# Copyright 2002-2011 Nick Mathewson.  See LICENSE for licensing information.
 
"""Configuration file parsers for Mixminion client and server
   configuration.
 
   A configuration file consists of one or more Sections.  Each Section
   has a header and optionally a list of Entries.  Each Entry has a key
   and a value.
 
   A section header is written as an open bracket, an identifier, and a
   close bracket.  An entry is written as a key, followed optionally by
   a colon or an equal sign, followed by a value.  Values may be split
   across multiple lines as in RFC822.
 
   Empty lines are permitted between entries, and between entries and
   headers.  Comments are permitted on lines beginning with a '#'.
 
   All identifiers are case-sensitive.
 
   Because of cross-platform stupidity, we recognize any sequence of [\r\n]
   as a newline, and who's to tell us we can't?
 
   Example:
 
   [Section1]
 
   Key1 value1
   Key2: Value2 value2 value2
        value2 value2
   Key3 = value3
   # A comment
   Key4=value4
   [Section2]
   Key5 value5
      value5 value5 value5
 
   We also specify a 'restricted' format in which blank lines,
   comments,  line continuations, and entry formats other than 'key: value'
   are forbidden.  Example:
 
   [Section1]
   Key1: Value1
   Key2: Value2
   Key3: Value3
   [Section2]
   Key4: Value4
 
   The restricted format is used for server descriptors.
   """
 
__all__ = [ 'ConfigError', 'ClientConfig' ]
 
import calendar
import binascii
import os
import re
import sys
try:
    import pwd
except ImportError:
    pwd = None
 
import mixminion.Common
import mixminion.Crypto
import mixminion.NetUtils
 
from mixminion.Common import MixError, LOG, ceilDiv, englishSequence, \
     formatBase64, isPrintingAscii, stripSpace, stringContains, UIError
 
class ConfigError(MixError):
    """Thrown when an error is found in a configuration file."""
    pass
 
#----------------------------------------------------------------------
# Validation functions.  These are used to convert values as they appear
# in configuration files and server descriptors into corresponding Python
# objects, and validate their formats
 
def _parseBoolean(boolean):
    """Entry validation function.  Converts a config value to a boolean.
       Raises ConfigError on failure."""
    s = boolean.strip().lower()
    if s in ("1", "yes", "y", "true", "on"):
        return 1
    elif s not in ("0", "no", "n", "false", "off"):
        raise ConfigError("Invalid boolean %r" % (boolean))
    else:
        return 0
 
def _parseSeverity(severity):
    """Validation function.  Converts a config value to a log severity.
       Raises ConfigError on failure."""
    s = severity.strip().upper()
    if not mixminion.Common._SEVERITIES.has_key(s):
        raise ConfigError("Invalid log level %r" % (severity))
    return s
 
def _parseServerMode(mode):
    """Validation function.  Converts a config value to a server mode
       (one of 'relay' or 'local'). Raises ConfigError on failure."""
    s = mode.strip().lower()
    if s not in ('relay', 'local'):
        raise ConfigError("Server mode must be 'Relay' or 'Local'")
    return s
 
# re to match strings of the form '9 seconds', '1 month', etc.
_interval_re = re.compile(r'''^(\d+\.?\d*|\.\d+)\s+
                   (sec|second|min|minute|hour|day|week|mon|month|year)s?$''',
                          re.X)
_seconds_per_unit = {
    'second': 1,
    'sec':    1,
    'minute': 60,
    'min':    60,
    'hour':   60*60,
    'day':    60*60*24,
    'week':   60*60*24*7,
    'mon':    60*60*24*30,
    'month':  60*60*24*30,    # These last two aren't quite right, but we
    'year':   60*60*24*365,   # don't need exactness.
    }
_canonical_unit_names = { 'sec' : 'second', 'min': 'minute', 'mon' : 'month' }
def _parseInterval(interval):
    """Validation function.  Converts a config value to an interval of time,
       returning a Duration object. Raises ConfigError on failure."""
    inter = interval.strip().lower()
    m = _interval_re.match(inter)
    if not m:
        raise ConfigError("Unrecognized interval %r" % inter)
    num, unit = m.group(1), m.group(2)
    if '.' in num:
        num = float(num)
    else:
        num = int(num)
    nsec = int(num * _seconds_per_unit[unit])
    return mixminion.Common.Duration(nsec,
                    _canonical_unit_names.get(unit,unit), num)
 
def _parseIntervalList(s):
    """Validation functions. Parse a list of comma-separated intervals
       in the form ((every)? INTERVAL for INTERVAL)|INTERVAL into a list
       of interval lengths in seconds."""
    items = s.strip().lower().split(",")
    ilist = []
    for item in items:
        item = item.strip()
        if stringContains(item, " for "):
            if item.startswith("every "):
                item = item[6:]
            interval, duration = item.split(" for ", 1)
            interval = int(_parseInterval(interval))
            duration = int(_parseInterval(duration))
            if interval < 1:
                raise ConfigError("Repeated interval too small in %s"%s)
 
            ilist += [interval] * ceilDiv(duration, interval)
        elif item.startswith("every "):
            raise ConfigError(
                "Bad syntax on interval %s. (Did you mean %s for X days?)",
                item, item)
        else:
            interval = int(_parseInterval(item))
            ilist.append(interval)
    return ilist
 
def _unparseIntervalList(lst):
    """Helper function: given an interval list, converts it back to the
       expected format."""
    if lst == []:
        return ""
    r = [ (lst[0], 1) ]
    for dur in lst[1:]:
        if dur == r[-1][0]:
            r[-1] = (dur, r[-1][1]+1)
        else:
            r.append((dur,1))
    result = []
    for dur, reps in r:
        d = mixminion.Common.Duration(dur)
        t = mixminion.Common.Duration(dur*reps)
        d.reduce()
        t.reduce()
        if reps>1:
            result.append("every %s for %s"%(d,t))
        else:
            result.append(str(d))
    return ", ".join(result)
 
def _parseList(s):
    """Validation function.  Parse a comma-separated list of strings."""
    return [ item.strip() for item in s.split(",") ]
 
def _parseSeq(s):
    """Validation function.  Parse a space-separated list of strings."""
    return [ item.strip() for item in s.split() ]
 
def _parseInt(integer):
    """Validation function.  Converts a config value to an int.
       Raises ConfigError on failure."""
    i = integer.strip()
    try:
        return int(i)
    except ValueError:
        raise ConfigError("Expected an integer but got %r" % (integer))
 
# regular expression to match a size.
_size_re = re.compile(r'^(\d+\.?\d*|\.\d+)\s*(k|kb|m|mb|b|byte|octet|)s?')
_size_name_map = { '' : 1L, 'b' : 1L, 'byte' : 1L, 'octet' : 1L,
                   'k' : 1L<<10, 'kb' : 1L<<10,
                   'm' : 1L<<20, 'mb' : 1L<<20,
                   'g' : 1L<<30, 'gb' : 1L<<30 }
def _parseSize(size):
    """Validation function.  Converts a config value to a size in octets.
       Raises ConfigError on failure."""
    s = size.strip().lower()
    m = _size_re.match(s)
    if not m: raise ConfigError("Invalid size %r"%size)
    val = m.group(1)
    unit = _size_name_map[m.group(2)]
    if '.' in val:
        return long(float(val)*unit)
    else:
        return long(val)*unit
 
def _unparseSize(size):
    names = ["b", "KB", "MB", "GB"]
    idx = 0
    while 1:
        if (size & 1023)!=0 or names[idx] == "GB":
            return "%s %s"%(size,names[idx])
        else:
            idx += 1
            size >>= 10
    raise AssertionError # unreached
 
def _parseIP(ip):
    """Validation function.  Converts a config value to an IP address.
       Raises ConfigError on failure."""
    try:
        return mixminion.NetUtils.normalizeIP4(ip)
    except ValueError, e:
        raise ConfigError(str(e))
 
def _parseIP6(ip6):
    """Validation function.  Converts a config value to an IP address.
       Raises ConfigError on failure."""
    try:
        return mixminion.NetUtils.normalizeIP6(ip6)
    except ValueError, e:
        raise ConfigError(str(e))
 
def _parseHost(host):
    """Validation function.  Checks a config value as a valid hostname.
       Raises ConfigError on failure."""
    host = host.strip()
    if not mixminion.Common.isPlausibleHostname(host):
        raise ConfigError("%r doesn't look like a valid hostname"%host)
    return host
 
# Regular expression to match 'address sets' as used in Allow/Deny
# configuration lines. General format is "<IP|*> ['/'MASK] [PORT['-'PORT]]"
_address_set_re = re.compile(r'''^(\d+\.\d+\.\d+\.\d+|\*)
                                 \s*
                                 (?:/\s*(\d+\.\d+\.\d+\.\d+))?\s*
                                 (?:(\d+)\s*
                                           (?:-\s*(\d+))?
                                        )?$''',re.X)
def _parseAddressSet_allow(s, allowMode=1):
    """Validation function.  Converts an address set string of the form
       'IP/mask port-port' into a tuple of (IP, Mask, Portmin, Portmax).
       Raises ConfigError on failure."""
    s = s.strip()
    m = _address_set_re.match(s)
    if not m:
        raise ConfigError("Misformatted address rule %r" % s)
    ip, mask, port, porthi = m.groups()
    if ip == '*':
        if mask != None:
            raise ConfigError("Misformatted address rule %r" % s)
        ip,mask = '0.0.0.0','0.0.0.0'
    else:
        ip = _parseIP(ip)
    if mask:
        mask = _parseIP(mask)
    else:
        mask = "255.255.255.255"
    if port:
        port = _parseInt(port)
        if porthi:
            porthi = _parseInt(porthi)
        else:
            porthi = port
        if not 1 <= port <= porthi <= 65535:
            raise ConfigError("Invalid port range %s-%s" %(port,porthi))
    elif allowMode:
        port = porthi = 48099
    else:
        port, porthi = 0, 65535
 
    return (ip, mask, port, porthi)
 
def _parseAddressSet_deny(s):
    return _parseAddressSet_allow(s,0)
 
def _parseEmail(s):
    s = s.strip()
    if not mixminion.Common.isSMTPMailbox(s):
        raise ConfigError("%r is not a valid email address."%s)
    return s
 
def _parseCommand(command):
    """Validation function.  Converts a config value to a shell command of
       the form (fname, optionslist). Raises ConfigError on failure."""
    c = command.strip().split()
    if not c:
        raise ConfigError("Invalid command %r" %command)
    cmd, opts = c[0], c[1:]
    if os.path.isabs(cmd):
        if not os.path.exists(cmd):
            raise ConfigError("Executable file not found: %s" % cmd)
        else:
            return cmd, opts
    else:
        # Path is relative
        for p in os.environ.get('PATH', os.defpath).split(os.pathsep):
            p = os.path.expanduser(p)
            c = os.path.join(p, cmd)
            if os.path.exists(c):
                return c, opts
 
        raise ConfigError("No match found for command %r" %cmd)
 
def _parseBase64(s,_hexmode=0):
    """Validation function.  Converts a base-64 encoded config value into
       its original. Raises ConfigError on failure."""
    try:
        if _hexmode:
            s = stripSpace(s)
            return binascii.a2b_hex(s)
        else:
            return binascii.a2b_base64(s)
    except (TypeError, binascii.Error, binascii.Incomplete):
        if _hexmode:
            raise ConfigError("Invalid hexadecimal data")
        else:
            raise ConfigError("Invalid Base64 data")
 
def _parseHex(s):
    """Validation function.  Converts a hex-64 encoded config value into
       its original. Raises ConfigError on failure."""
    return _parseBase64(s,1)
 
def _parsePublicKey(s):
    """Validate function.  Converts a Base-64 encoding of an ASN.1
       represented RSA public key with modulus 65537 into an RSA
       object."""
    asn1 = _parseBase64(s)
    if len(asn1) > 550:
        raise ConfigError("Overlong public key")
    try:
        key = mixminion.Crypto.pk_decode_public_key(asn1)
    except mixminion.Crypto.CryptoError:
        raise ConfigError("Invalid public key")
    if key.get_exponent() != 65537:
        raise ConfigError("Invalid exponent on public key")
    return key
 
# FFFF008 stop accepting YYYY/MM/DD.  We've generated the right thing
# FFFF008 since 0.0.6.
# Regular expression to match YYYY/MM/DD or YYYY-MM-DD
_date_re = re.compile(r"^(\d\d\d\d)([/-])(\d\d)([/-])(\d\d)$")
def _parseDate(s):
    """Validation function.  Converts from YYYY-MM-DD or YYYY/MM/DD
       format to a (long) time value for midnight on that date."""
    m = _date_re.match(s.strip())
    if not m or m.group(2) != m.group(4):
        raise ConfigError("Invalid date %r"%s)
    try:
        yyyy = int(m.group(1))
        MM = int(m.group(3))
        dd = int(m.group(5))
    except (ValueError,AttributeError):
        raise ConfigError("Invalid date %r"%s)
    if not ((1 <= dd <= 31) and (1 <= MM <= 12) and
            (1970 <= yyyy)):
        raise ConfigError("Invalid date %r"%s)
    return calendar.timegm((yyyy,MM,dd,0,0,0,0,0,0))
 
# Regular expression to match YYYY-MM-DD HH:MM:SS
_time_re = re.compile(r"^(\d\d\d\d)-(\d\d)-(\d\d)\s+"
                      r"(\d\d):(\d\d):(\d\d)((?:\.\d\d\d)?)$")
def _parseTime(s):
    """Validation function.  Converts from YYYY-MM-DD HH:MM:SS format
       to a (float) time value for GMT."""
    m = _time_re.match(s.strip())
    if not m:
        raise ConfigError("Invalid format for time")
 
    yyyy = int(m.group(1))
    MM = int(m.group(2))
    dd = int(m.group(3))
    hh = int(m.group(4))
    mm = int(m.group(5))
    ss = int(m.group(6))
    if m.group(7):
        fsec = float(m.group(7))
    else:
        fsec = 0.0
 
    if not ((1 <= dd <= 31) and (1 <= MM <= 12) and
            (1970 <= yyyy)  and (0 <= hh < 24) and
            (0 <= mm < 60)  and (0 <= ss <= 61)):
        raise ConfigError("Invalid time %r" % s)
 
    return calendar.timegm((yyyy,MM,dd,hh,mm,ss,0,0,0))+fsec
 
_NICKNAME_CHARS = ("ABCDEFGHIJKLMNOPQRSTUVWXYZ"+
                   "abcdefghijklmnopqrstuvwxyz"+
                   "0123456789-")
_NICKNAME_INITIAL_CHARS = ("ABCDEFGHIJKLMNOPQRSTUVWXYZ"+
                           "abcdefghijklmnopqrstuvwxyz")
 
MAX_NICKNAME = 24
def _parseNickname(s):
    """Validation function.  Returns true iff s contains a valid
       server nickname -- that is, a string of 1..128 characters,
       containing only the characters [A-Za-z0-9], or '-'.  It must
       not begin with a digit or a '-'.
       """
    s = s.strip()
    bad = s.translate(mixminion.Common._ALLCHARS, _NICKNAME_CHARS)
    if len(bad):
        raise ConfigError("Invalid characters %r in nickname %r" % (bad,s))
    if len(s) > MAX_NICKNAME:
        raise ConfigError("Nickname is too long")
    elif len(s) == 0:
        raise ConfigError("Nickname is too short")
    elif s[0] not in _NICKNAME_INITIAL_CHARS:
        raise ConfigError("Nickname begins with invalid character %r" %s[0])
    return s
 
def _parseFilename(s):
    """Validation function.  Matches a filename, expanding tildes as
       appropriate"""
    s = s.strip()
    if s[0] in "\"'":
        if s[-1] != s[0]:
            raise ConfigError("Mismatched quotes")
        s = s[1:-1]
 
    return os.path.expanduser(s)
 
def _parseUser(s):
    """Validation function.  Matches a username or UID.  Returns a UID."""
    s = s.strip()
    try:
        return pwd.getpwnam(s)[2]
    except (KeyError,AttributeError):
        try:
            return _parseInt(s)
        except ConfigError:
            raise ConfigError("Expected a user name or UID, but got %r"%s)
 
#----------------------------------------------------------------------
 
# Regular expression to match a section header.
_section_re = re.compile(r'\[\s*([^\s\]]+)\s*\]')
# Regular expression to match the first line of an entry
_entry_re = re.compile(r'([^:= \t]+)(?:\s*[:=]|[ \t])\s*(.*)')
# Regular expression to match bogus line endings.
_abnormal_line_ending_re = re.compile(r'\r\n?')
 
def _readConfigFile(contents):
    """Helper function. Given the string contents of a configuration
       file, returns a list of (SECTION-NAME, SECTION) tuples, where
       each SECTION is a list of (KEY, VALUE, LINENO) tuples.
 
       Throws ConfigError if the file is malformatted.
    """
    # List of (heading, [(key, val, lineno), ...])
    sections = []
    # [(key, val, lineno)] for the current section.
    curSection = None
    # Current line number
    lineno = 0
 
    # Make sure all characters in the file are ASCII.
    if not isPrintingAscii(contents):
        raise ConfigError("Invalid characters in file")
 
    fileLines = contents.split("\n")
    if fileLines[-1] == '':
        del fileLines[-1]
 
    for line in fileLines:
        lineno += 1
        if line == '':
            continue
        space = line[0] and line[0] in ' \t'
        line = line.strip()
        if line == '' or line[0] == '#':
            continue
        elif space:
            try:
                lastLine = curSection[-1]
                curSection[-1] = (lastLine[0],
                                  "%s %s" % (lastLine[1], line),lastLine[2])
            except (IndexError, TypeError):
                raise ConfigError("Unexpected indentation at line %s" %lineno)
        elif line[0] == '[':
            m = _section_re.match(line)
            curSection = [ ]
            sections.append( (m.group(1), curSection) )
        else:
            m = _entry_re.match(line)
            if not m:
                raise ConfigError("Bad entry at line %s"%lineno)
            try:
                curSection.append( (m.group(1), m.group(2), lineno) )
            except AttributeError:
                raise ConfigError("Unknown section at line %s" % lineno)
 
    return sections
 
def _readRestrictedConfigFile(contents):
    """Same interface as _readConfigFile, but only supports the restrictd
       file format as used by directories and descriptors."""
    # List of (heading, [(key, val, lineno), ...])
    sections = []
    # [(key, val, lineno)] for the current section.
    curSection = None
    # Current line number
    lineno = 0
 
    # Make sure all characters in the file are ASCII.
    if not isPrintingAscii(contents):
        raise ConfigError("Invalid characters in file")
 
    fileLines = contents.split("\n")
    if fileLines[-1] == '':
        del fileLines[-1]
 
    if len(fileLines) == 1 and fileLines[0].strip() == '':
        raise ConfigError("File is empty")
 
    for line in fileLines:
        lineno += 1
        line = line.strip()
        if line == '' or line[0] == '#':
            raise ConfigError("Empty line not allowed at line %s"%lineno)
        elif line[0] == '[':
            m = _section_re.match(line)
            if not m:
                raise ConfigError("Bad section declaration at line %s"%lineno)
            curSection = [ ]
            sections.append( (m.group(1), curSection) )
        else:
            colonIdx = line.find(':')
            if colonIdx >= 1:
                try:
                    curSection.append( (line[:colonIdx].strip(),
                                        line[colonIdx+1:].strip(), lineno) )
                except AttributeError:
                    raise ConfigError("Unknown section at line %s" % lineno)
            else:
                raise ConfigError("Bad Entry at line %s" % lineno)
 
    return sections
 
def _formatEntry(key,val,w=79,ind=4,strict=0):
    """Helper function.  Given a key/value pair, returns a NL-terminated
       entry for inclusion in a configuration file, such that no line is
       avoidably longer than 'w' characters, and with continuation lines
       indented by 'ind' spaces.
    """
    if strict or len(str(val))+len(key)+2 <= 79:
        return "%s: %s\n" % (key,val)
 
    ind_s = " "*(ind-1)
    lines = [  ]
    linecontents = [ "%s:" % key ]
    linelength = len(linecontents[0])
    for v in val.split(" "):
        if linelength+1+len(v) <= w:
            linecontents.append(v)
            linelength += 1+len(v)
        else:
            lines.append(" ".join(linecontents))
            linecontents = [ ind_s, v ]
            linelength = ind+len(v)
    lines.append(" ".join(linecontents))
    lines.append("") # so the last line ends with \n
    return "\n".join(lines)
 
def resolveFeatureName(name, klass):
    """Given a feature name and a subclass of _ConfigFile, check whether
       the feature exists, and return a sec/name tuple that, when passed to
       _ConfigFile.getFeature, gives the value of the appropriate feature.
       Raises a UIError if the feature name is invalid.
 
       A feature is either: a special string handled by the class (like
       'caps' for ServerInfo), a special string handled outside the class
       (like 'status' for ClientDirectory), a Section:Entry string, or an
       Entry string.  (If the Entry string is not unique within a section,
       raises UIError.)  All features are case-insensitive.
 
       Example features are: 'caps', 'status', 'Incoming/MMTP:Version',
         'hostname'.
       """
    syn = klass._syntax
    name = name.lower()
    if klass._features.has_key(name):
        return "-", name
    elif ':' in name:
        idx = name.index(':')
        sec, ent = name[:idx], name[idx+1:]
        goodSection = None
        for section, entries in syn.items():
            if section.lower() == sec:
                goodSection = section
                for entry in entries.keys():
                    if entry.lower() == ent:
                        return section, entry
        if goodSection:
            raise UIError("Section %s has no entry %r"%(goodSection,ent))
        else:
            raise UIError("No such section as %s"%sec)
    else:
        result =  []
        for secname, secitems in syn.items():
            if secname.lower() == name:
                raise UIError("No key given for section %s"%secname)
            for entname in secitems.keys():
                if entname.lower() == name:
                    result.append((secname, entname))
        if len(result) == 0:
            raise UIError("No key named %r found"%name)
        elif len(result) > 1:
            secs = [ "%s:%s"%(secname,entname) for secname,entname
                     in result ]
            raise UIError("%r is ambiguous.  Did you mean %s?"%(
                          name, englishSequence(secs,compound="or")))
        else:
            return result[0]
 
def getFeatureList(klass):
    """Get a list of all feature names from the _ConfigFile subclass
       'klass'.  Return a list of tuples, each of which contains all the
       synonyms for a single feature."""
    syn = klass._syntax
    features = []
    for secname, secitems in syn.items():
        for entname in secitems.keys():
            if entname.startswith("__"): continue
            synonyms = []
            synonyms.append("%s:%s"%(secname,entname))
            unique = 1
            for sn, si in syn.items():
                if sn != secname and si.has_key(entname):
                    unique = 0
                    break
            if unique:
                synonyms.append(entname)
            features.append(tuple(synonyms))
    features.sort()
    return features
 
class _ConfigFile:
    """Base class to parse, validate, and represent configuration files.
    """
    ##Fields:
    #  fname: Name of the underlying file.  Used by .reload()
    #  _sections: A map from secname->key->value.
    #  _sectionEntries: A  map from secname->[ (key, value) ] inorder.
    #  _sectionNames: An inorder list of secnames.
    #  _callbacks: A map from section name to a callback function that should
    #      be invoked with (section,sectionEntries) after each section is
    #      read.  This shouldn't be used for validation; it's for code that
    #      needs to change the semantics of the parser.
    #
    # Fields to be set by a subclass:
    #     _syntax is map from sec->{key:
    #                               (ALLOW/REQUIRE/ALLOW*/REQUIRE*/IGNORE,
    #                                 type,
    #                                 default, ) }
    #     _restrictFormat is 1/0: do we allow full RFC822ness, or do
    #         we insist on a tight data format?
    #     _restrictKeys is 1/0: do we raise a ConfigError when we see an
    #         unrecognized key, or do we simply generate a warning?
    #     _restrictSections is 1/0: do we raise a ConfigError when we see an
    #         unrecognized section, or do we simply generate a warning?
    #     _features is a map from lowercase feature name to 1 for
    #         features that should be handled by getFeature.
 
    ## Validation rules:
    # A key without a corresponding entry in _syntax gives an error.
    # A section without a corresponding entry is ignored.
    # ALLOW* and REQUIRE* permit multiple entries with for a given key:
    #   these entries are read into a list.
    # The magic key __SECTION__ describes whether a section is requried.
    # If parseFn is not None, it is invoked on the entry in order to
    #   get a value.  Otherwise, the value is string value of the entry.
    # If the entry is (permissibly) absent, and default is set, then
    #   the entry's value will be set to default.  Otherwise, the value
    #   will be set to None.
 
    CODING_FNS = {
        "boolean" :  (_parseBoolean, lambda b: b and "yes" or "no"),
        "severity" : (_parseSeverity, str),
        "serverMode"  : (_parseServerMode, str),
        "interval" : (_parseInterval, str),
        "intervalList" : (_parseIntervalList, _unparseIntervalList),
        "int" : (_parseInt, str),
        "size" : (_parseSize, _unparseSize),
        "IP" : (_parseIP, str),
        "IP6" : (_parseIP6, str),
        "host" : (_parseHost, str),
        "list" : (_parseList, ",".join),
        "seq" : (_parseSeq, " ".join),
        "addressSet_allow" : (_parseAddressSet_allow, str), #XXXX
        "addressSet_deny" : (_parseAddressSet_deny, str), #XXXX
        "command" : (_parseCommand, lambda c,o: " ".join([c," ".join(o)])),
        "base64" : (_parseBase64, mixminion.Common.formatBase64),
        "hex" : (_parseHex, binascii.b2a_hex),
        "publicKey" : (_parsePublicKey, lambda r: "<public key>"),
        "date" : (_parseDate, mixminion.Common.formatDate),
        "time" : (_parseTime, mixminion.Common.formatTime),
        "nickname" : (_parseNickname, str),
        "filename" : (_parseFilename, str),
        "user" : (_parseUser, str),
        "email" : (_parseEmail, str),
        }
 
    _syntax = None
    _features = {}
    _restrictFormat = 0
    _restrictKeys = 1
    _restrictSections = 1
 
    def __init__(self, filename=None, string=None, assumeValid=0, keep=0):
        """Create a new _ConfigFile.  If <filename> is set, read from
           a corresponding file.  If <string> is set, parse its contents.
 
           (If <filename> ends with ".gz", assume a file compressed
           with gzip.)
 
           If <assumeValid> is true, skip all unnecessary validation
           steps.  (Use this to load a file that's already been checked as
           valid.)"""
        assert (filename is None) != (string is None)
 
        if not hasattr(self, '_callbacks'):
            self._callbacks = {}
 
        self.assumeValid = assumeValid
 
        if filename and not string:
            string = mixminion.Common.readPossiblyGzippedFile(filename)
        self.fname = filename
 
        self.__load(string)
 
        if keep:
            self._originalContents = string
 
    def __load(self, fileContents):
        """As in .reload(), but takes an open file object _or_ a string."""
 
        fileContents = _abnormal_line_ending_re.sub("\n", fileContents)
 
        if self._restrictFormat:
            sections = _readRestrictedConfigFile(fileContents)
        else:
            sections = _readConfigFile(fileContents)
 
        sections = self.prevalidate(sections)
 
        self._sections = {}
        self._sectionEntries = {}
        self._sectionNames = []
        sectionEntryLines = {}
 
        for secName, secEntries in sections:
            self._sectionNames.append(secName)
 
            if self._sections.has_key(secName):
                raise ConfigError("Duplicate section [%s]" %secName)
 
            section = {}
            sectionEntries = []
            entryLines = []
            self._sections[secName] = section
            self._sectionEntries[secName] = sectionEntries
            sectionEntryLines[secName] = entryLines
 
            secConfig = self._syntax.get(secName)
 
            if not secConfig:
                if self._restrictSections:
                    raise ConfigError("Skipping unrecognized section %s"
                                      %secName)
                else:
                    LOG.warn("Skipping unrecognized section %s", secName)
                    continue
 
            # Set entries from the section, searching for bad entries
            # as we go.
            for k,v,line in secEntries:
                try:
                    rule, parseType, default = secConfig[k]
                except KeyError:
                    msg = "Unrecognized key %s on line %s"%(k,line)
                    acceptedIn = [ sn for sn,sc in self._syntax.items()
                                   if sc.has_key(k) ]
                    acceptedIn.sort()
                    if acceptedIn:
                        msg += ". This key belongs in %s, but appears in %s."%(
                            englishSequence(acceptedIn, compound="or"),
                            secName)
                    if self._restrictKeys:
                        raise ConfigError(msg)
                    else:
                        LOG.warn(msg)
                        continue
 
                parseFn, _ = self.CODING_FNS.get(parseType,(None,None))
 
                # Parse and validate the value of this entry.
                if parseFn is not None:
                    try:
                        v = parseFn(v)
                    except ConfigError, e:
                        e.args = ("%s at line %s" %(e.args[0],line))
                        raise e
 
                sectionEntries.append( (k,v) )
                entryLines.append(line)
 
                # Insert the entry, checking for impermissible duplicates.
                if rule in ('REQUIRE', 'ALLOW'):
                    if section.has_key(k):
                        raise ConfigError("Duplicate entry for %s at line %s"
                                          % (k, line))
                    else:
                        section[k] = v
                elif rule in ('REQUIRE*','ALLOW*'):
                    try:
                        section[k].append(v)
                    except KeyError:
                        section[k] = [v]
                else:
                    assert rule == 'IGNORE'
                    pass
 
            # Check for missing entries, setting defaults and detecting
            # missing requirements as we go.
            for k, (rule, parseType, default) in secConfig.items():
                if k == '__SECTION__' or rule == 'IGNORE':
                    continue
                elif not section.has_key(k):
                    if rule in ('REQUIRE', 'REQUIRE*'):
                        raise ConfigError("Missing entry %s from section %s"
                                          % (k, secName))
                    else:
                        parseFn, _ = self.CODING_FNS.get(parseType,(None,None))
                        if parseFn is None or default is None:
                            if rule == 'ALLOW*':
                                section[k] = []
                            else:
                                section[k] = default
                        elif rule == 'ALLOW':
                            section[k] = parseFn(default)
                        else:
                            assert rule == 'ALLOW*'
                            section[k] = map(parseFn,default)
 
            cb = self._callbacks.get(secName)
            if cb:
                cb(section, sectionEntries)
 
        # Check for missing required sections, setting any missing
        # allowed sections to {}.
        for secName, secConfig in self._syntax.items():
            secRule = secConfig.get('__SECTION__', ('ALLOW',None,None))
            if (secRule[0] == 'REQUIRE'
                and not self._sections.has_key(secName)):
                raise ConfigError("Section [%s] not found." %secName)
            elif not self._sections.has_key(secName):
                self._sections[secName] = {}
                self._sectionEntries[secName] = []
 
        if not self.assumeValid:
            # Call our validation hook.
            self.validate(sectionEntryLines, fileContents)
 
    def _addCallback(self, section, cb):
        """For use by subclasses.  Adds a callback for a section"""
        if not hasattr(self, '_callbacks'):
            self._callbacks = {}
        self._callbacks[section] = cb
 
    def prevalidate(self, contents):
        """Given a list of (SECTION-NAME, [(KEY, VAL, LINENO)]), makes
           decision on whether to parse sections.  Subclasses should
           override.  Returns a revised version of its input.
        """
        return contents
 
    def getFeature(self,sec,name):
        """Given a sec/name pair returned by resolveFeatureName, return a
           string value of that feature for the class."""
        assert sec not in ("+","-")
        parseType = self._syntax[sec].get(name)[1]
        _, unparseFn = self.CODING_FNS.get(parseType, (None,str))
        try:
            v = self[sec][name]
        except KeyError:
            return "<none>"
        return unparseFn(v)
 
    def validate(self, entryLines, fileContents):
        """Check additional semantic properties of a set of configuration
           data before overwriting old data.  Subclasses should override."""
        pass
 
    def __getitem__(self, sec):
        """self[section] -> dict
 
           Return a map from keys to values for a given section.  If the
           section was absent, return an empty map."""
        return self._sections[sec]
 
    def get(self, sec, val="---"):
        """Return a section named sec, if any such section exists.  Otherwise
           return an empty dict, or 'val' if provided."""
        if val == "---": val = {}
        return self._sections.get(sec, val)
 
    def has_section(self, sec):
        """Return true if this config object allows a section named 'sec'."""
        return self._sections.has_key(sec)
 
    def getSectionItems(self, sec):
        """Return a list of ordered (key,value) tuples for a given section.
           If the section was absent, return an empty map."""
        return self._sectionEntries[sec]
 
    def __str__(self):
        """Returns a string configuration file equivalent to this configuration
           file."""
        lines = []
        for s in self._sectionNames:
            lines.append("[%s]\n"%s)
            for k,v in self._sectionEntries[s]:
                tp = self._syntax[s][k][1]
                if tp:
                    v = self.CODING_FNS[tp][1](v)
                lines.append(_formatEntry(k,v,strict=self._restrictFormat))
            if not self._restrictFormat:
                lines.append("\n")
 
        return "".join(lines)
 
 
if sys.platform == 'win32':
    # Windows prefers to put configuration in different places, depending
    # on your version, but it doesn't get the idea of dotfiles.
    DEFAULT_USER_DIR = "~/mixminion"
else:
    # Unix prefers to put configuration in hidden directories in your homedir.
    DEFAULT_USER_DIR = "~/.mixminion"
 
class ClientConfig(_ConfigFile):
    #XXXX Should this go into ClientUtils or something?
    _restrictFormat = 0
    _restrictKeys = _restrictSections = 1
    _syntax = {
        'Host' : { '__SECTION__' : ('ALLOW', None, None),
                   'ShredCommand': ('ALLOW', "command", None),
                   'EntropySource': ('ALLOW', "filename", "/dev/urandom"),
                   'TrustedUser': ('ALLOW*', "user", None),
                   'FileParanoia': ('ALLOW', "boolean", "yes"),
                   },
        'DirectoryServers' :
                   { '__SECTION__' : ('ALLOW', None, None),
                     'ServerURL' : ('ALLOW*', None, None),
                     'MaxSkew' : ('ALLOW', "interval", "10 minutes"),
                     'DirectoryTimeout' : ('ALLOW', "interval", "1 minute"),
                     'AllowOldDirectoryFormat': ("ALLOW", 'boolean', 'true') },
        'User' : { 'UserDir' : ('ALLOW', "filename", DEFAULT_USER_DIR) },
        'Security' : { 'SURBAddress' : ('ALLOW', None, None),
                       'SURBLifetime' : ('ALLOW', "interval", "7 days"),
                       'ForwardPath' : ('ALLOW', None, "~5"),
                       'ReplyPath' : ('ALLOW', None, "~5"),
                       'SURBPath' : ('ALLOW', None, "~5"),
                       'BlockServers' : ('ALLOW*', 'list', ""),
                       'BlockEntries' : ('ALLOW*', 'list', ""),
                       'BlockExits' : ('ALLOW*', 'list', ""),
                       #XXXX008; remove these; they've been disabled since 007
                       'PathLength' : ('ALLOW', None, None),
                       'SURBPathLength' : ('ALLOW', None, None),
                       },
        'Network' : { 'ConnectionTimeout' : ('ALLOW', "interval", None),
                      'Timeout' : ('ALLOW', "interval", None) }
 
        }
    def __init__(self, fname=None, string=None):
        _ConfigFile.__init__(self, fname, string)
 
    def prevalidate(self, contents):
        # See if we've been passed a server configuration.
        foundServer = 0
        foundUser = 0
        for s, _ in contents:
            if s == 'Server':
                foundServer = 1
            elif s == 'User':
                foundUser = 1
        if foundServer and not foundUser:
            raise ConfigError("Got a server configuration (mixminiond.conf), but expected a client configuration (.mixminionrc)")
 
        return contents
 
    def validate(self, lines, contents):
        _validateHostSection(self['Host'])
 
        t = self['Network'].get('ConnectionTimeout')
        if t is not None:
            LOG.warn("The ConnectionTimout option in your .mixminionrc is deprecated; use Timeout instead.")
        t = self.getTimeout()
        if int(t) < 5:
            LOG.warn("Very short network timeout")
        elif int(t) > 120:
            LOG.warn("Very long network timeout")
 
        #XXXX008 safe to remove; has warned since 007rc2
        security = self.get('Security', {})
        for deprecatedKey, altKey in [('PathLength', 'ForwardPath'),
                                      ('SURBPathLength', 'SURBPath')]:
            if security.get(deprecatedKey,None) is not None:
                v = security[deprecatedKey]
                LOG.warn("The %s option in your .mixminionrc is no longer supported; use '%s: *%s' instead",
                         deprecatedKey, altKey, v)
 
    def getTimeout(self):
        """Return the network timeout in this configuration."""
        network = self.get("Network",{})
        # The variable is now called 'Timeout'...
        t = network.get("Timeout",None)
        if t is not None:
            return int(t)
        # ...but older code may call it 'ConnectionTimout'.
        t = network.get("ConnectionTimeout",None)
        if t is not None:
            return int(t)
        # ...default to 2 minutes.
        return 120
 
    def isServerConfig(self):
        """Return true iff this is a server configuration."""
        return 0
 
    def getUserDirectory(self):
        """Return the configured user directory."""
        return os.path.expanduser(self["User"].get("UserDir",DEFAULT_USER_DIR))
 
    def getDirectoryRoot(self):
        """Return the location where mixminion should store its files."""
        return self.getUserDirectory()
 
def _validateHostSection(sec):
    """Helper function: Makes sure that the shared [Host] section is correct;
       raise ConfigError if it isn't"""
    # For now, we do nothing here.  EntropySource and ShredCommand are checked
    # in configure_trng and configureShredCommand, respectively.
 
    # Host is checked in setupTrustedUIDs.