mirror of https://github.com/sudo-project/sudo.git
4300 lines
134 KiB
C
4300 lines
134 KiB
C
/*
|
|
* This is an open source non-commercial project. Dear PVS-Studio, please check it.
|
|
* PVS-Studio Static Code Analyzer for C, C++ and C#: http://www.viva64.com
|
|
*/
|
|
|
|
#include <config.h>
|
|
/* A Bison parser, made by GNU Bison 3.8.2. */
|
|
|
|
/* Bison implementation for Yacc-like parsers in C
|
|
|
|
Copyright (C) 1984, 1989-1990, 2000-2015, 2018-2021 Free Software Foundation,
|
|
Inc.
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <https://www.gnu.org/licenses/>. */
|
|
|
|
/* As a special exception, you may create a larger work that contains
|
|
part or all of the Bison parser skeleton and distribute that work
|
|
under terms of your choice, so long as that work isn't itself a
|
|
parser generator using the skeleton or a modified version thereof
|
|
as a parser skeleton. Alternatively, if you modify or redistribute
|
|
the parser skeleton itself, you may (at your option) remove this
|
|
special exception, which will cause the skeleton and the resulting
|
|
Bison output files to be licensed under the GNU General Public
|
|
License without this special exception.
|
|
|
|
This special exception was added by the Free Software Foundation in
|
|
version 2.2 of Bison. */
|
|
|
|
/* C LALR(1) parser skeleton written by Richard Stallman, by
|
|
simplifying the original so-called "semantic" parser. */
|
|
|
|
/* DO NOT RELY ON FEATURES THAT ARE NOT DOCUMENTED in the manual,
|
|
especially those whose name start with YY_ or yy_. They are
|
|
private implementation details that can be changed or removed. */
|
|
|
|
/* All symbols defined below should begin with yy or YY, to avoid
|
|
infringing on user name space. This should be done even for local
|
|
variables, as they might otherwise be expanded by user macros.
|
|
There are some unavoidable exceptions within include files to
|
|
define necessary library symbols; they are noted "INFRINGES ON
|
|
USER NAME SPACE" below. */
|
|
|
|
/* Identify Bison output, and Bison version. */
|
|
#define YYBISON 30802
|
|
|
|
/* Bison version string. */
|
|
#define YYBISON_VERSION "3.8.2"
|
|
|
|
/* Skeleton name. */
|
|
#define YYSKELETON_NAME "yacc.c"
|
|
|
|
/* Pure parsers. */
|
|
#define YYPURE 0
|
|
|
|
/* Push parsers. */
|
|
#define YYPUSH 0
|
|
|
|
/* Pull parsers. */
|
|
#define YYPULL 1
|
|
|
|
|
|
/* Substitute the variable and function names. */
|
|
#define yyparse sudoersparse
|
|
#define yylex sudoerslex
|
|
#define yyerror sudoerserror
|
|
#define yydebug sudoersdebug
|
|
#define yynerrs sudoersnerrs
|
|
#define yylval sudoerslval
|
|
#define yychar sudoerschar
|
|
|
|
/* First part of user prologue. */
|
|
#line 1 "gram.y"
|
|
|
|
/*
|
|
* SPDX-License-Identifier: ISC
|
|
*
|
|
* Copyright (c) 1996, 1998-2005, 2007-2013, 2014-2024
|
|
* Todd C. Miller <Todd.Miller@sudo.ws>
|
|
*
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
* copyright notice and this permission notice appear in all copies.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
*
|
|
* Sponsored in part by the Defense Advanced Research Projects
|
|
* Agency (DARPA) and Air Force Research Laboratory, Air Force
|
|
* Materiel Command, USAF, under agreement number F39502-99-1-0512.
|
|
*/
|
|
|
|
#include <config.h>
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <stddef.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <errno.h>
|
|
|
|
#include <sudoers.h>
|
|
#include <sudo_digest.h>
|
|
#include <toke.h>
|
|
|
|
#ifdef YYBISON
|
|
# define YYERROR_VERBOSE
|
|
#endif
|
|
|
|
/* If we last saw a newline the entry is on the preceding line. */
|
|
#define this_lineno (sudoerschar == '\n' ? sudolineno - 1 : sudolineno)
|
|
|
|
// PVS Studio suppression
|
|
// -V::560, 592, 1037, 1042
|
|
|
|
/*
|
|
* Globals
|
|
*/
|
|
bool parse_error = false;
|
|
|
|
static struct sudoers_parser_config parser_conf =
|
|
SUDOERS_PARSER_CONFIG_INITIALIZER;
|
|
|
|
/* Optional logging function for parse errors. */
|
|
sudoers_logger_t sudoers_error_hook;
|
|
|
|
static int alias_line, alias_column;
|
|
|
|
#ifdef NO_LEAKS
|
|
static struct parser_leak_list parser_leak_list =
|
|
SLIST_HEAD_INITIALIZER(parser_leak_list);
|
|
#endif
|
|
|
|
struct sudoers_parse_tree parsed_policy = {
|
|
{ NULL, NULL }, /* entries */
|
|
TAILQ_HEAD_INITIALIZER(parsed_policy.userspecs),
|
|
TAILQ_HEAD_INITIALIZER(parsed_policy.defaults),
|
|
NULL, /* aliases */
|
|
NULL, /* lhost */
|
|
NULL, /* shost */
|
|
NULL, /* nss */
|
|
NULL /* ctx */
|
|
};
|
|
|
|
/*
|
|
* Local prototypes
|
|
*/
|
|
static void init_options(struct command_options *opts);
|
|
static bool add_defaults(short, struct member *, struct defaults *);
|
|
static bool add_userspec(struct member *, struct privilege *);
|
|
static struct defaults *new_default(char *, char *, short);
|
|
static struct member *new_member(char *, short);
|
|
static struct sudo_command *new_command(char *, char *);
|
|
static struct command_digest *new_digest(unsigned int, char *);
|
|
static void alias_error(const char *name, short type, int errnum);
|
|
|
|
#line 167 "gram.c"
|
|
|
|
# ifndef YY_CAST
|
|
# ifdef __cplusplus
|
|
# define YY_CAST(Type, Val) static_cast<Type> (Val)
|
|
# define YY_REINTERPRET_CAST(Type, Val) reinterpret_cast<Type> (Val)
|
|
# else
|
|
# define YY_CAST(Type, Val) ((Type) (Val))
|
|
# define YY_REINTERPRET_CAST(Type, Val) ((Type) (Val))
|
|
# endif
|
|
# endif
|
|
# ifndef YY_NULLPTR
|
|
# if defined __cplusplus
|
|
# if 201103L <= __cplusplus
|
|
# define YY_NULLPTR nullptr
|
|
# else
|
|
# define YY_NULLPTR 0
|
|
# endif
|
|
# else
|
|
# define YY_NULLPTR ((void*)0)
|
|
# endif
|
|
# endif
|
|
|
|
/* Use api.header.include to #include this header
|
|
instead of duplicating it here. */
|
|
#ifndef YY_SUDOERS_Y_TAB_H_INCLUDED
|
|
# define YY_SUDOERS_Y_TAB_H_INCLUDED
|
|
/* Debug traces. */
|
|
#ifndef YYDEBUG
|
|
# define YYDEBUG 0
|
|
#endif
|
|
#if YYDEBUG
|
|
extern int sudoersdebug;
|
|
#endif
|
|
|
|
/* Token kinds. */
|
|
#ifndef YYTOKENTYPE
|
|
# define YYTOKENTYPE
|
|
enum yytokentype
|
|
{
|
|
YYEMPTY = -2,
|
|
YYEOF = 0, /* "end of file" */
|
|
YYerror = 256, /* error */
|
|
YYUNDEF = 257, /* "invalid token" */
|
|
COMMAND = 258, /* COMMAND */
|
|
ALIAS = 259, /* ALIAS */
|
|
DEFVAR = 260, /* DEFVAR */
|
|
NTWKADDR = 261, /* NTWKADDR */
|
|
NETGROUP = 262, /* NETGROUP */
|
|
USERGROUP = 263, /* USERGROUP */
|
|
WORD = 264, /* WORD */
|
|
DIGEST = 265, /* DIGEST */
|
|
INCLUDE = 266, /* INCLUDE */
|
|
INCLUDEDIR = 267, /* INCLUDEDIR */
|
|
DEFAULTS = 268, /* DEFAULTS */
|
|
DEFAULTS_HOST = 269, /* DEFAULTS_HOST */
|
|
DEFAULTS_USER = 270, /* DEFAULTS_USER */
|
|
DEFAULTS_RUNAS = 271, /* DEFAULTS_RUNAS */
|
|
DEFAULTS_CMND = 272, /* DEFAULTS_CMND */
|
|
NOPASSWD = 273, /* NOPASSWD */
|
|
PASSWD = 274, /* PASSWD */
|
|
NOEXEC = 275, /* NOEXEC */
|
|
EXEC = 276, /* EXEC */
|
|
SETENV = 277, /* SETENV */
|
|
NOSETENV = 278, /* NOSETENV */
|
|
LOG_INPUT = 279, /* LOG_INPUT */
|
|
NOLOG_INPUT = 280, /* NOLOG_INPUT */
|
|
LOG_OUTPUT = 281, /* LOG_OUTPUT */
|
|
NOLOG_OUTPUT = 282, /* NOLOG_OUTPUT */
|
|
MAIL = 283, /* MAIL */
|
|
NOMAIL = 284, /* NOMAIL */
|
|
FOLLOWLNK = 285, /* FOLLOWLNK */
|
|
NOFOLLOWLNK = 286, /* NOFOLLOWLNK */
|
|
INTERCEPT = 287, /* INTERCEPT */
|
|
NOINTERCEPT = 288, /* NOINTERCEPT */
|
|
ALL = 289, /* ALL */
|
|
HOSTALIAS = 290, /* HOSTALIAS */
|
|
CMNDALIAS = 291, /* CMNDALIAS */
|
|
USERALIAS = 292, /* USERALIAS */
|
|
RUNASALIAS = 293, /* RUNASALIAS */
|
|
ERROR = 294, /* ERROR */
|
|
NOMATCH = 295, /* NOMATCH */
|
|
CHROOT = 296, /* CHROOT */
|
|
CWD = 297, /* CWD */
|
|
TYPE = 298, /* TYPE */
|
|
ROLE = 299, /* ROLE */
|
|
APPARMOR_PROFILE = 300, /* APPARMOR_PROFILE */
|
|
PRIVS = 301, /* PRIVS */
|
|
LIMITPRIVS = 302, /* LIMITPRIVS */
|
|
CMND_TIMEOUT = 303, /* CMND_TIMEOUT */
|
|
NOTBEFORE = 304, /* NOTBEFORE */
|
|
NOTAFTER = 305, /* NOTAFTER */
|
|
MYSELF = 306, /* MYSELF */
|
|
SHA224_TOK = 307, /* SHA224_TOK */
|
|
SHA256_TOK = 308, /* SHA256_TOK */
|
|
SHA384_TOK = 309, /* SHA384_TOK */
|
|
SHA512_TOK = 310 /* SHA512_TOK */
|
|
};
|
|
typedef enum yytokentype yytoken_kind_t;
|
|
#endif
|
|
/* Token kinds. */
|
|
#define YYEMPTY -2
|
|
#define YYEOF 0
|
|
#define YYerror 256
|
|
#define YYUNDEF 257
|
|
#define COMMAND 258
|
|
#define ALIAS 259
|
|
#define DEFVAR 260
|
|
#define NTWKADDR 261
|
|
#define NETGROUP 262
|
|
#define USERGROUP 263
|
|
#define WORD 264
|
|
#define DIGEST 265
|
|
#define INCLUDE 266
|
|
#define INCLUDEDIR 267
|
|
#define DEFAULTS 268
|
|
#define DEFAULTS_HOST 269
|
|
#define DEFAULTS_USER 270
|
|
#define DEFAULTS_RUNAS 271
|
|
#define DEFAULTS_CMND 272
|
|
#define NOPASSWD 273
|
|
#define PASSWD 274
|
|
#define NOEXEC 275
|
|
#define EXEC 276
|
|
#define SETENV 277
|
|
#define NOSETENV 278
|
|
#define LOG_INPUT 279
|
|
#define NOLOG_INPUT 280
|
|
#define LOG_OUTPUT 281
|
|
#define NOLOG_OUTPUT 282
|
|
#define MAIL 283
|
|
#define NOMAIL 284
|
|
#define FOLLOWLNK 285
|
|
#define NOFOLLOWLNK 286
|
|
#define INTERCEPT 287
|
|
#define NOINTERCEPT 288
|
|
#define ALL 289
|
|
#define HOSTALIAS 290
|
|
#define CMNDALIAS 291
|
|
#define USERALIAS 292
|
|
#define RUNASALIAS 293
|
|
#define ERROR 294
|
|
#define NOMATCH 295
|
|
#define CHROOT 296
|
|
#define CWD 297
|
|
#define TYPE 298
|
|
#define ROLE 299
|
|
#define APPARMOR_PROFILE 300
|
|
#define PRIVS 301
|
|
#define LIMITPRIVS 302
|
|
#define CMND_TIMEOUT 303
|
|
#define NOTBEFORE 304
|
|
#define NOTAFTER 305
|
|
#define MYSELF 306
|
|
#define SHA224_TOK 307
|
|
#define SHA256_TOK 308
|
|
#define SHA384_TOK 309
|
|
#define SHA512_TOK 310
|
|
|
|
/* Value type. */
|
|
#if ! defined YYSTYPE && ! defined YYSTYPE_IS_DECLARED
|
|
union YYSTYPE
|
|
{
|
|
#line 90 "gram.y"
|
|
|
|
struct cmndspec *cmndspec;
|
|
struct defaults *defaults;
|
|
struct member *member;
|
|
struct runascontainer *runas;
|
|
struct privilege *privilege;
|
|
struct command_digest *digest;
|
|
struct sudo_command command;
|
|
struct command_options options;
|
|
struct cmndtag tag;
|
|
char *string;
|
|
const char *cstring;
|
|
int tok;
|
|
|
|
#line 345 "gram.c"
|
|
|
|
};
|
|
typedef union YYSTYPE YYSTYPE;
|
|
# define YYSTYPE_IS_TRIVIAL 1
|
|
# define YYSTYPE_IS_DECLARED 1
|
|
#endif
|
|
|
|
|
|
extern YYSTYPE sudoerslval;
|
|
|
|
|
|
int sudoersparse (void);
|
|
|
|
|
|
#endif /* !YY_SUDOERS_Y_TAB_H_INCLUDED */
|
|
/* Symbol kind. */
|
|
enum yysymbol_kind_t
|
|
{
|
|
YYSYMBOL_YYEMPTY = -2,
|
|
YYSYMBOL_YYEOF = 0, /* "end of file" */
|
|
YYSYMBOL_YYerror = 1, /* error */
|
|
YYSYMBOL_YYUNDEF = 2, /* "invalid token" */
|
|
YYSYMBOL_COMMAND = 3, /* COMMAND */
|
|
YYSYMBOL_ALIAS = 4, /* ALIAS */
|
|
YYSYMBOL_DEFVAR = 5, /* DEFVAR */
|
|
YYSYMBOL_NTWKADDR = 6, /* NTWKADDR */
|
|
YYSYMBOL_NETGROUP = 7, /* NETGROUP */
|
|
YYSYMBOL_USERGROUP = 8, /* USERGROUP */
|
|
YYSYMBOL_WORD = 9, /* WORD */
|
|
YYSYMBOL_DIGEST = 10, /* DIGEST */
|
|
YYSYMBOL_INCLUDE = 11, /* INCLUDE */
|
|
YYSYMBOL_INCLUDEDIR = 12, /* INCLUDEDIR */
|
|
YYSYMBOL_DEFAULTS = 13, /* DEFAULTS */
|
|
YYSYMBOL_DEFAULTS_HOST = 14, /* DEFAULTS_HOST */
|
|
YYSYMBOL_DEFAULTS_USER = 15, /* DEFAULTS_USER */
|
|
YYSYMBOL_DEFAULTS_RUNAS = 16, /* DEFAULTS_RUNAS */
|
|
YYSYMBOL_DEFAULTS_CMND = 17, /* DEFAULTS_CMND */
|
|
YYSYMBOL_NOPASSWD = 18, /* NOPASSWD */
|
|
YYSYMBOL_PASSWD = 19, /* PASSWD */
|
|
YYSYMBOL_NOEXEC = 20, /* NOEXEC */
|
|
YYSYMBOL_EXEC = 21, /* EXEC */
|
|
YYSYMBOL_SETENV = 22, /* SETENV */
|
|
YYSYMBOL_NOSETENV = 23, /* NOSETENV */
|
|
YYSYMBOL_LOG_INPUT = 24, /* LOG_INPUT */
|
|
YYSYMBOL_NOLOG_INPUT = 25, /* NOLOG_INPUT */
|
|
YYSYMBOL_LOG_OUTPUT = 26, /* LOG_OUTPUT */
|
|
YYSYMBOL_NOLOG_OUTPUT = 27, /* NOLOG_OUTPUT */
|
|
YYSYMBOL_MAIL = 28, /* MAIL */
|
|
YYSYMBOL_NOMAIL = 29, /* NOMAIL */
|
|
YYSYMBOL_FOLLOWLNK = 30, /* FOLLOWLNK */
|
|
YYSYMBOL_NOFOLLOWLNK = 31, /* NOFOLLOWLNK */
|
|
YYSYMBOL_INTERCEPT = 32, /* INTERCEPT */
|
|
YYSYMBOL_NOINTERCEPT = 33, /* NOINTERCEPT */
|
|
YYSYMBOL_ALL = 34, /* ALL */
|
|
YYSYMBOL_HOSTALIAS = 35, /* HOSTALIAS */
|
|
YYSYMBOL_CMNDALIAS = 36, /* CMNDALIAS */
|
|
YYSYMBOL_USERALIAS = 37, /* USERALIAS */
|
|
YYSYMBOL_RUNASALIAS = 38, /* RUNASALIAS */
|
|
YYSYMBOL_39_ = 39, /* ':' */
|
|
YYSYMBOL_40_ = 40, /* '=' */
|
|
YYSYMBOL_41_ = 41, /* ',' */
|
|
YYSYMBOL_42_ = 42, /* '!' */
|
|
YYSYMBOL_43_ = 43, /* '+' */
|
|
YYSYMBOL_44_ = 44, /* '-' */
|
|
YYSYMBOL_45_ = 45, /* '(' */
|
|
YYSYMBOL_46_ = 46, /* ')' */
|
|
YYSYMBOL_47_n_ = 47, /* '\n' */
|
|
YYSYMBOL_ERROR = 48, /* ERROR */
|
|
YYSYMBOL_NOMATCH = 49, /* NOMATCH */
|
|
YYSYMBOL_CHROOT = 50, /* CHROOT */
|
|
YYSYMBOL_CWD = 51, /* CWD */
|
|
YYSYMBOL_TYPE = 52, /* TYPE */
|
|
YYSYMBOL_ROLE = 53, /* ROLE */
|
|
YYSYMBOL_APPARMOR_PROFILE = 54, /* APPARMOR_PROFILE */
|
|
YYSYMBOL_PRIVS = 55, /* PRIVS */
|
|
YYSYMBOL_LIMITPRIVS = 56, /* LIMITPRIVS */
|
|
YYSYMBOL_CMND_TIMEOUT = 57, /* CMND_TIMEOUT */
|
|
YYSYMBOL_NOTBEFORE = 58, /* NOTBEFORE */
|
|
YYSYMBOL_NOTAFTER = 59, /* NOTAFTER */
|
|
YYSYMBOL_MYSELF = 60, /* MYSELF */
|
|
YYSYMBOL_SHA224_TOK = 61, /* SHA224_TOK */
|
|
YYSYMBOL_SHA256_TOK = 62, /* SHA256_TOK */
|
|
YYSYMBOL_SHA384_TOK = 63, /* SHA384_TOK */
|
|
YYSYMBOL_SHA512_TOK = 64, /* SHA512_TOK */
|
|
YYSYMBOL_YYACCEPT = 65, /* $accept */
|
|
YYSYMBOL_file = 66, /* file */
|
|
YYSYMBOL_line = 67, /* line */
|
|
YYSYMBOL_entry = 68, /* entry */
|
|
YYSYMBOL_include = 69, /* include */
|
|
YYSYMBOL_includedir = 70, /* includedir */
|
|
YYSYMBOL_defaults_list = 71, /* defaults_list */
|
|
YYSYMBOL_defaults_entry = 72, /* defaults_entry */
|
|
YYSYMBOL_privileges = 73, /* privileges */
|
|
YYSYMBOL_privilege = 74, /* privilege */
|
|
YYSYMBOL_ophost = 75, /* ophost */
|
|
YYSYMBOL_host = 76, /* host */
|
|
YYSYMBOL_cmndspeclist = 77, /* cmndspeclist */
|
|
YYSYMBOL_cmndspec = 78, /* cmndspec */
|
|
YYSYMBOL_digestspec = 79, /* digestspec */
|
|
YYSYMBOL_digestlist = 80, /* digestlist */
|
|
YYSYMBOL_digcmnd = 81, /* digcmnd */
|
|
YYSYMBOL_opcmnd = 82, /* opcmnd */
|
|
YYSYMBOL_chdirspec = 83, /* chdirspec */
|
|
YYSYMBOL_chrootspec = 84, /* chrootspec */
|
|
YYSYMBOL_timeoutspec = 85, /* timeoutspec */
|
|
YYSYMBOL_notbeforespec = 86, /* notbeforespec */
|
|
YYSYMBOL_notafterspec = 87, /* notafterspec */
|
|
YYSYMBOL_rolespec = 88, /* rolespec */
|
|
YYSYMBOL_typespec = 89, /* typespec */
|
|
YYSYMBOL_apparmor_profilespec = 90, /* apparmor_profilespec */
|
|
YYSYMBOL_privsspec = 91, /* privsspec */
|
|
YYSYMBOL_limitprivsspec = 92, /* limitprivsspec */
|
|
YYSYMBOL_runasspec = 93, /* runasspec */
|
|
YYSYMBOL_runaslist = 94, /* runaslist */
|
|
YYSYMBOL_reserved_word = 95, /* reserved_word */
|
|
YYSYMBOL_reserved_alias = 96, /* reserved_alias */
|
|
YYSYMBOL_options = 97, /* options */
|
|
YYSYMBOL_cmndtag = 98, /* cmndtag */
|
|
YYSYMBOL_cmnd = 99, /* cmnd */
|
|
YYSYMBOL_hostaliases = 100, /* hostaliases */
|
|
YYSYMBOL_hostalias = 101, /* hostalias */
|
|
YYSYMBOL_102_1 = 102, /* $@1 */
|
|
YYSYMBOL_hostlist = 103, /* hostlist */
|
|
YYSYMBOL_cmndaliases = 104, /* cmndaliases */
|
|
YYSYMBOL_cmndalias = 105, /* cmndalias */
|
|
YYSYMBOL_106_2 = 106, /* $@2 */
|
|
YYSYMBOL_cmndlist = 107, /* cmndlist */
|
|
YYSYMBOL_runasaliases = 108, /* runasaliases */
|
|
YYSYMBOL_runasalias = 109, /* runasalias */
|
|
YYSYMBOL_110_3 = 110, /* $@3 */
|
|
YYSYMBOL_useraliases = 111, /* useraliases */
|
|
YYSYMBOL_useralias = 112, /* useralias */
|
|
YYSYMBOL_113_4 = 113, /* $@4 */
|
|
YYSYMBOL_userlist = 114, /* userlist */
|
|
YYSYMBOL_opuser = 115, /* opuser */
|
|
YYSYMBOL_user = 116, /* user */
|
|
YYSYMBOL_grouplist = 117, /* grouplist */
|
|
YYSYMBOL_opgroup = 118, /* opgroup */
|
|
YYSYMBOL_group = 119 /* group */
|
|
};
|
|
typedef enum yysymbol_kind_t yysymbol_kind_t;
|
|
|
|
|
|
|
|
|
|
#ifdef short
|
|
# undef short
|
|
#endif
|
|
|
|
/* On compilers that do not define __PTRDIFF_MAX__ etc., make sure
|
|
<limits.h> and (if available) <stdint.h> are included
|
|
so that the code can choose integer types of a good width. */
|
|
|
|
#ifndef __PTRDIFF_MAX__
|
|
# include <limits.h> /* INFRINGES ON USER NAME SPACE */
|
|
# if defined HAVE_STDINT_H
|
|
# include <stdint.h> /* INFRINGES ON USER NAME SPACE */
|
|
# define YY_STDINT_H
|
|
# endif
|
|
#endif
|
|
|
|
/* Narrow types that promote to a signed type and that can represent a
|
|
signed or unsigned integer of at least N bits. In tables they can
|
|
save space and decrease cache pressure. Promoting to a signed type
|
|
helps avoid bugs in integer arithmetic. */
|
|
|
|
#ifdef __INT_LEAST8_MAX__
|
|
typedef __INT_LEAST8_TYPE__ yytype_int8;
|
|
#elif defined YY_STDINT_H
|
|
typedef int_least8_t yytype_int8;
|
|
#else
|
|
typedef signed char yytype_int8;
|
|
#endif
|
|
|
|
#ifdef __INT_LEAST16_MAX__
|
|
typedef __INT_LEAST16_TYPE__ yytype_int16;
|
|
#elif defined YY_STDINT_H
|
|
typedef int_least16_t yytype_int16;
|
|
#else
|
|
typedef short yytype_int16;
|
|
#endif
|
|
|
|
/* Work around bug in HP-UX 11.23, which defines these macros
|
|
incorrectly for preprocessor constants. This workaround can likely
|
|
be removed in 2023, as HPE has promised support for HP-UX 11.23
|
|
(aka HP-UX 11i v2) only through the end of 2022; see Table 2 of
|
|
<https://h20195.www2.hpe.com/V2/getpdf.aspx/4AA4-7673ENW.pdf>. */
|
|
#ifdef __hpux
|
|
# undef UINT_LEAST8_MAX
|
|
# undef UINT_LEAST16_MAX
|
|
# define UINT_LEAST8_MAX 255
|
|
# define UINT_LEAST16_MAX 65535
|
|
#endif
|
|
|
|
#if defined __UINT_LEAST8_MAX__ && __UINT_LEAST8_MAX__ <= __INT_MAX__
|
|
typedef __UINT_LEAST8_TYPE__ yytype_uint8;
|
|
#elif (!defined __UINT_LEAST8_MAX__ && defined YY_STDINT_H \
|
|
&& UINT_LEAST8_MAX <= INT_MAX)
|
|
typedef uint_least8_t yytype_uint8;
|
|
#elif !defined __UINT_LEAST8_MAX__ && UCHAR_MAX <= INT_MAX
|
|
typedef unsigned char yytype_uint8;
|
|
#else
|
|
typedef short yytype_uint8;
|
|
#endif
|
|
|
|
#if defined __UINT_LEAST16_MAX__ && __UINT_LEAST16_MAX__ <= __INT_MAX__
|
|
typedef __UINT_LEAST16_TYPE__ yytype_uint16;
|
|
#elif (!defined __UINT_LEAST16_MAX__ && defined YY_STDINT_H \
|
|
&& UINT_LEAST16_MAX <= INT_MAX)
|
|
typedef uint_least16_t yytype_uint16;
|
|
#elif !defined __UINT_LEAST16_MAX__ && USHRT_MAX <= INT_MAX
|
|
typedef unsigned short yytype_uint16;
|
|
#else
|
|
typedef int yytype_uint16;
|
|
#endif
|
|
|
|
#ifndef YYPTRDIFF_T
|
|
# if defined __PTRDIFF_TYPE__ && defined __PTRDIFF_MAX__
|
|
# define YYPTRDIFF_T __PTRDIFF_TYPE__
|
|
# define YYPTRDIFF_MAXIMUM __PTRDIFF_MAX__
|
|
# elif defined PTRDIFF_MAX
|
|
# ifndef ptrdiff_t
|
|
# include <stddef.h> /* INFRINGES ON USER NAME SPACE */
|
|
# endif
|
|
# define YYPTRDIFF_T ptrdiff_t
|
|
# define YYPTRDIFF_MAXIMUM PTRDIFF_MAX
|
|
# else
|
|
# define YYPTRDIFF_T long
|
|
# define YYPTRDIFF_MAXIMUM LONG_MAX
|
|
# endif
|
|
#endif
|
|
|
|
#ifndef YYSIZE_T
|
|
# ifdef __SIZE_TYPE__
|
|
# define YYSIZE_T __SIZE_TYPE__
|
|
# elif defined size_t
|
|
# define YYSIZE_T size_t
|
|
# elif defined __STDC_VERSION__ && 199901 <= __STDC_VERSION__
|
|
# include <stddef.h> /* INFRINGES ON USER NAME SPACE */
|
|
# define YYSIZE_T size_t
|
|
# else
|
|
# define YYSIZE_T unsigned
|
|
# endif
|
|
#endif
|
|
|
|
#define YYSIZE_MAXIMUM \
|
|
YY_CAST (YYPTRDIFF_T, \
|
|
(YYPTRDIFF_MAXIMUM < YY_CAST (YYSIZE_T, -1) \
|
|
? YYPTRDIFF_MAXIMUM \
|
|
: YY_CAST (YYSIZE_T, -1)))
|
|
|
|
#define YYSIZEOF(X) YY_CAST (YYPTRDIFF_T, sizeof (X))
|
|
|
|
|
|
/* Stored state numbers (used for stacks). */
|
|
typedef yytype_uint8 yy_state_t;
|
|
|
|
/* State numbers in computations. */
|
|
typedef int yy_state_fast_t;
|
|
|
|
#ifndef YY_
|
|
# if defined YYENABLE_NLS && YYENABLE_NLS
|
|
# if ENABLE_NLS
|
|
# include <libintl.h> /* INFRINGES ON USER NAME SPACE */
|
|
# define YY_(Msgid) dgettext ("bison-runtime", Msgid)
|
|
# endif
|
|
# endif
|
|
# ifndef YY_
|
|
# define YY_(Msgid) Msgid
|
|
# endif
|
|
#endif
|
|
|
|
|
|
#ifndef YY_ATTRIBUTE_PURE
|
|
# if defined __GNUC__ && 2 < __GNUC__ + (96 <= __GNUC_MINOR__)
|
|
# define YY_ATTRIBUTE_PURE __attribute__ ((__pure__))
|
|
# else
|
|
# define YY_ATTRIBUTE_PURE
|
|
# endif
|
|
#endif
|
|
|
|
#ifndef YY_ATTRIBUTE_UNUSED
|
|
# if defined __GNUC__ && 2 < __GNUC__ + (7 <= __GNUC_MINOR__)
|
|
# define YY_ATTRIBUTE_UNUSED __attribute__ ((__unused__))
|
|
# else
|
|
# define YY_ATTRIBUTE_UNUSED
|
|
# endif
|
|
#endif
|
|
|
|
/* Suppress unused-variable warnings by "using" E. */
|
|
#if ! defined lint || defined __GNUC__
|
|
# define YY_USE(E) ((void) (E))
|
|
#else
|
|
# define YY_USE(E) /* empty */
|
|
#endif
|
|
|
|
/* Suppress an incorrect diagnostic about yylval being uninitialized. */
|
|
#if defined __GNUC__ && ! defined __ICC && 406 <= __GNUC__ * 100 + __GNUC_MINOR__
|
|
# if __GNUC__ * 100 + __GNUC_MINOR__ < 407
|
|
# define YY_IGNORE_MAYBE_UNINITIALIZED_BEGIN \
|
|
_Pragma ("GCC diagnostic push") \
|
|
_Pragma ("GCC diagnostic ignored \"-Wuninitialized\"")
|
|
# else
|
|
# define YY_IGNORE_MAYBE_UNINITIALIZED_BEGIN \
|
|
_Pragma ("GCC diagnostic push") \
|
|
_Pragma ("GCC diagnostic ignored \"-Wuninitialized\"") \
|
|
_Pragma ("GCC diagnostic ignored \"-Wmaybe-uninitialized\"")
|
|
# endif
|
|
# define YY_IGNORE_MAYBE_UNINITIALIZED_END \
|
|
_Pragma ("GCC diagnostic pop")
|
|
#else
|
|
# define YY_INITIAL_VALUE(Value) Value
|
|
#endif
|
|
#ifndef YY_IGNORE_MAYBE_UNINITIALIZED_BEGIN
|
|
# define YY_IGNORE_MAYBE_UNINITIALIZED_BEGIN
|
|
# define YY_IGNORE_MAYBE_UNINITIALIZED_END
|
|
#endif
|
|
#ifndef YY_INITIAL_VALUE
|
|
# define YY_INITIAL_VALUE(Value) /* Nothing. */
|
|
#endif
|
|
|
|
#if defined __cplusplus && defined __GNUC__ && ! defined __ICC && 6 <= __GNUC__
|
|
# define YY_IGNORE_USELESS_CAST_BEGIN \
|
|
_Pragma ("GCC diagnostic push") \
|
|
_Pragma ("GCC diagnostic ignored \"-Wuseless-cast\"")
|
|
# define YY_IGNORE_USELESS_CAST_END \
|
|
_Pragma ("GCC diagnostic pop")
|
|
#endif
|
|
#ifndef YY_IGNORE_USELESS_CAST_BEGIN
|
|
# define YY_IGNORE_USELESS_CAST_BEGIN
|
|
# define YY_IGNORE_USELESS_CAST_END
|
|
#endif
|
|
|
|
|
|
#define YY_ASSERT(E) ((void) (0 && (E)))
|
|
|
|
#if !defined yyoverflow
|
|
|
|
/* The parser invokes alloca or malloc; define the necessary symbols. */
|
|
|
|
# ifdef YYSTACK_USE_ALLOCA
|
|
# if YYSTACK_USE_ALLOCA
|
|
# ifdef __GNUC__
|
|
# define YYSTACK_ALLOC __builtin_alloca
|
|
# elif defined __BUILTIN_VA_ARG_INCR
|
|
# include <alloca.h> /* INFRINGES ON USER NAME SPACE */
|
|
# elif defined _AIX
|
|
# define YYSTACK_ALLOC __alloca
|
|
# elif defined _MSC_VER
|
|
# include <malloc.h> /* INFRINGES ON USER NAME SPACE */
|
|
# define alloca _alloca
|
|
# else
|
|
# define YYSTACK_ALLOC alloca
|
|
# if ! defined _ALLOCA_H && ! defined EXIT_SUCCESS
|
|
# include <stdlib.h> /* INFRINGES ON USER NAME SPACE */
|
|
/* Use EXIT_SUCCESS as a witness for stdlib.h. */
|
|
# ifndef EXIT_SUCCESS
|
|
# define EXIT_SUCCESS 0
|
|
# endif
|
|
# endif
|
|
# endif
|
|
# endif
|
|
# endif
|
|
|
|
# ifdef YYSTACK_ALLOC
|
|
/* Pacify GCC's 'empty if-body' warning. */
|
|
# define YYSTACK_FREE(Ptr) do { /* empty */; } while (0)
|
|
# ifndef YYSTACK_ALLOC_MAXIMUM
|
|
/* The OS might guarantee only one guard page at the bottom of the stack,
|
|
and a page size can be as small as 4096 bytes. So we cannot safely
|
|
invoke alloca (N) if N exceeds 4096. Use a slightly smaller number
|
|
to allow for a few compiler-allocated temporary stack slots. */
|
|
# define YYSTACK_ALLOC_MAXIMUM 4032 /* reasonable circa 2006 */
|
|
# endif
|
|
# else
|
|
# define YYSTACK_ALLOC YYMALLOC
|
|
# define YYSTACK_FREE YYFREE
|
|
# ifndef YYSTACK_ALLOC_MAXIMUM
|
|
# define YYSTACK_ALLOC_MAXIMUM YYSIZE_MAXIMUM
|
|
# endif
|
|
# if (defined __cplusplus && ! defined EXIT_SUCCESS \
|
|
&& ! ((defined YYMALLOC || defined malloc) \
|
|
&& (defined YYFREE || defined free)))
|
|
# include <stdlib.h> /* INFRINGES ON USER NAME SPACE */
|
|
# ifndef EXIT_SUCCESS
|
|
# define EXIT_SUCCESS 0
|
|
# endif
|
|
# endif
|
|
# ifndef YYMALLOC
|
|
# define YYMALLOC malloc
|
|
# if ! defined malloc && ! defined EXIT_SUCCESS
|
|
void *malloc (YYSIZE_T); /* INFRINGES ON USER NAME SPACE */
|
|
# endif
|
|
# endif
|
|
# ifndef YYFREE
|
|
# define YYFREE free
|
|
# if ! defined free && ! defined EXIT_SUCCESS
|
|
void free (void *); /* INFRINGES ON USER NAME SPACE */
|
|
# endif
|
|
# endif
|
|
# endif
|
|
#endif /* !defined yyoverflow */
|
|
|
|
#if (! defined yyoverflow \
|
|
&& (! defined __cplusplus \
|
|
|| (defined YYSTYPE_IS_TRIVIAL && YYSTYPE_IS_TRIVIAL)))
|
|
|
|
/* A type that is properly aligned for any stack member. */
|
|
union yyalloc
|
|
{
|
|
yy_state_t yyss_alloc;
|
|
YYSTYPE yyvs_alloc;
|
|
};
|
|
|
|
/* The size of the maximum gap between one aligned stack and the next. */
|
|
# define YYSTACK_GAP_MAXIMUM (YYSIZEOF (union yyalloc) - 1)
|
|
|
|
/* The size of an array large to enough to hold all stacks, each with
|
|
N elements. */
|
|
# define YYSTACK_BYTES(N) \
|
|
((N) * (YYSIZEOF (yy_state_t) + YYSIZEOF (YYSTYPE)) \
|
|
+ YYSTACK_GAP_MAXIMUM)
|
|
|
|
# define YYCOPY_NEEDED 1
|
|
|
|
/* Relocate STACK from its old location to the new one. The
|
|
local variables YYSIZE and YYSTACKSIZE give the old and new number of
|
|
elements in the stack, and YYPTR gives the new location of the
|
|
stack. Advance YYPTR to a properly aligned location for the next
|
|
stack. */
|
|
# define YYSTACK_RELOCATE(Stack_alloc, Stack) \
|
|
do \
|
|
{ \
|
|
YYPTRDIFF_T yynewbytes; \
|
|
YYCOPY (&yyptr->Stack_alloc, Stack, yysize); \
|
|
Stack = &yyptr->Stack_alloc; \
|
|
yynewbytes = yystacksize * YYSIZEOF (*Stack) + YYSTACK_GAP_MAXIMUM; \
|
|
yyptr += yynewbytes / YYSIZEOF (*yyptr); \
|
|
} \
|
|
while (0)
|
|
|
|
#endif
|
|
|
|
#if defined YYCOPY_NEEDED && YYCOPY_NEEDED
|
|
/* Copy COUNT objects from SRC to DST. The source and destination do
|
|
not overlap. */
|
|
# ifndef YYCOPY
|
|
# if defined __GNUC__ && 1 < __GNUC__
|
|
# define YYCOPY(Dst, Src, Count) \
|
|
__builtin_memcpy (Dst, Src, YY_CAST (YYSIZE_T, (Count)) * sizeof (*(Src)))
|
|
# else
|
|
# define YYCOPY(Dst, Src, Count) \
|
|
do \
|
|
{ \
|
|
YYPTRDIFF_T yyi; \
|
|
for (yyi = 0; yyi < (Count); yyi++) \
|
|
(Dst)[yyi] = (Src)[yyi]; \
|
|
} \
|
|
while (0)
|
|
# endif
|
|
# endif
|
|
#endif /* !YYCOPY_NEEDED */
|
|
|
|
/* YYFINAL -- State number of the termination state. */
|
|
#define YYFINAL 90
|
|
/* YYLAST -- Last index in YYTABLE. */
|
|
#define YYLAST 332
|
|
|
|
/* YYNTOKENS -- Number of terminals. */
|
|
#define YYNTOKENS 65
|
|
/* YYNNTS -- Number of nonterminals. */
|
|
#define YYNNTS 55
|
|
/* YYNRULES -- Number of rules. */
|
|
#define YYNRULES 155
|
|
/* YYNSTATES -- Number of states. */
|
|
#define YYNSTATES 256
|
|
|
|
/* YYMAXUTOK -- Last valid token kind. */
|
|
#define YYMAXUTOK 310
|
|
|
|
|
|
/* YYTRANSLATE(TOKEN-NUM) -- Symbol number corresponding to TOKEN-NUM
|
|
as returned by yylex, with out-of-bounds checking. */
|
|
#define YYTRANSLATE(YYX) \
|
|
(0 <= (YYX) && (YYX) <= YYMAXUTOK \
|
|
? YY_CAST (yysymbol_kind_t, yytranslate[YYX]) \
|
|
: YYSYMBOL_YYUNDEF)
|
|
|
|
/* YYTRANSLATE[TOKEN-NUM] -- Symbol number corresponding to TOKEN-NUM
|
|
as returned by yylex. */
|
|
static const yytype_int8 yytranslate[] =
|
|
{
|
|
0, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
47, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 42, 2, 2, 2, 2, 2, 2,
|
|
45, 46, 2, 43, 41, 44, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 39, 2,
|
|
2, 40, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 1, 2, 3, 4,
|
|
5, 6, 7, 8, 9, 10, 11, 12, 13, 14,
|
|
15, 16, 17, 18, 19, 20, 21, 22, 23, 24,
|
|
25, 26, 27, 28, 29, 30, 31, 32, 33, 34,
|
|
35, 36, 37, 38, 48, 49, 50, 51, 52, 53,
|
|
54, 55, 56, 57, 58, 59, 60, 61, 62, 63,
|
|
64
|
|
};
|
|
|
|
#if YYDEBUG
|
|
/* YYRLINE[YYN] -- Source line where rule number YYN was defined. */
|
|
static const yytype_int16 yyrline[] =
|
|
{
|
|
0, 204, 204, 207, 210, 211, 214, 217, 220, 228,
|
|
236, 242, 245, 248, 251, 254, 258, 262, 266, 270,
|
|
276, 279, 285, 288, 294, 295, 302, 311, 320, 330,
|
|
340, 352, 353, 358, 364, 381, 385, 391, 400, 408,
|
|
417, 426, 437, 438, 499, 563, 572, 581, 590, 601,
|
|
602, 609, 612, 626, 630, 636, 652, 668, 673, 677,
|
|
682, 687, 692, 697, 701, 706, 709, 714, 731, 743,
|
|
759, 777, 796, 797, 798, 799, 800, 801, 802, 803,
|
|
804, 805, 806, 809, 815, 818, 823, 828, 837, 846,
|
|
858, 863, 868, 873, 878, 885, 888, 891, 894, 897,
|
|
900, 903, 906, 909, 912, 915, 918, 921, 924, 927,
|
|
930, 933, 938, 952, 961, 982, 1005, 1006, 1009, 1009,
|
|
1021, 1024, 1025, 1032, 1033, 1036, 1036, 1048, 1051, 1052,
|
|
1059, 1060, 1063, 1063, 1075, 1078, 1079, 1082, 1082, 1094,
|
|
1097, 1098, 1105, 1109, 1115, 1124, 1132, 1141, 1150, 1161,
|
|
1162, 1169, 1173, 1179, 1188, 1196
|
|
};
|
|
#endif
|
|
|
|
/** Accessing symbol of state STATE. */
|
|
#define YY_ACCESSING_SYMBOL(State) YY_CAST (yysymbol_kind_t, yystos[State])
|
|
|
|
#if YYDEBUG || 0
|
|
/* The user-facing name of the symbol whose (internal) number is
|
|
YYSYMBOL. No bounds checking. */
|
|
static const char *yysymbol_name (yysymbol_kind_t yysymbol) YY_ATTRIBUTE_UNUSED;
|
|
|
|
/* YYTNAME[SYMBOL-NUM] -- String name of the symbol SYMBOL-NUM.
|
|
First, the terminals, then, starting at YYNTOKENS, nonterminals. */
|
|
static const char *const yytname[] =
|
|
{
|
|
"\"end of file\"", "error", "\"invalid token\"", "COMMAND", "ALIAS",
|
|
"DEFVAR", "NTWKADDR", "NETGROUP", "USERGROUP", "WORD", "DIGEST",
|
|
"INCLUDE", "INCLUDEDIR", "DEFAULTS", "DEFAULTS_HOST", "DEFAULTS_USER",
|
|
"DEFAULTS_RUNAS", "DEFAULTS_CMND", "NOPASSWD", "PASSWD", "NOEXEC",
|
|
"EXEC", "SETENV", "NOSETENV", "LOG_INPUT", "NOLOG_INPUT", "LOG_OUTPUT",
|
|
"NOLOG_OUTPUT", "MAIL", "NOMAIL", "FOLLOWLNK", "NOFOLLOWLNK",
|
|
"INTERCEPT", "NOINTERCEPT", "ALL", "HOSTALIAS", "CMNDALIAS", "USERALIAS",
|
|
"RUNASALIAS", "':'", "'='", "','", "'!'", "'+'", "'-'", "'('", "')'",
|
|
"'\\n'", "ERROR", "NOMATCH", "CHROOT", "CWD", "TYPE", "ROLE",
|
|
"APPARMOR_PROFILE", "PRIVS", "LIMITPRIVS", "CMND_TIMEOUT", "NOTBEFORE",
|
|
"NOTAFTER", "MYSELF", "SHA224_TOK", "SHA256_TOK", "SHA384_TOK",
|
|
"SHA512_TOK", "$accept", "file", "line", "entry", "include",
|
|
"includedir", "defaults_list", "defaults_entry", "privileges",
|
|
"privilege", "ophost", "host", "cmndspeclist", "cmndspec", "digestspec",
|
|
"digestlist", "digcmnd", "opcmnd", "chdirspec", "chrootspec",
|
|
"timeoutspec", "notbeforespec", "notafterspec", "rolespec", "typespec",
|
|
"apparmor_profilespec", "privsspec", "limitprivsspec", "runasspec",
|
|
"runaslist", "reserved_word", "reserved_alias", "options", "cmndtag",
|
|
"cmnd", "hostaliases", "hostalias", "$@1", "hostlist", "cmndaliases",
|
|
"cmndalias", "$@2", "cmndlist", "runasaliases", "runasalias", "$@3",
|
|
"useraliases", "useralias", "$@4", "userlist", "opuser", "user",
|
|
"grouplist", "opgroup", "group", YY_NULLPTR
|
|
};
|
|
|
|
static const char *
|
|
yysymbol_name (yysymbol_kind_t yysymbol)
|
|
{
|
|
return yytname[yysymbol];
|
|
}
|
|
#endif
|
|
|
|
#define YYPACT_NINF (-116)
|
|
|
|
#define yypact_value_is_default(Yyn) \
|
|
((Yyn) == YYPACT_NINF)
|
|
|
|
#define YYTABLE_NINF (-4)
|
|
|
|
#define yytable_value_is_error(Yyn) \
|
|
0
|
|
|
|
/* YYPACT[STATE-NUM] -- Index in YYTABLE of the portion describing
|
|
STATE-NUM. */
|
|
static const yytype_int16 yypact[] =
|
|
{
|
|
174, -29, -116, -116, -116, -116, 35, 38, 11, 239,
|
|
150, 150, 8, -116, 32, 76, 88, 114, 254, -116,
|
|
58, 218, -116, -116, -116, 70, -116, -116, -116, 12,
|
|
13, 136, 73, 14, -116, -116, -116, -116, -116, -116,
|
|
276, -116, -116, 4, 10, 10, -116, -116, -116, -116,
|
|
190, 42, 81, 85, 97, -116, 64, -116, -116, -116,
|
|
52, -116, -116, -116, -116, -116, -116, -116, -116, -116,
|
|
-116, -116, -116, -116, 57, 2, -116, -116, 111, 9,
|
|
-116, -116, 112, 56, -116, -116, 123, 61, -116, -116,
|
|
-116, -116, 150, 62, -116, 75, 90, -116, 130, -116,
|
|
188, 204, 205, -116, 11, -116, -116, 239, 55, 66,
|
|
108, -116, 207, 210, 213, 228, 143, -116, 8, 155,
|
|
175, 239, 32, -116, 209, 8, 76, -116, 211, 150,
|
|
88, -116, 217, 150, 114, -116, -116, 194, -116, 202,
|
|
-116, -116, -116, -116, -116, -116, -116, -116, -116, -116,
|
|
-116, -116, -116, -116, -116, -116, -116, 239, 225, -116,
|
|
8, 227, -116, 150, 229, -116, 150, 229, -116, -116,
|
|
-116, 233, 230, -116, -116, 225, 227, 229, 229, 235,
|
|
232, 121, 202, 240, -116, -116, -116, 255, 238, -116,
|
|
-116, -116, 235, -116, 234, 236, 244, 246, 247, 260,
|
|
261, 262, 263, 264, -116, -116, -116, -116, -116, -116,
|
|
-116, -116, -116, -116, 1, -116, 235, 238, 241, 296,
|
|
297, 298, 299, 300, 302, 303, 304, 305, -116, -116,
|
|
-116, -116, -116, -116, -116, -116, -116, -116, -116, -116,
|
|
-116, -116, -116, -116, -116, -116, -116, -116, -116, -116,
|
|
-116, -116, -116, -116, -116, -116
|
|
};
|
|
|
|
/* YYDEFACT[STATE-NUM] -- Default reduction number in state STATE-NUM.
|
|
Performed when YYTABLE does not specify something else to do. Zero
|
|
means the default is an error. */
|
|
static const yytype_uint8 yydefact[] =
|
|
{
|
|
0, 0, 144, 146, 147, 148, 0, 0, 0, 0,
|
|
0, 0, 0, 145, 0, 0, 0, 0, 0, 6,
|
|
0, 0, 4, 8, 9, 0, 140, 142, 7, 0,
|
|
0, 26, 0, 0, 24, 37, 40, 39, 41, 38,
|
|
0, 121, 35, 0, 0, 0, 114, 113, 115, 112,
|
|
0, 0, 0, 0, 0, 49, 0, 128, 51, 53,
|
|
0, 118, 72, 73, 74, 79, 78, 82, 80, 81,
|
|
75, 76, 77, 83, 0, 0, 116, 125, 0, 0,
|
|
123, 137, 0, 0, 135, 132, 0, 0, 130, 143,
|
|
1, 5, 0, 0, 31, 0, 0, 20, 0, 22,
|
|
0, 0, 0, 27, 0, 15, 36, 0, 0, 0,
|
|
0, 54, 0, 0, 0, 0, 0, 52, 0, 0,
|
|
0, 0, 0, 12, 0, 0, 0, 13, 0, 0,
|
|
0, 11, 0, 0, 0, 14, 141, 0, 10, 65,
|
|
21, 23, 28, 29, 30, 25, 122, 18, 16, 17,
|
|
45, 46, 47, 48, 50, 129, 19, 0, 120, 117,
|
|
0, 127, 124, 0, 139, 136, 0, 134, 131, 33,
|
|
32, 67, 34, 42, 84, 119, 126, 138, 133, 71,
|
|
0, 68, 65, 95, 153, 155, 154, 0, 70, 149,
|
|
151, 66, 0, 43, 0, 0, 0, 0, 0, 0,
|
|
0, 0, 0, 0, 85, 86, 89, 87, 88, 90,
|
|
91, 92, 93, 94, 0, 152, 0, 69, 0, 0,
|
|
0, 0, 0, 0, 0, 0, 0, 0, 96, 97,
|
|
98, 99, 102, 103, 104, 105, 106, 107, 110, 111,
|
|
108, 109, 100, 101, 44, 150, 56, 55, 61, 60,
|
|
62, 63, 64, 57, 58, 59
|
|
};
|
|
|
|
/* YYPGOTO[NTERM-NUM]. */
|
|
static const yytype_int16 yypgoto[] =
|
|
{
|
|
-116, -116, -116, 294, -116, -116, -6, 212, -116, 180,
|
|
214, 278, -116, 137, 206, -116, -115, 267, -116, -116,
|
|
-116, -116, -116, -116, -116, -116, -116, -116, -116, -116,
|
|
-116, -9, -116, -116, 270, -116, 203, -116, -7, -116,
|
|
198, -116, -85, -116, 192, -116, -116, 197, -116, -10,
|
|
237, 310, 138, 115, 145
|
|
};
|
|
|
|
/* YYDEFGOTO[NTERM-NUM]. */
|
|
static const yytype_uint8 yydefgoto[] =
|
|
{
|
|
0, 20, 21, 22, 23, 24, 33, 34, 93, 94,
|
|
41, 42, 172, 173, 55, 56, 57, 58, 204, 205,
|
|
206, 207, 208, 209, 210, 211, 212, 213, 174, 180,
|
|
73, 74, 183, 214, 59, 75, 76, 120, 95, 79,
|
|
80, 124, 60, 87, 88, 132, 83, 84, 128, 25,
|
|
26, 27, 188, 189, 190
|
|
};
|
|
|
|
/* YYTABLE[YYPACT[STATE-NUM]] -- What to do in state STATE-NUM. If
|
|
positive, shift that token. If negative, reduce the rule whose
|
|
number is the opposite. If YYTABLE_NINF, syntax error. */
|
|
static const yytype_int16 yytable[] =
|
|
{
|
|
44, 45, 43, 155, 46, 47, 78, 82, 86, 31,
|
|
48, 46, 47, 96, 98, 31, 31, 48, 28, 228,
|
|
229, 230, 231, 232, 233, 234, 235, 236, 237, 238,
|
|
239, 240, 241, 242, 243, 49, 61, 108, 109, 110,
|
|
161, 122, 49, 50, 29, 107, 32, 30, 126, 123,
|
|
50, 92, 32, 32, 119, 104, 127, 31, 90, 97,
|
|
99, 105, 51, 52, 53, 54, 62, 46, 47, 51,
|
|
52, 53, 54, 48, 35, 176, 36, 37, 103, 38,
|
|
77, 112, 63, 64, 65, 66, 67, 68, 69, 70,
|
|
71, 72, 81, 118, 32, 130, 104, 121, 49, 244,
|
|
134, 137, 147, 131, 39, 116, 50, 104, 135, 138,
|
|
62, 92, 40, 148, 158, 139, 107, 78, 85, 164,
|
|
113, 82, 62, 167, 114, 86, 63, 64, 65, 66,
|
|
67, 68, 69, 70, 71, 72, 115, 140, 63, 64,
|
|
65, 66, 67, 68, 69, 70, 71, 72, 62, 104,
|
|
175, 125, 129, 177, 2, 149, 178, 3, 4, 5,
|
|
192, 181, 92, 133, 63, 64, 65, 66, 67, 68,
|
|
69, 70, 71, 72, -2, 1, 100, 141, 2, 101,
|
|
102, 3, 4, 5, 13, 6, 7, 8, 9, 10,
|
|
11, 12, 18, 46, 47, 169, 104, 142, 35, 48,
|
|
36, 37, 156, 38, 51, 52, 53, 54, 13, 14,
|
|
15, 16, 17, 143, 144, 157, 18, 150, -3, 1,
|
|
151, 19, 2, 152, 49, 3, 4, 5, 39, 6,
|
|
7, 8, 9, 10, 11, 12, 40, 2, 153, 184,
|
|
3, 4, 5, 35, 185, 36, 37, 171, 38, 160,
|
|
246, 163, 13, 14, 15, 16, 17, 166, 2, 184,
|
|
18, 3, 4, 5, 185, 19, 107, 13, 118, 186,
|
|
92, 182, 179, 39, 218, 18, 219, 187, 191, 216,
|
|
35, 40, 36, 37, 220, 38, 221, 222, 13, 186,
|
|
194, 195, 196, 197, 198, 199, 200, 201, 202, 203,
|
|
223, 224, 225, 226, 227, 247, 248, 249, 250, 251,
|
|
39, 252, 253, 254, 255, 91, 145, 170, 106, 193,
|
|
111, 146, 154, 117, 162, 159, 168, 165, 89, 136,
|
|
217, 245, 215
|
|
};
|
|
|
|
static const yytype_uint8 yycheck[] =
|
|
{
|
|
10, 11, 9, 118, 3, 4, 15, 16, 17, 5,
|
|
9, 3, 4, 1, 1, 5, 5, 9, 47, 18,
|
|
19, 20, 21, 22, 23, 24, 25, 26, 27, 28,
|
|
29, 30, 31, 32, 33, 34, 4, 43, 44, 45,
|
|
125, 39, 34, 42, 9, 41, 42, 9, 39, 47,
|
|
42, 41, 42, 42, 60, 41, 47, 5, 0, 47,
|
|
47, 47, 61, 62, 63, 64, 34, 3, 4, 61,
|
|
62, 63, 64, 9, 4, 160, 6, 7, 5, 9,
|
|
4, 39, 50, 51, 52, 53, 54, 55, 56, 57,
|
|
58, 59, 4, 41, 42, 39, 41, 40, 34, 214,
|
|
39, 39, 47, 47, 34, 41, 42, 41, 47, 47,
|
|
34, 41, 42, 47, 121, 40, 41, 126, 4, 129,
|
|
39, 130, 34, 133, 39, 134, 50, 51, 52, 53,
|
|
54, 55, 56, 57, 58, 59, 39, 47, 50, 51,
|
|
52, 53, 54, 55, 56, 57, 58, 59, 34, 41,
|
|
157, 40, 40, 163, 4, 47, 166, 7, 8, 9,
|
|
39, 171, 41, 40, 50, 51, 52, 53, 54, 55,
|
|
56, 57, 58, 59, 0, 1, 40, 47, 4, 43,
|
|
44, 7, 8, 9, 34, 11, 12, 13, 14, 15,
|
|
16, 17, 42, 3, 4, 1, 41, 9, 4, 9,
|
|
6, 7, 47, 9, 61, 62, 63, 64, 34, 35,
|
|
36, 37, 38, 9, 9, 40, 42, 10, 0, 1,
|
|
10, 47, 4, 10, 34, 7, 8, 9, 34, 11,
|
|
12, 13, 14, 15, 16, 17, 42, 4, 10, 4,
|
|
7, 8, 9, 4, 9, 6, 7, 45, 9, 40,
|
|
9, 40, 34, 35, 36, 37, 38, 40, 4, 4,
|
|
42, 7, 8, 9, 9, 47, 41, 34, 41, 34,
|
|
41, 41, 39, 34, 40, 42, 40, 42, 46, 41,
|
|
4, 42, 6, 7, 40, 9, 40, 40, 34, 34,
|
|
50, 51, 52, 53, 54, 55, 56, 57, 58, 59,
|
|
40, 40, 40, 40, 40, 9, 9, 9, 9, 9,
|
|
34, 9, 9, 9, 9, 21, 104, 137, 40, 182,
|
|
50, 107, 116, 56, 126, 122, 134, 130, 18, 92,
|
|
192, 216, 187
|
|
};
|
|
|
|
/* YYSTOS[STATE-NUM] -- The symbol kind of the accessing symbol of
|
|
state STATE-NUM. */
|
|
static const yytype_int8 yystos[] =
|
|
{
|
|
0, 1, 4, 7, 8, 9, 11, 12, 13, 14,
|
|
15, 16, 17, 34, 35, 36, 37, 38, 42, 47,
|
|
66, 67, 68, 69, 70, 114, 115, 116, 47, 9,
|
|
9, 5, 42, 71, 72, 4, 6, 7, 9, 34,
|
|
42, 75, 76, 103, 114, 114, 3, 4, 9, 34,
|
|
42, 61, 62, 63, 64, 79, 80, 81, 82, 99,
|
|
107, 4, 34, 50, 51, 52, 53, 54, 55, 56,
|
|
57, 58, 59, 95, 96, 100, 101, 4, 96, 104,
|
|
105, 4, 96, 111, 112, 4, 96, 108, 109, 116,
|
|
0, 68, 41, 73, 74, 103, 1, 47, 1, 47,
|
|
40, 43, 44, 5, 41, 47, 76, 41, 71, 71,
|
|
71, 99, 39, 39, 39, 39, 41, 82, 41, 71,
|
|
102, 40, 39, 47, 106, 40, 39, 47, 113, 40,
|
|
39, 47, 110, 40, 39, 47, 115, 39, 47, 40,
|
|
47, 47, 9, 9, 9, 72, 75, 47, 47, 47,
|
|
10, 10, 10, 10, 79, 81, 47, 40, 103, 101,
|
|
40, 107, 105, 40, 114, 112, 40, 114, 109, 1,
|
|
74, 45, 77, 78, 93, 103, 107, 114, 114, 39,
|
|
94, 114, 41, 97, 4, 9, 34, 42, 117, 118,
|
|
119, 46, 39, 78, 50, 51, 52, 53, 54, 55,
|
|
56, 57, 58, 59, 83, 84, 85, 86, 87, 88,
|
|
89, 90, 91, 92, 98, 119, 41, 117, 40, 40,
|
|
40, 40, 40, 40, 40, 40, 40, 40, 18, 19,
|
|
20, 21, 22, 23, 24, 25, 26, 27, 28, 29,
|
|
30, 31, 32, 33, 81, 118, 9, 9, 9, 9,
|
|
9, 9, 9, 9, 9, 9
|
|
};
|
|
|
|
/* YYR1[RULE-NUM] -- Symbol kind of the left-hand side of rule RULE-NUM. */
|
|
static const yytype_int8 yyr1[] =
|
|
{
|
|
0, 65, 66, 66, 67, 67, 68, 68, 68, 68,
|
|
68, 68, 68, 68, 68, 68, 68, 68, 68, 68,
|
|
69, 69, 70, 70, 71, 71, 72, 72, 72, 72,
|
|
72, 73, 73, 73, 74, 75, 75, 76, 76, 76,
|
|
76, 76, 77, 77, 78, 79, 79, 79, 79, 80,
|
|
80, 81, 81, 82, 82, 83, 84, 85, 86, 87,
|
|
88, 89, 90, 91, 92, 93, 93, 94, 94, 94,
|
|
94, 94, 95, 95, 95, 95, 95, 95, 95, 95,
|
|
95, 95, 95, 96, 97, 97, 97, 97, 97, 97,
|
|
97, 97, 97, 97, 97, 98, 98, 98, 98, 98,
|
|
98, 98, 98, 98, 98, 98, 98, 98, 98, 98,
|
|
98, 98, 99, 99, 99, 99, 100, 100, 102, 101,
|
|
101, 103, 103, 104, 104, 106, 105, 105, 107, 107,
|
|
108, 108, 110, 109, 109, 111, 111, 113, 112, 112,
|
|
114, 114, 115, 115, 116, 116, 116, 116, 116, 117,
|
|
117, 118, 118, 119, 119, 119
|
|
};
|
|
|
|
/* YYR2[RULE-NUM] -- Number of symbols on the right-hand side of rule RULE-NUM. */
|
|
static const yytype_int8 yyr2[] =
|
|
{
|
|
0, 2, 0, 1, 1, 2, 1, 2, 1, 1,
|
|
3, 3, 3, 3, 3, 3, 4, 4, 4, 4,
|
|
3, 4, 3, 4, 1, 3, 1, 2, 3, 3,
|
|
3, 1, 3, 3, 3, 1, 2, 1, 1, 1,
|
|
1, 1, 1, 3, 4, 3, 3, 3, 3, 1,
|
|
3, 1, 2, 1, 2, 3, 3, 3, 3, 3,
|
|
3, 3, 3, 3, 3, 0, 3, 0, 1, 3,
|
|
2, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
1, 1, 1, 1, 0, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 0, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 1, 1, 1, 1, 1, 3, 0, 4,
|
|
3, 1, 3, 1, 3, 0, 4, 3, 1, 3,
|
|
1, 3, 0, 4, 3, 1, 3, 0, 4, 3,
|
|
1, 3, 1, 2, 1, 1, 1, 1, 1, 1,
|
|
3, 1, 2, 1, 1, 1
|
|
};
|
|
|
|
|
|
enum { YYENOMEM = -2 };
|
|
|
|
#define yyerrok (yyerrstatus = 0)
|
|
#define yyclearin (yychar = YYEMPTY)
|
|
|
|
#define YYACCEPT goto yyacceptlab
|
|
#define YYABORT goto yyabortlab
|
|
#define YYERROR goto yyerrorlab
|
|
#define YYNOMEM goto yyexhaustedlab
|
|
|
|
|
|
#define YYRECOVERING() (!!yyerrstatus)
|
|
|
|
#define YYBACKUP(Token, Value) \
|
|
do \
|
|
if (yychar == YYEMPTY) \
|
|
{ \
|
|
yychar = (Token); \
|
|
yylval = (Value); \
|
|
YYPOPSTACK (yylen); \
|
|
yystate = *yyssp; \
|
|
goto yybackup; \
|
|
} \
|
|
else \
|
|
{ \
|
|
yyerror (YY_("syntax error: cannot back up")); \
|
|
YYERROR; \
|
|
} \
|
|
while (0)
|
|
|
|
/* Backward compatibility with an undocumented macro.
|
|
Use YYerror or YYUNDEF. */
|
|
#define YYERRCODE YYUNDEF
|
|
|
|
|
|
/* Enable debugging if requested. */
|
|
#if YYDEBUG
|
|
|
|
# ifndef YYFPRINTF
|
|
# include <stdio.h> /* INFRINGES ON USER NAME SPACE */
|
|
# define YYFPRINTF fprintf
|
|
# endif
|
|
|
|
# define YYDPRINTF(Args) \
|
|
do { \
|
|
if (yydebug) \
|
|
YYFPRINTF Args; \
|
|
} while (0)
|
|
|
|
|
|
|
|
|
|
# define YY_SYMBOL_PRINT(Title, Kind, Value, Location) \
|
|
do { \
|
|
if (yydebug) \
|
|
{ \
|
|
YYFPRINTF (stderr, "%s ", Title); \
|
|
yy_symbol_print (stderr, \
|
|
Kind, Value); \
|
|
YYFPRINTF (stderr, "\n"); \
|
|
} \
|
|
} while (0)
|
|
|
|
|
|
/*-----------------------------------.
|
|
| Print this symbol's value on YYO. |
|
|
`-----------------------------------*/
|
|
|
|
static void
|
|
yy_symbol_value_print (FILE *yyo,
|
|
yysymbol_kind_t yykind, YYSTYPE const * const yyvaluep)
|
|
{
|
|
FILE *yyoutput = yyo;
|
|
YY_USE (yyoutput);
|
|
if (!yyvaluep)
|
|
return;
|
|
YY_IGNORE_MAYBE_UNINITIALIZED_BEGIN
|
|
YY_USE (yykind);
|
|
YY_IGNORE_MAYBE_UNINITIALIZED_END
|
|
}
|
|
|
|
|
|
/*---------------------------.
|
|
| Print this symbol on YYO. |
|
|
`---------------------------*/
|
|
|
|
static void
|
|
yy_symbol_print (FILE *yyo,
|
|
yysymbol_kind_t yykind, YYSTYPE const * const yyvaluep)
|
|
{
|
|
YYFPRINTF (yyo, "%s %s (",
|
|
yykind < YYNTOKENS ? "token" : "nterm", yysymbol_name (yykind));
|
|
|
|
yy_symbol_value_print (yyo, yykind, yyvaluep);
|
|
YYFPRINTF (yyo, ")");
|
|
}
|
|
|
|
/*------------------------------------------------------------------.
|
|
| yy_stack_print -- Print the state stack from its BOTTOM up to its |
|
|
| TOP (included). |
|
|
`------------------------------------------------------------------*/
|
|
|
|
static void
|
|
yy_stack_print (yy_state_t *yybottom, yy_state_t *yytop)
|
|
{
|
|
YYFPRINTF (stderr, "Stack now");
|
|
for (; yybottom <= yytop; yybottom++)
|
|
{
|
|
int yybot = *yybottom;
|
|
YYFPRINTF (stderr, " %d", yybot);
|
|
}
|
|
YYFPRINTF (stderr, "\n");
|
|
}
|
|
|
|
# define YY_STACK_PRINT(Bottom, Top) \
|
|
do { \
|
|
if (yydebug) \
|
|
yy_stack_print ((Bottom), (Top)); \
|
|
} while (0)
|
|
|
|
|
|
/*------------------------------------------------.
|
|
| Report that the YYRULE is going to be reduced. |
|
|
`------------------------------------------------*/
|
|
|
|
static void
|
|
yy_reduce_print (yy_state_t *yyssp, YYSTYPE *yyvsp,
|
|
int yyrule)
|
|
{
|
|
int yylno = yyrline[yyrule];
|
|
int yynrhs = yyr2[yyrule];
|
|
int yyi;
|
|
YYFPRINTF (stderr, "Reducing stack by rule %d (line %d):\n",
|
|
yyrule - 1, yylno);
|
|
/* The symbols being reduced. */
|
|
for (yyi = 0; yyi < yynrhs; yyi++)
|
|
{
|
|
YYFPRINTF (stderr, " $%d = ", yyi + 1);
|
|
yy_symbol_print (stderr,
|
|
YY_ACCESSING_SYMBOL (+yyssp[yyi + 1 - yynrhs]),
|
|
&yyvsp[(yyi + 1) - (yynrhs)]);
|
|
YYFPRINTF (stderr, "\n");
|
|
}
|
|
}
|
|
|
|
# define YY_REDUCE_PRINT(Rule) \
|
|
do { \
|
|
if (yydebug) \
|
|
yy_reduce_print (yyssp, yyvsp, Rule); \
|
|
} while (0)
|
|
|
|
/* Nonzero means print parse trace. It is left uninitialized so that
|
|
multiple parsers can coexist. */
|
|
int yydebug;
|
|
#else /* !YYDEBUG */
|
|
# define YYDPRINTF(Args) ((void) 0)
|
|
# define YY_SYMBOL_PRINT(Title, Kind, Value, Location)
|
|
# define YY_STACK_PRINT(Bottom, Top)
|
|
# define YY_REDUCE_PRINT(Rule)
|
|
#endif /* !YYDEBUG */
|
|
|
|
|
|
/* YYINITDEPTH -- initial size of the parser's stacks. */
|
|
#ifndef YYINITDEPTH
|
|
# define YYINITDEPTH 200
|
|
#endif
|
|
|
|
/* YYMAXDEPTH -- maximum size the stacks can grow to (effective only
|
|
if the built-in stack extension method is used).
|
|
|
|
Do not make this value too large; the results are undefined if
|
|
YYSTACK_ALLOC_MAXIMUM < YYSTACK_BYTES (YYMAXDEPTH)
|
|
evaluated with infinite-precision integer arithmetic. */
|
|
|
|
#ifndef YYMAXDEPTH
|
|
# define YYMAXDEPTH 10000
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/*-----------------------------------------------.
|
|
| Release the memory associated to this symbol. |
|
|
`-----------------------------------------------*/
|
|
|
|
static void
|
|
yydestruct (const char *yymsg,
|
|
yysymbol_kind_t yykind, YYSTYPE *yyvaluep)
|
|
{
|
|
YY_USE (yyvaluep);
|
|
if (!yymsg)
|
|
yymsg = "Deleting";
|
|
YY_SYMBOL_PRINT (yymsg, yykind, yyvaluep, yylocationp);
|
|
|
|
YY_IGNORE_MAYBE_UNINITIALIZED_BEGIN
|
|
YY_USE (yykind);
|
|
YY_IGNORE_MAYBE_UNINITIALIZED_END
|
|
}
|
|
|
|
|
|
/* Lookahead token kind. */
|
|
int yychar;
|
|
|
|
/* The semantic value of the lookahead symbol. */
|
|
YYSTYPE yylval;
|
|
/* Number of syntax errors so far. */
|
|
int yynerrs;
|
|
|
|
|
|
|
|
|
|
/*----------.
|
|
| yyparse. |
|
|
`----------*/
|
|
|
|
int
|
|
yyparse (void)
|
|
{
|
|
yy_state_fast_t yystate = 0;
|
|
/* Number of tokens to shift before error messages enabled. */
|
|
int yyerrstatus = 0;
|
|
|
|
/* Refer to the stacks through separate pointers, to allow yyoverflow
|
|
to reallocate them elsewhere. */
|
|
|
|
/* Their size. */
|
|
YYPTRDIFF_T yystacksize = YYINITDEPTH;
|
|
|
|
/* The state stack: array, bottom, top. */
|
|
yy_state_t yyssa[YYINITDEPTH];
|
|
yy_state_t *yyss = yyssa;
|
|
yy_state_t *yyssp = yyss;
|
|
|
|
/* The semantic value stack: array, bottom, top. */
|
|
YYSTYPE yyvsa[YYINITDEPTH];
|
|
YYSTYPE *yyvs = yyvsa;
|
|
YYSTYPE *yyvsp = yyvs;
|
|
|
|
int yyn;
|
|
/* The return value of yyparse. */
|
|
int yyresult;
|
|
/* Lookahead symbol kind. */
|
|
yysymbol_kind_t yytoken = YYSYMBOL_YYEMPTY;
|
|
/* The variables used to return semantic value and location from the
|
|
action routines. */
|
|
YYSTYPE yyval;
|
|
|
|
|
|
|
|
#define YYPOPSTACK(N) (yyvsp -= (N), yyssp -= (N))
|
|
|
|
/* The number of symbols on the RHS of the reduced rule.
|
|
Keep to zero when no symbol should be popped. */
|
|
int yylen = 0;
|
|
|
|
YYDPRINTF ((stderr, "Starting parse\n"));
|
|
|
|
yychar = YYEMPTY; /* Cause a token to be read. */
|
|
|
|
goto yysetstate;
|
|
|
|
|
|
/*------------------------------------------------------------.
|
|
| yynewstate -- push a new state, which is found in yystate. |
|
|
`------------------------------------------------------------*/
|
|
yynewstate:
|
|
/* In all cases, when you get here, the value and location stacks
|
|
have just been pushed. So pushing a state here evens the stacks. */
|
|
yyssp++;
|
|
|
|
|
|
/*--------------------------------------------------------------------.
|
|
| yysetstate -- set current state (the top of the stack) to yystate. |
|
|
`--------------------------------------------------------------------*/
|
|
yysetstate:
|
|
YYDPRINTF ((stderr, "Entering state %d\n", yystate));
|
|
YY_ASSERT (0 <= yystate && yystate < YYNSTATES);
|
|
YY_IGNORE_USELESS_CAST_BEGIN
|
|
*yyssp = YY_CAST (yy_state_t, yystate);
|
|
YY_IGNORE_USELESS_CAST_END
|
|
YY_STACK_PRINT (yyss, yyssp);
|
|
|
|
if (yyss + yystacksize - 1 <= yyssp)
|
|
#if !defined yyoverflow && !defined YYSTACK_RELOCATE
|
|
YYNOMEM;
|
|
#else
|
|
{
|
|
/* Get the current used size of the three stacks, in elements. */
|
|
YYPTRDIFF_T yysize = yyssp - yyss + 1;
|
|
|
|
# if defined yyoverflow
|
|
{
|
|
/* Give user a chance to reallocate the stack. Use copies of
|
|
these so that the &'s don't force the real ones into
|
|
memory. */
|
|
yy_state_t *yyss1 = yyss;
|
|
YYSTYPE *yyvs1 = yyvs;
|
|
|
|
/* Each stack pointer address is followed by the size of the
|
|
data in use in that stack, in bytes. This used to be a
|
|
conditional around just the two extra args, but that might
|
|
be undefined if yyoverflow is a macro. */
|
|
yyoverflow (YY_("memory exhausted"),
|
|
&yyss1, yysize * YYSIZEOF (*yyssp),
|
|
&yyvs1, yysize * YYSIZEOF (*yyvsp),
|
|
&yystacksize);
|
|
yyss = yyss1;
|
|
yyvs = yyvs1;
|
|
}
|
|
# else /* defined YYSTACK_RELOCATE */
|
|
/* Extend the stack our own way. */
|
|
if (YYMAXDEPTH <= yystacksize)
|
|
YYNOMEM;
|
|
yystacksize *= 2;
|
|
if (YYMAXDEPTH < yystacksize)
|
|
yystacksize = YYMAXDEPTH;
|
|
|
|
{
|
|
yy_state_t *yyss1 = yyss;
|
|
union yyalloc *yyptr =
|
|
YY_CAST (union yyalloc *,
|
|
YYSTACK_ALLOC (YY_CAST (YYSIZE_T, YYSTACK_BYTES (yystacksize))));
|
|
if (! yyptr)
|
|
YYNOMEM;
|
|
YYSTACK_RELOCATE (yyss_alloc, yyss);
|
|
YYSTACK_RELOCATE (yyvs_alloc, yyvs);
|
|
# undef YYSTACK_RELOCATE
|
|
if (yyss1 != yyssa)
|
|
YYSTACK_FREE (yyss1);
|
|
}
|
|
# endif
|
|
|
|
yyssp = yyss + yysize - 1;
|
|
yyvsp = yyvs + yysize - 1;
|
|
|
|
YY_IGNORE_USELESS_CAST_BEGIN
|
|
YYDPRINTF ((stderr, "Stack size increased to %ld\n",
|
|
YY_CAST (long, yystacksize)));
|
|
YY_IGNORE_USELESS_CAST_END
|
|
|
|
if (yyss + yystacksize - 1 <= yyssp)
|
|
YYABORT;
|
|
}
|
|
#endif /* !defined yyoverflow && !defined YYSTACK_RELOCATE */
|
|
|
|
|
|
if (yystate == YYFINAL)
|
|
YYACCEPT;
|
|
|
|
goto yybackup;
|
|
|
|
|
|
/*-----------.
|
|
| yybackup. |
|
|
`-----------*/
|
|
yybackup:
|
|
/* Do appropriate processing given the current state. Read a
|
|
lookahead token if we need one and don't already have one. */
|
|
|
|
/* First try to decide what to do without reference to lookahead token. */
|
|
yyn = yypact[yystate];
|
|
if (yypact_value_is_default (yyn))
|
|
goto yydefault;
|
|
|
|
/* Not known => get a lookahead token if don't already have one. */
|
|
|
|
/* YYCHAR is either empty, or end-of-input, or a valid lookahead. */
|
|
if (yychar == YYEMPTY)
|
|
{
|
|
YYDPRINTF ((stderr, "Reading a token\n"));
|
|
yychar = yylex ();
|
|
}
|
|
|
|
if (yychar <= YYEOF)
|
|
{
|
|
yychar = YYEOF;
|
|
yytoken = YYSYMBOL_YYEOF;
|
|
YYDPRINTF ((stderr, "Now at end of input.\n"));
|
|
}
|
|
else if (yychar == YYerror)
|
|
{
|
|
/* The scanner already issued an error message, process directly
|
|
to error recovery. But do not keep the error token as
|
|
lookahead, it is too special and may lead us to an endless
|
|
loop in error recovery. */
|
|
yychar = YYUNDEF;
|
|
yytoken = YYSYMBOL_YYerror;
|
|
goto yyerrlab1;
|
|
}
|
|
else
|
|
{
|
|
yytoken = YYTRANSLATE (yychar);
|
|
YY_SYMBOL_PRINT ("Next token is", yytoken, &yylval, &yylloc);
|
|
}
|
|
|
|
/* If the proper action on seeing token YYTOKEN is to reduce or to
|
|
detect an error, take that action. */
|
|
yyn += yytoken;
|
|
if (yyn < 0 || YYLAST < yyn || yycheck[yyn] != yytoken)
|
|
goto yydefault;
|
|
yyn = yytable[yyn];
|
|
if (yyn <= 0)
|
|
{
|
|
if (yytable_value_is_error (yyn))
|
|
goto yyerrlab;
|
|
yyn = -yyn;
|
|
goto yyreduce;
|
|
}
|
|
|
|
/* Count tokens shifted since error; after three, turn off error
|
|
status. */
|
|
if (yyerrstatus)
|
|
yyerrstatus--;
|
|
|
|
/* Shift the lookahead token. */
|
|
YY_SYMBOL_PRINT ("Shifting", yytoken, &yylval, &yylloc);
|
|
yystate = yyn;
|
|
YY_IGNORE_MAYBE_UNINITIALIZED_BEGIN
|
|
*++yyvsp = yylval;
|
|
YY_IGNORE_MAYBE_UNINITIALIZED_END
|
|
|
|
/* Discard the shifted token. */
|
|
yychar = YYEMPTY;
|
|
goto yynewstate;
|
|
|
|
|
|
/*-----------------------------------------------------------.
|
|
| yydefault -- do the default action for the current state. |
|
|
`-----------------------------------------------------------*/
|
|
yydefault:
|
|
yyn = yydefact[yystate];
|
|
if (yyn == 0)
|
|
goto yyerrlab;
|
|
goto yyreduce;
|
|
|
|
|
|
/*-----------------------------.
|
|
| yyreduce -- do a reduction. |
|
|
`-----------------------------*/
|
|
yyreduce:
|
|
/* yyn is the number of a rule to reduce with. */
|
|
yylen = yyr2[yyn];
|
|
|
|
/* If YYLEN is nonzero, implement the default value of the action:
|
|
'$$ = $1'.
|
|
|
|
Otherwise, the following line sets YYVAL to garbage.
|
|
This behavior is undocumented and Bison
|
|
users should not rely upon it. Assigning to YYVAL
|
|
unconditionally makes the parser a bit smaller, and it avoids a
|
|
GCC warning that YYVAL may be used uninitialized. */
|
|
yyval = yyvsp[1-yylen];
|
|
|
|
|
|
YY_REDUCE_PRINT (yyn);
|
|
switch (yyn)
|
|
{
|
|
case 2: /* file: %empty */
|
|
#line 204 "gram.y"
|
|
{
|
|
; /* empty file */
|
|
}
|
|
#line 1653 "gram.c"
|
|
break;
|
|
|
|
case 6: /* entry: '\n' */
|
|
#line 214 "gram.y"
|
|
{
|
|
; /* blank line */
|
|
}
|
|
#line 1661 "gram.c"
|
|
break;
|
|
|
|
case 7: /* entry: error '\n' */
|
|
#line 217 "gram.y"
|
|
{
|
|
yyerrok;
|
|
}
|
|
#line 1669 "gram.c"
|
|
break;
|
|
|
|
case 8: /* entry: include */
|
|
#line 220 "gram.y"
|
|
{
|
|
const bool success = push_include((yyvsp[0].string),
|
|
parsed_policy.ctx->user.shost, &parser_conf);
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
free((yyvsp[0].string));
|
|
if (!success && !parser_conf.recovery)
|
|
YYERROR;
|
|
}
|
|
#line 1682 "gram.c"
|
|
break;
|
|
|
|
case 9: /* entry: includedir */
|
|
#line 228 "gram.y"
|
|
{
|
|
const bool success = push_includedir((yyvsp[0].string),
|
|
parsed_policy.ctx->user.shost, &parser_conf);
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
free((yyvsp[0].string));
|
|
if (!success && !parser_conf.recovery)
|
|
YYERROR;
|
|
}
|
|
#line 1695 "gram.c"
|
|
break;
|
|
|
|
case 10: /* entry: userlist privileges '\n' */
|
|
#line 236 "gram.y"
|
|
{
|
|
if (!add_userspec((yyvsp[-2].member), (yyvsp[-1].privilege))) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
}
|
|
#line 1706 "gram.c"
|
|
break;
|
|
|
|
case 11: /* entry: USERALIAS useraliases '\n' */
|
|
#line 242 "gram.y"
|
|
{
|
|
;
|
|
}
|
|
#line 1714 "gram.c"
|
|
break;
|
|
|
|
case 12: /* entry: HOSTALIAS hostaliases '\n' */
|
|
#line 245 "gram.y"
|
|
{
|
|
;
|
|
}
|
|
#line 1722 "gram.c"
|
|
break;
|
|
|
|
case 13: /* entry: CMNDALIAS cmndaliases '\n' */
|
|
#line 248 "gram.y"
|
|
{
|
|
;
|
|
}
|
|
#line 1730 "gram.c"
|
|
break;
|
|
|
|
case 14: /* entry: RUNASALIAS runasaliases '\n' */
|
|
#line 251 "gram.y"
|
|
{
|
|
;
|
|
}
|
|
#line 1738 "gram.c"
|
|
break;
|
|
|
|
case 15: /* entry: DEFAULTS defaults_list '\n' */
|
|
#line 254 "gram.y"
|
|
{
|
|
if (!add_defaults(DEFAULTS, NULL, (yyvsp[-1].defaults)))
|
|
YYERROR;
|
|
}
|
|
#line 1747 "gram.c"
|
|
break;
|
|
|
|
case 16: /* entry: DEFAULTS_USER userlist defaults_list '\n' */
|
|
#line 258 "gram.y"
|
|
{
|
|
if (!add_defaults(DEFAULTS_USER, (yyvsp[-2].member), (yyvsp[-1].defaults)))
|
|
YYERROR;
|
|
}
|
|
#line 1756 "gram.c"
|
|
break;
|
|
|
|
case 17: /* entry: DEFAULTS_RUNAS userlist defaults_list '\n' */
|
|
#line 262 "gram.y"
|
|
{
|
|
if (!add_defaults(DEFAULTS_RUNAS, (yyvsp[-2].member), (yyvsp[-1].defaults)))
|
|
YYERROR;
|
|
}
|
|
#line 1765 "gram.c"
|
|
break;
|
|
|
|
case 18: /* entry: DEFAULTS_HOST hostlist defaults_list '\n' */
|
|
#line 266 "gram.y"
|
|
{
|
|
if (!add_defaults(DEFAULTS_HOST, (yyvsp[-2].member), (yyvsp[-1].defaults)))
|
|
YYERROR;
|
|
}
|
|
#line 1774 "gram.c"
|
|
break;
|
|
|
|
case 19: /* entry: DEFAULTS_CMND cmndlist defaults_list '\n' */
|
|
#line 270 "gram.y"
|
|
{
|
|
if (!add_defaults(DEFAULTS_CMND, (yyvsp[-2].member), (yyvsp[-1].defaults)))
|
|
YYERROR;
|
|
}
|
|
#line 1783 "gram.c"
|
|
break;
|
|
|
|
case 20: /* include: INCLUDE WORD '\n' */
|
|
#line 276 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[-1].string);
|
|
}
|
|
#line 1791 "gram.c"
|
|
break;
|
|
|
|
case 21: /* include: INCLUDE WORD error '\n' */
|
|
#line 279 "gram.y"
|
|
{
|
|
yyerrok;
|
|
(yyval.string) = (yyvsp[-2].string);
|
|
}
|
|
#line 1800 "gram.c"
|
|
break;
|
|
|
|
case 22: /* includedir: INCLUDEDIR WORD '\n' */
|
|
#line 285 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[-1].string);
|
|
}
|
|
#line 1808 "gram.c"
|
|
break;
|
|
|
|
case 23: /* includedir: INCLUDEDIR WORD error '\n' */
|
|
#line 288 "gram.y"
|
|
{
|
|
yyerrok;
|
|
(yyval.string) = (yyvsp[-2].string);
|
|
}
|
|
#line 1817 "gram.c"
|
|
break;
|
|
|
|
case 25: /* defaults_list: defaults_list ',' defaults_entry */
|
|
#line 295 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_DEFAULTS, (yyvsp[0].defaults));
|
|
HLTQ_CONCAT((yyvsp[-2].defaults), (yyvsp[0].defaults), entries);
|
|
(yyval.defaults) = (yyvsp[-2].defaults);
|
|
}
|
|
#line 1827 "gram.c"
|
|
break;
|
|
|
|
case 26: /* defaults_entry: DEFVAR */
|
|
#line 302 "gram.y"
|
|
{
|
|
(yyval.defaults) = new_default((yyvsp[0].string), NULL, true);
|
|
if ((yyval.defaults) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_DEFAULTS, (yyval.defaults));
|
|
}
|
|
#line 1841 "gram.c"
|
|
break;
|
|
|
|
case 27: /* defaults_entry: '!' DEFVAR */
|
|
#line 311 "gram.y"
|
|
{
|
|
(yyval.defaults) = new_default((yyvsp[0].string), NULL, false);
|
|
if ((yyval.defaults) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_DEFAULTS, (yyval.defaults));
|
|
}
|
|
#line 1855 "gram.c"
|
|
break;
|
|
|
|
case 28: /* defaults_entry: DEFVAR '=' WORD */
|
|
#line 320 "gram.y"
|
|
{
|
|
(yyval.defaults) = new_default((yyvsp[-2].string), (yyvsp[0].string), true);
|
|
if ((yyval.defaults) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].string));
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_DEFAULTS, (yyval.defaults));
|
|
}
|
|
#line 1870 "gram.c"
|
|
break;
|
|
|
|
case 29: /* defaults_entry: DEFVAR '+' WORD */
|
|
#line 330 "gram.y"
|
|
{
|
|
(yyval.defaults) = new_default((yyvsp[-2].string), (yyvsp[0].string), '+');
|
|
if ((yyval.defaults) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].string));
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_DEFAULTS, (yyval.defaults));
|
|
}
|
|
#line 1885 "gram.c"
|
|
break;
|
|
|
|
case 30: /* defaults_entry: DEFVAR '-' WORD */
|
|
#line 340 "gram.y"
|
|
{
|
|
(yyval.defaults) = new_default((yyvsp[-2].string), (yyvsp[0].string), '-');
|
|
if ((yyval.defaults) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].string));
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_DEFAULTS, (yyval.defaults));
|
|
}
|
|
#line 1900 "gram.c"
|
|
break;
|
|
|
|
case 32: /* privileges: privileges ':' privilege */
|
|
#line 353 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_PRIVILEGE, (yyvsp[0].privilege));
|
|
HLTQ_CONCAT((yyvsp[-2].privilege), (yyvsp[0].privilege), entries);
|
|
(yyval.privilege) = (yyvsp[-2].privilege);
|
|
}
|
|
#line 1910 "gram.c"
|
|
break;
|
|
|
|
case 33: /* privileges: privileges ':' error */
|
|
#line 358 "gram.y"
|
|
{
|
|
yyerrok;
|
|
(yyval.privilege) = (yyvsp[-2].privilege);
|
|
}
|
|
#line 1919 "gram.c"
|
|
break;
|
|
|
|
case 34: /* privilege: hostlist '=' cmndspeclist */
|
|
#line 364 "gram.y"
|
|
{
|
|
struct privilege *p = calloc(1, sizeof(*p));
|
|
if (p == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_PRIVILEGE, p);
|
|
TAILQ_INIT(&p->defaults);
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[-2].member));
|
|
HLTQ_TO_TAILQ(&p->hostlist, (yyvsp[-2].member), entries);
|
|
parser_leak_remove(LEAK_CMNDSPEC, (yyvsp[0].cmndspec));
|
|
HLTQ_TO_TAILQ(&p->cmndlist, (yyvsp[0].cmndspec), entries);
|
|
HLTQ_INIT(p, entries);
|
|
(yyval.privilege) = p;
|
|
}
|
|
#line 1939 "gram.c"
|
|
break;
|
|
|
|
case 35: /* ophost: host */
|
|
#line 381 "gram.y"
|
|
{
|
|
(yyval.member) = (yyvsp[0].member);
|
|
(yyval.member)->negated = false;
|
|
}
|
|
#line 1948 "gram.c"
|
|
break;
|
|
|
|
case 36: /* ophost: '!' host */
|
|
#line 385 "gram.y"
|
|
{
|
|
(yyval.member) = (yyvsp[0].member);
|
|
(yyval.member)->negated = true;
|
|
}
|
|
#line 1957 "gram.c"
|
|
break;
|
|
|
|
case 37: /* host: ALIAS */
|
|
#line 391 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), ALIAS);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 1971 "gram.c"
|
|
break;
|
|
|
|
case 38: /* host: ALL */
|
|
#line 400 "gram.y"
|
|
{
|
|
(yyval.member) = new_member(NULL, ALL);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 1984 "gram.c"
|
|
break;
|
|
|
|
case 39: /* host: NETGROUP */
|
|
#line 408 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), NETGROUP);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 1998 "gram.c"
|
|
break;
|
|
|
|
case 40: /* host: NTWKADDR */
|
|
#line 417 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), NTWKADDR);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 2012 "gram.c"
|
|
break;
|
|
|
|
case 41: /* host: WORD */
|
|
#line 426 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), WORD);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 2026 "gram.c"
|
|
break;
|
|
|
|
case 43: /* cmndspeclist: cmndspeclist ',' cmndspec */
|
|
#line 438 "gram.y"
|
|
{
|
|
struct cmndspec *prev;
|
|
prev = HLTQ_LAST((yyvsp[-2].cmndspec), cmndspec, entries);
|
|
parser_leak_remove(LEAK_CMNDSPEC, (yyvsp[0].cmndspec));
|
|
HLTQ_CONCAT((yyvsp[-2].cmndspec), (yyvsp[0].cmndspec), entries);
|
|
|
|
/* propagate runcwd and runchroot */
|
|
if ((yyvsp[0].cmndspec)->runcwd == NULL)
|
|
(yyvsp[0].cmndspec)->runcwd = prev->runcwd;
|
|
if ((yyvsp[0].cmndspec)->runchroot == NULL)
|
|
(yyvsp[0].cmndspec)->runchroot = prev->runchroot;
|
|
/* propagate role and type */
|
|
if ((yyvsp[0].cmndspec)->role == NULL && (yyvsp[0].cmndspec)->type == NULL) {
|
|
(yyvsp[0].cmndspec)->role = prev->role;
|
|
(yyvsp[0].cmndspec)->type = prev->type;
|
|
}
|
|
/* propagate apparmor_profile */
|
|
if ((yyvsp[0].cmndspec)->apparmor_profile == NULL)
|
|
(yyvsp[0].cmndspec)->apparmor_profile = prev->apparmor_profile;
|
|
/* propagate privs & limitprivs */
|
|
if ((yyvsp[0].cmndspec)->privs == NULL && (yyvsp[0].cmndspec)->limitprivs == NULL) {
|
|
(yyvsp[0].cmndspec)->privs = prev->privs;
|
|
(yyvsp[0].cmndspec)->limitprivs = prev->limitprivs;
|
|
}
|
|
/* propagate command time restrictions */
|
|
if ((yyvsp[0].cmndspec)->notbefore == UNSPEC)
|
|
(yyvsp[0].cmndspec)->notbefore = prev->notbefore;
|
|
if ((yyvsp[0].cmndspec)->notafter == UNSPEC)
|
|
(yyvsp[0].cmndspec)->notafter = prev->notafter;
|
|
/* propagate command timeout */
|
|
if ((yyvsp[0].cmndspec)->timeout == UNSPEC)
|
|
(yyvsp[0].cmndspec)->timeout = prev->timeout;
|
|
/* propagate tags and runas list */
|
|
if ((yyvsp[0].cmndspec)->tags.nopasswd == UNSPEC)
|
|
(yyvsp[0].cmndspec)->tags.nopasswd = prev->tags.nopasswd;
|
|
if ((yyvsp[0].cmndspec)->tags.noexec == UNSPEC)
|
|
(yyvsp[0].cmndspec)->tags.noexec = prev->tags.noexec;
|
|
if ((yyvsp[0].cmndspec)->tags.intercept == UNSPEC)
|
|
(yyvsp[0].cmndspec)->tags.intercept = prev->tags.intercept;
|
|
if ((yyvsp[0].cmndspec)->tags.setenv == UNSPEC &&
|
|
prev->tags.setenv != IMPLIED)
|
|
(yyvsp[0].cmndspec)->tags.setenv = prev->tags.setenv;
|
|
if ((yyvsp[0].cmndspec)->tags.log_input == UNSPEC)
|
|
(yyvsp[0].cmndspec)->tags.log_input = prev->tags.log_input;
|
|
if ((yyvsp[0].cmndspec)->tags.log_output == UNSPEC)
|
|
(yyvsp[0].cmndspec)->tags.log_output = prev->tags.log_output;
|
|
if ((yyvsp[0].cmndspec)->tags.send_mail == UNSPEC)
|
|
(yyvsp[0].cmndspec)->tags.send_mail = prev->tags.send_mail;
|
|
if ((yyvsp[0].cmndspec)->tags.follow == UNSPEC)
|
|
(yyvsp[0].cmndspec)->tags.follow = prev->tags.follow;
|
|
if (((yyvsp[0].cmndspec)->runasuserlist == NULL &&
|
|
(yyvsp[0].cmndspec)->runasgrouplist == NULL) &&
|
|
(prev->runasuserlist != NULL ||
|
|
prev->runasgrouplist != NULL)) {
|
|
(yyvsp[0].cmndspec)->runasuserlist = prev->runasuserlist;
|
|
(yyvsp[0].cmndspec)->runasgrouplist = prev->runasgrouplist;
|
|
}
|
|
(yyval.cmndspec) = (yyvsp[-2].cmndspec);
|
|
}
|
|
#line 2090 "gram.c"
|
|
break;
|
|
|
|
case 44: /* cmndspec: runasspec options cmndtag digcmnd */
|
|
#line 499 "gram.y"
|
|
{
|
|
struct cmndspec *cs = calloc(1, sizeof(*cs));
|
|
if (cs == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_CMNDSPEC, cs);
|
|
if ((yyvsp[-3].runas) != NULL) {
|
|
if ((yyvsp[-3].runas)->runasusers != NULL) {
|
|
cs->runasuserlist =
|
|
malloc(sizeof(*cs->runasuserlist));
|
|
if (cs->runasuserlist == NULL) {
|
|
free(cs);
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
/* g/c done via runas container */
|
|
HLTQ_TO_TAILQ(cs->runasuserlist,
|
|
(yyvsp[-3].runas)->runasusers, entries);
|
|
}
|
|
if ((yyvsp[-3].runas)->runasgroups != NULL) {
|
|
cs->runasgrouplist =
|
|
malloc(sizeof(*cs->runasgrouplist));
|
|
if (cs->runasgrouplist == NULL) {
|
|
free(cs);
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
/* g/c done via runas container */
|
|
HLTQ_TO_TAILQ(cs->runasgrouplist,
|
|
(yyvsp[-3].runas)->runasgroups, entries);
|
|
}
|
|
parser_leak_remove(LEAK_RUNAS, (yyvsp[-3].runas));
|
|
free((yyvsp[-3].runas));
|
|
}
|
|
cs->role = (yyvsp[-2].options).role;
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].options).role);
|
|
cs->type = (yyvsp[-2].options).type;
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].options).type);
|
|
cs->apparmor_profile = (yyvsp[-2].options).apparmor_profile;
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].options).apparmor_profile);
|
|
cs->privs = (yyvsp[-2].options).privs;
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].options).privs);
|
|
cs->limitprivs = (yyvsp[-2].options).limitprivs;
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].options).limitprivs);
|
|
cs->notbefore = (yyvsp[-2].options).notbefore;
|
|
cs->notafter = (yyvsp[-2].options).notafter;
|
|
cs->timeout = (yyvsp[-2].options).timeout;
|
|
cs->runcwd = (yyvsp[-2].options).runcwd;
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].options).runcwd);
|
|
cs->runchroot = (yyvsp[-2].options).runchroot;
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].options).runchroot);
|
|
cs->tags = (yyvsp[-1].tag);
|
|
cs->cmnd = (yyvsp[0].member);
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
HLTQ_INIT(cs, entries);
|
|
/* sudo "ALL" implies the SETENV tag */
|
|
if (cs->cmnd->type == ALL && !cs->cmnd->negated &&
|
|
cs->tags.setenv == UNSPEC)
|
|
cs->tags.setenv = IMPLIED;
|
|
(yyval.cmndspec) = cs;
|
|
}
|
|
#line 2157 "gram.c"
|
|
break;
|
|
|
|
case 45: /* digestspec: SHA224_TOK ':' DIGEST */
|
|
#line 563 "gram.y"
|
|
{
|
|
(yyval.digest) = new_digest(SUDO_DIGEST_SHA224, (yyvsp[0].string));
|
|
if ((yyval.digest) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_DIGEST, (yyval.digest));
|
|
}
|
|
#line 2171 "gram.c"
|
|
break;
|
|
|
|
case 46: /* digestspec: SHA256_TOK ':' DIGEST */
|
|
#line 572 "gram.y"
|
|
{
|
|
(yyval.digest) = new_digest(SUDO_DIGEST_SHA256, (yyvsp[0].string));
|
|
if ((yyval.digest) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_DIGEST, (yyval.digest));
|
|
}
|
|
#line 2185 "gram.c"
|
|
break;
|
|
|
|
case 47: /* digestspec: SHA384_TOK ':' DIGEST */
|
|
#line 581 "gram.y"
|
|
{
|
|
(yyval.digest) = new_digest(SUDO_DIGEST_SHA384, (yyvsp[0].string));
|
|
if ((yyval.digest) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_DIGEST, (yyval.digest));
|
|
}
|
|
#line 2199 "gram.c"
|
|
break;
|
|
|
|
case 48: /* digestspec: SHA512_TOK ':' DIGEST */
|
|
#line 590 "gram.y"
|
|
{
|
|
(yyval.digest) = new_digest(SUDO_DIGEST_SHA512, (yyvsp[0].string));
|
|
if ((yyval.digest) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_DIGEST, (yyval.digest));
|
|
}
|
|
#line 2213 "gram.c"
|
|
break;
|
|
|
|
case 50: /* digestlist: digestlist ',' digestspec */
|
|
#line 602 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_DIGEST, (yyvsp[0].digest));
|
|
HLTQ_CONCAT((yyvsp[-2].digest), (yyvsp[0].digest), entries);
|
|
(yyval.digest) = (yyvsp[-2].digest);
|
|
}
|
|
#line 2223 "gram.c"
|
|
break;
|
|
|
|
case 51: /* digcmnd: opcmnd */
|
|
#line 609 "gram.y"
|
|
{
|
|
(yyval.member) = (yyvsp[0].member);
|
|
}
|
|
#line 2231 "gram.c"
|
|
break;
|
|
|
|
case 52: /* digcmnd: digestlist opcmnd */
|
|
#line 612 "gram.y"
|
|
{
|
|
struct sudo_command *c =
|
|
(struct sudo_command *) (yyvsp[0].member)->name;
|
|
|
|
if ((yyvsp[0].member)->type != COMMAND && (yyvsp[0].member)->type != ALL) {
|
|
sudoerserror(N_("a digest requires a path name"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_DIGEST, (yyvsp[-1].digest));
|
|
HLTQ_TO_TAILQ(&c->digests, (yyvsp[-1].digest), entries);
|
|
(yyval.member) = (yyvsp[0].member);
|
|
}
|
|
#line 2248 "gram.c"
|
|
break;
|
|
|
|
case 53: /* opcmnd: cmnd */
|
|
#line 626 "gram.y"
|
|
{
|
|
(yyval.member) = (yyvsp[0].member);
|
|
(yyval.member)->negated = false;
|
|
}
|
|
#line 2257 "gram.c"
|
|
break;
|
|
|
|
case 54: /* opcmnd: '!' cmnd */
|
|
#line 630 "gram.y"
|
|
{
|
|
(yyval.member) = (yyvsp[0].member);
|
|
(yyval.member)->negated = true;
|
|
}
|
|
#line 2266 "gram.c"
|
|
break;
|
|
|
|
case 55: /* chdirspec: CWD '=' WORD */
|
|
#line 636 "gram.y"
|
|
{
|
|
if ((yyvsp[0].string)[0] != '/' && (yyvsp[0].string)[0] != '~') {
|
|
if (strcmp((yyvsp[0].string), "*") != 0) {
|
|
sudoerserror(N_("values for \"CWD\" must"
|
|
" start with a '/', '~', or '*'"));
|
|
YYERROR;
|
|
}
|
|
}
|
|
if (strlen((yyvsp[0].string)) >= PATH_MAX) {
|
|
sudoerserror(N_("\"CWD\" path too long"));
|
|
YYERROR;
|
|
}
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2285 "gram.c"
|
|
break;
|
|
|
|
case 56: /* chrootspec: CHROOT '=' WORD */
|
|
#line 652 "gram.y"
|
|
{
|
|
if ((yyvsp[0].string)[0] != '/' && (yyvsp[0].string)[0] != '~') {
|
|
if (strcmp((yyvsp[0].string), "*") != 0) {
|
|
sudoerserror(N_("values for \"CHROOT\" must"
|
|
" start with a '/', '~', or '*'"));
|
|
YYERROR;
|
|
}
|
|
}
|
|
if (strlen((yyvsp[0].string)) >= PATH_MAX) {
|
|
sudoerserror(N_("\"CHROOT\" path too long"));
|
|
YYERROR;
|
|
}
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2304 "gram.c"
|
|
break;
|
|
|
|
case 57: /* timeoutspec: CMND_TIMEOUT '=' WORD */
|
|
#line 668 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2312 "gram.c"
|
|
break;
|
|
|
|
case 58: /* notbeforespec: NOTBEFORE '=' WORD */
|
|
#line 673 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2320 "gram.c"
|
|
break;
|
|
|
|
case 59: /* notafterspec: NOTAFTER '=' WORD */
|
|
#line 677 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2328 "gram.c"
|
|
break;
|
|
|
|
case 60: /* rolespec: ROLE '=' WORD */
|
|
#line 682 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2336 "gram.c"
|
|
break;
|
|
|
|
case 61: /* typespec: TYPE '=' WORD */
|
|
#line 687 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2344 "gram.c"
|
|
break;
|
|
|
|
case 62: /* apparmor_profilespec: APPARMOR_PROFILE '=' WORD */
|
|
#line 692 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2352 "gram.c"
|
|
break;
|
|
|
|
case 63: /* privsspec: PRIVS '=' WORD */
|
|
#line 697 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2360 "gram.c"
|
|
break;
|
|
|
|
case 64: /* limitprivsspec: LIMITPRIVS '=' WORD */
|
|
#line 701 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2368 "gram.c"
|
|
break;
|
|
|
|
case 65: /* runasspec: %empty */
|
|
#line 706 "gram.y"
|
|
{
|
|
(yyval.runas) = NULL;
|
|
}
|
|
#line 2376 "gram.c"
|
|
break;
|
|
|
|
case 66: /* runasspec: '(' runaslist ')' */
|
|
#line 709 "gram.y"
|
|
{
|
|
(yyval.runas) = (yyvsp[-1].runas);
|
|
}
|
|
#line 2384 "gram.c"
|
|
break;
|
|
|
|
case 67: /* runaslist: %empty */
|
|
#line 714 "gram.y"
|
|
{
|
|
/* User may run command as themselves. */
|
|
(yyval.runas) = calloc(1, sizeof(struct runascontainer));
|
|
if ((yyval.runas) != NULL) {
|
|
(yyval.runas)->runasusers = new_member(NULL, MYSELF);
|
|
/* $$->runasgroups = NULL; */
|
|
if ((yyval.runas)->runasusers == NULL) {
|
|
free((yyval.runas));
|
|
(yyval.runas) = NULL;
|
|
}
|
|
}
|
|
if ((yyval.runas) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_RUNAS, (yyval.runas));
|
|
}
|
|
#line 2406 "gram.c"
|
|
break;
|
|
|
|
case 68: /* runaslist: userlist */
|
|
#line 731 "gram.y"
|
|
{
|
|
/* User may run command as a user in userlist. */
|
|
(yyval.runas) = calloc(1, sizeof(struct runascontainer));
|
|
if ((yyval.runas) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_RUNAS, (yyval.runas));
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
(yyval.runas)->runasusers = (yyvsp[0].member);
|
|
/* $$->runasgroups = NULL; */
|
|
}
|
|
#line 2423 "gram.c"
|
|
break;
|
|
|
|
case 69: /* runaslist: userlist ':' grouplist */
|
|
#line 743 "gram.y"
|
|
{
|
|
/*
|
|
* User may run command as a user in userlist
|
|
* and optionally as a group in grouplist.
|
|
*/
|
|
(yyval.runas) = calloc(1, sizeof(struct runascontainer));
|
|
if ((yyval.runas) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_RUNAS, (yyval.runas));
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[-2].member));
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
(yyval.runas)->runasusers = (yyvsp[-2].member);
|
|
(yyval.runas)->runasgroups = (yyvsp[0].member);
|
|
}
|
|
#line 2444 "gram.c"
|
|
break;
|
|
|
|
case 70: /* runaslist: ':' grouplist */
|
|
#line 759 "gram.y"
|
|
{
|
|
/* User may run command as a group in grouplist. */
|
|
(yyval.runas) = calloc(1, sizeof(struct runascontainer));
|
|
if ((yyval.runas) != NULL) {
|
|
(yyval.runas)->runasusers = new_member(NULL, MYSELF);
|
|
if ((yyval.runas)->runasusers == NULL) {
|
|
free((yyval.runas));
|
|
(yyval.runas) = NULL;
|
|
}
|
|
}
|
|
if ((yyval.runas) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_RUNAS, (yyval.runas));
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
(yyval.runas)->runasgroups = (yyvsp[0].member);
|
|
}
|
|
#line 2467 "gram.c"
|
|
break;
|
|
|
|
case 71: /* runaslist: ':' */
|
|
#line 777 "gram.y"
|
|
{
|
|
/* User may run command as themselves. */
|
|
(yyval.runas) = calloc(1, sizeof(struct runascontainer));
|
|
if ((yyval.runas) != NULL) {
|
|
(yyval.runas)->runasusers = new_member(NULL, MYSELF);
|
|
/* $$->runasgroups = NULL; */
|
|
if ((yyval.runas)->runasusers == NULL) {
|
|
free((yyval.runas));
|
|
(yyval.runas) = NULL;
|
|
}
|
|
}
|
|
if ((yyval.runas) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_RUNAS, (yyval.runas));
|
|
}
|
|
#line 2489 "gram.c"
|
|
break;
|
|
|
|
case 72: /* reserved_word: ALL */
|
|
#line 796 "gram.y"
|
|
{ (yyval.cstring) = "ALL"; }
|
|
#line 2495 "gram.c"
|
|
break;
|
|
|
|
case 73: /* reserved_word: CHROOT */
|
|
#line 797 "gram.y"
|
|
{ (yyval.cstring) = "CHROOT"; }
|
|
#line 2501 "gram.c"
|
|
break;
|
|
|
|
case 74: /* reserved_word: CWD */
|
|
#line 798 "gram.y"
|
|
{ (yyval.cstring) = "CWD"; }
|
|
#line 2507 "gram.c"
|
|
break;
|
|
|
|
case 75: /* reserved_word: CMND_TIMEOUT */
|
|
#line 799 "gram.y"
|
|
{ (yyval.cstring) = "CMND_TIMEOUT"; }
|
|
#line 2513 "gram.c"
|
|
break;
|
|
|
|
case 76: /* reserved_word: NOTBEFORE */
|
|
#line 800 "gram.y"
|
|
{ (yyval.cstring) = "NOTBEFORE"; }
|
|
#line 2519 "gram.c"
|
|
break;
|
|
|
|
case 77: /* reserved_word: NOTAFTER */
|
|
#line 801 "gram.y"
|
|
{ (yyval.cstring) = "NOTAFTER"; }
|
|
#line 2525 "gram.c"
|
|
break;
|
|
|
|
case 78: /* reserved_word: ROLE */
|
|
#line 802 "gram.y"
|
|
{ (yyval.cstring) = "ROLE"; }
|
|
#line 2531 "gram.c"
|
|
break;
|
|
|
|
case 79: /* reserved_word: TYPE */
|
|
#line 803 "gram.y"
|
|
{ (yyval.cstring) = "TYPE"; }
|
|
#line 2537 "gram.c"
|
|
break;
|
|
|
|
case 80: /* reserved_word: PRIVS */
|
|
#line 804 "gram.y"
|
|
{ (yyval.cstring) = "PRIVS"; }
|
|
#line 2543 "gram.c"
|
|
break;
|
|
|
|
case 81: /* reserved_word: LIMITPRIVS */
|
|
#line 805 "gram.y"
|
|
{ (yyval.cstring) = "LIMITPRIVS"; }
|
|
#line 2549 "gram.c"
|
|
break;
|
|
|
|
case 82: /* reserved_word: APPARMOR_PROFILE */
|
|
#line 806 "gram.y"
|
|
{ (yyval.cstring) = "APPARMOR_PROFILE"; }
|
|
#line 2555 "gram.c"
|
|
break;
|
|
|
|
case 83: /* reserved_alias: reserved_word */
|
|
#line 809 "gram.y"
|
|
{
|
|
sudoerserrorf(U_("syntax error, reserved word %s used as an alias name"), (yyvsp[0].cstring));
|
|
YYERROR;
|
|
}
|
|
#line 2564 "gram.c"
|
|
break;
|
|
|
|
case 84: /* options: %empty */
|
|
#line 815 "gram.y"
|
|
{
|
|
init_options(&(yyval.options));
|
|
}
|
|
#line 2572 "gram.c"
|
|
break;
|
|
|
|
case 85: /* options: options chdirspec */
|
|
#line 818 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_PTR, (yyval.options).runcwd);
|
|
free((yyval.options).runcwd);
|
|
(yyval.options).runcwd = (yyvsp[0].string);
|
|
}
|
|
#line 2582 "gram.c"
|
|
break;
|
|
|
|
case 86: /* options: options chrootspec */
|
|
#line 823 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_PTR, (yyval.options).runchroot);
|
|
free((yyval.options).runchroot);
|
|
(yyval.options).runchroot = (yyvsp[0].string);
|
|
}
|
|
#line 2592 "gram.c"
|
|
break;
|
|
|
|
case 87: /* options: options notbeforespec */
|
|
#line 828 "gram.y"
|
|
{
|
|
(yyval.options).notbefore = parse_gentime((yyvsp[0].string));
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
free((yyvsp[0].string));
|
|
if ((yyval.options).notbefore == -1) {
|
|
sudoerserror(N_("invalid notbefore value"));
|
|
YYERROR;
|
|
}
|
|
}
|
|
#line 2606 "gram.c"
|
|
break;
|
|
|
|
case 88: /* options: options notafterspec */
|
|
#line 837 "gram.y"
|
|
{
|
|
(yyval.options).notafter = parse_gentime((yyvsp[0].string));
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
free((yyvsp[0].string));
|
|
if ((yyval.options).notafter == -1) {
|
|
sudoerserror(N_("invalid notafter value"));
|
|
YYERROR;
|
|
}
|
|
}
|
|
#line 2620 "gram.c"
|
|
break;
|
|
|
|
case 89: /* options: options timeoutspec */
|
|
#line 846 "gram.y"
|
|
{
|
|
(yyval.options).timeout = parse_timeout((yyvsp[0].string));
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
free((yyvsp[0].string));
|
|
if ((yyval.options).timeout == -1) {
|
|
if (errno == ERANGE)
|
|
sudoerserror(N_("timeout value too large"));
|
|
else
|
|
sudoerserror(N_("invalid timeout value"));
|
|
YYERROR;
|
|
}
|
|
}
|
|
#line 2637 "gram.c"
|
|
break;
|
|
|
|
case 90: /* options: options rolespec */
|
|
#line 858 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_PTR, (yyval.options).role);
|
|
free((yyval.options).role);
|
|
(yyval.options).role = (yyvsp[0].string);
|
|
}
|
|
#line 2647 "gram.c"
|
|
break;
|
|
|
|
case 91: /* options: options typespec */
|
|
#line 863 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_PTR, (yyval.options).type);
|
|
free((yyval.options).type);
|
|
(yyval.options).type = (yyvsp[0].string);
|
|
}
|
|
#line 2657 "gram.c"
|
|
break;
|
|
|
|
case 92: /* options: options apparmor_profilespec */
|
|
#line 868 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_PTR, (yyval.options).apparmor_profile);
|
|
free((yyval.options).apparmor_profile);
|
|
(yyval.options).apparmor_profile = (yyvsp[0].string);
|
|
}
|
|
#line 2667 "gram.c"
|
|
break;
|
|
|
|
case 93: /* options: options privsspec */
|
|
#line 873 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_PTR, (yyval.options).privs);
|
|
free((yyval.options).privs);
|
|
(yyval.options).privs = (yyvsp[0].string);
|
|
}
|
|
#line 2677 "gram.c"
|
|
break;
|
|
|
|
case 94: /* options: options limitprivsspec */
|
|
#line 878 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_PTR, (yyval.options).limitprivs);
|
|
free((yyval.options).limitprivs);
|
|
(yyval.options).limitprivs = (yyvsp[0].string);
|
|
}
|
|
#line 2687 "gram.c"
|
|
break;
|
|
|
|
case 95: /* cmndtag: %empty */
|
|
#line 885 "gram.y"
|
|
{
|
|
TAGS_INIT(&(yyval.tag));
|
|
}
|
|
#line 2695 "gram.c"
|
|
break;
|
|
|
|
case 96: /* cmndtag: cmndtag NOPASSWD */
|
|
#line 888 "gram.y"
|
|
{
|
|
(yyval.tag).nopasswd = true;
|
|
}
|
|
#line 2703 "gram.c"
|
|
break;
|
|
|
|
case 97: /* cmndtag: cmndtag PASSWD */
|
|
#line 891 "gram.y"
|
|
{
|
|
(yyval.tag).nopasswd = false;
|
|
}
|
|
#line 2711 "gram.c"
|
|
break;
|
|
|
|
case 98: /* cmndtag: cmndtag NOEXEC */
|
|
#line 894 "gram.y"
|
|
{
|
|
(yyval.tag).noexec = true;
|
|
}
|
|
#line 2719 "gram.c"
|
|
break;
|
|
|
|
case 99: /* cmndtag: cmndtag EXEC */
|
|
#line 897 "gram.y"
|
|
{
|
|
(yyval.tag).noexec = false;
|
|
}
|
|
#line 2727 "gram.c"
|
|
break;
|
|
|
|
case 100: /* cmndtag: cmndtag INTERCEPT */
|
|
#line 900 "gram.y"
|
|
{
|
|
(yyval.tag).intercept = true;
|
|
}
|
|
#line 2735 "gram.c"
|
|
break;
|
|
|
|
case 101: /* cmndtag: cmndtag NOINTERCEPT */
|
|
#line 903 "gram.y"
|
|
{
|
|
(yyval.tag).intercept = false;
|
|
}
|
|
#line 2743 "gram.c"
|
|
break;
|
|
|
|
case 102: /* cmndtag: cmndtag SETENV */
|
|
#line 906 "gram.y"
|
|
{
|
|
(yyval.tag).setenv = true;
|
|
}
|
|
#line 2751 "gram.c"
|
|
break;
|
|
|
|
case 103: /* cmndtag: cmndtag NOSETENV */
|
|
#line 909 "gram.y"
|
|
{
|
|
(yyval.tag).setenv = false;
|
|
}
|
|
#line 2759 "gram.c"
|
|
break;
|
|
|
|
case 104: /* cmndtag: cmndtag LOG_INPUT */
|
|
#line 912 "gram.y"
|
|
{
|
|
(yyval.tag).log_input = true;
|
|
}
|
|
#line 2767 "gram.c"
|
|
break;
|
|
|
|
case 105: /* cmndtag: cmndtag NOLOG_INPUT */
|
|
#line 915 "gram.y"
|
|
{
|
|
(yyval.tag).log_input = false;
|
|
}
|
|
#line 2775 "gram.c"
|
|
break;
|
|
|
|
case 106: /* cmndtag: cmndtag LOG_OUTPUT */
|
|
#line 918 "gram.y"
|
|
{
|
|
(yyval.tag).log_output = true;
|
|
}
|
|
#line 2783 "gram.c"
|
|
break;
|
|
|
|
case 107: /* cmndtag: cmndtag NOLOG_OUTPUT */
|
|
#line 921 "gram.y"
|
|
{
|
|
(yyval.tag).log_output = false;
|
|
}
|
|
#line 2791 "gram.c"
|
|
break;
|
|
|
|
case 108: /* cmndtag: cmndtag FOLLOWLNK */
|
|
#line 924 "gram.y"
|
|
{
|
|
(yyval.tag).follow = true;
|
|
}
|
|
#line 2799 "gram.c"
|
|
break;
|
|
|
|
case 109: /* cmndtag: cmndtag NOFOLLOWLNK */
|
|
#line 927 "gram.y"
|
|
{
|
|
(yyval.tag).follow = false;
|
|
}
|
|
#line 2807 "gram.c"
|
|
break;
|
|
|
|
case 110: /* cmndtag: cmndtag MAIL */
|
|
#line 930 "gram.y"
|
|
{
|
|
(yyval.tag).send_mail = true;
|
|
}
|
|
#line 2815 "gram.c"
|
|
break;
|
|
|
|
case 111: /* cmndtag: cmndtag NOMAIL */
|
|
#line 933 "gram.y"
|
|
{
|
|
(yyval.tag).send_mail = false;
|
|
}
|
|
#line 2823 "gram.c"
|
|
break;
|
|
|
|
case 112: /* cmnd: ALL */
|
|
#line 938 "gram.y"
|
|
{
|
|
struct sudo_command *c;
|
|
|
|
if ((c = new_command(NULL, NULL)) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
(yyval.member) = new_member((char *)c, ALL);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 2842 "gram.c"
|
|
break;
|
|
|
|
case 113: /* cmnd: ALIAS */
|
|
#line 952 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), ALIAS);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 2856 "gram.c"
|
|
break;
|
|
|
|
case 114: /* cmnd: COMMAND */
|
|
#line 961 "gram.y"
|
|
{
|
|
struct sudo_command *c;
|
|
|
|
if (strlen((yyvsp[0].command).cmnd) >= PATH_MAX) {
|
|
sudoerserror(N_("command too long"));
|
|
YYERROR;
|
|
}
|
|
if ((c = new_command((yyvsp[0].command).cmnd, (yyvsp[0].command).args)) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
(yyval.member) = new_member((char *)c, COMMAND);
|
|
if ((yyval.member) == NULL) {
|
|
free(c);
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].command).cmnd);
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].command).args);
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 2882 "gram.c"
|
|
break;
|
|
|
|
case 115: /* cmnd: WORD */
|
|
#line 982 "gram.y"
|
|
{
|
|
if (strcmp((yyvsp[0].string), "list") == 0) {
|
|
struct sudo_command *c;
|
|
|
|
if ((c = new_command((yyvsp[0].string), NULL)) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
(yyval.member) = new_member((char *)c, COMMAND);
|
|
if ((yyval.member) == NULL) {
|
|
free(c);
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
} else {
|
|
sudoerserror(N_("expected a fully-qualified path name"));
|
|
YYERROR;
|
|
}
|
|
}
|
|
#line 2908 "gram.c"
|
|
break;
|
|
|
|
case 118: /* $@1: %empty */
|
|
#line 1009 "gram.y"
|
|
{
|
|
alias_line = this_lineno;
|
|
alias_column = (int)sudolinebuf.toke_start + 1;
|
|
}
|
|
#line 2917 "gram.c"
|
|
break;
|
|
|
|
case 119: /* hostalias: ALIAS $@1 '=' hostlist */
|
|
#line 1012 "gram.y"
|
|
{
|
|
if (!alias_add(&parsed_policy, (yyvsp[-3].string), HOSTALIAS,
|
|
sudoers, alias_line, alias_column, (yyvsp[0].member))) {
|
|
alias_error((yyvsp[-3].string), HOSTALIAS, errno);
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-3].string));
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
}
|
|
#line 2931 "gram.c"
|
|
break;
|
|
|
|
case 122: /* hostlist: hostlist ',' ophost */
|
|
#line 1025 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
HLTQ_CONCAT((yyvsp[-2].member), (yyvsp[0].member), entries);
|
|
(yyval.member) = (yyvsp[-2].member);
|
|
}
|
|
#line 2941 "gram.c"
|
|
break;
|
|
|
|
case 125: /* $@2: %empty */
|
|
#line 1036 "gram.y"
|
|
{
|
|
alias_line = this_lineno;
|
|
alias_column = (int)sudolinebuf.toke_start + 1;
|
|
}
|
|
#line 2950 "gram.c"
|
|
break;
|
|
|
|
case 126: /* cmndalias: ALIAS $@2 '=' cmndlist */
|
|
#line 1039 "gram.y"
|
|
{
|
|
if (!alias_add(&parsed_policy, (yyvsp[-3].string), CMNDALIAS,
|
|
sudoers, alias_line, alias_column, (yyvsp[0].member))) {
|
|
alias_error((yyvsp[-3].string), CMNDALIAS, errno);
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-3].string));
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
}
|
|
#line 2964 "gram.c"
|
|
break;
|
|
|
|
case 129: /* cmndlist: cmndlist ',' digcmnd */
|
|
#line 1052 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
HLTQ_CONCAT((yyvsp[-2].member), (yyvsp[0].member), entries);
|
|
(yyval.member) = (yyvsp[-2].member);
|
|
}
|
|
#line 2974 "gram.c"
|
|
break;
|
|
|
|
case 132: /* $@3: %empty */
|
|
#line 1063 "gram.y"
|
|
{
|
|
alias_line = this_lineno;
|
|
alias_column = (int)sudolinebuf.toke_start + 1;
|
|
}
|
|
#line 2983 "gram.c"
|
|
break;
|
|
|
|
case 133: /* runasalias: ALIAS $@3 '=' userlist */
|
|
#line 1066 "gram.y"
|
|
{
|
|
if (!alias_add(&parsed_policy, (yyvsp[-3].string), RUNASALIAS,
|
|
sudoers, alias_line, alias_column, (yyvsp[0].member))) {
|
|
alias_error((yyvsp[-3].string), RUNASALIAS, errno);
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-3].string));
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
}
|
|
#line 2997 "gram.c"
|
|
break;
|
|
|
|
case 137: /* $@4: %empty */
|
|
#line 1082 "gram.y"
|
|
{
|
|
alias_line = this_lineno;
|
|
alias_column = (int)sudolinebuf.toke_start + 1;
|
|
}
|
|
#line 3006 "gram.c"
|
|
break;
|
|
|
|
case 138: /* useralias: ALIAS $@4 '=' userlist */
|
|
#line 1085 "gram.y"
|
|
{
|
|
if (!alias_add(&parsed_policy, (yyvsp[-3].string), USERALIAS,
|
|
sudoers, alias_line, alias_column, (yyvsp[0].member))) {
|
|
alias_error((yyvsp[-3].string), USERALIAS, errno);
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-3].string));
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
}
|
|
#line 3020 "gram.c"
|
|
break;
|
|
|
|
case 141: /* userlist: userlist ',' opuser */
|
|
#line 1098 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
HLTQ_CONCAT((yyvsp[-2].member), (yyvsp[0].member), entries);
|
|
(yyval.member) = (yyvsp[-2].member);
|
|
}
|
|
#line 3030 "gram.c"
|
|
break;
|
|
|
|
case 142: /* opuser: user */
|
|
#line 1105 "gram.y"
|
|
{
|
|
(yyval.member) = (yyvsp[0].member);
|
|
(yyval.member)->negated = false;
|
|
}
|
|
#line 3039 "gram.c"
|
|
break;
|
|
|
|
case 143: /* opuser: '!' user */
|
|
#line 1109 "gram.y"
|
|
{
|
|
(yyval.member) = (yyvsp[0].member);
|
|
(yyval.member)->negated = true;
|
|
}
|
|
#line 3048 "gram.c"
|
|
break;
|
|
|
|
case 144: /* user: ALIAS */
|
|
#line 1115 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), ALIAS);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 3062 "gram.c"
|
|
break;
|
|
|
|
case 145: /* user: ALL */
|
|
#line 1124 "gram.y"
|
|
{
|
|
(yyval.member) = new_member(NULL, ALL);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 3075 "gram.c"
|
|
break;
|
|
|
|
case 146: /* user: NETGROUP */
|
|
#line 1132 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), NETGROUP);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 3089 "gram.c"
|
|
break;
|
|
|
|
case 147: /* user: USERGROUP */
|
|
#line 1141 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), USERGROUP);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 3103 "gram.c"
|
|
break;
|
|
|
|
case 148: /* user: WORD */
|
|
#line 1150 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), WORD);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 3117 "gram.c"
|
|
break;
|
|
|
|
case 150: /* grouplist: grouplist ',' opgroup */
|
|
#line 1162 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
HLTQ_CONCAT((yyvsp[-2].member), (yyvsp[0].member), entries);
|
|
(yyval.member) = (yyvsp[-2].member);
|
|
}
|
|
#line 3127 "gram.c"
|
|
break;
|
|
|
|
case 151: /* opgroup: group */
|
|
#line 1169 "gram.y"
|
|
{
|
|
(yyval.member) = (yyvsp[0].member);
|
|
(yyval.member)->negated = false;
|
|
}
|
|
#line 3136 "gram.c"
|
|
break;
|
|
|
|
case 152: /* opgroup: '!' group */
|
|
#line 1173 "gram.y"
|
|
{
|
|
(yyval.member) = (yyvsp[0].member);
|
|
(yyval.member)->negated = true;
|
|
}
|
|
#line 3145 "gram.c"
|
|
break;
|
|
|
|
case 153: /* group: ALIAS */
|
|
#line 1179 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), ALIAS);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 3159 "gram.c"
|
|
break;
|
|
|
|
case 154: /* group: ALL */
|
|
#line 1188 "gram.y"
|
|
{
|
|
(yyval.member) = new_member(NULL, ALL);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 3172 "gram.c"
|
|
break;
|
|
|
|
case 155: /* group: WORD */
|
|
#line 1196 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), WORD);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 3186 "gram.c"
|
|
break;
|
|
|
|
|
|
#line 3190 "gram.c"
|
|
|
|
default: break;
|
|
}
|
|
/* User semantic actions sometimes alter yychar, and that requires
|
|
that yytoken be updated with the new translation. We take the
|
|
approach of translating immediately before every use of yytoken.
|
|
One alternative is translating here after every semantic action,
|
|
but that translation would be missed if the semantic action invokes
|
|
YYABORT, YYACCEPT, or YYERROR immediately after altering yychar or
|
|
if it invokes YYBACKUP. In the case of YYABORT or YYACCEPT, an
|
|
incorrect destructor might then be invoked immediately. In the
|
|
case of YYERROR or YYBACKUP, subsequent parser actions might lead
|
|
to an incorrect destructor call or verbose syntax error message
|
|
before the lookahead is translated. */
|
|
YY_SYMBOL_PRINT ("-> $$ =", YY_CAST (yysymbol_kind_t, yyr1[yyn]), &yyval, &yyloc);
|
|
|
|
YYPOPSTACK (yylen);
|
|
yylen = 0;
|
|
|
|
*++yyvsp = yyval;
|
|
|
|
/* Now 'shift' the result of the reduction. Determine what state
|
|
that goes to, based on the state we popped back to and the rule
|
|
number reduced by. */
|
|
{
|
|
const int yylhs = yyr1[yyn] - YYNTOKENS;
|
|
const int yyi = yypgoto[yylhs] + *yyssp;
|
|
yystate = (0 <= yyi && yyi <= YYLAST && yycheck[yyi] == *yyssp
|
|
? yytable[yyi]
|
|
: yydefgoto[yylhs]);
|
|
}
|
|
|
|
goto yynewstate;
|
|
|
|
|
|
/*--------------------------------------.
|
|
| yyerrlab -- here on detecting error. |
|
|
`--------------------------------------*/
|
|
yyerrlab:
|
|
/* Make sure we have latest lookahead translation. See comments at
|
|
user semantic actions for why this is necessary. */
|
|
yytoken = yychar == YYEMPTY ? YYSYMBOL_YYEMPTY : YYTRANSLATE (yychar);
|
|
/* If not already recovering from an error, report this error. */
|
|
if (!yyerrstatus)
|
|
{
|
|
++yynerrs;
|
|
yyerror (YY_("syntax error"));
|
|
}
|
|
|
|
if (yyerrstatus == 3)
|
|
{
|
|
/* If just tried and failed to reuse lookahead token after an
|
|
error, discard it. */
|
|
|
|
if (yychar <= YYEOF)
|
|
{
|
|
/* Return failure if at end of input. */
|
|
if (yychar == YYEOF)
|
|
YYABORT;
|
|
}
|
|
else
|
|
{
|
|
yydestruct ("Error: discarding",
|
|
yytoken, &yylval);
|
|
yychar = YYEMPTY;
|
|
}
|
|
}
|
|
|
|
/* Else will try to reuse lookahead token after shifting the error
|
|
token. */
|
|
goto yyerrlab1;
|
|
|
|
|
|
/*---------------------------------------------------.
|
|
| yyerrorlab -- error raised explicitly by YYERROR. |
|
|
`---------------------------------------------------*/
|
|
yyerrorlab:
|
|
/* Pacify compilers when the user code never invokes YYERROR and the
|
|
label yyerrorlab therefore never appears in user code. */
|
|
if (0)
|
|
YYERROR;
|
|
++yynerrs;
|
|
|
|
/* Do not reclaim the symbols of the rule whose action triggered
|
|
this YYERROR. */
|
|
YYPOPSTACK (yylen);
|
|
yylen = 0;
|
|
YY_STACK_PRINT (yyss, yyssp);
|
|
yystate = *yyssp;
|
|
goto yyerrlab1;
|
|
|
|
|
|
/*-------------------------------------------------------------.
|
|
| yyerrlab1 -- common code for both syntax error and YYERROR. |
|
|
`-------------------------------------------------------------*/
|
|
yyerrlab1:
|
|
yyerrstatus = 3; /* Each real token shifted decrements this. */
|
|
|
|
/* Pop stack until we find a state that shifts the error token. */
|
|
for (;;)
|
|
{
|
|
yyn = yypact[yystate];
|
|
if (!yypact_value_is_default (yyn))
|
|
{
|
|
yyn += YYSYMBOL_YYerror;
|
|
if (0 <= yyn && yyn <= YYLAST && yycheck[yyn] == YYSYMBOL_YYerror)
|
|
{
|
|
yyn = yytable[yyn];
|
|
if (0 < yyn)
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* Pop the current state because it cannot handle the error token. */
|
|
if (yyssp == yyss)
|
|
YYABORT;
|
|
|
|
|
|
yydestruct ("Error: popping",
|
|
YY_ACCESSING_SYMBOL (yystate), yyvsp);
|
|
YYPOPSTACK (1);
|
|
yystate = *yyssp;
|
|
YY_STACK_PRINT (yyss, yyssp);
|
|
}
|
|
|
|
YY_IGNORE_MAYBE_UNINITIALIZED_BEGIN
|
|
*++yyvsp = yylval;
|
|
YY_IGNORE_MAYBE_UNINITIALIZED_END
|
|
|
|
|
|
/* Shift the error token. */
|
|
YY_SYMBOL_PRINT ("Shifting", YY_ACCESSING_SYMBOL (yyn), yyvsp, yylsp);
|
|
|
|
yystate = yyn;
|
|
goto yynewstate;
|
|
|
|
|
|
/*-------------------------------------.
|
|
| yyacceptlab -- YYACCEPT comes here. |
|
|
`-------------------------------------*/
|
|
yyacceptlab:
|
|
yyresult = 0;
|
|
goto yyreturnlab;
|
|
|
|
|
|
/*-----------------------------------.
|
|
| yyabortlab -- YYABORT comes here. |
|
|
`-----------------------------------*/
|
|
yyabortlab:
|
|
yyresult = 1;
|
|
goto yyreturnlab;
|
|
|
|
|
|
/*-----------------------------------------------------------.
|
|
| yyexhaustedlab -- YYNOMEM (memory exhaustion) comes here. |
|
|
`-----------------------------------------------------------*/
|
|
yyexhaustedlab:
|
|
yyerror (YY_("memory exhausted"));
|
|
yyresult = 2;
|
|
goto yyreturnlab;
|
|
|
|
|
|
/*----------------------------------------------------------.
|
|
| yyreturnlab -- parsing is finished, clean up and return. |
|
|
`----------------------------------------------------------*/
|
|
yyreturnlab:
|
|
if (yychar != YYEMPTY)
|
|
{
|
|
/* Make sure we have latest lookahead translation. See comments at
|
|
user semantic actions for why this is necessary. */
|
|
yytoken = YYTRANSLATE (yychar);
|
|
yydestruct ("Cleanup: discarding lookahead",
|
|
yytoken, &yylval);
|
|
}
|
|
/* Do not reclaim the symbols of the rule whose action triggered
|
|
this YYABORT or YYACCEPT. */
|
|
YYPOPSTACK (yylen);
|
|
YY_STACK_PRINT (yyss, yyssp);
|
|
while (yyssp != yyss)
|
|
{
|
|
yydestruct ("Cleanup: popping",
|
|
YY_ACCESSING_SYMBOL (+*yyssp), yyvsp);
|
|
YYPOPSTACK (1);
|
|
}
|
|
#ifndef yyoverflow
|
|
if (yyss != yyssa)
|
|
YYSTACK_FREE (yyss);
|
|
#endif
|
|
|
|
return yyresult;
|
|
}
|
|
|
|
#line 1206 "gram.y"
|
|
|
|
/* Like yyerror() but takes a printf-style format string. */
|
|
void
|
|
sudoerserrorf(const char * restrict fmt, ...)
|
|
{
|
|
const int column = (int)(sudolinebuf.toke_start + 1);
|
|
va_list ap;
|
|
debug_decl(sudoerserrorf, SUDOERS_DEBUG_PARSER);
|
|
|
|
if (sudoers_error_hook != NULL) {
|
|
va_start(ap, fmt);
|
|
sudoers_error_hook(parsed_policy.ctx, sudoers, this_lineno, column,
|
|
fmt, ap);
|
|
va_end(ap);
|
|
}
|
|
if (parser_conf.verbose > 0 && fmt != NULL) {
|
|
LEXTRACE("<*> ");
|
|
#ifndef TRACELEXER
|
|
if (trace_print == NULL || trace_print == sudoers_trace_print) {
|
|
char *tofree = NULL;
|
|
const char *s;
|
|
int oldlocale;
|
|
|
|
/* Warnings are displayed in the user's locale. */
|
|
sudoers_setlocale(SUDOERS_LOCALE_USER, &oldlocale);
|
|
|
|
va_start(ap, fmt);
|
|
if (strcmp(fmt, "%s") == 0) {
|
|
/* Optimize common case, a single string. */
|
|
s = _(va_arg(ap, char *));
|
|
} else {
|
|
if (vasprintf(&tofree, _(fmt), ap) != -1) {
|
|
s = tofree;
|
|
} else {
|
|
s = _("syntax error");
|
|
tofree = NULL;
|
|
}
|
|
}
|
|
sudo_printf(SUDO_CONV_ERROR_MSG, _("%s:%d:%zu: %s\n"), sudoers,
|
|
this_lineno, sudolinebuf.toke_start + 1, s);
|
|
free(tofree);
|
|
va_end(ap);
|
|
sudoers_setlocale(oldlocale, NULL);
|
|
|
|
/* Display the offending line and token if possible. */
|
|
if (sudolinebuf.len != 0) {
|
|
char tildes[128];
|
|
size_t tlen = 0;
|
|
|
|
sudo_printf(SUDO_CONV_ERROR_MSG, "%s%s", sudolinebuf.buf,
|
|
sudolinebuf.buf[sudolinebuf.len - 1] == '\n' ? "" : "\n");
|
|
if (sudolinebuf.toke_end > sudolinebuf.toke_start) {
|
|
tlen = sudolinebuf.toke_end - sudolinebuf.toke_start - 1;
|
|
if (tlen >= sizeof(tildes))
|
|
tlen = sizeof(tildes) - 1;
|
|
memset(tildes, '~', tlen);
|
|
}
|
|
tildes[tlen] = '\0';
|
|
sudo_printf(SUDO_CONV_ERROR_MSG, "%*s^%s\n",
|
|
(int)sudolinebuf.toke_start, "", tildes);
|
|
}
|
|
}
|
|
#endif
|
|
}
|
|
parse_error = true;
|
|
debug_return;
|
|
}
|
|
|
|
void
|
|
sudoerserror(const char *s)
|
|
{
|
|
if (sudoerschar == ERROR) {
|
|
/* Use error string from lexer. */
|
|
s = sudoers_errstr;
|
|
sudoers_errstr = NULL;
|
|
}
|
|
|
|
#pragma pvs(push)
|
|
#pragma pvs(disable: 575, 618)
|
|
|
|
if (s == NULL)
|
|
sudoerserrorf(NULL);
|
|
else
|
|
sudoerserrorf("%s", s);
|
|
|
|
#pragma pvs(pop)
|
|
}
|
|
|
|
static void
|
|
alias_error(const char *name, short type, int errnum)
|
|
{
|
|
if (errnum == EEXIST) {
|
|
struct alias *a = alias_get(&parsed_policy, name, type);
|
|
if (a != NULL) {
|
|
sudoerserrorf(
|
|
U_("duplicate %s \"%s\", previously defined at %s:%d:%d"),
|
|
alias_type_to_string(type), name, a->file, a->line, a->column);
|
|
alias_put(a);
|
|
} else {
|
|
if (errno == ELOOP) {
|
|
sudoerserrorf(U_("cycle in %s \"%s\""),
|
|
alias_type_to_string(type), name);
|
|
} else {
|
|
sudoerserrorf(U_("duplicate %s \"%s\""),
|
|
alias_type_to_string(type), name);
|
|
}
|
|
}
|
|
} else {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
}
|
|
}
|
|
|
|
static struct defaults *
|
|
new_default(char *var, char *val, short op)
|
|
{
|
|
struct defaults *d;
|
|
debug_decl(new_default, SUDOERS_DEBUG_PARSER);
|
|
|
|
if ((d = calloc(1, sizeof(struct defaults))) == NULL) {
|
|
sudo_debug_printf(SUDO_DEBUG_ERROR|SUDO_DEBUG_LINENO,
|
|
"unable to allocate memory");
|
|
debug_return_ptr(NULL);
|
|
}
|
|
|
|
d->var = var;
|
|
d->val = val;
|
|
/* d->type = 0; */
|
|
d->op = op;
|
|
/* d->binding = NULL; */
|
|
d->line = this_lineno;
|
|
d->column = (int)(sudolinebuf.toke_start + 1);
|
|
d->file = sudo_rcstr_addref(sudoers);
|
|
HLTQ_INIT(d, entries);
|
|
|
|
debug_return_ptr(d);
|
|
}
|
|
|
|
static struct member *
|
|
new_member(char *name, short type)
|
|
{
|
|
struct member *m;
|
|
debug_decl(new_member, SUDOERS_DEBUG_PARSER);
|
|
|
|
if ((m = calloc(1, sizeof(struct member))) == NULL) {
|
|
sudo_debug_printf(SUDO_DEBUG_ERROR|SUDO_DEBUG_LINENO,
|
|
"unable to allocate memory");
|
|
debug_return_ptr(NULL);
|
|
}
|
|
|
|
m->name = name;
|
|
m->type = type;
|
|
HLTQ_INIT(m, entries);
|
|
|
|
debug_return_ptr(m);
|
|
}
|
|
|
|
static struct sudo_command *
|
|
new_command(char *cmnd, char *args)
|
|
{
|
|
struct sudo_command *c;
|
|
debug_decl(new_command, SUDOERS_DEBUG_PARSER);
|
|
|
|
if ((c = calloc(1, sizeof(*c))) == NULL) {
|
|
sudo_debug_printf(SUDO_DEBUG_ERROR|SUDO_DEBUG_LINENO,
|
|
"unable to allocate memory");
|
|
debug_return_ptr(NULL);
|
|
}
|
|
/* garbage collected as part of struct member */
|
|
|
|
c->cmnd = cmnd;
|
|
c->args = args;
|
|
TAILQ_INIT(&c->digests);
|
|
|
|
debug_return_ptr(c);
|
|
}
|
|
|
|
static struct command_digest *
|
|
new_digest(unsigned int digest_type, char *digest_str)
|
|
{
|
|
struct command_digest *digest;
|
|
debug_decl(new_digest, SUDOERS_DEBUG_PARSER);
|
|
|
|
if ((digest = malloc(sizeof(*digest))) == NULL) {
|
|
sudo_debug_printf(SUDO_DEBUG_ERROR|SUDO_DEBUG_LINENO,
|
|
"unable to allocate memory");
|
|
debug_return_ptr(NULL);
|
|
}
|
|
|
|
HLTQ_INIT(digest, entries);
|
|
digest->digest_type = digest_type;
|
|
digest->digest_str = digest_str;
|
|
if (digest->digest_str == NULL) {
|
|
sudo_debug_printf(SUDO_DEBUG_ERROR|SUDO_DEBUG_LINENO,
|
|
"unable to allocate memory");
|
|
free(digest);
|
|
digest = NULL;
|
|
}
|
|
|
|
debug_return_ptr(digest);
|
|
}
|
|
|
|
static void
|
|
free_defaults_binding(struct defaults_binding *binding)
|
|
{
|
|
debug_decl(free_defaults_binding, SUDOERS_DEBUG_PARSER);
|
|
|
|
/* Bindings may be shared among multiple Defaults entries. */
|
|
if (binding != NULL) {
|
|
if (--binding->refcnt == 0) {
|
|
free_members(&binding->members);
|
|
free(binding);
|
|
}
|
|
}
|
|
|
|
debug_return;
|
|
}
|
|
|
|
/*
|
|
* Add a list of defaults structures to the defaults list.
|
|
* The bmem argument, if non-NULL, specifies a list of hosts, users,
|
|
* or runas users the entries apply to (determined by the type).
|
|
*/
|
|
static bool
|
|
add_defaults(short type, struct member *bmem, struct defaults *defs)
|
|
{
|
|
struct defaults *d, *next;
|
|
struct defaults_binding *binding;
|
|
bool ret = true;
|
|
debug_decl(add_defaults, SUDOERS_DEBUG_PARSER);
|
|
|
|
if (defs == NULL)
|
|
debug_return_bool(false);
|
|
|
|
/*
|
|
* We use a single binding for each entry in defs.
|
|
*/
|
|
if ((binding = malloc(sizeof(*binding))) == NULL) {
|
|
sudo_debug_printf(SUDO_DEBUG_ERROR|SUDO_DEBUG_LINENO,
|
|
"unable to allocate memory");
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
debug_return_bool(false);
|
|
}
|
|
if (bmem != NULL) {
|
|
parser_leak_remove(LEAK_MEMBER, bmem);
|
|
HLTQ_TO_TAILQ(&binding->members, bmem, entries);
|
|
} else {
|
|
TAILQ_INIT(&binding->members);
|
|
}
|
|
binding->refcnt = 0;
|
|
|
|
/*
|
|
* Set type and binding (who it applies to) for new entries.
|
|
* Then add to the global defaults list.
|
|
*/
|
|
parser_leak_remove(LEAK_DEFAULTS, defs);
|
|
HLTQ_FOREACH_SAFE(d, defs, entries, next) {
|
|
d->type = type;
|
|
d->binding = binding;
|
|
binding->refcnt++;
|
|
TAILQ_INSERT_TAIL(&parsed_policy.defaults, d, entries);
|
|
}
|
|
|
|
debug_return_bool(ret);
|
|
}
|
|
|
|
/*
|
|
* Allocate a new struct userspec, populate it, and insert it at the
|
|
* end of the userspecs list.
|
|
*/
|
|
static bool
|
|
add_userspec(struct member *members, struct privilege *privs)
|
|
{
|
|
struct userspec *u;
|
|
debug_decl(add_userspec, SUDOERS_DEBUG_PARSER);
|
|
|
|
if ((u = calloc(1, sizeof(*u))) == NULL) {
|
|
sudo_debug_printf(SUDO_DEBUG_ERROR|SUDO_DEBUG_LINENO,
|
|
"unable to allocate memory");
|
|
debug_return_bool(false);
|
|
}
|
|
/* We already parsed the newline so sudolineno is off by one. */
|
|
u->line = sudolineno - 1;
|
|
u->column = (int)(sudolinebuf.toke_start + 1);
|
|
u->file = sudo_rcstr_addref(sudoers);
|
|
parser_leak_remove(LEAK_MEMBER, members);
|
|
HLTQ_TO_TAILQ(&u->users, members, entries);
|
|
parser_leak_remove(LEAK_PRIVILEGE, privs);
|
|
HLTQ_TO_TAILQ(&u->privileges, privs, entries);
|
|
STAILQ_INIT(&u->comments);
|
|
TAILQ_INSERT_TAIL(&parsed_policy.userspecs, u, entries);
|
|
|
|
debug_return_bool(true);
|
|
}
|
|
|
|
/*
|
|
* Free a member struct and its contents.
|
|
*/
|
|
void
|
|
free_member(struct member *m)
|
|
{
|
|
debug_decl(free_member, SUDOERS_DEBUG_PARSER);
|
|
|
|
if (m->type == COMMAND || (m->type == ALL && m->name != NULL)) {
|
|
struct command_digest *digest;
|
|
struct sudo_command *c = (struct sudo_command *)m->name;
|
|
free(c->cmnd);
|
|
free(c->args);
|
|
while ((digest = TAILQ_FIRST(&c->digests)) != NULL) {
|
|
TAILQ_REMOVE(&c->digests, digest, entries);
|
|
free(digest->digest_str);
|
|
free(digest);
|
|
}
|
|
}
|
|
free(m->name);
|
|
free(m);
|
|
|
|
debug_return;
|
|
}
|
|
|
|
/*
|
|
* Free a tailq of members but not the struct member_list container itself.
|
|
*/
|
|
void
|
|
free_members(struct member_list *members)
|
|
{
|
|
struct member *m;
|
|
debug_decl(free_members, SUDOERS_DEBUG_PARSER);
|
|
|
|
while ((m = TAILQ_FIRST(members)) != NULL) {
|
|
TAILQ_REMOVE(members, m, entries);
|
|
free_member(m);
|
|
}
|
|
|
|
debug_return;
|
|
}
|
|
|
|
void
|
|
free_defaults(struct defaults_list *defs)
|
|
{
|
|
struct defaults *def;
|
|
debug_decl(free_defaults, SUDOERS_DEBUG_PARSER);
|
|
|
|
while ((def = TAILQ_FIRST(defs)) != NULL) {
|
|
TAILQ_REMOVE(defs, def, entries);
|
|
free_default(def);
|
|
}
|
|
|
|
debug_return;
|
|
}
|
|
|
|
void
|
|
free_default(struct defaults *def)
|
|
{
|
|
debug_decl(free_default, SUDOERS_DEBUG_PARSER);
|
|
|
|
free_defaults_binding(def->binding);
|
|
sudo_rcstr_delref(def->file);
|
|
free(def->var);
|
|
free(def->val);
|
|
free(def);
|
|
|
|
debug_return;
|
|
}
|
|
|
|
void
|
|
free_cmndspec(struct cmndspec *cs, struct cmndspec_list *csl)
|
|
{
|
|
struct cmndspec *prev, *next;
|
|
debug_decl(free_cmndspec, SUDOERS_DEBUG_PARSER);
|
|
|
|
prev = TAILQ_PREV(cs, cmndspec_list, entries);
|
|
next = TAILQ_NEXT(cs, entries);
|
|
TAILQ_REMOVE(csl, cs, entries);
|
|
|
|
/* Don't free runcwd/runchroot that are in use by other entries. */
|
|
if ((prev == NULL || cs->runcwd != prev->runcwd) &&
|
|
(next == NULL || cs->runcwd != next->runcwd)) {
|
|
free(cs->runcwd);
|
|
}
|
|
if ((prev == NULL || cs->runchroot != prev->runchroot) &&
|
|
(next == NULL || cs->runchroot != next->runchroot)) {
|
|
free(cs->runchroot);
|
|
}
|
|
/* Don't free root/type that are in use by other entries. */
|
|
if ((prev == NULL || cs->role != prev->role) &&
|
|
(next == NULL || cs->role != next->role)) {
|
|
free(cs->role);
|
|
}
|
|
if ((prev == NULL || cs->type != prev->type) &&
|
|
(next == NULL || cs->type != next->type)) {
|
|
free(cs->type);
|
|
}
|
|
/* Don't free apparmor_profile that is in use by other entries. */
|
|
if ((prev == NULL || cs->apparmor_profile != prev->apparmor_profile) &&
|
|
(next == NULL || cs->apparmor_profile != next->apparmor_profile)) {
|
|
free(cs->apparmor_profile);
|
|
}
|
|
/* Don't free privs/limitprivs that are in use by other entries. */
|
|
if ((prev == NULL || cs->privs != prev->privs) &&
|
|
(next == NULL || cs->privs != next->privs)) {
|
|
free(cs->privs);
|
|
}
|
|
if ((prev == NULL || cs->limitprivs != prev->limitprivs) &&
|
|
(next == NULL || cs->limitprivs != next->limitprivs)) {
|
|
free(cs->limitprivs);
|
|
}
|
|
/* Don't free user/group lists that are in use by other entries. */
|
|
if (cs->runasuserlist != NULL) {
|
|
if ((prev == NULL || cs->runasuserlist != prev->runasuserlist) &&
|
|
(next == NULL || cs->runasuserlist != next->runasuserlist)) {
|
|
free_members(cs->runasuserlist);
|
|
free(cs->runasuserlist);
|
|
}
|
|
}
|
|
if (cs->runasgrouplist != NULL) {
|
|
if ((prev == NULL || cs->runasgrouplist != prev->runasgrouplist) &&
|
|
(next == NULL || cs->runasgrouplist != next->runasgrouplist)) {
|
|
free_members(cs->runasgrouplist);
|
|
free(cs->runasgrouplist);
|
|
}
|
|
}
|
|
free_member(cs->cmnd);
|
|
free(cs);
|
|
|
|
debug_return;
|
|
}
|
|
|
|
void
|
|
free_cmndspecs(struct cmndspec_list *csl)
|
|
{
|
|
struct member_list *runasuserlist = NULL, *runasgrouplist = NULL;
|
|
char *runcwd = NULL, *runchroot = NULL;
|
|
char *role = NULL, *type = NULL;
|
|
char *apparmor_profile = NULL;
|
|
char *privs = NULL, *limitprivs = NULL;
|
|
struct cmndspec *cs;
|
|
debug_decl(free_cmndspecs, SUDOERS_DEBUG_PARSER);
|
|
|
|
while ((cs = TAILQ_FIRST(csl)) != NULL) {
|
|
TAILQ_REMOVE(csl, cs, entries);
|
|
|
|
/* Only free the first instance of runcwd/runchroot. */
|
|
if (cs->runcwd != runcwd) {
|
|
runcwd = cs->runcwd;
|
|
free(cs->runcwd);
|
|
}
|
|
if (cs->runchroot != runchroot) {
|
|
runchroot = cs->runchroot;
|
|
free(cs->runchroot);
|
|
}
|
|
/* Only free the first instance of a role/type. */
|
|
if (cs->role != role) {
|
|
role = cs->role;
|
|
free(cs->role);
|
|
}
|
|
if (cs->type != type) {
|
|
type = cs->type;
|
|
free(cs->type);
|
|
}
|
|
/* Only free the first instance of apparmor_profile. */
|
|
if (cs->apparmor_profile != apparmor_profile) {
|
|
apparmor_profile = cs->apparmor_profile;
|
|
free(cs->apparmor_profile);
|
|
}
|
|
/* Only free the first instance of privs/limitprivs. */
|
|
if (cs->privs != privs) {
|
|
privs = cs->privs;
|
|
free(cs->privs);
|
|
}
|
|
if (cs->limitprivs != limitprivs) {
|
|
limitprivs = cs->limitprivs;
|
|
free(cs->limitprivs);
|
|
}
|
|
/* Only free the first instance of runas user/group lists. */
|
|
if (cs->runasuserlist && cs->runasuserlist != runasuserlist) {
|
|
runasuserlist = cs->runasuserlist;
|
|
free_members(runasuserlist);
|
|
free(runasuserlist);
|
|
}
|
|
if (cs->runasgrouplist && cs->runasgrouplist != runasgrouplist) {
|
|
runasgrouplist = cs->runasgrouplist;
|
|
free_members(runasgrouplist);
|
|
free(runasgrouplist);
|
|
}
|
|
free_member(cs->cmnd);
|
|
free(cs);
|
|
}
|
|
|
|
debug_return;
|
|
}
|
|
|
|
void
|
|
free_privilege(struct privilege *priv)
|
|
{
|
|
struct defaults *def;
|
|
debug_decl(free_privilege, SUDOERS_DEBUG_PARSER);
|
|
|
|
free(priv->ldap_role);
|
|
free_members(&priv->hostlist);
|
|
free_cmndspecs(&priv->cmndlist);
|
|
while ((def = TAILQ_FIRST(&priv->defaults)) != NULL) {
|
|
TAILQ_REMOVE(&priv->defaults, def, entries);
|
|
free_default(def);
|
|
}
|
|
free(priv);
|
|
|
|
debug_return;
|
|
}
|
|
|
|
void
|
|
free_userspecs(struct userspec_list *usl)
|
|
{
|
|
struct userspec *us;
|
|
debug_decl(free_userspecs, SUDOERS_DEBUG_PARSER);
|
|
|
|
while ((us = TAILQ_FIRST(usl)) != NULL) {
|
|
TAILQ_REMOVE(usl, us, entries);
|
|
free_userspec(us);
|
|
}
|
|
|
|
debug_return;
|
|
}
|
|
|
|
void
|
|
free_userspec(struct userspec *us)
|
|
{
|
|
struct privilege *priv;
|
|
struct sudoers_comment *comment;
|
|
debug_decl(free_userspec, SUDOERS_DEBUG_PARSER);
|
|
|
|
free_members(&us->users);
|
|
while ((priv = TAILQ_FIRST(&us->privileges)) != NULL) {
|
|
TAILQ_REMOVE(&us->privileges, priv, entries);
|
|
free_privilege(priv);
|
|
}
|
|
while ((comment = STAILQ_FIRST(&us->comments)) != NULL) {
|
|
STAILQ_REMOVE_HEAD(&us->comments, entries);
|
|
free(comment->str);
|
|
free(comment);
|
|
}
|
|
sudo_rcstr_delref(us->file);
|
|
free(us);
|
|
|
|
debug_return;
|
|
}
|
|
|
|
/*
|
|
* Initialized a sudoers parse tree.
|
|
* Takes ownership of lhost and shost.
|
|
*/
|
|
void
|
|
init_parse_tree(struct sudoers_parse_tree *parse_tree, char *lhost, char *shost,
|
|
struct sudoers_context *ctx, struct sudo_nss *nss)
|
|
{
|
|
TAILQ_INIT(&parse_tree->userspecs);
|
|
TAILQ_INIT(&parse_tree->defaults);
|
|
parse_tree->aliases = NULL;
|
|
parse_tree->shost = shost;
|
|
parse_tree->lhost = lhost;
|
|
parse_tree->ctx = ctx;
|
|
parse_tree->nss = nss;
|
|
}
|
|
|
|
/*
|
|
* Move the contents of parsed_policy to new_tree.
|
|
*/
|
|
void
|
|
reparent_parse_tree(struct sudoers_parse_tree *new_tree)
|
|
{
|
|
TAILQ_CONCAT(&new_tree->userspecs, &parsed_policy.userspecs, entries);
|
|
TAILQ_CONCAT(&new_tree->defaults, &parsed_policy.defaults, entries);
|
|
new_tree->aliases = parsed_policy.aliases;
|
|
parsed_policy.aliases = NULL;
|
|
}
|
|
|
|
/*
|
|
* Free the contents of a sudoers parse tree and initialize it.
|
|
*/
|
|
void
|
|
free_parse_tree(struct sudoers_parse_tree *parse_tree)
|
|
{
|
|
free_userspecs(&parse_tree->userspecs);
|
|
free_defaults(&parse_tree->defaults);
|
|
free_aliases(parse_tree->aliases);
|
|
parse_tree->aliases = NULL;
|
|
free(parse_tree->lhost);
|
|
if (parse_tree->shost != parse_tree->lhost)
|
|
free(parse_tree->shost);
|
|
parse_tree->lhost = parse_tree->shost = NULL;
|
|
parse_tree->nss = NULL;
|
|
parse_tree->ctx = NULL;
|
|
}
|
|
|
|
/*
|
|
* Free up space used by data structures from a previous parser run and sets
|
|
* the current sudoers file to path.
|
|
*/
|
|
bool
|
|
init_parser(struct sudoers_context *ctx, const char *file)
|
|
{
|
|
bool ret = true;
|
|
debug_decl(init_parser, SUDOERS_DEBUG_PARSER);
|
|
|
|
free_parse_tree(&parsed_policy);
|
|
parsed_policy.ctx = ctx;
|
|
parser_leak_init();
|
|
init_lexer();
|
|
parse_error = false;
|
|
|
|
if (ctx != NULL) {
|
|
parser_conf = ctx->parser_conf;
|
|
} else {
|
|
const struct sudoers_parser_config def_conf =
|
|
SUDOERS_PARSER_CONFIG_INITIALIZER;
|
|
parser_conf = def_conf;
|
|
}
|
|
|
|
sudo_rcstr_delref(sudoers);
|
|
if (file != NULL) {
|
|
if ((sudoers = sudo_rcstr_dup(file)) == NULL) {
|
|
sudo_warnx(U_("%s: %s"), __func__, U_("unable to allocate memory"));
|
|
ret = false;
|
|
}
|
|
} else {
|
|
sudoers = NULL;
|
|
}
|
|
|
|
sudo_rcstr_delref(sudoers_search_path);
|
|
if (parser_conf.sudoers_path != NULL) {
|
|
sudoers_search_path = sudo_rcstr_dup(parser_conf.sudoers_path);
|
|
if (sudoers_search_path == NULL) {
|
|
sudo_warnx(U_("%s: %s"), __func__, U_("unable to allocate memory"));
|
|
ret = false;
|
|
}
|
|
} else {
|
|
sudoers_search_path = NULL;
|
|
}
|
|
|
|
debug_return_bool(ret);
|
|
}
|
|
|
|
bool
|
|
reset_parser(void)
|
|
{
|
|
return init_parser(NULL, NULL);
|
|
}
|
|
|
|
/*
|
|
* Initialize all options in a cmndspec.
|
|
*/
|
|
static void
|
|
init_options(struct command_options *opts)
|
|
{
|
|
opts->notbefore = UNSPEC;
|
|
opts->notafter = UNSPEC;
|
|
opts->timeout = UNSPEC;
|
|
opts->runchroot = NULL;
|
|
opts->runcwd = NULL;
|
|
opts->role = NULL;
|
|
opts->type = NULL;
|
|
opts->apparmor_profile = NULL;
|
|
opts->privs = NULL;
|
|
opts->limitprivs = NULL;
|
|
}
|
|
|
|
uid_t
|
|
sudoers_file_uid(void)
|
|
{
|
|
return parser_conf.sudoers_uid;
|
|
}
|
|
|
|
gid_t
|
|
sudoers_file_gid(void)
|
|
{
|
|
return parser_conf.sudoers_gid;
|
|
}
|
|
|
|
mode_t
|
|
sudoers_file_mode(void)
|
|
{
|
|
return parser_conf.sudoers_mode;
|
|
}
|
|
|
|
bool
|
|
sudoers_error_recovery(void)
|
|
{
|
|
return parser_conf.recovery;
|
|
}
|
|
|
|
bool
|
|
sudoers_strict(void)
|
|
{
|
|
return parser_conf.strict;
|
|
}
|
|
|
|
bool
|
|
parser_leak_add(enum parser_leak_types type, void *v)
|
|
{
|
|
#ifdef NO_LEAKS
|
|
struct parser_leak_entry *entry;
|
|
debug_decl(parser_leak_add, SUDOERS_DEBUG_PARSER);
|
|
|
|
if (v == NULL)
|
|
debug_return_bool(false);
|
|
|
|
entry = calloc(1, sizeof(*entry));
|
|
if (entry == NULL) {
|
|
sudo_warnx(U_("%s: %s"), __func__, U_("unable to allocate memory"));
|
|
debug_return_bool(false);
|
|
}
|
|
switch (type) {
|
|
case LEAK_PRIVILEGE:
|
|
entry->u.p = v;
|
|
break;
|
|
case LEAK_CMNDSPEC:
|
|
entry->u.cs = v;
|
|
break;
|
|
case LEAK_DEFAULTS:
|
|
entry->u.d = v;
|
|
break;
|
|
case LEAK_MEMBER:
|
|
entry->u.m = v;
|
|
break;
|
|
case LEAK_DIGEST:
|
|
entry->u.dig = v;
|
|
break;
|
|
case LEAK_RUNAS:
|
|
entry->u.rc = v;
|
|
break;
|
|
case LEAK_PTR:
|
|
entry->u.ptr = v;
|
|
break;
|
|
default:
|
|
free(entry);
|
|
sudo_warnx("unexpected leak type %d", type);
|
|
debug_return_bool(false);
|
|
}
|
|
entry->type = type;
|
|
SLIST_INSERT_HEAD(&parser_leak_list, entry, entries);
|
|
debug_return_bool(true);
|
|
#else
|
|
return true;
|
|
#endif /* NO_LEAKS */
|
|
}
|
|
|
|
bool
|
|
parser_leak_remove(enum parser_leak_types type, void *v)
|
|
{
|
|
#ifdef NO_LEAKS
|
|
struct parser_leak_entry *entry, *prev = NULL;
|
|
debug_decl(parser_leak_remove, SUDOERS_DEBUG_PARSER);
|
|
|
|
if (v == NULL)
|
|
debug_return_bool(false);
|
|
|
|
SLIST_FOREACH(entry, &parser_leak_list, entries) {
|
|
switch (entry->type) {
|
|
case LEAK_PRIVILEGE:
|
|
if (entry->u.p == v)
|
|
goto found;
|
|
break;
|
|
case LEAK_CMNDSPEC:
|
|
if (entry->u.cs == v)
|
|
goto found;
|
|
break;
|
|
case LEAK_DEFAULTS:
|
|
if (entry->u.d == v)
|
|
goto found;
|
|
break;
|
|
case LEAK_MEMBER:
|
|
if (entry->u.m == v)
|
|
goto found;
|
|
break;
|
|
case LEAK_DIGEST:
|
|
if (entry->u.dig == v)
|
|
goto found;
|
|
break;
|
|
case LEAK_RUNAS:
|
|
if (entry->u.rc == v)
|
|
goto found;
|
|
break;
|
|
case LEAK_PTR:
|
|
if (entry->u.ptr == v)
|
|
goto found;
|
|
break;
|
|
default:
|
|
sudo_warnx("unexpected leak type %d in %p", entry->type, entry);
|
|
}
|
|
prev = entry;
|
|
}
|
|
/* If this happens, there is a bug in the leak tracking code. */
|
|
sudo_warnx("%s: unable to find %p, type %d", __func__, v, type);
|
|
debug_return_bool(false);
|
|
found:
|
|
if (prev == NULL)
|
|
SLIST_REMOVE_HEAD(&parser_leak_list, entries);
|
|
else
|
|
SLIST_REMOVE_AFTER(prev, entries);
|
|
free(entry);
|
|
debug_return_bool(true);
|
|
#else
|
|
return true;
|
|
#endif /* NO_LEAKS */
|
|
}
|
|
|
|
#ifdef NO_LEAKS
|
|
static void
|
|
parser_leak_free(void)
|
|
{
|
|
struct parser_leak_entry *entry;
|
|
void *next;
|
|
debug_decl(parser_leak_run, SUDOERS_DEBUG_PARSER);
|
|
|
|
/* Free the leaks. */
|
|
while ((entry = SLIST_FIRST(&parser_leak_list))) {
|
|
SLIST_REMOVE_HEAD(&parser_leak_list, entries);
|
|
switch (entry->type) {
|
|
case LEAK_PRIVILEGE:
|
|
{
|
|
struct privilege *priv;
|
|
|
|
HLTQ_FOREACH_SAFE(priv, entry->u.p, entries, next)
|
|
free_privilege(priv);
|
|
free(entry);
|
|
}
|
|
break;
|
|
case LEAK_CMNDSPEC:
|
|
{
|
|
struct cmndspec_list specs;
|
|
|
|
HLTQ_TO_TAILQ(&specs, entry->u.cs, entries);
|
|
free_cmndspecs(&specs);
|
|
free(entry);
|
|
}
|
|
break;
|
|
case LEAK_DEFAULTS:
|
|
{
|
|
struct defaults_list defs;
|
|
|
|
HLTQ_TO_TAILQ(&defs, entry->u.d, entries);
|
|
free_defaults(&defs);
|
|
free(entry);
|
|
}
|
|
break;
|
|
case LEAK_MEMBER:
|
|
{
|
|
struct member *m;
|
|
|
|
HLTQ_FOREACH_SAFE(m, entry->u.m, entries, next)
|
|
free_member(m);
|
|
free(entry);
|
|
}
|
|
break;
|
|
case LEAK_DIGEST:
|
|
{
|
|
struct command_digest *dig;
|
|
|
|
HLTQ_FOREACH_SAFE(dig, entry->u.dig, entries, next) {
|
|
free(dig->digest_str);
|
|
free(dig);
|
|
}
|
|
free(entry);
|
|
}
|
|
break;
|
|
case LEAK_RUNAS:
|
|
{
|
|
struct member *m;
|
|
|
|
if (entry->u.rc->runasusers != NULL) {
|
|
HLTQ_FOREACH_SAFE(m, entry->u.rc->runasusers, entries, next)
|
|
free_member(m);
|
|
}
|
|
if (entry->u.rc->runasgroups != NULL) {
|
|
HLTQ_FOREACH_SAFE(m, entry->u.rc->runasgroups, entries, next)
|
|
free_member(m);
|
|
}
|
|
free(entry->u.rc);
|
|
free(entry);
|
|
break;
|
|
}
|
|
case LEAK_PTR:
|
|
free(entry->u.ptr);
|
|
free(entry);
|
|
break;
|
|
default:
|
|
sudo_warnx("unexpected garbage type %d", entry->type);
|
|
}
|
|
}
|
|
|
|
debug_return;
|
|
}
|
|
#endif /* NO_LEAKS */
|
|
|
|
void
|
|
parser_leak_init(void)
|
|
{
|
|
#ifdef NO_LEAKS
|
|
static bool initialized;
|
|
debug_decl(parser_leak_init, SUDOERS_DEBUG_PARSER);
|
|
|
|
if (!initialized) {
|
|
atexit(parser_leak_free);
|
|
initialized = true;
|
|
debug_return;
|
|
}
|
|
|
|
/* Already initialized, free existing leaks. */
|
|
parser_leak_free();
|
|
debug_return;
|
|
#endif /* NO_LEAKS */
|
|
}
|