ModSecurity/tools/rules-check/rules-check.cc
Felipe Zimmerle 9f47f1473c
Removes memory leaks on the parse
- Parser location is now a custom class. It holds a shared pointer
  with the file name; If the parser fails, the resource is deleted.

 - To follow the parser change, the Rule class now holds the file
  name in a shared pointer instead of a unique pointer. As a shared
  pointer we avoid duplication of the file name in memory, plus,
  it frees itself when not in use anymore.

 - Operator init also accepting the filename as a shared pointer.

 - Driver is treating m_location was privative. Now it holds a
  std::list<std::shared_ptr<yy::seclang_parser::location_type>>
  instead of: std::list<yy::seclang_parser::location_type *>.

 - Fix: addSecRule on Driver() was changed from RuleWithAction to
  RuleWithOperator.

 - Minor changes on the regression and rules-check utility to force
  deletion of resources even when they fail.

 - Couple of virtual destructors were placed to force the shared
  pointer decrementing on shared variables.

 - Deleted constructors for copy were placed for the sake of
  readability.
2021-01-12 13:01:26 -03:00

112 lines
2.7 KiB
C++

/*
* ModSecurity, http://www.modsecurity.org/
* Copyright (c) 2015 - 2020 Trustwave Holdings, Inc. (http://www.trustwave.com/)
*
* You may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* If any of the files related to licensing are missing or if you have any
* other questions related to licensing please contact Trustwave Holdings, Inc.
* directly using the email address security@modsecurity.org.
*
*/
#include <string.h>
#include <sys/stat.h>
#include <unistd.h>
#include <ctime>
#include <iostream>
#include <string>
#include "modsecurity/rules_set.h"
#include "modsecurity/modsecurity.h"
void print_help(const char *name) {
std::cout << "Use: " << name << " [<filename>|SecLangCommand]" << std::endl;
std::cout << std::endl;
}
int main(int argc, char **argv) {
modsecurity::RulesSet *rules;
char **args = argv;
rules = new modsecurity::RulesSet();
int ret = 0;
args++;
if (*args == NULL) {
print_help(argv[0]);
goto ret;
}
while (*args != NULL) {
struct stat buffer;
std::string argFull("");
const char *arg = *args;
std::string err;
int r;
if (argFull.empty() == false) {
if (arg[strlen(arg)-1] == '\"') {
argFull.append(arg, strlen(arg)-1);
goto next;
} else {
argFull.append(arg);
goto next;
}
}
if (arg[0] == '\"' && argFull.empty() == true) {
if (arg[strlen(arg)-1] == '\"') {
argFull.append(arg+1, strlen(arg) - 2);
} else {
argFull.append(arg+1);
goto next;
}
}
if (argFull.empty() == false) {
arg = strdup(argFull.c_str());
argFull.clear();
}
std::cout << " : " << arg << " -- ";
if (stat(arg, &buffer) == 0) {
r = rules->loadFromUri(arg);
} else {
r = rules->load(arg);
}
if (r < 0) {
err.assign(rules->m_parserError.str());
rules->m_parserError.str("");
rules->m_parserError.clear();
ret = -1;
}
std::cout << "Loaded " << std::to_string(r) << " rules." << std::endl;
if (err.empty() == false) {
std::cerr << " " << err << std::endl;
goto end;
}
rules->dump();
next:
args++;
}
end:
if (ret < 0) {
std::cout << "Test failed." << std::endl;
} else {
std::cout << "Test ok." << std::endl;
}
ret:
delete rules;
return ret;
}