NetBSD/usr.sbin/npf/npfctl/npf_parse.y

816 lines
15 KiB
Plaintext
Raw Normal View History

2013-03-11 03:11:26 +04:00
/* $NetBSD: npf_parse.y,v 1.19 2013/03/10 23:11:26 christos Exp $ */
/*-
* Copyright (c) 2011-2012 The NetBSD Foundation, Inc.
* All rights reserved.
*
* This code is derived from software contributed to The NetBSD Foundation
* by Martin Husemann and Christos Zoulas.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
%{
#include <stdio.h>
#include <err.h>
#include <vis.h>
#include <netdb.h>
#include "npfctl.h"
#define YYSTACKSIZE 4096
int yyparsetarget;
const char * yyfilename;
extern int yylineno, yycolumn;
extern int yylex(void);
/* Variable under construction (bottom up). */
static npfvar_t * cvar;
void
yyerror(const char *fmt, ...)
{
extern int yyleng;
extern char *yytext;
2012-11-06 03:47:12 +04:00
char *msg, *context = estrndup(yytext, yyleng);
bool eol = (*context == '\n');
va_list ap;
va_start(ap, fmt);
vasprintf(&msg, fmt, ap);
va_end(ap);
fprintf(stderr, "%s:%d:%d: %s", yyfilename,
yylineno - (int)eol, yycolumn, msg);
if (!eol) {
size_t len = strlen(context);
2012-11-16 02:20:27 +04:00
char *dst = ecalloc(1, len * 4 + 1);
strvisx(dst, context, len, VIS_WHITE|VIS_CSTYLE);
fprintf(stderr, " near '%s'", dst);
}
fprintf(stderr, "\n");
exit(EXIT_FAILURE);
}
#define CHECK_PARSER_FILE \
if (yyparsetarget != NPFCTL_PARSE_FILE) \
yyerror("rule must be in the group");
#define CHECK_PARSER_STRING \
if (yyparsetarget != NPFCTL_PARSE_STRING) \
yyerror("invalid rule syntax");
%}
%token ALL
%token ANY
%token APPLY
%token ARROWBOTH
%token ARROWLEFT
%token ARROWRIGHT
%token BLOCK
%token CURLY_CLOSE
%token CURLY_OPEN
%token CODE
%token COLON
%token COMMA
%token DEFAULT
%token TDYNAMIC
%token TSTATIC
%token EQ
%token TFILE
%token FLAGS
%token FROM
%token GROUP
%token HASH
%token ICMPTYPE
%token ID
%token IFNET
%token IN
%token INET
%token INET6
%token INTERFACE
%token MAP
%token MINUS
%token NAME
%token ON
%token OUT
%token PAR_CLOSE
%token PAR_OPEN
%token PASS
%token PORT
%token PROCEDURE
%token PROTO
%token FAMILY
%token FINAL
%token FORW
%token RETURN
%token RETURNICMP
%token RETURNRST
%token SEPLINE
%token SLASH
%token STATEFUL
%token TABLE
%token TCP
%token TO
%token TREE
%token TYPE
2012-07-20 01:52:29 +04:00
%token <num> ICMP
%token <num> ICMP6
%token <num> HEX
%token <str> IDENTIFIER
%token <str> IPV4ADDR
%token <str> IPV6ADDR
%token <num> NUM
%token <fpnum> FPNUM
%token <str> STRING
%token <str> TABLE_ID
%token <str> VAR_ID
2013-03-11 03:11:26 +04:00
%type <str> addr, some_name, list_elem, table_store, string
%type <str> proc_param_val, opt_apply
%type <num> ifindex, port, opt_final, on_ifindex
%type <num> afamily, opt_family
%type <num> block_or_pass, rule_dir, block_opts
%type <num> opt_stateful, icmp_type, table_type, map_sd, map_type
%type <var> ifnet, addr_or_ifnet, port_range, icmp_type_and_code
%type <var> filt_addr, addr_and_mask, tcp_flags, tcp_flags_and_mask
%type <var> procs, proc_call, proc_param_list, proc_param
%type <addrport> mapseg
%type <filtopts> filt_opts, all_or_filt_opts
%type <optproto> opt_proto
%type <rulegroup> group_attr, group_opt
%union {
char * str;
unsigned long num;
double fpnum;
npfvar_t * var;
addr_port_t addrport;
filt_opts_t filtopts;
opt_proto_t optproto;
rule_group_t rulegroup;
}
%%
input
: { CHECK_PARSER_FILE } lines
| { CHECK_PARSER_STRING } rule
;
lines
: line SEPLINE lines
| line
;
line
: def
| table
| map
| group
| rproc
|
;
def
: VAR_ID
{
cvar = npfvar_create($1);
npfvar_add(cvar);
}
EQ definition
{
cvar = NULL;
}
;
definition
: list_elem
| listdef
;
listdef
: CURLY_OPEN list_elems CURLY_CLOSE
;
list_elems
: list_elem COMMA list_elems
| list_elem
;
list_elem
: IDENTIFIER
{
npfvar_t *vp = npfvar_create(".identifier");
npfvar_add_element(vp, NPFVAR_IDENTIFIER, $1, strlen($1) + 1);
npfvar_add_elements(cvar, vp);
}
| STRING
{
npfvar_t *vp = npfvar_create(".string");
npfvar_add_element(vp, NPFVAR_STRING, $1, strlen($1) + 1);
npfvar_add_elements(cvar, vp);
}
| NUM MINUS NUM
{
npfvar_t *vp = npfctl_parse_port_range($1, $3);
npfvar_add_elements(cvar, vp);
}
| NUM
{
npfvar_t *vp = npfvar_create(".num");
npfvar_add_element(vp, NPFVAR_NUM, &$1, sizeof($1));
npfvar_add_elements(cvar, vp);
}
| VAR_ID
{
npfvar_t *vp = npfvar_create(".var_id");
npfvar_add_element(vp, NPFVAR_VAR_ID, $1, strlen($1) + 1);
npfvar_add_elements(cvar, vp);
}
| ifnet
{
npfvar_add_elements(cvar, $1);
}
| addr_and_mask
{
npfvar_add_elements(cvar, $1);
}
;
table
: TABLE TABLE_ID TYPE table_type table_store
{
npfctl_build_table($2, $4, $5);
}
;
table_type
: HASH { $$ = NPF_TABLE_HASH; }
| TREE { $$ = NPF_TABLE_TREE; }
;
table_store
: TDYNAMIC { $$ = NULL; }
| TFILE STRING { $$ = $2; }
;
map_sd
: TSTATIC { $$ = NPFCTL_NAT_STATIC; }
| TDYNAMIC { $$ = NPFCTL_NAT_DYNAMIC; }
| { $$ = NPFCTL_NAT_DYNAMIC; }
;
map_type
: ARROWBOTH { $$ = NPF_NATIN | NPF_NATOUT; }
| ARROWLEFT { $$ = NPF_NATIN; }
| ARROWRIGHT { $$ = NPF_NATOUT; }
;
mapseg
: addr_or_ifnet port_range
{
$$.ap_netaddr = $1;
$$.ap_portrange = $2;
}
;
map
: MAP ifindex map_sd mapseg map_type mapseg PASS filt_opts
{
npfctl_build_natseg($3, $5, $2, &$4, &$6, &$8);
}
| MAP ifindex map_sd mapseg map_type mapseg
{
npfctl_build_natseg($3, $5, $2, &$4, &$6, NULL);
}
;
rproc
: PROCEDURE STRING CURLY_OPEN procs CURLY_CLOSE
{
npfctl_build_rproc($2, $4);
}
;
procs
: proc_call SEPLINE procs
{
$$ = npfvar_add_elements($1, $3);
}
| proc_call { $$ = $1; }
;
proc_call
: IDENTIFIER COLON proc_param_list
{
proc_call_t pc;
2012-11-06 03:47:12 +04:00
pc.pc_name = estrdup($1);
pc.pc_opts = $3;
$$ = npfvar_create(".proc_call");
npfvar_add_element($$, NPFVAR_PROC, &pc, sizeof(pc));
}
| { $$ = NULL; }
;
proc_param_list
: proc_param COMMA proc_param_list
{
$$ = npfvar_add_elements($1, $3);
}
| proc_param { $$ = $1; }
| { $$ = NULL; }
;
proc_param
/* Key and value pair. */
: some_name proc_param_val
{
proc_param_t pp;
2012-11-06 03:47:12 +04:00
pp.pp_param = estrdup($1);
pp.pp_value = $2 ? estrdup($2) : NULL;
$$ = npfvar_create(".proc_param");
npfvar_add_element($$, NPFVAR_PROC_PARAM, &pp, sizeof(pp));
}
;
proc_param_val
: some_name { $$ = $1; }
| NUM { (void)asprintf(&$$, "%ld", $1); }
| FPNUM { (void)asprintf(&$$, "%lf", $1); }
| { $$ = NULL; }
;
group
: GROUP PAR_OPEN group_attr PAR_CLOSE
{
/* Build a group. Increases the nesting level. */
npfctl_build_group($3.rg_name, $3.rg_attr,
$3.rg_ifnum, $3.rg_default);
}
ruleset_block
{
/* Decrease the nesting level. */
npfctl_build_group_end();
}
;
group_attr
: group_opt COMMA group_attr
{
$$ = $3;
if (($1.rg_name && $$.rg_name) ||
($1.rg_ifnum && $$.rg_ifnum) ||
($1.rg_attr & $$.rg_attr) != 0)
yyerror("duplicate group option");
if ($1.rg_name) {
$$.rg_name = $1.rg_name;
}
if ($1.rg_attr) {
$$.rg_attr |= $1.rg_attr;
}
if ($1.rg_ifnum) {
$$.rg_ifnum = $1.rg_ifnum;
}
if ($1.rg_default) {
$$.rg_default = $1.rg_default;
}
}
| group_opt { $$ = $1; }
;
group_opt
: DEFAULT
{
memset(&$$, 0, sizeof(rule_group_t));
$$.rg_default = true;
}
| NAME STRING
{
memset(&$$, 0, sizeof(rule_group_t));
$$.rg_name = $2;
}
| INTERFACE ifindex
{
memset(&$$, 0, sizeof(rule_group_t));
$$.rg_ifnum = $2;
}
| TDYNAMIC
{
memset(&$$, 0, sizeof(rule_group_t));
$$.rg_attr = NPF_RULE_DYNAMIC;
}
| FORW
{
memset(&$$, 0, sizeof(rule_group_t));
$$.rg_attr = NPF_RULE_FORW;
}
| rule_dir
{
memset(&$$, 0, sizeof(rule_group_t));
$$.rg_attr = $1;
}
;
ruleset_block
: CURLY_OPEN ruleset CURLY_CLOSE
| /* Empty (for a dynamic ruleset). */
;
ruleset
: rule_group SEPLINE ruleset
| rule_group
;
rule_group
: rule
| group
|
rule
: block_or_pass opt_stateful rule_dir opt_final on_ifindex
opt_family opt_proto all_or_filt_opts opt_apply
{
npfctl_build_rule($1 | $2 | $3 | $4, $5,
$6, &$7, &$8, $9);
}
;
block_or_pass
: BLOCK block_opts { $$ = $2; }
| PASS { $$ = NPF_RULE_PASS; }
;
rule_dir
: IN { $$ = NPF_RULE_IN; }
| OUT { $$ = NPF_RULE_OUT; }
| { $$ = NPF_RULE_IN | NPF_RULE_OUT; }
;
opt_final
: FINAL { $$ = NPF_RULE_FINAL; }
| { $$ = 0; }
;
on_ifindex
: ON ifindex { $$ = $2; }
| { $$ = 0; }
;
afamily
: INET { $$ = AF_INET; }
| INET6 { $$ = AF_INET6; }
;
opt_family
: FAMILY afamily { $$ = $2; }
| { $$ = AF_UNSPEC; }
;
opt_proto
: PROTO TCP tcp_flags_and_mask
{
$$.op_proto = IPPROTO_TCP;
$$.op_opts = $3;
}
| PROTO ICMP icmp_type_and_code
{
$$.op_proto = IPPROTO_ICMP;
$$.op_opts = $3;
}
2012-07-20 01:52:29 +04:00
| PROTO ICMP6 icmp_type_and_code
{
$$.op_proto = IPPROTO_ICMPV6;
$$.op_opts = $3;
}
| PROTO some_name
{
$$.op_proto = npfctl_protono($2);
$$.op_opts = NULL;
}
| PROTO NUM
{
$$.op_proto = $2;
$$.op_opts = NULL;
}
|
{
$$.op_proto = -1;
$$.op_opts = NULL;
}
;
all_or_filt_opts
: ALL
{
$$.fo_from.ap_netaddr = NULL;
$$.fo_from.ap_portrange = NULL;
$$.fo_to.ap_netaddr = NULL;
$$.fo_to.ap_portrange = NULL;
}
| filt_opts { $$ = $1; }
;
opt_stateful
: STATEFUL { $$ = NPF_RULE_STATEFUL; }
| { $$ = 0; }
;
opt_apply
: APPLY STRING { $$ = $2; }
| { $$ = NULL; }
;
block_opts
: RETURNRST { $$ = NPF_RULE_RETRST; }
| RETURNICMP { $$ = NPF_RULE_RETICMP; }
| RETURN { $$ = NPF_RULE_RETRST | NPF_RULE_RETICMP; }
| { $$ = 0; }
;
filt_opts
: FROM filt_addr port_range TO filt_addr port_range
{
$$.fo_from.ap_netaddr = $2;
$$.fo_from.ap_portrange = $3;
$$.fo_to.ap_netaddr = $5;
$$.fo_to.ap_portrange = $6;
}
| FROM filt_addr port_range
{
$$.fo_from.ap_netaddr = $2;
$$.fo_from.ap_portrange = $3;
$$.fo_to.ap_netaddr = NULL;
$$.fo_to.ap_portrange = NULL;
}
| TO filt_addr port_range
{
$$.fo_from.ap_netaddr = NULL;
$$.fo_from.ap_portrange = NULL;
$$.fo_to.ap_netaddr = $2;
$$.fo_to.ap_portrange = $3;
}
;
filt_addr
: addr_or_ifnet { $$ = $1; }
| TABLE_ID { $$ = npfctl_parse_table_id($1); }
| ANY { $$ = NULL; }
;
addr_and_mask
: addr SLASH NUM
{
$$ = npfctl_parse_fam_addr_mask($1, NULL, &$3);
}
| addr SLASH HEX
{
$$ = npfctl_parse_fam_addr_mask($1, NULL, &$3);
}
| addr SLASH addr
{
$$ = npfctl_parse_fam_addr_mask($1, $3, NULL);
}
| addr
{
$$ = npfctl_parse_fam_addr_mask($1, NULL, NULL);
}
;
addr_or_ifnet
: addr_and_mask
{
assert($1 != NULL);
$$ = $1;
}
| ifnet
{
ifnet_addr_t *ifna = npfvar_get_data($1, NPFVAR_INTERFACE, 0);
$$ = ifna->ifna_addrs;
}
| VAR_ID
{
npfvar_t *vp = npfvar_lookup($1);
2013-03-11 03:11:26 +04:00
int type = npfvar_get_type(vp, 0);
ifnet_addr_t *ifna;
2013-03-11 03:11:26 +04:00
again:
switch (type) {
2013-03-11 03:11:26 +04:00
case NPFVAR_IDENTIFIER:
case NPFVAR_STRING:
vp = npfctl_parse_ifnet(npfvar_expand_string(vp),
AF_UNSPEC);
type = npfvar_get_type(vp, 0);
goto again;
case NPFVAR_FAM:
$$ = vp;
break;
case NPFVAR_INTERFACE:
ifna = npfvar_get_data(vp, type, 0);
$$ = ifna->ifna_addrs;
break;
case -1:
yyerror("undefined variable '%s'", $1);
break;
default:
yyerror("wrong variable '%s' type '%s' for address "
"or interface", $1, npfvar_type(type));
break;
}
}
;
addr
: IPV4ADDR { $$ = $1; }
| IPV6ADDR { $$ = $1; }
;
port_range
: PORT port /* just port */
{
$$ = npfctl_parse_port_range($2, $2);
}
| PORT port MINUS port /* port from-to */
{
$$ = npfctl_parse_port_range($2, $4);
}
| PORT VAR_ID
{
$$ = npfctl_parse_port_range_variable($2);
}
|
{
$$ = NULL;
}
;
port
: NUM { $$ = $1; }
| IDENTIFIER { $$ = npfctl_portno($1); }
;
icmp_type_and_code
: ICMPTYPE icmp_type
{
2012-07-20 01:52:29 +04:00
$$ = npfctl_parse_icmp($<num>0, $2, -1);
}
| ICMPTYPE icmp_type CODE NUM
{
2012-07-20 01:52:29 +04:00
$$ = npfctl_parse_icmp($<num>0, $2, $4);
}
| ICMPTYPE icmp_type CODE IDENTIFIER
{
$$ = npfctl_parse_icmp($<num>0, $2,
npfctl_icmpcode($<num>0, $2, $4));
}
| ICMPTYPE icmp_type CODE VAR_ID
{
char *s = npfvar_expand_string(npfvar_lookup($4));
$$ = npfctl_parse_icmp($<num>0, $2,
npfctl_icmpcode($<num>0, $2, s));
}
|
{
2012-07-20 01:52:29 +04:00
$$ = npfctl_parse_icmp($<num>0, -1, -1);
}
;
tcp_flags_and_mask
: FLAGS tcp_flags SLASH tcp_flags
{
npfvar_add_elements($2, $4);
$$ = $2;
}
| FLAGS tcp_flags
{
char *s = npfvar_get_data($2, NPFVAR_TCPFLAG, 0);
npfvar_add_elements($2, npfctl_parse_tcpflag(s));
$$ = $2;
}
| { $$ = NULL; }
;
tcp_flags
: IDENTIFIER { $$ = npfctl_parse_tcpflag($1); }
;
icmp_type
: NUM { $$ = $1; }
2012-07-20 01:52:29 +04:00
| IDENTIFIER { $$ = npfctl_icmptype($<num>-1, $1); }
| VAR_ID
{
char *s = npfvar_expand_string(npfvar_lookup($1));
2012-07-20 01:52:29 +04:00
$$ = npfctl_icmptype($<num>-1, s);
}
;
2013-03-11 03:11:26 +04:00
string
: IDENTIFIER
{
$$ = $1;
}
| VAR_ID
{
npfvar_t *vp = npfvar_lookup($1);
const int type = npfvar_get_type(vp, 0);
switch (type) {
case NPFVAR_STRING:
case NPFVAR_IDENTIFIER:
$$ = npfvar_expand_string(vp);
break;
case -1:
yyerror("undefined variable '%s' for interface", $1);
break;
default:
yyerror("wrong variable '%s' type '%s' for string",
$1, npfvar_type(type));
break;
}
}
;
ifnet
2013-03-11 03:11:26 +04:00
: IFNET PAR_OPEN string PAR_CLOSE
{
$$ = npfctl_parse_ifnet($3, AF_UNSPEC);
}
2013-03-11 03:11:26 +04:00
| afamily PAR_OPEN string PAR_CLOSE
{
$$ = npfctl_parse_ifnet($3, $1);
}
2013-03-11 03:11:26 +04:00
;
ifindex
: some_name
{
$$ = npfctl_find_ifindex($1);
}
| ifnet
{
ifnet_addr_t *ifna = npfvar_get_data($1, NPFVAR_INTERFACE, 0);
$$ = ifna->ifna_index;
}
| VAR_ID
{
npfvar_t *vp = npfvar_lookup($1);
const int type = npfvar_get_type(vp, 0);
ifnet_addr_t *ifna;
switch (type) {
case NPFVAR_STRING:
case NPFVAR_IDENTIFIER:
$$ = npfctl_find_ifindex(npfvar_expand_string(vp));
break;
case NPFVAR_INTERFACE:
ifna = npfvar_get_data(vp, type, 0);
$$ = ifna->ifna_index;
break;
case -1:
yyerror("undefined variable '%s' for interface", $1);
break;
default:
yyerror("wrong variable '%s' type '%s' for interface",
$1, npfvar_type(type));
break;
}
}
;
some_name
: IDENTIFIER { $$ = $1; }
| STRING { $$ = $1; }
;
%%