Deleted Added
full compact
parse.y (263720) parse.y (263722)
1%{
2/*-
3 * Copyright (c) 2012 The FreeBSD Foundation
4 * All rights reserved.
5 *
6 * This software was developed by Edward Tomasz Napierala under sponsorship
7 * from the FreeBSD Foundation.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
19 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
22 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 * SUCH DAMAGE.
29 *
1%{
2/*-
3 * Copyright (c) 2012 The FreeBSD Foundation
4 * All rights reserved.
5 *
6 * This software was developed by Edward Tomasz Napierala under sponsorship
7 * from the FreeBSD Foundation.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
19 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
22 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 * SUCH DAMAGE.
29 *
30 * $FreeBSD: stable/10/usr.sbin/ctld/parse.y 263720 2014-03-25 12:01:55Z trasz $
30 * $FreeBSD: stable/10/usr.sbin/ctld/parse.y 263722 2014-03-25 12:08:35Z trasz $
31 */
32
33#include <sys/queue.h>
34#include <sys/types.h>
35#include <sys/stat.h>
36#include <assert.h>
37#include <stdio.h>
38#include <stdint.h>
39#include <stdlib.h>
40#include <string.h>
41
42#include "ctld.h"
43
44extern FILE *yyin;
45extern char *yytext;
46extern int lineno;
47
48static struct conf *conf = NULL;
49static struct auth_group *auth_group = NULL;
50static struct portal_group *portal_group = NULL;
51static struct target *target = NULL;
52static struct lun *lun = NULL;
53
54extern void yyerror(const char *);
55extern int yylex(void);
56extern void yyrestart(FILE *);
57
58%}
59
60%token ALIAS AUTH_GROUP BACKEND BLOCKSIZE CHAP CHAP_MUTUAL CLOSING_BRACKET
61%token DEBUG DEVICE_ID DISCOVERY_AUTH_GROUP INITIATOR_NAME INITIATOR_PORTAL
62%token LISTEN LISTEN_ISER LUN MAXPROC NUM OPENING_BRACKET OPTION PATH PIDFILE
63%token PORTAL_GROUP SERIAL SIZE STR TARGET TIMEOUT
64
65%union
66{
67 uint64_t num;
68 char *str;
69}
70
71%token <num> NUM
72%token <str> STR
73
74%%
75
76statements:
77 |
78 statements statement
79 ;
80
81statement:
31 */
32
33#include <sys/queue.h>
34#include <sys/types.h>
35#include <sys/stat.h>
36#include <assert.h>
37#include <stdio.h>
38#include <stdint.h>
39#include <stdlib.h>
40#include <string.h>
41
42#include "ctld.h"
43
44extern FILE *yyin;
45extern char *yytext;
46extern int lineno;
47
48static struct conf *conf = NULL;
49static struct auth_group *auth_group = NULL;
50static struct portal_group *portal_group = NULL;
51static struct target *target = NULL;
52static struct lun *lun = NULL;
53
54extern void yyerror(const char *);
55extern int yylex(void);
56extern void yyrestart(FILE *);
57
58%}
59
60%token ALIAS AUTH_GROUP BACKEND BLOCKSIZE CHAP CHAP_MUTUAL CLOSING_BRACKET
61%token DEBUG DEVICE_ID DISCOVERY_AUTH_GROUP INITIATOR_NAME INITIATOR_PORTAL
62%token LISTEN LISTEN_ISER LUN MAXPROC NUM OPENING_BRACKET OPTION PATH PIDFILE
63%token PORTAL_GROUP SERIAL SIZE STR TARGET TIMEOUT
64
65%union
66{
67 uint64_t num;
68 char *str;
69}
70
71%token <num> NUM
72%token <str> STR
73
74%%
75
76statements:
77 |
78 statements statement
79 ;
80
81statement:
82 debug_statement
82 debug
83 |
83 |
84 timeout_statement
84 timeout
85 |
85 |
86 maxproc_statement
86 maxproc
87 |
87 |
88 pidfile_statement
88 pidfile
89 |
89 |
90 auth_group_definition
90 auth_group
91 |
91 |
92 portal_group_definition
92 portal_group
93 |
93 |
94 target_statement
94 target
95 ;
96
95 ;
96
97debug_statement: DEBUG NUM
97debug: DEBUG NUM
98 {
99 conf->conf_debug = $2;
100 }
101 ;
102
98 {
99 conf->conf_debug = $2;
100 }
101 ;
102
103timeout_statement: TIMEOUT NUM
103timeout: TIMEOUT NUM
104 {
105 conf->conf_timeout = $2;
106 }
107 ;
108
104 {
105 conf->conf_timeout = $2;
106 }
107 ;
108
109maxproc_statement: MAXPROC NUM
109maxproc: MAXPROC NUM
110 {
111 conf->conf_maxproc = $2;
112 }
113 ;
114
110 {
111 conf->conf_maxproc = $2;
112 }
113 ;
114
115pidfile_statement: PIDFILE STR
115pidfile: PIDFILE STR
116 {
117 if (conf->conf_pidfile_path != NULL) {
118 log_warnx("pidfile specified more than once");
119 free($2);
120 return (1);
121 }
122 conf->conf_pidfile_path = $2;
123 }
124 ;
125
116 {
117 if (conf->conf_pidfile_path != NULL) {
118 log_warnx("pidfile specified more than once");
119 free($2);
120 return (1);
121 }
122 conf->conf_pidfile_path = $2;
123 }
124 ;
125
126auth_group_definition: AUTH_GROUP auth_group_name
126auth_group: AUTH_GROUP auth_group_name
127 OPENING_BRACKET auth_group_entries CLOSING_BRACKET
128 {
129 auth_group = NULL;
130 }
131 ;
132
133auth_group_name: STR
134 {
135 auth_group = auth_group_new(conf, $1);
136 free($1);
137 if (auth_group == NULL)
138 return (1);
139 }
140 ;
141
142auth_group_entries:
143 |
144 auth_group_entries auth_group_entry
145 ;
146
147auth_group_entry:
148 auth_group_chap
149 |
150 auth_group_chap_mutual
151 |
152 auth_group_initiator_name
153 |
154 auth_group_initiator_portal
155 ;
156
157auth_group_chap: CHAP STR STR
158 {
159 const struct auth *ca;
160
161 ca = auth_new_chap(auth_group, $2, $3);
162 free($2);
163 free($3);
164 if (ca == NULL)
165 return (1);
166 }
167 ;
168
169auth_group_chap_mutual: CHAP_MUTUAL STR STR STR STR
170 {
171 const struct auth *ca;
172
173 ca = auth_new_chap_mutual(auth_group, $2, $3, $4, $5);
174 free($2);
175 free($3);
176 free($4);
177 free($5);
178 if (ca == NULL)
179 return (1);
180 }
181 ;
182
183auth_group_initiator_name: INITIATOR_NAME STR
184 {
185 const struct auth_name *an;
186
187 an = auth_name_new(auth_group, $2);
188 free($2);
189 if (an == NULL)
190 return (1);
191 }
192 ;
193
194auth_group_initiator_portal: INITIATOR_PORTAL STR
195 {
196 const struct auth_portal *ap;
197
198 ap = auth_portal_new(auth_group, $2);
199 free($2);
200 if (ap == NULL)
201 return (1);
202 }
203 ;
204
127 OPENING_BRACKET auth_group_entries CLOSING_BRACKET
128 {
129 auth_group = NULL;
130 }
131 ;
132
133auth_group_name: STR
134 {
135 auth_group = auth_group_new(conf, $1);
136 free($1);
137 if (auth_group == NULL)
138 return (1);
139 }
140 ;
141
142auth_group_entries:
143 |
144 auth_group_entries auth_group_entry
145 ;
146
147auth_group_entry:
148 auth_group_chap
149 |
150 auth_group_chap_mutual
151 |
152 auth_group_initiator_name
153 |
154 auth_group_initiator_portal
155 ;
156
157auth_group_chap: CHAP STR STR
158 {
159 const struct auth *ca;
160
161 ca = auth_new_chap(auth_group, $2, $3);
162 free($2);
163 free($3);
164 if (ca == NULL)
165 return (1);
166 }
167 ;
168
169auth_group_chap_mutual: CHAP_MUTUAL STR STR STR STR
170 {
171 const struct auth *ca;
172
173 ca = auth_new_chap_mutual(auth_group, $2, $3, $4, $5);
174 free($2);
175 free($3);
176 free($4);
177 free($5);
178 if (ca == NULL)
179 return (1);
180 }
181 ;
182
183auth_group_initiator_name: INITIATOR_NAME STR
184 {
185 const struct auth_name *an;
186
187 an = auth_name_new(auth_group, $2);
188 free($2);
189 if (an == NULL)
190 return (1);
191 }
192 ;
193
194auth_group_initiator_portal: INITIATOR_PORTAL STR
195 {
196 const struct auth_portal *ap;
197
198 ap = auth_portal_new(auth_group, $2);
199 free($2);
200 if (ap == NULL)
201 return (1);
202 }
203 ;
204
205portal_group_definition: PORTAL_GROUP portal_group_name
205portal_group: PORTAL_GROUP portal_group_name
206 OPENING_BRACKET portal_group_entries CLOSING_BRACKET
207 {
208 portal_group = NULL;
209 }
210 ;
211
212portal_group_name: STR
213 {
214 portal_group = portal_group_new(conf, $1);
215 free($1);
216 if (portal_group == NULL)
217 return (1);
218 }
219 ;
220
221portal_group_entries:
222 |
223 portal_group_entries portal_group_entry
224 ;
225
226portal_group_entry:
227 portal_group_discovery_auth_group
228 |
229 portal_group_listen
230 |
231 portal_group_listen_iser
232 ;
233
234portal_group_discovery_auth_group: DISCOVERY_AUTH_GROUP STR
235 {
236 if (portal_group->pg_discovery_auth_group != NULL) {
237 log_warnx("discovery-auth-group for portal-group "
238 "\"%s\" specified more than once",
239 portal_group->pg_name);
240 return (1);
241 }
242 portal_group->pg_discovery_auth_group =
243 auth_group_find(conf, $2);
244 if (portal_group->pg_discovery_auth_group == NULL) {
245 log_warnx("unknown discovery-auth-group \"%s\" "
246 "for portal-group \"%s\"",
247 $2, portal_group->pg_name);
248 return (1);
249 }
250 free($2);
251 }
252 ;
253
254portal_group_listen: LISTEN STR
255 {
256 int error;
257
258 error = portal_group_add_listen(portal_group, $2, false);
259 free($2);
260 if (error != 0)
261 return (1);
262 }
263 ;
264
265portal_group_listen_iser: LISTEN_ISER STR
266 {
267 int error;
268
269 error = portal_group_add_listen(portal_group, $2, true);
270 free($2);
271 if (error != 0)
272 return (1);
273 }
274 ;
275
206 OPENING_BRACKET portal_group_entries CLOSING_BRACKET
207 {
208 portal_group = NULL;
209 }
210 ;
211
212portal_group_name: STR
213 {
214 portal_group = portal_group_new(conf, $1);
215 free($1);
216 if (portal_group == NULL)
217 return (1);
218 }
219 ;
220
221portal_group_entries:
222 |
223 portal_group_entries portal_group_entry
224 ;
225
226portal_group_entry:
227 portal_group_discovery_auth_group
228 |
229 portal_group_listen
230 |
231 portal_group_listen_iser
232 ;
233
234portal_group_discovery_auth_group: DISCOVERY_AUTH_GROUP STR
235 {
236 if (portal_group->pg_discovery_auth_group != NULL) {
237 log_warnx("discovery-auth-group for portal-group "
238 "\"%s\" specified more than once",
239 portal_group->pg_name);
240 return (1);
241 }
242 portal_group->pg_discovery_auth_group =
243 auth_group_find(conf, $2);
244 if (portal_group->pg_discovery_auth_group == NULL) {
245 log_warnx("unknown discovery-auth-group \"%s\" "
246 "for portal-group \"%s\"",
247 $2, portal_group->pg_name);
248 return (1);
249 }
250 free($2);
251 }
252 ;
253
254portal_group_listen: LISTEN STR
255 {
256 int error;
257
258 error = portal_group_add_listen(portal_group, $2, false);
259 free($2);
260 if (error != 0)
261 return (1);
262 }
263 ;
264
265portal_group_listen_iser: LISTEN_ISER STR
266 {
267 int error;
268
269 error = portal_group_add_listen(portal_group, $2, true);
270 free($2);
271 if (error != 0)
272 return (1);
273 }
274 ;
275
276target_statement: TARGET target_iqn
276target: TARGET target_name
277 OPENING_BRACKET target_entries CLOSING_BRACKET
278 {
279 target = NULL;
280 }
281 ;
282
277 OPENING_BRACKET target_entries CLOSING_BRACKET
278 {
279 target = NULL;
280 }
281 ;
282
283target_iqn: STR
283target_name: STR
284 {
285 target = target_new(conf, $1);
286 free($1);
287 if (target == NULL)
288 return (1);
289 }
290 ;
291
292target_entries:
293 |
294 target_entries target_entry
295 ;
296
297target_entry:
284 {
285 target = target_new(conf, $1);
286 free($1);
287 if (target == NULL)
288 return (1);
289 }
290 ;
291
292target_entries:
293 |
294 target_entries target_entry
295 ;
296
297target_entry:
298 alias_statement
298 target_alias
299 |
299 |
300 auth_group_statement
300 target_auth_group
301 |
301 |
302 chap_statement
302 target_chap
303 |
303 |
304 chap_mutual_statement
304 target_chap_mutual
305 |
305 |
306 initiator_name_statement
306 target_initiator_name
307 |
307 |
308 initiator_portal_statement
308 target_initiator_portal
309 |
309 |
310 portal_group_statement
310 target_portal_group
311 |
311 |
312 lun_statement
312 target_lun
313 ;
314
313 ;
314
315alias_statement: ALIAS STR
315target_alias: ALIAS STR
316 {
317 if (target->t_alias != NULL) {
318 log_warnx("alias for target \"%s\" "
319 "specified more than once", target->t_iqn);
320 return (1);
321 }
322 target->t_alias = $2;
323 }
324 ;
325
316 {
317 if (target->t_alias != NULL) {
318 log_warnx("alias for target \"%s\" "
319 "specified more than once", target->t_iqn);
320 return (1);
321 }
322 target->t_alias = $2;
323 }
324 ;
325
326auth_group_statement: AUTH_GROUP STR
326target_auth_group: AUTH_GROUP STR
327 {
328 if (target->t_auth_group != NULL) {
329 if (target->t_auth_group->ag_name != NULL)
330 log_warnx("auth-group for target \"%s\" "
331 "specified more than once", target->t_iqn);
332 else
333 log_warnx("cannot mix auth-group with explicit "
334 "authorisations for target \"%s\"",
335 target->t_iqn);
336 return (1);
337 }
338 target->t_auth_group = auth_group_find(conf, $2);
339 if (target->t_auth_group == NULL) {
340 log_warnx("unknown auth-group \"%s\" for target "
341 "\"%s\"", $2, target->t_iqn);
342 return (1);
343 }
344 free($2);
345 }
346 ;
347
327 {
328 if (target->t_auth_group != NULL) {
329 if (target->t_auth_group->ag_name != NULL)
330 log_warnx("auth-group for target \"%s\" "
331 "specified more than once", target->t_iqn);
332 else
333 log_warnx("cannot mix auth-group with explicit "
334 "authorisations for target \"%s\"",
335 target->t_iqn);
336 return (1);
337 }
338 target->t_auth_group = auth_group_find(conf, $2);
339 if (target->t_auth_group == NULL) {
340 log_warnx("unknown auth-group \"%s\" for target "
341 "\"%s\"", $2, target->t_iqn);
342 return (1);
343 }
344 free($2);
345 }
346 ;
347
348chap_statement: CHAP STR STR
348target_chap: CHAP STR STR
349 {
350 const struct auth *ca;
351
352 if (target->t_auth_group != NULL) {
353 if (target->t_auth_group->ag_name != NULL) {
354 log_warnx("cannot mix auth-group with explicit "
355 "authorisations for target \"%s\"",
356 target->t_iqn);
357 free($2);
358 free($3);
359 return (1);
360 }
361 } else {
362 target->t_auth_group = auth_group_new(conf, NULL);
363 if (target->t_auth_group == NULL) {
364 free($2);
365 free($3);
366 return (1);
367 }
368 target->t_auth_group->ag_target = target;
369 }
370 ca = auth_new_chap(target->t_auth_group, $2, $3);
371 free($2);
372 free($3);
373 if (ca == NULL)
374 return (1);
375 }
376 ;
377
349 {
350 const struct auth *ca;
351
352 if (target->t_auth_group != NULL) {
353 if (target->t_auth_group->ag_name != NULL) {
354 log_warnx("cannot mix auth-group with explicit "
355 "authorisations for target \"%s\"",
356 target->t_iqn);
357 free($2);
358 free($3);
359 return (1);
360 }
361 } else {
362 target->t_auth_group = auth_group_new(conf, NULL);
363 if (target->t_auth_group == NULL) {
364 free($2);
365 free($3);
366 return (1);
367 }
368 target->t_auth_group->ag_target = target;
369 }
370 ca = auth_new_chap(target->t_auth_group, $2, $3);
371 free($2);
372 free($3);
373 if (ca == NULL)
374 return (1);
375 }
376 ;
377
378chap_mutual_statement: CHAP_MUTUAL STR STR STR STR
378target_chap_mutual: CHAP_MUTUAL STR STR STR STR
379 {
380 const struct auth *ca;
381
382 if (target->t_auth_group != NULL) {
383 if (target->t_auth_group->ag_name != NULL) {
384 log_warnx("cannot mix auth-group with explicit "
385 "authorisations for target \"%s\"",
386 target->t_iqn);
387 free($2);
388 free($3);
389 free($4);
390 free($5);
391 return (1);
392 }
393 } else {
394 target->t_auth_group = auth_group_new(conf, NULL);
395 if (target->t_auth_group == NULL) {
396 free($2);
397 free($3);
398 free($4);
399 free($5);
400 return (1);
401 }
402 target->t_auth_group->ag_target = target;
403 }
404 ca = auth_new_chap_mutual(target->t_auth_group,
405 $2, $3, $4, $5);
406 free($2);
407 free($3);
408 free($4);
409 free($5);
410 if (ca == NULL)
411 return (1);
412 }
413 ;
414
379 {
380 const struct auth *ca;
381
382 if (target->t_auth_group != NULL) {
383 if (target->t_auth_group->ag_name != NULL) {
384 log_warnx("cannot mix auth-group with explicit "
385 "authorisations for target \"%s\"",
386 target->t_iqn);
387 free($2);
388 free($3);
389 free($4);
390 free($5);
391 return (1);
392 }
393 } else {
394 target->t_auth_group = auth_group_new(conf, NULL);
395 if (target->t_auth_group == NULL) {
396 free($2);
397 free($3);
398 free($4);
399 free($5);
400 return (1);
401 }
402 target->t_auth_group->ag_target = target;
403 }
404 ca = auth_new_chap_mutual(target->t_auth_group,
405 $2, $3, $4, $5);
406 free($2);
407 free($3);
408 free($4);
409 free($5);
410 if (ca == NULL)
411 return (1);
412 }
413 ;
414
415initiator_name_statement: INITIATOR_NAME STR
415target_initiator_name: INITIATOR_NAME STR
416 {
417 const struct auth_name *an;
418
419 if (target->t_auth_group != NULL) {
420 if (target->t_auth_group->ag_name != NULL) {
421 log_warnx("cannot mix auth-group with "
422 "initiator-name for target \"%s\"",
423 target->t_iqn);
424 free($2);
425 return (1);
426 }
427 } else {
428 target->t_auth_group = auth_group_new(conf, NULL);
429 if (target->t_auth_group == NULL) {
430 free($2);
431 return (1);
432 }
433 target->t_auth_group->ag_target = target;
434 }
435 an = auth_name_new(target->t_auth_group, $2);
436 free($2);
437 if (an == NULL)
438 return (1);
439 }
440 ;
441
416 {
417 const struct auth_name *an;
418
419 if (target->t_auth_group != NULL) {
420 if (target->t_auth_group->ag_name != NULL) {
421 log_warnx("cannot mix auth-group with "
422 "initiator-name for target \"%s\"",
423 target->t_iqn);
424 free($2);
425 return (1);
426 }
427 } else {
428 target->t_auth_group = auth_group_new(conf, NULL);
429 if (target->t_auth_group == NULL) {
430 free($2);
431 return (1);
432 }
433 target->t_auth_group->ag_target = target;
434 }
435 an = auth_name_new(target->t_auth_group, $2);
436 free($2);
437 if (an == NULL)
438 return (1);
439 }
440 ;
441
442initiator_portal_statement: INITIATOR_PORTAL STR
442target_initiator_portal: INITIATOR_PORTAL STR
443 {
444 const struct auth_portal *ap;
445
446 if (target->t_auth_group != NULL) {
447 if (target->t_auth_group->ag_name != NULL) {
448 log_warnx("cannot mix auth-group with "
449 "initiator-portal for target \"%s\"",
450 target->t_iqn);
451 free($2);
452 return (1);
453 }
454 } else {
455 target->t_auth_group = auth_group_new(conf, NULL);
456 if (target->t_auth_group == NULL) {
457 free($2);
458 return (1);
459 }
460 target->t_auth_group->ag_target = target;
461 }
462 ap = auth_portal_new(target->t_auth_group, $2);
463 free($2);
464 if (ap == NULL)
465 return (1);
466 }
467 ;
468
443 {
444 const struct auth_portal *ap;
445
446 if (target->t_auth_group != NULL) {
447 if (target->t_auth_group->ag_name != NULL) {
448 log_warnx("cannot mix auth-group with "
449 "initiator-portal for target \"%s\"",
450 target->t_iqn);
451 free($2);
452 return (1);
453 }
454 } else {
455 target->t_auth_group = auth_group_new(conf, NULL);
456 if (target->t_auth_group == NULL) {
457 free($2);
458 return (1);
459 }
460 target->t_auth_group->ag_target = target;
461 }
462 ap = auth_portal_new(target->t_auth_group, $2);
463 free($2);
464 if (ap == NULL)
465 return (1);
466 }
467 ;
468
469portal_group_statement: PORTAL_GROUP STR
469target_portal_group: PORTAL_GROUP STR
470 {
471 if (target->t_portal_group != NULL) {
472 log_warnx("portal-group for target \"%s\" "
473 "specified more than once", target->t_iqn);
474 free($2);
475 return (1);
476 }
477 target->t_portal_group = portal_group_find(conf, $2);
478 if (target->t_portal_group == NULL) {
479 log_warnx("unknown portal-group \"%s\" for target "
480 "\"%s\"", $2, target->t_iqn);
481 free($2);
482 return (1);
483 }
484 free($2);
485 }
486 ;
487
470 {
471 if (target->t_portal_group != NULL) {
472 log_warnx("portal-group for target \"%s\" "
473 "specified more than once", target->t_iqn);
474 free($2);
475 return (1);
476 }
477 target->t_portal_group = portal_group_find(conf, $2);
478 if (target->t_portal_group == NULL) {
479 log_warnx("unknown portal-group \"%s\" for target "
480 "\"%s\"", $2, target->t_iqn);
481 free($2);
482 return (1);
483 }
484 free($2);
485 }
486 ;
487
488lun_statement: LUN lun_number
489 OPENING_BRACKET lun_statement_entries CLOSING_BRACKET
488target_lun: LUN lun_number
489 OPENING_BRACKET lun_entries CLOSING_BRACKET
490 {
491 lun = NULL;
492 }
493 ;
494
495lun_number: NUM
496 {
497 lun = lun_new(target, $1);
498 if (lun == NULL)
499 return (1);
500 }
501 ;
502
490 {
491 lun = NULL;
492 }
493 ;
494
495lun_number: NUM
496 {
497 lun = lun_new(target, $1);
498 if (lun == NULL)
499 return (1);
500 }
501 ;
502
503lun_statement_entries:
503lun_entries:
504 |
504 |
505 lun_statement_entries lun_statement_entry
505 lun_entries lun_entry
506 ;
507
506 ;
507
508lun_statement_entry:
509 backend_statement
508lun_entry:
509 lun_backend
510 |
510 |
511 blocksize_statement
511 lun_blocksize
512 |
512 |
513 device_id_statement
513 lun_device_id
514 |
514 |
515 option_statement
515 lun_option
516 |
516 |
517 path_statement
517 lun_path
518 |
518 |
519 serial_statement
519 lun_serial
520 |
520 |
521 size_statement
521 lun_size
522 ;
523
522 ;
523
524backend_statement: BACKEND STR
524lun_backend: BACKEND STR
525 {
526 if (lun->l_backend != NULL) {
527 log_warnx("backend for lun %d, target \"%s\" "
528 "specified more than once",
529 lun->l_lun, target->t_iqn);
530 free($2);
531 return (1);
532 }
533 lun_set_backend(lun, $2);
534 free($2);
535 }
536 ;
537
525 {
526 if (lun->l_backend != NULL) {
527 log_warnx("backend for lun %d, target \"%s\" "
528 "specified more than once",
529 lun->l_lun, target->t_iqn);
530 free($2);
531 return (1);
532 }
533 lun_set_backend(lun, $2);
534 free($2);
535 }
536 ;
537
538blocksize_statement: BLOCKSIZE NUM
538lun_blocksize: BLOCKSIZE NUM
539 {
540 if (lun->l_blocksize != 0) {
541 log_warnx("blocksize for lun %d, target \"%s\" "
542 "specified more than once",
543 lun->l_lun, target->t_iqn);
544 return (1);
545 }
546 lun_set_blocksize(lun, $2);
547 }
548 ;
549
539 {
540 if (lun->l_blocksize != 0) {
541 log_warnx("blocksize for lun %d, target \"%s\" "
542 "specified more than once",
543 lun->l_lun, target->t_iqn);
544 return (1);
545 }
546 lun_set_blocksize(lun, $2);
547 }
548 ;
549
550device_id_statement: DEVICE_ID STR
550lun_device_id: DEVICE_ID STR
551 {
552 if (lun->l_device_id != NULL) {
553 log_warnx("device_id for lun %d, target \"%s\" "
554 "specified more than once",
555 lun->l_lun, target->t_iqn);
556 free($2);
557 return (1);
558 }
559 lun_set_device_id(lun, $2);
560 free($2);
561 }
562 ;
563
551 {
552 if (lun->l_device_id != NULL) {
553 log_warnx("device_id for lun %d, target \"%s\" "
554 "specified more than once",
555 lun->l_lun, target->t_iqn);
556 free($2);
557 return (1);
558 }
559 lun_set_device_id(lun, $2);
560 free($2);
561 }
562 ;
563
564option_statement: OPTION STR STR
564lun_option: OPTION STR STR
565 {
566 struct lun_option *clo;
567
568 clo = lun_option_new(lun, $2, $3);
569 free($2);
570 free($3);
571 if (clo == NULL)
572 return (1);
573 }
574 ;
575
565 {
566 struct lun_option *clo;
567
568 clo = lun_option_new(lun, $2, $3);
569 free($2);
570 free($3);
571 if (clo == NULL)
572 return (1);
573 }
574 ;
575
576path_statement: PATH STR
576lun_path: PATH STR
577 {
578 if (lun->l_path != NULL) {
579 log_warnx("path for lun %d, target \"%s\" "
580 "specified more than once",
581 lun->l_lun, target->t_iqn);
582 free($2);
583 return (1);
584 }
585 lun_set_path(lun, $2);
586 free($2);
587 }
588 ;
589
577 {
578 if (lun->l_path != NULL) {
579 log_warnx("path for lun %d, target \"%s\" "
580 "specified more than once",
581 lun->l_lun, target->t_iqn);
582 free($2);
583 return (1);
584 }
585 lun_set_path(lun, $2);
586 free($2);
587 }
588 ;
589
590serial_statement: SERIAL STR
590lun_serial: SERIAL STR
591 {
592 if (lun->l_serial != NULL) {
593 log_warnx("serial for lun %d, target \"%s\" "
594 "specified more than once",
595 lun->l_lun, target->t_iqn);
596 free($2);
597 return (1);
598 }
599 lun_set_serial(lun, $2);
600 free($2);
601 }
602 ;
603
591 {
592 if (lun->l_serial != NULL) {
593 log_warnx("serial for lun %d, target \"%s\" "
594 "specified more than once",
595 lun->l_lun, target->t_iqn);
596 free($2);
597 return (1);
598 }
599 lun_set_serial(lun, $2);
600 free($2);
601 }
602 ;
603
604size_statement: SIZE NUM
604lun_size: SIZE NUM
605 {
606 if (lun->l_size != 0) {
607 log_warnx("size for lun %d, target \"%s\" "
608 "specified more than once",
609 lun->l_lun, target->t_iqn);
610 return (1);
611 }
612 lun_set_size(lun, $2);
613 }
614 ;
615%%
616
617void
618yyerror(const char *str)
619{
620
621 log_warnx("error in configuration file at line %d near '%s': %s",
622 lineno, yytext, str);
623}
624
625static void
626check_perms(const char *path)
627{
628 struct stat sb;
629 int error;
630
631 error = stat(path, &sb);
632 if (error != 0) {
633 log_warn("stat");
634 return;
635 }
636 if (sb.st_mode & S_IWOTH) {
637 log_warnx("%s is world-writable", path);
638 } else if (sb.st_mode & S_IROTH) {
639 log_warnx("%s is world-readable", path);
640 } else if (sb.st_mode & S_IXOTH) {
641 /*
642 * Ok, this one doesn't matter, but still do it,
643 * just for consistency.
644 */
645 log_warnx("%s is world-executable", path);
646 }
647
648 /*
649 * XXX: Should we also check for owner != 0?
650 */
651}
652
653struct conf *
654conf_new_from_file(const char *path)
655{
656 struct auth_group *ag;
657 struct portal_group *pg;
658 int error;
659
660 log_debugx("obtaining configuration from %s", path);
661
662 conf = conf_new();
663
664 ag = auth_group_new(conf, "no-authentication");
665 ag->ag_type = AG_TYPE_NO_AUTHENTICATION;
666
667 /*
668 * Here, the type doesn't really matter, as the group doesn't contain
669 * any entries and thus will always deny access.
670 */
671 ag = auth_group_new(conf, "no-access");
672 ag->ag_type = AG_TYPE_CHAP;
673
674 pg = portal_group_new(conf, "default");
675 portal_group_add_listen(pg, "0.0.0.0:3260", false);
676 portal_group_add_listen(pg, "[::]:3260", false);
677
678 yyin = fopen(path, "r");
679 if (yyin == NULL) {
680 log_warn("unable to open configuration file %s", path);
681 conf_delete(conf);
682 return (NULL);
683 }
684 check_perms(path);
685 lineno = 1;
686 yyrestart(yyin);
687 error = yyparse();
688 auth_group = NULL;
689 portal_group = NULL;
690 target = NULL;
691 lun = NULL;
692 fclose(yyin);
693 if (error != 0) {
694 conf_delete(conf);
695 return (NULL);
696 }
697
698 error = conf_verify(conf);
699 if (error != 0) {
700 conf_delete(conf);
701 return (NULL);
702 }
703
704 return (conf);
705}
605 {
606 if (lun->l_size != 0) {
607 log_warnx("size for lun %d, target \"%s\" "
608 "specified more than once",
609 lun->l_lun, target->t_iqn);
610 return (1);
611 }
612 lun_set_size(lun, $2);
613 }
614 ;
615%%
616
617void
618yyerror(const char *str)
619{
620
621 log_warnx("error in configuration file at line %d near '%s': %s",
622 lineno, yytext, str);
623}
624
625static void
626check_perms(const char *path)
627{
628 struct stat sb;
629 int error;
630
631 error = stat(path, &sb);
632 if (error != 0) {
633 log_warn("stat");
634 return;
635 }
636 if (sb.st_mode & S_IWOTH) {
637 log_warnx("%s is world-writable", path);
638 } else if (sb.st_mode & S_IROTH) {
639 log_warnx("%s is world-readable", path);
640 } else if (sb.st_mode & S_IXOTH) {
641 /*
642 * Ok, this one doesn't matter, but still do it,
643 * just for consistency.
644 */
645 log_warnx("%s is world-executable", path);
646 }
647
648 /*
649 * XXX: Should we also check for owner != 0?
650 */
651}
652
653struct conf *
654conf_new_from_file(const char *path)
655{
656 struct auth_group *ag;
657 struct portal_group *pg;
658 int error;
659
660 log_debugx("obtaining configuration from %s", path);
661
662 conf = conf_new();
663
664 ag = auth_group_new(conf, "no-authentication");
665 ag->ag_type = AG_TYPE_NO_AUTHENTICATION;
666
667 /*
668 * Here, the type doesn't really matter, as the group doesn't contain
669 * any entries and thus will always deny access.
670 */
671 ag = auth_group_new(conf, "no-access");
672 ag->ag_type = AG_TYPE_CHAP;
673
674 pg = portal_group_new(conf, "default");
675 portal_group_add_listen(pg, "0.0.0.0:3260", false);
676 portal_group_add_listen(pg, "[::]:3260", false);
677
678 yyin = fopen(path, "r");
679 if (yyin == NULL) {
680 log_warn("unable to open configuration file %s", path);
681 conf_delete(conf);
682 return (NULL);
683 }
684 check_perms(path);
685 lineno = 1;
686 yyrestart(yyin);
687 error = yyparse();
688 auth_group = NULL;
689 portal_group = NULL;
690 target = NULL;
691 lun = NULL;
692 fclose(yyin);
693 if (error != 0) {
694 conf_delete(conf);
695 return (NULL);
696 }
697
698 error = conf_verify(conf);
699 if (error != 0) {
700 conf_delete(conf);
701 return (NULL);
702 }
703
704 return (conf);
705}