 if((r = fopen(fn, mode)) == NULL)
603 fprintf(stderr, _("Error opening file `%s': %s\n"),
604 fn, strerror(errno));
609 /* Then check the file for nasty attacks */
610 if(!is_safe_path(fn)) /* Do not permit any directories that are
611 readable or writeable by other users. */
613 fprintf(stderr, _("The file `%s' (or any of the leading directories) has unsafe permissions.\n"
614 "I will not create or overwrite this file.\n"),