* evhtp restconf closes session on -1 fatal error (no hang) * restconf auth-type=none call ca_auth callback * main example for auth_type=none uses basic auth to get user but without passwd check
635 lines
19 KiB
C
635 lines
19 KiB
C
/*
|
|
*
|
|
***** BEGIN LICENSE BLOCK *****
|
|
|
|
Copyright (C) 2009-2019 Olof Hagsand
|
|
Copyright (C) 2020-2021 Olof Hagsand and Rubicon Communications, LLC(Netgate)
|
|
|
|
This file is part of CLIXON.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
|
|
Alternatively, the contents of this file may be used under the terms of
|
|
the GNU General Public License Version 3 or later (the "GPL"),
|
|
in which case the provisions of the GPL are applicable instead
|
|
of those above. If you wish to allow use of your version of this file only
|
|
under the terms of the GPL, and not to allow others to
|
|
use your version of this file under the terms of Apache License version 2,
|
|
indicate your decision by deleting the provisions above and replace them with
|
|
the notice and other provisions required by the GPL. If you do not delete
|
|
the provisions above, a recipient may use your version of this file under
|
|
the terms of any one of the Apache License version 2 or the GPL.
|
|
|
|
***** END LICENSE BLOCK *****
|
|
|
|
* @see https://nginx.org/en/docs/http/ngx_http_core_module.html#var_https
|
|
* @note The response payload for errors uses text_html. RFC7231 is vague
|
|
* on the response payload (and its media). Maybe it should be omitted
|
|
* altogether?
|
|
*/
|
|
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <errno.h>
|
|
#include <signal.h>
|
|
#include <syslog.h>
|
|
#include <fcntl.h>
|
|
#include <ctype.h>
|
|
#include <time.h>
|
|
#include <signal.h>
|
|
#include <dlfcn.h>
|
|
#include <sys/param.h>
|
|
#include <sys/time.h>
|
|
#include <sys/wait.h>
|
|
|
|
/* cligen */
|
|
#include <cligen/cligen.h>
|
|
|
|
/* clicon */
|
|
#include <clixon/clixon.h>
|
|
|
|
#include "restconf_api.h"
|
|
#include "restconf_lib.h"
|
|
#include "restconf_err.h"
|
|
#include "restconf_handle.h"
|
|
|
|
/* See RFC 8040 Section 7: Mapping from NETCONF<error-tag> to Status Code
|
|
* and RFC 6241 Appendix A. NETCONF Error list
|
|
*/
|
|
static const map_str2int netconf_restconf_map[] = {
|
|
{"in-use", 409},
|
|
{"invalid-value", 404},
|
|
{"invalid-value", 400},
|
|
{"invalid-value", 406},
|
|
{"too-big", 413}, /* request */
|
|
{"too-big", 400}, /* response */
|
|
{"missing-attribute", 400},
|
|
{"bad-attribute", 400},
|
|
{"unknown-attribute", 400},
|
|
{"missing-element", 400},
|
|
{"bad-element", 400},
|
|
{"unknown-element", 400},
|
|
{"unknown-namespace", 400},
|
|
{"access-denied", 403}, /* or 401 special case if tagstr is: "The requested URL was unauthorized" handled in api_return_err */
|
|
{"access-denied", 401},
|
|
{"lock-denied", 409},
|
|
{"resource-denied", 409},
|
|
{"rollback-failed", 500},
|
|
{"data-exists", 409},
|
|
{"data-missing", 409},
|
|
{"operation-not-supported",405},
|
|
{"operation-not-supported",501},
|
|
{"operation-failed", 412},
|
|
{"operation-failed", 500},
|
|
{"partial-operation", 500},
|
|
{"malformed-message", 400},
|
|
{NULL, -1}
|
|
};
|
|
|
|
/* See 7231 Section 6.1
|
|
*/
|
|
static const map_str2int http_reason_phrase_map[] = {
|
|
{"Continue", 100},
|
|
{"Switching Protocols", 101},
|
|
{"OK", 200},
|
|
{"Created", 201},
|
|
{"Accepted", 202},
|
|
{"Non-Authoritative Information", 203},
|
|
{"No Content", 204},
|
|
{"Reset Content", 205},
|
|
{"Partial Content", 206},
|
|
{"Multiple Choices", 300},
|
|
{"Moved Permanently", 301},
|
|
{"Found", 302},
|
|
{"See Other", 303},
|
|
{"Not Modified", 304},
|
|
{"Use Proxy", 305},
|
|
{"Temporary Redirect", 307},
|
|
{"Bad Request", 400},
|
|
{"Unauthorized", 401},
|
|
{"Payment Required", 402},
|
|
{"Forbidden", 403},
|
|
{"Not Found", 404},
|
|
{"Method Not Allowed", 405},
|
|
{"Not Acceptable", 406},
|
|
{"Proxy Authentication Required", 407},
|
|
{"Request Timeout", 408},
|
|
{"Conflict", 409},
|
|
{"Gone", 410},
|
|
{"Length Required", 411},
|
|
{"Precondition Failed", 412},
|
|
{"Payload Too Large", 413},
|
|
{"URI Too Long", 414},
|
|
{"Unsupported Media Type", 415},
|
|
{"Range Not Satisfiable", 416},
|
|
{"Expectation Failed", 417},
|
|
{"Upgrade Required", 426},
|
|
{"Internal Server Error", 500},
|
|
{"Not Implemented", 501},
|
|
{"Bad Gateway", 502},
|
|
{"Service Unavailable", 503},
|
|
{"Gateway Timeout", 504},
|
|
{"HTTP Version Not Supported", 505},
|
|
{NULL, -1}
|
|
};
|
|
|
|
/* See RFC 8040
|
|
* @see restconf_media_str2int
|
|
*/
|
|
static const map_str2int http_media_map[] = {
|
|
{"application/yang-data+xml", YANG_DATA_XML},
|
|
{"application/yang-data+json", YANG_DATA_JSON},
|
|
{"application/yang-patch+xml", YANG_PATCH_XML},
|
|
{"application/yang-patch+json", YANG_PATCH_JSON},
|
|
{NULL, -1}
|
|
};
|
|
|
|
int
|
|
restconf_err2code(char *tag)
|
|
{
|
|
return clicon_str2int(netconf_restconf_map, tag);
|
|
}
|
|
|
|
const char *
|
|
restconf_code2reason(int code)
|
|
{
|
|
return clicon_int2str(http_reason_phrase_map, code);
|
|
}
|
|
|
|
const restconf_media
|
|
restconf_media_str2int(char *media)
|
|
{
|
|
return clicon_str2int(http_media_map, media);
|
|
}
|
|
|
|
const char *
|
|
restconf_media_int2str(restconf_media media)
|
|
{
|
|
return clicon_int2str(http_media_map, media);
|
|
}
|
|
|
|
/*! Return media_in from Content-Type, -1 if not found or unrecognized
|
|
* @note media-type syntax does not support parameters
|
|
* @see RFC7231 Sec 3.1.1.1 for media-type syntax type:
|
|
* media-type = type "/" subtype *( OWS ";" OWS parameter )
|
|
* type = token
|
|
* subtype = token
|
|
*
|
|
*/
|
|
restconf_media
|
|
restconf_content_type(clicon_handle h)
|
|
{
|
|
char *str = NULL;
|
|
restconf_media m;
|
|
|
|
if ((str = restconf_param_get(h, "HTTP_CONTENT_TYPE")) == NULL)
|
|
return -1;
|
|
if ((int)(m = restconf_media_str2int(str)) == -1)
|
|
return -1;
|
|
return m;
|
|
}
|
|
|
|
/*! Parse a cookie string and return value of cookie attribute
|
|
* @param[in] cookiestr cookie string according to rfc6265 (modified)
|
|
* @param[in] attribute cookie attribute
|
|
* @param[out] val malloced cookie value, free with free()
|
|
*/
|
|
int
|
|
get_user_cookie(char *cookiestr,
|
|
char *attribute,
|
|
char **val)
|
|
{
|
|
int retval = -1;
|
|
cvec *cvv = NULL;
|
|
char *c;
|
|
|
|
if (str2cvec(cookiestr, ';', '=', &cvv) < 0)
|
|
goto done;
|
|
if ((c = cvec_find_str(cvv, attribute)) != NULL){
|
|
if ((*val = strdup(c)) == NULL)
|
|
goto done;
|
|
}
|
|
retval = 0;
|
|
done:
|
|
if (cvv)
|
|
cvec_free(cvv);
|
|
return retval;
|
|
}
|
|
|
|
/*! Clean and close all state of restconf process (but dont exit).
|
|
* Cannot use h after this
|
|
* @param[in] h Clixon handle
|
|
*/
|
|
int
|
|
restconf_terminate(clicon_handle h)
|
|
{
|
|
yang_stmt *yspec;
|
|
cvec *nsctx;
|
|
cxobj *x;
|
|
int fs; /* fgcx socket */
|
|
|
|
clicon_debug(1, "%s", __FUNCTION__);
|
|
if ((fs = clicon_socket_get(h)) != -1)
|
|
close(fs);
|
|
clixon_plugin_exit_all(h);
|
|
rpc_callback_delete_all(h);
|
|
clicon_rpc_close_session(h);
|
|
if ((yspec = clicon_dbspec_yang(h)) != NULL)
|
|
yspec_free(yspec);
|
|
if ((yspec = clicon_config_yang(h)) != NULL)
|
|
yspec_free(yspec);
|
|
if ((nsctx = clicon_nsctx_global_get(h)) != NULL)
|
|
cvec_free(nsctx);
|
|
if ((x = clicon_conf_xml(h)) != NULL)
|
|
xml_free(x);
|
|
xpath_optimize_exit();
|
|
restconf_handle_exit(h);
|
|
clicon_log_exit();
|
|
return 0;
|
|
}
|
|
|
|
/*! If RESTCONF insert/point attributes are present, translate to NETCONF
|
|
*
|
|
* @param[in] xdata URI->XML to translate
|
|
* @param[in] qvec Query parameters (eg where insert/point should be)
|
|
* @retval 0 OK
|
|
* @retval -1 Error
|
|
* A difficulty is that RESTCONF 'point' is a complete identity-identifier encoded
|
|
* as an uri-path
|
|
* wheras NETCONF key and value are:
|
|
* The value of the "key" attribute is the key predicates of the full instance identifier
|
|
* the "value" attribute MUST also be used to specify an existing entry in the
|
|
* leaf-list.
|
|
* This means that api-path is first translated to xpath, and then strip everything
|
|
* except the key values (or leaf-list values).
|
|
* Example:
|
|
* RESTCONF URI: point=%2Fexample-jukebox%3Ajukebox%2Fplaylist%3DFoo-One%2Fsong%3D1
|
|
* Leaf example:
|
|
* instance-id: /ex:system/ex:service[ex:name='foo'][ex:enabled='']
|
|
* NETCONF: yang:key="[ex:name='foo'][ex:enabled='']
|
|
* Leaf-list example:
|
|
* instance-id: /ex:system/ex:service[.='foo']
|
|
* NETCONF: yang:value="foo"
|
|
*/
|
|
int
|
|
restconf_insert_attributes(cxobj *xdata,
|
|
cvec *qvec)
|
|
{
|
|
int retval = -1;
|
|
cxobj *xa;
|
|
char *instr;
|
|
char *pstr;
|
|
yang_stmt *y;
|
|
char *attrname;
|
|
int ret;
|
|
char *xpath = NULL;
|
|
cvec *nsc = NULL;
|
|
cbuf *cb = NULL;
|
|
char *p;
|
|
cg_var *cv = NULL;
|
|
|
|
y = xml_spec(xdata);
|
|
if ((instr = cvec_find_str(qvec, "insert")) != NULL){
|
|
/* First add xmlns:yang attribute */
|
|
if (xmlns_set(xdata, "yang", YANG_XML_NAMESPACE) < 0)
|
|
goto done;
|
|
/* Then add insert attribute */
|
|
if ((xa = xml_new("insert", xdata, CX_ATTR)) == NULL)
|
|
goto done;
|
|
if (xml_prefix_set(xa, "yang") < 0)
|
|
goto done;
|
|
if (xml_value_set(xa, instr) < 0)
|
|
goto done;
|
|
}
|
|
if ((pstr = cvec_find_str(qvec, "point")) != NULL){
|
|
if (y == NULL){
|
|
clicon_err(OE_YANG, 0, "Cannot yang resolve %s", xml_name(xdata));
|
|
goto done;
|
|
}
|
|
if (yang_keyword_get(y) == Y_LIST)
|
|
attrname="key";
|
|
else
|
|
attrname="value";
|
|
/* Then add value/key attribute */
|
|
if ((xa = xml_new(attrname, xdata, CX_ATTR)) == NULL)
|
|
goto done;
|
|
if (xml_prefix_set(xa, "yang") < 0)
|
|
goto done;
|
|
if ((ret = api_path2xpath(pstr, ys_spec(y), &xpath, &nsc, NULL)) < 0)
|
|
goto done;
|
|
if ((cb = cbuf_new()) == NULL){
|
|
clicon_err(OE_UNIX, errno, "cbuf_new");
|
|
goto done;
|
|
}
|
|
if (yang_keyword_get(y) == Y_LIST){
|
|
/* translate /../x[] --> []*/
|
|
if ((p = rindex(xpath,'/')) == NULL)
|
|
p = xpath;
|
|
p = index(p, '[');
|
|
cprintf(cb, "%s", p);
|
|
}
|
|
else{ /* LEAF_LIST */
|
|
/* translate /../x[.='x'] --> x */
|
|
if ((p = rindex(xpath,'\'')) == NULL){
|
|
clicon_err(OE_YANG, 0, "Translated api->xpath %s->%s not on leaf-list canonical form: ../[.='x']", pstr, xpath);
|
|
goto done;
|
|
}
|
|
*p = '\0';
|
|
if ((p = rindex(xpath,'\'')) == NULL){
|
|
clicon_err(OE_YANG, 0, "Translated api->xpath %s->%s not on leaf-list canonical form: ../[.='x']", pstr, xpath);
|
|
goto done;
|
|
}
|
|
p++;
|
|
cprintf(cb, "%s", p);
|
|
}
|
|
if (xml_value_set(xa, cbuf_get(cb)) < 0)
|
|
goto done;
|
|
}
|
|
/* Add prefix/namespaces used in attributes */
|
|
cv = NULL;
|
|
while ((cv = cvec_each(nsc, cv)) != NULL){
|
|
char *ns = cv_string_get(cv);
|
|
if (xmlns_set(xdata, cv_name_get(cv), ns) < 0)
|
|
goto done;
|
|
}
|
|
if (nsc)
|
|
xml_sort(xdata); /* Ensure attr is first */
|
|
cprintf(cb, "/>");
|
|
retval = 0;
|
|
done:
|
|
if (xpath)
|
|
free(xpath);
|
|
if (nsc)
|
|
xml_nsctx_free(nsc);
|
|
if (cb)
|
|
cbuf_free(cb);
|
|
return retval;
|
|
}
|
|
|
|
/*! Callback for yang extensions ietf-restconf:yang-data
|
|
* @see ietf-restconf.yang
|
|
* @param[in] h Clixon handle
|
|
* @param[in] yext Yang node of extension
|
|
* @param[in] ys Yang node of (unknown) statement belonging to extension
|
|
* @retval 0 OK, all callbacks executed OK
|
|
* @retval -1 Error in one callback
|
|
*/
|
|
int
|
|
restconf_main_extension_cb(clicon_handle h,
|
|
yang_stmt *yext,
|
|
yang_stmt *ys)
|
|
{
|
|
int retval = -1;
|
|
char *extname;
|
|
char *modname;
|
|
yang_stmt *ymod;
|
|
yang_stmt *yc;
|
|
yang_stmt *yn = NULL;
|
|
|
|
ymod = ys_module(yext);
|
|
modname = yang_argument_get(ymod);
|
|
extname = yang_argument_get(yext);
|
|
if (strcmp(modname, "ietf-restconf") != 0 || strcmp(extname, "yang-data") != 0)
|
|
goto ok;
|
|
clicon_debug(1, "%s Enabled extension:%s:%s", __FUNCTION__, modname, extname);
|
|
if ((yc = yang_find(ys, 0, NULL)) == NULL)
|
|
goto ok;
|
|
if ((yn = ys_dup(yc)) == NULL)
|
|
goto done;
|
|
if (yn_insert(yang_parent_get(ys), yn) < 0)
|
|
goto done;
|
|
ok:
|
|
retval = 0;
|
|
done:
|
|
return retval;
|
|
}
|
|
|
|
/*! Extract uri-encoded uri-path from fastcgi parameters
|
|
* Use REQUEST_URI parameter and strip ?args
|
|
* REQUEST_URI have args and is encoded
|
|
* eg /interface=eth%2f0%2f0?insert=first
|
|
* DOCUMENT_URI dont have args and is not encoded
|
|
* eg /interface=eth/0/0
|
|
* causes problems with eg /interface=eth%2f0%2f0
|
|
*/
|
|
char *
|
|
restconf_uripath(clicon_handle h)
|
|
{
|
|
char *path;
|
|
char *q;
|
|
|
|
path = restconf_param_get(h, "REQUEST_URI");
|
|
if ((q = index(path, '?')) != NULL)
|
|
*q = '\0';
|
|
return path;
|
|
}
|
|
|
|
/*! Drop privileges from root to user (or already at user)
|
|
* @param[in] h Clicon handle
|
|
* @param[in] user Drop to this level
|
|
* Group set to clicon to communicate with backend
|
|
*/
|
|
int
|
|
restconf_drop_privileges(clicon_handle h,
|
|
char *user)
|
|
{
|
|
int retval = -1;
|
|
uid_t newuid = -1;
|
|
uid_t uid;
|
|
char *group;
|
|
gid_t gid = -1;
|
|
|
|
clicon_debug(1, "%s", __FUNCTION__);
|
|
/* Sanity check: backend group exists */
|
|
if ((group = clicon_sock_group(h)) == NULL){
|
|
clicon_err(OE_FATAL, 0, "clicon_sock_group option not set");
|
|
return -1;
|
|
}
|
|
if (group_name2gid(group, &gid) < 0){
|
|
clicon_log(LOG_ERR, "'%s' does not seem to be a valid user group." /* \n required here due to multi-line log */
|
|
"The config demon requires a valid group to create a server UNIX socket\n"
|
|
"Define a valid CLICON_SOCK_GROUP in %s or via the -g option\n"
|
|
"or create the group and add the user to it. Check documentation for how to do this on your platform",
|
|
group,
|
|
clicon_configfile(h));
|
|
goto done;
|
|
}
|
|
/* Get (wanted) new www user id */
|
|
if (name2uid(user, &newuid) < 0){
|
|
clicon_err(OE_DAEMON, errno, "'%s' is not a valid user .\n", user);
|
|
goto done;
|
|
}
|
|
/* get current backend userid, if already at this level OK */
|
|
if ((uid = getuid()) == newuid)
|
|
goto ok;
|
|
if (uid != 0){
|
|
clicon_err(OE_DAEMON, EPERM, "Privileges can only be dropped from root user (uid is %u)\n", uid);
|
|
goto done;
|
|
}
|
|
if (setgid(gid) == -1) {
|
|
clicon_err(OE_DAEMON, errno, "setgid %d", gid);
|
|
goto done;
|
|
}
|
|
if (drop_priv_perm(newuid) < 0)
|
|
goto done;
|
|
/* Verify you cannot regain root privileges */
|
|
if (setuid(0) != -1){
|
|
clicon_err(OE_DAEMON, EPERM, "Could regain root privilieges");
|
|
goto done;
|
|
}
|
|
clicon_debug(1, "%s dropped privileges from root to %s(%d)",
|
|
__FUNCTION__, user, newuid);
|
|
ok:
|
|
retval = 0;
|
|
done:
|
|
return retval;
|
|
}
|
|
|
|
/*!
|
|
* @param[in] h Clicon handle
|
|
* @param[in] req Generic Www handle (can be part of clixon handle)
|
|
* @retval -1 Error
|
|
* @retval 0 Not authenticated
|
|
* @retval 1 Authenticated
|
|
*/
|
|
int
|
|
restconf_authentication_cb(clicon_handle h,
|
|
void *req,
|
|
int pretty,
|
|
restconf_media media_out)
|
|
{
|
|
int retval = -1;
|
|
clixon_auth_type_t auth_type;
|
|
int authenticated;
|
|
int ret;
|
|
char *username = NULL;
|
|
cxobj *xret = NULL;
|
|
cxobj *xerr;
|
|
char *anonymous = NULL;
|
|
|
|
auth_type = restconf_auth_type_get(h);
|
|
clicon_debug(1, "%s auth-type:%s", __FUNCTION__, clixon_auth_type_int2str(auth_type));
|
|
ret = 0;
|
|
authenticated = 0;
|
|
/* ret: -1 Error, 0: Ignore/not handled, 1: OK see authenticated parameter */
|
|
if ((ret = clixon_plugin_auth_all(h, req,
|
|
auth_type,
|
|
&authenticated,
|
|
&username)) < 0)
|
|
goto done;
|
|
if (ret == 1){ /* OK, tag username to handle */
|
|
if (authenticated == 1)
|
|
clicon_username_set(h, username);
|
|
}
|
|
else { /* Default behaviour */
|
|
switch (auth_type){
|
|
case CLIXON_AUTH_NONE:
|
|
/* if not handled by callback, use anonymous user */
|
|
if ((anonymous = clicon_option_str(h, "CLICON_ANONYMOUS_USER")) == NULL){
|
|
break; /* not authenticated */
|
|
}
|
|
clicon_username_set(h, anonymous);
|
|
authenticated = 1;
|
|
break;
|
|
case CLIXON_AUTH_CLIENT_CERTIFICATE: {
|
|
char *cn;
|
|
/* Check for cert subject common name (CN) */
|
|
if ((cn = restconf_param_get(h, "SSL_CN")) != NULL){
|
|
clicon_username_set(h, cn);
|
|
authenticated = 1;
|
|
}
|
|
break;
|
|
}
|
|
case CLIXON_AUTH_USER:
|
|
authenticated = 0;
|
|
break;
|
|
}
|
|
}
|
|
if (authenticated == 0){ /* Message is not authenticated (401 returned) */
|
|
if (netconf_access_denied_xml(&xret, "protocol", "The requested URL was unauthorized") < 0)
|
|
goto done;
|
|
if ((xerr = xpath_first(xret, NULL, "//rpc-error")) != NULL){
|
|
if (api_return_err(h, req, xerr, pretty, media_out, 0) < 0)
|
|
goto done;
|
|
goto notauth;
|
|
}
|
|
retval = 0;
|
|
goto notauth;
|
|
}
|
|
/* If set but no user, set a dummy user */
|
|
retval = 1;
|
|
done:
|
|
clicon_debug(1, "%s retval:%d authenticated:%d user:%s",
|
|
__FUNCTION__, retval, authenticated, clicon_username_get(h));
|
|
if (username)
|
|
free(username);
|
|
if (xret)
|
|
xml_free(xret);
|
|
return retval;
|
|
notauth:
|
|
retval = 0;
|
|
goto done;
|
|
}
|
|
|
|
/*! Basic config init
|
|
* @param[in] h Clixon handle
|
|
* @param[in] xrestconf XML config containing clixon-restconf top-level
|
|
* @retval -1 Error
|
|
* @retval 0 Restconf is disable
|
|
* @retval 1 OK
|
|
*/
|
|
int
|
|
restconf_config_init(clicon_handle h,
|
|
cxobj *xrestconf)
|
|
{
|
|
int retval = -1;
|
|
char *enable;
|
|
cxobj *x;
|
|
char *bstr;
|
|
cvec *nsc = NULL;
|
|
clixon_auth_type_t auth_type;
|
|
|
|
if ((x = xpath_first(xrestconf, nsc, "enable")) != NULL &&
|
|
(enable = xml_body(x)) != NULL){
|
|
if (strcmp(enable, "false") == 0){
|
|
clicon_debug(1, "%s restconf disabled", __FUNCTION__);
|
|
goto disable;
|
|
}
|
|
}
|
|
/* get common fields */
|
|
if ((x = xpath_first(xrestconf, nsc, "auth-type")) != NULL &&
|
|
(bstr = xml_body(x)) != NULL){
|
|
if ((auth_type = clixon_auth_type_str2int(bstr)) < 0){
|
|
clicon_err(OE_CFG, EFAULT, "Invalid restconf auth-type: %s", bstr);
|
|
goto done;
|
|
}
|
|
restconf_auth_type_set(h, auth_type);
|
|
}
|
|
if ((x = xpath_first(xrestconf, nsc, "pretty")) != NULL &&
|
|
(bstr = xml_body(x)) != NULL){
|
|
/* XXX redirection to (obsolete) option, fix by replacing its accesses */
|
|
clicon_option_str_set(h, "CLICON_RESTCONF_PRETTY", bstr);
|
|
}
|
|
if ((x = xpath_first(xrestconf, nsc, "fcgi-socket")) != NULL &&
|
|
(bstr = xml_body(x)) != NULL){
|
|
/* XXX redirection to (obsolete) option, fix by replacing its accesses */
|
|
clicon_option_str_set(h, "CLICON_RESTCONF_PATH", bstr);
|
|
}
|
|
retval = 1;
|
|
done:
|
|
return retval;
|
|
disable:
|
|
retval = 0;
|
|
goto done;
|
|
}
|