mirror of
https://github.com/sudo-project/sudo.git
synced 2025-08-22 01:49:11 +00:00
Command tags are inherited from previous Cmnds in a Cmnd_Spec_List. There is a special case of the SETENV tag for the "ALL" command, where SETENV is implied if no explicit SETENV or NOSETENV tag is specified. The code to inherit the SETENV tag didn't take into account that an implied value for SETENV should also be overridden by an explicit SETENV or NOSETENV tag in the previous Cmnd in the Cmnd_Spec_List.
4309 lines
133 KiB
C
4309 lines
133 KiB
C
/*
|
|
* This is an open source non-commercial project. Dear PVS-Studio, please check it.
|
|
* PVS-Studio Static Code Analyzer for C, C++ and C#: http://www.viva64.com
|
|
*/
|
|
|
|
#include <config.h>
|
|
/* A Bison parser, made by GNU Bison 3.8.2. */
|
|
|
|
/* Bison implementation for Yacc-like parsers in C
|
|
|
|
Copyright (C) 1984, 1989-1990, 2000-2015, 2018-2021 Free Software Foundation,
|
|
Inc.
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <https://www.gnu.org/licenses/>. */
|
|
|
|
/* As a special exception, you may create a larger work that contains
|
|
part or all of the Bison parser skeleton and distribute that work
|
|
under terms of your choice, so long as that work isn't itself a
|
|
parser generator using the skeleton or a modified version thereof
|
|
as a parser skeleton. Alternatively, if you modify or redistribute
|
|
the parser skeleton itself, you may (at your option) remove this
|
|
special exception, which will cause the skeleton and the resulting
|
|
Bison output files to be licensed under the GNU General Public
|
|
License without this special exception.
|
|
|
|
This special exception was added by the Free Software Foundation in
|
|
version 2.2 of Bison. */
|
|
|
|
/* C LALR(1) parser skeleton written by Richard Stallman, by
|
|
simplifying the original so-called "semantic" parser. */
|
|
|
|
/* DO NOT RELY ON FEATURES THAT ARE NOT DOCUMENTED in the manual,
|
|
especially those whose name start with YY_ or yy_. They are
|
|
private implementation details that can be changed or removed. */
|
|
|
|
/* All symbols defined below should begin with yy or YY, to avoid
|
|
infringing on user name space. This should be done even for local
|
|
variables, as they might otherwise be expanded by user macros.
|
|
There are some unavoidable exceptions within include files to
|
|
define necessary library symbols; they are noted "INFRINGES ON
|
|
USER NAME SPACE" below. */
|
|
|
|
/* Identify Bison output, and Bison version. */
|
|
#define YYBISON 30802
|
|
|
|
/* Bison version string. */
|
|
#define YYBISON_VERSION "3.8.2"
|
|
|
|
/* Skeleton name. */
|
|
#define YYSKELETON_NAME "yacc.c"
|
|
|
|
/* Pure parsers. */
|
|
#define YYPURE 0
|
|
|
|
/* Push parsers. */
|
|
#define YYPUSH 0
|
|
|
|
/* Pull parsers. */
|
|
#define YYPULL 1
|
|
|
|
|
|
/* Substitute the variable and function names. */
|
|
#define yyparse sudoersparse
|
|
#define yylex sudoerslex
|
|
#define yyerror sudoerserror
|
|
#define yydebug sudoersdebug
|
|
#define yynerrs sudoersnerrs
|
|
#define yylval sudoerslval
|
|
#define yychar sudoerschar
|
|
|
|
/* First part of user prologue. */
|
|
#line 1 "gram.y"
|
|
|
|
/*
|
|
* SPDX-License-Identifier: ISC
|
|
*
|
|
* Copyright (c) 1996, 1998-2005, 2007-2013, 2014-2024
|
|
* Todd C. Miller <Todd.Miller@sudo.ws>
|
|
*
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
* copyright notice and this permission notice appear in all copies.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
*
|
|
* Sponsored in part by the Defense Advanced Research Projects
|
|
* Agency (DARPA) and Air Force Research Laboratory, Air Force
|
|
* Materiel Command, USAF, under agreement number F39502-99-1-0512.
|
|
*/
|
|
|
|
#include <config.h>
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <stddef.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <errno.h>
|
|
|
|
#include <sudoers.h>
|
|
#include <sudo_digest.h>
|
|
#include <toke.h>
|
|
|
|
#ifdef YYBISON
|
|
# define YYERROR_VERBOSE
|
|
#endif
|
|
|
|
/* If we last saw a newline the entry is on the preceding line. */
|
|
#define this_lineno (sudoerschar == '\n' ? sudolineno - 1 : sudolineno)
|
|
|
|
// PVS Studio suppression
|
|
// -V::560, 592, 1037, 1042
|
|
|
|
/*
|
|
* Globals
|
|
*/
|
|
bool parse_error = false;
|
|
|
|
static struct sudoers_parser_config parser_conf =
|
|
SUDOERS_PARSER_CONFIG_INITIALIZER;
|
|
|
|
/* Optional logging function for parse errors. */
|
|
sudoers_logger_t sudoers_error_hook;
|
|
|
|
static int alias_line, alias_column;
|
|
|
|
#ifdef NO_LEAKS
|
|
static struct parser_leak_list parser_leak_list =
|
|
SLIST_HEAD_INITIALIZER(parser_leak_list);
|
|
#endif
|
|
|
|
struct sudoers_parse_tree parsed_policy = {
|
|
{ NULL, NULL }, /* entries */
|
|
TAILQ_HEAD_INITIALIZER(parsed_policy.userspecs),
|
|
TAILQ_HEAD_INITIALIZER(parsed_policy.defaults),
|
|
NULL, /* aliases */
|
|
NULL, /* lhost */
|
|
NULL, /* shost */
|
|
NULL, /* nss */
|
|
NULL /* ctx */
|
|
};
|
|
|
|
/*
|
|
* Local prototypes
|
|
*/
|
|
static bool add_defaults(short, struct member *, struct defaults *);
|
|
static bool add_userspec(struct member *, struct privilege *);
|
|
static struct command_digest *new_digest(unsigned int, char *);
|
|
static struct defaults *new_default(char *, char *, short);
|
|
static struct member *new_member(char *, short);
|
|
static struct sudo_command *new_command(char *, char *);
|
|
static void alias_error(const char *name, short type, int errnum);
|
|
static void init_options(struct command_options *opts);
|
|
static void propagate_cmndspec(struct cmndspec *cs, const struct cmndspec *prev);
|
|
|
|
#line 168 "gram.c"
|
|
|
|
# ifndef YY_CAST
|
|
# ifdef __cplusplus
|
|
# define YY_CAST(Type, Val) static_cast<Type> (Val)
|
|
# define YY_REINTERPRET_CAST(Type, Val) reinterpret_cast<Type> (Val)
|
|
# else
|
|
# define YY_CAST(Type, Val) ((Type) (Val))
|
|
# define YY_REINTERPRET_CAST(Type, Val) ((Type) (Val))
|
|
# endif
|
|
# endif
|
|
# ifndef YY_NULLPTR
|
|
# if defined __cplusplus
|
|
# if 201103L <= __cplusplus
|
|
# define YY_NULLPTR nullptr
|
|
# else
|
|
# define YY_NULLPTR 0
|
|
# endif
|
|
# else
|
|
# define YY_NULLPTR ((void*)0)
|
|
# endif
|
|
# endif
|
|
|
|
/* Use api.header.include to #include this header
|
|
instead of duplicating it here. */
|
|
#ifndef YY_SUDOERS_Y_TAB_H_INCLUDED
|
|
# define YY_SUDOERS_Y_TAB_H_INCLUDED
|
|
/* Debug traces. */
|
|
#ifndef YYDEBUG
|
|
# define YYDEBUG 0
|
|
#endif
|
|
#if YYDEBUG
|
|
extern int sudoersdebug;
|
|
#endif
|
|
|
|
/* Token kinds. */
|
|
#ifndef YYTOKENTYPE
|
|
# define YYTOKENTYPE
|
|
enum yytokentype
|
|
{
|
|
YYEMPTY = -2,
|
|
YYEOF = 0, /* "end of file" */
|
|
YYerror = 256, /* error */
|
|
YYUNDEF = 257, /* "invalid token" */
|
|
COMMAND = 258, /* COMMAND */
|
|
ALIAS = 259, /* ALIAS */
|
|
DEFVAR = 260, /* DEFVAR */
|
|
NTWKADDR = 261, /* NTWKADDR */
|
|
NETGROUP = 262, /* NETGROUP */
|
|
USERGROUP = 263, /* USERGROUP */
|
|
WORD = 264, /* WORD */
|
|
DIGEST = 265, /* DIGEST */
|
|
INCLUDE = 266, /* INCLUDE */
|
|
INCLUDEDIR = 267, /* INCLUDEDIR */
|
|
DEFAULTS = 268, /* DEFAULTS */
|
|
DEFAULTS_HOST = 269, /* DEFAULTS_HOST */
|
|
DEFAULTS_USER = 270, /* DEFAULTS_USER */
|
|
DEFAULTS_RUNAS = 271, /* DEFAULTS_RUNAS */
|
|
DEFAULTS_CMND = 272, /* DEFAULTS_CMND */
|
|
NOPASSWD = 273, /* NOPASSWD */
|
|
PASSWD = 274, /* PASSWD */
|
|
NOEXEC = 275, /* NOEXEC */
|
|
EXEC = 276, /* EXEC */
|
|
SETENV = 277, /* SETENV */
|
|
NOSETENV = 278, /* NOSETENV */
|
|
LOG_INPUT = 279, /* LOG_INPUT */
|
|
NOLOG_INPUT = 280, /* NOLOG_INPUT */
|
|
LOG_OUTPUT = 281, /* LOG_OUTPUT */
|
|
NOLOG_OUTPUT = 282, /* NOLOG_OUTPUT */
|
|
MAIL = 283, /* MAIL */
|
|
NOMAIL = 284, /* NOMAIL */
|
|
FOLLOWLNK = 285, /* FOLLOWLNK */
|
|
NOFOLLOWLNK = 286, /* NOFOLLOWLNK */
|
|
INTERCEPT = 287, /* INTERCEPT */
|
|
NOINTERCEPT = 288, /* NOINTERCEPT */
|
|
ALL = 289, /* ALL */
|
|
HOSTALIAS = 290, /* HOSTALIAS */
|
|
CMNDALIAS = 291, /* CMNDALIAS */
|
|
USERALIAS = 292, /* USERALIAS */
|
|
RUNASALIAS = 293, /* RUNASALIAS */
|
|
ERROR = 294, /* ERROR */
|
|
NOMATCH = 295, /* NOMATCH */
|
|
CHROOT = 296, /* CHROOT */
|
|
CWD = 297, /* CWD */
|
|
TYPE = 298, /* TYPE */
|
|
ROLE = 299, /* ROLE */
|
|
APPARMOR_PROFILE = 300, /* APPARMOR_PROFILE */
|
|
PRIVS = 301, /* PRIVS */
|
|
LIMITPRIVS = 302, /* LIMITPRIVS */
|
|
CMND_TIMEOUT = 303, /* CMND_TIMEOUT */
|
|
NOTBEFORE = 304, /* NOTBEFORE */
|
|
NOTAFTER = 305, /* NOTAFTER */
|
|
MYSELF = 306, /* MYSELF */
|
|
SHA224_TOK = 307, /* SHA224_TOK */
|
|
SHA256_TOK = 308, /* SHA256_TOK */
|
|
SHA384_TOK = 309, /* SHA384_TOK */
|
|
SHA512_TOK = 310 /* SHA512_TOK */
|
|
};
|
|
typedef enum yytokentype yytoken_kind_t;
|
|
#endif
|
|
/* Token kinds. */
|
|
#define YYEMPTY -2
|
|
#define YYEOF 0
|
|
#define YYerror 256
|
|
#define YYUNDEF 257
|
|
#define COMMAND 258
|
|
#define ALIAS 259
|
|
#define DEFVAR 260
|
|
#define NTWKADDR 261
|
|
#define NETGROUP 262
|
|
#define USERGROUP 263
|
|
#define WORD 264
|
|
#define DIGEST 265
|
|
#define INCLUDE 266
|
|
#define INCLUDEDIR 267
|
|
#define DEFAULTS 268
|
|
#define DEFAULTS_HOST 269
|
|
#define DEFAULTS_USER 270
|
|
#define DEFAULTS_RUNAS 271
|
|
#define DEFAULTS_CMND 272
|
|
#define NOPASSWD 273
|
|
#define PASSWD 274
|
|
#define NOEXEC 275
|
|
#define EXEC 276
|
|
#define SETENV 277
|
|
#define NOSETENV 278
|
|
#define LOG_INPUT 279
|
|
#define NOLOG_INPUT 280
|
|
#define LOG_OUTPUT 281
|
|
#define NOLOG_OUTPUT 282
|
|
#define MAIL 283
|
|
#define NOMAIL 284
|
|
#define FOLLOWLNK 285
|
|
#define NOFOLLOWLNK 286
|
|
#define INTERCEPT 287
|
|
#define NOINTERCEPT 288
|
|
#define ALL 289
|
|
#define HOSTALIAS 290
|
|
#define CMNDALIAS 291
|
|
#define USERALIAS 292
|
|
#define RUNASALIAS 293
|
|
#define ERROR 294
|
|
#define NOMATCH 295
|
|
#define CHROOT 296
|
|
#define CWD 297
|
|
#define TYPE 298
|
|
#define ROLE 299
|
|
#define APPARMOR_PROFILE 300
|
|
#define PRIVS 301
|
|
#define LIMITPRIVS 302
|
|
#define CMND_TIMEOUT 303
|
|
#define NOTBEFORE 304
|
|
#define NOTAFTER 305
|
|
#define MYSELF 306
|
|
#define SHA224_TOK 307
|
|
#define SHA256_TOK 308
|
|
#define SHA384_TOK 309
|
|
#define SHA512_TOK 310
|
|
|
|
/* Value type. */
|
|
#if ! defined YYSTYPE && ! defined YYSTYPE_IS_DECLARED
|
|
union YYSTYPE
|
|
{
|
|
#line 91 "gram.y"
|
|
|
|
struct cmndspec *cmndspec;
|
|
struct defaults *defaults;
|
|
struct member *member;
|
|
struct runascontainer *runas;
|
|
struct privilege *privilege;
|
|
struct command_digest *digest;
|
|
struct sudo_command command;
|
|
struct command_options options;
|
|
struct cmndtag tag;
|
|
char *string;
|
|
const char *cstring;
|
|
int tok;
|
|
|
|
#line 346 "gram.c"
|
|
|
|
};
|
|
typedef union YYSTYPE YYSTYPE;
|
|
# define YYSTYPE_IS_TRIVIAL 1
|
|
# define YYSTYPE_IS_DECLARED 1
|
|
#endif
|
|
|
|
|
|
extern YYSTYPE sudoerslval;
|
|
|
|
|
|
int sudoersparse (void);
|
|
|
|
|
|
#endif /* !YY_SUDOERS_Y_TAB_H_INCLUDED */
|
|
/* Symbol kind. */
|
|
enum yysymbol_kind_t
|
|
{
|
|
YYSYMBOL_YYEMPTY = -2,
|
|
YYSYMBOL_YYEOF = 0, /* "end of file" */
|
|
YYSYMBOL_YYerror = 1, /* error */
|
|
YYSYMBOL_YYUNDEF = 2, /* "invalid token" */
|
|
YYSYMBOL_COMMAND = 3, /* COMMAND */
|
|
YYSYMBOL_ALIAS = 4, /* ALIAS */
|
|
YYSYMBOL_DEFVAR = 5, /* DEFVAR */
|
|
YYSYMBOL_NTWKADDR = 6, /* NTWKADDR */
|
|
YYSYMBOL_NETGROUP = 7, /* NETGROUP */
|
|
YYSYMBOL_USERGROUP = 8, /* USERGROUP */
|
|
YYSYMBOL_WORD = 9, /* WORD */
|
|
YYSYMBOL_DIGEST = 10, /* DIGEST */
|
|
YYSYMBOL_INCLUDE = 11, /* INCLUDE */
|
|
YYSYMBOL_INCLUDEDIR = 12, /* INCLUDEDIR */
|
|
YYSYMBOL_DEFAULTS = 13, /* DEFAULTS */
|
|
YYSYMBOL_DEFAULTS_HOST = 14, /* DEFAULTS_HOST */
|
|
YYSYMBOL_DEFAULTS_USER = 15, /* DEFAULTS_USER */
|
|
YYSYMBOL_DEFAULTS_RUNAS = 16, /* DEFAULTS_RUNAS */
|
|
YYSYMBOL_DEFAULTS_CMND = 17, /* DEFAULTS_CMND */
|
|
YYSYMBOL_NOPASSWD = 18, /* NOPASSWD */
|
|
YYSYMBOL_PASSWD = 19, /* PASSWD */
|
|
YYSYMBOL_NOEXEC = 20, /* NOEXEC */
|
|
YYSYMBOL_EXEC = 21, /* EXEC */
|
|
YYSYMBOL_SETENV = 22, /* SETENV */
|
|
YYSYMBOL_NOSETENV = 23, /* NOSETENV */
|
|
YYSYMBOL_LOG_INPUT = 24, /* LOG_INPUT */
|
|
YYSYMBOL_NOLOG_INPUT = 25, /* NOLOG_INPUT */
|
|
YYSYMBOL_LOG_OUTPUT = 26, /* LOG_OUTPUT */
|
|
YYSYMBOL_NOLOG_OUTPUT = 27, /* NOLOG_OUTPUT */
|
|
YYSYMBOL_MAIL = 28, /* MAIL */
|
|
YYSYMBOL_NOMAIL = 29, /* NOMAIL */
|
|
YYSYMBOL_FOLLOWLNK = 30, /* FOLLOWLNK */
|
|
YYSYMBOL_NOFOLLOWLNK = 31, /* NOFOLLOWLNK */
|
|
YYSYMBOL_INTERCEPT = 32, /* INTERCEPT */
|
|
YYSYMBOL_NOINTERCEPT = 33, /* NOINTERCEPT */
|
|
YYSYMBOL_ALL = 34, /* ALL */
|
|
YYSYMBOL_HOSTALIAS = 35, /* HOSTALIAS */
|
|
YYSYMBOL_CMNDALIAS = 36, /* CMNDALIAS */
|
|
YYSYMBOL_USERALIAS = 37, /* USERALIAS */
|
|
YYSYMBOL_RUNASALIAS = 38, /* RUNASALIAS */
|
|
YYSYMBOL_39_ = 39, /* ':' */
|
|
YYSYMBOL_40_ = 40, /* '=' */
|
|
YYSYMBOL_41_ = 41, /* ',' */
|
|
YYSYMBOL_42_ = 42, /* '!' */
|
|
YYSYMBOL_43_ = 43, /* '+' */
|
|
YYSYMBOL_44_ = 44, /* '-' */
|
|
YYSYMBOL_45_ = 45, /* '(' */
|
|
YYSYMBOL_46_ = 46, /* ')' */
|
|
YYSYMBOL_47_n_ = 47, /* '\n' */
|
|
YYSYMBOL_ERROR = 48, /* ERROR */
|
|
YYSYMBOL_NOMATCH = 49, /* NOMATCH */
|
|
YYSYMBOL_CHROOT = 50, /* CHROOT */
|
|
YYSYMBOL_CWD = 51, /* CWD */
|
|
YYSYMBOL_TYPE = 52, /* TYPE */
|
|
YYSYMBOL_ROLE = 53, /* ROLE */
|
|
YYSYMBOL_APPARMOR_PROFILE = 54, /* APPARMOR_PROFILE */
|
|
YYSYMBOL_PRIVS = 55, /* PRIVS */
|
|
YYSYMBOL_LIMITPRIVS = 56, /* LIMITPRIVS */
|
|
YYSYMBOL_CMND_TIMEOUT = 57, /* CMND_TIMEOUT */
|
|
YYSYMBOL_NOTBEFORE = 58, /* NOTBEFORE */
|
|
YYSYMBOL_NOTAFTER = 59, /* NOTAFTER */
|
|
YYSYMBOL_MYSELF = 60, /* MYSELF */
|
|
YYSYMBOL_SHA224_TOK = 61, /* SHA224_TOK */
|
|
YYSYMBOL_SHA256_TOK = 62, /* SHA256_TOK */
|
|
YYSYMBOL_SHA384_TOK = 63, /* SHA384_TOK */
|
|
YYSYMBOL_SHA512_TOK = 64, /* SHA512_TOK */
|
|
YYSYMBOL_YYACCEPT = 65, /* $accept */
|
|
YYSYMBOL_file = 66, /* file */
|
|
YYSYMBOL_line = 67, /* line */
|
|
YYSYMBOL_entry = 68, /* entry */
|
|
YYSYMBOL_include = 69, /* include */
|
|
YYSYMBOL_includedir = 70, /* includedir */
|
|
YYSYMBOL_defaults_list = 71, /* defaults_list */
|
|
YYSYMBOL_defaults_entry = 72, /* defaults_entry */
|
|
YYSYMBOL_privileges = 73, /* privileges */
|
|
YYSYMBOL_privilege = 74, /* privilege */
|
|
YYSYMBOL_ophost = 75, /* ophost */
|
|
YYSYMBOL_host = 76, /* host */
|
|
YYSYMBOL_cmndspeclist = 77, /* cmndspeclist */
|
|
YYSYMBOL_cmndspec = 78, /* cmndspec */
|
|
YYSYMBOL_digestspec = 79, /* digestspec */
|
|
YYSYMBOL_digestlist = 80, /* digestlist */
|
|
YYSYMBOL_digcmnd = 81, /* digcmnd */
|
|
YYSYMBOL_opcmnd = 82, /* opcmnd */
|
|
YYSYMBOL_chdirspec = 83, /* chdirspec */
|
|
YYSYMBOL_chrootspec = 84, /* chrootspec */
|
|
YYSYMBOL_timeoutspec = 85, /* timeoutspec */
|
|
YYSYMBOL_notbeforespec = 86, /* notbeforespec */
|
|
YYSYMBOL_notafterspec = 87, /* notafterspec */
|
|
YYSYMBOL_rolespec = 88, /* rolespec */
|
|
YYSYMBOL_typespec = 89, /* typespec */
|
|
YYSYMBOL_apparmor_profilespec = 90, /* apparmor_profilespec */
|
|
YYSYMBOL_privsspec = 91, /* privsspec */
|
|
YYSYMBOL_limitprivsspec = 92, /* limitprivsspec */
|
|
YYSYMBOL_runasspec = 93, /* runasspec */
|
|
YYSYMBOL_runaslist = 94, /* runaslist */
|
|
YYSYMBOL_reserved_word = 95, /* reserved_word */
|
|
YYSYMBOL_reserved_alias = 96, /* reserved_alias */
|
|
YYSYMBOL_options = 97, /* options */
|
|
YYSYMBOL_cmndtag = 98, /* cmndtag */
|
|
YYSYMBOL_cmnd = 99, /* cmnd */
|
|
YYSYMBOL_hostaliases = 100, /* hostaliases */
|
|
YYSYMBOL_hostalias = 101, /* hostalias */
|
|
YYSYMBOL_102_1 = 102, /* $@1 */
|
|
YYSYMBOL_hostlist = 103, /* hostlist */
|
|
YYSYMBOL_cmndaliases = 104, /* cmndaliases */
|
|
YYSYMBOL_cmndalias = 105, /* cmndalias */
|
|
YYSYMBOL_106_2 = 106, /* $@2 */
|
|
YYSYMBOL_cmndlist = 107, /* cmndlist */
|
|
YYSYMBOL_runasaliases = 108, /* runasaliases */
|
|
YYSYMBOL_runasalias = 109, /* runasalias */
|
|
YYSYMBOL_110_3 = 110, /* $@3 */
|
|
YYSYMBOL_useraliases = 111, /* useraliases */
|
|
YYSYMBOL_useralias = 112, /* useralias */
|
|
YYSYMBOL_113_4 = 113, /* $@4 */
|
|
YYSYMBOL_userlist = 114, /* userlist */
|
|
YYSYMBOL_opuser = 115, /* opuser */
|
|
YYSYMBOL_user = 116, /* user */
|
|
YYSYMBOL_grouplist = 117, /* grouplist */
|
|
YYSYMBOL_opgroup = 118, /* opgroup */
|
|
YYSYMBOL_group = 119 /* group */
|
|
};
|
|
typedef enum yysymbol_kind_t yysymbol_kind_t;
|
|
|
|
|
|
|
|
|
|
#ifdef short
|
|
# undef short
|
|
#endif
|
|
|
|
/* On compilers that do not define __PTRDIFF_MAX__ etc., make sure
|
|
<limits.h> and (if available) <stdint.h> are included
|
|
so that the code can choose integer types of a good width. */
|
|
|
|
#ifndef __PTRDIFF_MAX__
|
|
# include <limits.h> /* INFRINGES ON USER NAME SPACE */
|
|
# if defined HAVE_STDINT_H
|
|
# include <stdint.h> /* INFRINGES ON USER NAME SPACE */
|
|
# define YY_STDINT_H
|
|
# endif
|
|
#endif
|
|
|
|
/* Narrow types that promote to a signed type and that can represent a
|
|
signed or unsigned integer of at least N bits. In tables they can
|
|
save space and decrease cache pressure. Promoting to a signed type
|
|
helps avoid bugs in integer arithmetic. */
|
|
|
|
#ifdef __INT_LEAST8_MAX__
|
|
typedef __INT_LEAST8_TYPE__ yytype_int8;
|
|
#elif defined YY_STDINT_H
|
|
typedef int_least8_t yytype_int8;
|
|
#else
|
|
typedef signed char yytype_int8;
|
|
#endif
|
|
|
|
#ifdef __INT_LEAST16_MAX__
|
|
typedef __INT_LEAST16_TYPE__ yytype_int16;
|
|
#elif defined YY_STDINT_H
|
|
typedef int_least16_t yytype_int16;
|
|
#else
|
|
typedef short yytype_int16;
|
|
#endif
|
|
|
|
/* Work around bug in HP-UX 11.23, which defines these macros
|
|
incorrectly for preprocessor constants. This workaround can likely
|
|
be removed in 2023, as HPE has promised support for HP-UX 11.23
|
|
(aka HP-UX 11i v2) only through the end of 2022; see Table 2 of
|
|
<https://h20195.www2.hpe.com/V2/getpdf.aspx/4AA4-7673ENW.pdf>. */
|
|
#ifdef __hpux
|
|
# undef UINT_LEAST8_MAX
|
|
# undef UINT_LEAST16_MAX
|
|
# define UINT_LEAST8_MAX 255
|
|
# define UINT_LEAST16_MAX 65535
|
|
#endif
|
|
|
|
#if defined __UINT_LEAST8_MAX__ && __UINT_LEAST8_MAX__ <= __INT_MAX__
|
|
typedef __UINT_LEAST8_TYPE__ yytype_uint8;
|
|
#elif (!defined __UINT_LEAST8_MAX__ && defined YY_STDINT_H \
|
|
&& UINT_LEAST8_MAX <= INT_MAX)
|
|
typedef uint_least8_t yytype_uint8;
|
|
#elif !defined __UINT_LEAST8_MAX__ && UCHAR_MAX <= INT_MAX
|
|
typedef unsigned char yytype_uint8;
|
|
#else
|
|
typedef short yytype_uint8;
|
|
#endif
|
|
|
|
#if defined __UINT_LEAST16_MAX__ && __UINT_LEAST16_MAX__ <= __INT_MAX__
|
|
typedef __UINT_LEAST16_TYPE__ yytype_uint16;
|
|
#elif (!defined __UINT_LEAST16_MAX__ && defined YY_STDINT_H \
|
|
&& UINT_LEAST16_MAX <= INT_MAX)
|
|
typedef uint_least16_t yytype_uint16;
|
|
#elif !defined __UINT_LEAST16_MAX__ && USHRT_MAX <= INT_MAX
|
|
typedef unsigned short yytype_uint16;
|
|
#else
|
|
typedef int yytype_uint16;
|
|
#endif
|
|
|
|
#ifndef YYPTRDIFF_T
|
|
# if defined __PTRDIFF_TYPE__ && defined __PTRDIFF_MAX__
|
|
# define YYPTRDIFF_T __PTRDIFF_TYPE__
|
|
# define YYPTRDIFF_MAXIMUM __PTRDIFF_MAX__
|
|
# elif defined PTRDIFF_MAX
|
|
# ifndef ptrdiff_t
|
|
# include <stddef.h> /* INFRINGES ON USER NAME SPACE */
|
|
# endif
|
|
# define YYPTRDIFF_T ptrdiff_t
|
|
# define YYPTRDIFF_MAXIMUM PTRDIFF_MAX
|
|
# else
|
|
# define YYPTRDIFF_T long
|
|
# define YYPTRDIFF_MAXIMUM LONG_MAX
|
|
# endif
|
|
#endif
|
|
|
|
#ifndef YYSIZE_T
|
|
# ifdef __SIZE_TYPE__
|
|
# define YYSIZE_T __SIZE_TYPE__
|
|
# elif defined size_t
|
|
# define YYSIZE_T size_t
|
|
# elif defined __STDC_VERSION__ && 199901 <= __STDC_VERSION__
|
|
# include <stddef.h> /* INFRINGES ON USER NAME SPACE */
|
|
# define YYSIZE_T size_t
|
|
# else
|
|
# define YYSIZE_T unsigned
|
|
# endif
|
|
#endif
|
|
|
|
#define YYSIZE_MAXIMUM \
|
|
YY_CAST (YYPTRDIFF_T, \
|
|
(YYPTRDIFF_MAXIMUM < YY_CAST (YYSIZE_T, -1) \
|
|
? YYPTRDIFF_MAXIMUM \
|
|
: YY_CAST (YYSIZE_T, -1)))
|
|
|
|
#define YYSIZEOF(X) YY_CAST (YYPTRDIFF_T, sizeof (X))
|
|
|
|
|
|
/* Stored state numbers (used for stacks). */
|
|
typedef yytype_uint8 yy_state_t;
|
|
|
|
/* State numbers in computations. */
|
|
typedef int yy_state_fast_t;
|
|
|
|
#ifndef YY_
|
|
# if defined YYENABLE_NLS && YYENABLE_NLS
|
|
# if ENABLE_NLS
|
|
# include <libintl.h> /* INFRINGES ON USER NAME SPACE */
|
|
# define YY_(Msgid) dgettext ("bison-runtime", Msgid)
|
|
# endif
|
|
# endif
|
|
# ifndef YY_
|
|
# define YY_(Msgid) Msgid
|
|
# endif
|
|
#endif
|
|
|
|
|
|
#ifndef YY_ATTRIBUTE_PURE
|
|
# if defined __GNUC__ && 2 < __GNUC__ + (96 <= __GNUC_MINOR__)
|
|
# define YY_ATTRIBUTE_PURE __attribute__ ((__pure__))
|
|
# else
|
|
# define YY_ATTRIBUTE_PURE
|
|
# endif
|
|
#endif
|
|
|
|
#ifndef YY_ATTRIBUTE_UNUSED
|
|
# if defined __GNUC__ && 2 < __GNUC__ + (7 <= __GNUC_MINOR__)
|
|
# define YY_ATTRIBUTE_UNUSED __attribute__ ((__unused__))
|
|
# else
|
|
# define YY_ATTRIBUTE_UNUSED
|
|
# endif
|
|
#endif
|
|
|
|
/* Suppress unused-variable warnings by "using" E. */
|
|
#if ! defined lint || defined __GNUC__
|
|
# define YY_USE(E) ((void) (E))
|
|
#else
|
|
# define YY_USE(E) /* empty */
|
|
#endif
|
|
|
|
/* Suppress an incorrect diagnostic about yylval being uninitialized. */
|
|
#if defined __GNUC__ && ! defined __ICC && 406 <= __GNUC__ * 100 + __GNUC_MINOR__
|
|
# if __GNUC__ * 100 + __GNUC_MINOR__ < 407
|
|
# define YY_IGNORE_MAYBE_UNINITIALIZED_BEGIN \
|
|
_Pragma ("GCC diagnostic push") \
|
|
_Pragma ("GCC diagnostic ignored \"-Wuninitialized\"")
|
|
# else
|
|
# define YY_IGNORE_MAYBE_UNINITIALIZED_BEGIN \
|
|
_Pragma ("GCC diagnostic push") \
|
|
_Pragma ("GCC diagnostic ignored \"-Wuninitialized\"") \
|
|
_Pragma ("GCC diagnostic ignored \"-Wmaybe-uninitialized\"")
|
|
# endif
|
|
# define YY_IGNORE_MAYBE_UNINITIALIZED_END \
|
|
_Pragma ("GCC diagnostic pop")
|
|
#else
|
|
# define YY_INITIAL_VALUE(Value) Value
|
|
#endif
|
|
#ifndef YY_IGNORE_MAYBE_UNINITIALIZED_BEGIN
|
|
# define YY_IGNORE_MAYBE_UNINITIALIZED_BEGIN
|
|
# define YY_IGNORE_MAYBE_UNINITIALIZED_END
|
|
#endif
|
|
#ifndef YY_INITIAL_VALUE
|
|
# define YY_INITIAL_VALUE(Value) /* Nothing. */
|
|
#endif
|
|
|
|
#if defined __cplusplus && defined __GNUC__ && ! defined __ICC && 6 <= __GNUC__
|
|
# define YY_IGNORE_USELESS_CAST_BEGIN \
|
|
_Pragma ("GCC diagnostic push") \
|
|
_Pragma ("GCC diagnostic ignored \"-Wuseless-cast\"")
|
|
# define YY_IGNORE_USELESS_CAST_END \
|
|
_Pragma ("GCC diagnostic pop")
|
|
#endif
|
|
#ifndef YY_IGNORE_USELESS_CAST_BEGIN
|
|
# define YY_IGNORE_USELESS_CAST_BEGIN
|
|
# define YY_IGNORE_USELESS_CAST_END
|
|
#endif
|
|
|
|
|
|
#define YY_ASSERT(E) ((void) (0 && (E)))
|
|
|
|
#if !defined yyoverflow
|
|
|
|
/* The parser invokes alloca or malloc; define the necessary symbols. */
|
|
|
|
# ifdef YYSTACK_USE_ALLOCA
|
|
# if YYSTACK_USE_ALLOCA
|
|
# ifdef __GNUC__
|
|
# define YYSTACK_ALLOC __builtin_alloca
|
|
# elif defined __BUILTIN_VA_ARG_INCR
|
|
# include <alloca.h> /* INFRINGES ON USER NAME SPACE */
|
|
# elif defined _AIX
|
|
# define YYSTACK_ALLOC __alloca
|
|
# elif defined _MSC_VER
|
|
# include <malloc.h> /* INFRINGES ON USER NAME SPACE */
|
|
# define alloca _alloca
|
|
# else
|
|
# define YYSTACK_ALLOC alloca
|
|
# if ! defined _ALLOCA_H && ! defined EXIT_SUCCESS
|
|
# include <stdlib.h> /* INFRINGES ON USER NAME SPACE */
|
|
/* Use EXIT_SUCCESS as a witness for stdlib.h. */
|
|
# ifndef EXIT_SUCCESS
|
|
# define EXIT_SUCCESS 0
|
|
# endif
|
|
# endif
|
|
# endif
|
|
# endif
|
|
# endif
|
|
|
|
# ifdef YYSTACK_ALLOC
|
|
/* Pacify GCC's 'empty if-body' warning. */
|
|
# define YYSTACK_FREE(Ptr) do { /* empty */; } while (0)
|
|
# ifndef YYSTACK_ALLOC_MAXIMUM
|
|
/* The OS might guarantee only one guard page at the bottom of the stack,
|
|
and a page size can be as small as 4096 bytes. So we cannot safely
|
|
invoke alloca (N) if N exceeds 4096. Use a slightly smaller number
|
|
to allow for a few compiler-allocated temporary stack slots. */
|
|
# define YYSTACK_ALLOC_MAXIMUM 4032 /* reasonable circa 2006 */
|
|
# endif
|
|
# else
|
|
# define YYSTACK_ALLOC YYMALLOC
|
|
# define YYSTACK_FREE YYFREE
|
|
# ifndef YYSTACK_ALLOC_MAXIMUM
|
|
# define YYSTACK_ALLOC_MAXIMUM YYSIZE_MAXIMUM
|
|
# endif
|
|
# if (defined __cplusplus && ! defined EXIT_SUCCESS \
|
|
&& ! ((defined YYMALLOC || defined malloc) \
|
|
&& (defined YYFREE || defined free)))
|
|
# include <stdlib.h> /* INFRINGES ON USER NAME SPACE */
|
|
# ifndef EXIT_SUCCESS
|
|
# define EXIT_SUCCESS 0
|
|
# endif
|
|
# endif
|
|
# ifndef YYMALLOC
|
|
# define YYMALLOC malloc
|
|
# if ! defined malloc && ! defined EXIT_SUCCESS
|
|
void *malloc (YYSIZE_T); /* INFRINGES ON USER NAME SPACE */
|
|
# endif
|
|
# endif
|
|
# ifndef YYFREE
|
|
# define YYFREE free
|
|
# if ! defined free && ! defined EXIT_SUCCESS
|
|
void free (void *); /* INFRINGES ON USER NAME SPACE */
|
|
# endif
|
|
# endif
|
|
# endif
|
|
#endif /* !defined yyoverflow */
|
|
|
|
#if (! defined yyoverflow \
|
|
&& (! defined __cplusplus \
|
|
|| (defined YYSTYPE_IS_TRIVIAL && YYSTYPE_IS_TRIVIAL)))
|
|
|
|
/* A type that is properly aligned for any stack member. */
|
|
union yyalloc
|
|
{
|
|
yy_state_t yyss_alloc;
|
|
YYSTYPE yyvs_alloc;
|
|
};
|
|
|
|
/* The size of the maximum gap between one aligned stack and the next. */
|
|
# define YYSTACK_GAP_MAXIMUM (YYSIZEOF (union yyalloc) - 1)
|
|
|
|
/* The size of an array large to enough to hold all stacks, each with
|
|
N elements. */
|
|
# define YYSTACK_BYTES(N) \
|
|
((N) * (YYSIZEOF (yy_state_t) + YYSIZEOF (YYSTYPE)) \
|
|
+ YYSTACK_GAP_MAXIMUM)
|
|
|
|
# define YYCOPY_NEEDED 1
|
|
|
|
/* Relocate STACK from its old location to the new one. The
|
|
local variables YYSIZE and YYSTACKSIZE give the old and new number of
|
|
elements in the stack, and YYPTR gives the new location of the
|
|
stack. Advance YYPTR to a properly aligned location for the next
|
|
stack. */
|
|
# define YYSTACK_RELOCATE(Stack_alloc, Stack) \
|
|
do \
|
|
{ \
|
|
YYPTRDIFF_T yynewbytes; \
|
|
YYCOPY (&yyptr->Stack_alloc, Stack, yysize); \
|
|
Stack = &yyptr->Stack_alloc; \
|
|
yynewbytes = yystacksize * YYSIZEOF (*Stack) + YYSTACK_GAP_MAXIMUM; \
|
|
yyptr += yynewbytes / YYSIZEOF (*yyptr); \
|
|
} \
|
|
while (0)
|
|
|
|
#endif
|
|
|
|
#if defined YYCOPY_NEEDED && YYCOPY_NEEDED
|
|
/* Copy COUNT objects from SRC to DST. The source and destination do
|
|
not overlap. */
|
|
# ifndef YYCOPY
|
|
# if defined __GNUC__ && 1 < __GNUC__
|
|
# define YYCOPY(Dst, Src, Count) \
|
|
__builtin_memcpy (Dst, Src, YY_CAST (YYSIZE_T, (Count)) * sizeof (*(Src)))
|
|
# else
|
|
# define YYCOPY(Dst, Src, Count) \
|
|
do \
|
|
{ \
|
|
YYPTRDIFF_T yyi; \
|
|
for (yyi = 0; yyi < (Count); yyi++) \
|
|
(Dst)[yyi] = (Src)[yyi]; \
|
|
} \
|
|
while (0)
|
|
# endif
|
|
# endif
|
|
#endif /* !YYCOPY_NEEDED */
|
|
|
|
/* YYFINAL -- State number of the termination state. */
|
|
#define YYFINAL 90
|
|
/* YYLAST -- Last index in YYTABLE. */
|
|
#define YYLAST 332
|
|
|
|
/* YYNTOKENS -- Number of terminals. */
|
|
#define YYNTOKENS 65
|
|
/* YYNNTS -- Number of nonterminals. */
|
|
#define YYNNTS 55
|
|
/* YYNRULES -- Number of rules. */
|
|
#define YYNRULES 155
|
|
/* YYNSTATES -- Number of states. */
|
|
#define YYNSTATES 256
|
|
|
|
/* YYMAXUTOK -- Last valid token kind. */
|
|
#define YYMAXUTOK 310
|
|
|
|
|
|
/* YYTRANSLATE(TOKEN-NUM) -- Symbol number corresponding to TOKEN-NUM
|
|
as returned by yylex, with out-of-bounds checking. */
|
|
#define YYTRANSLATE(YYX) \
|
|
(0 <= (YYX) && (YYX) <= YYMAXUTOK \
|
|
? YY_CAST (yysymbol_kind_t, yytranslate[YYX]) \
|
|
: YYSYMBOL_YYUNDEF)
|
|
|
|
/* YYTRANSLATE[TOKEN-NUM] -- Symbol number corresponding to TOKEN-NUM
|
|
as returned by yylex. */
|
|
static const yytype_int8 yytranslate[] =
|
|
{
|
|
0, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
47, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 42, 2, 2, 2, 2, 2, 2,
|
|
45, 46, 2, 43, 41, 44, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 39, 2,
|
|
2, 40, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 1, 2, 3, 4,
|
|
5, 6, 7, 8, 9, 10, 11, 12, 13, 14,
|
|
15, 16, 17, 18, 19, 20, 21, 22, 23, 24,
|
|
25, 26, 27, 28, 29, 30, 31, 32, 33, 34,
|
|
35, 36, 37, 38, 48, 49, 50, 51, 52, 53,
|
|
54, 55, 56, 57, 58, 59, 60, 61, 62, 63,
|
|
64
|
|
};
|
|
|
|
#if YYDEBUG
|
|
/* YYRLINE[YYN] -- Source line where rule number YYN was defined. */
|
|
static const yytype_int16 yyrline[] =
|
|
{
|
|
0, 205, 205, 208, 211, 212, 215, 218, 221, 229,
|
|
237, 243, 246, 249, 252, 255, 259, 263, 267, 271,
|
|
277, 280, 286, 289, 295, 296, 303, 312, 321, 331,
|
|
341, 353, 354, 359, 365, 382, 386, 392, 401, 409,
|
|
418, 427, 438, 439, 449, 513, 522, 531, 540, 551,
|
|
552, 559, 562, 576, 580, 586, 602, 618, 623, 627,
|
|
632, 637, 642, 647, 651, 656, 659, 664, 681, 693,
|
|
709, 727, 746, 747, 748, 749, 750, 751, 752, 753,
|
|
754, 755, 756, 759, 765, 768, 773, 778, 787, 796,
|
|
808, 813, 818, 823, 828, 835, 838, 841, 844, 847,
|
|
850, 853, 856, 859, 862, 865, 868, 871, 874, 877,
|
|
880, 883, 888, 902, 911, 932, 955, 956, 959, 959,
|
|
971, 974, 975, 982, 983, 986, 986, 998, 1001, 1002,
|
|
1009, 1010, 1013, 1013, 1025, 1028, 1029, 1032, 1032, 1044,
|
|
1047, 1048, 1055, 1059, 1065, 1074, 1082, 1091, 1100, 1111,
|
|
1112, 1119, 1123, 1129, 1138, 1146
|
|
};
|
|
#endif
|
|
|
|
/** Accessing symbol of state STATE. */
|
|
#define YY_ACCESSING_SYMBOL(State) YY_CAST (yysymbol_kind_t, yystos[State])
|
|
|
|
#if YYDEBUG || 0
|
|
/* The user-facing name of the symbol whose (internal) number is
|
|
YYSYMBOL. No bounds checking. */
|
|
static const char *yysymbol_name (yysymbol_kind_t yysymbol) YY_ATTRIBUTE_UNUSED;
|
|
|
|
/* YYTNAME[SYMBOL-NUM] -- String name of the symbol SYMBOL-NUM.
|
|
First, the terminals, then, starting at YYNTOKENS, nonterminals. */
|
|
static const char *const yytname[] =
|
|
{
|
|
"\"end of file\"", "error", "\"invalid token\"", "COMMAND", "ALIAS",
|
|
"DEFVAR", "NTWKADDR", "NETGROUP", "USERGROUP", "WORD", "DIGEST",
|
|
"INCLUDE", "INCLUDEDIR", "DEFAULTS", "DEFAULTS_HOST", "DEFAULTS_USER",
|
|
"DEFAULTS_RUNAS", "DEFAULTS_CMND", "NOPASSWD", "PASSWD", "NOEXEC",
|
|
"EXEC", "SETENV", "NOSETENV", "LOG_INPUT", "NOLOG_INPUT", "LOG_OUTPUT",
|
|
"NOLOG_OUTPUT", "MAIL", "NOMAIL", "FOLLOWLNK", "NOFOLLOWLNK",
|
|
"INTERCEPT", "NOINTERCEPT", "ALL", "HOSTALIAS", "CMNDALIAS", "USERALIAS",
|
|
"RUNASALIAS", "':'", "'='", "','", "'!'", "'+'", "'-'", "'('", "')'",
|
|
"'\\n'", "ERROR", "NOMATCH", "CHROOT", "CWD", "TYPE", "ROLE",
|
|
"APPARMOR_PROFILE", "PRIVS", "LIMITPRIVS", "CMND_TIMEOUT", "NOTBEFORE",
|
|
"NOTAFTER", "MYSELF", "SHA224_TOK", "SHA256_TOK", "SHA384_TOK",
|
|
"SHA512_TOK", "$accept", "file", "line", "entry", "include",
|
|
"includedir", "defaults_list", "defaults_entry", "privileges",
|
|
"privilege", "ophost", "host", "cmndspeclist", "cmndspec", "digestspec",
|
|
"digestlist", "digcmnd", "opcmnd", "chdirspec", "chrootspec",
|
|
"timeoutspec", "notbeforespec", "notafterspec", "rolespec", "typespec",
|
|
"apparmor_profilespec", "privsspec", "limitprivsspec", "runasspec",
|
|
"runaslist", "reserved_word", "reserved_alias", "options", "cmndtag",
|
|
"cmnd", "hostaliases", "hostalias", "$@1", "hostlist", "cmndaliases",
|
|
"cmndalias", "$@2", "cmndlist", "runasaliases", "runasalias", "$@3",
|
|
"useraliases", "useralias", "$@4", "userlist", "opuser", "user",
|
|
"grouplist", "opgroup", "group", YY_NULLPTR
|
|
};
|
|
|
|
static const char *
|
|
yysymbol_name (yysymbol_kind_t yysymbol)
|
|
{
|
|
return yytname[yysymbol];
|
|
}
|
|
#endif
|
|
|
|
#define YYPACT_NINF (-116)
|
|
|
|
#define yypact_value_is_default(Yyn) \
|
|
((Yyn) == YYPACT_NINF)
|
|
|
|
#define YYTABLE_NINF (-4)
|
|
|
|
#define yytable_value_is_error(Yyn) \
|
|
0
|
|
|
|
/* YYPACT[STATE-NUM] -- Index in YYTABLE of the portion describing
|
|
STATE-NUM. */
|
|
static const yytype_int16 yypact[] =
|
|
{
|
|
174, -29, -116, -116, -116, -116, 35, 38, 11, 239,
|
|
150, 150, 8, -116, 32, 76, 88, 114, 254, -116,
|
|
58, 218, -116, -116, -116, 70, -116, -116, -116, 12,
|
|
13, 136, 73, 14, -116, -116, -116, -116, -116, -116,
|
|
276, -116, -116, 4, 10, 10, -116, -116, -116, -116,
|
|
190, 42, 81, 85, 97, -116, 64, -116, -116, -116,
|
|
52, -116, -116, -116, -116, -116, -116, -116, -116, -116,
|
|
-116, -116, -116, -116, 57, 2, -116, -116, 111, 9,
|
|
-116, -116, 112, 56, -116, -116, 123, 61, -116, -116,
|
|
-116, -116, 150, 62, -116, 75, 90, -116, 130, -116,
|
|
188, 204, 205, -116, 11, -116, -116, 239, 55, 66,
|
|
108, -116, 207, 210, 213, 228, 143, -116, 8, 155,
|
|
175, 239, 32, -116, 209, 8, 76, -116, 211, 150,
|
|
88, -116, 217, 150, 114, -116, -116, 194, -116, 202,
|
|
-116, -116, -116, -116, -116, -116, -116, -116, -116, -116,
|
|
-116, -116, -116, -116, -116, -116, -116, 239, 225, -116,
|
|
8, 227, -116, 150, 229, -116, 150, 229, -116, -116,
|
|
-116, 233, 230, -116, -116, 225, 227, 229, 229, 235,
|
|
232, 121, 202, 240, -116, -116, -116, 255, 238, -116,
|
|
-116, -116, 235, -116, 234, 236, 244, 246, 247, 260,
|
|
261, 262, 263, 264, -116, -116, -116, -116, -116, -116,
|
|
-116, -116, -116, -116, 1, -116, 235, 238, 241, 296,
|
|
297, 298, 299, 300, 302, 303, 304, 305, -116, -116,
|
|
-116, -116, -116, -116, -116, -116, -116, -116, -116, -116,
|
|
-116, -116, -116, -116, -116, -116, -116, -116, -116, -116,
|
|
-116, -116, -116, -116, -116, -116
|
|
};
|
|
|
|
/* YYDEFACT[STATE-NUM] -- Default reduction number in state STATE-NUM.
|
|
Performed when YYTABLE does not specify something else to do. Zero
|
|
means the default is an error. */
|
|
static const yytype_uint8 yydefact[] =
|
|
{
|
|
0, 0, 144, 146, 147, 148, 0, 0, 0, 0,
|
|
0, 0, 0, 145, 0, 0, 0, 0, 0, 6,
|
|
0, 0, 4, 8, 9, 0, 140, 142, 7, 0,
|
|
0, 26, 0, 0, 24, 37, 40, 39, 41, 38,
|
|
0, 121, 35, 0, 0, 0, 114, 113, 115, 112,
|
|
0, 0, 0, 0, 0, 49, 0, 128, 51, 53,
|
|
0, 118, 72, 73, 74, 79, 78, 82, 80, 81,
|
|
75, 76, 77, 83, 0, 0, 116, 125, 0, 0,
|
|
123, 137, 0, 0, 135, 132, 0, 0, 130, 143,
|
|
1, 5, 0, 0, 31, 0, 0, 20, 0, 22,
|
|
0, 0, 0, 27, 0, 15, 36, 0, 0, 0,
|
|
0, 54, 0, 0, 0, 0, 0, 52, 0, 0,
|
|
0, 0, 0, 12, 0, 0, 0, 13, 0, 0,
|
|
0, 11, 0, 0, 0, 14, 141, 0, 10, 65,
|
|
21, 23, 28, 29, 30, 25, 122, 18, 16, 17,
|
|
45, 46, 47, 48, 50, 129, 19, 0, 120, 117,
|
|
0, 127, 124, 0, 139, 136, 0, 134, 131, 33,
|
|
32, 67, 34, 42, 84, 119, 126, 138, 133, 71,
|
|
0, 68, 65, 95, 153, 155, 154, 0, 70, 149,
|
|
151, 66, 0, 43, 0, 0, 0, 0, 0, 0,
|
|
0, 0, 0, 0, 85, 86, 89, 87, 88, 90,
|
|
91, 92, 93, 94, 0, 152, 0, 69, 0, 0,
|
|
0, 0, 0, 0, 0, 0, 0, 0, 96, 97,
|
|
98, 99, 102, 103, 104, 105, 106, 107, 110, 111,
|
|
108, 109, 100, 101, 44, 150, 56, 55, 61, 60,
|
|
62, 63, 64, 57, 58, 59
|
|
};
|
|
|
|
/* YYPGOTO[NTERM-NUM]. */
|
|
static const yytype_int16 yypgoto[] =
|
|
{
|
|
-116, -116, -116, 294, -116, -116, -6, 212, -116, 180,
|
|
214, 278, -116, 137, 206, -116, -115, 267, -116, -116,
|
|
-116, -116, -116, -116, -116, -116, -116, -116, -116, -116,
|
|
-116, -9, -116, -116, 270, -116, 203, -116, -7, -116,
|
|
198, -116, -85, -116, 192, -116, -116, 197, -116, -10,
|
|
237, 310, 138, 115, 145
|
|
};
|
|
|
|
/* YYDEFGOTO[NTERM-NUM]. */
|
|
static const yytype_uint8 yydefgoto[] =
|
|
{
|
|
0, 20, 21, 22, 23, 24, 33, 34, 93, 94,
|
|
41, 42, 172, 173, 55, 56, 57, 58, 204, 205,
|
|
206, 207, 208, 209, 210, 211, 212, 213, 174, 180,
|
|
73, 74, 183, 214, 59, 75, 76, 120, 95, 79,
|
|
80, 124, 60, 87, 88, 132, 83, 84, 128, 25,
|
|
26, 27, 188, 189, 190
|
|
};
|
|
|
|
/* YYTABLE[YYPACT[STATE-NUM]] -- What to do in state STATE-NUM. If
|
|
positive, shift that token. If negative, reduce the rule whose
|
|
number is the opposite. If YYTABLE_NINF, syntax error. */
|
|
static const yytype_int16 yytable[] =
|
|
{
|
|
44, 45, 43, 155, 46, 47, 78, 82, 86, 31,
|
|
48, 46, 47, 96, 98, 31, 31, 48, 28, 228,
|
|
229, 230, 231, 232, 233, 234, 235, 236, 237, 238,
|
|
239, 240, 241, 242, 243, 49, 61, 108, 109, 110,
|
|
161, 122, 49, 50, 29, 107, 32, 30, 126, 123,
|
|
50, 92, 32, 32, 119, 104, 127, 31, 90, 97,
|
|
99, 105, 51, 52, 53, 54, 62, 46, 47, 51,
|
|
52, 53, 54, 48, 35, 176, 36, 37, 103, 38,
|
|
77, 112, 63, 64, 65, 66, 67, 68, 69, 70,
|
|
71, 72, 81, 118, 32, 130, 104, 121, 49, 244,
|
|
134, 137, 147, 131, 39, 116, 50, 104, 135, 138,
|
|
62, 92, 40, 148, 158, 139, 107, 78, 85, 164,
|
|
113, 82, 62, 167, 114, 86, 63, 64, 65, 66,
|
|
67, 68, 69, 70, 71, 72, 115, 140, 63, 64,
|
|
65, 66, 67, 68, 69, 70, 71, 72, 62, 104,
|
|
175, 125, 129, 177, 2, 149, 178, 3, 4, 5,
|
|
192, 181, 92, 133, 63, 64, 65, 66, 67, 68,
|
|
69, 70, 71, 72, -2, 1, 100, 141, 2, 101,
|
|
102, 3, 4, 5, 13, 6, 7, 8, 9, 10,
|
|
11, 12, 18, 46, 47, 169, 104, 142, 35, 48,
|
|
36, 37, 156, 38, 51, 52, 53, 54, 13, 14,
|
|
15, 16, 17, 143, 144, 157, 18, 150, -3, 1,
|
|
151, 19, 2, 152, 49, 3, 4, 5, 39, 6,
|
|
7, 8, 9, 10, 11, 12, 40, 2, 153, 184,
|
|
3, 4, 5, 35, 185, 36, 37, 171, 38, 160,
|
|
246, 163, 13, 14, 15, 16, 17, 166, 2, 184,
|
|
18, 3, 4, 5, 185, 19, 107, 13, 118, 186,
|
|
92, 182, 179, 39, 218, 18, 219, 187, 191, 216,
|
|
35, 40, 36, 37, 220, 38, 221, 222, 13, 186,
|
|
194, 195, 196, 197, 198, 199, 200, 201, 202, 203,
|
|
223, 224, 225, 226, 227, 247, 248, 249, 250, 251,
|
|
39, 252, 253, 254, 255, 91, 145, 170, 106, 193,
|
|
111, 146, 154, 117, 162, 159, 168, 165, 89, 136,
|
|
217, 245, 215
|
|
};
|
|
|
|
static const yytype_uint8 yycheck[] =
|
|
{
|
|
10, 11, 9, 118, 3, 4, 15, 16, 17, 5,
|
|
9, 3, 4, 1, 1, 5, 5, 9, 47, 18,
|
|
19, 20, 21, 22, 23, 24, 25, 26, 27, 28,
|
|
29, 30, 31, 32, 33, 34, 4, 43, 44, 45,
|
|
125, 39, 34, 42, 9, 41, 42, 9, 39, 47,
|
|
42, 41, 42, 42, 60, 41, 47, 5, 0, 47,
|
|
47, 47, 61, 62, 63, 64, 34, 3, 4, 61,
|
|
62, 63, 64, 9, 4, 160, 6, 7, 5, 9,
|
|
4, 39, 50, 51, 52, 53, 54, 55, 56, 57,
|
|
58, 59, 4, 41, 42, 39, 41, 40, 34, 214,
|
|
39, 39, 47, 47, 34, 41, 42, 41, 47, 47,
|
|
34, 41, 42, 47, 121, 40, 41, 126, 4, 129,
|
|
39, 130, 34, 133, 39, 134, 50, 51, 52, 53,
|
|
54, 55, 56, 57, 58, 59, 39, 47, 50, 51,
|
|
52, 53, 54, 55, 56, 57, 58, 59, 34, 41,
|
|
157, 40, 40, 163, 4, 47, 166, 7, 8, 9,
|
|
39, 171, 41, 40, 50, 51, 52, 53, 54, 55,
|
|
56, 57, 58, 59, 0, 1, 40, 47, 4, 43,
|
|
44, 7, 8, 9, 34, 11, 12, 13, 14, 15,
|
|
16, 17, 42, 3, 4, 1, 41, 9, 4, 9,
|
|
6, 7, 47, 9, 61, 62, 63, 64, 34, 35,
|
|
36, 37, 38, 9, 9, 40, 42, 10, 0, 1,
|
|
10, 47, 4, 10, 34, 7, 8, 9, 34, 11,
|
|
12, 13, 14, 15, 16, 17, 42, 4, 10, 4,
|
|
7, 8, 9, 4, 9, 6, 7, 45, 9, 40,
|
|
9, 40, 34, 35, 36, 37, 38, 40, 4, 4,
|
|
42, 7, 8, 9, 9, 47, 41, 34, 41, 34,
|
|
41, 41, 39, 34, 40, 42, 40, 42, 46, 41,
|
|
4, 42, 6, 7, 40, 9, 40, 40, 34, 34,
|
|
50, 51, 52, 53, 54, 55, 56, 57, 58, 59,
|
|
40, 40, 40, 40, 40, 9, 9, 9, 9, 9,
|
|
34, 9, 9, 9, 9, 21, 104, 137, 40, 182,
|
|
50, 107, 116, 56, 126, 122, 134, 130, 18, 92,
|
|
192, 216, 187
|
|
};
|
|
|
|
/* YYSTOS[STATE-NUM] -- The symbol kind of the accessing symbol of
|
|
state STATE-NUM. */
|
|
static const yytype_int8 yystos[] =
|
|
{
|
|
0, 1, 4, 7, 8, 9, 11, 12, 13, 14,
|
|
15, 16, 17, 34, 35, 36, 37, 38, 42, 47,
|
|
66, 67, 68, 69, 70, 114, 115, 116, 47, 9,
|
|
9, 5, 42, 71, 72, 4, 6, 7, 9, 34,
|
|
42, 75, 76, 103, 114, 114, 3, 4, 9, 34,
|
|
42, 61, 62, 63, 64, 79, 80, 81, 82, 99,
|
|
107, 4, 34, 50, 51, 52, 53, 54, 55, 56,
|
|
57, 58, 59, 95, 96, 100, 101, 4, 96, 104,
|
|
105, 4, 96, 111, 112, 4, 96, 108, 109, 116,
|
|
0, 68, 41, 73, 74, 103, 1, 47, 1, 47,
|
|
40, 43, 44, 5, 41, 47, 76, 41, 71, 71,
|
|
71, 99, 39, 39, 39, 39, 41, 82, 41, 71,
|
|
102, 40, 39, 47, 106, 40, 39, 47, 113, 40,
|
|
39, 47, 110, 40, 39, 47, 115, 39, 47, 40,
|
|
47, 47, 9, 9, 9, 72, 75, 47, 47, 47,
|
|
10, 10, 10, 10, 79, 81, 47, 40, 103, 101,
|
|
40, 107, 105, 40, 114, 112, 40, 114, 109, 1,
|
|
74, 45, 77, 78, 93, 103, 107, 114, 114, 39,
|
|
94, 114, 41, 97, 4, 9, 34, 42, 117, 118,
|
|
119, 46, 39, 78, 50, 51, 52, 53, 54, 55,
|
|
56, 57, 58, 59, 83, 84, 85, 86, 87, 88,
|
|
89, 90, 91, 92, 98, 119, 41, 117, 40, 40,
|
|
40, 40, 40, 40, 40, 40, 40, 40, 18, 19,
|
|
20, 21, 22, 23, 24, 25, 26, 27, 28, 29,
|
|
30, 31, 32, 33, 81, 118, 9, 9, 9, 9,
|
|
9, 9, 9, 9, 9, 9
|
|
};
|
|
|
|
/* YYR1[RULE-NUM] -- Symbol kind of the left-hand side of rule RULE-NUM. */
|
|
static const yytype_int8 yyr1[] =
|
|
{
|
|
0, 65, 66, 66, 67, 67, 68, 68, 68, 68,
|
|
68, 68, 68, 68, 68, 68, 68, 68, 68, 68,
|
|
69, 69, 70, 70, 71, 71, 72, 72, 72, 72,
|
|
72, 73, 73, 73, 74, 75, 75, 76, 76, 76,
|
|
76, 76, 77, 77, 78, 79, 79, 79, 79, 80,
|
|
80, 81, 81, 82, 82, 83, 84, 85, 86, 87,
|
|
88, 89, 90, 91, 92, 93, 93, 94, 94, 94,
|
|
94, 94, 95, 95, 95, 95, 95, 95, 95, 95,
|
|
95, 95, 95, 96, 97, 97, 97, 97, 97, 97,
|
|
97, 97, 97, 97, 97, 98, 98, 98, 98, 98,
|
|
98, 98, 98, 98, 98, 98, 98, 98, 98, 98,
|
|
98, 98, 99, 99, 99, 99, 100, 100, 102, 101,
|
|
101, 103, 103, 104, 104, 106, 105, 105, 107, 107,
|
|
108, 108, 110, 109, 109, 111, 111, 113, 112, 112,
|
|
114, 114, 115, 115, 116, 116, 116, 116, 116, 117,
|
|
117, 118, 118, 119, 119, 119
|
|
};
|
|
|
|
/* YYR2[RULE-NUM] -- Number of symbols on the right-hand side of rule RULE-NUM. */
|
|
static const yytype_int8 yyr2[] =
|
|
{
|
|
0, 2, 0, 1, 1, 2, 1, 2, 1, 1,
|
|
3, 3, 3, 3, 3, 3, 4, 4, 4, 4,
|
|
3, 4, 3, 4, 1, 3, 1, 2, 3, 3,
|
|
3, 1, 3, 3, 3, 1, 2, 1, 1, 1,
|
|
1, 1, 1, 3, 4, 3, 3, 3, 3, 1,
|
|
3, 1, 2, 1, 2, 3, 3, 3, 3, 3,
|
|
3, 3, 3, 3, 3, 0, 3, 0, 1, 3,
|
|
2, 1, 1, 1, 1, 1, 1, 1, 1, 1,
|
|
1, 1, 1, 1, 0, 2, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 0, 2, 2, 2, 2,
|
|
2, 2, 2, 2, 2, 2, 2, 2, 2, 2,
|
|
2, 2, 1, 1, 1, 1, 1, 3, 0, 4,
|
|
3, 1, 3, 1, 3, 0, 4, 3, 1, 3,
|
|
1, 3, 0, 4, 3, 1, 3, 0, 4, 3,
|
|
1, 3, 1, 2, 1, 1, 1, 1, 1, 1,
|
|
3, 1, 2, 1, 1, 1
|
|
};
|
|
|
|
|
|
enum { YYENOMEM = -2 };
|
|
|
|
#define yyerrok (yyerrstatus = 0)
|
|
#define yyclearin (yychar = YYEMPTY)
|
|
|
|
#define YYACCEPT goto yyacceptlab
|
|
#define YYABORT goto yyabortlab
|
|
#define YYERROR goto yyerrorlab
|
|
#define YYNOMEM goto yyexhaustedlab
|
|
|
|
|
|
#define YYRECOVERING() (!!yyerrstatus)
|
|
|
|
#define YYBACKUP(Token, Value) \
|
|
do \
|
|
if (yychar == YYEMPTY) \
|
|
{ \
|
|
yychar = (Token); \
|
|
yylval = (Value); \
|
|
YYPOPSTACK (yylen); \
|
|
yystate = *yyssp; \
|
|
goto yybackup; \
|
|
} \
|
|
else \
|
|
{ \
|
|
yyerror (YY_("syntax error: cannot back up")); \
|
|
YYERROR; \
|
|
} \
|
|
while (0)
|
|
|
|
/* Backward compatibility with an undocumented macro.
|
|
Use YYerror or YYUNDEF. */
|
|
#define YYERRCODE YYUNDEF
|
|
|
|
|
|
/* Enable debugging if requested. */
|
|
#if YYDEBUG
|
|
|
|
# ifndef YYFPRINTF
|
|
# include <stdio.h> /* INFRINGES ON USER NAME SPACE */
|
|
# define YYFPRINTF fprintf
|
|
# endif
|
|
|
|
# define YYDPRINTF(Args) \
|
|
do { \
|
|
if (yydebug) \
|
|
YYFPRINTF Args; \
|
|
} while (0)
|
|
|
|
|
|
|
|
|
|
# define YY_SYMBOL_PRINT(Title, Kind, Value, Location) \
|
|
do { \
|
|
if (yydebug) \
|
|
{ \
|
|
YYFPRINTF (stderr, "%s ", Title); \
|
|
yy_symbol_print (stderr, \
|
|
Kind, Value); \
|
|
YYFPRINTF (stderr, "\n"); \
|
|
} \
|
|
} while (0)
|
|
|
|
|
|
/*-----------------------------------.
|
|
| Print this symbol's value on YYO. |
|
|
`-----------------------------------*/
|
|
|
|
static void
|
|
yy_symbol_value_print (FILE *yyo,
|
|
yysymbol_kind_t yykind, YYSTYPE const * const yyvaluep)
|
|
{
|
|
FILE *yyoutput = yyo;
|
|
YY_USE (yyoutput);
|
|
if (!yyvaluep)
|
|
return;
|
|
YY_IGNORE_MAYBE_UNINITIALIZED_BEGIN
|
|
YY_USE (yykind);
|
|
YY_IGNORE_MAYBE_UNINITIALIZED_END
|
|
}
|
|
|
|
|
|
/*---------------------------.
|
|
| Print this symbol on YYO. |
|
|
`---------------------------*/
|
|
|
|
static void
|
|
yy_symbol_print (FILE *yyo,
|
|
yysymbol_kind_t yykind, YYSTYPE const * const yyvaluep)
|
|
{
|
|
YYFPRINTF (yyo, "%s %s (",
|
|
yykind < YYNTOKENS ? "token" : "nterm", yysymbol_name (yykind));
|
|
|
|
yy_symbol_value_print (yyo, yykind, yyvaluep);
|
|
YYFPRINTF (yyo, ")");
|
|
}
|
|
|
|
/*------------------------------------------------------------------.
|
|
| yy_stack_print -- Print the state stack from its BOTTOM up to its |
|
|
| TOP (included). |
|
|
`------------------------------------------------------------------*/
|
|
|
|
static void
|
|
yy_stack_print (yy_state_t *yybottom, yy_state_t *yytop)
|
|
{
|
|
YYFPRINTF (stderr, "Stack now");
|
|
for (; yybottom <= yytop; yybottom++)
|
|
{
|
|
int yybot = *yybottom;
|
|
YYFPRINTF (stderr, " %d", yybot);
|
|
}
|
|
YYFPRINTF (stderr, "\n");
|
|
}
|
|
|
|
# define YY_STACK_PRINT(Bottom, Top) \
|
|
do { \
|
|
if (yydebug) \
|
|
yy_stack_print ((Bottom), (Top)); \
|
|
} while (0)
|
|
|
|
|
|
/*------------------------------------------------.
|
|
| Report that the YYRULE is going to be reduced. |
|
|
`------------------------------------------------*/
|
|
|
|
static void
|
|
yy_reduce_print (yy_state_t *yyssp, YYSTYPE *yyvsp,
|
|
int yyrule)
|
|
{
|
|
int yylno = yyrline[yyrule];
|
|
int yynrhs = yyr2[yyrule];
|
|
int yyi;
|
|
YYFPRINTF (stderr, "Reducing stack by rule %d (line %d):\n",
|
|
yyrule - 1, yylno);
|
|
/* The symbols being reduced. */
|
|
for (yyi = 0; yyi < yynrhs; yyi++)
|
|
{
|
|
YYFPRINTF (stderr, " $%d = ", yyi + 1);
|
|
yy_symbol_print (stderr,
|
|
YY_ACCESSING_SYMBOL (+yyssp[yyi + 1 - yynrhs]),
|
|
&yyvsp[(yyi + 1) - (yynrhs)]);
|
|
YYFPRINTF (stderr, "\n");
|
|
}
|
|
}
|
|
|
|
# define YY_REDUCE_PRINT(Rule) \
|
|
do { \
|
|
if (yydebug) \
|
|
yy_reduce_print (yyssp, yyvsp, Rule); \
|
|
} while (0)
|
|
|
|
/* Nonzero means print parse trace. It is left uninitialized so that
|
|
multiple parsers can coexist. */
|
|
int yydebug;
|
|
#else /* !YYDEBUG */
|
|
# define YYDPRINTF(Args) ((void) 0)
|
|
# define YY_SYMBOL_PRINT(Title, Kind, Value, Location)
|
|
# define YY_STACK_PRINT(Bottom, Top)
|
|
# define YY_REDUCE_PRINT(Rule)
|
|
#endif /* !YYDEBUG */
|
|
|
|
|
|
/* YYINITDEPTH -- initial size of the parser's stacks. */
|
|
#ifndef YYINITDEPTH
|
|
# define YYINITDEPTH 200
|
|
#endif
|
|
|
|
/* YYMAXDEPTH -- maximum size the stacks can grow to (effective only
|
|
if the built-in stack extension method is used).
|
|
|
|
Do not make this value too large; the results are undefined if
|
|
YYSTACK_ALLOC_MAXIMUM < YYSTACK_BYTES (YYMAXDEPTH)
|
|
evaluated with infinite-precision integer arithmetic. */
|
|
|
|
#ifndef YYMAXDEPTH
|
|
# define YYMAXDEPTH 10000
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/*-----------------------------------------------.
|
|
| Release the memory associated to this symbol. |
|
|
`-----------------------------------------------*/
|
|
|
|
static void
|
|
yydestruct (const char *yymsg,
|
|
yysymbol_kind_t yykind, YYSTYPE *yyvaluep)
|
|
{
|
|
YY_USE (yyvaluep);
|
|
if (!yymsg)
|
|
yymsg = "Deleting";
|
|
YY_SYMBOL_PRINT (yymsg, yykind, yyvaluep, yylocationp);
|
|
|
|
YY_IGNORE_MAYBE_UNINITIALIZED_BEGIN
|
|
YY_USE (yykind);
|
|
YY_IGNORE_MAYBE_UNINITIALIZED_END
|
|
}
|
|
|
|
|
|
/* Lookahead token kind. */
|
|
int yychar;
|
|
|
|
/* The semantic value of the lookahead symbol. */
|
|
YYSTYPE yylval;
|
|
/* Number of syntax errors so far. */
|
|
int yynerrs;
|
|
|
|
|
|
|
|
|
|
/*----------.
|
|
| yyparse. |
|
|
`----------*/
|
|
|
|
int
|
|
yyparse (void)
|
|
{
|
|
yy_state_fast_t yystate = 0;
|
|
/* Number of tokens to shift before error messages enabled. */
|
|
int yyerrstatus = 0;
|
|
|
|
/* Refer to the stacks through separate pointers, to allow yyoverflow
|
|
to reallocate them elsewhere. */
|
|
|
|
/* Their size. */
|
|
YYPTRDIFF_T yystacksize = YYINITDEPTH;
|
|
|
|
/* The state stack: array, bottom, top. */
|
|
yy_state_t yyssa[YYINITDEPTH];
|
|
yy_state_t *yyss = yyssa;
|
|
yy_state_t *yyssp = yyss;
|
|
|
|
/* The semantic value stack: array, bottom, top. */
|
|
YYSTYPE yyvsa[YYINITDEPTH];
|
|
YYSTYPE *yyvs = yyvsa;
|
|
YYSTYPE *yyvsp = yyvs;
|
|
|
|
int yyn;
|
|
/* The return value of yyparse. */
|
|
int yyresult;
|
|
/* Lookahead symbol kind. */
|
|
yysymbol_kind_t yytoken = YYSYMBOL_YYEMPTY;
|
|
/* The variables used to return semantic value and location from the
|
|
action routines. */
|
|
YYSTYPE yyval;
|
|
|
|
|
|
|
|
#define YYPOPSTACK(N) (yyvsp -= (N), yyssp -= (N))
|
|
|
|
/* The number of symbols on the RHS of the reduced rule.
|
|
Keep to zero when no symbol should be popped. */
|
|
int yylen = 0;
|
|
|
|
YYDPRINTF ((stderr, "Starting parse\n"));
|
|
|
|
yychar = YYEMPTY; /* Cause a token to be read. */
|
|
|
|
goto yysetstate;
|
|
|
|
|
|
/*------------------------------------------------------------.
|
|
| yynewstate -- push a new state, which is found in yystate. |
|
|
`------------------------------------------------------------*/
|
|
yynewstate:
|
|
/* In all cases, when you get here, the value and location stacks
|
|
have just been pushed. So pushing a state here evens the stacks. */
|
|
yyssp++;
|
|
|
|
|
|
/*--------------------------------------------------------------------.
|
|
| yysetstate -- set current state (the top of the stack) to yystate. |
|
|
`--------------------------------------------------------------------*/
|
|
yysetstate:
|
|
YYDPRINTF ((stderr, "Entering state %d\n", yystate));
|
|
YY_ASSERT (0 <= yystate && yystate < YYNSTATES);
|
|
YY_IGNORE_USELESS_CAST_BEGIN
|
|
*yyssp = YY_CAST (yy_state_t, yystate);
|
|
YY_IGNORE_USELESS_CAST_END
|
|
YY_STACK_PRINT (yyss, yyssp);
|
|
|
|
if (yyss + yystacksize - 1 <= yyssp)
|
|
#if !defined yyoverflow && !defined YYSTACK_RELOCATE
|
|
YYNOMEM;
|
|
#else
|
|
{
|
|
/* Get the current used size of the three stacks, in elements. */
|
|
YYPTRDIFF_T yysize = yyssp - yyss + 1;
|
|
|
|
# if defined yyoverflow
|
|
{
|
|
/* Give user a chance to reallocate the stack. Use copies of
|
|
these so that the &'s don't force the real ones into
|
|
memory. */
|
|
yy_state_t *yyss1 = yyss;
|
|
YYSTYPE *yyvs1 = yyvs;
|
|
|
|
/* Each stack pointer address is followed by the size of the
|
|
data in use in that stack, in bytes. This used to be a
|
|
conditional around just the two extra args, but that might
|
|
be undefined if yyoverflow is a macro. */
|
|
yyoverflow (YY_("memory exhausted"),
|
|
&yyss1, yysize * YYSIZEOF (*yyssp),
|
|
&yyvs1, yysize * YYSIZEOF (*yyvsp),
|
|
&yystacksize);
|
|
yyss = yyss1;
|
|
yyvs = yyvs1;
|
|
}
|
|
# else /* defined YYSTACK_RELOCATE */
|
|
/* Extend the stack our own way. */
|
|
if (YYMAXDEPTH <= yystacksize)
|
|
YYNOMEM;
|
|
yystacksize *= 2;
|
|
if (YYMAXDEPTH < yystacksize)
|
|
yystacksize = YYMAXDEPTH;
|
|
|
|
{
|
|
yy_state_t *yyss1 = yyss;
|
|
union yyalloc *yyptr =
|
|
YY_CAST (union yyalloc *,
|
|
YYSTACK_ALLOC (YY_CAST (YYSIZE_T, YYSTACK_BYTES (yystacksize))));
|
|
if (! yyptr)
|
|
YYNOMEM;
|
|
YYSTACK_RELOCATE (yyss_alloc, yyss);
|
|
YYSTACK_RELOCATE (yyvs_alloc, yyvs);
|
|
# undef YYSTACK_RELOCATE
|
|
if (yyss1 != yyssa)
|
|
YYSTACK_FREE (yyss1);
|
|
}
|
|
# endif
|
|
|
|
yyssp = yyss + yysize - 1;
|
|
yyvsp = yyvs + yysize - 1;
|
|
|
|
YY_IGNORE_USELESS_CAST_BEGIN
|
|
YYDPRINTF ((stderr, "Stack size increased to %ld\n",
|
|
YY_CAST (long, yystacksize)));
|
|
YY_IGNORE_USELESS_CAST_END
|
|
|
|
if (yyss + yystacksize - 1 <= yyssp)
|
|
YYABORT;
|
|
}
|
|
#endif /* !defined yyoverflow && !defined YYSTACK_RELOCATE */
|
|
|
|
|
|
if (yystate == YYFINAL)
|
|
YYACCEPT;
|
|
|
|
goto yybackup;
|
|
|
|
|
|
/*-----------.
|
|
| yybackup. |
|
|
`-----------*/
|
|
yybackup:
|
|
/* Do appropriate processing given the current state. Read a
|
|
lookahead token if we need one and don't already have one. */
|
|
|
|
/* First try to decide what to do without reference to lookahead token. */
|
|
yyn = yypact[yystate];
|
|
if (yypact_value_is_default (yyn))
|
|
goto yydefault;
|
|
|
|
/* Not known => get a lookahead token if don't already have one. */
|
|
|
|
/* YYCHAR is either empty, or end-of-input, or a valid lookahead. */
|
|
if (yychar == YYEMPTY)
|
|
{
|
|
YYDPRINTF ((stderr, "Reading a token\n"));
|
|
yychar = yylex ();
|
|
}
|
|
|
|
if (yychar <= YYEOF)
|
|
{
|
|
yychar = YYEOF;
|
|
yytoken = YYSYMBOL_YYEOF;
|
|
YYDPRINTF ((stderr, "Now at end of input.\n"));
|
|
}
|
|
else if (yychar == YYerror)
|
|
{
|
|
/* The scanner already issued an error message, process directly
|
|
to error recovery. But do not keep the error token as
|
|
lookahead, it is too special and may lead us to an endless
|
|
loop in error recovery. */
|
|
yychar = YYUNDEF;
|
|
yytoken = YYSYMBOL_YYerror;
|
|
goto yyerrlab1;
|
|
}
|
|
else
|
|
{
|
|
yytoken = YYTRANSLATE (yychar);
|
|
YY_SYMBOL_PRINT ("Next token is", yytoken, &yylval, &yylloc);
|
|
}
|
|
|
|
/* If the proper action on seeing token YYTOKEN is to reduce or to
|
|
detect an error, take that action. */
|
|
yyn += yytoken;
|
|
if (yyn < 0 || YYLAST < yyn || yycheck[yyn] != yytoken)
|
|
goto yydefault;
|
|
yyn = yytable[yyn];
|
|
if (yyn <= 0)
|
|
{
|
|
if (yytable_value_is_error (yyn))
|
|
goto yyerrlab;
|
|
yyn = -yyn;
|
|
goto yyreduce;
|
|
}
|
|
|
|
/* Count tokens shifted since error; after three, turn off error
|
|
status. */
|
|
if (yyerrstatus)
|
|
yyerrstatus--;
|
|
|
|
/* Shift the lookahead token. */
|
|
YY_SYMBOL_PRINT ("Shifting", yytoken, &yylval, &yylloc);
|
|
yystate = yyn;
|
|
YY_IGNORE_MAYBE_UNINITIALIZED_BEGIN
|
|
*++yyvsp = yylval;
|
|
YY_IGNORE_MAYBE_UNINITIALIZED_END
|
|
|
|
/* Discard the shifted token. */
|
|
yychar = YYEMPTY;
|
|
goto yynewstate;
|
|
|
|
|
|
/*-----------------------------------------------------------.
|
|
| yydefault -- do the default action for the current state. |
|
|
`-----------------------------------------------------------*/
|
|
yydefault:
|
|
yyn = yydefact[yystate];
|
|
if (yyn == 0)
|
|
goto yyerrlab;
|
|
goto yyreduce;
|
|
|
|
|
|
/*-----------------------------.
|
|
| yyreduce -- do a reduction. |
|
|
`-----------------------------*/
|
|
yyreduce:
|
|
/* yyn is the number of a rule to reduce with. */
|
|
yylen = yyr2[yyn];
|
|
|
|
/* If YYLEN is nonzero, implement the default value of the action:
|
|
'$$ = $1'.
|
|
|
|
Otherwise, the following line sets YYVAL to garbage.
|
|
This behavior is undocumented and Bison
|
|
users should not rely upon it. Assigning to YYVAL
|
|
unconditionally makes the parser a bit smaller, and it avoids a
|
|
GCC warning that YYVAL may be used uninitialized. */
|
|
yyval = yyvsp[1-yylen];
|
|
|
|
|
|
YY_REDUCE_PRINT (yyn);
|
|
switch (yyn)
|
|
{
|
|
case 2: /* file: %empty */
|
|
#line 205 "gram.y"
|
|
{
|
|
; /* empty file */
|
|
}
|
|
#line 1654 "gram.c"
|
|
break;
|
|
|
|
case 6: /* entry: '\n' */
|
|
#line 215 "gram.y"
|
|
{
|
|
; /* blank line */
|
|
}
|
|
#line 1662 "gram.c"
|
|
break;
|
|
|
|
case 7: /* entry: error '\n' */
|
|
#line 218 "gram.y"
|
|
{
|
|
yyerrok;
|
|
}
|
|
#line 1670 "gram.c"
|
|
break;
|
|
|
|
case 8: /* entry: include */
|
|
#line 221 "gram.y"
|
|
{
|
|
const bool success = push_include((yyvsp[0].string),
|
|
parsed_policy.ctx->user.shost, &parser_conf);
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
free((yyvsp[0].string));
|
|
if (!success && !parser_conf.recovery)
|
|
YYERROR;
|
|
}
|
|
#line 1683 "gram.c"
|
|
break;
|
|
|
|
case 9: /* entry: includedir */
|
|
#line 229 "gram.y"
|
|
{
|
|
const bool success = push_includedir((yyvsp[0].string),
|
|
parsed_policy.ctx->user.shost, &parser_conf);
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
free((yyvsp[0].string));
|
|
if (!success && !parser_conf.recovery)
|
|
YYERROR;
|
|
}
|
|
#line 1696 "gram.c"
|
|
break;
|
|
|
|
case 10: /* entry: userlist privileges '\n' */
|
|
#line 237 "gram.y"
|
|
{
|
|
if (!add_userspec((yyvsp[-2].member), (yyvsp[-1].privilege))) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
}
|
|
#line 1707 "gram.c"
|
|
break;
|
|
|
|
case 11: /* entry: USERALIAS useraliases '\n' */
|
|
#line 243 "gram.y"
|
|
{
|
|
;
|
|
}
|
|
#line 1715 "gram.c"
|
|
break;
|
|
|
|
case 12: /* entry: HOSTALIAS hostaliases '\n' */
|
|
#line 246 "gram.y"
|
|
{
|
|
;
|
|
}
|
|
#line 1723 "gram.c"
|
|
break;
|
|
|
|
case 13: /* entry: CMNDALIAS cmndaliases '\n' */
|
|
#line 249 "gram.y"
|
|
{
|
|
;
|
|
}
|
|
#line 1731 "gram.c"
|
|
break;
|
|
|
|
case 14: /* entry: RUNASALIAS runasaliases '\n' */
|
|
#line 252 "gram.y"
|
|
{
|
|
;
|
|
}
|
|
#line 1739 "gram.c"
|
|
break;
|
|
|
|
case 15: /* entry: DEFAULTS defaults_list '\n' */
|
|
#line 255 "gram.y"
|
|
{
|
|
if (!add_defaults(DEFAULTS, NULL, (yyvsp[-1].defaults)))
|
|
YYERROR;
|
|
}
|
|
#line 1748 "gram.c"
|
|
break;
|
|
|
|
case 16: /* entry: DEFAULTS_USER userlist defaults_list '\n' */
|
|
#line 259 "gram.y"
|
|
{
|
|
if (!add_defaults(DEFAULTS_USER, (yyvsp[-2].member), (yyvsp[-1].defaults)))
|
|
YYERROR;
|
|
}
|
|
#line 1757 "gram.c"
|
|
break;
|
|
|
|
case 17: /* entry: DEFAULTS_RUNAS userlist defaults_list '\n' */
|
|
#line 263 "gram.y"
|
|
{
|
|
if (!add_defaults(DEFAULTS_RUNAS, (yyvsp[-2].member), (yyvsp[-1].defaults)))
|
|
YYERROR;
|
|
}
|
|
#line 1766 "gram.c"
|
|
break;
|
|
|
|
case 18: /* entry: DEFAULTS_HOST hostlist defaults_list '\n' */
|
|
#line 267 "gram.y"
|
|
{
|
|
if (!add_defaults(DEFAULTS_HOST, (yyvsp[-2].member), (yyvsp[-1].defaults)))
|
|
YYERROR;
|
|
}
|
|
#line 1775 "gram.c"
|
|
break;
|
|
|
|
case 19: /* entry: DEFAULTS_CMND cmndlist defaults_list '\n' */
|
|
#line 271 "gram.y"
|
|
{
|
|
if (!add_defaults(DEFAULTS_CMND, (yyvsp[-2].member), (yyvsp[-1].defaults)))
|
|
YYERROR;
|
|
}
|
|
#line 1784 "gram.c"
|
|
break;
|
|
|
|
case 20: /* include: INCLUDE WORD '\n' */
|
|
#line 277 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[-1].string);
|
|
}
|
|
#line 1792 "gram.c"
|
|
break;
|
|
|
|
case 21: /* include: INCLUDE WORD error '\n' */
|
|
#line 280 "gram.y"
|
|
{
|
|
yyerrok;
|
|
(yyval.string) = (yyvsp[-2].string);
|
|
}
|
|
#line 1801 "gram.c"
|
|
break;
|
|
|
|
case 22: /* includedir: INCLUDEDIR WORD '\n' */
|
|
#line 286 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[-1].string);
|
|
}
|
|
#line 1809 "gram.c"
|
|
break;
|
|
|
|
case 23: /* includedir: INCLUDEDIR WORD error '\n' */
|
|
#line 289 "gram.y"
|
|
{
|
|
yyerrok;
|
|
(yyval.string) = (yyvsp[-2].string);
|
|
}
|
|
#line 1818 "gram.c"
|
|
break;
|
|
|
|
case 25: /* defaults_list: defaults_list ',' defaults_entry */
|
|
#line 296 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_DEFAULTS, (yyvsp[0].defaults));
|
|
HLTQ_CONCAT((yyvsp[-2].defaults), (yyvsp[0].defaults), entries);
|
|
(yyval.defaults) = (yyvsp[-2].defaults);
|
|
}
|
|
#line 1828 "gram.c"
|
|
break;
|
|
|
|
case 26: /* defaults_entry: DEFVAR */
|
|
#line 303 "gram.y"
|
|
{
|
|
(yyval.defaults) = new_default((yyvsp[0].string), NULL, true);
|
|
if ((yyval.defaults) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_DEFAULTS, (yyval.defaults));
|
|
}
|
|
#line 1842 "gram.c"
|
|
break;
|
|
|
|
case 27: /* defaults_entry: '!' DEFVAR */
|
|
#line 312 "gram.y"
|
|
{
|
|
(yyval.defaults) = new_default((yyvsp[0].string), NULL, false);
|
|
if ((yyval.defaults) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_DEFAULTS, (yyval.defaults));
|
|
}
|
|
#line 1856 "gram.c"
|
|
break;
|
|
|
|
case 28: /* defaults_entry: DEFVAR '=' WORD */
|
|
#line 321 "gram.y"
|
|
{
|
|
(yyval.defaults) = new_default((yyvsp[-2].string), (yyvsp[0].string), true);
|
|
if ((yyval.defaults) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].string));
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_DEFAULTS, (yyval.defaults));
|
|
}
|
|
#line 1871 "gram.c"
|
|
break;
|
|
|
|
case 29: /* defaults_entry: DEFVAR '+' WORD */
|
|
#line 331 "gram.y"
|
|
{
|
|
(yyval.defaults) = new_default((yyvsp[-2].string), (yyvsp[0].string), '+');
|
|
if ((yyval.defaults) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].string));
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_DEFAULTS, (yyval.defaults));
|
|
}
|
|
#line 1886 "gram.c"
|
|
break;
|
|
|
|
case 30: /* defaults_entry: DEFVAR '-' WORD */
|
|
#line 341 "gram.y"
|
|
{
|
|
(yyval.defaults) = new_default((yyvsp[-2].string), (yyvsp[0].string), '-');
|
|
if ((yyval.defaults) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].string));
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_DEFAULTS, (yyval.defaults));
|
|
}
|
|
#line 1901 "gram.c"
|
|
break;
|
|
|
|
case 32: /* privileges: privileges ':' privilege */
|
|
#line 354 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_PRIVILEGE, (yyvsp[0].privilege));
|
|
HLTQ_CONCAT((yyvsp[-2].privilege), (yyvsp[0].privilege), entries);
|
|
(yyval.privilege) = (yyvsp[-2].privilege);
|
|
}
|
|
#line 1911 "gram.c"
|
|
break;
|
|
|
|
case 33: /* privileges: privileges ':' error */
|
|
#line 359 "gram.y"
|
|
{
|
|
yyerrok;
|
|
(yyval.privilege) = (yyvsp[-2].privilege);
|
|
}
|
|
#line 1920 "gram.c"
|
|
break;
|
|
|
|
case 34: /* privilege: hostlist '=' cmndspeclist */
|
|
#line 365 "gram.y"
|
|
{
|
|
struct privilege *p = calloc(1, sizeof(*p));
|
|
if (p == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_PRIVILEGE, p);
|
|
TAILQ_INIT(&p->defaults);
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[-2].member));
|
|
HLTQ_TO_TAILQ(&p->hostlist, (yyvsp[-2].member), entries);
|
|
parser_leak_remove(LEAK_CMNDSPEC, (yyvsp[0].cmndspec));
|
|
HLTQ_TO_TAILQ(&p->cmndlist, (yyvsp[0].cmndspec), entries);
|
|
HLTQ_INIT(p, entries);
|
|
(yyval.privilege) = p;
|
|
}
|
|
#line 1940 "gram.c"
|
|
break;
|
|
|
|
case 35: /* ophost: host */
|
|
#line 382 "gram.y"
|
|
{
|
|
(yyval.member) = (yyvsp[0].member);
|
|
(yyval.member)->negated = false;
|
|
}
|
|
#line 1949 "gram.c"
|
|
break;
|
|
|
|
case 36: /* ophost: '!' host */
|
|
#line 386 "gram.y"
|
|
{
|
|
(yyval.member) = (yyvsp[0].member);
|
|
(yyval.member)->negated = true;
|
|
}
|
|
#line 1958 "gram.c"
|
|
break;
|
|
|
|
case 37: /* host: ALIAS */
|
|
#line 392 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), ALIAS);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 1972 "gram.c"
|
|
break;
|
|
|
|
case 38: /* host: ALL */
|
|
#line 401 "gram.y"
|
|
{
|
|
(yyval.member) = new_member(NULL, ALL);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 1985 "gram.c"
|
|
break;
|
|
|
|
case 39: /* host: NETGROUP */
|
|
#line 409 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), NETGROUP);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 1999 "gram.c"
|
|
break;
|
|
|
|
case 40: /* host: NTWKADDR */
|
|
#line 418 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), NTWKADDR);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 2013 "gram.c"
|
|
break;
|
|
|
|
case 41: /* host: WORD */
|
|
#line 427 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), WORD);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 2027 "gram.c"
|
|
break;
|
|
|
|
case 43: /* cmndspeclist: cmndspeclist ',' cmndspec */
|
|
#line 439 "gram.y"
|
|
{
|
|
const struct cmndspec *prev =
|
|
HLTQ_LAST((yyvsp[-2].cmndspec), cmndspec, entries);
|
|
propagate_cmndspec((yyvsp[0].cmndspec), prev);
|
|
parser_leak_remove(LEAK_CMNDSPEC, (yyvsp[0].cmndspec));
|
|
HLTQ_CONCAT((yyvsp[-2].cmndspec), (yyvsp[0].cmndspec), entries);
|
|
(yyval.cmndspec) = (yyvsp[-2].cmndspec);
|
|
}
|
|
#line 2040 "gram.c"
|
|
break;
|
|
|
|
case 44: /* cmndspec: runasspec options cmndtag digcmnd */
|
|
#line 449 "gram.y"
|
|
{
|
|
struct cmndspec *cs = calloc(1, sizeof(*cs));
|
|
if (cs == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_CMNDSPEC, cs);
|
|
if ((yyvsp[-3].runas) != NULL) {
|
|
if ((yyvsp[-3].runas)->runasusers != NULL) {
|
|
cs->runasuserlist =
|
|
malloc(sizeof(*cs->runasuserlist));
|
|
if (cs->runasuserlist == NULL) {
|
|
free(cs);
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
/* g/c done via runas container */
|
|
HLTQ_TO_TAILQ(cs->runasuserlist,
|
|
(yyvsp[-3].runas)->runasusers, entries);
|
|
}
|
|
if ((yyvsp[-3].runas)->runasgroups != NULL) {
|
|
cs->runasgrouplist =
|
|
malloc(sizeof(*cs->runasgrouplist));
|
|
if (cs->runasgrouplist == NULL) {
|
|
free(cs);
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
/* g/c done via runas container */
|
|
HLTQ_TO_TAILQ(cs->runasgrouplist,
|
|
(yyvsp[-3].runas)->runasgroups, entries);
|
|
}
|
|
parser_leak_remove(LEAK_RUNAS, (yyvsp[-3].runas));
|
|
free((yyvsp[-3].runas));
|
|
}
|
|
cs->role = (yyvsp[-2].options).role;
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].options).role);
|
|
cs->type = (yyvsp[-2].options).type;
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].options).type);
|
|
cs->apparmor_profile = (yyvsp[-2].options).apparmor_profile;
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].options).apparmor_profile);
|
|
cs->privs = (yyvsp[-2].options).privs;
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].options).privs);
|
|
cs->limitprivs = (yyvsp[-2].options).limitprivs;
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].options).limitprivs);
|
|
cs->notbefore = (yyvsp[-2].options).notbefore;
|
|
cs->notafter = (yyvsp[-2].options).notafter;
|
|
cs->timeout = (yyvsp[-2].options).timeout;
|
|
cs->runcwd = (yyvsp[-2].options).runcwd;
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].options).runcwd);
|
|
cs->runchroot = (yyvsp[-2].options).runchroot;
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-2].options).runchroot);
|
|
cs->tags = (yyvsp[-1].tag);
|
|
cs->cmnd = (yyvsp[0].member);
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
HLTQ_INIT(cs, entries);
|
|
/* sudo "ALL" implies the SETENV tag */
|
|
if (cs->cmnd->type == ALL && !cs->cmnd->negated &&
|
|
cs->tags.setenv == UNSPEC)
|
|
cs->tags.setenv = IMPLIED;
|
|
(yyval.cmndspec) = cs;
|
|
}
|
|
#line 2107 "gram.c"
|
|
break;
|
|
|
|
case 45: /* digestspec: SHA224_TOK ':' DIGEST */
|
|
#line 513 "gram.y"
|
|
{
|
|
(yyval.digest) = new_digest(SUDO_DIGEST_SHA224, (yyvsp[0].string));
|
|
if ((yyval.digest) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_DIGEST, (yyval.digest));
|
|
}
|
|
#line 2121 "gram.c"
|
|
break;
|
|
|
|
case 46: /* digestspec: SHA256_TOK ':' DIGEST */
|
|
#line 522 "gram.y"
|
|
{
|
|
(yyval.digest) = new_digest(SUDO_DIGEST_SHA256, (yyvsp[0].string));
|
|
if ((yyval.digest) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_DIGEST, (yyval.digest));
|
|
}
|
|
#line 2135 "gram.c"
|
|
break;
|
|
|
|
case 47: /* digestspec: SHA384_TOK ':' DIGEST */
|
|
#line 531 "gram.y"
|
|
{
|
|
(yyval.digest) = new_digest(SUDO_DIGEST_SHA384, (yyvsp[0].string));
|
|
if ((yyval.digest) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_DIGEST, (yyval.digest));
|
|
}
|
|
#line 2149 "gram.c"
|
|
break;
|
|
|
|
case 48: /* digestspec: SHA512_TOK ':' DIGEST */
|
|
#line 540 "gram.y"
|
|
{
|
|
(yyval.digest) = new_digest(SUDO_DIGEST_SHA512, (yyvsp[0].string));
|
|
if ((yyval.digest) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_DIGEST, (yyval.digest));
|
|
}
|
|
#line 2163 "gram.c"
|
|
break;
|
|
|
|
case 50: /* digestlist: digestlist ',' digestspec */
|
|
#line 552 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_DIGEST, (yyvsp[0].digest));
|
|
HLTQ_CONCAT((yyvsp[-2].digest), (yyvsp[0].digest), entries);
|
|
(yyval.digest) = (yyvsp[-2].digest);
|
|
}
|
|
#line 2173 "gram.c"
|
|
break;
|
|
|
|
case 51: /* digcmnd: opcmnd */
|
|
#line 559 "gram.y"
|
|
{
|
|
(yyval.member) = (yyvsp[0].member);
|
|
}
|
|
#line 2181 "gram.c"
|
|
break;
|
|
|
|
case 52: /* digcmnd: digestlist opcmnd */
|
|
#line 562 "gram.y"
|
|
{
|
|
struct sudo_command *c =
|
|
(struct sudo_command *) (yyvsp[0].member)->name;
|
|
|
|
if ((yyvsp[0].member)->type != COMMAND && (yyvsp[0].member)->type != ALL) {
|
|
sudoerserror(N_("a digest requires a path name"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_DIGEST, (yyvsp[-1].digest));
|
|
HLTQ_TO_TAILQ(&c->digests, (yyvsp[-1].digest), entries);
|
|
(yyval.member) = (yyvsp[0].member);
|
|
}
|
|
#line 2198 "gram.c"
|
|
break;
|
|
|
|
case 53: /* opcmnd: cmnd */
|
|
#line 576 "gram.y"
|
|
{
|
|
(yyval.member) = (yyvsp[0].member);
|
|
(yyval.member)->negated = false;
|
|
}
|
|
#line 2207 "gram.c"
|
|
break;
|
|
|
|
case 54: /* opcmnd: '!' cmnd */
|
|
#line 580 "gram.y"
|
|
{
|
|
(yyval.member) = (yyvsp[0].member);
|
|
(yyval.member)->negated = true;
|
|
}
|
|
#line 2216 "gram.c"
|
|
break;
|
|
|
|
case 55: /* chdirspec: CWD '=' WORD */
|
|
#line 586 "gram.y"
|
|
{
|
|
if ((yyvsp[0].string)[0] != '/' && (yyvsp[0].string)[0] != '~') {
|
|
if (strcmp((yyvsp[0].string), "*") != 0) {
|
|
sudoerserror(N_("values for \"CWD\" must"
|
|
" start with a '/', '~', or '*'"));
|
|
YYERROR;
|
|
}
|
|
}
|
|
if (strlen((yyvsp[0].string)) >= PATH_MAX) {
|
|
sudoerserror(N_("\"CWD\" path too long"));
|
|
YYERROR;
|
|
}
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2235 "gram.c"
|
|
break;
|
|
|
|
case 56: /* chrootspec: CHROOT '=' WORD */
|
|
#line 602 "gram.y"
|
|
{
|
|
if ((yyvsp[0].string)[0] != '/' && (yyvsp[0].string)[0] != '~') {
|
|
if (strcmp((yyvsp[0].string), "*") != 0) {
|
|
sudoerserror(N_("values for \"CHROOT\" must"
|
|
" start with a '/', '~', or '*'"));
|
|
YYERROR;
|
|
}
|
|
}
|
|
if (strlen((yyvsp[0].string)) >= PATH_MAX) {
|
|
sudoerserror(N_("\"CHROOT\" path too long"));
|
|
YYERROR;
|
|
}
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2254 "gram.c"
|
|
break;
|
|
|
|
case 57: /* timeoutspec: CMND_TIMEOUT '=' WORD */
|
|
#line 618 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2262 "gram.c"
|
|
break;
|
|
|
|
case 58: /* notbeforespec: NOTBEFORE '=' WORD */
|
|
#line 623 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2270 "gram.c"
|
|
break;
|
|
|
|
case 59: /* notafterspec: NOTAFTER '=' WORD */
|
|
#line 627 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2278 "gram.c"
|
|
break;
|
|
|
|
case 60: /* rolespec: ROLE '=' WORD */
|
|
#line 632 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2286 "gram.c"
|
|
break;
|
|
|
|
case 61: /* typespec: TYPE '=' WORD */
|
|
#line 637 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2294 "gram.c"
|
|
break;
|
|
|
|
case 62: /* apparmor_profilespec: APPARMOR_PROFILE '=' WORD */
|
|
#line 642 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2302 "gram.c"
|
|
break;
|
|
|
|
case 63: /* privsspec: PRIVS '=' WORD */
|
|
#line 647 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2310 "gram.c"
|
|
break;
|
|
|
|
case 64: /* limitprivsspec: LIMITPRIVS '=' WORD */
|
|
#line 651 "gram.y"
|
|
{
|
|
(yyval.string) = (yyvsp[0].string);
|
|
}
|
|
#line 2318 "gram.c"
|
|
break;
|
|
|
|
case 65: /* runasspec: %empty */
|
|
#line 656 "gram.y"
|
|
{
|
|
(yyval.runas) = NULL;
|
|
}
|
|
#line 2326 "gram.c"
|
|
break;
|
|
|
|
case 66: /* runasspec: '(' runaslist ')' */
|
|
#line 659 "gram.y"
|
|
{
|
|
(yyval.runas) = (yyvsp[-1].runas);
|
|
}
|
|
#line 2334 "gram.c"
|
|
break;
|
|
|
|
case 67: /* runaslist: %empty */
|
|
#line 664 "gram.y"
|
|
{
|
|
/* User may run command as themselves. */
|
|
(yyval.runas) = calloc(1, sizeof(struct runascontainer));
|
|
if ((yyval.runas) != NULL) {
|
|
(yyval.runas)->runasusers = new_member(NULL, MYSELF);
|
|
/* $$->runasgroups = NULL; */
|
|
if ((yyval.runas)->runasusers == NULL) {
|
|
free((yyval.runas));
|
|
(yyval.runas) = NULL;
|
|
}
|
|
}
|
|
if ((yyval.runas) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_RUNAS, (yyval.runas));
|
|
}
|
|
#line 2356 "gram.c"
|
|
break;
|
|
|
|
case 68: /* runaslist: userlist */
|
|
#line 681 "gram.y"
|
|
{
|
|
/* User may run command as a user in userlist. */
|
|
(yyval.runas) = calloc(1, sizeof(struct runascontainer));
|
|
if ((yyval.runas) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_RUNAS, (yyval.runas));
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
(yyval.runas)->runasusers = (yyvsp[0].member);
|
|
/* $$->runasgroups = NULL; */
|
|
}
|
|
#line 2373 "gram.c"
|
|
break;
|
|
|
|
case 69: /* runaslist: userlist ':' grouplist */
|
|
#line 693 "gram.y"
|
|
{
|
|
/*
|
|
* User may run command as a user in userlist
|
|
* and optionally as a group in grouplist.
|
|
*/
|
|
(yyval.runas) = calloc(1, sizeof(struct runascontainer));
|
|
if ((yyval.runas) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_RUNAS, (yyval.runas));
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[-2].member));
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
(yyval.runas)->runasusers = (yyvsp[-2].member);
|
|
(yyval.runas)->runasgroups = (yyvsp[0].member);
|
|
}
|
|
#line 2394 "gram.c"
|
|
break;
|
|
|
|
case 70: /* runaslist: ':' grouplist */
|
|
#line 709 "gram.y"
|
|
{
|
|
/* User may run command as a group in grouplist. */
|
|
(yyval.runas) = calloc(1, sizeof(struct runascontainer));
|
|
if ((yyval.runas) != NULL) {
|
|
(yyval.runas)->runasusers = new_member(NULL, MYSELF);
|
|
if ((yyval.runas)->runasusers == NULL) {
|
|
free((yyval.runas));
|
|
(yyval.runas) = NULL;
|
|
}
|
|
}
|
|
if ((yyval.runas) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_RUNAS, (yyval.runas));
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
(yyval.runas)->runasgroups = (yyvsp[0].member);
|
|
}
|
|
#line 2417 "gram.c"
|
|
break;
|
|
|
|
case 71: /* runaslist: ':' */
|
|
#line 727 "gram.y"
|
|
{
|
|
/* User may run command as themselves. */
|
|
(yyval.runas) = calloc(1, sizeof(struct runascontainer));
|
|
if ((yyval.runas) != NULL) {
|
|
(yyval.runas)->runasusers = new_member(NULL, MYSELF);
|
|
/* $$->runasgroups = NULL; */
|
|
if ((yyval.runas)->runasusers == NULL) {
|
|
free((yyval.runas));
|
|
(yyval.runas) = NULL;
|
|
}
|
|
}
|
|
if ((yyval.runas) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_RUNAS, (yyval.runas));
|
|
}
|
|
#line 2439 "gram.c"
|
|
break;
|
|
|
|
case 72: /* reserved_word: ALL */
|
|
#line 746 "gram.y"
|
|
{ (yyval.cstring) = "ALL"; }
|
|
#line 2445 "gram.c"
|
|
break;
|
|
|
|
case 73: /* reserved_word: CHROOT */
|
|
#line 747 "gram.y"
|
|
{ (yyval.cstring) = "CHROOT"; }
|
|
#line 2451 "gram.c"
|
|
break;
|
|
|
|
case 74: /* reserved_word: CWD */
|
|
#line 748 "gram.y"
|
|
{ (yyval.cstring) = "CWD"; }
|
|
#line 2457 "gram.c"
|
|
break;
|
|
|
|
case 75: /* reserved_word: CMND_TIMEOUT */
|
|
#line 749 "gram.y"
|
|
{ (yyval.cstring) = "CMND_TIMEOUT"; }
|
|
#line 2463 "gram.c"
|
|
break;
|
|
|
|
case 76: /* reserved_word: NOTBEFORE */
|
|
#line 750 "gram.y"
|
|
{ (yyval.cstring) = "NOTBEFORE"; }
|
|
#line 2469 "gram.c"
|
|
break;
|
|
|
|
case 77: /* reserved_word: NOTAFTER */
|
|
#line 751 "gram.y"
|
|
{ (yyval.cstring) = "NOTAFTER"; }
|
|
#line 2475 "gram.c"
|
|
break;
|
|
|
|
case 78: /* reserved_word: ROLE */
|
|
#line 752 "gram.y"
|
|
{ (yyval.cstring) = "ROLE"; }
|
|
#line 2481 "gram.c"
|
|
break;
|
|
|
|
case 79: /* reserved_word: TYPE */
|
|
#line 753 "gram.y"
|
|
{ (yyval.cstring) = "TYPE"; }
|
|
#line 2487 "gram.c"
|
|
break;
|
|
|
|
case 80: /* reserved_word: PRIVS */
|
|
#line 754 "gram.y"
|
|
{ (yyval.cstring) = "PRIVS"; }
|
|
#line 2493 "gram.c"
|
|
break;
|
|
|
|
case 81: /* reserved_word: LIMITPRIVS */
|
|
#line 755 "gram.y"
|
|
{ (yyval.cstring) = "LIMITPRIVS"; }
|
|
#line 2499 "gram.c"
|
|
break;
|
|
|
|
case 82: /* reserved_word: APPARMOR_PROFILE */
|
|
#line 756 "gram.y"
|
|
{ (yyval.cstring) = "APPARMOR_PROFILE"; }
|
|
#line 2505 "gram.c"
|
|
break;
|
|
|
|
case 83: /* reserved_alias: reserved_word */
|
|
#line 759 "gram.y"
|
|
{
|
|
sudoerserrorf(U_("syntax error, reserved word %s used as an alias name"), (yyvsp[0].cstring));
|
|
YYERROR;
|
|
}
|
|
#line 2514 "gram.c"
|
|
break;
|
|
|
|
case 84: /* options: %empty */
|
|
#line 765 "gram.y"
|
|
{
|
|
init_options(&(yyval.options));
|
|
}
|
|
#line 2522 "gram.c"
|
|
break;
|
|
|
|
case 85: /* options: options chdirspec */
|
|
#line 768 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_PTR, (yyval.options).runcwd);
|
|
free((yyval.options).runcwd);
|
|
(yyval.options).runcwd = (yyvsp[0].string);
|
|
}
|
|
#line 2532 "gram.c"
|
|
break;
|
|
|
|
case 86: /* options: options chrootspec */
|
|
#line 773 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_PTR, (yyval.options).runchroot);
|
|
free((yyval.options).runchroot);
|
|
(yyval.options).runchroot = (yyvsp[0].string);
|
|
}
|
|
#line 2542 "gram.c"
|
|
break;
|
|
|
|
case 87: /* options: options notbeforespec */
|
|
#line 778 "gram.y"
|
|
{
|
|
(yyval.options).notbefore = parse_gentime((yyvsp[0].string));
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
free((yyvsp[0].string));
|
|
if ((yyval.options).notbefore == -1) {
|
|
sudoerserror(N_("invalid notbefore value"));
|
|
YYERROR;
|
|
}
|
|
}
|
|
#line 2556 "gram.c"
|
|
break;
|
|
|
|
case 88: /* options: options notafterspec */
|
|
#line 787 "gram.y"
|
|
{
|
|
(yyval.options).notafter = parse_gentime((yyvsp[0].string));
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
free((yyvsp[0].string));
|
|
if ((yyval.options).notafter == -1) {
|
|
sudoerserror(N_("invalid notafter value"));
|
|
YYERROR;
|
|
}
|
|
}
|
|
#line 2570 "gram.c"
|
|
break;
|
|
|
|
case 89: /* options: options timeoutspec */
|
|
#line 796 "gram.y"
|
|
{
|
|
(yyval.options).timeout = parse_timeout((yyvsp[0].string));
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
free((yyvsp[0].string));
|
|
if ((yyval.options).timeout == -1) {
|
|
if (errno == ERANGE)
|
|
sudoerserror(N_("timeout value too large"));
|
|
else
|
|
sudoerserror(N_("invalid timeout value"));
|
|
YYERROR;
|
|
}
|
|
}
|
|
#line 2587 "gram.c"
|
|
break;
|
|
|
|
case 90: /* options: options rolespec */
|
|
#line 808 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_PTR, (yyval.options).role);
|
|
free((yyval.options).role);
|
|
(yyval.options).role = (yyvsp[0].string);
|
|
}
|
|
#line 2597 "gram.c"
|
|
break;
|
|
|
|
case 91: /* options: options typespec */
|
|
#line 813 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_PTR, (yyval.options).type);
|
|
free((yyval.options).type);
|
|
(yyval.options).type = (yyvsp[0].string);
|
|
}
|
|
#line 2607 "gram.c"
|
|
break;
|
|
|
|
case 92: /* options: options apparmor_profilespec */
|
|
#line 818 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_PTR, (yyval.options).apparmor_profile);
|
|
free((yyval.options).apparmor_profile);
|
|
(yyval.options).apparmor_profile = (yyvsp[0].string);
|
|
}
|
|
#line 2617 "gram.c"
|
|
break;
|
|
|
|
case 93: /* options: options privsspec */
|
|
#line 823 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_PTR, (yyval.options).privs);
|
|
free((yyval.options).privs);
|
|
(yyval.options).privs = (yyvsp[0].string);
|
|
}
|
|
#line 2627 "gram.c"
|
|
break;
|
|
|
|
case 94: /* options: options limitprivsspec */
|
|
#line 828 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_PTR, (yyval.options).limitprivs);
|
|
free((yyval.options).limitprivs);
|
|
(yyval.options).limitprivs = (yyvsp[0].string);
|
|
}
|
|
#line 2637 "gram.c"
|
|
break;
|
|
|
|
case 95: /* cmndtag: %empty */
|
|
#line 835 "gram.y"
|
|
{
|
|
TAGS_INIT(&(yyval.tag));
|
|
}
|
|
#line 2645 "gram.c"
|
|
break;
|
|
|
|
case 96: /* cmndtag: cmndtag NOPASSWD */
|
|
#line 838 "gram.y"
|
|
{
|
|
(yyval.tag).nopasswd = true;
|
|
}
|
|
#line 2653 "gram.c"
|
|
break;
|
|
|
|
case 97: /* cmndtag: cmndtag PASSWD */
|
|
#line 841 "gram.y"
|
|
{
|
|
(yyval.tag).nopasswd = false;
|
|
}
|
|
#line 2661 "gram.c"
|
|
break;
|
|
|
|
case 98: /* cmndtag: cmndtag NOEXEC */
|
|
#line 844 "gram.y"
|
|
{
|
|
(yyval.tag).noexec = true;
|
|
}
|
|
#line 2669 "gram.c"
|
|
break;
|
|
|
|
case 99: /* cmndtag: cmndtag EXEC */
|
|
#line 847 "gram.y"
|
|
{
|
|
(yyval.tag).noexec = false;
|
|
}
|
|
#line 2677 "gram.c"
|
|
break;
|
|
|
|
case 100: /* cmndtag: cmndtag INTERCEPT */
|
|
#line 850 "gram.y"
|
|
{
|
|
(yyval.tag).intercept = true;
|
|
}
|
|
#line 2685 "gram.c"
|
|
break;
|
|
|
|
case 101: /* cmndtag: cmndtag NOINTERCEPT */
|
|
#line 853 "gram.y"
|
|
{
|
|
(yyval.tag).intercept = false;
|
|
}
|
|
#line 2693 "gram.c"
|
|
break;
|
|
|
|
case 102: /* cmndtag: cmndtag SETENV */
|
|
#line 856 "gram.y"
|
|
{
|
|
(yyval.tag).setenv = true;
|
|
}
|
|
#line 2701 "gram.c"
|
|
break;
|
|
|
|
case 103: /* cmndtag: cmndtag NOSETENV */
|
|
#line 859 "gram.y"
|
|
{
|
|
(yyval.tag).setenv = false;
|
|
}
|
|
#line 2709 "gram.c"
|
|
break;
|
|
|
|
case 104: /* cmndtag: cmndtag LOG_INPUT */
|
|
#line 862 "gram.y"
|
|
{
|
|
(yyval.tag).log_input = true;
|
|
}
|
|
#line 2717 "gram.c"
|
|
break;
|
|
|
|
case 105: /* cmndtag: cmndtag NOLOG_INPUT */
|
|
#line 865 "gram.y"
|
|
{
|
|
(yyval.tag).log_input = false;
|
|
}
|
|
#line 2725 "gram.c"
|
|
break;
|
|
|
|
case 106: /* cmndtag: cmndtag LOG_OUTPUT */
|
|
#line 868 "gram.y"
|
|
{
|
|
(yyval.tag).log_output = true;
|
|
}
|
|
#line 2733 "gram.c"
|
|
break;
|
|
|
|
case 107: /* cmndtag: cmndtag NOLOG_OUTPUT */
|
|
#line 871 "gram.y"
|
|
{
|
|
(yyval.tag).log_output = false;
|
|
}
|
|
#line 2741 "gram.c"
|
|
break;
|
|
|
|
case 108: /* cmndtag: cmndtag FOLLOWLNK */
|
|
#line 874 "gram.y"
|
|
{
|
|
(yyval.tag).follow = true;
|
|
}
|
|
#line 2749 "gram.c"
|
|
break;
|
|
|
|
case 109: /* cmndtag: cmndtag NOFOLLOWLNK */
|
|
#line 877 "gram.y"
|
|
{
|
|
(yyval.tag).follow = false;
|
|
}
|
|
#line 2757 "gram.c"
|
|
break;
|
|
|
|
case 110: /* cmndtag: cmndtag MAIL */
|
|
#line 880 "gram.y"
|
|
{
|
|
(yyval.tag).send_mail = true;
|
|
}
|
|
#line 2765 "gram.c"
|
|
break;
|
|
|
|
case 111: /* cmndtag: cmndtag NOMAIL */
|
|
#line 883 "gram.y"
|
|
{
|
|
(yyval.tag).send_mail = false;
|
|
}
|
|
#line 2773 "gram.c"
|
|
break;
|
|
|
|
case 112: /* cmnd: ALL */
|
|
#line 888 "gram.y"
|
|
{
|
|
struct sudo_command *c;
|
|
|
|
if ((c = new_command(NULL, NULL)) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
(yyval.member) = new_member((char *)c, ALL);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 2792 "gram.c"
|
|
break;
|
|
|
|
case 113: /* cmnd: ALIAS */
|
|
#line 902 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), ALIAS);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 2806 "gram.c"
|
|
break;
|
|
|
|
case 114: /* cmnd: COMMAND */
|
|
#line 911 "gram.y"
|
|
{
|
|
struct sudo_command *c;
|
|
|
|
if (strlen((yyvsp[0].command).cmnd) >= PATH_MAX) {
|
|
sudoerserror(N_("command too long"));
|
|
YYERROR;
|
|
}
|
|
if ((c = new_command((yyvsp[0].command).cmnd, (yyvsp[0].command).args)) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
(yyval.member) = new_member((char *)c, COMMAND);
|
|
if ((yyval.member) == NULL) {
|
|
free(c);
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].command).cmnd);
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].command).args);
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 2832 "gram.c"
|
|
break;
|
|
|
|
case 115: /* cmnd: WORD */
|
|
#line 932 "gram.y"
|
|
{
|
|
if (strcmp((yyvsp[0].string), "list") == 0) {
|
|
struct sudo_command *c;
|
|
|
|
if ((c = new_command((yyvsp[0].string), NULL)) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
(yyval.member) = new_member((char *)c, COMMAND);
|
|
if ((yyval.member) == NULL) {
|
|
free(c);
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
} else {
|
|
sudoerserror(N_("expected a fully-qualified path name"));
|
|
YYERROR;
|
|
}
|
|
}
|
|
#line 2858 "gram.c"
|
|
break;
|
|
|
|
case 118: /* $@1: %empty */
|
|
#line 959 "gram.y"
|
|
{
|
|
alias_line = this_lineno;
|
|
alias_column = (int)sudolinebuf.toke_start + 1;
|
|
}
|
|
#line 2867 "gram.c"
|
|
break;
|
|
|
|
case 119: /* hostalias: ALIAS $@1 '=' hostlist */
|
|
#line 962 "gram.y"
|
|
{
|
|
if (!alias_add(&parsed_policy, (yyvsp[-3].string), HOSTALIAS,
|
|
sudoers, alias_line, alias_column, (yyvsp[0].member))) {
|
|
alias_error((yyvsp[-3].string), HOSTALIAS, errno);
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-3].string));
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
}
|
|
#line 2881 "gram.c"
|
|
break;
|
|
|
|
case 122: /* hostlist: hostlist ',' ophost */
|
|
#line 975 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
HLTQ_CONCAT((yyvsp[-2].member), (yyvsp[0].member), entries);
|
|
(yyval.member) = (yyvsp[-2].member);
|
|
}
|
|
#line 2891 "gram.c"
|
|
break;
|
|
|
|
case 125: /* $@2: %empty */
|
|
#line 986 "gram.y"
|
|
{
|
|
alias_line = this_lineno;
|
|
alias_column = (int)sudolinebuf.toke_start + 1;
|
|
}
|
|
#line 2900 "gram.c"
|
|
break;
|
|
|
|
case 126: /* cmndalias: ALIAS $@2 '=' cmndlist */
|
|
#line 989 "gram.y"
|
|
{
|
|
if (!alias_add(&parsed_policy, (yyvsp[-3].string), CMNDALIAS,
|
|
sudoers, alias_line, alias_column, (yyvsp[0].member))) {
|
|
alias_error((yyvsp[-3].string), CMNDALIAS, errno);
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-3].string));
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
}
|
|
#line 2914 "gram.c"
|
|
break;
|
|
|
|
case 129: /* cmndlist: cmndlist ',' digcmnd */
|
|
#line 1002 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
HLTQ_CONCAT((yyvsp[-2].member), (yyvsp[0].member), entries);
|
|
(yyval.member) = (yyvsp[-2].member);
|
|
}
|
|
#line 2924 "gram.c"
|
|
break;
|
|
|
|
case 132: /* $@3: %empty */
|
|
#line 1013 "gram.y"
|
|
{
|
|
alias_line = this_lineno;
|
|
alias_column = (int)sudolinebuf.toke_start + 1;
|
|
}
|
|
#line 2933 "gram.c"
|
|
break;
|
|
|
|
case 133: /* runasalias: ALIAS $@3 '=' userlist */
|
|
#line 1016 "gram.y"
|
|
{
|
|
if (!alias_add(&parsed_policy, (yyvsp[-3].string), RUNASALIAS,
|
|
sudoers, alias_line, alias_column, (yyvsp[0].member))) {
|
|
alias_error((yyvsp[-3].string), RUNASALIAS, errno);
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-3].string));
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
}
|
|
#line 2947 "gram.c"
|
|
break;
|
|
|
|
case 137: /* $@4: %empty */
|
|
#line 1032 "gram.y"
|
|
{
|
|
alias_line = this_lineno;
|
|
alias_column = (int)sudolinebuf.toke_start + 1;
|
|
}
|
|
#line 2956 "gram.c"
|
|
break;
|
|
|
|
case 138: /* useralias: ALIAS $@4 '=' userlist */
|
|
#line 1035 "gram.y"
|
|
{
|
|
if (!alias_add(&parsed_policy, (yyvsp[-3].string), USERALIAS,
|
|
sudoers, alias_line, alias_column, (yyvsp[0].member))) {
|
|
alias_error((yyvsp[-3].string), USERALIAS, errno);
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[-3].string));
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
}
|
|
#line 2970 "gram.c"
|
|
break;
|
|
|
|
case 141: /* userlist: userlist ',' opuser */
|
|
#line 1048 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
HLTQ_CONCAT((yyvsp[-2].member), (yyvsp[0].member), entries);
|
|
(yyval.member) = (yyvsp[-2].member);
|
|
}
|
|
#line 2980 "gram.c"
|
|
break;
|
|
|
|
case 142: /* opuser: user */
|
|
#line 1055 "gram.y"
|
|
{
|
|
(yyval.member) = (yyvsp[0].member);
|
|
(yyval.member)->negated = false;
|
|
}
|
|
#line 2989 "gram.c"
|
|
break;
|
|
|
|
case 143: /* opuser: '!' user */
|
|
#line 1059 "gram.y"
|
|
{
|
|
(yyval.member) = (yyvsp[0].member);
|
|
(yyval.member)->negated = true;
|
|
}
|
|
#line 2998 "gram.c"
|
|
break;
|
|
|
|
case 144: /* user: ALIAS */
|
|
#line 1065 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), ALIAS);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 3012 "gram.c"
|
|
break;
|
|
|
|
case 145: /* user: ALL */
|
|
#line 1074 "gram.y"
|
|
{
|
|
(yyval.member) = new_member(NULL, ALL);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 3025 "gram.c"
|
|
break;
|
|
|
|
case 146: /* user: NETGROUP */
|
|
#line 1082 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), NETGROUP);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 3039 "gram.c"
|
|
break;
|
|
|
|
case 147: /* user: USERGROUP */
|
|
#line 1091 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), USERGROUP);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 3053 "gram.c"
|
|
break;
|
|
|
|
case 148: /* user: WORD */
|
|
#line 1100 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), WORD);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 3067 "gram.c"
|
|
break;
|
|
|
|
case 150: /* grouplist: grouplist ',' opgroup */
|
|
#line 1112 "gram.y"
|
|
{
|
|
parser_leak_remove(LEAK_MEMBER, (yyvsp[0].member));
|
|
HLTQ_CONCAT((yyvsp[-2].member), (yyvsp[0].member), entries);
|
|
(yyval.member) = (yyvsp[-2].member);
|
|
}
|
|
#line 3077 "gram.c"
|
|
break;
|
|
|
|
case 151: /* opgroup: group */
|
|
#line 1119 "gram.y"
|
|
{
|
|
(yyval.member) = (yyvsp[0].member);
|
|
(yyval.member)->negated = false;
|
|
}
|
|
#line 3086 "gram.c"
|
|
break;
|
|
|
|
case 152: /* opgroup: '!' group */
|
|
#line 1123 "gram.y"
|
|
{
|
|
(yyval.member) = (yyvsp[0].member);
|
|
(yyval.member)->negated = true;
|
|
}
|
|
#line 3095 "gram.c"
|
|
break;
|
|
|
|
case 153: /* group: ALIAS */
|
|
#line 1129 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), ALIAS);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 3109 "gram.c"
|
|
break;
|
|
|
|
case 154: /* group: ALL */
|
|
#line 1138 "gram.y"
|
|
{
|
|
(yyval.member) = new_member(NULL, ALL);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 3122 "gram.c"
|
|
break;
|
|
|
|
case 155: /* group: WORD */
|
|
#line 1146 "gram.y"
|
|
{
|
|
(yyval.member) = new_member((yyvsp[0].string), WORD);
|
|
if ((yyval.member) == NULL) {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
YYERROR;
|
|
}
|
|
parser_leak_remove(LEAK_PTR, (yyvsp[0].string));
|
|
parser_leak_add(LEAK_MEMBER, (yyval.member));
|
|
}
|
|
#line 3136 "gram.c"
|
|
break;
|
|
|
|
|
|
#line 3140 "gram.c"
|
|
|
|
default: break;
|
|
}
|
|
/* User semantic actions sometimes alter yychar, and that requires
|
|
that yytoken be updated with the new translation. We take the
|
|
approach of translating immediately before every use of yytoken.
|
|
One alternative is translating here after every semantic action,
|
|
but that translation would be missed if the semantic action invokes
|
|
YYABORT, YYACCEPT, or YYERROR immediately after altering yychar or
|
|
if it invokes YYBACKUP. In the case of YYABORT or YYACCEPT, an
|
|
incorrect destructor might then be invoked immediately. In the
|
|
case of YYERROR or YYBACKUP, subsequent parser actions might lead
|
|
to an incorrect destructor call or verbose syntax error message
|
|
before the lookahead is translated. */
|
|
YY_SYMBOL_PRINT ("-> $$ =", YY_CAST (yysymbol_kind_t, yyr1[yyn]), &yyval, &yyloc);
|
|
|
|
YYPOPSTACK (yylen);
|
|
yylen = 0;
|
|
|
|
*++yyvsp = yyval;
|
|
|
|
/* Now 'shift' the result of the reduction. Determine what state
|
|
that goes to, based on the state we popped back to and the rule
|
|
number reduced by. */
|
|
{
|
|
const int yylhs = yyr1[yyn] - YYNTOKENS;
|
|
const int yyi = yypgoto[yylhs] + *yyssp;
|
|
yystate = (0 <= yyi && yyi <= YYLAST && yycheck[yyi] == *yyssp
|
|
? yytable[yyi]
|
|
: yydefgoto[yylhs]);
|
|
}
|
|
|
|
goto yynewstate;
|
|
|
|
|
|
/*--------------------------------------.
|
|
| yyerrlab -- here on detecting error. |
|
|
`--------------------------------------*/
|
|
yyerrlab:
|
|
/* Make sure we have latest lookahead translation. See comments at
|
|
user semantic actions for why this is necessary. */
|
|
yytoken = yychar == YYEMPTY ? YYSYMBOL_YYEMPTY : YYTRANSLATE (yychar);
|
|
/* If not already recovering from an error, report this error. */
|
|
if (!yyerrstatus)
|
|
{
|
|
++yynerrs;
|
|
yyerror (YY_("syntax error"));
|
|
}
|
|
|
|
if (yyerrstatus == 3)
|
|
{
|
|
/* If just tried and failed to reuse lookahead token after an
|
|
error, discard it. */
|
|
|
|
if (yychar <= YYEOF)
|
|
{
|
|
/* Return failure if at end of input. */
|
|
if (yychar == YYEOF)
|
|
YYABORT;
|
|
}
|
|
else
|
|
{
|
|
yydestruct ("Error: discarding",
|
|
yytoken, &yylval);
|
|
yychar = YYEMPTY;
|
|
}
|
|
}
|
|
|
|
/* Else will try to reuse lookahead token after shifting the error
|
|
token. */
|
|
goto yyerrlab1;
|
|
|
|
|
|
/*---------------------------------------------------.
|
|
| yyerrorlab -- error raised explicitly by YYERROR. |
|
|
`---------------------------------------------------*/
|
|
yyerrorlab:
|
|
/* Pacify compilers when the user code never invokes YYERROR and the
|
|
label yyerrorlab therefore never appears in user code. */
|
|
if (0)
|
|
YYERROR;
|
|
++yynerrs;
|
|
|
|
/* Do not reclaim the symbols of the rule whose action triggered
|
|
this YYERROR. */
|
|
YYPOPSTACK (yylen);
|
|
yylen = 0;
|
|
YY_STACK_PRINT (yyss, yyssp);
|
|
yystate = *yyssp;
|
|
goto yyerrlab1;
|
|
|
|
|
|
/*-------------------------------------------------------------.
|
|
| yyerrlab1 -- common code for both syntax error and YYERROR. |
|
|
`-------------------------------------------------------------*/
|
|
yyerrlab1:
|
|
yyerrstatus = 3; /* Each real token shifted decrements this. */
|
|
|
|
/* Pop stack until we find a state that shifts the error token. */
|
|
for (;;)
|
|
{
|
|
yyn = yypact[yystate];
|
|
if (!yypact_value_is_default (yyn))
|
|
{
|
|
yyn += YYSYMBOL_YYerror;
|
|
if (0 <= yyn && yyn <= YYLAST && yycheck[yyn] == YYSYMBOL_YYerror)
|
|
{
|
|
yyn = yytable[yyn];
|
|
if (0 < yyn)
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* Pop the current state because it cannot handle the error token. */
|
|
if (yyssp == yyss)
|
|
YYABORT;
|
|
|
|
|
|
yydestruct ("Error: popping",
|
|
YY_ACCESSING_SYMBOL (yystate), yyvsp);
|
|
YYPOPSTACK (1);
|
|
yystate = *yyssp;
|
|
YY_STACK_PRINT (yyss, yyssp);
|
|
}
|
|
|
|
YY_IGNORE_MAYBE_UNINITIALIZED_BEGIN
|
|
*++yyvsp = yylval;
|
|
YY_IGNORE_MAYBE_UNINITIALIZED_END
|
|
|
|
|
|
/* Shift the error token. */
|
|
YY_SYMBOL_PRINT ("Shifting", YY_ACCESSING_SYMBOL (yyn), yyvsp, yylsp);
|
|
|
|
yystate = yyn;
|
|
goto yynewstate;
|
|
|
|
|
|
/*-------------------------------------.
|
|
| yyacceptlab -- YYACCEPT comes here. |
|
|
`-------------------------------------*/
|
|
yyacceptlab:
|
|
yyresult = 0;
|
|
goto yyreturnlab;
|
|
|
|
|
|
/*-----------------------------------.
|
|
| yyabortlab -- YYABORT comes here. |
|
|
`-----------------------------------*/
|
|
yyabortlab:
|
|
yyresult = 1;
|
|
goto yyreturnlab;
|
|
|
|
|
|
/*-----------------------------------------------------------.
|
|
| yyexhaustedlab -- YYNOMEM (memory exhaustion) comes here. |
|
|
`-----------------------------------------------------------*/
|
|
yyexhaustedlab:
|
|
yyerror (YY_("memory exhausted"));
|
|
yyresult = 2;
|
|
goto yyreturnlab;
|
|
|
|
|
|
/*----------------------------------------------------------.
|
|
| yyreturnlab -- parsing is finished, clean up and return. |
|
|
`----------------------------------------------------------*/
|
|
yyreturnlab:
|
|
if (yychar != YYEMPTY)
|
|
{
|
|
/* Make sure we have latest lookahead translation. See comments at
|
|
user semantic actions for why this is necessary. */
|
|
yytoken = YYTRANSLATE (yychar);
|
|
yydestruct ("Cleanup: discarding lookahead",
|
|
yytoken, &yylval);
|
|
}
|
|
/* Do not reclaim the symbols of the rule whose action triggered
|
|
this YYABORT or YYACCEPT. */
|
|
YYPOPSTACK (yylen);
|
|
YY_STACK_PRINT (yyss, yyssp);
|
|
while (yyssp != yyss)
|
|
{
|
|
yydestruct ("Cleanup: popping",
|
|
YY_ACCESSING_SYMBOL (+*yyssp), yyvsp);
|
|
YYPOPSTACK (1);
|
|
}
|
|
#ifndef yyoverflow
|
|
if (yyss != yyssa)
|
|
YYSTACK_FREE (yyss);
|
|
#endif
|
|
|
|
return yyresult;
|
|
}
|
|
|
|
#line 1156 "gram.y"
|
|
|
|
/* Like yyerror() but takes a printf-style format string. */
|
|
void
|
|
sudoerserrorf(const char * restrict fmt, ...)
|
|
{
|
|
const int column = (int)(sudolinebuf.toke_start + 1);
|
|
va_list ap;
|
|
debug_decl(sudoerserrorf, SUDOERS_DEBUG_PARSER);
|
|
|
|
if (sudoers_error_hook != NULL) {
|
|
va_start(ap, fmt);
|
|
sudoers_error_hook(parsed_policy.ctx, sudoers, this_lineno, column,
|
|
fmt, ap);
|
|
va_end(ap);
|
|
}
|
|
if (parser_conf.verbose > 0 && fmt != NULL) {
|
|
LEXTRACE("<*> ");
|
|
#ifndef TRACELEXER
|
|
if (trace_print == NULL || trace_print == sudoers_trace_print) {
|
|
char *tofree = NULL;
|
|
const char *s;
|
|
int oldlocale;
|
|
|
|
/* Warnings are displayed in the user's locale. */
|
|
sudoers_setlocale(SUDOERS_LOCALE_USER, &oldlocale);
|
|
|
|
va_start(ap, fmt);
|
|
if (strcmp(fmt, "%s") == 0) {
|
|
/* Optimize common case, a single string. */
|
|
s = _(va_arg(ap, char *));
|
|
} else {
|
|
if (vasprintf(&tofree, _(fmt), ap) != -1) {
|
|
s = tofree;
|
|
} else {
|
|
s = _("syntax error");
|
|
tofree = NULL;
|
|
}
|
|
}
|
|
sudo_printf(SUDO_CONV_ERROR_MSG, _("%s:%d:%zu: %s\n"), sudoers,
|
|
this_lineno, sudolinebuf.toke_start + 1, s);
|
|
free(tofree);
|
|
va_end(ap);
|
|
sudoers_setlocale(oldlocale, NULL);
|
|
|
|
/* Display the offending line and token if possible. */
|
|
if (sudolinebuf.len != 0) {
|
|
char tildes[128];
|
|
size_t tlen = 0;
|
|
|
|
sudo_printf(SUDO_CONV_ERROR_MSG, "%s%s", sudolinebuf.buf,
|
|
sudolinebuf.buf[sudolinebuf.len - 1] == '\n' ? "" : "\n");
|
|
if (sudolinebuf.toke_end > sudolinebuf.toke_start) {
|
|
tlen = sudolinebuf.toke_end - sudolinebuf.toke_start - 1;
|
|
if (tlen >= sizeof(tildes))
|
|
tlen = sizeof(tildes) - 1;
|
|
memset(tildes, '~', tlen);
|
|
}
|
|
tildes[tlen] = '\0';
|
|
sudo_printf(SUDO_CONV_ERROR_MSG, "%*s^%s\n",
|
|
(int)sudolinebuf.toke_start, "", tildes);
|
|
}
|
|
}
|
|
#endif
|
|
}
|
|
parse_error = true;
|
|
debug_return;
|
|
}
|
|
|
|
void
|
|
sudoerserror(const char *s)
|
|
{
|
|
if (sudoerschar == ERROR) {
|
|
/* Use error string from lexer. */
|
|
s = sudoers_errstr;
|
|
sudoers_errstr = NULL;
|
|
}
|
|
|
|
#pragma pvs(push)
|
|
#pragma pvs(disable: 575, 618)
|
|
|
|
if (s == NULL)
|
|
sudoerserrorf(NULL);
|
|
else
|
|
sudoerserrorf("%s", s);
|
|
|
|
#pragma pvs(pop)
|
|
}
|
|
|
|
static void
|
|
alias_error(const char *name, short type, int errnum)
|
|
{
|
|
if (errnum == EEXIST) {
|
|
struct alias *a = alias_get(&parsed_policy, name, type);
|
|
if (a != NULL) {
|
|
sudoerserrorf(
|
|
U_("duplicate %s \"%s\", previously defined at %s:%d:%d"),
|
|
alias_type_to_string(type), name, a->file, a->line, a->column);
|
|
alias_put(a);
|
|
} else {
|
|
if (errno == ELOOP) {
|
|
sudoerserrorf(U_("cycle in %s \"%s\""),
|
|
alias_type_to_string(type), name);
|
|
} else {
|
|
sudoerserrorf(U_("duplicate %s \"%s\""),
|
|
alias_type_to_string(type), name);
|
|
}
|
|
}
|
|
} else {
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
}
|
|
}
|
|
|
|
static struct defaults *
|
|
new_default(char *var, char *val, short op)
|
|
{
|
|
struct defaults *d;
|
|
debug_decl(new_default, SUDOERS_DEBUG_PARSER);
|
|
|
|
if ((d = calloc(1, sizeof(struct defaults))) == NULL) {
|
|
sudo_debug_printf(SUDO_DEBUG_ERROR|SUDO_DEBUG_LINENO,
|
|
"unable to allocate memory");
|
|
debug_return_ptr(NULL);
|
|
}
|
|
|
|
d->var = var;
|
|
d->val = val;
|
|
/* d->type = 0; */
|
|
d->op = op;
|
|
/* d->binding = NULL; */
|
|
d->line = this_lineno;
|
|
d->column = (int)(sudolinebuf.toke_start + 1);
|
|
d->file = sudo_rcstr_addref(sudoers);
|
|
HLTQ_INIT(d, entries);
|
|
|
|
debug_return_ptr(d);
|
|
}
|
|
|
|
static struct member *
|
|
new_member(char *name, short type)
|
|
{
|
|
struct member *m;
|
|
debug_decl(new_member, SUDOERS_DEBUG_PARSER);
|
|
|
|
if ((m = calloc(1, sizeof(struct member))) == NULL) {
|
|
sudo_debug_printf(SUDO_DEBUG_ERROR|SUDO_DEBUG_LINENO,
|
|
"unable to allocate memory");
|
|
debug_return_ptr(NULL);
|
|
}
|
|
|
|
m->name = name;
|
|
m->type = type;
|
|
HLTQ_INIT(m, entries);
|
|
|
|
debug_return_ptr(m);
|
|
}
|
|
|
|
static struct sudo_command *
|
|
new_command(char *cmnd, char *args)
|
|
{
|
|
struct sudo_command *c;
|
|
debug_decl(new_command, SUDOERS_DEBUG_PARSER);
|
|
|
|
if ((c = calloc(1, sizeof(*c))) == NULL) {
|
|
sudo_debug_printf(SUDO_DEBUG_ERROR|SUDO_DEBUG_LINENO,
|
|
"unable to allocate memory");
|
|
debug_return_ptr(NULL);
|
|
}
|
|
/* garbage collected as part of struct member */
|
|
|
|
c->cmnd = cmnd;
|
|
c->args = args;
|
|
TAILQ_INIT(&c->digests);
|
|
|
|
debug_return_ptr(c);
|
|
}
|
|
|
|
static struct command_digest *
|
|
new_digest(unsigned int digest_type, char *digest_str)
|
|
{
|
|
struct command_digest *digest;
|
|
debug_decl(new_digest, SUDOERS_DEBUG_PARSER);
|
|
|
|
if ((digest = malloc(sizeof(*digest))) == NULL) {
|
|
sudo_debug_printf(SUDO_DEBUG_ERROR|SUDO_DEBUG_LINENO,
|
|
"unable to allocate memory");
|
|
debug_return_ptr(NULL);
|
|
}
|
|
|
|
HLTQ_INIT(digest, entries);
|
|
digest->digest_type = digest_type;
|
|
digest->digest_str = digest_str;
|
|
if (digest->digest_str == NULL) {
|
|
sudo_debug_printf(SUDO_DEBUG_ERROR|SUDO_DEBUG_LINENO,
|
|
"unable to allocate memory");
|
|
free(digest);
|
|
digest = NULL;
|
|
}
|
|
|
|
debug_return_ptr(digest);
|
|
}
|
|
|
|
static void
|
|
free_defaults_binding(struct defaults_binding *binding)
|
|
{
|
|
debug_decl(free_defaults_binding, SUDOERS_DEBUG_PARSER);
|
|
|
|
/* Bindings may be shared among multiple Defaults entries. */
|
|
if (binding != NULL) {
|
|
if (--binding->refcnt == 0) {
|
|
free_members(&binding->members);
|
|
free(binding);
|
|
}
|
|
}
|
|
|
|
debug_return;
|
|
}
|
|
|
|
/*
|
|
* Add a list of defaults structures to the defaults list.
|
|
* The bmem argument, if non-NULL, specifies a list of hosts, users,
|
|
* or runas users the entries apply to (determined by the type).
|
|
*/
|
|
static bool
|
|
add_defaults(short type, struct member *bmem, struct defaults *defs)
|
|
{
|
|
struct defaults *d, *next;
|
|
struct defaults_binding *binding;
|
|
bool ret = true;
|
|
debug_decl(add_defaults, SUDOERS_DEBUG_PARSER);
|
|
|
|
if (defs == NULL)
|
|
debug_return_bool(false);
|
|
|
|
/*
|
|
* We use a single binding for each entry in defs.
|
|
*/
|
|
if ((binding = malloc(sizeof(*binding))) == NULL) {
|
|
sudo_debug_printf(SUDO_DEBUG_ERROR|SUDO_DEBUG_LINENO,
|
|
"unable to allocate memory");
|
|
sudoerserror(N_("unable to allocate memory"));
|
|
debug_return_bool(false);
|
|
}
|
|
if (bmem != NULL) {
|
|
parser_leak_remove(LEAK_MEMBER, bmem);
|
|
HLTQ_TO_TAILQ(&binding->members, bmem, entries);
|
|
} else {
|
|
TAILQ_INIT(&binding->members);
|
|
}
|
|
binding->refcnt = 0;
|
|
|
|
/*
|
|
* Set type and binding (who it applies to) for new entries.
|
|
* Then add to the global defaults list.
|
|
*/
|
|
parser_leak_remove(LEAK_DEFAULTS, defs);
|
|
HLTQ_FOREACH_SAFE(d, defs, entries, next) {
|
|
d->type = type;
|
|
d->binding = binding;
|
|
binding->refcnt++;
|
|
TAILQ_INSERT_TAIL(&parsed_policy.defaults, d, entries);
|
|
}
|
|
|
|
debug_return_bool(ret);
|
|
}
|
|
|
|
/*
|
|
* Allocate a new struct userspec, populate it, and insert it at the
|
|
* end of the userspecs list.
|
|
*/
|
|
static bool
|
|
add_userspec(struct member *members, struct privilege *privs)
|
|
{
|
|
struct userspec *u;
|
|
debug_decl(add_userspec, SUDOERS_DEBUG_PARSER);
|
|
|
|
if ((u = calloc(1, sizeof(*u))) == NULL) {
|
|
sudo_debug_printf(SUDO_DEBUG_ERROR|SUDO_DEBUG_LINENO,
|
|
"unable to allocate memory");
|
|
debug_return_bool(false);
|
|
}
|
|
/* We already parsed the newline so sudolineno is off by one. */
|
|
u->line = sudolineno - 1;
|
|
u->column = (int)(sudolinebuf.toke_start + 1);
|
|
u->file = sudo_rcstr_addref(sudoers);
|
|
parser_leak_remove(LEAK_MEMBER, members);
|
|
HLTQ_TO_TAILQ(&u->users, members, entries);
|
|
parser_leak_remove(LEAK_PRIVILEGE, privs);
|
|
HLTQ_TO_TAILQ(&u->privileges, privs, entries);
|
|
STAILQ_INIT(&u->comments);
|
|
TAILQ_INSERT_TAIL(&parsed_policy.userspecs, u, entries);
|
|
|
|
debug_return_bool(true);
|
|
}
|
|
|
|
/*
|
|
* Free a member struct and its contents.
|
|
*/
|
|
void
|
|
free_member(struct member *m)
|
|
{
|
|
debug_decl(free_member, SUDOERS_DEBUG_PARSER);
|
|
|
|
if (m->type == COMMAND || (m->type == ALL && m->name != NULL)) {
|
|
struct command_digest *digest;
|
|
struct sudo_command *c = (struct sudo_command *)m->name;
|
|
free(c->cmnd);
|
|
free(c->args);
|
|
while ((digest = TAILQ_FIRST(&c->digests)) != NULL) {
|
|
TAILQ_REMOVE(&c->digests, digest, entries);
|
|
free(digest->digest_str);
|
|
free(digest);
|
|
}
|
|
}
|
|
free(m->name);
|
|
free(m);
|
|
|
|
debug_return;
|
|
}
|
|
|
|
/*
|
|
* Free a tailq of members but not the struct member_list container itself.
|
|
*/
|
|
void
|
|
free_members(struct member_list *members)
|
|
{
|
|
struct member *m;
|
|
debug_decl(free_members, SUDOERS_DEBUG_PARSER);
|
|
|
|
while ((m = TAILQ_FIRST(members)) != NULL) {
|
|
TAILQ_REMOVE(members, m, entries);
|
|
free_member(m);
|
|
}
|
|
|
|
debug_return;
|
|
}
|
|
|
|
void
|
|
free_defaults(struct defaults_list *defs)
|
|
{
|
|
struct defaults *def;
|
|
debug_decl(free_defaults, SUDOERS_DEBUG_PARSER);
|
|
|
|
while ((def = TAILQ_FIRST(defs)) != NULL) {
|
|
TAILQ_REMOVE(defs, def, entries);
|
|
free_default(def);
|
|
}
|
|
|
|
debug_return;
|
|
}
|
|
|
|
void
|
|
free_default(struct defaults *def)
|
|
{
|
|
debug_decl(free_default, SUDOERS_DEBUG_PARSER);
|
|
|
|
free_defaults_binding(def->binding);
|
|
sudo_rcstr_delref(def->file);
|
|
free(def->var);
|
|
free(def->val);
|
|
free(def);
|
|
|
|
debug_return;
|
|
}
|
|
|
|
void
|
|
free_cmndspec(struct cmndspec *cs, struct cmndspec_list *csl)
|
|
{
|
|
struct cmndspec *prev, *next;
|
|
debug_decl(free_cmndspec, SUDOERS_DEBUG_PARSER);
|
|
|
|
prev = TAILQ_PREV(cs, cmndspec_list, entries);
|
|
next = TAILQ_NEXT(cs, entries);
|
|
TAILQ_REMOVE(csl, cs, entries);
|
|
|
|
/* Don't free runcwd/runchroot that are in use by other entries. */
|
|
if ((prev == NULL || cs->runcwd != prev->runcwd) &&
|
|
(next == NULL || cs->runcwd != next->runcwd)) {
|
|
free(cs->runcwd);
|
|
}
|
|
if ((prev == NULL || cs->runchroot != prev->runchroot) &&
|
|
(next == NULL || cs->runchroot != next->runchroot)) {
|
|
free(cs->runchroot);
|
|
}
|
|
/* Don't free root/type that are in use by other entries. */
|
|
if ((prev == NULL || cs->role != prev->role) &&
|
|
(next == NULL || cs->role != next->role)) {
|
|
free(cs->role);
|
|
}
|
|
if ((prev == NULL || cs->type != prev->type) &&
|
|
(next == NULL || cs->type != next->type)) {
|
|
free(cs->type);
|
|
}
|
|
/* Don't free apparmor_profile that is in use by other entries. */
|
|
if ((prev == NULL || cs->apparmor_profile != prev->apparmor_profile) &&
|
|
(next == NULL || cs->apparmor_profile != next->apparmor_profile)) {
|
|
free(cs->apparmor_profile);
|
|
}
|
|
/* Don't free privs/limitprivs that are in use by other entries. */
|
|
if ((prev == NULL || cs->privs != prev->privs) &&
|
|
(next == NULL || cs->privs != next->privs)) {
|
|
free(cs->privs);
|
|
}
|
|
if ((prev == NULL || cs->limitprivs != prev->limitprivs) &&
|
|
(next == NULL || cs->limitprivs != next->limitprivs)) {
|
|
free(cs->limitprivs);
|
|
}
|
|
/* Don't free user/group lists that are in use by other entries. */
|
|
if (cs->runasuserlist != NULL) {
|
|
if ((prev == NULL || cs->runasuserlist != prev->runasuserlist) &&
|
|
(next == NULL || cs->runasuserlist != next->runasuserlist)) {
|
|
free_members(cs->runasuserlist);
|
|
free(cs->runasuserlist);
|
|
}
|
|
}
|
|
if (cs->runasgrouplist != NULL) {
|
|
if ((prev == NULL || cs->runasgrouplist != prev->runasgrouplist) &&
|
|
(next == NULL || cs->runasgrouplist != next->runasgrouplist)) {
|
|
free_members(cs->runasgrouplist);
|
|
free(cs->runasgrouplist);
|
|
}
|
|
}
|
|
free_member(cs->cmnd);
|
|
free(cs);
|
|
|
|
debug_return;
|
|
}
|
|
|
|
void
|
|
free_cmndspecs(struct cmndspec_list *csl)
|
|
{
|
|
struct member_list *runasuserlist = NULL, *runasgrouplist = NULL;
|
|
char *runcwd = NULL, *runchroot = NULL;
|
|
char *role = NULL, *type = NULL;
|
|
char *apparmor_profile = NULL;
|
|
char *privs = NULL, *limitprivs = NULL;
|
|
struct cmndspec *cs;
|
|
debug_decl(free_cmndspecs, SUDOERS_DEBUG_PARSER);
|
|
|
|
while ((cs = TAILQ_FIRST(csl)) != NULL) {
|
|
TAILQ_REMOVE(csl, cs, entries);
|
|
|
|
/* Only free the first instance of runcwd/runchroot. */
|
|
if (cs->runcwd != runcwd) {
|
|
runcwd = cs->runcwd;
|
|
free(cs->runcwd);
|
|
}
|
|
if (cs->runchroot != runchroot) {
|
|
runchroot = cs->runchroot;
|
|
free(cs->runchroot);
|
|
}
|
|
/* Only free the first instance of a role/type. */
|
|
if (cs->role != role) {
|
|
role = cs->role;
|
|
free(cs->role);
|
|
}
|
|
if (cs->type != type) {
|
|
type = cs->type;
|
|
free(cs->type);
|
|
}
|
|
/* Only free the first instance of apparmor_profile. */
|
|
if (cs->apparmor_profile != apparmor_profile) {
|
|
apparmor_profile = cs->apparmor_profile;
|
|
free(cs->apparmor_profile);
|
|
}
|
|
/* Only free the first instance of privs/limitprivs. */
|
|
if (cs->privs != privs) {
|
|
privs = cs->privs;
|
|
free(cs->privs);
|
|
}
|
|
if (cs->limitprivs != limitprivs) {
|
|
limitprivs = cs->limitprivs;
|
|
free(cs->limitprivs);
|
|
}
|
|
/* Only free the first instance of runas user/group lists. */
|
|
if (cs->runasuserlist && cs->runasuserlist != runasuserlist) {
|
|
runasuserlist = cs->runasuserlist;
|
|
free_members(runasuserlist);
|
|
free(runasuserlist);
|
|
}
|
|
if (cs->runasgrouplist && cs->runasgrouplist != runasgrouplist) {
|
|
runasgrouplist = cs->runasgrouplist;
|
|
free_members(runasgrouplist);
|
|
free(runasgrouplist);
|
|
}
|
|
free_member(cs->cmnd);
|
|
free(cs);
|
|
}
|
|
|
|
debug_return;
|
|
}
|
|
|
|
void
|
|
free_privilege(struct privilege *priv)
|
|
{
|
|
struct defaults *def;
|
|
debug_decl(free_privilege, SUDOERS_DEBUG_PARSER);
|
|
|
|
free(priv->ldap_role);
|
|
free_members(&priv->hostlist);
|
|
free_cmndspecs(&priv->cmndlist);
|
|
while ((def = TAILQ_FIRST(&priv->defaults)) != NULL) {
|
|
TAILQ_REMOVE(&priv->defaults, def, entries);
|
|
free_default(def);
|
|
}
|
|
free(priv);
|
|
|
|
debug_return;
|
|
}
|
|
|
|
void
|
|
free_userspecs(struct userspec_list *usl)
|
|
{
|
|
struct userspec *us;
|
|
debug_decl(free_userspecs, SUDOERS_DEBUG_PARSER);
|
|
|
|
while ((us = TAILQ_FIRST(usl)) != NULL) {
|
|
TAILQ_REMOVE(usl, us, entries);
|
|
free_userspec(us);
|
|
}
|
|
|
|
debug_return;
|
|
}
|
|
|
|
void
|
|
free_userspec(struct userspec *us)
|
|
{
|
|
struct privilege *priv;
|
|
struct sudoers_comment *comment;
|
|
debug_decl(free_userspec, SUDOERS_DEBUG_PARSER);
|
|
|
|
free_members(&us->users);
|
|
while ((priv = TAILQ_FIRST(&us->privileges)) != NULL) {
|
|
TAILQ_REMOVE(&us->privileges, priv, entries);
|
|
free_privilege(priv);
|
|
}
|
|
while ((comment = STAILQ_FIRST(&us->comments)) != NULL) {
|
|
STAILQ_REMOVE_HEAD(&us->comments, entries);
|
|
free(comment->str);
|
|
free(comment);
|
|
}
|
|
sudo_rcstr_delref(us->file);
|
|
free(us);
|
|
|
|
debug_return;
|
|
}
|
|
|
|
/*
|
|
* Initialized a sudoers parse tree.
|
|
* Takes ownership of lhost and shost.
|
|
*/
|
|
void
|
|
init_parse_tree(struct sudoers_parse_tree *parse_tree, char *lhost, char *shost,
|
|
struct sudoers_context *ctx, struct sudo_nss *nss)
|
|
{
|
|
TAILQ_INIT(&parse_tree->userspecs);
|
|
TAILQ_INIT(&parse_tree->defaults);
|
|
parse_tree->aliases = NULL;
|
|
parse_tree->shost = shost;
|
|
parse_tree->lhost = lhost;
|
|
parse_tree->ctx = ctx;
|
|
parse_tree->nss = nss;
|
|
}
|
|
|
|
/*
|
|
* Move the contents of parsed_policy to new_tree.
|
|
*/
|
|
void
|
|
reparent_parse_tree(struct sudoers_parse_tree *new_tree)
|
|
{
|
|
TAILQ_CONCAT(&new_tree->userspecs, &parsed_policy.userspecs, entries);
|
|
TAILQ_CONCAT(&new_tree->defaults, &parsed_policy.defaults, entries);
|
|
new_tree->aliases = parsed_policy.aliases;
|
|
parsed_policy.aliases = NULL;
|
|
}
|
|
|
|
/*
|
|
* Free the contents of a sudoers parse tree and initialize it.
|
|
*/
|
|
void
|
|
free_parse_tree(struct sudoers_parse_tree *parse_tree)
|
|
{
|
|
free_userspecs(&parse_tree->userspecs);
|
|
free_defaults(&parse_tree->defaults);
|
|
free_aliases(parse_tree->aliases);
|
|
parse_tree->aliases = NULL;
|
|
free(parse_tree->lhost);
|
|
if (parse_tree->shost != parse_tree->lhost)
|
|
free(parse_tree->shost);
|
|
parse_tree->lhost = parse_tree->shost = NULL;
|
|
parse_tree->nss = NULL;
|
|
parse_tree->ctx = NULL;
|
|
}
|
|
|
|
/*
|
|
* Free up space used by data structures from a previous parser run and sets
|
|
* the current sudoers file to path.
|
|
*/
|
|
bool
|
|
init_parser(struct sudoers_context *ctx, const char *file)
|
|
{
|
|
bool ret = true;
|
|
debug_decl(init_parser, SUDOERS_DEBUG_PARSER);
|
|
|
|
free_parse_tree(&parsed_policy);
|
|
parsed_policy.ctx = ctx;
|
|
parser_leak_init();
|
|
init_lexer();
|
|
parse_error = false;
|
|
|
|
if (ctx != NULL) {
|
|
parser_conf = ctx->parser_conf;
|
|
} else {
|
|
const struct sudoers_parser_config def_conf =
|
|
SUDOERS_PARSER_CONFIG_INITIALIZER;
|
|
parser_conf = def_conf;
|
|
}
|
|
|
|
sudo_rcstr_delref(sudoers);
|
|
if (file != NULL) {
|
|
if ((sudoers = sudo_rcstr_dup(file)) == NULL) {
|
|
sudo_warnx(U_("%s: %s"), __func__, U_("unable to allocate memory"));
|
|
ret = false;
|
|
}
|
|
} else {
|
|
sudoers = NULL;
|
|
}
|
|
|
|
sudo_rcstr_delref(sudoers_search_path);
|
|
if (parser_conf.sudoers_path != NULL) {
|
|
sudoers_search_path = sudo_rcstr_dup(parser_conf.sudoers_path);
|
|
if (sudoers_search_path == NULL) {
|
|
sudo_warnx(U_("%s: %s"), __func__, U_("unable to allocate memory"));
|
|
ret = false;
|
|
}
|
|
} else {
|
|
sudoers_search_path = NULL;
|
|
}
|
|
|
|
debug_return_bool(ret);
|
|
}
|
|
|
|
bool
|
|
reset_parser(void)
|
|
{
|
|
return init_parser(NULL, NULL);
|
|
}
|
|
|
|
/*
|
|
* Initialize all options in a cmndspec.
|
|
*/
|
|
static void
|
|
init_options(struct command_options *opts)
|
|
{
|
|
opts->notbefore = UNSPEC;
|
|
opts->notafter = UNSPEC;
|
|
opts->timeout = UNSPEC;
|
|
opts->runchroot = NULL;
|
|
opts->runcwd = NULL;
|
|
opts->role = NULL;
|
|
opts->type = NULL;
|
|
opts->apparmor_profile = NULL;
|
|
opts->privs = NULL;
|
|
opts->limitprivs = NULL;
|
|
}
|
|
|
|
/*
|
|
* Propagate inheritable settings and tags from prev to cs.
|
|
*/
|
|
static void
|
|
propagate_cmndspec(struct cmndspec *cs, const struct cmndspec *prev)
|
|
{
|
|
/* propagate runcwd and runchroot */
|
|
if (cs->runcwd == NULL)
|
|
cs->runcwd = prev->runcwd;
|
|
if (cs->runchroot == NULL)
|
|
cs->runchroot = prev->runchroot;
|
|
/* propagate role and type */
|
|
if (cs->role == NULL && cs->type == NULL) {
|
|
cs->role = prev->role;
|
|
cs->type = prev->type;
|
|
}
|
|
/* propagate apparmor_profile */
|
|
if (cs->apparmor_profile == NULL)
|
|
cs->apparmor_profile = prev->apparmor_profile;
|
|
/* propagate privs & limitprivs */
|
|
if (cs->privs == NULL && cs->limitprivs == NULL) {
|
|
cs->privs = prev->privs;
|
|
cs->limitprivs = prev->limitprivs;
|
|
}
|
|
/* propagate command time restrictions */
|
|
if (cs->notbefore == UNSPEC)
|
|
cs->notbefore = prev->notbefore;
|
|
if (cs->notafter == UNSPEC)
|
|
cs->notafter = prev->notafter;
|
|
/* propagate command timeout */
|
|
if (cs->timeout == UNSPEC)
|
|
cs->timeout = prev->timeout;
|
|
/* propagate tags and runas list */
|
|
if (cs->tags.nopasswd == UNSPEC)
|
|
cs->tags.nopasswd = prev->tags.nopasswd;
|
|
if (cs->tags.noexec == UNSPEC)
|
|
cs->tags.noexec = prev->tags.noexec;
|
|
if (cs->tags.intercept == UNSPEC)
|
|
cs->tags.intercept = prev->tags.intercept;
|
|
/* Need to handle IMPLIED setting for SETENV tag specially. */
|
|
if (!TAG_SET(cs->tags.setenv) && TAG_SET(prev->tags.setenv))
|
|
cs->tags.setenv = prev->tags.setenv;
|
|
if (cs->tags.log_input == UNSPEC)
|
|
cs->tags.log_input = prev->tags.log_input;
|
|
if (cs->tags.log_output == UNSPEC)
|
|
cs->tags.log_output = prev->tags.log_output;
|
|
if (cs->tags.send_mail == UNSPEC)
|
|
cs->tags.send_mail = prev->tags.send_mail;
|
|
if (cs->tags.follow == UNSPEC)
|
|
cs->tags.follow = prev->tags.follow;
|
|
if ((cs->runasuserlist == NULL &&
|
|
cs->runasgrouplist == NULL) &&
|
|
(prev->runasuserlist != NULL ||
|
|
prev->runasgrouplist != NULL)) {
|
|
cs->runasuserlist = prev->runasuserlist;
|
|
cs->runasgrouplist = prev->runasgrouplist;
|
|
}
|
|
}
|
|
|
|
uid_t
|
|
sudoers_file_uid(void)
|
|
{
|
|
return parser_conf.sudoers_uid;
|
|
}
|
|
|
|
gid_t
|
|
sudoers_file_gid(void)
|
|
{
|
|
return parser_conf.sudoers_gid;
|
|
}
|
|
|
|
mode_t
|
|
sudoers_file_mode(void)
|
|
{
|
|
return parser_conf.sudoers_mode;
|
|
}
|
|
|
|
bool
|
|
sudoers_error_recovery(void)
|
|
{
|
|
return parser_conf.recovery;
|
|
}
|
|
|
|
bool
|
|
sudoers_strict(void)
|
|
{
|
|
return parser_conf.strict;
|
|
}
|
|
|
|
bool
|
|
parser_leak_add(enum parser_leak_types type, void *v)
|
|
{
|
|
#ifdef NO_LEAKS
|
|
struct parser_leak_entry *entry;
|
|
debug_decl(parser_leak_add, SUDOERS_DEBUG_PARSER);
|
|
|
|
if (v == NULL)
|
|
debug_return_bool(false);
|
|
|
|
entry = calloc(1, sizeof(*entry));
|
|
if (entry == NULL) {
|
|
sudo_warnx(U_("%s: %s"), __func__, U_("unable to allocate memory"));
|
|
debug_return_bool(false);
|
|
}
|
|
switch (type) {
|
|
case LEAK_PRIVILEGE:
|
|
entry->u.p = v;
|
|
break;
|
|
case LEAK_CMNDSPEC:
|
|
entry->u.cs = v;
|
|
break;
|
|
case LEAK_DEFAULTS:
|
|
entry->u.d = v;
|
|
break;
|
|
case LEAK_MEMBER:
|
|
entry->u.m = v;
|
|
break;
|
|
case LEAK_DIGEST:
|
|
entry->u.dig = v;
|
|
break;
|
|
case LEAK_RUNAS:
|
|
entry->u.rc = v;
|
|
break;
|
|
case LEAK_PTR:
|
|
entry->u.ptr = v;
|
|
break;
|
|
default:
|
|
free(entry);
|
|
sudo_warnx("unexpected leak type %d", type);
|
|
debug_return_bool(false);
|
|
}
|
|
entry->type = type;
|
|
SLIST_INSERT_HEAD(&parser_leak_list, entry, entries);
|
|
debug_return_bool(true);
|
|
#else
|
|
return true;
|
|
#endif /* NO_LEAKS */
|
|
}
|
|
|
|
bool
|
|
parser_leak_remove(enum parser_leak_types type, void *v)
|
|
{
|
|
#ifdef NO_LEAKS
|
|
struct parser_leak_entry *entry, *prev = NULL;
|
|
debug_decl(parser_leak_remove, SUDOERS_DEBUG_PARSER);
|
|
|
|
if (v == NULL)
|
|
debug_return_bool(false);
|
|
|
|
SLIST_FOREACH(entry, &parser_leak_list, entries) {
|
|
switch (entry->type) {
|
|
case LEAK_PRIVILEGE:
|
|
if (entry->u.p == v)
|
|
goto found;
|
|
break;
|
|
case LEAK_CMNDSPEC:
|
|
if (entry->u.cs == v)
|
|
goto found;
|
|
break;
|
|
case LEAK_DEFAULTS:
|
|
if (entry->u.d == v)
|
|
goto found;
|
|
break;
|
|
case LEAK_MEMBER:
|
|
if (entry->u.m == v)
|
|
goto found;
|
|
break;
|
|
case LEAK_DIGEST:
|
|
if (entry->u.dig == v)
|
|
goto found;
|
|
break;
|
|
case LEAK_RUNAS:
|
|
if (entry->u.rc == v)
|
|
goto found;
|
|
break;
|
|
case LEAK_PTR:
|
|
if (entry->u.ptr == v)
|
|
goto found;
|
|
break;
|
|
default:
|
|
sudo_warnx("unexpected leak type %d in %p", entry->type, entry);
|
|
}
|
|
prev = entry;
|
|
}
|
|
/* If this happens, there is a bug in the leak tracking code. */
|
|
sudo_warnx("%s: unable to find %p, type %d", __func__, v, type);
|
|
debug_return_bool(false);
|
|
found:
|
|
if (prev == NULL)
|
|
SLIST_REMOVE_HEAD(&parser_leak_list, entries);
|
|
else
|
|
SLIST_REMOVE_AFTER(prev, entries);
|
|
free(entry);
|
|
debug_return_bool(true);
|
|
#else
|
|
return true;
|
|
#endif /* NO_LEAKS */
|
|
}
|
|
|
|
#ifdef NO_LEAKS
|
|
static void
|
|
parser_leak_free(void)
|
|
{
|
|
struct parser_leak_entry *entry;
|
|
void *next;
|
|
debug_decl(parser_leak_run, SUDOERS_DEBUG_PARSER);
|
|
|
|
/* Free the leaks. */
|
|
while ((entry = SLIST_FIRST(&parser_leak_list))) {
|
|
SLIST_REMOVE_HEAD(&parser_leak_list, entries);
|
|
switch (entry->type) {
|
|
case LEAK_PRIVILEGE:
|
|
{
|
|
struct privilege *priv;
|
|
|
|
HLTQ_FOREACH_SAFE(priv, entry->u.p, entries, next)
|
|
free_privilege(priv);
|
|
free(entry);
|
|
}
|
|
break;
|
|
case LEAK_CMNDSPEC:
|
|
{
|
|
struct cmndspec_list specs;
|
|
|
|
HLTQ_TO_TAILQ(&specs, entry->u.cs, entries);
|
|
free_cmndspecs(&specs);
|
|
free(entry);
|
|
}
|
|
break;
|
|
case LEAK_DEFAULTS:
|
|
{
|
|
struct defaults_list defs;
|
|
|
|
HLTQ_TO_TAILQ(&defs, entry->u.d, entries);
|
|
free_defaults(&defs);
|
|
free(entry);
|
|
}
|
|
break;
|
|
case LEAK_MEMBER:
|
|
{
|
|
struct member *m;
|
|
|
|
HLTQ_FOREACH_SAFE(m, entry->u.m, entries, next)
|
|
free_member(m);
|
|
free(entry);
|
|
}
|
|
break;
|
|
case LEAK_DIGEST:
|
|
{
|
|
struct command_digest *dig;
|
|
|
|
HLTQ_FOREACH_SAFE(dig, entry->u.dig, entries, next) {
|
|
free(dig->digest_str);
|
|
free(dig);
|
|
}
|
|
free(entry);
|
|
}
|
|
break;
|
|
case LEAK_RUNAS:
|
|
{
|
|
struct member *m;
|
|
|
|
if (entry->u.rc->runasusers != NULL) {
|
|
HLTQ_FOREACH_SAFE(m, entry->u.rc->runasusers, entries, next)
|
|
free_member(m);
|
|
}
|
|
if (entry->u.rc->runasgroups != NULL) {
|
|
HLTQ_FOREACH_SAFE(m, entry->u.rc->runasgroups, entries, next)
|
|
free_member(m);
|
|
}
|
|
free(entry->u.rc);
|
|
free(entry);
|
|
break;
|
|
}
|
|
case LEAK_PTR:
|
|
free(entry->u.ptr);
|
|
free(entry);
|
|
break;
|
|
default:
|
|
sudo_warnx("unexpected garbage type %d", entry->type);
|
|
}
|
|
}
|
|
|
|
debug_return;
|
|
}
|
|
#endif /* NO_LEAKS */
|
|
|
|
void
|
|
parser_leak_init(void)
|
|
{
|
|
#ifdef NO_LEAKS
|
|
static bool initialized;
|
|
debug_decl(parser_leak_init, SUDOERS_DEBUG_PARSER);
|
|
|
|
if (!initialized) {
|
|
atexit(parser_leak_free);
|
|
initialized = true;
|
|
debug_return;
|
|
}
|
|
|
|
/* Already initialized, free existing leaks. */
|
|
parser_leak_free();
|
|
debug_return;
|
|
#endif /* NO_LEAKS */
|
|
}
|